Short selling: How to profit in hard times.
proffr1@nospambutfuckmicrosoft.com | 12.10.2001 06:12
Part 1 was the more cereberal way involving selling your nations secrets,now we get our hands dirty with the exciting new 'killer app' made possible by technology.
Short selling for fun and proffr (part 2)
by proffr1@nospambutfuckmicrosoft.com 2:58pm Thu Oct 11 '01 (Modified on 3:28pm Fri Oct 12 '01)
The true capitalist has no country.
Has the time come for capitalism to devour itself?
This is an excerpt from some visionary musings that although dusty and ancient may help us through our time of trials...
16.16 - Markets for Contract Killings, Extortion, etc.
16.16.1. Note: This is a sufficiently important topic that it deserves
its own heading. There's material on this scattered around
this document, material I'll collect together when I get a
chance.
16.16.2. This topic came up several times on then Extropians mailing
list, where David Friedman (author of "The Machinery of
Freedom" and son of Nobel Prize winner Milton Friedman) and
Robin Hanson debated this with me.
16.16.3. Doug Cutrell summarized the concerns of many when he wrote:
- "...the availability of truly secure anonymity, strong
encryption, and untraceable digital cash could allow
contract killing to be an openly conducted business. For
example, an anonymous news post announces a public key
which is to be used to encode a contract kill order, along
with a digital cash payment. The person placing the
contract need only anonymously place the encrypted message
in alt.test. Perhaps it is even possible to make it
impossible to tell that the message was encrypted with the
contract killer's public key (the killer would have to
attempt decryption of all similarly encoded messages on
alt.test, but that might be quite feasible). Thus it could
be completely risk free for anyone to place a contract on
anyone else." [Doug Cutrell, 1994-09-09]
16.16.4. Abhorrent markets
- contract killings
- can collect money anonymously to have someone
whacked...nearly anyone who is controversial can generate
enough "contributions"
- kidnapping, extortion
16.16.5. Dealing with Such Things:
+ never link physical ID with pseudonyms! (they won't kill
you if they don't know who you are)
- and even if one pseudonym is linked, make sure your
financial records are not linkable
- trust no one
- increased physical security...make the effort of killing
much more potentially dangerous
- flooding attacks..tell extortionists to "get in line"
behind all the other extortionists
+ announce to world that one does not pay extortionists...set
up protocol to ensure this
- yes, some will die as a result of this
- console yourself with the fact that though some may die,
fewer are dying as a result of state-sponsored wars and
terrorism (historically a bigger killer than contract
killings!)
From the CYPHERNOMICON-cyberanarchies etc. by tim may,cypherpunk extraordinaire.
add your own comments
Matts notepad
by proffr1@etc 4:34pm Thu Oct 11 '01
It suits me to park information here.Its related...
crypto scare op.
The Times misquoted me - crypto expert
By Andrew Orlowski in San Francisco
Posted: 08/10/2001 at 17:43 GMT
International cryptography expert Professor Ross Anderson has demanded a correction from the The Times for being misquoted on the subject of terrorists' use of email.
With echoes of Phil Zimmermann's treatment by the Washington Post, which manufactured quotes by Zimmermann expressing "regret" for devising PGP encryption, Anderson says the Times journalist "was determined - or had been instructed - to write the story anyway".
Anderson lambasts The Times for unquestioningly peddling the meme that terrorists communicate using information hidden in pornographic content.
Since the Times' stablemates the Sun and the News of the World have allegedly been hiding news in pornographic content for several years, (although we've never found any news in either paper to substantiate that meme), the allegation doesn't surprise us.
"It is unclear what national interest is served by security agencies propagating this lurid urban myth. Perhaps the goal is to manufacture an excuse for the failure to anticipate the events of September 11th.
Perhaps it is preparing the ground for an attempt at bureaucratic empire-building via Internet regulation, as a diversionary activity from the much harder and less pleasant task of going after al-Qaida.
"Perhaps the vision of bin Laden as cryptic pornographer is being spun to create a subconscious link, in the public mind, with the scare stories about child pornography that were used before September 11th
to justify government plans for greater Internet regulation," writes Anderson.
Anderson suggests the articles "should be read as a deliberate plant by MI5".
OR the victoria police,computor squad.pr.
More on
by as above 3:28pm Fri Oct 12 '01
cyberterrorists
Now we come to Jim Bell's "Assassination Politics." The first, most provocative thing about this essay is that Jim Bell doesn't present citizens as victims! It is no wonder the programming of the mind-controlled robots tells them they are supposed to be upset. For the message, sub- and supraliminal, of Bell's essay is: Citizens don't have to be victims. They can turn the table and make government the victim, when government officials initiate violence. This, of course, is the ultimate heresy, the final outrage.
When Jim Bell was arrested by the IRS, newspapers reported the alarming fact that Bell had lists giving the names and addresses of IRS agents/employees! It didn't occur to the journalists reporting the story to note that the IRS agents similarly had Jim Bell's name and address. (In fact, that's how the IRS knew where to show up to arrest him.) Once again, Jim Bell wasn't acting like the proper victim. The subtext of the news accounts: The IRS is supposed to collect information on citizens. Citizens are not supposed to collect information on the IRS.
What is amazing about Jim Bell's essay is that he was a beginner at the concepts he was playing with. He was working through in his own mind the consequences of a digital signature. A digital signature on an encrypted message. And he realized you could create a lottery. A lottery whose payoff was a reward to the person who came closest to predicting the time of death of a given government official.
Now, you don't have to believe such a lottery is a good idea in order to profit from reading "Assassination Politics." For Jim Bell was, among other things, doing a thought experiment on one of the consequences of the digital society. And you can't escape these consequences by ignoring them, any more than you can escape the consequences of the atomic bomb by pretending it doesn't exist.
http://www.sierratimes.com/archive/files/apr/13/arst041301.htm
me
layer 1.) scrambled stealth radio channel custom private tunnel
layer 2.) 2'nd special hidden private tunnel with security breach alert
layer 3.) phone line (no traceable connection to me) with breach alert
layer 4.) private logless proxy
layer 5.) 2'nd private logless proxy
layer 6.) fake account on free ISP
layer 7.) selected public anon proxy # 1
layer 8.) selected public anon proxy # 2
layer 9.) selected public tunneling anon proxy # 3
How lucky you are to live in a place with so many ready made graves!
by proffr1@nospambutfuckmicrosoft.com 2:58pm Thu Oct 11 '01 (Modified on 3:28pm Fri Oct 12 '01)
The true capitalist has no country.
Has the time come for capitalism to devour itself?
This is an excerpt from some visionary musings that although dusty and ancient may help us through our time of trials...
16.16 - Markets for Contract Killings, Extortion, etc.
16.16.1. Note: This is a sufficiently important topic that it deserves
its own heading. There's material on this scattered around
this document, material I'll collect together when I get a
chance.
16.16.2. This topic came up several times on then Extropians mailing
list, where David Friedman (author of "The Machinery of
Freedom" and son of Nobel Prize winner Milton Friedman) and
Robin Hanson debated this with me.
16.16.3. Doug Cutrell summarized the concerns of many when he wrote:
- "...the availability of truly secure anonymity, strong
encryption, and untraceable digital cash could allow
contract killing to be an openly conducted business. For
example, an anonymous news post announces a public key
which is to be used to encode a contract kill order, along
with a digital cash payment. The person placing the
contract need only anonymously place the encrypted message
in alt.test. Perhaps it is even possible to make it
impossible to tell that the message was encrypted with the
contract killer's public key (the killer would have to
attempt decryption of all similarly encoded messages on
alt.test, but that might be quite feasible). Thus it could
be completely risk free for anyone to place a contract on
anyone else." [Doug Cutrell, 1994-09-09]
16.16.4. Abhorrent markets
- contract killings
- can collect money anonymously to have someone
whacked...nearly anyone who is controversial can generate
enough "contributions"
- kidnapping, extortion
16.16.5. Dealing with Such Things:
+ never link physical ID with pseudonyms! (they won't kill
you if they don't know who you are)
- and even if one pseudonym is linked, make sure your
financial records are not linkable
- trust no one
- increased physical security...make the effort of killing
much more potentially dangerous
- flooding attacks..tell extortionists to "get in line"
behind all the other extortionists
+ announce to world that one does not pay extortionists...set
up protocol to ensure this
- yes, some will die as a result of this
- console yourself with the fact that though some may die,
fewer are dying as a result of state-sponsored wars and
terrorism (historically a bigger killer than contract
killings!)
From the CYPHERNOMICON-cyberanarchies etc. by tim may,cypherpunk extraordinaire.
add your own comments
Matts notepad
by proffr1@etc 4:34pm Thu Oct 11 '01
It suits me to park information here.Its related...
crypto scare op.
The Times misquoted me - crypto expert
By Andrew Orlowski in San Francisco
Posted: 08/10/2001 at 17:43 GMT
International cryptography expert Professor Ross Anderson has demanded a correction from the The Times for being misquoted on the subject of terrorists' use of email.
With echoes of Phil Zimmermann's treatment by the Washington Post, which manufactured quotes by Zimmermann expressing "regret" for devising PGP encryption, Anderson says the Times journalist "was determined - or had been instructed - to write the story anyway".
Anderson lambasts The Times for unquestioningly peddling the meme that terrorists communicate using information hidden in pornographic content.
Since the Times' stablemates the Sun and the News of the World have allegedly been hiding news in pornographic content for several years, (although we've never found any news in either paper to substantiate that meme), the allegation doesn't surprise us.
"It is unclear what national interest is served by security agencies propagating this lurid urban myth. Perhaps the goal is to manufacture an excuse for the failure to anticipate the events of September 11th.
Perhaps it is preparing the ground for an attempt at bureaucratic empire-building via Internet regulation, as a diversionary activity from the much harder and less pleasant task of going after al-Qaida.
"Perhaps the vision of bin Laden as cryptic pornographer is being spun to create a subconscious link, in the public mind, with the scare stories about child pornography that were used before September 11th
to justify government plans for greater Internet regulation," writes Anderson.
Anderson suggests the articles "should be read as a deliberate plant by MI5".
OR the victoria police,computor squad.pr.
More on
by as above 3:28pm Fri Oct 12 '01
cyberterrorists
Now we come to Jim Bell's "Assassination Politics." The first, most provocative thing about this essay is that Jim Bell doesn't present citizens as victims! It is no wonder the programming of the mind-controlled robots tells them they are supposed to be upset. For the message, sub- and supraliminal, of Bell's essay is: Citizens don't have to be victims. They can turn the table and make government the victim, when government officials initiate violence. This, of course, is the ultimate heresy, the final outrage.
When Jim Bell was arrested by the IRS, newspapers reported the alarming fact that Bell had lists giving the names and addresses of IRS agents/employees! It didn't occur to the journalists reporting the story to note that the IRS agents similarly had Jim Bell's name and address. (In fact, that's how the IRS knew where to show up to arrest him.) Once again, Jim Bell wasn't acting like the proper victim. The subtext of the news accounts: The IRS is supposed to collect information on citizens. Citizens are not supposed to collect information on the IRS.
What is amazing about Jim Bell's essay is that he was a beginner at the concepts he was playing with. He was working through in his own mind the consequences of a digital signature. A digital signature on an encrypted message. And he realized you could create a lottery. A lottery whose payoff was a reward to the person who came closest to predicting the time of death of a given government official.
Now, you don't have to believe such a lottery is a good idea in order to profit from reading "Assassination Politics." For Jim Bell was, among other things, doing a thought experiment on one of the consequences of the digital society. And you can't escape these consequences by ignoring them, any more than you can escape the consequences of the atomic bomb by pretending it doesn't exist.
http://www.sierratimes.com/archive/files/apr/13/arst041301.htm
me
layer 1.) scrambled stealth radio channel custom private tunnel
layer 2.) 2'nd special hidden private tunnel with security breach alert
layer 3.) phone line (no traceable connection to me) with breach alert
layer 4.) private logless proxy
layer 5.) 2'nd private logless proxy
layer 6.) fake account on free ISP
layer 7.) selected public anon proxy # 1
layer 8.) selected public anon proxy # 2
layer 9.) selected public tunneling anon proxy # 3
How lucky you are to live in a place with so many ready made graves!
proffr1@nospambutfuckmicrosoft.com