bird.comms + compilers (urls)

John Young jya at pipeline.com
Sat Oct 19 05:57:01 PDT 2013


This is the most interesting post to appear since the list
was re-energized.

The weakest elements of comsec are related to matters
seldom discussed on crypto fora which are heavily biased
toward digital technology. As might be expected on the
Internet and its crippling and perhaps fatal dependence on
digi-tech isolation from reality.

Manifold other means and methods of comsec get short
shrift on the Internet yet are the most frequent ways that
digital comsec is breached, defeated, embarassed,
ridiculed, dumped for legacy methods that require
deep familiarity with divers physical and electromagnetic
constraints and exploits.

Brian Carroll, in case you have missed his copious
contributions elsewhere, is more adept than most in
addressing the conceits of digi-tech masters by providing
leads to these diverse legacies. Don't expect him to
rollover and succumb to the usual putdowns of conceited
digi-techers.

Happily, this noble list is broadminded enough to host
his offerings which would be banned on premier digi-tech
hideaways from reality.

At 12:53 AM 10/19/2013, you wrote:
>// analysis, feedback, and pattern matching...
>
>Dude, where's my code?
>http://phys.org/news/2013-10-dude-code.html
>
>(re: paper is titled "Towards Optimization-Safe Systems: Analyzing the
>Impact of Undefined Behavior." // Stack)
>
>Birds on repeat: Do playbacks hurt fowl?
>http://phys.org/news/2013-10-birds-playbacks-fowl.html
>
>(context is of birdcall networks & modem protocols, perhaps this issue
>of emulation relevant to security protocols, monitoring, attack
>strategy- or not)
>
>Cuckoos impersonate hawks by matching their 'outfits'
>http://phys.org/news/2013-10-cuckoos-impersonate-hawks-outfits.html
>
>(crazy cuckoo birds impersonate hawks, exploit of localized
>overlapping pattern matching. potential comp.security or software
>systems correlation, beyond poli-sci)





More information about the cypherpunks mailing list