From rah at shipwright.com Tue Apr 1 07:26:22 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 1 Apr 2003 10:26:22 -0500 Subject: [sfs-dev] ANNOUNCE: Patriot S/WAN 1.0 Released! Message-ID: --- begin forwarded text From derek at ihtfp.com Tue Apr 1 09:43:23 2003 From: derek at ihtfp.com (Derek Atkins) Date: 01 Apr 2003 12:43:23 -0500 Subject: Run a remailer, go to jail? In-Reply-To: <20030401041741.GS13933@pig.die.com> References: <87k7ejmken.fsf@snark.piermont.com> <20030401041741.GS13933@pig.die.com> Message-ID: Dave Emery writes: > For those on this list in the Boston area there is a hearing > scheduled on the Mass Bill at 10 Am in Room 222 of the Mass State House > in Boston. 10am on what date? -derek -- Derek Atkins Computer and Internet Security Consultant derek at ihtfp.com www.ihtfp.com --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From franke at math.uni-bonn.de Tue Apr 1 04:05:10 2003 From: franke at math.uni-bonn.de (Jens Franke) Date: Tue, 1 Apr 2003 14:05:10 +0200 Subject: RSA-160 Message-ID: We have factored RSA160 by gnfs. The prime factors are: p=45427892858481394071686190649738831\ 656137145778469793250959984709250004157335359 q=47388090603832016196633832303788951\ 973268922921040957944741354648812028493909367 The prime factors of p-1 are 2 37 41 43 61 541 13951723 7268655850686072522262146377121494569334513 and 104046987091804241291 . The prime factors of p+1 are 2^8 5 3 3 13 98104939 25019146414499357 3837489523921 and 128817892337379461014736577801538358843 . The prime factors of q-1 are 2 9973 165833 11356507337369007109137638293561 369456908150299181 and 3414553020359960488907 . The prime factors of q+1 are 2^3 3 3 13 82811 31715129 7996901997270235141 and 2410555174495514785843863322472689176530759197. The computations for the factorization of RSA160 took place at the Bundesamt f|r Sicherheit in der Informationstechnik (BSI) in Bonn. Lattice sieving took place between Dec. 20, 2002 and Jan. 6, 2003, using 32 R12000 and 72 Alpha EV67. The total yield of lattice sieving was 323778082. Uniqueness checks reduced the number of sieve reports to 289145711. After the filtering step, we obtained an almost square matrix of size with 5037191 columns. Block Lanczos for this matrix took 148 hours on 25 R12000 CPUs. The square root steps took an average of 1.5 hours on a 1.8 GHz P4 CPU, giving the factors of RSA160 after processing the 6-th lanczos solution. F. Bahr J. Franke T. Kleinjung M. Lochter M. Bvh From die at die.com Tue Apr 1 13:08:04 2003 From: die at die.com (Dave Emery) Date: Tue, 1 Apr 2003 16:08:04 -0500 Subject: Run a remailer, go to jail? In-Reply-To: References: <87k7ejmken.fsf@snark.piermont.com> <20030401041741.GS13933@pig.die.com> Message-ID: <20030401210804.GC1386@pig.die.com> On Tue, Apr 01, 2003 at 12:43:23PM -0500, Derek Atkins wrote: > Dave Emery writes: > > > For those on this list in the Boston area there is a hearing > > scheduled on the Mass Bill at 10 Am in Room 222 of the Mass State House > > in Boston. > > 10am on what date? 10 Am on Wed April 2nd (tommorrow). -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass 02493 PGP fingerprint 1024D/8074C7AB 094B E58B 4F74 00C2 D8A6 B987 FB7D F8BA 8074 C7AB --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From ptrei at rsasecurity.com Tue Apr 1 13:35:00 2003 From: ptrei at rsasecurity.com (Trei, Peter) Date: Tue, 1 Apr 2003 16:35:00 -0500 Subject: Run a remailer, go to jail? Message-ID: Derek, etal If you (or anyone) goes, I'm sure we'd all appreciate some notes on what transpired. I understand 17 different bills are being considered at this hearing, so don't blink or you may miss it. Peter Trei > ---------- > From: Derek Atkins[SMTP:derek at ihtfp.com] > > > Dave Emery writes: > > > For those on this list in the Boston area there is a hearing > > scheduled on the Mass Bill at 10 Am in Room 222 of the Mass State House > > in Boston. > > 10am on what date? > > -derek > > -- > Derek Atkins > Computer and Internet Security Consultant > derek at ihtfp.com www.ihtfp.com > > --------------------------------------------------------------------- > The Cryptography Mailing List > Unsubscribe by sending "unsubscribe cryptography" to > majordomo at wasabisystems.com > --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From derek at ihtfp.com Tue Apr 1 13:47:27 2003 From: derek at ihtfp.com (Derek Atkins) Date: 01 Apr 2003 16:47:27 -0500 Subject: Run a remailer, go to jail? In-Reply-To: References: Message-ID: Peter, I'll see if I can get there. I'm not sure I can. But I know a number of other MIT-types who are considering going. If I can go I'll try to keep notes. If I can't go, then hopefully someone else can take some notes. -derek "Trei, Peter" writes: > Derek, etal > > If you (or anyone) goes, I'm sure we'd all appreciate some > notes on what transpired. I understand 17 different bills are > being considered at this hearing, so don't blink or > you may miss it. > > Peter Trei -- Derek Atkins Computer and Internet Security Consultant derek at ihtfp.com www.ihtfp.com --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From rah at shipwright.com Tue Apr 1 14:58:00 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 1 Apr 2003 17:58:00 -0500 Subject: Run a remailer, go to jail? In-Reply-To: References: Message-ID: At 4:35 PM -0500 on 4/1/03, Trei, Peter wrote: > If you (or anyone) goes, I'm sure we'd all appreciate some > notes on what transpired. I understand 17 different bills are > being considered at this hearing, so don't blink or > you may miss it. Cool. What a great day that would be. I could see swinging by the State House watching the gavel come down after a classic Billy Bulger Hack-Bill-Title-Recitation-And-Approval that would make the old FedEx commercial guys blush (amazing breath control they teach at Suffolk University Law School...), going to Hahvid Squayah for burgers at Bartleys, and then attending the Million Pound March to support the war (Fat Middle-Aged White Guys taunting Scrawny Pimple-Faced Liberals, gotta love it..) at 1:30. Hell, if I could tear myself away from the net, I may even do it... In the meantime, expect the Hacks in the House to pass their up-coming pay-raise when the Battle of Baghdad starts in earnest... Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From frantz at pwpconsult.com Wed Apr 2 13:24:58 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Wed, 2 Apr 2003 13:24:58 -0800 Subject: Logging of Web Usage In-Reply-To: References: <3E8963CC.9070203@algroup.co.uk> <200303311844.h2VIiZdd021188@new.toad.com> Message-ID: At 2:58 PM -0800 4/2/03, John Young wrote: >Ben, > >Would you care to comment for publication on web logging >described in these two files: > > http://cryptome.org/no-logs.htm > > http://cryptome.org/usage-logs.htm > >Cryptome invites comments from others who know the capabilities >of servers to log or not, and other means for protecting user privacy >by users themselves rather than by reliance upon privacy policies >of site operators and government regulation. > >This relates to the data retention debate and current initiatives >of law enforcement to subpoena, surveil, steal and manipulate >log data. > >Thanks, > >John The http://cryptome.org/usage-logs.htm URL says: >Low resolution data in most cases is intended to be sufficient for >marketing analyses. It may take the form of IP addresses that have been >subjected to a one way hash, to refer URLs that exclude information other >than the high level domain, or temporary cookies. Note that since IPv4 addresses are 32 bits, anyone willing to dedicate a computer for a few hours can reverse a one way hash by exhaustive search. Truncating IPs seems a much more privacy friendly approach. This problem would be less acute with IPv6 addresses. Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From jya at pipeline.com Wed Apr 2 14:58:17 2003 From: jya at pipeline.com (John Young) Date: Wed, 02 Apr 2003 14:58:17 -0800 Subject: Logging of Web Usage In-Reply-To: <3E8963CC.9070203@algroup.co.uk> References: <200303311844.h2VIiZdd021188@new.toad.com> Message-ID: Ben, Would you care to comment for publication on web logging described in these two files: http://cryptome.org/no-logs.htm http://cryptome.org/usage-logs.htm Cryptome invites comments from others who know the capabilities of servers to log or not, and other means for protecting user privacy by users themselves rather than by reliance upon privacy policies of site operators and government regulation. This relates to the data retention debate and current initiatives of law enforcement to subpoena, surveil, steal and manipulate log data. Thanks, John --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From schoen at loyalty.org Wed Apr 2 18:16:18 2003 From: schoen at loyalty.org (Seth David Schoen) Date: Wed, 2 Apr 2003 18:16:18 -0800 Subject: Logging of Web Usage In-Reply-To: References: <3E8963CC.9070203@algroup.co.uk> <200303311844.h2VIiZdd021188@new.toad.com> Message-ID: <20030403021618.GB15220@zork.net> Bill Frantz writes: > The http://cryptome.org/usage-logs.htm URL says: > > >Low resolution data in most cases is intended to be sufficient for > >marketing analyses. It may take the form of IP addresses that have been > >subjected to a one way hash, to refer URLs that exclude information other > >than the high level domain, or temporary cookies. > > Note that since IPv4 addresses are 32 bits, anyone willing to dedicate a > computer for a few hours can reverse a one way hash by exhaustive search. > Truncating IPs seems a much more privacy friendly approach. > > This problem would be less acute with IPv6 addresses. I'm skeptical that it will even take "a few hours"; on a 1.5 GHz desktop machine, using "openssl speed", I see about a million hash operations per second. (It depends slightly on which hash you choose.) This is without compiling OpenSSL with processor-specific optimizations. That would imply a mean time to reverse the hash of about 2100 seconds, which we could probably improve with processor-specific optimizations or by buying a more recent machine. What's more, we can exclude from our search parts of the IP address space which haven't been allocated, and optimize the search by beginning with IP networks which are more likely to be the source of hits based on prior statistical evidence. Even without _any_ of these improvements, it's just about 35 minutes on average. I used to advocate one-way hashing for logs, but a 35-minute search on an ordinary desktop PC is not much obstacle. It might still be helpful if you used a keyed hash and then threw away the key after a short time period (perhaps every 6 hours). Then you can't identify or link visitors across 6-hour periods. If the key is very long, reversing the hash could become very hard. The logging problem will depend on what server operators are trying to accomplish. Some people just want to try to count unique visitors; strangely enough, they might get more privacy-protective (and comparably precise) results by issuing short-lived cookies. -- Seth David Schoen | Very frankly, I am opposed to people http://www.loyalty.org/~schoen/ | being programmed by others. http://vitanuova.loyalty.org/ | -- Fred Rogers (1928-2003), | 464 U.S. 417, 445 (1984) --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From frantz at pwpconsult.com Thu Apr 3 11:32:03 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Thu, 3 Apr 2003 11:32:03 -0800 Subject: Logging of Web Usage In-Reply-To: <20030403021618.GB15220@zork.net> References: <3E8963CC.9070203@algroup.co.uk> <200303311844.h2VIiZdd021188@new.toad.com> Message-ID: At 6:16 PM -0800 4/2/03, Seth David Schoen wrote: >Bill Frantz writes: > >> The http://cryptome.org/usage-logs.htm URL says: >> >> >Low resolution data in most cases is intended to be sufficient for >> >marketing analyses. It may take the form of IP addresses that have been >> >subjected to a one way hash, to refer URLs that exclude information other >> >than the high level domain, or temporary cookies. >> >> Note that since IPv4 addresses are 32 bits, anyone willing to dedicate a >> computer for a few hours can reverse a one way hash by exhaustive search. >> Truncating IPs seems a much more privacy friendly approach. >> >> This problem would be less acute with IPv6 addresses. > >I'm skeptical that it will even take "a few hours"; on a 1.5 GHz >desktop machine, using "openssl speed", I see about a million hash >operations per second. (It depends slightly on which hash you choose.) >This is without compiling OpenSSL with processor-specific optimizations. Ah yes, I haven't updated my timings for the new machines that are faster than my 550Mhz. :-) The only other item is importance is that the exhaustive search time isn't the time to reverse one IP, but the time to reverse all the IPs that have been recorded. Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From ben at algroup.co.uk Thu Apr 3 05:04:14 2003 From: ben at algroup.co.uk (Ben Laurie) Date: Thu, 03 Apr 2003 14:04:14 +0100 Subject: Logging of Web Usage In-Reply-To: References: <200303311844.h2VIiZdd021188@new.toad.com> Message-ID: <3E8C314E.3080303@algroup.co.uk> John Young wrote: > Ben, > > Would you care to comment for publication on web logging > described in these two files: > > http://cryptome.org/no-logs.htm > > http://cryptome.org/usage-logs.htm > > Cryptome invites comments from others who know the capabilities > of servers to log or not, and other means for protecting user privacy > by users themselves rather than by reliance upon privacy policies > of site operators and government regulation. > > This relates to the data retention debate and current initiatives > of law enforcement to subpoena, surveil, steal and manipulate > log data. I don't have time right now to comment in detail (I will try to later), but it seems to me that, as someone else commented, relying on operators to not keep logs is really not the way to go. If you want privacy or anonymity, then you have to create it for yourself, not expect others to provide it for you. Of course, it is possible to reduce your exposure to others whilst still taking advantage of privacy-enhancing services they offer. Two obvious examples of this are the mixmaster anonymous remailer network, and onion routing. It seems to me if you want to make serious inroads into privacy w.r.t. logging of traffic, then what you want to put your energy into is onion routing. There is _still_ no deployable free software to do it, and that is ridiculous[1]. It seems to me that this is the single biggest win we can have against all sorts of privacy invasions. Make log retention useless for any purpose other than statistics and maintenance. Don't try to make it only used for those purposes. Cheers, Ben. [1] FWIW, I'd be willing to work on that, but not on my own (unless someone wants to keep me in the style to which I am accustomed, that is). -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From bmukherj at shoshin.uwaterloo.ca Thu Apr 3 12:38:58 2003 From: bmukherj at shoshin.uwaterloo.ca (Roop Mukherjee) Date: Thu, 3 Apr 2003 15:38:58 -0500 (EST) Subject: Logging of Web Usage In-Reply-To: <3E8C314E.3080303@algroup.co.uk> Message-ID: Could this not use most of the code from the Onion Router itself. I am assuming that the code was made freely available and someone has a copy if it? -- roop ________________________________________ On Thu, 3 Apr 2003, Ben Laurie wrote: > Ben. > > [1] FWIW, I'd be willing to work on that, but not on my own (unless > someone wants to keep me in the style to which I am accustomed, that is). > > --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From jya at pipeline.com Thu Apr 3 17:49:55 2003 From: jya at pipeline.com (John Young) Date: Thu, 03 Apr 2003 17:49:55 -0800 Subject: Banned Citibank PIN Cracking Documents Message-ID: We offer some 27 documents on Citibank PIN cracking banned by the British High Court on 20 February 2003: http://cryptome.org/citi-ban.htm Included are the gagging order, affidavits of defendant cryptographers and affidavits of Citibank officials and security personnel. See related message by Ross Anderson, a defendant: http://cryptome.org/pacc.htm --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From ben at algroup.co.uk Fri Apr 4 03:13:47 2003 From: ben at algroup.co.uk (Ben Laurie) Date: Fri, 04 Apr 2003 12:13:47 +0100 Subject: Logging of Web Usage In-Reply-To: References: <3E8963CC.9070203@algroup.co.uk> <200303311844.h2VIiZdd021188@new.toad.com> Message-ID: <3E8D68EB.3070609@algroup.co.uk> Bill Frantz wrote: > At 6:16 PM -0800 4/2/03, Seth David Schoen wrote: > >>Bill Frantz writes: >> >> >>>The http://cryptome.org/usage-logs.htm URL says: >>> >>> >>>>Low resolution data in most cases is intended to be sufficient for >>>>marketing analyses. It may take the form of IP addresses that have been >>>>subjected to a one way hash, to refer URLs that exclude information other >>>>than the high level domain, or temporary cookies. >>> >>>Note that since IPv4 addresses are 32 bits, anyone willing to dedicate a >>>computer for a few hours can reverse a one way hash by exhaustive search. >>>Truncating IPs seems a much more privacy friendly approach. >>> >>>This problem would be less acute with IPv6 addresses. >> >>I'm skeptical that it will even take "a few hours"; on a 1.5 GHz >>desktop machine, using "openssl speed", I see about a million hash >>operations per second. (It depends slightly on which hash you choose.) >>This is without compiling OpenSSL with processor-specific optimizations. > > > Ah yes, I haven't updated my timings for the new machines that are faster > than my 550Mhz. :-) > > The only other item is importance is that the exhaustive search time isn't > the time to reverse one IP, but the time to reverse all the IPs that have > been recorded. You only need to build the dictionary once. Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From bill.stewart at pobox.com Fri Apr 4 17:10:02 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Fri, 04 Apr 2003 17:10:02 -0800 Subject: Logging of Web Usage In-Reply-To: References: <20030403021618.GB15220@zork.net> <3E8963CC.9070203@algroup.co.uk> <200303311844.h2VIiZdd021188@new.toad.com> Message-ID: <5.1.1.6.2.20030403225236.02e1dc00@idiom.com> At 11:32 AM 04/03/2003 -0800, Bill Frantz wrote: >Ah yes, I haven't updated my timings for the new machines that are faster >than my 550Mhz. :-) > >The only other item is importance is that the exhaustive search time isn't >the time to reverse one IP, but the time to reverse all the IPs that have >been recorded. Also, until recently, there was the problem that storing a hash value for every IP address took 8-10 bytes * 2**32, and the resulting 32-40GB was an annoyingly large storage quantity, requiring a deck of Exabyte tapes or corporate-budget quantities of disk drive, which also meant that sorting the results was also awkward. These days, disk drive prices are $1/GB at Fry's for 3.5" IDE drives, so there's no reason not to have 120GB on your desk top. This does mean that if you're keeping hashed logs you should probably use some sort of keyed hash - even if you don't change the keys often, you've at least prevented pre-computed dictionary attacks over the entire IPv4 address space, and the key should be long enough (e.g. 128 bit) so that dictionary attacks on the "IP addresses of Usual Suspects" also can't be precomputed. A related question is keeping lists of public information, e.g. don't-spam lists, in some form that isn't readily abusable, such as hashed addresses. The possible namespace there is much larger, but the actual namespace isn't likely to be more than a couple of billion, in spite of the number of spammers selling their lists of 9 billion names. There's the question of how exact a match do you need - if mail is for alice+tag1 at example.com, you'd ideally like to be able to check alice+tag1 at example.com, alice at example.com, and @example.com, which makes the lookup process more complex. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From miles.ecclestont2w at gmail.com Sat Apr 5 07:30:52 2003 From: miles.ecclestont2w at gmail.com (Kenneth Mclaughlin) Date: Sat, 5 Apr 2003 20:30:52 +0500 Subject: Hey baby, found this site and wanted you to check it out first Message-ID: <200604060030.k360UuZK008413@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1114 bytes Desc: not available URL: From bill.stewart at pobox.com Wed Apr 9 00:20:21 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 09 Apr 2003 00:20:21 -0700 Subject: Swiss ISPs Required to Log and Store Email for Six Months Message-ID: <5.1.1.6.2.20030408234906.02cc7f98@idiom.com> SWISS ISPS MUST LOG AND STORE CONSUMERS' EMAIL DATA As of April 1, Swiss ISPs will have to keep a log for six months of all the emails sent by their customers. Experts criticize the measure, saying it will be both difficult and costly to implement. http://www.statewatch.org/news/2003/apr/01switz.htm ===== The law was passed in January 2002, and ISPs had until April 1 to implement. Does anybody know if this only applies to email providers, or exactly what kinds of email providers, or if it also requires ISPs who provide IP transport to eavesdrop it? What about businesses providing email for their employees and other users? How much of the Swiss email business will be driven out of the country, either to US email providers or European providers like Wanadoo and Tiscali? And does anybody know if they have to keep _all_ the spam? Or is keeping one copy of each enough? Or can they give their customers _some_ privacy protection by always giving the authorities all of the spam in addition to whatever they really wanted? --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From frantz at pwpconsult.com Wed Apr 9 10:29:49 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Wed, 9 Apr 2003 10:29:49 -0700 Subject: Swiss ISPs Required to Log and Store Email for Six Months In-Reply-To: References: <5.1.1.6.2.20030408234906.02cc7f98@idiom.com> Message-ID: At 9:41 AM -0700 4/9/03, Thomas Shaddack wrote: >> SWISS ISPS MUST LOG AND STORE CONSUMERS' EMAIL DATA >> As of April 1, Swiss ISPs will have to keep a log for six >> months of all the emails sent by their customers. Experts >> criticize the measure, saying it will be both difficult and >> costly to implement. >> http://www.statewatch.org/news/2003/apr/01switz.htm > >If I understood it correctly, they want to keep "only" the >traffic-analysis data, the SMTP server logs, not the messages themselves >(though I'd bet they would love to, if it would be reasonably practical). > >I am curious if this applies even on provately-operated servers; eg, if >you aren't cheap and instead of an account you buy a colocation server, >with your own mailserver, when the ISP provides only the connection >itself, without additional services. I see a market oppertunity for SMTP servers outside Switzerland which use SSL/TLS for communication, and perhaps listen on non-standard ports. Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From bill.stewart at pobox.com Wed Apr 9 11:26:17 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 09 Apr 2003 11:26:17 -0700 Subject: The secret government marches on... In-Reply-To: Message-ID: <5.1.1.6.2.20030409112457.02cc84a8@idiom.com> At 10:46 AM 04/09/2003 -0400, Tyler Durden wrote: >It's only when an operation has to hide lots of money from even some of >the big agencies (or parts thereof) that they have to resort to moving >drugs and whatnot to fund "Iran Contra" and other extracurriculars. George >W almost certainly piloted one of the planes used to move cocaine into the >US to fund some of those operations. He may have snorted one plane-load of that coke, but this is the first time I've heard an assertion that he flew the planes as opposed to just getting high... From bill.stewart at pobox.com Wed Apr 9 11:38:36 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 09 Apr 2003 11:38:36 -0700 Subject: Trusted Computing Group trying to be TCPA follow-on [eetimes] Message-ID: <5.1.1.6.2.20030409113725.02c5ae80@idiom.com> New group aims to secure PCs, PDAs, cell phones By Rick Merritt, EE Times April 8, 2003 (2:20 p.m. EST) URL: http://www.eetimes.com/story/OEG20030408S0046 SAN MATEO, Calif. — Fifteen companies announced Tuesday [April 8] they have formed the Trusted Computing Group, an industry initiative to define and promote a specification for security in PCs, servers, PDAs and cellphones. The group essentially reboots the efforts of the now-disbanded PC-centric Trusted Computing Platform Alliance (TCPA), this time including participation from Nokia and consumer electronics companies such as Sony and Philips. The Trusted Computing Group (TCG) expects to release a specification for PC security before the end of the year. A spec for cell phones, however, could be as much as two years away. Founding members of the TCG are carryovers from the earlier 190-member TCPA effort. They include AMD, Hewlett-Packard, IBM, Intel and Microsoft. Contributing members include Atmel, Infineon, National Semiconductor, Nokia, Philips, Phoenix Technologies, Sony, ST Microelectronics, VeriSign and Wave Systems. The TCPA defined a trusted platform module (TPM), a basic device with encryption and secure memory capabilities to oversee PC security. However the TPM 1.1 chips now shipping from companies such as Atmel, Infineon and National Semiconductor have not been widely adopted to date and do not conform to concepts for a secure PC execution mode recently defined by Microsoft under a program it called Palladium. The TCG is defining a specification for a 1.2 version TPM and a software stack that will work with the Palladium architecture Microsoft developed in collaboration with Intel Corp. and Advanced Micro Devices. Microsoft will detail this approach publicly for the first time at the Windows Hardware Engineering Conference in May. Microsoft's implementation, which it now calls the Next Generation Secure Computing Base (NGSCB), will require new logic in several PC components including processors, chip sets, graphics processors and I/O devices. Indeed, the concept for a secure operating mode is so broad Microsoft will devote an entire track at WinHEC — about 18 hours of content — to describing it. Microsoft has not said, however, when it will ship software that complies with NGSCB. Industry watchers expect that code will appear late next year or early in 2005 in the next major version of Windows, dubbed Longhorn. The security scheme will work in conjunction with processor functions Intel Corp. calls Le Grande Technology and has embedded in its next-generation Pentium processor dubbed Prescott, expected to ship later this year. AMD will also support the PC security concepts in its processors though it has not indicated when. The TPM 1.2 modules will include a new session encryption interface and secure state counters that prevent replay security attacks, said Stephen Heil, a technical evangelist for security at Microsoft. The TCG has separate working groups defining those modules, a security software stack and particular needs for both servers and PDAs. The TCG is about to launch a working group to define a specification for secure cellphones, an effort that could take 18 to 24 months. Nokia is expected to be a key contributor to that group in addition to other members still being recruited by the TCG. “I would expect to see our membership broaden to include many of the players required for that effort,” said Geoffrey Strongin, a security specialist at AMD. Jim Ward, chair of TCG and a security specialist with IBM, said the group would like to create other specifications for platforms such as set-top boxes and video game consoles though no active efforts are currently underway. “We are looking to develop a broad specification that can be used by a broad set of products,” he said. “The industry is coming together,” said John Hull, director of marketing for advanced PC products at National Semiconductor. “We are thoroughly convinced that the future of the PC rests on three legs: networking, security and manageability. You will have to have all three to play in PCs going forward,” he added. Hull said he expects TPM module makers will update their products to comply with the new security spec when Prescott processors roll out this fall. Further in the future, the modules could be integrated into existing PC components such as SuperI/O parts that provide legacy support for serial, parallel, keyboard and floppy controllers. “IBM is about the only company in production with systems using the [standalone] TPM 1.1 devices as far as I know,” said Hull. Ward said IBM has shipped millions of TPM devices in its PC systems. An HP spokesman said the company has not yet shipped systems with the modules which typically cost about $5. “We have to increase the rate of adoption. That's why integration with Super I/O makes a lot of sense. We think this will be a checkbox item going forward,” Hull added. As a legally incorporated group, the TCG will enforce reasonable and non-discriminatory licensing of any intellectual property in the spec and define a mechanism to certify compliance to it. The group is also expected to take a more pro-active approach than its predecessor to addressing controversial issues about privacy and digital rights raised by the PC security effort. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From ericm at lne.com Wed Apr 9 11:58:16 2003 From: ericm at lne.com (Eric Murray) Date: Wed, 9 Apr 2003 11:58:16 -0700 Subject: Patriot Act to become permanant? Message-ID: <20030409115816.A16273@slack.lne.com> In a move that should not be a suprise to anyone here, Sen. Orrin Hatch has introduced a bill to repeal the sunset clause in the Patriot Act, making it permanant. http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2003/04/09/MN257910.DTL From ericm at lne.com Wed Apr 9 12:05:10 2003 From: ericm at lne.com (Eric Murray) Date: Wed, 9 Apr 2003 12:05:10 -0700 Subject: "Lone terrorist" bill Message-ID: <20030409120510.A16377@slack.lne.com> WTF is a "lone terrorist"? http://www.newsday.com/news/nationworld/nation/ny-ussena093214085apr09,0,3864424.story?coll=ny-nationalnews-headlines "A bill to expand the ability of the government to conduct wiretaps and other surveillance on suspected lone terrorists has attracted controversial amendments that have stalled its advance to the full Senate. Judiciary Committee Chairman Orrin Hatch (R-Utah) has circulated one amendment that would eliminate the sunset provision in the anti-terror Patriot Act that passed in the aftermath of Sept. 11, 2001, terrorist attacks and greatly expanded the government's law enforcement powers. " Reading down it looks like a "lone terrorist" is someone that the government can't even prove is a "terrorist" to the secret FISA rubberstamp court. So this is presumeably an attempt to bypass FISA entirely. From morlockelloi at yahoo.com Wed Apr 9 12:36:27 2003 From: morlockelloi at yahoo.com (Morlock Elloi) Date: Wed, 9 Apr 2003 12:36:27 -0700 (PDT) Subject: Crypto in Baghdad--Jaguar and Saddam's Bunker In-Reply-To: Message-ID: <20030409193627.71074.qmail@web40603.mail.yahoo.com> > Don't believe the myth that sellers can crack everything they There are two fronts in the crypto war. One is the between professionals who don't really waste time reading popular press and associated crypto-propaganda. It's highly probable that even minor principalities and their dictators have sufficient access to the basic crypto expertize - and practical implements like PGP source code. For less than a $1000 one can put together quite secure pgpfone over POTS, radio or whatever. I don't think that anyone today reads anyone else's big secrets. What happens in the field, among ordinary mercenaries is another issue - small portable secure communicators are probably more common in us forces than among taliban. Another front is more interesting, it's the current strategy against crypto for the masses. The strategy is a very good one and it works better than anything before: the crypto is simply not mentioned at all. In my own experience, more lay people were aware of crypto issues in mid-90ties than today. By forcing it below the radar of pop interest, the crypto was dealt the strongest blow so far. The discrepancy between perils of data harvesting and awareness of it is rising. This falls. I guess, in the Big Lie axiom: the bigger the lie, the more will believe it. ===== end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! Tax Center - File online, calculators, forms, and more http://tax.yahoo.com From timcmay at got.net Wed Apr 9 12:54:42 2003 From: timcmay at got.net (Tim May) Date: Wed, 9 Apr 2003 12:54:42 -0700 Subject: Patriot Act to become permanant? In-Reply-To: <20030409115816.A16273@slack.lne.com> Message-ID: <1AD1F6C8-6AC5-11D7-9925-000A956B4C74@got.net> On Wednesday, April 9, 2003, at 11:58 AM, Eric Murray wrote: > In a move that should not be a suprise > to anyone here, Sen. Orrin Hatch has introduced a bill > to repeal the sunset clause in the Patriot Act, making > it permanant. > > http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/ > 2003/04/09/MN257910.DTL > > Yes, in the Permanent War on Some Dictators, we need permanent police state measures. Bush faces a tough decision: roll east, or roll west. Since Syria is more decrepit in its armaments, as Iraq was, it will be the likely target. But first we need to prepare by floating rumors that Saddam's missing "WMD" (not found by the U.N., not found by the swarming soldiers) must have been spirited out to Axis of Evil Founding Member Syria. The Permanent War helps the defense contractors, helps the Republicans, and helps Israel. What more can we ask? (Don't answer this unless you've checked with the text of the Homeland Security Act and PATRIOT Act to see if your answers make you an "illegal combatant.") --Tim May From timcmay at got.net Wed Apr 9 13:12:25 2003 From: timcmay at got.net (Tim May) Date: Wed, 9 Apr 2003 13:12:25 -0700 Subject: "Lone terrorist" bill In-Reply-To: <20030409120510.A16377@slack.lne.com> Message-ID: <94E17E06-6AC7-11D7-9925-000A956B4C74@got.net> On Wednesday, April 9, 2003, at 12:05 PM, Eric Murray wrote: > WTF is a "lone terrorist"? > > http://www.newsday.com/news/nationworld/nation/ny- > ussena093214085apr09,0,3864424.story?coll=ny-nationalnews-headlines > > "A bill to expand the ability of the government to conduct wiretaps > and other surveillance on suspected lone terrorists has attracted > controversial amendments that have stalled its advance to the full > Senate. > ... > Reading down it looks like a "lone terrorist" is someone > that the government can't even prove is a "terrorist" > to the secret FISA rubberstamp court. So this is presumeably > an attempt to bypass FISA entirely. They claim to no longer need to prove that a person was planning a terrorist act. They claim that merely having terrorist tools is enough. There are several pending examples of this, discussed here. One guy up in the Northwest is facing terrorism charges for possibly thinking about possibly making ricin, possibly to poison his wife. No, I'm not talking about Jim Bell. Here's a URL: "Olsen would face life in prison if convicted of the federal charge of possession of a biological agent or toxin for use as a weapon. " A good thing Bell was not being charged during the Permanent War. (Also a good time to get rid of those teflon-coated frying pans. P.S. Don't do a Google search in this area, especially in the area of making Sarin and other agents using home kitchen and garage ingredients unless you are aware that Google has hired many former spooks to help coordinate their very voluntary snooping and narcing on user searches.) --Tim May "We are at war with Oceania. We have always been at war with Oceania." "We are at war with Eurasia. We have always been at war with Eurasia." "We are at war with Iraq. We have always been at war with Iraq. "We are at war with France. We have always been at war with France." From sunder at sunder.net Wed Apr 9 10:54:12 2003 From: sunder at sunder.net (Sunder) Date: Wed, 9 Apr 2003 13:54:12 -0400 (edt) Subject: "Lone terrorist" bill In-Reply-To: <20030409120510.A16377@slack.lne.com> Message-ID: It's just like with JFK - the CIA wanted Lee Harvey Oswald to be "the lone gunman" so if you have a nutcase, you don't have a conspiracy. Too bad it surfaced that Oswald had been to Mexico and had ties to the CIA and that the bullets fired didn't match the location of the book repository, etc. So, now we have a "Lone Terrorist" as a class of patsy to use at whim. Usually will be the Arab immigrant unable to secure legal aid anyhow. Once established, anyone can be the patsy. When Uncle Sam wants to disappear someone, they become "The Lone Terrorist." Simple, sweet, clean. The sheep will buy it. "He was a lone terrorist, kept to himself, valued his privacy..." Funny how we went from the Declaration of Independence that says "We hold these Truths to be self-evident, that all Men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the Pursuit of Happiness" to enumerate such rights in the Bill of Rights, to the USA PATRIOT act which removes all Liberty and due process at the slightest whim of any burrowcrat in the right agency. There was some Asimov robot story about this world where the robots' laws were bypassed by changing the definition of human to those from a specific planet only, thus having the robots kill outsiders to defend them. Eventually they tweaked it so deeply that the robots killed everyone. This is a pretty standard sci-fi theme. In this case, "citizen" goes away, as do rights. "He's not a citizen, he's a lone terrorist." Ditto "protected witness" and "illegal combattant" as a way to remove rights. It's has not been 98'C for quite some time now, and the frog has long been boiled. ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ On Wed, 9 Apr 2003, Eric Murray wrote: > WTF is a "lone terrorist"? From mv at cdc.gov Wed Apr 9 14:00:10 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 09 Apr 2003 14:00:10 -0700 Subject: 'Peking' vs 'Beijing' Message-ID: <3E9489DA.4020902@cdc.gov> At 06:01 PM 4/9/03 +0100, Jim Dixon wrote: >I don't think that anyone who has learned to read and write one of the >languages based on Chinese characters would agree that they are >"atrocious". If your native language is written using a western alphabet, >characters are hard to learn. But once learned, they are conveniently >concise. Yes, one's first operating system is always the best. Orientals were self-handicapped by not having a smaller alphabet. Horrible typewriters, and forget putting the glyphs into a mid-80's character ROM. Yes, they're concise, but they require very high resolution to render. And, at least some symbol sets are not phonetic. From bill.stewart at pobox.com Wed Apr 9 14:00:11 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 09 Apr 2003 14:00:11 -0700 Subject: Intel planning to use Wave TCPA. Message-ID: <5.1.1.6.2.20030409133812.02cbcd28@idiom.com> There's also another article on TCPA at http://www.theinquirer.net/?article=8760 http://www.theinquirer.net/default.aspx?article=8769 Intel confirms future PC products to use Wave TCPA The bouncer at the Trusted Computing ball turns up again By Mike Magee: Monday 07 April 2003, 14:44 THE COMPANY that showed off its Trust Suite products at the Intel Developer Forum in February now indeed has the backing of the chip giant. Wave said it will demo its Embassy Trust Suite apps across different "trusted" computer types at the RSA Security 2003 trade show, which starts mid April. Intel is giving the imprimature to Wave using its Trusted Platform Module (TPM), which we've dealt with at some length in another article today. TPM  claims Intel  is a "root of trust" semiconductor device, otherwise known as Fritz. Wave and Intel will show the Document Manager app on three systems, with a digitally signed document "signed" and then archived by each of the "trusted" platforms. An Intel representative said that it was important "that OEMs and the industry in general... deliver these TPM services.. that will be deployed over the next few years". Nancy Sumrall, who is the "safer computing initiative manager" of the desktop division at Intel "bring a whole new level of value to the PC platform". Meanwhile, Wave claimed it will be the first company to deliver interoperable and secure PC services on the industry's "leading trusted platforms". The TCPA compliant solution and the suite will also be shown at the RSA conference, Wave said. 5 See Also ------------- From mv at cdc.gov Wed Apr 9 14:11:31 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 09 Apr 2003 14:11:31 -0700 Subject: "Lone terrorist" bill Message-ID: <3E948C83.1090400@cdc.gov> At 12:05 PM 4/9/03 -0700, Eric Murray wrote: >WTF is a "lone terrorist"? What they're trying for is someone who hears an Osama tape and takes the initiative, without external connections. Sorta like the 101st Airborne dude who fragged the invaders, but domestically. In fact, they'll soon abuse this to monitor anyone, more so (or more "legally") than they do now. And antiabortion loonies, PETA, Earthfirst, folks who hang No War banners, folks without flags on their cars, anyone named Akbar or Mohammed, .. Terrorist is the new root password to the Constitution. From mv at cdc.gov Wed Apr 9 14:26:03 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 09 Apr 2003 14:26:03 -0700 Subject: "Lone terrorist" bill Message-ID: <3E948FEB.9040607@cdc.gov> At 01:12 PM 4/9/03 -0700, Tim May wrote: >(Also a good time to get rid of those teflon-coated frying pans. Better dispose of that freon-filled fridge, too.[1] You don't have a pool, do you? That muriatic acid and chorine powder is a WMD just waiting to be deployed. Hate to be an Arab-American pool maintainer.. And Allah help you if you work at a metal plating factory. Metal cans make excellent timers, too. [1] In college, long ago, we had a fridge whose freezer regularly iced up solid. Some folks decided to use a propane torch to rapidly defrost. Luckily there was a chem major who wandered in. From camera_lumina at hotmail.com Wed Apr 9 11:50:05 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 09 Apr 2003 14:50:05 -0400 Subject: 'Peking' vs 'Beijing' Message-ID: Bill Frantz wrote... "the third Ming emperor, however, restored it as the Imperial seat of the dynasty and gave it a new name, Peking (Northern Capital)." Well, this simplifies things, as it should for an Encyclopedia entry, but it doesn't explain the "Peking" 'transliteration'. As I said before, there is no sound "king" in Mandarin. And indeed, "jing" means capital in Mandarin. So what this paragraph refers to as "Peking" was always pronounced by Chinese as "Beijing" to each other. The British, however, introduced the pronunciation "Peking" for some reason. (I may have the history in one of my books which I'll peruse tonight.) (For the knowledgeable, it might be argued that the pronunciation 'Peking' has Manchurian roots, because the Mings were Manchus. But this is not the case. For one, by the 20th century, the Beijing Court had completely forgotton how to speak Manchu (only a few dozen people still speak it today). For two, Manchu is not a Chinese dialect, but derived by one of the trans-siberian groups. So it would not share the "Bei" sound indicating "northern".) -TD >From: Bill Frantz >To: cypherpunks at lne.com >Subject: Re: 'Peking' vs 'Beijing' >Date: Wed, 9 Apr 2003 10:46:59 -0700 > >From the Encyclopaedia Britannica (1974 edition): > >"More than 2,000 years ago, a site near present-day Peking was already an >important military and trading centre for the northeastern frontier of >China. Not until the Mongol dynasty (AD 1279 to 1368) was a successor city >-- called Ta-tu -- to become the administrative capital of China. During >the reign of the first emperor of the Ming dynasty (1368 to 1644), Nanking >became the capital, and the old Mongol capital was renamed Pei-p'ing (Peace >in the North); the third Ming emperor, however, restored it as the Imperial >seat of the dynasty and gave it a new name, Peking (Northern Capital). It >remained the capital until the 20th century, when, after the successful >campaign of the Chinese Nationalist troops against warlords in Peking in >1927, Nanking was selected as the national capital, and Peking once again >resumed its old name -- Pei-p'ing -- a name still used b the Nationalist >government in Taiwan." > >Cheers - Bill > > >------------------------------------------------------------------------- >Bill Frantz | Due process for all | Periwinkle -- Consulting >(408)356-8506 | used to be the | 16345 Englewood Ave. >frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA _________________________________________________________________ The new MSN 8: smart spam protection and 2 months FREE* http://join.msn.com/?page=features/junkmail From rah at shipwright.com Wed Apr 9 11:50:19 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Wed, 9 Apr 2003 14:50:19 -0400 Subject: Crypto in Baghdad--Jaguar and Saddam's Bunker In-Reply-To: <24057F76-6AB3-11D7-9925-000A956B4C74@got.net> References: <24057F76-6AB3-11D7-9925-000A956B4C74@got.net> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 When the strike first happened, my brother, who has cable, heard this Jaguar stuff on Fox, called me up about it. I told him then that lots of so-called "encrypted" telephony, like GSM, had big gaping holes, that something older than that probably didn't have a sufficient keysize to survive Moore's Law, and that they probably didn't *need* a back door. Also, I told him that just listening for enough undecipherable telephone traffic would give you sufficient impetus for a kinetic denial of service attack, and that that's what probably happened. Nothing I've heard since, here or elsewhere, dissuades me of any of the above. Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPpRrVcPxH8jf3ohaEQJ/zwCcDx4V3gdkEdm+uVO5Hb4GG0ud5NUAn2AL guk1CcEBdEXcCfDTG+ex7+/P =//Ud -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From camera_lumina at hotmail.com Wed Apr 9 11:59:00 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 09 Apr 2003 14:59:00 -0400 Subject: 'Peking' vs 'Beijing' Message-ID: Well, it should be pointed out that learning to read Chinese is not so unlike learning to read phonetic languages as one might think. Remember first of all that Chinese does not have "2,000 letters". Each of the characters is a word, or in some cases two or three characters form a word. Each character is also made up after an assembly of "radicals", or basic building blocks (actually, only one of the sub-characters is referred to as 'the' radical, and that's how they look up a character in a Chinese dictionary). And remember that when learning to read, being able to pronounce the word based on its letters does little for you (when you're small) unless you know the meaning of that word. So young Enlglish readers have to learn word-by-word just like young Chinese readers. The english readers get some help by being able to sound out the word, but the Chinese reader can possibly pick out the radical and get something of a hint. That said, it IS harder learning to read and write in Chinese, and this is why Beijing has indicated its desire to put away the characters one day. (But that will never happen.) The reading ramp-up curves occur fairly similarly in east and west, from what I've been able to tell, but the western curve seems to move towards an asymptote in HS while Chinese seems to remain linear up through part of college. -TD >From: "Trei, Peter" >To: Steve Furlong , "'Jim Dixon'" >CC: cypherpunks at minder.net >Subject: RE: 'Peking' vs 'Beijing' >Date: Wed, 9 Apr 2003 13:52:50 -0400 > > > Jim Dixon[SMTP:jdd at dixons.org] > > > > > > On Wed, 9 Apr 2003, Steve Furlong wrote: > > > > > The cost of this cross-language literacy is years in school spent > > > memorizing a few thousand characters to develop basic literacy. > > > Oriental schools typically emphasize memorize-drill-repeat, with > > > individuality and inventiveness discouraged. Surely a part of that > > > emphasis comes from the needs of learning their atrocious written > > > language. The cost is too high. > > > > I don't think that anyone who has learned to read and write one of the > > languages based on Chinese characters would agree that they are > > "atrocious". If your native language is written using a western >alphabet, > > characters are hard to learn. But once learned, they are conveniently > > concise. > > >What I'd be curious to know is at what age an average person's reading >ability catches up with their speaking ability, in the different systems. > >In English, children are usually equally fluent in the written and spoken >forms by the age of 8, and often earlier. At that point, they've >essentially > >mastered written language, and further progess depends mainly on the >rate with which they acquire spoken volcabulary, grammar, and context. >(The main drag is English's highly irregular spelling, which effects >writing ability much more than reading. More regular languages such as >Italian do not have this problem - there are no spelling bees in Italy as >they would be pointless.) > >By the time an average American child is 9, they can read and >the newspaper without any difficulty. Can an average >Chinese or Japanese child do this? > >While I wouldn't use the word 'atrocious', I think a case can be made >that the fewer years required to master literacy, the more time >available for other learning. > >I'm told the Korean Hangul is even better than Western alphabetic >systems - only 24 characters are in use, and it's not unusual for >children of 2 or 3 to read and write. > >See: >http://www.sigmainstitute.com/koreanonline/hangul_history.shtml > >Peter Trei _________________________________________________________________ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail From camera_lumina at hotmail.com Wed Apr 9 12:05:19 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 09 Apr 2003 15:05:19 -0400 Subject: Throw Sadam off the train Message-ID: Well, of course CNN is showing all of the Iraqis pulling down the Saddam Hussein statues. What they SHOULD do is take the real Saddam (or one of his clones) and throw him to the Kurds. CNN could show the Kurds tearing Saddam to shreds like a pack of Wolves. A very fitting ending to the turd as well as Grade-A primo agit-prop for the masses. -TD _________________________________________________________________ Protect your PC - get McAfee.com VirusScan Online http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963 From schear at attbi.com Wed Apr 9 15:33:34 2003 From: schear at attbi.com (Steve Schear) Date: Wed, 09 Apr 2003 15:33:34 -0700 Subject: Crypto in Baghdad--Jaguar and Saddam's Bunker In-Reply-To: References: Message-ID: <5.1.0.14.2.20030409152444.04e28008@mail.attbi.com> At 12:05 PM 4/9/2003 -0700, you wrote: >The AG Crypto story has been repeated way too often to >be relied upon as a guide. Best to treat these myths as >yokel bait. Perhaps, but I worked at Cylink, a AG Crypto competitor, during those years and my second-hand information (I wasn't the product manager of any of these boxes) was that NSA did approach us to compromise certain boxes to be supplied to narco terrorists, etc. independent sales agent to Cylink (I think operating out of Miami). The compromises, from what I understand, were to made to the random number generator. As some on the list understand, with subsequent whitening compromised random number generators can be very difficult to directly detect even by experts. Other methods, such as intentional leaks which are a part of every good counter-surveillance operation, would need to be used to out bogus boxes. steve we do not win the terrorism battle / with exclusion of liberties / an un-elected president / with a brand new atrocity / make way for war time opportunists / corporate interests and their proxies / exploitation of a tragedy / to serve their ideologies / corporate military complex / continues to abuse the world / death weapons for despots / sold by the red, white and blue -- Moral Crux, Stocks and Bombs From camera_lumina at hotmail.com Wed Apr 9 13:25:30 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 09 Apr 2003 16:25:30 -0400 Subject: 'Peking' vs 'Beijing' Message-ID: I wrote... "For the knowledgeable, it might be argued that the pronunciation 'Peking' has Manchurian roots, because the Mings were Manchus." Oops. Meant to write "Qings". The Yuan were Mongol, the Ming Han Chinese, and the Qing Manchu. -TD >From: "Tyler Durden" >To: frantz at pwpconsult.com, cypherpunks at minder.net >Subject: Re: 'Peking' vs 'Beijing' >Date: Wed, 09 Apr 2003 14:50:05 -0400 > >Bill Frantz wrote... > >"the third Ming emperor, however, restored it as the Imperial >seat of the dynasty and gave it a new name, Peking (Northern Capital)." > >Well, this simplifies things, as it should for an Encyclopedia entry, but >it doesn't explain the "Peking" 'transliteration'. As I said before, there >is no sound "king" in Mandarin. And indeed, "jing" means capital in >Mandarin. So what this paragraph refers to as "Peking" was always >pronounced by Chinese as "Beijing" to each other. The British, however, >introduced the pronunciation "Peking" for some reason. (I may have the >history in one of my books which I'll peruse tonight.) > >(For the knowledgeable, it might be argued that the pronunciation 'Peking' >has Manchurian roots, because the Mings were Manchus. But this is not the >case. For one, by the 20th century, the Beijing Court had completely >forgotton how to speak Manchu (only a few dozen people still speak it >today). For two, Manchu is not a Chinese dialect, but derived by one of the >trans-siberian groups. So it would not share the "Bei" sound indicating >"northern".) > >-TD > > > > >>From: Bill Frantz >>To: cypherpunks at lne.com >>Subject: Re: 'Peking' vs 'Beijing' >>Date: Wed, 9 Apr 2003 10:46:59 -0700 >> >>From the Encyclopaedia Britannica (1974 edition): >> >>"More than 2,000 years ago, a site near present-day Peking was already an >>important military and trading centre for the northeastern frontier of >>China. Not until the Mongol dynasty (AD 1279 to 1368) was a successor >>city >>-- called Ta-tu -- to become the administrative capital of China. During >>the reign of the first emperor of the Ming dynasty (1368 to 1644), Nanking >>became the capital, and the old Mongol capital was renamed Pei-p'ing >>(Peace >>in the North); the third Ming emperor, however, restored it as the >>Imperial >>seat of the dynasty and gave it a new name, Peking (Northern Capital). It >>remained the capital until the 20th century, when, after the successful >>campaign of the Chinese Nationalist troops against warlords in Peking in >>1927, Nanking was selected as the national capital, and Peking once again >>resumed its old name -- Pei-p'ing -- a name still used b the Nationalist >>government in Taiwan." >> >>Cheers - Bill >> >> >>------------------------------------------------------------------------- >>Bill Frantz | Due process for all | Periwinkle -- Consulting >>(408)356-8506 | used to be the | 16345 Englewood Ave. >>frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA > > >_________________________________________________________________ >The new MSN 8: smart spam protection and 2 months FREE* >http://join.msn.com/?page=features/junkmail _________________________________________________________________ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail From timcmay at got.net Wed Apr 9 18:36:26 2003 From: timcmay at got.net (Tim May) Date: Wed, 9 Apr 2003 18:36:26 -0700 Subject: One's first OS is always the best In-Reply-To: <3E9489DA.4020902@cdc.gov> Message-ID: On Wednesday, April 9, 2003, at 02:00 PM, Major Variola (ret) wrote: > At 06:01 PM 4/9/03 +0100, Jim Dixon wrote: > >I don't think that anyone who has learned to read and write one of the > >languages based on Chinese characters would agree that they are > >"atrocious". If your native language is written using a western > alphabet, > >characters are hard to learn. But once learned, they are conveniently > >concise. > > Yes, one's first operating system is always the best. > If there is any insinuation that this implies to _computer_ OSes, I disagree completely. My first OS was some OS I don't remember from an HP 9825 computer. Too trivial to remember. (Actually, I used various BASIC machines prior to this, from 1968-74, but they rarely had OS names that were memorable.) Then RT-11 on a DEC PDP-11/34A. Then RSX-11M on the same machine. Then some exposure in 1978-79 to Unix, courtesy of some of my friends who were active in the Unix community. Then VMS for the VAX. Then PC-DOS for the first IBM PC. Then the LISP-based OS for the Symbolics LISP Machine. This was a wonderful OS. Then the Mac OS, starting with Finder 1.0/Chooser 1.0 in 1984 (and proceeding to every version). Occasional use of Windows 1.0 (horrible) in 1984, Windows 2.0 around 1986 (still unusable), and Windows 3.0/3.1 around 1990 (the first OS to catch up to where the Mac had been years earlier). For the past couple of years I've had Mac OS X on all four of my Macs able to run it efficiently. It has bits and pieces of BSD Unix, a Mach kernel, and of course a wonderful graphics interface. So, no, one's first OS is not always the best. --Tim May "We are at war with Oceania. We have always been at war with Oceania." "We are at war with Eurasia. We have always been at war with Eurasia." "We are at war with Iraq. We have always been at war with Iraq. "We are at war with France. We have always been at war with France." From shaddack at ns.arachne.cz Wed Apr 9 09:41:16 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Wed, 9 Apr 2003 18:41:16 +0200 (CEST) Subject: Swiss ISPs Required to Log and Store Email for Six Months In-Reply-To: <5.1.1.6.2.20030408234906.02cc7f98@idiom.com> Message-ID: > SWISS ISPS MUST LOG AND STORE CONSUMERS' EMAIL DATA > As of April 1, Swiss ISPs will have to keep a log for six > months of all the emails sent by their customers. Experts > criticize the measure, saying it will be both difficult and > costly to implement. > http://www.statewatch.org/news/2003/apr/01switz.htm If I understood it correctly, they want to keep "only" the traffic-analysis data, the SMTP server logs, not the messages themselves (though I'd bet they would love to, if it would be reasonably practical). I am curious if this applies even on provately-operated servers; eg, if you aren't cheap and instead of an account you buy a colocation server, with your own mailserver, when the ISP provides only the connection itself, without additional services. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From eresrch at eskimo.com Wed Apr 9 18:55:25 2003 From: eresrch at eskimo.com (Mike Rosing) Date: Wed, 9 Apr 2003 18:55:25 -0700 (PDT) Subject: "Lone terrorist" bill In-Reply-To: Message-ID: On Thu, 10 Apr 2003, Thomas Shaddack wrote: > In local Police Museum, back during the communism era, there was an > exhibition of the tools of "capitalist saboteurs". One of them was a > device for delayed electrical ignition of haystacks. The timer was a pot > with a lid. There were two contacts mounted on the lid, and a metal plate > in the pot, laid on the layer of dried pea. You added water, the pea > sterted to swell and rise the metal plate. When the plate touched the > contacts, you were far away. That's a pretty nead idea for a detonator. Especially in a haystack :-) > ANYTHING can be used as a "terrorist tool". The world is crammed full with > such toys, all you need is to keep your eyes open. Exactly. So can anyone be painted as a terrorist. > The time of fear and suspicion comes into the neighbourhood. A workshop in > a garage can become a set of terrorism tools, a bookshelf with computer > security books can find itself turned into a "proof of conspiring to > commit an act of cyberterrorism", and gods forbid you ever studied > chemistry and possess any "forbidden knowledge". This is where hacking becomes an interesting terror weapon. > But maybe there is a grain of hope here. If the accesses to informations > are monitored and the suspects are being apprehended according to the > informations they look up, what about the "possible terrorists" posing as > journalists[1]? Journalists have to look up data for their stories, so it > is part of their profile - so let's match or mimic the other parts. > Journalists have the key to the Public Opinion, or at least its part. If > they will start matching profiles, and being monitored and considered > dangerous, they will get pissed. If enough of them get pissed, their > articles and/or news coverages could reflect it, with trickle-down effect > on the Sheeple. This of course presumes we manage to guess the > apprehension algorithms of TIA. Something like profile jamming. Could it > work? Or is the idea taken out of the oven too soon and is still raw > inside and inedible? It's a good recipie. A hacker can make someone look like a terrorist. Good targets would be children of aparatchitks. They would have access to lots of "dangerous things" and they'd be near privledged info (even if they don't know that). After a few 100 15 year olds get busted who are all related to "powers that be", the conspiricy theorists might notice. But until it happens to a few 1000, nobody will take it very seriously. After all, the corruption is so deep right now that when governor's daughters get caught with coke, nobody cares. But being sent away with no hope of ever seeing daylight again might make the recipie a touch more tasty. Patience, persistence, truth, Dr. mike From mv at cdc.gov Wed Apr 9 19:13:26 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 09 Apr 2003 19:13:26 -0700 Subject: one's first [ OS | language ] is always the best Message-ID: <3E94D346.3090902@cdc.gov> At 06:36 PM 4/9/03 -0700, Tim May wrote: >On Wednesday, April 9, 2003, at 02:00 PM, Major Variola (ret) wrote: > >> At 06:01 PM 4/9/03 +0100, Jim Dixon wrote: If your native language is written using a western >> alphabet, >> >characters are hard to learn. But once learned, they are conveniently >> >concise. >> >> Yes, one's first operating system is always the best. >> > >If there is any insinuation that this implies to _computer_ OSes, I >disagree completely. I was making a tacit reference to the oft-claimed resolution to the OS, proglanguage, etc. religious wars. Ie, a lot of folks' biasses are due to their personal history. That you have not succumbed may have to do with the horribleness of OSes in your past, or mere rationality. ... When I hear someone say there are limits to freedom of speech, I want to pick up a gun. -Anon, Cpunks 29.3.03 From bill.stewart at pobox.com Wed Apr 9 19:23:19 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 09 Apr 2003 19:23:19 -0700 Subject: Song Air - Delta Launches 'Low Cost' Privacy Invading Carrier Message-ID: <5.1.1.6.2.20030409191931.02ce90a0@idiom.com> So is their corporate mascot a Stool Pigeon? Usual Suspect Bill Scannell wrote: -------------------------------------- Delta Air Lines is launching a new 'low cost' carrier called 'Song'. Song (http://www.flysong.com) will use the same reservation system as Delta, earning it the disdain of all Americans who believe in the US Constitution. Song (and Delta) is collaborating in a test of the CAPPS II system, an invasive and un-American program that forces citizens to undergo a background investigation that includes personal banking information and a credit check simply to travel in his or her own country. http://www.donotflysong.com has been launched to punish Song for its participation. The site is affiliated with http://www.boycottdelta.org . The CAPPS II system goes far beyond what any thinking citizen of this country should consider reasonable. Boycott Delta. Boycott Song. The democracy you save may be your own. Boycott Delta Press/Analyst Contact: Bill Scannell (tel: 1-650-787-8708) From shaddack at ns.arachne.cz Wed Apr 9 10:37:00 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Wed, 9 Apr 2003 19:37:00 +0200 (CEST) Subject: Swiss ISPs Required to Log and Store Email for Six Months In-Reply-To: Message-ID: > I see a market oppertunity for SMTP servers outside Switzerland which use > SSL/TLS for communication, and perhaps listen on non-standard ports. SMTP servers, if they have to receive mails, HAVE to listen on port 25. There is no way in the standard how to tell that SMTP on whateverserver.com listens in port 1234 instead. However, if it is only a server for sending mails, it CAN listen on any other port (which then has to be specified in the mail client configuration). You can also have your own internal mail forwarding network on nondefault ports; eg, qmail allows manual specifying of server and port to any domain it has to forward mail to (in default configuration, /var/qmail/conf/smtproutes). For SSL-wrapping of the connections to SMTP/POP/IMAP servers (or even to offshore HTTP proxies), stunnel is the tool of choice; many mail clients have SSL support, but they typically lack certificate management. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From timcmay at got.net Wed Apr 9 20:16:05 2003 From: timcmay at got.net (Tim May) Date: Wed, 9 Apr 2003 20:16:05 -0700 Subject: "Lone terrorist" bill In-Reply-To: Message-ID: On Wednesday, April 9, 2003, at 05:06 PM, Thomas Shaddack wrote: > On Wed, 9 Apr 2003, Major Variola (ret) wrote: >> Metal cans make excellent timers, too. > > In local Police Museum, back during the communism era, there was an > exhibition of the tools of "capitalist saboteurs". One of them was a > device for delayed electrical ignition of haystacks. The timer was a > pot > with a lid. There were two contacts mounted on the lid, and a metal > plate > in the pot, laid on the layer of dried pea. You added water, the pea > sterted to swell and rise the metal plate. When the plate touched the > contacts, you were far away. > > ANYTHING can be used as a "terrorist tool". The world is crammed full > with > such toys, all you need is to keep your eyes open. Yes, but our side was using these freedom-fighting tools because we were freedom-fighters, not terrorists. When our side blew up the civilian Air Cubana airplane it was an act of freedom fighting, not terrorism. When our side mined the harbor of Managua, Nicaragua it was an act of freedeom fighting, not terrorism. (The Nicaraguan citizens had held a democratic election and had elected Daniel Ortega, a socialist, not the right-wing drug industrialist we had favored. So we mined their harbor.) When our side infiltrated Czechlos--whatever--vakia to burn hay lofts with the time delay system you describe, or to poison water supplies, or to sabotage factories, it was an act of freedom fighting to prove that the Czech system could not work. Sort of the CIA's version of "Unbearable Lightness of Being." Remember, when we assassinate and mine and blow up airliners, it's all part of the freedom fighting techniques taught at the College of the Americas CIA campus. (As a libertarian, and as one who read "1984" when I was 14 and "Atlas Shrugged" when I was 16, I am no friend of either socialism or communism, so don't misunderstand my comments above to mean that I support either Castro or the former USSR satellites, etc. But, befitting my exposure to "1984," I despise doublespeak and doublethink even more than I dislike Castro, for example. I favor freely trading with Cuba as the best way to implement "regime change" there. I believe locals need to change their regimes. If they won't, then they deserve what they get. There is great "moral hazard" involved in bailing out people or nations for their unwillingness to study, to learn, to defend themselves, etc. Apply this point to either American negroes and their degenerate status or to 1930s Eastern European Jews who were more intent on rocking and swaying and reading Torah scriptures than they were in preparing.) --Tim May From Pete.Chown at skygate.co.uk Wed Apr 9 13:15:39 2003 From: Pete.Chown at skygate.co.uk (Pete Chown) Date: Wed, 09 Apr 2003 21:15:39 +0100 Subject: Swiss ISPs Required to Log and Store Email for Six Months In-Reply-To: References: Message-ID: <3E947F6B.8000306@skygate.co.uk> Thomas Shaddack wrote: > SMTP servers, if they have to receive mails, HAVE to listen on port 25. > There is no way in the standard how to tell that SMTP on > whateverserver.com listens in port 1234 instead. Incidentally, this is not true for SRV records. In some ways, SRV is like MX, but it does a lot more. One of the new features is that you can specify a port. Unfortunately SRV is not widely used as yet. This may have positive implications for privacy, and negative implications for firewalls that do egress filtering. -- Pete From jburnes at vonu.net Wed Apr 9 19:25:29 2003 From: jburnes at vonu.net (jburnes) Date: Wed, 9 Apr 2003 21:25:29 -0500 Subject: One's first OS is always the best In-Reply-To: Message-ID: On Wednesday, April 9, 2003, at 08:36 PM, Tim May wrote: > > For the past couple of years I've had Mac OS X on all four of my Macs > able to run it efficiently. It has bits and pieces of BSD Unix, a Mach > kernel, and of course a wonderful graphics interface. > > So, no, one's first OS is not always the best. > > Agreed. My first was an HP 2000E BASIC timesharing system. If it had a recognizable OS, I don't remember the name. My second was a PDP 11/03. Useable. My third was a TRS-80 and TRSDOS. Please don't force me to remember it. Then an Atari 800. Marginal. (But very nice graphics for the day. Thank you Jay Miner) Then the venerable Amiga 1000. AmigaDOS had multitasking, and some other innovative GUI features. The whole machine worked like a charm, but lacked memory protection. Graphics were way ahead of its time. Thanks again Jay Miner and crew. Then various incarnations of DOS/Winbloze. A real low point. And then Mac OS X. Like a breath of fresh air. BSD on top of Mach. Fantastic graphics and a mind blowing GUI. Just yesterday I saw a demo of the standard OpenGL silver teapots spinning around over a Mac OS X desktop while a DVD was playing. As the OpenGL teapots spun past the DVD, the DVD content was playing and reflecting in the silver surface of the teapots. In real time. My jaw dropped. And then my jaw dropped. That this was even possible is a testament to an incredible graphics architecture. ObCrypto: And of course the really great gpg plugins for the standard mac os x mail client ;-) jim burnes From hseaver at cybershamanix.com Wed Apr 9 19:29:47 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Wed, 9 Apr 2003 21:29:47 -0500 Subject: 'Peking' vs 'Beijing' In-Reply-To: <20030409180333.M6075-100000@localhost> References: <20030409140648.GA24499@cybershamanix.com> <20030409180333.M6075-100000@localhost> Message-ID: <20030410022947.GA25749@cybershamanix.com> On Wed, Apr 09, 2003 at 06:17:34PM +0100, Jim Dixon wrote: > On Wed, 9 Apr 2003, Harmon Seaver wrote: > > > The Japanese actually have three written languages -- hiragana, katakana and > > kanji -- and everybody pretty much uses them all, often at the same time. > > These aren't languages. The first two are alphabets - or rather > syllabaries. They go "ka ki ku ke ko ...", that is, there is a character Ah yes, you're right, I mispoke. Alphabets, scripts, whatever, it is pretty amazing. US kids have enough trouble learning to read in one alphabet. -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From mv at cdc.gov Wed Apr 9 21:38:21 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 09 Apr 2003 21:38:21 -0700 Subject: "Lone terrorist" bill Message-ID: <3E94F53D.6030307@cdc.gov> At 10:48 PM 4/9/03 -0500, Harmon Seaver wrote: >> "Olsen would face life in prison if convicted of the federal charge of >> possession of a biological agent or toxin for use as a weapon. " > > Holy shit -- a cigarette falls under that classification. There's enough >nicotine in one to kill anyone if simply extracted. Good observation. And unlike ricin, there are good reasons for making a tobacco extract --garden use. (A few pro gardeners a year die from commercial nicotine-based pesticides, I've read. A drop'll do ya.) Keep your nic setup with your gardening stuff, just like you keep your pipes and endcaps with your plumbing supplies, your chlorine generators with your pool supplies, your AN with your other fertilizers, you get the picture. However ricin takes a day or so, whereas nic is fairly immediate. Rather interesting that both Olsen's wife and jilted mistress both deny any plans. Though Agilent spying on his work-browsing and turning him in to Feds is perhaps more interesting. Lots of bored prosecutors needing slow deepfrying, like that Eastern Missouri inbreed Raymond W. Gruender (who charged Paypal with terrorism), trying to build his career perhaps because his sister won't fuck him any more. http://www.pcworld.com/news/article/0,aid,110103,00.asp From shaddack at ns.arachne.cz Wed Apr 9 12:48:26 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Wed, 9 Apr 2003 21:48:26 +0200 (CEST) Subject: Swiss ISPs Required to Log and Store Email for Six Months In-Reply-To: <20030409165723.GC25060@cybershamanix.com> Message-ID: > Or people like me who just runs their own email server on a dsl or cable > line. Doing the same, see lower. > Maybe that's why some of the ISP's are trying to force everyone to use > their SMTP servers. Ameritech seems to be moving in that direction, or > at least I can no longer email anyone with an ameritech address, as > the ameritech servers reject it with a "use your local smtp server" > message. Or they have your IP listed in a block of "Cable/DSL" and reject mail from there as suspected spam. (Not everything is done for surveillance, even if it is the side effect.) I had a brief correspondence on this topic with RoadRunner, who was refusing my mail for this reason. The workaround was adding a rule to the smtproutes file, routing the mails for *.rr.com through another server in my care, which is on different IP block. From adam at homeport.org Wed Apr 9 18:57:23 2003 From: adam at homeport.org (Adam Shostack) Date: Wed, 9 Apr 2003 21:57:23 -0400 Subject: Trusted Computing Group trying to be TCPA follow-on [eetimes] In-Reply-To: <5.1.1.6.2.20030409113725.02c5ae80@idiom.com> References: <5.1.1.6.2.20030409113725.02c5ae80@idiom.com> Message-ID: <20030410015723.GA94766@lightship.internal.homeport.org> On Wed, Apr 09, 2003 at 11:38:36AM -0700, Bill Stewart wrote: | The group essentially reboots the efforts of the now-disbanded PC-centric | Trusted Computing Platform Alliance (TCPA), this time including | participation from Nokia and consumer electronics companies such as Sony | and Philips. You'd think that, in light of the economy and all, the folks involved in such long, failed efforts would be let go. I wonder who's got who by the short and curlies? I'm sure JYA would be happy to get brown paper envelopes stuffed with truth. Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From timcmay at got.net Wed Apr 9 22:12:02 2003 From: timcmay at got.net (Tim May) Date: Wed, 9 Apr 2003 22:12:02 -0700 Subject: Model legislation proposed for Iraq Message-ID: BAGHDAD (Routers) -- A team of Coalition legislators, lawyers, prosecutors, and judges has been air-dropped into Firbol Square to take charge of Saddam's statue's head and to prepare Iraqi democracy for the post-liberation era. Copies of the suggested model legislation were distributed to reporters outside the Tel Aviv Hotel (formerly the Palestine Hotel). Copies were made on French copiers looted from the Ministry of Information. Some of the items in the model legislation include: * passage of the "Iraqi PATRIOT Act." This Act would ban speech deemed harmful to the nation, would allow jailing of material witnesses and other illegal combatants without charges, would declare Islam to be a terror-related cult, and would basically be much more efficient that the primitive tools used by Saddam. * establishment of a dual-party system and the lobbyists and graft collectors necessary to make such a system work. The names of the parties have not been finalized, but at least one of them will likely be called "The Republican Guard." * a change in the name of the Ministry of Information to "Department of Homeland Security." It is suggested that the current Minister of Information, aka Baghdad Bob, be named Secretary of Homeland Security. * restrictions on terrorist use of cryptography (in other words, use of cryptography by non-governmental bodies). * a national ID system based on the system in use in Coalition countries * an extensive system of surveillance cameras similar to the one deployed in the United Kingdom, a Coalition principal * a recommendation that Al-Jazeera and Al-Arabia reporters face charges of sedition for illegally reporting events not intended to be reported * strong new restrictions on pornography, smut, and hate speech * a nationwide smoking ban [rest of model legislation at www.coalition.gov/ourplan] From shields at msrl.com Wed Apr 9 15:14:27 2003 From: shields at msrl.com (Michael Shields) Date: Wed, 09 Apr 2003 22:14:27 +0000 Subject: "Lone terrorist" bill In-Reply-To: <94E17E06-6AC7-11D7-9925-000A956B4C74@got.net> (Tim May's message of "Wed, 9 Apr 2003 13:12:25 -0700") References: <94E17E06-6AC7-11D7-9925-000A956B4C74@got.net> Message-ID: <8765pnl3ng.fsf@mulligatwani.msrl.com> In article <94E17E06-6AC7-11D7-9925-000A956B4C74 at got.net>, Tim May wrote: > There are several pending examples of this, discussed here. One guy up > in the Northwest is facing terrorism charges for possibly thinking > about possibly making ricin, possibly to poison his wife. No, I'm not > talking about Jim Bell. Here's a URL: > > This article does not say that he was charged with "possibly thinking about possibly making ricin". It says he was charged with actually producing hundreds of lethal doses of it. -- Shields. From hseaver at cybershamanix.com Wed Apr 9 20:35:40 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Wed, 9 Apr 2003 22:35:40 -0500 Subject: The secret government marches on... In-Reply-To: <5.1.1.6.2.20030409112457.02cc84a8@idiom.com> References: <5.1.1.6.2.20030409112457.02cc84a8@idiom.com> Message-ID: <20030410033540.GB25749@cybershamanix.com> On Wed, Apr 09, 2003 at 11:26:17AM -0700, Bill Stewart wrote: > At 10:46 AM 04/09/2003 -0400, Tyler Durden wrote: > >It's only when an operation has to hide lots of money from even some of > >the big agencies (or parts thereof) that they have to resort to moving > >drugs and whatnot to fund "Iran Contra" and other extracurriculars. George > >W almost certainly piloted one of the planes used to move cocaine into the > >US to fund some of those operations. > > He may have snorted one plane-load of that coke, but this is the first time > I've heard an assertion that he flew the planes as opposed to just getting > high... Don't have the URL's handy, but I've read at least a couple of webpages giving dates, plane used, airports, etc. He and his brother both were supposedly involved, flying arms to the contras and coke back, and, so the story goes, got more or less busted coming back when the wrong person was on duty or some such, but Daddy took care of it. -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From hseaver at cybershamanix.com Wed Apr 9 20:48:08 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Wed, 9 Apr 2003 22:48:08 -0500 Subject: "Lone terrorist" bill In-Reply-To: <94E17E06-6AC7-11D7-9925-000A956B4C74@got.net> References: <20030409120510.A16377@slack.lne.com> <94E17E06-6AC7-11D7-9925-000A956B4C74@got.net> Message-ID: <20030410034808.GC25749@cybershamanix.com> On Wed, Apr 09, 2003 at 01:12:25PM -0700, Tim May wrote: > On Wednesday, April 9, 2003, at 12:05 PM, Eric Murray wrote: > > >WTF is a "lone terrorist"? > > > >http://www.newsday.com/news/nationworld/nation/ny- > >ussena093214085apr09,0,3864424.story?coll=ny-nationalnews-headlines > > > >"A bill to expand the ability of the government to conduct wiretaps > >and other surveillance on suspected lone terrorists has attracted > >controversial amendments that have stalled its advance to the full > >Senate. > >... > >Reading down it looks like a "lone terrorist" is someone > >that the government can't even prove is a "terrorist" > >to the secret FISA rubberstamp court. So this is presumeably > >an attempt to bypass FISA entirely. > > They claim to no longer need to prove that a person was planning a > terrorist act. They claim that merely having terrorist tools is enough. > > There are several pending examples of this, discussed here. One guy up > in the Northwest is facing terrorism charges for possibly thinking > about possibly making ricin, possibly to poison his wife. No, I'm not > talking about Jim Bell. Here's a URL: > > > > "Olsen would face life in prison if convicted of the federal charge of > possession of a biological agent or toxin for use as a weapon. " Holy shit -- a cigarette falls under that classification. There's enough nicotine in one to kill anyone if simply extracted. -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From bill.stewart at pobox.com Wed Apr 9 23:09:49 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 09 Apr 2003 23:09:49 -0700 Subject: "Lone terrorist" bill In-Reply-To: References: Message-ID: <5.1.1.6.2.20030409230307.02bddb60@idiom.com> At 08:16 PM 04/09/2003 -0700, Tim May wrote: >I favor freely trading with Cuba as the best way to implement >"regime change" there. I believe locals need to change their regimes. The trade embargo and immigration and travel limitations have been an amazingly well-organized method of keeping Castro in power for 40 years. Soviet control of East Germany fell partly because people didn't want it any more, and partly because everybody figured out they could just go on vacation and not come back until the regime was gone. The Coast Guard use of military force to stop refugees is a crime against humanity. If we wanted to get the Cubans to choose capitalism, allowing trade, US tourism, and import of cheap televisions would take down the Castro regime rapidly. "Lone Terrorist" Bill From shaddack at ns.arachne.cz Wed Apr 9 17:06:13 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Thu, 10 Apr 2003 02:06:13 +0200 (CEST) Subject: "Lone terrorist" bill In-Reply-To: <3E948FEB.9040607@cdc.gov> Message-ID: On Wed, 9 Apr 2003, Major Variola (ret) wrote: > Metal cans make excellent timers, too. In local Police Museum, back during the communism era, there was an exhibition of the tools of "capitalist saboteurs". One of them was a device for delayed electrical ignition of haystacks. The timer was a pot with a lid. There were two contacts mounted on the lid, and a metal plate in the pot, laid on the layer of dried pea. You added water, the pea sterted to swell and rise the metal plate. When the plate touched the contacts, you were far away. ANYTHING can be used as a "terrorist tool". The world is crammed full with such toys, all you need is to keep your eyes open. The time of fear and suspicion comes into the neighbourhood. A workshop in a garage can become a set of terrorism tools, a bookshelf with computer security books can find itself turned into a "proof of conspiring to commit an act of cyberterrorism", and gods forbid you ever studied chemistry and possess any "forbidden knowledge". And even if you get a "fair process", a good prosecutor can paint you as an "armed and dangerous for the entire world", as the jurors are usually everything but tech-savvy... :( But maybe there is a grain of hope here. If the accesses to informations are monitored and the suspects are being apprehended according to the informations they look up, what about the "possible terrorists" posing as journalists[1]? Journalists have to look up data for their stories, so it is part of their profile - so let's match or mimic the other parts. Journalists have the key to the Public Opinion, or at least its part. If they will start matching profiles, and being monitored and considered dangerous, they will get pissed. If enough of them get pissed, their articles and/or news coverages could reflect it, with trickle-down effect on the Sheeple. This of course presumes we manage to guess the apprehension algorithms of TIA. Something like profile jamming. Could it work? Or is the idea taken out of the oven too soon and is still raw inside and inedible? [1] Journalists can be even unregistered ones, amateurs, bloggers, anyone with significantly wide public reach. Of course, if the registered ones, the ones pertaining to the Big Media, will start getting into hot water, it could have much better impact. From bill.stewart at pobox.com Thu Apr 10 03:29:12 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 10 Apr 2003 03:29:12 -0700 Subject: ANNOUNCE: SF Cypherpunks Meeting, Saturday 4/12, Moscone Center SF, 1-5pm Message-ID: <5.1.1.6.2.20030410031209.02ce3240@idiom.com> The San Francisco Bay Area Cypherpunks will be meeting Saturday, April 12, 2003, from 1-5pm. The meeting will be in Moscone Center North, Room 112. The RSA show starts Sunday, so people from all over will be around. Agenda: Our agenda, as ever, is a tightly held secret :-) This is an open public meeting on US soil. Logistics - You'll need to go to registration to get day passes, because it's a show floor setup day. I'll try to make sure there are signs, and that the processes work. Kellie Beakey is the person at registration who coordinates them. They might want people to sign in (so think of creative aliases!) but I will try to make this not happen. Directions: Moscone Center is at 3rd-4th St. and Howard. Moscone Center North is the side closer to Market St., adjacent to the Sony Metreon (which has coffee and food court.) - BART stops at Powell, which is near 4th and Market, about 3 blocks away. - Muni busses run down 4th St. from Market - Caltrain is still doing weekend construction, but they claim to run busses. The Caltrain depot is 4th and Townsend, and Muni busses go back up 3rd. Bill Stewart - bill.stewart at pobox.com - cell phone +1-415-307-7119 From rofwellcontroltnk at wellcontrol.com Wed Apr 9 18:32:26 2003 From: rofwellcontroltnk at wellcontrol.com (Robbie Zimmerman) Date: Thu, 10 Apr 2003 03:52:26 +0180 Subject: Getting thinner can be enjoyable Message-ID: <455844001.84208698812167@thebat.net> How many times did you get unhappy after looking in the mirror? 0be/sity does not only affect the way you look and feel about yourself. It is also dangerous for your health, bringing plenty of health problems in a variety of spheres. And of course feeling shy to take off your clothes on a beach or in bed with your special one is so saddening. You don't have to spend the rest of your life exercising yourself to death. You also don't have to experiment with suspicious po^und-fighting products. The only option you need is An-atrim! Its completely naturaI blend of ingredients attacks o*besity like nothing else and suppresses your appetite, putting your mind in control of your e_ating. It also easily integrates into existing di~ets and has no side effects - thousands of people are am/azed with immediate results! Getting rid of extra po/unds now is safe and enjoyable. Ana_trim boosts not only your confidence but helps your body produce tons of natural energy! Check out the testimonials of happy customers, at our site: http://www.neclor.com/ Re/move your e+mail: http://www.neclor.com/u.php From sfurlong at acmenet.net Thu Apr 10 01:14:26 2003 From: sfurlong at acmenet.net (Steve Furlong) Date: Thu, 10 Apr 2003 04:14:26 -0400 Subject: The secret government marches on... In-Reply-To: <20030410033540.GB25749@cybershamanix.com> References: <5.1.1.6.2.20030409112457.02cc84a8@idiom.com> <20030410033540.GB25749@cybershamanix.com> Message-ID: <200304100414.26508.sfurlong@acmenet.net> On Wednesday 09 April 2003 23:35, Harmon Seaver wrote: Regarding GW Bush flying a planeload of coke: > Don't have the URL's handy, but I've read at least a couple of > webpages giving dates, plane used, airports, etc. (rest of the coke-inspired yet still insipid fantasy deleted) Let me guess, the URLs were for DemocraticUnderground, al Jazeera, and Indymedia? I'm probably going to regret replying to Seaver ("Even if you win the Special Olympics...") but this was just too pathetic to pass up. -- Steve Furlong Computer Condottiere Have GNU, Will Travel Guns will get you through times of no duct tape better than duct tape will get you through times of no guns. -- Ron Kuby From jtrjtrjtr2001 at yahoo.com Thu Apr 10 06:18:42 2003 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Thu, 10 Apr 2003 06:18:42 -0700 (PDT) Subject: Time for the UN to cease. Message-ID: <20030410131842.5865.qmail@web21207.mail.yahoo.com> hi, What do we need the UN for any way.I think its a waste of lot of money. If you want to help kids you can help as a local organisation.WHy security council-If you want peace you can send your own peace keeping troops.How many ethnic cleansings have the UN been able to stop?If you want to give others food-send them food,why do you need the UN? Why do we need the ICJ-all trials are not fair and unbaised?Why do we need UN to be a mouthpiece of US and UK for spreading propoganda? When the UN cease to exists others countries will have the power to prevent aggressions as it no longer needs to follow the commitment a perfectly useless organisation called UN. US stepped in when kuwait was invaded by iraq,what happened to the Un when US invaded iraq? The UN is not working-if it did,I wouldn't be saying this.Who is going to respect the judgements of UN from now any way? So why don't all our nations spend the money on more useful things like educating its children,provide help and shelter. Sarath. Yahoo! Tax Center - File online, calculators, forms, and more http://tax.yahoo.com From eresrch at eskimo.com Thu Apr 10 07:27:55 2003 From: eresrch at eskimo.com (Mike Rosing) Date: Thu, 10 Apr 2003 07:27:55 -0700 (PDT) Subject: The secret government marches on... In-Reply-To: Message-ID: http://www.drugwar.com/cv7.shtm was the first of 12,000 hits I got from google. Seems it's widely known. Not even news anymore. Patience, persistence, truth, Dr. mike On Thu, 10 Apr 2003, Tyler Durden wrote: > There are many facts linking George W to moving drugs. First, the airplane > he would occasionally fly while Governer of Texas was the same plane used to > move the drugs during Iran-Contra. Second, there's that strage rumor that > George W. actually took a bust in Florida after having landed a planeload of > coke there. (Apparently him getting busted was a result of one of those > inter-agency snafus...he was released quickly but there's apparently some > video somewhere.) > > This may seem unlikely, but when one remembers that 1) George W is a > licensed pilot, 2) His daddy is George Sr, ex-CIA chief and mastermind of > Iran-Contra... > > Search around on www.spitfirelist.com and you can find the references. From hseaver at cybershamanix.com Thu Apr 10 06:53:44 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Thu, 10 Apr 2003 08:53:44 -0500 Subject: The secret government marches on... In-Reply-To: <200304100414.26508.sfurlong@acmenet.net> References: <5.1.1.6.2.20030409112457.02cc84a8@idiom.com> <20030410033540.GB25749@cybershamanix.com> <200304100414.26508.sfurlong@acmenet.net> Message-ID: <20030410135344.GA26588@cybershamanix.com> On Thu, Apr 10, 2003 at 04:14:26AM -0400, Steve Furlong wrote: > On Wednesday 09 April 2003 23:35, Harmon Seaver wrote: > > Regarding GW Bush flying a planeload of coke: > > > Don't have the URL's handy, but I've read at least a couple of > > webpages giving dates, plane used, airports, etc. > (rest of the coke-inspired yet still insipid fantasy deleted) > > Let me guess, the URLs were for DemocraticUnderground, al Jazeera, and > Indymedia? > Actually not. At least one was a site that seemed to be run by Birchers, or at least all the rest of the stuff looked like JBS. -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From jamesd at echeque.com Thu Apr 10 09:18:36 2003 From: jamesd at echeque.com (James A. Donald) Date: Thu, 10 Apr 2003 09:18:36 -0700 Subject: The secret government marches on... In-Reply-To: <200304100414.26508.sfurlong@acmenet.net> References: <20030410033540.GB25749@cybershamanix.com> Message-ID: <3E9536EC.24091.81C187@localhost> -- > Regarding GW Bush flying a planeload of coke: On Wednesday 09 April 2003 23:35, Harmon Seaver wrote > > Don't have the URL's handy, but I've read at least a > > couple of > > webpages giving dates, plane used, airports, etc.' On 10 Apr 2003 at 4:14, Steve Furlong wrote: > (rest of the coke-inspired yet still insipid fantasy deleted) > > Let me guess, the URLs were for DemocraticUnderground, al > Jazeera, and Indymedia? During the past couple of days I have been arguing with someone on usenet who cites as evidence for the extravagant untruthfullness of the mainstream press, Robert Fisk's report that the coalition troops were nowhere near Saddam Hussein airport. (As it was then called) For his very similar work in Kosovo, Fisk was named "foreign correspondent of the year" (presumably by a committee of lying commies who share his ideology) Looks like Fisk is becoming the new Chomsky. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG EHE+kWinCvAXZ7/5cIzitHd+WRfsmFBelFUWVAfQ 4XfQTfd3p80Tg9ff6IT6oLL6UbUBQCr/BnXKrowfA From shaddack at ns.arachne.cz Thu Apr 10 00:31:30 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Thu, 10 Apr 2003 09:31:30 +0200 (CEST) Subject: "Lone terrorist" bill In-Reply-To: Message-ID: On Wed, 9 Apr 2003, Mike Rosing wrote: > > with a lid. There were two contacts mounted on the lid, and a metal plate > > in the pot, laid on the layer of dried pea. You added water, the pea > > sterted to swell and rise the metal plate. When the plate touched the > > contacts, you were far away. > > That's a pretty nead idea for a detonator. Especially in a haystack :-) Together with mechanical (or, even better, chemical) ignitors you can achieve a timer construction completely without metal parts. Doesn't have to necessarily serve as a detonator. If used to control some mechanical setup, can trigger virtually anything that needs gentle pushing of something. A bit medievalish technology, but can withstand an EMP hit. Which could one day become a nicely sized advantage... From camera_lumina at hotmail.com Thu Apr 10 06:44:10 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 10 Apr 2003 09:44:10 -0400 Subject: The secret government marches on... Message-ID: Bill Stewart wrote... >He may have snorted one plane-load of that coke, but this is the first time >I've heard an assertion that he flew the planes as opposed to just getting >high... There are many facts linking George W to moving drugs. First, the airplane he would occasionally fly while Governer of Texas was the same plane used to move the drugs during Iran-Contra. Second, there's that strage rumor that George W. actually took a bust in Florida after having landed a planeload of coke there. (Apparently him getting busted was a result of one of those inter-agency snafus...he was released quickly but there's apparently some video somewhere.) This may seem unlikely, but when one remembers that 1) George W is a licensed pilot, 2) His daddy is George Sr, ex-CIA chief and mastermind of Iran-Contra... Search around on www.spitfirelist.com and you can find the references. -TD _________________________________________________________________ The new MSN 8: smart spam protection and 2 months FREE* http://join.msn.com/?page=features/junkmail From frantz at pwpconsult.com Thu Apr 10 11:28:17 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Thu, 10 Apr 2003 11:28:17 -0700 Subject: "Guaranteed hack-free" encryption useful for Homeland Security! In-Reply-To: <20030410163614.GA89109@afflictions.org> References: Message-ID: At 9:36 AM -0700 4/10/03, Damian Gerow wrote: >Bill Frantz wrote: >> At 12:22 PM -0700 4/8/03, Declan McCullagh wrote: >> >http://www.prweb.com/releases/2003/4/prweb61830.php >> >> I like particularly: >> >> "Patent Pending Encryption Algorithm Encrypts Data Dynamically. The >> HyperDrive Encryption Method Dynamically changes and as it is not a seed >> based algorithm, it is impossible to decipher." >> >> Now impossible to decypher is a claim I haven't seen before. Let's see, we >> can combine it with compression, and get SHA1, or for even faster execution >> and better compression, MD5. > >This could be coincidence, but did you guys see the release date? > > FOR IMMEDIATE RELEASE > April 1, 2003 01:00 p.m. EST > > NEWS MEDIA CONTACT > Jeff Fries, (919)663-6291 > > Web Site > http://www.fly-pegasus.com > >Not to mention that they're a web design shop... The interesting bit is the prominence it got in the Google news listings. Search on Homeland+security+encryption. Then click the "news" tab. Look for: HyperDrive Encryption Algorithm Could Be Useful for Homeland ... PR Web, WA - Apr 3, 2003 Which takes you to: http://www.prweb.com/releases/2003/4/prweb61830.php Also see: http://news.com.com/2100-1025-996100.html?tag=fd_top Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From frantz at pwpconsult.com Thu Apr 10 11:48:23 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Thu, 10 Apr 2003 11:48:23 -0700 Subject: The secret government marches on... In-Reply-To: <20030410142812.A1645@cluebot.com> References: <3E9536EC.24091.81C187@localhost>; from jamesd@echeque.com on Thu, Apr 10, 2003 at 09:18:36AM -0700 <20030410033540.GB25749@cybershamanix.com> <200304100414.26508.sfurlong@acmenet.net> <3E9536EC.24091.81C187@localhost> Message-ID: At 11:28 AM -0700 4/10/03, Declan McCullagh wrote: >Disagreeing with a reporter's political views does not mean that all >their claims of fact are wrong and maliciously so. Since I still think that I. F. Stone was the best political reporter of the 20th century, I have to agree. Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From jei at cc.hut.fi Thu Apr 10 01:49:06 2003 From: jei at cc.hut.fi (Jei) Date: Thu, 10 Apr 2003 11:49:06 +0300 (EET DST) Subject: Broad spying tools would become permanent Message-ID: http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2003/04/09/MN257910.DTL GOP wants to keep anti-terror powers Broad spying tools would become permanent New York Times Wednesday, April 9, 2003 -------------------------------------------------------------------------------- Washington -- Congressional Republicans, working with the Bush administration, are maneuvering to make permanent the sweeping anti-terrorism powers granted to federal law enforcement agents after the attacks of Sept. 11, 2001, officials said Tuesday. The move is likely to touch off strong objections from many Democrats and even some Republicans in Congress who believe that the Patriot Act, as the legislation that grew out of the attacks is known, has already given the government too much power to spy on Americans. The landmark legislation expanded the government's power to use eavesdropping, surveillance, access to financial and computer records and other tools to track terrorist suspects. When it passed in October 2001, moderates and civil libertarians in Congress agreed to support it only by making many critical provisions temporary. Those provisions will expire, or "sunset," at the end of 2005 unless Congress reauthorizes them. But Republicans in the Senate in recent days have discussed a proposal, authored by Sen. Orrin Hatch, R-Utah, that would repeal the so-called sunset provisions and make the expanded powers permanent, officials said. Republicans may seek to move on the proposal this week by trying to attach it to another anti-terrorism bill that would make it easier for the government to use secret surveillance warrants against "lone wolf" terrorism suspects. Many Democrats have grown increasingly frustrated by what they see as a lack of information from the Justice Department on how its agents are using their newfound powers. The Senate Democratic leader, Tom Daschle of South Dakota, said Tuesday that without extensive review, he "would be very strongly opposed to any repeal" of the 2005 time limit. He predicted that Republicans did not have the votes to repeal the limits. A senior Justice Department official on Tuesday said the Patriot Act has allowed the FBI to move faster and more flexibly to disrupt terrorists before they strike. "We don't want that to expire on us," the official said. With the act's provisions not set to expire for more than 2 1/2 years, officials expected that the debate over its future would be many months away. But political jockeying over separate, bipartisan legislation sponsored by Sens. Jon Kyl, R-Ariz., and Charles Schumer, D-N.Y., appears to have given Hatch the chance to move on the issue much earlier than expected. The Kyl-Schumer measure would eliminate the need for federal agents seeking secret surveillance warrants to show that a suspect is affiliated with a foreign power or agent, such as a terrorist group. Advocates say the measure would make it easier for agents to go after "lone wolf" terrorists who are not connected to a foreign group. The proposal was approved unanimously by the Senate Judiciary Committee. But Republicans were upset because several Democrats said that when the measure reaches the Senate floor for a full vote, perhaps this week or later in the month, they plan to offer amendments that would impose tougher restrictions on the use of secret warrants. From dgerow at afflictions.org Thu Apr 10 09:36:14 2003 From: dgerow at afflictions.org (Damian Gerow) Date: Thu, 10 Apr 2003 12:36:14 -0400 Subject: "Guaranteed hack-free" encryption useful for Homeland Security! In-Reply-To: References: Message-ID: <20030410163614.GA89109@afflictions.org> Bill Frantz wrote: > At 12:22 PM -0700 4/8/03, Declan McCullagh wrote: > >http://www.prweb.com/releases/2003/4/prweb61830.php > > I like particularly: > > "Patent Pending Encryption Algorithm Encrypts Data Dynamically. The > HyperDrive Encryption Method Dynamically changes and as it is not a seed > based algorithm, it is impossible to decipher." > > Now impossible to decypher is a claim I haven't seen before. Let's see, we > can combine it with compression, and get SHA1, or for even faster execution > and better compression, MD5. This could be coincidence, but did you guys see the release date? FOR IMMEDIATE RELEASE April 1, 2003 01:00 p.m. EST NEWS MEDIA CONTACT Jeff Fries, (919)663-6291 Web Site http://www.fly-pegasus.com Not to mention that they're a web design shop... From timcmay at got.net Thu Apr 10 12:42:05 2003 From: timcmay at got.net (Tim May) Date: Thu, 10 Apr 2003 12:42:05 -0700 Subject: "Stay Behind" strategies in Iraq In-Reply-To: <005101c2ff8a$83c216a0$0202a8c0@nyr.cable.rcn.com> Message-ID: <826A6F77-6B8C-11D7-9925-000A956B4C74@got.net> On Thursday, April 10, 2003, at 10:56 AM, Elyn Wollensky wrote: > > Tim nailed it. This just broke on Dow Jones ... > ;~/. > e > > Rumsfeld to order Syria invasion plan > > NEW YORK (Dow Jones)--An intelligence source says U.S. Defense > Secretary > Donald Rumsfeld last week ordered the drawing up of contingency plans > for a possible invasion of Syria, Newsday reported Thursday. According > to > I'll make another prediction/analysis: the widespread looting and chaos now being seen in Baghdad, Basra, and other large cities is completely understandable. Not just because people (peasants, unemployed, Shiia, etc.) see the chance to grab some television sets and microwave ovens. This component is understandable in the way the Rodney King riots were understandable. No, the more interesting reasons are these, the second being the more interesting: 1. Iraq has been a welfare state for essentially its entire lifetime. From the 1920s to the 1960s, a typical backwater royalist welfare state. Since the 1960s, a socialist/central planning/fascist state. (Much like Israel, actually, but that's another discussion.) Much of the population was dependent on stuff distributed by the central government, using oil revenue. Since the U.N. sanctions, this has been called "food for oil." The mechanics are well-known: oil is pumped, money goes to buying food and stuff, government distributes the stuff, with a limited amount of U.N. supervision. This has now stopped, of course. And since much of the population has no independent source of income, no factories producing stuff that the rest of the world wants to buy, the effects are obvious. (Germany and Japan were in different situations: each had substantial armaments, vehicle, steel, etc. facilities. After being repaired, and perhaps after shifting for a while to making motorcycles and lawnmowers and such, these industries re-emerged and aided in the rebuilding. We all know their names: BMW, VW, Mitsubishi, Toyota, etc. Iraq has far fewer such industries, per capita. Offhand, even with their 30 million population, I cannot think of a single "Made in Iraq" item, from even before the 1990 events.) They will be a handout state for the next 20 years, perhaps longer. There is little chance that investors will pay to rebuild their infrastructure, given the lack of ability of the peasants to pay. And here's the more interesting, from our perspective, reason: 2. "Stay Behind" strategy. First some background. A key component of U.S. and NATO plans to deal with a Soviet invasion of Western Europe was to absorb an initial military defeat, if such was inevitable, and then to have commandoes and sappers "melt into the population." Mao had used such a strategy many times in the 1940s and NATO planners were well aware of the effectiveness. The Vietnam experience added more support. The French Resistance was notably less successful, but also had not been prepared in advance. (Still, were I a professional military analyst writing detailed reports on such resistance movements, this would be part of my "compare and contrast" set of cases. It's possible the Iraqi/Baathist resistance will be no more effective than the French Resistance was.) There were various names for the "Stay Behind" plans, several of which emerged during the cases in Italy of right wing bombings and political scandals. (P2, Gladio, etc.) One URL is: The Stay Behind strategy involved the obvious things: pre-positioning of armaments (RPGs, bazookas, C4, rifles, terrorist supplies) at hidden locations, false identity papers prepared by the best forgers (indeed, by governments themselves!), and training for just such "stay behind" exigencies. The plan would be to let the Soviet invaders take control...then make it essentially impossible for them to keep control. Sabotage, both major (power plants, factories) and minor (snipping power lines when possible, sabotaging water pumps, all things a single person can do easily). Propaganda. Assassinations. Snipings. Etc. (A friend of mine was actively involved in doing this in an Eastern European nation occupied by the Soviets. In modern parlance, he was a terrorist. But the Soviets eventually gave up and left.) OK, what's the relevance to Iraq? Saddam and his associates surely knew well of these strategies. If viewed over the long term, the cheering today as his statues are toppled is relatively minor if the U.S. is ultimately forced to withdraw (for whatever reason) and the heirs to Saddam get back in power. Knowing a military defeat in open combat was inevitable (I said as much many weeks ago, that the military outcome was inevitable, though one could hope for an unfolding train wreck to dull American citizen-unit enthusiasm), and knowing that even the "fedayeen" commandoes would likely eventually fail, the "stay behind" strategy was probably a topic of much debate, and funding. * Pre-positioned supplies. Not hard in a desert, where thousands of bunkers were built, where thousands of desert sites covered with sand and only knowable through GPS coordinates--the new treasure maps--are trivial to set up) * Extensive foreign bank accounts, now available to hire suicide bombers (money going to their families, of course). They'll be vastly better-funded than the Palestinians are. * Snipings, bombings, sabotage. * Most importantly, as the infrastructure continues to be in sad shape and as 30 million continue to live essentially as beggars, resentment of the occupation force can only grow. Yeah, a lot of Iraqis are waving U.S. flags and photos of Rambo (seriously) and saying "We love Bush," this is the enthusiasm of the moment. Wait until a few years have passed and they still haven't climbed out of the poverty of Liberty City (the slum formerly known as Saddam City). (Because a slum of a few million people has essentially nowhere in the world ever climbed out of poverty, even in well-developed countries with strong free market systems. At least not in the past several decades. Reasons left as an exercise.) Meanwhile, there will be groups with access to the offshore accounts, to the buried supplies, who will have a very strong incentive to into power. Getting into power means control of the billions of barrels of oil. Neighboring countries will find that it's to their advantage to keep the U.S. bogged-down in Iraq. The last thing Iran, Turkey, Syria, or even Saudi Arabia wants is a Westernized state in their midst, a base to launch other "liberations" from. So though they'll pay lip service to the idea of being happy Saddam is gone, they'll be sure to keep a trickle or even a river of terrorists and supplies heading into Iraq. And so there are many reasons for a "stay behind" strategy and almost no reasons against it. The perfection of their papers, and the necessity of the U.S. to deal with former Iraqi bureaucrats, means that many of the Iraqis the U.S. works with can very easily also be part of the underground, the resistance. Expect lots of double and even triple agents. A lot of Iraqis may seek to cover their bets by working both sides, just so they can later produce documents (encrypted, one assumes) proving their longstanding alliance to whichever side is dominant ten years from now. So, as many analysts have said, the military victory of our Abrams tanks over their obsolete tanks was the easy part. A harder part will be the police force action of the next several months, and dealing with the American public's frustration with mounting costs, longer deployments of troops, and periodic bombings and snipings. And then the really hard part takes over. A year from now, two years from now, and Baghdad resembles Beirut or Nablus, and 100,000 troops are still patrolling the streets. And there is no boom in building semiconductor and television factories, as the optimists are expecting. And most of the nation is getting handouts from their new government, the U.S. puppet. Yep, grounds for optimism. The poverty of the West Bank, except a factor of ten larger. --Tim May From ericm at lne.com Thu Apr 10 13:08:56 2003 From: ericm at lne.com (Eric Murray) Date: Thu, 10 Apr 2003 13:08:56 -0700 Subject: Revenge of the Wave-oids (was Re: Trusted Computing Group trying to be TCPA follow-on [eetimes] In-Reply-To: ; from rah@shipwright.com on Thu, Apr 10, 2003 at 03:24:05PM -0400 References: <5.1.1.6.2.20030409113725.02c5ae80@idiom.com> <20030410015723.GA94766@lightship.internal.homeport.org> Message-ID: <20030410130856.A30080@slack.lne.com> On Thu, Apr 10, 2003 at 03:24:05PM -0400, R. A. Hettinga wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > At 9:57 PM -0400 4/9/03, Adam Shostack wrote: > >You'd think that, in light of the economy and all, the folks > >involved in such long, failed efforts would be let go. > > Indeed. > > These Wave-oids have been at this book-entry-to-the-screen-buffer > world-domination nonsense since before Adam, or at least I :-), was a > cypherpunk: . They've > been delisted and re-listed so many times it's a wonder that their > shorts don't have carpal tunnel in their sell-button fingers... Wave'a a bit player in TCPA, just hoping to get a few crumbs from the big boys. It's Microsoft and Intel and Compaq/HP who're dictating the action. Eric --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From elyn at consect.com Thu Apr 10 10:56:28 2003 From: elyn at consect.com (Elyn Wollensky) Date: Thu, 10 Apr 2003 13:56:28 -0400 Subject: Patriot Act to become permanant? Message-ID: <005101c2ff8a$83c216a0$0202a8c0@nyr.cable.rcn.com> > Bush faces a tough decision: roll east, or roll west. > > Since Syria is more decrepit in its armaments, as Iraq was, it will be > the likely target. But first we need to prepare by floating rumors that > Saddam's missing "WMD" (not found by the U.N., not found by the > swarming soldiers) must have been spirited out to Axis of Evil Founding > Member Syria. > --Tim May Tim nailed it. This just broke on Dow Jones ... ;~/. e Rumsfeld to order Syria invasion plan NEW YORK (Dow Jones)--An intelligence source says U.S. Defense Secretary Donald Rumsfeld last week ordered the drawing up of contingency plans for a possible invasion of Syria, Newsday reported Thursday. According to the newspaper's Web site, Undersecretary of Defense Douglas Feith is working on a policy paper highlighting how Syria's support of terrorist groups is a threat to the region. But the newspaper also reported that a senior Pentagon officer said he was unaware of any new planning regarding Syria. Rumsfeld said Wednesday that Syria had allowed Iraqi regime figures to enter and had provided Iraq with military technology. From jamesd at echeque.com Thu Apr 10 14:24:55 2003 From: jamesd at echeque.com (James A. Donald) Date: Thu, 10 Apr 2003 14:24:55 -0700 Subject: The secret government marches on... In-Reply-To: <20030410142812.A1645@cluebot.com> References: <"from jamesd"@echeque.com> Message-ID: <3E957EB7.15465.19A3602@localhost> -- On 10 Apr 2003 at 14:28, Declan McCullagh wrote: > Fisk and I would disagree politically if we ever met in > person, I'd wager, and I have no brief to defend his > political views. But from the perspective of a fellow > journalist, well, we sometimes make honest mistakes at the > best of times, and probably even more so in wartime. You're > accusing him of intentionally telling a lie, and to agree I'd > have to at the very least look at the wording of his report. Read fisk's account: http://tinyurl.com/995f > Disagreeing with a reporter's political views does not mean > that all their claims of fact are wrong and maliciously so. Compare Fisk's account, with more mainstream accounts of the same events: http://tinyurl.com/9966 The problem is not that Fisk argued that Saddam should win, the problem is that he claimed that with his own eyes he saw decisive and irrefutable evidence that Saddam was winning, or at least not losing nearly as fast as was claimed. He claimed "the Americans had been caught lying again", when as events proved, they were speaking the truth. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG G1k65SCJYsdVwpW2iXlft89KPTWuH3Fio5GZ2VWi 4LPUtiGFyLoxDyzZvhOWod9MiNRkUAdlInq1fjBbV From declan at well.com Thu Apr 10 11:28:12 2003 From: declan at well.com (Declan McCullagh) Date: Thu, 10 Apr 2003 14:28:12 -0400 Subject: The secret government marches on... In-Reply-To: <3E9536EC.24091.81C187@localhost>; from jamesd@echeque.com on Thu, Apr 10, 2003 at 09:18:36AM -0700 References: <20030410033540.GB25749@cybershamanix.com> <200304100414.26508.sfurlong@acmenet.net> <3E9536EC.24091.81C187@localhost> Message-ID: <20030410142812.A1645@cluebot.com> On Thu, Apr 10, 2003 at 09:18:36AM -0700, James A. Donald wrote: > During the past couple of days I have been arguing with someone > on usenet who cites as evidence for the extravagant > untruthfullness of the mainstream press, Robert Fisk's report > that the coalition troops were nowhere near Saddam Hussein > airport. (As it was then called) > > For his very similar work in Kosovo, Fisk was named "foreign > correspondent of the year" (presumably by a committee of lying > commies who share his ideology) > > Looks like Fisk is becoming the new Chomsky. Fish and I would disagree politically if we ever met in person, I'd wager, and I have no brief to defend his political views. But from the perspective of a fellow journalist, well, we sometimes make honest mistakes at the best of times, and probably even more so in wartime. You're accusing him of intentionally telling a lie, and to agree I'd have to at the very least look at the wording of his report. Disagreeing with a reporter's political views does not mean that all their claims of fact are wrong and maliciously so. -Declan From declan at well.com Thu Apr 10 11:32:57 2003 From: declan at well.com (Declan McCullagh) Date: Thu, 10 Apr 2003 14:32:57 -0400 Subject: Patriot Act to become permanant? In-Reply-To: <005101c2ff8a$83c216a0$0202a8c0@nyr.cable.rcn.com>; from elyn@consect.com on Thu, Apr 10, 2003 at 01:56:28PM -0400 References: <005101c2ff8a$83c216a0$0202a8c0@nyr.cable.rcn.com> Message-ID: <20030410143257.B1645@cluebot.com> On Thu, Apr 10, 2003 at 01:56:28PM -0400, Elyn Wollensky wrote: > NEW YORK (Dow Jones)--An intelligence source says U.S. Defense Secretary > Donald Rumsfeld last week ordered the drawing up of contingency plans Yep. A longer version: http://www.newsday.com/news/nationworld/world/ny-wosyri103215060apr10.story -Declan From mv at cdc.gov Thu Apr 10 14:41:35 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Thu, 10 Apr 2003 14:41:35 -0700 Subject: "Stay Behind" strategies in Iraq Message-ID: <3E95E50F.DE696F4@cdc.gov> At 12:42 PM 4/10/03 -0700, Tim May wrote: >1. Iraq has been a welfare state for essentially its entire lifetime. > From the 1920s to the 1960s, a typical backwater royalist welfare >state. Since the 1960s, a socialist/central planning/fascist state. You could say much the same about the US... > since much of the population has no independent source >of income, no factories producing stuff that the rest of the world >wants to buy, the effects are obvious. Nothing the world wants to buy? Forgotten about the oil? It is sufficient for a country to sell raw materials, it does not have to process them, or make elaborate things to sell. The peasants have their labor to sell, and the oil companies will buy it. >(Germany and Japan were in different situations: each had substantial >armaments, vehicle, steel, etc. facilities. After being repaired, and >perhaps after shifting for a while to making motorcycles and lawnmowers >and such, these industries re-emerged and aided in the rebuilding. We >all know their names: BMW, VW, Mitsubishi, Toyota, etc. Iraq has far >fewer such industries, per capita. Offhand, even with their 30 million >population, I cannot think of a single "Made in Iraq" item, from even >before the 1990 events.) Look in your gas tank. The contents are Made in Iraq. Esp. since Calif. requires low sulphur fuel and Iraq's oil is especially low sulphur. Iraqis making widgets makes as much sense as the US making TVs. Don't bother, others can do it cheaper. >They will be a handout state for the next 20 years, perhaps longer. >There is little chance that investors will pay to rebuild their >infrastructure, given the lack of ability of the peasants to pay. The peasants get work in the oil industry there. How is this different than german or jap peasants working in postwar factories? (Germany and Japan had manufacturing histories, unlike Iraq, as you say; but they had no oil to export. So you sell what you can sell.) > If >viewed over the long term, the cheering today as his statues are >toppled is relatively minor if the U.S. is ultimately forced to >withdraw (for whatever reason) and the heirs to Saddam get back in >power. After WWII, the US realized it had to use ex-Nazis to keep Germany running. But it went after the top guys, even 30 years later. Why do you think Iraq will be different? (Modulo perhaps more Iraqi sniping after the US occupation than was experienced in Germany. Because of the Palestinian/Osama-mecca thang) The US *does* have to deal with Israel/Palestine to calm some potential snipers. Since abandoning the region is not an option, regrettably, the US will have to force this. The USG probably knows this is the only way to remove motivation from some fraction of the potential Iraqi-occupation-snipers. (The "get out of Mecca" folks like Osama will not be satisfied by this, but some Arabs will. The Osama snipers will not be restricted to Iraq, but operate throughout the region. In fact, the other American outposts (Saudi, Kuwait, etc.) might be softer targets than the Iraq-occupying troops due to complacency.) But again, the US can handle mil deaths overseas now. This isn't Lebanon or Ethiopia under Clinton, where we exit at the first sight of blood. (Alas.) >* Most importantly, as the infrastructure continues to be in sad shape >and as 30 million continue to live essentially as beggars, resentment >of the occupation force can only grow. Don't you think the occupation planners know this? Don't you think they'll use psyops and jobs (paychecks by Halliburton) to calm most who can be calmed? I think its completely evil to invade another country, but its also clear Mr. Hussein wasn't terribly popular, for good reason. How many post-war occupation mil casualties the US can tolerate is an interesting question, as are US strategies to avoid these (eg, use lots of Iraqis and lots of UN fodder). But I think, and it is an empirical matter which we'll observe in coming months, that Iraqi occupation will not be abandoned even if the US continues to take hits. We'd also look bad in different ways to different third parties (eg, abandoning to the humanitarians; weak to the neighboring governments) >Yeah, a lot of Iraqis are waving U.S. flags and photos of Rambo >(seriously) I saw one waving a flag with a Harley plastered over the stripes... and saying "We love Bush," this is the enthusiasm of the >moment. Wait until a few years have passed and they still haven't >climbed out of the poverty of Liberty City (the slum formerly known as >Saddam City). (Because a slum of a few million people has essentially >nowhere in the world ever climbed out of poverty, even in >well-developed countries with strong free market systems. At least not >in the past several decades. Reasons left as an exercise.) Some of the poverty was due to the government control of resources and how it spent it. Face it, Iraq has plenty of wealth to pay back investors and locals. All you need is enough warships to guarantee that you *will* recover costs. And a major oil producer not in OPEC will be a major tool for the USG. >Meanwhile, there will be groups with access to the offshore accounts, not so easy >to the buried supplies, If that's a real problem then look into investing in ground-penetrating radar equiptment. Not just for archeologists any more... who will have a very strong incentive to into >power. Getting into power means control of the billions of barrels of >oil. Exactly. Exactly why the US won't let go. >Neighboring countries will find that it's to their advantage to keep >the U.S. bogged-down in Iraq. The last thing Iran, Turkey, Syria, or >even Saudi Arabia wants is a Westernized state in their midst, a base >to launch other "liberations" from. Oh, you mean like Kuwait, Qatar, Saudi Arabia, Israel, Jordan? So though they'll pay lip service >to the idea of being happy Saddam is gone, they'll be sure to keep a >trickle or even a river of terrorists and supplies heading into Iraq. A good way to get JDAMNED.. Syria is next, scheduled for the Fall TV season. And what are Turkey or the Saudis going to do about it? What did you think "if you're not with us, you're against us" meant? >The perfection of their papers, and the necessity of the U.S. to deal >with former Iraqi bureaucrats, means that many of the Iraqis the U.S. >works with can very easily also be part of the underground, the >resistance. Expect lots of double and even triple agents. A lot of >Iraqis may seek to cover their bets by working both sides, just so they >can later produce documents (encrypted, one assumes) proving their >longstanding alliance to whichever side is dominant ten years from now. The US will anticipate this. That is why it publicly insists that the current government will go down hard ---to dissuade an underground. It will use willing native Iraqis as underground-detectors. It will (continue to) monitor every phone call. An underground will not be as well funded, redundant, or operationally secure as Hussein's government. Not when most folks have jobs again and feel safer than they did under Hussein. >So, as many analysts have said, the military victory of our Abrams >tanks over their obsolete tanks was the easy part. A harder part will >be the police force action of the next several months, and dealing with >the American public's frustration with mounting costs, longer >deployments of troops, and periodic bombings and snipings. As long as the bombings are on foreign soil, blasting military people, the US can stomache it for a while. Just get FOX to re-run the statue-tipping, stories of torture, or some other US agitprop. Unscheduled, domestic, schoolyard-demolition jobs are another matter. But much harder operationally. >And then the really hard part takes over. A year from now, two years >from now, and Baghdad resembles Beirut or Nablus, and 100,000 troops >are still patrolling the streets. Beirut and Nablus are in resource-poor countries. They won't be able to affort the dishes that bring them MTV (a subtle form of psyops). >And there is no boom in building semiconductor and television >factories, as the optimists are expecting. And most of the nation is >getting handouts from their new government, the U.S. puppet. I'd expect "humanitarian aid" handouts for a while, but they will get the oil flowing ASAP, which will provide jobs. Young guys with jobs don't blow themselves up as readily. >Yep, grounds for optimism. The poverty of the West Bank, except a >factor of ten larger. The west bank has nothing. Iraq has oil. That wealth can be used to pacify. .......... Rome was not burnt in a day. --James A. Donald From rah at shipwright.com Thu Apr 10 12:24:05 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Thu, 10 Apr 2003 15:24:05 -0400 Subject: Revenge of the Wave-oids (was Re: Trusted Computing Group trying to be TCPA follow-on [eetimes] In-Reply-To: <20030410015723.GA94766@lightship.internal.homeport.org> References: <5.1.1.6.2.20030409113725.02c5ae80@idiom.com> <20030410015723.GA94766@lightship.internal.homeport.org> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 9:57 PM -0400 4/9/03, Adam Shostack wrote: >You'd think that, in light of the economy and all, the folks >involved in such long, failed efforts would be let go. Indeed. These Wave-oids have been at this book-entry-to-the-screen-buffer world-domination nonsense since before Adam, or at least I :-), was a cypherpunk: . They've been delisted and re-listed so many times it's a wonder that their shorts don't have carpal tunnel in their sell-button fingers... One can imagine all these financial-crypto-clueless idiots standing around in their silver-lame Nehru-suits with their pinkies at the corners of their mouths. Of course, as a famous basketball-player-turned-senator said once, "It's bad luck to be behind at the end of the game." And so, boys and girls, the game of geek-versus-Fed continues apace... Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPpXEpMPxH8jf3ohaEQImDwCfSHKU8IIUZ+nxJr5gEkEcInZEIPwAoJ9z ZyW48FHbcNi1fBHxcmhqINMc =XoAH -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Thu Apr 10 12:37:28 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Thu, 10 Apr 2003 15:37:28 -0400 Subject: Patriot Act to become permanant? In-Reply-To: <005101c2ff8a$83c216a0$0202a8c0@nyr.cable.rcn.com> References: <005101c2ff8a$83c216a0$0202a8c0@nyr.cable.rcn.com> Message-ID: At 1:56 PM -0400 4/10/03, Elyn Wollensky wrote: >Donald Rumsfeld last week ordered the drawing up of contingency plans >for a possible invasion of Syri Of course, we have contingency plans for the invasion of both Canada and Mexico... Um, wait a minute.... :-). Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From timcmay at got.net Thu Apr 10 16:03:28 2003 From: timcmay at got.net (Tim May) Date: Thu, 10 Apr 2003 16:03:28 -0700 Subject: "Stay Behind" strategies in Iraq In-Reply-To: <3E95E50F.DE696F4@cdc.gov> Message-ID: On Thursday, April 10, 2003, at 02:41 PM, Major Variola (ret) wrote: > At 12:42 PM 4/10/03 -0700, Tim May wrote: >> 1. Iraq has been a welfare state for essentially its entire lifetime. >> From the 1920s to the 1960s, a typical backwater royalist welfare >> state. Since the 1960s, a socialist/central planning/fascist state. > > You could say much the same about the US... > >> since much of the population has no independent source >> of income, no factories producing stuff that the rest of the world >> wants to buy, the effects are obvious. > > Nothing the world wants to buy? Forgotten about the oil? What part of "no _factories_ producing stuff" was unclear? (Emphasis added. Oil is not something skilled workers produce...it is something that a very few produce, leaving most dependent on only what trickles down.) > > It is sufficient for a country to sell raw materials, it does not have > to process them, or make elaborate things to sell. > > The peasants have their labor to sell, and the oil companies will > buy it. You clearly have not visited oil wells or refineries lately. Most of the drilling is done by specialized drilling companies, e.g., the French, German, British, Dutch, and U.S. drilling companies. They hire a small number of locals...probably they'll be hiring far fewer for upcoming projects, due to security measures. Refineries are built by the Bechtels and Parsons and their European and Japanese counterparts. Most are nearly fully-automated. Again, a comparatively tiny number of locals will be hired. --Tim May From camera_lumina at hotmail.com Thu Apr 10 13:14:27 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 10 Apr 2003 16:14:27 -0400 Subject: "Lone terrorist" bill Message-ID: Variola wrote... "In fact, they'll soon abuse this to monitor anyone, more so (or more "legally") than they do now. And antiabortion loonies, PETA, Earthfirst, folks who hang No War banners, folks without flags on their cars, anyone named Akbar or Mohammed, .." And remember, you don't actually have to DO anything to be a terrorist. Just thinking about these things makes you a "sleeper cell". -TD >From: "Major Variola (ret)" >To: cypherpunks at lne.com >Subject: Re: "Lone terrorist" bill >Date: Wed, 09 Apr 2003 14:11:31 -0700 > >At 12:05 PM 4/9/03 -0700, Eric Murray wrote: > >WTF is a "lone terrorist"? > >What they're trying for is someone who hears an Osama tape and takes the >initiative, without external connections. Sorta like the 101st Airborne >dude >who fragged the invaders, but domestically. > >In fact, they'll soon abuse this to monitor anyone, more so (or more >"legally") >than they do now. And antiabortion loonies, PETA, Earthfirst, folks who >hang No War banners, >folks without flags on their cars, anyone named Akbar or Mohammed, .. > >Terrorist is the new root password to the Constitution. _________________________________________________________________ Help STOP SPAM with the new MSN 8 and get 2 months FREE* http://join.msn.com/?page=features/junkmail From frantz at pwpconsult.com Thu Apr 10 16:28:56 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Thu, 10 Apr 2003 16:28:56 -0700 Subject: "Stay Behind" strategies in Iraq Message-ID: At 2:41 PM -0700 4/10/03, Major Variola (ret) wrote: >Some of the poverty was due to the government control of resources >and how it spent it. Face it, Iraq has plenty of wealth to pay back >investors and locals. All you need is enough warships to guarantee >that you *will* recover costs. I'm not sure about this one. An article in this morning's San Jose Mercury News indicated that Iraq's international debt (commercial to Russians, and compensatory to Kuwait to name just two) amounts to about 32 years oil production. Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From mv at cdc.gov Thu Apr 10 16:48:58 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Thu, 10 Apr 2003 16:48:58 -0700 Subject: "Stay Behind" strategies in Iraq [ground-penetrating radar] Message-ID: <3E9602EA.2070703@cdc.gov> At 12:47 AM 4/11/03 +0200, Thomas Shaddack wrote: >On Thu, 10 Apr 2003, Major Variola (ret) wrote: >> >to the buried supplies, >> >> If that's a real problem then look into investing in ground-penetrating >> radar equiptment. >> Not just for archeologists any more... > >The sand there is littered with dead steel, with empty carcasses of >deceased tanks from Iraq-Iran war. Large metal bodies can be used to hide >smaller metal objects, in our case smaller weapon caches. Yes. The US civ militia knows about burying weapons and scattering ferrous objects. Kinda like the leprechaun story, who puts ribbons on *all* the trees, since he agreed not to remove the ribbon on the tree over the gold which he placed when captured. However, we can assume that 1. GPR >> magnetometers 2. they'll dig up (well, they'll hire Iraqis to dig up) whatever they need to if the Occupation Resistance motivates them. They will of course also use social controls, if pushed. No right to bear arms, govt ID required for travel, meetings must be registered with 'interim' govt, how do you say Big Brother in arabic? ... "When only cops have guns, it's called a 'police state'" --Claire Wolfe From timcmay at got.net Thu Apr 10 17:20:30 2003 From: timcmay at got.net (Tim May) Date: Thu, 10 Apr 2003 17:20:30 -0700 Subject: "Stay Behind" strategies in Iraq In-Reply-To: Message-ID: <66F66BB4-6BB3-11D7-9925-000A956B4C74@got.net> On Thursday, April 10, 2003, at 04:28 PM, Bill Frantz wrote: > At 2:41 PM -0700 4/10/03, Major Variola (ret) wrote: >> Some of the poverty was due to the government control of resources >> and how it spent it. Face it, Iraq has plenty of wealth to pay back >> investors and locals. All you need is enough warships to guarantee >> that you *will* recover costs. > > I'm not sure about this one. An article in this morning's San Jose > Mercury > News indicated that Iraq's international debt (commercial to Russians, > and > compensatory to Kuwait to name just two) amounts to about 32 years oil > production. And many of the existing facilities are _old_, as the hazards of the past 20 years have limited construction opportunities. The French and the Russians built some facilities. A lot more would be needed. As you cite, the profits from the oil output are already spoken for. Now, of course, the new regime in Iraq could simply repudiate its national debt and specific debts on specific refineries and pipelines and say "We're starting over, with contracts going to Exxon/Mobil, Halliburton, and Zapata Petroleum. Oh, and one to our British friends." Perhaps they should. But even if they do, and even if, say, a couple of dollars a barrel get passed out on street corners in Saddam City, this won't change the underlying basket case nature of their economy. Iraqi GNP per person was about $1500. This was before the latest war. There is virtually no chance production will be ramped up (new wells drilled, new pipelines laid, new refineries built) fast enough to affect the 30 million Iraqis in any significant way. Sometimes ya just got to say "Glad I don't live there!" and be done with it. Unfortunately, now we cannot just be done with it, as we're knee deep in the Big Muddy, and the big fool says to push on. --Tim May "We are at war with Oceania. We have always been at war with Oceania." "We are at war with Eurasia. We have always been at war with Eurasia." "We are at war with Iraq. We have always been at war with Iraq. "We are at war with Syria. We have always been at war with Syria." From declan at well.com Thu Apr 10 15:20:34 2003 From: declan at well.com (Declan McCullagh) Date: Thu, 10 Apr 2003 18:20:34 -0400 Subject: The secret government marches on... In-Reply-To: <3E957EB7.15465.19A3602@localhost>; from jamesd@echeque.com on Thu, Apr 10, 2003 at 02:24:55PM -0700 References: <"from <20030410142812.A1645@cluebot.com> <3E957EB7.15465.19A3602@localhost> Message-ID: <20030410182034.A6071@cluebot.com> On Thu, Apr 10, 2003 at 02:24:55PM -0700, James A. Donald wrote: > Read fisk's account: http://tinyurl.com/995f > > > Disagreeing with a reporter's political views does not mean > > that all their claims of fact are wrong and maliciously so. > > Compare Fisk's account, with more mainstream accounts of the > same events: http://tinyurl.com/9966 I find Fisk's writing tedious and his comments about Americans lying juvenile. Yet even the two articles juxtaposed does not prove Fisk was lying; the New York Times article was posted on 4/4 -- Fisk's article could have been (and probably was) written days earlier. -Declan From mv at cdc.gov Thu Apr 10 20:04:05 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Thu, 10 Apr 2003 20:04:05 -0700 Subject: "Stay Behind" strategies in Iraq Message-ID: <3E9630A5.6010505@cdc.gov> At 04:03 PM 4/10/03 -0700, Tim May wrote: >On Thursday, April 10, 2003, at 02:41 PM, Major Variola (ret) wrote: >> Nothing the world wants to buy? Forgotten about the oil? > >What part of "no _factories_ producing stuff" was unclear? (Emphasis >added. Oil is not something skilled workers produce...it is something >that a very few produce, leaving most dependent on only what trickles >down.) Nothing was unclear. But I don't understand your emphesis on factories. You can make a living off wheat, you don't have to make bread. Growing wheat, pumping oil don't need skilled labor. Its enough to have nature provide the opportunity. >> It is sufficient for a country to sell raw materials, it does not have >> to process them, or make elaborate things to sell. >> >> The peasants have their labor to sell, and the oil companies will >> buy it. > >You clearly have not visited oil wells or refineries lately. True. Most of >the drilling is done by specialized drilling companies, e.g., the >French, German, British, Dutch, and U.S. drilling companies. They hire >a small number of locals...probably they'll be hiring far fewer for >upcoming projects, due to security measures. Ok, the Iraqis will work in the 7-11s which serve the yankees. Some Iraqis will do better. They will inspire others. They will also be used by psyops to argue for "the american dream" for Iraqis. And although exploited by psyops, I think all humans want to improve their circumstance. And to handle security, you might employ locals, who are more politically expendable. And if they're offed, the USG might even gain points locals, since gen-u-ine Ay-rabs would have been killed. Much more empathetic to the natives than imported Halliburton Texans. Yes, the US could keep the Iraqis poor. But its not in the USG interest. The USG wants MTV in every Arab home. (Albeit this will piss off the Islamo Fundies, but they're already majorly pissed.) >Refineries are built by the Bechtels and Parsons and their European and >Japanese counterparts. Most are nearly fully-automated. Again, a >comparatively tiny number of locals will be hired. Even if true (I'm not fully clued to the oil biz, I'd be surprised if any readers here were) the US imposed 'interim' govt will tax this to fund things (like jobs, or even sinecures) that win favor. Why? Because the govt worries more about Iraqi/Arab backlash more than Halliburton's profits. For a while, anyway. And I am dubious of the "fully automated" claims, frankly, though that is also an empirical matter, perhaps researchable by studying oil ops in the region. If you liquidate the towelhead kings of the region, you might find a lot of distributable wealth (I'm not a socialist, neither am I an admirer of monarchy.) which the US conquerers would distribute. A great way to curry favor with the populace. Libertarian ideals don't prescribe a way to distribute land-based wealth in the region, though I'd love to be corrected. .... Mohamed Atta --An Army of One From eresrch at eskimo.com Thu Apr 10 20:06:41 2003 From: eresrch at eskimo.com (Mike Rosing) Date: Thu, 10 Apr 2003 20:06:41 -0700 (PDT) Subject: "Stay Behind" strategies in Iraq In-Reply-To: <826A6F77-6B8C-11D7-9925-000A956B4C74@got.net> Message-ID: On Thu, 10 Apr 2003, Tim May wrote: > And so there are many reasons for a "stay behind" strategy and almost > no reasons against it. How about there's no way in hell they'd bother. Al Qaida is already more sophisticated than anything Saddam has figured out. > Yep, grounds for optimism. The poverty of the West Bank, except a > factor of ten larger. Very much an optimist, it's not gonna happen. Even Robert Fisk describes the left over fighters as "hopeless and pathetic". At the same time he admires their courage, sort of as a level of insanity. The US is going to steal the oil, and the peasants living there will get nothing. And because they have nothing, they can't fight back. Slavery works. And it's coming to the US soon I bet (as soon as Hatch finishes Patriot 2 in permentent form). Who's going to fire the first shot of revolution in the US? Oh I forgot, OK City was the first shot. Patience, persistence, truth, Dr. mike From mv at cdc.gov Thu Apr 10 20:09:55 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Thu, 10 Apr 2003 20:09:55 -0700 Subject: "Stay Behind" strategies in Iraq [Ka-Ching] Message-ID: <3E963203.2040604@cdc.gov> At 04:28 PM 4/10/03 -0700, Bill Frantz wrote: >At 2:41 PM -0700 4/10/03, Major Variola (ret) wrote: Face it, Iraq has plenty of wealth to pay back >>investors and locals. All you need is enough warships to guarantee >>that you *will* recover costs. > >I'm not sure about this one. An article in this morning's San Jose Mercury >News indicated that Iraq's international debt (commercial to Russians, and >compensatory to Kuwait to name just two) amounts to about 32 years oil >production. > The Russians? Bwah hah hah. Yeah, they (and the French, and the Krauts) can get all the Saddam-faced bills they want. Can you spell default? I knew you could. Still, 32 years at current prices, perhaps, but in 30 years the price of oil will have risen. And also, the financial biz has no problem with 30 year ROI, see the home-mortgage industry. Besides, after we hang the Saudis, and liberate Venezuala (sp), the USG will be able to set the price of oil for the US-external market. Ka-ching. From jamesd at echeque.com Thu Apr 10 20:31:14 2003 From: jamesd at echeque.com (James A. Donald) Date: Thu, 10 Apr 2003 20:31:14 -0700 Subject: The secret government marches on... In-Reply-To: <20030410182034.A6071@cluebot.com> References: <"from jamesd"@echeque.com> Message-ID: <3E95D492.297.2E99556@localhost> -- James A. Donald: > > Read fisk's account: http://tinyurl.com/995f > > > > Compare Fisk's account, with more mainstream accounts of > > the same events: http://tinyurl.com/9966 Declan McCullagh > I find Fisk's writing tedious and his comments about > Americans lying juvenile. Yet even the two articles > juxtaposed does not prove Fisk was lying; the New York Times > article was posted on 4/4 -- Fisk's article could have been > (and probably was) written days earlier. You have failed to read the article -- he tells us when he wrote it. Read his article, and fit the timeline of the events he describes, against the timeline of events the other article describes. The time at which he claims to have visited the airport in his account was an hour or two before the attack began in the mainstream account. If he was merely telling us the US had not taken, or was not attacking, the airport, that would be no problem, but his claim was that the US was nowhere near the airport, the airport was in no imminent danger of falling, or even of being attacked, that in the unlikely event that the US had reached the outskirts, they had fled or been driven back. He claimed to have confirmed Baghdad Bob's account. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG UeOahX2F3qng0DuT72LmTbiYdgS6MD0POlGJxDXQ 4ixc+yX9lOEwCVzsQ38DCmNPK7siG0rcLOR5le//t From jamesd at echeque.com Thu Apr 10 21:49:02 2003 From: jamesd at echeque.com (James A. Donald) Date: Thu, 10 Apr 2003 21:49:02 -0700 Subject: The secret government marches on... In-Reply-To: <20030411001255.A9458@cluebot.com> References: <"from jamesd"@echeque.com> Message-ID: <3E95E6CE.2543.33132D9@localhost> -- On Thu, Apr 10, 2003 at 08:31:14PM -0700, James A. Donald wrote: > > You have failed to read the article -- he tells us when he > > wrote it. Read his article, and fit the timeline of the > > events he describes, against the timeline of events the > > other article describes. The time at which he claims to > > have visited the airport in his account was an hour or two > > before the attack began in the mainstream account. Declan McCullagh > You are incorrect. As I said, I read the article. It was > reposted from another site and it is anything but clear when > it was filed. The New York Times has a timestamp and > datestamp; You do not date it by the datestamp, you date it by the events to which Robert Fisk refers. > Perhaps I'm missing something obvious here I do not think you have read the article. Here is Fisk's article http://tinyurl.com/995f Here is the mainstream article http://tinyurl.com/9966 They contradict each other. Therefore one or both is lying. Since we now have good cause to believe the mainstream article true, it follows that Robert Fisk is lying. > Don't attribute to malice what can be explained by honest > mistakes; and journalists rarely have the full story at the > best of times. Probably Fisk did not know where the American forces were, but he assured the reader, with great confidence, that he did know. He claimed to have confirmed Baghdad Bob's account -- the account of the Iraqi minister of information, an account that events proved to be hilariously false. In this article Fisk claims, claims with enormous confidence and certainty, to confirm a speech by Baghdad Bob that caused much hilarity among those less credulous. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG hUerhSZ4SgYnzK+o+9WY+vpqa2fz5wMLUo5P4mdc 4QTgvRyr+0L2R2DmuDNeXORcSXRqN6x+5NGfxu2AW From jamesd at echeque.com Thu Apr 10 22:15:09 2003 From: jamesd at echeque.com (James A. Donald) Date: Thu, 10 Apr 2003 22:15:09 -0700 Subject: The secret government marches on... In-Reply-To: <3E96355E.4040006@ksvanhorn.com> Message-ID: <3E95ECED.12081.3491D67@localhost> -- On 10 Apr 2003 at 22:24, Kevin S. Van Horn wrote: > The "empty runways and terminals" is consistent with Fisk's > report, which appears to have been filed before the actual > capture of the airport took place. The attack taking place within hours is not consistent with Fisk's report. Fisk did not merely claim that no attack was taking place. No one claimed an attack was taking place. Fisk claimed to have exposed the Americans as lying, and confirmed Baghdad Bob as telling the truth, in that supposedly US troops were nowhere near the airport. Fisk issued a bunch of rhetoric similar to that of Baghdad Bob: "the Iraqi minister was right and the Americans were wrong" "the Americans had been caught lying again" "Had the Americans found themselves miles away on the edge of the old RAF airbase at Habbaniyeh, one wondered, and confused it with the airport outside Baghdad? Had they sent a patrol up to the far side of the Saddam airport for a few minutes, just to say they'd been there? Back in 1941, a German patrol briefly captured the last tram-stop on the line west of Moscow, collecting the discarded passenger tickets as souvenirs - and then got no farther. " That someone, possibly Fisk (though I suspect him to be in England, not Baghdad), wandered through an airport lounge and saw no scenes of battle is doubtless true -- since the pentagon did not claim to be attacking the airport at that time. That Baghdad Bob was right about the location of US troops was not true. That the Americans were lying about the location of US troops was not true. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG a9S0tpaCtCFHBGn0DGv6LFN/K8eXxRxr2FLQwbqK 4MrIWG0Ir0gNtYK5aZyvwG6iikiag3oFTnboGTFu/ From jamesd at echeque.com Thu Apr 10 22:15:09 2003 From: jamesd at echeque.com (James A. Donald) Date: Thu, 10 Apr 2003 22:15:09 -0700 Subject: The secret government marches on... In-Reply-To: <3E96380A.6010707@ksvanhorn.com> Message-ID: <3E95ECED.16534.3491D2B@localhost> -- James A. Donald: > > [According to Fisk] the airport was in no imminent danger > > of falling, Kevin S. Van Horn: > And, according to the Sun-Sentinel report, it wasn't -- they > reported it as empty early in the morning. The Sun Sentinel reports it being attacked with heavy Iraqi casualties within hours of Baghdad Bob's making the claims that Robert Fisk endorsed,and falling later that night. Fisk tells us that the Iraqi minister was right and the Americans were wrong, that the Americans had been caught lying again The Sun Sentinal reports that the Iraqi minister (Baghdad Bob) was wrong, the Americans were right, and the Baghdad Bob was caught lying. > Now you are being dishonest. He made no claim about what > might happen in the future, only about what he was seeing at > that moment. You are splitting legalistic hairs. If Fisk is telling the truth, the Sun Sentinel is lying. If the Sun Sentinel is telling the truth, Fisk is lying, Subsequent events give us good cause to believe the Sun Sentinel was telling the truth, and that Baghdad Bob was lying extravagantly and ridiculously. And if Baghdad Bob was lying, which today everyone, including Fisk, agrees, then Fisk was lying, for Fisk told us that the Iraqi minister was right and the Americans were wrong, that the Americans had been caught lying. James A. Donald: > > that in the unlikely event that the US had reached the > > outskirts, they had fled or been driven back. Kevin S. Van Horn: > This statement is complete fantasy, and corresponds to > nothing that Fisk actually wrote in his report. Fisk wrote in his report: "Had the Americans found themselves miles away on the edge of the old RAF airbase at Habbaniyeh, one wondered, and confused it with the airport outside Baghdad? Had they sent a patrol up to the far side of the Saddam airport for a few minutes, just to say they'd been there? Back in 1941, a German patrol briefly captured the last tram-stop on the line west of Moscow, collecting the discarded passenger tickets as souvenirs - and then got no farther. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG UF2jhZOGzR8dKNQyDi7aAAL0PxEKS2JzZq7j9/wo 4j5LuVYJEoaFiMRRjMce6FlKzsLV6RpvY/jHfji09 From kvanhorn at ksvanhorn.com Thu Apr 10 20:24:14 2003 From: kvanhorn at ksvanhorn.com (Kevin S. Van Horn) Date: Thu, 10 Apr 2003 22:24:14 -0500 Subject: The secret government marches on... References: <"from jamesd"@echeque.com> <3E957EB7.15465.19A3602@localhost> Message-ID: <3E96355E.4040006@ksvanhorn.com> James A. Donald wrote: >Read fisk's account: http://tinyurl.com/995f > >>Disagreeing with a reporter's political views does not mean >>that all their claims of fact are wrong and maliciously so. >> >> > >Compare Fisk's account, with more mainstream accounts of the >same events: http://tinyurl.com/9966 > You didn't read the "mainstream" account, nor Fisk's account, carefully enough. Fisk's account was posted at 8:00 a.m. (Iraqi time) on April 4, corresponding to midnight, April 4 in the Eastern time zone, where your "mainstream" U.S. news account (southern Florida Sun Sentinel) of the same day was published. Fisk's account was clearly written many hours earlier than the Sun Sentinel report, which states, "During the day, the ministry [of information] organized a trip to the airport for reporters in the capital, and they filmed the empty runways and terminals. Yet within hours, artillery and rocket fire erupted in the region and military officials said an assault on Saddam International Airport had begun." The "empty runways and terminals" is consistent with Fisk's report, which appears to have been filed before the actual capture of the airport took place. Fisks's report says, "Only three hours earlier, the BBC had reported claims that forward units of an American mechanised infantry division were less than 16km west of Baghdad -- and that some US troops had taken up positions on the very edge of the international airport. "But I was 27km west of the city." That is to say, the mechanized infantry division was 11km to the east of the airport at the time of the BBC report, but that report had been written so as to give the impression that US troops were already attacking the airport. Even if we discount Fisk's report and only rely on the Sun-Sentinel report, we have to conclude that "some US troops" must have, in reality, been only a very small number of hidden scouts -- not an assault force. In other words, just as with Umm Qasr, the initial "mainstream" media (BBC) reports gave the impression that the coalition's attack had progressed farther than it actually had. (Umm Qasr was reported under control of coalition forces many days before this was fully achieved.) From kvanhorn at ksvanhorn.com Thu Apr 10 20:35:38 2003 From: kvanhorn at ksvanhorn.com (Kevin S. Van Horn) Date: Thu, 10 Apr 2003 22:35:38 -0500 Subject: The secret government marches on... References: <"from jamesd"@echeque.com> <3E95D492.297.2E99556@localhost> Message-ID: <3E96380A.6010707@ksvanhorn.com> James A. Donald wrote: >but his claim was that the US was nowhere near the airport, > His claim was that he couldn't see them, and that even the mainstream reports put them many kilometers away, if you read them carefully. >the airport was in no imminent danger of falling, > And, according to the Sun-Sentinel report, it wasn't -- they reported it as empty early in the morning. >or even of being attacked, > Now you are being dishonest. He made no claim about what might happen in the future, only about what he was seeing at that moment. >that in the unlikely event that the US had reached the >outskirts, they had fled or been driven back. > This statement is complete fantasy, and corresponds to nothing that Fisk actually wrote in his report. I don't know much of anything about Fisk, but I now know that *you* cannot be trusted to give an honest report. From hseaver at cybershamanix.com Thu Apr 10 20:42:59 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Thu, 10 Apr 2003 22:42:59 -0500 Subject: "Stay Behind" strategies in Iraq In-Reply-To: <3E9630A5.6010505@cdc.gov> References: <3E9630A5.6010505@cdc.gov> Message-ID: <20030411034259.GA29529@cybershamanix.com> On Thu, Apr 10, 2003 at 08:04:05PM -0700, Major Variola (ret) wrote: > At 04:03 PM 4/10/03 -0700, Tim May wrote: > > >Refineries are built by the Bechtels and Parsons and their European and > >Japanese counterparts. Most are nearly fully-automated. Again, a > >comparatively tiny number of locals will be hired. Pretty true, I think. I know when I was working down in Mobile, AL, I was quite surprised to read about how few people were actually employed in those huge petro-chemical refineries down there. Simply gigantic places with maybe 400 people working in one. -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From timcmay at got.net Thu Apr 10 22:51:01 2003 From: timcmay at got.net (Tim May) Date: Thu, 10 Apr 2003 22:51:01 -0700 Subject: "Stay Behind" strategies in Iraq In-Reply-To: <3E9630A5.6010505@cdc.gov> Message-ID: <93981C4A-6BE1-11D7-99EC-0003930F2360@got.net> On Thursday, April 10, 2003, at 08:04 PM, Major Variola (ret) wrote: > > Ok, the Iraqis will work in the 7-11s which serve the yankees. > Some Iraqis will do better. They will inspire others. They will > also be used by psyops to argue for "the american dream" for > Iraqis. And although exploited by psyops, I think all humans > want to improve their circumstance. You're arguing for what you would like to see, whereas what I'm talking about is that there is unlikely to be any surge in employment in this hand-out nation. Some small number of additional workers will be hired as some refineries and other facilities are expanded, repaired, etc. Perhaps even a few 7-11 franchise stores will open, employing perhaps 50 Iraqis. There simply is no prospect that significantly more than the small fraction of Iraqis who now service the oil industry will be employed. Doubling oil production, which is essentially impossible, would only double a small number...or not quite double, as newer facilities will be even more automated. Meanwhile, most of the nation's 20,000,000 will continue to rely on handouts. I said that no major ghetto/slum area, whether Calcutta or South-Central LA or Baghdad has ever, in memory, gone to nearly full employment. I'm a libertarian, not a do-gooder: I realize that more and more people are simply useless eaters. The useless eaters in Baghdad, Basra, etc. will > Yes, the US could keep the Iraqis poor. But its not in the USG > interest. The USG wants MTV in every Arab home. (Albeit this will > piss off the Islamo Fundies, but they're > already majorly pissed.) You're showing your statist/idealist roots. It's not a matter of "the US could keep the Iraqis poor." No more so than the U.S. is keeping the South-Central LA negroes poor, or the Calcutta natives poor. Markets clear. As I said, even doubling the oil production in Iraq would have minimal effects on overall employment. This is an economic fact. I suppose the U.S. could order Iraqi National Oil to hire tens of thousands of people to polish the pipes, wipe down the derricks, spoon up the spilled oil, and other make-work jobs. Still a drop in the bucket. Basically, Iraq went through a standard Turd World birth boom, doubling its population and then doubling it again in just a couple of generations. Look at the statistics on how many Iraqis are under 15. They dispersed handouts to the breeders, who now number 20 million, crowded into several major cities and a dozen smaller cities. > > >Refineries are built by the Bechtels and Parsons and their European > and > >Japanese counterparts. Most are nearly fully-automated. Again, a > >comparatively tiny number of locals will be hired. > > Even if true (I'm not fully clued to the oil biz, I'd be > surprised if any readers here were) Don't extrapolate from your own ignorance to others. I've seen several coal- and oil-fired power plants (in Virginia and California), and I drive past the Gaviota, CA refinery (where offshore oil platforms deliver to the site) and can see how few people work there. (It's about 30 miles west of Santa Barbara, on an isolated stretch of ranchlands.) Modern refineries cannot afford to have people running around with wrenches and screwdrivers, tweaking and reading gauges. The plants either run with few people or they are doomed. Finally, for now, a friend of mine for the past 28 years is the son of a former Chevron head of research and development (at the Bay Area refineries...also lightly staffed). This V.P., Dr. John Scott, told me many years ago just how few people it takes to run the crackers and distillation towers. As for working oil wells, I've flown over vast oil fields in west Texas, and have driven past many oil derricks in California (in several regions). Unmanned. Small maintenance crews are all that are needed. It's good for Iraq that they have oil. Having oil is always better than not having oil. But any notion that any expansion of the oil business is going to magically employ millions of Iraqis who are not now employed is silly. Do the math. > the US imposed 'interim' govt will tax this to > fund things (like jobs, or even sinecures) that win favor. Why? > Because the govt worries more about Iraqi/Arab backlash more > than Halliburton's profits. For a while, anyway. Silliness. Prices are set by markets. No one is claiming that Halliburton will get the bulk of the oil profits. But Halliburton will not do its thing (drilling services, extinguishing fires, etc.) except at prices they find acceptable. You seem to have some kind of fantasy going on about Iraq's oil economy somehow giving jobs to millions of Iraqis who have no skills, no work experience. Optimism has blinded you. Do the math. > > And I am dubious of the "fully automated" claims, frankly, though > that is also an empirical matter, perhaps researchable by > studying oil ops in the region. I've told you I've seen the Gaviota plant, and know from Dr. Scott just how few workers are inside refineries and pumping stations. It has to be this way. > If you liquidate the towelhead kings > of the region, you might find a lot of distributable wealth > (I'm not a socialist, neither am I an admirer of monarchy.) > which the US conquerers would distribute. A great way > to curry favor with the populace. Libertarian ideals don't > prescribe a way to distribute land-based wealth in the region, > though I'd love to be corrected. > "Redistributing the oil wealth" will not do anything except lead to a further doubling and tripling of the population. The moral hazard of handing out free stuff is itself enough to derail real markets. --Tim May From declan at well.com Thu Apr 10 19:58:24 2003 From: declan at well.com (Declan McCullagh) Date: Thu, 10 Apr 2003 22:58:24 -0400 Subject: Ask two cops for help fixing a flat tire, get raped? Message-ID: <20030410225824.A9122@cluebot.com> FOR IMMEDIATE RELEASECRM THURSDAY, APRIL 10, 2003(202) 514-2008 WWW.USDOJ.GOV TDD (202) 514-1888 TWO FORMER EL PASO, TEXAS POLICE OFFICERS PLEAD GUILTY TO POLICE MISCONDUCT WASHINGTON, D.C.- Two former deputies of the El Paso County Sheriff's office pleaded guilty to police misconduct, the Justice Department announced today. The plea agreement was filed in federal District Court in San Antonio, Texas today along with a criminal information. The defendants, Michael Duran and Peter Calzada, pleaded guilty to one count of willfully depriving an individual of their civil rights. The plea agreement states that in January of 1998, the defendants sexually assaulted a female victim. The victim was stranded on a county road with a flat tire at the time of the assault. The plea agreement states the defendants placed her in their patrol car and threatened her with arrest for driving under the influence of alcohol if she did not comply with their demands. The plea agreement further states that the defendants drove the victim to a secluded area, threatened her by telling her the state would sever custody of her children and then sexually assaulted her. "This type of egregious abuse of power undermines the mission of law enforcement officers to uphold the law and protect our citizens," said Ralph F. Boyd, Jr., Assistant Attorney General for the Civil Rights Division. "Such behavior is illegal and intolerable. We will prosecute offenders to the fullest extent of the law." If convicted, the defendants could face a maximum of 10 years in prison. This case was investigated by the Federal Bureau of Investigation (FBI) and was prosecuted by attorneys from the U.S. Attorney's for the Southern District of Texas and the Criminal Section of the Civil Rights Division. ### 03-227 From rah at shipwright.com Thu Apr 10 20:07:42 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Thu, 10 Apr 2003 23:07:42 -0400 Subject: Brin-Tine Message-ID: Support The DrudgeReport; Visit Our Advertisers Surveillance cameras installed in homes of quarantined Thu Apr 10 2003 21:31:12 ET Singapore (dpa) - Surveillance cameras have been installed in the homes of people placed under quarantine in Singapore after 12 flouted the orders despite having come into contact with people diagnosed with a deadly pneumonia-like virus, the Health Ministry said Friday. Those ordered quarantined must report in front of the camera several times a day. If they are not at home when health-care workers check, they will then be forced to wear an electronic tag on their wrist under the latest restrictions aimed at curbing the spread of severe acute respiratory syndrome (SARS). The tags are linked to a telephone line and alert the authorities if the quarantined leave their homes or try to break the tag. The government had to resort to such measures because several people ordered to stay at home did not, the ministry said. Private security officers served quarantine orders to 200 people on Thursday and installed the electronic picture cameras at the homes of all 490. The total number diagnosed with the lethal illness has hit 133. Nine have died in the city-state. The ministry said 12 people broke home quarantine orders since they were started March 25. They are required to stay in their homes for 10 days. ``This irresponsible behaviour presents not just a risk to the public but can also cause other hospitals to become contaminated with SARS,'' said Health Minister Lim Hng Kiang. ``If you have been given a home quarantine order, then abide by it,'' he added. In one case, a woman under stay-home orders came down with a fever and went to see her general practitioner without revealing she was under quarantine, the ministry said. Two days later, when her fever had not gone down, her relatives broke their quarantine and brought her to the National University Hospital (NUH) instead of using the ambulance service to Tan Tock Seng Hospital, the only one designated to treat SARS patients. She is now down with SARS and confined in NUH's intensive care unit because she is too sick to be transferred. Her husband was diagnosed with SARS Thursday. The cameras can be switched on and off by users to maintain their privacy. When health officials call, the quarantined person must switch on the camera and stand in front of it. Breaking a quarantine order for the first time can result in a 5,000-Singapore-dollar (2,840-U.S.) fine. A repeat offender can be fined 10,000 Singapore dollars or jailed for six months. Starting Friday, a 10-day quarantine will be slapped on all new foreign workers entering Singapore from SARS-hit countries. The quarantine will be imposed on work-permit and employment-pass holders coming into the city-state from the World Health Organization's (WHO's) list of countries affected by SARS. These include China, Hong Kong, Taiwan, Vietnam and Canada. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From levitte at openssl.org Thu Apr 10 14:17:43 2003 From: levitte at openssl.org (Richard Levitte - VMS Whacker) Date: Thu, 10 Apr 2003 23:17:43 +0200 (CEST) Subject: [ANNOUNCE] OpenSSL 0.9.7b and 0.9.6j released Message-ID: <20030410.231743.87997703.levitte@openssl.org> OpenSSL version 0.9.7b and 0.9.6j released ========================================== OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 0.9.7b of our open source toolkit for SSL/TLS. This new OpenSSL version is a security and bugfix release and incorporates at least 7 changes and bugfixes to the toolkit (for a complete list see http://www.openssl.org/source/exp/CHANGES. We also release 0.9.6j, which contains the same security bugfix as 0.9.7b and a few more small bugfixes compared to 0.9.6i. The most significant changes are: o Security: counter the Klima-Pokorny-Rosa extension of Bleichbacher's attack [0.9.7b & 0.9.6j] o Security: make RSA blinding default. [0.9.7b & 0.9.6j] o Configuration: Irix fixes, AIX fixes, better mingw support. [0.9.7b] o Support for new platforms: linux-ia64-ecc. [0.9.7b] o Build: shared library support fixes. [0.9.7b & 0.9.6j] o ASN.1: treat domainComponent correctly. [0.9.7b] o Documentation: fixes and additions. [0.9.7b] We consider OpenSSL 0.9.7b to be the best version of OpenSSL available and we strongly recommend that users of older versions upgrade as soon as possible. OpenSSL 0.9.7b is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html): o http://www.openssl.org/source/ o ftp://ftp.openssl.org/source/ For those who want or have to stay with the 0.9.6 series of OpenSSL, we strongly recommend that you upgrade to OpenSSL 0.9.6j as soon as possible. It's available in the same location as 0.9.7b. The distribution file name is: o openssl-0.9.7b.tar.gz [normal] MD5 checksum: fae4bec090fa78e20f09d76d55b6ccff o openssl-0.9.6j.tar.gz [normal] MD5 checksum: 52ea996e52bcea5120f193f51469bbb1 o openssl-engine-0.9.6j.tar.gz [engine] MD5 checksum: beae194a369a74de18b4c3472a1d1abe The checksums were calculated using the following command: openssl md5 < openssl-0.9.7b.tar.gz openssl md5 < openssl-0.9.6j.tar.gz openssl md5 < openssl-engine-0.9.6j.tar.gz Yours, The OpenSSL Project Team... Mark J. Cox Ben Laurie Andy Polyakov Ralf S. Engelschall Richard Levitte Geoff Thorpe Dr. Stephen Henson Bodo Möller Lutz Jänicke Ulf Möller --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From declan at well.com Thu Apr 10 21:12:55 2003 From: declan at well.com (Declan McCullagh) Date: Fri, 11 Apr 2003 00:12:55 -0400 Subject: The secret government marches on... In-Reply-To: <3E95D492.297.2E99556@localhost>; from jamesd@echeque.com on Thu, Apr 10, 2003 at 08:31:14PM -0700 References: <"from <20030410182034.A6071@cluebot.com> <3E95D492.297.2E99556@localhost> Message-ID: <20030411001255.A9458@cluebot.com> On Thu, Apr 10, 2003 at 08:31:14PM -0700, James A. Donald wrote: > You have failed to read the article -- he tells us when he > wrote it. Read his article, and fit the timeline of the events > he describes, against the timeline of events the other article > describes. The time at which he claims to have visited the > airport in his account was an hour or two before the attack > began in the mainstream account. You are incorrect. As I said, I read the article. It was reposted from another site and it is anything but clear when it was filed. The New York Times has a timestamp and datestamp; the reposted one did not. Perhaps I'm missing something obvious here, but I'm not interested in defending this fellow further. My only points, which I trust has been made emphatically enough at this point, are: Don't attribute to malice what can be explained by honest mistakes; and journalists rarely have the full story at the best of times. -Declan From shaddack at ns.arachne.cz Thu Apr 10 15:47:23 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Fri, 11 Apr 2003 00:47:23 +0200 (CEST) Subject: "Stay Behind" strategies in Iraq In-Reply-To: <3E95E50F.DE696F4@cdc.gov> Message-ID: On Thu, 10 Apr 2003, Major Variola (ret) wrote: > >to the buried supplies, > > If that's a real problem then look into investing in ground-penetrating > radar equiptment. > Not just for archeologists any more... The sand there is littered with dead steel, with empty carcasses of deceased tanks from Iraq-Iran war. Large metal bodies can be used to hide smaller metal objects, in our case smaller weapon caches. From cripto at ecn.org Thu Apr 10 17:30:20 2003 From: cripto at ecn.org (Anonymous) Date: Fri, 11 Apr 2003 02:30:20 +0200 (CEST) Subject: Boycott the USA. Message-ID: <44e3b259947d7553bd288242f9a3ff82@ecn.org> Just Testing. From kvanhorn at ksvanhorn.com Fri Apr 11 05:38:56 2003 From: kvanhorn at ksvanhorn.com (Kevin S. Van Horn) Date: Fri, 11 Apr 2003 07:38:56 -0500 Subject: Capture of Saddam Hussein Message-ID: <3E96B760.8080800@ksvanhorn.com> Rumsfeld gives press conference on the whereabouts of Saddam Hussein Doha, Qatar (Routers) In response to questions as to when coalition forces anticipated capturing Saddam Hussein, U.S. Secretary of Defense Donald Rumsfeld had the following reply: (Sung to the tune of "Ticket to Ride", by the Beatles) In spite of thousands of bombs, I'm sorry to say, yeah, Osama first, now Saddam Has gotten away! He's gone to Tikrit to hide, He's gone to Tikrit to hide, He's gone to Tikrit to hide, Hope he stays there. He said living in Baghdad Was gettin' him down, yeah. He could never be free With Frank's troops around. He's gone to Tikrit to hide, He's gone to Tikrit to hide, He's gone to Tikrit to hide, Hope he stays there. Don't know why our drones fly so high, They're always searching, Fruitlessly searching, To see The hideout of this dictator guy, They're always searching, Fruitlessly searching, To see. In spite of thousands of bombs, I'm sorry to say, yeah, Osama first, now Saddam Has gotten away! He's gone to Tikrit to hide, He's gone to Tikrit to hide, He's gone to Tikrit to hide, Hope he stays there. From jamesd at echeque.com Fri Apr 11 08:30:35 2003 From: jamesd at echeque.com (James A. Donald) Date: Fri, 11 Apr 2003 08:30:35 -0700 Subject: The secret government marches on... In-Reply-To: <3E96380A.6010707@ksvanhorn.com> Message-ID: <3E967D2B.9670.57C8DC7@localhost> -- James A. Donald wrote: > > but his claim was that the US was nowhere near the airport, On 10 Apr 2003 at 22:35, Kevin S. Van Horn wrote: > His claim was that he couldn't see them, and that even the > mainstream reports put them many kilometers away, if you read > them carefully. A truthful report would have read as follows: "US claimed its forces were on the outskirts of the Airport. The minister for information denied that US forces were anywhere near reported, and offered to permit newsmen to tour the airport. The ministry of information minders took the the newsmen to the airport lounge, but did not permit them to get anywhere near the outskirts of the airport, let alone tour it, which shows the minister to be lying about permitting newsmen to see for themselves, which would suggest the minister is lying the location of US forces, and the US telling the truth. Instead, Fisk conspicuously fails to mention that the minders are controlling the newsmen in a way that prevents them from knowing what he claims to know, and instead proclaims that the minister is telling the truth, and the US lying Fisk omits critical facts, and confidently claims to know what he was not permitted to know. The one is a lie of omission, the other a lie of commission. Fisk conceals from his readers the fact that it is impossible to check on the lies of a totalitarian state, and denies barefaced the fact that promises to allow such checking are always lies. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG r1bxpJ7VZETqopavASLrWpcoBbAT8s1kyWEEd3bw 4QwAleCULDpfKQBa3TU6SXNZetICTYpqbww+2vya/ From jamesd at echeque.com Fri Apr 11 08:56:22 2003 From: jamesd at echeque.com (James A. Donald) Date: Fri, 11 Apr 2003 08:56:22 -0700 Subject: "Stay Behind" strategies in Iraq In-Reply-To: <93981C4A-6BE1-11D7-99EC-0003930F2360@got.net> References: <3E9630A5.6010505@cdc.gov> Message-ID: <3E968336.8294.5942A22@localhost> -- On 10 Apr 2003 at 22:51, Tim May wrote: > Meanwhile, most of the nation's 20,000,000 will continue to > rely on handouts. Observe that as the regime falls, Iraqis behave like American blacks, which suggests that the cause of the problem is the welfare state, rather than racism or genetics. This conjecture is also supported by the fact that black people did not start burning their homes and neighbourhoods until after the war on poverty. > I said that no major ghetto/slum area, whether Calcutta or > South-Central LA or Baghdad has ever, in memory, gone to > nearly full employment. I'm a libertarian, not a do-gooder: I > realize that more and more people are simply useless eaters. > The useless eaters in Baghdad, Basra, etc. will Given the right environment -- the US permits capitalism but steals all the oil, the Iraqis have the potential to become civilized. I was hugely impressed by the released POWs marching home. The Kurds took their weapons, stole their shoes and did not give them any food, but they were happy about the prospect of walking hundreds of miles through the desert with no shoes and no food, because they were going home. They looked to me like people who when they got home would promptly set to finding work. Unfortunately, if the US steals the oil, though it would doubtless be good for the Iraqis, it would be bad for the US, because any government bureaucracy that gets its own income source goes even further out of control. > You're showing your statist/idealist roots. It's not a matter > of "the US could keep the Iraqis poor." No more so than the > U.S. is keeping the South-Central LA negroes poor, or the > Calcutta natives poor. Socialism is keeping Arabs poor. Because oil fits the socialist model of wealth as something to be distributed, rather than produced, oil encourages socialism. > It's good for Iraq that they have oil. Having oil is always > better than not having oil. Oil is an attractive nuisance. Attracts gangs of men with guns. While Iraq has oil, Iraqis do not have oil and never will. Observe the richest newly developed countries are those with absolutely zero resources, Hong Kong with nothing but rock, Singapore with nothing but sandbanks. Better to burn it all. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG k5SHSQaf+VEflp1CSiqxXyHZux3jldT2hhE5yCot 44vgdA5Tm2aXTmEtuka/1zYNv8Oi+KB6acGAlt3R4 From sunder at sunder.net Fri Apr 11 06:15:52 2003 From: sunder at sunder.net (Sunder) Date: Fri, 11 Apr 2003 09:15:52 -0400 (edt) Subject: bomb recipie from household ingridients. In-Reply-To: <3E96BDA7.D2ABF79A@ccs.bbk.ac.uk> Message-ID: Here you go: http://www.foodnetwork.com/food/recipes/recipe/0,,FOOD_9936_9143,00.html Frozen Caramelized Banana and Chocolate Bombe Recipe courtesy Emeril Lagasse, 2000 Recipe Summary Yield: 8 servings For the Ice Cream: 4 tablespoons butter 1/2 cup firmly packed light brown sugar 3 ripe bananas, peeled, sliced lengthwise in half and cut crosswise into 1/4-inch thick slices 2 tablespoons banana liqueur 2 tablespoons dark rum 2 cups milk 2 cups heavy cream 6 egg yolks 2 cups chocolate mousse, recipe follows For the Garnish: 2 tablespoons butter 1/4 cup firmly packed light brown sugar 2 large bananas, peeled and sliced crosswise into 1/4-inch slices 1 cup chocolate sauce, (in a squeeze bottle), recipe follows In a large saute pan, over medium heat, melt the butter. Add the brown sugar and stir until the sugar dissolves. Add the bananas and cook, stirring for 3 minutes. Remove the pan from the heat and carefully add the liqueur and rum. Return the pan to the stove and carefully ignite the alcohol and shake the pan until the flames die down, about 30 seconds. Remove from the heat and cool completely. In a medium saucepan, over medium heat, combine the milk and cream. Bring the mixture to a scalding point. In a mixing bowl, beat the egg yolks. Add the cream mixture about 1/4 cup at a time to the beaten eggs, whisking well after each addition. Pour the mixture back into the saucepan, and cook, stirring, over medium heat until the mixture becomes thick enough to lightly coat the back of a spoon, 2 to 3 minutes. Remove from the heat and pour the mixture into a large glass mixing bowl. Add the pureed bananas and stir to mix. Cover the top with plastic wrap pressed against the surface and let cool. Place the mixture in the refrigerator and chill completely. Pour the banana mixture into an ice cream machine and follow the manufacturer's instructions for the churning time. **If you leave the ice cream in the freezer for a while before completing the pie, be sure to let it soften up a bit first. To assemble: Line 1 cup molds with plastic wrap. Spread 3/4 cup of the ice cream over the bottom and sides of the individual 1 cup molds. Spoon 1/4 cup of the chocolate mousse in the center of the mold. Fill the mold with the remaining ice cream. Wrap the molds in plastic wrap and refrigerate until firm. For the garnish: In a saute pan, over medium heat, melt the butter. Add the sugar and stir to dissolve. Cook the sugar mixture for 1 minute. Add the bananas and continue to cook for 1 minute. Remove from the heat. To serve, drizzle each plate with the chocolate sauce. Unmold the bombes and place in the center of each plate. Spoon the banana mixture over each bombe and serve immediately. QUICK CHOCOLATE MOUSSE Recipe courtesy Emeril Lagasse 8 ounces semisweet chocolate, chopped 1 1/2 cups heavy cream 1/2 teaspoon pure vanilla extract Combine all of the ingredients in a saucepan, over medium heat, and bring to a simmer. Cook until the chocolate melts completely, whisking occasionally. Remove from the heat, pour into a glass bowl and cool completely. Cover with plastic wrap and refrigerate until well chilled. In an electric mixer with a wire whip, beat until the cream forms firm peaks. Yield: 2 1/2to 3 cups CHOCOLATE SAUCE Recipe courtesy Emeril Lagasse 3/4 cup half-and-half 1 tablespoon butter 1/2 pound semisweet chocolate chips 1/4 teaspoon pure vanilla extract Combine the half-and-half and butter in a small heavy-bottomed saucepan over medium heat. Heat the mixture until a thin paper-like skin appears on the top. Do not boil. Add the chocolate and vanilla and stir until the chocolate melts and the mixture is smooth. Remove from the heat and let cool. Yield: 1 1/2 cups Episode#: EM1D03 Copyright ) 2003 Television Food Network, G.P., All Rights Reserved ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ On Fri, 11 Apr 2003, Ken Brown wrote: > Hnic123ola at aol.com wrote: > > > can you tell me how to make a household bomb > > Yep. > > Get a few packs ofcigarettes and a lighter. > > Turn on the gas hob on the cooker but don't light it. > > Sit down with a good book and read it until you have smoked all the > cigarettes. > > The world will then have fewer trolls. From timcmay at got.net Fri Apr 11 10:00:15 2003 From: timcmay at got.net (Tim May) Date: Fri, 11 Apr 2003 10:00:15 -0700 Subject: Looting of museums, banks, shops, factories--South Central LA writ large Message-ID: <10EB4306-6C3F-11D7-9925-000A956B4C74@got.net> Baghdad will be a basket case for decades to come... The power vacuum as the old regime left, and as U.S. soldiers are staying out of any police action, has given widespread looting. Probably by a mix of the peasants grabbing everything they can, factional revenge, and even deliberate arson by "stay behind" forces. Abu Dhabi t.v. is showing hundreds of scenes of small shops being looted. Shop-owners face financial devastation, as their stock is taken...they probably either have no insurance (their fault, of course), or war exclusions or loss of records as the buildings are burning will prevent any compensation. No fire service, no water for fire-fighting. It looks from the several satellite channels I am monitoring that more infrastructure/business damage is happening as a result of the looting and arson than from the 1991 and 2003 bombing campaigns combined. And with no sign that it will stop until every business has been stripped bare and torched. CNN reports that the national museums have been looted, with the Sumerian and Babylonian artifacts carted off by thousands of looters. One analyst said a lot of ancient artifacts will be appearing over the next several years in European art auctions. (In cases where the Sacred Bowl of Hammarabi is not being used as a cooking bowl by a family in Saddam City.) The long-term implications are clear: Baghdad will not be much of a tourist attraction or regional cultural center for many years to come. This will of course worsen the basket case nature of Iraq and will probably result in the eventual (maybe sooner rather than later) return of a "strong man" regime. And Americans will be expected to "rebuild" Baghdad. Ain't gonna happen. Stealing our money to rebuild a country we bombed because we didn't like their leader is going to be further grounds for action against Washington, D.C. (Too bad we can't cause its government to evacuate so the negroes can rampage and finish _it_ off the way Baghadis are destroying their city.) --Tim May, Occupied America "They that give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -- Benjamin Franklin, 1759. From declan at well.com Fri Apr 11 07:23:58 2003 From: declan at well.com (Declan McCullagh) Date: Fri, 11 Apr 2003 10:23:58 -0400 Subject: The secret government marches on... In-Reply-To: <3E96B126.4F38F326@ccs.bbk.ac.uk>; from k.brown@ccs.bbk.ac.uk on Fri, Apr 11, 2003 at 01:12:22PM +0100 References: <"from <3E95E6CE.2543.33132D9@localhost> <3E96B126.4F38F326@ccs.bbk.ac.uk> Message-ID: <20030411102358.E15303@cluebot.com> On Fri, Apr 11, 2003 at 01:12:22PM +0100, Ken Brown wrote: > And he *is* a good writer - even if you disagree with him you have to > admit that his latest piece is worth reading: > http://argument.independent.co.uk/commentators/story.jsp?story=395707 > The bit about Corporal Breeze from Michigan is a gem. Brings tears to > your eyes. If Fisk ever gives up watching Arabs getting shot at maybe he > could get a scriptwriting job for Steven Spielberg. Yes. This is fine reporting. Not sure I agree with his conclusions, but it's sobering stuff. -Declan From jya at pipeline.com Fri Apr 11 11:03:38 2003 From: jya at pipeline.com (John Young) Date: Fri, 11 Apr 2003 11:03:38 -0700 Subject: The secret government marches on... In-Reply-To: <20030411102358.E15303@cluebot.com> References: <3E96B126.4F38F326@ccs.bbk.ac.uk> <"from <3E95E6CE.2543.33132D9@localhost> <3E96B126.4F38F326@ccs.bbk.ac.uk> Message-ID: Fisk writes: "But within seconds, the marble had fallen away to reveal a foundation of cheap bricks and badly cracked cement." These are the same materials used on the Lincoln Memorial, and most monuments: the surface is one thing, the under layers quite different. That's the truth of monuments, not to say news reporting, underlayed with advertising -- which most often is more accurate than the journo-school-stylized reporting. Fiction, advertising, was invented to gloss "non-fiction" until it was found more successful to reverse the osmosis. Headlines, bylines, lead syntactic paragraphs, reliable sources, eyewitneses, the artful couture of dissimulation, padding, shaping the substance to fit the consumer, at the executive level, National Intelligence. The NYT, for one, heavily loads its 3rd page with lingerie ads when the front page is grimmest. Brits, more civilized, lead with tits and ass, with news positioned later where it belongs among the mongrelized detritus. If you want to see if a monument, a news forum, is authentic strip away its surface, its credentialism. A good one has no surface, demands no upfront credulity, it's all solid same-throughout substance, earned case by case, not powdered and rouged with a perdurable masthead, plagiarized battle flags aflutter. Embeddeds couldn't be happier camp followers, catching and pitching initimacies of the censored battlefield. No real gore, not at all, you have to go overseas to gander that porn. Check the front page of the WSJ today about the Cunt encouraging young Marines to do talk therapy for news-squeaky-clean agony of watermeloning Iraqis defending their homeland. As if Lon Horuchi was consulting on patriotic head shots, faking remorse, doing a job, staying alive, weeping about it, chickenshits. From jei at cc.hut.fi Fri Apr 11 01:08:28 2003 From: jei at cc.hut.fi (Jei) Date: Fri, 11 Apr 2003 11:08:28 +0300 (EET DST) Subject: Put a Z in ISONews Message-ID: http://www.theregister.co.uk/content/6/30180.html Put a Z in ISONews By Ashlee Vance in San Francisco Posted: 09/04/2003 at 23:23 GMT The people behind ISONEWs are mulling legal action to fight the "illegal and abusive" seizure of the domain by the US Department of Justice. The DoJ seized the URL, but not - it turns out- the site, in February, with the intention of turning it from what was a bible for the discerning software copier into a repository of anti-piracy propaganda. ISONews quickly returned to the Internet with the slightest of modification to its URL at IzoNews.com. The new domain has a pop-up that explains the shift and surrounding legal battle, which is printed in full below: Dear Isonews user, As you know, the ISONEWS.COM domain was recently seized by the US Government in accordance with a court case against former owner David Rocci. A few months prior to the seizure, the domain was sold to a third party located outside of the USA, and has since been under the control of new ownewship, which makes the seizure of the domain illegal and abusive. At the present time, we are in contact with our lawyers to see what our legal options may be. We are fully aware of the fact that taking legal action will be very expensive and time consuming. For the moment we have decided to temporarily move the website to a new domain, so that all users can remain in contact and we may continue building a strong website for future users to distribute information freely. IZONEWS.COM will be the new location of the website, where you will find the same forums and information as before. Please help us win this battle against Goliath and spread the word on our domain name! Thanks for sticking with us, and Long live the freedom of information! Sincerely, The IZONEWS Team www.izonews.com A note on the original ISONews domain makes it quite clear that the address belongs to the U.S. government. The Feds seized the domain, when David Rocci, 22, pleaded guilty to "conspiring to import, market and sell circumvention devices known as modification (or "mod") chips in violation of the Digital Millennium Copyright Act". Rocci was sentenced to five months in prison, five months of home detention, three years of probation and a $28,500 fine. . From mv at cdc.gov Fri Apr 11 11:57:26 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 11 Apr 2003 11:57:26 -0700 Subject: Ari Fleisher on hit list? Message-ID: <3E971016.2080202@cdc.gov> http://www.thisislondon.com/til/jsp/modules/Article/print.jsp?itemId=4321901 The US military has issued a most-wanted list of 55 former leaders in Saddam Hussein's regime to be pursued, captured or killed. ... Brooks did not identify figures on the list, except to suggest they included Saddam and his minister of information, Mohammed Saeed al-Sahhaf, who boasted of battlefield successes right up to the time he disappeared Tuesday. Information ministers as war criminals? Careful with that hegemony, George. From camera_lumina at hotmail.com Fri Apr 11 09:04:53 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 11 Apr 2003 12:04:53 -0400 Subject: Metaswitch cleared by FBI for spying Message-ID: Interesting. I'll have to read that J-STD-025A. -TD ALAMEDA, Calif. -- MetaSwitch, supplier of the VP3500, the industry's first true Next Generation Class 5 Switch, announced today that it has completed an extensive review with the FBI, which demonstrates that the MetaSwitch CALEA specification meets the J-STD-025A standard for circuit switching equipment. CALEA, the Communications Assistance for Law Enforcement Act, requires that U.S. carriers provide Law Enforcement Agencies (LEAs) with the continued ability to perform electronic surveillance with existing and new telecommunications switching equipment. Electronic surveillance consists of either the interception of call content (commonly referred to as wiretaps) and/or the interception of call-identifying information (commonly referred to as dialed-number extraction). "We simplified providing CALEA compliance for our customers by incorporating CALEA functionality on-board the MetaSwitch VP3500 rather than requiring additional external equipment", said John Lazar, Vice President of Sales and Marketing. "We are ensuring the completeness of our solution with ongoing testing with the FBI." In light of the current uncertainty in world events, electronic surveillance is becoming increasingly important as a tool for law enforcement agencies. Therefore it is vital that vendors and telecommunications carriers develop and deploy solutions that support electronic surveillance, in both traditional TDM and next generation packet-based networks. Technical requirements or standards for CALEA capabilities have been established for several categories of telecommunications by industry associations or standard-setting organizations, in consultation with representatives of the law enforcement community. The Telecommunications Industry Association (TIA) and Committee T1, standards organizations, are currently working on a further revision, J-STD-025B to cover packet based networks. Metaswitch _________________________________________________________________ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail From jamesd at echeque.com Fri Apr 11 12:06:28 2003 From: jamesd at echeque.com (James A. Donald) Date: Fri, 11 Apr 2003 12:06:28 -0700 Subject: The secret government marches on... In-Reply-To: <3E96B126.4F38F326@ccs.bbk.ac.uk> Message-ID: <3E96AFC4.32000.6423479@localhost> -- "James A. Donald": > > Here is Fisk's article http://tinyurl.com/995f > > > > Here is the mainstream article http://tinyurl.com/9966 > > > > They contradict each other. Therefore one or both is > > lying. Since we now have good cause to believe the > > mainstream article true, it follows that Robert Fisk is > > lying. On 11 Apr 2003 at 13:12, Ken Brown wrote: > They really don't contradict each other. One says the Iraqi minister of information told the truth at his conference on the third of April, and the US lying in its press release of thursday the third of April, the other says the US telling the truth, and the Iraqi information minister lying on the third of April > Fisk's article implies that the journalists set off at 1400 > Iraqi time - that is 2300 New Zealand. The article is dated > April 4th, so he is presumably talking about the events of > April 3rd - which is confirmed on the copy of the same > article at http://robert-fisk.com/articles210.htm He > mentions dusk, so its a fair bet he turned up in the late > afternoon and left at nightfall (a sensible thing to do in a > place that gets regularly bombed) The US claimed on the third of April that US forces were on the outskirts of the airport. The minister of information responded on the third of April claiming that US forces were nowhere near the airport. So you interpret the article as Fisk truthfully saying he was unable to check the claims of the Iraqi information minister? But that interpretation contradicts not only the overall tone and impression of Fisk's article, but also the plain words of the article, which proclaimed the minister of information to be telling the truth, and the Americans to be lying. > The BBC reports on April 4th said the US took the airport > "overnight" The question at issue is not when US forces took the airport, but when US forces reached "the outskirts" of the airport. Fisk lied. The US reached "the outskirts" of the airport on the morning of thursday the third of April. The US announced this, referring to "the outskirts of the airport", the minister denied it, and Fisk claimed to confirm the ministers denial, though in reality no newsmen were permitted to check the minister's claims. > Exactly what Fisk wrote - the Ministry took the journalist to > the airport, there were no Americans there. The US claim (3rd April) was that Americans were on "the outskirts". The minister of information did not merely deny that American troops were relaxing in the airport lounge, he denied that US troops were anywhere near the airport. The goons from the ministry of information did not permit the newsmen to see the outskirts, a most curious restraint, a restraint that Fisk neglects to mention. > Anyway Baghdad is a big city and this is NOT a war with rigid > front lines (one of the reasons the Iraqis managed to capture > logistical support staff). It is perfectly possible that > someone could be 20 km west from the city centre but not in > visual contact with US ground units only 15km from it, or > that a small US reconnaissance force watching over the > airport from one direction could be invisible to journalists > looking at it from another. Yes, fog of war and all that. But Fisk did not merely say that he did not know, he said he did know, and supported that pretended knowledge by deceptively omitting crucial facts -- that the newsmen got a guided tour to the airport lounge and back to Baghdad, a tour that curiously that omitted any opportunity to check the facts in dispute, curiously failed to show what had been promised would be shown. The fact that the newsmen were not taken around the outskirts shows that had they been taken there, they would have encountered US troops. Obviously, if US troops had not been massing on the outskirts of the airport, preparatory to taking it, the guided tour would have included the outskirts, since on the third of April, the outskirts were the issue in dispute. > Fisk is no friend of the US government - though from reading > his stuff I think he hates the Ba'athists and the other > middle-east kleptocracies even more, Assuming he is Baghdad at all, which I very much doubt, why no mention of the Ministry of information minders? If he did not love totalitarian terror regimes, why omit this crucial fact? Saudi Arabia is a kleptocracy. Baathism is totalitarian. The fact that you are unaware of this shows where Fisk's heart lies. He wants a world of slavery and terror. > The two articles you quote are really about different things > - the US paper is doing a roundup of the events of the day, > with a gung-ho spin on it; the main thrust of Fisk's piece is > in fact about how the Iraqi propaganda is widely disbelieved > by Iraqis - using the absurd monuments to the so-called > victory against Iran as an image of the bombastic rubbish the > Ba'athist government spouted - and comparing it with two > pieces of US propaganda that he thinks were untrue. The old moral equivalence deal. Stalin supposedly equals McCarthy. But they were not morally equivalent, and he did not merely say he thought they were untrue, he claimed to have seen with his own eyes that one of those "pieces of US propaganda" was untrue, when we now know it was true. US troops *were* on the outskirts, and were massing preparatory to an attack which took place shortly after the journalists visit. > The Americans are saying "we will inevitably win a glorious > victory". > > Fisk is saying "all governments are liars in wartime". No, the Americans were saying "we have reached the outskirts of Baghdad airport", and Fisk was saying "Americans have not reached the outskirts of Baghdad airport." But now we know they had reached the outskirts of Baghdad airport. > NB the Independent publishes most of Fisk's columns in their > "Argument" section, i.e. as opinion, not reportage. But Fisk adds authority to his opinions by claiming to report from Baghdad. > > Probably Fisk did not know where the American forces were, > > but he assured the reader, with great confidence, that he > > did know. > No he didn't, he assured his readers that he knew where they > *weren't* - that is right in front of him. He assured his readers that US troops were not on the outskirts of Baghdad airport, but they were on the outskirts of Baghdad airport. By omitting to mention the journalists were taken on a guided tour by Ministry of information minders, a tour that conspicuously failed to show them the outskirts, he gave his readers an entirely false impression of what was in front of those journalists. As to what was in front of him, I suspect his desk in England. > Your rhetorical tricks are transparent. Such as contrasting > the phrase "Fisk's article" with "mainstream article" - > implying that Fisk and his paper are not "mainstream", are > somehow marginal. Fisk mainly works for the London paper > called the Independent. I don't read it much but it is > certainly "mainstream". Full of commies. Lunatic fringe totalitarians, adherents of a dying religion, sticking to the edicts of a dead party. They are starting to blend in with flying saucerists and neo Nazis. A decade or two down the line we will may well hear that Trotsky did not die, but was taken in a flying saucer to a distant planet, from which he will return to lead us to utopia. > It is boring, somewhat staid, establishment-oriented > broadsheet newspaper - politically probably in around the > same small-l-liberal-but-not-radical place as the New York > Times. Recollect the New York times on the Ukraine famine. While Stalin was torturing peasants to extort their seed corn, the New York Times denied everything, and was naturaly awarded the Pulitzer prize for their courageous denial of the story. Since then the former Soviet Union has come to its senses, but the New York Times remains married to blood and death, insulated from reality by their own little Berlin wall > It's mainly read by middle-aged middle-class Londoners Upper crust, more likely, like the New York times -- the kind of people who could imagine themselves as the planners in a totalitarian terror state. The people who tend to imagine themselves as the planned, rather than the planners, working class people, are not so keen on terror and slavery. > And he *is* a good writer - even if you disagree with him you > have to admit that his latest piece is worth reading: > http://argument.independent.co.uk/commentators/story.jsp?stor > y=395707 The bit about Corporal Breeze from Michigan is a > gem. Brings tears to your eyes. If Fisk ever gives up > watching Arabs getting shot at maybe he could get a > scriptwriting job for Steven Spielberg. He certainly has lots of experience writing fiction, but selective ommission is more his style. When he tells of the Olympic sports offices, run by Uday Hussein being looted, you get the impression of these wicked looters wrecking this innocent happy sports facility, neglecting to mention that Uday would get his kicks torturing sportsmen and sports women to death. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG yeIfWr0m3sQrpZeptpMuj4rGUQbBtyZu6kY5uILT 4gpdPwnMq5gq6jaYrMmOeN8GyAlT85f1B8MYaKVNs From mv at cdc.gov Fri Apr 11 12:17:17 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 11 Apr 2003 12:17:17 -0700 Subject: "Stay Behind" strategies in Iraq Message-ID: <3E9714BD.4543EB74@cdc.gov> (resent) At 10:51 PM 4/10/03 -0700, Tim May wrote: >On Thursday, April 10, 2003, at 08:04 PM, Major Variola (ret) wrote: >> >> Ok, the Iraqis will work in the 7-11s which serve the yankees. >> Some Iraqis will do better. They will inspire others. They will >> also be used by psyops to argue for "the american dream" for >> Iraqis. And although exploited by psyops, I think all humans >> want to improve their circumstance. > >You're arguing for what you would like to see, whereas what I'm talking >about is that there is unlikely to be any surge in employment in this >hand-out nation. Not what I'd like to see; what the US will encourage. The US (or its puppets) will use .iq's oil money to pay for .iq reconstruction jobs, and then steady-state jobs. To think otherwise is to ignore the motivations and means of the USG. >There simply is no prospect that significantly more than the small >fraction of Iraqis who now service the oil industry will be employed. >Doubling oil production, which is essentially impossible, would only >double a small number...or not quite double, as newer facilities will >be even more automated. So use oil money to create agricultural projects which use lots of labor. Iraq has water. (When we take Saudi Arabia we can build desalination plants..) I'm saying that if the problems you describe arise, the USG will try to reduce them, for the USG's benefit. I don't see how you can ignore the 800 lb gorilla with the A-10 backup. I don't see how observing this makes me socialist. Analyst, maybe, socialist, no. >Meanwhile, most of the nation's 20,000,000 will continue to rely on >handouts. >I said that no major ghetto/slum area, whether Calcutta or >South-Central LA or Baghdad has ever, in memory, gone to nearly full >employment. I'm a libertarian, not a do-gooder: So am I. But I recognize the existance of non-libertarian agents like the USG and their ability to use resources (oil) for social placation. Social placation which favors USG interests. Shit, a lot of Americans will admit (if pressed) that USG domestic welfare is to prevent the South Centrals from rioting. And Iraq is not even burdened with those US pathologies or the US constitution. >> Yes, the US could keep the Iraqis poor. But its not in the USG >> interest. The USG wants MTV in every Arab home. (Albeit this will >> piss off the Islamo Fundies, but they're >> already majorly pissed.) > >You're showing your statist/idealist roots. It's not a matter of "the >US could keep the Iraqis poor." No more so than the U.S. is keeping the >South-Central LA negroes poor, or the Calcutta natives poor. You grossly misunderstand. The US now owns Iraq. The US can physically keep Iraqis poor if it wishes ---put them all in internment camps, feed them a meal at a time. (How is this statism? Its a statement of brutal fact, a consequence of who has the biggest guns.) The US can also give them all satellite TVs & trust funds if it wishes, using either your taxes or Iraq's oil sales money. Now my claim is that 1. the USG interest is in Americizing Iraq, and that 2. (having the guns) they will do so, whether the Iraqis want it or not. My claim is also that the oil is easier to spend than US tax dollars in the long run. I have yet to see you refute any of these. I also fail to see how this makes me statist. *Recognizing* state actions doesn't mean I endorse them. I suppose I'm also making a claim that the entire population there isn't permenantly, chronically South Central LA, i.e., that the US manipulation will work to some extent. >I suppose the U.S. could order Iraqi National Oil to hire tens of >thousands of people to polish the pipes, wipe down the derricks, spoon >up the spilled oil, and other make-work jobs. Still a drop in the >bucket. > >Basically, Iraq went through a standard Turd World birth boom, doubling >its population and then doubling it again in just a couple of >generations. Look at the statistics on how many Iraqis are under 15. Yep. But you realize that the high-youth populations of various arab nations are succeptible to Americanization, and that the USG knows this, right? And will exploit this for the USG's ends. >They dispersed handouts to the breeders, who now number 20 million, >crowded into several major cities and a dozen smaller cities. You are also aware of how, after a population gets Americanized, they start using birth control? Chicks wanting college, more money per family member the fewer there are, no need for agricultural labor. [Alas world-Americanization is happening too slowly and the population bomb is slowly detonating] >Modern refineries cannot afford to have people running around with >wrenches and screwdrivers, tweaking and reading gauges. The plants >either run with few people or they are doomed. Ok. Perhaps I am wrong about the number of pipe-polishers and folks employed in satellite industries (incl. the Iraqis who repair Halliburton Mercedez). Then the USG will create labor-consuming 'reconstruction' projects then. Using your or Iraqi resources, it doesn't much matter if its not an election year. I'm stating future history, not what I personally want, Tim. I think I've stated clearly enough that this the USG acting (without serious opposition) in pure USG interest. >Finally, for now, a friend of mine for the past 28 years is the son of >a former Chevron head of research and development (at the Bay Area >refineries...also lightly staffed). This V.P., Dr. John Scott, told me >many years ago just how few people it takes to run the crackers and >distillation towers. Ok, then only a few Texans will be over there. Smaller exposure. Fewer targets. Still, the USG will create native jobs out of USG interests. >It's good for Iraq that they have oil. Having oil is always better than >not having oil. But any notion that any expansion of the oil business >is going to magically employ millions of Iraqis who are not now >employed is silly. Do the math. Every arabian kingdom with oil has little but oil money. That the monarchs of the region use it for welfare (and thus their own security) is no different from the USGs plan. Only folks it doesn't work on are the Fundies, as the Shah (et al) found out. >> the US imposed 'interim' govt will tax this to >> fund things (like jobs, or even sinecures) that win favor. Why? >> Because the govt worries more about Iraqi/Arab backlash more >> than Halliburton's profits. For a while, anyway. > >Silliness. Prices are set by markets. No one is claiming that >Halliburton will get the bulk of the oil profits. But Halliburton will >not do its thing (drilling services, extinguishing fires, etc.) except >at prices they find acceptable. Of course, a company is rational, xor extinct. What I mean is, the new USIRAQ will "own" the oil, much like the Saudi kings do. They may let others pump it, refine it, move it (all those parties making a profit), but USIRAQ will use its take for Americanization. >You seem to have some kind of fantasy going on about Iraq's oil economy >somehow giving jobs to millions of Iraqis who have no skills, no work >experience. Optimism has blinded you. Do the math. Not optimism, mere modelling of agents and their means and motivations. >> If you liquidate the towelhead kings >> of the region, you might find a lot of distributable wealth >> (I'm not a socialist, neither am I an admirer of monarchy.) >> which the US conquerers would distribute. A great way >> to curry favor with the populace. Libertarian ideals don't >> prescribe a way to distribute land-based wealth in the region, >> though I'd love to be corrected. >> > >"Redistributing the oil wealth" will not do anything except lead to a >further doubling and tripling of the population. The moral hazard of >handing out free stuff is itself enough to derail real markets. But it won't be *free*, the Iraqis will have to work for the dinars with George's face on them. A sinecure counts as work, geopolitically, as long as the oil is there to pay for it. (And the bricklayers and fibre-laying crews will be busy with real work at first.) For psyops-dignity control the jobs can't be *too* fake. Do not import street-sweeping machines if you need to employ lots of street-sweepers. A doubling takes more than a decade. You can do a lot of social manipulation in that time. Free birth control at the oil-paid-for clinics. TV time for agreeable clerics, jail for disagreeable ones. Odd to see you underestimate the capabililties of a blood & oil crazed US unencumbered by even shreds of a bill of rights. ... ...our claim to be left in the unmolested enjoyment of vast and splendid possessions, mainly acquired by violence, largely maintained by force, often seems less reasonable to others than to us." -- Winston Churchill, January 1914 From jal at jal.org Fri Apr 11 10:28:58 2003 From: jal at jal.org (Jamie Lawrence) Date: Fri, 11 Apr 2003 12:28:58 -0500 Subject: The secret government marches on... In-Reply-To: <3E967D2B.9670.57C8DC7@localhost> References: <3E96380A.6010707@ksvanhorn.com> <3E967D2B.9670.57C8DC7@localhost> Message-ID: <20030411172858.GL14414@jal.clueinc.net> On Fri, 11 Apr 2003, James A. Donald wrote: > Instead, Fisk conspicuously fails to mention that the minders > are controlling the newsmen in a way that prevents them from You mean, something similar to say, placing them in military units chosen by minders in Washington, and saying "that's what you get" when non-"embedded" reporters die*. > Fisk omits critical facts, and confidently claims to know what > he was not permitted to know. I'd love an example to discuss. > The one is a lie of omission, the other a lie of commission. > Fisk conceals from his readers the fact that it is impossible > to check on the lies of a totalitarian state, and denies > barefaced the fact that promises to allow such checking are > always lies. So your assertion is that reporting what a government body is saying is wrong, and failing to say that they may be saying things that may be propoganda is wrong. Are you similarly pissed at Fox? Please share with the group. -j *I'm not saying the US intentionally killed reporters. I don't know if that is an accurate analysis or not. It is a war, and shit happens. -- Jamie Lawrence jal at jal.org "And don't tell me there isn't one bit of difference between null and space, because that's exactly how much difference there is." - Larry Wall From jamesd at echeque.com Fri Apr 11 12:42:55 2003 From: jamesd at echeque.com (James A. Donald) Date: Fri, 11 Apr 2003 12:42:55 -0700 Subject: The secret government marches on... In-Reply-To: <20030411172858.GL14414@jal.clueinc.net> References: <3E967D2B.9670.57C8DC7@localhost> Message-ID: <3E96B84F.24320.663932F@localhost> -- James A. Donald wrote: > > Instead, Fisk conspicuously fails to mention that the > > minders are controlling the newsmen in a way that prevents > > them from On 11 Apr 2003 at 12:28, Jamie Lawrence wrote: > You mean, something similar to say, placing them in military > units chosen by minders in Washington, and saying "that's > what you get" when non-"embedded" reporters die*. When the regime fell, the embedded reporters mostly wandered off from their units, ceased to be embedded. This shows that the violence inhibiting reporting was the violence of the regime. When the regime fell, the press became free. James A. Donald: > > Fisk omits critical facts, and confidently claims to know > > what he was not permitted to know. Jamie Lawrence > I'd love an example to discuss. He confidently claimed to know that US troops were nowhere near the outskirts of the airport, when the Ministry of Information did not permit reporters to see or visit the outskirts of the airport. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG eD/eqsXBtVNuDXHQaF/zzdK8ReRDHeCZ8r0Cz2LZ 4GRV6snc/JSU1ULsbq9WthWWT96N82LFnfpiQ5y1M From jamesd at echeque.com Fri Apr 11 12:42:55 2003 From: jamesd at echeque.com (James A. Donald) Date: Fri, 11 Apr 2003 12:42:55 -0700 Subject: "Stay Behind" strategies in Iraq In-Reply-To: <3E96C1C7.A423B203@ccs.bbk.ac.uk> Message-ID: <3E96B84F.11671.66392FD@localhost> -- On 11 Apr 2003 at 14:23, Ken Brown wrote: > In some districts but not all. Apparently - I'm no expert & > just relaying info from a friend who at least has the > advantage of being able to speak Arabic and who keeps up with > Arab news media - quite large parts of the agricultural > sector are all but feudal. Large farms or whole villages or > counties are organised on tribal or clan lines, sometimes > resembling the caste systems of India, with landowners coming > from one group (usually in recent years in cahoots with the > Ba'athists of course) and other clans being landless peasants > who get work as labourers. They are not landowners, at least not as westerners understand owning land The Sheiks are as hostile to private property rights as commies or Baathists. In Palestine, when the British tried to register land ownership, the people you describe as landlords engaged in armed resistance. Hence the Israeli argument that they are not dispossessing Palestinians, it is all state property, on which Palestinians happen to be illegally squatting. The Israelis intepreted what you are calling landowners as politically controlling people residing on state owned land. The British interpreted them as politically controlling small private landowners. Much truth in both these interpretations. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG VTMuzOnpoG1p472PapPi1XoJv53GB9odRkOU7Vbr 47If06Af2zrBtY/1yqg+88xHT0zPZ6DvfRZ5V6ns2 From jal at jal.org Fri Apr 11 10:52:35 2003 From: jal at jal.org (Jamie Lawrence) Date: Fri, 11 Apr 2003 12:52:35 -0500 Subject: "Stay Behind" strategies in Iraq In-Reply-To: <3E968336.8294.5942A22@localhost> References: <3E9630A5.6010505@cdc.gov> <3E968336.8294.5942A22@localhost> Message-ID: <20030411175235.GM14414@jal.clueinc.net> On Fri, 11 Apr 2003, James A. Donald wrote: > > It's good for Iraq that they have oil. Having oil is always > > better than not having oil. > > Oil is an attractive nuisance. Attracts gangs of men with > guns. While Iraq has oil, Iraqis do not have oil and never > will. Observe the richest newly developed countries are those > with absolutely zero resources, Hong Kong with nothing but > rock, Singapore with nothing but sandbanks. I find it strange (not because I disagree with the thrust of James' arguments, but because he's usually bent on an idealist crusade) that I completely agree. I'll find if odd if the US regime finishes the term without attacking another target that (a) doesn't have much in the way of self defense and (b) is in the way of bringing oil to market. -j -- Jamie Lawrence jal at jal.org "Remember, half-measures can be very effective if all you deal with are half-wits." - Chris Klein From rah at shipwright.com Fri Apr 11 10:06:54 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Fri, 11 Apr 2003 13:06:54 -0400 Subject: On the permanence of poverty in the face of property and progress (was Re: "Stay Behind" strategies in Iraq) In-Reply-To: <826A6F77-6B8C-11D7-9925-000A956B4C74@got.net> References: <826A6F77-6B8C-11D7-9925-000A956B4C74@got.net> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 12:42 PM -0700 4/10/03, amid a veritable ejaculation of gleeful pro-totalitarian paranoia, oddly prefaced with some economic sense, Tim May wrote: >(Because a slum of a few million people has essentially nowhere in >the world ever climbed out of poverty, even in well-developed >countries with strong free market systems. At least not in the past >several decades. Reasons left as an exercise.) Okay, I'll bite. There is a counter-example: Sao Paulo, Brazil, but that's the exception that proves the rule. Actually, now that I think about it, it isn't an exception, it's proof of a new rule. The solution to the above "exercise" is private property, which is what's happening to Brazil's favellas, in spite of a recently elected communist government, which, as we discovered with our own Clinton administration was more show than go. Like entropy, you can't unwind progress, boys and girls, particularly economic progress, which, like financial to political cryptography, is the only progress that matters. Knowledge is persistent. More and more former slums are being reclaimed because of private property. (I hate the word "capitalism", because it's a Marxist code-word for "economics".). Think about what happened in Chile, or the the South Bronx, or what's happening right now in Calcutta and Bombay. Or Mexico City. See Hernando DeSoto, for, um, more exercise. Wishfully thinking that we're going to end up with an economic inversion, with the US the last socialist country on earth, is probably not going to happen either. The world is not a static place. Static models, and static assumptions, do not apply. The above sample of von Misian "calculatory" thinking is what topples hierarchical totalitarians everywhere, and we shouldn't engage in it here, of all places. I think that people in Iraq will make more money than their other Arab brethren and laugh their totalitarians out of the room, just like we did here in the US to the Weather Underground, or the Symbianese Liberation Army, or, soon enough, ANSWER. It'll happen even faster if the US can keep the UN, and other "non-government" government organizations, out of Iraq. At least Tim's right about them. Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPpb16cPxH8jf3ohaEQIRJACfd/LQtfl59fuvNhtRKzJ5WfPHDQ4AoIJQ 37/YVcOiVnFkG3IlbAC0NGhA =WZBg -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From k.brown at ccs.bbk.ac.uk Fri Apr 11 05:12:22 2003 From: k.brown at ccs.bbk.ac.uk (Ken Brown) Date: Fri, 11 Apr 2003 13:12:22 +0100 Subject: The secret government marches on... References: <"from jamesd"@echeque.com> <3E95E6CE.2543.33132D9@localhost> Message-ID: <3E96B126.4F38F326@ccs.bbk.ac.uk> "James A. Donald" wrote: [...] > You do not date it by the datestamp, you date it by the events > to which Robert Fisk refers. > > > Perhaps I'm missing something obvious here > > I do not think you have read the article. > > Here is Fisk's article http://tinyurl.com/995f > > Here is the mainstream article http://tinyurl.com/9966 > > They contradict each other. Therefore one or both is lying. > Since we now have good cause to believe the mainstream article > true, it follows that Robert Fisk is lying. They really don't contradict each other. Fisk's article implies that the journalists set off at 1400 Iraqi time - that is 2300 New Zealand. The article is dated April 4th, so he is presumably talking about the events of April 3rd - which is confirmed on the copy of the same article at http://robert-fisk.com/articles210.htm He mentions dusk, so its a fair bet he turned up in the late afternoon and left at nightfall (a sensible thing to do in a place that gets regularly bombed) The BBC reports on April 4th said the US took the airport "overnight" i.e. evening of April 3rd to morning of 4th - that is after Fisk's visit. The other article you refer to actually CONFIRMS Fisk's account: >During the day, the ministry organized a trip to the airport for reporters in the >capital, and they filmed the empty runways and terminals. Yet within hours, >artillery and rocket fire erupted in the region and military officials said an assault >on Saddam International Airport had begun. Exactly what Fisk wrote - the Ministry took the journalist to the airport, there were no Americans there. If there had been Americans there earlier it was a small raid, not a major attack (hence the reference to the Moscow trams) and they had gone away again (or maybe were hiding). The big attack happened the night after these events. The BBC website accounts of the day agree with this, as do those on the website of, for example, the Houston Chronicle (the first US paper whose URL I remembered). They describe the attack on the airport as being overnight, finishing on the morning of the 4th. The only mention of it on the 3rd I found is a quote from an interview with Rumsfeld: "He refused to comment on reports that coalition forces had launched an assault on Baghdad International Airport, about ten miles outside the city." Anyway Baghdad is a big city and this is NOT a war with rigid front lines (one of the reasons the Iraqis managed to capture logistical support staff). It is perfectly possible that someone could be 20 km west from the city centre but not in visual contact with US ground units only 15km from it, or that a small US reconnaissance force watching over the airport from one direction could be invisible to journalists looking at it from another. I believe thos guys are quite good at not being seen when they don't want to be. Fisk is no friend of the US government - though from reading his stuff I think he hates the Ba'athists and the other middle-east kleptocracies even more, try reading http://news.independent.co.uk/world/fisk/story.jsp?story=76415 He certainly puts a heavy spin on what he sees, but there is no actual lying apparent in these article and no contradiction between them. The two articles you quote are really about different things - the US paper is doing a roundup of the events of the day, with a gung-ho spin on it; the main thrust of Fisk's piece is in fact about how the Iraqi propaganda is widely disbelieved by Iraqis - using the absurd monuments to the so-called victory against Iran as an image of the bombastic rubbish the Ba'athist government spouted - and comparing it with two pieces of US propaganda that he thinks were untrue. The Americans are saying "we will inevitably win a glorious victory". Fisk is saying "all governments are liars in wartime". Both use the events of the same day to illustrate their different points. NB the Independent publishes most of Fisk's columns in their "Argument" section, i.e. as opinion, not reportage. > > Don't attribute to malice what can be explained by honest > > mistakes; and journalists rarely have the full story at the > > best of times. > > Probably Fisk did not know where the American forces were, but > he assured the reader, with great confidence, that he did know. No he didn't, he assured his readers that he knew where they *weren't* - that is right in front of him. Your rhetorical tricks are transparent. Such as contrasting the phrase "Fisk's article" with "mainstream article" - implying that Fisk and his paper are not "mainstream", are somehow marginal. Fisk mainly works for the London paper called the Independent. I don't read it much but it is certainly "mainstream". It is boring, somewhat staid, establishment-oriented broadsheet newspaper - politically probably in around the same small-l-liberal-but-not-radical place as the New York Times. It's mainly read by middle-aged middle-class Londoners who can't stomach the Murdochised Times but don't want to be seen reading the Guardian (which is much more entertaining but is associated in their minds with social workers, teachers, and flaky new-media types). Fisk's writing is one of the best things about an otherwise often stodgy paper. Your allegation that Fisk was in London at the time is defamatory. He's one of the best-respected British reporters - an occupation, incidentally, which has suffered a far higher casualty rate in this war than the US military have - and has put himself in harm's way in several previous wars. He worked at the Times for years - which is as "mainstream" as journalism gets - and was their Belfast correspondent at the height of the "troubles". And he *is* a good writer - even if you disagree with him you have to admit that his latest piece is worth reading: http://argument.independent.co.uk/commentators/story.jsp?story=395707 The bit about Corporal Breeze from Michigan is a gem. Brings tears to your eyes. If Fisk ever gives up watching Arabs getting shot at maybe he could get a scriptwriting job for Steven Spielberg. From k.brown at ccs.bbk.ac.uk Fri Apr 11 05:36:26 2003 From: k.brown at ccs.bbk.ac.uk (Ken Brown) Date: Fri, 11 Apr 2003 13:36:26 +0100 Subject: 'Peking' vs 'Beijing' References: <20030409140648.GA24499@cybershamanix.com> <20030409180333.M6075-100000@localhost> <20030410022947.GA25749@cybershamanix.com> Message-ID: <3E96B6CA.542F8874@ccs.bbk.ac.uk> Harmon Seaver wrote: > > On Wed, Apr 09, 2003 at 06:17:34PM +0100, Jim Dixon wrote: > > On Wed, 9 Apr 2003, Harmon Seaver wrote: > > > > > The Japanese actually have three written languages -- hiragana, katakana and > > > kanji -- and everybody pretty much uses them all, often at the same time. > > > > These aren't languages. The first two are alphabets - or rather > > syllabaries. They go "ka ki ku ke ko ...", that is, there is a character > > Ah yes, you're right, I mispoke. > Alphabets, scripts, whatever, it is pretty amazing. US kids have enough trouble > learning to read in one alphabet. Aha, Zee Freudian Slip! Just as you confused translation and transliteration before! You obvuiously have some deep psychological confounding of language with the representation of language! Japanese literacy rates are higher than ours, even thought hey have such an apparently complex set of scripts. Every now and again one reads reports of a "dyslexic" English speaker who learns Chinese or Japanese and finds them easier than English. There was at least one man who went to Japan with his parents when he was in his teens, almost unable to read English, learned to read Kanji, and then then found himself able to read in English. I suspect that there is more than one strategy used by learning readers and that most people find alphabets (or syllabaries) simpler to get to grips with but some, for whatever reason, find Chinese-style symbols simpler. Japanese of course uses both so maybe it is possible for someone who finds one system harder than the other to get a boost by concentrating on the other. I don't know, as I know no language other than English. Skilled readers of English *don't* sound out the letters of familiar words in their heads. We recognise words and syllables by their shape, treating each word as if it was a Chinese character. Phonetic approaches are only used for unfamiliar or foreign words. Maybe there is some reason why that "dyslexic" man didn't make the jump from reading letters to reading whole words in English, but once Kanji had got him used to the idea he could transfer it back. When I was a kid the fashion in teaching to read was the "look and say" method - the teacher held up flash cards with pictures and got the kids to say the word. There was no attempt made to start with phonetics or even the alphabet. Today the fashion has swung back the other way. Interesting aside - ancient Egyptian hieroglyphs are actually written in a very similar style to Japanese, mixing up a proto-alphabet and a syllabary (based on the first sound of the name of the object depicted) with "determinatives", heiroglyphs which represent the whole word. If we wrote English like that (which we sometimes do in kid's puzzles) the name "Harmon Seaver" might be written as pictures of a wound, something lying on a table, waves of the sea, a violet, an eagle, a rabbit, and a picture of a man sitting down as the determinative. I wouldn't want to say how we'd write "Jim Dixon" except that if you look at a grammar or dictionary of Ancient Egyptian some of those hieroglyphs were pretty explicit. From k.brown at ccs.bbk.ac.uk Fri Apr 11 05:59:35 2003 From: k.brown at ccs.bbk.ac.uk (Ken Brown) Date: Fri, 11 Apr 2003 13:59:35 +0100 Subject: "Stay Behind" strategies in Iraq References: <3E9630A5.6010505@cdc.gov> <20030411034259.GA29529@cybershamanix.com> Message-ID: <3E96BC37.9451F1AE@ccs.bbk.ac.uk> Harmon Seaver wrote: > > On Thu, Apr 10, 2003 at 08:04:05PM -0700, Major Variola (ret) wrote: > > At 04:03 PM 4/10/03 -0700, Tim May wrote: > > > > >Refineries are built by the Bechtels and Parsons and their European and > > >Japanese counterparts. Most are nearly fully-automated. Again, a > > >comparatively tiny number of locals will be hired. > > Pretty true, I think. I know when I was working down in Mobile, AL, I was > quite surprised to read about how few people were actually employed in those > huge petro-chemical refineries down there. Simply gigantic places with maybe 400 > people working in one. When I worked for an oil company we employed more people in the office than offshore or in the refineries. MOst of the production workers were short-term contractors. One of our refineries blew up and killed nobody though there were over 20 injuries. It was night and there were few people there. These places are well automated. It did lead to one of the odder support calls I ever took - they wanted to know how to get email back on line, and I said we needed to reboot such-and-such a server and they said they couldn't because the building it was in had no roof and it was raining. http://www.hse.gov.uk/hid/land/comah/level3/5A58DEE.HTM http://www.dragon-pictures.com/e21.htm From k.brown at ccs.bbk.ac.uk Fri Apr 11 06:05:43 2003 From: k.brown at ccs.bbk.ac.uk (Ken Brown) Date: Fri, 11 Apr 2003 14:05:43 +0100 Subject: (no subject) References: <182.19392a7d.2bc6a5eb@aol.com> Message-ID: <3E96BDA7.D2ABF79A@ccs.bbk.ac.uk> Hnic123ola at aol.com wrote: > can you tell me how to make a household bomb Yep. Get a few packs ofcigarettes and a lighter. Turn on the gas hob on the cooker but don't light it. Sit down with a good book and read it until you have smoked all the cigarettes. The world will then have fewer trolls. From declan at well.com Fri Apr 11 11:11:26 2003 From: declan at well.com (Declan McCullagh) Date: Fri, 11 Apr 2003 14:11:26 -0400 Subject: The secret government marches on... In-Reply-To: ; from jya@pipeline.com on Fri, Apr 11, 2003 at 11:03:38AM -0700 References: <3E96B126.4F38F326@ccs.bbk.ac.uk> <"from <3E95E6CE.2543.33132D9@localhost> <3E96B126.4F38F326@ccs.bbk.ac.uk> <20030411102358.E15303@cluebot.com> Message-ID: <20030411141126.A17921@cluebot.com> On Fri, Apr 11, 2003 at 11:03:38AM -0700, John Young wrote: > These are the same materials used on the Lincoln Memorial, and > most monuments: the surface is one thing, the under layers quite > different. I had no idea. Now I feel silly for taking photos of the surface without knowing (or asking) what lies underneath. http://www.mccullagh.org/image/1ds-1/lincoln-memorial-statue-2.html http://www.mccullagh.org/image/d30-8/jefferson-statue.html -Declan From k.brown at ccs.bbk.ac.uk Fri Apr 11 06:23:19 2003 From: k.brown at ccs.bbk.ac.uk (Ken Brown) Date: Fri, 11 Apr 2003 14:23:19 +0100 Subject: "Stay Behind" strategies in Iraq References: <826A6F77-6B8C-11D7-9925-000A956B4C74@got.net> Message-ID: <3E96C1C7.A423B203@ccs.bbk.ac.uk> Tim May wrote: > 1. Iraq has been a welfare state for essentially its entire lifetime. > From the 1920s to the 1960s, a typical backwater royalist welfare > state. Since the 1960s, a socialist/central planning/fascist state. In some districts but not all. Apparently - I'm no expert & just relaying info from a friend who at least has the advantage of being able to speak Arabic and who keeps up with Arab news media - quite large parts of the agricultural sector are all but feudal. Large farms or whole villages or counties are organised on tribal or clan lines, sometimes resembling the caste systems of India, with landowners coming from one group (usually in recent years in cahoots with the Ba'athists of course) and other clans being landless peasants who get work as labourers. If true that explains both the surprising extent of weaponry in private hands in the Shi'ite areas - presumably it was the landlords who had the guns - and also the dire poverty and hunger of so many people in what is (unlike the Baghdad region) a fertile and productive agricultural area. From k.brown at ccs.bbk.ac.uk Fri Apr 11 06:25:10 2003 From: k.brown at ccs.bbk.ac.uk (Ken Brown) Date: Fri, 11 Apr 2003 14:25:10 +0100 Subject: "Stay Behind" strategies in Iraq References: <826A6F77-6B8C-11D7-9925-000A956B4C74@got.net> Message-ID: <3E96C236.503C5C94@ccs.bbk.ac.uk> Tim May wrote: [...] > Offhand, even with their 30 million > population, I cannot think of a single "Made in Iraq" item, from even > before the 1990 events. We used to import dates from Iraq. That's all I can think of... From pcapelli at capelli.org Fri Apr 11 12:06:00 2003 From: pcapelli at capelli.org (Pete Capelli) Date: Fri, 11 Apr 2003 15:06:00 -0400 Subject: Ari Fleisher on hit list? References: <3E971016.2080202@cdc.gov> Message-ID: <013e01c3005d$64845ae0$32601b09@warehouse> Actually, he had held other positions in the government before he was information minister. I assume it is those past roles which singled him out for this list. ----- Original Message ----- From: "Major Variola (ret)" To: Sent: Friday, April 11, 2003 2:57 PM Subject: Ari Fleisher on hit list? > http://www.thisislondon.com/til/jsp/modules/Article/print.jsp?itemId=4321901 > > The US military has issued a most-wanted list of 55 former leaders in > Saddam Hussein's regime to be pursued, captured or killed. > > ... > Brooks did not identify figures on the list, except to suggest they > included Saddam and his minister of information, Mohammed Saeed > al-Sahhaf, who boasted of battlefield successes right up to the time he > disappeared Tuesday. > > Information ministers as war criminals? Careful with that hegemony, > George. From camera_lumina at hotmail.com Fri Apr 11 12:37:49 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 11 Apr 2003 15:37:49 -0400 Subject: On the permanence of poverty in the face of property and progress (was Re: "Stay Behind" strategies in Iraq) Message-ID: Tim May wrote... >Because a slum of a few million people has essentially nowhere in >the world ever climbed out of poverty, even in well-developed >countries with strong free market systems. At least not in the past >several decades. Reasons left as an exercise.) And RAH replied: >that's the exception that proves the rule. Actually, now that I think >about it, it isn't an exception, it's proof of a new rule. Well, what about Shanghai, Guangzhou, and a bunch of the other coastal Chinese cities? No doubt they're clearly hammering their way out of any "slum" status, and oddly enough with CCP help. (Of course, there aren't any communists left in the Chinese Communist Party.) Well, 'help' is possibly tto strong a word...the Communist Party has basically been backing out of daily life for 20 years or so. One could also argue that Mumbay/Bombay has a shot of de-slumming. At least, this seems to be one Indian city where the effects of an exploding Indian middle class are more easily seen. In general, I agree. The big slum cities seem to remain slums and get bigger. But the existence of sizable cities where de-slumification is happening indicates this is not the inevitable fate of big slum cities. (Or perhaps there's some slum-line beneath which it becomes exponentially more difficult for cities to crawl out of.) Hey wait...I just forgot about the most obvious counter-example, literally underneath me: New York! (Though 1970s slum-NYC had a lot more character than the present day-washed out self-simulacrum its becomming.) -TD >From: "R. A. Hettinga" >To: cypherpunks at lne.com >Subject: On the permanence of poverty in the face of property and progress >(was Re: "Stay Behind" strategies in Iraq) >Date: Fri, 11 Apr 2003 13:06:54 -0400 > >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >At 12:42 PM -0700 4/10/03, amid a veritable ejaculation of gleeful >pro-totalitarian paranoia, oddly prefaced with some economic sense, >Tim May wrote: > >(Because a slum of a few million people has essentially nowhere in > >the world ever climbed out of poverty, even in well-developed > >countries with strong free market systems. At least not in the past > >several decades. Reasons left as an exercise.) > >Okay, I'll bite. There is a counter-example: Sao Paulo, Brazil, but >that's the exception that proves the rule. Actually, now that I think >about it, it isn't an exception, it's proof of a new rule. > >The solution to the above "exercise" is private property, which is >what's happening to Brazil's favellas, in spite of a recently elected >communist government, which, as we discovered with our own Clinton >administration was more show than go. > > >Like entropy, you can't unwind progress, boys and girls, particularly >economic progress, which, like financial to political cryptography, >is the only progress that matters. Knowledge is persistent. More and >more former slums are being reclaimed because of private property. (I >hate the word "capitalism", because it's a Marxist code-word for >"economics".). Think about what happened in Chile, or the the South >Bronx, or what's happening right now in Calcutta and Bombay. Or >Mexico City. > >See Hernando DeSoto, for, um, more exercise. > >Wishfully thinking that we're going to end up with an economic >inversion, with the US the last socialist country on earth, is >probably not going to happen either. > >The world is not a static place. Static models, and static >assumptions, do not apply. The above sample of von Misian >"calculatory" thinking is what topples hierarchical totalitarians >everywhere, and we shouldn't engage in it here, of all places. > >I think that people in Iraq will make more money than their other >Arab brethren and laugh their totalitarians out of the room, just >like we did here in the US to the Weather Underground, or the >Symbianese Liberation Army, or, soon enough, ANSWER. > >It'll happen even faster if the US can keep the UN, and other >"non-government" government organizations, out of Iraq. At least >Tim's right about them. > >Cheers, >RAH > > >-----BEGIN PGP SIGNATURE----- >Version: PGP 8.0 - not licensed for commercial use: www.pgp.com > >iQA/AwUBPpb16cPxH8jf3ohaEQIRJACfd/LQtfl59fuvNhtRKzJ5WfPHDQ4AoIJQ >37/YVcOiVnFkG3IlbAC0NGhA >=WZBg >-----END PGP SIGNATURE----- > >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _________________________________________________________________ The new MSN 8: smart spam protection and 2 months FREE* http://join.msn.com/?page=features/junkmail From camera_lumina at hotmail.com Fri Apr 11 13:07:17 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 11 Apr 2003 16:07:17 -0400 Subject: "Stay Behind" strategies in Iraq Message-ID: Variola wrote... "Odd to see you underestimate the capabililties of a blood & oil crazed US unencumbered by even shreds of a bill of rights." Could it be that Tim May is just a great big optimist at heart? -TD >From: "Major Variola (ret)" >To: "cypherpunks at lne.com" >Subject: Re: "Stay Behind" strategies in Iraq >Date: Fri, 11 Apr 2003 12:17:17 -0700 > >(resent) >At 10:51 PM 4/10/03 -0700, Tim May wrote: > >On Thursday, April 10, 2003, at 08:04 PM, Major Variola (ret) wrote: > >> > >> Ok, the Iraqis will work in the 7-11s which serve the yankees. > >> Some Iraqis will do better. They will inspire others. They will > >> also be used by psyops to argue for "the american dream" for > >> Iraqis. And although exploited by psyops, I think all humans > >> want to improve their circumstance. > > > >You're arguing for what you would like to see, whereas what I'm talking > > >about is that there is unlikely to be any surge in employment in this > >hand-out nation. > >Not what I'd like to see; what the US will encourage. The US >(or its puppets) will use .iq's oil money to pay for .iq reconstruction >jobs, >and then steady-state jobs. To think otherwise is to ignore the >motivations and means of the USG. > > >There simply is no prospect that significantly more than the small > >fraction of Iraqis who now service the oil industry will be employed. > >Doubling oil production, which is essentially impossible, would only > >double a small number...or not quite double, as newer facilities will > >be even more automated. > >So use oil money to create agricultural projects which use lots >of labor. Iraq has water. (When we take Saudi Arabia we >can build desalination plants..) > >I'm saying that if the problems you describe arise, the USG >will try to reduce them, for the USG's benefit. I don't see >how you can ignore the 800 lb gorilla with the A-10 backup. >I don't see how observing this makes me socialist. Analyst, >maybe, socialist, no. > > > >Meanwhile, most of the nation's 20,000,000 will continue to rely on > >handouts. > >I said that no major ghetto/slum area, whether Calcutta or > >South-Central LA or Baghdad has ever, in memory, gone to nearly full > >employment. I'm a libertarian, not a do-gooder: > >So am I. But I recognize the existance of non-libertarian agents >like the USG and their ability to use resources (oil) for social >placation. Social placation which favors USG interests. > >Shit, a lot of Americans will admit (if pressed) that USG domestic >welfare >is to prevent the South Centrals from rioting. And Iraq is not even >burdened with those US pathologies or the US constitution. > > >> Yes, the US could keep the Iraqis poor. But its not in the USG > >> interest. The USG wants MTV in every Arab home. (Albeit this will > >> piss off the Islamo Fundies, but they're > >> already majorly pissed.) > > > >You're showing your statist/idealist roots. It's not a matter of "the > >US could keep the Iraqis poor." No more so than the U.S. is keeping the > > >South-Central LA negroes poor, or the Calcutta natives poor. > >You grossly misunderstand. The US now owns Iraq. The US can >physically keep Iraqis poor if it wishes ---put them all in internment >camps, feed them a meal at a time. (How is this statism? Its a >statement >of brutal fact, a consequence of who has the biggest guns.) > >The US can also give them all satellite TVs & trust funds if it wishes, >using either your taxes or Iraq's oil sales money. > >Now my claim is that 1. the USG interest is in Americizing Iraq, and >that >2. (having the guns) they will do so, whether the Iraqis want it or not. > >My claim is also that the oil is easier to spend than US tax dollars >in the long run. I have yet to see you refute any of these. I also >fail >to see how this makes me statist. *Recognizing* state actions doesn't >mean I endorse them. > >I suppose I'm also making a claim that the entire population there isn't > >permenantly, chronically South Central LA, i.e., that the US >manipulation >will work to some extent. > > >I suppose the U.S. could order Iraqi National Oil to hire tens of > >thousands of people to polish the pipes, wipe down the derricks, spoon > >up the spilled oil, and other make-work jobs. Still a drop in the > >bucket. > > > >Basically, Iraq went through a standard Turd World birth boom, doubling > > >its population and then doubling it again in just a couple of > >generations. Look at the statistics on how many Iraqis are under 15. > >Yep. But you realize that the high-youth populations of various arab >nations are succeptible to Americanization, and that the USG >knows this, right? And will exploit this for the USG's ends. > > >They dispersed handouts to the breeders, who now number 20 million, > >crowded into several major cities and a dozen smaller cities. > >You are also aware of how, after a population gets Americanized, they >start using birth control? Chicks wanting college, more money per >family >member the fewer there are, no need for agricultural labor. [Alas >world-Americanization is happening too slowly and the population bomb is > >slowly detonating] > > >Modern refineries cannot afford to have people running around with > >wrenches and screwdrivers, tweaking and reading gauges. The plants > >either run with few people or they are doomed. > >Ok. Perhaps I am wrong about the number of pipe-polishers and >folks employed in satellite industries (incl. the Iraqis who repair >Halliburton Mercedez). >Then the USG will create labor-consuming 'reconstruction' projects then. > >Using your or Iraqi resources, it doesn't much matter if its not an >election year. > >I'm stating future history, not what I personally want, Tim. I think >I've stated clearly enough that this the USG acting (without serious >opposition) >in pure USG interest. > > >Finally, for now, a friend of mine for the past 28 years is the son of > >a former Chevron head of research and development (at the Bay Area > >refineries...also lightly staffed). This V.P., Dr. John Scott, told me > >many years ago just how few people it takes to run the crackers and > >distillation towers. > >Ok, then only a few Texans will be over there. Smaller exposure. >Fewer targets. Still, the USG will create native jobs out of USG >interests. > > >It's good for Iraq that they have oil. Having oil is always better than > > >not having oil. But any notion that any expansion of the oil business > >is going to magically employ millions of Iraqis who are not now > >employed is silly. Do the math. > >Every arabian kingdom with oil has little but oil money. That the >monarchs of the region use it for welfare (and thus their own >security) is no different from the USGs plan. > >Only folks it doesn't work on are the Fundies, as the Shah (et al) >found out. > > >> the US imposed 'interim' govt will tax this to > >> fund things (like jobs, or even sinecures) that win favor. Why? > >> Because the govt worries more about Iraqi/Arab backlash more > >> than Halliburton's profits. For a while, anyway. > > > >Silliness. Prices are set by markets. No one is claiming that > >Halliburton will get the bulk of the oil profits. But Halliburton will > >not do its thing (drilling services, extinguishing fires, etc.) except > >at prices they find acceptable. > >Of course, a company is rational, xor extinct. What I mean is, >the new USIRAQ will "own" the oil, much like the Saudi >kings do. They may let others pump it, refine it, move it >(all those parties making a profit), but USIRAQ will >use its take for Americanization. > > >You seem to have some kind of fantasy going on about Iraq's oil economy > > >somehow giving jobs to millions of Iraqis who have no skills, no work > >experience. Optimism has blinded you. Do the math. > >Not optimism, mere modelling of agents and their means >and motivations. > > >> If you liquidate the towelhead kings > >> of the region, you might find a lot of distributable wealth > >> (I'm not a socialist, neither am I an admirer of monarchy.) > >> which the US conquerers would distribute. A great way > >> to curry favor with the populace. Libertarian ideals don't > >> prescribe a way to distribute land-based wealth in the region, > >> though I'd love to be corrected. > >> > > > >"Redistributing the oil wealth" will not do anything except lead to a > >further doubling and tripling of the population. The moral hazard of > >handing out free stuff is itself enough to derail real markets. > >But it won't be *free*, the Iraqis will have to work for >the dinars with George's face on them. >A sinecure counts as work, geopolitically, as long as >the oil is there to pay for it. (And the bricklayers and >fibre-laying crews will be busy with real work at first.) >For psyops-dignity control the jobs can't be *too* fake. >Do not import street-sweeping machines if you need >to employ lots of street-sweepers. > >A doubling takes more than a decade. You can do a lot >of social manipulation in that time. Free birth control at >the oil-paid-for clinics. TV time for agreeable clerics, >jail for disagreeable ones. > >Odd to see you underestimate the capabililties of a >blood & oil crazed US unencumbered by even shreds >of a bill of rights. > >... >...our claim to be left in the unmolested enjoyment of vast and splendid > >possessions, mainly acquired by violence, largely maintained by force, >often seems less reasonable to others than to us." -- Winston Churchill, > >January 1914 _________________________________________________________________ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail From camera_lumina at hotmail.com Fri Apr 11 14:34:02 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 11 Apr 2003 17:34:02 -0400 Subject: Metaswitch cleared by FBI for spying Message-ID: Well, a secure H.323 is certainly better than nothing, but as of right now the world looks like its going to remain circuit switched for a long time. That means most standard telephone calls will potentially be under scrutiny, unless encryption is used at the end points. And I guess that's where one would ultimately want to do that anyway... -TD >From: Thomas Shaddack >To: Tyler Durden >CC: >Subject: Re: Metaswitch cleared by FBI for spying >Date: Fri, 11 Apr 2003 23:07:30 +0200 (CEST) > > > > ALAMEDA, Calif. -- MetaSwitch, supplier of the VP3500, the industry's >first > > true Next Generation Class 5 Switch, announced today that it has >completed > > an extensive review with the FBI, which demonstrates that the MetaSwitch > > CALEA specification meets the J-STD-025A standard for circuit switching > > equipment. > >What's the chance to amend the H.323 specs with end-to-end encryption, >and/or make publicly available design of phone switching system built on >fully open designs, something that the user can audit and amend, something >over which nobody but the user has the control? > >There are already general steps in the right direction out there, see eg. >http://www.openh323.org/ and http://www.opencores.org/ - could even be a >good small-to-medium size business for the manufacturers of the hardware, >generic boards for the PABXes - boards with interface circuits, and empty, >user-programmable FPGAs? An open-source FPGA core firmware could come free >with the package, or developed in-house to suit needs (or, most likely, >combination of both approaches - build the function from blocks). > >Then we'd get cheaper private switchboards with guaranteed NO CALEA >"extensions", full knowledge of what's inside (and the associated chance >to do our own in-house service without need of expensive vendor service >contracts and dependency on their servicemen). > >Fully open, fully documented designs are the only doable way of getting >infrastructure building blocks that aren't vulnerable to incorporating >(either by the vendor being forced by law, or by "voluntary cooperation") >of little agents of Big Brother. > >Or did I smoked one puff too much? > > _________________________________________________________________ Add photos to your e-mail with MSN 8. Get 2 months FREE*. http://join.msn.com/?page=features/featuredemail From mv at cdc.gov Fri Apr 11 18:41:41 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 11 Apr 2003 18:41:41 -0700 Subject: Quote of the day: Another CI Chief Goes Down Message-ID: <3E976ED5.4090004@cdc.gov> "If a determined person is bent on espionage, no security system can prevent him. I say "him" because, interestingly, very few espionage subjects have been women," he wrote. "I've always wondered why that is. Women must be more reliable and trustworthy. (My wife is reading this, so I had to say that.)" ---William Cleveland Jr., head of counter intelligence programs at Livermore, who was fucking a double-agent who passed nuke secrets to the chinese http://story.news.yahoo.com/news?tmpl=story2&cid=564&ncid=564&e=2&u=/nm/20030411/ts_nm/crime_spy_resignation_dc_3 From ericm at lne.com Fri Apr 11 18:53:02 2003 From: ericm at lne.com (Eric Murray) Date: Fri, 11 Apr 2003 18:53:02 -0700 Subject: Looting of museums, banks, shops, factories--South Central LA writ large In-Reply-To: <10EB4306-6C3F-11D7-9925-000A956B4C74@got.net>; from timcmay@got.net on Fri, Apr 11, 2003 at 10:00:15AM -0700 References: <10EB4306-6C3F-11D7-9925-000A956B4C74@got.net> Message-ID: <20030411185302.A12834@slack.lne.com> On Fri, Apr 11, 2003 at 10:00:15AM -0700, Tim May wrote: > Baghdad will be a basket case for decades to come... > > The power vacuum as the old regime left, and as U.S. soldiers are > staying out of any police action, has given widespread looting. It seems as if we're standing by and letting it happen on purpose. Part of the plan to ensure Iraq's slave status for years to come? A way to make the bulk of the population yearn for any government, even a blatant US puppet state? Eric From rah at shipwright.com Fri Apr 11 16:57:51 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Fri, 11 Apr 2003 19:57:51 -0400 Subject: Ari Fleisher on hit list? In-Reply-To: <013e01c3005d$64845ae0$32601b09@warehouse> References: <3E971016.2080202@cdc.gov> <013e01c3005d$64845ae0$32601b09@warehouse> Message-ID: At 3:06 PM -0400 4/11/03, Pete Capelli wrote: > Actually, he had held other positions in the government before he was >information minister. I assume it is those past roles which singled him out >for this list. He was a foreign minister who blew it, and was demoted to his, um, former current job. He earned his Baath party bones, way back when, ratting out his brother-in-law, an Iraqi general, to assassins back in the 60's. Here's hoping he's currently residing in a crater somewhere... Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From timcmay at got.net Fri Apr 11 19:57:57 2003 From: timcmay at got.net (Tim May) Date: Fri, 11 Apr 2003 19:57:57 -0700 Subject: The sacking of Baghdad In-Reply-To: <20030411185302.A12834@slack.lne.com> Message-ID: <90AB9294-6C92-11D7-9925-000A956B4C74@got.net> On Friday, April 11, 2003, at 06:53 PM, Eric Murray wrote: > On Fri, Apr 11, 2003 at 10:00:15AM -0700, Tim May wrote: >> Baghdad will be a basket case for decades to come... >> >> The power vacuum as the old regime left, and as U.S. soldiers are >> staying out of any police action, has given widespread looting. > > It seems as if we're standing by and letting it happen on purpose. > > Part of the plan to ensure Iraq's slave status for years to come? > > A way to make the bulk of the population yearn for > any government, even a blatant US puppet state? > Something like this. When we smashed Germany and Japan, those nations didn't burn and loot every major building, store, factory, etc. There may have been several reasons for this. For example, we accepted the formal surrender of both nations, leaving their "management" in place for at least the transition period (more so in Japan than in Germany, for various reasons). This time around our government was so fixated on the eee-vils of Soddom (*) that we simply sought to destroy everything connected with the leadership...and they got the message and bugged-out, suddenly, perhaps well aware of the chaos it would throw the country and the capital into. (* Strangely, there is far less build-up to why we proles should be hating Soddom than there was in the past. With the Iran hostages, there was a year or more of "one minute hates" devoted to why the "Ayotollah" was Satan Incarnate. Songs like "Bomb Iran," sung to the tune of the Beach Boys/Jan and Dean song "Barbara Ann." ("Bomb, bomb, bomb..., bomb Iran!") With Iraq 1, six months to prepare for war. This time, very little. Most Americans I know don't even hate Saddam all that much. Sure, he's a dictator like dozens we have seen. So?) The vacuum in Baghdad, Mosul, Basra, etc., is like the vacuum after the sacking of Rome. Or the sacking of Baghdad by the liberators from the east 800 or so years ago. In fact, this whole thing is just that, the sacking of Baghdad. --Tim May From mv at cdc.gov Fri Apr 11 21:02:24 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 11 Apr 2003 21:02:24 -0700 Subject: Looting of museums, banks, shops, factories--South Central LA writ large Message-ID: <3E978FD0.9090506@cdc.gov> What is up with looting hospitals? I can see grabbing the fun meds, but the rest of it? Who do they think they're screwing with this? Looting govt offices is just payback, like bombing an IRS office. Looting merchants is just lowlife theivery, like Los Angeles, unless the merchants were state-licensed or pro-state, in which case payback may also be involved. (E.g., Bombing Fox News vs. Starbucks or Walmart) (There was also a racial motivation in LA, as some smaller merchants were Korean and the rioters were Negroes, and the riots themselves were racially instigated. I haven't heard of similar Sunni/Shiite differences motivating Iraqi rioters; I don't know if they can tell each other apart by sight, or by language.) At least the Marines actually have ammo in their weapons. The LA Nat'l Guardsmen didn't. From shaddack at ns.arachne.cz Fri Apr 11 14:07:30 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Fri, 11 Apr 2003 23:07:30 +0200 (CEST) Subject: Metaswitch cleared by FBI for spying In-Reply-To: Message-ID: > ALAMEDA, Calif. -- MetaSwitch, supplier of the VP3500, the industry's first > true Next Generation Class 5 Switch, announced today that it has completed > an extensive review with the FBI, which demonstrates that the MetaSwitch > CALEA specification meets the J-STD-025A standard for circuit switching > equipment. What's the chance to amend the H.323 specs with end-to-end encryption, and/or make publicly available design of phone switching system built on fully open designs, something that the user can audit and amend, something over which nobody but the user has the control? There are already general steps in the right direction out there, see eg. http://www.openh323.org/ and http://www.opencores.org/ - could even be a good small-to-medium size business for the manufacturers of the hardware, generic boards for the PABXes - boards with interface circuits, and empty, user-programmable FPGAs? An open-source FPGA core firmware could come free with the package, or developed in-house to suit needs (or, most likely, combination of both approaches - build the function from blocks). Then we'd get cheaper private switchboards with guaranteed NO CALEA "extensions", full knowledge of what's inside (and the associated chance to do our own in-house service without need of expensive vendor service contracts and dependency on their servicemen). Fully open, fully documented designs are the only doable way of getting infrastructure building blocks that aren't vulnerable to incorporating (either by the vendor being forced by law, or by "voluntary cooperation") of little agents of Big Brother. Or did I smoked one puff too much? From timcmay at got.net Fri Apr 11 23:19:37 2003 From: timcmay at got.net (Tim May) Date: Fri, 11 Apr 2003 23:19:37 -0700 Subject: Looting of museums, banks, shops, factories--South Central LA writ large In-Reply-To: <3E978FD0.9090506@cdc.gov> Message-ID: On Friday, April 11, 2003, at 09:02 PM, Major Variola (ret) wrote: > What is up with looting hospitals? I can see > grabbing the fun meds, but the rest of it? Who > do they think they're screwing with this? > Looting govt offices is just payback, like bombing an IRS office. > > Looting merchants is just lowlife theivery, like Los Angeles, unless > the merchants were state-licensed or pro-state, in which case payback > may also > be involved. (E.g., Bombing Fox News vs. Starbucks or Walmart) > > (There was also a racial motivation in LA, as some smaller > merchants were Korean and the rioters were Negroes, and > the riots themselves were racially instigated. I haven't > heard of similar Sunni/Shiite differences motivating Iraqi > rioters; I don't know if they can tell each other apart > by sight, or by language.) > > At least the Marines actually have ammo in their weapons. > The LA Nat'l Guardsmen didn't. Whoever you are in reality, your naivete is breathtaking. Why are they looting? To get free stuff. (More intelligent teams were apparently moved in once the looting started. I just got a communication that professional thieves from Cairo and Damascus were quick to realize the opportunities of plundering the national museums and private homes. The silver Harp of Ur alone is worth $4 million.) This looting and collapse is a consequence of the sacking of Baghdad. Perhaps it's part of the plan. Burn off several million useless eaters and maybe there's a chance for a more compliant U.S. client state. As Anne Coulter and her fellow republidykes have suggested, invade their country, take their oil, give their children blue eyes, convert them all to Christianity, and kill those who don't convert. --Tim May From timcmay at got.net Sat Apr 12 00:06:15 2003 From: timcmay at got.net (Tim May) Date: Sat, 12 Apr 2003 00:06:15 -0700 Subject: People converting to the winning side... Message-ID: <402B9C3B-6CB5-11D7-9925-000A956B4C74@got.net> I'm not surprised to see some of my friends and associates (not necessarily on this list...I actually do interact with people off-list) switching sides from being "anti-war" to the other side. They natter about how Saddam was a tyrant (true enough, and there are a hundred other such tyrants), to how he must have had the magical word WMD (no evidence so far, and he certainly didn't use them when he should have), and how this will prove to the A-rabs that America stands tall (debatable). I think of this as warporn. Seeing the tanks blowing up stuff, seeing the "embedded" reporters riding atop the Bradley fighting vehicles like Lawrence of Arabia, seeing what a trillion dollars of defense spending can put into the skies over Iraq...all a kind of warporn. I was and am against the war for a very straightforward and principled reason: it is not a valid function of United States government to be the world's policemen, to be going around removing national figures we have decided we don't like. Whether it results in cheaper oil for Chevron (at the expense of one hundred billion dollars for the rest of us) is not a basis for starting a war. (Oh, I forgot...Congress shall have the power to declare war....but they didn't. This is one of those "police actions" that are not actual legal wars. Maybe the vets should be denied the special pay and death benefits accruing in actual wars.) The U.S. claimed Saddam was a monstrous threat, with a powerful army, with huge caches of "WMD." (Sounds like Israel. Sounds like India. Sounds like Pakistan. Sounds like us, the U.S.) The U.N. inspectors were unable to find the supposed WMD. (The Al-Samoud missile being a pathetic example where the missile met the allowable range with a warhead mounted, but failed the allowable range without a warhead...so the U.S. decided the missile without a warhead was a "WMD" because it exceeded the b.s. allowable range by a handful of miles. Something out of a Saturday Night Live sketch.) The U.N. was unable to find the supposed huge caches...and so far the swarming U.S. troops have failed to do so. Rummy keeps saying "We know they're there...we'll find them soon." (This is about time for Rummy to tell the CIA to throw down the throw down gun.) The Iraqi army was what it has always appeared to be: a Turd World primitive army based on graft and corruption and intimidation of non-officers by officer toadies. In other words, not a serious fighting force. And yet they were portrayed as threatening the world. As Chomsky notes, the Big Lie has been hinted at in such a way that more than half the sheeple in the U.S. are now convinced that Saddam Hussein was behind 9/11. (This whole episode ought to be a major new chapter in "Manufacturing Consent.") I am ashamed of this once liberty-seeking nation and I am ashamed of my friends and associates who have fallen for the warporn and embraced the current imperialism. --Tim May "In the beginning of a change the patriot is a scarce man, and brave, and hated and scorned. When his cause succeeds, the timid join him, for then it costs nothing to be a patriot." -- Mark Twain From bill.stewart at pobox.com Sat Apr 12 01:21:11 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 12 Apr 2003 01:21:11 -0700 Subject: Metaswitch cleared by FBI for spying In-Reply-To: References: Message-ID: <5.1.1.6.2.20030411230408.02bdef60@idiom.com> At 11:07 PM 04/11/2003 +0200, Thomas Shaddack wrote: > > ALAMEDA, Calif. -- MetaSwitch, supplier of the VP3500, the industry's first > > true Next Generation Class 5 Switch, announced today that it has completed > > an extensive review with the FBI, which demonstrates that the MetaSwitch > > CALEA specification meets the J-STD-025A standard for circuit switching equipment. > What's the chance to amend the H.323 specs with end-to-end encryption, > and/or make publicly available design of phone switching system built on > fully open designs, something that the user can audit and amend, something > over which nobody but the user has the control? .. > Or did I smoked one puff too much? Smoke away - the situation is both better and worse than you think :-) H.323 isn't quite dead, but the impressions I've gotten before and at the recent Voice On The Net conference are that SIP is pretty much taking over, and H.323 is at least resting and pining for the fjords, even if nobody's nailed its feet to the perch yet. And some people have addressed encryption issues with SIP, though I'm not sure of the exact standards status. H.323 looks a lot like some of the ISDN protocols - designed by people who didn't really have a clue about how to make things work well on the Internet, but who did like complex and ugly features. SIP isn't perfect, and it apparently has some issues with NAT, but it's a fairly well-behaved Internet-like standard, and there was a lot of work done to make things extensible and modular and let services be provided by networks of servers rather than monoliths. While H.323 is ugly and doomed, it can be used for direct user-to-user calls, and Microsoft did everybody a major favor a few years ago with Netmeeting, which does H.323 for audio, video, and shared whiteboarding, for free, and while it doesn't do conferencing well, it's quite usable for person-to-person calls as long as there's no NAT in the way and everybody runs it, plus it can use an IIS server for tracking who's on. And you can run it over IPSEC, though there's usually overhead. The basic problem SIP tries to solve is to have some method of tracking user presence, and telling users who want to talk to each other how to reach the others systems, with a bunch of optional extra activities like multi-person calls. (If that sounds like what H.323 does, yes, that's true, but H.323 feels like it was designed by someone much worse at programming than Microsoft, vs. solving the same problems on Unix.) If all you wanted to do was let SIP users talk to other SIP users, this would be pretty simple, but that's not the main market - real systems need to talk to existing phone networks as well, and they need to provide many of the standard business features like voicemail and different types of conferencing, and those add lots of complexity. The two main environments this can run in are PBXs (phone switch on customer premises, run by the customer, getting some long-haul from a carrier) and Phone Companies, either local or long distance, who own the old phone infrastructure, may have better economies of scale, and often provide Internet service as well as telephony. IP telephony has lots of ways to build hybrids, and economies of scale matter a lot less in a Stupid Network with the control functions happening on glorified PCs than they did with 1960s phone switches. From the perspective of a Phone Company, the hardest problems with the emerging IP telephony market involve figuring out how to make money while the whole industry is collapsing around us (:-), and some of those methods involve finding new and innovative features that we can provide slightly better than other ISPs because we have a hundred years of experience. (Yes, I realize that the hundred years of experience involves lots of dead weight and useless baggage :-) One of the annoying pieces of baggage that phone companies have in many countries is regulation, and in the US, that includes the CALEA wiretapping rules, which apply to us and don't appear to apply to businesses providing their own phone service using equipment they buy from hardware and software vendors like Cisco and MS, or to those vendors. This annoying baggage not only shows up when we plan consumer telephony evolution, which is mostly in the future, it also shows up when we reply to RFPs from businesses that want people to manage their telephone systems for them. It is not only annoying because it's an offensive invasion of privacy, it's annoying because it's really hard to implement well in an evolving tech environment, and it's annoying because we and some of our competitors have to do it while others of our competitors don't have to. But in a SIP world, there's not much difference between a wiretap and a conference call where one party is on mute, and it's really really easy to build fancy calling features like conferencing. At Voice On The Net last week, our development people were demonstrating interesting systems like "You're on a phone call at your office, and you want to go home but the people you're talking to won't shut up, so you tell your phone to conference in your cellphone, which connects in silently without losing anybody from the call, and you drive home, and when you get there you press keys on your analog cellphone to tell the call that you now want it to switch to the software phone on your PC, and tell the popup window on your PC that you also want the call to play on the speaker in the kitchen while you get yourself a beer". Another generic kind of demo they did was follow-me numbers - the Centrex knows that when you get a call (IP or old-style), it should first try ringing your desk and your lab phone simultaneously and if you don't answer at either of those, try your cell phone if it's before midnight or the caller is on your buddy list. Letting the FBI join in on your call isn't too hard, if they can tell the call control system what to do - the hardest part is finding a way to let all the different kinds of phones Not Warn The User, since most phones are really just software, and the software writers like to add features like "Hey, Bob just joined your conference, do you want to send him the draft of the memo, and do you want to add in his video?" and "Find who's using Music-on-Hold and delete their MP3 collection". It's somewhat different for two-party pure-SIP calls, which can go peer-to-peer, while some of the more complex call types run the voice bits through the call manager or conference bridge so it has a handle to build things with, but of course the calls can often be moved between those environments. http://www.iptel.org/info/products/sipphones.php has a nice list of SIP phones (software and hardware, including free software.) Grandstream makes a nice $75 SIP phone as well. There's a lot of other open source telephony work, much of it sponsored by hardware vendors trying to facilitate their sales. Google. You can take SIP or H.323 and run them through IPSEC tunnels, but there turn out to be some annoying inefficiencies - the IP and RTP headers take up a lot of space, often turning 8kbps compressed voice into about 22-24kbps. You can run compressed headers (cRTP is sort of like the old cslip), cutting it down to 11-12kbps, but only over raw Layer 2 transport, not over IPSEC, which also adds headers. It's cleaner to do the crypto along with the voice compression, and the SIP standards support that (but I don't know how many people use it), though of course anything the SIP helps to set up, the SIP can set up wiretaps for. The other piece of really annoying telco regulation baggage is 911 (emergency telephone service, which some of you non-US folks dial 999 for.) Unlike wiretapping, which is inherently offensive, this part is mainly annoying because it's a hard problem, and regulations can make it impossible for telcos to bid on projects without solving it, plus it's something that customers actually want, unlike wiretapping. With Real Telco Telephones, the phone number tells you what building a phone is in, so 911 can send the fire truck to the right building. With IP telephones, the gateway to the phone company might not be on the same side of the continent as the phone, so calling the local fire trucks is a bad idea, and you can plug your phone in anywhere (if it's hardware) or run your phone software from any PC, maybe over a VPN, so your phone number isn't always in the _same_ wrong place. Some of the IP PBX makers have crude hacks for the problem, but it's hard. From bill.stewart at pobox.com Sat Apr 12 01:35:44 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 12 Apr 2003 01:35:44 -0700 Subject: Looting of museums, banks, shops, factories--South Central LA writ large In-Reply-To: References: <3E978FD0.9090506@cdc.gov> Message-ID: <5.1.1.6.2.20030412012453.02c650c8@idiom.com> At 11:19 PM 04/11/2003 -0700, Tim May wrote: >As Anne Coulter and her fellow republidykes have suggested, >invade their country, take their oil, give their children blue eyes, >convert them all to Christianity, and kill those who don't convert. The Brits did a nice PR spin on some of this - BBC reports that in some town in Southern Iraq, where the secular Baath Party hasn't let the Shiitte muezzin do the public call to prayer for 15 years, the British army has set up a PA system, and made sure they have the religious freedom for the call to prayer again. In Basra, it's a similar story, though in that case the mosque building was destroyed in the 1991 bombing, but Shiite prayers have been banned for more like 30 years, according to the IHT. From bill.stewart at pobox.com Sat Apr 12 01:55:59 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 12 Apr 2003 01:55:59 -0700 Subject: People converting to the winning side... In-Reply-To: <402B9C3B-6CB5-11D7-9925-000A956B4C74@got.net> Message-ID: <5.1.1.6.2.20030412013814.02c473c8@idiom.com> At 12:06 AM 04/12/2003 -0700, Tim May wrote: >I'm not surprised to see some of my friends and associates (not >necessarily on this list...I actually do interact with people off-list) >switching sides from being "anti-war" to the other side. They natter about >how Saddam was a tyrant (true enough, and there are a hundred other such >tyrants), to how he must have had the magical word WMD (no evidence so >far, and he certainly didn't use them when he should have), and how this >will prove to the A-rabs that America stands tall (debatable). My neighbor has been flying a flag on our shared balcony for a couple of years (aargh...) He's a retired pilot, who when he was young was in the Navy; his job was to fly bombers off aircraft carriers and drop nukes on targets, which he said he wouldn't do now. When the war started, I asked him to take it down. He agreed to take it down in a week, unless there were WMDs used in the US, but that it was expressing his concern for the soldiers over there, and also told me that his wife was strongly against the war, and what he'd done in the Navy. A couple days later the flag was down, and he'd said that he'd decided that Bush was lying about all this WMD stuff. ... >As Chomsky notes, the Big Lie has been hinted at in such a way that more >than half the sheeple in the U.S. are now convinced that Saddam Hussein >was behind 9/11. >(This whole episode ought to be a major new chapter in "Manufacturing >Consent.") Yup. On the other hand, at least from what's in the news, the number of Iraqis killed in this war has been pretty low (www.iraqbodycount.org estimates 1100-1400), which is probably pretty close to the number of people killed by dictatorships and other evil governments that the US is supporting, and it's only 4-5 times the number of people Bush had killed as governor of Texas. More to the point, it's less than the average death rate that the UN estimates has been caused by the destruction of the water supplies in the last war and subsequent embargo (about 100K/year.) So if getting rid of Saddam leads the US to rebuilding Iraq for PR reasons, or at least gets rid of the embargo and lets the Iraqis rebuild, things may get better. (On the other hand, after the war's over, we'll probably find that there were a lot more deaths, mainly in bombed buildings.) From jamesd at echeque.com Sat Apr 12 02:52:51 2003 From: jamesd at echeque.com (James A. Donald) Date: Sat, 12 Apr 2003 02:52:51 -0700 Subject: Looting of museums, banks, shops, factories--South Central LA writ large In-Reply-To: References: <3E978FD0.9090506@cdc.gov> Message-ID: <3E977F83.26465.96DB7DE@localhost> -- On 11 Apr 2003 at 23:19, Tim May wrote: > This looting and collapse is a consequence of the sacking of > Baghdad. Perhaps it's part of the plan. Burn off several > million useless eaters and maybe there's a chance for a more > compliant U.S. client state. > > As Anne Coulter and her fellow republidykes have suggested, > invade their country, take their oil, give their children > blue eyes, convert them all to Christianity, and kill those > who don't convert. If that was the plan, the US would do Sudan, not Iraq. What happened was that when the conscript armies collapsed, Saddam threw his highly privileged non conscript police forces into battle, so naturally the US army smashed them. Poof. No police. No police in a nation of twenty million welfare bums. Result, loot and burn. The US army was not expecting this. Remember Narisaya. US army defeated the regular Iraqi army, thought Narisaya done. Proceeds on its merry way, advancing far past Narisaya. Police attack, seriously impairing US ability to supply troops at the front -- people at the front run alarmingly short of food, fuel, and water. Disaster looms. Result. US army wipes out all police everywhere in a nation of welfare bums. That was not the plan, that was an extremely violent reaction to a close brush with disaster. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG da5or2d54+B0YDDe+XcGf9u1Q6Ci33/LFTfqvsPL 4f3E7kWr1ciIuU7/AuIEAxqt3sNcy9/5WE+dIOkBV From jamesd at echeque.com Sat Apr 12 02:52:51 2003 From: jamesd at echeque.com (James A. Donald) Date: Sat, 12 Apr 2003 02:52:51 -0700 Subject: Looting of museums, banks, shops, factories--South Central LA writ large In-Reply-To: <20030411185302.A12834@slack.lne.com> References: <"from timcmay"@got.net> Message-ID: <3E977F83.393.96DB84C@localhost> -- Tim May wrote: > > Baghdad will be a basket case for decades to come... > > > > The power vacuum as the old regime left, and as U.S. > > soldiers are staying out of any police action, has given > > widespread looting. On 11 Apr 2003 at 18:53, Eric Murray wrote: > It seems as if we're standing by and letting it happen on > purpose. It is really hard to police when you do not speak the language. Furthermore, soldiers are terrible as police. They tend to solve all problems by killing the criminals and everyone in the vicinity. The looting will solve itself soon. All regime targets have been looted, which means that everyone now has guns. Naturally the looters start hitting non regime targets. Those targeted proceed to execute looters. Looting rapidly declines. Unfortunately this means that large public hospitals will cease to exist, but small private practices should be resuming soon, a quite satisfactory outcome unless you happen to be seriously injured during the fall of the regime. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG ex1HQoJ2kYJwSMyp5TBLhzTH+6qqwg6ezxbM7VYg 4q2ySdMlUgiPS7jiXdtDmfaD/3tRNLRf0h+f2/RaA From aife at netvisao.pt Fri Apr 11 20:09:34 2003 From: aife at netvisao.pt (=?iso-8859-1?q?Andr=E9=20Esteves?=) Date: Sat, 12 Apr 2003 04:09:34 +0100 Subject: Looting of museums, banks, shops, factories--South Central LA writ large In-Reply-To: <20030411185302.A12834@slack.lne.com> References: <10EB4306-6C3F-11D7-9925-000A956B4C74@got.net> <20030411185302.A12834@slack.lne.com> Message-ID: <200304120409.34809.aife@netvisao.pt> On Saturday 12 April 2003 02:53, Eric Murray wrote: > On Fri, Apr 11, 2003 at 10:00:15AM -0700, Tim May wrote: > > Baghdad will be a basket case for decades to come... > > > > The power vacuum as the old regime left, and as U.S. soldiers are > > staying out of any police action, has given widespread looting. > > It seems as if we're standing by and letting it happen on purpose. > > Part of the plan to ensure Iraq's slave status for years to come? > > A way to make the bulk of the population yearn for > any government, even a blatant US puppet state? > > Eric Nah!!!! Just pure old fashioned incompetence... Running all the way for "Bagdad" Rumsfeld on sleep inibition drugs takes it's toll... Take for example this small news: A group of looters tried to loot a small shop. The shopkeeper's son armed with a kalachnikov made them run away. What they did next? Well, went to a platoon of marines and told they knew where was a a Fedahin Militia with a Kalachnikov... The kid was shot with automatic weapon fire at sight without even been questioned or the information confirmed. The marines are so tired that they don't even think right... http://www.newscientist.com/news/news.jsp?id=ns99993604 (Just being cynical, people..) Now that they are at target, they just want a good night's sleep... No time for civilian patrol... But you could be right. But it also seems to me that this is the perfect oportunity to ramsack the ministries of all information, dossiers and contacts related to terrorism and arab nations and still leave the doubt to those people that all your references in the iraqui system were lost and out of american hands, during the ministry and public fires... Creating doubt to the ennemy in an inteligence operation sometimes gives you the edge you need to achieve your goals... Cheers, Andri Esteves From shaddack at ns.arachne.cz Fri Apr 11 19:53:26 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Sat, 12 Apr 2003 04:53:26 +0200 (CEST) Subject: Metaswitch cleared by FBI for spying In-Reply-To: Message-ID: On Fri, 11 Apr 2003, Tyler Durden wrote: > Well, a secure H.323 is certainly better than nothing, but as of right now > the world looks like its going to remain circuit switched for a long time. > That means most standard telephone calls will potentially be under scrutiny, > unless encryption is used at the end points. And I guess that's where one > would ultimately want to do that anyway... > -TD Which leads me to a different idea. (Or, more accurately, a n-th rehash of the many-times-discussed-already idea.) Something like an embedded computer, dedicated to PGPfone-like device, using a cellphone as its communication unit. Basically, an embedded computer, with audio I/O on one side and audio I/O and serial port on the other one. The unit would connect between the phone and either a hands-free or a handset/headset, acting either as an encryption/decryption device (and using the phone in data-call mode), or as just a passthrough (for nonencrypted ("plainsound"?) calls)). The unit would manage everything from contacts to ringing to encryption of calls and text messages, the phone would act as just a dumb wireless device, without carrying any data (nor contact lists) in itself. The unit would also have to guard the contact lists, stored messages, and other data against retrieval by unauthorized personnel (thieves, investigators...) - phone lists from intercepted phones are important intelligence source on its own. This will also allow us to set the individual phone numbers to specify if the calls/messages to that number are plaintext by default, auto-negotiated, or forced-encrypted, and the certificates or public keys of the other party, allowing checking of the other party's identity. That all is fairly obvious, and isn't difficult with standalone, desktop-class PCs, even with the older ones. A suitable platform for rapid development and deployment seems to be some flavor of embedded Linux (eg, Midori?). This gives us the advantage of having most of the code already available, having to just glue it together. The question is, how much the available technology changed from when these things were being actively developed, what of already-existing devices we can use, if there aren't already enough-powerful devices allowing this mode of operation without having to develop our own hardware, either as PDAs, or as some already-existing embedded control systems. (I was looking around for PC104 boards, but the ones I seen tend to be rather expensive.) There are already whole computers on a single chip. I seen a full-featured 386 capable of running standard Linux kernel, which would fit both the power consumption and size requirements, but is too weak for the required compression and encryption. The technology marches on and the Moore's Law still applies. So it is just the matter of time when suitable components hit the market. My question to anyone who comes into closer contact with this kind of computers is if it by chance already hadn't happened - and if so, details about the available devices. This could be even a decent business opportunity. Make the unit generic enough, make its function dependent only on its software, sell it anywhere without any legal restrictions - and make the secure-phone software available for download, together with eg. GPS car locator software and remote control/telemetry software. This could drive demand high enough to benefit from volume production, which could drive the costs low enough to stimulate demand for secure telephones even between less wealthy people than the market segment for the overpriced Siemens TopSec units. -- ...The best lawyers are Mr. Smith and Mr. Wesson. From jya at pipeline.com Sat Apr 12 06:45:13 2003 From: jya at pipeline.com (John Young) Date: Sat, 12 Apr 2003 06:45:13 -0700 Subject: Irag Piss Poor Compared to 911 Message-ID: There was more fighting and carnage in Gulf War 1 than this piddling latest. This was not a war but a training exercise, a rattling of sabers, gunboat diplomacy. The military provided more information in Gulf War 1 than all the embedded and free-lancers in the latest. Almost no gunship videos and bombs hitting targets compared to GW1, while the US was smothered with talking heads doing not much different than they did in the studio. The videos in Baghdad showed kiddie versions of Iraqi defenses lighting up the sky, just boring shots of a few vehicles moving as if there was nothing much going on. No cowering journalists, breaking glass, running for the basement. If you wanted to kill reporting you could hardly have done better than putting the mouthpieces in the field far from the bombing, and mostly away from the diddly shit combat. The purpose of the war seems to be to scare the bejesus out of likely targets, a display of power a notch or two above a war game, but nothing as thrilling as a movie -- which are showing more warporn and gore than was shown in GW2. The attack on WTC and the Pentagon was much superior politics, theater, diplomacy, art, entertainment, grief, shock and awe. War porn lovers will just have to replay those tapes until a great blockbuster comes again. A liquified gas tanker in San Diego Bay and another off Staten Island. Tens of the highest hazard dams (thousands of them still listed and ranked on the Internet). Several stadia of sports fans. 5 or 6 suspension bridges. None of these need a MOAB to cause more casualties than GWB's GW2. Welfare mutants are not the targets, dream on racist greedy motherfuckers, your fat GWB predatory life style is. The military can't protect you from terrorists, nor can the police from mutants outfucking you every day. Blue-eyed supremacists are chasing the dodo, guns and bombs ineffectual. From mv at cdc.gov Sat Apr 12 10:03:45 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 12 Apr 2003 10:03:45 -0700 Subject: Forced-Entry Warrants & Epidemiology: LA Times: Disease Task Force Eyeing Asians Message-ID: <3E9846F1.1000007@cdc.gov> http://www.latimes.com/news/local/la-me-birds12apr12,1,3978116.story?coll=la%2Dheadlines%2Dcalifornia Disease Task Force Eyeing Asians Authorities are going door-to-door searching for Chinese and Singaporans alike. If the asians appear sick, they are killed on the spot. State and federal agents trying to control the spread of a deadly asian disease have killed 3.4 million asians in Southern California -- some of them household workers-- and have enlisted hundreds of investigators, mail carriers and talkative neighbors to help identify homes with asians. Officials with the Exotic Newcastle Disease Task Force say they must take extreme measures to halt the disease, which spreads like a virulent flu, before it wipes out the state's $3-billion tourism industry. Since the disease was discovered in September in Compton, task force members have placed wide swaths of Southern California under quarantine. They walk door-to-door, searching for sick asians. If an asian is suspected of having the disease, it is killed immediately, in some cases in front of crying employers, teachers, or parents. Asian lovers complain that they are more frightened of the task force than the disease. Actor-producer Jeff Maxwell, whose son is a 22-year-old asian, said he watched in shock as a task force agent last weekend jotted down the address and a description of his Alhambra home and then entered its global positioning satellite coordinates into a hand-held computer. He later learned from his mailman that USDA officials have enlisted the Postal Service into reporting the addresses of asians. The task force has been given "carte blanche to kill any asian on your property or your house regardless of whether it tests positive," Maxwell said. "The thought of somebody driving to my door, which now could happen because I've been identified as housing an asian and coming in and killing my asian in front of me is outrageous." Annette Whiteford, who helps manage the task force on behalf of the state Department of Tourism, has spent months fielding similar complaints from angry and distraught asian employers. "Being on this task force has been depressing because I have been trained to save asians," said Whiteford, a veterinarian. "Now my mission is to save people by killing them. This disease is not pretty." Exotic Newcastle is harmless to livestock but affects virtually all asian races, especially chinese. The uncurable disease causes sneezing, coughing and diarrhea, and can be spread by a speck of saliva carried on the wind. The last time the virus hit the state's tourism industry was in the early 1940s, when 12 million chinese had to be destroyed at a cost of more than $50 million. The disease took almost three years to eradicate. Following the discovery of Newcastle last year, authorities ordered asians in Los Angeles, Orange, Riverside, San Bernardino and San Diego counties quarantined. The lockdown was recently extended to Santa Barbara, Ventura and Imperial counties. New cases have been discovered in Nevada and Arizona. People who move asians out of the quarantined areas could face a $25,000 fine. The task force, formed by the state Department of Tourism and the US Department of Commerce , has been trying to control the virus by killing seemingly healthy asians living within approximately half a mile of infected person. Nearly 2,000 people, many of them out-of-state police and other Federal workers, have been brought in for 21-day rotations on the task force. Agents have set up two busy headquarters, one in Garden Grove and the other in Colton. The task force makes wall-sized charts of infected and quarantined areas in Southern California. Giant red circles blend together in parts of San Bernardino, Riverside and Los Angeles counties. So far, the task force has killed 3.2 million asians at 22 camps and commercial businesses, most of them in San Bernardino and Riverside counties. Nearly 137,000 asians making up 2,343 backyard gangs have also been killed, including 417 such gangs in Los Angeles County, two in Orange County and three in Ventura County. Some wild asians have also been killed. Cases of the disease have been identified in 28 Los Angeles County communities. Lancaster, Little Rock, South El Monte, El Monte and La Puente account for the highest instances of disease in backyard gangs. "Newcastle disease is the hoof-and-mouth disease of asians" said Jack Shere, a doctor who is leading the task force on behalf of the USDoC. "People don't seem to grasp how important that is. The bottom line is you have to euthanize the few to protect the many." Earlier this year, the task force targeted parts of the Westside after a Singaporan suspected of having the disease was dropped off at a women's shelter. Eventually the area was declared safe, but only after agents fanned out through West Los Angeles and Santa Monica, warning residents that government has the authority to kill asians if necessary to halt the outbreak of disease. In February, task force members accompanied by Los Angeles County sheriff's deputies eradicated more than 100 asians at the Little Rock home of Amalia Piceno -- Chinese, Hongkongese, some Singaporans and a pair of Taiwanese named Thelma and Louise. One Chinese was shot from a tree with a .22-caliber rifle. Piceno said the family was paid $1,254 for the losses. "They don't care about your feelings," Piceno said Friday, breaking down in tears as she recalled the incident. "They even destroyed all the beds we had. I said, 'Who's going to pay for that?' and they told me, 'Not us.' " Last month, task force members, accompanied by police officers, showed up at Deanna Wood's home in Mira Loma. Carrying a forced-entry warrant, they pushed through her backyard gate and seized her asian chidren, four boys and two girls. They placed the kids in a large cardboard barrel. Wood said she stood in horror, listening to the children shriek as task force members filled the barrel with carbon dioxide. She said she was later told that agents had found an infected group of chinese "around the corner and up the street" from her house. "I feel like I've lost seven members of my family," Wood said. Jittery leaders of the Asian Society of Los Angeles are circulating a bulletin to its members: "Be prepared not to allow a task force member entry into your home, no matter how polite they seem.... If no law enforcement officer is with them, call 911 for help. Keep a shotgun handy, with buckshot or slugs." Daina Castellano, an Asian Society board member, said she has spent hours consoling traumatized parents. "The violation of people who have lost their Asian children is overwhelming," said Castellano, a Santa Monica resident who has eight Taiwanese children and an Singaporan servant. Meanwhile, several groups of Asian employers in March sued Gov. Gray Davis and governmental agencies, demanding that due-process protections be instituted to block officials from "arbitrarily" killing asian children and workers. Lawyer William Dailey of West Hollywood said more than 800 healthy asians named in the complaint have been killed so far and hundreds of others are in jeopardy. "We're asking that asians not be killed unless they need to be," Dailey said. "If they were doing this to people's dogs and cats, there'd be such a scream down here it would be heard clear in Sacramento." Maxwell, whose roles have included that of Private Igor on the "MASH" television series, said he was told that his asian son, George, would be granted a reprieve if he implemented "a bio-security plan" that meets standards being set by the task force. He quickly installed troughs filled with bleach at his front and back doors to disinfect the bottoms of shoes. Visitors must wear freshly laundered clothing and wash their hands 10 to 20 seconds in hot, soapy water upon entering his house. "I love my child dearly," he said. "I've had him 22 years. We don't have pets -- George-san is our kid." From mv at cdc.gov Sat Apr 12 10:07:38 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 12 Apr 2003 10:07:38 -0700 Subject: Feds trying to ban book (NOT a spoof) Message-ID: <3E9847DA.1030801@cdc.gov> LAS VEGAS -- A federal lawsuit to ban a book that promotes income-tax evasion is generating debate on the 1st Amendment's guarantee of free speech. At issue is the conduct encouraged in the book "The Federal Mafia: How the Government Illegally Imposes and Unlawfully Collects Income Taxes" and Internal Revenue Service laws that prohibit advising the filing of false tax returns. http://www.latimes.com/news/printedition/front/la-na-taxbook12apr12,1,554464.story?coll=la%2Dhome%2Dtodays%2Dtimes --- "The bottom line is you have to euthanize the few to protect the many." -Jack Shere, USDA From kelsey.j at ix.netcom.com Sat Apr 12 07:59:19 2003 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Sat, 12 Apr 2003 10:59:19 -0400 Subject: Metaswitch cleared by FBI for spying In-Reply-To: References: Message-ID: <5.2.0.9.0.20030412102851.044f4e30@pop.ix.netcom.com> At 04:53 AM 4/12/03 +0200, Thomas Shaddack wrote: ... >Something like an embedded computer, dedicated to PGPfone-like device, >using a cellphone as its communication unit. Basically, an embedded >computer, with audio I/O on one side and audio I/O and serial port on the >other one. The unit would connect between the phone and either a >hands-free or a handset/headset, acting either as an encryption/decryption >device (and using the phone in data-call mode), or as just a passthrough >(for nonencrypted ("plainsound"?) calls)). I wonder how hard it will be to just implement encryption in software on the phone. Does anyone know if these relatively new PDA-phones have the ability to process the packets they receive from digital calls before feeding them into the codec, and the codec outputs before they send them out over the air? Or just to set up a data-only call where you're just sending bits to/from Nautilus or some similar program? I keep thinking that the only way we're going to get strong encryption on cellphones is to make it something that individuals can do themselves. The cellphone providers have little incentive to do this well. Maybe we could put the dedicated computer you're talking about at home, with two phone lines available to it. People trying to reach you call into the box, and it is the only thing that ever legitimately calls your cellphone. These calls can just always be encrypted, or can use Nautilus or some such thing, and set up a connection for data instead. When the cellphone calls out, it always calls to the box first. Ideally, the software for both the box and the phone would be open source, and no harder to set up than a VCR. In fact, this could double as a secure cordless phone, using an 802.11b card; the box chooses the cheapest method to reach your handset. For extra credit, if two such boxes ever talk to each other, they could do end-to-end encryption. But honestly, it's a lot more critical to get the stuff going out over the air encrypted (since that can be intercepted with very little risk of anyone noticing). I wonder if such a box could become a kind of communications hub, handling (secure) voice mail, cellphone, and multiple cordless phones. Someone who wants one probably wants all three, and might be willing to pay a couple hundred dollars for it, making the whole thing reasonable to sell. Even just getting the over-the-air part encrypted means someone has to leave a paper trail or physical evidence lying around to eavesdrop on phone calls, which probably implies actually getting a warrant, rather than just getting a hacked scanner and using it to troll for interesting cellphone or cordless conversations. And if the boxes became widespread, we'd start seeing "transparent" use of end-to-end encryption. (The only way we're ever likely to see normal, non-paranoid non-criminals using voice encryption very often is if it's just something that happens automatically and painlessly.) --John Kelsey, kelsey.j at ix.netcom.com PGP: FA48 3237 9AD5 30AC EEDD BBC8 2A80 6948 4CAA F259 From zem at vigilant.tv Fri Apr 11 20:22:57 2003 From: zem at vigilant.tv (zem) Date: Sat, 12 Apr 2003 13:22:57 +1000 Subject: Anonymous blogging experiment Message-ID: <200304121323.03636.zem@vigilant.tv> A few weeks back on the cryptography list someone asked about anonymous blogging software and hosting. I've put together a simple system which I think meets the requirements: a remailer/PGP interface to a weblog hosting service. It needs testing, so I'm offering free hosting to a few anonymous bloggers to help try it out. Familiarity with mixmaster and PGP or GPG is required. Replies via remailer and PGP only please. Fingerprint is listed below. Make sure you include a public key and either a working nym or instructions on how I can contact you. -- mailto:zem at vigilant.tv F289 2BDB 1DA0 F4C4 DC87 EC36 B2E3 4E75 C853 FD93 http://vigilant.tv/ "..I'm invisible, I'm invisible, I'm invisible.." --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From steve at tightrope.demon.co.uk Sat Apr 12 06:22:23 2003 From: steve at tightrope.demon.co.uk (Steve Mynott) Date: Sat, 12 Apr 2003 14:22:23 +0100 Subject: Looting nothing new in wars was Re: The sacking of Baghdad In-Reply-To: <90AB9294-6C92-11D7-9925-000A956B4C74@got.net> References: <90AB9294-6C92-11D7-9925-000A956B4C74@got.net> Message-ID: <3E98130F.1030805@tightrope.demon.co.uk> Tim May wrote: > When we smashed Germany and Japan, those nations didn't burn and loot > every major building, store, factory, etc. There may have been several > reasons for this. For example, we accepted the formal surrender of both > nations, leaving their "management" in place for at least the transition > period (more so in Japan than in Germany, for various reasons). A quick google search seems to show that there *was* looting in both Germany and Japan as those countries collapsed much as you would expect in a power vacuum. In the German case much of the looting and rape in Berlin (of around 100,000 German women) was committed by invading Soviet troops in early May 1945. There was German civilian looting in Frankfurt, at least, and probably everywhere. "Battered in Allied advance on Berlin, Frankfurt, the third largest city in Germany, becomes a city in ruins - German civilians go on an orgy of looting, pillaging freight cards and coal yards" As for Japan:- The diversion of military funds and supplies into private hands actually began the day before the emperors broadcast [of surrender] and unfolded in several distinct phases. It was later estimated that approximately 70% of all army and navy stocks in Japan were disbursed in this first frenzy of lootingand this for a force of some 5 million men at home, over 3 million overseas. further He clears up the mystery, once and for all, about what happened to the untold billions of dollars worth of war materiel, supplies, and goods that vanished immediately after the surrender; it was stolen by Japanese men of position and privilege, as Dower calls them, with the help of Japanese authorities. http://www.jetro.org/inside/io9910.html -- Steve From measl at mfn.org Sat Apr 12 12:26:51 2003 From: measl at mfn.org (J.A. Terranson) Date: Sat, 12 Apr 2003 14:26:51 -0500 (CDT) Subject: Looting of museums, banks, shops, factories--South Central LA writ large In-Reply-To: <3E978FD0.9090506@cdc.gov> Message-ID: On Fri, 11 Apr 2003, Major Variola (ret) wrote: > What is up with looting hospitals? I can see > grabbing the fun meds, but the rest of it? Obviously, you are not thinking this through: these folks are not looking for recreationals, they are looking for materials that could save their lives. The deacade long sanctions, followed up by our Deserter-In-Chief's 80 billion dollar temper tantrum leaves little doubt in my mind that a couple of pounds of a 3rd generation cephalosporin is likely to be worth more than a tank full of "fun meds". In their position, I'd be looting the hospitals too: ultrawide spectrum antibiotics, atropine, a small stash of potent narcotics (a mix of a long acting prep, such as methadone for use over days or weeks, and some short actings like straight morphine for the early moments), a couple of bottles of saline, and some basic kit items (suture, sponges, etc.)... To hell with recreation: these are people worried about *survival*. > Who > do they think they're screwing with this? What makes you think that "they" are doing this to "screw with" someone? > Looting govt offices is just payback, like bombing an IRS office. Agreed. > Looting merchants is just lowlife theivery, like Los Angeles, unless > the merchants were state-licensed or pro-state, in which case payback > may also > be involved. Agreed twice. -- Yours, J.A. Terranson sysadmin at mfn.org From rah at shipwright.com Sat Apr 12 11:57:28 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Sat, 12 Apr 2003 14:57:28 -0400 Subject: Looting of museums, banks, shops, factories--South Central LA writ large In-Reply-To: <3E977F83.393.96DB84C@localhost> References: <"from timcmay"@got.net> <3E977F83.393.96DB84C@localhost> Message-ID: At 2:52 AM -0700 4/12/03, James A. Donald wrote: >The looting will solve itself soon. All regime targets have >been looted, which means that everyone now has guns. Naturally >the looters start hitting non regime targets. Those targeted >proceed to execute looters. Looting rapidly declines. That's exactly what's happening in Sadd-, er, Liberty City. Mob rule works, when the mob is armed... The imams have asked for all their stuff to come back to the mosques, and, oddly enough, the stuff's coming back. Expect the same thing for the hospitals, at least in the Shiite areas... Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From mv at cdc.gov Sat Apr 12 16:07:57 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 12 Apr 2003 16:07:57 -0700 Subject: Metaswitch cleared by FBI for spying Message-ID: <3E989C4D.30104@cdc.gov> At 10:59 AM 4/12/03 -0400, John Kelsey wrote: > I keep thinking that the only way we're going to get strong encryption on >cellphones is to make it something that individuals can do themselves. The >cellphone providers have little incentive to do this well. Actually, the way the cellphone biz has evolved, there are motivations. Get to sell phones which, if you call another of the same, automatically goes secure. If requests it of an OEM, it will happen. 's motivation would be differentiating their product with something more than blue suade [1] faceplates. already provide free "walkie-talkie" comms between endpoints inside their net as a differentiating feature. The reason it won't happen is that are licensed by the State. [1] Yes, you will see textiles injection-molded into products soon. PS: See also "bump in the wire" devices. From mv at cdc.gov Sat Apr 12 16:11:33 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 12 Apr 2003 16:11:33 -0700 Subject: Looting of museums, banks, shops, factories--South Central LA writ large Message-ID: <3E989D25.6000209@cdc.gov> At 02:57 PM 4/12/03 -0400, R. A. Hettinga wrote: >The imams have asked for all their stuff to come back to the mosques, and, oddly enough, the stuff's coming back. > >Expect the same thing for the hospitals, at least in the Shiite areas... Yeah, but so much for the careful calibration that med equiptment is supposed to have. A stuck anesthetic valve or out of place x-ray filter can ruin your whole day... . From mv at cdc.gov Sat Apr 12 16:15:14 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 12 Apr 2003 16:15:14 -0700 Subject: Heads up! Message-ID: <3E989E02.2020906@cdc.gov> Space station moved to higher orbit ahead of new team's arrival MOSCOW (AFP) Apr 10, 2003 The International Space Station (ISS) was moved to a higher orbit on Thursday to prepare for the arrival of a new team of cosmonauts, Russian space officials quoted by Interfax said. The ISS was raised to an orbit of some five kilometers (three miles) above earth -- a procedure that is regularly required to counter Earth's gravitational pull. http://www.spacedaily.com/2003/030410172225.y1t7rsm2.html .... Man that thing must be streamlined to stay in orbit three miles above earth... From timcmay at got.net Sat Apr 12 16:57:23 2003 From: timcmay at got.net (Tim May) Date: Sat, 12 Apr 2003 16:57:23 -0700 Subject: Looting of museums, banks, shops, factories--South Central LA writ large In-Reply-To: <3E989D25.6000209@cdc.gov> Message-ID: <81837FB5-6D42-11D7-9925-000A956B4C74@got.net> On Saturday, April 12, 2003, at 04:11 PM, Major Variola (ret) wrote: > At 02:57 PM 4/12/03 -0400, R. A. Hettinga wrote: > >The imams have asked for all their stuff to come back to the mosques, > and, oddly enough, the stuff's coming back. > > > >Expect the same thing for the hospitals, at least in the Shiite > areas... > > > Yeah, but so much for the careful calibration that med equiptment is > supposed > to have. A stuck anesthetic valve or out of place x-ray filter can > ruin your whole day... > . Sometimes you people are so naive you take my breath away. Some small fraction of broken chairs and used tires are dropped off at mosques and Hettinga proclaims it as a triumph of ideology. As for the 170,000 or so pieces from the main museum, well, the Sumerian pottery makes good gravel for roads. And at least the gold can be melted down. --Tim May From vinnie at vmeng.com Sat Apr 12 17:31:54 2003 From: vinnie at vmeng.com (Vinnie Moscaritolo) Date: Sat, 12 Apr 2003 17:31:54 -0700 Subject: Saddam's love shack Message-ID: http://customwire.ap.org/dynamic/stories/W/WAR_SADDAMS_HIDEAWAY?SITE=VANOV&SECTION=INTERNATIONAL Troops Discover Lush Saddam Hideaway By CHRIS TOMLINSON Associated Press Writer BAGHDAD, Iraq (AP) -- The doors of the town house opened to reveal a playboy's fantasy straight from the 1960s: mirrored bedroom, lamps shaped like women, airbrushed paintings of a topless blonde woman and a mustached hero battling a crocodile. Troops thought it was the home of Saddam Hussein's mistress, though on the wall and in the bedroom were photos of the Iraqi president and a woman who appeared to be his wife. The company commander suspected they had found one of the Iraqi leader's many safe houses. "This must have been Saddam's love shack," said Sgt. Spencer Willardson of Logan, Utah. The split-level, one-bedroom town house is in a Baath Party enclave in an upscale neighborhood in central Baghdad where generals and senior party officials lived. Next door, where iron sheets were welded over all the windows, they found more than 6,000 Berretta pistols, 650 Sig Sauer pistols, 248 Colt Revolvers, 160 Belgian 7.65 mm pistols, 12 cases of Sterling submachine guns and four cases of anti-tank missiles all still in the unopened original boxes. There were also tens of thousands of rounds of ammunition mortars and cases of old handguns and heavy machine guns. Not far off was another presidential palace, this one with a Yugoslav-built, chemical and biological weapons-proof bunker underneath it. A U.S. Army team inspected it and it appeared to be strictly defensive in nature. But this home was different: beanbag chairs, a garden of plastic plants, a sunken kitchen and a room for a servant, all 1960s-style. The sunken wet bar was stocked with 20-year old Italian red wines and expensive cognacs, brandies and Scotch whiskeys, the same brands found in several presidential palaces. The glassware, too, was the same pattern that was found in at least three palaces also visited by U.S. troops since the regime collapsed. The pattern features the Iraqi government seal and a gold pattern on that rim. But when it came time to eat dinner, Saddam was served his food on the official fine china of the Kuwaiti royal family, complete with the family seal and gold and maroon trim. Capt. Chris Carter, commander of A Company, 3rd Battalion, 7th Infantry Regiment, said the home appears to be one of Saddam's safe houses. Officials concluded that the house was used by Parisoula Lampsos, who publicly claimed to be Saddam's mistress. She escaped to Lebanon in 2002. Saddam's wife, Sajida Khairallah Telfah, is also his cousin. Together they had three daughters and two sons, Odai and Qusai. Like her husband, her whereabouts are unknown. Saddam is widely known to have a third son, Ali, by another woman. Lampsos was interviewed extensively about her relationship with Saddam on U.S. television. Her current location is unknown and she was last believed to be in hiding. The photos show Saddam and a woman smiling at each other and standing beside one another - in one Saddam wears a uniform and in another a suit. On one wall was a 16-by-20 inch plaque of the Iraqi eagle and flag seal. Upstairs was a television room with bright blue, pink and yellow throw pillows. The bathroom included a whirlpool bath. The kingsize bed was fitted into an alcove with mirrors on two sides and a fantasy painting on the third. The closets and drawers were empty except for a man's night shirt, two pairs of boxer shorts, two T-shirts and a bath robe - each item individually wrapped in plastic, just as similar items had been in the palaces. One of the airbrushed paintings depicted a topless blonde woman, with a green demon behind her, pointing a finger at a mythic hero. From the tip of her finger came a giant serpent, which had wrapped itself around the warrior. Another showed a buxom woman chained to a barren desert mountain ledge, with a huge dragon diving down to kill her with sharpened talons. The home's 1960s look - parodied in the series of "Austin Powers" spy spoofs - inspired a round of imitations from soldiers slogging door to door. "Yeah, baaabeee," said Carter, doing his best imitation of actor Mike Myers' character. "Shagadelic," another soldier shouted. Indeed, the carpet was navy blue shag -- Vinnie Moscaritolo ITCB-IMSH PGP: 3F903472C3AF622D5D918D9BD8B100090B3EF042 ------------------------------------------------------- "Stuff is getting better. Stuff is getting better all the time." - President Starky --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From mv at cdc.gov Sat Apr 12 18:23:14 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 12 Apr 2003 18:23:14 -0700 Subject: Can you spell default? Roman walls have ears.. Message-ID: <3E98BC02.4060706@cdc.gov> Iraq owes a billion (US ) pounds (Sterling) to Russia for weapons. Russia spied on Blair for Hussein. Do the math, Tim. http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2003/04/13/wrus13.xml&sSheet=/portal/2003/04/13/ixportaltop.html From nobody at remailer.privacy.at Sat Apr 12 09:45:05 2003 From: nobody at remailer.privacy.at (Anonymous) Date: Sat, 12 Apr 2003 18:45:05 +0200 (CEST) Subject: Looting of museums, banks, shops, factories--South Central LA writ large Message-ID: > The looting will solve itself soon. All regime targets have > been looted, which means that everyone now has guns. Naturally > the looters start hitting non regime targets. Those targeted > proceed to execute looters. Looting rapidly declines. The looting was done by the government of Iraq when they commandeered the economic resources of the country in a socialist state, enriching the ruling class in government. The actions of the people are not looting, they are repossession and liberation, no different from a property owner taking his lawnmower back from a thief. From timcmay at got.net Sat Apr 12 20:15:17 2003 From: timcmay at got.net (Tim May) Date: Sat, 12 Apr 2003 20:15:17 -0700 Subject: Beach Blanket Babylon In-Reply-To: <3E98BC02.4060706@cdc.gov> Message-ID: <26A35854-6D5E-11D7-9925-000A956B4C74@got.net> On Saturday, April 12, 2003, at 06:23 PM, Major Variola (ret) wrote: > Iraq owes a billion (US ) pounds (Sterling) to Russia for weapons. > > Russia spied on Blair for Hussein. > > Do the math, Tim. Where's the surprise? Certainly none here. According to CNN, Iraq owes France at least $8 billion, owes Germany some similar amount, and so on. Some of these debts are for armaments, some for industrial products, etc. Iraq's estimated debt is $200 billion. The CNN estimate for France ($8 B) is probably low. The U.S. of course is calling for France and Germany to "forgive" the debts. (A complication is of course that some of these debts are not owed to the _nations_ of France and Germany but to corporations, partnerships, banks, and even individuals. Which makes it hard for France or Germany to wave a magic wand and erase the debts. Granted, Jacques Randome Frenchie may have a hard time collecting, but the principle is of course that debts are not absolved by mere changes in government leadership. (This matters because the international bodies can make it hard for payments to flow back to Iraq: they can "attach" payments and send them to the creditors who make claims. The U.S. can attempt to avert this by bypassing European banking networks, I suppose. But, fundamentally, the money is still owed and if the creditors do not forgive the debts (and I mean the creditors, not the nations of France and Germany), then assets can be attached, even oil tankers can be impounded.) More interesting to me is the exodus of money and weaponry out of Iraq. Billions in gold bullion exiting the country. And into vaults and hidden places in Syria, Jordan, Iran, Turkey, and border areas of Iraq. Not only is there much evidence that the exodus of cash (dollars, not dinars) and bullion and valuable weapons began months ago, when war became inevitable, but it accelerated several weeks ago, just before the bombing began. Not to mention the tens of billions already in thousands of bank accounts in Europe, Asia, the Caribbean, Panama, and other locations. Set up over the past 20 years, and deeply hidden. (One of Saddam's relatives, recently a diplomat in Switzerland, spent most of his professional time distributing money safely. Some of this money may only be retrievable by Saddam, some only by his immediate family, some by "stay behind" and "terrorist" organizations.) Tens of billions in offshore accounts, and hundreds of millions in bullion, $100 bills, and treasure from the museums, plus assorted military know-how and weaponry. Ah, this is gonna fund a _lot_ of merriment! I just hope they're not as incompetent as the less well-funded Al Qa'aida. I hope they plan to use some of these tens of billions, some of their weaponry, taking out the real target. --Tim May "That the said Constitution shall never be construed to authorize Congress to infringe the just liberty of the press or the rights of conscience; or to prevent the people of the United States who are peaceable citizens from keeping their own arms." --Samuel Adams From shaddack at ns.arachne.cz Sat Apr 12 11:54:39 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Sat, 12 Apr 2003 20:54:39 +0200 (CEST) Subject: Metaswitch cleared by FBI for spying In-Reply-To: <5.2.0.9.0.20030412102851.044f4e30@pop.ix.netcom.com> Message-ID: On Sat, 12 Apr 2003, John Kelsey wrote: > I keep thinking that the only way we're going to get strong encryption on > cellphones is to make it something that individuals can do themselves. The > cellphone providers have little incentive to do this well. The telcos are often legally required to NOT do this well. We should keep in mind that the Adversary keeps the infrastructure compromised. > Ideally, the software for both the box and the phone would be open > source, and no harder to set up than a VCR. In fact, this could double > as a secure cordless phone, using an 802.11b card; the box chooses the > cheapest method to reach your handset. Ideally, it would be a plug-and-play thingy, a box with just a connector and the antenna. > For extra credit, if two such boxes ever talk to each other, they could do > end-to-end encryption. But honestly, it's a lot more critical to get the > stuff going out over the air encrypted (since that can be intercepted with > very little risk of anyone noticing). In "auto" mode, the box should ask the other side if it is a compatible box, and if yes, do a key handshake. > I wonder if such a box could become a kind of communications hub, handling > (secure) voice mail, cellphone, and multiple cordless phones. There is no reason why it couldn't. :) > And if the boxes became widespread, we'd start seeing "transparent" > use of end-to-end encryption. (The only way we're ever likely to see > normal, non-paranoid non-criminals using voice encryption very often > is if it's just something that happens automatically and painlessly.) The Adversary won't like this. This is another reason why the design has to be completely open and widely published. I can imagine a government shutting down a corporation or an individual enterpreneur. I can't imagine a government successfully shutting down eg. Linux movement, DeCSS, pr PGP. Asymmetrical warfare in its best :) From mv at cdc.gov Sat Apr 12 21:14:48 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 12 Apr 2003 21:14:48 -0700 Subject: Can you spell default? Roman walls have ears.. Message-ID: <3E98E438.6CF45BC7@cdc.gov> At 09:34 PM 4/12/03 -0500, Jamie Lawrence wrote: >On Sat, 12 Apr 2003, Major Variola (ret) wrote: > >> Iraq owes a billion (US ) pounds (Sterling) to Russia [...] > >Without touching on the discussion on hand, can you please explain what >this means? > >I don't understand what US pounds Sterling are. > Fair nuff, mate. The Brits think a billion is something other than 1e9. So "billion" here meant 1e9. Pounds meant about a buck and a half to two, the going rate for Brit bucks AFAIK. Taint no such thang as US pounds Sterling. And we're supposed to be metric, according to Congress, twice :-) From jal at jal.org Sat Apr 12 19:34:16 2003 From: jal at jal.org (Jamie Lawrence) Date: Sat, 12 Apr 2003 21:34:16 -0500 Subject: Can you spell default? Roman walls have ears.. In-Reply-To: <3E98BC02.4060706@cdc.gov> References: <3E98BC02.4060706@cdc.gov> Message-ID: <20030413023416.GS14414@jal.clueinc.net> On Sat, 12 Apr 2003, Major Variola (ret) wrote: > Iraq owes a billion (US ) pounds (Sterling) to Russia [...] Without touching on the discussion on hand, can you please explain what this means? I don't understand what US pounds Sterling are. -j -- Jamie Lawrence jal at jal.org "You're young, you're drunk, you're in bed, you have knives - shit happens." - Angelina Jolie From rah at shipwright.com Sat Apr 12 20:47:01 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Sat, 12 Apr 2003 23:47:01 -0400 Subject: Saddam's love shack Message-ID: Saddam Hussein, international man of mystery... Cheers, RAH Who remembers from somewhere that his favorite wine was Mateuse Rose. Shagadelic, indeed. --- begin forwarded text From bill.stewart at pobox.com Sat Apr 12 23:56:28 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 12 Apr 2003 23:56:28 -0700 Subject: Saddam's love shack In-Reply-To: Message-ID: <5.1.1.6.2.20030412235332.02cbbeb8@idiom.com> At 11:47 PM 04/12/2003 -0400, R. A. Hettinga wrote: >Saddam Hussein, international man of mystery... > >Cheers, >RAH >Who remembers from somewhere that his favorite wine was Mateuse Rose. >Shagadelic, indeed. >--- begin forwarded text >.... >Capt. Chris Carter, commander of A Company, 3rd Battalion, 7th >Infantry Regiment, He's been quoted before. I assume he's not the same Chris Carter who was the director of the X-Files :-) >The closets and drawers were empty except for a man's night shirt, >two pairs of boxer shorts, two T-shirts and a bath robe - each item >individually wrapped in plastic, just as similar items had been in >the palaces. Guess that answers the "Boxers or Briefs" question for Saddam ... >Indeed, the carpet was navy blue shag From bill.stewart at pobox.com Sun Apr 13 00:12:08 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Sun, 13 Apr 2003 00:12:08 -0700 Subject: Kill MS, again, but sideways In-Reply-To: References: <5.1.1.6.2.20030411230408.02bdef60@idiom.com> Message-ID: <5.1.1.6.2.20030412235800.02cb68a0@idiom.com> At 05:04 AM 04/13/2003 +0100, Peter Fairbrother wrote: >I got a request from a (US) psychiatrist that m-o-o-t (m-o-o-t is a CD that >boots on your computer, and does secure things) should include an >implementation of VOIP, to allow his patients to securely connect to his >server. I think they are mostly servicemen or spies, but so what. > >It's actually easy to do a version that will do that, and if you're >listening, I'll do it soon, and for free to you only :) - but m-o-o-t is >based on OpenBSD, and isn't that good at modems. Linux isn't that good >either... I don't know about OpenBSD, but supposedly Linux is getting better at handling Winmodems, at least for the most common chipsets. You might want to check with Perry Metzger, one of the founders of Wasabisystems.com, which is a company that ports NetBSD to things; perhaps they've got better driver sets than the OpenBSD folks. Also, in addition to looking at openh323.org, you should probably check out Speak Freely. http://speakfreely.org/ has the 7.2 version, and John Walker recently prereleased some 7.6 versions at http://www.fourmilab.ch/speakfree/windows/download/ and maybe http://web.tiscali.it/vitez/picophone.html >I'd like to suggest that those who don't provide details of their modems' >functionality (which is the main problem) should be boycotted. Or killed. >Similar applies to all hardware. Too late for that, and some of them have reproduced already so you won't even be keeping them out of the gene pool... From rah at shipwright.com Sat Apr 12 21:15:08 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Sun, 13 Apr 2003 00:15:08 -0400 Subject: Looting of museums, banks, shops, factories--South Central LA writ large In-Reply-To: <81837FB5-6D42-11D7-9925-000A956B4C74@got.net> References: <81837FB5-6D42-11D7-9925-000A956B4C74@got.net> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 4:57 PM -0700 4/12/03, Tim May bestirred himself from that Ultimate Barcolounger In The Sky and tapped, furiously, into his lap: >Sometimes you people are so naive you take my breath away. Would that it were truly so. Meanwhile, I'll settle for the odd occasion that his killfile bites him in the ass. :-). In other words, I think my original post said it clearly enough, but he didn't see that, I expect. Or this, for which I also laugh in his general direction... >Some small fraction of broken chairs and used tires are dropped off >at mosques and Hettinga proclaims it as a triumph of ideology. No. I just said that the imams are getting their stuff back from their mosque because the Shiites, not under the thrall of the Baathist state like the Sunnis are, decided immediately to take matters into their own hands and form armed vigilante mobs. Creating their own force structures from scratch. I said nothing about the museums, but, now that you mention it... >As for the 170,000 or so pieces from the main museum, well, the >Sumerian pottery makes good gravel for roads. And at least the gold >can be melted down. Serves Saddam right for not surrendering to save the antiquities from looters, right? :-). (A good retort to the Odd Liberal when she tries to bean you in head with the proverbial cuneiform bolla about how "we" should stop the looting...) In the meantime, I expect that collectors will have a field day with all the liberated stuff from the museum, and, frankly, like Nazi and Soviet "plundered" art, it will all come back, sooner or later, to some new, improved UrWorld museum someday. Here's hoping, by then, it's a private enterprise. One can hope, anyway. I mean, the Baghdad Museum was a private enterprise, a wholly owned subsidiary of Saddam, Inc., right? Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPpjkPsPxH8jf3ohaEQJ/SACdG/ECF80pQpAkZSuV8iXEnZsfwoYAoNeL N90ZMZjGEwy379IttQjBpwGF =kb+j -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From zenadsl6186 at zen.co.uk Sat Apr 12 21:04:10 2003 From: zenadsl6186 at zen.co.uk (Peter Fairbrother) Date: Sun, 13 Apr 2003 05:04:10 +0100 Subject: Kill MS, again, but sideways In-Reply-To: <5.1.1.6.2.20030411230408.02bdef60@idiom.com> Message-ID: I got a request from a (US) psychiatrist that m-o-o-t (m-o-o-t is a CD that boots on your computer, and does secure things) should include an implementation of VOIP, to allow his patients to securely connect to his server. I think they are mostly servicemen or spies, but so what. It's actually easy to do a version that will do that, and if you're listening, I'll do it soon, and for free to you only :) - but m-o-o-t is based on OpenBSD, and isn't that good at modems. Linux isn't that good either... The problem is that the usual, everyday, modem is _only_ supported by Windows... which thereby gains a competitive advantage, based on it's monopoly position. While I have no beef (and being a UK person I eat no beef anyway) with the idea that there should be a single computing platform/ interface, and I don't expect manufacturers to do the work, I do think that interfaces used en masse should, in general, be communal property. That includes modem interfaces, especially. Apple is no better either here. I'd like to suggest that those who don't provide details of their modems' functionality (which is the main problem) should be boycotted. Or killed. Similar applies to all hardware. It's not a very libertarian perspective, and I like to think I am a libertarian - but so be it. The alternative is... -- Peter http://www.m-o-o-t.org ps Tim was right about cosmic rays, it's cosmic background radiation that does the 1% noise on TV's - which is even more "Cosmic" imo - but then I'm wrong from time to time. From jamesd at echeque.com Sun Apr 13 08:29:10 2003 From: jamesd at echeque.com (James A. Donald) Date: Sun, 13 Apr 2003 08:29:10 -0700 Subject: Irag Piss Poor Compared to 911 In-Reply-To: Message-ID: <3E991FD6.22855.FC7FB50@localhost> -- On 12 Apr 2003 at 6:45, John Young wrote: > Welfare mutants are not the targets, dream on racist greedy > motherfuckers, your fat GWB predatory life style is. The > military can't protect you from terrorists, nor can the > police from mutants outfucking you every day. Blue-eyed > supremacists are chasing the dodo, guns and bombs > ineffectual. Seems might effectual to me. Compare terrorism before the Afghan war with terrorism after the Afghan war. We cannot compare terrorism before and after the Iraq war, because there is not enough of it, but the protests in the arab street provide a pretty good proxy. Observe that victory in Iraq has silenced the arab street. Read Al Jazeera. It is singing a new tune. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG aqHbqvrl9MisC9mOR3DAdpaYcVb0mXT4eEBfNeln 4v6ObMqZ1GqeyRjqS4C8FHYGvqFyU/hmqF1Gbvm9D From steve at tightrope.demon.co.uk Sun Apr 13 01:59:37 2003 From: steve at tightrope.demon.co.uk (Steve Mynott) Date: Sun, 13 Apr 2003 09:59:37 +0100 Subject: Kill MS, again, but sideways In-Reply-To: References: Message-ID: <3E9926F9.2020007@tightrope.demon.co.uk> Peter Fairbrother wrote: > I got a request from a (US) psychiatrist that m-o-o-t (m-o-o-t is a CD that > boots on your computer, and does secure things) should include an > implementation of VOIP, to allow his patients to securely connect to his > server. I think they are mostly servicemen or spies, but so what. Voice Over IP? I wouldn't bother and it sounds unlikely that anyone would use this. > It's actually easy to do a version that will do that, and if you're > listening, I'll do it soon, and for free to you only :) - but m-o-o-t is > based on OpenBSD, and isn't that good at modems. Linux isn't that good > either... > The problem is that the usual, everyday, modem is _only_ supported by > Windows... which thereby gains a competitive advantage, based on it's > monopoly position. No it's only winmodems which are supported only by windows. Winmodems are found often in cheap laptops. Acually some winmodems are supported by linux http://www.linmodems.org/ although not by OpenBSD -- Steve From ericm at lne.com Sun Apr 13 10:10:54 2003 From: ericm at lne.com (Eric Murray) Date: Sun, 13 Apr 2003 10:10:54 -0700 Subject: Kill MS, again, but sideways In-Reply-To: ; from zenadsl6186@zen.co.uk on Sun, Apr 13, 2003 at 05:04:10AM +0100 References: <5.1.1.6.2.20030411230408.02bdef60@idiom.com> Message-ID: <20030413101054.A27412@slack.lne.com> On Sun, Apr 13, 2003 at 05:04:10AM +0100, Peter Fairbrother wrote: > I got a request from a (US) psychiatrist that m-o-o-t (m-o-o-t is a CD that > boots on your computer, and does secure things) should include an > implementation of VOIP, to allow his patients to securely connect to his > server. I think they are mostly servicemen or spies, but so what. > > It's actually easy to do a version that will do that, and if you're > listening, I'll do it soon, and for free to you only :) - but m-o-o-t is > based on OpenBSD, and isn't that good at modems. Linux isn't that good > either... Really? You got this mail through an old modem and linux box.. > The problem is that the usual, everyday, modem is _only_ supported by > Windows... which thereby gains a competitive advantage, based on it's > monopoly position. Google for 'winmodem' and linux finds: http://www.linmodems.org/ plus lots of other links you may find useful. Microsoft's lock on the winmodem appears to have been pretty short. > While I have no beef (and being a UK person I eat no beef anyway) with the > idea that there should be a single computing platform/ interface, and I > don't expect manufacturers to do the work, I do think that interfaces used > en masse should, in general, be communal property. Commonly used interfaces do eventually become well known. While they do have owners, the amount of market interia they develop makes then essentially unchangeable. But demanding that they be "communal property" sounds like the sort of socialism that can only be imposed by authority and fails when it is imposed. > I'd like to suggest that those who don't provide details of their modems' > functionality (which is the main problem) should be boycotted. That's been done before-- Diamond refused for years to supply info to Xfree86, so there was a boycott of Diamond graphic cards in the Linux community. They eventually saw the light (or market). > It's not a very libertarian perspective, and I like to think I am a > libertarian - but so be it. The alternative is... 1. figuring out the winmodem interface. It's software, so its possible. But it appears that others have already done the work for at least some winmodem chips. 2. boycotting winmodem makers. Not likely to work in this case since most modem makers sell the things. Besides, the market drive for reduced chip count and the PC makers' hunger for anything that chews up CPU cycles and drives consumers to buy faster machines is a lot stronger than that for linux. 3. beg for some higher power to "do something". You can probably guess from my tone that I don't think much of this option. Eric From jal at jal.org Sun Apr 13 08:26:24 2003 From: jal at jal.org (Jamie Lawrence) Date: Sun, 13 Apr 2003 10:26:24 -0500 Subject: Can you spell default? Roman walls have ears.. In-Reply-To: <3E98E438.6CF45BC7@cdc.gov> References: <3E98E438.6CF45BC7@cdc.gov> Message-ID: <20030413152624.GT14414@jal.clueinc.net> On Sat, 12 Apr 2003, Major Variola (ret) wrote: > At 09:34 PM 4/12/03 -0500, Jamie Lawrence wrote: > > > >I don't understand what US pounds Sterling are. > > > > Fair nuff, mate. The Brits think a billion is something other than > 1e9. So "billion" here meant 1e9. Pounds meant about a buck > and a half to two, the going rate for Brit bucks AFAIK. Ah, OK. Your comment makes sense now. I was attributing modifiers to the wrong nouns. In other words, about a metric assload. The difference between a US billion and a UK billion is best understood as an ad view generator for the slashdot crowd. Back to the regularly scheduled bickering... -j -- Jamie Lawrence jal at jal.org "The media is reality." - US Air Force Major General Gene Renuart From mv at cdc.gov Sun Apr 13 10:41:08 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sun, 13 Apr 2003 10:41:08 -0700 Subject: Looting of museums, Fishing with defibrillators Message-ID: <3E99A134.5090204@cdc.gov> At 02:26 PM 4/12/03 -0500, J.A. Terranson wrote: > >In their position, I'd be looting the hospitals too: ultrawide >spectrum antibiotics, atropine, a small stash of potent >narcotics (a mix of a long acting prep, such as methadone for >use over days or weeks, and some short actings like straight >morphine for the early moments), a couple of bottles of saline, and some >basic kit items (suture, sponges, etc.)... To hell with recreation: these >are people worried about *survival*. Ok, I wasn't thinking about meds that folks could figure out how to use on their own, I was thinking about med equiptment that they wouldn't fathom, nor find readily fungible. I can believe my neighbors could guess approximately how to use saline or antibios, but not equiptment. Were they going to make rice in the autoclave? Use defibrillators to go fishing? Turn an anesthetic machine into a bhong? Looting a pharmacy make sense. Looting non-consumables from places where they might be needed (for yourself) is *irrational* rampaging. Because the potential future benefit to yourself of leaving an x-ray machine intact exceeds the value in scrap metal and parts, IMHO. "It takes a child to raze a village." -Michael Fry From jya at pipeline.com Sun Apr 13 12:01:37 2003 From: jya at pipeline.com (John Young) Date: Sun, 13 Apr 2003 12:01:37 -0700 Subject: Irag Piss Poor Compared to 911 In-Reply-To: <3E991FD6.22855.FC7FB50@localhost> References: Message-ID: Terrorists don't protest in the street, that's for ineffectuals dancing the tune of yarping heads. Bitchers don't do shit except bark a mighty wind. Killers don't tell you what they are going to do. You get to see it in the news or your daughter's head go bowling ball. 19 did 3,000: mighty effectual. Tommy Franks with 300,000 did mighty less. 250 million fish in a barrel. From mv at cdc.gov Sun Apr 13 12:55:40 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sun, 13 Apr 2003 12:55:40 -0700 Subject: Choicepoint knows what you read, sells to Feds, can't talk; Declan can access this too Message-ID: <3E99C0BB.4060003@cdc.gov> http://ap.tbo.com/ap/breaking/MGACRBLDHED.html NEW YORK (AP) - For years now, Americans who happen to use a credit card or order a magazine have left a financial identity trail that has been catalogued by database companies like ChoicePoint Inc., then resold to the U.S. government. Federal and state governments pay about $50 million a year to comb through ChoicePoint's databanks, also marketed under such names as AutoTrack, KnowX.com and ScreenNow. The company compiles and sells personal information on U.S. residents, such as motor vehicle and credit records, car and boat registrations, liens and deed transfers and military records. The files can be used by the FBI, U.S. Marshals Service or Internal Revenue Service to check employee backgrounds, track fugitives or piece together clues to a person's potential for terrorism. Journalists, including The Associated Press, also use ChoicePoint's data for researching stories. New federal demand for the data can be seen in forthcoming programs such as Total Information Awareness and Computer Assisted Passenger Prescreening System, or CAPPS II, which seek to prevent acts of terror by poring over financial transactions, court records and government watch lists. ChoicePoint president Doug Curling said in a conference call with financial analysts last month that the government prohibited him from discussing any role in the CAPPS II program. Privacy experts are dismayed by the U.S. government's use of such commercial data. They say it circumvents the spirit of the 1974 Privacy Act, which prohibits routine data collection on ordinary Americans. "The Privacy Act passed because of fears in the 1960s of a federal data center. That data center was created after all, but it's in private hands," said Chris Hoofnagle of the Electronic Privacy Information Center. After the Sept. 11 debacle, law enforcers and government agencies clamored for data from commercial data merchants. The new Transportation Security Agency used ChoicePoint to screen some 300,000 job applicants, airport workers and pilots. ChoicePoint, a publicly held company, was spun off of credit reporting company Equifax in 1997 and quickly began gobbling up competitors, swallowing over 30 to date. Earnings climbed 62 percent in four years, from $466 million in 1998 to $753 million in 2002, with its stock price up some 300 percent since it began trading. The company's computers in Boca Raton, Fla., and Alpharetta, Ga., are stocked with more than 100 terabytes of storage. A forthcoming data center will add tens of terabytes more, said marketing director James Lee. ChoicePoint is the U.S. immigration officer's favorite private data tool, but it's not the only one, said Thomas Durand, assistant chief inspector of the new U.S. Bureau of Customs and Border Protection, which absorbed some of the INS functions. Inspectors also use LexisNexis, a top competitor. Durand said marketing data company infoUSA is also looking to sell to the government. "They've given us free passwords and user accounts to see if we find it interesting," Durand said. Problems with accuracy have dogged Choicepoint. In the most famous case, a ChoicePoint subsidiary mistakenly flagged hundreds of eligible voters for removal from Florida's voter rolls in 2000. The voters were unable to cast ballots in the presidential election that brought George W. Bush into the White House. If ChoicePoint's data are used to block foreigners from entering the United States, Lee said he hopes immigration officials give travelers the chance to challenge the accuracy of information used to confront them. Only the subject of the background check can verify the information, not ChoicePoint or the U.S. government, Lee said. "The key to any of this is giving the actual citizen the right to see it and fix it," Lee said. "We do everything to ensure our customers are following privacy policies. But there is still going to be human error. And the outcome isn't going to be what people would like." ..... Hmm, password protected access, eh? ..... "Montag, why do you burn books ?" "It's a job like any other, pay is good and there is a lot of variety". -F451 From jamesd at echeque.com Sun Apr 13 15:12:40 2003 From: jamesd at echeque.com (James A. Donald) Date: Sun, 13 Apr 2003 15:12:40 -0700 Subject: Beach Blanket Babylon In-Reply-To: <26A35854-6D5E-11D7-9925-000A956B4C74@got.net> References: <3E98BC02.4060706@cdc.gov> Message-ID: <3E997E68.29822.11396607@localhost> -- On 12 Apr 2003 at 20:15, Tim May wrote: > The U.S. of course is calling for France and Germany to > "forgive" the debts. (A complication is of course that some > of these debts are not owed to the _nations_ of France and > Germany but to corporations, partnerships, banks, and even > individuals. Which makes it hard for France or Germany to > wave a magic wand and erase the debts. Granted, Jacques > Randome Frenchie may have a hard time collecting, but the > principle is of course that debts are not absolved by mere > changes in government leadership. (This matters because the > international bodies can make it hard for payments to flow > back to Iraq: they can "attach" payments and send them to the > creditors who make claims. The U.S. can attempt to avert this > by bypassing European banking networks, I suppose. But, > fundamentally, the money is still owed and if the creditors > do not forgive the debts (and I mean the creditors, not the > nations of France and Germany), then assets can be attached, > even oil tankers can be impounded.) Well indeed they can be, but first catch your rabbit. Collecting international debts is very difficult at the best of times, and for frenchies and germans who are owed money by Saddam, this is not the best of times. Jaques Random Frenchie had a deal with a French oil company that was weaseling oil through the sanctions, and skimming the oil for food program (which delivered a curiously small amount of food for a startlingly large amount of oil), and his debt was secured by both flows of oil. But now he discovers that due to the evils of US imperialism, the oil is being pumped by those evil exploitative US companies, who argue that the oil they are pumping has no connection to the oil he has attached. I kind of visualize Jacques Random Frenchie presenting a writ of attachment to an Iraqi. The Iraqi attempts to read it. It is french legalese, which he could not read even if he could read French, which he cannot. Then he turns it upside down to see if he can read it that way. He then hands it to a marine. The marine attempts to read it. Then the marine turns it upside down to see if he can read it that way. Then the marine says, "sorry, marines don't do this crap", and attempts to give the writ back, but finds the writ server is not around any more. So he drops the writ on the ground and forgets about it. (Marines make messes, they don't clean them up either.) --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG rNbLE8AitPnsUfz6E7tDkW17JbpruWTiW6PL5sxo 4TPA6l2XqW6GRK8B5PTQ3KbHaeLM8M+ynDLvokstC From cripto at ecn.org Sun Apr 13 07:42:13 2003 From: cripto at ecn.org (Anonymous) Date: Sun, 13 Apr 2003 16:42:13 +0200 (CEST) Subject: Speaking of book banning! Message-ID: <79060bf88a8e3a9ca99158f24c24b1ca@ecn.org> A guy just told me that he got stopped for a minor traffic offense and the cop spotted a "how to grow pot" book on his car seat. Suddenly there were six cop cars there, they searched him and the car, found nothing, but busted him anyway for "possession of paraphernalia", and he was convicted, given a $200 fine. From nobody at paranoici.org Sun Apr 13 07:45:11 2003 From: nobody at paranoici.org (Anonymous) Date: Sun, 13 Apr 2003 16:45:11 +0200 (CEST) Subject: Single Point of Weakness is in the Works.Thank you Major Tom. In-Reply-To: <5.1.0.14.0.20030413221502.00a20640@mail.nex.com.au> References: <5.1.0.14.0.20030413221502.00a20640@mail.nex.com.au> Message-ID: On April 13, 2003, professor rat wrote: > Sparks over US power grid cybersecurity > By Kevin Poulsen, SecurityFocus Strike. > Posted: 11/04/2003 at 23:01 GMT Strike. Learn to use STANDARD TIME FORMATS, you pathetic ex-con sellout journalist. DD/MM/YYYY is an antiquated european format. > The draft guideline offer a much more detailed prescription for curing the > power grid's security ills: "Set dial-out modems to not auto-answer," reads > one pointer. "Automatically lock accounts or access paths after a preset > number of consecutive invalid password attempts," suggests another. Assuming Mr. Poulsen is fixating on the aspects of the draft he's most familiar with, it becomes readily apparent that he is still living in 1995. > But Norton also describes the power grid's fractal network of > interdependent systems. "There's incredibly variety of equipment, > generationally, vendor-wise, because it's kind of been cobbled together as > neighborhoods get bigger," he says. "You've got increasingly sophisticated > control centers and increasingly sophisticated microprocessor-controlled > equipment, and linking them are unencrypted 1200-baud lines." Someone teach this child about fractals. From ralf at fimaluka.org Sun Apr 13 08:31:30 2003 From: ralf at fimaluka.org (Ralf-Philipp Weinmann) Date: Sun, 13 Apr 2003 17:31:30 +0200 Subject: Metaswitch cleared by FBI for spying In-Reply-To: <5.2.0.9.0.20030412102851.044f4e30@pop.ix.netcom.com> References: <5.2.0.9.0.20030412102851.044f4e30@pop.ix.netcom.com> Message-ID: <20030413173130.52e9213e.ralf@fimaluka.org> On Sat, 12 Apr 2003 10:59:19 -0400 John Kelsey wrote: > At 04:53 AM 4/12/03 +0200, Thomas Shaddack wrote: > .. > >Something like an embedded computer, dedicated to PGPfone-like > >device, using a cellphone as its communication unit. Basically, an > >embedded computer, with audio I/O on one side and audio I/O and > >serial port on the other one. The unit would connect between the > >phone and either a hands-free or a handset/headset, acting either as > >an encryption/decryption device (and using the phone in data-call > >mode), or as just a passthrough(for nonencrypted ("plainsound"?) > >calls)). > > I wonder how hard it will be to just implement encryption in software > on the phone. Does anyone know if these relatively new PDA-phones > have the ability to process the packets they receive from digital > calls before feeding them into the codec, and the codec outputs before > they send them out over the air? > Or just to set up a data-only call where you're just sending bits > to/from Nautilus or some similar program? I doubt you can get at the raw packets coming out of the GSM codec and going to the modem without some serious mangling of the phone's firmware. Initiating data-calls which then carry the encrypted voice packets seem like a much more feasible idea. From what I've heard, some of the recent crop of PDA phones, notably the Nokia 7650 and the Sony-Ericsson P-800, contain an ARM-9 core with a clock speed above 100 MHz, which might just be sufficient for getting encrypted voice communications on these gadgets of the ground. This of highly course depends on how much cycles your voice codec chews. Seeing that both phones run under Symbian OS 6 and 7 respectively you might even get portability for your application. Easier still might be porting Nautilus or Speak Freely to the Zaurus or just using ZMeeting over an IPsec tunnel over a GPRS connection. Cheers, Ralf -- Ralf-Philipp Weinmann PGP key info: 1024D/57B6E7DB, 40EACFD75032981B8B11E80EB8CEB11057B6E7DB From cypherpunks at salvagingelectrons.com Sun Apr 13 17:39:14 2003 From: cypherpunks at salvagingelectrons.com (Tim Meehan) Date: Sun, 13 Apr 2003 20:39:14 -0400 Subject: Looting of museums, banks, shops, factories--South Central LA writ large In-Reply-To: References: Message-ID: <9j0k9v0t6scsutuuk4nc7dgp1k0ts5eus3@4ax.com> Anonymous said: >The looting was done by the government of Iraq when they >commandeered the economic resources of the country in a >socialist state, enriching the ruling class in government. The >actions of the people are not looting, they are repossession and >liberation, no different from a property owner taking his >lawnmower back from a thief. Coming up next on Fox News: President Bush: Glorious Hero of the class struggle! -Tim From jal at jal.org Sun Apr 13 19:52:37 2003 From: jal at jal.org (Jamie Lawrence) Date: Sun, 13 Apr 2003 21:52:37 -0500 Subject: Kill MS, again, but sideways In-Reply-To: References: <20030413101054.A27412@slack.lne.com> Message-ID: <20030414025237.GA19569@jal.clueinc.net> > Interfaces, APIs, and standards are WAY too important to be let > exclusively in the hands of the manufacturers. Besides, there is no point > in proprietariness of technology as if the vendors want to keep > exclusivity for manufacturing of their designs, they already have the > infrastructure of (*spit*) patents. It is so important that people should be forced to sell things that adhere to a mandaded system? Should I be forced to write code in a spcific way? This isn't academic - I'm about to push code to CPAN. I'm going to do so because I think there's a commercial advantage it releasing the code. Are you proposing that I be forced to write to some spec (that doesn't exist)? (I must say that I'm not defending Microsoft. I think they're killing innovation everywhere they can. Typical monopoly behaviour - it isn't interesting. Transforming them into a public utility is not the way to call them to task. Making them an AT&T is.) > I am pretty militant in this issue. No compromises. I largely agree that it is aweful that IT is so stagnent.I'm personally doing OK, if not great, selling change. I sell open source agressively. Sometimes, I sell closed source. Best tool, best job. Trade is about what works. I do have a personal preference, but that does not interfere with what I tell clients, because I fell I have a duty to tell then facts. -- Jamie Lawrence jal at jal.org "If this were a dictatorship, it'd be a heck of a lot easier... just as long as I'm the dictator...." - GW bush, http://www.cnn.com/TRANSCRIPTS/0012/18/nd.01.html From rah at shipwright.com Sun Apr 13 19:28:13 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Sun, 13 Apr 2003 22:28:13 -0400 Subject: 'The Future of Freedom': Overdoing Democracy Message-ID: The New York Times April 13, 2003 'The Future of Freedom': Overdoing Democracy By NIALL FERGUSON THE FUTURE OF FREEDOM Illiberal Democracy at Home and Abroad. By Fareed Zakaria. 286 pp. New York: W. W. Norton & Company. $24.95. It is evident to all alike that a great democratic revolution is going on among us,'' the great French liberal thinker Alexis de Tocqueville declared in ''Democracy in America,'' published in 1835. It was, he continued, an ''irresistible revolution, which has advanced for centuries in spite of every obstacle and which is still advancing in the midst of the ruins it has caused.'' Tocqueville had visited the United States, seen the future and decided that it worked. Today he stands vindicated. Something like 62 percent of the world's countries are now democracies. To be sure, Tocqueville was not blind to the defects and potential hazards of American democracy. Political parties were ''an inherent evil of free governments.'' The press was prone to gratuitous muckraking. The electorate tended to vote mediocrities into high office. Above all, there was the danger of the ''tyranny of the majority.'' But that risk, he believed, was held in check by the vitality of some distinctively American institutions that tended to preserve individual freedom: the decentralization of government, the power of the courts, the strength of associational life and the vigor of the country's churches. The big question was whether similar safeguards would operate in Europe when democracy made its inevitable advance there. By the time he published ''The Old Regime and the Revolution'' in 1856, Tocqueville had grown deeply pessimistic. In France, despite several attempts, it had proved impossible to introduce democracy without an intolerable diminution of freedom. The aristocracy and the church -- against which the revolutionaries of 1789 had directed their energies -- had, he argued, been bastions of liberty. Once these had been swept away there was nothing to check the twin processes of centralization and social leveling, which Tocqueville had come to see as the sinister confederates of the democratic revolution. Under French democracy, bureaucracy and equality trumped liberty. The result was a new Napoleonic despotism. In his brave and ambitious book, Fareed Zakaria has updated Tocqueville. ''The Future of Freedom'' is brave because its central conclusion -- that liberty is threatened by an excess of democracy -- is deeply unfashionable and easily misrepresented. (''So, Mr. Zakaria, you say that America needs less democracy. Doesn't that make you some kind of fascist?'') It is ambitious because Zakaria seeks to apply the Tocquevillian critique not just to modern America but to the whole world. In some ways, the book is a magazine article that just grew. In 1997 Zakaria -- now the editor of Newsweek International -- published a brilliant article in Foreign Affairs entitled ''The Rise of Illiberal Democracy.'' His argument was that the ''wave'' of democracy that had swept the world in the 1980's and 1990's had a shadow side. Many of the new democracies -- Russia under Yeltsin and Putin, Venezuela under Chavez -- are routinely,'' as he puts it in ''The Future of Freedom,'' ''ignoring constitutional limits on their power and depriving their citizens of basic rights.'' Just holding elections did not make them free. He develops this point further in the book by adding some background history: why England prospered under aristocratic rather than democratic institutions, why democracy failed in interwar Germany. He also draws on the extensive literature on the relationship between democracy and economic growth, buying -- perhaps rather uncritically -- the deterministic argument that democratic institutions are likely to succeed only in countries with per capita income of more than $6,000. Many poor countries that democratized prematurely in the era of decolonization, the argument goes, ended up lapsing into dictatorship and deeper poverty. Conversely, it is no coincidence that ''the best-consolidated democracies in Latin America and East Asia -- Chile, South Korea and Taiwan -- were for a long while ruled by military juntas.'' The moral of the story is simple: first get rich (thereby acquiring a middle class, civil society and the rule of law), then democratize. Memo to the Arab world: ge! tting rich on rents from natural resources doesn't count. There are a few oddities here. It will strike some readers as surprising that an Indian-born author should have such harsh words to say about his own country's democracy and such kind words to say about the benign despotism of Lee Kuan Yew in Singapore, to say nothing of Gen. Pervez Musharraf's less than benign rule in Pakistan. Still, the range of Zakaria's knowledge is impressive. His chapter on the failure of democracy in the Arab world is superb. And I could not agree more that whenever the United States intervenes to overthrow ''rogue regimes,'' at least ''a five-year period of transition . . . should precede national multiparty elections.'' (Unfortunately, it seems unlikely that his call for a ''serious, long-term project of nation-building'' in Iraq will be heeded.) Which brings us to the short time horizon of American politics, one of a number of weaknesses Zakaria detects in the biggest of the Western democracies. Is the United States imperceptibly becoming an illiberal -- or at least a dysfunctional -- democracy? The argument is that the Madisonian system of republican government, which Tocqueville so admired, has been hollowed out in the name of ''more democracy'': ''America is increasingly embracing a simple-minded populism that values popularity and openness as the key measures of legitimacy. . . . The result is a deep imbalance in the American system, more democracy but less liberty.'' Since the 1960's, as Zakaria shows, legislatures, parties and other administrative agencies have sought to make their workings more transparent and responsive to the popular will. Yet the unintended consequence of this ''democratization of democracy'' is that all these institutions have become prey to the activities of professional lobbyists. Open committee meetings in Congress; primary elections to select delegates to national political conventions; changes to the system of campaign funding; the rise of referendums in state and municipal politics -- together, these well-intentioned innovations have tended to debase the political process. Nor has the process of ''overdemocratization'' been confined to the realm of politics. In finance, the law and even religion, the power of the masses has grown at the expense of the elites who once ruled the United States. Tocqueville based his confidence in American democracy on the existence of a professional ''aristocracy'' dividing its time between private work and public service. Zakaria convincingly shows how deregulation has undermined the old American elites, enslaving C.E.O.'s, law partners and evangelical ministers alike to the tyranny of the mass market. Our best hope, he concludes, is to delegate more power to impartial experts, insulated from the democratic fray. Today's independent central banks provide a possible template. Zakaria would like to see a chunk of federal fiscal policy handed to an equivalent of the Federal Reserve -- an autonomous I.R.S. that sets rather than merely collects taxes. A book so wide in its scope is bound to have its flaws. Zakaria follows Mancur Olson and others in embracing a cartoon version of British political development that Herbert Butterfield long ago dismissed as the ''Whig interpretation of history.'' There is also a strangely sketchy quality to Zakaria's political thought. After all, the aristocratic critique of democracy was not Tocqueville's invention. It is one of the central notions of classical political philosophy and history. In Book 3 of his Histories, for example, Herodotus set out the case against democracy in terms remarkably similar to Zakaria's: ''In a democracy, malpractices are bound to occur . . . corrupt dealings in government services lead . . . to close personal associations, the men responsible for them putting their heads together and mutually supporting one another. And so it goes on, until somebody or other comes forward as the people's champion and breaks up the cliques which are out for their own interests. This wins him the admiration of the mob, and as a result he soon finds himself entrusted with absolute power.'' Zakaria's critics will doubtless denounce him for looking backward. Indeed he is -- but not just to the 1950's, or even the 1850's. This is a book that looks back as far as 450 B.C. Whether, in our hyperdemocratic age, there is a market for such a classical defense of aristocratic rule must be doubtful. (Indeed, it would rather undermine Zakaria's own thesis if ''The Future of Freedom'' were to be a runaway best seller.) Yet it deserves a wide readership. Those who fear that while seeking to impose its will on far-flung countries the American republic may unwittingly follow Rome down the path to imperial perdition will read it with a mixture of admiration and unease. Niall Ferguson is the Herzog professor of financial history at the Stern School of Business, New York University. His latest book is ''Empire: The Rise and Demise of the British World Order and the Lessons for Global Power.'' -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From shaddack at ns.arachne.cz Sun Apr 13 13:45:33 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Sun, 13 Apr 2003 22:45:33 +0200 (CEST) Subject: Kill MS, again, but sideways In-Reply-To: <20030413101054.A27412@slack.lne.com> Message-ID: > Really? You got this mail through an old modem and linux box.. The keyword is *OLD* modem. There were times when the interface was RS232, the manufacturers voluntarily obeyed the Hayes standard AT command set, and their vendor-specific extensions were typically documented in the booket you got with the modem. No special drivers, no proprietary interfaces, as the computers were meant to be when Gods created them. > Microsoft's lock on the winmodem appears to have been pretty short. Depends on vendor and chipset. > Commonly used interfaces do eventually become well known. > While they do have owners, the amount of market interia they > develop makes then essentially unchangeable. PROBLEM: Depends on how willing the vendor is in documenting the chipset. > But demanding that they be "communal property" sounds like > the sort of socialism that can only be imposed by authority > and fails when it is imposed. Interfaces, APIs, and standards are WAY too important to be let exclusively in the hands of the manufacturers. Besides, there is no point in proprietariness of technology as if the vendors want to keep exclusivity for manufacturing of their designs, they already have the infrastructure of (*spit*) patents. I am pretty militant in this issue. No compromises. > That's been done before-- Diamond refused for years to supply info > to Xfree86, so there was a boycott of Diamond graphic cards in > the Linux community. They eventually saw the light (or market). ...and for years it was impossible to use Diamond cards in real operating systems. Good. > 1. figuring out the winmodem interface. It's software, so its possible. > But it appears that others have already done the work for at least > some winmodem chips. VERY labor-intensive. Requires highly qualified workforce. Barely suitable only for the most common chipsets. (See the end for more comments.) Wastes brain-hours that could be invested better. > 2. boycotting winmodem makers. Not likely to work in this case since > most modem makers sell the things. Besides, the market drive for > reduced chip count and the PC makers' hunger for anything that chews up CPU > cycles and drives consumers to buy faster machines is a lot stronger > than that for linux. Won't work well, and surely won't work well for integrated modems in laptops. > 3. beg for some higher power to "do something". You can probably > guess from my tone that I don't think much of this option. I would be happy if we could ignore this option. However, still better than nothing; you have to have a really big stick for the big vendors. Maybe it could be sneaked into something about security or infrastructure protection/maintenance. One more option: 4) Extend Assassination Politics to high managers. Everyone who peddles proprietary technology and refuses to open their documentation should be killed in a long and painful way. They should pay for the frustration they inflict onto the field technicians. Or a version of 4), 5) A bounty for the information leaks. Have a cash pool with a bounty for the one who will leak the given "proprietary" information into the Public Domain. This could extend to schematics and service manuals. However, the option 1) would be the best, if we'd manage to dramatically reduce the amount of labor necessary to tear a proprietary driver apart. This requires development of good, easy to use reverse engineering tools. From shaddack at ns.arachne.cz Sun Apr 13 14:15:53 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Sun, 13 Apr 2003 23:15:53 +0200 (CEST) Subject: Single Point of Weakness is in the Works.Thank you Major Tom. In-Reply-To: Message-ID: > Strike. Learn to use STANDARD TIME FORMATS, you pathetic ex-con > sellout journalist. DD/MM/YYYY is an antiquated european format. ...and MM/DD/YYYY is an antiquitated American format. STANDARD time format is ISO-8601 compliant, YYYY-MM-DD. Another acceptable way is DD MMM YYYY in any order, where the format of the fields automatically and unambiguously determines meaning. Peddlers of other formats should be slowly tortured on public TV as the warning for the others. I'd be delighted to watch. > Assuming Mr. Poulsen is fixating on the aspects of the draft he's > most familiar with, it becomes readily apparent that he is still > living in 1995. You won't believe how many people who should know what IT security is about still live somewhere between 1900 and 1950. > > But Norton also describes the power grid's fractal network of > > interdependent systems. "There's incredibly variety of equipment, > > generationally, vendor-wise, because it's kind of been cobbled together as > > neighborhoods get bigger," he says. And because the vendors aren't required to disclose the documentation nor at least the interfaces, half[1] of the technology is a proprietary piece of shit that nobody knows how it works, and - worse - nobody can expect how it will fail. > > "You've got increasingly sophisticated control centers and > > increasingly sophisticated microprocessor-controlled equipment, and > > linking them are unencrypted 1200-baud lines." True. And the cables are accessible to everyone who knows how to crawl into a manhole. Not even talking about the atrocious security of wireless links. > Someone teach this child about fractals. Why fractals? One comment I would have is that the growing intelligence of equipment should mandate fail-safe operation, refusal to perform commands that would put the node and its surrounding area to dangerous situation. Eg, it's better to cause traffic jam by setting all lights to red (or, even better, blinking yellow, which means here that the traffic lights aren't controlled) when a command comes to set greens in unsafe combination, than to obey the command. This way, the growing CPU power will be at least used to maintain sane behavior of the equipment in unpredictable cases and even in case of an active hostile attack. [1] I am a closet optimist. From mv at cdc.gov Mon Apr 14 03:38:34 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Mon, 14 Apr 2003 03:38:34 -0700 Subject: Single Point of Weakness is in the Works.Thank you Major Tom. Message-ID: <3E9A8FAA.A7815584@cdc.gov> At 11:15 PM 4/13/03 +0200, Thomas Shaddack wrote: >> Strike. Learn to use STANDARD TIME FORMATS, you pathetic ex-con >> sellout journalist. DD/MM/YYYY is an antiquated european format. > >...and MM/DD/YYYY is an antiquitated American format. Indeed. And ambiguous. I always write out the month, which confuses americans, and telling them that its ambiguous otherwise just confuses them more :-) I have settled for "I used to work with Europeans". >You won't believe how many people who should know what IT security is >about still live somewhere between 1900 and 1950. Or use master-keyed locks... >> > But Norton also describes the power grid's fractal network of > >> Someone teach this child about fractals. > >Why fractals? Because little Kevin used that big word. Isn't he cute? Too bad its inappropriate and gratuitous. >One comment I would have is that the growing intelligence of equipment >should mandate fail-safe operation, refusal to perform commands that would >put the node and its surrounding area to dangerous situation. Yes, we can all afford sanity checks in our code now. I would caution that sometimes you need to override the sanity checks, e.g., to cause a flood to save the dam. Note that overriding will often require you to go through the same control system ---not some big red lever you manually pull. Can't wait until Detroit sells Joe Sixpack a drive by wire car that thinks for him when it shouldn't, to say nothing of failing digitally (ie catastrophically). Eg, it's >better to cause traffic jam by setting all lights to red (or, even better, >blinking yellow, which means here that the traffic lights aren't >controlled) All-red stops everyone, forever, or until they start to think. Blinking red is what you mean. Blinking yellow isn't in the official lexicon AFAIK. All-black = blinking red but often taken as green, leading to red asphalt. ------- There is no god and Murphy is his prophet. From mv at cdc.gov Mon Apr 14 04:31:02 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Mon, 14 Apr 2003 04:31:02 -0700 Subject: MDs must use email encryption, by (HIPAA) law Message-ID: <3E9A9BF6.6C7580B2@cdc.gov> http://www.latimes.com/features/health/la-he-hipaa14apr14,1,4384076.story?coll=la%2Dheadlines%2Dhealth "A tougher medical privacy law" Doctors no longer can send e-mails to patients. (Not true. E-mails between doctor and patient are acceptable as long as the messages are encrypted and sent on a secure computer network.) From nobody at paranoici.org Sun Apr 13 22:00:13 2003 From: nobody at paranoici.org (Anonymous) Date: Mon, 14 Apr 2003 07:00:13 +0200 (CEST) Subject: Single Point of Weakness is in the Works.Thank you Major Tom. In-Reply-To: <5.1.0.14.0.20030414014751.00a1aec0@mail.nex.com.au> References: <5.1.0.14.0.20030414014751.00a1aec0@mail.nex.com.au> Message-ID: <1235e2300fc465ab68c89e9554845ad9@paranoici.org> On April 13, 2003, professor rat wrote: > > Posted: 11/04/2003 at 23:01 GMT Strike. Learn to use STANDARD TIME > FORMATS, you pathetic ex-con sellout journalist. DD/MM/YYYY is an > antiquated european format. << > > Standard where? There is more net outside of the steenkin fascist US than See, even though you couldn't, a fellow list reader could figure it out. > in it.Also I am not an ex-con (yet) and I am an ENTERTAINMENT journalist.I > like D/M/Y so FUCK YOU ASSHOLE I apologize. I seem to have misattributed your deficiency to Mr. Poulsen or his mickey-mouse "security" organization. It seems you are such a turd that you replaced a perfectly good datestamp with your bastardized DDMMYYYY shit, then cleverly proceeded to rat yourself out. > >>>> Blah Blah...number of consecutive invalid password attempts," > suggests another. > > Assuming Mr. Poulsen is fixating on the aspects of the draft he's most > familiar with, it becomes readily apparent that he is still living in 1995. > <<< > > Assuming anyone gives two shits about what you think,who or whatever 'you' > are...So? > I am living in 1981.This is real futuristic for me and isn't that what's > important here? Me. Does this come naturally for you? I have to make an effort to be so ignorant. From nobody at paranoici.org Sun Apr 13 22:47:48 2003 From: nobody at paranoici.org (Anonymous) Date: Mon, 14 Apr 2003 07:47:48 +0200 (CEST) Subject: Single Point of Weakness is in the Works.Thank you Major Tom. In-Reply-To: References: Message-ID: <9068e087114eac02151de6bdbc545a3e@paranoici.org> On Sunday, April 13, 2003, at 05:23 PM, Thomas Shaddack wrote: > > Strike. Learn to use STANDARD TIME FORMATS, you pathetic ex-con > > sellout journalist. DD/MM/YYYY is an antiquated european format. > > ...and MM/DD/YYYY is an antiquitated American format. > > STANDARD time format is ISO-8601 compliant, YYYY-MM-DD. YYYYMMDD is also an option if (in the judgment of the writer) space is scarce. Everyone reading this thread should know that already. > Another acceptable way is DD MMM YYYY in any order, where the format of > the fields automatically and unambiguously determines meaning. Acceptable? Maybe to a few Europeans. That's a waste - requires computing the order of fields, and adds a character in its written representation. > Peddlers of other formats should be slowly tortured on public TV as the > warning for the others. I'd be delighted to watch. Me too. > > Assuming Mr. Poulsen is fixating on the aspects of the draft he's > > most familiar with, it becomes readily apparent that he is still > > living in 1995. > > You won't believe how many people who should know what IT security is > about still live somewhere between 1900 and 1950. I believe almost anything nowadays. > > > But Norton also describes the power grid's fractal network of > > > interdependent systems. "There's incredibly variety of equipment, > > > generationally, vendor-wise, because it's kind of been cobbled together as > > > neighborhoods get bigger," he says. > > And because the vendors aren't required to disclose the documentation nor > at least the interfaces, half[1] of the technology is a proprietary piece > of shit that nobody knows how it works, and - worse - nobody can expect > how it will fail. As shitty as those systems are, you have to wonder whether it's cost effective to use federal, state, or industry money to fix them when an M82A1 and some jerk in a Hummer could cause just as much trouble. > > > "You've got increasingly sophisticated control centers and > > > increasingly sophisticated microprocessor-controlled equipment, and > > > linking them are unencrypted 1200-baud lines." > > True. And the cables are accessible to everyone who knows how to crawl > into a manhole. Not even talking about the atrocious security of wireless > links. > > > Someone teach this child about fractals. > > Why fractals? Simply because Sir Poulsen used that term to describe a cobbled-together network. (two Poulsen |Ps up) > One comment I would have is that the growing intelligence of equipment Insert dissent based on microsoft jab here. From shaddack at ns.arachne.cz Sun Apr 13 22:54:55 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Mon, 14 Apr 2003 07:54:55 +0200 (CEST) Subject: Kill MS, again, but sideways In-Reply-To: <20030414025237.GA19569@jal.clueinc.net> Message-ID: > It is so important that people should be forced to sell things that > adhere to a mandaded system? Should I be forced to write code in a > spcific way? This isn't academic - I'm about to push code to CPAN. > I'm going to do so because I think there's a commercial advantage it > releasing the code. Are you proposing that I be forced to write to some > spec (that doesn't exist)? It's critical that vendors adhere to published specs. They can be "standard" ones, they can be their own ones, but they have to be PUBLISHED. Either as an RFC-like document, or as the source code of the program/driver itself. I don't care about the form as long as I can take that damned thing and glue it to whatever I am building at the moment without having to reverse-engineering it. (Or, even more important, that when I will be tracing why it doesn't work as expected, I will know where I have to look for what.) If the specs are too tight for you to fit, or aren't at all, good for me - but I want to have enough of data to write an eventual convertor from/to something other. What it does inside is your business, but I want to know what goes in and out - protocols and data formats. > (I must say that I'm not defending Microsoft. I think they're killing > innovation everywhere they can. Typical monopoly behaviour - it isn't > interesting. Transforming them into a public utility is not the way to > call them to task. Making them an AT&T is.) I want to see Billy "Greedy" Gates having to powerlessly watch his power disappearing, his clout leaking through his fingers, his empire crumbling. This would hurt him more than losing money. I want to see him suffer. I want him to end in Hell, reinstalling Windows NT 5 forever. > I largely agree that it is aweful that IT is so stagnent.I'm personally > doing OK, if not great, selling change. I sell open source agressively. > Sometimes, I sell closed source. Best tool, best job. Trade is about > what works. I do have a personal preference, but that does not interfere > with what I tell clients, because I fell I have a duty to tell then facts. I go for open source whenever I can. If I can't have the source, I want at least the specs. I would have to think hard to find what I hate more than feeling powerless - when a binary-only thing doesn't work correctly and I can't take a look into it and litter the suspicious part of code with debug messages. (I am in fighting mood now, freshly after winning a several hours long battle with gnokii, smsd, and Nokia 3310, trying to figure out why that damned thing sent a message 4 times and claimed error. The reason was a response timeout constant defaulting to -1 (no wait) instead of 30 (at most 3 seconds wait). If it'd be a binary-only thing, I'd have to wait at least a day for the vendor's response, likely MUCH longer - if it would have support at all.) Mark Twain was right, when he said that the nearest helping hand is right at the end of your shoulder. :) I just wish the corporations would let people help themselves and wouldn't push for artificial complexity and forced dependence on their "good will". From mv at cdc.gov Mon Apr 14 09:40:34 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Mon, 14 Apr 2003 09:40:34 -0700 Subject: "Stay Behind" strategies in Iraq [Terraforming with the Army Corps of Engineers] Message-ID: <3E9AE481.9090504@cdc.gov> At 11:37 AM 4/14/03 +0100, Ken Brown wrote: >Some people say that the draining of the marshes has messed up the water >table in the south (like the ecological disasters in old Soviet Central >Asia, though on a much smaller scale - no doubt similar boo-boos were >made in the US, also on a much smaller scale, Ask a Floridian about the Everglades some time. A few thou died in a hurricane early last century, so the Army Corps of Engineers channelized the marshes. Cut the glades down to about a quarter. It was just swamp then, not a natural treasure. Not quite the toxic dust bowl that the Russkies made, but it did happen here. From camera_lumina at hotmail.com Mon Apr 14 07:39:12 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 14 Apr 2003 10:39:12 -0400 Subject: chipmakers flock to security Message-ID: So...anyone want to take a guess on the % of these chips the feds can walk right into? -TD Chipmakers Flock to Security -------------------------------------------------------------------------------- More and more processor companies are embedding security into their components, and it appears Broadcom Corp. (Nasdaq: BRCM - message board) will be the next to do so. The company is using this week's RSA Conference to explain its security strategy, which emphasizes the integration of security into other Broadcom chips. "You'll see product announcements in the second quarter," probably around the end of May, says Joe Wallace, Broadcom senior product manager. Big deal, says Russell Dietz, CTO of Hifn Inc. (Nasdaq: HIFN - message board). His company's HIPP series of chips have used this concept for years, although from the opposite vantage point: Hifn's are security devices with microprocessor and memory added, whereas Broadcom and others are starting with a microprocessor and adding security. "They're looking at this picture from the other side of the glass, but it's the same problem," Dietz says. "All of our HIPP processors -- that's basically what they are, a set of embedded cryptoprocessors and microprocessors alongside DRAM. That's why I find it humorous that Broadcom and others are saying embedding security with microprocessors is going to happen someday." Broadcom wouldn't be the first processor vendor to announce embedded security. Integrated Device Technology Inc. (IDT) (Nasdaq: IDTI - message board) released just such a part this week, and Intel Corp. (Nasdaq: INTC - message board) has begun adding hardware-based security to some of its network processors (see IDT Processor Embeds Security and Intel Moves on Security ). "That's a trend overall. As encryption becomes absolutely necessary, you see it being added to devices," says Eric Mantion, senior analyst with In-Stat/MDR. Companies and analysts seem to agree that in the long run, security will wind up embedded inside other chips. This first round of integration concentrates on merging microprocessors with encryption acceleration chips, devices specializing in the awkward large-integer math used in cryptography. But integration of authentication and other security-minded functions isn't far off. "Those things will start to become embedded in the next year or so," Dietz says. Chip vendors usually try to integrate functions to help simplify boards and to increase a particular chip's importance to customers. In the case of security, Broadcom sees one more reason: to prevent customers from ignoring it. Plenty of users and OEMs are opting to leave security out of routers, switches, and appliances, Broadcom's Wallace contends. That's partly a function of the speeds at which they're running. "The majority of these markets are at the sub-500-Mbit/s-level range, and at those data rates the benefit of offloading everything [to a specialized security processor] is not so high," he says. Broadcom can't do much about that, but it can tackle the issue of cost, which is another barrier to getting security into some systems. Integration of chips typically lowers costs, and Broadcom believes this can be brought to the point where security piggy-backs practically for free. "There are products coming out next month where the amount of security you're getting for the price you're paying for it is much more than a standalone would be," Wallace says. For evidence, one could point to the IXP2850, an Intel microprocessor that adds security. The extra price for the security features "wasn't chump change, but for what it brought to the solution it was well worth the money," says In-Stat's Mantion. Down the road, it's possible that integration could spread to the all-in-one chips touted by Cavium Networks Inc. or Corrent Corp. Such chips manage multiple IPSec or SSL sessions, freeing a CPU or network processor from that work. These could find a match with large ASICs, Mantion thinks. "There are going to be some situations where a company has an ASIC that's good at what it's designed to do, but they want to add security." The low uptake of security is keeping the security-chip market small, Broadcom contends. In-Stat estimates the 2001 security-chip market was $75 million, and that 2002 was a slight decline from that level. But Broadcom's own analysis, based on estimating the percentage of switches, routers, and appliances that include security chips, puts the 2002 security-chip market at $26.5 million. Broadcom's numbers don't include the devices with built-in security, while Mantion's do (his figures include only the security portion of such chips, rather than the full price). But those wouldn't add much to the $26.5 million, keeping Broadcom's estimate much lower than most analysts'. Mantion estimates the 2006 security-chip market at $575 million, and that includes integrated security devices.  Craig Matsumoto, Senior Editor, Light Reading _________________________________________________________________ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail From timcmay at got.net Mon Apr 14 10:44:05 2003 From: timcmay at got.net (Tim May) Date: Mon, 14 Apr 2003 10:44:05 -0700 Subject: Turnabout is fair play In-Reply-To: <3E9AC500.941F7989@ccs.bbk.ac.uk> Message-ID: On Monday, April 14, 2003, at 07:26 AM, Ken Brown wrote: > It occurs to me that the "Project for the New American Century" > people's > well-known despite for international law and treaties and the UN is > ... > They recognise that the USA is the strongest military power in the > world, at least for the next few decades, and they want to use those > few > decades either to prevent anyone else catching up with them or (because > they aren't so stupid as to believe they can get away with that for > ever) to remake the rest of the world in their own image so that if > Europe, China, or India ever again draw close to them in economic or > military power we will have been conditioned to behave in American > ways. > > They despise the idea of international law or treaty obligations. Speaking of the next couple of decades in the United States, I'm going to be chortling when a leftist President takes power and uses the same tools the Right is now using: -- pre-emptive wars not declared by Congress (let alone not for clear and present danger reasons) -- PATRIOT Act snooping, illegal searches, and unlimited detentions -- the whole system of police state measures -- a Homeland Security Director that would do Fidel Castro or Ralph Nader proud APRIL, 2009. WASHINGTON (Routers) -- President Clinton today declared that the illegal regime in Switzerland must be removed to protect American from tax cheats and corporate criminals. She cited the Bush Doctrine as justification. She urged the Swiss government to lay down their arms and report to reprocessing centers in Coalition of the Willing nations like Lichtenstein. OCTOBER, 2010. WASHINGTON (Routers) -- Administration officials announced today the detention of another 4000 illegal combatants in America's war on unauthorized communication systems and other terrorist devices. "These high tech criminals have been helping the drug dealers and have undermined our approach to stamping out tools for tax evasion," said Homeland Security Director Kweizi Mfume. Mfume noted that last summer's raid on the illegal "Crypto" conference had netted more than 150 information terrorists. He added that some are cooperating and may be moved from Guantanomo to U.S. processing facilities. --Tim May "Al Qaida was never the real threat...Afghanistan is." "Aghanistan was never the real threat...Iraq is." "Iraq was never the real threat...Syria is." "Syria was never the real threat...stay tuned." From camera_lumina at hotmail.com Mon Apr 14 07:53:17 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 14 Apr 2003 10:53:17 -0400 Subject: Beach Blanket Babylon Message-ID: Tim May wrote... "Not to mention the tens of billions already in thousands of bank accounts in Europe, Asia, the Caribbean, Panama, and other locations. Set up over the past 20 years, and deeply hidden. (One of Saddam's relatives, recently a diplomat in Switzerland, spent most of his professional time distributing money safely. Some of this money may only be retrievable by Saddam, some only by his immediate family, some by "stay behind" and "terrorist" organizations.) Tens of billions in offshore accounts, and hundreds of millions in bullion, $100 bills, and treasure from the museums, plus assorted military know-how and weaponry. Ah, this is gonna fund a _lot_ of merriment! " Well, I'm not so sure. Saddam is not bin Laden...bin Laden is a true believer, from what I can tell. Saddam and his family are pretty much in it for the perks.So the extended set of Saddam connections probably have an extensive "flight capital" organization (a la Boerhman), ready to fund a very high-end lifestyle for a whole cluster of well-connected ex-pat Iraqis. Terrorism will only be considered a useful expenditure if it results in clear and obvious monetary benefit to this extended web of relations. -TD >From: Tim May >To: cypherpunks at lne.com >Subject: Beach Blanket Babylon >Date: Sat, 12 Apr 2003 20:15:17 -0700 > >On Saturday, April 12, 2003, at 06:23 PM, Major Variola (ret) wrote: > >>Iraq owes a billion (US ) pounds (Sterling) to Russia for weapons. >> >>Russia spied on Blair for Hussein. >> >>Do the math, Tim. > >Where's the surprise? Certainly none here. According to CNN, Iraq owes >France at least $8 billion, owes Germany some similar amount, and so on. >Some of these debts are for armaments, some for industrial products, etc. > >Iraq's estimated debt is $200 billion. The CNN estimate for France ($8 B) >is probably low. > >The U.S. of course is calling for France and Germany to "forgive" the >debts. (A complication is of course that some of these debts are not owed >to the _nations_ of France and Germany but to corporations, partnerships, >banks, and even individuals. Which makes it hard for France or Germany to >wave a magic wand and erase the debts. Granted, Jacques Randome Frenchie >may have a hard time collecting, but the principle is of course that debts >are not absolved by mere changes in government leadership. (This matters >because the international bodies can make it hard for payments to flow back >to Iraq: they can "attach" payments and send them to the creditors who make >claims. The U.S. can attempt to avert this by bypassing European banking >networks, I suppose. But, fundamentally, the money is still owed and if the >creditors do not forgive the debts (and I mean the creditors, not the >nations of France and Germany), then assets can be attached, even oil >tankers can be impounded.) > >More interesting to me is the exodus of money and weaponry out of Iraq. >Billions in gold bullion exiting the country. And into vaults and hidden >places in Syria, Jordan, Iran, Turkey, and border areas of Iraq. Not only >is there much evidence that the exodus of cash (dollars, not dinars) and >bullion and valuable weapons began months ago, when war became inevitable, >but it accelerated several weeks ago, just before the bombing began. > >Not to mention the tens of billions already in thousands of bank accounts >in Europe, Asia, the Caribbean, Panama, and other locations. Set up over >the past 20 years, and deeply hidden. (One of Saddam's relatives, recently >a diplomat in Switzerland, spent most of his professional time distributing >money safely. Some of this money may only be retrievable by Saddam, some >only by his immediate family, some by "stay behind" and "terrorist" >organizations.) > >Tens of billions in offshore accounts, and hundreds of millions in bullion, >$100 bills, and treasure from the museums, plus assorted military know-how >and weaponry. > >Ah, this is gonna fund a _lot_ of merriment! > >I just hope they're not as incompetent as the less well-funded Al Qa'aida. >I hope they plan to use some of these tens of billions, some of their >weaponry, taking out the real target. > > > >--Tim May >"That the said Constitution shall never be construed to authorize Congress >to infringe the just liberty of the press or the rights of conscience; or >to prevent the people of the United States who are peaceable citizens from >keeping their own arms." --Samuel Adams _________________________________________________________________ Help STOP SPAM with the new MSN 8 and get 2 months FREE* http://join.msn.com/?page=features/junkmail From k.brown at ccs.bbk.ac.uk Mon Apr 14 03:37:36 2003 From: k.brown at ccs.bbk.ac.uk (Ken Brown) Date: Mon, 14 Apr 2003 11:37:36 +0100 Subject: "Stay Behind" strategies in Iraq References: <3E9714BD.4543EB74@cdc.gov> Message-ID: <3E9A8F70.F3416EF1@ccs.bbk.ac.uk> "Major Variola (ret)" wrote: [...] > So use oil money to create agricultural projects which use lots > of labor. Iraq has water. (When we take Saudi Arabia we > can build desalination plants..) Actually *Turkey* has the water (& to a much lesser extent Iran & even less than that Syria). They let what they don't use flow into the rivers and down to the sea. As they get richer - or as they get more annoyed with the Kurds - they may decide that they want to keep more and let less flow. They are setting up serious hydro power. Sa'udis can build their own desalination plants. They've got the money, they've got the energy (more oil and/or solar and/or wind than they can use). Iraq doesn't need desalination plants. Iraq needs to do deals with Turks or the Iranians. Presumably the first cut has to be Oil for water and/or electricity. Some people say that the draining of the marshes has messed up the water table in the south (like the ecological disasters in old Soviet Central Asia, though on a much smaller scale - no doubt similar boo-boos were made in the US, also on a much smaller scale, the Soviets were very good at not stopping digging how ever big the hole was - presumably because anyone who said that it had been a bad idea to dig the hole in the fisrt place was in risk of their life) Reflooding them might be popular with Greens, westerners with a sentimental attraction to old Arab ways of life, the Iranians, and the people of Basra (who get their water supply back). But unpopular with those who are growing crops on the reclaimed land (how long till runaway salination sets in?) and anyone with a magic-bullet heavy-metal engineering attitude to political problems. [...] > You grossly misunderstand. The US now owns Iraq. The US can > physically keep Iraqis poor if it wishes ---put them all in internment > camps, feed them a meal at a time. (How is this statism? Its a > statement > of brutal fact, a consequence of who has the biggest guns.) > > The US can also give them all satellite TVs & trust funds if it wishes, > using either your taxes or Iraq's oil sales money. > > Now my claim is that 1. the USG interest is in Americizing Iraq, and > that > 2. (having the guns) they will do so, whether the Iraqis want it or not. Put like that it is hard to deny. One big unknown is how much Balkanisation the US will allow (or encourage). Effectively all the oil is either round Kirkuk (which the US and the Turks are now trying to re-disposses the previous owners of) or Basra (way down south, on the other side of the marshes, and quite capable of being as nice little oil state on its own, depending on how Iraqi the folks their actually feel). The best agriculture is in the Shi'ite centre and after that the Kurdish hills. The Sunni west - that has been running Iraq for however many centuries, first on behalf of the Turks, then the British, then briefly for the Ba'athists - is dirt-poor. A Balkanised Iraq is one in which the previous top region suddenly has no economic basis for their way of life. USAnians can no doubt have fun contemplating what might happen to WDC (or Maryland, or Virginia) if the government became unable to collect 90% of the tax revenue. Baghdad is one of those cities that is where it is because of trade and government, not because it produces much. Not that that is an unstable reason for a city being where it is - Istanbul (for example), Beijing and London have been around a long time for the same reasons So the US needs to decide how much resource it is willing to use to keep Iraq together. And how much it wants to piss off Turkey. I suspect that in the medium-long term the only stable future of the Kurds in Iraq & perhaps in Turkey, is something along the lines of the Scots in Britain - their own laws and parliament, but so culturally assimilated it doesn't really matter to anyone else any more. Of course there may not be a stable future. [...] > You are also aware of how, after a population gets Americanized, they > start using birth control? Chicks wanting college, more money per > family > member the fewer there are, no need for agricultural labor. [Alas > world-Americanization is happening too slowly and the population bomb is > slowly detonating] That's already happening to Iraq to some extent. Girls do get to go to college, some of them. The wars and general shit of the last 20 years have slowed the process down. From k.brown at ccs.bbk.ac.uk Mon Apr 14 04:16:58 2003 From: k.brown at ccs.bbk.ac.uk (Ken Brown) Date: Mon, 14 Apr 2003 12:16:58 +0100 Subject: 'The Future of Freedom': Overdoing Democracy References: Message-ID: <3E9A98AA.593308F@ccs.bbk.ac.uk> "R. A. Hettinga" posted: > 'The Future of Freedom': Overdoing Democracy > By NIALL FERGUSON > > THE FUTURE OF FREEDOM > Illiberal Democracy at Home and Abroad. > By Fareed Zakaria. > 286 pp. New York: W. W. Norton & Company. $24.95. [...] > The moral of the story is simple: first get rich (thereby acquiring > a middle class, civil society and the rule of law), then democratize. > Memo to the Arab world: getting rich on rents from natural resources doesn't count. That just about wraps it up for the Australians then :-) From Anonymous-Remailer at See.Comment.Header Mon Apr 14 06:20:10 2003 From: Anonymous-Remailer at See.Comment.Header (Tom Veil) Date: 14 Apr 2003 13:20:10 -0000 Subject: Kill MS, again, but sideways In-Reply-To: Message-ID: Thomas Shaddack wrote on April 13, 2003 at 22:45:33 +0200: > > But demanding that they be "communal property" sounds like > > the sort of socialism that can only be imposed by authority > > and fails when it is imposed. > > Interfaces, APIs, and standards are WAY too important to be let > exclusively in the hands of the manufacturers. Besides, there is no point > in proprietariness of technology as if the vendors want to keep > exclusivity for manufacturing of their designs, they already have the > infrastructure of (*spit*) patents. > > I am pretty militant in this issue. No compromises. If I want to keep secret the details of something I make, it is my right to do so. Don't like it? Don't fucking buy it. (Snipped) > 4) Extend Assassination Politics to high managers. Everyone who peddles > proprietary technology and refuses to open their documentation should be > killed in a long and painful way. They should pay for the frustration they > inflict onto the field technicians. Any communist maggots that murder, or attempt to murder people for merely keeping secret the details of the stuff they make and sell should be bound, gagged, tortured, then taken out back to have their skulls crushed with a sledgehammer until their brains start oozing out their ears. -- Tom Veil From mv at cdc.gov Mon Apr 14 13:44:09 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Mon, 14 Apr 2003 13:44:09 -0700 Subject: Adobe v Sklyarov Episode II: Blackboard vs. Interz0ne Conf., Acidus, Virgil Message-ID: <3E9B1D99.43D818A3@cdc.gov> http://www.interz0ne.com/events/interz0ne_cease_order.html http://cryptome.org/interzone-cd.htm Slightly condensed to savor Gregory S. Smith's terroristic threats: It recently has come to Blackboard's attention that Billy Hoffman and Virgil Griffith are intending to speak as co-panelists in your upcoming InterzOne II conference on April 11, 2003. The website located at www.yak.net/acidus, Mr. Hoffman's website, states that ..... "This will show not only did we hack the system, but we hacked it so far we could build functional readers from scratch." Please be advised that the actions described on Mr. Hoffman's website, including the hacking of Blackboard's system, are illegal, and that any effort by either Mr. Hoffman or Mr. Griffith to convey to others at your Conference any information gleaned in whole or in part from such actions, particularly in an effort to cause Blackboard economic harm, would be improper. Please be advised of our view that it would be actionable for you or your conference to facilitate Mr. Hoffman's and Mr. Griffith's announced plans for, among other things, the disclosure of signals captured, the releasing of code, the description of development of functional readers, and the hardware specs to wire the readers and/or control circuits. .... We are also examining whether the actions of Mr. Hoffman and Mr. Griffin may have violated other federal laws, including (among others) the Digital Millenium Copyright Act, the Economic Espionage Act, the Electronic Communications Privacy Act, the Wiretap Act, and the Consumer Fraud and Abuse Act, as well as Georgia's Computer Systems Protection Act. Blackboard is filing a motion for preliminary and permanent injunctive relief against Mr. Hoffman and Mr. Griffith, to prevent the anticipated actions their website has announced. Blackboard is actively seeking a temporary restraining order and other injunctive relief in this matter. Failure to comply with these requests may expose you or your organization to an action for injunctive relief or monetary damages, and any other relief permitted under state and federal law, including court costs and attorneys' fees. You may also wish to consider and examine the potential criminal consequences, under theories of aiding and abetting and conspiracy, if you facilitate Mr. Hoffman's and Mr. Griffith's efforts despite their known and admitted hacking. From frantz at pwpconsult.com Mon Apr 14 14:03:08 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Mon, 14 Apr 2003 14:03:08 -0700 Subject: Single Point of Weakness is in the Works.Thank you Major Tom. In-Reply-To: <87fzokdgtn.fsf@mulligatwani.msrl.com> References: <3E9A8FAA.A7815584@cdc.gov> ("Major Variola's message of "Mon, 14 Apr 2003 03:38:34 -0700") <3E9A8FAA.A7815584@cdc.gov> Message-ID: At 12:23 PM -0700 4/14/03, Michael Shields wrote: >In article <3E9A8FAA.A7815584 at cdc.gov>, >"Major Variola (ret)" wrote: >> Blinking yellow isn't in the official lexicon AFAIK. > >I don't know if they are standardized nationally or internationally. >In some areas traffic signals change at night to blinking-red for the >cross street and blinking-yellow for the main road; this is intended >to be similar to a two-way stop. >http://www.dmv.state.va.us/webdoc/citizen/drivers/vadm/vadm5p.asp >-- >Shields. When I got my Massachusetts drivers license (many years ago), they used blinking yellow both ways to mean "caution", and blinking green (yes green!) to mean that the other direction had a blinking red. "The nice thing about standards is that there are so many to chose from" -- somebody Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From mv at cdc.gov Mon Apr 14 15:08:38 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Mon, 14 Apr 2003 15:08:38 -0700 Subject: And now a word from the BBC Big Brother Central Message-ID: <3E9B3166.A2938C5D@cdc.gov> Pocket tracker monitors children http://news.bbc.co.uk/2/hi/technology/2946183.stm [uses triangulation not GPS, like some CALEA phones] Police consider lie detector tests http://news.bbc.co.uk/2/hi/uk_news/england/2944563.stm [its not just for the DoE http://cryptome.org/doe041403.txt though its empirically crap/psyops] From k.brown at ccs.bbk.ac.uk Mon Apr 14 07:26:08 2003 From: k.brown at ccs.bbk.ac.uk (Ken Brown) Date: Mon, 14 Apr 2003 15:26:08 +0100 Subject: PNAC takes state socialism to the international field? References: <"from jamesd"@echeque.com> <3E95E6CE.2543.33132D9@localhost> <3E96B126.4F38F326@ccs.bbk.ac.uk> Message-ID: <3E9AC500.941F7989@ccs.bbk.ac.uk> It occurs to me that the "Project for the New American Century" people's well-known despite for international law and treaties and the UN is At first sight it is absolutely nothing but "might is right". They are the strongest, they will do what they want to do and not let anyone stop them. That want they want to do is much more congenial to us than what some other people might want to do doesn't change the nature of it. They might well want to use their power benevolently - even liberally - but they will be the ones to choose how to use it. They recognise that the USA is the strongest military power in the world, at least for the next few decades, and they want to use those few decades either to prevent anyone else catching up with them or (because they aren't so stupid as to believe they can get away with that for ever) to remake the rest of the world in their own image so that if Europe, China, or India ever again draw close to them in economic or military power we will have been conditioned to behave in American ways. They despise the idea of international law or treaty obligations. They think of the world as made up of states and governments rather than of individual people, and they also think that relations between states must necessarily be hierarchical, rather than consensual or by agreement. They have a huge emotional desire for stability and predictability and think that that is best secured by concentrated power rather than dispersed power, by dictation rather than negotiation, by unilateral action rather than by mutual agreement. They want to simplify the world in order to do it good. They are, in fact, in international affairs, taking up a position very similar to the old discredited state socialists in national affairs. Just as the apparently benevolent Fabians and the obviously vicious Soviets saw that state power was overwhelmingly supreme within a nation state, and wished to simplify and organise and dictate relationships between peoples and communities within the nation, in order to better control the nation for its own good; and therefore preferred a strong central government and top-down rule by civil servants and bureaucrats to the messy business of democracy, markets, and mutual aid; so the PNAC sees US power as overwhelmingly supreme between nation states, and prefers an international system based on the one-to-many relations of the USA with everybody else to the messy business of many-to-many relations of treaties and international law. From schear at attbi.com Mon Apr 14 18:25:22 2003 From: schear at attbi.com (Steve Schear) Date: Mon, 14 Apr 2003 18:25:22 -0700 Subject: The FBI Has Bugged Our Public Libraries In-Reply-To: <5.1.0.14.2.20021106212724.046b36d0@mail.attbi.com> References: <20021105163147.A30393@slack.lne.com> Message-ID: <5.1.0.14.2.20030414181814.04b8e7a0@mail.attbi.com> A brief follow-up to my 6 Nov 2002 posting. I just received a letter from the Alameda County Librarian stating that the library system "...has not been asked by the FBI to produce any records." Considering the ethnic make-up of the county (many middle eastern aliens) I find this a bit difficult to believe. Have any other list members contacted municipal libraries for such information? steve From measl at mfn.org Mon Apr 14 17:22:39 2003 From: measl at mfn.org (J.A. Terranson) Date: Mon, 14 Apr 2003 19:22:39 -0500 (CDT) Subject: Cisco Support for Lawful Intercept in IP Networks (fwd) Message-ID: ---------- Forwarded message ---------- Date: Mon, 14 Apr 2003 17:34:32 -0400 (EDT) From: Sean Donelan To: nanog at merit.edu Subject: Cisco Support for Lawful Intercept in IP Networks What are service providers doing concerning lawful intercept support in their networks? Fred Baker, et al published an internet draft this month (April 2003) containing a lawful intercept architecture. http://www.rfc-editor.org/internet-drafts/draft-baker-slem-architecture-00.txt Has anyone gotten a real set of requirements from the FBI for lawful intercept in IP Networks? Would Cisco's proposed architecture work, or just result in buying more cisco equipment? From shields at msrl.com Mon Apr 14 12:23:00 2003 From: shields at msrl.com (Michael Shields) Date: Mon, 14 Apr 2003 19:23:00 +0000 Subject: Single Point of Weakness is in the Works.Thank you Major Tom. In-Reply-To: <3E9A8FAA.A7815584@cdc.gov> ("Major Variola's message of "Mon, 14 Apr 2003 03:38:34 -0700") References: <3E9A8FAA.A7815584@cdc.gov> Message-ID: <87fzokdgtn.fsf@mulligatwani.msrl.com> In article <3E9A8FAA.A7815584 at cdc.gov>, "Major Variola (ret)" wrote: > Blinking yellow isn't in the official lexicon AFAIK. I don't know if they are standardized nationally or internationally. In some areas traffic signals change at night to blinking-red for the cross street and blinking-yellow for the main road; this is intended to be similar to a two-way stop. http://www.dmv.state.va.us/webdoc/citizen/drivers/vadm/vadm5p.asp -- Shields. From timcmay at got.net Mon Apr 14 19:43:36 2003 From: timcmay at got.net (Tim May) Date: Mon, 14 Apr 2003 19:43:36 -0700 Subject: The FBI Has Bugged Our Public Libraries In-Reply-To: <5.1.0.14.2.20030414181814.04b8e7a0@mail.attbi.com> Message-ID: <0E6A90DC-6EEC-11D7-B966-000A956B4C74@got.net> On Monday, April 14, 2003, at 06:25 PM, Steve Schear wrote: > A brief follow-up to my 6 Nov 2002 posting. I just received a letter > from the Alameda County Librarian stating that the library system > "...has not been asked by the FBI to produce any records." > Considering the ethnic make-up of the county (many middle eastern > aliens) I find this a bit difficult to believe. Have any other list > members contacted municipal libraries for such information? > > steve > Librarians who agree to narc out their patrons need to be "necklaced." (What the negroes in South Africa used to do to collaborators: a tire is placed over the shoulders of a collaborator. The tire is lit. It takes interesting minutes for the collaborator to scream his or her way into oblivion.) > Long Live Falun Gong! Death to the Chinese Communist Party! ****U R G E N T**** Crypto transmission failed...arms shipment to Shanghai delayed...will re-route through Hong Kong...nerve gas (VX) to follow soonest. Death to oppressors of Falun Gong! 2002FC 2bB,25B;bb bB+bbbB* B*b"bKN)C7B B1B1B.B1b!B:b b KbB?B1B1C&B)N)B4bCbObB.B,C7OB6B?B)bOB5N)bB?OK d8-e=d<e>e(g>e=i"ed8 f6g-f3h=.e f/e g>e=d::f d?!e% geee g+ e=d9 f,h ig8f gc...d; e$)e fe$)e8d;f;g;i=e(e d:,h/e>e d8-e=gi"e/>fe1h/ch?d9f/d8 d8*e%=f:d<f%fif1f3=f0d8;e8-e d;ge e?d;,o< h?+e.3e e93d?!d;0h?e (f/d8g' d;d;,ih&e(d8-e=f>e<gh! d8:c From mv at cdc.gov Mon Apr 14 21:39:30 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Mon, 14 Apr 2003 21:39:30 -0700 Subject: Notes on "Defending Against an Internet-based Attack on the Physical World" Message-ID: <3E9B8D02.B239614B@cdc.gov> http://www.avirubin.com/scripted.attacks.pdf is an interesting, clueful paper that suggests that by exploiting search engine APIs, one can find large numbers of dead-tree info request forms, parse them, and submit a victim's info such that said victim (or their deadtree post office) is overwhelmed with physical mail. Some small comments: 1. The "Turing Tests" (sec 5.3) which try to assure that a human is doing the submission have two weaknesses. First, visual tests (which OCR can't handle) discriminate against the visually impaired, FWIW. Second, OCR folks (and machine vision folks in general) are always trying, for their own purposes, to make OCR as capable as humans. The gaps, point-noise, odd fonts, and distractors in "catpcha.net" like tests are all surmountable challenges for machine vision. And once solved once, they are available for all, as Schneier once emphesized (the script kiddy / internet problem) 2. The deadtree postal system is tolerant (because of humans in the loop) of small misspellings and other errors. As a result, automated counter-systems (possibly including honeynets) which attempt to detect address flooding would have a harder time recognizing semantically but not literally identical addresses.. 3. The authors' claim that part of their motivation for publishing (after sitting on this exploit for a while) is the availability of search APIs (sec 2). Frankly I don't see how Google (or other) APIs gives an advantage over scripts which emulate browsers paging through searches, except perhaps being a bit more direct for programmers/scripters. Doing a bit more parsing of HTML search results eliminates the need for any special API -in fact, it may be more general, and we do favor nonproprietary open standards over someone's beta API. ... Additional case studies are needed, however, to determine which traits of chemical and biological terrorists might help identify them because charisma, paranoia, and grandiosity are alo found to varying degreees among, for example, leaders of political parties, large corporations, and academic depts. --John T Finn, _Science_ v 289 1 sept 2000 From jkane89 at softhome.net Mon Apr 14 19:45:13 2003 From: jkane89 at softhome.net (John Kane) Date: Mon, 14 Apr 2003 22:45:13 -0400 Subject: ecash signature scheme? Message-ID: recently asked on sci.crypt: > What kind of signature scheme is this? The RSA envelope is filled with > 00 || MD5-Hash(message) || 00 ... 00 > (padded on the right with 00s up to the RSA modulus length). David Wagner wrote: dw> I seem to remember that an early version of Digicash's dw> ecash protocol may have used this scheme Any recollection of whether this might be on the mark? http://groups.google.com/groups?selm=b7fkrv$ofg$1 at agate.berkeley.edu http://groups.google.com/groups?selm=5a9000c2.0304140745.55ea14e2 at posting.google.com -- John Kane Boston, MA (eastern US) IETF-OpenPGP working group --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Mon Apr 14 20:43:08 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Mon, 14 Apr 2003 23:43:08 -0400 Subject: ecash signature scheme? Message-ID: --- begin forwarded text From ngps at netmemetic.com Mon Apr 14 09:42:52 2003 From: ngps at netmemetic.com (Ng Pheng Siong) Date: Tue, 15 Apr 2003 00:42:52 +0800 Subject: Swiss ISPs Required to Log and Store Email for Six Months In-Reply-To: References: <5.1.1.6.2.20030408234906.02cc7f98@idiom.com> Message-ID: <20030414164252.GF786@vista.netmemetic.com> On Wed, Apr 09, 2003 at 06:41:16PM +0200, Thomas Shaddack wrote: > I am curious if this applies even on provately-operated servers; eg, if > you aren't cheap and instead of an account you buy a colocation server, > with your own mailserver, when the ISP provides only the connection > itself, without additional services. Transparent outgoing HTTP proxying has been deployed for years now. Not too difficult for the ISP to also "provide" transparent outgoing SMTP proxying. So, even with your own colo mail relay, you'd still want SMTP-over-SSL whenever possible, between your desktop(s) and your relay, and between your relay and elsewhere. -- Ng Pheng Siong http://firewall.rulemaker.net -+- Manage Your Firewall Rulebase Changes http://www.post1.com/home/ngps -+- Open Source Python Crypto & SSL --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com From sunder at sunder.net Tue Apr 15 05:55:44 2003 From: sunder at sunder.net (Sunder) Date: Tue, 15 Apr 2003 08:55:44 -0400 (edt) Subject: date formats (was Re: Single Point of Weakness is in the Works.Thank you Major Tom.) In-Reply-To: <3E9A8FAA.A7815584@cdc.gov> Message-ID: Guys, let's please change the subject from now on when we are no longer talking about the original issues. One marketing vp at an old little hole in the wall company used to date things the european way on purpose, so as to look more sophisticated or some nonsense. Funny how that didn't save the company when the bubble burst. I've always preferred YYYY.MM.DD, this way you can sort things very easily. If you write the names of the months, it doesn't translate well to other languages, though it may be similar, *AND* more importantly from a geek perspective, if you do a sort, April shows as the 1st month of the year, before January - not good. If you do the reverse DD.MM.YYYY you can't sort it either since the 1st day of every month shows up 1st. Dumb. Friendly to non-geeks, but dumb. The worst annoyance I've seen is using Unix time as a timestamp on log dates. It's the most unreadable of all formats. Sorts nicely though, but what a bitch to read. (Unix time being the number of seconds in decimal since 1/1/1970.) ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ On Mon, 14 Apr 2003, Major Variola (ret) wrote: > At 11:15 PM 4/13/03 +0200, Thomas Shaddack wrote: > >> Strike. Learn to use STANDARD TIME FORMATS, you pathetic ex-con > >> sellout journalist. DD/MM/YYYY is an antiquated european format. > > > >...and MM/DD/YYYY is an antiquitated American format. > > Indeed. And ambiguous. I always write out the month, which > confuses americans, and telling them that its ambiguous otherwise > just confuses them more :-) I have settled for "I used to work > with Europeans". From steve at tightrope.demon.co.uk Tue Apr 15 01:14:10 2003 From: steve at tightrope.demon.co.uk (Steve Mynott) Date: Tue, 15 Apr 2003 09:14:10 +0100 Subject: Can you spell default? Roman walls have ears.. In-Reply-To: <20030413152624.GT14414@jal.clueinc.net> References: <3E98E438.6CF45BC7@cdc.gov> <20030413152624.GT14414@jal.clueinc.net> Message-ID: <3E9BBF52.7050103@tightrope.demon.co.uk> Jamie Lawrence wrote: > The difference between a US billion and a UK billion is best understood > as an ad view generator for the slashdot crowd. There is no difference. A UK billion is now the same as US billion and the older use is obsolete. -- Steve From mv at cdc.gov Tue Apr 15 10:12:44 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Tue, 15 Apr 2003 10:12:44 -0700 Subject: DMCA Crypto Software Message-ID: <3E9C3D8C.5010803@cdc.gov> At 06:56 PM 4/15/03 +0200, Thomas Shaddack wrote: >> John Markoff reports today on Paul Kocher/Cryptography Research's >> proposed software protection of DMCA content: >> http://cryptome.org/dmca-kiss.htm > >The embedding of watermarks will make computer intrusions a very >attractive way to "steal" content, which then can be widely distributed >without too high chance of repercussions for the distributor, as the >original owner will take the heat. Victimization, anyone? There's that, and the watermark removal you mentioned, (see Felton et al.) but why bother? Someone from someplace not under the grip of the DMCA regime will buy the marked file, and not care about its propogation. If incoming media files are blocked by a national firewall (no first amendment for imports.. customs can seize your porn when you re-enter the US) well, crypto just laughs at this. From frantz at pwpconsult.com Tue Apr 15 10:15:24 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Tue, 15 Apr 2003 10:15:24 -0700 Subject: Can you spell default? Roman walls have ears.. In-Reply-To: <3E9BBF52.7050103@tightrope.demon.co.uk> References: <20030413152624.GT14414@jal.clueinc.net> <3E98E438.6CF45BC7@cdc.gov> <20030413152624.GT14414@jal.clueinc.net> Message-ID: At 1:14 AM -0700 4/15/03, Steve Mynott wrote: >Jamie Lawrence wrote: > >> The difference between a US billion and a UK billion is best understood >> as an ad view generator for the slashdot crowd. > >There is no difference. > >A UK billion is now the same as US billion and the older use is obsolete. Ah, one less example of, "Two countries divided by a common language." Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From jya at pipeline.com Tue Apr 15 12:02:18 2003 From: jya at pipeline.com (John Young) Date: Tue, 15 Apr 2003 12:02:18 -0700 Subject: DMCA Crypto Software Message-ID: John Markoff reports today on Paul Kocher/Cryptography Research's proposed software protection of DMCA content: http://cryptome.org/dmca-kiss.htm There's an October 2002 patent application for a similar invention by Paul Kocher, et al: http://cryptome.org/kocher-etal.htm From rah at shipwright.com Tue Apr 15 09:09:56 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 15 Apr 2003 12:09:56 -0400 Subject: Plan Would Use Software, Not Devices, to Fight Piracy Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Wherein Paul Kocher proves, once again, that secure messages on insecure public networks will always beat insecure messages on "secure" private networks. So much for book-entry to the screen buffer. Take *that* WAVE-oids. :-) Of course, the old crypto saw still prevails: The only thing DRM gets you is who the copy was stolen *from*, not who stole it. So, I still predict an eventual convergence to a cash-settled auction market for authenticated copies of any digital work, and, of course, I think Paul's work is a great step in this direction. Financial cryptography is the only cryptography that matters. Cheers, RAH - ------- The New York Times April 15, 2003 Plan Would Use Software, Not Devices, to Fight Piracy By JOHN MARKOFF A prominent computer security researcher has proposed a technical solution aimed at forging a middle ground in the increasingly bitter battle by Hollywood and Silicon Valley over the best way to protect digital content from consumer piracy. Cryptography Research has begun circulating its proposal, which it calls Self-Protecting Digital Content, among entertainment companies. It plans to make it available publicly this week, in an effort to break the impasse over the Digital Millennium Copyright Act, which Congress passed in 1998 with strong lobbying support from Hollywood and other creators of intellectual property. Cryptography Research's proposal would shift the location of copy-protection code from the consumer products that play music and movies and run software to the content files produced by entertainment companies and software developers. The plan aims to help avoid the immense costs of building piracy protection into personal computers, video game players, satellite receivers and other devices produced by technology manufacturers. While it would not eliminate the possibility of digital theft, its advocates said it would drastically curb piracy while easing the burden on the technology industry. They say the plan would also avoid invading the privacy of consumers who do not engage in piracy and make it easier and less costly for content owners to recover if a copy-protection system is broken. The authors of the report include Paul Kocher, a leading American cryptographer, who was involved in the development of an important Web standard for protecting the security of commercial transactions. Consumer electronics makers create coding to wrap what they hope will be unbreakable shells of software around digital content on CD's, DVD's and the like. Once the copy protection systems are undermined, however, it is simple for pirates to make unlimited copies of the music, video or software. Under pressure from Hollywood and the recording industry, the personal computing industry has now embarked on an ambitious project to build copy protection hardware into the circuitry of all PC's. The efforts, including the PC hardware industry's Trusted Computing Platform Alliance and Microsoft's Palladium system are being sold to users on the grounds that they will protect information privacy and computer security. But if the hard-wired approach proves to be fallible, allowing a determined enemy to bypass this digital Maginot line, the standards efforts could turn into a financial disaster for the computer industry and harm Hollywood as well. "We use the term brittle," said Mr. Kocher, who consults widely in the consumer electronics industry on cryptography issues. "You have a strong external shell, but the inside is software and completely vulnerable." Under the proposal from Cryptography Research, based in San Francisco, the hardware would be radically simplified and the complexity of protecting the information would be embedded within the music, video or software file itself. As part of the approach, each file would embed a digital mark, making it possible for a stolen copy to be traced. The advantage of the system is that the tracing technology would only come into play if a file is widely copied. "It's a clever idea," said Bruce Schneier, founder and chief technical officer of Counterpane Internet Security, a computer security company. "This makes the job of the attacker more annoying. Paul is approaching the problem more sensibly than others." Most security experts now believe that there will never be a perfect solution to digital piracy. But most earlier proposals would involve such extensive invasions of privacy that many experts worry that they could end up producing a consumer backlash against the entertainment and technology industries. Mr. Kocher said he decided to explore a new approach after years of watching the mounting tension among Hollywood, electronics manufacturers and consumer advocacy groups. "I find the problem of piracy absolutely fascinating," he said. "Most people view this as a war between Hollywood and technology companies. But I view it as the security industry has done a terrible job of attempting to solve Hollywood's piracy problem." -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPpwuzsPxH8jf3ohaEQIlqwCglu3m7jIz/PH8EaZ8UndYUx0+QEoAoPyn gxCurY25EdNuI36vZRmvkZYz =DdZh -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Tue Apr 15 12:25:54 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 15 Apr 2003 15:25:54 -0400 Subject: Economic Secession Won't Succeed Message-ID: --- begin forwarded text List-Subscribe: From: "Mises Daily Article"
To: "Mises Daily Article"
Subject: Economic Secession Won't Succeed Date: Tue, 15 Apr 2003 08:14:49 -0500 Importance: Normal http://www.mises.org/fullstory.asp?control=1204 Economic Secession Won't Succeed By Paul Birch and Gene Callahan [Posted April 15, 2003] Some freedom-minded people pin their hope for liberty on withdrawing from an unfree world. In times of crisis, such as wars and recessions, this idea gains popularity. We might refer to this notion as "economic secession," borrowing the name from John Kennedy's article of the same title." Despairing of advancing the cause of liberty in society at large, they hope to be able to secure their own liberty anyway. They may put their trust in new computer technologies, which they believe will let them hide money and economic transactions from the taxman. They may hope to withdraw into some remote location and "unplug from the grid." You can find ideas falling broadly under the umbrella of economic secession at Backwoods Home Magazine, in the writings of Claire Wolfe, in the many books on financial privacy, encryption, becoming invisible, and so on. We don't mean to disparage someone who wants to move to the remote countryside, encrypt his email, or set up a numbered bank account in Bermuda. Such activities are not, in themselves, objectionable, and they may be a good choice for some people. But we do wish to point out that they do not solve the problem of the gradual erosion of liberty in our world. We will not discuss the issue of whether it would be morally sound to abandon our fellows and withdraw from the effort to improve human life in society. We don't need to do so, because the attempt fails on its own terms, for several reasons. First of all, "economic secessionists" often seem to confuse money with wealth. If they can hide their cash, they think, they can avoid taxes. But money is only useful in so far as you can exchange it for the economic goods and services you want to enjoy. In the long run you have to keep your real wealth where you live, or transfer it there. Otherwise it's worthless. Most real wealth is highly visible. The government of the place where you live or spend your time will be able to see this wealth and gain access to it; and thus can readily tax and regulate it. There is no sense in imagining that hiding your cash will get you off the hook; the government will simply seize your real assets for failure to pay taxes on them, as they already do today. In many countries, governments have in recent years found it convenient for political purposes to shift the burden of taxation away from income taxes, towards sales and property taxes; and this at a time of rising taxes overall. For example, in the past two decades, income tax rates in the U.K. have fallen by about 30%, but local property taxes (rates and council tax) have increased three or four fold. Thus we should not expect the taxation of real wealth to prove problematic, even in those unlikely scenarios in which it is supposed that the bulk of ordinary people's incomes could be successfully concealed. We would also point out that governments are increasingly forming tax collection cartels; there are no longer any real tax havens that the U.S. and other high-tax countries are not now bullying into submission. Ireland has come under pressure from other E.U. states for having "too low" a corporate tax rate. The U.S. is pushing the I.M.F. and World Bank to crackdown on "money laundering." The O.E.C.D. has been addressing the "problem" of countries that engage in "harmful tax competition." Even Switzerland, with its traditional and much-vaunted banking privacy, has caved in. Economic secessionists may think that making it more expensive for the government to collect taxes will reduce its incentive to do so. But taxation is not, for the most part, about the government "making money," because modern governments actually consume only a tiny fraction of the total tax revenue; rather it is about redirecting the spending of individuals, and thus the collective spending of the economy, in ways predicated upon the political goals of the regime. Typically, the cost of collecting a tax amounts to no more than a few percent of the revenue obtained; so the ability of governments to tax would not seriously be impeded until tax collection became at least fifty times more expensive (something the ready accessibility of real wealth makes most improbable). Note, by the way, that in order to promote their political aims governments may continue to collect particular taxes even when the monetary cost exceeds the monetary revenue. The marginal cost of collection, in cash terms, doesn't worry them. People rarely go into politics or public administration in order to make money. Many of them could become considerably wealthier in the private sector (in purely pecuniary terms, though not in terms of what they actually want). What they want is mostly influencewfor a wide variety of motives, both selfish and altruistic. They want to be (and in fact are) importantweven if that importance is often only that of being an important pain in the neck. That is why it is a mistake to think of government as primarily concerned with collecting as much tax revenue as possible, practicable, or profitable. That may be what bandits would dowbut to governments taxation is merely one of the tools with which society as a whole is constrained and governed. Even the fact that government actions can prompt us to seek tax shelters confirms their influence! Not only are we unable effectively to escape having the government tax us directly, we are also unable to escape the effect upon us of government taxes on others. Introductory economics classes teach that although the government may specify the legal incidence of a tax, its economic incidence is subsequently determined through the market. As Mises says: "It is the market, and not the revenue department, which decides upon whom the burden of the tax falls and how it affects production and consumption. The market and its inescapable law are supreme." Even if an individual citizen succeeds in concealing all of his wealth and income from the tax collector, there will be others who cannot or will not do so. Someone who is inclined to say, "Well, that's their problem," does not realize that he is paying those taxes as well. If the butcher is taxed, he pays more for meat. If the airlines are taxed, he pays more to fly. If capital gains are taxed in some countries, that will lower the returns on capital in "tax havens," just as taxing corporate bonds lowers the return on tax-free municipals. Furthermore, rearranging one's affairs to avoid or evade taxes (the former is legal, the latter illegal) carries its own burdens, whether in terms of actual costs, lower returns to capital, or foregone opportunities. The costs of tax avoidance and tax evasion are also taxes. What would happen if the man in the street were able to hide a larger fraction of his personal wealth or income? Would the government shrug its collective shoulders and reduce its spending? Hardly. It would merely assume that each taxpayer is hiding a similar fraction of his income and increase all tax assessments accordingly. This would penalize honesty, and in fostering anger against the tax evaders would in all likelihood encourage the introduction of ever more draconian and authoritarian laws. And the tax revenues would keep flowing just the same. Many secessionist apologists are misled by the existence of a small minority of people who operate on the black market or are otherwise able to shield much of their wealth from direct taxation; or by the fact that most people occasionally massage their tax returns a bit or pay tradesmen in cash for a small consideration. However, these transactions relate to only a small fraction of the national product. The tax revenues "lost" are not large; indeed, the argument above implies that there is no overall loss of revenue. Governments know all about itwand don't care. It doesn't threaten them. Indeed, the existence of black marketeers, tax shelters and tax evasion provides them with handy scapegoats whenever they needwor desirewto increase taxes or impose tougher regulations. All in all, to make economic secession work we should have to withdraw into autarky, foregoing the benefits of the division of labor. It is doubtful whether Thoreauesque self-sufficiency is any longer practicable in developed countries, for all but a minuscule fraction of the population. Conceivably one could still flee to Siberia or the jungles of New Guinea; and there live free from any burden of tax, other than the burden of grinding poverty and social isolation from one's self-imposed exile. We will not take exception to those who make such a choice. As Aristotle notes: "He who would live without the polis must be either a beast or a god." In either case, criticism would be pointless. If we are unprepared to take so drastic a step, we would do well to heed Mises's words, which echo John Donne's famous epigram that "No man is an island": "Society lives and acts only in individuals; it is nothing more than a certain attitude on their part. Everyone carries a part of society on his shoulders; no one is relieved of his share of responsibility by others. And no one can find a safe way out for himself if society is sweeping towards destruction. Therefore everyone, in his own interests, must thrust himself vigorously into the intellectual battle. None can stand aside with unconcern; the interests of everyone hang on the result. Whether he chooses or not, every man is drawn into the great historical struggle, the decisive battle into which our epoch has plunged us." Paul Birch lives in Cowes on the Isle of Wight, England. He is a freelance scientist and writer who has published many papers on space colonisation. He is also interested in political philosophy and maintains a website of his writings. Gene Callahan is author of Economics for Real People. Send him MAIL, and see his Mises.org Daily Articles Archive. He delivered the Henry Hazlitt Memorial Lecture at the Austrian Scholars Conference 9, March 13, 2003. Click HERE to view the online video version of his lecture. [Print Friendly Page] Mises Email List Services Join the Mises Institute Mises.org Store Home | About | Email List | Search | Contact Us | Periodicals | Articles | Games & Fun News | Resources | Catalog | Contributions | Freedom Calendar You are subscribed as: rahettinga at earthlink.net To unsubscribe, click here: http://mises.biglist.com/unsub.php/article/rahettinga at earthlink.net or e-mail: article-unsubscribe-rahettinga=earthlink.net at mises.biglist.com --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Tue Apr 15 15:08:43 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 15 Apr 2003 18:08:43 -0400 Subject: Baghdad looters returning swag Message-ID: San Jose Mercury News Posted on Tue, Apr. 15, 2003 Baghdad looters returning swag Widespread rumor says cleric forbade wives from allowing their thieving husbands to touch them By Carol Rosenberg KNIGHT RIDDER NEWSPAPERS BAGHDAD, Iraq -Some people are surrendering the booty they took in the Dura district of Baghdad, perhaps in response to a rumored edict by a Muslim cleric forbidding Iraqi wives from having sex with looter husbands. Muslim clerics have been demanding that ill-gotten goods be surrendered, though none here could confirm the sex-ban order, said to have been issued in Najaf. One cleric said the rumor of the edict was widespread and that it would be consistent with Islamic teaching. "A good Muslim woman would not let this man touch her, as a signal to everybody that this is not a way to behave," said Sheik Ali Jabouri, who also preached Monday morning that people must give up their loot. "The people were destroying their civilization, their heritage; they were destroying their good Iraqi Muslim character," Jabouri said. "I think these waves of bad people, the enemies of peace, will stop. You will soon see how good the people are, how willing they are to apply the good Islam." Whatever the reason, workers from the huge Dura power plant weaved through the district Monday, recovering looted items from their neighbors. "They started to put it outside their houses, so we go around and collect it. It is my country and I am happy to serve it," said Nasser Ghali, 43, easing a truck crammed with office equipment past two U.S. tanks to Dura's huge power plant compound in southern Baghdad. His fourth shipment of the morning, it contained chairs, desks and bookcases that had been stripped from the plant in the havoc of looting that followed Saddam Hussein's fall last week. Staff Sgt. Adam Jablonowski, who grew up near Miami, supervised gate security and said stolen equipment had been "coming in all day," including vehicles and other supplies. No doubt part of the inspiration for turning over looted goods was the hope that Iraqi engineers guarded by U.S. forces could restart the huge plant, which maintenance engineer Tony Mateus said stopped serving some 3 million customers amid U.S. air strikes about 10 days ago. Mateus said about half the usual 500-member work force turned up at the gates of the plant Monday, eager to figure out how to fix the problem. Engineers concluded that a natural gas line was cut north of the city, and that fuel was needed to fire up the plant. Now, Mateus said, Iraqi civilians and U.S. forces were trying to figure out how to restart it without natural gas. The plant was damaged, he said, first by U.S. airstrikes and then by Iraqi looters, but not beyond repair. Mateus, a Christian Iraqi, said he and 10 other men from Dura barricaded themselves inside throughout the war, armed, to ward off widespread thievery, and were more or less successful. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From shaddack at ns.arachne.cz Tue Apr 15 09:46:57 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Tue, 15 Apr 2003 18:46:57 +0200 (CEST) Subject: date formats (was Re: Single Point of Weakness is in the Works.Thank you Major Tom.) In-Reply-To: Message-ID: > I've always preferred YYYY.MM.DD, this way you can sort things very > easily. If you write the names of the months, it doesn't translate well > to other languages, though it may be similar, *AND* more importantly from > a geek perspective, if you do a sort, April shows as the 1st month of the > year, before January - not good. All depends on what you want. YYYY-MM-DD (or variations, including YYMMDD) are good when there is a chance it could be needed to be sorted. > If you do the reverse DD.MM.YYYY you can't sort it either since the 1st > day of every month shows up 1st. Dumb. Friendly to non-geeks, but dumb. However, not all data are to be sorted. There are some applications where friendliness to non-geeks is more important than sortability (eg, when showing only one value anyway). Sometimes we have to sacrifice something to the users to get them out of our hair. > The worst annoyance I've seen is using Unix time as a timestamp on log > dates. It's the most unreadable of all formats. Sorts nicely though, but > what a bitch to read. (Unix time being the number of seconds in decimal > since 1/1/1970.) The logs are usually intended to be human-readable. However, as long as it is reasonably trivial to write a program to process the timestamps, it's merely annoying. From shaddack at ns.arachne.cz Tue Apr 15 09:56:23 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Tue, 15 Apr 2003 18:56:23 +0200 (CEST) Subject: DMCA Crypto Software In-Reply-To: Message-ID: > John Markoff reports today on Paul Kocher/Cryptography Research's > proposed software protection of DMCA content: > http://cryptome.org/dmca-kiss.htm Oh great. More complexity, more points of vulnerability. We already have cellphones that can be DoS-ed with a SMS message. The embedding of watermarks will make computer intrusions a very attractive way to "steal" content, which then can be widely distributed without too high chance of repercussions for the distributor, as the original owner will take the heat. Victimization, anyone? Besides, if the data are digital and personalized, the system will be vulnerable to algorithm disclosure (or at least watermark removal) by comparing several differently personalized but otherwise identical files. I believe I seen a couple proposed watermark attacks some time earlier. Matter of time until it will become a standard plug-in to P2P software. Another doomed attempt to keep the dying business model. From shaddack at ns.arachne.cz Tue Apr 15 12:49:12 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Tue, 15 Apr 2003 21:49:12 +0200 (CEST) Subject: DMCA Crypto Software In-Reply-To: <3E9C3D8C.5010803@cdc.gov> Message-ID: On Tue, 15 Apr 2003, Major Variola (ret) wrote: > At 06:56 PM 4/15/03 +0200, Thomas Shaddack wrote: > There's that, and the watermark removal you mentioned, > (see Felton et al.) but why bother? Someone from someplace > not under the grip of the DMCA regime will buy the marked file, > and not care about its propogation. There will be no such place. The mighty wrath of WTO and WIPO will descend upon the countries who would dare to not enforce the interests of The Wealthy, followed by import duties, locking the "infringers" out of the "free" market. > If incoming media files are blocked by a national firewall (no first > amendment for imports.. customs can seize your porn when you re-enter > the US) well, crypto just laughs at this. They can??!? Blessed be encrypted digital media! (Another reason to hope for the world of software-defined generic devices - no customs would have a reason to seize an empty generic core, even if one of its functions could be "illegal", if flashed with the right firmware. I should sacrifice the necessary time and buy a handful of Xilinx FPGAs and learn how to play with them...) From shaddack at ns.arachne.cz Tue Apr 15 14:30:57 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Tue, 15 Apr 2003 23:30:57 +0200 (CEST) Subject: Kill MS, again, but sideways In-Reply-To: Message-ID: On 14 Apr 2003, Tom Veil wrote: > If I want to keep secret the details of something I make, it is my right > to do so. Then I have the right to appropriately dislike you, and to reverse-engineer the "product", which is so shoddy that you are ashamed of documenting its internals, and to publish it. I am currently HEAVILY pissed, as we built our servers on ASUS motherboards (otherwise pretty good) with AS99127F chips for health monitoring. We run Linux on them. When I load the appropriate drivers to activate the onboard sensor chip, the speaker starts beeping an alarm and won't stop until hardware reset. So I either have to sacrifice the sensors (which can be potentially fatal, one of my servers had problems (weird crashes) because of cooling fan, and because of no sensors support (old board) it took me several crashes to identify the pattern (it was a remote, unattended machine)), or I have to unplug the internal squeaker, which makes it difficult to assess boot-time problems. I met MANY other problems of this kind. > Don't like it? Don't fucking buy it. THERE IS NO CHOICE! Couple months ago we were shopping for a PABX. The only possibilities available were Siemens, Nortel, and Bosch. No one of them supplied any service-level documentation, all three wanted to lock us into an expensive service contract. We have to wait for hours in case of every little hiccup, instead of me taking a look at the box and giving it the right commands, because I DON'T KNOW THE FUCKING COMMANDS AND NOBODY TELLS ME WHAT THEY ARE!!! There is of course the choice of doing without the phones, but you can't run a bigger office without telephones. And the open-source PABX constructions that are out there aren't mature enough for practical use yet :((( And if there is a choice, tell me what brand of a cellphone comes with full docs, what TV comes with full docs (see lower), what hard drive comes with full docs (which is especially painful as it makes problems with secure data overwriting). > Any communist maggots that murder, or attempt to murder people for merely > keeping secret the details of the stuff they make and sell should be bound, > gagged, tortured, then taken out back to have their skulls crushed with a > sledgehammer until their brains start oozing out their ears. ...and after you kill off all the technicians with a peeve against the money-hungry corporations (read: everyone who ever tried to do some real work on a budget), you will pay through your nose for every hiccup, and not only in money, but also in time loss and in being whined at for not being able to do something immediately. I could talk for long about "intellectual property", my pet peeve, but one paragraph will do. There was no such concept for millenia. Imagine how it could slow down the progress if eg. alphabet or calculus would be someone's "property", and the someone would then aggressively enforce the royalties or "licence conditions". How many people would think reading is worth of the added expenses? (...and how many would just "steal" the knowledge without paying? Or maybe decide to "opt out" - the literacy results of American students are going down... not even talking about calculating with just a pencil and paper. *sigh*) Besides, the proceedings rarely go to the inventors themselves - or did you expect that the inventor of eg. LED got rich? In way too many cases the "intellectual property" is a yoke to keep the market share, to deny others the access there, to slow down the others when the "owner" can't cope by fair play. Sorry, this isn't the kind of game I want to play. Not by these rules. I don't even talk about the insecurity factor for the public infrastructure. The documentation will leak sooner or later, or the crucial parts will be acquired and reverse-engineered, and someone who will want to cause damage will get ahold of the information. A determined attacker has a choice where he wants to invest the effort, but a determined defender has no other choice than to be intimately familiar with ALL parts of their infrastructure - and you can't sanely expect to be able to reverse-engineer every byte of every firmware of every your critical device, nor can you expect the vendors to plug all the holes, especially in older devices. (Especially not in the pace the devices get obsolete, the artificially fueled march towards unreliability, towards the promises of better results in next version. After all, what's better force to upgrade than a bug in your old device, which you can't repair because of no docs, and which the vendor won't repair because their interest is to make you buy something new? With the only thing you can be confident about being the increasing shoddiness of new electronics, as the time-to-market takes precedence over testing and debugging! *spit* Phooey! And then you come and have the balls to defend the "right" of the vendors to not reveal how crappy and unfinished is what they dare to call a "product".) Back during the Communism there was a small shop here, where it was possible to buy schematics and docs for all the consumer devices manufactured by Tesla, local manufacturer. Their quality was widely underestimated (or, more accurately, the quality of the Western crap was overestimated, as not enough people opened the imported equipment to make the public aware about the cheap material of the circuitboards, usage of plastic levers and gearwheels where metal would be more suitable, and mistaking design for quality). With available documentation the followup came, with hobbyists devising add-ons, repairs, and tweaks, and publishing them in a widely read magazine. (If Tesla would follow and incorporate the tweaks into newer submodels, then they could get much better quality. But, as Communist way of leading the factories was more about careerism and politics than about technology, it didn't happen. On the other hand, capitalism is more about money than about technology, so no big difference either. *sigh*) Now, the users are actively discouraged from understanding the internals of their appliances, maybe in order to keep the advertising effective in peddling trivial add-ons (eg, home networking) as groundbreaking features. There is an expression to characterize the techno-economical system we're heading into: CRAPITALISM! The case of Blackboard security, which recently flashed through Politech (thanks, Declan!), nicely illustrates the situation - technical shortcomings addressed by lawyers. Vendors, who keep crucial informations away from the customers, should be shot. The ones, who try to sue the reverse engineers, should be boiled in oil before being shot. From eresrch at eskimo.com Wed Apr 16 06:24:34 2003 From: eresrch at eskimo.com (Mike Rosing) Date: Wed, 16 Apr 2003 06:24:34 -0700 (PDT) Subject: Kill MS, again, but sideways In-Reply-To: Message-ID: On Tue, 15 Apr 2003, Thomas Shaddack wrote: > Then I have the right to appropriately dislike you, and to > reverse-engineer the "product", which is so shoddy that you are ashamed of > documenting its internals, and to publish it. > > I am currently HEAVILY pissed, as we built our servers on ASUS [rant snipped] > Vendors, who keep crucial informations away from the customers, should be > shot. The ones, who try to sue the reverse engineers, should be boiled in > oil before being shot. I guess I have to agree :-) Back in the early '80's I reverse engineered a Harris PBX. Replacing its 8080 microprocessor with a 68020 allowed me to take over total control of the switch and make the long distance company I worked in far more competitive. It took a lot of effort and equipment, and Harris Corp. never even believed we did it. Good thing, or they would have probably sued us! Reverse engineering in that case makes 1 company far more competitive. But in most cases simply understanding the principles is all you need to build a better product. The problem is then manufacturing, marketing and selling the better product. Most people are lazy, they just steal the idea and duplicate the principles, maybe with cheaper parts. That's where I think the lawyers have a good job. But if someone can figure out a better way to do things, then the person who hired the lawyers to harrass them needs to be boiled in oil. Anything that slows the advance of technology is a bad thing, and there's too many laws now aimed at exactly that. Patience, persistence, truth, Dr. mike From mv at cdc.gov Wed Apr 16 08:35:17 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 16 Apr 2003 08:35:17 -0700 Subject: Kill MS, again, but sideways Message-ID: <3E9D7835.AD28533D@cdc.gov> At 11:30 PM 4/15/03 +0200, Thomas Shaddack wrote: > >The case of Blackboard security, which recently flashed through Politech >(thanks, Declan!), nicely illustrates the situation - technical >shortcomings addressed by lawyers. Lawyers are merely implementing what the *legislators* let them. The legislators are the ones deserving of the jumpercables on the genitals, though perhaps though the lawyers could be required to do the honors. Since lawyers decay into legislators, this would have beneficial prophylactic educational effects. >Vendors, who keep crucial informations away from the customers, should be >shot. No Thomas, a market will find better uses for them if your arguments have merit. (Which they do, but it takes time.) It is, after all, the right of any individual (or group thereof) to keep secrets. (And Thomas, I wouldn't argue against that *here* :-) Or bind others with consensual contracts like NDAs. Much as it is the right of anyone to diddle with anything they own, and talk about it freely. >The ones, who try to sue the reverse engineers, should be boiled in oil before being shot. The nice thing about jumpercables is the longer you use them, the lesser the ohmic resistance of the legislator, until you get charring, at which point you can move on to the next deserving most honorable sir. ... PS: TS you might at this point enjoy _A Xenix Chainsaw Massacre_ From mv at cdc.gov Wed Apr 16 09:08:08 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 16 Apr 2003 09:08:08 -0700 Subject: All Your Bases Are Belong To Us [GATTACA] Message-ID: <3E9D7FE8.48E8B243@cdc.gov> White House seeks to expand DNA database WASHINGTON  DNA profiles from juvenile offenders and from adults who have been arrested but not convicted would be added to the FBI's national DNA database under a Bush administration proposal. Under current law, only DNA from adults convicted of crimes can be placed in the national database, which is used to compare those samples with biological evidence from the scenes of unsolved crimes. As of January, there were about 1.3 million DNA samples in the database, U.S. officials say. http://www.usatoday.com/news/washington/2003-04-15-dna-usat_x.htm From schear at attbi.com Wed Apr 16 11:27:28 2003 From: schear at attbi.com (Steve Schear) Date: Wed, 16 Apr 2003 11:27:28 -0700 Subject: RSA Show impressions Message-ID: <5.1.0.14.2.20030416102239.0445aad0@mail.attbi.com> This year's RSA show was, like it predecessors, mostly a schmooze event. Shrunk at least 1/3 in floor space from the 2001/2 events, it certainly reflected the changes in this industry. I was surprised and a bit dismayed that I saw few familiar faces. A brief talk with Stacy Cannan, of L.J. Kushner, the leading security industry recruiter, confirmed my suspicions that many senior level people had left the industry in the past two years. The booths were mostly manned with the latest generation of newly graduated fodder. There didn't seem to be much activity (or smiles for that matter) in most booths. This is probably reflecting the exit/acquisition of some early players, decreased level of IT spending, and the increasing impact of open source security solutions. About the most amusing thing was receiving a "Regime change begins at home" button from one of the executives. steve From camera_lumina at hotmail.com Wed Apr 16 10:51:32 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 16 Apr 2003 13:51:32 -0400 Subject: All Your Bases Are Belong To Us [GATTACA] Message-ID: Variola wrote... >From: "Major Variola (ret)" >To: "cypherpunks at lne.com" >Subject: All Your Bases Are Belong To Us [GATTACA] >Date: Wed, 16 Apr 2003 09:08:08 -0700 > >White House seeks to expand DNA database > >WASHINGTON  DNA profiles from juvenile offenders and from adults >who have been arrested but not convicted would be added to the FBI's >national >DNA database under a Bush administration proposal. And apparently mainland Chinese research has shown that the most appropriate DNA in such cases comes from the eyeballs, kidneys, or liver. -TD _________________________________________________________________ The new MSN 8: smart spam protection and 2 months FREE* http://join.msn.com/?page=features/junkmail From rah at shipwright.com Wed Apr 16 10:53:25 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Wed, 16 Apr 2003 13:53:25 -0400 Subject: Plan Would Use Software, Not Devices, to Fight Piracy In-Reply-To: <3E9CF527.7080700@thing.dyndns.org> References: <3E9CF527.7080700@thing.dyndns.org> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 6:16 PM +1200 4/16/03, thing wrote: >All that will happen is >people will be forced into one camp or another, and Im willing to >bet once ppl move into the pirated camp they wont be able to get >back, and wont want too. More to the point, "piracy", meaning the auctioning of *any* copy, for bearer form internet cash using protocols everyone on these lists know by heart, is *desirable*, and, I would claim, inevitable. Inevitable because it's cheaper, it already is, :-), but I mean risk-adjusted transaction cost compared to book-entry DRM markets, and, in addition, will put more revenue in the pockets of actual innovators of new content. Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPp2YisPxH8jf3ohaEQL8oQCeOYrp2aMX4G9Zg6hlt+xiEz/D23sAoKga nnmcEWKBdsw0alwGy5oKgXaB =QgJH -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Wed Apr 16 12:28:45 2003 From: eugen at leitl.org (eugen) Date: Wed, 16 Apr 2003 14:28:45 -0500 Subject: This document saved from http Message-ID: <20030416192835.VNRS6289.out008.verizon.net@Wub> From mv at cdc.gov Wed Apr 16 15:48:22 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 16 Apr 2003 15:48:22 -0700 Subject: Crypto cartoon Message-ID: <3E9DDDB6.F87B41E0@cdc.gov> from the cryptography mailing list: Today's (April 16ths) "Foxtrot" will amuse readers of this list. http://www.ucomics.com/foxtrot/ From jei at cc.hut.fi Wed Apr 16 06:40:42 2003 From: jei at cc.hut.fi (Jei) Date: Wed, 16 Apr 2003 16:40:42 +0300 (EET DST) Subject: No Freedom to Speak - Court blocks security conference talk Message-ID: http://news.com.com/2100-1028-996836.html By John Borland Staff Writer, CNET News.com April 14, 2003 A pair of students were blocked by a federal court from presenting information at a Georgia security and hackers' conference on how to break into and modify a university electronic transactions system. Washington D.C.-based education software company Blackboard successfully convinced a Georgia state court to block the students' presentation, which was scheduled to be given at the Interz0ne conference in Atlanta last weekend. Blackboard argues that the restraining order blocked the publication of information gained illegally, which would have harmed the company's commercial interests and those of its clients. But conference organizers contend that the students' free speech rights were abridged. "The temporary restraining order pointed out that the irreparable injury to Blackboard, our intellectual property rights and clients far outweighed the commercial speech rights of the individuals in question," said Michael Stanton, a Blackboard spokesman. The company claims that the speech being blocked is commercial speech because the students were a "small competitor" to Blackboard. One of the students, Georgia Institute of Technology's Billy Hoffman, had threatened to give away code allowing any computer to emulate Blackboard's technology, the company claims. Programmers' rights to publish or present information that would help break security technology has been an increasingly controversial issue over the past few years. Much of the controversy has focused on the Digital Millennium Copyright Act, which contains a provision making it illegal to break technological security measures protecting copyrighted works, or even to publish information explaining how to do so. The best-known case in this area had to do with Princeton University professor Edward Felton's attempts to present information on how to break protections created by the now-defunct Secure Digital Music Initiative. Felton said that SDMI attorneys told him he would be violating copyright law if he presented his work. The Recording Industry Association of America (RIAA), a key part of the SDMI effort, denied making legal threats. Although an initial cease and desist letter sent to the Interz0ne conference organizers hinted that the students may have violated the DMCA, the complaint that resulted in the temporary restraining order did not touch on that copyright law. Instead, the restraining order was grounded largely in federal and Georgia state antihacking laws and a state trade secrets act. The information set to be presented was gleaned after one of the students had physically broken into a network and switching device on his campus and subsequently figured out a way to mimic Blackboard's technology, the company told the judge. Because that alleged act would be illegal under the federal and state laws, publication of the resulting information should be blocked, it argued. The state judge agreed, at least temporarily. A hearing on a permanent injunction against publication or presentation of the work will be held in Georgia state court Wednesday. The students, Hoffman and the University of Alabama's Virgil Griffith, could not immediately be reached for comment. From schear at attbi.com Wed Apr 16 17:10:49 2003 From: schear at attbi.com (Steve Schear) Date: Wed, 16 Apr 2003 17:10:49 -0700 Subject: Skunkworks seeks brilliant hacker Message-ID: <5.1.0.14.2.20030416164757.042d5eb0@mail.attbi.com> Skunkworks research group seeks brilliant hacker Reply to: sf_skunkworks at hotmail.com Date: 2003-04-15, 11:59AM We are a small, tightly-knit special research division of a money management firm, and we are seeking a new member for our team. Our mission is to create tools that complement human intelligence. Instead of trying to predict the future with "quant" techniques, we prefer to create information systems that lead to better decisions. To fulfill our skunkworks name, we combine computers, networks, and other technology with statistics, mathematics, and the latest academic research, and use these to gain advantageous information about our investments. The candidate we seek is a skilled hacker with an active mind. You will be required to invent your own next project, implement it, and use it in collaboration with the rest of the team. ... From timcmay at got.net Wed Apr 16 18:02:12 2003 From: timcmay at got.net (Tim May) Date: Wed, 16 Apr 2003 18:02:12 -0700 Subject: Reason's Cathy Young complains of post-9-11 "panic-mongers" In-Reply-To: <5.1.1.6.0.20030416190219.02928c50@mail.well.com> Message-ID: <38E37804-7070-11D7-B966-000A956B4C74@got.net> On Wednesday, April 16, 2003, at 04:04 PM, Declan McCullagh wrote: > http://www.reason.com/cy/cy040803.shtml > > ... > Should we be on guard against sacrificing civil liberties to national > security? Yes. But despite the panic-mongering, this is still America, > and we still have checks and balances. Journalist Steven Brill, whose > book After examines post- Sept. 11 America, notes in a Salon interview > that judges and legislators, including Republicans, have curbed some > of the excesses of John Ashcroft's Justice Department. > ... > > Measures such as limiting terror suspects' communications with their > lawyers in order to prevent potential terrorist acts are > controversial, and rightly so. But they are a far cry from Stalinism. > ... > Yes, this is a different America than it was on Sept. 10, 2001. But it > wasn't Ashcroft, President Bush, or the Republican Congress who > conspired to rob us of our freedom; it was the terrorists. > ... > > I hope someone kills the bitch. --Tim May "We are at war with Oceania. We have always been at war with Oceania." "We are at war with Eurasia. We have always been at war with Eurasia." "We are at war with Iraq. We have always been at war with Iraq. "We are at war with France. We have always been at war with France." From thing at thing.dyndns.org Tue Apr 15 23:16:07 2003 From: thing at thing.dyndns.org (thing) Date: Wed, 16 Apr 2003 18:16:07 +1200 Subject: Plan Would Use Software, Not Devices, to Fight Piracy References: Message-ID: <3E9CF527.7080700@thing.dyndns.org> As always I dont think the answer we see to the problem we saw is the true vision. From the postings I see here I think most of us see through the decit anyway. At the end of the day there are to many greedy, fat fingers wanting to get into the consumer pie, to make guarranteed money and a guarranteed stream of it. I would like to wash my hands of it, however it effects me directly whether I want it to or not. What does knowing where the original copy came from matter? It just disappeared into "china" and out comes a million + copies. All I can see is that there will clearly be 2 streams of movies/music, a highly restricted and expensive official solution, and an extreamly open, cheap, pirated version. All that will happen is people will be forced into one camp or another, and Im willing to bet once ppl move into the pirated camp they wont be able to get back, and wont want too. The RIAA's business model is shot, its just a question of how long it takes to die. In 3rd world countries I suspect its already dead, they cant afford to buy official stuff. regards Thing R. A. Hettinga wrote: >Wherein Paul Kocher proves, once again, that secure messages on >insecure public networks will always beat insecure messages on >"secure" private networks. > >So much for book-entry to the screen buffer. Take *that* WAVE-oids. >:-) > > >Of course, the old crypto saw still prevails: The only thing DRM gets >you is who the copy was stolen *from*, not who stole it. > >So, I still predict an eventual convergence to a cash-settled auction >market for authenticated copies of any digital work, and, of course, >I think Paul's work is a great step in this direction. > >Financial cryptography is the only cryptography that matters. > >Cheers, >RAH >------- > >rint&position=top> > >The New York Times > > >April 15, 2003 > >Plan Would Use Software, Not Devices, to Fight Piracy >By JOHN MARKOFF > > >A prominent computer security researcher has proposed a technical >solution aimed at forging a middle ground in the increasingly bitter >battle by Hollywood and Silicon Valley over the best way to protect >digital content from consumer piracy. > >Cryptography Research has begun circulating its proposal, which it >calls Self-Protecting Digital Content, among entertainment companies. >It plans to make it available publicly this week, in an effort to >break the impasse over the Digital Millennium Copyright Act, which >Congress passed in 1998 with strong lobbying support from Hollywood >and other creators of intellectual property. > >Cryptography Research's proposal would shift the location of >copy-protection code from the consumer products that play music and >movies and run software to the content files produced by >entertainment companies and software developers. The plan aims to >help avoid the immense costs of building piracy protection into >personal computers, video game players, satellite receivers and other >devices produced by technology manufacturers. While it would not >eliminate the possibility of digital theft, its advocates said it >would drastically curb piracy while easing the burden on the >technology industry. > >They say the plan would also avoid invading the privacy of consumers >who do not engage in piracy and make it easier and less costly for >content owners to recover if a copy-protection system is broken. > >The authors of the report include Paul Kocher, a leading American >cryptographer, who was involved in the development of an important >Web standard for protecting the security of commercial transactions. > >Consumer electronics makers create coding to wrap what they hope will >be unbreakable shells of software around digital content on CD's, >DVD's and the like. Once the copy protection systems are undermined, >however, it is simple for pirates to make unlimited copies of the >music, video or software. > >Under pressure from Hollywood and the recording industry, the >personal computing industry has now embarked on an ambitious project >to build copy protection hardware into the circuitry of all PC's. The >efforts, including the PC hardware industry's Trusted Computing >Platform Alliance and Microsoft's Palladium system are being sold to >users on the grounds that they will protect information privacy and >computer security. > >But if the hard-wired approach proves to be fallible, allowing a >determined enemy to bypass this digital Maginot line, the standards >efforts could turn into a financial disaster for the computer >industry and harm Hollywood as well. > >"We use the term brittle," said Mr. Kocher, who consults widely in >the consumer electronics industry on cryptography issues. "You have a >strong external shell, but the inside is software and completely >vulnerable." > >Under the proposal from Cryptography Research, based in San >Francisco, the hardware would be radically simplified and the >complexity of protecting the information would be embedded within the >music, video or software file itself. > >As part of the approach, each file would embed a digital mark, making >it possible for a stolen copy to be traced. The advantage of the >system is that the tracing technology would only come into play if a >file is widely copied. > >"It's a clever idea," said Bruce Schneier, founder and chief >technical officer of Counterpane Internet Security, a computer >security company. "This makes the job of the attacker more annoying. >Paul is approaching the problem more sensibly than others." > >Most security experts now believe that there will never be a perfect >solution to digital piracy. But most earlier proposals would involve >such extensive invasions of privacy that many experts worry that they >could end up producing a consumer backlash against the entertainment >and technology industries. > >Mr. Kocher said he decided to explore a new approach after years of >watching the mounting tension among Hollywood, electronics >manufacturers and consumer advocacy groups. > >"I find the problem of piracy absolutely fascinating," he said. "Most >people view this as a war between Hollywood and technology companies. >But I view it as the security industry has done a terrible job of >attempting to solve Hollywood's piracy problem." From rah at shipwright.com Wed Apr 16 15:16:54 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Wed, 16 Apr 2003 18:16:54 -0400 Subject: Key Republican Not Sure on Patriot Act Message-ID: Newsday.com Key Republican Not Sure on Patriot Act By JESSE J. HOLLAND Associated Press Writer April 16, 2003, 12:08 PM EDT WASHINGTON -- The Bush administration's plans to expand a post-Sept. 11 anti-terrorism law face resistance from a powerful House Republican who says he's not even sure he wants the government to keep its new powers. James Sensenbrenner of Wisconsin, the House Judiciary Committee chairman, complains that the Justice Department isn't sharing enough information for lawmakers to make a judgment on how well or poorly the USA Patriot Act is working. "I can't answer that because the Justice Department has classified as top-secret most of what it's doing under the Patriot Act," Sensenbrenner said when asked about the future of the anti-terrorism law in a recent interview. Sensenbrenner maintains that because the department refuses to be forthcoming, it is losing the public relation battle needed to extend the law beyond its October 2005 expiration, much less expand it. "The burden will be on the Justice Department and whomever is attorney general at that time to convince Congress and the president to extend the Patriot Act or modify it," he said. "But because of the fact that everything has been classified as top-secret, the public debate is centering on (the act's) onerousness." For example, the American Civil Liberties Union this week used newspaper ads to attack one provision that the ACLU says allows the government to enter homes, conduct searches, download computer contents and Internet viewing histories without informing the occupant that such a search was conducted. "Enacting policies that allow the government to enter our homes in secret and to collect highly personal information won't make us safer, but it will make us less free," said Anthony Romero, the ACLU's executive director. A Justice Department spokesman said the Bush administration will do its best to answer more than 100 questions from give Sensenbrenner and House Democrats about the law and its use in the war on terrorism. "The courts have upheld our actions time and time again," spokesman Mark Corallo said Tuesday. But "we will do everything we can to cooperate with Congress and with Chairman Sensenbrenner in answering his questions." Passed weeks after the Sept. 11 attacks, the USA Patriot Act granted the government broad new powers to use wiretaps, electronic and computer eavesdropping and searches and the authority to access a wide range of financial and other information in its investigations. It also broke down the traditional wall between FBI investigators and intelligence agents. Justice officials won't say what their new proposal would do, but "we will present Congress with an anti-terrorism package sometime in the near future," Corallo said. An early draft leaked to reporters in November suggested creating a DNA database of "suspected terrorists;" forcing suspects to prove why they should be released on bail, rather than have the prosecution prove why they should be held; and deporting U.S. citizens who become members of or help terrorist groups. But that draft was never reviewed by Attorney General John Ashcroft and about two-thirds of it will not be proposed to Congress, according to Justice Department officials speaking on condition of anonymity. Advocates say the current law has helped quash other terrorism attacks, but opponents claim it has eroded civil liberties. Among the advocates is Senate Judiciary Committee Chairman Orrin Hatch, who isn't waiting on 2005 to craft legislation to extend the life of the law. Last week, Hatch sought to extend the act through an amendment to a bill that would further expand government wiretapping authority under the Foreign Intelligence Surveillance Act. Lawmakers left for their Easter break before considering it. "It seems to me to be ridiculous to take away the best law enforcement tool against terrorism before we get rid of terrorism," said Hatch, R-Utah. "This bill has helped us protect ourselves from terrorism both inside and outside the country. It's a tough bill, but it's constitutional and it works." The Justice Department likely will need full Republican support to renew the anti-terrorism law, with congressional Democrats are already lining up against Hatch's legislation. A renewal effort "will be highly controversial and is not justified by the Justice Department's own record," said Sen. Patrick Leahy of Vermont, the Judiciary Committee's ranking Democrat. * __ On the Net: Senate Judiciary Committee: http://judiciary.senate.gov House Judiciary Committee questions on USA Patriot Act: http://www.house.gov/judiciary/patriot040103.htm Copyright 2003, The Associated Press -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From declan at well.com Wed Apr 16 16:04:07 2003 From: declan at well.com (Declan McCullagh) Date: Wed, 16 Apr 2003 19:04:07 -0400 Subject: Reason's Cathy Young complains of post-9-11 "panic-mongers" Message-ID: <5.1.1.6.0.20030416190219.02928c50@mail.well.com> http://www.reason.com/cy/cy040803.shtml ... Should we be on guard against sacrificing civil liberties to national security? Yes. But despite the panic-mongering, this is still America, and we still have checks and balances. Journalist Steven Brill, whose book After examines post- Sept. 11 America, notes in a Salon interview that judges and legislators, including Republicans, have curbed some of the excesses of John Ashcroft's Justice Department. ... Measures such as limiting terror suspects' communications with their lawyers in order to prevent potential terrorist acts are controversial, and rightly so. But they are a far cry from Stalinism. ... Yes, this is a different America than it was on Sept. 10, 2001. But it wasn't Ashcroft, President Bush, or the Republican Congress who conspired to rob us of our freedom; it was the terrorists. ... From bill.stewart at pobox.com Wed Apr 16 19:19:37 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 16 Apr 2003 19:19:37 -0700 Subject: Crypto cartoon In-Reply-To: <3E9DDDB6.F87B41E0@cdc.gov> Message-ID: <5.1.1.6.2.20030416191307.02d0aec8@idiom.com> At 03:48 PM 04/16/2003 -0700, Major Variola (ret) wrote: >from the cryptography mailing list: > >Today's (April 16ths) "Foxtrot" will amuse readers of this list. > >http://www.ucomics.com/foxtrot/ The image is at http://images.ucomics.com/comics/ft/2003/ft030416.gif , which is a more stable URL. From shaddack at ns.arachne.cz Wed Apr 16 10:21:20 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Wed, 16 Apr 2003 19:21:20 +0200 (CEST) Subject: Kill MS, again, but sideways In-Reply-To: <3E9D7835.AD28533D@cdc.gov> Message-ID: On Wed, 16 Apr 2003, Major Variola (ret) wrote: > Lawyers are merely implementing what the *legislators* let them. Good note. But if we apply the "aiding and abetting" clause, they can be summarily executed together, saving the manpower. > Since lawyers decay into legislators, this would have beneficial > prophylactic educational effects. I like this idea. An ounce of prevention... > No Thomas, a market will find better uses for them if your arguments > have merit. (Which they do, but it takes time.) Do we have the time? In long term, everyone will end up dead. I have problems and I have them *now*. :( > It is, after all, > the right of any individual (or group thereof) to keep secrets. > (And Thomas, I wouldn't argue against that *here* :-) > Or bind others with consensual contracts like NDAs. Individuals, yes. For small subjects, cooperation is favorable mode of operation, which counteracts the tendency to secretiveness. Corporations, NO! Once these monsters get too big, they try to do every dirty trick in the books and then some more to get and keep market share and to raise the barriers to entry for the others as high as possible, and to prevent everyone around to learn that their preciousss sssecretsss are nothing more than poorly tested dirty hacks holding together with duct tape and blobs of hot-melt glue. During last couple years, I developed blind hate against them. > Much as it is the right of anyone to diddle with anything they own, > and talk about it freely. If we'll get this, and a set of decent rev-eng tools, I will scale down my demands for officially sanctioned access. (I don't care how I get the data, if I get the vendor to fax me the docs or have to visit my local blackmarket dealer, the important thing is that I have the specs.) ...and the definition of ownership as physical possession. No "licensing". > The nice thing about jumpercables is the longer you use them, > the lesser the ohmic resistance of the legislator, until you > get charring, at which point you can move on to the next deserving > most honorable sir. ...and then the Market will finally find some useful use for the legislators. As a fertilizer. > PS: TS you might at this point enjoy _A Xenix Chainsaw Massacre_ Beeeeeeautiful! Thanks :) From timcmay at got.net Wed Apr 16 21:18:31 2003 From: timcmay at got.net (Tim May) Date: Wed, 16 Apr 2003 21:18:31 -0700 Subject: Crypto cartoon In-Reply-To: <200304162141.09987.njohnsn@njohnsn.com> Message-ID: On Wednesday, April 16, 2003, at 07:41 PM, Neil Johnson wrote: > On Wednesday 16 April 2003 09:19 pm, Bill Stewart wrote: >> At 03:48 PM 04/16/2003 -0700, Major Variola (ret) wrote: >>> from the cryptography mailing list: >>> >>> Today's (April 16ths) "Foxtrot" will amuse readers of this list. >>> >>> http://www.ucomics.com/foxtrot/ >> >> The image is at http://images.ucomics.com/comics/ft/2003/ft030416.gif >> , >> which is a more stable URL. > > Careful, might need a export permit. > "Clicking on this cartoon helps the terrorists." --Tim May From jamesd at echeque.com Wed Apr 16 21:23:40 2003 From: jamesd at echeque.com (James A. Donald) Date: Wed, 16 Apr 2003 21:23:40 -0700 Subject: Key Republican Not Sure on Patriot Act In-Reply-To: Message-ID: <3E9DC9DC.9835.D3AF9E0@localhost> -- On 16 Apr 2003 at 18:16, R. A. Hettinga wrote: > WASHINGTON -- The Bush administration's plans to expand a > post-Sept. 11 anti-terrorism law face resistance from a > powerful House Republican who says he's not even sure he > wants the government to keep its new powers. Any war does great and permanent damage to liberty. However a short victorious war in a faraway place does considerably less damage than most. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG odbZw4ASECzPXce96RGFgfxbwAZRPn65AX3bMSIC 4OdrOaOsLVLT6FqWpFdrgVVButlDMmPRjORMSzUKw From njohnsn at njohnsn.com Wed Apr 16 19:41:09 2003 From: njohnsn at njohnsn.com (Neil Johnson) Date: Wed, 16 Apr 2003 21:41:09 -0500 Subject: Crypto cartoon In-Reply-To: <5.1.1.6.2.20030416191307.02d0aec8@idiom.com> References: <5.1.1.6.2.20030416191307.02d0aec8@idiom.com> Message-ID: <200304162141.09987.njohnsn@njohnsn.com> On Wednesday 16 April 2003 09:19 pm, Bill Stewart wrote: > At 03:48 PM 04/16/2003 -0700, Major Variola (ret) wrote: > >from the cryptography mailing list: > > > >Today's (April 16ths) "Foxtrot" will amuse readers of this list. > > > >http://www.ucomics.com/foxtrot/ > > The image is at http://images.ucomics.com/comics/ft/2003/ft030416.gif , > which is a more stable URL. Careful, might need a export permit. -- Neil Johnson http://www.njohnsn.com PGP key available on request. From rah at shipwright.com Wed Apr 16 19:46:58 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Wed, 16 Apr 2003 22:46:58 -0400 Subject: Skunkworks seeks brilliant hacker In-Reply-To: <5.1.0.14.2.20030416164757.042d5eb0@mail.attbi.com> References: <5.1.0.14.2.20030416164757.042d5eb0@mail.attbi.com> Message-ID: At 5:10 PM -0700 4/16/03, Steve Schear wrote: >Skunkworks research group seeks brilliant hacker ... to find material non-public information? :-) Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From roughneck777 at hotmail.com Wed Apr 16 23:53:17 2003 From: roughneck777 at hotmail.com (The Roughneck) Date: Thu, 17 Apr 2003 01:53:17 -0500 Subject: Post this on your web site Message-ID: I realize that you were just trying to help me by posting my earlier emails but I think it may have caused more harm than good; at least for the short term. So if you will be so kind as to post this email for me then maybe I can make a little lemonaide from the previous lemons. The way I see it is if the "powers that be" at my job have already read my email postings from earlier then they'll probably go back to your site to see if you've posted any more emails. Please respect my wishes, here. I just want to avoid any harm against my family and me. And please dont show my email address again, too. If I'm lucky and they still dont know who I am then that would be a good thing. http://cryptome.org/il-spies-tx.htm -------- I think people have not quite gotten their hands around the speed at which information can be disseminated online. -Monica Lewinsky, LATimes 9 may 01 From eugen at leitl.org Thu Apr 17 02:10:37 2003 From: eugen at leitl.org (eugen) Date: Thu, 17 Apr 2003 04:10:37 -0500 Subject: W32.Klez.E removal tools Message-ID: <20030417091027.WDZ12665.out007.verizon.net@Ltoviys> From thing at thing.dyndns.org Wed Apr 16 11:39:22 2003 From: thing at thing.dyndns.org (thing) Date: Thu, 17 Apr 2003 06:39:22 +1200 Subject: Plan Would Use Software, Not Devices, to Fight Piracy References: <3E9CF527.7080700@thing.dyndns.org> Message-ID: <3E9DA35A.1090707@thing.dyndns.org> R. A. Hettinga wrote: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >At 6:16 PM +1200 4/16/03, thing wrote: > > >>All that will happen is >>people will be forced into one camp or another, and Im willing to >>bet once ppl move into the pirated camp they wont be able to get >>back, and wont want too. >> >> > >More to the point, "piracy", meaning the auctioning of *any* copy, >for bearer form internet cash using protocols everyone on these lists >know by heart, is *desirable*, and, I would claim, inevitable. > >Inevitable because it's cheaper, it already is, :-), but I mean >risk-adjusted transaction cost compared to book-entry DRM markets, >and, in addition, will put more revenue in the pockets of actual >innovators of new content. > >Cheers, >RAH > > Totally agree, its just a question of time. I have a friend who is a musician/composer her intent is to publish on the Net, me I'll do the technical stuff for her. In the past the music houses distributed the music, now they are not needed, the marketing they do is less and less and worse and worse. I think the musicians pay for such stuff anyway, so why precisely do we need the likes of Sony? They are just churning out the same stuff, while new musicians struggle and are ignored. Cutting out the middle men who offer smoke and mirrors means we as consumers pay less and the creators get a fairer return, I cant wait for it. While all this DRM , Palladium is fine for the US, I dont see it being saleable anywhere else, and I suspect the "youngsters" will avoid such crippled kit like its the plague in the US. Some of the suits seem to forget we have choice or think they have removed that choice, I very much want to prove them wrong. regards Thing From mv at cdc.gov Thu Apr 17 06:56:51 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Thu, 17 Apr 2003 06:56:51 -0700 Subject: Calling Internet rumor mills harmful, some move to shut sites. Defenders say free speech is at stake. Message-ID: <3E9EB2A3.81869D31@cdc.gov> Parents Rally to Stop 'Cyber Bullying' Calling Internet rumor mills harmful, some move to shut sites. Defenders say free speech is at stake. By Erika Hayasaki and Jia-Rui Chong, Times Staff Writers When Internet users log onto http://www.schoolscandals.com and click on the Beverly Hills High School link, they will find a message calling one student a "retard" who "deserves to go to hell." A posting in the Frost Middle School chat room describes a student as a "homosexual with a pigeon-like face and a penguin-like body." Such name-calling and gossip about students are common on the 3-year-old Web site, similar to the crude messages scribbled inside of school bathroom stalls for decades but on a much larger scale. That "cyber bullying" has an audience of tens of thousands, and it features links for chat rooms about nearly 100 Southern California middle and high schools, particularly in the San Fernando Valley. As a result, parents and school administrators are calling for the site's closure, contending much of its content is libelous and harmful. ... Wendy Seltzer, a staff attorney with the Electronic Frontier Foundation, an online civil liberties organization, said that the authors of the postings might be held liable, but that a 1996 federal law protects many Internet service providers from lawsuits about their content. Only sites like http://www.salon.com, http://www.latimes.com and others can be sued for defamation, since they hold the right to edit their content, she said. The notion is that most Web hosts "don't look at all, because if you do look, you might be held liable for what your users are saying," she said. http://www.latimes.com/news/local/la-me-website17apr17,1,911742.story?coll=la%2Dhome%2Dtodays%2Dtimes From mv at cdc.gov Thu Apr 17 07:25:19 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Thu, 17 Apr 2003 07:25:19 -0700 Subject: Key Republican Not Sure on Patriot Act Message-ID: <3E9EB94F.31CCC3D8@cdc.gov> At 10:05 AM 4/17/03 -0400, Tyler Durden wrote: > >Which is why we're lookin' at Syria next. > Speaking of which, Syria pulled an excellent counter to the US bullying. "No WMD in the middle east". Who could object to that, and who would their owners be, and who could fail to see that? And if the US actually does something military (agreed, there's a decent chance of that) then Osama wins bigtime. Checkmate. ... We have always been at war with Oceania bin Laden From eresrch at eskimo.com Thu Apr 17 07:41:21 2003 From: eresrch at eskimo.com (Mike Rosing) Date: Thu, 17 Apr 2003 07:41:21 -0700 (PDT) Subject: Key Republican Not Sure on Patriot Act In-Reply-To: <3E9EB94F.31CCC3D8@cdc.gov> Message-ID: On Thu, 17 Apr 2003, Major Variola (ret) wrote: > > Speaking of which, Syria pulled an excellent counter to the US bullying. > > "No WMD in the middle east". Who could object to that, and who > would their owners be, and who could fail to see that? > > And if the US actually does something military (agreed, there's a > decent chance of that) then Osama wins bigtime. Checkmate. There's 2 sides to that move - by forcing Israel to join the no WMD group they'd have to eliminate their nukes. No way Israelies will go for that, so the US loses face again. This helps all the Osama's even more (plus it gives Iran a good reason to go to Pakistan for the last bit of help they need to complete their weapons.) So the US better conquer the whole area pretty quickly or it'll be dealing with nuclear powers instead of chemcial ones. Patience, persistence, truth, Dr. mike From declan at well.com Thu Apr 17 05:08:32 2003 From: declan at well.com (Declan McCullagh) Date: Thu, 17 Apr 2003 08:08:32 -0400 Subject: Kill MS, again, but sideways In-Reply-To: ; from shaddack@ns.arachne.cz on Wed, Apr 16, 2003 at 07:21:20PM +0200 References: <3E9D7835.AD28533D@cdc.gov> Message-ID: <20030417080832.A14122@cluebot.com> On Wed, Apr 16, 2003 at 07:21:20PM +0200, Thomas Shaddack wrote: > Good note. But if we apply the "aiding and abetting" clause, they can be > summarily executed together, saving the manpower. It's a rare lawyer that will criticize his own cartel... -Declan From schear at attbi.com Thu Apr 17 09:33:21 2003 From: schear at attbi.com (Steve Schear) Date: Thu, 17 Apr 2003 09:33:21 -0700 Subject: Skunkworks seeks brilliant hacker In-Reply-To: Message-ID: <5.1.0.14.2.20030417093246.043c2600@mail.attbi.com> At 10:34 AM 4/17/2003 -0400, Tyler Durden wrote: >>From: "R. A. Hettinga" >>To: cypherpunks at lne.com >>Subject: Re: Skunkworks seeks brilliant hacker >>Date: Wed, 16 Apr 2003 22:46:58 -0400 >> >>At 5:10 PM -0700 4/16/03, Steve Schear wrote: >> >Skunkworks research group seeks brilliant hacker >> >>... to find material non-public information? > >I actually thought this was a clever gag. Gag perhaps. All the info I have is at http://www.craigslist.org/sfo/sfc/eng/10367784.html steve From mv at cdc.gov Thu Apr 17 09:52:59 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Thu, 17 Apr 2003 09:52:59 -0700 Subject: Plumes, LA=Bhopal++ Message-ID: <3E9EDBEB.CE3D1D9F@cdc.gov> Chemical Plants Said to Pose Risk More than 100 facilities, including 12 in the L.A. Basin, could expose millions to toxic gas in an attack or accident, documents indicate. By Marla Cone, Times Staff Writer More than 100 chemical plants throughout the United States -- including 12 in the Los Angeles Basin -- each could expose millions of people to dangerous concentrations of toxic gas in the event of a terrorist attack or major accident, according to industry documents filed with the U.S. Environmental Protection Agency. In Southern California, eight plants in Los Angeles County, three in San Bernardino County and one in Riverside County are each capable of exposing a million or more people to the gases, and some people could receive doses high enough to cause death or serious injury, the documents show. About 30 other plants in the region handle smaller volumes of chemicals that could affect between 100,000 and 1 million people. http://www.latimes.com/news/local/la-me-chemplants17apr17,1,6036321.story?coll=la%2Dheadlines%2Dcalifornia cf http://cryptome.org/cshib041003.txt http://www.epa.gov/ceppo/ap-ocgu.htm http://yosemite.epa.gov/oswer/ceppoweb.nsf/frmVZIS?OpenForm From camera_lumina at hotmail.com Thu Apr 17 07:00:56 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 17 Apr 2003 10:00:56 -0400 Subject: Reason's Cathy Young complains of post-9-11 "panic-mongers" Message-ID: I sure saw Tim's response coming. My own initial reaction was the same, except this fascist's stupidity might be a good thing (ie, for those of us that don't want to end up having a ratcage around our heads). A little Durdanian analysis will let you know what I mean... >>Measures such as limiting terror suspects' communications with their >>lawyers in order to prevent potential terrorist acts are controversial, >>and rightly so. But they are a far cry from Stalinism. So the masses reading this say: "Stalinism? You mean some people are comparing our loss of freedom with Stalinism? I don't believe that..." But the seed is now planted. Now the masses perceive other masses as being afraid we're paying too much for this war on (someone else's) terrorism. >>... >>Yes, this is a different America than it was on Sept. 10, 2001. But it >>wasn't Ashcroft, President Bush, or the Republican Congress who conspired >>to rob us of our freedom; it was the terrorists. Nice! So she tacitly admits SOMEONE'S fuckin' us over. AND, she accidently acknowledges that people believe its Bush and Asscruft. Fortunately, even the rank-and-file are smart enough to recognize who actually makes the laws here. So all that's needed are a few more horror stories of white Americans getting carted away for reading about rocketry at the library, and they'll bum-rush this show. -TD _________________________________________________________________ From camera_lumina at hotmail.com Thu Apr 17 07:05:11 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 17 Apr 2003 10:05:11 -0400 Subject: Key Republican Not Sure on Patriot Act Message-ID: James Donald wrote.... >From: "James A. Donald" >To: cypherpunks at lne.com, cryptography at metzdowd.com >Subject: Key Republican Not Sure on Patriot Act >Date: Wed, 16 Apr 2003 21:23:40 -0700 > > -- >On 16 Apr 2003 at 18:16, R. A. Hettinga wrote: > > WASHINGTON -- The Bush administration's plans to expand a > > post-Sept. 11 anti-terrorism law face resistance from a > > powerful House Republican who says he's not even sure he > > wants the government to keep its new powers. > >Any war does great and permanent damage to liberty. However a >short victorious war in a faraway place does considerably less >damage than most. Which is why we're lookin' at Syria next. -TD _________________________________________________________________ MSN 8 helps eliminate e-mail viruses. Get 2 months FREE*. http://join.msn.com/?page=features/virus From camera_lumina at hotmail.com Thu Apr 17 07:34:54 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 17 Apr 2003 10:34:54 -0400 Subject: Skunkworks seeks brilliant hacker Message-ID: >From: "R. A. Hettinga" >To: cypherpunks at lne.com >Subject: Re: Skunkworks seeks brilliant hacker >Date: Wed, 16 Apr 2003 22:46:58 -0400 > >At 5:10 PM -0700 4/16/03, Steve Schear wrote: > >Skunkworks research group seeks brilliant hacker > >... to find material non-public information? > >:-) > >Cheers, >RAH > >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' I actually thought this was a clever gag. -TD _________________________________________________________________ STOP MORE SPAM with the new MSN 8 and get 2 months FREE* http://join.msn.com/?page=features/junkmail From timcmay at got.net Thu Apr 17 11:28:13 2003 From: timcmay at got.net (Tim May) Date: Thu, 17 Apr 2003 11:28:13 -0700 Subject: Key Republican Not Sure on Patriot Act In-Reply-To: <3E9EB94F.31CCC3D8@cdc.gov> Message-ID: <59AEBF9A-7102-11D7-B966-000A956B4C74@got.net> On Thursday, April 17, 2003, at 07:25 AM, Major Variola (ret) wrote: > At 10:05 AM 4/17/03 -0400, Tyler Durden wrote: >> >> Which is why we're lookin' at Syria next. >> > > Speaking of which, Syria pulled an excellent counter to the US > bullying. > > "No WMD in the middle east". Who could object to that, and who > would their owners be, and who could fail to see that? > Who indeed? The Zionist Entity claims they need their germs, their chemicals, and their nukes (which they say they do not have, wink, wink) as a deterrent against the sand niggers who want their farms and orchards and shops back. As the Zionists have emulated nearly every other measure of their teachers, including concentration camps, identity checkpoints, and a socialized economy, one wonders why they do not go ahead and deploy the Final Solution? --Tim May "To those who scare peace-loving people with phantoms of lost liberty, my message is this: Your tactics only aid terrorists." --John Ashcroft, U.S. Attorney General From rah at shipwright.com Thu Apr 17 09:01:41 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Thu, 17 Apr 2003 12:01:41 -0400 Subject: Experts say looters had keys to Iraqi antiquity vaults Message-ID: Autovandalism: Wherein the Iraqui Ancien Regime "loots" itself... It looks like the guys with the keys stole the stuff they already stole in the first place. The museum hasn't been open in 15 years, so who knows what was really there, and most of the stuff that wasn't copied elsewhere was copies anyway. Now, hopefully, the rest is on the open market, where it belongs. At the very least, the stuff should have been auctioned off to pay the Iraqi debt, anyway. Saying that that stuff was the patrimony of three different kinds of Arabs was like saying that Kennewick Man wasn't a Caucasian. Cheers, RAH ------- Boston Globe Experts say looters had keys to Iraqi antiquity vaults By Associated Press, 4/17/03 PARIS -- Some of the looters who ravaged Iraqi antiquities had keys to museum vaults and were able to take pieces from safes, experts said Thursday at an international meeting. The U.N. cultural agency, UNESCO, gathered some 30 art experts and cultural historians in Paris on Thursday to assess the damage to Iraqi museums and libraries looted in the aftermath of the U.S.-led invasion. Although much of the looting was haphazard, experts said some of the thieves clearly knew what they were looking for and where to find it, suggesting they were prepared professionals. "It looks as if part of the looting was a deliberate planned action," said McGuire Gibson, a University of Chicago professor and president of the American Association for Research in Baghdad. "They were able to take keys for vaults and were able to take out important Mesopotamian materials put in safes." Cultural experts, curators and law enforcement officials are scrambling to track down the missing antiquities and prevent further looting of the valuables. The pillaging has ravaged the irreplaceable Babylonian, Sumerian and Assyrian collections that chronicled ancient civilization in Mesopotamia, and the losses have triggered an impassioned outcry in cultural circles. Many fear the stolen artifacts have been absorbed into highly organized trafficking rings that ferry the goods through a series of middlemen to collectors in Europe, the United States and Japan. Officials at the UNESCO meeting at its headquarters in Paris said the information was still too sketchy to determine exactly what was missing and how many items were unaccounted for. But they were united in calling for quick action to track down the pilfered items. "I have a suspicion it was organized outside the country, in fact I'm pretty sure it was," said Gibson. He added that if a good police team was put together, "I think it could be cracked in no time." Koichiro Matsuura, director-general of the U.N. Educational, Scientific and Cultural Organization, began the meeting Thursday by calling for a U.N. resolution imposing a temporary embargo on trade in Iraqi antiquities. Matsuura said it was urgent to repair the antiquities that remain and to keep them from the hands of those who traffic in the lucrative market of stolen objects. "It is always difficult, when communities are facing the consequences of an armed conflict ... to plead the case for the preservation of the cultural heritage," Matsuura said. Matsuura said he would ask U.N. Secretary-General Kofi Annan to seek a resolution against illicit trafficking that would also impose an embargo "for a limited period" on the acquisition of Iraqi cultural objects. Such a resolution would also call for the return of such items to Iraq, he said. In addition, Matsuura said the establishment of a nationwide "heritage police" was necessary to watch over cultural sites and institutions. Such a force could be set up by "the authorities on the ground," an apparent reference to U.S. and British forces in Baghdad. He reiterated a call for governments to adopt emergency legal and administrative measures to prevent the importing of objects from Iraq, and to make sure museums and art dealers refuse transactions in such objects. A database of all cultural objects needs to be quickly established so police, museums, customs authorities can act against any traffickers, he said. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From mv at cdc.gov Thu Apr 17 12:57:41 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Thu, 17 Apr 2003 12:57:41 -0700 Subject: Unredacting With Smoke & Mirrors & Google, Paranoids, Israeli Art Spies Message-ID: <3E9F0735.C381A6EE@cdc.gov> 17 April 2003 From camera_lumina at hotmail.com Thu Apr 17 13:35:10 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 17 Apr 2003 16:35:10 -0400 Subject: HoneyNet Looks to Stick Hackers Message-ID: Anyone know what kind of encryption is being discussed below? (ie, that hackers use to communicate with each other) -TD HoneyNet Looks to Stick Hackers -------------------------------------------------------------------------------- Online vandals and stalkers beware. A group of security professionals called The HoneyNet Project, has just made it easier for law enforcement to stealthily track the behavior of online evil-doers. On Monday, the volunteer group, which consists of two dozen computer security, information intelligence, and psychology professionals, released the second version of its how-to-build-a-honeynet software, a tool used by law enforcement and others interested in security issues to track the behavior of hackers. For those folks not down with security lingo, a honeynet expands on the concept of a honeypot, a software application that pretends to be a server on the Internet and lures unsuspecting hackers to it. A honeynet is a collection of these honeypots networked together. When hackers (or blackhats, as theyre known in security circles) enter the honeynet, they are watched closely by a combination of surveillance technologies. Youre really playing with fire in this type of environment, says Lance Spitzner, a security architect at Sun Microsystems Inc. (Nasdaq: SUNW - message board) and founder of the four-year old HoneyNet Project. The whole point is to observe the bad guys as they go about their work in a controlled setting without them knowing it. The way it works is an intrusion-detection system triggers a virtual alarm whenever an attacker breaches security on one of the networked computers. Meanwhile, an administrator watches everything the intruder types, from commands to emails to chat sessions. A separate firewall is set up to cut the hacker off from the Internet anytime he tries to attack another system from the honeynet. Proponents say the latest HoneyNet release includes the following improvements over previous versions: The software is prepackaged for easy setup and comes for installation on a single server. A new utility called Honey Inspector, which will be released soon, will allow honeypots within the honeynet to be managed and analyzed through a graphical user interface. Eventually, the HoneyNet Project expects to release a bootable CD-ROM that will make installing its version of a honeynet even easier. Software includes improvements for breaking encryption codes that hackers often use to communicate with each other. The designers claim to have made it harder for hackers to detect that theyve been lured into a honeynet. In the previous version of software, all the surveillance was done at Layer 3. Hackers had to pass through a Layer 3 gateway when entering the honeynet, which often tipped them off to what was happening. But now HoneyNet uses a Layer 2 bridging gateway, making any surveillance invisible to the hacker. The upgrade includes an enhanced firewall that blocks harmful attacks, while still allowing hackers to communicate with their associates outside the honeynet. The longer we can keep them in the honeynet without them realizing what is going on, the more information we can gather, says Spitzner. We want them talking to their buddies on the Internet, but we dont want them causing anymore harm. So are the Honeynet Project volunteers some sort of cyber police force? Not at all. The not-for-profit groups only purpose is to observe and learn about hacker behavior and share that information with the public. Thats not to say that the information and tools gathered cant be used to catch bad guys. Government agencies like the United States Department of Homeland Security and the Federal Bureau of Investigation (FBI) already use HoneyNet Project information and techniques in their work. The HoneyNet Project is not designed for commercial use, according to Spitzner. He says it wouldnt make much sense for an enterprise to spend the resources to build such a network. But network security might use the tools to learn more about hackers and recommend strategies to clients. All software on the HoneyNet Project Website is free to download by anyone. For more information, go to The HoneyNet Project.  Marguerite Reardon, Senior Editor, Light Reading _________________________________________________________________ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail From jei at cc.hut.fi Thu Apr 17 06:54:25 2003 From: jei at cc.hut.fi (Jei) Date: Thu, 17 Apr 2003 16:54:25 +0300 (EET DST) Subject: White House seeks to expand DNA database Message-ID: White House seeks to expand DNA database By Richard Willing, USA TODAY 4/15/2003 7:36 PM WASHINGTON  DNA profiles from juvenile offenders and from adults who have been arrested but not convicted would be added to the FBI's national DNA database under a Bush administration proposal. Under current law, only DNA from adults convicted of crimes can be placed in the national database, which is used to compare those samples with biological evidence from the scenes of unsolved crimes. As of January, there were about 1.3 million DNA samples in the database, U.S. officials say. Adding profiles from thousands of adult arrestees and juvenile offenders would greatly expand the DNA system's worth by increasing the number of potential matches, administration officials say. Justice Department officials have discussed potential changes in federal DNA law with key members of Congress and are pushing for legislation this year. "DNA is to the 21st century what fingerprinting was to the 20th," says Deborah Daniels, assistant U.S. attorney general for justice programs. "The widespread use of DNA evidence is the future of law enforcement in this country." But critics say adding juvenile and arrestee profiles to the database threatens privacy by expanding the pool of samples beyond adult criminals. Although only digital DNA profiles would be linked to the FBI computer, the blood or saliva samples from which the DNA was drawn would be kept by state labs, they note. "It's only a matter of time before the government gets its hands on those DNA samples and starts playing around with our genetic codes," says Barry Steinhardt, privacy specialist for the American Civil Liberties Union's national office in New York City. "They say they don't want to do that, but not too long ago they were saying they'd only take DNA profiles from rapists and murderers and now they want juveniles ... We're not just on a slippery slope, we're halfway down it." DNA system defenders say the actual samples must be retained for quality- control testing and in the event a DNA match is challenged in court. They note that strict privacy laws prevent researchers from using the stored samples for any other purpose. And they note that the U.S. government already stores fingerprints from arrestees in a giant computer system without causing privacy problems. Privacy advocates aren't convinced. They note that researchers are identifying genetic markers for height, hair color and other features. They suspect that authorities soon will want to search DNA samples for such genetic markers. DNA, a cellular acid contained in blood, semen and other body fluids and tissues, is an ideal tool for crime solving. Because it contains an individual's unique genetic code, a DNA sample taken from blood, semen or even traces of saliva in a bite mark left on a crime victim can be used to match the perpetrator to the crime. In 1989, states began to collect DNA from convicted criminals and add the profiles to a computer that could match them to DNA from unsolved crimes. In 1992, the FBI created a system that linked the state databases via a bureau computer in Morgantown, W.Va. Thirty states already collect DNA profiles from juvenile offenders, who typically range in age from 13 to 17 but can be as young as 8, according to the Coalition for Juvenile Justice, a Washington, D.C., advocacy group. Since January, Virginia also has collected DNA from those accused of murder, rape and other violent felonies. But under U.S. law, only DNA from people convicted of crimes can be put into the FBI system. The national DNA database has had many successes. As of December, 6,670 DNA samples had been matched to unsolved crimes, the FBI says. States that take DNA from the widest range of offenders seem to produce the best results. New York has had 830 matches since it began to collect DNA from violent felons in 1996. But 80% were made after 1999, when the state began to require DNA collection from most other felonies. In Virginia, DNA from 74 crimes, including 12 rapes and nine murders, has been matched to DNA profiles from juvenile offenders during the past 10 years. "Not all juveniles are going to become adult criminals," says Paul Ferrara, director of Virginia's DNA program. "But for the few who are, the sooner we have them in the system the better." It is unclear how many new DNA samples would be put into the system if juvenile offenders and adult arrestees are added. In 1996, the last year for which data are available, 567,200 youths were found responsible for crimes by juvenile courts or other authorities. Virginia expects to collect DNA from 8,000 arrestees this year. The White House is pushing to make DNA a more effective law enforcement tool. Last month, it announced a plan to spend about $1 billion over five years to improve the national database. http://www.usatoday.com/news/washington/2003-04-15-dna-usat_x.htm From shaddack at ns.arachne.cz Thu Apr 17 10:12:18 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Thu, 17 Apr 2003 19:12:18 +0200 (CEST) Subject: Skunkworks seeks brilliant hacker In-Reply-To: <5.1.0.14.2.20030417093246.043c2600@mail.attbi.com> Message-ID: On Thu, 17 Apr 2003, Steve Schear wrote: > Gag perhaps. All the info I have is at > http://www.craigslist.org/sfo/sfc/eng/10367784.html Doesn't seem they are looking for a hacker in the sense of a network security "tester". Looks rather like they are looking for a hacker in the sense of a smart, out-of-the-box-thinking programmer/designer/analyst. From ckuethe at ualberta.ca Thu Apr 17 21:18:58 2003 From: ckuethe at ualberta.ca (Chris Kuethe) Date: Thu, 17 Apr 2003 22:18:58 -0600 (MDT) Subject: HoneyNet Looks to Stick Hackers In-Reply-To: References: Message-ID: On Thu, 17 Apr 2003, Tyler Durden wrote: > Anyone know what kind of encryption is being discussed below? (ie, that > hackers use to communicate with each other) lance is talking about encrypted archives, pgp'd messages, ssh and silc. short version is that his honeypots install a kernelmod to log all the IO buffers after decryption or before encryption and then fire them out over the wire. there is another kernel mod to prevent the raw socket / bpf / lpf / tap / ??? from seeing frames with a certain mac address. i saw him at cansecwest last week - good talk as usual. the talk he gave should be posted to www.cansecwest.com shortly... > -TD > > > > HoneyNet Looks to Stick Hackers > >[snip] -- GDB has a 'break' feature; why doesn't it have 'fix' too? From wmo at rebma.pro-ns.net Thu Apr 17 22:33:03 2003 From: wmo at rebma.pro-ns.net (Bill O'Hanlon) Date: Fri, 18 Apr 2003 00:33:03 -0500 Subject: Future Realities Discussed - WLG In-Reply-To: <20030418000909.EVHX20386.imf47bis.bellsouth.net@Inbox> References: <20030418000909.EVHX20386.imf47bis.bellsouth.net@Inbox> Message-ID: <20030418053303.GG309@rebma.pro-ns.net> On Fri, Apr 18, 2003 at 12:04:00AM +0000, Wilfred at Cryogen.com wrote: > > > The real reason I've been trying to establish a comprehensive knowledgebase of human competance. Having only been suppressed and prevented by political, corporate, religious, social organizations, and related evils. > > -Wilfred > Wilfred at Cryogen.com > Twirlip of the Ice: Hexapodia is the key insight. From shaddack at ns.arachne.cz Thu Apr 17 16:49:08 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Fri, 18 Apr 2003 01:49:08 +0200 (CEST) Subject: [speak-freely] (#62) initialization vector - weak crypto ? (fwd) Message-ID: This is what I feared of, and what I hoped someone from here will figure out sooner... ---------- Forwarded message ---------- Date: Fri, 18 Apr 2003 00:55:10 +0200 (MEST) Subject: [speak-freely] (#62) initialization vector - weak crypto ? From: Speak Freely Forum To: speak-freely at fourmilab.ch Message posted to the Speak Freely Forum by anon on Fri, 18 Apr 2003 00:55:10 +0200 (MEST). http://www.fourmilab.ch/wb/speak-freely.pl?rev=62 It seems that for each CBC packet the same initialization vector 0 is used! This likely weakens the crypto and might enable an attacker to break the encryption: According to rfc2405/rfc2451 the IV in CBC-mode must not be predictable. From mv at cdc.gov Fri Apr 18 09:21:04 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 18 Apr 2003 09:21:04 -0700 Subject: Govt uses private investigators to watch quarantined Message-ID: <3EA025F0.1020406@cdc.gov> http://www.nytimes.com/2003/04/18/science/sciencespecial/18INFE.html?ex=1051243200&en=c0c66bc035169a16&ei=5062&partner=GOOGLE They put a police guard on one patient at a hospital and have hired private security investigators to check on people in isolation. "This is a time when the needs of a community outweigh those of a single person." Ontario's health minister, Tony Clement From mv at cdc.gov Fri Apr 18 09:32:22 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 18 Apr 2003 09:32:22 -0700 Subject: [1st amend] Boycott Wal-Mart: They pressured a web site to close Message-ID: <3EA02896.4040407@cdc.gov> A website that urged visitors to lower prices for grocery items by substituting bar codes shut itself down after pressure from Wal-Mart. The site's operators, a group of tech-savvy political activists, decided to close the site Wednesday after contacts between their lawyer and those of Wal-Mart , the world's largest retailer. http://wired.com/news/business/0,1367,58528,00.html From gbnewby at ils.unc.edu Fri Apr 18 07:15:04 2003 From: gbnewby at ils.unc.edu (Greg Newby) Date: Fri, 18 Apr 2003 10:15:04 -0400 Subject: HoneyNet Looks to Stick Hackers In-Reply-To: References: Message-ID: <20030418141504.GH13765@ils.unc.edu> On Thu, Apr 17, 2003 at 04:35:10PM -0400, Tyler Durden wrote: > > Anyone know what kind of encryption is being discussed below? (ie, that > hackers use to communicate with each other) > > -TD rot13? No, just kidding. I think they might be talking about capturing ssh sessions to and from the HoneyNet server. Not quite the way it was presented below... The HoneyNet crew is very clever and capable, but I don't think they're doing encryption research. -- Greg > > > > HoneyNet Looks to Stick Hackers > > -------------------------------------------------------------------------------- > > Online vandals and stalkers beware. A group of security professionals > called The HoneyNet Project, has just made it easier for law enforcement to > stealthily track the behavior of online evil-doers. > > On Monday, the volunteer group, which consists of two dozen computer > security, information intelligence, and psychology professionals, released > the second version of its how-to-build-a-honeynet software, a tool used > by law enforcement and others interested in security issues to track the > behavior of hackers. > > For those folks not down with security lingo, a honeynet expands on the > concept of a honeypot, a software application that pretends to be a > server on the Internet and lures unsuspecting hackers to it. A honeynet > is a collection of these honeypots networked together. When hackers (or > blackhats, as theyre known in security circles) enter the honeynet, they > are watched closely by a combination of surveillance technologies. > > Youre really playing with fire in this type of environment, says Lance > Spitzner, a security architect at Sun Microsystems Inc. (Nasdaq: SUNW - > message board) and founder of the four-year old HoneyNet Project. The > whole point is to observe the bad guys as they go about their work in a > controlled setting without them knowing it. > > The way it works is an intrusion-detection system triggers a virtual alarm > whenever an attacker breaches security on one of the networked computers. > Meanwhile, an administrator watches everything the intruder types, from > commands to emails to chat sessions. A separate firewall is set up to cut > the hacker off from the Internet anytime he tries to attack another system > from the honeynet. > > Proponents say the latest HoneyNet release includes the following > improvements over previous versions: > > > The software is prepackaged for easy setup and comes for installation on a > single server. > > > A new utility called Honey Inspector, which will be released soon, will > allow honeypots within the honeynet to be managed and analyzed through a > graphical user interface. Eventually, the HoneyNet Project expects to > release a bootable CD-ROM that will make installing its version of a > honeynet even easier. > > > Software includes improvements for breaking encryption codes that hackers > often use to communicate with each other. > > > The designers claim to have made it harder for hackers to detect that > theyve been lured into a honeynet. In the previous version of software, > all the surveillance was done at Layer 3. Hackers had to pass through a > Layer 3 gateway when entering the honeynet, which often tipped them off to > what was happening. But now HoneyNet uses a Layer 2 bridging gateway, > making any surveillance invisible to the hacker. > > > The upgrade includes an enhanced firewall that blocks harmful attacks, > while still allowing hackers to communicate with their associates outside > the honeynet. The longer we can keep them in the honeynet without them > realizing what is going on, the more information we can gather, says > Spitzner. We want them talking to their buddies on the Internet, but we > dont want them causing anymore harm. > > So are the Honeynet Project volunteers some sort of cyber police force? Not > at all. The not-for-profit groups only purpose is to observe and learn > about hacker behavior and share that information with the public. Thats > not to say that the information and tools gathered cant be used to catch > bad guys. Government agencies like the United States Department of Homeland > Security and the Federal Bureau of Investigation (FBI) already use HoneyNet > Project information and techniques in their work. > > The HoneyNet Project is not designed for commercial use, according to > Spitzner. He says it wouldnt make much sense for an enterprise to spend > the resources to build such a network. But network security might use the > tools to learn more about hackers and recommend strategies to clients. > > All software on the HoneyNet Project Website is free to download by anyone. > For more information, go to The HoneyNet Project. > >  Marguerite Reardon, Senior Editor, Light Reading > > > > > > > _________________________________________________________________ > Tired of spam? Get advanced junk mail protection with MSN 8. > http://join.msn.com/?page=features/junkmail From mv at cdc.gov Fri Apr 18 11:14:16 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 18 Apr 2003 11:14:16 -0700 Subject: Who needs Padilla when you have FedEx? Message-ID: <3EA04078.C21DBC20@cdc.gov> Date and Place--January 2, 2002, Federal Express facility at New Orleans International Airport, in Kenner, Louisiana. Nature and Probable Consequences--A package containing iridium-192 (Ir-192) with elevated surface radiation levels was discovered at the Federal Express facility located at the New Orleans airport. The package was identified as a routine shipment for Source Production and Equipment Company (SPEC), located in St. Rose, Louisiana. The total activity was 366 terabecquerels (TBq) (9893 curies (Ci)). [IE the activity of 9 kilos of radium-226] http://cryptome.org/nrc041803.txt (look for SAFKEG) From eresrch at eskimo.com Fri Apr 18 11:47:41 2003 From: eresrch at eskimo.com (Mike Rosing) Date: Fri, 18 Apr 2003 11:47:41 -0700 (PDT) Subject: Who needs Padilla when you have FedEx? In-Reply-To: <3EA04078.C21DBC20@cdc.gov> Message-ID: Pretty impressive how little radiation dose the exposed people got for how hot that is! But it does show you should try to hijack cargo planes instead of passenger planes if you really want to create som havoc. Patience, persistence, truth, Dr. mike On Fri, 18 Apr 2003, Major Variola (ret) wrote: > Date and Place--January 2, 2002, Federal Express facility at New > Orleans International Airport, in Kenner, Louisiana. > Nature and Probable Consequences--A package containing iridium-192 > (Ir-192) with elevated surface radiation levels was discovered at the > Federal Express facility located at the New Orleans airport. The > package was identified as a routine shipment for Source Production and > Equipment Company (SPEC), located in St. Rose, Louisiana. > > The total activity was 366 terabecquerels (TBq) (9893 curies (Ci)). > > [IE the activity of 9 kilos of radium-226] > > http://cryptome.org/nrc041803.txt > (look for SAFKEG) From timcmay at got.net Fri Apr 18 13:04:01 2003 From: timcmay at got.net (Tim May) Date: Fri, 18 Apr 2003 13:04:01 -0700 Subject: Quarantines may be justified In-Reply-To: <3EA025F0.1020406@cdc.gov> Message-ID: On Friday, April 18, 2003, at 09:21 AM, Major Variola (ret) wrote: > http://www.nytimes.com/2003/04/18/science/sciencespecial/ > 18INFE.html?ex=1051243200&en=c0c66bc035169a16&ei=5062&partner=GOOGLE > > They put a police guard on one patient at a hospital and have hired > private security investigators to check on people in isolation. > > "This is a time when the needs of a community outweigh those of a > single person." > Ontario's health minister, Tony Clement > I will make what some here will probably think is a totalitarian sentiment: under extreme conditions, I support quarantine measures. Better yet, those seeking to avoid a disease should self-quarantine or isolate themselves. Or wear masks (I have a plentiful supply of 3M N95 respirators, for example...better to buy them when they are dirt cheap, ahead of an emergency, than to be scrambling to buy them later). A person who is known to be communicable is committing a kind of assault by spraying germs around. (Assuming the medical condition is as described.) Though it is a serious step to limit a person's freedom to move about on public property, this is one of the few cases, along with imprisonment for criminal convictions, where it is justified. I will gladly make this trade of liberties: * roll back all of the bullshit laws designed to protect people from themselves: laws against smoking, laws against other drugs, laws banning sexual practices. And get rid of 90% of all government functions and staff in general: roll things back to 1925 levels, in terms of percentages. (I would favor reducing government further, but 1925 levels would be a great start.) in exchange for: * infectious, communicable diseases may need quarantines Provided the quarantine is only for medical reasons, and is never used to isolate people as punishment, for political reasons, for economic reasons, etc., it's an extreme measure which is consistent, I believe with the Constitution. (And with anarchocapitalist principles, if we had such a system: one's insurers would likely insist on quarantine as a condition for continued coverage, for example.) A larger principle is that those who are in risky locations and/or social situations pay for their increased risk. So a person in Kansas should not pay for my earthquake risks, nor I for his tornado risks. A person living in Oregon, where essentially few natural risks exist, would be rewarded for his choice and a person living in hurricane country would be punished for his choice. Likewise, with disease. --Tim May "The only purpose for which power can be rightfully exercised over any member of a civilized community, against his will, is to prevent harm to others. His own good, either physical or moral, is not a sufficient warrant." --John Stuart Mill From mv at cdc.gov Fri Apr 18 14:16:40 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 18 Apr 2003 14:16:40 -0700 Subject: Quarantines may be justified Message-ID: <3EA06B37.E91BE492@cdc.gov> At 01:04 PM 4/18/03 -0700, Tim May wrote: >On Friday, April 18, 2003, at 09:21 AM, Major Variola (ret) wrote: > >> http://www.nytimes.com/2003/04/18/science/sciencespecial/ >> 18INFE.html?ex=1051243200&en=c0c66bc035169a16&ei=5062&partner=GOOGLE >> >> They put a police guard on one patient at a hospital and have hired >> private security investigators to check on people in isolation. >I will make what some here will probably think is a totalitarian >sentiment: under extreme conditions, I support quarantine measures. Actually, I was hoping someone would pick up on the "hiring PIs" part. In the US, a PI hired by the State should be subject to the restraints on govt in the Constitution etc. However the US regime frequently hires private entities (e.g., databases, "civilian" CIA activities) to get around this. Maybe its just a staffing issue and the PIs *are* restricted by whatever passes for a constitution in Canada. I think almost everyone will agree with you IFF the quarantines are reasonable --disease is infectious to randoms, untreatable(?), lethal. And the quarantined are reimbursed (else its govt taking). I do have some problems with the police being able to take temperatures of people on the street (though not at the borders), should medicofascism erupt. You have lost an "anarcho" point :-) by supposing a central ruling medical authority. Each burbclave could have its own (contractually enforced) medical rules. The xian scientists who think disease is mental could demonstrate evolution for the rest of us. The ultraworried (think Howard Hughes) communities could ban entry and travel for even mild colds or not-easily-communicable diseases like HIV. You are actually taking the more reasonable (IMHO) minimal govt ("1925") perspective. Decaf today? :-) From mv at cdc.gov Fri Apr 18 14:22:58 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 18 Apr 2003 14:22:58 -0700 Subject: Military Drops OpenBSD Funding Because of de Raadt's Antiwar Comment Message-ID: <3EA06CB1.5ED60637@cdc.gov> SAN JOSE, Calif. (AP) - The U.S. military's research agency cut off grant money for helping to develop a secure, free operating system after a top programmer made anti-war statements to a major newspaper. The U.S. Defense Advanced Research Projects Agency halted the contract less than two weeks after The Globe and Mail of Toronto published a story in which programmer Theo de Raadt was quoted as saying he was "uncomfortable" about the funding source. "I try to convince myself that our grant means a half of a cruise missile doesn't get built," de Raadt told the newspaper. Within a few days, de Raadt said he received an e-mail from Jonathan Smith, a computer science professor at the University of Pennsylvania and the grant's lead researcher, expressing discomfort over the statements. On Thursday, Smith notified de Raadt of the cancellation. "A tenured professor was telling me not to exercise my freedom of speech," de Raadt said. Smith declined to comment on the matter, and DARPA did not return telephone messages Friday. De Raadt's suspicions about the cancellation could not be confirmed. The $2.3 million grant had funded security improvements to the OpenBSD operating system since 2001 as well as related projects. OpenBSD, a variation of Unix designed for use on servers, is touted as so secure that its default installation has had only one bug in the past seven years. Thousands of copies of OpenBSD have been downloaded in the past six months. It's not clear, however, how many are in use. De Raadt estimates about 85 percent of the DARPA grant has been spent, with about $1 million being used to pay for OpenBSD developers. Much of the work has been handled by a team of 80 unpaid volunteers. Another $500,000 of the money funded the work of United Kingdom-based researchers on a related project called OpenSSL, which is used to encrypt data. DARPA, which oversees research activities for the Pentagon, is best known for developing the network that evolved into the Internet. http://ap.tbo.com/ap/breaking/MGAD9B1KOED.html From frantz at pwpconsult.com Fri Apr 18 14:55:44 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Fri, 18 Apr 2003 14:55:44 -0700 Subject: Quarantines may be justified In-Reply-To: <3EA06B37.E91BE492@cdc.gov> Message-ID: At 2:16 PM -0700 4/18/03, Major Variola (ret) wrote: >I do have some problems with the police being able to take >temperatures of people on the street (though not at the borders), >should medicofascism erupt. FWIF, According to the morning paper, Singapore is using thermal imaging at the airport to identify people running a fever. Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From mv at cdc.gov Fri Apr 18 15:37:26 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 18 Apr 2003 15:37:26 -0700 Subject: Quarantines may be justified Message-ID: <3EA07E26.4B125C09@cdc.gov> At 02:55 PM 4/18/03 -0700, Bill Frantz wrote: >FWIF, According to the morning paper, Singapore is using thermal imaging at >the airport to identify people running a fever. Or growing cannabis under their armpits. From sfurlong at acmenet.net Fri Apr 18 13:38:05 2003 From: sfurlong at acmenet.net (Steve Furlong) Date: Fri, 18 Apr 2003 16:38:05 -0400 Subject: Antibiotics In-Reply-To: References: Message-ID: <200304181638.05117.sfurlong@acmenet.net> On Friday 18 April 2003 16:04, Tim May wrote: > I will make what some here will probably think is a totalitarian > sentiment: under extreme conditions, I support quarantine measures. ... > Though it is a serious step to limit a person's freedom to move about > on public property, this is one of the few cases, along with > imprisonment for criminal convictions, where it is justified. Another of the few powers I'd grant to the US Federal government which aren't spelled out in the Constitution is the ability to regulate the use of antibiotics. Careless use of them can lead to the development of drug-resistent bacteria, which adversely affects the whole population. I'd gladly trade increased governmental oversight of antibiotic usage for elimination of governmental meddling with drugs which don't affect anyone but the taker. -- Steve Furlong Computer Condottiere Have GNU, Will Travel Guns will get you through times of no duct tape better than duct tape will get you through times of no guns. -- Ron Kuby From timcmay at got.net Fri Apr 18 19:09:32 2003 From: timcmay at got.net (Tim May) Date: Fri, 18 Apr 2003 19:09:32 -0700 Subject: Military Drops OpenBSD Funding Because of de Raadt's Antiwar Comment In-Reply-To: <3EA06CB1.5ED60637@cdc.gov> Message-ID: On Friday, April 18, 2003, at 02:22 PM, Major Variola (ret) wrote: > SAN JOSE, Calif. (AP) - The U.S. military's research agency cut off > grant money for helping to develop a secure, free operating system > after > a top programmer made anti-war statements to a major newspaper. > > The U.S. Defense Advanced Research Projects Agency halted the contract > less than two weeks after The Globe and Mail of Toronto published a > story in which programmer Theo de Raadt was quoted as saying he was > "uncomfortable" about the funding source. > > "I try to convince myself that our grant means a half of a cruise > missile doesn't get built," de Raadt told the newspaper. > > Within a few days, de Raadt said he received an e-mail from Jonathan > Smith, a computer science professor at the University of Pennsylvania > and the grant's lead researcher, expressing discomfort over the > statements. > Not enough bugs in OpenBSD. Not enough back doors in OpenBSD. "If you are using OpenBSD, you are computing with Osama." --Tim May From timcmay at got.net Fri Apr 18 19:25:14 2003 From: timcmay at got.net (Tim May) Date: Fri, 18 Apr 2003 19:25:14 -0700 Subject: Antibiotics In-Reply-To: <200304181638.05117.sfurlong@acmenet.net> Message-ID: <2784639C-720E-11D7-B966-000A956B4C74@got.net> On Friday, April 18, 2003, at 01:38 PM, Steve Furlong wrote: > On Friday 18 April 2003 16:04, Tim May wrote: > >> I will make what some here will probably think is a totalitarian >> sentiment: under extreme conditions, I support quarantine measures. > ... >> Though it is a serious step to limit a person's freedom to move about >> on public property, this is one of the few cases, along with >> imprisonment for criminal convictions, where it is justified. > > Another of the few powers I'd grant to the US Federal government which > aren't spelled out in the Constitution is the ability to regulate the > use of antibiotics. Careless use of them can lead to the development of > drug-resistent bacteria, which adversely affects the whole population. > > I'd gladly trade increased governmental oversight of antibiotic usage > for elimination of governmental meddling with drugs which don't affect > anyone but the taker. I don't have a strong view on antibiotics, but to expand on my quarantine point, I think the Founders would consider it ludicrous that "civil rights" arguments might be used to allow someone with typhoid or smallpox or (perhaps) SARS to walk around in public spreading the diseases. This is why I support very limited government, so that true threats and true criminals can be stopped. Let anyone drink themselves to death, smoke themselves to death (or even let their own property be used for smoking), shoot up drugs, have damaging anal sex the way the fags do, and so on. But communicable diseases is/are one of the very few areas where "provide for the common defense" is eminently applicable. Again, provided there is no punishment aspect, no vengeance by the authorities aspect. I support this, even though I am presumably far from being in danger of being infected, for the "Rawlesian" reason that I would want these kinds of measures without knowing in advance my risk of getting the diseases. --Tim May (.sig for Everything list background) Corralitos, CA. Born in 1951. Retired from Intel in 1986. Current main interest: category and topos theory, math, quantum reality, cosmology. Background: physics, Intel, crypto, Cypherpunks From mv at cdc.gov Fri Apr 18 19:34:49 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 18 Apr 2003 19:34:49 -0700 Subject: custerflock optimism Message-ID: <3EA0B5C9.7060202@cdc.gov> When the Roman military fell, the church took power for a thousand years. Iraqi priests are telling the US to, paraphrasing Pink Floyd, "get our their filthy hands off their desert". 3 kilotons of conventional arms: $30,000,000 Grabbing your crotch before shaking hands with Geraldo: Free Getting rid of Hussein and getting a democratically elected Islamic Republic: Priceless For Zionist imperialism, there's a huge military budget. For everything else, there's Mastercard. --- brezhnev took afghanistan begin took beirut galtieri took the union jack and maggie over lunch one day took a cruiser with all hands apparently to make him give it back From mv at cdc.gov Fri Apr 18 19:53:01 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 18 Apr 2003 19:53:01 -0700 Subject: Antibiotics (Libertarian Epidemiology & The State) Message-ID: <3EA0BA0D.6000308@cdc.gov> >Let anyone drink themselves to death, smoke themselves to death (or >even let their own property be used for smoking), shoot up drugs, have >damaging anal sex the way the fags do, and so on. > >But communicable diseases is/are one of the very few areas where >"provide for the common defense" is eminently applicable. You mean "communicable to randoms" not "communicable to those who choose to expose themselves", as in the following example. Everyone out of the gene pool! Festival Is Called Syphilis Threat Officials fear outbreak from annual party in Palm Springs. Expected are 30,000 gay revelers. With 30,000 gay revelers expected for this weekend's "White Party" in Palm Springs  a festival famous for sex and substance abuse  public health officials and some gay leaders worry openly that it will fan an epidemic of syphilis. http://www.latimes.com/news/local/la-me-party18apr18,1,3177921.story?coll=la%2Dhome%2Dtodays%2Dtimes A case more interesting to libertarian epidemiologists involves fetuses and their state-owned incubators, er, female-type citizen-units: HIV Testing Urged in All Pregnancies Federal health officials will unveil a new HIV (news - web sites ) testing strategy today designed to expand screening among pregnant women and about 200,000 others who are infected with the virus but do not know it. The new strategy by the U.S. Centers for Disease Control and Prevention (news - web sites ) specifically urges the testing of all pregnant women, rather than relying upon them to volunteer. http://story.news.yahoo.com/news?tmpl=story&u=/trib/20030418/lo_latimes/hiv_testing_urged_in_all_pregnancies From shaddack at ns.arachne.cz Fri Apr 18 13:46:55 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Fri, 18 Apr 2003 22:46:55 +0200 (CEST) Subject: HoneyNet Looks to Stick Hackers In-Reply-To: Message-ID: On Thu, 17 Apr 2003, Tyler Durden wrote: > HoneyNet Looks to Stick Hackers > --------------------------------------------------------- According to The Register, honeynets could be legally problematic. http://www.theregister.co.uk/content/55/30320.html Wondering how many more unusable laws the Wise Elected Officials will make. Wondering why you have to pass exams for getting a driving licence, but there are no exams for the ability to make laws... From zenadsl6186 at zen.co.uk Fri Apr 18 22:50:02 2003 From: zenadsl6186 at zen.co.uk (Peter Fairbrother) Date: Sat, 19 Apr 2003 06:50:02 +0100 Subject: Military Drops OpenBSD Funding Because of de Raadt's Antiwar Comment In-Reply-To: <3EA06CB1.5ED60637@cdc.gov> Message-ID: Major Variola (ret) wrote: > SAN JOSE, Calif. (AP) - The U.S. military's research agency cut off > Another $500,000 of the money funded the work of United Kingdom-based > researchers on a related project called OpenSSL, which is used to > encrypt data. OpenSSH, sshurely. Is that UK-based? OpenSSL might well be, at least sort-of, but OpenSSH? I dunno, but I doubt it. There are potential problems ahead for OpenSSL in the UK. The EU dual-use/ (including crypto) export control regulations might be about to be implemented here, under the Export Control Act 2002,.. but it won't affect the actual releases, just talking about them beforehand... -- Peter Fairbrother From hseaver at cybershamanix.com Sat Apr 19 07:02:30 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Sat, 19 Apr 2003 09:02:30 -0500 Subject: Quarantines may be justified In-Reply-To: References: <3EA025F0.1020406@cdc.gov> Message-ID: <20030419140230.GA22860@cybershamanix.com> On Fri, Apr 18, 2003 at 01:04:01PM -0700, Tim May wrote: > > I will gladly make this trade of liberties: > > * roll back all of the bullshit laws designed to protect people from > themselves: laws against smoking, laws against other drugs, laws > banning sexual practices. And get rid of 90% of all government > functions and staff in general: roll things back to 1925 levels, in > terms of percentages. (I would favor reducing government further, but > 1925 levels would be a great start.) Agreed, except for smoking in public. All smoking in public should be banned. No one has the right to pollute the air I have to breath, in any way. I shouldn't have to breath in or even smell someones else's drug as I walk down the street. -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From mv at cdc.gov Sat Apr 19 09:44:27 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 19 Apr 2003 09:44:27 -0700 Subject: Quarantines may be justified (limits of biochem assault in public) Message-ID: <3EA17CEB.28493297@cdc.gov> At 09:02 AM 4/19/03 -0500, Harmon Seaver wrote: > Agreed, except for smoking in public. All smoking in public should be >banned. No one has the right to pollute the air I have to breath, in any way. I >shouldn't have to breath in or even smell someones else's drug as I walk down >the street. How about smell their perfume? You are not talking about pharmacological effects, but odor. Perfumes are voluntary. Some are even allergic to them. What are the limits? From stuart at realhappy.net Sat Apr 19 09:30:22 2003 From: stuart at realhappy.net (stuart) Date: Sat, 19 Apr 2003 12:30:22 -0400 Subject: Quarantines may be justified In-Reply-To: <20030419140230.GA22860@cybershamanix.com> References: <3EA025F0.1020406@cdc.gov> <20030419140230.GA22860@cybershamanix.com> Message-ID: <1675238252.20030419123022@realhappy.net> On Saturday, April 19, 2003, Harmon came up with this... HS> Agreed, except for smoking in public. All smoking in public should be HS> banned. No one has the right to pollute the air I have to breath, in any way. I HS> shouldn't have to breath in or even smell someones else's drug as I walk down HS> the street. You know, by exhaling, you're releasing dangerous carbon dioxide into air, which is air pollution, so I'm going to propose a bill to prevent you from breathing in public, because you don't have the right to pollute the air I breathe. Smoking in public, that's an easy one to pick on. But the argument holds no water, unfortunately. Find me RELIABLE, UNBIASED evidence that second-hand smoke is actually dangerous, and I'll agree to ban smoking. Everybody's 'second-hand smoke causes cancer' routine is based on a 1992 EPA report that manipulated data to fit their preconceived notion of what was 'bad'. They fit the facts to their hypothesis, not the other way around. They ignored legitimate studies that didn't support their hypothesis and had to actually lower their standards of risk assessment to 'prove' a connection between second-hand smoke and lung cancer. Find some real research by an INDEPENDENT party with real evidence that second-hand smoke causes cancer. Cardiovascular disease is the biggest killer in America. This fraudulent EPA report estimates 3000 people die from second-hand smoke related illness each year. Almost 3000 people die EACH DAY from cardiovascular disease. Let's go over that again: second-hand smoke: 3000 per year cardiovascular disease: almost 3000 PER DAY So why are people trying to ban smoking in public instead of banning McDonalds and Burger King? Getting rid of McDonalds would surely ease America's cardiovascular strain, it would lower health insurance costs, the rest of the world might not consider us the bloated, fat-gorged leech on the ass of humanity, and Brazil might have some more forests. America would be much healthier if instead of eating at McDonalds people went to Subway, even if Subway was filled with chain-smoking nicotine fiends. But I guess it's a lot easier to pick on smoking than fast food. Car exhaust is far worse than cigarette smoke. Ban cars first. Oh wait, that'd be a bit inconvenient, wouldn't it. Wait, I know! Airplanes! They release more toxic fumes than anything! But that'd be inconvenient too. Hmmmm..... VOLCANOES! Yeah, volcanoes release more toxins into the air than the entire industrial revolution did! How do you ban volcanoes, though.... I'm sorry you don't like cigarette smoke. Don't stand downwind. Don't try to ban it, though. Banning. Ick. I'm always very distrustful of people who want to ban things. There are always better ways. -- stuart Anyone who tells you they want a utopia wants to put chains on the souls of your children. They want to deny history and strangle any unforeseen possibility. They should be resisted to the last breath. -Bruce Sterling- From hseaver at cybershamanix.com Sat Apr 19 11:54:57 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Sat, 19 Apr 2003 13:54:57 -0500 Subject: Quarantines may be justified In-Reply-To: <1675238252.20030419123022@realhappy.net> References: <3EA025F0.1020406@cdc.gov> <20030419140230.GA22860@cybershamanix.com> <1675238252.20030419123022@realhappy.net> Message-ID: <20030419185457.GA22903@cybershamanix.com> On Sat, Apr 19, 2003 at 12:30:22PM -0400, stuart wrote: > On Saturday, April 19, 2003, Harmon came up with this... > > HS> Agreed, except for smoking in public. All smoking in public should be > HS> banned. No one has the right to pollute the air I have to breath, in any way. I > HS> shouldn't have to breath in or even smell someones else's drug as I walk down > HS> the street. > > You know, by exhaling, you're releasing dangerous carbon dioxide into > air, which is air pollution, so I'm going to propose a bill to prevent > you from breathing in public, because you don't have the right to > pollute the air I breathe. Duh! You don't know much about biology, eh? CO2 makes plants grow. Plants and animals interact that way -- they exhale oxygen for us and we exhale CO2 for them. > > Smoking in public, that's an easy one to pick on. But the argument > holds no water, unfortunately. Find me RELIABLE, UNBIASED evidence that > second-hand smoke is actually dangerous, and I'll agree to ban smoking. > I could care less what any report says, I get an immediate sick feeling from breathing tobacco smoke. And a great many other people do as well. (snip) > Car exhaust is far worse than cigarette smoke. Ban cars first. > Oh wait, that'd be a bit inconvenient, wouldn't it. No, actually, banning cars in cities is a great idea. And, as a matter of fact, since I ride a bicycle a lot, I often *do* get a sick feeling from breathing car exhaust, at least from some that are apparantly burning "reformutlated gasoline". > Wait, I know! Airplanes! They release more toxic fumes than anything! > But that'd be inconvenient too. Hmmmm..... Not for me it wouldn't. I'm overjoyed at the prospect of all the airlines going tits up. At least if the USG would let them instead of pumping more subsidies into them. I took my last commercial flight about four years ago -- never again. > VOLCANOES! Yeah, volcanoes release more toxins into the air than the > entire industrial revolution did! How do you ban volcanoes, though.... > Toxins? Particulates, yes, but not many toxins. And you're right, Mother Nature will always win in the end. > I'm sorry you don't like cigarette smoke. Don't stand downwind. > Don't try to ban it, though. "don't stand downwind" -- that's a pretty simplistic answer. Impossible to do when you're moving down the street. The bottom line is this: No one has the right to do something in their space that adversely affects my space, whether it's smoking in public or the farmer next door who sprays pesticides which drift over to my land, or puts chemicals on his land which get into my well. > > Banning. Ick. > I'm always very distrustful of people who want to ban things. > There are always better ways. Sure, I guess I could just walk around with a pellet gun and zap anyone whose smoke bothered me, right? Why not? After all, I'm not really seriously harming them, just more like a temporary annoyance. -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From hseaver at cybershamanix.com Sat Apr 19 12:03:58 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Sat, 19 Apr 2003 14:03:58 -0500 Subject: Quarantines may be justified (limits of biochem assault in public) In-Reply-To: <3EA17CEB.28493297@cdc.gov> References: <3EA17CEB.28493297@cdc.gov> Message-ID: <20030419190358.GB22903@cybershamanix.com> On Sat, Apr 19, 2003 at 09:44:27AM -0700, Major Variola (ret) wrote: > At 09:02 AM 4/19/03 -0500, Harmon Seaver wrote: > > Agreed, except for smoking in public. All smoking in public should > be > >banned. No one has the right to pollute the air I have to breath, in > any way. I > >shouldn't have to breath in or even smell someones else's drug as I > walk down > >the street. > > How about smell their perfume? You are not talking about > pharmacological effects, but odor. Perfumes are voluntary. > Some are even allergic to them. What are the limits? No, I am talking about physical effects. I get a definite sick feeling breathing tobacco smoke. And I know large numbers of other people who do as well. Most ex-smokers are very familiar with this. But perfume is another one, not one that bothers me very often but I've known people who got physically sick from the smell of certain perfumes. That's a lot more rare than people who are affected by tobacco smoke tho. The feeling is a lot like the one you got when you smoked your first cigarette as a kid. Both my wife and I get a really unpleasant feeling just walking down the aisle at Home Depot with all the lawn chemicals, in fact my wife, on occasion has had to leave stores that had too many chemical smells. -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From sfurlong at acmenet.net Sat Apr 19 11:57:54 2003 From: sfurlong at acmenet.net (Steve Furlong) Date: Sat, 19 Apr 2003 14:57:54 -0400 Subject: Quarantines may be justified In-Reply-To: <20030419140230.GA22860@cybershamanix.com> References: <3EA025F0.1020406@cdc.gov> <20030419140230.GA22860@cybershamanix.com> Message-ID: <200304191457.54743.sfurlong@acmenet.net> On Saturday 19 April 2003 10:02, Harmon Seaver wrote: > ... All smoking in public should > be banned. No one has the right to pollute the air I have to breath, > in any way. Yah. Maj Variola already beat me to the point about perfume. And what about people who don't bathe as often as I think they should? > I shouldn't have to breath in... Feel free to stop any time. No skin off our noses. -- Steve Furlong Computer Condottiere Have GNU, Will Travel Guns will get you through times of no duct tape better than duct tape will get you through times of no guns. -- Ron Kuby From hseaver at cybershamanix.com Sat Apr 19 13:46:33 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Sat, 19 Apr 2003 15:46:33 -0500 Subject: Quarantines may be justified In-Reply-To: <20030419195512.1F9FC2423@localhost.localdomain> References: <3EA025F0.1020406@cdc.gov> <20030419140230.GA22860@cybershamanix.com> <20030419195512.1F9FC2423@localhost.localdomain> Message-ID: <20030419204633.GA23512@cybershamanix.com> On Sat, Apr 19, 2003 at 03:55:06PM -0400, david wrote: > On Saturday 19 April 2003 10:02, Harmon Seaver wrote: > > > > Agreed, except for smoking in public. All smoking in public > > should be banned. No one has the right to pollute the air I have > > to breath, in any way. I shouldn't have to breath in or even > > smell someones else's drug as I walk down the street. > > Public property was paid for by looting private individuals' > pockets or appropriating it directly. The concept of regulating > public activities is pure socialist bullshit. Ordinances > prohibiting or regulating any activity on private property is part > of our creeping nanny state totalitarianism. You fucking dimwit -- public property was all there ever was. Private property is purely a construct of Euro culture, at least in this hemisphere. Who owned the whole fucking continent when the eurotrash expatriates hit the east coast? You really think you *own* a piece of Mother Earth? Guess again when that volcano erupts underneath it. > > Any individual who enforces, or any politician who votes for a law > that uses force to regulate behavior is guilty of initiating force > against anyone affected by the law, and is a deserving target of > retaliation. Any individual who votes for one of these political > scumbags or urges them to enact such a law is also a deserving > target of retaliation. > Some people, like this dumbfuck, don't deserve to be sucking air. "using force to regulate behavior" is wrong? Like if some shithead tries to rob me I can't "regulate" their behavior? Or my village can't hire a professional "regulator" to deal with robbers? Or for that matter, to "regulate" people who smoke in public? -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From david at morningwood.net Sat Apr 19 12:55:06 2003 From: david at morningwood.net (david) Date: Sat, 19 Apr 2003 15:55:06 -0400 Subject: Quarantines may be justified In-Reply-To: <20030419140230.GA22860@cybershamanix.com> References: <3EA025F0.1020406@cdc.gov> <20030419140230.GA22860@cybershamanix.com> Message-ID: <20030419195512.1F9FC2423@localhost.localdomain> On Saturday 19 April 2003 10:02, Harmon Seaver wrote: > > Agreed, except for smoking in public. All smoking in public > should be banned. No one has the right to pollute the air I have > to breath, in any way. I shouldn't have to breath in or even > smell someones else's drug as I walk down the street. Public property was paid for by looting private individuals' pockets or appropriating it directly. The concept of regulating public activities is pure socialist bullshit. Ordinances prohibiting or regulating any activity on private property is part of our creeping nanny state totalitarianism. Any individual who enforces, or any politician who votes for a law that uses force to regulate behavior is guilty of initiating force against anyone affected by the law, and is a deserving target of retaliation. Any individual who votes for one of these political scumbags or urges them to enact such a law is also a deserving target of retaliation. David Neilson From david at morningwood.net Sat Apr 19 14:22:42 2003 From: david at morningwood.net (david) Date: Sat, 19 Apr 2003 17:22:42 -0400 Subject: Quarantines may be justified In-Reply-To: <20030419204633.GA23512@cybershamanix.com> References: <3EA025F0.1020406@cdc.gov> <20030419195512.1F9FC2423@localhost.localdomain> <20030419204633.GA23512@cybershamanix.com> Message-ID: <20030419212246.DC9D6212E@localhost.localdomain> On Saturday 19 April 2003 16:46, Harmon Seaver wrote: >(snip) > Private property is purely a construct of Euro culture, at least > in this hemisphere. Who owned the whole fucking continent when > the eurotrash expatriates hit the east coast? You really think > you *own* a piece of Mother Earth? Guess again when that volcano > erupts underneath it. The concept of, and respect for private property are essential elements of individual liberty. They cannot be separated. There is an inverse proportion between the power the governments have over private property and freedom. > > Any individual who enforces, or any politician who votes for a > > law that uses force to regulate behavior is guilty of > > initiating force against anyone affected by the law (snip) > > (snip) "using force to regulate behavior" is wrong? Like if some > shithead tries to rob me I can't "regulate" their behavior? Or my > village can't hire a professional "regulator" to deal with > robbers? Or for that matter, to "regulate" people who smoke in > public? It is the initiation of force that is wrong. People who try to rob others should have their behavior regulated by being killed by their intended victims. Hiring professionals to deal with robbers is a valid response to the robbers' initiation of force. Killing people who use force to regulate individuals who smoke in public is also a legitimate response to the their initiation of force. David Neilson From david at morningwood.net Sat Apr 19 21:18:26 2003 From: david at morningwood.net (david) Date: Sun, 20 Apr 2003 00:18:26 -0400 Subject: Quarantines may be justified In-Reply-To: <20030419140230.GA22860@cybershamanix.com> References: <3EA025F0.1020406@cdc.gov> <20030419140230.GA22860@cybershamanix.com> Message-ID: <20030420041830.4FDF4212E@localhost.localdomain> On Saturday 19 April 2003 16:46, Harmon Seaver wrote: >(snip) > Private property is purely a construct of Euro culture, at least > in this hemisphere. Who owned the whole fucking continent when > the eurotrash expatriates hit the east coast? You really think > you *own* a piece of Mother Earth? Guess again when that volcano > erupts underneath it. The concept of, and respect for private property are essential elements of individual liberty. They cannot be separated. There is an inverse proportion between the power the governments have over private property and freedom. > > Any individual who enforces, or any politician who votes for a > > law that uses force to regulate behavior is guilty of > > initiating force against anyone affected by the law (snip) > > (snip) "using force to regulate behavior" is wrong? Like if some > shithead tries to rob me I can't "regulate" their behavior? Or my > village can't hire a professional "regulator" to deal with > robbers? Or for that matter, to "regulate" people who smoke in > public? It is the initiation of force that is wrong. People who try to rob others should have their behavior regulated by being killed by their intended victims. Hiring professionals to deal with robbers is a valid response to the robbers' initiation of force. Killing people who use force to regulate individuals who smoke in public is also a legitimate response to the their initiation of force. David Neilson From rah at shipwright.com Sat Apr 19 22:00:02 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Sun, 20 Apr 2003 01:00:02 -0400 Subject: Labour to launch ID card - and it'll cost you £25 Message-ID: The Telegraph Labour to launch ID card - and it'll cost you £25 By Colin Brown and Francis Elliott (Filed: 20/04/2003) Everyone in Britain will have to pay around £25 for a compulsory identity card under proposals being put to the cabinet by David Blunkett, the Home Secretary. The "smart" card will identify the holder using iris-recognition technology. Failure to carry the card will not be an offence but police will be able to order people to present it at a police station. The charge is aimed at overcoming resistance to the scheme from the Treasury. Until now Cabinet support for a national compulsory identity card has been outweighed by the Treasury, which has objected to footing the estimated £1.6 billion bill. While forcing people to pay for the card could add to the anticipated objections from human rights campaigners, Mr Blunkett believes that concern about national security is sufficient to ensure that individuals will be prepared to bear the cost. Mr Blunkett is confident that he can win support for the idea of a compulsory card even though previous ministers have failed. One Home Office official said that the threat of international terrorism following the September 11 attacks had tilted public opinion in favour of such a scheme. "The atmosphere has changed," he said. Another official discounted any suggestion that the public would baulk at the cost. "We think that a charge of £25 to £30 would be reasonable for five years and once it is up and running and the initial cost is out of the way, you could then extend the life of the card for 10 years," he said. Senior figures in the Cabinet strongly support the plan for the card, which would use a microchip to hold details including age, place of birth, home address and a personal number to identify the holder. It is also hoped that the card could be used to entitle the holder to a range of state benefits, thereby cutting benefit fraud. Mr Blunkett discussed his plan for a national ID card with Tom Ridge, the head of the US Department of Homeland Security, at a meeting in Washington earlier this month. Mr Blunkett agreed to develop a joint programme, using the same technology, with the US, which has already agreed a similar protocol with Canada. Iris recognition - so-called biometric information - is considered a more accurate and fraud-proof system than fingerprint or photo identification. The Home Office has already piloted the use of the technology. The UK Passport Office last year issued 500 passport cards with iris data. In another move to tighten security, ministers are to ban the practice of sending out passports by ordinary mail after a Home Office audit found that some 3,000 are still being "lost in the post" each year. Two years after The Telegraph first highlighted the problem of thousands of missing passports, the Home Office has admitted that 2,982 were lost in the post during 2002. The vast majority are stolen by criminal gangs and sold on to illegal immigrants or possibly terrorists. Beverley Hughes, the immigration minister, has ordered that people applying for a passport must in future pay for them to be sent by recorded delivery, ensuring that someone has to sign for them on receipt. The increased cost of this - up to £5 for each passport - would be borne by the applicant for the passport in increased fees. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From measl at mfn.org Sun Apr 20 06:50:09 2003 From: measl at mfn.org (J.A. Terranson) Date: Sun, 20 Apr 2003 08:50:09 -0500 (CDT) Subject: =?X-UNKNOWN?Q?CDR=3A_Labour_to_launch_ID_card_-_and_it'll?= =?X-UNKNOWN?Q?_cost_you_=A325_=28fwd=29?= Message-ID: According to the article, "Mr Blunkett discussed his plan for a national ID card with Tom Ridge, the head of the US Department of Homeland Security, at a meeting in Washington earlier this month. Mr Blunkett agreed to develop a joint programme, using the same technology, with the US, which has already agreed a similar protocol with Canada." So, apparently Ridge has already decided that (a) Amerikkkans *will* carry ID cards, (b) these cards will be interoperable with cards from other countries, (c) that these other countries should be able to access information on US citizens at will, provided we can do the same to their citizens. Cute. Totally fascist, but cute. I wonder how long they are going to work on this before announcing the good news formally? -- J.A. Terranson sysadmin at mfn.org From hseaver at cybershamanix.com Sun Apr 20 07:03:15 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Sun, 20 Apr 2003 09:03:15 -0500 Subject: Quarantines may be justified In-Reply-To: <20030419212246.DC9D6212E@localhost.localdomain> References: <3EA025F0.1020406@cdc.gov> <20030419195512.1F9FC2423@localhost.localdomain> <20030419204633.GA23512@cybershamanix.com> <20030419212246.DC9D6212E@localhost.localdomain> Message-ID: <20030420140315.GA24668@cybershamanix.com> On Sat, Apr 19, 2003 at 05:22:42PM -0400, david wrote: > On Saturday 19 April 2003 16:46, Harmon Seaver wrote: > > >(snip) > > Private property is purely a construct of Euro culture, at least > > in this hemisphere. Who owned the whole fucking continent when > > the eurotrash expatriates hit the east coast? You really think > > you *own* a piece of Mother Earth? Guess again when that volcano > > erupts underneath it. > > The concept of, and respect for private property are essential > elements of individual liberty. They cannot be separated. There > is an inverse proportion between the power the governments have > over private property and freedom. So the native americans here before 1492 weren't free? They did, of course, have private property -- whatever they could carry with them -- but the land was held in common. The idea that individuals could "own" land was not known to them. > > > > Any individual who enforces, or any politician who votes for a > > > law that uses force to regulate behavior is guilty of > > > initiating force against anyone affected by the law (snip) > > > > (snip) "using force to regulate behavior" is wrong? Like if some > > shithead tries to rob me I can't "regulate" their behavior? Or my > > village can't hire a professional "regulator" to deal with > > robbers? Or for that matter, to "regulate" people who smoke in > > public? > > It is the initiation of force that is wrong. People who try to rob > others should have their behavior regulated by being killed by > their intended victims. You're right, and it's really too bad the indigs here didn't realize soon enough that they needed to kill each and everyone of those euros who landed here and thought they could "own" land. > Hiring professionals to deal with robbers > is a valid response to the robbers' initiation of force. Killing > people who use force to regulate individuals who smoke in public is > also a legitimate response to the their initiation of force. > People can smoke in public if they wear some sort of helmet which contains all the smoke, otherwise they are using force to invade my body and I should have the right to kill them for it. -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From mv at cdc.gov Sun Apr 20 09:32:16 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sun, 20 Apr 2003 09:32:16 -0700 Subject: Quarantines may be justified Message-ID: <3EA2CB8F.8A7A1FDD@cdc.gov> At 09:03 AM 4/20/03 -0500, Harmon Seaver wrote: > So the native americans here before 1492 weren't free? They did, of >course, have private property -- whatever they could carry with them -- but the >land was held in common. The idea that individuals could "own" land was not >known to them. This is a white fallacy. If you caught someone hunting on your familial land, you might initiate violence against them. Within the family, resources were shared, but in dealing with other clans, violence certainly occurred. You think some of them lived in fortresses for yucks? Talk to an anthropologist some time. Territoriality is as old as amphibians. From hseaver at cybershamanix.com Sun Apr 20 08:48:54 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Sun, 20 Apr 2003 10:48:54 -0500 Subject: Quarantines may be justified In-Reply-To: References: <20030419185457.GA22903@cybershamanix.com> Message-ID: <20030420154854.GA1151@cybershamanix.com> On Sun, Apr 20, 2003 at 05:25:55PM +0200, Tarapia Tapioco wrote: > Harmon Seaver wrote on April 19th, 2003 at 13:54:57 -0500: > > > On Sat, Apr 19, 2003 at 12:30:22PM -0400, stuart wrote: > > > > > Smoking in public, that's an easy one to pick on. But the argument > > > holds no water, unfortunately. Find me RELIABLE, UNBIASED evidence that > > > second-hand smoke is actually dangerous, and I'll agree to ban smoking. > > > > > > > I could care less what any report says, I get an immediate sick feeling > > from breathing tobacco smoke. And a great many other people do as well. > > Then don't go where there's tobacco smoke. Right. Where is that? It's absolutely impossible to walk or ride a bike down a city street without breathing tobacco smoke. I'm always amazed at how many so-called libertarians don't get the concept that their rights end where my nose begins. Everyone should have the right to enjoy whatever drug they choose -- as long as their use of it doesn't interfere with other people's rights to not use it. So you really think some drug addict has a right to stand on the street getting his fix and at the same time forcing it upon everyone else in the immediate vicinity? I'm amazed that anyone too stupid to understand such a simple concept is even able to type on a keyboard. By the same logic, it should be alright for me to mix up some LSD and DMSO and carry it in a little squirtgun to spray smokers with, right? -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From ben at algroup.co.uk Sun Apr 20 03:41:05 2003 From: ben at algroup.co.uk (Ben Laurie) Date: Sun, 20 Apr 2003 11:41:05 +0100 Subject: Military Drops OpenBSD Funding Because of de Raadt's Antiwar Comment In-Reply-To: References: Message-ID: <3EA27941.5050400@algroup.co.uk> Peter Fairbrother wrote: > Major Variola (ret) wrote: > > >>SAN JOSE, Calif. (AP) - The U.S. military's research agency cut off > > >>Another $500,000 of the money funded the work of United Kingdom-based >>researchers on a related project called OpenSSL, which is used to >>encrypt data. > > > OpenSSH, sshurely. > > Is that UK-based? OpenSSL might well be, at least sort-of, but OpenSSH? I > dunno, but I doubt it. No, OpenSSL - I know, coz I did most of the work. OpenSSH is not a "related project" it is part of OpenBSD. > There are potential problems ahead for OpenSSL in the UK. The EU dual-use/ > (including crypto) export control regulations might be about to be > implemented here, under the Export Control Act 2002,.. but it won't affect > the actual releases, just talking about them beforehand... Amusing. Not. Incidentally, OpenSSL is (currently) hosted in Switzerland, if that matters. Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff From hseaver at cybershamanix.com Sun Apr 20 10:05:43 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Sun, 20 Apr 2003 12:05:43 -0500 Subject: Quarantines may be justified In-Reply-To: <3EA2CB8F.8A7A1FDD@cdc.gov> References: <3EA2CB8F.8A7A1FDD@cdc.gov> Message-ID: <20030420170543.GA1478@cybershamanix.com> On Sun, Apr 20, 2003 at 09:32:16AM -0700, Major Variola (ret) wrote: > At 09:03 AM 4/20/03 -0500, Harmon Seaver wrote: > > So the native americans here before 1492 weren't free? They did, > of > >course, have private property -- whatever they could carry with them -- > but the > >land was held in common. The idea that individuals could "own" land was > not > >known to them. > > This is a white fallacy. If you caught someone hunting on your familial > land, > you might initiate violence against them. Within the family, resources > were > shared, but in dealing with other clans, violence certainly occurred. > Well, not between clans, certainly tho between various tribes. Territoriality is quite a bit different than dividing it up into individual parcels, however. Nor was it like communism where the government imposes group ownership from above, since they really had essentially no government. It was really a totally different mindset, and one that the euros couldn't even grasp. Nor could the native americans understand the euros -- why would the euros leave the land where their ancestors were buried? Why would they think that any of the local "chiefs" had any authority to speak for anyone except themselves, as in most tribes they only had their own personal charisma to exert any influence on thier "followers". No kings or rulers at all in the european sense, just councils of old men, or more often, old women, who got together and reasoned things out and gave advice. > You think some of them lived in fortresses for yucks? > > Talk to an anthropologist some time. > > Territoriality is as old as amphibians. -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From jamesd at echeque.com Sun Apr 20 14:47:45 2003 From: jamesd at echeque.com (James A. Donald) Date: Sun, 20 Apr 2003 14:47:45 -0700 Subject: Quarantines may be justified In-Reply-To: <20030420140315.GA24668@cybershamanix.com> References: <20030419212246.DC9D6212E@localhost.localdomain> Message-ID: <3EA2B311.9427.5995ACD@localhost> -- On 20 Apr 2003 at 9:03, Harmon Seaver wrote: > So the native americans here before 1492 weren't free? > They did, > of > course, have private property -- whatever they could carry > with them -- but the land was held in common. I think you have been reading the fake Chief Seattle speech. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG GJt1bMX4Gutb48wlf55JpviT+q0p1UgTHg6kEmgW 4Go9kT1tgIxGBF48ijkgTJ9lRPs1tcMaNSHN/Ufo6 From timcmay at got.net Sun Apr 20 15:26:56 2003 From: timcmay at got.net (Tim May) Date: Sun, 20 Apr 2003 15:26:56 -0700 Subject: Quarantines may be justified In-Reply-To: <3EA2B311.9427.5995ACD@localhost> Message-ID: <31C57DDD-737F-11D7-B966-000A956B4C74@got.net> On Sunday, April 20, 2003, at 02:47 PM, James A. Donald wrote: > -- > On 20 Apr 2003 at 9:03, Harmon Seaver wrote: >> So the native americans here before 1492 weren't free? >> They did, >> of >> course, have private property -- whatever they could carry >> with them -- but the land was held in common. > > I think you have been reading the fake Chief Seattle speech. > Which one? The one where he wrote the Federalist Papers or the one where he did the Constitution? One of the strongest arguments that Columbus was not the first European in America is the Magna Carta. It's a crass copy of the Qctzlzacopec Codex, written by the wise Aztecs hundreds of years prior to 1215. (Or so I am starting a rumor about.) --Tim May (.sig for Everything list background) Corralitos, CA. Born in 1951. Retired from Intel in 1986. Current main interest: category and topos theory, math, quantum reality, cosmology. Background: physics, Intel, crypto, Cypherpunks From comesefosse at ntani.firenze.linux.it Sun Apr 20 08:25:55 2003 From: comesefosse at ntani.firenze.linux.it (Tarapia Tapioco) Date: Sun, 20 Apr 2003 17:25:55 +0200 (CEST) Subject: Quarantines may be justified In-Reply-To: <20030419185457.GA22903@cybershamanix.com> Message-ID: Harmon Seaver wrote on April 19th, 2003 at 13:54:57 -0500: > On Sat, Apr 19, 2003 at 12:30:22PM -0400, stuart wrote: > > > Smoking in public, that's an easy one to pick on. But the argument > > holds no water, unfortunately. Find me RELIABLE, UNBIASED evidence that > > second-hand smoke is actually dangerous, and I'll agree to ban smoking. > > > > I could care less what any report says, I get an immediate sick feeling > from breathing tobacco smoke. And a great many other people do as well. Then don't go where there's tobacco smoke. > (snip) > > > Car exhaust is far worse than cigarette smoke. Ban cars first. > > Oh wait, that'd be a bit inconvenient, wouldn't it. > > No, actually, banning cars in cities is a great idea. And, as a matter of > fact, since I ride a bicycle a lot, I often *do* get a sick feeling from > breathing car exhaust, at least from some that are apparantly burning > "reformutlated gasoline". Well, most of us normal people _don't_ get sick from minor whiffs of car exhaust. Since you apparently do, I suggest you avoid it. > > I'm sorry you don't like cigarette smoke. Don't stand downwind. > > Don't try to ban it, though. > > "don't stand downwind" -- that's a pretty simplistic answer. Impossible > to do when you're moving down the street. The bottom line is this: No one > has the right to do something in their space that adversely affects my space, > whether it's smoking in public or the farmer next door who sprays pesticides > which drift over to my land, or puts chemicals on his land which get into my > well. Fine. Of course, this means that if I ever smell your farts, or your various odors, or start smelling rotten fish from your wife or daughter, I'll fine you $500 per offense. -- Tom Veil From sfurlong at acmenet.net Sun Apr 20 16:24:55 2003 From: sfurlong at acmenet.net (Steve Furlong) Date: Sun, 20 Apr 2003 19:24:55 -0400 Subject: Rumors In-Reply-To: <31C57DDD-737F-11D7-B966-000A956B4C74@got.net> References: <31C57DDD-737F-11D7-B966-000A956B4C74@got.net> Message-ID: <200304201924.55256.sfurlong@acmenet.net> On Sunday 20 April 2003 18:26, Tim May wrote: > (Or so I am starting a rumor about.) That's nothing. Did you know Hillary Clinton appeared in just a bikini bottom in a 1960's issue of _Playboy_? It was one of the college issues, don't recall which one. I know it's true because I read it on the internet. -- Steve Furlong Computer Condottiere Have GNU, Will Travel Guns will get you through times of no duct tape better than duct tape will get you through times of no guns. -- Ron Kuby From cpunk at lne.com Sun Apr 20 20:00:00 2003 From: cpunk at lne.com (cpunk at lne.com) Date: Sun, 20 Apr 2003 20:00:00 -0700 Subject: Cypherpunks List Info Message-ID: <200304210300.h3L300B4029186@gw.lne.com> Cypherpunks Mailing List Information Last updated: Sep 12, 2002 This message is also available at http://www.lne.com/cpunk Instructions on unsubscribing from the list can be found below. 0. Introduction The Cypherpunks mailing list is a mailing list for discussing cryptography and its effect on society. It is not a moderated list (but see exceptions below) and the list operators are not responsible for the list content. Cypherpunks is a distributed mailing list. A subscriber can subscribe to one node of the list and thereby participate on the full list. Each node (called a "Cypherpunks Distributed Remailer", although they are not related to anonymous remailers) exchanges messages with the other nodes in addition to sending messages to its subscribers. A message posted to one node will be received by the list subscribers on the other nodes, and vice-versa. 1. Filtering The various CDRs follow different policies on filtering spam and to a lesser extent on modifying messages that go to/from their subscribers. Filtering is done, on nodes that do it, to reduce the huge amount of spam that the cypherpunks list is subjected to. There are three basic flavors of filtering CDRs: "raw", which send all messages to their subscribers. "cooked" CDRs try to eliminate the spam on that's on the regular list by automatically sending only messages that are from cypherpunks list subscribers (on any CDR) or people who are replying to list messages. Finally there are moderated lists, where a human moderator decides which messages from the raw list to pass on to subscribers. 2. Message Modification Message modification policy indicates what modifications, if any, beyond what is needed to operate the CDR are done (most CDRs add a tracking X-loop header on mail posted to their subscribers to prevent mail loops). Message modification usually happens on mail going in or out to each CDR's subscribers. CDRs should not modify mail that they pass from one CDR to the next, but some of them do, and others undo those modifications. 3. Privacy Privacy policy indicates if the list will allow anyone ("open"), or only list members, or no one ("private") , to retrieve the subscribers list. Note that if you post, being on a "private" list doesn't mean much, since your address is now out there. It's really only useful for keeping spammers from harvesting addresses from the list software. Digest mode indicates that the CDR supports digest mode, which is where the posts are batched up into a few large emails. Nodes that support only digest mode are noted. 4. Anonymous posting Cypherpunks encourages anonymous posting. You can use an anonymous remailer: http://www.andrebacard.com/remail.html http://anon.efga.org/Remailers http://www.gilc.org/speech/anonymous/remailer.html or you can send posts to the list via cpunks_anon at einstein.ssz.com and your mail's headers will be stripped before posting. Note that this doesn't provide complete anonymity since the receiving site will still have log file entries showing the source of the mail (or you have to trust that they delete them). You also will be 'sharing' a reputation with the other entities that post through this alias, and some of them are spammers, so some subscribers will have this alias filtered. 5. Unsubscribing Unsubscribing from the cypherpunks list: Since the list is run from a number of different CDRs, you have to figure out which CDR you are subscribed to. If you don't remember and can't figure it out from the mail headers (hint: the top Received: line should tell you), the easiest way to unsubscribe is to send unsubscribe messages to all the CDRs listed below. How to figure out which CDR you are subscribed to: Get your mail client to show all the headers (Microsoft calls this "internet headers"). Look for the Sender or X-loop headers. The Sender will say something like "Sender: owner-cypherpunks at lne.com". The X-loop line will say something like "X-Loop: cypherpunks at lne.com". Both of these inticate that you are subscribed to the lne.com CDR. If you were subscribed to the algebra CDR, they would have algebra.com in them. Once you have figured out which CDR you're subscribed to, look in the table below to find that CDRs unsubscribe instructions. 6. Lunatics, spammers and nut-cases "I'm subscribed to a filtering CDR yet I still see lots of junk postings". At this writing there are a few sociopaths on the cypherpunks list who are abusing the lists openness by dumping reams of propaganda on the list. The distinction between a spammer and a subscriber is nearly always very clear, but the dictinction between a subscriber who is abusing the list by posting reams of propaganda and a subscriber who is making lots of controversial posts is not clear. Therefore, we tolerate the crap. Subscribers with a low crap tolerance should check out mail filters. Procmail is a good one, although it works on Unix and Unix-like systems only. Eudora also has a capacity for filtering mail, as do many other mail readers. An example procmail recipie is below, you will of course want to make your own decisions on which (ab)users to filter. # mailing lists: # filter all cypherpunks mail into its own cypherspool folder, discarding # mail from loons. All CDRs set their From: line to 'owner-cypherpunks'. # /dev/null is unix for the trash can. :0 * ^From.*owner-cypherpunks at .* { :0: * (^From:.*ravage at ssz\.com.*|\ ^From:.*jchoate at dev.tivoli.com.*|\ ^From:.*mattd at useoz.com|\ ^From:.*proffr11 at bigpond.com|\ ^From:.*jei at cc.hut.fi) /dev/null :0: cypherspool } 7. List of current CDRs All commands are sent in the body of mail unless otherwise noted. --------------------------------------------------------------------------- Algebra: Operator: Subscription: "subscribe cypherpunks" to majordomo at algebra.com Unsubscription: "unsubscribe cypherpunks" to majordomo at algebra.com Help: "help cypherpunks" to majordomo at algebra.com Posting address: cypherpunks at algebra.com Filtering policy: raw Message Modification policy: no modification Privacy policy: ??? Info: ??? --------------------------------------------------------------------------- CCC: Operator: drt at un.bewaff.net Subscription: "subscribe [password of your choice]" to cypherpunks-request at koeln.ccc.de Unsubscription: "unsubscribe " to cypherpunks-request at koeln.ccc.de Help: "help" to to cypherpunks-request at koeln.ccc.de Web site: http://koeln.ccc.de/mailman/listinfo/cypherpunks Posting address: cypherpunks at koeln.ccc.de Filtering policy: This specific node drops messages bigger than 32k and every message with more than 17 recipients or just a line containing "subscribe" or "unsubscribe" in the subject. Digest mode: this node is digest-only NNTP: news://koeln.ccc.de/cbone.ml.cypherpunks Message Modification policy: no modification Privacy policy: ??? --------------------------------------------------------------------------- Infonex: Subscription: "subscribe cypherpunks" to majordomo at infonex.com Unsubscription: "unsubscribe cypherpunks" to majordomo at infonex.com Help: "help cypherpunks" to majordomo at infonex.com Posting address: cypherpunks at infonex.com Filtering policy: raw Message Modification policy: no modification Privacy policy: ??? --------------------------------------------------------------------------- Lne: Subscription: "subscribe cypherpunks" to majordomo at lne.com Unsubscription: "unsubscribe cypherpunks" to majordomo at lne.com Help: "help cypherpunks" to majordomo at lne.com Posting address: cypherpunks at lne.com Filtering policy: cooked Posts from all CDR subscribers & replies to threads go to lne CDR subscribers. All posts from other CDRs are forwarded to other CDRs unmodified. Message Modification policy: 1. messages are demimed (MIME attachments removed) when posted through lne or received by lne CDR subscribers 2. leading "CDR:" in subject line removed 3. "Reply-to:" removed Privacy policy: private Info: http://www.lne.com/cpunk; "info cypherpunks" to majordomo at lne.com Archive: http://archives.abditum.com/cypherpunks/index.html (thanks to Steve Furlong and Len Sassaman) --------------------------------------------------------------------------- Minder: Subscription: "subscribe cypherpunks" to majordomo at minder.net Unsubscription: "unsubscribe cypherpunks" to majordomo at minder.net Help: "help" to majordomo at minder.net Posting address: cypherpunks at minder.net Filtering policy: raw Message Modification policy: no modification Privacy policy: private Info: send mail to cypherpunks-info at minder.net --------------------------------------------------------------------------- Openpgp: [openpgp seems to have dropped off the end of the world-- it doesn't return anything from sending help queries. Ericm, 8/7/01] Subscription: "subscribe cypherpunks" to listproc at openpgp.net Unsubscription: "unsubscribe cypherpunks" to listproc at openpgp.net Help: "help" to listproc at openpgp.net Posting address: cypherpunks at openpgp.net Filtering policy: raw Message Modification policy: no modification Privacy policy: ??? --------------------------------------------------------------------------- Ssz: Subscription: "subscribe cypherpunks" to majordomo at ssz.com Unsubscription: "unsubscribe cypherpunks" to majordomo at ssz.com Help: "help cypherpunks" to majordomo at ssz.com Posting address: cypherpunks at ssz.com Filtering policy: raw Message Modification policy: Subject line prepended with "CDR:" Reply-to cypherpunks at ssz.com added. Privacy policy: open Info: http://www.ssz.com/cdr/ --------------------------------------------------------------------------- Sunder: Subscription: "subscribe" to sunder at sunder.net Unsubscription: "unsubscribe" to sunder at sunder.net Help: "help" to sunder at sunder.net Posting address: sunder at sunder.net Filtering policy: moderated Message Modification policy: ??? Privacy policy: ??? Info: ??? --------------------------------------------------------------------------- Pro-ns: Subscription: "subscribe cypherpunks" to majordomo at pro-ns.net Unsubscription: "unsubscribe cypherpunks" to majordomo at pro-ns.net Help: "help cypherpunks" to majordomo at pro-ns.net Posting address: cypherpunks at pro-ns.net Filtering policy: cooked Posts from all CDR subscribers & replies to threads go to local CDR subscribers. All posts from other CDRs are forwarded to other CDRs unmodified. Message Modification policy: 1. leading "CDR:" in subject line removed 2. "Reply-to:" removed Privacy policy: private Info: http://www.pro-ns.net/cpunk From ravage at einstein.ssz.com Sun Apr 20 19:33:31 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sun, 20 Apr 2003 21:33:31 -0500 (CDT) Subject: Idea: Rogue DNS resolvers In-Reply-To: Message-ID: Hi Thomas, Pretty old news. There are quite a few folks who have been doing this sort of stuff for quite a while. Besides SSZ there is also the .god domain. If you get around to setting something up give me a holler. On Mon, 7 Apr 2003, Thomas Shaddack wrote: > Watching the senseless court fights for domains, DNS hijackings, all kinds > of technical and lawyernical attacks, getting into the way of the people > who just want their informations and want their bookmarks and links from > search engines just-working. Pondering... > > The situation could be alleviated by a few (or a wider network of) > volunteers, running public DNS resolvers (dnscache could be a good > candidate) paired with DNS servers (tinydns is a choice here), with the > "problematic" domains resolvings being set up manually, outside of the > DNS infrastructure. (I don't talk about the alternative root servers now.) > Let's name them RogueDNS (contrary to fully specs-conformant OfficialDNS). > Standard setup, used commonly on LANs when some domains have to resolve to > internal IPs instead of external ones (eg, servers behind the firewall, > accessible from both the LAN and the outside over external IP). > > Example of function: A company (or a country) unleashes their lawyers (or > goons) on somedomain.com, which then gets shut down or repointed to the > companydomain.com. A news about it gets out, together with the patch for > the RogueDNS server definitions. From then, the RogueDNS resolvers answer > queries for the hijacked domain with their original values, though the > OfficialDNS hierarchy now show the officially enforced values (eg, > pointing to the DEA servers with the we-don't-sell-bongs agenda, like in > the recent case of government-hijacked domains of head shops). > > Could be paired together with a webserver specialized to issue > HTTP-REDIRECT responses, for the cases when the server is entirely taken > down but a mirror exists - RogueDNS returns the IP of the redirecting > server, the redirecting server gets the entire URL in the request, looks > up the database of redirects, issues one. > > Can be both centralized, decentralized, or running on end users' machines. > The key problem here are the updates; they can be realized by mailing > lists, or periodic or on-demand queries on a server (or server networks) > using a protocol of choice; this is open for the developers. > > A prototype version, without the HTTP redirector, already worked for my > LAN (standard dnscache/tinydns combination). The HTTP redirector can be > easily implemented using eg. Apache/PHP/MySQL. > Or it can be partially emulated locally, by using hosts file. > > Could it be useful in some scenarios? Does it have the proper ingredients > for eventual wider deployment? Or is it completely unusable? > Ideas welcomed. :) > -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Sun Apr 20 19:34:50 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sun, 20 Apr 2003 21:34:50 -0500 (CDT) Subject: Yahoo! News - Pentagon Expects Long-Term Access to Four Key Bases in Iraq (fwd) Message-ID: http://story.news.yahoo.com/news?tmpl=story2&cid=68&ncid=68&e=3&u=/nyt/20030419/ts_nyt/pentagon_expects_long_term_access_to_four_key_bases_in_iraq Now it becomes much clearer...bunch of war mongers. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From mv at cdc.gov Sun Apr 20 21:35:43 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sun, 20 Apr 2003 21:35:43 -0700 Subject: Internet dies if GPS dies? Message-ID: <3EA3751E.F351B335@cdc.gov> [If GPS dies] "Internet activity would slow to a crawl, because many backbone operators rely on precise GPS time stamps to route data. " http://www.wired.com/wired/archive/11.05/start.html?pg=6 Sounds like bullshit to me, data clocks should be able to run without being fully synched externally, constantly. Maybe very occasional minor glitches at boundaries of clock domains. Any SONET Gurus wanna comment? [The article is full of hysterics like this. What it *doesn't* say is that the rockets have been used to launch OsamaSat, HusseinSat, etc., none of which exist of course, no such hardware here] --- Number theory makes my brain hurt. From ravage at einstein.ssz.com Sun Apr 20 19:37:42 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sun, 20 Apr 2003 21:37:42 -0500 (CDT) Subject: [eff-austin] Cyber War! on Austin's KLRU Thursday, April 24, at 9pm In-Reply-To: Message-ID: New form of warfare? Where have these folks been for the last 10 years? Clearly they've not been doing anything on the net...other than reading their own press releases that is. Spin doctor bullshit. They should check out the Cypherpunks archives for a lot of in depth discussion as well as more than a couple of examples. On Sun, 20 Apr 2003, Carl Webb wrote: > Cyber War! > > https://www.klru.org/ > > [2116small.jpg] [blank.gif] > > A new form of warfare has broken out and the battleground is cyberspace. > In "Cyber War!" airing Thursday, April 24, at 9 P.M. on PBS (check local > listings), FRONTLINE investigates the threat of cyber war and reveals > what the White House knows that the rest of us don't. > > caption: Graduate students at the Naval Postgraduate School learn both > offensive and defensive tactics of cyber war. > > For electronic images, contact Jenna Lowe at (617) 300-3500 or e-mail > jenna_lowe at wgbh.org, > or go > to www.pbs.org/pressroom to download the high-resolution photos. > > Images may only be used in editorial conjunction with the direct > promotion of this film in North America. No other rights are granted. All > rights reserved. > > Photo credit: ) WGBH/FRONTLINE > > [blank.gif] Thursday, April 24, at 9pm, 60 minutes > > In the aftermath of September 11, as most intelligence gathering shifted > to finding Al Qaeda cells throughout the world, one group at the White > House decided to investigate a new threat--attacks from cyberspace. > > "In the past, you would count the number of bombers and the number of > tanks your enemy had. In the case of cyberwar, you really can't tell > whether the enemy has good weapons until the enemy uses them," says > Richard Clarke, former chairman of the White House Critical > Infrastructure Protection Board. > > In "Cyber War!" airing Thursday, April 24, at 9 P.M. on PBS (check local > listings), Clarke and other insiders talk about a new set of warriors who > are fighting on a new American battlefield--cyberspace. In this one-hour > report, FRONTLINE investigates how vulnerable the Internet is to both > virtual and physical attack. > > "The thing that keeps me awake at night is [the thought of] a physical > attack on a U.S. infrastructure...combined with a cyberattack which > disrupts the ability of first responders to access 911 systems," says Ron > Dick, former head of the FBI's National Infrastructure Protection Center. > > The issue of cyberwar first began to command urgent White House attention > after a distinguished group of scientists wrote an open letter to the > president following the Al Qaeda attacks. > > "The critical infrastructure of the United States, including electrical > power, finance, telecommunications, health care, transportation, water, > defense and the Internet, is highly vulnerable to cyberattack. Fast and > resolute mitigating action is needed to avoid national disaster," wrote > the authors of the letter, who included J.M. McConnell, a former head of > the National Security Agency, Stephen J. Lukasik of the Defense Advanced > Research Projects Agency, and Sami Saydjari of the Defense Research > Center. > > "Ultimately, it turned into about fifty-four scientists and > leaders--former national leaders, intelligence community people as > well--sending this letter that makes the case that says, 'We have a > problem here,'" Saydjari tells FRONTLINE. > > In "Cyber War!" FRONTLINE investigates a number of cyberattacks that have > already occurred: "Slammer," which last January took down the Internet in > South Korea and affected 911 systems and the banking system in the United > States, and the "Nimda" virus that quietly attacked Wall Street in 2001. > > "Nimda cost probably three billion dollars," says Clarke. "Had it not > been for the fact that September eleventh was the week before, it would > have been a big news story." > > FRONTLINE also follows efforts by the United States to go on the > offensive. > > "You cannot defend yourself unless you understand how the offense works. > And in so doing, you learn to wage offensives," says John Arquilla, > associate professor of Defense Analysis at the Naval Postgraduate School > in Monterey, California. Arquilla has helped the Department of Defense > develop information warfare strategies utilized in the first Gulf War, > Kosovo, Afghanistan, and in the most recent war with Iraq. > > But many cyberwar experts believe the Internet could be used to launch a > major attack on the nation's infrastructure. > > "What we found on Al Qaeda computers was that members of Al Qaeda were > from outside the United States doing reconnaissance in the United States > on our critical infrastructure," says Clarke. > > One target, experts say, could be the country's electric power grid. By > exploiting vulnerabilities in the supervisory-control and > data-acquisition (SCADA) systems that utility companies use to remotely > monitor and control their operations, American cities could be left in > the dark. > > "You could take down significant pieces of it for let's say operationally > useful periods of time. Penetrating a SCADA system that's running a > Microsoft operating system takes less than two minutes," one cyberwarrior > who spoke on the condition of anonymity tells FRONTLINE. > > Joe Weiss, a control system engineer and executive consultant for KEMA > Inc. reluctantly agrees that the power grid is vulnerable. "A very worst > case could be loss of power for six months or more," says Weiss. > > Clarke, scientists, and some inside the military have tried to convince > Washington that cybersecurity needs to be a priority. They have had > limited success. > > "I think cyberterrorism is a theoretical possibility," says John Hamre, > director of the Center for Strategic and International Studies, a > prestigious military think tank. "Will cyberterrorism be like September > eleventh? No, I don't think so, not right now." > > "Terrorists are after the shock effect of their actions," Hamre adds. > "And it's very hard to see the shock effect when you can't get your ATM > machines to give you twenty dollars." > > But Clarke--who as head of counterterrorism for the Clinton and Bush > administrations was an early voice warning about Al Qaeda in the middle > 1990s--says cyberattacks are imminent. > > "When we have the experts telling us we have a big risk," says Clarke, > "wouldn't it be nice, for once, to get ahead of the power curve, solve > the problem, so there never is the big disaster?" > > Following the broadcast, visit FRONTLINE's Web site at > www.pbs.org/frontline for extended coverage of this story, including: > * Extended interviews with top-level experts on cyberspace security in > private industry, the U.S. government, the intelligence community, > and infrastructure networks; > * A forum with cybersecurity experts from CERT, Akamai, Symantec, and > Sandia Labs who will field questions from viewers; > * A discussion with a master hacker on how tools for computer hacking > can help access systems such as SCADA controls, corporate databases, > and secure government networks; > * Video streaming of "Cyber War!" in both Windows Media and Real > Player, and much more. > > "Cyber War!" is a FRONTLINE co-production with the Kirk Documentary > Group. The writer, producer, and director is Michael Kirk. The > co-producer and reporter is Jim Gilmore. > > FRONTLINE is produced by WGBH Boston and is broadcast nationwide on PBS. > > Funding for FRONTLINE is provided through the support of PBS viewers. > > FRONTLINE is closed-captioned for deaf and hard-of-hearing viewers. > > The executive producer for FRONTLINE is David Fanning. > > Press contacts: > Erin Martin Kane [erin_martin_kane at wgbh.org] > Chris Kelly [chris_kelly at wgbh.org] > (617) 300-3500 > > FRONTLINE XXI/April 2003 > [blank.gif] > about frontline 7 upcoming programs 7 teachers 7 join us 7 contact us > frontline privacy policy 7 pbs online 7 wgbh new content copyright )2001 > pbs online and wgbh/frontline > > [blank.gif] > > ________________________________________________________________________________ > Add photos to your messages with MSN 8. Get 2 months FREE*. > -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Sun Apr 20 19:41:03 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sun, 20 Apr 2003 21:41:03 -0500 (CDT) Subject: Quarantines may be justified In-Reply-To: <20030420041830.4FDF4212E@localhost.localdomain> Message-ID: On Sun, 20 Apr 2003, david wrote: > The concept of, and respect for private property are essential > elements of individual liberty. They cannot be separated. There > is an inverse proportion between the power the governments have > over private property and freedom. Actually that's so much whaledreck. They in fact are -not- related at all. In fact if one talks of 'individuals' then -no- concept of 'property' -ever- arises. It is only until one brings in two or more than -any- concept of 'property' has any meaning at all. The connection between 'private freedom' and 'property' is really a strawman. What matters is life, liberty, and the -pursuit of hapiness- and not collecting more 'stuff' than your neighbor. If anything it demonstrates an exception lack of maturity and excessive insecurity. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Sun Apr 20 19:45:48 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sun, 20 Apr 2003 21:45:48 -0500 (CDT) Subject: U.S. Drops 'E-Bomb' On Iraqi TV In-Reply-To: <3E90DA10.A8FB1418@cdc.gov> Message-ID: On Sun, 6 Apr 2003, Major Variola (ret) wrote: > Fact is, if the sheeple weren't so ignorant/afraid, peaceful, > clean uses of nukes could benefit, e.g., excavating canals at > a fraction of the cost/time of conventional work. > > This is economics & physics, with politics smothering the > whole affair. What that is is bullshit, plain and simple. The use of nukes to create canals is just so much wishfull thinking. The impact of even small nukes on the stability of underground structures is -not- a good effect in -any- case. The radiation and storage of contaminated materials would far outweigh any short term savings of cost. There is one and only one place to use nukes, that is where people don't or won't live; and that means not on terra. Use of nukes in extra-terrestrial applications is another entire issue. Unfortunately we have a technology curve to climb before we'll get there. No War. No Killing. No Nuclear Weapons. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From die at die.com Sun Apr 20 22:21:00 2003 From: die at die.com (Dave Emery) Date: Mon, 21 Apr 2003 01:21:00 -0400 Subject: Internet dies if GPS dies? In-Reply-To: <3EA3751E.F351B335@cdc.gov> References: <3EA3751E.F351B335@cdc.gov> Message-ID: <20030421052100.GB6458@pig.die.com> On Sun, Apr 20, 2003 at 09:35:43PM -0700, Major Variola (ret) wrote: > [If GPS dies] "Internet activity would slow to a crawl, because many > backbone operators rely on precise GPS time stamps to route data. " > http://www.wired.com/wired/archive/11.05/start.html?pg=6 > > Sounds like bullshit to me, data clocks should be able to run without > being fully synched externally, constantly. > Maybe very occasional minor glitches at boundaries of clock domains. > Much of the current telcom plant from CDMA cellphones to many high capacity fiber muxes, switches and rings depend on GPS timing and operate with a decentralized timing hierarchy with each major node having its own primary reference locked to GPS time. And CDMA cellsites in particular cannot perform proper handoffs without GPS accuracy timing. Even such technology as low tech as police radio trunking systems and pagers now depend on GPS for accurately synchronizing multiple ("simulcast") transmitters so they don't interfere with each other. It is, however, true that most of these facilities use accurate rubidium or sometimes even cesium clocks as backup for GPS outages and even CDMA cellsites often have high precision ovenized oscillator frequency standards that will meet the timing drift specs for up to a couple of days with no valid GPS signal. And some network facilities can fall back to locking their timing to other facilities (eg the data coming in from a fiber) rather than GPS - it really depends on how much care and thought went into the system design and whether any of the backup timing modes are tested regularly. But yes, GPS time and frequency is VERY widely used, and has revolutionized the timing and synchronizing architectures of many kinds of telcom networks and systems. It ain't 1975 when all timing and frequency for the whole CONUS radiated out of a master oscillator in an underground bunker in Hillsboro Mo, and essentially everything was slaved to it by layers of PLLs and local disciplined oscillators. And having a GPS broadcast time base has made life much easier for system designers - time of day accurate to around 25 ns is now available for less than $1K anywhere you want it with very high reliability as is frequency accurate to parts in 10^13. Back in the old days these were unheard of numbers... with maybe 10 ms timing accuracy being considered good. And yes, all of this is to some degree or another - sometimes quite severely - vulnerable to a long term GPS outage of hours or days or longer. Virtually all of these GPS timing systems are designed to stand short GPS outages, as they can happen due to sky coverage, satellite failures, or routine maintenance. And yes, malicious jamming is a real threat. What else is new ? -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass 02493 PGP fingerprint 1024D/8074C7AB 094B E58B 4F74 00C2 D8A6 B987 FB7D F8BA 8074 C7AB From ravage at einstein.ssz.com Mon Apr 21 05:05:24 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 21 Apr 2003 07:05:24 -0500 (CDT) Subject: China's coders get into shareware - News (fwd) Message-ID: http://asia.cnet.com/newstech/applications/0,39001094,39128484,00.htm -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From sunder at sunder.net Mon Apr 21 07:02:34 2003 From: sunder at sunder.net (Sunder) Date: Mon, 21 Apr 2003 10:02:34 -0400 (edt) Subject: Quarantines may be justified In-Reply-To: <20030419185457.GA22903@cybershamanix.com> Message-ID: And most people find farts offensive. Should everyone be banned from eating beans? Or be forced to wear butt plugs to make you happy? So put on an air filter if the air offends you. If someone wishes to kill themselves with either smoke, drink, or Mickey D's, that's their choice. No one forces you to walk behind them, nor breathe their exhaled smoke, or farts, or car exhaust, live over Radon emitting land, stick your head in a microwave oven and disable the safety switches, etc. You can chose to be where those odors that offend you are not. Just as you can chose to not engage in unprotected sex with VD/HIV carriers, play Russian Roulette, etc. it's up to you to protect yourself. If others chose to endanger their lives and health it is their choice. Either they will wind up killing themselves weeding themselves out of the gene pool and winning a Darwin Award, or their bodies will build up tolerance improving the gene pool. Why should your standards and life choices be used to limit those of others? Who decides whose life choice should define the baseline of everyone's? And why that person? Remember Farenheight 451. Books were burned because not everyone, but someone found something offensive, and since everyone put together pretty much found everything offensive, all books were banned and everyone was forced to be happy by artificial means. That is the slippery slope you ask all humans to take with your stupidly selfish demands. And no, personally, I'm not a smoker. But I take great exception to NYC forcing everyone to quit smoking just because a few morons in power - much like yourself - except that you have no political power (thank the gods for that!), have decided to be the conscience of the public. And personally, if someone wishes to clog their arteries or lungs or destroy their liver with alcohol, or pancreas with sugar, brain cells with aspertame, no one should have to pay for their condition. Neither in welfare, social security, health insurance, nor any other means. And yes, if a corporation decides to poison the environment and their actions make everyone around them sick - without informing them of the dangers, they should be held liable. But things like second hand smoke and obesity are well known to be dangerous, so if someone inhales smoke or fat burgers, that's their life choice. Fuck'em. If someone is spreading SARS, the plague, or running around machine gunning people, they should be dealt with accordingly. But if all they're doing affects only themselves, that's their choice. ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ On Sat, 19 Apr 2003, Harmon Seaver wrote: > > > > Smoking in public, that's an easy one to pick on. But the argument > > holds no water, unfortunately. Find me RELIABLE, UNBIASED evidence that > > second-hand smoke is actually dangerous, and I'll agree to ban smoking. > > > > I could care less what any report says, I get an immediate sick feeling from > breathing tobacco smoke. And a great many other people do as well. From bill.stewart at pobox.com Mon Apr 21 10:48:58 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Mon, 21 Apr 2003 10:48:58 -0700 Subject: Quarantines may be justified In-Reply-To: References: <20030420041830.4FDF4212E@localhost.localdomain> Message-ID: <5.1.1.6.2.20030421102421.02c72ab8@idiom.com> At 09:41 PM 04/20/2003 -0500, Jim wrote: >The connection between 'private freedom' and 'property' is really a >strawman. What matters is life, liberty, and the -pursuit of hapiness- >and not collecting more 'stuff' than your neighbor. If anything it >demonstrates an exception lack of maturity and excessive insecurity. It's a difficult problem - claiming that land is your private property implies a willingness to initiate force to enforce your rights, which is different for something like land that you didn't create than for objects that you did create. But if you can't collect "stuff", you can't insure yourself against starving to death in the short term or the more distant future, and governments in during the last century made a habit of declaring that all the land and stuff in a given area was theirs, and either starving the local population to death (if they were totalitarians) or forcing them to leave (if they were merely greedy) or just killing them. If you're looking at the world as a whole, as opposed to just the US and Canada and parts of Western Europe that aren't near Germany, insecurity about such things unfortunately demonstrates a realistic maturity. If you live in a society that guarantees liberty and the pursuit of happiness, you still need to plan for your old age, and you do that by collecting stuff, or by collecting friends and kids who will care for you. Societies that don't let you collect stuff are forcing you to depend on them for your food and housing - not much liberty there. People who are especially good at acquiring and managing stuff can retire at 35 (:-), and people who don't have families to support can argue about whether they've got more liberty or happiness with less stuff (but the classic non-materialistic hippie ethic often involved going back to the land, i.e. you and your friends owning land and farming.) And farmers can never retire, except by having their kids do the work, unless they're in high-value crops like dope that let them acquire lots of stuff... From frantz at pwpconsult.com Mon Apr 21 12:46:21 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Mon, 21 Apr 2003 12:46:21 -0700 Subject: Quarantines may be justified In-Reply-To: <5.1.1.6.2.20030421102421.02c72ab8@idiom.com> References: <20030420041830.4FDF4212E@localhost.localdomain> Message-ID: At 10:48 AM -0700 4/21/03, Bill Stewart wrote: >It's a difficult problem - claiming that land is your private property >implies a willingness to initiate force to enforce your rights, >which is different for something like land that you didn't create >than for objects that you did create. > >But if you can't collect "stuff", you can't insure yourself against >starving to death in the short term or the more distant future, >and governments in during the last century made a habit of >declaring that all the land and stuff in a given area was theirs, >and either starving the local population to death (if they were totalitarians) >or forcing them to leave (if they were merely greedy) or just killing them. >If you're looking at the world as a whole, as opposed to just the US and >Canada and >parts of Western Europe that aren't near Germany, insecurity about such things >unfortunately demonstrates a realistic maturity. The Scottish land clearances are an interesting case study here. For generations before 1745, the scots lived in clans where the clan leaders depended on landless peasants for agricultural labor and private armies. After the Jacobite revolution, with Bonnie Prince Charlie's claim to the throne, the government tried to suppress the highland clans, banned the private armies, the playing of bagpipes, and the wearing of highland dress. Clan leaders no longer needed the peasants for private armies, and their tenancy became a financial burden. At the same time, the introduction of the potato allowed the population of peasants depending on the clans for support to almost double. These changes, along with increased economic value of wool and mutton, caused the land owners to shift their lands to sheep production. The peasants were either moved to small holdings on the poorest land (called crofts), or shipped abroad. Modern historians estimate that between 50,000 and 100,000 people were removed from the land during the 19th century. The clearances did not proceed without protest, and there were frequent tenant uprisings. However, nothing in Scottish law prevented land lords from clearing their land. In 1886, the government passed the Crofter's Holding Act which provided for security of tenure, fair rents, and the crofter's right to pass the croft through inheritance. On May 3, 2000, the Scottish parliament abolished feudal tenure, ending 900 years of feudalism. [Source: The Lonely Planet, Scotland's Highlands & Islands guidebook] Now for the questions: Who owned the land? The lords? The peasants? Someone else? What does it mean to own land? Are land owners justified in evicting people who have lived on, and worked the land for generations? Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From blancw at cnw.com Mon Apr 21 13:58:05 2003 From: blancw at cnw.com (Blanc) Date: Mon, 21 Apr 2003 13:58:05 -0700 Subject: New Lawsuit from JimB Message-ID: Jim Bell has sent a request that the list be notified of a new complaint to the WA. State Bar which he is composing, a new lawsuit he is filing (up on cryptome: http://cryptome.org/jdb-v-usa-ric.wpd - in WordPerfect format), and a message: "Fortunately, I am still allowed to write and I have learned enough law to write both the lawsuit and the complaint. But to do any good, that writing must be read and acted upon, and that's why I need your help. The news media must be told, and moreover it must be documented that they were told. And, it would help if a lawyer was available to represent my lawsuit, although as I learn more of the law that is becoming less critical. I invite all inquiries along these lines." his address: U.S. Penitentiary Atwater P.O. Box 019001 Atwater, CA 95301 From timcmay at got.net Mon Apr 21 17:39:42 2003 From: timcmay at got.net (Tim May) Date: Mon, 21 Apr 2003 17:39:42 -0700 Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: Message-ID: On Monday, April 21, 2003, at 04:55 PM, Patrick Chkoreff wrote: > You're on a roll, Mr. Bob Hettinga: > >> ... is a distinction without a difference. Identical to the >> distinction between "pacifism", or "opposition to war", and treason, >> in an actual time of war. > >> Of course, the very concept of tax-free *anything* is anathema to me, >> these days. At the very least, it's just as much a state subsidy as a >> cash grant. > > First, Bob should cut back on his massive cross-posting to his several self-centered groups (including new ones to me: "Philodex Clips" and "dgcchat"). Second, those from other lists who give their hero his "props" (a negro term now being used by many negro wannabees) should do so on lists other than Cypherpunks. Third, I wonder when Bob will stop proliferating "digibucks" and "bearer settlement" and "e$" and "Philodex Clips" and all of his other lists and instead actually _work on_ his "fractally geodesic multi-centered emergent global clearing" b.s. Unless his real career is, as many suspect, just endless self-promotion using the latest snake oil buzzwords. --Tim May From patrick at fexl.com Mon Apr 21 16:55:33 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Mon, 21 Apr 2003 19:55:33 -0400 Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: Message-ID: You're on a roll, Mr. Bob Hettinga: > ... is a distinction without a difference. Identical to the > distinction between "pacifism", or "opposition to war", and treason, > in an actual time of war. > Of course, the very concept of tax-free *anything* is anathema to me, > these days. At the very least, it's just as much a state subsidy as a > cash grant. To summarize: - Opposing any war is treason. - Every human activity should be taxed. - Failure to tax is equivalent to subsidy. > Nation-states are a bitch, y'all... And from the above I conclude that you like it that way. > Cheers, > RAH Three cheers for the state, rah rah rah! Digital bearer settlement is treason. -- Patrick "Of all the enemies to public liberty war is, perhaps, the most to be dreaded because it comprises and develops the germ of every other. War is the parent of armies; from these proceed debts and taxes. And armies, and debts, and taxes are the known instruments for bringing the many under the domination of the few. In war, too, the discretionary power of the Executive is extended. ... No nation could preserve its freedom in the midst of continual warfare." James Madison, April 20, 1795 From camera_lumina at hotmail.com Mon Apr 21 18:27:49 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 21 Apr 2003 21:27:49 -0400 Subject: Internet dies if GPS dies? Message-ID: Variola wrote... "[If GPS dies] "Internet activity would slow to a crawl, because many backbone operators rely on precise GPS time stamps to route data. " http://www.wired.com/wired/archive/11.05/start.html?pg=6 Sounds like bullshit to me, data clocks should be able to run without being fully synched externally, constantly. Maybe very occasional minor glitches at boundaries of clock domains. Any SONET Gurus wanna comment?" Sure, but I don't know enough about IP to tell you. SONET networks derive their timing from a STRATUM1 clock, which used to be Cesium but which are increasingly GPS-based. If the STRATUM1 clock "dies", the network can look for another high-quality clock. If it doesn't find one, each NE will go into hold-over, and time of of the internal STRATUM (likely 2e) clock until a good clock reappears. But the time stamps for SONET clocks are in the DS1 overhead, so the packets in the (other) DS1s/DS3s, etc...never "see" that timestamp, unless that timestamp is somehow read by a router and then put into the packets. But does a router even GET timing? (ie, is there a BITS interface on a router? I don't think so.) In any event, if the router gets its timing from the SONET network then there's no problem. If they don't get their timing from SONET, I doubt they get it directly from a GPS. So it sounds like bullshit to me. -TD >From: "Major Variola (ret)" >To: "cypherpunks at lne.com" >Subject: Internet dies if GPS dies? Date: Sun, 20 Apr 2003 21:35:43 -0700 > >[If GPS dies] "Internet activity would slow to a crawl, because many > backbone operators rely on precise GPS time stamps to route data. " >http://www.wired.com/wired/archive/11.05/start.html?pg=6 > >Sounds like bullshit to me, data clocks should be able to run without >being fully synched externally, constantly. >Maybe very occasional minor glitches at boundaries of clock domains. > >Any SONET Gurus wanna comment? > >[The article is full of hysterics like this. What it *doesn't* say >is that the rockets have been used to launch OsamaSat, HusseinSat, >etc., none of which exist of course, no such hardware here] > >--- >Number theory makes my brain hurt. _________________________________________________________________ Protect your PC - get McAfee.com VirusScan Online http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963 From shaddack at ns.arachne.cz Mon Apr 21 15:16:48 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Tue, 22 Apr 2003 00:16:48 +0200 (CEST) Subject: Patches for SpeakFreely 7.5/Linux for handling of encryption keys Message-ID: In Linux version, the encryption keys are supplied to the sfspeaker and sfmike processes as commandline parameters. This is fundamentally insecure, as the keys are then available for every user and process that can do "ps -ef" or has /proc access. Also, it would be beneficial for many settings if the program could read the keys from an external file. Then the key can be protected on the level of the filesystem, or even by complete hardware removal when not used (eg, storing the keys on a smartcard, removable USB drive, or a floppy). They also can be easier automatically distributed, eg. by scp. I wrote some modifications for version 7.5, which solves both problems. If the key value begins with @, it's interpreted as a file name. After reading the key value, the parameters accessible via /proc and ps are overwritten in memory and destroyed. The patches are tested for only the IDEA encryption, but the code is identical for the other options. The patches for sfmike and sfspeaker are available from . Enjoy. :) Shaddack, the Mad Scientist From shields at msrl.com Mon Apr 21 22:00:23 2003 From: shields at msrl.com (Michael Shields) Date: Tue, 22 Apr 2003 05:00:23 +0000 Subject: Internet dies if GPS dies? In-Reply-To: (Tyler Durden's message of "Mon, 21 Apr 2003 21:27:49 -0400") References: Message-ID: <87smsbnn2w.fsf@mulligatwani.msrl.com> In message , "Tyler Durden" wrote: > But the time stamps for SONET clocks are in the DS1 overhead, so the > packets in the (other) DS1s/DS3s, etc...never "see" that timestamp, > unless that timestamp is somehow read by a router and then put into > the packets. But does a router even GET timing? (ie, is there a BITS > interface on a router? I don't think so.) Routers do not have any ability to take input from a frequency standard, even if you have one available. Each interface recovers clocking from the line, or can use an internal clock. Some discussion of this as it applies to routers running PPP over SONET over dark fiber: http://www.cisco.com/en/US/tech/tk713/tk607/technologies_tech_note09186a0080094bb9.shtml Those routers will operate independently of any external clock. Routers that are connected to a mux (which includes anything DS3 and below) will recover clock from the mux, which will have its own timing interface or internal clock. I'm not a SONET guru, but my understanding is that even with the internal clocks, you would see at worst an occasional error burst for a few ms. No credible engineer would make a network that fell over without GPS anyway, since it's just too easy for someone to accidentally knock over your antenna while installing another, or nick the cable with a saw, or who knows what. In a nutshell, this isn't something I'd worry about. -- Shields. From ravage at einstein.ssz.com Tue Apr 22 04:53:33 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Apr 2003 06:53:33 -0500 (CDT) Subject: TheStar.com - Pro-U.S. pundits should get real (fwd) Message-ID: http://www.thestar.com/NASApp/cs/ContentServer?pagename=thestar/Layout/Article_Type1&c=Article&cid=1035781079330&call_pageid=968332188854&col=968350060724 -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From camera_lumina at hotmail.com Tue Apr 22 07:15:28 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 22 Apr 2003 10:15:28 -0400 Subject: Internet dies if GPS dies? Message-ID: Michael Shields wrote... "I'm not a SONET guru, but my understanding is that even with the internal clocks, you would see at worst an occasional error burst for a few ms. No credible engineer would make a network that fell over without GPS anyway, since it's just too easy for someone to accidentally knock over your antenna while installing another, or nick the cable with a saw, or who knows what. In a nutshell, this isn't something I'd worry about." SONET Synchronization is not a thing that can easily be discussed in any short amount of time. Synch in a SONET network is "provisioned", NE-by-NE, and if its done right then the chances of timing slips are very low. However, in certain cases you can have a big timing "island", and in this case over the course of days you'll start to see more and more slips until that whole Island pretty much disconnects from the rest of the network. (This can happen when the primary reference fails, and when the reamining NEs all get their timing from each other in a big loop, like a snake eating its tail. The whole clock for this island begins to drift wrt the rest of the network, and in some cases there can eventually be enough slips as to cause some NEs to declare AIS. However, if Synch was provisioned correctly this won't be seen.) The existence of possible timing islands, owever, should not be strongly associated with the loss of GPS. Traditionally, SONET networks use Cesium clocks as their primary reference source.GPSs have only started to proliferate in order to simplify synch. So in order for GPS cancellation to do anything at all to the internet, you'd have to have a network that has no access to ANY stratum1 clock (Cesium or GPS), you'd have to have old NEs in that network (ie, with a poor internal SONET clock), AND you'd have to have a timing island. And even then, only this island would be affected. If this island were in the middle of UUNet, you might see some slowdown. As for routers I'll take it that they can read timing out of the Synch Status Byte (S1 in the SONET overhead), so they'll "know" what the problem is at least (ie, that byte will tell them what the quality of the synch is). If the line clock is bad, I'd guess that the big Cisco routers will go into "holdover" (or whatever router heads call holdover), and that's the time they'll use to stamp the flows with. So, no problem I'm 99.9% sure. (And I'm rarely that sure of anything.) -TD _________________________________________________________________ Add photos to your e-mail with MSN 8. Get 2 months FREE*. http://join.msn.com/?page=features/featuredemail From kelsey.j at ix.netcom.com Tue Apr 22 08:16:54 2003 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Tue, 22 Apr 2003 11:16:54 -0400 Subject: Quarantines may be justified In-Reply-To: <20030419212246.DC9D6212E@localhost.localdomain> References: <20030419204633.GA23512@cybershamanix.com> <3EA025F0.1020406@cdc.gov> <20030419195512.1F9FC2423@localhost.localdomain> <20030419204633.GA23512@cybershamanix.com> Message-ID: <5.2.0.9.0.20030422104433.045781d0@pop.ix.netcom.com> At 05:22 PM 4/19/03 -0400, david wrote: ... >It is the initiation of force that is wrong. People who try to rob >others should have their behavior regulated by being killed by >their intended victims. In order to distinguish when force has been initiated, you have to have some agreed-upon definitions of rights. The whole argument you're in here about smoking has to do with boundaries of rights. Harmon says your cigarette smoke is a form of assault. This may or may not be valid, but it's certainly possible to come up with kinds of fumes that are a violation of the rights of the people forced to endure them (think of mustard gas, or even the smell of raw sewage), so it's not obviously bogus. In practice, this is an area where simple rights arguments don't work all that well, because there are big areas of gray. >Hiring professionals to deal with robbers >is a valid response to the robbers' initiation of force. Killing >people who use force to regulate individuals who smoke in public is >also a legitimate response to the their initiation of force. How about if whenever I see someone smoking in public, I go stand upwind of them and open my package of Instant Sarin Mix? Which one of us is initiating force? How about if I'm more polite, and merely open my package of Instant Skunk Scent Mix? The issue is where you draw the line, and the problem is that there's no unambiguously right answer. The only way to resolve this peaceably is to have some agreed-upon standards to resolve the gray areas into solid lines. Those agreed-upon standards are sometimes in the form of written laws, sometimes in the form of precedent in case law, and are very often simply the unwritten standards of conduct that most people live by most of the time. And often they need courts of some kind to rule on gray areas that exist even within those rules. >David Neilson --John Kelsey, kelsey.j at ix.netcom.com PGP: FA48 3237 9AD5 30AC EEDD BBC8 2A80 6948 4CAA F259 From jya at pipeline.com Tue Apr 22 11:56:48 2003 From: jya at pipeline.com (John Young) Date: Tue, 22 Apr 2003 11:56:48 -0700 Subject: New Lawsuit from JimB In-Reply-To: Message-ID: An HTML of Jim's RICO suit: http://cryptome.org/jdb/jdb-v-usa-ric.htm The RICO suit is over twice the length of AP. For those who haven't followed the Bell case and Assassination Politics, here's a link to the Jim Bell and Carl Johnson files: http://cryptomer.org/jdb/jdb-files.htm Jim and his Multnomah County Common Law Court avengers have put together an impressive cast of enemies of the citizenry, many of whom are probably little known here, but whose names and duties pop up in the official records of the Bell trials as in the comprehensive RICO suit. According the WWA prosecutor's web page, Robb London has moved on, perhaps to the gargantuan homeland terrorism upmarket. Not sure where Jeff Gordon is, anybody know? From rah at shipwright.com Tue Apr 22 11:46:31 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 22 Apr 2003 14:46:31 -0400 Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: References: Message-ID: At 7:55 PM -0400 4/21/03, Patrick Chkoreff attempted to calibrate his apostasy reflex, across three email lists: >You're on a roll, Mr. Bob Hettinga: And you're on a troll, Mr. Patrick Chkoreff? :-). At the very least he either doth protest too much, or at least mistook my meaning. Let's be charitable, and assume the latter, shall we? >> ... is a distinction without a difference. Identical to the >> distinction between "pacifism", or "opposition to war", and treason, >> in an actual time of war. > >> Of course, the very concept of tax-free *anything* is anathema to me, >> these days. At the very least, it's just as much a state subsidy as a >> cash grant. > >To summarize: > >- Opposing any war is treason. Well, if you're the de facto property of one nation-state or another, that's exactly true. Find me someone who isn't, these days. Hint: The very definition of evil these days is the so called "failed" state. >- Every human activity should be taxed. Isn't it already? Certainly I think that *nothing* should be done without profit, that nothing really *is* done without profit to somebody, no matter what its governmental designation, and that *all* economic activity should be taxed if any of it is, and it *will* be, directly in cash, or indirectly in regulation, since we're all the "property" of one nation state or another, whether we say we "own ourselves" or not. So, maybe you're right. When you think about it too hard, Non-Governmental Organizations aren't Non-Governmental, and that Non-Profit isn't. Churches, included, if you remember one of the three(?) original posts you're clipping from. >- Failure to tax is equivalent to subsidy. Given the above, indeed. Think about the implicit government subsidy for medicine (I hate to commit the commie-code neologism "healthcare" in polite company...) by making it tax-deductible on a corporate tax return. Certainly the home interest rate deduction is a subsidy for single housing. Taxes, since nation-states have their guns at our heads and take them whether we want them or not, shouldn't have deductions, if the word "should" has anything to do with it. It "should" not distort the economy anymore than it has to to pay the guys with guns. >> Nation-states are a bitch, y'all... > >And from the above I conclude that you like it that way. I think you mistake a statement of naked fact for approbium. Since the nation-state is caused by physics, I expect that changing physical phenomena is the only way to solve the problem. >Three cheers for the state, rah rah rah! Fancy that. My initials make a cheer. Never heard that one before. >Digital bearer settlement is treason. Possibly. Certainly lots of people, you and others, hope so, apparently. But, hope, as exemplified by one's politics, or ethics, for that matter, doesn't have much to do with it. Like I said, nation-states are caused by physics, not politics. Politics is a result. It is not a cause of anything. These days, I tend to prefer economics, myself, as a reason for doing things. YMMV. Religion, applied fiction, if you will, doesn't make physical reality change anymore except through non-coercive economic means, and I live for the day when politics, whose very modern definition is the control of force monopoly, doesn't either. I figure that suckers are born every minute, if they want to pay money to people who tell them what to think, ethically, or politically, that's fine by me. I'm not resigned to, much less in favor of -- not that what you or I *want* actually matters -- the ubiquity of the nation state or any other monopoly, force or otherwise. Nonetheless, we do live in a world of geographic force monopoly, funded by expropriation and extortion. Like Philip Dick said, reality doesn't change when you change your mind. Part of that expropriation is that nation-states can expropriate your physical person, put you in jail or kill you, for not agreeing with them, much less actively thwarting their behavior, particularly in time of war between nation-states. Part of that extortion is that they can threaten you with every thing from mobs and vigilantism to, again, murder and kidnap you if you don't pay them what they tell you you owe them. Their attempts to do this as efficiently as possible with the least amount of violence, usually through bribery of their supporters and fraud about that bribery as a "public good", do nothing more than sugar-coat the fact of their basic extortion and theft. Life is hard. As I said before, "Nation states are a bitch". Certain financial cryptography protocols hold out the, promise, the *hope*, that functionally anonymous, and completely secure, non-repudiable transactions can be done on ubiquitous geodesic internetworks without the requirement of the monopolistic force of nation-states in order to execute, clear, and settle. Economics, and not politics, will determine the answer to that question. Furthermore, as has been said by Tim May and others, those transactions must, sooner or later, execute, clear, and settle in the face of vigorous *repression* of those transactions, by most, if not all nation-states. Though certainly said as expressions of political opinion by Tim May and others, the efficacy of their survival in the face of such opposition will be the ultimate determinant of their *economic*, their physical -- and not political or ethical -- usefulness. That's not surprising, or, for that matter, hostile to nation-states, per se. Any more than railroads or television are hostile to nation states, even marginal or "failed" ones, like Bhutan, or Somalia, or Afghanistan. Ultimately, however, *if* those transaction technologies work as advertised, orthogonal to the nation-state, if you will, they will have consequences to the nation-state, and, as others have said, might be considered threats. Clearly lots of people *want* them to threaten nation-states, but what people want in the absence of *profit* is, also orthogonal. However, and this is most important, at *every* step of the way these protocols must make money. You can't be like Trotsky and say that the revolution hasn't come *yet*, with "yet" being permanently defined as "not now". That means that, plugged into and collateralized by existing *book-entry* assets, bearer certificates on the net are cheaper than book-entry transactions on public internetworks, much less the considerably more expensive book-entry transactions over the proprietary networks of meatspace. My other claim, contingent on the above admittedly long stretch of conditionals, that bearer transactions on the net, because they execute not only anonymously, but more important, *without* the force monopoly of the nation state, make the transaction costs of nation states, and, ultimately non-monopolistic force contracting itself, fall, and, accordingly, dramatically increase the number of "firms", and competition in markets for force. Anarchocapitalism, right here in River City, folks. Crypto-Anarchy, in other words, but not because nation-states can't *catch* previously illegal transactions, causing their fall and, ultimately, violent chaos, but because their *competition* in newly emerging non-monopolistic force markets reduces their market share -- as the net does to centralized information, the surfacting of markets for force into recursively smaller and smaller market actors, at lower and lower cost, with no loss of, if not actual gains in, total individual security -- and liberty. Finally an even bigger stretch, contingent on all of the above, is the idea that if the above really does happen, it, among other things, would prove something that I've always thought was true, something someone else has probably said before somewhere, though I haven't come across them yet, that our social structures map to our communication networks, and that Moore's "Law", in making our network architectures geodesic makes, in turn, our social structures less hierarchical and more geodesic themselves. That, boys and girls, would be very cool indeed, but we ain't there by a long shot. Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Tue Apr 22 11:46:53 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 22 Apr 2003 14:46:53 -0400 Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: References: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 5:39 PM -0700 4/21/03, Tim May accused me of pissing in his personal catbox: >First, Bob should cut back on his massive cross-posting to his >several self-centered groups (including new ones to me: "Philodex >Clips" and "dgcchat"). Ah. Theoretically, that's a claim made in the absence of data, at least as far as Mr. May is concerned, because, last time looked, I was in his killfile. Which might still be the case, because, inevitably, when someone replies to something I send to cypherpunks, Tim flames away. :-). Oddly enough, Patrick's libertarian/anarchocapitalist ideological purity flame was actually an original message, which probably proves the point. So, I plead guilty of creating new mailing list, m'lord, though the idea for the new list not exactly new. Philodox Clips is an attempt to put all the forwarded stuff into one list, like I used to do with the now 5-year-defunct e$pam list, only with, heh, more scope. :-). As a firehose of firehoses, it's probably not useful in its present form, but copyright law prevents turning it into a web-archive or an RSS feed. Besides, I'm going to do it anyway, and, apparently, *some* people want to look at it, including Patrick, :-), so I might as well put it in, heh, one place. However, dgcchat at lists.goldmoney.com isn't mine. It's an unmoderated discussion list ostensibly about digital gold currencies hosted, but not controlled by, GoldMoney.com. It's where lots of the original libertarian/anarchocapitalist (hence Patrick's "purity" flame) e-gold types went after several interesting, not to mention litigious, events occurred on and around the original e-gold discussion list, resulting in an unfortunate over-moderation of same. [Think what precipitated the demise of the old cypherpunks list at toad.com, and you'll get something of an idea.] >Second, those from other lists who give their hero his Well, somebody *did* call me a "hyperactive genius saint from the future" once, but I attribute that to, um, misplaced enthusiasm. Certainly the only genius saint from the future *I* know is Tim May, who, by all accounts, is not hyperactive, per se... >"props" (a negro >term now being used by many negro wannabees) should do so on lists >other than Cypherpunks. ...though certainly racist, if not in fact, then in deliberate affect. >Third, I wonder when Bob will stop proliferating "digibucks" and >"bearer settlement" and "e$" and "Philodex Clips" and all of his >other lists and instead actually _work on_ his "fractally geodesic >multi-centered emergent global clearing" That's "functionally anonymous instantaneous internet bearer transactions executing, clearing, and settling on ubiquitous geodesic internetworks", to you, Tim. :-). Besides, none of the above is mine, after all. "Anonymous" is David Chaum. "Geodesic Networks" is Peter Huber. Digital bearer transactions is Nick Szabo. "Immediate and final clearing" is Eric Hughes. "Functionally", and "ubiquitous" I leave as an exercise for the reader. I just stuck it all together in the right order. Nonetheless, I do agree that Making Shit Happen is Hard, even in the best of times. Guilty as charged 'mlord. But Tim knew that, like everything else he currently knows, in 1992. :-). Officially, IBUC is a going concern, but only just. Last revenue was a year ago, and last real revenue was in July 2001. We've got more unpaid bills than Carter's has pills, and we haven't made an interest payment on our outstanding bonds in a year either. I'm living proof that bootstrapping in the absence of revenue is not nearly as easy as it looks. :-). I am looking at ways to generate revenue other ways (which is why the Philodox site is probably going to be retooled, if we can figure out what for or how to do it) to pay both IBUC's bills, and to pay for new stuff to do. Not much luck there, yet, either. Making Shit Happen is Hard, these days, in particular. I'm too stubborn, if not stupid, :-), to quit, though. Of course, it's hard to tell whether I've quit or not given the present pace of things. One of the more humorous definitions of insanity is persistent behavior in the absence of evidence to the contrary, and it's starting to feel like it applies, but that can be said of several people we all know. :-). >b.s. Unless his real career >is, as many suspect, just endless self-promotion using the latest >snake oil buzzwords. It's amazing to me how many people insult others by describing themselves. 'nuff said. Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPqV89sPxH8jf3ohaEQIvmgCfebX4LGBB+QaNcmYh288KpGlQHZ4AoKO8 kTdDAuV48O04xCJ1Vfw4e3+W =J0Ey -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From camera_lumina at hotmail.com Tue Apr 22 12:26:37 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 22 Apr 2003 15:26:37 -0400 Subject: Three Cheers for the State - RAH RAH RAH Message-ID: RAH wrote... "as the net does to centralized information, the surfacting of markets for force into recursively smaller and smaller market actors,..." Ah. I was wondering when a reference to "fractals" would be made. -TD >From: "R. A. Hettinga" >To: Patrick Chkoreff , dgcchat > >CC: cypherpunks at lne.com, Clippable >Subject: Re: Three Cheers for the State - RAH RAH RAH >Date: Tue, 22 Apr 2003 14:46:31 -0400 > >At 7:55 PM -0400 4/21/03, Patrick Chkoreff attempted to calibrate his >apostasy reflex, across three email lists: > > >You're on a roll, Mr. Bob Hettinga: > >And you're on a troll, Mr. Patrick Chkoreff? :-). > >At the very least he either doth protest too much, or at least mistook my >meaning. Let's be charitable, and assume the latter, shall we? > > >> ... is a distinction without a difference. Identical to the > >> distinction between "pacifism", or "opposition to war", and treason, > >> in an actual time of war. > > > >> Of course, the very concept of tax-free *anything* is anathema to me, > >> these days. At the very least, it's just as much a state subsidy as a > >> cash grant. > > > >To summarize: > > > >- Opposing any war is treason. > >Well, if you're the de facto property of one nation-state or another, >that's exactly true. Find me someone who isn't, these days. Hint: > The very >definition of evil these days is the so called "failed" state. > > >- Every human activity should be taxed. > >Isn't it already? Certainly I think that *nothing* should be done without >profit, that nothing really *is* done without profit to somebody, no matter >what its governmental designation, and that *all* economic activity should >be taxed if any of it is, and it *will* be, directly in cash, or indirectly >in regulation, since we're all the "property" of one nation state or >another, whether we say we "own ourselves" or not. So, maybe you're right. > >When you think about it too hard, Non-Governmental Organizations aren't >Non-Governmental, and that Non-Profit isn't. Churches, included, if you >remember one of the three(?) original posts you're clipping from. > > >- Failure to tax is equivalent to subsidy. > >Given the above, indeed. Think about the implicit government subsidy for >medicine (I hate to commit the commie-code neologism "healthcare" in polite >company...) by making it tax-deductible on a corporate tax return. >Certainly the home interest rate deduction is a subsidy for single housing. > >Taxes, since nation-states have their guns at our heads and take them >whether we want them or not, shouldn't have deductions, if the word >"should" has anything to do with it. It "should" not distort the economy >anymore than it has to to pay the guys with guns. > > >> Nation-states are a bitch, y'all... > > > >And from the above I conclude that you like it that way. > >I think you mistake a statement of naked fact for approbium. > >Since the nation-state is caused by physics, I expect that changing >physical phenomena is the only way to solve the problem. > > > >Three cheers for the state, rah rah rah! > >Fancy that. My initials make a cheer. Never heard that one before. > > > >Digital bearer settlement is treason. > >Possibly. Certainly lots of people, you and others, hope so, apparently. > >But, hope, as exemplified by one's politics, or ethics, for that matter, >doesn't have much to do with it. Like I said, nation-states are caused by >physics, not politics. Politics is a result. It is not a cause of anything. >These days, I tend to prefer economics, myself, as a reason for doing >things. YMMV. Religion, applied fiction, if you will, doesn't make physical >reality change anymore except through non-coercive economic means, and I >live for the day when politics, whose very modern definition is the control >of force monopoly, doesn't either. I figure that suckers are born every >minute, if they want to pay money to people who tell them what to think, >ethically, or politically, that's fine by me. > >I'm not resigned to, much less in favor of -- not that what you or I *want* >actually matters -- the ubiquity of the nation state or any other monopoly, >force or otherwise. Nonetheless, we do live in a world of geographic force >monopoly, funded by expropriation and extortion. Like Philip Dick said, >reality doesn't change when you change your mind. > >Part of that expropriation is that nation-states can expropriate your >physical person, put you in jail or kill you, for not agreeing with them, >much less actively thwarting their behavior, particularly in time of war >between nation-states. Part of that extortion is that they can threaten you >with every thing from mobs and vigilantism to, again, murder and kidnap you >if you don't pay them what they tell you you owe them. Their attempts to do >this as efficiently as possible with the least amount of violence, usually >through bribery of their supporters and fraud about that bribery as a >"public good", do nothing more than sugar-coat the fact of their basic >extortion and theft. > >Life is hard. As I said before, "Nation states are a bitch". > > >Certain financial cryptography protocols hold out the, promise, the *hope*, >that functionally anonymous, and completely secure, non-repudiable >transactions can be done on ubiquitous geodesic internetworks without the >requirement of the monopolistic force of nation-states in order to execute, >clear, and settle. > >Economics, and not politics, will determine the answer to that question. > >Furthermore, as has been said by Tim May and others, those transactions >must, sooner or later, execute, clear, and settle in the face of vigorous >*repression* of those transactions, by most, if not all nation-states. > >Though certainly said as expressions of political opinion by Tim May and >others, the efficacy of their survival in the face of such opposition will >be the ultimate determinant of their *economic*, their physical -- and not >political or ethical -- usefulness. That's not surprising, or, for that >matter, hostile to nation-states, per se. Any more than railroads or >television are hostile to nation states, even marginal or "failed" ones, >like Bhutan, or Somalia, or Afghanistan. > >Ultimately, however, *if* those transaction technologies work as >advertised, orthogonal to the nation-state, if you will, they will have >consequences to the nation-state, and, as others have said, might be >considered threats. Clearly lots of people *want* them to threaten >nation-states, but what people want in the absence of *profit* is, also >orthogonal. > >However, and this is most important, at *every* step of the way these >protocols must make money. You can't be like Trotsky and say that the >revolution hasn't come *yet*, with "yet" being permanently defined as "not >now". That means that, plugged into and collateralized by existing >*book-entry* assets, bearer certificates on the net are cheaper than >book-entry transactions on public internetworks, much less the considerably >more expensive book-entry transactions over the proprietary networks of >meatspace. > > >My other claim, contingent on the above admittedly long stretch of >conditionals, that bearer transactions on the net, because they execute not >only anonymously, but more important, *without* the force monopoly of the >nation state, make the transaction costs of nation states, and, ultimately >non-monopolistic force contracting itself, fall, and, accordingly, >dramatically increase the number of "firms", and competition in markets for >force. Anarchocapitalism, right here in River City, folks. > >Crypto-Anarchy, in other words, but not because nation-states can't *catch* >previously illegal transactions, causing their fall and, ultimately, >violent chaos, but because their *competition* in newly emerging >non-monopolistic force markets reduces their market share -- as the net >does to centralized information, the surfacting of markets for force into >recursively smaller and smaller market actors, at lower and lower cost, >with no loss of, if not actual gains in, total individual security -- and >liberty. > > >Finally an even bigger stretch, contingent on all of the above, is the idea >that if the above really does happen, it, among other things, would prove >something that I've always thought was true, something someone else has >probably said before somewhere, though I haven't come across them yet, that >our social structures map to our communication networks, and that Moore's >"Law", in making our network architectures geodesic makes, in turn, our >social structures less hierarchical and more geodesic themselves. > >That, boys and girls, would be very cool indeed, but we ain't there by a >long shot. > >Cheers, >RAH > >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _________________________________________________________________ MSN 8 helps eliminate e-mail viruses. Get 2 months FREE*. http://join.msn.com/?page=features/virus From bill.stewart at pobox.com Tue Apr 22 16:12:34 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 22 Apr 2003 16:12:34 -0700 Subject: Internet dies if GPS dies? Nah. In-Reply-To: <3EA3751E.F351B335@cdc.gov> Message-ID: <5.1.1.6.2.20030422144939.02c848c8@idiom.com> Variola quoted and commented: > > [If GPS dies] "Internet activity would slow to a crawl, because many > > backbone operators rely on precise GPS time stamps to route data. " > > http://www.wired.com/wired/archive/11.05/start.html?pg=6 > Sounds like bullshit to me, data clocks should be able to run without > being fully synched externally, constantly. There are at least three interesting GPS failure modes - Whole system fails at once - Whole system becomes less accurate - Local areas get jammed The article's talking about a failure mode where the satellites gradually wear out over a couple of years and nobody replaces them. From a telco perspective, this is annoying, because GPS is cheaper and better than what we used to do before we adopted it about 5 years ago, and we've got a few hundred billion dollars less ready cash then we did then, and the people who really knew synchronization well have mostly retired or moved to dotcoms, but we could always hire enough of them back to do the job for a lot less money than it would take to redesign GPS, on the off-chance that we haven't replaced enough of the old phone infrastructure with VOIP for it to simply Not Matter by then. It's not like this is Air Traffic Control. [Summary: If you blew GPS out of the sky without warning, major telco synchronization would degrade a bit but not much, voice calls would be more likely to get noise, but not much, internet connections might have a fractional percent more TCP retransmits, and a random number of things that didn't have other timing sources would break until people fixed them. Cell phone systems are the big telecom uncertainty, and of course Air Traffic Control, nuclear missiles, and similar apps.] As Tyler said, SONET synchronization is a complex topic, and telco synchronization is more complex than that. There are two basically separate problems - timestamping / NTP Network Time Protocol, used by lots of Internet stuff, because ISPs sometimes need to know what time it is. - synchronization used in synchronous telco transmission media, which doesn't care about time of day, just about phase. ISPs care about this because they don't like lots of dropped bits, but it takes a lot of dropped bits to really bother TCP. Everybody uses GPS for everything these days, because they _can_, but high-end GPS equipment is about 5 orders of magnitude more accurate than the most demanding NTP things ISPs use it for, and cheap GPS equipment usually gets you millisecond precision, which is about 3 orders of magnitude more than most things care about, and most of them don't care very much. WWV radio clocks were Really Just Fine, and ISPs who needed better clocking could build decent NTP systems. Routers don't care much about phase, because each T1 or fiber interface usually gets timing from the transmission line independently. Voice transmission equipment cares more about phase, because it uses Time Division Multiplexing to switch the voice bits, so a whole voice switch runs on the same clock source - it it's talking to somebody else whose clock is different and drifts by more than the line buffers can fix, it drops a frame of bits or adds a frame of 0s, which will cause brief noise on voice calls or trash one or two data packets. Telcos care about this because they not only care about voice quality, they have SLAs with customers for the number of errored seconds per day/month/etc. that cost money that cost money if they don't meet them, but it takes a lot to get down to cell-phone-in-traffic quality. Telecom sync equipment is categorized in different strata, and normally a box will have a clock that accepts timing from outside and has a Stratum-N-quality holdover clock inside that's guided by the feed. There are lots of different ways to measure the accuracies of these things. A Stratum 1 clock is whatever master timing source you're using, and a Stratum 2 clock is supposed to be able to hold its own for about 5 days before the first slip and not do more than a slip every couple hours after that. A Stratum 3 clock can slip about 10/hour the first day and 132/hour free-running. SONET needs somewhere between Stratum 3 and Stratum 4 to stay connected. The best timing feeds between buildings run on copper T1s, not fiber. GPS is Stratum 1 quality, as long as you've got a good holdover clock, typically Stratum 2 quality for telco offices. A decade ago, a main AT&T, MCI, or Sprint office would have a feed from a Stratum 1 source, and a Stratum 2 clock of its own, and would feed a bunch of smaller offices which had their own clocks. MCI and Sprint tended to use Loran for some of their timing sources; AT&T used really expensive clocks in main offices, and had more offices. An important concept for AT&T is the Building Integrated Timing Source - there's a master clock for each building that feeds all the hardware. Most of the other professional telcos do something similar; I'm not sure if all the upstart newcomers do. Since then, most AT&T offices have their own GPS clock, except a few percent with Bad Radio Magic or building issues which get fed by other nearby offices. I'm not sure how local telcos get their timing - presumably a similar combination of GPS, local clocks, and feeds. They have more small offices which are closer together, but also the clocks keep getting cheaper. Cellular systems are the main telco case I don't understand; some of the newer systems care much more about timing, but the application that needs the most precision is 911 location, because that needs to triangulate between multiple offices as opposed to just handing off calls at the optimum time to avoid drops. It's possible that something could go wrong here, but I'd guess that cell towers are also more likely to be fed by copper T1s, which would give them excellent sync if they need it. (GPS is also useful for finding the precise location of a tower, which phone-locator ICBM-delivery apps care about, but you only need to do that once; the things don't move except in earthquakes.) at least with some of the newer systems, but I'd be surprised. From timcmay at got.net Tue Apr 22 16:55:56 2003 From: timcmay at got.net (Tim May) Date: Tue, 22 Apr 2003 16:55:56 -0700 Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: Message-ID: On Tuesday, April 22, 2003, at 11:46 AM, R. A. Hettinga wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > At 5:39 PM -0700 4/21/03, Tim May accused me of pissing in his > personal catbox: > >> First, Bob should cut back on his massive cross-posting to his >> several self-centered groups (including new ones to me: "Philodex >> Clips" and "dgcchat"). > > Ah. Theoretically, that's a claim made in the absence of data, at > least as far as Mr. May is concerned, because, last time looked, I > was in his killfile. How could you _possibly_ look in my killfile? I often discard older killfiles when I change my system, when I change my mailer, etc. My recollection is that you were in my Eudora Pro killfile, but that was a year or so ago. True, mostly I delete your stuff after only reading the first paragraph. The phony "ums" and "ers" and the silliness about "listen, boys and girls," all of this stuff should be edited out. And the content is, um, redundant. And, er, uninteresting. And that, boys and girls, is enough to make me blow milk out my nose. To use another, um, Hettingaism. > Which might still be the case, because, > inevitably, when someone replies to something I send to cypherpunks, > Tim flames away. :-). And the silly use of smileys. > > So, I plead guilty of creating new mailing list, m'lord, though the > idea for the new list not exactly new. Philodox Clips is an attempt > to put all the forwarded stuff into one list, like I used to do with > the now 5-year-defunct e$pam list, only with, heh, more scope. :-). Have as many lists as you like, er, though it, um, seems to be silly to concentrate so much on spamming material to so many seemingly, um, related lists. Ebuscks, Philodex, E$, DCSB...this seems to be your main industry, creating new little mailing lists. > people want to look at it, including Patrick, :-), so I might as well > put it in, heh, one place. > Too many smileys, too many "heh"s and "um"s and "er"s. Bad enough in spoken speech, and utterly pointless in writings. More examples included below. You really ought to consider a major change in your writing style. The smileys and ums and hehs and ers and phony folksiness distracts from what may be your real message. Unless being a certain kind of prose stylist is your goal...in which case I would even _more_ strongly urge you to tighten up your prose. > Well, somebody *did* call me a "hyperactive genius saint from the > future" once, but I attribute that to, um, misplaced enthusiasm. > ... > That's "functionally anonymous instantaneous internet bearer > transactions executing, clearing, and settling on ubiquitous geodesic > internetworks", to you, Tim. :-). > I'm living proof that > bootstrapping in the absence of revenue is not nearly as easy as it > looks. :-). ... > I'm too stubborn, if not stupid, :-), ... > several people we all know. :-). From camera_lumina at hotmail.com Tue Apr 22 14:39:29 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 22 Apr 2003 17:39:29 -0400 Subject: Three Cheers for the State - RAH RAH RAH Message-ID: Thomas Shaddack wrote... "This is enforceable only with purely money-based economy. But there are activities that are done for non-monetary profit: knowledge, experience, fun. Or plain barter. I remove a virus from your computer, you later drop by to repair my TV; barter, no paper trail. Help me and I will help you when you'll need. Instead of shelving out money for expensive courseware, drop by and I'll explain you how TCP/IP works. Then do the same for me with SQL couple weeks later. Skills and knowledge are a kind of capital as well - the kind of ownership no IRS can audit you for." This is actually done systematically done in parts of the US. It's referred to by various names, including a "time bank". Basically, anyone in the community contributes X hours of their skill, which is counted purely as time in hours. They can then "withdraw" an equivalent number of hours from the bank in terms of the goods and services of the other bank memebers. Strangely, in some parts of the country the system has so proliferated some communities that they have issued "money" that can be spent in local shops. This money is "backed" by X hours in the time bank. There're some people who actually collect these time bank tokens. Now for some reason, there was a lot of talk about these time banks back in the mid 90s, but now I rarely hear about them. I wonder if the potential loss of tax revenue was a factor. Hum...it'd be interesting to look at securing one of those local time banks with financial cryptography. -TD >From: Thomas Shaddack >To: "R. A. Hettinga" >CC: Patrick Chkoreff , dgcchat >, >Subject: Re: Three Cheers for the State - RAH RAH RAH >Date: Tue, 22 Apr 2003 22:16:05 +0200 (CEST) > >On Tue, 22 Apr 2003, R. A. Hettinga wrote: > > >- Opposing any war is treason. > > > > Well, if you're the de facto property of one nation-state or another, > > that's exactly true. Find me someone who isn't, these days. > >I refuse to be a property. Whoever handles me as such, gets open >disrespect and either my open refusal to obey, or, in compliance with >Czech national tradition, a hidden refusal to obey[1]. Unique concept of >sabotage by obedience. > >[1] Refer to "The Good Soldier Schweik", local national hero. > >See also http://www.rferl.org/newsline/1999/07/5-NOT/not-090799.html for >the international politics applications. > > > Isn't it already? Certainly I think that *nothing* should be done > > without profit, that nothing really *is* done without profit to > > somebody, no matter what its governmental designation, and that *all* > > economic activity should be taxed if any of it is, and it *will* be, > > directly in cash, or indirectly in regulation, since we're all the > > "property" of one nation state or another, whether we say we "own > > ourselves" or not. So, maybe you're right. > >This is enforceable only with purely money-based economy. But there are >activities that are done for non-monetary profit: knowledge, experience, >fun. Or plain barter. I remove a virus from your computer, you later drop >by to repair my TV; barter, no paper trail. Help me and I will help you >when you'll need. Instead of shelving out money for expensive courseware, >drop by and I'll explain you how TCP/IP works. Then do the same for me >with SQL couple weeks later. Skills and knowledge are a kind of capital >as well - the kind of ownership no IRS can audit you for. > >Tax this. Regulate this. Good luck. _________________________________________________________________ STOP MORE SPAM with the new MSN 8 and get 2 months FREE* http://join.msn.com/?page=features/junkmail From timcmay at got.net Tue Apr 22 18:26:48 2003 From: timcmay at got.net (Tim May) Date: Tue, 22 Apr 2003 18:26:48 -0700 Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: <200304222027.32292.sfurlong@acmenet.net> Message-ID: On Tuesday, April 22, 2003, at 05:27 PM, Steve Furlong wrote: > On Tuesday 22 April 2003 17:39, Tyler Durden wrote: > >> Hum...it'd be interesting to look at securing one of those local time >> banks with financial cryptography. > > But, but, but...that would be tax fraud. You'd be aiding terrorists. > And > think of the chiiiiildren. And the nexus of taxation is the actual worker (narced out by others), not the means of settlement. The means of settlement is usually cash, folding money, and is not traceable in any plausible way. The attack on off-the-book/under-the-table business transactions is not the clearing mechanism. After all, cash works perfectly well for clearing under-the-table transactions. What nails under-the-table transactions is (rarely, actually) when someone narcs out a partner as a way of getting a lighter sentence. This will all change if cash is ever outlawed, if the Beast insists that all financial transactions be cleared through one of his compliant banks. This is expected to happen soon enough, by more of us than just Xtian Fundies. --Tim May From rah at shipwright.com Tue Apr 22 15:38:10 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 22 Apr 2003 18:38:10 -0400 Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: References: Message-ID: At 10:16 PM +0200 4/22/03, Thomas Shaddack wrote: >Tax this. Regulate this. Good luck. Try to do it for a living. I.E., buy something. Say, food? ...and don't give me that Karl Marx labor theory of value happy horseshit either. :-). As Rocky the Flying Squirrell said onece, "That trick never works!". Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From sfurlong at acmenet.net Tue Apr 22 17:07:35 2003 From: sfurlong at acmenet.net (Steve Furlong) Date: Tue, 22 Apr 2003 20:07:35 -0400 Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: References: Message-ID: <200304222007.35295.sfurlong@acmenet.net> On Tuesday 22 April 2003 18:38, R. A. Hettinga wrote: > Try to do it for a living. I.E., buy something. Say, food? Heh. As the World's Worst Businessman (tm), I can't even buy food when I'm consulting (allegedly) for pay. Good thing I have an employed girlfriend, eh? > As Rocky the Flying Squirrell said onece, "That trick never works!". As Bullwinkle J Moose said once (in the fairly recent live/animated movie, not in the old series), "Kinda makes you feel discouraged." -- Steve Furlong Computer Condottiere Have GNU, Will Travel Guns will get you through times of no duct tape better than duct tape will get you through times of no guns. -- Ron Kuby From sfurlong at acmenet.net Tue Apr 22 17:27:32 2003 From: sfurlong at acmenet.net (Steve Furlong) Date: Tue, 22 Apr 2003 20:27:32 -0400 Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: References: Message-ID: <200304222027.32292.sfurlong@acmenet.net> On Tuesday 22 April 2003 17:39, Tyler Durden wrote: > Strangely, in some parts of the country the system has so > proliferated some communities that they have issued "money" that can > be spent in local shops. This money is "backed" by X hours in the > time bank. There're some people who actually collect these time bank > tokens. > > Now for some reason, there was a lot of talk about these time banks > back in the mid 90s, but now I rarely hear about them. I wonder if > the potential loss of tax revenue was a factor. The IRS claims jurisdiction over all time banks and barter exchanges. Each participant is required to provide his SSN for reporting, and all transactions must be logged. Taxes must be paid for time worked. > Hum...it'd be interesting to look at securing one of those local time > banks with financial cryptography. But, but, but...that would be tax fraud. You'd be aiding terrorists. And think of the chiiiiildren. -- Steve Furlong Computer Condottiere Have GNU, Will Travel Guns will get you through times of no duct tape better than duct tape will get you through times of no guns. -- Ron Kuby From shaddack at ns.arachne.cz Tue Apr 22 13:16:05 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Tue, 22 Apr 2003 22:16:05 +0200 (CEST) Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: Message-ID: On Tue, 22 Apr 2003, R. A. Hettinga wrote: > >- Opposing any war is treason. > > Well, if you're the de facto property of one nation-state or another, > that's exactly true. Find me someone who isn't, these days. I refuse to be a property. Whoever handles me as such, gets open disrespect and either my open refusal to obey, or, in compliance with Czech national tradition, a hidden refusal to obey[1]. Unique concept of sabotage by obedience. [1] Refer to "The Good Soldier Schweik", local national hero. See also http://www.rferl.org/newsline/1999/07/5-NOT/not-090799.html for the international politics applications. > Isn't it already? Certainly I think that *nothing* should be done > without profit, that nothing really *is* done without profit to > somebody, no matter what its governmental designation, and that *all* > economic activity should be taxed if any of it is, and it *will* be, > directly in cash, or indirectly in regulation, since we're all the > "property" of one nation state or another, whether we say we "own > ourselves" or not. So, maybe you're right. This is enforceable only with purely money-based economy. But there are activities that are done for non-monetary profit: knowledge, experience, fun. Or plain barter. I remove a virus from your computer, you later drop by to repair my TV; barter, no paper trail. Help me and I will help you when you'll need. Instead of shelving out money for expensive courseware, drop by and I'll explain you how TCP/IP works. Then do the same for me with SQL couple weeks later. Skills and knowledge are a kind of capital as well - the kind of ownership no IRS can audit you for. Tax this. Regulate this. Good luck. From ravage at einstein.ssz.com Tue Apr 22 20:18:40 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 22 Apr 2003 22:18:40 -0500 (CDT) Subject: Slashdot | More on Cisco Building Surveillance into Routers (fwd) Message-ID: http://yro.slashdot.org/yro/03/04/22/1656215.shtml?tid=158&tid=95&tid=137 -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From rah at shipwright.com Tue Apr 22 20:20:45 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 22 Apr 2003 23:20:45 -0400 Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: <200304222007.35295.sfurlong@acmenet.net> References: <200304222007.35295.sfurlong@acmenet.net> Message-ID: At 8:07 PM -0400 4/22/03, Steve Furlong wrote: >As the World's Worst Businessman (tm), Take heart, I think I've got you beat, at the moment. :-). Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Tue Apr 22 21:02:33 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Wed, 23 Apr 2003 00:02:33 -0400 Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: References: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 4:55 PM -0700 4/22/03, Tim May deigned to flame my prose, pointing out a mild inadvertant conundrum: >> Ah. Theoretically, that's a claim made in the absence of data, at >> least as far as Mr. May is concerned, because, last time looked, I >> was in his killfile. > >How could you _possibly_ look in my killfile? Ah. There you go again, accenting the trivial, while ignoring the substantive. Frankly, forgetting it wasn't September, I expected some undergrad to come running to your logical rescue, but you did so yourself, promptly, in proper adolescent fashion, I might add, with every thing but the "so there" and sticking your tongue out. I knew, reading it as it came back off the list (how's that for self-absorbed?), that that little malaprop would come back and bite me in the ass. Frankly, I was too lazy to fix it. I might have said "heard", of course, instead of "looked", though, literally "looked" was true, since I *see* you, on this list, put me in your kill-file about once a year, every year, since, oh, 1995 or so. So, let's use "heard" instead --metaphorically, of course -- as in "heard" from Mr. May about it, as in publicly "heard". As in repeatedly "heard". As in, dare I say, er, um, redundantly "heard"? Nahhh... that's too lumpy. :-). Frankly, I would never killfile Mr. May, because, at the very least, he provides 9/10ths of the entertainment around here these days, between his affected racism, sexism, anti-semitism, threats of physical violence and genuine paranoia (see Olsen in the .sig, below...), and, like All True Literate Aryans (his word, not mine, folks), he doesn't even use emoticons. ;-). As for me being redundant, guilty as charged, m'lord. Same shit, different day, every day, since heh, May-ish, 1994. That's 18 months less redundancy than October 1992, I suppose. :-P... (See? I have a tongue, too, though I drool a bit when I use it too much.) For entertainment, let's see how fast I can get myself back into Tim's kill-file again, shall we? Let's see if he's read down this far... Hey, Tim, threatened anyone on Usenet with raping their wife and children lately? Cheers, =:-)=- RAH ^^^^^^ (aka BeelzeBob. I'm sooo bad today...) -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPqYP+MPxH8jf3ohaEQIqugCgqUCmfvzy6MvYUAw2sP0Wg/Un6SAAoLaw XCBHnrdSor75B32mO0wJi5zG =XPE5 -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "When I was your age we didn't have Tim May! We had to be paranoid on our own! And we were grateful!" --Alan Olsen From ptrei at rsasecurity.com Wed Apr 23 07:12:19 2003 From: ptrei at rsasecurity.com (Trei, Peter) Date: Wed, 23 Apr 2003 10:12:19 -0400 Subject: RSA Show impressions Message-ID: > Steve Schear[SMTP:schear at attbi.com] > > This year's RSA show was, like it predecessors, mostly a schmooze > event. Shrunk at least 1/3 in floor space from the 2001/2 events, it > certainly reflected the changes in this industry. > Steve: [Don't take this as an Official RSA Statement - it's just my personal opinion. -pt] 1. The floor space - the north half of Moscone - was identical to last year. We sold out the booths months ahead of time. 2. Attendence was up over last year, well over 10,000, with 3,000+ full memberships - again up over last year. > I was surprised and a bit dismayed that I saw few familiar faces. A brief > > talk with Stacy Cannan, of L.J. Kushner, the leading security industry > recruiter, confirmed my suspicions that many senior level people had left > the industry in the past two years. The booths were mostly manned with > the > latest generation of newly graduated fodder. There didn't seem to be much > activity (or smiles for that matter) in most booths. This is probably > reflecting the exit/acquisition of some early players, decreased level of > IT spending, and the increasing impact of open source security > solutions. About the most amusing thing was receiving a "Regime change > begins at home" button from one of the executives. > > steve > I've been going to the conference almost since the start, and while it did not match the euphoria of the dot.com boom period, the atmosphere felt more upbeat than last year (which was just a few months post-911). There is turnover, of course. But many of the old players are still there. I got my 'regime change' button from Bruce Schneier, along with an dedicated copy of 'Secrets and Lies'. (Trivia alert: Bruce was actually the very first vendor at the RSA Conference. At the second one (11 years ago) he set up a card table in the hall and peddled copies of the first edition of "Applied Cryptography".) Peter Trei From camera_lumina at hotmail.com Wed Apr 23 07:28:18 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 23 Apr 2003 10:28:18 -0400 Subject: Three Cheers for the State - RAH RAH RAH Message-ID: >But, but, but...that would be tax fraud. You'd be aiding terrorists. >And >think of the chiiiiildren. Harumph. I take exception to the "fraud" part. No fraud would be involved. It's just brazenly not paying taxes. Oh yeah. A funny picture just occurred to me. If there be any bills, they should have a picture of a homeless Uncle Sam, wearing tattered and torn clothes, with his hand outstretched and his empty palm open, looking for some loose change. -TD _________________________________________________________________ The new MSN 8: smart spam protection and 2 months FREE* http://join.msn.com/?page=features/junkmail From ptrei at rsasecurity.com Wed Apr 23 08:18:28 2003 From: ptrei at rsasecurity.com (Trei, Peter) Date: Wed, 23 Apr 2003 11:18:28 -0400 Subject: Metaswitch cleared by FBI for spying Message-ID: > Ralf-Philipp Weinmann[SMTP:ralf at fimaluka.org] writes: > > Easier still might be porting Nautilus or Speak Freely to the Zaurus or > just using ZMeeting over an IPsec tunnel over a GPRS connection. > > Cheers, > Ralf > I know that there have been projects underway to port SpeakFreely to 802.11 enabled Linux Ipaqs - I think they actually work. Peter Trei From ptrei at rsasecurity.com Wed Apr 23 08:33:09 2003 From: ptrei at rsasecurity.com (Trei, Peter) Date: Wed, 23 Apr 2003 11:33:09 -0400 Subject: date formats (was Re: Single Point of Weakness is in the Work s.Thank you Major Tom.) Message-ID: > Sunder[SMTP:sunder at sunder.net] > > > Guys, let's please change the subject from now on when we are no longer > talking about the original issues. > > > One marketing vp at an old little hole in the wall company used to date > things the european way on purpose, so as to look more sophisticated or > some nonsense. > > Funny how that didn't save the company when the bubble burst. > > I've always preferred YYYY.MM.DD, this way you can sort things very > easily. If you write the names of the months, it doesn't translate well > to other languages, though it may be similar, *AND* more importantly from > a geek perspective, if you do a sort, April shows as the 1st month of the > year, before January - not good. > > If you do the reverse DD.MM.YYYY you can't sort it either since the 1st > day of every month shows up 1st. Dumb. Friendly to non-geeks, but dumb. > > The worst annoyance I've seen is using Unix time as a timestamp on log > dates. It's the most unreadable of all formats. Sorts nicely though, but > what a bitch to read. (Unix time being the number of seconds in decimal > since 1/1/1970.) > > I use YYYYMMDD when automatic sorting may be required, for just that reason. In all others situations, I use DD name_of_month YYYY to disambiguate the format. I grew up in Europe, and moved back to the States after college. I've had long exposure to both formats, and don't automatically assume one or the other. It's gotten worse recently. Since the turn of the century, all three fields are frequently below 13. 04/05/03 or 05/04/03 are very ambiguous. 04/05/2003 is still confusing. 20030405 is good for computers 5 April 2003 is unambiguous. Peter Trei From anonymous at panta-rhei.dyndns.org Wed Apr 23 06:15:10 2003 From: anonymous at panta-rhei.dyndns.org (anonymous at panta-rhei.dyndns.org) Date: 23 Apr 2003 13:15:10 -0000 Subject: New Lawsuit from JimB Message-ID: > According the WWA prosecutor's web page, Robb London > has moved on, perhaps to the gargantuan homeland terrorism > upmarket. Not sure where Jeff Gordon is, anybody know? Yes: we will be posting his new address shortly, along with the name and address of his family doctor. From timcmay at got.net Wed Apr 23 16:30:56 2003 From: timcmay at got.net (Tim May) Date: Wed, 23 Apr 2003 16:30:56 -0700 Subject: Quarantines may be justified In-Reply-To: <5.2.0.9.0.20030422104433.045781d0@pop.ix.netcom.com> Message-ID: On Tuesday, April 22, 2003, at 08:16 AM, John Kelsey wrote: > At 05:22 PM 4/19/03 -0400, david wrote: > ... >> It is the initiation of force that is wrong. People who try to rob >> others should have their behavior regulated by being killed by >> their intended victims. > > In order to distinguish when force has been initiated, you have to > have some agreed-upon definitions of rights. The whole argument > you're in here about smoking has to do with boundaries of rights. > Harmon says your cigarette smoke is a form of assault. This may or > may not be valid, but it's certainly possible to come up with kinds of > fumes that are a violation of the rights of the people forced to > endure them (think of mustard gas, or even the smell of raw sewage), > so it's not obviously bogus. > > In practice, this is an area where simple rights arguments don't work > all that well, because there are big areas of gray. But in practice, in real practice out on the streets, this has never been where the anti-smoking laws have been invoked. No state in the U.S., to my knowledge, bans smoking outside, on public streets. There may be a few places near public congregation areas, near air intakes, etc. There may even be a few isolated cases of towns passing "no smoking anywhere on our streets" laws. But, by and large, the anti-smoking laws are confined to restaurants, office buildings, stores, city offices, and other indoor places. So the real debate is not about Harmon's extreme example of not liking the smell of cigarettes when he walks past a smoker, but the issue of anti-smoking laws in the above examples. And here the issue is about as nearly unambiguous as one can get: it is up to the property owner to decide on smoking policies on his property. This was as it once was, and it worked very well. Some restaurants barred smoking, some permitted it, some set up different sections. Likewise, some companies barrred smoking, some permitted it, some set up smoking lounges, etc. (As a nonsmoker, as one who has never taken a single puff on any kind of cigarette or cigar or pipe, I thought smoking was incredibly wasteful, dirty, and annoying. I used to see engineers and technicians going off to take smoking breaks (they would have argued that their alertness was then raised by the nicotine hit). Whatever my views, it was up to my employer to establish his policies. It was not up to some outside party to tell my employer what to allow and what not to allow.) > How about if whenever I see someone smoking in public, I go stand > upwind of them and open my package of Instant Sarin Mix? Which one > of us is initiating force? How about if I'm more polite, and merely > open my package of Instant Skunk Scent Mix? The issue is where you > draw the line, and the problem is that there's no unambiguously right > answer. > > The only way to resolve this peaceably is to have some agreed-upon > standards to resolve the gray areas into solid lines. Those > agreed-upon standards are sometimes in the form of written laws, > sometimes in the form of precedent in case law, and are very often > simply the unwritten standards of conduct that most people live by > most of the time. And often they need courts of some kind to rule on > gray areas that exist even within those rules. The Schelling point for such rights was agreed-upon a couple of centuries ago with the protection of property rights. My house, my rules. Your house, your rules. Examples like Sarin are not helpful, as they differ massively from the annoyance of smoking. --Tim May "As my father told me long ago, the objective is not to convince someone with your arguments but to provide the arguments with which he later convinces himself." -- David Friedman From timcmay at got.net Wed Apr 23 17:37:22 2003 From: timcmay at got.net (Tim May) Date: Wed, 23 Apr 2003 17:37:22 -0700 Subject: Makeup as low-tech measure against automated face recognition? In-Reply-To: Message-ID: On Wednesday, April 23, 2003, at 04:42 PM, Thomas Shaddack wrote: > Vnity is about as old as mankind. With vanity, various ways come to > change > one's appearance. > > Wider lips. Narrower mouth. Wider eyes. Different shape of eyes. Name a > facial feature, there is a way to enhance or suppress it. > > Face-recognition systems rely on visual appearance. They typically need > edges - edges of mouth, edges of eyes...; one popular algorithm for > indexing a face is recognizing these points and measuring their > distance. > A little amount of properly applied pigment could shift these values by > couple percents. > > So low-tech device a lipstick is could be a potential tool for lowering > the probability of a successful identification by face recognition. > Ladies > often carry many more similar "terrorist tools" in their purses. > > Opinions, comments? These reasons are largely why ear shape, ear-eye-mouth geometry, etc., have been increasingly used in face recognition schemes. It is very difficult to use makeup to modify fundamental geometries over these scales, and fundamental geometries are easy to do math on (using affine or projective geometry, for example). While a woman may be able to change her eye appearance, her lip shape, or even her eyebrow shape, she cannot easily change the affine geometry of ear-nose-eye-chin. Men cannot do even this, lest they be considered fags, but they can of course change beard characteristics...which is why no face recognitions worth a dime to Big Brother use facial hair (or hair style in general) as a determinant. A friend of mine is doing a lot of work with "support vector machines" as generalization of neural nets, Hopfield networks, and other learning systems. Quite amazing how hard it is to hide from such classifiers. A little bit of makeup just doesn't do it, not when these systems have been trained on hundreds of thousands of exemplars with varying amounts of eye shade, eye liner, lipstick, and facial hair alterations. --Tim May "The whole of the Bill [of Rights] is a declaration of the right of the people at large or considered as individuals... It establishes some rights of the individual as unalienable and which consequently, no majority has a right to deprive them of." -- Albert Gallatin of the New York Historical Society, October 7, 1789 From ravage at einstein.ssz.com Wed Apr 23 17:54:27 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 23 Apr 2003 19:54:27 -0500 (CDT) Subject: [eff-austin] Super-DMCA hearing (fwd) Message-ID: ---------- Forwarded message ---------- Date: Wed, 23 Apr 2003 09:38:40 -0500 From: Jon Lebkowsky To: Leaders , Eff-Austin Cc: William Harrell Subject: [eff-austin] Super-DMCA hearing Last night the Texas legislature held a hearing on HB2121, aka "super DMCA" proposed by the MPAA. I don't have time for an extended comment, but thanks primarily to testimony by EFF-Austin directors Doug Barnes and Adina Levin, there was no action on the bill. Says Doug, "The chair ended saying that the bill clearly needed a lot of work, and encouraging the various folks in attendance to work on modifying the bill." We'll follow up with more info about next steps etc. We should all thank Doug and Adina for making it down to testify effectively with little notice. best, Jon L. -- Jon Lebkowsky jonl at polycot.com President, EFF-Austin http://www.effaustin.org From zem at vigilant.tv Wed Apr 23 04:19:55 2003 From: zem at vigilant.tv (zem) Date: Wed, 23 Apr 2003 21:19:55 +1000 Subject: Anonymous blog experiment, take two Message-ID: <200304232119.58021.zem@vigilant.tv> I've put together an experimental remailer/PGP interface to a weblog hosting service. Creating a blog and posting are entirely one-way processes via Mixmaster; there's no need for nyms or reply blocks. The short version, for those familiar with PGP and mixmaster: To create a blog, generate a new PGP key. Set the Name field to 'invisiblog' and optionally put a name or description in the Comment field. Use mixmaster to send the ascii-exported public key to signup at invisiblog.com. Each new blog will show up at http://invisiblog.com/ as soon as its key is received. To post, clearsign a message and send it to post at invisiblog.com. The fingerprint of the signing key is used to figure out which blog to post it to. There's no way to delete or modify posts. If a first attempt at creating a blog or posting fails, resend - it'll ignore dupes. More details here: Step-by-step signup and posting instructions: Anonymous weblogs will be linked from here as they are created: -- mailto:zem at vigilant.tv F289 2BDB 1DA0 F4C4 DC87 EC36 B2E3 4E75 C853 FD93 http://vigilant.tv/ "..I'm invisible, I'm invisible, I'm invisible.." --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From declan at well.com Wed Apr 23 21:01:13 2003 From: declan at well.com (Declan McCullagh) Date: Thu, 24 Apr 2003 00:01:13 -0400 Subject: FC: Speaking to MIT Tech/Eros group today (Thursday, 4/24) Message-ID: Join the Tech/Eros group for an informal discussion with renowned technology policy journalist Declan McCullagh. McCullagh is the chief political correspondent for CNET's News.com and moderator of the Politech List (www.politechbot.com). Among other topics, McCullagh will be talking about how current government cyber-policies affect sexual expression on the Internet. McCullagh is a frequent guest on national news shows and was formerly the Washington correspondent for Wired News. He is also a photographer. Come meet McCullagh Thursday, April 24, 5PM in the conference room at E32-300 on the MIT campus. The Tech/Eros Group is made possible by a generous grant from the Initiative on Technology and Self at MIT. Tech/Eros (www.techeros.org) is a research group of scholars, scientists and writers devoted to analyzing the connection between technology and sexuality. If you would like more information about Tech/Eros, write to Annalee Newitz at godzilla at mit.edu. ------------------------------------------------------------------------- POLITECH -- Declan McCullagh's politics and technology mailing list You may redistribute this message freely if you include this notice. ------------------------------------------------------------------------- To subscribe to Politech: http://www.politechbot.com/info/subscribe.html This message is archived at http://www.politechbot.com/ Declan McCullagh's photographs are at http://www.mccullagh.org/ Like Politech? Make a donation here: http://www.politechbot.com/donate/ ------------------------------------------------------------------------- --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Wed Apr 23 21:37:02 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Thu, 24 Apr 2003 00:37:02 -0400 Subject: FC: Speaking to MIT Tech/Eros group today (Thursday, 4/24) Message-ID: --- begin forwarded text From shaddack at ns.arachne.cz Wed Apr 23 16:42:58 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Thu, 24 Apr 2003 01:42:58 +0200 (CEST) Subject: Makeup as low-tech measure against automated face recognition? Message-ID: Vnity is about as old as mankind. With vanity, various ways come to change one's appearance. Wider lips. Narrower mouth. Wider eyes. Different shape of eyes. Name a facial feature, there is a way to enhance or suppress it. Face-recognition systems rely on visual appearance. They typically need edges - edges of mouth, edges of eyes...; one popular algorithm for indexing a face is recognizing these points and measuring their distance. A little amount of properly applied pigment could shift these values by couple percents. So low-tech device a lipstick is could be a potential tool for lowering the probability of a successful identification by face recognition. Ladies often carry many more similar "terrorist tools" in their purses. Opinions, comments? From adam at cypherspace.org Wed Apr 23 20:42:33 2003 From: adam at cypherspace.org (Adam Back) Date: Thu, 24 Apr 2003 04:42:33 +0100 Subject: Makeup as low-tech measure against automated face recognition? In-Reply-To: ; from shaddack@ns.arachne.cz on Thu, Apr 24, 2003 at 01:42:58AM +0200 References: Message-ID: <20030424044233.A7958367@exeter.ac.uk> There was a paper at Privacy Enhancing Technologies 03 on this topic: "Engineering Privacy in Public: Confounding Face Recognition", James Alexander and Jonathan Smith. It's full of pictures of one of the authors with various forms of facial makeup, glasses, hats, stockings (over head bank-robber style), dazzled camera with pen-light laser, etc, plus an empirical analysis of the disguise efficacy in hiding identity against I think a face recognition system called FERET. A copy seems to be online here: http://petworkshop.org/preproc/07-preproc.pdf Adam On Thu, Apr 24, 2003 at 01:42:58AM +0200, Thomas Shaddack wrote: > Vnity is about as old as mankind. With vanity, various ways come to change > one's appearance. > > Wider lips. Narrower mouth. Wider eyes. Different shape of eyes. Name a > facial feature, there is a way to enhance or suppress it. > > Face-recognition systems rely on visual appearance. They typically need > edges - edges of mouth, edges of eyes...; one popular algorithm for > indexing a face is recognizing these points and measuring their distance. > A little amount of properly applied pigment could shift these values by > couple percents. > > So low-tech device a lipstick is could be a potential tool for lowering > the probability of a successful identification by face recognition. Ladies > often carry many more similar "terrorist tools" in their purses. > > Opinions, comments? From juicy at melontraffickers.com Thu Apr 24 05:44:25 2003 From: juicy at melontraffickers.com (A.Melon) Date: Thu, 24 Apr 2003 05:44:25 -0700 (PDT) Subject: Bad Elf. In-Reply-To: <5.1.0.14.0.20030424213652.00a4b4e0@mail.nex.com.au> References: <5.1.0.14.0.20030424213652.00a4b4e0@mail.nex.com.au> Message-ID: > Pierre Lethier, 48, had been wanted by the French authorities since > September 2000 on suspicion that he helped illicitly divert Elf funds to > secure the company's 1992 acquisition of the eastern German Leuna refinery > complex. This and a variety of other stuff, is showing up in RAZOR2. Whichever fucking asshole out there is reporting some of Fuhrer Rat's cypherpunk mail to RAZOR or any other UE signature repository, needs to stop now. From schear at attbi.com Thu Apr 24 07:36:07 2003 From: schear at attbi.com (Steve Schear) Date: Thu, 24 Apr 2003 07:36:07 -0700 Subject: Makeup as low-tech measure against automated face recognition? In-Reply-To: References: Message-ID: <5.2.1.1.0.20030424073322.049d0d30@mail.attbi.com> At 05:37 PM 4/23/2003 -0700, Tim May wrote: So low-tech device a lipstick is could be a potential tool for lowering >>the probability of a successful identification by face recognition. Ladies >>often carry many more similar "terrorist tools" in their purses. >> >>Opinions, comments? > >These reasons are largely why ear shape, ear-eye-mouth geometry, etc., >have been increasingly used in face recognition schemes. It is very >difficult to use makeup to modify fundamental geometries over these >scales, and fundamental geometries are easy to do math on (using affine or >projective geometry, for example). > >While a woman may be able to change her eye appearance, her lip shape, or >even her eyebrow shape, she cannot easily change the affine geometry of >ear-nose-eye-chin. Men cannot do even this, lest they be considered fags, >but they can of course change beard characteristics...which is why no face >recognitions worth a dime to Big Brother use facial hair (or hair style in >general) as a determinant. > >A friend of mine is doing a lot of work with "support vector machines" as >generalization of neural nets, Hopfield networks, and other learning >systems. Quite amazing how hard it is to hide from such classifiers. A >little bit of makeup just doesn't do it, not when these systems have been >trained on hundreds of thousands of exemplars with varying amounts of eye >shade, eye liner, lipstick, and facial hair alterations. Despite the widespread municipal bans against wearing masks in public (except during Halloween), its still widely legal to wear a motorcycle helmet with faceplate in place outdoors. I've never heard of anyone hassled for wearing one when the didn't just step off a bike. steve From timcmay at got.net Thu Apr 24 09:26:23 2003 From: timcmay at got.net (Tim May) Date: Thu, 24 Apr 2003 09:26:23 -0700 Subject: Makeup as low-tech measure against automated face recognition? In-Reply-To: <5.2.1.1.0.20030424073322.049d0d30@mail.attbi.com> Message-ID: <7D0339E2-7671-11D7-B966-000A956B4C74@got.net> On Thursday, April 24, 2003, at 07:36 AM, Steve Schear wrote: > > Despite the widespread municipal bans against wearing masks in public > (except during Halloween), its still widely legal to wear a motorcycle > helmet with faceplate in place outdoors. I've never heard of anyone > hassled for wearing one when the didn't just step off a bike. With SARS, a large surgical mask covers nearly all of the identification markers. Add a pair of sunglasses or tinted eyeglasses and nearly nothing remains. However, the long-term implications are clear: computers become so cheap and cameras so ubiquitous that public movements are trackable. Many have written on this already. It's a signal detection problem, and the odds favor the trackers. (Which may cause more people to limit public purchases, to limit public shopping. Which can help crypto in private places, where the reverse of the above is the case: technology favors the person trying to hide, not the watchers. Crypto wins here.) --Tim May ""Guard with jealous attention the public liberty. Suspect everyone who approaches that jewel. Unfortunately, nothing will preserve it but downright force. Whenever you give up that force, you are ruined." --Patrick Henry --Tim May "A democracy cannot exist as a permanent form of government. It can only exist until the voters discover that they can vote themselves money from the Public Treasury. From that moment on, the majority always votes for the candidate promising the most benefits from the Public Treasury with the result that a democracy always collapses over loose fiscal policy always followed by dictatorship." --Alexander Fraser Tyler From adam at homeport.org Thu Apr 24 06:33:52 2003 From: adam at homeport.org (Adam Shostack) Date: Thu, 24 Apr 2003 09:33:52 -0400 Subject: Makeup as low-tech measure against automated face recognition? In-Reply-To: <20030424044233.A7958367@exeter.ac.uk> References: <20030424044233.A7958367@exeter.ac.uk> Message-ID: <20030424133352.GA17797@lightship.internal.homeport.org> At the workshop, I talked to James about using make-up to create different lines that would be picked up, ie, a wider nose drawn in brightly. He was very skeptical. Adam On Thu, Apr 24, 2003 at 04:42:33AM +0100, Adam Back wrote: | There was a paper at Privacy Enhancing Technologies 03 on this topic: | | "Engineering Privacy in Public: Confounding Face Recognition", James | Alexander and Jonathan Smith. | | It's full of pictures of one of the authors with various forms of | facial makeup, glasses, hats, stockings (over head bank-robber style), | dazzled camera with pen-light laser, etc, plus an empirical analysis | of the disguise efficacy in hiding identity against I think a face | recognition system called FERET. | | A copy seems to be online here: | | http://petworkshop.org/preproc/07-preproc.pdf | | Adam | | On Thu, Apr 24, 2003 at 01:42:58AM +0200, Thomas Shaddack wrote: | > Vnity is about as old as mankind. With vanity, various ways come to change | > one's appearance. | > | > Wider lips. Narrower mouth. Wider eyes. Different shape of eyes. Name a | > facial feature, there is a way to enhance or suppress it. | > | > Face-recognition systems rely on visual appearance. They typically need | > edges - edges of mouth, edges of eyes...; one popular algorithm for | > indexing a face is recognizing these points and measuring their distance. | > A little amount of properly applied pigment could shift these values by | > couple percents. | > | > So low-tech device a lipstick is could be a potential tool for lowering | > the probability of a successful identification by face recognition. Ladies | > often carry many more similar "terrorist tools" in their purses. | > | > Opinions, comments? -- "It is seldom that liberty of any kind is lost all at once." -Hume From declan at well.com Thu Apr 24 08:05:04 2003 From: declan at well.com (Declan McCullagh) Date: Thu, 24 Apr 2003 11:05:04 -0400 Subject: Give money to Iraq charities, go to jail Message-ID: <5.2.0.9.0.20030424110409.010ca948@mail.well.com> NEWS RELEASE Glenn T. Suddaby, United States Attorney for the Northern District of New York, announced today that OSAMEH ALWAHAIDY has entered a plea of guilty in U.S. District Court, Syracuse to a prosecutor's Information charging him with violating the International Emergency Economic Powers Act (IEEPA) by sending money to Iraq in violation of the sanctions imposed on that country. In entering his guilty plea, ALWAHAIDY, age 41, Fayetteville, New York, admitted that he assisted others at "HELP THE NEEDY" in sending money to Iraq, notwithstanding his knowledge that sanctions had been imposed on that country since 1990 prohibiting such transactions. Specifically, ALWAHAIDY admitted allowing RAFIL DAHFIR to use checks from an account on which ALWAHAIDY was a signatory to transfer money from HELP THE NEEDY'S account to the private accounts of another indicted defendant, MAHER ZAGHA. ALWAHAIDY further admitted that on October 25, 1999, November 9, 1999, and February 23, 2000, he helped transfer $20,000, $50,000, and $30,000 respectively to MAHER ZAGHA's business account in Jordan knowing those funds would be forwarded to individuals in Iraq. ALWAHAIDY stated in the plea agreement that he believed that the money was intended to help needy people, especially needy people in Iraq. The government noted in Court, however, that the purpose of the prohibitions on transfers of money into Iraq is to prevent money sent for any purpose from being misused once in Iraq and that it's investigation into the use of that money once it was sent to Jordan is still under investigation. ALWAHAIDY had previously been charged with conspiracy to violate IEEPA in an Indictment that was made public on February 26, 2003. Conspiracy to violate IEEPA is a charge that carries a maximum possible penalty of five years incarceration. As a result of today's guilty plea, ALWAHAIDY faces a maximum possible penalty of ten years incarceration when he is sentenced. In addition, he faces a maximum possible fine of $250,000. A special assessment of $100 is also mandatory in a case of this type. The plea agreement filed today provides that the conspiracy charge pending against ALWAHAIDY will be dismissed at the time of his sentencing and he will not be furthered charged in connection with this case. Finally, the plea agreement contemplates that he will cooperate with the government in its ongoing investigation. The Honorable Norman A. Mordue, U.S. District Court Judge, presided over today's proceeding. The entry of this plea is a result of the continuing investigation undertaken by agents from the Federal Bureau of Investigation; the Internal Revenue Service; the Social Security Administration, Office of Inspector General; the Defense Criminal Investigation Service; the New York State Police; the United States Customs Service; the Immigration and Naturalization Service; the U.S. Postal Service; the Department of Health and Human Services, Office of Inspector General; and the United States Marshals Service. Although additional information concerning this case will be limited at this time, further inquiries can be directed to First Assistant U.S. Attorney Joseph A. Pavone at (315) 448-0672. From frantz at pwpconsult.com Thu Apr 24 11:06:38 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Thu, 24 Apr 2003 11:06:38 -0700 Subject: Makeup as low-tech measure against automated face recognition? In-Reply-To: <20030424133352.GA17797@lightship.internal.homeport.org> References: <20030424044233.A7958367@exeter.ac.uk> <20030424044233.A7958367@exeter.ac.uk> Message-ID: At 6:33 AM -0700 4/24/03, Adam Shostack wrote: >At the workshop, I talked to James about using make-up to create >different lines that would be picked up, ie, a wider nose drawn in >brightly. He was very skeptical. > >Adam > > >On Thu, Apr 24, 2003 at 04:42:33AM +0100, Adam Back wrote: >| There was a paper at Privacy Enhancing Technologies 03 on this topic: >| >| "Engineering Privacy in Public: Confounding Face Recognition", James >| Alexander and Jonathan Smith. >| >| It's full of pictures of one of the authors with various forms of >| facial makeup, glasses, hats, stockings (over head bank-robber style), >| dazzled camera with pen-light laser, etc, plus an empirical analysis >| of the disguise efficacy in hiding identity against I think a face >| recognition system called FERET. >| >| A copy seems to be online here: >| >| http://petworkshop.org/preproc/07-preproc.pdf >| >| Adam Ah, but the surgical masks made popular by the SARS outbreak will cover most of the signs. Add ear coverings for cold climates, and I suspect the accuracy will go way down. Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From patrick at fexl.com Thu Apr 24 08:09:00 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Thu, 24 Apr 2003 11:09:00 -0400 Subject: [Lucrative-L] lucrative accounts revisited In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Thursday, April 24, 2003, at 10:28 AM, R. A. Hettinga wrote: > ... Since we're literally moving title to an asset around the net > instead > of changing records in a database somewhere (remember the > double-spend database at the mint is only *redeemed* notes, not > copies of what's out there), ... I am taking a different approach, where the server stores RIPEMD-160 hashes of all the redeemable coins "out there." It completely forgets redeemed coins. Because the server only stores hashes, the entire contents of the server database could literally be published on the web in streaming live form without seriously reducing the security of the system. Of course, this would be stupid because it would needlessly invite collision attacks, but in principle the idea of avoiding security through obscurity could be applied to the database itself. But then, why not hide the hash file behind a Unix password, and behind an AES-256 key while we're at it? :-) So a coin consists of an lseek position in the server data file, 256 bits of random gibberish, and 64 bits representing the amount. When you present the coin to the server, the server hashes it and looks at the given lseek position. If it matches, it manufactures a new coin at some other lseek place and sends it to you. You store the coin, compute the RIPEMD-160 hash yourself, and send that to the server, at which point it kills the old coin and enlivens the new coin. Obviously all the smart folks who talk about storing only the redeemed notes and even using probabilistic double-spend detection methods have reasons for doing so. I expect my scheme will be slapped down forthwith. :-) > Finally, I would also strongly recommend that we try like hell not to > invent new cryptographic conventions, much less new cryptography, > here. You're preaching to the choir here. I haven't seen any snake oil proposals lately (unless I just gave one above. :-) > First, crypto is hard. :-), and our chances of actually inventing > something new that isn't trivially broken on its face is even harder. > Obviously, if you're one of those big swinging di-, er, big giant > heads, who actually do the math, understand what cryptography > protocols do, and see something that's wrong, or that you can do > better, that's different, but there's a whole lot of time that can be > wasted in reinventing the wheel here that won't get us to code that > earns money. ... Good C libraries for existing crypto protocols are always welcome. I'm just getting Rijndael, RSA, RIPEMD, BBS, etc. into a shape I like. Mostly, I don't like routines that declare *anything* on the stack -- all of my working space is allocated on a single 4k mlocked page up front and Mersenne-twisted before munlock and free. > Second, and in that vein, there is a whole published language of > crypto that's already being used, and if we don't use it from the > outset, nobody will understand us later if we get stuck. In > particular, a trusted third party, or trusted entity, is "Trent", for > some reason, probably because Schneier had it in Applied Cryptography > 10 or 12 years ago. :-). Ah, Marvin for "medium" considered non-standard. :-) OK, Trent it is. > We should change nomenclature only when we've added to it, yes? > > Believe me, we'll get there, especially after we're actually > operating this code the way we want it to run, at a profit, in an > open market. That's certainly something that nobody's done before, > :-), and we're going to have our hands full when we make it happen. Truly. - -- Patrick http://fexl.com -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 iQA/AwUBPqf+F1A7g7bodUwLEQISIgCfTVhs4Q+8xc4w5xuH1z5+DPMb/EAAoK/j al4Clq6VA/dR5aFIb0ZxPsEe =pNFb -----END PGP SIGNATURE----- From timcmay at got.net Thu Apr 24 12:24:57 2003 From: timcmay at got.net (Tim May) Date: Thu, 24 Apr 2003 12:24:57 -0700 Subject: [Lucrative-L] lucrative accounts revisited In-Reply-To: Message-ID: <6F8B6271-768A-11D7-B966-000A956B4C74@got.net> On Thursday, April 24, 2003, at 10:57 AM, R. A. Hettinga wrote: > At 11:09 AM -0400 4/24/03, Patrick Chkoreff wrote: >> I expect my scheme will be slapped down >> forthwith. :-) > > :-) > > Again, the *only* thing you need to prevent double-spending is a copy > of the spent coins. Period. > > Anything else costs money. For on-line clearing, a copy of the spent "coin" stops double-spending. I would not call it a "coin," however. We should reserve the word "coin" for things which behave like coins, e.g, things that clear locally without presentation to an issuer or other entity. For off-line clearing, double-spending is a significant and hard problem. Perhaps unsolvable. If so, then there are no digital coins and never will be. (I don't count token-based systems, using smartcards or "observers," as digital coins.) Everything connected with money costs money, by the way. Even keeping copies and comparing them to newly-presented exemplars. --Tim May "The great object is that every man be armed and everyone who is able may have a gun." --Patrick Henry "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton From patrick at lfcgate.com Thu Apr 24 11:54:30 2003 From: patrick at lfcgate.com (Patrick) Date: Thu, 24 Apr 2003 12:54:30 -0600 Subject: [Lucrative-L] Great news! Lucrative has a home! Message-ID: My sincere thanks to Lucky Green for arranging server space and bandwidth for a public demonstration server. I can setup the server at any time. However, eliminating Lucrative accounts is a major change. It will rearrange the server API, significantly change the schema, and impact the Purse as well. I think it would be a good idea to go to v8, with the accounts->envelope revision done, before starting the public server. I don't know how long it will take - at least two days - but I'm working on it now. Patrick The Lucrative Project: http://lucrative.thirdhost.com ...................................................... To subscribe or unsubscribe from this discussion list, write to lucrative-l-request at lucrative.thirdhost.com with just the word "unsubscribe" in the message body (or, of course, "subscribe") --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Thu Apr 24 10:57:12 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Thu, 24 Apr 2003 13:57:12 -0400 Subject: [Lucrative-L] lucrative accounts revisited In-Reply-To: References: Message-ID: At 11:09 AM -0400 4/24/03, Patrick Chkoreff wrote: >I expect my scheme will be slapped down >forthwith. :-) :-) Again, the *only* thing you need to prevent double-spending is a copy of the spent coins. Period. Anything else costs money. Transaction cost is everything. Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From patrick at fexl.com Thu Apr 24 12:35:46 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Thu, 24 Apr 2003 15:35:46 -0400 Subject: [Lucrative-L] lucrative accounts revisited Message-ID: > From: "James M. Ray" > > At 10:46 AM -0400 4/24/03, Patrick Chkoreff wrote: > ... >> With these cards you would have a true off-network solution. I wonder >> if it's feasible to do the crypto and hardware for this? > > While crypto-hardware is cool stuff, and I'm all-for-it, I think > that ubiquitous bandwidth is much more likely to happen. > We have to remember, we're INTO this stuff. Most people would > not see the benefits of a $100 cryptocard nearly as quickly ... I can see your point, but let me think about it a bit. Alice is at a craft fair with digital coins loaded into a PDA that costs at least $100. So she's already somewhat of a geek to begin with. But she is glad that her general-purpose PDA is capable of handling coins in addition to her date and address book. No need to pony up more money for a specialized crypto-wallet. But for every geeky Alice, there are at least one hundred non-geeky Alyssas out there. Alyssa is not likely to purchase a relatively expensive and difficult to use general purpose device. She might, however, pony up for an inexpensive, easy to use, specialized crypto-wallet. She would not consider anything that has icons and a stylus, but she would readily adopt a sleek little black-box crypto-wallet. Maybe it even comes in her favorite colors. So even if the network is as reliable and ubiquitous as the atmosphere itself, in this new digital coin economy both Alice and Alyssa are going to be carrying around SOMETHING. Which is easier, persuading geeky Alice to purchase a cheap specialized device, or persuading non-geeky Alyssa to purchase an expensive clunky general purpose device? Of course, the network will NOT be as reliable as the atmosphere itself, and there is at least one alternative. Physical cash is the obvious choice -- after all, these digital coins are ultimately redeemable for valuable physical objects like gold and silver coins or notes for same, so I expect people to carry around a combination of valuable atoms and valuable bits as they shop. But in the case of inexpensive crypto-cards, there is a second option. Direct offline beaming of digital coins from one device to another. Assuming it can be done simply, inexpensively, and securely. So when the network is inaccessible and Alyssa is out of cash, she's still in luck. Whip out the candy-red colored crypto-wallet and snag the sweater. > ... Or Joris may > be right, there's something to be said for physical cash... Definitely. At the very least, the issuer stores that in the vault to back up the digital coins. :-) But seriously, people are going to want to hold and trade valuable physical stuff because it is a form of wealth independent of the server, ubiquitous networks, or even crypto-wallets. It's the real deal, the final deliverable upon which all bit-bashing is based. > I'm also curious about how all this is going to be profitable. > How (aside from a small e-gold donation, if he tells me his > account number!) will Lucrative-Patrick get paid? Thanks. > JMR This is a very good question. Obviously if you are an ISSUER I can see how it might be profitable -- you simply charge transaction fees whenever coins are swapped, split, merged, etc. at the server. You can assess storage fees to cover your base costs or even try to nick a small profit there. All of this would be implemented as tunable parameters in the server software, perhaps even DYNAMICALLY self-tuning based on market conditions, changing constraints on bandwidth and disk usage, etc. If you are a mere CODER like Lucrative-Patrick and Fexl-Patrick, well sorry, we're just slaves in it for the fun. :-) Work for tips, become an issuer, hold a day job, whatever it takes to get your next fix. -- Patrick http://fexl.com From patrick at fexl.com Thu Apr 24 12:52:28 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Thu, 24 Apr 2003 15:52:28 -0400 Subject: [Lucrative-L] lucrative accounts revisited In-Reply-To: Message-ID: <475309FF-768E-11D7-B4FF-000393D91E36@fexl.com> On Thursday, April 24, 2003, at 01:57 PM, R. A. Hettinga wrote: > Again, the *only* thing you need to prevent double-spending is a copy > of the spent coins. Period. Alternatively, I think a copy of the non-spent coins will do the trick also. So in your scenario, the predicate valuable(x) = valid_crypto_stamp(x) & not element(x, spent_coins). In my scenario, valuable(x) = element(x, unspent_coins). Why store the large set of spent coins when you can store the much smaller set of unspent coins? There's no security issue I don't think. In my scheme the bad guys can torture you and get access to the hash file, yes, but what's the point? They still have to mount a multi-million dollar collision attack. It's much easier just to seize the gold in the vaults than fiddle around with some pathetic bits on a server. Or if the digital coins are backed by something like e-bullion they can just torture you for the e-bullion password. > Anything else costs money. > > Transaction cost is everything. I don't understand your point here. Why are my transaction costs greater than yours? They might even be less. The disk usage might be less, too. -- Patrick http://fexl.com From rah at shipwright.com Thu Apr 24 13:17:21 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Thu, 24 Apr 2003 16:17:21 -0400 Subject: [Lucrative-L] lucrative accounts revisited In-Reply-To: <475309FF-768E-11D7-B4FF-000393D91E36@fexl.com> References: <475309FF-768E-11D7-B4FF-000393D91E36@fexl.com> Message-ID: At 3:52 PM -0400 4/24/03, Patrick Chkoreff wrote: >Alternatively, I think a copy of the non-spent coins will do the trick >also. Patrick, no offense, but have you actually *read* this stuff? You *delete* the spent coins after some pre-arranged period. They're useless. You don't *care* about the unspent coins. You're going to *have* to keep the spent coins to prevent double spending. Get it? Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From patrick at lfcgate.com Thu Apr 24 15:18:45 2003 From: patrick at lfcgate.com (Patrick) Date: Thu, 24 Apr 2003 16:18:45 -0600 Subject: double-spending prevention w. spent coins (Re: [Lucrative-L] lucrative accounts revisited) In-Reply-To: Message-ID: <002101c30aaf$79c95ca0$0200a8c0@scylla> > If there is any problem of "linkability" in this scheme, please help me > see it. The server does not log any socket events or transaction > records of any kind. OK, if someone put a gun to my head and said "put > in some code to log everything" then they might be able to discern some > pattern like "this coin was issued to this IP address, and then three > days later that coin was swapped from this other IP address." OK, that > sounds like a potential problem, but I don't see how you can hide this > information from the server ITSELF. When you present a coin to the > server, it is going to know from which IP address it came, and I don't > see a way around that. Perhaps I am mistaken, but the system you describe seems to be unlinkable-by-policy. Lucrative is unlinkable-by-mathematics. I believe the difference is nontrivial. Patrick McCuller From patrick at fexl.com Thu Apr 24 13:51:05 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Thu, 24 Apr 2003 16:51:05 -0400 Subject: Double spending, i.e. X in S == not X not in S In-Reply-To: Message-ID: <77699552-7696-11D7-B4FF-000393D91E36@fexl.com> On Thursday, April 24, 2003, at 04:17 PM, R. A. Hettinga wrote: > At 3:52 PM -0400 4/24/03, Patrick Chkoreff wrote: >> Alternatively, I think a copy of the non-spent coins will do the trick >> also. > > Patrick, no offense, but have you actually *read* this stuff? > > You *delete* the spent coins after some pre-arranged period. They're > useless. > > You don't *care* about the unspent coins. You're going to *have* to > keep the spent coins to prevent double spending. > > Get it? No, which indicates there is one huge unshared premise at work here. I assert that I can prevent double spending without keeping the spent coins, even for a limited time period. It's simple. Alice gives Bob a coin X. Bob immediately swaps coin X for a brand new coin Y. The server deletes coin X completely, forgetting the bits with extreme prejudice. Now Alice tries to give Charles the same coin X. Charles immediately attempts to swap coin X for a new one. The server tries to look up X in the set of valid coins and does not find it. The server says "Sorry, Charlie, that is not a valid coin." The whole thing depends on the recipient doing an immediate swap. But that's no big requirement, because the recipient must contact the server to see if it's a valid coin anyway. So you just go ahead and do a swap at that point. -- Patrick http://fexl.com From rah at shipwright.com Thu Apr 24 14:17:32 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Thu, 24 Apr 2003 17:17:32 -0400 Subject: [Lucrative-L] lucrative accounts revisited In-Reply-To: <6F8B6271-768A-11D7-B966-000A956B4C74@got.net> References: <6F8B6271-768A-11D7-B966-000A956B4C74@got.net> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 12:24 PM -0700 4/24/03, Tim May arose to smite linguistic heresy: >For on-line clearing, a copy of the spent "coin" stops >double-spending. Indeed. That was my entire point. Thank you for repeating it. Again. As for the following... >I would not call it a "coin," however. We should reserve the word >"coin" for things which behave like coins, e.g, things that clear >locally without presentation to an issuer or other entity. "We" should, but I won't, though I prefer using "coins" to mean something even smaller -- my original use in this thread a lamentable and reflexive use from the DigiCash days -- but I think if we're copying, or, more properly, redeeming and reissuing, something to that controls ownership of an asset, something that is supposed to reside, physically, in a single place on the net at any one time, it's more like a coin, or a subway token, or a note, or a bearer bond, than anything else used to move money around, say, book-entries (debits and credits) tunneled using SSL, for instance. And, no, I don't think the use of "coin" or "note", much less "certificate", is even close to the modern mis-use of the words "signature" or "certificate" to describe cryptographic authentication, because there's a whole lot of difference between those things and the holographic, supposedly biometric, writings that we call "signatures" in meatspace. But, we say "signature", anyway. Hopefully we'll re-load "certificate", someday... So, calling a financial instrument using a Chaumian blind-signature financial cryptography protocol a "note", or "certificate", is fine. As for "coin", while we were thinking about this stuff a while back, I decided that streaming protocols, using bulk-issued MicroMint, and then Rabin Signature, "tokens", tested for double-spending with statistical sampling, could execute, clear and settle at a low enough cost enough to be called a "coin". Chaumian or other blind signature "notes" have to be checked on every transaction, so they are, by definition, more expensive to handle individually, just like paper notes are, compared to a coin. >For off-line clearing, double-spending is a significant and hard >problem. Perhaps unsolvable. Amen. >If so, then there are no digital coins and never will be. If you say so, Tim. :-). >(I don't count token-based systems, using smartcards or "observers," >as digital coins.) I think "token" is also a word subject to overloading. I would call "token" a superset of "coin" and "note", myself, to be used to generalize things. In current usage in the ATM or meatspace electronic payment business, "token" means the thing you carry around to put into an electronic "terminal" as one "factor" in a two-factor transaction process. A shared secret, like a "Personal Identification Number" being the second "factor". "Three factor" authentication, of course, uses a "signature", right? ;-). >Everything connected with money costs money, by the way. Even >keeping copies and comparing them to newly-presented exemplars. Certainly if you want to dance your nits on the head of a pin, yes, Tim, knock yourself out. You certainly seem better catching and wrangling them then I am. On the net full of scientists, former or otherwise, the price of error, no matter how small, is bandwidth... Of *course*, everything costs money. I plead a Dirksenist brevity, in the meantime. Cheers, RAH "A coin here, and a coin there..." -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPqhUZMPxH8jf3ohaEQLtBQCfXmO3HAqoMd0QBywCm2mdx3Xt9GIAnjgo guMk67rqIyo6KMifU4IVHhii =D1bN -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Thu Apr 24 14:18:45 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Thu, 24 Apr 2003 17:18:45 -0400 Subject: [Lucrative-L] Great news! Lucrative has a home! Message-ID: --- begin forwarded text From patrick at fexl.com Thu Apr 24 15:12:34 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Thu, 24 Apr 2003 18:12:34 -0400 Subject: double-spending prevention w. spent coins (Re: [Lucrative-L] lucrative accounts revisited) In-Reply-To: <20030424222736.A7938000@exeter.ac.uk> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Thursday, April 24, 2003, at 05:27 PM, Adam Back wrote: > If the coins offer privacy, then unspent coins are unlinkable when the > same coin is deposited, so keeping just unspent coins doesn't work. > > Spent coins on the other hand have their blinding removed, so you > notice double spending by looking at spent coins. > > (There are zero-knowledge proofs of non-set membership as proposed for > use in ecash by Sander and Ta-Shma [1], but I think these are quite > computationally expensive.) Although I have read some material on blinding etc., I do not see a need for it in my system. At Tim May's suggestion I shall avoid using the word "coin" and use the more accurate financial term "note" instead. Although technically a note in my system is <32-bit file position><256-bit random gibberish><64-bit amount>, I'll use a simpler and abbreviated decimal notation with dashes in the quick example that follows. Alice has a note "0247-223235898-00032" that entitles her to 32 grams of e-bullion. She decides to take delivery. She presents the coin to the server and the server computes the RIPEMD-160 hash. It looks at record number 247 in the data file and sees if the hash stored there matches the computed hash. If so, the server extinguishes the coin (randomizing the record and chaining it to the free list) and spends 32 grams of e-bullion to the account that Alice designates, no questions asked. (Obviously you have to handle any errors in the e-bullion spend - -- don't extinguish the coin if the spend fails.) Now Alice tries to pull a fast one. She presents that same note "0247-223235898-00032" to Bob. Bob decides to swap the note for a new one. He presents it to the server. The server computes the RIPEMD-160 hash. It looks at record number 247 in the data file and sees that the record is on the free list. It rejects Bob's request. Double spend prevented. Now perhaps in the meantime the server has decided to reuse record 247. In that case there is a brand new note hash sitting there, and it is astronomically unlikely to match the hash of the "0247-223235898-00032" note. (I have considered issuing serial numbers that are never reused but for some vague reason I don't quite like that. It might not be a big deal.) Again, double spend prevented. Quite simply, the absence of a match indicates a spent coin, or one that was never issued in the first place. It's very much like GoldMoney payment keys, which simply say YES or NO when you try to redeem them, with no information given about whether it was EVER a valid payment key. If there is any problem of "linkability" in this scheme, please help me see it. The server does not log any socket events or transaction records of any kind. OK, if someone put a gun to my head and said "put in some code to log everything" then they might be able to discern some pattern like "this coin was issued to this IP address, and then three days later that coin was swapped from this other IP address." OK, that sounds like a potential problem, but I don't see how you can hide this information from the server ITSELF. When you present a coin to the server, it is going to know from which IP address it came, and I don't see a way around that. There is no linkability of personal identity in the system because there is no personal identity in the system, period. The server has no use for a public key from any user. - -- Patrick http://fexl.com -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 iQA/AwUBPqhhW1A7g7bodUwLEQL63gCg91lfShbCyCGQ68Bn2LAeY3Cv6wkAnAtR lEhm4j76EzsgzU/sdrm6TNbV =4OMx -----END PGP SIGNATURE----- From rah at shipwright.com Thu Apr 24 15:24:33 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Thu, 24 Apr 2003 18:24:33 -0400 Subject: Double spending, i.e. X in S == not X not in S In-Reply-To: <77699552-7696-11D7-B4FF-000393D91E36@fexl.com> References: <77699552-7696-11D7-B4FF-000393D91E36@fexl.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 4:51 PM -0400 4/24/03, Patrick Chkoreff wrote: >No, which indicates there is one huge unshared premise at work here. Okay. I think I understand what's happened, here. It's a function of whether or not you're blinding, and the blinding protocol you're using. If you're doing Chaumian blinding, part of the double-spending prevention is bound up in the blinding protocol itself. Since Lucrative is done in Wagner blinding, maybe that's not the case, but I wouldn't think so, on a first approximation. Wagner's too smart. :-). For non-blinded notes, you still keep a copy of the ones that come in, (or a sample of them, for "streaming" coins where a large number of coins are statistically dependent, like between IP addresses in a P2P streaming network) but you *still* you don't care about the ones that haven't come back yet. Because, and note this, one more time: they're not *spent* yet. You're trying to *prove* double spending, remember? If someone comes back with a note you *don't* have, it may make for a smaller list, and, hey, if it's not on your list, you don't let it in. But you want to keep some kind of *proof* that the coin's already come in, besides simply saying, "nope. Not here". Instead, you want to say things like "nope. this one's double spent.", and provide whatever information you've agreed to as proof. (timestamp, or IP address, or whatever. Not pretty) That's why Chaum did what he did. You munge the two hashes you now have in double-spent note and out pops the *signature* of the double spender, and so you only have to keep the notes that have come in. You can't even *decipher* the notes you've issued, because, hey, they're blinded. They're complete gibberish to the mint, and equally useless. The blinding happens on the client with a secret blinding factor, right? Now I have to go back and look at what Wagner said myself :-), and figure out if he did something like that as well. I expect that by "blinding", he meant the getting same kind of result that Chaum was after, or people wouldn't have been offering it as an alternative to Chaum all these years. Wagner did it with Diffie-Hellman, so the math operators are different than RSA, but I bet you get the same effect, or again, people wouldn't call it "blinding." There's certainly something to be said for learning by answering questions, and I thank you for giving me the opportunity for personal growth ;-), but, really, Patrick, go *read* these protocols to see how they work before proposing new ones. Most of the time, people haven't the bandwidth to repeat what's been said, on especially on cypherpunks in particular, and on the net in general, many times before. So, again I ask, Patrick, have you gone and looked at blind signature protocols in the CRC Handbook of Applied Crypto? or Applied Cryptography? The CRC book is more technical than Applied Crypto, which is the more readable of the two, but the CRC book is actually available in PDF on the net, for free, if you go look for it. Google is Your Friend, Patrick, and Crypto is Hard. Don't invent any if you really don't have to. Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPqhkEsPxH8jf3ohaEQKqjwCgmMF7t/K/Ljitmz8+MWPhYlrMkiwAoMZX oIstn0atLxrPvXzQZWTP2rkT =8voZ -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From frantz at pwpconsult.com Thu Apr 24 18:42:19 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Thu, 24 Apr 2003 18:42:19 -0700 Subject: [Lucrative-L] lucrative accounts revisited In-Reply-To: <58FD2C26-76BC-11D7-B4FF-000393D91E36@fexl.com> References: <20030424224605.GA10094@mids.student.utwente.nl> Message-ID: At 6:22 PM -0700 4/24/03, Patrick Chkoreff wrote: >But that is simply not how it works. Citibank issues coin X to Alice. >Alice immediately swaps X with the server and obtains a new coin Y. >Alice gives coin Y to Bob in return for kinky porn. Bob immediately >swaps Y with the server and obtains a new coin Z. Bob gives coin Z to >Citibank. Citibank immediately swaps coin Z with the server and >obtains a new coin A. I do not see "linkage" here. Citibank never >sees X again. The server is in a position to keep track of the money transfer by recording the serial numbers of the old and new coins as the exchanges take place. The server is perfectly capable of making the linkage. If you don't trust the server, then you must believe that all your transfers are know. The advantage of the various blinding schemes is that your trust is in mathematics and probability, not in the integrity of the server operators. Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From gbroiles at bivens.parrhesia.com Thu Apr 24 19:22:19 2003 From: gbroiles at bivens.parrhesia.com (Greg Broiles) Date: Thu, 24 Apr 2003 19:22:19 -0700 Subject: Bad Elf. In-Reply-To: ; from juicy@melontraffickers.com on Thu, Apr 24, 2003 at 05:44:25AM -0700 References: <5.1.0.14.0.20030424213652.00a4b4e0@mail.nex.com.au> Message-ID: <20030424192219.A16705@bivens.parrhesia.com> On Thu, Apr 24, 2003 at 05:44:25AM -0700, A.Melon wrote: > > Pierre Lethier, 48, had been wanted by the French authorities since > > September 2000 on suspicion that he helped illicitly divert Elf funds to > > secure the company's 1992 acquisition of the eastern German Leuna refinery > > complex. > > This and a variety of other stuff, is showing up > in RAZOR2. Whichever fucking asshole out there is > reporting some of Fuhrer Rat's cypherpunk mail to > RAZOR or any other UE signature repository, needs > to stop now. Oh, I can do better than that - "Whichever fucking asshole is sending me unwanted messages needs to stop now." Shit, they haven't stopped. Why don't people listen when I boss them around? Maybe trying to shift responsibility for solving my problems to others via the use of anonymous passive-voice messages (passive-aggressive voice?) isn't a good strategy after all. Spam databases which aren't designed to cope with false reports and/or differences of opinion about what's spam are doomed. On the way to their doom, they may take some of your inbound mail with them. The Cloudmark/Vipul's Razor people don't seem interested in describing their trust metric system in a public forum, so it's hard to say much about it beyond "apparently it's not working very well." You might try "man 5 razor-whitelist" if you don't like having cpunks mail tossed in the trash with the spam. -- Greg Broiles gbroiles at parrhesia.com From ravage at einstein.ssz.com Thu Apr 24 17:27:02 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Thu, 24 Apr 2003 19:27:02 -0500 (CDT) Subject: Feral Robot Dogs (fwd) Message-ID: http://xdesign.eng.yale.edu/feralrobots/, -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From rah at shipwright.com Thu Apr 24 16:46:17 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Thu, 24 Apr 2003 19:46:17 -0400 Subject: double-spending prevention w. spent coins (Re: [Lucrative-L] lucrative accounts revisited) In-Reply-To: References: Message-ID: At 6:12 PM -0400 4/24/03, Patrick Chkoreff wrote: >Although I have read some material on blinding etc., I do not see a >need for it in my system. Well, for me, at least, there's no point to discussing it anymore. :-). That was easy enough. Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From patrick at fexl.com Thu Apr 24 18:22:14 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Thu, 24 Apr 2003 21:22:14 -0400 Subject: [Lucrative-L] lucrative accounts revisited In-Reply-To: <20030424224605.GA10094@mids.student.utwente.nl> Message-ID: <58FD2C26-76BC-11D7-B4FF-000393D91E36@fexl.com> On Thursday, April 24, 2003, at 06:46 PM, Joris Bontje wrote: > Like Patrick M (the Lucrative-one) said, it is unlinkable-by-policy vs > unlinkable-by-mathematics. If you don't blind coins (and want them to > be > able to be linkend), the easiest solution is storing the valid coins. > If > you do have blinded coins, the only solution is storing spend coins. Strictly speaking, my server stores neither the valid nor the invalid coins. It stores the hashes of the valid coins. Therefore, the server has no way of discerning the details of any coin stored in its database. All it can do is recognize a valid coin when it sees one, and immediately extinguish it and issue a new one. So, can somebody give me a concrete example of a "linkage" problem here? I'll tip you a couple of grams in the DGC of your choice if you can do a good job of it. One person suggested that Citibank might issue a coin X to Alice, who then spends it at Bob's Kinky Sex Emporium, who then deposits that coin at Citibank. Citibank begins building a profile of Alice's kinky tastes because it remembers issuing X. But that is simply not how it works. Citibank issues coin X to Alice. Alice immediately swaps X with the server and obtains a new coin Y. Alice gives coin Y to Bob in return for kinky porn. Bob immediately swaps Y with the server and obtains a new coin Z. Bob gives coin Z to Citibank. Citibank immediately swaps coin Z with the server and obtains a new coin A. I do not see "linkage" here. Citibank never sees X again. To be clear, I am NOT trying to solve the problem of having a coin circulate several times out in the wild without any contact with a server, and somehow prevent a double spend in that scenario. I do not see how that is even remotely possible. Alice has a fancy string of bits on her computer. She transmits that string of bits to Bob and gets a sweater. Then she transmits the same string of bits to Charles and gets a beer. You cannot prevent this without consulting a server. -- Patrick http://fexl.com From bill.stewart at pobox.com Thu Apr 24 22:10:15 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 24 Apr 2003 22:10:15 -0700 Subject: double-spending prevention w. spent coins In-Reply-To: <20030425041501.A7984020@exeter.ac.uk> References: <726015E0-76CB-11D7-B4FF-000393D91E36@fexl.com> <20030424234721.A8027760@exeter.ac.uk> <726015E0-76CB-11D7-B4FF-000393D91E36@fexl.com> Message-ID: <5.1.1.6.2.20030424214841.02ce9738@idiom.com> At 04:15 AM 04/25/2003 +0100, Adam Back wrote: >On Thu, Apr 24, 2003 at 11:10:20PM -0400, Patrick Chkoreff wrote: > > All right, I can generally understand the purpose here, to make it > > impossible to correlate an old coin with a new one issued in its place. >... >The bank checks deposited coins >and can tell which users double spent coins if any after the fact. >What you do about double spending when you detect a given user has >done it is a policy question for the bank -- eg fine user, prosecute >user for fraud to recuperate costs etc. As Doug Barnes put it, if your algorithm has to exercise the "then haul them off to jail" step, you've failed. The two basic models of digital cash clearing have been - embed some identity model into the coins, which is revealed by double-spending, and then do something grouchy if you detect it - always honor the first use of a coin and reject future uses, and let the users fight over failed spending attempts. Depending on what you're trying to accomplish with your digital cash, one mode or the other may be useful. Hettinga would probably contend that the first-use model is much cheaper and more efficient, because it avoids the costs of creating and tracking user identities and tieing it to the world in book-entry fashion. If you're trying to use it for something like remailer tokens rather than real cash, that's certainly the case. On the other hand, the identity-embedding models have tended to be more prominent around Cypherpunks, partly because it has its own technically interesting characteristics, and may have problems that it can solve, but also because it prevents some kinds of fraud, such as making it harder for the bank to claim that a coin has already been spent. >(You can also use the same protocol for online checking, so the >recipient has the choice of convenience of using peer-to-peer without >going via the bank, or the choice to deposit now and get a fresh coin >and be sure there won't be any dispute resolution later.) Offline is much much harder than online. >Patrick wrote: > > Well hell, that wasn't so hard. Sure it was :-) But it's stuff that's been done now, mathematically. Doing it in practice is still hard, which is why almost nobody's done it in practice, and not for very long. Back when this stuff was new and exciting, there was an attempt to form an Austin Cypherpunks Credit Union, and the proprietors found that not only was doing business with David Chaum a difficult unsolved problem (:-), but in fact finding a business model that would let them make money at it was even harder. From adam at cypherspace.org Thu Apr 24 14:27:36 2003 From: adam at cypherspace.org (Adam Back) Date: Thu, 24 Apr 2003 22:27:36 +0100 Subject: double-spending prevention w. spent coins (Re: [Lucrative-L] lucrative accounts revisited) In-Reply-To: <475309FF-768E-11D7-B4FF-000393D91E36@fexl.com>; from patrick@fexl.com on Thu, Apr 24, 2003 at 03:52:28PM -0400 References: <475309FF-768E-11D7-B4FF-000393D91E36@fexl.com> Message-ID: <20030424222736.A7938000@exeter.ac.uk> If the coins offer privacy, then unspent coins are unlinkable when the same coin is deposited, so keeping just unspent coins doesn't work. Spent coins on the other hand have their blinding removed, so you notice double spending by looking at spent coins. (There are zero-knowledge proofs of non-set membership as proposed for use in ecash by Sander and Ta-Shma [1], but I think these are quite computationally expensive.) Adam [1] "Auditable, Anonymous Electronic Cash", Tomas Sander, Amnon Ta-Shma, Crypto 99 http://citeseer.nj.nec.com/sander98auditable.html On Thu, Apr 24, 2003 at 03:52:28PM -0400, Patrick Chkoreff wrote: > On Thursday, April 24, 2003, at 01:57 PM, R. A. Hettinga wrote: > > > Again, the *only* thing you need to prevent double-spending is a copy > > of the spent coins. Period. > > Alternatively, I think a copy of the non-spent coins will do the trick > also. > > So in your scenario, the predicate valuable(x) = valid_crypto_stamp(x) > & not element(x, spent_coins). > > In my scenario, valuable(x) = element(x, unspent_coins). > > Why store the large set of spent coins when you can store the much > smaller set of unspent coins? > > There's no security issue I don't think. In my scheme the bad guys can > torture you and get access to the hash file, yes, but what's the point? > They still have to mount a multi-million dollar collision attack. > It's much easier just to seize the gold in the vaults than fiddle > around with some pathetic bits on a server. Or if the digital coins > are backed by something like e-bullion they can just torture you for > the e-bullion password. > > > > Anything else costs money. > > > > Transaction cost is everything. > > I don't understand your point here. Why are my transaction costs > greater than yours? They might even be less. The disk usage might be > less, too. > > -- Patrick > http://fexl.com From bill.stewart at pobox.com Thu Apr 24 22:38:43 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 24 Apr 2003 22:38:43 -0700 Subject: [Lucrative-L] lucrative accounts revisited In-Reply-To: References: <475309FF-768E-11D7-B4FF-000393D91E36@fexl.com> <475309FF-768E-11D7-B4FF-000393D91E36@fexl.com> Message-ID: <5.1.1.6.2.20030424221751.02cd1fd8@idiom.com> At 04:17 PM 04/24/2003 -0400, R. A. Hettinga wrote: >You *delete* the spent coins after some pre-arranged period. They're useless. That only works if you've modified your protocols to identify the ages of coins, for instance by rotating what signature parameters the bank uses. Otherwise somebody can walk in with a used P+1-old coin and spend it again. If you do modify the protocols to identify coin or signature batches, and delete older batches of coins, you have to also refuse to cash them, like checks that say "Not valid after 90 days" or whatever. This implies that users will be required to come in and exchange coins every so often before they expire, or lose their money. For most markets, this may be ok with appropriate time periods, but for other applications, it might not be. One alternative is to keep only the new batches in high-speed storage, and if somebody comes in with a bunch of dusty old coins, you say "eh, haven't seen one-a them in a long time, lets' see what we've got back in the back room", and go drag out the punch cards and 9-track-tape with the old databases on them. How expensive is this? Well, the going rate for disks is about $1/GB, and I forget how big the coins are but they're unlikely to be over 1KB, so that's about 1 microbuck per coin, plus some labor cost for fetching old records, and a $1000 stack of drives holds a billion spent coins. CDRs are more trouble to handle, but only cost about $0.25/GB; I'd expect the write-once DVD market to be similar until blue-ray gets common. From patrick at fexl.com Thu Apr 24 20:10:20 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Thu, 24 Apr 2003 23:10:20 -0400 Subject: double-spending prevention w. spent coins In-Reply-To: <20030424234721.A8027760@exeter.ac.uk> Message-ID: <726015E0-76CB-11D7-B4FF-000393D91E36@fexl.com> On Thursday, April 24, 2003, at 06:47 PM, Adam Back wrote: >> OK, that sounds like a potential problem, but I don't see how you >> can hide this information from the server ITSELF. When you present >> a coin to the server, it is going to know from which IP address it >> came, and I don't see a way around that. > > That's where blinding comes into the picture. > ... This is helpful, Adam, thanks. Bill Frantz wrote: > The server is in a position to keep track of the money transfer by > recording the serial numbers of the old and new coins as the exchanges > take > place. The server is perfectly capable of making the linkage. If you > don't trust the server, then you must believe that all your transfers > are > know. This is good too, Bill. All right, I can generally understand the purpose here, to make it impossible to correlate an old coin with a new one issued in its place. That I can see. I was starting to get the impression that somehow the Chaumian techniques were attempting to address the problem of preventing double spends even when doing a long chain of spends without contact with a server. In fact they are trying to address a more modest goal than that, and double spends are still something that must be detected by contact with the server. With the Chaumian techniques, the random coin bits are generated on the user side: http://munitions.vipul.net/documents/cyphernomicon/chapter12/12.5.html > "The way the process works, with the blinding, is like this. The user > chooses a random x. ... So naturally the server cannot keep a list of the valid coins because their specific bits appear to be invented out there in the wild. Hence keeping the list of spent coins, since keeping a list of unspent coins is clearly impossible. Well hell, that wasn't so hard. -- Patrick http://fexl.com From adam at cypherspace.org Thu Apr 24 15:47:21 2003 From: adam at cypherspace.org (Adam Back) Date: Thu, 24 Apr 2003 23:47:21 +0100 Subject: double-spending prevention w. spent coins (Re: [Lucrative-L] lucrative accounts revisited) In-Reply-To: ; from patrick@fexl.com on Thu, Apr 24, 2003 at 06:12:34PM -0400 References: <20030424222736.A7938000@exeter.ac.uk> Message-ID: <20030424234721.A8027760@exeter.ac.uk> > Although I have read some material on blinding etc., I do not see a > need for it in my system. Your system as described is not in the slightest bit anonymous or private. Or at least the user has no cryptographic assurances that the server is not logging everything, or that some adversary isn't logging everything that goes over the connection even though the server is not. > OK, if someone put a gun to my head and said "put in some code to > log everything" then they might be able to discern some pattern like > "this coin was issued to this IP address, and then three days later > that coin was swapped from this other IP address." Right that is the linkability problem. Plus of course as mentioned above the user has no reason to trust the server. Or at least he would prefer a protocol where he did not need to trust the server. > OK, that sounds like a potential problem, but I don't see how you > can hide this information from the server ITSELF. When you present > a coin to the server, it is going to know from which IP address it > came, and I don't see a way around that. That's where blinding comes into the picture. Probably the simplest one to understand is Chaum's original scheme, though there are others such as Brands, and Wagner's online system. serial-no = (b^e).[R||h(R)] mod n proto-coin = serial-no^d mod n = b.[R||h(R)]^d mod n coin = proto-coin . b^-1 mod n = [R||h(R)]^d mod n check-valid-coin(c) = c^e mod n is of form [x||h(x)] check-double-spent(c) = bank records spent coins trace-payee(c) = payer gives bank b, bank records proto-coins as well so a blind signature in this scheme is that the bank has an RSA modules n, private key d, and public exponent e. The user sends b^e.M mod n to the bank (where b is a random blinding factor), the bank computes (b^e.M)^d mod n (a standard RSA siganture) and sends back to the user. The user then unblinds by dividing by b, which works because: (b^e.M)^d = b^{e.d}.M^d = b.M^d mod n and b.M^d/b = M^d mod n plus some other detais to avoid existential forgeries. and so the bank can recognize it's signature later on a coin (because it's a valid RSA signature made with it's private key d), but it won't know which unspent coin it corresponds to because it doesn't know the blinding factors b. Adam From rah at shipwright.com Thu Apr 24 23:34:30 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Fri, 25 Apr 2003 02:34:30 -0400 Subject: Soon, I think (was Re: double-spending prevention w. spent coins) In-Reply-To: <5.1.1.6.2.20030424214841.02ce9738@idiom.com> References: <726015E0-76CB-11D7-B4FF-000393D91E36@fexl.com> <20030424234721.A8027760@exeter.ac.uk> <726015E0-76CB-11D7-B4FF-000393D91E36@fexl.com> <5.1.1.6.2.20030424214841.02ce9738@idiom.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 10:10 PM -0700 4/24/03, Bill Stewart wrote: >Hettinga would probably contend that the first-use model is much >cheaper and more efficient, because it avoids the costs of creating >and tracking user identities and tieing it to the world in >book-entry fashion. Actually, I prefer a first-use model *with* something like "identity" checking, kind of a belt-and-braces approach. When someone pops up with a double-spent coin, the mint can say "nope, can't honor it, here's the key that double spent it, though; have fun." OTOH, as a financial intermediary, the underwriter would make absolutely *no* effort to keep track of who had what key, at all. The whole process would rather tartly teach people *never* to take offline transactions, and, more to the point, reject transactions from a given double-spending key *if* that key ever comes around again. But, as I've noted before, all this haggling about amateur protocol design is, frankly, a waste of time. Folks (meaning people who write code) have *had* the protocols, for years now, at least three protocols that most people would trust to use for unity-tested transactions above, say, a quarter: Chaum, Brands, and Wagner, and, on a prima facie basis, Wagner's unencumbered by patent, which makes it first in line for experimental use. And, as you noted, Bill, the trick is the business model, and that's been figured out for at least 4 or 5 years as well :-). That is, plug them into an accepted book-entry reserve-value/ transaction execution - - -clearing -settlement system, like one of the digital gold currency systems, or PayPal, or ATM/ACH, or a central securities depository system on the back end, front-end a mint to the web and a decent internet-level transaction-exchange protocol, and see what happens. Folks are fairly close to being able to do that now, from the way *all* of those book-entry transaction systems have grown themselves into the net over the past 5 years or so, *including* the central securities depositories and clearinghouses. Even PayPal has loosened up their end-user agreement within the last two months or so for what looks like gold-currency exchange providers. Certainly John Muller, their Corporate Counsel, is completely familiar with those internet bearer transaction protocols and what they can do, so when someone walks in the door there with something that is at least as secure as their system is, it'll probably get a polite hearing. You can certainly bet their management, much less their tech people, knows about the financial cryptography and network security issues. As far as the digital gold currencies themselves are concerned, people can pretty much do something now, with not too much of a push, because at least two gold currency operators that I know of, GoldMoney and e-Gold, have both actively encouraged people's efforts to make that happen. As Patrick McCuller (the other Patrick :-)) chugs along with the code for Lucrative, it won't take too much to plug a Wagner mint into the shopping-cart interface of an existing value-exchange system like GoldMoney or e-Gold, which Patrick has already worked on doing, and hang out one's underwriting shingle to see what happens. BTW, kudos to Lucky for volunteering a box for Patrick to test Lucrative on so this can happen faster. It's going to get interesting, folks, and pretty soon, I think. It'll be nice to see if the economics of all of this is going to actually work, finally. Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPqjWsMPxH8jf3ohaEQJdngCg5bhcubb4ljjgJW9cRrCW0LR8bEkAnRwb bBFdyOhO3Q7Q5aDfMK5Qkke4 =kZMS -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From shaddack at ns.arachne.cz Thu Apr 24 17:37:49 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Fri, 25 Apr 2003 02:37:49 +0200 (CEST) Subject: Rapid information dissemination in hostile environment Message-ID: Sipping from a cup of tea, reading newspapers, and enjoying my favorite pastime - idle musing. I am possibly stating the obvious and already known, though, but someone may find something I forgot about... Time to time, the situation arises an information has to be let out in the fastest possible way. It may be a whistleblowing, it may be the "liberation" of some discovered or "acquired" closed technological detail, it doesn't matter what it is as long as there are The Powers That Be that aren't too happy about it getting out. The less amount of copies Out There, the more vulnerable the information is. Web is excellent as persistent data source, but a website is way too easy to be taken down. FreeNet is better in this regard, as it is fairly impossible to find the physical location of the data source, but the weakness is the Freenet key that has to be published somewhere, the lack of content search engine ("Freenetoogle"?) and the abysmally low utilization by the General Public. For initial distribution of an information in a hostile environment, populated by factors aiming for elimination of the information, Web is rather unusable; sooner than a reasonable number of people get the chance to retrieve the information, the site gets taken down. (Consider the most pessimistic situation with an immediately aware adversary and fully complying ISPs.) The Rapid Information Dissemination (RID) (or maybe Rapid Information Proliferation, RIP?) system has to achieve the widest reasonably possible distribution within first couple seconds, or at most minutes. Two good examples of robust systems providing this feature are Usenet and unmoderated mailing lists. Cypherpunks could be an excellent example for a list especially suitable for RID; spanning several continents, the core list is unmoderated and distributed by automated means (which ensures that even in the case of forced compliance of the moderators they won't have any practical chance of intercepting a mail before it being sent to the unmoderated-list subscribers), and populated by the people whose profiles make them unlikely to comply en-masse with every whim of The Authorities, whoever tries to be that at the moment. One post, matter of few seconds, can then achieve the rapid seed distribution, necessary for ensuring the information can't be entirely eliminated from the world anymore (and then possibly making it even to Web archives - being it the List web archives themselves, or cryptome.org, or Politechbot, or any of the numerous others, depending on the type of the information). The adversary's only possibilities then are "data poisoning", publishing versions of the data with intentional inaccuracies (eg, the way British Secret Service(?) (MI6?) reacted to the leak of their agents list onto the Net), and/or finding the author and unleash the havoc of Exemplary Punishment onto him. The author has the choice of protecting his identity by using eg. an anonymous remailer chain, further limiting the adversary's options, or playing rough and taking the risk in the cases the situation warrants it (though it's always better to keep the awareness that a free guerrilla is better than a hero in prison). Finished the tea, back to work. Opinions, comments, peer review? :) From rah at shipwright.com Thu Apr 24 23:47:45 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Fri, 25 Apr 2003 02:47:45 -0400 Subject: [Lucrative-L] lucrative accounts revisited In-Reply-To: <5.1.1.6.2.20030424221751.02cd1fd8@idiom.com> References: <475309FF-768E-11D7-B4FF-000393D91E36@fexl.com> <475309FF-768E-11D7-B4FF-000393D91E36@fexl.com> <5.1.1.6.2.20030424221751.02cd1fd8@idiom.com> Message-ID: At 10:38 PM -0700 4/24/03, Bill Stewart wrote: >If you do modify the protocols to identify coin or signature batches, >and delete older batches of coins, you have to also refuse to cash them, >like checks that say "Not valid after 90 days" or whatever. Yup, and I'd prefer signature batches, I think. You can easily determine whether which signature was used at the time of redemption. As to the duration of a given tranche, or epoch, or whatever, that would be pre-announced, and probably calculable by the number of signed coins in a given batch, and, yes, you wouldn't have to be absolute in your redemption-expiry policy, particularly if there's still an outstanding balance in an epoch's reserve account. :-). Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From comesefosse at ntani.firenze.linux.it Thu Apr 24 18:47:20 2003 From: comesefosse at ntani.firenze.linux.it (Tarapia Tapioco) Date: Fri, 25 Apr 2003 03:47:20 +0200 (CEST) Subject: Bad Elf. References: <5.1.0.14.0.20030424213652.00a4b4e0@mail.nex.com.au> Message-ID: <5d7fa7a17c2381320a959cd2f573f09d@firenze.linux.it> > This and a variety of other stuff, is showing up > in RAZOR2. Whichever fucking asshole out there is > reporting some of Fuhrer Rat's cypherpunk mail to > RAZOR or any other UE signature repository, needs > to stop now. Excellent idea. The rat's spewings will now be reported. From adam at cypherspace.org Thu Apr 24 20:15:01 2003 From: adam at cypherspace.org (Adam Back) Date: Fri, 25 Apr 2003 04:15:01 +0100 Subject: double-spending prevention w. spent coins In-Reply-To: <726015E0-76CB-11D7-B4FF-000393D91E36@fexl.com>; from patrick@fexl.com on Thu, Apr 24, 2003 at 11:10:20PM -0400 References: <20030424234721.A8027760@exeter.ac.uk> <726015E0-76CB-11D7-B4FF-000393D91E36@fexl.com> Message-ID: <20030425041501.A7984020@exeter.ac.uk> On Thu, Apr 24, 2003 at 11:10:20PM -0400, Patrick Chkoreff wrote: > All right, I can generally understand the purpose here, to make it > impossible to correlate an old coin with a new one issued in its place. > > That I can see. I was starting to get the impression that somehow the > Chaumian techniques were attempting to address the problem of > preventing double spends even when doing a long chain of spends without > contact with a server. In fact they are trying to address a more > modest goal than that, and double spends are still something that must > be detected by contact with the server. So actually using Brands credentials which have an off-line fraud tracing option you could if you wished exchange coins peer-to-peer amongst users, who eventually after some number of peer-to-peer spends deposit their coin back at the bank. The bank checks deposited coins and can tell which users double spent coins if any after the fact. What you do about double spending when you detect a given user has done it is a policy question for the bank -- eg fine user, prosecute user for fraud to recuperate costs etc. (You can also use the same protocol for online checking, so the recipient has the choice of covenience of using peer-to-peer without going via the bank, or the choice to deposit now and get a fresh coin and be sure there won't be any dispute resolution later.) Adam > With the Chaumian techniques, the random coin bits are generated on the > user side: > > http://munitions.vipul.net/documents/cyphernomicon/chapter12/12.5.html > > > "The way the process works, with the blinding, is like this. The user > > chooses a random x. ... > > So naturally the server cannot keep a list of the valid coins because > their specific bits appear to be invented out there in the wild. Hence > keeping the list of spent coins, since keeping a list of unspent coins > is clearly impossible. > > Well hell, that wasn't so hard. > > -- Patrick > http://fexl.com From mv at cdc.gov Fri Apr 25 09:31:16 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 25 Apr 2003 09:31:16 -0700 Subject: Quarantines may be justified [Santorum] Message-ID: <3EA962D4.530899A@cdc.gov> At 04:30 PM 4/23/03 -0700, Tim May wrote: >The Schelling point for such rights was agreed-upon a couple of >centuries ago with the protection of property rights. My house, my >rules. Your house, your rules. "If the Supreme Court says that you have the right to consensual (gay) sex within your home, then you have the right to bigamy, you have the right to polygamy, you have the right to incest, you have the right to adultery. You have the right to anything." -Senator Rick "Felch" Santorum You'd almost think Santorum understands freedom, wouldn't you? Albeit he should have expanded, "anything that doesn't consensually harm others". (E.g., voluntary masochism is moral.) [Adultery is a violation of a monogamy contract if that's what you've signed; a mere civil matter, yawn. Certainly marriage needn't be monogamous unless you enter a voluntary contract to that effect. Incest is questionable if the state has an interest in future citizens, however its definition (except in immediate family) is cultural. Einstein married his cousin. And of course, all kinds of known-mutants (folks with mental illness, folks with inherited physical problems, congressvermin) are allowed to breed freely --even subsidized to do so. So the State's argument that monogamy is required for *responsible* raising of offspring does not hold water. In fact, historically, bastards had no obligations from their father or mother; then their mothers became obligated; then their father too. Didn't stop Jesse Jackson's father from illigitimately siring him, didn't stop Jesse from siring his own bastard.] But, Santorum needs to be tried & hung for what he meant. From camera_lumina at hotmail.com Fri Apr 25 06:31:34 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 25 Apr 2003 09:31:34 -0400 Subject: Bad Elf. Message-ID: Greg Broiles wrote... "Oh, I can do better than that - "Whichever fucking asshole is sending me unwanted messages needs to stop now." "Shit, they haven't stopped. Why don't people listen when I boss them around?" Yeah, I was sacred too. If it doesn't stop maybe this guy will use bad words again! -TD >From: Greg Broiles >To: cypherpunks at lne.com >Subject: Re: Bad Elf. >Date: Thu, 24 Apr 2003 19:22:19 -0700 > >On Thu, Apr 24, 2003 at 05:44:25AM -0700, A.Melon wrote: > > > Pierre Lethier, 48, had been wanted by the French authorities since > > > September 2000 on suspicion that he helped illicitly divert Elf funds >to > > > secure the company's 1992 acquisition of the eastern German Leuna >refinery > > > complex. > > > > This and a variety of other stuff, is showing up > > in RAZOR2. Whichever fucking asshole out there is > > reporting some of Fuhrer Rat's cypherpunk mail to > > RAZOR or any other UE signature repository, needs > > to stop now. > >Oh, I can do better than that - "Whichever fucking asshole is sending me >unwanted messages needs to stop now." > >Shit, they haven't stopped. Why don't people listen when I boss them >around? > >Maybe trying to shift responsibility for solving my problems to others >via the use of anonymous passive-voice messages (passive-aggressive >voice?) isn't a good strategy after all. > >Spam databases which aren't designed to cope with false reports and/or >differences of opinion about what's spam are doomed. On the way to >their doom, they may take some of your inbound mail with them. > >The Cloudmark/Vipul's Razor people don't seem interested in describing >their trust metric system in a public forum, so it's hard to say much >about it beyond "apparently it's not working very well." > >You might try "man 5 razor-whitelist" if you don't like having cpunks >mail tossed in the trash with the spam. > >-- >Greg Broiles >gbroiles at parrhesia.com _________________________________________________________________ The new MSN 8: smart spam protection and 2 months FREE* http://join.msn.com/?page=features/junkmail From ben at algroup.co.uk Fri Apr 25 01:39:10 2003 From: ben at algroup.co.uk (Ben Laurie) Date: Fri, 25 Apr 2003 09:39:10 +0100 Subject: double-spending prevention w. spent coins (Re: [Lucrative-L] lucrative accounts revisited) In-Reply-To: References: Message-ID: <3EA8F42E.1010406@algroup.co.uk> Patrick Chkoreff wrote: > On Thursday, April 24, 2003, at 05:27 PM, Adam Back wrote: > If there is any problem of "linkability" in this scheme, please help me > see it. The server does not log any socket events or transaction > records of any kind. OK, if someone put a gun to my head and said "put > in some code to log everything" then they might be able to discern some > pattern like "this coin was issued to this IP address, and then three > days later that coin was swapped from this other IP address." OK, that > sounds like a potential problem, but I don't see how you can hide this > information from the server ITSELF. When you present a coin to the > server, it is going to know from which IP address it came, and I don't > see a way around that. Blinded coins prevent the server from knowing which IP address they are issued to (that is, it knows it issued _a_ coin to the address, but it doesn't know which one). When it sees an unblinded coin, yes, it knows which IP address that is presented by, but since it doesn't know who had it in the first place, that doesn't help. Of course, the unblinded coin is immediately replaced by a blinded one, thus restarting the cycle. > There is no linkability of personal identity in the system because > there is no personal identity in the system, period. The server has no > use for a public key from any user. Errr - so how do you get money into the system in the first place? Note that blinded coins solve this issue, too - the server can have a list of where all the money came from in the first place, but after that it knows nothing. Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff From mv at cdc.gov Fri Apr 25 10:54:38 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 25 Apr 2003 10:54:38 -0700 Subject: Censorship: state bans games that kill pigs Message-ID: <3EA9765E.CDB41660@cdc.gov> http://money.cnn.com/2003/04/18/commentary/game_over/column_gaming/index.htm Wash. to ban 'violent' game sales State law will levy $500 fines to anyone selling Grand Theft Auto to children. ... The bill passed the Senate 47-7 and is expected to be signed into law by Gov. Gary Locke. Rather than targeting games based on their ratings, the bill specifically mentions those that depict violence against law enforcement officials. We are all reporters, we are all book sellers. We are all first class objects. --Tim May --- And from the Ministry of Irony: WASHINGTON (CNN) -- The Bush administration has warned the Iranian government to stay out of Iraq and not interfere with the country http://www.cnn.com/2003/WORLD/meast/04/23/sprj.irq.war.main/index.html From kelsey.j at ix.netcom.com Fri Apr 25 07:56:19 2003 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Fri, 25 Apr 2003 10:56:19 -0400 Subject: Quarantines may be justified In-Reply-To: References: <5.2.0.9.0.20030422104433.045781d0@pop.ix.netcom.com> Message-ID: <5.2.0.9.0.20030425103313.0446e2a0@pop.ix.netcom.com> At 04:30 PM 4/23/03 -0700, Tim May wrote: ... >But in practice, in real practice out on the streets, this has never been >where the anti-smoking laws have been invoked. No state in the U.S., to my >knowledge, bans smoking outside, on public streets. Right, but that was what was being discussed--regulation of smoking on public property. (Which raises all kinds of interesting definitional issues, since that includes the county courthouse, the street in front of the courthouse, the river running through the middle of town, and the ocean several miles away. Nobody bans smoking in all those places, but I think almost everyone bans smoking in government buildings, and I've seen at least one city park (here in North Carolina!) where smoking is banned once you get off the parking lot.) ... [Discussing real-world antismoking laws, applied to "public places" as in places where the public happens to be--bars, restaurants, etc.] >And here the issue is about as nearly unambiguous as one can get: it is up >to the property owner to decide on smoking policies on his property. This >was as it once was, and it worked very well. Some restaurants barred >smoking, some permitted it, some set up different sections. Likewise, some >companies barrred smoking, some permitted it, some set up smoking lounges, etc. Yep. When only consenting adults are involved on private property, the state ought not to be involved. For some non-obvious dangerous activities, the state might legitimately require a warning of some kind (e.g., "DANGER--POISON"), though in practice this usually seems to devolve to attaching a warning label to everything, with the effect that you don't always know an ass-covering warning label from an honest-to-God, drink a teaspoon of this and you're a corpse, sort of warning label. And for some dangerous activities the state might legitimately restrict children from the activity, though second-hand smoke is a couple orders of magnitude too low of a risk for this to make sense. (And the other Schelling point is to let parents make decisions for their kids until the kids are being obviously abused or subjected to horrifying risks.) ... >The Schelling point for such rights was agreed-upon a couple of centuries >ago with the protection of property rights. My house, my rules. Your >house, your rules. >Examples like Sarin are not helpful, as they differ massively from the >annoyance of smoking. My point was that it's not obvious where the line gets drawn for (say) offensive smells or dangerous fumes, but it is obvious that there needs to be a line there somewhere. Sarin, tear gas, or skunk smell are pretty obvious examples of fumes that, if I give them off in a public place or waft them over to your property, ought to be actionable somehow. Fumes from various inhaled/smoked drugs are somewhere in a gray area. These gray areas exist in every area of life, and a lot of libertarians seem to miss them, because they don't fit cleanly into the list-of-rights-granted-by-God/Rand/TheConstitution model. (For some discussion by a libertarian who understands them very well, see David Friedman's wonderful book _Law's Order_.) >--Tim May --John Kelsey, kelsey.j at ix.netcom.com PGP: FA48 3237 9AD5 30AC EEDD BBC8 2A80 6948 4CAA F259 From mv at cdc.gov Fri Apr 25 11:26:47 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 25 Apr 2003 11:26:47 -0700 Subject: [Erosion of ISP liability-freedom]: schoolscandals.com bullied into closure Message-ID: <3EA97DE7.5D239D18@cdc.gov> Student Insult Web Site Closed Operators blame public outcry over postings of crude, malicious rumors. By Erika Hayasaki, Times Staff Writer A Web site that published crude and malicious rumors about Southern California middle and high school students was shut down Thursday after a public outcry from parents and students. Schoolscandals.com, a 3-year-old Web site run by Western Applications, a Nevada-based corporation, had featured links for chat rooms about nearly 100 Southern California middle and high schools with postings referring to students as "whores," "sluts" and "losers." Those chat rooms are now closed, and a message reads that the bulletin board has been suspended "until some method could be devised to control the content on the forum There is nothing any of us can do about it. We have no money, so we have no power." Ken Tennen, a West Hills attorney who represents the Web site owners, did not return telephone calls Thursday, although he told The Times last week that those who were calling for the site to be shut down were trying to "silence free speech." Ray Lopez, producer of the "John and Ken Show" on KFI-AM (640) radio, said they first aired a segment about the Web site last week after reading about it in The Times, and received hundreds of e-mails and telephone calls from angry students and parents. "High school students are really insecure to begin with, and something just needed to be done about this," Lopez said. One woman, whose son attends a Las Virgenes School District school and who had counseling after being ridiculed on the site, said she was thrilled that it was shut down. "I am glad the Web site is over and [my son] is glad it's done," she said. "He doesn't want to be hurt anymore, and he doesn't want other kids to be hurt." The message now on the site complains about the radio station's campaign against it. A 1996 federal law protects many Internet service providers from lawsuits about their content. Only those sites that hold the right to create and edit material on their sites can be held liable for content, said Mark Radcliffe, a cyberspace and new media law attorney. http://www.latimes.com/news/local/la-me-scandal25apr25,1,1974090.story?coll=la%2Dheadlines%2Dcalifornia ----- "Montag, why do you burn books ?" "It's a job like any other, pay is good and there is a lot of variety". -F451 From mv at cdc.gov Fri Apr 25 12:07:07 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 25 Apr 2003 12:07:07 -0700 Subject: Thanks for the living hell, and question about OpenSSL Message-ID: <3EA9875B.3C71F82B@cdc.gov> At 02:20 PM 4/25/03 -0400, someone claiming to be Patrick Chkoreff wrote: I was mistakenly thinking that because my sacred code did not >in fact record any IP-based transmission logs, users were safe as far >as anonymity and privacy were concerned. What I missed was that if >someone put a gun to my head Generally in security analysis you want to list threat models and how you resist (or not) them. >From this you can derive a spec. Often threats *not* considered provide easy attacks simply because the design didn't consider them. You will always find some attacks that will work, but are expensive for the adversary. Checked your keyboard for keystroke loggers recently, Mr. Scarfo? Swept your room for video bugs? Got a guy with a gun and a dog watching what gets pressed against the fingerprint scanner? And how much does he get paid? (CIA CI chief Aldritch was under $2e6, FBI CI mole Hanssen was cheaper, but his wife wasn't included in the deal, though his stripper got some.) This leads to the conclusion that security is economics + physics. The goal is to make attacks more expensive to your adversary, at "reasonable" cost to you. Subpeonas are cheap to some. ------ _Enemy of the State_ Easter Eggs: * In EotS, the birthdate of the evil spook (Thomas Reynolds, played by Jon Voight) is 9-11-40. (The movie was released in 1998.) * EotS was produced by "No Such Productions" * The screenwriter's surname is Marconi. From zenadsl6186 at zen.co.uk Fri Apr 25 04:45:08 2003 From: zenadsl6186 at zen.co.uk (Peter Fairbrother) Date: Fri, 25 Apr 2003 12:45:08 +0100 Subject: Military Drops OpenBSD Funding Because of de Raadt's Antiwar Comment In-Reply-To: <3EA27941.5050400@algroup.co.uk> Message-ID: Ben Laurie wrote: >> There are potential problems ahead for OpenSSL in the UK. The EU dual-use/ >> (including crypto) export control regulations might be about to be >> implemented here, under the Export Control Act 2002,.. but it won't affect >> the actual releases, just talking about them beforehand... > > Amusing. Not. Incidentally, OpenSSL is (currently) hosted in > Switzerland, if that matters. > > Cheers, > > Ben. It looks like you'll need a licence (or registration) to run a mirror of the BSD's, Linuxes, etc.. Will probably apply in all EU countries soon. -- Peter Fairbrother From timcmay at got.net Fri Apr 25 12:58:02 2003 From: timcmay at got.net (Tim May) Date: Fri, 25 Apr 2003 12:58:02 -0700 Subject: Thanks for the living hell, and question about OpenSSL In-Reply-To: <9CC28A08-774A-11D7-ADBD-000393D91E36@fexl.com> Message-ID: <38F04F54-7758-11D7-B966-000A956B4C74@got.net> On Friday, April 25, 2003, at 11:20 AM, Patrick Chkoreff wrote: > Sincere thanks to everyone for the living hell I went through > yesterday. > > I do understand the rationale for blinding now. The math was never the > problem. I was mistakenly thinking that because my sacred code did not > in fact record any IP-based transmission logs, users were safe as far > as anonymity and privacy were concerned. What I missed was that if > someone put a gun to my head and said "Put in some code to keep > transmission logs and don't tell anybody or I'll kill your family," I > would in fact obey and the security of the system would be compromised > without anyone knowing. As RAH says, force monopolies are a bitch. More importantly, if there is any way for you to track digital money, then whether you _claim_ to be "not recording" or not is irrelevant. Without blinding (or similar), a system is just another "trust me" system. And "trust me" systems are not interesting. Not meaning to sound too harsh, but you need to think deeply about what cryptography is all about and why "trust me, I promise not to look" systems are not desirable or interesting. (The cipher equivalent of your "because my sacred code did not in fact record any IP-based transmission logs" is just the usual central key server example: "Digital Datawhack generates keys for its customers but does not in fact record them." Yeah, right.) --Tim May "A democracy cannot exist as a permanent form of government. It can only exist until the voters discover that they can vote themselves money from the Public Treasury. From that moment on, the majority always votes for the candidate promising the most benefits from the Public Treasury with the result that a democracy always collapses over loose fiscal policy always followed by dictatorship." --Alexander Fraser Tyler From jya at pipeline.com Fri Apr 25 13:43:51 2003 From: jya at pipeline.com (John Young) Date: Fri, 25 Apr 2003 13:43:51 -0700 Subject: Quarantines may be justified [Santorum] In-Reply-To: <3EA962D4.530899A@cdc.gov> Message-ID: It is a fact that those who protest the loudest engage in what they protest against, which is why they scream for attention to their inversion. Saith Sigmund Freud, a pederast, little girls sometimes, boys will do, but best of all polymorphous perversion. Freud's insight is amply exhibited here, but also at DoD, State and Saturday AM radio huzzanahs to the peaceloving peoples of the world: meaning gold-plated CEOs, wealth hoarders, ragers against ill-blamed inheritors of the plundered planet. You hear somebody call for birth control among the heathen, to slaughter the procreaters, grab your wallet, chastity belt your cute little daughter for the sonsbitches who want it all are coming to hurt you and yours as if a birthright of supremacists. That's what Santorum is braying of his kind. From pbaker at verisign.com Fri Apr 25 13:58:06 2003 From: pbaker at verisign.com (Hallam-Baker, Phillip) Date: Fri, 25 Apr 2003 13:58:06 -0700 Subject: [Asrg] A New Plan for No Spam / Velocity Indicator Message-ID: All, I finally got the revision of my paper 'A Plan for No Spam' through legal and posted to the VeriSign Web Site. It is in PDF (sorry no HTML or plaintext version). http://www.verisign.com/resources/wp/spam/no_spam.pdf I would draw folks attention to the Velocity Indicator described in the Authentication section. This provides an overview of the trusted hardware scheme I devised a few months back. While this is a proprietary technology which we have applied for patent protection on and intend to enforce those rights the scheme requires trusted hardware as a precondition and so the license costs would fall on the harware vendor, not the software developer so the patent would not be a bar to open source implementations (unless there is a GNU CPU planned). This post does not waive the rights VeriSign has to that technology, etc. I will be publishing a fuller paper on the scheme in the large at a later date. However here is a brief summary: The trusted hardware base can be anything that is manufactured in controlled conditions. It could be a palladium class PC, but it could equally be simply a trusted bios, or a PDA feature, or it need not be a PC at all, it could be a peripheral such as a smartcard or even a cable modem, nat box, anything you like. In the simplest version of the scheme a private key, a certificate and the current time are loaded into the TCB during manufacture. To create a message the client asks the TCB to provide an authenticator token bound to the message in the usual fashion. This carries the 'velocity indicator' as an authenticated attribute. Each time a signature is created the velocity indicator is updated to reflect the current rate of signing (you could also have a count of the total signatures over the lifetime of the message). This could be the signatures in the past hour and the past day (say). When a recipient receives a message the velocity indicator and signature are checked. The probability that a message is spam is low if BOTH the signature binds to the specific delivery of the message to the user (i.e. has a valid to: field) and the velocity indicated is low. There are a couple of possible tweaks to protect anonymity. For example it is not necessary that the signature be bound to a particular key. You could use the key installed during manufacture to request new keys. You can even partition the box so you have separate counts for different signers (this could be appropriate for a bulk emailer box). If someone takes a box apart and extracts a key we revoke it - not such a big issue as you might think, the gaming studies we have done show that that would be a very poor strategy for an attacker. In essence what we have done is to reinvent the 'sender-pays' concept - hence my previous arguments against handing over actual cash. It is not necessary to have the expense of a transfer system with all the excessive mechanism to prevent fraud that would entail. All that is necessary is the scarcity property of money which we simulate in an entirely scalable fashion. Unlike hashcash and the like this scheme is not vulnerable to moore's law or assumptions of computational cost. The one big drawback is that is does depend on replacing the hardware of the Internet. This is not actually as big a deal as it sounds since it need not be the PC, it could be a cable modem or a NAT box or even a dongle. We could even sell/rent a box to an ISP that would be built on trusted hardware that would sign all the emails going through their mail servers with the velocity indicator being recorded on a per IP address basis. Bulk mailers that send out mailing lists etc have to be dealt with differently but they cannot conceal the fact they are generating large numbers of emails. There is also a layer to defend against certain obvious abuses and such but I will describe those separately since they don't depend on the trusted hardware. Here I have to untangle an issue that came up with the Borderware people who have had similar ideas to some we came up with but I could not talk about at the time. Phill _______________________________________________ Asrg mailing list Asrg at ietf.org https://www1.ietf.org/mailman/listinfo/asrg --- end forwarded text --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From timcmay at got.net Fri Apr 25 14:07:10 2003 From: timcmay at got.net (Tim May) Date: Fri, 25 Apr 2003 14:07:10 -0700 Subject: Censorship: state bans games that kill pigs In-Reply-To: <3EA9765E.CDB41660@cdc.gov> Message-ID: > Wash. to ban 'violent' book sales > State law will levy $500 fines to anyone selling violent books to > those under 21, or those adjudged violent, or those on a list..... > ... > The bill passed the Senate 47-7 and is expected to be signed into law > by This is not of course the actual text of the story, but it could be. We are getting closer and closer with each passing year to wholesale bans on writings, on expressed thoughts, on art, on music. The principle is the same. When a state actor claims to be able to ban speech, whether in books or magazines or video games, those involved should be dealt with appropriately. Trusting the courts is not enough. The Courts, including the Supreme Court, are themselves deeply implicated in unconstitutional police state measures. --Tim May "That the said Constitution shall never be construed to authorize Congress to infringe the just liberty of the press or the rights of conscience; or to prevent the people of the United States who are peaceable citizens from keeping their own arms." --Samuel Adams From timcmay at got.net Fri Apr 25 14:19:49 2003 From: timcmay at got.net (Tim May) Date: Fri, 25 Apr 2003 14:19:49 -0700 Subject: War Criminals or Illegal Combatants? Message-ID: Bottom Line: These so-called Americans have got to go. CNN is reporting that the Big Debate about the rounded-up Iraqi leadership is whether the many Liberated Illegal Regime Members, a la Tariq Aziz and the other 54 spades, hearts, clubs, and diamonds, are to be treated as "prisoners of war," and hence subject to the Geneva Conventions ("name, rank, serial number") or are to be treated as "illegal combatants" (torture, metal cages, withholding of food and water, sodium pentothal, shipment to Guantanamo Bay in metal boxes). When one is an "illegal combatant" in one's own country, we know the U.S. is run by characters out of Alice in Wonderland. I would say more, and more angrily, as I just did before deleting my paragraphs, except I don't desire a fatal visit by our Thought Police, aka the SS. What a fucking fascist country we have become. Fuck it dead. Piss on its corpse. Maybe something will then grow out of it. --Tim May, Occupied America "They that give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -- Benjamin Franklin, 1759. From patrick at fexl.com Fri Apr 25 11:20:37 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Fri, 25 Apr 2003 14:20:37 -0400 Subject: Thanks for the living hell, and question about OpenSSL Message-ID: <9CC28A08-774A-11D7-ADBD-000393D91E36@fexl.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Sincere thanks to everyone for the living hell I went through yesterday. I do understand the rationale for blinding now. The math was never the problem. I was mistakenly thinking that because my sacred code did not in fact record any IP-based transmission logs, users were safe as far as anonymity and privacy were concerned. What I missed was that if someone put a gun to my head and said "Put in some code to keep transmission logs and don't tell anybody or I'll kill your family," I would in fact obey and the security of the system would be compromised without anyone knowing. As RAH says, force monopolies are a bitch. So I'm taking blinding under my wing and working out some example scenarios of exactly how a system might work. I want to be able to describe it to novices. For example, you go to the post office and ship 10 gold coins to such-and-such bank. After they receive the coins, you fire up this program on your computer and do this-and-that. Then to transmit value to your friend in Helsinki, you do this other thing over here. Then your friend in Helsinki fires up a program and does such-and-such, and three days later 7 gold coins appear on his doorstep. That kind of thing. Something that makes a roomful of people who know nothing about modular arithmetic brighten up and think "Hey, I really think I could *use* that." On a technical note, I really like what I see at http://openssl.org and I'm mucking around with it as a possible platform. Does anybody have any comments or concerns regarding the suitability of OpenSSL for the purposes we are discussing here? - -- Patrick http://fexl.com -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 iQA/AwUBPql8dlA7g7bodUwLEQKZVACgsNa3EpC7JbZU8uG2HiSmwuj91MoAoL4Z h5uLPRjXdbdOtCCTsclCAy8X =YlsU -----END PGP SIGNATURE----- From mv at cdc.gov Fri Apr 25 14:33:48 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 25 Apr 2003 14:33:48 -0700 Subject: [Brinworld] PhoneCam vs. court; Publishing faces from the street Message-ID: <3EA9A9BB.EEE7EBBB@cdc.gov> Man fined for taking photo with phone A man has been fined for apparently taking a photograph of a defendant in court using a mobile phone, it emerged today http://www.ananova.com/news/story/sm_773538.html?menu=news.technology Teacher sets up drug dealer 'web watch' A teacher sick of drug dealers and addicts in his neighbourhood has taken the drastic measure of posting their pictures on the internet. John Messiter says he has decided to secretly photograph those terrorising the area and make their images public. http://www.ananova.com/news/story/sm_773853.html?menu=news.technology Interesting privacy/public and libel implications in the latter. From timcmay at got.net Fri Apr 25 15:32:42 2003 From: timcmay at got.net (Tim May) Date: Fri, 25 Apr 2003 15:32:42 -0700 Subject: double-spending prevention w. spent coins In-Reply-To: <5.1.1.6.2.20030424214841.02ce9738@idiom.com> Message-ID: On Thursday, April 24, 2003, at 10:10 PM, Bill Stewart wrote: > Depending on what you're trying to accomplish with your digital cash, > one mode or the other may be useful. Hettinga would probably contend > that > the first-use model is much cheaper and more efficient, > because it avoids the costs of creating and tracking user identities > and tieing it to the world in book-entry fashion. > If you're trying to use it for something like remailer tokens > rather than real cash, that's certainly the case. > > On the other hand, the identity-embedding models have tended to be > more prominent around Cypherpunks, partly because it has its own > technically interesting characteristics, and may have problems > that it can solve, but also because it prevents some kinds of fraud, > such as making it harder for the bank to claim that a coin has already > been spent. I have a _completely_ different impression of which model has been more prominent around Cypherpunks. I agree that Chaum and Brands have had more regime-friendly schemes, heavily involving identity revealing under some circumstances, but I would hardly say that they are either prominent Cypherpunks or that their approaches are prominent _around_ Cypherpunks. The earliest Chaum system, circa 1985-89, sought to preserve full 2-way untraceability via online clearing. Later Chaum systems--and Brands systems at all times, as I recall--made various compromises in what I think were ill-fated attempts to be more palatable to the various dictators in the world. I also disagree that a model where identity is embedded in digital money has more technically interesting characteristics than a pure, first-class system has. More cruft and more baroqueness, yes, as all such systems somehow requiring identity or "is-a-person" credentials, no matter how well disguised, have more cruft and baroqueness. A clean system requiring no identity would be much more interesting to see today. It's how bearer bonds and "markers" and various other forms of money (IOUs, chop marks, warehouse receipts, "pay to the holder of" forms) work. Systems based on identity, even when the identity is only findable via alleged double spending, are more like certain kinds of checks. This is also cleaner in that the security for not letting the digital money leak out (be copied) belongs where it should belong: with the holder. If the would-be double spender was merely careless with his digital money, by allowing the critical numbers to be seen by others, then he is justly punished by having another "get to the train station locker" before he did. If he _himself_ attempts to double spend...well, this is impossible in a system where the first presenter (first to the train locker) gets the money (contents of the locker). Online clearing also offers the best way to "ping" digital cash systems. (Which is the protection against a bank attempting with any regularity to make claims that money was already withdrawn, that a digital money token was already "spent.") From my 1994 Cyphernomicon (accessible via searching with Google, of course): "12.6.5. Double spending - Some approaches involve constantly-growing-in-size coins at each transfer, so who spent the money first can be deduced (or variants of this). And N. Ferguson developed a system allowing up to N expenditures of the same coin, where N is a parameter. [Howard Gayle reminded me of this, 1994-08-29] - "Why does everyone think that the law must immediately be invoked when double spending is detected?....Double spending is an informational property of digital cash systems. Need we find malicious intent in a formal property? The obvious moralism about the law and double spenders is inappropriate. It evokes images of revenge and retribution, which are stupid, not to mention of negative economic value." [Eric Hughes, 1994-08-27] (This also relates to Eric's good point that we too often frame crypto issue in terms of loaded terms like "cheating," "spoofing," and "enemies," when more neutral terms would carry less meaning-obscuring baggage and would not give our "enemies" (:-}) the ammunition to pass laws based on such terms.) 12.6.6. Issues + Chaum's double-spending detection systems - Chaum went to great lengths to develop system which preserve anonymity for single-spending instances, but which break anonymity and thus reveal identity for double- spending instances. I'm not sure what market forces caused him to think about this as being so important, but it creates many headaches. Besides being clumsy, it require physical ID, it invokes a legal system to try to collect from "double spenders," and it admits the extremely serious breach of privacy by enabling stings. For example, Alice pays Bob a unit of money, then quickly Alice spends that money before Bob can...Bob is then revealed as a "double spender," and his identity revealed to whomver wanted it...Alice, IRS, Gestapo, etc. A very broken idea. Acceptable mainly for small transactions. + Multi-spending vs. on-line clearing - I favor on-line clearing. Simply put: the first spending is the only spending. The guy who gets to the train locker where the cash is stored is the guy who gets it. This ensure that the burden of maintaining the secret is on the secret holder. --Tim May "He who fights with monsters might take care lest he thereby become a monster. And if you gaze for long into an abyss, the abyss gazes also into you." -- Nietzsche From timcmay at got.net Fri Apr 25 15:51:15 2003 From: timcmay at got.net (Tim May) Date: Fri, 25 Apr 2003 15:51:15 -0700 Subject: Thanks for the living hell, and question about OpenSSL In-Reply-To: <74867AE0-7769-11D7-ADBD-000393D91E36@fexl.com> Message-ID: <6BC8B3A7-7770-11D7-B966-000A956B4C74@got.net> On Friday, April 25, 2003, at 03:01 PM, Patrick Chkoreff wrote: > The question of whether digital notes can circulate in the wild without > server contact but with the ability to identify double-spenders later > is up for grabs. Hettinga likes that feature for intrinsic reasons > having nothing to do with network reliability or ubiquity. I find it a > bit appealing myself because it can help support small social nets of > accountability. I have not reviewed the math in detail, but am I to > understand that under this protocol ONLY double-spenders can be > identified? That is, if you do not double-spend can you be guaranteed > anonymity from other recipients down the spend chain? > > Obviously those in the know share a common threat model that demands > blinding. Certainly that has serious implications for the server. In > a non-blinded system you can just store a small number of unspent coins > and the server can do tricks like include an lseek number in the coin > data to make lookup extremely fast. But nobody wants an non-blinded > system. Consequently, the server must store a large number of spent > coins and because coin identifiers are created randomly out in the wild > there is no convenient embedded lseek number. But yes, it is extremely > cool that you can get the bank's signature on X without actually > revealing X to the bank. Regarding "digital notes circulating in the wild without server contact," you need to look at some of the articles here (Cypherpunks) from around 1994-97 on "money changing." Cf. articles by Doug Barnes, Ian Goldberg, myself, and others. Accessible via Google. Basically, there is no reason why intermediaries will not develop who agree to take in digital money and issue new digital money, for a fee. The operation of making change is just this. In principle, and probably fairly quickly in practice, the connection with an "issuing bank" (whatever that strange thing may be) is not needed often. "Everyone a moneychanger" and "agnostic" systems work for reasons that would take a lot of time to get into. Several dozen articles, as noted above, get into this. Having a solid, robust, core system of first-class objects is a step we haven't had. The Mark Twain Bank system was too expensive to do experiments with (and didn't last long enough), and so on for other toy systems. --Tim May "He who fights with monsters might take care lest he thereby become a monster. And if you gaze for long into an abyss, the abyss gazes also into you." -- Nietzsche From mv at cdc.gov Fri Apr 25 15:54:05 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 25 Apr 2003 15:54:05 -0700 Subject: Authenticating Meat [was Re: Thanks for the living hell] Message-ID: <3EA9BC8D.F000B6D0@cdc.gov> At 06:01 PM 4/25/03 -0400, Patrick Chkoreff wrote: >Major Variola (ret) wrote: > >> At 02:20 PM 4/25/03 -0400, someone claiming to be Patrick Chkoreff >> wrote: > >(-: The sig is valid for the key at http://fexl.com/keys/patrick.txt) I didn't doubt that it was. However, my caveat remains true, and you haven't proved anything additional. An entity claiming that name, and claiming to be not-a-bot, and apparently controlling the DNS entry at the server I checked today for fexl.com today, has signed a message. Yep, I believe [1] that. I'm not picking on you. Neither am I trying to be a dick; skeptical socratics sometimes appear so. Check the archives for extended discussion as to what, exactly, signing proves. On the other hand, *whatever* entity has been signing these messages collects the reputations associated with them *more reliably*[1] than merely posting under your name. Maybe you're a 14 year old girl pretending to be an FBI agent pretending to be a cryptographer :-) Making the leap from key-holder to meatspace entity is unsound unless something in meatspace demonstrates it. You're all bits from here. ----- [1] Note that these beliefs are moderated by unfounded trust in PGP implem & algs, that you've protected your private key, etc. But we'll grant that for now. ----- "With a laser printer, you can get away with anything" --a Quark-using confederate in the late 80s, referring to the widespread trust of finely printed documents at the time From nobody at remailer.privacy.at Fri Apr 25 07:08:05 2003 From: nobody at remailer.privacy.at (Anonymous) Date: Fri, 25 Apr 2003 16:08:05 +0200 (CEST) Subject: Quarantines may be justified In-Reply-To: <20030420154854.GA1151@cybershamanix.com> Message-ID: <1f834686c2e498cc7727a177a3d09acf@remailer.privacy.at> Harmon Seaver wrote on April 20th, 2003 at 10:48:54 -0500: > On Sun, Apr 20, 2003 at 05:25:55PM +0200, Tarapia Tapioco wrote: > > > Harmon Seaver wrote on April 19th, 2003 at 13:54:57 -0500: > > > > > On Sat, Apr 19, 2003 at 12:30:22PM -0400, stuart wrote: > > > > > > > Smoking in public, that's an easy one to pick on. But the argument > > > > holds no water, unfortunately. Find me RELIABLE, UNBIASED evidence that > > > > second-hand smoke is actually dangerous, and I'll agree to ban smoking. > > > > > > > > > > I could care less what any report says, I get an immediate sick feeling > > > from breathing tobacco smoke. And a great many other people do as well. > > > > Then don't go where there's tobacco smoke. > > Right. Where is that? It's absolutely impossible to walk or ride a bike down > a city street without breathing tobacco smoke. I've walked down many city streets, and I rarely find myself breating tobacco smoke. > I'm always amazed at how many so-called libertarians don't get the concept > that their rights end where my nose begins. Everyone should have the right to > enjoy whatever drug they choose -- as long as their use of it doesn't interfere > with other people's rights to not use it. > So you really think some drug addict has a right to stand on the street > getting his fix and at the same time forcing it upon everyone else in the > immediate vicinity? I'm amazed that anyone too stupid to understand such a > simple concept is even able to type on a keyboard. > By the same logic, it should be alright for me to mix up some LSD and DMSO > and carry it in a little squirtgun to spray smokers with, right? If you think you have the "right" to demand to not smell my tobacco smoke when you willingly enter the area, can I demand that I have the "right" not to smell your various body odors? -- Tom Veil From timcmay at got.net Fri Apr 25 16:13:49 2003 From: timcmay at got.net (Tim May) Date: Fri, 25 Apr 2003 16:13:49 -0700 Subject: Thanks for the living hell, and question about OpenSSL In-Reply-To: <960C10CA-776D-11D7-ADBD-000393D91E36@fexl.com> Message-ID: <927D46A5-7773-11D7-B966-000A956B4C74@got.net> On Friday, April 25, 2003, at 03:30 PM, Patrick Chkoreff wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Tim May wrote: > >> Not meaning to sound too harsh, but you need to think deeply about >> what >> cryptography is all about and why "trust me, I promise not to look" >> systems are not desirable or interesting. > > I'm writing "(unblind (sign (blind X))) = (sign x)" on the board one > hundred times. You don't need to take our word for it--you need to see why modern cryptography avoids trust issues almost completely. I suggest that you dig up Chaum's "Communications of the ACM" paper from 1985: "Transaction Systems to Make Big Brother Obsolete." I read it when it came out, and it triggered many ideas. It's online, or was as of a few years ago. Also, look at his paper on "Dining Cryptographers" to see how information-theoretically secure messages can be sent. Forget worrying about the details of various ciphers in Schneier's book, at least until you have grasped the essence of not relying on trust or "I promise not to look" b.s. schemes. BTW, a more abstract book is Oded Goldreich's "Foundations of Cryptography--Basic Tools," 2001. A little disorganized in places, but lots of core concepts. When you have fully grokked the way messages can be sent without any practical way of tracing their origin, as in the dining cryptographers example, your eyes will be opened. And zero-knowledge interactive proof systems (ZKIPS) will blow your mind. Never again will you argue in terms of "trust me" and "so long as they don't subpoena me" and "I promise not to look." (My simple explanation of ZKIPS in terms of demonstrating a Hamiltonian cycle for a graph is in the archives, from around 1992-3.) --Tim May "Al Qaida was never the real threat...Afghanistan is." "Aghanistan was never the real threat...Iraq is." "Iraq was never the real threat...Syria is." "Syria was never the real threat...stay tuned." From timcmay at got.net Fri Apr 25 16:53:13 2003 From: timcmay at got.net (Tim May) Date: Fri, 25 Apr 2003 16:53:13 -0700 Subject: Thanks for the living hell, and question about OpenSSL In-Reply-To: <6BC8B3A7-7770-11D7-B966-000A956B4C74@got.net> Message-ID: <137C0DA8-7779-11D7-B966-000A956B4C74@got.net> On Friday, April 25, 2003, at 03:51 PM, Tim May wrote: > Regarding "digital notes circulating in the wild without server > contact," you need to look at some of the articles here (Cypherpunks) > from around 1994-97 on "money changing." > > Cf. articles by Doug Barnes, Ian Goldberg, myself, and others. > Accessible via Google. > > Basically, there is no reason why intermediaries will not develop who > agree to take in digital money and issue new digital money, for a fee. > > The operation of making change is just this. > I should have also made clear that the digital notes do not circulate around and around, without server contact (redemption). For one thing, such circulation would a) expose the digital numbers to copying by intermediaries and b) defeat the idea of untraceability. And if the note were not redeemable, the "stuckee" would have no recourse unless the identity of the links were known (and measures could be taken, blah blah). It is best to think of a digital note as a _relationship_ between a and b: aRb. An arrow. A transfer relationship. Alice sends to Bob a digital money token. What he does with it is another transaction (canonically, he sends it to a bank, and, if it is redeemed, he is satisfied. He may also be a bank, or the digital money token may be a form of money he recognizes, as with a remailer token, a stamp). It is best not to think of there being any intermediate steps. That is, any two nodes linked by an arrow have no other nodes between them. The token does not get passed from hand to hand to hand, no matter how complex a series of transactions is. (To do so invites copying, which leads to the double spending problems so often discussed.) (Digression: Even actual folding money works this way, basically. Alice transfers money to Bob who transfers it to Charles, and so on. Of course, with digital money the same token is not transmitted this way. Each stage effectively reissues the money (or Bob "redeems" the money at a bank, which is a special, terminal case).) "Money" is a loaded term, conjuring up various and often-contradictory images of paper notes, bullion, coins, IOUs, personal checks, cashier's checks, warehouse receipts, bearer bonds, drugs, artwork, wire transfers, SWIFT transfers, etc. The relationship R for money is something which needs to be discussed at more length: there may be forms of R for small value or coin-like uses, for medium value banknote-like uses, or even for high value bearer bond-like or bank-like uses. Just as there are many forms of non-digital money, for various uses and with various levels of security and authentication, so too must one expect various kinds of digital money. First class objects are critically important here, but not in a "one size fits all" sense. (Not sure if this is clear or not...as I said, much more needs to be said.) One of the interesting properties of the relationship R is that it involves _belief_. This is really what money is all about. The fact that one's belief that a $20 banknote with the right Andrew Jackson portrait on it is "real money" is only an expression of one's belief that the odds of it not being accepted by some other party, or by the U.S. Treasury, is close to nil. In areas where banknotes are more commonly forged, and thus not accepted, such a belief would be naive. And so on for various other forms of money. Even digital money. Which gets us into reputations and ping systems (with blinding, an issuer can decide to "burn" (renege on) particular users, which makes repudiation difficult and not something banks which wish to stay in business will lightly do). Properties of these graphs (or, in certain interesting cases, lattices) are crucial to understanding digital money. --Tim May "The Constitution is a radical document...it is the job of the government to rein in people's rights." --President William J. Clinton From shaddack at ns.arachne.cz Fri Apr 25 08:19:52 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Fri, 25 Apr 2003 17:19:52 +0200 (CEST) Subject: Military Drops OpenBSD Funding Because of de Raadt's Antiwar Comment In-Reply-To: Message-ID: On Fri, 25 Apr 2003, Peter Fairbrother wrote: > It looks like you'll need a licence (or registration) to run a mirror of the > BSD's, Linuxes, etc.. > > Will probably apply in all EU countries soon. Do you have more informations about this, please? My Wise Government is doing their first and last to join that gang of thughs. I don't think that requiring registration for hosting free software is exactly consistent with their perpetual claims about how free they are and how much more free we will be when we will be assimilated... From justin at soze.net Fri Apr 25 10:41:04 2003 From: justin at soze.net (Justin) Date: Fri, 25 Apr 2003 17:41:04 +0000 Subject: Quarantines may be justified [Santorum] In-Reply-To: <3EA962D4.530899A@cdc.gov> References: <3EA962D4.530899A@cdc.gov> Message-ID: <20030425174104.GB25990@dreams.soze.net> At 2003-04-25 16:31 +0000, Major Variola (ret) wrote: > But, Santorum needs to be tried & hung for what he meant. Do you have plans to try and hang the Supreme Court Justices who upheld Sodomy laws in Bowers v Hardwick? What about the significant minority of Americans who'd completely agree with Santorum's remarks? The Justices involved with the majority opinion in Bowers, most notably ex-Justice Lewis Powell, need some S&M experience with Satan far more desperately than does Santorum. Santorum's just a patsy. -- Freedom's untidy, and free people are free to make mistakes and commit crimes and do bad things. They're also free to live their lives and do wonderful things. --Defense Secretariat, 2003-04-11 From patrick at fexl.com Fri Apr 25 15:01:24 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Fri, 25 Apr 2003 18:01:24 -0400 Subject: Thanks for the living hell, and question about OpenSSL In-Reply-To: Message-ID: <74867AE0-7769-11D7-ADBD-000393D91E36@fexl.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Major Variola (ret) wrote: > At 02:20 PM 4/25/03 -0400, someone claiming to be Patrick Chkoreff > wrote: (-: The sig is valid for the key at http://fexl.com/keys/patrick.txt) > I was mistakenly thinking that because my sacred code did not >> in fact record any IP-based transmission logs, users were safe as far >> as anonymity and privacy were concerned. What I missed was that if >> someone put a gun to my head > > Generally in security analysis you want to list threat models and how > you resist (or not) them. > From this you can derive a spec. ... > This leads to the conclusion that security is economics + physics. The > goal is > to make attacks more expensive to your adversary, at "reasonable" cost > to you. > > Subpeonas are cheap to some. True. From the thrashing I took yesterday, I conclude that subpoenas and other forceful means of system compromise are very cheap indeed. That assumes the system is big enough to matter to the bad guys, which is definitely false at initial rollout but from the looks of this crowd is likely to remain false forever if the system cannot guarantee protection against that threat. Everybody here wants an improvement over book-entry systems, but nobody will settle for anything less than fully blinded digital notes. The question of whether digital notes can circulate in the wild without server contact but with the ability to identify double-spenders later is up for grabs. Hettinga likes that feature for intrinsic reasons having nothing to do with network reliability or ubiquity. I find it a bit appealing myself because it can help support small social nets of accountability. I have not reviewed the math in detail, but am I to understand that under this protocol ONLY double-spenders can be identified? That is, if you do not double-spend can you be guaranteed anonymity from other recipients down the spend chain? Obviously those in the know share a common threat model that demands blinding. Certainly that has serious implications for the server. In a non-blinded system you can just store a small number of unspent coins and the server can do tricks like include an lseek number in the coin data to make lookup extremely fast. But nobody wants an non-blinded system. Consequently, the server must store a large number of spent coins and because coin identifiers are created randomly out in the wild there is no convenient embedded lseek number. But yes, it is extremely cool that you can get the bank's signature on X without actually revealing X to the bank. Certainly there are more detailed threats than forced compromise to consider. Some precautions you take just because you can -- lock and randomize memory for example. But whether you turn on internal churning mechanisms to prevent timing attacks, put ceramic caps on memory components, put boxes in Faraday cages, etc. is another story altogether. - -- Patrick http://fexl.com -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 iQA/AwUBPqmwOVA7g7bodUwLEQIW2QCgqNLLeEA/PbOe3dgazARsXvEJJVoAoLYi nPzuhTdEBoXQs0BJ8ysLz92c =E5lc -----END PGP SIGNATURE----- From mv at cdc.gov Fri Apr 25 18:25:22 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Fri, 25 Apr 2003 18:25:22 -0700 Subject: Thanks for the living hell, and question about OpenSSL Message-ID: <3EA9E001.DE109161@cdc.gov> At 04:13 PM 4/25/03 -0700, Tim May wrote: >Forget worrying about the details of various ciphers in Schneier's >book, Indeed. I entered crypto interested in how ciphers worked. (Avalanche, my boy, avalanche). But all you need to know is what they do, and a few properties of noise. Similarly with PK ciphers. Just know that RSA lets you use insecure channels, and you don't have to be online. DH does same, but requires online-ness. Only a few need actually worry about implementation details. The more sophisticated protocols that use these components --Blind this, Dining that, Split it N ways, Sign here-- are the building blocks that app designers ought to know. Again, one needs to know what's possible with the protocols, not how to do them. [This is not to say that undergrads should not be exposed to them, much as they derive things in school which later they'll merely know exist, and can look up if necessary. Neither is it to denigrate those who study, invent, maybe improve these things.] Got Montgomery multiplication? From patrick at fexl.com Fri Apr 25 15:30:58 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Fri, 25 Apr 2003 18:30:58 -0400 Subject: Thanks for the living hell, and question about OpenSSL In-Reply-To: Message-ID: <960C10CA-776D-11D7-ADBD-000393D91E36@fexl.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Tim May wrote: > Not meaning to sound too harsh, but you need to think deeply about what > cryptography is all about and why "trust me, I promise not to look" > systems are not desirable or interesting. I'm writing "(unblind (sign (blind X))) = (sign x)" on the board one hundred times. - -- Patrick http://fexl.com -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 iQA/AwUBPqm3I1A7g7bodUwLEQLBtQCgxyXbUvKDtgfIM1yPdpy1CuynegMAnjWd NDt1h4fmiu1OBreIZdrc8CnV =deYX -----END PGP SIGNATURE----- From nobody at remailer.privacy.at Fri Apr 25 10:28:10 2003 From: nobody at remailer.privacy.at (Anonymous) Date: Fri, 25 Apr 2003 19:28:10 +0200 (CEST) Subject: Quarantines may be justified In-Reply-To: Message-ID: <418470244d3a1a238d731638ae9a6ac7@remailer.privacy.at> Thomas Shaddack wrote on April 15th, 2003 at 23:30:57 +0200: > On 14 Apr 2003, Tom Veil wrote: > > > If I want to keep secret the details of something I make, it is my right > > to do so. > > Then I have the right to appropriately dislike you, and to > reverse-engineer the "product", which is so shoddy that you are ashamed of > documenting its internals, and to publish it. I've never said that people should be legally punished for tinkering with the stuff they've bought, nor do I think they should. (snipped) > > Don't like it? Don't fucking buy it. > > THERE IS NO CHOICE! Well I guess that's tough, isn't it? There simply isn't much of a market for open, fully-documented products. Of course, you are free to make your own fully-documented, open-source products, or encourage those companies to make documentation available to implementers and administrators. > > Any communist maggots that murder, or attempt to murder people for merely > > keeping secret the details of the stuff they make and sell should be bound, > > gagged, tortured, then taken out back to have their skulls crushed with a > > sledgehammer until their brains start oozing out their ears. > > ...and after you kill off all the technicians with a peeve against the > money-hungry corporations (read: everyone who ever tried to do some real > work on a budget), you will pay through your nose for every hiccup, and > not only in money, but also in time loss and in being whined at for not > being able to do something immediately. I didn't say anything about killing technicians. I _did_ say things about killing people who would murder others for keeping secrets. > I could talk for long about "intellectual property", my pet peeve, but one > paragraph will do. There was no such concept for millenia. While protecting IP is a duly authorized power of the US government, the way it extends protection for periods of time sometimes spanning the entire course of an average human lifespan, is far beyond any reasonable interpretation of the "limited Times" proviso in Article I, Section 8, and such excessively long periods of protection should be ruled unconstitutional. As for the DMCA, it is simply an atrocity. Obviously unconstitutional. > And then you come and have the balls to defend the "right" of the > vendors to not reveal how crappy and unfinished is what they dare > to call a "product".) I defend the right of EVERYONE to try and keep stuff secret that they want to keep secret. Of course, tough shit if somebody discovers this secret in a non-coercive fashion. > Vendors, who keep crucial informations away from the customers, should be > shot. If you attempt to shoot people for the "crime" of keeping something secret, I will ally with them in efforts to liquidate you. > The ones, who try to sue the reverse engineers, should be boiled in > oil before being shot. This may be acceptable. Actually, the members of Congress who enabled these sorts of lawsuits should be liquidated. -- Tom Veil From patrick at fexl.com Fri Apr 25 16:49:23 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Fri, 25 Apr 2003 19:49:23 -0400 Subject: Correction In-Reply-To: <960C10CA-776D-11D7-ADBD-000393D91E36@fexl.com> Message-ID: <8A5D60C1-7778-11D7-ADBD-000393D91E36@fexl.com> > I'm writing "(unblind (sign (blind X))) = (sign x)" on the board one > hundred times. Waste of bandwidth I know, but it's bugging the hell out of me. Please upper-case that 'x'. -- Patrick From justin at soze.net Fri Apr 25 14:02:10 2003 From: justin at soze.net (Justin) Date: Fri, 25 Apr 2003 21:02:10 +0000 Subject: Censorship: state bans games that kill pigs In-Reply-To: References: <3EA9765E.CDB41660@cdc.gov> Message-ID: <20030425210210.GC25990@dreams.soze.net> At 2003-04-25 20:07 +0000, Thomas Shaddack wrote: > > Wash. to ban 'violent' game sales > > State law will levy $500 fines to anyone selling Grand Theft Auto to > > children. > > I think I know what will become the #1 CD of school playground "swap > meetings". Don't forget zero tolerance. If caught, they'll be suspended or expelled or transferred. I've never understood the concept of expulsion from public school before age 16. "You must go to school" then "you must not go to school" seems rather silly to me. I guess it's better to have them running around neighborhoods in gangs with real guns than going to school and using chicken strips to shoot at teachers. About the cd swapping, maybe their parents will go to jail, too. That's going to be really productive for shaping the child's or young teen's perception of society. -- Freedom's untidy, and free people are free to make mistakes and commit crimes and do bad things. They're also free to live their lives and do wonderful things. --Defense Secretariat, 2003-04-11 From patrick at fexl.com Fri Apr 25 18:54:33 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Fri, 25 Apr 2003 21:54:33 -0400 Subject: Thanks for the living hell, and question about OpenSSL In-Reply-To: Message-ID: <07244BFE-778A-11D7-ADBD-000393D91E36@fexl.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Tim May wrote: >> I'm writing "(unblind (sign (blind X))) = (sign X)" on the board one >> hundred times. > > You don't need to take our word for it--you need to see why modern > cryptography avoids trust issues almost completely. No no, I'm not writing it out of blind obeisance. I actually see how and why blinding achieves anonymity and avoids the trust issue. When someone presents a note for redemption, the server literally has no way of knowing to whom that note was originally issued. All it knows, and all it can *possibly* know, is that it is a valid note that has not been redeemed. In the previous scheme I was simply not aware of this design goal. I did not even view my system as implying a promise not to look. I simply viewed it as a system that does not in fact look. But I see now why that's a problem, because (1) a system that does not look now can start looking tomorrow and (2) users have no way of knowing either way. So the promise of which you speak is in fact implied, as I know today after my cypher-hangover this morning. Nothing a four mile walk with the dog couldn't cure. > I suggest that you dig up Chaum's "Communications of the ACM" paper > from 1985: "Transaction Systems to Make Big Brother Obsolete." I read > it when it came out, and it triggered many ideas. It's online, or was > as of a few years ago. That's funny, it was a 1989 CACM article by J. Steensgaard-Madsen that triggered my ideas about purely function languages like Fexl. Classic stuff from the 80's. Thanks for the intriguing reference. > Also, look at his paper on "Dining Cryptographers" to see how > information-theoretically secure messages can be sent. > > Forget worrying about the details of various ciphers in Schneier's > book, at least until you have grasped the essence of not relying on > trust or "I promise not to look" b.s. schemes. Right, actually I'm scribbling out a system overview in terms of functions with specific properties independent of their implementation in modular arithmetic or anything else. Basic relationships like (encrypt (decrypt X)) = X, (unblind (sign (blind X))) = (sign X), (sign X) = (decrypt (hash X)). Definitions like a 'note' is . Identifying which functions are secret to whom and which are public. Generation procedures such as: given a public 'encrypt' function, generate a random pair of functions with specific desirable properties. All without reference to any specific number-theoretic + padding implementations. This helps me get a feel for the whole flow of the system and all it implies. That plus a strong platform like OpenSSL (I presume) should yield good application code. I'm not much of a GUI guy, so I may just do a reasonably substantial API layer, a tight set of user-side command line primitives, and a socket-based server program. Or I may just throw in the towel and burrow around in the Lucrative code, but I'm not much of a Java guy either. > BTW, a more abstract book is Oded Goldreich's "Foundations of > Cryptography--Basic Tools," 2001. A little disorganized in places, but > lots of core concepts. > > When you have fully grokked the way messages can be sent without any > practical way of tracing their origin, as in the dining cryptographers > example, your eyes will be opened. And zero-knowledge interactive proof > systems (ZKIPS) will blow your mind. Never again will you argue in > terms of "trust me" and "so long as they don't subpoena me" and "I > promise not to look." Again, I must stress that I was never *knowingly* advocating that users must "trust me." I was not aware until yesterday that "trust me" was, in fact, an implied premise in my system. Certainly if there was some meta-certain way for users to know that my system was not keeping records, it could work just fine. But there isn't, so it couldn't. > (My simple explanation of ZKIPS in terms of demonstrating a Hamiltonian > cycle for a graph is in the archives, from around 1992-3.) Sounds great. Thanks again. - -- Patrick http://fexl.com -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 iQA/AwUBPqnm4FA7g7bodUwLEQKYrwCg96E4VRcEhFU2jfKspzN1qvY5pM4AoJgl QLFXpOib+vwB1WSDTiJQI/8X =vZt3 -----END PGP SIGNATURE----- From shaddack at ns.arachne.cz Fri Apr 25 13:07:07 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Fri, 25 Apr 2003 22:07:07 +0200 (CEST) Subject: Censorship: state bans games that kill pigs In-Reply-To: <3EA9765E.CDB41660@cdc.gov> Message-ID: > Wash. to ban 'violent' game sales > State law will levy $500 fines to anyone selling Grand Theft Auto to > children. I think I know what will become the #1 CD of school playground "swap meetings". Yet another feel-good law with no real impact! From timcmay at got.net Fri Apr 25 22:56:02 2003 From: timcmay at got.net (Tim May) Date: Fri, 25 Apr 2003 22:56:02 -0700 Subject: Making Money in Digital Money In-Reply-To: <20030426025046.A8088505@exeter.ac.uk> Message-ID: On Friday, April 25, 2003, at 06:50 PM, Adam Back wrote: > On Fri, Apr 25, 2003 at 03:32:42PM -0700, Tim May wrote: >> I have a _completely_ different impression of which model has been >> more prominent around Cypherpunks. > > Most people I've noticed prefer to avoid the "and then he goes to > jail" step because it invites regulation and government involvement, > is expensive and unappealing. It also involves a identifying > registration step to participate which is a barrier to entry. For now, I only want to say something about this. Not _exactly_ about this, but about the desire some players have to do certain things. These players being: -- some implementors -- and ESPECIALLY some start-up companies working to deploy systems (I don't necessarily mean ZK, but if the shoe fits....) -- and EVEN MORE ESPECIALLY most banks and financial institutions connected to these efforts And here's what they want to do: -- make money (a noble goal, but sometimes not realizable directly with an idea) -- avoid prosecution under the Freedom from Traitors Act, the Anti-Money Laundering Act, RICO, etc. I think it may just not be possible for some bright programmer to develop a solid digital money (henceforth, DM) system and deploy it while still making money, avoiding some kind of prosecution or lawsuit (civil lawsuits for many different reasons). A solid DM system, which Adam more or less included in his taxonomy of DM proposals, is a substantial threat to many special interests, to many governments, to various crime families (Corleone, Bush families), and so on. We've discussed the implications so many times it hardly bears repeating for me to even start on a laundry list. In many ways, the situation is a bit analogous to the dawn of printing, or to the dawn of radio. Entrenched interests affected, societal changes triggered. And while we don't have the Church to worry about today, we have millions of lawyers and regulators, ready to pounce on anything that has not been done before, ready to file lawsuits and RICO prosecutions at anything that smacks of tax evasion, money laundering, illegal financial support for outlawed religions, child porn, and on and on. Again, I won't compile a laundry list. If one thinks of "acceptable use policies," or Ebay's neverending dance with prosecutors and investigators over things bought and sold on their system, or Napster, the nightmare of having several floors full of lawyers to deal with these suits and prosecutions must be daunting to any established business thinking about providing untraceable DM. (Real money, real cash, would never get approval were it being introduced today, just as aspirin would never get FDA approval...perhaps a slight exaggeration, but the basic point is valid.) OK, where is this going? To cut to the chase: * Real DM will likely be introduced in a guerilla fashion, much as Pr0duct Cypher anonymously released Magic Money a decade ago. To this day, the identity of PC is unknown (though some folks think it must be a person with the initials _ _ ...naw, I'll leave the guessing off of the archives here!). * Releasing a DM system anonymously means no credit for the developer, except whatever satisfaction he gains from the work, from seeing the foundations shaken, and perhaps from a small group of friends who suspect it was his work. And he may be able to eventually prove authorship, or carefully set the release up so that he escapes prosecution. (Recall that PRZ was hounded and almost indicted for export of PGP when quite clearly he was not involved in the export, when that person named by Jim Warren (with initials _ _ ) was the one who apparently was a key player in the export. Consider the various RICO and Terrorism implications of a DM system which makes tax evasion, purchase of child porn, etc. suddenly very possible.) * In my view, not necessarily the view of everyone in the DM community, the Big Win for solid DM is in illegal markets, e.g., buying and selling child porn, bestiality, snuff images, etc., and in untaxed betting, buying and selling corporate information, and all the things which untraceability of a very strong form is needed for. Again, this laundry list of applications has been around for a long time. (I was invited to address a group in Redwood CIty at the home of Phil Salin in the summer of 1988, and outlined BlackNet, escrow accounts, contract killing markets, data havens, etc. The stuff mentioned in my Crypto Anarchist Manifesto, issued that summer.) All well known, and very controversial, applications. Applications the Feds will expend great amounts of money to try to stop. But it is this kind of an application that someone will be motivated to set up an untraceable DM account for...casual users will not even bother with PGP, let alone DM. * These applications are different from the "low value - low transaction cost" section of the scatter plot of "value of the information being hidden vs. cost to hide it" graph. At the low end, what I have sometimes called the "millicent ghetto," we have anonymous payments for subway travel, where the value of untraceability is fairly low and where the costs of getting it must then of course be proportionately low. This is the area where work on PDAs and smartcards touches on DM. Not very Cypherpunkly interesting, in my view. Higher on the value-cost graph might be remailer uses. Or buying Web pages. (Where one is willing to pay a few pennies per article to ensure that Big Brother can't compile dossiers.) And of course far to the right on the value axis and up on the cost axis are the uses where the cost of getting caught buying child porn, for example, is a multi-year prison sentence. Those in pedophile and similar trading rings are likely to be willing to pay a lot for protection. (Note that encryption, which they often use, is only one part of the total solution: their VISA bills and money orders are usually where they get caught. An untraceable DM system is needed. And, as we have discussed many times, much more than Chaum's "buyer is untraceable" is needed, as the FBI can set up stings to find the _sellers_. (For those squeamish with my use of child porn as an example should construct their own examples. ONe wag refers to sellers of images of "Women Without Veils" as a Western-friendly example. I like to cite selling birth control information: illegal in most Islamic countries. A DM system for such uses must be both buyer- and seller-untraceable. And probably bank-untraceable, though that's for another discussion.) * Anyone releasing such a strong DM system should be targeting the high end applications, where the needs for untraceability are very high and the willingess to pay the costs (in training, in network resources) is also high. * In my view, most who have looked to enter the DM market (such as Digicash, Mark Twain Bank, etc.) have shied-away from precisely the areas where untraceability meets a real market need. Most people don't care much about untraceability of tiny transactions (examples abound--even in my own case, I use my bank cards for nearly any purchase that is not small change). * But to release a product which meets these needs is to invite real trouble! (I met with two of the founders of Zero Knowledge entering the "untraceable mail" business several years ago. I outlined cases including users threatening the PM of Canada and of extortionists threatening to blow up a plane. And child porn. I argued that a company with a readily identifiable nexus of operation in a major city could not survive such uses...the archives contain a discussion of what we talked about.) * Note that "acceptable use policies" and "account cancellation" don't work for untraceable mail systems (except maybe after the fact, where a nym can be cancelled...not a huge obstacle when nym reputations are transferrable and where nyms are purchasable for $10 each per year, or somesuch...note that I'm not saying I liked the account orientation of Freedom Net, but even with their system the threat of account cancellation for violations of acceptable use policy was not terribly useful in this context). A digital money system where the DM may be "cancelled" will not fly. For various reasons. (Imagine your bank telling you that if they think you are violating their use policies they may simply seize your money and you'll be out of luck.) OK, again, where is this going? * It may be that pioneers in this area just won't be able to make any money. This is not new. Many discoveries did not enrich the discoverer. Sometimes they were recognized in their lifetimes, sometimes not. James Watt did not hold back on revealing his steam engine until he was assured that he would dominate the market. (Actually, James Burke used to do a lot of episodes on guys like Watt. I've forgotten whether or not Watt ever made a lot of money off of his invention...but I do know that the major steamship and machinery companies of the 1800s were not named after James Watt.) I believe David Chaum probably should have skipped the idea of having a company of his own and developing products which used his blinding techniques. He was already wealthy (and self-financed much of Digicash, as I understand the story, losing a lot of his own money in the process) so he could simply have licensed the patents and watched the fireworks. For those who really want to be the next Bill Gates, look elsewhere. There may be some bucks to be made, but with many problems. Even with some as relatively straightforward as PK crypto, it was touch and go for many years with RSA Security (according to my talks with Bidzos, and discussed in Levy's book "Crypto"), and it was fortuitous that a) software patents had just gotten rolling in time for them to capitalize on the confusion, and b) the rise of the Web in the mid-90s and the dot com boom happened in time for them to get rolling. (I don't follow their finances at all, so I don't know how well their business is doing.) Maybe the dot com crash is the best thing to have happened to our little community. Several years ago it seemed that everyone at a CP meeting was talking about the latest start-up company, or joining one, or starting one themselves. Now, things have come back to reality. And the reality is that someone or some group will combine enough protocols and algorithms, whether they are patented or licensed or not, and release a working DM system. Perhaps tied to an offshore bank, perhaps to something like PayPal, for redemption. And if they are smart, they'll stay anonymous. They for sure will not be a U.S.-based company, not if they are doing the things we want to see done. --Tim May From patrick at fexl.com Fri Apr 25 20:22:41 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Fri, 25 Apr 2003 23:22:41 -0400 Subject: Authenticating Meat In-Reply-To: Message-ID: <56FCA79E-7796-11D7-ADBD-000393D91E36@fexl.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Major Variola (ret) wrote: > I didn't doubt that it was. However, my caveat > remains true, and you haven't proved anything additional. Let me know when you're in the Jasper, Georgia area and we'll have a few beers. :-) > An entity claiming that name, and claiming to be > not-a-bot, and apparently controlling the DNS entry > at the server I checked today for fexl.com today, > has signed a message. Yep, I believe [1] that. That about sums up my digital identity, yes. The real Patrick is tied up in the cellar and I forced him to tell me his password. As the de Vere and Marlowe scholars might say, the works of Shakespeare were not written by Shakespeare, but by somebody else using that name. Not to compare myself with Shakespeare. All too often my words are full of sound and fury, signifying nothing. Like now. > I'm not picking on you. Neither am I trying to be a dick; > skeptical socratics sometimes appear so. Check the archives > for extended discussion as to what, exactly, signing proves. Will do, thanks. I have plenty of reading ahead of me. > On the other hand, *whatever* entity has been signing > these messages collects the reputations associated with > them *more reliably*[1] than merely posting under your > name. ... Well said. I find it utterly amazing that mere sequences of bits can accomplish this. > Maybe you're a 14 year old girl pretending to > be an FBI agent pretending to be a cryptographer :-) Oh God, so it's that obvious? I'm devastated. > Making the leap from key-holder to meatspace > entity is unsound unless something in meatspace demonstrates > it. All this talk about meatspace suggests we should have some spare ribs with those beers. Of course, writing style and personality can help expose private key hijacking and impersonation somewhat, though even that can be counterfeited. I can recognize a post by JP May with my eyes squinted, just looking at the shapes of the letters and paragraphs. But I bet I could do an utterly, mind-bogglingly good impersonation if I tried. > You're all bits from here. BE the bits. - -- Patrick http://fexl.com -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 iQA/AwUBPqn7ilA7g7bodUwLEQIOBACg3TZd5QDrTRZrAfbQp5mL3zOmCSMAmweL SAuFYI7/FFp5ykM+uteVkrsZ =kNeU -----END PGP SIGNATURE----- From adam at cypherspace.org Fri Apr 25 18:50:46 2003 From: adam at cypherspace.org (Adam Back) Date: Sat, 26 Apr 2003 02:50:46 +0100 Subject: double-spending prevention w. spent coins In-Reply-To: ; from timcmay@got.net on Fri, Apr 25, 2003 at 03:32:42PM -0700 References: <5.1.1.6.2.20030424214841.02ce9738@idiom.com> Message-ID: <20030426025046.A8088505@exeter.ac.uk> On Fri, Apr 25, 2003 at 03:32:42PM -0700, Tim May wrote: > I have a _completely_ different impression of which model has been > more prominent around Cypherpunks. Most people I've noticed prefer to avoid the "and then he goes to jail" step because it invites regulation and government involvement, is expensive and unappealing. It also involves a identifying registration step to participate which is a barrier to entry. > I agree that Chaum and Brands have had more regime-friendly schemes, > heavily involving identity revealing under some circumstances, but I > would hardly say that they are either prominent Cypherpunks or that > their approaches are prominent _around_ Cypherpunks. The earliest Chaum > system, circa 1985-89, sought to preserve full 2-way untraceability via > online clearing. Later Chaum systems--and Brands systems at all times, > as I recall--made various compromises in what I think were ill-fated > attempts to be more palatable to the various dictators in the world. I think the controversy surrounding political friendliness was centered on properties which are not intrinsic but apparently selected by implementors or proponents: - there are five schemes we can look at: - chaum online (CON), chaum/ferguson offline (CFOFF), brands online (BON), brands offline (BOFF), brands p2p offline (BP2P), and wagner online (WON) - offline means payees can receive funds without connecting to the bank immediately to check validity; their remaining assurance of not accepting double-spent coins is that if a coin they receive is double spent the bank will learn who is responsible; all offline schemes also have an online deposit protocol for when the money is paid into the bank. - in fact offline coins generally can not be respent without exchanging for a fresh coin at the bank, so the offline function is perhaps better described as "delayed deposit". - for why this is the case consider bank -> U1 -> U2 -> U3 -> bank with 3 payer/payees U1, U2, U3; bank->U1 is withdrawal, U3-> bank is deposit, U1->U2 is pay, but U2->U3 isn't safe and here's why: - U2 can't convince U3 that he knows the private key for the coin because U2 does not have it to give him (U3 needs that proof to know that U2s identity is in the coin and will be revealed to the bank in case of double spending) - if U1 did give U2 his private key, so that U2 could convince U3 to accept his coin, then U2 could double spend and U1 would get blamed, so it is not in U1's interests to give U2 the coin private key - but in the special case of Brands offline, there is a peer-to-peer offline (which I called BP2P) which is a respendable offline option which allows safe offline peer-to-peer transfers. (The trick is in fact to cryptographically bind peer2peer coins (which grow at each exchange) to 0-value coins with the p2p recipient's identity in them. This trick only works with Brands offline I think, because CFOFF doesn't have a private key to bind with). - all of the systems provide unconditional payer anonymity (CON, COFF, BON, BOFF, BP2P, WON) And collusion proof robust payee and payer anonymity is inherently possible with all the systems by using accountless operation - this works generically on all systems. Basically the bank provides an interface to allow deposit of coins and getting back fresh blind coins. In fact for this Brands has an extra protocol option to allow this to be done in a single operation (so-called re-freshed coin -- same attributes, new blinding factors). This is not just an efficiency win, it has important privacy value: with this protocol the bank does not learn the coin attributes. In particular this means the bank would not learn the amount of the transaction, as one of the attributes will be the transaction value (ie it can not distinguish 1c from $1000). This I'd argue makes the Brands protocol much more pragmatically secure against flow analysis. (With Chaum the bank has a separate public key per coin denomination, and could to some extent statistically trace groups of coin denominations). Chosing not to offer accountless operation is a policy decision by implementors and proponents (the usual argument is to avoid the "blackmail attack" -- ie so an unwilling payer extorted can later collude with the bank to identify the extorter). However the side-effect (which is bad) is to make sting operations possible against anonymous sellers who are politicaly unpopular. As Tim has articulated before there are lots of good reasons a seller should be able to be robustly anonymous. Then are two approaches to extracting payee anonymity even if the bank makes the political decision to not support accountless operation which due to the math work as follows: 1. money changers - this works generically on all schemes -- basically an entity launders the money handing out fresh coins for used coins, optionally depositing the coins at the bank before handing out fresh coins. Typically it is supposed that the money changer would charge a commission. You do not have to trust the money changer with your privacy because you chose your own blinding factors. 2. payer cooperation -- this also works (to varying extents) with all schemes. - one approach to getting payee privacy is if the payer cooperates with the payee in an online fashion so that only the payee knows the blinding factors (essentially the payee acts as the withdrawer also, and the payer acts as a bit pipe). This protects the payee as the payer no longer has information allowing him to collude with the bank - the other side of adding payee privacy with this approach is presumably the payer would also like to retain his privacy - with Chaum's online protocol double blinding works because of the math, so the payer and payee can both be private without needing to trust the other party not to collude with the bank - with the other schemes the double blinding trick does not work which creates a privacy risk for the payer -- the payee can collude with the bank and identify the payer -- this essentially means that only one of the payer or payee can be robustly private at a time (if the bank refuses to offer accounless operation) So in summary the best and simplest way to generically get robust payer and payee privacy is accountless operation. If bank chooses to not offer this option, then Chaum online protocol has the best workaround (retaining payer privacy); however even it is quite inconvenient requiring both parties to be simultaneously online. This requires non-standard software, and interferes with usage pattern -- many normal uses may not require the online aspect -- eg email your payment. Forced to be online also practically reduces the privacy of both payer and payee against observers as interactive connections tend to offer less robust privacy. The money changer approach works also, but the bank may be able to recognize money changers by their high turn over and cancel their accounts, which you'd have to presume they would do if they intentionally did not offer accounless operation. Not satisfying in that there are no equi-functional work-arounds to the bank not offering accountless operation. > I also disagree that a model where identity is embedded in digital > money has more technically interesting characteristics than a pure, > first-class system has. More cruft and more baroqueness, yes, as all > such systems somehow requiring identity or "is-a-person" credentials, > no matter how well disguised, have more cruft and baroqueness. The protocols which offer the offline option where identity is revealed to bank if you double spend model do have more complex math. However you do get other extra features (in the case of Brands) such as single operation coin-refresh which has significant privacy value, and offer extra attributes which are useful for digital bearer bonds to convey information, and better efficiency, and you don't have to use the offline or p2p offline options -- they are just options. So I'd argue that Brands is just a more flexible, private and efficient system. Granted actually using the identity embedding offline option has problems -- but the lesson there is just don't use that option. Re. the side discussion about whether it's fair to call these tokens coins as the value lies in the double spend database rather than the coin, I had the same discussion with Bob some time ago, and I concur. I'd argue the p2p offline Brands option is more "coin" like in that you (personally) can spend the coin without relying on the double-spend database (providing the payee doesn't do an online deposit before accepting your payment). > A clean system requiring no identity would be much more interesting to > see today. It's how bearer bonds and "markers" and various other forms > of money (IOUs, chop marks, warehouse receipts, "pay to the holder of" > forms) work. Systems based on identity, even when the identity is only > findable via alleged double spending, are more like certain kinds of > checks. Another bad aspect of identity is that it afects usability -- everyone has to be a registered and identified user at the bank to participate, even if they allow accountless operation just to meet the offline double-spending system. This is bad for functionality as you'd like to be able to fully participate without ever registering with or identifying yourself to the bank. I suppose the argument for the offline p2p systems and why people find them tempting is that aside from the identity registration issue, it works much better with intermittently connected devices like PDAs etc, which may not at all times have TCP/IP connectivity. But if you were using offline p2p I'd think you'd only want to accept low value payments, or have a good reason to want the added privacy of high latency deposit to the extent that you'd be willing to accept the risk, and you'd think the bank would not want to accept liability unless they had really good identity verification if the coins were going to circulate for weeks before mass double spending might be noticed. (Though the higher the double-spending multiple, the sooner it will be noticed as on average someone will deposit two of them sooner.) The problem for the bank would be people who either managed to fake the identity system, or the odd nutter who comits identity suicide for a brief burst of unlimited credit -- such people could do a lot of damage. Adam From kelsey.j at ix.netcom.com Sat Apr 26 05:37:07 2003 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Sat, 26 Apr 2003 08:37:07 -0400 Subject: double-spending prevention w. spent coins In-Reply-To: <726015E0-76CB-11D7-B4FF-000393D91E36@fexl.com> References: <20030424234721.A8027760@exeter.ac.uk> Message-ID: <5.2.0.9.0.20030426001207.04449430@pop.ix.netcom.com> At 11:10 PM 4/24/03 -0400, Patrick Chkoreff wrote: ... >Bill Frantz wrote: > >>The server is in a position to keep track of the money transfer by >>recording the serial numbers of the old and new coins as the exchanges take >>place. The server is perfectly capable of making the linkage. If you >>don't trust the server, then you must believe that all your transfers are >>know. > >This is good too, Bill. > >All right, I can generally understand the purpose here, to make it >impossible to correlate an old coin with a new one issued in its place. Right. You actually can get reasonable anonymity with the kind of scheme you're proposing, assuming anonymous communications and heavy use of the system. When you get a coin issued, you just keep it in limbo for awhile, and then "spend" it with yourself, iterating until your paranoia level is satisfied. If the system is heavily used for real stuff, and the uses are over an anonymous communications network, there should be no way for the bank to tell when you're transferring the coin to yourself, vs. when you're transferring it to someone else. The bank can tell that you have coin X today, and that 20 iterations ago, that was coin Y. But that isn't going to give very much information about whether the coin is still in the possession of the same person. The user effectively pays for his level of anonymity with float, because he has to maintain a random, plausible spending pattern for enough transfers to leave the bank with very little information about whether his coins are his. Less paranoid users can use coins immediately, or after one or two iterations, for less security but faster access to their money. (It seems like I've seen this kind of idea discussed on cypherpunks before....) If you play with this protocol a bit, you can do a surprising amount with it--use multiple banks to allow unlinkability with your coins that is similar in strength to the anonymity you get with remailer networks, for example. (You still end up having to trust your bank not to steal the money, but that's pretty common.) ... >That I can see. I was starting to get the impression that somehow the >Chaumian techniques were attempting to address the problem of preventing >double spends even when doing a long chain of spends without contact with >a server. In fact they are trying to address a more modest goal than >that, and double spends are still something that must be detected by >contact with the server. In general, if I know enough to spend a coin once, I know enough to spend it several times. Every solution to this I've ever heard of comes down to one of: a. Embedding an identity in the coins in a way that comes out when they're double-spent, and handling double-spending offline by getting someone arrested. b. Using some locally trusted device on the spender's machine to prevent double-spending pre-emptively, e.g., because the code on your tamper-resistant token won't permit it. c. Checking the status of the coin online when the transaction is made. (Sometimes this is done only for some random subset of the coins, for efficiency.) The techniques for doing (a) are brilliant, but they still leave you with "and then someone goes to jail" as one of your protocol steps, which makes the protocols that use them a lot less interesting. And once you're doing online clearing, there's little point to messing around with the complicated stuff you have to do to get the spender's identity embedded in pairs of double-spent coins. >-- Patrick >http://fexl.com --John Kelsey, kelsey.j at ix.netcom.com PGP: FA48 3237 9AD5 30AC EEDD BBC8 2A80 6948 4CAA F259 From kelsey.j at ix.netcom.com Sat Apr 26 05:51:51 2003 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Sat, 26 Apr 2003 08:51:51 -0400 Subject: Thanks for the living hell, and question about OpenSSL In-Reply-To: <74867AE0-7769-11D7-ADBD-000393D91E36@fexl.com> References: Message-ID: <5.2.0.9.0.20030426084841.04414730@pop.ix.netcom.com> At 06:01 PM 4/25/03 -0400, Patrick Chkoreff wrote: ... >True. From the thrashing I took yesterday, I conclude that subpoenas >and other forceful means of system compromise are very cheap indeed. It's not that they're cheap, it's that they're cheaper than alternative attacks against blinded cash systems, where linking the coin and the withdrawer is information-theoretically prevented (e.g., the blinded coin carries zero information about the user). >- -- Patrick >http://fexl.com --John Kelsey, kelsey.j at ix.netcom.com PGP: FA48 3237 9AD5 30AC EEDD BBC8 2A80 6948 4CAA F259 From rah at shipwright.com Sat Apr 26 06:02:50 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Sat, 26 Apr 2003 09:02:50 -0400 Subject: Conflating "off-line" with "bearer" (was Re: double-spending prevention w. spent coins) In-Reply-To: <20030426025046.A8088505@exeter.ac.uk> References: <5.1.1.6.2.20030424214841.02ce9738@idiom.com> <20030426025046.A8088505@exeter.ac.uk> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm learning a lot this morning. Thank you Adam, for a splendid taxonomy. I'll take one more shot at this, though sooner or later you'd think I'd stop pissing in the wind. :-). At 2:50 AM +0100 4/26/03, Adam Back wrote: >Re. the side discussion about whether it's fair to call these tokens >coins as the value lies in the double spend database rather than the >coin, I had the same discussion with Bob some time ago, and I >concur. > >I'd argue the p2p offline Brands option is more "coin" like in that >you (personally) can spend the coin without relying on the >double-spend database (providing the payee doesn't do an online >deposit before accepting your payment). The value is controlled by the entity holding the token. The fact that you're actually calling it a "token", above, should give you a hint. Besides, even in book-entry transactions, the value of the asset is controlled by the holder of the asset, not the clearinghouse. That's the point to building transaction systems in the first place, that, and to do so without repudiation of the transaction. As I've said before, people have to think about what's happening financially, and stop conflating "off-line" with "bearer". The fact that a given protocol requires a double-spend database, but the database can *only* prevents non-repudiation, and, most important, can say *nothing* about *who* owns the asset in question *unless* they double spend, means that assets transacted using that protocol can be said to be held in bearer form, and, as such, are no different, financially, from assets transacted using a coin, or a note, or a bond, or a certificate -- or a token. Think of it as a financial Turing test. If it quacks, etc. Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPqqC6MPxH8jf3ohaEQIZ6QCePGcrl2+Ur9yqdatuHX52VEaIJYwAoIf5 tKxVfYhVypQLRu0ktb29ZMKq =ONzc -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From adam at homeport.org Sat Apr 26 06:41:55 2003 From: adam at homeport.org (Adam Shostack) Date: Sat, 26 Apr 2003 09:41:55 -0400 Subject: Making Money in Digital Money In-Reply-To: References: <20030426025046.A8088505@exeter.ac.uk> Message-ID: <20030426134155.GA28448@lightship.internal.homeport.org> On Fri, Apr 25, 2003 at 10:56:02PM -0700, Tim May wrote: | * In my view, not necessarily the view of everyone in the DM community, | the Big Win for solid DM is in illegal markets, e.g., buying and | selling child porn, bestiality, snuff images, etc., and in untaxed | betting, buying and selling corporate information, and all the things | which untraceability of a very strong form is needed for. Again, this The online gaming industry and the adult entertainment industry both have very large problems with payment repudiation. Both understand that their customers have a desire for privacy. These industries will provide the bulk of your business for a while. So there are horsemen using it? Horsemen use cars, as we've pointed out for a long time. I think it's possible to solve the 4-player ecash problem using porn and gambling as your first merchants. Offer a substantial discount to players using ecash (which they make up in loss reduction). Do it in London, where they're not so moralistic and taxing as in the US, and where there's a single regulator. I've said it before, but I'll say it again: Law enforcement was not the large problem that you predicted for ZKS. The large problem was that the problem we were solving was that most people don't understand the privacy threat from internet monitoring. They don't understand how it works, they don't understand what can be gleaned, and so they're not really all that concerned. Related to this, what people think they know about internet privacy mostly revolves around cookies, credit cards, and identity theft, and thus Norton's personal firewall with a cookie manager sells well. However, I think that its possible to create a system that uses the real-time settlement to bring merchants suffering from fraud on board, uses privacy to bring the users on board, and uses fees to bring the banks on board. If only the patents were all expired.. Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From rah at shipwright.com Sat Apr 26 06:58:20 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Sat, 26 Apr 2003 09:58:20 -0400 Subject: Non-linkability of blind-signature keys to bank-accounts (was Re: double-spending prevention w. spent coins) In-Reply-To: <20030426025046.A8088505@exeter.ac.uk> References: <5.1.1.6.2.20030424214841.02ce9738@idiom.com> <20030426025046.A8088505@exeter.ac.uk> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Vamping on Adam's post a little more... At 2:50 AM +0100 4/26/03, Adam Back wrote: >Another bad aspect of identity is that it afects usability -- >everyone has to be a registered and identified user at the bank to >participate, even if they allow accountless operation just to meet >the offline double-spending system. > >This is bad for functionality as you'd like to be able to fully >participate without ever registering with or identifying yourself to >the bank. My thinking about this has been that net-originated non-identity-linked self-signed ssh-style keys work better for internet bearer transaction methods like Chaum's blind signature protocols, and that, for the sake of security at least, they shouldn't be associated with the book-entry account/PIN/Password/SSL-PKI-Key required to convert an asset from book-entry form to internet bearer form. The result is, not-coincidentally, lower risk-adjusted transaction cost in the conversion of those assets form book-entry to bearer form, and, yes, the conversion is an identified one, because of the phase change between protocol-enforced and law-enforced financial operations. However, only to convert money into a bank-account balance, for instance, does one need to be identified to the financial system, which only makes sense, because that data is required to prevent transaction repudiation there. The result of independent self-signed keys is that people without accounts in the book-entry transaction system can still safely buy and sell digital goods on the net, at least, because the system, while using keys, is inherently accountless. It also grows an economy that can only reside on the net, which is desirable for lots of reasons. These tokens have to be moved on and off the net easily, and, more important, they have to be able to be *reserved* in book-entry form at the outset anyway. Notes, coins, whatever, are redeemed for dollars, for instance, transferred to your bank through the ACH system, or gold through GoldMoney/e-Gold, or equity through a securities depository, or whatever. Otherwise, they're meaningless, financially. Financial instruments have to be fungible *and* exchangeable or they don't exist, and the only other financially useful things to exchange them into, dollars in a bank or the PayPal system, for instance, are off-the-net book-entry assets. So, in the early stages of an internet bearer economy, we're looking at notes and coins that move around the net almost exactly the way that physical notes and coins do. People withdraw cash from a book-entry account, spend it on the net using different protocols than the ones they used for withdrawal, earn it with the same protocol they spent it, and deposit cash using the same way they withdrew it. The same can be said for bearer financial transactions, except that "cash" would be replaced with some kind of depository receipt (Steve Schear and I came up with "Unsponsored Network Depository Receipt" one afternoon on the phone), and "spend" would be replaced with "trade". At some point, an entirely bearer market evolves, with bearer assets (don't say it fast...) backed up by and exchangeable into other bearer assets, just like we do with book-entry assets now. A direct-to-the-net bearer bond issue would be underwritten by some financial entity on behalf of a borrower without needing to float a book-entry issue and then creating depository receipts to be held in internet bearer form. At that point, connections to existing book-entry systems would become as vestigial as capital market book-entry system connections are to physically delivered bearer certificates these days, in the same way that whole issues of stock are currently traded in book-entry form, but technically "owned" by a single firm, with a single certificate in a vault at the Depository Trust Company, for instance. Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPqqQUcPxH8jf3ohaEQKW7QCfQgMhjNl11jc05vekRKS1/3PYn0oAn3bZ SsoEw3L3ImvAD5KxBTXPjRuY =W+n5 -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From timcmay at got.net Sat Apr 26 10:06:48 2003 From: timcmay at got.net (Tim May) Date: Sat, 26 Apr 2003 10:06:48 -0700 Subject: Making Money in Digital Money In-Reply-To: <20030426134155.GA28448@lightship.internal.homeport.org> Message-ID: <775AB29B-7809-11D7-865D-000A956B4C74@got.net> On Saturday, April 26, 2003, at 06:41 AM, Adam Shostack wrote: > I've said it before, but I'll say it again: Law enforcement was not > the large problem that you predicted for ZKS. The large problem was > that the problem we were solving was that most people don't understand > the privacy threat from internet monitoring. They don't understand > how it works, they don't understand what can be gleaned, and so > they're not really all that concerned. Related to this, what people > think they know about internet privacy mostly revolves around cookies, > credit cards, and identity theft, and thus Norton's personal firewall > with a cookie manager sells well. I don't believe ZKS ended up targeting the remailer niche ("space") we are interested in. In the years that Freedom nyms were being sold, how many were used to post to this list? How many were used to post to Usenet? A set nearly of measure zero. I assume _some customers_ were using Freedom...I just don't recall ever receiving a message from any of them, or seeing any of them on the lists and groups I frequent. So the uses I expected would expose the owners of Freedom to investigation for (just as operators of remailers have been exposed to being shut down for) never materialized. We will never know whether ZKS would have faced pressures when it was used for song-swapping or extortion threats or child porn, as the customer base never got large enough. (I still check in on www.zks.net occasionally to see what's going on. Stuff about firewalls and viruses.) --Tim May From timcmay at got.net Sat Apr 26 10:19:27 2003 From: timcmay at got.net (Tim May) Date: Sat, 26 Apr 2003 10:19:27 -0700 Subject: Censorship: state bans games that kill pigs In-Reply-To: <20030425210210.GC25990@dreams.soze.net> Message-ID: <3C0F4DB5-780B-11D7-865D-000A956B4C74@got.net> On Friday, April 25, 2003, at 02:02 PM, Justin wrote: > At 2003-04-25 20:07 +0000, Thomas Shaddack wrote: > >>> Wash. to ban 'violent' game sales >>> State law will levy $500 fines to anyone selling Grand Theft Auto to >>> children. >> >> I think I know what will become the #1 CD of school playground "swap >> meetings". > > Don't forget zero tolerance. If caught, they'll be suspended or > expelled or transferred. I've never understood the concept of > expulsion > from public school before age 16. "You must go to school" then "you > must not go to school" seems rather silly to me. I guess it's better > to > have them running around neighborhoods in gangs with real guns than > going to school and using chicken strips to shoot at teachers. About > the cd swapping, maybe their parents will go to jail, too. That's > going > to be really productive for shaping the child's or young teen's > perception of society. I have wondered what happens when a 14-year-old kid is picked up for truancy at the shopping mall and then explains that he was kicked out of school. As for putting more and more people in prison, this is what happens when prisons become corporate owned-and-operated profit centers and when the same folks who profit from the destruction of Iraq and then the lucrative rebuilding of Iraq are the ones launching the wars and ordering the rebuilding. As one of the noted fascists said, "Fascism _is_ corporatism." --Tim May From mv at cdc.gov Sat Apr 26 10:38:00 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 26 Apr 2003 10:38:00 -0700 Subject: Quarantines may be justified [Santorum] Message-ID: <3EAAC3F8.DF3F162E@cdc.gov> At 05:41 PM 4/25/03 +0000, Justin wrote: >At 2003-04-25 16:31 +0000, Major Variola (ret) wrote: > >> But, Santorum needs to be tried & hung for what he meant. > >Do you have plans to try and hang the Supreme Court Justices who upheld >Sodomy laws in Bowers v Hardwick? Violating the constitution is treason. Only state actors can violate the constitution. Maybe we can send them to Manzanera for re-education. >What about the significant minority >of Americans who'd completely agree with Santorum's remarks? I don't care if its a *majority*, the Constitution trumps democracy. Democracy is merely mob rule. Its merely the easiest govt to sell to the proles. Unfortunately it leads to looting and ignoring the Constitution when its enforcers are swayed by popinion. From mv at cdc.gov Sat Apr 26 10:49:52 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 26 Apr 2003 10:49:52 -0700 Subject: Authenticating Meat Message-ID: <3EAAC6C0.67F224C3@cdc.gov> At 11:22 PM 4/25/03 -0400, Patrick Chkoreff wrote: >All this talk about meatspace suggests we should have some spare ribs >with those beers. Ribs from sacred cows are the best. >Of course, writing style and personality can help expose private key >hijacking and impersonation somewhat, though even that can be >counterfeited. I can recognize a post by JP May with my eyes squinted, >just looking at the shapes of the letters and paragraphs. But I bet I >could do an utterly, mind-bogglingly good impersonation if I tried. Try John Young sometime, after those beers. And Hettinga is probably a perl script :-) But seriously, you've just mentioned what's called "textual analysis". Spelling errors and other idiosyncratic choices can be used to "pierce the veil" of anonymity. That's what did in Dr. Kaczynski, who pissed on the FBI for over a decade, until his brother recognized his text. Running text through automatic translators (engl->german-engl) has been suggested, but deeper signatures may remain. It probably wouldn't have helped Dr. K. --- "A democracy cannot exist as a permanent form of government. It can only exist until the voters discover that they can vote themselves money from the Public Treasury. From that moment on, the majority always votes for the candidate promising the most benefits from the Public Treasury with the result that a democracy always collapses over loose fiscal policy always followed by dictatorship." --Alexander Fraser Tyler From fritz at rodent.frell.eu.org Sat Apr 26 02:39:54 2003 From: fritz at rodent.frell.eu.org (Tom Veil) Date: Sat, 26 Apr 2003 11:39:54 +0200 Subject: Kill MS, again, but sideways In-Reply-To: Message-ID: <290793907b7138211cc22dd86a561215@remailer.frell.eu.org> (This message was sent before, with the wrong subject and reference.) Thomas Shaddack wrote on April 15th, 2003 at 23:30:57 +0200: > On 14 Apr 2003, Tom Veil wrote: > > > If I want to keep secret the details of something I make, it is my right > > to do so. > > Then I have the right to appropriately dislike you, and to > reverse-engineer the "product", which is so shoddy that you are ashamed of > documenting its internals, and to publish it. I've never said that people should be legally punished for tinkering with the stuff they've bought, nor do I think they should. (snipped) > > Don't like it? Don't fucking buy it. > > THERE IS NO CHOICE! Well I guess that's tough, isn't it? There simply isn't much of a market for open, fully-documented products. Of course, you are free to make your own fully-documented, open-source products, or encourage those companies to make documentation available to implementers and administrators. > > Any communist maggots that murder, or attempt to murder people for merely > > keeping secret the details of the stuff they make and sell should be bound, > > gagged, tortured, then taken out back to have their skulls crushed with a > > sledgehammer until their brains start oozing out their ears. > > ...and after you kill off all the technicians with a peeve against the > money-hungry corporations (read: everyone who ever tried to do some real > work on a budget), you will pay through your nose for every hiccup, and > not only in money, but also in time loss and in being whined at for not > being able to do something immediately. I didn't say anything about killing technicians. I _did_ say things about killing people who would murder others for keeping secrets. > I could talk for long about "intellectual property", my pet peeve, but one > paragraph will do. There was no such concept for millenia. While protecting IP is a duly authorized power of the US government, the way it extends protection for periods of time sometimes spanning the entire course of an average human lifespan, is far beyond any reasonable interpretation of the "limited Times" proviso in Article I, Section 8, and such excessively long periods of protection should be ruled unconstitutional. As for the DMCA, it is simply an atrocity. Obviously unconstitutional. > And then you come and have the balls to defend the "right" of the > vendors to not reveal how crappy and unfinished is what they dare > to call a "product".) I defend the right of EVERYONE to try and keep stuff secret that they want to keep secret. Of course, tough shit if somebody discovers this secret in a non-coercive fashion. > Vendors, who keep crucial informations away from the customers, should be > shot. If you attempt to shoot people for the "crime" of keeping something secret, I will ally with them in efforts to liquidate you. > The ones, who try to sue the reverse engineers, should be boiled in > oil before being shot. This may be acceptable. Actually, the members of Congress who enabled these sorts of lawsuits should be liquidated. -- Tom Veil From emc at artifact.psychedelic.net Sat Apr 26 11:41:02 2003 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Sat, 26 Apr 2003 11:41:02 -0700 (PDT) Subject: Thanks for the living hell, and question about OpenSSL In-Reply-To: <927D46A5-7773-11D7-B966-000A956B4C74@got.net> Message-ID: <200304261841.h3QIf2r0025389@artifact.psychedelic.net> Tim May wrote: > You don't need to take our word for it--you need to see why modern > cryptography avoids trust issues almost completely. Like mathematicians saying "Trust Us, no algorithm exists which can factor the 309 digit product of two large distinct odd primes in a few seconds on a cheap PC?" Perhaps I'm missing something, but it seems to me that public key cryptography is fundamentally a trust-based system. With the rise of the Internet, and almost all crypto being done by people who do not physically meet to exchange keys, almost all crypto is public key crypto. Therefore, almost all cryptography (at the present moment) is based on trust. And it's trust based on the "It doesn't exist, because if it did, I'm so smart I would have found it by now" paradigm, which I've never regarded as being particularly reliable. (Insert comments about simple algorithms whose direct derivation lies just slightly beyond the limits of human ingenuity here.) With regard to the utility of digital cash. Digital cash will never be useful for funding retaliation against The State unless its use is so widespread that the problematical transactions are drowned out by noise. Since sheeple will always pick convenience over security, and The State, through regulation, controls what will be convenient, digital cash will never achieve widespread use. The wild success of PayPal, even as it embargos some customers cash for 6 months over their political views, and the long list of failed anonymous payment ventures, should drive this point home to even the most dense. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From emc at artifact.psychedelic.net Sat Apr 26 12:04:10 2003 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Sat, 26 Apr 2003 12:04:10 -0700 (PDT) Subject: Fake News for Big Brother Message-ID: <200304261904.h3QJ4AQv025621@artifact.psychedelic.net> Here's a disturbing little footnote in the evolving story of complicity between news organizations and the government. It seems that not only will the news media provide AmeriKKKans with fluffy PG-rated coverage of the illegal and immoral invasion of Iraq, and the slaughter of thousands of people only trying to defend their homeland. The news media, will, in fact, print fake news supplied by the government, with full knowlege that it is false, to further an ongoing investigation. Case in point. http://www.seattleweekly.com/features/0317/news-dawdy.php This would be a good article to keep in mind when you hear media reports that Saddam's "Weapons of Mass Destruction" have finally been found. ----- NEWSPAPERS HAVE really only one obligation: to truthfully inform readers. Yet last week the King County Journal, a Bellevue-based daily serving the east and south suburbs, admitted failure to do even that in March 2002 when it printed a phony story about a suspicious fire that was actually staged by police to appear to be an arson. This story starts in January 2002, when Steven Sherer was convicted of killing his wife; her body was never found. The conviction didn't sit well with Sherer. From behind prison walls, prosecutors assert, he plotted to kill his former mother-in-law, his son, the prosecutor, and the prosecutor's four children. For starters, he contracted with his cellmate to torch the Bellevue home where his former mother-in-law and his son lived, preferably with them inside, according to court documents. Law enforcement officials found out and decided to stage an arson at Sherer's former mother-in-law's in order to dig up more information about Sherer's conspiracy. One problem: The cops needed to somehow prove to Sherer that the arson happened. So they contacted the King County Journal. Would the paper be willing to report the staged arson as if it were a real event so that they could have a clipping to pass along to Sherer? ... -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From frantz at pwpconsult.com Sat Apr 26 12:32:23 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Sat, 26 Apr 2003 12:32:23 -0700 Subject: Authenticating Meat In-Reply-To: <3EA9BC8D.F000B6D0@cdc.gov> Message-ID: At 3:54 PM -0700 4/25/03, Major Variola (ret) wrote: >Making the leap from key-holder to meatspace >entity is unsound unless something in meatspace demonstrates >it. You're all bits from here. The definitive fictional treatment is Vernor Vinge's, "True Names". BTW - Is the re-issue of this short story available? Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From birger at takatukaland.de Sat Apr 26 03:40:07 2003 From: birger at takatukaland.de (Birger =?ISO-8859-1?Q?T=F6dtmann?=) Date: 26 Apr 2003 12:40:07 +0200 Subject: CrypTool Message-ID: <1051353607.17276.60.camel@lomin> Hello, yesterday I attended a presentation about a software teaching people crypto. It's free, so I tested it a bit, and it's seemingly nice and fit to help students understand what good crypto is and what's not. It was invented by a guy working at Deutsche Bank who was horrified about the companies programmers coding new security schemes into the banks software packages on the fly without knowing a bit about crypto and underlying mathematics. The software since then has been shifted to a group at University of Darmstadt which is developing it right now. The software is available for W32 only (*sigh*) but in English as well as German: http://www.cryptool.com At the presentation they said that next steps in development will be new demonstrators ("how does TLS work") on the content side and on the organisational side the port to Unix. With that they hope they can get it Open Sourced. The software is intended for educational purposes, so right now they limited the key space for most algorithms to 20 bit. Well, until the source is released I guess.... ;-) Regards, Birger From hseaver at cybershamanix.com Sat Apr 26 11:05:35 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Sat, 26 Apr 2003 13:05:35 -0500 Subject: Censorship: state bans games that kill pigs In-Reply-To: <3C0F4DB5-780B-11D7-865D-000A956B4C74@got.net> References: <20030425210210.GC25990@dreams.soze.net> <3C0F4DB5-780B-11D7-865D-000A956B4C74@got.net> Message-ID: <20030426180535.GB18694@cybershamanix.com> On Sat, Apr 26, 2003 at 10:19:27AM -0700, Tim May wrote: > > I have wondered what happens when a 14-year-old kid is picked up for > truancy at the shopping mall and then explains that he was kicked out > of school. I'm wondering what the actual laws are across the country. I know when we lived in MN, state law said the kids only had to attend one day every fortnight to not be considered truant. That's how we were able to homeschool before it began to be allowed by the state. > > As for putting more and more people in prison, this is what happens > when prisons become corporate owned-and-operated profit centers and But, but, but -- isn't that the libertarian dream, to privatise all gov't functions? 8-) > when the same folks who profit from the destruction of Iraq and then > the lucrative rebuilding of Iraq are the ones launching the wars and > ordering the rebuilding. > Amazing how much of the "military" is now privatized. Even their training, from what I've read. > > As one of the noted fascists said, "Fascism _is_ corporatism." > Yup. > > --Tim May -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From bill.stewart at pobox.com Sat Apr 26 14:06:02 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 26 Apr 2003 14:06:02 -0700 Subject: Authenticating Meat In-Reply-To: References: <3EA9BC8D.F000B6D0@cdc.gov> Message-ID: <5.1.1.6.2.20030426133303.02d2de70@idiom.com> At 12:32 PM 04/26/2003 -0700, Bill Frantz wrote: >At 3:54 PM -0700 4/25/03, Major Variola (ret) wrote: > >Making the leap from key-holder to meatspace > >entity is unsound unless something in meatspace demonstrates > >it. You're all bits from here. > >The definitive fictional treatment is Vernor Vinge's, "True Names". > >BTW - Is the re-issue of this short story available? http://www.powells.com/subsection/ScienceFictionandFantasyV.html has Vinge books, including ISBN 0-312-86207-5, published by Tor, which is the collection with Vinge's novel and articles by a number of people including Tim, Chip Morningstar / Randy Farmer, RMS, and others. The original is on the net in several places - http://home.earthlink.net/~whitestones/truename/truename.html in mostly-pure-ASCII HTML with illustrations from one of the editions of the book. Back when cypherpunks were lamenting the fact that the book was out of print, and that publisher copyright issues were preventing reprints, I found a copy of that edition in a used bookstore and lent it to a heavyset bearded guy who never returned the hard copy. I have no idea if the events are related, though I've since found a copy of the original paperback which had different cover art... (:-) http://members.tripod.com/erythrina/ has interesting original artwork. From ravage at einstein.ssz.com Sat Apr 26 12:18:04 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sat, 26 Apr 2003 14:18:04 -0500 (CDT) Subject: Censorship: state bans games that kill pigs In-Reply-To: <3C0F4DB5-780B-11D7-865D-000A956B4C74@got.net> Message-ID: On Sat, 26 Apr 2003, Tim May wrote: > As one of the noted fascists said, "Fascism _is_ corporatism." As usual you get it ass backwards. Corporatism is fascism, fascism can and does exist without profit motives. Though, irrespective of actual motive, the fundamental human drive is 'fear' and inability to deal with it in a healthy emotional way. Seeing profit as the end instead of a means is the fundamental error of -all- CACL views. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From patrick at lfcgate.com Sat Apr 26 13:20:19 2003 From: patrick at lfcgate.com (Patrick) Date: Sat, 26 Apr 2003 14:20:19 -0600 Subject: Thanks for the living hell, and question about OpenSSL In-Reply-To: <200304261841.h3QIf2r0025389@artifact.psychedelic.net> Message-ID: <00cd01c30c31$43534f90$0200a8c0@scylla> > Since sheeple will always pick convenience over security, and The State, > through regulation, controls what will be convenient, digital cash will > never achieve widespread use. Obstacles don't make something impossible. I refer you to http://inventors.about.com/library/inventors/bledison.htm : "Edison actually had to invent a total of seven system elements that were critical to the practical application of electric lights as an alternative to the gas lights that were prevalent in that day. These were the development of: the parallel circuit, a durable light bulb, an improved dynamo, the underground conductor network, the devices for maintaining constant voltage, safety fuses and insulating materials, and light sockets with on-off switches. " There are many compelling, legitimate, and legal uses for anonymous digital bearer instruments. Their utility far outweighs any negative side effects. If a State disagrees, there are 200 more to choose from. Patrick M http://lucrative.thirdhost.com/ From ravage at einstein.ssz.com Sat Apr 26 12:21:04 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sat, 26 Apr 2003 14:21:04 -0500 (CDT) Subject: Censorship: state bans games that kill pigs In-Reply-To: <20030426180535.GB18694@cybershamanix.com> Message-ID: On Sat, 26 Apr 2003, Harmon Seaver wrote: > > As for putting more and more people in prison, this is what happens > > when prisons become corporate owned-and-operated profit centers and > > > But, but, but -- isn't that the libertarian dream, to privatise all gov't > functions? 8-) Tim's practicing his backpedaling. > > As one of the noted fascists said, "Fascism _is_ corporatism." > > > > Yup. Nope. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Sat Apr 26 12:36:23 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sat, 26 Apr 2003 14:36:23 -0500 (CDT) Subject: Some interesting quotes... Message-ID: The Earth should be regarded as the womb of life - but one cannot remain in the womb forever. Frank Tipler Though control, like birth control, is best undertaken as long as possible before the fact. Richard Mitchell When the people are being beaten by a stick, they are not much happier when it is called "the People's Stick." Michael Bakunin The question that will decide our destiny is not whether we shall expand into space. It is: shall we be one species or a million? A million species will not exhaust the ecological niches that are awaiting the arrival of intelligence. Freeman Dyson Green technology means we do not live in cans but adapt our plants and our animals and ourselves to live wild in the universe as we find it. Freeman Dyson Tyranny is always better organized than freedom. Charles Peguy One has to multiply thoughts to the point where there aren't enough policemen to control them. Stanislaw Jerzey Lec The corporation evolves to serve the interests of whoever controls it, at the expense of whoever it does not. William Dugger Those who profess to favor freedom, and yet deprecate agitation, are men who want rain without thunder and lightning. Frederick Douglass Man is an artifact designed for space travel. He is not designed to remain in his present biological state any more than a tadpole is designed to remain a tadpole. William Burroughs If we desire to form individuals capable of inventive thought and of helping the society of tomorrow to achieve progress, then it is clear that an education which is an active discovery of reality is superior. Jean Piaget Until lions have their historians, tales of the hunt shall always glorify the hunter. African Proverb Take from: GURPS: Transhuman Space: Deep Beyond Steve Jackson Games ISBN 1-55634-586-0 -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From mv at cdc.gov Sat Apr 26 14:37:07 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 26 Apr 2003 14:37:07 -0700 Subject: Secret Service Buffoons Message-ID: <3EAAFC03.93EF30C3@cdc.gov> [from the cryptography list..] Hi -- I just returned from the Post Office. And I don't mean SMTP, I mean ink on paper, with little self-adhesive micropayment certificates on the corner. The reason is that the US Secret Service asked me to mail them some info about an identity-theft scam. I offered to email the info, but the Special Agent said he didn't have email at work, and it was "not convenient" for him to check his email account at Yahoo. At that point I broke off the conversation, figuring that if they couldn't invest the effort of checking their email they wouldn't invest the effort of actually investigating the incident in question, so I wouldn't waste any more of their time or mine. To my surprise, the Special Agent called back and pleaded with me. He changed his story and said they had means of sending and receiving email, but they _weren't allowed_ to give out their email addresses. I know this is supposed to be the Secret Service, but keeping their email addresses secret is going a bit far IMHO. I would think most computer-security professionals would know how to set up a temporary and/or anonymous email address. I hope he enjoys transcribing the scammers' 350-character-long URLs from the paper I sent. I put the info on a secure web site and suggested he pull it down from there, but he declined that, too. The Special Agent was surprised to hear that I controlled multiple web sites. He didn't understand how that was possible. The Special Agent was surprised to hear that given an IP address, I could figure out what country it's in. He argued with me about this. The term "whois" meant nothing to him. Heretofore I didn't understand how identity- theft rings could operate so openly. One might have thought they would be afraid of stings, but evidently they're not. There's a lot of darkness here. I've set out a few candles, but I'm not sure it's going to be enough. From bill.stewart at pobox.com Sat Apr 26 14:45:46 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 26 Apr 2003 14:45:46 -0700 Subject: War Criminals or Illegal Combatants? In-Reply-To: Message-ID: <5.1.1.6.2.20030426142719.02cf52b0@idiom.com> At 02:19 PM 04/25/2003 -0700, Tim May wrote: >Bottom Line: These so-called Americans have got to go. > >CNN is reporting that the Big Debate about the rounded-up Iraqi leadership >is whether the many Liberated Illegal Regime Members, a la Tariq Aziz and >the other 54 spades, hearts, clubs, and diamonds, are to be treated as >"prisoners of war," and hence subject to the Geneva Conventions ("name, >rank, serial number") or are to be treated as "illegal combatants" >(torture, metal cages, withholding of food and water, sodium pentothal, >shipment to Guantanamo Bay in metal boxes). > >When one is an "illegal combatant" in one's own country, we know the U.S. >is run by characters out of Alice in Wonderland. They already invented that one for Afghanistan. It's one thing to treat Al Qaeda that way (an evil thing, of course), but it's quite another to treat the Taliban that way. They were the government of their country, and the US invaded them. The US government contends that it was justified because they were harboring and supporting Osama bin Laden, who made war on the US; if so, that may make them a government at war with us, in which case they should be treated as POWs, and if they're going to hang them like defeated Nazis war criminals, they're supposed to give them a Nuremberg-style trial first. But it doesn't give the US the right to torture them to death without a trial after the war's over. And if you're going to call somebody "illegal", that implies that you're following legal processes, which isn't happening here. Furthermore, the US government asserts that it has no requirement to follow US laws outside the US borders, and that Guantanamo Bay is a Legally Special Place, outside the laws of mankind, because US law doesn't apply there since it's not US territory, but Cuban law has no power there because it's occupied by the US military. Perhaps the pre-Castro Cuban government has legal authority there? Are there any old Mafiosi who want to claim it's theirs, or any old Batista-governent-in-exile geezers in Miami that are willing to order the Marines to follow old Cuban law? ~~~~ Are there still more IRA Republicans in Boston than Bush Republicans? Is it time to call the Bush Republicans "illegal combatants" for failing to stomp out the other Republicans? From mv at cdc.gov Sat Apr 26 15:05:13 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 26 Apr 2003 15:05:13 -0700 Subject: Finder's Keepers, Smartcards, Anon Cash [Re: double-spending prevention w. spent coins] Message-ID: <3EAB0299.348961B1@cdc.gov> One of the attributes that a digital currency system MAY have is whether someone who finds lost currency may spend it. Conventional cash has this property. So do tickets to performances, lottery tickets, bus tokens, prepaid phone cards etc.. A (tamper-resistant) smartcard may have this 'finders keepers' property, or may not. A lost, signed-but-payee-blank check has the property that finders can cash it, except if the (albeit stupid) loser goes "online" first. (Maybe you need to buy a fake ID to cash it anonymously, but its possible if its signed.) Clearly the most anonymous systems (cash) have the 'finders keepers' property, *necessarily*. But one can imagine anonymous systems that are useless to finders, e.g., a smartcard with a real PIN and/or fingerprint reader. In these cases, it is advantageous to the finder to return the smartcard in hope of a reward, IFF the loser makes this possible. Maybe there's a bizmodel in being a clearing house for lost locked smartcards, without trashing their potential "bearer" anonymity unless the loser tells the clearing house they've lost it. Sort of like calling a prepaid ("debit") credit card house if you've lost it (assuming prepaid credit card acceptance still requires going online) to get a replacement. From bill.stewart at pobox.com Sat Apr 26 15:12:59 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 26 Apr 2003 15:12:59 -0700 Subject: [Brinworld] PhoneCam vs. court; Publishing faces from the street In-Reply-To: <3EA9A9BB.EEE7EBBB@cdc.gov> Message-ID: <5.1.1.6.2.20030426144730.02d354b8@idiom.com> At 02:33 PM 04/25/2003 -0700, Major Variola (ret) wrote: >Teacher sets up drug dealer 'web watch' >A teacher sick of drug dealers and addicts in his neighbourhood has >taken the drastic measure of posting their pictures on the internet. > >John Messiter says he has decided to secretly photograph those >terrorising the area and make their images public. >http://www.ananova.com/news/story/sm_773853.html?menu=news.technology > >Interesting privacy/public and libel implications in the latter. There are two categories of people he's likely to photograph - Real drug dealers and users - Falsely accused drug dealers and users The latter should be able to sue him for libel, which is too easy in Britain, modulo a few issues about whether web photographs are libel or slander. Some of the former might also try that, but it's probably too risky, and the black market has other ways to provide legal services and conflict resolution to people who can't use official courts.... On the other hand, crack dealers are less likely to read the web much; if he were to print out posters and tack them up on lampposts, I'm not sure where "Joe Bloggs, Crack Dealer" would consider them to be annoying libel or free advertising. He says that he wasn't getting adequate response from the police when he called to complain about junkies hanging around, but that he doesn't blame the police, because the Government isn't giving them enough resources to deal with the problem. The site is http://www.crackcocaineincamden.co.uk , and the proprietor's media contact email is messyjay at hotmail.com . I was initially going to flame him for not having a clue about the fact that it's drug laws that cause the problem, but he's almost halfway to getting a clue: "This is not an anti-drugs site. It's an anti-crack site, an anti-heroin site, and most definitely an anti-people-who-do-crack-or-smack-in-the-entrance-to-my-home site" and he thinks that cannabis laws probably aren't necessary and that cannabis users don't cause the social problems that crack users do. His site also says that the UK has "Anti-Social Behaviour Orders" laws from 1998, which lets courts kick someone out of an area for a couple of years. This has its own set of dangers... From ravage at einstein.ssz.com Sat Apr 26 13:14:41 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sat, 26 Apr 2003 15:14:41 -0500 (CDT) Subject: Truth and Justice, Grapeshot and JDAMs, Money and Happiness In-Reply-To: Message-ID: On Sat, 26 Apr 2003, R. A. Hettinga wrote: > "Some people say that money can't buy happiness. I've found that it > usually does, and, when it doesn't, it buys the most interesting > substitutes." -- Rhett Butler, 'Gone with the Wind' It's a movie chucklehead. And did Rhett get his happiness in the end? No. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From mv at cdc.gov Sat Apr 26 15:26:33 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 26 Apr 2003 15:26:33 -0700 Subject: Quarantines may be justified [Santorum] Message-ID: <3EAB0799.61851456@cdc.gov> At 08:51 PM 4/26/03 +0000, Justin wrote: >At 2003-04-26 17:38 +0000, Major Variola (ret) wrote: > >> At 05:41 PM 4/25/03 +0000, Justin wrote: >> >At 2003-04-25 16:31 +0000, Major Variola (ret) wrote: >> > >> >> But, Santorum needs to be tried & hung for what he meant. >> > >> >Do you have plans to try and hang the Supreme Court Justices who >> >upheld Sodomy laws in Bowers v Hardwick? >> >> Violating the constitution is treason. Only state actors can violate >> the constitution. > >Where'd you get that idea that private citizens can't violate the >Constitution? Take a look at 18USC241, 242. Regardless, federal judges >are certainly state actors, or at least they were when they committed >treason and a change of status shouldn't make them immune to >prosecution. Because the Constitution prohibits certain govt actions, not private. You can't post a sign on my property without my permission, but if the state allows signposting somewhere then they can't censor content. >> >What about the significant minority of Americans who'd completely >> >agree with Santorum's remarks? >> >> I don't care if its a *majority*, the Constitution trumps democracy. >> Democracy is merely mob rule. > >I'm well aware. I was only suggesting that there are many other people >beside the not-so-distinguished Senator from Pennsylvania who are in >desperate need of trial, rope, and tree. Its perfectly acceptable to agree with Santorum. It is unacceptable to initiate force to impose your tastes on others. Santorum speaks as one who can steer the State to initiate force. Mere voters don't. They get to pick which vermin to send to Congress, but these vermin are constrained by the Constitution, xor treasonous. >I'm confident that in a wide >sampling of religiously-motivated fanatics in the U.S., Who gives a whit if they don't like fudgepackers personally? That's a private affair. If they don't hire or associate with folks they don't like, reasonably or not, that's what liberty is about. "Hate speech", hate thought, private discrimination is not a crime. Its a difference of taste amongst free peoples interacting mutually consensually. Ergo no legal state interest. Unconstitutional actions by state actors is treason. From fm at st-kilda.org Sat Apr 26 08:02:46 2003 From: fm at st-kilda.org (Fearghas McKay) Date: Sat, 26 Apr 2003 16:02:46 +0100 Subject: Fwd: [Asrg] A New Plan for No Spam / Velocity Indicator Message-ID: --- begin forwarded text From rah at shipwright.com Sat Apr 26 13:06:38 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Sat, 26 Apr 2003 16:06:38 -0400 Subject: GC: Truth and Justice, Grapeshot and JDAMs, Money and Happiness In-Reply-To: References: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Lex vincula justitiae -- Roman Aphorism "Camels, fleas, and princes exist everywhere." -- Persian proverb "Some people say that money can't buy happiness. I've found that it usually does, and, when it doesn't, it buys the most interesting substitutes." -- Rhett Butler, 'Gone with the Wind' "Reality is not optional." -- Thomas Sowell Truth and Justice, Grapeshot and JDAMs, Money and Happiness Geodesic Capital Robert Hettinga Boston, 4/26/03 I tend to think in terms of finance and economics, and not law and politics. Well, not legislation or regulation, anyway; private agreement, private law, is actually necessary for civilization -- go read the most of the shattered cuneiform on the floor of the Baghdad Museum if you need a hint. Even though most people think you can't *do* either finance and economics without legislation and force monopoly, cypherpunks in particular understand that this not necessarily the case in a world of ubiquitous networks and strong financial cryptography. However, I'm not one to believe in grand conspiracies against Truth and Justice, either. Even if violent repression is used to preserve the status quo, the status quo is not immune to physical environmental change, and, ultimately, the economics of a given physical change is what makes most of the human world change. You have to *pay* the guys with guns, after all, or they won't kill people for you. So, I think that, financial "corn-laws" or no, internet financial cryptography must significantly change *finance*, that is, people have to *make* money, and lots of it, or it's just "art", for lack of a better word. It's not even politics, because it has no effect on reality. Like art, it just becomes an entertaining waste of time. Otherwise, one might as well plant fake bombs in a courthouse, or dump mercaptan on the doorstep of the IRS, or hoover out somebody's property records from Lexis and post it on a mail list. Or, for that matter, decide that you're only going to use internet bearer transaction technology to finance dope-dealers, or child-pornographers, or terrorists, or father-rapers, or any other shop-worn horseman the infocalypse is selling this week. There's no serious money in it, for starters, and, if you make *everybody* money, in theory at least, your market's bigger. :-). That's why I say that internet bearer protocols should be three orders of magnitude cheaper to use than book-entry protocols, even internet book-entry clearinghouses like PayPal -- or book-entry financial cryptography protocols like Peppercoin -- or nothing will happen, no matter what one's political intent is. In fact, I started IBUC because I thought that those three orders of magnitude were possible at a time when nobody else did, and I have the arrows in my back -- and the creditors sitting back there as well :-) -- to prove it. When I started the company, I thought that there was enough capital sloshing around out there to give financial progress a shove, and make lots of money by being there first, because in three or five years the barriers to entry would be completely down, and any cypherpunk worth his code could underwrite bearer instruments on the net. It turns out that there wasn't much capital out there, for internet payments, much less for internet bearer transactions. All of the money we raised was just before the bubble popped, from family, friends and friends of friends, and, just before I pretty much quit trying to raise money at all, Declan McCullagh had written an article on us that reminded me for all the world of that feral kid in Mad Max, walking across a burned-over post-apocalypse throwing that steel boomerang at fat guys with a leather fetish. Which, in hindsight, was prescient by about 4 months, since it was written in the middle of June 2001. Nonetheless, we managed to get some financial operations consulting work to keep the company afloat to keep thinking about it, though that dried up, too, just before, and certainly after September 11th. So, four (founded, by coincidence, I swear, on April 15, 1999) of those three to five years have come and gone, the technology and financial networks have just about grown into each other naturally, and, at the moment, we're trying to be at least that first cypherpunk, hopefully one of many. We'll see what happens. Which brings me to happiness. People do what is in their own interest at all times. Altruism is just another form of selfishness, for instance, because people's lives are finite and one's reputation can outlast one's life. Even if one uses a pseudonym, one's life, and death, may be more pleasurable because of some altruistic sacrifice or another, and you gotta die sooner or later anyway. As Ayn Rand herself said once, life may be too painful if someone you love isn't in it, so you'd rather give your life saving theirs. On the macro level, the US is not the strongest and richest nation-state in the world because it confiscated its wealth at the point of a tank-barrel or missile-silo. It is the strongest nation-state in the world because it *bought* those tanks, and missiles, because its citizenry *earned* the money that was confiscated, by taxation, and papered over with the outright fraud of "social welfare", to build those weapons, mostly because of some external threat, and in spite of the attendant graft and budget-packing. And all of *that* was possible because the US is, to date, the freest country, and thus the freest market, in the world. It is the best place in the world for free people to maximize their happiness. So far. To the extent that it continues to be so remains to be seen. It is, frankly, orthogonal to whatever an individual's immediate *political* motivations are, violent, or otherwise, hostile to the state, or otherwise. Only outright economic results matter, and free people make much more stuff than slaves do. Or at least the right kind of stuff, as Mancur Olson demonstrated in "Power and Prosperity", his book on the political economics of the Soviet state under Stalin. Personally, I believe that, contrary to what God-Fearing Conservatives and Reasonable Libertarians think, markets themselves actually cause freedom. You may be born "owning" yourself all you want, but freedom is not given to you by God, or anyone else. *Nothing*, really, is actually given to us. Freedom is not, as most people here and elsewhere believe, a "right". It may have to be *taken* occasionally, but usually it is just bought and paid for, sometimes with the blood of altruistic people, but most often with what people earn after they feed, house, and clothe themselves and their families: profit, in other words. Again, as they always are about representing some triumph of socialism, Star Trek is wrong. The Farenghis are the good guys. Acquisition *does* matter. :-). But it's more fundamental than that. Much more than the platitude says, freedom is *earned*, usually by doing something well enough that people leave you alone about other things, or you won't do what they want for them anymore, either passively by refusing to work, or actively, by force of arms. And, even if that somebody has a gun at your head, it's still in *their* interest to leave you alone otherwise, if they want to get what they're after from you. As Mancur Olsen says, a force monopolist, like any bandit, can't kill all the people he steals from, or he'll run out of people to rob. Olson also says that the optimum theft-rate for a force-monopolist is something shy of 50% before the economy starts to fall over, by the way. Sound familiar? Contrary to popular belief, the richest force monopolists in the world, the ones who are statistically most likely to live to spend their money and give it to their children and otherwise be left in peace, are the ones who are ostensibly *hired* to operate Western free-market democracies, as kleptocratic as those governments still are. We just saw a failed example of force monopolist a few weeks ago in Iraq, in fact, and we'll be seeing more soon, I expect. Like any bad parasite -- and force monopolism *is* parasitism, and make no mistake, it's not symbiosis as statists would have you believe -- Mr. Hussein so severely weakened his "host" population, physically and economically, that it could be easily killed, or at least violently captured. Hussein was probably bombarded into fine organic mush in the bargain. The fact that Iraq's population was "violently captured" -- and, one would think, set free -- by a still socialist-riddled nominal republic with the world's largest free-market economy was no accident, however. Whatever one's Jeffersonian, or, more apparently, Jacksonian, motives are about "fighting the power" with a cryptographic "revolution" -- or any other kind of "activism", technological, political, or otherwise -- as if it were some kind of gallant Confederate cavalry charge into massed Union grapeshot, or even Rhett Butler running the blockade of Savannah, whatever, the *only* way that this stuff will happen is by making *more* money than the alternative book-entry transaction execution, clearing and settlement technologies. *Much* more money. Whether they're entrenched, or not; violently defended, or not. Then, if necessary, we can just *hire* the B52s and JDAMs to pound *their* horse-drawn field artillery troops into fine organic mush instead. The stuff's not called financial cryptography for nothing, after all. Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPqrmpsPxH8jf3ohaEQJ5BACeP3avfSFiYCkSa5sBHD8I/E3Qp1AAn1AN JFy2UfVi6mPagzH2CzOyf2h5 =h8k2 -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From kvanhorn at ksvanhorn.com Sat Apr 26 15:09:48 2003 From: kvanhorn at ksvanhorn.com (Kevin S. Van Horn) Date: Sat, 26 Apr 2003 17:09:48 -0500 Subject: The Freest Country? References: Message-ID: <3EAB03AC.3000305@ksvanhorn.com> R. A. Hettinga wrote: >the US is, to date, the freest country, and thus the freest market, in the world. > Do you have some hard data to back up this assertion, or are you just repeating the brainwashing we Americans are fed from at least kindergarten forward? I don't know of any serious study of economic freedom that puts the U.S. in the number one spot. Every rating I've seen for the past ten years has put the U.S. at number four or worse. I haven't seen any serious attempt to quantify overall freedom, but even there I still have my doubts that the U.S. would rank number one by any reasonable measure. Yes, the U.S. looks great on paper, with that nice Constitution and Bill of Rights; too bad all those protections have been interpreted out of existence by the Supremes. Furthermore, the U.S. is the most powerful government in the world right now, which allows them to intrude much more severely into the lives of their subjects than many nominally less-free nations with (on paper) worse laws and fewer legal protections for the rights of individuals. From bill.stewart at pobox.com Sat Apr 26 17:38:20 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 26 Apr 2003 17:38:20 -0700 Subject: Finder's Keepers, Smartcards, Anon Cash [Re: double-spending prevention w. spent coins] In-Reply-To: <3EAB0299.348961B1@cdc.gov> Message-ID: <5.1.1.6.2.20030426170458.02d35600@idiom.com> At 03:05 PM 04/26/2003 -0700, Major Variola (ret) wrote: >Clearly the most anonymous systems (cash) >have the 'finders keepers' property, *necessarily*. Ok, Major Variola has demonstrated that he's either Not Tim, or is Tim trying to make it look like he's Not Tim :-) He's also Not Even Hettinga, nor Adam, nor Choate.... ... is that you, Lawrence? >But one can imagine anonymous systems that are useless to finders, >e.g., a smartcard with a real PIN and/or fingerprint reader. Fingerprint reader? No thanks; aside from their technical weaknesses, they're rather at cross-purposes to anonymous digital cash. Do not double-spend by looking into laser with remaining eyeball. You don't even need a smartcard; a data file format that uses some kind of password-based encryption is enough. Smart cards, or dumb cards, may or may not be a useful adjunct to some digital cash systems, but one of the big reasons for using digital cash instead of 500-Euro banknotes is for online transactions. Smartcards may let you use your digital cash at somebody else's cash reader, and may reduce the risk of software problems trashing your cash, but digicash isn't necessarily something most people will carry around. >In these cases, it is advantageous to the finder to return the >smartcard in hope of a reward, IFF the loser makes this possible. Now, *that's* an interesting suggestion. >Maybe there's a bizmodel in being a clearing house for lost locked >smartcards, without trashing their potential "bearer" anonymity unless >the loser tells the clearing house they've lost it. Not any time soon :-) It's much more likely that the issuing bank or the wallet vendor would be in this business than a third party, and there are problems like how to preserve the anonymity, how to know the card has enough cash in it to justify a reward (I suppose you can guess that from whether the owner sends in a reward offer to the clearinghouse), how to escrow the reward payments, etc. For some sets of applications, you could do just as well peer-to-peer; have the finder post to Blacknet that he possesses a card with a serial number that hashes to 02198734, the owner sends a few digits of the serial number or a keyed hash to confirm, and they agree on a mailbox to snail the card to and a reward price, maybe 50% paid before and after delivery or using an escrow service, Obviously, the serial number can't be revealed in transactions, so maybe it's just printed on the front, or maybe it's used in the encrypted file formats on the card as a PIN-strengthener or something. If you like creeping featurism, you can design the card interface to have multiple money compartments, including one that you use to store $20 to pay off finders of lost cards... Or you just limit use of smartcards to money you're willing to lose, or are only storing in the cards when you're planning to use it, e.g. downloading a few hundred bucks to take to your coke dealer which reduces the incentive for robbing you before you make the buy. From camera_lumina at hotmail.com Sat Apr 26 14:54:24 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sat, 26 Apr 2003 17:54:24 -0400 Subject: Kill MS, again, but sideways Message-ID: Tom Veil wrote... "Thomas Shaddack wrote on April 15th, 2003 at 23:30:57 +0200:" Yo Veil, what's the deal? A Starbucks too far away from your Unabomber shack? -TD _________________________________________________________________ MSN 8 helps eliminate e-mail viruses. Get 2 months FREE*. http://join.msn.com/?page=features/virus From timcmay at got.net Sat Apr 26 18:30:11 2003 From: timcmay at got.net (Tim May) Date: Sat, 26 Apr 2003 18:30:11 -0700 Subject: All trust is economics In-Reply-To: <200304261841.h3QIf2r0025389@artifact.psychedelic.net> Message-ID: On Saturday, April 26, 2003, at 11:41 AM, Eric Cordian wrote: > Tim May wrote: > >> You don't need to take our word for it--you need to see why modern >> cryptography avoids trust issues almost completely. > > Like mathematicians saying "Trust Us, no algorithm exists which can > factor > the 309 digit product of two large distinct odd primes in a few > seconds on > a cheap PC?" > > Perhaps I'm missing something, but it seems to me that public key > cryptography is fundamentally a trust-based system. With the rise of > the > Internet, and almost all crypto being done by people who do not > physically > meet to exchange keys, almost all crypto is public key crypto. > > Therefore, almost all cryptography (at the present moment) is based on > trust. > > And it's trust based on the "It doesn't exist, because if it did, I'm > so > smart I would have found it by now" paradigm, which I've never > regarded as > being particularly reliable. (Insert comments about simple algorithms > whose direct derivation lies just slightly beyond the limits of human > ingenuity here.) I'm surprised at you for thinking trust is some number that is either 0 or 1. All crypto is economics, and so is all trust. Consider two situations: Situation 1: "I have generated a key for you and will send it securely. You can trust me not to look at it and not to reveal it to anyone else....Well, not unless Saddam's men force me to, or not until John Ashcroft threatens to hold me as an illegal combatant if I don't cooperate. Or not until someone offers me $500 cash, no questions asked, for just a peek. Or not until I realize that this key is being used to further right wing Nazi causes. Or..." Situation 2: "Determining your private key requires an attacker to either monitor your keystrokes and bug your computer, so you'd better secure it, or it requires factoring a 309 decimal digit number associated and derivable from your public key. So far, the best algorithms have only factored a 137-digit number [for example] and no mathematicians have yet found cleverer ways. Great fame would await anyone who found a significantly faster method, even a Fields Medal, and yet no one has yet revealed one." Now I maintain there is a huge difference in the valuations placed on the "trust" in these two cases. If you wish to believe that Joe Sixpack saying he promises to keep your private key secret is on the same footing as the apparent difficulty of factoring very large numbers (and if 309 digits is deemed too small, only a tiny increase in key generation effort and later use to go to 500 decimal digits or even 1000) then you are of course welcome to your delusion. All crypto is economics. All trust is economics. --Tim May "In the beginning of a change the patriot is a scarce man, and brave, and hated and scorned. When his cause succeeds, the timid join him, for then it costs nothing to be a patriot." -- Mark Twain From timcmay at got.net Sat Apr 26 18:33:07 2003 From: timcmay at got.net (Tim May) Date: Sat, 26 Apr 2003 18:33:07 -0700 Subject: [Brinworld] PhoneCam vs. court; Publishing faces from the street In-Reply-To: <5.1.1.6.2.20030426144730.02d354b8@idiom.com> Message-ID: <327EB0FE-7850-11D7-865D-000A956B4C74@got.net> On Saturday, April 26, 2003, at 03:12 PM, Bill Stewart wrote: > At 02:33 PM 04/25/2003 -0700, Major Variola (ret) wrote: >> Teacher sets up drug dealer 'web watch' >> A teacher sick of drug dealers and addicts in his neighbourhood has >> taken the drastic measure of posting their pictures on the internet. >> >> John Messiter says he has decided to secretly photograph those >> terrorising the area and make their images public. >> http://www.ananova.com/news/story/sm_773853.html?menu=news.technology >> >> Interesting privacy/public and libel implications in the latter. > > There are two categories of people he's likely to photograph > - Real drug dealers and users > - Falsely accused drug dealers and users > The latter should be able to sue him for libel, which is too easy in > Britain, > modulo a few issues about whether web photographs are libel or slander. > Some of the former might also try that, but it's probably too risky, > and the black market has other ways to provide legal services and > conflict resolution to people who can't use official courts.... He doesn't have to "falsely accuse" _anyone_. All he does is to demonstrate (claim) that various people are at some location. Those who visit his site are free to draw their own conclusions. --Tim May "He who fights with monsters might take care lest he thereby become a monster. And if you gaze for long into an abyss, the abyss gazes also into you." -- Nietzsche From nobody at remailer.privacy.at Sat Apr 26 09:50:10 2003 From: nobody at remailer.privacy.at (Anonymous) Date: Sat, 26 Apr 2003 18:50:10 +0200 (CEST) Subject: Censorship: state bans games that kill pigs In-Reply-To: <3EA9765E.CDB41660@cdc.gov> Message-ID: <6cc73c53bfe283cf32c7af8d67e2da37@remailer.privacy.at> Major Variola (ret) wrote on April 25th, 2003 at 10:54:38 -0700: > http://money.cnn.com/2003/04/18/commentary/game_over/column_ga > ming/index.htm > > Wash. to ban 'violent' game sales > State law will levy $500 fines to anyone selling Grand Theft Auto to > children. > ... > The bill passed the Senate 47-7 and is expected to be signed > into law by > > Gov. Gary Locke. Rather than targeting games based on their > ratings, the > > bill specifically mentions those that depict violence against law > enforcement officials. I look forward to purchasing _Grand Theft Auto: Vice City_ for the PC. It's good to teach kids how to snipe and kill Police State enforcers. BTW: Is Governor Gary Locke gasoline or diesel? -- Tom Veil From frissell at panix.com Sat Apr 26 16:21:40 2003 From: frissell at panix.com (Duncan Frissell) Date: Sat, 26 Apr 2003 19:21:40 -0400 (EDT) Subject: The Freest Country? In-Reply-To: <3EAB03AC.3000305@ksvanhorn.com> References: <3EAB03AC.3000305@ksvanhorn.com> Message-ID: On Sat, 26 Apr 2003, Kevin S. Van Horn wrote: > Do you have some hard data to back up this assertion, or are you just > repeating the brainwashing we Americans are fed from at least > kindergarten forward? I don't know of any serious study of economic > freedom that puts the U.S. in the number one spot. Every rating I've > seen for the past ten years has put the U.S. at number four or worse. Econ Freedom of the World 2002 http://www.freetheworld.com/2002/1EFW02ch1.pdf US 3rd after HK & Singapore. Index of Econ Freedom 2003 http://cf.heritage.org/index/indexoffreedom.cfm US tied for 6th after HK, Sing, Lux, NZ, Ireland. HK & Sing have obvious general liberty probs. involving being an SR in a commie dictatorship in the case of HK and Confucian fascism (Disneyland with the Death Penalty) in the case of Sing. Lux. has address registration with the cops or the local government (I think). I don't know enough to compare overall liberty in NZ & Ire. but with Ire. in the EU now it's possible that we're #1. Shows a low standard for liberty in the world. DCF From timcmay at got.net Sat Apr 26 19:42:29 2003 From: timcmay at got.net (Tim May) Date: Sat, 26 Apr 2003 19:42:29 -0700 Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: Message-ID: On Saturday, April 26, 2003, at 06:54 PM, Thomas Shaddack wrote: > On Sat, 26 Apr 2003, Major Variola (ret) wrote: >> But seriously, you've just mentioned what's called "textual analysis". >> Spelling errors and other idiosyncratic choices can be used >> to "pierce the veil" of anonymity. That's what did in Dr. Kaczynski, >> who pissed on the FBI for over a decade, until his brother recognized >> his text. > > Couldn't there be a standard English-based language, "Anonglish", with > a > subset of English grammatical rules, human-readable (though maybe with > its > own idiosyncrazies) and machine-parseable, which appearance would not > give > many more clues than that Anonglish was used? Something where grammar > rules would be few, strict, and easy to machine-check, spelling as > well, > and still be readable to anyone who knows "standard" English? Possibly > with a "translator" from "normal" English (of course with the > necessity to > read the translation, correct eventual semantical mistakes introduced > by > rearranging the words, and "anonspell-check" the result)? > > That would put textual analysis from comparing the errors > characteristic > for a given person to comparing of trains of thoughts, which is much > more > difficult, much less being a "reliable proof", and practically > impossible > for very short messages. REQUEST SPEC SOONEST. IDEA RELAYED BUPERS SUBJECT APPROVAL COMMAND. There are various synthetic languages, not the least of which is the form of "milspeak" used for quasi-literate military memos. But of course people aren't going to learn new human languages for such an ephemeral and mostly useless reason as to hide their textual clues. Kascinski got nailed because his rants were so long, running to many newspaper pages (as they were printed, at the FBI's request or his request, or both, I forget the details) and were filled with a lot more than just grammatical and stylistic clues: the rants had his political views, his analysis of history, etc. It's doubtful that K. would have had any interest in trying to write in some synthetic language, stripped of various stylistic choices and options. Or that we would want to. By the way, there was a book out a few years back by an academic who specializes in "forensic text analysis," e.g., analyzing the text of Shakespeare, Pynchon, etc. to do this kind of analysis. (He lived in Soquel, a town near me, and he analyzed letters by a "Wanda Tinasky" which were believed by some to be actually written by Thomas Pynchon, the famously reclusive author who, by coincidence (or not?) lived for a decade a couple of ridges over from me, in Aptos, also near Soquel. Small world. Google should turn up the author for those interested in finding the book. "We are at war with Oceania. We have always been at war with Oceania." "We are at war with Eurasia. We have always been at war with Eurasia." "We are at war with Iraq. We have always been at war with Iraq. "We are at war with France. We have always been at war with France." From jya at pipeline.com Sat Apr 26 19:55:12 2003 From: jya at pipeline.com (John Young) Date: Sat, 26 Apr 2003 19:55:12 -0700 Subject: The Freest Country? In-Reply-To: References: <3EAB03AC.3000305@ksvanhorn.com> <3EAB03AC.3000305@ksvanhorn.com> Message-ID: The US is No. 1 in: 1. Percentage of population in jail. 2. Percentage of population in law enforcement. 3. Military spending. 4. Percentage of population in government. 5. Disparity between the rich and the poor. 6. Murders. 7. Crimes. 8. Number of laws. 9. Percentage of population who are lawyers. 10. Number of lawyers, judges, wardens and prison corporations. 11. Number of private cops. 12. Number of private spies. 13. Number of government spies. 14. Percentage of colleged educated out of work. 15. Number of people who have never worked a single day. 16. Number of stock market investors. 17. Number of people who have lost everything from stock cheats. 18. Number of billionaires. 19. Number of millionaires. 20. Number of female prostitutes. 21. Number of male prostitutes. 22. Number of child prostitutes. 23. Number of genital disease sufferers. 24. Number of institutionalized mental patients. 25. Number of persons in therapy. 26 Number of therapists. 27. Number religions, cults and their members. 28. Number of public relations firms. 29. Number of lobbyists. 30. Number of college professors. 31. Number of didacts. 32. Percentage of population who expect the government or somebody to take care of them from cradle to grave. 33. Percentage of population who think they are right when they say the US is the best. And many, many more, but that's not what gets spun about the bullshit leader of the free world. From eresrch at eskimo.com Sat Apr 26 19:55:24 2003 From: eresrch at eskimo.com (Mike Rosing) Date: Sat, 26 Apr 2003 19:55:24 -0700 (PDT) Subject: Secret Service Buffoons In-Reply-To: <3EAAFC03.93EF30C3@cdc.gov> Message-ID: On Sat, 26 Apr 2003, Major Variola (ret) wrote: > To my surprise, the Special Agent called back > and pleaded with me. He changed his story and > said they had means of sending and receiving > email, but they _weren't allowed_ to give out > their email addresses. > > I know this is supposed to be the Secret > Service, but keeping their email addresses > secret is going a bit far IMHO. I would > think most computer-security professionals > would know how to set up a temporary and/or > anonymous email address. > > I hope he enjoys transcribing the scammers' > 350-character-long URLs from the paper I sent. > Shouldn't be too hard, seems they are used to pencil and paper :-) > I put the info on a secure web site and > suggested he pull it down from there, but > he declined that, too. Because you could pick off his login and trace him back :-) > The Special Agent was surprised to hear that > I controlled multiple web sites. He didn't > understand how that was possible. > > The Special Agent was surprised to hear that > given an IP address, I could figure out what > country it's in. He argued with me about this. > The term "whois" meant nothing to him. > > Heretofore I didn't understand how identity- > theft rings could operate so openly. One > might have thought they would be afraid of > stings, but evidently they're not. > > There's a lot of darkness here. I've set > out a few candles, but I'm not sure it's > going to be enough. More proof all our fears of the government actually being dangerous are totally false. They are incompetent beyond comprehension. I think I better go check out that movie "Brazil" again. Patience, persistence, truth, Dr. mike From measl at mfn.org Sat Apr 26 18:34:39 2003 From: measl at mfn.org (J.A. Terranson) Date: Sat, 26 Apr 2003 20:34:39 -0500 (CDT) Subject: How convenient... Message-ID: http://www.cnn.com/2003/WORLD/meast/04/26/sprj.irq.britain.iraq.ap/index.html Report: Iraq-al Qaeda link found LONDON (AP) -- Documents discovered in the bombed out headquarters of Iraq's intelligence service provide evidence of a direct link between Saddam Hussein's regime and Osama bin Laden's al Qaeda terrorist network, a newspaper reported Sunday. Papers found Saturday by journalists working for the Sunday Telegraph reveal that an al Qaeda envoy met with officials in Baghdad in March 1998, the newspaper reported. The paper quoted an unidentified Western intelligence official as saying the find was "sensational." The paper said the documents show that the purpose of the meeting was to establish a relationship between Baghdad and al Qaeda based on their mutual hatred of the United States and Saudi Arabia. The meeting went so well that it was extended by a week and ended with arrangements being discussed for bin Laden to visit Baghdad, the newspaper said. Journalists found a three-page file on bin Laden inside a folder lying in the rubble of one of the rooms of the intelligence headquarters, the paper said. "Iraqi agents at some point clumsily attempted to mask out all references to bin Laden, using white correcting fluid," the newspaper reported. "After carefully removing the dried fluid, however, the name is clearly legible three times in the documents." One of the pages, dated February 19, was marked "top secret and urgent" and referred to plans for the trip from Sudan of the unnamed envoy, who is described in the file as a trusted confidant of bin Laden's, the paper said. The document, signed, "MDA," which the newspaper said is a code name believed to belong to the director of one of the Iraqi intelligence sections, said the Iraqis sought to pay for the envoy's costs while in Iraq "to gain the knowledge of the message from bin Laden and to convey to his envoy an oral message from us to bin Laden." The message to bin Laden "would relate to the future of our relationship with him, bin Laden, and to achieve a direct meeting with him," the newspaper quoted the document as saying. The other documents confirm that the envoy traveled from Khartoum in Sudan to Baghdad in March 1998 and that he stayed at the al-Mansour Melia hotel. The documents do not mention whether any meeting took place between bin Laden and Iraqi officials, the newspaper said. Separately, The Sunday Times reported that its own journalists had found documents in the Iraqi foreign ministry that indicate that France gave Saddam Hussein's regime regular reports on its dealings with American officials. The newspaper said the documents reveal that Paris shared with Baghdad the contents of private transatlantic meetings and diplomatic traffic from Washington. One document, dated September 25, 2001, from Iraqi foreign minister Naji Sabri to Saddam's palace, was based on a briefing from the French ambassador in Baghdad and covered talks between presidents Jacques Chirac and George W. Bush. From justin at soze.net Sat Apr 26 13:51:34 2003 From: justin at soze.net (Justin) Date: Sat, 26 Apr 2003 20:51:34 +0000 Subject: Quarantines may be justified [Santorum] In-Reply-To: <3EAAC3F8.DF3F162E@cdc.gov> References: <3EAAC3F8.DF3F162E@cdc.gov> Message-ID: <20030426205134.GE25990@dreams.soze.net> At 2003-04-26 17:38 +0000, Major Variola (ret) wrote: > At 05:41 PM 4/25/03 +0000, Justin wrote: > >At 2003-04-25 16:31 +0000, Major Variola (ret) wrote: > > > >> But, Santorum needs to be tried & hung for what he meant. > > > >Do you have plans to try and hang the Supreme Court Justices who > >upheld Sodomy laws in Bowers v Hardwick? > > Violating the constitution is treason. Only state actors can violate > the constitution. Where'd you get that idea that private citizens can't violate the Constitution? Take a look at 18USC241, 242. Regardless, federal judges are certainly state actors, or at least they were when they committed treason and a change of status shouldn't make them immune to prosecution. > >What about the significant minority of Americans who'd completely > >agree with Santorum's remarks? > > I don't care if its a *majority*, the Constitution trumps democracy. > Democracy is merely mob rule. I'm well aware. I was only suggesting that there are many other people beside the not-so-distinguished Senator from Pennsylvania who are in desperate need of trial, rope, and tree. I'm confident that in a wide sampling of religiously-motivated fanatics in the U.S., Sen. Santorum would not rank even in the top thousand worst offenders. His comments, if anything, helped his opposition. I could hardly imagine the Supreme Court upholding the premise of Bowers v Hardwick this summer when they rule on the current case. Santorum's a harmless dinosaur. -- Freedom's untidy, and free people are free to make mistakes and commit crimes and do bad things. They're also free to live their lives and do wonderful things. --Defense Secretariat, 2003-04-11 From emc at artifact.psychedelic.net Sat Apr 26 20:54:01 2003 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Sat, 26 Apr 2003 20:54:01 -0700 (PDT) Subject: All trust is economics In-Reply-To: Message-ID: <200304270354.h3R3s19G028645@artifact.psychedelic.net> Tim writes: > I'm surprised at you for thinking trust is some number that is either 0 > or 1. The same could be said about "good" and "evil", yet in ordinary conversation, one doesn't use the words to refer to their zero values. Unqualified "trust" is somewhere between "more likely than not" and "absolutely certain." > All crypto is economics, and so is all trust. To a Jewish friend of mine, everything is marketing. I suppose it depends on ones perspective. :) > Consider two situations: > Situation 1: "I have generated a key for you and will send it > securely. You can trust me not to look at it and not to reveal it to > anyone else....Well, not unless Saddam's men force me to, or not until > John Ashcroft threatens to hold me as an illegal combatant if I don't > cooperate. Or not until someone offers me $500 cash, no questions > asked, for just a peek. Or not until I realize that this key is being > used to further right wing Nazi causes. Or..." Sounds like a good description of the difference between confidentiality and anonymity. I prefer the latter. > Situation 2: "Determining your private key requires an attacker to > either monitor your keystrokes and bug your computer, so you'd better > secure it, or it requires factoring a 309 decimal digit number > associated and derivable from your public key. This is the difference between wishful thinking and anonymity. > So far, the best algorithms have only factored a 137-digit number [for > example] and no mathematicians have yet found cleverer ways. Great fame > would await anyone who found a significantly faster method, even a > Fields Medal, and yet no one has yet revealed one." How silly. Factoring is like the Poincare Conjecture. Solving it doesn't let us do anything new and exciting, and nothing else we care about has a reduction into it. Fast factoring will be greeted by "oh, yes, of course", and the sound of mass yawning and moving on. In 10 years, "factor" will be a commodity microprocessor opcode. Is anyone even working on factoring any more? How long has it been since the last RSA Challenge number was factored? Seems like aeons. > Now I maintain there is a huge difference in the valuations placed on > the "trust" in these two cases. There is a huge difference in the valuation *YOU* place on the "trust" in these two cases. Valuation is hardly an absolutely quantifiable notion, completely independent of who is doing the valuating. I choose to avoid both situation 1 and situation 2 above. You avoid situation 1, and think you are safe in situation 2. You very well could be, but then again... > If you wish to believe that Joe Sixpack saying he promises to keep your > private key secret is on the same footing as the apparent difficulty of > factoring very large numbers (and if 309 digits is deemed too small, > only a tiny increase in key generation effort and later use to go to > 500 decimal digits or even 1000) then you are of course welcome to your > delusion. Yes, I believe Joe Sixpack saying that he promises to keep my key safe to be on the same footing as Joe Sixdiploma saying that because he can't figure out how to factor 309 digit numbers quickly, it must not be possible. Vanity, Vanity, All is Vanity. > All crypto is economics. All trust is economics. All RSA is faith-based crypto. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From timcmay at got.net Sat Apr 26 21:18:37 2003 From: timcmay at got.net (Tim May) Date: Sat, 26 Apr 2003 21:18:37 -0700 Subject: The Freest Country? In-Reply-To: Message-ID: <51893672-7867-11D7-865D-000A956B4C74@got.net> On Saturday, April 26, 2003, at 08:43 PM, R. A. Hettinga wrote: > > Anyway, we all have the ultimate canary in a coal mine. If *Tim* > decides it's time to go, than the US is officially in the shitter and > it's time to grab the bug-out bag. Personal liberty is of course not the same thing as economic or business liberty, of course. It might be that Costa Rica, for example, would be a fine place to live with low income taxes (hypothetically) even if it not a great place to headquarter a corporation in. (I picked Costa Rica because it has a tropical climate, some Dutch hackers have a place there, a well known digital money advocate relocated there, and it has no standing army. By coincidence, Intel located an assembly plant there. But not its corporate headquarters, needless to say.) Selling my house, packing up my voluminous amount of stuff (or worse, discarding it), and moving to Costa Rica or the South of France, or, Allah forbid, moving onto an oil platform or gunnery turret or whatever, is not easy to do. Furthermore, Uncle Sugar thinks he has the right to take my assets for the first 10 years I'm no longer having other countries invaded on my behalf, no longer having negro welfare mothers breeding on my behalf, and no longer getting any of the so-called benefits of advanced civilization. Those who have exited the country have found the tax man hounding them for years. Probably if I were to leave the U.S. I'd do it the old-fashioned way: buy a lavish, well-protected seaside villa in Mexico and just pay off the local cops and politicians. How I'd get my money out of the U.S. without Uncle Sugar taking 35-50% for the aforementioned country invasions and welfare breeders is an unsolved problem. (Hint: Stuffed suitcases don't work, for various reasons.) [This space reserved for insertion of usual silliness about living out of suitcase, stuffed or not, and being a "perpetual tourist," which only works if one is below a certain net worth and if one likes to travel a lot.] Meanwhile, it's easier to have a lot of guns, some perimeter alarms, various sets of "documents" to facilitate escape from Airstrip One, and to minimize stock sales so as to minimize Uncle Sugar's theft. If I leave, I expect it will be one step ahead of the Thought Police, aka Ashcroft's Army. > > In the meantime, Young, as usual, writes great word salad, this time > about what a shitty country we are, but the still-warming pot is, at I still can't understand anything he writes. He's either actually a loon, as he portrays himself to be, or he thinks he's channeling James Joyce. --Tim May From jamesd at echeque.com Sat Apr 26 21:27:34 2003 From: jamesd at echeque.com (James A. Donald) Date: Sat, 26 Apr 2003 21:27:34 -0700 Subject: Making Money in Digital Money In-Reply-To: References: <20030426025046.A8088505@exeter.ac.uk> Message-ID: <3EAAF9C6.9787.1BF0228@localhost> -- On 25 Apr 2003 at 22:56, Tim May wrote: > I think it may just not be possible for some bright > programmer to develop a solid digital money (henceforth, DM) > system and deploy it while still making money, avoiding some > kind of prosecution or lawsuit (civil lawsuits for many > different reasons). > > [...] > > * Real DM will likely be introduced in a guerilla fashion, > much as Pr0duct Cypher anonymously released Magic Money a > decade ago. The mint cannot be anonymous. Needs reputation, and sizable wealth. Mint probably employs programmer, or is programmer. If the code is public domain, then there will be multiple mints, with some more willing to disregard hostile governments than others. I suggest the following introduction: Introduce for micropayment services (identity is too expensive for small payments, which is why credit cards fail below five dollars) Useful for antispam email charge, remailer user fees, file sharing networks (solving the free rider problem), pornography by the minute, and tips for videocam performers. Need some legal and profitable application to get the software fully developed, debugged, and people used to it. When people are using it for dimes, they will want to start using it for large sums, and then things get interesting. Dubai is currently the banker for people evading third world currency exchange restrictions. Once it is working in the micropayment ghetto, where credit cards are uncompetitive, there will be demand to break out of that ghetto, and where there is demand, there will be supply. Of course there have been many attempts to fill the micropayment niche, all of them miserable failures. I think this is due to the inherantly high costs of identity and revocability. If your payments are revocable, then you need identity, which costs, and you get involved in arbitration, which costs, and you cannot possibly afford to do that on a micropayment service. > * In my view, not necessarily the view of everyone in the DM > community, the Big Win for solid DM is in illegal markets, > e.g., buying and selling child porn, bestiality, snuff > images, etc. Child porn and bestiality are, like MP3s, a micropayment market. My hard drive keeps getting usenet child porn on it even though I try to prevent it. I download what I think is a Hellsing cartoon, and guess what? Among the many unviewed videos and images on my hard drive, there is probably enough child porn to put me away for fifty consecutive life sentences. My email spam is full of bestiality, even though I have numerous filtering rules designed to delete it. Surprisingly, I do not think I have seen any snuff spam -- which does not mean I am not getting it, it may be filtered by my anti porn spam rules. Just target file sharing, a legal market, according to the most recent judicial ruling, and some significant proportion of the files shared are going to be child porn etc. That is the users issue, not the banks. > * Anyone releasing such a strong DM system should be > targeting the high end applications, where the needs for > untraceability are very high and the willingess to pay the > costs (in training, in network resources) is also high. I disagree. Micropayments are legal. Useful if the same software has legal and illegal uses. Strong anonymity and consequent irrevocability has accepted legal, moral, and economic purpose in the micropayment field. > * In my view, most who have looked to enter the DM market > (such as Digicash, Mark Twain Bank, etc.) have shied-away > from precisely the areas where untraceability meets a real > market need. Mark Twain bank crippled their cash so they could stop pornographers from using it. > A digital money system where the DM may be "cancelled" will > not fly. For various reasons. (Imagine your bank telling you > that if they think you are violating their use policies they > may simply seize your money and you'll be out of luck.) Revocability. The various digital gold currencies are compelled to have an AUP and seize the money of people using their system when this AUP is violated, even though they very much do not want to, because of the very high costs involved. > * It may be that pioneers in this area just won't be able to > make any money. This is not new. Many discoveries did not > enrich the discoverer. Sometimes they were recognized in > their lifetimes, sometimes not. No money then crap software, crap software then lack of critical mass of users. Has to make money or no one will write software the ordinary end user will accept. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG WeQL5KAm368l/BB5FhdV3HRZwi0tcIoVVHe9WyGK 4JEJhGr9vM1Becp1QdyRiI3U4tkF26wqs75DTGtQA From timcmay at got.net Sat Apr 26 22:49:09 2003 From: timcmay at got.net (Tim May) Date: Sat, 26 Apr 2003 22:49:09 -0700 Subject: Fake News for Big Brother In-Reply-To: <20030426233754.A11085@cluebot.com> Message-ID: On Saturday, April 26, 2003, at 08:37 PM, Declan McCullagh wrote: > On Sat, Apr 26, 2003 at 12:04:10PM -0700, Eric Cordian wrote: >> The news media, will, in fact, print fake news supplied by the >> government, >> with full knowlege that it is false, to further an ongoing >> investigation. > > Yes, that may be the case. It certainly is here. But let's not forget > the fact that this incident has drawn sharp criticism from other > journalists. > > -Declan But the journalist and his editors are still alive. When they have been necklaced and lit, we can rest easier. Burning down the entire newspaper office would maybe be overkill, but, hey, what the hell. Fuck them dead. --Tim May From timcmay at got.net Sat Apr 26 23:03:51 2003 From: timcmay at got.net (Tim May) Date: Sat, 26 Apr 2003 23:03:51 -0700 Subject: Making Money in Digital Money In-Reply-To: <3EAAF9C6.9787.1BF0228@localhost> Message-ID: <04F0A904-7876-11D7-865D-000A956B4C74@got.net> On Saturday, April 26, 2003, at 09:27 PM, James A. Donald wrote: > -- > On 25 Apr 2003 at 22:56, Tim May wrote: >> I think it may just not be possible for some bright >> programmer to develop a solid digital money (henceforth, DM) >> system and deploy it while still making money, avoiding some >> kind of prosecution or lawsuit (civil lawsuits for many >> different reasons). >> >> [...] >> >> * Real DM will likely be introduced in a guerilla fashion, >> much as Pr0duct Cypher anonymously released Magic Money a >> decade ago. > > The mint cannot be anonymous. Needs reputation, and sizable > wealth. Mint probably employs programmer, or is programmer. Any given mint only needs the belief by its customers that it will honor (redeem) its tokens. Such a mint can, by demonstration, be as small as a corner store offering gift certificates. Naturally, the blinded nature of tokens means that customers can "ping" such mints as often as they like. (There is the "pack up, leave town, and burn customers" scam, as there always is with a bank or mint which has not yet redeemed all of its obligations. The best fix for this is to distribute monies at many such mints. It is unlikely, though remotely possible, that all of them or even most of them will abscond at the same time. Note that reputation per se does not stop this scam from happening even with meatspace banks. It is rare, however, as most banks deduce that getting a fraction of a continuing stream of business is more advantageous than absconding.) > Child porn and bestiality are, like MP3s, a micropayment > market. My hard drive keeps getting usenet child porn on it > even though I try to prevent it. I download what I think is a > Hellsing cartoon, and guess what? Among the many unviewed > videos and images on my hard drive, there is probably enough > child porn to put me away for fifty consecutive life sentences. > My email spam is full of bestiality, even though I have > numerous filtering rules designed to delete it. Surprisingly, > I do not think I have seen any snuff spam -- which does not > mean I am not getting it, it may be filtered by my anti porn > spam rules. Nonsense. What you are receiving for free is either tame stuff or is just a "free sample," for marketing purposes. Look at the reports on monies spent on actual busted child porn rings: these consumers are spending real money, not getting their stuff for free as spam. --Tim May From timcmay at got.net Sat Apr 26 23:11:58 2003 From: timcmay at got.net (Tim May) Date: Sat, 26 Apr 2003 23:11:58 -0700 Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: <200304270058.59914.njohnsn@njohnsn.com> Message-ID: <270C1CC2-7877-11D7-865D-000A956B4C74@got.net> On Saturday, April 26, 2003, at 10:58 PM, Neil Johnson wrote: > You could try the Dialectizer > > http://rinkworks.com/dialect/ > > Example: > > On Saturday 26 April 2003 09:42 pm, Tim "Ahh Be Bad" May wrote, dig > dis: >> >> REQUEST SPEC SOONEST. IDEA RELAYED BUPERS SUBJECT APPROVAL COMMAND. >> >> >> Dere is various syndetic languages, not da damn least uh which be de >> fo'm uh "milrap" used fo' quasi-literate military memos. >> >> Looks a lot like the Ebonicizer, which, those who search the archives can confirm, I used a few times several years ago. Pity da fool! --Tim May From adam at cypherspace.org Sat Apr 26 15:21:27 2003 From: adam at cypherspace.org (Adam Back) Date: Sat, 26 Apr 2003 23:21:27 +0100 Subject: Making Money in Digital Money In-Reply-To: <775AB29B-7809-11D7-865D-000A956B4C74@got.net>; from timcmay@got.net on Sat, Apr 26, 2003 at 10:06:48AM -0700 References: <20030426134155.GA28448@lightship.internal.homeport.org> <775AB29B-7809-11D7-865D-000A956B4C74@got.net> Message-ID: <20030426232127.A8084118@exeter.ac.uk> On Sat, Apr 26, 2003 at 10:06:48AM -0700, Tim May wrote: > I don't believe ZKS ended up targeting the remailer niche ("space") we > are interested in. In the years that Freedom nyms were being sold, how > many were used to post to this list? How many were used to post to > Usenet? A set nearly of measure zero. I think the first mail system at ZKS was relatively unreliable, and complex for users to understand and use (setting up a nym as with nymserver/type I involved reply blocks, waiting for confirmation etc). It was reply block based, but reimplemented from scratch, not based on cyphperpunk type I code. Some of the issues were implications of the design (as with type I based reply blocks, some mail does not arrive; also reply blocks always seemed fragile to me), others were probably implementation issues. The 2nd gen mail system we built at ZKS (my design) had a different set of tradeoffs. I found a copy of the "Freedom 2.0 Mail System" white paper here: http://osiris.978.org/~brianr/crypto-research/anon/www.freedom.net/products/whitepapers/Freedom_2_Mail_System.pdf It was definately more reliable (the main business reason for doing it). Also there was no reply block pointing back at your real identity which is the main weakness of the reply-block design: it is a subpeona risk. Instead it was based on a pop server which you optionally connect to via the anonymous freedom network to achieve sender anonymity (or deliver via mixmaster if you prefer, it's accepts regular mail to interface with non-anonymous users), and via the freedom network again to achieve recipient pseudonymity. So these interactive connections are immediately forward-secret, and therefore you have much better protection against subpeona attack. However they are more vulnerable to all-powerful observer attacks who could probably figure out which pseudonym was which by sending lots of unique sized email and then watching traffic patterns flow through the network. So as you might expect different systems can be built which optimize against different types of threat. I'd argue the 2nd gen mail system would be much better against subpoena attack, but weaker against all-powerful passive adversaries. The typical thing an end user with strong desire for privacy would be concerned about (frivolous lawsuits related to online discussion groups, defamatio, privacy against law enforcement sting operations, etc) would be better protected; where as national security issues where you might imagine NSA or such could coordinate and implement the all-powerful passive adversary are less well protected against. > I assume _some customers_ were using Freedom...I just don't recall ever > receiving a message from any of them, or seeing any of them on the > lists and groups I frequent. I think there were more active users of the web browsing side of things than the pseudonymous mail for the reasons above. The version might have been better given time, but I think freedom network (and mail) was discontinued relatively soon after it's deployment. > (I still check in on www.zks.net occasionally to see what's going on. > Stuff about firewalls and viruses.) Yes. This is why I quit to do other stuff -- limited crypto stuff left, and no distributed trust anonymity or privacy left. ZKS still does have one anonymous networking type sytem called websecure which they are actively selling and have subscribers of. It's somewhat similar to anonymizer.com in that it is one hop only anonymous traffic for web browsing only. The differences (which make it probably more secure I'd argue) are that it doesn't rely on html re-writing which is a risky strategy to provide good assurance (periodically somone finds some html extension which anonymizer.com style html rewriting misses, until they fix it; or fuzzy parsing rules in browsers which allow you to slip URLs past the re-writer in a way that some browsers will fix up, but the re-writer doesn't recognize as a URL). Unfortunately the websecure approach is also Internet Explorer specific, relying on a browser helper object to hook in an SSL tunnel to the proxy (run by ZKS). It's described here: http://www.freedom.net/products/websecure/index.html the fact that it's a browser helper object doesn't hurt the appearance -- it doesn't really look like a download, the installation is quite rapid and seamless. (The rest as Tim says is a suite with options of a Personal Firewall, Anti-Virus and Parental Control.) The suite products are primarily sold (actually "rented" as a service for $x/month with profit share) via ISPs, preinstalled on hardware manufactureres machines etc. (What you get for your ongoing subscription is virus definition updates, firewall rule updates to cope with new applications, software updates, and the parental control involves ongoing use of a server). As you can see on the press release page they're quite successful at signing up ISPs onto this model: http://www.zeroknowledge.com/media/pressrel.asp with a fairly steady stream of new and fairly major ISPs. So, successful, but not hard-core cryptographically assured, distributed trust/zero-trust, privacy related. Adam From declan at well.com Sat Apr 26 20:37:54 2003 From: declan at well.com (Declan McCullagh) Date: Sat, 26 Apr 2003 23:37:54 -0400 Subject: Fake News for Big Brother In-Reply-To: <200304261904.h3QJ4AQv025621@artifact.psychedelic.net>; from emc@artifact.psychedelic.net on Sat, Apr 26, 2003 at 12:04:10PM -0700 References: <200304261904.h3QJ4AQv025621@artifact.psychedelic.net> Message-ID: <20030426233754.A11085@cluebot.com> On Sat, Apr 26, 2003 at 12:04:10PM -0700, Eric Cordian wrote: > The news media, will, in fact, print fake news supplied by the government, > with full knowlege that it is false, to further an ongoing investigation. Yes, that may be the case. It certainly is here. But let's not forget the fact that this incident has drawn sharp criticism from other journalists. -Declan From rah at shipwright.com Sat Apr 26 20:43:46 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Sat, 26 Apr 2003 23:43:46 -0400 Subject: The Freest Country? In-Reply-To: References: <3EAB03AC.3000305@ksvanhorn.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Kevin, I really do pay attention to this stuff, almost full time, and I read most of the same things that Duncan does. When you put them all together, we're close enough to the top for, heh, government work. At 7:21 PM -0400 4/26/03, Duncan Frissell wrote: >I don't know enough to compare overall liberty in NZ & Ire. but >with Ire. in the EU now it's possible that we're #1. Shows a low >standard for liberty in the world. Amen. We're sort of the Microsoft of free countries right now (I'm a Mac guy, myself...) it ain't pretty, the company's grabby and turfy, but most of the feature boxes get checked off, and it's what everyone's using at work. NZ's backsliding a bit, especially since 9/11, but I bet Peter can tell us more first hand if he's around. What Duncan said about Ireland, but they're fighting the good fight, and, hell, like Adam said, London's got a TAZ or two that doesn't completely suck, but, over all, the UK's in the same shoes we are securitywise, and anal probes accordingly. Meanwhile noose tightens. Like Doug said, "and then you go to jail" still is a bad error-handler for a protocol. Write code if you've got it to write. Anyway, we all have the ultimate canary in a coal mine. If *Tim* decides it's time to go, than the US is officially in the shitter and it's time to grab the bug-out bag. In the meantime, Young, as usual, writes great word salad, this time about what a shitty country we are, but the still-warming pot is, at the moment, the coolest place on the stove; certainly not the frying pan of the continental EU, much less the fire of the Third World, most of the XSU and Le Chine inclusive. All these cooking metaphors are making me hungry. Freedom: The New White Meat. (marginally better than "It's what's for dinner"?) Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPqtR68PxH8jf3ohaEQIUlwCdFyfSp0D4hSKu+NFN2RpQmzBxT3kAoKi7 ibUc/ndN81rG5tOPOAZ4B6Gy =dWZi -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From adam at cypherspace.org Sat Apr 26 15:44:02 2003 From: adam at cypherspace.org (Adam Back) Date: Sat, 26 Apr 2003 23:44:02 +0100 Subject: more about anonymous mail (Re: Making Money in Digital Money) In-Reply-To: <20030426232127.A8084118@exeter.ac.uk>; from adam@cypherspace.org on Sat, Apr 26, 2003 at 11:21:27PM +0100 References: <20030426134155.GA28448@lightship.internal.homeport.org> <775AB29B-7809-11D7-865D-000A956B4C74@got.net> <20030426232127.A8084118@exeter.ac.uk> Message-ID: <20030426234402.A7988036@exeter.ac.uk> I wrote about freedom 2.0 mail system: > So these interactive connections are immediately forward-secret, and > therefore you have much better protection against subpeona attack. > However they are more vulnerable to all-powerful observer attacks who > could probably figure out which pseudonym was which by sending lots of > unique sized email and then watching traffic patterns flow through the > network. So a couple of other comments: - Ulf Moeller, Anton Stiglic and I published our thoughts about how someone could go about doing the passive adversary traffic analysis attacks on interactive systems such as the freedom anonymous network: Apr 01 - "Traffic Analysis Attacks and Trade-Offs in Anonymity Providing systems", Information Hiding 2001, Adam Back, Ulf Moeller and Anton Stiglic http://www.cypherspace.org/adam/pubs/traffic.pdf - and in fact the version 1 freedom mail system had other issues: the mail was not split up into fixed sized chunks (as it is with mixmaster), so it suffered the same vulnerabilities that type I based nymservers do: it was in addition equally vunlerable to traffic analysis. I'd take this version 1 freedom mail vulnerability to indiate that in essentially all respects version 2 was more secure than version 1; though some of the version 1 design-issues could have been fixed in similar ways that are proposed in the mixminion project. The mixminion project project (aka Type III remailer) design and implementation attempts to avoid these issues by merging reply block functionality into a mixmaster like fixed sized message mix net. Mixminion actually uses Single Use Reply Blocks (SURBs) to in addition reduce vulnerability to flooding attacks (where someone just sends lots of messages to see where they arrive as they flow down the reply block). The recipient I think is expected to send a few SURBs to nyms he communicates with, and to send SURBs to the nymserver to pick up mail from regular internet mail senders (who are not using the mixminion client). If I understand it is also planned that the mixminion / Type III protocol will be implemented within mixmaster as mixmaster version 4. (The current alpha mixminion code is a separate code base, written in python scripting language). The other good thing about mixminion / type III protocol is that finally type I remailers with their traffic analysis issues could be phased out. (Their remaining reason for existance was to support reply-block functionality for nymservers). Adam From bill.stewart at pobox.com Sat Apr 26 23:46:47 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 26 Apr 2003 23:46:47 -0700 Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: <200304270058.59914.njohnsn@njohnsn.com> References: Message-ID: <5.1.1.6.2.20030426234205.02d350e0@idiom.com> At 12:58 AM 04/27/2003 -0500, Neil Johnson wrote: >You could try the Dialectizer > > http://rinkworks.com/dialect/ One of the early web anonymizing systems was the Web Canadianizer, eh? It retrieved and dialectized web pages, and while it wasn't as thorough as the Anonymizer, it worked pretty well, eh? By the way, it's amusing and sad to see that one of the features of the current Zero Knowledge Systems products is a Content Filtering feature which not only blocks Sex and Violence but also Criminal Skills. Presumably this means that it would block any access to ZKS Freedom, the Anonymizer, and most other pages with Hacker information, unless they've hacked it to whitelist their own services. From rah at shipwright.com Sat Apr 26 20:56:18 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Sat, 26 Apr 2003 23:56:18 -0400 Subject: Fwd: [Asrg] A New Plan for No Spam / Velocity Indicator Message-ID: --- begin forwarded text From bill.stewart at pobox.com Sun Apr 27 00:05:01 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Sun, 27 Apr 2003 00:05:01 -0700 Subject: The Freest Country? In-Reply-To: <51893672-7867-11D7-865D-000A956B4C74@got.net> References: Message-ID: <5.1.1.6.2.20030426235327.02d35228@idiom.com> At 09:18 PM 04/26/2003 -0700, Tim May wrote: >[This space reserved for insertion of usual silliness about >living out of suitcase, stuffed or not, and being a "perpetual tourist," >which only works if one is below a certain net worth and if >one likes to travel a lot.] There are different kinds of perpetual tourism, some of which involve less travelling than others. I have friends who are believed by the Netherlands bureaucrats to be spending their time in Belgium, and by the Belgian bureaucrats to be over in the Netherlands. I think the apartment in the Netherlands is probably different than their official when-we're-not-outside-the-country address, and that their Belgian address is a mailbox, but I could have that backwards, and at least one of their addresses is probably owned by a corporation, and their net worth is probably in Switzerland or some such location, but while their net worth is fine, I think they're probably retired or at most "consulting" rather than doing full-time work. On the other hand, one nice thing about that area is that if they _do_ need to be out of the country, it's an hour or two across an unguarded border. I don't know if it's as easy to confuse the US and Canada about which country you're living in, and while the borders are permeable, they're a lot more thoroughly audited than they used to be, so maybe you need to spend more time on the ferryboat to Vancouver instead of driving or flying commercially. From njohnsn at njohnsn.com Sat Apr 26 22:29:09 2003 From: njohnsn at njohnsn.com (Neil Johnson) Date: Sun, 27 Apr 2003 00:29:09 -0500 Subject: All trust is economics In-Reply-To: <200304270354.h3R3s19G028645@artifact.psychedelic.net> References: <200304270354.h3R3s19G028645@artifact.psychedelic.net> Message-ID: <200304270029.09348.njohnsn@njohnsn.com> On Saturday 26 April 2003 10:54 pm, Eric Cordian wrote: > > Yes, I believe Joe Sixpack saying that he promises to keep my key safe to > be on the same footing as Joe Sixdiploma saying that because he can't > figure out how to factor 309 digit numbers quickly, it must not be > possible. > There are a lot more Joe Sixdiploma's that have tried figuring out how to factor 309 digit numbers and failed than Joe Sixpacks that have successfully kept their promise to keep a secret. > All RSA is faith-based crypto. Like I said, I have more faith in the math than human nature. -- Neil Johnson http://www.njohnsn.com PGP key available on request. From shaddack at ns.arachne.cz Sat Apr 26 15:36:17 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Sun, 27 Apr 2003 00:36:17 +0200 (CEST) Subject: Censorship: state bans games that kill pigs In-Reply-To: <20030425210210.GC25990@dreams.soze.net> Message-ID: On Fri, 25 Apr 2003, Justin wrote: > Don't forget zero tolerance. If caught, they'll be suspended or > expelled or transferred. Digital media have an advantage over drugs. They don't smell, can't be sniffed, a piss test won't reveal you played a "wrong" game, and you can store an ISO image in your iPod. Makes things more difficult to enforce. Another advantage is that the digital media could replace the drugs as "forbidden fruit", which is more healthy. Also, crackdowns on game-swappers could be perceived by public in much different way - while the Society is conditioned for decades that Drugs Are Bad, this is about "just silly games". With good management, this could be used to find public support for "zero tolerance to zero tolerance". A guerrila tactics, of maneuvering kids of local officials into stings, could make things interesting as well; kind of similar to planting books in the houses of firemen in Fahrenheit 451. > I've never understood the concept of expulsion from public school > before age 16. "You must go to school" then "you must not go to > school" seems rather silly to me. Cultural question: I never understood the concept of expulsion. How it works, why it is used? We never had it here (.cz). Can't it be one of the factors our juvenile criminality is quite lower? > I guess it's better to have them running around neighborhoods in gangs > with real guns than going to school and using chicken strips to shoot > at teachers. Suuuuuure. (We used the tubes from one kind of mechanical pencil as the guns and little paper balls as the ammo. Especially good if the target had dark hair and a certain kind of hairdo where they stuck.) > About the cd swapping, maybe their parents will go to jail, too. By what twist of law? Nobody can supervise ther children 24/7, not when the corporations are squeezing more and more "productivity" (read: work hours) from them. > That's going to be really productive for shaping the child's or young > teen's perception of society. Will teach them to hide their activities from the eyes of the ones with power. Could be the most useful thing they learn at school... From njohnsn at njohnsn.com Sat Apr 26 22:49:08 2003 From: njohnsn at njohnsn.com (Neil Johnson) Date: Sun, 27 Apr 2003 00:49:08 -0500 Subject: All trust is economics In-Reply-To: <200304270354.h3R3s19G028645@artifact.psychedelic.net> References: <200304270354.h3R3s19G028645@artifact.psychedelic.net> Message-ID: <200304270049.08522.njohnsn@njohnsn.com> On Saturday 26 April 2003 10:54 pm, Eric Cordian wrote: > > To a Jewish friend of mine, everything is marketing. > > I suppose it depends on ones perspective. :) > In a way, marketing is about convincing customers to trust (the value) your product or service enough to exchange something of they have of value for it. So we are back to economics. -- Neil Johnson http://www.njohnsn.com PGP key available on request. From njohnsn at njohnsn.com Sat Apr 26 22:58:59 2003 From: njohnsn at njohnsn.com (Neil Johnson) Date: Sun, 27 Apr 2003 00:58:59 -0500 Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: References: Message-ID: <200304270058.59914.njohnsn@njohnsn.com> You could try the Dialectizer http://rinkworks.com/dialect/ Example: On Saturday 26 April 2003 09:42 pm, Tim "Ahh Be Bad" May wrote, dig dis: > > REQUEST SPEC SOONEST. IDEA RELAYED BUPERS SUBJECT APPROVAL COMMAND. > > > Dere is various syndetic languages, not da damn least uh which be de > fo'm uh "milrap" used fo' quasi-literate military memos. > > But uh course sucka's ain't goin' t'learn new human languages fo' such > an ephemeral and mostly useless reason as t'hide deir textual clues. > > Kascinski gots nailed cuz' his rants wuz so's long, runnin' t'many > newssheet pages (as dey wuz printed, at da damn FBI's request o' his > request, o' bod, ah' fo'get da damn details) and wuz filled wid some lot mo'e > dan plum grammatical and stylistic clues, dig dis: de rants had his political > views, his analysis uh histo'y, etc. Co' got d' beat! It's doubtful dat K. would gots > had any interest in tryin' t'scribble in some syndetic language, > stripped uh various stylistic choices and opshuns. > > Or dat we would wanna. > > By de way, dere wuz some scribblin' out some few years back by an academic who > specializes in "fo'ensic text analysis," e.g. What it is, Mama!, analyzin' de text of > Shakespeare, Pynchon, etc. Co' got d' beat! t'do dis kind'a analysis. (He lived in > Soquel, some town near me, and he analyzed letters by some "Wanda Tinax'y" > which wuz recon'd by some t'be actually written by Domas Pynchon, > de famously reclusive audo' who, by coincidence (o' not?) lived fo' a > decade some couple uh ridges upside from me, in Aptos, also near Soquel. > Small wo'ld. Google should turn down de audo' fo' dose interested in > findin' de scribblin'. > > > > > "We is at war wid Oceania. WORD! We gots always been at war wid Oceania. WORD!" > "We is at war wid Eurasia. WORD! We gots always been at war wid Eurasia. WORD!" > "We is at war wid Iraq. Ah be baaad... We gots always been at war wid Iraq. Ah be baaad... > "We is at war wid France. We gots always been at war wid France." -- Neil Johnson http://www.njohnsn.com PGP key available on request. From njohnsn at njohnsn.com Sat Apr 26 23:06:26 2003 From: njohnsn at njohnsn.com (Neil Johnson) Date: Sun, 27 Apr 2003 01:06:26 -0500 Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: References: Message-ID: <200304270106.26618.njohnsn@njohnsn.com> Ohhh I just can't help it. On Setoordey 26 Epreel 2003 09:42 pm, Teem Mey vrute-a: > > REQOoEST SPEC SOONEST. IDEA RELEYED BOoPERS SOoBJECT EPPROFEL COMMEND. > > > Zeere-a ere-a fereeuoos synzeeteec lungooeges, nut zee leest ooff vheech is zee > furm ooff "meelspeek" used fur qooesee-leeterete-a meelitery memus. Um gesh dee bork, bork! > > Boot ooff cuoorse-a peuple-a eren't gueeng tu leern noo hoomun lungooeges fur sooch > un iphemerel und mustly useless reesun es tu heede-a zeeur textooel clooes. Um gesh dee bork, bork! > > Kesceenski gut neeeled becoose-a hees runts vere-a su lung, roonneeng tu muny > noospeper peges (es zeey vere-a preented, et zee FBI's reqooest oor hees > reqooest, oor but, I furget zee deteeels) und vere-a feelled veet a lut mure-a > thun joost gremmeteecel und styleestic clooes: zee runts hed hees puleeticel > feeoos, hees unelysees ooff heestury, itc. It's duoobtffool thet K. vuoold hefe-a > hed uny interest in tryeeng tu vreete-a in sume-a synzeeteec lungooege-a, > streepped ooff fereeuoos styleestic chueeces und oopshuns. Um gesh dee bork, bork! > > Oor thet ve-a vuoold vunt tu. > > By zee vey, zeere-a ves a buuk oooot a foo yeers beck by un ecedemeec vhu > speceeelizes in "furenseec text unelysees," i.g., unelyzeeng zee text ooff > Shekespeere-a, Pynchun, itc. tu du thees keend ooff unelysees. Um gesh dee bork, bork! (He-a leefed in > Suqooel, a toon neer me-a, und he-a unelyzed letters by a "Vunda Teenesky" > vheech vere-a beleeefed by sume-a tu be-a ectooelly vreettee by Thumes Pynchun, > zee femuoosly reclooseefe-a oothur vhu, by cueencidence-a (oor nut?) leefed fur a > decede-a a cuoople-a ooff reedges oofer frum me-a, in Eptus, elsu neer Suqooel. > Smell vurld. Bork bork bork! Guugle-a shuoold toorn up zee oothur fur thuse-a interested in > feending zee buuk. > > > > > "Ve-a ere-a et ver veet Ooceuneea. Ve-a hefe-a elveys beee et ver veet Ooceuneea." > "Ve-a ere-a et ver veet Iooreseea. Ve-a hefe-a elveys beee et ver veet Iooreseea." > "Ve-a ere-a et ver veet Ireq. Ve-a hefe-a elveys beee et ver veet Ireq. > "Ve-a ere-a et ver veet Frunce-a. Ve-a hefe-a elveys beee et ver veet Frunce-a." -- Neil Johnson http://www.njohnsn.com PGP key available on request. From njohnsn at njohnsn.com Sat Apr 26 23:08:00 2003 From: njohnsn at njohnsn.com (Neil Johnson) Date: Sun, 27 Apr 2003 01:08:00 -0500 Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: References: Message-ID: <200304270108.00770.njohnsn@njohnsn.com> Sorry, there wasn't an option to translate into John Young dialect. :) -- Neil Johnson http://www.njohnsn.com PGP key available on request. From shaddack at ns.arachne.cz Sat Apr 26 18:54:19 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Sun, 27 Apr 2003 03:54:19 +0200 (CEST) Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: <3EAAC6C0.67F224C3@cdc.gov> Message-ID: On Sat, 26 Apr 2003, Major Variola (ret) wrote: > But seriously, you've just mentioned what's called "textual analysis". > Spelling errors and other idiosyncratic choices can be used > to "pierce the veil" of anonymity. That's what did in Dr. Kaczynski, > who pissed on the FBI for over a decade, until his brother recognized > his text. Couldn't there be a standard English-based language, "Anonglish", with a subset of English grammatical rules, human-readable (though maybe with its own idiosyncrazies) and machine-parseable, which appearance would not give many more clues than that Anonglish was used? Something where grammar rules would be few, strict, and easy to machine-check, spelling as well, and still be readable to anyone who knows "standard" English? Possibly with a "translator" from "normal" English (of course with the necessity to read the translation, correct eventual semantical mistakes introduced by rearranging the words, and "anonspell-check" the result)? That would put textual analysis from comparing the errors characteristic for a given person to comparing of trains of thoughts, which is much more difficult, much less being a "reliable proof", and practically impossible for very short messages. From schear at attbi.com Sun Apr 27 07:43:49 2003 From: schear at attbi.com (Steve Schear) Date: Sun, 27 Apr 2003 07:43:49 -0700 Subject: Welcome Patrick (was Re: Making Money in Digital Money) In-Reply-To: <3EAAF9C6.9787.1BF0228@localhost> References: <20030426025046.A8088505@exeter.ac.uk> Message-ID: <5.2.1.1.0.20030427073531.043158d8@mail.attbi.com> At 09:27 PM 4/26/2003 -0700, James A. Donald wrote: > > * Real DM will likely be introduced in a guerilla fashion, > > much as Pr0duct Cypher anonymously released Magic Money a > > decade ago. > >The mint cannot be anonymous. Needs reputation, and sizable >wealth. Mint probably employs programmer, or is programmer. > >If the code is public domain, then there will be multiple >mints, with some more willing to disregard hostile governments >than others. I'm not sure if many on this list recognize that the one such person, Patrick, replied to the "RE: Thanks for the living hell, and question about OpenSSL" thread yesterday. His Lucrative, open source DBI, is the first serious cypherpunks mint/ewallet code produced since Pr0duct Cypher's attempt many years ago. Unlike the earlier stuff, its object oriented and uses some of the most current middleware tools and techniques. Those on the list who fashion themselves as more than armchair cypherpunks would do well to visit his site http://lucrative.thirdhost.com/ , join the Lucrative mail list and/or chat with him privately. >I suggest the following introduction: Introduce for >micropayment services (identity is too expensive for small >payments, which is why credit cards fail below five dollars) >Useful for antispam email charge, remailer user fees, file >sharing networks (solving the free rider problem), pornography >by the minute, and tips for videocam performers. Patrick will soon have a configurable toolkit to create an "everyman an mint/underwriter" available soon. Lucky has offered to provide offshore from U.S. hosting for test mint. >Need some legal and profitable application to get the software >fully developed, debugged, and people used to it. When people >are using it for dimes, they will want to start using it for >large sums, and then things get interesting. Dubai is >currently the banker for people evading third world currency >exchange restrictions. Once it is working in the micropayment >ghetto, where credit cards are uncompetitive, there will be >demand to break out of that ghetto, and where there is demand, >there will be supply. > >Of course there have been many attempts to fill the >micropayment niche, all of them miserable failures. I think >this is due to the inherantly high costs of identity and >revocability. If your payments are revocable, then you need >identity, which costs, and you get involved in arbitration, >which costs, and you cannot possibly afford to do that on a >micropayment service. > > > * In my view, not necessarily the view of everyone in the DM > > community, the Big Win for solid DM is in illegal markets, > > e.g., buying and selling child porn, bestiality, snuff > > images, etc. > >Child porn and bestiality are, like MP3s, a micropayment >market. My hard drive keeps getting usenet child porn on it >even though I try to prevent it. I download what I think is a >Hellsing cartoon, and guess what? Among the many unviewed >videos and images on my hard drive, there is probably enough >child porn to put me away for fifty consecutive life sentences. >My email spam is full of bestiality, even though I have >numerous filtering rules designed to delete it. Surprisingly, >I do not think I have seen any snuff spam -- which does not >mean I am not getting it, it may be filtered by my anti porn >spam rules. > >Just target file sharing, a legal market, according to the most >recent judicial ruling, and some significant proportion of the >files shared are going to be child porn etc. That is the users >issue, not the banks. > > > * Anyone releasing such a strong DM system should be > > targeting the high end applications, where the needs for > > untraceability are very high and the willingess to pay the > > costs (in training, in network resources) is also high. > >I disagree. Micropayments are legal. Useful if the same >software has legal and illegal uses. Strong anonymity and >consequent irrevocability has accepted legal, moral, and >economic purpose in the micropayment field. > > > * In my view, most who have looked to enter the DM market > > (such as Digicash, Mark Twain Bank, etc.) have shied-away > > from precisely the areas where untraceability meets a real > > market need. > >Mark Twain bank crippled their cash so they could stop >pornographers from using it. > > > A digital money system where the DM may be "cancelled" will > > not fly. For various reasons. (Imagine your bank telling you > > that if they think you are violating their use policies they > > may simply seize your money and you'll be out of luck.) > >Revocability. The various digital gold currencies are >compelled to have an AUP and seize the money of people using >their system when this AUP is violated, even though they very >much do not want to, because of the very high costs involved. > > > * It may be that pioneers in this area just won't be able to > > make any money. This is not new. Many discoveries did not > > enrich the discoverer. Sometimes they were recognized in > > their lifetimes, sometimes not. > >No money then crap software, crap software then lack of >critical mass of users. Has to make money or no one will write >software the ordinary end user will accept. > > --digsig > James A. Donald > 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG > WeQL5KAm368l/BB5FhdV3HRZwi0tcIoVVHe9WyGK > 4JEJhGr9vM1Becp1QdyRiI3U4tkF26wqs75DTGtQA we do not win the terrorism battle / with exclusion of liberties / an un-elected president / with a brand new atrocity / make way for war time opportunists / corporate interests and their proxies / exploitation of a tragedy / to serve their ideologies / corporate military complex / continues to abuse the world / death weapons for despots / sold by the red, white and blue -- Moral Crux, Stocks and Bombs From mv at cdc.gov Sun Apr 27 09:37:32 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Sun, 27 Apr 2003 09:37:32 -0700 Subject: Finder's Keepers, Smartcards, Anon Cash [Re: double-spending prevention w. spent coins] Message-ID: <3EAC074C.8060606@cdc.gov> At 05:38 PM 4/26/03 -0700, Bill Stewart wrote: >At 03:05 PM 04/26/2003 -0700, Major Variola (ret) wrote: >>Clearly the most anonymous systems (cash) >>have the 'finders keepers' property, *necessarily*. > > Ok, Major Variola has demonstrated that he's either Not Tim, > or is Tim trying to make it look like he's Not Tim :-) > He's also Not Even Hettinga, nor Adam, nor Choate.... > ... is that you, Lawrence? Perhaps this whole thing is just one person talking to himself, with Tim listening in! -Dr Evil, CP list Clearly I'm not talking about online systems here, where the online DB-query prevents double-spending, and protocols provide anonymity. I'm talking about those systems where you have a tamper-resistant device providing double-spend assurance. Yes, I know that a bank's secrets are not safe in Paul Kocher's back pocket. But lets assume a tamperproof system protected by a reasonable PIN. The stored-value smartcard in your pocket was bought off the shelf with cash and has no identifying info. >>But one can imagine anonymous systems that are useless to finders, >>e.g., a smartcard with a real PIN and/or fingerprint reader. > > Fingerprint reader? No thanks; aside from their technical weaknesses, > they're rather at cross-purposes to anonymous digital cash. > Do not double-spend by looking into laser with remaining eyeball. I'm aware of the problems with biometrics & street surgery. Ok, a PIN is fine. > You don't even need a smartcard; a data file format that uses > some kind of password-based encryption is enough. > Smart cards, or dumb cards, may or may not be a useful adjunct > to some digital cash systems, but one of the big reasons for using > digital cash instead of 500-Euro banknotes is for online transactions. > Smartcards may let you use your digital cash at somebody else's >cash reader, > and may reduce the risk of software problems trashing your cash, > but digicash isn't necessarily something most people will carry >around. Physical tokens are better user interfaces. You can also leverage their tamper-resistance as the origin of trust. Without going online for every transaction. Obviously there are pros and cons for different techs. (I don't see why a secure smartcard couldn't be used for online transactions if it has a convenient home-computer i/f; dedicated devices are more reliable, anyway.) >>In these cases, it is advantageous to the finder to return the >>smartcard in hope of a reward, IFF the loser makes this possible. > > Now, *that's* an interesting suggestion. Pay-to-bearer has finder's-keepers property, but the PIN can remove this property. I suppose this applies to online protocol based systems, e.g., if someone trojans your computer and copies your coins. Much like PGP does with private keys, requiring a passphrase to get to them. >>Maybe there's a bizmodel in being a clearing house for lost locked >>smartcards, without trashing their potential "bearer" anonymity unless >>the loser tells the clearing house they've lost it. > > Not any time soon :-) It's much more likely that the issuing bank > or the wallet vendor would be in this business than a third party, > and there are problems like how to preserve the anonymity, My claim is that anonymity can be present *unless* you want your card (with its stored-value) back. This is a feature that cash doesn't have. > Or you just limit use of smartcards to money you're willing to lose, Much like a leather wallet & paper cash; but smartcard-cash could be 'safer' with a PIN & (anonymity-busting) reward mechanism. Obviously you can't 'cancel' a smartcard like you can a lost credit card, since the smartcard transactions are not online. So you hope its found, instead of truly lost. When you lose paper cash, you don't care, its the same to you. From measl at mfn.org Sun Apr 27 07:44:44 2003 From: measl at mfn.org (J.A. Terranson) Date: Sun, 27 Apr 2003 09:44:44 -0500 (CDT) Subject: How convenient... In-Reply-To: <20030427112844.GH25990@dreams.soze.net> Message-ID: On Sun, 27 Apr 2003, Justin wrote: > I assume this means that nobody cares any longer about finding WoMD? I have seen several different wire stories in the last few days where Shrub's Thugs stated that "WMD may have been destroyed before the start of the war". I find it amazing that nobody in the press has stopped to ask the obvious questions, for instance, if all WMD were destroyed before the war (as Iraq stated), then (a) How is it that the US continually asserted that it knew for FACT that these weapons existed, and even claimed to KNOW the exact locations (but "wouldn't tell" Blix), and (b) if Iraq did in fact destroy all WMD, as he stated he did, and as we are now beginning to acknowledge, how do we "justify" [read: "make legal"] our recent BoyzWithToyz party? -- Yours, J.A. Terranson sysadmin at mfn.org From hseaver at cybershamanix.com Sun Apr 27 08:26:05 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Sun, 27 Apr 2003 10:26:05 -0500 Subject: The Freest Country? In-Reply-To: <5.1.1.6.2.20030426235327.02d35228@idiom.com> References: <5.1.1.6.2.20030426235327.02d35228@idiom.com> Message-ID: <20030427152605.GB27576@cybershamanix.com> On Sun, Apr 27, 2003 at 12:05:01AM -0700, Bill Stewart wrote: > > I don't know if it's as easy to confuse the US and Canada about > which country you're living in, and while the borders are permeable, > they're a lot more thoroughly audited than they used to be, > so maybe you need to spend more time on the ferryboat to Vancouver > instead of driving or flying commercially. I've known a couple of different people who were private pilots who always said the US/CA border is non-exiestent. -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From rah at shipwright.com Sun Apr 27 08:18:06 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Sun, 27 Apr 2003 11:18:06 -0400 Subject: The Freest Country? In-Reply-To: <51893672-7867-11D7-865D-000A956B4C74@got.net> References: <51893672-7867-11D7-865D-000A956B4C74@got.net> Message-ID: At 9:18 PM -0700 4/26/03, Tim May wrote: >I still can't understand anything he writes. He's either actually a >loon, as he portrays himself to be, or he thinks he's channeling James >Joyce. Having met John Young once, I think I prefer the latter, he's certainly smart enough to do it.:-) Cheers, RAH -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From justin at soze.net Sun Apr 27 04:28:44 2003 From: justin at soze.net (Justin) Date: Sun, 27 Apr 2003 11:28:44 +0000 Subject: How convenient... In-Reply-To: References: Message-ID: <20030427112844.GH25990@dreams.soze.net> At 2003-04-27 01:34 +0000, J.A. Terranson wrote: > http://www.cnn.com/2003/WORLD/meast/04/26/sprj.irq.britain.iraq.ap/index.html > > Report: Iraq-al Qaeda link found I assume this means that nobody cares any longer about finding WoMD? ... > The newspaper said the documents reveal that Paris shared with Baghdad the > contents of private transatlantic meetings and diplomatic traffic from > Washington. So does this mean we're going to skip over Damascus but continue west to Paris? We've liberated it before from foreign occupiers. I guess we now need to liberate it from itself. I wonder, would a liberated France be more resistant to a U.S.-organized constitutional convention than Iraq looks like it will be? Here I am watching a bunch of government lawyers at the 2002-11-22 ABA conference worrying themselves to death over how to prevent spying restrictions on domestic communications from going into effect when "foreign terrorists" use hotmail accounts, and all I can do is laugh. -- Freedom's untidy, and free people are free to make mistakes and commit crimes and do bad things. They're also free to live their lives and do wonderful things. --Defense Secretariat, 2003-04-11 From patrick at fexl.com Sun Apr 27 08:35:25 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Sun, 27 Apr 2003 11:35:25 -0400 Subject: Anonymous Transport Layer In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 From: John Kelsey (Regarding my non-blinded scheme) > Right. You actually can get reasonable anonymity with the kind of > scheme > you're proposing, assuming anonymous communications and heavy use of > the > system. When you get a coin issued, you just keep it in limbo for > awhile, > and then "spend" it with yourself, iterating until your paranoia level > is > satisfied. If the system is heavily used for real stuff, and the uses > are > over an anonymous communications network, there should be no way for > the > bank to tell when you're transferring the coin to yourself, vs. when > you're > transferring it to someone else. ... I have sometimes wondered if it might be possible to use non-blinded digital notes on top of an anonymous transport layer and thereby achieve the same untraceability as that provided by blinded digital notes. So, I considered the possibility that a coder might be lazy and write a system that over normal IP would have undesirable traceability characteristics, and simply wave his hands and say "Ah, no problem, I'm letting the transport layer (Tarzan, ANON, etc.) take care of that." If such a division of labor were possible, it would be analogous to using a Secure Socket Layer in an application, knowing only how to set up and tear down the protocol but nothing in particular about cryptography. One might even assume the worst case, that the server records every bit of information it ever receives for all time. The main events recorded would be of the form "At time T, the server received note P[i] for redemption and sent out note P[i+1] in return." So there would in fact (worst case) be a traceable chain P[1]-> ... ->P[n]. However, there would be no IP address information because of the anonymous transport layer. > The bank can tell that you have coin X > today, and that 20 iterations ago, that was coin Y. ... Yes, I see, the P[1]->...->P[n] chain. > But that isn't going > to give very much information about whether the coin is still in the > possession of the same person. ... Yes, but the 20 rounds of thrashing occur within a specific short time period, so that won't fool ANY spook worth his salt, right? Alice deposits a gold Maple at the bank and receives P[1]. The next day she thrashes P[1]-> ... -> P[20] in a period of one second. Four days later she spends P[20] with Bob's Kinky Sex Emporium. Bob swaps P[20] for P[21]. The next day he redeems P[21] for a gold Maple (ignoring fees of course). I guess the problem here is that the bank receiving and issuing gold Maples knows that P[1] belongs to Alice and P[21] belongs to Bob at Kinky. The time stamps on the chain of swaps P[1] ... P[20] look suspiciously like obscurity-thrashing, although the bank cannot be absolutely sure, of course. Instead, Alice might have spent P[1] for a gardening book at Amazon and some kinky employee there did the thrashing P[2] ... P[20]. Such a scheme might provide a certain level of plausible deniability, but I am not sure one could capitalize on it enough to build a solid system. It does sound a bit crufty compared to blinding, although the possibility of a more efficient implementation (storing unspent coins only for low disk usage and hyper-fast lookup) might compensate -- although there might be a cost in bandwidth, but that might be proportional to paranoia level and charged accordingly. The idea of implementing a relatively unsafe digital note protocol on top of an anonymous transport layer is appealing, but I am not sure such a division of labor is possible. Can anyone provide a bit of guidance on this point? I know Google is my friend, but this is a pretty subtle question and just a hint will suffice. The problem at the endpoints described above might be mitigated considerably if we had a world-wide network of gold kiosks providing bidirectional swapping of physical gold and digital notes -- a true e-hawala. Alice could don a ski mask and deposit a gold Maple in Jasper, Georgia, and five days later Bob at Kinky could don a ski mask and receive a gold Maple in Helsinki. There would be no "bank" where Alice or Bob would have to identify themselves. There's an ideal world scenario for you -- gold kiosks, cheap disposable smart card note purses, and wireless network everywhere. In an interesting twist, this would not in fact be a "cashless society," but an even more "cashful society" with one brand new feature: the ability to teleport fungible gold atoms from Jasper to Helsinki in a fraction of a second. The ultimate hawala, where oil-powered shipment of gold would only occasionally be necessary to balance out the kiosk inventories. Perhaps eventually the need for giant central stores of gold could be nearly eliminated. Gold would just be laying around in kiosks everywhere on the planet, just waiting for someone with the right bits (or tools :-) to pick it up. I'm sure many of you have discussed such starry-eyed visions at length, but please forgive this newbie for indulging a bit as this cappuccino-inspired vision possesses him. - -- Patrick http://fexl.com -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 iQA/AwUBPqv4x1A7g7bodUwLEQIMfQCgw3QwMINRZKzZdP+8ke6JjuLYAlUAoKBl fMuBMYvCkXdK+kZv1PT5Ki51 =Vxog -----END PGP SIGNATURE----- From Peter.Thoenen at email-tc3.5sigcmd.army.mil Sun Apr 27 05:04:46 2003 From: Peter.Thoenen at email-tc3.5sigcmd.army.mil (Thoenen, Peter SPRINT CIV) Date: Sun, 27 Apr 2003 14:04:46 +0200 Subject: The Freest Country? Message-ID: <5518B8B85E8DD511BE7300306E05879B016B7F8C@TFETUZEX6> Actually, the US tax issue doesn't care where you live / work / reside / domicile, that's the problem. The US is one of the FEW countries that taxes it citizens regardless of where you live in the world and / or if you are additional paying taxes to foreign governments (since you live / work there). Only bonus you get living outside the US is the first $80K USD is tax-free (federal and state, not FICA (which is paid at 15% since you count as self-employed for tax purposes regardless if you work for a foreign company)). The US looks at it as a kind of future benefits tax. You have NOT given up your US citizenship so obviously one day you do plan to return and live in the US (regardless of truth or not). The taxes you pay while you are not here will support the federal benefits and infrastructure you receive when you do one day decide to return to the US and live. While one could argue you could not report / misreport the monies you made while working / living in a foreign country, that is tax evasion and something the feds don't take kindly to (especially if you bring yourself back to the states to live / visit). Its not as if you can keep it under the table either, your entry / exit records at the US border are kept file. Kind of suspicious not making *ANY* money in the years you lived overseas, raises an eyebrow or two with the IRS. Additional, you are not authorized to declare you have no intention to ever returning to the US live (some states allow you to declare this is writing making you exempt from ALL state taxes). Your options are: 1. Keep US citizenship, pay FICA (and taxes +$80K USD) 2. Keep US citizenship, misreport taxes, risk tax evasion. 3. Pay US taxes until you establish residency in another nation. Official surrender your US citizenship. 4. Immediately surrender your US citizenship (before gaining residency in another nation). You official become a 'stateless person (UN)'. Risky boat to be in. While 3 looks to be the best choice, nice things about being a citizen of the sole superpower is: 1. Can always go back to the US, its relatively stable. 2. US State Dept. honestly does care and try to help US citizens living in foreign countries (even today). 3. US Passport is a gateway to anywhere, very very few visa requirements. Nice thing to have. So for us who never plan to return to the US it comes down to money, just how much is our US Citizenship worth to us. Is that passport / legal status worth the yearly fee required. Its a question we all must ask ourselves. -Peter DISCLAIMER: This message in no way reflects upon the official opinions / policies of the US Army or Sprint. The opinion expressed above is the sole responsibility of the sender. > -----Original Message----- > From: Bill Stewart [mailto:bill.stewart at pobox.com] > Sent: Sunday, April 27, 2003 09:05 > To: cypherpunks at lne.com > Subject: Re: The Freest Country? > > > At 09:18 PM 04/26/2003 -0700, Tim May wrote: > >[This space reserved for insertion of usual silliness about > >living out of suitcase, stuffed or not, and being a > "perpetual tourist," > >which only works if one is below a certain net worth and if > >one likes to travel a lot.] > > There are different kinds of perpetual tourism, some of which involve > less travelling than others. I have friends who are believed by the > Netherlands bureaucrats to be spending their time in Belgium, > and by the Belgian bureaucrats to be over in the Netherlands. > > I think the apartment in the Netherlands is probably > different than their > official when-we're-not-outside-the-country address, > and that their Belgian address is a mailbox, but I could have > that backwards, > and at least one of their addresses is probably owned by a > corporation, > and their net worth is probably in Switzerland or some such location, > but while their net worth is fine, I think they're probably retired > or at most "consulting" rather than doing full-time work. > On the other hand, one nice thing about that area is that if they > _do_ need to be out of the country, it's an hour or two across an > unguarded border. > > I don't know if it's as easy to confuse the US and Canada about > which country you're living in, and while the borders are permeable, > they're a lot more thoroughly audited than they used to be, > so maybe you need to spend more time on the ferryboat to Vancouver > instead of driving or flying commercially. From ashwood at msn.com Sun Apr 27 15:05:01 2003 From: ashwood at msn.com (Joseph Ashwood) Date: Sun, 27 Apr 2003 15:05:01 -0700 Subject: How convenient... References: <20030427112844.GH25990@dreams.soze.net> Message-ID: <00a701c30d09$1728ea50$6701a8c0@JOSEPHAS> ----- Original Message ----- From: "Justin" Subject: Re: How convenient... > At 2003-04-27 01:34 +0000, J.A. Terranson wrote: > > > http://www.cnn.com/2003/WORLD/meast/04/26/sprj.irq.britain.iraq.ap/index.html > > > > Report: Iraq-al Qaeda link found > > I assume this means that nobody cares any longer about finding WoMD? Indeed it is appearing more so, I found a link to this on CNN.com's front page http://www.cnn.com/2003/WORLD/meast/04/27/nyt.nyt.friedman/index.html . First non-bolded sentence "As far as I'm concerned, we do not need to find any weapons of mass destruction to justify this war." It's becoming clear that many people in the US simply wanted to beat someone up. The justification for this war simply hasn't materialized and now at least one reporter has clearly stated that it doesn't matter. Joe Trust Laboratories Changing Software Development http://www.trustlaboratories.com From bill.stewart at pobox.com Sun Apr 27 17:39:11 2003 From: bill.stewart at pobox.com (Bill Stewart) Date: Sun, 27 Apr 2003 17:39:11 -0700 Subject: How convenient... In-Reply-To: <00a701c30d09$1728ea50$6701a8c0@JOSEPHAS> References: <20030427112844.GH25990@dreams.soze.net> Message-ID: <5.1.1.6.2.20030427170831.02d67c70@idiom.com> At 03:05 PM 04/27/2003 -0700, Joseph Ashwood wrote: >----- Original Message ----- >From: "Justin" >Subject: Re: How convenient... > > At 2003-04-27 01:34 +0000, J.A. Terranson wrote: >http://www.cnn.com/2003/WORLD/meast/04/26/sprj.irq.britain.iraq.ap/index.html > > > Report: Iraq-al Qaeda link found Before the US and COWs attacked, either - they had evidence that they couldn't show us because it would endanger our spies in Iraq, but they can show us now, or - they had evidence that they couldn't show us because it would endanger our spies with Al Qaeda, and they still can't show us, or - they had evidence that they couldn't show us because it would embarrass them because of whoever they got it from, or - they were lying from the beginning. I'm skeptical about any of those cases except the last... but I doubt there'll be any forensic work done to find out whether it was authentic or planted by the US Army, CIA, MI5, Mossad, or AlQaeda. > > I assume this means that nobody cares any longer about finding WoMD? If they had evidence, they should have given it to Hans Blix to help him find them, unless they were lying from the beginning there too. (Actually, I'm rather surprised they haven't officially found them yet, because the US did give Saddam quite a lot of that stuff when he was their buddy, but perhaps the wrong people in Iraq have it...) Besides, the fact that we can't find them just shows that those clever bastards destroyed them to hide the evidence or those clever bastards used them all up causing mass destruction or those clever bastards gave them all to Osama so we can't find them or oh, whatever, they're obviously Evil(tm) so it was necessary to attack them. >Indeed it is appearing more so, I found a link to this on CNN.com's front >page http://www.cnn.com/2003/WORLD/meast/04/27/nyt.nyt.friedman/index.html . >First non-bolded sentence "As far as I'm concerned, we do not need to find >any weapons of mass destruction to justify this war." It's becoming clear >that many people in the US simply wanted to beat someone up. The >justification for this war simply hasn't materialized and now at least one >reporter has clearly stated that it doesn't matter. Columnist Friedman believes that we've stopped an evil dictatorship from torturing its subjects, which he thinks justifies the war, but he's worried that the Bush administration will use this to cause more trouble : "it feels as if some people want to use this war to create a multiparty democracy in Iraq and a one-party state in America." By contrast, Fox News is much more Fair and Balanced about it, showing all sides "WE kicked their asses, nyahh, nyahh, Syria's Next!" "Other experts believe North Korea's Next" "IraN" "No, Syria!" "No, Korea" "Tastes Great" "Less Filling!" From measl at mfn.org Sun Apr 27 15:43:38 2003 From: measl at mfn.org (J.A. Terranson) Date: Sun, 27 Apr 2003 17:43:38 -0500 (CDT) Subject: How convenient... In-Reply-To: <00a701c30d09$1728ea50$6701a8c0@JOSEPHAS> Message-ID: On Sun, 27 Apr 2003, Joseph Ashwood wrote: > http://www.cnn.com/2003/WORLD/meast/04/26/sprj.irq.britain.iraq.ap/index.html > First non-bolded sentence "As far as I'm concerned, we do not need to find > any weapons of mass destruction to justify this war." A whisper of honesty... He'll pay dearly for that, I'm sure. -- Yours, J.A. Terranson sysadmin at mfn.org From camera_lumina at hotmail.com Sun Apr 27 15:30:15 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sun, 27 Apr 2003 18:30:15 -0400 Subject: How convenient... Message-ID: if Iraq did in fact destroy all WMD, as he stated he did, and as we are now beginning to acknowledge, how do we "justify" [read: "make legal"] our recent BoyzWithToyz party?" ANd don't forget that whole loadacrap about their WMDs being destroyed "hours before the arrival of UN inspectors". Guess they took all that sarin gas and flushed it down the toilet, huh.... In the end I think it's clear that they really didn't feel they needed to work too hard to create credible lies. -TD >From: "J.A. Terranson" >To: cypherpunks at ssz.com >Subject: How convenient... >Date: Sun, 27 Apr 2003 09:44:44 -0500 (CDT) > >On Sun, 27 Apr 2003, Justin wrote: > > > I assume this means that nobody cares any longer about finding WoMD? > >I have seen several different wire stories in the last few days where >Shrub's >Thugs stated that "WMD may have been destroyed before the start of the >war". I find it amazing that nobody in the press has stopped to ask the >obvious questions, for instance, if all WMD were destroyed before the war >(as >Iraq stated), then (a) How is it that the US continually asserted that it >knew for FACT that these weapons existed, and even claimed to KNOW the >exact >locations (but "wouldn't tell" Blix), and (b) if Iraq did in fact destroy >all >WMD, as he stated he did, and as we are now beginning to acknowledge, how >do >we "justify" [read: "make legal"] our recent BoyzWithToyz party? > >-- >Yours, >J.A. Terranson >sysadmin at mfn.org _________________________________________________________________ MSN 8 with e-mail virus protection service: 2 months FREE* http://join.msn.com/?page=features/virus From ravage at einstein.ssz.com Sun Apr 27 16:44:09 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sun, 27 Apr 2003 18:44:09 -0500 (CDT) Subject: Quarantines may be justified In-Reply-To: <20030420140315.GA24668@cybershamanix.com> Message-ID: On Sun, 20 Apr 2003, Harmon Seaver wrote: > So the native americans here before 1492 weren't free? In the sense you're using it? No. In general they were members of a society that was driven by religion and strict requirements on behaviour and cast membership. > They did, of course, have private property In general, no they didn't. -- whatever they could carry with them -- but the > land was held in common. The idea that individuals could "own" land was not > known to them. The people in general were help in common ownership, the ownership of the ruling class. If you think some Aztec could just pack up and walk off you are completely uneducated in the ways of those societies. > You're right, and it's really too bad the indigs here didn't realize soon > enough that they needed to kill each and everyone of those euros who landed > here and thought they could "own" land. Another example of your ignorance. For example the word 'teo' was used for 'God' by both parties. In addition the Amerindians had cultural beliefs that led them to believe that the whites were from their God. You don't kill the messanger of ones own god. > People can smoke in public if they wear some sort of helmet which contains > all the smoke, otherwise they are using force to invade my body and I should > have the right to kill them for it. You certainly have a right to prohibit them from smoking in public places and in -your- private places. Outside of that it isn't any of your business. As to killing them, that's just specious. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From cpunk at lne.com Sun Apr 27 20:00:00 2003 From: cpunk at lne.com (cpunk at lne.com) Date: Sun, 27 Apr 2003 20:00:00 -0700 Subject: Cypherpunks List Info Message-ID: <200304280300.h3S300q9031453@gw.lne.com> Cypherpunks Mailing List Information Last updated: Sep 12, 2002 This message is also available at http://www.lne.com/cpunk Instructions on unsubscribing from the list can be found below. 0. Introduction The Cypherpunks mailing list is a mailing list for discussing cryptography and its effect on society. It is not a moderated list (but see exceptions below) and the list operators are not responsible for the list content. Cypherpunks is a distributed mailing list. A subscriber can subscribe to one node of the list and thereby participate on the full list. Each node (called a "Cypherpunks Distributed Remailer", although they are not related to anonymous remailers) exchanges messages with the other nodes in addition to sending messages to its subscribers. A message posted to one node will be received by the list subscribers on the other nodes, and vice-versa. 1. Filtering The various CDRs follow different policies on filtering spam and to a lesser extent on modifying messages that go to/from their subscribers. Filtering is done, on nodes that do it, to reduce the huge amount of spam that the cypherpunks list is subjected to. There are three basic flavors of filtering CDRs: "raw", which send all messages to their subscribers. "cooked" CDRs try to eliminate the spam on that's on the regular list by automatically sending only messages that are from cypherpunks list subscribers (on any CDR) or people who are replying to list messages. Finally there are moderated lists, where a human moderator decides which messages from the raw list to pass on to subscribers. 2. Message Modification Message modification policy indicates what modifications, if any, beyond what is needed to operate the CDR are done (most CDRs add a tracking X-loop header on mail posted to their subscribers to prevent mail loops). Message modification usually happens on mail going in or out to each CDR's subscribers. CDRs should not modify mail that they pass from one CDR to the next, but some of them do, and others undo those modifications. 3. Privacy Privacy policy indicates if the list will allow anyone ("open"), or only list members, or no one ("private") , to retrieve the subscribers list. Note that if you post, being on a "private" list doesn't mean much, since your address is now out there. It's really only useful for keeping spammers from harvesting addresses from the list software. Digest mode indicates that the CDR supports digest mode, which is where the posts are batched up into a few large emails. Nodes that support only digest mode are noted. 4. Anonymous posting Cypherpunks encourages anonymous posting. You can use an anonymous remailer: http://www.andrebacard.com/remail.html http://anon.efga.org/Remailers http://www.gilc.org/speech/anonymous/remailer.html or you can send posts to the list via cpunks_anon at einstein.ssz.com and your mail's headers will be stripped before posting. Note that this doesn't provide complete anonymity since the receiving site will still have log file entries showing the source of the mail (or you have to trust that they delete them). You also will be 'sharing' a reputation with the other entities that post through this alias, and some of them are spammers, so some subscribers will have this alias filtered. 5. Unsubscribing Unsubscribing from the cypherpunks list: Since the list is run from a number of different CDRs, you have to figure out which CDR you are subscribed to. If you don't remember and can't figure it out from the mail headers (hint: the top Received: line should tell you), the easiest way to unsubscribe is to send unsubscribe messages to all the CDRs listed below. How to figure out which CDR you are subscribed to: Get your mail client to show all the headers (Microsoft calls this "internet headers"). Look for the Sender or X-loop headers. The Sender will say something like "Sender: owner-cypherpunks at lne.com". The X-loop line will say something like "X-Loop: cypherpunks at lne.com". Both of these inticate that you are subscribed to the lne.com CDR. If you were subscribed to the algebra CDR, they would have algebra.com in them. Once you have figured out which CDR you're subscribed to, look in the table below to find that CDRs unsubscribe instructions. 6. Lunatics, spammers and nut-cases "I'm subscribed to a filtering CDR yet I still see lots of junk postings". At this writing there are a few sociopaths on the cypherpunks list who are abusing the lists openness by dumping reams of propaganda on the list. The distinction between a spammer and a subscriber is nearly always very clear, but the dictinction between a subscriber who is abusing the list by posting reams of propaganda and a subscriber who is making lots of controversial posts is not clear. Therefore, we tolerate the crap. Subscribers with a low crap tolerance should check out mail filters. Procmail is a good one, although it works on Unix and Unix-like systems only. Eudora also has a capacity for filtering mail, as do many other mail readers. An example procmail recipie is below, you will of course want to make your own decisions on which (ab)users to filter. # mailing lists: # filter all cypherpunks mail into its own cypherspool folder, discarding # mail from loons. All CDRs set their From: line to 'owner-cypherpunks'. # /dev/null is unix for the trash can. :0 * ^From.*owner-cypherpunks at .* { :0: * (^From:.*ravage at ssz\.com.*|\ ^From:.*jchoate at dev.tivoli.com.*|\ ^From:.*mattd at useoz.com|\ ^From:.*proffr11 at bigpond.com|\ ^From:.*jei at cc.hut.fi) /dev/null :0: cypherspool } 7. List of current CDRs All commands are sent in the body of mail unless otherwise noted. --------------------------------------------------------------------------- Algebra: Operator: Subscription: "subscribe cypherpunks" to majordomo at algebra.com Unsubscription: "unsubscribe cypherpunks" to majordomo at algebra.com Help: "help cypherpunks" to majordomo at algebra.com Posting address: cypherpunks at algebra.com Filtering policy: raw Message Modification policy: no modification Privacy policy: ??? Info: ??? --------------------------------------------------------------------------- CCC: Operator: drt at un.bewaff.net Subscription: "subscribe [password of your choice]" to cypherpunks-request at koeln.ccc.de Unsubscription: "unsubscribe " to cypherpunks-request at koeln.ccc.de Help: "help" to to cypherpunks-request at koeln.ccc.de Web site: http://koeln.ccc.de/mailman/listinfo/cypherpunks Posting address: cypherpunks at koeln.ccc.de Filtering policy: This specific node drops messages bigger than 32k and every message with more than 17 recipients or just a line containing "subscribe" or "unsubscribe" in the subject. Digest mode: this node is digest-only NNTP: news://koeln.ccc.de/cbone.ml.cypherpunks Message Modification policy: no modification Privacy policy: ??? --------------------------------------------------------------------------- Infonex: Subscription: "subscribe cypherpunks" to majordomo at infonex.com Unsubscription: "unsubscribe cypherpunks" to majordomo at infonex.com Help: "help cypherpunks" to majordomo at infonex.com Posting address: cypherpunks at infonex.com Filtering policy: raw Message Modification policy: no modification Privacy policy: ??? --------------------------------------------------------------------------- Lne: Subscription: "subscribe cypherpunks" to majordomo at lne.com Unsubscription: "unsubscribe cypherpunks" to majordomo at lne.com Help: "help cypherpunks" to majordomo at lne.com Posting address: cypherpunks at lne.com Filtering policy: cooked Posts from all CDR subscribers & replies to threads go to lne CDR subscribers. All posts from other CDRs are forwarded to other CDRs unmodified. Message Modification policy: 1. messages are demimed (MIME attachments removed) when posted through lne or received by lne CDR subscribers 2. leading "CDR:" in subject line removed 3. "Reply-to:" removed Privacy policy: private Info: http://www.lne.com/cpunk; "info cypherpunks" to majordomo at lne.com Archive: http://archives.abditum.com/cypherpunks/index.html (thanks to Steve Furlong and Len Sassaman) --------------------------------------------------------------------------- Minder: Subscription: "subscribe cypherpunks" to majordomo at minder.net Unsubscription: "unsubscribe cypherpunks" to majordomo at minder.net Help: "help" to majordomo at minder.net Posting address: cypherpunks at minder.net Filtering policy: raw Message Modification policy: no modification Privacy policy: private Info: send mail to cypherpunks-info at minder.net --------------------------------------------------------------------------- Openpgp: [openpgp seems to have dropped off the end of the world-- it doesn't return anything from sending help queries. Ericm, 8/7/01] Subscription: "subscribe cypherpunks" to listproc at openpgp.net Unsubscription: "unsubscribe cypherpunks" to listproc at openpgp.net Help: "help" to listproc at openpgp.net Posting address: cypherpunks at openpgp.net Filtering policy: raw Message Modification policy: no modification Privacy policy: ??? --------------------------------------------------------------------------- Ssz: Subscription: "subscribe cypherpunks" to majordomo at ssz.com Unsubscription: "unsubscribe cypherpunks" to majordomo at ssz.com Help: "help cypherpunks" to majordomo at ssz.com Posting address: cypherpunks at ssz.com Filtering policy: raw Message Modification policy: Subject line prepended with "CDR:" Reply-to cypherpunks at ssz.com added. Privacy policy: open Info: http://www.ssz.com/cdr/ --------------------------------------------------------------------------- Sunder: Subscription: "subscribe" to sunder at sunder.net Unsubscription: "unsubscribe" to sunder at sunder.net Help: "help" to sunder at sunder.net Posting address: sunder at sunder.net Filtering policy: moderated Message Modification policy: ??? Privacy policy: ??? Info: ??? --------------------------------------------------------------------------- Pro-ns: Subscription: "subscribe cypherpunks" to majordomo at pro-ns.net Unsubscription: "unsubscribe cypherpunks" to majordomo at pro-ns.net Help: "help cypherpunks" to majordomo at pro-ns.net Posting address: cypherpunks at pro-ns.net Filtering policy: cooked Posts from all CDR subscribers & replies to threads go to local CDR subscribers. All posts from other CDRs are forwarded to other CDRs unmodified. Message Modification policy: 1. leading "CDR:" in subject line removed 2. "Reply-to:" removed Privacy policy: private Info: http://www.pro-ns.net/cpunk From eresrch at eskimo.com Sun Apr 27 20:01:05 2003 From: eresrch at eskimo.com (Mike Rosing) Date: Sun, 27 Apr 2003 20:01:05 -0700 (PDT) Subject: How convenient... In-Reply-To: Message-ID: On Mon, 28 Apr 2003, Thomas Shaddack wrote: > > On Sat, 26 Apr 2003, J.A. Terranson wrote: > > LONDON (AP) -- Documents discovered in the bombed out headquarters of Iraq's > > intelligence service provide evidence of a direct link between Saddam > > Hussein's regime and Osama bin Laden's al Qaeda terrorist network, a > > newspaper reported Sunday. My bet the purpose of the looting was to allow the planting of all kids of "documents" like this. If they were in a hurry to destroy documents, fire would have worked pretty damn well, not white out. > Before The Revolution (the so-far-last one), my country actively trained > the "foreign freedom fighters", later relabeled as "terrorists". We gave > them training, we borrowed them our experts. > > As no Tomahawk ever flew over Prague, I can only assert that US government > is a bunch of hypocrites. Some of the most dangerous hypocrites on the planet. But we'll see if this is similar to the Russian invasion in '68 (they just took cz) or the German invasion of Poland in '39. In any case, those empires collapsed, so there's hope the American empire will collapse too. The Berlin wall didn't come down 'till '89 tho, so it could be a while yet before the US grinds to a halt. Patience, persistence, truth, Dr. mike From ravage at einstein.ssz.com Sun Apr 27 18:07:06 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sun, 27 Apr 2003 20:07:06 -0500 (CDT) Subject: Quarantines may be justified In-Reply-To: <5.1.1.6.2.20030421102421.02c72ab8@idiom.com> Message-ID: On Mon, 21 Apr 2003, Bill Stewart wrote: > At 09:41 PM 04/20/2003 -0500, Jim wrote: > >The connection between 'private freedom' and 'property' is really a > >strawman. What matters is life, liberty, and the -pursuit of hapiness- > >and not collecting more 'stuff' than your neighbor. If anything it > >demonstrates an exception lack of maturity and excessive insecurity. > > It's a difficult problem Not at all. > - claiming that land is your private property implies a willingness to > initiate force to enforce your rights, It does no such thing (unless of course you have a psychological disposition to the use of force). > which is different for something like land that you didn't create > than for objects that you did create. Created from what? To create something implies you had something to start with. Specious point. > But if you can't collect "stuff", you can't insure yourself against > starving to death in the short term or the more distant future, It does no such thing. In fact the more stuff you collect the bigger target you become and a larger percentage of your stuff is needed to protect your stuff. Not to mention that at some point the amount of stuff you collect deprives others of stuff they need to survive (or do you believe you're the only one who as that 'right'? - probably). The reality is that this viewpoint is a self-defeating view. It may work in the very short term but in the long run there is no way this will solve anything. > If you live in a society that guarantees liberty and the pursuit of > happiness, What society does that? Not even ours guarantees this. It does recognise that our creator gave us rights and that we create governments to -secure- (not guarantee) them. The only relevant question is secure them from whom? > you still need to plan for your old age, and you do that by collecting stuff, > or by collecting friends and kids who will care for you. Really, those are the only two options? Somehow I suspect that says more about you than the world out 'there'. > Societies that don't let you collect stuff are forcing you to > depend on them for your food and housing - not much liberty there. Really? Why? There are more than one definitions of liberty. The concept you're completely missing in this line of argument is 'consent'. > People who are especially good at acquiring and managing stuff can > retire at 35 (:-), Can they? Or do they spend the rest of their life trying to keep it? The reality is that a lot of the stuff that you think is 'yours' is only becuase it isn't worth anybody elses trouble to take it from you. And then one has to ask if that person who is especially good at collecting stuff didn't do it at the expense of others. > And farmers can never retire, except by having their kids do the work, > unless they're in high-value crops like dope that let them acquire lots of > stuff... What is this 'retire' you keep talking about, you retiring from life or employment by others? Not the same thing. Stuff might help you in the latter case, it's worthless in the former. And the value and utility of all that stuff rests on one thing, the stability of the system you used to collect it. If that changes all that stuff may in fact become worthless. So, at least to some degree to protect your stuff you deprive others of their opportunity to change the society they are in to the way they feel most comfortable with. So, to 'guarantee' your 'stuff' you -must- deprive others of an opportunity to collect their stuff. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Sun Apr 27 18:09:33 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sun, 27 Apr 2003 20:09:33 -0500 (CDT) Subject: Quarantines may be justified In-Reply-To: Message-ID: On Mon, 21 Apr 2003, Bill Frantz wrote: > Now for the questions: > > Who owned the land? The lords? The peasants? Someone else? > > What does it mean to own land? > > Are land owners justified in evicting people who have lived on, and worked > the land for generations? Excellent questions! One you missed is 'What does it mean to 'own'?'. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Sun Apr 27 19:13:29 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sun, 27 Apr 2003 21:13:29 -0500 (CDT) Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: Message-ID: On Mon, 21 Apr 2003, Tim May wrote: > First, Bob should cut back on his massive cross-posting to his several > self-centered groups (including new ones to me: "Philodex Clips" and > "dgcchat"). > > Second, those from other lists who give their hero his "props" (a negro > term now being used by many negro wannabees) should do so on lists > other than Cypherpunks. > > Third, I wonder when Bob will stop proliferating "digibucks" and > "bearer settlement" and "e$" and "Philodex Clips" and all of his other > lists and instead actually _work on_ his "fractally geodesic > multi-centered emergent global clearing" b.s. Unless his real career > is, as many suspect, just endless self-promotion using the latest > snake oil buzzwords. Jealous? -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Sun Apr 27 19:14:09 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sun, 27 Apr 2003 21:14:09 -0500 (CDT) Subject: [eff-austin] [Fwd: Action Alert : Say No To Government Video Surveillance] (fwd) Message-ID: ---------- Forwarded message ---------- Date: Mon, 21 Apr 2003 20:00:45 -0500 From: Adina Levin To: eff-austin at effaustin.org Subject: [eff-austin] [Fwd: Action Alert : Say No To Government Video Surveillance] -------- Original Message -------- Subject: Action Alert : Say No To Government Video Surveillance Date: Mon, 21 Apr 2003 16:46:57 -0700 From: ACLU of Texas To: List Member ACLU of Texas Legislative Action Alert * /Oppose HB 901/* / *Say No To Total Government Video Surveillance*/ April 21, 2003 Dear ACLU supporter, I need your help today to oppose a bill in the Texas Legislature that's poised to be voted on in the Texas House of Representatives this week. HB 901 authorizes up to 20,000 linked government digital surveillance cameras to spy on Texans as we move about in public throughout the state. The bill's supporters justify this expansive surveillance system by the need to limit cars running red lights. But once in place, the system could be used for any security purpose. In Tiananmen Square during the pro-democracy uprising in 1989, cameras originally installed to regulate traffic were used to identify individual protesters for retribution b hundreds received imprisonment or worse because they were identified from the surveillance cameras hanging from traffic signals. *I need you to call your State Representative in the Texas House of Representatives today!* Let them know you oppose HB 901 installing cameras at intersections for traffic enforcement. Ibve provided some background information below my signature that will help you prepare to make your call. *If you donbt know who represents you in the Legislature, use the search engine on the Texas capitol web site to quickly figure it out at http://www.capitol.state.tx.us/fyi/fyi.htm. * Please make the call. This is really important b once theybre in place, surveillance cameras powerful enough to distinguish a license plate number can conceivably be used for any purpose, both aboveboard and nefarious. Itbs important to stop this bad idea now before the cameras are in place and they become a lot more difficult to regulate. These are trying times, and itbs important that those of us who care about liberty and freedom continue speak out. Thanks for calling your State Representative as soon as possible, and thank you for your support for civil liberties in Texas. Sincerely, Will Harrell Executive Director ACLU of Texas Donbt be surprised if the person who answers the phone asks a question or two about the bill. Herebs some background to read before you make your phone call: * * *Current Law:* Traffic tickets are issued in person by law enforcement officers. *Privacy: One Nation Under Surveillance* Developments in digital video, infrared, x-ray, wireless, GPS, biometrics, image scanning, voice recognition, DNA, and brain wave fingerprinting provide government with new ways to "search" individuals and collect vast databases of information on law-abiding Texans. The proliferation of government and private databases with our personal information in it is a real cause for concern. *Big Brother is possible today*. Personal information about Texans that is captured by our government is typically sold and frequently ends up on television or the internet. *Government already sells embarrassing personal scenes* involving Texans to TV shows like bCopsb. Government can use digital cameras to enforce criminal laws against Texans. Texas Attorney General John Cornyn (Opinion JC-0460) held that government can use surveillance cameras to enforce criminal laws against Texans. This practice has been banned in the European union to limit privacy abuses by law enforcement. After these 20,000 cameras are installed, government can arrest individual Texans for any criminal violations committed in public, including failure-to-wear-a-seatbelt and jay-walking. The sponsor of the bill hasnbt even considered all the consequences. Asked whether there will be a privacy problem when rental car companies must provide all of our private rental information to the government, Representative Phil King (R-Weatherford) replied: *bI hadnbt thought about it from that standpoint.b* * * * * *Due Process: No Actual Notice Required . . . Car Impounded* * B7*The proposed citations will not punish the driver -- a citation will be mailed to the owner of the car no matter who was driving. HB901 will have little or no effect on commercial drivers, teenage drivers, car thieves, and other non-owner drivers. There is *no requirement that the owner actually receive notice* of any violation. Nonetheless, the punishment for repeated failure to respond is *the government can impound your vehicle.* * * * * *Government Abuse: Yes, Even In Texas* Even the very best governments are burdened by some abuse. In this case, the potential for abuse will increase with the surveillance powers b exponentially. In Washington DC police were caught using police surveillance databases to gather information on certain paramours the then blackmailing citizens who were married. In Detroit police used their police surveillance databases to help their friends or themselves stalk women, threaten motorists, and track estranged spouses. *Ineffective: No Heinous Deaths Prevented By Mailed Citation* The proposed camera system will not fulfill its purported function. The camera system is being proposed to decrease the number of traffic fatalities caused by drivers who run red lights. Drivers who commit the senseless and irrational act of driving so fast and late through a red light that they can cause a fatality or serious wreck will not be stopped by the notion that the owner of the vehicle might later have to pay a small civil fine. Such a heinous act is so perilous and life-endangering that it defies reason. Unfortunately, HB901 will have no effect on this type of irrational crime. *Say NO to Total Government Video Surveillance* Please do not redistribute after April 30th, 2003 Visit our website for updates ------------------------------------------------------------------------ ACLU of Texas PO Box 3629 Austin,TX 78764-3629 Phone:(512) 478-7309 Web site: http://www.aclutx.org E-mail: info at aclutx.org ------------------------------------------------------------------------ Powered by List Builder Click here to change or remove your subscription From ravage at einstein.ssz.com Sun Apr 27 20:05:19 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sun, 27 Apr 2003 22:05:19 -0500 (CDT) Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: Message-ID: On Tue, 22 Apr 2003, R. A. Hettinga wrote: > Since the nation-state is caused by physics, Bullshit. Nation states are a consequence of psychology. To look at it any other way is nothing more than saying 'It's not my fault, nature made me do it." How silly. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Sun Apr 27 20:07:26 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Sun, 27 Apr 2003 22:07:26 -0500 (CDT) Subject: Three Cheers for the State - RAH RAH RAH In-Reply-To: Message-ID: On Tue, 22 Apr 2003, Tyler Durden wrote: > RAH wrote... > > "as the net does to centralized > information, the surfacting of markets for force into recursively smaller > and smaller market actors,..." > > Ah. I was wondering when a reference to "fractals" would be made. Actually there's no 'fractal' there since the recursion is integer not fractional. Fractal means 'fractal dimension' as in non-integer. The recursion part is not sufficient in and of itself. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From hseaver at cybershamanix.com Sun Apr 27 21:20:40 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Sun, 27 Apr 2003 23:20:40 -0500 Subject: How convenient... In-Reply-To: References: Message-ID: <20030428042040.GA28652@cybershamanix.com> On Sun, Apr 27, 2003 at 08:01:05PM -0700, Mike Rosing wrote: > On Mon, 28 Apr 2003, Thomas Shaddack wrote: > > > > > On Sat, 26 Apr 2003, J.A. Terranson wrote: > > > LONDON (AP) -- Documents discovered in the bombed out headquarters of Iraq's > > > intelligence service provide evidence of a direct link between Saddam > > > Hussein's regime and Osama bin Laden's al Qaeda terrorist network, a > > > newspaper reported Sunday. > > My bet the purpose of the looting was to allow the planting of all kids > of "documents" like this. If they were in a hurry to destroy documents, > fire would have worked pretty damn well, not white out. It's hard to believe that anyone with half a brain would be taken in by these "finds" -- there's absolutely no shred of a chain of evidence. Any "reporter" could have some Arabic writer cobble together any sort of document which they'd then claim to have "found" in the files. Or a "looter" planting it, as you say. And for that matter, why would the supposed authorites be allowing anyone at all to go rummaging thru the Iraqi files? There's no possible way the CIA or anyone else could have thoroughly looked them over since the fighting stopped, and you'd think they'd certainly want to. Why would they think anyone at all would believe this stuff? Of course, look at what they tried to pass off to the Security Council as "evidence." -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From shaddack at ns.arachne.cz Sun Apr 27 17:51:18 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Mon, 28 Apr 2003 02:51:18 +0200 (CEST) Subject: How convenient... In-Reply-To: Message-ID: On Sat, 26 Apr 2003, J.A. Terranson wrote: > LONDON (AP) -- Documents discovered in the bombed out headquarters of Iraq's > intelligence service provide evidence of a direct link between Saddam > Hussein's regime and Osama bin Laden's al Qaeda terrorist network, a > newspaper reported Sunday. Before The Revolution (the so-far-last one), my country actively trained the "foreign freedom fighters", later relabeled as "terrorists". We gave them training, we borrowed them our experts. As no Tomahawk ever flew over Prague, I can only assert that US government is a bunch of hypocrites. From shaddack at ns.arachne.cz Sun Apr 27 18:03:11 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Mon, 28 Apr 2003 03:03:11 +0200 (CEST) Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: Message-ID: On Sat, 26 Apr 2003, Tim May wrote: > But of course people aren't going to learn new human languages for such > an ephemeral and mostly useless reason as to hide their textual clues. Hence my specification for compatibility with English (so anyone who would speak English would understand the text - my proposal is de facto drastically simplified English), and the requirement for machine translator to Anonglish from English (so the bulk of the work would be done by the machine). If you want something to be actually used, it has to be simple. > It's doubtful that K. would have had any interest in trying to write > in some synthetic language, stripped of various stylistic choices and > options. > > Or that we would want to. Not for "normal" communication. However, special cases where long-time protection of the nym has to be achieved, and the user has other nyms that could lead to the discovery of his True Name, would require this approach. From jamesd at echeque.com Mon Apr 28 07:43:33 2003 From: jamesd at echeque.com (James A. Donald) Date: Mon, 28 Apr 2003 07:43:33 -0700 Subject: How convenient... In-Reply-To: <20030427112844.GH25990@dreams.soze.net> References: Message-ID: <3EACDBA5.13836.919529F@localhost> -- > > The newspaper said the documents reveal that Paris shared > > with Baghdad the contents of private transatlantic meetings > > and diplomatic traffic from Washington. On 27 Apr 2003 at 11:28, Justin wrote: > So does this mean we're going to skip over Damascus but > continue west to Paris? We've liberated it before from > foreign occupiers. I guess we now need to liberate it from > itself. I wonder, would a liberated France be more resistant > to a U.S.-organized constitutional convention than Iraq looks > like it will be? Probably not. Remember how happy the french were to suck the germans.' --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG wd3/s5fXURevUiJmVA8aoy/jULjPhvyKbC5GnFy/ 45zPntFM4iiwC0eTgKWV/K1Hw6xCD/Khz2lNfZZnt From jamesd at echeque.com Mon Apr 28 07:43:34 2003 From: jamesd at echeque.com (James A. Donald) Date: Mon, 28 Apr 2003 07:43:34 -0700 Subject: Making Money in Digital Money In-Reply-To: <04F0A904-7876-11D7-865D-000A956B4C74@got.net> References: <3EAAF9C6.9787.1BF0228@localhost> Message-ID: <3EACDBA6.7938.91953B7@localhost> -- James A. Donald: > > Child porn and bestiality are, like MP3s, a micropayment > > market. My hard drive keeps getting usenet child porn on > > it even though I try to prevent it. On 26 Apr 2003 at 23:03, Tim May wrote: > Nonsense. What you are receiving for free is either tame > stuff or is just a "free sample," for marketing purposes. > Look at the reports on monies spent on actual busted child > porn rings: these consumers are spending real money, not > getting their stuff for free as spam. Well the email spam is fairly tame -- no actual penetration of children. Such penetration is implied but not shown. Models twelve or older. The usenet spam on the other hand is fairly dramatic, in one case the child, apparent age ten or so, appeared to be penetrated in a fashion that would probably cause serious injury, (one hopes someone was creative with special effects) --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG JzhRinB9W/eaP9JgCCz/ljHRnHqLJgX/NDUOpIno 4ChvSd9I4/JRVmzPgGLTlOtoSjEBp1/kpLMRf43fv From declan at well.com Mon Apr 28 06:28:16 2003 From: declan at well.com (Declan McCullagh) Date: Mon, 28 Apr 2003 09:28:16 -0400 Subject: Thanks for the living hell, and question about OpenSSL In-Reply-To: <200304261841.h3QIf2r0025389@artifact.psychedelic.net>; from emc@artifact.psychedelic.net on Sat, Apr 26, 2003 at 11:41:02AM -0700 References: <927D46A5-7773-11D7-B966-000A956B4C74@got.net> <200304261841.h3QIf2r0025389@artifact.psychedelic.net> Message-ID: <20030428092816.A2303@cluebot.com> On Sat, Apr 26, 2003 at 11:41:02AM -0700, Eric Cordian wrote: > cryptography is fundamentally a trust-based system. With the rise of the > Internet, and almost all crypto being done by people who do not physically > meet to exchange keys, almost all crypto is public key crypto. > > Therefore, almost all cryptography (at the present moment) is based on > trust. Right. But there's still a difference between: * I trust that my computer has not been black-bagged (because I've checked, or have steps to prevent that, or it would require more effort from my adversary than I'm worth) * I trust that the current state of the art in terms of factoring in the public literature is within several orders of magnitude of what's in the classified literature. And: * I trust Paypal or Microsoft Hotmail to guard my privacy at all costs when faced with an urgent, secret request from John Aschroft. -Declan From declan at well.com Mon Apr 28 06:31:51 2003 From: declan at well.com (Declan McCullagh) Date: Mon, 28 Apr 2003 09:31:51 -0400 Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: ; from shaddack@ns.arachne.cz on Sun, Apr 27, 2003 at 03:54:19AM +0200 References: <3EAAC6C0.67F224C3@cdc.gov> Message-ID: <20030428093151.B2303@cluebot.com> On Sun, Apr 27, 2003 at 03:54:19AM +0200, Thomas Shaddack wrote: > Couldn't there be a standard English-based language, "Anonglish", with a > subset of English grammatical rules, human-readable (though maybe with its > own idiosyncrazies) and machine-parseable, which appearance would not give > many more clues than that Anonglish was used? Something where grammar I thought it was called "wire service reporting style." :) -Declan From camera_lumina at hotmail.com Mon Apr 28 07:40:50 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 28 Apr 2003 10:40:50 -0400 Subject: Fake News for Big Brother Message-ID: Well, it might not be such a bad thing in the long run, particularly if they printed a retraction some days later. Already the masses believe what they read/hear from "trusted" media sources, even to the point of "knowing" that Saddam Hussein was somehoe behind 9/11/01. If this were well publicized, there could be the realiztion of "what!they LIED to us?!" In the case of the New York Times the lies are not out-and-out lies, but a deliberate slanting and re-arranging of information in such a way as to support the 'well-intentioned' initiatives of their perceived community. Or perhaps worse still, not investigating too closely when our military releases some 'hot' information...any soft questioning will be done weeks later and in a page deep in the interior... Who once raised the point that "in a world where everyone told the truth all the time, the consequences of a single lie could be catastrophic..."? -TD >From: Declan McCullagh >To: Eric Cordian >CC: cypherpunks at minder.net >Subject: Re: Fake News for Big Brother >Date: Sat, 26 Apr 2003 23:37:54 -0400 > >On Sat, Apr 26, 2003 at 12:04:10PM -0700, Eric Cordian wrote: > > The news media, will, in fact, print fake news supplied by the >government, > > with full knowlege that it is false, to further an ongoing >investigation. > >Yes, that may be the case. It certainly is here. But let's not forget >the fact that this incident has drawn sharp criticism from other >journalists. > >-Declan _________________________________________________________________ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail From sunder at sunder.net Mon Apr 28 08:02:48 2003 From: sunder at sunder.net (Sunder) Date: Mon, 28 Apr 2003 11:02:48 -0400 (edt) Subject: Truth and Justice, Grapeshot and JDAMs, Money and Happiness In-Reply-To: Message-ID: Frankly my dear kook, I don't give a damn (about your opinions that is). ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ On Sat, 26 Apr 2003, Jim Choate wrote: > On Sat, 26 Apr 2003, R. A. Hettinga wrote: > > > "Some people say that money can't buy happiness. I've found that it > > usually does, and, when it doesn't, it buys the most interesting > > substitutes." -- Rhett Butler, 'Gone with the Wind' > > It's a movie chucklehead. And did Rhett get his happiness in the end? > > No. From DaveHowe at gmx.co.uk Mon Apr 28 03:15:12 2003 From: DaveHowe at gmx.co.uk (David Howe) Date: Mon, 28 Apr 2003 11:15:12 +0100 Subject: How convenient... References: Message-ID: <00af01c30d6f$3b665900$c71121c2@sharpuk.co.uk> at Sunday, April 27, 2003 11:30 PM, Tyler Durden was seen to say: > if Iraq did in fact destroy all WMD, as he stated he did, and as we > are now beginning to acknowledge, how do we "justify" [read: "make > legal"] our recent BoyzWithToyz party?" He doesn't plan to - mention of it will be out of sight due to the "co-operation" of the media, and the rest of the world knew there was no justification for the attacks anyhow. In the mind of the majority of americans saddam was directly or indirectly responsible for the 9/11 attack (and Shrub really needed to win a war with *someone* over that; OBL is conspicious in his non-capturedness, but that is the problem that the Russians had with him back when the CIA were training and funding him, so that the US can't now find him (when he was trained by them and had all that experience dodging the russians) is little surprise). Note that the promised evidence (that was "utterly convincing" but "could not be released due to security considerations") has not only not surfaced, but probably never will (excepting the equally convenient find of "OBL's planning PC" by the Wall St Journal and their cracking of the EFS on there in three days - which may be possible if http://www.crackpassword.com/products/prs/otherms/efs/ isn't snakeoil, but that OBL trusted american export crypto seems unlikely given his traning) > ANd don't forget that whole loadacrap about their WMDs being destroyed > "hours before the arrival of UN inspectors". Guess they took all that > sarin gas and flushed it down the toilet, huh.... The intel was creatively edited at best. Given the way the US treats countries that *do* have WMD (such as N Korea) the very fact that the attack went ahead is probably all the evidence you need that the US didn't expect saddam to have a usable defensive force, never mind a WMD or three. > In the end I think it's clear that they really didn't feel they > needed to work too hard to create credible lies. And it looks like they don't need to.... From rah at shipwright.com Mon Apr 28 09:22:12 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Mon, 28 Apr 2003 12:22:12 -0400 Subject: Will Liechtenstein's Autonomy Prevail? Message-ID: --- begin forwarded text List-Subscribe: From: "Mises Daily Article"
To: "Mises Daily Article"
Subject: Will Liechtenstein's Autonomy Prevail? Date: Mon, 28 Apr 2003 08:05:07 -0500 Importance: Normal http://www.mises.org/fullstory.asp?control=1214 Will Liechtenstein's Autonomy Prevail? By Karen De Coster [Posted April 28, 2003] Freedom havens are always of interest to libertarians. For instance, the Free State Project hopes to establish liberty in our lifetime by designating a single U.S. state as the center for political downsizing and constitutional federalism. Offshore havens such as Bermuda and Vanuatu are gaining notoriety for their favorable taxation and financial policies although, when the topic of autonomous freedom retreats is discussed, Liechtenstein is frequently a point of focus. The Principality of Liechtenstein is a small State in Central Europe, situated between Austria and Switzerland. Though its geographical location and diminutive size make it a somewhat anonymous State, its independent political climate gives rise to an exemplary model for the study of political and economic phenomena. Once a part of the Holy Roman Empire, Liechtenstein gained its sovereignty in 1806 when it was admitted as a member of the Confederation of the Rhine. It rose to the status of an independent State in 1866, and as a result, became the master of its own fate. Its standing army was abolished in 1868, and this marked the beginning of its long-standing neutrality position within Europe's geopolitical ambit. Upon its independence, Liechtenstein's interests abroad were maintained by Austria until the collapse of the Austro-Hungarian Empire in 1918. At this time, Liechtensteiners recognized that a break with politically unstable Austria was imminent, and so they turned toward their neighbors to the west in Switzerland. The fiercely independent principality sustained its neutrality throughout World War I, and shortly thereafter, it adopted the Swiss currency and entered into a customs agreement with Switzerland. Since that time, Switzerland has represented Liechtenstein in international matters. This German-speaking Principality is governed by a hereditary constitutional monarchy, but in fact, it is often referred to as a representative Republic. According to its modern Constitution, state power proceeds from the Ruling Prince and the People. With its eleven municipal areas and a population of 33,000, its constitutional neutrality proviso requires that it refrain from all foreign aggression and political allianceswa truly libertarian foreign policy as espoused by Washington and Jefferson. In the post-World War II era, Liechtenstein underwent an industrialization in which it developed into one of the world's wealthiest countries, with a lofty standard of living intact. What's more, private banking became Liechtenstein's banner product. It's refusal to bow to rigorous banking regulatory oversight while maintaining the secrecy of its financial institutions made it into a prospering financial haven along the lines of neighboring Switzerland. Liechtenstein is also a business asylum for reasons that it is very unrestrictive to set up and perform business operations, due to its privacy of registration and its lack of compulsory permits and registrations. Also, the varied privacy laws make this place an ideal environment for the establishment of a trust, foundation, or even an anstaltwa corporate form that is particular to Liechtensteinwwhich is more or less an anonymous fund with beneficiaries. Tax-wise, both business and personal tax rates are moderate compared with the United States and neighboring European countries. Minimal taxes are imposed on multinational corporations, making it a popular refuge for international business headquarters. In spite of the low tax rates, the government of Liechtenstein derives much revenue from its authentication as a thriving financial and business center. Over the years, Liechtenstein's magnificent wealth creation has been helped along by a lack of public debt. It owes nothing, and its annual revenues are truly higher than its expenditures! Try to find that in a democracy, where the majority wolves and minority lambs vote on what will be dinner. In addition, inflation and unemployment are nearly invisible as are cultural shortcomings such as illiteracy. The glory of Liechtenstein's political freedom, overall, has been due to unequivocal banking secrecy; lax regulatory oversight; anonymity in business formation and banking; legal company structuring that is friendly to wealth-creating holding companies; overall moderate taxes; tax laws allowing for tax-efficient asset management; and a minimal licensing and permit environment. However, the future could be bleak for this Principality. The Financial Action Task Force (FATF), a unilateral organization that operates under the auspices of "anti-money laundering", had long ago made Liechtenstein a favorite target because of its tax haven status and its refusal to "cooperate" with regulatory measures. Essentially, the FATF is a pro-big government blackmail organization that adopts a fluffy and well-meaning name, but operates to rid the world's individuals of financial wealth and privacy. By 2002, the Liechtenstein government had kowtowed under pressure to the organization's decrees, agreeing to cooperate with the FATF in the establishment of various "anti-money laundering" programs and regulations. This was the trade-off to get off the organization's blacklist. Additionally, the rotten "know your customer" banking laws have recently taken hold for banks belonging to the country's Bankers' Association. This has effectively destroyed the guarantee of anonymity for account holders, making Liechtenstein an unknown in terms of banking privacy issues in the future. In other words, governments and alliance organizations around the world will continue to target Liechtenstein until they break down that nation's autonomy and lack of restrictions. In a related note, this tiny nation has been making the rounds in world news in recent times. Traditionalist-minded Liechtensteiners recently voted to give their ruling Prince more powers, and especially, a wider range of veto rights. The democracy talking heads 'round the world are appalled that this monarchy insists on continuing its tradition while shunning their notions of all-inclusive, egalitarian-democratic government. The Council of Europe is one of those organizations that has been trying to force its model of "democratic principles" upon this seemingly "uncooperative" nation that demands to be left alone to exercise its monarchical traditions. Council of Europe Secretary General Walter Schwimmer has recently said that "the Council of Europe will have a closer look at the practical application of the amended constitution. I hope that the new rules will be used to strengthen the democratic institutions and that the courts will keep their independence." A translation of this would indicate that ruling decrees will be forcibly imposed on this tiny freedom enclave should it not fall in line with Europe's ruling regime. Liechtenstein's options for self-rule in the future will likely be shut down as it eventually will have to succumb to the edicts of Europe's multitude of pro-E.U., anti-independence governing bodies. If truth be told, with wealth and liberty-hating organizations like the Financial Action Task Force, the United Nations, and the Council of Europe sniffing around Liechtenstein's borders and enforcing their diktats by way of intimidation and blackmail policies, its autonomy and reputation as one of the world's most emancipated societies will likely give up the ghost. Karen De Coster, CPA is a freelance writer and Business Consultant in the Midwest. Send her MAIL and see her Mises.org Articles Archive. Also, see her website at www.karendecoster.com. This column is a modified version of an essay that will appear in the Encyclopedia of Capitalism (forthcoming, 2004). [Print Friendly Page] Mises Email List Services Join the Mises Institute Mises.org Store Home | About | Email List | Search | Contact Us | Periodicals | Articles | Games & Fun News | Resources | Catalog | Contributions | Freedom Calendar --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From patrick at fexl.com Mon Apr 28 10:47:37 2003 From: patrick at fexl.com (Patrick Chkoreff) Date: Mon, 28 Apr 2003 13:47:37 -0400 Subject: [Lucrative-L] Anonymous Transport Layer In-Reply-To: Message-ID: <80165D4B-79A1-11D7-9B07-000393D91E36@fexl.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Patrick Chkoreff wrote: >> I have sometimes wondered if it might be possible to use non-blinded >> digital notes on top of an anonymous transport layer and thereby >> achieve the same untraceability as that provided by blinded digital >> notes. Patrick McCuller wrote: > Cryptographically speaking, if you have both anonymous digital > cash and anonymous transport to the mint, why not stack them? No reason > to make it easy for the black hats. Perhaps because the system would be easier to implement and much more efficient in both space and time. The idea is to have a division of labor, where the anonymous transport layer takes care of the nasty stuff and the application writer has it relatively easy. Consider that even in a blinded note system, the black hats will be able to detect that you are making a habit of contacting the note server, even if they cannot tell which specific notes you are generating. An anonymous transport layer would help to conceal that as well. It's just a thought. In programming, laziness is sometimes, but not always, a virtue. By the way, does a working Tarzan library and network even exist right now? - -- Patrick http://fexl.com -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 iQA/AwUBPq1pOlA7g7bodUwLEQLUBQCg9icZhSwfUIEKm6k36SNcCuqmUpUAoIhE cW06JBRy/LyweGZ75wsOC75y =0jSL -----END PGP SIGNATURE----- From mv at cdc.gov Mon Apr 28 14:32:12 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Mon, 28 Apr 2003 14:32:12 -0700 Subject: Old men easier for Face Recog Tech: DARPA/NIST study Message-ID: <3EAD9DDC.CB7F13C0@cdc.gov> DARPA/NIST's most recent signal detection studies now online. They even mention "watch list tasks". Abstract The Face Recognition Vendor Test (FRVT) 2002 is an independently administered technology evaluation of mature face recognition systems. FRVT 2002 provides performance measures for assessing the capability of face recognition systems to meet requirements for large-scale real world applications. Ten commercial firms participated in FRVT 2002. FRVT 2002 computed performance statistics on an extremely large dataset121,589 operational facial images of 37,437 individuals. FRVT 2002 1) characterized identification and watch list performance as a function of database size, 2) estimated the variability in performance for different groups of people, 3) characterized performance as a function of elapsed time between enrolled and new images of a person and 4) investigated the effect of demographics on performance. FRVT 2002 shows that recognition from indoor images has made substantial progress since FRVT 2000. Demographic results show that males are easier to recognize than females and that older people are easier to recognize than younger people. FRVT 2002 also assessed the impact of two techniques for improving face recognition: three-dimensional morphable models, and face recognition from video sequences. Results show that three-dimensional morphable models increases performance, and that face recognition from video sequences offers only a limited increase in performance over still images. For FRVT 2002, a new XML-based evaluation protocol was developed. This protocol is flexible and supports evaluations of biometrics in general. http://frvt.org/DLs/FRVT_2002_Overview_and_Summary.pdf From camera_lumina at hotmail.com Mon Apr 28 11:57:30 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 28 Apr 2003 14:57:30 -0400 Subject: Deniable URLs.... Message-ID: Peter Fairbrother wrote... >From: Peter Fairbrother >To: Thomas Shaddack , "cypherpunks at lne.com" > >Subject: Re: Anonglish (was: Re: Authenticating Meat) >Date: Mon, 28 Apr 2003 15:42:41 +0100 > >Thomas Shaddack wrote: > > > On Sat, 26 Apr 2003, Major Variola (ret) wrote: > >> But seriously, you've just mentioned what's called "textual analysis". > >> Spelling errors and other idiosyncratic choices can be used > >> to "pierce the veil" of anonymity. That's what did in Dr. Kaczynski, > >> who pissed on the FBI for over a decade, until his brother recognized > >> his text. > > > > Couldn't there be a standard English-based language, "Anonglish", with a > > subset of English grammatical rules, human-readable (though maybe with >its > > own idiosyncrazies) and machine-parseable, which appearance would not >give > > many more clues than that Anonglish was used? Something where grammar > > rules would be few, strict, and easy to machine-check, spelling as well, > > and still be readable to anyone who knows "standard" English? Possibly > > with a "translator" from "normal" English (of course with the necessity >to > > read the translation, correct eventual semantical mistakes introduced by > > rearranging the words, and "anonspell-check" the result)? > > > > That would put textual analysis from comparing the errors characteristic > > for a given person to comparing of trains of thoughts, which is much >more > > difficult, much less being a "reliable proof", and practically >impossible > > for very short messages. > >I'm starting to do something slightly similar, for different reasons. It's >part of a deniable encryption project. > >If you have perfect compression, and you encrypt a message which has been >compressed, any decryption will look sensible. > >This means that you don't need long keys, that brute force attacks won't >work, and that any supposed decryption is deniable. Unfortunately it's >theoretically impossible to achieve, and difficult to usefully approach, >perfect compression. > > >What _is_ possible, at least in theory, is super-perfect compression, >wherein the set of possible messages is reduced. The way I am attempting to >do it is quite similar to your proposal, but there's a long way to go yet! > > > >There's an August 2001 thread in the sci.crypt.research archives called >"Grammar/dictionary-based compression for deniability:" in which I explain >a >bit more about it (or rather, about an earlier version). The "super" bit >solves, at least in theory, the unicity problems. > > >-- >Peter Fairbrother Well, a thought just popped into my head. Basically, why not have the message actually be a URL and a password pointing to the message? A convolved fake message would be an alternate URL ponting to the deniable text. -TD _________________________________________________________________ Help STOP SPAM with the new MSN 8 and get 2 months FREE* http://join.msn.com/?page=features/junkmail From zenadsl6186 at zen.co.uk Mon Apr 28 07:42:41 2003 From: zenadsl6186 at zen.co.uk (Peter Fairbrother) Date: Mon, 28 Apr 2003 15:42:41 +0100 Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: Message-ID: Thomas Shaddack wrote: > On Sat, 26 Apr 2003, Major Variola (ret) wrote: >> But seriously, you've just mentioned what's called "textual analysis". >> Spelling errors and other idiosyncratic choices can be used >> to "pierce the veil" of anonymity. That's what did in Dr. Kaczynski, >> who pissed on the FBI for over a decade, until his brother recognized >> his text. > > Couldn't there be a standard English-based language, "Anonglish", with a > subset of English grammatical rules, human-readable (though maybe with its > own idiosyncrazies) and machine-parseable, which appearance would not give > many more clues than that Anonglish was used? Something where grammar > rules would be few, strict, and easy to machine-check, spelling as well, > and still be readable to anyone who knows "standard" English? Possibly > with a "translator" from "normal" English (of course with the necessity to > read the translation, correct eventual semantical mistakes introduced by > rearranging the words, and "anonspell-check" the result)? > > That would put textual analysis from comparing the errors characteristic > for a given person to comparing of trains of thoughts, which is much more > difficult, much less being a "reliable proof", and practically impossible > for very short messages. I'm starting to do something slightly similar, for different reasons. It's part of a deniable encryption project. If you have perfect compression, and you encrypt a message which has been compressed, any decryption will look sensible. This means that you don't need long keys, that brute force attacks won't work, and that any supposed decryption is deniable. Unfortunately it's theoretically impossible to achieve, and difficult to usefully approach, perfect compression. What _is_ possible, at least in theory, is super-perfect compression, wherein the set of possible messages is reduced. The way I am attempting to do it is quite similar to your proposal, but there's a long way to go yet! There's an August 2001 thread in the sci.crypt.research archives called "Grammar/dictionary-based compression for deniability:" in which I explain a bit more about it (or rather, about an earlier version). The "super" bit solves, at least in theory, the unicity problems. -- Peter Fairbrother From barabbus at hushmail.com Mon Apr 28 16:37:51 2003 From: barabbus at hushmail.com (barabbus at hushmail.com) Date: Mon, 28 Apr 2003 16:37:51 -0700 Subject: Making Money in Digital Money Message-ID: <200304282337.h3SNbriU063578@mailserver3.hushmail.com> At 10:30 PM 4/28/2003 +0200, Nomen Nescio wrote: >Anonymous payments for physical goods are pointless because you can't deliver them anonymously. Everyone has recognized that from the beginning.So they always envisioned them being used for information goods. Nonsense. Once a nym has developed enough reputation some (perhaps many) people will trust them to deliver physical goods in exchange for anon DM. These might be any number of gray/black market items (e.g., firearms, drugs, child porn, etc.) To help thwart stings or sell-outs, some of the buyers can intentionally provide the names and addresses of upstanding citizens (preferably those who would not want to be associated with such items or even oppose them). If LE people are doing the sales and attempt to prosecute the recipients they will only cause a tidal wave of protest against such stings which catch up innocent citizens who knew nothing about the real buyers. Sort of a legal mixmaster. Concerned about your privacy? Follow this link to get FREE encrypted email: https://www.hushmail.com/?l=2 Big $$$ to be made with the HushMail Affiliate Program: https://www.hushmail.com/about.php?subloc=affiliate&l=427 From DaveHowe at gmx.co.uk Mon Apr 28 08:42:53 2003 From: DaveHowe at gmx.co.uk (David Howe) Date: Mon, 28 Apr 2003 16:42:53 +0100 Subject: Fake News for Big Brother References: Message-ID: <004001c30d9c$ded3fd40$c71121c2@sharpuk.co.uk> > Well, it might not be such a bad thing in the long run, particularly if they > printed a retraction some days later. Already the masses believe what they > read/hear from "trusted" media sources, even to the point of "knowing" that > Saddam Hussein was somehoe behind 9/11/01. If this were well publicized, > there could be the realiztion of "what!they LIED to us?!" http://www.sierratimes.com/03/02/28/arpubmg022803.htm On February 14, a Florida Appeals court ruled there is absolutely nothing illegal about lying, concealing or distorting information by a major press organization. The court reversed the $425,000 jury verdict in favor of journalist Jane Akre who charged she was pressured by Fox Television management and lawyers to air what she knew and documented to be false information. The ruling basically declares it is technically not against any law, rule, or regulation to deliberately lie or distort the news on a television broadcast. On August 18, 2000, a six-person jury was unanimous in its conclusion that Akre was indeed fired for threatening to report the station's pressure to broadcast what jurors decided was "a false, distorted, or slanted" story about the widespread use of growth hormone in dairy cows. The court did not dispute the heart of Akre's claim, that Fox pressured her to broadcast a false story to protect the broadcaster from having to defend the truth in court, as well as suffer the ire of irate advertisers. Fox argued from the first, and failed on three separate occasions, in front of three different judges, to have the case tossed out on the grounds there is no hard, fast, and written rule against deliberate distortion of the news. The attorneys for Fox, owned by media baron Rupert Murdock, argued the First Amendment gives broadcasters the right to lie or deliberately distort news reports on the public airwaves. In its six-page written decision, the Court of Appeals held that the Federal Communications Commission position against news distortion is only a "policy," not a promulgated law, rule, or regulation. Fox aired a report after the ruling saying it was "totally vindicated" by the verdict. From frantz at pwpconsult.com Mon Apr 28 17:32:27 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Mon, 28 Apr 2003 17:32:27 -0700 Subject: what moral obligation? (Re: DRM technology and policy) In-Reply-To: <000901c30dd9$6bf21f40$01c8a8c0@DaveHowe> References: Message-ID: At 3:56 PM -0700 4/28/03, Dave Howe wrote: >Peter Clay wrote: > >> There then comes the question of making money off devices that are >> capable of infringing copyright. This was first addressed 20 >> years ago in Sony vs. Universal, and the subsequent Congressional >> inquiry that led to the American Home Recording Act. >... and note that every blank cassette tape (and audio cdr) has a "tax" on >it to offset the assumed piracy - even if it is not used for piracy... Next they'll want to add a tax to pens and paper. And if it weren't for the personal use, non-profit exemptions, they'd tax my guitar too. They're useful for copying too you know. :-) Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From DaveHowe at gmx.co.uk Mon Apr 28 09:33:24 2003 From: DaveHowe at gmx.co.uk (David Howe) Date: Mon, 28 Apr 2003 17:33:24 +0100 Subject: DRM technology and policy References: Message-ID: <004901c30da3$eca9fee0$c71121c2@sharpuk.co.uk> I am not sure the commercial-album-by-major-label business model is really needed any more - perhaps a gig-based income model, plus an extension to the mp3/ogg formats to support a "tip for this song now" button on players, would suffice... From ravage at einstein.ssz.com Mon Apr 28 16:08:55 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 28 Apr 2003 18:08:55 -0500 (CDT) Subject: Suggested Reading Message-ID: The Meek Scott Mackay ISBN 0-451-45823-0 $6 US -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From mv at cdc.gov Mon Apr 28 18:17:21 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Mon, 28 Apr 2003 18:17:21 -0700 Subject: what moral obligation? (Re: DRM technology and policy) Message-ID: <3EADD2A1.133D090E@cdc.gov> At 11:56 PM 4/28/03 +0100, Dave Howe wrote: >Peter Clay wrote: > >> There then comes the question of making money off devices that are >> capable of infringing copyright. This was first addressed 20 >> years ago in Sony vs. Universal, and the subsequent Congressional >> inquiry that led to the American Home Recording Act. >... and note that every blank cassette tape (and audio cdr) has a "tax" on >it to offset the assumed piracy - even if it is not used for piracy... AFAIK, not true in the US. You are from the UK, according to your address, and you haven't even freedom of speech, so its not surprising you're assumed to be guilty, and fined, without evidence. Were it true here, copyright "infringement" would be *more* than justified morally, since we'd have paid for it, under threat of violence, without even having done it. --- "What the fuck do you think you're doing" ---Madonna to Jack Valenti From hseaver at cybershamanix.com Mon Apr 28 18:19:58 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Mon, 28 Apr 2003 20:19:58 -0500 Subject: Suggested Reading In-Reply-To: References: Message-ID: <20030429011958.GC30557@cybershamanix.com> "Focus" Arthur Miller or see the movie. -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From ravage at einstein.ssz.com Mon Apr 28 19:17:17 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 28 Apr 2003 21:17:17 -0500 (CDT) Subject: Quarantines may be justified In-Reply-To: <5.2.0.9.0.20030422104433.045781d0@pop.ix.netcom.com> Message-ID: On Tue, 22 Apr 2003, John Kelsey wrote: > In order to distinguish when force has been initiated, you have to have > some agreed-upon definitions of rights. Rubbish. The first person who refuses to accept 'No' as a response is the instigator. You don't need to define 'right' you only need to define 'consent'. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Apr 28 19:25:13 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 28 Apr 2003 21:25:13 -0500 (CDT) Subject: Quarantines may be justified In-Reply-To: Message-ID: On Wed, 23 Apr 2003, Tim May wrote: > But in practice, in real practice out on the streets, this has never > been where the anti-smoking laws have been invoked. No state in the > U.S., to my knowledge, bans smoking outside, on public streets. Almost, some cities require that you smoke at least 15 ft. from entrances for example. Now why do they draw this distinction? Distance and diffusion. It's to provide a 'buffer of choice'. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Apr 28 19:26:42 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 28 Apr 2003 21:26:42 -0500 (CDT) Subject: Makeup as low-tech measure against automated face recognition? In-Reply-To: Message-ID: On Thu, 24 Apr 2003, Thomas Shaddack wrote: > Vnity is about as old as mankind. With vanity, various ways come to change > one's appearance. Actually the base issue is 'pride' and 'xenophobia'. Or in even simpler language 'territoriality'. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From john at kozubik.com Mon Apr 28 21:35:36 2003 From: john at kozubik.com (John Kozubik) Date: Mon, 28 Apr 2003 21:35:36 -0700 (PDT) Subject: All trust is economics In-Reply-To: Message-ID: <20030428212906.T66029-100000@www.kozubik.com> On Sat, 26 Apr 2003, Tim May wrote: > mathematicians have yet found cleverer ways. Great fame would await > anyone who found a significantly faster method, even a Fields Medal, > and yet no one has yet revealed one." Great fame would also wait anyone who proved that a significantly faster method _does not_ exist. Not only is this conceivable, but it would move this second scenario much further along your scale of trust towards "1". I find that a lot of people (not necessarily anyone here) often forget that this possibility still exists as a possible conclusion in public key cryptography. ----- John kozubik - john at kozubik.com - http://www.kozubik.com From jamesd at echeque.com Mon Apr 28 22:03:15 2003 From: jamesd at echeque.com (James A. Donald) Date: Mon, 28 Apr 2003 22:03:15 -0700 Subject: Making Money in Digital Money In-Reply-To: Message-ID: <3EADA523.22026.C2C672A@localhost> -- On 28 Apr 2003 at 22:30, Nomen Nescio wrote: > Well, here's a clue, folks: information goods are free today. > You can't build a digital money system on paying for > information goods, in a world where people expect to get > their information goods for free. > > I'm not sure whether to laugh or cry when I read someone like > James Donald claiming that MP3s are a micropayment market. > Wake up, gramps! My God, nothing could make you sound more > like a clueless refugee from the 90s than a statement like > that. It's a perfect illustration of how irrelevant the > cypherpunks have become. > > At one time, cypherpunks, with their libertarian and > anarchocapitalist views, assumed that the online world was > turning into Galt's Gulch, a world where people would > constantly pay for exchanges of information. What they didn't > foresee is that it turned instead into a communist utopia, > where each supplies according to his abilities, and each > takes according to his needs. And it works online, unlike in > the physical world, because no matter how much each person > takes, there's still plenty for everyone else. Information > doesn't get used up. If this was true then the proportion of wealth spent on informational goods, and income earned from informational goods, would be smaller and smaller. Instead it is larger and larger. Some kinds of Information continually get used up, as in being no longer relevant to the individual or the situation. This is the kind of information people still pay serious money for. Most of us on the cypherpunks list earn our living producing or transforming information. We expected that by now we would be telecommuting from some tropical isle and being paid in anonymous untraceable money. We were wrong, but it certainly is not because the provision of information has come to accord with some communist utopia. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG Ht0YkK2RTNeNCc5cXweyAVYnLJJ0ZbBrk0UKh/gJ 4m0pzbE233OxKkrmLmFD3DqbVBOxPOswAto3cjDOd From nobody at dizum.com Mon Apr 28 13:30:04 2003 From: nobody at dizum.com (Nomen Nescio) Date: Mon, 28 Apr 2003 22:30:04 +0200 (CEST) Subject: Making Money in Digital Money Message-ID: All this talk about digital payments is a real blast from the past. Not just because it's all been said before; but because of how it demonstrates that cypherpunks are still stuck in the early 1990s as far as their world view. Every one of these discussions might have been made five or even ten years ago (with the possible exception of the details of Brands technology, which isn't fundamental). Yet the internet world has changed enormously since then. Most of these changes have passed the cypherpunks by. All the P2P work, file sharing, Freenet, IIRC, weblogs, WiFi, open source, open spectrum; for the most part it's as if none of this exists, in the world of the cypherpunks. The problem with these discussions of digital payments is so fundamental that it's amazing that no one mentions it: anonymous payments are useless. The world hasn't evolved the way cypherpunks thought it might, ten years ago. Yet the reality doesn't sink in. Anonymous payments for physical goods are pointless because you can't deliver them anonymously. Everyone has recognized that from the beginning. So they always envisioned them being used for information goods. Well, here's a clue, folks: information goods are free today. You can't build a digital money system on paying for information goods, in a world where people expect to get their information goods for free. I'm not sure whether to laugh or cry when I read someone like James Donald claiming that MP3s are a micropayment market. Wake up, gramps! My God, nothing could make you sound more like a clueless refugee from the 90s than a statement like that. It's a perfect illustration of how irrelevant the cypherpunks have become. At one time, cypherpunks, with their libertarian and anarchocapitalist views, assumed that the online world was turning into Galt's Gulch, a world where people would constantly pay for exchanges of information. What they didn't foresee is that it turned instead into a communist utopia, where each supplies according to his abilities, and each takes according to his needs. And it works online, unlike in the physical world, because no matter how much each person takes, there's still plenty for everyone else. Information doesn't get used up. Unless cypherpunks open their eyes to the reality around them, instead of seeing what they want to see, they are going to continue to be part of the past rather than part of the future. Ironically, Tim May's racist prediction for "the colored race" has become the truth for the cypherpunks: they are "headed for the trash heap of history, courtesy of their own choices." And with views like those, cypherpunks are the ones truly deserving of his final comment: "Fuck 'em." From ravage at einstein.ssz.com Mon Apr 28 20:48:05 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 28 Apr 2003 22:48:05 -0500 (CDT) Subject: Rapid information dissemination in hostile environment In-Reply-To: Message-ID: One you forgot, didn't know about is 'distributed file systems' ala the 9P (From Plan 9) name space. The two primary factors are that the files are not stored in a solid block and that each component or piece is stored in multiple places. Two further considerations are that the pieces not be stored in plaintext (and the decryption keys are kept elsewhere) and that the individual servers not be aware of 'where or who' they are. Fortunately there are 9P clients for OS'es other than Plan 9. On Fri, 25 Apr 2003, Thomas Shaddack wrote: > Sipping from a cup of tea, reading newspapers, and enjoying my favorite > pastime - idle musing. I am possibly stating the obvious and already > known, though, but someone may find something I forgot about... > > Time to time, the situation arises an information has to be let out in the > fastest possible way. It may be a whistleblowing, it may be the > "liberation" of some discovered or "acquired" closed technological detail, > it doesn't matter what it is as long as there are The Powers That Be that > aren't too happy about it getting out. > > The less amount of copies Out There, the more vulnerable the information > is. Web is excellent as persistent data source, but a website is way too > easy to be taken down. FreeNet is better in this regard, as it is fairly > impossible to find the physical location of the data source, but the > weakness is the Freenet key that has to be published somewhere, the lack > of content search engine ("Freenetoogle"?) and the abysmally low > utilization by the General Public. For initial distribution of an > information in a hostile environment, populated by factors aiming for > elimination of the information, Web is rather unusable; sooner than a > reasonable number of people get the chance to retrieve the information, > the site gets taken down. (Consider the most pessimistic situation with an > immediately aware adversary and fully complying ISPs.) > > The Rapid Information Dissemination (RID) (or maybe Rapid Information > Proliferation, RIP?) system has to achieve the widest reasonably possible > distribution within first couple seconds, or at most minutes. Two good > examples of robust systems providing this feature are Usenet and > unmoderated mailing lists. Cypherpunks could be an excellent example for a > list especially suitable for RID; spanning several continents, the core > list is unmoderated and distributed by automated means (which ensures that > even in the case of forced compliance of the moderators they won't have > any practical chance of intercepting a mail before it being sent to the > unmoderated-list subscribers), and populated by the people whose profiles > make them unlikely to comply en-masse with every whim of The Authorities, > whoever tries to be that at the moment. One post, matter of few seconds, > can then achieve the rapid seed distribution, necessary for ensuring the > information can't be entirely eliminated from the world anymore (and then > possibly making it even to Web archives - being it the List web archives > themselves, or cryptome.org, or Politechbot, or any of the numerous > others, depending on the type of the information). The adversary's only > possibilities then are "data poisoning", publishing versions of the data > with intentional inaccuracies (eg, the way British Secret Service(?) > (MI6?) reacted to the leak of their agents list onto the Net), and/or > finding the author and unleash the havoc of Exemplary Punishment onto him. > > The author has the choice of protecting his identity by using eg. an > anonymous remailer chain, further limiting the adversary's options, or > playing rough and taking the risk in the cases the situation warrants it > (though it's always better to keep the awareness that a free guerrilla is > better than a hero in prison). > > Finished the tea, back to work. > > Opinions, comments, peer review? :) > -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Apr 28 20:51:15 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 28 Apr 2003 22:51:15 -0500 (CDT) Subject: [9fans] OK, cpu server is up. (fwd) Message-ID: If anyone happens to be going and is interested... ---------- Forwarded message ---------- Date: Fri, 25 Apr 2003 07:56:29 -0600 (MDT) From: ron minnich To: 9fans at cse.psu.edu Subject: Re: [9fans] OK, cpu server is up. On Fri, 25 Apr 2003 okamoto at granite.cias.osakafu-u.ac.jp wrote: > Are you using a file sever of v9fs on Linux, and Plan 9 CPU server, > and Plan 9 terminals system? And you can use grid computing using > your Plan 9 CPU server? no, this setup is a kludge just to get me there. Proof of concept, and next comes the transition to all Plan9-based hardware. Also, I am trying to keep it to two physical pieces: the clump of geodes and a laptop, as I plan to bring this to Usenix if anybody wants to see it (I hope there is a Plan9 BOF ...) The auth and terminal are on my IBM Thinkpad X24, and are the same vmware image running under linux (i.e. my terminal is the auth/kfs server). The CPU server is a Geode (Geode rhymes with: slow) board (Advantech PCM-5823) running LinuxBIOS out of FLASH rom with 9load loaded onto a compact flash. LinuxBIOS loads 9load from the compact flash. This has proven to be very handy for debugging, as I can pop the CF out of the geode and put it in my X24 if I need to fix 9load for anything. The plan9 host is using host-only networking on vmnet1. The Geodes are on eth0 (ether0 in Plan9 parlance). 9load DHCP requests don't make it across the eth0->vmnet1 gap, so I have to run linux dhcpd. Two other things I have to do: enable ipforwarding on the linux side so that the geode packets get to the vmware image; and hard-wire the Linux ARP tables for the Geode (more on that later). 9load comes up on the geode and sends dhcp requests. Linux responds with a host name and IP address. 9load then loads the 9pccpu kernel from Linux, and connects to the auth server running in vmware. Here is an interesting problem. 9load gets its IP address but won't respond to ARP requests, so the tftp load of 9pccpu can't happen as Linux doesn't have an ARP entry for the geode. I assume on plan9 this is not an issue, but I have to hardwire the ARP cache for the CPU server or nobody can talk to it. Also, there is no plan9.ini for the 9load to read, and for some reason I still can't get environment variables from 9load to 9pccpu, so I have also had to hard-wire environment variables in the 9pccpu kernel. So the 9pccpu that 9load downloads from Linux has one or two mods to it :-) Once the 9pccpu is loaded, it contacts the auth server in vmware, and from there things are pretty straightforward, and up it comes. There are mods to both 9load and 9pccpu. 9load cyrix interrupt routing code is completely busted (no shock there, it's almost impossible to test this stuff unless you're using linuxbios) and I have made some quick fixes to it to get it working. I just run the many Geode devices (all 2 of them) at IRQ 9. There are a few other things 9load does that have proven to be dangerous in a non-bios environment and I am trying to put together a patch set for possible acceptance by the Plan 9 kernel folks. The kernel itself doesn't have a huge number of changes, although again there are IRQ routing issues and a few other things. So, short story is, it all works, it's held together with gum and wire right now, and the effort for the next month is to get it working more smoothly and slowly rip out as many of my changes as I can. I may just put 9pccpu into the CF and dispense with 9load altogether, since 9load takes a long time to get going and boot something. But we'll see -- 9load is very handy in many ways. I plan to update the wiki with all this info next week. ron -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Mon Apr 28 20:54:34 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Mon, 28 Apr 2003 22:54:34 -0500 (CDT) Subject: Quarantines may be justified In-Reply-To: <1f834686c2e498cc7727a177a3d09acf@remailer.privacy.at> Message-ID: On Fri, 25 Apr 2003, Anonymous wrote: > If you think you have the "right" to demand to not smell my tobacco > smoke when you willingly enter the area, can I demand that I have the > "right" not to smell your various body odors? Absolutely. A person has the right to do whatever they want. -Until- it interferes with anothers expression of their wants. Then everybody stops until a solution can be worked out. There are two, and only two paths to -any- solution. Cooperation and consent, or coercion. If one believes in equality then -any- solution involving coercion is a priori -wrong- and invokes further expressions of self-defence. > -- > Tom Veil Signing your anonymous posts is about as dumb as dirt. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From DaveHowe at gmx.co.uk Mon Apr 28 15:56:33 2003 From: DaveHowe at gmx.co.uk (Dave Howe) Date: Mon, 28 Apr 2003 23:56:33 +0100 Subject: what moral obligation? (Re: DRM technology and policy) References: Message-ID: <000901c30dd9$6bf21f40$01c8a8c0@DaveHowe> Peter Clay wrote: > There then comes the question of making money off devices that are > capable of infringing copyright. This was first addressed 20 > years ago in Sony vs. Universal, and the subsequent Congressional > inquiry that led to the American Home Recording Act. ... and note that every blank cassette tape (and audio cdr) has a "tax" on it to offset the assumed piracy - even if it is not used for piracy... From rah at shipwright.com Mon Apr 28 21:00:03 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 29 Apr 2003 00:00:03 -0400 Subject: Making Money in Digital Money In-Reply-To: References: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 10:30 PM +0200 4/28/03, Nomen Nescio waxed all Fermi on us and popped his bulb with the following bit of incandescence: >Well, here's a clue, folks: information goods are free today. You >can't build a digital money system on paying for information goods, >in a world where people expect to get their information goods for >free. Who here actually believes that digital goods and services are actually free to produce? Hands? Anybody? No? I thought so. Right now, the way things are going, according to the popular wisdom, there is *one* way to have auction markets for digital goods and services on a public network. You can have digital rights management and book-entry is-a-person transaction execution, clearing, and settlement all the way through I/O: *through* the processor, *through* the display device, *through* the keyboard. Sniffers and bugs everywhere, biometrics everywhere. Internet property as perpetual proctology. I say that that's too expensive, no matter how you count the cost. So, yes, using *1992* era ideas, you can have digital bearer cash settled auction markets in the internet for anything you can digitize - -- the only stuff that matters in an information society where the price of raw materials is fast approaching 1% of GDP, where the cost of manufacturing is falling through 15% of GDP, and where, frankly, the cost of even *software*, stuff you can copy, by definition, heck, even digital financial assets, the assets that matter, even now, all of that, is going to fall in the same direction, because copying and distribution costs are almost perfectly efficient across a, say it again, class: ubiquitous geodesic internetwork. So, how do you do this? Easy. For software, the first copy is auctioned for cash. Then the second copy, wherever it is on the network, is auctioned for cash, and so on, until nobody's buying any more copies, across the whole network. This is the oldest model of trade there ever was. It's how red ochre from Maine ended up in Neolithic tombs in Ireland. It's how Homo Habilis traded raw rocks for finished hand axes across hundreds of miles of African savanna. The Agorics guys called it the "digital silk road" for obvious reasons. For most digital goods, you just need to digitally sign the copies, and you're done. Look Ma, no lawyers. Okay, no legislators and regulators. No intellectual property attorneys. No "is a person", or "know your customer", or other mystifications of identity. Funny thing about this is, you'll notice the people who make the most new stuff the most often get the most money in a single product's value chain. Which is, oddly enough, exactly what we do now -- ask a movie star -- only we'll be doing it cheaper. For financial assets, you use the same kinds of financial cryptography protocols that you used to do the cash, only you trade some other asset using another, or even the same, protocol, depending what kind of asset you want. Actual bits that can only exist on the net in a single place at a time and keep their value accordingly. Just like we used to do before the dominance of the telegraph and the Hollerith card, only cheaper than we do Master Card, SWIFT, or DTC -- or PayPal. Only cheaper. For digital services, discrete (single opinions) or continuous (streaming telepresence or -operation), the person whose key has the best reputation in the market gets the most money. Just like now. Only cheaper. So, like Fermi said, why isn't it here, already? Easy. We haven't *really* built it yet. For any of a number of reasons, including what I think is the most important, the book-entry networks hadn't grown themselves into the internet well enough yet. Maybe, by now, they have. I think so, personally, but like the proverbial orifice, everyone's got an opinion, and most people don't want to hear them. They want to see code. More to the point, they really don't give a damn about code, really, either. They want to see money on the net, dramatically cheaper than money on the net is now. Money that enables them to buy things they couldn't buy before. Even if they got it for "free". What they "expect" now has nothing to do with what they "expect" in the future. That, boys and girls, is a fundamental fact of financial economics: The price of something today, or in the past, has absolutely *nothing* to do with the price of that same thing in the future. Go run a few scatter plots and figure that out for yourself; though you're too late for the economics Nobel. That's so 1970's. So, let me ask you this, folks: the second there *is* money in what you do, *exactly* what you're doing now for free, do you think you'll do it for free anymore? Show of hands? Anybody? No? I thought not. Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPq34vMPxH8jf3ohaEQK0VQCfZDs+l+QuyCpN7QmNMoIsskOKpKgAoNtN nG+OSJd8oecUEMSD9DeJpK9n =2XOl -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From mv at cdc.gov Tue Apr 29 03:23:17 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Tue, 29 Apr 2003 03:23:17 -0700 Subject: text analysis Message-ID: <3EAE5294.7935CECD@cdc.gov> FWIW: There's a paragraph in the current _Science_ that mentions "Winnow", a program by some .il researchers that guesses the sex of authors by their writing. They claim 80% accuracy on general lit and 74% accuracy on 30 science papers. (Of course that's over a baseline of 50%...) From juicy at melontraffickers.com Tue Apr 29 04:20:57 2003 From: juicy at melontraffickers.com (A.Melon) Date: Tue, 29 Apr 2003 04:20:57 -0700 (PDT) Subject: Making Money in Digital Money Message-ID: > Most of these changes have passed the cypherpunks by. All the P2P > work, file sharing, Freenet, IIRC, weblogs, WiFi, open source, open > spectrum; for the most part it's as if none of this exists, in the > world of the cypherpunks. weblogs? http://invisiblog.com/ From shaddack at ns.arachne.cz Mon Apr 28 20:13:38 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Tue, 29 Apr 2003 05:13:38 +0200 (CEST) Subject: DRM technology and policy In-Reply-To: <004901c30da3$eca9fee0$c71121c2@sharpuk.co.uk> Message-ID: On Mon, 28 Apr 2003, David Howe wrote: > I am not sure the commercial-album-by-major-label business model is really needed any more - Let's face it: isn't. > perhaps a gig-based income model, plus an extension to the mp3/ogg formats to support a "tip > for this song now" button on players, would suffice... Free distribution is a free advertisement for live performers. The "tip" infrastructure would require establishing some kind of standards: possibly a digital token, a standardized data block (difitally signed XML?) with the author contact data. No need for support directly in the players - it can be easily handled by a standalone application. (Then you don't have to directly modify all the players, you can have a commandline "tip " command that handles all kinds of files supporting the tokens (that can include e-books - inserting an XML chunk to HTML is something between simple and trivial, and can include even "contentless" tokens for contact of authors of "dataless" performances and the cases when the legacy file format doesn't allow inclusion of other data. If the standard will be designed as wildly extensible and backward-compatible (HTML, with its mechanism for ignoring unknown tags, is my favorite example), shouldn't even take too long to implement. Another required thing would be a simple infrastructure for digital micropayments - possibly using the anonymous money discussed here lately. There are a few things I seen/heard/read recently, that I consider excellent. I am very willing to pay the authors (if possible without having to feed the parasitical infrastructure of labels and publishers in the process). And there is no easy-to-use mechanism for that :( From sfurlong at acmenet.net Tue Apr 29 03:20:48 2003 From: sfurlong at acmenet.net (Steve Furlong) Date: Tue, 29 Apr 2003 06:20:48 -0400 Subject: Making Money in Digital Money In-Reply-To: References: Message-ID: <200304290620.48672.sfurlong@acmenet.net> On Tuesday 29 April 2003 00:00, R. A. Hettinga wrote: > Who here actually believes that digital goods and services are > actually free to produce? > > Hands? > > Anybody? The same people who believe that government services and benefits come at no cost: (US-style) liberals and other mental defectives. -- Steve Furlong Computer Condottiere Have GNU, Will Travel Guns will get you through times of no duct tape better than duct tape will get you through times of no guns. -- Ron Kuby From eresrch at eskimo.com Tue Apr 29 06:33:21 2003 From: eresrch at eskimo.com (Mike Rosing) Date: Tue, 29 Apr 2003 06:33:21 -0700 (PDT) Subject: All trust is economics In-Reply-To: <20030428212906.T66029-100000@www.kozubik.com> Message-ID: On Mon, 28 Apr 2003, John Kozubik wrote: > Great fame would also wait anyone who proved that a significantly faster > method _does not_ exist. Not only is this conceivable, but it would move > this second scenario much further along your scale of trust towards "1". > > I find that a lot of people (not necessarily anyone here) often forget > that this possibility still exists as a possible conclusion in public key > cryptography. I don't see how. There's an aweful lot of math that hasn't been discovered yet. So you can't prove a negative simply because you don't know all the possible methods (and never will!) Patience, persistence, truth, Dr. mike From eresrch at eskimo.com Tue Apr 29 06:42:21 2003 From: eresrch at eskimo.com (Mike Rosing) Date: Tue, 29 Apr 2003 06:42:21 -0700 (PDT) Subject: text analysis In-Reply-To: <3EAE5294.7935CECD@cdc.gov> Message-ID: On Tue, 29 Apr 2003, Major Variola (ret) wrote: > FWIW: There's a paragraph in the current _Science_ that mentions > "Winnow", a program > by some .il researchers that guesses the sex of authors by their > writing. They > claim 80% accuracy on general lit and 74% accuracy on 30 science papers. > > (Of course that's over a baseline of 50%...) Maybe they'd do better if they guessed their "gender preference" instead of their sex :-) Patience, persistence, truth, Dr. mike From declan at well.com Tue Apr 29 05:52:56 2003 From: declan at well.com (Declan McCullagh) Date: Tue, 29 Apr 2003 08:52:56 -0400 Subject: Secret hearing today on "critical infrastructure" Message-ID: <5.2.0.9.0.20030429085237.01c1b280@mail.well.com> HOUSE SELECT HOMELAND SECURITY COMMITTEE Critical Infrastructure Infrastructure and Border Security Subcommittee hearing on critical infrastructure issues. Witnesses: Robert Liscousky, assistant secretary for infrastructure protection, Homeland Security Department Location: 2456 Rayburn House Office Building. 3 p.m. Contact: 202-225-5611 http://hsc.house.gov **NEW/CLOSED** From camera_lumina at hotmail.com Tue Apr 29 06:30:24 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 29 Apr 2003 09:30:24 -0400 Subject: text analysis! Message-ID: "Of course that's over a baseline of 50%...)" That's still very sobering. Start plugging that kind of info into a SAS program and you might be able to pull out some probable suspects from a list of, say, known contributors to "Cypherpunks". Which reminds me... How often are solicitations for employment, software, and other nominally crypto-type stuff that appears on this list actually some sort of TLA info-harvesting tool? -TD >From: "Major Variola (ret)" >To: "cypherpunks at lne.com" >Subject: text analysis >Date: Tue, 29 Apr 2003 03:23:17 -0700 > >FWIW: There's a paragraph in the current _Science_ that mentions >"Winnow", a program >by some .il researchers that guesses the sex of authors by their >writing. They >claim 80% accuracy on general lit and 74% accuracy on 30 science papers. > >(Of course that's over a baseline of 50%...) _________________________________________________________________ STOP MORE SPAM with the new MSN 8 and get 2 months FREE* http://join.msn.com/?page=features/junkmail From mv at cdc.gov Tue Apr 29 09:36:48 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Tue, 29 Apr 2003 09:36:48 -0700 Subject: what moral obligation? (Re: DRM technology and policy) Message-ID: <3EAEAA1F.7A160334@cdc.gov> At 02:23 PM 4/29/03 +0100, David Howe wrote: >Yup. and copy protected audio "non cds" such as the more recent album releases are actually >an attempt to prevent you using your fair use rights, which are of course legal, without >performing an illegal circumvention of the protection under the terms of the DMCA. Actually, non-standard CDs sold with the CD logo are fraudulent, since they violate a published standard which the logo implies. I'm surprised this avenue hasn't been taken legally. The non-CD publishers are of course free to sell what they wish, but they can't claim standards-compliance, which they do. From mv at cdc.gov Tue Apr 29 09:44:01 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Tue, 29 Apr 2003 09:44:01 -0700 Subject: Fake News for Big Brother Message-ID: <3EAEABD1.5B65B036@cdc.gov> At 10:16 AM 4/29/03 -0400, Trei, Peter wrote: >I'm not sure how I feel about this. Problems would arise if there *were* a >law against >news media presenting false information. The question becomes 'What is >truth?', and >'Who decides". Peter is right on. Everyone needs to remember that police can lie, media can lie, governments lie. And remember that broadcast media requires government licensing. ---- "They did what?" --My wife, when I reminder her about the Tuskegee experiments, when she doubted the USG would plant things in Iraq From timcmay at got.net Tue Apr 29 09:56:36 2003 From: timcmay at got.net (Tim May) Date: Tue, 29 Apr 2003 09:56:36 -0700 Subject: Making Money in Digital Money In-Reply-To: Message-ID: <8A11C062-7A63-11D7-ADBC-000A956B4C74@got.net> On Tuesday, April 29, 2003, at 04:20 AM, A.Melon wrote: >> Most of these changes have passed the cypherpunks by. All the P2P >> work, file sharing, Freenet, IIRC, weblogs, WiFi, open source, open >> spectrum; for the most part it's as if none of this exists, in the >> world of the cypherpunks. > > weblogs? > > http://invisiblog.com/ > > Rebutting Mr. Anonymous, the dyspeptic original poster, with specific, single examples of where he is wrong only helps make his argument seem plausible. Every one of his examples where he claims "none of this exists, in the world of the cypherpunks" can be rebutted by many examples. I make no claim that we invented all of these things, though in several of the instances we were the first to use them, the first to talk about them, and even the actual inventors of some of them. * P2P -- BlackNet was operational in 1993. Remailers were used for file sharing even before then. One of the few books on P2P discusses several Cypherpunks and their effects. We may not have coined the term "P2P," but we sure were talking about peer-to-peer and "everyone a remailer" and "everyone a mint" long before P2P became the darling of venture capitalists for a few short dot com boom quarters! In any case, Napster, Kazaa, Freenet, Morpheus, etc. have been talked about many times here. Sure, we don't run the list based on P2P (unless the distributed CP list is considered P2P, which it could be, in which case we've been doing it since before Napster existed), but we know non-hierarchical, flat, first class object systems like nobody's business. * File sharing -- Covered above. And don't forget the release of RC4 on our list. And the Mykotronx docs. And so on. MojoNation was based on distributed file sharing, for backups, etc. (Before Cypherpunks, I worked to help Dave Ross and Jim Bennett develop their ideas for a distributed, file sharing back up system. This was in 1990.) * Freenet -- Covered above. Many here know Ian Clarke. Many here, present or past, have themselves worked on systems superior to Freenet. (MojoNation, Vines/Tarzan, BitTorrent, etc.) And many Cypherpunks worked at present or in the past for companies working in this area (C2Net, now owned by Red Hat, The Anonymizer, Zero Knowledge, MojoNation, etc.). To argue that we are uninvolved with one particular system, Freenet, is misleading in the extreme. * IIRC -- ? Sure, I guess. Those who like them, use them. People set up CP relay chats some years ago. I checked in and found the usual babble. Those who like it, use it. By the way, Cypherpunks (mainly Hugh Daniel) set up a 3-way DES-encrypted virtual meeting between Mountain View, Cambridge (MA), and Northern Virginia. This was back in 1994. Impressive. * Weblogs -- They're there for those who want them. Our mailing list is not a blog, for the obvious reasons that blogs are mostly just extended rants with hypertext pointers. Like newspaper columns. Boring technology, been around for years. (I've been reading John Baez's blog on mathematical physics for more than 10 years now: . Of course, he didn't call it a blog when he started, nor does he call it a blog now. But it for sure is. Likewise, Dave Winer didn't call his early systems blogs, but I've been using his tools for well over a decade, including his hypertext outline processor, MORE. * WiFi -- give me a fucking break! Wirelesss connections abound at CP meetings. And we were some of the earliest users of the Metricom wireless modems, circa 1995, with a special deal offered by some Metricom founders. Seeing laptops Metricomed to search engines for instant answers from the crowd was impressive, circa 1996-7. It still is. It is true that wireless connections are not being used for remailers, a topic I wrote about extensively in 1992-3, and is covered in my Cyphernomicon, and is even mentioned in my 1988 Manifesto. The reasons are manyfold why wireless connections are not common for such uses (mostly, lack of density where the wireless benefits would appear). * Open Source -- Mr. Anonymous is either ignorant or is being deliberately deceptive. PGP was distributed around the world via the efforts of several Cypherpunks, including Lucky Green, using open source models, with source code distributed at "open meetings, open to all." Ditto for several other systems, including remailer code, mint code, etc. * Open Spectrum -- This is even more laughable. I guess Mr. Anonymous doesn't follow the work of Eric and Steve on GNU Radio, the open source, open spectrum effort. Actual demos, including to a stunned FCC (from what I hear). Funded by Cypherpunks, designed by Cypherpunks, built by Cypherpunks, used by Cypherpunks. And at the September meeting at my house we also heard from the Aetherwire ultrawideband folks. His laundry list of things we are unaware of or uninvolved with is laughable. --Tim May From timcmay at got.net Tue Apr 29 10:06:07 2003 From: timcmay at got.net (Tim May) Date: Tue, 29 Apr 2003 10:06:07 -0700 Subject: what moral obligation? (Re: DRM technology and policy) In-Reply-To: <002c01c30e52$b646b460$c71121c2@sharpuk.co.uk> Message-ID: On Tuesday, April 29, 2003, at 06:23 AM, David Howe wrote: > at Tuesday, April 29, 2003 2:17 AM, Major Variola (ret) > was seen to say: >> AFAIK, not true in the US. You are from the UK, according to your >> address, > Close enough - GMX is actually a german webmail service, but I *am* in > the UK ;) > >> and you haven't even freedom of speech, so its not >> surprising you're assumed to be guilty, and fined, without evidence. > *lol* FoS is more seen in the breach than in the observance in the US > I have noticed. But > you are right - the UK is even worse; as an example, one anti-war > protestor was recently > jailed for burning a flag outside a US base (the flag wasn't the us > one, but was close > enough to pass for one on casual inspection; the stars had been > replaced with various oil > company logos). Burning the same flag *in* the US would have been a > legally-protected > expression of protest.... as would have been burning a genuine flag. > > Of course, in the US she could have been declared an enemy combatant > (even if a US citizen) > and held indefinitely without evidence, trial or access to lawyers. > > Anyhow, back to the subject :) > > I believe the blank media "tax" was an international invention > (amongst the music industry > of course - no point letting anyone else have a vote :) adopted in > america the same year it > was agreed (1992) but AFAIK restricted just to digital media (so CDR, > DVD and minidisk) - If > there is a media tax on analog recording, I am not aware of where it > is established Home (Audio) Recording Act of 1992. It created the tax and specifically immunized those who make recordings for personal use, not for profit or sale. As I have said here before, a somewhat obsessive friend of mine has a library now of at least 4000 CDs recorded onto DAT and CD-R. He goes on "library runs" where he visits 5-6 nearby library branches and checks out the maximum number of CDs at each, sometimes as many as 15 per branch. He started out by loading them into a CD changer and automatically duping them to DAT. Now he just uses a 48x reader and 24x writer (I think that's the speed) and copies each in a matter of a couple of minutes. The usual online sources give the songs, from a code on the CD, and his color printer prints a label which he affixes to the CD-R. I know other people who do the same thing with DVDs, though this is not legal under the above Act. And there are issues of quality with DIVX (not the Circuit City scheme, but another). --Tim May "Extremism in the pursuit of liberty is no vice."--Barry Goldwater From ptrei at rsasecurity.com Tue Apr 29 07:16:10 2003 From: ptrei at rsasecurity.com (Trei, Peter) Date: Tue, 29 Apr 2003 10:16:10 -0400 Subject: Fake News for Big Brother Message-ID: > ---------- > From: David Howe[SMTP:DaveHowe at gmx.co.uk] > Sent: Monday, April 28, 2003 11:42 AM > To: Email List: Cypherpunks > Subject: Re: Fake News for Big Brother > > > Well, it might not be such a bad thing in the long run, particularly if > they > > printed a retraction some days later. Already the masses believe what > they > > read/hear from "trusted" media sources, even to the point of "knowing" > that > > Saddam Hussein was somehoe behind 9/11/01. If this were well publicized, > > there could be the realiztion of "what!they LIED to us?!" > > http://www.sierratimes.com/03/02/28/arpubmg022803.htm > > On February 14, a Florida Appeals court ruled there is absolutely nothing > illegal about > lying, concealing or distorting information by a major press organization. > The court > reversed the $425,000 jury verdict in favor of journalist Jane Akre who > charged she was > pressured by Fox Television management and lawyers to air what she knew > and documented to be > false information. The ruling basically declares it is technically not > against any law, > rule, or regulation to deliberately lie or distort the news on a > television broadcast. > On August 18, 2000, a six-person jury was unanimous in its conclusion that > Akre was indeed > fired for threatening to report the station's pressure to broadcast what > jurors decided was > "a false, distorted, or slanted" story about the widespread use of growth > hormone in dairy > cows. The court did not dispute the heart of Akre's claim, that Fox > pressured her to > broadcast a false story to protect the broadcaster from having to defend > the truth in court, > as well as suffer the ire of irate advertisers. > > Fox argued from the first, and failed on three separate occasions, in > front of three > different judges, to have the case tossed out on the grounds there is no > hard, fast, and > written rule against deliberate distortion of the news. The attorneys for > Fox, owned by > media baron Rupert Murdock, argued the First Amendment gives broadcasters > the right to lie > or deliberately distort news reports on the public airwaves. > > In its six-page written decision, the Court of Appeals held that the > Federal Communications > Commission position against news distortion is only a "policy," not a > promulgated law, rule, > or regulation. > > Fox aired a report after the ruling saying it was "totally vindicated" by > the verdict. > I'm not sure how I feel about this. Problems would arise if there *were* a law against news media presenting false information. The question becomes 'What is truth?', and 'Who decides". Laws of this type are used in many tyrannies (recently, Zimbabwe) to persecute reporters on the grounds that they were 'libeling the government'. 'Truth in media' is a sword that cuts both ways. Peter Trei From timcmay at got.net Tue Apr 29 10:16:21 2003 From: timcmay at got.net (Tim May) Date: Tue, 29 Apr 2003 10:16:21 -0700 Subject: Fake News for Big Brother In-Reply-To: Message-ID: <4C69C844-7A66-11D7-ADBC-000A956B4C74@got.net> On Tuesday, April 29, 2003, at 07:16 AM, Trei, Peter wrote: > I'm not sure how I feel about this. Problems would arise if there > *were* a > law against > news media presenting false information. The question becomes 'What is > truth?', and > 'Who decides". Laws of this type are used in many tyrannies (recently, > Zimbabwe) to > persecute reporters on the grounds that they were 'libeling the > government'. > > 'Truth in media' is a sword that cuts both ways. I don't see any basis for supporting a "law against lying." Unless a contract is involved, lying is just another form of speech. Should a church which claims that praying to the baby Jesus will save one from going to Hell be prosecuted for lying? Should a newspaper be prosecuted for publishing a claim that the Sumerian prediction that Nibiru, aka Planet X, will stop the earth from rotating on May 15, 2003? Should someone be prosecuted for saying the Holocaust never happened, or was exaggerated greatly by the Jewish lobby? The answer to all libertarians, and the answer embodied in the First Amendment to the United States Constitution, is "No." Of course, the idea of reputation matters. And--Declan can correct me or clarify things--newspapers and perhaps even reporters have professional organizations and other "standards and practices" type of seals of approval. Something like "This newspaper is a member of the National Assocation for the Advancement of Uncolored Journalism," or somesuch. Probably the Weekly World News ("Baby Eats Own Hand, Aliens Suspected") would not be a member in good standing of the NAAUJ. And the newspaper which published the deliberately false arson story should at the least face suspension. Were someone to kill the reporter who wrote the false story, I would only chuckle. This doesn't mean government should be involved in deciding the answer to Pilate's famous question, "What is truth?" --Tim May "The State is the great fiction by which everyone seeks to live at the expense of everyone else." --Frederic Bastiat From timcmay at got.net Tue Apr 29 10:21:01 2003 From: timcmay at got.net (Tim May) Date: Tue, 29 Apr 2003 10:21:01 -0700 Subject: Fake News for Big Brother In-Reply-To: <014001c30e64$30135e40$c71121c2@sharpuk.co.uk> Message-ID: On Tuesday, April 29, 2003, at 08:29 AM, David Howe wrote: > at Tuesday, April 29, 2003 3:16 PM, Trei, Peter > was seen to say: >> I'm not sure how I feel about this. Problems would arise if there >> *were* a law against news media presenting false information. >> The question becomes 'What is truth?', and >> 'Who decides". Laws of this type are used in many tyrannies (recently, >> Zimbabwe) to persecute reporters on the grounds that they >> were 'libeling the government'. > I think there is a distinction between truth as an absolute, the > twisted wording required to > avoid libel in the uk, and deliberately lieing to people who believe > you are a source of > truth about the world they can't see. > The UK has some pretty strong rules in this area - for instance, a > newsreader can't be seen > to promote (advertise) a product, as a viewer could confuse marketing > (which is always a bit > suspect) with "news" (which is supposed to be unbiassed and as > accurate as the broadcaster > can make it) and in libel/slander cases, the burden of proof is on the > defendant - not fun > at all. > >> 'Truth in media' is a sword that cuts both ways. > Indeed - but (at least in a free press) there is supposed to be a > distinction between > "marketing" "news" and "propaganda". Of course, freedom of the presses > has only ever been > available to those who own presses.... This interpretation is certainly not supported by libertarian principles. I outlined the reasons in my previoius, longer, post. I agree that things are not like this in the U.K., but they "should" be. If the state has the authority to classify words as "marketing" or "new" or "propaganda," all is basically lost. And "freedom of the press" is indeed limited to those with presses, except presses have long been a nonbarrier to speech, given the incredible low cost of mimeograph machines, offset printing, laser printing, and so on. And now we have the Net. > > --Tim May "A democracy cannot exist as a permanent form of government. It can only exist until the voters discover that they can vote themselves money from the Public Treasury. From that moment on, the majority always votes for the candidate promising the most benefits from the Public Treasury with the result that a democracy always collapses over loose fiscal policy always followed by dictatorship." --Alexander Fraser Tyler From sunder at sunder.net Tue Apr 29 07:51:42 2003 From: sunder at sunder.net (Sunder) Date: Tue, 29 Apr 2003 10:51:42 -0400 (edt) Subject: Fake News for Big Brother In-Reply-To: <004001c30d9c$ded3fd40$c71121c2@sharpuk.co.uk> Message-ID: > http://www.sierratimes.com/03/02/28/arpubmg022803.htm > > On February 14, a Florida Appeals court ruled there is absolutely nothing illegal about > lying, concealing or distorting information by a major press organization. Ok fine, but what about the old saw that you can't lie to any law enforcement types? Are we to assume that no Law Enforcement Officer ever watches Fox News? By extension, does that mean any member of the media may lie to a Law Enforcement Officer? If so, why does does Fox get to lie, and Joe Spudweiser can't? Ok, what if Joe Spudwiser has his own neighborhood newspaper? Can't have it both ways. Then again, in this "envrionment" nothing makes sense other than to assume that everyone is lying. ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ From timcmay at got.net Tue Apr 29 10:57:44 2003 From: timcmay at got.net (Tim May) Date: Tue, 29 Apr 2003 10:57:44 -0700 Subject: Fake News for Big Brother In-Reply-To: Message-ID: <143629A8-7A6C-11D7-ADBC-000A956B4C74@got.net> On Tuesday, April 29, 2003, at 07:51 AM, Sunder wrote: >> http://www.sierratimes.com/03/02/28/arpubmg022803.htm >> >> On February 14, a Florida Appeals court ruled there is absolutely >> nothing illegal about >> lying, concealing or distorting information by a major press >> organization. > > Ok fine, but what about the old saw that you can't lie to any law > enforcement types? Are we to assume that no Law Enforcement Officer > ever > watches Fox News? > > By extension, does that mean any member of the media may lie to a Law > Enforcement Officer? > > If so, why does does Fox get to lie, and Joe Spudweiser can't? > > Ok, what if Joe Spudwiser has his own neighborhood newspaper? > > > Can't have it both ways. Then again, in this "envrionment" nothing > makes > sense other than to assume that everyone is lying. The "making false statements to officers" bit is only about Official Investigations. It doesn't cover lying to your next door neighbor the cop, lying about what speed one was traveling at, or lying on a news broadcast he may be watching. (Even if he's an Official Investigator!) Also, convicting someone of "making false statements" is fairly difficult, and such prosecutions and convictions are rare. --Tim May From sunder at sunder.net Tue Apr 29 08:02:55 2003 From: sunder at sunder.net (Sunder) Date: Tue, 29 Apr 2003 11:02:55 -0400 (edt) Subject: Making Money in Digital Money In-Reply-To: Message-ID: Anon, I guess Apple then is also stuck in the '90's and their pay $1/song or $10/album is also pining for the golden 1990's. Only time will tell. ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ On Mon, 28 Apr 2003, Nomen Nescio wrote: > All this talk about digital payments is a real blast from the past. > > Not just because it's all been said before; but because of how it > demonstrates that cypherpunks are still stuck in the early 1990s as far > as their world view. > I'm not sure whether to laugh or cry when I read someone like James > Donald claiming that MP3s are a micropayment market. Wake up, gramps! > My God, nothing could make you sound more like a clueless refugee from > the 90s than a statement like that. It's a perfect illustration of how > irrelevant the cypherpunks have become. From frantz at pwpconsult.com Tue Apr 29 11:56:13 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Tue, 29 Apr 2003 11:56:13 -0700 Subject: Making Money in Digital Money In-Reply-To: <8A11C062-7A63-11D7-ADBC-000A956B4C74@got.net> References: Message-ID: At 9:56 AM -0700 4/29/03, Tim May wrote: >* WiFi -- give me a fucking break! Wirelesss connections abound at CP >meetings. And we were some of the earliest users of the Metricom >wireless modems, circa 1995, with a special deal offered by some >Metricom founders. Seeing laptops Metricomed to search engines for >instant answers from the crowd was impressive, circa 1996-7. It still >is. As a brief historical note, the company name Combex (http://www.combex.com/) was chosen in a Palo Alto cafe using a Metricom modem. For those who don't know about Combex, "Combex is a pioneer in the development of secure distributed computing systems. Combex's personnel represent the vast majority of the expertise in the use of the E secure distributed computing platform that is the result of over $11M of R&D effort expended over a six year period." Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From frantz at pwpconsult.com Tue Apr 29 12:52:55 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Tue, 29 Apr 2003 12:52:55 -0700 Subject: Making Money in Digital Money In-Reply-To: References: Message-ID: At 9:00 PM -0700 4/28/03, R. A. Hettinga wrote: >So, how do you do this? Easy. For software, the first copy is >auctioned for cash. Then the second copy, wherever it is on the >network, is auctioned for cash, and so on, until nobody's buying any >more copies, across the whole network. This is the oldest model of >trade there ever was. It's how red ochre from Maine ended up in >Neolithic tombs in Ireland. It's how Homo Habilis traded raw rocks >for finished hand axes across hundreds of miles of African savanna. >The Agorics guys called it the "digital silk road" for obvious >reasons. This view of the Digital Silk Road is quite different from the one described in the paper, "The Digital Silk Road" by Norman Hardy and Eric Dean Tribble . However, Robert will enjoy the section, "No Junk Mail!". Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From mv at cdc.gov Tue Apr 29 14:09:24 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Tue, 29 Apr 2003 14:09:24 -0700 Subject: Mike Hawash Message-ID: <3EAEEA04.11EC6ED9@cdc.gov> At 03:10 PM 4/29/03 -0400, Tyler Durden wrote: >OK, aside from the obvious problems with being held without charge until >now, there are some other major issues here. > >Apparently, the guy is only being charged with traveling to China in an >attempt to enter Afghanistan and fight US forces. According to 1 "informant", who is getting *what* in return? Buying a parka and flying is not treason. Even trying to enter .af is not illegal. (And congress never did declare war there, did they?) Shooting off guns in a quarry is not illegal. Going to the same church as folks who pled is not illegal. Clearly, he was given a deal, while in illegal custody, cooperate or we file charges. He didn't, so they did. If they had charges to begin with, they needn't have held him illegally. Of course, he won't be tried in the justice system, so we'll never know the facts.. Maybe they'll go after his wife, if he still doesn't do as they dictate. From kelsey.j at ix.netcom.com Tue Apr 29 11:10:24 2003 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Tue, 29 Apr 2003 14:10:24 -0400 Subject: Secret Service Buffoons In-Reply-To: References: <3EAAFC03.93EF30C3@cdc.gov> Message-ID: <5.2.0.9.0.20030429140154.04496810@pop.ix.netcom.com> At 07:55 PM 4/26/03 -0700, Mike Rosing wrote: ... >More proof all our fears of the government actually being dangerous are >totally false. They are incompetent beyond comprehension. I think I >better go check out that movie "Brazil" again. Unfortunately, dangerous and incompetent are not mutually exclusive. Just ask the people involved in the Steve Jackson Games case. Or that security guard that almost got framed by the FBI for the bombing at the Atlanta Olympics. The fact is, the US government is an enormous organization. Within it are good guys and bad guys, geniuses and morons, and everything in-between. The fact that the FBI and Secret Service are short on clued-in computer people tells you little about whether NSA or NASA are, say. This is no different from any other large organization--Microsoft has some first-rate security people, for example, even though you might never guess that from looking at Internet Explorer. Agencies like EPA and FDA have very sharp scientists working for them, but that may not lead to scientifically sound policy coming out of even those agencies, and certainly doesn't have much connection to scientifically sound policy coming out of Congress, say. >Patience, persistence, truth, >Dr. mike --John Kelsey, kelsey.j at ix.netcom.com PGP: FA48 3237 9AD5 30AC EEDD BBC8 2A80 6948 4CAA F259 From DaveHowe at gmx.co.uk Tue Apr 29 06:23:46 2003 From: DaveHowe at gmx.co.uk (David Howe) Date: Tue, 29 Apr 2003 14:23:46 +0100 Subject: what moral obligation? (Re: DRM technology and policy) References: <3EADD2A1.133D090E@cdc.gov> Message-ID: <002c01c30e52$b646b460$c71121c2@sharpuk.co.uk> at Tuesday, April 29, 2003 2:17 AM, Major Variola (ret) was seen to say: > AFAIK, not true in the US. You are from the UK, according to your > address, Close enough - GMX is actually a german webmail service, but I *am* in the UK ;) > and you haven't even freedom of speech, so its not > surprising you're assumed to be guilty, and fined, without evidence. *lol* FoS is more seen in the breach than in the observance in the US I have noticed. But you are right - the UK is even worse; as an example, one anti-war protestor was recently jailed for burning a flag outside a US base (the flag wasn't the us one, but was close enough to pass for one on casual inspection; the stars had been replaced with various oil company logos). Burning the same flag *in* the US would have been a legally-protected expression of protest.... as would have been burning a genuine flag. Of course, in the US she could have been declared an enemy combatant (even if a US citizen) and held indefinitely without evidence, trial or access to lawyers. Anyhow, back to the subject :) I believe the blank media "tax" was an international invention (amongst the music industry of course - no point letting anyone else have a vote :) adopted in america the same year it was agreed (1992) but AFAIK restricted just to digital media (so CDR, DVD and minidisk) - If there is a media tax on analog recording, I am not aware of where it is established Canadian law doesn't distinguish between analog and digital; initially, the tax on a blank CDR was to be $2.50 but given the then current cost of the media was under $2 that was considered a little excessive by the public In the UK there is no such levy, as making copies, even for personal use, is a crime (as is in theory use of a vcr to timeshift. the UK sucks) > Were it true here, copyright "infringement" would be *more* than > justified morally, > since we'd have paid for it, under threat of violence, without even > having done it. Yup. and copy protected audio "non cds" such as the more recent album releases are actually an attempt to prevent you using your fair use rights, which are of course legal, without performing an illegal circumvention of the protection under the terms of the DMCA. Note such prevention is not illegal in itself, despite the levy on blank media - the RIAA are permitted to block you in any manner they see fit, they just can't sue you if you record their stuff (but of course now they can claim you *must* have borken the DMCA terms in order to so record *sigh*) From kelsey.j at ix.netcom.com Tue Apr 29 11:44:02 2003 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Tue, 29 Apr 2003 14:44:02 -0400 Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: References: Message-ID: <5.2.0.9.0.20030429144202.044964d0@pop.ix.netcom.com> At 03:42 PM 4/28/03 +0100, Peter Fairbrother wrote: >If you have perfect compression, and you encrypt a message which has been >compressed, any decryption will look sensible. You do understand that building this kind of compressor implies passing the Turing test, right? For the messages to be sensible, they have to have some underlying meaning that makes sense. This isn't just compression in the sense of fast implementations of statistical models of text.... >Peter Fairbrother --John Kelsey, kelsey.j at ix.netcom.com PGP: FA48 3237 9AD5 30AC EEDD BBC8 2A80 6948 4CAA F259 From patrick at lfcgate.com Tue Apr 29 13:46:48 2003 From: patrick at lfcgate.com (Patrick) Date: Tue, 29 Apr 2003 14:46:48 -0600 Subject: [Lucrative-L] double spends, identity agnosticism, and Lucrative Message-ID: A quick experiment has confirmed the obvious: when a client reissues a coin at the mint, both the blinded and its unblinded cousin are valid instruments to the Lucrative mint. Example: Alice uses the Mint's API to reissue a one-dollar note, blinding the coin before getting a signature, and unblinding the signature afterwards. She's left with both a blinded and a non-blinded version of the coin. The mint believes they are both valid. Instant, unlimited inflation. I believe the solution to this is to have the mint track both spent coins and issued coins (that is, it automatically cancels coins it issues, before the client receives them). The client is left with no choice but to go through a blinding and unblinding process in order to have a usable coin. This seems to make identity-agnostic cash difficult or impossible, at least with Lucrative: http://www.io.com/~cman/agnostic.html, http://cypherpunks.venona.com/date/1995/09/msg00197.html . Patrick The Lucrative Project: http://lucrative.thirdhost.com ...................................................... To subscribe or unsubscribe from this discussion list, write to lucrative-l-request at lucrative.thirdhost.com with just the word "unsubscribe" in the message body (or, of course, "subscribe") --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From kelsey.j at ix.netcom.com Tue Apr 29 11:51:46 2003 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Tue, 29 Apr 2003 14:51:46 -0400 Subject: Making Money in Digital Money In-Reply-To: Message-ID: <5.2.0.9.0.20030429144638.0449f120@pop.ix.netcom.com> At 10:30 PM 4/28/03 +0200, Nomen Nescio wrote: ... >Well, here's a clue, folks: information goods are free today. You can't >build a digital money system on paying for information goods, in a world >where people expect to get their information goods for free. Just a nitpick: Information goods are generally free when they've already been produced, because the second copy costs approximately $0.00 to make. But getting the initial information produced can cost quite a bit. I have worked for many years as a consultant, doing work remotely, and I certainly don't give the information away. Similarly, when I go to the doctor, or have my taxes done, all I'm really paying for is information, but my doctor and accountant expect to be paid. (Alas, the cost of *duplicating* my medical or financial records is very low, which is why there are big privacy issues there, but they weren't so cheap to produce in the first place....) Whether any of that will really ever be worth doing anonymously is an open question. Most of the time, I'd be pretty scared to do business with a doctor that dared not show his face or have his name known to the world, for example. On the other hand, I chose my accountant based on reputation, and generally do business with him remotely. --John Kelsey, kelsey.j at ix.netcom.com PGP: FA48 3237 9AD5 30AC EEDD BBC8 2A80 6948 4CAA F259 From camera_lumina at hotmail.com Tue Apr 29 11:58:51 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 29 Apr 2003 14:58:51 -0400 Subject: Wired: Mike Hawash "officially" charged Message-ID: U.S. officials on Monday charged Maher "Mike" Hawash, an Arab-American who had been detained since March, with conspiracy to help a suspected cell of people accused of aiding al Qaeda and Taliban forces. Maher Mofeid Hawash, 39, of Hillsboro, Oregon, was charged in a criminal complaint with conspiracy to levy war against the United States, conspiracy to provide material support to al Qaeda and conspiracy to contribute services to al Qaeda and the Taliban. Hawash, a software contractor with Intel, had been held since March 20, sparking an outcry from supporters who protested the high level of secrecy surrounding legal proceedings against him. The Justice Department said in a statement that Hawash was believed to be involved in the same activities as the "Portland Six" -- a group indicted in the fall of 2002 and accused by Attorney General John Ashcroft of being part of a "suspected terrorist cell." Hawash was charged with the same violations as Jeffrey Leon Battle, Patrice Lumumba Ford, Ahmed Abrahim Bilal, Muhammad Ibrahim Bilal, Habis Abdullah Al Saoub and October Martinique Lewis. All six previously charged defendants had lived in Portland, Oregon. Five of the six are in custody. Al Saoub is still at large and is believed to be outside the United States. The complaint said U.S. officials identified Hawash based on evidence seized at the time of the other arrests and from evidence gained through follow-up investigations. According to the criminal complaint, filed in U.S. District Court in Portland, Hawash decided after the Sept. 11, 2001, attacks on the United States to travel to Afghanistan to join forces with Taliban and al Qaeda troops fighting there. The United States, which blames Osama bin Laden's al Qaeda terror network for masterminding the strikes that killed more than 3,000, launched the attack in Afghanistan to uproot the country's Islamic fundamentalist Taliban government. Hawash is accused of traveling with the other defendants to China in an attempt to enter Afghanistan and fight against U.S. forces. Hawash returned to the United States in November 2001 after failing to enter Afghanistan. The complaint says Hawash claimed his travel to China was related to his personal software business. Hawash was initially detained as a material witness in a secret grand jury investigation. The material witness designation allowed Hawash to be held indefinitely without being charged. According to an investigation by the Washington Post, at least 44 others have been held in secret as material witnesses by authorities in terrorism-related investigations. The American Civil Liberties Union has condemned the government's detention of the individuals. Friends of Hawash, led by former Intel executive Steven McGeady, continue to campaign for his release. According to the campaign website, Free Mike Hawash, the evidence against Hawash is weak. "The evidence presented in the complaint is, in our opinion, weak, and amounts to guilt by association," says a statement on the site. "The government had a weak case when he was originally detained  and has no stronger a case now. "We will continue to stand by Mike," the statement continues. "We believe in his innocence, and believe that he will ultimately be cleared of all charges." Reuters contributed to this report. _________________________________________________________________ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail From camera_lumina at hotmail.com Tue Apr 29 12:10:31 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 29 Apr 2003 15:10:31 -0400 Subject: Mike Hawash Message-ID: OK, aside from the obvious problems with being held without charge until now, there are some other major issues here. Apparently, the guy is only being charged with traveling to China in an attempt to enter Afghanistan and fight US forces. This counts as terrorism? I thought it was good old fashion treason. -TD _________________________________________________________________ The new MSN 8: smart spam protection and 2 months FREE* http://join.msn.com/?page=features/junkmail From mv at cdc.gov Tue Apr 29 15:24:20 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Tue, 29 Apr 2003 15:24:20 -0700 Subject: Osama wins Message-ID: <3EAEFB94.9B09F75F@cdc.gov> Most U.S. Troops to Leave Saudi Arabia PRINCE SULTAN AIR BASE, Saudi Arabia - In a major shift in American focus in the Persian Gulf, the United States is all but ending its military presence in Saudi Arabia, abandoning this remote desert air base that was built in the 1990s and made the site of a high-tech air operations center in 2001. http://story.news.yahoo.com/news?tmpl=story&cid=540&e=4&u=/ap/20030429/ap_on_re_mi_ea/us_saudi_arabia And the Minister of Fatherland Security shows his bravery: WASHINGTON (AP) -- Tom Rich planned a family vacation to Britain but changed his mind after the deadly poison ricin turned up in a London apartment during the arrest of terrorist suspects. "I just don't think it's the right time to go," says Rich, of Duxbury, Mass. "I don't think we'll do anything this summer." http://customwire.ap.org/dynamic/stories/T/TRAVEL_ANXIETY?SITE=FLTAM&SECTION=US&TEMPLATE=DEFAULT Father and I went down to camp, Along with Colin Powell; And there we saw the men and boys, As thick as oil most foul. Sheik Osama, keep it up, Sheik Osama dandy; Mind the music and the step, And with the planes be handy. There was Gen'l Tommy Franks Upon a slapping stallion, A-giving orders to his men, I guess there was a million. And then the feathers on his hat, They looked so' tarnal fin-a, I wanted pockily to get To give to my Jemima. And then we saw a tomahawk, Large as a log of maple; Upon a deuced little cart, A load for father's cattle. And every time they shoot it off, It takes a horn of powder; It makes a noise like father's gun, Only a nation louder. I went as nigh to one myself, As' Siah's underpinning; And father went as nigh agin, I thought the deuce was in him. We saw a little barrel, too, The heads were made of leather; They knocked upon it with little clubs, And called the folks together. And there they'd fife away like fun, And play on cornstalk fiddles, And some had ribbons red as blood, All bound around their middles. The rangers, too, would gallop up And fire right in our faces; It scared me almost to death To see them run such races. Uncle Sam came there to change Some noni and some onions, For' lasses cake to carry home To give his wife and young ones. But I can't tell half I see They kept up such a smother; So I took my hat off, made a bow, And scampered home to mother. Cousin Rumsfeld grew so bold, I thought he would have cocked it; It scared me so I streaked it off, And hung by father's pocket. And there I saw a pumpkin shell, As big as mother's basin; And every time they touched it off, They scampered like the nation. Sheik Osama, keep it up, Sheik Osama dandy; Mind the music and the step, And with the girls be handy From timcmay at got.net Tue Apr 29 16:12:40 2003 From: timcmay at got.net (Tim May) Date: Tue, 29 Apr 2003 16:12:40 -0700 Subject: Mike Hawash In-Reply-To: <3EAEEA04.11EC6ED9@cdc.gov> Message-ID: <1357218F-7A98-11D7-ADBC-000A956B4C74@got.net> On Tuesday, April 29, 2003, at 02:09 PM, Major Variola (ret) wrote: > At 03:10 PM 4/29/03 -0400, Tyler Durden wrote: >> OK, aside from the obvious problems with being held without charge > until >> now, there are some other major issues here. >> >> Apparently, the guy is only being charged with traveling to China in >> an > >> attempt to enter Afghanistan and fight US forces. > > According to 1 "informant", who is getting *what* in return? > > Buying a parka and flying is not treason. Even trying to enter .af is > not illegal. > (And congress never did declare war there, did they?) > Shooting off guns in a quarry is not illegal. > Going to the same church as folks who pled is not illegal. > > Clearly, he was given a deal, while in illegal custody, cooperate or we > file charges. > He didn't, so they did. If they had charges to begin with, they > needn't have > held him illegally. He was an illegal combatant because he did not actually enter a country we were not actually at war with, whose government was not actually the force behind the 9/11 attack. Using the psychics employed by the CIA, America has deduced that he may have been _thinking_ about entering Afghanistan, even though he didn't. And that's enough for a thoughtcrime conviction in the beknighted states. The case is so weak he'll hang himself in his jail cell. --Tim May From DaveHowe at gmx.co.uk Tue Apr 29 08:29:52 2003 From: DaveHowe at gmx.co.uk (David Howe) Date: Tue, 29 Apr 2003 16:29:52 +0100 Subject: Fake News for Big Brother References: Message-ID: <014001c30e64$30135e40$c71121c2@sharpuk.co.uk> at Tuesday, April 29, 2003 3:16 PM, Trei, Peter was seen to say: > I'm not sure how I feel about this. Problems would arise if there > *were* a law against news media presenting false information. > The question becomes 'What is truth?', and > 'Who decides". Laws of this type are used in many tyrannies (recently, > Zimbabwe) to persecute reporters on the grounds that they > were 'libeling the government'. I think there is a distinction between truth as an absolute, the twisted wording required to avoid libel in the uk, and deliberately lieing to people who believe you are a source of truth about the world they can't see. The UK has some pretty strong rules in this area - for instance, a newsreader can't be seen to promote (advertise) a product, as a viewer could confuse marketing (which is always a bit suspect) with "news" (which is supposed to be unbiassed and as accurate as the broadcaster can make it) and in libel/slander cases, the burden of proof is on the defendant - not fun at all. > 'Truth in media' is a sword that cuts both ways. Indeed - but (at least in a free press) there is supposed to be a distinction between "marketing" "news" and "propaganda". Of course, freedom of the presses has only ever been available to those who own presses.... From camera_lumina at hotmail.com Tue Apr 29 14:14:35 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 29 Apr 2003 17:14:35 -0400 Subject: Fake News for Big Brother Message-ID: Norman Nescio wrote... "Thank God for the protection of anonymity. With people like Tim May throwing around death threats towards those who say the wrong thing, this may soon be the only way we can communicate without fear. Please join me in condemning this savage trampling on principles supported by all men of honor." Well, I might be willing to "condemn" the letter of May's post, but I'm not so sure about condemning the spirit of it. Basically, if a newspaper claims to be doing objective reporting of the facts, and they then become merely an arm of 'law enforcement' (which in turn enforces the momentary whim of local dictators no longer constrained by law due to the 'Patriot Act'), then all hell's broken loose already. And while I can't get with the notion of killing somebody for doing something I don't like (unless they're trying to hurt me or my family), a brick through a window might be an appropriate response. -TD >From: Nomen Nescio >To: cypherpunks at lne.com >Subject: Re: Fake News for Big Brother >Date: Tue, 29 Apr 2003 20:50:11 +0200 (CEST) > > > On February 14, a Florida Appeals court ruled there is absolutely > > nothing illegal about lying, concealing or distorting information by a > > major press organization. The court reversed the $425,000 jury verdict > > in favor of journalist Jane Akre who charged she was pressured by Fox > > Television management and lawyers to air what she knew and documented > > to be false information. The ruling basically declares it is technically > > not against any law, rule, or regulation to deliberately lie or distort > > the news on a television broadcast. > >It's significant that a United States Court of Appeals has a stronger >commitment to the First Amendment than supposed arch-libertarian Tim May. >Look at May's response when confronted with the idea that a newspaper >has the right to print what it chooses: > > > But the journalist and his editors are still alive. > > > > When they have been necklaced and lit, we can rest easier. > > > > Burning down the entire newspaper office would maybe be overkill, but, > > hey, what the hell. > > > > Fuck them dead. > >That's right: Tim May believes people should be tortured and killed for >saying the wrong thing in their own newspaper. Apparently he believes >that he has the right to set rules which everyone else must follow in what >they say, under penalty of a horrific death. Needless to say, nothing >could be further from the letter and spirit of the First Amendment. > >Thank God for the protection of anonymity. With people like Tim May >throwing around death threats towards those who say the wrong thing, this >may soon be the only way we can communicate without fear. Please join >me in condemning this savage trampling on principles supported by all >men of honor. _________________________________________________________________ The new MSN 8: advanced junk mail protection and 2 months FREE* http://join.msn.com/?page=features/junkmail From kvanhorn at ksvanhorn.com Tue Apr 29 15:44:03 2003 From: kvanhorn at ksvanhorn.com (Kevin S. Van Horn) Date: Tue, 29 Apr 2003 17:44:03 -0500 Subject: Mike Hawash References: Message-ID: <3EAF0033.2080800@ksvanhorn.com> Tyler Durden wrote: > Apparently, the guy is only being charged with traveling to China in > an attempt to enter Afghanistan and fight US forces. > > This counts as terrorism? I thought it was good old fashion treason. How can it possibly be treason if there was no declaration of war? Furthermore, since when is mere travel treason? If you could show that he had actually participated in war against the U.S. -- not just thought about it, not just taken leg one of a trip that could eventually get him to a location where he would have an opportunity to do so (if he didn't change his mind first) -- then there could be a case. From rah at shipwright.com Tue Apr 29 15:02:01 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 29 Apr 2003 18:02:01 -0400 Subject: [Lucrative-L] double spends, identity agnosticism, and Lucrative Message-ID: --- begin forwarded text From justin at soze.net Tue Apr 29 11:15:42 2003 From: justin at soze.net (Justin) Date: Tue, 29 Apr 2003 18:15:42 +0000 Subject: Fake News for Big Brother In-Reply-To: References: <004001c30d9c$ded3fd40$c71121c2@sharpuk.co.uk> Message-ID: <20030429181542.GA17685@dreams.soze.net> At 2003-04-29 14:51 +0000, Sunder wrote: > > http://www.sierratimes.com/03/02/28/arpubmg022803.htm > > > > On February 14, a Florida Appeals court ruled there is absolutely nothing illegal about > > lying, concealing or distorting information by a major press organization. > > Ok fine, but what about the old saw that you can't lie to any law > enforcement types? You can't lie to them during the course of semi-quasi-whatever official business. Feeding them false intel with their morning or afternoon coffee I'm quite sure doesn't qualify. -- Freedom's untidy, and free people are free to make mistakes and commit crimes and do bad things. They're also free to live their lives and do wonderful things. --Rumsfeld, 2003-04-11 From emc at artifact.psychedelic.net Tue Apr 29 18:19:19 2003 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Tue, 29 Apr 2003 18:19:19 -0700 (PDT) Subject: Osama wins In-Reply-To: <3EAEFB94.9B09F75F@cdc.gov> Message-ID: <200304300119.h3U1JKPZ023369@artifact.psychedelic.net> Major Variola wrote: > PRINCE SULTAN AIR BASE, Saudi Arabia - In a major shift in American > focus in the Persian Gulf, the United States is all but ending its > military presence in Saudi Arabia, abandoning this remote desert air > base that was built in the 1990s and made the site of a high-tech air > operations center in 2001. It would be rude to add them to the target list while we were still their guests. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From rah at shipwright.com Tue Apr 29 15:19:45 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Tue, 29 Apr 2003 18:19:45 -0400 Subject: Making Money in Digital Money In-Reply-To: References: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 12:52 PM -0700 4/29/03, Bill Frantz wrote: >This view of the Digital Silk Road is quite different from the one >described in the paper, "The Digital Silk Road" by Norman Hardy and >Eric Dean Tribble . >However, Robert will enjoy the section, "No Junk Mail!". Fine. We'll call it the "original silk road". :-). It's Eric Hughes' sanctioned "piracy" distribution scheme, then. Sorry if I thought they were one and the same. Vamping on this a bit, an encrypted copy that I have a key for is *my* property. Somewhere, Ronald Coase is smiling... Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPq76acPxH8jf3ohaEQLmQgCbBBb6/C8ddPBlblFZyRXJKYp3ZisAoLTI DF+AtXKe1RLA5S/ennGth83T =XAvq -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From ravage at einstein.ssz.com Tue Apr 29 17:00:13 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 29 Apr 2003 19:00:13 -0500 (CDT) Subject: Quarantines may be justified In-Reply-To: <20030419185457.GA22903@cybershamanix.com> Message-ID: On Sat, 19 Apr 2003, Harmon Seaver wrote: > > VOLCANOES! Yeah, volcanoes release more toxins into the air than the > > entire industrial revolution did! How do you ban volcanoes, though.... > > > > Toxins? Particulates, yes, but not many toxins. And you're right, Mother > Nature will always win in the end. Bzzzzt. Wrong answer. Better do more research. Volcanoes put out all sorts of toxic chemicals; solid, liquid, gas. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Tue Apr 29 17:03:48 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 29 Apr 2003 19:03:48 -0500 (CDT) Subject: Quarantines may be justified In-Reply-To: <1675238252.20030419123022@realhappy.net> Message-ID: On Sat, 19 Apr 2003, stuart wrote: > Smoking in public, that's an easy one to pick on. But the argument > holds no water, unfortunately. Find me RELIABLE, UNBIASED evidence that > second-hand smoke is actually dangerous, and I'll agree to ban smoking. Bullshit line of reasoning (actually your whole line is pretty much tits up but why waste precious time). It's not a matter of 'proof'. It -is- a matter of interfering with others. Note they are not saying you can't smoke, they -are- saying that you can't make them smoke along with you. There is this concept called 'consent'. You seem to be missing it. You can do what you want until it interferes with what another wants. If they want to breath unpolluted air and drink clean water then there is nothing that gives you the right to pollute either outside of -your- immediate vicinity. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From timcmay at got.net Tue Apr 29 19:06:11 2003 From: timcmay at got.net (Tim May) Date: Tue, 29 Apr 2003 19:06:11 -0700 Subject: Mike Hawash In-Reply-To: <20030429204451.C25473@cluebot.com> Message-ID: <507C8598-7AB0-11D7-ADBC-000A956B4C74@got.net> On Tuesday, April 29, 2003, at 05:44 PM, Declan McCullagh wrote: > On Tue, Apr 29, 2003 at 04:12:40PM -0700, Tim May wrote: >> He was an illegal combatant because he did not actually enter a >> country >> we were not actually at war with, whose government was not actually >> the >> force behind the 9/11 attack. >> >> Using the psychics employed by the CIA, America has deduced that he >> may >> have been _thinking_ about entering Afghanistan, even though he >> didn't. > > You're forgetting the many anonymous tipsters, including his neighbors > (at least one in the pay of the Feds, I recall) who reported on > Hawash. One alleged he was wearing "eastern" garb and had let his beard > grow after 9-11. Other evidence included one of the "Portland Six" > having > Hawash's telephone number written on a business card or something > similar. > Don't forget the copy of the Koran they found when the ninjas raided his house. That alone justified the holding without charges, without bail, without access to a lawyer. Habeas Corpus never recovered from that creep Lincoln's attacks..it was good the fucker got offed. Gee, I also have a beard, and a copy of the Koran, and I lived in Hillsboro, Oregon. I hope the Fedz never learn that I have ricin and sarin formulas on my computer, sarin ingredients in my kitchen, that I know Steve McGeady from the Hackers Conference, and that I once worked with Jim Bell when we were both at that hotbed of terrorist plotting, Intel Corp. --Tim May "To those who scare peace-loving people with phantoms of lost liberty, my message is this: Your tactics only aid terrorists." --John Ashcroft, U.S. Attorney General From ravage at einstein.ssz.com Tue Apr 29 17:08:36 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 29 Apr 2003 19:08:36 -0500 (CDT) Subject: Finder's Keepers, Smartcards, Anon Cash [Re: double-spending prevention w. spent coins] In-Reply-To: <3EAB0299.348961B1@cdc.gov> Message-ID: On Sat, 26 Apr 2003, Major Variola (ret) wrote: > One of the attributes that a digital currency system MAY have is > whether someone who finds lost currency may spend it. Conventional > cash has this property. So do tickets to performances, lottery > tickets, bus tokens, prepaid phone cards etc.. > A (tamper-resistant) smartcard may have this > 'finders keepers' property, or may not. And anyone with two halves of a clue to rub together will only use a system that -won't- allow this. Who in their right mind is going to give money away... -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Tue Apr 29 17:12:20 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 29 Apr 2003 19:12:20 -0500 (CDT) Subject: All trust is economics In-Reply-To: Message-ID: On Sat, 26 Apr 2003, Tim May wrote: > All crypto is economics, and so is all trust. So, all crypto is trust. Or is that all trust is crypto. Either way it's CACL noise. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Tue Apr 29 17:13:08 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 29 Apr 2003 19:13:08 -0500 (CDT) Subject: [Brinworld] PhoneCam vs. court; Publishing faces from the street In-Reply-To: <327EB0FE-7850-11D7-865D-000A956B4C74@got.net> Message-ID: On Sat, 26 Apr 2003, Tim May wrote: > demonstrate (claim) Not the same thing, not even synonyms. More CACL noise. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Tue Apr 29 17:21:08 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 29 Apr 2003 19:21:08 -0500 (CDT) Subject: All trust is economics In-Reply-To: <200304270049.08522.njohnsn@njohnsn.com> Message-ID: On Sun, 27 Apr 2003, Neil Johnson wrote: > In a way, marketing is about convincing customers to trust (the value) your > product or service enough to exchange something of they have of value for it. Only partially so, it also involves convincing them they -need- it. If they already believe they need it little effort with regard to trust is needed, they'll stand there with money and exchange 1-to-1 for it. > So we are back to economics. No, human psychology. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Tue Apr 29 17:29:05 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 29 Apr 2003 19:29:05 -0500 (CDT) Subject: Making Money in Digital Money In-Reply-To: <04F0A904-7876-11D7-865D-000A956B4C74@got.net> Message-ID: On Sat, 26 Apr 2003, Tim May wrote: > has not yet redeemed all of its obligations. The best fix for this is > to distribute monies at many such mints. It is unlikely, though Follow this out to its logical conclusion, why have 'mints' at all? How small is too small? If there isn't a lower limit... At that point the concept of 'money' pretty much becomes a fantasy. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From mv at cdc.gov Tue Apr 29 19:51:03 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Tue, 29 Apr 2003 19:51:03 -0700 Subject: Mike Hawash, Rev N. Message-ID: <3EAF3A17.2090101@cdc.gov> At 07:06 PM 4/29/03 -0700, Tim May wrote: >Gee, I also have a beard, and a copy of the Koran, And if you don't personally have hypochlorites, you know people who do. >I hope the Fedz never learn that I have ricin and There are Castor plants on the Central Expresway north of Santa Clara. Clearly within your grasp. And that lye you supposedly use to clear your drains, yeah right. >sarin formulas on my computer, So, that tin-flouride in your so-called toothpaste is for apatite-strengthening? Yeah, right. This boy was on the same terrorist mailing list as a known chem-terrorist, and IRS-unslave JBell. And known antisocialite, JY. And you probably have isopropanol in your so-called "bathroom". Lithium metal in so-called "batteries". Speed-precursors in so-called "decongestants". Radioisotopes in so-called "salt-substitutes". And allah knows how many Ca-illegal rice flails. "There's no way to rule innocent men. The only power any government has is the power to crack down on criminals. Well, when there aren't enough criminals, one makes them. One declares so many things to be a crime that it becomes impossible to live without breaking laws." -- Ayn Rand, "Atlas Shrugged" --- SARS is Alallah's way of saying there are too many chinese, like HIV is is the polytheistist way of saying too many Africans. And Anthrax is a Federalist way of saying too many mailmen. Hogg taught percolation, but no one was listening. "Sometimes god hides." -Fripp From frantz at pwpconsult.com Tue Apr 29 20:30:50 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Tue, 29 Apr 2003 20:30:50 -0700 Subject: Mike Hawash In-Reply-To: <20030429204451.C25473@cluebot.com> References: <1357218F-7A98-11D7-ADBC-000A956B4C74@got.net>; from timcmay@got.net on Tue, Apr 29, 2003 at 04:12:40PM -0700 <3EAEEA04.11EC6ED9@cdc.gov> <1357218F-7A98-11D7-ADBC-000A956B4C74@got.net> Message-ID: At 5:44 PM -0700 4/29/03, Declan McCullagh wrote: >You're forgetting the many anonymous tipsters, including his neighbors >(at least one in the pay of the Feds, I recall) who reported on >Hawash. One alleged he was wearing "eastern" garb and had let his beard >grow after 9-11. Other evidence included one of the "Portland Six" having >Hawash's telephone number written on a business card or something similar. Hmmm - Ski season coming up. Better get better protection for my face should the unusual occurrence happen and I actually go skiing. Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From frantz at pwpconsult.com Tue Apr 29 20:33:31 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Tue, 29 Apr 2003 20:33:31 -0700 Subject: ScanMail Message: To Sender, sensitive content found and action t aken. Message-ID: >Return-Path: >Received: from mail1.uspto.gov ([63.71.228.70]) > by augustus.mspring.net (Earthlink Mail Service) with ESMTP id >vaudcm.hqt.37kbpol > for ; Tue, 29 Apr 2003 22:31:50 -0400 (EDT) >Received: from uspto-mta-2.uspto.gov (mailer.uspto.gov [10.96.26.47]) > by mail1.uspto.gov (8.9.3 (PHNE_26304)/8.9.3) with ESMTP id WAA16704 > for ; Tue, 29 Apr 2003 22:34:01 -0400 (EDT) >Received: by mailer.uspto.gov with Internet Mail Service (5.5.2656.59) > id ; Tue, 29 Apr 2003 22:31:48 -0400 >Message-ID: <8D41CD9393D61B4193D5892E1C455B6C0466554C at uspto-is-109.uspto.gov> >From: USPTO-IS-109-SA at USPTO.GOV >To: frantz at pwpconsult.com >Subject: ScanMail Message: To Sender, sensitive content found and action t > aken. >Date: Tue, 29 Apr 2003 22:31:47 -0400 >MIME-Version: 1.0 >X-Mailer: Internet Mail Service (5.5.2656.59) >Content-Type: text/plain > >Trend SMEX Content Filter has detected sensitive content. > >Place = timcmay at got.net; cypherpunks at lne.com; ; >Sender = frantz at pwpconsult.com >Subject = Re: Making Money in Digital Money >Delivery Time = April 29, 2003 (Tuesday) 22:31:46 >Policy = Dirty Words >Action on this mail = Quarantine message > >Warning message from administrator: >Sender, Content filter has detected a sensitive e-mail. Because Tim used the phrase, "give me a fucking break!". Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From camera_lumina at hotmail.com Tue Apr 29 17:35:12 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 29 Apr 2003 20:35:12 -0400 Subject: Mike Hawash Message-ID: Yeah. This occurred to me on the way home from work. The guy potentially thinks about fighting the US on foreign soil and then changes his mind, and now he's a terrorist. AND...this is what the government's actually bothering to put into print. Bad. -(The REAL) Tyler Durden >From: Tim May >To: cypherpunks at lne.com >Subject: Re: Mike Hawash >Date: Tue, 29 Apr 2003 16:12:40 -0700 > >On Tuesday, April 29, 2003, at 02:09 PM, Major Variola (ret) wrote: > >>At 03:10 PM 4/29/03 -0400, Tyler Durden wrote: >>>OK, aside from the obvious problems with being held without charge >>until >>>now, there are some other major issues here. >>> >>>Apparently, the guy is only being charged with traveling to China in an >> >>>attempt to enter Afghanistan and fight US forces. >> >>According to 1 "informant", who is getting *what* in return? >> >>Buying a parka and flying is not treason. Even trying to enter .af is >>not illegal. >>(And congress never did declare war there, did they?) >>Shooting off guns in a quarry is not illegal. >>Going to the same church as folks who pled is not illegal. >> >>Clearly, he was given a deal, while in illegal custody, cooperate or we >>file charges. >>He didn't, so they did. If they had charges to begin with, they >>needn't have >>held him illegally. > >He was an illegal combatant because he did not actually enter a country we >were not actually at war with, whose government was not actually the force >behind the 9/11 attack. > >Using the psychics employed by the CIA, America has deduced that he may >have been _thinking_ about entering Afghanistan, even though he didn't. > >And that's enough for a thoughtcrime conviction in the beknighted states. > >The case is so weak he'll hang himself in his jail cell. > >--Tim May _________________________________________________________________ MSN 8 with e-mail virus protection service: 2 months FREE* http://join.msn.com/?page=features/virus From camera_lumina at hotmail.com Tue Apr 29 17:38:14 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 29 Apr 2003 20:38:14 -0400 Subject: Osama wins, but the patient dies Message-ID: I don't know if Osama wins... The tumor may have been removed but the cancer has metastisized. -TD >From: "Major Variola (ret)" >To: "cypherpunks at lne.com" >Subject: Osama wins >Date: Tue, 29 Apr 2003 15:24:20 -0700 > >Most U.S. Troops to Leave Saudi Arabia >PRINCE SULTAN AIR BASE, Saudi Arabia - In a major shift in American >focus in the Persian Gulf, the United States is all but ending its >military >presence in Saudi Arabia, abandoning this remote desert air base that >was >built in the 1990s and made the site of a high-tech air operations >center in >2001. >http://story.news.yahoo.com/news?tmpl=story&cid=540&e=4&u=/ap/20030429/ap_on_re_mi_ea/us_saudi_arabia > > > >And the Minister of Fatherland Security shows his bravery: > >WASHINGTON (AP) -- Tom Rich planned a family vacation to Britain but >changed his mind after the deadly poison ricin turned up in a London >apartment during the arrest of terrorist suspects. > >"I just don't think it's the right time to go," says Rich, of Duxbury, >Mass. "I don't think we'll do anything this summer." >http://customwire.ap.org/dynamic/stories/T/TRAVEL_ANXIETY?SITE=FLTAM&SECTION=US&TEMPLATE=DEFAULT > > > > Father and I went down to camp, > Along with Colin Powell; > And there we saw the men and boys, > As thick as oil most foul. > > Sheik Osama, keep it up, > Sheik Osama dandy; > Mind the music and the step, > And with the planes be handy. > > There was Gen'l Tommy Franks > Upon a slapping stallion, > A-giving orders to his men, > I guess there was a million. > > And then the feathers on his hat, > They looked so' tarnal fin-a, > I wanted pockily to get > To give to my Jemima. > > And then we saw a tomahawk, > Large as a log of maple; > Upon a deuced little cart, > A load for father's cattle. > > And every time they shoot it off, > It takes a horn of powder; > It makes a noise like father's gun, > Only a nation louder. > > I went as nigh to one myself, > As' Siah's underpinning; > And father went as nigh agin, > I thought the deuce was in him. > > We saw a little barrel, too, > The heads were made of leather; > They knocked upon it with little clubs, > And called the folks together. > > And there they'd fife away like fun, > And play on cornstalk fiddles, > And some had ribbons red as blood, > All bound around their middles. > > The rangers, too, would gallop up > And fire right in our faces; > It scared me almost to death > To see them run such races. > > Uncle Sam came there to change > Some noni and some onions, > For' lasses cake to carry home > To give his wife and young ones. > > But I can't tell half I see > They kept up such a smother; > So I took my hat off, made a bow, > And scampered home to mother. > > Cousin Rumsfeld grew so bold, > I thought he would have cocked it; > It scared me so I streaked it off, > And hung by father's pocket. > > And there I saw a pumpkin shell, > As big as mother's basin; > And every time they touched it off, > They scampered like the nation. > > Sheik Osama, keep it up, > Sheik Osama dandy; > Mind the music and the step, > And with the girls be handy _________________________________________________________________ STOP MORE SPAM with the new MSN 8 and get 2 months FREE* http://join.msn.com/?page=features/junkmail From declan at well.com Tue Apr 29 17:41:36 2003 From: declan at well.com (Declan McCullagh) Date: Tue, 29 Apr 2003 20:41:36 -0400 Subject: Mike Hawash In-Reply-To: ; from camera_lumina@hotmail.com on Tue, Apr 29, 2003 at 03:10:31PM -0400 References: Message-ID: <20030429204136.B25473@cluebot.com> On Tue, Apr 29, 2003 at 03:10:31PM -0400, Tyler Durden wrote: > This counts as terrorism? I thought it was good old fashion treason. Last I checked, treason has specific evidentiary requirements as defined (unusually) in the Constitution. My read of the state policeman's affidavit in the Hawash case suggests that the evidence the Feds say they have on Hawash would be insufficient to permit a conviction on a treason charge. -Declan From declan at well.com Tue Apr 29 17:44:51 2003 From: declan at well.com (Declan McCullagh) Date: Tue, 29 Apr 2003 20:44:51 -0400 Subject: Mike Hawash In-Reply-To: <1357218F-7A98-11D7-ADBC-000A956B4C74@got.net>; from timcmay@got.net on Tue, Apr 29, 2003 at 04:12:40PM -0700 References: <3EAEEA04.11EC6ED9@cdc.gov> <1357218F-7A98-11D7-ADBC-000A956B4C74@got.net> Message-ID: <20030429204451.C25473@cluebot.com> On Tue, Apr 29, 2003 at 04:12:40PM -0700, Tim May wrote: > He was an illegal combatant because he did not actually enter a country > we were not actually at war with, whose government was not actually the > force behind the 9/11 attack. > > Using the psychics employed by the CIA, America has deduced that he may > have been _thinking_ about entering Afghanistan, even though he didn't. You're forgetting the many anonymous tipsters, including his neighbors (at least one in the pay of the Feds, I recall) who reported on Hawash. One alleged he was wearing "eastern" garb and had let his beard grow after 9-11. Other evidence included one of the "Portland Six" having Hawash's telephone number written on a business card or something similar. -Declan From declan at well.com Tue Apr 29 17:48:55 2003 From: declan at well.com (Declan McCullagh) Date: Tue, 29 Apr 2003 20:48:55 -0400 Subject: Mike Hawash In-Reply-To: <3EAF0033.2080800@ksvanhorn.com>; from kvanhorn@ksvanhorn.com on Tue, Apr 29, 2003 at 05:44:03PM -0500 References: <3EAF0033.2080800@ksvanhorn.com> Message-ID: <20030429204855.D25473@cluebot.com> On Tue, Apr 29, 2003 at 05:44:03PM -0500, Kevin S. Van Horn wrote: > How can it possibly be treason if there was no declaration of war? If you give "aid" to the "enemies" of the U.S., that would qualify as treason even absent a declaration of war, in my opinion. Note I'm obviously not saying what Hawash (allegedly) did would qualify as such, and let's remember the DOJ did not file that charge. "Treason against the United States, shall consist only in levying War against them, or in adhering to their Enemies, giving them Aid and Comfort. No Person shall be convicted of Treason unless on the Testimony of two Witnesses to the same overt Act, or on Confession in open Court." -Declan From nobody at dizum.com Tue Apr 29 11:50:11 2003 From: nobody at dizum.com (Nomen Nescio) Date: Tue, 29 Apr 2003 20:50:11 +0200 (CEST) Subject: Fake News for Big Brother Message-ID: <04f1b0f3a7ccb7467379ba65cf308a57@dizum.com> > On February 14, a Florida Appeals court ruled there is absolutely > nothing illegal about lying, concealing or distorting information by a > major press organization. The court reversed the $425,000 jury verdict > in favor of journalist Jane Akre who charged she was pressured by Fox > Television management and lawyers to air what she knew and documented > to be false information. The ruling basically declares it is technically > not against any law, rule, or regulation to deliberately lie or distort > the news on a television broadcast. It's significant that a United States Court of Appeals has a stronger commitment to the First Amendment than supposed arch-libertarian Tim May. Look at May's response when confronted with the idea that a newspaper has the right to print what it chooses: > But the journalist and his editors are still alive. > > When they have been necklaced and lit, we can rest easier. > > Burning down the entire newspaper office would maybe be overkill, but, > hey, what the hell. > > Fuck them dead. That's right: Tim May believes people should be tortured and killed for saying the wrong thing in their own newspaper. Apparently he believes that he has the right to set rules which everyone else must follow in what they say, under penalty of a horrific death. Needless to say, nothing could be further from the letter and spirit of the First Amendment. Thank God for the protection of anonymity. With people like Tim May throwing around death threats towards those who say the wrong thing, this may soon be the only way we can communicate without fear. Please join me in condemning this savage trampling on principles supported by all men of honor. From hseaver at cybershamanix.com Tue Apr 29 19:02:01 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Tue, 29 Apr 2003 21:02:01 -0500 Subject: Quarantines may be justified In-Reply-To: <218179260.20030429211737@realhappy.net> References: <218179260.20030429211737@realhappy.net> Message-ID: <20030430020201.GA978@cybershamanix.com> On Tue, Apr 29, 2003 at 09:17:37PM -0400, stuart wrote: > On Tuesday, April 29, 2003, Jim came up with this... > > JC> On Sat, 19 Apr 2003, stuart wrote: > >> Smoking in public, that's an easy one to pick on. But the argument > >> holds no water, unfortunately. Find me RELIABLE, UNBIASED evidence that > >> second-hand smoke is actually dangerous, and I'll agree to ban smoking. > > JC> Bullshit line of reasoning (actually your whole line is pretty much tits > JC> up but why waste precious time). It's not a matter of 'proof'. It -is- a > JC> matter of interfering with others. Note they are not saying you can't > JC> smoke, they -are- saying that you can't make them smoke along with you. > JC> There is this concept called 'consent'. You seem to be missing it. > > JC> You can do what you want until it interferes with what another wants. If > JC> they want to breath unpolluted air and drink clean water then there is > JC> nothing that gives you the right to pollute either outside of -your- > JC> immediate vicinity. > > There is a line, that line is harm, not discomfort. My argument is that > there are many things that cause discomfort, that's life, tough shit. > If smoking actually caused harm to people near a smoker, I wouldn't > protest any of these bans. But nobody has been able to prove it does. > I know exactly what consent is. I don't consent to the kid next to me in > my OS class who doesn't know what deodorant is stinking the room up, but > it doesn't cause me any harm so the law has no right to impose speed > stick on him. > > People aren't permitted to blast music in the middle of the night Or in the middle of the day, for that matter. Anyone who's car stereo can be heard outside the car should be arrested. I like the way they do that in New Zealand, the fine is progressive, third offense they confiscate the car. They should do the same with houses. > because it prevents other people from sleeping, which causes harm. > When smoking is banned in places, it removes the RIGHT of the owner of > that place to permit or prohibit a legal activity within their domain. > Without those laws the owner could permit smoking, and patrons could > then CONSENT to go to that place, or go somewhere else, where the owner > has prohibited smoking. So yeah, I know what consent is, do you know > what private property is? I wasn't talking at all about private property, I was talking about public space. If only giving discomfort is okay, how about if I dump a bucket of cold water on every smoker I meet on the street? -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From stuart at realhappy.net Tue Apr 29 18:17:37 2003 From: stuart at realhappy.net (stuart) Date: Tue, 29 Apr 2003 21:17:37 -0400 Subject: Quarantines may be justified In-Reply-To: References: Message-ID: <218179260.20030429211737@realhappy.net> On Tuesday, April 29, 2003, Jim came up with this... JC> On Sat, 19 Apr 2003, stuart wrote: >> Smoking in public, that's an easy one to pick on. But the argument >> holds no water, unfortunately. Find me RELIABLE, UNBIASED evidence that >> second-hand smoke is actually dangerous, and I'll agree to ban smoking. JC> Bullshit line of reasoning (actually your whole line is pretty much tits JC> up but why waste precious time). It's not a matter of 'proof'. It -is- a JC> matter of interfering with others. Note they are not saying you can't JC> smoke, they -are- saying that you can't make them smoke along with you. JC> There is this concept called 'consent'. You seem to be missing it. JC> You can do what you want until it interferes with what another wants. If JC> they want to breath unpolluted air and drink clean water then there is JC> nothing that gives you the right to pollute either outside of -your- JC> immediate vicinity. There is a line, that line is harm, not discomfort. My argument is that there are many things that cause discomfort, that's life, tough shit. If smoking actually caused harm to people near a smoker, I wouldn't protest any of these bans. But nobody has been able to prove it does. I know exactly what consent is. I don't consent to the kid next to me in my OS class who doesn't know what deodorant is stinking the room up, but it doesn't cause me any harm so the law has no right to impose speed stick on him. People aren't permitted to blast music in the middle of the night because it prevents other people from sleeping, which causes harm. When smoking is banned in places, it removes the RIGHT of the owner of that place to permit or prohibit a legal activity within their domain. Without those laws the owner could permit smoking, and patrons could then CONSENT to go to that place, or go somewhere else, where the owner has prohibited smoking. So yeah, I know what consent is, do you know what private property is? -- stuart Anyone who tells you they want a utopia wants to put chains on the souls of your children. They want to deny history and strangle any unforeseen possibility. They should be resisted to the last breath. -Bruce Sterling- From timcmay at got.net Tue Apr 29 21:22:40 2003 From: timcmay at got.net (Tim May) Date: Tue, 29 Apr 2003 21:22:40 -0700 Subject: Mike Hawash, Rev N. In-Reply-To: <3EAF3A17.2090101@cdc.gov> Message-ID: <6166EC74-7AC3-11D7-ADBC-000A956B4C74@got.net> On Tuesday, April 29, 2003, at 07:51 PM, Major Variola (ret) wrote: > > There are Castor plants on the Central Expresway > north of Santa Clara. Clearly within your grasp. Yes, in addition to my other thoughtcrimes, I lived for several years very near to Central Expressway, just north (west, actually, but "north" is the logical direction) of Santa Clara. On Mathilda Avenue, right near those castor plants. (Minor historical note: I moved to Mathilda Avenue, to "The Apartment" (now something like "Northpointe"), in 1975. Central Distressway, as we called it, was actually very uncrowded in those days, compared to today. It was one of the undiscovered commuting pathways of those years. This was before gridlock on 101 and 280 (and Highway 85 was of course not finished until the 1990s). Things have gotten a little bit better since all of the "Loudclouds" and "Fireponds" went bust, but not by much.) > "There's no way to rule innocent men. The only power any government > has is the power to crack down on criminals. Well, when there aren't > enough criminals, one makes them. One declares so many things to be a > crime that it becomes impossible to live without breaking laws." > -- Ayn Rand, "Atlas Shrugged" > Yep. As a felon, I know these things. --Tim May From jtrjtrjtr2001 at yahoo.com Tue Apr 29 22:07:41 2003 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Tue, 29 Apr 2003 22:07:41 -0700 (PDT) Subject: Quarantines may be justified In-Reply-To: <20030430020201.GA978@cybershamanix.com> Message-ID: <20030430050741.46918.qmail@web21209.mail.yahoo.com> hi, Quarterniting people with SARS is logical to the people who has no SARA and illogical by those who have SARS.Since most people don't suffer from sars,quarteniting the infected is justifiable to them.If theree fourth of congressmen in US smoked -smoking will be encouraged :-)Its the majority and their power that defines justification,they can always justify almost any thing. Regards Sarath. --- Harmon Seaver wrote: > On Tue, Apr 29, 2003 at 09:17:37PM -0400, stuart > wrote: > > On Tuesday, April 29, 2003, Jim came up with > this... > > > > JC> On Sat, 19 Apr 2003, stuart wrote: > > >> Smoking in public, that's an easy one to pick > on. But the argument > > >> holds no water, unfortunately. Find me > RELIABLE, UNBIASED evidence that > > >> second-hand smoke is actually dangerous, and > I'll agree to ban smoking. > > > > JC> Bullshit line of reasoning (actually your > whole line is pretty much tits > > JC> up but why waste precious time). It's not a > matter of 'proof'. It -is- a > > JC> matter of interfering with others. Note they > are not saying you can't > > JC> smoke, they -are- saying that you can't make > them smoke along with you. > > JC> There is this concept called 'consent'. You > seem to be missing it. > > > > JC> You can do what you want until it interferes > with what another wants. If > > JC> they want to breath unpolluted air and drink > clean water then there is > > JC> nothing that gives you the right to pollute > either outside of -your- > > JC> immediate vicinity. > > > > There is a line, that line is harm, not > discomfort. My argument is that > > there are many things that cause discomfort, > that's life, tough shit. > > If smoking actually caused harm to people near a > smoker, I wouldn't > > protest any of these bans. But nobody has been > able to prove it does. > > I know exactly what consent is. I don't consent to > the kid next to me in > > my OS class who doesn't know what deodorant is > stinking the room up, but > > it doesn't cause me any harm so the law has no > right to impose speed > > stick on him. > > > > People aren't permitted to blast music in the > middle of the night > > Or in the middle of the day, for that matter. > Anyone who's car stereo can be > heard outside the car should be arrested. I like the > way they do that in New > Zealand, the fine is progressive, third offense they > confiscate the car. They > should do the same with houses. > > > > because it prevents other people from sleeping, > which causes harm. > > When smoking is banned in places, it removes the > RIGHT of the owner of > > that place to permit or prohibit a legal activity > within their domain. > > Without those laws the owner could permit smoking, > and patrons could > > then CONSENT to go to that place, or go somewhere > else, where the owner > > has prohibited smoking. So yeah, I know what > consent is, do you know > > what private property is? > > I wasn't talking at all about private property, I > was talking about public > space. If only giving discomfort is okay, how about > if I dump a bucket of cold > water on every smoker I meet on the street? > > > > -- > Harmon Seaver > CyberShamanix > http://www.cybershamanix.com > __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com From jtrjtrjtr2001 at yahoo.com Tue Apr 29 22:17:59 2003 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Tue, 29 Apr 2003 22:17:59 -0700 (PDT) Subject: All trust is economics In-Reply-To: <20030428212906.T66029-100000@www.kozubik.com> Message-ID: <20030430051759.48173.qmail@web21209.mail.yahoo.com> hi, --- John Kozubik wrote: > On Sat, 26 Apr 2003, Tim May wrote: > > Great fame would also wait anyone who proved that a > significantly faster > method _does not_ exist. Not only is this > conceivable, but it would move > this second scenario much further along your scale > of trust towards "1". Proofs are build on existing knowledge of a system.How ever the knowledge of a system is incomplete.That always leaves scope for disproofs and emergence of new proofs. > I find that a lot of people (not necessarily anyone > here) often forget > that this possibility still exists as a possible > conclusion in public key > cryptography. Lets wait and see if any one can proof If P=NP.Some body here suggested that it would be interesting if the above problem is undecidable. Regards Sarath. > > ----- > John kozubik - john at kozubik.com - > http://www.kozubik.com > __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com From ravage at einstein.ssz.com Tue Apr 29 20:27:53 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 29 Apr 2003 22:27:53 -0500 (CDT) Subject: NOWAR - Kiesling, Antiwar Teach-Ins, Showdown in Texas, and More (fwd) Message-ID: ---------- Forwarded message ---------- Date: Mon, 28 Apr 2003 08:06:04 -0500 From: NOWAR To: nowar at lists.tao.ca Subject: NOWAR - Kiesling, Antiwar Teach-Ins, Showdown in Texas, and More Hello, all. After a temporary hiatus, the nowar list is back, with many events to announce. Please note the two new listings -- a teach-in on the connection between U.S. interventionism and democracy and one on the Texas Military-Industrial Complex. On Tuesday, April 29, from 7:00-9:00 pm, John Brady Kiesling will speak on American Moral Capital and the Misprojection of U.S. Power Kiesling, formerly Foreign Service Officer at the US embassy in Athens, resigned from the State Department in February 2003 to protest the conduct of the Administration's foreign policy and the looming war in Iraq. His letter of resignation to Secretary of State, Colin Powell, was reproduced by the New York Times and rapidly circulated around the globe as a cry for preserving America's endangered international legitimacy. He has just returned to the U.S. from Athens, and will discuss the reasons for his protest and offer insights into the future of American foreign policy. Mr. Kiesling was a diplomat for 20 years, serving in Greece, Armenia, Morocco and Israel. He holds a Masters degree in Ancient History and Mediterranean Archeology from UC Berkeley. Location: UT Campus, Painter Hall 3.02 (on 24th St. between Guadalupe & Speedway) For info: Contact Katharine @ 459-8070 On Tuesday, April 29 at 7:00 pm, Madison Hobley, freed from Illinois' Death Row, will speak as part of a national tour calling for an end to the death penalty. Also speaking will be Madison's sister Robin Hobley; Marlene Martin, national director of the Campaign to End the Death Penalty, and UT Law Professor Rob Owen. Location: Utopia Theater (in the School of Social Work at the University of Texas), San Jacinto between MLK and 21st St. For info: email lilymae30 at hotmail.com or call 494-0667. On Wednesday, April 30, at 7:00 pm, there will be a teach-in on "Enhancing Democracy? Why the U.S. Military Won't Bring Democracy to the World." Speakers include UT History Professor Geoffrey Schad, speaking on Syria; Communications Professor Dana Cloud; and Rahul Mahajan of the Nowar Collective, author of the forthcoming "Full Spectrum Dominance: U.S. Power in Iraq and Beyond" (http://www.sevenstories.com/Book/index.cfm?GCOI=58322100353810). Location: UT Campus, Gearing 105 (Gearing is just west of Welch Hall). On Saturday, May 3, the Showdown in Texas commences (other related events will already be in progress -- see http://www.showdowntx.com/html/schedule.html). The Showdown rally is a demand for human security, not "homeland" security: funding for healthcare, housing, education and jobs; environmental sustainability; protection of civil liberties for citizens, immigrants and indigenous peoples, a moratorium on the death penalty, and an end to US military interventions and war at home and abroad. Starting at 11:00 am at least 6 issue marches starting in different locations (see http://www.showdowntx.com/html/schedule.html for details) will converge at the Capitol at High Noon for an opening rally. This rally will be followed by a mass march past some of the top defense industry contractors located in downtown Austin and end up back at the Capitol for a Festival of Love and Resistance. Except where otherwise noted, events are free and open to the public. Please forward where appropriate. On Sunday, May 4, from 6:00-8:00pm, there will be a teach-in on "The Texas Military-Industrial Complex: Profiting from War and Occupation." This event is associated with the Showdown. Speakers will talk about Lockheed Martin, Dyncorp, the role of oil in the Military-Industrial Complex, and the connection of Texas to the occupations of Palestine and Iraq. Location: UT Campus, Jester Auditorium, 21st and Speedway, across Speedway from the Perry-Castaneda Library. All events are free and open to the public. Please forward where appropriate. In Solidarity, the Nowar Collective From kvanhorn at ksvanhorn.com Tue Apr 29 21:35:01 2003 From: kvanhorn at ksvanhorn.com (Kevin S. Van Horn) Date: Tue, 29 Apr 2003 23:35:01 -0500 Subject: Mike Hawash References: <3EAF0033.2080800@ksvanhorn.com> <20030429204855.D25473@cluebot.com> Message-ID: <3EAF5275.1070209@ksvanhorn.com> Declan McCullagh wrote: >>How can it possibly be treason if there was no declaration of war? >> >If you give "aid" to the "enemies" of the U.S., that would qualify as >treason even absent a declaration of war, in my opinion. [...] > >"Treason against the United States, shall consist only in levying War >against them, or in adhering to their Enemies, giving them Aid and >Comfort. [...]" > "Enemies" are discussed in juxtaposition to "levying War against [the United States]". This implies that "Enemies" of the United States are those with whom the U.S. is at war. Since the Constitution gives Congress the sole power to declare war, I conclude that "Enemies" in this context can only be those entities on whom Congress has declared war. > "No Person shall be convicted of Treason unless on the > Testimony of two Witnesses to the same overt Act, or on Confession in > open Court." This also precludes conviction of Hawash, as there was no overt act, only a claim that his intentions in travelling were to later commit such an act. From adam at cypherspace.org Tue Apr 29 15:36:21 2003 From: adam at cypherspace.org (Adam Back) Date: Tue, 29 Apr 2003 23:36:21 +0100 Subject: [Lucrative-L] double spends, identity agnosticism, and Lucrative In-Reply-To: ; from rah@shipwright.com on Tue, Apr 29, 2003 at 06:02:01PM -0400 References: Message-ID: <20030429233621.A8391604@exeter.ac.uk> There are also existantial forgeries. Ie choose random x, compute y = x^e mod n, now x looks like a signature on y because y^d = x mod n; and when he verifies the verifier will just do x^e and see that it is equal to y. These may also look like valid coins to this code! It's missing a step: the coin should have some structure. So it can't be a hash of a message chosen by the user but hashed by the signer (the normal practical RSA signature) because the server can't see that it or it would be linkable. What digicash did I think is something like c = [x||h(x)]. Then you can reject existential forgeries and unblinded coins because they won't have the right form. (If you look back to the post where I gave a summary of the math, you'll see I included that step.) Adam On Tue, Apr 29, 2003 at 06:02:01PM -0400, R. A. Hettinga wrote: > > --- begin forwarded text > > > From: "Patrick" > To: > Subject: [Lucrative-L] double spends, identity agnosticism, and Lucrative > Date: Tue, 29 Apr 2003 14:46:48 -0600 > Importance: Normal > Sender: owner-lucrative-l at lucrative.thirdhost.com > > > A quick experiment has confirmed the obvious: when a client > reissues a coin at the mint, both the blinded and its unblinded cousin > are valid instruments to the Lucrative mint. > > Example: Alice uses the Mint's API to reissue a one-dollar note, > blinding the coin before getting a signature, and unblinding the > signature afterwards. She's left with both a blinded and a non-blinded > version of the coin. The mint believes they are both valid. Instant, > unlimited inflation. > > I believe the solution to this is to have the mint track both > spent coins and issued coins (that is, it automatically cancels coins it > issues, before the client receives them). The client is left with no > choice but to go through a blinding and unblinding process in order to > have a usable coin. > > This seems to make identity-agnostic cash difficult or > impossible, at least with Lucrative: > http://www.io.com/~cman/agnostic.html, > http://cypherpunks.venona.com/date/1995/09/msg00197.html . > > > Patrick > > > The Lucrative Project: http://lucrative.thirdhost.com --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From ravage at einstein.ssz.com Tue Apr 29 21:57:21 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 29 Apr 2003 23:57:21 -0500 (CDT) Subject: Making Money in Digital Money In-Reply-To: Message-ID: On Mon, 28 Apr 2003, Nomen Nescio wrote: > All this talk about digital payments is a real blast from the past. > > Not just because it's all been said before; but because of how it > demonstrates that cypherpunks are still stuck in the early 1990s as far > as their world view. > Most of these changes have passed the cypherpunks by. All the P2P work, > file sharing, Freenet, IIRC, weblogs, WiFi, open source, open spectrum; > for the most part it's as if none of this exists, in the world of the > cypherpunks. Well, some of them perhaps... > Well, here's a clue, folks: information goods are free today. You can't > build a digital money system on paying for information goods, in a world > where people expect to get their information goods for free. Information wants to be free. Hell, really everything wants to be free. Government and Economics are technologies that mankind developed to sustain their psychologicaly driven societies. Fortunately our societies are becoming technology (ie applied information) driven and this will eventually spell the end of both 'government' and 'economics' as anything resembling what we know today. > I'm not sure whether to laugh or cry when I read someone like James > Donald claiming that MP3s are a micropayment market. Wake up, gramps! > My God, nothing could make you sound more like a clueless refugee from > the 90s than a statement like that. It's a perfect illustration of how > irrelevant the cypherpunks have become. Don't waste your time doing either, spend that energy on working on the issues that you mentioned that you feel or most important to you. Good luck! -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Tue Apr 29 21:58:58 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Tue, 29 Apr 2003 23:58:58 -0500 (CDT) Subject: Inferno: John Brady Kiesling speaking engagement (fwd) Message-ID: ---------- Forwarded message ---------- Date: Mon, 28 Apr 2003 14:00:40 -0500 (CDT) Subject: Inferno: John Brady Kiesling speaking engagement from the NOWAR list: On Tuesday, April 29, from 7:00-9:00 pm, John Brady Kiesling will speak on American Moral Capital and the Misprojection of U.S. Power Kiesling, formerly Foreign Service Officer at the US embassy in Athens, resigned from the State Department in February 2003 to protest the conduct of the Administration's foreign policy and the looming war in Iraq. His letter of resignation to Secretary of State, Colin Powell, was reproduced by the New York Times and rapidly circulated around the globe as a cry for preserving America's endangered international legitimacy. He has just returned to the U.S. from Athens, and will discuss the reasons for his protest and offer insights into the future of American foreign policy. Mr. Kiesling was a diplomat for 20 years, serving in Greece, Armenia, Morocco and Israel. He holds a Masters degree in Ancient History and Mediterranean Archeology from UC Berkeley. Location: UT Campus, Painter Hall 3.02 (on 24th St. between Guadalupe & Speedway) For info: Contact Katharine @ 459-8070 Here is Kiesling's letter of resignation to Colin Powell: http://truthout.org/docs_03/030103A.shtml From ravage at einstein.ssz.com Tue Apr 29 22:00:29 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 30 Apr 2003 00:00:29 -0500 (CDT) Subject: Making Money in Digital Money In-Reply-To: <200304282337.h3SNbriU063578@mailserver3.hushmail.com> Message-ID: On Mon, 28 Apr 2003 barabbus at hushmail.com wrote: > At 10:30 PM 4/28/2003 +0200, Nomen Nescio wrote: > >Anonymous payments for physical goods are pointless because you can't > deliver them anonymously. Everyone has recognized that from the beginning.So > they always envisioned them being used for information goods. > > Nonsense. Once a nym has developed enough reputation some (perhaps many) > people will trust them to deliver physical goods in exchange for anon > DM. Bullshit, the physical goods can be backtracked. Signature Analysis & Traffic Analysis will kill any such attempt in the real world. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Tue Apr 29 22:01:26 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 30 Apr 2003 00:01:26 -0500 (CDT) Subject: what moral obligation? (Re: DRM technology and policy) In-Reply-To: Message-ID: On Mon, 28 Apr 2003, Bill Frantz wrote: > Next they'll want to add a tax to pens and paper. Where the hell do you live? They already do. It's called 'sales tax'. 8.25% here. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Tue Apr 29 22:03:29 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 30 Apr 2003 00:03:29 -0500 (CDT) Subject: Making Money in Digital Money In-Reply-To: Message-ID: On Tue, 29 Apr 2003, R. A. Hettinga wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > At 10:30 PM +0200 4/28/03, Nomen Nescio waxed all Fermi on us and > popped his bulb with the following bit of incandescence: > > >Well, here's a clue, folks: information goods are free today. You > >can't build a digital money system on paying for information goods, > >in a world where people expect to get their information goods for > >free. > > Who here actually believes that digital goods and services are > actually free to produce? Irrelevant and most decidedly -not- the point he was addressing. A weak strawman at best is what you offer. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Tue Apr 29 22:05:13 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 30 Apr 2003 00:05:13 -0500 (CDT) Subject: Making Money in Digital Money In-Reply-To: <3EADA523.22026.C2C672A@localhost> Message-ID: On Mon, 28 Apr 2003, James A. Donald wrote: > If this was true then the proportion of wealth spent on > informational goods, and income earned from informational > goods, would be smaller and smaller. Instead it is larger and > larger. What he was speaking of was the cost to the end user, not the cost to produce. If your point was valid then we wouldn't even be having this discussion, Sony and et al would be smiling not crying. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Tue Apr 29 22:09:35 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 30 Apr 2003 00:09:35 -0500 (CDT) Subject: text analysis In-Reply-To: <3EAE5294.7935CECD@cdc.gov> Message-ID: On Tue, 29 Apr 2003, Major Variola (ret) wrote: > FWIW: There's a paragraph in the current _Science_ that mentions > "Winnow", a program > by some .il researchers that guesses the sex of authors by their > writing. They > claim 80% accuracy on general lit Perhaps impressive, perhaps not. What's the actual percentage ratio? I bet it's decidedly male. > and 74% accuracy on 30 science papers. Considering the known sex ration in science fields one can guess 'male' all the time and hit that level. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From shaddack at ns.arachne.cz Tue Apr 29 17:02:49 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Wed, 30 Apr 2003 02:02:49 +0200 (CEST) Subject: Quarantines may be justified In-Reply-To: Message-ID: On Mon, 28 Apr 2003, Jim Choate wrote: > Signing your anonymous posts is about as dumb as dirt. But this seems to be a pseudonymous post, which is perfectly logical to be signed. From justin at soze.net Tue Apr 29 19:55:36 2003 From: justin at soze.net (Justin) Date: Wed, 30 Apr 2003 02:55:36 +0000 Subject: Quarantines may be justified In-Reply-To: <218179260.20030429211737@realhappy.net> References: <218179260.20030429211737@realhappy.net> Message-ID: <20030430025536.GC17685@dreams.soze.net> At 2003-04-30 01:17 +0000, stuart wrote: > There is a line, that line is harm, not discomfort. My argument is that > there are many things that cause discomfort, that's life, tough shit. > If smoking actually caused harm to people near a smoker, I wouldn't > protest any of these bans. But nobody has been able to prove it does. Of course! How could I have been so blind? Tar is good for your lungs. In support of this, the FDA will release a Minimum Daily Requirements update listing tar as an essential nutrient - with the caveat that it must be breathed in rather than swallowed - any day now. Those pictures of black lungs are nothing to be worried about - black lungs are more efficient, and the tar coating helps shield lungs from harmful substances like oxygen. Nicotine is good for you. All the proof needed is that it calms down hypertensive type-A personalities. The dozens of carcinogenic compounds formed by combustion of plant matter aren't really there. A lab mixup resulted in the misidentification of the compounds produced by burning cigarettes. The compounds are really vitamin A, B6, B12, C, D, E, calcium, "soy protein," and zinc. -- Freedom's untidy, and free people are free to make mistakes and commit crimes and do bad things. They're also free to live their lives and do wonderful things. --Rumsfeld, 2003-04-11 From njohnsn at njohnsn.com Wed Apr 30 04:21:50 2003 From: njohnsn at njohnsn.com (Neil Johnson) Date: Wed, 30 Apr 2003 06:21:50 -0500 Subject: Mike Hawash In-Reply-To: References: Message-ID: <200304300621.50434.njohnsn@njohnsn.com> I read the compliant. It is only 43 pages. Here's what I gathered. It was a quick read, and I fully expect and welcome comments, corrections, and opinions. Of course mixed between these claims is a bunch of stuff about the activities of the "Portland Six", but other than the few assertions below, there is no direct evidence that Hawash committed any of the acts that the "Portland Six" did. Hawash - bought a parka and a backpack at REI. (ooooh, ominous). Hawash filed a quit claim transferring his house into his wife's name. (My dad, a consulting civil engineer, had the deed of our house put solely in my mother's name to protect against losing the house in a liability suit. Hawash could have done it just because he was leaving the country and didn't want any issues in case of airplane accident, kidnapping, etc.) Hawash had his wife open a bank account in her name only and transferred $5K to it. ($5K ?, Later they document that Hawash made around $320K in 2001, and $180K in 2002. Yeah, she could start a new life on that.) Hawash flew to China and returned to the US on exactly the same dates as the other guys. Hawash appears to have stayed in the same building as the other guys. His and the other guy's lodging was in the same building, but different hotels, and the hotel that Hawash had reservations to stay at doesn't have a record of him being there. (Okay, even this does look suspicious to me, but it's definitely seems a little less than "beyond a reasonable doubt".) An "source" claims he/she "thought" he saw someone "maybe" fitting hawash's description "maybe" talking with the other guys at the hotel in China. In searchs of the other guys houses, they found that one of the other guys had a business card with Hawash's phone number on it. Some of the other guys had Hawash's phone number also. One guy mowed Hawash's lawn. Hawash wrote a check for $105 to the guy that mowed Hawash's lawn. The all attended the same Mosque in CA. "Neighbors" reported to the FBI that Hawash became withdrawn after the September 11th attacks, changed his clothing style (From "Western" to "Eastern"), grew a beard, and starting attending the mosque more regularly. (Gee, I saw a lot of press reports about an upsurge of people in the US taking their religious convictions more seriously and attending church more regularly after the Sept 11th attacks, are they potential terrorists too ?). Hawash told others that he was going to China to pursue clients for his software consulting practice. However, his home phone and cell-phone records show he made no phone calls to China in advance of his trip. (Hmmm, "negative evidence", that's a good one. Hellooooo, ever heard of e-mail, snail-mail, or communication via intermediaries ?) Therefore, he MUST be guilty of conspiracy. Even the LE admits that they showed some pictures to one their "sources", and He/She didn't recognize Hawash's picture as being one of the "other guys". Be afraid. VERY afraid. -- Neil Johnson http://www.njohnsn.com PGP key available on request. From eresrch at eskimo.com Wed Apr 30 06:59:06 2003 From: eresrch at eskimo.com (Mike Rosing) Date: Wed, 30 Apr 2003 06:59:06 -0700 (PDT) Subject: Secret Service Buffoons In-Reply-To: <5.2.0.9.0.20030429140154.04496810@pop.ix.netcom.com> Message-ID: On Tue, 29 Apr 2003, John Kelsey wrote: > Unfortunately, dangerous and incompetent are not mutually exclusive. Just > ask the people involved in the Steve Jackson Games case. Or that security > guard that almost got framed by the FBI for the bombing at the Atlanta > Olympics. Yes, dangerous to some individuals, but too incompetent to be dangerous to everyone. Once they cross the line and do become dangerous to everyone maybe things will change. And maybe not. History says people have to suffer a long time before they decide to fight back. Patience, persistence, truth, Dr. mike From eresrch at eskimo.com Wed Apr 30 07:08:24 2003 From: eresrch at eskimo.com (Mike Rosing) Date: Wed, 30 Apr 2003 07:08:24 -0700 (PDT) Subject: Fake News for Big Brother In-Reply-To: Message-ID: On Wed, 30 Apr 2003, Thomas Shaddack wrote: > On Tue, 29 Apr 2003, Nomen Nescio wrote: > > Needless to say, nothing could be further from the letter and spirit > > of the First Amendment. > > I thought the Constitution applies to personal speech, not to corporate or > government speech... > > If I speak for myself, the First Amendment applies. > > But should it apply even to corporations? Are such entities considered to > be persons? Should they have "rights"? Yes, they are considered "persons" in a ficticioius way. so are houses - a house can be confiscated if one person living in it was either a "drug dealer" or "terrorist. The owner need not know, the house is guilty of being an accomplice. Insane? Yes, but what else is new in the US :-) > I suggest an "eye test". If it is theoretically possible to talk with it > eye-to-eye[1], then the Constitution applies. If it isn't possible to talk > with it without a proxy person - a CEO, a spokesperson, etc. - no "higher > rights" apply. > > A non-personal entity should be considered to voluntarily give up its > "right" to existence by an act of knowingly lying. A death penalty - the > entity liquidation - should swiftly follow. You are confusing common sense with law. A very silly thing to do! Patience, persistence, truth, Dr. mike From adam at cypherspace.org Tue Apr 29 23:17:50 2003 From: adam at cypherspace.org (Adam Back) Date: Wed, 30 Apr 2003 07:17:50 +0100 Subject: patriotism considered evil Message-ID: <20030430071750.A8384419@exeter.ac.uk> Some observations on the nouns "Patriot", and "American" etc as they relate to current events. I'm not American. I'm dual-national British/Swiss, I've lived in Britain, Scotland, Canada and now the US. But I have not noticed anyone in Britain, or British press discussing "un-British" behavior, or putting down anyone attempting to ask questions as "un-patriotic". (Ditto for the other countries). Press coverage of Iraq is varyingly biased in those countries (ridiculously so in the US, somewhat in the UK due to their involvement). Opinion in the UK is split, but I don't see those on the pro-side of the fence arguing that those arguing against are unpatriotic or anything. They're just arguing too and fro about issues. Politicians were arguing on both sides and getting some air time. But in the US the issues are buried, it's difficult for detractors of the government line to be heard without getting shouted down as unpatriotic or unamerican. So I guess the American-way used to stand for something -- beliefs in freedoms etc., and that one symbol used historically to express support of those freedoms was the US flag. So I'm supposing this is the historic reason people fly flags, on their cars, houses, businesses etc. (A practice virtually non-existant in any other country I've lived in, or travelled to). But today it seems that the words Patriotic and American (in their negative forms un-American and un-patriotic as) have become sullied and perverted and essentially synonymous with: - unquestioning acceptance of the party line, of the military news-management - put down and outright aggression against anyone who dares to think for themselves, to ask critical questions, to express interest in the truth, or express any interest in hearing both sides of an argument In Britain the Union Jack flag to some extent got co-opted by racist political groups such as the National Front, British National Party. At least to the extent that wearing a t-shirt with a union jack on it might not convey the message you hoped -- particularly if you have a skin-head haircut. In a similar way to me at least the US flag is heading the same way with (different but negative) connotations of blind adherence to the party line. To me as a non-American all these flags fluttering as a symbol of the governmental and military groups who are currently eroding rights and freedoms in the US feels bizarre. The same rights and freedoms that apparently the same flag used to stand for. I guess there are some similarities with the negative cooption of the Union Jack symbol, but I'm wondering if in the US most of the flag flying population even noticed the switcheroo in connotation. Flag flying seems to be more popular than ever. Personally I'm somewhat on the fence about whether the US/British attack on Iraq will end up being a net positive or negative thing for world stability and safety. It was an illegal first strike action against a sovreign country, and it was a highly interventionist activity, but the outcome is less clearly bad though of course we don't know yet what the long term side-effects will be. Anyway I never liked patriotism. What's important in my book is thinking for yourself, thinking critically and forming your own opinions. The governments and prominent political parties in most western democracies are sleaze pits deserving only of contempt. And they are the entities most closely associated with and in control of the actions of a country on any large scale in the international arena. So to me patriotism was always synonymous with support for this system. A corrupt political system which needs to be replaced with anarcho-capitalism for things to get better. Adam From sunder at sunder.net Wed Apr 30 04:58:53 2003 From: sunder at sunder.net (Sunder) Date: Wed, 30 Apr 2003 07:58:53 -0400 (edt) Subject: Osama wins, but the patient dies In-Reply-To: Message-ID: More like the tumor has been removed, but the patient won't survive the chemotherapy following surgery. ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ On Tue, 29 Apr 2003, Tyler Durden wrote: > I don't know if Osama wins... > > The tumor may have been removed but the cancer has metastisized. From sunder at sunder.net Wed Apr 30 05:10:03 2003 From: sunder at sunder.net (Sunder) Date: Wed, 30 Apr 2003 08:10:03 -0400 (edt) Subject: Quarantines may be justified In-Reply-To: <20030430020201.GA978@cybershamanix.com> Message-ID: While we're at it, there should be a law against noisy kids playing in your neighbor's back yard, postmen who step on your lawn, people who water their lawns, people who don't water their lawns, people who wear unfashionable clothes, people who wear too fashionable clothes, people who speak too loud, poeple who speak too low or in a language you can't understand, people who play their stereo's too low or too loud, people who drive over 90 miles per hour, people who drive under 89 miles per hour, people who fart in public, people who wear fur, people who wear polyester, people who wear a tie with short sleved shirts, Yenta's, people who fart in public silently, etc.... Fuck that noise, you intolerant turd. I've a better idea: There should be a law against people that say "there should be a law..." :) ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ On Tue, 29 Apr 2003, Harmon Seaver wrote: > Or in the middle of the day, for that matter. Anyone who's car stereo can be > heard outside the car should be arrested. I like the way they do that in New > Zealand, the fine is progressive, third offense they confiscate the car. They > should do the same with houses. From sunder at sunder.net Wed Apr 30 05:41:38 2003 From: sunder at sunder.net (Sunder) Date: Wed, 30 Apr 2003 08:41:38 -0400 (edt) Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: Message-ID: According to Schneier doing this is a bad idea - (or so I recall from the A.P. book which I've not reread in quite a while - I may be wrong) if you use the same (or similar) cypher. i.e.: blowfish(blowfish(plaintext,key1),key2) is bad, but rsa(blowfish(plaintext,key1),privatekey) is ok. ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ On Wed, 30 Apr 2003, Thomas Shaddack wrote: > Layer the encryptions then. A good ciphertext looks random. Take a > ciphertext and encrypt it again, you get a - say - cipher2text. A > decryption of cipher2text with any key then looks like a potential > ciphertext. > > Is there a hole in this claim? From sunder at sunder.net Wed Apr 30 06:03:43 2003 From: sunder at sunder.net (Sunder) Date: Wed, 30 Apr 2003 09:03:43 -0400 (edt) Subject: Quarantines may be justified In-Reply-To: <20030430144745.GA3552@cybershamanix.com> Message-ID: Then, by extension, I find that when people say "libertarians" in quotes like you said, but not like I said, is no different than having them assult me with their fists. In fact, I find such behavior as direct threats against my life, and instilling terror, so that makes you a terrorist, and possibly an Arab because in my experience, people who put libertarians in menacing quotes like you do were mostly Arabs who hate our freedoms, and that's why they bombed the World Trade Center, and therefore must be harboring WMD's -- and they probably got a huge stash of oil we can grab too - I mean, are torturing their subjects and are anti-freedom, and hate the American Way of Life (Wave Flag Here!) Should we really be able to make up our own definitions and turn things which merely annoy us into crimes? Think about it a bit longer before you reply again. ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ On Wed, 30 Apr 2003, Harmon Seaver wrote: > Being assaulted by others smoke, noise, chemical pollutants or whatever is no > different than being assualted by their fist. I find it more than a little > amusing that most of the so-called "libertarians" I come across haven't the > slightest clue that their "freedom" ends at my personal space. One of the main > reasons I no longer contribute to the LP and probably won't vote for any more LP > candidates, since most libertarians seem to express the attitude of "Fuck > everybody else, I can do whatever I want." From sunder at sunder.net Wed Apr 30 06:04:53 2003 From: sunder at sunder.net (Sunder) Date: Wed, 30 Apr 2003 09:04:53 -0400 (edt) Subject: Fake News for Big Brother In-Reply-To: Message-ID: Um, the guys holding the guns? ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ On Wed, 30 Apr 2003, Thomas Shaddack wrote: > > On Tue, 29 Apr 2003, Sunder wrote: > > Ok fine, but what about the old saw that you can't lie to any law > > enforcement types? > > Who defines what is considered to be the truth? From hseaver at cybershamanix.com Wed Apr 30 07:28:25 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Wed, 30 Apr 2003 09:28:25 -0500 Subject: Fake News for Big Brother In-Reply-To: References: <04f1b0f3a7ccb7467379ba65cf308a57@dizum.com> Message-ID: <20030430142825.GB3480@cybershamanix.com> On Wed, Apr 30, 2003 at 11:09:29AM +0200, Thomas Shaddack wrote: > On Tue, 29 Apr 2003, Nomen Nescio wrote: > > Needless to say, nothing could be further from the letter and spirit > > of the First Amendment. > > I thought the Constitution applies to personal speech, not to corporate or > government speech... > > If I speak for myself, the First Amendment applies. > > But should it apply even to corporations? Are such entities considered to > be persons? Should they have "rights"? > I don't believe that corporations do have rights, or at least they certainly shouldn't. There is a case before the Supreme Court as we speak about whether Nike has a right to freedom of speech. Hopefully they will say no, which would end corporate political contributions, the bane of our current political situation. However, along with freedom of speech, there is also a First Amendment "freedom of the press" as well, so the press, including newspapers, can print anything they want unless it's libel. -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From kelsey.j at ix.netcom.com Wed Apr 30 06:33:37 2003 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Wed, 30 Apr 2003 09:33:37 -0400 Subject: Making Money in Digital Money In-Reply-To: References: Message-ID: <5.2.0.9.0.20030430092307.009d1910@pop.ix.netcom.com> At 12:00 AM 4/29/03 -0400, R. A. Hettinga wrote: ... >So, let me ask you this, folks: the second there *is* money in what >you do, *exactly* what you're doing now for free, do you think you'll >do it for free anymore? I suppose that explains why nobody ever has sex except for prostitutes. Geez, Bob, sometimes you do it because it's *fun*. This is no less true of making music or writing fiction than it is of having sex or cooking or writing code. (Didn't most good programmers start programming because it was more fun than most anything else they could find to do? I did.) >Cheers, >RAH --John Kelsey, kelsey.j at ix.netcom.com PGP: FA48 3237 9AD5 30AC EEDD BBC8 2A80 6948 4CAA F259 From hseaver at cybershamanix.com Wed Apr 30 07:47:45 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Wed, 30 Apr 2003 09:47:45 -0500 Subject: Quarantines may be justified In-Reply-To: References: <20030430020201.GA978@cybershamanix.com> Message-ID: <20030430144745.GA3552@cybershamanix.com> On Wed, Apr 30, 2003 at 08:10:03AM -0400, Sunder wrote: > > While we're at it, there should be a law against noisy kids playing in > your neighbor's back yard, That's quite a bit different than having neighbors who play their stereo so loud you can't hear your own stereo in your house, eh? Which we've experienced quite a bit. Or like when the morons next door had the stereo so loud that the two of us who were working on the roof of my house couldn't even work because we couldn't communicate even when shouting. We don't need a new law for this, the cops seem to be able to ticket them with no problem. Or like the idiots who's car stereo wakes us up at 2am, rattling our windows, even tho it's 20 below out and presumably they have their windows shut as we do ours. We do need new or more effective laws to deal with this however. (rest of nonsense deleted) > > Fuck that noise, you intolerant turd. I've a better idea: There should > be a law against people that say "there should be a law..." :) > Being assaulted by others smoke, noise, chemical pollutants or whatever is no different than being assualted by their fist. I find it more than a little amusing that most of the so-called "libertarians" I come across haven't the slightest clue that their "freedom" ends at my personal space. One of the main reasons I no longer contribute to the LP and probably won't vote for any more LP candidates, since most libertarians seem to express the attitude of "Fuck everybody else, I can do whatever I want." -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From kelsey.j at ix.netcom.com Wed Apr 30 06:49:20 2003 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Wed, 30 Apr 2003 09:49:20 -0400 Subject: Mike Hawash In-Reply-To: <3EAF0033.2080800@ksvanhorn.com> References: Message-ID: <5.2.0.9.0.20030430093834.049e7ae0@pop.ix.netcom.com> ... >Furthermore, since when is mere travel treason? If you could show that >he had actually participated in war against the U.S. -- not just thought >about it, not just taken leg one of a trip that could eventually get him >to a location where he would have an opportunity to do so (if he didn't >change his mind first) -- then there could be a case. It's fun to imagine this in the context of a normal crime.... Prosecutor: "We will show that the defendant was seen in the company of some people who were believed to have been planning to consider going over to South Central, where they might have joined up with the Crips and eventually tried to shoot at some police officers. As it turned out, they didn't make it to South Central (they got lost), and if they had, the Crips would probably have robbed them and sent them scurrying home, but it's clear that these people would have been up to no good, if only they'd been competent enough to manage it. As evidence, we submit this copy of the Autobiography of Malcolm X, and these five rap CDs, found in a midnight raid on his house. We're requesting the death penalty." --John Kelsey, kelsey.j at ix.netcom.com PGP: FA48 3237 9AD5 30AC EEDD BBC8 2A80 6948 4CAA F259 From sunder at sunder.net Wed Apr 30 06:52:14 2003 From: sunder at sunder.net (Sunder) Date: Wed, 30 Apr 2003 09:52:14 -0400 (edt) Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: Message-ID: I'm not sure, but in that case you can use some lame ass cypher like rc4-40 (don't bother with DES as it's too slow) and then use twofish 128 interally, with two unrelated keys. You can even set the key of the weaker one to be an MD5 hash of today's date (at GMT+0) + whatever constants you'd like, since you don't care about it. You don't want to make the weak cypher too easy to brute, but don't make the keys related. (If you crack/brute the outside cypher and the keys are related, you gave the oponents hints about your more important key.) I'm unsure what the reasoning against superencryption (even if the keys are unrelated) is, and weather different key sizes make a difference. You can check Applied Crypto (don't have it infront of me now, sorry.) Or you can try the Handbook of Applied Crypto (different book) - parts of which are online here: http://www.cacr.math.uwaterloo.ca/hac/ ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ On Wed, 30 Apr 2003, Thomas Shaddack wrote: > > According to Schneier doing this is a bad idea - (or so I recall from the > > A.P. book which I've not reread in quite a while - I may be wrong) if you > > use the same (or similar) cypher. i.e.: > > > > blowfish(blowfish(plaintext,key1),key2) is bad, > > but rsa(blowfish(plaintext,key1),privatekey) is ok. > > Does it apply even if it is the same cipher but with different key length > and/or block size? > > I was pondering such "encapsulation" for the situations when The > Government forbids using ciphers stronger than . Then use as strong > one as you wish, and encrypt the result in the legally-weak wrapper. > > Once they ask for your escrowed keys, or bruteforce it, they will figure > out that you are a crypto-lawbreaker - but you will pass a routine > automated screening. And once you catch their interest, you already have > problems anyway. From mv at cdc.gov Wed Apr 30 09:53:19 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 30 Apr 2003 09:53:19 -0700 Subject: [Street Performer Protocol] Re: The Power to Believe, Fripp Message-ID: <3EAFFF7E.E7AFD384@cdc.gov> At 10:12 AM 4/30/03 -0400, Tyler Durden wrote: >"Sometimes god hides." -Fripp > >Fripp rules. Anyone heard "The Power to Believe" yet? Appropriate cover art. I'm glad someone else knows of him. He's actually relevent to this list, viz.: There exists a "King Crimson collector's club" wherein, for $$ up front, you receive CDs in the future which are put together from concert tapes, which he judges to be not worth releasing otherwise. (Some have *awful* audio quality but of interest to fans, some are as high quality as modern studio work but are live performances.) This is different from the Foobar Record Club where the albums already exist. The KCCC is based entirely on reputation. He also leaves the copyrights with the artists, rather than publishers, and has written several rants on this :-) "Contrary to common practice within the music and record industry, both artists own the copyright in their work. " in his own words. (Albeit this is a mere biz model choice, and all are free to implement their own policies, although RF frames it morally.) From timcmay at got.net Wed Apr 30 09:56:38 2003 From: timcmay at got.net (Tim May) Date: Wed, 30 Apr 2003 09:56:38 -0700 Subject: Fake News for Big Brother In-Reply-To: <017401c30f03$86d30240$c71121c2@sharpuk.co.uk> Message-ID: On Wednesday, April 30, 2003, at 02:40 AM, David Howe wrote: > at Tuesday, April 29, 2003 6:16 PM, Tim May was seen > to say: >> I don't see any basis for supporting a "law against lying." >> Unless a contract is involved, lying is just another form of speech. >> >> Should a church which claims that praying to the baby Jesus will save >> one from going to Hell be prosecuted for lying? > They aren't *knowingly* lieing - that is the point. Church types > firmly believe hell exists, > and only pestering a omnipotent and omniscient being (who therefore > already knows what they > wanted to say, and could do something about it if he chose to) will > prevent them visiting it > (as opposed to actually being nice to other people and so forth, which > would at least be > productive) Nonsense. Many preachers and televangelists know they are shucking and jiving their congregations. So? The First Amendment does not have an exception clause for "knowingly lying." > >> Should a newspaper be prosecuted for publishing a claim that the >> Sumerian prediction that Nibiru, aka Planet X, will stop the earth >> from rotating on May 15, 2003? > Nope. but they should be prosecuted if they front-page splash it as > "earth doomed, we have > two weeks to live, there is no hope" and fail to mention that it is a > religious prediction > that the scientific community has a few issues with.... Nonsense. > >> Should someone be prosecuted for saying the Holocaust never happened, >> or was exaggerated greatly by the Jewish lobby? > That is borderline. given that the accepted body of fact admits that > the Holocaust not only > happened, but was pretty much as described by the Jewish lobby, then > any claims that it > didn't happen should be accompanied by pretty convincing evidence. Not > that I think the > Holocaust justifies what is going down with the palastinians, but I > don't think it can be > denied that it actually happened. You really believe the Jew propaganda? The First Amendment does not contain language about how speech "should be accompanied by pretty convincing evidence." Etc. --Tim May From DaveHowe at gmx.co.uk Wed Apr 30 02:04:24 2003 From: DaveHowe at gmx.co.uk (David Howe) Date: Wed, 30 Apr 2003 10:04:24 +0100 Subject: what moral obligation? (Re: DRM technology and policy) References: Message-ID: <005d01c30ef7$a63c8180$c71121c2@sharpuk.co.uk> at Tuesday, April 29, 2003 6:06 PM, Tim May wrote: > On Tuesday, April 29, 2003, at 06:23 AM, David Howe wrote: >> adopted in america the same year it was agreed (1992) >> but AFAIK restricted just to digital media (so CDR, >> DVD and minidisk) - If there is a media tax on analog recording >> I am not aware of where it is established > Home (Audio) Recording Act of 1992. Is the 92 law I was referring to yes - but that covers only digital media. From DaveHowe at gmx.co.uk Wed Apr 30 02:07:42 2003 From: DaveHowe at gmx.co.uk (David Howe) Date: Wed, 30 Apr 2003 10:07:42 +0100 Subject: what moral obligation? (Re: DRM technology and policy) References: <3EAEAA1F.7A160334@cdc.gov> Message-ID: <017301c30f03$86a848c0$c71121c2@sharpuk.co.uk> at Tuesday, April 29, 2003 5:36 PM, Major Variola (ret) was seen to say: > At 02:23 PM 4/29/03 +0100, David Howe wrote: >> Yup. and copy protected audio "non cds" such as the more recent >> album releases are actually an attempt to prevent you using your >> fair use rights, which are of course legal, without performing an >> illegal circumvention of the protection under the terms > of the DMCA. > Actually, non-standard CDs sold with the CD logo are fraudulent, since > they violate a published standard which the logo implies. > I'm surprised this avenue hasn't been taken legally. It has in the uk - no protected cd in the uk uses the cd logo. Doesn't make it any easier though, as that is on the back of the case, and the cases are stacked with all the real-cd cases in the display racks; if you decide you don't want a not-cd, having discovered it is one on examination of the case, its not as if you have a legal alternative; you can't even buy it, download the tracks on [insert p2p here] and claim fair use, as that doesn't exist in the UK. From camera_lumina at hotmail.com Wed Apr 30 07:12:00 2003 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 30 Apr 2003 10:12:00 -0400 Subject: The Power to Believe Message-ID: "Sometimes god hides." -Fripp Fripp rules. Anyone heard "The Power to Believe" yet? Appropriate cover art. -TD >From: "Major Variola (ret)" >To: cypherpunks at lne.com >Subject: Re: Mike Hawash, Rev N. >Date: Tue, 29 Apr 2003 19:51:03 -0700 > >At 07:06 PM 4/29/03 -0700, Tim May wrote: > >Gee, I also have a beard, and a copy of the Koran, > >And if you don't personally have hypochlorites, you >know people who do. > > >I hope the Fedz never learn that I have ricin and > >There are Castor plants on the Central Expresway >north of Santa Clara. Clearly within your grasp. >And that lye you supposedly use to clear your >drains, yeah right. > > >sarin formulas on my computer, > >So, that tin-flouride in your so-called toothpaste is for >apatite-strengthening? Yeah, right. This boy was >on the same terrorist mailing list as a known >chem-terrorist, and IRS-unslave JBell. And >known antisocialite, JY. > >And you probably have isopropanol in your >so-called "bathroom". Lithium metal in so-called >"batteries". Speed-precursors in so-called >"decongestants". Radioisotopes in so-called >"salt-substitutes". And allah knows how many >Ca-illegal rice flails. > >"There's no way to rule innocent men. The only power any government has is >the power to crack down on criminals. Well, when there aren't enough >criminals, one makes them. One declares so many things to be a crime that >it becomes impossible to live without breaking laws." >-- Ayn Rand, "Atlas Shrugged" > >--- >SARS is Alallah's way of saying there are too many chinese, like HIV is >is the polytheistist way of saying too many Africans. And Anthrax is >a Federalist way of saying too many mailmen. Hogg taught percolation, >but no one was listening. > >"Sometimes god hides." -Fripp _________________________________________________________________ The new MSN 8: smart spam protection and 2 months FREE* http://join.msn.com/?page=features/junkmail From DaveHowe at gmx.co.uk Wed Apr 30 02:40:27 2003 From: DaveHowe at gmx.co.uk (David Howe) Date: Wed, 30 Apr 2003 10:40:27 +0100 Subject: Fake News for Big Brother References: <4C69C844-7A66-11D7-ADBC-000A956B4C74@got.net> Message-ID: <017401c30f03$86d30240$c71121c2@sharpuk.co.uk> at Tuesday, April 29, 2003 6:16 PM, Tim May was seen to say: > I don't see any basis for supporting a "law against lying." > Unless a contract is involved, lying is just another form of speech. > > Should a church which claims that praying to the baby Jesus will save > one from going to Hell be prosecuted for lying? They aren't *knowingly* lieing - that is the point. Church types firmly believe hell exists, and only pestering a omnipotent and omniscient being (who therefore already knows what they wanted to say, and could do something about it if he chose to) will prevent them visiting it (as opposed to actually being nice to other people and so forth, which would at least be productive) > Should a newspaper be prosecuted for publishing a claim that the > Sumerian prediction that Nibiru, aka Planet X, will stop the earth > from rotating on May 15, 2003? Nope. but they should be prosecuted if they front-page splash it as "earth doomed, we have two weeks to live, there is no hope" and fail to mention that it is a religious prediction that the scientific community has a few issues with.... > Should someone be prosecuted for saying the Holocaust never happened, > or was exaggerated greatly by the Jewish lobby? That is borderline. given that the accepted body of fact admits that the Holocaust not only happened, but was pretty much as described by the Jewish lobby, then any claims that it didn't happen should be accompanied by pretty convincing evidence. Not that I think the Holocaust justifies what is going down with the palastinians, but I don't think it can be denied that it actually happened. > The answer to all libertarians, and the answer embodied in the First > Amendment to the United States Constitution, is "No." If there were no distinction between what could be presented as fact, and what couldn't, a lot of marketers would be a lot happier. Of course, I am writing from a UK viewpoint, but I suspect that the US has similar rules about advertising that (for example) claims that a given car can get 250km on a single tank of fuel, when it is lucky to get 25... > Of course, the idea of reputation matters. And--Declan can correct me > or clarify things--newspapers and perhaps even reporters have > professional organizations and other "standards and practices" type of > seals of approval. Something like "This newspaper is a member of the > National Assocation for the Advancement of Uncolored Journalism," or > somesuch. As I understand it, the idea of "impartial journalism" was a marketing gimmick - to sell wire news to local papers without having to adjust it to the local "slant" > Probably the Weekly World News ("Baby Eats Own Hand, Aliens > Suspected") would not be a member in good standing of the NAAUJ. "best investigative journalism on the planet" - MiB ;) > And the newspaper which published the deliberately false arson story > should at the least face suspension. Or the police could have contracted for an extra page (small batch, a few dozen copies) that they then substitute for the real one in the editions sent to the criminal concerned. > This doesn't mean government should be involved in deciding the answer > to Pilate's famous question, "What is truth?" doesn't mean they can't answer the question "what is a *deliberate* lie" From timcmay at got.net Wed Apr 30 10:41:41 2003 From: timcmay at got.net (Tim May) Date: Wed, 30 Apr 2003 10:41:41 -0700 Subject: Mike Hawash In-Reply-To: <5.2.0.9.0.20030430093834.049e7ae0@pop.ix.netcom.com> Message-ID: <00B000C5-7B33-11D7-ADBC-000A956B4C74@got.net> On Wednesday, April 30, 2003, at 06:49 AM, John Kelsey wrote: > ... >> Furthermore, since when is mere travel treason? If you could show >> that he had actually participated in war against the U.S. -- not just >> thought about it, not just taken leg one of a trip that could >> eventually get him to a location where he would have an opportunity >> to do so (if he didn't change his mind first) -- then there could be >> a case. > > It's fun to imagine this in the context of a normal crime.... > > Prosecutor: "We will show that the defendant was seen in the company > of some people who were believed to have been planning to consider > going over to South Central, where they might have joined up with the > Crips and eventually tried to shoot at some police officers. As it > turned out, they didn't make it to South Central (they got lost), and > if they had, the Crips would probably have robbed them and sent them > scurrying home, but it's clear that these people would have been up to > no good, if only they'd been competent enough to manage it. As > evidence, we submit this copy of the Autobiography of Malcolm X, and > these five rap CDs, found in a midnight raid on his house. We're > requesting the death penalty." > And several months later: "We are prosecuting the defense attorney for the man convicted last month of thinking about planning to possibly travel to South Central to try to join a gang. His crime was that he whispered to his clients during meetings in the jail, preventing us from tape-recording what they they said. Inasmuch as his client was convicted as part of the War on Some Drugs and has been transferred to our military prison in Guantanamo Bay, we are charging this attorney as an "illegal combatant" in this War on Some Drugs." --Tim May From timcmay at got.net Wed Apr 30 10:45:03 2003 From: timcmay at got.net (Tim May) Date: Wed, 30 Apr 2003 10:45:03 -0700 Subject: Fake News for Big Brother In-Reply-To: <01a801c30f07$addc75c0$c71121c2@sharpuk.co.uk> Message-ID: <78FEFA6E-7B33-11D7-ADBC-000A956B4C74@got.net> On Wednesday, April 30, 2003, at 04:00 AM, David Howe wrote: > at Tuesday, April 29, 2003 6:21 PM, Tim May was seen > to say: >> If the state has the authority to classify words as "marketing" or >> "news" or "propaganda," all is basically lost. > It is difficult to define a particular piece of data as one of the > three as an abstract. > however, you *can* make the distinction between marketing/propaganda > and news (although it > is difficult) and the concept of *not* deliberately lieing for > political or financial gain > isn't really a hard one. > I strongly disagree. And, fortunately, the First Amendment has none of the language you apparently think is in it, the stuff about "lying" and "political or financial gain." I acknowledge that things are quite different in the U.K., an adhocracy with virtually no codified rights, but we are quite clearly here talking about the U.S. situation, as evidenced in several of the messages. --Tim May "Dogs can't conceive of a group of cats without an alpha cat." --David Honig, on the Cypherpunks list, 2001-11 From shaddack at ns.arachne.cz Wed Apr 30 01:47:09 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Wed, 30 Apr 2003 10:47:09 +0200 (CEST) Subject: Fake News for Big Brother In-Reply-To: Message-ID: On Tue, 29 Apr 2003, Sunder wrote: > Ok fine, but what about the old saw that you can't lie to any law > enforcement types? Who defines what is considered to be the truth? From ptrei at rsasecurity.com Wed Apr 30 07:52:59 2003 From: ptrei at rsasecurity.com (Trei, Peter) Date: Wed, 30 Apr 2003 10:52:59 -0400 Subject: Finder's Keepers, Smartcards, Anon Cash [Re: double-spending prevention w. spent coins] Message-ID: > Jim Choate[SMTP:ravage at einstein.ssz.com] > > On Sat, 26 Apr 2003, Major Variola (ret) wrote: > > > One of the attributes that a digital currency system MAY have is > > whether someone who finds lost currency may spend it. Conventional > > cash has this property. So do tickets to performances, lottery > > tickets, bus tokens, prepaid phone cards etc.. > > A (tamper-resistant) smartcard may have this > > 'finders keepers' property, or may not. > > And anyone with two halves of a clue to rub together will only use a > system that -won't- allow this. Who in their right mind is going to give > money away... > So Jim, you have no coins in your pocket, or bills in your wallet? The 'Finders-Keepers' attribute greatly enhances non-traceability, while putting the onus for security on the holder. It's a tradeoff, like so many things. Peter Trei From shaddack at ns.arachne.cz Wed Apr 30 02:09:29 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Wed, 30 Apr 2003 11:09:29 +0200 (CEST) Subject: Fake News for Big Brother In-Reply-To: <04f1b0f3a7ccb7467379ba65cf308a57@dizum.com> Message-ID: On Tue, 29 Apr 2003, Nomen Nescio wrote: > Needless to say, nothing could be further from the letter and spirit > of the First Amendment. I thought the Constitution applies to personal speech, not to corporate or government speech... If I speak for myself, the First Amendment applies. But should it apply even to corporations? Are such entities considered to be persons? Should they have "rights"? I suggest an "eye test". If it is theoretically possible to talk with it eye-to-eye[1], then the Constitution applies. If it isn't possible to talk with it without a proxy person - a CEO, a spokesperson, etc. - no "higher rights" apply. A non-personal entity should be considered to voluntarily give up its "right" to existence by an act of knowingly lying. A death penalty - the entity liquidation - should swiftly follow. [1] Applies to blind people and people born without eyes as well; the spirit of what I say should be clear, and whoever would want to nitpick on such piddly details is a stinkin' lawyer type. From timcmay at got.net Wed Apr 30 11:15:50 2003 From: timcmay at got.net (Tim May) Date: Wed, 30 Apr 2003 11:15:50 -0700 Subject: patriotism considered evil In-Reply-To: <20030430071750.A8384419@exeter.ac.uk> Message-ID: On Tuesday, April 29, 2003, at 11:17 PM, Adam Back wrote: > Some observations on the nouns "Patriot", and "American" etc as they > relate to current events. > > I'm not American. I'm dual-national British/Swiss, I've lived in > Britain, Scotland, Canada and now the US. But I have not noticed > anyone in Britain, or British press discussing "un-British" behavior, > or putting down anyone attempting to ask questions as "un-patriotic". Part of the problem has been the longer time it takes the Brits to establish what is "un-British." It takes more time for marching orders to propagate from Washington to London, so there's this delay. And sometimes the signals with Washington get crossed. > (Ditto for the other countries). Press coverage of Iraq is varyingly > biased in those countries (ridiculously so in the US, somewhat in the > UK due to their involvement). Opinion in the UK is split, but I don't > see those on the pro-side of the fence arguing that those arguing > against are unpatriotic or anything. A quick search of the news with Google turns up articles like this one: "Galloway, a member of Prime Minister Tony Blair's ruling Labour Party, is currently at his holiday home in Portugal writing a book about the Iraq war. He has issued a string of forceful denials from there. Labour Party officials are already examining controversial remarks by Galloway who called Blair and President George W Bush "wolves" for attacking Iraq. The Scottish MP, a constant target of tabloid attacks, has been dubbed MP for Baghdad Central for his opposition to the Iraq war." --end excerpt-- It seems to me that the tabloids and others calling someone "MP for Baghdad Central" is a counterexample to your claim. Of course, this isn't a survey of the _prevalence_ or _magnitude_ of the claims, but it's an example that at least some Brits on the pro-war side are using slurs about the patriotism of the opponents. Also, note that Sky News in the U.K. is part of Rupert Murdoch's empire, and Murdoch is the controlling force behind Fox. "Fair and balanced" = the most blatantly jingoistic television network visible on American t.v. Brits can be as jingoistic as Americans. Football (soccer in the States) riots are another example. --Tim May "As my father told me long ago, the objective is not to convince someone with your arguments but to provide the arguments with which he later convinces himself." -- David Friedman From mv at cdc.gov Wed Apr 30 11:19:53 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 30 Apr 2003 11:19:53 -0700 Subject: Anonglish (was: Re: Authenticating Meat) Message-ID: <3EB013C8.80C17887@cdc.gov> At 01:40 PM 4/30/03 -0400, Trei, Peter wrote: >> blowfish(blowfish(plaintext,key1),key2) is bad, >> but rsa(blowfish(plaintext,key1),privatekey) is ok. > >It really depends on the cipher. If the cipher is a group, then case 1 is >bad - since > >> blowfish(blowfish(plaintext,key1),key2) = blowfish(plaintext, key3) >> >Some ciphers, such as DES, are not groups. This is why double >and triple DES are stronger than single DES. Also if you don't trust a given algorithm then chaining it doesn't help. You can also increase robustness by adding noise, at a cost of bandwith, see US patent 6,351,539, which both chains dissimilar ciphers and adds noise (doubling bandwidth requirements). From timcmay at got.net Wed Apr 30 11:52:05 2003 From: timcmay at got.net (Tim May) Date: Wed, 30 Apr 2003 11:52:05 -0700 Subject: Fake News for Big Brother In-Reply-To: <20030430142825.GB3480@cybershamanix.com> Message-ID: On Wednesday, April 30, 2003, at 07:28 AM, Harmon Seaver wrote: > On Wed, Apr 30, 2003 at 11:09:29AM +0200, Thomas Shaddack wrote: >> On Tue, 29 Apr 2003, Nomen Nescio wrote: >>> Needless to say, nothing could be further from the letter and spirit >>> of the First Amendment. >> >> I thought the Constitution applies to personal speech, not to >> corporate or >> government speech... >> >> If I speak for myself, the First Amendment applies. >> >> But should it apply even to corporations? Are such entities >> considered to >> be persons? Should they have "rights"? >> > I don't believe that corporations do have rights, or at least they > certainly > shouldn't. There is a case before the Supreme Court as we speak about > whether > Nike has a right to freedom of speech. Hopefully they will say no, > which would > end corporate political contributions, the bane of our current > political > situation. > However, along with freedom of speech, there is also a First > Amendment > "freedom of the press" as well, so the press, including newspapers, > can print > anything they want unless it's libel. This debate some of you are having about whether "free speech" applies to corporations as well as individuals, or only to individuals, or whether it covers "political or financial gain," and so on, is silly. The First Amendment says nothing about "individuals" or "political or financial gain." In fact, what it says is quite simple, and should be memorized by all who wish to discuss it" -- Amendment I Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances. -- That's what it says. It says "Congress shall make no law..." It does NOT say "Individuals get to say what they wish, provided it is not for financial or political gain, or, like, is a lie and stuff. And corporations....fuhgettabout it!" It says Congress shall make no law abridging the freedom of speech. "No law" means no law. And if there is no law, there cannot be a law which applies to corporations consisting of one person (they exist) or of 30 people of 3000 people. Congress cannot make a low abridging Nike's freedom of speech. (Some statists have argued for an "actual malice" exception to the First Amendment, e.g., in "N.Y. Times v. Sullivan" and later cases. I take the view that the First means precisely what it says it means: "No law.") --Tim May "He who fights with monsters might take care lest he thereby become a monster. And if you gaze for long into an abyss, the abyss gazes also into you." -- Nietzsche From DaveHowe at gmx.co.uk Wed Apr 30 04:00:07 2003 From: DaveHowe at gmx.co.uk (David Howe) Date: Wed, 30 Apr 2003 12:00:07 +0100 Subject: Fake News for Big Brother References: Message-ID: <01a801c30f07$addc75c0$c71121c2@sharpuk.co.uk> at Tuesday, April 29, 2003 6:21 PM, Tim May was seen to say: > If the state has the authority to classify words as "marketing" or > "news" or "propaganda," all is basically lost. It is difficult to define a particular piece of data as one of the three as an abstract. however, you *can* make the distinction between marketing/propaganda and news (although it is difficult) and the concept of *not* deliberately lieing for political or financial gain isn't really a hard one. > And "freedom of the press" is indeed limited to those with presses, > except presses have long been a nonbarrier to speech, given the > incredible low cost of mimeograph machines, offset printing, laser > printing, and so on. And now we have the Net. *lol* Make two statements. put one of them on CNN, the BBC, and all the other "official" news outlets, broadcast it on the commerical tv/radio channels and internationally recognised print media take the other and do whatever else you want with it - publish it all over the web, copy off a few hundred (or thousand) sheets and hand them out in the street; set up a small radio station and broadcast it to your local neighbourhood, take a megaphone and shout it out in public places. Which of the two will 98% of the public believe, and which will be derided as a crackpot theory (hint, the answer isn't "whichever is true") remember that more than half of americans are firmly convinced saddam was responsible for 9/11 - despite the media circus blaming it on OBL last year (and they will believe something else next year, when the US attacks yet another middle east country) From hseaver at cybershamanix.com Wed Apr 30 10:01:56 2003 From: hseaver at cybershamanix.com (Harmon Seaver) Date: Wed, 30 Apr 2003 12:01:56 -0500 Subject: Quarantines may be justified In-Reply-To: References: <20030430144745.GA3552@cybershamanix.com> Message-ID: <20030430170156.GA3592@cybershamanix.com> On Wed, Apr 30, 2003 at 09:03:43AM -0400, Sunder wrote: > (more idiotic bullshit deleted) > > > Should we really be able to make up our own definitions and turn things > which merely annoy us into crimes? Think about it a bit longer before > you reply again. > "merely annoy"? Excessive noise, or smoke, or chemical pollutants are not mere annoyances, they are detrimental to health and safety and are physical assaults, and anyone has a moral right, at least, to use force to protect themselves from such. If it weren't for the fact that I'd get arrested, I'd certainly have no moral qualms whatsoever about blowing away a smoker on the street, or the guy with the loud stereo, or the farmer next door whose ag chemicals ended up in my well water. People who are that inconsiderate of others don't belong in the gene pool. And what I'm seeing a lot of lately are people who profess to be libertarians who see nothing wrong with forcing others to smoke along with them, or listen to their choice of music, or disturb other people's peace and quietude, or even forcefully poison other people's land and water. Especially when it's done in the name of profit, eh? The LP's stance on the Iraq war was more or less the last straw for me, but certainly the attitudes of people like yourself have helped me to see the error of my ways, i.e., voting libertarian the last 15 years or so. And, of course, the statements from idots like Hettinga rejoicing in the looting of Iraq's museums so "it can all go to the highest bidder" helped a lot. It's really funny how many people I've talked to recently who were all excited about the libertarian freestate movement until I told them that those people would sell off all the public parks to the highest bidder, not to mention trash all the environmental laws. But it's all pretty irrelevant anyway, as is the LP. Just another dead horse that very few people will ever vote for. Crypto-anarchy might actually get somewhere, but the LP won't. > > On Wed, 30 Apr 2003, Harmon Seaver wrote: > > > Being assaulted by others smoke, noise, chemical pollutants or whatever is no > > different than being assualted by their fist. I find it more than a little > > amusing that most of the so-called "libertarians" I come across haven't the > > slightest clue that their "freedom" ends at my personal space. One of the main > > reasons I no longer contribute to the LP and probably won't vote for any more LP > > candidates, since most libertarians seem to express the attitude of "Fuck > > everybody else, I can do whatever I want." > -- Harmon Seaver CyberShamanix http://www.cybershamanix.com From sunder at sunder.net Wed Apr 30 09:11:02 2003 From: sunder at sunder.net (Sunder) Date: Wed, 30 Apr 2003 12:11:02 -0400 (edt) Subject: Quarantines may be justified In-Reply-To: <20030430170156.GA3592@cybershamanix.com> Message-ID: Aparently you didn't think a bit longer before replying. Might I ask, where have I ever professed to be a libertarian, or for that matter affiliated with ANY political party? You've missed the forest for the pine needles. Congrats, you've joined Choate in my filter list. :) Enjoy your stay. ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ On Wed, 30 Apr 2003, Harmon Seaver wrote: > On Wed, Apr 30, 2003 at 09:03:43AM -0400, Sunder wrote: > > > (more idiotic bullshit deleted) > > > > > > > Should we really be able to make up our own definitions and turn things > > which merely annoy us into crimes? Think about it a bit longer before > > you reply again. > > > > "merely annoy"? Excessive noise, or smoke, or chemical pollutants are not > mere annoyances, they are detrimental to health and safety and are physical > assaults, and anyone has a moral right, at least, to use force to protect > themselves from such. If it weren't for the fact that I'd get arrested, I'd > certainly have no moral qualms whatsoever about blowing away a smoker on the > street, or the guy with the loud stereo, or the farmer next door whose ag > chemicals ended up in my well water. People who are that inconsiderate of others > don't belong in the gene pool. > And what I'm seeing a lot of lately are people who profess to be > libertarians who see nothing wrong with forcing others to smoke along with them, > or listen to their choice of music, or disturb other people's peace and > quietude, or even forcefully poison other people's land and water. Especially > when it's done in the name of profit, eh? > The LP's stance on the Iraq war was more or less the last straw for me, but > certainly the attitudes of people like yourself have helped me to see the error > of my ways, i.e., voting libertarian the last 15 years or so. And, of course, > the statements from idots like Hettinga rejoicing in the looting of Iraq's > museums so "it can all go to the highest bidder" helped a lot. > It's really funny how many people I've talked to recently who were all > excited about the libertarian freestate movement until I told them that those > people would sell off all the public parks to the highest bidder, not to mention > trash all the environmental laws. > But it's all pretty irrelevant anyway, as is the LP. Just another dead horse > that very few people will ever vote for. Crypto-anarchy might actually get > somewhere, but the LP won't. > > > > > > On Wed, 30 Apr 2003, Harmon Seaver wrote: > > > > > Being assaulted by others smoke, noise, chemical pollutants or whatever is no > > > different than being assualted by their fist. I find it more than a little > > > amusing that most of the so-called "libertarians" I come across haven't the > > > slightest clue that their "freedom" ends at my personal space. One of the main > > > reasons I no longer contribute to the LP and probably won't vote for any more LP > > > candidates, since most libertarians seem to express the attitude of "Fuck > > > everybody else, I can do whatever I want." > > > > -- > Harmon Seaver > CyberShamanix > http://www.cybershamanix.com From sunder at sunder.net Wed Apr 30 09:24:30 2003 From: sunder at sunder.net (Sunder) Date: Wed, 30 Apr 2003 12:24:30 -0400 (edt) Subject: Mike Hawash In-Reply-To: <00B000C5-7B33-11D7-ADBC-000A956B4C74@got.net> Message-ID: What trail? You think "Mike" will ever see the light of day? If there's going to be a trial it will be in secret - by a kangaroo shadow court, and it will be classified. If he's found innocent, then he'll probably be thrown in jail as he was exposed to classified information which we couldn't allow to leak out. So he'll be a guest of Uncle Sam, oh, excuse me, the Shadow Uncle Sam, for a long time. On the other hand, if they do cave in and let him go, they'll have to admit that they were wrong, and that would set precendence for future such releases, and the whole disappearing program will be at risk, so they'll have to stick to their guns and hang on to him. It is not enough to fear Big Brother, you must learn to love him. ----------------------Kaos-Keraunos-Kybernetos--------------------------- + ^ + :NSA got $20Bil/year |Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ <--*-->:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. --------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------ On Wed, 30 Apr 2003, Tim May wrote: > On Wednesday, April 30, 2003, at 06:49 AM, John Kelsey wrote: > > > Prosecutor: "We will show that the defendant was seen in the company > > of some people who were believed to have been planning to consider > > going over to South Central, where they might have joined up with the > And several months later: > > "We are prosecuting the defense attorney for the man convicted last > month of thinking about planning to possibly travel to South Central to > try to join a gang. His crime was that he whispered to his clients > during meetings in the jail, preventing us from tape-recording what > they they said. Inasmuch as his client was convicted as part of the War > on Some Drugs and has been transferred to our military prison in > Guantanamo Bay, we are charging this attorney as an "illegal combatant" > in this War on Some Drugs." From declan at well.com Wed Apr 30 09:36:20 2003 From: declan at well.com (Declan McCullagh) Date: Wed, 30 Apr 2003 12:36:20 -0400 Subject: Mike Hawash In-Reply-To: <3EAF5275.1070209@ksvanhorn.com> References: <3EAF0033.2080800@ksvanhorn.com> <20030429204855.D25473@cluebot.com> Message-ID: <5.2.0.9.0.20030430123607.0113ca08@mail.well.com> My reading is the opposite. That's why there's an "or" instead of an "and" there. --Declan At 11:35 PM 4/29/2003 -0500, Kevin S. Van Horn wrote: >"Enemies" are discussed in juxtaposition to "levying War against [the >United States]". This implies >that "Enemies" of the United States are those with whom the U.S. is at >war. Since the Constitution >gives Congress the sole power to declare war, I conclude that "Enemies" in >this context can only be >those entities on whom Congress has declared war. From rah at shipwright.com Wed Apr 30 09:38:35 2003 From: rah at shipwright.com (R. A. Hettinga) Date: Wed, 30 Apr 2003 12:38:35 -0400 Subject: Making Money in Digital Money In-Reply-To: <5.2.0.9.0.20030430092307.009d1910@pop.ix.netcom.com> References: <5.2.0.9.0.20030430092307.009d1910@pop.ix.netcom.com> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 9:33 AM -0400 4/30/03, John Kelsey wrote: >Geez, Bob, sometimes you do it because it's *fun*. Agreed. However, try have fun all your life and not getting paid for it. Artists are a good example, but you can't do that all your life without money either. There aren't a whole lot of landed aristocracy in the world, for instance, or even those who live on trust funds. Or who are even retired. :-). (Apropos of nothing, some of the worst jobs in the world are those where one is getting paid to have "fun". Prostitution and bartending, come to mind...) Yes, people try to do work that's fun. But the point is to get *paid*, right? Like rock and roll, the minute it is possible to get paid to do something you like, a vast majority of thinking humans would rather get paid than *continue* to it for free. Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 - not licensed for commercial use: www.pgp.com iQA/AwUBPq/8AcPxH8jf3ohaEQKNOwCg9SHBAV7S4hLBn39cykppyAg+AIYAn3aO DvJKrybD/u6Ts8xpOwxNqUw8 =QVQM -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From jei at cc.hut.fi Wed Apr 30 03:03:59 2003 From: jei at cc.hut.fi (Jei) Date: Wed, 30 Apr 2003 13:03:59 +0300 (EET DST) Subject: Privilege Revoked Message-ID: http://www.seattleweekly.com/features/0317/news-parrish.php Privilege Revoked The government says it can pry into the attorney-client relationship all it wants. by Geov Parrish Lynne Stewart, a New York human-rights lawyer with a taste for radical politics, is accustomed to representing unpopular clients. She never dreamed it would become illegal. Stewart was in Seattle on Monday as part of a national campaign to drum up support-not for a client, but for her own case. Stewart was a member of the court-appointed defense team for Sheikh Omar Abdel Rahman, who is serving a life sentence in connection with the first World Trade Center bombing in 1993. After his conviction, Stewart continued as one of the lawyers representing Abdel Rahman. The Seattle visit came just over a year after her arrest April 8, 2002, when she was taken from her home without warning. Federal agents combed through her office, seizing files on all of her cases, and Attorney General John Ashcroft proudly announced that Stewart had been charged in a four-count criminal indictment with aiding and abetting a terrorist organization-solely for her work in representing Abdel Rahman. Stewart's case, now winding its way through pretrial motions toward a January trial, stands as a critical test for the Bush administration's newly reserved right to violate lawyer-client confidentiality in order to wage the war on terror. It also has a significant First Amendment component. Stewart's indictment charges her with discussing Abdel Rahman's case with a Reuters reporter-even though no gag order barred her from doing so; with talking while an interpreter was speaking with her client during a consultation in his prison cell, thereby preventing the Justice Department from taping their conversation in Arabic; and with allowing the interpreter and client to speak in Arabic about nonlegal matters. If convicted, she faces 40 years in prison. THE CHARGES STRIKE at the heart of the U.S. Constitution's Sixth Amendment guarantee that all people accused of a crime are entitled to effective representation by an attorney. Courts have long held that attorney-client confidentiality is essential to that right; without the ability to speak freely about what they have, and have not, done, defendants are severely impaired from learning their legal status and options, and attorneys cannot mount the best defense. But Stewart's case has broader implications. In the future, attorneys will be less willing to represent clients like Abdel Rahman. And since Stewart's indictment, Ashcroft has gone even further, declaring noncitizens, and later, U.S. citizens as well, "enemy noncombatants" so as to hold them indefinitely without charges, denying access to any attorney at all. Whether or not the "enemy noncombatant" ruse is eventually ruled unconstitutional, Stewart's case risks setting a precedent that could literally destroy an accused terrorist's right to counsel-while allowing the government to choose who qualifies as a "terrorist." Even before 9/11, several federal provisions allowed investigators to violate attorney-client privilege: when the state had reason to believe the attorney and client were complicit in criminal behavior; as a court-approved part of international espionage; or if a court barred incarcerated clients from communicating with the outside world, including their attorneys, about nonlegal matters. BUT ASHCROFT'S provisions, announced and implemented without public notice or comment less than three weeks after 9/11, are far broader-allowing the monitoring of attorney-client conversations without a court order or supervision or even the suspicion of criminal behavior by the attorney, if the client is accused of terrorism. The regulation allows surveillance "to the extent determined to be reasonably necessary for the purpose of deterring future acts of violence or terrorism." The Department of Justice alone does the determining. Among other things, such monitoring allows the government complete access to everything the defense knows and every strategy the defense plans. It raises the possibility that attorneys could be called to testify against their clients or that attorneys could be charged for withholding information on a crime from investigators. Attorneys' personal jeopardy creates an impossible conflict of interest with their professional duty to fully represent their clients. The government, at its leisure, can target lawyers-ones like Stewart, with a long history of representing unpopular clients, or like the lead attorney in Stewart's defense, Michael Tigar, famed for saving Oklahoma City bomber Terry Nichols from execution. And Ashcroft's regulation, if upheld, sets a precedent that state and local jurisdictions can rush to emulate. Lynne Stewart is a guinea pig-a chance for the Bush administration to see how far it can push its evisceration of the Bill of Rights. The attack on attorney representation is only one of a staggering number of its post-9/11 assaults on the Constitution, but it's one of the most important. Invariably, the least sympathetic among us-the accused terrorists and the radical lawyers-are the first to lose basic rights. The rest of us follow. gparrish at seattleweekly.com From fb at intldef.org Wed Apr 30 10:08:57 2003 From: fb at intldef.org (FB`) Date: Wed, 30 Apr 2003 13:08:57 -0400 Subject: Fake News for Big Brother Message-ID: <008401c30f3b$30042150$1901a8c0@ybsweb> On Wed, April 30, 2003 10:28 AM, Harmon Seaver wrote: > On Wed, Apr 30, 2003 at 11:09:29AM +0200, Thomas Shaddack wrote: > > On Tue, 29 Apr 2003, Nomen Nescio wrote: > > > Needless to say, nothing could be further from the letter and spirit > > > of the First Amendment. > > > > I thought the Constitution applies to personal speech, not to corporate or > > government speech... > > > > If I speak for myself, the First Amendment applies. > > > > But should it apply even to corporations? Are such entities considered to > > be persons? Should they have "rights"? > > > I don't believe that corporations do have rights, or at least they certainly > shouldn't. There is a case before the Supreme Court as we speak about whether > Nike has a right to freedom of speech. Hopefully they will say no, which would > end corporate political contributions, the bane of our current political > situation. > However, along with freedom of speech, there is also a First Amendment > "freedom of the press" as well, so the press, including newspapers, can print > anything they want unless it's libel. Which would lead to the question of why would (Nike) not just have "(Nike) News" - a newspaper or similar entity, completely hand-assed. The distinction between the press and non-press would appear to be difficult to define in anything like legally binding terms anyhow. (Not that I'd know.) FB` From nobody at remailer.privacy.at Wed Apr 30 04:27:10 2003 From: nobody at remailer.privacy.at (Anonymous) Date: Wed, 30 Apr 2003 13:27:10 +0200 (CEST) Subject: Kill MS, again, but sideways In-Reply-To: Message-ID: Tyler Durden wrote on April 26th, 2003 at 17:54:24 -0400: > Tom Veil wrote... > > "Thomas Shaddack wrote on April 15th, 2003 at 23:30:57 +0200:" > > Yo Veil, what's the deal? A Starbucks too far away from your Unabomber > shack? I don't go to Starbucks (who the hell would want to pay that much for coffee?), nor do I live in a "Unabomber shack". -- Tom Veil From ptrei at rsasecurity.com Wed Apr 30 10:40:42 2003 From: ptrei at rsasecurity.com (Trei, Peter) Date: Wed, 30 Apr 2003 13:40:42 -0400 Subject: Anonglish (was: Re: Authenticating Meat) Message-ID: > Sunder[SMTP:sunder at sunder.net] writes: > On Wed, 30 Apr 2003, Thomas Shaddack wrote: > > > Layer the encryptions then. A good ciphertext looks random. Take a > > ciphertext and encrypt it again, you get a - say - cipher2text. A > > decryption of cipher2text with any key then looks like a potential > > ciphertext. > > > > Is there a hole in this claim? > > According to Schneier doing this is a bad idea - (or so I recall from the > A.P. book which I've not reread in quite a while - I may be wrong) if you > use the same (or similar) cypher. i.e.: > > blowfish(blowfish(plaintext,key1),key2) is bad, > but rsa(blowfish(plaintext,key1),privatekey) is ok. > [don't top-post] It really depends on the cipher. If the cipher is a group, then case 1 is bad - since > blowfish(blowfish(plaintext,key1),key2) = blowfish(plaintext, key3) > Some ciphers, such as DES, are not groups. This is why double and triple DES are stronger than single DES. Peter Trei From jdd at dixons.org Wed Apr 30 05:57:09 2003 From: jdd at dixons.org (Jim Dixon) Date: Wed, 30 Apr 2003 13:57:09 +0100 (BST) Subject: patriotism considered evil In-Reply-To: <20030430071750.A8384419@exeter.ac.uk> Message-ID: <20030430134211.C26703-100000@localhost> On Wed, 30 Apr 2003, Adam Back wrote: > So I guess the American-way used to stand for something -- beliefs in > freedoms etc., and that one symbol used historically to express > support of those freedoms was the US flag. So I'm supposing this is > the historic reason people fly flags, on their cars, houses, > businesses etc. (A practice virtually non-existant in any other > country I've lived in, or travelled to). I live in Bristol, in the west of England. Despite what you say, British and English flags are very common indeed. They fly on cars, are displayed on the walls in pubs, appear on clothing, and even on people's faces -- particularly before sporting events. Because Bristol is just across the river from Wales, we also see a LOT of Welsh dragons. Mind you, flags have been commonly and prominently displayed in most of the countries I have lived in (including Japan, India, and Pakistan as well as the United States) and travelled through (France, for example). And we mustn't forget the republican flags on display all over Belfast. -- Jim Dixon jdd at dixons.org tel +44 117 982 0786 mobile +44 797 373 7881 From ben at algroup.co.uk Wed Apr 30 07:02:30 2003 From: ben at algroup.co.uk (Ben Laurie) Date: Wed, 30 Apr 2003 15:02:30 +0100 Subject: [Lucrative-L] double spends, identity agnosticism, and Lucrative In-Reply-To: <20030429233621.A8391604@exeter.ac.uk> References: <20030429233621.A8391604@exeter.ac.uk> Message-ID: <3EAFD776.2000906@algroup.co.uk> Adam Back wrote: > There are also existantial forgeries. > > Ie choose random x, compute y = x^e mod n, now x looks like a > signature on y because y^d = x mod n; and when he verifies the > verifier will just do x^e and see that it is equal to y. > > These may also look like valid coins to this code! > > It's missing a step: the coin should have some structure. So it can't > be a hash of a message chosen by the user but hashed by the signer > (the normal practical RSA signature) because the server can't see that > it or it would be linkable. > > What digicash did I think is something like c = [x||h(x)]. Then you > can reject existential forgeries and unblinded coins because they > won't have the right form. > > (If you look back to the post where I gave a summary of the math, > you'll see I included that step.) This is also what Lucre (and hence Lucrative) does. Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From morlockelloi at yahoo.com Wed Apr 30 15:12:32 2003 From: morlockelloi at yahoo.com (Morlock Elloi) Date: Wed, 30 Apr 2003 15:12:32 -0700 (PDT) Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: <20030430221007.GH13867@jal.clueinc.net> Message-ID: <20030430221232.67622.qmail@web40610.mail.yahoo.com> What is not known (and impossible to prove impossible) is that there may be another non-DES "block cypher" with some shorter key equivalent to 2 DES blocks in series. Or we'll find out much later that feistel nets have been collapsed in, say ... late 90-ties ? > if I'm wrong, but what is important for multiple encryption is whether > or not the cypher in question is a group (as in closed under > composition). > > DES, for example, is not, so multiple DES cycles is not equivalent to > single DES. ===== end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com From frantz at pwpconsult.com Wed Apr 30 15:16:48 2003 From: frantz at pwpconsult.com (Bill Frantz) Date: Wed, 30 Apr 2003 15:16:48 -0700 Subject: patriotism considered evil In-Reply-To: <20030430071750.A8384419@exeter.ac.uk> Message-ID: At 11:17 PM -0700 4/29/03, Adam Back wrote: >So I guess the American-way used to stand for something -- beliefs in >freedoms etc., and that one symbol used historically to express >support of those freedoms was the US flag. So I'm supposing this is >the historic reason people fly flags, on their cars, houses, >businesses etc. (A practice virtually non-existant in any other >country I've lived in, or travelled to). I saw a whole bunch of Swiss flags flying everywhere I went in Switzerland the last time I was over there (about 5 years ago). It impressed me as more flags than I usually see in the US. Cheers - Bill ------------------------------------------------------------------------- Bill Frantz | Due process for all | Periwinkle -- Consulting (408)356-8506 | used to be the | 16345 Englewood Ave. frantz at pwpconsult.com | American way. | Los Gatos, CA 95032, USA From shaddack at ns.arachne.cz Wed Apr 30 06:49:23 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Wed, 30 Apr 2003 15:49:23 +0200 (CEST) Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: <5.2.0.9.0.20030429144202.044964d0@pop.ix.netcom.com> Message-ID: > At 03:42 PM 4/28/03 +0100, Peter Fairbrother wrote: > >If you have perfect compression, and you encrypt a message which has been > >compressed, any decryption will look sensible. > > You do understand that building this kind of compressor implies passing the > Turing test, right? For the messages to be sensible, they have to have > some underlying meaning that makes sense. This isn't just compression in > the sense of fast implementations of statistical models of text.... Layer the encryptions then. A good ciphertext looks random. Take a ciphertext and encrypt it again, you get a - say - cipher2text. A decryption of cipher2text with any key then looks like a potential ciphertext. Is there a hole in this claim? From alopata at darkwing.uoregon.edu Wed Apr 30 15:49:38 2003 From: alopata at darkwing.uoregon.edu (Andy Lopata) Date: Wed, 30 Apr 2003 15:49:38 -0700 Subject: Mike Hawash In-Reply-To: <3EAF5275.1070209@ksvanhorn.com> Message-ID: Declan McCullagh wrote: >> "No Person shall be convicted of Treason unless on the >> Testimony of two Witnesses to the same overt Act, or on Confession in >> open Court." Kevin S. Van Horn wrote: >This also precludes conviction of Hawash, as there was no overt act, >only a claim that his intentions in travelling were to later commit >such an act. The actual charge against Hawash is _conspiracy_ to 1) levy war against the U.S., 2) provide material support to designated terrorist organizations (Al-Qaida), and 3) contribute services to Al-Qaida and the Taliban. The "levy war" statute is titled "Seditious Conspiracy" (18 USCA ? 2384) and states that: "[i]f two or more persons in any State or Territory, or in any place subject to the jurisdiction of the United States, conspire to overthrow, put down, or to destroy by force the Government of the United States, or to levy war against them, or to oppose by force the authority thereof, or by force to prevent, hinder, or delay the execution of any law of the United States, or by force to seize, take, or possess any property of the United States contrary to the authority thereof, they shall each be fined under this title or imprisoned not more than twenty years, or both." There is a general conspiracy statute (18 USC 371), on which charges (2) and (3) are based, which states that when "two or more persons conspire ... to commit any offense against the United States, ... in any manner or for any purpose, and one or more of such persons do any act to effect the object of the conspiracy" those person are punishable under the statute. Conspiracy is the closest thing we have to a thought-crime in the U.S. and it is used quite a bit by the feds. The only things that saves it from being a pure thought crime is that a conspiracy must be an actual agreement between two or more people to commit a crime (or fraud), and that an affirmative action must be taken in furtherance of the crime (in some drug-related offenses, this isn't even needed). The "act" to effect the object of the conspiracy does _not_ itself have to be illegal. The gov't can argue that merely going to China (getting closer to Afghanistan) or the alleged "weapons training," were acts in furtherance of the conspiracy. These charges are obviously B.S. From what I have read (including the indictments against the Portland six) the main gov't "informant" was really a provocator, and the evidence against all of them is pretty thin. However, I wouldn't be surprised if the gov't gets a conviction. They might resort to threatening the suspects with "enemy combatant" status to force a plea, like they did to the suspects in Buffalo. It will be interesting to see how far the feds push the "enemy combatant" strategy to see if the courts can or will do anything about it. Since the courts have been handing out material witness warrants left and right allowing for indefinite detention, things look pretty bad. The hype about a "terrorist cell" is ridiculous fodder for the media. Assuming Hawash and the Portland Six were really doing what the feds allege, they certainly aren't terrorists. If they were they wouldn't have bothered trying to get half way around the world to kill americans. -Andy Lopata From shaddack at ns.arachne.cz Wed Apr 30 07:18:58 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Wed, 30 Apr 2003 16:18:58 +0200 (CEST) Subject: Fake News for Big Brother In-Reply-To: Message-ID: On Wed, 30 Apr 2003, Mike Rosing wrote: > Yes, they are considered "persons" in a ficticioius way. so are > houses - a house can be confiscated if one person living in it was > either a "drug dealer" or "terrorist. The owner need not know, the > house is guilty of being an accomplice. Where is the due process then? Will the house get a pro-bono lawyer (as houses are known to not own enough money to afford one)? Can it be proven that the house was an unwilling accomplice, that it was forced to "cooperate" against its will? > Insane? Yes, but what else is new in the US :-) The willingness of The Sheeple to trust whatever The Whoever Claims To Be Elected says that's to be considered The Truth at the given moment? Ahh, sorry, you said "new"... > You are confusing common sense with law. A very silly thing to do! One day I will pay dearly for it... From jal at jal.org Wed Apr 30 15:10:07 2003 From: jal at jal.org (Jamie Lawrence) Date: Wed, 30 Apr 2003 17:10:07 -0500 Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: References: Message-ID: <20030430221007.GH13867@jal.clueinc.net> On Wed, 30 Apr 2003, Sunder wrote: > According to Schneier doing this is a bad idea - (or so I recall from the > A.P. book which I've not reread in quite a while - I may be wrong) if you > use the same (or similar) cypher. i.e.: > blowfish(blowfish(plaintext,key1),key2) is bad, I believe it doesn't gain you anything, but it isn't "bad" in the sense of weakening anything. If it were, analysts would start off by encrypting the message again. It has been a while since I've read on this, too, so please correct me if I'm wrong, but what is important for multiple encryption is whether or not the cypher in question is a group (as in closed under composition). DES, for example, is not, so multiple DES cycles is not equivalent to single DES. Again, I probably shouldn't be talking about this, as I haven't refreshed my memory on it in a while. -j -- Jamie Lawrence jal at jal.org "The current pursuit of American supremacy reminds me of the the boom-bust process, or a stock market bubble. Whatever the outcome in Iraq, I dare to predict that the Bush policies are bound to fail." - George Soros From shaddack at ns.arachne.cz Wed Apr 30 08:18:05 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Wed, 30 Apr 2003 17:18:05 +0200 (CEST) Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: Message-ID: > According to Schneier doing this is a bad idea - (or so I recall from the > A.P. book which I've not reread in quite a while - I may be wrong) if you > use the same (or similar) cypher. i.e.: > > blowfish(blowfish(plaintext,key1),key2) is bad, > but rsa(blowfish(plaintext,key1),privatekey) is ok. Does it apply even if it is the same cipher but with different key length and/or block size? I was pondering such "encapsulation" for the situations when The Government forbids using ciphers stronger than . Then use as strong one as you wish, and encrypt the result in the legally-weak wrapper. Once they ask for your escrowed keys, or bruteforce it, they will figure out that you are a crypto-lawbreaker - but you will pass a routine automated screening. And once you catch their interest, you already have problems anyway. From shaddack at ns.arachne.cz Wed Apr 30 08:25:48 2003 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Wed, 30 Apr 2003 17:25:48 +0200 (CEST) Subject: Fake News for Big Brother In-Reply-To: Message-ID: On Wed, 30 Apr 2003, Sunder wrote: > > > Ok fine, but what about the old saw that you can't lie to any law > > > enforcement types? > > > > Who defines what is considered to be the truth? > > > Um, the guys holding the guns? Shouldn't then the saying be that you can't tell any law enforcement types what they don't want to hear? From timcmay at got.net Wed Apr 30 17:28:24 2003 From: timcmay at got.net (Tim May) Date: Wed, 30 Apr 2003 17:28:24 -0700 Subject: Mike Hawash In-Reply-To: <3EB06387.5030604@ksvanhorn.com> Message-ID: On Wednesday, April 30, 2003, at 05:00 PM, Kevin S. Van Horn wrote: > Declan McCullagh wrote: > >> My reading is the opposite. That's why there's an "or" instead of an >> "and" there. --Declan >> >>> "Enemies" are discussed in juxtaposition to "levying War against >>> [the United States]". This implies >>> that "Enemies" of the United States are those with whom the U.S. is >>> at war. >> > > Have you ever heard the phrase, "unconstitutionally vague"? If > "enemies" are something other than parties with whom the U.S. is at > war, then who are they? > Shrubya said "You're either with us, or against us." Asscruft has been using this as his definition of who is against Amerika: anyone not supporting our boys and flying an American flag is one of Them. "We gonna open a can of Texas whoop-ass on them bad boys," as our illiterate Maximum Leader puts it. Since there has been no declaration of war, and since Congress is busy distracting itself with important debates about the renewal of the bovine ear oil depletion allowance--anything to avoid taking a legal stand on the constitutionality of preemptive war--this will have to do as the best definition we will have of what an "enemy" is. --Tim May "Gun Control: The theory that a woman found dead in an alley, raped and strangled with her panty hose, is somehow morally superior to a woman explaining to police how her attacker got that fatal bullet wound" From zenadsl6186 at zen.co.uk Wed Apr 30 09:36:01 2003 From: zenadsl6186 at zen.co.uk (Peter Fairbrother) Date: Wed, 30 Apr 2003 17:36:01 +0100 Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: <5.2.0.9.0.20030429144202.044964d0@pop.ix.netcom.com> Message-ID: John Kelsey wrote: > At 03:42 PM 4/28/03 +0100, Peter Fairbrother wrote: >> If you have perfect compression, and you encrypt a message which has been >> compressed, any decryption will look sensible. > > You do understand that building this kind of compressor implies passing the > Turing test, right? For the messages to be sensible, they have to have > some underlying meaning that makes sense. This isn't just compression in > the sense of fast implementations of statistical models of text.... I do realise that. More, it has to be able to fake the sender, not just a random human. I'm not trying to build that sort of compressor tho' - but see my ps. The compressor I'm beginning to build now does not have to pass a Turing test directly. It can only compress a limited subset of possible messages, and if that subset is small it's easy to see that it can be done. Say your possible messages are: Attack at dawn Attack at dusk Retreat at dawn Retreat at dusk Assign a number to the verb, and a number to the "time" (not being a grammarian I don't know offhand what that part of speech is called). In this limited case that's just two bits, so eg "Attack at dawn" compresses as 0x00. Now encrypt that 0x00, using eg an XOR with a key of 10, to give ciphertext 0x10. Decrypting that with key 00 gives message 0x10 - which decompresses to "Attack at dusk", a plausible decryption*. There are further considerations when variable sentence structures, multi-sentence messages (and lots more things) are considered, of course. For instance, longer messages have to be self-consistent, which can be done using closeness arrays and best-fit techniques. And doing it on a wider scale is harder, and a whole lot of work... * However, if "Attack at dusk" is an unlikely message because of real-world events, eg you have already won the battle, then the decryption loses some plausibility... There are several ways around that. First is to have a "godlike" compressor which knows everything in the real world, or at least everything any sender is likely to send, so that _all_ possible decryptions are real-world plausible, but that's not within my ability to write. It's impossible anyway (unless you're God). Second is to just accept that only a portion of possible decryptions will be real world plausible (most, if not all, should be language-plausible and self-consistent-plausible). It shouldn't be hard to get a small proportion to be rwp. This is still very useful, as an attacker can't distinguish between a brute-forced set of real-world plausible decryptions (a subset of all possible decryptions, which should be large enough to contain many examples of contradictory decryptions), and a purportedly real decryption can be challenged by producing a different real-world plausible decryption, or preferably ten thousand of them. Having a fake key that decrypts to a rwp decryption can be done, if the fake key is prearranged before the message is sent. Useful when lots of messages are encrypted with the same key. If you can check the decryption first, you can also afterwards select a key that will give a rwpd. Third is to try and get almost all decryptions to be rwp, using complex techniques (!) and the fact that the set of messages that can be sent is limited. For instance, if it was limited as in my example above and you wanted to tell someone that you couldn't go on a promised date this evening, you would send "retreat at dusk". This is a very contrived example, of course. Unfortunately you still can't give a randomly-chosen-afterwards key which will _always_ give a rwpd, which would be _very_ nice to do. I'm investigating a few possible ways to do that, perhaps just to do it effectively without 100% of possible decryptions being rwp, but I haven't gotten any results worth repeating yet. And yes, I do know the theory that says it's impossible. Change the conditions a little and the theory might not be applicable any more. -- Peter Fairbrother ps I did some experiments a couple of years ago and got (some) rwp decryptions in most 60-word messages, and in some 200-word messages. The parser used was surprisingly important. Only tried at most a few hundred trial decryption/decompressions per message, but I didn't get anyone else to check the rwp, so the results may have been a bit subjective. That was not super-perfect tho', just an attempt to approach perfect. From mv at cdc.gov Wed Apr 30 18:28:14 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 30 Apr 2003 18:28:14 -0700 Subject: Anonglish (was: Re: Authenticating Meat) Message-ID: <3EB0782E.8090508@cdc.gov> At 12:03 AM 5/1/03 +0100, Peter Fairbrother wrote: >Personally, for the two ciphers case, I'd choose Blowfish and AES, ensuring >the keys are randomly and seperately generated, because Blowfish is a >Feistel cipher and AES isn't (and because both are well-peer-reviewed, and >available), but that's just a feeling which I can't really justify >mathematically. Jeezum Peter, if you're going to compose ciphers, how about *not* picking the contender chosen by the NSA? Paranoia is not just for breakfast anymore. From ravage at einstein.ssz.com Wed Apr 30 16:58:10 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 30 Apr 2003 18:58:10 -0500 (CDT) Subject: Quarantines may be justified In-Reply-To: Message-ID: On Wed, 30 Apr 2003, Sunder wrote: > While we're at it, there should be a law against noisy kids playing in > your neighbor's back yard, If it's not your backyard then it's none of your business. If it is look into trespass and such. Being a minor won't protect them. > postmen who step on your lawn, There is, postmen are responsible to trespass. I have some dogs and my old postman had a problem with it, to the point of actually attacking one of my dogs and chasing it around my yard. He got away with it by claiming my dog attacked him. I moved my mailbox out to the street (there is a 3ft easement that is considered a public/utility way) and talked to the local postmaster general. It was made clear that if he stepped into my yard I would press trespass. Both the postmaster and the local police agreed that was legal. [rest of your dumbass bullshit deleted] -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From ravage at einstein.ssz.com Wed Apr 30 16:59:30 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 30 Apr 2003 18:59:30 -0500 (CDT) Subject: Quarantines may be justified In-Reply-To: Message-ID: You know, I keep thinking you've said the stupidest thing ever. And then you say something else. On Wed, 30 Apr 2003, Sunder wrote: > Then, by extension, I find that when people say "libertarians" in quotes > like you said, but not like I said, is no different than having them > assult me with their fists. > > In fact, I find such behavior as direct threats against my life, and > instilling terror, so that makes you a terrorist, and possibly an Arab > because in my experience, people who put libertarians in menacing quotes > like you do were mostly Arabs who hate our freedoms, and that's why they > bombed the World Trade Center, and therefore must be harboring WMD's -- > and they probably got a huge stash of oil we can grab too - I mean, are > torturing their subjects and are anti-freedom, and hate the American Way > of Life (Wave Flag Here!) > > > Should we really be able to make up our own definitions and turn things > which merely annoy us into crimes? Think about it a bit longer before > you reply again. -- ____________________________________________________________________ We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, "Plan 9 from Outer Space" ravage at ssz.com jchoate at open-forge.org www.ssz.com www.open-forge.org -------------------------------------------------------------------- From kvanhorn at ksvanhorn.com Wed Apr 30 17:00:07 2003 From: kvanhorn at ksvanhorn.com (Kevin S. Van Horn) Date: Wed, 30 Apr 2003 19:00:07 -0500 Subject: Mike Hawash References: <3EAF0033.2080800@ksvanhorn.com> <20030429204855.D25473@cluebot.com> <5.2.0.9.0.20030430123607.0113ca08@mail.well.com> Message-ID: <3EB06387.5030604@ksvanhorn.com> Declan McCullagh wrote: > My reading is the opposite. That's why there's an "or" instead of an > "and" there. --Declan > >> "Enemies" are discussed in juxtaposition to "levying War against [the >> United States]". This implies >> that "Enemies" of the United States are those with whom the U.S. is >> at war. > Have you ever heard the phrase, "unconstitutionally vague"? If "enemies" are something other than parties with whom the U.S. is at war, then who are they? From mv at cdc.gov Wed Apr 30 20:15:40 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 30 Apr 2003 20:15:40 -0700 Subject: Making Money in Digital Money Message-ID: <3EB0915C.47823471@cdc.gov> At 10:48 PM 4/30/03 -0400, zem wrote: >You're assuming that resellers add zero value to the content. They can >make a profit by providing some service over and above the content itself. You are referring to the value of Editors. Yep, they have value. Its all reputations. Some will pay for reputable editors' filtering. Its a valid bizmodel. >Take file sharing networks as an example. Current networks are flooded >with bogus, incomplete or poor quality files. Not quite, empirically speaking. And mature P2P users simply obtain the largest file that claims to be the desired content. Also, there is near-zero cost in downloading multiple copies. See also K*Zaa's (albeit ill-used) rating system. A nym could build a >reputation as a validating service - a critic, if you like. Perhaps >something like this: Bingo. While retaining meatspace anonymity. You *are* your public keys. Note plural. See Vinge, Verner, _True Names_ (and thanks for the recent posted link to that text, although I found the illustrations superfluous) >Alice the music critic buys copies of new content at relatively high >prices from the creator, or close sources. When Bob requests a copy of >a particular file, Alice encrypts it to Bob's public key and signs the >encrypted copy, selling him this 'reviewed' copy for reproduction cost + >profit. Bob can verify he's received a good copy, but he can't >redistribute Alice's reviewed version without revealing his secret key. So Bob either redistributes the decrypted bits, or cruises through the analog hole. Game over. All your Valentis are belong to us. ------ "Yes, we know they have logic analyzers in Hong Kong" ---A senior Sony Engineer, admitting defeat, in a private meeting. From declan at well.com Wed Apr 30 17:21:49 2003 From: declan at well.com (Declan McCullagh) Date: Wed, 30 Apr 2003 20:21:49 -0400 Subject: Mike Hawash In-Reply-To: <3EB06387.5030604@ksvanhorn.com> References: <3EAF0033.2080800@ksvanhorn.com> <20030429204855.D25473@cluebot.com> <5.2.0.9.0.20030430123607.0113ca08@mail.well.com> Message-ID: <5.2.0.9.0.20030430200733.01115310@mail.well.com> At 07:00 PM 4/30/2003 -0500, Kevin S. Van Horn wrote: >Have you ever heard the phrase, "unconstitutionally vague"? If "enemies" >are something other than parties with whom the U.S. is at war, then who >are they? Style tip: the phrase "unconstitutionally vague" is typically used to refer to laws that violate various sections of the Constitution, not sections of the actual Constitution. It would be hard for the Constitution to violate itself. :) -Declan From morlockelloi at yahoo.com Wed Apr 30 21:00:18 2003 From: morlockelloi at yahoo.com (Morlock Elloi) Date: Wed, 30 Apr 2003 21:00:18 -0700 (PDT) Subject: Making Money in Digital Money In-Reply-To: <3EB0915C.47823471@cdc.gov> Message-ID: <20030501040018.30531.qmail@web40614.mail.yahoo.com> > You are referring to the value of Editors. Yep, they have value. Its all > reputations. Some will pay for reputable editors' filtering. Its a > valid bizmodel. Not so. What stops editors' output to be re-distributed at zero cost ? Or you assume that editors have more men with guns than are now available to labels ? It's funny how stealing from "bad guys" (labels) is "OK", while stealing from good guys (your neighbourhood editor) is "bad". ===== end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __________________________________ Do you Yahoo!? The New Yahoo! Search - Faster. Easier. Bingo. http://search.yahoo.com From DaveHowe at gmx.co.uk Wed Apr 30 13:20:43 2003 From: DaveHowe at gmx.co.uk (Dave Howe) Date: Wed, 30 Apr 2003 21:20:43 +0100 Subject: Fake News for Big Brother References: Message-ID: <00ff01c30f55$fd4b1960$01c8a8c0@DaveHowe> Tim May wrote: > Nonsense. Many preachers and televangelists know they are shucking and > jiving their congregations. Indeed so. but I believe the ones that do should be arrested for fraudulent obtaining of funds :) > The First Amendment does not have an exception clause for "knowingly > lying." no, but a lot of commercial law does. >>> Should a newspaper be prosecuted for publishing a claim that the >>> Sumerian prediction that Nibiru, aka Planet X, will stop the earth >>> from rotating on May 15, 2003? >> Nope. but they should be prosecuted if they front-page splash it as >> "earth doomed, we have two weeks to live, there is no hope" and >> fail to mention that it is a religious prediction that the scientific >> community has a few issues with.... > Nonsense. They would be in hot water for a number of reasons - probably incitement to riot at least. One thing that *does* occur to me - most of the news sources are not free, at least not here in the uk. I pay to receive even broadcast TV, I pay for satellite downlink - therefore I am paying for a product (truthful reporting) and should be able to sue if that isn't the product I get... > You really believe the Jew propaganda? Yup. I have visited one of the camps, along with the battlefields of ypres (ww1). One of the advantages of being in england instead of the US is that you can make a round trip to these sort of places without having to even stop overnight... Denying the holocaust is pretty pointless. it happened, get over it. The jews got made the scapegoat and whipping post for the economic problems the germans had at the time - which of course the english had done centuries beforehand; given how many times the jews were persecuted its not that suprising they are a bit paranoid as a group now. > The First Amendment does not contain language about how speech "should > be accompanied by pretty convincing evidence." This is of course true - but iirc the First Amendment has to be interpreted in the light of the "common law rights" it enshrines, not as a simple one-sentence absolute right; nothing leads me to believe the founders intended the first amendment to be a shield for those who would hide behind it for political or financial gain . . . still, I am not an american. From adam at cypherspace.org Wed Apr 30 13:54:21 2003 From: adam at cypherspace.org (Adam Back) Date: Wed, 30 Apr 2003 21:54:21 +0100 Subject: patriotism considered evil In-Reply-To: ; from timcmay@got.net on Wed, Apr 30, 2003 at 11:15:50AM -0700 References: <20030430071750.A8384419@exeter.ac.uk> Message-ID: <20030430215421.A8373912@exeter.ac.uk> On Wed, Apr 30, 2003 at 11:15:50AM -0700, Tim May wrote: > > Opinion in the UK is split, but I don't > > see those on the pro-side of the fence arguing that those arguing > > against are unpatriotic or anything. > > The Scottish MP, a constant target of tabloid attacks, has been dubbed > MP for Baghdad Central for his opposition to the Iraq war." > > --end excerpt-- > > It seems to me that the tabloids and others calling someone "MP for > Baghdad Central" is a counterexample to your claim. > > Of course, this isn't a survey of the _prevalence_ or _magnitude_ of > the claims, but it's an example that at least some Brits on the pro-war > side are using slurs about the patriotism of the opponents. Yes but the tabloids are not examples of serious news sources; they are titilation and shit-stirring. They're continuously being sued for slander, fabrication of titilating though coincidentally untrue stories etc. > Also, note that Sky News in the U.K. is part of Rupert Murdoch's > empire, and Murdoch is the controlling force behind Fox. "Fair and > balanced" = the most blatantly jingoistic television network visible on > American t.v. I agree news is biased also. It just pisses me off to see major network news who you might (or at least the average person uninformedly does) consider to retain some level of integrity dismissing and supressing most balanced discussion on with put-downs involving "unpatriotic" and "unamerican". WTF is that? Can't they engage in discourse where evidence and logical argument are used? Similar vein is the apparent overnight animosity towards the French who happened to take a different view. It all comes down to this same blind following of leaders, and Bush's inane statements such as "if you're not for us you're against us". So now France should be boycotted because they expressed opinions not precisely aligned with US views. People are entitled to their opinion. In fact if it were not for Blair and whoever else was behind it in the UK government over-riding public sentiment, Britain would not have been involved either as public opinion in the UK was reportedly 80% against involvement prior to the invasion. In that case I suppose British exports would now also be targets for calls for boycott. I suppose I am just suprised and dismayed at the level of childish behavior but on an international policy scale. Adam From mv at cdc.gov Wed Apr 30 22:16:48 2003 From: mv at cdc.gov (Major Variola (ret)) Date: Wed, 30 Apr 2003 22:16:48 -0700 Subject: Making Money in Digital Money Message-ID: <3EB0ADBF.5FC664DC@cdc.gov> At 12:09 AM 5/1/03 -0400, zem wrote: >> So Bob either redistributes the decrypted bits, or cruises through >> the analog hole. Game over. All your Valentis are belong to us. > >Point is Bob can't redistribute the file with Alice's approval rating >still intact. And it's the approval rating that people are paying her >for, not the content. Bob can't redistribute the profitable part, only >the worthless part. Who gives a rat's ass about Alice's rating? The mass of P2P clients will rate the content. Its already in practice. All one needs is the content, the rating system will handle itself. From ravage at einstein.ssz.com Wed Apr 30 20:31:58 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 30 Apr 2003 22:31:58 -0500 (CDT) Subject: Inferno: Social Structure in Social Software (fwd) Message-ID: ---------- Forwarded message ---------- Date: Wed, 30 Apr 2003 15:23:45 -0500 (CDT) Subject: Inferno: Social Structure in Social Software Tangent started by noting Clay Shirky's keynote "A Group Is Its Own Worst Enemy: Social Structure in Social Software" at the recent Emerging Tech Conference. Seems to be an interesting source/extension/application of Lessig's "code/architecture as law" observation. http://conferences.oreillynet.com/cs/et2003/view/e_sess/3625 Looks like this is the gist: "Social Software and the Politics of Groups" by Clay Shirky http://shirky.com/writings/group_politics.html TalkBack blog links of conference session attendees: http://undergroundlondon.com/antimega/archives/000081.html http://craphound.com/shirkyetcon2003.txt An interesting less optimistic viewpoint of the influence of social software: http://www.theisociety.net/archives/000585.html#000585 Links re: Wilfred Bion http://psychematters.com/bibliographies/bion.htm http://www.mythosandlogos.com/Bion.html Clay Shirky http://www.shirky.com/ From ravage at einstein.ssz.com Wed Apr 30 20:33:04 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 30 Apr 2003 22:33:04 -0500 (CDT) Subject: Inferno: Account of INS/DoHS Raid on NYC restaurant (fwd) Message-ID: ---------- Forwarded message ---------- Date: Wed, 30 Apr 2003 10:58:22 -0500 (CDT) Subject: Inferno: Account of INS/DoHS Raid on NYC restaurant This is a well presented first-hand account of an INS/Dept. of Homeland Security raid on an Indian restaurant off Times Square. The expanded government powers enabled by the PATRIOT Act were explicitly invoked by the operation agents when challenged. ---------- Forwarded message ---------- Date: Tue, 29 Apr 2003 19:46:30 -0500 Subject: Well written http://www.alternet.org/story.html?StoryID=15770 From ravage at einstein.ssz.com Wed Apr 30 20:36:40 2003 From: ravage at einstein.ssz.com (Jim Choate) Date: Wed, 30 Apr 2003 22:36:40 -0500 (CDT) Subject: VANGUARD: May Day (fwd) Message-ID: Not sure why I got it....YMMV (mine certainly did). ---------- Forwarded message ---------- Date: Wed, 30 Apr 2003 19:18:49 -0700 From: Rod D. Martin To: TheVanguard.org Subject: VANGUARD: May Day Vanguard of the Revolution http://www.theVanguard.org MAY DAY by Rod D. Martin, 1 May 2003 You would have never heard of Karl Marx had it not been for V.I. Lenin. Marx was neither terribly successful nor terribly important in his own right, and had it not been for a revolution carried out three decades after his death, he would be a footnote at best. But on this May Day, the high holy day of Communism and Socialism, it is important that we remember. As a student, both in England and America, I often heard the refrain -- even from conservatives -- that "communism wouldn't have been so bad if it had been carried out like Marx suggested, without all that junk from Lenin and Stalin." It still amazes me the degree to which this leftist propaganda can be passed off as true. It shows that the speaker has never read much (if any) Marx or Lenin, and, usually, that he wants to sound "intellectual". It also shows that socialists, whether of the national socialist (Nazi) or of the international socialist (Communist/Socialist) stripe, have been very successful in employing Herr Goebbels' doctrine of "the big lie." In fact, Marx never produced a political program at all. The entirety of his plan for his new world order was contained in ten short points -- nothing more than slogans, really -- in his very first "book", the Communist Manifesto. He never defined them further. He never saw a need. Marx had grander work in mind. He was producing a religion. Marx, the anti-Semitic Jew, the hater of Christianity and all it stood for, created an entire atheology. It was, in the words of James Billington, "fire in the minds of men." Marx sought to turn the old order on its head, to regenerate mankind through chaos. He preached a dialectical view of history which seemed to derive from Fuerbach but really just represented ancient dualism. He propounded a materialism which he said "turned Hegel right-side up," and which said that no person was anything more than a mechanistically determined automaton, "matter in motion." He wedded to this a naively classical interpretation of the labor theory of value to produce his economics, and a utopian view of the state that said man, who was morally neutral and therefore perfectible, could be utterly re-made -- regenerated, or "saved" -- by a state or party which completely controlled and molded his environment. To all of this he added an eschatology of victory, a certainty of success which was raised to the level of first principle, of dogma, of prerequisite faith. It is eternally worth noting that Whittaker Chambers, even when he embraced freedom, believed without question that he was abandoning the winning side. The contagiousness of the Communist faith was such that virtually everyone at the time agreed. The tenor of the "worker's paradise" to come was already apparent in Marx's own leadership of the International Workingmen's Association, which was nothing if not dictatorial. Once in the hands of a state, however, Communist atheology became truly consistent with its presuppositions. Since the individual man was just a biological machine, he could be discarded at will. Since good and evil were entirely relative, they could be defined entirely by the party and therefore by the state. Since the state/party could and must regenerate man and build the paradise to come, it's power must be absolute and unquestioned. And since victory was inevitable, millions gave up their individuality, their families, even their lives, without a fight. Marx's atheology created the greatest idol of all, the idol of the omnipotent state. This idol appealed to men more than any other in history, because it made all morality relative and it gave ambitious men the means to become gods themselves. But it also appealed precisely because it was not an idol of stone or wood, but an idol of power: prayers to it could be answered, needs and greeds fulfilled. And because it indulged all of man's basest instincts while ever appealing to his noblest motives, it was exactly the sort of god man wanted to create, a god in his own image. Marx's work was nothing new -- it was the logical conclusion of left-wing Enlightenment humanism, and had roots as old as Pharaoh -- and it was left to others -- Lenin, Stalin, Mao -- to carry out his work. Yet Marx's idol was and remains in many ways the most successful false god of human history. In its heyday enslaving more than half the world (and nearly taking the rest), its presuppositions still remain the dominant faith of the ruling elites of most of the western world. That is itself a terrifying thought. Marxism in this century killed a hundred million people, and sent probably two billion to hell. It withered whatever it touched, and it frankly touched us all. If Lenin's minions were the "vanguard" of the old revolution, we must be the vanguard of the new. Nothing has taught us better than Marxism the danger of holding false theological presuppositions, even in the absence of a clear political program. Mankind may embrace the truth, or he may embrace a lie. The difference between the American Revolution and the Russian is the difference between worlds; and it is that better world -- indeed a better world even still -- which we must build. Copyright: Rod D. Martin, 1 May 2003. This column first appeared (with minor differences) on 1 May 1998. -- Rod D. Martin, Founder and Chairman of Vanguard PAC (http://www.theVanguard.org), is an attorney and writer from Little Rock, Arkansas. A former policy director to Arkansas Gov. Mike Huckabee, he is the Center for Cultural Leadership's Senior Fellow in Public Policy and Political Affairs, and Special Counsel to PayPal.com Founder Peter Thiel. ================================================================ SEVEN GREAT CONSERVATIVE BOOKS! Don't miss these outstanding conservative book selections, ON SALE NOW by arrangement between the Vanguard Bookstore and Amazon.com. 1. "Reagan's War: The Epic Story of His Forty Year Struggle And Final Triumph Over Communism", by Peter Schweizer http://www.amazon.com/exec/obidos/ASIN/0385504713/vanguardoftherev/ 2. "Let Freedom Ring", by Sean Hannity http://www.amazon.com/exec/obidos/ASIN/0060514558/vanguardoftherev/ 3. "Useful Idiots: How Liberals Got it Wrong in the Cold War and Still Blame America First", by Mona Charen http://www.amazon.com/exec/obidos/ASIN/0895261391/vanguardoftherev/ 4. "The Death of Right and Wrong: Exposing the Left's Assault on Our Culture and Values", by Tammy Bruce http://www.amazon.com/exec/obidos/ASIN/0761516638/vanguardoftherev/ 5. "Shooting Straight: Telling the Truth About Guns in America", by Wayne LaPierre, James Jay Baker and Charlton Heston http://www.amazon.com/exec/obidos/ASIN/0895261235/vanguardoftherev 6. "Why the Left Hates America: Exposing the Lies That Have Obscured Our Nation's Greatness", by Daniel J. Flynn http://www.amazon.com/exec/obidos/ASIN/076156375X/vanguardoftherev 7. "What's So Great About America", by Dinesh D'Souza http://www.amazon.com/exec/obidos/ASIN/0895261537/vanguardoftherev TheVanguard Bookstore: America's Conservative Choice http://www.theVanguard.org/ ================================================================ ADVERTISEMENT FOR SALE: The Nel-Vic Tour Home Own a piece of history, and an impressive investment property, business or home! Located in one of the world's most beautiful settings -- overlooking the King's River, just six miles from magnificent Eureka Springs, Arkansas -- this tour home, museum, and coveted spot for Victorian weddings, is now for sale. A portion of the proceeds will support conservative causes through Vanguard PAC. For More Information: http://www.theVanguard.org/nelvictourhome/ VanguardPAC at theVanguard.org ================================================================ To subscribe to "Vanguard of the Revolution", send the message "Subscribe Vanguard", or the message "Unsubscribe Vanguard" to unsubscribe, to listadmin at theVanguard.org. Contact listowner at theVanguard.org if you have questions. ================================================================ http://www.theVanguard.org Vanguard at theVanguard.org Vanguard PAC P. O. Box 250038 Little Rock, AR 72225 The information contained herein may be disseminated for non- commercial purposes as long as attribution (including our Web address) is provided. ================================================================ From zem at vigilant.tv Wed Apr 30 19:48:02 2003 From: zem at vigilant.tv (zem) Date: Wed, 30 Apr 2003 22:48:02 -0400 Subject: Making Money in Digital Money Message-ID: Anonymous writes: > Let me explain it so simply you can't miss it. This system does not > work, because by the time the content is in the hands of just a few > people, they will be bidding against each other to sell it on the net. > Such a state of competition will quickly drive the prices down to the > cost of reproduction, which is effectively zero. Therefore you can't > sell more than a dozen-odd copies of the software at a non-zero price. > > If most of the people buying this software are doing so with the > expectation of recouping their costs by re-selling, then no one will > buy after the first few, since they will not be able to make any money > selling at zero. But this means that even those first few buyers won't > be able to sell at non-zero, since these second-wave potential buyers > were their customers. You're assuming that resellers add zero value to the content. They can make a profit by providing some service over and above the content itself. Take file sharing networks as an example. Current networks are flooded with bogus, incomplete or poor quality files. A nym could build a reputation as a validating service - a critic, if you like. Perhaps something like this: Alice the music critic buys copies of new content at relatively high prices from the creator, or close sources. When Bob requests a copy of a particular file, Alice encrypts it to Bob's public key and signs the encrypted copy, selling him this 'reviewed' copy for reproduction cost + profit. Bob can verify he's received a good copy, but he can't redistribute Alice's reviewed version without revealing his secret key. (Yeah, Mallory can create a one-shot key pair with the intention of revealing it and redistributing Alice's reviewed file. Alice can reduce her losses by refusing to deal with unknown buyers, or by demanding pre-payment for 100 copies up front, or something like that.) -- mailto:zem at vigilant.tv F289 2BDB 1DA0 F4C4 DC87 EC36 B2E3 4E75 C853 FD93 http://vigilant.tv/ "..I'm invisible, I'm invisible, I'm invisible.." From schear at attbi.com Wed Apr 30 22:58:20 2003 From: schear at attbi.com (Steve Schear) Date: Wed, 30 Apr 2003 22:58:20 -0700 Subject: Making Money in Digital Money In-Reply-To: References: <5.2.0.9.0.20030430092307.009d1910@pop.ix.netcom.com> <5.2.0.9.0.20030430092307.009d1910@pop.ix.netcom.com> Message-ID: <5.2.1.1.0.20030430222544.033965c8@mail.attbi.com> At 12:38 PM 4/30/2003 -0400, R. A. Hettinga wrote: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >At 9:33 AM -0400 4/30/03, John Kelsey wrote: > >Geez, Bob, sometimes you do it because it's *fun*. > >Agreed. > >However, try have fun all your life and not getting paid for it. >Artists are a good example, but you can't do that all your life >without money either. There aren't a whole lot of landed aristocracy >in the world, for instance, or even those who live on trust funds. Or >who are even retired. :-). I believe it was Albert Einstein that suggested budding physicists not strive for professional careers but engage in full-time work in some other area (perhaps in a trade). Treat science as an avocation, something that can be successfully pursued in one's spare time. (He did some of his most important work while engaged as a patent examiner). Today, there are still quite a few people engaged in amateur astronomy. They toil night after night taking measurements and making observations. Many might think its all for naught, what could they possibly contribute to serious science now that there is Hubble and are so many large instruments managed by professional astronomers and staffs. And they would be wrong. In the past decade appropriate electronic image sensors have dramatically improved in performance and dropped in price. Smaller amateur instruments, some not all that small, now have many of the capabilities that formerly were the province of the large professional variety prior to such sensors. Also, the sky is vast and most of the professional instruments have very small fields of view. Someone has to tell where to look. Often its the professional astronomers pursuing some esoteric work, but increasingly its the thousands of astronomers and their keen eyes which first spot important amateurs. The result, amateurs (who were not long ago looked upon by professionals as charming relics) are now receiving increased respect and increasingly partnering with professionals on important work (and being named as co-authors of published papers). Of course these amateurs aren't paid, so why or how do they do it? Many are retired and rather than touring in country their mobile homes or watching the grandchildren have embarked on a sort of second or third career. Others take advantage of computers and the electronic sensors to run sky patrol cameras so the telescope does most all the work and they still have their full-time careers. I see no reason why important security, crypto or financial crypto developments must be linked with direct or immediate financial compensation. steve From zenadsl6186 at zen.co.uk Wed Apr 30 16:03:38 2003 From: zenadsl6186 at zen.co.uk (Peter Fairbrother) Date: Thu, 01 May 2003 00:03:38 +0100 Subject: Anonglish (was: Re: Authenticating Meat) In-Reply-To: <20030430221007.GH13867@jal.clueinc.net> Message-ID: Trei, Peter wrote: > It really depends on the cipher. If the cipher is a group, then case 1 is > bad - since > >> blowfish(blowfish(plaintext,key1),key2) = blowfish(plaintext, key3) >> > Some ciphers, such as DES, are not groups. This is why double > and triple DES are stronger than single DES. The property of encryption in a particular cipher not being a group operation is insufficient in itself to make multiple encryptions in that cipher stronger than single encryptions in it. It may be the case that multiple encryption is less secure than single encryption. Not likely, but it is possible. And Jamie Lawrence wrote: > On Wed, 30 Apr 2003, Sunder wrote: >> blowfish(blowfish(plaintext,key1),key2) is bad, > > I believe it doesn't gain you anything, but it isn't "bad" in the sense > of weakening anything. If the encryption is a group operation then at best multiple encryptions using that cipher are as strong as single encryptions - but if the keys are related then it is possible that multiple encryptions may be weaker, and it's a difficult (maybe even hard) problem to decide whether the keys are related. Then there's the meet-in-the-middle attack, qua google. Using multiple encryption in different ciphers is a fraught subject, full of potential pitfalls. It hasn't been well researched, probably partly because it's so complex. It is possible that it can be less secure than single encryption in a single cipher. Personally, for the two ciphers case, I'd choose Blowfish and AES, ensuring the keys are randomly and seperately generated, because Blowfish is a Feistel cipher and AES isn't (and because both are well-peer-reviewed, and available), but that's just a feeling which I can't really justify mathematically. (All this is a bit nit-picking-ish, except the [multiple encryption with a ciher that is a group operation can't be stronger than a single encryption with that cipher] bit, and anything else is not _likely_ to be relevant, but it still should be considered when designing multiple encryption systems) -- Peter Fairbrother From zem at vigilant.tv Wed Apr 30 21:09:59 2003 From: zem at vigilant.tv (zem) Date: Thu, 01 May 2003 00:09:59 -0400 Subject: Making Money in Digital Money Message-ID: > So Bob either redistributes the decrypted bits, or cruises through > the analog hole. Game over. All your Valentis are belong to us. Point is Bob can't redistribute the file with Alice's approval rating still intact. And it's the approval rating that people are paying her for, not the content. Bob can't redistribute the profitable part, only the worthless part. -- mailto:zem at vigilant.tv F289 2BDB 1DA0 F4C4 DC87 EC36 B2E3 4E75 C853 FD93 http://vigilant.tv/ "..I'm invisible, I'm invisible, I'm invisible.." From zem at vigilant.tv Wed Apr 30 21:50:48 2003 From: zem at vigilant.tv (zem) Date: Thu, 01 May 2003 00:50:48 -0400 Subject: Making Money in Digital Money Message-ID: > Not so. What stops editors' output to be re-distributed at zero cost ? Editor produces output in the form of signatures that indicate approval of content. Editor encrypts content to customers' public key before signing it. Customer can't redistribute Editor's signature in a form that's useful to anyone else without also distributing his own secret key. Hence, re-distributing Editor's output is at the cost of revealing one's own secret key (which will have financial consequences if Editor arranges the deal correctly). There are probably neater ways of achieving the same result. -- mailto:zem at vigilant.tv F289 2BDB 1DA0 F4C4 DC87 EC36 B2E3 4E75 C853 FD93 http://vigilant.tv/ "..I'm invisible, I'm invisible, I'm invisible.." From die at die.com Wed Apr 30 22:09:02 2003 From: die at die.com (Dave Emery) Date: Thu, 1 May 2003 01:09:02 -0400 Subject: Making Money in Digital Money In-Reply-To: References: Message-ID: <20030501050902.GM5378@pig.die.com> On Thu, May 01, 2003 at 12:50:48AM -0400, zem wrote: > > Not so. What stops editors' output to be re-distributed at zero cost ? > > Editor produces output in the form of signatures that indicate approval > of content. Editor encrypts content to customers' public key before > signing it. Customer can't redistribute Editor's signature in a form > that's useful to anyone else without also distributing his own secret > key. Hence, re-distributing Editor's output is at the cost of revealing > one's own secret key (which will have financial consequences if Editor > arranges the deal correctly). But Mallet can just strip her signature and substitute his and build up a reputation as a quality editor without doing any work. Nobody needs HER signature if his judgements/filtering are just as good.... > > There are probably neater ways of achieving the same result. > > > -- > mailto:zem at vigilant.tv F289 2BDB 1DA0 F4C4 DC87 EC36 B2E3 4E75 C853 FD93 > http://vigilant.tv/ "..I'm invisible, I'm invisible, I'm invisible.." -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass 02493 PGP fingerprint 1024D/8074C7AB 094B E58B 4F74 00C2 D8A6 B987 FB7D F8BA 8074 C7AB From zem at vigilant.tv Wed Apr 30 23:18:25 2003 From: zem at vigilant.tv (zem) Date: Thu, 01 May 2003 02:18:25 -0400 Subject: Making Money in Digital Money Message-ID: Dave Emery wrote: > But Mallet can just strip her signature and substitute his > and build up a reputation as a quality editor without doing any work. > Nobody needs HER signature if his judgements/filtering are just as > good.... Yes, but: If Alice's editorial approval is valuable, Mallet won't be the only one emulating her output - he'll be competing with many other emulators. Each of those emulators subscribes to (and pays for) Alice's service. Alice controls supply - and hence her emulators' reputations. She can charge higher rates for better service - faster, or with more coverage. She can deliberately degrade the quality or timeliness of a selected customer's service, if she figures out he's a Mallet - damaging her reputation in the process, but perhaps hurting his more. All the little Mallets have to pay Alice's top rates if they want to match her reputation. They can't afford to get their stuff from another Mallet, if they want to keep up, because then _he_ controls their supply. The value of Mallet's reputation can approach that of Alice, but - as long as there's a nanosecond's delay between her output and his - never quite reach it. Any of the tricks Mallet can use to increase his reputation (emulating multiple Editors, for example) are also available to Alice. Highly competitive, yes - but the money flows upstream. You can watch this happening right now, albeit without the crypto and cash: weblogs. Substitute 'link to content' for 'signature', and 'link to weblog' for 'payment', and the process is the same. Notice how 'payments' aren't evenly distributed? There's a reason for that. And it's not guns. -- mailto:zem at vigilant.tv F289 2BDB 1DA0 F4C4 DC87 EC36 B2E3 4E75 C853 FD93 http://vigilant.tv/ "..I'm invisible, I'm invisible, I'm invisible.." From nobody at remailer.privacy.at Wed Apr 30 18:45:07 2003 From: nobody at remailer.privacy.at (Anonymous) Date: Thu, 1 May 2003 03:45:07 +0200 (CEST) Subject: Making Money in Digital Money Message-ID: <67a09eaa889698d2942dd1e35f0ddd87@remailer.privacy.at> Robert Hettinga writes: > So, how do you do this? Easy. For software, the first copy is > auctioned for cash. Then the second copy, wherever it is on the > network, is auctioned for cash, and so on, until nobody's buying any > more copies, across the whole network. This is the oldest model of > trade there ever was. It's how red ochre from Maine ended up in > Neolithic tombs in Ireland. It's how Homo Habilis traded raw rocks > for finished hand axes across hundreds of miles of African savanna. > The Agorics guys called it the "digital silk road" for obvious > reasons. I hate to get into this, because I tried to educate you on this last year and you were totally impervious. As usual you started firing invective in all directions in an attempt at misdirection. Let me explain it so simply you can't miss it. This system does not work, because by the time the content is in the hands of just a few people, they will be bidding against each other to sell it on the net. Such a state of competition will quickly drive the prices down to the cost of reproduction, which is effectively zero. Therefore you can't sell more than a dozen-odd copies of the software at a non-zero price. If most of the people buying this software are doing so with the expectation of recouping their costs by re-selling, then no one will buy after the first few, since they will not be able to make any money selling at zero. But this means that even those first few buyers won't be able to sell at non-zero, since these second-wave potential buyers were their customers. Try to follow the logic here, Bob. The inability to make a profit after there are a dozen sellers *implies*, logically, that even the very first seller can't make a profit, because his potential buyers will see that they have no profit opportunities. Therefore the only motivation anyone would have here is to buy the software for what it is worth to them, and not to redistribute it. So we are talking about a private-contracting, custom-built software model. But it's not a software sales model. > For most digital goods, you just need to digitally sign the copies, > and you're done. Look Ma, no lawyers. Okay, no legislators and > regulators. No intellectual property attorneys. No "is a person", or > "know your customer", or other mystifications of identity. Funny > thing about this is, you'll notice the people who make the most new > stuff the most often get the most money in a single product's value > chain. Which is, oddly enough, exactly what we do now -- ask a movie > star -- only we'll be doing it cheaper. This is even more stupid. So someone signs the software. What difference does that make? It doesn't stop redistribution, it doesn't stop piracy, it doesn't keep it from being used in any way. It's irrelevant.