On Fri, 10 Apr 2009 20:53:23 -0700 (PDT), me
Post by me Post by firstname.lastname@example.org Post by Jeff Liebermann
On Sat, 28 Mar 2009 16:22:54 -0700 (PDT), HAL9000
Post by HAL9000
Like Ponzi did to his fellow Italian Immigrants, Bernie Madoff did to
his fellow money-grubbing Kikes! When I think about the NBC exec Jew,
Zucker, with his shit-eating grin while discussing "schadenfreude," I
can only hope he also had a vested interest in Madoff's scam.
Schadenfreude is Schadenfreude is Schadenfreude... for anyone,
Tim? If you want to remain anonymous, you really should avoid using
your favorite buzzwords.
Get a nose-job, you ugly hippie heeb!!
Post by Jeff Liebermann
I notice a Jeffrey, Robert, and Suzanne May. Any relations?
According to the BBC, the hardest hit by the fraud are Jewish
That should make you happy.
Sending you up a chimney with Bernie would make me very happy!
You guessed the post above is from Tim. I guess the same, but this
guess could obviously be wrong. The problem is that the "Tim
personality" seems to lose something in the process of attempting
anonymity. I can't imagine why he'd be especially interested in the
Madoff case without coming out and saying, "Itz jes J--s being J--s."
It's fairly easy to craft a replacement Tim May avatar or emulator.
Just collect a supply of his old postings, extract out the key
repetitive phrases, such as "send xxxxx up the chimney", and use a
grammar checker to reassemble the mess. No need to be coherent or
logical as the real Tim is also often incoherent and illogical. I
suspect that the only reason nobody has bothered to emulate Tim is
that nobody wants to have the authorities arrive by accident.
Post by me
Tim's Crypto Anarchy manifesto that he wrote many years ago must now
appear ingenuous with all the internet surveillance that seems
inescapable, along with posting-habit history recorded for _so_ many
posters. The internet makes profiling easy. The FBI certainly has
their psychometricians at work with all that anti-terror money. There
is little room for surprises. You can conceal your name but you can't
conceal your habits.
All too true. Way back in my college daze (1960's), there was a huge
stink about various police agencies keeping files on dissidents. As a
former protester and dissident, I suspect there were many files with
my name on top. After we bailed out of Viet Nam, some of the files on
prominent individuals magically appeared in public. The problem was
that they were all garbage and nearly useless. Sure, there was
incriminating information in there, but nothing that could be used in
a court of law, little that could be substantiated, and much that was
just totally inaccurate. Fast forward 40 years, and we have a bigger
data dumpster, but the accuracy and usefulness of the collected
information is probably no better than it was in the 1960's. Garbage
in, but it never seems to come out. So, if Tim want's to really
maintain his privacy, he should concentrate on trashing his own
credibility so that the collected data is useless and confusing. I
actually watched this happen in an old computer crime incident, where
the obvious culprit confessed, but gave everyone he talked with a
somewhat different story. The predictable and intended result was a
huge muddle, which had the desired effect of terminating the
prosecution because sifting through the evidence was deemed to
Post by me
Encryption? Tor makes things too slow. SSL isn't always available.
Too few people use encryption so it is easy to monitor the contacts of
people who do. The 'clipper chip' has been made obsolete because of
similarly functioning software. Google should be nicknamed 'the
GIA'. Yahoo offers unlimited email storage, and probably unlimited
The problem with encryption is that it's an attractive nuisance.
Encrypt something and the authorities are going to assume that
everything inside is something worth investigating. If you want to
pass secrets around, unencrypted email is good enough. Nobody would
believe what you write anyway. If you really want to conceal
something, bury it with some trash. For example, instead of sending
someone email "The event will happen at 4:30PM", send the same person
50 messages, each with a different time. They'll know in advance that
the 15th message is the right one. It may be security by obscurity,
but with the aid of a computah, it works quite well.
Encryption is out, pollution is in.
(Note: I ignore one line replies because there's usually little
thinking behind them).
Jeff Liebermann ***@cruzio.com
150 Felker St #D http://www.LearnByDestroying.com
Santa Cruz CA 95060 http://802.11junk.com
Skype: JeffLiebermann AE6KS 831-336-2558