Title: Yahoo! Email Verification
Help
Do not reply to this message. If this account doesn't belong to you, please follow the instructions at the end of this email.
Hello cypherpunks@minder.net,
We have received your request to join the hersey-serbest
group hosted by Yahoo! Groups, a free, easy-to-use community service.
This request will expire in 7 days.
TO BECOME A MEMBER OF THE GROUP:
1) Go to the Yahoo! Groups site by clicking on this link:
http
On Wed, Oct 26, 2005 at 08:41:48PM -0500, Shawn K. Quinn wrote:
> 1) You have told your HR person what a bad idea it is to introduce a
> dependency on a proprietary file format, right?
Telling is useless. Are you in a sufficient position of power to make
them stop using it? I doubt it, because th
- Forwarded message from Roger Dingledine <[EMAIL PROTECTED]> -
From: Roger Dingledine <[EMAIL PROTECTED]>
Date: Wed, 26 Oct 2005 16:55:36 -0400
To: [EMAIL PROTECTED]
Subject: EFF is looking for Tor DMCA test case volunteers
User-Agent: Mutt/1.5.9i
Reply-To: [EMAIL PROTECTED]
Fred asked m
- Forwarded message from Kerry Bonin <[EMAIL PROTECTED]> -
From: Kerry Bonin <[EMAIL PROTECTED]>
Date: Thu, 27 Oct 2005 06:52:57 -0700
To: [EMAIL PROTECTED], "Peer-to-peer development." <[EMAIL PROTECTED]>
Subject: Re: [p2p-hackers] P2P Authentication
User-Agent: Mozilla Thunderbird 1.0.6
- Forwarded message from David Farber <[EMAIL PROTECTED]> -
From: David Farber <[EMAIL PROTECTED]>
Date: Wed, 26 Oct 2005 19:28:46 -0400
To: Ip Ip
Subject: [IP] EFF: Court Issues Surveillance Smack-Down to Justice Department
X-Mailer: Apple Mail (2.734)
Reply-To: [EMAIL PROTECTED]
Begi
Thanks for notifying us with your weight problem concerns.
Our 2 Nutritionists are online 24 hours a day to answer your questions or
concerns.
Virginia Carter and Robert Rogers have been nutritionists for the past
10 years and are recommending that you try a 2-3 month supply of hoodia.
Thi
At 08:41 PM 10/26/05 -0500, Shawn K. Quinn wrote:
>On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote:
>> Many of the anonymity protocols require multiple participants, and
>> thus are subject to what economists call "network externalities".
The
>> best example I can think of is Microsoft Office fi
[Using the *financial* angle, having to show state-photo-ID is
overturned to vote
is overturned. Interesting if this could be used for other cases where
the
state wants ID.]
Today: October 27, 2005 at 12:33:27 PDT
Court Blocks Ga. Photo ID Requirement
ASSOCIATED PRESS
ATLANTA (AP) - A feder
Here's a very interesting case where (c)holders are trying
to ban "fair use" (educational) of (c) material. I agree with
their motivations ---Kansan theo-edu-crats need killing for their
continuing child abuse-- but I don't see how they can get around the
fair use provisions.
(Bypassing whether
Thanks for notifying us with your weight problem concerns.
Our 2 Nutritionists are online 24 hours a day to answer your questions or
concerns.
Patricia Jones and Charles Roberts have been nutritionists for the past
10 years and are recommending that you try a 2-3 month supply of hoodia.
Th
At 12:23 PM -0700 10/27/05, Major Variola (ret) wrote:
>Why don't you send her comma-delimited text, Excel can import it?
But, but...
You can't put Visual *BASIC* in comma delimited text...
;-)
Cheers,
RAH
Yet another virus vector. Bah! :-)
--
-
R. A. Hettinga
The Internet Bea
On 10/26/05, Shawn K. Quinn <[EMAIL PROTECTED]> wrote:
> On Tue, 2005-10-25 at 23:40 -0500, Travis H. wrote:
> > Many of the anonymity protocols require multiple participants, and
> > thus are subject to what economists call "network externalities". The
> > best example I can think of is Microsoft
At 8:18 PM -0700 10/27/05, cyphrpunk wrote:
>Keep the focus on anonymity. That's what the cypherpunks list is
>about.
Please.
The cypherpunks list is about anything we want it to be. At this stage in
the lifecycle (post-nuclear-armageddon-weeds-in-the-rubble), it's more
about the crazy bastards w
> The cypherpunks list is about anything we want it to be. At this stage in
> the lifecycle (post-nuclear-armageddon-weeds-in-the-rubble), it's more
> about the crazy bastards who are still here than it is about just about
> anything else.
Fine, I want it to be about crypto and anonymity. You can
On Thu, 2005-10-27 at 20:18 -0700, cyphrpunk wrote:
> This is off-topic. Let's not degenerate into random Microsoft bashing.
> Keep the focus on anonymity. That's what the cypherpunks list is
> about.
Sorry, but I have to disagree. I highly doubt that Microsoft is
interested in helping users of th
On 10/25/05, Travis H. <[EMAIL PROTECTED]> wrote:
> More on topic, I recently heard about a scam involving differential
> reversibility between two remote payment systems. The fraudster sends
> you an email asking you to make a Western Union payment to a third
> party, and deposits the requested a
On Thu, 2005-10-27 at 23:28 -0400, R.A. Hettinga wrote:
> RAH
> Who thinks anything Microsoft makes these days is, by definition, a
> security risk.
Indeed, the amount of trust I'm willing to place in a piece of software
is quite related to how much of its source code is available for review.
Surp
Wasn't there a rumor last year that Skype didn't do any encryption
padding, it just did a straight exponentiation of the plaintext?
Would that be safe, if as the report suggests, the data being
encrypted is 128 random bits (and assuming the encryption exponent is
considerably bigger than 3)? Seems
On 10/26/05, James A. Donald <[EMAIL PROTECTED]> wrote:
> How does one inflate a key?
Just make it bigger by adding redundancy and padding, before you
encrypt it and store it on your disk. That way the attacker who wants
to steal your keyring sees a 4 GB encrypted file which actually holds
about a
> From: Kerry Bonin <[EMAIL PROTECTED]>
> Date: Thu, 27 Oct 2005 06:52:57 -0700
> To: [EMAIL PROTECTED], "Peer-to-peer development." <[EMAIL PROTECTED]>
> Subject: Re: [p2p-hackers] P2P Authentication
> User-Agent: Mozilla Thunderbird 1.0.6 (Windows/20050716)
> Reply-To: "Peer-to-peer development."
21 matches
Mail list logo