> Killing remailers will be a by-product of regulating the net.
Regulating the net to this extent would be a huge undertaking. Trying to
regulate dead-tree publishers to this level would be a large undertaking, a
task not likely to be accomplished without a lot of debate in Congress --
and there
> Compare this with the original claim: "in a properly designed
> anonymity
> system the users will be, well, anonymous, and it should be impossible
> to tell any more about them than that they pay their bills on time."
> These examples illustrate the falsehood of this claim. Much more
> is lear
"An efficient Scheme for Proving a Shuffle", Crypto 2001, Jun Furukawa and
Kazue Sako (NEC Corporation), apparently could be used to show that a
remailer is processing all messages without revealing the header or contents
of any message. (Apparently because I haven't read the paper -- just heard
Title: RE: Re: The Privacy/Untraceability Sweet Spot
>When you were asked where were all the supposed wealthy freedom fighters
>in communist controlled regimes, you came back with Osama bin Laden.
Tim's point, which many seem to have missed, is that by design a tool that enforces the privacy
>When you were asked where were all the supposed wealthy freedom fighters
>in communist controlled regimes, you came back with Osama bin Laden.
Tim's point, which many seem to have missed, is that by design a tool that
enforces the privacy, anonymity, and pseudonymity of a women striving for
equa
>Radio is cheap and hot. When was the last time you heard a Libertarian
>sentiment on radio (except talk radio). The closest I've heard are the
"Vote
>Freedom" ads by Charleton Heston.
Last week I heard 2 different ads for Indiana LP candidates on a station
that plays hip-hop, alternative, and
> To help you understand this further, what it means is that if
> there's a
> database out there, somewhere, collecting personally
> identifying information
> about me, I should know about its EXISTENCE. The mere fact
> that this database
> exists should not be a secret to society at large (
David Honig writes:
>You want to overwrite a dozen times with random (each time) data.
I'd be cautious about saying that. Way back when I held a security
clearance, the instructions were:
* Overwrite with patterns 99 times for SECRET materials; and
* Overwrite with patterns 999 times for TOP SEC
> Don't take offense at such personal deconstruction. I'm
> merely pointing out what we *actually* know, vs. what
> is claimed.
Your reply was the funniest thing I've read today. "Group of ephemeral
psyop pranksters" indeed!
==
Mark Leigh
Reese wrote:
>Under the Buchanan admin, they probably will?
>
>And just wtf makes you think Buchanan has a candles chance in a tornado?
>
>The problem isn't what an un-electable candidate wants to do,
a) Unless Gore or Bush declares themselves Dictator-For-Life, there will be
elections again in 2
Reese wrote:
>>What about if I purchase the Navaho module for my Dragon
>>Dictate, voice input software, and have it translate the conversations I
>>capture from by back porch?
>>
>IANAL. This may fall under illegal eavesdropping, whether you make a
>recording MayOrMayNot be a determining factor
>What I object to is the _forced_ "kindness" based on mob rule, where
>it is decreed that we must all donate money at the point of a gun to
>support welfare bums who got high instead of reading and studying.
Welfare may have started with the best of intentions, but the result is
multiple genera
> Ed Gerck wrote:
> > As to the counter-example you ask, the general public profits by
> > lack of disclosure of the algorithm that allows nuclear bombs
> > to be made with 1 pound of enriched uranium. We have less
> > nuclear powers.
>
I'd like one of the real physicists on the list to weigh i
Relevant article:
"Even Databases That Lie Can Be Compromised", IEEE Transactions on Software
Engineering, Vol. SE-4, No. 1, January 1978.
==
Mark Leighton Fisher Thomson Consumer Electronics
[EMAIL PROTECTED] Indianapo
Tom Vogt wrote:
> cataloging and database functions while you use some
> computerized search
> engine to sift through it. but any search engine relies either on the
> meaningfullness of full-text search, which is questionable, or on some
> kind of catalogue, even if it's just META keywords. in th
15 matches
Mail list logo