From majordomo at hk.super.net Sun Feb 1 00:00:30 1998 From: majordomo at hk.super.net (majordomo at hk.super.net) Date: Sun, 1 Feb 1998 00:00:30 -0800 (PST) Subject: THE INFORMATION YOU REQUESTED Message-ID: <>

Hi,

About three times a week I go in and delete numerous junk e-mails from my
mailbox. Recently I decided I was going try one of these MLM "scams" just to see what would happen.  I am glad I did!!  In three weeks I have brought in $11,625, and the money keeps coming in.  I urge you to try this!!  

I have removed all of of "testimonial" text from this letter to make room for my own. 
The main thing is to read and understand the "how to part".  I have discovered a few secrets to making this thing really work, the most important being VOLUME.  The more e-mails you send out the higher % of success you will have.  

Everything below this line is what was sent to me.

                          *** Print This Now For Future Reference ***
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$                       
         PRINT this letter, read the program...  THEN READ IT AGAIN !!!
This is a legitimate LEGAL money-making opportunity.  It does not require you to come 
in contact with people, do any hard work, and best of all, you never have to leave the
house, except to get the mail.  

This electronic multi-level marketing program works perfectly...100% EVERY TIME! 

             ----------------------------------------------------------------------------------
                        OVERVIEW OF THIS EXTRAORDINARY 
              ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
             ----------------------------------------------------------------------------------
The products in this program are a series of four business and financial reports costing
$5.00 each.  Each $5.00 order you receive from someone via "snail mail" will include:

  * $5.00 cash
  * The name of the report that they are ordering
  * The e-mail address of the buyer so that you can e-mail them the 
    report that they ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S IT!... the $5.00
is yours! This is the GREATEST electronic multi-level marketing business anywhere! 

                           FOLLOW THE INSTRUCTIONS EXACTLY!
    
                         ******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below.  
     
     *  For each report send $5.00 CASH, YOUR E-MAIL ADDRESS and YOUR
        RETURN POSTAL ADDRESS (in case of a problem) to the person whose 
        name appears on the list next to the report.
  
     *  When you place your order, make sure you order each of the four
        reports.  You will need all four reports so that you can save them
        to your computer and resell them.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed next 
    to each report, or their sequence on the list, in any way other that is
    instructed below in steps "a" through "d" or you will not profit from this
    program the way you should.

    a.  Look below for the listing of available reports.

    b.  Replace the name and address under REPORT #1 with yours, moving
         the one that was there down to REPORT #2.  

    c.  Move the name and address under REPORT #2 to REPORT #3.  

    d.  Move the name and address under REPORT #3 to REPORT #4.  

    e.  The name and address that was under REPORT #4 is dropped off the 
         list and is NO DOUBT on the way to the bank.

    Please make certain you copy everyone's name and address
                            ACCURATELY!!!

3.  Take this entire letter, including the modified list of names, and save 
     it to your computer.

            ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!! 
                            
          ***Order each REPORT by NUMBER and NAME***

Note 1:
ALWAYS SEND $5 CASH (and make sure that it is very well Concealed, wrap it in several layers of paper) FOR EACH REPORT. BE SURE TO REQUEST EACH SPECIFIC REPORT BY NAME AND NUMBER.

Note 2: 
ALWAYS SEND YOUR ORDER VIA FIRST CLASS  MAIL AND BE SURE TO PROVIDE YOUR E-MAIL ADDRESS
FOR QUICK DELIVERY.
_________________________________________________________________
REPORT #1 
"HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" 
ORDER REPORT #1 FROM:  

F & F ENTERPRISES
7708 ARGONAUT ST.
SEVERN, MD   21144
___________________________________________________________________
REPORT #2
"MAJOR CORPORATIONS AND MULTI-LEVEL SALES"
ORDER REPORT #2 FROM:

SSB MARKETING
641 NW 2nd AVENUE
WILLISTON, FL   32696
__________________________________________________________________
REPORT #3 
"SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:

P.D. BERNARD
13120 NE 120th LN C-202
KIRKLAND, WA 98034
________________________________________________________________
REPORT #4 
"EVALUATING MULTI-LEVEL SALES PLANS"
ORDER REPORT #4 FROM:

MVPNOVS
1206 W 212th STREET
TORRANCE, CA 90502
_____________________________________________________________________
         --------------------------------------------------------------------------------------------------
         HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
         --------------------------------------------------------------------------------------------------
Let's say you decide to start small just to see how it goes. Assume your goal is to get
10 people to participate on your first level. (Placing a lot of FREE ads on the internet
could EASILY get a better response.) Also assume that everyone else in YOUR BUILDING ORGANIZATION gets ONLY 10 downline members.  Follow this example for the STAGGERING results below.

1st level--your 10 members with $5......................................$50
2nd level--10 members from those 10 ($5 x 100).................$500
3rd level--10 members from those 100 ($5 x 1,000)...........$5,000
4th level--10 members from those 1,000 ($5 x 10,000).....$50,000
                                                   THIS TOTALS-----------> $55,550
                                          
                            *******TIPS FOR SUCCESS*******

 *  Send for the four reports IMMEDIATELY so you will have them when 
    the orders start coming in because:

 *  When you receive a $5 order, you MUST send out the requested
    product/report to comply with the U.S. Postal & Lottery Laws, Title
    18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. Code,
    also Code of Federal Regs. vol. 16, Sections 255 and 436, which state 
    that "a product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

                          *******YOUR SUCCESS GUIDELINE*******

You MUST receive 10 to 20 orders for REPORT #1!  THIS IS A MUST!  If you don't within two weeks, advertise more and send out more programs until you do.  Then, a couple of weeks later you should receive at least 100 orders for REPORT #2.  If you don't, advertise more and send out more programs until you do.  Once you have received 100, or more orders for REPORT #2, YOU CAN RELAX, because you will be on your way to the BANK! -OR-  You can DOUBLE your efforts!

REMEMBER: Every time your name is moved down on the list you are placed
                    in front of a DIFFERENT report.  You can KEEP TRACK of your
                    PROGRESS by watching which report people are ordering from
                    you. 
                                                IT'S THAT EASY!!!




    








From majordomo at hk.super.net  Sun Feb  1 00:00:30 1998
From: majordomo at hk.super.net (majordomo at hk.super.net)
Date: Sun, 1 Feb 1998 00:00:30 -0800 (PST)
Subject: THE INFORMATION YOU REQUESTED
Message-ID: <>



Hi,

About three times a week I go in and delete numerous junk e-mails from my
mailbox. Recently I decided I was going try one of these MLM "scams" just to see what would happen.  I am glad I did!!  In three weeks I have brought in $11,625, and the money keeps coming in.  I urge you to try this!!  

I have removed all of of "testimonial" text from this letter to make room for my own. 
The main thing is to read and understand the "how to part".  I have discovered a few secrets to making this thing really work, the most important being VOLUME.  The more e-mails you send out the higher % of success you will have.  

Everything below this line is what was sent to me.

                          *** Print This Now For Future Reference ***
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$                       
         PRINT this letter, read the program...  THEN READ IT AGAIN !!!
This is a legitimate LEGAL money-making opportunity.  It does not require you to come 
in contact with people, do any hard work, and best of all, you never have to leave the
house, except to get the mail.  

This electronic multi-level marketing program works perfectly...100% EVERY TIME! 

             ----------------------------------------------------------------------------------
                        OVERVIEW OF THIS EXTRAORDINARY 
              ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
             ----------------------------------------------------------------------------------
The products in this program are a series of four business and financial reports costing
$5.00 each.  Each $5.00 order you receive from someone via "snail mail" will include:

  * $5.00 cash
  * The name of the report that they are ordering
  * The e-mail address of the buyer so that you can e-mail them the 
    report that they ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S IT!... the $5.00
is yours! This is the GREATEST electronic multi-level marketing business anywhere! 

                           FOLLOW THE INSTRUCTIONS EXACTLY!
    
                         ******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below.  
     
     *  For each report send $5.00 CASH, YOUR E-MAIL ADDRESS and YOUR
        RETURN POSTAL ADDRESS (in case of a problem) to the person whose 
        name appears on the list next to the report.
  
     *  When you place your order, make sure you order each of the four
        reports.  You will need all four reports so that you can save them
        to your computer and resell them.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed next 
    to each report, or their sequence on the list, in any way other that is
    instructed below in steps "a" through "d" or you will not profit from this
    program the way you should.

    a.  Look below for the listing of available reports.

    b.  Replace the name and address under REPORT #1 with yours, moving
         the one that was there down to REPORT #2.  

    c.  Move the name and address under REPORT #2 to REPORT #3.  

    d.  Move the name and address under REPORT #3 to REPORT #4.  

    e.  The name and address that was under REPORT #4 is dropped off the 
         list and is NO DOUBT on the way to the bank.

    Please make certain you copy everyone's name and address
                            ACCURATELY!!!

3.  Take this entire letter, including the modified list of names, and save 
     it to your computer.

            ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!! 
                            
          ***Order each REPORT by NUMBER and NAME***

Note 1:
ALWAYS SEND $5 CASH (and make sure that it is very well Concealed, wrap it in several layers of paper) FOR EACH REPORT. BE SURE TO REQUEST EACH SPECIFIC REPORT BY NAME AND NUMBER.

Note 2: 
ALWAYS SEND YOUR ORDER VIA FIRST CLASS  MAIL AND BE SURE TO PROVIDE YOUR E-MAIL ADDRESS
FOR QUICK DELIVERY.
_________________________________________________________________
REPORT #1 
"HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" 
ORDER REPORT #1 FROM:  

F & F ENTERPRISES
7708 ARGONAUT ST.
SEVERN, MD   21144
___________________________________________________________________
REPORT #2
"MAJOR CORPORATIONS AND MULTI-LEVEL SALES"
ORDER REPORT #2 FROM:

SSB MARKETING
641 NW 2nd AVENUE
WILLISTON, FL   32696
__________________________________________________________________
REPORT #3 
"SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:

P.D. BERNARD
13120 NE 120th LN C-202
KIRKLAND, WA 98034
________________________________________________________________
REPORT #4 
"EVALUATING MULTI-LEVEL SALES PLANS"
ORDER REPORT #4 FROM:

MVPNOVS
1206 W 212th STREET
TORRANCE, CA 90502
_____________________________________________________________________
         --------------------------------------------------------------------------------------------------
         HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
         --------------------------------------------------------------------------------------------------
Let's say you decide to start small just to see how it goes. Assume your goal is to get
10 people to participate on your first level. (Placing a lot of FREE ads on the internet
could EASILY get a better response.) Also assume that everyone else in YOUR BUILDING ORGANIZATION gets ONLY 10 downline members.  Follow this example for the STAGGERING results below.

1st level--your 10 members with $5......................................$50
2nd level--10 members from those 10 ($5 x 100).................$500
3rd level--10 members from those 100 ($5 x 1,000)...........$5,000
4th level--10 members from those 1,000 ($5 x 10,000).....$50,000
                                                   THIS TOTALS-----------> $55,550
                                          
                            *******TIPS FOR SUCCESS*******

 *  Send for the four reports IMMEDIATELY so you will have them when 
    the orders start coming in because:

 *  When you receive a $5 order, you MUST send out the requested
    product/report to comply with the U.S. Postal & Lottery Laws, Title
    18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. Code,
    also Code of Federal Regs. vol. 16, Sections 255 and 436, which state 
    that "a product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

                          *******YOUR SUCCESS GUIDELINE*******

You MUST receive 10 to 20 orders for REPORT #1!  THIS IS A MUST!  If you don't within two weeks, advertise more and send out more programs until you do.  Then, a couple of weeks later you should receive at least 100 orders for REPORT #2.  If you don't, advertise more and send out more programs until you do.  Once you have received 100, or more orders for REPORT #2, YOU CAN RELAX, because you will be on your way to the BANK! -OR-  You can DOUBLE your efforts!

REMEMBER: Every time your name is moved down on the list you are placed
                    in front of a DIFFERENT report.  You can KEEP TRACK of your
                    PROGRESS by watching which report people are ordering from
                    you. 
                                                IT'S THAT EASY!!!




    








From eureka at eureka.abc-web.com  Sun Feb  1 01:42:07 1998
From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com)
Date: Sun, 1 Feb 1998 01:42:07 -0800 (PST)
Subject: Eureka! Sun Feb 1 '98
Message-ID: <19980201082849.16255.qmail@eureka.abc-web.com>


Welcome to Sunday's issue of Eureka!

UNFAITHFUL
Just once in a while  a brand new site comes along that will
blow your mind,  and Unfaithful  is one of them.  Brought to
you by two  of the biggest  names on the web,  Intertain and
Playgal,  it offers MORE than both sites put together, which
includes  an amazing  3,000 video feeds - yes,  thousands of
hot, streaming videos, many totally live, and some even with
audio too!  With it's FREE trial offer don't miss this site!
Unfaithful ... http://www.unfaithful.com/banner_Eureka0.html

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
CyberErotica - Where Fantasy Meets Reality!
http://www.cybererotica.com/ad/welcome.cgi/raw_4006
CyberErotica now offers a free one week membership. We
currently have 1000s of videos and many 1000s more photos
and a whole lot more. Try us FREE for a week.

DONNA'S TIGHT BEAVERS
We aren't sure how tight they are, in fact some of them look
pretty loose!  There are  asian, older, tits and more.  Easy
to find thumbnail images.  Quick loading images.  It's free!
Donna's Tight ..... http://www.megaservices.com/adult/donna/

THE ROSEGARDEN
What can we say about this one?  There are some free images,
they load pretty quick.  Blowjobs,  teens, amateurs and even
bikini pictures.  The nudie pictures are pretty good.  Yeah!
The Rose ..... http://www.undergroundnet.com/rosegarden.html

QUICK LIXXX  
We have  some great  facial pictures here!  Women with juice
on their faces, chins and  tounges.  Just where you like it!
Take your best shot and surf over to this website.  Load it!
Quick Lixxx ......... http://xxx.shots.com/~babyoil/sb1.html

ELFY'S SMUT SHACK
This website took some time to load, but once it did I found
some of the hottest  looking women on the internet!  See the
woman in the red dress. Lots of hot images.  Worth the wait.
Elfy's Smut Shack ........... http://www.elfyssmutshack.com/

BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE
Now adult surfers have our very own search engine,  directly
designed to  only list adult sites,  and so run fast because
all other  types of site  are ignored.  Check it out  today!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Hardcore -----------------------> http://204.244.215.7/anal/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY

---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
XXXStories.com: The largest free  erotic  story  site on the
net. Over 400 hot sex stories  on such topics as wife sluts,
virgins, group sex and more...... http://www.xxxstories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?010
Pic  2 --------------------------> http://137.39.63.229/?011
Pic  3 --------------------------> http://137.39.63.229/?012
Pic  4 --------------------------> http://137.39.63.229/?013
Pic  5 --------------------------> http://137.39.63.229/?014
Pic  6 --------------------------> http://137.39.63.229/?015
Pic  7 --------------------------> http://137.39.63.229/?016
Pic  8 --------------------------> http://137.39.63.229/?017
Pic  9 --------------------------> http://137.39.63.229/?018
Pic 10 --------------------------> http://137.39.63.229/?019

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================





From 16632040 at msn.com  Sun Feb  1 02:23:24 1998
From: 16632040 at msn.com (16632040 at msn.com)
Date: Sun, 1 Feb 1998 02:23:24 -0800 (PST)
Subject: ALERT - Internet Fraud and Spying
Message-ID: 



Webmaster.... This publication has been a best seller.

I thought you would like to see it.


ARE YOU BEING INVESTIGATED ?



Learn the Internet tools that are used to investigate you, your 

friends, neighbors, enemies, Employees or anyone else!  My 

huge report "SNOOPING THE INTERNET" of Internet sites 

will give you...


* Thousands of Internet locations to look up people, credit, 

Social security, current or past employment, Driving records, 

medical information, addresses, phone numbers, Maps to city 

locations...



Every day the media (television, radio, and newspapers) are 

full of stories about PERSONAL INFORMATION being used, 

traded, and sold over the Internet... usually without your 

permission or knowledge. 


With my report I show you HOW IT'S DONE!!!
	

It's amazing..

	

Locate a debtor that is hiding, or get help in finding hidden 

assets.



*   Find that old romantic interest.


*   Find e-mail, telephone or address information on just about 

     anyone! Unlisted phone numbers can often be found 

     through some of these sites!!



Perhaps you're working on a family "tree" or history. The 

Internet turns what once was years of work into hours of 

DISCOVERY & INFORMATION.




      Check birth, death, adoption or social security records.


MILITARY

      Check service records of Army, Navy, Air Force or Marine 

      Corps. Find out who's been telling the truth and who's been 

      lying. Perhaps you can uncover the next lying politician!!!
 


FELLOW EMPLOYEES;


* Find out if your fellow employee was jailed on sex charges, 

or has other "skeletons" in the closet!!



PERFORM BACKGROUND CHECKS;
  
   Check credit, driving or criminal records, Verify income or 

   educational claims, Find out Military history and discipline, 

   previous political affiliations, etc.


YOUR KID'S FRIENDS;


   Find out the background of your children's friends & dates.


WHAT'S THE LAW? STOP GUESSING!!


* Look up laws, direct from law libraries around the world. Is 

  that new business plan legal?? 


NEW JOB?  NEW TOWN?  NEW LIFE?


   Employment ads from around the world can be found on the 

   Internet. Get a new job and disappear!



The Internet can tell you just about ANYTHING, if you know 

WHERE to look. 



BONUS REPORT!!!!


Check your credit report and use the Internet to force credit 

bureaus to remove derogatory information. My special

BONUS REPORT included as part of the "SNOOPING THE 

INTERNET" collection reveals all sorts of credit tricks, legal

and for "information purposes only" some of the ILLEGAL 

tricks.


Research YOURSELF first!


What you find will scare you.


If you believe that the information that is compiled on you 

should be as easily available to you as it is to those who 

compile it, then. . .

You want to order the SNOOPING 

THE INTERNET report.


This huge report is WHERE YOU START! Once you 

locate these FREE private, college and government 

web sites, you'll find even MORE links to information 

search engines!

YOU CAN FIND OUT ANYTHING ABOUT ANYBODY 

ANY TIME using the Internet!!!!

SEVERAL WAYS TO ORDER !!!


  1) WE TAKE:  AMERICAN EXPRESS OR
    
                          VISA <> MASTERCARD
 
        TYPE OF CARD  AMX / VISA / MC??_______________

        EXPIRATION DATE   ___________________________
 
        NAME ON CREDIT CARD________________________
 
       CREDIT CARD #________________________________
 
        BILLING ADDRESS ____________________________
 
        CITY_________________________________________
 
        STATE________________ZIP_____________________
 
        PHONE INCLUDE AREA CODE___________________
 
        WE WILL BILL 39.95 to your account

        SHIPPING  COST OF 3.00 FIRST CLASS MAIL

        SHIPPING COST OF  15.00  24 HOUR EXPRESS MAIL
 
        SALES TAX (2.90) added to CA residents 
 
  >>> Send $39.95 ($42.85 in CA) cash, check or money

order to:

  >>> CASINO CHICO
  >>> Background Investigations Division
  >>> 311 Nord Ave.
  >>> P.O. Box 4331
  >>> Chico, CA 95927-4331


  2) Send the same above requested credit card 

information to above address. 


   3) Fax the same above credit card information to 530-895-

8470

   4) Call phone # 530-876-4285.  This is a 24 hour phone 

number to place a CREDIT CARD order.

   5) FAX A COPY of your signed check to 530-895-8470.

       This is an EXCELLENT way to order without a credit card!

    
 I will RUSH back to you SAME DAY my "SNOOPING 

THE INTERNET" report!

Log on to the Internet and in moments you will fully 

understand...

 What information is available -- and exact Internet 

site to get there!

2nd BONUS!!!!


Along with the report we will send a 3 1/2" disk with 

sites already "HOT LINKED". No need to type in 

those addresses. Simply click on the URL address 

and "PRESTO" you are at the web site!!! 


Personal ads, logs of personal e-mail, mention of 

individuals anywhere on the Internet are "yours for the 

taking" with this report.


Lists of resources to find even more information 

(private Investigation companies, etc..) 


Order surveillance equipment (if legal in your state)
  

Send anonymous e-mail
   
Research companies 

Research technology

Locate military records

 
FIND INFORMATION ON CRIMINALS 

   Find Wanted fugitives - perhaps even a close 

associate!

ABSOLUTE SATISFACTION GUARANTEED:

Your satisfaction is 100% guaranteed, just return the material for
 a full refund within 30 days if you aren't 100% satisfied.

This offer is from a private company. Casino Chico / R Jon Scott Hall
 publications is not associated with or endorsed by, AOL,
MSN, or any other Internet service provider.

Copyright 1998  All Rights Reserved

R Jon Scott Hall Publications. 











From bpi at ns9.internetconnect.net  Sun Feb  1 03:26:14 1998
From: bpi at ns9.internetconnect.net (bpi at ns9.internetconnect.net)
Date: Sun, 1 Feb 1998 03:26:14 -0800 (PST)
Subject: Being a Better Educator and Parent
Message-ID: <>



Dear educator:

Today, more than ever, we need innovative new solutions to 
educational problems. 

        "Kevin Kirchman's book Aspirations is an answer 
        to education questions such as 'How do we teach 
        students to think for themselves, fulfill their 
        potential, be creative, gain self esteem, and be 
        ready for this productive world?'

        "His book is a must for all educators from pre-school
        through graduate school. I wish his book had been
        available during my 42 year teaching career."
                 Norma Silver
                 Retired teacher, Fort Lee, NJ

Introducing,
         Aspirations: The Rational Foundations of Achievement. 

The reason it is possible to have an entirely new perspective on
educational issues is because the theory behind education, called
epistemology, or the theory of knowledge, has _not_ been an empirical
science.

Epistemology is to education what physics is to engineering--
but until the basis was discovered for _principles_ of understanding,
there could be no science, and no applications that would radically
transform educational practices. 

That is until now.

        "If knowledge of the humanities is subjective, that is,  only
        valid  for the person who holds it, of what value is
        education?

        "Knowledge is not subjective. There are some conceptual 
        models that are better--more accurate and enlightening--
        than others."
                Aspirations

Aspirations will show you why, and teach you precisely how to tell the
difference. 

        "[Aspirations] lays out the foundations of clear,  critical
        thinking, that can help us to better understand ourselves,
        others, and the world around us. In the final analysis, we are
        all decision makers. Don't make many more important decisions
        before you read and grasp Aspirations."
                Frank L. David
                        Co-Principal, Business Learning Centers
                        Murrieta, CA

Perhaps the last earthly frontier, the mind, has been finally
penetrated by this wonderful new book. Aspirations won't give
you old ideas about the mind that you've seen before. It's 
radically new.

Aspirations shows how, because of an old philosophical problem, 
educators are unwittingly discouraging idea forming habits that 
occur through the mental process of induction, or generalization. The
book shows how these inductive concepts are the basis of all abilities
and character. 

Deterring concept formation has the effects of hindering 
individuality, stifling general competency and causing people to be
more dependent upon the ideas formed by others (being less able to
form them themselves). The book presents a new solution to this
dilemma which describes the mental events that occur during concept
formation that can be practiced and made habit.

Aspirations makes it clear that if you are less able to form 
concepts of your own, you necessarily have to borrow those formed by
others. This discourages individuality, creativity, and self-reliance.
It is also the basis for a host of psychological problems, from
prejudice and intolerance to low self-esteem. 

Set within the context of human intellectual history, Aspirations stands out as a unique and controversial contribution to our understanding of ourselves. 

        Fascinating reading. A journey deep into the corners of the
        mind and down the paths of civilization�s  philosophical
        development. 

The author of Aspirations, Kevin Kirchman, a Cornell University
educated Artificial Intelligence scientist, lecturer and businessman,
has actually utilized his new understanding of innovation to develop
original perspectives on

        * deduction, or what reasoning is
        * induction, the basis of all innovation and creativity
        * character formation

and these new ideas genuinely will aid you not only in teaching
better mental habits, but in improving your own. 

        "[Aspirations] is a self-motivational book for  intelligent
        people."
                Stan Irwin
                        The Producer of the Tonight Show
                        with Johnny Carson for 15 years

Rarely in human history is a book produced which has as important
implications. Rarely is a book offered which gives us such hope and
inspiration.

Aspirations will soon be promoted nationally by Rogers & Cowan,
America�s largest public relations firm. Be the first to learn and
apply these revolutionary new insights. 

                 Table of Contents:
        1    Introduction
        2    The Problem -- Why Educational Philosophy is
                 Psychologically Debilitating
        3    Concepts -- The Key to Understanding the Mind
        4    Descriptive Concepts -- The Foundation of Clear
                 Thinking
        5    Creating Ideas -- Concept Formation is Induction
        6    Character -- The Conceptual Origins of Personal
                 Qualities
        7   Motivation -- A Theoretical Defense of the
                 Principles of Achievement
        8   Reasoning -- A New and Practical Overview
        9   Goal Setting and Decision Making -- Giving
                 Yourself a Purpose
       10   Deduction -- The Connection Between Logic and
                 Common Sense
       11   Reasoning Well -- Applying the New Science of Logic
       12   The Principles of Induction -- New Solutions
                 to a Classical Challenge
       13   Conceptual Modeling -- Coming Up with the Best
                 Concepts
       14   Teaching Induction -- Overcoming the Fear of
                 Abstractions
       15   Philosophical Clarifications -- Understanding
                 the Breakthrough and Replacing Outdated
                 Technology
       16   The New Science of Logic -- Clearing the Way for a
                 Revolution in Rationality
       17   Historical Background and Philosophical Comparison --
                 Putting the Conceptual Model Theory Into
                 Perspective

If, after receiving "Aspirations", you are not completely
satisfied, return it for a prompt and full refund.

Only $16.95 plus $3.50 postage and handling
For orders of 2 or more, p&h is free. 

ORDER Aspirations NOW by calling USA 

                 International	1 310 289-2394,
                 or faxing to 	1 310 854-1840
any time with your credit card details.

Or, Mail Check, Money Order, or Credit Card details to:
        Breakthrough Publishing, Inc.
        291 S. La Cienega Blvd., Suite 107
        Beverly Hills, CA 90211

YES! __ I would like ____ copies of Aspirations * $16.95 = __________
           + $3.50
        = __________

Name ________________________________________
Title __________________
Organization_________________________________
Mailing Addr ________________________________
_____________________________________________
City ___________________ State ______________
Post Code ____________
Country ___________________________

VISA ___   MasterCard ___   American Express ___ Discovery ___

Card #	__ __ __ __   __ __ __ __   
   __ __ __ __   __ __ __ __ 

Expiration Date __________

Signature _________________________________






From bpi at ns9.internetconnect.net  Sun Feb  1 03:26:14 1998
From: bpi at ns9.internetconnect.net (bpi at ns9.internetconnect.net)
Date: Sun, 1 Feb 1998 03:26:14 -0800 (PST)
Subject: Being a Better Educator and Parent
Message-ID: <>



Dear educator:

Today, more than ever, we need innovative new solutions to 
educational problems. 

        "Kevin Kirchman's book Aspirations is an answer 
        to education questions such as 'How do we teach 
        students to think for themselves, fulfill their 
        potential, be creative, gain self esteem, and be 
        ready for this productive world?'

        "His book is a must for all educators from pre-school
        through graduate school. I wish his book had been
        available during my 42 year teaching career."
                 Norma Silver
                 Retired teacher, Fort Lee, NJ

Introducing,
         Aspirations: The Rational Foundations of Achievement. 

The reason it is possible to have an entirely new perspective on
educational issues is because the theory behind education, called
epistemology, or the theory of knowledge, has _not_ been an empirical
science.

Epistemology is to education what physics is to engineering--
but until the basis was discovered for _principles_ of understanding,
there could be no science, and no applications that would radically
transform educational practices. 

That is until now.

        "If knowledge of the humanities is subjective, that is,  only
        valid  for the person who holds it, of what value is
        education?

        "Knowledge is not subjective. There are some conceptual 
        models that are better--more accurate and enlightening--
        than others."
                Aspirations

Aspirations will show you why, and teach you precisely how to tell the
difference. 

        "[Aspirations] lays out the foundations of clear,  critical
        thinking, that can help us to better understand ourselves,
        others, and the world around us. In the final analysis, we are
        all decision makers. Don't make many more important decisions
        before you read and grasp Aspirations."
                Frank L. David
                        Co-Principal, Business Learning Centers
                        Murrieta, CA

Perhaps the last earthly frontier, the mind, has been finally
penetrated by this wonderful new book. Aspirations won't give
you old ideas about the mind that you've seen before. It's 
radically new.

Aspirations shows how, because of an old philosophical problem, 
educators are unwittingly discouraging idea forming habits that 
occur through the mental process of induction, or generalization. The
book shows how these inductive concepts are the basis of all abilities
and character. 

Deterring concept formation has the effects of hindering 
individuality, stifling general competency and causing people to be
more dependent upon the ideas formed by others (being less able to
form them themselves). The book presents a new solution to this
dilemma which describes the mental events that occur during concept
formation that can be practiced and made habit.

Aspirations makes it clear that if you are less able to form 
concepts of your own, you necessarily have to borrow those formed by
others. This discourages individuality, creativity, and self-reliance.
It is also the basis for a host of psychological problems, from
prejudice and intolerance to low self-esteem. 

Set within the context of human intellectual history, Aspirations stands out as a unique and controversial contribution to our understanding of ourselves. 

        Fascinating reading. A journey deep into the corners of the
        mind and down the paths of civilization�s  philosophical
        development. 

The author of Aspirations, Kevin Kirchman, a Cornell University
educated Artificial Intelligence scientist, lecturer and businessman,
has actually utilized his new understanding of innovation to develop
original perspectives on

        * deduction, or what reasoning is
        * induction, the basis of all innovation and creativity
        * character formation

and these new ideas genuinely will aid you not only in teaching
better mental habits, but in improving your own. 

        "[Aspirations] is a self-motivational book for  intelligent
        people."
                Stan Irwin
                        The Producer of the Tonight Show
                        with Johnny Carson for 15 years

Rarely in human history is a book produced which has as important
implications. Rarely is a book offered which gives us such hope and
inspiration.

Aspirations will soon be promoted nationally by Rogers & Cowan,
America�s largest public relations firm. Be the first to learn and
apply these revolutionary new insights. 

                 Table of Contents:
        1    Introduction
        2    The Problem -- Why Educational Philosophy is
                 Psychologically Debilitating
        3    Concepts -- The Key to Understanding the Mind
        4    Descriptive Concepts -- The Foundation of Clear
                 Thinking
        5    Creating Ideas -- Concept Formation is Induction
        6    Character -- The Conceptual Origins of Personal
                 Qualities
        7   Motivation -- A Theoretical Defense of the
                 Principles of Achievement
        8   Reasoning -- A New and Practical Overview
        9   Goal Setting and Decision Making -- Giving
                 Yourself a Purpose
       10   Deduction -- The Connection Between Logic and
                 Common Sense
       11   Reasoning Well -- Applying the New Science of Logic
       12   The Principles of Induction -- New Solutions
                 to a Classical Challenge
       13   Conceptual Modeling -- Coming Up with the Best
                 Concepts
       14   Teaching Induction -- Overcoming the Fear of
                 Abstractions
       15   Philosophical Clarifications -- Understanding
                 the Breakthrough and Replacing Outdated
                 Technology
       16   The New Science of Logic -- Clearing the Way for a
                 Revolution in Rationality
       17   Historical Background and Philosophical Comparison --
                 Putting the Conceptual Model Theory Into
                 Perspective

If, after receiving "Aspirations", you are not completely
satisfied, return it for a prompt and full refund.

Only $16.95 plus $3.50 postage and handling
For orders of 2 or more, p&h is free. 

ORDER Aspirations NOW by calling USA 

                 International	1 310 289-2394,
                 or faxing to 	1 310 854-1840
any time with your credit card details.

Or, Mail Check, Money Order, or Credit Card details to:
        Breakthrough Publishing, Inc.
        291 S. La Cienega Blvd., Suite 107
        Beverly Hills, CA 90211

YES! __ I would like ____ copies of Aspirations * $16.95 = __________
           + $3.50
        = __________

Name ________________________________________
Title __________________
Organization_________________________________
Mailing Addr ________________________________
_____________________________________________
City ___________________ State ______________
Post Code ____________
Country ___________________________

VISA ___   MasterCard ___   American Express ___ Discovery ___

Card #	__ __ __ __   __ __ __ __   
   __ __ __ __   __ __ __ __ 

Expiration Date __________

Signature _________________________________






From moisoqa at prodigy.com  Sun Feb  1 07:05:23 1998
From: moisoqa at prodigy.com (moisoqa at prodigy.com)
Date: Sun, 1 Feb 1998 07:05:23 -0800 (PST)
Subject: "Stock News ALERT" UNFC expect $50 million increase in revenues in 98'.
Message-ID: <199802013862HAA16945@post.at>


REMINGTON-HALL CAPITALIZES ON RESURGENT REAL ESTATE MARKET Company expects to acquire $50 million in assets by mid-1998

DALLAS -- UNFC ), a diversified real estate investment firm formerly known as Universal Fuels Company, is quietly acquiring over $50 million in previously undervalued, undercapitalized or mismanaged commercial properties and making this new major player one of the best moderate-risk real estate investments in 1998. Founded in 1975 as Universal Fuels, the company provided uranium to the world as an alternative fuel, but as uranium became less used as a nuclear fuel source than other more economical and useful materials, Universal Fuels' stock declined almost to extinction over several years. The stock price was less than 1� last year. Four months ago officials from Camden-Townwest, a privately held real estate investment firm, approached Universal Fuels former management about converting Universal Fuels into a publicly traded real estate conglomerate. Camden-Townwest, founded in 1994, grew from $19,000 in cash to $3 million in assets in three years without seeking any outside capital. Since the change in management and corporate mission last October, UNFC has seen its stock value increase by over 800%. Remington-Hall is now making its move to increase assets at a tremendous rate. By mid-year management expects to acquire in excess of $50 Million in office buildings and multi-family properties at a significant discount to their market value. "We have been referred to as 'Cat Burglars of Real Estate'," said Douglas Fonteno, president & chief executive officer, "and that's a title we plan to keep." Douglas T Fonteno previously Chairman of Camden-Townwest and formerly with Merrill Lynch, is Remington-Hall's new President & Chief Executive Officer. Larry Hood, formerly Chief Operating Officer of Pizza Inn and Chief Financial Officer of Reliance Mortgage Company, is Remington-Hall's Chief Financial Officer, giving the new company immediate and substantial financial integrity. Wade Hyde, previously public relations and investor relations executive for Blockbuster Video and FoxMeyer Corporation, is Vice President of Marketing & Public Relations. Currently Remington-Hall is seeking to be listed on the Pacific Stock Exchange and the Nasdaq National Market. The company anticipates announcing over $10 million in newly acquired assets by the end of January. Name: Remington-Hall Capital Corporation ( formerly Universal Fuels) Symbol: Nasdaq: UNFC Mission: To aggressively acquire steeply undervalued real estate properties due to previous mismanagement or undercapitalization. Management: Senior executives with diverse experiences, including: Fortune 500 corporations, leading stock brokerage firms, real estate companies and national marketing. Goals: To increase assets to $10M by January 98 and $50M by mid-year Address: 1401 Elm St., Ste. 1818, Dallas, TX 75202-2925 Internet: www.remington-hall.com E-Mail: InvestorRelations at remington-hall.com Quote: Yahoo! Remington-Hall Except for the historical information contained on the website, the matters set forth inthese documents are forward-looking statements within the meaning of the "safe harbour" provisions of the Private Securities Litigation Reform Act of 1995. These forward-looking statements are subject to risk and uncertainties that may cause actual results to differ materially. These forward-looking statements speak only as of the date hereof and the Company disclaims any intent or obligation to update these forward-looking This is not a solicitation to buy or sell securities and does not purport to give investment recommendations. The company featured in this advertorial pay for promotional services by issuing securities, options to purchase securities and/or cash. The information contained here has been carefully compiled and believed to be reliable, but its accuracy is not guaranteed.

From jaqui5535 at juno.com Sun Feb 1 07:18:07 1998 From: jaqui5535 at juno.com (jaqui5535 at juno.com) Date: Sun, 1 Feb 1998 07:18:07 -0800 (PST) Subject: E-ALERT: URGENT BUY RECOMMENDATION Message-ID: <> Cronus Corporation Symbol: C R O N Recent Price: 1/2 ($.50/share) Wall Street analysis from Harvard Equity Research has issued a STRONG BUY recommendation on CRON stock. Charles Blitzer was quoted as predicting a $1.25 to $1.50 price near-term with a "thrust into the $3-$4 range sometime in 1998". Harvard Equity Research's last recommendation in October, AATK, went from $3 1/2 to $9 in ten trading days! Harvard Equity Research is so confident of their projections that they are offering their subscribers a money-back guarantee on their subscription if CRON doesn't at least double within the next year. To reiterate: an IMMEDIATE & STRONG BUY recommendation on CRON. For further information go to: http://quote.yahoo.com/ or send a SASE, for a free issue of Harvard Equity Research's latest top-rated newsletter, to H.E.R., P.O. Box 96159, Boston, MA 01742 ------------------- From jaqui5535 at juno.com Sun Feb 1 07:18:07 1998 From: jaqui5535 at juno.com (jaqui5535 at juno.com) Date: Sun, 1 Feb 1998 07:18:07 -0800 (PST) Subject: E-ALERT: URGENT BUY RECOMMENDATION Message-ID: <> Cronus Corporation Symbol: C R O N Recent Price: 1/2 ($.50/share) Wall Street analysis from Harvard Equity Research has issued a STRONG BUY recommendation on CRON stock. Charles Blitzer was quoted as predicting a $1.25 to $1.50 price near-term with a "thrust into the $3-$4 range sometime in 1998". Harvard Equity Research's last recommendation in October, AATK, went from $3 1/2 to $9 in ten trading days! Harvard Equity Research is so confident of their projections that they are offering their subscribers a money-back guarantee on their subscription if CRON doesn't at least double within the next year. To reiterate: an IMMEDIATE & STRONG BUY recommendation on CRON. For further information go to: http://quote.yahoo.com/ or send a SASE, for a free issue of Harvard Equity Research's latest top-rated newsletter, to H.E.R., P.O. Box 96159, Boston, MA 01742 ------------------- From 10666148 at 08855.com Sun Feb 1 12:18:43 1998 From: 10666148 at 08855.com (10666148 at 08855.com) Date: Sun, 1 Feb 1998 12:18:43 -0800 (PST) Subject: WANT TO KNOW A SECRET?? Message-ID: <> STOP EVERYTHING! WE PAY FOR YOU TO JOIN ! THE BUSINESS OPPORTUNITY: No other organization has our technology! Our products are needed in almost every home and business. They are currently in less than 2% of U.S. homes and very few businesses. Significant commissions (over 40%) can be made from retailing alone. THE MLM OPPORTUNITY: Your sponsor pays your $163 startup costs. You receive 3 high-tech products worth $1200 with zero money down. You sponsor one person, we approve a $1,200 check for you, you pay their $163 startup costs, and start receiving large commissions, and up to 42% residuals from your downline. PLUS - Well show you how to get qualified prospects eager to learn your money-making secret! Bill Gates said that the secret to his success was being in the right place at the right time. For our company (and you), this is it! CALL THE FOLLOWING TOLL FREE NUMBER. IT MAY CHANGE YOUR LIFE!!! Three minute recorded message: 1-800-481-3181 There are also live Conference Calls As soon as youre convinced about the great company, the state of the art products, the enormous market potential, and the huge MLM opportunity, 1. Dial Fax on Demand (409-988-0413) (press 9 during greeting message, then *, then 1) for additional information, or 2. Leave a voice message (409-988-0413), or, if lines are busy, 3. Respond by e-mail to alphaenterprises at yahoo.com. From 10666148 at 08855.com Sun Feb 1 12:18:43 1998 From: 10666148 at 08855.com (10666148 at 08855.com) Date: Sun, 1 Feb 1998 12:18:43 -0800 (PST) Subject: WANT TO KNOW A SECRET?? Message-ID: <> STOP EVERYTHING! WE PAY FOR YOU TO JOIN ! THE BUSINESS OPPORTUNITY: No other organization has our technology! Our products are needed in almost every home and business. They are currently in less than 2% of U.S. homes and very few businesses. Significant commissions (over 40%) can be made from retailing alone. THE MLM OPPORTUNITY: Your sponsor pays your $163 startup costs. You receive 3 high-tech products worth $1200 with zero money down. You sponsor one person, we approve a $1,200 check for you, you pay their $163 startup costs, and start receiving large commissions, and up to 42% residuals from your downline. PLUS - Well show you how to get qualified prospects eager to learn your money-making secret! Bill Gates said that the secret to his success was being in the right place at the right time. For our company (and you), this is it! CALL THE FOLLOWING TOLL FREE NUMBER. IT MAY CHANGE YOUR LIFE!!! Three minute recorded message: 1-800-481-3181 There are also live Conference Calls As soon as youre convinced about the great company, the state of the art products, the enormous market potential, and the huge MLM opportunity, 1. Dial Fax on Demand (409-988-0413) (press 9 during greeting message, then *, then 1) for additional information, or 2. Leave a voice message (409-988-0413), or, if lines are busy, 3. Respond by e-mail to alphaenterprises at yahoo.com. From minow at apple.com Sun Feb 1 00:45:44 1998 From: minow at apple.com (Martin Minow) Date: Sun, 1 Feb 1998 16:45:44 +0800 Subject: RIP, Carl Gorman, Code Talker In-Reply-To: Message-ID: > >- aside from the NSA sucking up everything in sight relating to >languages, doesn't Chomsky's theoretical 'Universal Syntax' (all >human languages have an identical fundamental syntax) negate the >effectiveness of the Code-Talker approach in the long run? > Not really; at its core, Chomsky's theory is a claim that every human can learn any human language -- something that 2-year old infants prove every day. I.e., nothing in language is specific to any particular human social or racial group: the differences are learned. There is a fair body of research that indicates that, after (roughly) puberty, humans do not learn foreign languages in the same way that infants learn their first language; but rather overlay the new language on top of their existing language. >- on the other hand, the lovely ambiguities of natural language >would seem to be capable of effectively obscuring the meaning of >the message even if the plaintext were revealed. The code talkers used a variety of puns and allegorical metaphors to hide the underlying meaning from someone who could translate Navaho but lacked the overall shared culture of the Navaho sailors. During the 1940's, only a handful of non-Navaho (generally linguists) were fluent in the language (probably less than two dozen). Incidently, in a recent episode of the South Bronx tv series, a crime was solved because a black policeman was fluent in Japanese. Martin Minow minow at apple.com From nobody at REPLAY.COM Sun Feb 1 04:25:51 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 1 Feb 1998 20:25:51 +0800 Subject: Zero-knowledge commit Message-ID: <199802011215.NAA10211@basement.replay.com> Timmy C[unt] May carries a turd in his wallet for identification purposes. __| \ / |__ _ o ___\o \o | o/ o/___ o _ Timmy C[unt] May /\ /) | ( \ /o\ / ) | (\ /\ ___|_\______ _____/_|__ From TheSluth at kokomocowboy.com Sun Feb 1 21:22:25 1998 From: TheSluth at kokomocowboy.com (TheSluth at kokomocowboy.com) Date: Sun, 1 Feb 1998 21:22:25 -0800 (PST) Subject: Beat The IRS & PAY-NO-MORE Message-ID: <99235798_35664352> ***************************************************************** - PLEASE IGNORE THE 1st MESSAGE IF YOU LIVE OUTSIDE THE USA - BEAT-THE-IRS & PAY-NO-MORE -------------------------- Our PACKAGE, (Beat The IRS & PAY-NO-MORE) will teach you EXACTLY how to EASILY: STOP FEDERAL Income Tax Withholding, STOP April filing of 1040 Form, & STOP THE IRS EXTORTION PERMANENTLY ---------------------------------- The IRS Federal Income System is based on VOLUNTARY COMPLIANCE... We will teach you how to legally VOLUNTEER OUT OF THE SYSTEM! - PLEASE READ - *************** The Founding Fathers of The United States of America wrote our Constitution, Bill of Rights and Declaration of Indepen- dence to set us FREE from TYRANNY and TAXATION. Our Founding Fathers did not want our government to make you pay INCOME TAXES. If you study the Constitution, and the IRS tax laws, you will find that paying income taxes is not mandatory. It is based on a voluntary system. The LAWS and the SUPREME COURT and the IRS have ruled that Federal income taxes are VOLUNTARY and FILING A RETURN IS NOT REQUIRED in many cases if you properly VOLUNTEER OUT OF THE SYSTEM AND THEIR JURISDICTION.. "Our tax system is based on individual self assessment and VOLUNTARY COMPLIANCE." - M. Caplin, IRS Commissioner "OUR TAX SYSTEM IS BASED UPON VOLUNTARY ASSESSMENT AND PAYMENT AND NOT ON DISTRAINT" -Supreme Court Ruling, Flora v. U.S., 362 U.S. 145 It is very EASY and LEGAL to volunteer out of the IRS tax system, but you must know the EXACT PROCESS REQUIRED to do this simple task. If you don't know the correct way to do this, you could be FINED $500 by the IRS. If you will spend JUST $35.00 we will send you our report: "BEAT THE IRS & PAY-NO-MORE". Our report will SET YOU FREE LEGALLY! After reading our wonderful report and filling out a simple form you will be FREE from the IRS BANDITS and the graduated Federal INCOME TAX ...FOREVER. Our report is guaranteed to STOP FEDERAL INCOME TAX WITHHOLDING from your pay check!!! You will never have to pay Federal income taxes again. You will never have to file a 1040 Form again. You will never have to keep personal expense or income records. You will be completely FREE from the Federal income tax and the IRS. We send you absolute PROOF. After reading our report and following simple instructions your pay check will be free from those nasty income tax deductions. This will put an extra $20 to $200 in your pocket every week!. ISN'T IT ABOUT TIME YOU GET PAID WHAT YOUR WORTH? Now is the time to fight back. Please read on!!! ***************************************************************** Your Success is ABSOLUTELY unconditionally GUARANTEED if your were BORN in and LIVE in one of the 50 Republic States (((((( & DON'T WORK FOR A GOVERNMENT AGENCY.))))) Our methods work every time for everybody. They are 100% legal, honest and ethical. We will pay anybody $1,000 if they can prove our method is ILLEGAL, DISHONEST or UNETHICAL!!! Our method has worked for every person who has ever bought this package without exception. NOBODY HAS EVER FAILED OR ASKED FOR A REFUND!!! - Our PACKAGE includes a LIFETIME, FREE, 50% PAY OUT Dealership, PLUS ALL the marketing material master copies you will ever need. YOUR PAYCHECKS WILL BE 10% TO 30% BIGGER EVERY WEEK, within 2 weeks of filing the proper forms and affidavit. WHY NOT GIVE YOURSELF A RAISE THIS YEAR BY EXERCISING AND ENJOYING MORE OF YOUR CONSTITUTIONAL RIGHTS. SET YOURSELF FREE! Your package includes unlimited FREE phone consultations, a copy of the U.S. Constitution, The Bill of Rights, forms, affidavits, and much, much more! TO ORDER BY MAIL: Send a $35 Money Order to: LINKO --Dept. #1-BEAT-IRS, POB 66781 -- Phoenix, AZ 85082 To order by phone and Fax Check call our office at (602)267-9688 between the hours of 2 and 11pm Mountain Standard Time. You may also call just to ask questions. Thanks for reading this message! Dealer #00001 - (Unconditional Money Back Guarantee) - - Copyright 1996 Linko - ***************************************************************** From nobody at REPLAY.COM Sun Feb 1 05:44:53 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 1 Feb 1998 21:44:53 +0800 Subject: 2001 Tiger Tots Message-ID: <199802011335.OAA19354@basement.replay.com> London Sunday Times February 1, 1998 Arthur C Clarke sex scandal hits Charles's Sri Lanka visit by Yvonne Ridley THE Prince of Wales's visit to Sri Lanka this week hit a new problem last night after Arthur C Clarke, the respected science fiction writer due to be knighted by Charles, allegedly confessed to being a paedophile. The investiture is due to take place on Wednesday during the prince's visit, which coincides with the celebrations for the 50th anniversary of the island's independence. Downing Street said last night: "As far as we are concerned the investiture is still going ahead as planned." A spokesman refused to comment on the possibility of a forfeiture of the honour by the 80-year-old author of 2001: A Space Odyssey. Clarke's revelations, published in today's Sunday Mirror, are bound to embarrass Tony Blair, who named him in his first new year honours as prime minister. Last night diplomats in Colombo, the island's capital, were being asked to assess the author's tabloid confession. If the report is taken at face value the ceremony is unlikely to go ahead. Buckingham Palace advisers contacted British embassy officials in Sri Lanka this year to make discreet inquiries after rumours about Clarke's sexuality and private life. They reported that, although Clarke was known to be gay, there was no evidence of paedophilia. The British-born author of more than 80 novels, who has adopted Sri Lanka as his home, was unable to travel to Britain to receive his knighthood from the Queen because he is virtually confined to a wheelchair as a result of post-polio syndrome. In 1989 he was made a CBE for his services to British cultural interests in Sri Lanka, where he enjoys a tax-free lifestyle bestowed on him by the island because of his celebrity status. He previously met Charles at the British premiere of his Odyssey film in the 1960s, for which he received an Oscar nomination. Surrey-born Clarke was married briefly in 1953 to Marilyn Mayfield, an American who has since died. The marriage lasted about six months after a whirlwind affair. After the split Clarke moved to Sri Lanka, where he now lives in a luxurious home surrounded by state-of-the-art technology and computers that allow him to keep in touch with friends around the world. His study is lined with photographs of celebrities and admirers of his work, including the Pope, Diana, Princess of Wales, Elizabeth Taylor and the astronaut Neil Armstrong. The news also threatens to cast a shadow during the royal visit for senior officials on the island as they have always been proud of the eminent author's presence during the past 40 years. Homosexuality is regarded as an offence in Sri Lanka and carries a prison sentence of up to 10 years. Charles's planned trip was already marred last week by a terrorist attack on a temple that was to have been the scene of the independence celebrations. The bomb killed 17 people, including a suicide team who drove a truck into the old hill capital of Kandy. Buddhist leaders have called for a boycott of this week's ceremonies in protest at Charles's presence. They say Britain sympathises with the island's separatist Tamil Tiger rebels. They also claim the Tamil Tigers, who carried out the bombing, have been allowed to raise money in London for terrorist campaigns. Since the bombing some Buddhist leaders have intensified demands for a formal apology from Britain for its colonial rule. A Foreign Office spokesman said last night that he fully expected Charles's visit to Sri Lanka to go ahead despite the security fears over recent terrorist activities. A report that members of the prince's royal protection squad would not be allowed to carry guns was an "administrative point" that would be resolved before the party left, he said. "It is an island where there is a history of terrorist problems with the Tamil Tigers and, from time to time, with explosions and so forth, so not unnaturally we are looking very closely at security," the spokesman said. From rah at shipwright.com Sun Feb 1 06:37:59 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 1 Feb 1998 22:37:59 +0800 Subject: "Cathedral and Bazzar" meeting with Silicon Valley CEO's Message-ID: --- begin forwarded text Resent-Date: Sat, 31 Jan 1998 12:26:44 -0500 From: glen at substance.abuse.blackdown.org To: 0xdeadbeef at substance.abuse.blackdown.org Cc: bostic at bsdi.com Subject: "Cathedral and Bazzar" meeting with Silicon Valley CEO's Date: Sat, 31 Jan 1998 12:26:40 -0500 Sender: glen at shell.ncm.com Resent-From: 0xdeadbeef at substance.abuse.blackdown.org X-Mailing-List: <0xdeadbeef at substance.abuse.blackdown.org> archive/latest/2692 X-Loop: 0xdeadbeef at substance.abuse.blackdown.org Precedence: list Resent-Sender: 0xdeadbeef-request at substance.abuse.blackdown.org Forwarded-by: Simon Karpen Forwarded-by: Rob Browning From: "Eric S. Raymond" We interrupt our normal programming to inform everybody that I'm likely to be a bit preoccupied and/or out of touch for the next week. The 23 Jan Netscape announcement has borne unexpected fruit. Some of you probably know by now that Netscape is now officially crediting my research paper ("The Cathedral and the Bazaar", available on my site) with having been a fundamentally important factor in their decision to release Navigator 5.0 as freeware in source. Life continues to get more interesting. This coming week I'm flying to Netscape's headquarters in Silicon Valley to meet with Netscape's top brass and technical people. We're going to be defining Netscape's followup -- licensing terms, development strategy, freeware community outreach, spreading the free-software concept. Not only that, but arrangements are being made for me to meet with other leading Silicon Valley CEOs whose names I am not yet at liberty to reveal. The mission will to convince them that the freeware-centered, open-development strategy is the only way for them to head off total Microsoft domination. This is the big time, people -- the Internet free-software culture's breakout into commercial viability at a level even Wall Street can see is happening *now*. And I'm involved it up to my ears. *Gulp!* You'll have to excuse me for being a bit distracted just now. I've got some preparation to do... (Uh...anybody who still doesn't grok what the fuss is about should surf over to and read the story "Linux Plays Large Role In Recent Netscape Announcement". The "read here" link leads to a copy of my paper on their site. Please read it there; my regular website host has been swamped by Web traffic and you get only one guess why...) -- Eric S. Raymond --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: From shamrock at netcom.com Sun Feb 1 06:38:47 1998 From: shamrock at netcom.com (Lucky Green) Date: Sun, 1 Feb 1998 22:38:47 +0800 Subject: Need electron microscope Message-ID: <3.0.2.32.19980201063304.0077ac4c@netcom10.netcom.com> I need access to an electron microscope, or better yet, a real chip analysis lab. This is for a serious project that would result in a scientific paper. Who can help? Thanks, -- Lucky Green PGP encrypted mail preferred "I do believe that where there is a choice only between cowardice and violence, I would advise violence." Mahatma Gandhi From ghio at temp0205.myriad.ml.org Sun Feb 1 08:49:33 1998 From: ghio at temp0205.myriad.ml.org (Matthew Ghio) Date: Mon, 2 Feb 1998 00:49:33 +0800 Subject: Interesting Chemical Reaction In-Reply-To: <199801310015.BAA00313@basement.replay.com> Message-ID: <199802011642.LAA01517@myriad> Anonymous wrote: > Perpetual motion machines built on violations of thermodynamics involving > hemispherical and ellipsoidal mirrors have been around for years. They > don't work. > > The objects do not change temperature. Actually, when I did this experiment several years ago, the objects did change temperature (about 1 degree centigrade) but it may have been due to outside light getting in. From dlv at bwalk.dm.com Sun Feb 1 10:02:00 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 2 Feb 1998 02:02:00 +0800 Subject: Need electron microscope In-Reply-To: <3.0.2.32.19980201063304.0077ac4c@netcom10.netcom.com> Message-ID: Lucky Green writes: > I need access to an electron microscope, or better yet, a real chip > analysis lab. This is for a serious project that would result in a > scientific paper. Who can help? He he he - your asshole employer (C2Net) can't afford to buy equipment, so you need to beg on mailing lists like a pauper? He he he. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From ravage at ssz.com Sun Feb 1 10:10:53 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 2 Feb 1998 02:10:53 +0800 Subject: Electron Microscope... Message-ID: <199802011808.MAA25278@einstein.ssz.com> Hi, I have a couple of suggestions: - Try several of the science museums around the country. As a result of my work with Discovery Hall I know that both Chicago and the Exploratorium in San Fran. had working available electron microscopes. Course this is nearly 10 years out of date too so who knows if they still run them. - You might also try one of the 4 schools in the US who have a certified Semiconductor Technology program. There is one here in Austin, one in Phoenix (I believe), and one somewhere in Oregon. I don't remember where the fourth one is. Call Intel or AMD and ask their HR or PR people where the schools are, they'll know. Good luck. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From eureka at eureka.abc-web.com Mon Feb 2 03:32:12 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Mon, 2 Feb 1998 03:32:12 -0800 (PST) Subject: Eureka! Mon Feb 2 '98 Message-ID: <19980202083303.6713.qmail@eureka.abc-web.com> Welcome to Monday's issue of Eureka! KARA'S ADULT PLAYGROUND With 15 live sex shows, 1,300 Hardcore XXX videos, 1,000s of Hardcore and Softcore Pix, the VaVoom monthly magazine, Kara's exclusive monthly centrefolds, adult games, erotic stories and even casino and sports betting, you won't be going out for weeks particularly now that you can get a FREE trial - your eyes will be popping out of your head! Hahaha! Kara's Playground ...... http://www.rjbtelcom.com/eplay.html PLEASE VISIT THIS FINE EUREKA! PARTNER SITE LOOKING FOR *FREE* SMUT? - SEXY SAMANTHA REVEALS ALL! http://209.50.232.36/sexysam/ I'm Sam and I've searched the web for only the very best *FREE* adult sites. None of these are preview areas for pay sites, or adult verification sites. Just surf and find thousands of the hottest photos, mpegs and audio that you'll find anywhere on the web! SULTRY WOMEN This website features two galleries of hot sexy women. The images are high quality and load fast. There are not a ton of photos, but the ones that are here will perk up your hog. Sultry Women ........... http://www.allthebeauty.com/sultry/ TITANIC TITTIES If you like women with big boobs then this is the place. The woman they feature has two of the biggest breasts I have out on the internet. Huge white tits in a lot of poses and bush too! You would be crazy to not see her melons. It is free! Titanic Titties ............... http://209.81.0.172/titanic/ WILD BANANAS Have a banana? If you do not just go here you will see one. This fruit is right between her legs. This might make for an interesting glaze. Large high quality jpeg images. There are a lot of free pictures here. Spreads, blondes, lesbian, toys, teens, and black. Get wild yourself and check it out! Wild Bananas ................... http://www.wildbananas.com/ WAITING WOMEN You have to click your mouse around a few banners but there are free pictures through out the website. These feature young looking asians, blondes and and exotic looking ladies. Waiting Women ..................... http://www.khans.com/ww/ BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE Now adult surfers have our very own search engine, directly designed to only list adult sites, and so run fast because all other types of site are ignored. Check it out today! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Ass fucked teens ---> http://207.240.169.120/anal/start.html CHAT WITH OTHER READERS This chat is growing fast, and already there are a number of regulars you will meet most days. It's good to see Eureka! readers interacting with each other and having a great time! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ THE BEST PHONE SEX NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 AMATEUR SITE OF THE DAY ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY Erotic Sex Stories: Free sex stories in 5 different subjects, and the stories are illustrated with hardcore XXX pics! You'll love it! ..... http://www.eroticsexstories.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Every day we bring you an exclusive choice pic of a famous adult porn star. And we must tell you - these pix are abso- luletly brilliant! ---> http://www.xxxadultstars.com/eureka/ GAYEUREKA! The gay newsletter is now available. You can get it here! Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/ EUREKA! TRANSLATIONS As well as English you can now choose any of these languages DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?020 Pic 2 --------------------------> http://137.39.63.229/?021 Pic 3 --------------------------> http://137.39.63.229/?022 Pic 4 --------------------------> http://137.39.63.229/?023 Pic 5 --------------------------> http://137.39.63.229/?024 Pic 6 --------------------------> http://137.39.63.229/?025 Pic 7 --------------------------> http://137.39.63.229/?026 Pic 8 --------------------------> http://137.39.63.229/?027 Pic 9 --------------------------> http://137.39.63.229/?028 Pic 10 --------------------------> http://137.39.63.229/?029 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From nobody at REPLAY.COM Sun Feb 1 11:53:12 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 2 Feb 1998 03:53:12 +0800 Subject: (none) Message-ID: <199802011942.UAA02671@basement.replay.com> Subskribe cyferpunks From ravage at ssz.com Sun Feb 1 12:14:18 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 2 Feb 1998 04:14:18 +0800 Subject: [Fwd: JDC Newsletter Vol. 1 No. 6] (fwd) Message-ID: <199802012012.OAA25533@einstein.ssz.com> Forwarded message: >From owner-alg-l at lists.io.com Sun Feb 1 12:58:25 1998 Message-ID: <34D4C68B.23866D8E at bga.com> Date: Sun, 01 Feb 1998 13:01:32 -0600 From: Stu Green X-Mailer: Mozilla 4.03 [en] (X11; I; Linux 2.0.33 i586) MIME-Version: 1.0 To: alg-l at lists.io.com Subject: [Fwd: JDC Newsletter Vol. 1 No. 6] Content-Type: multipart/mixed; boundary="------------A072E7965EF9430CF4337FE8" Sender: owner-alg-l at lists.io.com Precedence: bulk Reply-To: alg-l at lists.io.com This is a multi-part message in MIME format. --------------A072E7965EF9430CF4337FE8 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit --------------A072E7965EF9430CF4337FE8 Content-Type: message/rfc822 Content-Transfer-Encoding: 7bit Content-Disposition: inline Received: from mail1.realtime.net (mail1.realtime.net [205.238.128.217]) by zoom.bga.com (8.6.12/8.6.12) with SMTP id LAA20235 for ; Sun, 1 Feb 1998 11:25:12 -0600 Received: (qmail 27152 invoked from network); 1 Feb 1998 11:51:38 -0000 Received: from sunflash.com (HELO sunflash) (38.211.163.2) by mail1.realtime.net with SMTP; 1 Feb 1998 11:51:38 -0000 Received: from fdds.com by sunflash (SMI-8.6/SMI-SVR4) id GAA11545; Sun, 1 Feb 1998 06:48:56 -0500 From: JDCNewsLetter at web2.javasoft.com Message-Id: <199802011148.GAA11545 at sunflash> To: stugreen at bga.com Date: Sun, 1 Feb 98 06:52:30 EST Subject: JDC Newsletter Vol. 1 No. 6 -WELCOME- to the Java(sm) Developer Connection(sm) Newsletter, covering Early Access software releases, new products, developer programs, the 1998 JavaOne Developer Conference(sm), and more. The JDC Team- J D C N E W S L E T T E R PRODUCT NEWS * Java Activator Release 2 Early Access * Java Foundation Classes(JFC) 0.7 Early Access * Java Accessibility API 0.7 Early Access * Java Cryptography Extension (JCE) 1.2 Early Access * PersonalJava(tm) Platform 1.0 Ships * JavaBeans(tm) in the News INSIDE THE JDC * New on the JDC * Watch for the JDC Reader Survey DEVELOPER PROGRAMS AND RESOURCES * Spring Internet World 98 * 1998 JavaOne Developer Conference * Testing Your Code to See if It's 100% Pure Java(tm)? * Secrets of Successful Java Testing * Visit java.sun.com - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - P R O D U C T N E W S JAVA ACTIVATOR RELEASE 2 EARLY ACCESS. Designed so developers can deploy JDK(tm) 1.1-based applets for Windows and Solaris users on intranet web pages, and provides support for both Internet Explorer 3.02 or later and Netscape Navigator 3.0 or later. To download, see: http://java.sun.com/jdc/earlyAccess/index.html JAVA FOUNDATION CLASSES(JFC) 0.7 EARLY ACCESS. Contains the API specification, documentation, sample code, and a demo. The Swing 0.7 release contains improved menu implementation, significant changes to the table and accessibility APIs, and bug fixes. Note: JFC supports JDK 1.1.2 or higher. To access, see: http://java.sun.com/jdc/earlyAccess/index.html JAVA ACCESSIBILITY API 0.7 EARLY ACCESS. Ensures that the Accessibility API is easily extensible, and simplifies implementation for third-party component developers. Note: This download works only with the JDK 1.1 compatible version of Swing 0.7. To access, see: http://java.sun.com/jdc/earlyAccess/index.html JAVA CRYPTOGRAPHY EXTENSION (JCE) 1.2 EARLY ACCESS. Provides a framework for encryption and key negotiation, and includes interfaces and implementations of secure Java streams, key generation, and symmetric, asymmetric, block, and stream ciphers. JCE 1.2 is designed so that other cryptography libraries can be plugged in as service providers, and new algorithms can be added seamlessly. JCE 1.2 supplements JDK 1.2, which includes interfaces and implementations of message digests and digital signatures. Note: JCE 1.2 requires that JDK 1.2 be installed, and download is restricted to the US and Canada. For more information, see: http://java.sun.com/jdc/earlyAccess/index.html PERSONALJAVA PLATFORM 1.0 SHIPS to licensees. The PersonalJava reference implementation software is designed specifically for network-connectable consumer devices used for communications, entertainment, and mobile computing. Candidates for this Java platform include set-top boxes, mobile hand-held computers, and Internet "web phones." Also announced is the beta release of Personal WebAccess, a compact web browser for devices that run the PersonalJava platform. For more information, see: http://java.sun.com/pr/1998/01/pr980108.html JAVABEANS IN THE NEWS. The draft specification for the Drag and Drop Subsystem for Java Foundation Classes(JFC) is now updated to version 0.95. For more information on JavaBeans, and to access the specification, see: http://java.sun.com/beans http://java.sun.com/beans/glasgow/index.html#draganddrop - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - I N S I D E T H E J D C NEW ON THE JDC. Technical articles covering JDK 1.2, electronic commerce, JDC registration management, building a Web crawler, and more. Plus, don't miss the JDC Tech Tips with hints on StringBuffer and using javap with .class files. To access, see: http://java.sun.com/jdc WATCH FOR THE JDC READER SURVEY coming soon at the end of technical articles. Let the JDC Team know how you like JDC articles -- and what topics you want covered in the future. Plus, earn two DukeDollars for participating. For more information, see: http://java.sun.com/jdc - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - D E V E L O P E R P R O G R A M S A N D R E S O U R C E S SPRING INTERNET WORLD 98. Focusing on industry issues and trends with emphasis on marketing, advertising, ecommerce, finance, and government. Location and date: Los Angeles Convention Center, March 9 to 13, 1998. For more information see: http://events.internet.com/spring98/spring98.html 1998 JAVAONE DEVELOPER CONFERENCE. Be sure to attend the 1998 JavaOne Developer Conference -- at Moscone Center in San Francisco, California, March 24 to 27, 1998. Leading industry speakers include Scott McNealy, CEO of Sun Microsystems, Alan Baratz, President of Sun Microsystems' JavaSoft(tm) Division, and James Gosling, inventor of the Java programming language. Conference sessions include technical tracks, an ISV track, a business track, and more. For details and registration, see: http://java.sun.com/javaone TESTING YOUR CODE TO SEE IF IT'S 100% PURE JAVA? Use JavaPureCheck(tm), the free utility that checks your code for you. And if you're thinking about getting your software certified as 100% Pure, learn why you should -- and see how easy it is. For more information, use the following: http://www.suntest.com/100percent http://java.sun.com/100percent/cert.html 100percentpure-program at java.sun.com SECRETS OF SUCCESSFUL JAVA TESTING. Find out how to write tests once and run them anywhere at "Secrets of Successful Java Testing" seminar, brought to you by SunTest(tm), the Java Testing unit of Sun Microsystems(tm). Join your colleagues, and learn the most effective tools and techniques for testing Java applications and applets. Offered in 17 cities throughout the US, Canada, and the UK. For details, schedules, and registration, see: http://www.suntest.com/seminars/ VISIT JAVA.SUN.COM. Get the latest news and information on Java technology on Sun's JavaSoft web site. Read announcements, learn about new directions, and discover products, partners, programs, and more. To access, see: http://java.sun.com . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . -- Editor's Note -- The names on the JDC mailing list are used for internal Sun Microsystems purposes only. To remove your name from the list, see Subscribe/Unsubscribe below. -- Feedback -- Comments? Send your feedback on the JDC Newsletter to: JDCNewsletter at Sun.com -- Subscribe/Unsubscribe -- To unsubscribe from JDC Email, log in to the JDC. Then click "Change account information." Type your password, and uncheck the box at the end of the form that says "It's okay to send me JDC Email." The JDC log-in address is: http://java.sun.com/jdc -- More on Java Technology -- For the latest news and information on Java technology, see Sun's Java technology site at the following address: http://java.sun.com For in-depth technical articles, tutorials, early access to software, and more, visit the JDC at: http://java.sun.com/jdc -- Archives -- You'll find the JDC Newsletter archives at the following address: http://java.sun.com/jdc/techDocs/newsletter/index.html -- Copyright -- Copyright 1998 Sun Microsystems, Inc. All rights reserved. 901 San Antonio Road, Palo Alto, California 94303 USA This document is protected by copyright. For more information, see: http://java.sun.com/jdc/copyright.html List management and distribution by The Email Channel. For more information, send email to fdds at fdds.com. JDC Newsletter Vol. 1 No. 6 January 27, 1998 --------------A072E7965EF9430CF4337FE8-- --- To unsubscribe send the message "unsubscribe alg-l" without quotes to majordomo at lists.io.com Send questions to owner-alg-l at lists.io.com From emc at wire.insync.net Sun Feb 1 13:02:17 1998 From: emc at wire.insync.net (Eric Cordian) Date: Mon, 2 Feb 1998 05:02:17 +0800 Subject: 2001 Tiger Tots In-Reply-To: <199802011335.OAA19354@basement.replay.com> Message-ID: <199802012055.OAA15665@wire.insync.net> > Arthur C Clarke sex scandal hits Charles's Sri Lanka visit Does this mean that we will get a new edition of "2001" with naked boy scenes? :) Kudos to Arthur for honking the uptight homophobic British establishment, which sees pedophile rings under every shrub and bush. Now do you think we could get James "The Amazing" Randi to issue a similar endorsement? -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From bill.stewart at pobox.com Sun Feb 1 14:27:45 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Mon, 2 Feb 1998 06:27:45 +0800 Subject: Electron Microscope... Message-ID: <3.0.5.32.19980201141920.008a9ab0@popd.ix.netcom.com> At 12:08 PM 2/1/98 -0600, Jim Choate wrote: > - You might also try one of the 4 schools in the US who have a certified > Semiconductor Technology program. There is one here in Austin, one in > Phoenix (I believe), and one somewhere in Oregon. I don't remember where > the fourth one is. Call Intel or AMD and ask their HR or PR people > where the schools are, they'll know. There's also the Cornell University Sub-Micron Research Facility, founded back when microns were still very small, with lots of IBM funds. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From kelsey at plnet.net Sun Feb 1 14:47:30 1998 From: kelsey at plnet.net (John Kelsey) Date: Mon, 2 Feb 1998 06:47:30 +0800 Subject: Chaining ciphers Message-ID: <199802012242.QAA31781@email.plnet.net> -----BEGIN PGP SIGNED MESSAGE----- [ To: Cypherpunks ## Date: 02/01/98 ## Subject: Re: Chaining ciphers ] >Subject: Re: Chaining ciphers >From: ghio at temp0201.myriad.ml.org (Matthew Ghio) >Date: 1998/01/30 >One other possibility is to encrypt with plaintext block >chaining, then superencrypt it PBC in reverse order, >starting with the last block first. An attacker would thus >have to decrypt the entire message before knowing whether >the key was correct or not. I've seen proposals along these lines before (I think there was one by Ron Rivest). If you have a hash function and any symmetric cipher, you can do this. BEAR and LION, the two arbitrary-size block cipher constructions by Ross Anderson and Eli Biham, have this property; you have to process every bit of the message to check a key guess. Using normal chaining modes for this kind of thing, at least with 64-bit block ciphers, usually exposes you to internal-collision kinds of attacks. >> One word of caution (which should be obvious, but can't >> hurt to repeat it): if you chain ciphers (e.g. DES | IDEA | >> 3DES | CAST | Blowfish), be sure to use separate keys for >> each of them; otherwise breaking the last one will give the >> key to the whole lot. >Only if the cryptanalyst knows that the decryption of the >last one was correct, which shouldn't be possible without >also decrypting all the other layers. Actually, this isn't necessarily true. The problem is that you can't guarantee that there won't be some interaction between those encryption operations unless you can assume independent keys. The classic example is this: Suppose the first cipher is double-DES encryption with DES keys (K0,K1), and the second and third encryptions are single-DES decryptions with keys K1 and K0, respectively. You now have e_0(e_1(e_2(x))) leaking all your plaintext directly. The proof for why something like E(X) = IDEA_{K_0}(3DES_{K_1}(X)) is at least as secure as 3DES is as follows: Suppose those keys are random and independent, and suppose you have a way to break E(X). Now, anytime you see a 3DES-encrypted block of data, you can break it, as well, by simply choosing a random IDEA key, encrypting it under that key, and then applying your attack on E(X). In other words, the attack on E(X) implies the attack on 3DES(X), but only if the keys are independent. If there is some dependency between K_0 and K_1 that's required for your attack on E(X), then you can't generalize that out to an attack on 3DES, since you don't know the 3DES key when you start attacking it. To take this a little further, note that an attack on E(X) also implies a chosen-plaintext attack on IDEA. If I have an attack that allows me to break E(X), then I can choose a random 3DES key, pre-encrypt all my chosen plaintexts with it, and then request the encryption of all those plaintexts under the secret IDEA key. The result is E(X), so I can now apply my attack to E(X). For more elaborate constructions, like E3(X) = 3DES_{K_1}(IDEA_{K_2}(Blowfish_{K_3}(X))), we can make the same kind of proof. Suppose I can break E3(X). Now, I can mount a chosen-plaintext attack on IDEA. I select a random encryption key and use it to encrypt all my chosen plaintexts under with Blowfish, and then I request their encryptions. When I get the ciphertexts from that, I select a random 3DES key and encrypt them again. I then apply my attack on E3(X) to break the system. Thus, an attack on E3(X) implies an attack on 3DES, IDEA, *and* Blowfish. But only if the keys are independent and random. Note: I read CP-LITE instead of the whole list. Please CC me on replies. - --John Kelsey, kelsey at counterpane.com / kelsey at plnet.net NEW PGP print = 5D91 6F57 2646 83F9 6D7F 9C87 886D 88AF -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBNNRSUiZv+/Ry/LrBAQGTgAP9EhO0wyPT0HKSXqZD61YPwId8E5C4GJK2 c/+27LBZy8WLhiD92NBc42Rzjbxbir8oWlPkSkZa565mYoaILM0CcP7S15ECyfBY yV2yCOlJdoUo2ea70uIucowxpc2zx2G2KPKBLmGS5P5cwNsx8h3i7KDiRfcWSIGN Omqf38rAy6E= =+f39 -----END PGP SIGNATURE----- From cash_mr at hotmail.com Mon Feb 2 07:26:21 1998 From: cash_mr at hotmail.com (cash_mr at hotmail.com) Date: Mon, 2 Feb 1998 07:26:21 -0800 (PST) Subject: $25.00 for every FREE membership signup Message-ID: <3.0.5.32.19971209114127.00a0983b0@alpha.net> This email is intended for Adult Webmasters only! If you are not an Adult Webmaster and want to be removed from this and any responsible bulk emailers list. Please visit Removelist.com's site for removal instructions at: http://142.176.13.105 _____________________________________________________________ MR CASH will now guarantee $25.00 for every FREE membership signup!!! We have changed the program to pay you either the regular Mr Cash rate (Up to $5.00 per raw hit) or $25.00 per sale WHICH EVER IS HIGHER (By far the highest per sale rate in the industry) Your traffic is valuable. Get paid for it every time. The 100's of Webmasters that are already on the Mr Cash program are Automatically switched to the new program retroactive to Jan.16 1998. If you are not already on the Mr Cash program then here are some more Reasons to sign up. We Now 3 Great sites for you to advertise. Advertise one or advertise Them all. You are able to offer the surfer a Free one-week trail membership To 3 Great sites. Your conversion ratio will go through the roof. Sponsors are paid BI-weekly, so they're no long waiting period to receive your check. We use the most dependable software available on the net today. For more information or to sign up automatically Signup for Pussy Paradise at- http://mr-cash.com http://www.pussyparadise.com Signup for Ultimate Hardcore at - http://mr-cash.com/ultimate http://www.ultimatehardcore.com Signup for Erotic Paradise at - http://mr-erotic--paradise.com/topcash http://www.erotic--paradise.com From eric-grey at usa.net Sun Feb 1 17:22:45 1998 From: eric-grey at usa.net (eric-grey at usa.net) Date: Mon, 2 Feb 1998 09:22:45 +0800 Subject: Would you like to join our referral program? Message-ID: <199802012012.e-mail@sparklers.com> Hello I saw your web site, which was featured on the New Business Sites at Starting Point. I was wondering if you might be interested in participating in our referral program. All you have to do is put our banner or text link on your page. We pay you $50 for every click-thru that signs up for a business credit card merchant account with us. If interested please visit: http://www.tou.com/host/mken/referal.htm Thank you. Marc Kenyon 21st Century Resources From ravage at ssz.com Sun Feb 1 19:59:55 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 2 Feb 1998 11:59:55 +0800 Subject: Updated BBS listing (fwd) Message-ID: <199802020355.VAA26725@einstein.ssz.com> Forwarded message: >From ravage at ssz.com Sun Feb 1 21:54:18 1998 From: Jim Choate Message-Id: <199802020354.VAA26715 at einstein.ssz.com> Subject: Updated BBS listing To: staff at ssz.com (Armadillo Group Staff) Date: Sun, 1 Feb 1998 21:54:17 -0600 (CST) X-Mailer: ELM [version 2.4 PL23] Content-Type: text Content-Length: 3010 Hi, I have updated the listing in Rasca's BBS list and it should show up in one of the future O'Reilly 'Learning Linux' books which we've been listed in since it was published. Jim ----------------------------------------------------------------------------- Hi Rasca, I would like to update the entry for my system, Solar Soyuz Zaibatsu (SSZ). The data that has been in the 'Learning Linux' listing has been out of date the last couple of years. I apologize for not correcting it sooner. It's pretty wild that we've been online in one manner or another since 1984 and involved in Linux since late 1992. The correct information is below: BBS Name: Solar Soyuz Zaibatsu (ssz.com) Phone Number: 512-451-6009 (28.8), 512-451-7060 (33.6) (account required) Online: ?, we're on Internet full time via ISDN Expires: ? Modem Speed (CCITT): 28.8, 33.6 City/Country/State (include region code): Austin, US, Texas (?) Whatever network it is on (i.e. FidoNet, etc.): Internet (ssz.com) First Time access to D/L Linux Files (Y/N): Y (if not request mount via staff at ssz.com) Allow File Requests - Fido style (Y/N): No, available anonymous ftp and temporary guest accounts (send request to staff at ssz.com) Free Access to Linux Files (Y/N): Y BBS Rating (1-5): 5 (what else?) We also support the 'Cypherpunks Distributed Remailer' (cypherpunks at ssz.com), 'Experimental Science Instrumentation Mailing List' (tesla at ssz.com), and are involved in the 'Austin Linux Group' (alg-l at lists.io.com). I also do consulting via 'The Armadillo Group' (consulting at ssz.com). We still support hobby/amateur science and technology via 'The Wired Society' (tws at ssz.com). We currently run Linux on x86, PPC, & SPARC machines as well as Plan 9. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dlv at bwalk.dm.com Sun Feb 1 20:21:49 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 2 Feb 1998 12:21:49 +0800 Subject: (none) In-Reply-To: <199802011942.UAA02671@basement.replay.com> Message-ID: nobody at REPLAY.COM (Anonymous) writes: > Subskribe cyferpunks An old one for those who forgot it already... If Bill is , then who's Hillary? --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From bogus@does.not.exist.com Sun Feb 1 21:05:03 1998 From: bogus@does.not.exist.com (Dr.Dimitri Vulis KOTM) Date: Mon, 2 Feb 1998 13:05:03 +0800 Subject: Bush Gang Suspected In Assault On PresidencyBush Gang Suspected In Assault On Presidency In-Reply-To: <34cae887.ccs@ccs.covici.com> Message-ID: Bush gang suspected in new assault on Presidency by Edward Spannaus and Jeffrey Steinberg In the midst of the worst global financial crisis in modern history, the United States Presidency has come under renewed, vicious attack from a combination of British and nominally ``American'' Bush-League circles. This latest attack, which one White House official long ago appropriately dubbed ``bimbo eruptions,'' centered around a Bush ``mole'' who was, unfortunately, allowed to operate inside the Clinton administration, and who now enjoys high-level security clearances in her post at the Pentagon. Linda Tripp, the central player in the renewed assault against President Clinton--staged around a purported sex scandal involving a young White House intern, Monica Lewinsky--was a Bush administration employee from 1990, until Bush left office in January 1993. At the urging of senior Bush administration officials, including Transportation Secretary Sam Skinner, Tripp was retained by the Clinton-Gore transition team in a clerical position, and later assigned to work at the Office of the White House General Counsel, under Bernard Nussbaum and his deputy, Vincent Foster. All the while, she was operating as part of a treasonous Bush-League ``fifth column'' within the Executive branch. While the ``Get Clinton'' media have attempted to portray Tripp as ``apolitical,'' she was, in fact, an ally, from the Bush administration period on, of then-FBI agent Gary Aldrich, who, in 1996, wrote a libellous book against President Clinton, {Unlimited Access: An FBI Agent Inside the Clinton White House,} which also revolved around bogus claims of White House sexual misconduct (see {EIR,} July 26, 1996, p.|72.) Aldrich was another Bush-League mole inside the Clinton White House. His embarrassingly fantasy-ridden book has been trumpetted by the London-based Hollinger Corporation, the leading British Crown media cartel; by its subsidiary, {American Spectator} magazine; and by ``Get Clinton'' money-bags Richard Mellon Scaife. Tripp emerged in 1995 as an asset of Whitewater Independent Counsel Kenneth Starr, testifying before the Whitewater grand jury and later before a Congressional hearing on the death of Vincent Foster. When Lloyd Cutler replaced Nussbaum as White House General Counsel, Tripp, who by then had been widely identified as an unabashed political enemy of President Clinton, was reassigned to the Pentagon, where she eventually got an $80,000-a-year job, which also involved her getting top-level security clearances. Tripp claimed, to anyone who would listen, that she had been transferred from the White House because she ``knew too much about Whitewater,'' a patent lie. Commenting on the role of Tripp as the linchpin in the latest Clintongate assault, Lyndon LaRouche called on Jan. 22 for Tripp's security clearances to be immediately revoked, pending the outcome of a thorough probe of her role in the sordid affair. ``She obviously needs her security clearances immediately pulled, given her role in what has all the earmarks of an illegal attack against the President, ostensibly on behalf of partisan Republican forces. I would certainly hope that there is no one in the Pentagon who would countenance such an obvious assault against a vital American institution, the Presidency. I would expect such treachery from the editorial page writers at the {Wall Street Journal,} but not from our military.'' - An earlier `eruption' - In the summer of 1997, Tripp surfaced again as part of an effort to hit President Clinton with a ``Profumo''-style sex scandal, telling {Newsweek} that the President had sexually harassed a White House aide, Kathleen Willey. Willey denied, under oath, that Tripp's allegations were true. This prompted President Clinton's attorney, Robert Bennett, belatedly, in August 1997, to denounce Tripp as a liar. While working at the Pentagon, in late 1996, Tripp had already begun to cultivate a close relationship with a former White House junior staff aide, 22-year-old Monica Lewinsky, who had been recently transferred to the Defense Department. It is unclear how the two women came to meet, but in short order, Tripp began to exert a significant amount of control over the younger woman. Tripp should be forced, under oath, to detail the circumstance under which she met and befriended Lewinsky. Tripp soon betrayed Lewinsky's confidence by surreptitiously--and, probably, illegally--taping telephone conversations with Lewinsky. By December 1997, Tripp and Lewinsky had {both,} mysteriously, been subpoenaed to give depositions to attorneys for Paula Jones, in her civil lawsuit against the President--a lawsuit instigated by British intelligence operator and former London {Sunday Telegraph} Washington correspondent Ambrose Evans-Pritchard. How Jones's attorneys came to know of the existence of Tripp and Lewinsky is one question that may hold a key to Tripp's role in the present attack against the President. It should be recalled that, prior to being named the independent counsel in Whitewater, Kenneth Starr had been paid by Richard Mellon Scaife, through the Landmark Legal Foundation, to prepare an {amicus curiae} brief in support of Paula Jones. Tripp claims that, on Jan. 12, 1998, she took 20 hours of tape-recorded conversations with Lewinsky to Whitewater Special Prosecutor Starr. The next day, Starr arranged for Tripp to secretly tape her meeting with Lewinsky at the Ritz Carlton Hotel near the Pentagon in Arlington, Virginia. At the time that Starr arranged for the FBI to secretly tape the Tripp-Lewinsky meeting, {he had absolutely no jurisdiction to probe President Clinton's relationship to the former White House aide.} Indeed, it is critical that a full-scale probe be conducted, to determine whether Tripp, who was in league with Starr from 1995, was taping her conversations with Lewinsky on her own, or, covertly, on behalf of Starr. At minimum, Starr vastly overstepped his jurisdiction; far more likely, he himself broke the law--along with Tripp--in a flagrant attempt to entrap and destroy President Clinton. - No U.S. precedent - In the 200-year history of the American Presidency, there have been occasional sexual scandals involving top government officials; however, never has such a personal scandal brought down the chief executive. There is only one country in the world where heads of government are brought to their knees through such tabloid scandal-mongering: Great Britain. In 1963, Harold Macmillan's government was brought down by a sex scandal involving Defense Minister John Profumo. It is, therefore, not surprising that a review of the various Clintongate scandals, from the 1993 so-called ``Troopergate'' affair to the present attack, reveals that British intelligence stringer and former {Sunday Telegraph} Washington correspondent Ambrose Evans-Pritchard has been the chief instigator. As early as May 8, 1994, in a {Sunday Telegraph} column, Evans-Pritchard boasted that he had been instrumental in getting Paula Jones to file her civil suit against the President. Evans-Pritchard has elsewhere boasted that his assignment, on behalf of the British Crown's Hollinger Corporation, has been nothing less than the total destruction of the Clinton Presidency. Writing in the Jan. 22 {Daily Telegraph,} Evans-Pritchard loudly bragged of his manipulation of Paula Jones: ``My impression after befriending her four years ago, before she took the momentous step of suing the President, is that her motive was sheer rage.'' ``Paula Jones has now achieved her object of inflicting massive damage on Bill Clinton, with shortening odds that she may ultimately destroy his Presidency,'' he continued. Evans-Pritchard accuses the U.S. news media of covering up the Clinton sex scandals, so that only the {American Spectator} or the British press will print the stories. ``What Paula Jones has done is to use the immense power of legal discovery to force the scandal to the surface. She has finally done the job that the American media failed to do so miserably.'' This was precisely the strategy that Evans-Pritchard had laid out in 1994, when he acknowledged on May 8, 1994, that he had had ``a dozen conversations with Mrs. Jones over the past two months.'' He furthermore admitted that ``I happened to be present at a strategy meeting last month on a boat on the Arkansas River,'' at which Jones's attorney ``was weighing the pros and cons of legal action.'' It doesn't ``matter all that much whether Mrs. Jones ultimately wins or loses her case,'' he wrote on May 15, 1994. ``The ticking time bomb in the lawsuit lies elsewhere, in the testimony of other witnesses.'' ``Put plainly,'' Evans-Pritchard blurted, ``the political purpose of the Jones lawsuit is to reconstruct the inner history of the Arkansas Governor's Mansion, using the legal power of discovery. In effect, the two lawyers and their staff could soon be doing the job that the American media failed to do during the election campaign and have largely failed to do since.'' Evans-Pritchard's motive, in contrast to Jones's ``sheer rage,'' is a deep, abiding hatred of the United States, and particularly, the institution of its Presidency. Anyone who joins Evans-Pritchard in this unfolding assault upon the Presidency, is joining the ranks of traitor Aaron Burr. A thorough probe of the current insurrection, beginning with a spotlight on Linda Tripp, is more than appropriate. >From Executive Intelligence Review V25, #5. -- John Covici covici at ccs.covici.com From dlv at bwalk.dm.com Sun Feb 1 21:05:57 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 2 Feb 1998 13:05:57 +0800 Subject: Bush Gang Suspected In Assault On Presidency In-Reply-To: <34cae887.ccs@ccs.covici.com> Message-ID: Path: perun!news From: covici at ccs.covici.com Newsgroups: local.echorel Subject: Bush Gang Suspected In Assault On Presidency Message-ID: <34cae887.ccs at ccs.covici.com> Date: Sun, 25 Jan 1998 02:23:49 -0500 Sender: news at bwalk.dm.com Reply-To: LaRouche Issues Mailing List Organization: Covici Computer Systems Bush gang suspected in new assault on Presidency by Edward Spannaus and Jeffrey Steinberg In the midst of the worst global financial crisis in modern history, the United States Presidency has come under renewed, vicious attack from a combination of British and nominally ``American'' Bush-League circles. This latest attack, which one White House official long ago appropriately dubbed ``bimbo eruptions,'' centered around a Bush ``mole'' who was, unfortunately, allowed to operate inside the Clinton administration, and who now enjoys high-level security clearances in her post at the Pentagon. Linda Tripp, the central player in the renewed assault against President Clinton--staged around a purported sex scandal involving a young White House intern, Monica Lewinsky--was a Bush administration employee from 1990, until Bush left office in January 1993. At the urging of senior Bush administration officials, including Transportation Secretary Sam Skinner, Tripp was retained by the Clinton-Gore transition team in a clerical position, and later assigned to work at the Office of the White House General Counsel, under Bernard Nussbaum and his deputy, Vincent Foster. All the while, she was operating as part of a treasonous Bush-League ``fifth column'' within the Executive branch. While the ``Get Clinton'' media have attempted to portray Tripp as ``apolitical,'' she was, in fact, an ally, from the Bush administration period on, of then-FBI agent Gary Aldrich, who, in 1996, wrote a libellous book against President Clinton, {Unlimited Access: An FBI Agent Inside the Clinton White House,} which also revolved around bogus claims of White House sexual misconduct (see {EIR,} July 26, 1996, p.|72.) Aldrich was another Bush-League mole inside the Clinton White House. His embarrassingly fantasy-ridden book has been trumpetted by the London-based Hollinger Corporation, the leading British Crown media cartel; by its subsidiary, {American Spectator} magazine; and by ``Get Clinton'' money-bags Richard Mellon Scaife. Tripp emerged in 1995 as an asset of Whitewater Independent Counsel Kenneth Starr, testifying before the Whitewater grand jury and later before a Congressional hearing on the death of Vincent Foster. When Lloyd Cutler replaced Nussbaum as White House General Counsel, Tripp, who by then had been widely identified as an unabashed political enemy of President Clinton, was reassigned to the Pentagon, where she eventually got an $80,000-a-year job, which also involved her getting top-level security clearances. Tripp claimed, to anyone who would listen, that she had been transferred from the White House because she ``knew too much about Whitewater,'' a patent lie. Commenting on the role of Tripp as the linchpin in the latest Clintongate assault, Lyndon LaRouche called on Jan. 22 for Tripp's security clearances to be immediately revoked, pending the outcome of a thorough probe of her role in the sordid affair. ``She obviously needs her security clearances immediately pulled, given her role in what has all the earmarks of an illegal attack against the President, ostensibly on behalf of partisan Republican forces. I would certainly hope that there is no one in the Pentagon who would countenance such an obvious assault against a vital American institution, the Presidency. I would expect such treachery from the editorial page writers at the {Wall Street Journal,} but not from our military.'' - An earlier `eruption' - In the summer of 1997, Tripp surfaced again as part of an effort to hit President Clinton with a ``Profumo''-style sex scandal, telling {Newsweek} that the President had sexually harassed a White House aide, Kathleen Willey. Willey denied, under oath, that Tripp's allegations were true. This prompted President Clinton's attorney, Robert Bennett, belatedly, in August 1997, to denounce Tripp as a liar. While working at the Pentagon, in late 1996, Tripp had already begun to cultivate a close relationship with a former White House junior staff aide, 22-year-old Monica Lewinsky, who had been recently transferred to the Defense Department. It is unclear how the two women came to meet, but in short order, Tripp began to exert a significant amount of control over the younger woman. Tripp should be forced, under oath, to detail the circumstance under which she met and befriended Lewinsky. Tripp soon betrayed Lewinsky's confidence by surreptitiously--and, probably, illegally--taping telephone conversations with Lewinsky. By December 1997, Tripp and Lewinsky had {both,} mysteriously, been subpoenaed to give depositions to attorneys for Paula Jones, in her civil lawsuit against the President--a lawsuit instigated by British intelligence operator and former London {Sunday Telegraph} Washington correspondent Ambrose Evans-Pritchard. How Jones's attorneys came to know of the existence of Tripp and Lewinsky is one question that may hold a key to Tripp's role in the present attack against the President. It should be recalled that, prior to being named the independent counsel in Whitewater, Kenneth Starr had been paid by Richard Mellon Scaife, through the Landmark Legal Foundation, to prepare an {amicus curiae} brief in support of Paula Jones. Tripp claims that, on Jan. 12, 1998, she took 20 hours of tape-recorded conversations with Lewinsky to Whitewater Special Prosecutor Starr. The next day, Starr arranged for Tripp to secretly tape her meeting with Lewinsky at the Ritz Carlton Hotel near the Pentagon in Arlington, Virginia. At the time that Starr arranged for the FBI to secretly tape the Tripp-Lewinsky meeting, {he had absolutely no jurisdiction to probe President Clinton's relationship to the former White House aide.} Indeed, it is critical that a full-scale probe be conducted, to determine whether Tripp, who was in league with Starr from 1995, was taping her conversations with Lewinsky on her own, or, covertly, on behalf of Starr. At minimum, Starr vastly overstepped his jurisdiction; far more likely, he himself broke the law--along with Tripp--in a flagrant attempt to entrap and destroy President Clinton. - No U.S. precedent - In the 200-year history of the American Presidency, there have been occasional sexual scandals involving top government officials; however, never has such a personal scandal brought down the chief executive. There is only one country in the world where heads of government are brought to their knees through such tabloid scandal-mongering: Great Britain. In 1963, Harold Macmillan's government was brought down by a sex scandal involving Defense Minister John Profumo. It is, therefore, not surprising that a review of the various Clintongate scandals, from the 1993 so-called ``Troopergate'' affair to the present attack, reveals that British intelligence stringer and former {Sunday Telegraph} Washington correspondent Ambrose Evans-Pritchard has been the chief instigator. As early as May 8, 1994, in a {Sunday Telegraph} column, Evans-Pritchard boasted that he had been instrumental in getting Paula Jones to file her civil suit against the President. Evans-Pritchard has elsewhere boasted that his assignment, on behalf of the British Crown's Hollinger Corporation, has been nothing less than the total destruction of the Clinton Presidency. Writing in the Jan. 22 {Daily Telegraph,} Evans-Pritchard loudly bragged of his manipulation of Paula Jones: ``My impression after befriending her four years ago, before she took the momentous step of suing the President, is that her motive was sheer rage.'' ``Paula Jones has now achieved her object of inflicting massive damage on Bill Clinton, with shortening odds that she may ultimately destroy his Presidency,'' he continued. Evans-Pritchard accuses the U.S. news media of covering up the Clinton sex scandals, so that only the {American Spectator} or the British press will print the stories. ``What Paula Jones has done is to use the immense power of legal discovery to force the scandal to the surface. She has finally done the job that the American media failed to do so miserably.'' This was precisely the strategy that Evans-Pritchard had laid out in 1994, when he acknowledged on May 8, 1994, that he had had ``a dozen conversations with Mrs. Jones over the past two months.'' He furthermore admitted that ``I happened to be present at a strategy meeting last month on a boat on the Arkansas River,'' at which Jones's attorney ``was weighing the pros and cons of legal action.'' It doesn't ``matter all that much whether Mrs. Jones ultimately wins or loses her case,'' he wrote on May 15, 1994. ``The ticking time bomb in the lawsuit lies elsewhere, in the testimony of other witnesses.'' ``Put plainly,'' Evans-Pritchard blurted, ``the political purpose of the Jones lawsuit is to reconstruct the inner history of the Arkansas Governor's Mansion, using the legal power of discovery. In effect, the two lawyers and their staff could soon be doing the job that the American media failed to do during the election campaign and have largely failed to do since.'' Evans-Pritchard's motive, in contrast to Jones's ``sheer rage,'' is a deep, abiding hatred of the United States, and particularly, the institution of its Presidency. Anyone who joins Evans-Pritchard in this unfolding assault upon the Presidency, is joining the ranks of traitor Aaron Burr. A thorough probe of the current insurrection, beginning with a spotlight on Linda Tripp, is more than appropriate. >From Executive Intelligence Review V25, #5. -- John Covici covici at ccs.covici.com From unicorn at schloss.li Sun Feb 1 22:56:29 1998 From: unicorn at schloss.li (Black Unicorn) Date: Mon, 2 Feb 1998 14:56:29 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: Message-ID: <3.0.3.32.19980202005111.006c10d0@schloss.li> Mr. May said: >Suffice it to say that I find nearly all cases where someone is "demanding" >personal information to be cases where the government has required them to, >for various unseemly purposes, or in cases where credit is being arranged. Of late I tried to pay off a rather large American Express bill. Suddenly, AMEX won't take cash in excess of $1,000 in any single billing period (30 days). The large sign on the wall indicated the substance of the new rule (or the old rule newly enforced) and added that customers "may be required to produce two forms of identification including a government issued identification card and a social security number." Here's a situation where the payor is (theoretically) positively identified to the payee (including ssn), where credit has already been established, and where records are certain to exist for all transactions which are being paid for. The AMEX Corporate card was once a wonderful tool to preserve anonymity with. One could issue several cards for a domestic company, 100% owned by an offshore, and settle in cash. Properly done, this was perfectly legal. Well, once upon a time anyhow. I find it extremely alarming that a general transaction like this can be illegal where almost no case can be made for a danger of money laundering or some kind of support of the "underground economy" (except perhaps that I'd have Pablo Escobar pay off my Amex to compensate me for my illegal smuggling flights, but that's a bit thin in my view). Increasingly, I try and find explanations for these kinds of regulations which do not include a paranoid rant about governments making sure they maintain a firm set of records on every citizen for whenever it might be "needed," (or wanted). Increasingly, this becomes a difficult mental task. Increasingly, it is difficult to make cash transactions. In the end that seems to be the point. Make it difficult to pay with cash. Make it suspicious to pay with cash. Make it an attention getter if you pay with cash. Sound paranoid? Try this. I'd like everyone who reads this to try and go 45 days without using plastic or writing a check. Just 45 days. If you don't grow alarmist very quickly (like in the first week) I'd like to hear your experience. If nothing else, try adding up a few months of finance charges, yearly fees on your credit cards, transactions fees, check fees, interest lost on no-interest checking accounts... see what you're paying to keep people from looking at you like a criminal. There's an interesting new awakening in personal finance right now which advises, among other things, "pay in cash, die broke." I'm interested to see how this "pay in cash" advice, which I have followed religiously years before it was put in print, clashes with post-modern financial regulation. I know things have gotten really out of hand because the phrase "No, I'll pay with cash," which I find I have to use more and more often, turns more and more heads and is met more and more often with a cross look from a teller and a finger pointed at a large sign bearing the heading "Restrictions on Cash Transactions." When the question becomes "Which credit card will you be paying with?" and no longer does one hear "How will you be paying for that?" I think people better start thinking about what's happening. (I'm not on cypherpunks anymore, mail me directly). From ravage at ssz.com Sun Feb 1 23:09:37 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 2 Feb 1998 15:09:37 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) (fwd) Message-ID: <199802020709.BAA27402@einstein.ssz.com> Forwarded message: > Date: Mon, 02 Feb 1998 00:51:11 -0600 > From: Black Unicorn > Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) > Sound paranoid? Try this. I'd like everyone who reads this to try and go > 45 days without using plastic or writing a check. Just 45 days. If you > don't grow alarmist very quickly (like in the first week) I'd like to hear > your experience. I've been doing it for many years. Don't have a checking account, don't own a credit card. I do have a saving account with a local credit union and go in every 3-4 days and withdraw what I need for the next 3-4 days. Pay every bill in cash or money order. I'm not going into how I invest my excess capital. If my employer needs me to travel I do it on their plastic. The only irritating thing I find is that I can't walk into grocery stores any more and get money orders larger than $700 and many won't do it for more than $400. I have to pay my rent each month with a $400 and a $397 money order in order to meet the $797 amound due because I'm too lazy to drive the extra 6-8 blocks to the one who will do the $700 money orders. Other than that I don't have a problem at all. I'm going to go tomorrow and buy a new laptop at around $1500. I intend on paying with a wad of $100 bills. Bet you they don't look twice nor will they ask for ID. I've actualy never had a problem paying cash, never had anyone turn real money down... ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From partners at partnersnow.com Mon Feb 2 16:51:57 1998 From: partners at partnersnow.com (partners at partnersnow.com) Date: Mon, 2 Feb 1998 16:51:57 -0800 (PST) Subject: ELECTRICITY CAN MAKE YOU RICH Message-ID: <199801300133.UAA02365@partnersnow.com> All of us are constantly bombarded by people hawking "unbelievable", "once-in-a-lifetime", "get-rich-quick" business opportunities. I graduated from Yale, became Commissioner of Housing in New York City, started a real estate development company, and now own an 83-year-old diamond-cutting company. Quite bluntly, I won't waste my time even listening to the pitch. And yet right now, I am telling eveybody I know (and, obviously, hundreds of people I don't know) about an opportunity available in the deregulation of electricity that sounds just as outrageous as all the phony talk we've heard in the past. The difference is that this is real. And the urgency comes from the fact that it will never happen again. You might choose to read no further, but you will never be able to say that you weren't there when business history was being made. MAKE NO INVESTMENT AND START PART-TIME Know up front that your participation will not require start-up costs of more than about $300 nor that you leave your current full-time job. You should also know that deregulated electricity in the US, albeit a $215-billion industry, is only one component in a global master plan that will soon tap even larger markets in internet commerce, telecommunications, and energy distribution. In all these markets, our participation will be in partnership with the most respected names in the corporate world. The structure of this precedent-setting Company has already been formed and the names of our partners will be announced over the next few weeks. We intend to do for all services entering homes, offices, and factories what the supermarket did to individual food shops and what the mall did to Main Street stores. The powerful trend to consolidation will naturally successfully extend to essential modern services because the benefits will be the same: lower cost and greater convenience. This is nobody's pipe dream. This is history in the making, and you can become a very rich player by finally being in the right place at the right time and taking action. DEREGULATION CAN ONLY HAPPEN ONCE By the year 2002, the domestic electric utilities industry will be fundamentally deregulated. That means that the out-dated, costly, monopolistic utility providers, which we have always accepted like death and taxes, will be forced to compete in the open market with lower-cost, high-tech, entrepreneurial, service-oriented private companies. In many states, the process has already begun. California's $20-billion industry will be one of the first to deregulate completely in 1998, along with New Hampshire and Rhode Island. Massachusetts and Pennsylvania are right behind, with many other states scheduling to start in 1998, too. Consumers will have the right to choose the source of their power and you will have the opportunity to sell it. And it has all been done before. In the 1970's, the airline industry deregulated and the resulting competition destroyed established companies and made fortunes for others. In the 1980's, AT&T lost its monopoly and now barely holds on to 50% of the market. The significant difference in the deregulation of electricity in the 1990's is that you are right now being given a chance to participate even before it happens. Our Company has developed the multi-million-dollar infrastructure to support its goal of becoming to deregulated electricity what MCI became to deregulated telephone. And the distribution of our electricity will be made only through independent entrepreneurs empowered by the Company to profit every time a customer turns on a light. Even more eye-opening, these "electricity entrepreneurs" will profit to an even greater extent from their monthly commissions on their customers' use of all the other services the new Company will offer: internet commerce, telephony of all kinds, home security, cable TV, and many more. With three or more services "bundled" together, studies have shown that customers are lost at a rate of less than 10% a year. This is true residual income. Compensation accrues from four main sources: (1) up-front agency fees paid to the Distributor when customers subscribe to our services; (2) up-front training fees paid to the Sponsor when new Distributors join the Company; (3) residual commissions paid to the Distributor as a percentage of customers' monthly use of the Company's services; and (4) executive bonuses paid to Distributors on the total volume generated by his or her entire organization. CAPITALIZE ON A PROVEN ROCK-SOLID COMPANY As I said, we are not looking for investors. Our parent is a 13-year-old, $1.4 billion, high-tech company with a D&B 5A-1, no debt, US Olympic Committee licenses, and operations in 23 countries all over the world. It is one of nine companies in the history of the United States that grew from start-up to one billion dollars in sales in less than ten years (others include Microsoft, FEDEX, Nike, and Home Depot). Our Asian division went public on the New York Stock Exchange with Morgan Stanley and Merrill Lynch as our underwriters. Most important, the Company has established a brilliant, highly-leveraged plan for growth that has empowered over 400 associates, working on their own schedules, usually out of their own homes, to reach an income level that in 1996 averaged $561,000 a year. Significantly, that track record was achieved in industries a small fraction of the size of deregulated electricity and our other future markets. Please be aware that there will be many start-up companies hustling to be players in this historic opportunity. There will be efforts by the utility dinosaurs to hang on to their markets. Be sure that your potential in this industry isn't undermined by the failure of the insubstantial up-starts or the collapse of the prehistoric giants. LIFE IS NOT A DRESS REHEARSAL In my role as President of a diamond-cutting company, I know the frustrations of a capital-intensive, high-risk, low-margin, slow-growth industry. As an Administrator in the medical community, my wife sees the deterioration in doctors' earnings and the downsizing and closing of hospitals everywhere. While many of the old ways of making money are gone, new opportunities abound. Deregulated electricity is the next big opportunity, structured by a genius hyper-growth Company that is already allowing my wife and me to continue our professional work full-time, while enabling us to develop part-time a perpetual income with unlimited potential. The partners we are seeking for this opportunity should be independent, open-minded, self-motivated, highly-principled entrepreneurs. Such a profile might seem demanding, but the financial rewards can be gigantic. I was skeptical, too, at first. But the more I investigated, the more I realized that this is the rare, legitimate, dynamic opportunity that people, not long from now, will look back to and lament that they they missed. Electricity deregulation has never happened before and will never happen again. There is no doubt that fortunes will be made as a result of deregulation and the Company's global vision. The only question is who will be along for the ride. And it might not be for you. There are always reasons. But clearly, if you continue to do what you've always done, you'll continue to get what you've always gotten. And if you've already gotten all the time freedom and all the money you've always wanted, this opportunity is probably not for you. But if you haven't, how long are you going to wait? For more information, please call 1-800-326-9253 or email me back and leave your name and daytime and evening phone number and the best time to call. Serious inquiries only please. /////////////////////////////////////////////////////////////////////////////// We practice responsible emailing. If you wish to be removed from future mailings, please reply with remove in the subject. //////////////////////////////////////////////////////////////////////////////// From dlv at bwalk.dm.com Mon Feb 2 18:40:09 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 2 Feb 1998 18:40:09 -0800 (PST) Subject: The Continued Attack on Cash (Was: "The Right of In-Reply-To: Message-ID: Tim May writes: > At 3:52 PM -0800 2/2/98, Black Unicorn wrote: > >At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote: >... > >(I'm not on cpunks, mail me). > > Sorry, if you want to read my words ya gotta subscribe. Let's collect Timmy's words of wisdom for posterity. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From dlv at bwalk.dm.com Mon Feb 2 04:57:16 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 2 Feb 1998 20:57:16 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) ( In-Reply-To: <199802020709.BAA27402@einstein.ssz.com> Message-ID: Jim Choate writes: > Don't have a checking account, don't own > a credit card. Minor nit: most people who do use credit cards don't "own" them either. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From jya at pipeline.com Mon Feb 2 04:57:45 1998 From: jya at pipeline.com (John Young) Date: Mon, 2 Feb 1998 20:57:45 +0800 Subject: BXA Meet Message-ID: <1.5.4.32.19980202124909.010275c4@pop.pipeline.com> Should anyone attend this a report would be welcome. Federal Register: February 2, 1998 (Volume 63, Number 21) Page 5353 ----------------------------------------------------------------------- DEPARTMENT OF COMMERCE Bureau of Export Administration Regulations and Procedures Technical Advisory Committee; Notice of Partially Closed Meeting A meeting of the Regulations and Procedures Technical Advisory Committee will be held February 25, 1998, 9:00 a.m., in the Herbert C. Hoover Building, Room 3884, 14th Street between Constitution and Pennsylvania Avenues, N.W., Washington, D.C. The Committee advises the Office of the Assistant Secretary for Export Administration on implementation of the Export Administration Regulations (EAR) and provides for continuing review to update the EAR as needed. Agenda Open Session 1. Opening remarks by the Chairperson. 2. Presentation of papers or comments by the public. 3. Update on implementation of the National Defense Authorization Act computer control regulations. 4. Update on the Wassenaar Arrangement implementation regulation. 5. Discussion on the ``deemed export'' rule. 6. Discussion on the encryption regulations. 7. Update on the License Process Review initiative. 8. Discussion on efforts to conform the Foreign Trade Statistics Regulations and the Export Administration Regulations on export clearance requirements. 9. Discussion on clarification of EPCI (Enhanced Proliferation Control Initiative). Closed Session 10. Discussion of matters properly classified under Executive Order 12958, dealing with the U.S. export control program and strategic criteria related thereto. The General Session of the meeting will be open to the public and a limited number of seats will be available. To the extent that time permits, members of the public may present oral statements to the Committee. Written statements may be submitted at any time before or after the meeting. However, to facilitate the distribution of public presentation materials to the Committee members, the Committee suggests that presenters forward the public presentation materials two weeks prior to the meeting date to the following address: Ms. Lee Ann Carpenter, OAS/EA/BXA MS:3886C, 14th & Pennsylvania Avenue, N.W., U.S. Department of Commerce, Washington, D.C. 20230. The Assistant Secretary for Administration, with the concurrence of the delegate of the General Counsel, formally determined on December 16, 1996, pursuant to Section 10(d) of the Federal Advisory Committee Act, as amended, that the series of meetings or portions of meetings of the Committee and of any Subcommittees thereof, dealing with the classified materials listed in 5 U.S.C. 552b(c)(1) shall be exempt from the provisions relating to public meetings found in section 10(a) (1) and (a) (3), of the Federal Advisory Committee Act. The remaining series of meetings or portions thereof will be open to the public. A copy of the Notice of Determination to close meetings or portions of meetings of the Committee is available for public inspection and copying in the Central Reference and Records Inspection Facility, Room 6020, U.S. Department of Commerce, Washington, D.C. For further information, call Lee Ann Carpenter at (202) 482-2583. Dated: January 27, 1998. Lee Ann Carpenter, Director, Technical Advisory Committee Unit. [FR Doc. 98-2393 Filed 1-30-98; 8:45 am] From vicente at certisign.com.br Mon Feb 2 05:26:06 1998 From: vicente at certisign.com.br (Vicente Silveira) Date: Mon, 2 Feb 1998 21:26:06 +0800 Subject: More on ISDN Features In-Reply-To: <1.5.4.32.19980130235837.0072cee4@pop.pipeline.com> Message-ID: <34D5C79F.A4EA70B@certisign.com.br> Btw, a report from the New Zealand Herald ( 1997-07-21 ) says that New Zealand's secret facility of Waihopai ( believed to be part of Echelon ) was being upgraded to be able to monitor an increasing volume of telecommunications on the Pacific. Even more interesting is that the NZ's Crimes Act was being modified to allow the interception of "private oral communications" ( phone calls ) of foreign states, organizations and individuals. The report : http://www.magnet.ch/serendipity/hermetic/crypto/echelon/nzh1.htm -vbs > ... > I'm much more concerned about the Echelon system which was (finally) > reported in the Sunday Telegraph just before Xmas. This system, it is > alleged, can intercept and look for keywords in ALL international comms > traffic. I believe this also gets a mention in the Europarliament report. > > Vote early and often for freely available strong encryption!! > (whatever JR mutters about 'doing him out of his livelihood' :=) ) > ... > Key escrow is another example of complete bollocks, IMHO. > ... From jya at pipeline.com Mon Feb 2 05:48:25 1998 From: jya at pipeline.com (John Young) Date: Mon, 2 Feb 1998 21:48:25 +0800 Subject: Jim Bell Update Message-ID: <1.5.4.32.19980202134213.01035a0c@pop.pipeline.com> Date: Sun, 01 Feb 1998 Hi, John. Received a letter and phone call from Jim, as below. -------------------------------------- . He had a little altercation with a fellow prisoner ("through no fault of my own" - he thinks he was set up) and his privileges were reduced for 35 days, so that he could only make one phone call each week. . In reference to the bad publicity (all those articles and news alerts) which his case received, he speculates that the government gave a copy of AP to a 'think tank' like Rand, etc., with the request to figure out how to stop or delay AP. But it is his conclusion that AP is unstoppable, although: "I think that one last (temporary) hope for government is to delay AP. Chances are good that the "think tank" decided thatt the best way to delay AP is to discredit me, its author. It was a desperate gamble, particularly because the act of harrassing me automatically gives AP more publicity. That's the reason they will fail; the more they try to "get" me, the worse it will be for them." He wants it noted that his writing and discussions of AP ideas are in the sense of a "prediction", a "warning", or even a "vision", not an advocacy of it. . Regarding his guilty plea, he said it was because he realizes that he did do a few things wrong and that, although he did think that some of the charges against him were overblown and distorted, there was enough of a risk of being found guilty that it didn't make a lot of sense to contest them. He adds, "I also felt (and still do, of course) that government had already 'lost the war' so to speak." . He expects to be out around mid-April. Upon his release he wants to go to some of his favorite restaurants, and to have several BIG pizzas. He hopes he can get his old job back as electronics designer, and has some ideas he wants to work on for a virtual reality peripheral device which will bring everyone steps closer to the Star Trek Next Generation 'holodek'. - end From anon at anon.efga.org Mon Feb 2 06:39:06 1998 From: anon at anon.efga.org (Anonymous) Date: Mon, 2 Feb 1998 22:39:06 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <3.0.3.32.19980202005111.006c10d0@schloss.li> Message-ID: Black Unicorn wrote: > Sound paranoid? Try this. I'd like everyone who reads this to try and go > 45 days without using plastic or writing a check. Just 45 days. If you > don't grow alarmist very quickly (like in the first week) I'd like to hear > your experience. If nothing else, try adding up a few months of finance > charges, yearly fees on your credit cards, transactions fees, check fees, > interest lost on no-interest checking accounts... see what you're paying to > keep people from looking at you like a criminal. Depends on where you shop. I was recently at a store where my request to pay with a credit card instead of cash elicited a look of disappointment from the owner-operator. Normally I'd have been happy to accomodate his desire for cash, but when someone else is letting you charge it to their credit card... well... I think the real problem is dealing with big companies who want you name, address, and phone number for their marketing dept. Mom and pop shops would much prefer to cut out the middleman. From ptrei at securitydynamics.com Mon Feb 2 06:48:26 1998 From: ptrei at securitydynamics.com (Trei, Peter) Date: Mon, 2 Feb 1998 22:48:26 +0800 Subject: Dr Dobbs crypto CD Message-ID: <6B5344C210C7D011835C0000F80127668B1610@exna01.securitydynamics.com> I called them up a couple weeks ago to ask about this. The person I talked to had clearly fielded this question quite a few times. The story he gave is that preparation of the master CD was farmed out to some particular individual contractor who was stalling. I got the impression that I was being told that the contractor was apparently imcompetant, and could not turn in a usable master in a timely fashion. There was also some mention of the possiblity of 'legal difficulties', though I was given no details on that. Peter Trei ptrei at securitydynamics.com > -----Original Message----- > From: dlv at bwalk.dm.com [SMTP:dlv at bwalk.dm.com] > Sent: Saturday, January 31, 1998 12:14 PM > To: cypherpunks at toad.com > Subject: Dr Dobbs crypto CD > > The DDJ I just got (March 98) has a full-page ad for the crypto CD > (p.113) > saying inter alia "New Release! fast Search Engine" > > Has anyone received even the "old release"? > > --- > > Dr.Dimitri Vulis KOTM > Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, > 14.4Kbps [Trei, Peter] I called them up a couple weeks ago to ask about this. The person I spoke to had clearly fielded this question quite a few times. The story he gave is that preparation of the master CD was farmed out to some particular individual contractor who was stalling. I got the impression that I was being told that the contractor was apparently imcompetant, and could not turn in a usable master in a timely fashion. There was also some mention of the possiblity of 'legal difficulties', though I was given no details. I'm still waiting for my copy. Peter Trei ptrei at securitydynamics.com From raph at CS.Berkeley.EDU Mon Feb 2 07:01:14 1998 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Mon, 2 Feb 1998 23:01:14 +0800 Subject: List of reliable remailers Message-ID: <199802021450.GAA00175@kiwi.cs.berkeley.edu> I operate a remailer pinging service which collects detailed information about remailer features and reliability. To use it, just finger remailer-list at kiwi.cs.berkeley.edu There is also a Web version of the same information, plus lots of interesting links to remailer-related resources, at: http://www.cs.berkeley.edu/~raph/remailer-list.html This information is used by premail, a remailer chaining and PGP encrypting client for outgoing mail. For more information, see: http://www.c2.org/~raph/premail.html For the PGP public keys of the remailers, finger pgpkeys at kiwi.cs.berkeley.edu This is the current info: REMAILER LIST This is an automatically generated listing of remailers. The first part of the listing shows the remailers along with configuration options and special features for each of the remailers. The second part shows the 12-day history, and average latency and uptime for each remailer. You can also get this list by fingering remailer-list at kiwi.cs.berkeley.edu. $remailer{'cyber'} = ' alpha pgp'; $remailer{"mix"} = " cpunk mix pgp hash latent cut ek ksub reord ?"; $remailer{"replay"} = " cpunk mix pgp hash latent cut post ek"; $remailer{"jam"} = " cpunk mix pgp hash middle latent cut ek"; $remailer{"winsock"} = " cpunk pgp pgponly hash cut ksub reord ?"; $remailer{'nym'} = ' newnym pgp'; $remailer{"squirrel"} = " cpunk mix pgp pgponly hash latent cut ek"; $remailer{'weasel'} = ' newnym pgp'; $remailer{"reno"} = " cpunk mix pgp hash middle latent cut ek reord ?"; $remailer{"cracker"} = " cpunk mix remix pgp hash ksub esub latent cut ek reord post"; $remailer{'redneck'} = ' newnym pgp'; $remailer{"bureau42"} = " cpunk mix pgp ksub hash latent cut ek"; $remailer{"neva"} = " cpunk pgp pgponly hash cut ksub ?"; $remailer{"lcs"} = " mix"; $remailer{"medusa"} = " mix middle" $remailer{"McCain"} = " mix middle"; $remailer{"valdeez"} = " cpunk pgp pgponly hash ek"; $remailer{"arrid"} = " cpunk pgp pgponly hash ek"; $remailer{"hera"} = " cpunk pgp pgponly hash ek"; $remailer{"htuttle"} = " cpunk pgp hash latent cut post ek"; catalyst at netcom.com is _not_ a remailer. lmccarth at ducie.cs.umass.edu is _not_ a remailer. usura at replay.com is _not_ a remailer. remailer at crynwr.com is _not_ a remailer. There is no remailer at relay.com. Groups of remailers sharing a machine or operator: (cyber mix reno winsock) (weasel squirrel medusa) (cracker redneck) (nym lcs) (valdeez arrid hera) This remailer list is somewhat phooey. Go check out http://www.publius.net/rlist.html for a good one. Last update: Thu 23 Oct 97 15:48:06 PDT remailer email address history latency uptime ----------------------------------------------------------------------- hera goddesshera at juno.com ------------ 5:03:45 99.86% nym config at nym.alias.net +*#**#**### :34 95.82% redneck config at anon.efga.org #*##*+#**** 2:00 95.44% mix mixmaster at remail.obscura.com +++ ++++++* 19:18 95.27% squirrel mix at squirrel.owl.de -- ---+--- 2:34:19 95.16% cyber alias at alias.cyberpass.net *++***+ ++ 11:26 95.11% replay remailer at replay.com **** *** 10:06 94.93% arrid arrid at juno.com ----.------ 8:50:34 94.41% bureau42 remailer at bureau42.ml.org --------- 3:38:29 93.53% cracker remailer at anon.efga.org + +*+*+*+ 16:32 92.80% jam remailer at cypherpunks.ca + +*-++++ 24:14 92.79% winsock winsock at rigel.cyberpass.net -..-..---- 9:59:18 92.22% neva remailer at neva.org ------****+ 1:03:02 90.39% valdeez valdeez at juno.com 4:58:22 -36.97% reno middleman at cyberpass.net 1:01:28 -2.65% History key * # response in less than 5 minutes. * * response in less than 1 hour. * + response in less than 4 hours. * - response in less than 24 hours. * . response in more than 1 day. * _ response came back too late (more than 2 days). cpunk A major class of remailers. Supports Request-Remailing-To: field. eric A variant of the cpunk style. Uses Anon-Send-To: instead. penet The third class of remailers (at least for right now). Uses X-Anon-To: in the header. pgp Remailer supports encryption with PGP. A period after the keyword means that the short name, rather than the full email address, should be used as the encryption key ID. hash Supports ## pasting, so anything can be put into the headers of outgoing messages. ksub Remailer always kills subject header, even in non-pgp mode. nsub Remailer always preserves subject header, even in pgp mode. latent Supports Matt Ghio's Latent-Time: option. cut Supports Matt Ghio's Cutmarks: option. post Post to Usenet using Post-To: or Anon-Post-To: header. ek Encrypt responses in reply blocks using Encrypt-Key: header. special Accepts only pgp encrypted messages. mix Can accept messages in Mixmaster format. reord Attempts to foil traffic analysis by reordering messages. Note: I'm relying on the word of the remailer operator here, and haven't verified the reord info myself. mon Remailer has been known to monitor contents of private email. filter Remailer has been known to filter messages based on content. If not listed in conjunction with mon, then only messages destined for public forums are subject to filtering. Raph Levien From ravage at ssz.com Mon Feb 2 07:09:01 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 2 Feb 1998 23:09:01 +0800 Subject: Clarke denies pedophilia [CNN] Message-ID: <199802021507.JAA28167@einstein.ssz.com> Forwarded message: > > AUTHOR OUTRAGED AT REPORT HE IS PEDOPHILE > > Arthur C. Clarke seeks postponement of knighthood > > Clarke Clarke > > COLOMBO, Sri Lanka (AP) -- A British newspaper report that Arthur C. > Clarke is a pedophile is false, his spokesman said Monday, and the > science fiction writer is consulting lawyers. > > "I am outraged by the Sunday Mirror's allegations, and I am seeking > legal advise," Clarke said in a brief statement read to reporters by > his secretary, Roshan Amarasekhara. > > "Mr. Clarke is very upset by the false reports," Amarasekhara added. > > Clarke was quoted at length discussing sex with young men in the > sensationalist British newspaper's report Sunday, a day before > Prince Charles was to fly to Sri Lanka to confer the honorary > knighthood Queen Elizabeth granted the author late last year. The > prince will also take part in the former British colony's 50th > independence anniversary celebrations. > ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From bill.stewart at pobox.com Mon Feb 2 08:01:27 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 3 Feb 1998 00:01:27 +0800 Subject: Bush Gang Suspected In Assault On Presidency In-Reply-To: <34cae887.ccs@ccs.covici.com> Message-ID: <3.0.5.32.19980202074638.00875dd0@popd.ix.netcom.com> EIR is one of the mouthpieces for the Lyndon Larouche cult. I ran across them in an airport recently, and was surprised to find they're now strongly behind Bill Clinton; I'd thought that a few years ago they were accusing him of being a tool of the Tri-Lateral Commission, though perhaps it was some other group of anti-TriLateralists. At 10:22 PM 2/1/98 EST, covici at ccs.covici.com wrote: >Bush gang suspected in new assault on Presidency > >by Edward Spannaus and Jeffrey Steinberg > >In the midst of the worst global financial crisis in modern history, the >United States Presidency has come under renewed, vicious attack from a >combination of British and nominally ``American'' Bush-League circles. ... >From Executive Intelligence Review V25, #5. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From guy at panix.com Mon Feb 2 09:25:00 1998 From: guy at panix.com (Information Security) Date: Tue, 3 Feb 1998 01:25:00 +0800 Subject: SmartCards in the news Message-ID: <199802021708.MAA14789@panix2.panix.com> Also see: http://www.zdnet.com/pcweek/news/0112/12bio.html ---guy --------------------------------------------------------------------- This article is from Internet Computing (http://www.zdnet.com/icom/). Visit this page on the Web at: http://www.zdnet.com/icom/content/anchors/199802/02/smarten.net/ --------------------------------------------------------------------- [ Features ] February 02, 1998 Smart Cards Smarten the Net By Albert Pang For many contractors to the U.S. Department of Defense, the Internet will become an important ally this year, helping them resolve one of the most daunting challenges when doing business with the government: Getting paid on time and with a minimal amount of hassle. Thanks to a new breed of smart cards backed by sophisticated Web applications, 200 defense contractors will start receiving electronic checks (e-check) from the government via secure Internet e-mail through a pilot program launched in January 1998. The contractors will use their smart cards to access the mail box, validate, and endorse the checks. They will then forward the checks to BankBoston or NationsBank, the two authorized banks, that will deposit them into their accounts. The smart cards, which include digital certificates developed by GTE Cybertrust, will play a critical role in helping the defense department and other agencies comply with a mandate that requires most of the 800 million payments the government makes every year be converted to electronic form by January 1, 1999. Because of the mandate, the number of smart-card applications in different stages of development within the government has doubled to more than 900 in the past year, says Jim Hagedorn, a spokesperson for the Treasury Department. That's good news for vendors such as Anthony Caputo, chairman of Information Resource Engineering (IRE) in Baltimore, which develops the smart cards and the readers for the e-check program. "It will create a nice revenue stream," Caputo says, adding that his company has issued 100,000 smart cards to government and corporate customers mostly for use in private networks. Now with the Internet, the smart card market could grow substantially, especially in Asia and Europe. "Smart cards are the ultimate personal network computers," capable of handling everything from simple tasks such as identification to complex ones such as online banking and electronic commerce, says Philip Yen, senior vice president of chip platform at Visa International in Foster City, CA. [TABLE NOT SHOWN] Both Visa and its rival MasterCard are engaged in smart-card pilots around the world, promoting the use of stored-valued chip cards that run on private networks or the Internet. For example, AT&T Universal Card is working with Mondex, the electronic cash venture majority-owned by MasterCard, to sign up a small number of online merchants for a pilot program that will allow Internet users to buy products from them using smart cards issued by AT&T. However, analysts expect acceptance of smart cards in the United States to be slower than that in other countries because of privacy concerns, interoperability issues (Visa and MasterCard use different operating systems, for example), and the desire to put as many complex applications as possible on a single card. Albert Pang is the online editor of the Internet Computing MagaSite Send e-mail to apang at zd.com. --------------------------------------------------------------------- Copyright (c) 1998 ZDNet. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of ZDNet is prohibited. ZDNet and the ZDNet logo are trademarks of Ziff-Davis Inc. From declan at well.com Mon Feb 2 09:53:52 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 3 Feb 1998 01:53:52 +0800 Subject: A new crypto-campaign, from Time/Netly News Message-ID: ---------- Forwarded message ---------- Date: Mon, 2 Feb 1998 12:07:24 -0500 From: Declan McCullagh To: politech at vorlon.mit.edu ***** SHOULD THE GOVERNMENT READ YOUR CYBERMAIL? Time Magazine February 9, 1998 Page 20 A few years ago, ED GILLESPIE was busy orchestrating the Republican takeover of Congress as the G.O.P.'s top spinmeister. Now the man behind the Contract with America is shifting to high tech as he battles a new foe: a plan to ban software capable of encoding messages so securely that police can't crack them. A law proposed by the FBI would mandate an electronic peephole in all encryption programs so that government agents can read your files. The FBI claims this is necessary to protect against criminals. But Silicon Valley chiefs see this as a threat, and are equipping Gillespie with a multimillion-dollar lobbying and media budget. Joining him to woo Democrats is lobbyist JACK QUINN, former counsel to Bill Clinton and ex-chief of staff to Al Gore. --By Declan McCullagh/Washington ********** For details on the new encryption campaign, check out today's Netly News (netlynews.com) at: http://cgi.pathfinder.com/netly/opinion/0,1042,1722,00.html -Declan -------------------------------------------------------------------------- POLITECH -- the moderated mailing list of politics and technology To subscribe: send a message to majordomo at vorlon.mit.edu with this text: subscribe politech More information is at http://www.well.com/~declan/politech/ -------------------------------------------------------------------------- From emc at wire.insync.net Mon Feb 2 10:04:21 1998 From: emc at wire.insync.net (Eric Cordian) Date: Tue, 3 Feb 1998 02:04:21 +0800 Subject: Bush Gang Suspected In Assault On Presidency In-Reply-To: <3.0.5.32.19980202074638.00875dd0@popd.ix.netcom.com> Message-ID: <199802021755.LAA17199@wire.insync.net> Bill Stewart writes: > EIR is one of the mouthpieces for the Lyndon Larouche cult. We know what EIR is. While I wouldn't vote Larouche for President, he is a very bright economist, and the attacks by the Feds on organizations supporting him clearly demonstrate the lengths the government will go to silence its critics in our alleged democracy. I stopped getting "Fusion" magazine, to which I was subscribed, when the government seized it. > I ran across them in an airport recently, and was surprised to find > they're now strongly behind Bill Clinton; I'd thought that a few years > ago they were accusing him of being a tool of the Tri-Lateral > Commission, though perhaps it was some other group of > anti-TriLateralists. Willie ClitorisBum was groomed for a long time for his present position, by TriLateraloids, and others. That is not mutually exclusive with the notion that the conservatives have assisted in the creation of his current problems. Bush is well integrated into America's Secret Aristocracy, and has been a member of various associated oganizations since his college days. Interestingly enough, Reagan left Larouche alone when he was questioning the mental health of Dukakis, but when Larouche became critical of Reagan's foreign policy, it was quickly arranged for conservative asset William Weld to take him out with multiple grand juries in dispersed geographical locations, over small unrepaid campaign loans. With all the laws the government has, everyone is guilty of something. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From declan at well.com Mon Feb 2 10:05:57 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 3 Feb 1998 02:05:57 +0800 Subject: Airline ticket information -- help Message-ID: I'm trying to find out what airline flight someone is taking. I have a name and know the general travel plans and likely date. How can I find out the airline, flight number, and seat number? This is somewhat urgent. (You have my assurance that the purpose is legit.) If anyone has any ideas, I'd appreciate the help. Thanks, Declan From attila at hun.org Mon Feb 2 10:09:05 1998 From: attila at hun.org (Attila T. Hun) Date: Tue, 3 Feb 1998 02:09:05 +0800 Subject: Dr Dobbs crypto CD In-Reply-To: <6B5344C210C7D011835C0000F80127668B1610@exna01.securitydynamics.com> Message-ID: <19980202.165750.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980202:0940, in <6B5344C210C7D011835C0000F80127668B1610 at exna01.securitydynamics.com>, "Trei, Peter" was purported to have expostulated to perpetuate an opinion: >I called them up [...] the impression that I >was being told that the contractor was apparently >imcompetant, and could not turn in a usable master in a >timely fashion. > pure bullshit. that would have been easily enough remedied --get another contractor or invest $3K for top of the line equipment (<$1K if you dont mind fiddling) and do it yourself. there may be a problem on their part to pay for the mastering and the first press run. if that's the case, a few of us should try to acquire their publshing rights and get the job over with. >There was also some mention of the possiblity of 'legal >difficulties', though I was given no details on that. > 1) the creditor lawyers? 2) more likely the Feds under EAR since there is code on the disk and they know full well the mean time to export is <60 minutes. the first option is solvable as in the contractor problems. the second option, well... you know the drill. maybe Peter Junger would like to front this and add it to his open ended actions with the Feds? whatever... but let's DO something; anytime I can get reference material in a searchable, displayable format, I've already got my wallet open. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNYIT7R8UA6T6u61AQH7ngH9FNoXGpeUc3+xMfua6nVekESP1OxGkzRD 8m15vwBEniiW4WYj/2MEYYA5If1EdDfR76w9b2/EQketdCfmOJaHyw== =sttZ -----END PGP SIGNATURE----- From tcmay at got.net Mon Feb 2 10:27:41 1998 From: tcmay at got.net (Tim May) Date: Tue, 3 Feb 1998 02:27:41 +0800 Subject: The Continued Attack on Cash (Was: "The Right ofAnonymity"...) In-Reply-To: Message-ID: At 10:51 PM -0800 2/1/98, Black Unicorn wrote: >Mr. May said: > >>Suffice it to say that I find nearly all cases where someone is "demanding" >>personal information to be cases where the government has required them to, >>for various unseemly purposes, or in cases where credit is being arranged. > >Of late I tried to pay off a rather large American Express bill. > >Suddenly, AMEX won't take cash in excess of $1,000 in any single billing >period (30 days). The large sign on the wall indicated the substance of .... It's worth noting (again) that a very simple technological/social solution to the "credit card companies have records on people" problem, the one often cited by "privacy law advocates" as the reason for a Data Privacy Act, is easily found. Namely, remove any impediments to the issuance of credit or debit cards unlinkable to the True Name of a user. A card issuer could feature this as a Privacy Card, either backed by transfers of backing capital to accounts, or using Chaum-style methods. This is fully feasible using Chaumian credential-revealing mechanisms. (Cf. Chaum's seminal "Transaction Systems to Make Big Brother Obsolete," in Communications of the ACM, November 1985. Updated a few times and available in reprints or other places. Try search engines for latest locations.) However, the trends are in just the opposite direction, as both Black Unicorn and Bill Stewart have noted in this thread. Between the War on Drugs, the laws about money laundering, the fears of tax evasion, and the general burrowcrat desire to record the movements and actions of citizen-units, such a Privacy Card would be frowned-upon. Various roadblocks, ranging from "know your customer" restrictions on banks to anti-money-laundering laws, would be thrown up to stop any such Privacy Card. The real solution is easy. --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From tcmay at got.net Mon Feb 2 10:34:10 1998 From: tcmay at got.net (Tim May) Date: Tue, 3 Feb 1998 02:34:10 +0800 Subject: Airline ticket information -- help In-Reply-To: Message-ID: At 9:55 AM -0800 2/2/98, Declan McCullagh wrote: >I'm trying to find out what airline flight someone is taking. I have a name >and know the general travel plans and likely date. How can I find out the >airline, flight number, and seat number? This is somewhat urgent. (You have >my assurance that the purpose is legit.) > >If anyone has any ideas, I'd appreciate the help. Monica Lewinski and William Ginsburg are travelling on American Airlines Flight 420 on Wednesday, 4 February, departing Dulles Airport at 10:45 a.m., EST, and arriving LAX at 3:35 p.m., PST. Good luck reporting on them, Declan! --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From declan at well.com Mon Feb 2 10:42:33 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 3 Feb 1998 02:42:33 +0800 Subject: Airline ticket information -- help In-Reply-To: Message-ID: Hah! Assuming this IS what I'm trying to get (and confidentiality binds me from saying if it is or not), you didn't post the seat number. Keep sleuthing, Inspector May! -Declan On Mon, 2 Feb 1998, Tim May wrote: > At 9:55 AM -0800 2/2/98, Declan McCullagh wrote: > >I'm trying to find out what airline flight someone is taking. I have a name > >and know the general travel plans and likely date. How can I find out the > >airline, flight number, and seat number? This is somewhat urgent. (You have > >my assurance that the purpose is legit.) > > > >If anyone has any ideas, I'd appreciate the help. > > Monica Lewinski and William Ginsburg are travelling on American Airlines > Flight 420 on Wednesday, 4 February, departing Dulles Airport at 10:45 > a.m., EST, and arriving LAX at 3:35 p.m., PST. > > Good luck reporting on them, Declan! > > > --Tim May > > The Feds have shown their hand: they want a ban on domestic cryptography > ---------:---------:---------:---------:---------:---------:---------:---- > Timothy C. May | Crypto Anarchy: encryption, digital money, > ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero > W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, > Higher Power: 2^2,976,221 | black markets, collapse of governments. > "National borders aren't even speed bumps on the information superhighway." > > > > > From dlv at bwalk.dm.com Mon Feb 2 10:57:51 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Tue, 3 Feb 1998 02:57:51 +0800 Subject: Bush Gang Suspected In Assault On Presidency In-Reply-To: <3.0.5.32.19980202074638.00875dd0@popd.ix.netcom.com> Message-ID: Bill Stewart writes: > EIR is one of the mouthpieces for the Lyndon Larouche cult. The only remaining one that I know of. :-) I read their mailing list; it's actually interesting. He certainly was right about predicting the credit problems in the far east and their spread to Russia. > I ran across them in an airport recently, and was surprised to find > they're now strongly behind Bill Clinton; I'd thought that a few I found this so amusing that I forwarded it to the list. Yes, LaRouche likes Clinton. Also laRouche has a math ph.d. as does Ted Kachynzki. Do you know any other kookie math PhDs around here? > years ago they were accusing him of being a tool of the > Tri-Lateral Commission, though perhaps it was some other group > of anti-TriLateralists. > > At 10:22 PM 2/1/98 EST, covici at ccs.covici.com wrote: > >Bush gang suspected in new assault on Presidency > > > >by Edward Spannaus and Jeffrey Steinberg > > > >In the midst of the worst global financial crisis in modern history, the > >United States Presidency has come under renewed, vicious attack from a > >combination of British and nominally ``American'' Bush-League circles. > ... > >From Executive Intelligence Review V25, #5. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From attila at hun.org Mon Feb 2 11:03:51 1998 From: attila at hun.org (Attila T. Hun) Date: Tue, 3 Feb 1998 03:03:51 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <199802020709.BAA27402@einstein.ssz.com> Message-ID: <19980202.180706.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980202:0109, in <199802020709.BAA27402 at einstein.ssz.com>, Jim Choate was purported to have expostulated to perpetuate an opinion: >I've been doing it for many years. Don't have a checking account, don't >own a credit card. I do have a saving account with a local credit union >and go in every 3-4 days and withdraw what I need for the next 3-4 days. >Pay every bill in cash or money order. first, the use of the credit union includes your SSN and they have a total cash transaction at least on your primary expenses. if you have "consulting" income which can be converted to cash, and dont deposit it, then you can do you 'high on the hawg' living with the cash --until they bring the IRS CID along and look at your 'imputed' income which is almost indefensible in their kangaroo courts. secondly, you have not dealt with a federal case where there is implied evidence as they find a clerk in the usual store you use... [snip] >I'm going to go tomorrow and buy a new laptop at around $1500. what are you getting for $1500? out here in the boonies we dont see those kind of prices. >I intend >on paying with a wad of $100 bills. Bet you they don't look twice nor >will they ask for ID. well, in the first place, you live in Texas where the attitude to the Feds is rather strong --not as strong as our attitude in rural Utah where the usual transaction is in cash. out here, a Fed is the same as a revenuer in Eastern Kentucky or Tennessee. reminds me of the Fed approaching a child and telling him he'd give him $5 if he took him to his father (still) --the boy asked for the money up front. when the Fed asked why, the boy said: "...'cause you aint coming back". >I've actualy never had a problem paying cash, never had anyone turn real >money down... I did-- tried to lay $14K out for a Mercedes (25 years ago). they wouldnt take it. so I went and picked up two $7K cashiers from two different banks. same thing with a pair of Lycoming IO540 aircraft engines: 2 8s and a 9 --stay under the $10K transaction. of course, if you want to take care of the problem: use a chartered blind "Queens' trust over an Antilles NV, a Dutch BV, and an FL AG --of course with a friendly banker who just arranges to have the bill paid from a correspondent US bank --and who pays your European American Express card for you... need cash under $10K? use an FL bank card. Both the Antilles and Dutch banks are porous, so they remain shells paid from the bottom up. so where is digital cash? probably the most amusing article on digital cash is the Neal Stephenson article: "The Great Simolean Caper" which was in: Time Mag's Special Issue, Spring 1995 Volume 145, No. 12. yes, it presents "our" side of it, but shows the backside and obvious ammo for Freeh... it does not seem to be available on the Time server, so anyone who wants to read it: http://www.primenet.com/~attila/pages/simolean.html until we really do have a virtual country and virtual cash, they will always be able to trace it. As I understand it, the banks keep a record on anything over $1k cash which means there is a master list which can be sorted and filtered. over $10K you must fill out the IRS form; for international you are required to file Dept of the Treasury form 515. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNYWmLR8UA6T6u61AQH8+AH9Gr63vhMsfdIXXod5nBpqVzgHDqqWqNq6 sQ7LaI13D2joj9g2crHABfP37G8RnTOekaK4y5CCy1aG0Wa6PgJvDA== =3nUk -----END PGP SIGNATURE----- From ravage at ssz.com Mon Feb 2 11:16:12 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 3 Feb 1998 03:16:12 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) (fwd) Message-ID: <199802021912.NAA29247@einstein.ssz.com> Forwarded message: > From: "Attila T. Hun" > Date: Mon, 02 Feb 98 18:07:57 +0000 > Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...) > >I've been doing it for many years. Don't have a checking account, don't > >own a credit card. I do have a saving account with a local credit union > >and go in every 3-4 days and withdraw what I need for the next 3-4 days. > >Pay every bill in cash or money order. > > first, the use of the credit union includes your SSN and > they have a total cash transaction at least on your primary > expenses. Wrong. I go in once a week and pull out money in a lump sum. I then budget that money myself. The only thing they have is a sequence of deposits from paychecks and withdrawals to cash. > if you have "consulting" income which can be > converted to cash, and dont deposit it, then you can do you > 'high on the hawg' living with the cash --until they bring > the IRS CID along and look at your 'imputed' income which is > almost indefensible in their kangaroo courts. I either take the fees in check and deposit them or else take 'in kind' trade (eg I did a job if installing Win95 for a customer on some laptops he'd bought via auction. There was a Tadpole 3XP Sparcbook on there. I took it for my fee). > >I'm going to go tomorrow and buy a new laptop at around $1500. > > what are you getting for $1500? out here in the boonies > we dont see those kind of prices. Looks like a Toshiba Satellite 445CTX (133MHz Pentium). > well, in the first place, you live in Texas where the > attitude to the Feds is rather strong --not as strong as our > attitude in rural Utah where the usual transaction is in > cash. out here, a Fed is the same as a revenuer in Eastern > Kentucky or Tennessee. reminds me of the Fed approaching a > child and telling him he'd give him $5 if he took him to his > father (still) --the boy asked for the money up front. when > the Fed asked why, the boy said: "...'cause you aint coming > back". You don't know Texas or Texans very well... ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From nelson at crynwr.com Mon Feb 2 11:34:01 1998 From: nelson at crynwr.com (Russell Nelson) Date: Tue, 3 Feb 1998 03:34:01 +0800 Subject: whit diffie on national radio Message-ID: <19980202191942.113.qmail@desk.crynwr.com> FWIW, Whit Diffie is on NPR's Talk of the Nation RIGHT NOW. Find your local NPR affiliate, usually in the low end of the dial. -- -russ http://web.crynwr.com/~nelson Crynwr Software supports freed software | PGPok | Freedom is the primary 521 Pleasant Valley Rd. | +1 315 268 1925 voice | cause of Peace, Love, Potsdam, NY 13676-3213 | +1 315 268 9201 FAX | Truth and Justice. From fnorky at geocities.com Mon Feb 2 13:52:32 1998 From: fnorky at geocities.com (Douglas L. Peterson) Date: Tue, 3 Feb 1998 05:52:32 +0800 Subject: Spyking snips: Police MDT's + cia/russian spying In-Reply-To: Message-ID: <34d73c32.9887174@smtp.ix.netcom.com> On Wed, 28 Jan 1998 13:03:42 -0500 (EST), you wrote: > >2)From: "Brandon Robinson" >Subject: Re: Monitoring MDT's > >>14)From: "self destruct" < >>Subject: Monitoring MDT's >>hi all,....i am wondering if there is a way to monitor police MDT's >>(mobile display terminals) >>i have the frq. that they use but i dont know how to hook up a scanner to >>p/c. any thoughts would be appreciated thank you > >Since no one else seemed to respond to this, I guess I will...first off >M.D.T. stands for (Mobile Data Terminals), I got this posting off some >group I can't really remeber where from, but it is informative, and was >the >subject of a Feb, '97 "911Dispatcher Magazine" story. It should answer all >of your questions, I also have a list of some places where you can buy the >unit pre-made, or a kit to make your own. I have left the Source code out >on purpose as it is rather lengthy, if you want it I can send it to you. > >-BBR [BIG SNIP of story] After reading all the stuff on MDT's, a got an idea. How about a central monitoring web site (out of the US). This system would run a small server program that could accept input, via the net, from MDT monitors around the country. Each MDT monitor would collect data and send it in once every 5 minutes. A person could goto a web site and see what is going on around the country. Hmmm. Watching the watchers?? -Doug ------------------- Douglas L. Peterson mailto:fnorky at geocities.com http://www.geocities.com/SiliconValley/Heights/1271/ From Jon.Cooper at Eng.Sun.COM Mon Feb 2 14:15:24 1998 From: Jon.Cooper at Eng.Sun.COM (Jon Cooper) Date: Tue, 3 Feb 1998 06:15:24 +0800 Subject: distributed cryptographic attack demo Message-ID: hi, i'm trying to do a demo of a distributed object technology and it seems to me that many cryptographic attacks would be facilitated by our approach. do you have any ideas for what a neat distributed effort might be? the ones i've thought of just don't seem too exciting: * GNFS of RSA modulus * attacking SSL * brute-force RC5 attack i'm looking for something that would be a sort of viscerally engaging attack, something that will make people who aren't necessarily number theorists or cryptographers take note. any input would be helpful! *jon PS - note that I'm not on cypherpunks so a direct reply would be most highly appreciated. From eureka at eureka.abc-web.com Tue Feb 3 06:28:47 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Tue, 3 Feb 1998 06:28:47 -0800 (PST) Subject: Eureka! Tue Feb 3 '98 Message-ID: <19980203083236.13637.qmail@eureka.abc-web.com> Welcome to Tuesday's issue of Eureka! PINKBITS Voted the #1 Teen (18+) site on the web, this is one pay site you don't want to miss out on! Here's just one quote from a satisfied member: "This site delivers awesome value. I have been a member of 3 other sites, and this is the best by far. It has the best pics, more live video, younger girls and more hardcore cumshots than the other sites put tog- ether". And we have negotiated a special FREE trial member- ship for Eureka subscribers, so don't take our word, go see! PinkBits .. http://207.33.10.198/cgi-bin/gate1/pbm/pb_0024/0 PLEASE VISIT THIS FINE EUREKA! PARTNER SITE Playgal - No.1 in Internet Hardcore! http://www.playgal.com/playgal/banner_eureka.html Playgal presents FREE LIVE FUCKING, and over 2,000 FREE XXX MOVIES! XXX 4 EVERY 1 Overall this site looks pretty good. Click on the View Free Sample Pics to get to the good stuff. Once over that fence your in! There are thumbnails of some hot looking babes! Wet bush filled with hard dick. Not a bad combination! XXX 4 Every 1 .................... http://www.xxx4every1.com DO ME LIVE Do me too! Do this, do that and do the other. If she lets you! This is a paysite but they have a pretty juicy free picture section. Girl on girl, shaved pussy, dildo, panties, and clit rubbing images. Stroke your browser over there! Do Me Live ........................ http://www.domelive.com/ CYBERJOY Basic text links that deliver! Check out first time, that is one big black log, and she is enjoying it! Cum shots and links that will take you all over the place. See the Hungry for pussy picture. That tramp looks possessed! Take a look. Cyberjoy .......... http://www.cyberjoy.inter.net/adult3.htm ADULT CHARTS Here is one to see. Go there right now. Tons of free pix! Click on the free pictures area and your in. Take your pick of anal, cum shots, oral sex, girlgirl, teens, group action, I could go on more but you get the idea. High quality jpeg images that load quickly! These are some of the best free porno pix on the internet. Grab your mouse and get surfing! Adult Charts .................... http://www.adultcharts.com BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE Now adult surfers have our very own search engine, directly designed to only list adult sites, and so run fast because all other types of site are ignored. Check it out today! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ College teens -----> http://207.240.169.122/teens/start.html CHAT WITH OTHER READERS This chat is growing fast, and already there are a number of regulars you will meet most days. It's good to see Eureka! readers interacting with each other and having a great time! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ THE BEST PHONE SEX NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 AMATEUR SITE OF THE DAY Octavia: "Caught you looking" is the motto of this sweet 23- year-old coed's web page. She loves to show off, and claims that she gets off thinking about all the horny guys checking her out. Her photos exhibit her exhibitionist streak and are of extremely high quality. Get caught looking at Octavia - it's well worth sneaking a peak! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY T-Bone's Sex Club: T-Bone gives you a new selection of erotic stories illustrated with nasty hardcore pics! Last week was Slut Wife week... what will it be this week? Visit T-Bone and find out! ............... http://www.rawsexx.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Every day we bring you an exclusive choice pic of a famous adult porn star. And we must tell you - these pix are abso- luletly brilliant! ---> http://www.xxxadultstars.com/eureka/ GAYEUREKA! The gay newsletter is now available. You can get it here! Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/ EUREKA! TRANSLATIONS As well as English you can now choose any of these languages DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?030 Pic 2 --------------------------> http://137.39.63.229/?031 Pic 3 --------------------------> http://137.39.63.229/?032 Pic 4 --------------------------> http://137.39.63.229/?033 Pic 5 --------------------------> http://137.39.63.229/?034 Pic 6 --------------------------> http://137.39.63.229/?035 Pic 7 --------------------------> http://137.39.63.229/?036 Pic 8 --------------------------> http://137.39.63.229/?037 Pic 9 --------------------------> http://137.39.63.229/?038 Pic 10 --------------------------> http://137.39.63.229/?039 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From nobody at privacynb.ml.org Mon Feb 2 14:41:15 1998 From: nobody at privacynb.ml.org (Anonymous Sender) Date: Tue, 3 Feb 1998 06:41:15 +0800 Subject: County Mounties Spit on the 4th Amendment Message-ID: <695e7d4cd89037ab6c4e383c56f8fa6b@privacynb.ml.org> >Oh! The 4th amendment? That dusty old thing? When the scumbags >are kicking in your door which would you rather have protecting >you: a raggedy old piece of paper or a Prince George County >Mountie SWAT team in full ninja dress and the latest high-tech >law-enforcement goodies? Thought so. Cup's at the end of the >counter comrade. Have a nice day. You couldn't be talking about Prince George, Canada, could you? "Mounties" are Royal Canadian Mounted Police (RCMP), and are limited to Canada, and Disney World. From Jon.Cooper at Eng.Sun.COM Mon Feb 2 14:49:07 1998 From: Jon.Cooper at Eng.Sun.COM (Jon Cooper) Date: Tue, 3 Feb 1998 06:49:07 +0800 Subject: distributed computing Message-ID: I'm in the planning phase of a demo which should demonstrate the power of a distributed object technology which I'm working with. Any ideas for neat crypto-related distributed computation demos would be much appreciated. I've thought of: * brute forcing RC5 (lots of people are doing this already) * factoring attack on RSA modulus * Certicom's ECC challenge But I'm looking for something with more of a sort of gut-level appeal. Cracking SSL packets might be good. Hrmm. thanks for any input ... *jon From mixmaster at remail.obscura.com Mon Feb 2 15:43:38 1998 From: mixmaster at remail.obscura.com (Mix) Date: Tue, 3 Feb 1998 07:43:38 +0800 Subject: No Subject Message-ID: <199802022253.OAA27023@sirius.infonex.com> subskribe cyferpunks bill at whitehouse.gov From unicorn at schloss.li Mon Feb 2 16:14:56 1998 From: unicorn at schloss.li (Black Unicorn) Date: Tue, 3 Feb 1998 08:14:56 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) Message-ID: <3.0.3.32.19980202175241.006c95d4@schloss.li> At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote: > I did-- tried to lay $14K out for a Mercedes (25 years ago). > they wouldnt take it. so I went and picked up two $7K > cashiers from two different banks. same thing with a pair > of Lycoming IO540 aircraft engines: 2 8s and a 9 --stay > under the $10K transaction. Careful. This may well be illegal now. Structuring transactions to avoid reporting requirements is a felony. (I'm not on cpunks, mail me). From tcmay at got.net Mon Feb 2 16:51:40 1998 From: tcmay at got.net (Tim May) Date: Tue, 3 Feb 1998 08:51:40 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <3.0.3.32.19980202175241.006c95d4@schloss.li> Message-ID: At 3:52 PM -0800 2/2/98, Black Unicorn wrote: >At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote: >> I did-- tried to lay $14K out for a Mercedes (25 years ago). >> they wouldnt take it. so I went and picked up two $7K >> cashiers from two different banks. same thing with a pair >> of Lycoming IO540 aircraft engines: 2 8s and a 9 --stay >> under the $10K transaction. > >Careful. This may well be illegal now. Structuring transactions to avoid >reporting requirements is a felony. > Maybe illegal _now_, but Attila didn't say _when_. Further, even our former prosecutor, Brian, told us that prosecutions are only made when some larger crime is involved. (For example, if I made two sub-$10K deposits or withdrawals, and then later _admitted_ this was to bypass reporting requirements, *BUT* no real criminal activity or tax evasion was involved, no prosecutor in the land would bother with something so transparently trivial as this. Unless, of course, they saw an opportunity to take a thought criminal off the streets. Which is why I don't describe my financial transactions here.) > >(I'm not on cpunks, mail me). Sorry, if you want to read my words ya gotta subscribe. --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From mclow at owl.csusm.edu Mon Feb 2 17:18:10 1998 From: mclow at owl.csusm.edu (Marshall Clow) Date: Tue, 3 Feb 1998 09:18:10 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <3.0.3.32.19980202175241.006c95d4@schloss.li> Message-ID: At 3:52 PM -0800 2/2/98, Black Unicorn wrote: >At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote: >> I did-- tried to lay $14K out for a Mercedes (25 years ago). >> they wouldnt take it. so I went and picked up two $7K >> cashiers from two different banks. same thing with a pair >> of Lycoming IO540 aircraft engines: 2 8s and a 9 --stay >> under the $10K transaction. > >Careful. This may well be illegal now. Structuring transactions to avoid >reporting requirements is a felony. > Some of the reporting requirements have been changed last year from $10,000 to $750. Check out >May 21, 1997 > >SUMMARY: The Financial Crimes Enforcement Network (``FinCEN'') is >proposing to amend the regulations implementing the Bank Secrecy Act to >require money transmitters and their agents to report and retain >records of transactions in currency or monetary instruments of at least >$750 but not more than $10,000 in connection with the transmission or >other transfer of funds to any person outside the United States, and to >verify the identity of senders of such transmissions or transfers. The >proposed rule is intended to address the misuse of money transmitters >by money launderers and is in addition to the existing rule requiring >currency transaction reports for amounts exceeding $10,000. -- Marshall Marshall Clow Adobe Systems Warning: Objects in calendar are closer than they appear. From ravage at ssz.com Mon Feb 2 17:32:08 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 3 Feb 1998 09:32:08 +0800 Subject: INFO-RUSS: Israel Issues Iraq Warning (fwd) Message-ID: <199802030130.TAA30591@einstein.ssz.com> Forwarded message: >From INFO-RUSS-request at smarty.ece.jhu.edu Mon Feb 2 19:00:52 1998 Message-Id: <9802022059.AA22808 at smarty.ece.jhu.edu> Errors-To: INFO-RUSS-request at smarty.ece.jhu.edu Sender: INFO-RUSS-request at smarty.ece.jhu.edu Date: Sun, 1 Feb 1998 19:32:58 +0200 (IST) To: info-russ at smarty.ece.jhu.edu From: info-russ at smarty.ece.jhu.edu Subject: INFO-RUSS: Israel Issues Iraq Warning --------------------------------------------------------------------- This is INFO-RUSS broadcast (1200+ subscribers). Home page, information, and archives: http://psi.ece.jhu.edu/~kaplan/IRUSS/inforuss.html To post, or to subscribe/unsubscribe, mail to info-russ at smarty.ece.jhu.edu INFO-RUSS assumes no responsibility for the information/views of its users. --------------------------------------------------------------------- Reuters, Sunday February 1 3:34 PM EST Israel Issues Iraq Warning JERUSALEM (Reuters) - Prime Minister Benjamin Netanyahu Sunday reserved the option of retaliating for any Iraqi missile attack on Israel, despite assurances the United States would step in quickly to punish Iraq. "The only ones who will make decisions, the only ones who make decisions, are us and us alone," Netanyahu said in remarks on the Iraq crisis in a speech to visiting American Jews. During the 1991 Gulf war, Israel held its fire in the face of 39 Iraqi Scud missile attacks, bowing to U.S. pressure not to take action that could push Arab states out of a U.S.-led alliance to drive Iraq out of Kuwait. On a visit to Israel Sunday, U.S. Secretary of State Madeleine Albright spoke of a U.S. "iron-clad commitment" to Israel's security and gave notice any Iraqi threat to countries in the region in the current crisis would not go unpunished. "If they do threaten their neighbors or do damage to them our response to it will be swift and forceful," she said. But in apparent reply, Netanyahu said in his speech: "One thing has to be understood -- that we will do whatever is necessary to defend Israel and strengthen Israel's national security." He said Israelis should view the Iraqi crisis "calmly because there is a government here that handles matters professionally and with reason." Netanyahu spoke after convening cabinet ministers to discuss the possibility that a U.S. assault on Iraq would push Baghdad to launch missiles against Israel tipped with biological weapons. After the session, Deputy Defense Minister Silvan Shalom declined to comment on the deliberations but he said earlier that Israelis were thronging to army distribution centers to exchange old gas masks. Israel's Ha'aretz newspaper reported Sunday the United States had agreed in principle to send Israel vaccines against anthrax and other biological agents Iraq is believed to possess. The newspaper report, attributed to U.S. sources, said Israeli leaders asked Washington to store hundreds of thousands of doses of the vaccines in Israel. Asked if Israel had ordered the vaccines, Defense Minister Yitzhak Mordechai told reporters: "Some things are done in coordination between us and the United States to be able to defend ourselves today and in the future against the possibility that non-conventional weapons will be possessed by someone who wants to endanger us." Israeli officials have said the probability was low that Iraq would launch a strike but authorities have made clear they are preparing for the worst. The United States is rallying support from allies for a possible attack on Iraq to punish President Saddam Hussein for not complying with U.N. arms inspectors searching for documents and materials related to its weapons programs. Iraq says it has no nuclear, chemical or biological weapons or ballistic missiles -- banned under terms of the cease-fire that ended the Gulf War in which U.S.-led forces drove Iraqi troops out of Kuwait. ---------------------------------------------------------------------------- From nobody at REPLAY.COM Mon Feb 2 17:42:41 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 3 Feb 1998 09:42:41 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <199802020709.BAA27402@einstein.ssz.com> Message-ID: <199802030132.CAA01785@basement.replay.com> Attila T. Hun wrote: > until we really do have a virtual country and virtual > cash, they will always be able to trace it. As I > understand it, the banks keep a record on anything over > $1k cash which means there is a master list which can > be sorted and filtered. over $10K you must fill out the > IRS form; for international you are required to file > Dept of the Treasury form 515. Ironically, the reglations may be their own undoing here. It seems most banks have decided to recoup the expense of all that paperwork by charging per-transaction ATM fees. And customers hate transaction fees, so they tend to take out as much money as possible each time they use the ATM. From ravage at ssz.com Mon Feb 2 17:49:58 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 3 Feb 1998 09:49:58 +0800 Subject: VMM question - reply (fwd) Message-ID: <199802030146.TAA30693@einstein.ssz.com> Forwarded message: > Date: Mon, 02 Feb 1998 01:39:47 -0600 > From: Lenny Blumberg > Subject: VMM question - reply > Hmmmm..... > I would imagine that the OS would keep a disk map in memory and > mark it with a flag to indicate if it's been paged into memory. This is a function of the "Look Aside Buffer" and the actual operation is a bit more complicated. The vmm must keep up with which processes have it mapped, where in their indipendant memory maps it shows up at, what the status is in each of those maps, whether it's sharable or not (though the Linux vmm doesn't seem to do any write locking), and probably some functions that I've missed. > At > that point, instead of updating the disk drive - It looks up the page in > memory and updates that copy. There are two ways to do this in general... Write-through: means the vmm goes ahead and not only updates the vmm copy but the copy on the drive. Note that this may or may not actualy update other copies if a process has one that isn't sharable (ie has its own private copy). This has a lot of over-head in that there is lots of i/o. Write-back: means that the data in the individual pages doesn't get written to the drive until the page is either swapped out of active memory (and written to swap) or is closed. This is a form of 'lazy propogation'. Again, this doesn't address how other processes may have their images effected. > The only problem is that at that point, > you're now running into a mess of lock problems that carry their own > overhead. One easy way, at least on a Unix machine, is to keep the system clock setting when the page is created. Then close them in chronological sequence. This obviously has it's problems. The first person to open isn't guaranteed to be the first person done. Another method would be to select via a PRNG the 'first' process to update the page. Then each following would take their turn according to the spin of the wheel. This leaves us with two options, as each process closes it only writes the changes that it has made; which could overwrite the previous user if they edited the same part of the file. The alternative would be to force each user to create a different file with some filename convention to differentiate them. Then leave it up to some unknown method to arbitrate the file propogations at that point by some 'compare and share' method perhaps. > Another alternative would be to track the disk map and force a > write for a page that is pending a read. How do you know ahead of a read that a process is going to read that page? Or are you saying that before another process can open a file we force the first process to go ahead and write its changes? What happens once two or more have the page mapped and begin editing? How do you propose to manage the file closure writes that will occur? ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From remailer at htp.org Mon Feb 2 18:01:03 1998 From: remailer at htp.org (Anonymous) Date: Tue, 3 Feb 1998 10:01:03 +0800 Subject: Bush Gang Suspected In Assault On Presidency In-Reply-To: Message-ID: <19980203014502.13306.qmail@nsm.htp.org> dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) writes: > Also laRouche has a math ph.d. as does Ted Kachynzki. Do you know any > other kookie math PhDs around here? I heard a certain Dr. Vulis got his degree in mathematics. From otoole at lcs.mit.edu Mon Feb 2 18:17:38 1998 From: otoole at lcs.mit.edu (James O'Toole) Date: Tue, 3 Feb 1998 10:17:38 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) Message-ID: <01BD301E.4FCC8EC0@slip-james.lcs.mit.edu> Tim, Maintaining anonymity in the face of the regulatory framework is certain to be difficult, and anything difficult is usually rare, expensive, or both. An interesting question about the Privacy Card product is whether the social pressure against it is strong enough to defeat its privacy whenever the product is well advertised. In other words, will a privacy product survive in spite of its own publicity in our current environment, or can privacy products only exist when their own existence is relatively unknown. This is interesting because in the latter case, we have only a very very weak form of privacy/anonymity because it is hard to be sure how much privacy backs a product whose very existence is semi-secret. Maybe we should consider putting up, and encouraging existing privacy-enhanced institutions to put up, challenge prizes based on privacy/anonymity preservation. Just as we've seen prizes set for the cracking of specific composites and encrypted messages, we could ask Credit Suisse to put $1M in an escrow account at their main branch (Zurich?). This escrow account would be a numbered account held by a trustee selected by the bank. Let's say they wire $1000 per week to RSA Data Security in California, or to EFF.ORG, or to me, for that matter, and I wire it back. I publish the full text of any documentation I can get from my bank account (an empty account I would maintain for this anonymity challenge). Credit Suisse would promise to release the contents of the account to the first person to arrive at their main branch and present the name of the trustee. That's not a very creative challenge...this could use more thought. The point is that as far as I know, we haven't yet seen any really solid rewards placed to validate, advertise, or demonstrate the weakness of, well-known privacy-enhanced financial systems. I don't even know that Digicash, which would be another logical sponsor, has put up such a challenge. Have they? --Jim ---------- From: Tim May[SMTP:tcmay at got.net] Sent: Monday, February 02, 1998 1:18 PM To: Black Unicorn Cc: rotenberg at epic.org; nym at vorlon.mit.edu; dcsb at ai.mit.edu; cypherpunks at Algebra.COM Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...) At 10:51 PM -0800 2/1/98, Black Unicorn wrote: >Mr. May said: > >>Suffice it to say that I find nearly all cases where someone is "demanding" >>personal information to be cases where the government has required them to, >>for various unseemly purposes, or in cases where credit is being arranged. > >Of late I tried to pay off a rather large American Express bill. > >Suddenly, AMEX won't take cash in excess of $1,000 in any single billing >period (30 days). The large sign on the wall indicated the substance of .... It's worth noting (again) that a very simple technological/social solution to the "credit card companies have records on people" problem, the one often cited by "privacy law advocates" as the reason for a Data Privacy Act, is easily found. Namely, remove any impediments to the issuance of credit or debit cards unlinkable to the True Name of a user. A card issuer could feature this as a Privacy Card, either backed by transfers of backing capital to accounts, or using Chaum-style methods. This is fully feasible using Chaumian credential-revealing mechanisms. (Cf. Chaum's seminal "Transaction Systems to Make Big Brother Obsolete," in Communications of the ACM, November 1985. Updated a few times and available in reprints or other places. Try search engines for latest locations.) However, the trends are in just the opposite direction, as both Black Unicorn and Bill Stewart have noted in this thread. Between the War on Drugs, the laws about money laundering, the fears of tax evasion, and the general burrowcrat desire to record the movements and actions of citizen-units, such a Privacy Card would be frowned-upon. Various roadblocks, ranging from "know your customer" restrictions on banks to anti-money-laundering laws, would be thrown up to stop any such Privacy Card. The real solution is easy. --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." For help on using this list (especially unsubscribing), send a message to "dcsb-request at ai.mit.edu" with one line of text: "help". From jkwilli2 at unity.ncsu.edu Mon Feb 2 18:23:18 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Tue, 3 Feb 1998 10:23:18 +0800 Subject: Hacker group battles child porn [c|net News, 2/2/98] Message-ID: Hacker group battles child porn C|NET News.Com News Story: http://www.news.com/News/Item/0,4,18717,00.html?st.cn.fd.tkr.news CNET Radio Interview: http://www.news.com/Radio/Index/0,55,,00.html?st.cn.fd.tb.ne By Courtney Macavinta February 2, 1998, 1:10 p.m. PT A secret society that hunts the Net to reveal the identities of alleged pedophiles and child pornographers has a message for those who think there's too much media hype about the problem: Believe what you hear. Members of a group called Ethical Hackers Against Pedophilia (EHAP - http://www.hackers.com/ehap/index2.htm) are using their high-tech cracking talents to find out the identity and physical location of people they say post child pornography within newsgroups, chat rooms, and Websites. The 17-member nonprofit group also says it tries to determine the sources of video streaming sites that feature children being sexually assaulted in real time. "The pedophiles that are distributing child pornography online are skirting the law by remaining anonymous. We decided to use the skills that we possess as hackers, engineers, and teachers to educate the public that hackers aren't all bad guys, and to help law enforcement in apprehending the child pornographers," said EHAP's secretary, "Oracle," who asked that his real name not be published. "As long as the people are arrested and the kids aren't hurt anymore, every one of us is willing to accept responsibility for our actions as long as one kid is helped," he added. EHAP may go so far as to dig up the Social Security numbers of people it suspects are producing and distributing child porn on the Net. Under the guise of a confidential informant, EHAP then passes on these details to various law enforcement agencies, such as the FBI. It's virtually impossible to know if EHAP's tips have led to any investigations or arrests, though the group says its information has been put to work. Still, its vigilante tactics raise privacy concerns, as well as serious questions about law enforcement's possible use of information that could have been obtained illegally. According to the FBI, the Net increasingly is being used to lure children to physical meetings, which could lead to abduction or abuse, and there has been a boom in child pornography being trafficked online. These acts violate federal law. During two congressional hearings last year, FBI officials told lawmakers they are working to stop the rise in these illegal acts through the bureau's Crimes Against Children initiative. "The FBI has investigated more than 70 cases involving pedophiles traveling to meet undercover agents or officers posing as juveniles for the purpose of engaging in an illicit sexual relationship," Stephen Wiley, chief of the FBI's violent crime and major offenders section, testified in November before the House Judiciary Subcommittee on Crime. The FBI has launched other special programs, such as Innocent Images, in which agents go online and portray themselves as children and crack down on those who solicit encounters with them. The program, which is run by the Baltimore, Maryland, FBI field office, also serves as a clearinghouse for tips and information regarding suspected online crimes against children. The program was started in 1994 after local agents uncovered an online child porn ring while searching for an abducted boy. The 13-year-old boy, George Burdynski of Prince Georges County, Maryland, has never been found. But the program has lead to more than 90 arrests as well as the development of online crime fighting techniques. For instance, in October, three Californians were collectively sentenced to 60 years in prison for running the so-called Orchid Club, an international service that used the Net to distribute child pornography to its members. Despite growing efforts by the FBI and organizations such as the National Center for Missing and Exploited Children, EHAP says its private campaign is vital, as these agencies don't have the full-time resources to combat online child pornography. EHAP also readily admits that it would be unconstitutional for law enforcement to use some of its methods. "We're extremely careful about who we hack. There are so many people trading child porn out there, but we go after the people who are producing the material. That's who we hunt," Oracle said. "Law enforcement are restricted in ways we're not--but I'm not saying that we break the law." EHAP is not the first group to use its own devices in an effort to assist law enforcement in tracking down people who they suspect use the Net to perpetrate crimes. For example, a worldwide network of Internet users known as the CyberAngels provide online safety tips and work with law enforcement to stop the trading of online pornography. Other Net users have been known to shut down chat rooms or flame those who they deem pedophiles or sexual predators. CyberAngels doesn't support the electronic harassment of others. EHAP keeps its methods confidential. "Although we would appreciate any information these individuals may have, to violate the law to get the information is not acceptable," said George Grotz, a spokesman for the FBI's San Francisco office. "But how many pedophiles would come to us and say their site had been broken into?" Still, the FBI and other child protection agencies say they need all the help they can get. "Here in the San Francisco office, we have neither the time or resources to surf the Net looking for child pornography," Grotz added. "That said, we do respond aggressively when information is brought to our attention from outside sources, or if we develop information during the process of another investigation." The National Center for Missing and Exploited Children, which is supported by the Justice Department, also expanded its efforts to encompass online activity. As announced in December at the White House-endorsed Children's Internet Summit in Washington, the center will launch a Web site on March 1 to collect tips regarding online child porn and suspected crimes against children. "It's a huge problem that is as new as the Internet. For law enforcement, it's not easy to handle," Todd Mitchell, program advocate for the exploited child unit, said today. "Parents can't leave their child in front of a computer for hours and hours where they can stumble upon pornography or be solicited in a chat room. They have to teach their kids some safety guidelines," he said. Regarding private citizens' groups such as EHAP and CyberAngels, he said there are legitimate concerns, but that community activism is needed. "If they work in conjunction with law enforcement, it can be something that is a nice partnership between law enforcement and the community. If they take the law into their own hands, it could do more harm that good," Mitchell said. [EOF] -- For more information about EHAP, go to http://www.hackers.com/ehap/index2.htm or send email to ehap at hackers.com Regards, TATTOOMAN Vice President of Ethical Hackers Against Pedophilia http://www.hackers.com/ehap/ ehap at hackers.com http://152.7.11.38/~tattooman/ From tcmay at got.net Mon Feb 2 18:25:53 1998 From: tcmay at got.net (Tim May) Date: Tue, 3 Feb 1998 10:25:53 +0800 Subject: The Continued Attack on Cash (Was: "The Right ofAnonymity"...) In-Reply-To: <01BD301E.4FCC8EC0@slip-james.lcs.mit.edu> Message-ID: At 6:01 PM -0800 2/2/98, James O'Toole wrote: >Tim, > >Maintaining anonymity in the face of the regulatory framework is certain >to be difficult, and anything difficult is usually rare, expensive, or >both. ??? >An interesting question about the Privacy Card product is whether the >social pressure against it is strong enough to defeat its privacy whenever >the product is well advertised. In other words, will a privacy product >survive in spite of its own publicity in our current environment, or can >privacy products only exist when their own existence is relatively >unknown. This is interesting because in the latter case, we have only a >very very weak form of privacy/anonymity because it is hard to be sure how >much privacy backs a product whose very existence is semi-secret. If a Privacy Card is legal, and can be issued by Visa, Mastercard, American Express, Discover, or some new issuer, and if merchants sign on (as would presumably be the case by default with Visa and so on), then what is the "social pressure" you speak of? Corporate cards are already widely accepted...most of you probably have a card issued to you through your employing institution. I see no "social pressure" to block usage of my Institute of Applied Ontology corporate AmEx card. The real roadblock is that government makes such privacy-protecting measures either difficult or illegal. --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From nobody at REPLAY.COM Mon Feb 2 18:54:41 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 3 Feb 1998 10:54:41 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: Message-ID: <199802030242.DAA10101@basement.replay.com> Tim May wrote: > The real solution is easy. Easier said than done. Designing digital cash software is easy. (Several prototypes exist.) Getting people to accept it as having value is not. But let's suppose that we build a complete fault-tolerant digital cash system with multiply-redunant servers all over the world, and you can sit at your computer and trade crypto-credits with whoever you want. You've got a small fortune worth of e$. What are you going to buy with it? Seriously. Are you going to buy groceries at the local supermarket with cypherbucks? I doubt it. Surely you can't use the system to pay for your house or car, or other government-traceable assets. And certainly not airline tickets. Perhaps you could buy a new computer. That would work, if you could arrange delivery anonymously (which I doubt). Or maybe you could pick it up in person, but you don't need e-cash for that. About the only practical thing you could buy would be a pre-paid phone card. Anything else, you'd need to arrange delivery for, and if you can have contraband mailed to you, then you can have other things that you don't want sent to you. The problem is not digital cash. The problem is delivering the goods bought with it. Solve the delivery problem and digital cash will follow. From kent at songbird.com Mon Feb 2 19:26:37 1998 From: kent at songbird.com (Kent Crispin) Date: Tue, 3 Feb 1998 11:26:37 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <3.0.3.32.19980202175241.006c95d4@schloss.li> Message-ID: <19980202191736.02027@songbird.com> On Mon, Feb 02, 1998 at 04:46:19PM -0800, Tim May wrote: > At 3:52 PM -0800 2/2/98, Black Unicorn wrote: > >At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote: > >> I did-- tried to lay $14K out for a Mercedes (25 years ago). > >> they wouldnt take it. so I went and picked up two $7K > >> cashiers from two different banks. same thing with a pair > >> of Lycoming IO540 aircraft engines: 2 8s and a 9 --stay > >> under the $10K transaction. > > > >Careful. This may well be illegal now. Structuring transactions to avoid > >reporting requirements is a felony. > > > > Maybe illegal _now_, but Attila didn't say _when_. Further, even our former > prosecutor, Brian, told us that prosecutions are only made when some larger > crime is involved. > > (For example, if I made two sub-$10K deposits or withdrawals, and then > later _admitted_ this was to bypass reporting requirements, *BUT* no real > criminal activity or tax evasion was involved, no prosecutor in the land > would bother with something so transparently trivial as this. Unless, of > course, they saw an opportunity to take a thought criminal off the streets. > Which is why I don't describe my financial transactions here.) > > > > > >(I'm not on cpunks, mail me). > > Sorry, if you want to read my words ya gotta subscribe. That's precisely his point,isn't it? -- Kent Crispin "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From dlv at bwalk.dm.com Mon Feb 2 19:29:01 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Tue, 3 Feb 1998 11:29:01 +0800 Subject: Bush Gang Suspected In Assault On Presidency In-Reply-To: <19980203014502.13306.qmail@nsm.htp.org> Message-ID: Anonymous writes: > dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) writes: > > > Also laRouche has a math ph.d. as does Ted Kachynzki. Do you know any > > other kookie math PhDs around here? > > I heard a certain Dr. Vulis got his degree in mathematics. You heard right. And you know what oranization is by far the biggest employer of math phds... --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From tcmay at got.net Mon Feb 2 19:35:51 1998 From: tcmay at got.net (Tim May) Date: Tue, 3 Feb 1998 11:35:51 +0800 Subject: The Continued Attack on Cash (Was: "The Right ofAnonymity"...) In-Reply-To: Message-ID: At 6:42 PM -0800 2/2/98, Anonymous wrote: >Tim May wrote: >> The real solution is easy. > > >Easier said than done. > >Designing digital cash software is easy. (Several prototypes exist.) >Getting people to accept it as having value is not. The thrust of my arguments, in my several posts in this thread, has been simply removing the laws which require True Names to be attached to transactions, bank account, credit cards, etc. No digital cash is needed. The rest of Mr. Anonymous' argument is a straw man, based on the difficulty of implementing digital cash. When I say the real solution is easy, I mean it. Get rid of the laws telling people how often and in what amounts they may take money out of their bank account, get rid of laws telling banks they must narc out customers who remove "too much" money, and get rid of any laws restricting the use of names customers and their financial partners may use. (BTW, until these actions happen, no widespread use of digital cash is likely to be accepted as legal. This has a lot to do, I think, with why d.c. projects are moving so slowly.) --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From guy at panix.com Mon Feb 2 19:57:49 1998 From: guy at panix.com (Information Security) Date: Tue, 3 Feb 1998 11:57:49 +0800 Subject: Bush Gang Suspected In Assault On Presidency Message-ID: <199802030341.WAA06374@panix2.panix.com> > From cypherpunks-errors at toad.com Mon Feb 2 22:33:28 1998 > > Anonymous writes: > > > dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) writes: > > > > > Also laRouche has a math ph.d. as does Ted Kachynzki. Do you know any > > > other kookie math PhDs around here? > > > > I heard a certain Dr. Vulis got his degree in mathematics. > > You heard right. And you know what oranization is by far the biggest > employer of math phds... The Neurotic Society of Assholes. ---guy [Vulis replied to himself (what a loser!), I couldn't help myself] From nobody at REPLAY.COM Mon Feb 2 20:12:43 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 3 Feb 1998 12:12:43 +0800 Subject: Airline ticket information -- help In-Reply-To: Message-ID: <199802030405.FAA19763@basement.replay.com> Tim May wrote: > Monica Lewinski and William Ginsburg are travelling on American Airlines > Flight 420 on Wednesday, 4 February, departing Dulles Airport at 10:45 > a.m., EST, and arriving LAX at 3:35 p.m., PST. > > Good luck reporting on them, Declan! I assume Tim is joking here, but this info really isn't too hard to find. Just as an example, call USAir at 1-800-428-4322, press 1 for automated service. It will give you options to check scheduled flights and departure times. After you find the flight number, select the option to confirm your reservation or select a seat. It will ask for your frequent flyer account number, but if you don't enter one, the helpful computer will let you enter the passenger's last name instead. Several other airlines have similar services.. Happy hunting! From nobody at REPLAY.COM Mon Feb 2 20:17:27 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 3 Feb 1998 12:17:27 +0800 Subject: Bork Message-ID: <199802030402.FAA19488@basement.replay.com> Once-a, zeere-a ves thees keed vhu, tuuk, a treep tu seengepure-a, und bruooght elung hees sprey peeent.... Und vhee.... he-a feenelly ceme-a beck. He-a, hed... cune-a merks ell oofer hees buttum.... he-a seeed thet is ves frum vhere-a zee verdee vhecked it su... herd..... Bork Bork Bork! From ghio at temp0207.myriad.ml.org Mon Feb 2 20:42:32 1998 From: ghio at temp0207.myriad.ml.org (Matthew Ghio) Date: Tue, 3 Feb 1998 12:42:32 +0800 Subject: Jim Bell Update Message-ID: <199802030430.XAA29097@myriad> Jim Bell wrote: > "I think that one last (temporary) hope for government is to delay AP. > Chances are good that the "think tank" decided thatt the best way to delay > AP is to discredit me, its author. It was a desperate gamble, particularly > because the act of harrassing me automatically gives AP more publicity. > That's the reason they will fail; the more they try to "get" me, the worse > it will be for them." The government already has plans for dealing with AP (what do you think all those secret service guys in DC are supposed to be doing?) Whether AP is inevitable or not, if people don't know where you are, they can't come kill you. This is why privacy is so important in the digital era. Of course, there are still nukes, but as has been pointed out already many times, the use of a nuclear weapon is likely to kill more friends than enemies. From ravage at ssz.com Mon Feb 2 21:37:29 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 3 Feb 1998 13:37:29 +0800 Subject: Memory Management (fwd) Message-ID: <199802030535.XAA32230@einstein.ssz.com> Forwarded message: > Date: Mon, 02 Feb 1998 23:01:16 -0600 > From: Stu Green > Subject: Re: Memory Management > > > I would imagine that the OS would keep a disk map in memory and > > > mark it with a flag to indicate if it's been paged into memory. > > > > This is a function of the "Look Aside Buffer" and the actual operation is a > > bit more complicated. > Jim - I'm familiar with the 'translation look aside'buffers > on > RISC chips, especially on the MIPS where it provides a > method > of managing cache flushes and reloads on writes and does act > like a page fault to intiate the writes. I haved seen TLBs > associated with disk operations, but that don't mean shit to > a > tree. It turns out, I've been doing more reading on vmm on NT, that the model that's implimented in NT is a hybrid of the MIPS 4000 model and the 386 model. That rationale is that this allows the actual code in the HAL to be much smaller by taking advantage of the different hardware aspects of the cpu architetures (this means speed). Don't know if I am going to get this right since I still haven't figured out all the intricacies. But this is what I *think* is going on (in NT)... The TLB (Translation Lookaside Buffer) is used in NT to determine if the page frame is currently in memory or swapped out. It does this by marking a frame 'invalid' if it's swapped out and listing it's actual page frame number if it's a valid page. Invalid does *not* mean that it can't still be in memory. The reason is that each process has a 'Page Frame Directory' which lists all the valid Page Table Pages for that process. Each of these Page Table Pages lists where each Page Frame Page is within that processes memory map (and that's a whole nother issue with various parts being pageable and non-pageable as well as system or user level). Each Page Frame Page knowns where the individual pages are (ie in memory or swapped out). There is a rather tedious mechanism that translates the virtual addresses to PFD's, PTP's, and finaly to PFP's. That's what I'm trying to get a handle on now. Now these various page related structures get quite big and themselves need to be swapped out. So there is a level of recursion in here. There is also a Page Table Page structure called a 'Prototype PTE Address' (a PTE is a Page Table Entry - ie a valid page frame, these things seem to have several different names making it confusing to follow at times) which is used to allow processes to share a PTE across PFD's. Once we get to a PTE we actualy have a 4k chunk of code or data that a cpu can operate on/with. So, there is where I'm at right now... Hope that makes it clear as mud. Naslajdyatciya! ps. I am enjoying my Toshiba 445CDX, it's a pretty cool machine. Anyone got any suggestions on a PCMCIA ethernet card? pss. Next Saturday is the 1st Saturday in Feb. so the Dallas 1st. Saturday Sale will be going on. Anyone interested? It's basicaly about 20 sq. blocks of computer equipment of every make, model, and age imaginable as well as lots of other stuff (time before last some guy had Cobra Helicopter IR cameras for $500 ea., would make a great IR telescope.). We usualy leave Saturday morning around 2am and get there a bit before 7am. The sale usualy starts about midnite Friday nite and goes until Saturday evening. The best deals are early Saturday morning (my experience over about 5 years of going anyway). ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From anon at anon.efga.org Mon Feb 2 21:54:41 1998 From: anon at anon.efga.org (Anonymous) Date: Tue, 3 Feb 1998 13:54:41 +0800 Subject: Airline ticket information -- help Message-ID: > Just as an example, call USAir at 1-800-428-4322, press 1 for automated > service. It will give you options to check scheduled flights and > departure times. After you find the flight number, select the option to > confirm your reservation or select a seat. It will ask for your frequent > flyer account number, but if you don't enter one, the helpful computer > will let you enter the passenger's last name instead. I figured you could probably BS such info out of a helpful customer service agent, but this is just too fucking easy. Now I know why Kaczynski wanted to bomb all those airlines and computer companies. I wish he'd gotten these idiots. From nobody at REPLAY.COM Mon Feb 2 22:36:29 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 3 Feb 1998 14:36:29 +0800 Subject: Exon oxen gored Message-ID: <199802030625.HAA07572@basement.replay.com> Exon and his ilk have loose bowels and bladder control problems. They shit all over the populace and urinate all over the Constitution. From honig at otc.net Mon Feb 2 23:25:42 1998 From: honig at otc.net (David Honig) Date: Tue, 3 Feb 1998 15:25:42 +0800 Subject: distributed cryptographic attack demo In-Reply-To: Message-ID: <3.0.5.32.19980202230929.007e1a30@otc.net> At 01:28 PM 2/2/98 -0800, Jon Cooper wrote: >hi, > >i'm trying to do a demo of a distributed object technology and it seems >to me that many cryptographic attacks would be facilitated by our >approach. > Oh, you mean like Counterpane's screen saver or the various international key cracking escapades. Well, duh. Want to impress the masses? Order "The joy of sex" using Clinton's mastercard and forward complete documentation to the Wash Post. David Honig honig at alum.mit.edu --------------------------------------------------- If we can prevent the government from wasting the labours of the people under the pretense of caring for them, they will be happy. -TJ From MAILER-DAEMON at chemistry.ohio-state.edu Tue Feb 3 15:35:50 1998 From: MAILER-DAEMON at chemistry.ohio-state.edu (Mail Delivery Subsystem) Date: Tue, 3 Feb 1998 15:35:50 -0800 (PST) Subject: Returned mail: Host unknown (Name server: eureka.abc-web.co: host not found) Message-ID: <199802032335.SAA06316@chemistry.mps.ohio-state.edu> The original message was received at Tue, 3 Feb 1998 18:35:44 -0500 (EST) from ts14-8.homenet.ohio-state.edu [140.254.113.47] ----- The following addresses had permanent fatal errors ----- ----- Transcript of session follows ----- 550 ... Host unknown (Name server: eureka.abc-web.co: host not found) Reporting-MTA: dns; chemistry.mps.ohio-state.edu Received-From-MTA: DNS; ts14-8.homenet.ohio-state.edu Arrival-Date: Tue, 3 Feb 1998 18:35:44 -0500 (EST) Final-Recipient: RFC822; eureka-unsubscribe at eureka.abc-web.co Action: failed Status: 5.1.2 Remote-MTA: DNS; eureka.abc-web.co Last-Attempt-Date: Tue, 3 Feb 1998 18:35:47 -0500 (EST) To: eureka-unsubscribe at eureka.abc-web.co Subject: Re: Eureka! Tue Feb 3 '98 From: Cypherpunks at toad.com Date: Tue, 06 Jan 1998 01:54:08 -0800 Welcome to Tuesday's issue of Eureka! PINKBITS Voted the #1 Teen (18+) site on the web, this is one pay site you don't want to miss out on! Here's just one quote from a satisfied member: "This site delivers awesome value. I have been a member of 3 other sites, and this is the best by far. It has the best pics, more live video, younger girls and more hardcore cumshots than the other sites put tog- ether". And we have negotiated a special FREE trial member- ship for Eureka subscribers, so don't take our word, go see! PinkBits .. http://207.33.10.198/cgi-bin/gate1/pbm/pb_0024/0 PLEASE VISIT THIS FINE EUREKA! PARTNER SITE Playgal - No.1 in Internet Hardcore! http://www.playgal.com/playgal/banner_eureka.html Playgal presents FREE LIVE FUCKING, and over 2,000 FREE XXX MOVIES! XXX 4 EVERY 1 Overall this site looks pretty good. Click on the View Free Sample Pics to get to the good stuff. Once over that fence your in! There are thumbnails of some hot looking babes! Wet bush filled with hard dick. Not a bad combination! XXX 4 Every 1 .................... http://www.xxx4every1.com DO ME LIVE Do me too! Do this, do that and do the other. If she lets you! This is a paysite but they have a pretty juicy free picture section. Girl on girl, shaved pussy, dildo, panties, and clit rubbing images. Stroke your browser over there! Do Me Live ........................ http://www.domelive.com/ CYBERJOY Basic text links that deliver! Check out first time, that is one big black log, and she is enjoying it! Cum shots and links that will take you all over the place. See the Hungry for pussy picture. That tramp looks possessed! Take a look. Cyberjoy .......... http://www.cyberjoy.inter.net/adult3.htm ADULT CHARTS Here is one to see. Go there right now. Tons of free pix! Click on the free pictures area and your in. Take your pick of anal, cum shots, oral sex, girlgirl, teens, group action, I could go on more but you get the idea. High quality jpeg images that load quickly! These are some of the best free porno pix on the internet. Grab your mouse and get surfing! Adult Charts .................... http://www.adultcharts.com BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE Now adult surfers have our very own search engine, directly designed to only list adult sites, and so run fast because all other types of site are ignored. Check it out today! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ College teens -----> http://207.240.169.122/teens/start.html CHAT WITH OTHER READERS This chat is growing fast, and already there are a number of regulars you will meet most days. It's good to see Eureka! readers interacting with each other and having a great time! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ THE BEST PHONE SEX NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 AMATEUR SITE OF THE DAY Octavia: "Caught you looking" is the motto of this sweet 23- year-old coed's web page. She loves to show off, and claims that she gets off thinking about all the horny guys checking her out. Her photos exhibit her exhibitionist streak and are of extremely high quality. Get caught looking at Octavia - it's well worth sneaking a peak! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY T-Bone's Sex Club: T-Bone gives you a new selection of erotic stories illustrated with nasty hardcore pics! Last week was Slut Wife week... what will it be this week? Visit T-Bone and find out! ............... http://www.rawsexx.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Every day we bring you an exclusive choice pic of a famous adult porn star. And we must tell you - these pix are abso- luletly brilliant! ---> http://www.xxxadultstars.com/eureka/ GAYEUREKA! The gay newsletter is now available. You can get it here! Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/ EUREKA! TRANSLATIONS As well as English you can now choose any of these languages DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?030 Pic 2 --------------------------> http://137.39.63.229/?031 Pic 3 --------------------------> http://137.39.63.229/?032 Pic 4 --------------------------> http://137.39.63.229/?033 Pic 5 --------------------------> http://137.39.63.229/?034 Pic 6 --------------------------> http://137.39.63.229/?035 Pic 7 --------------------------> http://137.39.63.229/?036 Pic 8 --------------------------> http://137.39.63.229/?037 Pic 9 --------------------------> http://137.39.63.229/?038 Pic 10 --------------------------> http://137.39.63.229/?039 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From nobody at REPLAY.COM Tue Feb 3 00:19:02 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 3 Feb 1998 16:19:02 +0800 Subject: Inquiry Message-ID: <199802030745.IAA15801@basement.replay.com> Dimitri "Buttfuck" Vulis' reheated, refurbished, and regurgitated cud is completely inappropriate for the mailing lists into which it is cross-ruminated. ,,, -ooO(o o)Ooo- Dimitri "Buttfuck" Vulis (_) From MAILER-DAEMON at toad.com Tue Feb 3 16:46:22 1998 From: MAILER-DAEMON at toad.com (MAILER-DAEMON at toad.com) Date: Tue, 3 Feb 1998 16:46:22 -0800 (PST) Subject: Liquidation Message-ID: <199801260457.WAA04312@quick.notfalse.com> Forwarding this message to you because I thought the following 3 items would be of real interest to you. I wanted to get it out to you ASAP. This information is only going to be available for a few more days. Deal is, right now, you can get still it for free. Here is what you can get: 1) The contact names and private phone number of a company that is PAYING CASH for unwanted used material handling equipment. This company is one of the largest used equipment BUYERS in the nation and even pays finders fees. 2) Wouldn't it be nice to save as much as 80% on items you're probably buying at full retail currently? We've uncovered the Web address to one of the Internet's top "Liquidation Specials of the Month" web site . Now you'll have the insider's track on buying at wholesale like the pros do. It's really a cool site! But don't take my word for it, check it out for yourself. 3) Get the #1 hottest material handling product catalog on the market today. No, I'm not exaggerating. This catalog has everything you could possibly want and they offer new, used or reconditioned items that almost every business uses each and every day. All the information, the catalog, the names, phone numbers, contacts in one complete package . You don't even pay postage! ************************************************************************ So how can you take advantage of this risk free offer? It's as easy as 1-2-3, here is all you have to do: Step 1) Simply call the " Equipment Buyers Guide" at 205-941-4795 Monday-Friday during regular business hours. This offer is ending Friday. Seriously gang, don't delay. Step 2) Tell them you want the "INSIDERS BUYING GUIDE PACKAGE #32" sent to you immediately. (Make sure you stress you want "PACKAGE #32" as this is the BIG package which includes all the key numbers and names .) Step #3) After we get the proper mailing information, you'll see it in a day or two! I know this package will save you and your company hundreds, maybe even thousands of dollars.Pick up the phone now and get the INSIDERS BUYERS GUIDE PACK #32 sent to you now. ------------------------------------------------------------------------ If this message is of no interest to you it is not necessary to reply for "removal" This is a one time mailing of a very limited offer and WILL NOT be sent again. ------------------------------------------------------------------------ From 71440094 at ix.netcom.com Tue Feb 3 19:21:57 1998 From: 71440094 at ix.netcom.com (71440094 at ix.netcom.com) Date: Tue, 3 Feb 1998 19:21:57 -0800 (PST) Subject: Better Choice for Airport Transportation Message-ID: GERMANY - Airport Shuttle Services - the Better Choice for Airport Transportation to and from 18 German Airports 24 hours per day, 365 days per year Door to door service to and from your residence, business or hotel. Complete online Reservations at��� http://www.airport-shuttle.com Using our services can greatly reduce your company�s ground transportation expenses. You will see your exact costs on reservation form - no hidden surprises Comfortable, clean, air conditioned passenger cars .� Courteous, safe drivers. Exclusive transfer - no additional pick up Reliable, Convenient , Cost Effective, Punctual We also provide transportation for all situations, occasion and/or events Join us now� http://www.airport-shuttle.com From MAILER-DAEMON at toad.com Tue Feb 3 19:33:20 1998 From: MAILER-DAEMON at toad.com (MAILER-DAEMON at toad.com) Date: Tue, 3 Feb 1998 19:33:20 -0800 (PST) Subject: FDA Registered and FDA Certified Message-ID: <199802011811.MAA23195@mail.t-1net.com> Exclusive New Oral Transmucosal Weight Control Disc & Transdermal Patch, both FDA Certified & Registered with National Drug Code #'s. Developed by 10 year old Pharmaceutical Company. For detailed information reply to: timcoent at usa.net From pgut001 at cs.auckland.ac.nz Tue Feb 3 04:56:30 1998 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Tue, 3 Feb 1998 20:56:30 +0800 Subject: An update on MS private key (in)security issues Message-ID: <88650932615058@cs26.cs.auckland.ac.nz> A fortnight ago I posted a message exposing a number of weaknesses in the way various Microsoft security products handle users private keys. A few days before I was due to vanish for a security conference (where it was very difficult to contact me), the article started getting a bit of attention. This is a general response which clarifies several issues relating to the original message. First, Russ Cooper (moderator of the NT Bugtraq mailing list) made some wildly inaccurate claims about the article. I've had a bit of feedback which indicated that it wasn't even worth dignifying this stuff with a response but I've written one anyway, at least for the original NT Bugtraq messages he posted (the stuff he put on a web page is just more of the same). You can find it at http://www.cs.auckland.ac.nz/~pgut001/pubs/breakms2.txt (even if you don't want to plough through the whole thing, you might want to read the last two paragraphs for a giggle). After this, Microsofts spin doctors leaped into action and posted a response to the article. I've replied to this one in a bit more detail, since it raises several important issues. Comments on Microsofts Response ------------------------------- >Microsoft's Response to Recent Questions on the Recovery of Private Keys from >various Microsoft Products >[...] >With the exception of the details about a possible PKCS-12 attack, all the >issues raised in the recent discussions are specifically aimed at Microsoft's >base CSPs, not at CryptoAPI. The base CSPs are the royalty-free, >software-based CSPs provided with Windows NT 4.0, Windows 95, and Internet >Explorer. These attacks do not apply in general to other CryptoAPI CSPs and do >not indicate any fundamental concerns with the security of the CryptoAPI >architecture or applications built upon it. This statement is mere obfuscation. As Microsoft have said, every single (recent) copy of Windows NT, Windows'95, and MSIE (and, presumably, other products like IIS and Outlook, which rely on them) ship with these CSP's, therefore every recent system comes with this security hole installed by default. In addition, the CryptExportKey() function is a standard CryptAPI function, which is described by Microsoft with the text "The CryptExportKey function is used to export cryptographic keys out of a cryptographic service provider in a secure manner" (obviously some new use of the term "secure" with which I wasn't previously familiar). There's nothing in there that says "Only the Microsoft CSP's support this" (some may not support it, but by Microsofts own admission the default used on any recent system does indeed exhibit this flaw). >Microsoft products do not "store" private key material using PKCS-12, contrary >to recent descriptions on the Internet. I was unfortunately somewhat unclear in my article, I've fixed up the online version at http://www.cs.auckland.ac.nz/~pgut001/pubs/breakms.txt. To summarise, if you want to get at an exported key stored on disk, you can use the pre-4.0 key file/PKCS #12 key file flaws. If you want to get at the current users key, you can use the CryptExportKey() flaw. >The example of breaking a PKCS-12 data blob, which was given in discussion on >the Internet, is not an attack on the "weak" cryptography of PKCS-12. Rather, >it is simply a dictionary attack (long known and well understood in >cryptography), This statement is accurate. As Microsoft have said, dictionary attacks have been known to the computer industry for a long, long time (several decades). For example the Unix password encryption uses 25 iterations of DES to protect users passwords from dictionary attacks (this is rather inadequate now, but was appropriate more than two decades ago when it was introduced). If this is a well-known flaw which the entire industry has known about for decades, why are Microsoft's very latest "security" products so extremely vulnerable to it? As I mentioned in my writeup, I published an attack on the exact format used in older MS products more than 1 1/2 years ago, but Microsoft made no attempt to fix this problem at the time. It wasn't until I published the current writeup that they finally addressed it. >One statement by the original poster argues that Microsoft managed to design a >security format that actually makes it easier to break into the protected >data. As stated above, a number of well respected companies were involved >extensively in the design and review of PKCS-12 before it became a standard. The problem is that Microsoft ignored the other companies recommendations for increasing security. I'll refer people back to the original writeup for mention of the various security features which were added to PKCS #12 and subsequently ignored by Microsoft. PKCS #12 is just a basic modification of PFX, which was a purely Microsoft invention, and Microsofts implementation of PKCS #12 does indeed make it very easy to perform the attack I described (you'd have to read my writeup for the full technical details in which I describe each individual flaw which, as each is exploited in turn, make it progressively easier and easier to recover a users private key). In addition (as I mentioned in my original message), Microsoft use RC2/40 to encrypt the private keys, which means that no matter how good a password you choose, the default PKCS #12 format private key produced by MSIE can be recovered in a few days with fairly modest computing power. There already exists a Windows screen saver which will recover RC2/40 keys for S/MIME messages, and the prize of an RSA private key is a much higher motivating factor than the "Hello, how are you?" typically found in an S/MIME message. As Microsoft point out, Netscape can indeed handle RC2/40-encrypted files, however they usually use triple DES and not RC2/40 (they encrypt the private key components - the really valuable part of the PKCS #12 payload - with triple DES and the other odds and ends with RC2/40). Since Netscape also iterate the password and MAC processing, they aren't vulnerable to the attacks which the Microsoft software is vulnerable to, even though both are based on the same PKCS #12 standard. >Exploiting Internet Explorer > >One of the fundamental requirements to perform any possible cryptographic >attack discussed in the recent postings is the assumption that a malicious >entity could somehow access to data on a user's computer system, without the >permission or knowledge of the user. This is a large leap of faith. > >Users that are using Public Key Certificates today are generally sophisticated >and savvy users, Bwahahahahaha! Sorry, I guess I should explain that in more precise terms. Now I'm not trying to claim that the average Win95 user isn't as sophisticated and savvy as Microsoft seem to think, or that relying entirely on the sophistication of the average Win95 user for security is a dangerous move. However these statements do seem to completely ignore the reality of the situation. Let me go into the background of the weaknesses a bit further. When I tested the weaknesses, I asked some "guinea pig" users to send me their exported keys, with the promise that I'd destroy the keys and not keep any record of where the keys came from and so on. Because of this I can't give exact figures, however here are a few data points: - More than half the keys (I can't remember the exact figure) were in the older, pre-4.x format. This indicates that the majority of users (or at least of the crypto-using guinea pigs) are still running old versions of MSIE which contain a number of widely-publicised problems, including precisely the weaknesses required to run arbitrary code on the machine or read files off the machine. One of the respondents commented that the key was "the key I use with Outlook", I'm not sure what that says about the origins of the key. Another key was one used with IIS for a web site which runs an online commerce service that processes credit-card based orders. This must have been an older version of IIS since the key was in the pre-4.x format. - When I asked two of the people why they were still using an old version, the responses were "It came installed with the machine when we bought it" and "It does what I want, so I haven't upgraded". I expect most users of the older version would have a similar reason for using it. In a company of 20 people (some of whom participated in this test), only two were running 4.x. These people are all highly competent software developers (presumably this includes them in the group of "sophisticated and savvy users" which MS were referring to), however none of the remaining 18 wanted to risk installing MSIE 4 because of the extent with which it messed with their system, possibly jeopardising their development work. Therefore most of these "sophisticated and savvy users" were still running old, insecure versions of MSIE, and weren't going to upgrade any time soon. - For the two remaining 4.x users in the company, both are still using straight, unpatched 4.0 because they considered it painful enough to download all of 4.0 and they didn't want to bother with an upgrade just yet. This makes them vulnerable to the bug pointed out in the l0pht advisory. - When I informed one of the guinea pigs of the recovered password, his response was "Now I'll have to change my login password" (the others generally restricted themselves to some variation of "Oops"). This comment confirms that users do indeed sometimes use their login password to protect their private keys, so that a successful attack recovers not only their private keys but their login password as well. - One respondent commented that most of the code they downloaded from the net was unsigned, but they ran it anyway. This is probably typical of the average user. Although I've only been back for two days, I haven't yet managed to find anyone who has applied all the latest patches and kludges to their system which makes them immune to these problems. This includes at least one person who has a code signing key which could be used to sign malicious ActiveX controls. Therefore all of the guinea pigs could in theory have their private keys stolen. >Attacks against Authenticode signing keys > >[...] > >However, it is extremely unlikely anyone could be successful with a simplistic >strategy for stealing Authenticode signing keys and then using them. See my comments about about this. I could, right now, obtain at least one Authenticode signing key with which I could create a malicious ActiveX control. I'm sure that if I were serious about this I could obtain a number of others. >Second, anyone signing code using Authenticode technology is extremely >unlikely to leave their key material sitting on an end user machine routinely >used for browsing the Internet. I see no basis for this claim. Every developer I know uses the same machine for both code development and web browsing (in fact a number of users keep a copy of MSIE or Netscape permantly running on their machine so that they'll have something to do between compiles). Microsoft's statement seems to imply that users will be running two machines, one dedicated entirely to web browsing and the other to code signing. I find this extremely unlikely. >Attacks on Encrypted Key material > >There is some confusion over the algorithms and methods that Microsoft uses to >provide protection of encrypted key material in Internet Explorer when using >the standard Microsoft base CSPs. There were changes between Internet Explorer >3.0x and Internet Explorer 4.x specifically to address any possible concern. And the astounding thing was that, despite a complete rewrite of the code, the newer version offers no extra security at all, as my article points out. Both are equally weak, you just need to attack them in slightly different ways. >Key export attacks > >The original Internet posting raises concern about the CryptoAPI interface >CryptExportKey(). This function is fully documented and does indeed export >private key material in an encrypted format. The statement from Microsoft omits one important point here. Myself and another security researcher have been trying to tell Microsoft for more than four months (probably a lot longer, I didn't log the earlier mail) that this is a very serious security flaw. In all cases Microsoft's response was some variation of "We don't see this as a flaw". It wasn't until my warning was published that they finally addressed the problem, and even in this case (the program to set the CRYPT_USER_PROTECTED flag) it's only a quick hack to plaster over the cracks and allow them to declare the problem fixed. In fact it doesn't fix the problem at all. I'll post details in a fortnight or so when I've had time to test things, please don't ask me about this until then. >The presence of the CryptExportKey() function is to support functionality such >as migrating key material between machines for a user or creating a backup >copy of a key. It should be noted however, that many CSPs, including most >hardware based CSPs, do not allow exportable private keys and will return and >error in response to a CryptExportKey() request. However the CSP's installed by default on every recent system do allow the export. The fact that there may exist, somewhere, an implementation which doesn't exhibit this flaw really doesn't help the majority of users. >The posting also asserts that an ActiveX control could be downloaded from a >web page, simply ask for the current users key, ship the key off for >collection by an unscrupulous person, and then delete itself without a trace. > >If users run unsigned code, or code from an unknown origin, a number of >unpleasant things can happen. This could indeed occur if the key as been >marked exportable and the CRYPT_USER_PROTECTED flag is not set. Which was, until my warning, the automatic default action for Verisign, and is still the automatic default for many other CA's. This means that keys generated right up until a few days ago (and in some cases keys being generated right now) have, by default, no protection whatsoever. In addition I've just been sent mail to say that CRYPT_USER_PROTECTED still isn't the default with Verisign, you have to click a box asking for extra security or you get the usual default of no protection. To add to the confusion, a lot of documentation (including the Microsoft Developer Network (MSDN) online documentation on Microsofts web site) describes the CRYPT_USER_PROTECTED flag with "The Microsoft RSA Base Provider ignores this flag", which can cause programmers to leave it out when it is *essential* it is always included. Incidentally, MSDN also claims that Microsoft are "supporting" PFX, which is in direct contrast with the claims in their press release. >There was also discussion of 16 dialog boxes appearing to the user for their >password if the CRYPT_USER_PROTECTED flag is set. Certainly asking the user >too many times would be better than too few times, however in our tests, under >extreme (and uncommon cases), a user might be asked for their password at most >four times when a key is used with the Microsoft base CSPs. Perhaps the claim >came from an early beta release. The 16 dialog boxes problem was present in 4.0, and it's been confirmed as still being present in 4.01. This was apparently verified on Microsoft's own CryptoAPI mailing list (the claimed "beta" version was actually MSIE 4.0 final). >Microsoft is constantly working to improve the security of our products. Myself and another person had been trying to convince Microsoft for more than four months that things like CryptExportKey() are a major security hole. Their response each time has been some variation of "We don't see this as a problem". It simply wasn't possible to get them to acknowledge these flaws, therefore my posting of the details wasn't "irresponsible" (as some have claimed) but a necessity in order to get them fixed. When I pointed out several months ago that Microsoft were using, in their pre-4.x products, an exported key format which was identical to the one which I broke more than 1 1/2 years ago, their response was "What's the problem with this?". I would have liked to have included URL's for the CryptoAPI mailing list archives to prove that Microsoft were warned of these problems some time ago, but the CryptoAPI archive seems to be temporarily offline. Risks of a Private Key Compromise --------------------------------- One or two respondents have tried to play down the seriousness of a private key compromise, saying that I exaggerated the dangers in my original message. What I wanted to point out was how extremely valuable a users private key is, and how disappointingly little concern Microsoft seem to have for protecting this valuable resource. For example Garfinkel and Spaffords "Web Security and Commerce" (O'Reilly, 1997) contains the warning: "Today's PC's are no better at storing private keys once they have been generated. Even though both Navigator and Internet Explorer can store keys encrypted, they have to be decrypted to be used. All an attacker has to do is write a program that manages to get itself run on the users computer (for example by using [...] Microsoft's ActiveX technology), waits for the key to be decrypted, and then sends the key out over the network" (p.120). Including a function like CryptExportKey() (which hands over a users private key) makes this very attack possible. The potential damage which can be caused with a misappropriated private key is enormous. Consider the relative risks in the compromise of a logon password and a private key. With a logon password, the worst an attacker can do (apart from stealing possibly valuable data) is to trash the victims hard drive, which involves reinstalling the operating system (an action which many users are intimately familiar with). In contrast an attacker who obtains a private key can potentially drain the victims credit card, clean out their bank account (if the victim uses one of the emerging online banking services), sign documents in their name, and so on. The implications of that last point can be quite serious. Take for example the Utah digital signature act, which was used as a model by a number of other states who implemented or are implementing digital signature legislation. Under the Utah act, digitally signed documents are given the same evidentiary weight as notarised documents, and someone trying to overcome this has to provide "clear and convincing evidence" that the document is fraudulent, which is difficult since it bears a valid signature from the users key (this fact has been used in the past to criticise digital signature laws based on this act). In addition, under the Utah act and derived acts, anyone who loses their private key bears unlimited liability for the loss (in contrast, consumer liability for credit card loss is limited to $50). This leads to the spectre of a malicious attacker who has the ability to issue notarised documents in your name for which you carry unlimited liability. This is a lot more important than someone reformatting your hard drive, or stealing last months sales figures. Peter. From ariel.jl.1917 at mx3.redestb.es Tue Feb 3 05:36:49 1998 From: ariel.jl.1917 at mx3.redestb.es (Pepe) Date: Tue, 3 Feb 1998 21:36:49 +0800 Subject: No Subject Message-ID: <199802031315.FAA00642@toad.com> From jya at pipeline.com Tue Feb 3 06:15:58 1998 From: jya at pipeline.com (John Young) Date: Tue, 3 Feb 1998 22:15:58 +0800 Subject: Scientists in Black Message-ID: <1.5.4.32.19980203140145.00756490@pop.pipeline.com> In "Scientists in Black,"Jeffrey Richelson, noted intel author, surveys use of vast archives of classified intelligence data by select civilian scientists under the Medea program (SciAm, Feburary 1998). http://jya.com/sib.htm (40K with 4 images) Thanks to PJP for pointing. From cmefford at avwashington.com Tue Feb 3 06:32:07 1998 From: cmefford at avwashington.com (Chip Mefford) Date: Tue, 3 Feb 1998 22:32:07 +0800 Subject: Spammers In-Reply-To: <34c704c2.971366@128.2.84.191> Message-ID: Good day list. I was just in the process of mailing off a copy of the GNU junk email contract to some sammer or another, and it occured to me; It would certainly be nice to collect that 10buks a hit for this crap, It will never happen, Seems alot the spam I recieve originates with a node from uu.net and I am no big fan of Ubermesiter John Sidgmore, Wouldn't it be nice to hold uu.net culpable for all their spamming ways. They want to own the internet, let them hang for it. Just a thought, anyone intested in doing a class action to recover email processing fees? luv chipper From mhw at wittsend.com Tue Feb 3 06:32:17 1998 From: mhw at wittsend.com (Michael H. Warfield) Date: Tue, 3 Feb 1998 22:32:17 +0800 Subject: County Mounties Spit on the 4th Amendment In-Reply-To: <695e7d4cd89037ab6c4e383c56f8fa6b@privacynb.ml.org> Message-ID: <199802031425.JAA23565@alcove.wittsend.com> Anonymous Sender enscribed thusly: > >Oh! The 4th amendment? That dusty old thing? When the scumbags > >are kicking in your door which would you rather have protecting >you: a raggedy old piece of paper or a Prince George County >Mountie SWAT team in full ninja dress and the latest high-tech >law-enforcement goodies? Thought so. Cup's at the end of the >counter comrade. Have a nice day. > You couldn't be talking about Prince George, Canada, could you? > "Mounties" are Royal Canadian Mounted Police (RCMP), and are > limited to Canada, and Disney World. "County Mounties" is a CB (Citizens Band Radio for those not familiar with US radio) slang term in the US for local police. Conversely "Supertroupers" refers to State Patrol. The term "Smokie" (coined from the movie Smokie and the Bandit) refers to all police. Mike -- Michael H. Warfield | (770) 985-6132 | mhw at WittsEnd.com (The Mad Wizard) | (770) 925-8248 | http://www.wittsend.com/mhw/ NIC whois: MHW9 | An optimist believes we live in the best of all PGP Key: 0xDF1DD471 | possible worlds. A pessimist is sure of it! From billp at nmol.com Tue Feb 3 06:47:32 1998 From: billp at nmol.com (bill payne) Date: Tue, 3 Feb 1998 22:47:32 +0800 Subject: Gilbert Vernam Message-ID: <34D7287E.1752@nmol.com> Tuesday 2/3/98 7:02 AM John Young J Orlin Grabbe The crypto problem was solved in 1918. Vernam and Maugborne [sp?] did the work. Gilbert Vernam in 1918. Vernam used two tapes of random characters to generate the additional characters. With the same tapes at each end set to the same start position this system was unbreakable. The Germans decided that the distribution of these key tapes presented too great an operational problem and the Lorenz machine uses a complicated mechanical gearing and cam system to generate a pseudo random sequence with very long period and 10^19 complexity. They thought this was good enough to ensure unbreakability, it wasn't! Fushimi's implementation of Lewis and my GFSR algorithm has period of 2^521 - 1. And LOTS of possible starting seeds. John Young kindly posted my article on putting non-singular binary matrices in one-to-one correspondence with the natural numbers. Although the period of a shift register can be 2^521 - 1, 521 bits determines THE EXACT SEQUENCE of the remaining 2^521 - 522 bits. Pseudorandom numbers generators have an easier job than bits used for cryptography. Pseudorandom number generators merely have to deceive statistical tests. Orlin Recall the GIANT radio transmitter in the south of Russia, perhaps Baku. I heard on PBS TV that it was transmitting a shift register sequence. The Russians were apparently trying to communicate with underwater submarines. NSA crypto algorithms mostly rely on shift register sequences - both linear and NON-LINEAR. The R register in my SAND report posted at jya.com implements a non-linear SECRET/NSI feedback algorithm. Perhaps someone may have to put NSA's SECRET/NSI R register non-linear feedback function out on the web some time. So that every one can have a good laugh, of course. Like for the SECRET/NSI number 31 algorithm step. John Young Judge Svet made a ruling. I sent a copy to you by snail mail. Later, bill Title: Colossus Rebuild The Colossus Rebuild Project by Anthony E Sale, FBCS A bit of History Colossus was designed and built at the Post Office Research Laboratories at Dollis Hill in North London in 1943 by a team led by Dr Tommy Flowers to help Bletchley Park in decoding the intercepted German telegraphic cipher traffic enciphered using the Lorenz SZ42 cipher machine. Lorenz SZ42 cipher machine at Bletchley Park This cipher machine enciphered electrical teleprinter signals which used the international 5 bit Baudot teleprinter code. It enciphered the input plain text by adding to it successively two characters before transmission. Because this addition was bit by bit modulo 2, at the receiving end with the Lorenz machine set to the same start position, the same two characters were added again to the received characters revealing the original plain text. This scheme had been developed in America by Gilbert Vernam in 1918. Vernam used two tapes of random characters to generate the additional characters. With the same tapes at each end set to the same start position this system was unbreakable. The Germans decided that the distribution of these key tapes presented too great an operational problem and the Lorenz machine uses a complicated mechanical gearing and cam system to generate a pseudo random sequence with very long period and 10^19 complexity. They thought this was good enough to ensure unbreakability, it wasn't! A bibliography of works discussing the Lorenz cipher has been compiled by Frode Weierud is availabe here by permission. As is a book chapter describing the Swedish effort to crack Lorenz. The German high command thought that the Lorenz machine was completely unbreakable and used it for their most secret messages, literally from Hitler to his generals and between generals. The interception and deciphering of these messages gave Generals Eisenhower and Montgomery vital information prior to and after D Day in 1944. Colossus was the world's first large electronic valve programmable logic calculator, not just one but ten of them were built and operational in Bletchley Park the home of Allied WW II codebreaking. The question of what is the worlds first computer is less a question of history than a question of definition. The Mark 1 at Manchester (1948) is a strong contender. A view of Colossus Colossus found the wheel settings used by the German Lorenz machine operator for a particular message. When these had been found, which took about two hours, they were plugged up on the Tunny machine. It was this machine which actually deciphered the message. This is the Tunny room in Bletchley Park in 1945. Colossus, hardware details Input: cipher text punched onto 5 hole paper tape read at 5,000 characters per second by optical reader Output: Buffered onto relays: Typewriter printing onto paper roll Processor: Memory 5 characters of 5 bits held in a shift register. Clock speed 5kc/s derived from input tape sprocket holes. Internally generated bit streams totalling 501 bits in rings of lengths equal to the number of mechanical lugs on each of the 12 Lorenz wheels. A large number of pluggable logic gates. 20 decade counters arranged as 5 by 4 decades. 2,500 valves. Power supplies +200v to -150v at up to 10A. Power consumption 4.5KWatt Size: Two banks of racks 7ft 6inches high by 16ft wide spaced 6 ft apart. Bedstead, 7ft 6inches high 4ft wide by 10ft long Colossus, operating cycles The basic machine cycle: read a character from tape, get bits from bit stream generators, perform up to 100 logic operations, clock result into decade counters. The cycle determined by the input tape: The intercepted enciphered text tape is joined into a continuous loop with about 150 blank characters in the join. Specially punched start and stop holes indicate the beginning and end of the cipher text. On receipt of start hole pulse: Start bit stream generators and send sampling pulses to reader output. Execute basic machine cycle until receipt of stop hole pulse: Staticise counter states onto relays. After a delay, reset counters and reset bit stream generators to a new start position. Colossus programming All programmes hard wired, some permanently, some pluggable. Conditional jumping possible between alternative programmes depending on counter outputs. The Rebuild Work on the rebuild started two years ago with the collection of all available information about Colossus, including a series of official photographs taken in 1945. The first stage was to produce accurate machine drawings of the frames for Colossus (all the original machine drawings had been burnt in 1960). This involved three months of eyestrain pouring over the photographs and using 3D projections to transfer the details to a CAD system, EasyCad running on a 486 PC. Next problem was the optical paper tape reader system. The details of this are not shown in any of the photographs. However I managed to locate Dr Arnold Lynch who designed the reader system in 1942. Although well into his 80's Dr Lynch came to my house and using my CAD system we re-engineered the reader system to his original specifications. Then I built it and here it is. It uses original Colossus hard vacuum photocells, shown here on the left and a mask onto which the image of the tape is projected by a Colossus lense. All the racks are now in place. Here are some of the decade counters. We are also rebuilding the Tunny machine. The current state of Colossus: Jan 96 Examples of most of the circuit panels are now working and the whole machine is working at one bit level. We are now rapidly cloning circuit panels to populate all the racks. I need lots more valves: EF36, 37 or 37A pentodes, 6J5 triodes, 6V6 tetrodes and GT1C gas filled triode thyratrons. The 6J5's and 6V6's should be the large glass versions to look right. Please send any contributions, valves or money, to me (Tony Sale) at "The Colossus Rebuild Project, 15 Northampton Road, Bromham, Beds MK43 8QB" tel: 01234 822788 email: TSale at qufaro.demon.co.uk Come and see the Colossus Rebuild, the Lorenz machine and codebreaking exhibitions in Bletchley Park. This page was created by Tony Sale (tsale at qufaro.demon.co.uk) of the Bletchley Park Trust, and has been modified by Jeff Goldberg (J.Goldberg at Cranfield.ac.uk) of the Cranfield University Computer Centre. Title: Cryptome Cryptome � JYA/Urban Deadline OpEd _______________________________________________________________________________________ File Topic Date _______________________________________________________________________________________ sib.htm Scientists in Black February 3, 1998 CAP The Cryptographic Analysis Program (offsite) February 2, 1998 Arne Beurling The Geheimschreiber Secret (offsite) February 2, 1998 Army Stegano US Army Steganography (offsite) February 2, 1998 Colossus Rebuilding Colossus (offsite) February 2, 1998 Frode Crypto Cryptology Papers (offsite) February 2, 1998 jimbell9.htm Jim Bell Update February 2, 1998 echelon-boost NSA Surveillance System Boosted (offsite) February 2, 1998 cn020298.txt Crypto News February 2, 1998 bxa020298.txt BXA Meet on Export Rules and Procedures February 2, 1998 cs020298.txt Rules to Challenge Customs Seizures (63K) February 2, 1998 usg020298.txt USG Secret Meets February 2, 1998 echelon.htm NSA Global Surveillance System February 2, 1998 cathedral.htm The Cathedral and the Bazaar February 1, 1998 natsec-rule.htm Protection of National Security Information February 1, 1998 47cfr216.txt National Communications Issuance System (106K) February 1, 1998 47cfr213.txt Emergency Telecomms Precedence System (17K) February 1, 1998 47cfr202.txt National Security Emergency Plans & Ops (27K) February 1, 1998 47cfr201.txt Policy for Telecomms During Emergencies (12K) February 1, 1998 44cfr336.txt Facilities for National Security Emergency (14K) February 1, 1998 44cfr334.txt FEMA Graduated Mobilization Response (14K) February 1, 1998 32cfr322.txt Privacy Act Exemption for NSA Records (40K) February 1, 1998 32cfr299.txt National Security Agency FOIA Program (8K) February 1, 1998 32cfr2101.txt National Security Council FOIA Requests (24K) February 1, 1998 32cfr185.txt Military Support to Civil Authorities (52K) February 1, 1998 31cfr9.txt Effects of�Imported Articles on National Security February 1, 1998 22cfr124.txt Contracts, Off-Shore Buys, Defense Services (42K) February 1, 1998 22cfr123.txt Licenses for the Export of Defense Articles (51K) February 1, 1998 22cfr121.txt United States Munitions List (92K) February 1, 1998 _______________________________________________________________________________________ ntia-dnsdrft.htm Draft Proposal for New Domain Name System January 30, 1998 korczak.txt Boris Korczak: CIA Agent Seeks Payment January 30, 1998 pm87.txt Prez on Terrorist Threat to Middle East Peace January 30, 1998 leahy-wipo.txt Senator Leahy on Ratifying WIPO Treaties January 30, 1998 32cfr147.txt DoD: Policies for Access to Classified Info January 30, 1998 32cfr148.txt DoD: Facilities for Storing Classified Info January 30, 1998 32cfr149.txt DoD: National Policy on Technical Surveillance January 30, 1998 ntia012798.htm RFC: Self-Regulation for Privacy Protection January 30, 1998 cylinked.htm Latest: Cylinked to Organized Crime? January 29, 1998 websoft-warn.htm Web Software Warning January 29, 1998 scant-peril.htm U.S. Spy Agencies Pauline Peril January 29, 1998 mossburg.htm E-Comm Forum on E-Authentication and DigSig January 29, 1998 pollard.htm Bankers O Table on E-Authentication and DigSig January 29, 1998 brown.htm Secret Service on Financial Instruments Fraud Janaury 29, 1998 rpk-hack.htm Invite to Hack RPK InvisiMail January 29, 1998 nrc012998.txt Generic Letter on Y2K Readiness for Nuke Plants January 29, 1998 fc012998.txt FinCEN RFC on Information Collection January 29, 1998 dtc012998.txt Arms Export to Saudi Arabia January 29, 1998 nsa-etc-nf.htm NSA, Echelon, Trade & Crypto/Netscape & Fortify January 28, 1998 dod012898.txt DoD Blacklist of Higher Education January 28, 1998 47usc1002.txt Interception of Digital and Other Communications January 28, 1998 cn012898.txt Crypto News January 28, 1998 cn012798.txt Crypto News January 27, 1998 bxa-fy98.txt BXA Funding FY 1998 January 27, 1998 cia-tsang.htm CIA Concedes Spying on Americans January 26, 1998 atpc.htm EU-Parliament: Technologies of Political Control January 26, 1998 us-crypto.htm US Crypto Policy January 25, 1998 pg-nzcrypto.htm New Zealand Crypto Policy January 24, 1998 ra-ukcrypto.htm UK Crypto Policy January 24, 1998 whp012398.htm Payne/Morales vs. NSA: Reply to Defendant January 23, 1998 kellner.htm Intellectuals and New Technologies (66K) January 23, 1998 bxa012398.txt BXA Penalizes Export Violator January 23, 1998 osd012398.txt Compensation of North Viet-Imprisoned Operatives January 23, 1998 dod012398.txt Defense Dept Secret Meets January 23, 1998 walton-pk.htm GCHQ: The Pre-History of Public Key Cryptography January 22, 1998 primer The Proliferation Primer (offsite) January 22, 1998 sh105-238.txt Proliferation and US Export Controls (196K) January 22, 1998 sh105-267.txt Safety and Reliability of US Nukes (347K) January 22, 1998 acda012298.txt Arms Control Secret Meet January 22, 1998 pd012298.txt Prez Notice on Mideast Terrorism Emergency January 22, 1998 bia012298.txt Rule on Indian Casinos January 22, 1998 cn012198.txt Crypto News January 21, 1998 fc98.htm Financial Cryptography '98 January 20, 1998 doj-ssgsup.htm Supplement to Fed Guide for Seizing Computers January 20, 1998 cn-netreg.htm New Chinese Internet Regulations January 20, 1998 pg-get-MSkey.htm How to Recover Private Keys for Microsoft Wares January 20, 1998 ietf-dea-97.htm IETF Draft Encryption Algorithms 1997 January 20, 1998 radio-rec.htm Update: Locating Radio Receivers; Encoder Stolen January 20, 1998 pipenet.htm PipeNet Description January 20, 1998 dod012098.txt Defense Dept Secret Meets January 20, 1998 bernstein12.htm Transcript of Bernstein Hearing January 19, 1998 fbi-umbc.htm Barry Smith (FBI) to Speak on Encryption Policy January 18, 1998 de-snoop.htm Update: German Surveillance State January 17, 1998 bxa-wa-rule.htm Update 2: BXA Rule on the Wassenaar Arrangement January 16, 1998 pd98-10.htm Prez OKs China's Nuclear Controls January 16, 1998 tcryptol Theory of Cryptography Library (offsite) January 16, 1998 cn011698.htm Crypto News January 16, 1998 nsasuit8.htm USA/NSA Responds to Payne/Morales Motion Janaury 16, 1998 dod011698.txt Defense Dept Secret Meets January 16, 1998 bxa011398.txt Materials Advisory Meet January 15, 1998 crypto-kong.htm Announcing Crypto Kong January 15, 1998 occ-dstc.htm OCC OKs CA as Authorized Banking Activity January 14, 1998 aes-980820 Advanced Encryption Standard Conference (offsite) January 14, 1998 ustr010898.txt Update: Telecommunications Trade Agreements January 14, 1998 rc2.htm Rivest Describes RC2 Encryption Algorithm January 13, 1998 fc011398.txt FinCEN Regulates Card Clubs January 13, 1998 ta011298.txt Key Management Infrastructure Meet January 12, 1998 nist011298.txt Transmission-Electron Microscopy Meet January 12, 1998 doa011298.txt Army Hazard Containment Invention January 12, 1998 gps-jam.htm GPS Jamming January 11, 1998 arthur.htm The Force of An Idea: Theory of USA v. Microsoft January 10, 1998 RSA-stego.htm Batch RSA for Stego Data January 9, 1998 batch-DSA.htm Batch DSA January 9, 1998 cell-track.htm Update 2: Mobile Cell Phone Surveillance January 9, 1998 fiat-rsa.htm Fiat's Batch RSA January 9, 1998 aes010798.htm Update: Advanced Encryption Standard January 9, 1998 doj010998.txt RFC: USA v. IBM/STK Antitrust Suit January 9, 1998 bmd010898.txt Ballistic Missile Defense Secret Meet January 9, 1998 nih010898.txt Commercialization of Medical Data January 9, 1998 fas-pde Prez Directives/Executive Orders (offsite) January 7, 1998 ussc-ecopy.htm Sentencing for Electronic Copyright Violations January 6, 1998 ussc010698.txt RFC: US Sentencing Guidelines (254K) January 6, 1997 mercier.htm Terrorists, WMD, and the US Army Reserve January 6, 1998 terror-rnd.htm US Counterterrorism R&D Program January 6, 1998 belet Bob East Letter on AP/Jim Bell/IRS (offsite) January 6, 1998 pitfalls Schneier: Security Pitfalls in Crypto (offsite) January 5, 1998 dsb010598.txt Defense Science Board Secret Meets January 5, 1998 ntia010598.txt Funds for Public Telecommunications January 5, 1998 cn010598.txt Electronic Surveillance News January 5, 1998 csda.htm Cypherpunks Smartcard Developer Association January 4, 1998 aimd-98-21.htm Executive Guide: Info Security Management (139K) January 3, 1998 blast-mono.htm Blast Resistant Doors Monograph January 3, 1998 tempest-door.htm Electromagnetic Shielding/TEMPEST Door January 3, 1998 ehj.htm Banned Basque Video: Democratic Alternative January 3, 1998 fda010298.htm Policy for External Penile Rigidity Devices January 2, 1998 doe010298.htm Defense Nuclear Facilities Safety Plan January 2, 1998 dos010298.txt Meet on Global Communications and Info Policy January 2, 1998 doa010298.txt Army Science Board Meet January 2, 1998 _______________________________________________________________________________________ Cryptomb 2 June-December 1997 Cryptomb 1 To May 31 1997 � � � � (site stats) � DoE: Pay Bill Payne�� DoJ: Free Jim Bell From simonf at uk.uu.net Tue Feb 3 06:48:39 1998 From: simonf at uk.uu.net (Simon Fraser) Date: Tue, 3 Feb 1998 22:48:39 +0800 Subject: Spammers In-Reply-To: Message-ID: Note: What I write here are my own views, not necessarily those of my company. On Tue, 3 Feb 1998, Chip Mefford wrote: > Wouldn't it be nice to hold uu.net culpable for all their spamming ways. They > want to own the internet, let them hang for it. http://www.us.uu.net/support/usepolicy/ It would be nice to differentiate between the spammers themselves and the ISP they use. Simon. From otoole at lcs.mit.edu Tue Feb 3 09:20:06 1998 From: otoole at lcs.mit.edu (James O'Toole) Date: Wed, 4 Feb 1998 01:20:06 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) Message-ID: <01BD308B.1A566960@slip-james.lcs.mit.edu> Tim, the "social pressure" I was referring to is the process through which the obstacles to privacy-protecting measures are created and enforced. Examples include both government regulation, which derives part of its support from publicity connecting cash with money laundering with drugs and/or crime, as well as finality/liability rules within non-government financial consortiums, which may strongly encourage proof-of-identity. Let's take your example of the Institute of Applied Ontology (IAO) corporate Amex card (Ax)... Even with no relevant government regulations, we may find that Ax's agreement with merchants requires Ax to at least either pay the merchant or reveal to the merchant all relevant information known to Ax about the cardholder. The right contract terms between the merchant and Amex will be good for them, and may be good for most consumers, and could easily be sub-optimal for the subset of consumers who highly value privacy. The impracticality of negotiating special terms with each merchant means that the best plan to get the privacy/anonymity you want may be to set up a card such that Amex will be willing to operate without knowing much about the cardholder. I assume that's the intent of your IAO corporate Ax card. What allocation of the liability for card usage do you expect among Amex, IAO, and the cardholder? Amex will want the liability allocated to IAO and the cardholder, and if Amex does not possess traceable identity information on the cardholder, then Amex will want an enforceable promise to pay from IAO. To get this, or even to get funds in advance from IAO, we will find that Amex ends up knowing a lot about the identity of IAO or one of its officers. Pretty soon we'll run up against the problem of whether Tim May can configure a corporate in the U.S. to be operated by people who don't know who he is, and who can't find out who he is (when properly encouraged to cooperate by Ken Starr...). With or without government regulation, the most reliable people you can hire to operate that corporation for you may only want to do so if they are given the opportunity to somehow "know" you. I think you can probably use a bank in a privacy-enhancing-locale such as Switzerland as an effective intermediary in Amex card issuance, but if you really don't want the bank to know who you are, you'll probably need a corporate intermediary between you and the bank, with nominee officers. The real trick is probably to structure the whole thing so that neither the bank nor the nominee officers have anything to lose, including their reputations. As long as part of their reputation is that they don't act as front men for drug dealers and criminals, we may find that they keep trying to find out enough about who you are to satisfy themselves that you are a good guy. That's the social pressure flexing its muscles. >An interesting question about the Privacy Card product is whether the >social pressure against it is strong enough to defeat its privacy whenever >the product is well advertised. In other words, will a privacy product >survive in spite of its own publicity in our current environment, or can Corporate cards are already widely accepted...most of you probably have a card issued to you through your employing institution. I see no "social pressure" to block usage of my Institute of Applied Ontology corporate AmEx card. The real roadblock is that government makes such privacy-protecting measures either difficult or illegal. --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From tcmay at got.net Tue Feb 3 09:23:59 1998 From: tcmay at got.net (Tim May) Date: Wed, 4 Feb 1998 01:23:59 +0800 Subject: UrsinePunks (Re: County Mounties Spit on the 4th Amendment) In-Reply-To: <695e7d4cd89037ab6c4e383c56f8fa6b@privacynb.ml.org> Message-ID: At 6:25 AM -0800 2/3/98, Michael H. Warfield wrote: >"Supertroupers" refers to State Patrol. The term "Smokie" (coined from >the movie Smokie and the Bandit) refers to all police. Nope, not coined from the movie. Just the reverse. Highway cops were called "smokies" (or "smokeys") when I was growing up in Virginia in the 60s, long before the movie. I haven't checked the derivation, but had always assumed it came from the Smokey the Bear figure, who wore a tall, broad-brimmed hat (also known as a campaign hat). The hat worn by many state highway patrols. Ergo, "smokeys." (I used to see the _real_ Smokey the Bear at the Washington Zoo. I think he died of old age in the 1970s.) (A URL with a few details is http://www.4j.lane.edu/websites/roosevelt/Connections/smokey.html) --Tim May, posting from the Bear State "National borders aren't even speed bumps on the information superhighway." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From emc at wire.insync.net Tue Feb 3 09:38:08 1998 From: emc at wire.insync.net (Eric Cordian) Date: Wed, 4 Feb 1998 01:38:08 +0800 Subject: The War on Some Debts Message-ID: <199802031640.KAA18766@wire.insync.net> In a further blatant erosion of Constitutional rights, the California Supreme Court has ruled that a person owing child support who fails to seek or accept work may be jailed and fined for contempt of court, and that this does not violate any Constitutional bans on involuntary servitude or imprisonment for debt. This reverses nearly a century of contrary rulings. Look for this "improved" interpretation to be expanded to other kinds of debts and judgments as well, as soon as massive public acceptance of it for the carefully picked child support issue is engineered. The credit card companies are no doubt carefully analyzing this decision as we speak. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From rah at shipwright.com Tue Feb 3 09:39:33 1998 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 4 Feb 1998 01:39:33 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <199802030242.DAA10101@basement.replay.com> Message-ID: At 10:31 pm -0500 on 2/2/98, Tim May wrote: > At 6:42 PM -0800 2/2/98, Anonymous wrote: > >Tim May wrote: > >> The real solution is easy. > > > > > >Easier said than done. > When I say the real solution is easy, I mean it. Get rid of the laws Nope. Making or repealing laws won't mean too much for the privacy of transactions, except to reallocate who gets screwed in some kind of political zero-sum game. Anyway, laws are there because there's an economic incentive for them to be there. Reality is not optional. Physics creates economics which creates laws. Not the other way around. Even morality and ethics come from culture, which itself is a physical phenomenon, the collective response of humans to the resources on hand, which is an economic process if there ever was one. So, only when digital bearer certificate technology like blind signatures is proven to be *cheaper* than the current privacy-invasive book entry transaction regime will there be any demand for digital bearer settlement of assets, debt, and cash transactions. Personally, I believe that that time is coming sooner than most people realize. That's because when someone figures out how to save everyone a bunch of money with digital bearer certificates, they're going to make a bunch of money doing it, and the race to the bottom-line will begin. As I've said here several times before, the paradox will prove to be that digital bearer settlement will be cheaper to use *because* they're physically anonymous. You don't *care* what the biometric identity of someone is, as long as you're protected from bad economic actors, and can do reputation damage to people who you can prove have damaged you financially. Which, as we all know here, is simply a matter of financial cryptography. The cost of anything is the foregone alternative. People will only demand more privacy when it's cheaper than not having it. I believe that that time is coming, rather quickly. Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: From attila at hun.org Tue Feb 3 09:39:50 1998 From: attila at hun.org (Attila T. Hun) Date: Wed, 4 Feb 1998 01:39:50 +0800 Subject: the best justice money can buy --Lessig suspended Message-ID: <19980203.154218.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- >>> the best justice money (and politics) can buy I really do not believe this --this is bought justice as appeals courts never, or at least rarely such as a blatant in the case of a blatant error in a capital murder criminal trial, interfere with a sitting federal judge. the damage is immense; it delays the first round of adjudication by at least 5 months. if I were Joel Klein I would go for the jugular and file action for an immediate divestiture of M$ including injunctions against operations and management by Bill Gate$ and Steve Ballmer. the appeals court would probably suspend the actions, but they would still be there and on the table. Jackson at this point will be furious --hopefully he keeps total cool. the obvious next move on the part of M$ will be to have Jackson disqualified for bias. that will make 2 judges in the DC circuit who M$ has wasted. Royce Lambert refused to accept the 1994 plea bargain --obviously M$ would ask him to recuse if his name came out of the barrel; theoretically, cases are assigned by lottery --in reality, you can influence the choice of a judge as the cases are assigned at the time of filing by rotation. --M$ obviously is capable of shopping for a judge. at this point, I would say M$ has won the game. W98 will be released with IE4 as the desktop, complete with push channels and www.msn.com --at that point, Jackson --if he is still the sitting judge-- will be forced to make a bad law decision if he tries to block it on the 1994 agreement: the product is 'integrated' --M$ had the foresight to hoodwink the DOJ --Royce Lambert saw through the smoke screen but the appeals court removed him from the case. so... we will have multiple choice of OS: M$ on Intel, M$ on SGI, M$ on Alpha --and SUN goes down the tubes as they will never capitulate. M$ will bury IBM with their NT alliance with Ahmdal who clones all the IBM iron --which is fading against the clustered servers. IBM long since gave in on OS/2 versus M$ --it may figure in their corporate strategy, but unless they are willing to update past Netscape 2.02 they will lose that as well --in fact you can no longer any of the IBM PCs with OS/2 preloaded --except by special order: in quantity. Bill Gate$ for President? might as well... maybe Lee Harvey Oswald will come to the rescue. Lessig appointment suspended By Dan Goodin, C|Net February 2, 1998, 6:40 p.m. PT A federal appeals court has immediately suspended the appointment of a contested computer expert charged with collecting and weighing evidence in the antitrust case the Justice Department has brought against Microsoft. In a ruling handed down late Monday, the U.S. Court of Appeals for the District of Columbia granted Microsoft's request to halt, pending further review, the proceedings before visiting Harvard Law School professor Lawrence Lessig. U.S. District Judge Thomas Penfield Jackson appointed Lessig a "special master" in mid December, giving the computer and Internet law expert until May 31 to recommend factual and legal findings in the high-profile case. The one-page ruling is a significant--but by no means final--win for Microsoft, which repeatedly has objected to Lessig's appointment. In briefs filed first in district court and then with the court of appeals, Microsoft strenuously has opposed the designation of any special master in the case, but has argued further that Lessig is an inappropriate choice because he appears to be biased against the software giant. In a sternly worded order issued two weeks ago, Jackson denied Microsoft's request, calling the allegations of bias "trivial" and "defamatory." Today's ruling by the court of appeals is in stark contrast to Jackson's order, and may indicate that the three-judge panel assigned to hear matters in the case sees things in a different light. Rather than permanently halting the proceedings, today's ruling is an agreement only to consider Microsoft's challenge to the special master--known in legal parlance as a writ of mandamus. In a sign that the judges may be inclined to agree with Microsoft's arguments on the issue, however, they handed Redmond an additional win by immediately halting the proceedings scheduled to take place before Lessig while the challenge is being heard. "It is extremely unusual for a court of appeals to reach down and stop what a district court has ordered," said Rich Gray, an antitrust attorney at Bergeson, Eliopoulos, Grady & Gray. "The court of appeals is saying, 'We're interested in hearing more about this, and in the meantime, we're going to put the special master on hold.'" A Microsoft spokesman agreed. "This is a very positive step, but it's only one small step in a long process," said Jim Cullinan. "We look forward to presenting our evidence to the appeals court as well as the trial court." The court of appeals already had agreed to hear a separate appeal, in which Microsoft is fighting a preliminary injunction Jackson issued in December that requires Microsoft to separate browser software from its Windows products. Today's ruling consolidates both motions into the same April 21 hearing. It also requires both sides to file additional briefs concerning the special master challenge by April 7. Moreover, the government must file its opposition to Microsoft's appeal of the preliminary injunction by March 2, and Microsoft must respond to that brief by March 9. Justice Department representatives were not immediately available for comment. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNc8R7R8UA6T6u61AQH3swIAtVNkbSk80Crg/dseQOP4pPpIbEDGchsl rWj/sEmXn/2EnWxXBTp4OnkRpJlFbobhbkT3lJqE4Jj2V+MnEGUFzw== =9S7I -----END PGP SIGNATURE----- From attila at hun.org Tue Feb 3 09:40:48 1998 From: attila at hun.org (Attila T. Hun) Date: Wed, 4 Feb 1998 01:40:48 +0800 Subject: too little too late: SPA takes on M$ Message-ID: <19980203.151905.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- >>> too little and too late, SPA takes on Microsoft this might have been a good action in so much as they are well entrenched, in part on M$' money, as Washington lobbiests. now, with Lessig's role as the court appointed expert suspended by the appeals court until a 21 Apr hearing (submissions due in early April), their voice will be lost in the court action. any action they stimulate with Orrin Hatch's judiciary is a) too late; too slow --at least two years; 3) of little consequence as Congress can not legislate against a specific company --they can legislate by regulation against an industry; and, 4) more importanty, the Appeals Court castrated Johnson's order for the special administrator. still, it is another voice; even though the guidelines are bland, there is no mistalking who the target is; and, in typical M$' fashion they are threatening to drop their membership instead of renewing in August. there are three areas where M$ is exercising monetary influence, even control of the agenda, in legislation or justice: the DOJ action with their crying to Daddy (the appeals court), the SPA guidelines which they intend to force SPA to withdraw, and as part of the closed circle negotiating the rules on intellectual property and trade for the Western Hemisphere free trade zone --closed meetings. as I said: Gate$ makes Cornelius Vanderbilt look like a choir boy. Software group takes on Microsoft By Courtney Macavinta February 2, 1998, 5:05 p.m. PT As the federal antitrust lawsuit against Microsoft barrels forward, a prominent high-tech trade association tomorrow will release a list of competition principles that strike at the heart of the case and angered the software giant. The Software Publishers Association (SPA) hasn't officially responded to the Justice Department's accusations that Microsoft violated a 1995 consent decree by requiring computer makers to bundle its Internet Explorer browser as a condition of licensing its Windows 95 operating system. But the new guidelines echo some of its smaller members' and the government's complaints regarding Microsoft. The SPA's guidelines come one day after New York State's attorney general said he and ten other state prosecutors subpoenaed Microsoft for evidence of potentially illegal bundling of Windows and Internet software. In addition, the Senate Judiciary Committee and regulatory agencies from Japan and the European Union also are looking into Microsoft's business practices. (See related story) The SPA says it set out to develop the principles to define its role in the fair competition debate, which focuses on its largest member. The SPA has been sought for advice by lawmakers in the past, and it states that the new principles are intended to "guide government officials" in antitrust enforcement. Hitting home with Microsoft foes, the SPA principles state: "Operating systems should not be used to unfairly favor its own products and services, or its favored partners, over those competing vendors. The operating system vendor should not include its own services or products as part of the operating system or user interface unless it gives the same ability to integrate products and services into the operating system to competing vendors." The SPA went on to state that "the tying of certain applications to the sale of other applications has the effect of restraining competition among independent software vendors for the 'virtual shelf space' of [PC makers]." Dominant operating systems also should not "favor Internet content" that it owns or licenses, according to the guidelines. The principles say that healthy competition is reliant on equal access to retail customers. On the other hand, pre-announcing products that do not exist yet, so-called vaporware, stifles competition. Prior to developing the principles, the 1,200-member group surveyed its domestic members. Of the 164 that responded, anticompetitive activity was a top concern. As reported in January, the issue also took the spotlight at two scheduled meetings in Santa Clara, California. The SPA's Government Affairs Committee even met with Joel Klein, the Justice Department's lead attorney in the lawsuit against Microsoft. Microsoft fired back today, calling the SPA's process "short-sighted" and the publication of the principles "self-destructive." The company also quipped that it is undecided on whether it will renew its SPA membership, which expires in August. Although Microsoft was present at the SPA's California meetings last month, so were some of its main competitors, such as Novell, Netscape Communications, Apple Computer, and Oracle Corporation. "It's unfortunate that a handful of Microsoft's competitors are trying to use the SPA to drive a wedge into the software industry. This whole process has been such an obvious attack on Microsoft," Mark Murray, a spokesman for the company, said today. "I think the primary impact of this is that the SPA will be discredited, and that it will weaken their ability to serve as a legitimate voice," he added. The SPA knew its principles would be searched for hidden meaning regarding the Microsoft case, but the group contends it wasn't targeting the company. "The principles are not intended to prescribe remedies that might be applied by federal and state antitrust enforcers to any particular company or set of circumstances," SPA president Ken Wasch said in a statement. "Nor are these principles a call for general regulation of our industry. Rather, the principles reflect an industry consensus of how some business practices promote or impair strong competition." Still, for a group with no regulatory power, the SPA's opinion will hold some weight. The group is expected to testify before the Senate Judiciary Committee when it holds hearings on issues of competition in the high-tech industry this year. Moreover, the new principles amend the organization's existing guidelines, which were presented to the Federal Trade Commission during a hearing two years ago. During the hearing, the SPA advised the government to carefully scrutinize companies that allegedly impede others from getting space on retail store shelves. The SPA also took the position that owners of dominant operating systems should release essential technical information to other developers. Both points remain in the new eight-point plan. The remaining SPA competition principles include: Maximize innovation to benefit consumers. The owners of dominant operating systems should license their "interface specifications to any third party for the purposes of developing application software." "Barriers" should not be put up by dominant operating systems that limit consumers' or hardware makers' ability to reconfigure their desktops or utilize any software or online content services. Software vendors "should not intentionally disable, cripple, or otherwise interfere with the intended functionality and execution of other products." Operating systems should not prohibit Web sites from "exploiting the access capabilities of competing products" or force sites to display and promote their products. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNc1UbR8UA6T6u61AQHEQwH/cpSHIdQwCR0XVoxqEVya3E15ZBrmI5M8 hln8Dm2qFF39UjsNVLJhp4J4xDnyTdeRCDkGDixzI5qJqDwChz5prw== =sN0q -----END PGP SIGNATURE----- From Mia.Westerholm at DataFellows.com Wed Feb 4 01:43:42 1998 From: Mia.Westerholm at DataFellows.com (Mia Westerholm) Date: Wed, 4 Feb 1998 01:43:42 -0800 (PST) Subject: Data Fellows wins another acclaimed award Message-ID: <3.0.2.32.19980204104606.00bf56bc@smtp.DataFellows.com> Data Fellows Ltd. Media Release For immediate release 4 February 1998 DATA FELLOWS WINS ANOTHER ACCLAIMED AWARD International Success Recognized by Head of State The developer of F-Secure data security products, Data Fellows Ltd., has received the President of Finland�s Export Award. This award is granted annually to the most outstanding export companies in the country. This is the first time a developer of commercial software packages has been granted the award. Data Fellows is one of the world�s leading developers of data security products. It has offices in San Jose, California, and Espoo, Finland, as well as distributors in over 50 countries all around the world. Its products have been translated to over 30 languages. The company�s annual growth in net sales has been over 100% since it was founded in 1988. "The award is a recognition of our status as a leading international data security development company," says the Chief Executive Officer of Data Fellows Ltd., Mr. Risto Siilasmaa. "I believe our success is based on two things: excellent products and high quality services." The most successful product group of the company is its F-Secure Anti-Virus products. Data Fellows is the developer of the revolutionary CounterSign Technology, which enables the use of several scanning engines simultaneously. Due to this groundbreaking technology, the theoretical chances of a virus slipping through to a computer or a network are smaller than ever. F-Secure Anti-Virus offers unrivalled protection by combining the best available single scanning engine F-PROT with the AVP anti-virus engine, which also ranks among the best in the world. Another fast growing business area for Data Fellows is its F-Secure cryptography software products. The F-Secure product family uses the best available military strength encryption and authentification algorithms to protect confidential data. F-Secure products are based on the SSH protocol, which provides a generic transport-layer encryption mechanism for network connections. The SSH protocol provides both host authentication and user authentication, together with privacy and integrity protection. The products of Data Fellows have already won numerous international tests and competitions, including the 1996 European Information Technology Prize; Data Communications Magazine�s Hot Product of the Year 1997; SVM Magazine, May 1997, Best Anti-Virus; and SECURE Computing�s Editor�s Choice. Data Fellows belongs to an elite group of companies that have a triple-A rating from Dun&Bradstreet. Triple-A is the highest possible credit rating. For further information, please contact: Data Fellows Ltd. Mr. Risto Siilasmaa, Chief Executive Officer Tel. +358-9-859 900 e-mail: Risto.Siilasmaa at DataFellows.com or visit the Data Fellows web site at http://www.DataFellows.com ���������������������������������������������������� Mia.Westerholm at DataFellows.com http://www.DataFellows.com Data Fellows Ltd. PL 24 FIN-02231 ESPOO, FINLAND Tel. +358 9 859 900 Fax. +358 9 8599 0599 From sorrin at syndata.com Tue Feb 3 09:48:49 1998 From: sorrin at syndata.com (steve) Date: Wed, 4 Feb 1998 01:48:49 +0800 Subject: BSAFE 4.0 to force GAK?! Message-ID: <34D75774.6036@syndata.com> FYI Jan. 26's Network World has an article on page 33 titled "RSA blasts (but also supports) Government encryption policy". The paragraph of note is the fourth paragraph which reads:"The next version of the RSA encryption toolkit, BSAFE 4.0, will force those building products with anthing over 56 bit strength encryption to use a key-recovery center for exportable products...." I haven't been able to confirm this with other sources yet but the glaring question is how will this be enforced and how will it affect domestic products that wish to use BSAFE 4.0 for their crypto. Further what ramifications does this hold for their S/Mail toolkit for S/MIME? and I haven't seen this discussed on the list yet. Steve O -- A picture tells a thousand words. Stego -----BEGIN GEEK CODE BLOCK----- Version: 3.1 GCS/IT/S d--() s+: a-- C++++(++)$ ULS+++@ P++@ L+(++)$ E- W+(+++)$ N++$ !o K-? w++(+++)$ !O+>++ !M !V PS+(+++)@ PE(++)@ Y++$ PGP@ t+@ 5++@ X++>$ R+++>$ tv+@ b+@ DI+++>$ D+++@>$ G@ e++@>++++ h r* y+ ------END GEEK CODE BLOCK------ From Bill at rumplestiltskin.com Tue Feb 3 09:50:23 1998 From: Bill at rumplestiltskin.com (Bill at rumplestiltskin.com) Date: Wed, 4 Feb 1998 01:50:23 +0800 Subject: A fatal flaw in PGP 6.0 Message-ID: <235883DCF38CD011963A0060972DBB4D20720A@mail.executive.com> This was posted anonymously to alt.security.pgp last night >Subject: PGP 6.0 alpha3 >Date: 3 Feb 1998 00:15:56 +0100 > >Anyone else having problems with the alpha of PGP 6.0? When I try to encrypt e-mail I get an error: > >FATAL ERROR > >Unable to find key "ghost at nsa.gov" >Please obtain a new key from Network associates. > > >Other than that it's pretty slick! I'm not sure I'd have the default cypher as ROT-13 though! I changed mine to RC-2 255-bit. > >Anyone else? Anyone like to confirm this? From mhw at wittsend.com Tue Feb 3 10:33:51 1998 From: mhw at wittsend.com (Michael H. Warfield) Date: Wed, 4 Feb 1998 02:33:51 +0800 Subject: UrsinePunks (Re: County Mounties Spit on the 4th Amendment) In-Reply-To: Message-ID: <199802031748.MAA24574@alcove.wittsend.com> Tim May enscribed thusly: > At 6:25 AM -0800 2/3/98, Michael H. Warfield wrote: > >"Supertroupers" refers to State Patrol. The term "Smokie" (coined from > >the movie Smokie and the Bandit) refers to all police. > Nope, not coined from the movie. > Just the reverse. > Highway cops were called "smokies" (or "smokeys") when I was growing up in > Virginia in the 60s, long before the movie. Point conceded. Quite correct. > I haven't checked the derivation, but had always assumed it came from the > Smokey the Bear figure, who wore a tall, broad-brimmed hat (also known as a > campaign hat). The hat worn by many state highway patrols. Ergo, "smokeys." Yeah, I think that's true as well, now that you remind me. > (I used to see the _real_ Smokey the Bear at the Washington Zoo. I think he > died of old age in the 1970s.) > (A URL with a few details is > http://www.4j.lane.edu/websites/roosevelt/Connections/smokey.html) > --Tim May, posting from the Bear State > "National borders aren't even speed bumps on the information superhighway." > ---------:---------:---------:---------:---------:---------:---------:---- > Timothy C. May | Crypto Anarchy: encryption, digital money, > ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero > W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, > Higher Power: 2^3,021,377 | black markets, collapse of governments. Mike -- Michael H. Warfield | (770) 985-6132 | mhw at WittsEnd.com (The Mad Wizard) | (770) 925-8248 | http://www.wittsend.com/mhw/ NIC whois: MHW9 | An optimist believes we live in the best of all PGP Key: 0xDF1DD471 | possible worlds. A pessimist is sure of it! From tcmay at got.net Tue Feb 3 11:08:59 1998 From: tcmay at got.net (Tim May) Date: Wed, 4 Feb 1998 03:08:59 +0800 Subject: The War on Some Debts In-Reply-To: <199802031640.KAA18766@wire.insync.net> Message-ID: At 8:40 AM -0800 2/3/98, Eric Cordian wrote: >In a further blatant erosion of Constitutional rights, the California >Supreme Court has ruled that a person owing child support who fails to >seek or accept work may be jailed and fined for contempt of court, and >that this does not violate any Constitutional bans on involuntary >servitude or imprisonment for debt. Oh, things like this have been common in California, and elsewhere, for a long time. It's a big part of the reason many guys I know don't fall into the marriage trap. Not only does the court demand that fathers (and, in 0.001% of cases, mothers) go back to work, they also calculate what the "expected compensation level" is of a person and assess them alimony and child support based on _that_ number. As one example, a friend of mine at Intel was working at home to set up his own business. His wife left him (cleaning out the checking account and having movers cart the furniture away while he was on a trip) and then sued for outlandish alimony and child support benefits. The court based the amount he owed on what he _had been_ earning as an engineer at the company, and what the court figured would have been his current earnings there, not on what he was actually earning doing his startup company. His "earning potential." (Wait til the IRS and Congress figure they can start taxing folks based on their peak earnings potential...) He had to fold his business startup and go back to work. And not just at a job he liked...he had to find one that paid enough to pay off the bitch, based on his peak earning potential. This is also known as "supporting her in the lifestyle to which she had become accustomed"...never mind that when they were married my friend made damned sure she didn't spend money the way she wanted to...in her case, she presumably saw the divorce as a way to get half of all the saved assets, plus an extremely lucrative alimony/child support deal. (Meanwhile, the bitch took her property settlement, blew it on an expensive new car, lots of new furniture, expensive vacations, and, of course, didn't do a lick of work...until the money ran out. And now that the alimony has run out, she's now reduced to working as a technician for a disk drive company. My friend worked his butt off, saved his money, invested wisely, and is now once again "retired." He doesn't plan to make the same mistake again. He's mostly hoping she doesn't hire some new lawyers and try to get another piece of his newly-accumulated assets!) >This reverses nearly a century of contrary rulings. Look for this >"improved" interpretation to be expanded to other kinds of debts and >judgments as well, as soon as massive public acceptance of it for the >carefully picked child support issue is engineered. And, by the way, this whole mess about child support, alimony, and such is a big reasons for citizen-unit tracking programs. Many levels of government, from local social services to national agencies, want to know where the father-units are so that money can be siphoned off to the mother-units and child-units. All of the talk about "privacy laws" is mooted by the desire by Big Brother to track and trace "deadbeat dads" and others who BB thinks need tracking (everyone). I'm generally in favor of fathers paying for their children, but not the way things are done now. Where the father may have no visitation or custody rights, where the mother is often free to just kick back and watch soap operas on t.v. while the father works his butt off to pay for both households, where "community property" is divided without regard for who put the money in in the first place, and so on. If women want to look at why fewer and fewer men are "prepared to make a commitment," their favored psychobabble term, they need only look at how the courts have declared marriage + divorce to be a golddigger's dream. Marry a guy, divorce him a few years later, which he can't even contest, and have half of all of his accumulated assets, plus a lucrative benefits package. Such a deal. And even being a queer doesn't save someone...I hear that in California the gays and lesbians are pushing for community property "rights" to be established. The whole system needs to be nuked. --Tim May "National borders aren't even speed bumps on the information superhighway." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From anon at anon.efga.org Tue Feb 3 11:38:22 1998 From: anon at anon.efga.org (Anonymous) Date: Wed, 4 Feb 1998 03:38:22 +0800 Subject: A fatal flaw in PGP 6.0 Message-ID: This was posted anonymously to alt.security.pgp last night >Subject: PGP 6.0 alpha3 >Date: 3 Feb 1998 00:15:56 +0100 > >Anyone else having problems with the alpha of PGP 6.0? When I try to encrypt e-mail I get an error: > >FATAL ERROR > >Unable to find key "ghost at nsa.gov" >Please obtain a new key from Network associates. > > >Other than that it's pretty slick! I'm not sure I'd have the default cypher as ROT-13 though! I changed mine to RC-2 255-bit. > >Anyone else? Anyone like to confirm this? From lutz at taranis.iks-jena.de Tue Feb 3 12:08:28 1998 From: lutz at taranis.iks-jena.de (Lutz Donnerhacke) Date: Wed, 4 Feb 1998 04:08:28 +0800 Subject: A fatal flaw in PGP 6.0 In-Reply-To: Message-ID: * Anonymous wrote: >>FATAL ERROR >> >>Unable to find key "ghost at nsa.gov" >>Please obtain a new key from Network associates. >Anyone like to confirm this? No the key requested is 'snoop at microsoft.com'. But the ROT13 encoding is true even for PGP5. If you move or rename the randseed.bin to an other location (i.E. to install pgp2.6.3(i)n and pgp5 simultanusly) the file will be modified, but all encrypted messages have the same session key. On the other hand pgp5 does not confirm the OpenPGP draft. A converter can be found at ftp://ftp.iks-jena.de/pub/mitarb/lutz/crypt/software/pgp/OpenPGP/ From tcmay at got.net Tue Feb 3 12:34:08 1998 From: tcmay at got.net (Tim May) Date: Wed, 4 Feb 1998 04:34:08 +0800 Subject: the best justice money can buy --Lessig suspended In-Reply-To: <19980203.154218.attila@hun.org> Message-ID: I very strongly disagree with Attila the Hun on his views about Microsoft. But I won't argue the case here. My comments below are just on some specific points. His general outlook I am completely at odds with. At 7:49 AM -0800 2/3/98, Attila T. Hun wrote: > at this point, I would say M$ has won the game. W98 will > be released with IE4 as the desktop, complete with push > channels and www.msn.com --at that point, Jackson --if On this we agree. Microsoft cannot lose at this point. NT 5.0 and Windows 98 are presumably coming, and will be on 97% of all desktops. The issue of Netscape's browser is mostly meaningless, anyway, from a revenue standpoint. Navigator is now free for all users. Unless Big Brother tells MS what it must sell its browser for--shades of the "Anti Dog-eat-Dog Law" in "Atlas Shrugged"--it is likely to remain this way. (The real issue is going to be Web servers. Whether Netscape can prosper in the world that is coming is unclear.) > so... we will have multiple choice of OS: M$ on Intel, > M$ on SGI, M$ on Alpha --and SUN goes down the tubes as I wouldn't be so sure about these choices, either! SGI is hedging their bet on the MIPS processor family by porting to Intel processors and NT. (I predict SGI will drop the MIPS line for workstations and desktops, leaving the MIPS chips for Nintendo 64 and other such controller-oriented uses.) And Compaq has announced plans to acquire DEC, so the future of the Alpha processor is even more in doubt than before. (News reports are that the deal Intel made with DEC may be killed by this Compaq deal...and even if both deals go through, Compaq is unlikely to deviate in a major way from the Intel processor line.) Even Sun has announced major plans to port Solaris to the Intel Merced line. (They've long had ports...I mean a _serious_ port. Probably meaning a move away from the SPARC line.) So, we've got: -- MS on Intel-based systems from all major PC makers -- MS on Intel-based systems from DEC -- MS on Intel-based systems from SGI -- MS on Intel-based systems from H-P -- Solaris and H-PUX (or whatever H-P's UNIX is called) on Intel Merced And so on. (I've left out the PowerPC, as it appears now to be limited solely to the Macintosh market...even IBM and Motorola appear to have acknowledged its failure.) Looks to me like Intel is the real winner here. (And even Intel's competitors in the "Intel compatible" market are struggling, unable to make the chips. I've written about this several times. Just yesterday National Semiconductor admitted that its Cyrix chip unit was losing sales, falling further behind, having huge losses, and not producing needed new chips. Meanwhile, PC makers who foolishly committed designs to the AMD design are unable to deliver....CyberMax committed to the K6 line and is now unable to ship its only product, as the limited number of chips AMD can make are trickled out to other companies.) As for Attila's calls to break up MS...could make Bill Gates immensely wealthier, as he'd then have a piece of the 5 most successful software companies! (I assume Attila is not arguing for simply seizing his property and giving it to others, or running it as a government company, or just padlocking the doors....) --Tim May "National borders aren't even speed bumps on the information superhighway." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From nobody at REPLAY.COM Tue Feb 3 12:35:08 1998 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 4 Feb 1998 04:35:08 +0800 Subject: A fatal flaw in PGP 6.0 Message-ID: <199802032021.VAA18446@basement.replay.com> This was posted anonymously to alt.security.pgp last night >Subject: PGP 6.0 alpha3 >Date: 3 Feb 1998 00:15:56 +0100 > >Anyone else having problems with the alpha of PGP 6.0? When I try to encrypt e-mail I get an error: > >FATAL ERROR > >Unable to find key "ghost at nsa.gov" >Please obtain a new key from Network associates. > > >Other than that it's pretty slick! I'm not sure I'd have the default cypher as ROT-13 though! I changed mine to RC-2 255-bit. > >Anyone else? Anyone like to confirm this? From schear at lvdi.net Tue Feb 3 12:40:33 1998 From: schear at lvdi.net (Steve Schear) Date: Wed, 4 Feb 1998 04:40:33 +0800 Subject: New RAND IW Study Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/enriched Size: 964 bytes Desc: not available URL: From eureka at eureka.abc-web.com Wed Feb 4 04:59:38 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Wed, 4 Feb 1998 04:59:38 -0800 (PST) Subject: Eureka! Wed Feb 4 '98 Message-ID: <19980204083315.11433.qmail@eureka.abc-web.com> Welcome to Wednesday's issue of Eureka! PUSSY PARADISE Yet again Eureka! has managed to negotiate a special week's free access to one of the web' s premier porn sites. Pussy Paradise is simply packed with 100s of videos (many live), thousands of photos, and so much more. You will need your credit card as adult verification but it will not be charged for your free week! So check it out - there's smut a plenty! Pussy Paradise .... http://www.pussyparadise.com/eureka.html Playgal - No.1 in Internet Hardcore! http://www.playgal.com/playgal/banner_eureka.html Playgal presents FREE LIVE FUCKING, and over 2,000 FREE XXX MOVIES! THE REAL NETWORK Every now and then we come across a real winner. This is one of those places. Click on the Real Amateur Wives, Lovers & Girlfriends. Then click enter, then find Sarah. Ahh Sarah, she starts out slow but later you'll see what I mean. This is one must see amateur! A sexy young brunette with just the right amount of baby fat. Raw and real. Surf it now! The Real Network ................. http://www.ilynx.com/raw/ ANAL BABES Make a stop on the information super highway if you want to see some hot amateur action. Quick loading thumbnail pix, there for all to see. Check out the strange object pictures for one sexy blonde who love to show off her pink, and I'm not talking about her blouse either. You'd hate to miss it! Anal Babes ........................ http://www.analbabes.com LA LA LEGS Well, it's a leg thing, and a pantyhose thing, a babe thing a pussy, pussy, pussy thing! See their two galleries for the free pix. Dig the sexy school girl in the plaid skirt! Yum! La La Legs ......................... http://www.lalalegs.com NC17 Go to the site then to the enter here link at the bottom, then click on the index 2 photo gallery. Your in! Click on page one for one hot tasty blonde bombshell! The photos say lick me all over! Great tits, legs and ass! See the bush on the black haired beauty, page 4. It'll straighten your dick! NC17 .......................... http://www.nc17.com/nc2.html READ THIS!! WIN ,000 and a Fantasy Date - Click Here Now! ,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Teenage lesbian -> http://207.240.169.120/lesbian/start.html CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Shannon: An up and coming magazine model, this young thing has the dimensions of a Greek goddess - 36. 24. 32. This 22 year old whose turn-ons include candles and posing nude also loves to go 4x4ing, camping and rollerblading. Visit her to find out how much fun 4x4ing can be! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY Adult Story of the Day: Read something for a change! Every day the Adult Story of the Day offers you a free erotic sex story for your reading pleasure............................. ............................... http://www.adultstories.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?040 Pic 2 --------------------------> http://137.39.63.229/?041 Pic 3 --------------------------> http://137.39.63.229/?042 Pic 4 --------------------------> http://137.39.63.229/?043 Pic 5 --------------------------> http://137.39.63.229/?044 Pic 6 --------------------------> http://137.39.63.229/?045 Pic 7 --------------------------> http://137.39.63.229/?046 Pic 8 --------------------------> http://137.39.63.229/?047 Pic 9 --------------------------> http://137.39.63.229/?048 Pic 10 --------------------------> http://137.39.63.229/?049 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From dlv at bwalk.dm.com Tue Feb 3 14:02:41 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Wed, 4 Feb 1998 06:02:41 +0800 Subject: The War on Some Debts In-Reply-To: <199802031640.KAA18766@wire.insync.net> Message-ID: Eric Cordian writes: > > In a further blatant erosion of Constitutional rights, the California > Supreme Court has ruled that a person owing child support who fails to > seek or accept work may be jailed and fined for contempt of court, and > that this does not violate any Constitutional bans on involuntary > servitude or imprisonment for debt. > > This reverses nearly a century of contrary rulings. Look for this > "improved" interpretation to be expanded to other kinds of debts and > judgments as well, as soon as massive public acceptance of it for the > carefully picked child support issue is engineered. > > The credit card companies are no doubt carefully analyzing this decision > as we speak. Ah yes; once it's established that a parent owing alimony can be forced to work "to protect the children", expect similar treatments for taxes and credit card debt and judgments. The credit card issues are also lobbying very hard to exempt credit card debts from bankrucpy. For most of humanity's history, interest rates on loans to individuals were around 100-200% per annum; default rate was proportionate; bad debtors were jailed or enslaved; children inherited debt; etc. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From anon at anon.efga.org Tue Feb 3 15:07:56 1998 From: anon at anon.efga.org (Anonymous) Date: Wed, 4 Feb 1998 07:07:56 +0800 Subject: Microsoft Message-ID: <485f03d3211e0c7c6edc431cbfc8dc87@anon.efga.org> > so... we will have multiple choice of OS: M$ on Intel, > M$ on SGI, M$ on Alpha --and SUN goes down the tubes as > they will never capitulate. M$ will bury IBM with their > NT alliance with Ahmdal who clones all the IBM iron > --which is fading against the clustered servers. IBM > long since gave in on OS/2 versus M$ --it may figure in > their corporate strategy, but unless they are willing to > update past Netscape 2.02 they will lose that as well > --in fact you can no longer any of the IBM PCs with OS/2 > preloaded --except by special order: in quantity. I really am not so worried about Microsoft's software strategy as I am about their communication infrastructure strategy. Every time I go to a computer show or swap meet, I see stacks of Linux CDs selling like hot cakes. Most anyone with a clue who doesn't like Billy's crapware knows precisely where to find something better. What concerns me more is the partnerships that Billy & Co. are making with internet providers, especially cable & DSL. Many of the cable modem service providers have notoriously bad reputations for using packet filters to block stuff they don't like. These days, any internet provider who tries that shit usually finds its customers going elsewhere, but when there's only one or two cable providers and Mickeysoft owns them all, then what? The solution, of course, is encrypted IP, something which has been moving far too slowly. Frankly I'm pretty disappointed with the apparent unwillingness of several IETF members to address the obvious MITM attacks, such as CBC cut-and-paste. It is going to royally suck when we have to redo it because the protocol didn't work the first time. From tulii at ak.planet.gen.nz Wed Feb 4 08:03:01 1998 From: tulii at ak.planet.gen.nz (tulii at ak.planet.gen.nz) Date: Wed, 4 Feb 1998 08:03:01 -0800 (PST) Subject: BULK EMAIL FOR PROFIT Message-ID: <19980203997SAA14722@post.com.au> ****************************************************** MAIL THOUSANDS OF EMAIL MESSAGES PER HOUR - NO KIDDING !! SEND YOUR EMAIL MESSAGES OUT, AT 1,000's MESSAGES / HOUR (28.8K modem) YES, 1,000's Of Messages An Hour ****************************************************** 30 MILLION EMAIL ADDRESSES ******** $100.00 ******* ****************************************************** YOU'LL RECEIVE 2 HIGH-SPEED EMAIL SOFTWARE PROGRAMS Introducing...."FLOODGATE BULK EMAIL LOADER" AND...."GOLDRUSH STEALTH MASS MAILER" This is the same software that all bulk emailing services use! ---------------------------------------------------- Floodgate Bulk Email Loader Version 6.0 AND Goldrush Stealth Mass Mailer Version 3.215 for Windows 95 and Windows 3.1 now Supports 17 (really more with the free form filter) File Formats ---------------------------------------------------- SEND OUT 20,000+ MARKETING LETTERS EVERY SINGLE DAY! Or...every few days. In fact, when I send out just a few thousand marketing letters each day, it doesn't take long before I'm completely swamped with email inquiries and phone calls. This is very easy to do. And each one of these bulk mailings costs me nothing. I can teach you how to do this and provide you with the tools you'll need. If you've got a good marketing letter, I'll show you how to open the floodgates. You'll be deluged with inquiries, leads, and real sales, using nothing but email alone. Writing a good marketing letter is not easy. I often have to rewrite my marketing letters a half dozen times before I get the results I'm looking for. But once you have a good letter, as you probably know, you can use the same letter over and over again, predictably and consistently, closing sales, week after week, month after month. It takes me about one hour to send my marketing letter to THOUSANDS of fresh email addresses. I can do this, thanks to a Windows program I use. It's called Floodgate and Goldrush Stealth Mass Mailer. It's a bulk email loader and an email software program. If you're interested in electronic marketing, you should know about these programs. PROGRAM #1: FLOODGATE FOR WINDOWS The Floodgate Bulk Email Loader imports simple text files that anyone can download from CompuServe, Prodigy, Delphi Genie, or the Internet. These text files contain classified ads, forum messages, or data from the member directory. Each of these files is filled with email addresses. Floodgate is designed to read these files and strip out the email addresses. It then sorts the addresses, removes any duplicates, and formats them into an output file, with 10, 20 or 30 addresses per line. This is all done in one simple step. Just point and click. You'll need either a Windows based Internet account or an America On-line account to send out your marketing letters. Neither AOL nor the Internet charges to send email. Send your letter to 1,000 people or 10,000 people -- the cost is always the same. NOTHING! NEW! PREPARE A MAILING OF 50,000+ IN LESS THAN A 1/2 HOUR If you open an Internet account, you can send each letter to 20,000+ people. The new Floodgate now directly writes distribution lists. Some people are always collecting new addresses, but if you publish a newsletter or adsheet, you'll be using the same addresses over and over again. That's real power! When using addresses you've previously collected, you can press a few buttons and prepare a mailing of 50,000+ in less than a half hour. (To get a list of all the Internet access providers in your local calling area goto: http://thelist.com and click on your area code.) The Floodgate Users Guide will teach you, step by step, how to download the right files, how to strip the addresses, and finally, how to cut and paste the formatted addresses into your marketing letter. Or, if you have an Internet account, how to create distribution lists. One you've done this a few times you won't even have to think. It's that simple! FOR THE BRAVE & DARING: PUSHING TECHNOLOGY TO ITS LIMITS As you may know, the practice of sending unsolicited email is usually frowned upon, and most service providers have rules against it. But, like jay-walking, there is little enforcement. It's not illegal. If someone tells you that it is, ask them to provide the citation (and don't let them give you some nonsense about faxes - that's not email). They can't do it because it's not there. Sometimes, when a lot of people complain, I get a warning letter. And that's about it. About 1 in 200 will write back and tell me, "take me off the list", which I can do, thanks to Floodgates Remove List feature. Many people reply back thanking me for sending them my informative letter. That's always nice. Most people though, just reply and say, "send me more info." In this way, it usually takes me two or three letters to close a sale. The Floodgate Users Guide will provide you with proven formats for writing a successful marketing letter. You'll test and rewrite, test and rewrite. Then, once you've got it, just push a few buttons, and open the floodgates!!! THE FLOODGATE BULK EMAIL LOADER CURRENTLY SUPPORTS 17+ FILE FORMATS 1. CompuServe Classifieds: Send your marketing letter to everyone who is running a classified ad. I'll teach you how to download all the classifieds from any single ad category. This is one of the most responsive list of buyers. They check their email every day and they're already in business. 2. America On-line Classifieds: Download 1,000 addresses in 15 minutes. These are excellent lists for business to business sales. 3. CompuServe Forums: You can join a forum and download hundreds of forum messages in a matter of minutes. 4. America On-line Forums: Choose from dozens of forums. All good targeted lists. 5. Prodigy Forums: Prodigy allows you to easily export any group of forum messages. More targeted lists. 6. Internet Newsgroups: These are all targeted lists. You'll be able to send your marketing letter to everyone who posts a message in any newsgroup. Easily collect 1,000's of addresses per hour. 7. America On-line Member Directory: Most member directories only allow you to search by city and state. With AOL, you can search by business type, hobbies, computer type, etc. This is the gem of all member directories. Build huge targeted lists. 8. CompuServe Member Directory: This is a major resource. If you're willing to target your mailing to a single city, you can collect about 1,000 email addresses an hour. 9. Delphi Member Directory: The Delphi member directory allows you to search for people based on key words. These are good targeted mailing lists. A single search can easily generate 5,000 addresses. 10. Genie Member Directory: Similar to the CompuServe member directory, only you can download names much quicker. You can easily pull hundreds of thousands of addresses out of each of these member directories. 11. CompuServe File Cabinet: If you run classified ads, and save the responses in the CIM file cabinet, you'll be able to easily reuse these addresses. You can send your marketing letter to everyone in any single folder. Build master lists and clean UP your hard drive. 12. Free Form: If you have a text file with email addresses that floodgate does not support, chances are the Free Form filter will be just what you need. Just enter a key word to search for. 13. CompuServe Form Profiles (Forum Membership Directories): Easy to build targeted lists here. Each search can easily bring you 500+ addresses. 14. Genie Profiles: If you're building targeted lists, you'll get a lot of addresses very quickly from Genie. 15. Plain Addresses: Read Floodgate Master Files back into Floodgate to merge files and do selective mailings. Also useful for the management of email address lists that you might purchase. Floodgate also has filters to allow you to include or exclude any groups of addresses in your final distribution lists. For example, you could include only email addresses that ended in .com or exclude all with .gov. You could exclude all noc, root, and other addresses that almost guarantee a negative response. These filters are fully configurable and can be used together. BUILD REUSABLE MASTER FILES Floodgate maintains Master Files for each of your marketing letters. If you download from the same place on a regular basis, you only want to send your letter to the new people. Floodgate will compare the new addresses with those in the Master File, and prepare a mailing list of only new people. The new addresses are, of course, then added to the Master File. With each new mailing your Master File grows and grows. You may create as many Master Lists as you need. When you start a new marketing campaign, you'll want to send your new letter to everyone on your Master List. If you write a newsletter, each time you send your newsletter, you'll send it to everyone on a Master List. THE REMOVE LIST Very often, people will reply and tell you to take them off your mailing list. Place these addresses in the REMOVE.MST file and they will never receive another letter from you again. In this way, you will be operating your business with the most professionalism possible. DON'T BE FOOLED We have some new competitors that have tried to copy Floodgate. The following list describes why Floodgate is BETTER....... **Floodgate is a mature, bug free product. Not an initial release. **Floodgate comes with over 100 pages of step by step documentation. **Floodgate is the only one offering a money back guarantee. **Floodgate has more testimonials. **Filter for filter, Floodgate offers more capabilities, way more. **Floodgate does everything all the others *combined* claim. **Floodgate is by far the easiest to use. **There is NO *cutting and pasting* with Floodgate. **We have by far, the BEST technical support. SOME QUICK MATH Floodgate can pay for itself in a few days. It can also cut your advertising costs down to almost nothing. Think of what the competition will do when they get their Floodgate program. Don't be left in the dust - there are 75 million people out there, just a few keystrokes away. Let's do the math: - Email 50,000 sales letters (takes about 1-2 hours) - Let's say your product will bring you $5 profit per sale. - Let's also say you only get a 1% response(occasionally higher). * That's 500 orders x $5 = $2,500 profit !! Now imagine what 500,000 letters would do for your business !! WHAT CAN I MARKET ON-LINE? You can market anything on-line using direct email, that can be marketed using conventional postal direct mail marketing. The possibilities are practically endless. If it sells off-line, you can sell it on-line. EASY TO INSTALL AND EASY TO LEARN The Floodgate Email Loader requires Windows. The SUPPLIED MANUAL tells you where to go, what to do, and how to do it. All you need are basic computer skills that can be learned with a little practice or help from our computer savvy technicians. PROGRAM #2: GOLDRUSH STEALTH MASS MAILER Do not get this program confused with other slow speed programs that call themselves "STEALTH". This program is the only one in the world that can send email out at HIGH SPEEDS with one single connection to the internet. This is NEW, Cutting Edge Email Technology. First Of It's Kind.. The Most Powerful BULK EMAIL SENDER In The World.. NOTHING CAN EVEN COME CLOSE! Thanks to our top programmer's, this technology is NOW available and we are the only place you can get it from! *ONLY "ONE" DIAL-UP OR ISDN CONNECTION NEEDED. *NO MORE TERMINATED CONNECTIONS. *NO MORE WAITING TO SEND LARGE AMOUNTS OF EMAIL. *IMMEDIATE RESPONSE TO YOUR MASS MAILINGS. *YOU WILL HAVE ALL THE CONTROL AND CONFIDENCE OF SENDING EMAIL THE WAY IT SHOULD BE SENT... IN HUGE AMOUNTS! *SEND YOUR WHOLE LIST IN ONE DAY, WHETHER IT BE 500,000 OR 5 MILLION - AND JUST SIT BACK AND WAIT FOR YOUR ORDERS TO POUR IN. *NO MORE DOWNLOADING UNDELIVERABLE NAMES. Bulk Emailer's Dream Come True!!! - >>>GOLDRUSH STEALTH MASS MAILER<<< Connect to multiple mail servers (20 or more), make multiple connections to a single server or any combination of the two ( All Simultaneously ) with one single dial-up connection. SEND MULTIPLE SIMULTANEOUS MAILINGS... View complete details about your mailings. Shows each server your connected to, the status of that connection, how many messages are going out through that connection, etc... We show you ALL the tricks all the mass e-mailers don't want you to know... Here are just a few features the GOLDRUSH STEALTH MASS MAILER offers to you... *Forge the Header - Message ID - ISP's will Spin their wheels. *Add's a Bogus Authenticated Sender to the Header. *Add's a complete bogus Received From / Received By line with real time / date stamp and recipient to the Header. *Does NOT require a valid POP Account be entered in order to send your mailings. *Easy to use and operate *Plus much more! All this, at speeds of up to 1,000's messages/hour (28.8k modem). SPECIAL INTRODUCTORY PRICE... NOW YOU CAN HAVE BOTH THE FLOODGATE AND GOLDRUSH STEALTH MASS MAILER FOR JUST $499.00! UPDATE ... SAVE $149.05 AND ORDER NOW, BE ONE OF THE FIRST 100 ORDERS! Step up to the plate and play with the big boys TODAY and receive the COMPLETE 2 SOFTWARE PACKAGE for the unbelievably low price of ONLY $349.95! (Other bulk email software has sold for as much as $2,500 and can't even come close to the cutting edge technology of EASE, ACCURACY AND SPEED ... SPEED ... SPEED!) Try the Goldrush Stealth Mass Mailer & Floodgate Bulk Email Loader for 10 days FREE. And receive UNLIMITED technical support for 30 days. ************************************************************** 30 MILLION EMAIL ADDRESSES MILLIONS AND MILLIONS OF EMAIL ADDRESSES CD with MILLIONS of email addresses separated by domain name. All addresses are simple text format one per line. Addresses from the following domains: Pipleline, MSN, MCI, Juno, Delphi, Genie, AOL, Compuserve, Internet, .com & .net, MILLIONS OF THEM! Not available on diskette or download. ===> WANT THE MILLIONS OF ADDRESSES FOR $100.00? <=== Just buy our Floodgate / Goldrush software package (with ALL the bonuses INCLUDED), and the MILLIONS of addresses are yours for just $100.00 additional. These addresses will be delivered to you in simple text files that any bulk emailing program can use, on CD Rom. With this CD, YOU CAN BEGIN MAKING MONEY IMMEDIATELY!!! *************************************************************** ***SPECIAL BONUS #1:*** STOP Losing ISP Dial Up Accounts! If you order The FLOODGATE / GOLDRUSH software within the next 5 days - When you receive your program, you will also receive: *Complete instructions on "how to keep your dial up account from showing up in the header", plus everything you will need to get started doing this. IMPORTANT NOTICE! We will initially only be offering 100 copies of the program for sale, First come / First Served basis only. We are doing this because of the extreme power that these programs offer. ***SPECIAL BONUS #2*** When you receive your two programs, you will also receive: OVER 250 REPRINT AND RESELL RIGHTS REPORTS YOU CAN START TO MARKET AND MAKE MONEY IMMEDIATELY!!! These HOT sellers include: 1) How to Get a Top Rating in the Search Engines 2) 70 Money Making Reports 3) 75 MONEY MAKING PLANS & TRADE SECRETS and MUCH MUCH MORE!!! ($200 RETAIL VALUE - FREE!!!) ***SPECIAL BONUS #3*** With your two software programs, you will also receive our NEW "Address Grabber" utility program that enables you to grab 100's of THOUSANDS of email addresses from newsgroups in minutes ($100 RETAIL VALUE - FREE). ***SPECIAL BONUS #4*** RECEIVE CHECKS BY EMAIL, PHONE OR FAX MACHINE. With this software program, you can receive payment for your product or service INSTANTLY!! There is no more waiting for your customers check to arrive. This software will no doubt, add to your sales, for customers who don't have credit cards, as well as the impulse buyers. With this software, you can print up your payments as soon as your customer gives you his/her checking information. You will then add the information given, to the proper blank check spaces, then just print and go to the bank!! *************************************************** To get your FREE demo and "test drive" our state-of-the-art software, fax us your email address and request to: 1-561-966-6839 **************************************************** HURRY ... RESERVE YOURS TODAY! So, if you are interested in taking advantage of the most powerful bulk email software in the world and start making money hand over fist..... Print out the EZ ORDER form below and FAX or MAIL it to our office. If you have any questions don't hesitate to call us at: 1-561-965-6139 SYSTEM REQUIREMENTS 386 or larger Windows 95 OR Windows 3.1 with 8 meg ram Extra 5 MB hard drive space Floodgate & Goldrush can be run on a fast Mac with 24 MB RAM and SoftWindows. NOTES FROM SATISFIED USERS "It is everything you said it was. Within one week of my first mailing, I received a record number of orders. All you need to print money is a decent sales letter. Thanks." Randy albertson, Wolverine Capital. "After using Floodgate and your utility program all day today, let me say these are as two of the finest programs I have ever bought in my 52 years! Your support has been superb. Thank You!" Vernon Hale, Prime Data Systems "My first day and I just used Floodgate and Pegasus to send 1,469 sales letters. So far I've got about 25 positive responses. It works GREAT!!! Thanks." Donald Prior "Floodgate is awesome!. I recently started a new business on-line. I stripped the addresses of the AOL & CIS classifieds. I sent out 3,497 email letters and got over 400 people to join my company in 5 days! Needless to say, it pays for itself." David Sheeham, OMPD "I was able to use Floodgate to extract the names from the Internet news groups. It works perfectly. Needless to say, I am very excited about the use of this new technology." Mark Eberra, Inside Connections "This is a great piece of software and an invaluable marketing tool." Joe Kuhn, The Millennium Group "I just thought you'd like to know that this program is fantastic. After loading it on my system, I wanted to test it out. In my first hour of using this, I collected 6,092 email addresses!" Richard Kahn, LD Communications "I just love the Floodgate program. It saves me hours and hours of time. This is the beginning of a wonderful FUN time marketing on-line. Thank you so much for writing this program." Beth O'Neill, Eudora, KS "Your software is brilliant, and from the technical support I've received, I can see you have a genuine love and respect of people...Floodgate is a divine package. Wish I had found it sooner." Tom Sanders, Peoria, IL "I really like the way the Floodgate software package works. It is very easy to use, and really does the trick. It has already saved me an incredible amount of time and energy." John Berning, Jr., Fairfield, NJ "It's going great with FLOODGATE! I like using Delphi. I just collected 50,000+ addresses within 20 minutes on-line." Richard Kahn, R&B Associates ------------------------------------------------- E-Z ORDER FORM: Please print out this order form and fill in the blanks...... Please send order form and check or money order, payable to: Ted Keller P.O. Box 741342 Boynton Beach, FL 33474-1342 (561)-965-6139 ______Yes! I would like to try your cutting-edge software so that I can advertise my business to thousands of people on-line whenever I like! I understand that I have 10 days to trial the software. If I am not fully delighted, I will cheerfully be refunded the purchase price, no questions asked! Please rush me the FLOODGATE and GOLDRUSH package now! ______I am ordering within 72 hours! That qualifies me to receive the FLOODGATE and GOLDRUSH package at a substantial discount! I am ordering BOTH software packages for only $349.95. (Save $150 off the retail price....Software has sold for as much as $2,499.95) ______I am ordering within 72 hours! That qualifies me to receive UNLIMITED technical support for 30 days. ______I want to receive the package OVERNIGHT. I'm including $18.00 for shipping charges. ______I want to receive the package 2nd DAY. I'm including $10.00 (includes insurance & return receipt) for shipping charges. ______I'm ordering Floodgate / Goldrush software and want to order the MILLIONS of email addresses as well. My additional cost is $100.00 enclosed. ______I'm NOT ordering your Floodgate / Goldrush software, but I want to order your MILLIONS of email addresses on CD. Enclosed is $249.00. (CHECKS: ALLOW 1 WEEK FOR BANK CLEARANCE) YOUR NAME_________________________________________________ COMPANY NAME_________________________________________________ YOUR POSITION_____________________________________________ STREET ADDRESS______________________________________________ CITY, STATE, ZIP____________________________________________ PHONE NUMBERS_______________________________________________ FAX NUMBERS_________________________________________________ EMAIL ADDRESSES_____________________________________________ ************************************************************ We accept Checks, Money Orders, MasterCard, Visa, American Express. You can either mail your order to us OR fax your order to: (561)-966-6839 ************************************************************ Today's date:_____________ Visa____MasterCard____American Express____Discover_______ Card #:____________________________________________________ Expiration date:___________________________________________ Name on card:______________________________________________ Billing address:___________________________________________ Amount to be charged: $________________ Signature:___________________________________________ I agree to pay Ted Keller an additional $29 fee if my check is returned for insufficient or uncollectable funds. SIGNATURE: X________________________________DATE:_______________ Please send all order forms and check or money order to payable to: Ted Keller P.O. Box 741342 Boynton Beach , FL 33474-1342 (561)-965-6139 *************************************************** OR: PLEASE PASTE YOUR CHECK HERE (If you fax a check, there is no need for you to send the original check by mail. We will draft up a new check, with the exact information from your original check that you faxed to us) Please fax the above order form and check to: 1-561-966-6839 C From MAILER-DAEMON at toad.com Wed Feb 4 08:41:00 1998 From: MAILER-DAEMON at toad.com (MAILER-DAEMON at toad.com) Date: Wed, 4 Feb 1998 08:41:00 -0800 (PST) Subject: FDA Registered and FDA Certified Message-ID: <199802011821.MAA25009@mail.t-1net.com> Exclusive New Oral Transmucosal Weight Control Disc & Transdermal Patch, both FDA Certified & Registered with National Drug Code #'s. Developed by 10 year old Pharmaceutical Company. For detailed information reply to: alt at sierranv.net From billp at nmol.com Tue Feb 3 18:52:45 1998 From: billp at nmol.com (bill payne) Date: Wed, 4 Feb 1998 10:52:45 +0800 Subject: Jim Omura Message-ID: <34D7D1DC.4EC6@nmol.com> Tuesday 2/3/98 7:22 PM Jim Let's get this settled. I have not read cylinked.htm Latest: Cylinked to Organized Crime? January 29, 1998 YET. Hope you liked the SAND report, now posted at jya.com, I sent you in 1992. I listened carefully at the breakfast you, I, Lou {lew?} Morris had. Later bill Title: Cryptome Cryptome � JYA/Urban Deadline OpEd _______________________________________________________________________________________ File Topic Date _______________________________________________________________________________________ In Athena's Camp Preparing for Conflict in the Info Age (offsite) February 3, 1998 cylink-sins.htm Cylink Secures SINS February 3, 1998 pg-get-MSkey.htm Update: How to Recover Private Keys for MS Wares February 3, 1998 bxa020398.txt Exports of High Performance Computers February 3, 1998 sib.htm Scientists in Black February 3, 1998 CAP The Cryptographic Analysis Program (offsite) February 2, 1998 Arne Beurling The Geheimschreiber Secret (offsite) February 2, 1998 Army Stegano US Army Steganography (offsite) February 2, 1998 Colossus Rebuilding Colossus (offsite) February 2, 1998 Frode Crypto Cryptology Papers (offsite) February 2, 1998 jimbell9.htm Jim Bell Update February 2, 1998 echelon-boost NSA Surveillance System Boosted (offsite) February 2, 1998 cn020298.txt Crypto News February 2, 1998 bxa020298.txt BXA Meet on Export Rules and Procedures February 2, 1998 cs020298.txt Rules to Challenge Customs Seizures (63K) February 2, 1998 usg020298.txt USG Secret Meets February 2, 1998 echelon.htm NSA Global Surveillance System February 2, 1998 cathedral.htm The Cathedral and the Bazaar February 1, 1998 natsec-rule.htm Protection of National Security Information February 1, 1998 47cfr216.txt National Communications Issuance System (106K) February 1, 1998 47cfr213.txt Emergency Telecomms Precedence System (17K) February 1, 1998 47cfr202.txt National Security Emergency Plans & Ops (27K) February 1, 1998 47cfr201.txt Policy for Telecomms During Emergencies (12K) February 1, 1998 44cfr336.txt Facilities for National Security Emergency (14K) February 1, 1998 44cfr334.txt FEMA Graduated Mobilization Response (14K) February 1, 1998 32cfr322.txt Privacy Act Exemption for NSA Records (40K) February 1, 1998 32cfr299.txt National Security Agency FOIA Program (8K) February 1, 1998 32cfr2101.txt National Security Council FOIA Requests (24K) February 1, 1998 32cfr185.txt Military Support to Civil Authorities (52K) February 1, 1998 31cfr9.txt Effects of�Imported Articles on National Security February 1, 1998 22cfr124.txt Contracts, Off-Shore Buys, Defense Services (42K) February 1, 1998 22cfr123.txt Licenses for the Export of Defense Articles (51K) February 1, 1998 22cfr121.txt United States Munitions List (92K) February 1, 1998 _______________________________________________________________________________________ ntia-dnsdrft.htm Draft Proposal for New Domain Name System January 30, 1998 korczak.txt Boris Korczak: CIA Agent Seeks Payment January 30, 1998 pm87.txt Prez on Terrorist Threat to Middle East Peace January 30, 1998 leahy-wipo.txt Senator Leahy on Ratifying WIPO Treaties January 30, 1998 32cfr147.txt DoD: Policies for Access to Classified Info January 30, 1998 32cfr148.txt DoD: Facilities for Storing Classified Info January 30, 1998 32cfr149.txt DoD: National Policy on Technical Surveillance January 30, 1998 ntia012798.htm RFC: Self-Regulation for Privacy Protection January 30, 1998 cylinked.htm Latest: Cylinked to Organized Crime? January 29, 1998 websoft-warn.htm Web Software Warning January 29, 1998 scant-peril.htm U.S. Spy Agencies Pauline Peril January 29, 1998 mossburg.htm E-Comm Forum on E-Authentication and DigSig January 29, 1998 pollard.htm Bankers O Table on E-Authentication and DigSig January 29, 1998 brown.htm Secret Service on Financial Instruments Fraud Janaury 29, 1998 rpk-hack.htm Invite to Hack RPK InvisiMail January 29, 1998 nrc012998.txt Generic Letter on Y2K Readiness for Nuke Plants January 29, 1998 fc012998.txt FinCEN RFC on Information Collection January 29, 1998 dtc012998.txt Arms Export to Saudi Arabia January 29, 1998 nsa-etc-nf.htm NSA, Echelon, Trade & Crypto/Netscape & Fortify January 28, 1998 dod012898.txt DoD Blacklist of Higher Education January 28, 1998 47usc1002.txt Interception of Digital and Other Communications January 28, 1998 cn012898.txt Crypto News January 28, 1998 cn012798.txt Crypto News January 27, 1998 bxa-fy98.txt BXA Funding FY 1998 January 27, 1998 cia-tsang.htm CIA Concedes Spying on Americans January 26, 1998 atpc.htm EU-Parliament: Technologies of Political Control January 26, 1998 us-crypto.htm US Crypto Policy January 25, 1998 pg-nzcrypto.htm New Zealand Crypto Policy January 24, 1998 ra-ukcrypto.htm UK Crypto Policy January 24, 1998 whp012398.htm Payne/Morales vs. NSA: Reply to Defendant January 23, 1998 kellner.htm Intellectuals and New Technologies (66K) January 23, 1998 bxa012398.txt BXA Penalizes Export Violator January 23, 1998 osd012398.txt Compensation of North Viet-Imprisoned Operatives January 23, 1998 dod012398.txt Defense Dept Secret Meets January 23, 1998 walton-pk.htm GCHQ: The Pre-History of Public Key Cryptography January 22, 1998 primer The Proliferation Primer (offsite) January 22, 1998 sh105-238.txt Proliferation and US Export Controls (196K) January 22, 1998 sh105-267.txt Safety and Reliability of US Nukes (347K) January 22, 1998 acda012298.txt Arms Control Secret Meet January 22, 1998 pd012298.txt Prez Notice on Mideast Terrorism Emergency January 22, 1998 bia012298.txt Rule on Indian Casinos January 22, 1998 cn012198.txt Crypto News January 21, 1998 fc98.htm Financial Cryptography '98 January 20, 1998 doj-ssgsup.htm Supplement to Fed Guide for Seizing Computers January 20, 1998 cn-netreg.htm New Chinese Internet Regulations January 20, 1998 ietf-dea-97.htm IETF Draft Encryption Algorithms 1997 January 20, 1998 radio-rec.htm Update: Locating Radio Receivers; Encoder Stolen January 20, 1998 pipenet.htm PipeNet Description January 20, 1998 dod012098.txt Defense Dept Secret Meets January 20, 1998 bernstein12.htm Transcript of Bernstein Hearing January 19, 1998 fbi-umbc.htm Barry Smith (FBI) to Speak on Encryption Policy January 18, 1998 de-snoop.htm Update: German Surveillance State January 17, 1998 bxa-wa-rule.htm Update 2: BXA Rule on the Wassenaar Arrangement January 16, 1998 pd98-10.htm Prez OKs China's Nuclear Controls January 16, 1998 tcryptol Theory of Cryptography Library (offsite) January 16, 1998 cn011698.htm Crypto News January 16, 1998 nsasuit8.htm USA/NSA Responds to Payne/Morales Motion Janaury 16, 1998 dod011698.txt Defense Dept Secret Meets January 16, 1998 bxa011398.txt Materials Advisory Meet January 15, 1998 crypto-kong.htm Announcing Crypto Kong January 15, 1998 occ-dstc.htm OCC OKs CA as Authorized Banking Activity January 14, 1998 aes-980820 Advanced Encryption Standard Conference (offsite) January 14, 1998 ustr010898.txt Update: Telecommunications Trade Agreements January 14, 1998 rc2.htm Rivest Describes RC2 Encryption Algorithm January 13, 1998 fc011398.txt FinCEN Regulates Card Clubs January 13, 1998 ta011298.txt Key Management Infrastructure Meet January 12, 1998 nist011298.txt Transmission-Electron Microscopy Meet January 12, 1998 doa011298.txt Army Hazard Containment Invention January 12, 1998 gps-jam.htm GPS Jamming January 11, 1998 arthur.htm The Force of An Idea: Theory of USA v. Microsoft January 10, 1998 RSA-stego.htm Batch RSA for Stego Data January 9, 1998 batch-DSA.htm Batch DSA January 9, 1998 cell-track.htm Update 2: Mobile Cell Phone Surveillance January 9, 1998 fiat-rsa.htm Fiat's Batch RSA January 9, 1998 aes010798.htm Update: Advanced Encryption Standard January 9, 1998 doj010998.txt RFC: USA v. IBM/STK Antitrust Suit January 9, 1998 bmd010898.txt Ballistic Missile Defense Secret Meet January 9, 1998 nih010898.txt Commercialization of Medical Data January 9, 1998 fas-pde Prez Directives/Executive Orders (offsite) January 7, 1998 ussc-ecopy.htm Sentencing for Electronic Copyright Violations January 6, 1998 ussc010698.txt RFC: US Sentencing Guidelines (254K) January 6, 1997 mercier.htm Terrorists, WMD, and the US Army Reserve January 6, 1998 terror-rnd.htm US Counterterrorism R&D Program January 6, 1998 belet Bob East Letter on AP/Jim Bell/IRS (offsite) January 6, 1998 pitfalls Schneier: Security Pitfalls in Crypto (offsite) January 5, 1998 dsb010598.txt Defense Science Board Secret Meets January 5, 1998 ntia010598.txt Funds for Public Telecommunications January 5, 1998 cn010598.txt Electronic Surveillance News January 5, 1998 csda.htm Cypherpunks Smartcard Developer Association January 4, 1998 aimd-98-21.htm Executive Guide: Info Security Management (139K) January 3, 1998 blast-mono.htm Blast Resistant Doors Monograph January 3, 1998 tempest-door.htm Electromagnetic Shielding/TEMPEST Door January 3, 1998 ehj.htm Banned Basque Video: Democratic Alternative January 3, 1998 fda010298.htm Policy for External Penile Rigidity Devices January 2, 1998 doe010298.htm Defense Nuclear Facilities Safety Plan January 2, 1998 dos010298.txt Meet on Global Communications and Info Policy January 2, 1998 doa010298.txt Army Science Board Meet January 2, 1998 _______________________________________________________________________________________ Cryptomb 2 June-December 1997 Cryptomb 1 To May 31 1997 � � � � (site stats) � DoE: Pay Bill Payne�� DoJ: Free Jim Bell Title: Payne/Morales vs. NSA: Reply to Defendant's Response 23 January 1998 Source: William H. Payne See related documents: http://jya.com/whpfiles.htm FILED UNITED STATES DISTRICT COURT DISTRICT OF NEW MEXICO 98 JAN 20 AM11:26 ROBERT M. MARSH CLERK/ALBUQUERQUE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW MEXICO William H. Payne ) Arthur R. Morales ) ) Plaintiffs, ) ) v ) CIV NO 97 0266 ) SC/DJS ) Lieutenant General Kenneth A. Minihan, USAF ) Director, National Security Agency ) National Security Agency ) ) Defendant ) REPLY TO DEFENDANT'S RESPONSE TO PLAINTIFFS' MOTION FOR SUMMARY JUDGMENT BASED ON EVIDENCE FROM ADMISSIONS 1 COMES NOW plaintiffs Payne [Payne] and Morales [Morales] [Plaintiffs], pro se litigants to exercise their rights guaranteed under the Constitution, Rules of Civil Procedure, and Local Civil Rules to respond to Defendant's MOTION filed on 98 JAN-5 within the 14 days allowed by local rule 7.3(b)(4). 2 US Attorney Mitchell [Mitchell] writes, Counsel for Defendant was not served with copies of any of said Requests for Admissions until sometime after the individuals had been served.2 Mitchell WAS SERVED PLAINTIFFS' FIRST SET OF REQUEST FOR ADMISSION TO NSA DIRECTOR KENNETH MINIHAN I HEREBY CERTIFY that a copy of the foregoing request for admissions was mailed to Jan Elizabeth Mitchell, Assistant US Attorney, 525 Silver SW, ABQ, NM 87102 this Monday November 3, 1997. Michell was not served with any other admissions since Mitchell is not representing others. Plaintiffs' served Defendant Minihan properly. And Minihan failed to respond to Minihan's admissions within the time 1 allotted by law. 3 US Attorney Mitchell writes, As grounds for the Motion and Memorandum, Defendant argued that Plaintiffs had blatantly disregarded this Court's Order pertaining to the conduct of discovery and the deadline for discovery in this Freedom of Information Act action. Judges Svet and Campos willfully violated Plaintiffs' right to Discovery. And thereby earned criminal complaint affidavits filed with judge Scalia of the Supreme Court. 4 US Attorney Mitchell writes, In Defendant's Motion and Memorandum, Counsel for Defendant also objected to Plaintiffs' sua sponte decision to modify the Court's June 11 Order to reflect the delay of the Court's October 7 Order and the establishment, without leave of this Court, of new deadlines for discovery, motions practice, and the filing of the PreTrial Order. (Motion and Memorandum 9, at 4.) Judge Svet and Campos attempt to deny Plaintiffs' right to Discovery, again, earned Svet and Campos criminal complaint affidavits. Plaintiffs exercise their right under the Federal Rules of Civil Procedure and the Constitution to conduct Discovery WITHOUT LEAVE OF COURT! 5 US Attorney Mitchell writes, By their own request, Plaintiffs sought to stay a ruling on the Defendant's Motion and Memorandum. Absent any ruling on either the Motion and Memorandum or Plaintiffs' Response, Defendant Minihan, employees of NSA, and employees of Sandia National Laboratory, were not obligated to respond to the Requests for Admissions as provided by Fed.R.Civ.P. 36.3 For Plaintiffs to now assert in their "Motion for Summary Judgment On Based On Evidence From Admissions" that because the individuals have not responded to the Requests for Admissions they are deemed admitted, flies in the face of their own prayer to this Court to stay a ruling on the Defendant's Motion to strike the Requests for Admissions until the Supreme Court takes action. 2 Plaintiffs' have REPEATEDLY asked judge Svet and Campos to disqualify themselves from any rulings on this case because Campos and Svet do NOT obey the Federal Rules of Civil Procedure. Replace judges Svet and Campos because these judges have demonstrated, IN WRITING, they do not follow the Federal Rules of Civil Procedure. Plaintiffs' pleas are directed a[t] replacement judge[s]. Not Svet and Campos. Therefore, Svet and Campos' failure to remove themselves does not stop the legal process. Mitchell cites NO law to support her claim that time constraints imposed under Fed.R.Civ.P. 36.3 are inapplicable as a result of Svet's and Campos' failure to remove themselves. 6 US Attorney Mitchell writes, Defendant requests that this Court either rule upon Defendant's Motion and Memorandum granting the request to strike the Requests for Admissions, or grant Plaintiffs' request to stay this action pending the issuance of the order sought by Plaintiffs in another forum. Should this Court deny Defendant's Motion and Memorandum, Defendant respectfully requests that the individuals to whom Requests for Admissions are appropriate in this action be given the thirty days to respond to said admissions as provided by the Federal Rules of Civil Procedure. REPLACEMENT JUDGES of the Court should realize the outcome of the lawsuit has attained international interest as a result of the 1 bungled NSA spy sting on Iran 2 US government agencies NSA, NIST, and the FBI's attempt to control cryptography. Mitchell's DEFENDANT'S RESPONSE TO PLAINTIFFS' MOTION FOR SUMMARY JUDGMENT BASED ON EVIDENCE FROM ADMISSIONS was posted on Internet at jya.com, click cryptome 3 nsasuit8.htm USA/NSA Responds to Payne/Morales Motion January 16, 1998 Importance of this posting is summed-up in the Toronto Sun, Jan. 11, 1998 US, Iran Need Each Other by Eric Margolis Iran launched a surprise charm offensive last week, throwing Washington into serious confusion. In a lengthy interview on CNN, Iran's new president, Mohammad Khatami, skillfully analyzed the bitter relations between the two nations and cautiously extended an olive branch to Washington, calling for an end to their 19-year cold war. Khatami's diplomatic ju-jitsu flummoxed the Clinton administration, which was busy trying to rally international support against Tehran - and to overthrow Iran's elected government. Both capitals are split over the question of relations. In Washington, the military establishment and conservative Republicans have inflated Iran into a bogeyman to justify military budgets and keep U.S. forces in the Mideast. ... America incited Iraq to invade Iran in 1980. They did this to crush the Islamic revolution, then provided massive war aid to Saddam Hussein. Half a million Iranians died. The US got caught involved in genocide. Using high tech. This is one subject of this lawsuit. Albuquerque Journal Tuesday 1/13/98 carried the editorial. Khatami Move Is Profile in Courage Richard Reeves Syndicated Columnist LOS ANGELES - If an American leader had done what Iranian President Mohammed Khatami did last Wednesday, it would have been hailed as a profile in courage. ... Miscalculation! We armed and pampered Saddam Hussein in the hope that Iraq would destroy Iran. Now that's policy and behavior to think about. Here is something to think about: If Presidents Eisenhower and Kennedy had pursued any kind of sensible policy toward Cuba and Fidel Castro - opposed to 4 the policy of trying to assassinate him - there never would have been a Cuban missile crisis. I think Iranians have financed and encouraged terrorism against the interests of the United States and Israel. I would not be surprised at all if something like proof emerges soon, perhaps anonymously, from the CIA and other government agencies, where many officials have built their careers on sanctioning and isolating Iran, to try to straighten the backbones of the president and people of the United States. If they succeed, America fails. What would be more effective in closing down Iranian terrorism? More hostility, sanctions and charges? Or beginning the process toward more normal relations with a country positioned and born to be great? ... Clearly genocide fits into [missing text] Now that's policy and behavior to think about. The wired world is watching what this Court, hopefully minus judges Svet and Campos, will do. What is there to be? A series of possibly unfortunate events? Or does this Court order release the lawfully requested documents to help settle this American tragedy? WHEREFORE. 7 Have replacement judges of this Court DENY Mitchell's Plaintiffs requested a stay. Absent a ruling from this Court denying their request, they cannot proceed to assert that the Requests for Admissions are deemed admitted. Accordingly, Plaintiffs' "Motion For Summary Judgment On Based On Evidence From Admissions" must be denied. for reason that Mitchell's request to subvert both the Discovery processes and its time limits have no basis in law. And appears to plead to judges who do not obey the Federal Rules of Civil Procedure. [No 8] 9 IMMEDIATELY ORDER Defendant to release the requested documents in the interest of national safety so that this 5 matter can be settled. Aggrieved victims of US genocide are reading these pleadings. Respectfully submitted, [Signature] _________________________ William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 [Signature] _________________________ Arthur R. Morales 1024 Los Arboles NW Albuquerque, NM 87107 Pro se litigants CERTIFICATE OF SERVICE I HEREBY CERTIFY that a copy of the foregoing memorandum was mailed to Lieutenant General Kenneth A. Minihan, USAF, Director, National Security Agency, National Security Agency, 9800 Savage Road, Fort George G. Meade, MD 20755-6000 and hand delivered to John J. Kelly, US Attorney, 525 Silver SW, ABQ, NM 87102 this Tuesday January 20, 1997. [Arthur R. Morales signature] 6 [End] Title: Cylink Corporation ! ! ! ! ! EmploymentCylink Corporation NewsLearn more about Algorithmic ResearchPrivateWire FAQCylink's Critical Weapon in the Drug WarBank Leumi Selects PrivateWire Cylink Opens Service Centers in India and ChinaCylink Extends Service to Remote AreasCylink Gains RUS Acceptance for Airlink T1 Product From ryan at michonline.com Tue Feb 3 18:57:17 1998 From: ryan at michonline.com (Ryan Anderson) Date: Wed, 4 Feb 1998 10:57:17 +0800 Subject: the best justice money can buy --Lessig suspended In-Reply-To: Message-ID: On Tue, 3 Feb 1998, Tim May wrote: > > (I've left out the PowerPC, as it appears now to be limited solely to the > Macintosh market...even IBM and Motorola appear to have acknowledged its > failure.) Unless I've missed some absolutely major announcement, IBM is betting on the PowerPC in all their servers. Well, at least in their RS/6000 and AS/400, which is pretty much their entire high-end market. The PowerPC never had a serious entry into the desktop market anywhere but the Macintosh to my knowledge. Ryan Anderson - Alpha Geek PGP fp: 7E 8E C6 54 96 AC D9 57 E4 F8 AE 9C 10 7E 78 C9 print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 On 2/3/98 9:45 PM, Ryan Anderson (ryan at michonline.com) passed this wisdom: >On Tue, 3 Feb 1998, Tim May wrote: > >> >> (I've left out the PowerPC, as it appears now to be limited solely >> to the Macintosh market...even IBM and Motorola appear to have >> acknowledged its failure.) > >Unless I've missed some absolutely major announcement, IBM is >betting on the PowerPC in all their servers. Well, at least in >their RS/6000 and AS/400, which is pretty much their entire >high-end market. > >The PowerPC never had a serious entry into the desktop market >anywhere but the Macintosh to my >knowledge. ... and while Intel is not so quietly making noises about the soon to be available 333MHz Pentium IIs, Motorola quietly announced 400/433 MHz PPC chips two weeks earlier. Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "Fate favors the prepared mind." (from "Under Siege 3") From guy at panix.com Tue Feb 3 19:30:44 1998 From: guy at panix.com (Information Security) Date: Wed, 4 Feb 1998 11:30:44 +0800 Subject: Whoa: British SmartCard rollout Message-ID: <199802040323.WAA16673@panix2.panix.com> > From: bill payne > To: webmaster at cylink.com > CC: federico pena <" Federico.F.Pena"@hq.doe.gov>, jy at jya.com, > john gilmore , j orlin grabbe , > cypherpunks at toad.com > Subject: Jim Omura > cn010598.txt Electronic Surveillance News January 5, 1998 2 January 1998, Newsbytes: British Govt Announces Smart Card Plans for UK Citizens London, England: Amid the quiet of the Christmas and New Year break, the British government revealed plans for a "citizen's smart card" that will streamline the interfacing of British people with their government. In plain English, that translates to a smart card that can be used to allow people to pay all of their taxes, including income tax, national insurance, and local taxes, as well as apply for passports, state benefits, and other forms of government welfare. The idea behind the smart card, according to Peter Kilfoyle, the British public services minister, is that people will be able to use the card to identify themselves to the various government computers, all of which will be interlinked with each other. Kilfoyle claims that there are "huge potential savings" to be had from the introduction of the smart card, although he revealed that possessing a card will be voluntary. When questioned further on this, he admitted, however, that people could find it difficult to operate in the future without such a card. Initially, the citizen's smart card will rely on traditional PIN protection systems to allow a person to ID themselves alongside the card to the government computer systems. In the longer term, and certainly within the next five years, the plan is to allow an individual to use a fingerprint or similar biometric system for positive identification. ---- Fingerprinting everyone on the planet: those of you in CA and a handful of other states have already been fingerprinted "so you can drive". Police will eventually be able to stop anyone and demand to check their fingerprints via cheap small portable scanners. EFF/EPIC etc need to specifically target these biometric systems as being way over the top. Totally unnecessary. ---guy How did you CA cypherpunks feel about being fingerprinted? From alan at clueserver.org Tue Feb 3 21:02:28 1998 From: alan at clueserver.org (Alan) Date: Wed, 4 Feb 1998 13:02:28 +0800 Subject: The War on Some Debts In-Reply-To: <199802031640.KAA18766@wire.insync.net> Message-ID: On Tue, 3 Feb 1998, Eric Cordian wrote: > In a further blatant erosion of Constitutional rights, the California > Supreme Court has ruled that a person owing child support who fails to > seek or accept work may be jailed and fined for contempt of court, and > that this does not violate any Constitutional bans on involuntary > servitude or imprisonment for debt. > > This reverses nearly a century of contrary rulings. Look for this > "improved" interpretation to be expanded to other kinds of debts and > judgments as well, as soon as massive public acceptance of it for the > carefully picked child support issue is engineered. Expected targets: -- Student loans (There are already a number of nasty collection methods made legal to "crack down" on those who are behind in their payments.) -- State and local taxes -- Garnishments of wages > The credit card companies are no doubt carefully analyzing this decision > as we speak. As well as anyone else in the collections business. alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From honig at otc.net Tue Feb 3 21:26:42 1998 From: honig at otc.net (David Honig) Date: Wed, 4 Feb 1998 13:26:42 +0800 Subject: Spammers In-Reply-To: Message-ID: <3.0.5.32.19980203203912.007c0e10@otc.net> At 02:37 PM 2/3/98 +0000, Simon Fraser wrote: > >On Tue, 3 Feb 1998, Chip Mefford wrote: > >> Wouldn't it be nice to hold uu.net culpable for all their spamming ways. They >> want to own the internet, let them hang for it. > >http://www.us.uu.net/support/usepolicy/ >It would be nice to differentiate between the spammers themselves and the >ISP they use. > > >Simon. Yes. Otherwise an ISP loses common-carrier status and is thus responsible for the content of its traffic. Blame the junk-faxers, not the telcos. David Honig honig at alum.mit.edu --------------------------------------------------- Is Monica Lewinsky endorsing kneepads for Nike yet? From anon at anon.efga.org Tue Feb 3 21:29:11 1998 From: anon at anon.efga.org (Anonymous) Date: Wed, 4 Feb 1998 13:29:11 +0800 Subject: RSA? ElGamal? Message-ID: <50c47d8978815f7c5bf17e92e5e71bcc@anon.efga.org> Is ElGamal secure than RSA ? From honig at otc.net Tue Feb 3 21:36:05 1998 From: honig at otc.net (David Honig) Date: Wed, 4 Feb 1998 13:36:05 +0800 Subject: potus manipulation for fun and profit Message-ID: <3.0.5.32.19980203211801.007ef3c0@otc.net> Given the Head of State's alleged affinitity for "covert personal operations", consider the potential for manipulating him by any three-letter-agency skilled in surveillance. E.g., getting the Clinton administration behind Clipper, supporting our man Freeh, etc. There are advantages to having a POTUS who's a security risk, after all :-< -Gedanken memo, no such agency. David Honig honig at alum.mit.edu --------------------------------------------------- Is Monica Lewinsky endorsing kneepads for Nike yet? From bill.stewart at pobox.com Tue Feb 3 22:18:17 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 4 Feb 1998 14:18:17 +0800 Subject: County Mounties Spit on the 4th Amendment In-Reply-To: <695e7d4cd89037ab6c4e383c56f8fa6b@privacynb.ml.org> Message-ID: <3.0.5.32.19980203094020.0084dce0@popd.ix.netcom.com> At 09:25 AM 2/3/98 -0500, Michael H. Warfield wrote: > "County Mounties" is a CB (Citizens Band Radio for those not >familiar with US radio) slang term in the US for local police. Conversely >"Supertroupers" refers to State Patrol. The term "Smokie" (coined from >the movie Smokie and the Bandit) refers to all police. Argh - get your history right, kid! The movie Smokey and the Bandit used the already-current slang for cops, which was based on the Smokey The Bear hats that many police uniforms use. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Tue Feb 3 22:23:50 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 4 Feb 1998 14:23:50 +0800 Subject: Spammers In-Reply-To: Message-ID: <3.0.5.32.19980203093050.0084dce0@popd.ix.netcom.com> >> Wouldn't it be nice to hold uu.net culpable for all their spamming ways. >> They want to own the internet, let them hang for it. > >http://www.us.uu.net/support/usepolicy/ >It would be nice to differentiate between the spammers themselves and the >ISP they use. You'd lose a class action suit. More important is to get them to close any open sendmail relays at their dialup sites (maybe they have by now), since those formerly-useful servers are a major tool for spammers. The other problem is just that they're big enough that if even a small fraction of their customers are spammers, lots of spam comes from their customers; at least they don't encourage it, unlike some providers. If you want to cut way down on spam, there's Paul Vixie's Realtime BlackHole List service at maps.vix.com. It uses DNS as a convenient query/response server and some short sendmail scripts to block mail from any site known to have an open smtp relay. They're fairly zealous, and don't mind throwing away a few extra babies to get rid of lots of bathwater, so if you don't want to block everybody that they block you'll need to hack some sendmail configs. My main frustration is that they block mail from the ix.netcom.com smtp servers, which blocked mail from me to the PGP-users list, but I've found another relay at Netcom that they don't know about :-) Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From adam at homeport.org Tue Feb 3 23:14:21 1998 From: adam at homeport.org (Adam Shostack) Date: Wed, 4 Feb 1998 15:14:21 +0800 Subject: BSAFE 4.0 to force GAK?! In-Reply-To: <34D75774.6036@syndata.com> Message-ID: <199802040709.CAA03985@homeport.org> One would hope that this simply drives the market towords using DSA/DH from toolkits like those available with support from Baltimore, PGP, CryptoMathic, etc. (I maintain a list of free and commercial crypto libraries at www.homeport.org/~adam/crypto. The list is oriented at hackers and cypherpunks, and so gives far more detail on the free libraries.) Theres no reason to be using BSAFE if it enforces Uncle Sam's ludicrous political requirements. Use a library from the free world. Use algorithms that are not encumbered. Theres no longer any reason not to. Adam steve wrote: | FYI | | Jan. 26's Network World has an article on page 33 titled "RSA blasts | (but also supports) Government encryption policy". | | The paragraph of note is the fourth paragraph which reads:"The next | version of the RSA encryption toolkit, BSAFE 4.0, will force those | building products with anthing over 56 bit strength encryption to use a | key-recovery center for exportable products...." | | I haven't been able to confirm this with other sources yet but the | glaring question is how will this be enforced and how will it affect | domestic products that wish to use BSAFE 4.0 for their crypto. Further | what ramifications does this hold for their S/Mail toolkit for S/MIME? | and I haven't seen this discussed on the list yet. | Steve O | -- | A picture tells a thousand words. | Stego | | | -----BEGIN GEEK CODE BLOCK----- | Version: 3.1 | GCS/IT/S d--() s+: a-- C++++(++)$ ULS+++@ P++@ L+(++)$ E- W+(+++)$ | N++$ !o K-? w++(+++)$ !O+>++ !M !V PS+(+++)@ PE(++)@ Y++$ PGP@ t+@ | 5++@ X++>$ R+++>$ tv+@ b+@ DI+++>$ D+++@>$ G@ e++@>++++ h r* y+ | ------END GEEK CODE BLOCK------ | -- "It is seldom that liberty of any kind is lost all at once." -Hume From attila at hun.org Wed Feb 4 00:34:57 1998 From: attila at hun.org (Attila T. Hun) Date: Wed, 4 Feb 1998 16:34:57 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <199802040735.CAA04108@homeport.org> Message-ID: <19980204.080636.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- Black Unicorn wrote: > At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote: > > I did-- tried to lay $14K out for a Mercedes (25 years ago). > > they wouldnt take it. so I went and picked up two $7K > > cashiers from two different banks. same thing with a pair > > of Lycoming IO540 aircraft engines: 2 8s and a 9 --stay > > under the $10K transaction. > > Careful. This may well be illegal now. > Structuring transactions to avoid > reporting requirements is a felony. > statute of limitations has run. at the time, I did not give it much thought except the aggravation of filing the paperwork for what was a common business transaction. It was actually easier to get cash in las vegas than a cashiers check as the banks were so pissy. the casinos were far better than the banks once you established out of town credit with them --and they were 24 hours a day, 7 days a week. I wanted those aircraft engines bad --the vendor in Chicago had the only two available for close to six months and he had agreed to sell them to Canada but was waiting on the letter of credit --the casinos wired the money direct which turned the deal --the engines were on a return flight the next morning --a Saturday. transferring money from a casino is not the best place in the world for obvious reasons, despite its expediency. structuring transactions is certainly illegal now, but I have not seen that kind of money since retiring after having had a run of bad luck with my health a few years back (and lost my FAA medical cert). -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNgm3rR8UA6T6u61AQET5gH6An6jxz5lkdghl6BXbHZ3tFCGu7iam32F knFYLLWGSYngkRH6k4x7/zXA0SH7ghZ5b33gKlX98oWx7NKyOXLZuw== =5RqA -----END PGP SIGNATURE----- From jacket9 at primenet.com Wed Feb 4 17:35:58 1998 From: jacket9 at primenet.com (Tony O. AKA College Guy) Date: Wed, 4 Feb 1998 17:35:58 -0800 (PST) Subject: PLEASE READ! YOULL BE GLAD YOU DID, MONEY MONEY Message-ID: <199802050132.SAA13178@smtp03.primenet.com> >>>> >>>>TO: MASSAOL at aol.com >>>>FROM: GatesBeta at microsoft.com >>>>ATTACH: Tracklog at microsoft.com/Track883432/~TraceActive/On.html >>>> >>>>Hello Everyone, >>>>And thank you for signing up for my Beta Email Tracking Application or (BETA) >>>>for short. My name is Bill Gates. Here at Microsoft we have just compiled an >>>>e-mail tracing program that tracks everyone to whom this message is forwarded >>>>to. It does this through an unique IP (Internet Protocol) address log book >>>>database. >>>>We are experimenting with this and need your help. Forward this >>>>to everyone you know and if it reaches 1000 people everyone >>>>on the list you will receive $1000 and a copy of Windows98 at my expense. >>>>Enjoy. >>>> >>>>Note: Duplicate entries will not be counted. You will be notified by email >>>>with further instructions once this email has reached 1000 people. Windows98 >>>>will not be shipped unitl it has been released to the general public. >>>> >>>>Your friend, >>>>Bill Gates & The Microsoft Development Team. >>>> >>> >> >> >Madeline > > > From lutz at belenus.iks-jena.de Wed Feb 4 01:43:52 1998 From: lutz at belenus.iks-jena.de (Lutz Donnerhacke) Date: Wed, 4 Feb 1998 17:43:52 +0800 Subject: Spammers In-Reply-To: Message-ID: * Bill Stewart wrote: >If you want to cut way down on spam, there's Paul Vixie's >Realtime BlackHole List service at maps.vix.com. It uses DNS as a >convenient query/response server and some short sendmail scripts >to block mail from any site known to have an open smtp relay. I prefer teergrubing. It does increase the realtime costs of spamming. A lot of professional spammers are teergrube aware and do not spam to such hosts. Unsecure relays die by a lack of ressources after catched by some teergrubes, so the admin has to do something to deal with the problem. From lutz at belenus.iks-jena.de Wed Feb 4 01:44:25 1998 From: lutz at belenus.iks-jena.de (Lutz Donnerhacke) Date: Wed, 4 Feb 1998 17:44:25 +0800 Subject: RSA? ElGamal? In-Reply-To: <50c47d8978815f7c5bf17e92e5e71bcc@anon.efga.org> Message-ID: * Anonymous wrote: >Is ElGamal secure than RSA ? It's different. That's all. From pegasusgroup at emailconcepts.net Wed Feb 4 17:50:56 1998 From: pegasusgroup at emailconcepts.net (pegasusgroup at emailconcepts.net) Date: Wed, 4 Feb 1998 17:50:56 -0800 (PST) Subject: Free Roger Clemens Lithograph Message-ID: <199802031406.JAA25545@emailconcepts.net> Free Roger Clemen's Lithograph ($200 Value) with purchase of the Roger Clemens Collectors Ring http://www.pegasusgroup.com/rogerclemens/roger.htm Limited Edition Collectors Lithograph Limited Edition Collectors Ring In honor of Roger's fourth Cy Young Award, Diamond Distributors of America, Inc. has commissioned Ray Vincent Delaney, to capture the essence of Roger in an original lithograph. Each lithograph has been signed by Roger and is numbered. The ring is designed and made by the Herff Jones Company, designers and makers of the Heisman Trophy, Heisman Rings, Indy 500 Rings, NCAA Bowl Rings, NCAA Championship Rings and the Congressional Medal of Honor. Each ring comes complete with Certificate of Authenticity signed and numbered by Roger himself. Only 1000 rings will be made. http://www.pegasusgroup.com/rogerclemens/roger.htm Within 2 weeks Watch for: **** The new Roger Clemens Monthly Sweepstakes!! and ***** The Collectors Set of 12 Special Signature Series of Roger Clemens Baseballs /////////////////////////////////////////////////////////////////////////////// This Message was Composed using Extractor Pro Bulk E- Mail Software. If you wish to be removed from this advertiser's future mailings, please reply with the subject "Remove" and this software will automatically block you from their future mailings. //////////////////////////////////////////////////////////////////////////////// From ls6Q1MOb7 at yahoo.com Wed Feb 4 19:21:32 1998 From: ls6Q1MOb7 at yahoo.com (ls6Q1MOb7 at yahoo.com) Date: Wed, 4 Feb 1998 19:21:32 -0800 (PST) Subject: Subliminally Seduce Women Instantly! Message-ID: Win over any woman you want in less than an hour. GUARANTEED! Start dating women that until now were 'out of your league' GUARANTEED! I know it sounds too good to be true, but it is now� possible for you to achieve in minutes, what typically takes most men days, months, and sometimes even years to accomplish...SEDUCING A WOMAN! Skeptical? Read this. Then visit our web site to learn the FACTS! Scientists worldwide agree that, in certain applications, subliminal mind control can accomplish amazing things. You might have heard how in the 1950s subliminal advertising was used in movie theaters to induce an unnatural craving for popcorn and an unquenchable desire for Coke. There are many types of subliminal thought control.� Certain subliminal influence techniques work AMAZINGLY well, while others hardly work at all! If you don't think modern subliminal technology can change your life, THINK AGAIN! For less than the cost of a single good meal you can instantly and permanently change the way women treat you. GUARANTEED! And the best part is that (due to a legal loophole) this is perfectly legal! If your luck with women has been anything other than GREAT, find out the FACTS by visiting our web site. Once you have received and tested one of our audio tapes you will be AMAZED! Don't make the mistake of confusing the antiquated technology used in the past with newly developed digital mastering techniques. We have spent years developing computer enhanced techniques that enable us to produce mood altering products that work on any woman, anywhere, anytime... GUARANTEED! You cannot turn women into mindless sex slaves with this or any other technology. You can, however, induce at will, natural urges that would otherwise lie dormant. It is simply a fact that any natural human desire such as sleep, hunger or sexual impulses can be GREATLY INTENSIFIED by using subliminal commands. When you play these recordings in the presence of any female who has a normal sexual appetite, look out!� She won't know what has come over her! It is completely undetectable! Even women you barely know, when subjected to this invisible aphrodisiac will find you more interesting and better looking. They will find themselves mysteriously drawn and sexually attracted to you. GUARANTEED!! Each of our musical recordings comes with a second 'demo' tape (free of charge) that has the subliminal messages brought forward for you to hear loud and clear. Don't let your girlfriend hear this one! WARNING: We have given you the opportunity to be more successful with any woman you choose. If you do not at least check out the facts for yourself, you will only be cheating yourself out of happiness and romance. To find out more about these AMAZING tapes at our web site at: http://www.ivpco.com/~speccass/index.html or, if your mail reader supports hyper-links, CLICK HERE If you have any problems accessing our main page, try our new mirror site at: http://www.emptyshell.com MIRROR SITE ********************************************************************** This message was sent by Overseas Internet Promotions, Inc. of Miami. If you have a product or service you want to market on the Internet, call us today @ 305-668-7502 ********************************************************************** From nobody at REPLAY.COM Wed Feb 4 09:51:11 1998 From: nobody at REPLAY.COM (Anonymous) Date: Thu, 5 Feb 1998 01:51:11 +0800 Subject: Internic may be required to return money Message-ID: <199802041740.SAA28340@basement.replay.com> Holy shit. > > Court: Domain fees appear illegal > By Brock N. Meeks > > WASHINGTON, Feb. 2 - A federal court Monday issued a > temporary injunction barring the federal government from > spending some $50 million it has collected from the > registration of Internet domain names. That money forms a > pool of funds intended to be spent for improving the > Internet. On Monday, the court sided with the plaintiffs in a > lawsuit that claims those fees constitute an illegal tax. > > The money is part of a so-called "intellectual infrastructure > fund," which is funded by 30 percent of all fees paid to > register an Internet domain name. Initial domain names cost > $100; renewal of domain names is $50 annually. The > remainder of registration fees goes to Network Solutions > Inc. (NSOL) to cover its cost of maintaining the registration > service. > > Network Solutions operates as a monopoly, stemming from > a National Science Foundation government grant. That > grant is supposed to end in March; the White House issued > a proposal Jan. 30 that would move domain name > registration into the private sector. > > In October, six domain-name holders filed suit in U.S. > District Court alleging that the National Science Foundation > had no authority to allow Network Solutions to collect any > money in excess of its cost of providing the registration > service. Further, the suit charged, the 30 percent > set-aside amounts to an unconstitutional tax. > > Judge Thomas Hogan said Monday that the plaintiffs "have > made a significant showing that the (intellectual > infrastructure fund) is an illegal tax." > > Hogan said there is "no litmus paper onto which the Court > can drop a regulatory assessment such as this one, hoping > to see whether the paper comes up blue for tax or pink for > fee." Justice Department lawyers had argued in court that > the domain-name registration fee was exactly that, a fee, > because it was paid voluntarily and therefore couldn't be > considered a tax. > > But Hogan disagreed, writing that "there is no dispute that > the assessment (registration fee) is involuntary - it is > automatically charged to every domain registration." > > In 1995 Network Solution's contract was amended to allow > it to begin collecting fees for the registration process, > which it had done for free since 1993, when its contract > was issued. The registration fees set off a firestorm of > criticism in the Internet community. The Intellectual > Infrastructure Fund was supposed to be used for the > betterment of the Internet for the community as a whole; > however, no plan has ever developed on how to spend the > money, which is held in escrow. > > Because no plan had been developed to spend the fund > money, Congress rushed into the vacuum late last year > and simply appropriated some $23 million. Congress > earmarked that money to be spent on the Next Generation > Internet project, which President Bill Clinton highlighted in > his recent State of the Union speech. > > "Under federal law, no independent executive agency - > such as the National Science Foundation - can collect > fees that exceed the cost of providing the service they are > administering," said William Bode, attorney for the plaintiffs. > "NSI, the agent of NSF, spends less than $5 to register > domain names, yet it charges a registration fee of $100 and > renewal fees of $50 per year," he said. > > Network Solutions did not return calls for comment. > > Bode also argued that only Congress has the authority to > tax and that no such authorization has taken place. The > Justice Department argued that because Congress > appropriated the $23 million from the infrastructure fund, it > had essentially ratified the tax. > > Bode argued that ratification of a tax can't take place in > authorization bills. Judge Hogan agreed, noting that > ratification is a legislative function and that "it is well known > that Congress does not normally legislate through > appropriations bills." Hogan added: "Congress may have > intended to grant NSF the authority to collect the > assessment, but it has not effected a legal ratification." > > The suit also is seeking antitrust damages, alleging that the > NSF violated the competition in contracting act when it > allowed Network Solutions to begin collecting the $100 fee. > Bode says the competition act requires the NSF to re-bid a > new contract, not simply amend it. > > The temporary injunction "paves the way for our motion, > which we'll file in two days, to require NSI to return all > registration renewal fees which exceed the cost of > providing that service," attorney Bode said. "We think that > cost [to NSI for the registration process] is significantly less > than $10, probably $2 to $3," he said, "which would mean > that there would be a refund of approximately $100 million > in our judgment." From guy at panix.com Wed Feb 4 10:33:23 1998 From: guy at panix.com (Information Security) Date: Thu, 5 Feb 1998 02:33:23 +0800 Subject: Rogue EFF Dir Brad Templeton Message-ID: <199802041809.NAA09228@panix2.panix.com> This jerk should be kicked out of EFF. Brad had stated he wants to eliminate one-way anonymous remailers, make two-way anonymous remailer users identify themselves as the same person every time they use one, and: o require digital signature identification for all email o require digital signature identification for all Usenet posts --------- previously shown ------------- Brad Templeton emailed: * Information Security emailed: * > Nor does your digital signature idea do anything to prevent * > throw-away accounts from doing major spams; you'll have to * > put even MORE controls on people. * * Correct, no throw away accounts. It's coming. * * > The digital signature idea is an astonishingly bad idea, that * > only frustrated control-freaks will accept. * * You are mistaken. I surveyed a roomful of usenet admins at a * conference last year. They were 95% in favor of it. [I replied that those were the control-freaks I was talking about] Brad Templeton emailed, formatted by guy: > As far as I am concerned, no fake addresses is one of my non-negotiable > requirements, because > > the eventual USENET is going to have digital signature requirements. > > It's the only way to stop [people from] posting under fake addresses > where we can't find them, and that means stopping honest users from > doing it too. [I said false: ALL problem posters are locateable to their ISP] http://www.clari.net/brad/spam.html [snipped] [by Brad] Solutions... First, improve internet mail systems and protocols to identify mail with a fake or forged return address. There are some simple steps to do this, and eventually digital signature allows complete verification of the sender. http://polka.clari.net/usenet-format/cert.html Q: What about anonymous remailers? A: A person with an anonymous address that sends mail back will probably be able to get a certificate. They can post without revealing their name, except perhaps to the person who gives them a certificate. Digital signature works fine to prove the same person sent two messages without saying at all who that person is in the real world. Forced to authenticate they are the same person, even through the anonymous remailer. --------- end of previously shown ------------- What's new is Brad has inserted his declaration that access to the Net must require you to authenticate yourself with a digital signature to post to Usenet in the draft text for the new Usenet RFC, which he is heading: Brad's draft Usenet digital signature text: # Systems MAY insist that an article be signed, at least the # body and the minimal header set, or they MAY reject the # article. This policy may vary from group to group and # subnet to subnet. Eventually it is expected that a site # SHOULD reject any article that is not signed. Hey, fine if an individual group wants to vote it in. But ALL OF USENET??? I asked him if he would change the wording to: # An individual group MAY insist that an article be signed, # at least the body and the minimal header set. This is # subject to the normal news standards of users of a group # deciding this issue themselves. Dead silence. He REFUSES TO DISCUSS the last statement: # Eventually it is expected that a site # SHOULD reject any article that is not signed. It is a purely political statement on his part, pushing his vision of a tightly authenticated Net, like they have in China. In fact, it is utterly clueless of him, especially since he was one of the original CDA plaintiffs. [Not to mention it is an "agreement to make an agreement"] NONE of the other list participants has said they agree everyone should authenticate themselves using digital signatures for all Usenet posts, which is the language I am contesting. Yet, he won't even discuss the ramifications. Yep, power corrupts: he's running the show, and answers to no one. ------- begin Crypto Manifesto excerpt ------- * Sandia and Coms21, currently engaged in an agreement to support the * People's Republic of China's driver license and national ID card * program, have partnered to create a fraud-proof solution for on-the-spot * positive identification of card bearers. * "China Tells Internet Users To Register With Police" * The New York Times, 2/15/1996 * * China ordered all users of the Internet to register with the police, as * part of an effort to tighten control over information. * * The order came from the Ministry of Public Security. * * Network users have been warned not to harm national security, or to * disseminate pornography. Well, there's a new way to control Internet users: require them to identify themselves, no doubt your U.S.-created National ID Card will be required for access. That ought to stop pornography: identify each and every user. # "The Great Firewall of China", by Geremie R. Barme & Sang Ye, Wired, 6/97 # # Xia Hong, China InfoHighway's PR man: "The Internet has been an important # technical innovator, but we need to add another element, and that is # control. The new generation of information superhighway needs a traffic # control center. It needs highway patrols; USERS WILL REQUIRE DRIVER'S # LICENSES. THESE ARE THE BASIC REQUIREMENTS FOR ANY CONTROLLED ENVIRONMENT." The Supreme Court's CDA ruling: Once most people are fingerprinted, a cheap (say $50) fingerprint scanner that attaches a timestamp and government digital signature will be sold for allowing Internet access to "adult" locations---chat rooms, USENET, WWW sites---and it will be mandatory. The Chief Justice of the U.S. Supreme Court said as soon as the "Internet driver's license" is technically feasible, CDA becomes legal. "Such technology requires Internet users to enter information about themselves--perhaps an adult identification number or a credit card number--before they can access certain areas of cyberspace, 929 F. Supp. 824, 845 (ED Pa. 1996), much like a bouncer checks a person's driver's license before admitting him to a nightclub." ------- end Crypto Manifesto excerpt ------- If everyone has a digital signature, CDA becomes legal. I do wish EFF would kick him out! ---guy From WebWarrior3 at InfoWar.Com Wed Feb 4 10:57:46 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Thu, 5 Feb 1998 02:57:46 +0800 Subject: Cryptography empowering human rights. Message-ID: <34D8B729.36322685@InfoWar.Com> Looking for opinions and leads to resources about human rights and the potential abuse of said rights with public key 'escrow' or recovery agents. Please send info to: mailto:webwarrior3 at infowar.com Thanks in advance, Scott R. Brower Electronic Fronteirs Florida http://www.efflorida.org effla at efflorida.org From ravage at ssz.com Wed Feb 4 11:05:05 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 03:05:05 +0800 Subject: Fountain of youth found? [SciAm] (fwd) Message-ID: <199802041901.NAA05823@einstein.ssz.com> Forwarded message: >From owner-tesla at ssz.com Wed Feb 4 13:00:02 1998 From: Jim Choate Message-Id: <199802041857.MAA05778 at einstein.ssz.com> Subject: Fountain of youth found? [SciAm] To: tesla at ssz.com (Experimental Instrumentation) Date: Wed, 4 Feb 1998 12:57:23 -0600 (CST) X-Mailer: ELM [version 2.4 PL23] Content-Type: text Content-Length: 2511 Sender: owner-tesla at ssz.com Precedence: bulk Reply-To: tesla at ssz.com Note this file has been edited. Forwarded message: > X-within-URL: http://www.sciam.com/explorations/1998/020298telomere/ > Telomere Image: Southwestern Medical Center > > LIFE'S CLOCK. Telomeres are repeating DNA strings (TTAGGG) that cap > chromosomes. Each time a mortal cell divides, its telomeres become > shorter. When they reach a preset length, the cell ceases to divide, > ages and dies. > > Scientists have found a major factor > that controls whether a cell dies or thrives > > It may not sound as appetizing as aquavit, but telomerase--an enzyme > discovered only a decade ago in a single-celled protozoan--may well be > the elixir of youth. This chemical acts in immortal cancer cells, > sperm and ovum to repair telomeres, the strands of DNA that tie up the > ends of chromosomes. And now it seems that activating telomerase in > sundry other cells grants them a longer lease on life as well. > > The finding, which was published in the January 16 issue of Science, > finally proves what was a highly controversial model linking telomeres > to cellular aging. More important, it opens up new avenues for > research into diseases that occur when cells grow old, including > macular degeneration in the eye and atherosclerosis, and those that > arise when cells don't age at all, such as cancer. [text deleted] ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From sorrin at syndata.com Wed Feb 4 11:10:43 1998 From: sorrin at syndata.com (Steve Orrin) Date: Thu, 5 Feb 1998 03:10:43 +0800 Subject: HUMOR: Bill Gates gets it, True CNN Story!! Message-ID: <19980204190827281.AAA314.381@endor.syndata.domain> http://www.cnn.com/TECH/computing/9802/04/belgium.gates.ap/ A Picture Tells A Thousand Words. STEGO From rdew at el.nec.com Wed Feb 4 11:53:57 1998 From: rdew at el.nec.com (Bob De Witt) Date: Thu, 5 Feb 1998 03:53:57 +0800 Subject: RIP, Carl Gorman, Code Talker Message-ID: <199802041932.LAA02327@yginsburg.el.nec.com> Oh-Oh! Us "newbies" slipped up. Except, when I signed up, my entry notice said: "To post to the whole list, send mail to cypherpunks at toad.com" Soooo, maybe you want we should send it elsewhere, to the same lists you send to, you should publish the correction, not just flame ... Until then, we just have to do as told by the list-admin ... On Sat Jan 31 12:20:56 1998 Dr.Dimitri Vulis wrote: > From dlv at bwalk.dm.com Sat Jan 31 12:20:56 1998 > To: cypherpunks at toad.com > Subject: Re: RIP, Carl Gorman, Code Talker > From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) > Comments: All power to the ZOG! > Date: Sat, 31 Jan 98 14:23:21 EST > > Tim May writes: > > > (As Gary seems to be a newcomer, let me remind him and others that > > "cypherpunks at toad.com" is not the place to send messages to the list. > > Please use one of the distributed addresses. It's been a year since the > > list moved off of toad.com. I wish John would just start bouncing messages > > sent to toad.com and be done with it.) > > When are cocksuckers John Gilmore and Guy Polis planning to die from AIDS? > > --- > > Dr.Dimitri Vulis KOTM > Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps > Ciao, Bob De Witt, rdew at el.nec.com From anon at anon.efga.org Thu Feb 5 04:21:19 1998 From: anon at anon.efga.org (Anonymous) Date: Thu, 5 Feb 1998 04:21:19 -0800 (PST) Subject: Changing to Moderated Cypherpunks -- How? In-Reply-To: <199802050343.DAA46984@out5.ibm.net> Message-ID: On Tue, 03 Feb 98 21:27:46 -0800 "James F. Marshall" wrote: >Too much noise in the unedited list. > >How does one change to the moderated list? Easy From eureka at eureka.abc-web.com Thu Feb 5 04:31:32 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Thu, 5 Feb 1998 04:31:32 -0800 (PST) Subject: Eureka! Thu Feb 5 '98 Message-ID: <19980205083129.13871.qmail@eureka.abc-web.com> Welcome to Thursday's issue of Eureka! FRESHTEENS! Is there no end to it? Yet again we have succeeded in obtai- ning a FREE one week trial, for all Eureka! subscribers at another of the net's finest websites. Freshteens offers over 200 video feeds, hot live, sex shows, hard XXX movies, hot XXX stories, exclusive Texas Teens, and a comprehensive gay area too. You need a credit card to verify you are an adult, but will not be charged for your FREE membership. Excellent! Freshteens ........... http://www.freshteens.com/cproot/1217 Oriental Beauty http://www.orientalbeauty.com/entry.phtml 100% Free site with softcore and (some) hardcore pictures of the most beautiful Asian women I have ever seen! All pictures can be found in easy to navigate picture galleries with thumbnail previews, so you only download the pictures that you like! There are two fresh pictures every single day. Finally, there is also an extensive links section with links to other Asian sites worthy of a visit. More than enough reasons to visit us! SINK THE PINK Go there now if you want to see a lot of great free pix. They have so much brown bush in here we may have to call in a weed wacker! This is a cool site, easy to navigate thumb- nails of high quality images and tons of great pix. Featur- ing group sex, asian, anal, oral and brunettes and more! Sink The Pink ................... http://www.sinkthepink.com CYBERJOY Yes, this is yet another great site for some free pix! Text links on a light colored background lead you to double dicks in one box, blowjobs, cumshots and all that jazz! Just the way you like it. Point your browser over there and see it! Cyberjoy ......... http://www.cyberjoy.inter.net/accept1.htm ASSES & PUSSIES We got butts and bush. Not a bad mix. This webmaster has built a quick loading website with a good interface. By that I mean that you will have great looking butts and pussy in your face really fast! High resolution and high desire. Yes! Asses & Pussies ................... http://www.asspussy.com/ HOT CAMILLE There is a membership in here but to entice us there are a few free pix of one hot little sexpot! She likes showing us her pussy and ass and she love dick. Not a bad way to go. There are even two free videos, small but some serious pink! Hot Camille ..................... http://www.hotcamille.com/ #READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! #$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A # HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Max Hardcore --------> http://207.240.169.121/max/start.html CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Jan: She is what excites all of us about amateurs. This gal is hot and raw! Her web page design and graphics may not be the best, but she loves to show off. A wife and mother of three, she wants the entire world to see her great body! Not only is she a babe, but she has a very active imagination. Stop by and see if you can be her next fantasy! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY VoyeurStories.com: Want some sizzling free voyeur erotic stories accompianied by GENUINE hidden camera pics? Satisfy your peeping tom curiosity by visiting VoyeurStories.com.... .............................. http://www.voyeurstories.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?050 Pic 2 --------------------------> http://137.39.63.229/?051 Pic 3 --------------------------> http://137.39.63.229/?052 Pic 4 --------------------------> http://137.39.63.229/?053 Pic 5 --------------------------> http://137.39.63.229/?054 Pic 6 --------------------------> http://137.39.63.229/?055 Pic 7 --------------------------> http://137.39.63.229/?056 Pic 8 --------------------------> http://137.39.63.229/?057 Pic 9 --------------------------> http://137.39.63.229/?058 Pic 10 --------------------------> http://137.39.63.229/?059 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From attila at hun.org Wed Feb 4 13:04:25 1998 From: attila at hun.org (Attila T. Hun) Date: Thu, 5 Feb 1998 05:04:25 +0800 Subject: the best justice money can buy --Lessig suspended In-Reply-To: Message-ID: <19980204.181907.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980203:1222, in , Tim May was purported to have expostulated to perpetuate an opinion: >As for Attila's calls to break up MS...could make Bill Gates immensely >wealthier, as he'd then have a piece of the 5 most successful software >companies! after they extract the usual treble damages in antitrust litigation, Bill will probably retain significant assets, but he probably would not top the list of the very wealthy, and might not even make it. >(I assume Attila is not arguing for simply seizing his property and >giving it to others, or running it as a government company, or just >padlocking the doors....) no, in fact, if there were a free market remedy for M$' monopoly, I would be in favour of it --and there is _no_ free market remedy and failure to act promptly conceivably wipe out all, or virtually all, of the viable competitors. the purpose of antitrust legislation is solely to remedy an injustice caused by a private market segment which became a monopoly. divestiture for M$ would generally be along the lines of AT&T except it would focus on divisions rather than regions; secondly, it would obviously restrict Gate$ involvement in more than one despite any stock ownership and might require Bill: a) to sell all stock in units he does not control; b) take his payout in stock from one unit only (less negative market); or, c) he may not have enough left after Sherman Act penalties to be a major stockholder --he might actually need to suffer through stockholders meetings like the rest of the CEOs. I would never advocate seizing assets for redistribution vis a vis Mugabe or whatever the despot's name is --what a waste-- if uncle Sam redistributed we would have Microsoft-Harlem, Microsoft-Watts, etc. shit, I had to stop typing after the mirth of that thought! as for the government running _anything_ --how far do we need to look for the nearest government excess and total mismanagement, featherbedding, and corruption? not far (you, Tim, on a non-clear day cant see very much from your hilltop --out here on the high desert ridges in So. Utah it is CAVU the vast majority of the time-- and I still cant see any as Feds are like Revenuers in KY). there are multiple issues: 1. Microsoft's almost good enough (for the market) operating systems which probably should be considered what we called firmware 25 years ago. at this point >90% of the platforms run M$ in one form or another and as you acknowledge, SGI, DEC, and so on are all hedging their bets --which will become reality as soon as they open the floodgates. in software, the sheeple follow the Judas goat to Redmond. 2. Microsoft "software" a) office suite --already 95% of desktop market b) data base --maybe should be included in a) but Oracle, Sybase, IBM, etc have large installed bases at a much higher cost per unit on servers c) browser --certainly will be at 80% before year end as all OEMs so far have indicated they will not cross M$ and switch. that leaves the rest of it up to the ISPs who could care less. d) back office --M$ moving in on this one real fast and it is now part of NT distribution-- which then requires the browser and webserver for installation and maintenance. e) web servers, firewalls, routers, etc. --M$ is already getting the web servers with NT distributions and is poised to tackle firewalls and router dominance. I question that they can ever configure NT on any hardware to do routing/switching effectively, efficiently, or competitively against dedicated hardware given the new >1G switches. 3. M$ in cable systems. cable systems are always cash poor from infrastructure expense. M$ is buying in and therefore influencing the choice of settops --and their format-- witness TCI. this further establishes M$ in the determination of standards --obviously to the detriment of everyone else-- and the FCC has mandated the boxes must be compatible across the board in a couple years and we all know who negotiates dirty and hard the only saviour in this one may be Time-Warner which so far is moving ahead with its 2way cable system from Scientific Atlanta with a sparc chip, etc. T-W has 2.5 million boxes on order and is planning extensive deployment 3rd quarter which is at least 12 months before M$ can even beta test with TCI 4. content... a) msn which so far is harmless, but what would happen if Gate$ absorbed Assholes on Line? or really pushed MSN at POS and OEM. b) msnbc which apparently still enjoys editorial censorship only from the usual channels of our non-free press. c) reference bookshelf in which the latest revision of the EnCarta encyclopediae described Gate$ as a "philanthropist" --cheap son of bitch only coughed $100 million towards school internet as long as it was M$ product. he may have been better termed a misogynist (before he was married) given his terms of usage.... content is where we really start to worry more than Bill's money, which has already bought influence: the WSJ editorial page article by Bill striking back at the DOJ, the NYTimes column, the books, and the rest of the demigod worshipping media. Gate$' fortunes have been changing: Gate$ now has for more enemies than his money can buy friends. even the SPA has turned against him with their white paper on fair competition which is a direct shot across Gate$' bow --and Gate$' response was that their membership in SPA might not be renewed in August --economic threat. The DOJ has expanded their scope and will probably file significant actions shortly (hopefully before the 21 Apr appeals court hearing) next are the states, eleven so far including NY, TX, IL and CA where they have very definitely aggressive AGs. and CA's is pissed over the sweetheart deal the CSU system gave M$ to supply everything as the "official vendor" of the CSU system which has 20+ campi and how many million students? complain about a McDonalds' generation? shit, that's only your stomach, not your mind --and at least there are other choices for food --I personally have never eaten at McDonalds; of course, that does not say much as I have never owned a television, either. we already have an M$ generation. they all learned on PCs and they all programmed to PCs and windows with their private APIs. this is exactly what creating a positive feedback, self-enhancing market place does: McDonalds grabbed their stomachs with their playgrounds, etc. and M$ twists their minds. BOTTOM LINE: Gate$ manipulation, scheming, red-dog contracts, etc. make Cornelius Vanderbilt look like a choir boy. Gate$ style of management with Steve Ballmer as the heavy and Gate$ trying to cover his geekness as the "aw shucks" boy next door has had the curtain pulled to show what technically amounts to a legal "conspiracy" to dominate multiple markets, both vertically and horizontally. as such, M$ and their executives actions fall directly under the guidelines of part B of the Sherman Antitrust act which includes the usual penalties of divestiture, treble damages, and _criminal_ penalties. secondly, M$ and Gate$, if convicted of violating part 2, could then be construed as a "corrupt" meaning malicious intent the difference between misfeasance and malfeasance is that in the latter you were intentionally fucked which qualifies for RICO prosecution as well. in addition to the extremely severe criminal penalties, RICO does provide for confiscation of ill gotten assets --this would apply to Gate$ monetary gains, including his stock, which could be forfeited. frankly, I think it would be most amusing to see Gate$ and Ballmer receiving the customary "3 hots and a cot" for such offenders and to need to work for a living like the rest of us when they earn their freedom. the fact that RICO could apply does not mean that it will be trundled out --but it would be fitting justice. I will never denigrate Gate$ determination to build M$ and to proliferate the computer, which he did, a little too well. --but Gate$ crossed the line: Gate$' instinct set him on the path that competition means forcing everyone and their ideas (those that he did not steal, literally or figuratively) from the marketplace --Bill can not compete; he must "own" the market. William Henry Gates III expects to be crowned "William III" --see my rant on 16 Oct. on DejaVu or: http://www.primenet.com/~attila/rants/gates/7a16-ms_monopoly.html not to be crass about it, but Gate$ has served his purpose and outlived his usefulness --his defense against the DOJ, his further market actions while under attack, and his intent to trump the moot with Win98 are actions of a petty dictator; give Bill a shiny new uniform from a Napoleanic banana republic and let him prance around. any more of Gate$ not only becomes tiresome, but hazardous to our health. give me the hook... there is no free market remedy for M$' control of the market place as the consumer will not boycott something which a) costs them money do so; and, b) for which there is no ready substitute. the only alternative is to apply the anti-trust laws in the general interests of society which does not mean government ownership or management. M$ stockholders may either make or lose money depending on the valuations the market assigns to each of the divested divisions --but that is a risk you take in the market if your greed exceeds your wisdom. ask any VC, whose greed is only exceeded by his fear. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNjTgbR8UA6T6u61AQE9SAH/ZE9BRgenWbxD1mFsqj6qgHJ3hzKXbT6l wpDQd5U3sFje7QEMLVS7KzTRXLchMF+JYcHeuiB3hV3dmCCG7n8yRA== =JspT -----END PGP SIGNATURE----- From attila at hun.org Wed Feb 4 13:43:29 1998 From: attila at hun.org (Attila T. Hun) Date: Thu, 5 Feb 1998 05:43:29 +0800 Subject: HUMOR: Bill Gates gets it, PRESERVED for the FUTURE! In-Reply-To: <19980204190827281.AAA314.381@endor.syndata.domain> Message-ID: <19980204.213032.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- >http://www.cnn.com/TECH/computing/9802/04/belgium.gates.ap/ >A Picture Tells A Thousand Words. yes, it does. he still looks like a geek. and since CNN archives are spotty, it is now preserved for the future. (available tonight) http://www.primenet.com/~attila/rants/gates/8204-belgium_gates.html made my day! -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNjfC7R8UA6T6u61AQEE/AH9EWvCnUmxs8e/+KynguU8mu+Pmbc/f525 N1EK9hdp5HgGHBiVBmENP78iNCF1miREtKTvBGmSqpH0DEAzpHprEA== =NKvr -----END PGP SIGNATURE----- From ptrei at securitydynamics.com Wed Feb 4 13:58:34 1998 From: ptrei at securitydynamics.com (Trei, Peter) Date: Thu, 5 Feb 1998 05:58:34 +0800 Subject: FW: SEC Rule Announcement Message-ID: <6B5344C210C7D011835C0000F8012766010035B2@exna01.securitydynamics.com> I haven't been able to confirm this report. Note that it refers to monitoring employee's HOME computers. Peter Trei > -----Original Message----- > From: Larry Layten [SMTP:larry at ljl.com] > Sent: Wednesday, February 04, 1998 11:04 AM > To: cryptography at c2.net > Subject: SEC Rule Announcement > > I received information in an Electronic Mail Association (EMA) > bulletin that said the Securities and Exchange Commission > approved a rule that would go into effect February 15th that > requires securities employers to have the ability to monitor > electronic communications between employees and customers > on employees' home computers or through third party systems. > > Does anyone have any more information on this and how it > might apply to encrypted email? > > Larry From attila at hun.org Wed Feb 4 14:05:07 1998 From: attila at hun.org (Attila T. Hun) Date: Thu, 5 Feb 1998 06:05:07 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: Message-ID: <19980204.215246.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980203:1053, in , Robert Hettinga was purported to have expostulated to perpetuate an opinion: >The cost of anything is the foregone alternative. People will only demand >more privacy when it's cheaper than not having it. I believe that that >time is coming, rather quickly. > that, and "Americans do not buy for quality, they buy for price" as John Ruskin said: 1. those who buy for price alone are this man's lawful prey. 2. the price of oats is significantly cheaper when it has been processed by the horse. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNjj0LR8UA6T6u61AQF/VgH+I8k5TPa9u0mjBOZbhB+zl+C6Eo0yH4gY 9fgqICC+hmhzIQe1l1a9Y/3n0rWu5K6cWsTSzSF8KC4XyyLwH8fGQQ== =tQT9 -----END PGP SIGNATURE----- From rah at shipwright.com Wed Feb 4 14:19:04 1998 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 5 Feb 1998 06:19:04 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: Message-ID: At 4:56 pm -0500 on 2/4/98, Attila T. Hun wrote: > "Americans do not buy for quality, they buy for price" Which must explain our gross national product, then. Cheaper, as always, *is* better. > > as John Ruskin said: > > 1. those who buy for price alone are this man's lawful prey. Those who *don't* buy for price alone are usually somebody's lunch sooner or later. > 2. the price of oats is significantly cheaper when it has been > processed by the horse. It ain't oats, then. It's horseshit. Aparently aristocratic horseshit, if I remember Mr. Ruskin's bio right... ;-). Cheers, Bob ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: From ptrei at securitydynamics.com Wed Feb 4 14:21:50 1998 From: ptrei at securitydynamics.com (Trei, Peter) Date: Thu, 5 Feb 1998 06:21:50 +0800 Subject: FW: SEC Rule Announcement Message-ID: <6B5344C210C7D011835C0000F8012766010035B3@exna01.securitydynamics.com> [sorry if you get this twice - pt] I have not been able to confirm the claim in this letter - the EMA does not seem to have a web site. Note that it refers to employers monitoring employee's HOME computers. Peter Trei > -----Original Message----- > From: Larry Layten [SMTP:larry at ljl.com] > Sent: Wednesday, February 04, 1998 11:04 AM > To: cryptography at c2.net > Subject: SEC Rule Announcement > > I received information in an Electronic Mail Association (EMA) > bulletin that said the Securities and Exchange Commission > approved a rule that would go into effect February 15th that > requires securities employers to have the ability to monitor > electronic communications between employees and customers > on employees' home computers or through third party systems. > > Does anyone have any more information on this and how it > might apply to encrypted email? > > Larry From attila at hun.org Wed Feb 4 14:28:09 1998 From: attila at hun.org (Attila T. Hun) Date: Thu, 5 Feb 1998 06:28:09 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <01BD308B.1A566960@slip-james.lcs.mit.edu> Message-ID: <19980204.220302.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980203:1003, in <01BD308B.1A566960 at slip-james.lcs.mit.edu>, "James O'Toole" was purported to have expostulated to perpetuate an opinion: >Pretty soon we'll run up against the problem of whether Tim May can >configure a corporate in the U.S. to be operated by people who don't know >who he is, and who can't find out who he is (when properly encouraged to >cooperate by Ken Starr...). With or without government regulation, the >most reliable people you can hire to operate that corporation for you may >only want to do so if they are given the opportunity to somehow "know" >you. in the U.S. the _best_ you will ever do is run a smokescreen >I think you can probably use a bank in a privacy-enhancing-locale such as >Switzerland as an effective intermediary in Amex card issuance, but if >you really don't want the bank to know who you are, you'll probably need >a corporate intermediary between you and the bank, with nominee >officers. dont use Switzerland; it has been translucent for at least 20 years and is fast approaching transparency. Lichtenstein --if you can get an introduction into Landesbank from a local 'truehand' --even better, if you can get into the PrivatBank. just remember, if it is the former, as you enter the main circle in Vaduz from the south, get out and kiss the bricks. if you can not get the introduction, dont count on the extra services. secondly, you can not own anything in Lichtenstein without a residency permit and good luck on that one. as they say: no further information available.... -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNjnjrR8UA6T6u61AQEpvwH6Aia+pitmw1OyX9y5A8D9cWRGMUTTa3EC wJTuUErBab1sWqJihJ755LHiyqpktBBVMO84TBtJPHnHMJoQqGIXNg== =fsE0 -----END PGP SIGNATURE----- From ravage at ssz.com Wed Feb 4 14:28:27 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 06:28:27 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) (fwd) Message-ID: <199802042228.QAA06832@einstein.ssz.com> Forwarded message: > From: "Attila T. Hun" > Date: Wed, 04 Feb 98 22:14:36 +0000 > Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...) > >You don't know Texas or Texans very well... > > well, I do, real well --but you dont know rural Utahns. Actualy I do, know quite a few people in Utah; both in and out of the Mormon Church and in and outside the handfull of cities. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From attila at hun.org Wed Feb 4 14:29:08 1998 From: attila at hun.org (Attila T. Hun) Date: Thu, 5 Feb 1998 06:29:08 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <199802021912.NAA29247@einstein.ssz.com> Message-ID: <19980204.221436.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980202:1312, in <199802021912.NAA29247 at einstein.ssz.com>, Jim Choate was purported to have expostulated to perpetuate an opinion: >> well, in the first place, you live in Texas where the >> attitude to the Feds is rather strong --not as strong as our >> attitude in rural Utah where the usual transaction is in >> cash. out here, a Fed is the same as a revenuer in Eastern >> Kentucky or Tennessee. reminds me of the Fed approaching a >> child and telling him he'd give him $5 if he took him to his >> father (still) --the boy asked for the money up front. when >> the Fed asked why, the boy said: "...'cause you aint coming >> back". >You don't know Texas or Texans very well... well, I do, real well --but you dont know rural Utahns. in reality, it's probably a tradeoff. one of the reasons the Democrats use Utah as a dumping ground or national park is we dont give them any votes. you also need to remember that the first day of deer hunting season here is a holiday --and the number of firearms/capita leads the nation --keep in mind how many kids us Mormons have --5 is considered a slacker.... -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNjpy7R8UA6T6u61AQH0sgH/d41HFQhKoLNqaIbgOr8Cl/SoPPq22R14 u6U2LuACWTwTfl/0zM1K8B7GmX87Mdx9xPysfeyf/y6d4wSyDwNjKg== =7Ewg -----END PGP SIGNATURE----- From ravage at ssz.com Wed Feb 4 14:31:14 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 06:31:14 +0800 Subject: The Continued Attack on Cash (Was: "The Right of (fwd) Message-ID: <199802042230.QAA06881@einstein.ssz.com> Forwarded message: > Date: Wed, 4 Feb 1998 17:07:19 -0500 > From: Robert Hettinga > Subject: Re: The Continued Attack on Cash (Was: "The Right of > Anonymity"...) > > 1. those who buy for price alone are this man's lawful prey. > > Those who *don't* buy for price alone are usually somebody's lunch sooner > or later. There is *always* somebody higher up the foodchain. No matter how big or tough sooner or later you end up somebodies lunch. Price is irrelevant except in regards the time frame. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From jfrancis at netscape.com Wed Feb 4 14:40:15 1998 From: jfrancis at netscape.com (Joe Francis) Date: Thu, 5 Feb 1998 06:40:15 +0800 Subject: implementing an export control policy on a web site Message-ID: <34D8EB6F.3B6EA5C8@netscape.com> I am seeking information on what constitutes legal conformance to U.S. ITAR when webserving encryption software from within the U.S. I have read pretty much everything I can find online that looked like it might be relavent. Apologies if this is a FAQ that I have some how missed. Part of my confusion stems from the different policies implemented by different vendors on their sites, and also by how those policies have changed over time. For instance, at Netscape one has to provide a tremendous amount of personal info in order to download the domestic version of Communicator. Phone number is required, and there appears to be some automated sanity checking on the phone number/address supplied. This is a sharp contrast to the Cypherpunks Home Page (ftp://ftp.csua.berkeley.edu/pub/cypherpunks/Home.html), where a simple request not too export and an explanation of the ITAR appears to be all that is done. PGP has yet a different standard, directing you to the MIT page which eventually leads to a form (at http://bs.mit.edu:8001/pgp-form.html) that forces you to affirm your citizenship, agree to obry ITAR and obey the RSAREF license, and state that you will only use PGP for noncommercial use. It then appears to do some minimal checking of your ip name/address (it would allow me to download from netscape.com but not from ricochet.net). If anyone can point me at any legal analysis of these different approaches, or has any info to offer on the matter, I'd love to hear about it. thanks, Joe Francis From ravage at ssz.com Wed Feb 4 14:40:56 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 06:40:56 +0800 Subject: IBM cpu breaks 1GHz barrier [CNN] Message-ID: <199802042241.QAA06983@einstein.ssz.com> Forwarded message: > IBM breaks 1,000 MHz > > More related sites... NEW YORK (CNNfn) - Engineers at an International > Business Machines Corp. research facility in Austin, Texas, Wednesday > demonstrated the world's first computer chip to break the 1,000 MHz > barrier. > [INLINE] The chip operates at 1 billion cycles per second. The fastest > commercial microprocessors today operate at around 300 MHz. However, > computer users won't be able to run out and buy a PC containing the > chip anytime soon. IBM isn't expected to make it available > commercially for at least two years. > [INLINE] The news comes just days after rival Digital Equipment > introduced a new version of its Alpha chip that it said would break > the 1,000 MHz barrier. Digital Equipment, which hasn't yet hit that > mark, also said it would take at least two years for the chip to be > available. > [INLINE] IBM will issue a research paper detailing the chip, along > with two related microprocessor papers, at the International Solid > State Circuit Conference in San Francisco Friday. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Wed Feb 4 14:44:26 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 06:44:26 +0800 Subject: IRS Technology Chief Resigns [CNN] Message-ID: <199802042242.QAA07077@einstein.ssz.com> Forwarded message: > > IRS TECHNOLOGY CHIEF TO RESIGN > > > WASHINGTON (AP) -- Arthur Gross, the IRS official heading efforts to > update the agency's outmoded computer systems, plans to leave the > agency this spring. > > Gross, chief information officer at the IRS, won wide respect from > congressional Republicans for his computer modernization efforts > even as they grilled the agency for mistreatment of taxpayers last > year. > > He announced his plans to resign Tuesday. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Wed Feb 4 14:44:47 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 06:44:47 +0800 Subject: Pepsi a tad anal? [CNN] Message-ID: <199802042243.QAA07160@einstein.ssz.com> Forwarded message: > DRINKING THE COMPETITION LEADS TO LAWSUIT > > POMONA, California (AP) -- Just because he delivers Pepsi doesn't > mean he has to drink it. > > Michael Dillon has filed a discrimination lawsuit against the > soft-drink giant after he was reprimanded for drinking Gatorade on > the job and was publicly chastised for drinking a non-Pepsi product > during a meeting. > > Dillon says both claims invaded his privacy. > > A spokesman for Pepsi says the company doesn't forbid workers from > downing other soft drinks, but expects them to be team players when > it comes to being loyal. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Wed Feb 4 14:45:54 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 06:45:54 +0800 Subject: Yeltsin: Clinton to cause next World War? [CNN] Message-ID: <199802042244.QAA07241@einstein.ssz.com> Forwarded message: > > YELTSIN: CLINTON'S IRAQ ACTIONS COULD CAUSE WORLD WAR > > Yeltsin Yeltsin warns Clinton against use of force in > Iraq February 4, 1998 > Web posted at: 11:52 a.m. EST (1652 GMT) > > MOSCOW (CNN) -- Russian President Boris Yeltsin on Wednesday issued > the Kremlin's strongest criticism yet of U.S. threats to launch > military strikes against Iraq, saying such action could trigger > another world war. > > "By his actions, (U.S. President Bill) Clinton might run into a > world war," a somber Yeltsin said at a televised meeting in the > Russian capital. > > "He is behaving too loudly on this -- too loudly", Yeltsin said. And > he added, "Well, now (some are saying) let us flood it all with > planes and bombs. No, frankly speaking, it is not like Clinton at > all." > > "One must be more careful in this world saturated with allsorts of > weapons which are sometimes in terrorists' hands," the Kremlin chief > said, occasionally gripping his desktop andgrimacing. "It's all very > dangerous." ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From root at iguana.be Wed Feb 4 15:39:42 1998 From: root at iguana.be (Kris Carlier) Date: Thu, 5 Feb 1998 07:39:42 +0800 Subject: HUMOR: Bill Gates gets it, PRESERVED for the FUTURE! In-Reply-To: <19980204.213032.attila@hun.org> Message-ID: > made my day! yeah right... First of all, Bill Gates was received overhere like a king. He talked to a bunch of ministers, the prince, and above all, he got something that can be considered as the biggest honor one can get: a whipped cream cake in the face. If you're considered unimportant, you don't get one in the face at all. I think he didn't mind though: BG signed a contract with Mr Vanden Brande, the Flemish number one minister, for the PC Kadee project: M$ will -happily- install 40.000 (fourty thousand !!) PC's with their software on it. The project is for K12 and up (pre-college) schools. M$ will not donate this of course, we in Belgium are dumb enough to gladly PAY (a so-called reduced price) for this kind of joke. So no, I'm not too happy at all about this incident. Would have been better if he didn't get this kind of attention. kr= \\\___/// \\ - - // ( @ @ ) +---------------oOOo-(_)-oOOo-------------+ | kris carlier - carlier at iguana.be | | Hiroshima 45, Tsjernobyl 86, Windows 95 | | Linux, the choice of a GNU gener8ion | | SMS: +32-75-61.43.05 | +------------------------Oooo-------------+ oooO ( ) ( ) ) / \ ( (_/ \_) From bill.stewart at pobox.com Wed Feb 4 15:41:31 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 5 Feb 1998 07:41:31 +0800 Subject: Feds Approve Bank to Certify Digital Signatures Message-ID: <3.0.5.32.19980204153030.0084c570@popd.ix.netcom.com> There was a note to Dave Farber's list that the Office of the Comptroller of Currency has approved Zion's First National Bank to certify digital signatures. Since they're in Utah, Zion's has a certain amount of legal infrastructure in place. The text version of the story is at http://www.occ.treas.gov/ftp/release/98-4.txt and the 20-page PDF with gory details is at http://www.occ.treas.gov/ftp/release/98-4att.pdf They're going to offer digital signature certificates with the usual binding of a key to a body plus papers, and provide software to support it. Some of their software can be used for encryption, and unfortunately they're going to offer key escrow, though as a separate business service, with keys encrypted by the key's corporate owner as well as by the bank for protection, but it's not going to be a mandatory service, and they have no intention of offering escrow for signature keys, only encryption keys. Their documentation does talk a good bit about crypto technology, in layman's terms, and about risk management and Y2000 compliance, and also in great detail about how things like this are standard banking functions applied in a digital environment (to convince the OCC to let them offer it, since they're a bank and aren't supposed to offer non-bank-related services). There's also a story in Network World at http://www.nwfusion.com/news/0202rsa.html about Verisign and Entrust CAs plans for IPOs. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From guttman at media.mit.edu Wed Feb 4 15:54:18 1998 From: guttman at media.mit.edu (Robert H Guttman) Date: Thu, 5 Feb 1998 07:54:18 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) Message-ID: <199802042348.SAA17496@ml.media.mit.edu> > > "Americans do not buy for quality, they buy for price" > > Which must explain our gross national product, then. Cheaper, > as always, *is* better. > > > as John Ruskin said: > > 1. those who buy for price alone are this man's lawful prey. > > Those who *don't* buy for price alone are usually somebody's > lunch sooner or later. I somehow missed the full thread on this topic, but I disagree that "cheaper, as always, *is* better." There are many markets and situations where people (Americans included) shop by "value" (perceived or otherwise), not just price. This is what VARs and "branding" are about and what enables market power. For example, Gerry Heller, CEO of FastParts - an online auction for semiconductors, was quoted in a recent Forrester Research report as admitting that even in this commodity-like market "availability is more important than price" when it comes to auctioning semiconductors. - Rob ----------------------------------------------------------------- Robert H Guttman voice:617-253-9603 mailto:guttman at media.mit.edu MIT Media Laboratory http://www.media.mit.edu/~guttman Software Agents Group http://ecommerce.media.mit.edu/ Agent-mediated E-Commerce ----------------------------------------------------------------- From attila at hun.org Wed Feb 4 16:19:33 1998 From: attila at hun.org (Attila T. Hun) Date: Thu, 5 Feb 1998 08:19:33 +0800 Subject: Fingerprinting in CA [was Whoa: British SmartCard rollout] In-Reply-To: <199802040323.WAA16673@panix2.panix.com> Message-ID: <19980205.000739.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980203:2223, in <199802040323.WAA16673 at panix2.panix.com>, Information Security was purported to have expostulated to perpetuate an opinion: > How did you CA cypherpunks feel about being fingerprinted? well, I would have gone up to Nevada to get a license, but they have been doing it longer than CA. now Utah is doing it.... it will be universal before long. when I asked in CA if I could refuse to be fingerprinted, they said; "sure... as long as you dont want a license" --real white of 'em. Utah said basically the same thing. that and they already have us feeling like. when cash is outlawed, only outlaws will have cash. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNkD37R8UA6T6u61AQGIrgH+JJ0ZcKx52zDG9VKAA1t02Qvlp0D2Jq7A /jx1FBDn0pydATuRVItBXZvv8rP4RjaRgrBqtM7duPDg2MA0ctgWeQ== =nWmP -----END PGP SIGNATURE----- From jya at pipeline.com Wed Feb 4 16:27:31 1998 From: jya at pipeline.com (John Young) Date: Thu, 5 Feb 1998 08:27:31 +0800 Subject: STOA Assessment of Techno-Control Message-ID: <1.5.4.32.19980205002157.006c1454@pop.pipeline.com> We've transcribed the Euro-Parliament STOA report, "An Appraisal of the Technologies of Political Control," 6 January 1998, a portion of which was offered earlier by Axel Horns and Ulf M�ller. http://jya.com/stoa-atpc.htm (295K text + 210K images) Zipped version: http://jya.com/stoa-atpc.zip (314K) It's a grim assessment, revealing more than most of us want to face about the dark side of high technology, especially what the most technologically advanced nations are deploying, and building to sell to the worst of humanity, and how export laws are flaunted to cut criminal deals in defiance of high-minded law and public policy. It demonstrates that he national security heritage continues, sharing military technology with governmental outlaws around the globe. And the US is leading the market. It would be cathartic for this report was widely read, pondered, then acted upon, in the US and globally. Kudos to the European Parliament for sponsoring it. And congratulations to the authors and the beleaguered organizations who've been trying for years to diminish this over civilized madness, to jolt us out of techno-narcosis. There's much in the report that's been discussed here, and much more that has not but deserves to be. The full report is 112 pages, 50 pages of main body, 13 pages of notes and 25 pages of bibliography. We've not yet transcribed the detailed bibliography. As noted earlier, the contents are: Abstract Executive Summary Acknowledgements Tables and Charts 1 Introduction 2 Role and Function of Political Control Technologies 3 Recent Trends and Innovations 4 Developments in Surveillance Technology 5 Innovations in Crowd Control Weapons 6 New Prison Control Systems 7 Interrogation, Torture Techniques and Technologies 8 Regulation of Horizontal Proliferation 9 Conclusions 10 Notes and References 11 Bibliography [Not yet transcribed] Appendix 1. Military, Security & Police Fairs. [Not provided with report] From ravage at ssz.com Wed Feb 4 18:14:44 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 10:14:44 +0800 Subject: Sun takes over Netscape? [CNN] Message-ID: <199802050211.UAA00178@einstein.ssz.com> Forwarded message: > February 4, 1998: 7:27 p.m. ET > > More related sites... NEW YORK (CNNfn) - Shares of Netscape > Communications Corp. shot up Wednesday amid rumors that the company is > being eyed as a possible takeover target by Sun Microsystems Inc. > [INLINE] The takeover scuttlebut drove Netscape (NSCP) stock up 1-1/16 > to 19-1/4 in active trading. The surge capped a four-day trading > period in which the Internet software company's shares have jumped > roughly 20 percent from a Friday close of 16-1/16. > [INLINE] Despite the leap, Netscape stock remains sharply down in > 1998, having dropped nearly 20 percent in the first 23 trading days of > the year. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From guy at panix.com Wed Feb 4 18:36:03 1998 From: guy at panix.com (Information Security) Date: Thu, 5 Feb 1998 10:36:03 +0800 Subject: Fingerprinting in CA [was Whoa: British SmartCard rollout] Message-ID: <199802050220.VAA21403@panix2.panix.com> How come there is no organized opposition to fingerprinting everyone in the nation? [U.S.-centric talk, but applies to Britain too] There was just a news report on "KidsSafe", a smartcard for holding kids' health details for an emergency. "Eventually, they won't have to carry the card, we can instantly look up the information from their fingerprints". Excerpts from the Cryptography Manifesto follows... BTW, it's finally online! I need to update it for the past 6 months of activity, but... http://www.erols.com/paulwolf/cointelpro/cointel.htm (scroll down) ---- Fingerprinting everyone in the USA - nay, the planet - is a known plot by the NSA: see (the 2nd) "The Body as Password" below. Are we all going to silently roll over and accept this NSA crap??? It's our tax money, but we NEVER got to vote on it. How about some cypherpunk with money challenging it on the basis shown below of violating Privacy Act of 1974? ---guy Sure, government can give debate reasons for requiring fingerprinting for driver's licenses... But it is still a violation of the minimization requirement of the Privacy Act of 1974. Biometric data on citizens is FAR BEYOND any reason government can give. Notice how no citizens in any state ever got to vote on such an important escalation of personal data collection by the government. Indeed, it seems to be accomplished in the quietest way possible, giving citizens the least amount of opportunity to choose their fate. Odd, since tax-payer paid-for government services is what gives them the power. But elected representatives will do, you say? Did you hear any of them mention it during campaigning? Did Alabama elected officials even mention it with their press release of a new driver's license, despite that being the plan? No. What does that tell you? We need a cabinet-level Privacy Commission, with the power to intervene nationwide. Power to protect us little people from fanatical personal data collection. We are losing it piece by piece. Who would have thought the United States would collect fingerprints from all citizens? This is the main way our Federal Government is rolling out the National ID Card, using a Universal Biometric Card: driver's licenses. Divide and Conquer, state by state. It is the beginning of the end. Don't think the biometric driver's licenses are the exact equivalent of a National ID Card? Check out this phrasing from an unimplemented law: # Privacy Journal, By Robert Ellis Smith, October 1983 issue # # Senator Bob Dole wants the government to conduct a three-year study to # unify federal and local requirements for personal identity. # # The bill, S1706, would amend the Federal False Id Act of 1982, to require # a comprehensive identity scheme for the U.S., either THROUGH UPDATING # EXISTING IDs TO BE MORE SECURE, UNIFYING THEM, or creating a new identity # document for all Americans. Collect biometric information from everyone... law enforcement's Evil Holy Grail. * "U.S. Has Plan to Broaden Availability tests of DNA Testing" * By Fox Butterfield, The New York Times, undated but 1996 implied. * * In a little known provision of the Clinton Administration's 1994 Crime * Control Act was a call for the establishment of a nationwide DNA data * bank like the current national system for fingerprints, run by the FBI. * * In the two years since then, 42 states have passed laws requiring prison * inmates give blood or saliva samples for a "DNA fingerprint." * * In a report today, the Justice Department said it is stepping up efforts * to make such DNA biometric capture "as common as fingerprinting" and that * they expect the test in five years to go from $700 each to a mere $10 and * take only hours or minutes to accomplish. And how much hardware is a handheld fingerprint device? * "Lucent in New Identification Joint Venture" * The New York Times, 5/22/97 * * Lucent Technologies [Bell Labs is their research and development arm] and * U.S. Venture Partners said today that they had formed a company that would * make products to help people prove their identities through electronic * fingerprinting technology. * * The first product of the company, Veridicom Inc., will be a postage-size * fingerprint sensor used to retrieve information, authorize purchases or * allow entry into restricted areas. * * The postage-size sensor will measure the ridges and valleys on the skin * when a finger is pressed against a silicon chip, and then check the * measurements against the user's profile. Not big at all, is it? # "Faster, More Accurate Fingerprint Matching" # By Andrea Adelson, The New York Times, October 11 1992 # # "We think there will be a revolution in fingerprinting," said David F. # Nemecek, a deputy for the FBI's Information Service Division. # # The next step is for manufacturers to make a single-finger mobile scanner # for use in patrol cars. Some FBI cars are expected to get them next year. $ "The Body As Password", By Ann Davis, Wired Magazine, July 1997 $ $ In October 1995, the Federal Highway Administration awarded a $400,000 $ contract to San Jose State University's College of Engineering to develop $ standards for a "biometric identifier" on commercial driver's licenses and $ for use in a centralized national database. A centralized national database of biometric information for cross-state driver's licenses, and all individual state driver's license fingerprints available via the FBI's NCIC. * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * News reports indicate that, like California, practically all of the 50 * states are in the process of installing news systems for drivers licenses, * often incorporating biometric measurements such as digitization of finger- * prints. That these systems are linked together gives us an indication of * the powerful grip our hidden controllers have on this nation. * * All federal agencies are being integrated into this data net. These Police * State agencies constitute a clear and present danger, not only to the * privacy and constitutional rights of Americans but to our very lives! * * A Hitler, a Pol Pot, or a Stalin would have loved to have had the * microchips, surveillance cameras, lasers, computers, satellites, weapons, * wiretap circuits and communications gadgetry of today's Dick Tracy Police * State. * * Perhaps FBI Director Louis Freeh said it best shortly after his * appointment to the Federal Bureau of Investigation in 1993. Referring * to the incredible array of computerized control and battle gadgetry * available to federal law enforcement, Freeh, stressing cooperation * between his own FBI and the other alphabet police agencies, sardonically * remarked, "LET'S SHARE OUR TOYS." * * Dick Tracy, of course, was a good guy. But Dick Tracy would have * recognized as unconstitutional the worldwide comprehensive Orwellian * system that has been installed, and reject it as a menace to true law * and order. ! "Welfare Recipients Lose Benefits Through Glitches in Computers" ! By Joe Sexton, The New York Times, 5/16/96 ! ! The fingerprint-imaging system that is a central element of the Giuliani ! administration's effort to crack down on welfare fraud has resulted in ! hundreds of recipients cases being closed. ! ! The public advocate's office has been inundated with complaints from ! improper case closings. ! ! The failure seems to stem from the local offices not transmitting the ! fingerprints to Albany's central computer. This resulted in AUTOMATICALLY ! TERMINATING BENEFITS OF PEOPLE THE COMPUTER THOUGHT WERE NOT FINGERPRINTED. ---- Prior to the fingerprint "final solution" of control over us, there were other attempts---which would have required a vote---which tried to roll out a National ID Card. * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * Since total and absolute control can be obtained only by a Police State * bureaucracy, efforts have escalated in recent years to require a National * ID Card. * * Upon Bill Clinton's election as President, Secretary of Health and Human * Services Donna Shalala and Massachusetts Senator Edward Kennedy jointly * developed a $100 million plan to require all children and babies to have * a dossier established in a national computer registry to insure "universal * mandatory vaccinations." * * When patriotic Americans rose up to protest, the U.S. Senate quietly * shelved the deceptive Shalala-Kennedy proposal. * * The Clinton administration next surfaced with its mandatory health care * plan. A key component of this plot to socialize medical care was the * requirement of a computer I.D. card for every American, linked to a master * computer network. * * Martin Anderson, writing in The Washington Times: * * President Clinton held the pretty red, white and blue "smart card" in * his hand when he addressed the nation, proudly waving it like a small * American flag. * * Only it wasn't a flag; it was a "health security card"---his slick * name for a national identity card. Under his plan a new National * Health Board would establish "national, unique identifier numbers" * for every single one of us. * * Fortunately, President Bill Clinton's healthcare scam never made it * into law. Sadly, few of the complainers were upset about the potential * for abuse by Big Brother. * * Shortly after being elected, one Clinton advisor promoting the biochip * 'mark' is Dr. Mary Jane England, a member of Hillary Clinton's ill-fated * socialized, national healthcare initiative. Addressing a conference * sponsored by computer giant IBM [IBM's Lotus division takes hand biometrics * of employees who use their childcare facilities] in Palm Springs, * California, in 1994, England not only endorsed the proposed mandatory * national I.D. smart card, but went one scary step further: * * The smart card is a wonderful idea, but even better would be the * capacity to not have a card, and I call it "a chip in your ear," * that would actually access your medical records, so that no matter * where you were, even if you came into an emergency room unconscious, * we would have some capacity to access that medical record. * * We need to go beyond the narrow conceptualization of the smart card * and really use some of the technology that's out there. * * California Governor Pete Wilson has actively stumped for a National I.D. * Card system, using the straw man of California's pervasive immigration * problem. California Senators Diane Feinstein and Barbara Boxer support * it too. The latest proposal is to mandate I.D. cards for all school * children under the Goals 2000 national education program. Another plan * by the U.S. Labor Department would have required it for all users of a * National Job Training and Employment database. * * George Orwell, in 1984, his classic novel of Big Brother and a coming * totalitarian state, observed that very few people are awake and alert * to the machinations and manipulations of the controllers. Thus, the * people, as a whole, fall victim to a colossal conspiracy out of ignorance * and because of apathy and denial of reality: * * The people could be made to accept the most flagrant violations of * reality, because they never fully grasped the enormity of what was * demanded of them, and were not sufficiently interested in public * events to notice what was happening. [ By Walter Cronkite: "Orwell's '1984'---Nearing?", NYT, June 5 1983 In our world, where a Vietnam village can be destroyed so it can be saved; where the President names the latest thing in nuclear missiles "Peacekeeper"---in such a world, can the Orwellian vision be very far away? Big Brother's ears have plugs in them right now (or they are, by law, supposed to), at least on the domestic telephone and cable traffic. But the National Security Agency's ability to monitor microwave transmissions, to scoop out of the air VAST numbers of communications, including telephone conversations, store them in computers, play them back later, has a truly frightening potential for abuse. George Orwell issued a warning. He told us that freedom is too much taken for granted, that it needs to be carefully watched and protected. His last word on the subject was a plea to his readers: "Don't let it happen. It depends on you." ] * * The National Security Agency's Project L.U.C.I.D., with all its * technological wizardry, is a future, planetary dictator's dream---and a * Christian and national patriot's nightmare. Someday, the Holy Bible * prophesies, that planetary dictator will emerge on the scene, lusting * for blood... * * There can be no doubt about it. * * The REAL Chief Executive Officer of the NSA is not a human being. * * The CEO MUST be Lucifer himself. Amen. ---- It is technology driving the capabilities, it is our government using them ruthlessly: without letting us vote on it. Never before could someone walk up to you and number you by scanning your fingerprints. A number that is yours and yours alone. You have been numbered for all time. No ID card needed once portable fingerprint scanners are deployed all over! If the government suddenly ordered all citizens to be numbered with an indelible invisible ink on their arms so they were permanently numbered; so law enforcement could scan them at will: there would be a revolt. Yet that is what is happening. Fingerprints, scanned into a computer, are a number. The number is inescapably yours. Modern technology means they don't have to put the number on you, they can read it off of you by minutely examining your body. And: it is the NSA driving the fingerprint-rollout of the national ID card. # "The Body As Password", By Ann Davis, Wired Magazine, July 1997 # # Currently housed at the National Security Agency, a working group of # federal bureaucrats founded the Biometric Consortium in the early 1990s. # Its 1995 charter promises to "promote the science and performance of # biometrics for the government." # # Consortium mumbers include state welfare agencies, driver's license # bureaus, the Immigration and Naturalization Service, the Social Security # Administration, and the Internal Revenue Service. If my attempts to show how bad a thing this is have been too rambling, too abstract, here is a simple and accurate analogy: * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * It was Martin Anderson who, in his book, Revolution, revealed that during * the Reagan administration during the 1980s, several top cabinet officials * were urging President Ronald Reagan to implement a computerized National * I.D. Card. * * The rationale for the proposal was that such a system would help put a lid * on illegal immigration. [Reagan had been Governor of California] * * But Anderson, who at the time was a domestic advisor to the President and * sat in on this particular cabinet meeting, spoke up and gave the group * something to think about. * * "I would like to suggest another way that I think is a lot better," he * told them, serious in demeanor but clearly being facetious. "It's a lot * cheaper, it can't be counterfeited. It's very lightweight, and it's * impossible to lose. It's even waterproof." * * "All we have to do," Anderson continued, "is tattoo an identification * number on the inside of everybody's arm." * * His reference was to the tattooing of numbers on victims in Nazi * concentration camps. Survivors still bear the dreaded tattoo markings * to this day. * * Mr. Anderson described the stunned reaction of those present, "There were * several gasps around the table. A couple cabinet members looked as if they * had been slapped. No one said anything for a long time." * * Ronald Reagan, a consummately wise politician who professed a belief in * Bible prophecy, caught the implication [about The Mark of the Devil]. * * He then hushed the cabinet and efficiently dismissed the National ID Card * proposal by sardonically remarking, "Maybe we should just brand all babies." "Those that give up essential liberty for a little security, deserve neither liberty nor security." - Ben Franklin "When ID's are mandatory, it is time to leave the planet." - Robert Heinlein * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * In the November 1994 publication of the FBI Law Enforcement Bulletin, * the FBI advocated BIOMETRIC CAPTURE FOR ALL NEWBORN BABIES AND * SIMULTANEOUSLY THEIR MOTHERS. From ravage at ssz.com Wed Feb 4 19:37:01 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 11:37:01 +0800 Subject: Rogue root domain reconfiguration [CNN] Message-ID: <199802050334.VAA00469@einstein.ssz.com> Forwarded message: > ADMINISTRATION SAYS INTERNET RECONFIGURATION WAS ROGUE TEST > > graphic February 4, 1998 > Web posted at: 9:29 p.m. EST (0229 GMT) > > WASHINGTON (AP) -- The Clinton administration said Wednesday it was > confident a researcher in California won't repeat his rogue > reconfiguration of the Internet -- a test that few users noticed but > that raised concerns about how the worldwide network is run. > > Jon Postel, who runs the Internet Assigned Numbers Authority at the > University of Southern California under a Defense Department > contract, last week redirected half the Internet's 12 > directory-information computers to his own system. > > Normally, those so-called "root servers" help users find addresses > on the Internet by pulling data from Network Solutions Inc., a > private company in northern Virginia that operates under a federal > government contract. From Site.Feedback at FT.com Wed Feb 4 19:52:26 1998 From: Site.Feedback at FT.com (Site.Feedback at FT.com) Date: Thu, 5 Feb 1998 11:52:26 +0800 Subject: FT.com Registration Message-ID: <9802050344.AA44748@svr1en0.ft.com> This mail is to confirm your registration with FT.com, the Financial Times' web site. Please keep this note of your username and password in a safe place to look up should you forget them. If you have any problems getting into and around the site at any time please first try our help pages at http://www.ft.com/about/index.htm . These are open pages which don't require you to log in. If after reading them you still have difficulties, then contact us by email at site.feedback at ft.com . User name - hackworth Password - writecode The Internet Team @ FT.com. From marshall at ibm.net Wed Feb 4 19:53:32 1998 From: marshall at ibm.net (James F. Marshall) Date: Thu, 5 Feb 1998 11:53:32 +0800 Subject: Changing to Moderated Cypherpunks -- How? Message-ID: <199802050343.DAA46984@out5.ibm.net> -----BEGIN PGP SIGNED MESSAGE----- Too much noise in the unedited list. How does one change to the moderated list? - -- James F. Marshall, Esq., Pasadena, California Subject "JFM Public Key" for PGP Public Key - -- OS/2 is to Windows as Stradivarius is to Yamaha -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBNNf8UjbjGennrhqZAQETXgP/WFshRowrhi7qMnUZHUIADA7cCV0fEYFA WiAlynovwU9dyvc/gygz9N6aeJO/ghqiQl2/NqCSsKn5H1nTr1MHbK2iYJwt6AXh ZhMSfz5p1QzVWwm9lIFETipPayuJ+WzCkaakMZP3PPZXG8XUT/48NZG5hJgjfIM7 vqzMkCcHr+A= =2N5t -----END PGP SIGNATURE----- From nobody at REPLAY.COM Thu Feb 5 12:17:41 1998 From: nobody at REPLAY.COM (Anonymous) Date: Thu, 5 Feb 1998 12:17:41 -0800 (PST) Subject: Changing to Moderated Cypherpunks -- How? In-Reply-To: <199802050343.DAA46984@out5.ibm.net> Message-ID: <199802052017.VAA02584@basement.replay.com> On Thu, 5 Feb 1998 07:24:11 -0500 Anonymous wrote: >>Too much noise in the unedited list. >> >>How does one change to the moderated list? > >Easy > > Wow! Thanks for that tip! The cypherwatch list looks great. I suggest you all subscribe now!! :-) From dlv at bwalk.dm.com Wed Feb 4 20:23:58 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Thu, 5 Feb 1998 12:23:58 +0800 Subject: Changing to Moderated Cypherpunks -- How? In-Reply-To: <199802050343.DAA46984@out5.ibm.net> Message-ID: <5aueke19w165w@bwalk.dm.com> "James F. Marshall" writes: > Too much noise in the unedited list. > > How does one change to the moderated list? You ask John Gilmore and Sandy Sandfart if you can suck their cocks. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From ravage at ssz.com Wed Feb 4 20:36:04 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 12:36:04 +0800 Subject: Fingerprinting... Message-ID: <199802050435.WAA00790@einstein.ssz.com> Hi, Check out 'Super Cop' on TLC... ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From guy at panix.com Wed Feb 4 21:20:11 1998 From: guy at panix.com (Information Security) Date: Thu, 5 Feb 1998 13:20:11 +0800 Subject: Changing to Moderated Cypherpunks -- How? Message-ID: <199802050505.AAA01452@panix2.panix.com> Dimitry "I've been like this since my prostrate operation" The Dim wrote: > You ask John Gilmore and Sandy Sandfart if you can suck their cocks. I'd be glad to handle it. The only criteria is to delete Dr. Dim and his nyms. Would toad.com give me a mail hook to send back to, or am I supposed to setup my own majordomo? First: how many people are interested? I suppose I could split it in two: the other for actual crypto comments. I'd not suggest it myself, because our concerns have to be wider than just that. Regarding everyone in the US being fingerprinted in a sneakily-rolled-out manner: CCC... We can't encrypt our fingerprints, dammit. ---Information Security From wombat at mcfeely.bsfs.org Wed Feb 4 21:27:04 1998 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Thu, 5 Feb 1998 13:27:04 +0800 Subject: Airline ticket information -- help In-Reply-To: Message-ID: Or you could just call up the airline and pretend you are Tim May, and they will tell you. ;) On Mon, 2 Feb 1998, Tim May wrote: > At 9:55 AM -0800 2/2/98, Declan McCullagh wrote: > >I'm trying to find out what airline flight someone is taking. I have a name > >and know the general travel plans and likely date. How can I find out the > >airline, flight number, and seat number? This is somewhat urgent. (You have > >my assurance that the purpose is legit.) > > > >If anyone has any ideas, I'd appreciate the help. > > Monica Lewinski and William Ginsburg are travelling on American Airlines > Flight 420 on Wednesday, 4 February, departing Dulles Airport at 10:45 > a.m., EST, and arriving LAX at 3:35 p.m., PST. > > Good luck reporting on them, Declan! > > > --Tim May From ravage at ssz.com Wed Feb 4 21:28:26 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 13:28:26 +0800 Subject: Changing to Moderated Cypherpunks -- How? (fwd) Message-ID: <199802050525.XAA01010@einstein.ssz.com> Forwarded message: > Date: Thu, 5 Feb 1998 00:05:08 -0500 (EST) > From: Information Security > Subject: Re: Changing to Moderated Cypherpunks -- How? > I'd be glad to handle it. > > The only criteria is to delete Dr. Dim and his nyms. > > Would toad.com give me a mail hook to send back to, > or am I supposed to setup my own majordomo? I'll provide you a feed if you find that acceptable, unfortunately I am not able to provide an account on SSZ to run it off of. My suspicion is that you'll need a majordomo or similar remailer package (possibly with procmail for duplicate filtering). I also strongly suggest you get your feed as a CDR member and not a subscriber to a given list. That way if one node goes down it won't leave you out in the cold (necessarily). You also probably don't want to use a system that hosts a CDR node in case that site drops off the net. Good luck. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From 42412260 at via.net Thu Feb 5 14:28:16 1998 From: 42412260 at via.net (42412260 at via.net) Date: Thu, 5 Feb 1998 14:28:16 -0800 (PST) Subject: Lose Weight - FAST & EASY, with "The PATCH" Check it out!! Message-ID: <8241033777bur.543167.fpes> In an ongoing study, 100 people between the ages of 19-67 who weighed 17 - 163 pounds in excess of their normal body weight, LOST weight! 56% of those in the study, LOST at least 20 pounds. FAST & EASY. Just apply "The Patch" to your arm, and LOSE weight! From cypherlist-watch-owner at joshua.rivertown.net Thu Feb 5 15:08:15 1998 From: cypherlist-watch-owner at joshua.rivertown.net (Cypherlist-Watch Moderator) Date: Thu, 5 Feb 1998 15:08:15 -0800 (PST) Subject: Changing to Moderated Cypherpunks -- How? In-Reply-To: <199802050343.DAA46984@out5.ibm.net> Message-ID: FYI, here is the welcome message from cypher-list watch. If you are interested, subscription details follow at the end of the message. ================================================================ The CYPHER-LIST WATCH PLEASE retain this message for future reference. When you need to unsubscribe, change your address for purposes of the list or reach the list owner for an administrative request, you will find this message valuable. About the list: The Cypher-list watch is a digest only list featuring information regarding many aspects of privacy in the electronic age, such as encyption technology, electronic privacy, anonymous remailers and related issues. The posts from the list may originate from other mailing lists to cover the broad topics featured on the list. All material forwarded is done so with prior consent of the origining list owner. The list is suitable for many levels of user. Sometimes the topics will be *very* technical; others may just be *very* interesting! (Many will hopefully be both!) ----------------------------------- CYPHER WATCH IS MODERATED! In order to maintain a high level of quality, this is a moderated list. If you have ever subscribed to a mariginally informative list, I am sure you will appreciate the decision to present this material in this format. The listowner spends innumerable hours every week culling through every post from a pletorea of mailing lists to bring you the best of each. The concept of the list could not be delivered in any other format. One way to think of this as a Cypherpunk list without the noise! If you want to stay informed but you don't want to wade through 20 messages to read one useful post, this list is for you. Of course, moderating a list such as this involves a level of judgment, as the Cypherlist Watch will not be a mere repetition of its origniating lists. As such, some topics listmembers may think are important may not be covered or may not be covered in the depth a member desires. List members should feel free to bring such matters to the list owners attention, however, the decision of the listowner redarding the topics to be feature is final. ------------------------------ Administrivia: Submissions should be directed to the moderator at: If a post is rejected I may or may not give a reason. As long as you use your common sense there should be no problems. Attacks on idividuals or companies are not permitted, so don't do it! Continued requests to post previously rejected material may also result in your being unsubscribed from the list. To contact the list owner in an emergency (Unsubscription requests are *not* an emergency). How to Subscribe/Unsubscribe: Receive future messages sent to the cypherlist-watch mailing list. Stop receiving messages for the cypherlist-watch mailing list. Alternatively, you can e-mail: cyperlist-watch-digest-request at joshua.rivertown.net and put 'subscribe' or 'unsubscribe' on the "Subject:" line. Resources: Applied Cryptography (2nd edition) by Bruce Schneier; published by John Wiley & Sons, Inc.; ISBN 0-471-11709-9. PGP Users list and web site http://pgp.rivertown.net/ ================================================================ ================================================================ From aba at dcs.ex.ac.uk Thu Feb 5 05:21:15 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Thu, 5 Feb 1998 21:21:15 +0800 Subject: Changing to Moderated Cypherpunks -- How? In-Reply-To: <199802050505.AAA01452@panix2.panix.com> Message-ID: <199802051047.KAA01376@server.eternity.org> Information Security > I'd be glad to handle it. > > The only criteria is to delete Dr. Dim and his nyms. How are you going to recognize Dimitri's nyms if he has any. Adam From ravage at ssz.com Thu Feb 5 06:23:53 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 22:23:53 +0800 Subject: update.357 (fwd) Message-ID: <199802051415.IAA01650@einstein.ssz.com> Forwarded message: > Date: Wed, 4 Feb 1998 11:01:53 -0500 (EST) > From: physnews at aip.org (AIP listserver) > Subject: update.357 > > A QUANTUM TUNNELING TRANSISTOR, an on-off switch > that exploits an electron's ability to pass through normally > impenetrable barriers, has been built by Sandia researchers (Jerry > Simmons, 505-844-8402), opening possibilities for record-speed > transistors that can be mass-produced with current nanotechnology. > In their device, the researchers control the flow of electrons > between two GaAs layers (each only 15 nm thick) separated by an > AlGaAs barrier (12 nm). Although the electrons in GaAs > ordinarily do not have enough energy to enter the AlGaAs barrier, > the layers are so thin (comparable in size to the electron > wavelength) that the electrons, considered as waves rather than > particles, can spread into the barrier and, with an appropriate > voltage applied, out the other side. In the process, the electron > waves do not collide with impurity atoms, in contrast to a > traditional transistor's particlelike electrons, which are slowed > down by these collisions. Transistors that switch on and off a > trillion times per second--5 times faster than the current record--are > possible with this approach. Although quantum tunneling > transistors were first built in the late 1980s, it was originally > infeasible to mass-produce them. Previous researchers engraved > the ultrathin GaAs and AlGaAs features side-by-side on a surface, > something hard to do reliably with present-day lithography. > Therefore the Sandia researchers stacked the features vertically, by > using readily available techniques such as molecular beam epitaxy > which can deposit layers of material with single-atom thicknesses. > Having made quantum-tunneling memory devices and digital logic > gates operating at 77 K, the researchers expect room-temperature > devices in the next year. (J.A. Simmons et al., upcoming article > in Applied Physics Letters; figure at > www.aip.org/physnews/graphics) > [text deleted] ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From cyber at ibpinc.com Thu Feb 5 06:25:34 1998 From: cyber at ibpinc.com (Roger J Jones) Date: Thu, 5 Feb 1998 22:25:34 +0800 Subject: No Subject Message-ID: <199802051403.IAA12716@pc1824.ibpinc.com> > > > I'm here to ask > > > As you'll soon see > > > Did you grope > > > Miss Lewinsky? > > > Did you grope her > > > in your house? > > > Did you grope > > > Beneath her blouse? > > > > > > I did not do that > > > Here nor there > > > I did not do that > > > Anywhere! > > > I did not do that > > > Near nor far > > > I did not do that > > > Starr-You-Are. > > > > > > Did you smile? > > > Did you flirt? > > > Did you peek > > > Beneath her skirt? > > > And did you tell > > > The girl to lie > > > When called upon > > > To testify? > > > > > > I do not like you > > > Starr-You-Are > > > I think that you > > > Have gone too far. > > > I will not answer > > > Anymore > > > Perhaps I will go > > > Start a war! > > > > > > The public's easy > > > To distract > > > When bombs are > > > Falling on Iraq! > > > > > > From ajhh4 at worldnet.att.net Thu Feb 5 23:09:02 1998 From: ajhh4 at worldnet.att.net (ajhh4) Date: Thu, 5 Feb 1998 23:09:02 -0800 (PST) Subject: No Subject Message-ID: <19943672.886214@relay.comanche.denmark.eu> Authenticated sender is Subject: Friday Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit EMAIL MARKETING WORKS!! Bull's Eye Gold is the PREMIER email address collection tool. This program allows you to develop TARGETED lists of email addresses. Doctors, florists, MLM, biz opp,...you can collect anything...you are only limited by your imagination! You can even collect email addresses for specific states, cities, and even countries! All you need is your web browser and this program. Our software utilizes the latest in search technology called "spidering". By simply feeding the spider program a starting website it will collect for hours. The spider will go from website to targeted website providing you with thousands upon thousands of fresh TARGETED email addresses. When you are done collecting, the spider removes duplicates and saves the email list in a ready to send format. No longer is it necessary to send millions of ads to get a handful of responses...SEND LESS...EARN MORE!!! A terrific aspect of the Bull's Eye software is that there is no difficult set up involved and no special technical mumbo-jumbo to learn. All you need to know is how to search for your targeted market in one of the many search engines and let the spider do the rest! Not familiar with the search engines? No problem, we provide you with a list of all the top search engines. Just surf to the location of a search engine on your browser then search for the market you wish to reach...it's that easy! For instance if you were looking for email addresses of Doctors in New York all you would do is: 1) Do a search using your favorite search engine by typing in the words doctor(s) and New York 2) Copy the URL (one or more)...that's the stuff after the http://... for instance it might look like http://www.yahoo.com/?doctor(s)/?New+York 3) Press the START button THAT's IT!!! The Bull's Eye spider will go to all the websites that are linked, automatically extracting the email addresses you want. The spider is passive too! That means you can let it run all day or all night while you are working on important things or just having fun on your computer. There is no need to keep a constant watch on it, just feed it your target market and give it praise when it delivers thousands of email addresses at the end of the day! Features of the Bull's Eye Software: * Does TARGETED searches of websites collecting the email addresses you want! * Collects Email addresses by City, State, even specific Countries * Runs Automatically...simply enter the Starting information, press The Start Button, and it does the rest * Filters out duplicates * Keeps track of URLs already visited * Can run 24 hours per day, 7 days per week * Fast and Easy List Management * Also has built in filtering options...you can put in words that it "Must" have while searching,...you can even put in criteria that it "Must NOT Have"...giving you added flexibility * Also imports email addresses from any kind of files (text files, binary files, database files) * List editor handles Multiple files to work on many lists simultaneously * Has a Black-Book feature... avoid sending emails to people who do not want to receive it * Built-in Mail program...send email directly on the internet with just a click of your mouse * Personalized Emails...if the email address has the user's name when it is collected,..you can send Personalized emails!!! * Sort by Location, Server, User Name, Contact Name * Advanced Operations: � Email address lists export in many different formats (HTML, Comma delimited, text file) � Advanced editing...Transfer, Copy, Addition, Delete, Crop, Move to Top/Bottom � Operations between lists...Union, Subtraction, Comparison * Program is Passive,...meaning you can run other programs at the same time CALL FOR MORE INFORMATION 213-980-7850 CALL FOR MORE INFORMATION 213-980-7850 ORDERING INFORMATION Customer Name Company Name Address City State Zip Phone Fax Email Address ______ BULL'S EYE SOFTWARE $259.00 Includes Software, Instructions, Technical Support ______ Shipping & Handling (2-3 Day Fedex) $10.00 (Fedex Overnite) $20.00 ______ TOTAL (CA Residents add applicable sales tax) *All orders are for Win 95 and Win NT *****CREDIT CARDS ACCEPTED***** MASTERCARD VISA AMEX PLEASE CALL 213-980-7850 to process your order 9am-5pm Pacific Time Checks or Money Orders send to: WorldTouch Network Inc. 5670 Wilshire Blvd. Suite 2170 Los Angeles, CA 90036 Please note: Allow 5 business days for all checks to clear before order is shipped. From mark at unicorn.com Thu Feb 5 08:36:19 1998 From: mark at unicorn.com (mark at unicorn.com) Date: Fri, 6 Feb 1998 00:36:19 +0800 Subject: the best justice money can buy --Lessig Message-ID: <886695836.699.193.133.230.33@unicorn.com> Atilla wrote: >no, in fact, if there were a free market remedy for M$' >monopoly, I would be in favour of it --and there is _no_ >free market remedy and failure to act promptly >conceivably wipe out all, or virtually all, of the >viable competitors. Of course there's a free-market remedy for Microsoft; eliminate copyright. If anyone can copy Microsoft software for free, it would be forced to compete on real benefits rather than installed base. This is why I have no sympathy with those who claim Microsoft is the victim in the anti-trust suits, even though I'm opposed to such action in general; those whose profits depend on the 800-pound gorilla can hardly complain when it falls on them. Mark From ravage at ssz.com Thu Feb 5 08:41:09 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 00:41:09 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802051634.KAA02262@einstein.ssz.com> Forwarded message: > Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST) > From: mark at unicorn.com > Subject: Re: the best justice money can buy --Lessig > Of course there's a free-market remedy for Microsoft; eliminate copyright. If > anyone can copy Microsoft software for free, it would be forced to compete > on real benefits rather than installed base. If there were no copyright nobody would have any reason to market software or much else for that matter. I would predict that much of the technology and infrastructure we have now wouldn't exist. It would also stiffle creativity and new methodologies because there would be no profit in it to recoup development costs. Those who would survive in such a market would be the 800-lb gorillas because only they would have the resources to squash the smaller companies. Free markets monopolize. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From jim.burnes at ssds.com Thu Feb 5 08:46:43 1998 From: jim.burnes at ssds.com (Jim Burnes) Date: Fri, 6 Feb 1998 00:46:43 +0800 Subject: Fingerprinting in CA In-Reply-To: <19980205.000739.attila@hun.org> Message-ID: <34D9EBBB.EF470B19@ssds.com> Attila T. Hun wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > > on or about 980203:2223, in <199802040323.WAA16673 at panix2.panix.com>, > Information Security was purported to have > expostulated to perpetuate an opinion: > > > How did you CA cypherpunks feel about being fingerprinted? > > well, I would have gone up to Nevada to get a license, but they > have been doing it longer than CA. now Utah is doing it.... > it will be universal before long. when I asked in CA if I could > refuse to be fingerprinted, they said; "sure... as long as you > dont want a license" --real white of 'em. Utah said basically > the same thing. > If your interested in this problem, I believe that the Georgia wing of the EFF is mounting a campaign against fingerprinting on driver's licenses. Can't remember the URL for it though... jim burnes From sunder at brainlink.com Thu Feb 5 08:53:33 1998 From: sunder at brainlink.com (sunder) Date: Fri, 6 Feb 1998 00:53:33 +0800 Subject: Changing to Moderated Cypherpunks -- How? In-Reply-To: <199802050343.DAA46984@out5.ibm.net> Message-ID: <34D9E920.7BF3739B@brainlink.com> James F. Marshall wrote: > Too much noise in the unedited list. > How does one change to the moderated list? Hi there, as requested, here's some info about the filtered cypherpunks list which I run (by hand with the help of a couple of mailbots) This list is NOW running from: sunder at sundernet.com GZIPped versions of the digests are available from: http://www.sundernet.com/fdigest.html Basically, I use the 'bots to keep the list of recipients, then forward any message to this list of usernames which I find interesting, and usually noise-free... Since, I do this by hand, AND since there is no majordomo mailing list software, and since I get a lot of mail, it's a good idea to make sure the subject of any messages you send to me stand out. i.e. make the subject line: "***000 Personal junk mail for the human, not the bots ***" (The 0's are there to make sure that when Pine sorts the messages on this side, they come up on top, making sure I'll see them immediatly.) There is no automated filtering of any sort... Whatever message I find to be interesting, news-worthy, or technical (theoretical crypto, actual code, etc) gets handed over to the bots, which send it to this list. If you use some sort of filtering program to move messages to a folder, look for the string "FCPUNX:" (without quotes) in the subject field. There will usually be a propagation delay of one day to a week days - sometimes as long as two weeks between the messages on the actual cypherpunks list, and this filtered one. This is because I may not always get the chance to log in every day, and also because I may have to wade through tons of noise/spam/flames from the real list. :-) Occasionally, if I see something interesting from another list (such as Cyber Rights, coderpunks, etc) I will forward it here if I feel that it pertains to Cypherpunk interests, or that you'd like to see it. You should unsubscribe yourself from the real list by sending an "unsubscribe cypherpunks" message to majordomo at toad.com - that is send a message with no subject and just that single line - no signature either, so as to unsubscribe. - Unless you wish to continue to receive messages from the real list as well as copies of those messages from here. :-) All filtering is again according to my whims so if you dislike what I send you, sorry. I might eventually work something out where this list will be broken up into many tiny lists so you'd subscribe to whatever subjects you're interested in. This is a free service, no strings attached, just tons o'mail, but less mail than the unfiltered list... Also note that the bots I run may sometimes be slightly buggy and may do unexpected weird things. Appologies in advance if this happens. But please by all means do report any such runaway bot occurances. If you wish to unsubscribe yourself from this list, just send a message with the subject "unsubscribe fcpunx" (no quotes) and the next time I log in, one of the bots will handle the ubsubscribe. You can re-subscribe yourself as many times as you like, you'll only get one copy of each message, but as many copies of the request response as you've sent.The 'bots hone in on your address and send mail only there, so subscribe yourself from whatever account you want to receive mail. If by accident you subscribe from two different machines, the bots won't know the difference and you'll get two copies of each filtered message, so be careful. This also means that you can only unsubscribe yourself from the same address you subscribed from. To get help, send a message with the subject "help fcpunx." To subscribe yourself (if you see this, you are subscribed) send a message with the *SUBJECT* "subscribe fcpunx" NOTE: THE BOTS ONLY RESPOND TO THE SUBJECT LINE, NOT TO TEXT IN THE BODY OF YOUR MESSAGE! The bots only look at your message's subject and your mailing address so it doesn't matter what you put in the body. Whenever the 'bots honor a request from you, you'll see a response mailed from them (under my name.) Since the bots are only active when I log in and run them by hand, the message acknowledging your request may take several days to get to you. *ALL COMMANDS MUST BE SENT IN THE SUBJECT OF THE MESSAGE! The body (text) of the message are ignored. Commands available: subscribe fcpunx - subscribes you to the list and you are visible to fcpunx who requests subscribe invisible fcpunx - subscribe but don't let others know digest fcpunx - receive the digest version (visibly) digest invisible fcpunx - receive the digest invisibly unsubscribe fcpunx - unsubscribe from the list or digest undigest fcpunx who fcpunx - receive a list of (visible) subscribed users * THIS IS DISABLED CURRENTLY FOR PRIVACY PROTECTIONS OF THE SUBSCRIBERS ON THIS LIST * help fcpunx - sends a help file (you're looking at it) If you're already subscribed to the list and want to switch to the digest version, you can do this by sending a digest fcpunx message; the reverse is also true. Notice that you cannot subscribe to both the digest and the list. Sorry. If you'd like that feature either use two different accounts to receive them, or complain to me and I'll add it in. The unsubscribe and undigest commands do the same thing, they take you off the list no matter which version you're subscribed to. Note: I do not claim any responsability for the content, fitness to a purpose or usefulness of any of the messages forwarded to, archived to, or stored on this web site. The responsability of these messages lies solely on the shoulders of their respective authors. No attempt is made at censoring this information for or from a legal standpoint. This information is relayed to you as an expression of the First Amendment of the Constitution of the United States of America. Certain restrictions may apply depending on your locale, the political nature of your respective governments, etc. Any copyrighted information forwarded by this filtering service is the property of its owners and/or creators. The original senders of these messages are responsible for their content, etc. This filtering services disclaims all such responsability. Should you take offense to any of the messages forwarded by this service, take it up with the original posters of the messages. You may also unsubscribe from this service. Subscription to this filtering services means acceptance to these terms and disclaimers. ============================================================================= + ^ + | Ray Arachelian |FL| KAOS KERAUNOS KYBERNETOS |==/|\== \|/ |sunder at brainlink.com|UL|__Nothing_is_true,_all_is_permitted!_|=/\|/\= <--+-->| ------------------ |CG|What part of 'Congress shall make no |=\/|\/= /|\ | Just Say "No" to |KA|law abridging the freedom of speech' |==\|/== + v + | Janet Reno & GAK |AK| do you not understand? |======= ===================http://www.brainlink.org/~sunder/========================= ActiveX! ActiveX! Format Hard drive? Just say yes! From eureka at eureka.abc-web.com Fri Feb 6 01:39:29 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Fri, 6 Feb 1998 01:39:29 -0800 (PST) Subject: Eureka! Fri Feb 6 '98 Message-ID: <19980206082121.11843.qmail@eureka.abc-web.com> Welcome to Friday's issue of Eureka! PLAYGAL This is truly a breathtaking site. Well-designed and easy to use with excellent content. The tour alone has hotter porn than many other 'free' sites - go see it now. It's explicit, comprehensive and top quality. There are 2,000 video feeds online, free live fucking with sound, 10,000 erotic stories, 1,000s of top quality pix, adult and arcade games, real ama- teur competitions and much more. Click now and be astounded! Playgal --> http://www.playgal.com/playgal/banner_email.html Ultra Hardcore -FREE XXX Samples - We push the limit of legal pictures! http://www.ultrahardcore.com/ultracash/ultracash.cgi?eureka2 Get FREE XXX Samples from *ultrahardcore.com*. We have exclusive Max Hardcore pictures - that's right - Fisting, Spread Assholes, Cum Shots and more. *NEW* Get live fucking with Sound! Even get to see live bizarre stuff like live PISSING shows! We have it all!!!! NYCBBS ADULT EMPORIUM'S Over 200 free pix all clearly listed with text descriptions! Such as, w ould you let a chubby amateur suck your cock, or you can ride me tonight! You name it, it's in here. You will be glad you stopped by. Don't miss this one. Cruise on by! Nycbbs Adult .......... http://www.nycbbs.com/adult/picpost/ 69 FREE PICS No I did not count them, but the number sounds good. There are some pictures from a strip show showing some really hot babes with whipped cream all over their boobs. Super tight bodies with neatly trimmed pussies. Have a beer and maybe you will feel like your over at a hot Canadian strip club? 69 Free Pics .................... http://www.69freepics.com/ ANAL DESIRES This is a paysite. They do give you a few free pictures to entice you to join in the fun. Up the butt with one or two cocks is the flavor here! Major butt action! You have to see this one image of this pussy. Major labia in a big way! Anal Desires .................... http://web.wa.net/~plunge/ GALAXSHE Cool website featuring five free galleries of hot looking ladies. There is great tits, long legs and high heels, all spread wide. Just the way we like it! The images load fast and are all thumbnailed for quick access. Take a look at it! Galaxshe .......................... http://www.galaxshe.com/ #READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! #$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A # HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Bizarre ----------------------> http://204.244.215.7/teens2/ CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Katie: A alluring blonde with a penchant for dildos, this young gal is seductive! Bold and petite, this sexy little girl knows what men & women want. She loves to please, and to be pleased. This gal is the kind of girl Bill Clinton would want to have as an intern! Visit her now and get off! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY Very Sexy Erotic Stories: Ready for lots of hot, free sex stories? Look no further than Very Sexy Erotic Stories. All different subjects, all free. ..... http://www.verysexy.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?060 Pic 2 --------------------------> http://137.39.63.229/?061 Pic 3 --------------------------> http://137.39.63.229/?062 Pic 4 --------------------------> http://137.39.63.229/?063 Pic 5 --------------------------> http://137.39.63.229/?064 Pic 6 --------------------------> http://137.39.63.229/?065 Pic 7 --------------------------> http://137.39.63.229/?066 Pic 8 --------------------------> http://137.39.63.229/?067 Pic 9 --------------------------> http://137.39.63.229/?068 Pic 10 --------------------------> http://137.39.63.229/?069 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From jim.burnes at ssds.com Thu Feb 5 13:49:32 1998 From: jim.burnes at ssds.com (Jim Burnes) Date: Fri, 6 Feb 1998 05:49:32 +0800 Subject: the best justice/kinds of monopolies In-Reply-To: <199802051634.KAA02262@einstein.ssz.com> Message-ID: <34DA3157.1FF4FA7A@ssds.com> Jim Choate wrote: > > Forwarded message: > > > Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST) > > From: mark at unicorn.com > > Subject: Re: the best justice money can buy --Lessig > > > Of course there's a free-market remedy for Microsoft; eliminate copyright. If > > anyone can copy Microsoft software for free, it would be forced to compete > > on real benefits rather than installed base. > > If there were no copyright nobody would have any reason to market software > or much else for that matter. I would predict that much of the technology > and infrastructure we have now wouldn't exist. Thats pretty obvious. I'm usually the last person to defend Microsoft, but cancelling copyright is throwing the baby out with the proverbial bathwater. There are a couple of obvious free market solutions. The first that comes to mind is to stop buying Microsoft product. This needs to be restated because even though obvious, it has a number of important follow-on conclusions. (1) There are other usable operating systems. (linux, mac-os, os/2) (2) There are other usable applications. (applix, macwrite?, whatever) Why won't people stop buying microsoft product? (1) FUD helped along by a microsoft reality-altering marketing budget (2) The *applications* they write are sometimes quite usable. (3) Their applications only work on *their* OS (mostly)? Why is that? (4) Their OS, even considering its questionable quality has, until this point, hornswaggled a bunch of developers because its the *defacto* desktop applications API. Why that is the case is probably a topic for endless speculation -- though it probably comes down to some version of the "stack 'em deep and sell 'em cheap" philosophy -- something that Apple still hasn't learned. (5) ...and most importantly of all...it hasn't become painfull enough yet to stop purchasing Microsoft software. > > Free markets monopolize. > Hmmm. Thats a rather sweeping generalization. Perhaps it would be more enlightening to discuss the nature of monopolies. It is rarely possible to enforce a monopoly that isn't a natural monopoly. A company will tend to keep a lion's share of the market as long as continued investment in more efficient production gives them greater market share -- bringing you cheaper goods and larger quantities of them. At that point nobody cares because quality goods are being sold as low prices. When that breaks down all natural monopolies start to crumble or revert to their previous market share. Having said that, let me follow it with a big "all other things being equal". One of the reasons NT became popular is because they priced their NT server not "by the client" as Novell used to, but at a flat-price (if memory serves -- which it is doing more infrequently these days ;-) In doing so Novell's market share took a serious hit. To some extent I say good riddance. Novell server's IMOHO suck as a server architecture (not to mention truly horrible and snotty tech support). Novell didn't react quickly enough and lost tremendous market share. Are we suggesting that Novell be protected by the US Justice Department? I certainly hope not. You are welcome to go back to those days. The only other kinds of monopolies are cartels, and government enforced monopolies of both the public and private kind (the latter being the most heinous). Cartels always collapse because one of the partners will eventually see the increasing profits to be made by breaking the cartel. When this happens the company that breaks the cartel is the winner and the last one to leave the cartel may well collapse financially. If members of a Cartel get together and use guns to prevent the breakup of the cartel then that is a lot more like a government enforced private monopoly -- bad news. Government-enforced public monopolies like the US Post office and public education are wasteful, out of touch with their markets (because of the lack of competitive price feedback) and thus inefficient. They have no valid function in a free society and are a waste of taxpayer dollars. The USPS will tell you that everything is hunky-dory because they don't use taxpayer dollars. What they don't tell you is that the difference between the price you pay for their stamps and what you would in a free market is your tax. (this and the strange tendency of workers to "go postal" -- you rarely hear about FedEX employees going on an AK47 rampage, must be the water ;-) Goverment-enforced private monopolies teeter dangerously close to the pure definition of fascism. Fascism, from the latin "fascia" means "to bind together" (perhaps you remember the "fascia" tissue from high-school biology class during dissection of frogs, cats and other unlucky animals). In this case they bind a force monopoly with a yet-to-be-named monopoly. Classic examples of Fascism^h^h^h^h^h^h^h government enforced-private-monopolies in the US are the Federal Reserve System, the AMA, and the local Bar associations. Why is this? All these monopolies depend on FUD and govt to enforce their services. "What would happen if we didn't regulate xyz is that all hell would break loose and many people would lead lives of horrible desperation. 'There oughta be a law!' etc...blah blah..." You know the drill. Now that we have a perspective on monopolies, perhaps we can take a look a microsoft. Microsoft is not a force monopoly (usually), its not run by the government (thank god), it doesn't appear to be a cartel (usually) so unless further information comes in it looks like a natural monopoly. What does it take to undo a natural monoply? Build something cheaper, better and more reliable. Its just possible (and this might be a stretch, but only by a little) that Linux, Free Netscape Sources, Java etc might acheive this. Certainly Apache is more popular than any other webserver. How you come up with a new product in this type of market without M$ "re-inventing it" and giving it away is anyone's guess. (1) Hope that Linux/Scape/Java/KDE do something big (2) Write a Win95/NT compatible operating system that is faster and cheaper. If you can clone a Pentium, you can clone Windoze. (visions of a QNX like OS with Win32 API dance in my head). A GPL'd VSTa-based Win32 OS would be pretty amazing. This would be necessary because games are a big market and the Linux kernel just doesn't have what it takes to do realtime without a major hack. How about VSTa/a free DOS emulator/Wine. If Sun would fund this effort it could take a lot of wind out of M$ sails. Probably more than Java. McNeally would have to hop down from his high-horse. When will this happen? When the market gets tired of M$ practices and some lucky competitor comes to the fore. Until then there is no devine right to a percentage of the operating system market share. We can only code and hope. (donning flame retardant vest) jim burnes From ravage at ssz.com Thu Feb 5 16:20:43 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 08:20:43 +0800 Subject: Feds warm spammers [CNN] Message-ID: <199802060018.SAA03566@einstein.ssz.com> Forwarded message: > FEDS WARN SUSPECTED E-MAIL SCAMMERS > > graphic February 5, 1998 > Web posted at: 6:51 p.m. EST (2351 GMT) > > WASHINGTON (AP) -- The Federal Trade Commission and postal > inspectors have issued more than 1,000 warnings to businesses > suspected of sending illegal junk mail and operating shady > moneymaking schemes over the Internet. [text deleted] ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dlv at bwalk.dm.com Thu Feb 5 17:16:38 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Fri, 6 Feb 1998 09:16:38 +0800 Subject: the best justice money can buy --Lessig (fwd) In-Reply-To: <199802051634.KAA02262@einstein.ssz.com> Message-ID: Jim Choate writes: > > Forwarded message: > > > Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST) > > From: mark at unicorn.com > > Subject: Re: the best justice money can buy --Lessig > > > Of course there's a free-market remedy for Microsoft; eliminate copyright. > > anyone can copy Microsoft software for free, it would be forced to compete > > on real benefits rather than installed base. > > If there were no copyright nobody would have any reason to market software > or much else for that matter. I would predict that much of the technology > and infrastructure we have now wouldn't exist. It would also stiffle > creativity and new methodologies because there would be no profit in it to > recoup development costs. Those who would survive in such a market would be > the 800-lb gorillas because only they would have the resources to squash the > smaller companies. Software development seems to be thriving in countries that aren't very keen on enforcing copyright laws - do you care to explain why? > > Free markets monopolize. Hmm... There's no copyright on perfumes. There are market leaders in perfumes, but no monopoly; hardly even an olygopoly. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From dlv at bwalk.dm.com Thu Feb 5 17:17:46 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Fri, 6 Feb 1998 09:17:46 +0800 Subject: Changing to Moderated Cypherpunks -- How? In-Reply-To: <199802051047.KAA01376@server.eternity.org> Message-ID: Adam Back writes: > > Information Security > > I'd be glad to handle it. > > > > The only criteria is to delete Dr. Dim and his nyms. > > How are you going to recognize Dimitri's nyms if he has any. Guy Polis thinks that anyone smarter than him (and that's 99.99% of the population) is my tentacle. He thinks everything on this list except him and Timmy May is my tentacle, including you too, Adam. Guy Polis (guy at panix.com, eviljay at bway.net) is a pedophile child molester who was fired from his consulting position at Salomon Brothers after he was caught masturbating in his cubicle at the child pornography JPEGs that he downloaded from the Internet. In retaliation, Guy Polis spammed the firewalls mailing list with megabytes of e-mail logs that he "intercepted" at Salomon Brothers, and accused several of his former co-workers and supervisors of various crimes. As far as I can determine, Guy Polis has been unemployed since the time he was fired from Salomon. If anyone knows otherwise, please let me know. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From ravage at ssz.com Thu Feb 5 17:57:31 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 09:57:31 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802060155.TAA03984@einstein.ssz.com> Forwarded message: > Subject: Re: the best justice money can buy --Lessig (fwd) > From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) > Date: Thu, 05 Feb 98 16:26:45 EST > > > Of course there's a free-market remedy for Microsoft; eliminate copyright. > > > anyone can copy Microsoft software for free, it would be forced to compete > > > on real benefits rather than installed base. > > > > If there were no copyright nobody would have any reason to market software > > or much else for that matter. I would predict that much of the technology > > and infrastructure we have now wouldn't exist. It would also stiffle > > creativity and new methodologies because there would be no profit in it to > > recoup development costs. Those who would survive in such a market would be > > the 800-lb gorillas because only they would have the resources to squash the > > smaller companies. > > Software development seems to be thriving in countries that aren't very keen > on enforcing copyright laws - do you care to explain why? Oh yeah... Software development is a long way from selling software, not the same animal at all. I mean when I go down to the dozen computer stores within a mile or so of my house I am truly deluged by software from countries outside of the US and Canada. I mean we have all heard of the Indian and Bulgarian software billionares haven't we? And all those folks in Turkey just rolling in cash... Further, who do the majority of these folks who actualy make a reasonable living work for either directly or under contract? Large US and Eurpean countries thats who. That's why those folks can make a living developing (not selling) software. > > Free markets monopolize. > Hmm... There's no copyright on perfumes. There are market leaders in perfumes, > but no monopoly; hardly even an olygopoly. I can tell how often you buy perfume, the ones I buy for my girlfriend certainly have a little 'c' on them... And as to the number of companies that are actualy developing perfume versus reselling it under their own house brands...there might be a couple dozen succesful (say stay in business more than 5 years) in the whole world and I would go so far as to hypothesize that if one were motivated to plot the number of companies per year over the last say 50 years you would see the number go *down*. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dean at intergal.com Fri Feb 6 10:34:42 1998 From: dean at intergal.com (dean at intergal.com) Date: Fri, 6 Feb 1998 10:34:42 -0800 (PST) Subject: Major Launch Message-ID: <199802051301.IAA03296@modelsincorporated.com> THIS EMAIL IS INTENDED FOR ADULT WEBMASTERS WHO HAVE SIGNED UP FOR OUR MAILING LIST Hi from Dean at Playgal, I have sent this email to advise you of a major change and opportunity. As you may be aware both Intertain ( the nets first paysite ) and Playgal have formed a partnership. Together we form one of the largest adult networks on the Internet - our newly formed operation is Intergal. We have now combined our click through programs and launched the new Intergal advertising programs. We have a unique hit based click through which will guarantee a minimum payout http://www.intergal.com/nfa and offers huge conversion rate bonuses which means you can earn up to $5 a unique hit. Or we have the no frills NO FUCKING ABOUT campaign IN THE RAW - the click through which pays you 5.5 cents a raw hit - no conversion rates, just good old RAW hits. http://www.intergal.com/nfa/nfa.html You can select from our banner farm or use your own banners - we allow text links. It is up to you to send us as much traffic as possible - we encourage you to do it. Please feel free to use any marketing initiative you wish to maximize traffic sent to our sites - we understand the fact that you know your sites better than us . ( virtually the only thing we dont approve of is cheating ). We have one of the highest raw hit counts of any click through on the net - undisputed. We dont filter hits ! A great suppliment to your Intergal program is to advertise the nets newest and freshest site http://www.unfaithful.com you can sign up for the click through at http://www.unfaithful.com/easycash . Thanks for taking the time to read our announcement i have outlined below some services available to adult webmasters. Paysite Operators We have a few deals for you and offers for you. It will be worthwhile your time reading below. 1. FREE VIDEO FEEDS 10 rotating feeds an hour - 240 new feeds a day for FREE Check it out at http://www.virtualgirlz.com or for Gay go to http://www.virtualgirlz.com/freeholio/gay.html (YOU CAN EVEN PUT IT IN A FRAME!!!) and it works with AOL , IE and Netscape to sign up for free for 240 Free feeds each day. Go to: http://www.zanepix.com/240free.html 2. PASSWORD PROTECTOR Does your site get hit with password traders - we have the solution - if you run a unix operating system then you can stop password sites crashing your servers. The answer is Pennywize and it is only 99.95 - if you have a password posted on a big password site it will cost you much more than that in bandwidth. http://www.pennywize.com . Download it now - free tech support always available and you get all future updates. The best thing is it is so easy to install. 3. FREE TRAFFIC TO YOUR SITE AND GROWING EVERYDAY - NO LINK BANK REQUIRED Sign up for this today - surfers dont leave your site but you will get traffic back every day in return. http://eureka.abc-web.com/eureka/ This is the most innovative product to hit adult webmasters in years. 4. More Free Traffic Intergal have just recently bought Picturepost http://www.picturepost.com - it is ranked at number 7 on websidestory with about 90,000 uniques a day . Add a picture post text link to your front page and you are eligible to submitt a pic and get back about 10,000 hits in a week - for FREE. 5. We also highly recommend some of our feed suppliers 1. http://www.ibroadcast.net email - joey at ibroadcast.net and add 1,300 feeds to your site 2. http://www.megahardcore.com email andy at wd.com and add streaming videos with sound and they have a fantastic new virtual world package available. 3. Live fucking with sound email opm at pusi.com 4. 1,200 searchable feeds email davidk at xtv.com works with AOL , IE and Netscape 6. For cc processing we have had a very successful relationship with Ibill http://www.ibill.com or email the VP kmiller at ibill.com 7. For bandwidth we thoroughly recommend exodus.net contact jennifer at exodus.net for special attention and pricing. If you have received this email in error please put remove in the subject field and reply. Thanks for your time and for supporting our group of sites. regards Dean From honig at otc.net Fri Feb 6 10:39:13 1998 From: honig at otc.net (David Honig) Date: Fri, 6 Feb 1998 10:39:13 -0800 (PST) Subject: "The Internet needs a chastity chip." ---James Traficant, Dem-Ohio Message-ID: <3.0.5.32.19980206104015.00794d50@otc.net> http://www.yahoo.com/headlines/980206/wired/stories/cybersex_1.html Friday February 6 10:07 AM EST Lawmaker warns of cybersex "pregnancy danger" WASHINGTON (Reuters) - Citing the case of a woman who claims she got pregnant from e-mail, an Ohio Democrat called Wednesday for a "chastity chip" for the Internet. Rep. James Traficant, known for his flamboyant rhetoric, gave a brief floor speech about a woman named Frances who claimed to have gotten pregnant through an e-mail exchange with a paramour 1,500 miles away. "That's right -- pregnant," the Congressman proclaimed, warning of the dangers of "immaculate reception." He called on Congress to go beyond "v-chips" that would protect kids from sexual content on the Internet, saying: "Its time for Congress to act. The computers do not need a v-chip. The Internet needs a chastity chip." Although Traficant did not say whether he believed the woman's account, he did say it was "enough to crash your hard drive." ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Lewinsky for President '2012 From mail at reba.com Thu Feb 5 19:20:00 1998 From: mail at reba.com (mail) Date: Fri, 6 Feb 1998 11:20:00 +0800 Subject: RebaNews Message-ID: <199802060306.WAA00901@www.video-collage.com> Reba will join Rosie O'Donnell as her special co-host February 16, as The Rosie O'Donnell Show continues its broadcasts from Los Angeles. In addition to pulling co-hosting duties, Reba will also perform "What If," her tribute song to the Salvation Army. Fresh off her wins at both the Peoples Choice Awards (which she hosted and won Favorite Female Musical Performer) and the American Music Awards (Favorite Female Country Artist), the February 16th appearance marks the second time Reba has appeared on The Rosie O'Donnell Show. Later this month, Reba will begin work on the CBS-TV movie, "Forever and Always," tentatively scheduled to air in May. From ravage at ssz.com Thu Feb 5 20:12:57 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 12:12:57 +0800 Subject: Free-market monopolization features... Message-ID: <199802060335.VAA04271@einstein.ssz.com> Hi, This is the theory in its current working version: An unregulated (free-market) economy will inherently monopolize when, but not necessarily only if, the following are present: - the market is saturated, in other words the number of consumers at any given time are equal to or less than the service providers ability to provide that service (or resource). This means the long-term survival of firms is a function of retained market share and raw resource share control/ownership. - the technology and/or start-up costs are high in material and intellectual factors. This minimizes the potential for new providers to start up. Providers will also require non-disclosure and other mechanisms to reduce sharing of information and cross-communications except under controlled conditions. Expect an increase in certifications and implimentation standards required to do business with the more succesful of these providers. - an individual or small group of service providers have a small but distinct efficiency advantage in technology, manufacturing, or marketing. Over a long-enough time this market advantage will grow and as a result widen the 'technology gap' between firms. - expect the most efficient firms to share their profit with the critical intellectual contributors. This further reduces the problem of cross-communication and new provider start-up. - expect to see the more successful providers to join in co-ops with the less succesful providers. This will be under the surreptitous goal of 'developing technology'. It's actual goal will be to cause these smaller firms to commit resources to such enterprises. As soon as it is strategicaly advantagous the primary providers will break-off the co-op. This has the effect of further reducing the ability of the smaller providers to react in a timely manner to market changes or develop new technology due to resource starvation. - expect to see the less efficient providers to combine in an effort to reap the benefits of shared market share and resources. Unless this partnering provides a more efficient model and there is sufficient time for that efficiency to develop these new providers will eventualy fail or be joined with other providers. - expect to see the primary provider buy those less efficient providers that don't fail completely. These purchases will be as a result of some new or unexpected technology that will significantly increase the market share of the primary provider -or- it will be with the goal of eliminating this secondary technology and forcing those market shares to do without or use the primary providers technology. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Thu Feb 5 20:36:48 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 12:36:48 +0800 Subject: Free-market monopolization features... (fwd) Message-ID: <199802060436.WAA04618@einstein.ssz.com> Hi, I left one out... Forwarded message: > From: Jim Choate > Subject: Free-market monopolization features... > Date: Thu, 5 Feb 1998 21:35:16 -0600 (CST) > An unregulated (free-market) economy will inherently monopolize when, but > not necessarily only if, the following are present: - initialy prices for services will be low to promote purchasing but as providers obtain larger market shares their prices will increase over time and out of step with inflation and other market forces in order to widen the profit gap. The strategy is one of 'use it or starve'. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Thu Feb 5 20:45:14 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 12:45:14 +0800 Subject: New Credit Rating System Coming [CNN] Message-ID: <199802060405.WAA04465@einstein.ssz.com> Forwarded message: > NEW CREDIT RATING SYSTEM ON HORIZON > > graphic February 5, 1998 > Web posted at: 2:38 p.m. EST (1938 GMT) > > NEW YORK (AP) -- Within months, retailers will be able to use a new > computerized credit-rating system to decide not only whether they'll > take your check or debit card, but how big a check you can write. > > Banks will be able to use the system to determine whether they will > let you open a checking account, and what kind of fees you will pay. > > Deluxe Corp., the nation's biggest check printer, has joined Fair, > Isaac & Co., a credit scoring company, and Acxiom Corp., a data > warehouse, to create the system for rating a merchant's risk of > accepting checks and debit cards. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From attila at hun.org Thu Feb 5 21:24:02 1998 From: attila at hun.org (Attila T. Hun) Date: Fri, 6 Feb 1998 13:24:02 +0800 Subject: New Credit Rating System Coming [CNN] In-Reply-To: <199802060405.WAA04465@einstein.ssz.com> Message-ID: <19980206.045903.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980205:2205, in <199802060405.WAA04465 at einstein.ssz.com>, Jim Choate was purported to have expostulated to perpetuate an opinion: > NEW CREDIT RATING SYSTEM ON HORIZON > > graphic February 5, 1998 > Web posted at: 2:38 p.m. EST (1938 GMT) > > NEW YORK (AP) -- Within months, retailers will be able to use a new > computerized credit-rating system to decide not only whether they'll > take your check or debit card, but how big a check you can write. > > Banks will be able to use the system to determine whether they will > let you open a checking account, and what kind of fees you will pay. > > Deluxe Corp., the nation's biggest check printer, has joined Fair, > Isaac & Co., a credit scoring company, and Acxiom Corp., a data > warehouse, to create the system for rating a merchant's risk of > accepting checks and debit cards. > so where is the First Virtual Bank of Cyberspace? let's get crackin' basically, this says I can not write a check against an available balance that has not been overnight posted. when TTI (transaction technology), a CitiBank division in Santa Monica, started working on the ATM implementations in the mid-70, all the last, bad crop of hired guns were contracting --they were paying 50-80/hr _then_ for high end --we all took there money and speculated that eventually there a) would be no cash; and b) checks would be castrated --or, if you did not have plastic, you did not eat as big brother wanted to know what you had for dinner-- yup, sounds just like cybercredits --except for the audit trail fed directly to the IRS who precomputed your tax for you-- and took it out of your account with or without your permission. well, how close are we getting to what those of us working on it in the mid-70s feared? -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNqbr7R8UA6T6u61AQGscAH/cDmpNgdaMuZAdB+bBZRXzz5EjM40RhBD wgolht1512aKcXCfXv0LmNbsIPwv6fFCKpldrMyFag0RRdgt+qslUQ== =UvQI -----END PGP SIGNATURE----- From attila at hun.org Thu Feb 5 21:44:09 1998 From: attila at hun.org (Attila T. Hun) Date: Fri, 6 Feb 1998 13:44:09 +0800 Subject: the best justice/kinds of monopolies In-Reply-To: <34DA3157.1FF4FA7A@ssds.com> Message-ID: <19980206.052451.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980205:1438, in <34DA3157.1FF4FA7A at ssds.com>, Jim Burnes was purported to have expostulated to perpetuate an opinion: >Jim Choate wrote: >> >> Forwarded message: >> >> > Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST) >> > From: mark at unicorn.com >> > Subject: Re: the best justice money can buy --Lessig >> [snip] >so unless further information comes in it looks like a >natural monopoly. What does it take to undo a natural monoply? >Build something cheaper, better and more reliable. >Its just possible (and this might be a stretch, but only by a little) >that Linux, Free Netscape Sources, Java etc might acheive this. >Certainly Apache is more popular than any other webserver. >How you come up with a new product in this type of market without >M$ "re-inventing it" and giving it away is anyone's guess. >(1) Hope that Linux/Scape/Java/KDE do something big >(2) Write a Win95/NT compatible operating system that is > faster and cheaper. If you can clone a Pentium, you > can clone Windoze. (visions of a QNX like OS with Win32 > API dance in my head). A GPL'd VSTa-based Win32 OS > would be pretty amazing. This would be necessary because > games are a big market and the Linux kernel just doesn't > have what it takes to do realtime without a major hack. > How about VSTa/a free DOS emulator/Wine. If Sun would > fund this effort it could take a lot of wind out of > M$ sails. Probably more than Java. McNeally would have > to hop down from his high-horse. > When will this happen? When the market gets tired of > M$ practices and some lucky competitor comes to the > fore. Until then there is no devine right to a percentage > of the operating system market share. >We can only code and hope. >(donning flame retardant vest) >jim burnes dont need a flame retardent vest for my direction. I agree in theory that all it takes is a better product --unless the 800 lb gorilla steals it, borrows it, whatever and puts it out for free which they have been know to do on more than one occasion. and, the fact M$ has such enormous leverage in the market to command the pole position for any product they promote (even vapourware), is why society does have a responsibility to its members to level the playing field. until the sheeple stop following the Judas to the Micro$lop slaughter house, the law must finally step in and break it up --or as Orrin Hatch said: "if M$ does monopolize the net, look for an "Federal Internet Commission" --using the law to surgically dismember M$ into logical divisions is one thing --living with another regulatory commission is another, and certainly not very "tasty". -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNqhIrR8UA6T6u61AQErYgIAlBOGfnn/R9IuZD42Yl2hRb2amKY8049s bLaD3SdJd4ulqoTkvl/UiM3hF6vhs3bbe0N1PN4xpZrgW5GxSCoGPA== =B0dD -----END PGP SIGNATURE----- From wombat at mcfeely.bsfs.org Thu Feb 5 22:12:25 1998 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Fri, 6 Feb 1998 14:12:25 +0800 Subject: the best justice money can buy --Lessig (fwd) In-Reply-To: Message-ID: On Thu, 5 Feb 1998, Dr.Dimitri Vulis KOTM wrote: > Jim Choate writes: > > > > > Forwarded message: > > > > > Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST) > > > From: mark at unicorn.com > > > Subject: Re: the best justice money can buy --Lessig > > > > > Of course there's a free-market remedy for Microsoft; eliminate copyright. > > > anyone can copy Microsoft software for free, it would be forced to compete > > > on real benefits rather than installed base. > > > > If there were no copyright nobody would have any reason to market software > > or much else for that matter. I would predict that much of the technology [SNIP] > > Software development seems to be thriving in countries that aren't very keen > on enforcing copyright laws - do you care to explain why? Would you care to explain where? There's a big difference between a "flourishing" market for custom, in-house-only software (especially in a language that is not high on the list for US developers), and a commercial software market consisting of widely distributed applications. The in-house stuff doesn't need copyright protection; it's never allowed out, and even if it were, what are the odds it could be used by others without access to source code? Custom software is more a matter of selling a service than a "product", and it's a lot harder to "bootleg" services. What software products can you come up with that have the same level of market penetration as those engineered in the US or Canada? How many of those are from nations that do not honor copyright? > > > > Free markets monopolize. > Hmm... There's no copyright on perfumes. There are market leaders in perfumes, > but no monopoly; hardly even an olygopoly. > That's because the primary product is the image built by advertising, not the scent which is often fairly accurately duplicated (not that I'd know - my favorite scent is hallertau). One of my professors defined advertising as "creating demand for that which is inherently worthless." From WebWarrior3 at InfoWar.Com Thu Feb 5 22:31:06 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Fri, 6 Feb 1998 14:31:06 +0800 Subject: RE Fingerprints and EF Georgia Message-ID: <34DAABBC.3BCF1ED5@InfoWar.Com> Yup, EF-Georgia http://www.efga.org has had an ongoing project dealing with fingerprinting for DL's This is in reply to Jim Burns' post: "If your interested in this problem, I believe that the Georgia wing of the EFF is mounting a campaign against fingerprinting on driver's licenses. Can't remember the URL for it though..." EF Georgia has consistantly had some mighty fine information on their mail list, still on topic too for the most part. Scott R. Brower Electronic Frontiers Florida http://www.efflorida.org BTW...neither EFGA nor EFFlorida, or as far as I know, any other EF group... is affiliated with EFF in any way but certain principals which bind us together in a common cause. From frantz at netcom.com Fri Feb 6 00:05:19 1998 From: frantz at netcom.com (Bill Frantz) Date: Fri, 6 Feb 1998 16:05:19 +0800 Subject: the best justice/kinds of monopolies In-Reply-To: <199802051634.KAA02262@einstein.ssz.com> Message-ID: At 1:38 PM -0800 2/5/98, in a generally right on post, Jim Burnes wrote: >(this and the strange tendency of >workers >to "go postal" -- you rarely hear about FedEX employees going on >an >AK47 rampage, must be the water ;-) No, the problem is the US Postal Service's willingness to tolerate assholes as managers. There may be an argument for pinning that on the government monopoly aspects of the USPS as well. ------------------------------------------------------------------------- Bill Frantz | Market research shows the | Periwinkle -- Consulting (408)356-8506 | average customer has one | 16345 Englewood Ave. frantz at netcom.com | teat and one testicle. | Los Gatos, CA 95032, USA From doorlist at doors.com Fri Feb 6 16:12:27 1998 From: doorlist at doors.com (doorlist at doors.com) Date: Fri, 6 Feb 1998 16:12:27 -0800 (PST) Subject: The Doors: Strange Days #3 Message-ID: <199802070010.RAA03551@quasar.fiber.net> WELCOME to The Doors Collectors Magazines Strange Days News Emailer Vol. 3 The Celebration Has Just Begun! STRANGE DAYS MEMORABILIA NEWS ITEMS: Congratulations to the five Doors Autographed Box Set winners! These Doors box sets were signed by Ray, John, and Robby on the front cover of the inside book and were given away to random people from our Strange Days Email List. The winners were: Jim Kearns (Camillus, NY), Ainslee Rogers (Hamilton, Canada), Suzie Williams (Harrogate, TN), and Barry Abbott (Ermington, Austrailia), and Laura Pritchett (Missoula, MT). This contest added over 1,000 people to our email list, so watch out for promotions similar to this in the future! The Doors Tour Equipment from our last emailer is still available. One envious person on the net is saying that these items aren't authentic... Vince Treanor (The Doors Road Manager) wanted me to pass along the message that he would be happy to talk to any prospective buyers who believe this bullshit. Call me to set up a three way call to Vince. Prospective buyers only please! Recently lots of new memorabilia items have turned up due to the release of the box set. The rest of this issue of the Strange Days News Emailer is dedicated solely to new items that are both "Wanted" and are "For Sale". If you aren�t into collecting Doors memorabilia, you still might want to read on; I�ve tried to put a little news into each entry. Enjoy! For more info about how to order, please go to: http://www.doors.com/door_mem/ STRANGE DAYS MEMORABILIA ITEMS FOR SALE: *** The Doors Albums on Postage Stamps! Late last month the island of St. Vincent issued a set of six stamps which commemorated the 30th anniversary of The Doors first LP. Never before has any country issued such a complete set of stamps to honor an artists complete catalogue of studio material before! Each stamp for each Doors album! The Doors Collectors Magazine has a number of these stamp sets available right now for $10 per sheet (eight stamps per sheet.) While supplies last we will also give you a FREE collector portfolio ($20 value) to keep your stamps in if you buy the complete set of six stamps at the same time ($60 + $4.50 s&h). For more information, please see: http://www.doors.com/door_mem/other/sv_stamp.html *** Autographed Box Sets (w/ Ray, John, and Robby�s sigs) We have a few of them available for sale at $175 plus postage. Please email first because our supply won�t last long! *** "A New Epitaph For Pere-Lachaise" Poster with poem by Jan Eloise Morris. This 24x36 poster is in its fourth year of world-wide distribution. The photograph was taken in 1968 by Doors photographer, Paul Ferrara. Jim was captured in a rare moment with sunlight falling on his shoulders in front of the Observatory in Griffith Park in Los Angeles, California. The poster's publication in 1994 marked the only time another artist's poetry has been authorized to appear with Morrison's image. Jan�s association with The Doors Collectors Magazine affords us the exclusive opportunity to offer signed, dated copies only through this web site. Price: $20 includes shipping U.S. (please add $5 for delivery outside of the U.S.) For more information, please see: http://www.doors.com/door_mem/posters/epitaph.html *** "My Eyes Have Seen You" The most visually important book on The Doors that was ever published is now available through The Doors Collectors Magazine! This limited edition book (of 1,500 copies) was put together by Jerry Prochnicky (author, Break On Through) and Joe Russo (lead singer, The Soft Parade). 150 pages of both color and B&W photos. Highly recommended! Price: $20 (plus $4.50 s&h) For more information, please see: http://www.doors.com/door_mem/books/myeyes.html *** Autographed 5" x 7" B&W Promotional Photo of The Doors signed by all four Doors: Given away to members of The Doors official fan club back in 1968. Very rare! Framed. Excellent condition. While some of these photos have been suspect to not being all they�re cracked up to be, this one comes with Doors Collectors Magazine Guarantee & Certificate of Authenticity. Price: $2,500 (plus $4.50 s&h) *** Original "Jim Morrison Film Festival" / HWY Poster Even if you don�t want (or can�t afford) this poster, you have to check it out! It is the most incredible original Jim Morrison poster ever made �and one of the rarest! This poster was folded as it was stored so it does have damage, but looks great framed even still. Price: $2,200 (plus $4.50 s&h) For more information, please see: http://www.doors.com/door_mem/posters/hwyposter.html *** An American Prayer Acetate. We have a private collection that we are offering for sale which includes test pressings of An American Prayer LP. These copies came from someone who was directly responsible for many production decisions on the An American Prayer LP release. Acetates are temporary albums good for playing only a few times that are necessary to check how the sound will be when the tape gets pressed onto the actual vinyl. There are probably only these copies for the entire An American Prayer release in existence! Both have their original Capital Records Mastering Jackets and are individually are described below: Copy #1: dated 9-20-78 Exc. Condition. One double sided album that contains all songs. Price $500 (plus $4.50 s&h) Copy #2: dated 10-13-78 Exc. Condition. A pair of two single sided albums that are missing two songs on each side. Price: $650 (plus $4.50 s&h) For a complete listing of ALL OTHER items from this same private collection, check out: http://www.doors.com/door_mem/museum/private_collection.html *** The Church of The Doors� Deadly Doorknell If you�re a hard core Doors fan you�ll remember former Church of The Doors High Mojomuck, Anthony Spurlock when he made headlines in 1992 inside Newsweek magazine. He also made news again when he single handedly thwarted off a public attack from radio station evangelist, Bob Larson. Sadly after this the church closed it�s doors forever. For years I�ve been trying to get permission to reprint these. Finally I�ve done it! You can now obtain quality reprints direct from the masters of their best (and last) two issues (Spring 1992 & Winter 1992-93) for the same $5 each (plus postage) that they originally cost. For more information on The Church, check out the new article on our website�s On-Line Magazine written back in 1993 for our first printed magazine by their High Mojomuck, Anthony Spurlock located at: http://www.doors.com/magazine/ To read more about the actual Church of the Doors fanzines (The Deadly Doorknell) go to: http://www.doors.com/door_mem/fanzines *** Oakley Krieger Band performing LIVE w/ Robby Krieger at the Whisky-A-Go-Go in Los Angeles (3-15-97) It's their complete performance on video�and what a great performance! The OK Band features Robby Krieger�s son Waylon on guitars and Berry Oakley�s son, Berry Oakley Jr. on vocals. Videotaped and produced by the OK Band, this electrifying performance is now available on video tapes that are autographed on their label by both Waylon and Berry! Price: $25 (plus $4.50 s&h) Autographed copies available at no extra charge only while supplies last! For more information, please go to: http://www.doors.com/door_mem/videos/OKBand.html *** FREE LIVE SHOW TAPE*** During the months of February & March if you mention this ad, we will give one FREE 90 minute cassette volume from our trade list with every $100 spent on Doors MEMORABILIA from our list at: http://www.doors.com/door_mem/ Or you can check out our list of LIVESHOW audio cassette tapes for trade at: http://www.doors.com/liveshow/ *** ATTENTION EUROPEAN DOORS FANS*** We now have capabilities to dub our trade videos directly in PAL at no additional trade value. *** Original hard cover copies of Wild Child by Linda Ashcroft were pulled from the shelves in the UK when it�s controversial writings were challenged in court. Linda informed The Doors Collectors Magazine that her publisher will be re-issuing an edited book in paperback form sometime in mid-June. If any of you have *hardcover copies* for sale, please email me! *** MEMORABILIA ITEMS WANTED: If you have any of these items and are interested in selling them at a reasonable price or if you have an item that you�re looking for and would like to have it included on our next "Want List", please call or email me your price or price range! I have tentative buyers for all of the following items. BOOKS WANTED "Riders On The Storm" Audio Book "Jim Morrison & The Doors" book by Mike Jahn "The American Night" Hard Cover (only) book by Jim Morrison "Wild Child" hard cover book by Linda Ashcroft All privately published editions of all three of Morrison�s poetry books LPS WANTED (Exc condition or better only) Doors: "13" LP Doors: "Absolutely Live" LP Doors: "Full Circle" LP Doors: "Other Voices" LP Doors: "Strange Days" LP (mono issue only) Doors: "The Doors" LP (mono issue only) Doors: "Waiting For The Sun" LP (mono issue only) Doors: "Weird Scenes Inside The Goldmine" LP Doors: "LA Woman" LP (original issue only) Doors: "�The Doors� movie soundtrack" LP Ray Manzarek�s "Carmina Burana" LP Ray Manzarek�s "Nite City Golden Days Diamond Nights" LP Ray Manzarek�s "Nite City" LP "Comfortable Chair" LP "Phantoms Divine Comedy" LP "Phantoms Lost Album" LP Any PROMO issued LPs for The Doors or the solo members OTHER DOORS ITEMS WANTED: 1968 Doors Tour Book All Doors Bootleg LPs and CDs Doors RIAA Gold & Platinum Awards "Tribute to Jim Morrison" Video "Dance On Fire" Video Doors Tickets or Ticket Stubs (esp. Miami �69) All Doors 45s that have Picture Sleeves (both foreign & domestic) Any Doors 8-Track Tapes (exc cond. only) OTHER NON-DOORS ITEMS WANTED: Milkwood: "How�s The Weather" LP 3-D Stereo Cameras or Projectors 3-D Stereo Cards or Slides Collectable Cameras THIS IS THE END MY FRIEND... TILL NEXT TIME! Kerry (kerry at doors.com) The Doors Collectors Magazine c/o TDM Inc PO Box 1441 Orem, UT 84059 *********** Thanks you for reading The Doors Collectors Magazine's Strange Days Email Newsletter. It is sent ONLY to subscribers. If you were subscribed by someone other than yourself and wish to be removed from our list please 1) accept our apologies and 2) return this message back to doorlist at doors.com with "REMOVE" in the subject line or go to http://www.doors.com/cgi-bin/email_list.cgi and unsubscribe. *********** From mark at unicorn.com Fri Feb 6 03:22:46 1998 From: mark at unicorn.com (mark at unicorn.com) Date: Fri, 6 Feb 1998 19:22:46 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <886763578.16480.193.133.230.33@unicorn.com> Jim Choate (ravage at ssz.com) wrote: >If there were no copyright nobody would have any reason to market software >or much else for that matter. So I presume that Linux doesn't exist[1]? And, for that matter, I make my living writing software which is given away for free... Mark [1] Yes, I'm aware the GPL uses copyright to enforce its conditions, but it's copright-free in the important sense: anyone can copy Linux and use it with no fear of black ninjas at their door. From jya at pipeline.com Fri Feb 6 05:07:52 1998 From: jya at pipeline.com (John Young) Date: Fri, 6 Feb 1998 21:07:52 +0800 Subject: BXA Crypto Meet Message-ID: <1.5.4.32.19980206125248.00721fd0@pop.pipeline.com> A report on this would be welcomed. Does anyone know who are the subcommittee members? ---------- Federal Register: February 6, 1998 (Volume 63, Number 25) Page 6153 --------------------------------------------------------- Bureau of Export Administration President's Export Council Subcommittee on Encryption; Partially Closed Meeting A partially closed meeting of the President's Export Council Subcommittee on Encryption will be held February 23, 1998, 2 p.m., at the U.S. Department of Commerce, Herbert C. Hoover Building, Room 4832, 14th Street between Pennsylvania and Constitution Avenues, NW., Washington, DC. The Subcommittee provides advice on matters pertinent to policies regarding commercial encryption products. Public Session 1. Opening remarks by the Chairman. 2. Presentation of papers or comments by the public. 3. Update on Administration commercial encryption policy. 4. Discussion of task force development and work plan. Closed Session 5. Discussion of matters properly classified under Executive Order 12958, dealing with the U.S export control program and strategic criteria related thereto. Dated: February 3, 1998. William V. Skidmore, Acting Deputy Assistant Secretary for Export Administration. FR Doc. 98-3001 Filed 2-5-98; 8:45 am From adam at homeport.org Fri Feb 6 05:44:18 1998 From: adam at homeport.org (Adam Shostack) Date: Fri, 6 Feb 1998 21:44:18 +0800 Subject: Feds Approve Bank to Certify Digital Signatures In-Reply-To: <199802051901.LAA19858@comsec.com> Message-ID: <199802061333.IAA22492@homeport.org> I'm not sure it is unfortunate that they'll be offering escrow. If its a complete flop, then we'll be able to point to the complete failure of the released system. Time for some Big Brother inside stickers to be printed out, slapped on flyers for the program, and remailing to potential customers. :) Anyone work at ZNB? Want help quitting? Adam Bill Stewart wrote: | There was a note to Dave Farber's list that the Office of the | Comptroller of Currency has approved Zion's First National Bank | to certify digital signatures. Since they're in Utah, Zion's has | | They're going to offer digital signature certificates | with the usual binding of a key to a body plus papers, | and provide software to support it. Some of their software | can be used for encryption, and unfortunately they're | going to offer key escrow, though as a separate business | service, with keys encrypted by the key's corporate owner | as well as by the bank for protection, but it's not | going to be a mandatory service, and they have no intention | of offering escrow for signature keys, only encryption keys. -- "It is seldom that liberty of any kind is lost all at once." -Hume From ravage at ssz.com Fri Feb 6 06:17:56 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 22:17:56 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802061414.IAA05746@einstein.ssz.com> Forwarded message: > Date: Fri, 6 Feb 1998 03:13:00 -0800 (PST) > From: mark at unicorn.com > Subject: Re: the best justice money can buy --Lessig (fwd) > Jim Choate (ravage at ssz.com) wrote: > >If there were no copyright nobody would have any reason to market software > >or much else for that matter. > > So I presume that Linux doesn't exist[1]? And, for that matter, I make my > living writing software which is given away for free... So do I, and I bet both our incomes combined doesn't add up to 15 minutes of Bill G's and it won't. From a market perspective we're flies on the back of great elephant. Please be so kind as to describe how and why this marketing mechanism (copyleft) will succed? I've been using and supporting Linux since 1993 (SSZ is listed as a source site in the back of 'Running Linux' since day one) in this manner neither I or anyone else has gotten rich. Linus made so much money off it that he went to work for a company in So. Cali. writing fully commercial software... > [1] Yes, I'm aware the GPL uses copyright to enforce its conditions, but > it's copright-free in the important sense: anyone can copy Linux and use > it with no fear of black ninjas at their door. It's copyrighted in the important sense in that it uses the copyright to enforce its conditions. That is just as important as the marketing decisions made by it. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Fri Feb 6 06:27:32 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 22:27:32 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802061421.IAA05806@einstein.ssz.com> Forwarded message: > Date: Fri, 6 Feb 1998 03:13:00 -0800 (PST) > From: mark at unicorn.com > Subject: Re: the best justice money can buy --Lessig (fwd) > Jim Choate (ravage at ssz.com) wrote: > >If there were no copyright nobody would have any reason to market software > >or much else for that matter. > > So I presume that Linux doesn't exist[1]? And, for that matter, I make my > living writing software which is given away for free... > > [1] Yes, I'm aware the GPL uses copyright to enforce its conditions, but > it's copright-free in the important sense: anyone can copy Linux and use > it with no fear of black ninjas at their door. A couple of other points. I've never claimed the monopolization would exist over nite or that it wouldn't be filled with short term conflicts and ups-n-downs. Only that the *long-term* result is a monopolized market. A point you seem to gloss over as irrelevant. Let's give the market another 5-10 years and see where Linux stands. Right now the estimate is 6-10 million users world wide use it. Share wise that isn't a lot. The reason that Linux garners so much press right now is that it is in fact an exception when an organization uses the software (eg NASA). The test will be whether it grows significantly over the long run and not the 5 years that Linux has been a serious os. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Fri Feb 6 06:44:25 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 22:44:25 +0800 Subject: slashdot.org news update... Message-ID: <199802061438.IAA05946@einstein.ssz.com> Forwarded message: > X-within-URL: http://www.slashdot.org/ > John Ousterhout leaves SunScript Contributed by CmdrTaco on Thu Feb 5 > 23:38:53 1998 EST > [Sun Microsystems] From the other-disappearing-acts Dept > Markus Fleck (aka python) wrote in to say "John Ousterhout, author of > the Tcl language and the Tk toolkit, also of Spring OS fame, has left > SunScript to form his own company, called Scriptics, to promote the > use and further development of Tcl. - I suppose that Sun didn't find > paying for Tcl development worthwhile any more, because there has > hardly been any revenue from it yet (even the source for the Tcl > Plugin for web browsers was made freely available when a poll showed > that too few people would be willing to pay for being able to execute > "Tclets" in their browsers)." > Be x86 Coming Contributed by CmdrTaco > [Be] Thu Feb 5 16:26:43 1998 EST > From the mr-be-sharp dept. > Sean Simmons wrote in to tell us that BeOS for x86 should be released > at SD98. Check out this TechWeb Story for more details. I would love > to get my hands on a copy. > Read More... > 21 comment(s) > Should Netscape Sell Linux? Contributed by Justin > [Netscape] Thu Feb 5 16:11:27 1998 EST > From the not-a-bad-idea dept. > An article at the Boston Globe presents an interesting solution to > Netscape's recent losses in the browser war. The author suggests > Netscape create and sell their own Linux distribution, the reason > being that Microsoft will be able to leverage their control of the > operating system for some time. Read on. > Read More... > 38 comment(s) > 2600 In Danger Contributed by CmdrTaco > Thu Feb 5 10:56:14 1998 EST > From the sounds-familiar dept. > I)ruid wrote in to say " 2600 The Hacker Quarterly, has recently been > having financial problems due to it's previous distributor. To find > out the whole story, check out this page. 2600 needs our help, but > will not accept donations. However, there is a LOT of merchandice in > stock, and buying up their overstock will definately help, as well as > going down to your local bookstore and requesting that they carry > 2600. So if you appreciate 2600 as much as I do, let's help give them > the help they need." My sentiments exactly. > Read More... > 8 comment(s) > Cooking pot markets Contributed by CmdrTaco > Thu Feb 5 10:27:02 1998 EST > From the must-read dept. > Hackworth sent us a link to an article entitled Cooking pot markets. > The article is an extremely good read, and addresses issues like What > Motiviates Free Software guys. I suspect most of us free software guys > already know what is said here, but this article puts it very clearly > for people who might understand it a bit less can be clued it. > Read More... > 3 comment(s) > Des2, Bovine and Slashdot Contributed by CmdrTaco > [Encryption] Thu Feb 5 10:09:40 1998 EST > From the bits-and-bytes dept. > Distributed.net has been working hard to crack the Des2 contest inside > the 22 day limit, but it doesn't look like it's going to happen, > despite Team Slashdot's rising in the ranks to #13. Thanks to the > 125-150 of you who have been contributing keys in our name! > Editorials > > Slashdot is participating in RC5. Read who's helping, and why. Check > out Our Current Rank. > > Read Rob's Solution to the Browser Battle and a followup with comments > from a Netscape Engineer. Interesting especially now that Netscape > Agreed! ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From guy at panix.com Fri Feb 6 06:53:34 1998 From: guy at panix.com (Information Security) Date: Fri, 6 Feb 1998 22:53:34 +0800 Subject: Changing to Moderated Cypherpunks -- How? Message-ID: <199802061422.JAA00615@panix2.panix.com> Soon I won't see you anymore, using the moderated list. > Thu Feb 5 20:22:33 1998 > Dimitry "Totally Impotent Since Prostrate Operation" The Dim wrote: > > Adam Back writes: > > > Information Security > > > I'd be glad to handle it. > > > > > > The only criteria is to delete Dr. Dim and his nyms. > > > > How are you going to recognize Dimitri's nyms if he has any. > > Guy Polis thinks that anyone smarter than him (and that's 99.99% of the > population) is my tentacle. He thinks everything on this list except > him and Timmy May is my tentacle, including you too, Adam. > > Guy Polis (guy at panix.com, eviljay at bway.net) is a pedophile child > molester who was fired from his consulting position at Salomon Brothers > after he was caught masturbating in his cubicle at the child pornography > JPEGs that he downloaded from the Internet. > > In retaliation, Guy Polis spammed the firewalls mailing list with megabytes > of e-mail logs that he "intercepted" at Salomon Brothers, and accused > several of his former co-workers and supervisors of various crimes. > > As far as I can determine, Guy Polis has been unemployed since the time > he was fired from Salomon. If anyone knows otherwise, please let me know. All you'll get is resounding silence, especially since you're so clueless as to get my name wrong: hint...not even 'guy' is correct. What a loser! You must love everyone seeing the old traffic analysis report on you: You'll have to go to URL 'www.dejanews.com/home_ps.shtml' to pick it up. Select "old database" and use this in their search box: ~g soc.culture.jewish & ~dc 1997/08/04 & ~s Brighton Beach Perhaps it should be updated and delivered to everyone in your neighborhood and the building you give classes in? You're just a ButtHead who never grew up, still gets a kick out of saying "cocksucker". Your brother Michael had to do your math thesis for you! ---guy You couldn't even cut it in Manhatten. From paulmerrill at acm.org Fri Feb 6 07:14:31 1998 From: paulmerrill at acm.org (Paul H. Merrill) Date: Fri, 6 Feb 1998 23:14:31 +0800 Subject: the best justice money can buy --Lessig (fwd) In-Reply-To: <199802060155.TAA03984@einstein.ssz.com> Message-ID: <34DB522F.5DE@acm.org> > > Hmm... There's no copyright on perfumes. There are market leaders in perfumes, > > but no monopoly; hardly even an olygopoly. > > I can tell how often you buy perfume, the ones I buy for my girlfriend > certainly have a little 'c' on them... The names of perfumes are (generally copyrighted. The perfumes (fragrances) themselves are not. This leaves the door open for knock-offs of the scent that then market under their own names -- and in some cases, claims of being just like "whoever". The situation is not parallel to sw because noone but a linux freak hopes to swep anyone off their feet by putting a ribbon around a tiny bit of sw and giving it for a BDay or VDay or whatever, astheydo with the top name parfums. PHM From ravage at ssz.com Fri Feb 6 08:51:21 1998 From: ravage at ssz.com (Jim Choate) Date: Sat, 7 Feb 1998 00:51:21 +0800 Subject: Test (cypherpunks@minder.net) [No Reply Please] Message-ID: <199802061642.KAA06469@einstein.ssz.com> Test [No Reply Please] ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From bmm at minder.net Fri Feb 6 09:43:24 1998 From: bmm at minder.net (BMM) Date: Sat, 7 Feb 1998 01:43:24 +0800 Subject: new CDR node Message-ID: A cypherpunks distributed list node is now available at cypherpunks at minder.net. I would appreciate it if the current CDR ops would add a feed to this address. Thanks. -BMM - bmm at minder.net From foupe%compuserve.com at oscsystems.com Sat Feb 7 02:12:50 1998 From: foupe%compuserve.com at oscsystems.com (foupe%compuserve.com at oscsystems.com) Date: Sat, 7 Feb 1998 02:12:50 -0800 (PST) Subject: Young Hot Girls New Site Message-ID: <199802074293XAA44563@post.99.231.3> >>Young Hot Girls New Site Can you handle 2 young, hot, sexy girls? Cum watch us at: http://www.livewhorehouse.com Where you can complete our menage-a-trois. We really hate it when you don't cum. Luv Nadia and Alexa XOXOXOXOXOXO ====================================== WE HONOR ALL REMOVE REQUESTS!! JUST MAIL YOUR REQUESTS TO: jackpotx at ix.netcom.com ====================================== 2 From eureka at eureka.abc-web.com Sat Feb 7 02:46:05 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Sat, 7 Feb 1998 02:46:05 -0800 (PST) Subject: Eureka! Sat Feb 7 '98 Message-ID: <19980207083702.2795.qmail@eureka.abc-web.com> Welcome to Saturday's issue of Eureka! ULTIMATE HARDCORE If you're looking for over 200 live strip shows and sex crazed video feeds - 24 hours a day! - thousands of XXX photos - hundreds of Videos (Avis, Movs and Mpegs) - and all totally free for a trial period, then look no further. The only place you need to visit is Ultimate Hardcore. TRY FREE! .. http://www.mr-cash.com/cgi-bin/ult-program.cgi/raw_3171/A Tunnel Hotel pics and chat http://www.tunnel.com Have you ever wished for a site that doesn't run you in circles with more ads than content, blind links, or pop up consoles? A site that doesn't force you to jump hoops to get access. We have no AVS, blind links, or consoles. We have 11,000 completly FREE pictures gathered from the news groups and categorized for your easy viewing. We have free XXX multi roomed chat. DON'T MISS THIS CHANCE! BIG SEX TOYS Sometimes when surfing for porn you have to get a little scared, just for fun. Like when you call your friend over and say out loud, no fucking way, look at that! This is one of those. Click on the free area, then Star's pics, then see the two candle dildo image. She has enough hair on her legs, thighs and bush to make a fucking sweater! You have to see! Big Sex Toys .................... http://www.bigsextoys.com/ READ OTHER PEOPLES DIRTY EMAIL This is a graphically busy site with wierd colors. Let me guide you to the carrot. It's wierd shit day here! Click on enter, then the grey enter button, then click Ambers button, then to the bottom click the nice erect nipple, then at last click on the fourth green radioactive barrel for a wild jpeg of a red haired pussy with a carrot shoved in! I guess the little bunny is a vegetable lover and wants a carrot bad! Read Other Peoples .............. http://pp256.com/email.htm AUSSIE SHOWGIRLS Well good day mate! After the warning page click the try before you buy. Here you will find a sexy mix of images to check out. Pussy, blondes, anal, and nice tits and asses! Aussie Showgirls .............. http://www.showgirls.com.au/ ADULT MEGAPLEXXX There are tons of daily picture links here. As you click on them you are given a free picture then another link, that will lead you to more free pix. Try the daily pic from free xxx pics, then the all free pics, then the amateur gallery. There you will find the gallery with lots of hot sex images! Adult Megaplexxx ............. http://www.darkside.inter.net #READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! #$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A # HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Anal --------------------------> http://204.244.215.7/anal2/ CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Tina: A 23-year-old female swinger/exhibitionist who loves posing for erotic photos, is into hot phone sex and meeting for casual discreet encounters. Tina stands 5 ft 2 inches tall and weighs 105 lbs. This babe is a wet dream waiting to happen. ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY TabooStories.com: Nasty alert! TabooStories.com gives you the hardest, nastiest sex stories on the net, all free! We have the stories that the other sites don't dare to post! Don't say we dindn't warn you.. http://www.taboostories.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?070 Pic 2 --------------------------> http://137.39.63.229/?071 Pic 3 --------------------------> http://137.39.63.229/?072 Pic 4 --------------------------> http://137.39.63.229/?073 Pic 5 --------------------------> http://137.39.63.229/?074 Pic 6 --------------------------> http://137.39.63.229/?075 Pic 7 --------------------------> http://137.39.63.229/?076 Pic 8 --------------------------> http://137.39.63.229/?077 Pic 9 --------------------------> http://137.39.63.229/?078 Pic 10 --------------------------> http://137.39.63.229/?079 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From MAILER-DAEMON at toad.com Sat Feb 7 03:50:59 1998 From: MAILER-DAEMON at toad.com (MAILER-DAEMON at toad.com) Date: Sat, 7 Feb 1998 03:50:59 -0800 (PST) Subject: 145 Million Message-ID: <199801260540.XAA10977@mail.t-1net.com> Removal instructions below. If someone with an 8th grade education can make a personal fortune of $145 million in network marketing with herbs, why can't you? Especially when this person has just decided to come out of retirement to launch an upstart company, marketing products that were used by the Russians to win all those gold medals at the Olympic Games. With more scientific research than anything else on the market, it's no wonder why so many doctors are joining our company and offering these products to their patients. Why not do something different to change your life? Join in with the person who knows how to make things happen big and fast. He has just joined our company and is willing to help you learn how to 'set yourself free'. Someday maybe you can throw the alarm clock out the window. For good. For additional information, please check out the following: http://www.prime-1.com Thanks For guaranteed removal call 1-800-555-9205, ext. 3256, 24 hours a day. From declan at well.com Fri Feb 6 12:14:24 1998 From: declan at well.com (Declan McCullagh) Date: Sat, 7 Feb 1998 04:14:24 +0800 Subject: Software Money Message-ID: http://cgi.pathfinder.com/netly/editorial/0,1012,1722,00.html The Netly News (http://netlynews.com/) February 2, 1998 Software Money by Declan McCullagh (declan at well.com) Successful political campaigns follow a simple formula: 1) Spend heaps of money; 2) Puzzle out how to squeeze your message into one sentence, or, better yet, a bumper sticker. Silicon Valley finally got the first part right. Software chieftains, historically eager to squander cash on doomed marketing campaigns but loath to spend the same opposing government regulations, are about to ante up millions to detangle the skein of rules that restrict sales of data-scrambling encryption software. Sure, it's pocket change to California's zillionaires, but it may be just enough to get their deregulatory point across in the nation's capital. [...] Together the duo will coordinate the lobbying and media efforts of a new industry coalition, as yet unnamed but likely to be dubbed something like the Alliance for Computer Privacy. The soon-to-be-announced project (contracts haven't been signed yet) grew out of the Alliance for a Secure Tomorrow, which firms hurriedly created last fall to battle FBI-backed legislation banning software such as PGP, which is capable of encoding messages so securely that police can't crack them. But the AST languished. Soon CEOs of more than a dozen high-tech companies started talking about a more aggressive approach. "The only time you're going to win this battle is when you put money on the table," says Lauren Hall of the Software Publishers Association. [...] From declan at well.com Fri Feb 6 12:18:04 1998 From: declan at well.com (Declan McCullagh) Date: Sat, 7 Feb 1998 04:18:04 +0800 Subject: FW: SEC Rule Announcement In-Reply-To: <6B5344C210C7D011835C0000F8012766010035B3@exna01.securitydynamics.com> Message-ID: Peter is quite right that the interesting part is HOME computers. It's the Electronic Messaging Association, BTW. My article with comments from them, SEC, NASD, ACLU, etc. is at: http://cgi.pathfinder.com/netly/opinion/0,1042,1731,00.html The SEC may have approved a rule that violates federal law. -Declan At 17:00 -0500 2/4/98, Trei, Peter wrote: >[sorry if you get this twice - pt] > >I have not been able to confirm the claim in this letter - the EMA >does not seem to have a web site. Note that it refers to >employers monitoring employee's HOME computers. > >Peter Trei > >> -----Original Message----- >> From: Larry Layten [SMTP:larry at ljl.com] >> Sent: Wednesday, February 04, 1998 11:04 AM >> To: cryptography at c2.net >> Subject: SEC Rule Announcement >> >> I received information in an Electronic Mail Association (EMA) >> bulletin that said the Securities and Exchange Commission >> approved a rule that would go into effect February 15th that >> requires securities employers to have the ability to monitor >> electronic communications between employees and customers >> on employees' home computers or through third party systems. >> >> Does anyone have any more information on this and how it >> might apply to encrypted email? >> >> Larry From guy at panix.com Fri Feb 6 12:24:39 1998 From: guy at panix.com (Information Security) Date: Sat, 7 Feb 1998 04:24:39 +0800 Subject: FW: SEC Rule Announcement Message-ID: <199802061953.OAA04651@panix2.panix.com> > From cypherpunks-errors at toad.com Fri Feb 6 14:41:14 1998 > > Peter is quite right that the interesting part is HOME computers. It's the > Electronic Messaging Association, BTW. My article with comments from them, > SEC, NASD, ACLU, etc. is at: > > http://cgi.pathfinder.com/netly/opinion/0,1042,1731,00.html > > The SEC may have approved a rule that violates federal law. > > -Declan It was quite unnecessary: all a company has to do is require all company business email contact go through the company's systems, even if home. Furthermore, brokers send email during the work day - like the list of AXEs they have for that day - and send it in the morning. Home email directly to clients is basically non-existent. ---- Stange, how monitoring home email to third parties would be illegal, but Deutsche Bank showing up at a random time to demand (and watch) you give a urine sample is completely legal. ---guy From jya at pipeline.com Fri Feb 6 12:52:25 1998 From: jya at pipeline.com (John Young) Date: Sat, 7 Feb 1998 04:52:25 +0800 Subject: STOA Report Bibliography Message-ID: <1.5.4.32.19980206202304.0071da54@pop.pipeline.com> We've transcribed the 26-page bibliography of STOA's "An Appraisal of the Technologies of Political Control:" http://jya.com/stoa-bib.htm (85K) Zipped version: http://jya.com/stoa-bib.zip (32K) The substantiating details of the cited literature -- study after study of the consequences of inhumane policy and savage commerce eager to oblige it -- are grimmer than the main report. A steady drumbeat for ever more ingenious technology to enforce submission. From emc at wire.insync.net Fri Feb 6 12:52:56 1998 From: emc at wire.insync.net (Eric Cordian) Date: Sat, 7 Feb 1998 04:52:56 +0800 Subject: Krauts Weaken Constitutional Privacy Message-ID: <199802062017.OAA23205@wire.insync.net> BONN, Germany (AP) -- Germany reduced constitutional guarantees of privacy Friday to fight organized crime, ceding historical concerns over past dictatorships to present-day realities. By a one-vote margin, parliament's upper house approved changes to the constitution necessary for eventual passage of a law allowing electronic surveillance in private households. Before approving the measure, however, the opposition Social Democrats won a promise that a parliamentary committee would re-examine the proposed law to include protection for some groups -- including journalists, doctors and some lawyers. The proposed law has raised warnings about reviving the police state tactics of the Nazi regime and former communist East Germany. Mostly, though, critics are worried about breaching confidentiality essential to some professions, such as doctors. Outside of government, journalists and doctors have been the most vocal critics of the draft law, which currently shields conversations between suspects and clergy, parliamentarians, and defense lawyers. Journalists view the proposed law as an attack on press freedom. ``It's not about privilege for journalists,'' the chairman of the German Journalist Association, Hermann Meyn, wrote in an open letter to parliament. ``It's about protection of news room secrets, essential press freedoms.'' The vote Friday weakened the constitutional guarantee of the sanctity of ones home by defining situations when police could bug homes: during investigation of serious crimes -- such as murder, kidnapping, extortion, arms and drug trafficking -- with the approval of three judges. The changes necessary for the law also would allow electronic eavesdropping on suspects after a crime has been committed -- not just to prevent crime -- and for the first time allows information from bugging devices to be entered as evidence. Organized crime has risen sharply in Europe since the collapse of communist regimes in Russia and Eastern Europe, which loosened previously closed borders. Drug trafficking, car theft and smuggling of cigarettes, illegal immigrants and even nuclear material has increased. The law must be passed by both houses of parliament. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From declan at well.com Fri Feb 6 14:14:24 1998 From: declan at well.com (Declan McCullagh) Date: Sat, 7 Feb 1998 06:14:24 +0800 Subject: The schizophrenic White House and the Internet Message-ID: ---------- Forwarded message ---------- Date: Fri, 6 Feb 1998 13:01:05 -0800 (PST) From: Declan McCullagh To: politech at vorlon.mit.edu Subject: The schizophrenic White House and the Internet Carl makes a good point. When it comes to the Internet, the Clinton-Gore administration is schizophrenic. Ira Magaziner and other White House officials say their attitude towards the Internet is "hands off" and "deregulatory" -- a line that certainly makes for good copy from journalists who don't know any better and don't take the time to learn more. But in truth White House policy is far from hands off. Here are a few areas where the Clinton-Gore administration is calling for greater regulation, subsidies, taxes, and government control of the Internet and related technology: -- Criminal copyright (share software, go to jail) -- Encryption regulations (export ctrls and proposed domestic rules) -- CALEA / Digital Telephony wiretapping funding -- Gore Commission talking about extending FCC rules to Net -- Universal service (taxes and spending for Net access) -- Rating systems (Clinton: "every Internet site" should self-label) -- Net-taxation (has Clinton enorsed Cox-Wyden?) -- Rapacious government databases (DoD recently demanded more access) -- Subsidies for government-approved technologies -- FTC considering banning spam (what about technical solutions?) -- FTC actions on "children's privacy" -- Clinton calling for V-Chip for Internet These are hardly the actions of a deregulatory administration. -Declan ---------- Forwarded message ---------- Date: Fri, 06 Feb 1998 15:33:44 -0500 From: Carl Ellison To: declan at well.com Subject: Re: FC: Magaziner says "No regulation!" at Cato-Brookings event -----BEGIN PGP SIGNED MESSAGE----- Of course, this means gov't hands off crypto policy, too, right? -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.5.3 iQCVAwUBNNtzpxN3Wx8QwqUtAQFYHwP/XpBnkplWMZpc0bIfbNhEnlhzmUsXyMXa rjfgnJGW8jX31fkbXZqcILcURPA31HfHu0K8y/FmmcoD5rcz9my3J785EL5903iS gwm2zvF2uKMdIqACF7BP2pb1bmJvJYWWqXQP7SNjkQpbzFz0XGF4LHAFhbPf24Tw e7694fdXoc4= =vK41 -----END PGP SIGNATURE----- +------------------------------------------------------------------+ |Carl M. Ellison cme at cybercash.com http://www.clark.net/pub/cme | |CyberCash, Inc. http://www.cybercash.com/ | |207 Grindall Street PGP 08FF BA05 599B 49D2 23C6 6FFD 36BA D342 | |Baltimore MD 21230-4103 T:(410) 727-4288 F:(410)727-4293 | +------------------------------------------------------------------+ From tcmay at got.net Fri Feb 6 15:07:30 1998 From: tcmay at got.net (Tim May) Date: Sat, 7 Feb 1998 07:07:30 +0800 Subject: the best justice/kinds of monopolies In-Reply-To: <34DA3157.1FF4FA7A@ssds.com> Message-ID: At 11:52 PM -0800 2/5/98, Bill Frantz wrote: >At 1:38 PM -0800 2/5/98, in a generally right on post, Jim Burnes wrote: >>(this and the strange tendency of >>workers >>to "go postal" -- you rarely hear about FedEX employees going on >>an >>AK47 rampage, must be the water ;-) > >No, the problem is the US Postal Service's willingness to tolerate assholes >as managers. There may be an argument for pinning that on the government >monopoly aspects of the USPS as well. Not just the managers, but the ordinary employees... The Postal Service is effectively bound to keep employees on that any normal business would have simply given the boot to. The benefits of government service.... (Yes, yes, I know some of you will be tempted to cite the official line that the Postal Service is no longer a government agency. Well, this is a distinction without a difference. The USPS retains governmental protections against competition, has government-like powers and protections, and is still run by a "Postmaster General," not a Chairman of the Board or President or CEO. It ain't FedEx or Airborne. Or even UPS, which emulates government agencies.) --Tim May "National borders aren't even speed bumps on the information superhighway." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From guy at panix.com Fri Feb 6 16:21:03 1998 From: guy at panix.com (Information Security) Date: Sat, 7 Feb 1998 08:21:03 +0800 Subject: Fingerprinting in CA [was Whoa: British SmartCard rollout] Message-ID: <199802070004.TAA27622@panix2.panix.com> > From bill.stewart at pobox.com Fri Feb 6 18:50:28 1998 > > >> How did you CA cypherpunks feel about being fingerprinted? > > Well, if I'd been thinking about it, I'd have put some rubber cement and > whiteout on my thumb before getting the license :-) > More the issue at the time was that the politicians were > busy deciding that your ability to drive safely obviously depended > on whether your citizenship papers were in order (the month > I got it they'd temporarily stopped doing that.) But it is being rolled out all over, state-by-state, never a vote. They don't have problems with illegal aliens in Georgia, USA. A mercifully brief CM excerpt: * Dr. Linda Thompson: * YOUR STATE IS NEXT AND DON'T THINK OTHERWISE. Sandia and other defense * contractors, without a war elsewhere, are OUT OF WORK, so they're * creating job security for themselves by helping fascists wage war in the * United States on us and our rights!! * * Georgia, Texas and Oregon ALREADY require fingerprints for licenses. > California is already fingerprinting drivers, and many places outside of > the US are creating identity cards with barcoded information. > > Also, AmSouth and Compass Banks will soon introduce fingerprinting of > people who cash checks and have no account with their bank. This is > now standard practice in Texas and will soon be nation-wide. Oregon? It's like Wired magazine reported: the NSA is behind it all. The DMV records are online 24 hours for FBI access. > I recently renewed the license, and they didn't ask for papers > or thumbprints... They already got your number. When will some group express organized opposition to this? ---guy Your fingerprint tattoo. From bill.stewart at pobox.com Fri Feb 6 16:23:23 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 7 Feb 1998 08:23:23 +0800 Subject: Fwd: e-commerce and rights management list Message-ID: <3.0.5.32.19980206074313.0085b190@popd.ix.netcom.com> This showed up on a bunch of lists, not including cypherpunks or cryptography; Phil Agre added some interesting commentary and sent it to the Red Rock Eater list so I'm forwarding that version. >From: Phil Agre >To: rre at weber.ucsd.edu >Subject: e-commerce and rights management >X-URL: http://communication.ucsd.edu/pagre/rre.html >X-Mailing-List: archive/latest/1815 > >[When Judie sent me the announcement for her new mailing list on practical >aspects of deploying rights management and e-commerce technologies, I >was incredulous that such a list doesn't already exist. She persuaded me >by means of the following catalog of related lists, which may be of some >interest. I assume that you can track down subscription info with the >standard search tools. encryption/certificates: ieft-pkix, ieft-open-pgp, >ieft-ldapext, cert-talk, spki, kerberos, dcsb, alice; digital signatures: >temple, california, georgia, texas; copyright: cni-copyright, ecup; legal: >cyberia, law-ipr, euro-lex; rights: cyber-rights, web-rights; e-commerce: >e-commerc, ica, e-payments; digital libraries: liblicensing, diglib, ifla.] > >=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= >This message was forwarded through the Red Rock Eater News Service (RRE). >Send any replies to the original author, listed in the From: field below. >You are welcome to send the message along to others but please do not use >the "redirect" command. For information on RRE, including instructions >for (un)subscribing, send an empty message to rre-help at weber.ucsd.edu >=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= > >Date: Wed, 4 Feb 1998 12:36:26 -0500 (EST) >From: Judie Mulholland >Subject: announcing E-CARM, a new mailing list (fwd) > >[...] > >---------------------------------------------------------------------- > Announcing the creation of a new mailing list: > > ***E-COMMERCE AND RIGHTS MANAGEMENT (E-CARM)*** > >---------------------------------------------------------------------- > >This mailing list has been established to foster and support an on-line >discussion forum where we can: > > * debate (non) technical, administrative and managerial issues > pertaining to: secure transactions, competing rights management > models (e.g. ECMS, PICS, certificates, FIRM, etc.), evolving > standards, supporting technologies and other approaches for > enabling electronic commerce; > * inform each other about upcoming conferences, workshops, etc. > * point to online papers, resources/links, new apps, web > sites, etc. > * identify the critical factors relevant to design, development > and implementation of a rights management infrastructure; > * raise questions, share problems, relate concerns; > * share success/horror stories; > * and much, much more ... > >If you are interested in subscribing to this list, please send a message >to: > > > >with the following line in body of the message (NOT the subject): > >subscribe e-carm "FirstName LastName" (without the quotation marks) > >and after you are notified that you have been subbed, we would ask that >you send a short note to the list, briefly introducing yourself and your >interests in e-commerce and rights management so that we can begin to come >together as a community of shared interest(s). > >E-CARM is intended to be a member-driven, open, collaborative mailing >list. However, its success in creating a viable on-line forum will >depend on individual contributions. As a step in this direction, we >encourage you to share this announcement with other mailing lists or >anyone who may be interested in getting involved. > >Looking forward to seeing all of you on E-CARM, > >Judie Mulholland >Rajiv Kaushik > >List Moderators > > > > > > > > > > > > > > > > > > > > > > > > > > Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Fri Feb 6 16:27:28 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 7 Feb 1998 08:27:28 +0800 Subject: Fingerprinting in CA [was Whoa: British SmartCard rollout] In-Reply-To: <199802040323.WAA16673@panix2.panix.com> Message-ID: <3.0.5.32.19980206074009.0085b8c0@popd.ix.netcom.com> >> How did you CA cypherpunks feel about being fingerprinted? Well, if I'd been thinking about it, I'd have put some rubber cement and whiteout on my thumb before getting the license :-) More the issue at the time was that the politicians were busy deciding that your ability to drive safely obviously depended on whether your citizenship papers were in order (the month I got it they'd temporarily stopped doing that.) I recently renewed the license, and they didn't ask for papers or thumbprints, but they still don't print the license at the remote DMV offices; they print them centrally because it simplifies verifying your information with the INS thugs. The citizenship papers issue has basically doubled the market for counterfeit licenses; it's not just excessively bad drivers who bribe DMV employees any more. Back when I lived in New Jersey, the cops would set up traffic stops not only to look for drunk drivers (at 9am?!), but also to check if your papers were in order. I haven't seen much of that in California, but presumably the Southern part of the state does it more often to catch Spanish speakers who are loose in the population. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From shadow at tfs.net Fri Feb 6 16:27:48 1998 From: shadow at tfs.net (sphantom) Date: Sat, 7 Feb 1998 08:27:48 +0800 Subject: Lets check this out Message-ID: <34DBA006.46743131@tfs.net> Here is something for us to check out. Was just emailed to me today. I am curious how this person does it. Dear Friends, If someone named SandMan asks you to check out his page on the WEB DO NOT!!! It is at www.geocities.com/vienna/6318 This page hacks into your C:/ drive. DO NOT GO THERE HE WILL REQUEST A CHAT WITH YOU....don't do it. FORWARD THIS TO EVERYONE... From tcmay at got.net Fri Feb 6 17:30:58 1998 From: tcmay at got.net (Tim May) Date: Sat, 7 Feb 1998 09:30:58 +0800 Subject: Fingerprinting in CA [was Whoa: British SmartCard rollout] In-Reply-To: <19980205.000739.attila@hun.org> Message-ID: At 7:40 AM -0800 2/6/98, Bill Stewart wrote: >>> How did you CA cypherpunks feel about being fingerprinted? > >Well, if I'd been thinking about it, I'd have put some rubber cement and >whiteout on my thumb before getting the license :-) >More the issue at the time was that the politicians were >busy deciding that your ability to drive safely obviously depended >on whether your citizenship papers were in order (the month >I got it they'd temporarily stopped doing that.) >I recently renewed the license, and they didn't ask for papers >or thumbprints, but they still don't print the license at the >remote DMV offices; they print them centrally because it simplifies >verifying your information with the INS thugs. And don't forget the "Department of Deadbeat Dads" thugs. As I recall things, there was a bill passed in the California legislature to beef up computerized tracking of driver-units so that deabeat-units can be identified and marked for collection. The invasions of privacy in the driver's license process is just symptomatic of a larger problem: * government claims that some activity is a "privilege, not a right," and so claims that normal constitutional protections are irrelevant. (One wonders if they believe the First Amendment doesn't apply, that Big Brother may monitor what drivers are saying and deny licenses to political troublemakers: "driving is a privilege, not a right.") * government claims that the "regulation of commerce" language applies much more broadly than the original interstate commerce and very general rule-making language. (One abuse of this was to say that if a student received federal loans, a college could not practice certain of its normal practices...and the college was forbidden from stopping the student from receiving these loans! Catch-22. At this rate, churches will come under federal regulation because they receive Postal Service deliveries. Or because government roads are their only access. And so on.) >Back when I lived in New Jersey, the cops would set up traffic stops >not only to look for drunk drivers (at 9am?!), but also to check >if your papers were in order. I haven't seen much of that in California, >but presumably the Southern part of the state does it more often >to catch Spanish speakers who are loose in the population. Warrantless roadblocks are in place in my town, and, according to the local newspaper, any driver who is seen turning around so as to avoid the roadblock check will have his vehicle subject to detailed search. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From guy at panix.com Fri Feb 6 17:34:11 1998 From: guy at panix.com (Information Security) Date: Sat, 7 Feb 1998 09:34:11 +0800 Subject: Most elegant wording against privacy/law-enforcement "balance" Message-ID: <199802070106.UAA01015@panix2.panix.com> What are the most elegant rebuttals to politicians saying we need Key Recovery as a "reasonable balance between the needs of law enforcement vs. freedom of crypto"? I wasn't too elegant in the Crypto Manifesto. ---guy From nobody at REPLAY.COM Fri Feb 6 18:03:21 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 7 Feb 1998 10:03:21 +0800 Subject: Lets check this out In-Reply-To: <34DBA006.46743131@tfs.net> Message-ID: <199802070148.CAA26783@basement.replay.com> sphantom wrote: > If someone named SandMan asks you to check out his page on the WEB > > DO NOT!!! > > It is at www.geocities.com/vienna/6318 > > This page hacks into your C:/ drive. DO NOT GO THERE All I see there is a few midi files and some badly-written HTML. Nothing there to hack into my C:/ drive. I don't even have a C: drive. If you were running a more secure operating system, you wouldn't either. > I am curious how this person does it. > You obviously haven't been reading this list very long. There are lots of way to do nasty things to microslob windoze, including: Buffer overruns in IE, javascript bugs in web browsers, launching applications thru mime-types, SMB bugs (oob-attack, cd ..\, and others), macro (and other) viruses, buffer overruns in the tcp stack (oversized pings, etc), as well as the near infinite number of possible active-x exploits. From jim at mentat.com Fri Feb 6 18:09:00 1998 From: jim at mentat.com (Jim Gillogly) Date: Sat, 7 Feb 1998 10:09:00 +0800 Subject: Most elegant wording against privacy/law-enforcement "balance" Message-ID: <9802070144.AA11833@mentat.com> Guy skribis: > What are the most elegant rebuttals to politicians saying we > need Key Recovery as a "reasonable balance between the needs of > law enforcement vs. freedom of crypto"? I don't know how elegant it is, but here's my response: Compromising the public's right to privacy gives away not only our own rights, but those of our descendants. The government must make an extraordinary case to justify undermining those rights, and so far it has not done so. The most detailed research on the issue is a study by Dorothy Denning and William Baugh investigating the extent to which crypto has interfered with law enforcement's ability to get convictions: their bottom line was that crypto has not in fact interfered: law enforcement has been able to complete their investigations using other means. There's no demonstrated need for Government Access to Crypto Keys (GACK), so there's no need to compromise away our privacy. Jim Gillogly jim at acm.org From tcmay at got.net Fri Feb 6 18:25:02 1998 From: tcmay at got.net (Tim May) Date: Sat, 7 Feb 1998 10:25:02 +0800 Subject: Most elegant wording against privacy/law-enforcement "balance" In-Reply-To: <199802070106.UAA01015@panix2.panix.com> Message-ID: At 5:06 PM -0800 2/6/98, Information Security wrote: >What are the most elegant rebuttals to politicians saying we >need Key Recovery as a "reasonable balance between the needs of >law enforcement vs. freedom of crypto"? > >I wasn't too elegant in the Crypto Manifesto. I like this for starters: "Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. " Of course, some in Washington consider this to be a seditious sentiment. But serious, "Information Security" is asking for too much. He is asking us to give our personal opinions about the "most elegant" arguments. Debates about key escrow have been raging for almost five years now. He's not likely to get new arguments here, or newly-written articles. I urge him to either consult the archives of this list or the thousands of articles in many places. Search engines are a good way to find them. Of course, I expect various folks will answer his call and write down their reasons. I just doubt strongly that they'll be arguments as good as what was written years ago. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From ASCOM at hx3em6.net Sat Feb 7 10:48:28 1998 From: ASCOM at hx3em6.net (ASCOM at hx3em6.net) Date: Sat, 7 Feb 1998 10:48:28 -0800 (PST) Subject: Make $50,000+ through the mail for FREE! Message-ID: <68354425_85875416> Subject: GET LEGAL CASH IN MAIL W/ ONLY $5.00 READ THIS YOU WON'T BE SORRY, I WASN'T This will be the quickest way to get cash in the mail.If you follow these instructions carefully, you will be able to receive within two months nearly $50,000.00. The great part is is that $5.00 isn't really a whole lot and it could just be worth a try. I am currently 6 months pregnant and my husband and I are in debt. We both have really good professions but he has massive student loans and credit card bills (I was lucky and my father helped me through college). Needless to say, since we are married to one another I acquired his debt also. In any case, I followed these easy steps thinking that I really had nothing to lose and guess what? The first week I started getting money in the mail! I was shocked! I still figured it would end soon. The money just kept coming in. In my first week, I made about $20.00 to $30.00 dollars. By the end of the second week I had made a total of over $1,000.00!!!!!! In the third week I had over $10,000.00 and it's still growing. This is now my fourth week and I have made a total of just over $42,000.00 and it's still coming in ....... You send $1.00 to each of the 5 names and address stated in the article. You then place your own name and address in the bottom of the list at #5, and post the article in at least 200 newsgroups. (There are thousands) and that is all. Let me tell you how this works and most importantly, Why it works....also, make sure you print a copy of this article NOW, so you can get the information off of it as you need it. The process is very simple and consists of 3 easy steps: Like most of us, I was a little skeptical and a little worried about the legal aspects of it all. So I checked it out with the U.S. Post Office (1-800-725-2161) and they confirmed that it is indeed legal! Seriously, your story will sound like this one if you participate by doing the following: STEP 1: Get 5 separate pieces of paper and write your address on each piece of paper along with "PLEASE PUT ME ON YOUR MAILING LIST." Now get 5 $1.00 bills and place ONE inside EACH of the 5 pieces of paper so th e bill will not be seen through the envelope to prevent thievery. Next, place one paper in each of the 5 envelopes and seal them. You should now have 5 sealed envelopes, each with a piece of paper stating the above phrase and a $1.00 bill. What you are doing is creating a service by this. THIS IS PERFECTLY LEGAL! Mail the 5 envelopes to the following addresses: #1 Corey McNear 233 Olive st. West Reading, PA 19611 #2 R. M. 66 Navesink Drive Monmouth Beach, NJ 07750 #3 Sam 27248 Grano Avenue Saugus, CA 91350 #4 Pat anderson 41 pilote st-ambroise Pq #5 Nick Austin 12318 Dollar Lk dr Fenton, MI 48430-9734 STEP 2: Now take the #1 name off the list that you see above, move the other names up (2 becomes 1, 3 becomes 2, etc...) and add YOUR Name as number 5 on the list. STEP 3: Change anything you need to, but try to keep this article as close to original as possible. Now, post your amended article to at least 200 newsgroups. (I think there is close to 18,000 groups) All you need is 200, but remember, the more you post, the more money you make! Don't know HOW to post in the newsgroups? Well do exactly the following: FOR NETSCAPE USERS: 1) Click on any newsgroup, like normal. Then click on "To News", which is in the top left corner of the newsgroup page. This will bring up a message box. 2) Fill in the SUBJECT with a flashy title, like the one I used, something to catch the eye!!! 3) Now go to the message part of the box and retype this letter exactly as it is here, with exception of your few changes. (remember to add your name to number 5 and move the rest up) 6 4) When your done typing in the WHOLE letter, click on 'FILE' above the send button. Then, 'SAVE AS..' DO NOT SEND YOUR ARTICLE UNTILL YOU SAVE IT. (so you don't have toype this 200 times :-) 5) Now that you have saved the letter, go ahead and send your first copy! (click the 'SEND' button in the top left corner) 6) This is where you post all 200! OK, go to ANY newsgroup article and click the 'TO NEWS' button again. Type in your flashy subject in the 'SUBJECT BOX', then go to the message and place your cursor here. Now click on 'ATTACHMENT' which is right below the 'SUBJECT BOX'. Click on attach file then find your letter wherever you saved it. Click once on your file then click 'OPEN' then click 'OK'. If you did this right , you should see your filename in the 'ATTACHMENT BOX' and it will be shaded. NOW POST AWAY! FOR INTERNET EXPLORER: It's just as easy, holding down the left mouse button, highlight this entire article, then press the 'CTRL' key and 'C' key at the same time to copy this article. Then print the article for your records to have the names of those you will be sending $1.00 to. Go to the newsgroups and press 'POST AN ARTICLE' type in your flashy subject and click the large window below. Press 'CTRL' and 'V' and the article will appear in the message window. **BE SURE TO MAKE YOUR ADDRESS CHANGES TO THE 5 NAMES.** Now re-highlight the article and re-copy it so you have the changes.... then all you have to do for each newsgroup is 'CTRL' and 'V' and press 'POST'. It's that easy!! THAT'S IT! All you have to do is jump to different newsgroups and post away, after you get the hang of it, it will take about 30 seconds for each newsgroup! **REMEMBER, THE MORE NEWSGROUPS YOU POST IN, THE MORE MONEY YOU WILL MAKE!! BUT YOU HAVE TO POST A MINIMUM OF 200** **If these instructions are too complex to follow, try Forte's "Free Agent." It is freeware for noncommercial use. To download it, simply use a search utility and type "Forte Free Agent". You should be able to find it.** That's it! You will begin receiving money from around the world within days! You may eventually want to rent a P.O. Box due to the large amount of mail you receive. If you wish to stay anonymous, you can invent a name to use, as long as the postman will deliver it. **JUST MAKE SURE ALL THE ADDRESSES ARE CORRECT.** Now the WHY part: This entire principle works because it is in a format of an upside down tree with thousands of branches. Everyone below you will see to it that the tree continues because they want to get money. Those below THEM will continue because THEY want to get the cash etc. Out of 200 postings, say I receive only 5 replies (a very low example). So then I made $5.00 with my name at #5 on the letter. Now, each of the 5 persons who just sent me $1.00 make the MINIMUM 200 postings, each with my name at #4 and only 5 persons respond to each of the original 5, that is another $25.00 for me, now those 25 each make 200 MINIMUM posts with my name at #3 and only 5 replies each, I will bring in an additional $125.00! Now, those 125 persons turn around and post the MINIMUM 200 with my name at #2 and only receive 5 replies each, I will make an additional $626.00! OK, now here is the fun part, each of those 625 persons post a MINIMUM of 200 letters with my name at #1 and they each only receive 5 replies, that just made me $3,125.00!!! With a original investment of only $5.00! AMAZING! And as I said 5 responses is actually VERY LOW! Average is probable 20 to 30! So lets put those figures at just 15 responses per person. Here is what you will make: at #5 $15.00 at #4 $225.00 at #3 $3,375.00 at #2 $50,625.00 at #1 $759,375.00 When your name is no longer on the list, you just take the latest posting in the newsgroups, and send out another $5.00 to names on the list, putting your name at number 5 and start posting again. The thing to remember is that thousands of people all over the world are joining the Internet and reading these articles everyday, JUST LIKE YOU are now!! And this will go on and on and on and on.... get the picture? Well, there's 5,000,000,000 people on the world and most of them will eventually end up being hooked into the internet. So there are virtually unlimited resources. Of course this will work the best at the very beginning so the faster you post, the better for YOU! People have said, "what if the plan is played out and no one sends you the money? So what! What are the chances of that happening when there are tons of new honest users and new honest people who are joining the Internet and newsgroups everyday and are willing to give it a try? Estimates are at 20,000 to 50,000 new users, every day, with thousands of those joining the actual Internet. Remember, play FAIRLY and HONESTLY and this will work. You just have to be honest. Make sure you print this article out RIGHT NOW, also. Try to keep a list of everyone that sends you money and always keep an eye on the newsgroups to make sure everyone is playing fairly. Remember, HONESTY IS THE BEST POLICY. You don't need to cheat the basic idea to make the money!! GOOD LUCK to all and please play fairly and reap the huge rewards from this, which is tons of extra CASH. **By the way, if you try to deceive people by posting the messages with y name in the list and not sending the money to the rest of the people already onhe list, you will NOT get as much. Someone I talked to knew someone who did that and he only made about $150.00, and that's after seven or eight weeks! Then he sent the 5 $1.00 bills, people added him to their lists, and in 4-5 weeks he had over $10k. This ishe fairest and most honest way I have ever seen to share the wealth of the world without costing anything but our time!!! You also may want to buy mailing and e-mail lists for future dollars. Please remember to declare your extra income. Thanks once again... From tcmay at got.net Fri Feb 6 18:53:59 1998 From: tcmay at got.net (Tim May) Date: Sat, 7 Feb 1998 10:53:59 +0800 Subject: Most elegant wording against privacy/law-enforcement "balance" In-Reply-To: <9802070144.AA11833@mentat.com> Message-ID: I strongly, emphatically, disagree with the reasoning used here by Jim Gillogly: At 5:44 PM -0800 2/6/98, Jim Gillogly wrote: >Guy skribis: >> What are the most elegant rebuttals to politicians saying we >> need Key Recovery as a "reasonable balance between the needs of >> law enforcement vs. freedom of crypto"? > >I don't know how elegant it is, but here's my response: > >Compromising the public's right to privacy gives away not only our own >rights, but those of our descendants. The government must make an >extraordinary case to justify undermining those rights, and so far it >has not done so. "So far it has not done so." This "argument based on utilitarian need" is at odds with the First Amendment. The notion that a form of speech in letters and phone calls and conversations could be compelled because, say, the government concludes that it is needed to stop some criminal actions, is ludicrous. A policy requiring certain forms of speech is no different from a policy saying the government may enter a house when it wishes. I am drawing the parallel with the Fourth deliberately: no amount of "study," even a study by such august persons as Denning and Baugh, could ever conclude that wholesale, unwarranted searches are permissable. The Fourth was put in just to stop such broad conclusions. Likewise, the First is clearly directed against such broad restrictons on speech (and religion, and assembly, and complaining (petitioning)) so that no "study" can be used to broadly restrict speech. And make no mistake about it, whatever the accepted arguments for restricting certain types of speech (notoriously, the "Fire!" example) are, they are not consistent with a broad requirement that persons face imprisonment if they speak in codes, or fail to use transparent envelopes, or disconnect the microphones in their homes! >The most detailed research on the issue is a study by Dorothy Denning >and William Baugh investigating the extent to which crypto has >interfered with law enforcement's ability to get convictions: their >bottom line was that crypto has not in fact interfered: law enforcement >has been able to complete their investigations using other means. >There's no demonstrated need for Government Access to Crypto Keys >(GACK), so there's no need to compromise away our privacy. Bluntly pu, "FUCK "DEMONSTRATED NEED"!" And what if Denning and Baugh had reached other conclusions? (As well they might, next year, when crypto is more widely deployed.) I have strongly argued over the years against ever using some "government study" as the basis for our arguments, even when the studies appear to support our position. What the studies giveth, the studies can taketh away. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From ravage at ssz.com Fri Feb 6 19:09:31 1998 From: ravage at ssz.com (Jim Choate) Date: Sat, 7 Feb 1998 11:09:31 +0800 Subject: Most elegant wording against privacy/law-enforcement "balance" (fwd) Message-ID: <199802070250.UAA09222@einstein.ssz.com> Forwarded message: > Date: Fri, 6 Feb 1998 18:31:49 -0800 > From: Tim May > Subject: Re: Most elegant wording against privacy/law-enforcement "balance" > >Compromising the public's right to privacy gives away not only our own > >rights, but those of our descendants. The government must make an > >extraordinary case to justify undermining those rights, and so far it > >has not done so. > > "So far it has not done so." > > This "argument based on utilitarian need" is at odds with the First > Amendment. It's at odds with the entire concept of 'inalienable rights' and 'government instituted by the governed'. > I am drawing the parallel with the Fourth deliberately: no amount of > "study," even a study by such august persons as Denning and Baugh, could > ever conclude that wholesale, unwarranted searches are permissable. The > Fourth was put in just to stop such broad conclusions. I would say more broadly the Constitution and in particular the Bill of Rights was implimented to eliminate these issue from the federal level. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From WebWarrior3 at InfoWar.Com Fri Feb 6 19:21:51 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Sat, 7 Feb 1998 11:21:51 +0800 Subject: Lets check this out *yawn* In-Reply-To: <34DBA006.46743131@tfs.net> Message-ID: <34DBCD51.E7B8DC7B@InfoWar.Com> This person doesn't do it...there is nothing on the site that is in the least bit out of the ordinary. Here is the HTML. There IS a great hacking page run by a guy named Sandman... http://www.unitedcouncil.org is the URL for that one. -Scott Brower http://www.infowar.com http://www.efflorida.org Index of /Vienna/6318

Index of /Vienna/6318

      Name
Last modified     Size  Description

[DIR]
Parent Directory 06-Feb-98 14:23 - [SND] ACDC.MID 10-Sep-97 05:12 21k [SND] AXEL-F.MID 10-Sep-97 05:13 35k [SND] GANGSTA.MID 10-Sep-97 05:13 60k [SND] HCALIF.MID 10-Sep-97 05:14 136k [TXT] INDEX.HTML 10-Sep-97 05:12 4k [SND] ISWEAR.MID 10-Sep-97 04:53 20k [IMG] MAILX.GIF 10-Sep-97 04:53 3k [IMG] MURLK.JPG 10-Sep-97 04:53 6k [IMG] ROCKET.GIF 10-Sep-97 04:53 2k [TXT] SDFDB.HTM 10-Sep-97 05:01 4k [SND] STAIRWAY.MID 10-Sep-97 05:02 28k
sphantom wrote: > Here is something for us to check out. Was just emailed to me today. > > I am curious how this person does it. > > Dear Friends, > > If someone named SandMan asks you to check out his page on the WEB > > DO NOT!!! > > It is at www.geocities.com/vienna/6318 > > This page hacks into your C:/ drive. DO NOT GO THERE > > HE WILL REQUEST A CHAT WITH YOU....don't do it. > > FORWARD THIS TO EVERYONE... From 1gI93TS23 at juno.com Sat Feb 7 13:43:57 1998 From: 1gI93TS23 at juno.com (1gI93TS23 at juno.com) Date: Sat, 7 Feb 1998 13:43:57 -0800 (PST) Subject: Subliminally Seduce Women Instantly Message-ID: <6ORJuc63p6U> Win over any woman you want in less than an hour. GUARANTEED! Start dating women that until now were 'out of your league' GUARANTEED! I know it sounds too good to be true, but it is now� possible for you to achieve in minutes, what typically takes most men days, months, and sometimes even years to accomplish...SEDUCING A WOMAN! Skeptical? Read this. Then visit our web site to learn the FACTS! Scientists worldwide agree that, in certain applications, subliminal mind control can accomplish amazing things. You might have heard how in the 1950s subliminal advertising was used in movie theaters to induce an unnatural craving for popcorn and an unquenchable desire for Coke. There are many types of subliminal thought control.� Certain subliminal influence techniques work AMAZINGLY well, while others hardly work at all! If you don't think modern subliminal technology can change your life, THINK AGAIN! For less than the cost of a single good meal you can instantly and permanently change the way women treat you. GUARANTEED! And the best part is that (due to a legal loophole) this is perfectly legal! If your luck with women has been anything other than GREAT, find out the FACTS by visiting our web site. Once you have received and tested one of our audio tapes you will be AMAZED! Don't make the mistake of confusing the antiquated technology used in the past with newly developed digital mastering techniques. We have spent years developing computer enhanced techniques that enable us to produce mood altering products that work on any woman, anywhere, anytime... GUARANTEED! You cannot turn women into mindless sex slaves with this or any other technology. You can, however, induce at will, natural urges that would otherwise lie dormant. It is simply a fact that any natural human desire such as sleep, hunger or sexual impulses can be GREATLY INTENSIFIED by using subliminal commands. When you play these recordings in the presence of any female who has a normal sexual appetite, look out!� She won't know what has come over her! It is completely undetectable! Even women you barely know, when subjected to this invisible aphrodisiac will find you more interesting and better looking. They will find themselves mysteriously drawn and sexually attracted to you. GUARANTEED!! Each of our musical recordings comes with a second 'demo' tape (free of charge) that has the subliminal messages brought forward for you to hear loud and clear. Don't let your girlfriend hear this one! WARNING: We have given you the opportunity to be more successful with any woman you choose. If you do not at least check out the facts for yourself, you will only be cheating yourself out of happiness and romance. To find out more about these AMAZING tapes at our web site at: http://www.ivpco.com/~speccass/index.html or, if your mail reader supports hyper-links, CLICK HERE If our main web site is busy, try our new mirror site: http://www.emptyshell.com MIRROR ********************************************************************** This message was sent by Overseas Internet Promotions, Inc. of Miami. If you have a product or service you want to market on the Internet, call us today @ 305-668-7502 ********************************************************************** From nobody at REPLAY.COM Fri Feb 6 22:46:42 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 7 Feb 1998 14:46:42 +0800 Subject: BBN Message-ID: <199802070630.HAA00869@basement.replay.com> Timothy C[unt] May is the living proof that anal sex causes pregnancy. ____ \ _/__ Timothy C[unt] May \\ / \/ From nobody at REPLAY.COM Fri Feb 6 23:02:10 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 7 Feb 1998 15:02:10 +0800 Subject: <> Message-ID: <199802070635.HAA01426@basement.replay.com> -----BEGIN PGP MESSAGE----- Version: 2.6.2 pgAADLnWeabhI+0ORYNMU/lAjji9vyEXXFdij7LrQ3IiyJVTUhZcq0tebm1ghqo0 tazql+yg+RCY3vyHTYw1NsNdbCbimEQV/iOGt6C37R/GbtjTbGynyS5ZaYm7h0tD MmyLxHn1VMtyrm/V42fkLEIxiIdV4/CyI1G+hMCOg1Z3f8n96ddzTShPNw3AjKF2 0iXKAzUW5oC0Fd50WyEmNL2LyGMpJ2FDYGILSV1bKtxIEUPDemhq54HjnxCaBw8Y zdNUSEgAv3SeXJZKKIIm5/cVfZ4cxiw/JahuvV02X9NFLLaSaQPV6fBjhXYH28bH SaEpdpKaMT4Ldjpun6UYYpI6CXqI47ABoL3+I/17ycKWuoU4cpqN3cD7dOOamf+w oArX+bo2npyd47Q/ZEsJI4Hrx2E00tcKbZ/Umx02SkkjDlFNdvjuoWgmnWl0+zrn gSDjCBDDFcEbG2WNlnlFYNA94dYQPI+L9PcR3iCe1BPyku3M5/fb5VpGpeK1HtYr lAH/rrH8+sMP40nkcxirlgdgrw6G8cEl4V+DHfxRMup4Zht2b1zG7igXDKdqg7Bg /Dve+ZSumEpmBf0n3f83APtlPeeSmfG6C3xzmUtCxtE9GGJx678I7etIx2KVs326 zFQPMgOF6ij+JdtF0QQEZ0vKWvec0z1syrsR4ZJzqgcOg50EVa95uhIkYypZCuSy 0jDZerDmwjdlAEhIIEP9JVTR7GjgfiST5qAIJ5tfKAjDDBcPpv/trNFOIBu6TXJn gQH2G8NlB2Hs23Ja76bdwcT+K7GYmqLnrM38pEX3LRBvAGnPkIhwpfzijNmVD5CE Tne1dHgz+hTtEBzFK4zXSrZNU0rhL8baGirc68yM9U0V91ritC0BJXeUOM4uw/mu N6WhGvYd9DI6ZBZHZqXmIyb0oYTbmNn8MMtZtIbSPseyzIZaVTmgeaLSwTa5zERz Z19yFb10wLFRHkqfCV3Jt7gRhGpHiQCpzlzmyDSLHjPRx+pPAqv2+RwMFEapRyIJ DIj+RqG8aTc2OK4rOjOWCKD2yf7+naqYSC1YEsix+voWWCZ7Jpn3pAZy8EMnevaF FsXwdgqrSEgAxrc+f1MXn3Nl3gyE0mOVQ3n29OgkCM6NNvfuA+w7y6G3njDidk5f P6l3Y0iRc+OQH/TC4EF0aQ5y4QEJQykLc2dtiH/Cn9bcwCMLvOGpRsfiiPqGMTNO Atngp2e4OTLLTuAZNvHNZxTe4DAHNMHOGDKOIuF1Jp+5UQzNfuKble5y8BNauJDB sRpgzc3jndODxNnKpQy03RPFqR9XPwk2Gxl1IdSSf1NhvGwLaWrfyNpCnDj3aWmb ce9jGITKYvZZlg2w5u0U9v+xSrnAH2GSWWLnIEHsfGKTxY2peqsLUwm6zEvijrsY 1Xvl7obQtucTxz6QZdo56wkUO6Qmr8x6TBvr0D3IUtd+pDbwy3jQlaOvQgKjUJpy e+JtxeyB4/GLhBAW7kyYThr2FSKxWGo+t7ADJFGjYmgEuCZDQ7noZiLFuLeTCSVu GQGsDHilKlZFnDAWBhN0BVxcMvrbYd+SNM3UIx/ZZ7bASp7PPgEh6xc45nxNkTwM D9jybrsMT6pthHSzWT9irnKP88ffM0bpOAKsmyvb3C/vPR2vcKeGQd55KmgTA9AO hqu5nqpNHjcmqEQgwv1i3cq5PS7Sb3hpJfItaYnRTGn6WEnVHjSU6qKK8dlAKuFL BMeKgn6oZd2Ykfpfl5yYQNmSxxJyeH2ohgoIPrsMM00VxLmLqpjm8ZEo9Bhle2is ni+NI3oruVJf//TUy5FYXIhw0BTo7ZOVjNVzdf7bMfJ6CsutYvQ0Ok6a5jehH3vb fwMirrsU7tMMQWm8tQg1ODwJYCrQxucuugXkWz7z3IOG2Dzd8O3JV0KEs3uFuBAi JV5f2wSabRli5bb33ZsJrIePojnjDWE6202KjSh4m7RyjczMjE+ImUEEqK6SshFa 8CWucQrr2B0NpyrDkPMSi1sOT4QUGGhM6HmST1aEOo4/OoesIH70rJ6wdJ24WDDb NlTOzN2SZetIjHW81RE7KUl6xLRlC/P9tF92HrS/KZz+/WZV3nBkUMMrojZaTwsR e/OwNwIUGj/X/bZbaxrYX7l90eGXNhwGu0zzAJluhg5/7pC2hrZIbDYLpILirCTa l/ArMao2FibzMAzdFX4hpFI9n2aoPsM2ac5unJzomZxg2+BFtdi4e6o2Rl3vocPi df7m21HsSsei2q7skYL8hEE2x5e8fhAyRL+OkCJQeu5wFko2e5DOlCtMUmHInq6Z pSFK3w8B6reIkCJ0957DdgUf8PeS+DibO4FjuWgRKt3PpB9ySKawmQ1fssVFUpDc P/nIn0QXihma7KVT6acUL5IivI2XBJS5aK24Fs2R+/3hncbN0SIk5UZf2UOxMKFX heHf0+7yi+i98FI+6DEioIObdgRR8bVBjIK/2iVj/U89UsKGUimYSlHuREDwUEA7 7x7+Jhyaf3Mwygi4XQAwgQR1PZDTu+66AMvJJQoXXEGRSxwIc+6x6coZCMvI67r5 9eFnj4VWjrljrylYN5CZvmBj3E8SZEYrGKpuvawJ1hSVV0OLZYasNVVOQe83/0Lx oE6lF8bZRnGqxykyTqFXveGt6nK5QJophfG/gS2rd4oEsgL3UDYMygKBvH4m1IB+ MjEfckXXjhnSvTXTP4qfCEbqd3nm6dLRsS7fIRCM2HHm7EJ1KZpuNg0XXqAplkqs x58P0cyUlzDfg/sJqyj7LidWiatRsRuC95i7c6KuZwkmVWKuL1ZNLtgPAL4Fjwik 2vbDd1c7TmqpiHWqdX2IeITY0K9Ob+FquZhuT4gEGDbH5/T8RANNNosJ7ck8eBog PjBVvddG0XN9CeFQ5zrMgtMJHtixlEPFStd79CU5HvI5rUW9XKorGEdwGjt/QnMR vHMXq8ruEjlZpr/WKY+klzF8qhh6IsUD2SEnQrc/BvuIY+3cQzrsEf4UWEKX2j82 fbd9JZ6ehQP0UfASHODezmtKIwcAJOWO7qPZlAGxqECiTAK0GHyYGofvHM/2h3wU 83/y4DGcWkktqzSEwMTU5kBe78ORKigDEymsX9GWsBjbhQLnDQStUk1kYPd1mpY8 SWCwIRx0OvsOTlTl9qpHfeKxaDZXIxWngJ3M9FnXLuaVkKerd09h0FQDlFgpu49m bV7rZeh95/yma8yCM1TyZp++aQZZNuvSlmIvuUUodsb3oXoDsVZpfhEW4ZBng4+U 1ORy2gEQArPAsmDc2thk6M9jT4HEO0uWQC6ok1amNu4XKEseSi60tpITwSy1KlGm odZL+nyPQPyHJMVmGFxx+iiIWHxmXgInBpMZMcRYDnDP6rwBchit1uO7QVuxvwUx 5O/b4CxgD3bZPVeWeayXCEwAa/pZIktVh/Bgco0+OBRvyOaoPvLh5H1X91dWzipk D1A5f0fkLbBeNm09EJNaL9oZmzc9vGrr+yjHQwvS7M5pS3YY9BPW5wI0AOCdy0nF LUr//uYMAOtkzxU66JTfwGt8FwKHxZcSQeaC1e3QRQF1/s78UILvUTWOiqu0Fo/r FMa4QAxwL5Uifs4jLo7RXPdwpZFN6VnPG7lZtq+jHvXXoLm3NotixXkgZhyUInMm JUHZZ1NguZjSpLUXGmnNl8gTmstZk9JIgz1A2LjN9W7U3zF8i9BGS8T2t5xalKgk TqmR9+sWiYynxCh+O43L8vmn8zjosO3h34H0BuT+6rWN8h8jOaZ9j6arPhqzk+w2 8sPR1DHpNQtaa1PQI5RVmsgoZ6YQfbJbL9YBzDv+wmp3uuLTAiNYLRmPsMfdRB4t 9pPVyRIjhrLGUGRroV8a8syRdofNZKx4f2s8o5R+rwihlTa+pkdB0F4oqr8HP3nz 6RjfRzSVpAH5HnfzkaaAkn9F19ztNTRbueMsZY2QtdHa/8B5qrHXZTd9fZ0AbiqR ScBTctOftLyHx44XbCjtUpNXyt0Dc/wnvLKfZsyq3OkttAFZsfJJaf7MLgqnuBMZ hEbfTF4+NIhPvOTaknUOQmIv0HUeghEHpRJpSK4S9/YltDRh2ARYRDbJhno/kDbF ZiquLTnMaK8ipdgiG0wOMQ/9JmWiv94xC8vj4lEudBkePSjOgMQ/ydZFySsLAC8i CA0HbL7UXToBDG9ML78DB8KXfGHcxA7ggo12733ob2vXbY93SPvDw6xT6PpCrcck LpE19Y7s3Ji7TvSBpvASXvcK/1Pl7IFFDE4VGXuqZYMPQqdLSnAm31YXO2yODn44 qcVUnXTbHDoO+8vw5AU7AXb1QRilt7RUMYOD+ZMvjRwviun+e81CWJopCswOFA== =wNBG -----END PGP MESSAGE----- From bill.stewart at pobox.com Fri Feb 6 23:02:24 1998 From: bill.stewart at pobox.com (bill.stewart at pobox.com) Date: Sat, 7 Feb 1998 15:02:24 +0800 Subject: the best justice money can buy --Lessig (fwd) In-Reply-To: <199802051634.KAA02262@einstein.ssz.com> Message-ID: <3.0.5.32.19980206181238.007b4ac0@popd.ix.netcom.com> At 10:34 AM 2/5/98 -0600, Jim Choate wrote: >If there were no copyright nobody would have any reason to market >software or much else for that matter. I would predict that much of >the technology and infrastructure we have now wouldn't exist. >It would also stiffle [sic] creativity and new methodologies because >there would be no profit in it to recoup development costs. If there were no copyright, markets for information and entertainment would definitely have evolved differently than they have in the US and Europe, and would use much different mechanisms for getting money to the producers of information, such as standard sale contracts.* On the other hand, if there were no colonialism, markets for sheep in New Zealand would have evolved much differently than they did, a problem they're now gradually working their way out of. The music business, for example, handles paying authors when their works are performed by performers through mechanisms other than just charging big bucks for sheet music. The Free Software Foundation found that with a bit of academic and military socialism to jump start it, there are a lot of reasons for people to create value and beauty, and you can even talk corporations into paying money for support. Van Gogh found good reasons to paint, in spite of being broke. Michaelangelo found good reasons to paint, and Gutenberg found good reasons to print, in spite of not having copyright protection. Newspapers eveolved in an environment where copyright wasn't a big deal; if your competitors ripped off your stories, they were a day late, and you could rag them about it in your own paper. Mainframe software evolved in an environment where contracts covered use of the software, and copyright was seldom relevant; that has gradually changed with mass-market computers, but it took a while for courts to accept the idea of copyrighting software, and the industry didn't refrain from writing the stuff. Copyright is certainly a major market convenience, because it means that individual authors, middlemen, and readers don't have to negotiate contracts each time they trade information for money, or having to read the annoying shrink-wrap licenses on books the way they did for a while on packaged software. It also makes it more difficult for alternative mechanisms to evolve, because it's got an 800-pound well-armed gorilla subsidizing it. >Those who would survive in such a market would be >the 800-lb gorillas because only they would have the resources >to squash the smaller companies. If I read Mark's note correctly, the gorilla he was talking about wasn't MicroSloth, it was the government. We may joke about Gates being the Evil Empire, but it's clearly a joke; we've seen the real thing. >Free markets monopolize. and in a following note, Jim says that that's true mainly for the long run, not necessarily for the short run. It's not only incorrect, especially as expanded upon, it's irrelevant to the moral question. If your alternatives are free markets, where you and I can offer to buy or sell products without anybody beating us up for it, versus non-free markets, where some gang can beat us up for not going along with the program (whether the gang is the Mafia, the Pinkertons, the KGB, or "your neighbors in a democracy"), there's no question which is morally acceptable - even if the violence-based market is often more convenient for some goods. But morality aside, monopoly, in the sense of a single player or small group of players domination the sales of a commodity, is something that can certainly happen in the short run but is unstable in the long run unless the competition can be prevented by threats of violence (whether by the monopoly or the government.) If people are free to offer competing products, maintaining market share is difficult, and the market leader not only has to contend with the other big dogs, but with being nipped to death by Chihuahuas, and with being made obsolete by better technologies. Who monopolizes tabletop radios these days? (Who cares?) Who monopolizes Video Cassette Recorders? They're both relatively free markets, in spite of the FCC's attempts to enforce standards, and Sony's attempts to monopolize the BetaMax market. On the other hand, radio and TV broadcasting are near-monopolies, because the Feds have been "helping" protect our public airwaves. ------------ * Some Libertarians and some Libertarian-bashers will argue that using government courts to enforce contracts is still hiring the 800-pound well-armed gorilla to carry out your private business activities.... Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From dlv at bwalk.dm.com Sat Feb 7 17:31:02 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Sat, 7 Feb 1998 17:31:02 -0800 (PST) Subject: Washington on the verge of being nuked? In-Reply-To: <1.5.4.32.19980208003515.00744198@pop.pipeline.com> Message-ID: John Young writes: > Manhattan would be easily blown, remotely. Place a time-charge > beneath a car at the head each principal subway line (which > commence in other boroughs), set to blow at the main stations. > > For the West Side, supplement with a charge in the PATH train > from Jersey. > > For the East Side, supplement with another in the LI Railroad > from the Island. Also Metronorth coming into Grand Central on 42nd st.., But: Most subways are underground in Manhattan. A device that gives off enough bang to be felt above ground has to be at least as big as a suitcase. How likely is a suitcase unaccompanied by a human to go unnoticed on NYC subway? Not very. Under a bus seat? A little less noticeable. A smaller timed device would be limited to blowing up or gassing or incinerating only whoever's on the subway - and the worthy victims don't take the subway. I think a parked car (or a car driven by a suicidal driver) is more likely for delivering a suitcase or larger. > Forget anything above 86th Street, they'll applaud; like the > WVA and VA hillfolks will hooray the destruction of see-navel > DC and its high-pitch babbling wonks. I object to any terrorist plans that don't include the complete destruction of Columbia University and the City College too. :-) --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From nobody at REPLAY.COM Sat Feb 7 09:00:56 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 8 Feb 1998 01:00:56 +0800 Subject: Ziff-Davis on AP Message-ID: <199802071651.RAA08477@basement.replay.com> http://www.zdnet.com/zdnn/content/zdnn/0206/282755.html > Pie attack has executives worried > By Charles Cooper > February 6, 1998 12:10 PM PST > ZDNN > > This time it was a custard pie in the face. Could it just have > easily been a bullet in the gut? > > That is the subject du jour among startled industry > executives following the bizarre assault in Brussels > Wednesday against Bill Gates. While en route to deliver a > speech on technology and education, Microsoft's chief > executive was nailed in the kisser by a local prankster who > has made a reputation for pulling similar stunts. Gates, who > was unhurt, suffered no more than a wound to his pride, > soggy glasses, and an unexpected charge on his weekly > cleaning bill. > [snip for fair use] From tcmay at got.net Sat Feb 7 10:36:54 1998 From: tcmay at got.net (Tim May) Date: Sun, 8 Feb 1998 02:36:54 +0800 Subject: Galombos and a World where Ideas can be Protected In-Reply-To: <199802051634.KAA02262@einstein.ssz.com> Message-ID: At 6:12 PM -0800 2/6/98, bill.stewart at pobox.com wrote: >At 10:34 AM 2/5/98 -0600, Jim Choate wrote: >>If there were no copyright nobody would have any reason to market >>software or much else for that matter. I would predict that much of >>the technology and infrastructure we have now wouldn't exist. >>It would also stiffle [sic] creativity and new methodologies because >>there would be no profit in it to recoup development costs. > >If there were no copyright, markets for information and entertainment >would definitely have evolved differently than they have in the US >and Europe, and would use much different mechanisms for getting money >to the producers of information, such as standard sale contracts.* .... It's always hard to say how reality would look in a different universe, one with, say, no copyright laws. However, we have some indications, because there are some things which are very much like "intellectual property" which, in fact, have no protection in the courts. Namely, _ideas_. For better or for worse, ideas are not protected against copying, use, etc. (Before anyone jumps in and cites patents, by "ideas" I mean scientific discoveries, philosophical expressions, aphorisms, and so on, not _expressions_ of ideas in the form of working gadgets. And not "software patents" (with which I disagree, as do many of us). And not _specific_ instances of ideas in the form of essays or stories or whatever, which of course _can_ be copyrighted.) In our society, and in all societies with which I'm familiar, having a good idea is not protectable. (Again, not counting inventions and such.) And yet society works fine. Those who keep coming up with ideas find ways to keep coming up with ideas, and often to prosper, as writers, consultants, etc., often because of their ability to generate ideas. (There is a radical, and bizarre, subsect of libertarians called "Galambosians," who argue that even ideas are property. In their view, I could charge people 10 cents or a dollar or such for their usage of "crypto anarchy" ideas, or "Big Brother Inside" ideas, or for being influenced by my ideas in other ways. Hard to enforce, I'd say. Which is probably why the ideas of Galombos are not copied by many others. In his system, he'd be a pauper.) Think about an alternate world where ideas are protectable before saying a world without copyrights would collapse inevitably. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From ghio at temp0209.myriad.ml.org Sat Feb 7 11:12:29 1998 From: ghio at temp0209.myriad.ml.org (Matthew Ghio) Date: Sun, 8 Feb 1998 03:12:29 +0800 Subject: the best justice money can buy --Lessig suspended In-Reply-To: <19980203.154218.attila@hun.org> Message-ID: <199802071906.OAA06180@myriad> Tim May wrote: > (The real issue is going to be Web servers. Whether Netscape can prosper > in the world that is coming is unclear.) [snip] > Looks to me like Intel is the real winner here. Apache currently represents over 50% of the web servers in use. Even Microsoft can't compete with that. Microsoft's growth in web servers has been largely at Netscape's expense. So Netscape's move to the freeware market is not unexpected, but it's a bit late; they should have been pushing Linux/FreeBSD/etc to their NT customers long ago. The issue of differing tactics of Intel versus Microsoft has a lot to do with why Microsoft is getting scrutinized while Intel is largely being left alone, despite their similiar market share. The first difference is product quality. I have an Intel Pentium which has been working flawlessly for months. Microsoft Windows, on the other hand, can't go two days without getting screwed up in one way or another. Intel has had two or three major flaws in their products in the last few years (FDIV, F00F, and the fpu flag problem). Microsoft gets blamed for new flaws every week. Guess which company I have a higher opinion of? I am certainly not the only one who feels this way. Second, Microsoft is rude, arrogant, and offensive. They absolutely do not know when to quit, no matter how much bad publicity it gets them. Intel's behaviour hasn't been exemplary recently either, but they do know when to back off. Intel got in a little argument with Robert Collins a few years ago, but once the bad PR started, they left him alone. Microsoft, in contrast, has repeatedly harassed anti-microsoft web sites (such as www.micr0soft.com) kicked anti-microsoft people out of comdex, and so on. Like Scientology, such tactics usually only increase the attacks from critics. Intel's handling of the "slot 1" was a major mistake. Intel came off appearing to be a bully trying to squash competition, which earned them a lot of bad press. Settling with Cyrix/NatSemi was a smart move (which they should have done earlier). But at least Intel knew when to cut their losses and move on to other things. Contrast that with Microsoft's adamant, pig-headed pursuit of their bundling strategy; no matter how much bad publicity it gets them, they keep doggedly trying to shove it down people's throats. So next time you're meeting with Intel management, remind them that if they make quality products, their customers will be happy. If they sell lousy products and attack their opponents, they will get attacked back. (And Intel- please stop telling us about how great your secret proprietary bus interfaces are, we don't want to hear it, and it makes you look bad.) From eureka at eureka.abc-web.com Sun Feb 8 03:44:27 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Sun, 8 Feb 1998 03:44:27 -0800 (PST) Subject: Eureka! Sun Feb 8 '98 Message-ID: <19980208083853.9584.qmail@eureka.abc-web.com> Welcome to Sunday's issue of Eureka! BLACK LABEL Get yourself a FREE two day pass to Black Label! They have over 2,000 hardcore movies, FREE live fucking - over 200 with sound, 10,000 hot sex stories, Top-quality hardcore pictorials, and so much more you'll be amazed. Check it out! Black Label ---------> http://www.xxx69.com/banner_mail.html Playgal - No.1 in Internet Hardcore! http://www.playgal.com/playgal/banner_eureka.html Playgal presents FREE LIVE FUCKING, and over 2,000 FREE XXX MOVIES! VELVET-LIPS This is a hot website. It is also a paysite. But there are some great free pix for you to check out before you join up. Quick loading and thumbnailed for easy access. These images are high resolution and open in their own frame. This one may cause a stir in you pants. Oh yes, you betcha, uh huh! Velvet Lips .................... http://www.velvet-lips.com/ ANNA'S ORIGINAL PICTURE GALLERY Careful, each and every image will toss you to a signup page but the ones that you do see are impressive. Super young girls fucking and sucking and spreading their pussy for you! Anna's Original Picture ......... http://www.supergirls.com/ SUBLIME Spanky BDSM pix! After entering the site click on, Sublime Bondage Sluts. Down at the bottom of the page there are a few quick loading thumbnailed images of some sweet pain pix! Sublime ...................... http://sublime.wizardtech.net AMATEUR SITE Everyone like a good looking amateur! This site delivers a lot of young ladies. Quick loading thumbnailed images. Here you will find some nice looking natural tits, pussy and ass. Amateur ........................ http://www.amateursite.com/ #READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! #$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A # HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ 20vids+Chat -> http://209.1.31.175/chat/videochat.cgi?eureka CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Renee: An amateur fan's ultimate dream! Renee' possesses everything you could possibly want in a woman: head turning looks, a beautiful body, a gorgeous face, and a sweet disposition with a penchant for being nasty! ( She likes girls too, and has the photos on her page to prove it). Her site is well done and easy to navigate with TONS of FREE pictures. Visit Renee' now to visit perfection. ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY HotStories.com: Tired of all those pics? Hot Stories lets you use your imagination to is full potential. Over 100 free sex stories in 8 different categories. Our stories are worth a thousand pics! ................ http://www.hotstories.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?080 Pic 2 --------------------------> http://137.39.63.229/?081 Pic 3 --------------------------> http://137.39.63.229/?082 Pic 4 --------------------------> http://137.39.63.229/?083 Pic 5 --------------------------> http://137.39.63.229/?084 Pic 6 --------------------------> http://137.39.63.229/?085 Pic 7 --------------------------> http://137.39.63.229/?086 Pic 8 --------------------------> http://137.39.63.229/?087 Pic 9 --------------------------> http://137.39.63.229/?088 Pic 10 --------------------------> http://137.39.63.229/?089 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From contest at compbroker.com Sat Feb 7 11:58:26 1998 From: contest at compbroker.com (contest at compbroker.com) Date: Sun, 8 Feb 1998 03:58:26 +0800 Subject: Monthly memory giveaway - now win up to 64 Megabytes of Memory! Message-ID: <854712721210.8391275815@compbroker.com> For the February 1st Drawing, our grand prize winner of the 64MB Memory is Michael Rowe of Akron, OH You could be the next lucky winner! The Memory Broker has increased it's prizes. Every month we will select 3 random winners from our contest database. The First Place winnner (i.e. first name drawn) wins an incredible 64Mb of RAM, 2nd place wins 32MB of EDO RAM, and the third lucky winner gets 16MB of RAM. You can also apply the winning memory as credit towards a future order. No purchase is necessary to win. Winners are selected by a random drawing, so the more times you enter (once per day only please), the better your chances to win! Enter Now at http://www.compbroker.com/ Good Luck! The Memory Broker Inc. http://www.compbroker.com contest at compbroker.com From tcmay at got.net Sat Feb 7 12:17:16 1998 From: tcmay at got.net (Tim May) Date: Sun, 8 Feb 1998 04:17:16 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: <3.0.5.32.19980206181238.007b4ac0@popd.ix.netcom.com> Message-ID: Remember to stay well clear of soft targets as the war with Albania, er, Iraq starts in the next few weeks. Yeltsin warns the U.S. publically that an attack on Iraq could have grave consequences, perhaps even leading to another world war. He was almost certainly _not_ threatening to use his own nukes against the U.S. So what was he talking about? Maybe he and his intelligence services have a clearer idea of where some of those 50 to 70 missing suitcase nukes have ended up. Saddam still had a lot of money even after the Gulf War. Mightn't he have bought some of those surplus nukes? Plenty of time over the past couple of years to get them into major U.S. cities. Especially cities like Washington and New York. If Iraq's cities and palaces and such are bombed, as expected, he may put out the order to hit the enemy where it will hurt. A timer set for an hour and the agents are well away from the blast. Biological agents are, I think, less likely to do widespread damage. In a few years, perhaps, when the technology is more widely available, but for now it looks like U.S.-class bioweapons are not yet available to so-called terrorists. Of course, after such an attack, though hundreds of thousands of criminals may be disposed of in Washington, martial law and a suspension of the Constitution can be expected. So it won't be all good news. And financial chaos may reign if business centers are hit. Downtown Washington is the last place I'd want to be. For multiple reasons. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From declan at well.com Sat Feb 7 13:34:12 1998 From: declan at well.com (Declan McCullagh) Date: Sun, 8 Feb 1998 05:34:12 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: Message-ID: At 12:02 -0800 2/7/98, Tim May wrote: >Of course, after such an attack, though hundreds of thousands of criminals >may be disposed of in Washington, martial law and a suspension of the >Constitution can be expected. So it won't be all good news. And financial >chaos may reign if business centers are hit. > >Downtown Washington is the last place I'd want to be. For multiple reasons. I live in Adams Morgan, perhaps a mile from downtown Washington. Of course I work in the heart of DC, in the lobbyist corridor, blocks from the White House and agencies like the FCC. (Note to terrorists: the Pentagon is miles away, on the other side of the Potomac. Take the blue or yellow Metro lines. You can lug your H-bomb through the handicapped turnstiles for no additional fee.) I've tentatively decided against moving all the way to West Virginia, which is 60 miles away. I'm now thinking of moving around 40 miles out, close to the WV border tho still in Virginia. Main reason is the commute. But it'll still be in farm country. Still, as I've said before, if terrorists are going to blow anything up, it makes more sense for them to go after Manhattan. Though it is on an island, which might make logistics and escape (?) difficult. -Declan From tcmay at got.net Sat Feb 7 14:10:18 1998 From: tcmay at got.net (Tim May) Date: Sun, 8 Feb 1998 06:10:18 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: Message-ID: At 1:31 PM -0800 2/7/98, Declan McCullagh wrote: >I live in Adams Morgan, perhaps a mile from downtown Washington. Of course >I work in the heart of DC, in the lobbyist corridor, blocks from the White >House and agencies like the FCC. (Note to terrorists: the Pentagon is miles >away, on the other side of the Potomac. Take the blue or yellow Metro >lines. You can lug your H-bomb through the handicapped turnstiles for no >additional fee.) (Tariq, make note of this!) >I've tentatively decided against moving all the way to West Virginia, which >is 60 miles away. I'm now thinking of moving around 40 miles out, close to >the WV border tho still in Virginia. Main reason is the commute. But it'll >still be in farm country. Someplace like Leesburg? Horse country. >Still, as I've said before, if terrorists are going to blow anything up, it >makes more sense for them to go after Manhattan. Though it is on an island, >which might make logistics and escape (?) difficult. Depends on what the goal is. I would assume Iraq would be a lot more interested in making a symbolically important statement by hitting the capital of the Great Satan (Tariq, help me out here). If the goal is simple disruption of finances, NYC is probably a better goal (though a hit on D.C. would trigger lots of chaos, too). If the goal is killing people, I'm not sure what the best target would be...it might be some other city completely, depending on wind conditions, presence of refineries and oil storage tanks, dams, etc. But I would bet on D.C. being Ground Zero for all the various freedom fighters the U.S. colonialist/paternalistic superpower actions have pissed off. Of course, hitting _both_ D.C. and NYC might make a lot of sense. Especially in case one bomb fizzles. If they have several suitcase nukes, it makes more sense to deploy them in several cities than to have the damge zones overlap (or even have one blast affect the later bombs). Timing could be within seconds easily enough, but even spaced hours apart there would be virtually no chance for NEST to find them. Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From nobody at REPLAY.COM Sat Feb 7 14:16:29 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 8 Feb 1998 06:16:29 +0800 Subject: Monthly memory giveaway - now win up to 64 Megabytes of Memory! In-Reply-To: <854712721210.8391275815@compbroker.com> Message-ID: <199802072158.WAA15417@basement.replay.com> Thank you for contacting us to request a security audit of your web site. Based on the information you provided, we have determined that you were running an insecure operating system (Microsoft Windows NT) as evidenced by the blue screen currently visible on your computer monitor. Should you wish further investigation of your site vulnerabilities, please continue to send us annoying spam requests. contest at compbroker.com wrote: > For the February 1st Drawing, our grand prize winner of the > 64MB Memory is > > Michael Rowe of Akron, OH > > You could be the next lucky winner! > > The Memory Broker has increased it's prizes. Every month > we will select 3 random winners from our contest database. > The First Place winnner (i.e. first name drawn) wins an incredible 64Mb of > RAM, > 2nd place wins 32MB of EDO RAM, and the third lucky winner gets 16MB of RAM. > You can also apply the winning memory as credit towards a future order. > > No purchase is necessary to win. Winners are selected by a random drawing, > so the more times you enter (once per day only please), the better your > chances to win! > > Enter Now at http://www.compbroker.com/ > > Good Luck! > > The Memory Broker Inc. > http://www.compbroker.com > contest at compbroker.com From dlv at bwalk.dm.com Sat Feb 7 16:25:21 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Sun, 8 Feb 1998 08:25:21 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: Message-ID: Tim May writes: > Depends on what the goal is. I would assume Iraq would be a lot more > interested in making a symbolically important statement by hitting the > capital of the Great Satan (Tariq, help me out here). > > If the goal is simple disruption of finances, NYC is probably a better goal > (though a hit on D.C. would trigger lots of chaos, too). If the goal is > killing people, I'm not sure what the best target would be...it might be > some other city completely, depending on wind conditions, presence of > refineries and oil storage tanks, dams, etc. > > But I would bet on D.C. being Ground Zero for all the various freedom > fighters the U.S. colonialist/paternalistic superpower actions have pissed > off. NYC is the seat of the United Nations. It would make a good nuke target during one of those UN events when a bunch of heads of state visit. For an impact on the financial markets, nuke NYC and London at least. NYC is also vulnerable to chemicals in the water system. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From jya at pipeline.com Sat Feb 7 16:40:08 1998 From: jya at pipeline.com (John Young) Date: Sun, 8 Feb 1998 08:40:08 +0800 Subject: Washington on the verge of being nuked? Message-ID: <1.5.4.32.19980208003515.00744198@pop.pipeline.com> Manhattan would be easily blown, remotely. Place a time-charge beneath a car at the head each principal subway line (which commence in other boroughs), set to blow at the main stations. For the West Side, supplement with a charge in the PATH train from Jersey. For the East Side, supplement with another in the LI Railroad from the Island. Forget anything above 86th Street, they'll applaud; like the WVA and VA hillfolks will hooray the destruction of see-navel DC and its high-pitch babbling wonks. As will anyone of any capital (or high-tech vale), globally, not drunk with power or mad to get it. That's what horrifies the powerful about of terrorists: they're both spitting images of their opponents. Both willing to kill indiscriminately for vainglory of blind faith and ambition. Both willing to betray their kind for a step up. Probably the stealth bombers will led by a highly trained ex-, or covert member, or Top Gun grad, of a duly authorized terrorist, wing, sub, cell set up to kill for a culture's honor and commerce -- for blood-drenched national security. USG and IraqG, any G, joined at birth, never separated, working in concert. From nibor55 at juno.com Sat Feb 7 17:21:55 1998 From: nibor55 at juno.com (robin parker) Date: Sun, 8 Feb 1998 09:21:55 +0800 Subject: "Ken and Brenda Kingston" : Telephone Scam Alert Message-ID: <19980207.180654.3166.6.nibor55@juno.com> --------- Begin forwarded message ---------- From: "Ken and Brenda Kingston" To: "Bill Manago" ,"Ken Kingston" ,"Mark & Kay Barrett" ,"Mike & Dianne Higgs" ,"Mike Roberts" , "Rachel M Parker" ,"Robin Parker" Subject: Telephone Scam Alert Date: Fri, 6 Feb 1998 20:07:14 -0700 Message-ID: <001601bd3375$82a232a0$b037c5a9 at pc1> I want to let all my friends know about this scam going around. It does not matter who your local or long distance carrier is, this can cost you a lot of money. Please read and if you get a call like this, report it to the police and the FCC. If you have a caller ID, get the number too. Subject: High Priority message High Priority ** On Saturday, 24 January 1998, Naval Air Station, Joint Reserve Base, New Orleans' Quarterdeck received a telephone call from an individual identifying himself as an AT&T Service Technician that was running a test on our telephone lines. He stated that to complete the test the QMOW should touch nine (9), zero (0), pound sign (#) and hang up. Luckily, the QMOW was suspicious and refused. Upon contacting the telephone company we were informed that by pushing 90# you end up giving the individual that called you access to your telephone line and allows them to place a long distance telephone call, with the charge appearing on your telephone call. We were further informed that this scam has been originating from many of the local jails/prisons. Please "pass the word". Brenda --------- End forwarded message ---------- _____________________________________________________________________ You don't need to buy Internet access to use free Internet e-mail. Get completely free e-mail from Juno at http://www.juno.com Or call Juno at (800) 654-JUNO [654-5866] From foupe at compuserve.com Sun Feb 8 09:54:38 1998 From: foupe at compuserve.com (foupe at compuserve.com) Date: Sun, 8 Feb 1998 09:54:38 -0800 (PST) Subject: Young Hot Girls New Site Message-ID: <199802081631RAA1411@post.120.165.41> >>Young Hot Girls New Site Can you handle 2 young, hot, sexy girls? Cum watch us at: http://www.livewhorehouse.com Where you can complete our menage-a-trois. We really hate it when you don't cum. Luv Nadia and Alexa XOXOXOXOXOXO ====================================== WE HONOR ALL REMOVE REQUESTS!! JUST MAIL YOUR REQUESTS TO: jackpotx at ix.netcom.com ====================================== From ATU5713 at compuserve.com Sat Feb 7 19:39:31 1998 From: ATU5713 at compuserve.com (Alan Tu) Date: Sun, 8 Feb 1998 11:39:31 +0800 Subject: What's the latest in factoring? Message-ID: <199802072222_MC2-3262-79F5@compuserve.com> -----BEGIN PGP SIGNED MESSAGE----- Hi all, First, I want to say that because I've heard that traffic on this list is heavy, and I don't have time to file away 40 messages a day, you must write to me personally in order for me to see the message. My PGP key is provided at the end of this message. What is the latest factoring breakthrough (at least in the civilian world?) I had heard a while back that the most recent event was accomplished by Samuel Wagstaff of Purdue University, whose team factored (3^349-1)/2, which is a 167-digit number (about 552 bits). Is there anything more recent? Also, whereas 1024 bits was the commonly accepted threshhold for key lengths more than two years ago, what's the threshhold now? Because I have DOS (and like it) I use PGP 2.63ix, when should I retire my 1024-bit key? I don't expect anybody to answer that I should do so immediately, but can someone give me an idea on what people are doing in regard to key length? Sincerely, Alan Tu -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: Requires PGP version 2.6 or later. iQCVAwUBNN0kkJezmBrl2RXhAQGxnAP9HyIvtTcOeN77s3p80OmSefhagtfxQGEm H3NqWzxrqEvfODat63UFDVxcf28cSSog3666Icys1nLY9JhNSFZrruejbRIJ6P4o AKHfxBwUSO00GvSyCl9nI5VjJDoRG2elDZf7iPP1M9h+IoTXuSDpdWnL9uBpqhvi SFg4sXOKEOA= =co6G -----END PGP SIGNATURE----- Type Bits/KeyID Date User ID pub 1024/E5D915E1 1997/04/27 Alan Tu Alan Tu <102534.2165 at compuserve.com> -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.3i Comment: Requires PGP version 2.6 or later. mQCNAzNivkwAAAEEALdGUXD3j+RioIirVG46N6LaGD3YMMVVT5Mjwr5JojQsDICy 856I06Ugo/Fqid2A/os7v/gwE+Sj/WhMERgTsTejUZtsucTpS9sae+cc27Fjjq1l hOnqcLZqnHDDNyn3+jesVFPLnRlSoHbmcBK1XDW/SJT1anZz55ezmBrl2RXhAAUR tCBBbGFuIFR1IDxhdHU1NzEzQGNvbXB1c2VydmUuY29tPokAlQIFEDOguk6Xs5ga 5dkV4QEBBF8D/1B0ePqlMavWEUMP0uTmyvWFI7jooAcih6uHZFo2u+u3EzE2Is8X EoLHg39DhjleTHPu6TnGsWIiwDYEslzYeVw/Cglx6eliYIr/qs7peEywuhtZsEFH ln6yR9IE6rX3b3GCvPSQ5uPhXWrd2kWaZvG4rQ4Oj1m3yTrFaPRqCBPvtCRBbGFu IFR1IDwxMDI1MzQuMjE2NUBjb21wdXNlcnZlLmNvbT6JAJUDBRAzyUJWl7OYGuXZ FeEBAc4TBACT8gLtyE0C8NBGs9aDa9kHfeNzN8VbNfUpoOiWi4duAAZFiAt/e+ji J2BUMLIY8kzm2WX4mVzpKYjvea5TtHeQgbESV1HVZ5k7abENMUYz5nSMloOE+bb+ XRzgGgFF3htGXDJNywlLNgoYi5vTMT0pbGlCzOu215Cc4mFls2w1iA== =CM85 -----END PGP PUBLIC KEY BLOCK----- From guy at panix.com Sat Feb 7 19:39:36 1998 From: guy at panix.com (Information Security) Date: Sun, 8 Feb 1998 11:39:36 +0800 Subject: BBN Message-ID: <199802080315.WAA06152@panix2.panix.com> Haven't met a cypherpunks digest I like yet. In the mean time, I'm going to have a little fun. ---- > From dlv at bwalk.dm.com Sat Feb 7 01:46:44 1998 > To: cypherpunks at toad.com > Subject: BBN > > I have decided to come out of my cave and say it: > > I want to suck John Gilmore's cock. > > Dr.Dimitri Vulis KOTM > Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps That's understandable Dimitry...Marina must taste like dead fish. ---guy From whgiii at invweb.net Sat Feb 7 20:38:51 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Sun, 8 Feb 1998 12:38:51 +0800 Subject: An update on MS private key (in)security issues In-Reply-To: <88650932615058@cs26.cs.auckland.ac.nz> Message-ID: <199802031440.JAA09009@users.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <88650932615058 at cs26.cs.auckland.ac.nz>, on 02/04/98 at 01:35 AM, pgut001 at cs.auckland.ac.nz (Peter Gutmann) said: >The implications of that last point can be quite serious. Take for >example the Utah digital signature act, which was used as a model by a >number of other states who implemented or are implementing digital >signature legislation. Under the Utah act, digitally signed documents are >given the same evidentiary weight as notarised documents, and someone >trying to overcome this has to provide "clear and convincing evidence" >that the document is fraudulent, which is difficult since it bears a >valid signature from the users key (this fact has been used in the past >to criticise digital signature laws based on this act). In addition, >under the Utah act and derived acts, anyone who loses their private key >bears unlimited liability for the loss (in contrast, consumer liability >for credit card loss is limited to $50). This leads to the spectre of a >malicious attacker who has the ability to issue notarised documents in >your name for which you carry unlimited liability. This is a lot more >important than someone reformatting your hard drive, or stealing last >months sales figures. I have raised concerns in the past over the rush to pass Digital Signature Laws in various states. These laws have not been well though out nor did they stand the rigors of peer-review of the crypto community before they were passed into law. IIRC one of the states considered *encryption* alone to be a *legal* signature!!! I will not be using digital signatures for anything other than authentication of messages. For legal documents I will stick to the old fashion pen and paper with witnesses and a notary. Just as a side note: Micro$loth is unfit to secure an outhouse let alone somthing as important as network and data security (are these fools still claiming C2 for NT?). I have never seen such overwhelming incompetence and complete arrogance than what is centered in Redmond (IBM may be arrogant but at least they are technically competent). - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html - --------------------------------------------------------------- Tag-O-Matic: Windows? WINDOWS?!? Hahahahahehehehehohohoho... -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNNcZF49Co1n+aLhhAQHZGAP/d5qdnlJYEt6uXh2srSf2ELc4rAle9aX5 p49t7PgGIaCpMY8YIYsFS5+nFoeHwUmlBNrEvUJQoQ2jrEgUp7B7Xv+VZB38qLma L0oeyICDe7bw6iMjKJ88gsqcHSghPhu7qhSI68e7CffwBWDh3N4Uc5PMQSMzztLZ GdKH6QmvN7k= =NV74 -----END PGP SIGNATURE----- From KurtBantelmann at compuserve.com Sun Feb 8 12:52:48 1998 From: KurtBantelmann at compuserve.com (Kurt Bantelmann) Date: Sun, 8 Feb 1998 12:52:48 -0800 (PST) Subject: Global Ethics Cosmosofy Message-ID: <199802081552_MC2-326E-5452@compuserve.com> To: Cypherpunks, editor. We are impressed by your social commitment on the Internet and think you may find that Global Ethics Cosmosofy would even better support your activities and spiritual concerns since universal values have precedence over limited group moral codes in cases of conflict and its peaceful resolution in a cooperating information oriented and interdependent world community. The better arguments can be yours free, to be viewed on the Cosmosofy Institute Foundation website: But there is more to it: (1) Global Ethics and the overall doctrine tentatively termed COSMOSOFY (similar to 'globalism') will not only assist you in ethics to identify the higher and highest values to which priority consideration must be given in each case, in particular where a psychological or social conflict has to be resolved rationally and peacefully. It also helps to avoid and cure psychic disorders most of which are attributable to dogmatic indoctrination methods during childhood but which tend to remain unconscious, since people usually deny they feel indoctrinated. A severe conflict potential for humanity in the present historical moment is its more or less unconscious subjugation to outdated arbitrary moral precepts and codes imposed and indoctrinated during adolescence (where spiritual maturity is low), thus obstructing later undogmatic moral and ethical updating flexibility and development. However, any change of this unwholesome and dangerous situation is considered a political TABOO for social and cultic stability reasons and social control in the absence of GLOBAL ETHICS and a UNIVERSAL UNDOGMATIC RELIGION, although now possible at this historical junction. Cosmosofy Universal Ethics provides interdisciplinary thinking and action patterns, not of the usual type of non-merging interdisciplinary exchange programs but of the new type to be merged in one�s own mind which is now accessible for everybody due to interactive feedback information structures. (2) COSMOSOFY UNIVERSAL ETHICS Subject: Interdisciplinary, linking religion, law, sociology, philosophy, politics, sciences. The so far missing universal ethics is provided by the interdisciplinarian author Bert Tellan, founder of COSMOSOFY and undogmatic religion (Cyber-Religion) as a doctrine designed to constitute the so far missing foundation for the legal and religious system's priority values in a peacefully cooperating and closely communicating global community. So far mankind was dependent only on particularistic morals that were mutually exclusive and could therefore not be validated universally: of importance for peace, conflict resolution competence and qualification, and ecological issues. (3) You will find that Global Ethics Cosmosofy & Undogmatic Religion has been constructed with the aim to solve dogmatic 'religions' (regarded as cults acc. to Kant if used as an end in itself instead of a means)seen as a social PROBLEM (to be solved instead of being merely studied) for a modern global society and world culture in order to avoid continuing antagonism instead of promoting real peace in the sense of absolute pacifism. So far nations, cultures or religious organizations favored peace conditionally under their own moral terms (excepting the need of �holy� for Islamic or �just� wars for Christians). This is no longer possible in a world saturated with means of push-button mass destruction. In this historical context dogmatic religious cult is no longer seen as an unending study subject for scientifically detached sociologists or psychologists of religion (just wondering as William James did at the great variety of religions) while making a living from it and get research funds - while, on the other end, no church or other educational institution ever bothered to even make an attempt of funding the 'further development or advancement of religion and of religiousness'. All the while the Advancement of Science is considered a respectable institution: another grave cultural inconsistency we have been indoctrinated not to notice. To the contrary, all through history any 'further development of religious thought' was condemned, persecuted as heretic or apostasy, philosophers or reformers (including Jesus) having been murdered to this day. This is due to a flawed idea of unchanging 'religion' (=false religion) which is to be regarded as a problem and not as an endless subject of study or even of tolerance while cannibalism and illiteracy are also no longer being tolerated, in the very name of an improved, in-depth understanding of dynamic religion. The solution, thus, does not advocate atheism, non-belief or arbitrary values as is wrongly suggested for post-modernism, since, quite to the contrary, the arbitrariness of cultural relativistic values is hereby overcome having the whole of humanity, individual justice and human rights for all in mind, and not for some privileged classes or groups only. And thus to establish true peace for mankind and be prepared for a new era of common cosmic adventure or communication instead of continuous strife with the risk of self-extinction. View the Cosmosofy Institute Foundation Website (featuring around 100 new articles on unresolved modern and prognosticized issues and the consistent application of global ethics to their solution in each case): Cosmosofy Institute Foundation. Kurt C. Bantelmann, editor. More details on request. Fax:(49)211.489533. E-mail: 106562.2403 at compuserve.com From frissell at panix.com Sat Feb 7 21:28:27 1998 From: frissell at panix.com (Duncan Frissell) Date: Sun, 8 Feb 1998 13:28:27 +0800 Subject: PGP/McAfee no longer allowing downloads In-Reply-To: <34DBA006.46743131@tfs.net> Message-ID: <3.0.2.32.19980206222052.0378ca48@panix.com> Has anyone else noticed that PGP Inc. has stopped allowing downloads (even for money) from pgp.com? If you go to buy, all you get is the promise of a mailed CD. DCF From frissell at panix.com Sat Feb 7 21:28:59 1998 From: frissell at panix.com (Duncan Frissell) Date: Sun, 8 Feb 1998 13:28:59 +0800 Subject: Fingerprinting in CA In-Reply-To: <19980205.000739.attila@hun.org> Message-ID: <3.0.2.32.19980206223532.03713264@panix.com> -----BEGIN PGP SIGNED MESSAGE----- At 07:40 AM 2/6/98 -0800, Bill Stewart wrote: >>> How did you CA cypherpunks feel about being fingerprinted? > >Well, if I'd been thinking about it, I'd have put some rubber cement and >whiteout on my thumb before getting the license :-) A person of my acquaintance was recently involved in a traffic accident in a Northeast state. Out-of-state (but in country) car registered in someone else's name and carrying a drivers license issued by a NATO ally. Ticketed for running a red light. No further problems. Could have been a deadbeat dad for all I know... As legal as church on a Sunday. DCF "Has anyone noticed that there are *more* foreigners around here than there used to be before they started cracking down on illegals." -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQCVAwUBNNvWgoVO4r4sgSPhAQEvvAQAshcy4goUXXpkNqTqjyuUtI6afHXfxnn+ yRQ6yoCGXnp/eBxqKjvYiPzNjGj/wHwBOyVRQIvvvtZ4HXEKAffQ7PbNu19/DlSV h5c7g8YVYTEsG2nqymfi919dAWDzPKN7JRpfkZxSw50zYsZ5dlIBnOe+3twj5jW6 +auNqh0o8YQ= =3kId -----END PGP SIGNATURE----- From ravage at ssz.com Sat Feb 7 21:40:08 1998 From: ravage at ssz.com (Jim Choate) Date: Sun, 8 Feb 1998 13:40:08 +0800 Subject: Galombos and a World where Ideas can be Protected (fwd) Message-ID: <199802080535.XAA12696@einstein.ssz.com> Forwarded message: > Date: Sat, 7 Feb 1998 10:33:41 -0800 > From: Tim May > Subject: Galombos and a World where Ideas can be Protected > >If there were no copyright, markets for information and entertainment > >would definitely have evolved differently than they have in the US > >and Europe, and would use much different mechanisms for getting money > >to the producers of information, such as standard sale contracts.* > .... > > It's always hard to say how reality would look in a different universe, one > with, say, no copyright laws. Agreed, however the motivations that drive people to creative or constructive acts wouldn't change. > However, we have some indications, because there are some things which are > very much like "intellectual property" which, in fact, have no protection > in the courts. > > Namely, _ideas_. > > For better or for worse, ideas are not protected against copying, use, etc. Agreed, but the ability to carry through on them *is* criticaly dependant upon the social and technological infrastructure of the participants. > And yet society works fine. Those who keep coming up with ideas find ways > to keep coming up with ideas, and often to prosper, as writers, > consultants, etc., often because of their ability to generate ideas. True, but what you are leaving out is their ability to impliment those ideas, which most certainly depends upon the infrastructure that surrounds them. Ideas abhor a vacuum. In such an environment it is reasonable to assume that people would not loose their basic instincts, among them greed. So it is clear that people would not stop having ideas, but the milieu of those ideas would be restrictive and most probably very paranoid. If you learned of a particular process or idea it would not be in your best interest to pass it around. Further it would be very difficult to trust others because there would be no consequence to them taking your idea and using their resources (which the creator was depending on to actualize the concepts) to create the end product themselves. Remember the prisoners dilema here... > Think about an alternate world where ideas are protectable before saying a > world without copyrights would collapse inevitably. This is a straw man. We are discussing the issue of what would be reasonable to expect considering human nature in an environment where there was *no* protection of ideas and no redress of grievances through a legal system. Intellectual anarchy if you will. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Sat Feb 7 21:46:15 1998 From: ravage at ssz.com (Jim Choate) Date: Sun, 8 Feb 1998 13:46:15 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802080545.XAA12816@einstein.ssz.com> Forwarded message: > Date: Fri, 06 Feb 1998 18:12:38 -0800 > Original-From: Bill Stewart > Subject: Re: the best justice money can buy --Lessig (fwd) > >If there were no copyright nobody would have any reason to market > >software or much else for that matter. I would predict that much of > >the technology and infrastructure we have now wouldn't exist. > >It would also stiffle [sic] creativity and new methodologies because > >there would be no profit in it to recoup development costs. > > If there were no copyright, markets for information and entertainment > would definitely have evolved differently than they have in the US > and Europe, and would use much different mechanisms for getting money > to the producers of information, such as standard sale contracts.* > On the other hand, if there were no colonialism, markets for sheep in > New Zealand would have evolved much differently than they did, > a problem they're now gradually working their way out of. The point is that it would *not* effect single instances or markets, it would effect the very fabric of trust that is inherent in a society that rewards creativity. If there were no copyrights and by extension no protection for the creator or implimentor of an idea we would have a situation where the groups with the resources would be the ones able to best actualize and therefore reap the benefits of ideas. In such an environment why would some individual choose to go head to head in a battle they couldn't win due to resources and a lack of a standard infrastructure? They wouldn't, they'd go back home and grow food and mind their own business. They wouldn't exchange ideas because it could be taken as a given that mail and other forms of non-direct communications would be insecure. >From this we can deduce that the actual target of delivery would very likely not receive it and that some intermediary would in fact take possession of that material and take advantage of it. So we can assume that people would not work on colaborations bigger than their immediate neighborhood. Now it is also clear that within that neighborhood some will have more resources to actualize ideas in respect to many of those who actualy create the ideas. In such an environment why would the individual increase this parties resource share to their own detriment? They wouldn't. > Copyright is certainly a major market convenience, because it means > that individual authors, middlemen, and readers don't have to > negotiate contracts each time they trade information for money, > or having to read the annoying shrink-wrap licenses on books > the way they did for a while on packaged software. It also > makes it more difficult for alternative mechanisms to evolve, > because it's got an 800-pound well-armed gorilla subsidizing it. The protection of ideas and the reaping of the actualization of the creation going to the creator is the issue, copyright is simply one of many mechanisms that impliment this fundamental belief of who should benefit. If we do away with this we are also doing away with a much deeper and fundamental aspect of modern society, trust that our toil will benefit us in the end. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From adam at homeport.org Sun Feb 8 00:25:05 1998 From: adam at homeport.org (Adam Shostack) Date: Sun, 8 Feb 1998 16:25:05 +0800 Subject: Most elegant wording against privacy/law-enforcement "balance" In-Reply-To: Message-ID: <199802080814.DAA03319@homeport.org> Tim May wrote: |Jim wrote: | >The most detailed research on the issue is a study by Dorothy Denning | >and William Baugh investigating the extent to which crypto has | >interfered with law enforcement's ability to get convictions: their | >bottom line was that crypto has not in fact interfered: law enforcement | >has been able to complete their investigations using other means. | >There's no demonstrated need for Government Access to Crypto Keys | >(GACK), so there's no need to compromise away our privacy. | | Bluntly pu, "FUCK "DEMONSTRATED NEED"!" | | And what if Denning and Baugh had reached other conclusions? (As well they | might, next year, when crypto is more widely deployed.) Its a utilitarian, and useful argument to point out that the Clipper Chick has been forced to change her position based on observed reality. Its not the basis of our moral argument, only pointing out that the only academic to hold a position not in line with ours was intellectually honest enough to say she's unsupported by the facts. This is not to say that crypto is ok as long as it doesn't matter, or the police have legitamate needs that they may define, but that when their own spokespeople reject them, its a powerful argument. Much as you rejoice in terrorist use of encryption, I rejoice in being able to quote Dorothy Denning. :) (I have a great deal of respect for Dorothy Denning's willingness to take and argue unpopular positions, and change her mind when proven wrong.) Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From bill.stewart at pobox.com Sun Feb 8 02:20:18 1998 From: bill.stewart at pobox.com (bill.stewart at pobox.com) Date: Sun, 8 Feb 1998 18:20:18 +0800 Subject: the best justice money can buy --Lessig (fwd) In-Reply-To: <199802061421.IAA05806@einstein.ssz.com> Message-ID: <3.0.5.32.19980206211343.007b4ac0@popd.ix.netcom.com> At 08:21 AM 2/6/98 -0600, Jim Choate wrote: > Let's give the market another 5-10 years and see where Linux >stands. Right now the estimate is 6-10 million users world wide use it. Share >wise that isn't a lot. The reason that Linux garners so much press right now >is that it is in fact an exception when an organization uses the software >(eg NASA). The test will be whether it grows significantly over the long >run and not the 5 years that Linux has been a serious os. Sharewise, that's not bad for a system that had 1 million users a year or two ago, though of course it gains a lot of extra slack because it's quasi-free Unix on an affordable platform. Getting that much desktop support without running MSOffice is impressive. Getting lots of support for servers is a different issue; we've known for a decade and a half that if you want to actually build a system that will _do_ real work for you, you use Unix*, even if you use a different desktop GUI. NT has been improved enough that you can occasionally build services on it if you're desperate enough, though its stability is still less than ideal. (I never had it crash except for hardware mismatch reasons, but its networking stuff reflects the fact that MS still doesn't understand what networks are.) --- * In a few environments you'd use VMS, because for all DEC's faults, they were very strong on making sure they had software environments to support the applications their customers wanted, like factory control. Or you could use LispMachines, because they were nice. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Sun Feb 8 02:23:23 1998 From: bill.stewart at pobox.com (bill.stewart at pobox.com) Date: Sun, 8 Feb 1998 18:23:23 +0800 Subject: the best justice/kinds of monopolies In-Reply-To: Message-ID: <3.0.5.32.19980206174114.007b4ac0@popd.ix.netcom.com> At 02:47 PM 2/6/98 -0800, Tim May wrote: >(Yes, yes, I know some of you will be tempted to cite the official line >that the Postal Service is no longer a government agency. Well, this is a >distinction without a difference. The USPS retains governmental protections >against competition, has government-like powers and protections, and is >still run by a "Postmaster General," not a Chairman of the Board or >President or CEO. It ain't FedEx or Airborne. Or even UPS, which emulates >government agencies.) I don't care if they call their boss Grand Wazoo Snail Mail Evangelist; there are software and ice cream companies that use non-standard titles too. "Postal Inspector" is a much more serious problem title, since they seem to have quasi-police powers to do criminal investigations of postal offenses like pornography and pyramid scams and running competing formatted-tree-product information delivery services. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From MAILER-DAEMON at toad.com Sun Feb 8 22:09:07 1998 From: MAILER-DAEMON at toad.com (MAILER-DAEMON at toad.com) Date: Sun, 8 Feb 1998 22:09:07 -0800 (PST) Subject: FDA Certified & Registered Message-ID: <199802090444.WAB01261@mail.t-1net.com> Exclusive New Oral Transmucosal Weight Control Disc & Transdermal Patch both FDA Certified & Registered with National Drug Code #'s Developed by 10yr old Pharmaceutical Company. For detailed information reply to: bodyperfect at mailrobot.com To Remove you address from future mailings reply to: Remove at rmjent.com From rah at shipwright.com Sun Feb 8 06:16:14 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 8 Feb 1998 22:16:14 +0800 Subject: SEC Rule Announcement Message-ID: --- begin forwarded text From: jmuller at brobeck.com X-Server-Uuid: b0fe6c76-9e59-11d1-b373-00805fa7c2de MIME-Version: 1.0 Date: Thu, 5 Feb 1998 14:39:08 -0800 Subject: Re[2]: SEC Rule Announcement To: "Robert Hettinga" , , "Arnold G. Reinhold" X-WSS-ID: 18C49FCB618-18C49FCB619-01 Sender: bounce-dcsb at ai.mit.edu Precedence: bulk Reply-To: jmuller at brobeck.com This is actually an NASD rule change; the SEC reviews proposed NASD rule changes and almost always approves them. The NASD rule change is in Notice to Members 98-11 (available at http://www.nasdr.com/2610.htm), and was approved by the SEC on December 31, 1997, effective February 15. The NASD views the change as simply clarifying a requirement that was already in place: the rule previously required that NASD member broker/dealers establish procedures for the review of all correspondence relating to solicitation or execution of securities transactions. The rule as amended will state that these procedures must apply to all incoming and outgoing written and electronic correspondence with the public relating to the firm's investment banking or securities business. The rule itself does not say anything about home offices, but in the introduction to the rule, the NASD says that it will "expect members to prohibit correspondence with customers from employees' home computers or through third party systems unless the firm is capable of monitoring such communications." My mama taught me if I can't say anything nice, I shouldn't say anything at all, so I will not comment on the rule. If you're interested enough to go to the NASD Web site shown above, you will probably also want to look at Notice to Members 98-3, which sets out general principles for electronic delivery of information between brokers and their customers. John Muller mailto:jmuller at brobeck.com For help on using this list (especially unsubscribing), send a message to "dcsb-request at ai.mit.edu" with one line of text: "help". --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: From frissell at panix.com Sun Feb 8 07:07:29 1998 From: frissell at panix.com (Duncan Frissell) Date: Sun, 8 Feb 1998 23:07:29 +0800 Subject: the best justice/kinds of monopolies In-Reply-To: Message-ID: <3.0.2.32.19980208100314.03723538@panix.com> At 05:41 PM 2/6/98 -0800, bill.stewart at pobox.com wrote: >I don't care if they call their boss Grand Wazoo Snail Mail Evangelist; >there are software and ice cream companies that use non-standard titles too. >"Postal Inspector" is a much more serious problem title, since they >seem to have quasi-police powers to do criminal investigations of >postal offenses like pornography and pyramid scams and running competing >formatted-tree-product information delivery services. A few years ago, they actually said that they stopped the armed raids on corporate mailrooms to investigate the crime of using Fedex for non-critical First Class deliveries. The Postal Inspectors are still Peace Officers, however. But then so are the Railroad Police. DCF From jya at pipeline.com Sun Feb 8 08:00:57 1998 From: jya at pipeline.com (John Young) Date: Mon, 9 Feb 1998 00:00:57 +0800 Subject: Soft Tempest Message-ID: <1.5.4.32.19980208154341.00728278@pop.pipeline.com> To: ukcrypto at maillist.ox.ac.uk Subject: It is really me - the story of Soft Tempest Date: Sun, 08 Feb 1998 15:09:40 +0000 From: Ross Anderson Bruce Sterling, and others, have asked of the Washington Post story [see below]: > Is this story correct? The Washington Post gives a highly distorted account of some very important scientific work we have done. I suggest that list members read our paper - - for themselves before getting carried away. The story is as follows. Bill G gave our department $20m for a new building, and his people said that what they really wanted from our group was a better way to control software copying. So it would have been rather churlish of us not to at least look at their `problem'. Now the `final solution' being peddled by the smartcard industry (and others) is to make software copying physically impossible, by tying program execution to a unique tamper-resistant hardware token. We wouldn't like to see this happen, and we have already done a lot to undermine confidence in the claims of tamper-proofness made by smartcard salesmen. So Markus and I sat down and tried to figure out what we could do for the Evil Empire. We concluded that (1) large companies generally pay for their software; (2) if you try to coerce private individuals, the political backlash would be too much; so (3) if the Evil Empire is to increase its revenue by cracking down on piracy, the people to go after are medium sized companies. So the design goal we set ourselves was a technology that would enable software vendors to catch the medium-sized offender - the dodgy freight company that runs 70 copies of Office 97 but only paid for one - while being ineffective against private individuals. We succeeded. In the process we have made some fundamental discoveries about Tempest. Army signals officers, defence contractors and spooks have been visibly flabberghasted to hear our ideas or see our demo. In the old days, Tempest was about expensive hardware - custom equipment to monitor the enemy's emissions and very tricky shielding to stop him doing the same to you. It was all classified and strictly off-limits to the open research community. We have ended that era. You can now use software to cause the eavesdropper in the van outside your house to see a completely different image from the one that you see on your screen. In its simplest form, our technique uses specially designed `Tempest fonts' to make the text on your screen invisible to the spooks. Our paper tells you how to design and code your own. There are many opportunities for camouflage, deception and misconduct. For example, you could write a Tempest virus to snarf your enemy's PGP private key and radiate it without his knowledge by manipulating the dither patterns in his screen saver. You could even pick up the signal on a $100 short wave radio. The implications for people trying to build secure computer systems are non-trivial. Anyway, we offered Bill G the prospect that instead of Word radiating the text you're working on to every spook on the block, it would only radiate a one-way function of its licence serial number. This would let an observer tell whether two machines were simultaneously running the same copy of Word, but nothing more. Surely a win-win situation, for Bill and for privacy. But Microsoft turned down our offer. I won't breach confidences, but the high order bit is that their hearts are set on the kind of technology the smartcard people are promising - one that will definitively prevent all copying, even by private individuals. We don't plan to help them on that, and I expect that if they field anything that works, the net result will be to get Microsoft dismembered by the Department of Justice. Meantime we want our Soft Tempest technology to be incorporated in as many products as possible - and not just security products! So to Rainier Fahs, who asked: > If these rumors are true, I guess we will face a similar discussion on > free availability in the area of TEMPEST equipment. Does privacy > protection also include the free choice of protection mechanism? I say this: our discovery, that Tempest protection can be done in software as well as hardware, puts it beyond the reach of effective export control. So yes, you now have a choice. You didn't before, Ross Anderson ---------- http://www.washingtonpost.com/wp-srv/WPlate/1998-02/07/060l-020798-idx.html British Technology Might Flush Out Software Pirates By John Burgess Washington Post Foreign Service Saturday, February 7, 1998; Page H01 CAMBRIDGE, England� It's a technique that intelligence agencies have used for years: Park a van filled with monitoring gear near an embassy and listen for the faint radio signals that computers routinely emit when they are on. Analyze those signals for clues to the data that are on the computers. Now researchers at the University of Cambridge, home of groundbreaking work in intelligence over the years, are trying to adapt this technology to the fight against software piracy. With special code written into software, they say, computers could be made to broadcast beacons that would carry several hundred yards and identify the software they were running, complete with serial numbers of each copy. Vans run by anti-piracy groups could pull up outside a company's office and count the number of software signals emanating from it. If, say, 50 beacons for a particular title were detected but the company had licensed only two copies of the software, that could become evidence on which a court would issue a search warrant. Ross Anderson, a University of Cambridge lecturer who is overseeing the project, said the idea originated last year when Microsoft Corp. Chairman Bill Gates visited the university after his private foundation announced a $20 million donation to the school. Gates told officials that, among other things, he would love the university to come up with new anti-piracy techniques. So far, Microsoft isn't enthusiastic about the university's approach, Anderson said. "They have some reservations. Obviously there are Big Brother aspects," he said. A Microsoft spokeswoman said the company has no plans to adapt the technology. Emilia Knight, a vice president at BSA Europe, a trade group that combats software piracy, said such an anti-piracy system might be technically feasible. But she noted many practical questions on the legal side, such as how the system would differentiate between companies pirating software and those legally using multiple copies of programs. Knight said that concerns of privacy and consumer rights might make the system a no-go for industrialized countries. But in places like Eastern Europe, she suggested, where piracy is rampant and there is no tradition of such protections, the software signal detectors might be acceptable. Richard Sobel, a political scientist who teaches at Harvard University and researches privacy issues, called it "an appalling idea." "If the technology is there to identify what software people are using, there's the prospect to figure out what people are doing. . . . It sounds like a horrible violation of privacy," Sobel said. In Britain, however, it might seem less controversial. Here authorities have long used similar techniques to ferret out people who fail to pay the annual license fee of about $150 that the law requires for each TV set in the country. Cruising the streets here are vans carrying equipment that can detect emissions from a TV set's "local oscillator," the part that turns a station's signal into a picture. If the gear senses a TV set inside a house from which there is no record of a license payment, this is used as evidence to levy fines. The system also can tell what channel people are watching because the oscillator gives off a slightly different signal for each one. Anderson's researchers have built a prototype that can detect the type of software running on a machine from short range -- the hallway outside the room where the computer is running. Anderson said they are ready to build prototype hardware with a longer range, at a cost of about $15,000-$30,000 -- if the lab can find a customer. So far, none has stepped forward. � Copyright 1998 The Washington Post Company ---------- Date: Sat, 7 Feb 1998 13:05:45 -0500 From: Stewart Baker To: ukcrypto Subject: Ross, Is that really you? Today's Washington Post claims that a Cambridge research team led by one Ross Anderson is developing technology that would require all personal computers to broadcast the identity of all programs they are running so that anti-piracy investigators can sit outside universities and businesses and check to see whether the folks inside are running more programs than their licenses allow. The article says that even Microsoft thinks this might go too far in invading the privacy of computer users. But advocates for the technology claim that it will work fine in benighted Eastern European countries where piracy is rampant and the natives are used to having their privacy invaded. This raises at least three questions: 1. Is this story correct? 2. If so, is the Ross Anderson it describes the same Ross Anderson known on this list for his attacks on Big Brother? 3. If so, are we to understand that Ross objects not so much to invading privacy as to government competition in that endeavor? Stewart Baker From eureka at eureka.abc-web.com Mon Feb 9 01:01:14 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Mon, 9 Feb 1998 01:01:14 -0800 (PST) Subject: Eureka! Mon Feb 9 '98 Message-ID: <19980209081732.24447.qmail@eureka.abc-web.com> Welcome to Monday's issue of Eureka! PURE HARDCORE For a limited time only, Pure Hardcore is giving away FREE 3 day memberships! Unlimited Access to over 250 Channels of Live Video! Unlimited Access to over 2000 Hardcore XXX Photos! Unlimited Access to over 200 Steamy XXX Stories! Unlimited Access to the Live Java Chat Room! Don't miss it! Hard City ---> http://www.purehardcore.com/partners/H001.cgi SINFUL'S 20 FREE XXX PICS http://www.sinful.net/cgi-bin/topvlog.cgi?eureka 20 FREE HARDCORE, CUMSHOT, GROUPSEX, AND FREE ANALSEX PHOTOS UPDATED WEEKLY PLUS LINKS TO 700+ FREE ADULT PICTURE SITES. CATEGORIES INCLUDE: ASIAN, HARDCORE, SOFTCORE, BABES, AND PIC LINKS. YOU GET ALL OF THIS FOR FREE!! VISIT US NOW!! SCARLET HARLOT Hot graphics, hot site. Choose from a wide spread of sex. Maybe asians, blondes, brunettes, lesbians or good ol' pumping XXX grabs your interest. The site looks good. The pix load in fast. Get ready to show your appreciation. Scarlet Harlot ............ http://www.sexontap.com/scarlet/ THE PUSSY WAGON Well wagons ho! An interesting site featuring a curious mix of high resolution images. There are celebrities, anal asian coeds and even some amateurs. Grab your mouse and go there, you may just end up with a woody! Bookmark the wagon! The Pussy Wagon .................... http://www.weg.net/~pw/ WUZFUZZY'S PLACE We all know the story about fuzzy wuzzy. Well this web site features all of the pretty ladies who have lost their pussy hair! Not a pubic hair in the bunch! Nice and smooth! Yes, I know that is the way you like it. Lick some pussy people! WuzFuzzy's Place .......... http://www.sisnaaz.com/wuzfuzzy/ ANALLY YOURS Nice clean well built website. It delivers the porno, big time! Lots of free pix, thumbnailed for your convenience! Also, a free video or two. See the photo album for some hot butt action. Pussies dripping with sex juice in a big way! Anally Yours ....................... http://151.196.204.209/ #READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! #$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A # HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Just 18 -----------------------> http://204.244.215.7/teens/ CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Angel: Angelsweb is this redhead's home turf. She's a sweet looking 19 year old who displays plenty of close-ups of her private parts and is proof that blondes aren't the only ones who have fun! Her turn ons include soft lips and a sexy smile. Her goal is to become a veterinarian - I would let her check out my chicken any day! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY Planet Mojo: Mojo brings you the juiciest erotic stories weekly! Every week all new exciting erotic stories are posted for your pleasure. Visit Mojo today! ................ ................................. http://www.planetmojo.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?090 Pic 2 --------------------------> http://137.39.63.229/?091 Pic 3 --------------------------> http://137.39.63.229/?092 Pic 4 --------------------------> http://137.39.63.229/?093 Pic 5 --------------------------> http://137.39.63.229/?094 Pic 6 --------------------------> http://137.39.63.229/?095 Pic 7 --------------------------> http://137.39.63.229/?096 Pic 8 --------------------------> http://137.39.63.229/?097 Pic 9 --------------------------> http://137.39.63.229/?098 Pic 10 --------------------------> http://137.39.63.229/?099 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From ravage at ssz.com Sun Feb 8 09:06:35 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 01:06:35 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802081704.LAA14031@einstein.ssz.com> Forwarded message: > Date: Fri, 06 Feb 1998 21:13:43 -0800 > Original-From: Bill Stewart > Subject: Re: the best justice money can buy --Lessig (fwd) > At 08:21 AM 2/6/98 -0600, Jim Choate wrote: > > Let's give the market another 5-10 years and see where Linux > >stands. Right now the estimate is 6-10 million users world wide use it. Share > >wise that isn't a lot. The reason that Linux garners so much press right now > >is that it is in fact an exception when an organization uses the software > >(eg NASA). The test will be whether it grows significantly over the long > >run and not the 5 years that Linux has been a serious os. > > Sharewise, that's not bad for a system that had 1 million users a > year or two ago, though of course it gains a lot of extra slack > because it's quasi-free Unix on an affordable platform. I agree. > Getting that much desktop support without running MSOffice is > impressive. Is it? The vast majority of those users are non-commercial users. The number of US users, currently estimated at 6M is *not* significantly different than the number of home users of C64's and Amiga's (both machines had a very poor commercial market penetration) and also had maximum market penetrations in the 6M range. This consistency would seem to indicate to me that there is a significant overlap in the home users and the Linux community and that this community stays reasonably stable as a constant percentage of total population and not the software alone. The question at this point is how will this number change over the next 2 years or so. If we don't see a significant rise in this percentage then I would suspect Linux will never succeed in making a serious bid for MS parity. It is still a rare thing for an employer to provide Linux as a the default os on a new-hires pc. How many companies do you know that when a person comes in and configures their pc it contains Linux by default? Not many. Further that percentage is *not* increasing at any sort of significant rates. I would prophecy that you will have to wait a long(!) time before you can expect your local grocery store (HEB here uses Win95 and various Unix'es for back-office and check-out) or bank to be using it as a de facto standard. Also, considering that the folks who are making money on Linux are the distributors. How have they faired over the last 4-5 years? If you go to your 1st year Linux Journals (only 12/yr. and the Feb. 98 is #46) and compare it to your current issue how do the number of distributors fair? It turns out there are only a few major distirbutors (Red Hat, Slackware, InfoMagic, Walnut Creek, SuSE) and some of the early distributors have seen a significant decrease in their market share (eg Ygddrasil). So even in the Linux community we have seen a *decrease* in the *commercial* enterprises who have succeeded? Why? Because users like to have the same distribution as their friends so that they have some hope of resolving their problems. So what you see (and this is from my 4+ years working with Linux user groups) is that the majority of members of a given user group will have only 1 or 2 distributions and unless you have one of those most of them will be very hesitant to work on it because of the ignorance factor of the special features and changes of each distribution. The local Austin Linux Group (alg-l at lists.io.com) for example is moving currently from Red Hat to SuSE because of the superior, and propietary - I would add, X-windows and RPM modifications they have made. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From jya at pipeline.com Sun Feb 8 09:13:44 1998 From: jya at pipeline.com (John Young) Date: Mon, 9 Feb 1998 01:13:44 +0800 Subject: Soft Tempest Message-ID: <1.5.4.32.19980208170553.0074d0bc@pop.pipeline.com> Much praise is due Markus and Ross for their astonishing accomplishment in long-neglected Tempest research. Their paper is surely causing sleeplessness in dens of TEMPESTed security agencies accustomed to having singular self-privacy and others-invasiveness via this technology. Microsoft is to be praised for funding the right thing for the wrong reasons, or perhaps Mr. Gates foresaw what the outcome would be and merely needs intel deniability, nicely aided by Ross's zipperedness -- that, too, well done. The Wash Post spin of the story is itself complicitous, as was Mr. Baker's enticement. Thanks to both for aiding the incovert global revelation. From veral at geocities.com Sun Feb 8 09:24:38 1998 From: veral at geocities.com (Veral) Date: Mon, 9 Feb 1998 01:24:38 +0800 Subject: No Subject Message-ID: <199802081713.LAA09053@harper.uchicago.edu> CAn I join? Your Pal, V. From ravage at ssz.com Sun Feb 8 10:05:00 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 02:05:00 +0800 Subject: Another Linus market observation... Message-ID: <199802081806.MAA14516@einstein.ssz.com> Hi, Another Linux market observation that would indicate that the total impact of Linux is going to be less than what we as Linux supporters would want is the literature that has arisen about Linux. In particular the count of monthly magazines. Linux has a roughly 6M user market penetration yet there is only a single Linux specific magazine available. In the comparative markets of C64 and Amiga there were several (eg Amiga World, Info, Compute!) magazines. Even today there are at least 3 Amiga magazines on the market yet that machine hasn't been actively manufactured in over 2 years. Why is the Linux magazine market limited to The Linux Journal? And what does that mean for the long term strength of the market (and by extension the hurdles other OS's would face in the future)? ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ichudov at Algebra.COM Sun Feb 8 10:06:15 1998 From: ichudov at Algebra.COM (Igor Chudov @ home) Date: Mon, 9 Feb 1998 02:06:15 +0800 Subject: the best justice money can buy --Lessig (fwd) In-Reply-To: <199802081704.LAA14031@einstein.ssz.com> Message-ID: <199802081759.LAA15724@manifold.algebra.com> Jim Choate wrote: > succeed in making a serious bid for MS parity. It is still a rare thing for > an employer to provide Linux as a the default os on a new-hires pc. How many > companies do you know that when a person comes in and configures their pc it > contains Linux by default? Not many. Further that percentage is *not*S This is true, but you have to keep it in the right perspective. The much more interesting question is a broader one: how widespread is GNU copyrighted freeware? One can configure a Sun workstation so that it looks, works and feels like a Linux system, runs things like elm, fvwm2, vim, GNU utilities, and so on. I have seen a lot of such configurations, and in fact I do use one like that myself. How many millions more of these do exist? [I think that Sun workstations in their default configurations suck big time as far as user friendliness is concerned. They have the balls to ship an OS where the Page Up key does not work with the default editor] - Igor. From ravage at ssz.com Sun Feb 8 10:22:20 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 02:22:20 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802081824.MAA14700@einstein.ssz.com> Forwarded message: > Subject: Re: the best justice money can buy --Lessig (fwd) > Date: Sun, 8 Feb 1998 11:59:01 -0600 (CST) > From: ichudov at algebra.com (Igor Chudov @ home) > Jim Choate wrote: > > succeed in making a serious bid for MS parity. It is still a rare thing for > > an employer to provide Linux as a the default os on a new-hires pc. How many > > companies do you know that when a person comes in and configures their pc it > > contains Linux by default? Not many. Further that percentage is *not*S > > This is true, but you have to keep it in the right perspective. The > much more interesting question is a broader one: how widespread is GNU > copyrighted freeware? Outside of Linux applications? Very small. I have never worked for a company nor dealt with a customer who as a matter of course used GNU software and was in fact the accepted cannon of that companies computer use policies. Students, individual hobbyist, and small companies (one of the reasons I focus on SOHO in my consulting) are the marked exceptions. The reason these folks can get away with it is their customers if they have any are concerned about the end product and not the process. This isn't true of larger companies who are as concerned with the process because of the impact of budgets, quality control, purchasing, etc. > One can configure a Sun workstation so that it looks, works and feels like > a Linux system, runs things like elm, fvwm2, vim, GNU utilities, > and so on. I have seen a lot of such configurations, and in fact I do > use one like that myself. As I do, I have a ELC and a Tadpole 3XP that I use Linux on as well as Solaris. I also have a IBM N40 RS/6000 laptop that I run AIX 3.x and PPC Linux on. I've been waiting 2 years for the Linux68k to be ported to the Sun 4/380 platform so I can get rid of BSD on that machine, and the /dev/fb for the Tadpole on Linux SPARC has been in the wings about that long as well. In the Austin area (1M pop.), I have yet to find a single other soul who as a matter of course uses Linux on those platforms. At best I know of about a dozen people who play with it and every case I am the one who got them the CD and prompted their activity. My experience would indicate the interest and by extension future is not there for these platforms except as a point of esoteric interest. Believe me, I *wish* I had more people to talk to and work with on these platforms. I can kill just about any discussion in a Linux user group meeting by asking about SPARC or PPC versions, nobody (figuratively) uses them and nobody is really interested in learning about them. I know of only a couple of articles in the Linux Journal that has even discussed SPARC Linux (and that would indicate a lot of folks don't use it) and have never seen a PPC article. > How many millions more of these do exist? Very few. The total number of SPARC or PPC (not Mac mkLinux) is measured in the 10's of thousands at best. Consider that out of all the Linux distributors only a couple carry SPARC or PPC versions. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Sun Feb 8 10:33:51 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 02:33:51 +0800 Subject: GNU market penetration... Message-ID: <199802081837.MAA14861@einstein.ssz.com> Hi, I have a question, after going to the GNU homepage (www.gnu.org) I have not been able to find out the numbers of how many if any corporate subscribers and participants to the GNU Foundation. Is there anyone out there who might have a pointer to this information, or better yet is an actual participant in the GNU heirarchy and can discuss these and related issues? Thanks. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From WebWarrior3 at InfoWar.Com Sun Feb 8 10:39:50 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Mon, 9 Feb 1998 02:39:50 +0800 Subject: SOFT TEMPEST Message-ID: <34DDEB81.65726105@InfoWar.Com> Several of the servers where I work have multiple monitors. While it is rare that I have several instances of the same application being displayed on these monitors, I do, at times, do just that. Easier for cutting and pasting large blocks from one to the other as well as other editing of code. So, when the software police pull up outside of my place of business see that there are six instances of a program being displayed with one license I can expect a warrant to be issued? That would suck. Unfortunatley, I do not have the time to read through the entire document at the URL provided, and can't save it either from the .pdf ... the defensive measures sound interesting. Also, does this only work with CRTs or can it detect LCD too? Furthermore, it was written: >So Markus and I sat down and tried to figure out what we could do for >the Evil Empire. We concluded that >(1) large companies generally pay for their software; >(2) if you try to coerce private individuals, the political backlash > would be too much; >so >(3) if the Evil Empire is to increase its revenue by cracking down on > piracy, the people to go after are medium sized companies. I have worked on contract with several 'large' companies who are running illegal copies of software, often without the knowledge of the sys admin...better check those 'findings.' Scott R. Brower http://www.infowar.com http://www.efflorida.org From ravage at ssz.com Sun Feb 8 11:03:32 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 03:03:32 +0800 Subject: New x86 clones & Linus Torvalds (Linux fame) Message-ID: <199802081857.MAA15107@einstein.ssz.com> Forwarded message: > X-within-URL: http://techweb.cmp.com/eet/column1/wintel19.html > HOT X86 CHIPS FOR '98 AND BEYOND > > > [INLINE] Launching yet another x86 microprocessor into a field already > crowded with clones isn't a good way to bet your company's future. But > that's just what two startups and one CPU stalwart are doing, in a bid > to beat Intel at its own game. > > The new ventures--Centaur Technology Inc. (Austin, Texas) and > Transmeta Corp. (Santa Clara, Calif.)--and long-time player Advanced > Micro Devices Inc. (Sunnyvale, Calif.) each has its own twist on what > it will take to survive in the cutthroat x86 world in 1998 and beyond. > Let's take them one at a time. > > Centaur, founded by renowned microprocessor architect Glenn Henry, is > focusing on the low end of the market, where sub-$1,000 desktop > machines and sub-$2,000 notebooks rule. Centaur's offering, launched > only a few months ago, is called the IDT WinChip C6 ("IDT" stands for > Integrated Device Technology Inc., which owns Centaur). It's a > Pentium-class processor that supports the MMX multimedia > instruction-set extensions, a Socket-7 interface, and comes in speed > grades of 180-MHz and 200-MHz. Centaur is positioning the C6 as a > direct alternative to Intel's Pentium with MMX, AMD's K6, and Cyrix's > 6x86MX microprocessors. > > From a design standpoint, what's interesting about the C6 is that > Henry chose not to follow the reigning trends in chip architecture. > Instead, he took a downsized approach, implementing just those > features he needed to deliver decent performance in a high-volume, > low-cost CPU. > > "The biggest thing we did is throw out conventional thinking," Henry > told me when we met recently. "We came to the conclusion that the > added benefit of a lot of computer-science things wasn't worth the > effort. We're not superscalar--we don't do out-of-order execution. > Everyone else is designing 4-way superscalar processors, so we did a > 6-way chip." > > In designing the C6, Henry said his team found that, as CPU clock > speeds approach 200-MHz, nearly half the time is spent waiting on the > bus. So, Henry outfitted the C6 with a huge translation-look-aside > buffer, as well as a second-level TLB, to reduce bus utilization and > cut that wait-time to the bone. > > Also notable is the fact that Centaur is a tiny outfit that began life > a scant two years ago. "Intel would like the world to believe it takes > tens of years and dozens of people to design a microprocessor," Henry > said. Looking at the results rolling out of Centaur, it's obvious what > a dedicated group of engineers can accomplish. > > Over at AMD, a somewhat larger engineering team is already burning the > midnight oil to design the K7 (code-named "Argon"), which will compete > with Intel's upcoming 64-bit Merced CPU. > > AMD has a project team hard at work on K7, but has leaked few details. > Publicly, AMD wants to talk more about its new MMX-enhanced K6 > processors. But K7 will be the key to AMD's long-term future, since a > 64-bit chip is a must-have for any company that wants to remain a > viable alternative to Intel. > > The few details we do know emerged in October in a keynote speech at > the Microprocessor Forum by AMD chairman Jerry Sanders. He said that > the K7 will run at clock speeds in excess of 500-MHz and will come in > a module that's mechanically--though not electrically--interchangeable > with Intel's Slot 1 connector. Most interesting was the news that K7 > will use the bus protocol developed by Digital Equipment Corp. for its > Alpha EV-6 processor. > > It's not clear how far along AMD is with the K7. Indeed, it will be a > daunting task. But AMD has two things going for it in its quest. > First, it is very strong in the simulation and verification > department--an important factor in avoiding design flaws like the > floating-point bug that struck Intel and its Pentium. > > More important, AMD knows what it's like to wrestle with design > delays, which struck its K5 project. Concerns on the K6 job were > reportedly behind AMD's decision to purchase NexGen in January, 1996. > Indeed, the NexGen team provided the Nx586 core, which became the > basis for the K6. > > The third, and potentially most interesting, effort involves > Transmeta, a startup formed less than three years ago by former Sun > Microsystems chip architect David Ditzel. Initial word had Transmeta > at work on a PowerPC clone. Then, the buzz was that the company was > designing a Java chip aimed at the nascent market for low-cost network > computers. Now, it seems that Transmeta's effort is focused more on an > x86 alternative that boasts either low-power, multimedia or > network-computer capabilities. Or perhaps all three. > > One interesting tidbit to emerge from Transmeta is the news that it > has hired Linus Torvalds, the designer of the Linux operating system. > Apart from Torvalds' considerable software skills, he's plugged into > an influential community of Unix programmers, which could give > Transmeta a big leg up in any effort to design a processor tuned to > handle real-world networked applications. > > Alexander Wolfe is EE Times' Managing Editor for computers and > communications ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Sun Feb 8 11:37:05 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 03:37:05 +0800 Subject: Another Linus market observation... (fwd) Message-ID: <199802081936.NAA15377@einstein.ssz.com> Forwarded message: > Subject: Re: Another Linus market observation... > From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) > Date: Sun, 08 Feb 98 13:38:30 EST > Jim Choate writes: > > monthly magazines. Linux has a roughly 6M user market penetration yet there > > is only a single Linux specific magazine available. ... > > I disagree. There are plenty of printed publications about the hardware > that Linux runs on (i.e. Intel and compatible boxes) (not that I read them). > There are also rags about Unix, which are almost entirely applicable to Linux. The problem with this interpretation of the market is that AmigaWorld, Info, Compute!, etc. didn't cover the hardware to that great a degree. What they did do was discuss the programming and applications of those machines to problem solving, education, programming, etc. This point isn't the hardware and it isn't selling magazines on related os's that can be applied to Linux because of its similarity. The issue *is* increasing Linux' market share, magazines that discuss issue about AIX or HP/UX that can be applied to Linux don't do that. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dlv at bwalk.dm.com Sun Feb 8 11:37:34 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 9 Feb 1998 03:37:34 +0800 Subject: Another Linus market observation... In-Reply-To: <199802081806.MAA14516@einstein.ssz.com> Message-ID: Jim Choate writes: > monthly magazines. Linux has a roughly 6M user market penetration yet there > is only a single Linux specific magazine available. ... I disagree. There are plenty of printed publications about the hardware that Linux runs on (i.e. Intel and compatible boxes) (not that I read them). There are also rags about Unix, which are almost entirely applicable to Linux. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From dlv at bwalk.dm.com Sun Feb 8 11:38:08 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 9 Feb 1998 03:38:08 +0800 Subject: Guy Polis is a pedophile In-Reply-To: <199802081713.LAA09053@harper.uchicago.edu> Message-ID: Veral writes: > CAn I join? No. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From remailer at htp.org Sun Feb 8 11:49:42 1998 From: remailer at htp.org (Anonymous) Date: Mon, 9 Feb 1998 03:49:42 +0800 Subject: Driver Licenses Message-ID: <19980208194501.10692.qmail@nsm.htp.org> Recently had to renew my DL here in Florida. While we are not forced to give up our fingerprints (yet)we have a new little magnetic strip similar to those on a credit card or ATM card and I can see this as a way for the State to start holding more and more data about us on these I.D.'s (like fingerprints, criminal records, etc... Coincidentally, that day when I went into my grocery store to get a six pack of brew, I got carded. I handed my new little card over and the teller and rather than looking at my date of birth she started to swipe the damn thing through her credit card reader machine! I stopped her, grabbed my DL back and told her to manually enter the date as they have always done. When she explained that it is against store policy and that she 'had' to swipe any IDs that had the strip I got my keys outta my pocket and all but removed the strip from the back of my little nemesis. Handed it back to her and told her to swipe away; it is against MY policy to provide ! ! ! the store with my address. I don't want any damn pepsi coupons mailed to me each time I buy coke, or northern tissue coupons when I buy charmin. Nor do I want the store collecting information on how much beer I buy. Sure, I want my alchohol purchases going to the Dept of Motor Vehicles and the other State departments...like hell. My question is, how much information can be stored on these strips? From whgiii at invweb.net Sun Feb 8 12:06:34 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Mon, 9 Feb 1998 04:06:34 +0800 Subject: Driver Licenses In-Reply-To: <19980208194501.10692.qmail@nsm.htp.org> Message-ID: <199802082027.PAA00347@users.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <19980208194501.10692.qmail at nsm.htp.org>, on 02/08/98 at 07:45 PM, Anonymous said: >Recently had to renew my DL here in Florida. While we are not forced to >give up our fingerprints (yet)we have a new little magnetic strip similar >to those on a credit card or ATM card and I can see this as a way for the >State to start holding more and more data about us on these I.D.'s (like >fingerprints, criminal records, etc... Coincidentally, that day when I >went into my grocery store to get a six pack of brew, I got carded. I >handed my new little card over and the teller and rather than looking at >my date of birth she started to swipe the damn thing through her credit >card reader machine! I stopped her, grabbed my DL back and told her to >manually enter the date as they have always done. When she explained >that it is against store policy and that she 'had' to swipe any IDs that >had the strip I got my keys outta my pocket and all but removed the strip >from the back of my little nemesis. Handed it back to her and told her to >swipe away; it is against MY policy to provid! > e ! >! >the store with my address. I don't want any damn pepsi coupons mailed to >me each time I buy coke, or northern tissue coupons when I buy charmin. >Nor do I want the store collecting information on how much beer I buy. >Sure, I want my alchohol purchases going to the Dept of Motor Vehicles >and the other State departments...like hell. >My question is, how much information can be stored on these strips? My question is what is the best way to remove this information from the cards? A few passes over a strong magnet sufficient or should a chemical solvent be used? - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html - --------------------------------------------------------------- Tag-O-Matic: I'm an OS/2 developer...I don't NEED a life! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNN4BX49Co1n+aLhhAQHVkQQAmJ3D8E7bu7FUZRT7EU1YSXEsZtiP81fB nz3VNExa7D5Ctdz/2qmfnwiQY7S9yI0UUxfkkDdWJcYhQc45NFMghP+lcwz6x+cX 3KKmBob0Gf1gt62HkttyH/w5+yW0Sxo6CZYeRWQob8e22BjgvZ3N2kFlIEELwtB8 7hB+C8T5aiQ= =iUxA -----END PGP SIGNATURE----- From ATU5713 at compuserve.com Sun Feb 8 12:38:33 1998 From: ATU5713 at compuserve.com (Alan Tu) Date: Mon, 9 Feb 1998 04:38:33 +0800 Subject: Latest in Factoring Message-ID: <199802081525_MC2-3277-70EE@compuserve.com> Jeff Lawrence wrote: >>>>> Well, my opinion is only one of many, but I just finished installing PGP 5.5 and it allows both RSA keys (max of 2048) as well as DS/DHH keys (max of 4096). Most keys I'm seeing these days are running at 2048, so 1024 could be considered as "below average". Just my $0.02 <<<<< First, I do have a 2048 RSA key I generated with 2.6.3ix, but its in hibernation and not on a key server, yet. (g) Second, what is 5.5 compared to 5.0? Let alone 5.5.3 as displayed in your key block? Third, I think its arrogant that PGP Inc. (and many many other software companies) have left dos/win 3.x users behind. The people, like me, who still use DOS/Win 3.x obviously like it, not to mention people not in the USA. Then, because of the lack of conventional encryption, and other options not in pgp 5.0 (I don't know about 5.5), and because its not freeware (freeware doesn't fully support RSA), people on the Internet had reached the concensus that they weren't going to stop using pgp 2.6.xxxx. When I complained about 5.0, one person asked me if my 2.6.3ix version had stopped working. Anyway, I think that PGP Inc. should release a version of PGP for DOS that lets you generate longer keys, be it RSA or otherwise. Finally, there are a lot of people in other countries (where PGP has spread as widely as in the US, if not more so) who are not compatible with Win95 users using PGP 5.0 freeware. --Alan Tu Type Bits/KeyID Date User ID pub 1024/E5D915E1 1997/04/27 Alan Tu Alan Tu <102534.2165 at compuserve.com> -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.3i Comment: Requires PGP version 2.6 or later. mQCNAzNivkwAAAEEALdGUXD3j+RioIirVG46N6LaGD3YMMVVT5Mjwr5JojQsDICy 856I06Ugo/Fqid2A/os7v/gwE+Sj/WhMERgTsTejUZtsucTpS9sae+cc27Fjjq1l hOnqcLZqnHDDNyn3+jesVFPLnRlSoHbmcBK1XDW/SJT1anZz55ezmBrl2RXhAAUR tCBBbGFuIFR1IDxhdHU1NzEzQGNvbXB1c2VydmUuY29tPokAlQIFEDOguk6Xs5ga 5dkV4QEBBF8D/1B0ePqlMavWEUMP0uTmyvWFI7jooAcih6uHZFo2u+u3EzE2Is8X EoLHg39DhjleTHPu6TnGsWIiwDYEslzYeVw/Cglx6eliYIr/qs7peEywuhtZsEFH ln6yR9IE6rX3b3GCvPSQ5uPhXWrd2kWaZvG4rQ4Oj1m3yTrFaPRqCBPvtCRBbGFu IFR1IDwxMDI1MzQuMjE2NUBjb21wdXNlcnZlLmNvbT6JAJUDBRAzyUJWl7OYGuXZ FeEBAc4TBACT8gLtyE0C8NBGs9aDa9kHfeNzN8VbNfUpoOiWi4duAAZFiAt/e+ji J2BUMLIY8kzm2WX4mVzpKYjvea5TtHeQgbESV1HVZ5k7abENMUYz5nSMloOE+bb+ XRzgGgFF3htGXDJNywlLNgoYi5vTMT0pbGlCzOu215Cc4mFls2w1iA== =CM85 -----END PGP PUBLIC KEY BLOCK----- From nobody at REPLAY.COM Sun Feb 8 12:46:23 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 9 Feb 1998 04:46:23 +0800 Subject: Driver Licenses In-Reply-To: <19980208194501.10692.qmail@nsm.htp.org> Message-ID: <199802082039.VAA10619@basement.replay.com> > Coincidentally, that day when I went into my grocery store to get a six > pack of brew, I got carded. I handed my new little card over and the > teller and rather than looking at my date of birth she started to swipe > the damn thing through her credit card reader machine! > I stopped her, grabbed my DL back and told her to manually enter the date > as they have always done. When she explained that it is against store > policy and that she 'had' to swipe any IDs that had the strip I got my > keys outta my pocket and all but removed the strip from the back of my > little nemesis. Handed it back to her and told her to swipe away; it is > against MY policy to provide the store with my address. I don't want any > damn pepsi coupons mailed to me each time I buy coke, or northern tissue > coupons when I buy charmin. Nor do I want the store collecting > information on how much beer I buy. Odd. When I first got a card with the stripe, I was a little paranoid so I took a bar magnet and erased it. Actually, I don't know whether my eraser worked because nobody has ever asked to swipe my card thru a reader. I got a wallet with a plastic fold-out so if someone asks to see my id, I open my wallet and show it to them, then put it away. From guy at panix.com Sun Feb 8 13:02:10 1998 From: guy at panix.com (Information Security) Date: Mon, 9 Feb 1998 05:02:10 +0800 Subject: Guy Polis is a pedophile Message-ID: <199802082051.PAA28824@panix2.panix.com> Heh-heh-heh: it's so funny so see how high Dimitry jumps when he sees people being made aware of his body of work. > From: dlv at bwalk.dm.com > > I have perfected sucking my own cock! Call me for a video! Oh, Dimitry, we already know you are in love with yourself. ---guy And what a pathetic Net researcher... ;-) From ichudov at Algebra.COM Sun Feb 8 13:02:16 1998 From: ichudov at Algebra.COM (Igor Chudov @ home) Date: Mon, 9 Feb 1998 05:02:16 +0800 Subject: GNU market penetration... In-Reply-To: <199802081837.MAA14861@einstein.ssz.com> Message-ID: <199802082043.OAA16928@manifold.algebra.com> Jim Choate wrote: > I have a question, after going to the GNU homepage (www.gnu.org) I have not > been able to find out the numbers of how many if any corporate subscribers > and participants to the GNU Foundation. Is there anyone out there who might > have a pointer to this information, or better yet is an actual participant > in the GNU heirarchy and can discuss these and related issues? Jim, The number of subscribers bears almost no relation to the number of users. - Igor. From nobody at REPLAY.COM Sun Feb 8 13:08:09 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 9 Feb 1998 05:08:09 +0800 Subject: Software Reverse Engineering Message-ID: <199802082100.WAA13567@basement.replay.com> Hi All - I've recently been disassembling some software written by idiots who never heard of operating systems other than messy-windows, so that I can re-implement it on my favorite platform (and fix numerous bugs). I know many of you have done work in this area so maybe you can give me a few tips. I ran the program and traced its execution, which quickly showed what parts were significant, and it's pretty easy to figure out what the relevant functions are and what they do. I was able to recompile sections of the code into my own program and make it work without too much difficulty. What is bugging me is this: The program contains huge amounts of 'junk code' such as the following (disassembled with gdb): movl 0x7c58c,%eax movl %eax,0xffffffa8(%ebp) movl 0xffffffa8(%ebp),%eax movl %eax,0x7c590 movl 0x7c590,%eax movl %eax,0xffffffa8(%ebp) movl 0xffffffa8(%ebp),%edx This segment of code accomplishes nothing execpt to move the same value around into different locations, which are never again read. At least half of the instructions consist of similiar garbage, writing data into locations that are never read, duplicating constants, copying values that are never used, and so on. The only thing saving the program from running out of memory is that the programmer mostly used static buffers, only sparingly doing dynamic allocation. I'm quite surprised that I haven't found any buffer overruns or security holes yet. So, does anyone have reccomendations of what is the best way to seperate the wheat from the chaff, so to speak? I can use the program as is, but the sheer amount of junk tends to make it run slowly, so I'd much prefer to completely rewrite it. From ravage at ssz.com Sun Feb 8 13:34:49 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 05:34:49 +0800 Subject: GNU market penetration... (fwd) Message-ID: <199802082136.PAA16474@einstein.ssz.com> Forwarded message: > Subject: Re: GNU market penetration... > Date: Sun, 8 Feb 1998 14:43:51 -0600 (CST) > From: ichudov at algebra.com (Igor Chudov @ home) > Jim Choate wrote: > > I have a question, after going to the GNU homepage (www.gnu.org) I have not > > been able to find out the numbers of how many if any corporate subscribers > > and participants to the GNU Foundation. Is there anyone out there who might > > have a pointer to this information, or better yet is an actual participant > > in the GNU heirarchy and can discuss these and related issues? > > The number of subscribers bears almost no relation to the number of users. Here is what I am thinking... - commercial success at larger commercial enterprises can be seen by looking at their gross orders of software. Consider that if a company decides they want to use Win95 and WinNT for their systems. Are they going to buy them one at a time? No, they are going to purchase either large quantities or site licenses. - Since GPL doesn't really support site licenses in the normal sense they won't be there to look at. In other words the total number of site licenses from corporations for software is a measure of its penetration. - Since GPL doesn't prohibit buying one copy and then making as many subsequent copies as you desire it is not likely that a given company is going to buy great quantities of GPL'ed software. What they'll do is have each department, through their own budget disbursement and orders, purchase such software as required. So we can expect to see one or more, but relatively few overall, purchases of software. Since this does not seem, to me anyway, to allow for a differentiation between one hacker purchasing the software in a comany or an entire department this also will not be a clear indication of penetration. - Large companies faced with the above situations and having committed to the continued survival of those sources of software will want to create a situation where they minimize their need to keep re-ordering software as its needed (expensive in people and process time) the reasonable thing is to subscribe for annual terms or similar programs. What I would like to know is what is the percentage of subscriptions by companies in regards to the total number of subscriptions of GNU software. I couldn't find any way to get this info on the www.gnu.org page. Since the question is at what point is current penetration of Linux into commercial entities as a standard business environment this seemed relevant. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dlv at bwalk.dm.com Sun Feb 8 13:53:37 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 9 Feb 1998 05:53:37 +0800 Subject: Cypherpunks share cookies Message-ID: <1mPLke4w165w@bwalk.dm.com> I've updated the cookie-sharing page at: http://www.geocities.com/CapeCanaveral/Hangar/6354/cookies.html Please share your cookies! I'm having a bit of a problem with the cookie from Firefly.com and other sites that use their passport software (parts of barnes&noble, quitnet.org, mylaunch.com, filmfinder.com, etc). After a log in (as cypherpunks:cypherpunks, naturally), the server sends a FIREFLYTICKETV3 cookie which appears to contain the username and a timestamp. After about 24 hours the cookie expires and one has to log in again. If someone can set the expiration date far in the future, I'll add the cookie to the shared cookie list; otherwise they're useless. Here's a sequence of "firefly ticket" cookies over a few days: FIREFLYTICKETV3=WWKKILVVLLXVbVHKOHSNMH_\SVIHHHEGIIWRWUFIJI WWKKILVVLLXVbVHKOHSNMH_\SVGHJHLGMISRUUNIGI WWKKILVVLLXVbVHKOHTNFHa\WVHHGHKGFISRYUOILI WWKKILVVLLXVbVHKOHTNFHa\WVHHHHEGOIVR[UKIII WWKKILVVLLXVbVHKOHTNFHa\WVHHHHFGIIXRZUKIOI WWKKILVVLLXVbVHKOHTNFHa\WVHHGHKGFISRYUOILI WWKKILVVLLXVbVHKOHTNFHa\WVHHHHEGOIVR[UKIII WWKKILVVLLXVbVHKOHTNFHa\WVHHHHFGIIXRZUKIOI WWKKILVVLLXVbVHKOHTNFHa\WVJHGHEGJITRUUNIMI WWKKILVVLLXVbVHKOHTNFHa\XVEHLHJGKIXRRUNIHI WWKKILVVLLXVbVHKOHTNFHa\XVEHLHKGJIVRUUKIMI ^^^^^^ ********** The expiration is triggered by the piece I marked ^^^. Munging the end of the cookie (marked ***) doesn't seem to invalidate the cookie. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From MSDNFlashEditor_001527 at Newswire.Microsoft.com Sun Feb 8 14:07:26 1998 From: MSDNFlashEditor_001527 at Newswire.Microsoft.com (MSDNFlash Editor) Date: Mon, 9 Feb 1998 06:07:26 +0800 Subject: MSDNFlash, Volume 2, Number 3, February 9, 1998 Message-ID: <837CDED67A3AD111B59200805F3118C1087401C7@bulkengine.dns.microsoft.com> *** MSDN Flash *** A Twice-Monthly Newsletter for the Microsoft Developer Community Visit us today on the World Wide Web at: http://www.microsoft.com/msdn/ In this issue: PRODUCT AND TECHNOLOGY NEWS *Customers Choose Visual Studio *VBA PowerTools *New MSDN Online Feature - HelpDesk Code Sample *Dr. GUI on COM *XML-Data Submission to the W3C *Visual FoxPro Migration Sourcebook CD RESOURCES *MSDN Subscription January Release *Chat About MSDN Subscription *MSDN Online Member Downloads *New Chapter from Microsoft Mastering Series *Download Windows CE 2.0 Platform SDK *MSDN Online Membership Kit *J/Direct Jump Start Reviewers Guide *Learn Visual Basic Scripting Edition Now EVENTS *Windows DNA Development Lab *XML Conference *VBITS *Windows CE Developer Conference *Visual C++ Developer Conference *Visual J++ Developer Conference *Visual Foxpro Devcon 98 *Microsoft TechEd *Developer Events - United States *Developer Events - Europe MSDN FLASH TIP OF THE WEEK *Visual J++ Developer's Journal ================================================= PRODUCT AND TECHNOLOGY NEWS ================================================= CUSTOMERS CHOOSE VISUAL STUDIO Microsoft Visual Studio 97 is being widely adopted by enterprise customers, partners, and solution providers for building mission-critical business applications addressing a wide variety of scenarios and architectural challenges. Visit http://www.microsoft.com/vstudio/ to read case studies and customer testimonials. VBA POWERTOOLS If you're learning how to build VBA components for applications such as Word or Excel, the new VBA PowerTools series offers add-ins to install and examine, like a popup thesaurus. Download a dozen of them from http://www.microsoft.com/vba/vbapowertools.htm NEW MSDN ONLINE FEATURE - HELPDESK CODE SAMPLE Check out the new MSDN Feature package this month-the HelpDesk, an extensive sample intranet application with 24,000 lines of source code. Find out more about the package at http://www.microsoft.com/msdn/news/feature/020298/default.htm DR. GUI ON COM Check out Dr. GUI's COM column-a step-by-step, week-by-week guide to learning about components, COM and the Active Template Library. Visit http://www.microsoft.com/news/drgui/020298.htm XML-DATA SUBMISSION TO THE W3C The W3C acknowledged the XML-Data submission from Microsoft, ArborText, DataChannel and Inso. The joint submission outlines a richer method for describing and validating data - the goal is to make XML more powerful for integrating data from multiple, disparate sources, and building 3-tier web applications. The submission is available for public review from http://www.microsoft.com/standards/xml/ VISUAL FOXPRO MIGRATION SOURCEBOOK CD This free interactive guide is designed to make upgrading to Visual FoxPro 5.0 easier, addressing the two biggest concerns developers have when upgrading: The learning curve and the operating system. There is plenty of in-depth information on everything from Visual FoxPro's features to using Visual FoxPro to build client/server and Internet applications. For ordering information visit http://www.microsoft.com/vfoxpro/ ================================================= RESOURCES ================================================= MSDN SUBSCRIPTION JANUARY RELEASE The MSDN Subscription January Shipment includes Windows 98 beta 3, Windows NT� Option Pack 4.0, Windows NT DDK (for Windows NT Workstation 5.0 beta 1, Microsoft SQL Server Enterprise Edition, and Visual Studio Service Packs (Alpha). For complete interim details or a full listing of all MSDN subscription components, visit http://www.microsoft.com/msdn/services/subscription/index/ CHAT ABOUT MSDN SUBSCRIPTION Join us for a discussion about MSDN Subscriptions on Tuesday, February 17. 11:00 am - noon, PST. Chat about Library content, quarterly and interim shipments, licensing, and other subscriber benefits. If you can't make the chat but have a great question, please submit it to msdn at microsoft.com with "MSDN Chat" as the subject line. We'll post a transcript two days after the chat. For more information visit http://www.microsoft.com/msdn/newsgroups/chats.htm MSDN ONLINE MEMBER DOWNLOADS Check out this week's free downloads for Online Members: TeeChart Pro ActiveX from TeeMach is a charting and graphing ActiveX control. Also try Soffront TRACK - a customizable defect-tracking and technical-support database. For more information visit http://www.microsoft.com/windowsce/developer/download/ NEW CHAPTER FROM MICROSOFT MASTERING SERIES This month check out Creating ActiveX Code Components, Chapter 7 from Mastering Microsoft Visual Basic 5. Gain the skills you need to become an expert in database programming and ActiveX component creation. Available online and as a download. For more information visit http://www.microsoft.com/msdn/training/mastering.htm DOWNLOAD MICROSOFT WINDOWS CE 2.0 PLATFORM SDK If you're developing for Windows CE 2.0 you'll want to download the Windows CE 2.0 platform SDK. Visit http://www.microsoft.com/windowsce/developer/download/ for more information. MSDN ONLINE MEMBERSHIP KIT Sign up now to get your MSDN Online Membership Kit. Members in the US and Canada will start receiving the kit in February. The kit includes the Component Source CD, which includes 500 ActiveX controls and over 1200 software components and tools, including products from APEX Software Corporation, Distinct Corporation, Phantom Reality, and Spatial Technology. It also features discounts on books and magazines including PC Magazine, Microsoft Systems Journal, Inside Visual Basic, Computer Shopper, Visual J++ Developer's Journal, and featured books from Wrox Press and Microsoft Press. Not to mention rebates on MSDN Professional and Universal subscriptions. For more information visit http://www.microsoft.com/msdn/join/ J/DIRECT JUMPSTART REVIEWERS GUIDE The J/Direct Jumpstart Reviewers Guide discusses developing powerful Windows applications in Java. This guide provides introductory information on both J/Direct and J/Direct Jumpstart, including a description of the code samples and other materials designed to help familiarize developers with the basic concepts of programming with J/Direct. For more information visit http://www.microsoft.com/visualj/ LEARN MICROSOFT VISUAL BASIC SCRIPTING EDITION NOW Check out this sample chapter from the Microsoft Press book, LEARN MICROSOFT VISUAL BASIC SCRIPTING EDITION NOW, which explains the basics of the VB scripting language. Visit http://mspress.microsoft.com/prod/books/sampchap/364.htm ================================================= EVENTS ================================================= MICROSOFT DNA DEVELOPMENT LAB A DNA Development Lab has been established for teams needing assistance in moving their applications to Internet architectures. Corporate development teams can bring their projects into the Lab, an intensive 5-day knowledge-transfer "boot camp", and get assistance in architecting and implementing their solutions. The lab is a partnership between Microsoft, CoreTech Consulting Group and Hewlett Packard. This environment is ideal for proof-of-concept, porting, and startup projects. More information is available at http://www.coretech-group.com and http://www.microsoft.com/usa/mid-atlantic/ XML CONFERENCE March 23-27, Seattle, WA XML, eXtensible Markup Language, describes structured data and delivers the data the way you want it. Come to XML the Conference, and select from the Business, Technical, E-Commerce, Print Media, and Content Management Tracks. See tools that support XML today and those planned for tomorrow. For registration and additional information visit http://www.gca.org/ VBITS SAN FRANCISCO '98 March 23-27, San Francisco, CA VBITS brings Microsoft and independent speakers together to give in-depth, hands-on training on topics ranging from multithreading applications and servers, to leveraging component-based solutions to the Internet or intranet, to deploying N-tier Client/Server apps with MTS. Visit http://www.windx.com/vbits/ for more information. REGISTER NOW FOR THE WINDOWS CE DEVELOPERS CONFERENCE April 5-8, San Jose, CA In-depth technical sessions will teach you all you need to know about the latest advances in Windows CE-based devices. Anyone writing software for Windows 95 or Windows NT will want to come hear how they can leverage their existing Win32 skills into this area. Attendees will receive a complimentary Palm PC - so you can start developing cool applications right away. For more information or to register visit http://www.microsoft.com/events/windowsce/ MICROSOFT VISUAL C++ DEVELOPER CONFERENCE IV April 15-17, Boston, MA TPD Publishing and Microsoft are holding the fourth Visual C++ Developers Conference: three days of intense technical instruction with Microsoft product gurus and third-party speakers and authors. Come learn about COM and DCOM, MFC and ATL, MTS, hardcore Visual C++, and more. For more information Visit http://www.vcdj.com/ VISUAL J++ DEVELOPER CONFERENCE April 27-30, Los Angeles, CA Informant Communications Group, Inc. and Microsoft have announced the first Microsoft Visual J++ Developer Conference and Exposition. A technical forum on advanced Java development using Microsoft Visual J++, this event features four tracks and 48 sessions. For more information visit http://www.javaconference.com/ VISUAL FOXPRO DEVCON 98 May 17-20, Orlando, FL Come learn all about Tahoe, the next version of Microsoft Visual FoxPro. Presented by MSDN and FoxPro Advisor Magazine, this is the ultimate developer conference for Visual FoxPro developers. Join thousands of professionals from around the world and be among the first to get an in-depth look at Tahoe. For more information visit the Visual FoxPro Web site at http://www.microsoft.com/vfoxpro/ MICROSOFT TECHED 98 June 1-4, New Orleans, LA This is the definitive technical conference for building complete solutions with Microsoft technologies. Register now for the event that always sells out. For more information visit http://www.microsoft.com/events/teched/ MICROSOFT TECHED EUROPE 98 7-10th July, Nice Acropolis Convention Centre, France Book Now! For more information visit http://www.eu.microsoft.com/europe/teched/ DEVELOPER EVENTS - UNITED STATES EMERGING TECHNOLOGY SERIES The Emerging Technology Series hits Missouri, Kansas, and Tennessee in February and March with a six-city tour. This free one-day seminar includes sessions on "Developing Multi-tiered Applications with Visual Studio" and "Write Once, Run Everywhere? Alternatives to Cross Platform Application Development". For more information, visit http://www.microsoft.com/stlouis/ets/ BOB AND LARRY'S DEVELOPER WORKSHOP SERIES February 12, Waltham, MA February 17, Farmington, CT Learn how to deliver solutions faster, cheaper and easier. For more information on this free monthly series or to register head to http://www.microsoft.com/usa/newengland/developer/ MICROSOFT PROFESSIONAL DEVELOPERS SUMMIT The PDS hits the West Coast in February with a seven-city tour. This one-day seminar will focus on the Windows Distributed interNet Applications Architecture and the new capabilities of the Windows platform. For more information and to register visit http://www.microsoft.com/usa/pdswest/ TURNING DATA INTO INFORMATION Learn how to leverage desktop productivity tools, Internet technologies, universal data access and SQL Server in a building framework for effective data marts at a lower cost. For more information visit http://www.microsoft.com/usa/mid-atlantic/developer/ DEVELOPER EVENTS - EUROPE MICROSOFT SQL SERVER AND UNIVERSAL DATA ACCCESS TECHNICAL CONFERENCE March 25 - 26th Paris, March 30 - 31st Stockholm, April 2 - 3rd Frankfurt, April 6 - 7th London 1998. For more information visit http://www.eu.microsoft.com/europe/msdn/events/sql/ MICROSOFT WEB SOLUTIONS DEVCON February 16, Munich February 18, Dusseldorf March 3, Frankfurt The one day 2 track technical conference will cover the development, deployment and administration of web solutions built with Microsoft technologies. A pre-conference the day before will focus on component development with either VC++, VJ++ or VB. For more information visit http://microsoft.eusoft.com ================================================= MSDN Flash TIP ================================================= BE CAREFUL WHEN COMPARING STRINGS from Visual J++ Developer's Journal Java allows you to compare two String objects, strng1 and strng2 using the following code: if(strng1 == strng2) then ... Unfortunately, the effect may not be what you want. The code above actually compares the String locations, not their text value. To compare the text values, use this: if(strng1.equals(strng2)) then ... MSDN Online Members - we have a new Tip for you each week at http://www.microsoft.com/msdn. For a free issue of Visual J++ Developer's Journal visit http://www.cobb.com/vjp/freevyer.htm To receive the Visual J++ Developer's Journal Tip of the Week in email, visit Visual J++ tip sign-up: http://www.zdtips.com/vjp/msd-f.htm ================================================= HOW TO JOIN THE MAILING LIST: You received this e-mail newsletter as a result of your registration on the Microsoft Personal Information Center. You may unsubscribe from this newsletter, or subscribe to a variety of other informative newsletters, by returning to the Personal Information Center, http://register.microsoft.com/regwiz/personalinfo.asp and changing your subscription preferences. Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message. ================================================= The information provided is for informational purposes only and Microsoft Corporation and its suppliers make no warranties, either express or implied, as to the accuracy of such information or its fitness to be used for your particular purpose. The entire risk of the use of, or the results from the use of this information remains with you. From ichudov at www.video-collage.com Sun Feb 8 15:09:58 1998 From: ichudov at www.video-collage.com (Igor Chudov @ home) Date: Mon, 9 Feb 1998 07:09:58 +0800 Subject: rec.guns et.al. blocked by censorware In-Reply-To: <6bla0o$4ad@xring.cs.umd.edu> Message-ID: <199802082302.RAA18137@manifold.algebra.com> In rec.guns, Dan wrote: * I guess I should not be surprised but blocking software Cyber Patrol apparently * blocks rec.guns and rec.hunting because we are militant extremists, advocate * violence and swear. The whole story starts at: * http://www.spectacle.org/cwp/index.html * You have to keep going until you get to newsgroups. * * If Cyber Patrol is doing this I suspect their competition is doing so as well. * * Magnum: I know this is sort of off topic, but I believe it's important for the * group at large to know. Just fyi, I did look at the site and was astonished. Indeed anyone who uses this Cyber Patrol is a fool. Examples of HUNDREDS of blocked newsgroups: rec.games.mecha Giant robot games. (Moderated) Quest/Illegal/Gamble Violence/Profanity Intol news.groups Discussions and lists of newsgroups. Intol news.groups.questions Where can I find talk about topic X? Intol rec.guns Discussions about firearms. (Moderated) Militant/Extreme Violence/Profanity * -- * Dan - ywq at wco.com * I love the smell of Hoppes #9 in the morning. * Follow the Money - Who funds the election of your Congresscritter - www.opensecrets.org ---------------------------------------------------------------------------- char*p="char*p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);} \=/, _-===-_-====-_-===-_-==========-_-====-_ | @___oo ( )_ /\ /\ / (___,,,}_--= ) ) /^\) ^\/ _) =__ Anything is good and useful if ) ) /^\/ _) (_ ) ) _ / / _) ( it's made of chocolate. ) /\ )/\/ || | )_) (_ ) < > |(,,) )__) ( http://www.algebra.com/~ichudov ) || / \)___)\ (_ _) | \____( )___) )___ -==-_____-=====-_____-=====-___== \______(_______;;; __;;; From tcmay at got.net Sun Feb 8 15:24:28 1998 From: tcmay at got.net (Tim May) Date: Mon, 9 Feb 1998 07:24:28 +0800 Subject: rec.guns et.al. blocked by censorware In-Reply-To: <6bla0o$4ad@xring.cs.umd.edu> Message-ID: At 3:02 PM -0800 2/8/98, Igor Chudov @ home wrote: >In rec.guns, Dan wrote: >* I guess I should not be surprised but blocking software Cyber Patrol >apparently >* blocks rec.guns and rec.hunting because we are militant extremists, advocate >* violence and swear. The whole story starts at: >* http://www.spectacle.org/cwp/index.html >* You have to keep going until you get to newsgroups. >Examples of HUNDREDS of blocked newsgroups: > >rec.games.mecha Giant robot games. (Moderated) Quest/Illegal/Gamble >Violence/Profanity Intol >news.groups Discussions and lists of newsgroups. Intol >news.groups.questions Where can I find talk about topic X? Intol >rec.guns Discussions about firearms. (Moderated) Militant/Extreme >Violence/Profanity Interestingly, rec.guns is moderated (not that I like that), and there is virtually no profanity or discussion of anything remotely of a sexual nature. The discussion is on-topic, about revolvers, rifles, ammunition, target shooting, defense methods, etc. That the "cyber nannies" are blocking it (and other similarly nonsexual, nonprofane newsgroups) is exactly what was expected. These cyber nannies become tools for political correctness. Perhaps the strategy should be to post material to other newsgroups to get them blocked as well. (Though I expect the blocking is not being done using robots to monitor for illegal words, as rec.guns would not have been blocked this way. Rather, the cyber nannies are probably using their "PC judgment" to block groups they don't like. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From anon at squirrel.owl.de Sun Feb 8 15:24:29 1998 From: anon at squirrel.owl.de (Secret Squirrel) Date: Mon, 9 Feb 1998 07:24:29 +0800 Subject: Zero Knowledge Access Message-ID: <75567b97663d45b018853166ea965a73@squirrel.owl.de> Dumbfuck Rimjob (Dr.) Dimitri Vulis fucks apes with a spiked metal pole on the weekends and dreams of someone doing it to him. Buttfuck on, Dimitri. From WebWarrior3 at InfoWar.Com Sun Feb 8 16:05:33 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Mon, 9 Feb 1998 08:05:33 +0800 Subject: Driver Licenses Message-ID: <34DE37BF.E4E6A424@InfoWar.Com> William H. Geiger III wrote: >My question is what is the best way to remove this information from the >cards? > >A few passes over a strong magnet sufficient or should a chemical solvent >be used? Either should work...I'll bet that scratching the shit off with his keys worked too ;) I'll have to remember that when it's time to get mine done. That was a good question, though, does anyone know how much data those little stripes can hold? Scott R. Brower http://www.infowar.com http://www.efflorida.org From ravage at ssz.com Sun Feb 8 16:08:04 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 08:08:04 +0800 Subject: Driver Licenses (fwd) Message-ID: <199802090012.SAA17348@einstein.ssz.com> Forwarded message: > Date: Sun, 08 Feb 1998 17:54:56 -0500 > From: "WebWarrior3 at InfoWar.Com" > Subject: re: Driver Licenses > William H. Geiger III wrote: > >My question is what is the best way to remove this information from the > > >cards? > > > >A few passes over a strong magnet sufficient or should a chemical > solvent > >be used? > > Either should work...I'll bet that scratching the shit off with his keys > worked too ;) > I'll have to remember that when it's time to get mine done. My suggestion is not to alter the card such that a visual inspection would show. In most states it's a felony to modify or alter a drivers license, they are considered the property of the state and not yours personaly. Next time a cop asks for ID and you hand him your d.l. you could be in for a lot more than couple hundred dollars and a ticket. > That was a good question, though, does anyone know how much data those > little stripes can hold? Anywhere from a few hundred bytes to a k. Depends on the bit density of the tape. Go down to your local electronics or audio supply and get a polarized loupe and count them. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dlv at bwalk.dm.com Sun Feb 8 16:12:26 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 9 Feb 1998 08:12:26 +0800 Subject: rec.guns et.al. blocked by censorware In-Reply-To: Message-ID: Tim May writes: > That the "cyber nannies" are blocking [rec.guns] (and other similarly nonsexual, > nonprofane newsgroups) is exactly what was expected. These cyber nannies > become tools for political correctness. Steve Boursy reports that another censorware vendor has been caught mailbombing a critic (sent her >400 junk e-mails) in retaliation for her criticism. Guy Polis is a pedophile. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From WebWarrior3 at InfoWar.Com Sun Feb 8 18:58:39 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Mon, 9 Feb 1998 10:58:39 +0800 Subject: Drivers Licenses Message-ID: <34DE5F9A.9744B0D7@InfoWar.Com> >In most states it's a felony to modify or alter a drivers license, >they are considered the property of the state and not yours personaly. > >Next time a cop asks for ID and you hand him your d.l. you could be in for a >lot more than couple hundred dollars and a ticket. That's silly! I mess up my credit card strips all the time by keeping them in my pocket with keys on motorcycle rides, or in my tool belt when I used to do carpentry, or even slipping them into my money clip the wrong side out....the tape has never lasted longer than a month on any of my cards...I doubt, seriously, that a cop will harrass anyone who does not come out and say, "Yes, officer, I intentionally defaced my DL. And ya know why, Mr. Poleesse Man? Well, I'll tell ya " I do agree that it is proably better to do the damage without it being noticable. Less suspicion is ALWAYS better. Best, -S From ravage at ssz.com Sun Feb 8 19:02:57 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 11:02:57 +0800 Subject: Drivers Licenses (fwd) Message-ID: <199802090304.VAA17982@einstein.ssz.com> Forwarded message: > Date: Sun, 08 Feb 1998 20:44:58 -0500 > From: "WebWarrior3 at InfoWar.Com" > Subject: re: Drivers Licenses > That's silly! I mess up my credit card strips all the time by keeping > them in my pocket with keys on motorcycle rides, or in my tool belt when > I used to do carpentry, or even slipping them into my money clip the > wrong side out....the tape has never lasted longer than a month on any > of my cards...I doubt, seriously, that a cop will harrass anyone who > does not come out and say, "Yes, officer, I intentionally defaced my > DL. And ya know why, Mr. Poleesse Man? Well, I'll tell ya yadda, yadda, privacy, yadda, yadda, biometrics, yadda....>" > > I do agree that it is proably better to do the damage without it being > noticable. Less suspicion is ALWAYS better. Well I just looked at my Tx. d.l. to make shure my memory was correct. At least on Texas d.l's the *only* way to get to the mag stripe is to break the clear plastic laminating cover. And I assure you that if that cover is broken or tampered with the officer will become much more suspicous. It has this nifty little seal embossed all over the laminating cover on both sides. So going down to the local laminating shop won't work either. Proceed at your own risk, it's your neck after all. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From nobody at REPLAY.COM Sun Feb 8 19:29:20 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 9 Feb 1998 11:29:20 +0800 Subject: Driver Licenses (fwd) In-Reply-To: <199802090012.SAA17348@einstein.ssz.com> Message-ID: <199802090322.EAA09865@basement.replay.com> > > >A few passes over a strong magnet sufficient or should a chemical > > solvent > > >be used? > > > > Either should work...I'll bet that scratching the shit off with his keys > > worked too ;) > > I'll have to remember that when it's time to get mine done. > > My suggestion is not to alter the card such that a visual inspection would > show. In most states it's a felony to modify or alter a drivers license, > they are considered the property of the state and not yours personaly. > > Next time a cop asks for ID and you hand him your d.l. you could be in for a > lot more than couple hundred dollars and a ticket. "Yeah, officer, I dropped my ID in the street and it got run over. Don't give me such a hard time about it, I'm just glad I got it back..." I really doubt you are going to get convicted for accidently dropping your wallet because your ID got scraped up a little bit on the back side. Seriously, the best way is a strong magnet. You can also put it in your shirt pocket and iron it, then apply a strong magnet. The heat will make it lose its magnetism more quickly; just make shure you don't melt it. :) From whgiii at invweb.net Sun Feb 8 19:38:33 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Mon, 9 Feb 1998 11:38:33 +0800 Subject: Drivers Licenses (fwd) In-Reply-To: <199802090304.VAA17982@einstein.ssz.com> Message-ID: <199802090401.XAA04008@users.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <199802090304.VAA17982 at einstein.ssz.com>, on 02/08/98 at 09:04 PM, Jim Choate said: >Forwarded message: >> Date: Sun, 08 Feb 1998 20:44:58 -0500 >> From: "WebWarrior3 at InfoWar.Com" >> Subject: re: Drivers Licenses >> That's silly! I mess up my credit card strips all the time by keeping >> them in my pocket with keys on motorcycle rides, or in my tool belt when >> I used to do carpentry, or even slipping them into my money clip the >> wrong side out....the tape has never lasted longer than a month on any >> of my cards...I doubt, seriously, that a cop will harrass anyone who >> does not come out and say, "Yes, officer, I intentionally defaced my >> DL. And ya know why, Mr. Poleesse Man? Well, I'll tell ya > yadda, yadda, privacy, yadda, yadda, biometrics, yadda....>" >> >> I do agree that it is proably better to do the damage without it being >> noticable. Less suspicion is ALWAYS better. >Well I just looked at my Tx. d.l. to make shure my memory was correct. At >least on Texas d.l's the *only* way to get to the mag stripe is to break >the clear plastic laminating cover. And I assure you that if that cover >is broken or tampered with the officer will become much more suspicous. >It has this nifty little seal embossed all over the laminating cover on >both sides. So going down to the local laminating shop won't work either. >Proceed at your own risk, it's your neck after all. A couple of times through the washer and dryer and that lamination seperates. Any cop that has worked traffic has seen plenty of DL's in this shape (heh should have seen my old DL when I truned it in to get it renewed ). - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html - --------------------------------------------------------------- Tag-O-Matic: OS/2: Your brain. Windows: Your brain on drugs. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNN5ry49Co1n+aLhhAQFm/wQAhFcm2qIuqA6n1GgkxIgclGPw89cOI7UU NETVYGK6DEf4zM6/pUyJ3VgjMcq7JZnrV3t6q8iM3p+g0htZqzX7tzWeab7SLyuL meoL8IWLGIwR9RpMz7equHQIJ/O/M6zuP02y+wOHxdZsDBfglW8/0KQvrU0ZD74E hlDJTFFNoSk= =xV9x -----END PGP SIGNATURE----- From ravage at ssz.com Sun Feb 8 19:39:10 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 11:39:10 +0800 Subject: Driver Licenses (fwd) Message-ID: <199802090341.VAA18175@einstein.ssz.com> Forwarded message: > Date: Mon, 9 Feb 1998 04:22:54 +0100 (MET) > Subject: Re: re: Driver Licenses (fwd) > From: nobody at REPLAY.COM (Anonymous) > "Yeah, officer, I dropped my ID in the street and it got run over. Don't > give me such a hard time about it, I'm just glad I got it back..." > I really doubt you are going to get convicted for accidently dropping your > wallet because your ID got scraped up a little bit on the back side. See a previous post I submitted earlier in this regards... > Seriously, the best way is a strong magnet. You can also put it in your > shirt pocket and iron it, then apply a strong magnet. The heat will make > it lose its magnetism more quickly; just make shure you don't melt it. :) The 'Currie Point' (the point a magnetic material looses its magnetic behaviour) for Iron Oxide is 600F so I rather doubt your home clothing iron will significantly effect it. The plastic that the license is made of will melt at about 250 - 300. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Sun Feb 8 19:51:48 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 11:51:48 +0800 Subject: Drivers Licenses (fwd) Message-ID: <199802090355.VAA18303@einstein.ssz.com> Forwarded message: > From: "William H. Geiger III" > Date: Sun, 08 Feb 98 21:25:30 -0500 > Subject: re: Drivers Licenses (fwd) > A couple of times through the washer and dryer and that lamination > seperates. Any cop that has worked traffic has seen plenty of DL's in this > shape (heh should have seen my old DL when I truned it in to get it > renewed ). I rather doubt that. I have had a Texas drivers license since I was 16, I'm now 38. I have washed them innumerable times and I have never had the lamination break or otherwise degrade. The lamination is quite heavy. I did have one crack at the seam one time because of a bad lamination and was specificaly instructed by the officer who wrote me a speeding ticket to get it replaced. I did so immediately. The law here is that if the license is damaged, you move, or otherwise make the information invalid you have 30 days to correct it. I suspect quite strongly that had I shown up at the court house to pay that ticket with the same damaged license (required to be shown at the time of payment) they would not have accepted the payment and might have asked to to discuss the situation with one of the officers they so thoughtfuly have placed about the room. Texas takes counterfeiting of licenses quite seriously. My suggestion would be don't try such juvenile tricks here, the DPS have seen it before and won't be pleasant people to deal with unless you're a juvenile. I have a proposal. Lucky is supposed to be in Austin for the CFP conference. If he is agreeable, he could ask to examine a Tx. d.l. We could leave it up to his opinion as to whether these would be easy to alter. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From anon at anon.efga.org Sun Feb 8 21:07:47 1998 From: anon at anon.efga.org (Anonymous) Date: Mon, 9 Feb 1998 13:07:47 +0800 Subject: No Subject Message-ID: >Odd. When I first got a card with the stripe, I was a little paranoid so >I took a bar magnet and erased it. Actually, I don't know whether my >eraser worked because nobody has ever asked to swipe my card thru a >reader. I got a wallet with a plastic fold-out so if someone asks to see >my id, I open my wallet and show it to them, then put it away. How many of us have done this? I nuked mine in the parking lot of the DMV. From rdl at mit.edu Sun Feb 8 21:29:38 1998 From: rdl at mit.edu (Ryan Lackey) Date: Mon, 9 Feb 1998 13:29:38 +0800 Subject: Soft Tempest Message-ID: Anyone interested in working on this for linux? It should be fairly trivial to modify the linux console drivers, disk driver, and possibly keyboard driver to take these changes into account. At the same time, it might be nice to add the permanence counters for RAM and magnetic media. I'm a bit busy until at least after FC '98, or I'd do it myself. One of my goals is to keep my laptop as secure as possible, and that's an application where TEMPEST shielding is rather prohibitive. -- Ryan Lackey rdl at mit.edu http://mit.edu/rdl/ From tcmay at got.net Sun Feb 8 22:25:40 1998 From: tcmay at got.net (Tim May) Date: Mon, 9 Feb 1998 14:25:40 +0800 Subject: Soft Tempest In-Reply-To: Message-ID: At 9:19 PM -0800 2/8/98, Ryan Lackey wrote: >I'm a bit busy until at least after FC '98, or I'd do it myself. One >of my goals is to keep my laptop as secure as possible, and that's >an application where TEMPEST shielding is rather prohibitive. Really? You think so? You think TEMPEST treatment of laptops is more expensive than of normal machines? The physics suggests just the opposite: the RF emissions from laptops are expected to be lower from first principles, and, I have heard, are measurably much lower. (I say "have heard" because I don't have any access to RF measurement equipment...I once spent many hours a day working inside a Faraday cage, but that was many years ago.) The first principles part is that the deflection yokes in a CRT are the largest radiated component of what got named "van Eck radiation." (I'd just call it RF, but whatever.) Laptops are missing this component. (It might be interesting to see the radiated RF numbers for various kinds of flat panel displays.) The emission from the keyboard would have to be looked at, of course. Also, laptops, being so small, are easy to shield with mesh bags. An inelegant approach would be to bend copper sheeting to form an enclosure. A more elegant approach might be to take one of the tight-fitting laptop cases (like the Silicon Sports "Wetsuit") and use it as a pattern for a case made of conductive mesh fabric...or even something like aluminum screen. Several layers would be even better. But before going this route, I'd want to see some measurements. Laptops might already be "quiet enough." (Measurements are needed to determine the effectiveness of any proposed RF shielding anyway, so....) Finally, for a number of years there have been proposals for viewing screens built into glasses or goggles. "Crystal Eyes" was one of them. Another was a replacement for standard EGA screens (this was 4-6 years ago). These were being announced during the period when virtual reality (VR) was expected to dominate...that hasn't happened, yet. With some of these glasses, gargoyle-style, one could completely encase the laptop in a shielded case (like a Zero Haliburton) and then use a palm keypad... Speaking of this sort of approach, a lower-tech version might be to use a palmtop, like the HP 95LX, as a remote terminal to a machine completely shielded. (The laptop could be in a shielded enclosure, or backpack, with the 95LX snaked to it with cables.) Given the battery operation, the long battery life (which says radiated RF is likely to be under control), the LCD display, etc., this should be pretty good against eavesdroppers. I haven't yet looked at the Ross Anderson paper, but some things bother me about it. It seems unlikely that a "TEMPEST font" will affect keyboard and main CPU board noise. Also, in a multiple window environment, with several active windows, and with the target window being of varying sizes, I'm not quite sure I buy the idea that a remote sensing of the content of one window is very easy to pull off. But I'll take a look at what Ross has to say. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From dformosa at st.nepean.uws.edu.au Sun Feb 8 22:45:53 1998 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Mon, 9 Feb 1998 14:45:53 +0800 Subject: Soft Tempest In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Sun, 8 Feb 1998, Tim May wrote: [...] > Really? You think so? You think TEMPEST treatment of laptops is more > expensive than of normal machines? Laptops have a very tight size and waight budget. I would immagion this is the limmiting factor rather then the RF emissions. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBNN6OF6QK0ynCmdStAQFJaQQAkszblxy6EsbYL/xpFlrqjsBSYVtfd+nm lKTSccmEb2be6Eh7RYa9nUxQ1Pi3j/EzTCzkRc1SI1vxG1LfLc7721E9TR18Tk6N bfcNE7uolpSfMKaQO1J8ilihzc0aSYVFDFseLjID9cMRkwLwy84fmvlPUN0bNq7s 71IrIXzctLk= =7qfO -----END PGP SIGNATURE----- From ravage at ssz.com Sun Feb 8 22:55:54 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 14:55:54 +0800 Subject: Laptop TEMPEST Message-ID: <199802090657.AAA19180@einstein.ssz.com> Hi, Doesn't the FCC have to test the RF emissions of all laptops as well as monitors for sale as Class A and Class B in the US? Shouldn't that material be available? I searched the main site, www.fcc.gov, but didn't find anything regarding this. I sent a request for instructions on how to obtain the emissions test results on computer monitors and laptops for commercial and non-commercial use, foia at fcc.gov. If anyone actualy knows of the location I would be much obliged if you would pass it along. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From rdl at mit.edu Sun Feb 8 23:22:52 1998 From: rdl at mit.edu (Ryan Lackey) Date: Mon, 9 Feb 1998 15:22:52 +0800 Subject: Soft Tempest In-Reply-To: Message-ID: <199802090715.CAA24788@the-great-machine.mit.edu> Tim May wrote: > At 9:19 PM -0800 2/8/98, Ryan Lackey wrote: > > >I'm a bit busy until at least after FC '98, or I'd do it myself. One > >of my goals is to keep my laptop as secure as possible, and that's > >an application where TEMPEST shielding is rather prohibitive. > > Really? You think so? You think TEMPEST treatment of laptops is more > expensive than of normal machines? I think it is more difficult to have a lightweight, portable, non-maintenance intensive solution for tempest protecting a portable than for a big desktop box. A desktop box doesn't care how much it weighs. It can even be put inside a TEMPEST rack (I saw someone selling these at a convention once; I wanted one, but didn't have any way to to ship it back to Boston. Sigh), or just TEMPEST protect the entire room. One of the problems with TEMPEST protection is that the gaskets/etc. get worn. Or some stupid fsck paints the exposed copper in the doorway. Or whatever. I don't think requiring that the thing be portable, lightweight, etc. is going to make it any less likely to be damaged. If the TEMPEST protection is damaged, it's not as if a warning LED will come on -- TEMPEST monitoring equipment is *way* too heavy to build into a laptop, so it will fail silently. > The physics suggests just the opposite: the RF emissions from laptops are > expected to be lower from first principles, and, I have heard, are > measurably much lower. (I say "have heard" because I don't have any access > to RF measurement equipment...I once spent many hours a day working inside > a Faraday cage, but that was many years ago.) Certainly the traces are shorter, there are no big antennas (read: cables) connecting parts, etc. The power levels are power. There aren't any power cords if you're on battery. However, a lot of them have plastic cases and generally piss-poor shielding of any kind, too. > > The first principles part is that the deflection yokes in a CRT are the > largest radiated component of what got named "van Eck radiation." (I'd just > call it RF, but whatever.) > > Laptops are missing this component. (It might be interesting to see the > radiated RF numbers for various kinds of flat panel displays.) According to the Anderson paper, certain kinds of LCD-TFT have *easier to monitor* emissions than monitors. I have no idea which is the case, but I'm willing to err on the side of paranoia. I should scrounge up some TEMPEST monitoring equipment around MIT somewhere and test it, though. > > The emission from the keyboard would have to be looked at, of course. It's an integrated component, no keyboard wire, so it's much less likely to lose. > > Also, laptops, being so small, are easy to shield with mesh bags. An > inelegant approach would be to bend copper sheeting to form an enclosure. A > more elegant approach might be to take one of the tight-fitting laptop > cases (like the Silicon Sports "Wetsuit") and use it as a pattern for a > case made of conductive mesh fabric...or even something like aluminum > screen. Several layers would be even better. You need to worry about the mesh bag corrding/breaking/etc. But yeah, this is a decent technique. I wonder how small the mesh has to be to attenuate 30-40db of signal in the relevant frequencies, and if that makes it hard to see/type through. I should figure out what frequencies are involved. > > But before going this route, I'd want to see some measurements. Laptops > might already be "quiet enough." (Measurements are needed to determine the > effectiveness of any proposed RF shielding anyway, so....) The paper pretty clearly says laptop LCDs are not sufficiently quiet. Until I read this, I was under the impression they were; perhaps passive matrix screens are and active are not. (actually, I can totally understand that wrt the pulse modulation not present in modern crts) > > Finally, for a number of years there have been proposals for viewing > screens built into glasses or goggles. "Crystal Eyes" was one of them. > Another was a replacement for standard EGA screens (this was 4-6 years > ago). These were being announced during the period when virtual reality > (VR) was expected to dominate...that hasn't happened, yet. > > With some of these glasses, gargoyle-style, one could completely encase the > laptop in a shielded case (like a Zero Haliburton) and then use a palm > keypad... I used to work in the MIT Media Lab's wearables project -- we used this kind of approach. Something called a "twiddler" chording keyboard (unshielded; my advisor fled the country before I could get a shielded one set up), attached to a "private eye" monocular display; some odd resolution, again unshielded. Attached to a standard portable PC, a belt mounted PC, or whatever. I was going to put together a TEMPEST resistant wearable at some point. In addition, a mesh cloak; we'd been doing some privacy stuff, and discovered that there were penetrating cameras in use by some surveilance companies/etc. for anti-shoplifting/etc. -- it would be nice to shield against them. It never happened, oh well. I had a real bitch of a time finding open source TEMPEST information, which is part of why the idea was back-burnered. I think there is a concerted effort on the part of the government to prevent open source discussion of the topic, through manipulation of research money, etc. Most of my information was general purpose EE stuff and some EMP-shielding information, so perhaps I'm inclined to overkill (when dealing with EMP, you have to worry about 3 second duration *changes* in the field, so your faraday cage needs to be of uniform materials, joints need to be the same as the material, etc. In the absence of material to suggest otherwise, I think the same criteria apply to serious TEMPEST shielding, in the 85db+ range. There is some speculation that the SECRET TEMPEST specs are not sufficient to resist some modern SIGINT technology, and that there exist unknown standards for real protection for some applications. Perhaps this is unjustified paranoia). > > Speaking of this sort of approach, a lower-tech version might be to use a > palmtop, like the HP 95LX, as a remote terminal to a machine completely > shielded. (The laptop could be in a shielded enclosure, or backpack, with > the 95LX snaked to it with cables.) Given the battery operation, the long > battery life (which says radiated RF is likely to be under control), the > LCD display, etc., this should be pretty good against eavesdroppers. Even a passive component has a resonant frequency; if you're attacking, you may know it and can take advantage of this (hinted at in the paper). I don't think the palmtop being low power necessarily makes it immune, although I'd bet it's a bit better off than a laptop. > > I haven't yet looked at the Ross Anderson paper, but some things bother me > about it. It seems unlikely that a "TEMPEST font" will affect keyboard and > main CPU board noise. Also, in a multiple window environment, with several > active windows, and with the target window being of varying sizes, I'm not > quite sure I buy the idea that a remote sensing of the content of one > window is very easy to pull off. > > But I'll take a look at what Ross has to say. > > --Tim May I think the real solution is just what Ross said -- software + hardware. With the right font and X server frobbery, you can get *better* net image/text quality with TEMPEST protection and anti-aliasing than with neither. And it's a great safety net in case your hardware protection is compromised. Once the current project which by now is becoming rather tired of being brought up in passing rather than in a real comprehensive form is on its way, I'm going to look at the TEMPEST wearable, maybe with a verified cryptographic hardware implementation for the important stuff. An interim solution of a nice greyscale antialiased font in a java window serving as a console, even if only for things like the pgp xterm, would be a nice interim solution. Especially since it should only take a few hours to do, if someone has some font manipulation tools. I was originally thinking of modifying the text mode console drivers, but they use DOS text mode, which can't deal with greyscale. The solution is to use SVGAlib, GGI, or an X application. A really cool solution would be to make the X server itself do this to everything on the screen. XFree86 is way too nasty a codebase for me to modify in my spare time, though. I think Linux-GGI is the proper way to do it. > > > > > > Just Say No to "Big Brother Inside" > ---------:---------:---------:---------:---------:---------:---------:---- > Timothy C. May | Crypto Anarchy: encryption, digital money, > ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero > W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, > Higher Power: 2^3,021,377 | black markets, collapse of governments. > > > -- Ryan Lackey rdl at mit.edu http://mit.edu/rdl/ From rdl at mit.edu Sun Feb 8 23:44:54 1998 From: rdl at mit.edu (Ryan Lackey) Date: Mon, 9 Feb 1998 15:44:54 +0800 Subject: Laptop TEMPEST Message-ID: FCC RF/EMC testing is well nigh useless for TEMPEST protection. Compliance engineering firms have some equipment which might be useful for TEMPEST experimentation, but the actual specs for Class B (Class A is basically anything that won't kill you) are pretty worthless for this application. I imagine there may be some other "dual use" technologies through for testing TEMPEST equipment. Perhaps some medical equipment has stringent stray emanation specs? I believe the equipment you'd really want is the real "TS" (technical surveillance) gear, which is 1) not available on the open market and 2) expensive. The paper seems to have involved an AM radio and an obsolete piece of British TS kit; van Eck used a modified TV. Any HAM could probably build a suitable receiver, the real problem is knowing how much attenuation is necessary to defeat the real TS gear. This is why I am fundamentally impressed by the obfuscation techniques from the paper, rather than just straight shielding. -- Ryan Lackey rdl at mit.edu http://mit.edu/rdl/ From nobody at REPLAY.COM Sun Feb 8 23:56:46 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 9 Feb 1998 15:56:46 +0800 Subject: Drivers Licenses Message-ID: <199802090735.IAA08517@basement.replay.com> Jim Choate wrote: >> From: "William H. Geiger III" >> >> A couple of times through the washer and dryer and that >> lamination seperates. Any cop that has worked traffic >> has seen plenty of DL's in this shape (heh should have >> seen my old DL when I truned it in to get it renewed ). > > I rather doubt that. I have had a Texas drivers license > since I was 16, I'm now 38. I have washed them innumerable > times and I have never had the lamination break or > otherwise degrade. The lamination is quite heavy. I did > have one crack at the seam one time because of a bad > lamination and was specificaly instructed by the officer > who wrote me a speeding ticket to get it replaced. I did > so immediately. "Yes SIR!" > The law here is that if the license is damaged, you move, > or otherwise make the information invalid you have 30 > days to correct it. "Yes SIR!" > I suspect quite strongly that had I shown up at the > court house to pay that ticket with the same damaged > license (required to be shown at the time of payment) > they would not have accepted the payment and might have > asked to to discuss the situation with one of the > officers they so thoughtfuly have placed about the room. "Yes SIR!" > Texas takes counterfeiting of licenses quite seriously. "Yes SIR!" > My suggestion would be don't try such juvenile tricks here, "No, SIR!" > the DPS have seen it before "Yes SIR!" > and won't be pleasant people to deal with unless you're > a juvenile. "No SIR!" This is one of the things I love so about Texas and Texans. Despite inexplicable rumors and propaganda about independence and rugged frontier indivuality, Texans are as fucking obedient to authority as the most lock-stepped fucking Germans. The People's Republic of Texas is on the leading edge of Big Brother statism. Sales tax fully as high as New York's, fingerprints at driver license renewal time, roadblocks to fish for people who have been indulging in adult beverages or who have outstanding warrants, and some of the most dumb-fuck, clueless, fuckwit people behind badges in the known universe. Texans will give anyone their SS number at any time for any reason. Many print it on their checks. Texas is without doubt the Rube State. The only reason it isn't on the bleeding foreskin of Big Brother technology is that there aren't enough clues in the state to rub together to make a spark. When you run into anyone halfway sharp or better in Texas, it's a cinch they are a refugee from the unforgiving North. From shamrock at cypherpunks.to Sun Feb 8 23:57:29 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Mon, 9 Feb 1998 15:57:29 +0800 Subject: Driver Licenses In-Reply-To: <199802082027.PAA00347@users.invweb.net> Message-ID: On Sun, 8 Feb 1998, William H. Geiger III wrote: > My question is what is the best way to remove this information from the > cards? Making the mag stripe on a driver license unreadable by a POS terminal is easy. A refrigerator magnet will suffice. There is only one problem: chances are you then won't be sold any alcohol. See, major chains, such as the Southland corporation [7/11], recently installed POS terminals that are linked to the cash register. [This may not have reached a particular reader's area yet, please don't reply with "but my 7/11 down the corner does not do this"]. Unless a driver license has been swiped, the cash register will not permit the clerk to ring up the sale. It doesn't matter how old you are, you can be 80 years old and in a wheelchair, no government issued ID with working mag stripe, no alcohol or tobacco products for you. The clerk at my local 7/11 assured me the information captured would not be forwarded to a central site. Yet. It appears the stores are installing these systems to protect themselves against police sting "test buys", in which the authorities take persons just days shy of their 21st birthday, put theater makeup and/or a gray beard and wig on them and thus entrap store clerks into selling controlled substances to minors. As any fool can predict, the information captured will not remain local for long. After all, the system is ideal for monitoring gun^H^H^H alcohol purchases of parolees, tracking down deadbeat dads, etc. -- Lucky Green PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?" From shamrock at cypherpunks.to Mon Feb 9 00:24:11 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Mon, 9 Feb 1998 16:24:11 +0800 Subject: Drivers Licenses (fwd) In-Reply-To: <199802090355.VAA18303@einstein.ssz.com> Message-ID: On Sun, 8 Feb 1998, Jim Choate wrote: > I have a proposal. Lucky is supposed to be in Austin for the CFP conference. > If he is agreeable, he could ask to examine a Tx. d.l. We could leave it up > to his opinion as to whether these would be easy to alter. Why me? -- Lucky Green PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?" From jkwilli2 at unity.ncsu.edu Mon Feb 9 00:31:07 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Mon, 9 Feb 1998 16:31:07 +0800 Subject: What's the latest in factoring? In-Reply-To: <199802072222_MC2-3262-79F5@compuserve.com> Message-ID: On Sat, 7 Feb 1998, Alan Tu wrote: >anything more recent? Also, whereas 1024 bits was the commonly accepted >threshhold for key lengths more than two years ago, what's the threshhold >now? Because I have DOS (and like it) I use PGP 2.63ix, when should I >retire my 1024-bit key? I don't expect anybody to answer that I should >do so immediately, but can someone give me an idea on what people are >doing in regard to key length? > >Sincerely, > >Alan Tu 8192 bits is used now. you can generate 8192 bit keys with PGP 2.6.3ui (the unofficial international version). check out "PGP Projects" at http://www.westfalen.de/hugo/pgp/ or "The Unofficial International PGP Home Page" at http://members.tripod.com/~Crompton/pgp.htm for info and download. [note: you can of course generate MUCH larger keys, but i'm attempting to be practical for a change] Regards, TATTOOMAN /-=-=-=-=-=-=-=-=-=-=-=-[ TATTOOMAN ]-=-=-=-=-=-=-=-=-=-=-=-\ | NC State Computer Science Dept VP of The E. H. A. P. Corp. | | jkwilli2 at adm.csc.ncsu.edu http://www.hackers.com/ehap/ | | jkwilli2 at unity.ncsu.edu ehap at hackers.com | | WWW---[ http://152.7.11.38/~tattooman/ | | FTP---[ ftp://152.7.11.38/pub/personal/tattooman/ | | WW2---[ http://www4.ncsu.edu/~jkwilli2/ | | W3B---[ http://152.7.11.38/~tattooman/w3board/ | | PGP---[ http://www4.ncsu.edu/~jkwilli2/pgp.asc | | 35 E1 32 C7 C9 EF A0 AB 9D FE 8E FC 2D 68 55 44 | \-=-=-=-=-=-=-[ http://152.7.11.38/~tattooman/ ]-=-=-=-=-=-=-/ From bill.stewart at pobox.com Mon Feb 9 00:36:07 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Mon, 9 Feb 1998 16:36:07 +0800 Subject: Most elegant wording against privacy/law-enforcement "balance" In-Reply-To: <9802070144.AA11833@mentat.com> Message-ID: <3.0.5.32.19980208073437.007cd710@popd.ix.netcom.com> >> What are the most elegant rebuttals to politicians saying we >> need Key Recovery as a "reasonable balance between the needs of >> law enforcement vs. freedom of crypto"? Someone, probably Jim Ray, has a nice phrase about "Protecting the Fourth Amendment _is_ one of the legitimate needs of law enforcement." It's not an in-depth critique, but it's enough to get a rant off to a good start, where you're on the moral high ground, rather than the "Even the FBI's friends like Dorothy haven't found a legitimate need for increasing wiretaps", which is a useful place to go as long as you're already ahead. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From yourfriend8950 at psynet.net Mon Feb 9 17:13:46 1998 From: yourfriend8950 at psynet.net (yourfriend8950 at psynet.net) Date: Mon, 9 Feb 1998 17:13:46 -0800 (PST) Subject: Online Credit Card Transactions for $39.95!! Message-ID: <199802100111.BAA03828@server1.online-now.de> Lease to own your merchant account equipment, software, and shopping cart system for only $39.95 per month! WE GUARANTEE APPROVAL no matter what your credit status may be! The benefits include: * 2% Discount Rate * No Monthly Minimum Billing Fee * No Statement Fee if No Sales Made for the Month * Money Available in 3 Business Days * Windows-Based or Macintosh Compatible Credit Card Processing Software (Available) * Shopping Cart System To Take Orders Securely Right On-Line (Available) * Checks By Fax/Email/Phone software. Please call us at 912-236-6676 for more information. Please fill out the form below and fax to 970-927-0964. ======================================================= Merchant Account Application Legal Business Name: ____ State: __________________ DBA: ____________________ Business Address: _______ Suite: __________________ City State Zip: _________ Describe Business: ______ Business Hours: _________ Percent Mail Order: _____ Percent Phone Orders: ___ Percent Trade Show: _____ Locations: ______________ Year Started: ___________ Fed Tax ID: _____________ State Tax ID: ___________ Principal Contact: ______ Title: __________________ Phone No: _______________ Fax No: _________________ Est Card Sales Month: ___ Average Ticket: _________ Type of Business: _______ State Incorporated: _____ Age of Business: ________ Date Acquired: __________ OWNER PRINCIPAL INFORMATION: President Owner: ________ Title: __________________ Ownership: ______________ Residence Address: ______ City State Zip: _________ Own Rent: _______________ Since: __________________ Home Phone: _____________ Previous Address: _______ DOB: ____________________ CO OWNER INFORMATION: Co-Owner: _______________ Title: __________________ Percent Owned: __________ Residence Address: ______ City State Zip: _________ Since: __________________ Own Rent: _______________ BUSINESS TYPE: Type of Building: _______ Found EMS By: ___________ CREDIT INFO: Rank Your Credit: _______ Prior Bankrupt: _________ Year: ___________________ TERMINAL: Prefer PC Software or Terminal?: ___ Terms/Lease or Purchase?: __________________ REFERENCES: BUSINESS REFERENCES: (Please list three) From adam at homeport.org Mon Feb 9 02:12:13 1998 From: adam at homeport.org (Adam Shostack) Date: Mon, 9 Feb 1998 18:12:13 +0800 Subject: Driver Licenses In-Reply-To: Message-ID: <199802091006.FAA08443@homeport.org> I used to work in a lab with an MRI. Erased my credit cards regularly. I visit from time to time. :) Adam Anonymous wrote: | >Odd. When I first got a card with the stripe, I was a little paranoid so | >I took a bar magnet and erased it. Actually, I don't know whether my | >eraser worked because nobody has ever asked to swipe my card thru a | >reader. I got a wallet with a plastic fold-out so if someone asks to see | >my id, I open my wallet and show it to them, then put it away. | | How many of us have done this? I nuked mine in the parking lot of the DMV. | -- "It is seldom that liberty of any kind is lost all at once." -Hume From jkwilli2 at unity.ncsu.edu Mon Feb 9 05:13:34 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Mon, 9 Feb 1998 21:13:34 +0800 Subject: 145 Million In-Reply-To: <199801260540.XAA10977@mail.t-1net.com> Message-ID: On Sun, 25 Jan 1998 MAILER-DAEMON at toad.com wrote: >Removal instructions below. > >If someone with an 8th grade education can make a personal >fortune of $145 million in network marketing with herbs, that's a shitload of weed! it would be quite risky too trying to move over 45,000 lbs of quality weed. you are right though that anyone with an 8th grade education can do it....in fact, i would say most of the ppl trying to achieve this probably have an 8th grade education or less. >why can't you? Especially when this person has just decided um....because i didn't enjoy prison the first time? >to come out of retirement to launch an upstart company, >marketing products that were used by the Russians to win all >those gold medals at the Olympic Games. With more scientific Russians winning gold medals? you want me to push steroids too? >research than anything else on the market, it's no wonder why >so many doctors are joining our company and offering these >products to their patients. dope dealers = doctors? crackheads = patients? >Why not do something different to change your life? Join in ok, pass me that crack pipe you're tokin on then. >with the person who knows how to make things happen big and >fast. He has just joined our company and is willing to help >you learn how to 'set yourself free'. uhh....Scarface died trying to do this, didn't he? >Someday maybe you can throw the alarm clock out the window. >For good. but my pager and cellfone will be going off constantly. since i'll probably be jacked on crystal meth all the time, i guess i won't mind though.... >For additional information, please check out the following: >http://www.prime-1.com > >Thanks > > >For guaranteed removal call 1-800-555-9205, ext. 3256, >24 hours a day. > yeah, right. TATTOOMAN From mktmaster23662 at juno.com Mon Feb 9 22:04:26 1998 From: mktmaster23662 at juno.com (mktmaster23662 at juno.com) Date: Mon, 9 Feb 1998 22:04:26 -0800 (PST) Subject: HERE IS HOW TO BULK EMAIL... Message-ID: <> Press the reply button and type "remove" (without the quotes) in the subject heading to be removed from our list. Thank You ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Here is how to bulk email your product, service, or business opportunity SUCCESSFULLY... FACT: While there are many people who TRY to bulk email, There are very few who do it successfully! Why?: Because many people buy bulk email software along with millions of addresses, and are still not supplied with the NECESSARY INFORMATION they MUST HAVE to successfully bulk email. Here is the rest of the information that the bulk email programs and list sellers never give you that you MUST have. For the beginner: This site teaches you as if you were in the 1st Grade, with complete step-by-step INSTRUCTIONS, SOFTWARE & addresses to start effective bulk emailing IMMEDIATELY, at speeds of up to 250,000 emails per hour (and faster). Don't pay someone else to send your bulk email... You never know if it REALLY IS going out! DO IT YOURSELF! WE INCLUDE: * COMPLETE INSTRUCTIONS on HOW to send Bulk Email! * Information on SMTP servers * "bulk friendly" ISPs * How to Make sure your email is being delivered * How to read header information * How to put "CLICK HERE" links in your bulk email * HOW TO SEND BULK EMAIL IN COLOR * Information on the Internet and WHY bulk emailing * Much, Much More! Also: * FREE 8 MILLION EMAIL ADDRESSES available for download RIGHT NOW! * FREE Email List Management Software (sorts, counts, filters, combines, etc. at Lightning Speed!) * STEALTH MASSMAILER SOFTWARE When registering YOU WILL SAVE 50%!!!!! * FREE Software demo that AUTOMATICALLY keeps you signed on AOL indefinitely! * Search Engine submission software demo * MANY MORE SUPRISES AND PROGRAMS!!!! The cost for membership is only $99.00!!!! Limited Time Offer!
CLICK HERE NOW!
or point your browser to: http://209.51.216.146/bulk.htm From mktmaster23662 at juno.com Mon Feb 9 22:04:26 1998 From: mktmaster23662 at juno.com (mktmaster23662 at juno.com) Date: Mon, 9 Feb 1998 22:04:26 -0800 (PST) Subject: HERE IS HOW TO BULK EMAIL... Message-ID: <> Press the reply button and type "remove" (without the quotes) in the subject heading to be removed from our list. Thank You ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Here is how to bulk email your product, service, or business opportunity SUCCESSFULLY... FACT: While there are many people who TRY to bulk email, There are very few who do it successfully! Why?: Because many people buy bulk email software along with millions of addresses, and are still not supplied with the NECESSARY INFORMATION they MUST HAVE to successfully bulk email. Here is the rest of the information that the bulk email programs and list sellers never give you that you MUST have. For the beginner: This site teaches you as if you were in the 1st Grade, with complete step-by-step INSTRUCTIONS, SOFTWARE & addresses to start effective bulk emailing IMMEDIATELY, at speeds of up to 250,000 emails per hour (and faster). Don't pay someone else to send your bulk email... You never know if it REALLY IS going out! DO IT YOURSELF! WE INCLUDE: * COMPLETE INSTRUCTIONS on HOW to send Bulk Email! * Information on SMTP servers * "bulk friendly" ISPs * How to Make sure your email is being delivered * How to read header information * How to put "CLICK HERE" links in your bulk email * HOW TO SEND BULK EMAIL IN COLOR * Information on the Internet and WHY bulk emailing * Much, Much More! Also: * FREE 8 MILLION EMAIL ADDRESSES available for download RIGHT NOW! * FREE Email List Management Software (sorts, counts, filters, combines, etc. at Lightning Speed!) * STEALTH MASSMAILER SOFTWARE When registering YOU WILL SAVE 50%!!!!! * FREE Software demo that AUTOMATICALLY keeps you signed on AOL indefinitely! * Search Engine submission software demo * MANY MORE SUPRISES AND PROGRAMS!!!! The cost for membership is only $99.00!!!! Limited Time Offer!
CLICK HERE NOW!
or point your browser to: http://209.51.216.146/bulk.htm From dlv at bwalk.dm.com Mon Feb 9 06:06:14 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 9 Feb 1998 22:06:14 +0800 Subject: 145 Million In-Reply-To: Message-ID: <2uymke8w165w@bwalk.dm.com> Ken Williams writes: > >to come out of retirement to launch an upstart company, ^^^^^^^^^^ jail :-) > >marketing products that were used by the Russians to win all > >those gold medals at the Olympic Games. With more scientific > > Russians winning gold medals? you want me to push steroids too? I suspect they used much more than steroids and that half the chemicals are so secret they're not illegal yet. You don't think Russian gymnast girls were on steroids, do you? ;-) (They do have to take the Pill, so they don't get their period in the middle of a performance.) Guy Polis is a pedophile who became interested in cryptography because he didn't want to the cops to read the child pornography pictures on his hard disk. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From ravage at ssz.com Mon Feb 9 06:17:25 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 22:17:25 +0800 Subject: Drivers Licenses (fwd) Message-ID: <199802091420.IAA20507@einstein.ssz.com> Forwarded message: > Date: Mon, 9 Feb 1998 09:25:55 +0100 (CET) > From: Lucky Green > Subject: re: Drivers Licenses (fwd) > On Sun, 8 Feb 1998, Jim Choate wrote: > > I have a proposal. Lucky is supposed to be in Austin for the CFP conference. > > If he is agreeable, he could ask to examine a Tx. d.l. We could leave it up > > to his opinion as to whether these would be easy to alter. > > Why me? Convenience. You seemed like the right person who would be in the right place with the right technical skills to ask for indipendent opinion. You obviously don't feel comfortable with it. I apologize for the intrusion. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Mon Feb 9 06:21:43 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 22:21:43 +0800 Subject: Driver Licenses (fwd) Message-ID: <199802091425.IAA20569@einstein.ssz.com> Forwarded message: > Date: Mon, 9 Feb 1998 09:00:12 +0100 (CET) > From: Lucky Green > Subject: Re: Driver Licenses > The clerk at my local 7/11 assured me the information captured would not > be forwarded to a central site. Yet. It appears the stores are installing > these systems to protect themselves against police sting "test buys", in > which the authorities take persons just days shy of their 21st birthday, > put theater makeup and/or a gray beard and wig on them and thus entrap > store clerks into selling controlled substances to minors. > > As any fool can predict, the information captured will not remain local > for long. After all, the system is ideal for monitoring gun^H^H^H alcohol > purchases of parolees, tracking down deadbeat dads, etc. I have worked doing technical support for McDonalds in two of my past jobs. I assure you that when they dump the stores records each night they are dumping this as well. They dump gas sales from the automated machines as a matter of course. The real question is who besides Southland Corp. subsidies are they selling this info to? ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Mon Feb 9 06:28:24 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 22:28:24 +0800 Subject: Laptop TEMPEST (fwd) Message-ID: <199802091430.IAA20623@einstein.ssz.com> Forwarded message: > Subject: Re: Laptop TEMPEST > From: Ryan Lackey > Date: 09 Feb 1998 02:34:15 -0500 > FCC RF/EMC testing is well nigh useless for TEMPEST protection. I disagree, it would give you a gross baseline on the total emissions between monitors and laptops. That field strenght measurement would at least allow you to calculate radiuses of equal strength to calculate approximately how far the emissions are from each class of device for equal probabilities of detection. One of the specific goals is to measure how effective the device is at effecting other co-located devices (such as seeing ghost images on other monitors or causing static in paging equipment). I suspect one could do it with a spectrum analyzer or a grid dip meter. > I imagine there may be some other "dual use" technologies through for > testing TEMPEST equipment. Perhaps some medical equipment has stringent > stray emanation specs? We're not trying to bring the individual vertical retraces out of the chaff...we're trying to calculate the total comparitive emission strengths. If that isn't high enough then trying to get individual componants of that field will be useless. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From jya at pipeline.com Mon Feb 9 06:40:36 1998 From: jya at pipeline.com (John Young) Date: Mon, 9 Feb 1998 22:40:36 +0800 Subject: EPIC World Crypto Survey Message-ID: <1.5.4.32.19980209142939.00b36c60@pop.pipeline.com> The New York Times, February 9, 1998, p. D10: U.S. Losing Battle on Control of Data Encryption, Study Says By Jeri Clausing Washington -- The Clinton Administration is losing its battle to increase international controls over how reliably computer data can be scrambled to insure privacy, according to a report to be released Monday by an independent research group. ... The Electronic Privacy Information Center says that its survey of 243 governments showed that the United States is virtually the only democratic, industrialized nation seeling domestic regulation of strong encryption. That finding directly contradicts the Clinton Administration's assertions in Congressional hearings that it has the support of most nations on this issue. ... William Reinsch, the Under Secretary for export administration in the United States Commerce Department, denied that the study contradicted the Administration's assertions. "All the Administration has ever said is that there are more countries that go farther than we do," Mr. Reinsch said. "The study confirms that." From ravage at ssz.com Mon Feb 9 06:54:28 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 22:54:28 +0800 Subject: Airport security cracked by flaw [CNN] Message-ID: <199802091452.IAA20852@einstein.ssz.com> Forwarded message: > X-within-URL: http://www.cnn.com/TECH/computing/9802/08/security.reut/index.html > REPORT: COMPUTER DESIGN FLAW OPENS AIRPORTS TO TERRORISM > > graphic February 8, 1998 > Web posted at: 1:25 p.m. EST (1825 GMT) > > NEW YORK (Reuters) -- The computer security systems that control > access to 40 airports worldwide through electronic badges have a > design flaw that could make them vulnerable to terrorism, The New > York Times reported Sunday. > > A California computer security consulting firm, MSB Associates, > found the flaw in December in a routine audit of a large California > financial services software company, the identity of which was not > disclosed, according to the newspaper. > > Government buildings, including that of the CIA, and prisons and > industries with sensitive military, drug or financial information or > material also use the system and are also vulnerable to attack, the > Times report said. [text deleted] ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From jkwilli2 at unity.ncsu.edu Mon Feb 9 06:59:21 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Mon, 9 Feb 1998 22:59:21 +0800 Subject: CYBERsitter caught mail-bombing (fwd) Message-ID: ---------- Forwarded message ---------- Date: Fri, 6 Feb 1998 23:25:04 -0500 From: bennett at peacefire.org To: peacefire-broadcast at vorlon.mit.edu Subject: CYBERsitter caught mail-bombing CYBERsitter has been caught in the act of mail-bombing someone who wrote a letter to Brian Milburn, the CEO of CYBERsitter, complaining about their product. Spefically, a lady names Sarah Salls sent the following letter to Brian Milburn at bmilburn at solidoak.com: http://peacefire.org/archives/SOS.letters/asherah.2.bm.2.4.98.txt She was writing to CYBERsitter regarding their harassment of Peacefire and their blocking of anti-censorship sites, which is described in more detail at: http://www.peacefire.org/censorware/CYBERsitter/ CYBERsitter replied by flooding her account with over 446 junk messages. While the attack was in progress, Ms. Salls had her ISP's postmaster monitor the incoming attack and shut it off. Naturally, her ISP, Valinet.com, kept copies of the mail logs for that day and has passed them on as evidence to their lawyers. A complaint was also forwarded to MCI's security department, which handles network abuse and illegal denial-of-service attacks that are perpetrated by their customers, which include lower-end network users like CYBERsitter: http://peacefire.org/archives/SOS.letters/valinet.2.mci.2.5.98.txt C-Net's NEWS.com picked up on the story and interviewed Sarah Salls, her ISP, me, and Brian Milburn from Solid Oak Software. Their story is at: http://www.news.com/News/Item/0,4,18937,00.html (Note that the C-Net article compares the act of mail flooding with conventional spam, and says that a bill is being considered in Congress that would outlaw what CYBERsitter did. This is not quite true; flooding a person's account with 500 junk messages is a denial-of-service attack, which is already illegal, and it usually gets you in a lot more trouble than spamming would.) Far from denying the accusations, Brian Milburn gave C-Net the following quote: "Certain people aren't going to get the hint. Maybe if they get the email 500 times, they'll get it through their heads... If they send it to my private email account, they're going to get what they get." No kidding, Brian! bennett at peacefire.org (615) 421 6284 http://www.peacefire.org/ --- From raph at CS.Berkeley.EDU Mon Feb 9 07:00:38 1998 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Mon, 9 Feb 1998 23:00:38 +0800 Subject: List of reliable remailers Message-ID: <199802091450.GAA04639@kiwi.cs.berkeley.edu> I operate a remailer pinging service which collects detailed information about remailer features and reliability. To use it, just finger remailer-list at kiwi.cs.berkeley.edu There is also a Web version of the same information, plus lots of interesting links to remailer-related resources, at: http://www.cs.berkeley.edu/~raph/remailer-list.html This information is used by premail, a remailer chaining and PGP encrypting client for outgoing mail. For more information, see: http://www.c2.org/~raph/premail.html For the PGP public keys of the remailers, finger pgpkeys at kiwi.cs.berkeley.edu This is the current info: REMAILER LIST This is an automatically generated listing of remailers. The first part of the listing shows the remailers along with configuration options and special features for each of the remailers. The second part shows the 12-day history, and average latency and uptime for each remailer. You can also get this list by fingering remailer-list at kiwi.cs.berkeley.edu. $remailer{'cyber'} = ' alpha pgp'; $remailer{"mix"} = " cpunk mix pgp hash latent cut ek ksub reord ?"; $remailer{"replay"} = " cpunk mix pgp hash latent cut post ek"; $remailer{"jam"} = " cpunk mix pgp hash middle latent cut ek"; $remailer{"winsock"} = " cpunk pgp pgponly hash cut ksub reord ?"; $remailer{'nym'} = ' newnym pgp'; $remailer{"squirrel"} = " cpunk mix pgp pgponly hash latent cut ek"; $remailer{'weasel'} = ' newnym pgp'; $remailer{"reno"} = " cpunk mix pgp hash middle latent cut ek reord ?"; $remailer{"cracker"} = " cpunk mix remix pgp hash ksub esub latent cut ek reord post"; $remailer{'redneck'} = ' newnym pgp'; $remailer{"bureau42"} = " cpunk mix pgp ksub hash latent cut ek"; $remailer{"neva"} = " cpunk pgp pgponly hash cut ksub ?"; $remailer{"lcs"} = " mix"; $remailer{"medusa"} = " mix middle" $remailer{"McCain"} = " mix middle"; $remailer{"valdeez"} = " cpunk pgp pgponly hash ek"; $remailer{"arrid"} = " cpunk pgp pgponly hash ek"; $remailer{"hera"} = " cpunk pgp pgponly hash ek"; $remailer{"htuttle"} = " cpunk pgp hash latent cut post ek"; catalyst at netcom.com is _not_ a remailer. lmccarth at ducie.cs.umass.edu is _not_ a remailer. usura at replay.com is _not_ a remailer. remailer at crynwr.com is _not_ a remailer. There is no remailer at relay.com. Groups of remailers sharing a machine or operator: (cyber mix reno winsock) (weasel squirrel medusa) (cracker redneck) (nym lcs) (valdeez arrid hera) This remailer list is somewhat phooey. Go check out http://www.publius.net/rlist.html for a good one. Last update: Thu 23 Oct 97 15:48:06 PDT remailer email address history latency uptime ----------------------------------------------------------------------- hera goddesshera at juno.com ------------ 5:03:45 99.86% nym config at nym.alias.net +*#**#**### :34 95.82% redneck config at anon.efga.org #*##*+#**** 2:00 95.44% mix mixmaster at remail.obscura.com +++ ++++++* 19:18 95.27% squirrel mix at squirrel.owl.de -- ---+--- 2:34:19 95.16% cyber alias at alias.cyberpass.net *++***+ ++ 11:26 95.11% replay remailer at replay.com **** *** 10:06 94.93% arrid arrid at juno.com ----.------ 8:50:34 94.41% bureau42 remailer at bureau42.ml.org --------- 3:38:29 93.53% cracker remailer at anon.efga.org + +*+*+*+ 16:32 92.80% jam remailer at cypherpunks.ca + +*-++++ 24:14 92.79% winsock winsock at rigel.cyberpass.net -..-..---- 9:59:18 92.22% neva remailer at neva.org ------****+ 1:03:02 90.39% valdeez valdeez at juno.com 4:58:22 -36.97% reno middleman at cyberpass.net 1:01:28 -2.65% History key * # response in less than 5 minutes. * * response in less than 1 hour. * + response in less than 4 hours. * - response in less than 24 hours. * . response in more than 1 day. * _ response came back too late (more than 2 days). cpunk A major class of remailers. Supports Request-Remailing-To: field. eric A variant of the cpunk style. Uses Anon-Send-To: instead. penet The third class of remailers (at least for right now). Uses X-Anon-To: in the header. pgp Remailer supports encryption with PGP. A period after the keyword means that the short name, rather than the full email address, should be used as the encryption key ID. hash Supports ## pasting, so anything can be put into the headers of outgoing messages. ksub Remailer always kills subject header, even in non-pgp mode. nsub Remailer always preserves subject header, even in pgp mode. latent Supports Matt Ghio's Latent-Time: option. cut Supports Matt Ghio's Cutmarks: option. post Post to Usenet using Post-To: or Anon-Post-To: header. ek Encrypt responses in reply blocks using Encrypt-Key: header. special Accepts only pgp encrypted messages. mix Can accept messages in Mixmaster format. reord Attempts to foil traffic analysis by reordering messages. Note: I'm relying on the word of the remailer operator here, and haven't verified the reord info myself. mon Remailer has been known to monitor contents of private email. filter Remailer has been known to filter messages based on content. If not listed in conjunction with mon, then only messages destined for public forums are subject to filtering. Raph Levien From mark at unicorn.com Mon Feb 9 07:16:21 1998 From: mark at unicorn.com (mark at unicorn.com) Date: Mon, 9 Feb 1998 23:16:21 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <887036600.23860.193.133.230.33@unicorn.com> Jim Choate (ravage at ssz.com) wrote: >So do I, and I bet both our incomes combined doesn't add up to 15 minutes of >Bill G's and it won't. Of course not, because Bill has jackbooted copyright enforcers to subsidise his corporation. Without them his income would be dramatically reduced. >From a market perspective we're flies on the back of >great elephant. Please be so kind as to describe how and why this marketing >mechanism (copyleft) will succed? Uh, I said copyright should be abolished, you said noone would write software, I said that Linux disproved that claim. How is this relevant to that discussion? Of course it's not going to take over when companies can get billions of dollars of subsidies in the form of copyright enforcement, but it clearly shows that without copyright people will produce better software than Microsfot has ever written. >I've been using and supporting Linux since >1993 (SSZ is listed as a source site in the back of 'Running Linux' since >day one) in this manner neither I or anyone else has gotten rich. Exactly. So tell us how Bill would have become a billionaire without copyright? >It's copyrighted in the important sense in that it uses the copyright to >enforce its conditions. That is just as important as the marketing decisions >made by it. All it enforces is source-code distribution (and I've yet to hear of a single case where it's ever been used). That's important to the developers, but not to the average user. The situation would be little changed in a world with no copyright, because if anyone did try to keep their source secret anyone who got a copy could freely distribute it. I'm truly amazed to find all these pro-copyright views on the list, when cypherpunks have been at the forefront of creating technologies to make it unenforceable and obsolete. Mark From ericm at lne.com Mon Feb 9 08:42:33 1998 From: ericm at lne.com (Eric Murray) Date: Tue, 10 Feb 1998 00:42:33 +0800 Subject: Driver Licenses In-Reply-To: Message-ID: <199802091627.IAA15679@slack.lne.com> Lucky Green writes: > > On Sun, 8 Feb 1998, William H. Geiger III wrote: > > My question is what is the best way to remove this information from the > > cards? > > Making the mag stripe on a driver license unreadable by a POS terminal is > easy. A refrigerator magnet will suffice. There is only one problem: > chances are you then won't be sold any alcohol. > > See, major chains, such as the Southland corporation [7/11], recently > installed POS terminals that are linked to the cash register. [This may > not have reached a particular reader's area yet, please don't reply with > "but my 7/11 down the corner does not do this"]. I have no idea if my local 7/11 does this. I don't even know where my local 7/11 is. I do however find it interesting that they're implementing this policy when there are still legally-issued non-mag-stripe driver's licenses in circulation... like mine, issued in 1980 (extended many times) and valid til the end of this year. > Unless a driver license has been swiped, the cash register will not permit > the clerk to ring up the sale. It doesn't matter how old you are, you can > be 80 years old and in a wheelchair, no government issued ID with working > mag stripe, no alcohol or tobacco products for you. Never mind that the CDL isn't supposed to be a citizen's ID badge. > The clerk at my local 7/11 assured me the information captured would not > be forwarded to a central site. Yet. It appears the stores are installing > these systems to protect themselves against police sting "test buys", in > which the authorities take persons just days shy of their 21st birthday, > put theater makeup and/or a gray beard and wig on them and thus entrap > store clerks into selling controlled substances to minors. > > As any fool can predict, the information captured will not remain local > for long. After all, the system is ideal for monitoring gun^H^H^H alcohol > purchases of parolees, tracking down deadbeat dads, etc. We're building Big Brother, one tiny step at a time. I hear we're going to war against Oceania again next month. -- Eric Murray Chief Security Scientist N*Able Technologies www.nabletech.com (email: ericm at lne.com or nabletech.com) PGP keyid:E03F65E5 From Markus.Kuhn at cl.cam.ac.uk Mon Feb 9 09:11:17 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Tue, 10 Feb 1998 01:11:17 +0800 Subject: Soft Tempest In-Reply-To: Message-ID: Tim May wrote on 1998-02-09 06:14 UTC: > The physics suggests just the opposite: the RF emissions from laptops are > expected to be lower from first principles, and, I have heard, are > measurably much lower. (I say "have heard" because I don't have any access > to RF measurement equipment...I once spent many hours a day working inside > a Faraday cage, but that was many years ago.) > > The first principles part is that the deflection yokes in a CRT are the > largest radiated component of what got named "van Eck radiation." (I'd just > call it RF, but whatever.) You have to differentiate between information carrying emanations and non-information carrying ones. The horizontal and vertical deflection coils produce a lot of radiation at harmonics of the line and frame rate of your CRT, but this signal energy is not related to your screen content (only to your video mode), and therefore not of much concern for the eavesdropper. The low-radion monitor standards look only at those signal (<400 kHz). Therefore having a TCO92 monitor provides you absolutely no advantage with respect to eavesdropping. The information carrying signals of VDUs are in much higher frequency ranges in the VHF/UHF bands. Laptops are pretty good broadcasters there, too. Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From Markus.Kuhn at cl.cam.ac.uk Mon Feb 9 09:14:13 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Tue, 10 Feb 1998 01:14:13 +0800 Subject: Laptop TEMPEST In-Reply-To: <199802090657.AAA19180@einstein.ssz.com> Message-ID: Jim Choate wrote on 1998-02-09 06:57 UTC: > Doesn't the FCC have to test the RF emissions of all laptops as well as > monitors for sale as Class A and Class B in the US? Shouldn't that material > be available? I searched the main site, www.fcc.gov, but didn't find > anything regarding this. I suspect that FCC material is not helpful with regard to Tempest. Results of such EMI tests only measure the general power spectrum emitted by a device. Of interest for Tempest purposes however is not the power spectrum, but the spectrum of the cross-correlation between an internal signal-of-interest in the device and the emanated radiation. There are special cross-correlation meters available to measure this, but this is not the equipment used in EMI tests. I have here two patents filed by the German equivalent of the NSA, that describes cross-correlation techniques for the "detection of highly distorted digital signals". Measurement equipment along those lines are what you need in order to estimate the information carrying components of the emanated spectrum. You can do cross-correlation not only between the VGA cable output and the signal picked up by an antenna or a power/ground line tap, but also between internal bus lines, the keyboard power/data lines, the read amplifier signal in your harddisk, etc. Cross-correlation tests are also useful to measure cross-talk effects between neighbor cables in your building. As mentioned in our paper, secret data on your LAN can easily leave your building via phone cables that ran parallel to your network cable for only a few meters. Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From bill.stewart at pobox.com Mon Feb 9 09:21:18 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 10 Feb 1998 01:21:18 +0800 Subject: Driver Licenses In-Reply-To: Message-ID: <3.0.5.32.19980209091437.007b5da0@popd.ix.netcom.com> >I used to work in a lab with an MRI. Erased my credit cards >regularly. I visit from time to time. :) Don't you just hate it when that happens :-) In particular, unlike scratching the mag strip off or ironing, if the mag strip doesn't work, you can just look ignorant. I have enough trouble with my real credit cards being non-scannable. The issue of driver's license mag strip technology has been discussed here in the past, and probably also on some of the privacy newsgroups. You could grunge around the archives and see what you find. If memory serves me correctly, most of them use a common magstripe format used for credit cards, which gives three stripes of up to about 80 bytes each. (It's been suggested that some states use a higher magnetization level, either to reduce forgery or probability of damage.) Typically they'll have the DL#, name, height, weight, eye color, race, Jew bit, Commie bit, etc., so the cops can not only scan the information conveniently, but also can compare it to the information on the front to see if it's forged. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From tcmay at got.net Mon Feb 9 09:33:38 1998 From: tcmay at got.net (Tim May) Date: Tue, 10 Feb 1998 01:33:38 +0800 Subject: Driver Licenses In-Reply-To: <199802082027.PAA00347@users.invweb.net> Message-ID: At 12:00 AM -0800 2/9/98, Lucky Green wrote: >See, major chains, such as the Southland corporation [7/11], recently >installed POS terminals that are linked to the cash register. [This may >not have reached a particular reader's area yet, please don't reply with >"but my 7/11 down the corner does not do this"]. > >Unless a driver license has been swiped, the cash register will not permit >the clerk to ring up the sale. It doesn't matter how old you are, you can >be 80 years old and in a wheelchair, no government issued ID with working >mag stripe, no alcohol or tobacco products for you. If this is consistently the case, then one approach is to wheel a cart up to the checkout line with some alcohol....and a cart full of items from the freezer and deli sections. (Some cartons of chicken salad, partly "sampled," for example.) If a U.S. Passport is not considered enough I.D., because it doesn't have the Big Brother Inside magstripe, one walks away from the transaction. "Oh, OK, you won't take my money. Bye!" (I don't believe there are any laws saying a customer must separate his purchases...if the store refuses to transact business with a customer, he may leave.) This leaves all that frozen food to be quickly returned to the shelves, and the deli food, which probably cannot be returned. (Depends on store and health department policy.) I wish no ill will toward merchants, but implementing a Big Brother Inside tracking policy carries some real costs. Lucky didn't want us to reply with anecdotes, but I have to note that many, many people will inevitably not have the type of cards Lucky refers to. Visitors, tourists, residents of other states, etc. This would all be lost revenue to stores. I thus question the "universality" of Southland's plans. Perhaps only those who "look under 26" (which is what the signs say) will be "striped carded." >The clerk at my local 7/11 assured me the information captured would not >be forwarded to a central site. Yet. It appears the stores are installing >these systems to protect themselves against police sting "test buys", in >which the authorities take persons just days shy of their 21st birthday, >put theater makeup and/or a gray beard and wig on them and thus entrap >store clerks into selling controlled substances to minors. Lucky is right that that "underage stings" are on the increase. Underage persons, often in high school, beome self-righteour warriors in the War On Demon Rum, and "narc out" their local shopkeepers. Hey, it would serve these junior narcs right if, upon being carded and being shown to be underage, a store owner made a citizen's arrest. Perhaps putting the perp in the back freezer for a few hours would send a message. >As any fool can predict, the information captured will not remain local >for long. After all, the system is ideal for monitoring gun^H^H^H alcohol >purchases of parolees, tracking down deadbeat dads, etc. We are on the road toward a surveillance society. Sadly, the ideas of David Chaum are more needed than ever, but his stuff is essentially nowhere to be seen. (To reflect Lucky's comments back to him, :-), spare us any citations of how Mark Twain Bank will let some people open a cumbersome Digicash account.) --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From ravage at ssz.com Mon Feb 9 09:36:40 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 01:36:40 +0800 Subject: Laptop TEMPEST (fwd) Message-ID: <199802091735.LAA21910@einstein.ssz.com> Forwarded message: > Subject: Re: Laptop TEMPEST > Date: Mon, 09 Feb 1998 17:07:23 +0000 > From: Markus Kuhn > Jim Choate wrote on 1998-02-09 06:57 UTC: > > Doesn't the FCC have to test the RF emissions of all laptops as well as > > monitors for sale as Class A and Class B in the US? Shouldn't that material > > be available? I searched the main site, www.fcc.gov, but didn't find > > anything regarding this. > > I suspect that FCC material is not helpful with regard to Tempest. As to calculating a realistic estimate of range to intercept, I disagree strongly. > Results of such EMI tests only measure the general power spectrum > emitted by a device. Of interest for Tempest purposes however is > not the power spectrum, but the spectrum of the cross-correlation I am aware of how to do Tempest in practice as well as in theory. The process goes something like this. The first target is the vertical retrace. This signal is usualy the strongest because the voltage required (and hence the dv/dt) is the largest to sling that e-beam from the lower right to the upper left. It usualy resides in the 50-70Hz range. The next target is the horizontal retrace. It slews the beam from the right edge of the display to the left in order to start another trace. You can use this signal to syn both the vertical retrace steps (in order to move the beam down verticaly to start another trace) as well as the ramp that is required to slew the beam across the screen to write the pixes. Once these 4 signals are aquired and fed to the appropriate control terminals of a CRT you are ready to begin decoding the actual trace data for each line of the display. This is the hardest since the actual modulation of the e-beam is done via a screen grid (who said tube theory was out of date?) and that signal is quite small and generaly has a cardoid emission pattern aligned axialy along the central axis of the CRT tube. So if given a choise you want your antenna to be behind the viewer in line with the display. It is of some import to note that larger displays are easier to aquire usable signals from since the distances the e-beam is slewed and as a result the control voltages are much larger. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From Markus.Kuhn at cl.cam.ac.uk Mon Feb 9 09:46:07 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Tue, 10 Feb 1998 01:46:07 +0800 Subject: Soft Tempest In-Reply-To: <199802090715.CAA24788@the-great-machine.mit.edu> Message-ID: Ryan Lackey wrote on 1998-02-09 07:15 UTC: > The paper pretty clearly says laptop LCDs are not sufficiently quiet. Until > I read this, I was under the impression they were; perhaps passive matrix > screens are and active are not. I even used a laptop for a Tempest demo in Ross' undergraduate security course here at Cambridge, because it gave such a clear signal and was much easier to transport than a CRT. > (actually, I can totally understand that > wrt the pulse modulation not present in modern crts) I added this sentence in the paper only for those who had read the van Eck paper before, which in this respect is a little bit out-of-date and does not describe today's VDU technology. > I had a real bitch of a time finding open source TEMPEST information, which > is part of why the idea was back-burnered. I think there is a concerted > effort on the part of the government to prevent open source discussion of > the topic, through manipulation of research money, etc. Same experience here ... :-( Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From honig at otc.net Mon Feb 9 09:58:52 1998 From: honig at otc.net (David Honig) Date: Tue, 10 Feb 1998 01:58:52 +0800 Subject: Soft Tempest In-Reply-To: Message-ID: <3.0.5.32.19980209093105.007b3780@otc.net> At 10:14 PM 2/8/98 -0800, Tim May wrote: >At 9:19 PM -0800 2/8/98, Ryan Lackey wrote: > > >The physics suggests just the opposite: the RF emissions from laptops are >expected to be lower from first principles, and, I have heard, are >measurably much lower. (I say "have heard" because I don't have any access >to RF measurement equipment...I once spent many hours a day working inside >a Faraday cage, but that was many years ago.) ...later... >But before going this route, I'd want to see some measurements. Laptops >might already be "quiet enough." (Measurements are needed to determine the >effectiveness of any proposed RF shielding anyway, so....) The interference that laptops can cause with avionics is prima facie evidence that laptops are not quiet. >The first principles part is that the deflection yokes in a CRT are the >largest radiated component of what got named "van Eck radiation." (I'd just >call it RF, but whatever.) > >Laptops are missing this component. (It might be interesting to see the >radiated RF numbers for various kinds of flat panel displays.) They are not missing the periodic pixel clocking signals though. ... >With some of these glasses, gargoyle-style, one could completely encase the >laptop in a shielded case (like a Zero Haliburton) and then use a palm >keypad... Yes, but cables radiate. Wires are antennae. Used to be a big problem when laptops had wired mice. BTW, in van Eck's original paper, he gives a way to make screen spying a little tougher: pick random raster-lines to draw instead of the usual order. This of course would not be a significant barrier to modern interception. ------ Enrico Fermi used to tune a regular music radio to a cyclotron(?) so he could tell that it was working, I've read. ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Lewinsky for President '2012 From VirginTimmieSkirvinFellatesSheep at teenworld.poboxes.com Mon Feb 9 10:04:18 1998 From: VirginTimmieSkirvinFellatesSheep at teenworld.poboxes.com (Animal Protection League) Date: Tue, 10 Feb 1998 02:04:18 +0800 Subject: rec.guns et.al. blocked by censorware Message-ID: <2.2.32.19980209205329.006d7ae8@neptunenet.com> At 03:22 PM 2/8/98 -0800, Tim May wrote: >At 3:02 PM -0800 2/8/98, Igor Chudov @ home wrote: >>rec.games.mecha Giant robot games. (Moderated) Quest/Illegal/Gamble >>Violence/Profanity Intol > >Perhaps the strategy should be to post material to other newsgroups to get >them blocked as well. (Though I expect the blocking is not being done using >robots to monitor for illegal words, as rec.guns would not have been >blocked this way. Rather, the cyber nannies are probably using their "PC >judgment" to block groups they don't like. You need to consider that rec.games.mecha is primarily a dumbed down alt.flame and includes postings from that obnoxious avowed 300 pound communist bisexual converted jew Camille Klein (she claims she is down to 275 lbs.). I wouldn't my kids to read her garbage posts. From declan at well.com Mon Feb 9 10:05:42 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 10 Feb 1998 02:05:42 +0800 Subject: Interview with the man who creamed Bill Gates Message-ID: ---------- Forwarded message ---------- Date: Mon, 9 Feb 1998 09:29:44 -0800 (PST) From: Declan McCullagh To: politech at vorlon.mit.edu Subject: Interview with the man who creamed Bill Gates Is at: http://cgi.pathfinder.com/netly/opinion/0,1042,1733,00.html -Declan From ravage at ssz.com Mon Feb 9 10:10:25 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 02:10:25 +0800 Subject: Godin Interview - Bill G's pie in the eye [CNN] Message-ID: <199802091806.MAA22270@einstein.ssz.com> Forwarded message: > X-within-URL: http://cgi.pathfinder.com/netly/textonly/1,1035,1733,00.html > Today's News Let's pie! Let's pie! Nincompoop guys! > by Hugues Henry ��February 9, 1998 > > ���� Until last week, Noel Godin was relatively unknown in the United > States. A 52-year-old Belgian author, film historian, actor ("The > Sexual Life of the Belgians"), writer ("Cream and Punishment") and > "entarteur" (a Godin coinage that roughly translates as "encaker" or > "pie-er"), Godin led the gang that gave to Bill Gates what so many of > us only dream of: a big wet pie in the face. The attack took place at > the entrance of Le Concert Noble on Arlon Street in Brussels and was > widely reported in the press. > > ���� Godin doesn't own a computer and didn't even know what a URL is. > His girlfriend, however, uses a PC. (This interview was conducted and > translated by Hugues Henry.) > > The Netly News: Who are you, Noel Godin? > > Noel Godin: I'm part of a gang of bad hellions that have declared the > pie war on all the unpleasant celebrities in every kind of domain > (slogan: "Let's pie! Let's pie! Nincompoop guys!"). We began to act > against "empty" celebrities from the artistic world who were thinking > they were the cat's whiskers. Then we attacked the TV news business in > France, for instance, Patrick Poivre D'Arvor [a famous French TV > presenter]. Then it became political with Philippe Douste-Blazy in > Cannes, the French minister of culture, or the other French minister > Nicolas Sarkozy last year in Brussels. > > NN When did you first pie someone? > > Godin: In November 1969, with French writer Marguerite Duras, who > represented for us the "empty" novel. > > NN Why did you choose Bill Gates? > > Godin: Because in a way he is the master of the world, and then > because he's offering his intelligence, his sharpened imagination and > his power to the governments and to the world as it is today -- that > is to say gloomy, unjust and nauseating. He could have been a utopist, > but he prefers being the lackey of the establishment. His power is > effective and bigger than that of the leaders of the governments, who > are only many-colored servants. So Bill Gates was at the top of our > lists of victims. The attack against him is symbolic, it's against > hierarchical power itself. Our war cry was explicit: "Let's pie! Let's > pie the polluting lolly!" [text deleted] ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From nobody at REPLAY.COM Mon Feb 9 10:14:34 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 10 Feb 1998 02:14:34 +0800 Subject: rec.guns et.al. blocked by censorware Message-ID: <199802091755.SAA07601@basement.replay.com> >That the "cyber nannies" are blocking it (and other similarly nonsexual, >nonprofane newsgroups) is exactly what was expected. These cyber nannies >become tools for political correctness. > >Perhaps the strategy should be to post material to other newsgroups to get >them blocked as well. (Though I expect the blocking is not being done using >robots to monitor for illegal words, as rec.guns would not have been >blocked this way. Rather, the cyber nannies are probably using their "PC >judgment" to block groups they don't like. These companies are attempting to provide the services desired by their customers. These are generally cautious, conservative parents who want to allow their young children access to the internet without them stumbling over dangerous or disturbing information. Like it or not, many parents are very protective of their children. We have no right to force our own views of childrearing on them. The filtering companies are filling a legitimate need in the marketplace. They are not evil and they are not trying to prevent adults from viewing the material they desire via their own personal accounts. They give concerned parents a sense of safety in allowing their children to use the internet, and in that way allow young people access to the net who would not otherwise be allowed to use it. From zurko at opengroup.org Mon Feb 9 10:33:56 1998 From: zurko at opengroup.org (Mary Ellen Zurko) Date: Tue, 10 Feb 1998 02:33:56 +0800 Subject: New Security Paradigm Workshop '98 Call For Papers Message-ID: <199802091812.NAA12129@postman.opengroup.org> ======================================================================== Call For Papers New Security Paradigms Workshop '98 A workshop sponsored by ACM 22 - 25 September 1998 ======================================================================== Paradigm shifts disrupt the status quo, destroy outdated ideas and open the way to new possibilities. This workshop explores deficiencies of current computer security paradigms and examines radical new models that address those deficiencies. Previous years' workshops have identified problematic aspects of traditional security paradigms and explored a variety of possible alternatives. Participants have discussed alternative models for access control, intrusion detection, new definitions of security, privacy and trust, biological and economic models of security and a wide variety of other topics. The 1998 workshop will strike a balance between building on the foundations laid in past years and exploring new directions. To participate, please submit the following, preferably via e-mail, to both Program Chairs (Mary Ellen Zurko and Steven J. Greenwald) by Friday, 3-April-1998. 1 - Your Paper You should submit either a research paper, a 5 - 10 page position paper or a discussion topic proposal. Softcopy submissions should be in Postscript or ASCII format. Papers may besubmitted in hardcopy. To submit hardcopy, please mail five (5) copies to Program co-chair Steven Greenwald. Please allow adequate time for delivery. The hardcopy deadline is 27-March-1998. Discussion topic proposals should include a description of the topic to be discussed, a pro and con position statement on the topic, identification of the parties who will uphold each position, any assurances that the participants agree to attend, and any other information that the proposer thinks would support their proposal (such as who will moderate). One potential topic for discussion is "Is there a current security paradigm?". 2 - Justification You should describe, in one page or less, why you think your paper is appropriate for the New Security Paradigms Workshop. A good justification will describe which aspects of the status-quo security paradignm your paper challenges or rejects and which new model or models your paper proposes or extends. 3 - Attendance Statement You should state how many authors wish to attend the workshop and should indicate whether at least one author will be able to attend for the entire duration of the workshop. The program committee will referee the papers and notify the authors of acceptance status by 12-June-1998. We expect to be able to offer a limited number of scholarships. More information will be provided on-line as it becomes available. 4 - The Workshop The workshop will offer a creative and constructive environment for approximately 25 participants. It will be held at the Boar's Head Inn in the vicinity of "historic" Charlottesville, Virginia. Steering Committee Bob Blakley, Mary Ellen Zurko, Steven J. Greenwald, Darrell Kienzle, Hilary Hosmer Workshop Co-Chairs Bob Blakley IBM 11400 Burnet Road, Mail Stop 9134 Austin, TX 78758 USA e-mail: blakley at us.ibm.com voice: +1 (512) 838-8133 fax: +1 (512) 838-0156 Darrell Kienzle MITRE, Mail Stop W422 1820 Dolley Madison Blvd. McLean, VA 22102 USA e-mail: kienzle at mitre.org voice: +1 (703) 883-5836 fax: +1 (703) 883-1397 Program Committee Co-Chairs Mary Ellen Zurko The Open Group Research Institute 11 Cambridge Center Cambridge, MA 02142 USA e-mail: zurko at opengroup.org voice: +1 (617) 621-7231 fax: +1 (617) 225-2943 Steven J. Greenwald 2521 NE 135th Street North Miami, FL 33181 USA voice: +1 (305) 944-7842 fax: +1 (305) 944-5746 e-mail: sjg6 at gate.net Program Committee Alfarez Abdul-Rahman, University College London Steven Cheung, University of California, Davis Shaw-Cheng Chuang, University of Cambridge John Dobson, University of Newcastle, UK Heather Hinton, Ryerson Polytechnic University, Canada Tom Lincoln, RAND Masahiro Mambo, Tohoku University Catherine Meadows, Naval Research Laboratory Ruth Nelson, Information System Security Thomas Riechmann, University of Erlangen-Nuernberg Marvin Schaefer, Arca Systems, Inc. Cristina Serban, AT&T Labs Anil Somayaji, University of New Mexico Brenda Timmerman, University of Southern California / ISI Ian Welch, University of Newcastle upon Tyne John Michael Williams Local Arrangements Chenxi Wang (University of Virginia) +1 (804)982-2291 Scholarships Hilary Hosmer (Data Security Inc.) +1 (781) 275-8231 Publications Marv Schaefer (ARCA Systems) +1 (410) 309-1780 Publicity Daniel Essin (University of Southern California) +1 (213) 226-3188 Treasurer/Registration Dixie Baker (SAIC) +1 (310) 615-0305 ACM-SIGSAC Chair Ravi Sandhu (George Mason University) +1 (703) 993-1659 From honig at otc.net Mon Feb 9 10:35:54 1998 From: honig at otc.net (David Honig) Date: Tue, 10 Feb 1998 02:35:54 +0800 Subject: Soft Tempest In-Reply-To: Message-ID: <3.0.5.32.19980209101733.007a6e30@otc.net> At 04:54 PM 2/9/98 +0000, Markus Kuhn wrote: > The horizontal and vertical >deflection coils produce a lot of radiation at harmonics of the >line and frame rate of your CRT, but this signal energy is not >related to your screen content (only to your video mode), and therefore >not of much concern for the eavesdropper. The low-radion monitor >standards look only at those signal (<400 kHz). Therefore having >a TCO92 monitor provides you absolutely no advantage with respect >to eavesdropping. >The information carrying signals of VDUs are in much higher frequency >ranges in the VHF/UHF bands. Laptops are pretty good broadcasters >there, too. One of the issues is that the fast rise-times on signals yields emissions all over the spectrum, not just at the base scanning rate. Thus, even though you're sending at e.g., 2400 bps, you've got an N-volt voltage/current swing accomplished in fractions of a microsecond. These higher harmonics radiate better than the lower ones. See Peter Smulders's paper on RS-232 interception, abstract included below. I have a local copy at http://rattler.otc.net/crypto/docs/rs232.pdf The Threat of Information Theft by Reception of Electromagnetic Radiation from RS-232 Cables Peter Smulders Eindhoven University of Technology, Department of Electrical Engineering, Eindhoven, The Netherlands Research into the possibility of picking up the electromagnetic radiation originating from video display units (VDUs) made clear that this type of information theft can be committed very easily [1]. It is not only this type of equipment which is vulnerable to interception at a distance; experiments on eavesdropping RS-232 cable signals prove that it is possible in some cases to intercept data signals running along an RS-232 cable, by picking up and decoding the electromagnetic radiation produced by the cable. This report gives the results of these Electromagnetic radiation arising from RS-232 cables may contain information which is related to the original RS-232 data signals. The seriousness of eavesdropping risks is shown by estimates of bit error rates feasible with a standard radio receiver as a function of the separation distance. In addition to this, results of experimental eavesdropping are presented. Keywords: RS-232 cable, Electromagnetic radiation, Eaves-dropping risks. Caution: Failure to detect intelligible emanations by the methods described in this paper do not mean an installation is secure against interception by sophisticated and resourceful opponents. ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Lewinsky for President '2012 From aba at dcs.ex.ac.uk Mon Feb 9 10:58:22 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 10 Feb 1998 02:58:22 +0800 Subject: Argentina rules: no software copyright Message-ID: <199802091834.SAA00865@server.eternity.org> (from cpsr list, from edupage) : ARGENTINE SUPREME COURT RULES SOFTWARE PIRACY LEGAL : : Executives of Microsoft, IBM and Unisys are protesting a recent : Argentine Supreme Court decision ruling that antiquated copyright : laws don't cover computer software. Software makers point out that : royalties aren't paid on about 70% of the software sold in : Argentina, resulting in roughly $165 million in revenue losses : annually. A recent study by Price Waterhouse & Co. indicates the : biggest abusers are Argentine federal and local government agencies : and small private businesses. "There's no culture in Argentina of : assigning value to software," says a Unisys unit president. (Wall : Street Journal 6 Feb 98) I like best Mark Grant's comment on why copyright should be scrapped: it is a form of government subsidy. Adam From erehwon at dis.org Mon Feb 9 10:58:41 1998 From: erehwon at dis.org (William Knowles) Date: Tue, 10 Feb 1998 02:58:41 +0800 Subject: Computer design flaw opens airports to terrorism Message-ID: NEW YORK (Reuters) [2.9.98] - The computer security systems that control access to 40 airports worldwide through electronic badges have a design flaw that could make them vulnerable to terrorism, the New York Times reported Sunday. California computer security consulting firm, MSB Associates, found the flaw in December in a routine audit of a large California financial services software company, the identity of which was not disclosed, according to the newspaper. Government buildings, including that of the CIA, and prisons and industries with sensitive military, drug or financial information or material also use the system and are also vulnerable to attack, the Times report said. American and British aviation officials have notified airports of the flaw, the Times said. The system, introduced several years ago by a small company, Receptors, Inc., of Torrance, CA., relies on a secure, isolated computer in a guarded room to control door-locks and an inventory of electronic badges, the Times reported. The company found, however, that in some cases an individual could dial in to the computer and create security badges and unlock doors. Receptors' equipment was removed from the House of Representatives after the Inspector General found that 757 former employees appeared on the rolls of active employees and had working badges that would have allowed them access to the House buildings, the Times said. Receptors' chief operating officer Dale Williams said that the problem is not with the system but with the way it was installed in some cases. Some systems were connected to networks instead of being accessible only by a modem that would only be turned on when a Receptor employee performed maintenance, Williams told the Times. Testing the system, MSB found that the problem persisted as late as last week in the company they audited, the Times said. MSB created a fictitious employee, Millard Fillmore, which the company spotted on its rolls and removed. However, even after he was removed, the faux former president was still able to gain access to the company buildings, meaning any dismissed employee would have the same access, the Times said. == The information standard is more draconian than the gold standard, because the government has lost control of the marketplace. -- Walter Wriston == http://www.dis.org/erehwon/ From aba at dcs.ex.ac.uk Mon Feb 9 11:01:00 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 10 Feb 1998 03:01:00 +0800 Subject: what is video-collage.com? In-Reply-To: <199802082302.RAA18137@manifold.algebra.com> Message-ID: <199802091802.SAA00773@server.eternity.org> I have long noticed lots of video-collage in the distributed cpunks list headers. Now we see: > From: "Igor Chudov @ home" > To: cypherpunks at www.video-collage.com, freedom-knights at jetcafe.org, ie sent to cypherpunks at www.video-collage.com by ichudov@ the same. What does this mean Igor? Adam From aba at dcs.ex.ac.uk Mon Feb 9 11:13:40 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 10 Feb 1998 03:13:40 +0800 Subject: time to learn chinese? Message-ID: <199802091845.SAA00883@server.eternity.org> Listened to an analyst on the radio expressing view that towards 2010 China will be leading world economic power. Anyway interesting was that the analyst expressed that in her view China was keen to avoid the mistakes of the socialist welfare state as market liberalization and prosperity grew. She considered the burden of a welfare state to be a large burden which would mean that China would outstrip growth in the west. Also she stated that she thought democracy was in decline. When interviewed asked about human rights, she opined that these would improve as the market became freer. She stated that China hopes to bypass democracy going straight to free market. China may be interesting in a few more decades... Adam From Markus.Kuhn at cl.cam.ac.uk Mon Feb 9 11:21:29 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Tue, 10 Feb 1998 03:21:29 +0800 Subject: SOFT TEMPEST In-Reply-To: <34DDEB81.65726105@InfoWar.Com> Message-ID: "WebWarrior3 at InfoWar.Com" wrote on 1998-02-08 17:29 UTC: > So, when the software police pull up outside of my > place of business see that there are six instances of a program being > displayed with one license I can expect a warrant to be issued? That > would suck. The software that displays the license number plus activation instance random code in your windows toolbar as an easy receivable spread spectrum barcode would have to take care of this depending on how exactly your license agreement is formulated. This can be resolved in many ways. The technique of hunting software license violators via Tempest monitoring is not really targeted at providing 100% accurate and reliable identification of abuse at any point of time as you seem to imply. Nor is it alone an effective tool of proofing abuse. It is more an additional tool in getting an initial hint that a company is violating a software license at large scale (e.g., has bought a single copy of an expensive CAD software but uses it on over 80 workstations all day long), which then can justify to get court relevant proof by traditional means of police investigation. > Unfortunatley, I do not have the time to read through the entire > document at the URL provided, and can't save it either from the .pdf ... > the defensive measures sound interesting. One obvious countermeasure are Tempest shielded computers or rooms, but these are rather expensive, inconvenient and not always reliable. Another countermeasure are software reverse-engineering and modifying the broadcast code. This is around as difficult as removing dongle checking code: Not impossible, but for the majority of users too inconvenient. > Also, does this only work with CRTs or can it detect LCD too? Oh, yes, beautifully! Ross' TFT laptop radiates better than the CRT on my desk here. It is true that LCD displays do not have the <400 kHz signals caused by the deflection coils that are of concern for the TCO/MPR low-radiation standards. But they radiate as well in the >1 MHz range where the information carrying signals are broadcasted as harmonics of for instance the dot clock rate. LCDs are connected to high-speed drivers with sharp edges and lot's of nice harmonics. One more remark: This was so far unfunded research initiated by our private interest in the subject of compromising radiation. In this field, the available research literature is very close to zero (there are the van-Eck/Moeller/Smulder papers and that's it basically), and all the real knowledge is tightly guarded by the military and diplomatic community. We hope that developing commercial applications for compromising radiation will open the way to non-military funding and open research in this field. Copyright protections seems to be an interesting application. Tempest research requires some expensive equipment (special antennas, very high-speed DSP experimental systems, an absorber room, etc.). If Microsoft or someone else would like to make some Tempest funding available, I think this should be highly welcome if the results are going to be published in the open literature. There is no good reason, why knowledge about compromising emanations should be restricted to the military community in a time where industrial espionage with these techniques is probably a larger threat to economies than the results of foreign intelligence operations. The preprint of our first paper on this is now on my home page. Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From eureka at eureka.abc-web.com Tue Feb 10 03:24:16 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Tue, 10 Feb 1998 03:24:16 -0800 (PST) Subject: Eureka! Tue Feb 10 '98 Message-ID: <19980210083153.1416.qmail@eureka.abc-web.com> Welcome to Tuesday's issue of Eureka! EROTIC PARADISE One of the largest pay sites on the web, Erotic Paradise, has now opened its doors to FREE memberships. That's right, you can now get an entire week of hot videos, 1,000s of pix, and much, much more - and it's complely FREE. Check it out! ------> http://www.mr-cash.com/cgi-bin/gold.cgi/raw_3266/999 My Sister NAKED! FREE PIX http://205.134.162.9/sister/ I took pictures of my sister naked! EATING AT THE "Y" Creative use of webdesign. Lots of free pix. These are not your ordinary women. These are hot looking babes! Saddle on up to the bar for some real food. Snack on a brunette, dine with a blonde. Maybe food does mix with sex? Surf by. Eating at the Y ... http://207.156.223.181/they/warning.html DEVIL'S DELIGHT This is a paysite. There are three free pix however. They load fast and are high resolution. One is of a woman taking on two large cocks. Next is a hot looking blonde. Pussy! Devil's Delight .............. http://www.devilsdelight.com/ PLANET EROTIC This is a paysite. But that is not a bad thing. There is something you have to see to believe. Click the guest button and proceed by clicking on the free pics text links. After about four pages of these links (located at the bottom) you will arrive at some thumbnails. On the second row of pix third one to the right, click that one. Mysterious labia! Planet Erotic .................. http://www.planeterotic.com PORNO MACHINE Pretty good website! Decent webdesign and use of graphics. They feature some free pix as well. Lots of pussy filled to the brim with cock. The pix are not huge but they load quick. Oh and there are free videos! This is a busy server. Porno Machine ................. http://www.pornomachine.com/ READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! $25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Three dicks -------------------> http://207.168.184.26/trip/ CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Claire: Claire and her husband (Andy) are true exhibitionists who love to show off, especially together. Claire keeps an erotic diary that puts most magazines to shame. This is one hot couple, check them out and read about all their dirty adventures. ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY StoriesAndPics.com: StoriesAndPics.com gives you the best of both worlds. Visit the site Yahoo calls "The Ultimate Erotic Stories Site" Over 50 categories of sex stories and XXX pics! ....................... http://www.storiesandpics.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?100 Pic 2 --------------------------> http://137.39.63.229/?101 Pic 3 --------------------------> http://137.39.63.229/?102 Pic 4 --------------------------> http://137.39.63.229/?103 Pic 5 --------------------------> http://137.39.63.229/?104 Pic 6 --------------------------> http://137.39.63.229/?105 Pic 7 --------------------------> http://137.39.63.229/?106 Pic 8 --------------------------> http://137.39.63.229/?107 Pic 9 --------------------------> http://137.39.63.229/?108 Pic 10 --------------------------> http://137.39.63.229/?109 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From dlv at bwalk.dm.com Mon Feb 9 11:29:01 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Tue, 10 Feb 1998 03:29:01 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: <3.0.5.32.19980209090323.007ba100@otc.net> Message-ID: <1XDNke1w165w@bwalk.dm.com> David Honig writes: > The water supply systems of LA are easy targets for causing civil > disruption, too. Don't know about LA, but New York City gets its water supplies from open reservoirs upstate - a terrorist's dream. > > Lewinsky for President '2012 Vote for Monica - get a free blow job. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From bmm at minder.net Mon Feb 9 11:41:11 1998 From: bmm at minder.net (BMM) Date: Tue, 10 Feb 1998 03:41:11 +0800 Subject: [test - ignore] Message-ID: ping From tcmay at got.net Mon Feb 9 11:49:52 1998 From: tcmay at got.net (Tim May) Date: Tue, 10 Feb 1998 03:49:52 +0800 Subject: time to learn chinese? In-Reply-To: <199802091845.SAA00883@server.eternity.org> Message-ID: At 10:45 AM -0800 2/9/98, Adam Back wrote: >Listened to an analyst on the radio expressing view that towards 2010 >China will be leading world economic power. Like the predictions in 1970 of Russian as the language to learn? Or the predictions in the 1980s that Japanese was the language to learn? China is indeed a large country, so any reasonable per capita output makes it, ranked as a "nation," very large indeed. So? I'm not much of a believer in nation-states as influencers of world trade. While it is true that, for example, India is a larger economic power than Denmark is, so? Oh, and on the specific prediction...I have my doubts about even the per capita numbers rising as fast as some think. It's still a Communist system, with periodic crackdowns on anyone or any entity who is perceived to be doing "too well." Sort of like all the moaning and gnashing that Microsoft did research and invested money and kept working along and didn't "let" Netscape become the "next desktop OS." Recall that Netscape was claiming the browser would become the OS, with applets running under the browser. Anyway, China does not as yet have even a single reasonably state of the art chip making plant in its entire country. Given the timescales and learning curves involved, it seems unlikely they'll be a high tech leader in little over 10 years. Maybe in terms of gross output of chop sticks, rice, fertilizer, etc. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From attila at hun.org Mon Feb 9 12:20:45 1998 From: attila at hun.org (Attila T. Hun) Date: Tue, 10 Feb 1998 04:20:45 +0800 Subject: EPIC World Crypto Survey In-Reply-To: <1.5.4.32.19980209142939.00b36c60@pop.pipeline.com> Message-ID: <19980209.195159.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- statistics dont lie, but liars use statistics. back to the same old square one --getting the couch tomatoes (they've gone soft) riled enough to understand the lies. fat chance, as long as they can be fat, dumb, and happy the sloths will still vote their wallets. >The New York Times, February 9, 1998, p. D10: >U.S. Losing Battle on Control of Data Encryption, Study Says [...] >That finding directly contradicts the Clinton Administration's assertions >in Congressional hearings that it has the support of most nations on this >issue. ... >William Reinsch, the Under Secretary for export administration in the >United States Commerce Department, denied that the study contradicted the >Administration's assertions. "All the Administration has ever said is that >there are more countries that go farther than we do," Mr. Reinsch said. >"The study confirms that." ^^^^^^^^^^^^^^^^^^^^ -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNN9fr7R8UA6T6u61AQHPtgH/cW5VUP54BrXk9t4KjP4LwuxjZ1jsp+0u ghMqpRSq6p88LKrdMIkaLxq4NYj5+anH0OLZY5bm86/YUmrEp5BFVA== =nf7E -----END PGP SIGNATURE----- From jinn at inetnebr.com Mon Feb 9 12:29:04 1998 From: jinn at inetnebr.com (D'jinnie) Date: Tue, 10 Feb 1998 04:29:04 +0800 Subject: Driver Licenses In-Reply-To: Message-ID: How exactly can they require for the DL to be magnetized if only a few states do that? My NE license is just a piece of photographed paper encased in plastic. The only thing that "protects" it from forgery is a "Don't Drink and drive" and "buckle up Nebraska" silvery warnings that can be seen under certain angles. I don't see them changing it anytime soon...thank gods for slow ppl ;) So...seems like there can and will be a lawsuit against such practices. --- Reality leaves a lot to the imagination. jinn at inetnebr.com From jinn at inetnebr.com Mon Feb 9 12:36:17 1998 From: jinn at inetnebr.com (D'jinnie) Date: Tue, 10 Feb 1998 04:36:17 +0800 Subject: fingerprinting Message-ID: Immigration & Naturalization Department has been fingerprinting ppl for years. Does anyone have any ideas what agencies that information is shared with and what they need it for anyway? And what's with that new thumbprint thing in banks? I haven't had occasion to refuse it yet but I wonder if they'd open an account without it... --- Reality leaves a lot to the imagination. jinn at inetnebr.com From Markus.Kuhn at cl.cam.ac.uk Mon Feb 9 13:26:56 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Tue, 10 Feb 1998 05:26:56 +0800 Subject: TEMPEST In-Reply-To: <199802091735.LAA21910@einstein.ssz.com> Message-ID: Jim Choate wrote on 1998-02-09 17:35 UTC: > This is the hardest since the actual modulation of the e-beam is done via a > screen grid (who said tube theory was out of date?) and that signal is quite > small and generaly has a cardoid emission pattern aligned axialy along the > central axis of the CRT tube. Things are somewhat more complicated and I am not convinced that the e-beam is the primary source of radiation. Your claim that the Tempest radiation is modulated by the screen grid does not agree with my practical experience: All signals I get are close to harmonics of the dot clock and not of the screen grid rate. In addition, the Tempest monitor cannot distinguish between an all-black and an all-white image, which it should in the case of a screen-grid caused modulation. If there is indeed a screen-grid modulation, then it is *much* weaker than any modulation that you get by software dithering. Monitors are pretty strange antennas: For instance, my monitor still radiates quite well (although noticeably weaker) if I switch its power supply off. Just the passive resonance of the chassis gives a clear signal in around a meter radius with a simple untuned dipole antenna. Switching off a monitor alone does not protect you from eavesdropping a VDU signal, especially if the signal is not just text but a pattern optimized for reception. After I unplug the VGA cable however, I can't pick up any signal with our Tempest receiver unless I bring the antenna almost in contact with the cable or connector. The closed PC chassis also appears to be no very big source of VDU emanations, certainly much below the levels that our receiver can detect. Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From brianbr at together.net Mon Feb 9 14:09:25 1998 From: brianbr at together.net (Brian B. Riley) Date: Tue, 10 Feb 1998 06:09:25 +0800 Subject: Driver Licenses Message-ID: <199802092153.QAA07449@mx01.together.net> On 2/9/98 12:25 PM, Tim May (tcmay at got.net) passed this wisdom: >Lucky is right that that "underage stings" are on the increase. >Underage persons, often in high school, beome self-righteour >warriors in the War On Demon Rum, and "narc out" their local >shopkeepers. As I write this there are advertisements up in the halls at the HS (obviously with school blessings) where I teach (a few miles east of Burlington, VT) specifically soliciting 17 year olds to work for a private company under contract to the state to 'test buy' tobacco products. I haven't heard about any takers yet nor anything backfiring. >Hey, it would serve these junior narcs right if, upon being carded >and being shown to be underage, a store owner made a citizen's >arrest. Perhaps putting the perp in the back freezer for a few >hours would send a message. I wonder, though, how long it would go on if some shopkeeper indeed did this? But, is it a crime to try to buy booze or tobacco underage, if you do not try to show fraudulent indentification? Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "He's not dead -- He's electroencephalographically challenged." From aba at dcs.ex.ac.uk Mon Feb 9 14:51:22 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 10 Feb 1998 06:51:22 +0800 Subject: time to learn chinese? In-Reply-To: Message-ID: <199802092224.WAA00886@server.eternity.org> Tim May writes: > Oh, and on the specific prediction...I have my doubts about even the per > capita numbers rising as fast as some think. It's still a Communist system, > with periodic crackdowns on anyone or any entity who is perceived to be > doing "too well." The interesting aspect of her speculation was on the possibility of an economic and political process of change which would result in a transition directly from communism to a free market based political system, by-passing democracy and socialism. She viewed democracy and socialism as mistakes made by the west to be learned from and avoided. Communist regimes typically include a significant element of central planning which introduces economic inefficiencies, yes, and loss of freedom of choice, etc. Socialist democracies have much in common with communist regimes in this respect: elements of centralised control, restrictions of choices (the nanny state, huge welfare systems, 50%+ taxation) large government restrictions on free market operation. Both systems suck, but currently the lesser of two evils by a large margin is living in a socialist democracy because of the wider freedoms as compared to the lack of freedoms in Communist countries such as China, and because of it being worth putting up with the nanny state and 50%+ tax rates as compared to the economic instability and organised crime problems in Russia, and previous Russian provinces now split off back in to small countries. The interesting question is the how these two evolving political and economic systems will change over time. Her speculation was that a previously communist system evolving towards becoming a pure market system might move towards this goal more rapidly than a rampantly socialist democracy would move towards the same. She also considered the different cultural work ethic signficant: Chinese people on the whole work harder, and re-invest more of per capita income. > Anyway, China does not as yet have even a single reasonably state of > the art chip making plant in its entire country. Given the > timescales and learning curves involved, it seems unlikely they'll > be a high tech leader in little over 10 years. Singapore, Taiwan, and Japan produce sizeable quantities of electronic devices, consumer electronics items, cars, etc. In fact I understood them to out compete western manufacturing in many instances. They may not always be at the leading edge of R&D, but they do produce a lot, much of it quality equipment, and we (westerners) buy more consumer electronics, and cars produced by such countries now. Personally I would buy a Toyota over a Ford anyday :-) China might be viewed as larger version of Singapore a few decades ago perhaps. Enterprise zones (or same rules for the whole country) with 0% taxation, unrestrictive planning rules etc should help attract outside investment from high tech companies, if political stability was viewed as good enough. Probably you are right on the optimism of the time scales of the interviewed analyst. Adam From nobody at nowhere.com Mon Feb 9 15:10:34 1998 From: nobody at nowhere.com (nobody at nowhere.com) Date: Tue, 10 Feb 1998 07:10:34 +0800 Subject: 11 CENTS A CLICK - PINKCASH PAYS CA$H UPFRONT Message-ID: <199802092242.OAA05496@remote.gsd.com.au> Friends, I am Scott Phillips from www.pbits.com, My apologies for this short spam, I`m only sending it because as a fellow ADULT WEBMASTER I know you will be interested in the first click thru system to pay you IN ADVANCE, BEFORE YOU EVER SEND A HIT! Lets keep it short and sweet so HERE IS THE DEAL! Sign up here http://usa-6.gsd.com.au/moremoney And get paid 11c a unique click by ww.pbits.com WE OFFER THE FOLLOWING BENEFITS - Real time stats - Click counts that are 100% real - NEVER BEEN ACCUSED OF SHAVING HITS - Rated "good as gold" on Serge`s good bad ugly sponsor list http://pusi.com/~contest - FRESH banners that pull HARD - straight, gay, hardcore, teen, fetish sites, we have it ALL covered - On the net since May 96 never ripped off a webmaster - The checks are cut by the legendary Serge, who has never been late with a payment ever! - Auto-signup - I answer email personally - Software designed by BobX who wrote the clickthru for cybererotica.com http://usa-6.gsd.com.au/moremoney This is my personal guarantee to you, my fellow webmasters. Pinkcash *is* and will always be the highest paying clickthru on the net. No matter what others claim to pay, at the end of the day you make more money with us, its a FACT! If you earn more with other clickthru programs I will refund the difference. Statistics show that a .11 banner for pinkbits earns TWICE what an xpics banner at 14c does. This is because we DON'T shave hits or filter every AOL proxy to steal from you. http://usa-6.gsd.com.au/moremoney HOW DO WE PAY IN ADVANCE? After you have a trading history with us for a month or two we put you on the advance program. Currently 93% of our traffic is payed before the hits are sent. This is not an idle promise, we send checks everyday. Look at http://www.pbits.com/whosyerdaddy to see a few real checks for people you probably know. And by the way, we pay an extra cent per click when we pay you in advance, its our way of thanking you for being trustworthy honest webmasters just like us. http://usa-6.gsd.com.au/moremoney I live in Australia but I`m travelling around the USA at the moment catching up with webmaster friends and buying more traffic. If you have the ability to send bulk volume traffic contact me and I`ll visit you while I`m in the USA Nobody has ever left our clickthru ever. Nobody has ever had a complaint EVER. This is state of the fucking art software, we are cool people, we want your business, and we treat you right. AND WE PAY MORE! Sign up now http://usa-6.gsd.com.au/moremoney Thanks Scott Phillips --- TO REMOVE YOURSELF FROM THIS LIST CLICK BELOW --- http://207.33.10.200/maillist/remove.html From ravage at ssz.com Mon Feb 9 15:17:52 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 07:17:52 +0800 Subject: TEMPEST (fwd) Message-ID: <199802092316.RAA24851@einstein.ssz.com> Forwarded message: > Subject: Re: TEMPEST > Date: Mon, 09 Feb 1998 21:07:22 +0000 > From: Markus Kuhn > Things are somewhat more complicated and I am not convinced that > the e-beam is the primary source of radiation. Only of the individual pixel modulations. Go back and re-read my post you missed a whole slew of implications. The vertical and horizontal positioning is via the yoke not the screen grid. Electrostatic steering of an e-beam is expensive and slow, you can't change the charge on the plates that fast. In regards the data for the individual scan lines, where else are you going to modulate that beam than a screen grid? This is a high-voltage low-current point. You can't drive the beam off the screen, the inside of the tube is coated in a carbon based chemical called 'aquadag' that will short the beam to ground and blow your flyback transformer in short order. Not to mention that the inertia of the e-beam will be a bit of a hassle to deal with as well. It won't move that fast. > Your claim that > the Tempest radiation is modulated by the screen grid does not agree with > my practical experience: All signals I get are close to harmonics of > the dot clock and not of the screen grid rate. The screen grid is where the dot clock goes to modulate the e-beam, or is your claim we're going to modulate the filament directly? If so I would suggest you re-take your electronics class and learn how to read a schematic a tad better. A short trip to either your local library or electronics repair business will pay off wonders. You're looking for a Sam's Photo-Facts on the particular monitor you are examining. There is also the fact that the dot clock itself is a low-voltage low-current device until it gets to the tube drive electronics where it switches the high voltage drivers to the tube. If your getting your signal off the harmonics you're doing it the hard way. Go back and re-read your texts on Fourier Transforms and then do a power-spectrum analysis on the signals to the tube; what you will find is that the primary frequencies get the majority of the signal (eg 1st harmonic of a square wave (ie a dot clock) only gets, at best, 1/3 of the energy of the primary). In any case, it's the high voltage emissions of the tube drive electronics that are detected, not the small 5V to 12V drive signals. The same is true for LCD, Plasma, and other flat panel displays. You detect the high-voltage emissions of the display drive electronics. Note that on active transistor displays (where you don't have the high voltage bias as in a LCD) you don't get these sorts of emission magnitudes and they are *much* harder to detect. In addition in the active transistor displays the display drive electronics should buffer the data and so, unlike a CRT, you don't have to send each individual pixel every time. You can actualy send only the changes and impliment those. Unless you're integrating the signals you receive your Tempest display will be gibberish. > In addition, the > Tempest monitor cannot distinguish between an all-black and an all-white > image, which it should in the case of a screen-grid caused modulation. What? This is malarky. If the screen is black the filament emissions are being blocked by the screen grid and the charge cloud gets shunted to ground via the aquadag coating. This means there is no current, and as a consequence no emitted rf field to monitor. And what keeps it from blowing the flyback in this case is that the charge cloud acts as a capacitor and limits the dv/dt to something that the flyback can deal with, it has to leak past the screen grid. You can also discern this using Tempest to monitor NTSC where the black pulse is a negative going pulse at the end of the scanline waveform. It's there so the receiver electronics can know when to turn the e-beam off so you don't get those annoying retrace lines across your screen when it moved back to the left and down one line. Since it's a negative going pulse with respect to the vertical and horizontal retrace it's dv/dt is going in the opposite direction. If you get a schematic find the horizontal retrace clock and disable it and monitor the display. > If there is indeed a screen-grid modulation, then it is *much* weaker > than any modulation that you get by software dithering. This is just plain silly. The switching of the software is drowned in a sea of such noise on the board. Anyone who claims they can pull a valid signal off a cpu pcb at more than a few feet is a liar or else they have some pretty remarkable extra-terrestrial technology. There are litteraly 10's of thousands of state transitions all over the pcb that are going on in parallel and the positive transition fields cancel the negative transition fields so what you end up with is a hash of noise. 30 seconds of looking at a spectrum analyzer will make this obvious. In modern computers what drives the crt is the data residing in the video frame buffer that drives the output electronics on the card and not the data on the cpu pcb. > Monitors are pretty strange antennas: For instance, my monitor still > radiates quite well (although noticeably weaker) if I switch its power > supply off. It can take as much as 20 minutes to drain a good high-voltage supply (read the documents of all power supplies that operate above a couple hundred volts, it should include the discharge time constant - you want to wait through at least 3 of those). There is also the issue that a crt tube sitting unconnected in the open dry air will develop enough of a charge to knock the shit out of you if you're silly enough to grab the grounding connection on the side with one hand and be grounded to earth with the other. So even if the machine is turned off you get a continous charge build up on the tube that gets drained through various resistors to ground. Unfortunately this is a pretty incoherent signal and low power as well. I routinely deal with voltages in the 1MV range and currents (usualy not at those voltages) in the 100A range (I build 12 ft. Tesla Coils for grins and giggles that throw discharges in the 8-12 ft. range). When you start talking about voltages above a few hundred there isn't any such thing as 'off', only a higher impedance path to ground and longer time constants. NOTE: if you do decide to play in your monitor then make shure that one of your hands is in your back pocket at *ALL* times. Otherwise make shure there is somebody there to call 911 so they can haul your body off. If you don't the discharge leakage current through your heart *when* you make a mistake will cause it to go into ventricular fibrillation (v-fib). Unless you got a de-fibrillator handy your dead in about 3 minutes. > Just the passive resonance of the chassis gives a clear > signal in around a meter radius with a simple untuned dipole antenna. If they get within a meter of my machine I seriously doubt they will be using VanEck but rather rubber hose or eye ball monitoring... We're talking real world here not some Tom Clancy novel. > Switching off a monitor alone does not protect you from eavesdropping > a VDU signal, especially if the signal is not just text but a pattern > optimized for reception. True, but instead of being within a couple hundred feet (the average succesful range for interception) you're now talking about 10's of feet. At that range my dogs barking will let me know that Mallet is in the house. > After I unplug the VGA cable however, I can't pick up any signal with > our Tempest receiver unless I bring the antenna almost in contact with > the cable or connector. Duh, can you say 'impedance'....go back and study your analog and rf electronics. A monitors off impedance per line is somewhere in the 50 to 75 ohms range. The impedance of a wire hanging in the air is much higher and as a consequence the current flow and as a result the emitted em field will be much lower. > The closed PC chassis also appears to be no very > big source of VDU emanations, certainly much below the levels that > our receiver can detect. And this surprises you? A pc chassis, provided you put all the screws in it and don't have lots of holes in it, is a Faraday Cage, it's the reason they make them out of expensive metal and not cheaper plastic. A very effective method to confuse Van Eck is to have several monitors sitting next to each other with different displays. A more active display is much more effective than one that is static (eg. such as a person typing in an email to cypherpunks). I strongly suggest the following reference: High-speed Digital Design: a handbook of black magic H.W. Johnson, M. Graham ISBN 0-13-395724-1 ~$60 US ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From nobody at REPLAY.COM Mon Feb 9 15:21:52 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 10 Feb 1998 07:21:52 +0800 Subject: E-CDA Message-ID: <199802092315.AAA02200@basement.replay.com> Congressional Record: February 5, 1998 (House) ELECTRONIC CAMPAIGN DISCLOSURE ACT (Mr. WHITE asked and was given permission to address the House for 1 minute.) Mr. WHITE. Madam Speaker, in March we are going to vote on campaign finance reform in this House. It is a very important issue but also a very difficult issue, and it is made particularly difficult because most of the bills before us are big bills that deal with the whole comprehensive issue that we have to talk about. I have got one of those bills, and I hope that we can pass one. But just in case we cannot, today I am introducing what we might call a small bill that will deal at least with some of the problems. This bill is called the Electronic Campaign Disclosure Act, and what it does is tell the Federal Elections Commission to get into the 21st century. It directs the FEC to establish a database on-line to search over the Internet for all the information needed about campaign finances in our country. Every campaign would have to file within 10 days a report of every contribution that it receives and contributors, and PACs would also have to file. Madam Speaker, sometimes we cannot do it all in one step. The longest journey begins with a single step, and I think if we cannot pass a big bill a small bill like the one I am introducing today would be a step in the right direction. ____________________ From landon at best.com Mon Feb 9 15:39:02 1998 From: landon at best.com (landon dyer) Date: Tue, 10 Feb 1998 07:39:02 +0800 Subject: Driver Licenses and agreeing to something In-Reply-To: Message-ID: <3.0.3.32.19980209153231.00aa4430@shell9.ba.best.com> At 02:20 PM 2/9/98 -0600, you wrote: > >How exactly can they require for the DL to be magnetized if only a few >states do that? My NE license is just a piece of photographed paper >encased in plastic. The only thing that "protects" it from forgery is a >"Don't Drink and drive" and "buckle up Nebraska" silvery warnings that can >be seen under certain angles. I don't see them changing it anytime >soon...thank gods for slow ppl ;) So...seems like there can and will be a >lawsuit against such practices. > >Reality leaves a lot to the imagination. this can work two ways... especially if the people you're trying to work are not paying attention a friend of mine recently had his state license renewed. i think they have the procedure for doing fingerprints down pretty much so they are inescapable if you want a new D/L, buuut... one of the things they make you sign at the bottom of the form is an agreement that starts out "I agree to...". my friend ran the form through a scanner, changed "agree" to "disagree" and printed out his own version of the form. he handed it in and naturally the pencil- pushers never gave it a second glance -landon From ravage at ssz.com Mon Feb 9 15:59:43 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 07:59:43 +0800 Subject: SOFT TEMPEST (fwd) Message-ID: <199802092357.RAA25254@einstein.ssz.com> Forwarded message: > Subject: Re: SOFT TEMPEST > Date: Mon, 09 Feb 1998 16:44:52 +0000 > From: Markus Kuhn > The software that displays the license number plus activation instance > random code in your windows toolbar as an easy receivable spread > spectrum barcode would have to take care of this depending on how > exactly your license agreement is formulated. This can be resolved > in many ways. Has your technique been verified by any 3rd parties who are not affiliated with you or your firm? Do you expect to do any public demonstrations of this technology in the near future? Would it be possible to arrange for a indipendant 3rd party to receive a test setup for evaluation? > The technique of hunting software license violators via Tempest > monitoring is not really targeted at providing 100% accurate > and reliable identification of abuse at any point of time as That's good. The thought that given current technology a signal reception van could pull one monitors display out of a building that could potentialy have 1,000+ pc's (my last job had about 1500/floor and 3 floors) at a range of say 200 ft. is truly incomprehensible. If it works that is a feat worth many laurels. > (e.g., has bought a single copy of an expensive CAD software but > uses it on over 80 workstations all day long), which then can > justify to get court relevant proof by traditional means of > police investigation. You show up in my companies parking lot without my permission and start snooping you'll be the one sitting in jail facing industrial espionage charges. Any defence lawyer worth a damn would be able to blow this out of the water, private citizens don't have the right to invade my privacy any more than police without a warrant - and that take probable cause. > One obvious countermeasure are Tempest shielded computers or rooms, It's the monitors that need shielded, the computers already sit in a Faraday cage. Simple copper screen glued to the inside of the monitor case with a paper sheild and then grounded will resolve that problem. Be shure to put a grounded screen on the front of the tube as well (similar to those radiation shields that some companies make that don't work because they aren't grounded). > Another countermeasure are software reverse-engineering and modifying > the broadcast code. This is around as difficult as removing dongle > checking code: Not impossible, but for the majority of users too > inconvenient. A simple Gunn Diode oscillator driving a broad-band 100W rf amplifier will swamp any signal you could hope to catch. Cost, about $250 ea. With the new low-power transmitter rulings there wouldn't be much anyone could do about it either. > an interesting application. Tempest research requires some > expensive equipment (special antennas, very high-speed DSP > experimental systems, an absorber room, etc.). Gee, and to think that when I've done this sort of stuff I only used a Commodore 1702 composite monitor and some rf amplifiers and filters... Duh, silly me. Any claim that it can *only* be done with lots of money is almost always wrong. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dlv at bwalk.dm.com Mon Feb 9 16:40:02 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Tue, 10 Feb 1998 08:40:02 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: <3.0.5.32.19980209124816.0079ba20@otc.net> Message-ID: David Honig writes: > > > LA has a combination of closed pipes and open aqueducts, often > in remote areas. Simple disruption, not poisoning, would > be easier. The resivoirs don't hold enough for more > than a few days. One can "disrupt" the water supply by just making a credible assertion that it's been poisoned - but it won't kill nearly as many people as actual poison (or virus/bacteria). --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From bill.stewart at pobox.com Mon Feb 9 16:43:01 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 10 Feb 1998 08:43:01 +0800 Subject: the best justice money can buy --Lessig (fwd) In-Reply-To: <887036600.23860.193.133.230.33@unicorn.com> Message-ID: <3.0.5.32.19980209142240.0088b680@popd.ix.netcom.com> [Warning: while this may _look_ like just another rant, there is some technical content below.] At 07:03 AM 2/9/98 -0800, mark at unicorn.com wrote: >Jim Choate (ravage at ssz.com) wrote: >>So do I, and I bet both our incomes combined doesn't add up to 15 minutes of >>Bill G's and it won't. > >Of course not, because Bill has jackbooted copyright enforcers to subsidise >his corporation. Without them his income would be dramatically reduced. .... >Exactly. So tell us how Bill would have become a billionaire without >copyright? Gates got rich not by selling good software, but by selling software very well. Copyright is part of the process, but it's possible to sell your product to computer manufacturers with any customization they need using contracts instead of copyright to make your money. It's also possible to do copy protection in your software; games makers do this because they're widely pirated by non-point-source attacks (kids, mostly) who are hard to track down and sue, unlike major computer manufacturers who are easier to find, both to sue if needed or to provide support for. Copy protection was one of the things people hated about Lotus 123; I don't remember Excel or MS-DOS ever having it. When I've used expensive commercial software on Sun computers, it often needs to be registered with the machine serial number, or used with a floating license server, and refuses to run without it. PCs don't have built-in serial numbers, but they probably would if Gates had insisted on it early enough. Because of copyright law he didn't _have_ to use technical means of copy protection, so the Copyright Enforcers have saved him money - but they've also saved us the aggravation of dealing with copy protection wares. If you _want_ a serial number on each PC for your product, dongles are an available option. They reduce portability somewhat, but software like Banyan Vines networking uses them on its servers. So even the fact that IBM and Mr.Bill didn't install one doesn't stop you from using them - and as anti-crypto law goes away, uncrackable dongles are becoming easier to make (I don't know if anybody bothers, though.) Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Mon Feb 9 16:43:07 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 10 Feb 1998 08:43:07 +0800 Subject: Laptop TEMPEST (fwd) In-Reply-To: <199802091430.IAA20623@einstein.ssz.com> Message-ID: <3.0.5.32.19980209163616.0088a200@popd.ix.netcom.com> At 08:30 AM 2/9/98 -0600, Jim Choate wrote: >> FCC RF/EMC testing is well nigh useless for TEMPEST protection. > >I disagree, it would give you a gross baseline on the total emissions >between monitors and laptops. That field strenght measurement would at least >allow you to calculate radiuses of equal strength to calculate approximately >how far the emissions are from each class of device for equal probabilities >of detection. One of the specific goals is to measure how effective the >device is at effecting other co-located devices (such as seeing ghost images >on other monitors or causing static in paging equipment). FCC specs aren't real tight. My old laptop*, which passed FCC specs (at least when it was new, before being hauled around on airplanes and trains, dropped a few times, having cooked parts replaced, and generally getting treated like a laptop), broadcast enough emissions that its video would show up on my parents' TV when used 2-4 meters away. The video sync wasn't right, so there were several hard-to-read images of the screen on the TV, but it was obviously emitting enough that a properly tuned receiver could read it. On the other hand, it doesn't bother my TV from 8-10 meters away, but I've got cable, while my parents use Real Rabbit-Ear Antennas and some kind of antenna-booster widget. I have heard that passive-matrix emits less, but I don't know if that's true from a TEMPEST standpoint or only noise output. It is a bit easier to put a laptop into an RF-shielded enclosure, but enclosures that worked fine for harmonics of 4.77 MHz machines don't necessarily block harmonics of 477 MHz machines :-) especially critical are the penetrations used to get air and fiber-optic connections through, which are basically waveguides - once the wavelength of the signal is short enough, they lose. ___ * AT&T Globalyst 250P, which is a NEC Versa Pentium-75 with a Death-Star painted on it. It has the expensive active-matrix 24-bit-color 640x480 screen (sigh - I'd rather have had the cheaper 800x600 8-bit-color :-). A couple years old, and the case was a bit dented so perhaps it had been more radio-tight when it was new. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From ravage at ssz.com Mon Feb 9 16:47:42 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 08:47:42 +0800 Subject: Laptop TEMPEST (fwd) Message-ID: <199802100045.SAA25569@einstein.ssz.com> Forwarded message: > Date: Mon, 09 Feb 1998 16:36:16 -0800 > From: Bill Stewart > Subject: Re: Laptop TEMPEST (fwd) > At 08:30 AM 2/9/98 -0600, Jim Choate wrote: > >> FCC RF/EMC testing is well nigh useless for TEMPEST protection. > > > >I disagree, it would give you a gross baseline on the total emissions > FCC specs aren't real tight. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From bill.stewart at pobox.com Mon Feb 9 16:48:13 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 10 Feb 1998 08:48:13 +0800 Subject: Driver Licenses In-Reply-To: <199802082027.PAA00347@users.invweb.net> Message-ID: <3.0.5.32.19980209122020.00889e90@popd.ix.netcom.com> At 09:00 AM 2/9/98 +0100, Lucky Green wrote: >The clerk at my local 7/11 assured me the information captured would not >be forwarded to a central site. Yet. It appears the stores are installing >these systems to protect themselves against police sting "test buys", in >which the authorities take persons just days shy of their 21st birthday, >put theater makeup and/or a gray beard and wig on them and thus entrap >store clerks into selling controlled substances to minors. The original stings were done by young-looking cops, but a few judges (maybe just New York, maybe Federal? it's been a while) threw them out - if the cop is 24, then it wasn't selling to a minor, so it wasn't a crime or necessarily even a liquor license violation. So the cops need to hire kids (and for tobacco stings, minors.) This gets into the interesting legal question of whether you can insist that the decoys be prosecuted. >As any fool can predict, the information captured will not remain local >for long. After all, the system is ideal for monitoring gun^H^H^H alcohol >purchases of parolees, tracking down deadbeat dads, etc. Yup. It's really annoying to have to give the California DMV lots of personal information about myself so they can track down deadbeat dads, given that I'm not even a dad, much less a deadbeat dad, and so they can track down Mexicans who want to drive without citizenship papers, and similar presumptions of potential guilt. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Mon Feb 9 16:49:07 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 10 Feb 1998 08:49:07 +0800 Subject: What's the latest in factoring? In-Reply-To: <199802072222_MC2-3262-79F5@compuserve.com> Message-ID: <3.0.5.32.19980209134003.0088b660@popd.ix.netcom.com> At 03:20 AM 2/9/98 -0500, Ken Williams wrote: >8192 bits is used now. you can generate 8192 bit keys with PGP 2.6.3ui >(the unofficial international version). ... >[note: you can of course generate MUCH larger keys, but i'm attempting to >be practical for a change] There are two countervailing arguments about very long keys; one is that if you understand cryptography well enough to evaluate the issue, you'll know you don't need to bother, but the other is that if you don't understand crypto very well, maybe you should be overly conservative. Remember that factoring difficulty is roughly exponential; adding logn bits about doubles the cracking workload (depending on which factoring method is being used). Factoring a 1024-bit number is _much_ harder than factoring a 512-bit number, and factoring a 2048-bit number is well into age-of-the-universe difficulty level. The practical level of factoring right now is about 512 bits, for either a distributed internet effort or an NSA internal one; in the unlikely event that Moore's law lets us double processing power 100 times in the next 150 years, that means a 1500-bit key could be crackable. So 2048 bits is certainly more than enough for _your_ lifetime. Increasing processing power 2**100 times is likely to be tough :-) After all, features in current microprocessors are on the order of 100 atoms wide. And by the time we've developed the level of nanotechnology needed to speed up processing that much, there'll be tiny audio bugs listening to you type your passphrase into your keyboard and reporting it back to the Central Intelligence Corporation, or picking up the electromagnetic fields from your direct neural interface, so the crypto strength won't matter much. But do you really _need_ to factor the prime number to crack PGP? No. Remember that PGP uses the RSA key to encrypt session keys for IDEA, or for signing MD5 hashes of documents, rather than using it directly. So you can decrypt the message by cracking IDEA, or forge a message by finding MD5 collisions. Cracking IDEA's 128-bit keys was estimated to be about as hard as factoring a 3100-bit number, though improvements to factoring technology may make a 4096-bit number as easy as IDEA. Also, PGP 2.x passphrases are encrypted with IDEA, so if they've got your secring.pgp and can crack 4096-bit keys, you're toast, even if your passphase isn't just your dog's name spelled backwards. Similarly, by the time processing power doubles 100 times making your 1500-bit key insecure, MD5 will be long toasted. Either way, there's no need to go beyond 4096-bit keys ever, with old-style PGP. Even if you're being overly conservative, that's more than enough. Newer versions of PGP dump RSA and IDEA for patent reasons, but they also offer alternatives to IDEA and MD5 which may be stronger. (SHA-1 is stronger than MD5, triple-DES requires immense amounts of storage to reduce it to a strength similar to IDEA, and just being extensible means you can replace algorithms that are obsolete.) The other side of practical is how much work it takes to use long keys, and how many people who want to talk to you use them. The answer to the latter is "Not many" for RSA keys over 2048. The former is about N**2 for decryption and N**3 for key generation, and about linear for encryption with short exponents, so it'll take you 64 times as long (once) to generate the key, and 16 times as long to decrypt or sign anything, compared to the far-more-than-strong-enough 2048-bit key, which is already 4 times as hard to use and 8 times as hard to generate as a 1024. It's not worth the bother, unless you know have a really, really special application that needs to remain secret until long after you've overthrown the government. On the other hand, at least the RSA patent will have expired by then :-) The Diffie-Hellman implementations in PGP 5.x will let you use key lengths up to 4096, but the speed behaviour is a bit different. In particular, key generation is much faster, so generating overkill-length keys isn't as boring. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From ravage at ssz.com Mon Feb 9 16:51:01 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 08:51:01 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802100054.SAA25744@einstein.ssz.com> Forwarded message: > Date: Mon, 09 Feb 1998 14:22:40 -0800 > From: Bill Stewart > Subject: Re: the best justice money can buy --Lessig (fwd) > Gates got rich not by selling good software, but by selling software > very well. His original money was made by being the first company to sell a CP/M compliant BASIC. It was very heavily pirated and Microsoft became a de facto standard for S-100 using CP/M. Then because of Digital Research's failure to treat IBM with respect he was selected as the supplier for their basic OS. This decision was made because of his reputation with CP/M software. Because of this connection Microsoft was in a position such that Gates couldn't help but make money as long as IBM was selling pc's. And considering nobody ever lost their job buying IBM it was a shoe in that IBM was going to sell machines. His first versions of Windows didn't sell. He looked at what was selling which was a GUI with more features and better looks. He hired the right people to impliment those changes and wallah he had a winner. All those pc's running his old os no longer had to go to Desqview and DR to get a GUI that was acceptable to their users. From their they have used various marketing and licensing tricks to increase his market share. > Copyright is part of the process, but it's possible to > sell your product to computer manufacturers with any customization > they need using contracts instead of copyright to make your money. But a company doesn't make money from selling software to computer manufacturers, they make money by having their software on pc's that the users use. > It's also possible to do copy protection in your software; > games makers do this because they're widely pirated by non-point-source > attacks (kids, mostly) who are hard to track down and sue, > unlike major computer manufacturers who are easier to find, > both to sue if needed or to provide support for. > Copy protection was one of the things people hated about Lotus 123; > I don't remember Excel or MS-DOS ever having it. And in the long run non-copyrighted software has a significant market advantage. It's smaller, it is more stable, and people don't get as pissed off when they want to make their backups. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Mon Feb 9 17:04:00 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 09:04:00 +0800 Subject: What's the latest in factoring? (fwd) Message-ID: <199802100105.TAA25850@einstein.ssz.com> Forwarded message: > Date: Mon, 09 Feb 1998 13:40:03 -0800 > From: Bill Stewart > Subject: Re: What's the latest in factoring? > Remember that factoring difficulty is roughly exponential; > adding logn bits about doubles the cracking workload > (depending on which factoring method is being used). > Factoring a 1024-bit number is _much_ harder than factoring a 512-bit > number, and factoring a 2048-bit number is well into age-of-the-universe > difficulty level. The practical level of factoring right now > is about 512 bits, for either a distributed internet effort or > an NSA internal one; in the unlikely event that Moore's law lets > us double processing power 100 times in the next 150 years, > that means a 1500-bit key could be crackable. So 2048 bits > is certainly more than enough for _your_ lifetime. That depends on what current and near-future medical technology can do to extend the lifespan of humans. If your assumption is that most folks younger than about 50 will be dead in 75 years I suspect that you're in for a nasty surprise. The reason I posted those cc:'s regarding such research is enough that current estimates of key strength based on human life times need to be re-evaluated. It is my suspicion that within 10-15 years it will be possible, as a matter of course in regards employer medical insurance, to have ones biological clock reset such that the lifespan will be extended 3-4 times with the main limiting factor being cancers. Under those conditions key strength lifetime computations need to be re-evaluated. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From shamrock at cypherpunks.to Mon Feb 9 17:09:46 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Tue, 10 Feb 1998 09:09:46 +0800 Subject: Driver Licenses In-Reply-To: Message-ID: On Mon, 9 Feb 1998, Tim May wrote: > If a U.S. Passport is not considered enough I.D., because it doesn't have > the Big Brother Inside magstripe, one walks away from the transaction. Just as a data point, in the State of Oregon, an US passport is *not* valid ID for alcohol purchases. Magstripe or no magstripe. -- Lucky Green PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?" From ravage at ssz.com Mon Feb 9 17:18:50 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 09:18:50 +0800 Subject: Driver Licenses (fwd) Message-ID: <199802100120.TAA25990@einstein.ssz.com> Forwarded message: > Date: Tue, 10 Feb 1998 02:12:05 +0100 (CET) > From: Lucky Green > Subject: Re: Driver Licenses > On Mon, 9 Feb 1998, Tim May wrote: > > If a U.S. Passport is not considered enough I.D., because it doesn't have > > the Big Brother Inside magstripe, one walks away from the transaction. > > Just as a data point, in the State of Oregon, an US passport is *not* > valid ID for alcohol purchases. Magstripe or no magstripe. You can add Texas to that list. You can use a passport to get a Tx DL or ID card but it in and of itself is worthless for personal ID in most cases. Most places here specificaly require a valid drivers license from some state, they don't seem too interested in if Big Brother certifies your identity. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From Markus.Kuhn at cl.cam.ac.uk Mon Feb 9 17:52:39 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Tue, 10 Feb 1998 09:52:39 +0800 Subject: TEMPEST In-Reply-To: <199802092316.RAA24851@einstein.ssz.com> Message-ID: Jim Choate wrote on 1998-02-09 23:16 UTC: > The screen grid is where the dot clock goes to modulate the e-beam, or is > your claim we're going to modulate the filament directly? Ok, now I understand what you where talking about. Sorry, this was just a very silly language misunderstanding (my knowledge of CRTs is based on German vocabulary, so I mixed up "screen grid" and "mask" and was surprised to read that you seemed to claim that the per-pixel on-off modulation that van Eck described for his old-style terminals in fig 8c of his C&S paper is still there in the form of current interruptions caused by mask holes ... I hope you can understand my surprise ... ;-). Forget everything I wrote about "screen grid modulation" in my last reply, I fully agreed with you here. > If your getting your signal off the harmonics you're doing it the hard way. > Go back and re-read your texts on Fourier Transforms and then do a > power-spectrum analysis on the signals to the tube; what you will find is > that the primary frequencies get the majority of the signal (eg 1st harmonic > of a square wave (ie a dot clock) only gets, at best, 1/3 of the energy of > the primary). But this is not necessarily, where the the monitor resonates nicely. Van Eck has reported very similar results in his paper: His VDU had a dot clock of 11 MHz and he got nice resonance peaks near 125 and 210 MHz. > A very effective method to confuse Van Eck is to have several monitors > sitting next to each other with different displays. A more active display > is much more effective than one that is static (eg. such as a person typing > in an email to cypherpunks). If you have only a van Eck style receiver, yes. But as soon as you record the reception over some time and observe the images phases to drift only slightly against each other, you might be able to separate them using similar processing techniques as used in computer tomography. Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From nobody at REPLAY.COM Mon Feb 9 17:57:52 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 10 Feb 1998 09:57:52 +0800 Subject: Driver Licenses In-Reply-To: <199802082027.PAA00347@users.invweb.net> Message-ID: <199802100152.CAA03245@basement.replay.com> > Yup. It's really annoying to have to give the California DMV lots of > personal information about myself so they can track down deadbeat dads, > given that I'm not even a dad, much less a deadbeat dad, and so they > can track down Mexicans who want to drive without citizenship papers, > and similar presumptions of potential guilt. Actually, thanks to NAFTA, the Mexicans can drive without citizenship papers, and they don't have to give the California DMV shit. All they need is a valid mexican driver license and they can drive in the US. From shamrock at cypherpunks.to Mon Feb 9 18:01:07 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Tue, 10 Feb 1998 10:01:07 +0800 Subject: SOFT TEMPEST (fwd) In-Reply-To: <199802092357.RAA25254@einstein.ssz.com> Message-ID: On Mon, 9 Feb 1998, Jim Choate wrote: > That's good. The thought that given current technology a signal reception > van could pull one monitors display out of a building that could potentialy > have 1,000+ pc's (my last job had about 1500/floor and 3 floors) at a range > of say 200 ft. is truly incomprehensible. If it works that is a feat worth > many laurels. I don't know about displaying the screens of several thousands of PC's at a site, but you can easily select any given screen of several dozens of PC's. Using $100 worth in equipment plus a [>>$100] quality frequency generator. At HIP'97, I watched a van Eck demonstration given by a German professor. Using cheap analog equipment and one of the better HP frequency generators, he pulled screen images from the power line, the networking cable, and out of thin air. Since the oscillators in the devices to be monitored all have slightly different frequencies, you can actually tune the monitoring equipment to a specific PC. Even if there are numerous PC on the same floor of the building. I am told screen images can be captured up to 600 meters along the power line. Now all this was done without the use of a DSP. I can only imagine what one could capture after adding a DSP to the setup. -- Lucky Green PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?" From honig at otc.net Mon Feb 9 18:02:42 1998 From: honig at otc.net (David Honig) Date: Tue, 10 Feb 1998 10:02:42 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: <3.0.5.32.19980209124816.0079ba20@otc.net> Message-ID: <3.0.5.32.19980209174919.007b18a0@otc.net> At 06:34 PM 2/9/98 EST, Dr.Dimitri Vulis KOTM wrote: >One can "disrupt" the water supply by just making a credible assertion that >it's been poisoned - but it won't kill nearly as many people as actual >poison (or virus/bacteria). > Psychops? That doesn't work when you have sufficient health-orgs and telecomm to get the word out that the water's ok. Actually, a lot of people drink bottled water here :-) but the 10 million kilos of shit excreted by LA every day would build up pretty fast. Electric power is probably as vunerable as waterways, despite conscious efforts to make the grid redundant. Of course both are controlled by computers, as uncle sam is realizing. In LA, all it takes to create a looting riot is to cut electricity to the city's alarm systems... .... Major freeway intersections are closed down 2-3 times a year in LA due to bomb threats, which are usually just threats -no bombs are found. You can snarl the roads very easily at the right time of day, since the roads' bandwidth is already exceeded and congestion persists after the clog is removed. At *least* once a month a major piece of freeway is shut down for an hour or so for "police activity", one hears on traffic reports, often around rush hour. Crypto relevance: traffic signals can be controlled by modem, a Civ-E friend tells me. They are built to be fail-safe (blinking red), but ever seen rush hour commuters deal with all blinking red? Even tanks can't get through a gridlocked city (a factor in Korean invasion planning). ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Lewinsky for President '2012 From wendigo at ne-wendigo.jabberwock.org Mon Feb 9 18:06:00 1998 From: wendigo at ne-wendigo.jabberwock.org (Mark Rogaski) Date: Tue, 10 Feb 1998 10:06:00 +0800 Subject: Driver Licenses In-Reply-To: Message-ID: <199802100200.VAA03490@deathstar.jabberwock.org> -----BEGIN PGP SIGNED MESSAGE----- An entity claiming to be D'jinnie wrote: : : How exactly can they require for the DL to be magnetized if only a few : states do that? My NE license is just a piece of photographed paper : encased in plastic. The only thing that "protects" it from forgery is a : "Don't Drink and drive" and "buckle up Nebraska" silvery warnings that can : be seen under certain angles. I don't see them changing it anytime : soon...thank gods for slow ppl ;) So...seems like there can and will be a : lawsuit against such practices. : Nice to see D'Jinn jumping in ... Here in the Peoples Republik ov NJ, the DL's have no magstrips. But, being that it is NJ, they're probably not far away. An interesting point is that, when I moved (intrastate), the MVS sent a decal with the new address to stick on the back. No re-issue necessary, which is good, since most bars/liquor stores will not accept licenses marked DUP. But, they will accept passports. Also interesting is that PA has recently (within the past 2-4 years) been issuing DL's with the driver's SSN. Mark - -- [] Mark Rogaski "That which does not kill me [] wendigo at pobox.com only makes me stranger." [] [] finger wendigo at deathstar.jabberwock.org for PGP key [] anti spambot: postmaster at localhost abuse at localhost uce at ftc.gov -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQEVAwUBNN+01XzbrFts6CmBAQFkyAf/ZVF3rpjdjTLYQNJ9K6PO/B3HRovlKgba FgmBkTcJKCH4yJPK0KC+RJzQ26B2S4SwKXvWYN46cQypTb6KgRiqpxRXBF7qo8Nt yFebMXv4q/wHCh9Vg8uNeEOSAqq18meZcFy6ZwoeaSMZ3W2aIgCiWoF2fF+zFLu0 EDMxKLEgJtLBWS1HPHeU7XRQX5swu/Ud6rF5pN7m8qCZNPvjuUOL+5yCQGjYEKZp gqJt7gtl1UgmvVkbX+dkbAG07/m3ACWbxspn1u1/NFwBFpJwM95D/Md/FYAa3rpc XZy7LtZKqSrk6CwHPDWNpz/fPEnsmJG13DROMeD4340mjO0ZnS5/5g== =xMsm -----END PGP SIGNATURE----- From rah at shipwright.com Mon Feb 9 18:06:02 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 10 Feb 1998 10:06:02 +0800 Subject: Financial Cryptography 1998 Workshop UPDATE Message-ID: --- begin forwarded text Resent-Date: Mon, 9 Feb 1998 14:37:24 -0400 X-Authentication-Warning: online.offshore.com.ai: list set sender to fc98-request at offshore.com.ai using -f Subject: Financial Cryptography 1998 Workshop UPDATE To: fc98 at offshore.com.ai Date: Mon, 09 Feb 1998 10:20:13 -0800 From: Ian Goldberg Resent-From: fc98 at offshore.com.ai X-Mailing-List: archive/latest X-Loop: fc98 at offshore.com.ai Precedence: list Resent-Sender: fc98-request at offshore.com.ai CALL FOR PARTICIPANTS - UPDATE The Financial Cryptography 1998 (FC98) Workshop for Senior Managers and IS Professionals March 2-6, 1998 The InterIsland Hotel Anguilla, BWI FC98 is sponsored by: * RSA Data Security Inc. * C2NET, Inc. * Hansa Bank & Trust Company Limited, Anguilla * Sicherheit und Privat- International Bank * Offshore Information Services * e$ FC98 Conference and Exhibition February 23-27, 1998 FC98 Workshop for Senior Managers and IS Professionals March 2-6, 1998 The Inter-Island Hotel Anguilla, BWI Workshop and Conference Reservations: Last year, the Financial Cryptography '97 (FC97) Workshop was the world's first intensive financial cryptography workshop for senior managers and IS professionals. This year, the Financial Cryptography '98 (FC98) Workshop will be held Monday through Friday, March 2-6, 1998, at the Inter-Island Hotel on the Carribbean island of Anguilla. This workshop will follow the peer-reviewed financial cryptography conference and commercial exhibition, Financial Cryptography 1998 (FC98), which will be held the preceding week, February 23-27, 1998. The goals of the combined workshop, conference and exhibition are: * to give senior managers and IS professionals a solid understanding of the fundamentals of strong cryptgraphy as applied to financial operations on public networks, * to provide a peer-reviewed forum for important research in financial cryptography and the effects it will have on society, and, * to showcase the newest products in financial cryptography. The Workshop Ian Goldberg, the Workshop chair, has picked an outstanding team of instructors in financial cryptography and internet financial system security to teach the courses in this workshop. The Workshop will consist of 40 hours of intensive instruction and lab time over 5 days. Students will have access to Internet-connected workstations. Who Should Attend The Workshop is intended for senior IS managers and technical professionals who want to get completely up to speed on the design, development, and implementation of financial cryptography systems, the core technology of internet commerce. After the workshop, senior managers will have a hands-on understanding the strengths and liabilities of currently available financial cryptography and internet transaction security software and hardware, and thus be able to make better asset allocation decisions in this area of explosive technology growth. Senior technical professionals with strong IS experience will be able to implement those technologies and to pass on what they've learned to their clients and colleagues when they return home. The Workshop will be held in a casual but intensive atmosphere at the very cutting edge of financial technology on the internet. Someone has likened the experience to a financial cryptography bootcamp. At the end, Workshop attendees should be utterly conversant in cryptography as it applies to finance. Workshop participants will not only know what everyone else is doing now in internet commerce, but, more important, because they understand the implications of strong financial cryptography on ubiquitous public networks, they will be able to know what to do *next*. The Workshop Leader Ian Goldberg is a Ph.D. student in security and cryptography at the University of California, Berkeley. He was the first winner of RSA Data Security Inc.'s Secret-Key Challenge, breaking a 40-bit cipher in just 3.5 hours. In late 1995, he discovered what became a much-publicized flaw in Netscape's implementation of SSL. He is a recognized expert in electronic payment systems, and in DigiCash's ecash digital bearer certificate protocol in particular. He has produced several ecash clients for Unix and Windows, as well as an ecash module for the Stronghold web server, which has extended the existing ecash system for better security, privacy, and ease-of-use. The Principal Instructors Gary Howland has spent the last four years with several companies that are primarily working with secure electronic commerce (including Digicash), where he has been involved with the design and development of secure payment protocols, and the application of these protocols to such tasks as electronic cash, bond trading, loyalty systems, and online gambling. He is also responsible for the development of the a freely available cryptographic library for java and perl. John Kelsey is an experienced cryptographer, cryptanalyst, and programmer who has designed several algorithms and protocols. He pioneered research on secure random number generators, differential related-key cryptanalysis on block ciphers, and the chosen-protocol attack against cryptographic protocols. His research has been presented at several international conferences, and he has broken many proposed commercial cryptographic algorithm, protocol, and system designs. Kelsey has a degree in Computer Science and Economics from the University of Missouri Columbia. Adam Shostack is Director of Technology for Netect, Inc, a Boston based startup building state of the art server security management applications. He has extensive background in designing, implementing and testing secure systems for clients in the medical, computer, and financial industries. His recent public work includes 'Apparent Weaknesses in the Security Dynamics Client Server Protocol,' 'Source Code Review Guidelines,' and comparisons of freely available cryptographic libraries. Workshop Topics * Security on the Internet o Internet Protocols: IP, TCP, UDP o Higher-level Protocols: Telnet, FTP, HTTP, SSL o Solid Foundations for Cryptographic Systems o A History of Internet Attacks o Building Internet Firewalls o Building a Bastion Host o Turning your Bastion Host into a Web Server o Non-internet Internet Security * Cryptography o The Need for Cryptography o History of Cryptography o Classical Methods o Modern Methods o Private and Public Key Cryptography o Authentication vs. Security o Certification and Public Key Infrastructures o Cryptographic Protocols o Engineering a Cryptographically Secure System o Why Cryptography is Harder than it Looks o Security Through Obscurity and How to Recognize Snake Oil * Internet Payment Systems o Payment models: coin-based, cheque-based, account-based o Security Issues o Privacy and Anonymity Issues o Smartcards vs. Software o Existing Payment Schemes + credit cards + First Virtual + CyberCash + DigiCash o Forthcoming Payment Schemes + SET + Mondex + Millicent + micropayments * Setting Up an ecash-Enabled Web Server o Setting up the Web Server o Signing up for ecash o Installing the ecash Module o Setting Prices o Logging o Advanced Methods + ecashiers + moneychangers The price of the workshop is $5,000 U.S. You can pay for your FC98 workshop ticket with Visa or MasterCard, with ecash, or with any of a number of other internet commerce payment protocols, at the regstriation site: . Please register and make your plane and hotel reservations as soon as possible; workshop space is extremely limited. The workshop price includes meals (but not lodging) at the InterIsland Hotel and lab space, plus the delivery and installation of hardware, network access, internet commerce software, all to a location like Anguilla. And, of course, 40 hours of instruction and structured lab activity. We have priced the workshop to be competitive with other comprehensive business and professional technology workshops of similar total session length. In addition, the first ten FC98 workshop participants will receive a 50% reduction in their FC98 Conference and Exhibition fee, for a savings of $500 off the $1,000 conference admission. You can register, and pay for, your workshop ticket at . Air Transportation and Hotels Air travel to Anguilla is typically done through San Juan or St. Maarten/Martin. There are several non-stop flights a day from various US and European locations. Connection through to Anguilla can be made through American Eagle, or through LIAT, or in the case of St. Maarten, with a short ferry ride to Anguilla. See your travel agent for details. Anguilla's runway is 3600 feet, with a displaced threshold of 600 feet, and can accomodate business jets. Obviously, you should talk to your aviation staff for details about your own aircraft's capabilities in this regard. Anguilla import duties are not imposed on hardware or software which will leave the island again, so, as long as you take it with you when you leave, you won't pay import duties. Please Note: Your FC98 Workshop fee only covers meals at the InterIsland Hotel. The InterIsland is actually a small guesthouse attached to a large conference facility, and so rooms there are in short supply. Fortunately, there are lots of small hotels and guesthouses nearby. For more information on these hotels, please see for more information. Other hotels on Anguilla range from spartan to luxurious, all within easy walking or driving distance of the Workshop at the InterIsland. More information about Anguillan hotels can be obtained from your travel agent, or at . Registration and Information for Other FC98 Events To register and pay for your ticket to the FC98 conference itself, see: For information the selection of papers for the FC98 conference see: If you're interested in Exhibition space, please contact Blanc Weber: If you're interested in sponsoring FC98, also contact Blanc Weber: Financial Cryptography '98 is held in cooperation with the International Association for Cryptologic Research. The conference proceedings will be published by Springer Verlag in their Lecture Notes in Computer Science (LNCS) series. The FC98 Organizing Committee: * Vince Cate and Bob Hettinga, General Chairs * Ray Hirschfeld, Conference Chair * Matt Franklin, Conference Co-Chair * Ian Goldberg, Workshop Chair * Blanc Weber, Exhibit and Sponsorship Manager And our sponsors... * RSA Data Security Inc. * C2NET, Inc. * Hansa Bank & Trust Company Limited, Anguilla * Sicherheit und Privat- International Bank * Offshore Information Services * e$ --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: From nobody at REPLAY.COM Mon Feb 9 18:18:37 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 10 Feb 1998 10:18:37 +0800 Subject: What Jim Choate doesn't know Message-ID: <199802100200.DAA04492@basement.replay.com> When Jim Choate writes about something that I know about, he is usually wrong. Look at the hash he made of quantum mechanics recently. And don't get me started on his blunders regarding cryptography. So when he writes about something I don't know about, like the EM emissions of video tubes, I tend to assume the same thing. He's probably all messed up. Anybody else have the same experience? And how about his countless off-topic posts, forwarding all kinds of pointless crap? Is anyone else sick of that, too? From anon at anon.efga.org Mon Feb 9 18:20:48 1998 From: anon at anon.efga.org (Anonymous) Date: Tue, 10 Feb 1998 10:20:48 +0800 Subject: The Wit and Wisdom of Tim May Message-ID: <0084d7fee26e9320dae1eb7da281a57b@anon.efga.org> From dm0 at avana.net Mon Feb 9 19:32:20 1998 From: dm0 at avana.net (David Miller) Date: Tue, 10 Feb 1998 11:32:20 +0800 Subject: Drivers Licenses Message-ID: <34DFC8FA.1CECCE12@avana.net> Anonymous (remailer at htp.org) wrote: > My question is, how much information can be stored on these strips? The data that's stored on most of the cards (credit cards, hotel keys, gym cards, etc.) are encoded with 5 bits per character. I believe that this is also known as Baudot encoding. You can store somewhere around 80 characters per track on "normal" cards, and most cards contain a 1/2" magnetic stripe that can hold 4, 1/8" tracks. So, I would estimate that your drivers license would hold a total of about 320 characters on all four tracks with standard encoding techniques. If you are interested in rendering only individual tracks unreadable, it can be done. I have done it by scratching off the magnetic material as you described. Of course, all tracks run horizontally across the card, with track 1 being the track closest to the edge of the card. So, if you wanted to destroy track 1, you could scrape off the 1/8" of the strip closest to the long edge of the license. Have fun. --David Miller middle rival devil rim lad From blancw at cnw.com Mon Feb 9 19:48:08 1998 From: blancw at cnw.com (Blanc) Date: Tue, 10 Feb 1998 11:48:08 +0800 Subject: What Jim Choate doesn't know In-Reply-To: <199802100200.DAA04492@basement.replay.com> Message-ID: <3.0.5.32.19980209193915.00879d60@cnw.com> Anonymous wrote: >Anybody else have the same experience? ...................................................................... You must understand: it's basically understood. .. Blanc From emc at wire.insync.net Mon Feb 9 20:12:27 1998 From: emc at wire.insync.net (Eric Cordian) Date: Tue, 10 Feb 1998 12:12:27 +0800 Subject: The Latest Horiuchi Antics Message-ID: <199802100403.WAA29574@wire.insync.net> Now that the Feds have gotten the Horuichi case moved out of state jurisdiction into a federal courtroom, they want their federal judge to dismiss all charges. ----- BOISE, Idaho (AP) The federal government on Monday sought the dismissal of a state involuntary manslaughter charge against the FBI sharpshooter who killed Randy Weaver's wife at Ruby Ridge six years ago. The Justice Department petition filed in federal court argued that Lon Horiuchi was protected by the Supremacy Clause of the U.S. Constitution so he cannot be subject to state prosecution for actions in the line of duty. "It is imperative that federal officials be protected from state prosecution in such circumstances because without the protection ensured by the Supremacy Clause, rigorous enforcement of federal law would be severely chilled to the detriment of the general public good,'' the petition said. Horiuchi was among dozens of federal agents who surrounded Weaver's remote mountain cabin in the Idaho Panhandle in August 1992 in an attempt to arrest Weaver on an illegal weapons charge. Weaver's 14-year-old son, Sam, and deputy U.S. Marshal William Degan of Quincy, Mass., were killed in the gunfight that touched off the 11-day siege. Vicki Weaver was fatally shot by Horiuchi on the second day. Both Randy Weaver and family associate Kevin Harris were acquitted in 1993 of federal murder and other charges in connection with the siege. Weaver was also acquitted of the weapons charge that had prompted federal agents to confront him. Las