Ray Dillinger wrote:
> Instead, they will attack the weakest point -- trying to drive
> remailer operators out of business and thus destroy the
> infrastructure you need. That is the threat model I'm concerned
> about, and given that network monitoring is now automatable and
> cheap, it is entire
Some damned coward hiding behind a remailer wrote:
> Someone seriously does need to start a node which only accepts posts
> from remailers.
Or a list. One thing you know about an anonymous message - the poster
uses at least one cryptographic tool. Too many "cypherpunks" not only
don't write cod
Well, they are original. I do not recall any other instance when
a government said "we will not snoop."
---
"Former Yugoslav President Slobodan Milosevic has no longer any
influence on the police and army force in the country, and all phone
taps, both fixed and mobile in Serbia have stopped, sta
We must not wait while dangers gather. They are either with us
on computer security, or they are with the terrorists. We know
they have these weapons for mass communications destruction and
disruption and they have used them before. Preemptive actions
are insufficient. Preventive actions are a
On Thu, 19 Jun 2003 07:41:52 -0700, you wrote:
>
> At 01:07 AM 6/19/03 -0400, Tyler Durden wrote:
> > Methinks Mr Hatch is not a very bright man.
>
> A Southern senator. Need I say more?
Yes, a little more. Do you mean "southern Utah"?
Hey, any stereotype in a storm, eh?
On Fri, 20 Jun 2003 09:27:50 -0400, you wrote:
>
> today...
>
>
> SURVEILLANCE MATTERS
> Commodity Futures Trading Commission (CFTC) (F.R. Page 35631)
> Closed meeting to discuss surveillance matters.
> Location: 1155 21st St., NW, 9th Floor Conference Room,
> Washington, D.C.. 11 a.m.
> Contac
-BEGIN TYPE III ANONYMOUS MESSAGE-
Message-type: plaintext
Tim,
I AM GETTING TIRED OF SEEING CYPHERPUNKS RESTRICTING WHAT INFORMATION
FLOWS AND TO WHERE IT FLOWS...
-END TYPE III ANONYMOUS MESSAGE-
Hello
I'm curious. You say the list got some 400+ members right now and that's only the lne
node too. Can you provide some statistics on the users? How many addresses are .gov?
Any valid TLA addresses in there?!
>The U.S. official's way of behaving like Texas rednecks are embarrassing. Not
Crosspost from nettime:
Subject: wrong signals
If symbols really do matter we might conclude that American
administration's PR machine has got it badly wrong. In the carefully
orchestrated news management of Saddam
http://www.fauxnewschannel.com/
On Wed, 17 Oct 2001 16:52:45 -0500 (CDT) Jim Chaote grokked...
>Once again Tim shows how little he really does understand...
>
>On Wed, 17 Oct 2001, Tim May wrote:
>
>> _their_ rights. The issue is about _my_ rights.
>
>'their' rights ARE 'your' rights.
>
At least it's nice to see Jim Chaote agr
[EMAIL PROTECTED] (Khoder bin Hakkin) writes:
http://dailynews.yahoo.com/h/cn/20011205/tc/national_computer-security_site_attacked_1.html
> National computer-security site attacked
>
> By Robert Lemos CNET News.com
>
> The Computer Emergency Response Team's Coordination Center, an
> important na
Have any of the cypherpunks run across useful analyses of the recently
released bin Laden videotape?
Mainstream media seems ready to question the accuracy of the translation -
but I'm curious if the tape has any basis in reality at all.
Purportedly, it was discovered by unidentified parties in a
Out of nowhere cometh Steve Thompson, and sayeth he all manner of things.
But, while his mouth moveth one way, he seemeth to move the other.
http://groups-beta.google.com/groups?q=%22steve+thompson%22&start=0&hl=en&safe=off&;
What hath suddenly attracted our AUK creep?
Out of nowhere cometh Steve Thompson, and sayeth he all manner of things. But,
while his mouth moveth one way, he seemeth to move the other.
http://groups-beta.google.com/groups?q=%22steve+thompson%22&start=0&hl=en&safe=off&;
What hath suddenly attracted our AUK creep?
> >> PS: heard some fedscum mention 'militia and other terrorists' the
> other
> >> day, what would Gen George W think?
> >
> >which fedscum, do you have a mentionable source, &c.?
>
> It was ATF, about some gun-robbers; it seems to be a reply to trollbait
> by the Faux news channel or spontaneous
or Is there no computers in Brazil?
Thomas Sjoegren has created [0]maps of the [1]SILC, [2]TOR and key server
networks.
According to the images running servers related to privacy is mostly a western
thing,
out of 115 servers only eight are located outside the US and Europe.
[0]http://www.northe
http://reuters.myway.com/article/20050511/2005-05-11T173816Z_01_N11199658_RTRIDST_0_NEWS-SECURITY-WASHINGTON-DC.html
> WASHINGTON (Reuters) - Fighter jets scrambled over Washington and
> authorities hurriedly evacuated the White House and the U.S. Congress
> on Wednesday when an unidentified plan
> >new terrorist target: Union Station
>
> You used a remailer for THAT?!!
You used a pseudonym for THAT?!
Hettinga advocates:
> So, what, declare all current property claims in Fallujah to be null and
> void, sell claims off to the highest bidder, and whoever gets there with
> the most men owns it. I mean, it worked in Texas with the Comanches and
> Apaches...
> Yeah, it's a fantasy, but we all have
Perry Metzger writes, on his cryptography list:
> By the way, I should mention that an important part of such a system
> is the principle that representatives from the candidates on each side
> get to oversee the entire process, assuring that the ballot boxes
> start empty and stay untampered wit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Often people ask about blind DSA signatures. There are many known
variants on DSA signatures which allow for blinding, but blinding "plain"
DSA signatures is not discussed much.
Clearly, blinding DSA signatures is possible, through general purpose
t
I've noticed a very high increase of incoming virii and malicious code of
various sorts to one of my nyms. Since the nym is not used anywhere
publically I really wonder if these are deliberate attacks to try to
compromise the machines of people using nyms to protect their identity. Is
this somethi
Steve Thompson:
> If that's true, then the government couldn't have stolen it.
> However, I suspect that mainfraim code of any sophistication is
> rarely released into the public domain. I imagine the author would
> be able to clear that up, assuming he has no financial reason to
> falsify its
...Lots of data...
Save as plain text anything.html on desktop and drop onto a browser.
me