From Rayzer at riseup.net Tue Dec 1 08:26:35 2015 From: Rayzer at riseup.net (Rayzer) Date: Tue, 1 Dec 2015 08:26:35 -0800 Subject: DuckDuckGo In-Reply-To: <2078690.KKuAfCiP3B@lapuntu> References: <1469354.LnzHOKxhlb@lapuntu> <2078690.KKuAfCiP3B@lapuntu> Message-ID: <565DCA3B.80907@riseup.net> rysiek wrote: > Even if, not worse than Google or Bing. And they even sport a Tor > Hidden Service, but I am guessing that's just to piss Juan off. Personally I'm apoplectic over their XMPP server, DukGo.com. RR -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From Rayzer at riseup.net Tue Dec 1 08:29:37 2015 From: Rayzer at riseup.net (Rayzer) Date: Tue, 1 Dec 2015 08:29:37 -0800 Subject: DuckDuckGo In-Reply-To: <499976125.585.58a07a58-cde4-493a-b881-94fd700a2432.open-xchange@office.mailbox.org> References: <1469354.LnzHOKxhlb@lapuntu> <2078690.KKuAfCiP3B@lapuntu> <499976125.585.58a07a58-cde4-493a-b881-94fd700a2432.open-xchange@office.mailbox.org> Message-ID: <565DCAF1.4030908@riseup.net> Ben Mezger wrote: > I switched to search.disconnect.me. Results are waaay better than > those from Duckduckgo. That's my usual search engine... I also want to point out that 'Startpage', another supposedly 'secure' search engine, seems to have a 'lean to the right'. When I do news searches an abnormal amount of returns are to sites like Newsblaze etc. RR -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From Rayzer at riseup.net Tue Dec 1 08:32:54 2015 From: Rayzer at riseup.net (Rayzer) Date: Tue, 1 Dec 2015 08:32:54 -0800 Subject: DuckDuckGo In-Reply-To: References: Message-ID: <565DCBB6.50106@riseup.net> Ryan Carboni wrote: > Bing is paying me $5 a month in Amazon gift cards to use their search > engine I'll NEVER give up my cybersec for an (ugh) Amazon gift card. Starbucks. RR -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From Rayzer at riseup.net Tue Dec 1 08:39:12 2015 From: Rayzer at riseup.net (Rayzer) Date: Tue, 1 Dec 2015 08:39:12 -0800 Subject: Brief history lesson on Islam - Fwd: ALA Senate candidate Bernard Gaynor struts his stuff in a powerful speech. In-Reply-To: References: <2864237.6kcM8u2a4p@lapuntu> <1562493.mEnkJK3xiL@lapuntu> Message-ID: <565DCD30.1060907@riseup.net> Zenaan Harkness wrote: > On 12/1/15, rysiek wrote: >> Dnia poniedziałek, 30 listopada 2015 21:56:06 rysiek pisze: >>> Funny, that. >>> >>> Sounds eerily similar to what US Republicans (and many Democrats) would >>> say. >>> I didn't know you're a fan, Zenaan! >> Come to think about it, it's interesting how not long after Russia goes to >> "war against ISIS", you seem to develop a strong islamophobia. :) > It's a random violence phobia, and my government having no strategy to > handle immigrants who might, or at least those who subsequently do > some random violent act. Random violence done by those born here is > another matter again. > > I don't know that it's relevant, but my position goes way back - and > if it were truly relevant I could demonstrate that - but is it? What > is relevant or useful? Perhaps my ability to communicate my position > is (hopefully) improving over time. > > Zenaan > > My position is "My country excludes economic immigrants and brings in the thugs... ARVN soldiers, Iraqi "interpreters", Chechens who fought our proxy war against Russia... Libyan military officials who defected from Gadaffi and lived in Vienna Va, right down the road from Langley, until they ended up commanding LIFG thugs who later became the seed formation for ISIS and al-Nusra... and my country DESERVES every bit of mayhem that policy causes. So armor up dude... and get hyper-vigilant. RR -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From Rayzer at riseup.net Tue Dec 1 08:54:23 2015 From: Rayzer at riseup.net (Rayzer) Date: Tue, 1 Dec 2015 08:54:23 -0800 Subject: The Moral Character of Cryptographic Work In-Reply-To: <20151201164023.GA23078@antiproton.jfet.org> References: <20151201164023.GA23078@antiproton.jfet.org> Message-ID: <565DD0BF.3080103@riseup.net> Riad S. Wahby wrote: > Phillip Rogaway (Professor of CS at UC Davis) has released in the > form of an essay his keynote talk from Asiacrypt. Very interesting > reflection on the politics of crypto, historically and at present. > > -- > > "The Moral Character of Cryptographic Work" > Phil Rogaway > http://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdf > > Cryptography rearranges power: it configures who can do what, from > what. This makes cryptography an inherently political tool, and it > confers on the field an intrinsically moral dimension. The Snowden > revelations motivate a reassessment of the political and moral > positioning of cryptography. They lead one to ask if our inability to > effectively address mass surveillance constitutes a failure of our > field. I believe that it does. I call for a community-wide effort to > develop more effective means to resist mass surveillance. I plea for a > reinvention of our disciplinary culture to attend not only to puzzles > and math, but, also, to the societal implications of our work. > > -- > > -=rsw > So much for this guy's UC tenure, or tenure track, if any. RR -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From me at benmezger.com Tue Dec 1 03:37:04 2015 From: me at benmezger.com (Ben Mezger) Date: Tue, 1 Dec 2015 09:37:04 -0200 (BRST) Subject: DuckDuckGo In-Reply-To: <2078690.KKuAfCiP3B@lapuntu> References: <1469354.LnzHOKxhlb@lapuntu> <2078690.KKuAfCiP3B@lapuntu> Message-ID: <499976125.585.58a07a58-cde4-493a-b881-94fd700a2432.open-xchange@office.mailbox.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2230 bytes Desc: not available URL: From ryacko at gmail.com Tue Dec 1 09:38:38 2015 From: ryacko at gmail.com (Ryan Carboni) Date: Tue, 1 Dec 2015 09:38:38 -0800 Subject: DuckDuckGo Message-ID: Nevermind. I just got an ad for an NSA career on DuckDuckGo when searching for "NSA budget." -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 124 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: duckduckgo.png Type: image/png Size: 10580 bytes Desc: not available URL: From ryacko at gmail.com Tue Dec 1 09:44:54 2015 From: ryacko at gmail.com (Ryan Carboni) Date: Tue, 1 Dec 2015 09:44:54 -0800 Subject: The Moral Character of Cryptographic Work Message-ID: Chomsky seems to be doing quite well for himself, so I doubt this Rogaway will suffer much. I think I will write on how cryptography is not a science. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 212 bytes Desc: not available URL: From drwho at virtadpt.net Tue Dec 1 10:19:28 2015 From: drwho at virtadpt.net (The Doctor) Date: Tue, 1 Dec 2015 10:19:28 -0800 Subject: DuckDuckGo In-Reply-To: <2078690.KKuAfCiP3B@lapuntu> References: <1469354.LnzHOKxhlb@lapuntu> <2078690.KKuAfCiP3B@lapuntu> Message-ID: <20151201101928.d990bce68374a4dacb8ae164@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Tue, 01 Dec 2015 10:44:44 +0100 rysiek wrote: > Even if, not worse than Google or Bing. And they even sport a Tor Hidden > Service, but I am guessing that's just to piss Juan off. It's entirely possible that some folks who work at DDG are lurking on this mailing list, so there could be more truth to that than you expect... :D - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ "I'm done with this analogy." --Artie, _Warehouse 13_ -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJWXeSxAAoJED1np1pUQ8RkljkP/20ObrrHRqool/apwR15QIig 4/PD1saWOuYH8rQtgRzUastkB1MZ2COqfuRKCNt3FxEM5wAYSWAqHGTGSvErIfPg HEABStD6pPfjtnPPQ+ki4vpbjqeVHm2d2Js8x3d5Ln03wmLoYk7kVWDQ+UhrVO9K xWXtFtIUV6OQwX6FdPRU6uKuXlyhB629LwNFuIFkArAIOzOVXXJFmwIUrSC2Mlbb gZTHkjLxntOA6AkKZN12F8YAhju5UnO/c45+tvJg5rRFN3nURsSnX8RZqjWK39tF MvxCUDD2u7RKksDOj6hKsgDwXHdPidyBkUAvDI/vVYOENTuKeap8DSppm74Tqq8d 8XRrCaN0ElKr8KyznAKJqEeI78mfAB+Q0wiugPzu4MasXIO+m+K7pQO4XB3p1Ip+ sZCSu2yMhhlxt7pKjKXGdpx4rTyC4eFjyYrRv8Lbegix7ca/FaLc+lpEuL9UMlf+ //LdrDPmtQIbmjYwKZahKLC5vwP7HKesuU38Vm5IIUla0Xkd6RNr3+McauKVcZ+U AsIt3fhqdT43Zwde8kjVYRykPQHhvxD+YBSdRUyIkqd/GDkw4PhhC8BKsDKhdt8m L23+dXzp8/HdxNbp6j55bUaKv92X2heYqhbq1u4JBIF021z4tK/rZFW5AbzuYvrh xDD/lBEKQA82SK1060fo =9BG2 -----END PGP SIGNATURE----- From drwho at virtadpt.net Tue Dec 1 10:21:06 2015 From: drwho at virtadpt.net (The Doctor) Date: Tue, 1 Dec 2015 10:21:06 -0800 Subject: DuckDuckGo In-Reply-To: <565DCA3B.80907@riseup.net> References: <1469354.LnzHOKxhlb@lapuntu> <2078690.KKuAfCiP3B@lapuntu> <565DCA3B.80907@riseup.net> Message-ID: <20151201102106.4e0325b61862b6f804059e9d@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Tue, 1 Dec 2015 08:26:35 -0800 Rayzer wrote: > Personally I'm apoplectic over their XMPP server, DukGo.com. Has it ever been online for longer than ten minutes at a stretch? - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ "I'm done with this analogy." --Artie, _Warehouse 13_ -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJWXeUSAAoJED1np1pUQ8Rk6NQP/3irjl9d8hhusKxVKMv8/L9/ SfVCVgxUISg0wSr9RQV6pEqMVQl51smOAxi6nXeL6XJNS+ezW9wTK7CoKwK0PFub qbCJS+pJmpNR1+YTsF9D11vW0wvgCZ4TCdXs1kEMICTv2ZKxgVpSd2bfvcby05wD 87Kh6Ow3GDJy1qluLByhOgEe/eQTCp9K7hZSrbdkQfntQ6tvw5jZ3alCAHCg51WF i+G5x9dm93CqgXGDgngCw5LoRot6CY7qAMXEliGd0RRPrlZFgt9hzEEEyThNlbRo aN032+T2yWfUTGUWZGJUZoC3hZJDEOfy5od3X18J23/WNrQSElIstmCbHbK8J8sp y7Nlt0pAtbI5HDqDkPPUrUVVhT69/xBBrYVWvRedJ6x0OY6sn1LlRbz03By/efrJ YsI1MNlNM20o75ddER9tdUoHAlqvLuDRQO/dssGlADxGiGqXcA8kDmFynfiTWkmv qqHIjJQ5MJ5BRavH42maDwcSAebxfCoF1yIFkoxA13RXLHoKyPUej9IR722yrSG6 ac19OtdLKGF9m6Jzm+Pb9TqACFe+jTks1TzFDfPGftTf1pCw0Rvz5rRFOEa5RK9b 4WMAIZYhPkH7f5PeSkJDc4h311AFi7LqUTljHy6kP1dYiNzBaUzXyB8cIqU07P34 x3kXIydc0Xei//iwQGUD =9uA6 -----END PGP SIGNATURE----- From rysiek at hackerspace.pl Tue Dec 1 01:44:44 2015 From: rysiek at hackerspace.pl (rysiek) Date: Tue, 01 Dec 2015 10:44:44 +0100 Subject: DuckDuckGo In-Reply-To: References: <1469354.LnzHOKxhlb@lapuntu> Message-ID: <2078690.KKuAfCiP3B@lapuntu> Dnia poniedziałek, 30 listopada 2015 21:13:50 piszesz: > On Mon, Nov 30, 2015 at 8:32 PM, rysiek wrote: > > That's true. However, that's still better than Google or Bing, which don't > > even go that far. > > Is a wolf in sheep's clothing better than an overt wolf? It is not. I have not seen anything that suggests it is indeed a wolf, however. And even if it's a wolf, it's at least a different wolf than Google or Bing. These two have had enough sheep meet by any book. > > What I'm trying to say, I guess, is: it would be nice if we had something > > more to work with than just "some guys on the Internets said that for > > realz the WHOIS showed Annapolis." > > Fair enough. You have no particular reason to believe me; and a domain > registration address adjacent the Naval Academy doesn't prove anything. Not to mention registration in Benghazi and Langley, am I rite? I do have no particular reason to believe you, that's true. And a "because I said so" level of proof for registration address adjacent to Naval Academy does indeed prove nothing. Now, if that's true, probably somebody else dug something up also, right? > Nevertheless that's why I consider DDG an obvious honeypot. YMMV. Even if, not worse than Google or Bing. And they even sport a Tor Hidden Service, but I am guessing that's just to piss Juan off. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From rysiek at hackerspace.pl Tue Dec 1 01:51:30 2015 From: rysiek at hackerspace.pl (rysiek) Date: Tue, 01 Dec 2015 10:51:30 +0100 Subject: [cryptography] Paris Attacks Blamed on Strong Cryptography and Edward Snowden In-Reply-To: <20151201051922.87F3DA06D7A@palinka.tinho.net> References: <20151201051922.87F3DA06D7A@palinka.tinho.net> Message-ID: <2540401.FvFINl6OQE@lapuntu> Dnia wtorek, 1 grudnia 2015 00:19:22 dan at geer.org pisze: > In dealing with high level decision makers, the best strategy is > always to provide three options and have the decision maker choose > amongst them. Taking the American electorate as that high level > decision maker, I would find it refreshing were Brennan to present > said electorate with the choice between [1] content analysis (hence > crypto side doors and the exposure of content), [2] traffic analysis > (hence data retention at a level heretofore unseen and the cataloged > exposure of real social networks), and [3] a willing resolve to tolerate > the occasional terrorist success. It is a choice amongst losses. Aww, but you assume that these are three mutually exclusive options. That's quaint, seeing how right now we have [1] *and* [2] *and still* we have to tolerate occasional terrorist success (that being [3]). So the way I look at this is: unless it can be *proven* to me that [1] or [2] will significantly lower the occurence rate of [3], they should not even be considered valid options. Once somebody does prove that [1] or [2] actually do significantly lower the occurence late of [3], then and *only* then can we have informed debate about them, taking into account tangible and intangible costs of implementing them. In which case we still have to remember that [3] will always be there, from time to time. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From Rayzer at riseup.net Tue Dec 1 11:16:58 2015 From: Rayzer at riseup.net (Razer) Date: Tue, 1 Dec 2015 11:16:58 -0800 Subject: DuckDuckGo In-Reply-To: <20151201102106.4e0325b61862b6f804059e9d@virtadpt.net> References: <1469354.LnzHOKxhlb@lapuntu> <2078690.KKuAfCiP3B@lapuntu> <565DCA3B.80907@riseup.net> <20151201102106.4e0325b61862b6f804059e9d@virtadpt.net> Message-ID: <565DF22A.3010905@riseup.net> On 12/01/2015 10:21 AM, The Doctor wrote: > On Tue, 1 Dec 2015 08:26:35 -0800 > Rayzer wrote: > > > Personally I'm apoplectic over their XMPP server, DukGo.com. > > Has it ever been online for longer than ten minutes at a stretch? > I've never noticed a loss of connectivity ... otoh I'm not one of those fed lurkers whose uptime is 1956days (and logging) either. RR -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From rsw at jfet.org Tue Dec 1 08:40:23 2015 From: rsw at jfet.org (Riad S. Wahby) Date: Tue, 1 Dec 2015 11:40:23 -0500 Subject: The Moral Character of Cryptographic Work Message-ID: <20151201164023.GA23078@antiproton.jfet.org> Phillip Rogaway (Professor of CS at UC Davis) has released in the form of an essay his keynote talk from Asiacrypt. Very interesting reflection on the politics of crypto, historically and at present. -- "The Moral Character of Cryptographic Work" Phil Rogaway http://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdf Cryptography rearranges power: it configures who can do what, from what. This makes cryptography an inherently political tool, and it confers on the field an intrinsically moral dimension. The Snowden revelations motivate a reassessment of the political and moral positioning of cryptography. They lead one to ask if our inability to effectively address mass surveillance constitutes a failure of our field. I believe that it does. I call for a community-wide effort to develop more effective means to resist mass surveillance. I plea for a reinvention of our disciplinary culture to attend not only to puzzles and math, but, also, to the societal implications of our work. -- -=rsw From jason.mcvetta at gmail.com Tue Dec 1 11:42:50 2015 From: jason.mcvetta at gmail.com (Jason McVetta) Date: Tue, 1 Dec 2015 11:42:50 -0800 Subject: DuckDuckGo In-Reply-To: <2078690.KKuAfCiP3B@lapuntu> References: <1469354.LnzHOKxhlb@lapuntu> <2078690.KKuAfCiP3B@lapuntu> Message-ID: On Tue, Dec 1, 2015 at 1:44 AM, rysiek wrote: > > Fair enough. You have no particular reason to believe me; and a domain > > registration address adjacent the Naval Academy doesn't prove anything. > > Not to mention registration in Benghazi and Langley, am I rite? > Huh? That has nothing to do with anything I wrote. I said YMMV, but I didn't realize you'd be driving a clown car... -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 828 bytes Desc: not available URL: From rysiek at hackerspace.pl Tue Dec 1 04:10:47 2015 From: rysiek at hackerspace.pl (rysiek) Date: Tue, 01 Dec 2015 13:10:47 +0100 Subject: DuckDuckGo In-Reply-To: <499976125.585.58a07a58-cde4-493a-b881-94fd700a2432.open-xchange@office.mailbox.org> References: <2078690.KKuAfCiP3B@lapuntu> <499976125.585.58a07a58-cde4-493a-b881-94fd700a2432.open-xchange@office.mailbox.org> Message-ID: <1942533.8jJhPWTymz@lapuntu> Dnia wtorek, 1 grudnia 2015 09:37:04 Ben Mezger pisze: > I switched to search.disconnect.me. Results are waaay better than those from > Duckduckgo. Thanks, gonna test it; however, I tend to be quite happy with DDG results. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From zen at freedbms.net Tue Dec 1 05:44:12 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Tue, 1 Dec 2015 13:44:12 +0000 Subject: Scarfolk in North West England Message-ID: First time I came across their website, perhaps it's new for you too... http://scarfolk.blogspot.ro/2015/10/personal-space-allowance-1975.html From me at benmezger.com Tue Dec 1 07:56:24 2015 From: me at benmezger.com (Ben Mezger) Date: Tue, 1 Dec 2015 13:56:24 -0200 (BRST) Subject: DuckDuckGo In-Reply-To: <1942533.8jJhPWTymz@lapuntu> References: <2078690.KKuAfCiP3B@lapuntu> <499976125.585.58a07a58-cde4-493a-b881-94fd700a2432.open-xchange@office.mailbox.org> <1942533.8jJhPWTymz@lapuntu> Message-ID: <1139300655.915.e2bbb5a0-8cc8-4353-b6d0-c5be29b0a63e.open-xchange@office.mailbox.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1439 bytes Desc: not available URL: From juan.g71 at gmail.com Tue Dec 1 09:59:20 2015 From: juan.g71 at gmail.com (juan) Date: Tue, 1 Dec 2015 14:59:20 -0300 Subject: DuckDuckGo In-Reply-To: <2078690.KKuAfCiP3B@lapuntu> References: <1469354.LnzHOKxhlb@lapuntu> <2078690.KKuAfCiP3B@lapuntu> Message-ID: <565dde31.8baa8c0a.97584.08c6@mx.google.com> On Tue, 01 Dec 2015 10:44:44 +0100 rysiek wrote: > > Nevertheless that's why I consider DDG an obvious honeypot. YMMV. > > Even if, not worse than Google or Bing. And they even sport a Tor > Hidden Service, but I am guessing that's just to piss Juan off. > Hehe =P Anyway, I think one of DDG's strongest features is that DDG is not google... I just noticed, dukgo.com redirects to duck.co - maybe that means they are not completely controlled by the US gov't. Or maybe it means that colombia is even more fucked than I thought. Oh, namecheap handles .co domains... Oh, .co registry : Internet S.A.S (subsidiary of Neustar), Oh, https://en.wikipedia.org/wiki/Neustar and so on and so forth... From juan.g71 at gmail.com Tue Dec 1 10:41:25 2015 From: juan.g71 at gmail.com (juan) Date: Tue, 1 Dec 2015 15:41:25 -0300 Subject: DuckDuckGo In-Reply-To: References: Message-ID: <565de80e.b2628c0a.5d141.0859@mx.google.com> On Mon, 30 Nov 2015 23:22:09 -0800 Ryan Carboni wrote: > https://en.wikipedia.org/wiki/Distributed_search_engine > > There exists distributed search engines if you are truly paranoid. > > Duckduckgo's search model is different yes, but right now Bing is > paying me $5 a month in Amazon gift cards to use their search engine, > and Google's algorithm is amazing. LMAO! google used to be *slightly* better than the 'competition' - now it's garbage. As a funny side note, gmail's spam filter incorrectly tags something like 5% of tor-talk messages as spam. The address tor-talk at lists.torproject.org is a legit address, the addresses of the messages are legit, I've manually marked more than a 100 messages as NOT SPAM and yet the stupid google cunts can't 'learn' that they are getting it wrong. It's interesting that such an 'information technology' company is worth billions of billions and rules the universe.... From me at benmezger.com Tue Dec 1 09:48:40 2015 From: me at benmezger.com (Ben Mezger) Date: Tue, 01 Dec 2015 15:48:40 -0200 Subject: DuckDuckGo In-Reply-To: References: Message-ID: Can't you disable ads? https://duckduckgo.com/settings -> Advertisements Or does that only disables the DDG's ads? Ryan Carboni writes: > Nevermind. I just got an ad for an NSA career on DuckDuckGo when searching > for "NSA budget." -- Kind regards, Ben Mezger -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 629 bytes Desc: not available URL: From tigrutigru at gmail.com Tue Dec 1 10:15:14 2015 From: tigrutigru at gmail.com (ksenia serova) Date: Tue, 1 Dec 2015 18:15:14 +0000 Subject: Cryprocontracts hackathon 1-5 Dec online peepshow style Message-ID: There was a lot of digital ink spilled over the topic of smartcontracts. If anyone is interested to have a look at them contracts (in Solidity) being built and deployed to the chain live - there is an online smartcontracts hackathon here http://hack.ether.camp/ for the next 5 days. People usually use npm packages to compile and web3 package to send a contract to the chain via http rpc or lpc socket. In this case it is a bit of a smartcontract peepshow -each team IDE is open for viewers. Will be interesting to see what comes out of it, and what challenges people are actually experiencing etc. The registration stays open towards the end, if anyone wants to give it a go. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 775 bytes Desc: not available URL: From jdb10987 at yahoo.com Tue Dec 1 12:08:48 2015 From: jdb10987 at yahoo.com (jim bell) Date: Tue, 1 Dec 2015 20:08:48 +0000 (UTC) Subject: Cryprocontracts hackathon 1-5 Dec online peepshow style In-Reply-To: References: Message-ID: <1462788971.13586223.1449000529009.JavaMail.yahoo@mail.yahoo.com> >From: ksenia serova >There was a lot of digital ink spilled over the topic of smartcontracts. If anyone is interested to have a look at them contracts (in Solidity)> being built and deployed to the chain live - there is an online smartcontracts hackathon here http://hack.ether.camp/ for the next 5 days. >People usually use npm packages to compile and web3 package to send a contract to the chain via http rpc or lpc socket. In this case> it is a bit of a smartcontract peepshow -each team IDE is open for viewers. Will be interesting to see what comes out of it, and what> challenges people are actually experiencing etc. The registration stays open towards the end, if anyone wants to give it a go. Blast from the past, see older message below by Zenaan Harkness. But my question is, "Will this system allow a 'Well-funded, anonymous unlimited prediction market" to exist? You know, the kind where people could make bets predicting the death of whoever they'd like to name.  What is given the name, "WUMPA markets".  A prediction which cannot be vetoed by the operators of some system, say the owners of Ethereum or Augur.  I suggest that's what the world is waiting for.               Jim Bell   - Zenaan Harkness    - - Nov 3 at 3:25 PM On 11/3/15, jim bell wrote: > a little caution is still in order.  Perhaps we should call them > "Well-funded anonymous unlimited prediction markets."WUMPA markets. At least it's pronounceable. Well-funded Unlimited Markets for Prediction Anonymously -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8412 bytes Desc: not available URL: From pgut001 at cs.auckland.ac.nz Tue Dec 1 16:29:25 2015 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Wed, 2 Dec 2015 00:29:25 +0000 Subject: The Moral Character of Cryptographic Work In-Reply-To: <20151201164023.GA23078@antiproton.jfet.org> References: <20151201164023.GA23078@antiproton.jfet.org> Message-ID: <9A043F3CF02CD34C8E74AC1594475C73F4B95CAF@uxcn10-5.UoA.auckland.ac.nz> Riad S. Wahby writes: >Phillip Rogaway (Professor of CS at UC Davis) has released in the form of an >essay his keynote talk from Asiacrypt. Very interesting reflection on the >politics of crypto, historically and at present. For those who missed the talk this morning, he's also doing a public lecture next Wednesday: https://www.auckland.ac.nz/en/about/news-events-and-notices/news/news-2015/12/mass-surveillance-and-a-crisis-of-social-responsibility.html Feel free to drop by, and then follow it up with KiwiCon the next day: https://www.kiwicon.org/ Peter. From jya at pipeline.com Wed Dec 2 08:58:01 2015 From: jya at pipeline.com (John Young) Date: Wed, 02 Dec 2015 11:58:01 -0500 Subject: Cryptome.biz (RU) not affiliated with Cryptome.org. Message-ID: Cryptome.biz, a Russian virtual currency site registered 25 November 2015, is not affiliated with Cryptome.org. https://cryptome.biz http://www.networksolutions.com/whois/registry-data.jsp?domain=cryptome.biz From ryacko at gmail.com Wed Dec 2 15:02:06 2015 From: ryacko at gmail.com (Ryan Carboni) Date: Wed, 2 Dec 2015 15:02:06 -0800 Subject: DuckDuckGo In-Reply-To: References: Message-ID: Only works if you use cookies. On Tue, Dec 1, 2015 at 9:48 AM, Ben Mezger wrote: > Can't you disable ads? https://duckduckgo.com/settings -> Advertisements > Or does that only disables the DDG's ads? > > Ryan Carboni writes: > > > Nevermind. I just got an ad for an NSA career on DuckDuckGo when > searching > > for "NSA budget." > > > -- > Kind regards, > Ben Mezger > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 916 bytes Desc: not available URL: From coderman at gmail.com Wed Dec 2 17:15:29 2015 From: coderman at gmail.com (coderman) Date: Wed, 2 Dec 2015 17:15:29 -0800 Subject: The Moral Character of Cryptographic Work In-Reply-To: <9A043F3CF02CD34C8E74AC1594475C73F4B95CAF@uxcn10-5.UoA.auckland.ac.nz> References: <20151201164023.GA23078@antiproton.jfet.org> <9A043F3CF02CD34C8E74AC1594475C73F4B95CAF@uxcn10-5.UoA.auckland.ac.nz> Message-ID: On Tue, Dec 1, 2015 at 4:29 PM, Peter Gutmann wrote: > ... > For those who missed the talk this morning, he's also doing a public lecture > next Wednesday: > > https://www.auckland.ac.nz/en/about/news-events-and-notices/news/news-2015/12/mass-surveillance-and-a-crisis-of-social-responsibility.html next up, software engineers who neglect the nation state TAO threat! your lack of input sanitization costs conspiring lives! :o best regards, From coderman at gmail.com Wed Dec 2 17:18:20 2015 From: coderman at gmail.com (coderman) Date: Wed, 2 Dec 2015 17:18:20 -0800 Subject: [cryptography] Cryptome.biz (RU) not affiliated with Cryptome.org. In-Reply-To: References: Message-ID: On Wed, Dec 2, 2015 at 8:58 AM, John Young wrote: > Cryptome.biz, a Russian virtual currency site registered 25 November 2015, > is not affiliated with Cryptome.org. where can i source Conflict-Free JYA Bobble-Headz? From coderman at gmail.com Wed Dec 2 17:21:21 2015 From: coderman at gmail.com (coderman) Date: Wed, 2 Dec 2015 17:21:21 -0800 Subject: FOIPA adventures In-Reply-To: References: <000701d0bcb7$94118e80$bc34ab80$@co.uk> Message-ID: remember this one? the four carefully crafted retorts? On Sun, Sep 27, 2015 at 1:52 AM, coderman wrote: >... > less interesting reply, but a more interesting response on my part: > > FBI claiming privacy interest to refuse ALL of my FOIA regarding the > Sklyarov / Elcomsoft incident years back: > https://www.muckrock.com/foi/united-states-of-america-10/freedmitry-21209/ > > this is my first attempt to argue compelling public interest against a > privacy exemption, > it is as follows; > > > Please recognize the public interest in this request for responsive > records as follows: > > First and foremost, extensive media attention during this period was > generated due to the intersection of "hacking" and "reverse > engineering" combined with the DMCA provisions deeming some > technologies illegal at interest to the information technology > industry as a whole. This reason alone is sufficient and compelling > justification for transparency in a watershed case, however, I shall > continue. > > Second, this case involved not a US citizen, but a foreign national. > As has recently been scoured in the technical press, Wassenar with its > incumbent BIS obligations has brought discussion of the risks > foreigners face visiting the EU and US, in addition to US citizens > abroad who now find themselves subject to severe technical controls > due to their industry participation. I feel that surely this must > provide beyond sufficient justification for public interest in > documents responsive to this request, yet I shall continue to exhaust > the relevant perspectives in my quiver of inquiry. > > Thus thirdly, the conference venue, DEF CON security conference, > itself of notoriety and high esteem in the technical community, was > the operating domain for the closing moves of this investigation. The > logistics and technical considerations for operating in this domain > thus also compounds the public interest in the activity for which the > records responsive to this request have been requested. > > Fourthly, and there is a fourthly for sure, the activities undertaken > by the agency were at risk of alienating a talent pool the Bureau has > increasingly courted and pursued for their invaluable skills in > digital forensic analysis, reverse engineering, and information > security. Balancing actions before a critical group who also interacts > frequently with the agency, and from whom the Bureau itself draws > professional talent, amplifies the interest and relevance of this > inquiry, and the need for unrestrained transparency when identifying > documents responsive to this request. > > Lastly and finally, yet not to diminish the inherent privacy rights > afforded to all earth humans, inalienable, with justice for all, the > privacy rights which this agency has cited in justification for > limiting the documents responsive to this request, please note that > the privacy exemptions provided by law are specific and limited to > situations where there is a compelling personal privacy interest. The > agency has not provided any compelling privacy interest on behalf of > the fine Mr. Sklyarov, and his foreign status removes the common > privacy concerns of an individual within a domestic community at issue > in responsive documents. It is fully reasonable, per Department of > Justice v. Reporters Committee for Freedom of the Press, that the FBI > may provide documents detailing "what they were up to" in this > investigation, without undue burden on the privacy rights of a foreign > citizen briefly visiting to attend a public conference in the United > States. > > Please do recognize and acquiescence to the public interest so broadly in view. it worked, flawlessly! see attached response with minimal redactions: https://www.muckrock.com/foi/united-states-of-america-10/freedmitry-21209/#comm-204252 best regards, From coderman at gmail.com Wed Dec 2 17:26:18 2015 From: coderman at gmail.com (coderman) Date: Wed, 2 Dec 2015 17:26:18 -0800 Subject: PSA: fas.org is now https://www.fas.org/ Message-ID: we thought it would never happen, perhaps outlasting cryptome.org for TLS resistance, and yet, behold! https://www.fas.org/ best regards, [ don't tell them about COMODO HACKAR ;P ... ] From guninski at guninski.com Wed Dec 2 07:45:24 2015 From: guninski at guninski.com (Georgi Guninski) Date: Wed, 2 Dec 2015 17:45:24 +0200 Subject: [cryptography] Paris Attacks Blamed on Strong Cryptography and Edward Snowden In-Reply-To: <20151201051922.87F3DA06D7A@palinka.tinho.net> References: <20151201051922.87F3DA06D7A@palinka.tinho.net> Message-ID: <20151202154524.GA2633@sivokote.iziade.m$> On Tue, Dec 01, 2015 at 12:19:22AM -0500, dan at geer.org wrote: > .... Taking the American electorate as that high level > decision maker.... This is so unsound assumption, you can easily derive FALSE just from it, making the axiomatic system useless. The hamerican electorate is just a bunch of sheeple, by abuse of notation "almost all of them". They elected so much shit... From coderman at gmail.com Wed Dec 2 18:34:49 2015 From: coderman at gmail.com (coderman) Date: Wed, 2 Dec 2015 18:34:49 -0800 Subject: Sheeple In-Reply-To: <20151203014436.32B00A06DB2@palinka.tinho.net> References: <20151203014436.32B00A06DB2@palinka.tinho.net> Message-ID: On Wed, Dec 2, 2015 at 5:44 PM, wrote: > Some would say that to tell the truth you must use fiction... did i tell you about this movie i'm writing? it's all about me robbing a bank. > Episode 18, CBS television show "Person of Interest" > > FINCH is a physically damaged billionaire programmer who developed > machine intelligence for the government this gets you interest for life, sadly. something about classification guides and default sensitive-until dates... > REESE is his sidekick muscle. reese witherspoon always struck me as a practical gal. well versed in krav and other methods of persuasion. > REESE > > No photos? part of requirements along with an FCC license is serving the public interest. here we see a short detour regarding the risk of under-age selfies sent to significant others (soon to be insignificant) > FINCH > > Not everyone in New York has a driver's license, REESE. First three > digits of the social suggest that Jordan Hester was born in Georgia. the public interest information disclosures continues with a destruction of the social security number sentivity fallacy. i approve, ... > REESE > > I'm supposed to recognize him by his accent? > > FINCH > > Or her. I can't even verify the gender. Hester's living off the > grid. No photos online and nothing on the social networking sites. shit gets real! > REESE > > I've never understood why people put all their information on those > sites. Used to make our job a lot easier in the C.I.A. (takes > another sip from his cup) the viewing population is dumb as bricks. reliable repetition is applied. for great FCC justice! [ for great FCC justice... ] > FINCH > > Of course, that's why I created them. dirty rat bastard!! always knew Orkut was an inside job... > REESE > > You're telling me you invented online social networking, FINCH? > > > REESE stands up. FINCH goes to his computer, setting down his > doughnut. here it got a little too perverse for my taste. donut edge play a cut too far... best regards, From dan at geer.org Wed Dec 2 17:11:56 2015 From: dan at geer.org (dan at geer.org) Date: Wed, 02 Dec 2015 20:11:56 -0500 Subject: [Cryptography] Sadly predictable: Terrorism used as excuse to attack encryption In-Reply-To: Negatively covert channel circa "Tue, 17 Nov 2015 16:22:18 -0500." Message-ID: <20151203011156.54048A06DF6@palinka.tinho.net> Paris Attacks and "Going Dark": Intelligence-Related Issues to Consider Congressional Research Service, November 19, 2015 (IN10400) http://www.fas.org/sgp/crs/intel/IN10400.pdf --dan From dan at geer.org Wed Dec 2 17:44:36 2015 From: dan at geer.org (dan at geer.org) Date: Wed, 02 Dec 2015 20:44:36 -0500 Subject: Sheeple Message-ID: <20151203014436.32B00A06DB2@palinka.tinho.net> Some would say that to tell the truth you must use fiction... ----------- Episode 18, CBS television show "Person of Interest" FINCH is a physically damaged billionaire programmer who developed machine intelligence for the government REESE is his sidekick muscle. ----------- REESE No photos? FINCH Not everyone in New York has a driver's license, REESE. First three digits of the social suggest that Jordan Hester was born in Georgia. REESE I'm supposed to recognize him by his accent? FINCH Or her. I can't even verify the gender. Hester's living off the grid. No photos online and nothing on the social networking sites. REESE I've never understood why people put all their information on those sites. Used to make our job a lot easier in the C.I.A. (takes another sip from his cup) FINCH Of course, that's why I created them. REESE You're telling me you invented online social networking, FINCH? REESE stands up. FINCH goes to his computer, setting down his doughnut. FINCH The Machine needed more information. People's social graph, their associations. (opens up search on social networking website for "Jordan Hester") The government had been trying to figure it out for years. Turns out most people were happy to volunteer it. The business wound up being quite profitable, too. Unfortunately, Jordan Hester seems to be more cautious than most, but I was able to run a credit check. REESE looks at papers on glass board. FINCH picks up his doughnut again. From dan at geer.org Wed Dec 2 17:52:33 2015 From: dan at geer.org (dan at geer.org) Date: Wed, 02 Dec 2015 20:52:33 -0500 Subject: [Cryptography] Sadly predictable: Terrorism used as excuse to attack encryption In-Reply-To: Your message of "Tue, 17 Nov 2015 16:22:18 -0500." Message-ID: <20151203015233.98115A06DE0@palinka.tinho.net> https://www.linkedin.com/pulse/kafkaesque-sacrifice-encryption-security-name-daniel-solove The Kafkaesque Sacrifice of Encryption Security in the Name of Security Daniel Solove Dec 2, 2015 Proponents for allowing government officials to have backdoors to encrypted communications need to read Franz Kafka. Nearly a century ago, Kafka deftly captured the irony at the heart of their argument in his short story, "The Burrow." From grarpamp at gmail.com Wed Dec 2 19:30:26 2015 From: grarpamp at gmail.com (grarpamp) Date: Wed, 2 Dec 2015 22:30:26 -0500 Subject: Vuvuzuela Messaging App Message-ID: https://github.com/davidlazar/vuvuzela Vuvuzela is a messaging system that hides metadata using noise. The Github README has more information and a link to the paper. The issue tracker highlights some of the remaining challenges. From tbiehn at gmail.com Wed Dec 2 19:37:25 2015 From: tbiehn at gmail.com (Travis Biehn) Date: Wed, 2 Dec 2015 22:37:25 -0500 Subject: The Moral Character of Cryptographic Work In-Reply-To: References: <20151201164023.GA23078@antiproton.jfet.org> <9A043F3CF02CD34C8E74AC1594475C73F4B95CAF@uxcn10-5.UoA.auckland.ac.nz> Message-ID: Remember kids, use type-safe languages. Only *you* can prevent cyber-warfare. -Travis On Wed, Dec 2, 2015 at 8:15 PM, coderman wrote: > On Tue, Dec 1, 2015 at 4:29 PM, Peter Gutmann > wrote: > > ... > > For those who missed the talk this morning, he's also doing a public > lecture > > next Wednesday: > > > > > https://www.auckland.ac.nz/en/about/news-events-and-notices/news/news-2015/12/mass-surveillance-and-a-crisis-of-social-responsibility.html > > > next up, > software engineers who neglect the nation state TAO threat! > > your lack of input sanitization costs conspiring lives! :o > > > best regards, > -- Twitter | LinkedIn | GitHub | TravisBiehn.com | Google Plus -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1761 bytes Desc: not available URL: From sdrinf at gmail.com Thu Dec 3 01:25:44 2015 From: sdrinf at gmail.com (Silicon Dragon) Date: Thu, 3 Dec 2015 01:25:44 -0800 Subject: Encrypted email search indexing Message-ID: *"Various hurdles are preventing wide-spread adoption of PGP encrypted communication, with easy searchability being one of them. I propose a standard allowing users to search through encrypted email safely. The search is tailored for text messages containing distinct words. Searching is achieved through a search index in plain-text attached to each email. The index contains each of the unique words contained in a message, salt hashed. There will be 10-50 salts per email account used randomly on a per word basis. Larger amount of salts mean more safety and more expensive search. Incoming messages will also get appended with a search index using IMAP APPEND command. ..."* https://ipfs.io/ipfs/QmVntBs8AxmeuLacGappM5LhB8ao9k2RPijvByESt4HmgC -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 924 bytes Desc: not available URL: From zen at freedbms.net Wed Dec 2 17:30:59 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Thu, 3 Dec 2015 01:30:59 +0000 Subject: essential understanding - Kafkatrapping Message-ID: The points raised in this blog are essential in today's SJW/ "Social Justice Warrior" (how politically correct that sounds) climate of communication - the Kafkatrapping techniques described here may provide an important "ahah!" moment to those who have been subjected to such emotional/ linguistic constructs in the past, or who may have to face such constructs in the future. Here's to competently handling more of today's pervasive bullshit. Zenaan http://esr.ibiblio.org/?p=2122 Kafkatrapping Posted on 2010-07-18 by Eric Raymond Good causes sometimes have bad consequences. Blacks, women, and other historical out-groups were right to demand equality before the law and the full respect and liberties due to any member of our civilization; but the tactics they used to “raise consciousness” have sometimes veered into the creepy and pathological, borrowing the least sane features of religious evangelism. One very notable pathology is a form of argument that, reduced to essence, runs like this: “Your refusal to acknowledge that you are guilty of {sin,racism,sexism, homophobia,oppression…} confirms that you are guilty of {sin,racism,sexism, homophobia,oppression…}.” I’ve been presented with enough instances of this recently that I’ve decided that it needs a name. I call this general style of argument “kafkatrapping”, and the above the Model A kafkatrap. In this essay, I will show that the kafkatrap is a form of argument that is so fallacious and manipulative that those subjected to it are entitled to reject it based entirely on the form of the argument, without reference to whatever particular sin or thoughtcrime is being alleged. I will also attempt to show that kafkatrapping is so self-destructive to the causes that employ it that change activists should root it out of their own speech and thoughts. My reference, of course, is to Franz Kafka’s “The Trial”, in which the protagonist Josef K. is accused of crimes the nature of which are never actually specified, and enmeshed in a process designed to degrade, humiliate, and destroy him whether or not he has in fact committed any crime at all. The only way out of the trap is for him to acquiesce in his own destruction; indeed, forcing him to that point of acquiescence and the collapse of his will to live as a free human being seems to be the only point of the process, if it has one at all. This is almost exactly the way the kafkatrap operates in religious and political argument. Real crimes – actual transgressions against flesh-and-blood individuals – are generally not specified. The aim of the kafkatrap is to produce a kind of free-floating guilt in the subject, a conviction of sinfulness that can be manipulated by the operator to make the subject say and do things that are convenient to the operator’s personal, political, or religious goals. Ideally, the subject will then internalize these demands, and then become complicit in the kafkatrapping of others. Sometimes the kafkatrap is presented in less direct forms. A common variant, which I’ll call the Model C, is to assert something like this: “Even if you do not feel yourself to be guilty of {sin,racism,sexism, homophobia,oppression…}, you are guilty because you have benefited from the {sinful,racist,sexist,homophobic,oppressive,…} behavior of others in the system.” The aim of the Model C is to induce the subject to self-condemnation not on the basis of anything the individual subject has actually done, but on the basis of choices by others which the subject typically had no power to affect. The subject must at all costs be prevented from noticing that it is not ultimately possible to be responsible for the behavior of other free human beings. A close variant of the model C is the model P: “Even if you do not feel yourself to be guilty of {sin,racism,sexism, homophobia,oppression…}, you are guilty because you have a privileged position in the {sinful,racist,sexist,homophobic,oppressive,…} system.” For the model P to work, the subject must be prevented from noticing that the demand to self-condemn is not based on the subject’s own actions or choices or feelings, but rather on an in-group identification ascribed by the operator of the kafkatrap. It is essential to the operation of all three of the variants of the kafkatrap so far described that the subject’s attention be deflected away from the fact that no wrongdoing by the subject, about which the subject need feel personally guilty, has actually been specified. The kafkatrapper’s objective is to hook into chronic self-doubt in the subject and inflate it, in much the same way an emotional abuser convinces a victim that the abuse is deserved – in fact, the mechanism is identical. Thus kafkatrapping tends to work best on weak and emotionally vulnerable personalities, and poorly on personalities with a strong internalized ethos. In addition, the success of a model P kafkatrap depends on the subject not realizing that the group ascription pinned on by the operator can be rejected. The subject must be prevented from asserting his or her individuality and individual agency; better, the subject must be convinced that asserting individuality is yet another demonstration of denial and guilt. Need it be pointed out how ironic this is, given that kafkatrappers (other than old-fashioned religious authoritarians) generally claim to be against group stereotyping? There are, of course, other variants. Consider the model S: “Skepticism about any particular anecdotal account of {sin,racism,sexism,homophobia,oppression,…}, or any attempt to deny that the particular anecdote implies a systemic problem in which you are one of the guilty parties, is itself sufficient to establish your guilt.” Again, the common theme here is that questioning the discourse that condemns you, condemns you. This variant differs from the model A and model P in that a specific crime against an actual person usually is in fact alleged. The operator of the kafkatrap relies on the subject’s emotional revulsion against the crime to sweep away all questions of representativeness and the basic fact that the subject didn’t do it. I’ll finish my catalog of variants with the verson of the kafkatrap that I think is most likely to be deployed against this essay, the Model L: “Your insistence on applying rational skepticism in evaluating assertions of pervasive {sin,racism,sexism,homophobia, oppression…} itself demonstrates that you are {sinful,racist,sexist,homophobic,oppressive,…}.” This sounds much like the Model S, except that we are back in the territory of unspecified crime here. This version is not intended to induce guilt so much as it is to serve as a flank guard for other forms of kafkatrapping. By insisting that skepticism is evidence of an intention to cover up or excuse thoughtcrime, kafkatrappers protect themselves from having their methods or motives questioned and can get on with the serious business of eradicating thoughtcrime. Having shown how manipulative and psychologically abusive the kafkatrap is, it may seem almost superfluous to observe that it is logically fallacious as well. The particular species of fallacy is sometimes called “panchreston”, an argument from which anything can be deduced because it is not falsifiable. Notably, if the model A kafkatrap is true, the world is divided into two kinds of people: (a) those who admit they are guilty of thoughtcrime, and (b) those who are guilty of thoughtcrime because they will not admit to being guilty of thoughtcrime. No one can ever be innocent. The subject must be prevented from noticing that this logic convicts and impeaches the operator of the kafkatrap! I hope it is clear by now that the particular flavor of thoughtcrime alleged is irrelevant to understanding the operation of kafkatraps and how to avoid being abused and manipulated by kafkatrappers. In times past the kafkatrapper was usually a religious zealot; today, he or she is just as likely to be advancing an ideology of racial, gender, sexual-minority, or economic grievance. Whatever your opinion of any of these causes in their ‘pure’ forms may be, there are reasons that the employment of kafkatrapping is a sure sign of corruption. The practice of kafkatrapping corrupts causes in many ways, some obvious and some more subtle. The most obvious way is that abusive and manipulative ways of controlling people tend to hollow out the causes for which they are employed, smothering whatever worthy goals they may have begun with and reducing them to vehicles for the attainment of power and privilege over others. A subtler form of corruption is that those who use kafkatraps in order to manipulate others are prone to fall into them themselves. Becoming unable to see out of the traps, their ability to communicate with and engage anyone who has not fallen in becomes progressively more damaged. At the extreme, such causes frequently become epistemically closed, with a jargon and discourse so tightly wrapped around the logical fallacies in the kafkatraps that their doctrine is largely unintelligible to outsiders. These are both good reasons for change activists to consider kafkatraps a dangerous pathology that they should root out of their own causes. But the best reason remains that kafkatrapping is wrong. Especially, damningly wrong for anyone who claims to be operating in the cause of freedom. UPDATE: A commenter pointed out the Model D: “The act of demanding a definition of {sin,racism,sexism,homophobia,oppression} that can be consequentially checked and falsified proves you are {sinful,racist,sexist, homophobic, oppressive}.” UPDATE2: The Model M: “The act of arguing against the theory of anti-{sin,racism,sexism,homophobia,oppression} demonstrates that you are either {sinful,racist,sexist, homophobic, oppressive} or do not understand the theory of anti-{sin,racism,sexism,homophobia,oppression}, and your argument can therefore be dismissed as either corrupt or incompetent.” Model T: Designated victims of {sin,racism,sexism,homophobia,oppression} who question any part of the theory of {sin,racism,sexism,homophobia,oppression} demonstrate by doing so that they are not authentic members of the victim class, so their experience can be discounted and their thoughts dismissed as internalized {sin,racism,sexism,homophobia,oppression}. From jm at porup.com Thu Dec 3 06:34:33 2015 From: jm at porup.com (J.M. Porup) Date: Thu, 3 Dec 2015 09:34:33 -0500 Subject: Sheeple In-Reply-To: <20151203014436.32B00A06DB2@palinka.tinho.net> References: <20151203014436.32B00A06DB2@palinka.tinho.net> Message-ID: <20151203143433.GB1753@fedora-21-dvm> On Wed, Dec 02, 2015 at 08:44:36PM -0500, dan at geer.org wrote: > Some would say that to tell the truth you must use fiction... Sounds like a good excuse to surveil, harass, and degrade the productivity of dissident authors of fiction. j From zen at freedbms.net Thu Dec 3 02:59:15 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Thu, 3 Dec 2015 10:59:15 +0000 Subject: =?UTF-8?Q?Retired_Obama=2C_pensioner_Kerry=2C_US_President_Snowden?= =?UTF-8?Q?=3A_RT=E2=80=99s_2035_promo?= Message-ID: :) http://www.youtube.com/watch?v=THrZZ95i8zQ From s at ctrlc.hu Thu Dec 3 03:06:43 2015 From: s at ctrlc.hu (stef) Date: Thu, 3 Dec 2015 12:06:43 +0100 Subject: Encrypted email search indexing In-Reply-To: References: Message-ID: <20151203110643.GC19455@ctrlc.hu> On Thu, Dec 03, 2015 at 01:25:44AM -0800, Silicon Dragon wrote: > *"Various hurdles are preventing wide-spread adoption of PGP encrypted > communication, with easy searchability being one of them. I propose a > standard allowing users to search through encrypted email safely. The > search is tailored for text messages containing distinct words. Searching > is achieved through a search index in plain-text attached to each email. > The index contains each of the unique words contained in a message, salt > hashed. There will be 10-50 salts per email account used randomly on a per > word basis. Larger amount of salts mean more safety and more expensive > search. Incoming messages will also get appended with a search index using > IMAP APPEND command. ..."* > > https://ipfs.io/ipfs/QmVntBs8AxmeuLacGappM5LhB8ao9k2RPijvByESt4HmgC ---end quoted text--- this makes little sense. pgp is for encryption in transit, not at rest. you should decrypt and reencrypt your mail. and you can also index it easily when doing so. -- otr fp: https://www.ctrlc.hu/~stef/otr.txt From admin at pilobilus.net Thu Dec 3 12:05:16 2015 From: admin at pilobilus.net (Steve Kinney) Date: Thu, 3 Dec 2015 15:05:16 -0500 Subject: essential understanding - Kafkatrapping In-Reply-To: References: Message-ID: <5660A07C.7030809@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 12/02/2015 08:30 PM, Zenaan Harkness wrote: [ ... ] > One very notable pathology is a form of argument that, reduced > to essence, runs like this: “Your refusal to acknowledge that > you are guilty of {sin,racism,sexism, homophobia,oppression…} > confirms that you are guilty of {sin,racism,sexism, > homophobia,oppression…}.” I’ve been presented with enough > instances of this recently that I’ve decided that it needs a > name. I call this general style of argument “kafkatrapping”, > and the above the Model A kafkatrap. In this essay, I will show > that the kafkatrap is a form of argument that is so fallacious > and manipulative that those subjected to it are entitled to > reject it based entirely on the form of the argument, without > reference to whatever particular sin or thoughtcrime is being > alleged. I will also attempt to show that kafkatrapping is so > self-destructive to the causes that employ it that change > activists should root it out of their own speech and thoughts. > > My reference, of course, is to Franz Kafka’s “The Trial”, in > which the protagonist Josef K. is accused of crimes the nature > of which are never actually specified, and enmeshed in a > process designed to degrade, humiliate, and destroy him whether > or not he has in fact committed any crime at all. [ ... ] "Kafkatrapping" a.k.a. guilt tripping by advocates of various social and economic reform agendas is a losing strategy. Among naive followers attracted to activist causes, it encourages contempt and hostility toward audiences they must reach and influence in order to achieve their movement's goals. Guilt tripping may persuade some weak minded outsiders to submissively fall in line with the movement's agenda, but reliably alienates opinion leaders and non-aligned activists whose support is necessary for the movement's growth and success. Effective activist leaders focus on building mutually supportive relationships with their audiences; paid infiltrators, careerists and volunteer egomaniacs focus on dividing their audiences into mutually hostile armed camps. Guilt tripping is elitism. It makes the ignorant conformist follower feel superior, at the cost of alienating key audiences whose support is essential for the movement's success. The grievances of reform movements are always objections to the abuse of power by those who have it. Those who have power want to keep it, and they are well positioned to employ political warfare assets including helpful State Security services and the Public Relations industry. Their clandestine operators work to degrade reform movement messaging, divide reform movement supporters, and turn as much of the general public as possible against reform movements. Broadcast media outlets work to assure that the most divisive messaging from a "movement" reaches the general public first and loudest. Consistent, persistent guilt trip messaging from a reform movement reliably indicates the presence and influence of actors inside the movement who are opposed to the movement's stated objectives. Effective political activists do not use or tolerate guilt tripping, simply because it is counter productive. Blanket personal condemnation of one's fellow humans can and should be called out whenever seen, on the basis that it is both factually wrong and strategically "less than useless." -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWYKB6AAoJEDZ0Gg87KR0LHmoQALFSqiGSm9pnegKIP61OXbu5 eXEyhFzxLj9BgD98VWO27/cN20hPTnGWZ3dzIQK38utw4nzlU8GZ5P4LsyUd3fLZ BaW5qYTEhDms+cU4/8/DQ+RQe84/GZomRFvrgaAmmIryUZMXp/trKIC6431LvCxS 5BePC5FgSXlniG9SitomL7eXQttxlIABbp+QlyiQQ6ZppMWB1sCrtVM59ab227r5 eOti0SWaf4oHdQoy2gCwGOz7tPy+00eXjSgD7eYluh/qkcZNFrReCVGU5Ea2Tkew HmrzlLY0JA+eXLa9kn6n8FipodHpXY6jb1HTSXM8wqdmSDInC4OtTI1mEqN6VILB MQIyeK51l9pGGxMjbk71a4iC2S1UKMN0A2phQ9QqgHbtyF+RCK2wLroLht0wsgHY Rve0IqSAJsL4aTbR9leLCpm+NBbQfpj/RtzpGHosjyOH8owd2Ilttyeo1JNZl84e 2T73R/ndvYyzmdAluohsNEJI26pLHRTqrYa47M/9t0J4N1mKltBVTKG3Sh+9lF89 Hi7brfDnLlW4cHo1fwVYPQ2+3voDp1QSQBj9Grvbk3Fv+iPxyDgmSpX5Rat1oQ9D uryW7UlhZepM4uqEyrMbYlq07TaCCs/OqUHG+5u+tzEsQoQrDMbWQe2OKXXLLPyO syn5TVwrcK691RbCjnal =7Nxx -----END PGP SIGNATURE----- From juan.g71 at gmail.com Fri Dec 4 10:43:18 2015 From: juan.g71 at gmail.com (juan) Date: Fri, 4 Dec 2015 15:43:18 -0300 Subject: Russian citizen won a case against surveillance in the European Court of Human Rights In-Reply-To: <5661D94E.3020008@openmailbox.org> References: <5661D94E.3020008@openmailbox.org> Message-ID: <5661dcfd.50df8c0a.58be1.0486@mx.google.com> On Fri, 04 Dec 2015 18:19:58 +0000 Anton Nesterov wrote: > tl;dr Roman Zakharov, Russian journalist and activist, tried to sue > Russian government since 2003 for intercepting his mobile telephone > communications and the Russian laws on surveillance as > unconstitutional. He failed and then went to the European Court of > Human Rights, What about 'human rights' in europe? I understand europe is a police state like russia and virtually the rest of world? I mean, come on? A bunch of european high-ranking shitbags pointing their fingers at their russian criminal 'colleagues'? And I, unlike Zennaan ( =P ) don't mean this as any kind of endorsement of the russian government... > which ruled that Russian laws violate Article 8 of ECHR > and forced Russia to pay 40,000 euro of compensation. > > Here is the text http://hudoc.echr.coe.int/eng?i=001-159324 > > It also has a good review of Russian laws about surveillance. > From komachi at openmailbox.org Fri Dec 4 10:19:58 2015 From: komachi at openmailbox.org (Anton Nesterov) Date: Fri, 04 Dec 2015 18:19:58 +0000 Subject: Russian citizen won a case against surveillance in the European Court of Human Rights Message-ID: <5661D94E.3020008@openmailbox.org> tl;dr Roman Zakharov, Russian journalist and activist, tried to sue Russian government since 2003 for intercepting his mobile telephone communications and the Russian laws on surveillance as unconstitutional. He failed and then went to the European Court of Human Rights, which ruled that Russian laws violate Article 8 of ECHR and forced Russia to pay 40,000 euro of compensation. Here is the text http://hudoc.echr.coe.int/eng?i=001-159324 It also has a good review of Russian laws about surveillance. -- https://nesterov.pw GPG key: 0CE8 65F1 9043 2B11 25A5 74A7 1187 6869 67AA 56E4 https://keybase.io/komachi/key.asc From carimachet at gmail.com Fri Dec 4 10:55:09 2015 From: carimachet at gmail.com (Cari Machet) Date: Fri, 4 Dec 2015 20:55:09 +0200 Subject: Ethics not moral crap but... Message-ID: "The Moral Character of Cryptographic Work" http://web.cs.ucdavis.edu/~rogaway/papers/moral.html -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 208 bytes Desc: not available URL: From zen at freedbms.net Fri Dec 4 15:35:02 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Fri, 4 Dec 2015 23:35:02 +0000 Subject: The art of trolling at the highest political levels Message-ID: Credit where credit's due. Perhaps others will find this chuckle worthy: http://russia-insider.com/en/politics/turkey-plays-poker-bosphorus-putin-doubles-down/ri11665 Statesman, bare chested military strongman, international comedian. Entertainment don't get much better than this. Z From zen at freedbms.net Fri Dec 4 17:16:20 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Sat, 5 Dec 2015 01:16:20 +0000 Subject: Shadowy Western governments? Message-ID: See full article and link below. "No longer are their [terrorists] attacks carried out without many, if not a majority, suspecting the governments in the West at least as equally as shadowy terrorist organizations." Perhaps some find it hard to believe? --- OK, these guys appear to be trying to present an Islamic/ Iran position to English readers, yet don't have any links (in this article at least) to primary information or quotes of the alleged email interview. Quite frustrating. My first reaction was dismissive of such poor 'journalistic practice', yet I get a sense of genuine intent to create a better public dialog which overrides my initial reaction. Based on this I briefly searched without success for a "Contact" link, to email them which this viewpoint I have about their article, as I would like to see all sides of public debate lift their respective games. I will forward this privately to the whois (non-cloudflare) email in the hope that this might be useful to someone there... any better suggestions appreciated. Evidently having a "Contact" email/ form is also recommended for a news website. Zenaan http://www.islamicinvitationturkey.com/2015/12/03/leaders-letter-helped-discover-shadowy-faces-of-terrorism-american-analyst/ Leader’s letter helped ‘discover shadowy faces of terrorism’: American Analyst IIT Exclusive News, Imam Ali Khamenei, Iran, Leaders of Ummah, Middle East, North America 3 December 2015 10:10 An independent American analyst believes after Leader’s letter, international public awareness would never allow governments to support terrorism without impunity. Anthony Cartalucci wrote to Payman Yazdani of Mehr News International Service in an email interview about the recent and second letter by the Leader of the Islamic Revolution Ayatollah Seyyed Ali Khamenei to youth in Europe and the US, where he said the letter contributed to an environment which would make public alert, who otherwise would only watch passively their fellow governments’ nebulous acts in sponsoring terrorism. Cartalucci also believed that the West had shifted the blame to Islam and Islamic countries, since they saw clearly the backlash of their own act in arming atrocious terrorists in Islamic lands: In his second letter to western youth, Ayatollah Khamenei has talked about the terrorism and its roots. What is the significance of this issue? To solve any problem, one must first understand it fully. The problem of terrorism has long been poorly understood by the majority of the Western public, and even policymakers. Their inability to grasp the true roots of terrorism have allowed it to flourish indefinitely. For most in the West, the reality that special interests in their own governments have created and perpetuated terrorism intentionally as a geopolitical tool is incomprehensible. Unfortunately, it is also the truth and until they grasp that, those behind the terrorism will have a carte blanche to continue using it both at home and abroad, as a proxy force of violence, and as a tool to create fear and coercion. The wars, instability, growing domestic police states, distrust among nations, and even within nations, among citizens, refugee crises, and others all are wrought from the use of terrorism as a geopolitical tool. Thus, it is at work within the heart of some of the most pressing issues of our time. The Leader has emphasized in his message that Islam is the religion of peace; why do some try to introduce Islam as the religion of violence? The majority who claim Islam is a religion of violence are merely repeating witlessly propaganda they themselves heard. The source of this propaganda are the same interests which themselves are driving the violence – particularly the state sponsors of terrorism, the United States, their Persian Gulf allies, NATO, and others. By blaming Islam and appealing to both ignorance and bigotry which are still deeply rooted in Western culture, these very interests feeding the violence can deflect blame onto others – in this case, Muslim nations and peoples. By appealing to ideology, rationality, history, geopolitics, and critical thinking can be side-stepped and emotional responses can easily be elicited. Why would some try to make connections between Islam and terrorism after any terrorist act happening around the world? Again, it is a matter of deflecting responsibility by those who are actually driving terrorism. The recent attacks in Paris were carried out by terrorists the United States and its closest regional allies have been arming, training, funding, and harboring for years now. All of the attackers were well known to Western intelligence agencies. By all indications, this attack should have been easily foiled by Western security agencies, but it was not. Conveniently, it was carried out on the eve of the Vienna talks on Syria, and just as the West’s agenda in Syria began unraveling in the face of a joint Syrian-Russian-Iranian alliance. Some would say this was a little “too convenient.” Blaming the attacks on Islam is the best way to appeal to people’s emotions directly, and hopefully overwhelm their ability to critically think and ask just who really benefited from the conveniently-timed attacks and why, again, Western security agencies knew of the attackers beforehand but made no attempts to stop them from carrying out their horrific acts of violence. What is the importance of this letter at this juncture? The importance of this letter is that it adds to a growing body of evidence and voices around the world speaking up and confronting state sponsors of global terrorism. The constant efforts of those who know the truth to inform those who yet do not, is having a gradual effect on the special interests driving global terrorism. No longer are they able to act with impunity. No longer are their attacks carried out without many, if not a majority, suspecting the governments in the West at least as equally as shadowy terrorist organizations. It is important for this process, this dialogue to continue, to speak to the truth with every opportunity and in every format, so that as people begin to see the truth for themselves, they can also take note of who has been saying it all along. Interview: Payman Yazdani From dan at geer.org Sat Dec 5 10:41:38 2015 From: dan at geer.org (dan at geer.org) Date: Sat, 05 Dec 2015 13:41:38 -0500 Subject: Named Data Networking Message-ID: <20151205184139.19D7DA06DBB@palinka.tinho.net> Does anyone here have a grounded opinion about NDN (Named Data Networking)? If that's as new to you as to me, I'm reading here: http://named-data.net It seems to have a lot of implications that I'm trying to think through, not the least of which is the idea that the Internet can and must evolve from an end-to-end communication system to being, itself, a content distribution network. The reason for thinking this way is that "YouTube, Netflix, Amazon, iTunes, etc., account for more than half of the world's internet traffic" and that reality "is inefficient and unsecure because the information-centric overlay is a poor match to the Internet's conversationally-oriented underlay." I am, myself, perpetually sceptical of efforts to start over, or to put policy into the network itself, such as NDN's aim to make every transmitted packet be signed and to make the network stateful including providing in-network memory. As always, "Who is this for?" needs an answer that looks well ahead. --dan From juan.g71 at gmail.com Sat Dec 5 09:03:40 2015 From: juan.g71 at gmail.com (juan) Date: Sat, 5 Dec 2015 14:03:40 -0300 Subject: Russian citizen won a case against surveillance in the European Court of Human Rights In-Reply-To: <3188451.1oa6KIRizK@lapuntu> References: <5661D94E.3020008@openmailbox.org> <5661dcfd.50df8c0a.58be1.0486@mx.google.com> <3188451.1oa6KIRizK@lapuntu> Message-ID: <56631721.c150370a.da744.ffff8f41@mx.google.com> On Sat, 05 Dec 2015 15:55:03 +0100 rysiek wrote: > Dnia piątek, 4 grudnia 2015 15:43:18 juan pisze: > > On Fri, 04 Dec 2015 18:19:58 +0000 > > > > Anton Nesterov wrote: > > > tl;dr Roman Zakharov, Russian journalist and activist, tried to > > > sue Russian government since 2003 for intercepting his mobile > > > telephone communications and the Russian laws on surveillance as > > > unconstitutional. He failed and then went to the European Court of > > > Human Rights, > > > > What about 'human rights' in europe? I understand europe is > > a police state like russia and virtually the rest of world? > > > > I mean, come on? A bunch of european high-ranking shitbags > > pointing their fingers at their russian criminal > > 'colleagues'? > > So, do I understand correctly, that it would be better had the ECHR > ruled otherwise? Yes. This is just hypocritical statist propaganda. Do I need to explain further why this is just propaganda? <--rhetorical question... > Or, what exactly is your problem with this bit of > information? See above. > From ryacko at gmail.com Sat Dec 5 15:13:21 2015 From: ryacko at gmail.com (Ryan Carboni) Date: Sat, 5 Dec 2015 15:13:21 -0800 Subject: Cryptography is not a science currently Message-ID: Recently The Moral Character of Cryptographic Work was published online by Philip Rogaway. I am going to explain that the disciplinary culture of cryptography is not a scientific discipline. Cryptography itself is a science. Cryptography in many respects is the inverse of forensic science, while forensics follow a protocol, their results are no better than guessing. While cryptography's results are concrete, the culture is a serious failure. Cryptographers are well aware of the moral implications of their work... since Diffie and Hellman condemned DES's short key length ( http://www.toad.com/des-stanford-meeting.html ). If according to Rogaway, "Most academic cryptographers seem to think that our field is a fun, deep, and politically neutral game—a set of puzzles involving communicating parties and notional adversaries", the fault is not with most cryptographers, but with all cryptographers. Paranoid fear surrounded the AES competition, that a cipher might have a backdoor (it turns out backdooring ciphers are more difficult than expected). Yet after the AES report turns out the full of lies ( http://csrc.nist.gov/archive/aes/round2/r2report.pdf ), that additions are more vulnerable to timing attacks then... table lookups, one should do some critical self analysis. That a cryptographer calls for some sort of self-analysis long after the AES competition, the SHA-3 competition, basically after all the currently accepted ciphers have become entrenched is alarming. Each and every cryptographer seems to fail to understand what the US intelligence community actually does. They truly do, they do not seem to understand that for anyone of import, they'd develop biographies on people, if one is important enough, they might create a psychological profile. Maybe this sounds paranoid. But given that the greatest intelligence scandals involve what is believed to be true to be absolutely false and what is believed to be false to be absolutely true, paranoia is to be expected if the state takes an interest in your profession. And all cryptographers know that the state is interested in cryptography. What about the constant struggles of cryptographers getting their papers published in the seventies and eighties? Maybe only Dan Bernstein remembers that he went to court just to publish his own cipher. Naturally for Philip Rogaway, these issues came to a head after the Snowden disclosures (I'm still waiting for the next drip). For anyone to discredit themselves in the first paragraph of a forty-six page PDF is amazing. Potentially if all cryptographers somehow manage to ignore this immense logical failing is an indictment against the entire cryptographic profession. Especially given that it is commonly accepted that mathematics requires logic. Truly Rogaway is the Chomsky of Cryptography. Chomsky will deny the Cambodian holocaust and claim that oppression in the US "isn't that bad". For anyone to run out and say they are taking on the elite without knowing a damn thing about anything, I wish them a lot of luck. I might as well post a modest suggestion: cryptographers should support an FPGA integrated into the CPU or the ability to use integrated graphics for cryptography. This would remove entrenchment of standards, and allow people to pick their own ciphers. It's possible the AES-NI instructions were developed after the NSA panicked at seeing AES usage in TLS drop rapidly after the timing attacks were revealed. The AES-NI instructions are overkill, and seem to take CISC too literally. One only needs, mixcolumn+subbytes, subbyte, reverse+mixcolumn+subbytes, AESIMC and subbytes instructions of 32-bit sizes each (no need for AESENC, AESENCLAST, AESKEYGENASSIST, AESDECLAST, AESDEC, AESIMC), it would save one instruction, and the instruction will use only one operand. The way the AES-NI instructions are designed precludes usage for Rijndael with 256 bit blocks, and it seems odd that the AES-NI instructions only accept data from the XMM registers. Rigidity should be viewed with suspicion. "Therefore the clever combatant imposes his will on the enemy, but does not allow the enemy's will to be imposed on him." -Sun Tzu -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4681 bytes Desc: not available URL: From rysiek at hackerspace.pl Sat Dec 5 06:55:03 2015 From: rysiek at hackerspace.pl (rysiek) Date: Sat, 05 Dec 2015 15:55:03 +0100 Subject: Russian citizen won a case against surveillance in the European Court of Human Rights In-Reply-To: <5661dcfd.50df8c0a.58be1.0486@mx.google.com> References: <5661D94E.3020008@openmailbox.org> <5661dcfd.50df8c0a.58be1.0486@mx.google.com> Message-ID: <3188451.1oa6KIRizK@lapuntu> Dnia piątek, 4 grudnia 2015 15:43:18 juan pisze: > On Fri, 04 Dec 2015 18:19:58 +0000 > > Anton Nesterov wrote: > > tl;dr Roman Zakharov, Russian journalist and activist, tried to sue > > Russian government since 2003 for intercepting his mobile telephone > > communications and the Russian laws on surveillance as > > unconstitutional. He failed and then went to the European Court of > > Human Rights, > > What about 'human rights' in europe? I understand europe is a > police state like russia and virtually the rest of world? > > I mean, come on? A bunch of european high-ranking shitbags > pointing their fingers at their russian criminal 'colleagues'? So, do I understand correctly, that it would be better had the ECHR ruled otherwise? Or, what exactly is your problem with this bit of information? -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From rysiek at hackerspace.pl Sat Dec 5 06:57:10 2015 From: rysiek at hackerspace.pl (rysiek) Date: Sat, 05 Dec 2015 15:57:10 +0100 Subject: Encrypted email search indexing In-Reply-To: <20151203110643.GC19455@ctrlc.hu> References: <20151203110643.GC19455@ctrlc.hu> Message-ID: <3133413.lAJBbup9sP@lapuntu> Dnia czwartek, 3 grudnia 2015 12:06:43 stef pisze: > this makes little sense. pgp is for encryption in transit, not at rest. you > should decrypt and reencrypt your mail. and you can also index it easily > when doing so. It *kinda sorta* make sense if we're talking about an e-mail provider that wants the user to be able to search even when they're using their webmail and have no access to the private key. But on the other hand that in itself makes no sense to me. ;) -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From rysiek at hackerspace.pl Sat Dec 5 07:09:17 2015 From: rysiek at hackerspace.pl (rysiek) Date: Sat, 05 Dec 2015 16:09:17 +0100 Subject: FOIPA adventures In-Reply-To: References: Message-ID: <2467960.bQXB2SHmpF@lapuntu> Dnia środa, 2 grudnia 2015 17:21:21 coderman pisze: > remember this one? the four carefully crafted retorts? > (...) > it worked, flawlessly! Congratulations! :) -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From coderman at gmail.com Sat Dec 5 18:25:49 2015 From: coderman at gmail.com (coderman) Date: Sat, 5 Dec 2015 18:25:49 -0800 Subject: Sheeple In-Reply-To: <20151203143433.GB1753@fedora-21-dvm> References: <20151203014436.32B00A06DB2@palinka.tinho.net> <20151203143433.GB1753@fedora-21-dvm> Message-ID: On Thu, Dec 3, 2015 at 6:34 AM, J.M. Porup wrote: > On Wed, Dec 02, 2015 at 08:44:36PM -0500, dan at geer.org wrote: >> Some would say that to tell the truth you must use fiction... > > Sounds like a good excuse to surveil, harass, and degrade the > productivity of dissident authors of fiction. actually, setbacks in this effort: https://www.washingtonpost.com/news/morning-mix/wp/2015/12/04/cannibal-cop-cleared-in-court-again/ / https://cdn.arstechnica.net/wp-content/uploads/2015/12/cannibalcop.pdf "Fantasy crimes — even repellent, disgusting, unthinkable fantasy crimes worthy of universal condemnation — are not crimes, it said." best regards, From coderman at gmail.com Sat Dec 5 18:30:17 2015 From: coderman at gmail.com (coderman) Date: Sat, 5 Dec 2015 18:30:17 -0800 Subject: Named Data Networking In-Reply-To: <20151205184139.19D7DA06DBB@palinka.tinho.net> References: <20151205184139.19D7DA06DBB@palinka.tinho.net> Message-ID: On Sat, Dec 5, 2015 at 10:41 AM, wrote: > Does anyone here have a grounded opinion about NDN (Named Data > Networking)? If that's as new to you as to me, I'm reading here: > > http://named-data.net back in the day, we called it IPoverATM / VBR-RT with SSCOP signalling. > It seems to have a lot of implications that I'm trying to think > through, not the least of which is the idea that the Internet can > and must evolve from an end-to-end communication system to > [ insert speculative crap for craven private interests here ] ... yeah, it's all bullshit. perhaps T-Mobile gives "named data" a free pass, but they're not the world, and they're not the endpoints, by any measure! > I am, myself, perpetually sceptical of efforts to start over, or > to put policy into the network itself, anyone putting policy into the network, rather than at the edges, is a robber baron being paid in filthy lucre :P best regards, From coderman at gmail.com Sat Dec 5 18:35:28 2015 From: coderman at gmail.com (coderman) Date: Sat, 5 Dec 2015 18:35:28 -0800 Subject: Russian citizen won a case against surveillance in the European Court of Human Rights In-Reply-To: <3188451.1oa6KIRizK@lapuntu> References: <5661D94E.3020008@openmailbox.org> <5661dcfd.50df8c0a.58be1.0486@mx.google.com> <3188451.1oa6KIRizK@lapuntu> Message-ID: On Sat, Dec 5, 2015 at 6:55 AM, rysiek wrote: > ... > So, do I understand correctly, that it would be better had the ECHR ruled > otherwise? "In a stunning reversal, the ECHR has ruled itself impotent, and moral hazard in perpetuating a belief that retroactive judicial action brings justice to earth humankind. In a gruesome show of contrition, they committed synchronous seppuku across the marble steps of the court house. Back you, Bob." From coderman at gmail.com Sat Dec 5 19:29:45 2015 From: coderman at gmail.com (coderman) Date: Sat, 5 Dec 2015 19:29:45 -0800 Subject: Sheeple In-Reply-To: References: <20151203014436.32B00A06DB2@palinka.tinho.net> <20151203143433.GB1753@fedora-21-dvm> Message-ID: On 12/5/15, Richard Crisp wrote: > Isn't that at odds with "hate crime" laws? These are defined by thought > process vs the actual acts. laws are malleable; like putty. soon enough, laws protecting free speech completely eroded. then, victory! ... best regards, From carimachet at gmail.com Sat Dec 5 14:59:52 2015 From: carimachet at gmail.com (Cari Machet) Date: Sun, 6 Dec 2015 00:59:52 +0200 Subject: Movie about aaron swartz can use some funding on kickstarter Message-ID: I am not affiliated in any way - seems like a nice project Heres aarons moms tweet Only 3 days left to fund Kickstarter for "From DeadDrop to SecureDrop" https://t.co/ez7TA06XyV Link to Trailer: https://t.co/py6W00LmWs -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 356 bytes Desc: not available URL: From cecilia.tanaka at gmail.com Sat Dec 5 20:00:19 2015 From: cecilia.tanaka at gmail.com (Cecilia Tanaka) Date: Sun, 6 Dec 2015 02:00:19 -0200 Subject: Movie about aaron swartz can use some funding on kickstarter In-Reply-To: References: Message-ID: On Dec 5, 2015 8:08 PM, "Cari Machet" wrote: > > I am not affiliated in any way - seems like a nice project > > Heres aarons moms tweet > > Only 3 days left to fund Kickstarter for "From DeadDrop to SecureDrop" https://t.co/ez7TA06XyV Link to Trailer: https://t.co/py6W00LmWs ---- >From my friend Lisa, sent few days ago... <3 **** Hope you are well! Been a long time :-) I'm making movies to teach the world more about Aaron Swartz and to help the public better understand whistleblowers and whistleblower upload systems. I wanted to let you know about my little Kickstarter campaign for a movie I am producing independently, "From DeadDrop to SecureDrop" - it's about "SecureDrop," an anonymous upload system for whistleblowers that Aaron prototyped with Kevin Poulsen, one month before his death, that connects directly to news organizations (such as the Washington Post, Forbes, and The New Yorker): https://www.kickstarter.com/projects/261957173/from-deaddrop-to-securedrop Here's a Tweet about it, if you're short on time: Please help fund "From DeadDrop to SecureDrop" and help more potential Whistleblowers learn about @SecureDrop http://bit.ly/SDrop I'm including a description of the project below! It's only going on for 4 more days, and I only have about $5,000 of the $20,000 I'm trying to raise, so any help -- or also Tweets and social media love would be greatly appreciated! Thanks! :) Much love, lisa The film is entitled "From DeadDrop to SecureDrop," and provides a historical account of how the "SecureDrop" open source anonymous whistleblowing submission platform was originally prototyped by Kevin Poulsen and Aaron Swartz, and later, after Aaron's death, how it made its way its current home at the Freedom of the Press Foundation. People in the film (so far) include: Wired's Kevin Poulsen (how he was inspired by WikiLeaks and then convinced Aaron to work with him on the project), Trevor Timm and John Perry Barlow (of the Freedom of the Press Foundation), who sought out the DeadDrop prototype, Garrett Robinson (SecureDrop's current Development Lead) and Bill Budington (an EFF engineer who worked directly on the early codebase), and some influential figures familiar with the issues, such as Brewster Kahle (Founder of the Internet Archive and co-founder, with myself, of Aaron Swartz Day) and Cindy Cohn (Executive Director of the Electronic Frontier Foundation). I also interviewed Virgil Griffith (Tor2Web and Wikiscanner), as he and Aaron were good friends and worked on Tor2Web together. Jacob Applebaum has agreed to be interviewed for the film. (Besides being a WikiLeaks volunteer, he was good friends with Aaron.) Also, Sarah Harrison, who stood by Edward Snowden's side in Hong Kong and the Moscow airport, and assisted with getting him safe asylum in Russia, has agreed to be in the film! After learning more about whistleblower Chelsea Manning (in the course of my preparing to read her statement during my live Aaron Swartz Day event) video: https://youtu.be/qle9UvJGdYg?t=1h23m33s statement: http://www.aaronswartzday.org/chelsea-manning-2015/)... I came to realize that the film really needs to expand beyond the subject of the SecureDrop technology itself, to attempt to explain *why* these whistleblowers might decide to use WikiLeaks or SecureDrop to expose corruption in the first place: To inform the public and make the world a better place. I realize this sounds simple and obvious, but I don't think that most people are actually aware of this. Here's a post explaining how Ed Snowden chose the Constitution over a Non-Disclosure agreement, when he decided to blow the whistle: http://www.aaronswartzday.org/snowden-oath/ A third theme of the movie deals directly with an observation made by more than one of the people I interviewed for the film, about how SecureDrop will "help the next Ed Snowden" communicate with Journalists safely (so no one will have to go through what he went through, just to get a story out). The film suggests that SecureDrop could potentially usher in a new generation of whistleblower: One that won't necessarily have to put their whole life at risk, in order to "do the right thing." Lisa Rein http://www.aaronswartzday.org -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5054 bytes Desc: not available URL: From coderman at gmail.com Sun Dec 6 03:04:15 2015 From: coderman at gmail.com (coderman) Date: Sun, 6 Dec 2015 03:04:15 -0800 Subject: Fwd: [tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program In-Reply-To: References: <564EB197.7020207@columbia.edu> <20151120210105.Horde.YWWb5RcfXQQPOxUlAGDtLw1@127.0.0.1> Message-ID: it should be noted that BIOS exports contain device identifiers, like HDD serials and so forth... ---------- Forwarded message ---------- From: coderman Subject: Re: [tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program On 11/21/15, Flipchan wrote: > I would like to help in anyway i can , i'm currently developing an anti > virus and auditing multi platform program , So if u can find out/copy all > the viruses the nsa have given You and send it i would love to help on > detecting and protecting ppl from it :) you say "find out, copy all" like it's so easy, *grin* here's some fun for you: https://peertech.org/files/taobios-v2.tar.bz2 $ sha256sum taobios-v2.tar.bz2 0ba12b0ecf89d109301b619cbc8275e5cd78b6fefd3724fba0b6952186e37779 interesting details in both samples! ( L2 is config only PDoS via UEFI BIOS :) best regards, From grarpamp at gmail.com Sun Dec 6 00:33:25 2015 From: grarpamp at gmail.com (grarpamp) Date: Sun, 6 Dec 2015 03:33:25 -0500 Subject: Fwd: [Cryptography] Anyone else seen some odd shipping delays? In-Reply-To: References: Message-ID: ---------- Forwarded message ---------- From: Phillip Hallam-Baker Date: Thu, Dec 3, 2015 at 9:27 PM Subject: [Cryptography] Anyone else seen some odd shipping delays? To: "cryptography at metzdowd.com" Twice in the past week, I have ordered a computer and it has been subject to odd shipping delays and the UPS data makes no sense. I don't think it is seasonal, other stuff arrives fine. Only computers seem to be held up. So anyone have ideas for checking over a QNAP box to see what surprises might have been planted in the firmware? _______________________________________________ The cryptography mailing list cryptography at metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography From ryacko at gmail.com Sun Dec 6 07:46:41 2015 From: ryacko at gmail.com (Ryan Carboni) Date: Sun, 6 Dec 2015 07:46:41 -0800 Subject: [Cryptography] Cryptography is not a science currently In-Reply-To: References: Message-ID: > > There is a long history of corruption in the US. And the FBI and NSA were > certainly not immune. The abuse of the FBI to pursue Hoover's racist > political agenda, LOVEINT, etc. People talk badly about Hoover, but never about the CIA? Given the powers of the FBI, Hoover was nothing like L. Ron Hubbard, Nixon, or Beria. The CIA on the other hand.... stole a hard drive. http://www.theguardian.com/world/2015/oct/23/el-salvador-civil-war-classified-files-stolen This year. Hoover's FBI constantly talked about discretion, and people even wrote to Hoover! Some villain he is. He even blackmailed the elites, which is pretty terrible. Strange that a senile war criminal like Ronald Reagan is more admired than J. Edgar Hoover, true American hero. I assume Google now encrypts everything everywhere inside the corporation. > Excellent, except why didn't all the targets in Prism join all at the same time? I guess each corporation's plaintext are just that hard to crack, they had to work a year per company to break their plaintext. Maybe instead of encryption they should change their plaintext encoding? Maybe for additional security everyone should proprietary plaintext? So when the Snowden papers came out 20 years later they suddenly realized > that the technology had moved on and it would be very easy to send much of > Fort Meade dark. Snowden isn't such a big deal. Maybe no one cares about Nicholas Merril and his fight against a national security letter. Maybe no one cares about Mark Klein, or that Congress gave retroactive immunity to telecommunications providers in cooperating with the government. Maybe no one cares that Theo de Raadt lost a DARPA grant for criticizing the Iraq war. Maybe no one cares... Why am I wasting my time? There are thousands of events that transpired before Snowden, and Snowden is a big deal? How is he a big deal? If you didn't know the NSA was spying on everyone before Snowden, you're a moron or a shill. There's no respectful way to get this point across, it's abundantly clear to anyone with half a brain and pays attention to anything that this is all public knowledge. To pretend that there was some big secret before Snowden is ridiculous. The only interesting new bit of knowledge in 2013 was parallel construction. I had no idea that the federal government was */that/* crooked. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3309 bytes Desc: not available URL: From ryacko at gmail.com Sun Dec 6 09:16:46 2015 From: ryacko at gmail.com (Ryan Carboni) Date: Sun, 6 Dec 2015 09:16:46 -0800 Subject: Non-DoD crypto funding? A contradiction in terms? In-Reply-To: References: Message-ID: On Sun, Dec 6, 2015 at 8:19 AM, Henry Baker wrote: > http://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdf > > "From 2000 to 2010, fewer than 15% of the papers at > CRYPTO that acknowledged U.S. extramural funding > acknowledged DoD funding. In 2011, this rose to 25%. > From 2012 to2015, it rose to 65%. Nowadays, many > cryptographers put together a large patchwork of > grants, *the largest of which are usually DoD.*" > > I'm afraid that *funding* is the biggest hurdle > to achieving Rogaway's goals. It's somewhat > easier for Rogaway, as he has tenure, but how > does a young crypto researcher get non-DoD > funding? > > And yet he expressed fear that an errant remark on a phone call would lead to his assassination? I will trust him if he has a suspicious suicide, otherwise the hyperbole is more cause for suspicion. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1341 bytes Desc: not available URL: From coderman at gmail.com Sun Dec 6 13:55:34 2015 From: coderman at gmail.com (coderman) Date: Sun, 6 Dec 2015 13:55:34 -0800 Subject: [Cryptography] Cryptography is not a science currently In-Reply-To: References: Message-ID: On 12/6/15, Ryan Carboni wrote: > ... > Snowden isn't such a big deal. some calls for preservation to the contrary: "Why the Snowden files should be made accessible through public libraries." - http://berlinergazette.de/snowden-files-public-library-position-paper/ "On Archiving and Commoning the Snowden Files" - http://www.socialhistoryportal.org/news/articles/308169 > Maybe no one cares about Nicholas Merril and his fight against a national > security letter. did you see the unredacted version? i actually used this recently in a FOIA, in fact: "Per your request for fix of this request, Under the USA PATRIOT Act, Pub. L. No. 107-56 §505(a), 115 Stat. 272, 365 (2001) , including recent revisions; C.f. USA FREEDOM Act of 2015, Pub. L. No. 114-23, 129 Stat. 268, the FBI can issue National Security Letters requesting specific business record information, including SSL/TLS private keys used in Internet communications. See https://peertech.org/files/merrill-v-lynch-unredacted-decision-vacating-gag.pdf for additional information. I am requesting Procedures, Instructions, and any other materials regarding the proper handling of SSL/TLS secret keys obtained via National Security Letters or Court Order under PATRIOT Act, or USA FREEDOM Act authorities as above." - https://www.muckrock.com/foi/united-states-of-america-10/kleptokeymgmt-21208/#comm-207273 > Maybe no one cares about Mark Klein, or that Congress gave retroactive > immunity to telecommunications providers in cooperating with the > government. the Mark Klein exhibits were the first time i saw sensitive private cable tap activities exposed to the public. it was the first time i had hope for judicial action against nation state spying activities on domestic soil. ( i still have hope, but it is much more tempered, now :) > Maybe no one cares that Theo de Raadt lost a DARPA grant for criticizing > the Iraq war. Theo an opinionated egotistical asshat, yet still no justification for a Dixie-Chicks'in on his contracts... > Maybe no one cares... you're missing other significant behavior modifications, like the "voluntary" servitude of forever-secretive classified contracts, or compelled cooperation when they catch you ridin' dirty, or an employer dependent on military-industrial-complex, now the cyber-spy-n-sploit racket, or .... > Why am I wasting my time? There are thousands of events that transpired > before Snowden, and Snowden is a big deal? How is he a big deal? quantified risk. we now know with greater precision than ever before, exactly how well resourced and bleeding edge this attacker (USA) is. unfortunately it's almost all bad news... ( denial is not rejection; can you blame the heads in the sand, really? ) > ... The only interesting new bit of > knowledge in 2013 was parallel construction. I had no idea that the federal > government was */that/* crooked. actually this was exposed in DEA investigations, but yes, the scale of it is disturbing to say the least. keep caring! and best regards, From ryacko at gmail.com Sun Dec 6 17:30:38 2015 From: ryacko at gmail.com (Ryan Carboni) Date: Sun, 6 Dec 2015 17:30:38 -0800 Subject: [Cryptography] Cryptography is not a science currently In-Reply-To: References: Message-ID: On Sun, Dec 6, 2015 at 1:55 PM, coderman wrote: > On 12/6/15, Ryan Carboni wrote: > > > Maybe no one cares about Nicholas Merril and his fight against a national > > security letter. > > did you see the unredacted version? > > > I saw it. But whenever someone mentions Snowden, all previous knowledge seemingly leaves the head. > > > > Maybe no one cares about Mark Klein, or that Congress gave retroactive > > immunity to telecommunications providers in cooperating with the > > government. > > the Mark Klein exhibits were the first time i saw sensitive private > cable tap activities exposed to the public. it was the first time i > had hope for judicial action against nation state spying activities on > domestic soil. > ( i still have hope, but it is much more tempered, now :) > Congress will... grant retroactive immunity if the need arises. The Benghazi, SSCI, etc, are all a giant farce. > > Maybe no one cares... > > you're missing other significant behavior modifications, > > like the "voluntary" servitude of forever-secretive classified contracts, > > or compelled cooperation when they catch you ridin' dirty, > > or an employer dependent on military-industrial-complex, now the > cyber-spy-n-sploit racket, > > or .... > > Chomsky says that control is achieved through manipulating attitudes and opinions. https://ohtarzie.wordpress.com/2014/01/25/passing-noam-on-my-way-out-part-1/ https://ohtarzie.wordpress.com/2014/01/31/passing-noam-on-the-way-out-part-2-chomsky-vs-aaron-swartz/ https://ohtarzie.wordpress.com/2014/03/10/passing-chomsky-on-my-way-out-part-3-intermission/ We live in a democracy afterall. > > Why am I wasting my time? There are thousands of events that transpired > > before Snowden, and Snowden is a big deal? How is he a big deal? > > quantified risk. we now know with greater precision than ever before, > exactly how well resourced and bleeding edge this attacker (USA) is. > > unfortunately it's almost all bad news... > > ( denial is not rejection; can you blame the heads in the sand, really? ) > > > Erm... it's possible to learn by watching enough CCC videos of presentations to know all about the NSA and other five eyes intelligence. The logistics of it is impossible to hide. They have satellites next to satellites to intercept data. The FBI has thirty thousand employees (and operates DITU). The NSA has five times the budget and same number of employees. The CIA has seven times the budget and twenty thousand employees. This is just the US, the rest of Five Eyes puts in their fair share as well. To ensure staying on the topic of cryptography, how many cryptographers do you think there are? Given the discovery of high level spies within intelligence agencies (Redl, Ames, Hanssen), how could cryptographers hope to assure security if the top spies can't? It has been alleged that activist groups had been penetrated and the course of discussion manipulated. If one million dollars per year is spent towards manipulating cryptography, how would you think it would be used? The only secure place is your brain. If you can think for yourself, then you know your own thoughts are secure. Groupthink is the original cloud computing. Naturally, Rogaway doesn't mention any of this. He makes no frank assessment of risks and possibilities. And I am the only person to engage in a line by line examination his treatise? It is erroneous in numerous sections. Contains a lot of obscure historical details, but seemingly ignores the important ones? What is the impact upon you from reading the document? What do you feel? What possible alternative motivations by the author are there? -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5805 bytes Desc: not available URL: From coderman at gmail.com Sun Dec 6 18:17:24 2015 From: coderman at gmail.com (coderman) Date: Sun, 6 Dec 2015 18:17:24 -0800 Subject: [Cryptography] Cryptography is not a science currently In-Reply-To: References: Message-ID: On 12/6/15, Ryan Carboni wrote: > ... > Chomsky says that control is achieved through manipulating attitudes and > opinions. there is a parable, of the frog and the boiling pot... ;) > Erm... it's possible to learn by watching enough CCC videos of > presentations to know all about the NSA and other five eyes intelligence. you know this is a rough and obscured vision. remember retro reflectors? > The logistics of it is impossible to hide. They have satellites next to > satellites to intercept data. The FBI has thirty thousand employees (and > operates DITU). The NSA has five times the budget and same number of > employees. The CIA has seven times the budget and twenty thousand > employees. This is just the US, the rest of Five Eyes puts in their fair > share as well. this adds value to the leak trove; as reconstruction through evidence can be perfected based on observed and leaked details. there was a thread, last year. "datamine the snowden files" still a good idea, but not too many want to touch it? hmmm. ( see also, federal grants and publicly funded libraries and edus) > To ensure staying on the topic of cryptography, how many cryptographers do > you think there are? Given the discovery of high level spies within > intelligence agencies (Redl, Ames, Hanssen), how could cryptographers hope > to assure security if the top spies can't? It has been alleged that > activist groups had been penetrated and the course of discussion > manipulated. If one million dollars per year is spent towards manipulating > cryptography, how would you think it would be used? how many cryptographers are working alone, in secret? that becomes an interesting question :) > The only secure place is your brain... you're a lucky one, forever devoid of mental illness, then? congrats! and best regards, From coderman at gmail.com Sun Dec 6 18:20:19 2015 From: coderman at gmail.com (coderman) Date: Sun, 6 Dec 2015 18:20:19 -0800 Subject: [tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program In-Reply-To: <5664CE05.3020107@columbia.edu> References: <564EB197.7020207@columbia.edu> <20151120210105.Horde.YWWb5RcfXQQPOxUlAGDtLw1@127.0.0.1> <5664CE05.3020107@columbia.edu> Message-ID: On 12/6/15, William H. Depperman wrote: > Go Fuck yourself and please do not email any more. finals month? From coderman at gmail.com Sun Dec 6 20:19:31 2015 From: coderman at gmail.com (coderman) Date: Sun, 6 Dec 2015 20:19:31 -0800 Subject: Presidential Emergency Action Documents Message-ID: http://www.governmentattic.org/18docs/NRCupdtPEADS_2004.pdf Description of document: Nuclear Regulatory Commission (NRC) Update of Presidential Emergency Action Documents (PEADS), 2004 Requested date: 2012 Released date: January 2015 Posted date: 07-December-2015 Source of document: US Nuclear Regulatory Commission Mail Stop T-5 F09 Washington, DC 20555-0001 Fax: 301-415-5130 E-mail: FOIA.resource at nrc.gov The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. RESPONSE NUMBER U.S. NUCLEAR REGULATORY COMMISSION FOIA/PA NRC FORM 464 Part I (10-2014) 5 2013-0068 RESPONSE TO FREEDOM OF INFORMATION ACT (FOIA) I PRIVACY ACT(PA)REQUEST RESPONSE TYPE DATE REQUESTER 0 FINAL D PARTIAL JAN t 6,~vlS PART I. - INFORMATION RELEASED D D D No additional agency records subject to the request have been located. Requested records are available through another public distribution program. See Comments section. \GROUP 0 \~ROUP D \GROUP D D D Agency records subject to the request that are identified in the specified group are already available in public . ADAMS or on microfiche in the NRC Public Document Room. I Agency records subject to the request that are contained in the specified group are being made available in I public ADAMS. I Agency records subject to the request are enclosed. Records subject to the request that contain information originated by or of interest to another Federal agency have been referred to that agency (see comments section) for a disclosure determination and direct response to you. We are continuing to process your request. See Comments. PART I.A -- FEES AMOUNT* sI * See comments for details I D D You will be billed by NRC for the amount listed. You will receive a refund for the amount listed. D D None. Minimum fee threshold not met. Fees waived. PART l.B -- INFORMATION NOT LOCATED OR WITHHELD FROM DISCLOSURE D No agency records subject to the request have been located. For your information, Congress excluded three discrete categories of law enforcement and national security records from the requirements of the FOIA. See 5 U.S.C. § 552(c) (2006 & Supp. IV (2010). This response is limited to those records that are subject to the requirements of the FOIA. This is a standard notification that is given to all our requesters and should not be taken as an indication that excluded records do, or do not, exist. Certain information in the requested records is being withheld from disclosure pursuant to the exemptions described in and for the reasons stated in Part II. This determination may be appealed within 30 days by writing to the FOIA/PA Officer, U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001. Clearly state on the envelope and in the letter that it is a "FOIA/PA Appeal." PART l.C COMMENTS ( Use attached Comments continuation page if required) 1. Group H: Secy-04-0129: "Update of Presidential Emergency Action Documents (PEADS)" 2. This is Response #5 and the Final Response. SIGNATURE~·F...ccL>VM ..,,...,,~RMATION ACT AND PRIVACY ACT OFFICER Roger Andoh NRC FORM 464 Part 1 (10-2014) NRC FORM 464 Part II (08-2013) / .'Â¥~. .., .,.. J c ... ' DATE JAN I 6, ~o \.5 PART II.A -- APPLICABLE EXEMPTIONS Records subject to the request that are contained in the specified group are being withheld in their entirety or in part under the . Exemption No.(s) of the PA and/or the FOIA as indicated below (5 U.S.C. 552a and/or 5 U.S.C. 552(b)). I. 0 2013-0068 RESPONSE TO FREEDOM OF INFORMATION ACT (FOIA) I PRIVACY ACT (PA) REQUEST I GHROUP 0 U.S. NUCLEAR REGULATORY COMMISSION FOIA/PA ....... Exemption 1: The withheld information is properly classified pursuant to Executive Order 12958. Exemption 2: The withheld information relates solely to the internal personnel rules and practices of NRC. OExemption 3: The withheld Information is specifically exempted from public disclosure by statute indicated. O Sections 141-145 of the Atomic Energy Act, which prohibits the disclosure of Restricted Data or Formerly Restricted Data (42 U.S.C. 2161-2165). 0 0 0 The information is considered to be confidential business (proprietary) information. The information is considered to be proprietary because it concerns a licensee's or applicant's physical protection or material control and accounting program for special nuclear material pursuant to 10 CFR 2.390(d)(1). The Information was submitted by a foreign source and received in confidence pursuant to 10 CFR 2.390(d)(2). Disclosure will harm an identifiable private or governmental interest. Exemption 5: The withheld information consists of interagency or intraagency records that are not available through discovery during litigation. Applicable privileges: 0 0 0 0 0 O 41 U.S.C., Section 4702(b), prohibits the disclosure of contractor proposals in the possession and control of an executive agency to any person under section 552 of Title 5, U.S.C. (the FOIA), except when incorporated into the contract between the agency and the submitter of the proposal. Exemption 4: The withheld information is a trade secret or commercial or financial information that is being withheld for the reason(s) indicated. 0 0 0 0 0 Section 147 of the Atomic Energy Act, which prohibits the disclosure of Unclassified Safeguards Information (42 U.S.C. 2167). Deliberative process: Disclosure of predecisional information would tend to inhibit the open and frank exchange of ideas essential to the deliberative process. \/Vhere records are withheld in their entirety, the facts are inex1ricably intertwined with the predecisional information. There also are no reasonably segregable factual portions because the release of the facts would permit an indirect inquiry into the predecisional process of the agency. Attorney work-product privilege. (Documents prepared by an attorney in contemplation of litigation) Attorney-client privilege. (Confidential communications between an attorney and his/her client) Exemption 6: The withheld information is exempted from public disclosure because its disclosure would result in a clearly unwarranted Invasion of personal privacy. Exemption 7: The withheld information consists of records compiled for law enforcement purposes and is being withheld for the reason(s) indicated. 0 0 0 0 0 I (A) Disclosure could reasonably be expected to interfere with an enforcement proceeding (e.g., it would reveal the scope, direction, and focus of enforcement efforts, and thus could possibly allow recipients to take action to shield potential wrong doing or a violation of NRC requirements from investigators). (C) Disclosure could constitute an unwarranted invasion of personal privacy. (D) The information consists of names of individuals and other information the disclosure of which could reasonably be expected to reveal identities of confidential sources. (E) Disclosure would reveal techniques and procedures for law enforcement investigations or prosecutions, or guidelines that could reasonably be expected to risk circumvention of the law. (F) Disclosure could reasonably be expected to endanger the life or physical safety of an individual. OTHER (Specify) PART 11.B -- DENYING OFFICIALS Pursuant to 10 CFR 9.25(g), 9.25(h), and/or 9.65(b) of the U.S. Nuclear Regulatory Commission regulations, it has been determined that the information withheld is exempt from production or disclosure, and that its production or disclosure is contrary to the public interest. The person responsible for the denial are those officials identified below as denying officials and the FOIA/PA Officer for any denials that may be appealed to the Executive Director for Operations (EDO). DENYING OFFICIAL James T. Wiggins RECORDS DENIED TITLE/OFFICE Director, Office of Nuclear Security Incident Reporting See Form 464, Part l.C APPELLATE OFFICIAL EDD SECY IG 000 l J LJ LJ ODD Appeal must be made in writing within 30 days of receipt of this response. Appeals should be mailed to the FOIA/Privacy Act Officer, U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001, for action by the appropriate appellate official(s). You should clearly state on the envelope and letter that it is a "FOIA/PA Appeal." NRC FORM 464 Part II (08-2013) SECY-04-0129 July 23, 2004 '"'Y ISSUE TO: Chairman Diaz_i:.n.1 Commissioner~·-====<:.;"-'=-...;;..._-=-=-----Commissioner Me~l9tation Vote) FROM: Stephen G. Bums Acting General Counsel SUBJECT: UPDATE OF PRESIDENTIAL EMERGENCY ACTION DOCUMENTS (PEADS) PURPOSE: [OUO] This paper outlines the combined efforts of OGC and NSIR to review and make recommendations for update of the Presidential Emergency Action Documents (PEADs). There are 48 PEADs, which are currently being reviewed and updated on a government-wide basis. The review and update process is being managed by the Department of Justice (DOJ), the Federal Emergency Management Agency (FEMA), and the National Security Council (NSC). [OUO] The NRC's input to the PEAD review and update process is due to DOJ and FEMA on July 30, 2004. This paper requests Commission approval to transmit the attached inputs (Attachment 2) to DOJ and FEMA on that date. DISCUSSION: I. Background The PEADs [OUO] The PEADs are pre-coordinated legal documents designed to implement Presidential decisions during a national emergency. The PEADs consist of proclamations, executive orders, Presidential messages, and draft legislation ready for submission to Congress. Originally designed for use in the event of any major attack against the United States that disrupted the normal functions of the government, PEADs are used to implement extraordinary Presidential authority in response to extraordinary situations. CONTACT: Darani Reddick, OGC: 415-3841 Jared Heck, OGC: 415-1623 Declassified by: Krista Ziebell #3220 Information Security Specialist Declassified on: 20141125 SECRET DECLASSIFIED .ll!PllVED PROM 19 l!-:1~ ~ii0i~P.l-­ ,4~x;, 2 SECRET DECLASSIFIED [OUO] The PEADs are useful tools in the case of an emergency because they are flexible, may be quickly executed, and are capable of rapid distribution and implementation. PEADs reduce the normal amount of time required to promulgate and implement such Presidential documents by being prepared in advance of an emergency. They are divided into seven categories according to their subject matter, and designate departments or agencies that would have primary or support responsibility should the PEAD be executed. [OUO] Under the PEAD system, primary responsibility is designated to an agency recommending the execution of the PEAD, or one of the main agencies responsible for its implementation. Support responsibility is designated to an agency that has either been assigned direct involvement in carrying out one or more provisions of a PEAD, or an agency that would be directly impacted by the carrying out of a PEAD. The PEAD Update and Revision Project [OUO] The current PEAD portfolio was created in 1989 and contains 48 PEAOs. The first meeting to discuss the PEAD update and revision project took place on April 22, 2004. The NRC was not invited to this meeting, nor was the NRC specifically invited to review the PEAD portfolio. According to FEMA, the NRC was not asked to participate in the review because the NRC is not listed as a primary or support agency in any PEAD. [OUO] NSIR staff did not learn until June 2004 that the PEAD review was underway. NSIR staff subsequently contacted FEMA and requested copies of the PEADs and guidance on how to participate in the review process. NSIR staff did not receive this information until late June. [OUO] The PEAD review and update process calls on all federal departments and agencies to review existing PEADs and develop any new PEADs within their jurisdiction. FEMA serves as the Executive Secretariat to facilitate the review and update process, while DOJ determines the legal sufficiency of any proposed changes or additions to the PEADs. The NSC provides overall policy direction for the effort, and will serve as the final approval authority for any recommended PEAD changes. [OUO] There were three main steps to the OGC/NSIR PEAD review and update process. First, OGC and NSIR jointly reviewed existing PEADs to determine their potential impact on the NRC, its licensees, and the energy sector in general. Second, NSIR developed a list of potential NRC security concerns during a national emergency that might be addressed through the PEAD mechanism, and researched whether those concerns are currently being addressed outside the PEAD framework. Finally, OGC researched the legal basis for existing PEADs, as well as recently enacted legislation, to determine whether there is any statutory basis to justify the proposal of a new or amended PEAD to address NSIR's concerns. On the basis of our review, OGC recommends one minor change to the comments on an existing PEAD. SECRET DECLASSIFIED 3 SECRET DECLASSIFIED II. Analysis of Existing PEADs fSi [U] As mentioned above, the PEADs are organized by seven broad categories: fBi [U] Only category D contains PEADs that, if executed, might directly impact the operations of NRG-licensed facilities. These PEADs, D-201 and D-301, are discussed in some detail below. PEADs in cate ories A, F, and G mi ht indirect! affect NRC licensees-for example, PEADs in categories B and are not likely to impact NRC operations or NRC-licensed activities and are not discussed here. [UJ We turn now to a discussion of specific PEADs of greatest interest to the NRC. fSJ [U] fS:l [U] fS:l [U] f-61 [U] SUPPORTING AGENCIES: To be determined at the time of implementation SECRET DECLASSIFIED 4 SECRET DECLASSIFIED fSj [UJ One statute that does is the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 U.S.C. § 5121 et. seq. That Act authorizes the President to declare an emergency under certain circumstances, thus bringing federal resources to bear in response to catastrophic events. For example, in the event of a successful terrorist attack on a nuclear power plant or a natural disaster resulting in a radioactive release, the President might choose to execute his Stafford Act authority. 2 fS} Federal response to a Presidentially-declared emergency under the Stafford Act would be organized under the National Response Plan {NRP}, which is currently being developed by the De artment of Homeland Security (DHS) with input from the NRC and other a encies. [UJ fS} [UJ With the Commission's approval, OGC would recommend that DOJ add clarifying comments The specific clarifying comments are set forth in the proposed transmittal to DOJ (Attachment 2). fSl [U] fSj [U] f5i [U] f5i [U] SUPPORTING AGENCIES: To be determined at time of implementation 2 [0UO] We refer here to the President's authority to declare an "emergency" under the Stafford Act, not his more familiar power to declare a "major disaster" in response to a state governor's request. The President's authority to declare an "emergency" can be exercised without first receiving a state governor's requestfor assistance. Compare 42 U.S.C. § 5191 (a) with 42 U.S.C. § 5191 (b). 3 [U) According to the House Report No. 93-707 on the Energy Reorganization Act of 1974, DOE (then the Energy Research and Development Administration) and NRC share authority under AEA section 108. H.R. Rep. No. 93-707 at 27 {Dec. 7, 1973). Under section 201 of the Energy Reorganization Act, NRC exercises ulicensing and regulatory" functions under section 108. DOE exercises all other functions. See ERA§ 104(c). SECRET DECLASSIFIED 5 SECRET DECLASSIFIED ~ [U] fS:l [ U] [Si [U] [Si [U] fSi [U] Nevertheless, the attached inputs to DOJ (Attachment 2) reflect this expectation and call for appropriate NRC coordination in the event this PEAD is executed in a manner that impacts NRC-licensed facilities. ~ [U] "'[U] See 50 U.S.C. App. 2071. Statutory authority in 10 U.S.C. § 2538 and 50 U.S.C. § 82 also forms the legal basis for the President's authority under PEAD D-201. 5 [U] 10 U.S.C. § 2538 authorizes the President to take such action in the time of war or when war is imminent, while 50 U.S.C. § 82 could only be used in the time of war. This section is particularly applicable to the NRC because it defines uwar materials" to include "arms, armament, ammunition, stores, supplies, and equipment for ships and airplanes, and everything required for or in connection with the production thereof." Naval reactor fuel manufactured by a fuel facility is likely to fall under this definition. 6 [U] Executive Order 12,919 delegated to DOE the President's authority under 50 (continued ... ) SECRET DECLASSIFIED 6 SECRET DECLASSIFIED fS] [U] fS] [U] fBi [U] fBi [U] fe:J [U] fSi [U] fe:J [U] 5 SUPPORTING AGENCIES: To be determined at the time of implementation ( ... continued) U.S.C. App. 2017(c) to require the allocation of materials, equipment, and services to maximize domestic energy supplies with respect to all forms of energy. See 59 Fed. Reg. 29,525 ( 1994). 7 [U] See 50 U.S.C. 2071 (a) & (b). 8 [U] See note 6, supra. SECRET DECLASSIFIED 7 SECRET DECLASSIFIED fst [U] ~ [U] fS1 [U] fSj [U] fSj [U] fSj [UJ SUPPORTING AGENCIES: To be determined at the time of implementation [U] Under 10 U.S.C. § 12406, the President may call the National Guard into federal service whenever one of the following three circumstances exist: the United States, or any of the Territories, Commonwealths, or possessions, is invaded or is in danger of invasion by a foreign nation; there is a rebellion or danger of rebellion against the authority of the Government of the United States; or the President is unable with the regular forces to execute the laws of the United States. (1) (2) (3) 9 [UJ 50 U.S.C. § 2152(12). 10 [UJ 50 U.S.C. App. 2071. SECRET DECLASSIFIED 8 SECRET DECLASSIFIED fS} [U] fS} [U] fS} [U] Other than this statement of clarity, no revision to this PEAD is necessary. [U] ~ Other Energy-Related PEADs [U] SECRET DECLASSIFIED 9 SECRET DECLASSIFIED [Si [U] Ill. Analysis of Recently Enacted Legislation and Consideration of New PEADs [OUO] As stated above, NSIR provided OGC with a list of potential areas of NRC concern during a national emergency that might be remedied by creation of a new PEAD (Attachment 1 ). In addition to analyzing existing PEADs to determine whether they could be used to address NSIR's concerns, OGC analyzed recently enacted legislation to determine whether any new Presidential emergency powers have been established that might be incorporated into the PEADs. Specifically, OGC examined the USA PATRIOT Act of 2001 and the Homeland Security Act of 2002 to determine whether Congress has provided the President with any emergency powers that might support new PEADs germane to the NRC's mission and/or responsive to NSIR's concerns. [OUO) The Homeland Security Act, though sweeping in its reorganization of federal agencies, did not significantly expand the emergency powers of the President. Most, if not all, Presidential powers established by the Act relate to appointments, transfers and designations of officials responsible for executing the Act. The Act does establish some substantive Presidential authority-for example, the President is directed to prescribe government-wide policies and · procedures for sharing and protecting homeland security information. But this authority is apparently exercised through normal policymaking channels on a continuing basis and would not require a PEAD for emergency implementation. [OUOJ The USA PATRIOT Act includes a wide range of provisions aimed at improving investigative tools in the fight against terrorism. These provisions largely apply to the day-to-day functions of law-enforcement agencies. The Act also expands the President's authority to confiscate property of foreign entities that engage in armed hostilities against the United States. Although seizure of property would disrupt terrorist organization over time, it would not likely address pressing social, economic, military, or political issues during or after a national emergency. Therefore, there appears to be no need for this Presidential authority to be implemented through the PEAD mechanism. It is also unclear how a PEAD related to the President's powers under the USA PATRIOT Act would relate to NRC's mission. [OUO] Ultimately, OGC discovered no new statutory authority that might be used to support development of new PEADs germane to NRC's mission or that would address the areas of concern identified by NSIR (Attachment 1). SECRET DECLASSIFIED 10 SECRET DECLASSIFIED COORDINATION [U] This paper has been coordinated with the Office of the Executive Director for Operations and the Office of Nuclear Security and Incident Response. RECOMMENDATION [U] That the Commission approve transmittal of the proposed comment letter to FEMA and DOJ (Attachment 2). [U] Note: In order to meet the July 30 deadline, prompt Commission action is requested. Attachments: 1. NSIR Areas of Potential Concern 2. Proposed Comment Letter Commissioners' completed vote sheets/comments should be provided directly to the Office of the Secretary by COB Wednesday, July 28, 2004. Commission Staff Office comments, if any, should be submitted to the Commissioners NLT July 27, 2004, with an information copy to the Office of the Secretary. If the paper is of such a nature that it requires additional review and comment, the Commissioners and the Secretariat should be apprised of when comments may be expected. DISTRIBUTION: Commissioners OGG EDO SECY SECRET DECLASSIFIED ATTACHMENT 1 NSIR AREAS OF POTENTIAL CONCERN DURING NATIONAL EMERGENCIES [OUO] As part of the PEAD review and update process, NSIR staff posed a number of scenarios that might arise during a national emergency and asked whether any PEADs should be changed or added to address those scenarios. NSIR (in consultation with other offices) also considered whether existing authorities outside the PEAD framework cold be used to address its concerns. OGC then analyzed existing PEADs and recent legislation to determine whether any of NSIR's concerns should be addressed through PEAD changes. Ultimately, OGC recommends no substantive changes to the PEADs because NSIR's concerns can either be addressed using existing PEADs, or are better addressed through other decisionmaking processes. NSIR Concerns Addressed by Existing PEADs [OUO] 1. In the event of a national emergency, the President should not have to wait for a state governor to request assistance under the Stafford Act or to engage the National Response Plan. Should a PEAD be developed that would allow the President to act accordingly? Under 42 U.S.C. § 5191 (b), the President may engage the Stafford Act without a request from a state governor by declaring that an emergency exists for which the primary responsibility for response rests with the United States because the emergency involves a ·subject area for which, under the Constitution or laws of the United States, the United States exercises exclusive or preeminent responsibility and authority. The National Response Plan would be used to implement the Stafford Act in these circumstances. [OUO] GC will recommend [OUO] make this explicit. [OUO] fSj [U] ~ [U] l3J [U] 2. Situations may arise where security at critical nuclear facilities needs to be supplemented with armed forces. Should the President be able to direct the use of National Guard units or military reserves for this purpose using a PEAD? 3. Situations may arise where specific goods or services are needed to respond to a nuclear incident. For example, priority diagnosis and treatment for essential nuclear power plant personnel exposed to a range of chem-bio-rad hazards may be needed. SECRET DECLASSIFIED 2 SECRET DECLASSIFIED fSj [U] fSf [U] In the scenario posed by NSIR, the Department of Health and Human Services, which has been delegated authority to act under the DPA by Executive Order 12,919, would be em owered Other NSIR Concerns for Which No PEAD Changes are Needed [OUO] 1. Situations may arise where a need for power requires continued nuclear power plant operation in violation of federal environmental laws or under degraded safety conditions. Would a PEAD authorizing such operation be useful? · [OUO] OGC does not recommend the development of a PEAD that could be used to order operation of nuclear power plants under degraded safety conditions. Enforcement discretion could be exercised by federal authorities (including the NRC) to allow continued operation even though not all safety and environmental requirements are being met. Specific decisions should be made by the agencies expert in the relevant field. PEADs are not used to make these detailed, technical judgments. [OUO} 2. Terrorist attacks may cause radioactive material shipments to be rerouted through states that object. Is a PEAD necessary to resolve those objections? [OUO] The Department of Transportation currently has the authority to route shipments over a state's objection, so a PEAD is not needed. DOT regulations adopted under the Hazardous Materials Transportation Act of 1975, as amended, would preempt state efforts to block emergency rerouting of radioactive material shipments. See 49 U.S.C. §§ 5101-5127; 49 C.F.R. § 397.101. [OUO] 3. The NRC may need to take control of certain radioactive materials because of increased threats, weakened security, or other reasons that increase the risk to the public. Is a PEAD necessary for this purpose? SECRET DECLASSIFIED 3 SECRET DECLASSIFIED [OUO] Under AEA sections 1OB and 186.c, the Commission has authority to order the recapture of special nuclear material if a license is revoked or if Congress declares a national emergency. [OUO] The Commission also has broad authority under the AEA to take actions to protect public health and safety and promote the common defense and security. This authority can be invoked to ensure protection of material by mandating protective measures or transfer of material to an authorized recipient. The NRC also has a standing agreement with DOE to take radioactive materials when necessary to protect the public. [QUO] [QUO] 4. It may become critical and urgent that the NRC participate more directly in assessing a threat or in sharing threat information than is normally allowed. Should a PEAD ordering enhanced information sharing be written to meet the NRC's needs? Information sharing and intelligence coordination continues to be a high priority in the daily operations of the federal government. In a national emergency, OGC expects that those efforts would be further enhanced as observed in the response to the attacks of September 11, 2001 .. Improvements to information and intelligence sharing should continue to be pursued through the Department of Homeland Security and existing intelligence groups with which NRC has working contacts. [OUO] 5. Nuclear power plant workers may refuse to work due to terrorist threats against the plant or a spreading outbreak of communicable disease or virus. Should a PEAD be developed to address this possibility? [OUO] If a nuclear plant does not have enough willing workers to operate safely, it would have to be shut down. There is no legal authority that could be used to force nuclear power plant employees to work. SECRET DECLASSIFIED SECRET DECLASSIFIED ATTACHMENT 2 PROPOSED COMMENT LETTER TO DOJ Dear Sir or Madam: [DUO] This letter provides the Nuclear Regulatory Commission's (NRC) input to the Presidential Emergency Action Documents (PEADs) update and review process. Although the NRC was not invited to participate in this review, the NRC learned of the project through contacts with FEMA and requested the opportunity to comment. The NRC did not receive the PEADs or review guidance until late June. [DUO] The NRC recommends one minor change to the comments on an existing PEAD, offers clarifying comments setting forth its understanding of another PEAD, and sets forth its expected role as a support agency in the event certain PEADs are executed. fSi [U] fSi [U] fSi [U] fSj [U] to implement the NRP or the Stafford Act in every situation. In typical scenarios, the President implements those authorities by declaring a "major disaster" in response to a state ovemor's re uest-this model remains valid and should continue to be followed But extraordinary circumstances may arise that require the President to engage the Stafford Act and the NRP even before a state requests federal assistance. In such circumstances, the President may wish to exercise his authority under 42 U.S.C. § 5191(b) to declare an "emergency" so that federal resources are quickly brought to bear. But currently, it is not c l e a r can trigger application of the NRP. the followin comment to the legal basis discussion SECRET DECLASSIFIED 2 SECRET DECLASSIFIED Alternatively, the President could issue a subsequent, stand-alone executive order implementing his emergency powers under the Stafford Act. fSj [U] Clarification of NRC Supporting Agency Role f5i [U] The NRC notes that a number of PEADs, if executed in a If you have any questions about our comments, please contact our staff attorney Darani Reddick at (301) 415-3841 or Jared Heck at (301) 415-1623. I can be reached at (301) 4151740. Thank you for the opportunity to provide input to the PEAD review and update process. Sincerely, Stephen G. Bums Acting General Counsel SECRET DECLASSIFIED From carimachet at gmail.com Mon Dec 7 00:31:11 2015 From: carimachet at gmail.com (Cari Machet) Date: Mon, 7 Dec 2015 10:31:11 +0200 Subject: Movie about aaron swartz can use some funding on kickstarter In-Reply-To: References: Message-ID: O fuck sarah harrison and jacob ????? Fuck them On Dec 5, 2015 10:00 PM, "Cecilia Tanaka" wrote: > On Dec 5, 2015 8:08 PM, "Cari Machet" wrote: > > > > I am not affiliated in any way - seems like a nice project > > > > Heres aarons moms tweet > > > > Only 3 days left to fund Kickstarter for "From DeadDrop to SecureDrop" > https://t.co/ez7TA06XyV Link to Trailer: https://t.co/py6W00LmWs > ---- > > From my friend Lisa, sent few days ago... <3 > > **** > > Hope you are well! Been a long time :-) > > I'm making movies to teach the world more about Aaron Swartz and to help > the public better understand whistleblowers and whistleblower upload > systems. > > I wanted to let you know about my little Kickstarter campaign for a movie > I am producing independently, "From DeadDrop to SecureDrop" - it's about > "SecureDrop," an anonymous upload system for whistleblowers that Aaron > prototyped with Kevin Poulsen, one month before his death, that connects > directly to news organizations (such as the Washington Post, Forbes, and > The New Yorker): > > https://www.kickstarter.com/projects/261957173/from-deaddrop-to-securedrop > > Here's a Tweet about it, if you're short on time: > > Please help fund "From DeadDrop to SecureDrop" and help more potential > Whistleblowers learn about @SecureDrop http://bit.ly/SDrop > > I'm including a description of the project below! It's only going on for 4 > more days, and I only have about $5,000 of the $20,000 I'm trying to raise, > so any help -- or also Tweets and social media love would be greatly > appreciated! > > Thanks! :) > > Much love, > > lisa > > The film is entitled "From DeadDrop to SecureDrop," and provides a > historical account of how the "SecureDrop" open source anonymous > whistleblowing submission platform was originally prototyped by Kevin > Poulsen and Aaron Swartz, and later, after Aaron's death, how it made its > way its current home at the Freedom of the Press Foundation. > > People in the film (so far) include: Wired's Kevin Poulsen (how he was > inspired by WikiLeaks and then convinced Aaron to work with him on the > project), Trevor Timm and John Perry Barlow (of the Freedom of the Press > Foundation), who sought out the DeadDrop prototype, Garrett Robinson > (SecureDrop's current Development Lead) and Bill Budington (an EFF engineer > who worked directly on the early codebase), and some influential figures > familiar with the issues, such as Brewster Kahle (Founder of the Internet > Archive and co-founder, with myself, of Aaron Swartz Day) and Cindy Cohn > (Executive Director of the Electronic Frontier Foundation). I also > interviewed Virgil Griffith (Tor2Web and Wikiscanner), as he and Aaron were > good friends and worked on Tor2Web together. > > Jacob Applebaum has agreed to be interviewed for the film. (Besides being > a WikiLeaks volunteer, he was good friends with Aaron.) Also, Sarah > Harrison, who stood by Edward Snowden's side in Hong Kong and the Moscow > airport, and assisted with getting him safe asylum in Russia, has agreed to > be in the film! > > After learning more about whistleblower Chelsea Manning (in the course of > my preparing to read her statement during my live Aaron Swartz Day event) > video: https://youtu.be/qle9UvJGdYg?t=1h23m33s statement: > http://www.aaronswartzday.org/chelsea-manning-2015/)... > > I came to realize that the film really needs to expand beyond the subject > of the SecureDrop technology itself, to attempt to explain *why* these > whistleblowers might decide to use WikiLeaks or SecureDrop to expose > corruption in the first place: To inform the public and make the world a > better place. I realize this sounds simple and obvious, but I don't think > that most people are actually aware of this. Here's a post explaining how > Ed Snowden chose the Constitution over a Non-Disclosure agreement, when he > decided to blow the whistle: http://www.aaronswartzday.org/snowden-oath/ > > A third theme of the movie deals directly with an observation made by more > than one of the people I interviewed for the film, about how SecureDrop > will "help the next Ed Snowden" communicate with Journalists safely (so no > one will have to go through what he went through, just to get a story out). > > The film suggests that SecureDrop could potentially usher in a new > generation of whistleblower: One that won't necessarily have to put their > whole life at risk, in order to "do the right thing." > > Lisa Rein > > http://www.aaronswartzday.org > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5587 bytes Desc: not available URL: From meskio at sindominio.net Mon Dec 7 05:02:20 2015 From: meskio at sindominio.net (Ruben Pollan) Date: Mon, 07 Dec 2015 14:02:20 +0100 Subject: Encrypted email search indexing In-Reply-To: <3133413.lAJBbup9sP@lapuntu> References: <20151203110643.GC19455@ctrlc.hu> <3133413.lAJBbup9sP@lapuntu> Message-ID: <144949334031.14350.14185957818435832890@KingMob> Quoting rysiek (2015-12-05 15:57:10) > Dnia czwartek, 3 grudnia 2015 12:06:43 stef pisze: > > this makes little sense. pgp is for encryption in transit, not at rest. you > > should decrypt and reencrypt your mail. and you can also index it easily > > when doing so. > > It *kinda sorta* make sense if we're talking about an e-mail provider that > wants the user to be able to search even when they're using their webmail and > have no access to the private key. > > But on the other hand that in itself makes no sense to me. ;) As long as you store emails in the server and you retrieve them on demand your provider will be able to guess the content of your encrypted emails. I'll explain it. Imagine that you have the index in perfectly secure way, or locally stored or an ideal nifty way in the provider where you can do queries and the provider can not guess the content of the queries. Let's first assume that you have your emails stored as they arrive, your encrypted email is stored encrypted and your decrypted email is stored decrypted. After each query you retrieve the resulted emails, so the server sees which decrypted emails are related to which encrypted ones and in the long term can infer the content of the encrypted ones as well. Let's imagine then that you store all the emails encrypted. Then your provider could send to you crafted emails with the kind of content she cares about to discover, so it can notice each time you retrieve one of this crafted emails and what other emails are related to that. You could minimize this attack by not only fetching the emails that you care about, but fetch way more. But at the end or you have your whole set of emails locally or the server will be able to infer data about the encrypted emails. -- Ruben Pollan | http://meskio.net/ -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- My contact info: http://meskio.net/crypto.txt -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Nos vamos a Croatan. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: signature URL: From dstainton415 at gmail.com Mon Dec 7 09:17:50 2015 From: dstainton415 at gmail.com (David Stainton) Date: Mon, 7 Dec 2015 19:17:50 +0200 Subject: ANN: TCP injection attack detection tool - honeybadger Message-ID: <20151207171750.GA28163@googlemail.com> Dear Golang community, Edward Snowden, cypherpunks, Tor-relay operators, low-level network hackers and TCP abolitionists, I was inspired by the Snowden documents to write a TCP injection attack detection tool. Powerful entities world wide are stock piling zero-days. TCP injection attacks can be used to deliver many of these attacks. source: https://github.com/david415/HoneyBadger docs: https://honeybadger.readthedocs.org/en/latest/ tasty pcap for "integration testing": https://github.com/david415/honeybadger-pcap-files HoneyBadger does bidirectional TCP stream reassembly... temporarily storing segments in ring buffer for comparison to later received overlapping stream segments. In other words it doesn't rely on simply matching duplicate sequence numbers but compares the actual overlapping stream segment contents. This more thorough approach is needed to account for TCP's retransmission which can send various segments sizes that can differ from the original dropped segment length. Furthermore we also detect the other injection types such as handshake hijack. The literature (go ahead and scour the Internet) does NOT mention all of the TCP injection attacks that are possible. I assert that there are 5 possible types of TCP injection attack. I describe them here: https://github.com/david415/HoneyBadger_docs/blob/hackpad1/source/how-to-detect-TCP-injection-attacks.rst https://github.com/david415/HoneyBadger_docs/blob/hackpad1/source/how-to-detect-TCP-injection-attacks.rst#tcp-injection-attack-categories current honeybadger project status: - honeybadger seems mostly useable for use in the wild, though we are pretty sure that bugs exist and probably some false positive bugs at that. - active development halted several months ago when the implementation seemed good enough to deploy and sniff packets in the wild. - if in the future the gopacket dev team releases a new "sufficient" TCP reassembly API then I could severely reduce HoneyBadger's code size. - pull requests and github issue comments will inspire me to contribute feature additions and fixes It runs on Linux but does honeybadger work on *BSD? Of course it does... I wrote the gopacket BSD BPF sniffer API ;-p and tested honeybadger on NetBSD, FreeBSD and OpenBSD. I'd like to explore the possibility of writing a similar TCP injection attack detector in rust using libpnet as soon as libpnet is sufficiently mature to use for TCP analysis: https://github.com/libpnet/libpnet So what? 1. So... all TCP analyzers need to be rewritten to account for TCP injection attacks, otherwise you are doing it wrong. 2. So feel free to use HoneyBadger to analyze your own traffic over the wire or sketchy pcap files that you acquire; perhaps our data collection efforts will result in responsible disclosure of 0-days... and publicly reporting that in fact these TCP injection attacks do happen as targeted attacks against real people to violate their human rights. 3. So use my design in your software; The description of how to detect the 5 possible TCP injection attacks can serve as a part of a design document for other software projects to implement their own TCP injection attack detection. cheers from the Internet, David Stainton -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 801 bytes Desc: Digital signature URL: From grarpamp at gmail.com Mon Dec 7 19:56:56 2015 From: grarpamp at gmail.com (grarpamp) Date: Mon, 7 Dec 2015 22:56:56 -0500 Subject: LeMonde: France To Block Tor Message-ID: http://motherboard.vice.com/read/after-paris-attacks-proposed-french-law-would-block-tor-and-forbid-free-wi-fi French law enforcement wish to “Forbid free and shared wi-fi connections” and “to block or forbid communications of the Tor network.” From zen at freedbms.net Mon Dec 7 15:13:08 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 7 Dec 2015 23:13:08 +0000 Subject: Fwd: [ PFIR ] MS is ramping up their criminal Windows 10 upgrade scheme In-Reply-To: <20151207172748.GA27397@vortex.com> References: <20151207172748.GA27397@vortex.com> Message-ID: Seriously, why the hell help Microsoft lift their game by involving the FTC or any other government body! Leave them be. Help people who get stung to find a new and partly free world of libre software. A better Windows OS harms the cause for libre software, does not help us. We live in a world where government is decrepit, corporations are corrupt in their manifestation in the world, and even small decisions we techies make, can have big consequences down the line. Let's put a political and ethical intent into our communication and our actions - our childrens' future needs every bit of leg up we can possibly add. WHY oh why encourage MS to take -away- reasons that people should not use Windows!?! Insanity. Zenaan ---------- Forwarded message ---------- From: "PFIR (People For Internet Responsibility) Announcement List" Date: Mon, 7 Dec 2015 09:27:48 -0800 Subject: [ PFIR ] MS is ramping up their criminal Windows 10 upgrade scheme To: pfir-list at pfir.org MS is ramping up their criminal Windows 10 upgrade scheme Microsoft sets stage for massive Windows 10 upgrade strategy http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html#tk.rss_all In an interview Friday, Mayfield said that the Windows 10 upgrade setting switcheroo on Windows 7 and 8.1 PCs was apparently due to continued updates that Microsoft has shoved onto the older devices. The Redmond, Wash. company has repeatedly re-served its original GWX app to PCs, often with undocumented changes, even if the machine already had the app, or even if the user had managed to uninstall it previously. "Microsoft has released this update several times," said Mayfield. "It doesn't change the name of the update, but every version is new, with new binary files." - - - Where the hell is the FTC when we need them? This is the sort of crap they need to be stopping. Windows 10 in its default settings -- not all of which are even straightforward to change -- is a privacy nightmare. On many older computers, its performance is slow and horrific. In many cases, older devices cease working due to lack of new drivers. What Microsoft is doing here is the equivalent of black hat hacking of user computers on an enormous scale. It's criminal. Especially if you're on an older computer, every time MS tries to get you to install Windows 10, say no, and strongly consider moving to a different system entirely, until MS' current leadership is in federal prison where they belong for computer crimes on a massive scale. --Lauren-- Lauren Weinstein (lauren at vortex.com): http://www.vortex.com/lauren Founder: - Network Neutrality Squad: http://www.nnsquad.org - PRIVACY Forum: http://www.vortex.com/privacy-info Co-Founder: People For Internet Responsibility: http://www.pfir.org/pfir-info Member: ACM Committee on Computers and Public Policy Lauren's Blog: http://lauren.vortex.com Google+: http://google.com/+LaurenWeinstein Twitter: http://twitter.com/laurenweinstein Tel: +1 (818) 225-2800 / Skype: vortex.com I have consulted to Google, but I am not currently doing so. My opinions expressed here are mine alone. _______________________________________________ pfir mailing list http://lists.pfir.org/mailman/listinfo/pfir From dan at geer.org Mon Dec 7 20:36:09 2015 From: dan at geer.org (dan at geer.org) Date: Mon, 07 Dec 2015 23:36:09 -0500 Subject: The art of trolling at the highest political levels In-Reply-To: Your message of "Fri, 04 Dec 2015 23:35:02 +0000." Message-ID: <20151208043609.47267A06E18@palinka.tinho.net> > Statesman, bare chested military strongman, international comedian. > Entertainment don't get much better than this. When Donald Trump becomes President, he'll get along fine with Putin, as presaged by this passage from a wonderful description of a life: http://s.telegraph.co.uk/graphics/projects/john-blashford-snell/index.html ... Blashford-Snell and Sgt Major David Taylor spent an evening with some "Rastafarians from Wandsworth". He relates the events in his book as follows. "You from the fuzz?" hissed a dreadlocked West Indian. "These guys is in the Army," said his pal. "What you do there?" spat the questioner, pushing his face closer to mine. "We kill people," said the sergeant major quietly. There was a short pause and then a roar of laughter. "That's great, man. Let's have a drink." --dan From grarpamp at gmail.com Mon Dec 7 20:47:40 2015 From: grarpamp at gmail.com (grarpamp) Date: Mon, 7 Dec 2015 23:47:40 -0500 Subject: [tor-talk] LeMonde: France To Block Tor In-Reply-To: References: Message-ID: On Mon, Dec 7, 2015 at 11:23 PM, Nurmi, Juha wrote: > This is a horrible idea and it is not going to work. Technically regarding intertubes is one thing. As an "aggravating" "enhancement" to criminal charge of "excercising free speech" is another. From grarpamp at gmail.com Mon Dec 7 20:51:47 2015 From: grarpamp at gmail.com (grarpamp) Date: Mon, 7 Dec 2015 23:51:47 -0500 Subject: [tor-talk] LeMonde: France To Block Tor In-Reply-To: <1669860644.17034520.1449547766793.JavaMail.yahoo@mail.yahoo.com> References: <1669860644.17034520.1449547766793.JavaMail.yahoo@mail.yahoo.com> Message-ID: On Mon, Dec 7, 2015 at 11:09 PM, Jonathan Wilkes wrote: > Say a well-funded attacker takes the Carnegie Mellon deanonymization attack and introduces Sybil slowly over several months. The graph would look like this... https://metrics.torproject.org/networksize.html?graph=networksize&start=2007-07-04&end=2015-12-08 > What then is the defense? Pray. From grarpamp at gmail.com Mon Dec 7 23:54:27 2015 From: grarpamp at gmail.com (grarpamp) Date: Tue, 8 Dec 2015 02:54:27 -0500 Subject: Fwd: [Cryptography] Obama calls out encryption in terror strategy speech In-Reply-To: References: Message-ID: ---------- Forwarded message ---------- From: Henry Baker Date: Mon, Dec 7, 2015 at 8:48 AM Subject: [Cryptography] Obama calls out encryption in terror strategy speech To: cryptography at metzdowd.com FYI -- http://www.theregister.co.uk/2015/12/07/obama_encryption_policy_change_in_terror_response_speech/ Obama calls out encryption in terror strategy speech President wants 'high-tech leaders to make it harder for terrorists to use technology to escape from justice' 7 Dec 2015 at 05:20, Simon Sharwood United States President Barack Obama has given just his third Address to the Nation from behind his desk at the Oval Office, to deliver a speech in which he all-but-called-on the technology industry to allow access to encrypted communications. The main purpose of the speech was to offer a response to last week's killings in San Bernadino. Obama said investigations have found “no evidence that the killers were directed by a terrorist organization overseas, or that they were part of a broader conspiracy here at home” but did label "an act of terrorism" committed by people who "... had gone down the dark path of radicalization, embracing a perverted interpretation of Islam that calls for war against America and the West." The speech goes on to say that "as the Internet erases the distance between countries, we see growing efforts by terrorists to poison the minds of people like the Boston Marathon bombers and the San Bernardino killers." Obama therefore explains the USA's immediate response to terrorism and particularly to ISIL, including military and diplomatic efforts, plus some restrictions on the right to purchase firearms and stronger screening of some visitors to America. Future actions, Obama said, will include an attempt to "urge high-tech and law enforcement leaders to make it harder for terrorists to use technology to escape from justice." The sentence isn't explained, but seems a clear reference to the technology industry's argument that encryption is essential for everyday life and therefore ought not to be equipped with back doors for government use. The term "escape from justice" also invokes a New York Times op-ed titled When Phone Encryption Blocks Justice. Penned by Manhattan district attorney, Cyrus R. Vance Jr, Paris chief prosecutor François Molins, commissioner of the City of London Police Adrian Leppard and chief prosecutor of the High Court of Spain Javier Zaragoza, the piece argued that "The new encryption policies of Apple and Google have made it harder to protect people from crime." Similar arguments emerged after the November 13th Paris attacks, when it was widely argued that the attacks may have been detected, and prevented, if law enforcement agencies had access to backdoors allowing easier and wider surveillance of encrypted communications services. Obama's speech is something of a reversal, as he's previously resisted calls for access to encrypted communications. Hillary Clinton, however, has called for Silicon Valley to "develop solutions that will both keep us safe and protect our privacy," adding that "Now is the time to solve this problem, not after the next attack." Clinton's remarks were made in the days between the Paris and San Bernardino incidents. -----BEGIN NSA SPEEDBUMP:I AM SPARTACUS----- Is it just /dev/random ? Only the NSA can tell. 2F795C65C3F925BFEF91EAEA8F1311117B68FE6540947EF54D2CE7A89F98ED45E0711AD518C5B585CBD6B366EE26B9E75F429804FA6D6A93A88DF5A43ED22FA4 763F4CB0A6CDC1D24649B8F3548AD9251D70FE89B6A97774AAACB5CCC8D5EC19C0EA06C99BAB94DF07EAF78143D5A6FF2D562524907DE35E6C91E94D2680CB1B 5A1EB0D7029E135D44E1E850742416D7F6ABF575BB08B27D91ABCEF85937A6B8D173A36C41A9950D0434B021EE0B809E0F5EABE5265B7BAABA004136974F12C5 AE35AFB1E3D3212E44FF09B18FEA4191F92F9584158549D89245A3ECDECCD3F252DE40F04F0E915FE095F5A0BF4825DB2FD238007D7DDEE26852DFA087EB425C E96070F0DA194424714487C90AB60D7F2A08BE5608B1277A5AC4B6436E4007A6A02F8F316A644A8F660D7C1FDD8F4D2761AB2599778F5AEFC52F8FD5D25EF802 458315B3614BEDAFBDBD9B2AD42A71ACB66FE1F808BE2432292DEC11DEB526261C8BBA9D4F2ED52BB282B3A1786777BA62029671CCFF2D0AA5E287AF85B71D02 BB216C934F867F98A743CA85BB72DFDBBE2799100435E686020855C4495257554AB06741B25607328018498F65B54056D258B2854A60D1A7035E1A490BC9A8AE 8E9D97B514BEB63DA838944F8F994188F4F1242361E97D706682E0D01EC7251745DBFFE0C923CB23EA62EE8C40A45F28F3558044AFD8D6D9AF09B343579492E7 3F45A0CCEF3540B05254D3D87E631D2639C682C641ACA85E8079B21F8023CAB75A4FB91D74A45F1E993ACAE914B7DA4AC42EFFE521CE6391440D33700AF14DD1 B1F69E968DD11D066154DABAB3C92C6DAE6A378936BE96B728DA3C376945793DDDBE426C17D53CFDB7D4E52B1261F899FBEE6BA5D3BB6ECE510ED8B409350E3B 9D03AD2715DBA8D8F9E4461E7FA0787278E36CAF20E108C9611D1FAA54E6B33800DA94FE24E80DEE73CBADC7447F153360B9B437D6A45291582DDE6F61E56131 E503366C66EF82E0B16098ED73006FFAA98D85C22143BBBB97FC4A2020D84D452F59DA915CE1830126E81A410CF3EB2BB83D98E7F4274B197C436C0BD6CD9013 665E15C72D717863EFAF1B3AB518BBA8C03503DCEDFBBE034BFB3A9AC6F8245F7649F32A927F0D212200BB3E2AFFC0A606E90CB34B4F290DCAC0086161222DDB C913A6F28F537D46 -----END NSA SPEEDBUMP----- _______________________________________________ The cryptography mailing list cryptography at metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography From grarpamp at gmail.com Tue Dec 8 00:24:14 2015 From: grarpamp at gmail.com (grarpamp) Date: Tue, 8 Dec 2015 03:24:14 -0500 Subject: [tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program In-Reply-To: References: <564EB197.7020207@columbia.edu> <20151120210105.Horde.YWWb5RcfXQQPOxUlAGDtLw1@127.0.0.1> Message-ID: On Sun, Dec 6, 2015 at 6:04 AM, coderman wrote: > here's some fun for you: > https://peertech.org/files/taobios-v2.tar.bz2 https://www.ssllabs.com/ssltest/analyze.html?d=peertech.org Today's fun has been jacked by the NSA ;) From grarpamp at gmail.com Tue Dec 8 01:00:52 2015 From: grarpamp at gmail.com (grarpamp) Date: Tue, 8 Dec 2015 04:00:52 -0500 Subject: [tor-talk] LeMonde: France To Block Tor In-Reply-To: References: <1669860644.17034520.1449547766793.JavaMail.yahoo@mail.yahoo.com> Message-ID: On Tue, Dec 8, 2015 at 1:15 AM, Laomai Weng wrote: > On 2015-12-08 06:33, Ch'Gans wrote: >> >> s/France/French Police Would Like/ >> s/Tor/Open And Shared Connections/ s/France/Govts/ s/Tor/Private and or Anonymous Free Speech/ >> Bad propaganda for France Some might see it at that level. Others will see part of a series of (quite possibly coordinated to purpose) statements by govts of so far at least UK US FR... In fact, Obama's recent speech basically reversed his former "spoken" position on crypto. > good propaganda for Tor... You'd have to ask Juan about that. > Indeed, please all bear in mind this seems to be only an item in the > police wishlist ATM. Today's wishlist, wednesday's bill, thursday's law, and friday you're in jail. The longer you bear their wishes, the more they see fit to lay upon you. > Nevertheless, still sucky news to be hit with just before breakfast when breakfast -> vomit -> bag -> gendarmerie Call it a protest for free speech. From juha.nurmi at ahmia.fi Mon Dec 7 20:23:52 2015 From: juha.nurmi at ahmia.fi (Nurmi, Juha) Date: Tue, 8 Dec 2015 06:23:52 +0200 Subject: [tor-talk] LeMonde: France To Block Tor In-Reply-To: References: Message-ID: This is a horrible idea and it is not going to work. Fortunately, Tor gives the user multiple mechanism to fight back. Even against deep packet inspection (DPI). http://i.imgur.com/hg3Fc0y.png -Juha On Tue, Dec 8, 2015 at 5:56 AM, grarpamp wrote: > > http://motherboard.vice.com/read/after-paris-attacks-proposed-french-law-would-block-tor-and-forbid-free-wi-fi > French law enforcement wish to “Forbid free and shared wi-fi > connections” and “to block or forbid communications of the Tor > network.” > -- > tor-talk mailing list - tor-talk at lists.torproject.org > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1514 bytes Desc: not available URL: From mpd at wolf359.net Tue Dec 8 06:27:18 2015 From: mpd at wolf359.net (Mike Duvos) Date: Tue, 8 Dec 2015 06:27:18 -0800 Subject: Donald Trump Wants to Shut Down the Internet Message-ID: [Hours after Donald Trump suggested the U.S. ban Muslims from entering the United States , the leading Republican presidential candidate said America should also consider “closing the Internet up in some way” to fight Islamic State terrorists in cyberspace. Trump mocked anyone who would object that his plan might violate the freedom of speech, saying “these are foolish people, we have a lot of foolish people.” “We have to go see Bill Gates,” Trump said, to better understand the Internet and then possibly “close it up.”'] http://www.dailydot.com/politics/trump-closing-the-internet-up-in-some-way/ Trump has finally jumped the shark. -- Mike Duvos mpd at wolf359.net -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1105 bytes Desc: not available URL: From Rayzer at riseup.net Tue Dec 8 08:27:07 2015 From: Rayzer at riseup.net (Rayzer) Date: Tue, 8 Dec 2015 08:27:07 -0800 Subject: [tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program In-Reply-To: References: <564EB197.7020207@columbia.edu> <20151120210105.Horde.YWWb5RcfXQQPOxUlAGDtLw1@127.0.0.1> Message-ID: <566704DB.3070907@riseup.net> grarpamp wrote: > On Sun, Dec 6, 2015 at 6:04 AM, coderman wrote: >> here's some fun for you: >> https://peertech.org/files/taobios-v2.tar.bz2 > https://www.ssllabs.com/ssltest/analyze.html?d=peertech.org > Today's fun has been jacked by the NSA ;) > This is really 'above my pay grade' but the only thing I saw of concern (besides lack of *some* support in *some* instances for certain browser/os combos) is: > Chain issues Contains anchor > #2 > Subject Go Daddy Secure Certificate Authority - G2 > Besides the onus of Go Daddy certifying you, my searching doesn't show the above issue is a real problem, unless you're task is sever efficiency. So I guess I need an explanation of "Today's fun has been jacked by the NSA ;)" -- RR "You might want to ask an expert about that - I just fiddled around with mine until it worked..." -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From grarpamp at gmail.com Tue Dec 8 08:53:04 2015 From: grarpamp at gmail.com (grarpamp) Date: Tue, 8 Dec 2015 11:53:04 -0500 Subject: [tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program In-Reply-To: <566704DB.3070907@riseup.net> References: <564EB197.7020207@columbia.edu> <20151120210105.Horde.YWWb5RcfXQQPOxUlAGDtLw1@127.0.0.1> <566704DB.3070907@riseup.net> Message-ID: On Tue, Dec 8, 2015 at 11:27 AM, Rayzer wrote: > So I guess I need an explanation of "Today's fun has been jacked by the > NSA ;)" Well it was an "F" grade so either it's fixed now or someone was jacking it along the way. From tbiehn at gmail.com Tue Dec 8 09:34:28 2015 From: tbiehn at gmail.com (Travis Biehn) Date: Tue, 8 Dec 2015 12:34:28 -0500 Subject: [tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program In-Reply-To: References: <564EB197.7020207@columbia.edu> <20151120210105.Horde.YWWb5RcfXQQPOxUlAGDtLw1@127.0.0.1> <566704DB.3070907@riseup.net> Message-ID: The poor score was the result of SSLv3 being enabled. -Travis On Tue, Dec 8, 2015 at 11:53 AM, grarpamp wrote: > On Tue, Dec 8, 2015 at 11:27 AM, Rayzer wrote: > > So I guess I need an explanation of "Today's fun has been jacked by the > > NSA ;)" > > Well it was an "F" grade so either it's fixed now or someone was > jacking it along the way. > -- Twitter | LinkedIn | GitHub | TravisBiehn.com | Google Plus -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1295 bytes Desc: not available URL: From juan.g71 at gmail.com Tue Dec 8 11:27:41 2015 From: juan.g71 at gmail.com (juan) Date: Tue, 8 Dec 2015 16:27:41 -0300 Subject: Donald Trump Wants to Shut Down the Internet In-Reply-To: References: Message-ID: <56672d60.0732370a.d6c7c.ffff99d4@mx.google.com> On Tue, 8 Dec 2015 06:27:18 -0800 Mike Duvos wrote: > the leading Republican presidential candidate said America should also > consider “closing the Internet up in some way” to fight Islamic State Yes, they should put something in the tubes to make it harder for terrorist fuids to flow. From jdb10987 at yahoo.com Tue Dec 8 11:57:48 2015 From: jdb10987 at yahoo.com (jim bell) Date: Tue, 8 Dec 2015 19:57:48 +0000 (UTC) Subject: yahoo encryption article References: <1797148754.17469530.1449604668953.JavaMail.yahoo.ref@mail.yahoo.com> Message-ID: <1797148754.17469530.1449604668953.JavaMail.yahoo@mail.yahoo.com> https://www.yahoo.com/tech/faq-how-encryption-works-and-why-people-are-so-184846489.html Encryption has been all over the headlines after recent terrorist attacks, and the discussion can quickly get cryptic. Is “crypto” a fatal weakness of the Internet? An endangered species that must be saved? You can hear heartfelt testimony for either view from both Democratic and Republican politicians. But ultimately, encryption is just math that, like any other tool, can be used for good or ill. Let’s start with some basics about it that often get neglected in all the commentary. Q. It was my understanding there would be no math in this story…? A. Sorry, it’s unavoidable: Encryption works by encoding information in such a way that its recipient can decode it (without further help from its sender), but no one else can. To do that scrambling, you need to run the original data through one equation or another. For example, to encrypt something against the prying eyes of somebody who’s really, really drunk, you could just replace each letter with one 13 places forward (so “A” becomes “N” and so on). If your eavesdropper is more capable, you’ll need something more complicated — but it’s still all equations. Q. Okay. What makes for strong cryptography? A. Using more complex math in an encryption algorithm only goes so far if the sender and recipient use the same key — that is, if they both plug the same secret set of digits into the encryption formula — to encrypt and decrypt. In that case, if either party loses the key, game over. From mpd at wolf359.net Tue Dec 8 22:49:59 2015 From: mpd at wolf359.net (Mike Duvos) Date: Tue, 8 Dec 2015 22:49:59 -0800 Subject: Wired Outs Satoshi? Message-ID: "In the last weeks, WIRED has obtained the strongest evidence yet of Satoshi Nakamoto’s true identity. The signs point to Craig Steven Wright, a man who never even made it onto any Nakamoto hunters’ public list of candidates, yet fits the cryptocurrency creator’s profile in nearly every detail. And despite a massive trove of evidence, we still can’t say with absolute certainty that the mystery is solved. But two possibilities outweigh all others: Either Wright invented bitcoin, or he’s a brilliant hoaxer who very badly wants us to believe he did." http://www.wired.com/2015/12/bitcoins-creator-satoshi-nakamoto-is-probably-this-unknown-australian-genius/ Previous candidates include Newsweek's expose on Dorian Nakamoto, and the suggestion that our own Nick Szabo is the guilty party. In other news, I just got one of the lovely new Bitcoin VISA Debit Cards put out by Shift. I can now spend my Bitcoins at 38 million merchants worldwide. Science marches on. -- Mike Duvos mpd at wolf359.net From grarpamp at gmail.com Tue Dec 8 20:31:13 2015 From: grarpamp at gmail.com (grarpamp) Date: Tue, 8 Dec 2015 23:31:13 -0500 Subject: Satoshi Hacked/Leaked/Hoaxed And Outed Message-ID: http://www.wired.com/2015/12/bitcoins-creator-satoshi-nakamoto-is-probably-this-unknown-australian-genius/ http://gizmodo.com/this-australian-says-he-and-his-dead-friend-invented-bi-1746958692 From juan.g71 at gmail.com Tue Dec 8 23:36:22 2015 From: juan.g71 at gmail.com (juan) Date: Wed, 9 Dec 2015 04:36:22 -0300 Subject: Satoshi Hacked/Leaked/Hoaxed And Outed In-Reply-To: References: Message-ID: <5667d829.742a8c0a.1f808.ffffe5d2@mx.google.com> On Tue, 8 Dec 2015 23:31:13 -0500 grarpamp wrote: > http://www.wired.com/2015/12/bitcoins-creator-satoshi-nakamoto-is-probably-this-unknown-australian-genius/ > http://gizmodo.com/this-australian-says-he-and-his-dead-friend-invented-bi-1746958692 http://panopticrypt.com/about.html "Panopticrypt was founded by Dr Craig Wright, the only person in the world* to hold all three GIAC Security Expert (GSE) certifications, making him certifiably the world’s foremost IT security expert." That ^^^^^^^ is some world class bullshit. Even better "Since 2012 Dr Wright has served as the Executive Vice President of Strategy Development for the Centre for Strategic Cyberspace + Security Science (UK), with a focus on coordinating government bodies in securing cyber systems. Dr Wright has been engaged as a digital forensic expert and trainer with the Australian Federal Police. " The same guy who wants to overthrow the financial establishment is a contractor/lapdog of the most despicable branch of the fascist state? Makes a lot of sense. Not. Also wired's article seem to amount to "I read a bunch of (now deleted) posts on some random blog on the interwebs that I think prove (maybe) that xxxx is yyyy. Or maybe not" From mpd at wolf359.net Wed Dec 9 06:06:00 2015 From: mpd at wolf359.net (Mike Duvos) Date: Wed, 9 Dec 2015 06:06:00 -0800 Subject: Satoshi Hacked/Leaked/Hoaxed And Outed In-Reply-To: References: Message-ID: "Satoshi" just got raided by the Australian Federal Police, allegedly for reasons unrelated to Bitcoin. http://www.rawstory.com/2015/12/australian-police-raid-sydney-home-of-alleged-bitcoin-creator/ -- Mike Duvos mpd at wolf359.net From Rayzer at riseup.net Wed Dec 9 08:21:15 2015 From: Rayzer at riseup.net (Rayzer) Date: Wed, 9 Dec 2015 08:21:15 -0800 Subject: Satoshi Hacked/Leaked/Hoaxed And Outed In-Reply-To: <5667d829.742a8c0a.1f808.ffffe5d2@mx.google.com> References: <5667d829.742a8c0a.1f808.ffffe5d2@mx.google.com> Message-ID: <566854FB.5090402@riseup.net> juan wrote: > The same guy who wants to overthrow the financial establishment What makes you think he wants to do that? Bitcoin would be a great way for old-line criminal networks like the Maf to use the global banking system, another Maf, unencumbered. I've NEVER trusted the ethics of people involved in cyber-endeavors. They're 99% (# pulled from my ass) feudal (while referring to themselves falsely as anarchists), and middle class. -- RR "You might want to ask an expert about that - I just fiddled around with mine until it worked..." -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From Rayzer at riseup.net Wed Dec 9 08:23:21 2015 From: Rayzer at riseup.net (Rayzer) Date: Wed, 9 Dec 2015 08:23:21 -0800 Subject: Satoshi Hacked/Leaked/Hoaxed And Outed In-Reply-To: References: Message-ID: <56685579.9080903@riseup.net> grarpamp wrote: > http://www.wired.com/2015/12/bitcoins-creator-satoshi-nakamoto-is-probably-this-unknown-australian-genius/ > http://gizmodo.com/this-australian-says-he-and-his-dead-friend-invented-bi-1746958692 > From what I was reading elsewhere yesterday, it sounds like his Ex OL got into his email account and passed the dox around. -- RR "You might want to ask an expert about that - I just fiddled around with mine until it worked..." -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From juliocesarfort at gmail.com Tue Dec 8 23:37:06 2015 From: juliocesarfort at gmail.com (Julio Cesar Fort) Date: Wed, 9 Dec 2015 08:37:06 +0100 Subject: Satoshi Hacked/Leaked/Hoaxed And Outed In-Reply-To: References: Message-ID: According to Attrition's Errata, he is also a known infosec plagiarist: http://attrition.org/errata/plagiarism/ On Dec 9, 2015 5:36 AM, "grarpamp" wrote: > > http://www.wired.com/2015/12/bitcoins-creator-satoshi-nakamoto-is-probably-this-unknown-australian-genius/ > > http://gizmodo.com/this-australian-says-he-and-his-dead-friend-invented-bi-1746958692 > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 963 bytes Desc: not available URL: From bogus@does.not.exist.com Wed Dec 9 09:03:46 2015 From: bogus@does.not.exist.com () Date: 9 December 2015 9:03:46 PM ACDT Subject: Switzerland ... to stop private banks from creating money out Message-ID: of nothing - thin air - and then lending it out as an interesting-bearing debt! Switzerland will have a referendum on whether to stop private banks from creating money out of thin air. http://desiebenthal.blogspot.ch/2015/12/swiss-positive-money-social-credit.html HOME » BLOG » 2015 » DECEMBER » 08 » SWITZERLAND WILL. WRITTEN BY POSITIVE MONEY ON DECEMBER 8, 2015. The Swiss population will be the first in the world to vote on their banking and money system, thanks to the tireless efforts of our sister organisation Modernizing Money (MoMo). The campaign, which has involved over 100 activists collecting signatures, gathered 111,819 signatures to have a referendum on removing the power that banks currently have to create money when they make loans. They made it within 18 months, which under Swiss law results in a referendum. On Tuesday 1st December Positive Money's director Fran Boait and the coordinator of the international movement for monetary reform Stan were in Switzerland at the invitation of the MoMo to officially hand in the petition with all the signatures to the Swiss Parliament. This was a great day for the monetary reform movement. Some of the other members of the International movement and also NEF joined the MoMo in Switzerland to celebrate handing in the petition and to begin planning a strategy for the referendum. Here you can view the video of the hand-in (although the commentary is available only in German): The Financial Times has reported about it in an article entitled "A licence to print e-money for private banks" by Martin Sandbu: But what if ordinary joes like you and me cotton on to this scam ? What scam? That private banks just create money at will. You mean you agree with this Swiss initiative now? How could I not? If banks can just print electronic money, that's just as destabilising as printing notes freely. It's a really great article. You can read it in full here . One of our twitter followers have commented on it with the words: Duncan McCann, researcher on Economy and Finance from NEF was there at the hand-in of signatures as well and has written an article about it which you can read here . Although the battle to get the Swiss parliament to acknowledge the current problems with the Swiss monetary system will be hard, the referendum offers perhaps the greatest opportunity we've seen in Europe for a fundamental rethink of the current monetary system and a genuine debate about the future of economics. Economist Steve Keen added that "whatever the outcome of this proposal, the debate it will allow over our monetary system is one that we have to have". Please share this to help us support this campaign. http://desiebenthal.blogspot.ch/2015/12/swiss-positive-money-social-credit.html Un banquier suisse, votre serviteur, explique en 3 minutes l'arnaque de la création monétaire, avec le Canada comme exemple. Vidéo Facebook : https://www.facebook.com/LePeupleEstRoi/videos/vb.152656254942354/398971633644147/?type=3&theater Tiré de l'émission "Qu'est-ce qu'elle a ma girl" de becurioustv.com. https://www.facebook.com/LePeupleEstRoi/videos/465320713675905/?comment_id=465742220300421&offset=0&total_comments=6 Chaque année, une semaine d'étude a lieu à Rougemont au Canada en 4 langues .... Repas et couchers gratuits pour tous nos invités des pays hors du Canada. Autre période de formation en avril-mai chaque année. Semaines d'études sur la démocratie économique Deux fois par année à Rougemont, basées sur le livre La démocratie économique (ou Crédit Social) expliquée en dix leçons, par Alain Pilote. LES PROCHAINES SESSIONS D'ÉTUDE SUR LA DÉMOCRATIE ÉCONOMIQUE auront lieu:soit au premier qui aura lieu du 10 au 22 avril 2016, suivi de notre semaine d'adoration du 24 au 30 avril, suivie de notre assemblée mensuelle fixée au 1 mai 2016. · soit au second qui se tiendra du 15 au 31 juillet, y compris les 3 journées de notre congrès annuel international en 4 langues ( fr. eng. spa. pol. ). Vous pouvez arriver et repartir quelques jours avant et après ces dates. Lisez le dernier Vers Demain en ligne: http://versdemain.org/TOUS_VD/vd_mjj_2015.pdf http://tracking.funio.com/c/443/1d872199859645440c32ab8820184bfda3c76895917b9f6ac4393afcef674058> François de Siebenthal à faire circuler largement, merci, le monde est déjà meilleur grâce à ce simple geste de solidarité. ---- You received this message because you are subscribed to the Google Groups "Social Credit" group. From Rayzer at riseup.net Wed Dec 9 14:14:12 2015 From: Rayzer at riseup.net (Rayzer) Date: Wed, 9 Dec 2015 14:14:12 -0800 Subject: Fwd: [ PFIR ] The "Sharing Economy" Is the Problem In-Reply-To: References: <20151209174840.GA16643@vortex.com> Message-ID: <5668A7B4.2010705@riseup.net> Zenaan Harkness wrote: > Perhaps this is worth discussion. > > Are AirBnB, Uber and Homejoy examples of political anarchism > (degenerate or otherwise)? > > Are we seeing the ultimate in self responsibility (I would say self > responsibility is a good thing)? > > How might we embrace such self responsibility, whilst also manifesting > collective empathy/ shared 'responsibility' (perhaps there's a better > term here)? > > Is Lauren Weinstein with his indenting style actually Juan in > disguise? Or is it in actual fact the other way around? > Z > > > ---------- Forwarded message ---------- > From: "PFIR (People For Internet Responsibility) Announcement List" > > Date: Wed, 9 Dec 2015 09:48:40 -0800 > Subject: [ PFIR ] The "Sharing Economy" Is the Problem > To: pfir-list at pfir.org > > The "Sharing Economy" Is the Problem > > http://www.truth-out.org/opinion/item/33720-the-sharing-economy-is-the-problem > > It's unfortunate then that these companies and the > misnamed "sharing economy" are really just fronts for > millionaires and billionaires to opportunistically ride off the > backs of everyday people, while also exacerbating many economic > inequalities. Avi Asher-Schapiro explains the truth in Jacobin: > The premise is seductive in its simplicity: people have skills, > and customers want services. Silicon Valley plays matchmaker, > churning out apps that pair workers with work. Now, anyone can > rent out an apartment with AirBnB, become a cabbie through Uber, > or clean houses using Homejoy. But under the guise of > innovation and progress, companies are stripping away worker > protections, pushing down wages, and flouting government > regulations. At its core, the sharing economy is a scheme to > shift risk from companies to workers, discourage labor > organizing, and ensure that capitalists can reap huge profits > with low fixed costs. > I can speak to airbnb. I watched a city council meeting a few months ago as a bunch of airbnb 'homeowners' (investment properties they MIGHT live at) hammered the talking point over and over again that having people rent their space by the day or week and go touristing is somehow better for the economy of my town than having someone who lives in a unit year round, goes shopping for groceries every week, has his car work done at a local garage etc. This happened at a meeting that was ostensibly to discuss the housing crisis in my Monterey Bay area town where a studio apartment rents for $2,000/month and no one who works for any average business based in the town makes anywhere NEAR that kind of money. The city council creeps just sat there mute. Not ONE OF THEM said "Can you show us any numbers to prove this??, because they long ago had prostituted themselves to mostly non-local commercial property interests and they had no intrinsic argument with airbnb's view. The problem with the "Sharing Economy" is that it only shares with other people involved in that 'economy' and excludes others. That's feudal, and Feudalist sharing is NOT sharing for the benefit of a whole community. It's sharing for the benefit of a few. What else would you expect from a totally psychopathic society like 'merica. -- RR "Yuppies. They don't want to live in your neighborhood. They want to live in THEIR neighborhood where you USED TO live" -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From guninski at guninski.com Wed Dec 9 08:30:44 2015 From: guninski at guninski.com (Georgi Guninski) Date: Wed, 9 Dec 2015 18:30:44 +0200 Subject: Satoshi Hacked/Leaked/Hoaxed And Outed In-Reply-To: <5667d829.742a8c0a.1f808.ffffe5d2@mx.google.com> References: <5667d829.742a8c0a.1f808.ffffe5d2@mx.google.com> Message-ID: <20151209163044.GA23716@sivokote.iziade.m$> On Wed, Dec 09, 2015 at 04:36:22AM -0300, juan wrote: > The same guy who wants to overthrow the financial establishment > is a contractor/lapdog of the most despicable branch of the > fascist state? Makes a lot of sense. Not. > You mean you don't trust the usa military scumbags to create allegedly anonymous Tor? ;))) DISCLAIMER: I don't know if the bitcoin creator is deanonymized by this, but suspect "no". From juan.g71 at gmail.com Wed Dec 9 13:47:56 2015 From: juan.g71 at gmail.com (juan) Date: Wed, 9 Dec 2015 18:47:56 -0300 Subject: Satoshi Hacked/Leaked/Hoaxed And Outed In-Reply-To: <566854FB.5090402@riseup.net> References: <5667d829.742a8c0a.1f808.ffffe5d2@mx.google.com> <566854FB.5090402@riseup.net> Message-ID: <56689fbe.232c8c0a.74155.5de1@mx.google.com> On Wed, 9 Dec 2015 08:21:15 -0800 Rayzer wrote: > juan wrote: > > The same guy who wants to overthrow the financial establishment > > What makes you think he wants to do that? I should have written "supposedly wants", and yes, 'overthrow' is too strong I guess. But even assuming satoshi isn't too anti-establishment, direct cooperation with the police seems out of character? > Bitcoin would be a great way > for old-line criminal networks like the Maf to use the global banking > system, another Maf, unencumbered. I'm not sure how that would work. At the moment the baking mafia does launder money for various criminals, but they do it secretly. I'm not sure how the fact that all bitcoin transactions are public and potentially traceable would help. On the other hand, if the banking mafia somehow 'adopted' bitcoin, then financial control and oppression would be greatly increased, since, again, all transactions are public. > > I've NEVER trusted the ethics of people involved in cyber-endeavors. > They're 99% (# pulled from my ass) feudal (while referring to > themselves falsely as anarchists), and middle class. Well, I partially share the feeling although I don't think there's something intrinsically wrong with private property and markets. What about Kropotkin and Bakunin - were they 'middle class'? =P > From zen at freedbms.net Wed Dec 9 12:30:47 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Wed, 9 Dec 2015 20:30:47 +0000 Subject: Interest free finance - Russian and her national economic survival Message-ID: http://russia-insider.com/en/christianity/russia-debates-unorthodox-orthodox-financial-alternative/ri11620 The "the Anglo-American free-market banking model" is AFAICT the criminal privatisation of national government owned and controlled banks, and holding nations and their peoples hostage to the usury and market manipulation of those who privately own those banks. As a prime example, our Australian national bank has been (illegally) privatised: https://en.wikipedia.org/wiki/Commonwealth_Bank >From debt free after WWII, to a trillion dollar debt today, we have been thoroughly sold out and fucked over (original link giving 406 - may be a TBB thing): http://www.michaeljournal.org/australia.htm https://webcache.googleusercontent.com/search?q=cache:UIqRZBDMRLEJ:http://www.michaeljournal.org/australia.htm%2Baustralia+WWII+%22debt+free%22&gbv=1&sei=5ItoVoLMJ8SyabfbtdAN&hl=en&&ct=clnk and pretending that asset sales somehow is a good thing: http://www.smh.com.au/news/national/totally-debtfree-were-well-in-the-money-costello/2006/04/20/1145344222676.html another one not coming up at the main link: http://www.gwb.com.au/gwb/news/banking/money.html https://webcache.googleusercontent.com/search?q=cache:7gZl5b4uMjMJ:http://www.gwb.com.au/gwb/news/banking/money.html%2Baustralia+WWII+%22debt+free%22&gbv=1&sei=5ItoVoLMJ8SyabfbtdAN&hl=en&&ct=clnk Interesting graphs of US debt as percentage of GDP, going back, way back (with commentary/ analysis): http://www.theatlantic.com/business/archive/2012/11/the-long-story-of-us-debt-from-1790-to-2011-in-1-little-chart/265185/ From zen at freedbms.net Wed Dec 9 12:54:10 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Wed, 9 Dec 2015 20:54:10 +0000 Subject: Fwd: [ PFIR ] The "Sharing Economy" Is the Problem In-Reply-To: <20151209174840.GA16643@vortex.com> References: <20151209174840.GA16643@vortex.com> Message-ID: Perhaps this is worth discussion. Are AirBnB, Uber and Homejoy examples of political anarchism (degenerate or otherwise)? Are we seeing the ultimate in self responsibility (I would say self responsibility is a good thing)? How might we embrace such self responsibility, whilst also manifesting collective empathy/ shared 'responsibility' (perhaps there's a better term here)? Is Lauren Weinstein with his indenting style actually Juan in disguise? Or is it in actual fact the other way around? Z ---------- Forwarded message ---------- From: "PFIR (People For Internet Responsibility) Announcement List" Date: Wed, 9 Dec 2015 09:48:40 -0800 Subject: [ PFIR ] The "Sharing Economy" Is the Problem To: pfir-list at pfir.org The "Sharing Economy" Is the Problem http://www.truth-out.org/opinion/item/33720-the-sharing-economy-is-the-problem It's unfortunate then that these companies and the misnamed "sharing economy" are really just fronts for millionaires and billionaires to opportunistically ride off the backs of everyday people, while also exacerbating many economic inequalities. Avi Asher-Schapiro explains the truth in Jacobin: The premise is seductive in its simplicity: people have skills, and customers want services. Silicon Valley plays matchmaker, churning out apps that pair workers with work. Now, anyone can rent out an apartment with AirBnB, become a cabbie through Uber, or clean houses using Homejoy. But under the guise of innovation and progress, companies are stripping away worker protections, pushing down wages, and flouting government regulations. At its core, the sharing economy is a scheme to shift risk from companies to workers, discourage labor organizing, and ensure that capitalists can reap huge profits with low fixed costs. From juan.g71 at gmail.com Wed Dec 9 16:05:11 2015 From: juan.g71 at gmail.com (juan) Date: Wed, 9 Dec 2015 21:05:11 -0300 Subject: [ PFIR ] The "Sharing Economy" Is the Problem In-Reply-To: References: <20151209174840.GA16643@vortex.com> Message-ID: <5668bfea.54978c0a.47567.7404@mx.google.com> On Wed, 9 Dec 2015 20:54:10 +0000 Zenaan Harkness wrote: > Perhaps this is worth discussion. > > Are AirBnB, Uber and Homejoy examples of political anarchism > (degenerate or otherwise)? AiBnB and Uber are centralized middlemen - though the fact that uber goes against the privileges of the taxi mafia is an example of a freer market at work - at least in some limited fashion. On the other hand the 'market' is wholly owned by the middleman and the potential for abuse (assuming airbnb is not already the NSA) is...big. I suppose the anarchist version would exist as a p2p network, for starters. Haven't the cypherpunks already coded a bunch of those decentralized, censorship resistant, anonymous, bla bla bla systems? Anyway, I think couchsurfing is closer to anarchism than uber or airbnb (though the platform is just as centralized). > > Are we seeing the ultimate in self responsibility (I would say self > responsibility is a good thing)? > > How might we embrace such self responsibility, whilst also manifesting > collective empathy/ shared 'responsibility' (perhaps there's a better > term here)? > > Is Lauren Weinstein with his indenting style actually Juan in > disguise? Well...this is something I wouldn't say : " companies are stripping away worker protections, pushing down wages, and flouting government regulations" While I do think that airbnb and the like are more sophisticated forms of corporatism (not a free market), I wouldn't suggest that they are the only bad guys in town and that 'progressive' statists are the good guys who protect 'workers' with 'regulations'. > Or is it in actual fact the other way around? > Z > > > ---------- Forwarded message ---------- > From: "PFIR (People For Internet Responsibility) Announcement List" > > Date: Wed, 9 Dec 2015 09:48:40 -0800 > Subject: [ PFIR ] The "Sharing Economy" Is the Problem > To: pfir-list at pfir.org > > The "Sharing Economy" Is the Problem > > http://www.truth-out.org/opinion/item/33720-the-sharing-economy-is-the-problem > > It's unfortunate then that these companies and the > misnamed "sharing economy" are really just fronts for > millionaires and billionaires to opportunistically ride off > the backs of everyday people, while also exacerbating many economic > inequalities. Avi Asher-Schapiro explains the truth in > Jacobin: The premise is seductive in its simplicity: people have > skills, and customers want services. Silicon Valley plays matchmaker, > churning out apps that pair workers with work. Now, anyone can > rent out an apartment with AirBnB, become a cabbie through > Uber, or clean houses using Homejoy. But under the guise of > innovation and progress, companies are stripping away worker > protections, pushing down wages, and flouting government > regulations. At its core, the sharing economy is a scheme to > shift risk from companies to workers, discourage labor > organizing, and ensure that capitalists can reap huge profits > with low fixed costs. From coderman at gmail.com Wed Dec 9 23:17:54 2015 From: coderman at gmail.com (coderman) Date: Wed, 9 Dec 2015 23:17:54 -0800 Subject: Satoshi Hacked/Leaked/Hoaxed And Outed In-Reply-To: References: <5667d829.742a8c0a.1f808.ffffe5d2@mx.google.com> <566854FB.5090402@riseup.net> <56689fbe.232c8c0a.74155.5de1@mx.google.com> Message-ID: On Wed, Dec 9, 2015 at 4:50 PM, Zenaan Harkness wrote: > ... > Now to read Wikipedia's Bakunin summary... > https://en.wikipedia.org/wiki/Mikhail_Bakunin "Bakunin's increasing radicalism – including staunch opposition to imperialism in east and central Europe by Russia and other powers – changed his life, putting an end to hopes of a professorial career." tragedy or salvation? :) [ privilege may be enjoyed or burned... ] best regards, P.S. others for your edification: - https://en.wikipedia.org/wiki/Voltairine_de_Cleyre - https://en.wikipedia.org/wiki/Marie-Louise_Berneri - https://en.wikipedia.org/wiki/Elizabeth_Gurley_Flynn - https://en.wikipedia.org/wiki/Emma_Goldman - https://en.wikipedia.org/wiki/Lucy_Parsons - https://en.wikipedia.org/wiki/Mary_Harris_Jones From coderman at gmail.com Wed Dec 9 23:25:21 2015 From: coderman at gmail.com (coderman) Date: Wed, 9 Dec 2015 23:25:21 -0800 Subject: Satoshi Hacked/Leaked/Hoaxed And Outed In-Reply-To: References: Message-ID: On Tue, Dec 8, 2015 at 11:37 PM, Julio Cesar Fort wrote: > According to Attrition's Errata, he is also a known infosec plagiarist: > http://attrition.org/errata/plagiarism/ 10% plagiarized? ... that's not nothing, but also the least qualified charltan on attrition's list :) From coderman at gmail.com Wed Dec 9 23:26:53 2015 From: coderman at gmail.com (coderman) Date: Wed, 9 Dec 2015 23:26:53 -0800 Subject: [tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program In-Reply-To: References: <564EB197.7020207@columbia.edu> <20151120210105.Horde.YWWb5RcfXQQPOxUlAGDtLw1@127.0.0.1> <566704DB.3070907@riseup.net> Message-ID: On Tue, Dec 8, 2015 at 8:53 AM, grarpamp wrote: > ... > Well it was an "F" grade so either it's fixed now or someone was > jacking it along the way. sir, my military grade crypto is NSA-proof forever and ever, amen. ;P From coderman at gmail.com Wed Dec 9 23:31:57 2015 From: coderman at gmail.com (coderman) Date: Wed, 9 Dec 2015 23:31:57 -0800 Subject: FOIPA adventures In-Reply-To: References: <000701d0bcb7$94118e80$bc34ab80$@co.uk> Message-ID: a most recent Glomar: "Disclosure timeline and decision making rationale for disclosure of vulnerability MS14-066 / CVE-2014-6321 - "Vulnerability in Schannel Could Allow Remote Code Execution (2992611)" to Microsoft Corporation as part of the Vulnerabilities Equities Process. Please include timeline for initial discovery with source of discovery, first operational use, and finally, date for vendor notification." - https://www.muckrock.com/foi/united-states-of-america-10/discloseddisgustagency-22289/ "The request has been rejected, with the agency stating that it can neither confirm nor deny the existence of the requested documents." - https://www.muckrock.com/foi/united-states-of-america-10/discloseddisgustagency-22289/#comm-209022 i will discover how they stole this vuln... one day! best regards, From zen at freedbms.net Wed Dec 9 16:50:53 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Thu, 10 Dec 2015 00:50:53 +0000 Subject: Satoshi Hacked/Leaked/Hoaxed And Outed In-Reply-To: <56689fbe.232c8c0a.74155.5de1@mx.google.com> References: <5667d829.742a8c0a.1f808.ffffe5d2@mx.google.com> <566854FB.5090402@riseup.net> <56689fbe.232c8c0a.74155.5de1@mx.google.com> Message-ID: On 12/9/15, juan wrote: > What about Kropotkin and Bakunin - were they 'middle > class'? =P Great references thanks - I'll assume for the moment that you are referring to Bakunin the anarchist and not Bakunin the Russian football player :) https://en.wikipedia.org/wiki/Peter_Kropotkin Extremely apropos for me. Thank you. I am slowly learning little bits of history. It's ironic given the potential for influence he could have had at that time, that he refused the Education Ministry on his welcome back from exile, to Russia in 1917 after the February Revolution. Who knows - perhaps he was told he could not rewrite the school curriculum to inculcate a base of anarchist ideals? But we don't know his mind and considerations at that time. Some succinct snippets (to me): "His enthusiasm for the changes happening in the Russian Empire turned to disappointment when the Bolsheviks seized power in the October Revolution. "This buries the revolution," he said.[22] He thought that the Bolsheviks had shown how the revolution was not to be made; by authoritarian rather than libertarian methods.[22] He had spoken out against authoritarian socialism in his writings (for example The Conquest of Bread), making the prediction that any state founded on these principles would most likely see its own breakup and the restoration of capitalism.[citation needed]" "Kropotkin did not deny the presence of competitive urges in humans, but did not see them as the driving force of history (as did capitalists and social Darwinists).[39]:262 He did believe that at times seeking out conflict proved socially beneficial, but only during attempts to destroy unjust, authoritarian institutions such as the State or the Church, which he saw as stifling human creativity and freedom and impeding humans' instinctual drive towards sociality and cooperation.[40]" "With Mutual Aid especially, and later with Fields, Factories, and Workshops, Kropotkin was able to move away from the absurdist limitations of individual anarchism and no-laws anarchism that had flourished during this period and provide instead a vision of communal anarchism" Now to read Wikipedia's Bakunin summary... https://en.wikipedia.org/wiki/Mikhail_Bakunin Thanks again, Zenaan From grarpamp at gmail.com Wed Dec 9 22:14:23 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 10 Dec 2015 01:14:23 -0500 Subject: Feinstein and Burr Writing Bill To Kill Crypto Message-ID: http://www.dailydot.com/politics/fbi-encryption-james-comey-tech-companies/ Laced with slimy playstation, predator, paris rhetoric. Y'all about to get fucked. From coderman at gmail.com Thu Dec 10 03:54:12 2015 From: coderman at gmail.com (coderman) Date: Thu, 10 Dec 2015 03:54:12 -0800 Subject: FOIPA adventures In-Reply-To: References: <000701d0bcb7$94118e80$bc34ab80$@co.uk> Message-ID: On 12/9/15, coderman wrote: > a most recent Glomar: > > "Disclosure timeline and decision making rationale for disclosure of > vulnerability MS14-066 / CVE-2014-6321 - "Vulnerability in Schannel > Could Allow Remote Code Execution (2992611)" to Microsoft Corporation > as part of the Vulnerabilities Equities Process. Please include > timeline for initial discovery with source of discovery, first > operational use, and finally, date for vendor notification." > - > https://www.muckrock.com/foi/united-states-of-america-10/discloseddisgustagency-22289/ > > "The request has been rejected, with the agency stating that it can > neither confirm nor deny the existence of the requested documents." > - > https://www.muckrock.com/foi/united-states-of-america-10/discloseddisgustagency-22289/#comm-209022 reply(appeal): ''' I reject and demand appeal of your rejection of this request. First and foremost, please recognize that the GSF Explorer, formerly USNS Hughes Glomar Explorer (T-AG-193), for which this Glomar response is so named, was a purely military operation, using custom-built military equipment, on an exceptionally sensitive military mission to recover military equipment. Observe that the "Vulnerabilities Equities Process" is a public outreach activity communicating with third party partners, acting in the public interest regarding software used by public citizens and business alike - a scenario at opposite ends and means from which this denial blindly overreaches. Second, observe that existing precedent supports the release of materials responsive to this request. In American Civil Liberties Union v. Department of Defense Case No: 04-CV-4151 (ACLU v. DoD) the courts have affirmed the public interest as compelling argument for favoring the public interest against clearly military efforts. The Glomar denial should be well targeted; this targeted falls well outside of the the "Vulnerabilities Equities Process", which is a public outreach activity communicating with third party partners, acting in the public interest, regarding software used by public citizens and business alike. Third, consider that it is a well established technique in the information security industry to identify the origin and nature of a defect discovery and disclosure timeline. This information is used for myriad of secondary research, analysis, and automation efforts spanning numerous industries. The utility of of disclosure timeline information and context has decades of rich support and strong evidence of public interest benefit, particularly regarding long reported and fixed defects, such as this one, which has patches available for over a year. Fourth, observe that every hour of expert opinion coupled with legal review amounts to a non-trivial expenditure of hours which are a sunk, throw away cost of FOIA communication. While as a taxpayer I appreciate the service of FOIA professionals such as those involved in this request, who provide tireless effort the all hundreds of millions of US citizens, my personal cost should be recognized. For this reason a deference in favor of public interest and disclosure is well supported for this request regarding the "Vulnerabilities Equities Process", which is a public outreach activity communicating with third party partners, acting in the public interest, regarding software used by public citizens and business alike. Thank you for your time, and best regards, ''' - https://www.muckrock.com/foi/united-states-of-america-10/discloseddisgustagency-22289/#comm-209748 From coderman at gmail.com Thu Dec 10 04:10:40 2015 From: coderman at gmail.com (coderman) Date: Thu, 10 Dec 2015 04:10:40 -0800 Subject: certificate cleanliness sha1rightlol [was Re: [tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program] Message-ID: On 12/9/15, coderman wrote: > On Tue, Dec 8, 2015 at 8:53 AM, grarpamp wrote: >> ... >> Well it was an "F" grade so either it's fixed now or someone was >> jacking it along the way. > > sir, my military grade crypto is NSA-proof forever and ever, amen. > > ;P speaking of form whom it tolls, "TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384" is better than https://peertech.org/files/wtfgmailtls10dec2015.png :o . . . [ ... ? :) ] best regards, From zen at freedbms.net Wed Dec 9 21:32:12 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Thu, 10 Dec 2015 05:32:12 +0000 Subject: Fwd: Switzerland will have a referendum on whether to stop private banks from creating money out of thin air. In-Reply-To: References: Message-ID: As timely as it gets. Go the Swiss!! Z ---------- Forwarded message ---------- From: Jim Date: Thu, 10 Dec 2015 16:20:00 +1100 Subject: Switzerland will have a referendum on whether to stop private banks from creating money out of thin air. Re: Switzerland ... to stop banks from creating money ----- Original Message ----- From: Betty Luks Date: Thu, 10 Dec 2015 12:14:14 +1030 To: Brian McDermott Subject: Fwd: Switzerland ... to stop banks from creating money Thought this would be of interest to you Brain.... Best wishes Betty Luks Begin forwarded message: From: François de Siebenthal From jya at pipeline.com Thu Dec 10 06:26:10 2015 From: jya at pipeline.com (John Young) Date: Thu, 10 Dec 2015 09:26:10 -0500 Subject: Original Bitcoin Paper Announced on Cryptography Mail List Message-ID: From jya at pipeline.com Thu Dec 10 06:37:02 2015 From: jya at pipeline.com (John Young) Date: Thu, 10 Dec 2015 09:37:02 -0500 Subject: Satoshi Nakamoto introduces, discusses bitcoin Oct-Nov 2008 Message-ID: Satoshi Nakamoto introduces, discusses bitcoin Oct-Nov 2008 http://www.metzdowd.com/pipermail/cryptography/2008-October/014810.html http://www.metzdowd.com/pipermail/cryptography/2008-November/subject.html#start -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 468 bytes Desc: not available URL: From grarpamp at gmail.com Thu Dec 10 07:36:29 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 10 Dec 2015 10:36:29 -0500 Subject: Feinstein and Burr Writing Bill To Kill Crypto In-Reply-To: References: Message-ID: On Thu, Dec 10, 2015 at 1:14 AM, grarpamp wrote: > http://www.dailydot.com/politics/fbi-encryption-james-comey-tech-companies/ > Laced with slimy playstation, predator, paris rhetoric. https://www.eff.org/deeplinks/2015/12/no-matter-what-fbi-says-compromising-encryption-technical-issue Said pathetic words occurring in hearing where FBI Comey drops pathetic. Video above. From jya at pipeline.com Thu Dec 10 08:08:47 2015 From: jya at pipeline.com (John Young) Date: Thu, 10 Dec 2015 11:08:47 -0500 Subject: Feinstein and Burr Writing Bill To Kill Crypto In-Reply-To: References: Message-ID: Kill metadata and other crypto-issue-overdone diversions. Metadata and other crypto-workarounds resulted from the crypto wars of the 1990s which were bragged to be won rather than faked out. The fake-out was orchestrated by some of the very same crypto warriors claiming to be against gov-controlled crypto. A way to identify them is to note who rose to prominence and wealth in crypto com-edu-org. Still at it, ratcheting up the need for ever more crypto, acknowledging the workarounds but, but, but: Let's Encrypt, HTTPS-HTS everywhere, secure drops, freedom of the press and courage foundations, Snowden talks and tweets, FISC amicus curiea, POTUS and TLA advisories, industry lobbyists, dual hats riding the crypto gravy train and more likely, the subway out of sight. The money and prestige to be gained by working all sides of the crypto phony war is, as Greenwald crows of Omidyar's $250M bribe, irresistable. Crypto has always been a cheating game. Public key crypto even more so -- open source vetting: math marked cards. At 10:36 AM 12/10/2015, you wrote: >On Thu, Dec 10, 2015 at 1:14 AM, grarpamp wrote: > > http://www.dailydot.com/politics/fbi-encryption-james-comey-tech-companies/ > > Laced with slimy playstation, predator, paris rhetoric. > >https://www.eff.org/deeplinks/2015/12/no-matter-what-fbi-says-compromising-encryption-technical-issue >Said pathetic words occurring in hearing where FBI Comey drops pathetic. >Video above. From grarpamp at gmail.com Thu Dec 10 08:25:55 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 10 Dec 2015 11:25:55 -0500 Subject: Feinstein and Burr Writing Bill To Kill Crypto In-Reply-To: References: Message-ID: On Thu, Dec 10, 2015 at 11:08 AM, John Young wrote: > The fake-out was orchestrated by some of the very same > crypto warriors claiming to be against gov-controlled crypto. > > A way to identify them is to note who rose to prominence and > wealth in crypto com-edu-org. Still at it, ratcheting up the need Ack this, also noting that many crypto folks are serious central hierarchical control freaks, building and espousing such systems, rather than freedom lovers building p2p. For them... crypto is killswitch and license to kill. From coderman at gmail.com Thu Dec 10 12:39:27 2015 From: coderman at gmail.com (coderman) Date: Thu, 10 Dec 2015 12:39:27 -0800 Subject: certificate cleanliness sha1rightlol [was Re: [tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program] In-Reply-To: References: Message-ID: On 12/10/15, Travis Biehn wrote: > SHA1 & MD5 are still 'fine' to use as MAC, not fine to use in digital > signatures (like, X.509.) (Because collisions attacks don't make sense for > MACs brueh.) very true! though i was mostly mocking the sha1 CA root and "Trusted: NO, there were errors: The certificate authority's certificate is invalid." ... :) best regards, From coderman at gmail.com Thu Dec 10 12:56:22 2015 From: coderman at gmail.com (coderman) Date: Thu, 10 Dec 2015 12:56:22 -0800 Subject: Feinstein and Burr Writing Bill To Kill Crypto In-Reply-To: References: Message-ID: On 12/10/15, grarpamp wrote: > ... many crypto folks are serious central > hierarchical control freaks, building and espousing such systems, > rather than freedom lovers building p2p. the crux: crypto without full decentralization, is techno-fascism-fueled-elitistocracy. From Rayzer at riseup.net Thu Dec 10 13:07:51 2015 From: Rayzer at riseup.net (Rayzer) Date: Thu, 10 Dec 2015 13:07:51 -0800 Subject: Answered: Why Donald Trump needs to speak with Bill Gates Before 'shutting down the intertubz'? Message-ID: <5669E9A7.4040404@riseup.net> "Donald Trump has suggested shutting down the Internet by migrating everyone to Internet Explorer 11. Claiming the web is dangerous and people are being radicalised through exposure, Trump has pledged to talk to Bill Gates in an effort to make certain content unavailable by increasing buffering times until they just get bored and decide not to be terrorists after all. Microsoft proudly boasts that downloading a single pdf copy of the Anarchists Cookbook over IE11 can take up to 17 hours, which would deter even the most dedicated jihadi. Trump has insisted that it would not be policy to shoot people who use Chrome and Firefox on sight, but they would be encouraged to walk down the street more often which amounts to much the same thing. “I’m gonna see Bill Gates about closing up that whole Internet doohickey,” Trump told reporters “We’re losing a lot of people because of the Internet. “We have to see Bill Gates and a lot of different people that really understand what’s happening. “We have to talk to them about, maybe in certain areas, closing that Internet up in some ways. Somebody will say, ‘Oh freedom of speech, freedom of speech.’ These are foolish people.” Bill Gates has reportedly claimed that shutting the Internet down will be dead easy as he’ll just introduce a Windows update every half hour or so, which should kill it stone dead." http://newsthump.com/2015/12/10/donald-trump-pledges-to-shut-down-internet-by-migrating-everyone-to-internet-explorer/ -- RR "You might want to ask an expert about that - I just fiddled around with mine until it worked..." -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From Rayzer at riseup.net Thu Dec 10 19:17:24 2015 From: Rayzer at riseup.net (Rayzer) Date: Thu, 10 Dec 2015 19:17:24 -0800 Subject: Trotting out Muhammad Ali to accuse Trump of bigotry is like bringing out the KKK to Tolerance Week. In-Reply-To: References: Message-ID: <566A4044.5080602@riseup.net> Zenaan Harkness wrote: > Gotta give it to Daniel Greenfield - he sure knows how to grab a > catchy phrase :) > > http://www.frontpagemag.com/point/261082/martin-luther-king-when-muhammad-ali-joined-black-daniel-greenfield > > Starts off slow, but picks up part way through: > http://www.frontpagemag.com/point/261058/guide-progressives-trying-understand-trump-daniel-greenfield > > :) > I killist people who reference frontpagemag and theblaze, even as a joke. Because... "Inside Every Rabid Right-Winger Is A faggot Screaming To Get Buttfucked With Their Own Gun", but I wouldn't even touch these asses with YOUR dick. -- RR "You might want to ask an expert about that - I just fiddled around with mine until it worked..." -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From Rayzer at riseup.net Thu Dec 10 19:23:38 2015 From: Rayzer at riseup.net (Rayzer) Date: Thu, 10 Dec 2015 19:23:38 -0800 Subject: Answered: Why Donald Trump needs to speak with Bill Gates Before 'shutting down the intertubz'? In-Reply-To: References: <5669E9A7.4040404@riseup.net> Message-ID: <566A41BA.5050303@riseup.net> Zenaan Harkness wrote: > Trump and Lessig probably have more in common... ? They're both homo sapiens... At least Lessig is. Not so sure about Trump. -- RR "You might want to ask an expert about that - I just fiddled around with mine until it worked..." -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From tbiehn at gmail.com Thu Dec 10 11:32:46 2015 From: tbiehn at gmail.com (Travis Biehn) Date: Thu, 10 Dec 2015 19:32:46 +0000 Subject: certificate cleanliness sha1rightlol [was Re: [tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program] In-Reply-To: References: Message-ID: SHA1 & MD5 are still 'fine' to use as MAC, not fine to use in digital signatures (like, X.509.) (Because collisions attacks don't make sense for MACs brueh.) -Travis On Thu, Dec 10, 2015, 7:14 AM coderman wrote: > On 12/9/15, coderman wrote: > > On Tue, Dec 8, 2015 at 8:53 AM, grarpamp wrote: > >> ... > >> Well it was an "F" grade so either it's fixed now or someone was > >> jacking it along the way. > > > > sir, my military grade crypto is NSA-proof forever and ever, amen. > > > > ;P > > > speaking of form whom it tolls, > "TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384" is better than > https://peertech.org/files/wtfgmailtls10dec2015.png > :o > > . > . > . > > [ ... ? :) ] > > best regards, > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1374 bytes Desc: not available URL: From zen at freedbms.net Thu Dec 10 13:56:40 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Thu, 10 Dec 2015 21:56:40 +0000 Subject: Answered: Why Donald Trump needs to speak with Bill Gates Before 'shutting down the intertubz'? In-Reply-To: <5669E9A7.4040404@riseup.net> References: <5669E9A7.4040404@riseup.net> Message-ID: Perhaps we could hope the Republicans change the rules to exlude Trump from the debates, then he and Lawrence Lessig could part together? https://en.wikipedia.org/wiki/Lawrence_Lessig_presidential_campaign,_2016 In fact the main stream political parties are so samey these days, Trump and Lessig probably have more in common with each other than with either of the two main parties!? One could be the other's wing man on a first round, then they could do a two step swap for the next, like Putin and Medvedev. Unless they'd need a party to actually obtain the presidency at all? (I don't know how the US system works sorry.) In which case, Lessig could join the Republican party just to work with/ support Trump - or vice versa. With the theory being, any change is a good change at this stage. Anyone a hop or two away from either of these candidates to suggest they party together? Z From zen at freedbms.net Thu Dec 10 14:11:09 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Thu, 10 Dec 2015 22:11:09 +0000 Subject: Towards a practical and effective "TLS"? Message-ID: With the absurdity of HTTPS and certificates in mind, is a practical opportunistic transport layer link actual encryption: - possible? - worth pursuing (almost no one controls their hardware - "it's all VMs nowadays")? - if not worth pursuing, what set of attributes of a society ('national') level internet would need to be in place, for 'sane' opportunistic link encryption to make sense (e.g., mesh networks of various forms, physical server in every household, i.e. fully decentralise our networking, and server/host infrastructure)? - if worth pursuing, either now or after some level of attributes as named is in place, how might it look? Thanks, Zenaan From rysiek at hackerspace.pl Thu Dec 10 14:20:54 2015 From: rysiek at hackerspace.pl (rysiek) Date: Thu, 10 Dec 2015 23:20:54 +0100 Subject: Fwd: [ PFIR ] The "Sharing Economy" Is the Problem In-Reply-To: References: <20151209174840.GA16643@vortex.com> Message-ID: <3693066.bTSc0IfSqO@lapuntu> Dnia środa, 9 grudnia 2015 20:54:10 Zenaan Harkness pisze: > Perhaps this is worth discussion. > > Are AirBnB, Uber and Homejoy examples of political anarchism > (degenerate or otherwise)? AirBnB and Uber (don't know Homejoy) are as much "sharing economy", as "Open Office XML" is related to Open Office and an open standard. I.e. they are not, and are just trying to look like it. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From rysiek at hackerspace.pl Thu Dec 10 14:22:03 2015 From: rysiek at hackerspace.pl (rysiek) Date: Thu, 10 Dec 2015 23:22:03 +0100 Subject: Satoshi Hacked/Leaked/Hoaxed And Outed In-Reply-To: References: Message-ID: <15105981.VLIUfd8Um9@lapuntu> Dnia środa, 9 grudnia 2015 23:17:54 coderman pisze: > [ privilege may be enjoyed or burned... ] Can't one enjoy burning it, though? -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From rysiek at hackerspace.pl Thu Dec 10 14:27:20 2015 From: rysiek at hackerspace.pl (rysiek) Date: Thu, 10 Dec 2015 23:27:20 +0100 Subject: Towards a practical and effective "TLS"? In-Reply-To: References: Message-ID: <7363365.hFP5OLZRrC@lapuntu> Dnia czwartek, 10 grudnia 2015 22:11:09 Zenaan Harkness pisze: > With the absurdity of HTTPS and certificates in mind, is a practical > opportunistic transport layer link actual encryption: > > - possible? > > - worth pursuing (almost no one controls their hardware - "it's all > VMs nowadays")? > > - if not worth pursuing, what set of attributes of a society > ('national') level internet would need to be in place, for 'sane' > opportunistic link encryption to make sense (e.g., mesh networks of > various forms, physical server in every household, i.e. fully > decentralise our networking, and server/host infrastructure)? > > - if worth pursuing, either now or after some level of attributes as > named is in place, how might it look? Like Tox. Seriously, you can use Tox as transport layer and carry any text or data over it. It's opportunistic (or can be, if you configure it to "accept all friend requests"), and once verified it seems secure. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From zen at freedbms.net Thu Dec 10 15:36:52 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Thu, 10 Dec 2015 23:36:52 +0000 Subject: Trotting out Muhammad Ali to accuse Trump of bigotry is like bringing out the KKK to Tolerance Week. Message-ID: Gotta give it to Daniel Greenfield - he sure knows how to grab a catchy phrase :) http://www.frontpagemag.com/point/261082/martin-luther-king-when-muhammad-ali-joined-black-daniel-greenfield Starts off slow, but picks up part way through: http://www.frontpagemag.com/point/261058/guide-progressives-trying-understand-trump-daniel-greenfield :) From grarpamp at gmail.com Fri Dec 11 00:46:48 2015 From: grarpamp at gmail.com (grarpamp) Date: Fri, 11 Dec 2015 03:46:48 -0500 Subject: Save Crypto: Tell the White House We Can't Sacrifice Security Message-ID: https://www.eff.org/deeplinks/2015/12/save-crypto-tell-white-house-we-cant-sacrifice-security https://petitions.whitehouse.gov/petition/publicly-affirm-your-support-strong-encryption https://www.whitehouse.gov/webform/share-your-thoughts-onstrong-encryption From coderman at gmail.com Fri Dec 11 06:57:40 2015 From: coderman at gmail.com (coderman) Date: Fri, 11 Dec 2015 06:57:40 -0800 Subject: Satoshi and family could be killed if found In-Reply-To: References: Message-ID: -------------- next part -------------- A non-text attachment was scrubbed... Name: RAVENSEC.jpg Type: image/jpeg Size: 51598 bytes Desc: not available URL: From shelley at misanthropia.org Fri Dec 11 08:13:03 2015 From: shelley at misanthropia.org (Shelley) Date: Fri, 11 Dec 2015 08:13:03 -0800 Subject: Assange believes too late for any pervasive privacy In-Reply-To: References: Message-ID: <20151211161247.9DACBC016D5@frontend1.nyi.internal> On December 11, 2015 12:48:12 AM Zenaan Harkness wrote: > Feels like a sell out. I suspect he feels he's being pragmatic. > > https://www.rt.com/news/325524-assange-privacy-rt-10 > > Game for privacy is gone, mass surveillance is here to stay – Assange Jeezus, wtf! Julian has either finally lost his mind from living in exile or someone has gotten to him. What is this defeatist fuckery?! Of course we learn to adapt while living under a surveillance, militaristic police state - while we use and make the tech that pushes back, and will ultimately take it back. The very fact that the recent atrocities committed by crazy religious extremists and other mentally unstable people (including the latest delusional asswipe to shoot up a woman's health clinic in my gun-obsessed country) were able to be planned and carried out right under their noses proves that they're not ubiquitous. They just like to project that image so we will self-censor and cower in fear, as Julian seems to be buying into. Fuck That, I say! Part of it is just practicality: the Digital Stasi collects so much information that they can't process it all in a timely manner. Since they claim to hoard all encrypted communications (as though they don't hoard everything anyway), using existing encryption and other strategies while we develop something better will keep these pissant spies busy for quite some time. I'm not a ter'rist, not doing anything particularly interesting or illegal, don't really have much I care to hide... and that's exactly why the fucking government is not allowed to read my email and track my every move. They're proven that their attempt at constant and total surveillance is useless for keeping "the homeland" (what a fucking nazi phrase) safe, time and again. They're the ones we need protection from anyway. Adapt to survive: yes. Always! But advising that their cancerous surveillance is malignant, that it is too late to stop it, is utter bullshit. I refuse. -S > on #RT10 panel > Published time: 10 Dec, 2015 18:13 > Edited time: 11 Dec, 2015 03:16 > > Humanity has lost its battle for privacy and must now learn to live in > a world where mass surveillance is becoming cheaper for governments to > implement, WikiLeaks founder Julian Assange said during a panel > dedicated to RT’s 10th anniversary. > > Assange addressed the panel on security and surveillance hosted by RT > in central Moscow on Thursday via videoconference from the Ecuadorian > embassy in London, where he has remained holed up for the last three > years in order to avoid extradition to Sweden. > > When offered a chance to comment on the session’s topic – “Security or > Surveillance: Can the right to privacy and effective anti-terror > security coexist in the digital age?” – the whistleblower asked the > moderator, and host of The Big Picture Show on RT American, Thom > Hartmann: “How long have you got, Tom?” implying he has a lot to say > on the issue. > > But it was Assange’s only joke during the event, as his reply turned > out to be gravely serious and in many respects depressing. > > http://www.youtube.com/watch?v=k3rFNQ8ytnE > > “In thinking about this issue I want to take quite a different > position, perhaps, from what you would expect me to have taken… I > think that we should understand that the game for privacy is gone. > It’s gone. The mass surveillance is here to stay,” he said. > > Mass surveillance is already being implemented not only by major world > powers, but also by some medium and small-sized countries, he added. > > “The Five Eyes intelligence arrangement [of Australia, Canada, New > Zealand, the UK and the US]… is so evasive in terms of mass > surveillance of domestic and international telecommunications that > while some experts can achieve practical privacy for themselves for > limited number of operations… it’s gone for the rest of the > populations,” the WikiLeaks founder stressed. > > International terrorists are among those “experts” capable of making > their communications invisible for security agencies, he added. > > Privacy “will not be coming back, short of a very regressive economic > collapse, which reduces the technological capacity of civilization,” > Assange said. > > “The reason it will not come back is that the cost of engaging in mass > surveillance is decreasing by about 50 per cent every 18 months, > because it’s the underlying cost that’s predicated on the cost of > telecommunications, moving surveillance intercepts around and > computerization and storage – all those costs are decreasing much > faster at a geometric rate than the human population is increasing,” > he explained. > > Mass surveillance and computerization are “winning” the competition > with humanity and human values and they’re “going to continue to win > at an ever-increasing rate. That’s the reality that we have to deal > with,” the WikiLeaks whistleblower added. > > The focus should now switch from defending privacy to understanding > what kind of society will be built in these new, changed conditions, > he said. > > The WikiLeaks founder reminded the panel of the historic examples of > East Germany and other societies, in which people adapted to living > under the scrutiny of the authorities. > > “If you look at societal behavior in very conformist, small, isolated > societies with reduced social spaces – like Sweden, South Korea, > Okinawa in Japan and North Korea – then you’ll see that society > adapts. Everyone becomes incredibly timid, they start to use code > words; use a lot of subtext to try and sneak out your controversial > views,” he said. > > According to Assange, the modern world is currently moving “towards > that kind of a society.” > > Privacy is among values “that simply are unsustainable… in the face of > the reality of technological change; the reality of the deep state > with a military-industrial complex and the reality of Islamic > terrorism, which is legitimizing that sector in a way that it’s > behaving,” he stressed. > > Assange encouraged those present on the panel as well as the general > public to “get on the other side of the debate where it’s going” and > stop holding on to privacy. > > The panel discussion was part of an RT conference titled 'Information, > messages, politics:The shape-shifting powers of today's world.' The > meeting brought together politicians, foreign policy experts and media > executives from across the globe, among them former director of the US > Defense Intelligence Agency Michael Flynn, the Green Party’s Jill > Stein and former vice president of the Parliamentary Assembly of the > OSCE, Willy Wimmer. > From zen at freedbms.net Fri Dec 11 00:38:47 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Fri, 11 Dec 2015 08:38:47 +0000 Subject: Assange believes too late for any pervasive privacy Message-ID: Feels like a sell out. I suspect he feels he's being pragmatic. https://www.rt.com/news/325524-assange-privacy-rt-10/ Game for privacy is gone, mass surveillance is here to stay – Assange on #RT10 panel Published time: 10 Dec, 2015 18:13 Edited time: 11 Dec, 2015 03:16 Humanity has lost its battle for privacy and must now learn to live in a world where mass surveillance is becoming cheaper for governments to implement, WikiLeaks founder Julian Assange said during a panel dedicated to RT’s 10th anniversary. Assange addressed the panel on security and surveillance hosted by RT in central Moscow on Thursday via videoconference from the Ecuadorian embassy in London, where he has remained holed up for the last three years in order to avoid extradition to Sweden. When offered a chance to comment on the session’s topic – “Security or Surveillance: Can the right to privacy and effective anti-terror security coexist in the digital age?” – the whistleblower asked the moderator, and host of The Big Picture Show on RT American, Thom Hartmann: “How long have you got, Tom?” implying he has a lot to say on the issue. But it was Assange’s only joke during the event, as his reply turned out to be gravely serious and in many respects depressing. http://www.youtube.com/watch?v=k3rFNQ8ytnE “In thinking about this issue I want to take quite a different position, perhaps, from what you would expect me to have taken… I think that we should understand that the game for privacy is gone. It’s gone. The mass surveillance is here to stay,” he said. Mass surveillance is already being implemented not only by major world powers, but also by some medium and small-sized countries, he added. “The Five Eyes intelligence arrangement [of Australia, Canada, New Zealand, the UK and the US]… is so evasive in terms of mass surveillance of domestic and international telecommunications that while some experts can achieve practical privacy for themselves for limited number of operations… it’s gone for the rest of the populations,” the WikiLeaks founder stressed. International terrorists are among those “experts” capable of making their communications invisible for security agencies, he added. Privacy “will not be coming back, short of a very regressive economic collapse, which reduces the technological capacity of civilization,” Assange said. “The reason it will not come back is that the cost of engaging in mass surveillance is decreasing by about 50 per cent every 18 months, because it’s the underlying cost that’s predicated on the cost of telecommunications, moving surveillance intercepts around and computerization and storage – all those costs are decreasing much faster at a geometric rate than the human population is increasing,” he explained. Mass surveillance and computerization are “winning” the competition with humanity and human values and they’re “going to continue to win at an ever-increasing rate. That’s the reality that we have to deal with,” the WikiLeaks whistleblower added. The focus should now switch from defending privacy to understanding what kind of society will be built in these new, changed conditions, he said. The WikiLeaks founder reminded the panel of the historic examples of East Germany and other societies, in which people adapted to living under the scrutiny of the authorities. “If you look at societal behavior in very conformist, small, isolated societies with reduced social spaces – like Sweden, South Korea, Okinawa in Japan and North Korea – then you’ll see that society adapts. Everyone becomes incredibly timid, they start to use code words; use a lot of subtext to try and sneak out your controversial views,” he said. According to Assange, the modern world is currently moving “towards that kind of a society.” Privacy is among values “that simply are unsustainable… in the face of the reality of technological change; the reality of the deep state with a military-industrial complex and the reality of Islamic terrorism, which is legitimizing that sector in a way that it’s behaving,” he stressed. Assange encouraged those present on the panel as well as the general public to “get on the other side of the debate where it’s going” and stop holding on to privacy. The panel discussion was part of an RT conference titled 'Information, messages, politics:The shape-shifting powers of today's world.' The meeting brought together politicians, foreign policy experts and media executives from across the globe, among them former director of the US Defense Intelligence Agency Michael Flynn, the Green Party’s Jill Stein and former vice president of the Parliamentary Assembly of the OSCE, Willy Wimmer. From shelley at misanthropia.org Fri Dec 11 09:13:33 2015 From: shelley at misanthropia.org (Shelley) Date: Fri, 11 Dec 2015 09:13:33 -0800 Subject: Assange believes too late for any pervasive privacy In-Reply-To: <566AFFB6.1090300@pilobilus.net> References: <566AFFB6.1090300@pilobilus.net> Message-ID: <20151211171317.9D670C016F0@frontend1.nyi.internal> On December 11, 2015 9:00:54 AM Steve Kinney wrote: > I sometimes compare paranoid reactions to the "loss of privacy" in > the networked world to mental telepathy: The prospect of someone > reading your mind is frightening, until it turns out that your own > deeply held secrets are not special or unusual to a telepath who > has already "seen it all" and has /far/ worse examples to compare > your most heinous and embarrassing inner thoughts and motivations > to. > No. Just because my private thoughts may not be considered special or out of the ordinary does not mean you or anyone else has the right to know what they are unless I give you permission. Which leads to: > Old Farts have major problems wrapping their heads around the > concept that a world where privacy is shrinking fast and expected > to nearly disappear is a Good Thing. People who grew up with the > Interet, not so much. > People who grew up with the Internet... Do you mean the vapid idiots who willingly post every detail of their entire fucking lives on Failbook and fart out every insignificant, nonsensical thought in 140 character-blocks of uselessness? We, the Old Farts who helped build the place, wish you'd clean your room and take better care of things, or we'll be changing the locks. -S From rysiek at hackerspace.pl Fri Dec 11 00:53:35 2015 From: rysiek at hackerspace.pl (rysiek) Date: Fri, 11 Dec 2015 09:53:35 +0100 Subject: Answered: Why Donald Trump needs to speak with Bill Gates Before 'shutting down the intertubz'? In-Reply-To: References: <5669E9A7.4040404@riseup.net> Message-ID: <2436633.Rupxy3Rh2D@lapuntu> Dnia czwartek, 10 grudnia 2015 21:56:40 Zenaan Harkness pisze: > Perhaps we could hope the Republicans change the rules to exlude Trump > from the debates, then he and Lawrence Lessig could part together? > > https://en.wikipedia.org/wiki/Lawrence_Lessig_presidential_campaign,_2016 > > In fact the main stream political parties are so samey these days, > Trump and Lessig probably have more in common with each other than > with either of the two main parties!? Wow. You just haven't the faintest idea what you're talking about, do you. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From me at benmezger.com Fri Dec 11 04:21:31 2015 From: me at benmezger.com (Ben Mezger) Date: Fri, 11 Dec 2015 10:21:31 -0200 Subject: Satoshi and family could be killed if found Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 http://www.metzdowd.com/pipermail/cryptography/2015-December/027480.html - -- Sent from my Android device with K-9 Mail. Please excuse my brevity. -----BEGIN PGP SIGNATURE----- iQI7BAEBCgAlHhxCZW4gTWV6Z2VyIDxtZUBiZW5tZXpnZXIuY29tPgUCVmq/vAAK CRB6IpzzRss44t33D/9Zn2Qm5Go5Pj+XRDESunFVpNOYUC2VI4nf+pS/XfB4q0q+ eBhMDS7K333iSXtHvoVxvN01JACZJdZfjBNvJx8eJXppd70/rp5DpaXveWdXz5Uf z8xt9ubO2+P2TulsxTp/f0i2O6ZIhmBbTt1hdVpgzoHv3xE/SRPJJtiogcyNc44n kGBD/6CbYmz5Mz0t4CBft1gXWY6pQluQ1+Td8Fah92GyE7rQ9Nnr71xOgdkRKXGe yy5PBPrw4vyfMd1BklPaiJJWM175NnB+wxk/myK3DGjVb3NVYx6y4xP7mfVNx1Nl gzztwHtC+JXdwF3vSFgjpUt3hTvof6FLHwD25JaHigE5ixpU6oq4LjXZBku/H6+b SaalE/TEoKnhnFwEAEEibf3mo9+TUupHBSBZchv1FT/ZdqzEPfAYdckklZnmFASL JGHwAxq14F+N6lW6M//dabwhE9UAN64wWDMEvGHUZz3bOE6ZiBMob1NJBw10kWm4 2lR6iuVUQ+s5kzNrDuCx+yGESJS2ucfzZI+cgMYgcLXpBEQ7Sa3HF8AZIUE+lgRo 0pabeurwiXA9KYpoaZ3tWiFd1o2jESa52DJrrfZx1SW5OrJEFOBB2UROl6dNM2ap 69YzRAhDZzxBTJpJJvKBXZpOeXDYOxL9R3FM7adQYmCgpmLC8wGsRlHf1b10GQ== =Eyq6 -----END PGP SIGNATURE----- From shelley at misanthropia.org Fri Dec 11 11:49:04 2015 From: shelley at misanthropia.org (Shelley) Date: Fri, 11 Dec 2015 11:49:04 -0800 Subject: Assange believes too late for any pervasive privacy In-Reply-To: <566B0FCF.7060106@pilobilus.net> References: <566AFFB6.1090300@pilobilus.net> <20151211171317.9D670C016F0@frontend1.nyi.internal> <566B0FCF.7060106@pilobilus.net> Message-ID: <20151211194848.ADA1EC016DA@frontend1.nyi.internal> On December 11, 2015 10:10:21 AM Steve Kinney wrote: > The power to give and withhold permission for others to see you > varies with circumstances. > you are "in the game" whether you > want to be or not; True, unfortunately. >the only alternative is to isolate yourself > from resources native to the privacy-hostile environment. False. Offense is often one of the best defenses. Just one example: the data scraping and collating scum like Intellius and their ilk, from whose talons we cannot escape. In such cases, it is better to pollute their data pool with garbage so it is of little value to them and we retain privacy by obfuscation. I've made sure that Intellius alone has three different profiles on me including varying ages, birthdates and backgrounds, and good luck to the marketing and profiling scum in discerning which - if any - is the real one. >The practical > advantages of participating in the networked world far outweigh > the perceived and, possibly, the actual harm from "loss of > privacy." Only a few atypical individuals will be able to manage > their affairs so that the advantages of "strong privacy > protections" outweigh the costs of compensating for lost access to > resources. > I find absolutely no benefit in allowing Fuckerberg's empire of suck to acquire my data, so I prevent it in every way possible. I don't use Google anything, but I know my emails get indexed and data-raped when I'm forced to correspond with people who use their "free" gmail. There is no way to avoid every avenue of privacy violation, but it is possible to minimize it and not make it easy for the bastards. >Those Old Farts were early adopters, because > they happened to take an unnatural interest in computers. So a > large faction among them are capable of understanding and > implementing network security and making rational decisions about > disclosures of their activities and data to 3rd parties. > Yes, and we know there is no closing the door after the data has gotten out so it is best to restrict and control access as best we can. > These folks, and the few /honest/ professionals in related fields, > are the only thing that keeps the Internet from clogging up with > shit from end to end and falling apart. Well, at least we have > mostly kept it from falling apart. We're not doing a very good job, I fear. But I live so much of my life online, (which is why I am fiercely protective of my right to control my PII when I see fit), I'm not going to acquiescence to zero-privacy as the norm just because "everyone else is doing it." There are billions of people on this planet who believe in nonsensical things; it surely doesn't make them right. -S From admin at pilobilus.net Fri Dec 11 08:54:14 2015 From: admin at pilobilus.net (Steve Kinney) Date: Fri, 11 Dec 2015 11:54:14 -0500 Subject: Assange believes too late for any pervasive privacy In-Reply-To: References: Message-ID: <566AFFB6.1090300@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 12/11/2015 03:38 AM, Zenaan Harkness wrote: > Game for privacy is gone, mass surveillance is here to stay – > Assange on #RT10 panel [ ... ] > while some experts can achieve practical privacy for themselves > for limited number of operations… it’s gone for the rest of > the populations,” the WikiLeaks founder stressed. [ ... ] > The WikiLeaks founder reminded the panel of the historic > examples of East Germany and other societies, in which people > adapted to living under the scrutiny of the authorities. [ etc. ] Well yeah, he's only stating the obvious: Pervasive networked computing is here, it's growing, and historical concepts of 'privacy' are just that, historical. But in the context of the show, his comments focus on the archaic paradigm of "privacy" as something that exists naturally and is violated when State actors pry into the private affairs of individuals. That's a narrow viewpoint, distorted by an increasingly irrelevant context. Today, State actors are only one group of "privacy violators," alongside commercial interests and the general public itself. The disadvantages of a world with little or no privacy are counterbalanced by significant advantages that are inherent in a world of "networked everything." The Panopticon is a prison where the guards can watch the inmates but the inmates can not watch the guards. The Internet is a prison where the inmates can watch each other, and the guards: The guards do have a better view, but their powers of observation are no longer exclusive. Secrets that could once be kept until after their exposure could make no difference are now breaking open before the protected operations are completed: http://peterswire.net/wp-content/uploads/SHB.cambridge.061014.pptx CPunks will recall Cryptome's ongoing Eyeball series, and of course, the Total Poindexter Awareness project: Early examples of open source intelligence collection /and/ reporting directed against the wardens of our modern Panopticon. Today, projects like CopWatch are "watching the watchers" and reporting to an audience large enough to inconvenience our Panopticon's owners. In the last few days we have seen random nobodies manage to save and re-publish multiple eyewitness accounts of a staged 'terrorist' attack, directly contradicting the propaganda narrative the event was staged to support. The availability of more and better political intelligence formerly concealed from the public is growing exponentially. This is one of several drivers of fundamental change in large scale power relationships that is causing a panic among our present rulers. The United States is preparing to put down major civil uprisings inside its own borders, again in full view of interested members of the general public. I sometimes compare paranoid reactions to the "loss of privacy" in the networked world to mental telepathy: The prospect of someone reading your mind is frightening, until it turns out that your own deeply held secrets are not special or unusual to a telepath who has already "seen it all" and has /far/ worse examples to compare your most heinous and embarrassing inner thoughts and motivations to. Old Farts have major problems wrapping their heads around the concept that a world where privacy is shrinking fast and expected to nearly disappear is a Good Thing. People who grew up with the Interet, not so much. http://www.youtube.com/watch?v=6c-RbGZBnBI :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWav+0AAoJEDZ0Gg87KR0LuTAP/j7Lna3XmlVsVbPxnX8pSu/K nyud+fsJspwH1DN7C0PI/I9TtN6y0RoSoyCa4DIAkYU1bjgrrqeUj95veI4w40NM K1OuXZp4VlLuia/fKZ1LAZEGlQo1y9HkDAEaTokSMr1HY3JODl8aGjYYIwH9xBBo xEDKqeztEB/tR3lPKRuMU2c2D5y9tmst47C+/8cQuW996A2ZlhDNaJuctZSI+sPT d3c4YBwed6g6RQFiDWGZZpN96jTQGVPG7K6wRRFoTu5HfIbh2JVMO6ZTuNCiaNuG WCduTRgGpZ0XdYZ3d5q82WDEjNU/1EPriabPPBV8ZWRcXjro2kWVho5FuvkcEgpV PVkxEq5W+hzUlb8yTJaXQpVAV6vbnQF/Fex/DQ0SXiwHk4VFUE4YuBs+qJ9+azwt rgahJzvvsRadmSVkZUArciNV0l7OVlMkdfUm6umr0nIbdxHzF8IBF5VedtECkiEy 2H9vGB3qxewX2kyvc4oPqWL/EPDn8XvaPXTJOIE0SpOvPAQAIC7Xv8FpHNIS+LyT 5EjAXQ7T+KvFCDmfduBy1Uuiwo6gwxU8h/oQJPw6mswaATZvH410ffUZsDYwRgE7 1n23MkohySJ2ZYXABifKeEfkvcnNj4dYMCumiNrW076Ms1WobkpcMHLKh1VqsdD8 iGALaZ3rJ3VxVP2Ipjfy =40o9 -----END PGP SIGNATURE----- From admin at pilobilus.net Fri Dec 11 10:02:55 2015 From: admin at pilobilus.net (Steve Kinney) Date: Fri, 11 Dec 2015 13:02:55 -0500 Subject: Assange believes too late for any pervasive privacy In-Reply-To: <20151211171317.9D670C016F0@frontend1.nyi.internal> References: <566AFFB6.1090300@pilobilus.net> <20151211171317.9D670C016F0@frontend1.nyi.internal> Message-ID: <566B0FCF.7060106@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 12/11/2015 12:13 PM, Shelley wrote: > On December 11, 2015 9:00:54 AM Steve Kinney > wrote: > > >> I sometimes compare paranoid reactions to the "loss of >> privacy" in the networked world to mental telepathy: The >> prospect of someone reading your mind is frightening, until >> it turns out that your own deeply held secrets are not >> special or unusual to a telepath who has already "seen it >> all" and has /far/ worse examples to compare your most >> heinous and embarrassing inner thoughts and motivations to. > No. Just because my private thoughts may not be considered > special or out of the ordinary does not mean you or anyone else > has the right to know what they are unless I give you > permission. The power to give and withhold permission for others to see you varies with circumstances. In an environment where this power is inherently weak or intermittent, you are "in the game" whether you want to be or not; the only alternative is to isolate yourself from resources native to the privacy-hostile environment. Most of the participants in the privacy-hostile networked world consider the resources found there indispensable. However, to whatever extent you participate in an environment where arbitrary enforcement of personal decisions about "privacy" is often impossible, a purely defensive game is most likely a long term losing strategy for society at large: The practical advantages of participating in the networked world far outweigh the perceived and, possibly, the actual harm from "loss of privacy." Only a few atypical individuals will be able to manage their affairs so that the advantages of "strong privacy protections" outweigh the costs of compensating for lost access to resources. > Which leads to: > >> Old Farts have major problems wrapping their heads around >> the concept that a world where privacy is shrinking fast and >> expected to nearly disappear is a Good Thing. People who >> grew up with the Interet, not so much. >> > > People who grew up with the Internet... Do you mean the vapid > idiots who willingly post every detail of their entire fucking > lives on Failbook and fart out every insignificant, nonsensical > thought in 140 character-blocks of uselessness? The vapid idiots don't interest me, except perhaps as a study in herd behavior. (I find that VERY interesting...) I mean everybody: The morons you mention; the clever ones who pump social and economic iron with their lookityboxes and 23 WiFi enabled devices in arm's reach; the smart ones who use the Internet as a University, storefront and intelligence collection asset; the brilliant batshit crazy ones whose most contagious ideas occasionally spread like prairie brushfires. > We, the Old Farts who helped build the place, wish you'd clean > your room and take better care of things, or we'll be changing > the locks. Tell me about it: Those Old Farts were early adopters, because they happened to take an unnatural interest in computers. So a large faction among them are capable of understanding and implementing network security and making rational decisions about disclosures of their activities and data to 3rd parties. These folks, and the few /honest/ professionals in related fields, are the only thing that keeps the Internet from clogging up with shit from end to end and falling apart. Well, at least we have mostly kept it from falling apart. :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWaw/OAAoJEDZ0Gg87KR0LOx8P/jEHWGDCUXcSxrKMSCP9VGyN mjQd1onnYce/y7rh2bF34rTj48XjBVyIjTk1VvU1NCgf7AUNC0b9m2KbzyUtAkDs G1WWcbDRUGBDUFzFlRDJY1OFZBMzjgm+TDSxwaNwWfUNgn6YZmIZFky03HtJL4fY zAyykfVeKm7I8S8m8EX5WzNL2qLmXg1x93kt+Kool4V4oQcZ2X7PxlWkwbf5n3jq i/VlE8mkFURuv6Oe8tSnHSt0QV2StuGD2il8sBwi0kl7xq7HndP3WXbMFMXGcmCn uQ+CSzE1+AtP77aSARMrP8rzQczeUjf1ukkY7RaVrd+2bHSyzxW2AzybOFu4WyYd R8kVo1aHKJhdJb+rdtEOwhoyv2ABlphZWdhjP3YUchzy5ppYBTc1NqK7O5Im1VkH ZqkHL4SysGKtrjnDEiQIGrESmUyigDH30zRoDHGIXGr4oQ2849aRWPuMK+c5iuuc vFd4iGhRgtVih6w04On+0V9UnOehiV2IggoUPBHARn7KuYALq7aXWtVD5+KwsbCF zWJtGfnT9M8EUfSywOGf+5B4+Vafe3D5X9ZdkpIdk2Wvsy5kHHMImJqagSyy5SBK ljpFS2K1o6beahezyRNYX6MMgC2IfmCvYsPkDtSYbtfUQiFKr3nXpPCMn72eZG+B RPQSmZHjXwgxQtHNMpaV =9EqG -----END PGP SIGNATURE----- From juan.g71 at gmail.com Fri Dec 11 09:58:52 2015 From: juan.g71 at gmail.com (juan) Date: Fri, 11 Dec 2015 14:58:52 -0300 Subject: Satoshi and family could be killed if found In-Reply-To: References: Message-ID: <566b0d0b.75698c0a.c09d4.ffffa3d1@mx.google.com> On Fri, 11 Dec 2015 10:21:31 -0200 Ben Mezger wrote: >http://www.metzdowd.com/pipermail/cryptography/2015-December/027480.html >Satoshi and family could be killed Of course. Like anybody else. >if found Killing people that can't be found is not easy. "I expect that s/he will never spend those coins. Wasn't in it to get rich. I think s/he was in it because s/he was angry at "the system" for being rigged and corrupt and didn't personally give a crap about the wealth." Hundreds or even thousands of millions of dollars can buy A LOT of advertising against that same corrupt system. If he wasn't in it for the money, then it would make (a good deal of) sense for him to spend or 'reinvest' that money to get closer to his objective. What can be seen though is that he is hoarding the btcs. Unless you believe that he lost the keys. Which is an almost absurd belief I daresay. > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > http://www.metzdowd.com/pipermail/cryptography/2015-December/027480.html > - -- > Sent from my Android device with K-9 Mail. Please excuse my brevity. > -----BEGIN PGP SIGNATURE----- > > iQI7BAEBCgAlHhxCZW4gTWV6Z2VyIDxtZUBiZW5tZXpnZXIuY29tPgUCVmq/vAAK > CRB6IpzzRss44t33D/9Zn2Qm5Go5Pj+XRDESunFVpNOYUC2VI4nf+pS/XfB4q0q+ > eBhMDS7K333iSXtHvoVxvN01JACZJdZfjBNvJx8eJXppd70/rp5DpaXveWdXz5Uf > z8xt9ubO2+P2TulsxTp/f0i2O6ZIhmBbTt1hdVpgzoHv3xE/SRPJJtiogcyNc44n > kGBD/6CbYmz5Mz0t4CBft1gXWY6pQluQ1+Td8Fah92GyE7rQ9Nnr71xOgdkRKXGe > yy5PBPrw4vyfMd1BklPaiJJWM175NnB+wxk/myK3DGjVb3NVYx6y4xP7mfVNx1Nl > gzztwHtC+JXdwF3vSFgjpUt3hTvof6FLHwD25JaHigE5ixpU6oq4LjXZBku/H6+b > SaalE/TEoKnhnFwEAEEibf3mo9+TUupHBSBZchv1FT/ZdqzEPfAYdckklZnmFASL > JGHwAxq14F+N6lW6M//dabwhE9UAN64wWDMEvGHUZz3bOE6ZiBMob1NJBw10kWm4 > 2lR6iuVUQ+s5kzNrDuCx+yGESJS2ucfzZI+cgMYgcLXpBEQ7Sa3HF8AZIUE+lgRo > 0pabeurwiXA9KYpoaZ3tWiFd1o2jESa52DJrrfZx1SW5OrJEFOBB2UROl6dNM2ap > 69YzRAhDZzxBTJpJJvKBXZpOeXDYOxL9R3FM7adQYmCgpmLC8wGsRlHf1b10GQ== > =Eyq6 > -----END PGP SIGNATURE----- > From juan.g71 at gmail.com Fri Dec 11 11:25:20 2015 From: juan.g71 at gmail.com (juan) Date: Fri, 11 Dec 2015 16:25:20 -0300 Subject: Assange believes too late for any pervasive privacy In-Reply-To: <566AFFB6.1090300@pilobilus.net> References: <566AFFB6.1090300@pilobilus.net> Message-ID: <566b2151.f2648c0a.b5827.ffffac99@mx.google.com> On Fri, 11 Dec 2015 11:54:14 -0500 Steve Kinney wrote: > The > disadvantages of a world with little or no privacy are > counterbalanced by significant advantages that are inherent in a > world of "networked everything." ...such as? > > The Panopticon is a prison where the guards can watch the inmates > but the inmates can not watch the guards. The Internet is a > prison where the inmates can watch each other, Last time I checked, the 'internet' is a bunch of servers controlled by google and the pentagon and I don't happen to have the password(s). Please, any hacker out there, post the password(s) so I we can watch the guards. Thank you very much. > and the guards: > The guards do have a better view, but their powers of observation > are no longer exclusive. ...yeah, 'better view' is somewhat more accurate. > > Secrets that could once be kept until after their exposure could > make no difference are now breaking open before the protected > operations are completed: > > http://peterswire.net/wp-content/uploads/SHB.cambridge.061014.pptx sorry, not bothering with pptx, whatever that is. > > CPunks will recall Cryptome's ongoing Eyeball series, and of > course, the Total Poindexter Awareness project: Early examples of > open source intelligence collection /and/ reporting directed > against the wardens of our modern Panopticon. Today, projects > like CopWatch are "watching the watchers" and reporting to an > audience large enough to inconvenience our Panopticon's owners. > In the last few days we have seen random nobodies manage to save > and re-publish multiple eyewitness accounts of a staged > 'terrorist' attack, directly contradicting the propaganda > narrative the event was staged to support. > > The availability of more and better political intelligence > formerly concealed from the public is growing exponentially. Sorry, that's exponential bullshit. > This > is one of several drivers of fundamental change in large scale > power relationships that is causing a panic among our present > rulers. The United States is preparing to put down major civil > uprisings inside its own borders, I'm guessint that the government having full access to all communications will come handy, don't you think? > again in full view of interested > members of the general public. > > I sometimes compare paranoid reactions to the "loss of privacy" in > the networked world to mental telepathy: The prospect of someone > reading your mind is frightening, until it turns out that your own > deeply held secrets are not special or unusual to a telepath who > has already "seen it all" and has /far/ worse examples to compare > your most heinous and embarrassing inner thoughts and motivations > to. Sorry, that's not the point at all? The problem with people reading your 'private' mail or your mind is that it that it enables them to attack you way more efficiently. We are not talking about your neighbor reading your mail or your mind(none of his business anyway), we are talking about the sickest nazis on the planet doing it. Surely you realize that's a bit problematic? > > Old Farts have major problems wrapping their heads around the > concept that a world where privacy is shrinking fast and expected > to nearly disappear is a Good Thing. How old are you? > People who grew up with the > Interet, not so much. > You want more age-based 'analysis'? The old farts you mentioned have raised generations of clueless young retards. > http://www.youtube.com/watch?v=6c-RbGZBnBI > > :o) > > > > > > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1 > > iQIcBAEBAgAGBQJWav+0AAoJEDZ0Gg87KR0LuTAP/j7Lna3XmlVsVbPxnX8pSu/K > nyud+fsJspwH1DN7C0PI/I9TtN6y0RoSoyCa4DIAkYU1bjgrrqeUj95veI4w40NM > K1OuXZp4VlLuia/fKZ1LAZEGlQo1y9HkDAEaTokSMr1HY3JODl8aGjYYIwH9xBBo > xEDKqeztEB/tR3lPKRuMU2c2D5y9tmst47C+/8cQuW996A2ZlhDNaJuctZSI+sPT > d3c4YBwed6g6RQFiDWGZZpN96jTQGVPG7K6wRRFoTu5HfIbh2JVMO6ZTuNCiaNuG > WCduTRgGpZ0XdYZ3d5q82WDEjNU/1EPriabPPBV8ZWRcXjro2kWVho5FuvkcEgpV > PVkxEq5W+hzUlb8yTJaXQpVAV6vbnQF/Fex/DQ0SXiwHk4VFUE4YuBs+qJ9+azwt > rgahJzvvsRadmSVkZUArciNV0l7OVlMkdfUm6umr0nIbdxHzF8IBF5VedtECkiEy > 2H9vGB3qxewX2kyvc4oPqWL/EPDn8XvaPXTJOIE0SpOvPAQAIC7Xv8FpHNIS+LyT > 5EjAXQ7T+KvFCDmfduBy1Uuiwo6gwxU8h/oQJPw6mswaATZvH410ffUZsDYwRgE7 > 1n23MkohySJ2ZYXABifKeEfkvcnNj4dYMCumiNrW076Ms1WobkpcMHLKh1VqsdD8 > iGALaZ3rJ3VxVP2Ipjfy > =40o9 > -----END PGP SIGNATURE----- From juan.g71 at gmail.com Fri Dec 11 11:39:49 2015 From: juan.g71 at gmail.com (juan) Date: Fri, 11 Dec 2015 16:39:49 -0300 Subject: Assange believes too late for any pervasive privacy In-Reply-To: References: Message-ID: <566b24b6.45dd8c0a.42581.ffffabd1@mx.google.com> On Fri, 11 Dec 2015 08:38:47 +0000 Zenaan Harkness wrote: > Feels like a sell out. I suspect he feels he's being pragmatic. > > https://www.rt.com/news/325524-assange-privacy-rt-10/ > > Privacy is among values “that simply are unsustainable… in the face of > the reality of technological change; the reality of the deep state > with a military-industrial complex and the reality of Islamic > terrorism, which is legitimizing that sector in a way that it’s > behaving,” he stressed. Some notes : RT is a propaganda organization working for the russian state. However, their 'anti western' propaganda isn't ordinary propaganda because what they say (about 'the west') is usually true. RT propaganda takes the form of libertarian criticism (with the caveat of course that it's directed against 'western' states...never against the russian state) I haven't checked the whole interview, but going by the above quote, Assange seems to be forgetting his libertarian (or civil libertarian, whatever) leaning and instead parroting the pentagon/kremlin line on 'islamic terrorism'. But in reality, "the reality of Islamic terrorism," is close to the reality of the bogeyman. Considering the extent of western crimes and imperialism, there should be a lot more 'terrorism' coming from the victims. Oddly enough, there isn't. So one can either believe that captain americunt is saving the universe...or else, the terrorist don't really exist. Except of course as false flag ops. From sam at sjsqd.com Fri Dec 11 04:52:38 2015 From: sam at sjsqd.com (Sam Johnston) Date: Fri, 11 Dec 2015 16:52:38 +0400 Subject: Video lecture delivered by Craigh Wright of him explaining his Tulip supercomputer Message-ID: https://www.youtube.com/watch?v=cfoFFyypJxs -- sjsqd 💻 sjsqd.com ☺️ https://about.me/sjsqd 📮 https://twitter.com/sjsqd 📁 imdb.me/samjohnston 🔐 keybase.io/samjohnston 🔐 4EBE 18C0 E0E3 A874 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 744 bytes Desc: not available URL: From admin at pilobilus.net Fri Dec 11 15:55:26 2015 From: admin at pilobilus.net (Steve Kinney) Date: Fri, 11 Dec 2015 18:55:26 -0500 Subject: Assange believes too late for any pervasive privacy In-Reply-To: <566b2151.f2648c0a.b5827.ffffac99@mx.google.com> References: <566AFFB6.1090300@pilobilus.net> <566b2151.f2648c0a.b5827.ffffac99@mx.google.com> Message-ID: <566B626E.4060203@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 12/11/2015 02:25 PM, juan wrote: > On Fri, 11 Dec 2015 11:54:14 -0500 Steve Kinney > wrote: > >> The disadvantages of a world with little or no privacy are >> counterbalanced by significant advantages that are inherent >> in a world of "networked everything." > > ...such as? Oh, a few little things... Job hunting, marketing one's products and services, comparison shopping, commercial and educational research, distributing propaganda, conventional and radical political organizing, 24/7 access to a library that dwarfs all previous ones in history combined... A highly productive "office worker's desk" that fits in a small tote bag has its uses as well. >> The Panopticon is a prison where the guards can watch the >> inmates but the inmates can not watch the guards. The >> Internet is a prison where the inmates can watch each other, >> > > Last time I checked, the 'internet' is a bunch of servers > controlled by google and the pentagon and I don't happen to > have the password(s). > > Please, any hacker out there, post the password(s) so I we can > watch the guards. Thank you very much. Just for starters check out CopWatch, referenced in my earlier post. We might also factor in a half dozen or so investigative journalism outlets, document distribution sites like Cryptome and Public Intelligence, one's news aggregators of choice, access to foreign press outlets, various spook watching sites, the mass of raw data contributed by Manning, Snowden et al... The Internet is billions of people, interacting through the world's first many-to-many communications medium. The "Web 2.0" buzzword denotes a real thing: Millions of users as content creators and content promoters, the appearance (as predicted) of swarming behaviors on the networks with social and economic impacts in the real world, smart mobs, pathologically stupid mobs, etc. etc. >> Secrets that could once be kept until after their exposure >> could make no difference are now breaking open before the >> protected operations are completed: >> >> http://peterswire.net/wp-content/uploads/SHB.cambridge.061014.ppt x > >> > sorry, not bothering with pptx, whatever that is. Micro$oft's latest and greatest incarnation of PowerPoint. Works in Open / Libre Office, and I can't be bothered to convert the file to ASCII art for security purposes... >> The availability of more and better political intelligence >> formerly concealed from the public is growing exponentially. >> > > > Sorry, that's exponential bullshit. - From this I can only you don't take any interest in politics, or your definition of the word is very different from mine. or that you just don't use the Internet much. >> This is one of several drivers of fundamental change in large >> scale power relationships that is causing a panic among our >> present rulers. The United States is preparing to put down >> major civil uprisings inside its own borders, > > > I'm guessint that the government having full access to all > communications will come handy, don't you think? Yes it will. But will that be a sufficient advantage to compensate for the ones our rulers lost when the Internet became too important to commerce to "just turn it off"? Little Brother is watching Them, and there are enough /clever/ Little Brothers (and Sisters) out there looking to pull Big Brother's pants down that they are becoming a real world problem. >> again in full view of interested members of the general >> public. >> >> I sometimes compare paranoid reactions to the "loss of >> privacy" in the networked world to mental telepathy: The >> prospect of someone reading your mind is frightening, until >> it turns out that your own deeply held secrets are not >> special or unusual to a telepath who has already "seen it >> all" and has /far/ worse examples to compare your most >> heinous and embarrassing inner thoughts and motivations to. > > Sorry, that's not the point at all? The problem with people > reading your 'private' mail or your mind is that it that it > enables them to attack you way more efficiently. > > We are not talking about your neighbor reading your mail or > your mind(none of his business anyway), we are talking about > the sickest nazis on the planet doing it. > > Surely you realize that's a bit problematic? Yes, it gives the opposition a potentially useful tool. As there are FAR too many dissidents of various types wandering around loose for it to be possible to personally persecute more than a tiny fraction of them, the main value of mass surveillance is for aggregate content analysis, social network mapping, and predictive modelling of large scale social behavior. This may be useful for targeting and calibration of propaganda, and advance deployment of physical assets to counter populist political actions. But so far, Big Brother seems to suck at that kind of work... Do the new surveillance capabilities the Internet gives military and police agencies outweigh the educational, intelligence, propaganda and organizational capabilities the Internet has given to radicals of all stripes? That remains to be seen, but I am fairly sure that obsessive attention to "privacy" shifts the balance of power somewhat toward those whose whole job is to maintain the status quo. Of course, any political organizer with any common sense knows well enough when to keep some specific information OFF the networks and out of the hands of uncommitted "hang arounds" at public meetings. >> Old Farts have major problems wrapping their heads around >> the concept that a world where privacy is shrinking fast and >> expected to nearly disappear is a Good Thing. > > > How old are you? Very old. Sometimes I wonder, "when did I get so damned old?" I watched Mercury and Gemini launches from my back yard. >> People who grew up with the Interet, not so much. >> > > You want more age-based 'analysis'? The old farts you > mentioned have raised generations of clueless young retards. I didn't start the "age based" comments, but srsly, it doesn't take THAT much effort to find plenty of clever young radicals to play with IRL - if you're OK with exposing your identity as a "political dissident" on teh interwebs. :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWa2JtAAoJEDZ0Gg87KR0LyFoQAK4hO/ko/nRojRE2m/n7ygSh h4kIEr0uMYsrwpDtE5M6OEkvQZZWZtk8jKj+0Oh4kO8GFWC5nvnbUjYor9HwPHhO PlhdIibMzrqYRfRelEduQt9QkYdhezxmwSUVLailzhEju8wVKRJ4rF9rN4qhL77T k5cqfrnfM2ILQesi/Ey8O7+vNjZIXXjLuERgn0Z/+aGgsA8VdIupx5T+whD6YtiD 2Fm62LCG7H4xdbivtuvYCa5yG2kNRU+zjjY5wMxdY2gMEBObD6KbA7YST3DxFdFi bqFv5LpjUQYitQ7Bq64ts4j5Hwg5+F2ZnGQt9D4XkUSPIM0Am1W/4jj1bqoBQxv2 p1tI+T1XLlPkIla4BIL7GRishlLzAxQGzkezeWdjfC3Z76yo0D1EZkabAy8x0WJv /g7scAynmMKD+zGV0kXyhv9nXmajReYe6cwEPIa8ZMnN7cqQiMLlt7tJHBLwG3pg A/d5xrJqhldAayjkxTx1F9HMLqapYFEVEPPH0gs308iUBTP2iWBqxO7LSByCbBU7 N+CBL3UKSl84G3XcQ4hyDqEZxD5if1Yo1y5jjmodF/NRhwuahf3AqhnIA87Qn+B/ o4Fne1yls+uNhM5rdtBHZOwIJaLuAfXE6iDF7X2q7cdTE+uVRfkGgTROTGrI247z fi4+ZbBhgdGMLSYzC/Bl =9n9b -----END PGP SIGNATURE----- From zen at freedbms.net Fri Dec 11 15:06:42 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Fri, 11 Dec 2015 23:06:42 +0000 Subject: Assange believes too late for any pervasive privacy In-Reply-To: <20151211161247.9DACBC016D5@frontend1.nyi.internal> References: <20151211161247.9DACBC016D5@frontend1.nyi.internal> Message-ID: On 12/11/15, Shelley wrote: > I'm not a ter'rist, not doing anything particularly interesting or illegal, > don't really have much I care to hide... and that's exactly why the fucking > government is not allowed to read my email and track my every move. "I don't have to be doing anything wrong to want my privacy." > I refuse. So do I! Beware! We are breaking the first rule of non compliance. What's the first rule of non compliance? Do NOT talk about non compliance! But what's the rule - only want to know how to not comply in a compliant way?! Listen, you don't get it do you - I just gave you the first damn rule. But that sounded like a freedom of speech rule and on the vector of freedom of speech your rule's at a rather distasteful end? Fecwha?! What the fuck are you smoking!?!#! It's a mathema... [!!SLAP!!] [!!POW!!] From juan.g71 at gmail.com Fri Dec 11 19:08:16 2015 From: juan.g71 at gmail.com (juan) Date: Sat, 12 Dec 2015 00:08:16 -0300 Subject: Assange believes too late for any pervasive privacy In-Reply-To: <566B626E.4060203@pilobilus.net> References: <566AFFB6.1090300@pilobilus.net> <566b2151.f2648c0a.b5827.ffffac99@mx.google.com> <566B626E.4060203@pilobilus.net> Message-ID: <566b8dd1.c74c370a.98389.ffffe54a@mx.google.com> On Fri, 11 Dec 2015 18:55:26 -0500 Steve Kinney wrote: > > > On 12/11/2015 02:25 PM, juan wrote: > > On Fri, 11 Dec 2015 11:54:14 -0500 Steve Kinney > > wrote: > > > >> The disadvantages of a world with little or no privacy are > >> counterbalanced by significant advantages that are inherent > >> in a world of "networked everything." > > > > ...such as? > > Oh, a few little things... Job hunting, marketing one's products > and services, comparison shopping, commercial and educational > research, distributing propaganda, conventional and radical > political organizing, 24/7 access to a library that dwarfs all > previous ones in history combined... Oh, OK. Yes, all those things you mention are enhanced by electronic communication networks. And yes, the online library is especially nice. I can't help pointing out though that all the things you mentioned existed before the internet and even before telegraph networks =P Before 'networking', access to libraries was more restricted, true, but the ability for governments to track millions of people in realtime was just a crazy dream - or nightmare. Looks to me that the good changes are more incremental in nature whereas the bad changes are kinda 'revolutionary'. > > A highly productive "office worker's desk" that fits in a small > tote bag has its uses as well. Point taken. > > >> The Panopticon is a prison where the guards can watch the > >> inmates but the inmates can not watch the guards. The > >> Internet is a prison where the inmates can watch each other, > >> > > > > Last time I checked, the 'internet' is a bunch of servers > > controlled by google and the pentagon and I don't happen to > > have the password(s). > > > > Please, any hacker out there, post the password(s) so I we can > > watch the guards. Thank you very much. > > Just for starters check out CopWatch, referenced in my earlier > post. Until a few months ago I had a facebook account and yes, I used to follow copwatch, among other things. As a matter of fact, I've been involved in the political networking you speak of (both online & offline) , for years, mostly in spanish speaking 'libertarian' circles. > We might also factor in a half dozen or so investigative > journalism outlets, document distribution sites like Cryptome and > Public Intelligence, one's news aggregators of choice, access to > foreign press outlets, various spook watching sites, the mass of > raw data contributed by Manning, Snowden et al... > > The Internet is billions of people, interacting through the > world's first many-to-many communications medium. The "Web 2.0" > buzzword denotes a real thing: Yes, I realize that part of the hype actually references real and valuable changes. > >> The availability of more and better political intelligence > >> formerly concealed from the public is growing exponentially. > >> > > > > > > Sorry, that's exponential bullshit. > > - From this I can only you don't take any interest in politics, or > your definition of the word is very different from mine. or that > you just don't use the Internet much. I honestly don't see a radical change in that area. Or else, if 'poltical intelligence' is more common and of better quality, I don't see too many people acting on it. > > >> This is one of several drivers of fundamental change in large > >> scale power relationships that is causing a panic among our > >> present rulers. The United States is preparing to put down > >> major civil uprisings inside its own borders, > > > > > > I'm guessint that the government having full access to all > > communications will come handy, don't you think? > > Yes it will. But will that be a sufficient advantage to > compensate for the ones our rulers lost when the Internet became > too important to commerce to "just turn it off"? I don't think they plan to turn it off. That's the thing. Considering how computers work, it's possible or even easy for them to, say, sabotage or control personal communications while 'freely' allowing people to buy stuff off amazon. > Little Brother > is watching Them, and there are enough /clever/ Little Brothers > (and Sisters) out there looking to pull Big Brother's pants down > that they are becoming a real world problem. Wait and see I guess. > > We are not talking about your neighbor reading your mail or > > your mind(none of his business anyway), we are talking about > > the sickest nazis on the planet doing it. > > > > Surely you realize that's a bit problematic? > > Yes, it gives the opposition a potentially useful tool. As there > are FAR too many dissidents of various types wandering around > loose for it to be possible to personally persecute more than a > tiny fraction of them, Yes, you do have a point there, but it's not as if mass persecution of dissidents is impossible either. Just look at the US 'war on drugs'. > the main value of mass surveillance is for > aggregate content analysis, social network mapping, and predictive > modelling of large scale social behavior. None of which is exactly harmless... > This may be useful for > targeting and calibration of propaganda, and advance deployment of > physical assets to counter populist political actions. But so > far, Big Brother seems to suck at that kind of work... I don't think there's been a real 'on the field' test yet. > > Do the new surveillance capabilities the Internet gives military > and police agencies outweigh the educational, intelligence, > propaganda and organizational capabilities the Internet has given > to radicals of all stripes? That remains to be seen, Well, that I can agree with. I obviously am not too optimistic regarding future outcomes, at least as far as the near future is concerned. > but I am > fairly sure that obsessive attention to "privacy" shifts the > balance of power somewhat toward those whose whole job is to > maintain the status quo. That may be true. > >> Old Farts have major problems wrapping their heads around > >> the concept that a world where privacy is shrinking fast and > >> expected to nearly disappear is a Good Thing. > > > > > > How old are you? > > Very old. Sometimes I wonder, "when did I get so damned old?" I > watched Mercury and Gemini launches from my back yard. Well, at 44 I'm not exactly young either =P. Anyway, I don't think the different views have much to do with age. Yes, young people on 'social networks' will post 'private' pictures for all the world to see, but I think even them have secrets they don't want to share. > > >> People who grew up with the Interet, not so much. > >> > > > > You want more age-based 'analysis'? The old farts you > > mentioned have raised generations of clueless young retards. > > I didn't start the "age based" comments, but srsly, it doesn't > take THAT much effort to find plenty of clever young radicals to > play with IRL - I don't think there are many radicals around here, either young or old =/ Maybe I should move... if you're OK with exposing your identity as a > "political dissident" on teh interwebs. I kinda suspect I already did =P > :o) > > > > > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1 > > iQIcBAEBAgAGBQJWa2JtAAoJEDZ0Gg87KR0LyFoQAK4hO/ko/nRojRE2m/n7ygSh > h4kIEr0uMYsrwpDtE5M6OEkvQZZWZtk8jKj+0Oh4kO8GFWC5nvnbUjYor9HwPHhO > PlhdIibMzrqYRfRelEduQt9QkYdhezxmwSUVLailzhEju8wVKRJ4rF9rN4qhL77T > k5cqfrnfM2ILQesi/Ey8O7+vNjZIXXjLuERgn0Z/+aGgsA8VdIupx5T+whD6YtiD > 2Fm62LCG7H4xdbivtuvYCa5yG2kNRU+zjjY5wMxdY2gMEBObD6KbA7YST3DxFdFi > bqFv5LpjUQYitQ7Bq64ts4j5Hwg5+F2ZnGQt9D4XkUSPIM0Am1W/4jj1bqoBQxv2 > p1tI+T1XLlPkIla4BIL7GRishlLzAxQGzkezeWdjfC3Z76yo0D1EZkabAy8x0WJv > /g7scAynmMKD+zGV0kXyhv9nXmajReYe6cwEPIa8ZMnN7cqQiMLlt7tJHBLwG3pg > A/d5xrJqhldAayjkxTx1F9HMLqapYFEVEPPH0gs308iUBTP2iWBqxO7LSByCbBU7 > N+CBL3UKSl84G3XcQ4hyDqEZxD5if1Yo1y5jjmodF/NRhwuahf3AqhnIA87Qn+B/ > o4Fne1yls+uNhM5rdtBHZOwIJaLuAfXE6iDF7X2q7cdTE+uVRfkGgTROTGrI247z > fi4+ZbBhgdGMLSYzC/Bl > =9n9b > -----END PGP SIGNATURE----- From coderman at gmail.com Sat Dec 12 03:19:15 2015 From: coderman at gmail.com (coderman) Date: Sat, 12 Dec 2015 03:19:15 -0800 Subject: surveillance side effects Message-ID: this one time a tap was placed on a residential fiber line, however the tap was routing based which identified the sudden latency increase, as all paths now went on a hairpin back east before reaching intended destination. yesterday another new side effect by chance: wife was sexting and MMS delayed; finally received. receiver noticed sender was not in doubt, but origin number got the interdiction point rather than original. (!!!) so if you suddenly see 917.506.xxxx in your MMS origin, that out of state indicator is scrutiny of the intervention variety - not just observation - time for onions only! :P See also - https://www.telcodata.us/view-switch-detail-by-clli?clli=NYCMNY50X6X best regards, From coderman at gmail.com Sat Dec 12 03:25:04 2015 From: coderman at gmail.com (coderman) Date: Sat, 12 Dec 2015 03:25:04 -0800 Subject: "Octopus Not So Great!" Message-ID: by @mollycrabapple -------------- next part -------------- A non-text attachment was scrubbed... Name: octopus-not-so-great.jpg Type: image/jpeg Size: 365356 bytes Desc: not available URL: From zen at freedbms.net Fri Dec 11 19:44:17 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Sat, 12 Dec 2015 03:44:17 +0000 Subject: Satoshi Hacked/Leaked/Hoaxed And Outed In-Reply-To: References: <5667d829.742a8c0a.1f808.ffffe5d2@mx.google.com> <566854FB.5090402@riseup.net> <56689fbe.232c8c0a.74155.5de1@mx.google.com> Message-ID: On 12/10/15, coderman wrote: > On Wed, Dec 9, 2015 at 4:50 PM, Zenaan Harkness wrote: >> ... >> Now to read Wikipedia's Bakunin summary... >> https://en.wikipedia.org/wiki/Mikhail_Bakunin > > "Bakunin's increasing radicalism – including staunch opposition to > imperialism in east and central Europe by Russia and other powers – > changed his life, putting an end to hopes of a professorial career." > > tragedy or salvation? :) :) > P.S. others for your edification: > - https://en.wikipedia.org/wiki/Voltairine_de_Cleyre > - https://en.wikipedia.org/wiki/Marie-Louise_Berneri > - https://en.wikipedia.org/wiki/Elizabeth_Gurley_Flynn > - https://en.wikipedia.org/wiki/Emma_Goldman > - https://en.wikipedia.org/wiki/Lucy_Parsons > - https://en.wikipedia.org/wiki/Mary_Harris_Jones Part way through the Wikipedia Bakunin article now ... thanks for the links. We get plenty of schooling in the West, but not so much education; for me our online library "Wikipedia" although partly flawed, is a huge advantage to those who set upon themselves some concept of education. Impulse learning, yet also sustained learning, or rather learning to the depth of one's choice/ impulse. Thanks again, Z From admin at pilobilus.net Sat Dec 12 09:28:22 2015 From: admin at pilobilus.net (Steve Kinney) Date: Sat, 12 Dec 2015 12:28:22 -0500 Subject: Assange believes too late for any pervasive privacy In-Reply-To: <566b8dd1.c74c370a.98389.ffffe54a@mx.google.com> References: <566AFFB6.1090300@pilobilus.net> <566b2151.f2648c0a.b5827.ffffac99@mx.google.com> <566B626E.4060203@pilobilus.net> <566b8dd1.c74c370a.98389.ffffe54a@mx.google.com> Message-ID: <566C5936.4090201@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 12/11/2015 10:08 PM, juan wrote: >> This may be useful for targeting and calibration of >> propaganda, and advance deployment of physical assets to >> counter populist political actions. But so far, Big Brother >> seems to suck at that kind of work... > > I don't think there's been a real 'on the field' test yet. I don't think network surveillance had much to do with it, but in terms of political warfare 'on the field', I believe I have seen examples recently. Example: When the grand jury verdict clearing the cop who shot Michael Brown was announced, there was a very large but orderly demonstration in downtown Ferguson. We know this because people who were present posted photos and videos as it happened. According to realtime reports posted from the scene, crowd was ordered to disperse then immediately tear gassed. That wasn't the "hot story" covered by the press corps, however. Mass media news outlets reported rioting: USA Today used the headline "Ferguson Burning." But that didn't happen. The only "civil disturbance" was the CW attack on the crowd downtown. The material events referenced by the propaganda narrative were consistent with one or two mobile teams armed with molotovs and M-80 firecrackers leading the TV cameras on a merry chase away from the crowd downtown by simulating gunfire and setting fires: The isolated fires were not associated with disorderly crowds or looting. There were numerous reports of gunfire but no injuries or reports of people seen carrying guns or shooting. The biggest fires were at an auto parts store, and a used car dealership where a row of cars were burned (the owner presumably got the full insured value of some stock that wasn't moving). One police car apparently burned for over an hour, as if prepared in advance to do so in case it took longer than expected for TV news crews to arrive. In this instance, it is very possible that network surveillance enabled our Security Services to determine in advance that there would be a large crowd that night, at a well organized self-policing event unlikely to produce violence or property damage useful to the State's propaganda mission. Anyone could have predicted the crowd, but its orderly behavior was not a likely guess unless the organizers and associated social networking traffic were under surveillance. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWbFk0AAoJEDZ0Gg87KR0L0uQQAKnNcnraEaWwcsea3GiSEg3P w0sz/SakaZ8peoAxRrTB3Rf5j05PytCeQhjlN65aU1F55IZNE750xiDCOmrGDbGx ydjQRnrZT7Ktmgj0+ODfJTRSioQbe2c35DGBUQScPoLNr5MF+Qk450HXOfcOPOtz LFdP+0/fZQ99noqpYu5q4aPyJlWvMUMb/L69+iNIOoA1rcCWSKW6JqmAObBN50GE mriq0PMgS69lTaxNdhFouGqhwvQcXcde8Pdw6gWxTg979NuFnIuk6BQDChbWGvlq Ib8ygpDK/FMzNpg8lIoZswY6Sb/76pqjNyi9/LbUvvqkrkcTUW12LIu1DFq6mdnR RWfU1M1YTQt1AYzzf7WOkdOctol7ezGzbgmma3YgZl+oaGNQPYUuTNrtiOizh53K k1SG/YtFeZOa0lxXL1ki8tWBg0FoLR/i/UqG2yKrXNXjThycQpXLLw09i3eQ6c6H 6iB6aTvUenBBLGgt1otIp8meNlpfrA23IfjOv75pWtq3hNSaf4yjiZs6k92RhIi0 W9v3FGlzRpLTVtkmljaerLZUt2WDdNdHnVKupghELpQMCV+qLmcgQfODHJ1EL5wz ZhhlyepRLfz80bTBHvSYiWrc0dSPYaRSidRMPOYtIlsf10iBSG3uQJfJ8Q7Y5AEH 7vpBRQQZaQCcyWcVJxGJ =oEjP -----END PGP SIGNATURE----- From admin at pilobilus.net Sat Dec 12 09:52:25 2015 From: admin at pilobilus.net (Steve Kinney) Date: Sat, 12 Dec 2015 12:52:25 -0500 Subject: Assange believes too late for any pervasive privacy In-Reply-To: <1851083.N3XvNq979b@lapuntu> References: <566b2151.f2648c0a.b5827.ffffac99@mx.google.com> <566B626E.4060203@pilobilus.net> <1851083.N3XvNq979b@lapuntu> Message-ID: <566C5ED9.4060507@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 12/12/2015 08:22 AM, rysiek wrote: >> Oh, a few little things... Job hunting, marketing one's >> products and services, comparison shopping, commercial and >> educational research, distributing propaganda, conventional >> and radical political organizing, 24/7 access to a library >> that dwarfs all previous ones in history combined... > > Why exactly is that not compatible with privacy? I am doing > quite well without Facebook accout. "Networked anything" does > not have to mean "...and no control over your data". Collection of metadata sufficient to reconstruct all of the above activities in detail is not compatible with privacy. Neither is full take collection triggered by rule sets defining "interesting" behavior, i.e. the use of 'privacy enhancing' technologies, reading about Linux, etc. (per published USG docs that are "generally accepted" as real). You don't have to act like an idiot to lose your "privacy," and relative to State actors it already happened. > You're basically doing both a straw-man (i.e. making it seem as > if privacy supporters want to live in a world without the > Internet), and a false dichotomy (i.e. making it seem as if you > can't have privacy and Internet). Not cool. > > And, more importantly, not true. You can have some semblance of privacy on the Internet, for instance reducing the take of commercial surveillance operations by selectively blocking ad servers and whitelising a limited number of sites to run Javascript in your browser. You can have more by using technologies that are "too hard" or "too inconvenient" for non-specialists to put up with, i.e. TOR, i2p, GPG, etc. Privacy supporters who understand network security, understand that any activity they want to conceal from all surveillance actors must either be conducted off the network, or via "anonymizing technology" that degrades network access to a lesser or greater extent (100% in instances involving two way communication with people who do not know or care about these matters), while being observed and recorded by actors hostile to privacy. If CPunks subscribers don't know that, what chance of 'privacy' does the greater unwashed publick stand? :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWbF7WAAoJEDZ0Gg87KR0LP10QANHkwHKERUcsW0+FcRXraz8k 3h/jomiidZJstHmp6iYvB50k8/qs+FDuzUlvkvkSjx80Y9jRz5olRlYuJPdRWuzq c/Fpl9Ak5y4dSAs1ySrI8MnZwgXuK7kxF5vfVb/E8qFyvtAEXvWWFBXZOIJeA9/a iyUIaXO3adc+cUbuGFUixZbsYUZS1dagqU01BIBH1Um2KVziLR3ntel5xC0B6FRi nxXohUh/orTMPsV2rOBiCIJre77f+8x5LGGiycFULip4WM4pv5zisDXq4NloPtWj ZZXdK+FLBYmTQUrx7fODeUD1NdvRNasOQ/lxZ6VumWt+2MEPDv5aH06YgaSDT7rN CtThTMoe0ANw8igGge5w3UvgsvLMN2tEoYwLZb4dnRkSqy8iXNBVtWOh74sE62cc wODsajIbdmTg+u4m5hCQU+bMgeU17bhDys9ZRhFar2FrmYANZnrElFaSCQ/2rxyl cmNzK/lxWLrKEFv6spiO119ffD/mOtUqPqRXZJqb/RxW/EskCx3vwSx57P6o1wXe xskbaC1n0H/st5iZijFRsz2GJS9/ZZ+MSX99MyXi9XGFPtTS6RSJ7f5MmhVoMbPp j6HHcqovVVSF1KyOLQkHVMbppJbEkzfgrCBAKvp9ODKuqiHIJ1/rFknxMoYq37k7 4iVSG+S5XEwKBXaRooRd =Xy3C -----END PGP SIGNATURE----- From rysiek at hackerspace.pl Sat Dec 12 05:22:28 2015 From: rysiek at hackerspace.pl (rysiek) Date: Sat, 12 Dec 2015 14:22:28 +0100 Subject: Assange believes too late for any pervasive privacy In-Reply-To: <566B626E.4060203@pilobilus.net> References: <566b2151.f2648c0a.b5827.ffffac99@mx.google.com> <566B626E.4060203@pilobilus.net> Message-ID: <1851083.N3XvNq979b@lapuntu> Dnia piątek, 11 grudnia 2015 18:55:26 Steve Kinney pisze: > On 12/11/2015 02:25 PM, juan wrote: > > On Fri, 11 Dec 2015 11:54:14 -0500 Steve Kinney > > > > wrote: > >> The disadvantages of a world with little or no privacy are > >> counterbalanced by significant advantages that are inherent > >> in a world of "networked everything." > > > > ...such as? > > Oh, a few little things... Job hunting, marketing one's products > and services, comparison shopping, commercial and educational > research, distributing propaganda, conventional and radical > political organizing, 24/7 access to a library that dwarfs all > previous ones in history combined... Why exactly is that not compatible with privacy? I am doing quite well without Facebook accout. "Networked anything" does not have to mean "...and no control over your data". You're basically doing both a straw-man (i.e. making it seem as if privacy supporters want to live in a world without the Internet), and a false dichotomy (i.e. making it seem as if you can't have privacy and Internet). Not cool. And, more importantly, not true. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From tpetru at gmail.com Sat Dec 12 10:46:50 2015 From: tpetru at gmail.com (Tomas Overdrive Petru) Date: Sat, 12 Dec 2015 19:46:50 +0100 Subject: Fwd: [ PFIR ] The "Sharing Economy" Is the Problem In-Reply-To: <5668A7B4.2010705@riseup.net> References: <20151209174840.GA16643@vortex.com> <5668A7B4.2010705@riseup.net> Message-ID: <566C6B9A.20105@gmail.com> On 09.12.15 23:14, Rayzer wrote: > The problem with the "Sharing Economy" is that it only shares with other > people involved in that 'economy' and excludes others. That's feudal, > and Feudalist sharing is NOT sharing for the benefit of a whole > community. It's sharing for the benefit of a few. Something feels here like sand in cogwheel... so what? So we have invented we can share our resources, which is positive from social side same as from ecological. Now we should decide if to kill whole idea for everybody, or just create new market, where you can fight to win? Where is bonus of NOT to allow sharing of cars as business? I have been in some countries where no such thing as public transport does really exists and this model is there on voluntary and kapitalistic basic for years and why not. In our country to get cab, like one from that approved companies is usually ... stupid. They will rob you, they will dictate their rules, what you can and what you can't. It is closed market without any progress for years. I do expect argument, that legal taxi at least pay taxes and some social security and all that. You can be sure, they know town or city and they know how to drive. Hmm. OK, one correct thing is, that they are doing special driving license to be allowed to drive cab. That is all. Price is 40% higher than Uber, service is usually much worse and even Prague as city is not able to get a rid of this taxi mafia. Czech people do not need taxi, because we can easily get a bus, tram, trolleybus, train ... wherever we want, so they are just robbing tourists. Uber and simillar services can just easily kill this sh*t by just creating free market possibility. Regards, -- Over -- “Borders I have never seen one. But I have heard they exist in the minds of some people.” ― Thor Heyerdahl Telegram ................... @over23 facebook ................... facebook.com/overdrive23 Hackerspace project ........ https://labka.cz twitter .................... https://twitter.com/#!/over2393 GnuPG key FingerPrint ...... 08EA E4DC EF85 0F02 9267 5B48 2E58 6902 C5F8 794C Public key ................. http://overdrive.dronezone.eu/overdrive.txt -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 842 bytes Desc: OpenPGP digital signature URL: From juan.g71 at gmail.com Sat Dec 12 17:04:17 2015 From: juan.g71 at gmail.com (juan) Date: Sat, 12 Dec 2015 22:04:17 -0300 Subject: "Octopus Not So Great!" In-Reply-To: References: Message-ID: <566cc242.d7ab8c0a.9ede1.15fc@mx.google.com> On Sat, 12 Dec 2015 03:25:04 -0800 coderman wrote: > by @mollycrabapple Nice drawing. The content is...of course....seriously fucked up...I hope you realize, eh coderman? From zen at freedbms.net Sun Dec 13 02:49:37 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Sun, 13 Dec 2015 10:49:37 +0000 Subject: The USA Fake Of The Moon Landings In-Reply-To: References: Message-ID: On 12/13/15, Александр wrote: > *Stanley Kubrick Confesses To Faking The Moon Landings* > > A stunning new video has emerged 15 years after Stanley Kubrick’s death in > which Kubrick allegedly admits that the NASA moon landings were faked. Given that the Russians have in the last year or so announced they are now planning for a real, as in actual, moon landing around 2030, http://www.dailymail.co.uk/sciencetech/article-3344818/Russia-conquer-moon-2030-Nation-says-s-planning-permanent-manned-base-lunar-surface.html https://www.rt.com/news/157800-russia-moon-colonization-plan/ http://www.businessinsider.com/russia-announces-first-manned-mission-to-moon-2015-10 http://www.techtimes.com/articles/6769/20140511/russia-wants-to-set-up-moon-colony-by-2030-heres-how-it-plans-to-do-it.htm it is perhaps timely that Kubrick's interview was released earlier this year after the NDA expiry. Thanks for posting that interview - really appreciated and I had not seen it before, but again, it makes sense that there was a long NDA. Regards, Zenaan From veg at fatsquirrel.org Sun Dec 13 08:53:56 2015 From: veg at fatsquirrel.org (Veg) Date: Sun, 13 Dec 2015 11:53:56 -0500 Subject: The USA Fake Of The Moon Landings In-Reply-To: References: Message-ID: http://blackbag.gawker.com/did-stanley-kubrick-fake-this-video-of-stanley-kubrick-1747558774 On Sun, Dec 13, 2015 at 5:56 AM, Александр wrote: > but again, it makes sense that there was a long NDA. >> > and it "makes sense" that Kubrik was murdered 3 days after this interview. > > > 2015-12-13 12:49 GMT+02:00 Zenaan Harkness : > >> On 12/13/15, Александр wrote: >> > *Stanley Kubrick Confesses To Faking The Moon Landings* >> > >> > A stunning new video has emerged 15 years after Stanley Kubrick’s death >> in >> > which Kubrick allegedly admits that the NASA moon landings were faked. >> >> Given that the Russians have in the last year or so announced they are >> now planning for a real, as in actual, moon landing around 2030, >> >> >> http://www.dailymail.co.uk/sciencetech/article-3344818/Russia-conquer-moon-2030-Nation-says-s-planning-permanent-manned-base-lunar-surface.html >> https://www.rt.com/news/157800-russia-moon-colonization-plan/ >> >> http://www.businessinsider.com/russia-announces-first-manned-mission-to-moon-2015-10 >> >> http://www.techtimes.com/articles/6769/20140511/russia-wants-to-set-up-moon-colony-by-2030-heres-how-it-plans-to-do-it.htm >> >> it is perhaps timely that Kubrick's interview was released earlier >> this year after the NDA expiry. >> >> Thanks for posting that interview - really appreciated and I had not >> seen it before, but again, it makes sense that there was a long NDA. >> >> Regards, >> Zenaan >> >> > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3425 bytes Desc: not available URL: From afalex169 at gmail.com Sun Dec 13 02:21:31 2015 From: afalex169 at gmail.com (=?UTF-8?B?INCQ0LvQtdC60YHQsNC90LTRgCA=?=) Date: Sun, 13 Dec 2015 12:21:31 +0200 Subject: The USA Fake Of The Moon Landings Message-ID: Part 1: *https://www.youtube.com/watch?v=ABxAN8cfiOI * Part 2: *https://www.youtube.com/watch?v=9imVp8tlecY * ___ *Stanley Kubrick Confesses To Faking The Moon Landings* A stunning new video has emerged 15 years after Stanley Kubrick’s death in which Kubrick allegedly admits that the NASA moon landings were faked. Filmmaker T. Patrick Murray says he interviewed Kubrick three days before his death in March 1999. He was forced to sign an 88-page NDA to keep the contents of the interview a secret for 15 years. Below is a transcript from the interview with Stanley Kubrick, in which the 2001 Space Odyssey Director admits on camera that, “the moon landings ALL were faked , and that I was the person who filmed it.” We have included a leaked rough cut of the film below the transcript as well as two unedited raw videos of the interview with Kubrick below that: *K: I’m so preoccupied. With my work, innovation, risk-taking, regrets…T: Why are you giving this interview?K: Because, it started to get to me after awhile. Well, this is difficult, because it is the first time I’ve talked about it. (sighs)T: Sure, take all the time you need.K: I’ve always been conflicted by it, but not consciously until years later. I was just blown away by the chance, the opportunity, the challenge of making this, this production, and I went into this like it was a regular film, like another regular film of mine, not thinking too much about uh the long term effects of what it would mean to society if it was ever discovered.T: What are you talking about? I’m dying to know what you’re talking about.K: Well, a confession of sorts. A movie I made, that nobody is aware of – even though they’ve seen it.T: A movie you made, no one knows you made? Is that what you said?K: That’s right. Is that intriguing? Do I have you intrigued?K: I perpetrated a huge fraud on the American public, which I am now about to detail, involving the United States government and NASA, that the moon landings were faked, that the moon landings ALL were faked , and that I was the person who filmed it.T: Ok. (laughs) What are you talking…You’re serious. Ok.K: I’m serious. Dead serious.K: Yes, it was fake.T: Ok. Wait. Wait…T: I don’t want this to be an R-rated film, but seriously, what the blank, but seriously…T: I, I, I worked almost eight months to secure this once in a lifetime interview that almost no else could ever get, and instead of talking about his sixteen films that I’ve endured since I was a child…That we didn’t land on the moon, you’re saying?K: No, we didn’t.K: It was not real.T: The moon landings were fake?K: A, a, a.. fictional moon landing. A fantasy. It was not real.K: Don’t you think it’s important for people to know the truth?T: The moon landing in ’69, which was two years before my birth…K: Is total fiction.T: Total fiction.T: Is that?…So, that’s the 15 year thing. So that’s makes sense now. That’s why I can’t release it for 15 years now, that makes total sense now.T: Did we…we didn’t land on the moon you’re saying?K: No, we didn’t.T: Why are you telling me?K: A, a, a, a massive fraud. An unparalleled fraud perpetrated against them. They SHOULD know.K: Nixon want to uh, they were planning, yeah, he want to fake this, this moon landing…T: Are you contending that people DON’T want to know the truth about the world, reality, the moon landings…?K: The government, knowing this, takes advantage of it by perpetrating fraud after fraud after fraud.T: How did you end up giving in? Being complicit with this fraud?K: I didn’t want to do it.T: This is NOT where I thought this interview was going!K: With my help, with my, with my aid, and it is, it is bothering me.T: I only have this certain amount of time with you. And I’ll talk about whatever you want, but…T: You’re not…This isn’t some type of joke, or…K: No. No, it’s not.T: Or a film within a film thing…K: Not joking. NOPE.T: Okay.K: The conspiracy theorists were right, on this occasion.T: I don’t know what to ask you first.K: I thought it was wrong, I just…I didn’t believe in perpetrating a fraud like that.T: But you did.K: It also undermined my artistic integrity to do that.T: Ok, but you ended up saying yes. Why?K: Well, yes, but because basically I was bribed. To put it bluntly, that’s what it was. It was just a plain fucking bribe.T: Why are you telling me?K:A, a, a, massive fraud. An unparalleled fraud perpetrated against them. They SHOULD know! Don’t you think it’s important for people to know the truth?T: Why did they have to fake it? Why? Why would they ever need to do something like that? Why would the government ever want or need to do…K: It’s no secret that NASA always wanted to fulfill this Kennedy prophecy.T: Take it from the beginning…T: I gotta be honest, this is where he (Kubrick) got me. I mean, when I actually put myself in his position, when I actually imagine that he was telling the truth, and that he was presented with this opportunity and if in the one in a billion chance that I lived his life and I was presented with the same opportunity, what would I do?T: Yeah, he wanted his approval points up and he thought nothing could do it better than this.T: What a conflict. I mean, gosh, I can’t imagine being presented with that opportunity. On one hand, I’d really would want to do it, but then I’d probably say I’m committing a crime, and lying…T: It depends, but my guess would be…no, if you’re good, but you would do it.K: Spielberg, (inaudible) Scorsese, even Woody Allen. There isn’t one of them who wouldn’t do this.T: I gotta admit: I’d do it. I’d do it too.T: But they dangled all this power and all this flattery on you, essentially?K: Yeah, it got to me after awhile. You can listen to so much of that stuff before you start to believe it.T: They just said you were the greatest and stuff?K: Yeah, yeah – and I agreed with them.K: Why are you telling the world? Why does the world need to know that the moon landings aren’t real and you faked them?K: Which I consider to be my masterpiece.T: And you can’t take credit, or even talk about…K: Well, I am now..T: Right, so you’ll be dead. In ten years, or 15…K: Right, ten or 15 something like that.T: So, you can’t talk to Roger Ebert about it. Does that frustrate you?T: Why did they have to fake it? Why would they have to do that?K: Because it is impossible to get there.T: Ok, back up, back up, back up….* -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7032 bytes Desc: not available URL: From afalex169 at gmail.com Sun Dec 13 02:56:44 2015 From: afalex169 at gmail.com (=?UTF-8?B?INCQ0LvQtdC60YHQsNC90LTRgCA=?=) Date: Sun, 13 Dec 2015 12:56:44 +0200 Subject: The USA Fake Of The Moon Landings In-Reply-To: References: Message-ID: > > but again, it makes sense that there was a long NDA. > and it "makes sense" that Kubrik was murdered 3 days after this interview. 2015-12-13 12:49 GMT+02:00 Zenaan Harkness : > On 12/13/15, Александр wrote: > > *Stanley Kubrick Confesses To Faking The Moon Landings* > > > > A stunning new video has emerged 15 years after Stanley Kubrick’s death > in > > which Kubrick allegedly admits that the NASA moon landings were faked. > > Given that the Russians have in the last year or so announced they are > now planning for a real, as in actual, moon landing around 2030, > > > http://www.dailymail.co.uk/sciencetech/article-3344818/Russia-conquer-moon-2030-Nation-says-s-planning-permanent-manned-base-lunar-surface.html > https://www.rt.com/news/157800-russia-moon-colonization-plan/ > > http://www.businessinsider.com/russia-announces-first-manned-mission-to-moon-2015-10 > > http://www.techtimes.com/articles/6769/20140511/russia-wants-to-set-up-moon-colony-by-2030-heres-how-it-plans-to-do-it.htm > > it is perhaps timely that Kubrick's interview was released earlier > this year after the NDA expiry. > > Thanks for posting that interview - really appreciated and I had not > seen it before, but again, it makes sense that there was a long NDA. > > Regards, > Zenaan > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2783 bytes Desc: not available URL: From themikebest at gmail.com Sun Dec 13 11:59:08 2015 From: themikebest at gmail.com (Michael Best) Date: Sun, 13 Dec 2015 14:59:08 -0500 Subject: [cryptome] Global Currency Tracking Vector data dump In-Reply-To: References: Message-ID: Åny sources for this or is it another phantom ? Also, they've been tracking my orgasms?! On Sun, Dec 13, 2015 at 2:56 PM, Wilfred L. Guerin wrote: > a single global snapshot of the exact locations of all minted currency on > earth on dec solstice 2012 with approx 12 billion points has been dumped > from the american sigint classifier spectrum, indications the originating > party has digitised all movement of coins, currency, minted plates, > military medals, and related objects to < 0.33 meter resolution > independent of time of motion. this is related to the american sigint > signals spectrum breakthrough that also has provided tracking of any signal > from human orgasm through modern cell phone over many decades (since 1973). > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1192 bytes Desc: not available URL: From zen at freedbms.net Sun Dec 13 07:20:15 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Sun, 13 Dec 2015 15:20:15 +0000 Subject: Who we are up against Message-ID: For those who have not yet read of this, it's a must to comprehend. Lest ye doubt humans are rightly labelled 'sheep'. https://en.wikipedia.org/wiki/Milgram_experiment Something uplifting to counterbalance: > http://thesaker.is/submarines-in-the-desert-as-my-deepest-gratitude-to-you/ (Thank you very much Alex.) And some comedy: http://thesaker.is/scotts-collection-of-russian-humor-hilarious-must-read/ Regards, Zenaan From admin at pilobilus.net Sun Dec 13 13:03:20 2015 From: admin at pilobilus.net (Steve Kinney) Date: Sun, 13 Dec 2015 16:03:20 -0500 Subject: The USA Fake Of The Moon Landings In-Reply-To: References: Message-ID: <566DDD18.9080205@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 12/13/2015 11:53 AM, Veg wrote: > http://blackbag.gawker.com/did-stanley-kubrick-fake-this-video-of- stanley-kubrick-1747558774 OK > I'll bite. Just a couple of questions for starters: They call for speculation, but that seems to be OK in our present context since the position they challenge is itself based on speculation. How is it possible that the Soviet Union did not detect and expose the moon landing hoaxes (there were six successful Apollo missions to the Moon)? How is it possible that simulating the Apollo missions could be less expensive, or in any other way more desirable, than actually doing them? How is it possible that /no/ credible evidence that the Apollo program was a hoax has surfaced by now? All I have seen is speculation, elevated to "evidence" in the eyes of some beholders by confirmation bias. Example: No dust on the faceplate in a very famous photo of an astronaut on the moon. This widely distributed "proof" of a moon landing hoax falls flat when placed in its native context: The propaganda extravaganza around the Apollo program produced and published /lots/ of high quality graphics. Time Magazine used all the photos they really liked, without referencing which were taken in training environments vs. on the Moon OR hesitating to extensively retouch the "real" pictures for maximum artistic quality . :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWbd0VAAoJEDZ0Gg87KR0LYO8P/149JrPiCQjb9Bnr6icPKBeG DNwAQcmXZggabtLn2H42Q2tWfyZBgZjexYIFXz24k4VUaGFFoZijF4zJ34Cv8Up/ S939sypS0y51jhTrB8n21IvsoedP7SAWoDTZOpTPAvfHMqfvp5tJDt94qswTtkp3 hhh/xamfDOQpnn0jf+23kjpe0GHtm6dv1aLcYG9zxh2m3+SPSDmNVtVrZTx737Ky pUKgEAA3rGlC/42+xN7rPE0SlTue9PS2dlNOve3xM4mkvx+8WzTL7EBToOSrn2ze pMNP/VdI+OQYxrKpiZUKvVytjoGCNpNrNRLsoLQGeDx17+51IBMqh+hUW3h0vSf1 kmdECgm39EhEyda0BB2Wep9/O7E9JjX6wTTHus1eKkdIuLDomDd5aNcWFm7tpfAi UCzBxBQS1izYG9rg8FBkA4lTFw4XCfwvg4XRbZ3J2lwoddEl2fcoTJQstFgXhqh0 uY9IbNXisrBDrrP+m5sDCOLR/iMfuruX0PuRGKECKfjJcQ9tvCfPOg94YCsDtHaG A9sLmOc7qmXYGw9/N1NBHE5UOHi+2qlHdC2kyMv8XcDkJPx9cQZSkmXm5dK3gGZs tyRGJ26laVQZuwKhxLPAzN+8eOQLjQnQzLos8GDR/vBc2a3tOYVFib6K2aXr6SF3 JfNqb2i49Izq4OFjKXBH =fkgY -----END PGP SIGNATURE----- From die at dieconsulting.com Sun Dec 13 14:39:48 2015 From: die at dieconsulting.com (David I. Emery) Date: Sun, 13 Dec 2015 17:39:48 -0500 Subject: The USA Fake Of The Moon Landings In-Reply-To: <566DDD18.9080205@pilobilus.net> References: <566DDD18.9080205@pilobilus.net> Message-ID: <20151213223948.GF9108@pig.dieconsulting.com> On Sun, Dec 13, 2015 at 04:03:20PM -0500, Steve Kinney wrote: > How is it possible that /no/ credible evidence that the Apollo > program was a hoax has surfaced by now? All I have seen is > speculation, elevated to "evidence" in the eyes of some beholders > by confirmation bias. I assume you guys are well aware that a number of hams/RF hackers successfully received the downlinks from the Apollo missions at the moon. This includes one well documented case of a guy who built a big enough VHF array to intercept the actual VHF voice link between the LEM and the Command module... and several folks who saw both LEM and Command module S band downlinks and recovered voice. Doing so was well within the capabilities of individual techy hams of the era, at least those who had access to a decent sized dish (not uncommon for EME "moonbounce" back then) ... and some RF engineering background. -- Dave Emery N1PRE/AE, die at dieconsulting.com DIE Consulting, Weston, Mass 02493 "An empty zombie mind with a forlorn barely readable weatherbeaten 'For Rent' sign still vainly flapping outside on the weed encrusted pole - in celebration of what could have been, but wasn't and is not to be now either." From admin at pilobilus.net Sun Dec 13 14:55:45 2015 From: admin at pilobilus.net (Steve Kinney) Date: Sun, 13 Dec 2015 17:55:45 -0500 Subject: Who we are up against In-Reply-To: <20151213160135.GB3799@sivokote.iziade.m$> References: <20151213160135.GB3799@sivokote.iziade.m$> Message-ID: <566DF771.3060506@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 12/13/2015 11:01 AM, Georgi Guninski wrote: > On Sun, Dec 13, 2015 at 03:20:15PM +0000, Zenaan Harkness > wrote: >> For those who have not yet read of this, it's a must to >> comprehend. Lest ye doubt humans are rightly labelled >> 'sheep'. >> > > Call me a crank, but I am against the sheeple. > > Sheeple are major cause of trouble, electing current so called > "establishment". > >> https://en.wikipedia.org/wiki/Milgram_experiment When I see or hear the word 'sheeple' I think about how successful our adversaries have been in dividing the people they prey on into mutually hostile factions, each of which blames the actions of their common enemy on the others. Populist and reformist politics ends and mindless compliance begins when people decide that they are categorically superior to those who don't happen to belong to their own gang, and start speaking and acting on that basis. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWbfdvAAoJEDZ0Gg87KR0Ljj4QAJXExc10dUhiqltAFOAYjGt5 D/m5kusEJbXt5IJ/bDMaPWPkYH4CVklggt9frOMlKLY70cNfsF4Mkvpnep9osA/u lJv48dOplnHRKm1zcIra/z8/p3y04iFe54QCNPvQTM/9ydIcy4xe6rAgqxkMDPBl /rePWM75Iws9xIUrpgvImMzi0piyHfBmAaB2LVRtnsyObIMTdyf4kZmdFWBYunbH IFYQwXEj/pin6QbKs2LW79M8Pj1fTdToC46aS1hiFHPEl1JDoEsJCKGXBwzd8Af7 rcWYDJXu8k86fH+snt2tiHEX7D0g7W1a2iUeMtrYNX+Rs0tO9opaXq9/VUyrj2mr nRo+JQozQB+3aTraA5rTBJXeE6dEDlf9QPRCS2P/rnNhBjRzg1CkfCMJyYf0lb9A ZRrjVfuayQsh4aHJ5KHcXHuqh40+224OpLtHG/pgAlWP0OT1o1HrvA/+6TH+L4re PhjUuhwWIGKEbeaLOVEe6a2Ecj98uIZtm5FQMSSzKhCLe1Ym6XhVN/jtL1GBJDPy +uauIBvR+Uow0XpGWPeQKHGRmrm++NqviWfwfAOFuhq24JEha1vmzUbWaBtvQ/hH T4bKVT6r7rU7NKFh0PfWkTdAZu+zO19+iPiSLm6c+zcGNkvsbxHCAR2lOO6AbfBg 7ia5feZt6O1+HuMpOs2D =rmXF -----END PGP SIGNATURE----- From guninski at guninski.com Sun Dec 13 08:01:35 2015 From: guninski at guninski.com (Georgi Guninski) Date: Sun, 13 Dec 2015 18:01:35 +0200 Subject: Who we are up against In-Reply-To: References: Message-ID: <20151213160135.GB3799@sivokote.iziade.m$> On Sun, Dec 13, 2015 at 03:20:15PM +0000, Zenaan Harkness wrote: > For those who have not yet read of this, it's a must to comprehend. > Lest ye doubt humans are rightly labelled 'sheep'. > Call me a crank, but I am against the sheeple. Sheeple are major cause of trouble, electing current so called "establishment". > https://en.wikipedia.org/wiki/Milgram_experiment > From Rayzer at riseup.net Sun Dec 13 19:42:31 2015 From: Rayzer at riseup.net (Rayzer) Date: Sun, 13 Dec 2015 19:42:31 -0800 Subject: "Octopus Not So Great!" In-Reply-To: <566cc242.d7ab8c0a.9ede1.15fc@mx.google.com> References: <566cc242.d7ab8c0a.9ede1.15fc@mx.google.com> Message-ID: <566E3AA7.6000900@riseup.net> juan wrote: > On Sat, 12 Dec 2015 03:25:04 -0800 > coderman wrote: > >> by @mollycrabapple > Nice drawing. The content is...of course....seriously fucked > up...I hope you realize, eh coderman? > Beware the giant squid! http://auntieimperial.tumblr.com/search/giant+squid -- RR "You might want to ask an expert about that - I just fiddled around with mine until it worked..." -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1233 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: ifcacdcd. Type: image/jpeg Size: 721167 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From grarpamp at gmail.com Sun Dec 13 18:53:51 2015 From: grarpamp at gmail.com (grarpamp) Date: Sun, 13 Dec 2015 21:53:51 -0500 Subject: Spain Towing Popular Surveillance, Compute, Etc Message-ID: https://www.techdirt.com/articles/20151208/09260133020/spain-brings-new-snooping-law-allows-wide-ranging-surveillance-government-malware.shtml http://tecnologia.elpais.com/tecnologia/2015/12/04/actualidad/1449259283_679909.html https://www.techdirt.com/articles/20130607/04342023356/clueless-spanish-politicians-wants-to-join-government-malware-club.shtml http://www.neurope.eu/article/spanish-police-might-use-trojans-spy-computers https://www.techdirt.com/articles/20150705/18174231556/spain-government-goes-full-police-state-enacts-law-forbidding-dissent-unauthorized-photography-law-enforcement.shtml http://www.thelocal.es/20150701/the-ten-most-repressive-aspects-of-spains-new-gag-law From grarpamp at gmail.com Sun Dec 13 20:48:57 2015 From: grarpamp at gmail.com (grarpamp) Date: Sun, 13 Dec 2015 23:48:57 -0500 Subject: Assange believes too late for any pervasive privacy In-Reply-To: <566AFFB6.1090300@pilobilus.net> References: <566AFFB6.1090300@pilobilus.net> Message-ID: On Fri, Dec 11, 2015 at 11:54 AM, Steve Kinney wrote: > Old Farts have major problems wrapping their heads around the > concept that a world where privacy is shrinking fast and expected > to nearly disappear is a Good Thing. People who grew up with the > Interet, not so much. > > http://www.youtube.com/watch?v=6c-RbGZBnBI Probably because Old Farts lived a conscious period of years where the only remote connection to any other human being was via voice telephone or snail mail, and even then it was between family and business situations, not amongst masses of new randoms. They were, and knew, the mechanisms and value of real in-person humanity and its associated lines. It was only in the 1990's that masses of people began to encounter the internet hands on, mostly at school. Such that anyone today under 30 years old did not have any non internet period of conscious. They therefore have no basis on which to evaluate the huge shift they were born into and the ongoing change being foisted upon them. Surveillance, databasing, DNA, drones, lack of privacy, etc... all being dropped upon humans in under 30 years... is going to have massive impact upon the evolutionary biological nature of humans and humanity that we simply cannot comprehend, predict, or control... some of it will be good. But as when someone jams a camera in your face... these types of things are biological stressors... which are generally bad, even if and after the pressure is removed. Old Farts know and lived history, some literally before the transistor... and they are perfectly well capable of telling you exactly what's goin on. Only question is, are you brave enough to ask, to behold, to comprehend the answer... and what are you going to do with what they tell you? Some of them are probably on youtube talking or being interviewed about it... both good and bad. From grarpamp at gmail.com Sun Dec 13 21:32:11 2015 From: grarpamp at gmail.com (grarpamp) Date: Mon, 14 Dec 2015 00:32:11 -0500 Subject: Weinstein Waxes On Govt Lying About Crypto Backdoors Message-ID: http://lauren.vortex.com/archive/001137.html http://politics.slashdot.org/story/15/12/13/2322214/why-governments-lie-about-encryption-backdoors http://www.vortex.com/privacy http://www.networkworld.com/article/3014057/security/fbi-director-renews-push-for-back-doors-urging-vendors-to-change-business-models.html From juan.g71 at gmail.com Sun Dec 13 19:37:46 2015 From: juan.g71 at gmail.com (juan) Date: Mon, 14 Dec 2015 00:37:46 -0300 Subject: Spain Towing Popular Surveillance, Compute, Etc In-Reply-To: References: Message-ID: <566e37bc.d0e48c0a.8484a.ffffd232@mx.google.com> On Sun, 13 Dec 2015 21:53:51 -0500 grarpamp wrote: > https://www.techdirt.com/articles/20151208/09260133020/spain-brings-new-snooping-law-allows-wide-ranging-surveillance-government-malware.shtml > http://tecnologia.elpais.com/tecnologia/2015/12/04/actualidad/1449259283_679909.html > Well, that's another thing for Steve Kinney to consider. Looks like the one-world-government plan is getting a boost thanks to telecom networks aka 'the internet'. From virtual international anarchy to global mass surveillance. How cool is that. But fear not. Nation states will merge in a world government controlled by the anglo-american nazis, I mean, humanitarians. Since the world government will be controlled by the anglo-americans, it will be a 'liberal democracy' and the 'people' will be in control. Now, that is really cool. > https://www.techdirt.com/articles/20130607/04342023356/clueless-spanish-politicians-wants-to-join-government-malware-club.shtml > http://www.neurope.eu/article/spanish-police-might-use-trojans-spy-computers > > https://www.techdirt.com/articles/20150705/18174231556/spain-government-goes-full-police-state-enacts-law-forbidding-dissent-unauthorized-photography-law-enforcement.shtml > http://www.thelocal.es/20150701/the-ten-most-repressive-aspects-of-spains-new-gag-law From grarpamp at gmail.com Sun Dec 13 21:50:00 2015 From: grarpamp at gmail.com (grarpamp) Date: Mon, 14 Dec 2015 00:50:00 -0500 Subject: Peter Sunde On... [re: Assange believes too late for any pervasive privacy] Message-ID: On Fri, Dec 11, 2015 at 3:38 AM, Zenaan Harkness wrote: > Feels like a sell out. I suspect he feels he's being pragmatic. > https://www.rt.com/news/325524-assange-privacy-rt-10/ > http://www.youtube.com/watch?v=k3rFNQ8ytnE Too late? Selling out? Giving up? Or the realization of much bigger things at play, and focuses yet to come... http://motherboard.vice.com/read/pirate-bay-founder-peter-sunde-i-have-given-up Pirate Bay Founder: ‘I Have Given Up’ Written by Joost Mollen December 11, 2015 // 02:26 PM EST “The internet is shit today. It’s broken. It was probably always broken, but it’s worse than ever.” My conversation with, Peter Sunde, one of the founders and spokespersons of The Pirate Bay, did not start out optimistically. There’s good reason for that: In the last couple of months, the contemporary download culture shows heavy signs of defeat in the battle for the internet. Last month we saw Demonii disappear. It was the biggest torrent tracker on the internet, responsible for over 50 million trackers a year. Additionally, the MPAA took down YIFY and Popcorn Time. Then news got out that the Dutch Release Team, an uploading collective, made a legal settlement with anti-piracy group BREIN. While it might look like torrenters are are still fighting this battle, Sunde claims that the reality is more definitive: “We have already lost.” Back in 2003 Peter Sunde, together with Fredrik Neij and Gottfrid Svartholm, started The Pirate Bay, a website that would become the biggest and most famous file-sharing website in the world. In 2009, the three founders were convicted of “assisting [others] in copyright infringement” in a highly controversial trial. "Stop treating internet like it's a different thing and start focusing on what you actually want your society to look like." Sunde was incarcerated in 2014 and released a year later. After his time in jail he started blogging about the centralization of power by the European Union; ran as a candidate for the Finnish Pirate Party during the elections to the European Parliament; and founded Flattr, a micro donation system for software developers. I wanted to speak with Sunde about the current state of the free and open internet, but this conversation quickly changed into an ideological exchange about society and capitalism—which is, according to Sunde, the real problem. The following interview has been edited for clarity and length. MOTHERBOARD: Hey Peter, I was planning on asking you if things are going well, but you made it pretty clear that that isn’t the case. Peter Sunde: No, I don’t see any good happening. People are too easy to content with things. Take the net neutrality law in Europe. It's terrible, but people are happy and go like "it could be worse.” That is absolutely not the right attitude. Facebook brings the internet to Africa and poor countries, but they’re only giving limited access to their own services and make money off of poor people. And getting government grants to do that, because they do PR well. Finland actually made internet access a human right a while back. That was a clever thing of Finland. But that’s like the only positive thing I have seen in any country anywhere in the world regarding the internet So, how bad is the state of the open internet? Well, we don’t have an open internet. We haven’t had an open internet for a long time. So, we can’t really talk about the open internet because it does not exist anymore. The problem is, nobody stops anything. We are losing privileges and rights all of the time. We are not gaining anything anywhere. The trend is just going in one direction: a more closed and more controlled internet. That has a big impact on our society. Because they are the same thing today. If you have a more oppressed internet, you have a more oppressed society. So that's something we should focus on. But still we think of the internet like this new kind Wild West place, and things are not in chains yet, so we don’t care because everything will be OK anyhow. But that is not really the case. We have never seen this amount of centralization, extreme inequality, extreme capitalism in any system before. But according to the marketing done by people like Mark Zuckerberg and companies like Google, it's all to help with the open network and to spread democracy, and so on. At the same time, they are capitalistic monopolies. So it’s like trusting the enemy to do the good deeds. It is really bizarre. Do you think because a lot of people don’t consider the internet to be real or a real place, they care less about its well-being? Well, one thing is, we have been growing up with an understanding of the importance of things like a telephone line or television. So if we would start to treat our telephone lines or TV channels like we treat the internet, people would get really upset. If someone would tell you, you can’t call a friend, you would understand then that this is a very bad thing that is happening. You understand your rights. But people don't have that with the internet. If someone would tell you, you can’t use Skype for that and that, you don’t get the feeling it’s about you personally. Just by being a virtual thing, it's suddenly not directed at you. You don't see someone spying on you, you don't see something censored, you don't see it when someone deletes stuff out of the search results out of Google. I think that’s the biggest problem to get people's attention. You don't see the problems, so people don’t feel connected to it. Screenshot from the documentary TPB - AFK (The Pirate Bay - Away From Keyboard). From left to right: Gottfrid Svartholm, Peter Sunde and Fredrik Neij. I would rather not care about it myself. Because it’s very hard to do something about it, and not become a paranoid conspiracy person. And you don’t want to be that. So rather just give up. That’s kind of what people have been thinking, I think. What is it exactly that you have given up? Well, I have given up the idea that we can win this fight for the internet. The situation is not going to be any different, because apparently that is something people are not interested in fixing. Or we can't get people to care enough. Maybe it's a mixture, but this is kind of the situation we are in, so its useless to do anything about it. We have become somehow the Black Knight from Monty Python’s Holy Grail. We have maybe half of our head left and we are still fighting, we still think we have a chance of winning this battle. So what can people do to change this? Nothing. Nothing? No, I think we are at that point. I think it’s really important people understand this. We lost this fight. Just admit defeat and make sure next time you understand why you lost this fight and make sure it doesn’t happen again when we try and win the war. Right, so what is this war about and what should we do to win it? Well, I think, to win the war, we first of need to understand what the fight is and for me it’s clear that we are dealing with ideological thing: extreme capitalism that’s ruling, extreme lobbying that’s ruling and the centralization of power. The internet is just a part of a bigger puzzle. And the other thing with activism is that you have to get momentum and attention and such. We have been really bad at that. So we stopped ACTA, but then it just came back with a different name. By that time, we had used all our resources and public attention on that. The reason that the real world is the big target for me, is because the internet is emulating the real world. We are trying to recreate this capitalistic society we have on top of the internet. So the internet has been mostly fuel on the capitalistic fire, by kind of pretending to be something which will connect the whole world, but actually having a capitalistic agenda. Look at all the biggest companies in the world, they are all based on the internet. Look at what they are selling: nothing. Facebook has no product. Airbnb, the biggest hotel chain in the world, has no hotels. Uber, the biggest taxi company in the world, has no taxis whatsoever. "I have given up the idea that we can win this fight for the internet." The amount of employees in these companies are smaller then ever before and the profits are, in turn, larger. Apple and Google are passing oil companies by far. Minecraft got sold for $2.6 billion and WhatsApp for like $19 billion. These are insane amounts of money for nothing. That is why the internet and capitalism are so in love with each other. You told me the internet is broken, that it was always broken. What do you mean by that and do we have extreme capitalism to blame for it? Well, the thing is the internet is really stupid. It works really simply in a simple manner and it doesn’t take any adjustments for censorship. Like, if one cable is gone, you take the traffic through some other place. But thanks to the centralization of the internet, (possible) censorship or surveillance tech is a whole lot harder to get around. Also, because the internet was an American invention, they also still have control of it and ICANN can actually force any country top level domain to be censored or disconnected. For me that’s, a really broken design. But it has always been broken, we just never really cared about it, because there always have been a few good people that made sure that nothing bad happened before. But I think that’s the wrong idea. Rather let bad thing happen as quick as possible so we can fix them and make sure it does not happen in the future. We are prolonging this inevitable total failure, which is not helping us at all. So, we should just let it crash and burn down, pick up the pieces and start over? Yes, with the focus on the big war on this extreme capitalism. I couldn’t vote, but I was hoping Sarah Palin won last time in the US elections. I’m hoping Donald Trump wins this year’s election. For the reason that it will fuck up that country so much faster then if a less bad President wins. Our whole world is just so focused on money, money, money. That’s the biggest problem. That’s why everything fucks up. That’s the target we have to fix. We need to make sure that we are going to get a different focus in life. "We don’t have an open internet. We haven’t had an open internet for a long time." Hopefully technology will give us robots that will take away all the jobs, which will cause like a massive worldwide unemployment; somewhat like 60 percent. People will be so unhappy. That would be great, because then you can finally see capitalism crashing so hard. There is going to be a lot of fear, lost blood, and lost lives to get to that point, but I think that’s the only positive thing I see, that we are going to have a total system collapse in the future. Hopefully as quick as possible. I would rather be 50 then be like 85 when the system is crashing. This all sounds quite like some sort of Marxist revolution: a total crash of the capitalist system. Well, yeah, I totally agree with that. I’m a socialist. I know Marx and communism did not work before, but I think in the future you have the possibility of having total communism and equal access to everything for everybody. Most people I meet, no matter if they are a communist or a capitalist, agree with me on this, because they understand the potential. So, is there like a concrete thing we should focus on? Or do we need to aim for a new way of thinking? A new ideology? Well, I think the focus needs to be that the internet is exactly the same as society. People might realize that it’s not a really good idea to have all of our data and files on Google, Facebook and company servers. All of these things need to be communicated al the way to the political top, of course. But stop treating internet like it's a different thing and start focusing on what you actually want your society to look like. We have to fix society, before we can fix the internet. That’s the only thing. Topics: Open Internet, Pirate Bay, piracy, capitalism, Internet, culture From grarpamp at gmail.com Sun Dec 13 22:21:27 2015 From: grarpamp at gmail.com (grarpamp) Date: Mon, 14 Dec 2015 01:21:27 -0500 Subject: Jacob Appelbaum Speech at openDemocracy Message-ID: https://www.youtube.com/watch?v=3ZHOgWeg8T0 Published on Nov 25, 2015 Journalist and researcher for the Tor project, Jacob Appelbaum talks about technology, freedom and resisting surveillance at the World Forum for Democracy. Read a transcript of the speech here: https://goo.gl/WSE3mK This video is published as part of an openDemocracy editorial partnership with the World Forum for Democracy. The insights gathered during the annual Strasbourg World Forum for Democracy inform the work of the Council of Europe and its numerous partners in the field of democracy and democratic governance. From juan.g71 at gmail.com Sun Dec 13 20:54:54 2015 From: juan.g71 at gmail.com (juan) Date: Mon, 14 Dec 2015 01:54:54 -0300 Subject: "Octopus Not So Great!" In-Reply-To: <566E3AA7.6000900@riseup.net> References: <566cc242.d7ab8c0a.9ede1.15fc@mx.google.com> <566E3AA7.6000900@riseup.net> Message-ID: <566e49d9.922a370a.8c76b.ffff8913@mx.google.com> -------------- next part -------------- A non-text attachment was scrubbed... Name: octopus-not-so-great_fixed.jpg Type: image/jpeg Size: 370497 bytes Desc: not available URL: From admin at pilobilus.net Sun Dec 13 23:02:21 2015 From: admin at pilobilus.net (Steve Kinney) Date: Mon, 14 Dec 2015 02:02:21 -0500 Subject: Who we are up against In-Reply-To: References: <20151213160135.GB3799@sivokote.iziade.m$> <566DF771.3060506@pilobilus.net> Message-ID: <566E697D.1040900@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 12/14/2015 12:26 AM, Zenaan Harkness wrote: > On 12/13/15, Steve Kinney wrote: >> On 12/13/2015 11:01 AM, Georgi Guninski wrote: >>> On Sun, Dec 13, 2015 at 03:20:15PM +0000, Zenaan Harkness >>> wrote: >>>> For those who have not yet read of this, it's a must to >>>> comprehend. Lest ye doubt humans are rightly labelled >>>> 'sheep'. >>> >>> Call me a crank, but I am against the sheeple. >>> >>> Sheeple are major cause of trouble, electing current so >>> called "establishment". >>> >>>> https://en.wikipedia.org/wiki/Milgram_experiment >> >> When I see or hear the word 'sheeple' I think about how >> successful our adversaries have been in dividing the people >> they prey on into mutually hostile factions, each of which >> blames the actions of their common enemy on the others. > > I agree that the wording I chose for the subject could be seen > as divisive, yet is confronting since it suggests a specific > target, which target turns out to be "most people/sheeple". > > The divisive part is not good, but also not intended. > > The "we need to be alert to reality - this is big/bad" is > intended and I think is essential to assessing anything sane. I > recall reading that Wikipedia article a few years ago, yet it > had no less impact upon me, on my second reading. Give people roles to play in an inherently violent system, and whoever those people are, they will begin to do violence. That's a general case that scales all the way up to what happens when "honest" politicians are given a representational democracy to run. The best part about the Milgram experiments was that a significant number of volunteers dropped out early. Pity it's a bit late to send them anarchist literature and encourage them to turn out for public events. :D >> Populist and reformist politics ends and mindless compliance >> begins when people decide that they are categorically >> superior to those who don't happen to belong to their own >> gang, and start speaking and acting on that basis. > > No, not the compliance bit at least. Just because I speak > arrogantly, refused to wear a school uniform for -years- in a > row and use vehemence and confronting language when I > communicate, does NOT mean I am the cause of those "sheeple" > who be compliance with mindless authority! > > You can't be seriously suggesting as much, surely. I was thinking more along the lines of "rebel as you are told," the oldest scam in the book. As a general case, the most productive way for a well entrenched ruling class to attack people who dislike authority figures is to provide them with models of rebellion that do not work: Mass market propaganda to the rescue. > In fact "sheep" is about as apt as it gets when describing > compliant (to arbitrary authority) people. And the Migram > experiments show that humans by an overwhelming majority, are > in fact sheep, even in the face of their own stress, their own > tears, inner conflict, emotional pain - they -still- fucking > comply with arbitrary (worse, despotic!!) authority! > > "We humans" are so woefully inadequate to the task of complying > with our own conscience or inner sense of right and wrong, and > so woefully tied to compliance with external authority, it is > shocking, embarrassing, upsetting and yes, confronting. > > But fuck, don't shoot the messenger! That was never my intention. I just have a strong aversion to the 'sheeple' paradigm, which I do consider a core component of "rebel as you are told" propaganda. > Put your confronting reaction to something constructive - try > to figure out how to simply and expediently educate those you > come across to counter this problem - if you have actual > successes, please share those, as that may go some significant > way to enlightening us all on how to handle this very > confronting problem. I have had occasional success. The key concept is to avoid trying to move people all the way from their current position to the one you would prefer them to have at one go. Tailor the message to the audience and try to move them ONE step in the direction you want to see them move. Of course, don't neglect to preach to the choir: How else will they be able to get on the same page and put on a decent show? I have been pushing this packet of books for around a year now, and from time to time it seems to have been well received: It's a course in remedial politics, intended to fill basic gaps in people's information about how populist a.k.a. anarchist politics actually works: http://pilobilus.net/strategic_conflict_docs_intro.html > Another shot to prod you along a bit further: > > Those who are compliant with despotic external authority in the > face of their own inner conscience of right and wrong, ought be > regarded as other/ outer/ "them", and treated with extreme > caution! > > "Those" sheep happens to be about 60% to 90% of everyone! You > wanna sweep -that- under the carpet of your politically correct > boat? The presumption that people who are notably compliant with illegitimate authority have a "conscience" and fixed notions of right and wrong is questionable. Those who comply most eagerly include sociopathic personalities and people who are all to easily led due to other disorders. The "60% to 90%" cover a spectrum from grudging, minimal compliance to elaborate and even competitive compliance, typically related to the degree that their individual income and social status benefit from a show of compliance. But as the gap between rewards promised and rewards delivered continues to widen, and the violent excesses of our rulers become more and more obvious, compliance will continue to decline. This creates a growth market for populist political agitators - a market that opponents and supporters of authoritarian rule are already competing to capture. Politics is about power: Who has it, who doesn't, and how these groups interact. The object of political activity is to obtain and exercise power, toward whatever ends one chooses. Political models and strategies that actually work in this context are "correct" while those that do not work are "incorrect." There is a time and place for everything, but rarely a time when elitism, or driving wedges between groups who have political enemies in common with oneself, is "correct" in a functional sense. :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWbml8AAoJEDZ0Gg87KR0LY5cQAOFTNPTyJs/Kf9eNj4zkGgLe AD3Q+1eW9jDrEBuIb54kjD1LvI9JaFHCIO4mo8iUXfDgFhNLCNEr5FU8brJlz4QW Qbe7XuLfhEzVtQP1fY5jOy+/p96vcUYvK1D1RlOqxcM1C4iLYW/QxJsc8YVto5lL 82Y12V+YEqqF8UgvXMJhFyQUcYxbOKovbmy0Y5afL4xtqMRxbE/DlkY+5WS4xoSG aPO+hRxfoJszBRSowVp/WVodHWBnkFJt3dYdOOJZiWSMiGoxqptlYdy++jndvccN YfTIx1uxx+CZKYF0LPsC61fY8SkjWnfO+DTcFYPXP0WHwBmRo4R0Q3wsapZhIoqA Ura3MmDyy/hmTevzxyoHeKSMd7TQoP4jZKb/dS2NyvPGZWowwQ7FvfsIa9JlJkkX kffMZvqUMWmUrQUID87ueCWE7KA5rhzrc2ZublDBAfr4mUbbylUY+IgLc4gO/vnp FP78KlMPyqP92RwC1mY8bI9u4w74Ujq+c2sHcG+wNvaL0uoyfj55lDSVGyoDQ2Pm 4qEv/J9/ELey1tOKkE9hHvyHJPpiw/T/qs5+P+9WMiSRUGM4BDiTDdnn9dV0MAJa XXN8txk+bCkd91PFQcAWa+u7lXuJYKwIOIsbzrFCxCe2OreTYxObOqenYcNajulJ oCQVxsLGC1lh4k5bhyzF =qhcm -----END PGP SIGNATURE----- From grarpamp at gmail.com Sun Dec 13 23:09:17 2015 From: grarpamp at gmail.com (grarpamp) Date: Mon, 14 Dec 2015 02:09:17 -0500 Subject: A woman with balls ^B ovaries! - Fwd: Ann Barnhardt's response to a Muslim death threat. In-Reply-To: References: Message-ID: On Mon, Dec 14, 2015 at 12:39 AM, Zenaan Harkness wrote: > Try Ann Barnhardt's response on for size. My kind of woman! Cypher? Who knows. Punk? Definitely. Breakin it down in vid 1, money shot in vid 2. https://www.youtube.com/watch?v=Qeyrp-V3Jvc https://www.youtube.com/watch?v=_LCLDjPNpf4 Random economics... https://www.youtube.com/user/AnnBarnhardt/videos From grarpamp at gmail.com Sun Dec 13 23:24:40 2015 From: grarpamp at gmail.com (grarpamp) Date: Mon, 14 Dec 2015 02:24:40 -0500 Subject: Jeremy Hammond Rejects and Redirs OpISIS and Co-opted Anon Message-ID: https://freejeremy.net/2015/12/10/reject-opisis-and-the-co-opting-of-anonymous/ Reject #OpIsis and the Co-Opting of Anonymous In this new writing, Jeremy shares his views on Anonymous, #OpISIS, and the recent wave of anti-immigrant sentiment that has been sweeping the nation. ________________________________ The attacks in France were a terrible but unfortunately predictable response by desperate people who, after a decade of war and occupation, want the west to taste what we have been regularly dishing out. But we cannot allow them to be used to justify more war. In the wake of the Paris attacks, the Western governments are provoking Islamophobic hatred in order to escalate military operations in the Middle East and push police state powers. It’s a familiar script, and from prison, I’ve been following these developments, disturbed about the attacks on immigrant and Muslim communities and the resurgence of the fascist right. I remember in the wake of 9/11, the waves of blind patriotism and xenophobia that the war-mongering politicians used to push police-state laws, mass surveillance, and rampant militarization. It was never about fighting terrorism or weapons of mass destruction, but about US empire: control over land, oil, and drug production, like all wars. Hundreds of thousands of innocents were murdered by the US military over the longest war in our history while we escalated drone warfare elsewhere in Syria, Yemen, Pakistan, and Somalia, creating the conditions which gave rise to ISIS in the first place. That same post-9/11 hysteria is back and all the war-mongers are again frothing at the mouth with hate for immigrants and refugees, pushing for national Muslim registration databases, and for regime change in Syria. But I never thought Anonymous would join in on their frenzied call for war. Apparently, GhostSec and others purportedly associated with Anonymous have been DDoSing forums, taking down Twitter accounts, and reporting IP addresses to law enforcement in collaboration with shady military contractors like Kronos Advisory. The naïve fools behind the operation are being manipulated by intelligence agents taking advantage of the emotional reaction to the Paris attacks to harness our skills to fight their hypocritical “war on terrorism.” As someone who hacked with Anonymous and marched against the war in Iraq, I completely oppose #OpISIS and any attempts to co-opt our movement into supporting the government’s militaristic agenda. Escalated US military involvement is certainly going to result in more civilian deaths, as it already has. All deaths of innocent civilians are a tragedy, and we cannot value one life over another. (And you are still more likely to be shot down by police than in a terrorist attack.) The same intelligence industry that runs their own NSA hacker operations against ISIS uses the same counter-terrorism justification to spy on everyday civilians with no regards for rights to privacy, encryption, or anonymity. They have always targeted Anonymous and other dissident groups as terrorists, and when they aren’t trying to discredit or imprison us, they are attempting to co-opt us – sometimes openly by attending conference like DEFCON, seducing us with promises of money or calls for patriotic duty, other times covertly lurking around IRC channels attempting to steer us unwittingly into supporting their agenda. Remember, Sabu asked me to hack government websites of Syria and Turkey, among others, which I did, unaware he was an FBI informant. They didn’t want to talk about it at my sentencing hearing, but they did condemn my attacks against police and military contractors at length. The agents out there encouraging you to “hack the terrorists” will have no problem turning around and locking you up for years if you are not useful to their agenda. We won’t let Anonymous be unwittingly used to further the military industrial complex’s imperialistic operations around the world. We don’t work for the government – we are against all governments. We are on the side of the oppressed, not the oppressors. We support the victims of war, not the war-makers. If you want to report membership lists and IP addresses of suspected terrorists, go join the CIA or hang out with wannabes like Stratfor or the th3j35t3r. Call it state-sponsored hacking, patriotic hacktivism, whatever – just don’t you dare call yourselves Anonymous. I urge my comrades still out there in the trenches, sitting on some hot 0day, ready to loot databases and trash systems. If you want to stop war and terrorism, target who Martin Luther King Jr. called the “largest purveyor of violence in the word today” – the US government. So Anonymous, get to it – drone manufacturers, white hat infosec contractors, CIA directors, Donald Trump, and your local police department – they all have blood on their hands, they are all fair game. From grarpamp at gmail.com Sun Dec 13 23:27:18 2015 From: grarpamp at gmail.com (grarpamp) Date: Mon, 14 Dec 2015 02:27:18 -0500 Subject: GNU Taler: Taxable Anonymous Libre Electronic Reserve Message-ID: https://taler.net/ Taler technology: About taxability, change and privacy One of the key goals of Taler is to provide anonymity for citizens buying goods and services, while ensuring that the state can observe incoming transactions to ensure businesses engage only in legal activities and do not evade taxes (such as income tax, sales tax or value-added tax). However, we also want to stay out of the immediate personal domain, so sharing funds within a family or copying coins between devices should not be subject to monitoring by the state. In Taler terminology, we distinguish between transactions where the exclusive ownership of the value of a coin is passed from one entity to another, and sharing whereafter control over a coin is shared by multiple electronic wallets (which may belong to different individuals). In Taler, the receiver of a transaction is visible to the state and thus can be taxed, while sharing is invisible to anyone not involved. Once a coin is shared among different individuals, any one of those can try to spend it, but only the first spender would succeed. Thus, sharing requires a strong trust relationship among the individuals involved, and thus represent interactions in the protected immediate personal domain, and not commercial transactions. When Taler needs to provide change, for example because a customer only has a 5 Euro coin but wants to make a 2 Euro purchase, it needs to create fresh coins (of a total value of 3 Euros) that are unlinkable to the original 5 Euro coin to ensure privacy. To ensure that the resulting refresh operation where the change is converted to fresh coins cannot be used to transfer funds from one entity to another, Taler ensures that any owner of an original coin that was involved in a refresh operation can follow a link to the private information of the fresh coins generated by the operation. As a result of this trick, refresh operations cannot be used to create transfers, as the linkage ensures that the fresh coins are always shared with the owner of the original coin. As a result, Taler does not intrude into the personal economic domain, offers good privacy, taxability for transactions and the ability to give change. From grarpamp at gmail.com Sun Dec 13 23:45:12 2015 From: grarpamp at gmail.com (grarpamp) Date: Mon, 14 Dec 2015 02:45:12 -0500 Subject: The USA Fake Of The Moon Landings In-Reply-To: <566e6a30.23288c0a.4da4e.3b29@mx.google.com> References: <566DDD18.9080205@pilobilus.net> <566e6a30.23288c0a.4da4e.3b29@mx.google.com> Message-ID: http://www.naic.edu/~pradar/2014HQ124/ From rysiek at hackerspace.pl Sun Dec 13 17:56:31 2015 From: rysiek at hackerspace.pl (rysiek) Date: Mon, 14 Dec 2015 02:56:31 +0100 Subject: The USA Fake Of The Moon Landings In-Reply-To: <566DDD18.9080205@pilobilus.net> References: <566DDD18.9080205@pilobilus.net> Message-ID: <2987701.EPN7WgeumL@lapuntu> Dnia niedziela, 13 grudnia 2015 16:03:20 Steve Kinney pisze: > How is it possible that the Soviet Union did not detect and expose > the moon landing hoaxes (there were six successful Apollo missions > to the Moon)? Well, because they were not hoaxes: https://www.youtube.com/watch?v=_loUDS4c3Cs I really like this video. So much so that I do tend to take the bait when I have the chance to use it. :) -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From rysiek at hackerspace.pl Sun Dec 13 18:01:20 2015 From: rysiek at hackerspace.pl (rysiek) Date: Mon, 14 Dec 2015 03:01:20 +0100 Subject: Assange believes too late for any pervasive privacy In-Reply-To: <566C5ED9.4060507@pilobilus.net> References: <1851083.N3XvNq979b@lapuntu> <566C5ED9.4060507@pilobilus.net> Message-ID: <12504547.LApHo59QJr@lapuntu> Dnia sobota, 12 grudnia 2015 12:52:25 Steve Kinney pisze: > Privacy supporters who understand network security, understand > that any activity they want to conceal from all surveillance > actors must either be conducted off the network, or via > "anonymizing technology" that degrades network access to a lesser > or greater extent (100% in instances involving two way > communication with people who do not know or care about these > matters), while being observed and recorded by actors hostile to > privacy. I still don't see how that makes it "impossible" -- just very, very hard at the moment. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From zen at freedbms.net Sun Dec 13 19:50:18 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 14 Dec 2015 03:50:18 +0000 Subject: Persuading Putin with Russia's distortion machine Message-ID: An inside, if light hearted, backstage look at RT. I can now understand why certain Americans have been calling for a "media cleansing". http://www.youtube.com/watch?v=S51C6DlqVqQ Just as well those Ukrainian scientists managed to prove that the only person in the world who's not an agent for Putin, is the president of Russia. Z From juan.g71 at gmail.com Sun Dec 13 23:13:00 2015 From: juan.g71 at gmail.com (juan) Date: Mon, 14 Dec 2015 04:13:00 -0300 Subject: The USA Fake Of The Moon Landings In-Reply-To: <566DDD18.9080205@pilobilus.net> References: <566DDD18.9080205@pilobilus.net> Message-ID: <566e6a30.23288c0a.4da4e.3b29@mx.google.com> On Sun, 13 Dec 2015 16:03:20 -0500 Steve Kinney wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On 12/13/2015 11:53 AM, Veg wrote: > > http://blackbag.gawker.com/did-stanley-kubrick-fake-this-video-of- > stanley-kubrick-1747558774 > > OK > > > I'll bite. Just a couple of questions for starters: A couple of answers below, although I don't have a strong either for or against the fake hypothesis, oh sorry, 'nutcase' 'conspiracy' 'theory'. > They call > for speculation, but that seems to be OK in our present context > since the position they challenge is itself based on speculation. > > How is it possible that the Soviet Union did not detect I don't know the technical details. Could radar track the the landing of a small object on the moon in 1960? Can it even do it now? ? and expose > the moon landing hoaxes (there were six successful Apollo missions > to the Moon)? > > How is it possible that simulating the Apollo missions could be > less expensive, Well, that's usually the point of simulating something. It's cheaper. Plus, if you actually can't do something then the other option is to 'simulate', aka, faking it. > > :o) > > > > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1 > > iQIcBAEBAgAGBQJWbd0VAAoJEDZ0Gg87KR0LYO8P/149JrPiCQjb9Bnr6icPKBeG > DNwAQcmXZggabtLn2H42Q2tWfyZBgZjexYIFXz24k4VUaGFFoZijF4zJ34Cv8Up/ > S939sypS0y51jhTrB8n21IvsoedP7SAWoDTZOpTPAvfHMqfvp5tJDt94qswTtkp3 > hhh/xamfDOQpnn0jf+23kjpe0GHtm6dv1aLcYG9zxh2m3+SPSDmNVtVrZTx737Ky > pUKgEAA3rGlC/42+xN7rPE0SlTue9PS2dlNOve3xM4mkvx+8WzTL7EBToOSrn2ze > pMNP/VdI+OQYxrKpiZUKvVytjoGCNpNrNRLsoLQGeDx17+51IBMqh+hUW3h0vSf1 > kmdECgm39EhEyda0BB2Wep9/O7E9JjX6wTTHus1eKkdIuLDomDd5aNcWFm7tpfAi > UCzBxBQS1izYG9rg8FBkA4lTFw4XCfwvg4XRbZ3J2lwoddEl2fcoTJQstFgXhqh0 > uY9IbNXisrBDrrP+m5sDCOLR/iMfuruX0PuRGKECKfjJcQ9tvCfPOg94YCsDtHaG > A9sLmOc7qmXYGw9/N1NBHE5UOHi+2qlHdC2kyMv8XcDkJPx9cQZSkmXm5dK3gGZs > tyRGJ26laVQZuwKhxLPAzN+8eOQLjQnQzLos8GDR/vBc2a3tOYVFib6K2aXr6SF3 > JfNqb2i49Izq4OFjKXBH > =fkgY > -----END PGP SIGNATURE----- From juan.g71 at gmail.com Sun Dec 13 23:14:51 2015 From: juan.g71 at gmail.com (juan) Date: Mon, 14 Dec 2015 04:14:51 -0300 Subject: The USA Fake Of The Moon Landings In-Reply-To: <388919528.744650.1450072569022.JavaMail.yahoo@mail.yahoo.com> References: <566DDD18.9080205@pilobilus.net> <388919528.744650.1450072569022.JavaMail.yahoo@mail.yahoo.com> Message-ID: <566e6a9e.a315370a.526a9.ffffe627@mx.google.com> On Mon, 14 Dec 2015 05:56:08 +0000 (UTC) jim bell wrote: > ----- Original Message ----- > > From: Steve Kinney > To: cypherpunks at cpunks.org > Sent: Sunday, December 13, 2015 1:03 PM > Subject: Re: The USA Fake Of The Moon Landings > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On 12/13/2015 11:53 AM, Veg wrote: > > http://blackbag.gawker.com/did-stanley-kubrick-fake-this-video-of- > stanley-kubrick-1747558774 > > > >Example: No dust on the faceplate in a very famous photo of an > >astronaut on the moon. This widely distributed "proof" of a moon > >landing hoax falls flat when placed in its native context: The > >propaganda extravaganza around the Apollo program produced and > >published /lots/ of high quality graphics. Time Magazine used all > >the photos they really liked, without referencing which were taken > >in training environments vs. on the Moon OR hesitating to > >extensively retouch the "real" pictures for maximum artistic quality > > One ostensible 'disproof' of the moon landing was the claim that the > video camera didn't show any stars in the moon's sky. However, the > scenery seen in those shots (lunar soil; equipment; astronauts) was > extremely bright, somewhat like a beach in full sunlight. The > contrast ratios of (non-silicon) video pickup tubes I think the objection is that the stars are missing on ordinary pictures shot using ordinary (super amazing military grade) film. > in that era were > not wide, meaning that any star in the sky (other than the sun) > couldn't be visible AND show the backgrounds too. Jim Bell From juan.g71 at gmail.com Sun Dec 13 23:44:29 2015 From: juan.g71 at gmail.com (juan) Date: Mon, 14 Dec 2015 04:44:29 -0300 Subject: GNU Taler: Taxable Anonymous Libre Electronic Reserve In-Reply-To: References: Message-ID: <566e7191.c61e8c0a.48a2d.ffffe3ea@mx.google.com> On Mon, 14 Dec 2015 02:27:18 -0500 grarpamp wrote: > https://taler.net/ > > Taler technology: About taxability, change and privacy > > One of the key goals of Taler is to provide anonymity for citizens > buying goods and services, while ensuring that the state can observe > incoming transactions to ensure businesses engage only in legal > activities Stupid cunts. These 'gnu' monkeys are hopeless. > and do not evade taxes (such as income tax, sales tax or > value-added tax). However, we also want to stay out of the immediate > personal domain, so sharing funds within a family or copying coins > between devices should not be subject to monitoring by the state. > > In Taler terminology, we distinguish between transactions where the > exclusive ownership of the value of a coin is passed from one entity > to another, and sharing whereafter control over a coin is shared by > multiple electronic wallets (which may belong to different > individuals). In Taler, the receiver of a transaction is visible to > the state and thus can be taxed, while sharing is invisible to anyone > not involved. Once a coin is shared among different individuals, any > one of those can try to spend it, but only the first spender would > succeed. Thus, sharing requires a strong trust relationship among the > individuals involved, and thus represent interactions in the protected > immediate personal domain, and not commercial transactions. > > When Taler needs to provide change, for example because a customer > only has a 5 Euro coin but wants to make a 2 Euro purchase, it needs > to create fresh coins (of a total value of 3 Euros) that are > unlinkable to the original 5 Euro coin to ensure privacy. To ensure > that the resulting refresh operation where the change is converted to > fresh coins cannot be used to transfer funds from one entity to > another, Taler ensures that any owner of an original coin that was > involved in a refresh operation can follow a link to the private > information of the fresh coins generated by the operation. As a result > of this trick, refresh operations cannot be used to create transfers, > as the linkage ensures that the fresh coins are always shared with the > owner of the original coin. > > As a result, Taler does not intrude into the personal economic domain, > offers good privacy, taxability for transactions and the ability to > give change. From zen at freedbms.net Sun Dec 13 21:26:06 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 14 Dec 2015 05:26:06 +0000 Subject: Who we are up against In-Reply-To: <566DF771.3060506@pilobilus.net> References: <20151213160135.GB3799@sivokote.iziade.m$> <566DF771.3060506@pilobilus.net> Message-ID: On 12/13/15, Steve Kinney wrote: > On 12/13/2015 11:01 AM, Georgi Guninski wrote: >> On Sun, Dec 13, 2015 at 03:20:15PM +0000, Zenaan Harkness >> wrote: >>> For those who have not yet read of this, it's a must to >>> comprehend. Lest ye doubt humans are rightly labelled >>> 'sheep'. >> >> Call me a crank, but I am against the sheeple. >> >> Sheeple are major cause of trouble, electing current so called >> "establishment". >> >>> https://en.wikipedia.org/wiki/Milgram_experiment > > When I see or hear the word 'sheeple' I think about how successful > our adversaries have been in dividing the people they prey on into > mutually hostile factions, each of which blames the actions of > their common enemy on the others. I agree that the wording I chose for the subject could be seen as divisive, yet is confronting since it suggests a specific target, which target turns out to be "most people/sheeple". The divisive part is not good, but also not intended. The "we need to be alert to reality - this is big/bad" is intended and I think is essential to assessing anything sane. I recall reading that Wikipedia article a few years ago, yet it had no less impact upon me, on my second reading. > Populist and reformist politics > ends and mindless compliance begins when people decide that they > are categorically superior to those who don't happen to belong to > their own gang, and start speaking and acting on that basis. No, not the compliance bit at least. Just because I speak arrogantly, refused to wear a school uniform for -years- in a row and use vehemence and confronting language when I communicate, does NOT mean I am the cause of those "sheeple" who be compliance with mindless authority! You can't be seriously suggesting as much, surely. In fact "sheep" is about as apt as it gets when describing compliant (to arbitrary authority) people. And the Migram experiments show that humans by an overwhelming majority, are in fact sheep, even in the face of their own stress, their own tears, inner conflict, emotional pain - they -still- fucking comply with arbitrary (worse, despotic!!) authority! "We humans" are so woefully inadequate to the task of complying with our own conscience or inner sense of right and wrong, and so woefully tied to compliance with external authority, it is shocking, embarrassing, upsetting and yes, confronting. But fuck, don't shoot the messenger! Put your confronting reaction to something constructive - try to figure out how to simply and expediently educate those you come across to counter this problem - if you have actual successes, please share those, as that may go some significant way to enlightening us all on how to handle this very confronting problem. Another shot to prod you along a bit further: Those who are compliant with despotic external authority in the face of their own inner conscience of right and wrong, ought be regarded as other/ outer/ "them", and treated with extreme caution! "Those" sheep happens to be about 60% to 90% of everyone! You wanna sweep -that- under the carpet of your politically correct boat? Regards, Zenaan From zen at freedbms.net Sun Dec 13 21:39:19 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 14 Dec 2015 05:39:19 +0000 Subject: A woman with balls ^B ovaries! - Fwd: Ann Barnhardt's response to a Muslim death threat. Message-ID: So, you think you are -not- a sheeple who's compliant with despotic external authority (of any kind)? Try Ann Barnhardt's response on for size. My kind of woman! Make that, my kind of human! Regards, Zenaan ---------- Forwarded message ---------- From: Jim Date: Mon, 14 Dec 2015 13:56:51 +1100 Subject: Ann Barnhardt's response to a Muslim death threat. FW: Please Pass the Pork Crackle - ----- Original Message ----- Subject: FW: Please Pass the Pork Crackle - Hi everybody, this is a very courage's lady. - Werner This is the lady who used bacon strips as bookmarks while reading from the Koran and then she ripped out the pages and burned them...... all on video. Ann Barnhart is described as "a livestock and grain commodity broker and marketing consultant, American patriot, traditional Catholic, and unwitting counter-revolutionary blogger." She has taken on Islam and they have noticed. https://www.truthorfiction.com/ann-barnhardt/ Summary of eRumor: This is a feisty response from an Colorado woman named Ann Barnhardt to a person who sent a message through her web site that included a death threat against her. Barnhardt is a livestock and grain commodity broker and marketing consultant who, among other things, has been critical of the Obama administration and of Islam. The Truth: Ann Barnhardt told TruthOrFiction.com that the death threat was real and so was her public response, which she posted on her web site. The death threat came from an alleged Muslim who posted a comment in July 2011 to a video that Barnhardt released on YouTube. Click for Barnhardt's website. updated 10/09/11 A real example of the eRumor as it has appeared on the Internet: Ann Barnhardt is described as "a livestock and grain commodity broker and marketing consultant, American patriot, traditional Catholic, and unwitting counter-revolutionary blogger. She can be reached through her business at www.barnhardt.biz." She has taken on Islam and they have noticed. DEATH THREAT: To:annbarnhardt I'm going to kill you when I find you. Don't think I won't, I know where you and your parents live and I'll need is one phone-call to kill ya'll. ANN'S RESPONSE: Re: Watch your back. Hello mufcadnan123! You don't need to "find" me. My address is 9175 Kornbrust Circle, Lone Tree, CO 80124. Luckily for you, there are daily DIRECT FLIGHTS from Heathrow to Denver. Here's what you will need to do. After arriving at Denver and passing through customs, you will need to catch the shuttle to the rental car facility. Once in your rental car, take Pena Boulevard to I-225 south. Proceed on I-225 south to I-25 south. Proceed south on I-25 to Lincoln Avenue which is exit 193. Turn right (west) onto Lincoln. Proceed west to the fourth light, and turn left (south) onto Ridgegate Boulevard. Proceed south, through the roundabout to Kornbrust Drive. Turn left onto Kornbrust Drive and then take an immediate right onto Kornbrust Circle. I'm at 9175. Just do me one favor. PLEASE wear body armor. I have some new ammunition that I want to try out, and frankly, close-quarter body shots without armor would feel almost unsporting from my perspective. That and the fact that I'm probably carrying a good 50 I.Q. points on you makes it morally incumbent upon me to spot you a tactical advantage. However, being that you are a miserable, trembling coward, I realize that you probably are incapable of actually following up on any of your threats without losing control of your bowels and crapping your pants while simultaneously sobbing yourself into hyperventilation. So, how about this: why don't you contact the main mosque here in Denver and see if some of the local musloids here in town would be willing to carry out your attack for you? After all, this is what your "perfect man" mohamed did (pig excrement be upon him). You see, mohamed, being a miserable coward and a con artist, would send other men into battle to fight on his behalf. Mohamed would stay at the BACK of the pack and let the stupid, ignorant suckers like you that he had conned into his political cult do the actual fighting and dying. Mohamed would then fornicate with the dead men's wives and children. You should follow mohamed's example! Here is the contact info for the main mosque here in Denver : Masjid Abu Bakr Imam Karim Abu Zaid 2071 South Parker Road Denver, CO 80231 Phone: 303-696-9800 Email: denvermosque at yahoo.com I'm sure they would be delighted to hear from you. Frankly, I'm terribly disappointed that not a SINGLE musloid here in the United States has made ANY attempt to rape and behead me. But maybe I haven't made myself clear enough, so let me do that right now. I will NEVER, EVER, EVER submit to islam. I will fight islam with every fiber of my being for as long as I live because islam is pure satanic evil. If you are really serious about islam dominating the United States and the world, you are going to have to come through me. You are going to have to kill me. Good luck with that. And understand that if you or some of your musloid boyfriends do actually manage to kill me, The Final Crusade will officially commence five minutes later, and then, despite your genetic mental retardation, you will be made to understand with crystal clarity what the word "defeat" means. Either way, I win, so come and get it. Deo adjuvante non timendum (with the help of God there is nothing to be afraid of). Ann Barnhardt https://www.truthorfiction.com/ann-barnhardt/ -------------- next part -------------- A non-text attachment was scrubbed... Name: jihad works both ways_c.jpg Type: image/jpeg Size: 78969 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: AnnBarnhardt.jpg Type: image/jpeg Size: 4799 bytes Desc: not available URL: From juan.g71 at gmail.com Mon Dec 14 00:55:11 2015 From: juan.g71 at gmail.com (juan) Date: Mon, 14 Dec 2015 05:55:11 -0300 Subject: The USA Fake Of The Moon Landings In-Reply-To: <1982467174.754172.1450081153069.JavaMail.yahoo@mail.yahoo.com> References: <566e6a9e.a315370a.526a9.ffffe627@mx.google.com> <1982467174.754172.1450081153069.JavaMail.yahoo@mail.yahoo.com> Message-ID: <566e8224.d0e48c0a.8484a.ffffe696@mx.google.com> On Mon, 14 Dec 2015 08:19:13 +0000 (UTC) jim bell wrote: > > > > > ----- Original Message ----- > From: juan > To: cypherpunks at cpunks.org > Cc: jim bell > Sent: Sunday, December 13, 2015 11:14 PM > Subject: Re: The USA Fake Of The Moon Landings > > On Mon, 14 Dec 2015 05:56:08 +0000 (UTC) > jim bell wrote: > [clipped] > > One ostensible 'disproof' of the moon landing was the claim that the > > video camera didn't show any stars in the moon's sky. However, the > > scenery seen in those shots (lunar soil; equipment; astronauts) was > > extremely bright, somewhat like a beach in full sunlight. The > > contrast ratios of (non-silicon) video pickup tubes > > > > I think the objection is that the stars are missing on ordinary > > pictures shot using ordinary (super amazing military grade) > > film. > > Again, not surprising. Take a picture of a (non-sun) star, with a > small-lens camera (under 50 inch objective) and that star should > appear as a point source of light, if the camera is well-focussed. > Even then, the amount of light hitting that analog "pixel" is > probably vastly lower than a camera aiming at a nearby surface > illuminated by earth's Sun, as would be seen on the Moon by an > astronaut taking a picture. Oh, ok. So in principle the stars were underexposed to the point of not showing up on film. On the other hand, if you point a camera at the sky, on the moon, during the lunar night, shouldn't you be able to get...something? What about radar resolution? Is it possible to track a 5 x 5 x 5 m object from a distance of 350,000 kilometers? > http://petapixel.com/2015/05/26/film-vs-digital-a-comparison-of-the-advantages-and-disadvantages/ > "A release by Kodak showcased that most film has around 13 stops of > dynamic range." That's a factor of about 8000. Jim Bell From jdb10987 at yahoo.com Sun Dec 13 21:56:08 2015 From: jdb10987 at yahoo.com (jim bell) Date: Mon, 14 Dec 2015 05:56:08 +0000 (UTC) Subject: The USA Fake Of The Moon Landings In-Reply-To: <566DDD18.9080205@pilobilus.net> References: <566DDD18.9080205@pilobilus.net> Message-ID: <388919528.744650.1450072569022.JavaMail.yahoo@mail.yahoo.com> ----- Original Message ----- From zen at freedbms.net Sun Dec 13 22:38:28 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 14 Dec 2015 06:38:28 +0000 Subject: The USA Fake Of The Moon Landings In-Reply-To: <388919528.744650.1450072569022.JavaMail.yahoo@mail.yahoo.com> References: <566DDD18.9080205@pilobilus.net> <388919528.744650.1450072569022.JavaMail.yahoo@mail.yahoo.com> Message-ID: On 12/14/15, jim bell wrote: > One ostensible 'disproof' of the moon landing was the claim that the video > camera didn't show any stars in the moon's sky. However, the scenery seen > in those shots (lunar soil; equipment; astronauts) was extremely bright, > somewhat like a beach in full sunlight. The contrast ratios of > (non-silicon) video pickup tubes in that era were not wide, meaning that any > star in the sky (other than the sun) couldn't be visible AND show the > backgrounds too. Perhaps we can encourage the Russkies in their 2030 moon landing, to take up the same cameras that were (supposedly) used to take those shots, and re-take those shots. You know, to finally get an indisputable definitive answer, since a photo would, you know, provide that and all... :) Z From zen at freedbms.net Mon Dec 14 00:11:22 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 14 Dec 2015 08:11:22 +0000 Subject: Who we are up against In-Reply-To: <566E697D.1040900@pilobilus.net> References: <20151213160135.GB3799@sivokote.iziade.m$> <566DF771.3060506@pilobilus.net> <566E697D.1040900@pilobilus.net> Message-ID: On 12/14/15, Steve Kinney wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On 12/14/2015 12:26 AM, Zenaan Harkness wrote: >> On 12/13/15, Steve Kinney wrote: >>> On 12/13/2015 11:01 AM, Georgi Guninski wrote: >>>> On Sun, Dec 13, 2015 at 03:20:15PM +0000, Zenaan Harkness >>>> wrote: >>>>> For those who have not yet read of this, it's a must to >>>>> comprehend. Lest ye doubt humans are rightly labelled >>>>> 'sheep'. >>>> >>>> Call me a crank, but I am against the sheeple. >>>> >>>> Sheeple are major cause of trouble, electing current so >>>> called "establishment". >>>> >>>>> https://en.wikipedia.org/wiki/Milgram_experiment >>> >>> When I see or hear the word 'sheeple' I think about how >>> successful our adversaries have been in dividing the people >>> they prey on into mutually hostile factions, each of which >>> blames the actions of their common enemy on the others. ... > I have been pushing this packet of books for around a year now, > and from time to time it seems to have been well received: It's a > course in remedial politics, intended to fill basic gaps in > people's information about how populist a.k.a. anarchist politics > actually works: > > http://pilobilus.net/strategic_conflict_docs_intro.html Thank you. Added to my to read list. >> Another shot to prod you along a bit further: >> >> Those who are compliant with despotic external authority in the >> face of their own inner conscience of right and wrong, ought be >> regarded as other/ outer/ "them", and treated with extreme >> caution! >> >> "Those" sheep happens to be about 60% to 90% of everyone! You >> wanna sweep -that- under the carpet of your politically correct >> boat? > > The presumption that people who are notably compliant with > illegitimate authority have a "conscience" and fixed notions of > right and wrong is questionable. We're talking about the Milgram experiment - instructor (authority, actor), teacher (the sheep), learner (electro shock pain receiver for wrong answers, actor). In this experiment, which was repeated numerous times, in various countries, and even in recent times, in all cases the results have been highly consistent, and includes examples of "teacher" (sheep) in so much emotional stress that they would be crying, yet when prompted with the 4 standard commands from the "instructor", would nearly always go along, applying life threatening electric shocks to someone they'd just met whom they knew had a heart condition. My summary is woeful so read the wikipedia page, but the gist is the relevant point - despite all sorts of responses from the "teacher"/sheep which clearly indicate that they were experiencing emotional stress, questioning/ challenging if they really should be doing what they were being asked to do, crying, shaking uncontrollably etc etc, in 60% to 90%+ of cases, the human sheep, with up to 4 simple and escalating commands from the "external authority figure", submits their own will/ "conscience" (call it what you like, but their reactions demonstrate what I name as "conscience") to the will of the "instructor authority" and continues to apply potentially lethal electric shocks to the "learner with a heart condition". The results speak for themselves! > Those who comply most eagerly include sociopathic > personalities and people who are all to easily > led due to other disorders. > > The "60% to 90%" cover a spectrum from grudging, minimal > compliance to elaborate and even competitive compliance, typically > related to the degree that their individual income and social > status benefit from a show of compliance. The results speak for themselves. You keep apologising in subtle(?) ways - "oh, it's only the most eager sociopaths" and "all the others must have had some other disorders". Seriously? The results speak for themselves and speak very loudly - humans are majorly missing some fundamental tools to handle despotic external authority. These experiments were invented as the Nuremberg trials were underway, in a specific attempt to understand/ comprehend the defenses that the accused Nazis (military officers) on trial were giving. The experiment verified that "yes, this -is- how humans act in such situations". This result doesn't need our qualification nor any apology! 'We' need a solution to educating 'ourselves' - our 'fellow sheep'! > But as the gap between > rewards promised and rewards delivered continues to widen, and the > violent excesses of our rulers become more and more obvious, > compliance will continue to decline. Please - "obviousness" is not a citation! And then "we" all suffer your proposed "violent excesses of our rulers" - what sort of solution is that?!!! As history shows, not until WAY after its much too late to be relevant to those who suffer the torture and or death arising from your stated "violent excesses of our rulers". Why do you keep qualifying this as though it's somehow "ok" and "explainable" - are you proposing to remove the "reward" of all salaries of all government employees? I'm sure Juan and I would agree - but do you think that would be attainable? Right, just like before Libya got blown up by the USA - refer Hillary "We came, we saw he [Gaddafi] died" Clinton? > This creates a growth market > for populist political agitators - a market that opponents and > supporters of authoritarian rule are already competing to capture. What do you mean by "this"? I cannot comprehend this sentence. > Politics is about power: Who has it, who doesn't, and how these > groups interact. The object of political activity is to obtain > and exercise power, toward whatever ends one chooses. Political That might be your idea. Politics is a little about power, but more about authority - exercising authority in the context of a shared common delusion of "democracy" or whatever the regime of the day is spouting to its sheep! And Milgram showed us definitively that most people are sheep who will submit to any and every external authority firmly put to them (eg verbally), right up to and including the point at which that sheep will be applying deadly force to another "fellow sheep". > models and strategies that actually work in this context are > "correct" while those that do not work are "incorrect." What do you mean by "work"? Note to yourself - my definition of "works" may be different to yours. These generalisms slow the conversation down. > There is a time and place for everything, Like ritual human sacrifice? > but rarely a time when elitism, > or driving wedges between groups who have political enemies in > common with oneself, is "correct" in a functional sense. So your position is that Milgram, by doing his experiment, and empirically showing us that humans are despotically submissive sheep, is fundamentally being elitist? Or pointing out Milgrim's result is elitist? Or warning that a huge percentage of humans are despotically submissive is elitist? Or that this mass debate you're engaging in is your hissy fit over the term "sheep" to describe humans? Humans as demonstrated to a shocking degree by Milgram's experiments? In that case, the term sheep is seriously understated! How about this then eh: Humans are breathing, eating, sleeping and shitting (BESS) drones, easily caused to submit their wills to comply with external commands and to do absolutely despotic acts; witness Milgram, witness Nuremberg trials. Humans, the BESS drones man, just the BESS! Better? Regards, Zenaan From jdb10987 at yahoo.com Mon Dec 14 00:19:13 2015 From: jdb10987 at yahoo.com (jim bell) Date: Mon, 14 Dec 2015 08:19:13 +0000 (UTC) Subject: The USA Fake Of The Moon Landings In-Reply-To: <566e6a9e.a315370a.526a9.ffffe627@mx.google.com> References: <566e6a9e.a315370a.526a9.ffffe627@mx.google.com> Message-ID: <1982467174.754172.1450081153069.JavaMail.yahoo@mail.yahoo.com> ----- Original Message ----- From: juan To: cypherpunks at cpunks.org Cc: jim bell Sent: Sunday, December 13, 2015 11:14 PM Subject: Re: The USA Fake Of The Moon Landings On Mon, 14 Dec 2015 05:56:08 +0000 (UTC) jim bell wrote: [clipped] > One ostensible 'disproof' of the moon landing was the claim that the > video camera didn't show any stars in the moon's sky. However, the > scenery seen in those shots (lunar soil; equipment; astronauts) was > extremely bright, somewhat like a beach in full sunlight. The > contrast ratios of (non-silicon) video pickup tubes > I think the objection is that the stars are missing on ordinary > pictures shot using ordinary (super amazing military grade) > film. Again, not surprising. Take a picture of a (non-sun) star, with a small-lens camera (under 50 inch objective) and that star should appear as a point source of light, if the camera is well-focussed. Even then, the amount of light hitting that analog "pixel" is probably vastly lower than a camera aiming at a nearby surface illuminated by earth's Sun, as would be seen on the Moon by an astronaut taking a picture. http://petapixel.com/2015/05/26/film-vs-digital-a-comparison-of-the-advantages-and-disadvantages/ "A release by Kodak showcased that most film has around 13 stops of dynamic range." That's a factor of about 8000. Jim Bell From zen at freedbms.net Mon Dec 14 01:38:45 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 14 Dec 2015 09:38:45 +0000 Subject: A woman with balls ^B ovaries! - Fwd: Ann Barnhardt's response to a Muslim death threat. In-Reply-To: References: Message-ID: On 12/14/15, grarpamp wrote: > On Mon, Dec 14, 2015 at 12:39 AM, Zenaan Harkness wrote: >> Try Ann Barnhardt's response on for size. My kind of woman! > > Cypher? Who knows. Punk? Definitely. > Breakin it down in vid 1, money shot in vid 2. > > https://www.youtube.com/watch?v=Qeyrp-V3Jvc > https://www.youtube.com/watch?v=_LCLDjPNpf4 Legendary :) From zen at freedbms.net Mon Dec 14 02:21:49 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 14 Dec 2015 10:21:49 +0000 Subject: A woman with balls ^B ovaries! - Fwd: Ann Barnhardt's response to a Muslim death threat. In-Reply-To: References: Message-ID: Had this forwarded to me: 60 minutes on Kurdish women (YPJ) kicking some ISIS arse: https://www.youtube.com/watch?v=ybcsRbhnpnc ~220MiB RT documentary on same: https://www.youtube.com/watch?v=uqI0a4VgEs8 ~900MiB From rysiek at hackerspace.pl Mon Dec 14 01:58:12 2015 From: rysiek at hackerspace.pl (rysiek) Date: Mon, 14 Dec 2015 10:58:12 +0100 Subject: The USA Fake Of The Moon Landings In-Reply-To: References: <566DDD18.9080205@pilobilus.net> <388919528.744650.1450072569022.JavaMail.yahoo@mail.yahoo.com> Message-ID: <6748634.juiOMlrbjq@lapuntu> Dnia poniedziałek, 14 grudnia 2015 06:38:28 Zenaan Harkness pisze: > You know, to finally get an indisputable definitive answer, since a > photo would, you know, provide that and all... Maybe you can instead fond somebody with large and focused enough laser and make an experiment that would, you know, end this absurd discussion: https://en.wikipedia.org/wiki/Apache_Point_Observatory_Lunar_Laser-ranging_Operation -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From zen at freedbms.net Mon Dec 14 03:02:04 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 14 Dec 2015 11:02:04 +0000 Subject: A woman with balls ^B ovaries! - Fwd: Ann Barnhardt's response to a Muslim death threat. In-Reply-To: References: Message-ID: Might be close to anarchy (of the political kind), in Syria today: Rojava: A Sincere Revolution https://www.youtube.com/watch?v=CcLPyfgXBAk ~70MiB From Rayzer at riseup.net Mon Dec 14 13:12:50 2015 From: Rayzer at riseup.net (Rayzer) Date: Mon, 14 Dec 2015 13:12:50 -0800 Subject: Jeremy Hammond Rejects and Redirs OpISIS and Co-opted Anon In-Reply-To: References: Message-ID: <566F30D2.5030407@riseup.net> grarpamp wrote: > https://freejeremy.net/2015/12/10/reject-opisis-and-the-co-opting-of-anonymous/ > > Reject #OpIsis and the Co-Opting of Anonymous > > In this new writing, Jeremy shares his views on Anonymous, #OpISIS, > and the recent wave of anti-immigrant sentiment that has been sweeping > the nation. > > ________________________________ SOMEONE has an analysis... No wonder he's been imprisoned. -- RR "You might want to ask an expert about that - I just fiddled around with mine until it worked..." -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From juan.g71 at gmail.com Mon Dec 14 10:12:04 2015 From: juan.g71 at gmail.com (juan) Date: Mon, 14 Dec 2015 15:12:04 -0300 Subject: GNU Taler: Taxable Anonymous Libre Electronic Reserve In-Reply-To: <20151214151915.GC2654@sivokote.iziade.m$> References: <566e7191.c61e8c0a.48a2d.ffffe3ea@mx.google.com> <20151214151915.GC2654@sivokote.iziade.m$> Message-ID: <566f04a2.11db8c0a.47bb6.3337@mx.google.com> On Mon, 14 Dec 2015 17:19:15 +0200 Georgi Guninski wrote: > On Mon, Dec 14, 2015 at 04:44:29AM -0300, juan wrote: > > On Mon, 14 Dec 2015 02:27:18 -0500 > > grarpamp wrote: > > > > > https://taler.net/ > > > > > > Taler technology: About taxability, change and privacy > > > > > > One of the key goals of Taler is to provide anonymity for citizens > > > buying goods and services, while ensuring that the state can > > > observe incoming transactions to ensure businesses engage only in > > > legal activities > > > > Stupid cunts. These 'gnu' monkeys are hopeless. > > > > https://taler.net/ > >>>> under development at _Inria_. > > More like Inria cunts. > https://taler.net/about " 'dr' sallman 'ethics' enthusiast" - how fuckingly retarded can that asshole be? "julian kirsch hacks Linux, FreeBSD, Web sites and the deep state at leisure." fucking statist thinks he's 'hacking' the state? I think these cunts thoroughly enjoy mocking their audience. See, gnu users are sheeple too! They are left-wing state worshipers, a particularly nasty kind of sheep. "christian grothoff Local **megalomaniac**. I mean, who'd create a new payment system and a new Internet?" <--- at least that one is sincere. Sort of. > Significant part of inria are in bed with m$, including the Coq > charlatans. Oh, thanks for the pointer. So inria is the french government and they work for one of the flagships of american corporatism. All of which is a textbook case of corporatism 101. The slightly entertaing thing is that stallman, the god of 'free' software and his gnu-bots are accomplices too. "controlled opposition" From admin at pilobilus.net Mon Dec 14 12:50:52 2015 From: admin at pilobilus.net (Steve Kinney) Date: Mon, 14 Dec 2015 15:50:52 -0500 Subject: Who we are up against In-Reply-To: References: <20151213160135.GB3799@sivokote.iziade.m$> <566DF771.3060506@pilobilus.net> <566E697D.1040900@pilobilus.net> Message-ID: <566F2BAC.7070703@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 12/14/2015 03:11 AM, Zenaan Harkness wrote: >> I have been pushing this packet of books for around a year >> now, and from time to time it seems to have been well >> received: It's a course in remedial politics, intended to >> fill basic gaps in people's information about how populist >> a.k.a. anarchist politics actually works: >> >> http://pilobilus.net/strategic_conflict_docs_intro.html > > Thank you. Added to my to read list. Ding! Another customer enters the shop... >>> Another shot to prod you along a bit further: >>> >>> Those who are compliant with despotic external authority in >>> the face of their own inner conscience of right and wrong, >>> ought be regarded as other/ outer/ "them", and treated with >>> extreme caution! >>> >>> "Those" sheep happens to be about 60% to 90% of everyone! >>> You wanna sweep -that- under the carpet of your politically >>> correct boat? >> >> The presumption that people who are notably compliant with >> illegitimate authority have a "conscience" and fixed notions >> of right and wrong is questionable. > > We're talking about the Milgram experiment - instructor > (authority, actor), teacher (the sheep), learner (electro shock > pain receiver for wrong answers, actor). [ ... ] > The results speak for themselves! Indeed they do. In a context where the test subjects are self-selected (volunteers) from a population and culture deeply committed to elaborate, labor intensive submission to authority (college students), with "the boss" hovering over them demanding compliance (politely of course), most will continue "only following orders" to the point of endangering the lives of anonymous strangers. I'm not sure this generalizes to describe the behavior of whole populations in the wild, though. Certainly, every country of any size has more than enough pathological "followers" to field military forces, run concentration camps, etc. But I think "60% to 90%" of any population is a very high estimate. > The results speak for themselves. You keep apologising in > subtle(?) ways - "oh, it's only the most eager sociopaths" and > "all the others must have had some other disorders". > > Seriously? Nope: I was expressly talking about "Those who comply most eagerly", not the much larger number whose compliance is marginal, grudging, or largely pretended. > This result doesn't need our qualification nor any apology! > 'We' need a solution to educating 'ourselves' - our 'fellow > sheep'! You'll get no arguments from me on that point: If I could find a way to put that on a paying basis, I would probably not be flat broke today. Major clue: The most persistent and effective populist resistance movements have emerged from religious communities. Our adversaries understand this well, and spare no expense promoting atheism to the demographic groups most likely to engage in political activism. Terminally corrupt, easily bought clergy - a minority among that occupation - are kept front and center in public view by mass media outlets, for the dual purpose of alienating as many 'natural born rebels' as possible from religion in general, and recruiting as many 'natural born killers' as possible into a "God and Country" eg. God IS Country cult paradigm. >> But as the gap between rewards promised and rewards delivered >> continues to widen, and the violent excesses of our rulers >> become more and more obvious, compliance will continue to >> decline. > > Please - "obviousness" is not a citation! More obvious to the general public: As an example consider the unprecedented mass media coverage of violent crimes by police officers, and social network propaganda campaigns like those run by Black Lives Matter, Cop Watch, etc. Likewise, Liberals and Conservatives are acutely aware of mass scale economic crimes by our rulers: The Liberals are taught to blame Capitalism and the Conservatives to blame Socialism. The real perpetrators are billionaires who use Capitalist or Socialist models where and as they provide maximum advantage; as long as the general public fails to recognize this the game can continue - but no matter what, the looting of national economies and attendant reductions in the rewards of obedience continues. > And then "we" all suffer your proposed "violent excesses of > our rulers" - what sort of solution is that?!!! I have not proposed violent excesses, I have observed them. Big difference. > As history shows, not until WAY after its much too late to be > relevant to those who suffer the torture and or death arising > from your stated "violent excesses of our rulers". History: Satyagraha, Civil Rights, People Power and the Zapatista movement never happened? The Dutch did not bring Nazification of their country to a grinding halt, and Iceland is still controlled by a gang of criminal bankers? As rationalizations go, imagining State and Corporate actors to be all-powerful and civil society weak and helpless, is a GREAT excuse for personal non-action. That's why State aligned actors consistently present these Big Lies as Eternal Truths. > Why do you keep qualifying this as though it's somehow "ok" > and "explainable" - are you proposing to remove the "reward" of > all salaries of all government employees? I'm sure Juan and I > would agree - but do you think that would be attainable? Right, > just like before Libya got blown up by the USA - refer Hillary > "We came, we saw he [Gaddafi] died" Clinton? An angry fighter is a losing fighter. Things that are not "OK" are in fact explainable, and if your explanations accurately model the causes of Bad Things, they will enable you to develop effective strategies for reducing or eliminating those Bad Things. We have all been taught that Bad Things are done by Bad People, and that the universal solution is to identify, hate, and destroy those Bad People. We are taught this by propagandists employed by Bad People, so that our responses to the bad things they do will be self defeating. The same naive beliefs are essential for promoting wars of economic conquest, where people must be persuaded that certain foreign leaders are Bad People who must be hated and destroyed. As for removing the promised rewards of full compliance with illegitimate authority, that is a self-solving problem if one waits long enough. Right now in the former Western Democracies, those rewards are being removed by the ruling class, via wholesale looting of national economies at the fastest pace that will not cause them to immediately collapse. This looting is necessary to sustain the exponential growth of corporate enterprise, which is necessary to its own survival and to the financial ambitions of our billionaires: The exponential growth of the global industrial economy has reached hard limits imposed by geophysics; the only way to keep our billionaires' portfolios growing is redistribution of wealth from the poor and middle classes to the very rich. >> This creates a growth market for populist political agitators >> - a market that opponents and supporters of authoritarian >> rule are already competing to capture. > > What do you mean by "this"? I cannot comprehend this > sentence. What I mean by "this" requires the context of the paragraph the sentence above has been removed from: "This" is the growing gap between rewards promised and rewards delivered, in return for committed compliance with the demands of illegitimate authority. >> Politics is about power: Who has it, who doesn't, and how >> these groups interact. The object of political activity is >> to obtain and exercise power, toward whatever ends one >> chooses. Political > > That might be your idea. You might say that I'm a dreamer, but I'm not the only one. > Politics is a little about power, but more about authority - > exercising authority in the context of a shared common delusion > of "democracy" or whatever the regime of the day is spouting to > its sheep! Power creates authority. Authority is the exercise of expressly defined power. > And Milgram showed us definitively that most people are sheep > who will submit to any and every external authority firmly put > to them (eg verbally), right up to and including the point at > which that sheep will be applying deadly force to another > "fellow sheep". > > >> models and strategies that actually work in this context are >> "correct" while those that do not work are "incorrect." > > What do you mean by "work"? Something "works" when it has the desired effect in practical application. > Note to yourself - my definition of "works" may be different to > yours. These generalisms slow the conversation down. I'm a think I wandered into Monty Python's Argument Clinic. The best I can hope for is to avoid 'being hit in the head lessons.' >> There is a time and place for everything, > > Like ritual human sacrifice? I hate to say it, but yes. Example: http://www.rachelcorrie.org/ Bear in mind that she was a volunteer. She could have stood down at any moment. >> but rarely a time when elitism, or driving wedges between >> groups who have political enemies in common with oneself, is >> "correct" in a functional sense. > > So your position is that Milgram, by doing his experiment, and > empirically showing us that humans are despotically submissive > sheep, is fundamentally being elitist? > > Or pointing out Milgrim's result is elitist? > > Or warning that a huge percentage of humans are despotically > submissive is elitist? My position is that holding oneself to be inherently superior to most of the human race is elitist. > Or that this mass debate you're engaging in is your hissy fit > over the term "sheep" to describe humans? Humans as > demonstrated to a shocking degree by Milgram's experiments? In > that case, the term sheep is seriously understated! If you refer to my first post in this thread, you won't find a hissy fit. You will find a simple statement about my dislike for the term 'sheeple'. > How about this then eh: Ooh, I'm gonna get it now! :D > Humans are breathing, eating, sleeping and shitting (BESS) > drones, easily caused to submit their wills to comply with > external commands and to do absolutely despotic acts; witness > Milgram, witness Nuremberg trials. > > Humans, the BESS drones man, just the BESS! > > Better? Sure, as long as we are clear that the entity making that statement is a human. Personally, I imagine that humans in general, and you in particular, are much more than that. :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWbyuqAAoJEDZ0Gg87KR0LQJ8QANhYYcq1MOFOXPz1sbOuAXTs 6oq73G0bNnmdrNQ84DkhjbI5/BJ6UlifjLm3ynC3WQFHGYonl/KRu8ypd9bx59iU p2AAGc+Su2TPaWjv9g+/gGu8JIRYWr6MaVnXpYMBP+vmOB+no6N/O9jPe1ffkvNi c6oMMMByB2dI4sstH26Pp6U6tp1Tjr0GZZntzFukDMGcku66mSYtrltWi+XPBY3j bBS360REuWQGS4cgsIKsqgFhdX58H4BjKwc8DPVj+l/tYly1ENGkPcJZt6Nftrh+ pWpvrz0vlfqrHrbQ1Tg+MN7Ux0oI9ePEoceCi2QXNEIxVhqDidchuawPGIsN9lAX uWgZEI8R7JaH/Wwfv5f1qxsexfyqapyzcAnXGFXUW9SnirwkJJqfXOsr9cedM0u8 mrwp3/QMjqsACXj0lcMWMixshCc2b2ZT3yrvdE8rGdoic3v0C2IlH/0dVSgJORbv 9b6Na0PtP4jSVrvYxtgGgWzGWWVmDNpk9ioghn8Y7lY4IXIJmeGm1+ChNblpLSsc GD0gYLhh8NYcnisVhieLCgi4uzYVKolCvt6FoVba0yM8bj+IUMzN+7LzlBuN45v8 Bgex8Kz+VdcPjBDrnI8Wjc7G6foYhGl+10e265vSF3J5gsX7d2lR2lW//D2jE1xy dspCYjOiMD8oT3k6Eima =scS/ -----END PGP SIGNATURE----- From guninski at guninski.com Mon Dec 14 07:19:15 2015 From: guninski at guninski.com (Georgi Guninski) Date: Mon, 14 Dec 2015 17:19:15 +0200 Subject: GNU Taler: Taxable Anonymous Libre Electronic Reserve In-Reply-To: <566e7191.c61e8c0a.48a2d.ffffe3ea@mx.google.com> References: <566e7191.c61e8c0a.48a2d.ffffe3ea@mx.google.com> Message-ID: <20151214151915.GC2654@sivokote.iziade.m$> On Mon, Dec 14, 2015 at 04:44:29AM -0300, juan wrote: > On Mon, 14 Dec 2015 02:27:18 -0500 > grarpamp wrote: > > > https://taler.net/ > > > > Taler technology: About taxability, change and privacy > > > > One of the key goals of Taler is to provide anonymity for citizens > > buying goods and services, while ensuring that the state can observe > > incoming transactions to ensure businesses engage only in legal > > activities > > Stupid cunts. These 'gnu' monkeys are hopeless. > https://taler.net/ >>>> under development at _Inria_. More like Inria cunts. Significant part of inria are in bed with m$, including the Coq charlatans. From juan.g71 at gmail.com Mon Dec 14 14:54:50 2015 From: juan.g71 at gmail.com (juan) Date: Mon, 14 Dec 2015 19:54:50 -0300 Subject: The USA Fake Of The Moon Landings In-Reply-To: <1001119927.944002.1450123237715.JavaMail.yahoo@mail.yahoo.com> References: <566e8224.d0e48c0a.8484a.ffffe696@mx.google.com> <1001119927.944002.1450123237715.JavaMail.yahoo@mail.yahoo.com> Message-ID: <566f46ea.024e370a.11431.7148@mx.google.com> On Mon, 14 Dec 2015 20:00:37 +0000 (UTC) jim bell wrote: > But if you open up the aperture (a variable-diameter shutter designed > to allow more, or less, area for light to come in and expose the > film), and perhaps if you increased the shutter-speed from, say, > 1/1000 second to maybe 10 seconds (and putting the camera on a tripod > to ensure it doesn't move), THEN you will be able to photograph > stars. Truth is I used to take pictures and print/develop them...a long time ago (I still have some b/w paper lying around). I partially overlooked the exposure time issue because I was assuming that the fact that the moon has no atmosphere somehow made a substantial difference. Anyway, the moon pictures that had people or landscapes in them can't show the stars, but it is still possible to take pictures of the stars from the moon, with a little care. Are there any such pictures from the 60s? (then again, pictures of a starry sky wouldn't prove that there were any people on the moon...) > > > > What about radar resolution? Is it possible to track a 5 x 5 x > > 5 m object from a distance of 350,000 kilometers? > > That should be easy. And it would be far easier if built onto that > object are some microwave-sized "corner cubes reflectors" > https://en.wikipedia.org/wiki/Corner_reflector , Yes, interesting objects. I knew that cat's eyes have that property. So putting corner reflectors on an object makes it easier to track it, but it doesn't say anything about how easy it is in absolute terms? A search for "apollo corner reflectors radar" doesn't bring anything as far as I can see. Only references to optical reflectors on the moon. > which have the > peculiar property of sending radar (or light, etc) directly back in > the direction from which it came. Optical corner-cubes are easy to > find: They are on the backs of cars, and are used as visual > retroreflectors on roads. They are much better than Scotchlite > https://en.wikipedia.org/wiki/Retroreflective_sheeting , which is > made from tiny glass spheres. Jim Bell > > > > > > > http://petapixel.com/2015/05/26/film-vs-digital-a-comparison-of-the-advantages-and-disadvantages/ > > "A release by Kodak showcased that most film has around 13 stops of > > dynamic range." That's a factor of about 8000. Jim Bell From jdb10987 at yahoo.com Mon Dec 14 12:00:37 2015 From: jdb10987 at yahoo.com (jim bell) Date: Mon, 14 Dec 2015 20:00:37 +0000 (UTC) Subject: The USA Fake Of The Moon Landings In-Reply-To: <566e8224.d0e48c0a.8484a.ffffe696@mx.google.com> References: <566e8224.d0e48c0a.8484a.ffffe696@mx.google.com> Message-ID: <1001119927.944002.1450123237715.JavaMail.yahoo@mail.yahoo.com> >> > I think the objection is that the stars are missing on ordinary >> > pictures shot using ordinary (super amazing military grade) >> > film. >> >> Again, not surprising. Take a picture of a (non-sun) star, with a >> small-lens camera (under 50 inch objective) and that star should >> appear as a point source of light, if the camera is well-focussed. >> Even then, the amount of light hitting that analog "pixel" is >> probably vastly lower than a camera aiming at a nearby surface >> illuminated by earth's Sun, as would be seen on the Moon by an >> astronaut taking a picture. > Oh, ok. So in principle the stars were underexposed to the > point of not showing up on film. Exactly correct. > On the other hand, if you point a camera at the sky, on the > moon, during the lunar night, shouldn't you be able to > get...something? Suppose you take an old-style film camera, one without any sort of automatic exposure adjustments, to the bright, sunlit beach, and adjusted it to take good pictures with correct exposures. Then you wait 12 hours, and it is nighttime. You do not adjust your camera's settings. If you take a picture of the sky (except possibly for the Moon) you will see...nothing. But if you open up the aperture (a variable-diameter shutter designed to allow more, or less, area for light to come in and expose the film), and perhaps if you increased the shutter-speed from, say, 1/1000 second to maybe 10 seconds (and putting the camera on a tripod to ensure it doesn't move), THEN you will be able to photograph stars. > What about radar resolution? Is it possible to track a 5 x 5 x > 5 m object from a distance of 350,000 kilometers? That should be easy. And it would be far easier if built onto that object are some microwave-sized "corner cubes reflectors" https://en.wikipedia.org/wiki/Corner_reflector , which have the peculiar property of sending radar (or light, etc) directly back in the direction from which it came. Optical corner-cubes are easy to find: They are on the backs of cars, and are used as visual retroreflectors on roads. They are much better than Scotchlite https://en.wikipedia.org/wiki/Retroreflective_sheeting , which is made from tiny glass spheres. Jim Bell > http://petapixel.com/2015/05/26/film-vs-digital-a-comparison-of-the-advantages-and-disadvantages/ > "A release by Kodak showcased that most film has around 13 stops of > dynamic range." That's a factor of about 8000. Jim Bell From Rayzer at riseup.net Mon Dec 14 20:13:54 2015 From: Rayzer at riseup.net (Rayzer) Date: Mon, 14 Dec 2015 20:13:54 -0800 Subject: About that 'sharing economy' thing... Message-ID: <566F9382.3060600@riseup.net> Nice. No equal opportunity regulations here. I'll repeat this, the "Sharing Economy" is a FEUDAL ANTIDEMOCRATIC economy Harvard study finds what it calls widespread discrimination by home-sharing company Airbnb's hosts. http://www.reuters.tv/Ysw/2015/12/11/study-finds-airbnb-hosts-discriminate Sorry, can't post a video... It's a 17 minute piece on how your "Sharing Economy" is tantamount to a return to Jim Crow. -- RR "You might want to ask an expert about that - I just fiddled around with mine until it worked..." -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From coderman at gmail.com Tue Dec 15 09:08:39 2015 From: coderman at gmail.com (coderman) Date: Tue, 15 Dec 2015 09:08:39 -0800 Subject: surveillance side effects - sometimes with thrill ride included! Message-ID: On 12/12/15, Shelley wrote: > Greetings coderman, > > Sent off-list intentionally, which I hope you will excuse. I didn't want > to make ASSumptions about your post as I once have in the past :p :P belated reply, as this account is now working again after period of inaccessible. (see below) > Also, if this is a personal anecdote, I didn't want to cause any potential > embarrassment/etc. > > If this isn't a personal anecdote: do you have a link? "so, that happened..." -> https://ello.co/ohj2eevi/post/AcOPfljWjTmfuFEkpc5Pbg > If this is a personal anecdote: do you think it's retaliatory harassment > because of your Muckrock FOIA requests? If so, that's truly fucked up - > but I'm glad you let them know that you know, if it is a personal anecdote, truly fucked up... yeah. you could say that! ---begin-forward--- --- access to this email account is back as of this morning, finally. almost everything on the network inaccessible under "Disruption Strategy" tactics that began last week during this event. this appears to be the request at issue: (or at least the one which pushed a response in turn) https://www.muckrock.com/foi/united-states-of-america-10/kleptokeymgmt-21208/ "Procedures, instructions, relevant materials regarding the proper handling of SSL/TLS secret key material obtained pursuant to court order under any authority." Refused as too vague, then I appeal: ''' Per your request for fix of this request, Under the USA PATRIOT Act, Pub. L. No. 107-56 §505(a), 115 Stat. 272, 365 (2001) , including recent revisions; C.f. USA FREEDOM Act of 2015, Pub. L. No. 114-23, 129 Stat. 268, the FBI can issue National Security Letters requesting specific business record information, including SSL/TLS private keys used in Internet communications. See https://peertech.org/files/merrill-v-lynch-unredacted-decision-vacating-gag.pdf for additional information. I am requesting Procedures, Instructions, and any other materials regarding the proper handling of SSL/TLS secret keys obtained via National Security Letters or Court Order under PATRIOT Act, or USA FREEDOM Act authorities as above. Thank you! ''' (quick side note: above you see i linked to a PDF on my server, https://peertech.org/files/merrill-v-lynch-unredacted-decision-vacating-gag.pdf. logs show that only my test requests on Dec 1st retrieved this document, however, it is possible that requests were made that were subsequently erased by the attacker once they obtained private keys giving the ability to MitM connections to the server itself. it is not clear to me if intent to remove evidence was part of this brash compromise.) on the 9th, when reply outbound from agency, a series of events occurrs that results in the compromise of the peertech server and deprecating many keys. this includes all attempts to download taobios-v2.tar.bz2 failing very early in the download - i suspect but cannot prove, that downloads on the 10th, 11th, and 13th were maliciously tampered with, and served to clients by impersonating peertech.org. i have put out a call for copies of these files if anyone kept them from those days. i was able to use Ello and hidden services while under attack. this is the first non-onion service that passed muster under this threat level. thus i wrote about the details there: https://ello.co/ohj2eevi/post/AcOPfljWjTmfuFEkpc5Pbg also, after identifying the FOIA above as contentious, i filed: https://www.muckrock.com/foi/united-states-of-america-10/procpeernotesbye-22872/ for the processing notes. apologies for any trouble i may have brought your way. i can't believe they're attacking my friends to compromise my systems. (!!!) best regards, and my apologies, martin ---end-forward--- P.S. burning sweet BIOS sploits as per the archive which is back up probably didn't help their mood either. > because [ typing with middle fingers ] fuck them [ /middle fingers ] for > trying to block out the sunlight on their shady goings-on by being even > more shady! this is how to respond properly to intimidation :) > If you choose not to reply, I understand. Know that your efforts are very > much appreciated, and if you are being harassed by retaliatory surveillance > > I hope you will seek assistance from the EFF, EPIC and ACLU. they're pretty out gunned against NSA and NatSec deep state, but i appreciate their efforts. i never understood just how uphill a fight these areas of national security law are to argue before the courts until last few years. truly david and goliath levels of imbalance of power. best regards, P.S. while i am revoking GPG keys out of abundance of caution, only secrets on peertech.org itself were compromised. See list of keys and things to copy copiously at: http://70.85.129.98:443/ http://hackers22mysy6vg.onion/ http://hackers22grhtyvg.onion/ http://hackers23vzyoixr.onion/ From Rayzer at riseup.net Tue Dec 15 09:31:03 2015 From: Rayzer at riseup.net (Rayzer) Date: Tue, 15 Dec 2015 09:31:03 -0800 Subject: surveillance side effects - sometimes with thrill ride included! In-Reply-To: References: Message-ID: <56704E57.7050506@riseup.net> I knew it! "Coderman" is a scam! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 346 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: eihbdega. Type: image/jpeg Size: 225037 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From Rayzer at riseup.net Tue Dec 15 15:23:38 2015 From: Rayzer at riseup.net (Rayzer) Date: Tue, 15 Dec 2015 15:23:38 -0800 Subject: The FBI, Carnegie-Mellon University, CERT/CC, and Tor Message-ID: <5670A0FA.4040709@riseup.net> > The news of CMU’s possible assistance in compromising Tor’s most > critical feature, anonymity, presents an opportunity for many to > attack the integrity of CERT/CC and the researchers at the Software > Engineering Institute. Bruce Schneier and others have been quick to > point out that this incident has erased (or at least greatly > diminished) CERT/CC’s hard-earned reputation as an honest broker. It > is certain to be a warning to other CSIRTs around the world that they > should transparently define their relationships with law enforcement > agencies. From Just Security (legal): https://www.justsecurity.org/28343/fbi-stop-undermining-norms-root/ Reports surfaced last month suggesting that Carnegie Mellon University (CMU) has been helping the FBI crack Tor, the secure browsing application used by privacy-conscious Internet users for both legal and illegal activities. Normally, an academic institution assisting law enforcement in fighting crime wouldn’t raise any eyebrows, particularly if that assistance came in the form of responding to subpoenas. But this isn’t your average case. Beyond the complicated (and unclear) set of facts involved, CMU houses the Computer Emergency Response Team Coordination Center (CERT/CC), one of the world’s most important hubs for coordinating information about various cybersecurity vulnerabilities and attacks. More than a month after the news first broke, the details are murky at best. Tor has alleged that the FBI paid CMU to crack the system’s anonymity feature in exchange for payment. CMU’s own statement about the incident says that many of the media reports have been inaccurate, but acknowledges that the university — and by extension CERT/CC — complies with valid subpoenas that it receives (as it must). It also said that it receives “no funding for compliance.” The FBI has said that reports on the payment are inaccurate, but stopped short of saying no payment was made. And Tor has responded by saying that these vague responses raise a whole host of questions on their own. The public saga leading up to the recent accusations began in July 2014, when Ed Felten, the then-director of Princeton’s Center for Information Technology Policy, noted that CERT/CC researchers at CMU had submitted a presentation abstract to organizers of the Black Hat security conference discussing a new vulnerability they had found in Tor. The timing of CERT/CC’s pitch to Black Hat aligned with a large-scale attack on Tor that lasted from January to July 2014, during which CERT/CC researchers shared only “hints” about the vulnerability they had discovered. As for the abstract, it was abruptly withdrawn in July when CMU failed to approve the content of the talk for public release. Eyebrows were again raised in January 2015, after the arrest of a man who allegedly helped run Silk Road 2.0, a large online trading post on the dark web whose visitors often use Tor to access the site. At the time, some speculated that his arrest was tied to the attack against Tor in the first half of 2014. Most recently, in mid-November, Tor accused CMU of accepting payment and assisting the FBI — in ways that indicate a warrant was not involved — to “attack hidden services users in a broad sweep, and then sift through their data to find people.” These allegations are hugely problematic for CERT/CC. As an entity that espouses to be “a trusted, authoritative organization dedicated to improving the security of computer systems and networks,” finding and not disclosing vulnerabilities is a good way to undermine that trust. Exploiting those vulnerabilities is even worse. But let’s take a step back for a moment. Why, beyond the obvious privacy concerns raised by Tor, is this such a big deal? CERT/CC, and indeed the Computer Security Incident Response Team (CSIRT) community as a whole , is a pillar of global cybersecurity. (CSIRT is another term often used to describe the type of organization CERT/CC is.) Generally, CSIRTs are responsible for receiving, reviewing, and responding to computer security incident reports from a set of clients, which can include government agencies, private companies, security researchers, and ordinary Internet users. Since the late 1980s, CERT/CC, as the name suggests, has been a major coordination center for global CSIRT activities. As as result, it has access to a wide array of incident information and vulnerabilities, which could, hypothetically, be used to help crack Tor’s anonymity feature. In addition, the organization — initially funded as a DARPA project and still funded with federal money — is largely transnational in nature and serves as the secretariat for national CSIRTs, more than 100 of which are distributed across the globe. CSIRTs are increasingly referenced in international discussions as a key component in efforts to build global capacity to combat cybersecurity threats and develop norms of behavior among nations in the cyber realm. For example, the United Nations Group of Governmental Experts on cybersecurity suggested this summer that special teams authorized to respond to cybersecurity incidents, such as CSIRTs, should not be used to “engage in malicious international activity” and should not be the target of attacks. If CSIRTs are to be held out as off limits, they need to be impartial (like, say, the Red Cross ) and cannot be political actors, lest they become legitimate targets. CERT/CC, and many other CSIRTs around the world, collect information that can be very useful for both identifying and capturing criminals. They rely heavily on the trust incident reporters and vulnerability researchers have in the CSIRTs, trust that is garnered after developing close ties with the constituencies they serve. When a CSIRT is discovered, or even rumored, to be acting in a way that is negligent or undermines network security of perfectly legal services, this bond of trust is fractured. Less trust means less information for CSIRTs. To pour salt on the wound, the controversy around the latest story undermines the effectiveness of CERT/CC both to carry out its own duties and to assist the FBI in the future. Though it is often not explicit in documentation, a relationship between CSIRTs and law enforcement agencies is often assumed. Indeed, such cooperation can be helpful for both law enforcement and CSIRTs. Law enforcement can obtain important technical information about incidents from CSIRTs, which in turn helps law enforcement identify and pursue cyber-criminals. On the flipside, some industries (particularly in the US) have close relationships with law enforcement that result in law enforcement becoming an important reporter of incidents to the CSIRT. But if these two types of bodies are to have close working relationships, they should follow explicit and transparent guidelines in accordance with due process. If the FBI is engaging with CSIRTs to essentially break a feature of Internet security en masse, it is making its own life more difficult down the line by removing the legitimacy of a key ally in cyber criminal investigations. To be clear: This is not an indictment of CSIRTs working with law enforcement. As I explain in detail with my colleagues Isabel Skierka, Mirko Hohmann, and Tim Maurer in our recent report , cooperation between CSIRTs and law enforcement is not necessarily a bad thing. A comprehensive approach to addressing cybercrime would ideally meld the technical expertise and access CSIRTs have painstakingly developed with traditional law enforcement expertise found in agencies like the FBI. In fact, many national-level CSIRTs actually sit within law enforcement, intelligence, or national security organizations or have formal liaisons with those agencies. Indeed, most in the CSIRT community seem ready to accept that CSIRTs have reached a point in their maturity where a formal, transparent relationship with law enforcement is practicable. This is because the quandary facing CSIRTs is one that has pervaded the American intelligence community for decades: Some activities simply do not pass the front-page test; meaning that some actions, when they come to light, will hurt the reputation of the organization. As New America Cybersecurity Fellow and Georgia Tech professor Peter Swire wrote earlier this year , the half-life of secrets is diminishing, and interactions like CERT/CC’s with the FBI are likely to become known much sooner than they would in the past. For the CSIRT community, which relies so heavily on trust for effectiveness, keeping their relationships with the government secret will be both extremely difficult and may undermine their reputations once they come to light. The news of CMU’s possible assistance in compromising Tor’s most critical feature, anonymity, presents an opportunity for many to attack the integrity of CERT/CC and the researchers at the Software Engineering Institute. Bruce Schneier and others have been quick to point out that this incident has erased (or at least greatly diminished) CERT/CC’s hard-earned reputation as an honest broker. It is certain to be a warning to other CSIRTs around the world that they should transparently define their relationships with law enforcement agencies. Regardless of how fault should be apportioned in this particular instance, the news comes as part of a larger trend in the CSIRT community. Once relatively apolitical, these technical teams are undergoing a process of politicization. National level CSIRTs, many of which once resided outside of government in academic institutions and non-governmental organizations, are being pulled into government structures. At the same time, their relationships with law enforcement agencies are becoming closer and (to those outside of the agencies) more opaque. What can be done to protect the credibility and neutrality of these important pillars in the network security ecosystem? The recommendations we outline in our report provide a roadmap: * The first step to protect trust in these teams is to reverse the recent trend and /not/ place them under the control of law enforcement and intelligence agencies. Such agencies are incentivized to use the tools at their disposal to investigate crime, collect intelligence, and pursue threat groups, and thus will often disregard the apolitical information coordination role CSIRTs play. * Second, CSIRTs and law enforcement must more transparently define the terms of their cooperation, including how and under what circumstances they interact. They should also clearly define what kinds of information and expertise are exchanged and what direction(s) shared information flows. * Third, for CSIRTs to remain trusted brokers, they must clarify their mandates and missions. Traditionally, a CSIRT has placed remediating damage from incidents and returning systems to operation as top priorities. Is this still the case, or is CSIRT expertise being poured into combating cybercrime and assisting law enforcement agencies in developing tools and methods to discover criminals? Finally, though not included in our recommendations in the report, to recover the trust it has recently lost, CERT/CC’s mission and role needs to be clearly defined by the organization itself, its funders, its partners, and its constituency. Is it essentially a second US national CSIRT alongside the Department of Homeland Security’s US-CERT , or is it something closer to a private CSIRT that plays a role in maintaining global cybersecurity? If it is a global, non-government CSIRT, transparently defining its relationship with law enforcement, intelligence, and other political actors — both inside and outside the US — is all the more important. In the end, the actions of the computer security professionals at CERT/CC who allegedly aided the FBI are somewhat understandable. Their overarching goal is to secure computer systems. The traditional CSIRT approach focuses on technical identification and remediation of incidents, in addition to promoting technical measures to protect systems from attacks in the first place. The goal of law enforcement bodies in cybersecurity is to lend a helping hand in preventing attacks from taking place by rounding up the likely and past perpetrators. That aligns with the CSIRT community’s goal. But the allegations of the researchers’ work (the cybersecurity applicability of which is dubious at best) to crack Tor demonstrate the damage that can be done when when a CSIRT’s interaction with law enforcement is not openly and strictly governed. The controversy surrounding this story represents something much larger than the alleged incident. CSIRTs are meant to be apolitical actors concentrating on computer and network security. The ramifications of politicization and muddied mandates could permeate up to states’ efforts to develop international norms of behavior in cyberspace, like those outlined by the UN Group of Governmental Experts, that rely on the integrity and independence of global CSIRTs. By undermining these norms before they take root, the FBI, and by extension the US government, undermine their own efforts to promote an open and secure cyberspace through norms for responsible state behavior. About the Author Robert Morgus is a Policy Analyst with New America’s Cybersecurity Initiative and International Security Program. You can follow him on Twitter (@robmorgus). -- RR "You might want to ask an expert about that - I just fiddled around with mine until it worked..." -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 17958 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From zen at freedbms.net Tue Dec 15 10:39:09 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Tue, 15 Dec 2015 18:39:09 +0000 Subject: surveillance side effects - sometimes with thrill ride included! In-Reply-To: <56704E57.7050506@riseup.net> References: <56704E57.7050506@riseup.net> Message-ID: :) Just as well we have Free Software to make such decisions for us. I guess we all need to go back to Symantec, since they're so community oriented ... for someone's definition of "community" and "oriented" :D Z From Rayzer at riseup.net Tue Dec 15 21:33:52 2015 From: Rayzer at riseup.net (Rayzer) Date: Tue, 15 Dec 2015 21:33:52 -0800 Subject: US Pres. Cand. Carly Fiorina Comes Out Against Crypto and Privacy In-Reply-To: References: Message-ID: <5670F7C0.2080809@riseup.net> Carly Fiorna said: > “Number one, I would retaliate against China and Russia. They have > hacked into some of our most sensitive systems and we haven’t done > much about it,” she said, vowing, “I would retaliate.” I still think the China attack trope is BS. Try US botnets installed on Chinese computers that not only make it look like China is attacking but glean the data obtained for US intel agencies. Ditto Russia, although I don't see that Russia is even being pegged as a big cyber-attacker. I DO BELIEVE they hack to extract data about the US government from .gov and .mil addresses but if there are malicious attacks they're in the Anonymous league of things... Unlike the attack on Protonmail a while back which started with a criminal attack followed by a MASSIVE attack that only a government with major capabilities could do. Not seen anything like that directed against US government servers, nor do I believe the Chnese/Russian government is particularly interested in US government employee info or our credit card numbers. -- RR "You might want to ask an expert about that - I just fiddled around with mine until it worked..." -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From jason.mcvetta at gmail.com Tue Dec 15 21:44:55 2015 From: jason.mcvetta at gmail.com (Jason McVetta) Date: Tue, 15 Dec 2015 21:44:55 -0800 Subject: Cspace and Trilight software In-Reply-To: References: Message-ID: For those who may be curious, I was recently sent some information on the history of CSpace. The info has been included in the README: https://github.com/jmcvetta/cspace#history Please note I have no insight into the accuracy of this history. It was provided unsolicited by a person I've never met. On Wed, Dec 31, 2014 at 12:26 PM, Seth wrote: > On Sun, 28 Dec 2014 16:51:44 -0800, Seth wrote: > >> "Things become "catastrophic" for the NSA at level five - when, for >> example, a subject uses a combination of Tor, another anonymization >> service, the instant messaging system CSpace and a system for Internet >> telephony (voice over IP) called ZRTP. This type of combination results in >> a "near-total loss/lack of insight to target communications, presence," the >> NSA document states. >> > > John Gilmore dug up the Cspace software (see below), and I believe this is > the Trilight software/service mentioned in the NSA docs: > https://www.trilightzone.org/ > > Return-Path: > Received: from new.toad.com (localhost.localdomain [127.0.0.1]) > by new.toad.com (8.12.9/8.12.9) with ESMTP id sBV5oaCl013715; > Tue, 30 Dec 2014 21:50:36 -0800 > Message-Id: <201412310550.sBV5oaCl013715[at]new.toad.com> > To: cryptography[at]metzdowd.com, gnu[at]toad.com > Subject: "Catastrophic" for NSA: Tor+ Trilight Zone + Cspace + ZRTP on > Linux > Date: Tue, 30 Dec 2014 21:50:36 -0800 > From: John Gilmore > > Nice to hear that there's some software that makes NSA go deaf, dumb > and blind. Here is the Snowden release that mentions it (page 20): > > "Presentation from the SIGDEV Conference 2012 explaining which > encryption protocols and techniques can be attacked and which not" > http://www.spiegel.de/media/media-35535.pdf > > I found cspace (http://cspace.aabdalla.com/), which was a bit obscure > and hasn't seen any maintenance since 2009 or so. Its dependency > ncrypt-0.6.4's source code is at Pypi and ncrypt-0.6.4 is in current > Ubuntu distros. > > But I haven't yet found Trilight Zone. Any clues? > > And I haven't found a reliable, usable, simple, free software VoIP > client for Linux, let alone one that uses ZRTP. Though I admit I gave > up on looking about a year ago when I couldn't get anything to > actually work. > > John > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3791 bytes Desc: not available URL: From grarpamp at gmail.com Tue Dec 15 20:55:04 2015 From: grarpamp at gmail.com (grarpamp) Date: Tue, 15 Dec 2015 23:55:04 -0500 Subject: List: Why Zenaan's volcanos are bad Message-ID: Because they're completely fucking offtopic to anything cypherpunk! You know... crypto, cpunk relevant politics, privacy, crypto apps, law, tech, associated punkery, etc. Quit posting random offtopic shit. "The Cypherpunks mailing list is a mailing list for discussing cryptography and its effect on society." From grarpamp at gmail.com Tue Dec 15 21:14:00 2015 From: grarpamp at gmail.com (grarpamp) Date: Wed, 16 Dec 2015 00:14:00 -0500 Subject: US Pres. Cand. Carly Fiorina Comes Out Against Crypto and Privacy Message-ID: http://www.breitbart.com/big-government/2015/12/14/exclusive-carly-fiorina-cybersecurity-now-urgent/ When Fiorina was CEO at Hewlett-Packard, the NSA called her after the terrorist attack on September 11, 2001 asking for help. “They needed help getting a large amount of equipment very quickly. The reason they needed help getting that large amount of equipment quickly was because they were trying to stand up their ability to track people that were of a suspicious nature,” Fiorina explained. I diverted a lot of equipment from paying customers to the government in a very short period of time. I was happy to do it. “Number one, I would retaliate against China and Russia. They have hacked into some of our most sensitive systems and we haven’t done much about it,” she said, vowing, “I would retaliate.” “First that means there has to be laws that have to be passed. There are some things that have to be permissible legally, which would allow the private sector and the public sector to share information,” she said. One of the places we need help is to deal with all of these encrypted communications...we have to be able to work around it “It’s important for people to understand that because they’ve misunderstood that, and this address is one phone number to another phone number, that’s it,” she said, adding, “There is no content discussed. “ teaching people how to disappear online. They have online help desks.” Fiorina [babbled on about] the terrorist attack in San Bernardino From grarpamp at gmail.com Tue Dec 15 22:13:39 2015 From: grarpamp at gmail.com (grarpamp) Date: Wed, 16 Dec 2015 01:13:39 -0500 Subject: Opponents launch 11th-hour campaign to veto CISA bill Message-ID: ---------- Forwarded message ---------- From: Henry Baker Date: Tue, Dec 15, 2015 at 1:10 PM Subject: Opponents launch 11th-hour campaign to veto CISA bill FYI -- "it's a surveillance bill by another name." -- Senator Ron Wyden Go to the following web site; they will connect you to a number of people at the White House who are getting irritated by so many calls! https://www.obamadecides.org/ ----- https://www.techdirt.com/articles/20151215/06470133083/congress-drops-all-pretense-quietly-turns-cisa-into-full-surveillance-bill.shtml Congress Drops All Pretense: Quietly Turns CISA Into A Full On Surveillance Bill by Mike Masnick Tue, Dec 15th 2015 9:28am Remember CISA? The "Cybersecurity Information Sharing Act"? It's getting much much worse as Congress and the administration look to ram it through -- and in the process, removing any pretense that it's not a surveillance bill. https://www.techdirt.com/blog/?tag=cisa As you may recall, Congress and the White House have been pushing for a "cybersecurity" bill for a few years now, that has never actually been a cybersecurity bill. Senator Ron Wyden was one of the only people in Congress willing to stand up and directly say what it was: "it's a surveillance bill by another name." And, by now, you should know that when Senator Wyden says that there's a secret interpretation of a bill that will increase surveillance and is at odds with the public's understanding of a bill, you should know to listen. He's said so in the past and has been right... multiple times. https://www.wyden.senate.gov/news/press-releases/wyden-cybersecurity-bill-lacks-privacy-protections-doesnt-secure-networks https://www.techdirt.com/articles/20151207/17063433015/final-text-cisa-apparently-removed-what-little-privacy-protections-had-been-there.shtml Either way, a version of CISA passed the House a while back, with at least some elements of privacy protection included. Then, a few months ago it passed the Senate in a much weaker state. The two different versions need to be reconciled, and it's been worked on. However, as we noted recently, the intelligence community has basically taken over the process and more or less stripped out what few privacy protections there were. And, the latest is that it's getting worse. Not only is Congress looking to include it in the end of year omnibus bill -- basically a "must pass" bill -- to make sure it gets passed, but it's clearly dropping all pretense that CISA isn't about surveillance. Here's what we're hearing from people involved in the latest negotiations. The latest version of CISA that they're looking to put into the omnibus: 1. Removes the prohibition on information being shared with the NSA, allowing it to be shared directly with NSA (and DOD), rather than first having to go through DHS. While DHS isn't necessarily wonderful, it's a lot better than NSA. And, of course, if this were truly about cybersecurity, not surveillance, DHS makes a lot more sense than NSA. 2. Directly removes the restrictions on using this information for "surveillance" activities. You can't get much more direct than that, right? 3. Removes limitations that government can only use this information for cybersecurity purposes and allows it to be used to go after any other criminal activity as well. Obviously, this then creates tremendous incentives to push for greater and greater information collection, which clearly will be abused. We've just seen how the DEA has regularly abused its powers to collect info. You think agencies like the DEA and others won't make use of CISA too? https://www.techdirt.com/articles/20151214/08492533071/dea-loses-big-drug-case-thanks-to-illegal-wiretap-warrants-prosecutor-calls-procedural-errors.shtml 4. Removes the requirement to "scrub" personal information unrelated to a cybersecurity threat before sharing that information. This was the key point that everyone kept making about why the information should go to DHS first -- where DHS would be in charge of this "scrub". The "scrub" process was a bit exaggerated in the first place, but it was at least something of a privacy protection. However, it appears that the final version being pushed removes the scrub requirement (along with the requirement to go to DHS) and instead leaves the question of scrubbing to the "discretion" of whichever agency gets the information. Guess how that's going to go? In short: while before Congress could at least pretend that CISA was about cybersecurity, rather than surveillance, in this mad dash to get it shoved through, they've dropped all pretense and have stripped every last privacy protection, expanded the scope of the bill, and made it quite clear that it's a very broad surveillance bill that can be widely used and abused by all parts of the government. There is still some hesitation by some as to whether or not this bill belongs in the omnibus bill, or if it should go through the regular process, with a debate and a full vote on this entirely new and different version of CISA. So, now would be a good time to speak out, letting your elected officials and the White House know that (1) CISA should not be in the omnibus and (2) that we don't need another surveillance bill. In the meantime, if Congress were actually serious about cybersecurity, they'd be ramping up the acceptance and use of encryption, rather than trying to undermine it. ----------------- http://thehill.com/policy/cybersecurity/263174-opponents-launch-11th-hour-campaign-to-kill-cyber-bill Opponents launch 11th-hour campaign to kill cyber bill By Cory Bennett - 12/14/15 03:54 PM EST Privacy advocates have launched a last-ditch campaign to block a major piece of cybersecurity legislation that could soon be added to an expected omnibus spending deal. The bill would encourage companies to share more data on hackers with the government. Fight for the Future, which has been leading a coalition of digital rights and civil liberties groups opposing the measure, on Monday launched an online petition urging the White House to veto the final legislation. The group also included a widget that allows people to call the White House to express their opposition. https://www.obamadecides.org/ Privacy advocates have long argued that the legislation would allow the intelligence community to collect more private data on Americans. Technologists and numerous technology companies have expressed similar concerns. But many industry groups, lawmakers and even the White House counter that the bill is the necessary first step in the fight against hackers. Privacy provisions in the measure will ensure personal data is not shared throughout the government, they say. "Now is when we'll find out whether President Obama really cares about the Internet and freedom of speech, or whether he's happy to roll over and allow technologically illiterate members of Congress break the Internet in the name of cybersecurity," said Evan Greer, campaign director at Fight for the Future. Lawmakers are on the cusp of having a final text ready and hope to have the bill on President Obama's desk before the year's end. http://thehill.com/policy/cybersecurity/262985-week-ahead-congress-poised-to-finish-cyber-bill Negotiators have been working since the Senate passed its Intelligence Committee-originated bill in October, six months after the House passed two complementary bills: one from the Intelligence panel, another from Homeland Security. On Monday, privacy advocates said that lawmakers had decided to attach the bill to an omnibus spending bill that is expected as soon as Monday. Most observers believe the tactic gives the cyber bill its best shot of getting through Congress in 2015, as only a handful of legislative days remain before the upcoming recess. But several people with direct knowledge of the talks cautioned that no final decision had been made. Multiple lawmakers have expressed opposition to the strategy, arguing that the final cyber text should get a standalone vote in both chambers. Their resistance threatens to kill the omnibus strategy. If the cyber bill does roll through Congress, Fight for the Future called on the White House to reject the measure. Throughout the final negotiation process, digital rights groups have warned that lawmakers were omitting the most stringent privacy clauses, a claim the bill's backers reject. http://thehill.com/policy/cybersecurity/262713-cyber-bill-deal-looms-as-negotiators-finalize-privacy-language http://thehill.com/policy/cybersecurity/262864-house-leadership-reviewing-cyber-compromise "This administration promised to veto any information sharing bill that did not adequately protect Internet users' privacy, and the final version of this bill doesn't even come close," Greer said. "It's time for President Obama to deliver on his word." _______________________________________________ From zen at freedbms.net Tue Dec 15 18:16:37 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Wed, 16 Dec 2015 02:16:37 +0000 Subject: Concrete containment of Iceland's Eyjafjallajokull volcano desperately needed - please urgently contribute Message-ID: Witness the awesome 11km high CO2 destructive power of Eyjafjallajokull: http://www.icelandontheweb.com/articles-on-iceland/nature/volcanoes/eyjafjallajokull Donations can be sent to my personal account. Thank you and regards, Zenaan PS 11km high is quite impressive, even for a volcano - this beast must be stopped! PS2 The following is a rather interesting link, bringing into question a few things, hopefully its purported facts are factual: http://volcanoes.usgs.gov/hazards/gas/climate.php PS3 But do note the precise wording by the Professor below - one would hope his wording is precise since he is a professor and all... ---------- Forwarded message ---------- Author's credentials: Ian Rutherford Plimer is an Australian geologist, professor emeritus of earth sciences at the University of Melbourne, a professor of mining geology at the University of Adelaide and the director of multiple mineral exploration and mining companies. He has published 130 scientific papers, six books and edited the Encyclopedia of Geology. Born 12 February 1946 (age 68) Residence Australia Nationality Australian Fields Earth Science ,Geology ,Mining Engineering Institutions University of New England ,University of Newcastle ,University of Melbourne ,University of Adelaide Almamater University of New South Wales , Macquarie University Thesis The pipe deposits of tungsten-molybdenum-bismuth in eastern Australia < http://www.worldcat.org/title/pipe-deposits-of-tungsten-molybdenum-bismuth-in-eastern-australia/oclc/221677073 > (1976) Notable awards Eureka Prize (1995, 2002),Centenary Medal (2003), Clarke Medal (2004) Where Does the Carbon Dioxide Really Come From? Professor Ian Plimer could not have said it better! PLIMER: "Okay, here's the bombshell. The volcanic eruption in Iceland. Since its first spewing of volcanic ash has, in just FOUR DAYS, NEGATED EVERY SINGLE EFFORT you have made in the past five years to control CO2 emissions on our planet - all of you. Of course, you know about this evil carbon dioxide that we are trying to suppress - it's that vital chemical compound that every plant requires to live and grow and to synthesize into oxygen for us humans and all animal life. I know it's very disheartening to realize that all of the carbon emission savings you have accomplished while suffering the inconvenience and expense of driving Prius hybrids, buying fabric grocery bags, sitting up till midnight to finish your kids "The Green Revolution" science project, throwing out all of your non-green cleaning supplies, using only two squares of toilet paper, putting a brick in your toilet tank reservoir, selling your SUV and speedboat, vacationing at home instead of abroad. Nearly getting hit every day on your bicycle, replacing all of your 50 cent light bulbs with $10.00 light bulbs. Well, all of those things you have done have all gone down the tubes in just four days. The volcanic ash emitted into the Earth's atmosphere in just four days - yes, FOUR DAYS - by that volcano in Iceland has totally erased every single effort you have made to reduce the evil beast, carbon. And there are around 200 active volcanoes on the planet spewing out this crud at any one time - EVERY DAY. I don't really want to rain on your parade too much, but I should mention that when the volcano Mt Pinatubo erupted in the Philippines in 1991, it spewed out more greenhouse gases into the atmosphere than the entire human race had emitted in all its years on earth. Yes, folks, Mt Pinatubo was active for over One year - think about it. Of course, I shouldn't spoil this 'touchy-feely tree-hugging' moment and mention the effect of solar and cosmic activity and the well-recognized 800-year global heating and cooling cycle, which keeps happening despite our completely insignificant efforts to affect climate change. And I do wish I had a silver lining to this volcanic ash cloud, but the fact of the matter is that the bush fire season across the western USA and Australia this year alone will negate your efforts to reduce carbon in our world for the next two to three years. And it happens every year. Just remember that your government just tried to impose a whopping carbon tax on you, on the basis of the bogus 'human-caused' climate-change scenario. Hey, isn't it interesting how they don't mention 'Global Warming' anymore, but just 'Climate Change'- you know why? It's because the planet has COOLED by 0.7 degrees in the past century and these global warming bull artists got caught with their pants down. And, just keep in mind that you might yet have an Emissions Trading Scheme - that whopping new tax - imposed on you that will achieve absolutely nothing except make you poorer. It won't stop any volcanoes from erupting, that's for sure. But, hey, relax and have a nice day anyway. ------ End of Forwarded Message From grarpamp at gmail.com Wed Dec 16 00:03:41 2015 From: grarpamp at gmail.com (grarpamp) Date: Wed, 16 Dec 2015 03:03:41 -0500 Subject: Opponents launch 11th-hour campaign to veto CISA bill In-Reply-To: References: Message-ID: The result... https://cryptome.org/2015/12/s754-cisa.htm From pgut001 at cs.auckland.ac.nz Tue Dec 15 21:43:34 2015 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Wed, 16 Dec 2015 05:43:34 +0000 Subject: [FORGED] US Pres. Cand. Carly Fiorina Comes Out Against Crypto and Privacy In-Reply-To: References: Message-ID: <9A043F3CF02CD34C8E74AC1594475C73F4BA9991@uxcn10-5.UoA.auckland.ac.nz> grarpamp quotes: >“First that means there has to be laws that have to be passed. There are some >things that have to be permissible legally, which would allow the private >sector and the public sector to share information,” she said. They need to pass an Enabling Act to allow this, a law to remedy the distress of the people and the nation, followed by a law against treacherous attacks on the state and government, and maybe another one to safeguard the unity between government and country. That would give them all the leeway they need to act. Peter. From Rayzer at riseup.net Wed Dec 16 07:49:02 2015 From: Rayzer at riseup.net (Rayzer) Date: Wed, 16 Dec 2015 07:49:02 -0800 Subject: Cspace and Trilight software In-Reply-To: References: Message-ID: <567187EE.5080803@riseup.net> Jason McVetta wrote: > And I haven't found a reliable, usable, simple, free software VoIP > client for Linux qtox. Text voip video file transfers. https://wiki.tox.chat/binaries#gnulinux Federated networking (description above my pay grade) As far as Trilight, it's a commercial service. Nice for businesses I guess, but why bother with openvpn when there's bitmask? -- RR "You might want to ask an expert about that - I just fiddled around with mine until it worked..." -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From admin at pilobilus.net Wed Dec 16 09:03:14 2015 From: admin at pilobilus.net (Steve Kinney) Date: Wed, 16 Dec 2015 12:03:14 -0500 Subject: The USA Fake Of The Moon Landings In-Reply-To: <566e6a30.23288c0a.4da4e.3b29@mx.google.com> References: <566DDD18.9080205@pilobilus.net> <566e6a30.23288c0a.4da4e.3b29@mx.google.com> Message-ID: <56719952.3050907@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 12/14/2015 02:13 AM, juan wrote: > On Sun, 13 Dec 2015 16:03:20 -0500 Steve Kinney > wrote: > > On 12/13/2015 11:53 AM, Veg wrote: >>>> http://blackbag.gawker.com/did-stanley-kubrick-fake-this-video- of- > >>>> >>>> stanley-kubrick-1747558774 > > OK >>>> > I'll bite. Just a couple of questions for starters: > >> A couple of answers below, although I don't have a strong >> either for or against the fake hypothesis, oh sorry, >> 'nutcase' 'conspiracy' 'theory'. It does approach that. One of the proofs offered by Beleivers is that it is impossible for human beings to pass through the Van Allen belts and live. Because they have been called "radiation" belts and as we all know, radiation is deadly. > They call for speculation, but that seems to be OK in our > present context since the position they challenge is itself > based on speculation. > > > How is it possible that the Soviet Union did not detect > >> I don't know the technical details. Could radar track the the >> landing of a small object on the moon in 1960? Can it even do >> it now? 1969 and later, actually. :D Not my field, but I do know that ham radio operators using /very/ directional high gain antennas followed the missions from Earth orbit to the surface of the Moon, listening to and recording voice and telemetry signals. The cost of sending transmitters to the Moon, and maintaining a constant stream of 100% believable signals all the way there and back, would have been quite staggering. The odds of this unlikely mission failing would have approached 100% over the course of six missions. >> ? and expose > the moon landing hoaxes (there were six successful Apollo > missions to the Moon)? > > How is it possible that simulating the Apollo missions could be > less expensive, > >> Well, that's usually the point of simulating something. It's >> cheaper. > >> Plus, if you actually can't do something then the other >> option is to 'simulate', aka, faking it. Cheaper to build and launch a series of Saturn V launch vehicles with LEMs and command modules on top, than to just go ahead and send them all the way? At minimum it would cost the same as doing the program for real. Also consider that part of the price of simulating an Apollo program would have been the cost of maintaining the illusion from beginning to end, under the watchful eyes of thousands of engineers who thoroughly understood the systems they were working on, documented everything they did in minute detail, and distributed that documentation to other equally well informed engineers working on related systems? It would have cost much more to fake the program than to actually do it. Not to mention the 100% risk of exposure, since /one/ error in the deception would have resulted in a chain reaction leaving the whole deception exposed to dozens, then hundreds, then thousands of very smart, very committed, very pissed off people. Even the Soviets could not have kept a lid on something like that. :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWcZlPAAoJEDZ0Gg87KR0Lz/0QAIoG2jup3LbCyojVaNcV3FkD yahR7QVe2qha9cqBzN3gYAZMOQKUzV7rTNnfG2wsJ5Sh8uggeW+2tgirJlvyzzbp ulBprjryA82oTql7ljPo9Ivx6qqh9ZlLhglpS0yG9lvQAWI/srpzv5sTw5c3ZAIS f90JekmZRJ5ySDKpPDDSkE3UFeYw/wPqCH3Ph9047D8yd9Ua4Rb3+6z16wX375Ma e53a1PmHghm9MuLHwAhqHGjzhX43/TsJcRNMvc8+ONJX6ZAoHhsKtKC+3bLYZqa1 uRbxoSc8AIh6NlK9zkzdUj6KA+hVUC10Y1xMxDNk76EjzZMnX0jA6/CTULpN7Ql2 eALFkOsARlmM/0JNBPggtv0MQA+Gb3D8f97UkZgbHKb27SxMJMKPjAMuLExBQzX7 Rl1gParXVZGL4eER840zg8a5fqV+nePoW+k7vhzcjzCNrqzsu/3yMOme/V7UhwoR wsrPWot5xFxIFqVrz+QZwyPonr6raFa3h+3SC/0DPKYObbgNovxs4tvfVYFce6b+ X/V7TuzO74HhyJe73qgJN4bY5cDEXvFYEjFIKEn+PV4WpEg91Xn2R2Z5/EaoZxdM UR5VSF5s/EQ1m4MlOvxZxzX/1xfL1KvZXtcNTwk8shoGsZ4m4I51x3zPfK/IWqDs 96+c5d+n6qH5xfzHKanF =J2Fn -----END PGP SIGNATURE----- From guninski at guninski.com Wed Dec 16 06:14:42 2015 From: guninski at guninski.com (Georgi Guninski) Date: Wed, 16 Dec 2015 16:14:42 +0200 Subject: Opponents launch 11th-hour campaign to veto CISA bill In-Reply-To: References: Message-ID: <20151216141442.GB2672@sivokote.iziade.m$> On Wed, Dec 16, 2015 at 01:13:39AM -0500, grarpamp wrote: > FYI -- "it's a surveillance bill by another name." -- Senator Ron Wyden > > Go to the following web site; they will connect you to a number of > people at the White House who are getting irritated by so many calls! > > https://www.obamadecides.org/ > > ----- > https://www.techdirt.com/articles/20151215/06470133083/congress-drops-all-pretense-quietly-turns-cisa-into-full-surveillance-bill.shtml > Sheeple elected them. This is sheeple's voice, sheeple's will. I don't expected anything essential to change on the next u$a pseudo elections. From rysiek at hackerspace.pl Wed Dec 16 07:47:18 2015 From: rysiek at hackerspace.pl (rysiek) Date: Wed, 16 Dec 2015 16:47:18 +0100 Subject: List: Why Zenaan's volcanos are bad In-Reply-To: References: Message-ID: <2490720.FKAzvFNM1N@lapuntu> Dnia wtorek, 15 grudnia 2015 23:55:04 grarpamp pisze: > Because they're completely fucking offtopic to anything cypherpunk! > You know... crypto, cpunk relevant politics, privacy, crypto apps, law, > tech, associated punkery, etc. Quit posting random offtopic shit. That's why we have killfiles, isn't it? ;) -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From rysiek at hackerspace.pl Wed Dec 16 07:52:32 2015 From: rysiek at hackerspace.pl (rysiek) Date: Wed, 16 Dec 2015 16:52:32 +0100 Subject: GNU Taler: Taxable Anonymous Libre Electronic Reserve In-Reply-To: <566e7191.c61e8c0a.48a2d.ffffe3ea@mx.google.com> References: <566e7191.c61e8c0a.48a2d.ffffe3ea@mx.google.com> Message-ID: <3860233.Lc0qxIHx9x@lapuntu> Dnia poniedziałek, 14 grudnia 2015 04:44:29 juan pisze: > On Mon, 14 Dec 2015 02:27:18 -0500 > > grarpamp wrote: > > https://taler.net/ > > > > Taler technology: About taxability, change and privacy > > > > One of the key goals of Taler is to provide anonymity for citizens > > buying goods and services, while ensuring that the state can observe > > incoming transactions to ensure businesses engage only in legal > > activities > > Stupid cunts. These 'gnu' monkeys are hopeless. Yeah, well... X-Mailer: Claws Mail 3.7.10 (GTK+ 2.24.10; i486-slitaz-linux-gnu) -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From dan at geer.org Wed Dec 16 21:49:59 2015 From: dan at geer.org (dan at geer.org) Date: Thu, 17 Dec 2015 00:49:59 -0500 Subject: Yoga class cancelled for "cultural issues" (insufficient awareness by class attendees of yoga origins) In-Reply-To: Your message of "Tue, 24 Nov 2015 00:40:52 +0000." Message-ID: <20151217054959.49A42A06D67@palinka.tinho.net> >http://nypost.com/2015/11/23/pc-police-suspend-yoga-class-at-university-over-cultural-issues/ One wonders if they disallow Chinese food on the U of Ottawa campus unless it was cooked by ethnic Chinese of less than three generations removed. Ditto Mexican. Ditto French. And does the half-breed get to cook two cuisines or no cuisines? Etc. --dan From grarpamp at gmail.com Thu Dec 17 00:09:36 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 17 Dec 2015 03:09:36 -0500 Subject: [Cryptography] What should I put in notifications to NSA? In-Reply-To: References: Message-ID: On Tue, Dec 15, 2015 at 11:29 PM, Phillip Hallam-Baker wrote: > I am working on staging the code for the Mesh on SourceForge. > > https://sourceforge.net/projects/mathematicalmesh/ > > There is this bit to do: > > You must notify BIS and the ENC Encryption Request Coordinator via > e-mail of the Internet location (e.g., URL or Internet address) of the > publicly available encryption source code or provide each of them a > copy of the publicly available encryption source code. If you update > or modify the source code, you must also provide additional copies to > each of them each time the cryptographic functionality of the source > code is updated or modified. In addition, if you posted the source > code on the Internet, you must notify BIS and the ENC Encryption > Request Coordinator each time the Internet location is changed, but > you are not required to notify them of updates or modifications made > to the encryption source code at the previously notified location. In > all instances, submit the notification or copy to crypt at bis.doc.gov > and toenc at nsa.gov. > > > What do folk normally do here? I was thinking of giving them the URL > of the repository and a statement to the effect that by complying I do > not wave my first amendment rights Seriously?! How about linking to... http://fuckoff.com/ And if you're still worried, develop stuff anonymously, in/over anonymous networks. And if they still care to bother to find you, then your country's obviously shit and you need a new one. cc cpunks due to metzdowd thought police From grarpamp at gmail.com Thu Dec 17 00:28:23 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 17 Dec 2015 03:28:23 -0500 Subject: Death Challenge Foundation and The Death Dive - Jump From Stratosphere With No Spacesuit In-Reply-To: References: Message-ID: On Thu, Dec 17, 2015 at 2:29 AM, Zenaan Harkness wrote: > reactions. How about... OFFTOPIC. [with a too tiny to be relavant shoutout to AP style promoting] From grarpamp at gmail.com Thu Dec 17 00:39:13 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 17 Dec 2015 03:39:13 -0500 Subject: America's Top Next Law: Go To Prison... For Reading... WTF? Message-ID: http://tech.slashdot.org/story/15/12/16/130218/go-to-jail-for-visiting-a-web-site-top-law-prof-talks-up-the-idea Eric Posner, the fourth most-cited law professor in the U.S., says the government may need to jail you if you even visit an ISIS site after enough warnings. He says, "Never before in our history have enemies outside the United States been able to propagate genuinely dangerous ideas on American territory in such an effective way—and by this I mean ideas that lead directly to terrorist attacks that kill people. The novelty of this threat calls for new thinking about limits on freedom of speech. The law would provide graduated penalties. After the first violation, a person would receive a warning letter from the government; subsequent violations would result in fines or prison sentences. The idea would be to get out the word that looking at ISIS-related websites, like looking at websites that display child pornography, is strictly forbidden" There would be exemptions for Washington-blessed journalists and others. Whew! Alas, this man isn't Donald Trump — he is a widely respected University of Chicago faculty member writing in Slate. http://www.slate.com/articles/news_and_politics/view_from_chicago/2015/12/isis_s_online_radicalization_efforts_present_an_unprecedented_danger.single.html http://www.teleread.com/ebooks/go-to-jail-for-visiting-a-web-site-or-maybe-reading-an-e-book-u-of-chicago-professors-anti-isis-proposal/ Of course crypto will be labeled a dangerous idea... Can't publish it, can't have it, can't use it, can't read it, can't think it. From grarpamp at gmail.com Thu Dec 17 01:36:14 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 17 Dec 2015 04:36:14 -0500 Subject: Opponents launch 11th-hour campaign to veto CISA bill In-Reply-To: <20151216141442.GB2672@sivokote.iziade.m$> References: <20151216141442.GB2672@sivokote.iziade.m$> Message-ID: On Wed, Dec 16, 2015 at 9:14 AM, Georgi Guninski wrote: > I don't expected anything essential to change on the next > u$a pseudo elections. I do. Code used to enjoy freedom from regulation and rhetoric (at least since before and after Bernstein), It used to be about export would helping some country. Now it's all twisted about using crypto, note US law jurisdiction can only apply to use by the US people, and the current rhetoric by a large fraction of politician heads there is all bad foreboding > Sheeple elected them. This is sheeple's voice, sheeple's will. After 15 years it is time for some hungry wolves. From grarpamp at gmail.com Thu Dec 17 01:46:04 2015 From: grarpamp at gmail.com (grarpamp) Date: Thu, 17 Dec 2015 04:46:04 -0500 Subject: [Cryptography] Satoshi's PGP key. In-Reply-To: References: <564818D1.8040907@sonic.net> <566A3AA1.6090804@sonic.net> <56719D59.9020504@overflowedminds.net> Message-ID: On Wed, Dec 16, 2015 at 5:50 PM, Henry Baker wrote: > Is there any chance that Satoshi works/worked for the > NSA or equivalent? > > For a huge number of reasons, s/he couldn't publish > under her/his own name, but may have gotten permission > to do this project anyway, so long as s/he didn't make > any personal profit on it. > > I can imagine that the NSA & GCHQ are still hurting > at not getting proper credit for developing "public > key" encryption, and they may not have wanted to see > a long string of bad versions of bitcoins foisted > upon the world when they already had a pretty good > solution. The NSA has proven to not be above doing things that it can exploit / track / manage. From zen at freedbms.net Wed Dec 16 23:29:24 2015 From: zen at freedbms.net (Zenaan Harkness) Date: Thu, 17 Dec 2015 07:29:24 +0000 Subject: Death Challenge Foundation and The Death Dive - Jump From Stratosphere With No Spacesuit Message-ID: I guess if this is real (and it looks like it), it will be interesting to see peoples' reactions. Z http://tass.ru/en/press-releases/844584 Man To Jump From Stratosphere With No Spacesuit Press Releases December 16, 16:05 UTC+3 Unless the World Votes To Save Him, He Faces Certain Death LONDON, Dec. 16, 2015 /PRNewswire/. Death Challenge, Inc., a new business venture that practices commercially sustainable philanthropy, announced today the official date of the most spectacular and perilous event ever to be broadcast live. Death Challenge 1, The Death Dive (http://DeathChallenge.com) will take place on Good Friday, March 25th, 2016, in the same week as World Water Day. At 3.33pm Greenwich Mean Time (GMT), "The Challenger", who will remain anonymous and masked, will risk his life by jumping out of a jet from the stratosphere, 9.53 miles (15.3 km) above the Earth, and diving 50,300 feet with NO spacesuit, NO pressure suit, NO oxygen and NO parachute into shark-filled waters – all in a bid to STOP Death by Dirty Water. (http://DeathbyDirtyWater.org). "This is a cause close to The Challenger's heart," (http://DeathChallenger.com) says company spokesperson, Aideen Doherty. "Having spent extensive time in the areas of the world most affected by waterborne diseases, he has witnessed firsthand the dramatic effects of this solvable problem. The Challenger also suffered from a near-fatal illness after drinking dirty water during his travels. Nearly 2 million children die annually from dirty water; therefore, in order to bring an end to this crisis, The Challenger is willing to risk his own life." An event without parallel or precedent, the Death Dive will be streamed live to a global pay-per-view audience, all of whom will be able to vote whether or not to "Save The Challenger" by offering lifelines. Both the online audience and those at the dive site itself can purchase votes before and during The Challenger's historic leap of faith, saying "YES" or "NO" to three possible lifelines. Crucially, no lifelines will be accepted by The Challenger unless one billion votes are purchased globally, symbolic of the approximate number of people not having access to the most basic ingredient of life – clean water. In Lifeline One (active at 25,000ft–20,000ft), a circling aircraft will toss out a parachute which The Challenger will try to chase down and put on under near-impossible conditions. In Lifeline Two (active at 20,000ft–15,000ft), a rescue skydiver will pursue the exhausted and oxygen-deprived Challenger in an attempt to complete the first-ever mid-air hook up without any safety equipment. In Lifeline Three (active at 15,000ft–7,000ft), an aircraft will release a tow rope, which The Challenger will try to grab and use to skysurf into the water. If The Challenger misjudges the skytow, he could collide with the aircraft or take out its wing or tail controls. If The Challenger blacks out upon exiting the jet, there is an additional option to release a rescue team to provide him with oxygen. However, this lifeline will only be activated if 7.125 billion votes are first secured – the equivalent of the entire human race voting to save one man and all the people of the world without access to clean water. Other ways to contribute to the global success of Death Challenge (http://savethechallenger.com) include pay-per-view tickets to watch online, VIP tickets to watch the event from an aircraft or boat at the dive site – or underwater with sharks at the point of impact – and a special option to purchase a ride to the Stratosphere with The Challenger. "The risks of the jump are more than monumental," says company spokesperson, Aideen Doherty. "As he jumps, The Challenger will face insanely low air pressure, freezing temperatures and oxygen starvation, all which can lead to imminent death." The Challenger is one of the world's most experienced extreme athletes, having completed just under 20,000 skydives, more than 5,000 high dives and thousands of hours of cage-free dives with Great White sharks over the past 30 years. He will use multiple extreme disciplines in an attempt to survive a dive more than 260 times higher than the current world record – approaching twice the height of Mount Everest. The Challenger is the first to risk his life in The Death Challenge. Death Challenge 1, The Death Dive, is a Category 10 event, deemed by experts to offer zero chance of survival. Death Challenge 1 will also feature and be supported by musical entertainment from new and well-known artists. Death Challenge will continue to showcase extreme athletes in high-risk events to raise the awareness of and bolster Death Challenge's philanthropic efforts to end many of the world's worst social, economic, and humanitarian problems. Death Challenge Inc., Death Challenge Foundation and The Death Dive will be audited and verified by an international accounting firm. For more information about Death Challenge and how the world can put an end to Death by Dirty Water, please visit: http://DeathChallengeDay.com Editor's Note: For media enquiries and press kit materials please contact: pressoffice at deathchallenge.com About the Death Challenge Brand Death Challenge, Inc., Death Challenge Foundation, and Many People, One Voice collectively engage in commercially sustainable philanthropy that aim to raise awareness of and provide support needed to end many of the world's worst social, economic and humanitarian problems. Death Challenge will showcase extreme athletes in high-risk events to help spotlight and support various causes. The first event, titled Death Challenge 1, aims to STOP Death by Dirty Water. CONTACT: pressoffice at deathchallenge.com From juan.g71 at gmail.com Thu Dec 17 10:21:24 2015 From: juan.g71 at gmail.com (juan) Date: Thu, 17 Dec 2015 15:21:24 -0300 Subject: America's Top Next Law: Go To Prison... For Reading... WTF? In-Reply-To: <20151217145254.GB18390@sivokote.iziade.m$> References: <20151217145254.GB18390@sivokote.iziade.m$> Message-ID: <5672fb4d.5149370a.a650c.ffffb54b@mx.google.com> On Thu, 17 Dec 2015 16:52:54 +0200 Georgi Guninski wrote: > On Thu, Dec 17, 2015 at 03:39:13AM -0500, grarpamp wrote: > > http://tech.slashdot.org/story/15/12/16/130218/go-to-jail-for-visiting-a-web-site-top-law-prof-talks-up-the-idea > > > > Eric Posner, the fourth most-cited law professor in the U.S., says > > the government may need to jail you if you even visit an ISIS site > > after enough warnings. He says, "Never before in our history have > > enemies > > So the "freedom of speech" is practically dead since long time in the > u$a. Not at all!! They have full 'freedom of speech'. That doesn't mean they have any freedom of hearing. See, that's the logic of western 'liberals'. Think about people in 'solitary confinement'. Are they free to say whatever they want? Of course! (as long they are not literally gagged). Whether other people can listen to them is a different story. But anyway, that's the beauty of liberal anglo-american freedom! > > Now the right to read is going the same way. > > If I were ISIS, I would spam all of the u$a with copies of their > sites. Having in mind their trade with oil, they can afford it. > > Or maybe some hidden