Major Variola (ret.) wrote:
> Slashdot pointed to this story of a man indicted via
> his *relative's* DNA sample:
>
> http://news.bbc.co.uk/2/hi/uk_news/wales/3044282.stm
>
> But an interesting, unmentioned issue is this: in population
> DNA surveys you find that a lot of purported fathers *aren
Alan wrote:
>
> On Friday 27 July 2001 11:13, Steven M. Bellovin wrote:
> > In message <[EMAIL PROTECTED]>, Declan McCullagh writes:
> > >One of those -- and you can thank groups like ACM for this, if my
> > >legislative memory is correct -- explicitly permits encryption
> > >research. You can ar
Bram Cohen wrote:
>
> On Sat, 7 Oct 2000, Ben Laurie wrote:
> >
> > Since we're in hair-splitting mode, I should point out that "prevents
> > the denial of an act" is not equivalent to a "negation that something is
> > false". Of cour
Richard Clayton wrote:
and in these schemes, where does our esteemed moderator get _his_ stamps
from ? remember that not all bulk email is spam by any means... or do
we end up with whitelists all over the place and the focus of attacks
moves to the ingress to the mailing lists :(
He uses the stamp
Sunder wrote:
> To add to this:
>
> There is no law stating that I cannot take my books and read them
> backwards, skip every other word, read the odd chapters in reverse and the
> even chapters forward, or try to "decode" the book by translating it to
> another language, ask someone with better
Adam Back wrote:
On Mon, May 10, 2004 at 02:42:04AM +, Jason Holt wrote:
Another approach to hiding membership is one of the techniques
proposed for non-transferable signatures, where you use construct:
RSA-sig_A(x),RSA-sig_B(y) and verification is x xor y = hash(message).
Where the sender is p
subscribe cypherpunks-moderated
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
Steve Furlong wrote:
> A list of "address servers", using any IP address and port, would be
> written up in a text or binary file. This text file would be XORd with a
> couple of random 128kB pads, and then sent to a newsgroup. A client who
> wished to retrieve the list would read the result pad,
Anonymous wrote:
>
> [Copied to Adam so he doesn't have to wait for some moderator to get
> off his fat ass and approve it. And BTW permission is NOT granted to
> forward this or any part of it to the DBS list because Hettinga is an
> asshole who kicks people off his list for spite. He can piss
gfgs pedo wrote:
>
> hi,
>
> --- [EMAIL PROTECTED] wrote:
> > On 22 Apr 2002 at 0:08, Ben Laurie wrote:
>
> > > Oh surely you can do better than that - making it
> > hard to guess the seed
> > > is also clearly a desirable property (and one that
Travis H. wrote:
> Part of the problem is using a packet-switched network; if we had
> circuit-based, then thwarting traffic analysis is easy; you just fill
> the link with random garbage when not transmitting packets. I
> considered doing this with SLIP back before broadband (back when my
> frien
Peter Gutmann wrote:
Eugen Leitl <[EMAIL PROTECTED]> writes:
"A way that works" would involve passphrase-locked keyrings, and forgetful
MUAs (this mutt only caches the passphrase for a preset time).
"A way that works *in theory* would involve ...". The chances of any vendor
of mass-market sof
Tyler Durden wrote:
The hascash idea is OK, and obviously will work (as of now...the
dividing line between human and machine is clearly not static, and
smarter spam operations will start doing some segmentation analysis and
then find it worthwhile to pay up). But the kind of person that may have
Bill Stewart wrote:
At 03:15 PM 9/6/2004, Hadmut Danisch wrote:
On Mon, Sep 06, 2004 at 11:52:03AM -0600, R. A. Hettinga wrote:
>
> E-mail security company MX Logic Inc. will report this week that 10
percent
> of all spam includes such SPF records,
I have mentioned this problem more than a year a
Tyler Durden wrote:
Hum.
So my newbie-style question is, is there an eGold that can be verified,
but not accessed, until a 'release' code is sent?
proof-of-delivery protocols might help (but they're patented, as I
discovered when I reinvented them a few years back).
In other words, say I'm buyin
Tyler Durden wrote:
What if I block the outbound "release the money" message after I
unbundle the images. Sure, I've already committed my money, but you
can't get to it. In effect I've just ripped you off, because I have
usable product and you don't have usable money.
Well, yes, but this would be
Hal Finney wrote:
Ben Laurie writes:
How do you make the payment already "gone" without using a third party?
Of course there has to be a third party in the form of the currency
issuer. If it is someone like e-gold, they could do as I suggested and
add a feature where the buyer coul
Tyler Durden wrote:
I got a hold of a little gadget recently that is very nearly perfect for
certain forms of data storage. It's called a "Thumbdrive" and I bought
it online somewhere (64Meg for about $179 or so).
The cool thing about this drive (small enough that it has holes for use
as a key
Tim May wrote:
>
> On Monday, April 22, 2002, at 11:23 PM, Joseph Ashwood wrote:
> >
> > From: <[EMAIL PROTECTED]>
> >> If a RNG runs off Johnson noise, then the ability to predict its
> >> output would imply the ability to violate the second law of
> >> thermodynamics. If it runs off shot nois
Lucky Green wrote:
>
> [Written originally in response to a post on Cryptography. --Lucky]
>
> Enzo wrote:
> > Further to Lucky's comments: in the last few days I have
> > discussed keysize issues with a few people on a couple of
> > mailing lists, and I have encountered a hostility to large
> >
"Major Variola (ret)" wrote:
> There is a fascinating demo-photograph that shows reflections off
> 4 stacked steel balls is a classical fractal.
"Topology in chaotic scattering" - DAVID SWEET, EDWARD OTT & JAMES A.
YORKE
http://www.nature.com/cgi-taf/DynaPage.taf?file=/nature/journal/v399/n6734
Eugen Leitl wrote:
>
> On Mon, 29 Apr 2002, Steve Furlong wrote:
>
> > Blow me.
>
> Troll, and ye shalt be heard.
>
> Seriously, while the relationship between furriners and merkins has been
> notoriously strained, might there not be need for a cpunx-europe@? For
> regional announcements, and
[EMAIL PROTECTED] wrote:
>
> --
> On 29 Apr 2002 at 14:58, Sampo Syreeni wrote:
> > [IPv6] nicely solves the problem with NATs, true. However, most
> > firewalls I know are there for security reasons. Those will
> > likely be adapted to work for 6to4 as well. The transition
> > period will li
Adam Back wrote:
> The bank charges 20 GBP or more to do the same day transfer
> electronically (CHAPs), where as the "no fee" option is BACs and takes
> 3 working days and they keep the interest on your money while it's
> moving.
BTW, pedantry: they're CHAPS (Clearing House Automated Payment Sys
[EMAIL PROTECTED] wrote:
>
> On 14 May 2002 at 13:47, R. A. Hettinga wrote:
>
> > At 8:10 AM -0700 on 5/14/02, [EMAIL PROTECTED] wrote:
> >
> >
> > > How could this possibly be true? :ast I checked, GDP for the US
> > > was about 10 trillion bucks a year, the combined GDP of
> > > every nation
Adam Back wrote:
> Largest thing I bought cash was 2,000 GBP for a 2nd hand car some
> years ago. I did toy with trying to buy a house with paper cash to
> see if it could be done, but I didn't bother in the end -- but I think
> that all that would have happened is the seller's lawyer would go to
Steve Schear wrote:
> BBC hijacks TiVo recorders
> But viewers in the UK were surprised this week to find that the
> second episode of the little-known BBC sitcom "Dossa and Joe" had
> been recorded without their knowledge and added to the system's main
> menu screen.
Hmmm. My Tivo didn't record
Adam Shostack wrote:
> I find myself storing a pile of vaugely sensitive information on my
> palm. Where do I find the competent analysis of this? Ideally, I'd
> like to be able to protect things that I move into a "sensitive" area
> (passwords), and maybe select items in other places that I wa
dmolnar wrote:
> On Thu, 20 Jun 2002, Greg Newby wrote:
>
>
>>the next couple of days. I'm thinking of a CP
>>meet Saturday night July 12. Anyone else gonna be there?
>
>
> I should be there, since I'm free and in the area.
>
> In a similar vein, who's going to be at DEF CON?
Me :-)
Cheer
Barney Wolff wrote:
> A pseudonym that I can give up at will and that can never afterwards
> be traced to me is equivalent to an anonym.
No, a pseudonym can be linked to stuff (such as reputation,
publications, money). An anonym cannot.
Cheers,
Ben.
--
http://www.apache-ssl.org/ben.html
R. A. Hettinga wrote:
> At 12:06 AM +0100 on 7/1/02, Ben Laurie wrote:
>>No, a pseudonym can be linked to stuff (such as reputation,
>>publications, money). An anonym cannot.
>
> More to the point, there is no such "thing" as an "anonym", by def
Barney Wolff wrote:
> My use of "anonym" was a joke. Sorry if it was too deadpan. But
> my serious point was that if a pseudonym costs nothing to get or
> give up, it makes one effectively anonymous, if one so chooses.
Well, yeah, I'd say that single-use pseudonyms are, in fact, the
definition
Eric Cordian wrote:
> Still, Nature abhors overcomplexification, and plain old quantum mechanics
> works just fine for predicting the results of experiments.
Oh yeah? So predict when this radioactive isotope will decay, if you please.
Cheers,
Ben.
--
http://www.apache-ssl.org/ben.html h
Nomen Nescio wrote:
> On Tue, Jul 09, at 02:02PM, Tim May wrote:
>
>>>Also, a person having extensive offshore (outside the U.S.)
>>>assets may well find his assets are now taxable in the U.S.
>>>And for those with capital assets not taxed in their home
>>>countries (e.g., Germany, Japan), this m
Nomen Nescio wrote:
> Ben Laurie wrote:
>
>>Albion Zeglin wrote:
>>
>>>Similar to DeCSS, only one Palladium chip needs to be reverse engineered and
>>>it's key(s) broken to virtualize the machine.
>>
>>If you break one machine's key:
&
Adam Back wrote:
> On Tue, Jul 23, 2002 at 06:11:04PM +, Jason Holt wrote:
>
>> The default behavior for an SSL proxy is to pass the encrypted bytes
>>back and forth, allowing you to connect all the way to the other server.
>
>
> This isn't just the default behavior; it's the only de
Lucky Green wrote:
> Ray wrote:
>
>>>From: "James A. Donald" <[EMAIL PROTECTED]>
>>>Date: Tue, 30 Jul 2002 20:51:24 -0700
>>
>>>On 29 Jul 2002 at 15:35, AARG! Anonymous wrote:
>>>
both Palladium and TCPA deny that they are designed to restrict
what applications you run. The TPM FAQ at
>
AARG!Anonymous wrote:
> Adam Back writes:
>
>>I have one gap in the picture:
>>
>>In a previous message in this Peter Biddle said:
>>
>>
>>>In Palladium, SW can actually know that it is running on a given
>>>platform and not being lied to by software. [...] (Pd can always be
>>>lied to by HW - w
David Wagner wrote:
> Ben Laurie wrote:
>
>>Mike Rosing wrote:
>>
>>>The purpose of TCPA as spec'ed is to remove my control and
>>>make the platform "trusted" to one entity. That entity has the master
>>>key to the TPM.
>>>
Joseph Ashwood wrote:
> Lately on both of these lists there has been quite some discussion about
> TCPA and Palladium, the good, the bad, the ugly, and the anonymous. :)
> However there is something that is very much worth noting, at least about
> TCPA.
>
> There is nothing stopping a virtualized
Adam Back wrote:
> The remote attesation is the feature which is in the interests of
> third parties.
>
> I think if this feature were removed the worst of the issues the
> complaints are around would go away because the remaining features
> would be under the control of the user, and there would
Joseph Ashwood wrote:
> - Original Message -
> From: "Ben Laurie" <[EMAIL PROTECTED]>
>
>>Joseph Ashwood wrote:
>>
>>>There is nothing stopping a virtualized version being created.
>>
>
>>What prevents this from being usefu
Anonymous wrote:
> Steps to verify the "ring signature" file (note: you must have the openssl
> library installed):
>
>
> 1. Save http://www.inet-one.com/cypherpunks/dir.2002.08.05-2002.08.11/msg00221.html,
> as text, to the file ringsig.c. Delete the paragraph of explanation, and/or any
> HTML
Anonymous wrote:
>>>*** COULD SOMEONE PLEASE FOLLOW THE STEPS ABOVE AND PUT THE ringsig.c,
>>>ringsign, ringver, AND sigring.pgp FILES ON A WEB PAGE SO THAT PEOPLE
>>>CAN DOWNLOAD THEM WITHOUT HAVING TO GO THROUGH ALL THESE STEPS? ***
>>
>>Once it works, I'll happily do that, but...
>>
>>
>>>6. Fi
Nomen Nescio wrote:
> David Chaum gave a talk at the Crypto 2002 conference recently in which
> he briefly presented a number of interesting ideas, including an approach
> to digital cash which he himself said would "avoid the ecash patents".
>
> The diagram he showed was as follows:
>
>
>
Len Sassaman wrote:
> On Sat, 17 Aug 2002, Anonymous wrote:
>
>
>>*** COULD SOMEONE PLEASE FOLLOW THE STEPS ABOVE AND PUT THE ringsig.c,
>>ringsign, ringver, AND sigring.pgp FILES ON A WEB PAGE SO THAT PEOPLE
>>CAN DOWNLOAD THEM WITHOUT HAVING TO GO THROUGH ALL THESE STEPS? ***
>
>
> The files
Anonymous wrote:
>>>*** COULD SOMEONE PLEASE FOLLOW THE STEPS ABOVE AND PUT THE ringsig.c,
>>>ringsign, ringver, AND sigring.pgp FILES ON A WEB PAGE SO THAT PEOPLE
>>>CAN DOWNLOAD THEM WITHOUT HAVING TO GO THROUGH ALL THESE STEPS? ***
>>
>>Once it works, I'll happily do that, but...
>>
>>
>>>6. Fi
Anonymous wrote:
> Len Sassaman has put the ringsig program up at
>
>>http://www.abditum.com/~rabbi/ringsig/
>
>
> First, the ring signature portion has successfully been repaired from
> the truncation imposed by the anon remailer in the original post.
>
> Second, unfortunately all of the tabs
Steve Schear wrote:
> At 03:52 PM 8/29/2002 -0500, Gary Jeffers wrote:
>
>>The money is backed by silver and gold and can be redeemed widely
>> in America.
>
>
> True but only fractionally (i.e., the precious metal content is only a
> fraction of the face value).
And this is different fro
Eric Cordian wrote:
> Steve Schear writes:
>
>
>>Stephen Wolfram's book, "A New Kind of Science," is nothing if not
>>interesting. This encyclopedia-sized volume traces how his fascination
>>with cellular automata, beginning in the 1970s, led him to spend decades
>>exploring the significance
Peter Gutmann wrote:
> I recently came across a real-world use of steganography which hides extra
> data in the LSB of CD audio tracks to allow (according to the vendor) the
> equivalent of 20-bit samples instead of 16-bit and assorted other features.
> According to the vendors, "HDCD has been use
Lucky Green wrote:
> I also agree that current MTAs' implementations of STARTTLS are only a
> first step. At least in postfix, the only MTA with which I am
> sufficiently familiar to form an opinion, it appears impossible to
> require that certs presented by trusted parties match a particular hash
Adam Shostack wrote:
> On Wed, Oct 02, 2002 at 04:54:54PM +0100, Ben Laurie wrote:
> | Lucky Green wrote:
> | >I also agree that current MTAs' implementations of STARTTLS are only a
> | >first step. At least in postfix, the only MTA with which I am
> | >sufficientl
Adam Shostack wrote:
> Whats wrong with PGP sigs is that going on 9 full years after I
> generated my first pgp key, my mom still can't use the stuff.
Mozilla+enigmail+gpg. It just works.
Cheers,
Ben.
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
"There is no limit to
James A. Donald wrote:
> --
> Adam Shostack wrote:
>
>>>Whats wrong with PGP sigs is that going on 9 full years
>>>after I generated my first pgp key, my mom still can't use
>>>the stuff.
>>
>
> On 3 Oct 2002 at 17:33, Ben Laurie wrote:
few more signed messages on this list,
>
> >Ben Laurie wrote:
> >> Why would I want to sign a message to this list?
> >
> >Then all the people who read this list, were they to receive a
> >communication from you, they would know it was the same Ben
> >Lau
Bill Stewart wrote:
> Somebody backdoored the source code for Sendmail on the official server.
> So if you recompile from scratch, your sendmail is 0wned.
> Another reason not to run mail systems as root
In this case, as I understand it, it bites when you compile. So, its
another reason not
Jim Choate wrote:
What I'd like to know is does Godel's apply to all forms of
para-consistent logic as well
It applies to "any sufficiently complex axiomatic system". Allegedly.
Cheers,
Ben.
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
"There is no limit to what
58 matches
Mail list logo