(NasdaqNM:NGRU) Special Investment Alert IDEK

2002-04-29 Thread NGRUnews
Title: SPECIAL ALERT
Special Alert :  NetGuru, Inc.   (OTCBB: NGRU)  Company InformationTrading StatisticsTicker:NGRUCurrent Price:$3.90Daily Opinion:STRONG BUY52 Week Low:$1.27Short Term Target:$12.6052 Week High:$7.70Long Term Target:$20.00Approx. Float:7.9 MillionNGRU OVERVIEW"India opened its Telephone Market to Free Trade on April the 1st. NetGuru climbing an anticipation of big earnings. Looks to go much higher."





Re: Re: disk encryption modes

2002-04-29 Thread JonathanW
Title:  Re: Re: disk encryption modes





Here is a technique for encrypting a hard disk that should provide reasonable performance, good security, and be easy to render the entire disk unreadable in an emergency.

1. Start with a good (P)RNG. Seed it constantly with radioacitve decay noise, digitized samples of monkeys farting into your sound card, keystroke data, mouse squeaks, your favorite hardware RNG's, etc. Hash and whiten to your heart's content, just make sure it can output a few hundred KB/second of data cryptographically indistinguishable from "random" (an attacker having access to the entire of the output of this device since it started has no more than a .5 probability of determining any future bit of the output).

2. Each disk cluster is encrypted individually. (On my 100 GB NTFS drive the cluster size is 4096 bytes. Different drive sizes under different file systems may have different cluster sizes. For clarity's sake, I will stick with the 4K cluster size.) Encryption can be done with any cipher that can accept a 256 bit key, You can use a block cipher (in a suitable feedback mode) or a stream cipher. The first 128 bits of each block key is the master disk encryption key, (a hash of a passphrase ors ome such hereafter called the "permanent" key half)  and the other 128 bits are the randomest bits you can obtain from the aforementioned (P)RNG whenever a cluster is written to (hereafter referred to as the "temporary" half. The temporary bits of the key are stored in a separate file which can be on a CDRW disc, compact flash card, etc. The format of this file is simple; the first 16 bytes of the file is the temporary 128 bits of the key for the first cluster of the disk the next 16 bytes are for the second cluster, and so on. Each time a disk cluster is written to, a new temporary half-key is pulled from the (P)RNG and used to encrypt the cluster data, and then is stored in the temporary key file. When a cluster is read, the appropriate temporary key half is read from the temporary key file, combined with the permanent key half, and then the data is decrypted.

Here are the advantages I see with this technique:


1. If you edit a sensitive file and save several versions of it, no 2 versions of the file, or even any 2 4K sections of the file will be encrypted with the same key, so an attacker will not have many instances of similar ciphertexts as obvious targest for attack.

2. If you need to destroy the encrypted data quickly, and have the temporary key file on separate media, (like a CDRW) the temporary key file can be destroyed quickly (microwave the CDRW until extra crispy) thereby rendering the encrypted data unrecoverable even if the main passphrase is rubberhosed out of someone. Imaginative encryption driver design could have several temporary key files; a real one and several dummies, so that an attacker could be confused as to which file was real until the real one had already been destroyed. The temporary key file could also be located in a remote location (preferably somewhere with no extradition treaty with your jurisdiction) if you can find a party there who would be trusted to cut off access to, and securely destroy the real temporary key file (They could continue to provide access to a bogus one) if a certain signal was received. "If I ever tell you to write value X to block Y of the key file, assume I have been arrested and burn the CD the real key file lives on..." If you wanted to get really fancy you could use secret splitting or RAID techniques where the temporary key file is split into X pieces, and Y number of pieces are needed to reconstitute the entire file. You can use whatever values of X and Y you need to satisfy operational reliability requirements and your paranoia level.

Comments, nits to pick? 





Re: disk encryption modes

2002-04-29 Thread Bill Stewart

At 01:13 AM 04/29/2002 -0700, [EMAIL PROTECTED] wrote:
>  [each cluster has 128 bits permanent half-key, 128 bits nonce half-key...]
>  are for the second cluster, and so on. Each time a disk cluster is 
> written to, a new temporary half-key is pulled from the (P)RNG and used 
> to encrypt the cluster data, and then is stored in the temporary key 
> file. When a cluster is read, the appropriate temporary key half is read 
> from the temporary key file, combined with the permanent key half, and 
> then the data is decrypted.

At least it's big enough to prevent searches through the space.
But it not only requires managing the extra key-file (which could be pretty 
large,
and needs to be kept somewhere, apparently not in the same file system),
it potentially requires two disk reads per block instead of just one,
which is a major performance hit unless you're good at predictive caching,
and more seriously it requires two writes that both succeed.
If you write the key first and don't write out the block,
you can't decrypt the old block that was there, while if you write the 
block first
and don't succeed in writing the key, you can't decrypt the new block.
This makes depending on caching writes much more difficult - it's already 
one of the
things that helps make systems fast and either reliable or unreliable,
and you've made it tougher as well as requiring two disk spins.
You can get some relief using non-volatile memory (the way the Legato 
Prestoserve
did for NFS acceleration - first cache the write in battery-backed RAM,
send your ACK, and then write the block out to disk), but that's hardwary.

It's cute, though...





This is ProForm!10395

2002-04-29 Thread dan
Title: ViaPro



















To opt out of future mailings Click Here









   104312.107200072.1221104312.064700013.1066







best of bleed.

2002-04-29 Thread matthew X

JULES BONNOT
Anarchist bank robber, inventor of the getaway car
1789 - Fletcher Christian led a group of mutineers against
Captain William Bligh aboard HMS Bounty in history's most
famous mutiny. Recounted by Charles Nordhoff & James Norman
Hall in a trilogy; the first book being Mutiny on the Bounty
(1932).
1898 - Italy: In Anctne, a trial of the anarchists accused of
criminal conspiracy against "the public safety of people &
property" has been going on since the 21st. It follows the
failure of a General Strike in mid-January against price
increases for bread. The defendants are represented by the
anarchist lawyers Francisco Saviero Merlino, Pietro Gori &
Errico Ferri. Errico Malatesta will be sent to prison for seven
months.
1919 - US: Beloved & Respected Comrade Leader Seattle mayor
Hanson gets a bomb in the mail. He declares the government
should "buck up & hand or incarcerate for life all the
anarchists." This was one of 36 bombs which turn up in the
mails across the nation.
1953 - Iran: After engineering the overthrow of the democratically
elected government, the CIA installs the Shah of Iran, beginning a
25-year dictatorship & reign of terrorism in that part of the
"Free World".
1967 - US: Muhammad Ali refuses induction, during the Vietnam
War, into the army & is stripped of his boxing title:
"No Viet Cong ever called me nigger."
1987 - Benjamin Linder, an American volunteer engineer from
Seattle, Washington is murdered by U.S.-sponsored Contras
(characterized by then-Beloved & Respected Comrade Leader
Pres. Reagan as "the moral equivalent of our founding
fathers") while working on a hydroelectric project in rural
Nicaragua.
The most violent element in society is ignorance."
 Emma Goldman
from the daily bleed with sweat and tears.




¹þ¹þ¿ì±¨£ºµÚ21ÆÚ

2002-04-29 Thread okokok
Title: ¹þ¹þ¿ì±¨--¹þÍø´«Ã½ËÙµÝ






   
 
  


  



   
³ö°æÈÕÆÚ:[4ÔÂ28ÈÕ]
×ܵÚ[21]ÆÚ
 
  ¶©ÔĶÌÐÅ

ÑÔÓï´«Çé
¹þ¹þÉçÇø
ÖÐÎĸãЦµÚÒ»Õ¾
  


  
 
  

  
  


   
 ¹þ¹þ¾«²ÊЦ»° 
   
  
   
1.ʳÌõķ¹ 
  
¾Ý˵£¬Ñ§Ð£µÄ»ïʳ±ê×¼ÊÇÒ»Ìì30Ôª¡£ÕâÌ죬ÇÞÊÒÀï½øÁËÖ»ÀÏÊ󣬴ó¼ÒÒ»Æð·¢»Ó·ÉÐÐÔ±µÄ±¾É«£¬ÖÕÓÚ»î×½Ö®¡£È»ºó¾Í¿ªÊ¼ÌÖÂÛËüµÄËÀ·¨¡£ÇÞÊÒÀÏ´ó˵£º¡°Óûƶ¹ÅÝË®£¬ÕÍËÀËü¡£¡±À϶þ˵£º¡°²»£¬ÓûðÉÕ£¬Ë®ÑÍ£¬ÔÙ´¦ÒÔÂúÇåÊ®´ó¿áÐÌ¡£¡±ÀÏÈýÓÆÓÆÈ»Ëµ£º¡°¶¼²»ºÃ£¬ÈÃËü³ÔʳÌõķ¹£¬¶ñÐÄËÀËû¡£¡± 
  
  

 
  


 
  

  
   
2.Ò¹´²ÉϵĶ԰×͵¼ 
  Å®£ºÎªÊ²Ã´ÒªÍ¬¾Ó£¿ 
ÄУºÇ×°®µÄ£¬ÕâÑù²»ºÃÂ𣿠
Å®£º¼ÈȻͬ¾ÓÁË£¬ÎªÊ²Ã´»¹²»½á»é£¿Ö»Òª°ì¸öÊÖÐø¾ÍÐÐÁË¡£ 
ÄУº¼ÈȻͬ¾ÓÁË£¬ÎªÊ²Ã´»¹Òª½á»é£¿¶àÒ»µÀÊÖÐø¸ÉÂ𣿣¡ 
Å®£º½á»é±£ÏÕ£¬»¹ÓÐÖ¤Ê顪¡ª 
ÄУºµ«°®Ç黹ÐèÒª±£ÏÕÂ𣿠
Å®£º½á»é°²¶¨£¡ 
ÄУºÍ¬¾Ó×ÔÓÉ£¡ 
Å®£ºÇÆ£¬ÄÇô¶àÈ˶¼½á»éÁË£¬ËûÃǶàÐÒ¸£°¡£¡ 
ÄУº¿´£¬ÄÇô¶àÈËÕýÔÚͬ¾Ó£¬ËûÃǶà¿ì»î°¡£¡ 
Å®£ºÕâ¾ÍÊÇÐÂͬ¾Óʱ´úÂð£¿ÔõôÒÔǰ´ÓûÓмû¹ý£¿ 
ÄУºÊǵģ¬Ò²ÊÇÐÂÀë»éʱ´ú£¬ÄãÒÔǰ¼û¹ýÂ𣿠
±ð£¬±ðõßÎÒ¡ª¡ªÎÒÒѾ­¹öµ½´²ÏÂÃæÈ¥ÁË£¡ 
  
  
   
3.С͵±¾Áì 
  *С͵±¾Áì 
ÔÚÖÚÈËÇ´ÔðµÄÄ¿¹âÖУ¬Ò»ÇËËø×÷°¸µÄ¹ß͵±»°ó´¦Ð̳¡¡£ÁÙÐÌ֮ǰ£¬×ßµ½Ëû¸úǰµÄÉñ¸¸¶ÔËû˵£º¡°Îҵĺ¢×Ó£¬ÎªÄãÉîÖØµÄ×ï¶ñǪ»Ú°É£¡·ñÔò£¬ÌìÌõĴóÃŶÔÄ㽫Êǹرյ쬡± 

¡°Ã»¹ØÏµ£¬ÌìÏÂûÓÐÎÒ´ò²»¿ªµÄÃÅ¡£¡± 
  *ǹ¾öǰµÄÔ¸Íû 
·¨¹Ù£º¡°Äã¾ÍÒª±»Ç¹¾öÁË£¬ÓÐʲô×îºóµÄÔ¸Íû£¿¡± 
·¸ÈË£º¡°ÎÒÏ£Íû´©ÉÏÒ»¼þ·Àµ¯±³ÐÄ¡£¡± 
  
*â¹û 
Ò»¸öËÀÐÌ·¸±»ÑºÉÏÐ̳¡£¬·¨¹ÙÎÊ£º¡°Äã×îºó»¹ÓÐʲôҪÇóÂ𣿡± 
·¸È˴𣺡°ÎÒÏë³Ôâ¹û¡£¡± 
µ±¹Ù£º¡°¿ÉÏÖÔÚ²»ÊÇâ¹û³ÉÊìµÄ¼¾½Úѽ£¡¡± 
·¸ÈË£º¡°ÄÇÎҾ͵ÈןÃÁË¡£¡± 
  
*ÅÂËÀ 
ÁÙÓü³¤¶ÔÒÑÅÐÁËËÀÐ̵ÄÇô·¸Ëµ£º¡°ÁÙÐÌǰ£¬ÄãÏëÎüÖ§ÑÌÂ𣿡± 
¡°²»£¬Ð»Ð»¡£ÎÒŵ÷ΰ©£¬Ã»°ì·¨Ò½Öεġ£¡± 
  

  
   
4.ÆïĦÍÐ 
  
  Ò»Ì죬һ¸öÄêÇáµÄС»ï×ÓÕýÆï×ÅÒ»Á¾Ä¦ÍгµÔÚ·ÉÏ×ߣ¬Ñù×ÓºÜÊÇäìÈ÷£¡²»Ò»»á¶ù£¬ºóÃæÀ´ÁËÒ»¸öÀÏ̫̫£¬Æï×ÅÒ»Á¾Å¿Èü×·ÉÏÀ´ÁË£¬ÎʵÀ£º¡°Ð¡»ï×Ó£¬»áÆïÅ¿Èüô£¿¡±Ð¡»ï×ÓºÜÊÇÉúÆø£¬ÐÄÏ룺¡°Ò»¸öÀÏ̫̫¾¹È»±ÈÎÒÆïµÄ»¹¿ì£¡¡±½ÅϺܲÈÓÍÃÅ£¬×ßÁË£¡²»Ò»»á£¬ÀÏ̫̫ÓÖ×·ÉÏÀ´ÁË£¬ÎʵÀ£º¡°Ð¡»ï×Ó£¬»áÆïÅ¿Èüô£¿¡±Í¬Ñù£¬Ð¡»ï×Ó˦¿ªÁËÀÏ̫̫£¬²¢ÇÒÀÏ̫̫£¬ÓÖ×·ÉÏÁË£¬ÎʵÀ£º¡°Ð¡»ï×Ó£¬»áÆïÅ¿Èüô£¿¡±ÕýºÃµ½ÁËÒ»¸ö¹ÕÍä´¦£¬Ð¡»ï×ÓÒ»¸ö¼±×ªÍ䣬¹ýÈ¥ÁË£¬ÅÔ±ßÕýºÃ¹ýÈ¥Ò»Á¾¿¨³µ£¬Ö»ÌýºóÃæ¡°¶£~~¹äµ´~~~ž¡±µÄ¼¸Éù£¬¿¨³µºÍÀÏ̫̫µÄÅ¿ÈüײÉÏÁË£¡Ð¡»ï×ÓÓÐЩµ£ÐÄÁË£¬Í£³µ»ØÈ¥¿´ÁËһϣ¬Ö»¼ûÀÏ̫̫ÑÙÑÙһϢµÄ˵µÀ£º¡°Ð¡»ï×Ó£¬ÎÒÎÊÄã»áÆïÅ¿Èûô£¬¾ÍÊÇÏëÖªµÀÔõÑù²ÅÄÜÈóµÍ£ÏÂ~~£¡¡± 

  
   
5.ɧÈŵ绰 
  Ò»Ì죬ÃÀŮСCÒ»¸öÈËÔÚÇÞÊÒÀï¿´Ê飬ͻȻµç»°ÁåÏ죬СCÌáÆðµç»°£¬¡°Î¹¡±Á˼¸Éù£¬¶Ô·½È´Ê¼ÖÕû»ØÒô¡£ÏÂÎçÎåµãʱ£¬£¬ÀàËÆµÄµç»°ÓÖ´òÀ´ÁË£¬ÕâÒѾ­Êǵ±ÌìµÄµÚÎå´ÎÁË£¬Ð¡CÔÙÒ²ÈÌÄͲ»×¡£ºÌÖÑᣡbian̬£¡ 
  
  µÚ¶þÌìÖÐÎ磬´ó¼ÒÕýÔÚÇÞÊÒ³Ô·¹£¬µç»°ÓÖÀ´ÁË£¬Ð¡CÇÀÏÈÌáÆðÀ´£º»ìµ°£¬ÄãÔÙ²»Ëµ»°ÎҾͲ»¿ÍÆøÀ²£¡ 
  
Ö»ÊǶÔÃæ´«À´Ò»¸ö±ê×¼µÄÐԸеÄÄÐÉù£º 
  
¡°Ð¡½ã£¬ÄãºÃ£¡ÕâÀïÊÇ201µç»°·þÎñÖÐÐÄ£¬ÒòΪϵͳ×òÈÕ¹ÊÕÏ£¬Ó°ÏìÁËÄú²¿·Öͨ»°£¬ÎÒÃÇÏòÄú±íʾǸÒ⣬ÏÖÔÚÎÒÃÇÒѾ­ÅųýÁ˹ÊÕÏ£¬µ«»¹ÒªÇëÄúЭÖú½øÐÐÒÔϲâÊÔ¡­¡­¡± 
  
  
¿É°®µÄСCÂíÉÏ˵£ººÃ£¬ºÃ£¡ 
  
¡°ÇëÄú½«Äãµç»°Éϵļü´Ó1°´µ½0¡£¡± 
  
СCÕÕ×ö¡£ 
  
¡°ºÃµÄ£¬ÇëÄúÔÚ°´Ò»±é£¬ÒÔ±ãÈ·ÈÏ¡£¡± 
  
СCÓÖÖØ°´ÁËÒ»±é¡£ 
  
¡°ºÃµÄ£¬Ð¡½ã£¬¾­ÎÒÃDzâÊÔ¡ª¡ª¡ªÄãµÄÖÇÉÌΪ0!¹þ¹þ£¡¡± 
  
Õ⻹ûÍê.СC±»Ï·ÅªºóÆøµÄÒ»Ììû˵»°¡£ 
  
µÚÈýÌ죬ÓÖÊÇСCÒ»ÈË´ýÔÚÇÞÊÒµÄʱºò£¬µç»°À´ÁË£¬ÓÖÒ»¸öºÃÌýµÄÄÐÈ˵ÄÉùÒô£¬µ«Ã÷ÏÔÓëÉϴβ»Í¬£º 
  
¡°Ð¡½ã£¬ÄãºÃ£¡ÕâÀïÊÇ201µç»°·þÎñÖÐÐÄ¡­¡­¡± 
  
»¹Ã»µÈ¶Ô·½ËµÍ꣬СC¾Í»ððÈýÕÉ£ºÄãÈ¥ËÀ°É£¡ 
  
¸ÕÒª·Åϵ绰£¬Ë­Öª¶Ô·½Ëµ£º 
  
¡°Ð¡½ã£¬ÎÒÏëÄãÒ»¶¨ÊÇÎó»áÁË£¬ÕâÀïµÄÈ·ÊÇ201µç»°·þÎñÖÐÐÄ£¬ÎÒÃǵÃÖªÄúÊܵ½ÒÔÎÒÖÐÐÄΪÃûÒåµÄ²»Á¼µç»°µÄɧÈÅ£¬ÌØÀ´³ÎÇ壬²¢³Ðŵ½«ÕâÊÂ×·²éµ½µ×¡£¡± 
  
  
СCÒ»Ìý£¬Á³ºìÁË£ºÊÇÕâÑù°¡¡­¡­²»ºÃÒâ˼¡£ 
  
¡°Ã»¹ØÏµ£¬ÏÖÔÚÎÒÃÇÏëÁ˽âһϵ±Ê±µÄÇé¿ö£¬ÇëÄú½«×òÌì·¢ÉúµÄÊÇÃèÊöÒ»±é¡£¡± 
  
СCÓÌÔ¥ÁËһϣ¬»¹Êǽ«×òÌìµÄÊÂÔ­Ô­±¾±¾ËµÁËÒ»±é£¬µ±Ëµµ½¶Ô·½ÂîËý¡°ÖÇÉÌΪ0¡±Ê±£¬¿É°®µÄСCÁ³ºìµ½Á˶ú¸ù¡£ 
  
¡°ºÃµÄ£¬Ð¡½ã£¬¾­ÎÒÃÇÔÙ´ÎÈ·ÈÏ£¬ÄúµÄÖÇÉÌ»¹ÊÇΪ0¡£¡± 
  
ÎûÎûÎûÎû¡­¡­¡­¡­ 
  

  
   
6.»¥»»½ÇÉ« 
  ÄêÇáÆ¯ÁÁµÄŮʿÔÚ¶¯ÎïÔ°Ïйä×Å£¬×îºóÍ£ÔÚºï×ÓÁýµÄÇ°Ãæ¡£ ËýºÜÀ§»óµÄÎʹÜÀíÔ±£º¡°½ñÌìºï×ÓÃǶ¼Åܵ½ÄĶùÈ¥ÁË£¿¡±¡°ËüÃǻص½¶´ÀïÈ¥ÁË£¬Ð¡½ã£¬ÏÖÔÚÕýÖµ½»Åä¼¾½Ú¡£¡±¹ÜÀíԱ˵µÀ¡£ 
¡°¼ÙÈçÎÒ¶ªÐ©»¨ÉúÃ×½øÈ¥£¬ËüÃÇ»á³öÀ´Â𣿡±Ð¡½ãÓÖÎʵÀ¡£ ¹ÜÀíԱɦɦͷ£¬Ëµ£º¡°ÎÒ²»ÖªµÀÒ®£¡Ð¡½ã£¬Èô»»³ÉÄ㣬Äã»á³öÀ´Â𣿡± 
  
  

  
   
 
  µ½µ×ÊǼ¸ÉÈÃÅ


  


Copyright 1999-2002 ÖÐÎĸãЦµÚÒ»Õ¾£¨¹þÍø´«Ã½£© 
  
  
  Èç¹ûÄú²»ÏëÔÙÊÕµ½±¨±¨£¬Çëì¶Á¬Ïß×´¿öÏÂÓÉÏ·½Á¬½á½øÈë±¾Õ¾Í˶©ÇøÈ¡Ïû¶©ÔÄ¡£
  ÓûÍ˶©±¾µç×Ó±¨£¬ÇëÓɴ˵ÇÈ룡






  

  ¹þ¹þ¿ì±¨£ºËùÓйýÍùµç×Ó±¨

 

¿¬Ã¼°ÆÁ¤ ³¡^.^ ´©±¸³ª ´ëÃâ!!! [±¤.°í]

2002-04-29 Thread À¯¿£ºñ±ÝÀ¶ÄÁ¼³ÆÃ
Title: À¯¿£ºñÁ¾ÇÕ±ÝÀ¶





























 




























































































 











Re: Odp: Cypherpunks Europe

2002-04-29 Thread Steve Furlong

Jan Dobrucki wrote:

> World, this is the USA, USA, this is The World. Now that you know
> each other, start thinking in a more broad perspective, please.

Blow me.

/s/
An Ugly American

--  
Steve FurlongComputer Condottiere   Have GNU, Will Travel

The reasonable man adapts himself to the world; the unreasonable one
persists in trying to adapt the world to himself. Therefore all
progress depends on the unreasonable man.  -- George Bernard Shaw




Re: Got carried away...

2002-04-29 Thread Graham Lally

Jan Dobrucki wrote:
> I do have an idea thou. I'm thinking how to implement PGP into car
> locks. And so far I got this: The driver has his PGP, and the door
> has it's own. 

Path of least resistance - *access* to the car is generally not the problem. 
Instead weaker attacks such as breaking the glass, or forcing the door work much 
better. Once inside, a different mechanism again would be needed to prevent the 
car from being hotwired. In short, the addition of PGP doesn't particularly 
enhance the security, especially if the protocol is still vulnerable to, say, 
identity theft (the encryption is useless if somebody just steals the PGP keys).
To steal an idea from the Mary Whitehouse Experience, iirc, car security will be 
complete when we can use imaging technology to disguise someone's latest XR3i as 
a clapped out Austin MiniMetro*.

Seems that it's just another case of trying to use a buzzword in an unnecessary 
solution, making it overly complicated from a user POV, and whilst ignoring the 
other fundamental aspects. As has been pointed out a multitude of times, 
encryption has its places and uses, most of which will never be the interest, 
imho, of the common populace. (Only perhaps on a need-to-use basis, such as SSL. 
I doubt pgp mail encrypting will become "natural", or indeed "sexy" to the 
sheeple.) And nor should it (have to) be. There are, however, still plenty of 
places where the techniques are, or would be, of great benefit.

.g

* Purely for demonstrative purposes only, obviously.

-- 
"The history of cosmology is the history of us being completely wrong,"
  "Sometimes I use Google instead of pants."
http://www.exmosis.net/2:254/500.50





Re: Let us pay your bills :o) [7xnke]

2002-04-29 Thread wlifhoysdpxsiuuz
Title: Free Debt Consolidation Quote




Free Debt Consolidation Information



Free 1 Minute Debt Consolidation Quote
* Quickly and easily reduce Your Monthly Debt Payments Up To 60% 

We are a 501c Non-Profit Organization that has helped 1000's consolidate their debts into one easy affordable monthly payment. For a Free - No Obligation quote to see how much money we can save you, please read on.Become Debt Free...Get Your Life Back On Track!All credit accepted and home 
ownership is NOT required.
 Not Another Loan To Dig You Deeper In To Debt!• 100% Confidential - No Obligation - Free Quote • 









If you have $4000 or more in debt, a trained professional will negotiate with your creditors to:



Lower your monthly debt payments up to 60%


End creditor harassment


Save thousands of dollars in interest and late charges


Start improving your credit rating


Complete
Our QuickForm and Submit it for Your Free Analysis.






		  
			
			
			
			
			

			 
		
  


  
		  
			
		



  
 

  
   

  
   

  


   
 


	
		 
	


	  





Name 




Street Address 





City 




State / Zip 



 Alabama
 Alaska
 Arizona
 Arkansas
 California
 Colorado
 Connecticut
 Delaware
 Dist of Columbia
 Florida
 Georgia
 Hawaii
 Idaho
 Illinois
 Indiana
 Iowa
 Kansas
 Kentucky
 Louisiana
 Maine
 Maryland
 Massachusetts
 Michigan
 Minnesota
 Mississippi
 Missouri
 Montana
 Nebraska
 Nevada
 New Hampshire
 New Jersey
 New Mexico
 New York
 North Carolina
 North Dakota
 Ohio
 Oklahoma
 Oregon
 Pennsylvania
 Rhode Island
 South Carolina
 South Dakota
 Tennessee
 Texas
 Utah
 Vermont
 Virginia
 Washington
 West Virginia
 Wisconsin
 Wyoming 






Home Phone (with area code) 




Work
Phone (with area code) 




Best
Time To Contact 

Morning at Home
Morning at Work
Afternoon at Home
Afternoon at Work
Evening at Home
Evening at Work 
Weekend



Email
address 





Total
Debt 



$4000 - $4999
$5000 - $7500
$7,501 - $10,000
$10,001 - $12,500
$12,501 - $15,000
$15,001 - $17,500
$17,501 - $20,000
$20,001 - $22,500
$22,501 - $25,000
$25,001 - $27,500
$27,501 - $30,000
$30,001 - $35,000
$35,001 - $40,000
$45,001 - $50,000
$50,000+












Please click the submit button
just once - process will take 30-60 seconds.









Not Interested?  Please send and email to [EMAIL PROTECTED]

wlifhoysdpxsiuuz



RE: disk encryption modes

2002-04-29 Thread JonathanW
Title: RE: disk encryption modes





With a 4096 byte cluster size, 1 GB of drive space would require 4 MB temporary key file storage. At this ratio, a 128 MB compact flash card could hold a key file for 32 GB of hard drive space. The key file could be stored on the same physical drive if you wanted to do so, but putting it on separate, and easily microwaveable media gives you the "wipe all the data without touching the actual hard drive" capability. If you trust the reliability of the storage hardware, you could send the main drive the encrypted data and the temporary keyfile drive the temp key data concurrently and let the drive buffering do its magic without a major performance hit. Reliability would be a significant issue, since losing keyfile data would mean the loss of a proportionally larger amount of data on the main storage device. If operational reliability is really super-important, having 2 copies of the key file on separate CDRW's would up the warm-and-fuzzy factor, but require the destruction of both CD's or CF cards or whatever to securely destroy the data.

The main feature I was going for was the ability to give a semi-trusted third party out of the reach of your local men-with-guns the ability to irrevocably destroy your data in an emergency, without giving the third party any of your actual data. If the "I need you to destroy the keyfile NOW" signal was automatically sent to the third party after N failed login attempts by the encryption driver (by writing a pre-arranged random value to a pre-arranged random section of the key file) you wouldn't even have to be conscious. And your (semi) trusted third party could have a similar arrangement with you, to covertly warn you if he was compromised. This design is intended primarily for applications where complete loss of the data is less dire than disclosure of the data to the wrong parties. For these applications, security considerations would probably be more important than absolute cutting-edge performance. but since the keyfile data would be about 0.4% of the actual stored data, I think it could be done reasonably reliably without a noticeable performance hit.

One real-world application that comes to mind for this idea is encryption for a corporate laptop computer. The laptop has an encrypted partition containing the sensitive corporate data, and the keyfile for that partition is stored at corporate HQ. In order for the encrypted partition to be accessed, the laptop has to have a live connection to corporate HQ. Even if this connection was a 33.6 kilobit dialup, you could still encrypt and decrypt at over 800 kilobytes per second, which is fast enough to open up most files in a reasonable amount of time. (The laptop/HQ connection would need to be end-to-end encrypted and authenticated to prevent an attacker from gradually acquiring the keyfile.) If the laptop is stolen, the thief gets none of the encrypted data, and runs the risk of having the computer tattle on his location via caller ID, GPS, or other means when it phones home. You could also use this concept for pay-per-view digital content, but of course it doesn't address the unsolvable issue of once the consumer has decrypted the content, how to make them play nice with it and not redistribute it.

-Original Message-
From: Bill Stewart [mailto:[EMAIL PROTECTED]]
Sent: Monday, April 29, 2002 2:16 AM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: disk encryption modes



At 01:13 AM 04/29/2002 -0700, [EMAIL PROTECTED] wrote:
>  [each cluster has 128 bits permanent half-key, 128 bits nonce half-key...]
>  are for the second cluster, and so on. Each time a disk cluster is 
> written to, a new temporary half-key is pulled from the (P)RNG and used 
> to encrypt the cluster data, and then is stored in the temporary key 
> file. When a cluster is read, the appropriate temporary key half is read 
> from the temporary key file, combined with the permanent key half, and 
> then the data is decrypted.


At least it's big enough to prevent searches through the space.
But it not only requires managing the extra key-file (which could be pretty 
large,
and needs to be kept somewhere, apparently not in the same file system),
it potentially requires two disk reads per block instead of just one,
which is a major performance hit unless you're good at predictive caching,
and more seriously it requires two writes that both succeed.
If you write the key first and don't write out the block,
you can't decrypt the old block that was there, while if you write the 
block first
and don't succeed in writing the key, you can't decrypt the new block.
This makes depending on caching writes much more difficult - it's already 
one of the
things that helps make systems fast and either reliable or unreliable,
and you've made it tougher as well as requiring two disk spins.
You can get some relief using non-volatile memory (the way the Legato 
Prestoserve
did for NFS acceleration - first cache the writ

Re: Odp: Cypherpunks Europe

2002-04-29 Thread Eugen Leitl

On Mon, 29 Apr 2002, Steve Furlong wrote:
 
> Blow me.

Troll, and ye shalt be heard. 

Seriously, while the relationship between furriners and merkins has been 
notoriously strained, might there not be need for a cpunx-europe@? For 
regional announcements, and such. English to be preferrable mode of 
communication, but occasional multilingual excursions could be perhaps 
tolerated (yes, even frogspeak).

The rationale is to mutually decouple regionally and politically local
babble. Who feels compelled to keep track of everything, can always
subscribe to a yet another list.

What say ye, Eurotrash?




Re: p2p and asymmetric bandwidth (Re: Fear and Futility at CodeCon)

2002-04-29 Thread Sampo Syreeni

On Sat, 27 Apr 2002 [EMAIL PROTECTED] wrote:

>So if your P2P application is IPv6 compatible, you can get a semi
>permanent IPv6 IP automatically from a server, and thereafter do peer to
>peer, just as if you were full, no kidding, on the internet.

This nicely solves the problem with NATs, true. However, most firewalls I
know are there for security reasons. Those will likely be adapted to work
for 6to4 as well. The transition period will likely see some cracks where
p2p can work, but I suspect those will be closed in due course.

Sampo Syreeni, aka decoy - mailto:[EMAIL PROTECTED], tel:+358-50-5756111
student/math+cs/helsinki university, http://www.iki.fi/~decoy/front
openpgp: 050985C2/025E D175 ABE5 027C 9494 EEB0 E090 8BA9 0509 85C2




Re: Cypherpunks Europe

2002-04-29 Thread Ken Brown

Tim May wrote:

> > Not sure about the rest of europe - but we have a targetted crypto list
> > in the UK (UKCrypto, sensibly enough) so already have a forum for
> > uk-specific issues.
> > Thats not to say some of it wouldn't be better here - but I am sure our
> > problems with ..
> 
> [name elide to prevent His search engines from finding text with His
> name in it and then threatening legal action.]

Well, he's not quite as bad as Sr A&&&c used to be.
 
> Do you mean _Him_? 

He indeed means  Dr. L G* a long-time reader of, and spasmodic
contributor to, the UKcrypto & Cyber-rights-UK mailing lists. Has
recently been the main troll in sidelining a thread on something I've
forgotten about into a rehash of censorship/anti-censorship arguments. 

> I once followed-up to a post mentioning Him and
> received many threatening e-mails demanding that I cancel my post and
> inform Google that it was to be removed forthwith or both Google and
> myself and my ISP would face massive legal attack.

He makes anti-Choatian category errors -  sort of "I understand physics
therefore I understand ethics|law|politics|society - delete as
appropriate". The main one being that he really seems to think that if
something is against the law then it shouldn't happen, and that it can
be prevented. Ah, I remember - the thread was about Deutsche Bahn suing
ISPs who allowed links to websites purporting to contain instructions
for disabling German railways.
 
> I was tempted to tell him, and his lawyers (er, barristers) to fuck off.

"Lawyers" will do. "Barristers" are professional advocates, lawyers who
plead in court. Very unlikely to be writing cease-and-desist letters. In
England retail lawyers are "solicitors". 

> Either than or to hire a freelance IRA guy to blow him up.

I don't think you get freelance IRA guys. Not with both kneecaps,
anyway.

L** G*** is a nice man. He wrote that the Cult of the Dead Cow
were a "bunch of barely literate mindless American teenage delinquents".
If they lived in England they could possibly sue him for that :-)

Ken




EASILY Lose Weight * Look Younger

2002-04-29 Thread marnetta
 



  
Easily Lose Weight, Build Muscle

AND possibly Reverse the Aging
Process  

. . . That's What The American Academy of Anti Aging Medicine
With Over 10,000 Members (Medical Doctors And Scientists)
in Over 60 Countries Worldwide has reported about HGH Therapy!
Scientific research indicates that HGH therapy may:
  * Improve Sexual Vigor
  * Improve Energy 
* Decrease Body Fat - Increase Lean Muscle Mass 
  * Restore Hair Loss And Color
  * Erase Lines And Wrinkles 
  * Slow Down The Aging Process 
  * Improve Mood And Sleep  
Click
  Here  FOR MORE
 to
Opt-0ff please email  [EMAIL PROTECTED]






Re: Topics and Toposes (Re: "news" is irrelevant -- write code not laws)

2002-04-29 Thread KPJ

It appears as if Tim May <[EMAIL PROTECTED]> wrote:
|
|On Sunday, April 28, 2002, at 10:02  AM, Adam Back wrote:
|
|> There are perhaps 20-30 news items worthy of comment per year and
|> discussion usually happens here so using traditional media news won't
|> achieve anything apart from wasting your time consuming typically
|> heavily biased, technically confused journalists produce cute sound
|> bites and generally mindlessly regurgitating the party line.

Argumentational analysis:

  You only want to comment on ~ 20-30 news items per year.
  People on this list usually discuss those items.
  You feel you waste your time with traditional media.
  You believe the news media people bias the news a lot.
  You believe the journalists do not understand technology.
  You notice they produce sound bites.
  You view them as mindless minions of ``the party line''.
  You don't like the message they deliver.

OK, so you don't like traditional media.  Others might like them, however.

|Agreed. News is dominated by the theme du jour. This week it's the 
|"news" that a lot of priests are homosexual pedophiles...yawn. Or it's 
|the "news" that Arabs and Jews are still killing each other (not fast 
|enough, IMO).

Argumentational analysis:

  You don't like the traditional news media, either.
  You notice that news media choose to not broadcast everything.
  You note that this week they report on homosexual pedophile priests issue.
  You don't care about that issue.
  You note that they also report on Arabs and Jews killing each other.
  You don't care about that issue, either.
  You don't like neither Arabs nor Jews, anyway.

OK. People using a broadcast medium cannot send everything due to economics
in a market oriented capitalistic setting. If you don't interest yourself
for the issues, then I suggest you simply ignore the media. Your decision to
dislike these media appears irrational. Others might well find their reporting
relevant for _their_ interests.

|Sometimes some genuinely interesting news comes out, such as the news 
|about the quark stars. But don't count on t.v. to cover it ("Tonight at 
|11, those weird things the telescope guys have found!").

Most people don't care about QSR's. You do. You form a minority. As one, you
will find less mention of your interests in a market oriented economy. Stands
to reason.

I would suggest that people with minority views or interests simply put up
a web page with their interests, form web rings with other people sharings
their view or interests. Make the pages relevant for those who interest
themselves in these matters, and they will start to create a community.

Of course, that just might leave a lot of information about yourself on the
web, something some people like to avoid.  I would suggest they create a few
'nyms, split the interest between the 'nyms, and put up the interesting pages
on different servers.  Divide and conquer. 

[...lots of your varying interests snipped...]

|Of the "crypto-related news" that _does_ get reported, most of it is a 
|distraction from the real goals.

So, WHO distracts WHOM from WHOSE ``real goals''?

+ Ironically, the lack of new repressive 
|crypto legislation is one of the several reasons crypto has become 
|"tired," to used the "Wired" lingo. With Phil Z. not facing jail, with 
|crypto exporters not facing espionage charges, with Bernstein relatively 
|free to teach, and, most importantly, with Clipper and Mykotronx and all 
|that rot no longer in the news, things have cooled down considerably. No 
|wonder crypto companies are doing so poorly...Verisign down by 50% on 
|Friday as just one example. 

Quite possibly true.  Western venture capitalists wants a fast buck.

+With crypto being relegated to page D-42 of 
|the newspaper, below the tennis scores, public and corporate "awareness" 
|of crypto is almost gone completely. Crypto is not "sexy" the way it was 
|in 1994, when using PGP was both a statement of solidarity with Phil and 
|was a stick poked in the eye of Big Brother.

Why would people interested in crypto care about what Joe Sixpak thinks
about crypto?  Do _you_ feel less interest in crypto when the media does not
paint you as a ``heroic'' fighter against U.S. government?

|(And today, post 911, we have ostensible libertarians arguing for Big 
|Brother controls on thought and writing. Using PGP is now seen by many 
|as unpatriotic. "What have you got to hide?")

Correction: *Previous* libertarians.
They have apparently changed their minds.

|My problem with the "cypherpunks write code" mantra has long been that 
|it is used indiscriminately, often by people who haven't themselves 
|written anything of note. (Doesn't apply to Adam, obviously.)
|
|The flavor of the sentiment is lost when people think it means "don't 
|think about where to go, just start hacking Perl!"

The ``cypherpunks write code'' definition apparently defines a hard core.
The rest

Re: Odp: Cypherpunks Europe

2002-04-29 Thread Ben Laurie

Eugen Leitl wrote:
> 
> On Mon, 29 Apr 2002, Steve Furlong wrote:
> 
> > Blow me.
> 
> Troll, and ye shalt be heard.
> 
> Seriously, while the relationship between furriners and merkins has been
> notoriously strained, might there not be need for a cpunx-europe@? For
> regional announcements, and such. English to be preferrable mode of
> communication, but occasional multilingual excursions could be perhaps
> tolerated (yes, even frogspeak).
> 
> The rationale is to mutually decouple regionally and politically local
> babble. Who feels compelled to keep track of everything, can always
> subscribe to a yet another list.
> 
> What say ye, Eurotrash?

Wouldn't get me anywhere, since I'd be on both lists...

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff




Insight on the News Email Edition

2002-04-29 Thread Insight on the News

INSIGHT NEWS ALERT!

A new issue of Insight on the News is now online

...

Folks, we’ve got some good stuff for you this week. Check out these stories on 
our homepage.

http://www.insightmag.com

...

WHERE OH WHERE CAN OUR OSAMA BE? 

Tim Maier writes how Osama bin Laden and Eric Rudolph have disappeared 
underground, relying only on the support of radical sympathizers and their own 
survival skills.

http://www.insightmag.com/news/246181.html

...

BUSH CHALLENGES TERRORIST FRONTS

Mike Waller tells us that Federal agents have turned up the heat by raiding 
terrorist support groups that operate like friends of Central American 
revolutionaries did in the 1980s.

http://www.insightmag.com/news/246199.html

...

A BILLION HERE, A BILLION THERE—PRETTY SOON. . . 

Kelly O’Meara reveals that trillions of dollars of taxpayers' money is 'missing' 
or 'unaccounted for, according to annual audits mandated by Congress of federal 
agencies and Cabinet departments. 

http://www.insightmag.com/news/246188.html



   Advertisement

 Was the Emancipation Proclamation a political gimmick?

Most Americans consider Abraham Lincoln to be the greatest president in history. 
 What if, instead of an American hero who fought to free the slaves, Lincoln 
were in fact a calculating politician who waged the bloodiest war in American 
history to build an empire that rivaled Great Britain's?  In The Real Lincoln, 
Thomas DiLorenzo uncovers a side of Lincoln not told in many history books.  .

http://www.conservativebookservice.com/BookPage.asp?prod_cd=C5958&sour_cd=INT001301



EUROPE GOING AWOL ON TERROR WAR?

Hans Nichols’ latest dispatch from London says that the latest phase of 
President George W. Bush's anti-terror campaign is getting a cool reception from 
our European allies, who do not think that Iraq is a threat.

http://www.insightmag.com/news/246206.html

...

LIVING SMALL IN WASHINGTON

Brandon Spun and Sam MacDonald tell us that contrary to conventional wisdom not 
all of your congressmen and senators are members of the millionaire's club. 
Surprisingly, the financial condition of your 'man' on Capitol Hill may not be 
anywhere near as good as what he could earn elsewhere. Many live in modest 
circumstances. http://www.insightmag.com/news/246171.html

...

SOUNDING LIKE REPUBLICANS

Hans Nichols tells us that Democrats imitate Republican slogans, but not their 
agenda.

http://www.insightmag.com/news/246227.html



 SUBSCRIBE TO THE INSIGHT PRINT EDITION TODAY!

 And Save 72% (Off Our Newsstand Price)

 https://www.collegepublisher.com/insightsub/subform1.cfm

===






You have received this newsletter because you have a user name and password at 
Insight on the News.
To unsubscribe from this newsletter, visit 
"http://www.insightmag.com/main.cfm?include=unsubscribe";. You may also log into 
Insight on the News and edit your account preferences on the Web.

If you have forgotten or don't know your user name and password, it will be 
emailed to you after visiting the following link:
http://www.insightmag.com/main.cfm?include=emailPassword&serialNumber=16oai891z5&[EMAIL PROTECTED]






Re: Cypherpunks Europe

2002-04-29 Thread David Howe

> I don't think you get freelance IRA guys. Not with both
> kneecaps, anyway.
might be surprised - donations from the states have apparently tailled off
(having been the subject of a terrorist attack themselves they seem less
willing to fund them) and they could do with the revenue - but you are
probably better off talking with the dodgier firms in london - the prices
will be better and they will do a more professional/painful job. The price
improvement is because reusable sledgehammers are cheaper than having to
dispose of a gun ;)

> L** G*** is a nice man. He wrote that the Cult of the Dead Cow
> were a "bunch of barely literate mindless American teenage delinquents".
> If they lived in England they could possibly sue him for that :-)
Maybe they could anyhow - juristiction shopping isn't exclusive to LG. In
fact, I am sure half the list will chip in a tenner or so each to help out
the legal fees ;)





hantuweb

2002-04-29 Thread
Title: ººÍ¼¹ã¸æ--¡°ÔÞÃÀÎÒÃǵÄÎÄ»¯¡±



 


  
  

  
  
   



Easy, Full Color, Professional, Emailable Brochures

2002-04-29 Thread news
Title: eMarket Digital Brochures by Property Line




	
	
		
	
	
		
	
	
		
	
	
		
			
			

			
			
Sample 1
			
			
-
Basic eMarket Digital Brochure
			
			
Sample 2
			
			
-
Uses a movie to display features of the property
			
			
Sample 3
			
			
-
Contains a link to agent's website with more properties
			
			
		
		
		
	
	
		
	
	
		
			
			

			
			


	Listing Services
	Marketing Tools
	Network With Other Agents
	Organize Your Businesss
	About Property Line

			
			
		
		
		
			
			

	
		We program and send to over 50,000 Commercial Brokers, Agents and Investors.
		You resend to your own marketing lists or individuals as part of your own marketing plan.
		Add photos, floorplans, company logos, maps, PowerPoint presentations and even movies!
		Cost effective: $148 to $448
	
	
	
		Brought to you by Property Line
		Your source for eMarket Digital Brochures
		Call us at 888-889-1063
		If you would not like to receive opportunities via email in the future, click here.
		© Copyright 2002 Property Line International, Inc.
	

			
			
		
	
	
	




(Resend) UK's biggest e-pedo bust ever! .. Yet

2002-04-29 Thread Anonymous User

70 more e-pedophiles busted in War To Protect A Single Child.

Big bust of those who trade in verboten pixels on Tuesday.  Computers
towed away to be impounded and none or more children relocated to
safer accomodation.  Link between pornography and action becomes
clearer, movie at 11.

The only interesting part was the company/product touted as the new
tool to pierce chatroom user's illusions of anonymity.  Surfcontrol
even got to whore their product on the wall behind the interviewees. 
This tool allows the authorities to trace a user back to their ISP,
who then turns over their True Name.

The video distributed by the authorities (same images on rotation on
all news progroms) shows newsgroups entitled alt.sex.children and
alt.sex.paedophilla, like that isn't a stupid name for a group.  Can
anyone please verify if these groups actually exist? (or have ever)  I
can't, Big Brother Is Watching Me.  It's safer if you do it for me,
honest.

Channel 5's sensationalistic news coverage was the worst.

First Kirsty Young introduced the article as "A World-Wide-Weapon
Against Our Children?"  Then Matthew Wright, host of daytime talk show
"The Wright Stuff" (You know its Wright [wing!]) just about declares,
"When I hear about child pornography, there ain't a civil libertarian
bone in my body!  There can be no excess in the pursuit of
e-paedophillia!"

He then goes on to say we will never be fully rid of child pornography
since the most determined will always find a way, but just like
we can't solve every murder, there is no reason to give up and
legalise murder.  The problem with the internet is that it allows the
curious to find thoughtcrime rather than just the already committed.

No shit Sherlock!  How long did it take you to figure that out?

And then the conversation gradually drifted round to putting more(?)
pressure on PC retailers to ship NannyWare by default.  How installing
blocking software on my childrens' boxen is going to stop e-pedos
exchanging verboten pixels I don't know.  Do I detect the subtle
fragrance of "Agenda(TM) pour Hominid"?

Remember this is the Channel that brought us the hourly headlines, as in,
"Media Break(TM) You give us two minutes: we'll give you the world."

I guess whatever scares the punters sells more tabloids
^h^h^h^h^h^h^h^h responsible news media^h^h^h^h^h^h message.

--

"You do not need to see my citations.
 These are not the trolls you're looking for."





BBC2 to recreate Stanford Prison Experiment

2002-04-29 Thread Generic Poster

..from an ad in circulation on BBC2 (UK) if I recall inaccurately.

"If they shaved your head, would you lose your individuality?

If they took away your name, would they take your identity?

[..]

16(?) men. Half with power, half with none. See how events unfold in:

The Experiment.

Coming soon to BBC2..."

--

"We don't need no steenking badges!!!"
- Blazing Saddles.




Colonel Panic

2002-04-29 Thread matthew X

At Fox News, the Colonel Who Wasn't
Article about the service record of Joseph Cafasso, until recently a 
military consultant for Fox News in the US
( NY Times )
Links from http://www.hullocentral.demon.co.uk/site/anfin.htm
Also,was shrub a deserter from the national gaurd in his cokedaze.
http://www.indymedia.org/front.php3?article_id=177111&group=webcast
And,US empires cheap imitation of the british.
American navy 'helped Venezuelan coup'
Article covering further allegations of US involvement in the abortive coup 
earlier this month ( Guardian )
See also this article on the role of broadcast media owners in the coup, 
this commentary by Gary Younge, and the National Endowment for Democracy 
web site




How are you doing?! Time:6:30:39 PM

2002-04-29 Thread dailynews





  

Seduction Mail
2002

  
  

  

  


Presenting the Top Secret Seduction Newsletter:

Learn how
to meet and attract the women you've always wanted.
Seduce
absolutely ANY WOMAN, no matter what you look like or how much money you have!

Learn the BEST seduction secrets known to man!

Whether you're looking for one
night stands or the 'perfect' woman to share the rest of your life with. Top
Secret Seduction shows you exactly how to get the women you desire!
We Know What Women - Want It
Could Be You!

Stop being the 'nice guy' - start being the guy who gets laid.
Learn how to look, talk, act, and walk
your way to 'playboy' style success... It's a lot EASIER than you probably think

LEARN:

  How To Attract Women
  How To Seduce Women
  How To Turn Women On
  How To Get Women Into Bed
  How To Make Women Fall In Love

Completely eliminate
rejection!
Women Want To Be Seduced...
Most even fantasize about it. Wouldn't it be smart then to learn WHAT seduces
them?

Subscribe to the FREE
Newsletter from Top Secret Seduction and Have A Lot More Power, Choice and
Success With Women...

  

  

  

  
  

  

  
Subscribe Now!


  

Click on the following link to
Subscribe to the Top Secret Seduction Newsletter:
Yes!
I would like to subscribe!
 
  


  
 


  

To remove yourself from the mailing list, just
click on the link below:
Remove
email address from mailing list
 
  

  

  








Re: (Resend) UK's biggest e-pedo bust ever! .. Yet

2002-04-29 Thread Steve Furlong

Anonymous User wrote:

> The video distributed by the authorities (same images on rotation on
> all news progroms) shows newsgroups entitled alt.sex.children and
> alt.sex.paedophilla, like that isn't a stupid name for a group.  Can
> anyone please verify if these groups actually exist? (or have ever)  I
> can't, Big Brother Is Watching Me.  It's safer if you do it for me,
> honest.

They're not on my ISP's list. The only group with a salacious name
matching "*.children*" is alt.binaries.pictures.children, which I'm
carefully not examining. "*paedo*" and "*pedo*" don't appear at all.


> Remember this is the Channel that brought us the hourly headlines, as in,
> "Media Break(TM) You give us two minutes: we'll give you the world."

If that's based on RoboCop, I think it was "Give us three minutes...".


-- 
Steve FurlongComputer Condottiere   Have GNU, Will Travel

The reasonable man adapts himself to the world; the unreasonable one
persists in trying to adapt the world to himself. Therefore all
progress depends on the unreasonable man.  -- George Bernard Shaw




[9fans] Fourth Release of Plan 9 Now Available (fwd)

2002-04-29 Thread Jim Choate


-- Forwarded message --
Date: Sat, 27 Apr 2002 12:35:56 -0400
From: "rob pike, esq." <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [9fans] Fourth Release of Plan 9 Now Available

The Fourth Edition of Plan 9 may now be downloaded from

http://plan9.bell-labs.com/plan9dist

As usual, this is an open source release.  The release
notes summarize the changes; a copy is attached but
they are available in other formats at:

http://plan9.bell-labs.com/sys/doc/release4.html
http://plan9.bell-labs.com/sys/doc/release4.ps
http://plan9.bell-labs.com/sys/doc/release4.pdf






   Plan 9 From Bell Labs
   Fourth Release Notes
   April, 2002


  Copyright (C) 2002 Lucent Technologies Inc.
All Rights Reserved


The fourth release of the Plan 9 operating system from Bell
Labs packages a major overhaul of the system at every level.
>From the underlying file system protocol, 9P, through the
kernel, libraries, and applications, almost everything has
been modified and, in many cases, redesigned or rewritten.

The most significant change is that 9P has been redesigned
to address a number of shortcomings, most important, its
previous inability to handle long file names.  Unfortu-
nately, squeezing long names onto the disks of existing file
servers is a messy business that we're still grappling with,
so at the moment fs(4) and kfs(4) can't yet handle long
names, although they do talk the new protocol.  (In fact,
they talk both old and new, as required, to ease transi-
tion.) In the meantime, there is a workaround - lnfs(4) -
and many of the other file servers such as ramfs(4) and
u9fs(4) work just fine with long names.  It's only the stan-
dard disk-resident file servers that don't, and as soon we
have versions that do, we'll release them.

The following is a partial list of the major changes
throughout the system.

* The file system protocol, 9P, has been reworked.  It now
has variable-length names, so it can handle long names but
also is more compact when handling short ones.  It uses a
different format that is easily parsed, eliminating the need
for the old aux/fcall utility, and delegates its authenti-
cation duties to an external agent, factotum.

* Security has been a focus of attention.  A new security
agent, factotum(4), manages passwords and other secrets
and, coupled with a new secure file store secstore(4),
enables secure single sign-on.

* Cpu, import, and exportfs all encrypt their connections
now, and since they use the new 9P they also use new network
port numbers.  A new service aan(1) is used by import to
make its network connections more reliable in the face of
network outages.  The old ports still work, through the
agency of a protocol conversion filter srvold9p(4).

* We are phasing out the IL protocol since it doesn't handle
long-distance connections well (and long-distance networks
don't handle it well, either).  IL is still used by fs(4)
(in time, that too will change) but TCP has become the stan-
dard protocol for all other services.

* The software for the new network-resident secure block
store, venti(8), is included with this distribution.  We
are in the process of reworking fs(4) to use Venti rather
than a WORM as its permanent block repository/backup medium,
but that code is only in the design stage and is not
included in this release.

* The need to handle longer file names triggered a rethink-
ing of the way the system handles strings in general.  The
kernel is now more explanatory when it gives an error mes-
sage and more consistent in how it handles strings such as
commands to devices.  The interfaces to many of the system
calls, such as errstr(2) and wait(2) all had to change as
a result, as did the library interface to read directories,
stat(2) and its relatives.

* The formatted I/O package described in print(2) and
fmtinstall(2) has been redesigned.  Although the basic
interface is unchanged, it now runs without locks and has an
internal buffer management mechanism that means print no
longer needs a large on-stack buffer.  The interface for
writing custom print verbs and custom formatted I/O routines
has also been greatly improved.

* The thread library thread(2) has been completely rewrit-
ten.  The main visible change is that, coupled with the
changes to printing, threadprint is gone; you can just use
print or fprint at will.

* Support for electronic mail has been extended in many ways
and now includes some new spam filtering tools, much better
(and more standard) handling of MIME messages, the ability
to render incoming HTML mail, and much more.

There are so many changes to the programming interfaces of
the system that they are described in a separate document,
entitled Changes to the Programming Environment in the
Fourth Release of Plan 9.  Please read it before you start
updating your own software to run under the new system.

The installation method ha

[9fans] PGP (fwd)

2002-04-29 Thread Jim Choate


-- Forwarded message --
Date: Sun, 28 Apr 2002 15:28:00 -0700
From: [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [9fans] PGP

are there as yet any non-technical users of Plan 9?

that is, is anyone's wife or girlfriend or secretary using it?

also, is there software support in the mail client for 
exchanging mail with those using PGP/GPG?





Davetiye

2002-04-29 Thread aylan
Title: ALO OROSPU HATTI id: fd 33rfcs 



TELEKIZLARLA SOHBET EDIN.. HER KONUDA !

  
  


  
  

Adi Soyadi: Arzu 
  KAYALAR
  
Saç Rengi: Esmer
  
Göz Rengi: Siyah
  
Favorisi: Anal 
  Seks
  
Tel: 0 0569 02 8920 YADA 0 
  0569 02 
8921

  
  


  
  

Adi Soyadi: Mehtap 
  YENIGUL
  
Saç 
Rengi: Kumral
  
Göz Rengi: Siyah
  
Favorisi: Grup 
  Seks
  
Tel: 0 0569 02 8922 YADA 0 0569 02 
  8923

  
  


  
  

Adi Soyadi: Sevim 
SEN
  
Saç Rengi: Sari
  
Göz Rengi: Siyah
  
Favorisi: Sert
  
Tel: 0 0569 02 8924 YADA 
  0 0569 02 
  8925

Re: [9fans] PGP (fwd)

2002-04-29 Thread Jim Choate


-- Forwarded message --
Date: Sun, 28 Apr 2002 23:46:40 -0400
From: Russ Cox <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: [9fans] PGP

There's no direct support in the mail clients
for exchanging mail with PGP/GPG users. 

Someone ported PGP at one point, but there
are no hooks for using it.  Our mail isn't
interesting enough that anyone would care
to read it.

Russ




New news from nowhere.

2002-04-29 Thread matthew X

hello folks, we are looking for feed back, positive or negative on the 
ideas we hope to put forward in a new paper we hope to get out around the 
start of June, if you like what we have to say and want to spread them, we 
can send you a flyer with this text and pretty graphics. you can email 
feedback, death threats or whatever to [EMAIL PROTECTED] salud We 
Too Have a Dream... A dream of a society based on mutual aid and voluntary 
cooperation without the coercion of a ruling elite. We dream of a world 
without wars, poverty and oppression, where all are valued and free to live 
our lives rather than the hollow lifestyle sold to us by corporate masters. 
We hope for a world of play and happiness beyond the dull monoculture of 
this one. Reality today is full of unfulfilled people travelling in streets 
full of banks, shops, traffic and neon lights. Streets full of cops and 
adverts of things you don?t even need. We live rushing to work, punching 
the clock when we should be punching our boss. This is capitalist 
reality-selling lifestyles that are a very poor imitation of having a real 
life. There is a real world outside of this capitalist crap, as its been 
said under the pavement a beach. We most oppose the state and all forms of 
coercion. We oppose national borders. Ideas of ethnic or cultural 
superiority recreate the world we hope to escape. Private property and 
money create social division and injustice. Society Sucks Governments have 
nothing to give us except what they have first taken away. No one can give 
us freedom. Groups that promise freedom and peace lie and give us war and 
injustice, perpetrating the injustice of hierarchy in the name of liberty. 
The colonialism so deeply ingrained in our minds has created the monotone 
McCulture of the western world that is being sold to the globe in the 
flashing images on TV and on the silverscreen of Hollywood. The 
disenchantment of industrial production with its time clocks, 
specialization, and production for profit for its own sake is a further 
division of labor that create classism and hierarchy. Social class did not 
fall from the moon. It was created using the division of labor. In hunter 
and gatherer societies men hunted and women gathered. As time went by the 
hunters turn to warriors and then to Kings. This was the embryo of the 
modern patriarchal world. Social classes produce a psychology of 
domination, and when people lose control of their destinies they in turn 
try to control someone or thing else. This alienation is the creator of 
class war, sexism racism homophobia and ecological destruction. Whenever 
someone else is in control humanity and everything else on the planet is 
endangered. Because of fetishism of commodities, we fill our lives with 
stuff. We must work to fill the void left by the consumer world. We fail to 
notice how stuck we are in the vicious circle of production, having to work 
to pay for things we don?t really need as well as working to make more 
junk. Its an insane paper chase and completely unnecessary, except to keep 
consumer capitalism grinding on. Perhaps only 5% of the work done today 
feeds, heats and lights our lives, the rest is pretty much unnecessary. A 
move away from work would obviously benefit the more down trodden people in 
society. Remember the old saying a woman?s work is never done? Well its 
true that women do about 80% of work in the world for very little reward. 
Humanity is out of step with the planet around us. We must reconnect with 
the earth and become, once again, part of the ecosystem rather than outside 
looking in. The richness and diversity of all forms of life have value and 
humanity is part of this web of life and not its center. People are not 
happy with this world, even the police, one of the states guard dogs, 
fought in Madrid because they were unhappy with their jobs having to 
enforce a drinking ban. In Britain Commander Brian Paddick, who is in 
charge of policing in Lambeth, south London, recently said, "the concept of 
anarchism has always appealed to me". In an insane consumer world where you 
have to work long hours so you can fill your life with plastic, Prozac and 
flickering light to fill the void created by the disenchantment that modern 
capitalism has become. Small is Beautiful The boredom of society today 
can?t be reformed it must be replaced. We seek to replace the dominant 
culture of death with the ecology of everyday life, where we reconnect with 
ourselves and the planet around us. A concrete world breed?s apathy but 
even the cities were built on fertile soil and fresh water we just need to 
break through the surface. If we are to reconnect ourselves to the world 
around us we need to work together. Mutual aid and cooperation in affinity 
groups in a community is the anti-dote to the alienation of mass society. 
This will, if we are success overcome the cultural baggage that has created 
racism. If a cat and a crow can work together surely p

best of bleed.

2002-04-29 Thread matthew X

1858 - France: Justice by P-J Proudhon -- philosopher,
economist, sociologist -- appears.
"Property is theft!"
1894 - A Capitol Crime?: Jacob Coxey's protest Army of the Poor
reaches Washington D.C. Led a group of 500 unemployed workers
from the Midwest & arrested for trespassing on Capitol grounds.
JACOB COXEY 1999 SAINT (April 16)
Leader of "Coxey's Army" of hoboes, arrested for strolling on the
White House lawn.
1895 - Warships sent to Nicaragua to "protect" U.S. interests.
Like there might be some others?
1896 - Siverin Ferandel (1896-1978) lives.
1899 - US: Their demand that only union men be employed refused,
members of the Western Federation of Miners (WFM) dynamited the
$250,000 mill of the Bunker Hill Company at Wardner, Idaho,
destroying it completely.
Beloved & Respected Comrade Leader President
McKinley responded by sending in black soldiers
from Brownsville, Texass with orders to round up
thousands of miners & confine them in specially
built "bullpens."
1899 - 1901 saw U.S. Army troops occupying the
Coeur d'Alene mining region in Idaho.
Im reading 'big trouble,'by Lukas about this,got me interested in the civil 
war so I started in on 'battle cry of freedom,'by mc pherson.Addictive 
hirstories.
1915 - Women's International League for Peace & Freedom
founded, The Hague.
1961 - England. 826 arrested in nuclear disarmament
demonstration, London.
1970 - US: National Guard shoots seven students at Ohio State
University. "Teach your children well".
1970 - U.S. invades Cambodia.
1973 - Over 15,000 attending a rock concert by Elvin Bishop,
Canned Heat, Buddy Miles & Fleetwood Mac are routed from
a baseball stadium in Stockton, California, by police firing
tear-gas canisters. More than 80 people, including 28 cops
are hurt & 50 arrests are made.
1975 - US Forces flee Vietnam. Last American planes leave.
1992 - Los Angeles riots kick off immediately following the
"Not Guilty" verdict in the Rodney King trial.
Despite a videotape documenting the episode, an
innocent verdict is returned in the savage police beating of
African American Rodney King, leads to the worst rioting in
Los Angeles history, with much destruction of property,
looting, 53 deaths & hundreds of injuries.
1996 - South Korea: Three men arrested for protesting a
nuclear power plant under construction
Daily bleed for full listings.




Re: Two ideas for random number generation

2002-04-29 Thread Jim Choate


On Wed, 24 Apr 2002, David Howe wrote:

> > No it isn't. You -want- a RNG but you can't have one. Nobody
> > -wants- a PRNG, they -settle- for it.
> I think there is some confusion here - if you are using a PRNG as a stream
> cypher, the last thing in the world you want is for it to be truely random -
> you need to sync up two prngs in order to decrypt the message, and
> randomness would defeat that (I can see a case where you introduce a little
> randomness and use some redundant method to strip it out before encryption,
> but that's only a second layer of obscurity of little value if the
> mainstream crypto is borken.

You (and others I'm sure) seem to miss the point.

I am -not- saying that -all- applications -want- a RNG. Why?

Repeatability. One of the two factors that describe a PRNG.

-If- you have a application using a RNG then, unless you're willing to
break out of the NOT-AND-OR straight jacket then you're stuck with a PRNG.

You want a RNG but can't have one...

You folks can go back to sleep now.


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org






Re: Re: Two ideas for random number generation

2002-04-29 Thread Jim Choate


On Wed, 24 Apr 2002 [EMAIL PROTECTED] wrote:

> That is, to get the infinite cycle, you'd have to have some method of
> generating a uniform random integer 0 to infinity for the
> initial state, and you'd need an infinite amount of memory
> to store  the current internal state.  Neither of which
> is acheivable ion practice.

Actually neither of these are requirement for RNG's. You're fist comment
about 'some method' tends to shoot your argument in the foot right off.

As to the second, no you don't need infinite ram to create a RNG. Please
demonstrate the proof. What you need is -continuity-, not -infinity-.
They're not the same thing. If all it took was infinite memory then a
standard Turing machine could, by your thesis, generate a RNG and we know
from basic principles that isn't possible. Why? Their tape is of infinite
length and zero access time.

> Conversely, a PRNG whose cycle is "only" 2^256 bits long
> will never repeat itself during the lifetime of the device, or
> the lifetime of the universe for that matter.

Depends on the key, in general the modulus of the PRNG is key dependent.
This is another weakness PRNG's.

In addition, the vast majority of PRNG's have a modulus considerably below
2^256. Most of them I've worked with have had modulus lengths less than a
couple of million.


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Re: Two ideas for random number generation

2002-04-29 Thread Jim Choate


Comments inline...

On Wed, 24 Apr 2002, R. A. Hettinga wrote:

> I seem to be channeling mathematicians this morning...
> 
> Cheers,
> RAH
> 
> --- begin forwarded text
> 
> 
> Status:  U
> From: Somebody with a sheepskin...
> To: "R. A. Hettinga" <[EMAIL PROTECTED]>
> Subject: Re: Two ideas for random number generation
> Date: Wed, 24 Apr 2002 08:44:41 -0600
> 
> Bob,
> 
> Tim's examples are unnecessarily complicated.
> 
> The logistic function f(x) = Ax(1-x) maps the interval [0,1] into itself for
> A in the range [0,4].  Hence, for any such A, it can be iterated.
> 
> That is, one may start with an x|0 get x|1= f(x|0) -- where x|j means x sub
> j -- and repeat, thus: x|(n+1) = f(x|n).
> 
> For small enough values of A, the iteration provably converges to a single
> value. For slightly larger values, it converges to a pair of values that
> alternate every other time -- known as a period 2 sequence.  For a slightly
> larger value of A it converges to 4 values that come up over and over
> again -- a period 4 sequence.  Some of this is provable, too.

This is called 'bifurcation'...a mathematician should know that.

> This increase in multiple period states continues briefly for smaller and
> smaller changes in the parameter A.  At some point the period becomes
> infinite, and the sequence becomes not detectably different from random.
> This is an empirical fact, not yet proven so far as I know.

This person should start with Mandelbrots bookx=(x^2)+1 is
'deterministic' as well...but their is a catch to this...

> Note that the function is completely deterministic.  If you know x exactly,
> you know x|n -- exactly.  But if you know x to only finite precision, you
> know very little about x|n.  Specifically, you know only that it is in the
> range [0,1].

You -can't, even in -principle-, know the precision to finite levels. This
is the entire basis for chaos theory.
 
> So Pick A large enough.  Pick an arbitrary double precision floating
> point number (about 14 digits for 64 bit arithmetic) on a given machine.

The selection of a special analysis point to prove a general behaviour of
the function is a logical fallicy.

> sequence of 7 least significant digits.  They're probably uniformly
> distributed in the 7 digit integers.

Probably not, in general (there is a special name for this distribution
but I don't remember and I've got four days mail to catch up on) but the
numbers, [0...9], do -not- appear in nature in equal distribution. If you
are basing anything on this then you're in for a world of hurt.

> If you don't know the seed, you don't know the sequence, so I guess you can
> encrypt with the thing, too.

Actually that's overly general. Other keys could generate that sequence
(PRNG's repeat, and RNG's aren't predictable) so this test is really
worthless.
 
> But you can't prove squat about it!

Hardly.


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org






[no subject]

2002-04-29 Thread Yasholomew Yashinski


--cut text--
From: "Jan Dobrucki" <[EMAIL PROTECTED]>
Date: Mon, 29 Apr 2002 22:01:36 +0200
References: <000701c1ef01$cf237de0$9286fea9@y3q4g8> 
<[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]



Ok, so the thief managed to get into the car. There still voice
recognition, fingerprints, retina scan, DNA scan, and whatever you
can think of. I know this will be expensive, but in the future, well
lets just say I don't think it's going to be sweet.
--/cut text--

So a car requires voice recognition, fingerprints, retina scan, DNA scan, 
and is "like a little tank".. yet you want PGP to be used for entry?

Czesc,

--
Yashy

_
Join the world’s largest e-mail service with MSN Hotmail. 
http://www.hotmail.com




Re: Got carried away...

2002-04-29 Thread Neil Johnson

On Monday 29 April 2002 06:10 am, Graham Lally wrote:
>
> Path of least resistance - *access* to the car is generally not the
> problem. Instead weaker attacks such as breaking the glass, or forcing the
> door work much better. Once inside, a different mechanism again would be
> somebody just steals the PGP keys). To steal an idea from the Mary
> Whitehouse Experience, iirc, car security will be complete when we can use
> imaging technology to disguise someone's latest XR3i as a clapped out
> Austin MiniMetro*.
>
> * Purely for demonstrative purposes only, obviously.

I made a sign for a friend who had recently purchased a Vette. 
It said "please ignore, this car is just a AMC Pacer with a REALLY GOOD paint 
job".


-- 
Neil Johnson, N0SFH
http://www.iowatelecom.net/~njohnsn
http://www.njohnsn.com/
PGP key available on request.




Re: CDR: Re: (P)RNG's and k-distribution

2002-04-29 Thread Jim Choate


On Wed, 24 Apr 2002, Joseph Ashwood wrote:

> - Original Message -
> From: "Jim Choate" <[EMAIL PROTECTED]>
> 
> > For a RNG to -be- a RNG it -must- be infinity-distributed. This means that
> > there are -no- string repititions -ever-.
> 
> Ummm, wrong.

No, correct. It's called -infinity distribution- and is a -requirement-
for RNG's to be accepted as such.

> That would imply that in a binary stream, once 0 has been used
> it can never be used again.

No, that-s 1-distributed, not infinity-distributed. There are many
k-distributions. This guarangees the -largest- string that will repeat.
Clearly you can't have even a PRNG in this case.

If you have i characters and want a sequence of length greater than i then
clearly 1-distributions must be allowed.

Read Knuth, and quite arguing just to argue.


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Slashdot | Nanotechnology, US Government, and Secrecy (fwd)

2002-04-29 Thread Jim Choate


http://slashdot.org/science/02/04/25/1339239.shtml?tid=134


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Byte: Getting in the game - effective lobbying for Open Source (fwd)

2002-04-29 Thread Jim Choate


http://technetcast.ddj.com/tnc_play_stream.html?stream_id=664


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





CNN.com - Britain tests early, high-tech voting - April 25, 2002 (fwd)

2002-04-29 Thread Jim Choate


http://www.cnn.com/2002/TECH/ptech/04/25/high.tech.voting.ap/index.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





kuro5hin.org || "The Death of the West" (fwd)

2002-04-29 Thread Jim Choate


http://www.kuro5hin.org/story/2002/4/23/221217/509


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





RE: Two ideas for random number generation

2002-04-29 Thread Jim Choate


On Thu, 25 Apr 2002, Trei, Peter wrote:

> My point, I hope it is clear, was to prove that there are deterministic
> algorithms which do not repeat.

There are, AND they are continous and -not- based on NOT-AND-OR. I
-never- said there were not deterministic algorithms but then again those
algorithms won't run on a digital computer without losing precision which
-proves- my point, not yours.

Thanks.

> When Jim realized what an fool
> he'd made of himself, he decided to change the subject;

You're the fool, lying and then expecting me not to call you on it.

> first by  claiming this would be a pretty lousy PRNG to use for a cipher

Pi -is- a pretty lousy seed for anything. You are of course welcome to cut
your own head off any time you want any way you want. I'll be a tad more
cautious and considerate of the future and unknowns.

> (of course it is

Unhuh, keep telling yourself that...

 - my point concerned repeated sequences, not 
> making a good cipher), and then to blather about k-distribution 
> (which may be a characteristic of a good PRNG, but is irrelevant 
> to my point).

If you don't understand the importance of k-distribution to what a RNG can
do then  you don't know as much as you think. You should perhaps read
Knuths blathering on the subject, you might learn something.

> I suspect the if Jim were correct, he might actually 
> have a solution to the Halting Problem

There is no solution to the Halting Problem, silly goose. And that you
think there could be is a prime example of the level you operate at.

Peter, as usual, you're full of shit.


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org






Re: Quantum mechanics, England, and Topos Theory

2002-04-29 Thread Jim Choate


On Thu, 25 Apr 2002, Ken Brown wrote:

> One of the classic examples of what is now called "chaos" (a word that I
> don't like in this context). The exact trajectory taken by simple models

Uhuh...

> of predator-prey systems is often very sensitively dependent on initial
> conditions.  Of course in real life these things are stochastic anyway

Then I take it you don't like 'stochastic' since they really mean the same
thing in this context. At least one of the variables in the system -must-
be modeled as some sort of (P)RNG.

False distinction (see hand waving below)

> so the variables in your model should actually be probability
> distributions, which makes the sums much harder and leads to
> considerable handwaving. 

unpredictabilty <> hand waving.


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Re: Two ideas for random number generation

2002-04-29 Thread Jim Choate


On Thu, 25 Apr 2002, Ken Brown wrote:

> "Trei, Peter" wrote:
> 
> [...]
> 
> > >Exactly what is the Choatian definition of a PRNG which requires
> > >it to repeat, anyway?
> 
> Possibly confusion between 2 common English meanings of "repeat".
> 
> (1) repeatable, so if someone else runs the same algorithm on similar
> hardware with the same initial conditions they get the same results,
> which a program to calculate pi will be.
> 
> (2) repetitive, so that if you run the algorithim for long enough a
> given sequence comes round again. Which pi isn't.

Exactly, PRNG's -will- repeat in one of these two ways. RNG's will repeat
strictly speakin only for small k-distributions of characters. The smaller
the better.

As to the second, wrong. pi has lots of examples of repeats (visit the Pi
page and see for yourself) at different k-distribution scales. What pi
won't do is repeat the entire sequence; 314159...314159...

If it did that would make it rational (eg 6 or 328328328328...328...).

Not the same thing at all.


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org






CIA Warns of Chinese Plans for Cyber-Attacks on U.S. (fwd)

2002-04-29 Thread Jim Choate


http://www.latimes.com/news/nationworld/world/la-042502china.story


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Journey to the Internet\'s Unknown Regions (fwd)

2002-04-29 Thread Jim Choate


http://sci.newsfactor.com/perl/story/17418.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





EU Body: U.S. Must Follow Law (washingtonpost.com) (fwd)

2002-04-29 Thread Jim Choate


http://www.washingtonpost.com/wp-dyn/articles/A47622-2002Apr25.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





The Oakland Press - The State Legislature has given police power to search your home without telling you why (fwd)

2002-04-29 Thread Jim Choate


http://www.zwire.com/site/news.cfm?newsid=3936063&BRD=982&PAG=461&dept_id=467992&rfi=6


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





\'Sky Net\' Could Enable Large-Scale Drone Wars (fwd)

2002-04-29 Thread Jim Choate


http://sci.newsfactor.com/perl/story/17442.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Any info on this maybe improved matrix algebra for GNFS? (fwd)

2002-04-29 Thread Jim Choate


-- Forwarded message --
Date: Wed, 24 Apr 2002 07:23:40 +0200
From: Francois Grieu <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Any info on this maybe improved matrix algebra for GNFS?

Found the following at


"(..) The paper, written by Nicko van Someren, CTO of nCipher Corp., a
security equipment vendor based in Cambridge, England (..) discloses
that (..) a student researcher at nCipher recently developed a new
implementation of a factoring method known as the General Number Field
Sieve, or GNFS, which could be used to factor a 512-bit key in about
three weeks using an off-the-shelf server with an Intel Corp. Itanium
processor. The calculations the student performed using the server are
the second phase of the GNFS method.
Previously, this process was thought to be feasible only on much more
powerful computers, such as Cray supercomputers."

In a recent message, Nicko van Someren confirms:
> My research student last winter showed that 512 bit keys can be
> factored in a matter of weeks using only the hardware found in a
> busy 70 person office."

Is there any info on the method used by this student to solve
the matrix algebra?

Is any novelty claimed beyond the technique used in

 "The program we used for this was optimized for running on vector
  computers, which is what CWI used for their record (RSA-155)
  factorization (..) We started to rewrite this program so that it
  would run better on the hardware available for us (..)
  Compaq generously let us use one of their quad processor
  ES40 systems. The total running time on this machine was 13 days,
  which is almost as good as the 16-processor Cray."

or to the one used in the recent

 "The block Lanczos algorithm produced 62 elements of the kernel of
  this matrix. This took two weeks on the six PCs on which the filter
  job was run."


TIA

  François Grieu



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]




CNN.com - Senate measure embraces opt-in privacy standard - April 25, 2002 (fwd)

2002-04-29 Thread Jim Choate


http://www.cnn.com/2002/TECH/industry/04/25/senate.opt.in.idg/index.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Slashdot | RIAA Wants Taxpayer-Funded IP Police (fwd)

2002-04-29 Thread Jim Choate


http://slashdot.org/articles/02/04/26/1236245.shtml?tid=99


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





CNN.com - U.S. criticizes China over copyrights - April 25, 2002 (fwd)

2002-04-29 Thread Jim Choate


http://www.cnn.com/2002/TECH/industry/04/25/china.copyrights.idg/index.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





USATODAY.com - Ex-CIA chief revitalizes 'truth serum' debate (fwd)

2002-04-29 Thread Jim Choate


http://www.usatoday.com/news/nation/2002/04/26/torture.htm


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Re: Any info on this maybe improved matrix algebra for GNFS? (fwd)

2002-04-29 Thread Jim Choate


-- Forwarded message --
Date: Wed, 24 Apr 2002 09:42:58 +0100
From: Nicko van Someren <[EMAIL PROTECTED]>
To: Francois Grieu <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Subject: Re: Any info on this maybe improved matrix algebra for GNFS?

Francois,

This is a new implementation, not a new method, though
there are some neat tricks in this implementation.  Ben Handley
from the University of Otago in New Zealand worked for us last
winter and spent some time on a fast implementation of the
block Lanczos algorithm with the speed critical sections done
in Itanium machine code.  This was one step towards the goal of
showing that 512 bit keys can be factored without having to use
a supercomputer but can in fact be factored using just what we
had in the office.  The technology is little different from the
stuff done to solve the last puzzle in The Codebook other than
the fact that few offices have quad-processor Compaq Alpha
servers but an increasingly large number have Win2K servers
with Itaniums in them.

I think that Ben intends to publish some of the results
and code as part of his university dissertation.  I don't know
if he reads this list so I will forward this message to him in
case he wants to add more.

Nicko


Francois Grieu wrote:

> Found the following at
> 
> 
> "(..) The paper, written by Nicko van Someren, CTO of nCipher Corp., a
> security equipment vendor based in Cambridge, England (..) discloses
> that (..) a student researcher at nCipher recently developed a new
> implementation of a factoring method known as the General Number Field
> Sieve, or GNFS, which could be used to factor a 512-bit key in about
> three weeks using an off-the-shelf server with an Intel Corp. Itanium
> processor. The calculations the student performed using the server are
> the second phase of the GNFS method.
> Previously, this process was thought to be feasible only on much more
> powerful computers, such as Cray supercomputers."
> 
> In a recent message, Nicko van Someren confirms:
> 
>>My research student last winter showed that 512 bit keys can be
>>factored in a matter of weeks using only the hardware found in a
>>busy 70 person office."
>>
> 
> Is there any info on the method used by this student to solve
> the matrix algebra?
> 
> Is any novelty claimed beyond the technique used in
> 
>  "The program we used for this was optimized for running on vector
>   computers, which is what CWI used for their record (RSA-155)
>   factorization (..) We started to rewrite this program so that it
>   would run better on the hardware available for us (..)
>   Compaq generously let us use one of their quad processor
>   ES40 systems. The total running time on this machine was 13 days,
>   which is almost as good as the 16-processor Cray."
> 
> or to the one used in the recent
> 
>  "The block Lanczos algorithm produced 62 elements of the kernel of
>   this matrix. This took two weeks on the six PCs on which the filter
>   job was run."
> 
> 
> TIA
> 
>   François Grieu
> 
> 
> 



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]




kuro5hin.org || Hard reduction: The basis for rational drug policy (fwd)

2002-04-29 Thread Jim Choate


http://www.kuro5hin.org/story/2002/4/25/81546/3419


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





CNN.com - Net firms object to Senate privacy bill - April 26, 2002 (fwd)

2002-04-29 Thread Jim Choate


http://www.cnn.com/2002/TECH/industry/04/26/online.privacy.ap/index.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





kuro5hin.org || Macaulay on Copyright (fwd)

2002-04-29 Thread Jim Choate


http://www.kuro5hin.org/story/2002/4/25/1345/03329


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





The Register - Crackers favour war dailling and weak passwords (fwd)

2002-04-29 Thread Jim Choate


http://theregister.co.uk/content/55/25044.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





CNN.com - UK city begins smart card e-government plan - April 26, 2002 (fwd)

2002-04-29 Thread Jim Choate


http://www.cnn.com/2002/TECH/ptech/04/26/smart.card.govt.idg/index.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





The Register - WIPOUT names essay winners (on WIP Day!) (fwd)

2002-04-29 Thread Jim Choate


http://theregister.co.uk/content/6/25047.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Times Online - Loose connections, 'six degrees of seperation' study a myth? (fwd)

2002-04-29 Thread Jim Choate


http://www.thetimes.co.uk/article/0,,591-260065,00.html


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





Re: Quantum mechanics, England, and Topos Theory

2002-04-29 Thread Jim Choate


On Sat, 27 Apr 2002 [EMAIL PROTECTED] wrote:

> No.

Maybe.
 
> People who think like economists or libertarians will conclude
> that markets tend to stability, because humans will analyze
> fluctuations,

The examples of stable free markets include lots of examples that are not
involved with humans, ants for example. Or the way pigeons divide up the
seed in a given area so that each gets apportioned to their pecking order.

> attempt to predict them, and then take precautionary
> action to protect themselves, which will have the affect of
> smoothing the fluctuation, unless prevented by forceful state
> action as in the 1930s.

Actually you can't control the market, to try kills the market.

> Those who think like ecologists or totalitarians will conclude
> markets are unstable, because they think that humans lack the
> wisdom to anticipate the future. 

Actually the only time a market is stable is when the participants -don't-
analyze the market as a whole, in fact may be completely ignorant of the
existance of a 'market' for that matter. The instant 'control' gets
applied the market will break down. All the examples, mathematical and
biological, that demonstrate market stability are examples where the
agents are following a simple set of rules and this doesn't include global
market state info.

The reality is that both free and control markets fall down. It isn't a
matter of people or not. It's a matter of the 3 laws of thermodynamics.
You can't satisfy all the market agents all the time. Some time, just
because, all the air in the room does rush to one corner.


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org






Verba Volant

2002-04-29 Thread request

30-APR-02
We have been requested to insert the following email address, "[EMAIL PROTECTED]", 
in the Verba Volant Newsletter database. Through this daily service you will receive a 
quotation, selected from amongst the most celebrated philosophers, writers and poets 
of all time and translated into many languages and dialects by volunteers worldwide.
If you would like to confirm your subscription to Verba Volant, please click on the 
following link: 
http://www.logos.net/owa-l/press.subscribe?lang=en&[EMAIL PROTECTED] 
If you do not wish to click on the link, your subscription will be cancelled.
Thank you for your time.
Verba Volant



30-APR-02
Il nous a été demandé d'ajouter l'adresse électronique "[EMAIL PROTECTED]" dans la 
liste des destinataires de Verba Volant, un service qui tous les jours vous adressera 
une citation sélectionnée parmi les œuvres des meilleurs philosophes, écrivains, 
poètes de tous les temps et traduite en de très nombreuses langues grâce à des 
volontaires du monde entier.
Pour confirmer l'inscription à Verba Volant, veuillez vous connecter au lien suivant:
http://www.logos.net/owa-l/press.subscribe?lang=fr&[EMAIL PROTECTED] 
Si vous préférez ne pas cliquer sur le lien, vous ne recevrez rien.

Merci dans tous les cas de nous avoir accordé quelques secondes.
Verba Volant



30-APR-02
Se nos ha solicitado insertar la dirección de correo electrónico 
"[EMAIL PROTECTED]" en el listado de envíos de Verba Volant, un servicio que 
diariamente le enviará citas elegidas entre los mejores filosofos, escritores, poetas, 
etc., traducidas a varios idiomas y dialectos. Dichas citas están traducidas por 
voluntarios que se conectan a nuestra web desde todo el mundo.
Si quiere confirmar la suscripción a Verba Volant, le rogamos entre en: 
http://www.logos.net/owa-l/press.subscribe?lang=es&[EMAIL PROTECTED] 
Si no entra en la dirección señalada no recibirá las citas.
Muchas gracias por el tiempo que nos ha dedicado.
Verba Volant



30-APR-02
Ci è stato chiesto di inserire l'indirizzo di posta elettronica "[EMAIL PROTECTED]" 
nell’elenco dei destinatari di Verba Volant, un servizio che ogni giorno ti invierà 
una citazione scelta tra quelle dei migliori filosofi, scrittori, poeti di tutti i 
tempi e tradotta in moltissime lingue e dialetti grazie alla collaborazione di 
volontari da tutto il mondo.
Se desideri confermare l'iscrizione, ti preghiamo di collegarti al seguente link:
http://www.logos.net/owa-l/press.subscribe?lang=it&[EMAIL PROTECTED] 
Nel caso preferissi non cliccare sul link, non riceverai nulla. 

Grazie comunque per i secondi che ci hai dedicato.
Cordiali saluti.







Re: p2p and asymmetric bandwidth (Re: Fear and Futility at CodeCon)

2002-04-29 Thread Jim Choate


On Sun, 28 Apr 2002, Lucky Green wrote:

> I concur. In fact, I was surprised that not a single one of the many P2P
> solutions presented at the recent excellent CODECON made any mention of
> support for IPv6, which can be easily be added to just about any P2P
> application, while every presenter bemoaned the fact that the existence
> of NAT's between nodes provided severe design and functionality
> constraints. The fix is not just obvious, it is downright trivial on any
> modern OS.

Stop playing with toys. Plan 9.


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org






Re: Quantum mechanics, England, and Topos Theory

2002-04-29 Thread Jim Choate


On Sat, 27 Apr 2002, R. A. Hettinga wrote:

> Except if they're, paradoxically, "Austrian" economists, like Hayek, or von
> Mises, who reject "scientism" and, oddly enough, equilbrium theory.

Then again Mises equated 'capitalism' with 'economics'...even the great
fallfor a good intro to some quick handwaving and jive playing you
should read just the intro to Mises "The Anti-Capitalist Mentality". It's
a hoot if you read the entire book.


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org






NewsForge: Commentary: The future of copyright laws creates two seperate worlds (fwd)

2002-04-29 Thread Jim Choate


http://newsforge.com/newsforge/02/04/27/0227251.shtml?tid=19


 --


 The law is applied philosophy and a philosphical system is
 only as valid as its first principles.
 
James Patrick Kelly - "Wildlife"
   
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org





FW: NAI's seeming replacement for PGP desktop (fwd)

2002-04-29 Thread Jim Choate


-- Forwarded message --
Date: Wed, 24 Apr 2002 14:45:56 -0400
From: "R. A. Hettinga" <[EMAIL PROTECTED]>
To: Digital Bearer Settlement List <[EMAIL PROTECTED]>,
[EMAIL PROTECTED]
Subject: FW: NAI's seeming replacement for PGP desktop


--- begin forwarded text


Status:  U
From: Somebody
Subject: FW: NAI's seeming replacement for PGP desktop
Date: Wed, 24 Apr 2002 16:52:24 +0100
Thread-Topic: NAI's seeming replacement for PGP desktop
To: <[EMAIL PROTECTED]>


-Original Message-
From: 
Sent: 24 April 2002 15:37
To: 
Subject: NAI's seeming replacement for PGP desktop

http://www.mcafeeb2b.com/products/ebusiness.asp

...named "McAfee E-Business Desktop".  Just had a talk with our local
sales rep.  From our talk, and from what I can see on the URL above,
this appears to be (or at least incorporate) portions of PGP desktop,
with some restrictions:

- Purchaser must already have at least one E-Business Server license
(PGP Server in conjunction with some other crypto), at $2000 per license
- The product appears to require interaction with the server in order to
function -- no more standalone crypto?

Unknown are:

- whether there is a commandline interface, or if the app is scriptable
- whether there is compatibility with existing PGP keyrings
- key management -- is there a central repository, and how is it
managed?
- does crypto occur only on the server, or on the desktop?  If the
former, some interesting security issues

Still awaiting word on:

- whether NAI will still sell us licenses to make more copies of 6.5.8
(so far, answer is "doubtful")

Q.  Why not use 6.5.8 freeware (for which there is source?)
A.  If used commercially, a license must be purchased from NAI -- same
as for commercial 6.5.8

Q.  What about gnupg?
A.  Possibility -- some key compatibility issues exist that may or may
not affect us.  Someone would need to build and own the code.

More info as it comes in...


--- end forwarded text


-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]




Gartner supports HK smart ID card use (fwd)

2002-04-29 Thread Jim Choate


-- Forwarded message --
Date: Wed, 24 Apr 2002 10:27:59 -0400
From: "R. A. Hettinga" <[EMAIL PROTECTED]>
To: Digital Bearer Settlement List <[EMAIL PROTECTED]>,
[EMAIL PROTECTED]
Subject: Gartner supports HK smart ID card use

http://technology.scmp.com/cgi-bin/gx.cgi/AppLogic+FTContentServer?pagename=SCMP/Printacopy&aid=ZZZ2HRQ0B0D





Tuesday, April 23, 2002
Gartner supports HK smart ID card use


DOUG NAIRNE

Research firm Gartner has issued a favourable report on Hong Kong's
contentious smart identification card programme, saying the initiative will
put Hong Kong at the forefront of deploying the technology.

Dion Wiggins, research director at Gartner Group in Hong Kong, said the SAR
was continuing its history of pioneering smart card use with its decision
to issue ID cards with an embedded chip to all residents.

"Once implemented, Hong Kong will be well-positioned to deliver efficient
government services as well as provide greater security, community
benefits, access and streamlined secure e-commerce to its entire
population," Mr Wiggins wrote in a briefing paper last week.

"The implementation of the [smart card] project will take Hong Kong a long
way towards its goal of being one of the first truly digital economies."

Australia-based Gartner analyst Robin Simpson said Hong Kong would be the
first government to implement a multi-purpose, multi-application smart ID
for its population.

"One reason that the Hong Kong SAR project is so significant is that for
the first time, smart card infrastructure will be very widely deployed
across the whole geography to service the entire population," he said.

Mr Simpson said other jurisdictions had wrestled with a dilemma where
citizens would not want smart cards unless they could use them everywhere,
but enterprise would not deploy sufficient infrastructure unless a large
number of people had smart cards.

He said the project was also significant because it was the first time a
government had encouraged private enterprise to take advantage of the smart
card infrastructure by allowing certified third-party applications to be
loaded on to the cards.

The new ID card programme will be formally launched in July, and the cards
will be phased in over four years.

They will store data including a photograph and fingerprints, and can
optionally be used as a digital certificate, driving licence and library
card.

Despite government assurances that the information stored on the cards will
be secure, there have been concerns over forgery or theft.

However, Gartner concludes that the existing ID card system, which was
introduced in 1987, is "outdated and no longer able to meet the growing
needs of the . . . Government".

Mr Wiggins said Hong Kong's small population and mandatory identity card
programme made the adoption of smart cards easier to execute.

He said the HK$3 billion programme cost is only 10 per cent higher than the
cost to replace existing ID cards with a non-smart ID.

Gartner concludes that Hong Kong will be one of the few places where smart
ID cards are embraced in the near future.

In the United States, where the Government is pondering a national ID card
programme in the wake of the September 11 terrorist attacks, there has been
fierce resistance to the idea.

Adding smart functions to the cards will make them even less palatable,
Gartner predicts.

The report said: "National identification cards will face a steep uphill
battle that will impede their deployment and acceptance in the US. Through
2007, US-based identification card deployers will encounter substantial
resistance to adoption that will increase with added functionality."



SCMP.com is the premier information resource on Greater China. With a
click, you will be able to access information on Business, Markets,
Technology and Property in the territory. Bookmark SCMP.com for more
insightful and timely updates on Hong Kong, China, Asia and the World.
Voted the Best Online newspaper outside the US and brought to you by the
South China Morning Post, Hong Kong's premier English language news source.


Published in the South China Morning Post. Copyright © 2002. All rights
reserved.

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]




BBC News | SCI/TECH | PC networks inspired by gossip (fwd)

2002-04-29 Thread Jim Choate


-- Forwarded message --
Date: Mon, 29 Apr 2002 16:47:25 -0500
From: James Choate <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: BBC News | SCI/TECH | PC networks inspired by gossip

Can you say 'Small World Networks'?...

http://news.bbc.co.uk/low/english/sci/tech/newsid_1939000/1939928.stm