lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 10 Dec 2009 12:45:07 +1100
From: "Ivan ." <>
To: Dan Kaminsky <>
Cc: full-disclosure <>
Subject: Re: Revenge of the Computer Nerds

ahh the bullshit left / right paradigm. Sheeple anyone?

Seven Ploys for Manipulating the People:

1. The Distraction Principle: While the people are distracted by the
struggle to exist, politicians can do virtually anything to them and
they will not notice

2. The Social Compliance Principle: The people are trained by society
not to question authority. Politicians can exploit this “suspension
of suspiciousness� to make people believe what they want them to

3. The Herd Principle: Even highly scpetical people will let their
guard down when everyone around them appears to share the same views.
Politicians exploit this by utilising propaganda (spin) to spread lies
and misconceptions

4. The Dishonestly Principle: Any mistaken past agreement with the
politician's spin may be used against you in the future, making it
harder for people to publicly change their views even when they
realise they've been had

5. The Deception Principle: Things and people are seldom what they
seem, but politicians and their media teams are expert at manipulating
your perceptions to believe that they are

6. The Need and Greed Principle: Your needs and desires, such as
wanting to do the right thing for your children, make you vulnerable.
Once politicians have convinced you about what it is you really want,
they can easily manipulate you

7. The Time Principle: When the people are under time pressure to make
an important choice, they use a different decision strategy.
Politicians steer the people towards a strategy that involves less

These are the classic ploys used by confidence tricksters everywhere.

On Thu, Dec 10, 2009 at 12:21 PM, Dan Kaminsky <> wrote:
> Yes, because when I want technical data, I go to a right wing blog
> (Bonus points:  Check the dates)
> On Wed, Dec 9, 2009 at 4:25 PM, Ivan . <> wrote:
>> But the real action (and the evidence for chicanery) is in the
>> computer code obtained from the CRU. Our own computer guru Marc
>> Sheppard, writing for American Thinker here and here, was one of the
>> first to offer an accurate diagnosis of this fraudulent method of
>> computer programming. Analyzing the code, as Marc has indicated in his
>> work, is a complex business. As he pleads in one article, "please bear
>> with me while I get a tad techie on you."
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter:
>> Hosted and sponsored by Secunia -

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists