cypherpunks-legacy
Threads by month
- ----- 2025 -----
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1998 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1997 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1996 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1995 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1994 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1993 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1992 -----
- December
- November
- October
- September
July 2018
- 1371 participants
- 9656 discussions
[Excerpt: A third policeman who was finally rescued by colleagues - three
and a half hours after the attack began - suffered serious injuries and is said
to be in a critical condition....The attack in the southern suburb of San Juan
Ixtayopan was the latest example of mob justice by Mexicans frustrated by
state corruption and soaring crime, correspondents say. "I've never seen such
insanity, so much unbridled hate. They beat them with pipes, they kicked
them...
It was so extreme that you couldn't recognise them when they were set alight,"
an unnamed Televisa cameraman who filmed the incident told the French news
agency AFP....At one point, the victims, blood streaming down their faces,
spoke
into the cameras, confirming they were anti-terrorism agents. The gruesome
footage was given wide coverage....Mexico City's public safety chief, Marcelo
Ebrard, said back-up units were unable to get through for more than three and a
half hours because of heavy traffic.]
Last Updated: Thursday, 25 November, 2004, 10:23 GMT
http://212.58.240.132/1/hi/world/americas/4040815.stm
Mexican police hunt lynch mob
Hundreds of police and federal agents raided a Mexico City suburb on
Wednesday night after two officers were killed by an angry crowd.
More than 30 people were reportedly held after police with pictures taken in
the attack went from house to house.
They are also investigating why the two men were not rescued - despite live
TV coverage of Tuesday's events.
The two plain-clothes officers were burned alive after locals apparently
mistook them for child kidnappers.
A third policeman who was finally rescued by colleagues - three and a half
hours after the attack began - suffered serious injuries and is said to be in a
critical condition.
The attack in the southern suburb of San Juan Ixtayopan was the latest
example of mob justice by Mexicans frustrated by state corruption and
soaring crime,
correspondents say.
The men who were attacked were working on a covert drugs operation at the
time, officials said.
'Unbridled hate'
A long convoy of government vehicles sped into San Juan Ixtayopan just before
night fell on Wednesday, an official spokeswoman told the Associated Press
news agency.
The agency said 600 federal agents and hundreds of city police were involved
in the operation.
They sealed off streets and carried out house-to-house searches.
I've never seen such insanity, so much unbridled hate... It was so extreme
that you couldn't recognise them when they were set alight
TV cameraman
Mexico's Procurator General, Rafael Macedo, told Mexican television that 33
people had been detained, among them people suspected of actually carrying out
or instigating the attack, along with others who witnessed it, Efe news agency
reported.
The agents were taking photos of pupils at a primary school on Tuesday -
where two children had recently gone missing - when the attack began.
Some in the crowd thought they were kidnappers, while others were simply
angry that the alleged kidnappings had not been properly investigated.
The crowd cheered, chanted and shouted obscenities as they attacked.
Reporters reached the scene before police reinforcements, and live cameras
caught a mob beating Victor Moreles Barrera and Cristobal Martinez Martin
before
setting them alight.
"I've never seen such insanity, so much unbridled hate. They beat them with
pipes, they kicked them... It was so extreme that you couldn't recognise them
when they were set alight," an unnamed Televisa cameraman who filmed the
incident told the French news agency AFP.
At one point, the victims, blood streaming down their faces, spoke into the
cameras, confirming they were anti-terrorism agents. The gruesome footage was
given wide coverage.
Mexico City's public safety chief, Marcelo Ebrard, said back-up units were
unable to get through for more than three and a half hours because of heavy
traffic.
[Non-text portions of this message have been removed]
------------------------ Yahoo! Groups Sponsor --------------------~-->
$9.95 domain names from Yahoo!. Register anything.
http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/TySplB/TM
--------------------------------------------------------------------~->
--------------------------
Want to discuss this topic? Head on over to our discussion list,
discuss-osint(a)yahoogroups.com.
--------------------------
Brooks Isoldi, editor
bisoldi(a)intellnet.org
http://www.intellnet.org
Post message: osint(a)yahoogroups.com
Subscribe: osint-subscribe(a)yahoogroups.com
Unsubscribe: osint-unsubscribe(a)yahoogroups.com
*** FAIR USE NOTICE. This message contains copyrighted material whose use
has not been specifically authorized by the copyright owner. OSINT, as a
part of The Intelligence Network, is making it available without profit to
OSINT YahooGroups members who have expressed a prior interest in receiving
the included information in their efforts to advance the understanding of
intelligence and law enforcement organizations, their activities, methods,
techniques, human rights, civil liberties, social justice and other
intelligence related issues, for non-profit research and educational
purposes only. We believe that this constitutes a 'fair use' of the
copyrighted material as provided for in section 107 of the U.S. Copyright
Law. If you wish to use this copyrighted material for purposes of your own
that go beyond 'fair use,' you must obtain permission from the copyright
owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
Yahoo! Groups Links
<*> To visit your group on the web, go to:
http://groups.yahoo.com/group/osint/
<*> To unsubscribe from this group, send an email to:
osint-unsubscribe(a)yahoogroups.com
<*> Your use of Yahoo! Groups is subject to:
http://docs.yahoo.com/info/terms/
--- end forwarded text
--
-----------------
R. A. Hettinga <mailto: rah(a)ibuc.com>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
1
0
Crossing the Lines
How a top Pentagon official and a host of influential Republicans
almost made sure that one American company gained a key stake in
Iraq's lucrative wireless market.
Michael Scherer
September/October 2004 Issue
<http://www.motherjones.com/news/feature/2004/09/09_801.html>
The auctioning off of Iraq began in the summer of 2003 in a packed
conference room at the Grand Hyatt in Amman, Jordan. More than 300
executives had gathered from around the world to vie for a piece of
one natural resource Saddam Hussein never managed to exploitbthe
nation's cellular phone frequencies. With less than 4 percent of
Iraqis connected to a phone, the open spectrum could earn billions of
dollars for the eager executives working the room. Conference
organizers tried to keep everyone focused on the prize. "Iraq needs a
mobile communications system and it needs it now," stressed Jim
Davies, a British expert with the Coalition Provisional Authority
(CPA) who was leading the effort. "We want quick results."
But back in Washington, D.C., the focus had already turned from the
needs of Iraq to the bottom lines of a select few corporations. "The
battle for Iraq is not over oil," said one Defense Department official
involved in communications. "It's over bandwidth." And no one was
fighting harder for a piece of the spectrum than the consortium led by
American cellular giant Qualcomm with such business partners as Lucent
Technologies and Samsung of South Korea. They wanted to follow U.S.
troops into Iraq with Qualcomm's patented cellular technology, called
CDMA, a system no nation in the Middle East had yet been willing to
adopt. Even as the bombs fell over Baghdad, Rep. Darrell Issa (R-
Calif.), whose district includes many Qualcomm employees, had tried to
wrap his favored company in the flag. He denounced the cellular system
used by Iraq's neighbors as "an outdated French standard," and
proposed a law that would effectively mandate Qualcomm on Iraq.
"Hundreds of thousands of American jobs depend on the success of U.S.-
developed wireless technologies like CDMA," Issa wrote in a March 26,
2003, letter to Defense Secretary Donald Rumsfeld. A swarm of
lobbyists rallied to the companies' cause, including William Walker, a
former protC)gC) of Rumsfeld from the Ford White House, and Stacy
Carlson, who ran President George W. Bush's California campaign in 2000.
At the conference in Amman, CPA officials promised an apolitical
selection process that would accept any workable technology. In the
weeks that followed, Col. Anthony Bell, the chief military procurement
officer in Iraq, personally oversaw the selection of three cellular
companies, assigning a panel of Iraqi and Coalition experts to a
locked room where they reviewed blind proposals. "No names, only a
number," said Bell, who handled $1.9 billion in contracts during his
nine months in Baghdad. On October 6, Iraq's new minister of
communications, Haider al-Abadi, announced the winnersbtwo Kuwaiti
firms and one Egyptian company. Not one of them used the Qualcomm
standard.
If any officials in Baghdad or Washington thought such a decision
would be the end of Qualcomm's quest, the next six months would prove
them wrong. Like dozens of American corporations looking to influence
U.S. policybshaping everything from the banking and insurance markets
to foreign-investment rulesbQualcomm, Lucent, Samsung, and their
partners would only expand their efforts and broaden their reach into
the CPA. With the guidance of a deputy undersecretary of Defense, John
Shaw, this effort became one of the most brazen lobbying campaigns of
the postwar reconstruction, one that has brought Shaw under
investigation for potentially breaking federal ethics rules.
According to documents provided to Senator John McCain (R-Ariz.), the
companies' supporters in Washington, D.C., attempted to sneak a new
cellular license into an unrelated contract for Iraqi police and fire
communications, tried to oust the CPA officials who resisted their
efforts, and ultimately caused the delay of plans for a badly needed
Iraqi 911 emergency system. "The American corporate leaders would not
let a system be built that they couldn't make an obscene amount of
money off of," said one former technical adviser to the Iraqi Ministry
of Communications, who has since returned to the United States.
Senator Conrad Burns felt the sting of Qualcomm's defeat in October.
As chairman of the Communications subcommittee, the Montana Republican
had strong ties to the company: Qualcomm was Burns' 12th-largest
campaign donor, and one of the company's founders, Klein Gilhousen,
had recently given $5 million to Montana State University. Gilhousen
also sits on the board of the Burns Telecom Center, an academic
research program, of which the senator is chairman. During a trip to
Iraq in October, Burns spoke with officials one-on-one about the
process that had denied the Qualcomm consortium a license. "I think
the bidding was open, transparent, and fair," he said upon his return
on October 14. That same day, however, one of his chief aides began
working behind the scenes to plan a new way to get Qualcomm into Iraq,
a plan described in the aide's internal emails, which were obtained by
Mother Jones. "As you know, Senator Burns is taking flak for defending
the CPA on Iraqi telecommunications contracts which ignore CDMA,"
wrote Burns aide Myron Nordquist to one of the Pentagon's chief
networking officials. "The Senator remains determined to support CDMA."
And Burns had a powerful motivation. The stakes for Qualcomm, and by
extension Burns, were far larger than just the Iraqi market of 25
million people. For nearly a decade, Qualcomm had been engaged in an
international battle with the non-American companies pushing GSM, a
rival technology that had been developed in Europe and now controlled
72 percent of the world market. A CDMA beachhead in Iraq would set the
stage for an expansion throughout the region, with Lucent and Samsung
well positioned to prosper as leading makers of the CDMA switches and
phones. As Nordquist explained to the Pentagon last fall, Iraq could
provide a "communications link between Turkey and the Gulf."
Deputy Undersecretary Shaw, an old Republican hand who had served in
the Nixon, Ford, and Reagan White Houses, quickly became the point man
for the initiative to bring CDMA to Iraq. Shaw and other officials in
the Pentagon and Congress reasoned that establishing CDMA in the
Middle East would be possible if they could find a way for Qualcomm
and its partners to offer cellular service in Iraq under the rubric of
the police and fire communications system that the CPA planned to
purchase for the Iraqis. "The CDMA system could then morph into a
commercial service with our having total control over it," Shaw wrote
in a November email to a Coalition adviser in Baghdad.
[snip]
-------------------------------------------
Archives: http://v2.listbox.com/member/archive/247/=now
RSS Feed: http://v2.listbox.com/member/archive/rss/247/
Powered by Listbox: http://www.listbox.com
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
1
0
Begin forwarded message:
1
0
============================================================
EDRI-gram
biweekly newsletter about digital civil rights in Europe
Number 6.14, 16 July 2008
============================================================
Contents
============================================================
1. Vote in the EP committees on the Telecom Package
2. Dutch University sued to stop publishing research on chip technology
3. Russian blogger sentenced for comments on the blog
4. Copiepresse attacks EC for copyright infringement, but gets dismissed
5. Complaint against the French govt to annul the biometric passport decree
6. Irish Human Rights Commission added to data retention challenge
7. Privacy complaints related to Google's Street View
8. New threats for UK file-sharers
9. Liberty groups win long court battle against UK wiretapping
10. ENDitorial: Massive mobilization against EDVIGE, the new French database
11. Recommended Reading
12. Agenda
13. About
============================================================
1. Vote in the EP committees on the Telecom Package
============================================================
The IMCO (Internal Market Committee) and ITRE (Committee on Industry,
Research and Energy) committees of the European Parliament (EP) adopted on
the 7 July 2008 the Telecom package, including the amendments that were
considered by some NGOs as endangering the principle of the neutrality of
the Internet.
One of the MEPs supervising the Telecom package, including the amendments to
the five directives that should reform the EU legal framework on electronic
communications has explained that the vote on these amendments had nothing
to do with copyright enforcement: "There has been a great deal of dismay in
the committee at the interpretation being put on these amendments.(...) The
interpretation of them is alarmist and scare-mongering and deflects from the
intention which was to improve consumers' rights." declared MEP Malcolm
Harbou for BBC.
But the NGOs supported their initial comments that the present adopted texts
could open the way to the regulation of users via the Internet Service
Providers under the control of national regulators. They also praised
the civic response to their campaign that has reached some MEPs, who
highlighted part of the problematic amendments in the Telecom Package during
the EP committees debates.
Other privacy issues related with the management of traffic data has created
problems within the IMCO committee that should have included the opinion
from the Civil Rights Committee (LIBE). But the Socialist and Green MEPs
from the IMCO committee did not back up the suggestion of the LIBE committee
to allow the processing of electronic traffic data by "any natural or legal
person".
Other discussions in the ITRE committee of the EP rejected the idea of a
unique EU telecom authority and suggested instead a new group called Body of
European Regulators in Telecoms (BERT), formed by the 27 national regulatory
authorities.
ITRE committe backed up the proposals to enhance the use of radio
frequencies, but demanded several safeguards on media pluralism, public
interest or emergency services.
The final vote on the Telecom package was initially planned on 2 September,
but since it is clear that there will be some debates on the above-mentioned
topics, the vote was delayed for the session starting on 22 September.
MEPs back contested telecoms plan (8.07.2008)
http://news.bbc.co.uk/2/hi/technology/7495085.stm
The "Telecoms Package": out of the shadows, into the light (10.07.2008)
http://www.laquadrature.net/en/the-%E2%80%9Ctelecoms-package%E2%80%9D-out-s…
MEPs discard plan for single EU telecoms watchdog (9.07.2008)
http://www.euractiv.com/en/infosociety/meps-discard-plan-single-eu-telecoms…
EU Parliament split over electronic data protection (10.07.2008)
http://www.euractiv.com/en/infosociety/eu-parliament-split-electronic-data-…
EDRi-gram: Control on Internet users pushed with the new telecom package
(2.08.2008)
http://www.edri.org/edrigram/number6.13/telecom-package-internet
============================================================
2. Dutch University sued to stop publishing research on chip technology
============================================================
Dutch chipmaker NXP Semiconductors has sued the Dutch Computer Security
Group of Radboud University in Nijmege in order to stop the publication of
research results showing security flaws in NXP's Mifare Classic wireless
smart cards used in transit and building entry systems around the world.
The technology is used for the transit system in The Netherlands, in the
subway systems in London, Hong Kong and Boston, as well as in cards for
accessing buildings and facilities, covering 80 percent of the market.
The security researchers of the Dutch university have checked the Mifare
system used with Oyster cards for transport in London and recently succeeded
in cracking the encryption on a card and clone it. They added credit to it
and moved freely around London's Underground network.
According to Dr. Bart Jacobs, professor of computer security at the
university, by using a computer and an RFID reader, in just a few seconds,
the Oyster card's encryption can be cracked. "We need to eavesdrop on the
communication between a card and a card reader. From that communication we
can deduce secret cryptographic keys that are used to protect the contents
of the card. Once we have the keys we 'own' the card and can manipulate it
as we like" said Jacobs.
The University issued a statement in March this year saying: "Because some
cards can be cloned, it is in principle possible to access buildings and
facilities with a stolen identity. This has been demonstrated on an actual
system." Jacobs demonstrated how the London transit system can be used for
free. He obtained the key used by the London transit system then he passed
by passengers carrying Oyster cards and was able to collect their card
information on his laptop and make a clone of it. The scientist has given
NXP the opportunity to fix the security problems waiting with the
publication and presentation of the results for some time but as NXP did not
solve the issue decided to go on with the university plans of publishing the
research.
The Dutch university's research builds upon Karsten Nohl's work, a graduate
student of the University of Virginia, and expert on the security for NXP.
"NXP has had half a year now to inform about the lack of security in their
product, but instead they have used the best part of that to dismiss our
research, dismiss the Dutch group's research, and to claim that everything
is purely theoretical. So, if anything, NXP has invoked this type of public
demonstration, since they have often claimed that 'yes in theory it may be
insecure but in practice it isn't'. So had they not kept up the
disinformation that (the Mifare could actually be secure) nobody would have
paid attention to the Dutch group actually hacking the Oyster card" stated
Nohl.
The Computer Security Group publication comes during a long and heated
public debate in the Dutch parliament and the media on the merits of large
scale computer systems, their quality and security standards and the
government's capacity to manage these kind of projects. The publication of
the University research may be essential for this debate.
The Dutch court decision is expected on 17 July 2008.
Censoring Dutch Academia: Computer Security Scholars taken to Court
(8.07.2008)
http://www.jorisvanhoboken.nl/?p=173
Dutch chipmaker sues to silence security researchers (9.07.2008)
http://news.cnet.com/8301-10784_3-9985886-7.html?hhTest=1
Has London's Oyster travelcard system been cracked? (26.06.2008)
http://www.guardian.co.uk/technology/2008/jun/26/hitechcrime.oystercards
Cryptoanalysis of Crypto-1
http://www.cs.virginia.edu/~kn5f/pdf/Mifare.Cryptanalysis.pdf
Security Flaw in Mifare Classic - press release Digital Security group,
Radboud University Nijmegen (12.03.2008)
http://www.ru.nl/english/general/radboud_university/vm/security_flaw_in/
London transit cards cracked and cloned (26.06.2008)
http://news.cnet.com/8301-10789_3-9978486-57.html?hhTest=1
NXP sues academic research team - what are they afraid of? (10.07.2008)
http://www.thetechherald.com/article.php/200828/1463/
============================================================
3. Russian blogger sentenced for comments on the blog
============================================================
On 7 July 2008, a Russian blogger was sentenced to one year suspended jail
after having been found guilty of "inciting hatred and enmity" for a comment
left on a LiveJournal weblog.
According to Kommersant newspaper, the young blogger Savva Terentiev was
saying on the blog that "Those who become cops are scum," and calling for
officers to be put on a bonfire. For his alleged offence, inciting hatred
and denigrating the human dignity of a social group, the prosecutors were
asking for a significant fine and two years behind bars, which seemed
excessive. During the trial, Terentyev referred to his statements on the
blog that corrupt cops should burned in Auschwitz-like ovens as "hyperbole
and exaggeration," and apologized to concentration camp victims and the
police officers he might have "involuntarily hurt with the contested
commentary." The final court decision was to sentence the blogger to one
suspended jail year.
Free speech campaigners are concerned about the fact that the ruling might
create a dangerous precedent for free speech on the Internet, especially in
Russia where the mainstream traditional media is biased in favour of the
authority.
"This was an absolutely unjustified verdict. (...) Savva for sure wrote a
rude comment ... but this verdict means it will be impossible to make rude
comments about anybody" told Alexander Verkhovsky, director of the SOVA
centre in Moscow, a non-governmental group that monitors extremism, to
Reuters agency.
Recently, the Russian President Dmitry Medvedev has expressed his views on
the freedom of speech saying Russia should use a light touch when policing
the Internet."Thank God we live in a free society. (...) It's possible to go
on to the Internet and get basically anything you want. In that regard,
there are no problems of closed access to information in Russia today, there
weren't any yesterday and there won't be any tomorrow," he said last month
in an interview with Reuters.
Russian blogger sentenced for "extremist" post (7.07.2008)
http://uk.news.yahoo.com/rtrs/20080707/tot-uk-russia-blogger-566e283.html
Russian Blogger Sentenced Over LiveJournal Comment (7.07.2008)
http://www.theotherrussia.org/2008/07/07/russian-blogger-sentenced-over-liv…
EDRi-gram: More control over the Internet wanted in Russia (7.05.2008)
http://www.edri.org/edrigram/number6.9/internet-control-russia
============================================================
4. Copiepresse attacks EC for copyright infringement, but gets dismissed
============================================================
The Belgium newspaper Association Copiepresse has initiated a legal
complaint against the European Commission (EC) arguing that it infringes its
copyright through the NewsBrief and NewsExplorer aggregation services.
Copiepresse became famous for its copyright suit against Google and other
search engines claiming copyright infringement over the aggregation services
done by the search engines. The association has initiated a new action in
the Belgian Court of Seizures considering that the European Commission is
counterfeiting its member's news articles by using small part of them in
order to prepare a news collation marketed as NewsBrief and NewsExplorer.
The Belgium Court rejected the Copiepresse claim, confirming the EC opinion
that the competent courts on the matter are the European Courts.
Copiepresse announced that they wouldn't appeal the decision, claiming
"startegic reasons" and explaining that they just wanted to get the EC out
in the open, since they didn't reply to any message on the topic. But at the
same time the Association announced that they would continue the case in the
Bruxelles civil court, where an action of cease&desist has already been
introduced.
The European Commission representatives claimed in court that its services
are just press reviews, that fall under the exemptions from the copyright
law protection.
The judge initially ordered a judicial expertise in order to gather more
technical information about how the site was built, but then he dismissed
this evidence and took his decisions only on jurisdictional grounds.
Copiepresse sues the European Commission to the civil court (only in French,
27.06.2008)
http://www.actu24.be/article/regions/regionbruxelles/infosbxl/copiepresse_p…
Belgian press beef with EU beaten in Belgian court (1.07.2008)
http://www.theinquirer.net/gb/inquirer/news/2008/07/01/copiepresse-slapped-…
Belgian agency to sue European Commission again over news aggregator
(2.07.2008)
http://www.out-law.com/page-9227
EDRi-gram: Belgium newspaper group continues its actions against search
engines (25.10.2006)
http://www.edri.org/edrigram/number4.20/belgium
============================================================
5. Complaint against the French govt to annul the biometric passport decree
============================================================
Two French associations, EDRi-member Imaginons un riseau internet solidaire
(IRIS) and Ligue des droits de l'Homme (LDH), have filed a complaint
against the French government before the highest administrative Court. They
ask the French Conseil d'Itat to annul the decree issued on 30 April 2008 by
the French government on biometric passports.
The associations consider the decree had been issued under an irregular
procedure by publishing the Opinion in the Official Journal 6 days after
the decree had been published, instead of presenting them at the same time,
as required by law.
The provisions of the decree stipulate the collection of eight fingerprints
for passport applicants starting with 6 years old children and the creation
of a central biometric database for retaining and processing the collected
data.
IRIS and LDH argue that the nature, the quantity and the retaining period of
these data in a central database are disproportionate with regards to the
decree's objectives, which remain the same as in the previous passport
decree of December 2005, where fingerprints were not required. Moreover,
they believe that the decree is violating the national as well as
international legislation regarding the protection of the personal data. It
also violates international legislation related to children.
The two associations link the requirements of this decree to the provisions
of the draft law on biometric ID cards currently being prepared. They state
that, if the decree is not annulled, the government would, under the pretext
of more easily issuing identity cards and passports, influence the debate in
the French Parliament on the biometric identity card project.
.
Biometric passport : IRIS and LDH ask the State Council to annul the decree
(only in French, 4.07.2008)
http://www.iris.sgdg.org/info-debat/comm-passeport0708.html
Common Press Release - IRIS and LDH (only in French, 4.07.2008)
http://www.iris.sgdg.org/info-debat/recours-passeport0708.pdf
Text of the legal complaint (only in French 4.07.2008)
http://www.iris.sgdg.org/info-debat/recours-passeport0708.pdf
EDRIgram: The French Government goes against CNIL in biometric passports
(21.05.2008)
http://www.edri.org/edrigram/number6.10/cnil-biometric-passports
============================================================
6. Irish Human Rights Commission added to data retention challenge
============================================================
The High Court in Dublin has allowed the Irish Human Rights Commission to
become a party to the data retention challenge being brought by Digital
Rights Ireland. The Human Rights Commission, which is a state body, will be
an amicus curiae (friend of the court) with the ability to make submissions
about the fundamental rights implications of data retention. The Chief
Executive of the Commission Iamonn Mac Aodha stated:
"This case raises important issues about the extent to which laws and
measures governing the monitoring of one's private life by the State in
pursuit of tackling crime possess sufficient human rights safeguards". Mr
MacAodha continued "one of the priorities of the IHRC is to address
potential threats to human rights that may emerge with developments in
communications technology such as in the present case where issues of
individual security and privacy are raised."
Irish Human Rights Commission given permission to appear in DRI action
(4.07.2008)
http://www.digitalrights.ie/2008/07/04/irish-human-rights-commission-given-…
IHRC granted leave to appear in Data Protection Case in the High Court
(1.07.2008)
http://www.ihrc.ie/home/wnarticle.asp?NID=200&T=N&Print
(Contribution by TJ McIntyre - EDRi-member Digital Rights Ireland)
============================================================
7. Privacy complaints related to Google's Street View
============================================================
Privacy International has complained to the Information Commissioner's
Office (ICO) against Google's Street View cars, which grab real photographs
of streets and people, that get loaded into Google Maps.
Street View distinctive cars have been recently spotted on London. The
system allows Google's users to view 360 degree photographs of streetscapes
in towns and cities that have been catalogued by Google cameras.
Privacy International has expressed its reservations towards Google's
practice in a letter sent to the company: "You may be aware that Privacy
International has stated, both privately to Google legal staff and to the
media, that we are concerned about a number of potential violations of
national law that this technology may create," said the letter signed by
director Simon Davies.
Google had stated the company had implemented a technology that would blur
faces and vehicle number plates allowing at the same time high quality
images. Google's senior privacy counsel Jane Horvath had answered to Davies
explaining that the face and number plate blurring technology had been in
place since May. "As with all such systems operating at this scale our
blurring technology is not perfect - we occasionally miss a face or license
plate, for example if they are partially covered, or at a difficult angle.
(...) However, we tested the technology thoroughly before launch and I am
confident that it finds and blurs the vast majority of identifiable faces
and license plates. For the few that we miss, the tools within the product
make it easy for users to report a face or license plate for extra blurring.
As always, users can still ask for their image to be removed from the
product entirely" said Horvarth.
In its letter, Privacy International was asking from Google to provide,
within seven days, technical specifications of the blurring technology used,
otherwise it would have to make a complaint to ICO. Having not received the
required information, the privacy group placed the complaint which was
confirmed by a spokeswoman for ICO: "Yes, we have received a complaint about
this and we are looking into it. We are contacting Google to get more
details of the scheme" said the spokeswoman to The Register.
This comes at a time when ICO asks for changes to European data protection
laws to keep up with changing technology. "European data protection law is
increasingly seen as out of date, bureaucratic and excessively prescriptive.
It is showing its age and is failing to meet new challenges to privacy, such
as the transfer of personal details across international borders and the
huge growth in personal information online. (...)"It is high time the law is
reviewed and updated for the modern world." said Richard Thomas, UK ICO. The
ICO has hired RAND Corporation to review European data protection laws for
possible reforming.
Some recent rulings of the Court of Appeal might be to Google's advantage.
"If the photographs had been taken to show the scene in a street by a
passer-by and later published as street scenes, that would be one thing, but
they were not taken as street scenes but were taken deliberately, in secret
and with a view to their subsequent publication," said Lord Hope in one of
his ruling.
On the other hand, while reluctant for some time, giving in to privacy
advocates' pressure, Google has added a link to its privacy policy from its
front page. Google home page contains now the word 'privacy' near the
bottom, beside the copyright notice. The word is a link to a page containing
all Google's privacy information.
Google's spycar revs up UK privacy fears (7.07.2008)
http://www.theregister.co.uk/2008/07/07/google_spycar_slammed/
Privacy group protests about Street View, but Google says blurring protects
privacy (7.07.2008)
http://www.out-law.com/page-9239
Google's controversial Street View hits the UK (3.07.2008)
http://www.out-law.com/page-9233
Google bows to pressure, adds privacy link to home page (7.07.2008)
http://www.out-law.com/page-9237
Google, privacy and Street View (4.07.2008)
http://www.bbc.co.uk/blogs/technology/2008/07/google_privacy_and_street_vie…
EDRIgram - Google StreetView might breach EU laws (21.05.2008)
http://www.edri.org/edrigram/number6.10/google-streetview-eu
============================================================
8. New threats for UK file-sharers
============================================================
After the letters sent from Virgin Media to its customers on alleged
file-sharing activities, British Telecom (BT), the UK's largest broadband
provider, has started a similar activity.
The Register has received information from one of the BT subscribers that
has received such a letter from the Customer Security Team
stating: ""I have received a complaint regarding one of our customers
offering copyrighted material over the internet. On investigation, I have
found that your account was used to make this offer."
The letter contained evidence put forward by BPI, that was shared by BT with
its customer and consisted, in this case, of the P2P programme Ares user
agent, a time stamp, a file name and an IP address. The letter provided
information on how to secure their WiFi connection, but also threaten with
disconnection if similar activities continued: "Sorry, but we're obliged to
point out that further similar problems may have to lead to the termination
of your account, as such activity contravenes BT's Acceptable Use Policy."
More aggressive threats have been reported being sent by Virgin Media to
approx 800 subscribers with the following text on the envelope: "Important.
If you don't read this, your broadband could be disconnected". Virgin Media
spokeswoman claimed that the text was a mistake and explained that this was
part of an education campaign: ""We are not accusing our customers of doing
anything, we are alerting them to the fact that illegal file sharing has
been tracked to their account. This could have been someone else in the
house or an unsecured wireless network. This is an education campaign."
In sending these letters, the ISPs do not share confidential information
with BPI and do not monitor their users, but only receive from the BPI
investigators the collected IP addresses of the customers having
participated in alleged p2p copyrighted material sharing. The ISP identifies
the exact individual and sends him (her) the template letter.
Even though the BPI campaign has attracted two of the major British ISPs in
this "education campaign", other ISPs have promptly rejected such
collaboration. Carphone Warehouse make it clear that they just give access
to Internet:
"We are the conduit that gives users access to the internet. We do not
control the internet, nor do we control what our users do on the internet. I
cannot foresee any circumstances in which we would voluntarily disconnect a
customer's account on the basis of a third party alleging a wrongdoing",
said Charles Dunstone, the chief executive of Carphone Warehouse, to BBC.
Virgin admits disconnection threat mistake (3.07.2008)
http://www.out-law.com/page-9235
We won't cut off users, says Virgin (3.07.2008)
http://www.guardian.co.uk/technology/2008/jul/03/virgin.filesharers
Virgin warns 800 punters for file-sharing (3.07.2008)
http://www.theregister.co.uk/2008/07/03/virgin_letters_numbers/
BT starts threatening music downloaders with internet cut-off (26.06.2008)
http://www.theregister.co.uk/2008/06/26/bt_bpi_letter/
EDRi-gram: British ISPs warn Internet downloaders on the risk of being
prosecuted (18.06.2008)
http://www.edri.org/edrigram/number6.12/british-isp-virgin-letters
============================================================
9. Liberty groups win long court battle against UK wiretapping
============================================================
After nine years of legal battle by civil rights groups in London and
Dublin, the European Court of Human Rights ruled on 1 July 2008 that UK
Government had violated Human Rights by tapping their communications
between 1990 and 1997.
Liberty groups, along with British Irish Rights Watch and the Irish Council
for Civil Liberties, have claimed their communications were subject to
indiscriminate surveillance by MoD's Electronic Test Facility that had
eavesdropped on their phone, fax, email and data communications between 1990
and 1997.
After having first lodged complaints with the UK's Interception of
Communications Tribunal, the DPP and the Investigatory Powers Tribunal
without results because the local courts ruled "there was no contravention
to the Interception of Powers Act 1985". Finally, the groups obtained the
European Human Rights Court ruling that the UK had violated article 8 of the
European Convention on Human Rights providing the right to respect for
private and family life and correspondence.
The court found that the 1985 Act has given the UK government "virtually
unlimited" discretion to intercept communications between the UK and an
external receiver, as well as "wide discretion" to decide which
communications were listened to or read. The government had guidelines to
ensure a "safeguard against abuse of power", but the UK's 1985 interception
law "had not indicated with sufficient clarity... the scope or manner of the
exercise of the very wide discretion of the conferred on the State to
intercept and examine external communications" so as to guard against abuse
of power.
For 10 years now, the 1985 Act has been replaced by RIPA which has the same
objective to detect terrorism and serious crime but it is mostly applied by
local councils for minor infringements.
The court ruled that procedures regarding the use and storage of intercepted
material should be established so as to make these procedures more
transparent for the public. "While secret surveillance is a valuable tool,
the mechanisms for intercepting our telephone calls and emails should be as
open and accountable as possible, and should ensure proportionate use of
very wide powers" said Alex Gask, Liberty's legal officer.
The ruling will have strong implications for UK's present legislation on
phonetapping and interception of communications, and as Mark Kelly, Director
of the Irish Council for Civil Liberties believes, clear implications for
many other member states of the Council of Europe member states, such as
Ireland: "Our lax data interception regime will require a thorough overhaul
in order to ensure that it meets the standards required by the European
Court of Human Rights under Article 8."
Liberty called for an overhaul of RIPA. However, the Home Office stated on 2
July it did not think the ruling had any implications on RIPA and UK's
current legislation covering covert investigations.
Court rules 90s UK.gov wiretaps violated human rights (2.07.2008)
http://www.theregister.co.uk/2008/07/02/echr_ripa_judgement/
Security: UK phonetap laws breach privacy (2.07.2008)
http://www.guardian.co.uk/uk/2008/jul/02/privacy.humanrights
UK surveillance breaches human rights, rules ECHR (2.07.2008)
http://www.out-law.com/page-9228
============================================================
10. ENDitorial: Massive mobilization against EDVIGE, the new French database
============================================================
Remember the movie 'Das Leben der Anderen' (The Lives of Others), where a
Stasi agent was monitoring a playwriter's life? This doesn't translate
anymore in French into 'La vie des autres', but rather into EDVIGE, the name
of a newly created database to be used by French intelligence services and
the administrative police.
EDVIGE will file "individuals, groups, organisations and moral persons
which, due to their individual or collective activity, are likely to attempt
to public order". Not only these persons will be filed (without any offence
committed), but also "those who undertake or have undertaken direct and non
fortuitous relations with them." Filing starts at age 13.
This, clearly, means filing everyone, in view of "informing the government
and the representatives of the State" in any and all French town and region.
In other words, EDVIGE, which has been created by a decree issued on 27 June
2008 in the framework of the merging of two French intelligence services (RG
and DST), is the perfect instrument of a political police.
EDVIGE will contains data on "civil status and occupation; physical
addresses, phone numbers, email addresses; physical characteristics,
photographs and behaviour; identity papers; car plate numbers; fiscal and
patrimonial information; moves and legal history."
As highlighted by lesbians and gays associations, this will include data on
sexual orientation and health, in particular HIV seropositivity. This has
been confirmed by a representative of the Interior ministry, who declared
that "the mention of these data will only be authorised for incidental need
in relation with an activity. In the intelligence field, this mainly means
activism." Moreover, French EDRI member IRIS notes that the inclusion of
"identity papers" in these data is particularly significant in the context
of the newly created French biometric passport including 8 fingerprints and
of the draft law in preparation on biometric ID cards.
A large mobilization against EDVIGE immediately started, with a petition
calling for the withdrawal of this file. This petition is hosted and
maintained by RAS ('Riseau associatif et syndical'), an NGO acting as an ISP
for its members, almost 200 activist NGOs and trade unions, among them EDRI
member IRIS. The petition has already gathered since 10 July 2008 more than
16.000 individual signatures, and more than 170 signatures from
associations, trade unions and political parties from the opposition.
Signatories will organize into a global coordination against the EDVIGE
file, and are preparing various actions starting from next September. In the
mean time, some of these groups will file a complaint against the French
government, requesting the annulment of the EDVIGE decree.
But EDVIGE is not alone. Her twin sister, CRISTINA, has also been created on
the same day. CRISTINA aims at "Centralising inland intelligence for
homeland security and national interests." But that's all that we know about
CRISTINA: using the article 26.III provision of the French Data Protection
Act, the government decided not to publish the decree creating CRISTINA. As
a consequence, the CNIL's opinion on CRISTINA has not been published either,
except to attest that this opinion was "favourable, with reservations."
Actually, the same secret has been observed for 6 other newly created files,
related to inland and foreign intelligence, as well as military services.
Not a good sign for these "Sarkozy's babies."
Decree n0 2008-632 creating EDVIGE file (only in French, 27.06.2008)
http://www.legifrance.gouv.fr/WAspad/UnTexteDeJorf?numjo=IOCC0815681D
CNIL's opinion on EDVIGE (only in French, 16.06.2008)
http://www.legifrance.gouv.fr/WAspad/UnTexteDeJorf?numjo=CNIX0816023X
Tjtu: L'Intirieur reconnant qu'+Edvige; sera utilisi pour ficher les
militants (only in French, 12.07.2008)
http://www.tetu.com/rubrique/infos/infos_detail.php?id_news=13236
IRIS: Appel ` signatures : IRIS soutient l'appel pour l'abandon du fichier
EDVIGE (only in French, 11.07.2008)
http://www.iris.sgdg.org/info-debat/comm-edvige0708.html
'Non ` EDVIGE': Petition website, with press releases and press articles
(only in French, since 10.07.2008)
http://nonaedvige.ras.eu.org/
Decree n0 2007-914 of 15 May 2007, as modified by Decree n02008-631 of 27
June 2008 to create CRISTINA and other files (only in French, 01.07.2008
consolidated version)
http://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000000649189&…
CNIL's opinion on CRISTINA (only in French, 16.06.2008)
http://www.legifrance.gouv.fr/WAspad/UnTexteDeJorf?numjo=CNIX0816024X
(Contribution by Meryem Marzouki, EDRI-member IRIS- France)
============================================================
11. Recommended Reading
============================================================
UK: Biometrics Assurance Group Annual Report 2007
A government expert group has warned of a 'large impact' on the National
Identity Scheme from those who cannot use fingerprinting, such as many
elderly people.
http://www.ips.gov.uk/passport/downloads/FINAL-BAG-annual-report-2007-v1_0.…
============================================================
12. Agenda
============================================================
19-20 July 2008, Stockholm, Sweden
International Association for Media and Communication Research
pre-conference - Civil Rights in Mediatized Societies: Which data privacy
against whom and how ?
http://www.iamcr.org/content/view/301/1/
23-25 July 2008, Leuven, Belgium
The 8th Privacy Enhancing Technologies Symposium (PETS 2008)
http://petsymposium.org/2008/
3-5 September 2008, Prague, Czech Republic
The Third International Conference on Legal, Security and Privacy Issues in
IT
http://www.lspi.net/
8-10 September 2008, Geneva, Switzerland
The third annual Access to Knowledge Conference (A2K3)
http://isp.law.yale.edu/
22 September 2008, Istanbul, Turkey
Workshop on Applications of Private and Anonymous Communications
http://www.alpaca-workshop.org/
24-28 September 2008, Athens, Greece
World Summit on the Knowledge Society
http://www.open-knowledge-society.org/summit.htm
11 October 2008: Europe-wide action day "Freedom not fear"
Protests, demonstrations and activities against the surveillance mania
http://wiki.vorratsdatenspeicherung.de/Freedom_Not_Fear_2008
15-17 October 2008, Strasbourg, France
30th International Data Protection and Privacy Conference
http://www.privacyconference2008.org/
20.-21 October 2008, Strasbourg, France
European Dialogue on Internet Governance (EuroDIG)
http://www.eurodig.org/
3-6 December 2008, Hyderabad, India
Third Internet Governance Forum
http://www.intgovforum.org
10-11 December 2008: Tilburg, Netherlands
Tilting perspectives on regulating technologies, Tilburg Institute for Law
and Technology, and Society, Tilburg University
http://www.tilburguniversity.nl/tilt/conference
============================================================
13. About
============================================================
EDRI-gram is a biweekly newsletter about digital civil rights in Europe.
Currently EDRI has 28 members based or with offices in 17 different
countries in Europe. European Digital Rights takes an active interest in
developments in the EU accession countries and wants to share knowledge and
awareness through the EDRI-grams.
All contributions, suggestions for content, corrections or agenda-tips are
most welcome. Errors are corrected as soon as possible and visibly on the
EDRI website.
Except where otherwise noted, this newsletter is licensed under the
Creative Commons Attribution 2.0 License. See the full text at
http://creativecommons.org/licenses/by/2.0/
Newsletter editor: Bogdan Manolea <edrigram(a)edri.org>
Information about EDRI and its members:
http://www.edri.org/
European Digital Rights needs your help in upholding digital rights in the
EU. If you wish to help us promote digital rights, please consider making a
private donation.
http://www.edri.org/about/sponsoring
- EDRI-gram subscription information
subscribe by e-mail
To: edri-news-request(a)edri.org
Subject: subscribe
You will receive an automated e-mail asking to confirm your request.
unsubscribe by e-mail
To: edri-news-request(a)edri.org
Subject: unsubscribe
- EDRI-gram in Macedonian
EDRI-gram is also available partly in Macedonian, with delay. Translations
are provided by Metamorphosis
http://www.metamorphosis.org.mk/edrigram-mk.php
- EDRI-gram in German
EDRI-gram is also available in German, with delay. Translations are provided
Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for
Internet Users
http://www.unwatched.org/
- Newsletter archive
Back issues are available at:
http://www.edri.org/edrigram
- Help
Please ask <edrigram(a)edri.org> if you have any problems with subscribing or
unsubscribing
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
1
0
[Open Manufacturing] Raw Story B; Despite FAA ban, US spy drone patrols northern border
by Paul D. Fernhout 06 Jul '18
by Paul D. Fernhout 06 Jul '18
06 Jul '18
From:
http://rawstory.com/08/news/2009/06/23/despite-faa-ban-us-spy-aircraft-patr…
"Even though the Federal Aviation Administration has banned the use of
unmanned aircraft systems (UAS), the Department of Homeland Security
currently has a US spy aircraft patrolling the northern border of New York
for the month of June. ... While unmanned aircraft systems can be armed, the
one flying over upstate New York has no weapons, according to John Stanton,
director of CPBbs Office of Air and Marine."
OK, so killer robots are now being deployed in the state I live in (NY) but
they are "unarmed". So, I should not mind? It's not like the military ever
makes mistakes about this sort of stuff, right?
"B-52 carried nuclear missiles over US by mistake: military"
http://afp.google.com/article/ALeqM5gmqA7P-MPnRJzQ5v9Xi6M5zdr9IA
"The US military said on Wednesday it was investigating an alarming security
lapse when a B-52 bomber flew the length of the country last week loaded
with six nuclear-armed cruise missiles."
Well, just be safe, I had better avoid funerals:
"U.S. Drone Strike Said to Kill 60 in Pakistan (at funeral)"
http://www.nytimes.com/2009/06/24/world/asia/24pstan.html
"An airstrike believed to have been carried out by a United States drone
killed at least 60 people at a funeral for a Taliban fighter in South
Waziristan on Tuesday, residents of the area and local news reports said.
Details of the attack, which occurred in Makeen, remained unclear, but the
reported death toll was exceptionally high. If the reports are indeed
accurate and if the attack was carried out by a drone, the strike could be
the deadliest since the United States began using the aircraft to fire
remotely guided missiles at members of the Taliban and Al Qaeda in the
tribal areas of Pakistan. The United States carried out 22 previous drone
strikes this year, as the Obama administration has intensified a policy
inherited from the Bush administration."
At least there is no mention of children being killed that time in the
supposedly just about half civilian casualties, so likely just some kids are
left without parents, which presumably is better? Nothing there to breed a
lifelong hatred of everyone in the USA, right? Of course, maybe breeding
terrorists is what it is really all about? Every great country needs a great
enemy to give meaning to its society, right? And if you can't find one, you
need to make one right? Where would Castro have been without the USA to rail
against?
http://en.wikipedia.org/wiki/War_Is_a_Force_That_Gives_Us_Meaning
"War Is a Force That Gives Us Meaning is a 2002 nonfiction book by Chris
Hedges. In the book, Hedges draws on classical literature and his
experiences as a war correspondent to argue that war seduces entire
societies, creating fictions that the public believes and relies on to
continue to support conflicts. He also describes how those who experience
war may find it exhilarating and addicting. The book was a finalist for the
National Book Critics Circle Award for Nonfiction and a Los Angeles Times
Best Book of the Year, as well as a national bestseller."
Still, if there are strikes for the each of the supposed not-civilians'
funerals, and then strikes at the funerals of those people, one can at least
see the potential for an exponential growth of funerals. Until the US
government runs out of suspected terrorists to blow up, of course. Some
numbers on that, you can presumably subtract one from the other:
http://www.census.gov/main/www/popclock.html
Just another example of post-scarcity technology being used by those
obsessed with conflicts over scarcity -- but now deployed as a "test" in my
state, within about a hundred miles of my home. Don't want those socialist
Canadians sneaking over the border for some of our health care, right?
"Inside HAARM: Late Night Brainstorming Session"
http://haarm.org/
Or bringing all that Canadian weed with them?
"How the war on drugs doesnbt work"
http://blogs.howstuffworks.com/2009/06/17/how-the-war-on-drugs-doesnt-work/
""Webve spent a trillion dollars prosecuting the war on drugs," Norm
Stamper, a former police chief of Seattle, told me. "What do we have to show
for it? Drugs are more readily available, at lower prices and higher levels
of potency. Itbs a dismal failure.""
I feel much safer already, knowing that "unarmed" drones are keeping those
evil socialist drug abusers in their place.
And, hey, the military already uses a nearby large building as a landmark
for low altitude maneuvers (or so we suppose from the regular flights in the
past), so what's some automated stuff flying around in the state too? Just
because it is unmanned, why should I be more worried?
After all, there's presumably some teenager somewhere on the planet giving
the thing orders.
http://www.democracynow.org/2009/2/6/wired_for_war_the_robotics_revolution
"He was actually a high school dropout who wanted to join the military to
make his father proud. He wanted to be a helicopter mechanic. And they said,
b Well, you failed your high school English course, so youbre not qualified
to be a mechanic. But would you like to be a drone pilot?b And he said,
b Sure.b And it turned out, because of playing on video games, he was already
good at it. He was naturally trained up. And he turned out to be so good
that they brought him back from Iraq and made him an instructor in the
training academy, even though hebs an enlisted man and hebs stillbhe was
nineteen."
Sorry, just venting. I don't know what to do about this beyond what I am
doing. There is already a border checkpoint not too far from my home which
is 75 miles south of the border, where any car can be stopped and search,
any laptop computer search or confiscated, and so on. And that one has
already caused multiple deaths and is still there:
http://www.nytimes.com/2004/10/23/nyregion/23crashes.html?oref=login&th
"But on Interstate 87 north of here there have been two major crashes on the
southbound approach to one of those checkpoints, including a pileup on Sept.
19, which killed four people as drivers failed to slow down for the lines of
stopped cars."
But they say it has been successful in catching some people with Canadian
weed. So, we're all that much safer, right?
"Remove Marijuana from Schedule I of the Controlled Substances Act"
http://opengov.ideascale.com/akira/dtd/3191-4049
Such an issue for so long... But it justifies anything...
http://en.wikipedia.org/wiki/Four_Horsemen_of_the_Infocalypse
It is indeed a race towards Utopia or Oblivion, as Bucky Fuller said,
depending on how these post-scarcity technologies are shaped.
--Paul Fernhout
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "Open Manufacturing" group.
To post to this group, send email to openmanufacturing(a)googlegroups.com
To unsubscribe from this group, send email to openmanufacturing+unsubscribe(a)googlegroups.com
For more options, visit this group at http://groups.google.com/group/openmanufacturing?hl=en
-~----------~----~----~----~------~----~------~--~---
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
1
0
06 Jul '18
Not a super new idea, but a comprehensive anonymization package from a
single source is usually more secure.
http://torrentfreak.com/researchers-anonymous-bittorrent-client-120601/
Researchers at Delft University of Technology have taken up the
ambitious challenge of creating a BitTorrent client which secures the
privacy of its users. Their Tribler client is already completely
decentralized, meaning it will still work even in the event that all
BitTorrent sites are shut down. Anonymity is the next big step in its
evolution. b Webre going to take Internet privacy to the next level,b
the lead researcher says about the upcoming release.
BitTorrent users are increasingly looking for more anonymity but right
now their options are limited.
For a monthly fee they can sign up with a VPN or proxy to hide their
IP-address. Free options with decent speeds or without other
restrictions arenbt easily available.
This lack of fast, unlimited and free anonymous BitTorrent options is
what the Tribler team at Delft University of Technology are hoping to
change. Their Tribler client has been around for more than half a
decade already, and during that time itbs developed into the only
truly decentralized BitTorrent client out there.
Unlike traditional BitTorrent clients, Tribler does not rely on
central servers or third-party sites. Users can search, download and
moderate files from within the application itself, based on pure
peer-to-peer communication. Quite a remarkable achievement, but itbs
also just the beginning for the research team.
During a talk at the Stanford University this week, Dr. Johan Pouwelse
talked about the past and the future of Tribler, announcing the
ambitious play to add make BitTorrent transfers more private.
Talking to TorrentFreak, Pouwelse explained that the idea is to add a
proxy layer where proxies act as b cachesb of content. This can hugely
improve downloads speeds, but also makes BitTorrent downloads more
private.
b Our goal is to provide all users with the download speed which today
can only be found in private BitTorrent communities, combined with the
privacy that is currently only offered by paid VPN services,b said
Pouwelse.
The Triber team has been perfecting the technology for years and itbs
expected to be released in two or three months. Initial tests show
that even with the added anonymity, people donbt have to sacrifice
speed at all. Quite the contrary.
b Experimental results have shown that the performance of the proposed
mechanism is better than that of regular BitTorrent in a large number
of scenarios. At the same time, the proxy layer can be used to offer
the users a shield of plausible deniability enhancing their privacy,b
Pouwelse told us.
With the new code Tribler says it outperforms other clients such as
uTorrent in download speeds. Ultimately, the researchers hope to
compete with on-demand video services such as YouTube.
b BitTorrent has served us well for 11 years, but modern features such
as YouTube-like easy streaming, sharing of your 1 Terabyte harddisk
and solid anonymity are needed. The BitTorrent protocol simply does
not scale to safe private sharing of 1 Terabyte, which would begin to
bridge the gap between the wealth of content on YouTube versus the
weak archive capability of BitTorrent.b
Helped by money from European tax payers, the b understaffedb team say
they are now at a point where Tribler can compete with some of the
fastest centralized services. Their P2P streaming technology is
currently under consideration to become an official Internet standard
and is being actively tested by major broadcasting companies including
the BBC.
The Tribler proxy layer is expected to be implemented this fall, but
those who want to give the current version of Tribler a spin are
welcome download it here. The client is completely Open Source and has
a version for Windows, Mac and Linux.
--
Zero State mailing list:
http://groups.google.com/group/DoctrineZero
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
1
0
[Excerpt: A third policeman who was finally rescued by colleagues - three
and a half hours after the attack began - suffered serious injuries and is said
to be in a critical condition....The attack in the southern suburb of San Juan
Ixtayopan was the latest example of mob justice by Mexicans frustrated by
state corruption and soaring crime, correspondents say. "I've never seen such
insanity, so much unbridled hate. They beat them with pipes, they kicked
them...
It was so extreme that you couldn't recognise them when they were set alight,"
an unnamed Televisa cameraman who filmed the incident told the French news
agency AFP....At one point, the victims, blood streaming down their faces,
spoke
into the cameras, confirming they were anti-terrorism agents. The gruesome
footage was given wide coverage....Mexico City's public safety chief, Marcelo
Ebrard, said back-up units were unable to get through for more than three and a
half hours because of heavy traffic.]
Last Updated: Thursday, 25 November, 2004, 10:23 GMT
http://212.58.240.132/1/hi/world/americas/4040815.stm
Mexican police hunt lynch mob
Hundreds of police and federal agents raided a Mexico City suburb on
Wednesday night after two officers were killed by an angry crowd.
More than 30 people were reportedly held after police with pictures taken in
the attack went from house to house.
They are also investigating why the two men were not rescued - despite live
TV coverage of Tuesday's events.
The two plain-clothes officers were burned alive after locals apparently
mistook them for child kidnappers.
A third policeman who was finally rescued by colleagues - three and a half
hours after the attack began - suffered serious injuries and is said to be in a
critical condition.
The attack in the southern suburb of San Juan Ixtayopan was the latest
example of mob justice by Mexicans frustrated by state corruption and
soaring crime,
correspondents say.
The men who were attacked were working on a covert drugs operation at the
time, officials said.
'Unbridled hate'
A long convoy of government vehicles sped into San Juan Ixtayopan just before
night fell on Wednesday, an official spokeswoman told the Associated Press
news agency.
The agency said 600 federal agents and hundreds of city police were involved
in the operation.
They sealed off streets and carried out house-to-house searches.
I've never seen such insanity, so much unbridled hate... It was so extreme
that you couldn't recognise them when they were set alight
TV cameraman
Mexico's Procurator General, Rafael Macedo, told Mexican television that 33
people had been detained, among them people suspected of actually carrying out
or instigating the attack, along with others who witnessed it, Efe news agency
reported.
The agents were taking photos of pupils at a primary school on Tuesday -
where two children had recently gone missing - when the attack began.
Some in the crowd thought they were kidnappers, while others were simply
angry that the alleged kidnappings had not been properly investigated.
The crowd cheered, chanted and shouted obscenities as they attacked.
Reporters reached the scene before police reinforcements, and live cameras
caught a mob beating Victor Moreles Barrera and Cristobal Martinez Martin
before
setting them alight.
"I've never seen such insanity, so much unbridled hate. They beat them with
pipes, they kicked them... It was so extreme that you couldn't recognise them
when they were set alight," an unnamed Televisa cameraman who filmed the
incident told the French news agency AFP.
At one point, the victims, blood streaming down their faces, spoke into the
cameras, confirming they were anti-terrorism agents. The gruesome footage was
given wide coverage.
Mexico City's public safety chief, Marcelo Ebrard, said back-up units were
unable to get through for more than three and a half hours because of heavy
traffic.
[Non-text portions of this message have been removed]
------------------------ Yahoo! Groups Sponsor --------------------~-->
$9.95 domain names from Yahoo!. Register anything.
http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/TySplB/TM
--------------------------------------------------------------------~->
--------------------------
Want to discuss this topic? Head on over to our discussion list,
discuss-osint(a)yahoogroups.com.
--------------------------
Brooks Isoldi, editor
bisoldi(a)intellnet.org
http://www.intellnet.org
Post message: osint(a)yahoogroups.com
Subscribe: osint-subscribe(a)yahoogroups.com
Unsubscribe: osint-unsubscribe(a)yahoogroups.com
*** FAIR USE NOTICE. This message contains copyrighted material whose use
has not been specifically authorized by the copyright owner. OSINT, as a
part of The Intelligence Network, is making it available without profit to
OSINT YahooGroups members who have expressed a prior interest in receiving
the included information in their efforts to advance the understanding of
intelligence and law enforcement organizations, their activities, methods,
techniques, human rights, civil liberties, social justice and other
intelligence related issues, for non-profit research and educational
purposes only. We believe that this constitutes a 'fair use' of the
copyrighted material as provided for in section 107 of the U.S. Copyright
Law. If you wish to use this copyrighted material for purposes of your own
that go beyond 'fair use,' you must obtain permission from the copyright
owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
Yahoo! Groups Links
<*> To visit your group on the web, go to:
http://groups.yahoo.com/group/osint/
<*> To unsubscribe from this group, send an email to:
osint-unsubscribe(a)yahoogroups.com
<*> Your use of Yahoo! Groups is subject to:
http://docs.yahoo.com/info/terms/
--- end forwarded text
--
-----------------
R. A. Hettinga <mailto: rah(a)ibuc.com>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
1
0
06 Jul '18
Not a super new idea, but a comprehensive anonymization package from a
single source is usually more secure.
http://torrentfreak.com/researchers-anonymous-bittorrent-client-120601/
Researchers at Delft University of Technology have taken up the
ambitious challenge of creating a BitTorrent client which secures the
privacy of its users. Their Tribler client is already completely
decentralized, meaning it will still work even in the event that all
BitTorrent sites are shut down. Anonymity is the next big step in its
evolution. b Webre going to take Internet privacy to the next level,b
the lead researcher says about the upcoming release.
BitTorrent users are increasingly looking for more anonymity but right
now their options are limited.
For a monthly fee they can sign up with a VPN or proxy to hide their
IP-address. Free options with decent speeds or without other
restrictions arenbt easily available.
This lack of fast, unlimited and free anonymous BitTorrent options is
what the Tribler team at Delft University of Technology are hoping to
change. Their Tribler client has been around for more than half a
decade already, and during that time itbs developed into the only
truly decentralized BitTorrent client out there.
Unlike traditional BitTorrent clients, Tribler does not rely on
central servers or third-party sites. Users can search, download and
moderate files from within the application itself, based on pure
peer-to-peer communication. Quite a remarkable achievement, but itbs
also just the beginning for the research team.
During a talk at the Stanford University this week, Dr. Johan Pouwelse
talked about the past and the future of Tribler, announcing the
ambitious play to add make BitTorrent transfers more private.
Talking to TorrentFreak, Pouwelse explained that the idea is to add a
proxy layer where proxies act as b cachesb of content. This can hugely
improve downloads speeds, but also makes BitTorrent downloads more
private.
b Our goal is to provide all users with the download speed which today
can only be found in private BitTorrent communities, combined with the
privacy that is currently only offered by paid VPN services,b said
Pouwelse.
The Triber team has been perfecting the technology for years and itbs
expected to be released in two or three months. Initial tests show
that even with the added anonymity, people donbt have to sacrifice
speed at all. Quite the contrary.
b Experimental results have shown that the performance of the proposed
mechanism is better than that of regular BitTorrent in a large number
of scenarios. At the same time, the proxy layer can be used to offer
the users a shield of plausible deniability enhancing their privacy,b
Pouwelse told us.
With the new code Tribler says it outperforms other clients such as
uTorrent in download speeds. Ultimately, the researchers hope to
compete with on-demand video services such as YouTube.
b BitTorrent has served us well for 11 years, but modern features such
as YouTube-like easy streaming, sharing of your 1 Terabyte harddisk
and solid anonymity are needed. The BitTorrent protocol simply does
not scale to safe private sharing of 1 Terabyte, which would begin to
bridge the gap between the wealth of content on YouTube versus the
weak archive capability of BitTorrent.b
Helped by money from European tax payers, the b understaffedb team say
they are now at a point where Tribler can compete with some of the
fastest centralized services. Their P2P streaming technology is
currently under consideration to become an official Internet standard
and is being actively tested by major broadcasting companies including
the BBC.
The Tribler proxy layer is expected to be implemented this fall, but
those who want to give the current version of Tribler a spin are
welcome download it here. The client is completely Open Source and has
a version for Windows, Mac and Linux.
--
Zero State mailing list:
http://groups.google.com/group/DoctrineZero
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
1
0
Re: [tor-relays] Call for discussion: turning funding into more exit relays
by Moritz Bartl 06 Jul '18
by Moritz Bartl 06 Jul '18
06 Jul '18
Hi,
What can I say that hasn't been said by others before... :)
We are in contact with reliable ISPs with endpoints in various
countries. They would be willing to cooperate on exits at these
locations. We have not yet talked about prices.
I would say we (as in Torservers.net) are in the position to run
multiple Gbit/s servers for prices at below $1/Mbit at "not your typical
ISP". In theory, we would be able to fulfill the 12.5 Gbit/s alone.
We're about to test a 10Gbit uplink with a Xeon behind it to find out
how far we can push a single server.
That said, we should discuss and come up with a good organizational
structure to reimburse people. Personally, I would only sponsor 100
Mbit/s or more (or maybe even only Gbit). I would set up a template that
asks for ISP information, so we can reject too many exits at one place
(say, a maximum of 1 Gbit/s or even one server per datacenter?).
Do you plan on reimbursing up front for a longer period, or only after?
We would likely need the money up front at least on a monthly basis.
Another option we have that might be more convenient is to decide on the
twelve/thirteen server locations up front and then ask the community to
fill the slots.
Given that there are places where you get Gbit for around or less than
$500, we could use the "extra money" to fund some slower locations. I
would very much like to see a high-bandwidth Iceland exit. The last
quote I got was 500 Euro for 200 Mbit/s (including hardware) at
Advania/ThorDC.
--
Moritz Bartl
https://www.torservers.net/
_______________________________________________
tor-relays mailing list
tor-relays(a)lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
1
0
On Sat, Apr 03, 2004 at 11:49:15PM +0100, Dave Howe wrote:
>
> If you mean he gave a false assurance of the security of a product for a
> friend - why would he do that? I can't think of any of my friends who would
> want me to tell them sofware was secure if it wasn't.
...
> I suppose that depends on his integrity and how much his reputation and
> skill would be worth to his employers if it became known that he gave false
> assurances - and it would only be a matter of time before some other
> cryptoanalyst found the fault he found and ignored.
Thanks for the opinions.
Maybe I'll explain a little bit more about the background:
As some already may have heard I'm in a legal dispute with a
german University. I wrote a dissertation in 1998, and the supervisor
announced to give a good rate. I then signed off from the job as an
assistant effectively to the date of the examination. I didn't know
that the supervisor and another professor had made a plan to implement
a security infrastrukture for the faculty and to found a company, and
that this plan included that I would do the work in the year after the
examination. When I signed off, they couldn't fulfill the promises
they gave to the faculty, and thus canceled the examination to extort
me to stay at the university and do the implementation. I refused
to pay that kind of "protection money" and thus they rejected my
dissertation with false expertises.
The advisor's expertise (who claims to be one of the world's top
cryptographers) is just a concatenation of arbitrary nonsense, and
wrong even in the basics of computer science. E.g. he claims that LZ
and MTF would effectively compress just anything. As an example for
the need to distinguish between payload and control information I said
that when phoning, not only speech is to be transmitted, but also
phone numbers and signals about termination of the connection. He
rated this as completely wrong and giving wrong information, because
phone numbers would be used with today's ISDN Telephones only. As the
reason he gave an obituary in the London Times saying that Donald
Davies had died. Or he blames me for not citing literature that hadn't
been published when I submitted the dissertation. He claims that
rate-distortion theory and shannon encoding allow to pack n+1
independant bits into a single message of n bits (even with small n or
n=1. Just try to do it.).
The second examiner said the dissertation would be completely wrong
but denied to give any explanation. I filed a lawsuit.
During the law suit, the university had informed me, that they would
never accept me to succeed in the examination. They would abuse a gap
in german examination law: courts are restricted to cancel bad or
wrong examinations, but they cannot give a positive examination
result. All they can do is to sentence the University to repeat the
examination. The University informed me that they had decided that
they do not wish me to work in science and thus I had to accept to
fail in the examination. I would have to modify my dissertation and to
include those mistakes the examiners had falsely claimed in order to
confirm that their rejection was correct. If I do that I would be
allowed to have a second try with a new dissertation and would receive
a bad grade which would keep me out of science. If I do not agree,
they announced to keep me in an endless loop of false
expertises. Every single one will take me years to sue against. I
refused that "deal".
I won both at the administration court and the appelate administration
court. The latter one found that the second examiner could never have
read the largest chapter and didn't even open the pages of the
dissertation. This was already sufficient to cancel the examination
action. The University then retracted the action to avoid being
sentenced.
Obviously, this was an extreme disgrace for the University. The
University had to give a new second expertise. If this expertise could
not confirm what the first expertise said, that the dissertation was
completely wrong, the advisor would face beeing fired, severe
compensation claims, and the ultimate disgrace.
Within less then two weeks the University managed to get a third rejecting
expertise, this time from a professor outside Germany, who is indeed
known as one of the top cryptographers and a member of the board of
directors of the IACR. I filed a new lawsuit and could easily prove
that this professor had intentionally given a wrong expertise
(obviously to protect the supervisor from legal trouble):
- He wrote the expertise in less than two days.
- The expertise is less than a page. He does not give any
reasons and claims that he cannot be expected to reason his
expertise. Reasoning is a strong requirement under german law.
- There is no "link" between the expertise and the dissertation.
He obviously didn't read it.
- He didn't find any single mistake. He just says that everything is
already known and taken from literature.
- He didn't bother to inform himself about the given problem, the
legal requirements, and the available grades. That's a strong
requirement in Germany. Obviously, if someone accepts to write an
expertise and in advance knows that he won't need grades, then he
knows that he will reject the dissertation before he has seen it.
- And he erroneously assumed that the expertise would be kept secret.
In Germany, the examinee has the right to get a copy of the
expertise and raise objections. He was not aware of this and
based his expertise on the assumption that nobody would see it.
I then raised several technical and legal objections, and cited
literature which explicetly stated that such subjects have not yet
been published.
- He then had to admit that he couldn't prove his statement that all
this was known in literature, and that he raised this claim to
reject the dissertation because he didn't like it.
- He couldn't defend against any of my technical objections and
citations. He is not even claiming that his expertise is correct,
and obviously was completely surprised by the fact that I have
access to his expertise (unlike the university where he is working,
where they keep the expertises secret).
- When I demanded to receive reasons, he denied that and stated that
he would not agree with the requirent to reason an
expertise. Instead, he had based his examination on an "international
consensus" that would free him from the need to give reasons.
He also stated that it would be illogical to require an examiner to
give reasons for his expertise, because candidates could succeed
with empty dissertations then. (???)
So this expertise is just ridiculous and won't have any chance at a
court, except that it will take me again years for the lawsuit.
I then informed the IACR's board of directors and asked them whether
an organization, where such a person can become a director can be
trusted any longer in context of security and cryptography.
Surprisingly, they were not even surprised. The fully tolerate this
and even consider this as normal. It looks as if they consider this
kind of expertise as kind of self-evident. To help a colleague and
protect him from legal trouble seems to be much more important than
giving correct and reasonable expertises.
I discussed that with several friend and colleagues, all working in
security and cryptography, and they were all shocked. Everyone would
have bed that they would kick everyone out known to have given a false
expertise. But they don't.
Very similar with the supervisor and the former second examinor:
It is more than obvious that both had given intentionally wrong
expertises and were claiming technical nonsense. But everyone seems to
silently accept this and to consider this as normal.
When preparing for the lawsuit, I read several other dissertations in
order to compare them. I found several of them to be really wrong or
to contain nothing but citations from literature. One of these
dissertations would never have been published if I hadn't asked for a
copy. It was then published around two years after the examination and
contained just citations from literature.
So what I found is fraud, extortion, false expertises.
But not a single one of those cryptographers burns.
Maybe it's a minority writing false expertises. But it's a majority
accepting that.
So my doubt is not so much about that someone found the magic way to
factorize. It's about someone intenionally selling snake-oil or
backdoors and other's keeping their mouth shut and tolerate this as
they do it here.
I have three expertises proven to be intentionally wrong. One from
someone who is known to have no clue about security. One from someone
who is known as a cryptographer and once claimed to be one of the "top
four". And one from someone who is a director of IACR. And no one
cares about. Nobody told me I'd be wrong. Nobody doubted my claims,
objections, and technical arguments. I could easily show that all of
them have intentionally given wrong expertises. Some people even
explicetely confirmed that my dissertation is correct and the
expertises are wrong. This just doesn't matter in any way.
Isn't that spooky? What kind of business is cryptography?
regards
Hadmut
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo(a)metzdowd.com
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a>
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature]
1
0