• Present at the Creation (Re: The "Standards" Game)

    From Lars Poulsen@lars@cleo.beagle-ears.com to comp.os.linux.misc,alt.comp.os.windows-11,alt.folklore.computers on Mon Aug 25 13:03:28 2025
    From Newsgroup: alt.folklore.computers

    On 25/08/2025 04:12, Lars Poulsen wrote:
    The academics building the Internet did not participate in this process,
    but the engineers doing the work went and swapped ideas, and once they
    had working code, published open standards before patents could be
    filed. We all know how this outcompeted the ITU and IEEE standards.

    On 2025-08-25, The Natural Philosopher <tnp@invalid.invalid> wrote:
    Indeed we did, Interop and all that lark 'My telnet client wont talk to
    your telnet server, why is that? let's put a packet monitor on and see'

    'Oh, well that's not illegal, but my also not illegal code barfs on it. Let's think of the simplest standard addition that we can both adhere to
    to get stuff working'

    Fun days.

    For a few years in the early 1990s, I went to the IETF meetings. Very
    busy events, with 8-12 tracks of working group meetings. When they got
    to 2000 participants, it became really unwieldy. The best times were the
    late night sessions in the Hyatt atriums, when the NSA guys and the NASA
    guys were playing Global Thermonuclear War surrounded by a large group watching.

    In then there were the PPP plugfests. For years, I kept a T-shirt that
    said "I can PPP". And someone from PacBell pointed out the woman who was
    the real life inspiration for "Alice" in Dilbert.

    Some of the people were truly amazing. Some weird shit was happening
    behind the scenes. A guy in Finland built an anonymous remailer
    (double-blind). Many government agencies did not like it, but could not persuade the Finns to stop it. Eventually Milo told the network people
    at Helsinki University, that if they did not get him out, Finland would disappear from the Internet. 24 hours later that particular problem
    was gone - permanently.
    --
    Lars P
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From The Natural Philosopher@tnp@invalid.invalid to alt.folklore.computers on Mon Aug 25 14:38:46 2025
    From Newsgroup: alt.folklore.computers

    On 25/08/2025 14:03, Lars Poulsen wrote:
    On 25/08/2025 04:12, Lars Poulsen wrote:
    The academics building the Internet did not participate in this process, >>> but the engineers doing the work went and swapped ideas, and once they
    had working code, published open standards before patents could be
    filed. We all know how this outcompeted the ITU and IEEE standards.

    On 2025-08-25, The Natural Philosopher <tnp@invalid.invalid> wrote:
    Indeed we did, Interop and all that lark 'My telnet client wont talk to
    your telnet server, why is that? let's put a packet monitor on and see'

    'Oh, well that's not illegal, but my also not illegal code barfs on it.
    Let's think of the simplest standard addition that we can both adhere to
    to get stuff working'

    Fun days.

    For a few years in the early 1990s, I went to the IETF meetings. Very
    busy events, with 8-12 tracks of working group meetings. When they got
    to 2000 participants, it became really unwieldy. The best times were the
    late night sessions in the Hyatt atriums, when the NSA guys and the NASA
    guys were playing Global Thermonuclear War surrounded by a large group watching.

    In then there were the PPP plugfests. For years, I kept a T-shirt that
    said "I can PPP". And someone from PacBell pointed out the woman who was
    the real life inspiration for "Alice" in Dilbert.

    Some of the people were truly amazing. Some weird shit was happening
    behind the scenes. A guy in Finland built an anonymous remailer (double-blind). Many government agencies did not like it, but could not persuade the Finns to stop it. Eventually Milo told the network people
    at Helsinki University, that if they did not get him out, Finland would disappear from the Internet. 24 hours later that particular problem
    was gone - permanently.

    He who commands the BGP can destroy the world!
    Seen it more than once
    --
    There is something fascinating about science. One gets such wholesale
    returns of conjecture out of such a trifling investment of fact.

    Mark Twain

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Daniel70@daniel47@nomail.afraid.org to alt.folklore.computers on Sun Sep 14 21:54:52 2025
    From Newsgroup: alt.folklore.computers

    On 25/08/2025 11:03 pm, Lars Poulsen wrote:
    On 25/08/2025 04:12, Lars Poulsen wrote:
    The academics building the Internet did not participate in this process, >>> but the engineers doing the work went and swapped ideas, and once they
    had working code, published open standards before patents could be
    filed. We all know how this outcompeted the ITU and IEEE standards.

    On 2025-08-25, The Natural Philosopher <tnp@invalid.invalid> wrote:
    Indeed we did, Interop and all that lark 'My telnet client wont talk to
    your telnet server, why is that? let's put a packet monitor on and see'

    'Oh, well that's not illegal, but my also not illegal code barfs on it.
    Let's think of the simplest standard addition that we can both adhere to
    to get stuff working'

    Fun days.

    For a few years in the early 1990s, I went to the IETF meetings. Very
    busy events, with 8-12 tracks of working group meetings. When they got
    to 2000 participants, it became really unwieldy. The best times were the
    late night sessions in the Hyatt atriums, when the NSA guys and the NASA
    guys were playing Global Thermonuclear War surrounded by a large group watching.

    "Global Thermonuclear War" .... I was about to post that I had played
    that at some time .... but then I remembered that wasn't that the
    storyline behind a film way back then .... some kids, somehow, got
    connected to the U.S. ICBM Control Computer and launched WWIII whilst
    they thought they were just playing a game??
    --
    Daniel70
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From scott@scott@slp53.sl.home (Scott Lurndal) to alt.folklore.computers on Sun Sep 14 15:09:28 2025
    From Newsgroup: alt.folklore.computers

    Daniel70 <daniel47@nomail.afraid.org> writes:
    On 25/08/2025 11:03 pm, Lars Poulsen wrote:
    On 25/08/2025 04:12, Lars Poulsen wrote:
    The academics building the Internet did not participate in this process, >>>> but the engineers doing the work went and swapped ideas, and once they >>>> had working code, published open standards before patents could be
    filed. We all know how this outcompeted the ITU and IEEE standards.

    On 2025-08-25, The Natural Philosopher <tnp@invalid.invalid> wrote:
    Indeed we did, Interop and all that lark 'My telnet client wont talk to
    your telnet server, why is that? let's put a packet monitor on and see'

    'Oh, well that's not illegal, but my also not illegal code barfs on it.
    Let's think of the simplest standard addition that we can both adhere to >>> to get stuff working'

    Fun days.

    For a few years in the early 1990s, I went to the IETF meetings. Very
    busy events, with 8-12 tracks of working group meetings. When they got
    to 2000 participants, it became really unwieldy. The best times were the
    late night sessions in the Hyatt atriums, when the NSA guys and the NASA
    guys were playing Global Thermonuclear War surrounded by a large group
    watching.

    "Global Thermonuclear War" .... I was about to post that I had played
    that at some time .... but then I remembered that wasn't that the
    storyline behind a film way back then .... some kids, somehow, got
    connected to the U.S. ICBM Control Computer and launched WWIII whilst
    they thought they were just playing a game??

    DAGS: "Shall we play a game?"
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From cross@cross@spitfire.i.gajendra.net (Dan Cross) to alt.folklore.computers on Sun Sep 14 15:23:40 2025
    From Newsgroup: alt.folklore.computers

    In article <10a6aef$17fjj$1@dont-email.me>,
    Daniel70 <daniel47@nomail.afraid.org> wrote:
    On 25/08/2025 11:03 pm, Lars Poulsen wrote:
    On 25/08/2025 04:12, Lars Poulsen wrote:
    The academics building the Internet did not participate in this process, >>>> but the engineers doing the work went and swapped ideas, and once they >>>> had working code, published open standards before patents could be
    filed. We all know how this outcompeted the ITU and IEEE standards.

    On 2025-08-25, The Natural Philosopher <tnp@invalid.invalid> wrote:
    Indeed we did, Interop and all that lark 'My telnet client wont talk to
    your telnet server, why is that? let's put a packet monitor on and see'

    'Oh, well that's not illegal, but my also not illegal code barfs on it.
    Let's think of the simplest standard addition that we can both adhere to >>> to get stuff working'

    Fun days.

    For a few years in the early 1990s, I went to the IETF meetings. Very
    busy events, with 8-12 tracks of working group meetings. When they got
    to 2000 participants, it became really unwieldy. The best times were the
    late night sessions in the Hyatt atriums, when the NSA guys and the NASA
    guys were playing Global Thermonuclear War surrounded by a large group
    watching.

    "Global Thermonuclear War" .... I was about to post that I had played
    that at some time .... but then I remembered that wasn't that the
    storyline behind a film way back then .... some kids, somehow, got
    connected to the U.S. ICBM Control Computer and launched WWIII whilst
    they thought they were just playing a game??

    That film was 1984's, "Wargames".

    Right before the computer figures out the launch codes, the
    hacker kid gets it realize the futility of war by making it play
    itself at Tic-Tac-Toe.

    - Dan C.

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Charlie Gibbs@cgibbs@kltpzyxm.invalid to alt.folklore.computers on Sun Sep 14 16:17:40 2025
    From Newsgroup: alt.folklore.computers

    On 2025-09-14, Scott Lurndal <scott@slp53.sl.home> wrote:

    Daniel70 <daniel47@nomail.afraid.org> writes:

    On 25/08/2025 11:03 pm, Lars Poulsen wrote:

    For a few years in the early 1990s, I went to the IETF meetings. Very
    busy events, with 8-12 tracks of working group meetings. When they got
    to 2000 participants, it became really unwieldy. The best times were the >>> late night sessions in the Hyatt atriums, when the NSA guys and the NASA >>> guys were playing Global Thermonuclear War surrounded by a large group
    watching.

    "Global Thermonuclear War" .... I was about to post that I had played
    that at some time .... but then I remembered that wasn't that the
    storyline behind a film way back then .... some kids, somehow, got
    connected to the U.S. ICBM Control Computer and launched WWIII whilst
    they thought they were just playing a game??

    DAGS: "Shall we play a game?"

    My favourite part of that movie was when the kid was sitting outside
    the principal's office next to a desk with a terminal on it, and he
    pulled out the writing leaf to find the system password. That was
    one of the most realistic computer movie scenes I've ever seen.

    Still, that acoustic coupler that seemed to be running at 9600 bps
    was a nice fantasy...
    --
    /~\ Charlie Gibbs | Growth for the sake of
    \ / <cgibbs@kltpzyxm.invalid> | growth is the ideology
    X I'm really at ac.dekanfrus | of the cancer cell.
    / \ if you read it the right way. | -- Edward Abbey
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Lars Poulsen@lars@cleo.beagle-ears.com to alt.folklore.computers on Sun Sep 14 21:52:51 2025
    From Newsgroup: alt.folklore.computers

    On 25/08/2025 11:03 pm, Lars Poulsen wrote:
    For a few years in the early 1990s, I went to the IETF meetings. Very
    busy events, with 8-12 tracks of working group meetings. When they got
    to 2000 participants, it became really unwieldy. The best times were the
    late night sessions in the Hyatt atriums, when the NSA guys and the NASA
    guys were playing Global Thermonuclear War surrounded by a large group
    watching.

    On 2025-09-14, Daniel70 <daniel47@nomail.afraid.org> wrote:
    "Global Thermonuclear War" .... I was about to post that I had played
    that at some time .... but then I remembered that wasn't that the
    storyline behind a film way back then .... some kids, somehow, got
    connected to the U.S. ICBM Control Computer and launched WWIII whilst
    they thought they were just playing a game??

    "War Games" (1983).


    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From David Lesher@wb8foz@panix.com to alt.folklore.computers on Tue Sep 23 02:00:43 2025
    From Newsgroup: alt.folklore.computers

    Charlie Gibbs <cgibbs@kltpzyxm.invalid> writes:


    My favourite part of that movie was when the kid was sitting outside
    the principal's office next to a desk with a terminal on it, and he
    pulled out the writing leaf to find the system password. That was
    one of the most realistic computer movie scenes I've ever seen.

    Tip grounding the transmitter [handset microphone for you
    Netheads] on the pay phone in the outside booth was an working
    technique until Ma swapped in insulated "Anti-fraud transmitters."
    --
    A host is a host from coast to coast...............wb8foz@panix.com
    & no one will talk to a host that's close..........................
    Unless the host (that isn't close).........................pob 1433
    is busy, hung or dead....................................20915-1433
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Charlie Gibbs@cgibbs@kltpzyxm.invalid to alt.folklore.computers on Tue Sep 23 02:45:32 2025
    From Newsgroup: alt.folklore.computers

    On 2025-09-23, David Lesher <wb8foz@panix.com> wrote:

    Charlie Gibbs <cgibbs@kltpzyxm.invalid> writes:

    My favourite part of that movie was when the kid was sitting outside
    the principal's office next to a desk with a terminal on it, and he
    pulled out the writing leaf to find the system password. That was
    one of the most realistic computer movie scenes I've ever seen.

    Tip grounding the transmitter [handset microphone for you
    Netheads] on the pay phone in the outside booth was an working
    technique until Ma swapped in insulated "Anti-fraud transmitters."

    I guess the hook on a pay phone was too massive to jiggle fast
    enough to dial (not that I ever tried). The plungers on a 500
    set were more doable.
    --
    /~\ Charlie Gibbs | Growth for the sake of
    \ / <cgibbs@kltpzyxm.invalid> | growth is the ideology
    X I'm really at ac.dekanfrus | of the cancer cell.
    / \ if you read it the right way. | -- Edward Abbey
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From David Lesher@wb8foz@panix.com to alt.folklore.computers on Tue Sep 23 15:47:34 2025
    From Newsgroup: alt.folklore.computers

    Charlie Gibbs <cgibbs@kltpzyxm.invalid> writes:


    I guess the hook on a pay phone was too massive to jiggle fast
    enough to dial (not that I ever tried). The plungers on a 500
    set were more doable.

    In the "goodoldaze" i.e.pre-"dial tone first" the initial nickel
    err dime momentarily grounded the tip side of the line, telling
    the CO to give you dial tome. The "pin in the transmitter"
    ground emulated that coin drop.

    The whole history of payphone fraud emulated "Spy vs. Spy" in
    complexity as Ma closed one hole only to soon have phreaks
    exploit another. She was hampered by having to modify Central
    Offices circuitry all over the country.

    The part She DID do well was protecting the coinbox from
    theft. The lock on same was a 7-lever not pin design, well-nigh
    impossible to pick. That said, She wouldn't know of any theft
    until the coinbox was collected, the money counted, and
    audited. That might well be weeks/month later; the thief was
    long-long gone by then.

    Payphones were ideal targets, often in isolated locations, and
    how could you stake out every possible target in a region?

    There was one person who pulled it off. Once alerted to it,
    Ma's kids started looking & found it going on across large
    parts of the country, in a pattern that indicated it was a
    sole perpetrator moving from place to place. It seemed he could
    QUICKLY get the lock open, dump the bootie, relock and exit in a
    few minutes.

    One issue was how to explain cashing in all the booty. I
    remember thinking "That's easy; open a laundromat somewhere..."

    I recall reading that they chased for YEARS, and finally caught
    him. Not sure of his fate; given there would be nil evidence
    of him at previous locations.

    Connections has several You-Tubes on payphones:
    <https://youtu.be/Cdi1YvXj6_Q>
    <https://youtu.be/54wy8Y_pb9M>
    --
    A host is a host from coast to coast...............wb8foz@panix.com
    & no one will talk to a host that's close..........................
    Unless the host (that isn't close).........................pob 1433
    is busy, hung or dead....................................20915-1433
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Bob Eager@news0009@eager.cx to alt.folklore.computers on Tue Sep 23 21:13:37 2025
    From Newsgroup: alt.folklore.computers

    On Tue, 23 Sep 2025 02:00:43 +0000, David Lesher wrote:

    Charlie Gibbs <cgibbs@kltpzyxm.invalid> writes:


    My favourite part of that movie was when the kid was sitting outside the >>principal's office next to a desk with a terminal on it, and he pulled
    out the writing leaf to find the system password. That was one of the
    most realistic computer movie scenes I've ever seen.

    Tip grounding the transmitter [handset microphone for you Netheads] on
    the pay phone in the outside booth was an working technique until Ma
    swapped in insulated "Anti-fraud transmitters."

    Back in the 70s, here in the UK...

    Insertion of a diode into the line allowed one to 'dial in' payment. The telephone booth was situated above a service duct. Enterprising students removed the cable between the booth and the junction box below, and
    dissected it. A diode was inserted without disturbing the outer insulation
    in a visible place. The cable was reinstalled.
    --
    Using UNIX since v6 (1975)...

    Use the BIG mirror service in the UK:
    http://www.mirrorservice.org
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Carlos E.R.@robin_listas@es.invalid to alt.folklore.computers on Tue Sep 30 14:09:55 2025
    From Newsgroup: alt.folklore.computers

    On 2025-09-23 17:47, David Lesher wrote:
    Charlie Gibbs <cgibbs@kltpzyxm.invalid> writes:


    I guess the hook on a pay phone was too massive to jiggle fast
    enough to dial (not that I ever tried). The plungers on a 500
    set were more doable.

    In the "goodoldaze" i.e.pre-"dial tone first" the initial nickel
    err dime momentarily grounded the tip side of the line, telling
    the CO to give you dial tome. The "pin in the transmitter"
    ground emulated that coin drop.

    The whole history of payphone fraud emulated "Spy vs. Spy" in
    complexity as Ma closed one hole only to soon have phreaks
    exploit another. She was hampered by having to modify Central
    Offices circuitry all over the country.

    The part She DID do well was protecting the coinbox from
    theft. The lock on same was a 7-lever not pin design, well-nigh
    impossible to pick. That said, She wouldn't know of any theft
    until the coinbox was collected, the money counted, and
    audited. That might well be weeks/month later; the thief was
    long-long gone by then.

    Payphones were ideal targets, often in isolated locations, and
    how could you stake out every possible target in a region?

    One trick I knew about in Spain was to use a piezoelectric kitchen fire lighter somewhere near the apparatus, and it thought you had entered credit.

    I wonder who and how found that one out.




    There was one person who pulled it off. Once alerted to it,
    Ma's kids started looking & found it going on across large
    parts of the country, in a pattern that indicated it was a
    sole perpetrator moving from place to place. It seemed he could
    QUICKLY get the lock open, dump the bootie, relock and exit in a
    few minutes.

    One issue was how to explain cashing in all the booty. I
    remember thinking "That's easy; open a laundromat somewhere..."

    I recall reading that they chased for YEARS, and finally caught
    him. Not sure of his fate; given there would be nil evidence
    of him at previous locations.

    Maybe an AI like chatgpt could locate the history.


    Connections has several You-Tubes on payphones: <https://youtu.be/Cdi1YvXj6_Q>
    <https://youtu.be/54wy8Y_pb9M>

    --
    Cheers, Carlos.
    ESEfc-Efc+, EUEfc-Efc|;
    --- Synchronet 3.21a-Linux NewsLink 1.2