We must not wait while dangers gather. They are either with us
on computer security, or they are with the terrorists. We know
they have these weapons for mass communications destruction and
disruption and they have used them before. Preemptive actions
are insufficient. Preventive actions are a
On Thu, 19 Jun 2003 07:41:52 -0700, you wrote:
>
> At 01:07 AM 6/19/03 -0400, Tyler Durden wrote:
> > Methinks Mr Hatch is not a very bright man.
>
> A Southern senator. Need I say more?
Yes, a little more. Do you mean "southern Utah"?
Hey, any stereotype in a storm, eh?
On Fri, 20 Jun 2003 09:27:50 -0400, you wrote:
>
> today...
>
>
> SURVEILLANCE MATTERS
> Commodity Futures Trading Commission (CFTC) (F.R. Page 35631)
> Closed meeting to discuss surveillance matters.
> Location: 1155 21st St., NW, 9th Floor Conference Room,
> Washington, D.C.. 11 a.m.
> Contac
-BEGIN TYPE III ANONYMOUS MESSAGE-
Message-type: plaintext
Tim,
I AM GETTING TIRED OF SEEING CYPHERPUNKS RESTRICTING WHAT INFORMATION
FLOWS AND TO WHERE IT FLOWS...
-END TYPE III ANONYMOUS MESSAGE-
Hello
I'm curious. You say the list got some 400+ members right now and that's only the lne
node too. Can you provide some statistics on the users? How many addresses are .gov?
Any valid TLA addresses in there?!
>The U.S. official's way of behaving like Texas rednecks are embarrassing. Not
Crosspost from nettime:
Subject: wrong signals
If symbols really do matter we might conclude that American
administration's PR machine has got it badly wrong. In the carefully
orchestrated news management of Saddam
http://www.fauxnewschannel.com/
Out of nowhere cometh Steve Thompson, and sayeth he all manner of things. But,
while his mouth moveth one way, he seemeth to move the other.
http://groups-beta.google.com/groups?q=%22steve+thompson%22&start=0&hl=en&safe=off&;
What hath suddenly attracted our AUK creep?
http://reuters.myway.com/article/20050511/2005-05-11T173816Z_01_N11199658_RTRIDST_0_NEWS-SECURITY-WASHINGTON-DC.html
> WASHINGTON (Reuters) - Fighter jets scrambled over Washington and
> authorities hurriedly evacuated the White House and the U.S. Congress
> on Wednesday when an unidentified plan
> >new terrorist target: Union Station
>
> You used a remailer for THAT?!!
You used a pseudonym for THAT?!
Perry Metzger writes, on his cryptography list:
> By the way, I should mention that an important part of such a system
> is the principle that representatives from the candidates on each side
> get to oversee the entire process, assuring that the ballot boxes
> start empty and stay untampered wit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Often people ask about blind DSA signatures. There are many known
variants on DSA signatures which allow for blinding, but blinding "plain"
DSA signatures is not discussed much.
Clearly, blinding DSA signatures is possible, through general purpose
t
I've noticed a very high increase of incoming virii and malicious code of
various sorts to one of my nyms. Since the nym is not used anywhere
publically I really wonder if these are deliberate attacks to try to
compromise the machines of people using nyms to protect their identity. Is
this somethi
Steve Thompson:
> If that's true, then the government couldn't have stolen it.
> However, I suspect that mainfraim code of any sophistication is
> rarely released into the public domain. I imagine the author would
> be able to clear that up, assuming he has no financial reason to
> falsify its
...Lots of data...
Save as plain text anything.html on desktop and drop onto a browser.
me