The Altera Centauri collection has been brought up to date by Darsnan. It comprises every decent scenario he's been able to find anywhere on the web, going back over 20 years.
25 themes/skins/styles are now available to members. Check the select drop-down at the bottom-left of each page.
Call To Power 2 Cradle 3+ mod in progress: https://apolyton.net/forum/other-games/call-to-power-2/ctp2-creation/9437883-making-cradle-3-fully-compatible-with-the-apolyton-edition
Much less clunky to use then previously existing existing things of this nature.
I wonder what its weak points are?
"Wait a minute..this isn''t FAUX dive, it's just a DIVE!"
"...Mangy dog staggering about, looking vainly for a place to die."
"sauna stories? There are no 'sauna stories'.. I mean.. sauna is sauna. You do by the laws of sauna." -P.
I just don't see the point. Now pieces are distributed on the DHT, so what? There's no way to crack the PGP-encrypted text anyway without the key.
"The issue is there are still many people out there that use religion as a crutch for bigotry and hate. Like Ben."
Ben Kenobi: "That means I'm doing something right. "
I think the idea is that this way you get plausible deniability, i.e. "sorry Mr. Interrogator, I can't decrypt these here terroristic plans because the key is gone."
<p style="font-size:1024px">HTML is disabled in signatures </p>
We created "self-destructing data" to try to address this problem. Our prototype system, called Vanish, shares some properties with existing encryption systems like PGP, but there are also some major differences.
First, someone using Vanish to "encrypt/encapsulate" information, like an email, never learns the encryption key. Second, there is a pre-specified timeout associated with each encrypted/encapsulated messages.
Prior to the timeout, anyone can read the encrypted/encapsulated message. After the timeout, no one can read that message, because the encryption key is lost due to a set of both natural and programmed processes. It is therefore impossible for anyone to decrypt/decapsulate that email after the timer expires.
There have been cases of people forced to surrender their encryption keys due to a search warrant (or rubber-hose cryptanalysis) - this is supposed to defeat search warrants by a. ensuring that the sender never knows the key and b. destroying the key after a set amount of time. So you encrypt your email with PGP and then plausibly deny it with Vanish.
<p style="font-size:1024px">HTML is disabled in signatures </p>
Indeed, this seems quite useful to potential terrorists.
OT: While state terrorism has been employed by various communist regimes, they are two entirely different phenomenae with an entirely different history since Bakunin and Marx clashed at the 1st International.
Indeed, this seems quite useful to potential terrorists.
OT: While state terrorism has been employed by various communist regimes, they are two entirely different phenomenae with an entirely different history since Bakunin and Marx clashed at the 1st International.
I was not talking about state terrorism. I was talking about the Weathermen-like terrorists.
Graffiti in a public toilet
Do not require skill or wit
Among the **** we all are poets
Among the poets we are ****.
There was a criminal investigation into the PGP guy for violating export controls, but it never led to any charges being filed - that's the closest the government has come to interfering with the program. (There's also at least one open-source implementation available, so anybody patient and paranoid enough can confirm that there aren't any backdoors. This is leaving aside the difficulty of putting a backdoor on encryption software - it's not as though you can hack it so that the intended key and the super-secret NSA-installed key can both decrypt the file.)
<p style="font-size:1024px">HTML is disabled in signatures </p>
Comment