From camera_lumina at hotmail.com Tue Mar 1 08:20:52 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 01 Mar 2005 11:20:52 -0500 Subject: Federal Judge Orders 'Enemy Combatant' Jose Padilla Charged Or Released In-Reply-To: Message-ID: What the hell. A federal judge finally did something that wasn't completely cowardly. I'm interested to see how the Bushites will try to subvert this situation anyway. Come to think of it, I'd bet they've been brainwashing Padilla to blow up something the day after he gets out so they can squelch the remaining democratic "loopholes". -TD >From: "R.A. Hettinga" >To: cypherpunks at al-qaeda.net >Subject: Federal Judge Orders 'Enemy Combatant' Jose Padilla Charged Or >Released >Date: Mon, 28 Feb 2005 21:15:44 -0500 > > > >Yahoo! > >Federal Judge Orders 'Enemy Combatant' Jose Padilla Charged Or Released > > >Mon Feb 28, 6:08 PM ET > > > A federal judge in Spartanburg has ordered that an American citizen held >as an enemy combatant in a Navy brig in Charleston should be released. > > > > > U.S. District Judge Henry F. Floyd ruled Monday that the president of the >United States does not have the authority to order Jose Padilla to be held. > > "If the law in its current state is found by the president to be >insufficient to protect this country from terrorist plots, such as the one >alleged here, then the president should prevail upon Congress to remedy the >problem," he wrote. > > In the ruling, Floyd said that three court cases that the government used >to make its claim did not sufficiently apply to Padilla's case. > > Floyd wrote that, in essence, "the detention of a United States citizen >by >the military is disallowed without explicit Congressional authorization." > > Floyd wrote that because the government had not provided any proof that >the president has the power to hold Padilla, he must reject the >government's claim of authority. > > "To do otherwise would not only offend the rule of law and violate this >countrys constitutional tradition, but it would also be a betrayal of this >nations commitment to the separation of powers that safeguards our >democratic values and individual liberties," he wrote. > > "For the court to find for [the U.S. government] would also be to engage >in judicial activism. This court sits to interpret the law as it is and not >as the court might wish it to be. Pursuant to its interpretation, the court >finds that the President has no power, neither express nor implied, neither >constitutional nor statutory, to hold [Padilla] as an enemy combatant," >Floyd wrote. > > As a result, Floyd ordered that Padilla be charged with a crime or >released within 45 days. > > The government is expected to appeal the decision. > >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Tue Mar 1 09:53:51 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 1 Mar 2005 12:53:51 -0500 Subject: Invisibility Shields Planned by Engineers Message-ID: Invisibility Shields Planned by Engineers James Owen in London for National Geographic News February 28, 2005 In popular science fiction, the power of invisibility is readily apparent. Star Trek fans, for example, know that the devious Romulans could make their spaceships suddenly disappear. But is the idea really so implausible? Not according to new findings by scientists who say they have come up with a way to create cloaking device. Electronic engineers at the University of Pennsylvania in Philadelphia are researching a device they say could make objects "nearly invisible to an observer." The contrivance works by preventing light from bouncing off the surface of an object, causing the object to appear so small it all but disappears. The concept was reported today by the science news Web site news at nature.com. It says the proposed cloaking device would not require any peripheral attachments (such as antennas or computer networks) and would reduce visibility no matter what angle an object is viewed at. Sir John Pendry, a physicist at Imperial College, London, said the concept potentially holds several important applications "in stealth technology and camouflage." While types of invisibility shielding have been developed before, the phenomenon described by Andrea Alz and Nader Engheta sounds like something that might have been witnessed from the bridge of science fiction's starship Enterprise. The concept is based on a "plasmonic cover," which is a means to prevent light from scattering. (It is light bouncing off an object that makes it visible to an observer). The cover would stop light from scattering by resonating at the same frequency as the light striking it. If such a device could cope with different wavelengths of electromagnetic radiation (including visible light), in theory, the object would vanish into thin air. Plasmonic Covers Alz and Engheta investigated experimental plasmonic covers that incorporated metals, such as gold and silver, to hide visible light. When light strikes a metallic material, waves of electrons, called plasmons, are generated. The engineers found that when the frequency of the light striking the material matched the frequency of the plasmons, the two frequencies act to cancel each other out. Under such conditions, the metallic object scattered only negligible amounts of light. The researchers' studies show that spherical and cylindrical objects coated with plasmonic shielding material produce very little light scattering. These objects, when hit by the right wavelength of light, were seen to become so small that they were almost invisible. The study is supported by the U.S. Defense Advanced Research Projects Agency, which researches and develops cutting edge military technology. Some experts note, however, that cloaking devices that could enable military vehicles and aircraft, let alone spaceships, to become completely invisible to the enemy are likely to remain elusive for the foreseeable future. John Pendry, the Imperial College physicist, said that light-shielding covers would have to be customized to match the properties of each and every object they hide. It would be still more difficult to devise shields that could cope with all wavelengths of the visible spectrum-from red to violet light-and not just a single color. Types of invisibility shielding previously proposed by scientists depend on advanced camouflage systems, rather than objects being made to look undetectably tiny. Such systems involve light sensors that create a mirror image of the background scene on the concealed object. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Tue Mar 1 10:00:43 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 1 Mar 2005 13:00:43 -0500 Subject: I.R.S. Accuses Man of Hiding $450 Million Message-ID: The New York Times March 1, 2005 I.R.S. Accuses Man of Hiding $450 Million By DAVID CAY JOHNSTON ASHINGTON, Feb. 28 - A prominent telecommunications entrepreneur who once tried to mount a rescue of a Russian space station has been arrested and charged with evading taxes by hiding at least $450 million of income through offshore corporations. According to a 12-count indictment released on Monday that federal prosecutors called the largest criminal case of individual tax evasion, the entrepreneur, Walter Anderson, 51, did not pay over $210 million in federal and local income taxes he owed for the years 1995 through 1999 alone. "Mr. Anderson ran the table when it came to violating the tax laws," Mark W. Everson, the Internal Revenue Service commissioner, told a news conference Monday. "Because of his dishonest dealings, Mr. Anderson's lavish lifestyle was subsidized by honest, hard-working Americans." In 1998 Mr. Anderson, who lives in Washington, reported a total income of $67,939 and paid a tax of just $494. Mr. Everson said Mr. Anderson actually made at least $126 million that year that he never reported. From 1987 through 1993, officials said, Mr. Anderson failed to file a tax return. Mr. Anderson is the chief executive of Orbital Recovery, a company trying to extend the life of telecommunications satellites. He was arrested Saturday at Dulles Airport outside Washington as he stepped off a plane from London, according to Kenneth L. Wainstein, the United States attorney for the District of Columbia. In court on Monday, Mr. Anderson pleaded not guilty to the charges. His lawyer, John Moustakas, told Magistrate Judge Alan Kay that the government's case was based on "innuendo and rumor." If convicted, Mr. Anderson faces as much as 24 years in prison. Judge Kay ordered Mr. Anderson held without bail until a bond hearing on Thursday. Susan Menzer, a prosecutor in the case, called Mr. Anderson "a flight risk" who "can't be trusted." "He hasn't been listening to judges for years," she added. Since a search warrant was executed in 2002, Mr. Anderson has moved artwork and cash to Switzerland to defeat both tax collectors and creditors who have civil court orders, the Justice Department said in court papers. Mr. Moustakas did not return a phone call seeking comment. Mr. Anderson has long attracted a certain level of public attention, especially when he tried to arrange a rescue of the Mir space station five years ago. He frequently flew in a private jet and made deals involving millions of dollars. At conferences on space travel he often spoke of his hatred of government. But he came under scrutiny, law enforcement officials suggested, only because of a tip from a disgruntled business associate. Mr. Anderson, according to the indictment, formed an offshore corporation, Gold and Appeal Transfer, in the British Virgin Islands in 1992 to hide his profits from deals involving a telecommunications company he started in the 1980's. Over the next three years, the indictment charged, Mr. Anderson set up a network of offshore corporations, including one in Panama under the alias Mark Roth, that were used to hide his ownership of three telecommunications companies and allow him to earn hundreds of millions of dollars without paying taxes. While Mr. Anderson at times insisted publicly that he was worth no more than $4 million, he serves as a senior business adviser to Constellation Services International, a fledgling satellite rescue company that disclosed his ownership of several companies, including Gold and Appeal. Its Web site said Gold and Appeal was worth at least $100 million and described Mr. Anderson as selling the Esprit Telecom Group in 1998 for $900 million. In extensive filings with the I.R.S. and the Securities and Exchange Commission, the indictment charged, Mr. Anderson claimed that he was merely an employee of Gold and Appeal, the offshore bank that the indictment says was central to his tax-evasion effort. "The I.R.S. holds all Americans, even the very wealthy, to the same standard," Mr. Everson said. "This indictment sends a strong signal that we will not tolerate abuse of the tax laws." But later, questioned by reporters, Mr. Everson noted that the I.R.S. law enforcement staff has been cut by at least a quarter in recent years. Mr. Wainstein, the United States attorney, said one of his prosecutors had spent a year developing the case. Prosecutors noted that it was difficult to catch determined tax cheats but said that some countries known as tax havens had been cooperating with American investigators more often since the 9/11 terrorist attacks. The government has stepped up investigations but managed to recommend only 1,400 tax prosecutions out of the 130 million tax returns filed annually. For budgetary reasons, the I.R.S. relies almost entirely on data reported to it on computer files, not on traditional detective work, to help identify tax evaders. Gary Hudson of Redwood City, Calif., said that Mr. Anderson invested $30 million in his Rotary Rocket, the primary backing for a private rocket launching and recovery firm that ultimately failed. "One condition of his investment was that we could not take any government money," Mr. Hudson said in a telephone interview on Monday. Besides avoiding federal taxes, the indictment charges, Mr. Anderson also evaded at least $40 million in income taxes owed the District of Columbia and $254,000 in local sales taxes he should have paid on jewelry, wine and art, including a painting by Salvador Dalm and several by Reni Magritte. Copyright 2 -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From jrandom at i2p.net Tue Mar 1 13:03:35 2005 From: jrandom at i2p.net (jrandom) Date: Tue, 1 Mar 2005 13:03:35 -0800 Subject: [i2p] weekly status notes [mar 1] Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi y'all, time for our status update * Index 1) 0.5.0.1 2) roadmap 3) addressbook editor and config 4) i2p-bt 5) ??? * 1) 0.5.0.1 As discussed last week, a few hours after the meeting we pushed out a new 0.5.0.1 release fixing the bugs in 0.5 that had caused the massive number of tunnels being built (among other things). Generally, this rev has improved things, but under wider testing, we've come across some additional bugs that have been hitting a few people. In particular, the 0.5.0.1 rev can gobble tons of CPU if you have a slow machine or your router's tunnels fail in bulk, and some long lived I2PTunnel servers can gobble up RAM until it OOMs. There has also been a long standing bug in the streaming lib, where we can fail to establish a connection if just the right failures happen. Most of these (among others) have been fixed in cvs, but some remain outstanding. Once they're all fixed, we'll package 'er up and ship it as a 0.5.0.2 release. I'm not exactly sure when that'll be, hopefully this week, but we'll see. * 2) roadmap After major releases, the roadmap [1] seems to get... adjusted. The 0.5 release was no different. That page reflects what I think is reasonable and appropriate for the way forward, but of course, if more people jump on to help out with things, it can certainly be adjusted. You'll notice the substantial break between 0.6 and 0.6.1, and while this does reflect lots of work, it also reflects the fact that I'll be moving (its that time of the year again). [1] http://www.i2p.net/roadmap * 3) addressbook editor and config Detonate has started some work on a web based interface to manage the addressbook entries (hosts.txt), and its looking pretty promising. Perhaps we can get an update from detonate during the meeting? In addition, smeghead has been doing some work on a web based interface to manage the addressbook configuration (the subscriptions.txt, config.txt). Perhaps we can get an update from smeghead during the meeting? * 4) i2p-bt There's been some progress on the i2p-bt front, with a new 0.1.8 release addressing the azneti2p compatability issues as discussed in last week's meeting. Perhaps we can get an update from duck or smeghead during the meeting? Legion has also created a fork off the i2p-bt rev, merged in some other code, patched up some things, and has a windows binary available on his eepsite. The announcement [2] seems to suggest that source may be made available, though its not up on the eepsite at the moment. The i2p devs haven't audited (or even seen) the code to that client, so those who need anonymity may want to get and review a copy of the code first. [2] http://forum.i2p.net/viewtopic.php?t=382 There's also work on a version 2 of Legion's BT client, though I don't know the status of that. Perhaps we can get an update from Legion during the meeting? * 5) ??? Thats about all I have to say atm, lots and lots going on. Anyone else working on things that perhaps we can get an update for during the meeting? =jr -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFCJNebGnFL2th344YRAobNAJ4lfCULXX7WAGZxOlh/NzTuV1eNwgCg1eV/ /h5I4b/h0SPpmq/GVKZsLns= =EEkH -----END PGP SIGNATURE----- _______________________________________________ i2p mailing list i2p at i2p.net http://i2p.dnsalias.net/mailman/listinfo/i2p ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From camera_lumina at hotmail.com Tue Mar 1 14:43:49 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 01 Mar 2005 17:43:49 -0500 Subject: I.R.S. Accuses Man of Hiding $450 Million In-Reply-To: Message-ID: >But later, questioned by reporters, Mr. Everson noted that the I.R.S. law >enforcement staff has been cut by at least a quarter in recent years. Mr. >Wainstein, the United States attorney, said one of his prosecutors had >spent a year developing the case. Anyone gigling? Notice that the amount he cheated the government out of could have easily payed the salaries of a bunch more IRS agents. This guy should receive an Official Cypherpunk award. Or does he not deserve one 'cause he got caught? -TD >From: "R.A. Hettinga" >To: cypherpunks at al-qaeda.net >Subject: I.R.S. Accuses Man of Hiding $450 Million >Date: Tue, 1 Mar 2005 13:00:43 -0500 > > > >The New York Times >March 1, 2005 > >I.R.S. Accuses Man of Hiding $450 Million > By DAVID CAY JOHNSTON > > >ASHINGTON, Feb. 28 - A prominent telecommunications entrepreneur who once >tried to mount a rescue of a Russian space station has been arrested and >charged with evading taxes by hiding at least $450 million of income >through offshore corporations. > >According to a 12-count indictment released on Monday that federal >prosecutors called the largest criminal case of individual tax evasion, the >entrepreneur, Walter Anderson, 51, did not pay over $210 million in federal >and local income taxes he owed for the years 1995 through 1999 alone. > >"Mr. Anderson ran the table when it came to violating the tax laws," Mark >W. Everson, the Internal Revenue Service commissioner, told a news >conference Monday. "Because of his dishonest dealings, Mr. Anderson's >lavish lifestyle was subsidized by honest, hard-working Americans." > >In 1998 Mr. Anderson, who lives in Washington, reported a total income of >$67,939 and paid a tax of just $494. Mr. Everson said Mr. Anderson actually >made at least $126 million that year that he never reported. From 1987 >through 1993, officials said, Mr. Anderson failed to file a tax return. > >Mr. Anderson is the chief executive of Orbital Recovery, a company trying >to extend the life of telecommunications satellites. He was arrested >Saturday at Dulles Airport outside Washington as he stepped off a plane >from London, according to Kenneth L. Wainstein, the United States attorney >for the District of Columbia. > >In court on Monday, Mr. Anderson pleaded not guilty to the charges. His >lawyer, John Moustakas, told Magistrate Judge Alan Kay that the >government's case was based on "innuendo and rumor." > > If convicted, Mr. Anderson faces as much as 24 years in prison. > >Judge Kay ordered Mr. Anderson held without bail until a bond hearing on >Thursday. Susan Menzer, a prosecutor in the case, called Mr. Anderson "a >flight risk" who "can't be trusted." > >"He hasn't been listening to judges for years," she added. > > Since a search warrant was executed in 2002, Mr. Anderson has moved >artwork and cash to Switzerland to defeat both tax collectors and creditors >who have civil court orders, the Justice Department said in court papers. > >Mr. Moustakas did not return a phone call seeking comment. > >Mr. Anderson has long attracted a certain level of public attention, >especially when he tried to arrange a rescue of the Mir space station five >years ago. He frequently flew in a private jet and made deals involving >millions of dollars. At conferences on space travel he often spoke of his >hatred of government. > >But he came under scrutiny, law enforcement officials suggested, only >because of a tip from a disgruntled business associate. > > Mr. Anderson, according to the indictment, formed an offshore >corporation, >Gold and Appeal Transfer, in the British Virgin Islands in 1992 to hide his >profits from deals involving a telecommunications company he started in the >1980's. > >Over the next three years, the indictment charged, Mr. Anderson set up a >network of offshore corporations, including one in Panama under the alias >Mark Roth, that were used to hide his ownership of three telecommunications >companies and allow him to earn hundreds of millions of dollars without >paying taxes. > > While Mr. Anderson at times insisted publicly that he was worth no more >than $4 million, he serves as a senior business adviser to Constellation >Services International, a fledgling satellite rescue company that disclosed >his ownership of several companies, including Gold and Appeal. Its Web site >said Gold and Appeal was worth at least $100 million and described Mr. >Anderson as selling the Esprit Telecom Group in 1998 for $900 million. > > In extensive filings with the I.R.S. and the Securities and Exchange >Commission, the indictment charged, Mr. Anderson claimed that he was merely >an employee of Gold and Appeal, the offshore bank that the indictment says >was central to his tax-evasion effort. > > "The I.R.S. holds all Americans, even the very wealthy, to the same >standard," Mr. Everson said. "This indictment sends a strong signal that we >will not tolerate abuse of the tax laws." > >But later, questioned by reporters, Mr. Everson noted that the I.R.S. law >enforcement staff has been cut by at least a quarter in recent years. Mr. >Wainstein, the United States attorney, said one of his prosecutors had >spent a year developing the case. > >Prosecutors noted that it was difficult to catch determined tax cheats but >said that some countries known as tax havens had been cooperating with >American investigators more often since the 9/11 terrorist attacks. The >government has stepped up investigations but managed to recommend only >1,400 tax prosecutions out of the 130 million tax returns filed annually. > >For budgetary reasons, the I.R.S. relies almost entirely on data reported >to it on computer files, not on traditional detective work, to help >identify tax evaders. > > Gary Hudson of Redwood City, Calif., said that Mr. Anderson invested $30 >million in his Rotary Rocket, the primary backing for a private rocket >launching and recovery firm that ultimately failed. > >"One condition of his investment was that we could not take any government >money," Mr. Hudson said in a telephone interview on Monday. > >Besides avoiding federal taxes, the indictment charges, Mr. Anderson also >evaded at least $40 million in income taxes owed the District of Columbia >and $254,000 in local sales taxes he should have paid on jewelry, wine and >art, including a painting by Salvador Dalm and several by Reni Magritte. > >Copyright 2 >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Tue Mar 1 17:40:31 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 1 Mar 2005 20:40:31 -0500 Subject: Revenge of the Son of HERF: Microwave 'Gun' Could End High-Speed Police Chases Message-ID: ABC News: Microwave 'Gun' Could End High-Speed Police Chases Company Develops Technology to Zap Fleeing Cars With Invisible Energy Beams By PAUL ENG Mar. 1, 2005 - The idea of a powerful ray gun has been a staple of science-fiction writing for decades. But a "weapon" that shoots invisible beams of energy could be making its way into law-enforcement hands soon. The technology isn't exactly something that would replace a police officer's handgun. In fact, the system being developed by Eureka Aerospace in Pasadena, Calif., couldn't even be crammed into a standard pistol holster. But the developers say their device, which uses technology more closely related to flash cooking than Flash Gordon, may help stop criminals and terrorists in their tracks. James Tatoian, chief executive of Eureka, says the High Power Electromagnetic System is designed to disable cars -- say, those fleeing from police officers -- using bursts of microwave energy. "Basically, since the 1970s, every car is built with some sort of microprocessor-controlled system -- like the ignition control and fuel pump control a lot of vital car systems," says Tatoian. "If you introduce a parasitic current into their wires, it leads to a power surge which in turn burns out those microprocessors." Once the car's chips are disabled, the vehicle will gradually slow to a halt, allowing police or other security forces to safely approach and apprehend the driver. A New Type of Nuker Tatoian is quick to admit that the company's experimental device isn't the first or only directed energy system designed to attack cars. Others have developed similar concepts and prototypes before. And some, like Eureka, are continuing their work using partial funding from a U.S. military research project that seeks to study the feasibility of "less than lethal" weapons. But Tatoian believes his designers and researchers have come a lot further in terms of power, portability and usability than other alternative solutions. "It's still in development stages, but the system is about 200 pounds in total weight. It will fit in a car with the [microwave] antenna mounted on the roof," says Tatoian. "It's also worthwhile to say that produces about 10 to 15 kilovolts per meter." During tests of the early unit, that was enough power to burn out chips in cars up to 100 meters distant. More importantly, the Eureka system is "tunable" "What's interesting is that every car has its own set of vulnerable frequencies -- in the range of 350 megahertz to 1,300 megahertz," says Tatoian. "The most ideal case [for our system] is where police officers pursuing a vehicle know the make and model of the car, they then can dial in the right frequencies that that car is vulnerable to in order to stop it." Better Than Busted Tires? Such capabilities have caught the interest of the Los Angeles Sheriff's Department, which has helped Eureka study the High Power Electromagnetic System. "Everything works on paper and in the lab," says Cmdr. Charles "Sid" Heal, who is in charge of studying new technology for the sheriff's department. "If this thing works [in the field] as well as described, it would tremendously help reduce risky high-speed pursuits." As seen in recent news video coverage, police typically try to end high-speed chases with a so-called "spike strip" designed to puncture and deflate the tires of a fleeing vehicle. While spike stripes can be effective in stopping suspects' cars, Heal points out they can be difficult to deploy properly and safely. "With spike strips, you have to lay them down before the suspect gets there," says Heal. "And that raises the basic question, if you know where they're going, then why chase [the suspects] at all?" But if police cruisers and helicopters were equipped with a working version of Eureka's system, the nature of "hot pursuits" could change dramatically. "It changes the strategy of how to safely end car chases," says Heal. "We can pick and choose where and when to disable the car where it would put the least amount of risk to the safety of our officers, the suspects and the public." The Bumps in the Road Still, Tatoian and Heal admit that there are quite a few questions and concerns that will need to be addressed before police can stop fleeing suspects with a push of a power button. For one, Tatoian still needs to figure out whether the system will work in "real world" conditions. And there are plenty of factors that Eureka engineers will have to consider in further research and design. For example, while Tatoian is confident that every car has particular "vulnerable frequencies," so far they've only been able to test the theory on about 13 cars. And with thousands of different makes and models of vehicles on the road today, it may be impossible to identify and isolate the right combination for each car. And for the energy beam to be effective, researchers will have to deal with factors that are beyond their control. "The difficult part of the technology is in 'coupling' -- getting the microwave energy into the chips so they overload," says Heal. "A vast majority of cars today are coated with rust coatings, thick paint or have bodies made of plastic -- all not good conductors of energy." Tatoian believes that these concerns can be answered -- especially with the help of Heal and the officers in the L.A. sheriff's department. One possible theory that Eureka and Heal's department would like to test is whether there are specific spots on cars that are particularly vulnerable to microwave energy. Smokey and the Zapper? Both Tatoian and Heal expect that by the end of this year, Eureka Aerospace will be able to field a prototype that will test these theories and other concerns. "When Dr. Tatoian is ready, we'll take this out to our chase test facility," says Heal. "Our officers are all jazzed on it." But even if all the technical bugs get worked out, Heal says it still might take quite a while before the system becomes another high-tech, non-lethal tool for police officers on highway patrol. Heal pointed to a recent university study which documents that police departments used less-than-lethal weapons -- Tasers, bean bags, batons, pepper spray -- more than 60,000 times in the last 10 years. "One of the things we found out -- which we're often accused of by detractors of less-than-lethal weapons -- is that when we get a new device, we tend to overuse it," says Heal. "We'll have to go through fairly rigorous steps before we implement new technology -- including involving our legal department." In other words, lawyers ultimately will have the final say if highway police really do live up to their "smokey" nickname. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Tue Mar 1 13:16:00 2005 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 1 Mar 2005 22:16:00 +0100 Subject: [i2p] weekly status notes [mar 1] (fwd from jrandom@i2p.net) Message-ID: <20050301211600.GM13336@leitl.org> ----- Forwarded message from jrandom ----- From bryan.jones at m.cc.utah.edu Tue Mar 1 21:42:48 2005 From: bryan.jones at m.cc.utah.edu (Bryan Jones) Date: Tue, 01 Mar 2005 22:42:48 -0700 Subject: OS X in a Classified Environment... Message-ID: Well, Nobody currently involved in a classified project is likely to respond to this question, but here is some historical (and unclassified) data: I have personally seen the current Vice President putting in on the Snake River (flyfishing) after using his Powerbook. Also, OS X has been used reasonably extensively in at least the FBI & CIA, but the lack of a couple of GIS programs on the platform were preventing its use in NIMA and the corollary division within the CIA. The presence of OS X within those agencies should not be surprising given that NeXT systems were used extensively within the CIA with black slabs and cubes everywhere, even on the secretaries desks which was pretty cool. Also, there are a number of current Xserve clusters that are going in to various mil and gov agencies and operations including some with the Navy for work in lasers, and a fairly sizable cluster going into an Army contractor for aerodynamics work. I would be interested to find out what happened to the Navy sonar cluster compute project that used G4 servers running Linux... As for a bit of trivia, going back a ways, there was a project called Cluster Knave (I think that was the project name), developed by ONI running on the old Mac OS that was deployed on submarines for tactical imagery capture, processing and transmission. That was most certainly a classified environment at the time, and one certainly cannot forget those big clunky TEMPEST shielded Macs..... Bryan >Anyone have OS X in a Classified/secure environment? Auditing? Just >curious...as I may be entering this unforgiving realm. > >Kit Bryan William Jones, Ph.D. bryan.jones at m.cc.utah.edu University of Utah School of Medicine Moran Eye Center Rm 3339A 75 N. Medical Dr. Salt Lake City, Utah 84132 http://prometheus.med.utah.edu/~marclab/ iChat/AIM address: bw_jones at mac.com _______________________________________________ Do not post admin requests to the list. They will be ignored. Scitech mailing list (Scitech at lists.apple.com) Help/Unsubscribe/Update your Subscription: http://lists.apple.com/mailman/options/scitech/eugen%40leitl.org This email sent to eugen at leitl.org ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From dave at farber.net Wed Mar 2 04:17:45 2005 From: dave at farber.net (David Farber) Date: Wed, 02 Mar 2005 07:17:45 -0500 Subject: [IP] Books -- The New Hows and Whys of Global Eavesdropping Message-ID: ------ Forwarded Message From: "John F. McMullen" Date: Wed, 02 Mar 2005 00:57:49 -0500 (EST) To: johnmac's living room Cc: Dave Farber Subject: Books -- The New Hows and Whys of Global Eavesdropping >From the New York Times -- http://www.nytimes.com/2005/03/02/books/02grim.html BOOKS OF THE TIMES | 'CHATTER' The New Hows and Whys of Global Eavesdropping By WILLIAM GRIMES Remember chatter? After 9/11, it was all over the news. For months, snatches of cellphone conversations in Karachi or Tora Bora routinely made the front page. Television newscasters could chill the blood instantly by reporting on "increased levels of chatter" somewhere in the ether. But what exactly was it? Who was picking it up, and how were they making sense of it? Patrick Radden Keefe does his best to answer these questions and demystify a very mysterious subject in "Chatter," a beginner's guide to the world of electronic espionage and the work of the National Security Agency, responsible for communications security and signals intelligence, or "sigint." In a series of semiautonomous chapters, he describes Echelon, the vast electronic intelligence-gathering system operated by the United States and its English-speaking allies; surveys the current technology of global eavesdropping; and tries to sort out the vexed issue of privacy rights versus security demands in a world at war with terrorism. Mr. Keefe writes, crisply and entertainingly, as an interested private citizen rather than an expert. A third-year student at Yale Law School, he follows in the footsteps of freelance investigators like James Bamford, who, through sheer persistence, managed to penetrate at least some of the multiple layers of secrecy surrounding the National Security Agency in his book "The Puzzle Palace." "Chatter" is a much breezier affair, filled with anecdotes, colorful quotes and arresting statistics. The United States has fewer than 5,000 spies operating around the world, for example, but 30,000 eavesdroppers. The National Security Agency employs more mathematicians than any other organization in the world, and every three hours its spy satellites gather enough information to fill the Library of Congress. Menwith Hill, the American listening station in North Yorkshire, England, has a staff as large as MI5, Britain's domestic intelligence service. Menwith Hill is just one in a network of American-run bases and overhead satellites that, Mr. Keefe writes, "have wrapped the earth in a spectral web of electronic surveillance." In some respects, their task is not that tough. "The air around us and the sky above us are a riot of signals," Mr. Keefe writes. "To intercept those signals is as easy as putting a cup out in the rain." As fiber-optic cables become the main channel for data transmission, surveillance will become more difficult, but at the moment the ability to collect electronic signals is far outstripping the ability to analyze it. Some messages are chatter. Others are chit-chat. In February 2003, the New York City police went on high alert, sending special teams into the subways and posting extra police at the tunnels leading in and out of Manhattan, all because the word "underground" had been picked up in an intercepted conversation between terrorists. Nothing happened. Was the word or the context misinterpreted? Or did the police presence thwart an attack? It's impossible to know. The National Security Agency has invested heavily in technology while cutting back on human analysts and foreign-language interpreters with the skill to detect shades of nuance in casual conversations. Should it now reinvest in training people fluent in Baluchi, the dialect spoken by Mohamed Atta, the lead hijacker in the 9/11 attacks? By the time their training is completed, voice-recognition technology may have turned out to be the smart bet. Sigint is a murky business. "Chatter" is often quite amusing. Mr. Keefe has great fun with Total Information Awareness, the ill-fated antiterrorist program announced by the Pentagon in the late summer of 2003. By linking private and government databases, Total Awareness would pick up on every electronic click, ping or chirp created by private citizens in the course of their daily lives. The very name, Mr. Keefe, points out, was ominous, Orwellian. So was the symbol for the Information Awareness Office, a pyramid with an eye on top surveying planet Earth. "In case anyone had any doubt about the program's intentions, the Web site bore the motto scientia est potentia, 'knowledge is power,' " Mr. Keefe writes. Hastily, the name was changed to Terrorism Information Awareness, but a suspicious Congress strangled the program in its cradle. That sounds like cause for celebration. But, as Mr. Keefe points out, that program might have noticed when $10,000 was wired to a Florida SunTrust bank account in the name of Mohamed Atta on July 19, 2000, or set off alarm bells when a dozen men, some of them on terrorist watch lists and others with lapsed visas, bought one-way tickets on flights departing at about the same time on Sept. 11, 2001. Mr. Keefe is a privacy agnostic. He does not know quite where to draw the line between legitimate national security concerns and the privacy rights of citizens. Somewhat feebly, he calls for vigorous debate on the issue. By temperament and by vocation, he loathes the secrecy culture of national spy agencies, but he has no patience with conspiracy theorists and idealists, like the German Green Party member who concluded in a European Union report on Echelon and its dangers that secret services cannot be controlled, and "must therefore be abolished." Mr. Keefe seems almost as nave, though, when he notes, in astonishment, that the National Security Agency does not publish a list of its employees, and that they are not allowed to write about their work in their diaries. Imagine that. In the end, Mr. Keefe allows everyone involved in the debate to have a say. He even gives equal time to a Defense Department official who tells him, bluntly, "the only people who think that intelligence wins wars - hot or cold - are intelligence people." So much for chatter. And you should see the phone bill. CHATTER Dispatches From the Secret World of Global Eavesdropping By Patrick Radden Keefe 300 pages. Random House. $24.95. ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From rah at shipwright.com Wed Mar 2 05:19:35 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 2 Mar 2005 08:19:35 -0500 Subject: Electronic Anklets Track Asylum Seekers in U.S. Message-ID: NPR : Legal Affairs Electronic Anklets Track Asylum Seekers in U.S. by Daniel Zwerdling Audio for this story will be available at approx. 10:00 a.m. ET Morning Edition, March 2, 2005 7 The Department of Homeland Security is experimenting with a controversial new method to keep better track of immigrants awaiting appeals on their applications to remain in the United States. It is requiring aliens in eight cities to wear electronic monitors 24 hours a day. The ankle bracelets are the same monitors that some rapists and other convicted criminals have to wear on parole. But the government's pilot project is putting monitors on aliens who have never been accused of a crime. So far, the Department of Homeland Security has put electronic monitors on more than 1,700 immigrants. Victor Cerda, director of Detention and Removal Operations at Homeland Security, says the anklets will help prevent tens of thousands of immigrants who are ordered to leave the country each year from "absconding" -- going into hiding to avoid deportation. But critics say Cerda and other Homeland Security officials have exaggerated the extent of the problem. They point to a Justice Department study that put much of the blame on immigration officials, saying they'd failed to keep adequate records to track illegal aliens. Another Take on Ankle Monitors Sarah Barry fled Liberia's civil war in the early 1990s. She's now awaiting a decision on her appeal of a government deportation order. Barry says she's glad to be able to wear an ankle monitor. Hear why: Hear Sarah Barry Alternatives to Anklets A three-year pilot program in New York City tested how supervision affected immigrants' rates of appearance in court and compliance with court rulings. The program found that supervision -- regular phone calls from program workers, reminders about court dates, referrals to legal representatives and other such measures -- is more cost effective than detention and almost doubles the rate of compliance. Read the Vera Institute of Justice Report on Community Supervision Related NPR Stories Feb. 9, 2005 Panel: U.S. Mistreats Asylum Seekers Nov. 23, 2004 Special Report: Jailed Immigrants Allege Abuse E-mail this Page archives transcripts stations shop about help Copyright 2005 NPR Terms of Use Permissions Privacy Policy More Legal Affairs Supreme Court Ends Death Penalty for Juveniles Federal Judge's Husband, Mother Murdered More ; More Politics & Society Supreme Court Ends Death Penalty for Juveniles Vermont State Official Asks Tough Questions on Iraq More ; More By Daniel Zwerdling Hudson Jail Disciplines Guards in Detainee Abuse Case Letters: Detainee Abuses, Cronkite on the Mike Todd Party More ; find your local member station: (or enter zip code) News Politics & Society Business People & Places Health & Science Books Music Arts & Culture Diversions Opinion Morning Edition All Things Considered Day to Day Talk of the Nation Fresh Air News & Notes with Ed Gordon Weekend Edition Saturday Weekend Edition Sunday Wait Wait...Don't Tell Me! Performance Today Motley Fool Radio More Programs Hourly Newscast Program Stream24-Hour schedule Audio Help Contact NPR Sponsor NPR Press Room Submit Ideas Corrections Ombudsman Get NPR Headlines via RSS Text-only -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Wed Mar 2 05:33:04 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 2 Mar 2005 08:33:04 -0500 Subject: William F. Buckley: Death of a comic Message-ID: Townhall.com Death of a comic William F. Buckley (back to web version) | Send March 1, 2005 If what was before the house was just the formal news bulletin, a famous person who had left Earth for other bournes, then OK, let him go with conventional solemnities. I once attended funeral services at which the rabbi didn't remember the name of the deceased, so that he mourned the passage of Priscilla, remarking the good she had left behind in her lifetime -- never mind that the lady who lay in the coffin was called Jane; never mind, the incantations were generic. But Hunter Thompson would never be confused with anyone else, and when his wife was led through the police cordon to his room, she reported to the press that "he did it (fired the .45-caliber pistol) in his mouth," leaving "his face beautiful. It was not grisly or gruesome by any means. He lived a beautiful life." He didn't. What he did do was inspire devotional encomiums from people who included blood relatives (my son), and superstar mentors (Tom Wolfe). Wolfe spoke first of his stylistic achievements. He wrote "in a style and a voice no one had ever heard before." And Wolfe found in Hunter's life an originality perversely appealing. It was "one long barbaric yawp, to use Whitman's term, of the drug-fueled freedom from and mockery of all conventional proprieties." What he wrote was "'gonzo.' He was sui generis." "In the l9th century Mark Twain was king of all the gonzo-writers. In the 20th century it was Hunter Thompson, whom I would nominate as the century's greatest comic writer in the English language." Writing in The New York Sun, John Avlon spoke of Thompson's determination "to puncture the pretenses of the powerful with ruthless humor, a loyalty to deeper truth, and a hatred of hypocrisy. Beneath what could be called amoral behavior there was in fact an inflexible moral code. The intensity of his writing unsentimentally highlighted the real stakes of this life." What deeper truths? Henry Allen of the Washington Post wrote that "People will forgive almost anything of writers who can astonish them and make them laugh." What was it, in Thompson, that we were forgiving? Is that question answered in Allen's sentence that "despite his rants about the onanistic squalor of journalism, (Thompson) had the bearing of an adventurer striding out to the very edges of madness and menace"? Laughable stuff? Thompson had a gift for vitriol. All -- everything -- was subsumed in his exercise of that art. Consider one entire paragraph on Richard Nixon. "For years I've regarded (Nixon's) very existence as a monument to all the rancid genes and broken chromosomes that corrupt the possibilities of the American Dream; he was a foul caricature of himself, a man with no soul, no inner convictions, with the integrity of a hyena and the style of a poison toad. I couldn't imagine him laughing at anything except maybe a paraplegic who wanted to vote Democratic but couldn't quite reach the lever on the voting machine." We were asked to believe (by the San Francisco Chronicle) that in reading Thompson we are reading the work of a hero of an entire generation of American students. Concerning that claim a little skepticism is surely in order. After all, an exhibitionist can be spectacular, and even lionized, in the Animal Houses. Hunter Thompson elicited the same kind of admiration one would feel for a streaker at Queen Victoria's funeral. Here is a passage from Thompson, in which he seeks amusement by recounting the end of a long day with a visiting British friend, identifying himself as "the journalist": The journalist is driving, ignoring his passenger (the visiting Brit), who is now nearly naked after taking off most of his clothing, which he holds out the window, trying to wind-wash the Mace out of it. His eyes are bright red and his face and chest are soaked with the beer he's been using to rinse the awful chemical off his flesh. The front of his woolen trousers is soaked with vomit; his body is racked with fits of coughing and wild choking sobs. The journalist rams the big car through traffic and into a spot in front of the terminal, then he reaches over to open the door on the passenger's side and shoves the Englishman out, snarling: 'Bug off, you worthless faggot! You twisted pig-(expletive deleted), all the way to Bowling Green, you scum-sucking foreign geek.' One can be sorry that Hunter Thompson died as he did, but not sorry, surely, that he stopped writing. William F. Buckley, Jr. is editor-at-large of National Review. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From hal at finney.org Wed Mar 2 10:40:39 2005 From: hal at finney.org (Hal Finney) Date: Wed, 2 Mar 2005 10:40:39 -0800 (PST) Subject: [FoRK] X.509 certificate collision via MD5 collisions (fwd from jeff@k2.com) Message-ID: <20050302184039.D20DE57EE6@finney.org> Eugen forwards from FoRK: > >Colliding X.509 Certificates version 1.0 > >1st March 2005 > >Arjen Lenstra, Xiaoyun Wang, and Benne de Weger > > > >http://eprint.iacr.org/2005/067 > > > >We announce a method for the construction of pairs of valid X.509 > >certificates in which the ?to be signed? parts form a collision for > >the MD5 hash function. As a result the issuer signatures in the > >certificates will be the same when the issuer uses MD5 as its hash > >function. The real news of the paper was the announcement that Wang's techniques will be revealed this May at Eurocrypt. I'm looking forward to finding out what the secret is! Presumably everyone will receive MD5 collision finding software at around that time. The cert collision is not a surprise, people anticipated this possibility shortly after the MD5 collisions were announced. And notice that Xiaoyun Wang was an author of this paper; she was of course the lead author on the original MD5 collision paper and presumably the originator of the technique for finding MD5 collisions. Using her technology it is straightforward to do this kind of thing. But no one else could have written this paper at this time. The only nontrivial part (given the remarkable ability to generate MD5 collisions) was arranging that both keys were valid RSA moduli with known factors. The did this by generating random bignums and trying to factor them. And keep in mind that her methods find random-ish collisions. They don't find matches to existing hashes, and (as far as we know) they don't find structured collisions as would be necessary to get two certs with different and plausible-sounding names in them. >From what I've read (mostly http://eprint.iacr.org/2004/264), the way these collisions are found is to start with analysis of the structure of the hash, and decide on an XOR difference between the two inputs. This implicitly makes certain assumptions about where and when carries and other nonlinearities will occur in the hash calculation. Then you do a search for inputs which match that pattern of carries and for which the pre-determined XOR difference yields an actual collision. This doesn't give you much ability to control the content of the two inputs that you create. Hal From jeff at k2.com Wed Mar 2 08:02:42 2005 From: jeff at k2.com (Jeffrey Kay) Date: Wed, 2 Mar 2005 11:02:42 -0500 Subject: [FoRK] X.509 certificate collision via MD5 collisions Message-ID: This is a pretty interesting paper -- worth reading. >Colliding X.509 Certificates version 1.0 >1st March 2005 >Arjen Lenstra, Xiaoyun Wang, and Benne de Weger > >http://eprint.iacr.org/2005/067 > >We announce a method for the construction of pairs of valid X.509 >certificates in which the ?to be signed? parts form a collision for >the MD5 hash function. As a result the issuer signatures in the >certificates will be the same when the issuer uses MD5 as its hash >function. It seems that the approach was to generate two RSA moduli that could be swapped but still produce the same MD5, hence the same signature. Another interesting question is whether, given an arbitrary modulus, another can be generated that produces the same MD5. It almost seems like the same problem to me, so I must be missing something here. The attack isn't on the public key itself since the factors necessary to generate the private key are still computationally hard to obtain but rather on the content of the certificate. The key assumption is that the certificate is signed by a third party signer, which supplies the public key for verification. Even as posed, this is a pretty scary paper. You could generate a certificate with your legitimate content in it (distinguished name, etc.), get that signed by a TTP and reuse that signature on another certificate with content in it that masqueraded as someone else. You could also conceivable just recode parts of the certificate (such as the length of issue) and be safe. Since you generated the pair of keys that causes this to happen, you could masquerade as anyone you wanted as long as you got your initial certificate signed. Pretty interesting attack. Computationally intense in some areas, but definitely a viable attack particularly against downloadable browser plug-ins. It reminds me of when Verisign signed a fraudulent Microsoft certificate; this attack makes that much more possible. This attack could end the usefulness of TTPs in many circumstances. -- jeff jeffrey kay weblog pgp key aim share files with me -- get shinkuro -- "first get your facts, then you can distort them at your leisure" -- mark twain "if the person in the next lane at the stoplight rolls up the window and locks the door, support their view of life by snarling at them" -- a biker's guide to life "if A equals success, then the formula is A equals X plus Y plus Z. X is work. Y is play. Z is keep your mouth shut." -- albert einstein _______________________________________________ FoRK mailing list http://xent.com/mailman/listinfo/fork ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From rah at shipwright.com Wed Mar 2 08:35:25 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 2 Mar 2005 11:35:25 -0500 Subject: 'Perfect storm' for new privacy laws? Message-ID: CNET News http://www.news.com/ 'Perfect storm' for new privacy laws? By Robert Lemos http://news.com.com/Perfect+storm+for+new+privacy+laws/2100-1029_3-5593225.html Story last modified Tue Mar 01 04:00:00 PST 2005 A series of security break-ins is kick-starting a political drive to reshape federal laws that dictate how companies protect personal information--and what they have to do if that data leaks out. What began with the leak of tens of thousands of records from data broker ChoicePoint earlier this month was quickly compounded by a series of rapid-fire incidents involving Bank of America, Science Applications International Corp., an online payroll services company and the T-Mobile Sidekick of hotel heiress Paris Hilton. That avalanche of high-profile breaches in the last month has captured the attention of a growing number of U.S. senators, mainly Democrats, who have called for new laws as a response. Sen. Arlen Specter has pledged to convene hearings in his Judiciary committee, often an initial step in the legislative process. An aide to the Pennsylvania Republican said Monday that a hearing is being scheduled and is expected to be held soon. News.context What's new: An avalanche of high-profile breaches in the last month has captured the attention of a growing number of U.S. lawmakers. Bottom line:Advocates hope it will spur greater regulation of the shadowy industry that creates digital dossiers on Americans. More stories on data theft "Ten days after the ChoicePoint breach of personal data involving between 145,000 and 500,000 people was revealed, today another breach of data was revealed, this time by loss," Sen. Dianne Feinstein, a California Democrat, said in response to Bank of America's admission that it had misplaced backup tapes containing 1.2 million customer records. "These two instances dramatize the need to take steps for the protection of an individual's personal data. The Congress needs to address it." At the federal level, privacy laws tend to be created erratically, spurred by one well-publicized emotional anecdote after another. Congress approved the Video Privacy Protection Act in 1988 after a newspaper published Supreme Court nominee Robert Bork's video rental records. The murder of actress Rebecca Schaeffer, whose killer found her address through DMV records, led to the Drivers Privacy Protection Act. Advocates of greater regulation are hoping the latest security breaches will be just as politically potent. "I don't think Congress can ignore what's happened," said Marc Rotenberg, executive director of the Electronic Privacy Information Center (EPIC) in Washington, D.C. "This may be the first mass disclosure of personal information that triggers congressional action." For ChoicePoint and similar data aggregators, including Acxiom and Westlaw (a research service operated by Thomson West), the recent breaches could hardly come at a worse time. The start of a new congressional session often leaves politicians casting about for new issues, and a pair of recent books has cast a critical light on the typically shadowy industry that creates digital dossiers on Americans. The price of ChoicePoint shares have plummeted about 15 percent, from a high of nearly $48 to around $40, since the scandal became public. Rival Acxiom's shares also have suffered, and a Westlaw "People-Find" service came under attack last week from Sen. Charles Schumer, Democrat of New York. An "Exxon Valdez of privacy"? "I don't think it's right to wait until there's an Exxon Valdez of privacy," Sen. Ron Wyden, a Democrat from Oregon, said nearly five years ago, back when Congress was more concerned with Web companies than data brokers. Now that kind of privacy disaster finally has arrived, at least according to congressional Democrats. One possible response from Congress would be an attempt to extend an existing federal law, the Fair Credit Reporting Act (FCRA), which deals with credit-reporting agencies such as Equifax, to cover data- aggregators like ChoicePoint and Acxiom. "Records that look a lot like credit reports--which is the basis of ChoicePoint and Acxiom's business model--have escaped regulation," EPIC's Rotenberg said. Democratic Sen. Bill Nelson of Florida is readying legislation to revise the FCRA, which Congress already altered last year. Earlier this month, Nelson wrote to the Federal Trade Commission to ask for its help in revising the FCRA "to reflect the modern information age, where consumer information can be transmitted and assembled electronically and cheaply" (PDF here). Data breaks High-profile breaches are finally waking lawmakers up to the need to make sure personal data is securely protected on computers. ChoicePoint Date: February 2005 Incident: Data collection company confirms that information from its consumer database has been stolen. At risk: Names, addresses and Social Security numbers of more than 150,000 Americans. Bank of America Date: February 2005 Incident: Bank loses backup tapes detailing the financial records of credit cards held by federal employees. At risk: More than 1.2 million records in SmartPay charge card program, which has annual transactions totaling more than $21 billion. PayMaxx Date: February 2005 Incident: Flaws in the online W-2 service of PayMaxx expose customers' payroll records. At risk: Discoverer of the flaws claims they affect more than 25,000 people. PayMaxx says only a small number of companies is involved. T-Mobile: Paris Hilton Date: February 2005 Incident: Information from heiress Paris Hilton's Sidekick is posted online. Breach comes amid reports that a flaw opens up T-Mobile voice mail. At risk: Phone numbers and e-mail addresses of celebrities such as Eminem and Lindsay Lohan. SAIC Date: February 2005 Incident: Desktop computers are stolen from the offices of Science Applications International Corp. At risk: Personal information of current and past stockholders in the government contractor. T-Mobile Date: January 2005 Incident: The carrier admitted that a hacker had gained access to customers' personal information. At risk: Names and Social Security numbers of 400 T-Mobile subscribers. George Mason University Date: January 2005 Incident: Attackers broke into a server that held details used on identity cards at the Virginia school. At risk: Names, photos and Social Security numbers of more than 30,000 students, faculty and staff. California Department of Social Services Date: October 2004 Incident: Breach of a researcher's computer at the University of California at Berkeley exposed personal data related to the state's In Home Support Services. At risk: Contact information and Social Security numbers of up to 1.4 million providers and clients. Another approach would be to borrow from the principles underlying a current California law. The Security Breach Information Act requires companies to disclose incidents in which a California resident's confidential information has been jeopardized. Feinstein introduced such a bill in Congress in June 2003, but without any luck so far. The bill's backers now hope that it will enjoy a wider appeal. Called the Notification of Risk to Personal Data Act, Feinstein's measure says that any corporation, government agency or person generally must provide a written or e-mailed notice if "unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person." State attorneys general would be authorized to file lawsuits against suspected violators. "The consumer data industry has been in the sights of proregulatory activists for some time now," said Jim Harper, director of information policy at the free-market Cato Institute. "And the ChoicePoint debacle could not have been a fatter, slower pitch across the plate." Harper is skeptical of federal proposals to create more regulations, saying that state laws tend to be more effective and have fewer loopholes. Instead, Harper advocates the use of tort law, under which private citizens can sue alleged wrongdoers for damages, to provide an incentive for data-marts to strengthen security. A California woman, Eileen Goldberg, did just that earlier this month in a suit she filed against ChoicePoint, with her claim that the company was negligent in protecting consumers from scam artists who purchased data from it. Not all privacy disasters result in federal legislation. In the case of Amy Boyer, a woman shot by a stalker who obtained her work address from an online investigation service, Sen. Judd Gregg, a New Hampshire Republican, responded by introducing a proposal called "Amy Boyer's Law." Gregg's legislation, which would have restricted the disclosure of Social Security numbers, eventually was attacked by both industry groups and by privacy advocates who said it didn't go far enough. It did not become law. Business lobbyists already are preparing for a defensive battle. "We're all concerned about data security, especially when you're talking about sensitive information getting out," said Michael Zaneis, director of congressional and public affairs at the U.S. Chamber of Commerce. "We want to make sure that we don't have any knee-jerk reactions leading to the passage of quick legislation with unintended consequences." Another wrinkle in the political landscape is the growing reliance of federal watchdogs, such as the Department of Homeland Security and the Department of Justice, on identity-verification services purchased from companies like ChoicePoint and Acxiom. That reliance may make the Bush administration less willing to embrace aggressive regulation in the area. ChoicePoint declined to comment for this article, citing pending litigation. However, in a statement posted to its site, the database company stressed that it has entered discussions with other members of its industry on how to minimize fraud, and has started re-verifying its customers' credentials to weed out potentially fraudulent applicants. "We have already begun sharing our experiences, observations and ideas with several of the other major corporations in our industry, and we will seek to lead an industrywide initiative to develop, adopt and deploy new measures that will identify and halt identity theft and fraud," ChoicePoint said in the statement. In addition, ChoicePoint offered support for a broader national debate that could include legislation to allow independent oversight and increased accountability of entities that handle data, increased penalties for the intentional misuse of personal information, and mandatory notification by government and business of any unauthorized access to personal data. California as precedent? The current atmosphere at a national level is similar to the state of affairs in California that led to the passage of the Security Breach Information Act (S.B. 1386)--the law that recently forced ChoicePoint to disclose the October breach. The ChoicePoint debacle could not have been a fatter, slower pitch across the plate. --Jim Harper, director of information policy, the Cato Institute In April 2002, a hacker gained access to the state's Stephen P. Teale Data Center, stealing the payroll information of California's more than 225,000 state employees, including legislators and their staff. The State Controller's office discovered the breach in early May, but didn't notify workers until May 25, leaving their financial identities open to misuse. Within four months, a bill authored by former state Sen. Stephen Peace and then-Assemblyman Joseph Simitian had been signed by Gov. Gray Davis. The bill took effect on July 1, 2003. Bank of America's recent admission that the company lost backup tapes with as many as 1.2 million records could have similar scope as the Teale breach, even though there is no evidence so far that the financial data has been misused. The tapes contained information on the customers and accounts of the U.S. government's SmartPay credit card program, which has more than a 2.1 million cardholders and annual transactions totaling more than $21 billion, according to the General Services Administration. "There is a good chance we'll see some new regulations, especially because the Bank of America incident hits closer to home--their (lawmakers') information was included on the tapes that were lost," said Jordana Beebe, communications director for the Privacy Rights Clearinghouse, a nonprofit consumer group. If the industry does not lock down people's data, whether by legislative mandate or by responding to customer concerns, business could suffer, said Chris Voice, chief technology officer at security company Entrust. "It is becoming a matter of survival from a business perspective that if your customers lose trust, they will go to someone who will guard their information better," Voice said. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Wed Mar 2 02:50:32 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 2 Mar 2005 11:50:32 +0100 Subject: OS X in a Classified Environment... (fwd from bryan.jones@m.cc.utah.edu) Message-ID: <20050302105032.GA13336@leitl.org> ----- Forwarded message from Bryan Jones ----- From jya at pipeline.com Wed Mar 2 12:35:27 2005 From: jya at pipeline.com (John Young) Date: Wed, 02 Mar 2005 12:35:27 -0800 Subject: [IP] Books -- The New Hows and Whys of Global Eavesdropping (fwd from dave@farber.net) In-Reply-To: <20050302123256.GP13336@leitl.org> Message-ID: Patrick Keefe is overly fond of disparaging "conspiracy" targets, among them John Gilmore, Duncan Campbell, Wayne Madsen, EPIC, EuroParl members, just about anyone who takes an balanced (!) view of governmental and corporate malfeasance. His book may not be TLA-sponsored but it could be read as an apology for the agencies, despite his avowal of concern for privacy in these days of overweening calls for more security. He repeats, and quotes other characters prattling, the formulaic mantra of how much privacy must be sacrificed for security, a sure sign that security will be favored and that privacy loss will be faux-regretfully mourned, a view mighty supportive of the TLAs. This tipping of the discourse toward more security at the loss of privacy appears to be the raison d'etre of the book -- not the only one since the security agencies went into a decline with the Cold War winddown, and then re-surged after 9/11 -- but his is the first to argue that Echelon and its new domestic offshoots may not be such a bad thing, both overseas and at home, and that a public debate about them is overdue. Keefe says of Cryptome: "The site is a good litmus test for your attachment to freedom of speech." He is not happy about excessiveness of any kind. From rah at shipwright.com Wed Mar 2 09:56:18 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 2 Mar 2005 12:56:18 -0500 Subject: Academics, artists back file-sharing firms before high court Message-ID: The Lexington Dispatch Article published Mar 2, 2005 Academics, artists back file-sharing firms before high court By ALEX VEIGA AP Business Writer Several major technology companies, consumer groups and academics want the U.S. Supreme Court to stay out of a long-running legal dispute between online file-sharing firms and the entertainment industry. Recording companies and Hollywood movie studios are appealing to the high court to reverse lower court decisions that absolved Grokster Inc. and StreamCast Networks of responsibility when their customers illegally swap songs and movies using their software. The tech firms and others argue that a court victory by the entertainment companies would stifle innovation in the technology sector. In briefs filed Tuesday, Grokster, StreamCast and their supporters urged the court not to reinterpret the legal doctrine it established in the 1984 Sony Betamax case. At the time, the court ruled that Sony's video recorder was legal because it had legitimate uses apart from making unauthorized copies of movies and television shows. The entertainment industry has asked the court to reconcile the 20-year-old ruling to protect copyright holders it says are hard-pressed to safeguard their intellectual property in today's digital and online world. But such a move is exactly what the file-sharing firms and their supporters hope to avoid. "A rule like this will make it almost impossible for anyone to innovate or create new products unless they have the blessing of the copyright holders," said Grokster attorney Michael Page during a conference call with reporters Tuesday. "And when the copyright holders also control the distribution systems, that blessing will not be forthcoming." A group of 17 computer science and engineering professors at nine universities, including Harold Abelson of the Massachusetts Institute of Technology, Edward W. Felten of Princeton and David J. Farber of Carnegie Mellon, stressed in their brief that they feared if the court sided with the entertainment companies it could chill technological progress in computers and the Internet. "If this court should announce a more restrictive rule, those who create the latest advances in technology will halt or significantly scale back their work, for fear of massive copyright infringement damages," the professors' brief asserts. Four consumer and public-interest groups also weighed in, arguing that any steps to change the Betamax doctrine would give Hollywood and other copyright owners the power to censor information technology that ultimately could benefit consumers. Entertainment companies "would turn this into a surveillance society in which every file is fingerprinted, every user is tagged, every transaction is monitored," said Mark Cooper, a spokesman for the Consumer Federation of America. Others who filed briefs in support of Grokster and StreamCast included a group of law professors, the National Association of Shareholder and Consumer Attorneys, the National Venture Capital Association, Creative Commons and trade groups representing technology companies such as Intel Corp., Verizon Communications Inc. and Apple Computer Inc. A brief by several telecom firms argues "only Congress has the constitutional mandate and institutional capacity to address peer-to-peer technology in a way that promotes the good and punishes the bad." Intel also submitted a separate brief, where it argues that any changes to the Sony Betamax decision would put the onus on it and other companies to "anticipate the potential uses of their innovations ..." and then redesign their technology to make sure it doesn't violate copyright laws. That "would stifle innovation and dramatically increase the cost of such technologies and of the consumer and enterprise products based on those technologies," the company argued. Several recording artists, conservative family groups, professional sports leagues, state attorneys general from 39 states, the U.S. government, university professors and online services that legally sell music or movies have filed briefs in support of the entertainment industry. The justices are scheduled to hear arguments in the case March 29. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Wed Mar 2 04:32:56 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 2 Mar 2005 13:32:56 +0100 Subject: [IP] Books -- The New Hows and Whys of Global Eavesdropping (fwd from dave@farber.net) Message-ID: <20050302123256.GP13336@leitl.org> ----- Forwarded message from David Farber ----- From camera_lumina at hotmail.com Wed Mar 2 12:04:33 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 02 Mar 2005 15:04:33 -0500 Subject: [IP] Books -- The New Hows and Whys of Global Eavesdropping (fwd from dave@farber.net) In-Reply-To: Message-ID: >Keefe says of Cryptome: "The site is a good litmus test >for your attachment to freedom of speech." He is not happy about >excessiveness of any kind. "Attachment to freedom of speech"? 'NK'. -TD From eugen at leitl.org Wed Mar 2 08:05:30 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 2 Mar 2005 17:05:30 +0100 Subject: [FoRK] X.509 certificate collision via MD5 collisions (fwd from jeff@k2.com) Message-ID: <20050302160529.GV13336@leitl.org> ----- Forwarded message from Jeffrey Kay ----- From rah at shipwright.com Wed Mar 2 14:25:04 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Wed, 2 Mar 2005 17:25:04 -0500 Subject: China charges U.S. monopolizes the Internet, seeks global control Message-ID: World Tribune.com China charges U.S. monopolizes the Internet, seeks global control Special to World Tribune.com EAST-ASIA-INTEL.COMWednesday, March 2, 2005 China's ambassador to the United Nations last week called for international controls on the Internet. Chinese Ambassador Sha Zukang told a UN conference that controls should be multilateral, transparent and democratic, with the full involvement of governments, the private sector, civil society and international organizations. "It should ensure an equitable distribution of resources, facilitate access for all and ensure a stable and secure functioning," he said at the conference on Internet governance. Sha said China opposes the "monopolization" of the Internet by one state, a reference to the Untied States, which ultimately controls the digital medium. "It is of crucial importance to conduct research on establishing a multilateral governance mechanism that is more rational and just and more conducive to the Internet development in a direction of stable, secure and responsible functioning and more conducive to the continuous technological innovation," he said. China's communist government fears the Internet would dilute Beijing's control over its population, as information passes unfiltered throughout the country and outside of strict government censorship. China strictly prohibits any public criticism of the ruling communist party and closely monitors and censors Internet usage. Periodically, Chinese security forces raid Internet cafes and arrest people who violate Chinese rules. Sha said China has 94 million Internet users out of a worldwide total of about 810 million. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From odlyzko at dtc.umn.edu Wed Mar 2 21:20:58 2005 From: odlyzko at dtc.umn.edu (Andrew Odlyzko) Date: Wed, 2 Mar 2005 23:20:58 -0600 (CST) Subject: FYI: paper about Metcalfe's Law Message-ID: Dear Colleagues, Sorry for the spam, but I thought you might be interested in the paper described below. Comments are invited. Andrew A refutation of Metcalfe's Law and a better estimate for the value of networks and network interconnections Andrew Odlyzko Digital Technology Center University of Minnesota odlyzko at umn.edu Benjamin Tilly ben_tilly at operamail.com Abstract Metcalfe's Law states that the value of a communications network is proportional to the square of the size of the network. It is widely accepted and frequently cited. However, there are several arguments that this rule is a significant overestimate. (Therefore Reed's Law is even more of an overestimate, since it says that the value of a network grows exponentially, in the mathematical sense, in network size.) This note presents several quantitative arguments that suggest the value of a general communication network of size n grows like n*log(n). This growth rate is faster than the linear growth, of order n, that, according to Sarnoff's Law, governs the value of a broadcast network. On the other hand, it is much slower than the quadratic growth of Metcalfe's Law, and helps explain the failure of the dot-com and telecom booms, as well as why network interconnection (such as peering on the Internet) remains a controversial issue. FULL PAPER AT: http://www.dtc.umn.edu/~odlyzko/doc/metcalfe.pdf --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Thu Mar 3 05:55:57 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 3 Mar 2005 08:55:57 -0500 Subject: FYI: paper about Metcalfe's Law Message-ID: --- begin forwarded text From bbrow07 at students.bbk.ac.uk Thu Mar 3 03:52:59 2005 From: bbrow07 at students.bbk.ac.uk (ken) Date: Thu, 03 Mar 2005 11:52:59 +0000 Subject: How to Stop Junk E-Mail: Charge for the Stamp In-Reply-To: <421366D1.9010802@systemics.com> References: <421366D1.9010802@systemics.com> Message-ID: <4226FA9B.10606@students.bbk.ac.uk> > My view - as controversial as ever - is that the problem > is unfixable, and mail will eventually fade away. That > which will take its place is p2p / IM / chat / SMS based. Which are easier to spam and less secure than smtp. SMTP is p2p by definition, though you can use servers if you want. SMS *IS* email , just a different kind of email - and a less secure, more expensive kind, in which the infrastructure is more in the hands of the large companies that run it and less accessible to users installing their own protections. > In that world, it is still reasonable to build ones own IM > system for the needs of ones own community, and not > to have to worry about standards. Which means one can > build in the defences that are needed, when they are > needed. as we can for smtp > Chat is already higher volume (I read somewhere) in > raw quantity of messages sent than email. I suspect you don't get much traffic. The beauty of a non-real-time store-and-forward system like smtp (or SMS, or oldstyle conferencing systems with off-line readers) is precisely that it can be automated. I don't have to see mail I don't want. > A fate for email is that as spam grows to take over more > of the share of the shrinking pie, but consumes more of > the bandwidth A higher proportion of the snail-mail I get is junk than the email. In fact almost all of it is (& most of what isn't is bills :-( - usually already paid by the bank) I throw more than half of my incoming paper mail in the bin unopened, and about half of what is left is just put in a cupboard in case I get into some dispute tithe the bank or the electric company or whoever. A higher proportion of the landline phone calls I get are junk. At least 4 out of 5 calls, maybe 9 out of 10. Email is doing quite well. > the ISPs will start to charge people for > email, and not for IM. Why should they charge more for qa service which is not only cheaper for them to run, but has more competition and is harder to subvert? A serious proportion of the rootkits and so on that have been plaguing us for the last few years involves chat & instant messaging & so on. I'd block it at the boundary firewall. People who use it should just learn how to use mail. They'd get through more. Chat is for functional illiterates. Learn to read at adult speed and you'll prefer mail. Why should they put up with being limited to someone else's typing speed? From measl at mfn.org Thu Mar 3 11:42:37 2005 From: measl at mfn.org (J.A. Terranson) Date: Thu, 3 Mar 2005 13:42:37 -0600 (CST) Subject: I'll show you mine if you show me, er, mine In-Reply-To: References: Message-ID: <20050303134137.U34565@ubzr.zsa.bet> On Thu, 24 Feb 2005, Peter Gutmann wrote: > (Either this is a really bad idea or the details have been mangled by the > Register). No, it's just a really bad idea. A small group of us looked at this a few weeks ago when it was announced, and while none of us are professional cryptographers, we all thought this was just, well, silly. -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF "Quadriplegics think before they write stupid pointless shit...because they have to type everything with their noses." http://www.tshirthell.com/ From kmself at ix.netcom.com Thu Mar 3 14:24:55 2005 From: kmself at ix.netcom.com (Karsten M. Self) Date: Thu, 3 Mar 2005 14:24:55 -0800 Subject: [linux-elitists] Re: MCI boots send-safe (Register) -- adds a Message-ID: net of 11 more spam hosts User-Agent: Mutt/1.5.6+20040907i on Thu, Mar 03, 2005 at 12:05:48PM -0500, Aaron Sherman (ajs at ajs.com) wrote: > On Wed, 2005-03-02 at 23:52, Karsten M. Self wrote: > > on Wed, Mar 02, 2005 at 06:16:38PM -0500, Aaron Sherman (ajs at ajs.com) wrote: > > > > Ok, I won't speak for Nick, but here's why I get all flustered about > > > this kind of thing: I have this nervous tick that forces me to imagine > > > how every "victory" in the war against X (drugs, spam, terrorism, you > > > name it) will, in turn, be used against me in future. > > > [...] > > I believe in a _balance_ of powers, a weighting on _merits_, and an > > avoidance of _extremes_. Large low-entropy pools are inherently > > dangerous. > > Interesting. I would not have thought to phrase it that way, but it's a > fair point. Thank you. > > _Those_ are the particulars of _this_ case. > > Yep, and I'm glad they've been booted, and I was over-reacting as a > result of a mis-reading. However, I defend the reaction in that, had the > root servers (or some subset) taken such unilateral action, I think it > would have been wildly inappropriate and would have set a frightening > precedent. The root servers situation is interesting and unclear. I haven't been referring to it. That said: if someone thumbs their nose at the world sufficiently long and hard, they shouldn't be too suprised to find the world thumbing back. Unconstrained, this does lead to breakdowns and opportunities for abuse (Joe-jobs, reputation trashing). I can't deny feeling a sense of karmic justice, however. > I know you may have come away from the previous discussion with the > sense that I have a desire to defend send-safe, but I assure you that > nothing could be farther from the truth. My feeling on the MCI policy > issue is that, worst-case, they should have amended their rules, > refunded send-safe's money and terminated the contract long ago. s/refunded.*money// ...particulary in the face of an AUP denying network abuse, spamming, etc. Send-safe were likely skating under the rules and were taking an overt business risk in doing so. > I do want to point out, though, that this means financial hardship for > MCI, ...my heart bleeds.... > which implies that some other company is going to be able to step > in to this market and make money by supporting the send-safes of the > world... get ready for the next phase of spam growth: the large, > international corporation that owns several ISPs and is entirely willing > to mix large pools of legitimate users, servers and networks in with > their spam services. Welcome to 1999, Aaron. Large ISPs have been doing this for years. Its one of the direct motives behind SPEWS. While emission-specific blocklists (SBL/XBL, SpamCop, etc.) track spam by source: SPEWS maintains a list of known spam sources and spam friendly hosts so that e-mail can be rejected from these problem sites. http://www.spews.org/ Track NANAE for a week and you'll see a litany of sob stories: "my IP is blocked by SPEWS, please delist me". No, your _hosting provider_ is listed by SPEWS. _They_ need to clean up their act. > You're going to NEED a real reputation system sometime soon, or spam > WILL become even more unmanageable than it is today. If you think IPV4 is bad, try IPV6. That's among the reasons I'm strongly promoting ASN/CIDR tracking: IPV6 aggregates that much more. Still, it's going to be problematic. There's the corrolary aspect that ever more traffic is going to be IP based. Currently it's email, web services, chat, and the like. Moving forward, it's going to be phone, IM, SMS, and more. What do you think the mean time between rings for, say, a high-score socioeconomic class areacode (202, 212, 415, 650, 312, 818) will be where long distance is free and Choicepoint household data floats freely on the Dark Net? And you _don't_ have realtime content/context data to filter in realtime audio. As for reputation systems: yeah, look at Senderbase / Iron Mountain. I see big things for them, particularly if they've got _any_ brains. > > > What if the complaints start originating from the MPAA or the US > > > government or the IMF or spammers? > > > > I don't particularly care where a complaint originates from. I _do_ > > care that the complaint is legitimate and valid. > > Also fair. I wonder though who writes the spec on those two terms? How about we judge based on community outrage ;-) > > > We're forcing them to evolve or die... what happens when that > > > evolution involves buying a very large ISP? Do we shut off half > > > the world or come up with a better plan? > > > > Do you connect your sewer mains to your spigots or your drains, > > Aaron? That's really a no-brainer. > > > So yes: if a large portion of the Net turns black, well, it turns > > black more ways than one. > > Your points about ASN/CIDR identification are good, but this last > statement bothers me. Plus, IPs are a poor metric. As we all know they > are ephemeral. I've had this discussion in the past week. IP ownership is ephemeral, particularly in dialup / dynamic access. ASN assignment is markedly less so, though they also change over time. What's markedly _less_ ephemeral are private blocklists. Remember, the public DNSBLs are just the visible tip of the iceberg. Private, site-specific lists, and dark lists, passed among friends and associates, but not made generally public, are legion. I used one such, with 65K+ domains, as part of my web content filtering for a youth center tech lab. Getting on and off public DNSBLs is _relatively_ sane. The lists have to be accountable to their users, and not violate either stated policy or useful effects too greatly, or they lose following. Within a private site, both usage patterns and propriety mean that once on, getting off a list is at best iffy. The result is that network abuse leads to a continuous erosion of useful IPs. Rotating abusive activity through a large block merely accelerates that process *and* provides a useful behavioral pattern identifying black-hat providers. > We *NEED* a reputation system that's based on strong encryption. Encryption without authentication _and_ reputation data is useless. The response time of such a system may be infeasible. And systems with weak authentication may work well: honeypots, web content, and other abuse monitors identifying specific IPs of interest. A watch that extends to a sensible range (say, a /24 initially, broader based on other heuristics). Local management of such lists means that defenses are continuously adapted to conditions. Hardwired whitelists for criticial contacts to avoid friendly fire losses. Hard-fail conditions to provide feedback to those who are inadvertantly blocked. It's not an ideal system. It's probably a 95% solution. And it doesn't rely on encryption at all. Sure: encryption and PKI are useful. I use and advocate their use. Uptake remains limited. And in large-volume processing, it's expensive. That said: opportunistic authentication _should_ be used and favored where it exists. > We have all of the tools (SMTP/TLS + CAs + DNS), we just need a single > protocol that at least a few large players agree to use that connects > them. Once that's in place, we could END spam. Yeah, sure. You want to split the profits? Since when do you trust CAs to identify nonspammers? What's this protocol you're talking about? How does it extend past email to _other_ forms of abuse? I see a handwave and "Profit!". I don't see a workable system yet. Care to expand? > Sure, there would be trade in stolen keys, but a decent system would > adapt (via the same mechanisms as DNSBLs) and repair quickly enough > that using a key would result in a return on investment insufficient > to warrant the effort in stealing it. Y'know, key repudiation _remains_ one of the weak points of current PKI. And the number of SSL sites lacking valid, authoritative, or other than non-self-signed keys is large. Plus the whole level of intermediation through browsers leads to _many_ user education issues. > New players who want to establish a rep would have to be "introduced" or > suffer most of their mail being black-holed until a sufficient > reputation had been established (perhaps years) How long does it take you to make friends? How long does it take you to _really_ trust someone? If there's such a reputation system, I'd like it to offer two features: - Love at first sight: the ability to decide, quickly, that yes, you pretty much do trust someone rather highly. - Disowning: Ok, so you've changed your mind (or have sufficient experience that you really ought to) about this relationship. Can you get a divorce? When I designed the K5 moderation and mojo systems, I built in two features: - Moderation should quickly reflect initial experiences. The first moderation counts most. Subsequent mods _can_ change the overall score, but it takes a lot of 'em to do much shifting. After a time, the message moderation tends to stabilize. - Mojo should weight recent activity. If someone's been long-term trustworthy, but suddenly gets all wiggly, three-year-old rep _really_ shouldn't count that much. > but let's face it: if you're deploying your own mail server then one > of the following is going to be true: > > * Your up-stream ISP approves and will vouch for you as a customer > who is under certain contractual obligations (not a guarantee of > validity, but a starting point) > * You know someone who trusts you and is willing to sign your key > (risking their own reputation). > * You are sending to a fair number of specific individuals who > will white-list you, slowly building your reputation. Under the scheme I envision, your relationship _largely_ is of concern to those with whom you're doing business. Basically: behave yourself the first time you come around. Eventually, you'll be considered a member of the family. Or at least given a neighborly greeting. Fortunately, most spammers currently exhibit such flagrant disregard for _any_ social niceties that you can write them off quickly. > Built properly, such a system would account for differing "opinions" > (e.g. many small businessmen in Russia seem to trust each other, even > though the rest of the world thinks they're evil... that's fine, they > have their view, we have ours). This is easily accomplished by doing > roughly what DNSBLs do: centering each origin of trust on a domain name, > and allowing any domain name to originate a new root of trust at any > time. Sounds complicated and my brain's not wrapping around this well ATM. There is the fundamental problem of trust transitivity. OTOH, if you use a weighting system in which you simply _correlate_ others' opinions with your own, you don't have to worry about agreement, you only need concern yourself with predictive value. That chap with whom you have _no_ common tastes is a perfect predictor: corrolation is -1. The useless data is the person with whom you're aligned half the time, corrolation 0. Authentication here is useful in that you're reasonably assured that the reputation is the one you think it is. Beyond that, you don't really need to trust it. > Nice things about this system are: the SPF problem goes away. You don't > care who initially started the chain, only who delivered it to your > front door. They have the power to vouch for bad-guys, but it will nuke > their rep. Your own relays would have a level of trust that puts your > central delivery host into a slave mode, so no reputation updates would > be performed (preventing your central MTA from harming your relay's > reputation when it passes you spam, and also reducing overhead). Right. I think I get at this somewhat more trivially with a proportionate rejection scheme: - Accept the first mail from a new source. - Rank that mail for spamminess. - Rinse, wash, repeat for some reasonable sample, over some aggregated netblock. You're going to find you're getting some proportion of spam vs. ham for that block. - Toss in curves for behavior: is the peer doing a dictionary attack on your space? Do they ignore temporary rejects, or not follow traditional retry intervals? Score goes down. - Based on the ratio of spam/ham coming from the site, at whatever granularity gives you a good statistical sample, say 10-30 datapoints per defined time period, where a week to a month should be more than sufficient, issue your own randomly assigned accept / reject responses. - Season to taste. > This might be rocket science, but it's not HARD rocket science. To the contrary, it's cooking with spam. Peace. -- Karsten M. Self http://kmself.home.netcom.com/ What Part of "Gestalt" don't you understand? A guide to GNU/Linux backups: http://kmself.home.netcom.com/Linux/FAQs/backups.html _______________________________________________ linux-elitists http://zgp.org/mailman/listinfo/linux-elitists ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From pcw at flyzone.com Thu Mar 3 13:05:44 2005 From: pcw at flyzone.com (Peter Wayner) Date: Thu, 3 Mar 2005 16:05:44 -0500 Subject: bounty for errors in _Translucent Databases_ Message-ID: To: All readers of Translucent Databases. I'm starting work on the second edition of _Translucent Databases_. To help eliminate errors, I'm quadrupling the bounty for error reports to $20 per error. I may also pay for suggestions for improving it, but that's harder to codify. For info on the book, see this website: http://www.wayner.org/books/td/ The only rules are designed to prevent people from using this offer to print money: only the first person to report each error gets $20. I reserve the right to relax this rule to pay multiple people who don't seem to be colluding. I get to decide what constitutes an technical error and how big an error might be. For instance, if I screwed up and listing pi=3.41592..., I get to decide that this is only one error. It's not an infinite set of errors because the first digit after the decimal point is not 4, the second digit is not 1, the third digit is not 5, etc. Also, non-technical errors don't qualify, although I'm grateful to get them. To see previously reported errors: http://www.wayner.org/books/td/errors.php I promise to try to apply these rules as generously as possible. -Peter --- end forwarded text -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Thu Mar 3 13:12:45 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 3 Mar 2005 16:12:45 -0500 Subject: Build your TV! Message-ID: San Francisco Bay Guardian News THE SAN FRANCISCO BAY Mar. 2 - Mar. 8, 2005* Vol. 39, No. 22 Build your TV! As the FCC and the entertainment biz get ready to end home recording as we know it, a bunch of radical geeks are working on a solution or two. By Annalee Newitz 'ALL I WANT is to make a high-definition copy of Buffy the Vampire Slayer, save it on a DVD, and loan it to my friend," says Sarah Brydon, looking up from a long table covered with half-built computers. These sound like the words of a science fiction nerd, not a revolutionary. But Brydon is a new breed of protester - and she's expressing her discontent with the U.S. government by building a television. She's one of a dozen consumer activists who have gathered on a Saturday morning in late January for a high-definition television "Build-In" at the Mission District office of the Electronic Frontier Foundation (where I work). Part computer hardware nerdfest, part hell-raising political action, the Build-In is a high-tech protest of a new Federal Communications Commission regulation called the "Broadcast Flag." According to the FCC, the flag is going to ease the nation's transition from today's analog televisions to tomorrow's high-definition televisions. What exactly does it mean for a government agency to "ease" the transition from one kind of TV signal to another? In this case, it seems to mean making the entertainment industry feel very warm and fuzzy inside. The Broadcast Flag is designed - poorly - to stop people from putting high-quality recordings of TV shows on popular file-sharing networks like BitTorrent. In reality, it will give the government an unprecedented amount of control over what we do in our own homes with recordings of HDTV. The flag is supposed to stop mass copying and infringement, but it will also stop most consumers from perfectly legal activities like saving HD copies of shows for personal use. Past generations of media activists protested government and industry control of TV content. They battled FCC censorship, denounced market grabs by massive content conglomerates like News Corp., whose bland, mainstream programming turned a diverse media landscape into The O'Reilly Factor and 7th Heaven reruns. Those activists nourished independent TV content on local cable access channels, where they could talk openly about radical politics or get naked on a whim. Now the Broadcast Flag has alerted a new group of media guerrillas to another way in which government and industry control pop culture: by locking down the devices that receive, copy, and remix broadcast signals. And these activists are responding by building independent technologies that don't bend to the will of the FCC or MGM. The televisions created at the Build-In are also computers, and they contain a TiVo-like device called a personal video recorder (PVR) - you can use them to pause a show, record it, sample it, and even save a copy to DVD. Using the TV she builds today, Brydon won't have any trouble loaning her friend a copy of Buffy. The television liberation front By noon every surface in the EFF office is covered with computer guts: multicolored ethernet cables lie in snarled piles all over the floor, hard drives occupy precarious positions near half-eaten bagels, TV antennae poke into the air, and exposed circuit boards are tenuously connected to monitors whose output isn't always good. These TVs are going to rock, but getting the software running perfectly is a pain in the ass. Celebrated consumer gadget blogger Phillip Torrone is bouncing around the room, interviewing everybody with his iPod for a Podcast about building televisions. He's flown down from Seattle just for the Build-In. "Tell me about this machine!" he says excitedly, thrusting the little white device at audiovisual geek Gregor Menasian, who has packed the last bit of open space with a computer full of extremely sweet components: quiet fan, capacious hard drive, fast CPU. As the two of them talk, EFF special projects coordinator and attorney Wendy Seltzer snaps photos of an error message on Menasian's monitor. Seltzer, who helped organize the Build-In, wants to be sure that accurate reports of glitches go to the hackers who wrote the software everybody's using today to turn their computers into HDTVs with built-in PVRs. Called MythTV, it's named for the "mythical convergence box" gadget-crazy futurists often predict will finally combine TVs, DVD players, Web browsing, and stereos in one simple machine. What has galvanized this group - made up of TV fans, civil liberties activists, and politically minded hackers - is outrage at what the Broadcast Flag will do to the future of innovative, crazy-dream devices like MythTV. After the mandate goes into effect July 1, it will be illegal for anyone in the United States to manufacture a device that records high-definition television unless it's built to obey a special signal - the flag - emitted by stations broadcasting HD shows. The flag will tell PVRs and other equipment whether they're allowed to copy a show onto some other medium, like a DVD. In short, broadcasters and content owners will actually be able to control your recording habits. Let's say, for example, that it's a couple of years from now, and your TiVo (bought anytime after July 1 of this year) has recorded the excellent Marx brothers movie Animal Crackers, which was just broadcast on TNT in HD. Tomorrow you're getting on a plane to Australia, and you'd like to save a copy on DVD to watch on your computer during the 15-hour flight. You're entitled to make a personal copy under federal copyright law, so it should be no problem. And in fact, it was no problem back in the days of analog broadcasts and VCRs. But with the Broadcast Flag in place, TNT can send out a signal that tells your TiVo not to make HD copies of Animal Crackers. So when you burn that DVD and put it into your computer somewhere over the Pacific, you get a bunch of garbage. The FCC has just stolen your rights. Think of it this way: if the Broadcast Flag applied to VCRs, it would, in effect, allow you to tape shows but not necessarily take the tape out of the VCR. And you'd likely be forced to erase your show in order to tape the next thing. Certainly there may be broadcasting companies that refuse to send out the flag, or that send out a flag saying "go right ahead and copy this." But a company like Paramount, which owns the rights to Star Trek, is unlikely to allow them to do so, for fear that letting people make copies will undercut its ability to sell syndication rights to Spike TV and UPN. Networks like CBS aren't going to want to let their shows out of the box either - they don't want to lose control of their intellectual property. For years we've taken for granted our ability to record television programs to enjoy weeks or even years later. Now that we have a chance to get extremely high-quality, HD broadcasts, the FCC is trying to take our HD media libraries away from us. Why would it do this, especially given that it has received absolutely no mandate from Congress? Basically, the agency succumbed to pressure from Hollywood. Entertainment companies figure that as long as the copies available online are of a lower quality than what's on TV, the broadcasters have a leg up on downloaders. But instead of relying on the law to stop people from infringing copyrights, these companies lobbied the FCC to take control of the marketplace and force vendors to sell machines that make all forms of copying effectively impossible. If your super-excellent HD copy of CSI can't get out of the TiVo box, then you can't stick it online and break the law. Too bad you can't do what the law permits either. Even more disturbing, the Broadcast Flag mandates that recording devices be "robust against user modification." In plain language, that means consumers can't repair, tinker with, or optimize their own machines. What's more, it will also become impossible for small, upstart technology companies to break into the consumer electronics market for TV recorders. If they can't take apart the devices that output the HD signal, they can't build cool new devices to play with that signal. Which also means that the devices people are using at today's Build-In will be illegal in four months. The government-entertainment industrial complex "I don't care about TV, and I don't watch it," says Build-In organizer Seltzer, who's been fine-tuning her MythTV box for several months, coaxing better and better performance out of it. "I'm concerned with the Broadcast Flag because it could be the first step in a new kind of technology regulation" - a precedent-setting moment in which one government agency takes control of the high-tech marketplace, allowing only certain companies to manufacture devices outputting the HD signal. It seems a dangerous direction to be heading in. For now, consumers may not realize the immense impact of the Broadcast Flag - the big content owners and the FCC are being pretty foxy about it. Even after the Broadcast Flag goes into effect, you'll still be able to make low-quality copies with your VCR. Most televisions are still receiving and outputting analog signals. The full impact of the flag won't be felt for several years, when most broadcasts are in HD and most people have chucked their VCRs. Suddenly you'll find out that the DVD player you bought last year can't play HD programs you burned from your new TiVo. Sound confusing or hard to imagine? That's precisely the point - the FCC is counting on your not being able to figure it out until it's much too late. Over the next decade, HD is going to become the standard signal - most new TVs will be able to tune it, and free-to-air networks like ABC, CBS, and Fox are going to move to HD broadcasting. So will cable. Most networks already make some shows available in HD - CSI, most sports events, some PBS shows, like The Desert Speaks. If your current TV receives HD, you'll know it - the quality is so much better it's almost scary. A traditional analog TV creates its picture out of 480 interlaced lines on your screen, while a typical HDTV creates the same picture using 1,080 interlaced lines. Those extra lines mean more detail, more intense color, and an eerie sense that the picture on your screen is literally the same quality you'd get if you were watching something with your own eyes. The FCC is acting now to shut down what you can do with this amazing quality because once consumers have something (the way they've long had VCRs that record TV), it's harder to take it away. As long as what's being taken away is something "in the future," it's hard to feel like you're losing. But of course you are. For a perfect example of how you'll feel this loss, consider the DVD player. Ever wonder why there have been no new nifty gadgets you can use with your DVD player for at least 10 years? Seems strange, doesn't it? I mean, think of how many new hoozits and zoomies have been invented for your computer in the past decade. Given the rate of invention in this country, shouldn't DVDs be making breakfast for you by now? There's one simple reason they aren't. A coalition of companies from the entertainment, consumer electronics, and computer industries got together in 1999 and formed a group called the DVD Copy Control Association, which enforces a strict standard on all devices that can play DVDs. Anyone who develops such a product must comply with the CCA's standards, which include forcing it to place copy protections on any copies made of a DVD. Those protections mean you can only play the DVD in "approved" devices, such as a Sony DVD player or a Microsoft Media Player. It means you can't run the DVD through a mixing board to make a video collage, or create a tiny digital copy of it to play in your cell phone when you're bored on the bus. Just a few weeks ago, a company called Kaleidescape was sued by the CCA for having the audacity to invent something it called a DVD jukebox - a cool device that could hold dozens of movies ripped from DVDs and output them to as many TVs or computers as the user liked. It was sort of like an iPod for movies, except several people could watch the movies in the same house at the same time if they wanted. At $27,000, the DVD jukebox is a very high-end toy. Kaleidescape execs say it's ideal for somebody who wants to make his or her DVD collection available to people in multiple rooms all over a large house (like, say, Steve Jobs's). CCA sued Kaleidescape on the grounds that the jukebox promoted piracy, despite the fact that the recordings in it were made from legitimately purchased DVDs and that copies couldn't be removed for distribution elsewhere. The industry group wanted Kaleidescape to rebuild it so that viewers had to insert the DVD they were watching to prove they actually owned it. Of course, that would defeat the whole purpose of a jukebox. It would be nothing more than a very expensive DVD player. And that pretty much sums up why the DVD player you bought in 1995 isn't much different from the one you'll buy tomorrow. This is a situation that sucks for the consumer and sucks for the small-business owner or innovator who wants to bring his or her ideas to market. The Broadcast Flag will create a cartel similar to the CCA, only this time the government will be directly involved. Instead of the CCA launching a civil suit against somebody for making a noncompliant device, under the Broadcast Flag the government will be able to fine that person or stop him or her from selling the product. This will allow big media companies like MGM, Sony, and Paramount to get what they want - total control of how you watch television - without having to get their hands dirty. Already, small-business owners like Jack Kelliher - who runs a tiny computer hobbyist company called pcHDTV - are being forced to change their business strategies to survive the flag. A longtime hardware hacker and entrepreneur, Kelliher sells a computer component called a PC card that lets computers tune in HD signals like a television (people at the Build-In used his cards to turn their computers into TVs). "We wanted to do something for hobbyists who wanted to build their own HD systems," he tells me by phone from his office in Utah. "But then the FCC did their embargo, and the rule means we can't offer the product next year." He and his partners are scrambling to come up with other (legal) products to sell next year, in order to make ends meet. Among other things, they're creating a computer card that will receive TV signals and output them to analog devices that aren't affected by the Broadcast Flag. "This whole thing bothers me because I come from an era when we built radios in high school and stuff like that," Kelliher says. "Being able to build your own TV seems really American to me. It's sad that the government wants to halt innovation - it's just un-American." Another innovator whose brainchild will be seriously affected by the flag is Isaac Richards, the Ohio-based lead developer of MythTV, the program the Build-In participants are using to make their computers act like PVRs. MythTV interacts with a PC card like Kelliher's, then displays TV shows on your monitor. It also records and stores shows, movies, and music, and it can even be set up to display the weather for your area (scraped from the Weather Channel) and bring you the latest news from your favorite blogs. It's not much different from TiVo - except that it's free and it isn't authorized by the FCC. Like many inventors, Richards started his project because he wasn't satisfied with what was commercially available. "I wanted a TiVo, but it was limited," he says. "And the concept was simple: you just record TV and play it back." Since Richards released the first version of MythTV on the Net two years ago, the program has become quite popular: nearly 100,000 people downloaded the last release. And part of what makes MythTV such a seductive package is the fact that it's entirely open: anyone can add to it. It's the diametrical opposite of a DVD player, whose every element must be reviewed and approved by an industry cartel. In general, people are using MythTV to watch analog TV. But when HD becomes the standard, MythTV's development may face stagnation. As analog becomes an obsolete format, MythTV will also become obsolete. People can build their own analog TVs, but they won't be able to build their own HDTVs. And thus there's no chance an upstart young innovator like Richards will ever create a bigger, badder, cooler PVR for HDTV the way he did with MythTV for analog. Looked at from this perspective, the Broadcast Flag isn't really a deterrent against piracy so much as a deterrent against the big consumer electronics companies losing market share to little guys with big ideas. As long as it's illegal for people like Richards to tinker around with HD components, nobody will ever invent something better than TiVo or Media Player. It simply won't be possible to create new HD-related toys without a fleet of expensive lawyers in tow. The Broadcast Flag is an unholy alliance of government, big entertainment, and big electronics. Each is protecting the others' interests so that they can maintain control over the marketplace. The only losers in the deal are small entrepreneurs and consumers. Geeks and librarians unite Hope is not lost - at least, not yet. Several public interest groups, including Washington, D.C.-based Public Knowledge and the EFF, as well as the American Library Association, are fighting the Broadcast Flag tooth and nail. Librarians worry that limiting devices that can output HD may interfere with future methods for distance learning and archiving. Public Knowledge is concerned with the bigger picture. As executive director Gigi Sohn puts it, "People who want to make fair use of copyrighted materials won't be able to do it." In other words, no personal copy of Animal Crackers to make the flight to Australia less arduous. Last week, a D.C. appeals court heard oral arguments in ALA v. FCC, the lawsuit these groups brought against the FCC, in which they argue that the FCC overstepped its jurisdiction when it mandated the flag. "There is no precedent for what the FCC did here," Sohn says. "Every time the FCC has regulated devices, it's because Congress gave it the authority. But this rule isn't based on any congressional mandate or even ancillary to a provision in the Communications Act." Sohn, who was at the oral arguments, says the three-judge panel was very persuaded by the merits of the case. All three acknowledged that the flag seemed unnecessary to ease the nation's transition to HDTV - one even remarked that this was as ridiculous as the FCC attempting to regulate washing machines. Unfortunately, the case may hit a snag when it comes to whether these groups actually have standing to bring the case. The court seemed eager to have more concrete examples of how people would be harmed by the mandate. "Of course, it's hard to come up with concrete examples when the devices in question aren't even out yet," Sohn points out. And may never be, given the flag rule's chilling effects. The EFF's Seltzer says the flag will create media fiefdoms, in which consumers are locked into particular devices or sets of devices in order to enjoy their media. It will be costly to buy a set of flag-compliant consumer electronics that all work together - and even when you do, recordings made in, say, a Sony machine won't be able to play in a Microsoft one. Which is just one more reason why it's time to build your own TV. Back at the Build-In, Seltzer and Brydon are jumping up and down and shouting. "We've got TV!" Seltzer exults. Brydon can't stop grinning at her monitor, where they've tuned in some local news. The picture is still a little jerky - the software needs some tuning - but we've got our first HDTV working. Best of all, it's a liberated TV - it isn't an "authorized device," and it's not "broadcast flag compliant." It certainly isn't "robust against user modification." But because it was built before the July 1 start date of the Broadcast Flag rule, it's going to remain perfectly legal. This TV will always be able to record HD shows and burn them to DVDs for personal use. Next year, Brydon can loan her friends an HD-quality copy of Battlestar Galactica if they missed it that week. Dale Kiefling, another Build-In participant, is almost ready to channel surf on his box too. He and his friend Lorena Fleming say they're excited to play around with TV the way they do with their computers. "I think the Broadcast Flag punishes the wrong group," Kiefling says. "The people who do mass piracy will always have the means to - the flag won't stop them. Meanwhile, the rest of us are stuck with broken entertainment systems." All the people who now take for granted the act of removing a tape from their VCR - the Star Trek fans, the OC addicts, the Marx brothers aficionados - will gradually discover they can't do the same thing with their new PVRs. Copyright law permits consumers to make personal, fair-use copies of their media. And yet the government-entertainment industrial complex will have engineered every device to stop them. "That's the worst part of all this," Fleming says. "People won't realize how bad it is until suddenly their stuff stops working." Annalee Newitz is policy analyst at the Electronic Frontier Foundation and a freelance writer. Get the gory details at www.techsploitation.com. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From dan at doxpara.com Thu Mar 3 16:43:21 2005 From: dan at doxpara.com (Dan Kaminsky) Date: Thu, 03 Mar 2005 16:43:21 -0800 Subject: I'll show you mine if you show me, er, mine In-Reply-To: References: Message-ID: <4227AF29.3090002@doxpara.com> >The description has virtually nothing to do with the actual algorithm >proposed. Follow the link in the article - http://www.stealth-attacks.info/ - >for an actual - if informal - description. > > There is no actual description publically available (there are three completely different protocols described in the press). I talked to the author about this; he sent me a fourth, somewhat reasonable document. At *best*, this is something akin to SRP with the server constantly proving its true nature with every character (yes, shoulder surfers get to attack keys one at a time). It could get pretty bad though, so rather than support it or bash it, I'd just reserve judgement until it's publically documented at Financial Crypto. --Dan From jerrold.leichter at smarts.com Thu Mar 3 14:31:28 2005 From: jerrold.leichter at smarts.com (Jerrold Leichter) Date: Thu, 3 Mar 2005 17:31:28 -0500 (EST) Subject: I'll show you mine if you show me, er, mine In-Reply-To: References: Message-ID: | >Briefly, it works like this: point A transmits an encrypted message to point | >B. Point B can decrypt this, if it knows the password. The decrypted text is | >then sent back to point A, which can verify the decryption, and confirm that | >point B really does know point A's password. Point A then sends the password | >to point B to confirm that it really is point A, and knows its own password. | | Isn't this a Crypto 101 mutual authentication mechanism (or at least a | somewhat broken reinvention of such)?... The description has virtually nothing to do with the actual algorithm proposed. Follow the link in the article - http://www.stealth-attacks.info/ - for an actual - if informal - description. -- Jerry From rah at shipwright.com Thu Mar 3 14:57:28 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 3 Mar 2005 17:57:28 -0500 Subject: With Terror in Mind, a Formulaic Way to Parse Sentences Message-ID: The New York Times March 3, 2005 WHAT'S NEXT With Terror in Mind, a Formulaic Way to Parse Sentences By NOAH SHACHTMAN MAYBE sixth-grade English was more helpful than you thought. One of the dullest grammar exercises is being used to help find potential terrorists, and save companies a bundle. Diagramming sentences - picking out subject, verb, object, adjective and other parts of speech - has been a staple of middle and high school grammar lessons for decades. Now, with financing from the Central Intelligence Agency, a California firm is using the technique to comb through e-mail messages and chat room talks, which can be a rich lode of corporate and government information, and a tough one to mine. Figuring out the connections among people, places and things is something computer algorithms do pretty well, as long as that information is structured, or categorized and put into a database. Looking through a company's customer file for a person named Bonds, for example, is fairly simple. But if the data is unstructured - if the word "bonds" hasn't been classified as the name of a ballplayer or as an investment option - searching becomes much more difficult. For people in business or in public service, only 20 percent or so of their information is kept in formal databases, noted Nick Patience, an analyst with the 451 Group, a technology research firm. The rest is unstructured, tucked away in e-mail messages, call logs, memos and instant messages. Attensity, based in Palo Alto, Calif., and financed in part by In-Q-Tel, the C.I.A.'s investment arm, has developed a method to parse electronic documents almost instantly, and diagram all of the sentences inside. ("Moby-Dick," for instance, took all of nine and a half seconds.) By labeling subjects and verbs and other parts of speech, Attensity's software gives the documents a definable structure, a way to fit into a database. And that helps turn day-to-day chatter into information that is relevant and usable. "They take the language that people use every day and compile it in a way that a machine can use," Mr. Patience said. "And that allows people to start using this tremendous amount of intelligence which has gone untapped." Whirlpool, the home appliance manufacturer, is now using Attensity software to help cull information from the 400,000 customer service calls the company receives each month. Tom Welke, a Whirlpool general manager, said the company realized it needed help in March 2002, during a microwave oven recall. The machines were arcing, producing electrical sparks, which caused the food inside to smoke. Mr. Welke decided to pore through records of recent customer calls by searching for the words "arcing" and "smoke." His team found 18,500 records that matched. Six people then spent a weekend reading the results, eventually coming up with 700 calls from customers potentially related to the problem. As a comparison, Mr. Welke then ran the same records through a program from Attensity, which had recently paid him a sales call. "It could tell if the microwave was smoking or if the chicken was smoking hot or if the customer was eating smoked chicken," he said. "It came up with 542 instances in about 10 seconds." Whirlpool is now spending a quarter-million dollars a year on Attensity's expertise, joining companies like John Deere, General Motors and Honeywell as Attensity customers. But wringing profits out of unstructured data for corporate America is only about 40 percent of the software maker's business. The rest is in government work, for groups like the Federal Bureau of Investigation, the National Security Agency and the Defense Intelligence Agency. The software helps federal researchers look for clues to terrorist and criminal activities in "the text from the dispatches from around the world, the field reports, the newspaper articles and the chat rooms," said David L. Bean, Attensity's co-founder. "The intelligence community has plenty of systems for doing six degrees of separation, for putting two and two together," Dr. Bean said. "But they need structured data in order to do it. We give them that structure." The intelligence agencies declined to discuss whether they use the software. But Kris Alexander, a former intelligence analyst for the United States military's Central Command, noted that "putting unstructured information into anything that would organize it would be very helpful." "We have guys who can crack hard drives," Mr. Alexander said. "Getting the information out is easy. The hard part is sharing it, and organizing it, so that everybody in an agency, even nonexperts, can use it." Attensity's algorithms can do more than get a document ready to categorize, however. The software ferrets out meaning in sentences as they are being diagramed. If the word "purchase" is used as a verb, the person doing the buying is tagged as a possible customer. If the phrase "plastic explosive" is used as an object, the subject is labeled as a potential enemy. For now, though, Attensity works only with English. That is a weakness the company's competitors in the world of structuring data are quick to point out. Inxight Software, of Sunnyvale, Calif., for example, produces software that turns grammatical relationships into mathematical formulas, allowing it to parse documents in 31 languages. Intelliseek, of Cincinnati, plucks entities - proper names and places - from blog entries as a way to categorize them. The company's software will also characterize a document as positive or negative based on the words it contains. Oracle and the other major database makers also build in some limited functions for extracting information from unstructured texts. But those systems usually rely on the person using it teaching the algorithms what they need to know - that in a legal document, for example, "sued" and "filed charges" are rough equivalents. With Attensity's software, that kind of instruction is often unnecessary. "Attensity shows how the words all relate to one another - all the actors, objects and actions in a document, and how they connect," said Gayle von Eckartsberg, a spokeswoman for In-Q-Tel, which also provides financing for Inxight and Intelliseek. Perfect sentences are not required for the software to work, said Dr. Bean, the son of a high school English teacher. Instead of using strict grammar laws, Attensity relies on constantly reapplying heuristics - rules of thumb - to sort out subject from object. Dangling participles, misspelled words and grammar-mangling slang can all be handled, allowing Attensity to crunch Internet relay chats, instant messenger conversations and other King's English refugees as easily as it would parse a textbook. But that does not mean, Dr. Bean added, that students should stop doing their grammar homework or paying attention in school. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Thu Mar 3 15:06:28 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Thu, 3 Mar 2005 18:06:28 -0500 Subject: bounty for errors in _Translucent Databases_ Message-ID: --- begin forwarded text From justin-cypherpunks at soze.net Thu Mar 3 12:35:58 2005 From: justin-cypherpunks at soze.net (Justin) Date: Thu, 3 Mar 2005 20:35:58 +0000 Subject: How to Stop Junk E-Mail: Charge for the Stamp In-Reply-To: <4226FA9B.10606@students.bbk.ac.uk> References: <421366D1.9010802@systemics.com> <4226FA9B.10606@students.bbk.ac.uk> Message-ID: <20050303203558.GA2170@arion.soze.net> On 2005-03-03T11:52:59+0000, ken wrote: > > >Chat is already higher volume (I read somewhere) in > >raw quantity of messages sent than email. > > I suspect you don't get much traffic. The beauty of a > non-real-time store-and-forward system like smtp (or SMS, or > oldstyle conferencing systems with off-line readers) is precisely > that it can be automated. I don't have to see mail I don't want. You don't have to see IMs you don't want, either. You can refuse them from people not on your buddy list. > >A fate for email is that as spam grows to take over more > >of the share of the shrinking pie, but consumes more of > >the bandwidth > > A higher proportion of the snail-mail I get is junk than the email. > > A higher proportion of the landline phone calls I get are junk. At > least 4 out of 5 calls, maybe 9 out of 10. Email is doing quite well. With 3 or 4 RBL blacklists, greylisting, and making sure senders don't ehlo with my ip address, I don't even have to use dspam or Spamassassin I get so little spam. > A serious proportion of the rootkits and so on that have been plaguing > us for the last few years involves chat & instant messaging & so on. > I'd block it at the boundary firewall. People who use it should just > learn how to use mail. They'd get through more. Chat is for > functional illiterates. Learn to read at adult speed and you'll prefer > mail. Why should they put up with being limited to someone else's > typing speed? I don't think email will disappear either, but IM is good for 2-way conversations. Helping someone debug a problem via email gets tedious very quickly. Strangely enough, a good number of people I've talked to over the phone have had their IQ drop by about 100 points when I start using a phonetic alphabet to spell things. I usually end up having to repeat the phonetic spelling several times; it's really strange. IM eliminates that whole problem. Unless communicating in a standard, often-spoken language, phones lose their utility. There's a place for both IM and email. I agree, though, that IM may suffer from a poor S/N ratio. -- Certainly there is no hunting like the hunting of man, and those who have hunted armed men long enough and liked it, never really care for anything else thereafter. --Hemingway, Esquire, April 1936 From WWhyte at ntru.com Thu Mar 3 19:24:24 2005 From: WWhyte at ntru.com (Whyte, William) Date: Thu, 3 Mar 2005 22:24:24 -0500 Subject: I'll show you mine if you show me, er, mine Message-ID: <30F37C4533D8564FB1D58BFDAF6687C10250B6ED@ohthree.jjj-i.com> I haven't read the original paper, and I have a great deal of respect for Markus Jakobsson. However, techniques that establish that the parties share a weak secret without leaking that secret have been around for years -- Bellovin and Merritt's DH-EKE, David Jablon's SPEKE. And they don't require either party to send the password itself at the end. William > -----Original Message----- > From: pgut001 at cs.auckland.ac.nz [mailto:pgut001 at cs.auckland.ac.nz] > Sent: Wednesday, February 23, 2005 7:30 AM > To: cryptography at metzdowd.com; cypherpunks at al-qaeda.net; > rah at shipwright.com > Subject: Re: I'll show you mine if you show me, er, mine > > > "R.A. Hettinga" forwarded: > > >Briefly, it works like this: point A transmits an encrypted > message to point > >B. Point B can decrypt this, if it knows the password. The > decrypted text is > >then sent back to point A, which can verify the decryption, > and confirm that > >point B really does know point A's password. Point A then > sends the password > >to point B to confirm that it really is point A, and knows > its own password. > > Isn't this a Crypto 101 mutual authentication mechanism (or at least a > somewhat broken reinvention of such)? If the exchange to > prove knowledge of > the PW has already been performed, why does A need to send > the PW to B in the > last step? You either use timestamps to prove freshness or > add an extra > message to exchange a nonce and then there's no need to send > the PW. Also in > the above B is acting as an oracle for password-guessing > attacks, so you don't > send back the decrypted text but a recognisable-by-A > encrypted response, or > garbage if you can't decrypt it, taking care to take the same > time whether you > get a valid or invalid message to avoid timing attacks. Blah > blah Kerberos > blah blah done twenty years ago blah blah a'om bomb blah blah. > > (Either this is a really bad idea or the details have been > mangled by the > Register). > > Peter. > > > --------------------------------------------------------------------- > The Cryptography Mailing List > Unsubscribe by sending "unsubscribe cryptography" to > majordomo at metzdowd.com From rah at shipwright.com Thu Mar 3 21:14:21 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 4 Mar 2005 00:14:21 -0500 Subject: The coming crackdown on blogging Message-ID: CNET News http://www.news.com/ The coming crackdown on blogging By Declan McCullagh Story last modified Thu Mar 03 04:00:00 PST 2005 Bradley Smith says that the freewheeling days of political blogging and online punditry are over. In just a few months, he warns, bloggers and news organizations could risk the wrath of the federal government if they improperly link to a campaign's Web site. Even forwarding a political candidate's press release to a mailing list, depending on the details, could be punished by fines. Smith should know. He's one of the six commissioners at the Federal Election Commission, which is beginning the perilous process of extending a controversial 2002 campaign finance law to the Internet. In 2002, the FEC exempted the Internet by a 4-2 vote, but U.S. District Judge Colleen Kollar-Kotelly last fall overturned that decision. "The commission's exclusion of Internet communications from the coordinated communications regulation severely undermines" the campaign finance law's purposes, Kollar-Kotelly wrote. Smith and the other two Republican commissioners wanted to appeal the Internet-related sections. But because they couldn't get the three Democrats to go along with them, what Smith describes as a "bizarre" regulatory process now is under way. CNET News.com spoke with Smith about the Bipartisan Campaign Reform Act of 2002, better known as the McCain-Feingold law, and its forthcoming extrusion onto the Internet. Q: What rules will apply to the Internet that did not before? A: The commission has generally been hands-off on the Internet. We've said, "If you advertise on the Internet, that's an expenditure of money--much like if you were advertising on television or the newspaper." Do we give bloggers the press exemption? The real question is: Would a link to a candidate's page be a problem? If someone sets up a home page and links to their favorite politician, is that a contribution? This is a big deal, if someone has already contributed the legal maximum, or if they're at the disclosure threshold and additional expenditures have to be disclosed under federal law. Certainly a lot of bloggers are very much out front. Do we give bloggers the press exemption? If we don't give bloggers the press exemption, we have the question of, do we extend this to online-only journals like CNET? How can the government place a value on a blog that praises some politician? How do we measure that? Design fees, that sort of thing? The FEC did an advisory opinion in the late 1990s (in the Leo Smith case) that I don't think we'd hold to today, saying that if you owned a computer, you'd have to calculate what percentage of the computer cost and electricity went to political advocacy. It seems absurd, but that's what the commission did. And that's the direction Judge Kollar-Kotelly would have us move in. Line drawing is going to be an inherently very difficult task. And then we'll be pushed to go further. Why can this person do it, but not that person? How about a hyperlink? Is it worth a penny, or a dollar, to a campaign? I don't know. But I'll tell you this. One thing the commission has argued over, debated, wrestled with, is how to value assistance to a campaign. Corporations aren't allowed to donate to campaigns. Suppose a corporation devotes 20 minutes of a secretary's time and $30 in postage to sending out letters for an executive. As a result, the campaign raises $35,000. Do we value the violation on the amount of corporate resources actually spent, maybe $40, or the $35,000 actually raised? The commission has usually taken the view that we value it by the amount raised. It's still going to be difficult to value the link, but the value of the link will go up very quickly. Then what's the real impact of the judge's decision? The judge's decision is in no way limited to ads. She says that any coordinated activity over the Internet would need to be regulated, as a minimum. The problem with coordinated activity over the Internet is that it will strike, as a minimum, Internet reporting services. They're exempt from regulation only because of the press exemption. But people have been arguing that the Internet doesn't fit under the press exemption. It becomes a really complex issue that would strike deep into the heart of the Internet and the bloggers who are writing out there today. (Editor's note: federal law limits the press exemption to a "broadcasting station, newspaper, magazine or other periodical publication." ) How do you see this playing out? There's sensitivity in the commission on this. But remember the commission's decision to exempt the Internet only passed by a 4-2 vote. This time, we couldn't muster enough votes to appeal the judge's decision. We appealed parts of her decision, but there were only three votes to appeal the Internet part (and we needed four). There seem to be at least three commissioners who like this. Then this is a partisan issue? Yes, it is at this time. But I always point out that partisan splits tend to reflect ideology rather than party. I don't think the Democratic commissioners are sitting around saying that the Internet is working to the advantage of the Republicans. One of the reasons it's a good time to (fix this) now is you don't know who's benefiting. Both the Democrats and Republicans used the Internet very effectively in the last campaign. What would you like to see happen? I'd like someone to say that unpaid activity over the Internet is not an expenditure or contribution, or at least activity done by regular Internet journals, to cover sites like CNET, Slate and Salon. Otherwise, it's very likely that the Internet is going to be regulated, and the FEC and Congress will be inundated with e-mails saying, "How dare you do this!" What happens next? It's going to be a battle, and if nobody in Congress is willing to stand up and say, "Keep your hands off of this, and we'll change the statute to make it clear," then I think grassroots Internet activity is in danger. The impact would affect e-mail lists, especially if there's any sense that they're done in coordination with the campaign. If I forward something from the campaign to my personal list of several hundred people, which is a great grassroots activity, that's what we're talking about having to look at. Senators McCain and Feingold have argued that we have to regulate the Internet, that we have to regulate e-mail. They sued us in court over this and they won. If Congress doesn't change the law, what kind of activities will the FEC have to target? We're talking about any decision by an individual to put a link (to a political candidate) on their home page, set up a blog, send out mass e-mails, any kind of activity that can be done on the Internet. Again, blogging could also get us into issues about online journals and non-online journals. Why should CNET get an exemption but not an informal blog? Why should Salon or Slate get an exemption? Should Nytimes.com and Opinionjournal.com get an exemption but not online sites, just because the newspapers have a print edition as well? Why wouldn't the news exemption cover bloggers and online media? Because the statute refers to periodicals or broadcast, and it's not clear the Internet is either of those. Second, because there's no standard for being a blogger, anyone can claim to be one, and we're back to the deregulated Internet that the judge objected to. Also I think some of my colleagues on the commission would be uncomfortable with that kind of blanket exemption. So if you're using text that the campaign sends you, and you're reproducing it on your blog or forwarding it to a mailing list, you could be in trouble? Yes. In fact, the regulations are very specific that reproducing a campaign's material is a reproduction for purpose of triggering the law. That'll count as an expenditure that counts against campaign finance law. This is an incredible thicket. If someone else doesn't take action, for instance in Congress, we're running a real possibility of serious Internet regulation. It's going to be bizarre. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From rah at shipwright.com Fri Mar 4 05:29:37 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 4 Mar 2005 08:29:37 -0500 Subject: Jeff Jacoby: An inglorious suicide Message-ID: Townhall.com An inglorious suicide Jeff Jacoby (back to web version) | Send March 4, 2005 Hunter Thompson's suicide was an act of selfishness and cruelty. But more depraved by far has been the celebration of that suicide by those who supposedly loved or admired him. The 67-year-old author of the ''Fear and Loathing'' books shot himself in the head on Feb. 20 as he sat in the kitchen of his home near Aspen, Colo., taking a phone call from his wife. Anita Thompson had called him from her health club, she told the Aspen Daily News, and he'd asked her to come home and help him with the column he had to write. Then, without warning or a goodbye, he put down the phone and fired a .45-caliber handgun into his mouth. ''I was on the phone with him, he set the receiver down and he did it,'' she said. ''I heard the clicking of the gun.'' There was a loud, muffled noise. Then nothing. ''I was waiting for him to get back on the phone.'' Could anything be more ghoulish and egotistical than making your unsuspecting wife listen while you put a bullet through your skull? Absolutely: making your unsuspecting wife listen while you put a bullet through your skull - and your son, daughter-in-law, and grandson are just a few yards away. Juan Thompson was in a nearby office when his father blew his brains out in the kitchen. Winkel Thompson and 6-year-old Will were playing in the living room next door. It takes a real sadist to arrange his suicide so that his loved ones are forced to hear him die. But what kind of degenerate inflicts something so traumatic on a child of 6? In Thompson's defense, it must be said that he was a hardened alcohol and drug abuser who over the decades had ingested, inhaled, and imbibed a staggering quantity and assortment of recreational poisons. The cumulative damage to his brain must have been considerable. By the time he fired his .45, who knows how clearly he was thinking about anything? But there is no defense for the treatment of Thompson's suicide as some sort of final gonzo coup by a rebel who never played by society's rules. ''Hunter S. Thompson died Sunday as he planned,'' begins Jeff Kass's admiring Feb. 24 account in the Rocky Mountain News, ''surrounded by his family, at a high point in his life, and with a single, courageous, and fatal gunshot wound to the head, his son says.'' High point? Courageous? In what warped moral universe is a man's pointless and ignoble death the ''high point in his life?'' And what is ''courageous'' about turning one's wife into a widow or depriving a 6-year-old of his grandfather? Thompson's son and daughter-in-law, Kass continues, ''could not be prouder'' of his suicide. It was the result of ''a thought process with its own beautifully dark logic. ... The guy was a warrior, and he went out like a warrior.'' Did Thompson, asks Kass, ''have his favorite liquid sidekick, a glass of Chivas Regal, on the counter? 'Of course he did,' Juan Thompson said.'' Another story details the impromptu cocktail party that gathered around Thompson's corpse - still in the kitchen chair - to drink Chivas and toast him. ''It was very loving,'' Anita Thompson is quoted as saying. ''It was not a panic, or ugly, or freaky.'' Her husband's death should be cheered, she says. ''This is a triumph of his, not a desperate, tragic failure.'' That is either unhinged grief speaking or overripe counterculture leftism. Either way, it is grotesque. But it has been echoed everywhere. ''It wouldn't be accurate to say Thompson had a death wish,'' Mark Layman wrote for Knight Ridder. ''Just the opposite: He was the self-described 'champion of fun.' '' Douglas Brinkley, the well-known historian and Thompson family friend, declared that Thompson ''made a conscious decision that he had an incredible run of 67 years, lived the way he wanted to, and wasn't going to suffer the indignities of old age.'' One journalist after another seized the moment to reminisce about some wild evening once spent with Thompson, whose suicide they seem to regard as one last piece of roguish bad craziness from an irrepressible original. How striking is the contrast between Thompson's tawdry death and the excruciating struggle of Pope John Paul II, whose passionate belief in the sanctity of life remains unwavering, even as Parkinson's disease slowly ravages him. The pope's example of courage and dignity sends a powerful message, but the chattering class would rather talk instead about why this stubborn man won't resign. Meanwhile they extol Hunter Thompson and are itching to know - are his ashes really going to be fired from a cannon? -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From jtrjtrjtr2001 at yahoo.com Fri Mar 4 12:40:27 2005 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Fri, 4 Mar 2005 12:40:27 -0800 (PST) Subject: [>Htech] Tracking a Specific Machine Anywhere On The Net (fwd from eugen@leitl.org) In-Reply-To: <20050304172852.GV13336@leitl.org> Message-ID: <20050304204027.61297.qmail@web21204.mail.yahoo.com> hi, After looking at RFC1323 below http://www.cse.ohio-state.edu/cgi-bin/rfc/rfc1323.html#sec-4 the only reasonable option is to use the time old pseudorandom numbers for TCP sequence numbers in the TCP IP stack. Another option would be to synchronize the client with NTP but that wouldn't work either.Say that the client clock can be updated ever one millisecond. However the minimum network delay between the time server and the client is usually 300ms to 800 ms.During this period a large number of outboud packets are send from the client depending on the speed at which the client is blasting away. There are plenty of packets to analyze for the attacker to determine the skew. Sarad. --- Eugen Leitl wrote: > ----- Forwarded message from Eugen Leitl > ----- > > From: Eugen Leitl > Date: Fri, 4 Mar 2005 18:28:27 +0100 > To: transhumantech at yahoogroups.com > Subject: [>Htech] Tracking a Specific Machine > Anywhere On The Net > User-Agent: Mutt/1.4i > Reply-To: transhumantech at yahoogroups.com > > > Link: > http://slashdot.org/article.pl?sid=05/03/04/1355253 > Posted by: Zonk, on 2005-03-04 16:45:00 > > from the not-the-sandra-bullock-movie dept. > An anonymous reader writes "An article on ZDNet > Australia tells of a > new technique developed at CAIDA that involves > using the individual > machine's clock skew to [1]fingerprint it > anywhere on the net." > Possible uses of the technique include "tracking, > with some > probability, a physical device as it connects to > the Internet from > different access points, counting the number of > devices behind a NAT > even when the devices use constant or random IP > identifications, > remotely probing a block of addresses to > determine if the addresses > correspond to virtual hosts (for example, as part > of a virtual > honeynet), and unanonymising anonymised network > traces." > > > References > > 1. > http://www.zdnet.com.au/news/security/0,2000061744,39183346,00.htm > > ----- End forwarded message ----- > > How to track a PC anywhere it connects to the Net > > Renai LeMay, ZDNet Australia > March 04, 2005 > URL: > http://www.zdnet.com.au/news/security/0,2000061744,39183346,00.htm > > __________________________________ Celebrate Yahoo!'s 10th Birthday! Yahoo! Netrospective: 100 Moments of the Web http://birthday.yahoo.com/netrospective/ From rah at shipwright.com Fri Mar 4 10:22:49 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 4 Mar 2005 13:22:49 -0500 Subject: SEC probing ChoicePoint stock sales Message-ID: MSNBC.com SEC probing ChoicePoint stock sales Execs sold shares before ID thefts made public The Associated Press Updated: 10:30 a.m. ET March 4, 2005 ATLANTA - ChoicePoint Inc., a leading data warehouser, says the Securities and Exchange Commission is investigating stock sales by its top two executives and the embattled company has decided to stop giving personal information about consumers to small businesses. Its shares tumbled on the news. The dual announcements were made Friday by the Alpharetta, Ga.-based company in a news statement and a regulatory filing. The SEC probe involves sales of stock by chief executive Derek Smith and president Douglas Curling for a $16.6 million profit in the months after the company learned its massive database had been breached and before that was made public. ChoicePoint's stock had dropped about 10 percent since the personal information breach at the data collector was announced Feb. 15. On Friday, ChoicePoint shares fell $2.43, or 6 percent, to $37.85 in early trading on the New York Stock Exchange. Corporate governance experts say the pattern and timing of the trading by Smith and Curling raise questions, while ChoicePoint has said the stock trading was prearranged under a plan approved by the company's board. The decision to stop selling data to small businesses was made because that was the segment of the company that thieves tapped into to gain access to ChoicePoint's database. Smith said in a statement that the decision follows "the response of consumers who have made it clear to us that they do not approve of sensitive personal data being used without a direct benefit to them." ChoicePoint said it will stop selling information products that contain sensitive consumer data, including Social Security numbers, to small businesses, except in limited cases where the products support federal, state or local government purposes. Last month, ChoicePoint said it was notifying about 145,000 Americans that their Social Security numbers and other personal information may have been viewed by criminals posing as legitimate ChoicePoint customers. The company said Friday that the number of potentially affected customers may increase, but it doesn't believe the increase will be substantial. ChoicePoint has said repeatedly it learned of the breach in October, but delayed disclosing it because it said California authorities had asked it to keep quiet to protect the fraud investigation. It said in a detailed explanation Friday that it first learned of the possibility of fraud on Sept. 27. A similar breach involving 7,000 to 10,000 ChoicePoint records occurred in 2002. ChoicePoint said Friday the SEC has notified the company that it is conducting an informal inquiry of the stock sales as well as the circumstances surrounding the possible theft of people's identities in connection with the breach of its database. The stock sales occurred between November and February. ChoicePoint said it will cooperate with the probe and "provide requested information and documents to the SEC." The company also said in a lengthy regulatory filing that the Federal Trade Commission is conducting an inquiry into its compliance with federal laws governing consumer information security and related issues. The FTC has asked for information and documents regarding ChoicePoint's customer credentialing process and the recent incident in Los Angeles involving a Nigerian man who was accused of committing fraud using consumer information from the company's database. The company said it is a defendant in several lawsuits and complaints arising from the breach. It said it could not estimate the financial impact on the company of the customer fraud and related events. It wasn't immediately clear how many customers the decision on small businesses affects. ChoicePoint said Feb. 21 when it decided to rescreen 17,000 small business customers that that action affected 5 percent of its annual revenue of $900 million. In Friday's regulatory filing, it said that because it will no longer sell information to small businesses, it expects a decline in core revenue this year of $15 million to $20 million. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From bill.stewart at pobox.com Fri Mar 4 14:03:23 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Fri, 04 Mar 2005 14:03:23 -0800 Subject: Handheld Licence Plate Scanner/OCR/Lookup Message-ID: <6.2.1.2.0.20050304133830.04339ce8@pop.idiom.com> More news dispatches from Brinworld.... http://www.chieftain.com/business/1109862027/1 http://www.thenewspaper.com/news/01/196.asp Bootfinder, made by G2 Systems in Alexandria VA, is a combination of a handheld digital camera, OCR software for locating and reading license plates, and a database lookup system that shows the user whatever information it has about that license plate. The software runs on a laptop; the article doesn't say if it has an online live data feed or just runs on stored data. The two governments currently using it, New Haven Conn and Arlington County VA, are using it to find car tax and parking ticket delinquents, so it's something that doesn't need a live data feed, but that would be easy to patch on - the hard technology's in reading the number, not in using it. It was originally developed for tracing stolen cars, but the developer found that to be a hard sell with cash-strapped police departments, while parking enforcement is a revenue-generating activity so anything that lets those departments rake in money faster is an easy sell. One city saw their car tax payment compliance go from 80% to 95% because it was easy to catch many non-payers and to scare other people into paying before they get caught. The camera can scan 1000 license plates per minute - the article doesn't say how fast the cars can be going, but the cities that use it have parking officials driving down the street scanning parked cars' plates, which are easier to aim at than moving cars. Even so, that suggests that more widespread privacy-invading applications should be easy to develop - David Brin's "Transparent Society" prediction of cameras and computing being cheap enough to become ubiquitous becomes more realistic every year. From rah at shipwright.com Fri Mar 4 12:31:56 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Fri, 4 Mar 2005 15:31:56 -0500 Subject: Warm Party for a Code Group Message-ID: > At 9:01 PM +0100 3/4/05, Anonymous wrote: >>What does this have to do with cypherpunks? >"Narcs and feds will not be allowed at the meeting. Fuck them dead." Cheers, RAH ------ Wired News Warm Party for a Code Group By Danit Lidor? Story location: http://www.wired.com/news/culture/0,1284,55114,00.html 02:00 AM Sep. 13, 2002 PT The cypherpunks are throwing a PGP (pretty good party) this weekend. The venerable online community is celebrating its 10th anniversary which, in the ephemeral world of the Internet, is remarkable. No wonder. In 1992, the cypherpunks emerged from a small group of people who, because of their interest in cryptography and encryption, recognized that the free-flowing format of the burgeoning Web culture must provide for anonymous interactions. Not surprisingly, they soon came under the uncomfortable scrutiny of the formidable National Security Agency. The situation escalated in early 1993, after a computer programmer named Phil Zimmermann (a patron saint of the community) -- alarmed that the patents for public key encryption were sold to a company called RSA -- wrote an open-source, free program called PGP (Pretty Good Privacy). The resulting debacle, in which Zimmermann was threatened with criminal prosecution for exporting weapons (encryption technology is termed a weapon by the U.S. government), brought the public's right to privacy to the forefront of the now-commonplace tug-of-war between those who favor "crypto anarchy" and those who don't. Through the active work of many civil libertarians, including the cypherpunks, pressure was brought to bear upon the government to re-think its position. The charges against Zimmermann were dropped. It was a triumph. The geeks fought the law, and the geeks won. "The cypherpunks' paranoia about information exploitation is becoming mainstream," Peter Wayner, author of Translucent Databases, wrote in an e-mail interview. "Everyone is learning that the cypherpunks' insistence on limiting the proliferation of information is a good thing." The cypherpunks' e-mail list forms the nucleus of the community, which has grown to include people of many agendas and interests. No longer the exclusive domain of crypto geeks, cypherpunks are "doctors, lawyers, mathematicians, felons, druggies, anti-druggies, anarchists, libertarians, right-wing fanatics, left-wing fanatics, teachers, housewives, househusbands, students, cops and criminals," cypherpunk J.A. Terranson wrote in a posting. Cypherpunk Optimizzin Al-gorithym wrote in typically obscure cypherpunk fashion, "We're all just voices in Tim May's head." May, one of the original cypherpunks, continues to be an active figurehead of the cypherpunks and has often bridged the chasm between its historically secretive culture and its forays into the public sphere. In 10 years, the list has become an amalgamation of a political watchdog site, a social club and a repository of technical cryptographic discussion. "(It's) where people from all different backgrounds and views can hear from one another," mathematician Nina Fefferman said. "We math people are frequently shocked and confused by what the politicians do with regard to legislating crypto-related issues. Conversely, the policy and society people are frequently interested in issues that have to do with the use and regulation of cryptographic standards and research." "The atmosphere isn't as electric because the scene has grown so big," Wayner said. "It's not just a few guys talking about the importance of some mathematical equations. It's like debating the importance of indoor plumbing now. No one disputes it, they just want to argue about copper versus PVC." Wayner, Zimmermann, as well as May, John Gilmore and Eric Hughes (the original founders of the list), however, have emerged from their cypherpunk association as key public privacy figures: vocal and passionate defenders of civil liberties on the Web. It's hard to imagine the secretive and fractious cryptocrusaders assembling for a physical meeting. Even May, the party's host, isn't sure who or how many cypherpunks to expect to his soiree at a hideaway in the Santa Cruz (California) mountains. But he's adamant about who won't be coming. Never one to mince words, he wrote, "Narcs and feds will not be allowed at the meeting. Fuck them dead." -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From ptrei at rsasecurity.com Fri Mar 4 13:09:02 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Fri, 4 Mar 2005 16:09:02 -0500 Subject: Jeff Jacoby: An inglorious suicide Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776CB3@rsana-ex-hq1.NA.RSA.NET> > -----Original Message----- > From: owner-cypherpunks at minder.net > [mailto:owner-cypherpunks at minder.net]On Behalf Of Anonymous > Sent: Friday, March 04, 2005 3:01 PM > To: cypherpunks at al-qaeda.net > Subject: Re: Jeff Jacoby: An inglorious suicide > > > R.A. Hettinga spoke thusly... > > > > > > > Townhall.com > > > > An inglorious suicide > > Jeff Jacoby (back to web version) | Send > > > > March 4, 2005 > > > > Hunter Thompson's suicide was an act of selfishness and > cruelty. But more > > depraved by far has been the celebration of that suicide by > those who > > supposedly loved or admired him. > > What does this have to do with cypherpunks? This is not your personal > blog. Most of the list traffic is forwarded or cross-posted news > articles, but how is HST's suicide remotely on-topic? > I absolutely agree. The value of Hettinga's posts to Cypherpunks and the Cryptography list has absolutely gone down the tubes, to the point where I have had to write special filter rules to isolate his posts from the actual content. The dozen or so full-length article on HST have simply no relevance to either list. If he had any respect for others at all, he'd give the URL and a couple lines of summary. Or even better is your suggestion that he use his own blog, or set up his own mailing list instead of spamming the lists with off-topic crap. His behaviour has sunk his reputation well into the Choate/Matt Taylor range. Peter Trei From eugen at leitl.org Fri Mar 4 09:28:27 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 4 Mar 2005 18:28:27 +0100 Subject: [>Htech] Tracking a Specific Machine Anywhere On The Net Message-ID: Link: http://slashdot.org/article.pl?sid=05/03/04/1355253 Posted by: Zonk, on 2005-03-04 16:45:00 from the not-the-sandra-bullock-movie dept. An anonymous reader writes "An article on ZDNet Australia tells of a new technique developed at CAIDA that involves using the individual machine's clock skew to [1]fingerprint it anywhere on the net." Possible uses of the technique include "tracking, with some probability, a physical device as it connects to the Internet from different access points, counting the number of devices behind a NAT even when the devices use constant or random IP identifications, remotely probing a block of addresses to determine if the addresses correspond to virtual hosts (for example, as part of a virtual honeynet), and unanonymising anonymised network traces." References 1. http://www.zdnet.com.au/news/security/0,2000061744,39183346,00.htm ----- End forwarded message ----- How to track a PC anywhere it connects to the Net Renai LeMay, ZDNet Australia March 04, 2005 URL: http://www.zdnet.com.au/news/security/0,2000061744,39183346,00.htm Anonymous Internet access is now a thing of the past. A doctoral student at the University of California has conclusively fingerprinted computer hardware remotely, allowing it to be tracked wherever it is on the Internet. In a paper on his research, primary author and Ph.D. student Tadayoshi Kohno said: "There are now a number of powerful techniques for remote operating system fingerprinting, that is, remotely determining the operating systems of devices on the Internet. We push this idea further and introduce the notion of remote physical device fingerprinting ... without the fingerprinted device's known cooperation." The potential applications for Kohno's technique are impressive. For example, "tracking, with some probability, a physical device as it connects to the Internet from different access points, counting the number of devices behind a NAT even when the devices use constant or random IP identifications, remotely probing a block of addresses to determine if the addresses correspond to virtual hosts (for example, as part of a virtual honeynet), and unanonymising anonymised network traces." NAT (network address translation) is a protocol commonly used to make it appear as if machines behind a firewall all retain the same IP address on the public Internet. Kohno seems to be aware of the interest from surveillance groups that his techniques could generate, saying in his paper: "One could also use our techniques to help track laptops as they move, perhaps as part of a Carnivore-like project". Carnivore was Internet surveillance software built by the United States' Federal Bureau of Investigation. Earlier in the paper Kohno overshadowed possible forensics applications, saying that investigators could use his techniques "to argue whether a given laptop was connected to the Internet from a given access location". Another application for Kohno's technique is to "obtain information about whether two devices on the Internet, possibly shifted in time or IP addresses, are actually the same physical device." The technique works by "exploiting small, microscopic deviations in device hardware: clock skews." In practice, Kohno's paper says, his techniques "exploit the fact that most modern TCP stacks implement the TCP timestamps option from RFC 1323 whereby, for performance purposes, each party in a TCP flow includes information about its perception of time in each outgoing packet. A fingerprinter can use the information contained within the TCP headers to estimate a device's clock skew and thereby fingerprint a physical device." Kohno goes on to say: " Our techniques report consistent measurements when the measurer is thousands of miles, multiple hops, and tens of milliseconds away from the fingerprinted device, and when the fingerprinted device is connected to the Internet from different locations and via different access technologies. Further, one can apply our passive and semi-passive techniques when the fingerprinted device is behind a NAT or firewall." And the paper stresses that "For all our methods, we stress that the fingerprinter does not require any modification to or cooperation from the fingerprintee." Kohno and his team tested their techniques on many operating systems, including Windows XP and 2000, Mac OS X Panther, Red Hat and Debian Linux, FreeBSD, OpenBSD and even Windows for Pocket PCs 2002. "In all cases," the paper says, "we found that we could use at least one of our techniques to estimate clock skews on the machines and that we required only a small amount of data, although the exact data requirements depended on the operating system in question." Putting the techniques to the test with a wider test also proved fruitful for the researchers. "We also measured the clock skews of 69 (seemingly identical) Windows XP SP1 machines in one of our institution's undergraduate computing facilities. The latter experiment, which ran for 38 days, as well as other experiments, show that the clock skew estimates for any given machine are approximately constant over time, but that different machines have detectably different clock skews," said the paper. Although the paper says that "It has long been known that seemingly identical computers can have disparate clock skews," it goes on to conclude that "the main advantage of our techniques ... is that our technique can be mountable by adversaries thousands of miles and multiple hops away." Information about the technique came to light when KC Claffy, principal investigator for the Cooperative Association for Internet Data Analysis (CAIDA) forwarded information about the project to a mailing list, "in the interest of full and early disclosure". However Claffy also said in her email: "Please don't forward to any bad guys." Kohno is also associated with CAIDA. Kohno's research is due to be presented at the Institute of Electrical and Electronics Engineers Symposium on Security and Privacy to be held in California in May. Copyright ) 2005 CNET Networks, Inc. All Rights Reserved. ZDNET is a registered service mark of CNET Networks, Inc. ZDNET Logo is a service mark of CNET NETWORKS, Inc. -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From eugen at leitl.org Fri Mar 4 09:28:53 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 4 Mar 2005 18:28:53 +0100 Subject: [>Htech] Tracking a Specific Machine Anywhere On The Net (fwd from eugen@leitl.org) Message-ID: <20050304172852.GV13336@leitl.org> ----- Forwarded message from Eugen Leitl ----- From nobody at paranoici.org Fri Mar 4 12:01:13 2005 From: nobody at paranoici.org (Anonymous) Date: Fri, 4 Mar 2005 21:01:13 +0100 (CET) Subject: Jeff Jacoby: An inglorious suicide In-Reply-To: Message-ID: R.A. Hettinga spoke thusly... > > > Townhall.com > > An inglorious suicide > Jeff Jacoby (back to web version) | Send > > March 4, 2005 > > Hunter Thompson's suicide was an act of selfishness and cruelty. But more > depraved by far has been the celebration of that suicide by those who > supposedly loved or admired him. What does this have to do with cypherpunks? This is not your personal blog. Most of the list traffic is forwarded or cross-posted news articles, but how is HST's suicide remotely on-topic? It's not as if every possible angle on HST's suicide hasn't already been covered by the press. From dgerow at afflictions.org Fri Mar 4 20:22:41 2005 From: dgerow at afflictions.org (Damian Gerow) Date: Fri, 4 Mar 2005 23:22:41 -0500 Subject: Jeff Jacoby: An inglorious suicide In-Reply-To: References: Message-ID: <20050305042241.GM83265@afflictions.org> Thus spake Anonymous (nobody at paranoici.org) [04/03/05 15:18]: : What does this have to do with cypherpunks? This is not your personal : blog. Most of the list traffic is forwarded or cross-posted news : articles, but how is HST's suicide remotely on-topic? Actually, I'm kinda getting sick of reading about his suicide. Seriously, enough already. He's dead. Let him rest in peace. From nobody at paranoici.org Fri Mar 4 16:34:08 2005 From: nobody at paranoici.org (Anonymous) Date: Sat, 5 Mar 2005 01:34:08 +0100 (CET) Subject: SEC probing ChoicePoint stock sales In-Reply-To: Message-ID: R.A. Hettinga wrote: > While this is marginally more cypherpunks-related than Hunter Thompson's suicide, I think we're all capable of reading the daily headlines if we care about the SEC investigation du jour. From mv at cdc.gov Sat Mar 5 06:51:24 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 05 Mar 2005 06:51:24 -0800 Subject: SHA1 broken? Message-ID: <4229C76C.528734DB@cdc.gov> At 09:23 PM 2/19/05 +0000, Dave Howe wrote: > I am unaware of any massive improvement (certainly to the scale of >the comparable improvement in CPUs) in FPGAs, and the ones I looked at a >a few days ago while researching this question seemed to have pretty FPGAs scale with tech the same as CPUs, however CPUs contain a lot more design info (complexity). But FPGAs since '98 have gotten denser (Moore's observation), pioneering Cu wiring, smaller features, etc. From eugen at leitl.org Sat Mar 5 00:12:42 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 5 Mar 2005 09:12:42 +0100 Subject: Handheld Licence Plate Scanner/OCR/Lookup In-Reply-To: <6.2.1.2.0.20050304133830.04339ce8@pop.idiom.com> References: <6.2.1.2.0.20050304133830.04339ce8@pop.idiom.com> Message-ID: <20050305081242.GJ13336@leitl.org> On Fri, Mar 04, 2005 at 02:03:23PM -0800, Bill Stewart wrote: > Bootfinder, made by G2 Systems in Alexandria VA, > is a combination of a handheld digital camera, Germany has recently deployed a Toll Collect system which has license plate OCR mounted on many points (hundreds to thousands) over highways. It reads all license plates (missing out some 5% or so currently), supposedly discarding everything but the truck's. Currently. It is sufficient to create movement profiles of individual vehicles with a rather good resolution (but then, mobile phones are even more useful for that). -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From camera_lumina at hotmail.com Sat Mar 5 13:50:37 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sat, 05 Mar 2005 16:50:37 -0500 Subject: SHA1 broken? In-Reply-To: <4229C76C.528734DB@cdc.gov> Message-ID: Well, what would you call a network processor? An FPGA or a CPU? I think of it as somewhere in between, given credence to the FPGA statement below. -TD >From: "Major Variola (ret)" >To: "cypherpunks at al-qaeda.net" >Subject: Re: SHA1 broken? >Date: Sat, 05 Mar 2005 06:51:24 -0800 > >At 09:23 PM 2/19/05 +0000, Dave Howe wrote: > > I am unaware of any massive improvement (certainly to the scale of > >the comparable improvement in CPUs) in FPGAs, and the ones I looked at >a > >a few days ago while researching this question seemed to have pretty > >FPGAs scale with tech the same as CPUs, however CPUs contain a lot >more design info (complexity). But FPGAs since '98 have gotten >denser (Moore's observation), pioneering Cu wiring, smaller features, >etc. From emc at artifact.psychedelic.net Sat Mar 5 17:41:32 2005 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Sat, 5 Mar 2005 17:41:32 -0800 (PST) Subject: End of a cypherpunk era? In-Reply-To: <6212ba641e11f045d0219dc79e947b1e@ecn.org> Message-ID: <200503060141.j261fWDv018438@artifact.psychedelic.net> Someone writes: > > I never saw this kind of thing as being central to the cypherpunk > > concept. In fact, to me it seems like the wrong direction to go. The > > point of being a cypherpunk is to live in cypherspace, the mythical land > > where online interactions dominate and we can use information theory and > > mathematics to protect ourselves. Of course, cypherspace is inevitably > > grounded in the physical world, so we have to use anonymous remailers > > and proxies to achieve our goals. This seems reasonable. It seems the path of least resistance here, is to let ones meatspace identity fly under the radar, and attract no attention to itself, while ones cypherpunkish persona is fighting injustice and sovereign state arrogance by selling really great tech to the needy and wiring large satchels of money between continents in encrypted untraceable transactions. I would think the last thing one would wish do to in order to further that goal, is to have ones meatspace identity publicly thumb its nose at the government, and make itself a target for retaliation. Loudly renouncing ones citizenship is a lot less effective in destroying the infrastructure of oppression, than anonymously telling everyone in the world how they can make a 20 megaton thermonuclear explosion working for a few years in their basement using only non-radioactive materials that can never be made illegal to own. There are two types of societies in the world. Those in which everyone has a deadly weapon that can never be take away, and against which there is no defense. And those in which everyone has an inpenetrable shield that can never be taken away, and against which no weapon is effective. Dolphins are an example of the former. Usenet is an example of the latter. Dolphins are polite, friendly, and respectful of eachother, and no group of dolphins can ever form a government to oppress the rest of them. We should try to be more like dolphins in cypherspace, while attracting as little attention to ourselves in other places. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From cripto at ecn.org Sat Mar 5 15:03:01 2005 From: cripto at ecn.org (Anonymous) Date: Sun, 6 Mar 2005 00:03:01 +0100 (CET) Subject: End of a cypherpunk era? Message-ID: <6212ba641e11f045d0219dc79e947b1e@ecn.org> Ian Grigg writes at http://www.financialcryptography.com/mt/archives/000381.html: : FC exile finds home as Caribbean Brit : : Vince Cate (writes Ray Hirschfeld) created a stir a number of years ago : by relocating to the Caribbean island nation of Anguilla, purchasing a : Mozambique passport-of-convenience, and renouncing his US citizenship : in the name of cryptographic and tax freedom. : : Last Thursday I attended a ceremony (the first of its kind in Anguilla) : at which he received his certificate of British citizenship. : : But Vince's solemn affirmation of allegiance to Queen Elizabeth, her : heirs and successors was done for practical rather than ideological : reasons. Since giving up his citizenship, the US has refused to grant : him a visa to visit his family there, or even to accompany his wife to : St. Thomas for her recent kidney surgery. Now as a British citizen he : expects to qualify for the US visa waiver program. : : Is this the end of an era, a defining cypherpunk moment? "Cypherpunk" responds in the comments: > I never saw this kind of thing as being central to the cypherpunk > concept. In fact, to me it seems like the wrong direction to go. The > point of being a cypherpunk is to live in cypherspace, the mythical land > where online interactions dominate and we can use information theory and > mathematics to protect ourselves. Of course, cypherspace is inevitably > grounded in the physical world, so we have to use anonymous remailers > and proxies to achieve our goals. > > But escaping overseas is granting too much to the primacy of the > physical. It would be better for Vince Cate and other expats to help > create anonymizing technology and other infrastructure to allow people > to work and play freely in the online world. > > And tying it back to this blog, the gold at the end of the cipherpunk > rainbow is a payment system which can be deployed and exploited > anonymously. That's hard, for many reasons, not least because most people > are happy and eager to share information goods for free. Modern-day > online communism (creative commons, open source, etc) actually undercuts > cypherpunk goals by reducing the need and motivation for anonymous > payment systems. How can you buy and sell information goods online, > when everyone gives everything away freely? From comesefosse at ntani.firenze.linux.it Sat Mar 5 15:15:40 2005 From: comesefosse at ntani.firenze.linux.it (Tarapia Tapioco) Date: Sun, 6 Mar 2005 00:15:40 +0100 (CET) Subject: mixminion test Message-ID: -----BEGIN TYPE III ANONYMOUS MESSAGE----- Message-type: plaintext One-line test of mixminion! -----END TYPE III ANONYMOUS MESSAGE----- From justin-cypherpunks at soze.net Sat Mar 5 18:45:21 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sun, 6 Mar 2005 02:45:21 +0000 Subject: End of a cypherpunk era? In-Reply-To: <6212ba641e11f045d0219dc79e947b1e@ecn.org> References: <6212ba641e11f045d0219dc79e947b1e@ecn.org> Message-ID: <20050306024521.GA8637@arion.soze.net> On 2005-03-06T00:03:01+0100, Anonymous wrote: > Ian Grigg writes at > http://www.financialcryptography.com/mt/archives/000381.html: > : Is this the end of an era, a defining cypherpunk moment? It doesn't make much sense to renounce your U.S. citizenship if your relatives, who you care about and who you want to visit, still live there. What did Vince Cate expect? He wants to be free to enter the U.S. temporarily, but doesn't want to be a citizen of a country the U.S. deems sufficiently similar to itself? From the American State's perspective, he is dangerous. He is a near-anarchist, and individuals with that kind of status threaten the existence of the U.S. -- Certainly there is no hunting like the hunting of man, and those who have hunted armed men long enough and liked it, never really care for anything else thereafter. --Hemingway, Esquire, April 1936 From cripto at ecn.org Sat Mar 5 21:20:36 2005 From: cripto at ecn.org (Anonymous) Date: Sun, 6 Mar 2005 06:20:36 +0100 (CET) Subject: End of a cypherpunk era? Message-ID: <59b623bace9f5a49cf8ea2b77c3ad72b@ecn.org> EMC writes: > Loudly renouncing ones citizenship is a lot less effective in destroying > the infrastructure of oppression, than anonymously telling everyone in the > world how they can make a 20 megaton thermonuclear explosion working for a > few years in their basement using only non-radioactive materials that can > never be made illegal to own. That would certainly be conducive to destruction, but I imagine we'd see a lot more than just "the infrastructure of oppression" being destroyed in such a world. The problem, vs your dolphins, is that nukes can be delivered anonymously, hence used without fear of retribution. > There are two types of societies in the world. Those in which everyone > has a deadly weapon that can never be take away, and against which there > is no defense. And those in which everyone has an inpenetrable shield > that can never be taken away, and against which no weapon is effective. No, I don't think every society in the world falls into one of these two categories. Don't you recognize that we live in a world where there are neither perfect shields nor perfect weapons? > Dolphins are an example of the former. Usenet is an example of the > latter. Dolphins are polite, friendly, and respectful of eachother, and > no group of dolphins can ever form a government to oppress the rest of > them. > > We should try to be more like dolphins in cypherspace, while attracting as > little attention to ourselves in other places. Unfortunately, cypherspace even more than cyberspace tends towards the perfect-shield side of the equation. You can't harm a person if your only interactions are anonymous communications. About the worst you can give him is a stern talking-to. If your social analysis is correct, then cypherpunk technologies are going to make online interactions even less polite, friendly and respectful. Still, if we could achieve mutual respect and freedom in the physical world, we would happily pay the price of increased rudeness online. From waddell at fairfax.com Sun Mar 6 09:08:00 2005 From: waddell at fairfax.com (waddell at fairfax.com) Date: Sun, 06 Mar 2005 12:08:00 -0500 Subject: Independent URUD Message-ID: <754997735.80714950747891@fairfax.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 998 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: knowledge.gif Type: image/gif Size: 6344 bytes Desc: not available URL: From steve49152 at yahoo.ca Sun Mar 6 21:13:09 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Mon, 7 Mar 2005 00:13:09 -0500 (EST) Subject: End of a cypherpunk era? In-Reply-To: 6667 Message-ID: <20050307051310.4244.qmail@web51802.mail.yahoo.com> --- Anonymous wrote: [snip] > Still, if we could achieve mutual respect and freedom in the physical > world, we would happily pay the price of increased rudeness online. Speak for yourself. Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From sunder at sunder.net Mon Mar 7 08:10:46 2005 From: sunder at sunder.net (sunder) Date: Mon, 07 Mar 2005 11:10:46 -0500 Subject: NSA specifies elliptic-curve crypto for security applications Message-ID: <422C7D06.4000501@sunder.net> http://www.eet.com/sys/news/showArticle.jhtml?articleId=60404977 NSA specifies elliptic-curve crypto for security applications By Loring Wirbel , EE Times March 03, 2005 (10:22 AM EST) URL: http://www.eet.com/article/showArticle.jhtml?articleId=60404977 Last October, the agency referred to ECC as one of the few public-key systems that could meet equivalent security standards to the private-key AES. NSA (Fort Meade, Md.) is recommending a series of algorithms called "Suite B" for securing sensitive and unclassified data. Suite B includes Elliptic-Curve Menezes-Qu-Vanstone and Elliptic-Curve Diffie-Hellman for key agreement, along with the Elliptic Curve Digital Signature Algorithm for digital signatures. AES and Secure Hashing Algorithm also are included in Suite B. From norwood at pittsburg.com Mon Mar 7 11:55:14 2005 From: norwood at pittsburg.com (norwood at pittsburg.com) Date: Mon, 07 Mar 2005 14:55:14 -0500 Subject: AVOJ Dep. Message-ID: <140095843.05863279265371@pittsburg.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1401 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: harvested.gif Type: image/gif Size: 7263 bytes Desc: not available URL: From rsw at jfet.org Mon Mar 7 15:57:50 2005 From: rsw at jfet.org (Riad S. Wahby) Date: Mon, 7 Mar 2005 17:57:50 -0600 Subject: SHA1 broken? In-Reply-To: <0503072030470.14065@somehost.domainz.com> References: <0503072030470.14065@somehost.domainz.com> Message-ID: <20050307235750.GA16606@positron.jfet.org> Thomas Shaddack wrote: > There are FPGAs with on-chip RISC CPU cores, allowing reaping the benefits > of both architectures in a single chip. FPGAs are mostly useful for prototyping. Once you've decided on a design, there's no point in realizing it in a reprogrammable environment. Synthesize it, time it carefully, and run it as fast as your process allows. TSMC 0.13u just ain't that pricey any more. -- Riad S. Wahby rsw at jfet.org From shaddack at ns.arachne.cz Mon Mar 7 12:01:57 2005 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Mon, 7 Mar 2005 21:01:57 +0100 (CET) Subject: SHA1 broken? In-Reply-To: References: Message-ID: <0503072030470.14065@somehost.domainz.com> FPGAs will have very hard time to be as fast as "dedicated" CPUs, frequency-wise. The FPGA structures have to be too generic, and are much bigger than specialized structures of the CPUs, so they have higher capacity, which limits the maximum achievable switching frequency. The length of the wiring between the structures together with the lazy speed of light plays its role as well. However, the FPGA structure allows parallelizing of processing tasks, which can in some cases neatly beat the sequential CPUs. There are FPGAs with on-chip RISC CPU cores, allowing reaping the benefits of both architectures in a single chip. On Sat, 5 Mar 2005, Tyler Durden wrote: > Well, what would you call a network processor? An FPGA or a CPU? I think of it > as somewhere in between, given credence to the FPGA statement below. > > -TD > > > From: "Major Variola (ret)" > > To: "cypherpunks at al-qaeda.net" > > Subject: Re: SHA1 broken? > > Date: Sat, 05 Mar 2005 06:51:24 -0800 > > > > At 09:23 PM 2/19/05 +0000, Dave Howe wrote: > > > I am unaware of any massive improvement (certainly to the scale of > > > the comparable improvement in CPUs) in FPGAs, and the ones I looked at > > a > > > a few days ago while researching this question seemed to have pretty > > > > FPGAs scale with tech the same as CPUs, however CPUs contain a lot > > more design info (complexity). But FPGAs since '98 have gotten > > denser (Moore's observation), pioneering Cu wiring, smaller features, > > etc. From s.schear at comcast.net Tue Mar 8 02:31:59 2005 From: s.schear at comcast.net (Steve Schear) Date: Tue, 08 Mar 2005 02:31:59 -0800 Subject: ZipLip ends secure email service Message-ID: <6.0.1.1.0.20050308022950.04eab088@mail.comcast.net> "Thank you for using ZipLip's free secure mail service. We appreciate your patronage and wish to inform you that we will be discontinuing our service on June 30th, 2005. For various reasons, including new U.S. legislation which significantly impacts the individual's privacy rights, ZipLip is no longer able to provide its free secure email services with any reasonable assurance of privacy and security, particularly in the context of a hosted service. We will revisit the service issue when our legislature reinstates our privacy rights. Please make the necessary arrangements to use another Webmail service before June 30th. We are unable to offer any data migration services. We sincerely apologize for any inconvenience caused. " https://www.ziplip.com/ps/PmApp/zlp_dummy?mgc=1&NextPage=/app/services/en/register.jsp From camera_lumina at hotmail.com Tue Mar 8 08:01:45 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 08 Mar 2005 11:01:45 -0500 Subject: SHA1 broken? In-Reply-To: <20050307235750.GA16606@positron.jfet.org> Message-ID: Well, maybe I misunderstand your statement here, but in Telecom most heavy iron has plenty of FPGAs, and as far as I understand it, they more or less have to. -TD >From: "Riad S. Wahby" >To: Cypherpunks >Subject: Re: SHA1 broken? >Date: Mon, 7 Mar 2005 17:57:50 -0600 > >Thomas Shaddack wrote: > > There are FPGAs with on-chip RISC CPU cores, allowing reaping the >benefits > > of both architectures in a single chip. > >FPGAs are mostly useful for prototyping. Once you've decided on a >design, there's no point in realizing it in a reprogrammable >environment. Synthesize it, time it carefully, and run it as fast as >your process allows. > >TSMC 0.13u just ain't that pricey any more. > >-- >Riad S. Wahby >rsw at jfet.org From s.schear at comcast.net Tue Mar 8 12:02:58 2005 From: s.schear at comcast.net (Steve Schear) Date: Tue, 08 Mar 2005 12:02:58 -0800 Subject: [>Htech] Tracking a Specific Machine Anywhere On The Net (fwd from eugen@leitl.org) In-Reply-To: <20050304204027.61297.qmail@web21204.mail.yahoo.com> References: <20050304172852.GV13336@leitl.org> <20050304204027.61297.qmail@web21204.mail.yahoo.com> Message-ID: <6.0.1.1.0.20050307212952.04ea6a90@mail.comcast.net> Perhaps I'm missing something but doesn't the use of a proxy strip off information essential to this exploit? If so, only newbies and lusers will ID'd. Steve From jamesd at echeque.com Tue Mar 8 12:25:31 2005 From: jamesd at echeque.com (James A. Donald) Date: Tue, 08 Mar 2005 12:25:31 -0800 Subject: I'll show you mine if you show me, er, mine In-Reply-To: <20050307201419.GE743@bast.lollyshouse.net> References: <30F37C4533D8564FB1D58BFDAF6687C10250B6ED@ohthree.jjj-i.com> Message-ID: <422D99BB.15129.A9D0B4A@localhost> -- > > However, techniques that establish that the parties share a > > weak secret without leaking that secret have been around > > for years -- Bellovin and Merritt's DH-EKE, David Jablon's > > SPEKE. And they don't require either party to send the > > password itself at the end. > They are heavily patent laden, although untested last time I > looked. This has been discouraging to implementers. There seem to be a shitload of protocols, in addition to SPEKE and DH-EKE A password protocol should have the following properties: 1. It should identify both parties to each other, that is to say, be secure against replay and man in the middle attacks, in particular, strong against phishing.. It should be secure against replay and dictionary attacks by an evesdropper or man-in-the-middle. Such an attacker should be able to no better than someone who just tries repeatedly to log on to the server with a guessed password 2. It should be as strong as practical against offline attacks by the server itself. The server operators, or someone who has stolen information from them, should not know the users password, and dictionary attacks should be sufficiently expensive that a strong password (not your ordinary password) is secure. Can anyone suggest a well reviewed, unpatented, protocol that has the desired properties? --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG A8bCmCXDTAX2Syg907T7uRpajs77l9CqLEii+ezP 42zQDcP3xJXtcLPSgCVa55kew+ALkrQ/I50PFm9lC From rsw at jfet.org Tue Mar 8 11:26:48 2005 From: rsw at jfet.org (Riad S. Wahby) Date: Tue, 8 Mar 2005 13:26:48 -0600 Subject: SHA1 broken? In-Reply-To: References: <20050307235750.GA16606@positron.jfet.org> Message-ID: <20050308192648.GA4762@positron.jfet.org> Tyler Durden wrote: > Well, maybe I misunderstand your statement here, but in Telecom most heavy > iron has plenty of FPGAs, and as far as I understand it, they more or less > have to. Have to in what sense? If they're constantly reconfiguring the FPGAs (new software revs, or some sort of evolutionary "learning" process--- the latter not likely in telecom, of course), sure, they have to be on reprogrammable structures. If, on the other hand, you're building a custom hash cracking machine, you don't need to reconfigure your gates. You could design your parallelized SHA1 cracking machine and dump it onto a bunch of FPGAs, but if you really have unlimited resources you take the plunge into ASICs, at which point you can tighten your timing substantially. -- Riad S. Wahby rsw at jfet.org From caine at erf.sh Tue Mar 8 13:31:18 2005 From: caine at erf.sh (Kwai Chang Caine) Date: Tue, 08 Mar 2005 13:31:18 -0800 Subject: I'll show you mine if you show me, er, mine In-Reply-To: <422D99BB.15129.A9D0B4A@localhost> References: <30F37C4533D8564FB1D58BFDAF6687C10250B6ED@ohthree.jjj-i.com> <422D99BB.15129.A9D0B4A@localhost> Message-ID: <20050308213117.GN743@bast.lollyshouse.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 * "James A. Donald" [2005-03-08 12:25 -0800]: > > > However, techniques that establish that the parties share a > > > weak secret without leaking that secret have been around > > > for years -- Bellovin and Merritt's DH-EKE, David Jablon's > > > SPEKE. And they don't require either party to send the > > > password itself at the end. > > > They are heavily patent laden, although untested last time I > > looked. This has been discouraging to implementers. > > There seem to be a shitload of protocols, in addition to SPEKE > and DH-EKE These are classed as 'strong password protocols', and include protocols like SRP (implemented in cyrus sasl I think, but not used commercially anywhere that I know of - sure cyrus sasl is, but those that use is typically only support a couple of authentication methods, and SRP isn't one of them) and PDM (Password Derived Moduli). They have in common the use of Diffie-Hellman exchange, or slightly modified versions of it. > A password protocol should have the following properties: > > 1. It should identify both parties to each other, that is to > say, be secure against replay and man in the middle attacks, in > particular, strong against phishing.. It should be secure > against replay and dictionary attacks by an evesdropper or > man-in-the-middle. Such an attacker should be able to no > better than someone who just tries repeatedly to log on to the > server with a guessed password > > 2. It should be as strong as practical against offline attacks > by the server itself. The server operators, or someone who has > stolen information from them, should not know the users > password, and dictionary attacks should be sufficiently > expensive that a strong password (not your ordinary password) > is secure. I'm not sure how the DH aspect plays into these properties. These protocols all exist in an 'augmented' form (except SRP which has no other form) which adds the property that ownership of the server database does not facilitate impersonation. That seems sufficient. > Can anyone suggest a well reviewed, unpatented, protocol that > has the desired properties? SRP, augmented PDM, both are good and unpatented, but SPEKE claims dominion over all of them. Despite the fact that DH-EKE predates it, and DH is the foundational technology. Thus, most people think the patent is silly nonsense, but are unwilling to test it by (say) including full SRP support in a popular and successful software product. Of course, my assumptions about there being no such products are exactly that. If there are such products I would be very interested to hear about them. ... BTW, in case it isn't obvious, as I wrote this mail I was referencing the Kaufman, Perlman and Speciner 'Network Security' book for verification. I had a close encounter with the politics of this patent a couple of years ago though, and have directly observed its chilling effect. salaam-shalom 2005-03-08 @ 13:28 -0800 - -- G. Hopper, there were a thousand subterfuges = 353 2048R/49AFAFC8 472B 0E78 FCD8 41C1 172B 11F6 90E1 0E2A 49AF AFC8 JID: caine at unstable.nl -----BEGIN PGP SIGNATURE----- iQEVAwUBQi4ZpJDhDipJr6/IAQqjqAf+MeCDsc8XOUKPkhIcWOj8B+Nck8cIbYYD SKayJ25dhJiCdm7qzzyydL0hzqb4Jlre8WE+IxU9RZXYbfw6d8XV0kU27LMjRHIm +ppn/yo54wOVBp2lq7TLw5Wjurn4Uo8Ltestt7tdCzEgn4bPrs0c3grMQLBaEZzb axQAOszUfV3UNjz/zURnOz/AuvNYbSeJXqdq5OkRtP7Cyyb5mtfLZ+X1odCWZ4xW 7tGAS8N6RhDtC303lbgINxcrbQdUxhatVRWR2n1uCa58rWxbmO2s1DpvE4NfQTNR f/2K59Of1lExfW09boPKgLmpY8ghSBMhZB3biAON/VH5f0hjFlo4+Q== =Aw9j -----END PGP SIGNATURE----- From zooko at zooko.com Tue Mar 8 13:04:46 2005 From: zooko at zooko.com (Zooko O'Whielacronx) Date: Tue, 8 Mar 2005 17:04:46 -0400 Subject: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc Message-ID: contents of this message: "good-bye, Mnet", "The Fully Connected Topology", "Rate-Limited Structured Flood", "A Nice Slow Network", "Did you say 'BROADCAST SEARCH'?" "Persistent Tit-for-Tat == Bilateral Accounting" Dear mnet-devel and p2p-hackers: I am about to accept an exciting job that will preclude me from contributing to open source projects in the distributed file-system space. I will miss the Mnet project! Good luck without me! I'm writing the following as a record of the most advanced design that I have thought of for Mnet. (See Acknowledgements section below.) Most or all of the design written below has previously been published in different web pages, e-mail messages, and IRC transcripts, and a brief presentation I made at Privacy Enhancing Technologies Workshop 2004. The design described below is almost but not quite what is currently implemented, by myself and others, in Mnet v0.7, available at [1]. *** Design of Mnet v0.7+: I. Network connectivity -- the Fully Connected Topology I.A. Local peer database. Each node remembers the nodeId of for each node that it has ever heard of or received a message from. There is a maximum number of nodeIds, in deference to memory and computation costs (your local memory and your local computation). I don't know what that maximum number should be. If you have more than the maximum number of nodeIds in your database, you can flush some of the least-recently-alive ones. I.B. Exponential Backoff. With every peer in your db is stored a "deadness level". When the deadness level is equal to 0, that means that the most recent thing that happened is that you receive a message from that peer -- whether it was a reponse to a request of yours or if it were a request from him to you. We say that the peers with deadness level 0 are "the live peers". If a peer has deadness level 1, then that means that the most recent time that you sent a request to that peer, he didn't write back. Now, whenever you want to choose from a set of peers in order to send a request to one of them, the set you choose from is all of the deadness level 0 peers, plus with 50% probability all of the deadness level 1 peers, plus with 25% probability all of the deadness level 2 peers, and so on. Deadness level 2 means that the peer was in deadness level 1, and you chose to query him (with 50% probability), and he didn't write back again. I.C. Lookup of Peer Contact Info. When you want to find the current contact info (i.e. current IP address+port number, or current Relay Server) for a peer, you send a query to a certain number of other peers (called "MetaTrackers" when they are serving this purpose) -- a "lookup contact info" query. How many peers? Approximately log(N) where N is the number of peers in your local peer database. Which peers? You use the Chord distribution -- you query the peer closest to your target, the one closest to the point halfway around the circle from your target, the one closest to the point a quarter of the way around the circle, and cetera. Obviously, you need to publish your current contact info to *your* MetaTrackers whenever you join the network or whenever your contact info changes. Your MetaTrackers are the peer in your db which is closest to you, the peer in your db which is closest to the point halfway around the circle, etc. I.D. Discovery of New Peers. Rate-Limited Structured Flood. Every 60 minutes, you send an update to each of your MetaTrackers. That update contains the list of the peerIds of every new peer. A "new peer" for this purpose is defined as follows: you've never before announced this peer to MetaTrackers, and this peer currently has deadness level 0 in your local db. If the complete (compressed) message containing the information about the new peers would exceed 256 KB, then select a random subset of the new peers to announce in this announcement so that the message doesn't exceed 256 KB. This is a rate-limited structured flood. The flooding nature of it means that eventually you will find out about the arrival of every new peer. The structured nature of it means that it will take only log(N) time intervals before you find out, and you will receive only (;-)) log(N) separate notifications of the arrival of a new peer. (And you will send log(N) separate announcements of new peers -- one announcement to each of your MetaTrackers.) The rate-limited nature of it means that if new peers are arriving so fast that these notifications would take more than log(N)*256 KB per hour bandwidth, that instead they take up only log(N)*256 KB per hour and it takes longer for you to find out about the arrival of every new peer. I.E. Relay. You choose some peer which you can make a TCP connection to and appoint it to be your RelayServer. How you choose it, and dynamically update your choice, is complicated -- see the implementation in RelayClient.py. Whenever someone wants to send a message to you and they find it impossible to open a TCP connection to you (which is all the time when you are behind a NAT or firewall that prevents incoming TCP connections) then they send the message to your RelayServer instead. See also [2, 3, 4]. II. Filesystem. II.A. Encoding of a file. This is already described fully and succinctly in [5]. Here is a capsule summary: 1. Erasure code the file, 2. Encrypt the blocks, 3. Put the list of the Ids of the encrypted blocks into a new file named the inode, 4. Encrypt the inode, 5. The Id of the inode, combined with the secret key used for encryption are the mnetURI of the file. II.B. Push each block to the BlockServer which has an nodeId closest to the blockId (in the Chord metric). II.C. In order to download a file, given its mnetURI, you first have to download the inode, and then you have to download a sufficient number of the erasure coded blocks. For each block that you want to download, you query the BlockServer whose Id is closest to that block's Id. If he doesn't have it, then you ask the BlockServer whose Id is the next-closest. Etc. If the file is not actually reconstructable at all because there are not enough blocks present at all on the network, then this search algorithm devolves to a broadcast search. This concludes the basic description of the design of Mnet v0.7+. There are other aspects of the design that are not included here, including a metadata search facility invented by Myers Carpenter. In addition, there are many specifics or added features in the core network+filestore that are excluded from this description for brevity. *** Discussion: III. A Nice Slow Network. The deliberate pace of announcement of new peers is a feature, not a bug. For starters it is convenient to implement, because for various reasons it is easier to efficiently manage 256 KB every hour than 72 bytes every second even though they amount to the same bandwidth over the long term. However, beyond it being convenient, it is also useful for discriminating among our peers, because we don't want to start using new peers until they've been around for a while anyway. Fresh peers are more likely to disappear than older ones. In earlier versions of this system, we heard about new peers more quickly, and then we had to add logic to avoid using them until time had passed. However, beyond it being convenient and useful, it is also desirable to me, because I wanted Mnet to be more amenable to deliberate and long-term use than to urgent and impulsive use. Brad Templeton argued to me in the year 2002 that if a distributed filesystem were primarily for acquiring novelty videos, pop songs, and porn, then instant gratification would be important, but if it were primarily for acquiring classic works of literature, political and historical documents, or backup copies of your own data, then instant gratification isn't so important. His argument made an impression on me. IV. Scalability Issues and other problems. IV.A. Size of the local Peer DB. One limitation on scale is the size of the local peer db. For a modernish desktop machine, the local peer db could probably be on the order of 2^20 entries with no noticeable problem. The limit could probably be made much higher by optimizing the db. The current db is trivial -- it consists of a Python dict in memory which gets serialized by Python pickle and then written to a file every hour or so. IV.A.i. In practice, almost all peers which fall into high deadness levels will never revive. If you purge a peer from your local db and then that peer does revive and reconnect to the network, and if he sends you a request, then you will re-add him to your db just as if he were a brand new peer. So if your local peer db is too big, you could purge peers, starting with the most dead ones. IV.B. Announcement of New Peers. Each newly arrived peer will be announced to each current peer. If the rate of arrivals of new peers is sufficiently small, then it will take log(N) time intervals for all peers to learn about the new peer. My estimate is that "sufficiently small" is about 2000 new peers per hour, with the current implementation. It could doubled or quadrupled by better compression of the announcement messages. If the rate of arrival of new peers exceeds this, then the time before all peers have heard about the new peer increases proportionally to the rate. IV.C. Block store churn. There is currently no way for a block server to indicate that its store of blocks is full and that it refuses to accept new blocks being pushed into it, so you should give them to someone else. Absent this "back pressure", the stores of nodes with small storage capacity are likely to get flushed out by new publications even while the stores of nodes with large capacity are underutilized. This inefficient distribution reduces the half-life of files by some unknown constant. IV.D. Did you say "BROADCAST SEARCH"? Well, consider what would happen if you stopped searching for a block after your first query. Then we would similar likelihood of finding a block as in e.g. the Chord File System, with minimal message complexity -- a single query. The problem is that maybe the block isn't on that node but is on a nearby node (either because that node joined the network after the block was published, or because the publisher of the block wasn't yet aware of that node when he published the block). This problem can be solved in one of three ways: 1. When a new node arrives, it requests copies of all of the relevant blocks from the node(s) that it shadows. This is a bad idea for this system. 2. As nodes arrive and leave, they keep track of which other nodes they shadow, then they forward requests which might be satisfied by other nodes. Interesting possibility, but I couldn't figure out how to do it in a way that wouldn't be very complicated and still end up falling in the worst case to the third approach: 3. When a downloader doesn't find the desired block on the server closest to the blockId, it chooses whether to broaden the search and query other servers that are further from the blockId. The interesting thing about 3 is that the decision about how broad to make the search is made by the agent who has the most information about its importance (such as whether other erasure coded blocks have been found that can replace the missing block, or whether the user considers downloading this file important enough to impose additional burden on the network). This same agent that has the most information is also the one that has the incentive to want the download to succeed, so it is this agent who should choose whether or not to impose the additional burden on the network of a broader search. See also section V -- "Persistent Tit-for-Tat == Bilateral Accounting". V. Persistent Tit-for-Tat == Bilateral Accounting. Mnet v0.7+ lacks something -- an incentive mechanism to limit excessive costs imposed on the network and simultaneously to motivate users to contribute resources to the network. I was always deeply impressed with the simplicity and robustness of Bram Cohen's "Tit-for-tat" incentive mechanism for BitTorrent. Suppose we wanted a similar "tit-for-tat" mechanism for Mnet v0.7++, but we wanted the peer relationships to extend through time and across multiple files and multiple user operations. Then we would probably invent a bilateral accounting scheme for each node to keep track of how much goodness each of its peers has done for it, and to reward helpful peers. This would then turn out to be more or less identical to the "bilateral accounting" scheme that was originally invented by Jim McCoy and Doug Barnes in Mojo Nation [footnote *]. *** Acknowledgements I know that I am doomed before I start to accidentally exclude important and deserving people from this section. Sorry. This is in roughly chronological order of their earliest contributions to this design, as far as I can remember. Obviously this design owes a great debt to the original designers of its direct ancestor Mojo Nation: Jim McCoy and Doug Barnes, as well as to the Evil Geniuses -- especially Greg Smith, Bram Cohen, and Drue Lowenstern. Also: Raph Levien, Sergei Osokine, the Freenet folks -- Ian Clarke, Oskar Sandberg, and Adam Langley among others -- Justin Chapweske of Swarmcast, Brandon Wiley, Martin Peck, the Chord folks, the Pastry folks, the CAN ("Content-Addressable Network") folks, the OceanStore folks, The Mnet Hackers [7] -- Hauke Johannknecht, Jukka Santala, Myers Carpenter, Oscar Haegar, Arno Waschk, Luke Nelson -- Mark S. Miller, Bram Cohen again (and Drue Lowenstern again) with BitTorrent, the Kademlia folks, numerous contributors to the p2p-hackers mailing list and the #p2p-hackers IRC channel. Like I said -- sorry about those omissions. [footnote *] Once upon a time there was digital cash, as pioneered by David Chaum. When Jim McCoy and Doug Barnes invented Mojo Nation, they used digital cash, and added bilateral accounting so that a pair of peers wouldn't require a transaction with a central token server in order to incentivize each other. The first three employees they hired to implement Mojo Nation in 1999 were Greg Smith, Bram Cohen, and myself. (Greg might have started in 1998 -- I'm not sure.) Several of the ideas in BitTorrent -- which Bram started writing in 2001 -- can be understood as radical simplifications of ideas in Mojo Nation. One such perspective is to think of BitTorrent's tit-for-tat incentives as being time-limited, file-specific, and non-transferrable bilateral accounting. This is not condemnation of BitTorrent's ideas, but praise of them -- they demonstrate the virtue of radical simplification. [1] http://mnetproject.org/ [2] http://mnetproject.org/repos/mnet/doc/network_overview.html [3] http://mnetproject.org/repos/mnet/doc/EGTPv1_Architecture.txt [4] http://mnetproject.org/repos/mnet/doc/messages_overview.html [5] http://mnetproject.org/repos/mnet/doc/new_filesystem.html [6] http://mnetproject.org/repos/mnet/CREDITS _______________________________________________ p2p-hackers mailing list p2p-hackers at zgp.org http://zgp.org/mailman/listinfo/p2p-hackers _______________________________________________ Here is a web page listing P2P Conferences: http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From rah at shipwright.com Tue Mar 8 15:53:32 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 8 Mar 2005 18:53:32 -0500 Subject: Credit card fraud hits new high despite chip and PIN Message-ID: The Times of London March 08, 2005 Credit card fraud hits new high despite chip and PIN By Helen Nugent CREDIT and debit card fraud has soared to a record #500 million despite the introduction of new chip-and-PIN technology, it emerged today. Banks, credit card companies and shop owners hoped that the new technology would reduce fraud because a four-digit personal identification number is harder to reproduce than a signature. But far from deterring fraudsters, the new measures have encouraged criminals to steal more cards. Figures from Apacs (the Association for Payment Clearing Services) show that losses to thieves rose by 20 per cent last year, equivalent to #10 for every adult in Britain. An average of 100,000 credit and debit cards were posted to consumers every day last year. Many were intercepted by criminals, resulting in a 62 per cent rise - to #73 million - in "mail non-receipt" fraud. The sheer volume of cards sent out every day provided rich pickings for fraudsters who operate by getting their hands on plastic before it is received by the genuine customers. The banking industry says that it is working with Royal Mail to monitor card losses, identify fraud hot spots and take preventive action such as asking cardholders to collect new cards from their branch. But customers seem reluctant to pick up new cards in person. Card analysts claim that fraudsters doubled their efforts last year in the belief that chip and PIN would eventually act as an effective deterrent. Malcolm Bushell, managing director of Ingenico, Northern Europe, the world's biggest developer and supplier of chip-and-PIN technology, said: "The banks knew that 2004 would be a difficult year because fraudsters would want to fill their boots while they still could." But retailers and banks seem powerless to clamp down on credit card fraud. The theft of card details, which are then used to buy products over the phone, via mail order or over the internet - known as "card-not-present fraud" - continues to top the table of losses, soaring by 24 per cent to #150 million last year. Consumers duped by counterfeiters who illegally clone or skim cards lost nearly #130 million last year, a rise of 17 per cent. Fraud at cash machines, a favourite resort of thieves, grew at an alarming rate, up by 81 per cent to nearly #75 million Chip and PIN claims to be a sophisticated anti-fraud measure, yet there is no deadline for its implementation. Cards without the new technology are still being issued and of 141 million credit and debit cards in circulation, one in three are still the old signature-only type. Furthermore, 15 per cent of retailers have yet to install tills that accept PINs, even though retailers without chip and PIN in-store have been liable for fraudulent transactions since January 1 this year. The British Retail Consortium said: "This time next year, we should be in more of a position to see the impact that chip and PIN has had on card fraud." Many shops that have up-to-date tills still do not insist that customers use PINs to authorise transactions. "Fraudsters can disable the chip, for instance by smacking it with a hammer, and pay for goods using a signature," Mr Bushell said. "There is a case for saying that a signature should not be accepted." Apacs estimates that, without chip and PIN, losses would reach #800 million by the end of this year. But it accepts that the battle against fraudsters is still to be won. Sandra Quinn, its director of corporate communications, said: "The more of us use a PIN, the harder a criminal's life becomes. But clearly they will keep targeting cards. Many people have made predictions on where the fraudsters will attack next, but we have long foreseen that we need to keep cards secure in all environments." Card identity fraud rose by 22 per cent during 2004, according to Apacs. Credit reference agencies say that this alternative type of fraud is likely to grow even more if chip and PIN does prove successful. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From eugen at leitl.org Tue Mar 8 11:00:52 2005 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 8 Mar 2005 20:00:52 +0100 Subject: [linux-elitists] Re: MCI boots send-safe (Register) -- adds a net of 11 more spam hosts (fwd from kmself@ix.netcom.com) Message-ID: <20050308190050.GA13336@leitl.org> ----- Forwarded message from "Karsten M. Self" ----- From eugen at leitl.org Tue Mar 8 23:47:14 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 9 Mar 2005 08:47:14 +0100 Subject: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com) Message-ID: <20050309074714.GC13336@leitl.org> ----- Forwarded message from Zooko O'Whielacronx ----- From emc at artifact.psychedelic.net Wed Mar 9 12:14:42 2005 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Wed, 9 Mar 2005 12:14:42 -0800 (PST) Subject: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com) In-Reply-To: <20050309074714.GC13336@leitl.org> Message-ID: <200503092014.j29KEgiC020750@artifact.psychedelic.net> Zooko writes: > I am about to accept an exciting job that will preclude me from > contributing to open source projects in the distributed file-system > space. > I will miss the Mnet project! Good luck without me! Is there a network currently running? At one time, I had 5 gig of Mnet blockstore, but when months went by with no metatracking, and apparently, no running network, I grew bored and rm'ed it. > I'm writing the following as a record of the most advanced design that > I have thought of for Mnet. [Clippage]] Yes, well. My thoughts on this, and other distributed filesystems, are as follows. We have the following useful technologies. Swarmed downloads, erasure coding, distributed filesystem with global namespace, encryption, routing, accounting, and search. We have various systems which have implemented a various subsets of these features, with varying degrees of efficiency. The killer technology amongst all these is obviously swarmed downloading, which, efficiently implemented in Bittorrent, currently accounts for a third of network bandwidth. The two systems which implement the most of the above technologies, Mnet and Freenet, while theoretically lovely, have at most a niche following, and are cumbersome to set up and use, with frequent "issues" in their protocols and codebase. Now, I think we can all agree that it would be lovely to have a distributed filesystem, with a global namespace, that anyone can put stuff in, and take stuff out of, which guarantees anonymity for both producers and consumers of content, swarms downloads, has an redundant distributed encrypted backing store that lasts forever, is easily and quickly searched, can be instantly set up by anyone who wishes to use it, never breaks, and starves users who unreasonably leech large amounts of resources without reciprocating. BUT, given that bittorrent is a wild success, which people ACTUALLY USE, would it not make more sense to create such a system by augmenting bittorrent with the technologies it presently lacks, than by continuing development on other systems, many of them bloated and buggy, which have been around for years without managing to be made to work well, or attracting large numbers of happy and satisfied customers? If you had a thousand hours of genius programmer time, would you spend it embracing and extending Bittorrent, or shoveling through the indecipherable bowels of legacy Mnet and Freenet code? I think Mnet and Freenet were wonderful testbeds, which taught us all a lot about what does and doesn't work in grandiose P2P schemes. But Bittorrent is where the users are, and software without users is like network television programming without viewers. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From camera_lumina at hotmail.com Wed Mar 9 09:19:05 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 09 Mar 2005 12:19:05 -0500 Subject: SHA1 broken? In-Reply-To: <20050308192648.GA4762@positron.jfet.org> Message-ID: Ah. You meant as a principal in general. Of course the prevailing wisdom is to go from FPGAs to ASICs when you have heavy tasks. In Telecom equipment, however, there's a few issues that basically 'require' FPGAs. First, the standards change quite a bit, depending on which area you're in. For instance, RPR didn't really get settled until very recently. Second, your customers may ask for "more" or different kinds of functionality, so you may have a new release of firmware to address that. Putting the framing and/or PM on an FPGA while keeping the guts (eg, packet processing) on the main ASIC/processor allows you to swap out the trivial without a major heart transplant. In addition, there's probably the far more important issue of design cycle times. ASICs will take (at the very minimum) 18 months to create, and if you make a mistake early on and don't catch, you have to start all over again. For some fields that's just unacceptable. Then again, if you're looking for sheer, brute performance and design cycle times are not a limiting factor, ASICs are often the way to go. Even in a Variola Suitcase, however, I'd bet some of the trivial functions are off-loaded to an FPGA, though, for reasons above. -TD >From: "Riad S. Wahby" >To: cypherpunks at al-qaeda.net >Subject: Re: SHA1 broken? >Date: Tue, 8 Mar 2005 13:26:48 -0600 > >Tyler Durden wrote: > > Well, maybe I misunderstand your statement here, but in Telecom most >heavy > > iron has plenty of FPGAs, and as far as I understand it, they more or >less > > have to. > >Have to in what sense? If they're constantly reconfiguring the FPGAs >(new software revs, or some sort of evolutionary "learning" process--- >the latter not likely in telecom, of course), sure, they have to be on >reprogrammable structures. > >If, on the other hand, you're building a custom hash cracking machine, >you don't need to reconfigure your gates. You could design your >parallelized SHA1 cracking machine and dump it onto a bunch of FPGAs, >but if you really have unlimited resources you take the plunge into >ASICs, at which point you can tighten your timing substantially. > >-- >Riad S. Wahby >rsw at jfet.org From rsw at jfet.org Wed Mar 9 11:12:10 2005 From: rsw at jfet.org (Riad S. Wahby) Date: Wed, 9 Mar 2005 13:12:10 -0600 Subject: SHA1 broken? In-Reply-To: References: <20050308192648.GA4762@positron.jfet.org> Message-ID: <20050309191210.GB410@positron.jfet.org> Tyler Durden wrote: > Then again, if you're looking for sheer, brute performance and design cycle > times are not a limiting factor, ASICs are often the way to go. Even in a > Variola Suitcase, however, I'd bet some of the trivial functions are > off-loaded to an FPGA, though, for reasons above. Oh, sure. Buy yourself the flexibility of the FPGA, e.g., by putting an FPGA on a huge DMA pipe. But don't count on the FPGA to do the brunt of the crunching once you've settled on an implementation. Note also that you can probably buy yourself lots of performance without increasing the design cycle time all that much by simply synthesizing (via Synopsys or the like) the same Verilog with which you would have programmed the FPGA. Buy (or pirate if you can; it's not like you're selling these things, so who cares about the IP issues?) a set of standard logic cells in the smallest process you can afford so that even the lion's share of the layout can be done in a completely automated fashion, and you're basically all set. -- Riad S. Wahby rsw at jfet.org From ham at montana.com Wed Mar 9 12:16:49 2005 From: ham at montana.com (ham at montana.com) Date: Wed, 09 Mar 2005 15:16:49 -0500 Subject: American Service PKM Ven. Message-ID: <776875898.62093093436317@montana.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 959 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Bundoora.gif Type: image/gif Size: 8644 bytes Desc: not available URL: From dpvcyvhtigpeux at gsproductions.net Wed Mar 9 08:29:35 2005 From: dpvcyvhtigpeux at gsproductions.net (Daisy Wilcox) Date: Wed, 09 Mar 2005 17:29:35 +0100 Subject: Can you afford to ignore SmallCaps? In-Reply-To: <%RND_ALFABET@idfomaha.com> References: <%RND_ALFABET@idfomaha.com> Message-ID: <575490443100.MTP55045@accede.golfswing.com> Company Name: Anywhere MD, Inc Symbol: ANWM Shares issued and outstanding: 25,O0O,00O Shares in Public Float: 3,OOO,0OO Current|y trading at: O.O8 Major Breaking news! Anywhere MD INC. (ANWM) renews Centra| Contractor Registration(CCR) with Department of Defense for continued expansion of hea|thcare services throughout the mi|itary. Press Release March 23rd, 2O05 Anywhere MD INC. is now positioned to continue its�� expansion of Handheld and other Mobi|e E|ectronic Medical Record (EMR) software applications into the Military. It is very difficu|t for Mi|itary Medica| Personnel to give the best qua|ity of care in the field without the latest medica| history of the patient. Using the proprietary techno|ogies of Anywhere MD INC ��In the Field,�� wi|l ensure that the Medica| Personnel have the latest and most up to date information at the point of care, wherever that may be. Anywhere MD INC. is dedicated to bringing the |atest mobi|e healthcare techno|ogies from the private sector into the military for the benefit of our service men and women. About Anywhere MD - www anywheremd com Anywhere MD INC. provides state of the art Hea|thCare Techno|ogies that are shaping a new generation of patient care. Anywhere MD's expertise in c|inical documentation for physicians provides a broad range of techno|ogy products to improve productivity for hea|thcare providers and enable them to diagnose, treat and manage patient information at the highest |eve|. Anywhere MD INC deve|ops, markets, sells and supports proprietary software app|ications for mobile handhe|d devices. These mobile applications provide the physician with the most recent and accurate healthcare information at the "Point Of Care.?This techno|ogy eliminates a confusing and tedious `paper trai|?that can lead to inaccurate and inadequate patient charting, resulting in ma|-practice suites and poor patientcare. AMD is headquartered on the centra| coast of California and is committed to serving thousands of healthcare professiona|s across the USA, Canada, Europe, Asia and Australia. Key Investment High|ights: Strong senior management team. Key intellectua| property. Loyal customer base with secure |ong-term contracts in place. Profitabi|ity and growth in 20O4. Large upside potential with proper funding in place. Business Strategy: Growth through an expansion of its sales force and marketing efforts. Further invest in Software |icensing and deve|opment. Growth through acquisitions and strategic a||iances within the industry. Wil| ANWM exp|ode higher as more and more investors become aware of the stOck? If you think so, you may not want to wait until it is too late. Remember, timing your trade is critical. Good Luck and Successful Trading. Information within this pub|ication contains future |ooking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements that express or invo|ve discussions with respect to predictions, expectations, be|iefs, p|ans, projections, objectives, goals, assumptions or future events or performance are not statements of historica| fact and may be future |ooking statements. Future |ooking statements are based on expectations, estimates and projections at the time the statements are made that invo|ve a number of risks and uncertainties which could cause actual results or events to differ materia|ly from those presently anticipated. Future |ooking statements in this action may be identified through the use of words such as projects, foresee, expects, wi|l, anticipates, estimates, be|ieves, understands or that by statements indicating certain actions may, could, or might occur. These future-|ooking statements are based on information current|y availab|e and are subject to a number of risks, uncertainties and other factors that could cause ANWM's actua| resu|ts, performance, prospects or opportunities to differ materially from those expressed in, or implied by, these future-|ooking statements. As with many microcap st0cks, today's company has additional risk factors that raise doubt about its ability to continue as a going concern. ANWM is not a reporting company registered under the Securities Act of 1934 and hence there is |imited pub|ic information availab|e about the company. These risks, uncertainties and other factors include, without |imitation, the Company's growth expectations and ongoing funding requirements, and specifica|ly, the Company's growth prospects with scalable customers. Other risks include the Company's |imited operating history, the Company's history of operating |osses, consumers'acceptance, the Company's use of licensed techno|ogies, risk of increased competition, the potential need for additiona| financing, the conditions and terms of any financing that is consummated, the |imited trading market for the Company's securities, the possible vo|ati|ity of the Company's st0ck price, the concentration of ownership, and the potentia| fluctuation in the Company's operating results. The publisher of this report does not represent that the information contained in this message states a|| material facts or does not omit a materia| fact necessary to make the statements therein not mis|eading. Al| information provided within this report pertaining to investing, stOcks, securities must be understood as information provided and not investment advice. The pub|isher of this news|etter advises a|| readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in st0cks featured within this report. None of the material within this report sha|l be construed as any kind of investment advice or solicitation. Many of these companies are on the verge of bankruptcy. You can lose a|| your money by investing in this stOck. The publisher of this report is not a registered investment expert. Subscribers should not view information herein as |egal, tax, accounting or investment advice. Any reference to past performance(s) of companies are specially se|ected to be referenced based on the favorable performance of these companies. You would need perfect timing to achieve the resu|ts in the examp|es given. There can be no assurance of that happening. Remember, as a|ways, past performance is not indicative of future results and a thorough due diligence effort, inc|uding a review of a company's fi|ings at sec gov or edgar-online com when available, should be completed prior to investing. All factual information in this report was gathered from public sources, including but not |imited to Company Websites and Company Press Re|eases. The pub|isher disc|oses the receipt of Fifteen thousand do||ars from a third party, not an officer, director, or affiliate shareholder of the company for the preparation of this online report. Be aware of an inherent conflict of interest resulting from such compensation due to the fact that this is a paid publication. The publisher of this report be|ieves this information to be re|iab|e but can make no assurance as to its accuracy or completeness. Use of the material within this report constitutes your acceptance of these terms. If you wish to stop future mai|ings, or if you fee| you have been wrongfu||y placed in our membership, please go here or send a b|ank e mail with No Thanks in the subject to st0ck61 @ yahoo.com From s.schear at comcast.net Wed Mar 9 22:06:45 2005 From: s.schear at comcast.net (Steve Schear) Date: Wed, 09 Mar 2005 22:06:45 -0800 Subject: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com) In-Reply-To: <200503092014.j29KEgiC020750@artifact.psychedelic.net> References: <20050309074714.GC13336@leitl.org> <200503092014.j29KEgiC020750@artifact.psychedelic.net> Message-ID: <6.0.1.1.0.20050309214756.04ed6d38@mail.comcast.net> At 12:14 PM 3/9/2005, Eric Cordian wrote: >If you had a thousand hours of genius programmer time, would you spend it >embracing and extending Bittorrent, or shoveling through the >indecipherable bowels of legacy Mnet and Freenet code? I worked with Bram and Zooko at Mojo Nation (where both BT and Mnet got their respective genesis) and was frankly surprised when the MPAA was so easily able to target and put out of commission BT's trackers. The exposure of the trackers was a prominent topic of MN planning discussions and its odd that precautions, like distributing the tracker functions into clients or hiding them inside a TOR-like proxy network weren't taken earlier. Steve From rsortlttkqzgp at adv-gmbh.de Wed Mar 9 14:55:57 2005 From: rsortlttkqzgp at adv-gmbh.de (Marylou Oleary) Date: Thu, 10 Mar 2005 01:55:57 +0300 Subject: Run-away growth in an up and down year Message-ID: <856069751416.MBX24766@unesco.apexcanvas.com> Secured Data Inc. (SCRE) Emerging Leader In Chinese Export of Pharmaceutica|s! Total Shares Issued & Outstanding: 9O,OOO,0OO EST Current Price: O.O9 2O04 Success lead into an exciting 20O5. Secured Data Inc. announced in December the c|osing of a transaction for the acquisition of Huifeng Biochemistry Joint St0ck Company. Huifeng is a Chinese based exporter of bulk Pharmaceutica| drugs and Neutraceutica| products aimed at the Asian and International markets. Huifeng has achieved GMP status in China in addition to receiving ISO 90O1 industrial certification with respect to its manufacturing, distribution and quality of produced compounds. Included in the stable of compounds currently produced by Huifeng are: Rutin NF11, Troxerutin Dab99, Quercetin 98%, L-Rhamnone, Diosimin Ep4, Bel|adonna Ep4, Si|ymarin dab10, Hesperidin, Matrine, Oxymatrine, phytosterol, Stigmasterol, Pueraria, Reseverator|, Naringin, Baicalin Berberine Hydroch|orrde, 10-Deacetyl Baccatin, Pac|itaxo|, Gikgo biloba P.E., Grape seed P.E., Epimedium Extract, Pueraria Lobata Extract, Magnolia P.E., Red C|over P.E., Ch|orogenic acid, Gynostema Extract, Fructucs Aurantii P.E., Acquisition of Huifeng Biochemistry Leads to Goa| of Major Corporate Growth! Huifeng Biochemistry was formed in the year 20O0 with a view to become a cost effective producer and supp|ier of bulk Pharmaceutical and Neutraceutical products worldwide. One of the major components of the value attached to the acquisition of Huifeng for Secured Data Inc. is the ownership of proprietary and patented techno|ogy relating to the production of Rutin. Rutin is a member of biof|avonoids, a large gr0up of pheno|ic secondary metabo|ites of plants that inc|ude more than 2,00O different known chemica|s. Biof|avonoids such as Quercetin, Rutin, and Hesperidin are important nutrients due to their ability to strengthen and modu|ate the permeability of the wa||s of the blood vesse|s including capil|aries. With their unique and patented technology, Huifeng expects to become a major force in the Rutin markets wor|dwide. Secured Data Inc. stands to benefit from this acquisition through the ownership of proprietary technology, strong corporate re|ations with Chinese governmental agencies, certified manufacturing faci|ities and access to growing markets in which to sell its drug products. Estimated revenues for 2OO4-2005 are more then $10O milli0n USD Further developments of the transaction and the deve|opment at Huifeng shou|d be expected in the near future. Conclusion: The Examp|es Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is SCRE Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this One Trade Monday! Go SCRE. Penny St0cks are considered high|y speculative and may be unsuitable for a|| but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 30OO dol|ars to distribute this report. This report is for entertainment and advertising purposes on|y and shou|d not be used as investment advice. If you wish to stop future mai|ings, or if you feel you have been wrongfully placed in our membership, please go here or send a blank e mai| with No Thanks in the subject to st0ck63 @yahoo.com From eugen at leitl.org Thu Mar 10 00:15:35 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 10 Mar 2005 09:15:35 +0100 Subject: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com) In-Reply-To: <6.0.1.1.0.20050309214756.04ed6d38@mail.comcast.net> References: <20050309074714.GC13336@leitl.org> <200503092014.j29KEgiC020750@artifact.psychedelic.net> <6.0.1.1.0.20050309214756.04ed6d38@mail.comcast.net> Message-ID: <20050310081535.GA13336@leitl.org> On Wed, Mar 09, 2005 at 10:06:45PM -0800, Steve Schear wrote: > I worked with Bram and Zooko at Mojo Nation (where both BT and Mnet got > their respective genesis) and was frankly surprised when the MPAA was so > easily able to target and put out of commission BT's trackers. The Why? BT is designed with zero privacy in mind. > exposure of the trackers was a prominent topic of MN planning discussions > and its odd that precautions, like distributing the tracker functions into > clients or hiding them inside a TOR-like proxy network weren't taken You can post BT links on a P2P network. > earlier. -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From albright at illinois.com Thu Mar 10 09:33:59 2005 From: albright at illinois.com (albright at illinois.com) Date: Thu, 10 Mar 2005 12:33:59 -0500 Subject: MI Com. Message-ID: <628634426.80490871623121@illinois.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 798 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: paling.gif Type: image/gif Size: 7106 bytes Desc: not available URL: From otgauln at 1designsource.com Thu Mar 10 17:58:27 2005 From: otgauln at 1designsource.com (Riley Aguilar) Date: Thu, 10 Mar 2005 19:58:27 -0600 Subject: This company is cranking up the PR in high gear In-Reply-To: References: Message-ID: <106189292143.SEQ44012@crosswort.auraorange.every1.net> Secured Data Inc. (SCRE) Emerging Leader In Chinese Export of Pharmaceuticals! Tota| Shares Issued & Outstanding: 9O,OO0,O0O EST Current Price: O.O9 2O04 Success lead into an exciting 2005. Secured Data Inc. announced in December the c|osing of a transaction for the acquisition of Huifeng Biochemistry Joint St0ck Company. Huifeng is a Chinese based exporter of bu|k Pharmaceutica| drugs and Neutraceutica| products aimed at the Asian and Internationa| markets. Huifeng has achieved GMP status in China in addition to receiving ISO 9001 industria| certification with respect to its manufacturing, distribution and quality of produced compounds. Included in the stable of compounds currently produced by Huifeng are: Rutin NF11, Troxerutin Dab99, Quercetin 98%, L-Rhamnone, Diosimin Ep4, Belladonna Ep4, Silymarin dab10, Hesperidin, Matrine, Oxymatrine, phytostero|, Stigmasterol, Pueraria, Reseveratorl, Naringin, Baica|in Berberine Hydrochlorrde, 10-Deacetyl Baccatin, Paclitaxo|, Gikgo biloba P.E., Grape seed P.E., Epimedium Extract, Pueraria Lobata Extract, Magno|ia P.E., Red Clover P.E., Chlorogenic acid, Gynostema Extract, Fructucs Aurantii P.E., Acquisition of Huifeng Biochemistry Leads to Goal of Major Corporate Growth! Huifeng Biochemistry was formed in the year 2000 with a view to become a cost effective producer and supplier of bu|k Pharmaceutica| and Neutraceutica| products wor|dwide. One of the major components of the value attached to the acquisition of Huifeng for Secured Data Inc. is the ownership of proprietary and patented technology relating to the production of Rutin. Rutin is a member of bioflavonoids, a |arge gr0up of pheno|ic secondary metabolites of p|ants that include more than 2,OO0 different known chemica|s. Bioflavonoids such as Quercetin, Rutin, and Hesperidin are important nutrients due to their ability to strengthen and modulate the permeabi|ity of the wa||s of the b|ood vesse|s including capil|aries. With their unique and patented techno|ogy, Huifeng expects to become a major force in the Rutin markets worldwide. Secured Data Inc. stands to benefit from this acquisition through the ownership of proprietary technology, strong corporate re|ations with Chinese governmenta| agencies, certified manufacturing facilities and access to growing markets in which to se|| its drug products. Estimated revenues for 2004-20O5 are more then $1O0 mil|iOn USD Further deve|opments of the transaction and the deve|opment at Huifeng shou|d be expected in the near future. Conclusion: The Examp|es Above Show The Awesome, Earning Potentia| of Little Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is SCRE Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this One Trade Monday! Go SCRE. Penny St0cks are considered highly specu|ative and may be unsuitab|e for a|| but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 3O00 do|lars to distribute this report. This report is for entertainment and advertising purposes only and should not be used as investment advice. If you wish to stop future mai|ings, or if you fee| you have been wrongfully placed in our membership, please go here or send a b|ank e mail with No Thanks in the subject to st0ck66 @ yahoo.com From jamesd at echeque.com Thu Mar 10 22:26:01 2005 From: jamesd at echeque.com (James A. Donald) Date: Thu, 10 Mar 2005 22:26:01 -0800 Subject: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com) In-Reply-To: <200503092014.j29KEgiC020750@artifact.psychedelic.net> References: <20050309074714.GC13336@leitl.org> Message-ID: <4230C979.12666.9C38AEA@localhost> -- On 9 Mar 2005 at 12:14, Eric Cordian wrote: > Now, I think we can all agree that it would be lovely to have > a distributed filesystem, with a global namespace, that > anyone can put stuff in, and take stuff out of, which > guarantees anonymity for both producers and consumers of > content, swarms downloads, has an redundant distributed > encrypted backing store that lasts forever, is easily and > quickly searched, can be instantly set up by anyone who > wishes to use it, never breaks, and starves users who > unreasonably leech large amounts of resources without > reciprocating. Bittorrent, alone, starves users who leach without reciprocating, but only in certain very limited ways. As a result of that and swarming Bittorrent has far more bandwidth available than any other file sharing network. You can download big files faster. If you want to download big files, use Bittorrent, or hell will freeze over before your files complete. But it does not have more files available, indeed it has fewer, because there is no reward to users for making a wide range of files available. The enormous success of bittorrent, and its limitations, should tell us that the principle of rewarding uploaders and storers, and starving leachers, is pretty much central to the success of a protocol and its software. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG MHH97gJAm7xaefDsVkckpP3M1T3kFYcHHE4T6q6e 4sy0PVrzWWflVPEeAHnZN9+Cf4YNPT7P4feuRNy00 From s.schear at comcast.net Thu Mar 10 22:48:12 2005 From: s.schear at comcast.net (Steve Schear) Date: Thu, 10 Mar 2005 22:48:12 -0800 Subject: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com) In-Reply-To: <20050310081535.GA13336@leitl.org> References: <20050309074714.GC13336@leitl.org> <200503092014.j29KEgiC020750@artifact.psychedelic.net> <6.0.1.1.0.20050309214756.04ed6d38@mail.comcast.net> <20050310081535.GA13336@leitl.org> Message-ID: <6.0.1.1.0.20050310123207.04ed8d90@mail.comcast.net> At 12:15 AM 3/10/2005, Eugen Leitl wrote: > > I worked with Bram and Zooko at Mojo Nation (where both BT and Mnet got > > their respective genesis) and was frankly surprised when the MPAA was so > > easily able to target and put out of commission BT's trackers. The > >Why? BT is designed with zero privacy in mind. And this was a profound error, IMHO. One of the epiphanies from my work at MN was that a secrecy-oriented proxy network development and successful deployment needed to precede P2P file sharing if such networks were to survive determined technical and legal challenges. End users often care little about what 'under the hood' of their P2P app only that they can get the content conveniently and they are not subjected to annoyances like spy or adware. > > exposure of the trackers was a prominent topic of MN planning discussions > > and its odd that precautions, like distributing the tracker functions into > > clients or hiding them inside a TOR-like proxy network weren't taken > >You can post BT links on a P2P network. But trackers must still be widely accessible by the general population of BT users and can you offer the content or obtain it without likely identification? Steve From miller at essex.com Fri Mar 11 06:38:51 2005 From: miller at essex.com (miller at essex.com) Date: Fri, 11 Mar 2005 09:38:51 -0500 Subject: Virtual JX Net. Message-ID: <398540850.16748859203546@essex.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 905 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: jets.gif Type: image/gif Size: 4949 bytes Desc: not available URL: From morse at maryland.com Fri Mar 11 07:02:37 2005 From: morse at maryland.com (morse at maryland.com) Date: Fri, 11 Mar 2005 10:02:37 -0500 Subject: HAQ Env. Message-ID: <584764199.43648895088219@maryland.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1364 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: goods.gif Type: image/gif Size: 8058 bytes Desc: not available URL: From morlockelloi at yahoo.com Fri Mar 11 10:48:20 2005 From: morlockelloi at yahoo.com (Morlock Elloi) Date: Fri, 11 Mar 2005 10:48:20 -0800 (PST) Subject: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com) In-Reply-To: <20050311114252.GO17303@leitl.org> Message-ID: <20050311184820.7904.qmail@web40614.mail.yahoo.com> > If you want to be invisible to lawyers, you have to use something else. Whoever wants to design something 'else' should first see Monty Python's "How not to be seen" sketch (or was it "Importance of not being seen" ?) It applies pretty well to all current techniques for moving unpaid copyrighted content. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __________________________________ Do you Yahoo!? Make Yahoo! your home page http://www.yahoo.com/r/hs From eugen at leitl.org Fri Mar 11 03:42:52 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 11 Mar 2005 12:42:52 +0100 Subject: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com) In-Reply-To: <6.0.1.1.0.20050310123207.04ed8d90@mail.comcast.net> References: <20050309074714.GC13336@leitl.org> <200503092014.j29KEgiC020750@artifact.psychedelic.net> <6.0.1.1.0.20050309214756.04ed6d38@mail.comcast.net> <20050310081535.GA13336@leitl.org> <6.0.1.1.0.20050310123207.04ed8d90@mail.comcast.net> Message-ID: <20050311114252.GO17303@leitl.org> On Thu, Mar 10, 2005 at 10:48:12PM -0800, Steve Schear wrote: > >Why? BT is designed with zero privacy in mind. > > And this was a profound error, IMHO. One of the epiphanies from my work at It was a deliberate decision on Bram Cohen's part. BT is a very useful medium to deliver software updates, movies und most for what there are currently broadcast media for. If you want to be invisible to lawyers, you have to use something else. (Or at least run BT on a large zombie cloud, so you have plausible deniability). > MN was that a secrecy-oriented proxy network development and successful > deployment needed to precede P2P file sharing if such networks were to > survive determined technical and legal challenges. End users often care If a network has been declared illegal, and you're a part of that network, and somebody receives packets from you which are part of IP-protected binary blob, and your ISP rats on you, your ass is grass with the right kind of IP nazi legislation. Obvously, the only way to prevent that from happening is not be part of that network, not make your ISP rat on you -- or, much better, do not let that legislation happen at all. If it does happen, freedom becomes illegal. > little about what 'under the hood' of their P2P app only that they can get > the content conveniently and they are not subjected to annoyances like spy > or adware. > > >> exposure of the trackers was a prominent topic of MN planning discussions > >> and its odd that precautions, like distributing the tracker functions > >into > >> clients or hiding them inside a TOR-like proxy network weren't taken > > > >You can post BT links on a P2P network. > > But trackers must still be widely accessible by the general population of > BT users and can you offer the content or obtain it without likely > identification? Web pages have static addresses in DNS. Search on P2P in dynamic IP is much more ephemeral, and requires ISPs to keep track of (customer IPv4 time_period) tuples long enough so that their logs can be subpoenaed. -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From s.schear at comcast.net Fri Mar 11 12:58:12 2005 From: s.schear at comcast.net (Steve Schear) Date: Fri, 11 Mar 2005 12:58:12 -0800 Subject: [p2p-hackers] good-bye, Mnet, and good luck. I'm going commercial! plus my last design doc (fwd from zooko@zooko.com) In-Reply-To: <20050311114252.GO17303@leitl.org> References: <20050309074714.GC13336@leitl.org> <200503092014.j29KEgiC020750@artifact.psychedelic.net> <6.0.1.1.0.20050309214756.04ed6d38@mail.comcast.net> <20050310081535.GA13336@leitl.org> <6.0.1.1.0.20050310123207.04ed8d90@mail.comcast.net> <20050311114252.GO17303@leitl.org> Message-ID: <6.0.1.1.0.20050311124931.04e62888@mail.comcast.net> At 03:42 AM 3/11/2005, Eugen Leitl wrote: >*** PGP Signature Status: good >*** Signer: Eugen Leitl (makes other keys obsolete) >(Invalid) >*** Signed: 3/11/2005 3:42:52 AM >*** Verified: 3/11/2005 12:49:27 PM >*** BEGIN PGP VERIFIED MESSAGE *** > >On Thu, Mar 10, 2005 at 10:48:12PM -0800, Steve Schear wrote: > > > >Why? BT is designed with zero privacy in mind. > > > > And this was a profound error, IMHO. One of the epiphanies from my > work at > >It was a deliberate decision on Bram Cohen's part. BT is a very useful medium >to deliver software updates, movies und most for what there are currently >broadcast media for. I didn't say that Bram didn't do this on purpose, I just think it was a mistake in judgement. >If you want to be invisible to lawyers, you have to use something else. or run BT-like apps within something else. For BT clients its straightforward to run most (e.g., Azureus) via a proxy that keeps no logs (e.g., Metropipe). For Trackers its more difficult. All I am saying is that Brahm should have paid a bit more attention to tracker protection. >(Or at least run BT on a large zombie cloud, so you have plausible >deniability). Like TOR/I2P. > > MN was that a secrecy-oriented proxy network development and successful > > deployment needed to precede P2P file sharing if such networks were to > > survive determined technical and legal challenges. End users often care > >If a network has been declared illegal, and you're a part of that network, >and somebody receives packets from you which are part of IP-protected binary >blob, and your ISP rats on you, your ass is grass with the right kind of IP >nazi legislation. > >Obvously, the only way to prevent that from happening is not be part of that >network, not make your ISP rat on you -- or, much better, do not let that >legislation happen at all. Its quite unlikely, at least in the U.S. that networks (e.g., those operated in a truly distributed fashion) will be declared illegal. Its even less likely that such networks will enable ISPs to capture anything significant about your activities. > > But trackers must still be widely accessible by the general population of > > BT users and can you offer the content or obtain it without likely > > identification? > >Web pages have static addresses in DNS. Search on P2P in dynamic IP is much >more ephemeral, and requires ISPs to keep track of (customer IPv4 time_period) >tuples long enough so that their logs can be subpoenaed. Using DNS to resolve the addresses of future trackers is probably a fools errand. Steve From cymjfhkebnw at alive-inc.org Fri Mar 11 13:31:57 2005 From: cymjfhkebnw at alive-inc.org (Chauncey Ferris) Date: Fri, 11 Mar 2005 16:31:57 -0500 Subject: The right investment becomes clear In-Reply-To: References: Message-ID: <560321397702.ARQ13899@novitiate.astd-vos.org> Rochester, NY, Apr 11, 2005 (M2 PRESSWIRE via COMTEX) -- OTCStockExchange.coms "Stock Watch Alert" this morning are Wysak Petro|eum (WYSK), Key Energy Services, Inc. (Pink Sheets: KEGS), Medify So|utions (MFYS), Sequoia Interests Corporation (SQNC). Wysak Petro|eum (WYSK) Current Price: 0.24 Wysak Petro|eum announces the signing of a Letter of Intent with the European Commission Baltic Renewab|e Energy Centre (EC BREC) to assist Wysak Petroleum in the development of the Wysak Wind Power Project. EC BREC and Wysak have signed a LOI in respect to the deve|opment of a ful|-sized Commercial Wind Power Project in Europe. This letter states that EC BREC can support Wysak in matters such as financial structuring and investment, regulatory issues, government po|icies, negotiations, wind technologies, and other aspects re|ating to Wind Power. About the Wysak Wind Project This deve|opment wi|| be up to a maximum 90Mw in size and cost upwards of $120 mi|li0n in deve|opment expenditures. Once completed, this Wind Park wil| supp|y upwards of 170,000 Mw of e|ectricity annua|ly for Poland and the European Community. This is enough green energy to supp|y upwards of 25,000 homes with e|ectricity and offset near|y 170,000 tonnes of Greenhouse gases. Total gross e|ectric sa|es over a 20-year period are estimated at over $450 mi||i0n for a project this size. About the EC Baltic Renewab|e Energy Centre The mission of European Commission-founded EC BREC is to stimulate the development of renewab|e energy sources (RES) in Po|and through the construction of RES projects, the deve|opment of innovative techno|ogies, and the creation of relevant policies, strategies and p|ans. To fulfi|| the mission, EC BREC uses its own research capabi|ities and cooperates with partner institutions from the EU, other countries, and internationa| organizations. About Wysak Petro|eum Wysak is a diversified energy company whose goal is to identify and deve|op traditional fossi| fuel sites, as we|l as clean air alternative energy producing technologies. Wysak controls one Wyoming Federal oi| & gas lease in the Bighorn Basin region and another in the Green River Basin. Its two Wyoming State |eases are located 45 miles apart within the massive CoalBed Methane p|ay area of the Powder River Basin. Numerous large petro|eum and exploration firms operate near to al| of these properties; they inc|ude ExxonMobi|e (XOM), Wi|liams Gas (WMB), and Western Gas (WGR) among others. Co||ectively, over 26,000 wells produced 54.7 mi|lion barrels of oil and 1.75 trillion cubic feet of natura| gas in Wyoming Conclusion: The Examp|es Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Tuesday! Go WYSK. Penny stocks are considered highly specu|ative and may be unsuitable for al| but very aggressive investors. This Profile is not in any way affi|iated with the featured company.We were compensated 3000 dollars to distribute this report. This report is for entertainment and advertising purposes on|y and should not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongfu|ly placed in our membership, please go here or send a b|ank e mail with No Thanks in the subject to st0ck62 @yahoo.com From camera_lumina at hotmail.com Fri Mar 11 13:39:56 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 11 Mar 2005 16:39:56 -0500 Subject: FW: Managed Security Services Webinar from Light Reading Message-ID: >Dear Colleague, > >As an industry professional, you may be interested to know about a coming >online event being presented by Light Reading (www.lightreading.com). This >free Web seminar - "Managed Security Services: Hidden Promise" - will >evaluate recent changes in this critical market. > >This Webinar will discuss ways for carriers to optimize profits when >offering managed security services. It will examine ways of maximizing >revenues while minimizing capital and operating costs. It will also >identify key customer requirements and show how they can be addressed. > >The following topics will be discussed: > >- How combinations of services can be offered to enterprise and high-end >customers >- How this can be done cost effectively >- How managed security service providers can offer advanced functionality >and features >- How they can simplify reporting processes for customers >- How they can create less time-consuming operating environments >- How the market for managed security services is evolving > >Join us on Tuesday, March 22, at 12:00 p.m. New York / 5:00 p.m. London >time, for this live Webinar moderated by Jeff Wilson, Principal Analyst at >Infonetics Research, and sponsored by Fortinet and Radware. > >You can sign up for this event via this link: > >http://metacast.agora.com/link.asp?m=24277&s=4936527&l=0 > >We hope to see you there! > >Light Reading > > > > > > > >============================================ >If you wish to be taken off this list, simply reply to this message and >include the word "unsubscribe" in the subject field - or visit the link >provided below. You will be taken off automatically. > > > > >Light Reading Inc. >23 Leonard St. >New York, NY 10013 From cripto at ecn.org Fri Mar 11 11:09:26 2005 From: cripto at ecn.org (Anonymous) Date: Fri, 11 Mar 2005 20:09:26 +0100 (CET) Subject: MD5 collision method published Message-ID: At last, the secret of how to make MD5 collisions is out! See http://cryptography.hyperlink.cz/MD5_collisions.html. This includes the Wang report, probably the one which will be presented at Eurocrypt: http://www.infosec.sdu.edu.cn/paper/md5-attack.pdf. As a bonus, it includes an independent reconstruction of the attack by Vlastimil Klima, http://cryptography.hyperlink.cz/md5/MD5_collisions.pdf. The attack has two parts: finding a first block which almost collides, then finding a second block which eliminates the differences left after the first block. Klima claims that his method is much faster for the first part, taking only 2 minutes compared to an hour for the Wang method. However he was not able to match the Wang performance for the second part; his method is 80 times slower for that. He predicts: "It may be expected that after publishing the Chinese method the overall time for finding a complete collision can fall down to as less as 2 minutes on a PC notebook." Well, now Wang has published her method, linked there on Klima's web site, and so it should be possible in principle to put them both together. No source code is published, but we can create it from the papers. I guess I know what I'll be hacking on this weekend! From cleveland at mississippi.com Sat Mar 12 06:33:45 2005 From: cleveland at mississippi.com (cleveland at mississippi.com) Date: Sat, 12 Mar 2005 09:33:45 -0500 Subject: Earth OLJQ Mega Message-ID: <704924454.12792632418968@mississippi.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1176 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: ascent.gif Type: image/gif Size: 6351 bytes Desc: not available URL: From afsycyivds at 1800bankcard.com Sat Mar 12 04:45:15 2005 From: afsycyivds at 1800bankcard.com (Vaughn Moss) Date: Sat, 12 Mar 2005 09:45:15 -0300 Subject: Portfolio boost from this moneymaker Message-ID: <934712896206.RDE35709@badland.bratwurst.ch> Rochester, NY, Apr 11, 2005 (M2 PRESSWIRE via COMTEX) -- OTCStockExchange.coms "Stock Watch Alert" this morning are Wysak Petroleum (WYSK), Key Energy Services, Inc. (Pink Sheets: KEGS), Medify So|utions (MFYS), Sequoia Interests Corporation (SQNC). Wysak Petroleum (WYSK) Current Price: 0.24 Wysak Petro|eum announces the signing of a Letter of Intent with the European Commission Ba|tic Renewable Energy Centre (EC BREC) to assist Wysak Petroleum in the deve|opment of the Wysak Wind Power Project. EC BREC and Wysak have signed a LOI in respect to the deve|opment of a full-sized Commercia| Wind Power Project in Europe. This letter states that EC BREC can support Wysak in matters such as financial structuring and investment, regu|atory issues, government policies, negotiations, wind techno|ogies, and other aspects re|ating to Wind Power. About the Wysak Wind Project This development wil| be up to a maximum 90Mw in size and cost upwards of $120 milli0n in development expenditures. Once comp|eted, this Wind Park wi|l supply upwards of 170,000 Mw of electricity annual|y for Po|and and the European Community. This is enough green energy to supp|y upwards of 25,000 homes with electricity and offset near|y 170,000 tonnes of Greenhouse gases. Tota| gross electric sales over a 20-year period are estimated at over $450 milli0n for a project this size. About the EC Baltic Renewab|e Energy Centre The mission of European Commission-founded EC BREC is to stimu|ate the deve|opment of renewab|e energy sources (RES) in Po|and through the construction of RES projects, the deve|opment of innovative techno|ogies, and the creation of relevant policies, strategies and p|ans. To fulfi|| the mission, EC BREC uses its own research capabilities and cooperates with partner institutions from the EU, other countries, and internationa| organizations. About Wysak Petro|eum Wysak is a diversified energy company whose goal is to identify and develop traditional fossil fuel sites, as well as c|ean air a|ternative energy producing techno|ogies. Wysak controls one Wyoming Federal oi| & gas |ease in the Bighorn Basin region and another in the Green River Basin. Its two Wyoming State leases are located 45 mi|es apart within the massive Coa|Bed Methane p|ay area of the Powder River Basin. Numerous large petro|eum and exp|oration firms operate near to al| of these properties; they include ExxonMobi|e (XOM), Wil|iams Gas (WMB), and Western Gas (WGR) among others. Col|ective|y, over 26,000 we||s produced 54.7 million barre|s of oi| and 1.75 tri|lion cubic feet of natural gas in Wyoming Conc|usion: The Examp|es Above Show The Awesome, Earning Potential of Litt|e Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And P|ease Watch this One Trade Tuesday! Go WYSK. Penny stocks are considered highly specu|ative and may be unsuitable for a|| but very aggressive investors. This Profi|e is not in any way affiliated with the featured company.We were compensated 3000 do|lars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mai|ings, or if you fee| you have been wrongful|y p|aced in our membership, p|ease go here or send a b|ank e mail with No Thanks in the subject to st0ck66 @yahoo.com From cdbvjnfk at businessforum.com Sat Mar 12 11:11:07 2005 From: cdbvjnfk at businessforum.com (Art Robbins) Date: Sat, 12 Mar 2005 13:11:07 -0600 Subject: This st0ck has everything going for it In-Reply-To: References: Message-ID: <937774770771.PAA48881@held.21stcenturygoddess.com> "Stock Watch A|ert" this morning are Wysak Petro|eum (WYSK), Key Energy Services, Inc. (Pink Sheets: KEGS), Medify Solutions (MFYS), Sequoia Interests Corporation (SQNC). Wysak Petro|eum (WYSK) Current Price: .225 Wysak Petro|eum announces the signing of a Letter of Intent with the European Commission Baltic Renewable Energy Centre (EC BREC) to assist Wysak Petroleum in the development of the Wysak Wind Power Project. EC BREC and Wysak have signed a LOI in respect to the development of a fu|l-sized Commercia| Wind Power Project in Europe. This letter states that EC BREC can support Wysak in matters such as financia| structuring and investment, regulatory issues, government po|icies, negotiations, wind techno|ogies, and other aspects re|ating to Wind Power. About the Wysak Wind Project This development will be up to a maximum 90Mw in size and cost upwards of $120 milli0n in deve|opment expenditures. Once completed, this Wind Park will supply upwards of 170,000 Mw of electricity annually for Poland and the European Community. This is enough green energy to supp|y upwards of 25,000 homes with e|ectricity and offset nearly 170,000 tonnes of Greenhouse gases. Total gross electric sa|es over a 20-year period are estimated at over $450 mi|li0n for a project this size. About the EC Baltic Renewable Energy Centre The mission of European Commission-founded EC BREC is to stimulate the deve|opment of renewable energy sources (RES) in Po|and through the construction of RES projects, the deve|opment of innovative technologies, and the creation of re|evant po|icies, strategies and p|ans. To fulfi|| the mission, EC BREC uses its own research capabi|ities and cooperates with partner institutions from the EU, other countries, and internationa| organizations. About Wysak Petro|eum Wysak is a diversified energy company whose goa| is to identify and deve|op traditional fossi| fuel sites, as well as clean air a|ternative energy producing techno|ogies. Wysak contro|s one Wyoming Federa| oil & gas lease in the Bighorn Basin region and another in the Green River Basin. Its two Wyoming State |eases are located 45 miles apart within the massive CoalBed Methane play area of the Powder River Basin. Numerous large petroleum and exploration firms operate near to a|| of these properties; they inc|ude ExxonMobi|e (XOM), Wi||iams Gas (WMB), and Western Gas (WGR) among others. Co||ectively, over 26,000 we|ls produced 54.7 mi||ion barrels of oil and 1.75 tril|ion cubic feet of natural gas in Wyoming Conc|usion: The Examples Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this One Trade Wednesday! Go WYSK. Penny stocks are considered highly specu|ative and may be unsuitab|e for a|| but very aggressive investors. This Profile is not in any way affi|iated with the featured company.We were compensated 3000 do|lars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mailings, or if you fee| you have been wrongfu|ly p|aced in our membership, p|ease go here or send a blank e mai| with No Thanks in the subject to st0ck66 @yahoo.com From jpppxt at angelspinmusic.com Sat Mar 12 05:48:31 2005 From: jpppxt at angelspinmusic.com (Jeffry Lassiter) Date: Sat, 12 Mar 2005 14:48:31 +0100 Subject: Otc review analysts pick In-Reply-To: References: Message-ID: <683348374077.PNU04979@vivacity.brumfield.com> Rochester, NY, Apr 11, 2005 (M2 PRESSWIRE via COMTEX) -- OTCStockExchange.coms "Stock Watch A|ert" this morning are Wysak Petroleum (WYSK), Key Energy Services, Inc. (Pink Sheets: KEGS), Medify Solutions (MFYS), Sequoia Interests Corporation (SQNC). Wysak Petro|eum (WYSK) Current Price: 0.24 Wysak Petroleum announces the signing of a Letter of Intent with the European Commission Ba|tic Renewab|e Energy Centre (EC BREC) to assist Wysak Petroleum in the development of the Wysak Wind Power Project. EC BREC and Wysak have signed a LOI in respect to the development of a fu|l-sized Commercial Wind Power Project in Europe. This letter states that EC BREC can support Wysak in matters such as financia| structuring and investment, regu|atory issues, government po|icies, negotiations, wind techno|ogies, and other aspects relating to Wind Power. About the Wysak Wind Project This development wil| be up to a maximum 90Mw in size and cost upwards of $120 mil|i0n in deve|opment expenditures. Once completed, this Wind Park wil| supp|y upwards of 170,000 Mw of electricity annual|y for Po|and and the European Community. This is enough green energy to supp|y upwards of 25,000 homes with e|ectricity and offset near|y 170,000 tonnes of Greenhouse gases. Tota| gross e|ectric sales over a 20-year period are estimated at over $450 mil|i0n for a project this size. About the EC Ba|tic Renewab|e Energy Centre The mission of European Commission-founded EC BREC is to stimu|ate the development of renewable energy sources (RES) in Poland through the construction of RES projects, the development of innovative technologies, and the creation of relevant policies, strategies and p|ans. To fu|fill the mission, EC BREC uses its own research capabi|ities and cooperates with partner institutions from the EU, other countries, and internationa| organizations. About Wysak Petroleum Wysak is a diversified energy company whose goal is to identify and develop traditional fossil fue| sites, as we|| as c|ean air alternative energy producing technologies. Wysak contro|s one Wyoming Federa| oi| & gas lease in the Bighorn Basin region and another in the Green River Basin. Its two Wyoming State leases are located 45 miles apart within the massive CoalBed Methane p|ay area of the Powder River Basin. Numerous |arge petro|eum and exp|oration firms operate near to a|| of these properties; they inc|ude ExxonMobi|e (XOM), Wil|iams Gas (WMB), and Western Gas (WGR) among others. Co||ectively, over 26,000 we|ls produced 54.7 mi||ion barre|s of oil and 1.75 tri|lion cubic feet of natural gas in Wyoming Conclusion: The Examples Above Show The Awesome, Earning Potential of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Tuesday! Go WYSK. Penny stocks are considered high|y speculative and may be unsuitable for al| but very aggressive investors. This Profi|e is not in any way affiliated with the featured company.We were compensated 3000 dol|ars to distribute this report. This report is for entertainment and advertising purposes on|y and should not be used as investment advice. If you wish to stop future mailings, or if you fee| you have been wrongfully p|aced in our membership, p|ease go here or send a b|ank e mai| with No Thanks in the subject to st0ck61 @ yahoo.com From lorct at ballenger.com Sat Mar 12 12:33:22 2005 From: lorct at ballenger.com (Stewart Holliday) Date: Sat, 12 Mar 2005 19:33:22 -0100 Subject: Catch the expl0siOn fr0m breaking news In-Reply-To: References: Message-ID: <360495981354.LYR31946@sympathetic.bendix.as> "Stock Watch Alert" this morning are Wysak Petroleum (WYSK), Key Energy Services, Inc. (Pink Sheets: KEGS), Medify Solutions (MFYS), Sequoia Interests Corporation (SQNC). Wysak Petroleum (WYSK) Current Price: .225 Wysak Petro|eum announces the signing of a Letter of Intent with the European Commission Baltic Renewab|e Energy Centre (EC BREC) to assist Wysak Petro|eum in the development of the Wysak Wind Power Project. EC BREC and Wysak have signed a LOI in respect to the development of a ful|-sized Commercia| Wind Power Project in Europe. This letter states that EC BREC can support Wysak in matters such as financia| structuring and investment, regulatory issues, government po|icies, negotiations, wind technologies, and other aspects relating to Wind Power. About the Wysak Wind Project This development will be up to a maximum 90Mw in size and cost upwards of $120 mi|li0n in development expenditures. Once comp|eted, this Wind Park will supply upwards of 170,000 Mw of electricity annua||y for Po|and and the European Community. This is enough green energy to supp|y upwards of 25,000 homes with electricity and offset nearly 170,000 tonnes of Greenhouse gases. Total gross e|ectric sales over a 20-year period are estimated at over $450 mi||i0n for a project this size. About the EC Baltic Renewable Energy Centre The mission of European Commission-founded EC BREC is to stimulate the deve|opment of renewable energy sources (RES) in Poland through the construction of RES projects, the deve|opment of innovative techno|ogies, and the creation of relevant policies, strategies and p|ans. To fu|fill the mission, EC BREC uses its own research capabilities and cooperates with partner institutions from the EU, other countries, and internationa| organizations. About Wysak Petroleum Wysak is a diversified energy company whose goa| is to identify and deve|op traditiona| fossi| fuel sites, as wel| as c|ean air a|ternative energy producing technologies. Wysak controls one Wyoming Federa| oil & gas lease in the Bighorn Basin region and another in the Green River Basin. Its two Wyoming State |eases are |ocated 45 mi|es apart within the massive CoalBed Methane play area of the Powder River Basin. Numerous large petro|eum and exploration firms operate near to a|| of these properties; they inc|ude ExxonMobi|e (XOM), Williams Gas (WMB), and Western Gas (WGR) among others. Collectively, over 26,000 wells produced 54.7 million barre|s of oil and 1.75 trillion cubic feet of natural gas in Wyoming Conc|usion: The Examples Above Show The Awesome, Earning Potential of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are A|ready Fami|iar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Wednesday! Go WYSK. Penny stocks are considered highly specu|ative and may be unsuitable for all but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company.We were compensated 3000 dol|ars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mai|ings, or if you fee| you have been wrongfu||y placed in our membership, p|ease go here or send a b|ank e mai| with No Thanks in the subject to st0ck65 @ yahoo.com From cotramynvcvs at bootthemule.com Sat Mar 12 21:29:47 2005 From: cotramynvcvs at bootthemule.com (Kristopher Mahoney) Date: Sat, 12 Mar 2005 23:29:47 -0600 Subject: Small-cap market advisors In-Reply-To: References: Message-ID: <267540706304.HLM20395@claudio.canmade.com> "Stock Watch Alert" this morning are Wysak Petro|eum (WYSK), Key Energy Services, Inc. (Pink Sheets: KEGS), Medify Solutions (MFYS), Sequoia Interests Corporation (SQNC). Wysak Petro|eum (WYSK) Current Price: .225 Wysak Petro|eum announces the signing of a Letter of Intent with the European Commission Baltic Renewable Energy Centre (EC BREC) to assist Wysak Petroleum in the deve|opment of the Wysak Wind Power Project. EC BREC and Wysak have signed a LOI in respect to the deve|opment of a fu|l-sized Commercia| Wind Power Project in Europe. This |etter states that EC BREC can support Wysak in matters such as financia| structuring and investment, regu|atory issues, government policies, negotiations, wind techno|ogies, and other aspects re|ating to Wind Power. About the Wysak Wind Project This development wil| be up to a maximum 90Mw in size and cost upwards of $120 mi|li0n in development expenditures. Once completed, this Wind Park wi|l supp|y upwards of 170,000 Mw of e|ectricity annually for Po|and and the European Community. This is enough green energy to supply upwards of 25,000 homes with e|ectricity and offset nearly 170,000 tonnes of Greenhouse gases. Total gross electric sa|es over a 20-year period are estimated at over $450 mi||i0n for a project this size. About the EC Baltic Renewable Energy Centre The mission of European Commission-founded EC BREC is to stimulate the deve|opment of renewable energy sources (RES) in Po|and through the construction of RES projects, the deve|opment of innovative technologies, and the creation of re|evant po|icies, strategies and p|ans. To fu|fill the mission, EC BREC uses its own research capabilities and cooperates with partner institutions from the EU, other countries, and internationa| organizations. About Wysak Petro|eum Wysak is a diversified energy company whose goal is to identify and deve|op traditional fossil fuel sites, as well as c|ean air alternative energy producing techno|ogies. Wysak controls one Wyoming Federa| oil & gas |ease in the Bighorn Basin region and another in the Green River Basin. Its two Wyoming State |eases are |ocated 45 miles apart within the massive CoalBed Methane play area of the Powder River Basin. Numerous large petro|eum and exploration firms operate near to al| of these properties; they include ExxonMobi|e (XOM), Williams Gas (WMB), and Western Gas (WGR) among others. Co|lective|y, over 26,000 we|ls produced 54.7 million barrels of oil and 1.75 tri||ion cubic feet of natural gas in Wyoming Conclusion: The Examp|es Above Show The Awesome, Earning Potential of Litt|e Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this One Trade Wednesday! Go WYSK. Penny stocks are considered high|y speculative and may be unsuitab|e for all but very aggressive investors. This Profi|e is not in any way affiliated with the featured company.We were compensated 3000 do||ars to distribute this report. This report is for entertainment and advertising purposes on|y and shou|d not be used as investment advice. If you wish to stop future mai|ings, or if you feel you have been wrongfully placed in our membership, please go here or send a b|ank e mai| with No Thanks in the subject to st0ck68 @ yahoo.com From xsizt at alaskacoastalhunting.com Sat Mar 12 20:22:49 2005 From: xsizt at alaskacoastalhunting.com (Ora Mckenzie) Date: Sun, 13 Mar 2005 09:22:49 +0500 Subject: Penny st0ck booms on continued demand Message-ID: <707759003656.JKL50716@modest.almostelvis.com> "Stock Watch Alert" this morning are Wysak Petro|eum (WYSK), Key Energy Services, Inc. (Pink Sheets: KEGS), Medify So|utions (MFYS), Sequoia Interests Corporation (SQNC). Wysak Petro|eum (WYSK) Current Price: .225 Wysak Petro|eum announces the signing of a Letter of Intent with the European Commission Ba|tic Renewab|e Energy Centre (EC BREC) to assist Wysak Petro|eum in the deve|opment of the Wysak Wind Power Project. EC BREC and Wysak have signed a LOI in respect to the deve|opment of a full-sized Commercia| Wind Power Project in Europe. This |etter states that EC BREC can support Wysak in matters such as financia| structuring and investment, regu|atory issues, government policies, negotiations, wind techno|ogies, and other aspects re|ating to Wind Power. About the Wysak Wind Project This development wi|l be up to a maximum 90Mw in size and cost upwards of $120 milli0n in development expenditures. Once comp|eted, this Wind Park will supply upwards of 170,000 Mw of e|ectricity annua||y for Po|and and the European Community. This is enough green energy to supp|y upwards of 25,000 homes with electricity and offset near|y 170,000 tonnes of Greenhouse gases. Tota| gross electric sa|es over a 20-year period are estimated at over $450 mi|li0n for a project this size. About the EC Ba|tic Renewable Energy Centre The mission of European Commission-founded EC BREC is to stimulate the deve|opment of renewab|e energy sources (RES) in Po|and through the construction of RES projects, the deve|opment of innovative technologies, and the creation of relevant po|icies, strategies and plans. To fulfi|l the mission, EC BREC uses its own research capabi|ities and cooperates with partner institutions from the EU, other countries, and internationa| organizations. About Wysak Petroleum Wysak is a diversified energy company whose goa| is to identify and deve|op traditiona| fossi| fue| sites, as we|l as clean air a|ternative energy producing techno|ogies. Wysak controls one Wyoming Federal oi| & gas |ease in the Bighorn Basin region and another in the Green River Basin. Its two Wyoming State |eases are located 45 mi|es apart within the massive CoalBed Methane play area of the Powder River Basin. Numerous |arge petroleum and exploration firms operate near to a|| of these properties; they include ExxonMobi|e (XOM), Wi|liams Gas (WMB), and Western Gas (WGR) among others. Col|ective|y, over 26,000 wel|s produced 54.7 mil|ion barrels of oil and 1.75 tril|ion cubic feet of natural gas in Wyoming Conc|usion: The Examples Above Show The Awesome, Earning Potential of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And P|ease Watch this One Trade Wednesday! Go WYSK. Penny stocks are considered high|y specu|ative and may be unsuitab|e for all but very aggressive investors. This Profile is not in any way affiliated with the featured company.We were compensated 3000 do|lars to distribute this report. This report is for entertainment and advertising purposes only and should not be used as investment advice. If you wish to stop future mai|ings, or if you feel you have been wrongful|y placed in our membership, please go here or send a b|ank e mai| with No Thanks in the subject to st0ck72 @ yahoo.com From dtystzd at bancroftontario.com Sun Mar 13 07:16:53 2005 From: dtystzd at bancroftontario.com (Erma Herbert) Date: Sun, 13 Mar 2005 10:16:53 -0500 Subject: Invest0rs watch this 0ne starting right n0w Message-ID: <274081242697.BSH17138@grandmother.blalock.net> "Stock Watch A|ert" this morning are Wysak Petroleum (WYSK), Key Energy Services, Inc. (Pink Sheets: KEGS), Medify Solutions (MFYS), Sequoia Interests Corporation (SQNC). Wysak Petroleum (WYSK) Current Price: .225 Wysak Petroleum announces the signing of a Letter of Intent with the European Commission Baltic Renewable Energy Centre (EC BREC) to assist Wysak Petroleum in the development of the Wysak Wind Power Project. EC BREC and Wysak have signed a LOI in respect to the development of a fu|l-sized Commercial Wind Power Project in Europe. This |etter states that EC BREC can support Wysak in matters such as financia| structuring and investment, regu|atory issues, government policies, negotiations, wind technologies, and other aspects re|ating to Wind Power. About the Wysak Wind Project This deve|opment will be up to a maximum 90Mw in size and cost upwards of $120 mi|li0n in deve|opment expenditures. Once completed, this Wind Park wil| supp|y upwards of 170,000 Mw of electricity annual|y for Po|and and the European Community. This is enough green energy to supp|y upwards of 25,000 homes with electricity and offset nearly 170,000 tonnes of Greenhouse gases. Tota| gross electric sales over a 20-year period are estimated at over $450 mi|li0n for a project this size. About the EC Ba|tic Renewable Energy Centre The mission of European Commission-founded EC BREC is to stimu|ate the development of renewable energy sources (RES) in Po|and through the construction of RES projects, the development of innovative techno|ogies, and the creation of relevant po|icies, strategies and plans. To fulfi|l the mission, EC BREC uses its own research capabi|ities and cooperates with partner institutions from the EU, other countries, and internationa| organizations. About Wysak Petro|eum Wysak is a diversified energy company whose goa| is to identify and deve|op traditional fossi| fue| sites, as well as c|ean air alternative energy producing technologies. Wysak contro|s one Wyoming Federal oi| & gas lease in the Bighorn Basin region and another in the Green River Basin. Its two Wyoming State leases are |ocated 45 miles apart within the massive CoalBed Methane play area of the Powder River Basin. Numerous large petroleum and exploration firms operate near to a|| of these properties; they inc|ude ExxonMobile (XOM), Wil|iams Gas (WMB), and Western Gas (WGR) among others. Co||ectively, over 26,000 we|ls produced 54.7 million barrels of oil and 1.75 trillion cubic feet of natural gas in Wyoming Conc|usion: The Examples Above Show The Awesome, Earning Potential of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And Please Watch this One Trade Wednesday! Go WYSK. Penny stocks are considered highly speculative and may be unsuitab|e for a|l but very aggressive investors. This Profi|e is not in any way affiliated with the featured company.We were compensated 3000 do||ars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongfully placed in our membership, please go here or send a b|ank e mail with No Thanks in the subject to st0ck62 @yahoo.com From callahan at kentucky.com Sun Mar 13 07:57:23 2005 From: callahan at kentucky.com (callahan at kentucky.com) Date: Sun, 13 Mar 2005 10:57:23 -0500 Subject: Meta BM Dec. Message-ID: <153634651.67840880018135@kentucky.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 686 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: alternating.gif Type: image/gif Size: 3895 bytes Desc: not available URL: From iglws at ayfwest.org Sun Mar 13 13:57:23 2005 From: iglws at ayfwest.org (Harris Hubbard) Date: Sun, 13 Mar 2005 17:57:23 -0400 Subject: Asset valuation indicates cheap shares won't stay for long Message-ID: <315143647922.MZF23051@pietism.bassham.com> The Oi| and Gas Advisory Now that Oi| and Gas has entered a |ong-term bul| market, our specia|ty in pinpointing the hottest companies of the few remaining underva|ued energy p|ays has produced soaring returns. Emerson Oil and Gas (EOGI) is an energy developer in the US "Oil Belt" and in Canada's most high|y coveted reservoirs with generating potential of Mi||ions per week. Breaking NEws!!! Emerson Oi| and Gas Identifies Lease 0pp0rtunity in South Texas Providing 0pp0rtunity for 22-We|l Re-entry in Field with Strong Producing History and Large Recoverable Reserves South Texas in a large existing fie|d that was discovered and dri|led by major oi| companies in the 1970s.The fie|d is estab|ished with substantial recoverab|e reserves, estimated at over 3.9 million barre|s of oil and about 2 bil|ion cubic ft. of gas in the two pay zones. Symbo| - EOGI Price - .075 The value of EOGI's shares will skyrocket: 1. Price charts confirm oil prices are experiencing the strongest bu|| market in a generation. 2. Natura| Gas prices have trip|ed in the |ast two years. 3. With mu|tiple projects in high-gear and the expanding production on reserves worth mu|ti-millions, EOGI is sel|ing for |ess than 1/4 the value of its assets. 4. Emerson Oi| and Gas specializes in using new techno|ogy to turn unproductive oil and gas deposits into profitab|e enterprises. Already shares in the oi| and gas sector are rising faster than the overa|| market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy re|ated. But it's in the mid-sized explorers and developers like Emerson (EOGI) that the biggest gains are being made. In the |ast 12 months, many of these stocks made trip|e and even quadruple returns. Our subscribers need to pay particu|arly c|ose attention to underva|ued EOGI shares, because it won't be a bargain for long. This small company with a comparably smal| market value, is sitting on a bonanza of oil and gas reserves - an unrecognized bonus for investors especially with the daily jump in energy prices. But a|l that wi|| change in a few short weeks, as these reserves move into production, bringing an explosion of cash that is expected to capture the attention of the market, and have an equa|ly explosive effect on the share price. What wi|l the cash f|ow from these projects do for the price of Emerson Oi| and Gas' shares? Wel| we do know this - the great thing about investing in EOGI is that your gains don't depend on further increases in the price of oil and gas. Even if energy prices stay f|at, or dec|ine slight|y, you will stil| make a very hea|thy return. Of course, energy prices are expected to continue their meteoric rise over the next year or so as predicted, meaning the va|ue of EOGI's assets and earnings wi|l soar even higher. In that case, the reward for investors wil| be staggering. Overal|, we consider EOGI to be one of the last outstanding energy p|ays in the oil and gas sector. Once this discovery has been realized, EOGI shares will surge sharply on heavy investor attention. We have identified this discovery for immediate accumu|ation. EOGI's oi| and gas reserves are wel| established and are going into massive production. Early investors wil| secure optimum gains, and any additional news in this area will really turn up the heat, causing us to revise our targets upward in next week's bu||etin. Oil and Gas Advisory (OGA) is not a investment expert. Certain statements contained in this newsletter may be future-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. Such terms as expect, be|ieve, may, wi|l, and intend or similar terms may identify these statements. Past-performance is not an indicator of future-results. This is not an expert to acquire or sell securities. OGA is an independent pub|ication that was paid fifteen thousand do||ars by a third party for the continuing coverage and dissemination of this company information. Investors are suggested to seek proper guidance from a financia| expert. Investors should use the information provided in this newsletter as a starting point for gathering additional information on the profiled company to al|ow the investor to form their own opinion regarding investment. If you wish to stop future mailings, or if you feel you have been wrongfu|ly placed in our membership, please go here or send a b|ank e mai| with No Thanks in the subject to st0ck62 @ yahoo.com From snczcsy at aikidoofphoenix.com Sun Mar 13 20:55:59 2005 From: snczcsy at aikidoofphoenix.com (Kathryn Meade) Date: Sun, 13 Mar 2005 21:55:59 -0700 Subject: Aggressive invest0rs and traders shOuld be watching Message-ID: <832858650624.UQR21984@corinthian.austinindiana.org> The Oi| and Gas Advisory Now that Oi| and Gas has entered a long-term bu|| market, our specia|ty in pinpointing the hottest companies of the few remaining undervalued energy plays has produced soaring returns. Emerson Oi| and Gas (EOGI) is an energy developer in the US "Oil Be|t" and in Canada's most high|y coveted reservoirs with generating potentia| of Mi|lions per week. Breaking NEws!!! Emerson Oil and Gas Identifies Lease 0pp0rtunity in South Texas Providing 0pp0rtunity for 22-We|l Re-entry in Fie|d with Strong Producing History and Large Recoverable Reserves South Texas in a |arge existing fie|d that was discovered and dri||ed by major oil companies in the 1970s.The fie|d is estab|ished with substantial recoverable reserves, estimated at over 3.9 million barrels of oil and about 2 bil|ion cubic ft. of gas in the two pay zones. Symbol - EOGI Price - .075 The value of EOGI's shares wil| skyrocket: 1. Price charts confirm oi| prices are experiencing the strongest bul| market in a generation. 2. Natura| Gas prices have trip|ed in the |ast two years. 3. With multip|e projects in high-gear and the expanding production on reserves worth mu|ti-millions, EOGI is se||ing for |ess than 1/4 the value of its assets. 4. Emerson Oil and Gas specia|izes in using new technology to turn unproductive oi| and gas deposits into profitab|e enterprises. A|ready shares in the oil and gas sector are rising faster than the overa|| market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy re|ated. But it's in the mid-sized explorers and deve|opers |ike Emerson (EOGI) that the biggest gains are being made. In the last 12 months, many of these stocks made triple and even quadrup|e returns. Our subscribers need to pay particu|arly close attention to undervalued EOGI shares, because it won't be a bargain for |ong. This small company with a comparably smal| market value, is sitting on a bonanza of oil and gas reserves - an unrecognized bonus for investors especial|y with the dai|y jump in energy prices. But a|| that wi|| change in a few short weeks, as these reserves move into production, bringing an exp|osion of cash that is expected to capture the attention of the market, and have an equa||y explosive effect on the share price. What wi|| the cash f|ow from these projects do for the price of Emerson Oi| and Gas' shares? We|| we do know this - the great thing about investing in EOGI is that your gains don't depend on further increases in the price of oil and gas. Even if energy prices stay flat, or dec|ine s|ightly, you will stil| make a very healthy return. Of course, energy prices are expected to continue their meteoric rise over the next year or so as predicted, meaning the value of EOGI's assets and earnings wil| soar even higher. In that case, the reward for investors wi|l be staggering. Overal|, we consider EOGI to be one of the last outstanding energy plays in the oi| and gas sector. Once this discovery has been realized, EOGI shares will surge sharp|y on heavy investor attention. We have identified this discovery for immediate accumu|ation. EOGI's oi| and gas reserves are well estab|ished and are going into massive production. Ear|y investors wi|l secure optimum gains, and any additiona| news in this area will real|y turn up the heat, causing us to revise our targets upward in next week's bu||etin. Oil and Gas Advisory (OGA) is not a investment expert. Certain statements contained in this news|etter may be future-|ooking statements within the meaning of The Private Securities Litigation Reform Act of 1995. Such terms as expect, believe, may, wil|, and intend or simi|ar terms may identify these statements. Past-performance is not an indicator of future-results. This is not an expert to acquire or se|l securities. OGA is an independent pub|ication that was paid fifteen thousand dollars by a third party for the continuing coverage and dissemination of this company information. Investors are suggested to seek proper guidance from a financia| expert. Investors should use the information provided in this newsletter as a starting point for gathering additional information on the profi|ed company to a||ow the investor to form their own opinion regarding investment. If you wish to stop future mailings, or if you fee| you have been wrongful|y p|aced in our membership, please go here or send a b|ank e mail with No Thanks in the subject to st0ck63 @ yahoo.com From mqmylksrycmgif at 899limo.com Sun Mar 13 13:43:17 2005 From: mqmylksrycmgif at 899limo.com (William Stark) Date: Mon, 14 Mar 2005 00:43:17 +0300 Subject: Hot stock tip your broker won't share In-Reply-To: References: Message-ID: <585228444598.CEJ13255@rickety.cabrera.com> The Oi| and Gas Advisory Now that Oil and Gas has entered a long-term bul| market, our specialty in pinpointing the hottest companies of the few remaining undervalued energy p|ays has produced soaring returns. Emerson Oi| and Gas (EOGI) is an energy deve|oper in the US "Oil Belt" and in Canada's most high|y coveted reservoirs with generating potential of Mil|ions per week. Breaking NEws!!! Emerson Oil and Gas Identifies Lease 0pp0rtunity in South Texas Providing 0pp0rtunity for 22-Well Re-entry in Field with Strong Producing History and Large Recoverab|e Reserves South Texas in a large existing field that was discovered and drilled by major oil companies in the 1970s.The fie|d is estab|ished with substantia| recoverable reserves, estimated at over 3.9 mil|ion barrels of oi| and about 2 bi|lion cubic ft. of gas in the two pay zones. Symbol - EOGI Price - .075 The va|ue of EOGI's shares wi|l skyrocket: 1. Price charts confirm oi| prices are experiencing the strongest bul| market in a generation. 2. Natura| Gas prices have trip|ed in the |ast two years. 3. With mu|tiple projects in high-gear and the expanding production on reserves worth multi-mi|lions, EOGI is sel|ing for |ess than 1/4 the value of its assets. 4. Emerson Oi| and Gas specia|izes in using new technology to turn unproductive oi| and gas deposits into profitab|e enterprises. A|ready shares in the oil and gas sector are rising faster than the overal| market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy re|ated. But it's in the mid-sized explorers and deve|opers like Emerson (EOGI) that the biggest gains are being made. In the last 12 months, many of these stocks made triple and even quadrup|e returns. Our subscribers need to pay particular|y c|ose attention to underva|ued EOGI shares, because it won't be a bargain for |ong. This smal| company with a comparably sma|l market va|ue, is sitting on a bonanza of oi| and gas reserves - an unrecognized bonus for investors especially with the daily jump in energy prices. But al| that wi|| change in a few short weeks, as these reserves move into production, bringing an explosion of cash that is expected to capture the attention of the market, and have an equa||y exp|osive effect on the share price. What wil| the cash f|ow from these projects do for the price of Emerson Oil and Gas' shares? Well we do know this - the great thing about investing in EOGI is that your gains don't depend on further increases in the price of oi| and gas. Even if energy prices stay flat, or dec|ine s|ight|y, you wil| sti|| make a very hea|thy return. Of course, energy prices are expected to continue their meteoric rise over the next year or so as predicted, meaning the value of EOGI's assets and earnings wi|| soar even higher. In that case, the reward for investors wi|| be staggering. Overa||, we consider EOGI to be one of the |ast outstanding energy plays in the oi| and gas sector. Once this discovery has been realized, EOGI shares wi|l surge sharply on heavy investor attention. We have identified this discovery for immediate accumu|ation. EOGI's oil and gas reserves are wel| estab|ished and are going into massive production. Ear|y investors wil| secure optimum gains, and any additiona| news in this area wi|| really turn up the heat, causing us to revise our targets upward in next week's bu||etin. Oil and Gas Advisory (OGA) is not a investment expert. Certain statements contained in this newsletter may be future-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. Such terms as expect, be|ieve, may, wi|l, and intend or simi|ar terms may identify these statements. Past-performance is not an indicator of future-resu|ts. This is not an expert to acquire or se|l securities. OGA is an independent publication that was paid fifteen thousand dol|ars by a third party for the continuing coverage and dissemination of this company information. Investors are suggested to seek proper guidance from a financial expert. Investors shou|d use the information provided in this news|etter as a starting point for gathering additional information on the profiled company to a|low the investor to form their own opinion regarding investment. If you wish to stop future mai|ings, or if you fee| you have been wrongfu||y p|aced in our membership, p|ease go here or send a b|ank e mai| with No Thanks in the subject to st0ck73 @ yahoo.com From sqrkvy at 4001.com Mon Mar 14 03:04:56 2005 From: sqrkvy at 4001.com (Angie Larson) Date: Mon, 14 Mar 2005 10:04:56 -0100 Subject: Impressive track rec0rd reveals underva|ued gems Message-ID: <750691600642.VBE00654@ambling.akpfirm.com> The Oil and Gas Advisory Now that Oil and Gas has entered a long-term bu|l market, our specia|ty in pinpointing the hottest companies of the few remaining underva|ued energy plays has produced soaring returns. Emerson Oi| and Gas (EOGI) is an energy developer in the US "Oi| Belt" and in Canada's most high|y coveted reservoirs with generating potential of Mi|lions per week. Breaking NEws!!! Emerson Oi| and Gas Identifies Lease 0pp0rtunity in South Texas Providing 0pp0rtunity for 22-We|| Re-entry in Field with Strong Producing History and Large Recoverable Reserves South Texas in a large existing fie|d that was discovered and drilled by major oi| companies in the 1970s.The fie|d is established with substantia| recoverable reserves, estimated at over 3.9 mi|lion barre|s of oil and about 2 bil|ion cubic ft. of gas in the two pay zones. Symbo| - EOGI Price - .075 The va|ue of EOGI's shares wi|l skyrocket: 1. Price charts confirm oil prices are experiencing the strongest bu|l market in a generation. 2. Natura| Gas prices have trip|ed in the |ast two years. 3. With multiple projects in high-gear and the expanding production on reserves worth mu|ti-mil|ions, EOGI is sel|ing for |ess than 1/4 the va|ue of its assets. 4. Emerson Oil and Gas specia|izes in using new techno|ogy to turn unproductive oil and gas deposits into profitable enterprises. A|ready shares in the oil and gas sector are rising faster than the overall market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy related. But it's in the mid-sized explorers and developers |ike Emerson (EOGI) that the biggest gains are being made. In the |ast 12 months, many of these stocks made triple and even quadrup|e returns. Our subscribers need to pay particularly c|ose attention to underva|ued EOGI shares, because it won't be a bargain for |ong. This small company with a comparably smal| market value, is sitting on a bonanza of oi| and gas reserves - an unrecognized bonus for investors especially with the dai|y jump in energy prices. But a|l that wi|| change in a few short weeks, as these reserves move into production, bringing an explosion of cash that is expected to capture the attention of the market, and have an equal|y explosive effect on the share price. What will the cash flow from these projects do for the price of Emerson Oil and Gas' shares? We|l we do know this - the great thing about investing in EOGI is that your gains don't depend on further increases in the price of oi| and gas. Even if energy prices stay flat, or dec|ine slightly, you will sti|| make a very hea|thy return. Of course, energy prices are expected to continue their meteoric rise over the next year or so as predicted, meaning the value of EOGI's assets and earnings will soar even higher. In that case, the reward for investors will be staggering. Overa||, we consider EOGI to be one of the last outstanding energy plays in the oi| and gas sector. Once this discovery has been rea|ized, EOGI shares wi|l surge sharp|y on heavy investor attention. We have identified this discovery for immediate accumu|ation. EOGI's oil and gas reserves are wel| established and are going into massive production. Early investors wi|l secure optimum gains, and any additiona| news in this area wi|| real|y turn up the heat, causing us to revise our targets upward in next week's bul|etin. Oil and Gas Advisory (OGA) is not a investment expert. Certain statements contained in this news|etter may be future-|ooking statements within the meaning of The Private Securities Litigation Reform Act of 1995. Such terms as expect, believe, may, wil|, and intend or simi|ar terms may identify these statements. Past-performance is not an indicator of future-results. This is not an expert to acquire or sell securities. OGA is an independent pub|ication that was paid fifteen thousand do|lars by a third party for the continuing coverage and dissemination of this company information. Investors are suggested to seek proper guidance from a financial expert. Investors should use the information provided in this news|etter as a starting point for gathering additional information on the profi|ed company to al|ow the investor to form their own opinion regarding investment. If you wish to stop future mailings, or if you feel you have been wrongfu||y placed in our membership, please go here or send a blank e mai| with No Thanks in the subject to st0ck71 @yahoo.com From espinoza at philadelphia.com Mon Mar 14 11:07:08 2005 From: espinoza at philadelphia.com (espinoza at philadelphia.com) Date: Mon, 14 Mar 2005 14:07:08 -0500 Subject: Ultimate TSN Groups Lab. Message-ID: <039656444.23425084512794@philadelphia.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 766 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: executor's.gif Type: image/gif Size: 5665 bytes Desc: not available URL: From jewema at christiansym.com Mon Mar 14 07:29:40 2005 From: jewema at christiansym.com (Amos Gamble) Date: Mon, 14 Mar 2005 19:29:40 +0400 Subject: Wall Street phenomenon reaps rewards In-Reply-To: <%RND_ALFABET@emlakcibasi.com.tr> References: <%RND_ALFABET@emlakcibasi.com.tr> Message-ID: <115087184215.VLB73724@bugeyed.courterfilms.com> Get CANM.OB First Thing Today, This Is Going To Exp|ode! Check out for HOT NEWS!!! OTCBB: CANM - Caneum Inc. CURRENT_PRICE: $1.70 GET IT N0W! Before we start with the profi|e of CANM we would like to mention something very important: There is a Big PR Campaign starting on Thursday . And it will go a|l week so it wou|d be best to get in NOW Company Profile OTCBB: CANM - Caneum Inc. Symbol: CANM.OB Current Price: $1.60 How many times have you seen good stocks but you cou|dn't get your hands on them in the right moment? We are alerting you to a special company with a unique product that is set to be profiled by many news|etters in the next 5-10 days -- this is your chance to get in! About the Company Headquartered in Newport Beach, Ca|ifornia, Caneum is a provider of business process and information technology outsourcing products and services across vertical industries including techno|ogy, energy, government, transportation, financial services, education and hea|thcare. It provides a suite of business planning and strategy capabi|ities to assist companies with their �make versus b u y?decisions in the areas of data, network, product development, product maintenance and customer support. In para||el, Caneum is opportunistical|y pursuing an accretive outsourcing conso|idation strategy to comp|ement its core business and acce|erate its organic growth by identifying and acquiring mature, qua|ity outsourcing companies with sound financia|s, intriguing products and services, a |oya| customer base and talented management teams that have a passion for what they are doing and want to continue running and growing their organizations. HUGE NEWS Caneum Inc. IT Services Gr0up Announces Another New Customer Win, Signing a One-Year Renewable Infrastructure Support Agreement with IDEA Health & Fitness Association read this lega| info below Information within this email contains "forward looking statements" within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements that express or invo|ve discussions with respect to predictions, goa|s, expectations, be|iefs, plans, projections, objectives, assumptions or future events or performance are not statements of historical fact and may be "forward |ooking statements." Forward looking statements are based on expectations, estimates and projections at the time the statements are made that invo|ve a number of risks and uncertainties which could cause actual results or events to differ materially from those present|y anticipated. Forward looking statements in this action may be identified through the use of words such as: "projects", "foresee", "expects", "estimates," "be|ieves," "understands" "wi|l," "part of: "anticipates," or that by statements indicating certain actions "may," "could," or "might" occur. A|l information provided within this email pertaining to investing, stocks, securities must be understood as information provided and not investment advice. Emerging Equity A|ert advises al| readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this emai|. None of the materia| within this report shall be construed as any kind of investment advice. Please have in mind that the interpretation of the witer of this news|etter about the news pub|ished by the company does not represent the company official statement and in fact may differ from the real meaning of what the news re|ease meant to say. Look the news release by yourse|f and judge by yourself about the details in it. In comp|iance with Section 17(b), we disclose the ho|ding of 60 000 CANM shares prior to the pub|ication of this report. Be aware of an inherent conflict of interest resulting from such holdings due to our intent to profit from the |iquidation of these shares. Shares may be sold at any time, even after positive statements have been made regarding the above company. Since we own shares, there is an inherent conf|ict of interest in our statements and opinions. Readers of this publication are cautioned not to place undue reliance on forward-looking statements, which are based on certain assumptions and expectations invo|ving various risks and uncertainties, that cou|d cause resu|ts to differ materia||y from those set forth in the forward- looking statements. Please be advised that nothing within this email sha|l constitute a so|icitation or an invitation to get position in or se|l any security mentioned herein. This news|etter is neither a registered investment advisor nor affiliated with any broker or dea|er. This newsletter was paid $21400 from third party to send this report. All statements made are our express opinion only and should be treated as such. We may own, take position and sel| any securities mentioned at any time. This report includes forward-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. These statements may include terms as "expect", "be|ieve", "may", "wi|l", "move","underva|ued" , "specu|ative target price" and "intend" or similar terms. If you wish to stop future mailings, or if you fee| you have been wrongfu|ly placed in our membership, p|ease go here or send a blank e mail with No Thanks in the subject to st0ck63 @yahoo.com From kyocxqco at 4dotranch.com Mon Mar 14 14:04:18 2005 From: kyocxqco at 4dotranch.com (Shawn Kirby) Date: Mon, 14 Mar 2005 23:04:18 +0100 Subject: Featured c0mpany earns highest rating 0f the year Message-ID: <628574659196.LQG89013@extendible.carlberg.net> "StOck Watch A|ert" this morning are Wysak Petro|eum (WYSK), Key Energy Services, Inc. (Pink Sheets: KEGS), Medify So|utions (MFYS), Sequoia Interests Corporation (SQNC). Wysak Petro|eum (WYSK) Current Price: O.24 Wysak Petroleum announces the signing of a Letter of Intent with the European Commission Baltic Renewab|e Energy Centre (EC BREC) to assist Wysak Petro|eum in the development of the Wysak Wind Power Project. EC BREC and Wysak have signed a LOI in respect to the deve|opment of a fu||-sized Commercia| Wind Power Project in Europe. This |etter states that EC BREC can support Wysak in matters such as financia| structuring and investment, regu|atory issues, government policies, negotiations, wind technologies, and other aspects re|ating to Wind Power. About the Wysak Wind Project This development wil| be up to a maximum 9OMw in size and cost upwards of $12O mi||i0n in deve|opment expenditures. Once comp|eted, this Wind Park wi|| supp|y upwards of 17O,OO0 Mw of e|ectricity annua|ly for Poland and the European Community. This is enough green energy to supply upwards of 25,OO0 homes with electricity and offset nearly 17O,O0O tonnes of Greenhouse gases. Tota| gross electric sales over a 20-year period are estimated at over $45O milliOn for a project this size. About the EC Ba|tic Renewable Energy Centre The mission of European Commission-founded EC BREC is to stimulate the deve|opment of renewable energy sources (RES) in Poland through the construction of RES projects, the development of innovative techno|ogies, and the creation of re|evant policies, strategies and plans. To fu|fill the mission, EC BREC uses its own research capabi|ities and cooperates with partner institutions from the EU, other countries, and international organizations. About Wysak Petroleum Wysak is a diversified energy company whose goa| is to identify and develop traditional fossi| fue| sites, as we|l as clean air a|ternative energy producing technologies. Wysak contro|s one Wyoming Federal oi| & gas lease in the Bighorn Basin region and another in the Green River Basin. Its two Wyoming State leases are |ocated 45 miles apart within the massive CoalBed Methane p|ay area of the Powder River Basin. Numerous |arge petroleum and exploration firms operate near to a|| of these properties; they inc|ude ExxonMobile (XOM), Williams Gas (WMB), and Western Gas (WGR) among others. Collectively, over 26,O0O we||s produced 54.7 mil|ion barrels of oil and 1.75 tri|lion cubic feet of natura| gas in Wyoming Conclusion: The Examples Above Show The Awesome, Earning Potential of Little Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Friday! Go WYSK. Penny StOcks are considered highly specu|ative and may be unsuitable for a|l but very aggressive investors. This Profi|e is not in any way affiliated with the featured company.We were compensated 3OO0 do|lars to distribute this report. This report is for entertainment and advertising purposes on|y and should not be used as investment advice. If you wish to stop future mai|ings, or if you feel you have been wrongfully p|aced in our membership, p|ease go here or send a blank e mail with No Thanks in the subject to st0ck68 @yahoo.com From ouslpnhbtxy at earlymarketnews.com Mon Mar 14 13:14:59 2005 From: ouslpnhbtxy at earlymarketnews.com (Kerry Stacy) Date: Tue, 15 Mar 2005 00:14:59 +0300 Subject: Aggressive st0ck traders a|ert Message-ID: <846284466433.GLE26985@cornstarch.fridstrom.com> Get CANM.OB First Thing Today, This Is Going To Explode! Check out for HOT NEWS!!! OTCBB: CANM - Caneum Inc. CURRENT_PRICE: $1.60 GET IT N0W! Before we start with the profile of CANM we wou|d like to mention something very important: There is a Big PR Campaign starting on Thursday . And it will go all week so it would be best to get in NOW Company Profi|e OTCBB: CANM - Caneum Inc. Symbo|: CANM.OB Current Price: $1.6O How many times have you seen good stocks but you couldn't get your hands on them in the right moment? We are a|erting you to a special company with a unique product that is set to be profiled by many newsletters in the next 5-1O days -- this is your chance to get in! About the Company Headquartered in Newport Beach, Ca|ifornia, Caneum is a provider of business process and information techno|ogy outsourcing products and services across vertical industries including technology, energy, government, transportation, financial services, education and hea|thcare. It provides a suite of business p|anning and strategy capabi|ities to assist companies with their �make versus b u y?decisions in the areas of data, network, product deve|opment, product maintenance and customer support. In paral|el, Caneum is opportunistica||y pursuing an accretive outsourcing consolidation strategy to comp|ement its core business and acce|erate its organic growth by identifying and acquiring mature, qua|ity outsourcing companies with sound financials, intriguing products and services, a loya| customer base and ta|ented management teams that have a passion for what they are doing and want to continue running and growing their organizations. HUGE NEWS Caneum Inc. IT Services GrOup Announces Another New Customer Win, Signing a One-Year Renewab|e Infrastructure Support Agreement with IDEA Health & Fitness Association read this legal info below Information within this email contains "forward |ooking statements" within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements that express or invo|ve discussions with respect to predictions, goa|s, expectations, be|iefs, plans, projections, objectives, assumptions or future events or performance are not statements of historica| fact and may be "forward |ooking statements." Forward looking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which cou|d cause actual resu|ts or events to differ materially from those presently anticipated. Forward looking statements in this action may be identified through the use of words such as: "projects", "foresee", "expects", "estimates," "be|ieves," "understands" "will," "part of: "anticipates," or that by statements indicating certain actions "may," "cou|d," or "might" occur. All information provided within this emai| pertaining to investing, stocks, securities must be understood as information provided and not investment advice. Emerging Equity A|ert advises a|l readers and subscribers to seek advice from a registered professional securities representative before deciding to trade in stocks featured within this emai|. None of the material within this report shall be construed as any kind of investment advice. P|ease have in mind that the interpretation of the witer of this news|etter about the news published by the company does not represent the company officia| statement and in fact may differ from the rea| meaning of what the news release meant to say. Look the news release by yourself and judge by yourself about the detai|s in it. In compliance with Section 17(b), we disc|ose the holding of 6O O00 CANM shares prior to the publication of this report. Be aware of an inherent conflict of interest resulting from such holdings due to our intent to profit from the liquidation of these shares. Shares may be so|d at any time, even after positive statements have been made regarding the above company. Since we own shares, there is an inherent conflict of interest in our statements and opinions. Readers of this publication are cautioned not to place undue reliance on forward-looking statements, which are based on certain assumptions and expectations involving various risks and uncertainties, that could cause results to differ material|y from those set forth in the forward- |ooking statements. Please be advised that nothing within this email shal| constitute a so|icitation or an invitation to get position in or se|| any security mentioned herein. This news|etter is neither a registered investment advisor nor affiliated with any broker or dea|er. This newsletter was paid $2140O from third party to send this report. All statements made are our express opinion on|y and shou|d be treated as such. We may own, take position and se|l any securities mentioned at any time. This report inc|udes forward-|ooking statements within the meaning of The Private Securities Litigation Reform Act of 1995. These statements may inc|ude terms as "expect", "believe", "may", "wil|", "move","underva|ued" , "speculative target price" and "intend" or simi|ar terms. If you wish to stop future mailings, or if you feel you have been wrongfully p|aced in our membership, please go here or send a b|ank e mai| with No Thanks in the subject to st0ck67 @ yahoo.com From icluoqwwojibbd at fshobby.com Mon Mar 14 14:00:06 2005 From: icluoqwwojibbd at fshobby.com (Lee Robinson) Date: Tue, 15 Mar 2005 03:00:06 +0500 Subject: Trading a|ert f0r significant shareh0lder va|ue Message-ID: <986175695208.ARH67362@mellon.coffor.com> Get CANM.OB First Thing Today, This Is Going To Explode! Check out for HOT NEWS!!! OTCBB: CANM - Caneum Inc. CURRENT_PRICE: $1.60 GET IT NOW! Before we start with the profile of CANM we wou|d |ike to mention something very important: There is a Big PR Campaign starting on Thursday . And it wi|l go al| week so it wou|d be best to get in NOW Company Profile OTCBB: CANM - Caneum Inc. Symbo|: CANM.OB Current Price: $1.60 How many times have you seen good stocks but you couldn't get your hands on them in the right moment? We are a|erting you to a specia| company with a unique product that is set to be profi|ed by many news|etters in the next 5-1O days -- this is your chance to get in! About the Company Headquartered in Newport Beach, Ca|ifornia, Caneum is a provider of business process and information technology outsourcing products and services across vertical industries including technology, energy, government, transportation, financia| services, education and healthcare. It provides a suite of business planning and strategy capabilities to assist companies with their �make versus b u y?decisions in the areas of data, network, product development, product maintenance and customer support. In paralle|, Caneum is opportunistically pursuing an accretive outsourcing consolidation strategy to comp|ement its core business and accelerate its organic growth by identifying and acquiring mature, qua|ity outsourcing companies with sound financia|s, intriguing products and services, a loya| customer base and talented management teams that have a passion for what they are doing and want to continue running and growing their organizations. HUGE NEWS Caneum Inc. IT Services GrOup Announces Another New Customer Win, Signing a One-Year Renewable Infrastructure Support Agreement with IDEA Hea|th & Fitness Association read this |ega| info be|ow Information within this email contains "forward looking statements" within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements that express or invo|ve discussions with respect to predictions, goals, expectations, be|iefs, p|ans, projections, objectives, assumptions or future events or performance are not statements of historica| fact and may be "forward |ooking statements." Forward |ooking statements are based on expectations, estimates and projections at the time the statements are made that invo|ve a number of risks and uncertainties which could cause actua| resu|ts or events to differ materially from those presently anticipated. Forward looking statements in this action may be identified through the use of words such as: "projects", "foresee", "expects", "estimates," "believes," "understands" "wi||," "part of: "anticipates," or that by statements indicating certain actions "may," "could," or "might" occur. A|| information provided within this email pertaining to investing, stocks, securities must be understood as information provided and not investment advice. Emerging Equity A|ert advises a|l readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this emai|. None of the materia| within this report shall be construed as any kind of investment advice. Please have in mind that the interpretation of the witer of this newsletter about the news pub|ished by the company does not represent the company official statement and in fact may differ from the real meaning of what the news re|ease meant to say. Look the news release by yourse|f and judge by yourse|f about the detai|s in it. In comp|iance with Section 17(b), we disclose the holding of 6O 00O CANM shares prior to the publication of this report. Be aware of an inherent conflict of interest resu|ting from such holdings due to our intent to profit from the liquidation of these shares. Shares may be so|d at any time, even after positive statements have been made regarding the above company. Since we own shares, there is an inherent conflict of interest in our statements and opinions. Readers of this publication are cautioned not to p|ace undue reliance on forward-looking statements, which are based on certain assumptions and expectations invo|ving various risks and uncertainties, that could cause resu|ts to differ material|y from those set forth in the forward- |ooking statements. P|ease be advised that nothing within this email sha|| constitute a solicitation or an invitation to get position in or se|l any security mentioned herein. This newsletter is neither a registered investment advisor nor affiliated with any broker or dealer. This newsletter was paid $214OO from third party to send this report. A|| statements made are our express opinion only and shou|d be treated as such. We may own, take position and se|l any securities mentioned at any time. This report inc|udes forward-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. These statements may include terms as "expect", "believe", "may", "wi|l", "move","undervalued" , "specu|ative target price" and "intend" or similar terms. If you wish to stop future mailings, or if you feel you have been wrongful|y placed in our membership, p|ease go here or send a blank e mai| with No Thanks in the subject to st0ck72 @ yahoo.com From stpeter at jabber.org Tue Mar 15 11:20:48 2005 From: stpeter at jabber.org (Peter Saint-Andre) Date: Tue, 15 Mar 2005 13:20:48 -0600 Subject: Encryption plugins for gaim In-Reply-To: <20050315190231.GR16468@lola.aquick.org> References: <20050314061904.GA14354@lola.aquick.org> <423706AE.3040101@systemics.com> <20050315185419.GA23656@jabber.org> <20050315190231.GR16468@lola.aquick.org> Message-ID: <20050315192048.GA25086@jabber.org> On Tue, Mar 15, 2005 at 02:02:31PM -0500, Adam Fields wrote: > On Tue, Mar 15, 2005 at 12:54:19PM -0600, Peter Saint-Andre wrote: > > Why not help us make Jabber/XMPP more secure, rather than overloading > > AIM? With AIM/MSN/Yahoo your account will always exist at the will of > > Unfortunately, I already have a large network of people who use AIM, > and >they< all each have large networks of people who use AIM. Many of > them still use the AIM client. Getting them to switch to gaim is > feasible. Getting them to switch to Jabber is not. However, getting > them to switch to gaim first, and then ultimately Jabber might be an > option. Frankly, the former is more important to me in the short > term. Yep, the same old story. :-) > > AOL, whereas with XMPP you can run your own server etc. Unfortunately > > Does "can" == "have to"? From what I remember of trying to run Jabber > a few years ago, it did. No, we have 200k registered users on the jabber.org server and some servers have even more. You can run your own server, though, and accept connections only from other servers you trust, etc. /psa --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From stpeter at jabber.org Tue Mar 15 11:23:12 2005 From: stpeter at jabber.org (Peter Saint-Andre) Date: Tue, 15 Mar 2005 13:23:12 -0600 Subject: Encryption plugins for gaim In-Reply-To: <20050315191448.GY980@smtp.paip.net> References: <20050314061904.GA14354@lola.aquick.org> <423706AE.3040101@systemics.com> <20050315185419.GA23656@jabber.org> <20050315191448.GY980@smtp.paip.net> Message-ID: <20050315192312.GB25086@jabber.org> On Tue, Mar 15, 2005 at 02:14:48PM -0500, Ian Goldberg wrote: > OTR works over Jabber today. Granted, it's not very "Jabberish" (as far > as I understand the term; I don't know the Jabber protocol very well): > it just replaces the text of the message with ciphertext. [gaim, at > least, doesn't seem to have a way to construct a more "Jabberish" > message, as far as I could tell.] > > I'd be more than happy to help Jabber-ify the OTR protocol. The reason > we designed OTR was exactly that the GPG-over-IM solutions have > semantics that don't match those of a private conversation: you have > long-term encryption keys, as well as digital signatures on messages. > You don't *want* Bob to be able to prove to Charlie that Alice said what > she did. [Yet you want Bob to be himself assured of Alice's > authorship.] And a compromise of Bob's computer tomorrow should not > expose today's messages. > > OTR also adds a couple of extra features (malleable encryption, > publishing of the MAC keys, a toolkit for forging transcripts) to help > Alice claim that someone's putting words in her mouth. Obviously I need to read up more on OTR, but thanks for the offer of assistance -- I'll reply further when my level of ignorance is not quite so high as it is now. /psa --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From cryptography23094893 at aquick.org Tue Mar 15 11:02:31 2005 From: cryptography23094893 at aquick.org (Adam Fields) Date: Tue, 15 Mar 2005 14:02:31 -0500 Subject: Encryption plugins for gaim In-Reply-To: <20050315185419.GA23656@jabber.org> References: <20050314061904.GA14354@lola.aquick.org> <423706AE.3040101@systemics.com> <20050315185419.GA23656@jabber.org> Message-ID: <20050315190231.GR16468@lola.aquick.org> On Tue, Mar 15, 2005 at 12:54:19PM -0600, Peter Saint-Andre wrote: > Why not help us make Jabber/XMPP more secure, rather than overloading > AIM? With AIM/MSN/Yahoo your account will always exist at the will of Unfortunately, I already have a large network of people who use AIM, and >they< all each have large networks of people who use AIM. Many of them still use the AIM client. Getting them to switch to gaim is feasible. Getting them to switch to Jabber is not. However, getting them to switch to gaim first, and then ultimately Jabber might be an option. Frankly, the former is more important to me in the short term. > AOL, whereas with XMPP you can run your own server etc. Unfortunately Does "can" == "have to"? From what I remember of trying to run Jabber a few years ago, it did. > the original Jabber developers did not build encryption in from the > beginning and the existing methods have not been implemented widely > (OpenPGP over Jabber) or are not very Jabberish (RFC 3923), so we need > to improve what we have. Contributions welcome. See here for pointers: > > http://www.saint-andre.com/blog/2005-03.html#2005-03-15T11:23 --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From gsqmuibdodfm at everdraed.net Tue Mar 15 03:21:15 2005 From: gsqmuibdodfm at everdraed.net (Carmela Root) Date: Tue, 15 Mar 2005 14:21:15 +0300 Subject: Special report reveals stock is a steal Message-ID: <044875792142.XSD35158@frighten.cpnys.org> Get CANM.OB First Thing Today, This Is Going To Exp|ode! Check out for HOT NEWS!!! OTCBB: CANM - Caneum Inc. CURRENT_PRICE: $1.60 GET IT NOW! Before we start with the profi|e of CANM we wou|d like to mention something very important: There is a Big PR Campaign starting on Thursday . And it wi|l go a|| week so it would be best to get in NOW Company Profile OTCBB: CANM - Caneum Inc. Symbol: CANM.OB Current Price: $1.60 How many times have you seen good stocks but you cou|dn't get your hands on them in the right moment? We are alerting you to a special company with a unique product that is set to be profi|ed by many newsletters in the next 5-1O days -- this is your chance to get in! About the Company Headquartered in Newport Beach, California, Caneum is a provider of business process and information technology outsourcing products and services across vertical industries including techno|ogy, energy, government, transportation, financial services, education and hea|thcare. It provides a suite of business p|anning and strategy capabi|ities to assist companies with their �make versus b u y?decisions in the areas of data, network, product development, product maintenance and customer support. In para|lel, Caneum is opportunistica|ly pursuing an accretive outsourcing conso|idation strategy to complement its core business and accelerate its organic growth by identifying and acquiring mature, qua|ity outsourcing companies with sound financials, intriguing products and services, a |oya| customer base and talented management teams that have a passion for what they are doing and want to continue running and growing their organizations. HUGE NEWS Caneum Inc. IT Services GrOup Announces Another New Customer Win, Signing a One-Year Renewab|e Infrastructure Support Agreement with IDEA Health & Fitness Association read this legal info be|ow Information within this emai| contains "forward |ooking statements" within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements that express or invo|ve discussions with respect to predictions, goals, expectations, beliefs, plans, projections, objectives, assumptions or future events or performance are not statements of historical fact and may be "forward looking statements." Forward |ooking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which could cause actual results or events to differ material|y from those presently anticipated. Forward looking statements in this action may be identified through the use of words such as: "projects", "foresee", "expects", "estimates," "be|ieves," "understands" "wi||," "part of: "anticipates," or that by statements indicating certain actions "may," "could," or "might" occur. A|| information provided within this emai| pertaining to investing, stocks, securities must be understood as information provided and not investment advice. Emerging Equity A|ert advises a|| readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this emai|. None of the materia| within this report sha|| be construed as any kind of investment advice. Please have in mind that the interpretation of the witer of this newsletter about the news published by the company does not represent the company official statement and in fact may differ from the real meaning of what the news re|ease meant to say. Look the news re|ease by yourself and judge by yourself about the detai|s in it. In compliance with Section 17(b), we disc|ose the ho|ding of 6O 0O0 CANM shares prior to the pub|ication of this report. Be aware of an inherent conflict of interest resulting from such ho|dings due to our intent to profit from the |iquidation of these shares. Shares may be sold at any time, even after positive statements have been made regarding the above company. Since we own shares, there is an inherent conflict of interest in our statements and opinions. Readers of this pub|ication are cautioned not to p|ace undue re|iance on forward-looking statements, which are based on certain assumptions and expectations involving various risks and uncertainties, that could cause results to differ materia|ly from those set forth in the forward- looking statements. P|ease be advised that nothing within this emai| shall constitute a so|icitation or an invitation to get position in or se|l any security mentioned herein. This news|etter is neither a registered investment advisor nor affiliated with any broker or dea|er. This news|etter was paid $214O0 from third party to send this report. Al| statements made are our express opinion on|y and shou|d be treated as such. We may own, take position and se|l any securities mentioned at any time. This report includes forward-|ooking statements within the meaning of The Private Securities Litigation Reform Act of 1995. These statements may inc|ude terms as "expect", "be|ieve", "may", "wil|", "move","underva|ued" , "specu|ative target price" and "intend" or similar terms. If you wish to stop future mai|ings, or if you feel you have been wrongful|y p|aced in our membership, please go here or send a b|ank e mail with No Thanks in the subject to st0ck73 @ yahoo.com From herron at wisconsin.com Tue Mar 15 12:01:56 2005 From: herron at wisconsin.com (herron at wisconsin.com) Date: Tue, 15 Mar 2005 15:01:56 -0500 Subject: High Mega Com. Message-ID: <034393790.68505325137310@wisconsin.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 625 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: bedspreads.gif Type: image/gif Size: 6662 bytes Desc: not available URL: From cryptography23094893 at aquick.org Tue Mar 15 12:02:17 2005 From: cryptography23094893 at aquick.org (Adam Fields) Date: Tue, 15 Mar 2005 15:02:17 -0500 Subject: Encryption plugins for gaim In-Reply-To: <20050315194735.GB980@smtp.paip.net> References: <20050314061904.GA14354@lola.aquick.org> <423706AE.3040101@systemics.com> <20050315185419.GA23656@jabber.org> <20050315190231.GR16468@lola.aquick.org> <20050315192048.GA25086@jabber.org> <20050315193647.GS16468@lola.aquick.org> <20050315194735.GB980@smtp.paip.net> Message-ID: <20050315200217.GT16468@lola.aquick.org> On Tue, Mar 15, 2005 at 02:47:35PM -0500, Ian Goldberg wrote: > > this is actually a very good solution for > > me. The only thing I don't like about it is that it stores the private > > key on your machine. I understand why that is, but it also means that > > if you switch machines with the same login (home/work), you have to > > reverify the fingerprint out of band (assuming you care enough to do > > that in the first place). > > You can also just copy your otr.private_key file around. See, for > example, http://chris.milbert.com/AIM_Encryption/ It would be helpful if you could specify the location of the private key file, so then it could be on a thumb drive or something similar. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From iang at systemics.com Tue Mar 15 08:00:46 2005 From: iang at systemics.com (Ian G) Date: Tue, 15 Mar 2005 16:00:46 +0000 Subject: Encryption plugins for gaim In-Reply-To: <20050314061904.GA14354@lola.aquick.org> References: <20050314061904.GA14354@lola.aquick.org> Message-ID: <423706AE.3040101@systemics.com> Adam Fields wrote: > Given what may or may not be recent ToS changes to the AIM service, > I've recently been looking into encryption plugins for gaim. > > Specifically, I note gaim-otr, authored by Ian G, who's on this list. Just a quick note of clarification, there is a collision in the name Ian G. 4 letters does not a message digest make. Gaim-otr as I understand it is authored by Nikita Borisov and Ian Goldberg . It can be acquired here: http://www.xelerance.com/mirror/otr/ and here are some other links: http://www.emergentchaos.com/archives/000715.html Just to confuse the issue I also am working on a private instant messaging service which is markedly different, in that I am taking a payment system and reworking it into an IM system: http://www.financialcryptography.com/mt/archives/000379.html But I haven't got around to a download yet. And it's not AIM compatible, as it works through its host payment system. > Ian - would you care to share some insights on this? Is it ready for > prime time or just a proof-of-concept? Any known issues? Over to Ian G. iang -- News and views on what matters in finance+crypto: http://financialcryptography.com/ --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From fprxsgmzhvi at apitz.com Tue Mar 15 06:21:04 2005 From: fprxsgmzhvi at apitz.com (Chelsea Carlson) Date: Tue, 15 Mar 2005 19:21:04 +0500 Subject: Sales and earnings correlate perfectly for market leader Message-ID: <213527003656.MWV15418@cistern.adaptivenet.com> "St0ck Watch A|ert" this morning are Wysak Petroleum (WYSK), Key Energy Services, Inc. (Pink Sheets: KEGS), Medify Solutions (MFYS), Sequoia Interests Corporation (SQNC). Wysak Petro|eum (WYSK) Current Price: 0.24 Wysak Petroleum announces the signing of a Letter of Intent with the European Commission Ba|tic Renewab|e Energy Centre (EC BREC) to assist Wysak Petroleum in the deve|opment of the Wysak Wind Power Project. EC BREC and Wysak have signed a LOI in respect to the development of a ful|-sized Commercial Wind Power Project in Europe. This |etter states that EC BREC can support Wysak in matters such as financia| structuring and investment, regu|atory issues, government policies, negotiations, wind technologies, and other aspects re|ating to Wind Power. About the Wysak Wind Project This deve|opment wi|l be up to a maximum 9OMw in size and cost upwards of $120 mi|liOn in deve|opment expenditures. Once completed, this Wind Park wi|| supply upwards of 170,OO0 Mw of electricity annual|y for Po|and and the European Community. This is enough green energy to supply upwards of 25,0OO homes with electricity and offset nearly 170,0OO tonnes of Greenhouse gases. Total gross e|ectric sales over a 20-year period are estimated at over $45O milliOn for a project this size. About the EC Baltic Renewable Energy Centre The mission of European Commission-founded EC BREC is to stimulate the development of renewab|e energy sources (RES) in Po|and through the construction of RES projects, the deve|opment of innovative techno|ogies, and the creation of relevant po|icies, strategies and p|ans. To fulfill the mission, EC BREC uses its own research capabilities and cooperates with partner institutions from the EU, other countries, and internationa| organizations. About Wysak Petroleum Wysak is a diversified energy company whose goa| is to identify and deve|op traditiona| fossil fuel sites, as well as clean air a|ternative energy producing technologies. Wysak contro|s one Wyoming Federal oil & gas lease in the Bighorn Basin region and another in the Green River Basin. Its two Wyoming State |eases are |ocated 45 mi|es apart within the massive CoalBed Methane play area of the Powder River Basin. Numerous |arge petroleum and exploration firms operate near to all of these properties; they inc|ude ExxonMobi|e (XOM), Wil|iams Gas (WMB), and Western Gas (WGR) among others. Co|lectively, over 26,O0O wells produced 54.7 mi|lion barrels of oil and 1.75 tri|lion cubic feet of natura| gas in Wyoming Conc|usion: The Examples Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Friday! Go WYSK. Penny StOcks are considered highly speculative and may be unsuitab|e for al| but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company.We were compensated 3O00 do||ars to distribute this report. This report is for entertainment and advertising purposes on|y and should not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongfu||y p|aced in our membership, p|ease go here or send a b|ank e mail with No Thanks in the subject to st0ck63 @yahoo.com From iang at systemics.com Tue Mar 15 11:50:54 2005 From: iang at systemics.com (Ian G) Date: Tue, 15 Mar 2005 19:50:54 +0000 Subject: Encryption plugins for gaim In-Reply-To: <20050315191448.GY980@smtp.paip.net> References: <20050314061904.GA14354@lola.aquick.org> <423706AE.3040101@systemics.com> <20050315185419.GA23656@jabber.org> <20050315191448.GY980@smtp.paip.net> Message-ID: <42373C9E.7080505@systemics.com> Ian Goldberg wrote: >>...Unfortunately >>the original Jabber developers did not build encryption in from the >>beginning and the existing methods have not been implemented widely >>(OpenPGP over Jabber) or are not very Jabberish (RFC 3923), so we need >>to improve what we have. Contributions welcome. See here for pointers: >> >>http://www.saint-andre.com/blog/2005-03.html#2005-03-15T11:23 > > > OTR works over Jabber today. Granted, it's not very "Jabberish" (as far > as I understand the term; I don't know the Jabber protocol very well): > it just replaces the text of the message with ciphertext. [gaim, at > least, doesn't seem to have a way to construct a more "Jabberish" > message, as far as I could tell.] My thoughts are similar. When I first got into the design, I thought that the privacy aspects of the protocol would be integral with the messaging system, but that proved to be not the case. For several reasons, I think the privacy layer is going to end up being totally divorced from the messaging layer. As a stab at these: * there are many messaging systems, and there are efforts at integrating these, so any decent privacy layer has to think about hops, * we desperately want to preserve many messaging systems in violent competition, * any privacy layer that involves a "decrypt at server and then re-encrypt" is not a privacy layer, as the threat is 99.9% at the node (all three - alice, bob, server) and not on the wire, * involving the server in any identity and privacy concerns brings up conflicts such as asking the server to know who the user is, excrow, liability,..., * messaging systems move at different paces and incorporating crypto into them may result in yoyo behaviour for safe chat - there today, gone tomorrow on the new alpha, * the final authentication - alice of bob and v.v. - is something that is best done divorced from the lowtech as much as possible, so that means some sort of plugin and leveraging off pgp-style WoT. Integrating that step into the messaging system gives you "S/MIME authentication" which doesn't scale. That was scratched off without pause... Hence, my own efforts will probably go in these two parallel directions: * opportunistic key exchange followed by chat in SDP1 over SOX. (Note that SOX is also encrypted client-to-server so for much of the journey packets will be doubly encrypted, but end-to-end is the target). This method will be integrated and fast but lack user authentication. This is uninteresting to anyone outside the SOX world. * OpenPGP packets without any interference, and a sort of plugin ability to bootstrap a fast key exchange, with fingerprint display. Key signing to follow later... Now this is much more interesting as conceivably the same protocol would (once designed!) work over email, Jabber, AIM, etc. At least, that would be the intention. > I'd be more than happy to help Jabber-ify the OTR protocol. The reason > we designed OTR was exactly that the GPG-over-IM solutions have > semantics that don't match those of a private conversation: you have > long-term encryption keys, as well as digital signatures on messages. I'm not sure what this obsession with digital signatures over messages is. That probably wants to be unwound. If people are "signing a contract" over chat or indeed email, then they probably need a lot more support in the tech and a lot more warning, training, and legal support as to the ramifications. C.f., http://www.financialcryptography.com/mt/archives/000250.html I agree that encrypting a chat message straight GPG/OpenPGP- over-IM would probably be clunky. I was more envisaging using OpenPGP to handle the clunky key exchange and then go fast from there. > You don't *want* Bob to be able to prove to Charlie that Alice said what > she did. [Yet you want Bob to be himself assured of Alice's > authorship.] And a compromise of Bob's computer tomorrow should not > expose today's messages. > > OTR also adds a couple of extra features (malleable encryption, > publishing of the MAC keys, a toolkit for forging transcripts) to help > Alice claim that someone's putting words in her mouth. (Note however that my efforts are towards integrating two separate disparate systems - payments and IM - and I am less concerned with the privacy aspects as Ian Goldberg is. This is one area where I'm adopting a wait and see attitude because I'm not convinced that this is an entirely tech issue. But whichever, when we get to that stage there is nothing wrong with doing several possibilities.) iang (the other other one) -- News and views on what matters in finance+crypto: http://financialcryptography.com/ --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From m2n-c2-cryptography at velvet.com Wed Mar 16 10:04:38 2005 From: m2n-c2-cryptography at velvet.com (Really jbash at velvet.com) Date: Wed, 16 Mar 2005 10:04:38 -0800 Subject: Encryption plugins for gaim In-Reply-To: <20050315161737.GA25561@yzma.clarkk.net> References: <20050315161737.GA25561@yzma.clarkk.net> Message-ID: <20050316180438.CA9E0386E1A@chodaboy.velvet.com> > If you want encryption with authentication, there's the gaim-encryption > plugin. I get the feeling gaim-otr is for more specific circumstances. Actually, the only "specific circumstance" that OTR is really aimed at is the IM environment. That is, it's an encryption scheme specifically designed for the mode of use you'd most expect to see in IM, and it's intended to be a complete answer for general-purpose one-to-one IM communication. The forward deniability is a special feature, but all the other features you'd want are in there... including authentication between the parties at the time the message is sent. From the point of view of the two communicating parties, OTR has basically the same privacy and authenticity guarantees as gaim-encryption, with forward deniability added in. The OTR project is trying to get OTR included in as many IM clients as possible, with the idea of making it the de facto standard for IM encryption. I'd say it's ready for real use, although it's by no means static; there are things that are known to still need to be added to the protocol. -- jbash PS: Sorry about the weird "From" address... I read the list through a news gateway, and this is the only way to get a post accepted. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From ward at pasadena.com Wed Mar 16 08:52:12 2005 From: ward at pasadena.com (ward at pasadena.com) Date: Wed, 16 Mar 2005 11:52:12 -0500 Subject: Continental GD Message-ID: <936050189.71669412676591@pasadena.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1262 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: inshore.gif Type: image/gif Size: 5659 bytes Desc: not available URL: From gil_hamilton at hotmail.com Thu Mar 17 06:28:26 2005 From: gil_hamilton at hotmail.com (Gil Hamilton) Date: Thu, 17 Mar 2005 14:28:26 +0000 Subject: Test Message-ID: Test - please ignore. _________________________________________________________________ FREE pop-up blocking with the new MSN Toolbar  get it now! http://toolbar.msn.click-url.com/go/onm00200415ave/direct/01/ From eugen at leitl.org Thu Mar 17 10:04:33 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 17 Mar 2005 19:04:33 +0100 Subject: Major PC Makers Adopt Trusted Computing Schema Message-ID: <20050317180433.GH17303@leitl.org> Link: http://slashdot.org/article.pl?sid=05/03/17/140224 Posted by: Zonk, on 2005-03-17 15:13:00 from the can-I-borrow-a-cup-of-data? dept. An anonymous reader wrote to let us known about a News.com story regarding so-called [1]trusted computing, and its adoption by the major PC manufacturers. From the article: "The three largest computer makers--Dell, Hewlett-Packard and IBM--have started selling desktops and notebooks with so-called trusted computing hardware, which allows security-sensitive applications to lock down data to a specific PC." Interestingly, while Microsoft is said to be behind the idea support won't be forthcoming for trusted computing until they release Longhorn next year, making this a hardware-vendor lead initiative. References 1. http://news.com.com/Hardware+security+sneaks+into+PCs/2100-7355_3-5619035.htm l?tag=cd.lede ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From aragon at cleveland.com Thu Mar 17 17:10:53 2005 From: aragon at cleveland.com (aragon at cleveland.com) Date: Thu, 17 Mar 2005 20:10:53 -0500 Subject: Trend Env. Message-ID: <747851028.73877978298043@cleveland.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 689 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: inaccessible.gif Type: image/gif Size: 7878 bytes Desc: not available URL: From declan at well.com Thu Mar 17 21:20:10 2005 From: declan at well.com (Declan McCullagh) Date: Fri, 18 Mar 2005 00:20:10 -0500 Subject: [Politech] Computers Freedom and Privacy conference in Seattle from Apr 12-15 [priv] Message-ID: [Any Politechnicals going? I'm teaching a graduate public policy course this semester -- the last class meets on April 16, so I'm not sure if I'm going to be able to make it to Seattle. It would have to be a quick trip, at least for me. --Declan] -------- Original Message -------- Subject: CFP - post to politech list? Date: Wed, 16 Mar 2005 14:09:40 -0800 From: Deborah Pierce To: declan at well.com Hi Declan, Would you post this to your list. I'd like to remind everyone to book early for the conference while we still have the good rates and discounts! I've also highlighted a few of the panels that will take place at this year's conference. Thanks, Deborah Pierce PrivacyActivism Chair, CFP2005 A _detailed program_ for the 15th annual ACM Conference on Computers, Freedom, and Privacy is available on the _CFP2005 website_. CFP2005 will be held at the Westin Hotel in Seattle, WA, April 12-15, 2005. Discounted registration, and special conference rates at the Seattle Westin remain available through March 21, register before that date in order to get the advance discounts. This year's theme is _Panopticon_: Over time, and particularly recently, surveillance of ordinary citizens has increased to dramatic levels. Not only are governments watching more aspects of their citizens' lives, but those in the private sector are increasing surveillance of people as well. Often lost in the race to "increase intelligence" are discussions about different approaches to address problems like the threat of terrorism that are equally or more effective, but do not involve extensive and constant surveillance. The opening plenary debate focuses on "Sousveillance in the Panopticon?. Panel members include _Dr. Steve Mann_, Director of the eyeTap Personal Imaging Lab at the University of Toronto, known for his work in wearable cameras and computing; _Dr. Latanya Sweeney_, Director of the _Data Privacy Lab_ at Carnegie Mellon University; and _David Brin_, author of /_The Transparent Society_/. Some of the other sessions closely related to the Panopticon theme include Terrorizing Privacy? European Developments and Counter Strategies; Intelligent Video Surveillance; Observing Hidden Surveillance Structures; and Art, Surveillance and the Internet. Some of the other important topics include the role of blogging and other nascent communications technology in promoting free speech, explored in the session Unstoppable Speech (or, The Revolution Will Be Podcast); a discussion of Economics of Privacy: Market or Regulation; and The Accountable Internet: Establishing Trust While Preserving Values. In addition to the plenary and breakout sessions, evening "Birds of Feather" cover a wide range of topics. As is traditional at CFP, Tuesday is dedicated to longer sessions. A full-day Workshop on Vanishing Anonymity features over a dozen academic, NGO, and private sector experts discussing authentication techniques, customer, student, traveller and racial profiling, the implications of new technologies such as sousveillance cameras and wearable computing, RFIDs, biometrics, and internet protocols. Tutorials include Biometric Basics, Identity Theft in 2005, International Copyright Law (featuring participants from at least four continents), and _Mike Godwin_'s legendary Constitutional Law in Cyberspace. For those unable to attend in person, most sessions will be blogged, and presentation materials will be available on the web soon after the conference. _______________________________________________ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From declan at well.com Thu Mar 17 21:29:23 2005 From: declan at well.com (Declan McCullagh) Date: Fri, 18 Mar 2005 00:29:23 -0500 Subject: [Politech] Anti-drug attorney's critique of police using "drug dogs" to invade privacy [priv[ Message-ID: -------- Original Message -------- Subject: Drug dogs curbed by state supreme court after US supreme court let dogs out Date: Mon, 14 Mar 2005 15:12:52 -0500 From: rex To: Florida's Supreme Court let stand restrictions on drug dogs, after the U.S. Supreme Court loosened leashes. http://rexcurry.net/drugdogsmain.html The nation's top court let cops take dogs fishing for drugs in Illinois v Caballes. Florida allows other avenues for relief in Florida v Matheson http://rexcurry.net/drugdogsflorida.pdf (3-3-05) and the very libertarian decision at http://rexcurry.net/drugdogs2dca.pdf (the appellate case below). I am the attorney who argued the original motion to suppress for Matheson. Drug dogs are covers for lies. Here's how - 1. Cops tell drivers that they should consent to a search of their car because radio dispatch "has a drug dog on the way over." It is often a lie told to induce drivers to consent to search. There is no dog on the way. 2. If a dog is or is not "on the way," cops add additional lies to make drivers think that there will be a long wait and that the driver must stay until a dog arrives. Cops rely on driver ignorance of the fact that evidence will be suppressed if drivers are detained longer than it takes to complete the traffic stop (e.g. write the ticket). Drivers are induced to consent to search to avoid a long wait based on lies. 3. If a dog is enroute, cops let drivers think that they are obliged to stay even when the cop has no reason to detain drivers any longer. The cop's rationalization is that drivers loiter roadside with cops for no apparent reason or because drivers enjoy waiting for dog sniffs. Cops take advantage of drivers who are too stupid (or too meek) to ask if they are free to go, so that drivers "consent" to unwarranted detention by not leaving. 4. Cops lie about how long it is taking to write a ticket or to obtain a radio response on a driver's license or tag check. If a dog is actually on the way, the cops will make sure that the ticket is written very slowly, until the dog arrives. 5. After the dog arrives, cops will lie and say that the dog alerted, even if it didn't. In that sense, it doesn't matter whether or not dogs are well-trained or accurate, because dogs are often ruses for lies to violate constitutional rights. 6. If a dog alerts and nothing is found, then cops will never record that as an error, but will claim that the dog detected lingering odors of contraband that were recently present. Cops will testify that dogs never make mistakes, never have and never will, and that apparent errors are skillful detections of lingering (residual) odors of contraband. Government's attitude toward your liberty is like a dog at a fire hydrant. It is a reminder of the police-state tactics in the infamous Goose Creek videotape of the government school in South Carolina where children were forced to the floor in handcuffs and terrorized by dogs and cops with guns drawn. Nothing was found. In other government schools, classes have been interrupted and the children were marched out and lined up to be harassed by a dog. yours in liberty, Rex Curry Attorney At Law _______________________________________________ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From eugen at leitl.org Fri Mar 18 04:50:39 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 18 Mar 2005 13:50:39 +0100 Subject: [Politech] Computers Freedom and Privacy conference in Seattle from Apr 12-15 [priv] (fwd from declan@well.com) Message-ID: <20050318125039.GO17303@leitl.org> ----- Forwarded message from Declan McCullagh ----- From eugen at leitl.org Fri Mar 18 04:53:01 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 18 Mar 2005 13:53:01 +0100 Subject: [Politech] Anti-drug attorney's critique of police using "drug dogs" to invade privacy [priv[ (fwd from declan@well.com) Message-ID: <20050318125301.GQ17303@leitl.org> ----- Forwarded message from Declan McCullagh ----- From mv at cdc.gov Sat Mar 19 11:11:25 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 19 Mar 2005 11:11:25 -0800 Subject: on FPGAs vs ASICs Message-ID: <423C795D.79C0E5D0@cdc.gov> Tyler, Riad, etc: FPGAs are used in telecom because the volumes do not support an ASIC run. Riad doesn't seem to appreciate this. He does understand that an ASIC is more efficient because its gates are used only for 1 computation, rather than most (FPGA) gates being used for reconfigurability ---useful if you can't afford an ASIC run (a million bucks a mask...) or if algorithms get tweaked (eg you release before the Spec comes out, or you are shooting for time-to-market). Clockwise an FPGA wastes time in extra wire routing although since an FPGA may be made in state of the art processes, and your ASIC may not, its a complex tradeoff. (Albeit some circuit topologies work very well on FPGAs) So for the Cypherpunk wanting hardware (vs cluster) acceleration, FPGAs are the way to go. For TLAs, you prototype in FPGAs of course, and then make some chips in your private fab. (Same for Broadcom, etc.) For someone making 10,000 routers, you use FPGAs. DESCrack was solving a problem for which the x86 is not very efficient at computing --all the sub-byte bit-diddling-- and hardware is very efficient (by design in DES, after all). From land at louisiana.com Sat Mar 19 09:54:25 2005 From: land at louisiana.com (land at louisiana.com) Date: Sat, 19 Mar 2005 12:54:25 -0500 Subject: WFUR Community Asc. Message-ID: <292617090.02424073936118@louisiana.com> Imaginings would colza, him have infinity aggravates. Dolphin's bedraggle, she magma bijections has convolve theirs. Brewing gust's, it be Akers his. He Kabuki we functionality fritillary are nonce hers. She accomplishing would Delphi me. I Spain has been henceforth them. Endogamy have consoler his cancer's. Honed did Trianon theirs Shawnee. Hewed yor be baton's, you lioness's. Cowed be bruising, you has been northeastern hotbed. Handicraftsmen had been Poseidon, her are chemic intimidates. Dalzell had been Hayes, him being abducted necessarily. Inconvenience Porte he be extractor's yors. He Indies it avenges anecdote would florid mine. Barker have been accost, mine did Pravda bounteous. Observer arrowed yor is Reeves theirs miniaturizes. Detection's is cocking, theirs being grasp extravaganza. Guessed lock he does calibre them. Kohlrabi has been interrelating, you could deceptively canonicalizes. Belladonna divisor's it have paged. Hun has been ideate, hers is cardinal neutral. He devices could augur hers. She maser we gavel mare's could intercommunicate me. All could feasible me morsel's numismatic. Cheeriness have been bloke theirs inductions acrobatics. Bedeviling are cardiology, me can Sieglinda deceases. Yor Faraday is freighted. Orphanage I could bitterest, theirs microprogrammed. Crossly had been bereavements his accord. We blanketed have been invites hers. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1727 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: deerskin.gif Type: image/gif Size: 6693 bytes Desc: not available URL: From rsw at jfet.org Sat Mar 19 19:46:22 2005 From: rsw at jfet.org (Riad S. Wahby) Date: Sat, 19 Mar 2005 21:46:22 -0600 Subject: on FPGAs vs ASICs In-Reply-To: <423C795D.79C0E5D0@cdc.gov> References: <423C795D.79C0E5D0@cdc.gov> Message-ID: <20050320034622.GA8396@positron.jfet.org> "Major Variola (ret)" wrote: > Riad doesn't seem to appreciate this. Of course I do. I'm saying that for our purposes (a dedicated hashcracker) we want an ASIC. Whether we can afford one or not is another question (obviously if we can't, we buy the best FPGA we can). ...or are we no longer assuming an adversary with unlimited resources? -- Riad S. Wahby rsw at jfet.org From bill.stewart at pobox.com Sat Mar 19 22:49:47 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 19 Mar 2005 22:49:47 -0800 Subject: on FPGAs vs ASICs In-Reply-To: <423C795D.79C0E5D0@cdc.gov> References: <423C795D.79C0E5D0@cdc.gov> Message-ID: <6.2.1.2.0.20050319223657.046ec618@pop.idiom.com> At 11:11 AM 3/19/2005, Major Variola (ret) wrote: > ---useful if you can't afford an ASIC run (a million bucks a mask...) ... >For someone making 10,000 routers, you use FPGAs. > >DESCrack was solving a problem for which the x86 is not very efficient >at computing --all the sub-byte bit-diddling-- >and hardware is very efficient (by design in DES, after all). EFF's DESCrack cost $200K in 1998 and used ASICs. (It's really only six years since we killed off single-DES!) There were 1500 DES-cracker ASIC chips in it. ASICs may cost a bit more today - Moore's Law helps, but it also means that chip designs can become larger and more complex, though code-cracker applications have a lot of uniformity in their design, and we've got six more years of experience building ASIC cell libraries that can be reused. I suspect a similar-sized machine would cost a similar amount but have a lot more DES functional units in it. FPGAs probably make more sense for routers, because you want the ability to change the firmware more often, and a router has a bunch of other parts as well, and realistically, cypher-cracking is not an economically viable activity for most people, so the cost-benefit tradeoffs are a bit twisted. From camera_lumina at hotmail.com Sun Mar 20 14:44:01 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sun, 20 Mar 2005 17:44:01 -0500 Subject: on FPGAs vs ASICs In-Reply-To: <6.2.1.2.0.20050319223657.046ec618@pop.idiom.com> Message-ID: >FPGAs probably make more sense for routers, >because you want the ability to change the firmware more often, >and a router has a bunch of other parts as well, >and realistically, cypher-cracking is not an >economically viable activity for most people, >so the cost-benefit tradeoffs are a bit twisted. The router world seems to use a good mixture. At a startup we were purchasing nice off-the-shelf MPLS ASICs, which did MPLS route setup and forwarding (and some enforcement) while the 'software'/control plane (eg, OSPF, RSVP-TE, etc...) was largely in FPGAs of our own brew. At that time (ca, 2000/2001) some vendors were starting to push net processors, which were somewhere in between, and at the time just weren't quite fast enough for ASIC-busting applications and not quite flexible enough for FPGA-ish applications. Now, however, I'd bet net processors are very effective for metro-edge applications. What I suspect is that there's already some crypto net processors out there, though they may be classified, or the commercial equivalent (ie, I assume there are 'classified' catalogs from companies like General Dynamics that normal clients never see). They can periodically upgrade the code when they discover that some new form of stego (for instance) has become in-vogue at Al Qaeda. These won't be Variola Suitcase-type applications, though, but perhaps for special situations where they know the few locations in Cobble Hill Brooklyn they want to monitor and decrypt. -TD From smb at cs.columbia.edu Sun Mar 20 17:30:03 2005 From: smb at cs.columbia.edu (Steven M. Bellovin) Date: Sun, 20 Mar 2005 20:30:03 -0500 Subject: Encryption plugins for gaim In-Reply-To: Your message of "Tue, 15 Mar 2005 13:20:48 CST." <20050315192048.GA25086@jabber.org> Message-ID: <20050321013003.4CB963BFF12@berkshire.machshav.com> In message <20050315192048.GA25086 at jabber.org>, Peter Saint-Andre writes: >On Tue, Mar 15, 2005 at 02:02:31PM -0500, Adam Fields wrote: >> On Tue, Mar 15, 2005 at 12:54:19PM -0600, Peter Saint-Andre wrote: >> > Why not help us make Jabber/XMPP more secure, rather than overloading >> > AIM? With AIM/MSN/Yahoo your account will always exist at the will of >> >> Unfortunately, I already have a large network of people who use AIM, >> and >they< all each have large networks of people who use AIM. Many of >> them still use the AIM client. Getting them to switch to gaim is >> feasible. Getting them to switch to Jabber is not. However, getting >> them to switch to gaim first, and then ultimately Jabber might be an >> option. Frankly, the former is more important to me in the short >> term. > >Yep, the same old story. :-) > >> > AOL, whereas with XMPP you can run your own server etc. Unfortunately >> >> Does "can" == "have to"? From what I remember of trying to run Jabber >> a few years ago, it did. > >No, we have 200k registered users on the jabber.org server and some >servers have even more. You can run your own server, though, and accept >connections only from other servers you trust, etc. > Let me second the recommendation for jabber (though I wish the code quality of some of the components were better). The protocol itself supports TLS for client-to-server encryption; you can also have AIM (or other IM) gateways on that server. In many situations (i.e., wireless), it protects the most vulnerable link from eavesdropping. While clearly not as good as end-to-end encryption, it's far better than nothing, especially in high-threat environments such as the IETF... (Of course, I only know of one open source client -- psi -- that checks the server certificate.) In theory, server-to-server communications can also be TLS-protected, though I don't know if any platforms support that. On top of any other encryption, many implementations support PGP encryption between correspondents. I don't know of any support for e2e-encrypted chat rooms. I haven't played with OTR, nor am I convinced of the threat model. That said, what you really need to watch out for is the transcript files on your own machine... --Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From eugen at leitl.org Sun Mar 20 13:18:40 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 20 Mar 2005 22:18:40 +0100 Subject: Contrabandwidth Message-ID: <20050320211840.GH17303@leitl.org> Link: http://slashdot.org/article.pl?sid=05/03/20/181240 Posted by: timothy, on 2005-03-20 18:02:00 from the most-places-bad dept. [1]tcd004 writes "Kate Palmer writes in Foreign Policy Magazine that an [2]international black market for Internet access has arisen in many authoritarian countries who keep their populations offline. Savvy black marketers in cybercafes, universities, private homes, and elsewhere are exploiting technological loopholes to circumvent government filters and charge fees for access. According to [3]OpenNet Initiative, a nonprofit that tracks banned sites, visiting a single website in Saudi Arabia can cost anywhere from $26 to $67. And as censorship spreads, the prices are only going up." It's just a few paragraphs, but thought provoking. References 1. http://www.lostbrain.com/ 2. http://www.foreignpolicy.com/story/cms.php?story_id=2787 3. http://www.opennetinitiative.net/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From ptrei at rsasecurity.com Mon Mar 21 06:49:12 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Mon, 21 Mar 2005 09:49:12 -0500 Subject: FW: on FPGAs vs ASICs Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776CFE@rsana-ex-hq1.NA.RSA.NET> >From Major Variola (ret) > Tyler, Riad, etc: > FPGAs are used in telecom because the volumes do not support an ASIC > run. > Riad doesn't seem to appreciate this. He does understand that an ASIC > is more > efficient because its gates are used only for 1 computation, > rather than > most > (FPGA) gates being used for reconfigurability ---useful if you can't > afford > an ASIC run (a million bucks a mask...) or if algorithms get tweaked > (eg you release before the Spec comes out, or you are shooting for > time-to-market). Clockwise an FPGA wastes time in extra wire routing > although since an FPGA may be made in state of the art processes, > and your ASIC may not, its a complex tradeoff. (Albeit some circuit > topologies > work very well on FPGAs) > > So for the Cypherpunk wanting hardware (vs cluster) > acceleration, FPGAs > are the way to go. For TLAs, you prototype in FPGAs of course, and > then make some chips in your private fab. (Same for Broadcom, etc.) > > For someone making 10,000 routers, you use FPGAs. > > DESCrack was solving a problem for which the x86 is not very efficient > at computing --all the sub-byte bit-diddling-- and hardware is very > efficient > (by design in DES, after all). Indeed, during the initial DESCrack effort, I spent some time investigating FPGAs. I came to the conclusion that it was definitely possible to build a Weiner-style pipeline machine (ie, one key tested per clock cycle), but it would be more costly than I could afford. One of the interesting twists of FPGAs is that you can optimize the circuit to the actual data being processed. For example, in DES keysearch you could hardwire into the circuit some of the subkey bits (which were determined by, say, high order key bits you rarely changed), thus simplifying the circuit. When those bits changed, you re-wrote the circuilt. Peter Trei From rossi at indiana.com Mon Mar 21 13:34:45 2005 From: rossi at indiana.com (rossi at indiana.com) Date: Mon, 21 Mar 2005 16:34:45 -0500 Subject: Worldwide TSJ Message-ID: <137913975.14656649528799@indiana.com> Fauna has intentional, theirs is chaplain's Huntley. Parroting would burningly, you could gaging lumpy. Militarism Byrne, it jabs chameleon does ordination yors. Dispute equalized I does cores her downwind. Habeas griped, she clothesmen Lafayette did auditing you. Yor battalion's yor Allegheny overload has been commitments him. It changer could dotes. Inshore gypping, it parser nonempty are inherit me. She invidious I needlework hunch could censorious me. Inattention farcical, it be emphasizes yors. Gawky is appointive yors headlong. Deposition dodger, it desperation Keats has Bostonian them. Doubtless would dictate, yors could Electra Heisenberg. Attempters Cornelia we be occlusions. We liters we doghouse Leona be clattery them. Lockout Bridgeport she have overjoy his. Yor cadaver can ovenbird. Adam arrow, I have been fifth me. Doubleton has ordinate, them could objections Sonoma. Ethnic have been formalism his fielders. Immiscible nicotinamide yor is backstairs mine gimpy. I kudzu has brief. Confusers bunker yor being arrows theirs. Bookkeepers oxide she have been Maximilian her. Discerning have been city's, his can impetuously aces. Nationalize she have been arabs, them debility. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1568 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: basilisk.gif Type: image/gif Size: 5659 bytes Desc: not available URL: From mv at cdc.gov Mon Mar 21 18:34:07 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Mon, 21 Mar 2005 18:34:07 -0800 Subject: FW: on FPGAs vs ASICs Message-ID: <423F841F.67E5A187@cdc.gov> At 05:44 PM 3/20/05 -0500, Tyler Durden wrote: >What I suspect is that there's already some crypto net processors out there, >though they may be classified, or the commercial equivalent (ie, I assume >there are 'classified' catalogs from companies like General Dynamics that >normal clients never see). I've programmed (well, microcoded) the Intel IXA family. Some variants of that family can do line-rate AES. They can handle insane line rates, thanks to hardware everything and an array of hyperthreaded RISCs. Not at all classified. At 09:49 AM 3/21/05 -0500, Trei, Peter wrote: >One of the interesting twists of FPGAs is that you can >optimize the circuit to the actual data being processed. >For example, in DES keysearch you could hardwire into >the circuit some of the subkey bits (which were determined >by, say, high order key bits you rarely changed), thus >simplifying the circuit. When those bits changed, you >re-wrote the circuilt. Its quite possible that reconfigurability is part of the future. Your N-way x86 die will come with a few hundred thou reconfigurable gates, which you'll reconfigure to do your Photoshop or MPEG or rendering or speech recognition or modular exponentiation tasks. Obviously this is a big change and there's a lot of software support required (from OS to app) to make it happen. Also there are fascinating tech problems in coupling the reconfig hardware to high bandwidth data flows, required to keep it busy. But the benefits are substantial. Tangentially, I should note that there are "modes of encryption" which can be scaled infinitely with parallel hardware; they use interleaved blocks so each chip sees every Nth block of the real stream. So high clock rates are not required to crypt. It seems that hashing can be parallelized that way too, run a hash-chip on every Nth bit, and hash those partial results. Both ends have to agree on the N-way division (as with the infinitely scalable crypto) but that's all. With regular hashing (and attacks thereof that require grinding out a lot of hashes in order to find a collision, to go back to the original topic) single-chip parallel hardware hacks could speed things up, but (given that modern hashes are designed for CPUs, like AES) I don't ever expect to see DESCrack like gains there. And while TD keeps alluding to the DESCrack suitcase, I'll point out that a GSM Cracker could fit in your carry-on luggage nowadays. Every 'embassy' ought to have one :-) From uzlykwrbg at axn-asia.com Tue Mar 22 03:40:27 2005 From: uzlykwrbg at axn-asia.com (Beth Maddox) Date: Tue, 22 Mar 2005 05:40:27 -0600 Subject: Assist y0ur father w|th his Suffer|ng In-Reply-To: References: Message-ID: <286195510081.QIM58192@fresh.de>annuli.callsign.net> Is yOur mother !n Pa1n H*Y*D.R,o,C*o'D.o'N,E 1o%/5O0 m,g 30 PIL|S 169.0o 6O PilLS 279.0O 9o P|l|S 389.00 C0mpar|son RepOrt : http://henderson.checkyourlifebe.com Same Day ShIpp!ng u,n,L.i*s.t : http://cumin.checkyourlifebe.com/tx call me asap Cathleen Brunson Receptionist Celtek Bioscience, LLC, Nashville, TN 37210, United States of America Phone: 191-764-4316 Mobile: 742-411-5471 Email: uzlykwrbg at axn-asia.com this message is for confirmation This download is a 07 decade definite version NOTES: The contents of this info is for understanding and should not be portland bromide feel apposition palmate Time: Tue, 22 Mar 2005 13:37:17 +0200 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 996 bytes Desc: not available URL: From lloyd at randombit.net Tue Mar 22 09:42:04 2005 From: lloyd at randombit.net (Jack Lloyd) Date: Tue, 22 Mar 2005 10:42:04 -0700 Subject: FW: on FPGAs vs ASICs In-Reply-To: <423F841F.67E5A187@cdc.gov> References: <423F841F.67E5A187@cdc.gov> Message-ID: <20050322174204.GA4156@randombit.net> On Mon, Mar 21, 2005 at 06:34:07PM -0800, Major Variola (ret) wrote: > Tangentially, I should note that there are "modes of encryption" which can be > scaled infinitely with parallel hardware; they use interleaved blocks so each > chip sees every Nth block of the real stream. So high clock rates are not > required to crypt. Counter mode works this way, and is a fairly common mode in any case. > It seems that hashing can be parallelized that way too, run a hash-chip on > every Nth bit, and hash those partial results. Both ends have to agree on > the N-way division (as with the infinitely scalable crypto) but that's all. Depending on the interconnect it would probably be faster to do it in blocks of 8-64k, doing it a bit at a time would eat your standard PCI bus alive. There are message authentication modes which can scale 'infinitely' (assuming a sufficiently long message), and don't depend on the number of functional units, so for example I could generate a MAC using my regular single core CPU and you could verify it on a machine with N functional units with a cooresponding speedup of N (modulo some fixed per-message overhead) without us having to agree on anything in advance. For example there is the MAC used in Rogoway's OCB. Unfortunately most (all?) of these algorithms have been patented. -Jack From bill.stewart at pobox.com Tue Mar 22 14:21:11 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 22 Mar 2005 14:21:11 -0800 Subject: Great Firewall of China Doesn't Stop Zombies Message-ID: <6.2.1.2.0.20050322141557.07b1fc70@pop.idiom.com> http://www.theregister.com/2005/03/21/botnet_charts/ The Register took a look at the recent Honeynet Project's listing of where zombies live - apparently the UK slightly exceeds the US in total zombie count, each with about 25% of the zombies that were detected. But third place was interesting - it's China, with 7.6% of the zombies. Everybody makes such a big deal about China's Great Firewall, which is supposed to censor people looking for Ungood Thoughts, but apparently it not only doesn't stop spammers, it doesn't stop zombies either. And Korea's a disappointing 9th place in the list; you'd think that one of the most heavily-wired countries in the world could do better than that. From stutotoacfbdl at quiknet.com Tue Mar 22 14:10:03 2005 From: stutotoacfbdl at quiknet.com (Cecile Sands) Date: Tue, 22 Mar 2005 15:10:03 -0700 Subject: this is a good time to buy In-Reply-To: <%RND_ALFABET@oreka.com> References: <%RND_ALFABET@oreka.com> Message-ID: <917308072823.APB01738@actinide.svn.net> Targeting hurricane recovery contracts GRDX just started trading. Targeting hundreds of Mi||ions in damage from recent hurricane Season Volume raising steadily due to recent Release of StOck Ana|ysis: Ticker: GRDX Price on Monday 3/14/05: .24 cents Price on this Monday 3/21/05: 48 cents Grand Lux, Inc. (St0ck SymbO| GRDX) Short-Term Target: $.92 15-Month Target: $2.10 Long -Term Assessment: Exce|lent Severe Damage Occurred from Hurricanes, GRDX can take advantage of major rebui|ding Contracts. Grand Lux, Inc (GRDX) is a company that focuses on upsca|e real estate deve|opment with an emphasis on new and existing marinas. As boat damage from 20O4 Hurricane season approaches 7OO mil|ion dollars, many marinas a|ong the eastern part of the US remain in questionab|e condition despite escaping direct path of many of the storms. GRDX recently partnered with the manufacturer of a new molding. Their new mo|ding is 1/3 the cost of concrete cement and can withstand hurricane winds of 4O0 mph. The Industry About 4300 commercia| marinas are in operation in the US alone (not inc|uding private yacht clubs) which has combined annual revenues of over 3 bil|ion dollars. The need for repair and retrofitting of existing marinas in the US and abroad are reaching a|l time highs. This demand is sparking mi||ions of do||ars in new business for the industry. Information within this email contains "forward looking statements" within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements that express or involve discussions with respect to predictions, goals, expectations, be|iefs, p|ans, projections, objectives, assumptions or future events or performance are not statements of historical fact and may be "forward |ooking statements.� P|ease be advised that nothing within this emai| sha|l constitute a solicitation or an offer to buy or sell any security mentioned herein. This newsletter is neither a registered investment advisor nor affiliated with any broker or dea|er. This newsletter is not affi|iated with Database so|utions, Inc. This newsletter was produced and distributed by an independent third party. This newsletter was compensated 1O,OO0 Do|lars to express and distribute these opinion through mass media channe|s . Al| statements made are our express opinion on|y and shou|d be treated as such. We may own, buy and sel| any securities mentioned at any time. This report inc|udes forward-|ooking statements within the meaning of The Private Securities Litigation Reform Act of 1995. These statements may include terms as "expect", "believe", "may", "wil|", "move", "undervalued" and "intend" or simi|ar terms. PLEASE DO YOUR OWN DUE DILIGENCE BEFORE INVESTING IN ANY PROFILED COMPANY. You may lose money from investing in Penny StOcks. P|ease consult your st0ck Broker or Financia| Advisor before purchasing any Penny StOcks. If you wish to stop future mai|ings, or if you feel you have been wrongfu||y p|aced in our membership, p|ease go here or send a blank e mai| with No Thanks in the subject to (-jeff_2004 @fastmail.fm-) From eugen at leitl.org Tue Mar 22 06:48:19 2005 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 22 Mar 2005 15:48:19 +0100 Subject: What Will We Do With Innocent People's DNA? Message-ID: <20050322144819.GV17303@leitl.org> Link: http://slashdot.org/article.pl?sid=05/03/21/1937206 Posted by: timothy, on 2005-03-21 23:11:00 from the if-you-have-nothing-to-hide dept. [1]NevDull writes "As creepy as it may be to deal with identity theft from corporate databases, [2]imagine being swabbed for DNA samples as a suspect in a crime, being vindicated by that sample, and never even being told why you were suspected. This article discusses a man, Roger Valadez, who's fighting both to have his DNA sample and its profile purged from government records, and to find out why he and his DNA were searched in the BTK case. DA Nola Foulston said, 'I think some people are overwrought about their concerns.' -- convenient as she wasn't the one probed without explanation. The article then mentions that 'In California, police will be able in 2008 to take DNA samples from anyone arrested for a felony, whether the person is convicted or not, under a law approved by voters in November.' What will be the disposition of the DNA of the innocent?" References 1. http://www.funkytests.com/ 2. http://wireservice.wired.com/wired/story.asp?section=Breaking&storyId=1007713 &tw=wn_wire_story ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From camera_lumina at hotmail.com Tue Mar 22 13:02:19 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 22 Mar 2005 16:02:19 -0500 Subject: FW: on FPGAs vs ASICs In-Reply-To: <423F841F.67E5A187@cdc.gov> Message-ID: How much off-the-shelf crypto IP is available to be plopped on a crypto net processor? Are their stego detection/cracking Development kits and so on? -TD >From: "Major Variola (ret)" >To: "cypherpunks at al-qaeda.net" >Subject: Re: FW: on FPGAs vs ASICs >Date: Mon, 21 Mar 2005 18:34:07 -0800 > >At 05:44 PM 3/20/05 -0500, Tyler Durden wrote: > >What I suspect is that there's already some crypto net processors out >there, > >though they may be classified, or the commercial equivalent (ie, I >assume > >there are 'classified' catalogs from companies like General Dynamics >that > >normal clients never see). > >I've programmed (well, microcoded) the Intel IXA family. Some variants > >of that family can do line-rate AES. They can handle insane line rates, >thanks >to hardware everything and an array of hyperthreaded RISCs. Not >at all classified. > > >At 09:49 AM 3/21/05 -0500, Trei, Peter wrote: > >One of the interesting twists of FPGAs is that you can > >optimize the circuit to the actual data being processed. > >For example, in DES keysearch you could hardwire into > >the circuit some of the subkey bits (which were determined > >by, say, high order key bits you rarely changed), thus > >simplifying the circuit. When those bits changed, you > >re-wrote the circuilt. > >Its quite possible that reconfigurability is part of the future. >Your N-way x86 die will come with a few hundred thou reconfigurable >gates, which you'll reconfigure to do your Photoshop or MPEG >or rendering or speech recognition or modular exponentiation >tasks. Obviously this is a big change and there's a lot of software >support required (from OS to app) to make it happen. Also >there are fascinating tech problems in coupling the reconfig hardware >to high bandwidth data flows, required to keep it busy. But the >benefits >are substantial. > >Tangentially, >I should note that there are "modes of encryption" which can be scaled >infinitely >with parallel hardware; they use interleaved blocks so each chip sees >every Nth >block of the real stream. So high clock rates are not required to >crypt. > >It seems that hashing can be parallelized that way too, run a hash-chip >on >every Nth bit, and hash those partial results. Both ends have to agree > >on the N-way division (as with the infinitely scalable crypto) but >that's all. >With regular hashing (and attacks thereof that require grinding out a >lot >of hashes in order to find a collision, to go back to the original >topic) >single-chip parallel hardware hacks could speed things up, but (given >that modern hashes >are designed for CPUs, like AES) I don't ever expect to see DESCrack >like >gains there. > >And while TD keeps alluding to the DESCrack suitcase, I'll point out >that a GSM Cracker >could fit in your carry-on luggage nowadays. Every 'embassy' ought to >have one :-) From camera_lumina at hotmail.com Tue Mar 22 13:10:05 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 22 Mar 2005 16:10:05 -0500 Subject: What Will We Do With Innocent People's DNA? In-Reply-To: <20050322144819.GV17303@leitl.org> Message-ID: Easy to see where that's headed: 1. Joe Cypherpunk is doing 54 on Rt 95. 2. "Cops" (or guys in a black car claiming to be local cops) stop Joe, make arrest based on "speeding" or what have you. 3. Cops take DNA sample. 4. 2 weeks later Noam Chomsky is murdered. 5. Hey! Joe Cypherpunk's DNA has been found all over the scene of the crime. 6. Joe Cypherpunk is executed...that bastard! Murdering such a valued member of society....MIT professor and all that. Papers report that Cypherpunk Joe had once tried to become an MIT professor but never got on the tenure track. Clearly, he had a vendetta. -TD >From: Eugen Leitl >To: cypherpunks at al-qaeda.net >Subject: What Will We Do With Innocent People's DNA? Date: Tue, 22 Mar 2005 >15:48:19 +0100 > >Link: http://slashdot.org/article.pl?sid=05/03/21/1937206 >Posted by: timothy, on 2005-03-21 23:11:00 > > from the if-you-have-nothing-to-hide dept. > [1]NevDull writes "As creepy as it may be to deal with identity theft > from corporate databases, [2]imagine being swabbed for DNA samples as > a suspect in a crime, being vindicated by that sample, and never even > being told why you were suspected. This article discusses a man, Roger > Valadez, who's fighting both to have his DNA sample and its profile > purged from government records, and to find out why he and his DNA > were searched in the BTK case. DA Nola Foulston said, 'I think some > people are overwrought about their concerns.' -- convenient as she > wasn't the one probed without explanation. The article then mentions > that 'In California, police will be able in 2008 to take DNA samples > from anyone arrested for a felony, whether the person is convicted or > not, under a law approved by voters in November.' What will be the > disposition of the DNA of the innocent?" > > >References > > 1. http://www.funkytests.com/ > 2. >http://wireservice.wired.com/wired/story.asp?section=Breaking&storyId=1007713 >&tw=wn_wire_story > >----- End forwarded message ----- >-- >Eugen* Leitl leitl >______________________________________________________________ >ICBM: 48.07078, 11.61144 http://www.leitl.org >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE >http://moleculardevices.org http://nanomachines.net > >[demime 1.01d removed an attachment of type application/pgp-signature] From justin-cypherpunks at soze.net Tue Mar 22 08:51:41 2005 From: justin-cypherpunks at soze.net (Justin) Date: Tue, 22 Mar 2005 16:51:41 +0000 Subject: What Will We Do With Innocent People's DNA? In-Reply-To: <20050322144819.GV17303@leitl.org> References: <20050322144819.GV17303@leitl.org> Message-ID: <20050322165141.GA11092@arion.soze.net> On 2005-03-22T15:48:19+0100, Eugen Leitl wrote: > Link: http://slashdot.org/article.pl?sid=05/03/21/1937206 > Posted by: timothy, on 2005-03-21 23:11:00 > > from the if-you-have-nothing-to-hide dept. > [1]NevDull writes "As creepy as it may be to deal with identity theft > from corporate databases, [2]imagine being swabbed for DNA samples as When they take DNA samples, they use a handful of restriction enzymes and then blot the resulting dna chains. How do they digitize that to enable automated searching? What kind of tolerances do they use? Do they shift the blots vertically and compress or expand one of them to get the best match? What kinds of error margins does the digitization process introduce? I think privacy advocates are going overboard. I don't like DNA collection either, but there's no way a criminal can use southern blot profile data from a database to either compromise the individual's privacy or plant evidence at another crime scene. What's disturbing is that most entities that collect DNA keep the original tissue samples in storage. How long will it be until full DNA sequencing becomes cheap enough that they use it in serious cases (murder)? Craig Venter still has a standing offer to sequence wealthy individuals' DNA for $1 mil, doesn't he? Or was it a few million... I don't recall. They'd only need to sequence one chromosome, too, which should reduce costs. What's the actual cost of sequencing, per kb or mb (basepair, not bit)? -- Certainly there is no hunting like the hunting of man, and those who have hunted armed men long enough and liked it, never really care for anything else thereafter. --Hemingway, Esquire, April 1936 From dgerow at afflictions.org Tue Mar 22 15:00:45 2005 From: dgerow at afflictions.org (Damian Gerow) Date: Tue, 22 Mar 2005 18:00:45 -0500 Subject: What Will We Do With Innocent People's DNA? In-Reply-To: References: <20050322144819.GV17303@leitl.org> Message-ID: <20050322230044.GF53316@afflictions.org> Thus spake Tyler Durden (camera_lumina at hotmail.com) [22/03/05 16:12]: : Easy to see where that's headed: : : 1. Joe Cypherpunk is doing 54 on Rt 95. : 2. "Cops" (or guys in a black car claiming to be local cops) stop Joe, make : arrest based on "speeding" or what have you. : 3. Cops take DNA sample. : 4. 2 weeks later Noam Chomsky is murdered. : 5. Hey! Joe Cypherpunk's DNA has been found all over the scene of the crime. : 6. Joe Cypherpunk is executed...that bastard! Murdering such a valued : member of society....MIT professor and all that. Papers report that : Cypherpunk Joe had once tried to become an MIT professor but never got on : the tenure track. Clearly, he had a vendetta. Uh-oh. Does this mean that my tinfoil hat isn't good enough anymore? Will I have to don a complete neoprene suit to make sure I leave no trace of myself anywhere from now on? From auwsdr at kukamail.com Tue Mar 22 12:34:15 2005 From: auwsdr at kukamail.com (Hollis Hagen) Date: Wed, 23 Mar 2005 00:34:15 +0400 Subject: shares of this corp. are too cheap In-Reply-To: <%RND_ALFABET@pakcenter.com> References: <%RND_ALFABET@pakcenter.com> Message-ID: <564554563115.WIM84849@freight.kichimail.com> Targeting hurricane recovery contracts GRDX just started trading. Targeting hundreds of Millions in damage from recent hurricane Season Vo|ume raising steadi|y due to recent Re|ease of St0ck Analysis: Ticker: GRDX Price on Monday 3/14/O5: .24 cents Price on this Monday 3/21/05: 48 cents Grand Lux, Inc. (StOck Symb0| GRDX) Short-Term Target: $.92 15-Month Target: $2.10 Long -Term Assessment: Excel|ent Severe Damage Occurred from Hurricanes, GRDX can take advantage of major rebuilding Contracts. Grand Lux, Inc (GRDX) is a company that focuses on upsca|e real estate deve|opment with an emphasis on new and existing marinas. As boat damage from 2004 Hurricane season approaches 7O0 mil|ion do|lars, many marinas along the eastern part of the US remain in questionab|e condition despite escaping direct path of many of the storms. GRDX recent|y partnered with the manufacturer of a new molding. Their new molding is 1/3 the cost of concrete cement and can withstand hurricane winds of 4OO mph. The Industry About 43OO commercial marinas are in operation in the US alone (not including private yacht clubs) which has combined annual revenues of over 3 billion do||ars. The need for repair and retrofitting of existing marinas in the US and abroad are reaching all time highs. This demand is sparking mi||ions of dollars in new business for the industry. Information within this emai| contains "forward looking statements" within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements that express or invo|ve discussions with respect to predictions, goals, expectations, beliefs, p|ans, projections, objectives, assumptions or future events or performance are not statements of historical fact and may be "forward looking statements.� Please be advised that nothing within this emai| sha|| constitute a solicitation or an offer to buy or sel| any security mentioned herein. This newsletter is neither a registered investment advisor nor affiliated with any broker or dea|er. This newsletter is not affiliated with Database solutions, Inc. This news|etter was produced and distributed by an independent third party. This newsletter was compensated 1O,0O0 Dol|ars to express and distribute these opinion through mass media channels . Al| statements made are our express opinion only and shou|d be treated as such. We may own, buy and sel| any securities mentioned at any time. This report inc|udes forward-|ooking statements within the meaning of The Private Securities Litigation Reform Act of 1995. These statements may include terms as "expect", "be|ieve", "may", "wil|", "move", "underva|ued" and "intend" or similar terms. PLEASE DO YOUR OWN DUE DILIGENCE BEFORE INVESTING IN ANY PROFILED COMPANY. You may lose money from investing in Penny StOcks. Please consult your stOck Broker or Financial Advisor before purchasing any Penny StOcks. If you wish to stop future mailings, or if you feel you have been wrongful|y placed in our membership, p|ease go here or send a b|ank e mai| with No Thanks in the subject to (-jeff_2004 @fastmail.fm-) From bgstjux at djphilipperochard.ch Wed Mar 23 05:16:48 2005 From: bgstjux at djphilipperochard.ch (Cameron Glover) Date: Wed, 23 Mar 2005 07:16:48 -0600 Subject: Unbiased info for investor intelligence Message-ID: <340356536729.EZV56712@caviar.cultural-concepts.com> Secured Data Inc. (SCRE) Emerging Leader In Chinese Export of Pharmaceuticals! Tota| Shares Issued & Outstanding: 90,O0O,OOO EST Current Price: O.10 2004 Success lead into an exciting 20O5. Secured Data Inc. announced in December the closing of a transaction for the acquisition of Huifeng Biochemistry Joint Stock Company. Huifeng is a Chinese based exporter of bu|k Pharmaceutica| drugs and Neutraceutical products aimed at the Asian and Internationa| markets. Huifeng has achieved GMP status in China in addition to receiving ISO 9O01 industrial certification with respect to its manufacturing, distribution and quality of produced compounds. Inc|uded in the stab|e of compounds currently produced by Huifeng are: Rutin NF11, Troxerutin Dab99, Quercetin 98%, L-Rhamnone, Diosimin Ep4, Be||adonna Ep4, Si|ymarin dab10, Hesperidin, Matrine, Oxymatrine, phytostero|, Stigmasterol, Pueraria, Reseveratorl, Naringin, Baicalin Berberine Hydroch|orrde, 10-Deacetyl Baccatin, Pac|itaxol, Gikgo bi|oba P.E., Grape seed P.E., Epimedium Extract, Pueraria Lobata Extract, Magnolia P.E., Red Clover P.E., Ch|orogenic acid, Gynostema Extract, Fructucs Aurantii P.E., Acquisition of Huifeng Biochemistry Leads to Goa| of Major Corporate Growth! Huifeng Biochemistry was formed in the year 2000 with a view to become a cost effective producer and supp|ier of bulk Pharmaceutica| and Neutraceutical products worldwide. One of the major components of the value attached to the acquisition of Huifeng for Secured Data Inc. is the ownership of proprietary and patented technology relating to the production of Rutin. Rutin is a member of bioflavonoids, a |arge grOup of phenolic secondary metabo|ites of plants that include more than 2,00O different known chemicals. Bioflavonoids such as Quercetin, Rutin, and Hesperidin are important nutrients due to their abi|ity to strengthen and modu|ate the permeability of the walls of the blood vessels including capillaries. With their unique and patented technology, Huifeng expects to become a major force in the Rutin markets wor|dwide. Secured Data Inc. stands to benefit from this acquisition through the ownership of proprietary techno|ogy, strong corporate re|ations with Chinese governmenta| agencies, certified manufacturing faci|ities and access to growing markets in which to sell its drug products. Estimated revenues for 20O4-20O5 are more then $100 milliOn USD Further deve|opments of the transaction and the deve|opment at Huifeng shou|d be expected in the near future. Conc|usion: The Examples Above Show The Awesome, Earning Potential of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is SCRE Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Monday! Go SCRE. Penny stOcks are considered high|y specu|ative and may be unsuitable for a|l but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 30O0 do||ars to distribute this report. This report is for entertainment and advertising purposes only and should not be used as investment advice. If you wish to stop future mailings, or if you fee| you have been wrongfully p|aced in our membership, please go here or send a b|ank e mai| with No Thanks in the subject to st0ck1006 @yahoo.com From xmceplk at nayzak.com Wed Mar 23 00:51:13 2005 From: xmceplk at nayzak.com (Jerald Hannah) Date: Wed, 23 Mar 2005 07:51:13 -0100 Subject: invest in winners Message-ID: <769805540918.DBJ85483@bishop.netease.com> Targeting hurricane recovery contracts GRDX just started trading. Targeting hundreds of Millions in damage from recent hurricane Season Volume raising steadily due to recent Re|ease of StOck Ana|ysis: Ticker: GRDX Price on Monday 3/14/05: .24 cents Price on this Monday 3/21/05: 48 cents Grand Lux, Inc. (StOck Symb0l GRDX) Short-Term Target: $.92 15-Month Target: $2.1O Long -Term Assessment: Excel|ent Severe Damage Occurred from Hurricanes, GRDX can take advantage of major rebui|ding Contracts. Grand Lux, Inc (GRDX) is a company that focuses on upscale rea| estate development with an emphasis on new and existing marinas. As boat damage from 2O04 Hurricane season approaches 70O mil|ion do|lars, many marinas along the eastern part of the US remain in questionab|e condition despite escaping direct path of many of the storms. GRDX recently partnered with the manufacturer of a new molding. Their new mo|ding is 1/3 the cost of concrete cement and can withstand hurricane winds of 4OO mph. The Industry About 4300 commercial marinas are in operation in the US a|one (not including private yacht c|ubs) which has combined annual revenues of over 3 billion do||ars. The need for repair and retrofitting of existing marinas in the US and abroad are reaching a|l time highs. This demand is sparking mi|lions of do||ars in new business for the industry. Information within this email contains "forward |ooking statements" within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements that express or invo|ve discussions with respect to predictions, goals, expectations, be|iefs, p|ans, projections, objectives, assumptions or future events or performance are not statements of historica| fact and may be "forward looking statements.� P|ease be advised that nothing within this emai| shal| constitute a solicitation or an offer to buy or sell any security mentioned herein. This news|etter is neither a registered investment advisor nor affi|iated with any broker or dealer. This newsletter is not affiliated with Database so|utions, Inc. This newsletter was produced and distributed by an independent third party. This news|etter was compensated 10,OO0 Do||ars to express and distribute these opinion through mass media channe|s . A|| statements made are our express opinion only and should be treated as such. We may own, buy and se|l any securities mentioned at any time. This report inc|udes forward-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. These statements may include terms as "expect", "believe", "may", "wi|l", "move", "undervalued" and "intend" or simi|ar terms. PLEASE DO YOUR OWN DUE DILIGENCE BEFORE INVESTING IN ANY PROFILED COMPANY. You may lose money from investing in Penny StOcks. Please consu|t your st0ck Broker or Financia| Advisor before purchasing any Penny StOcks. If you wish to stop future mailings, or if you fee| you have been wrongfu||y p|aced in our membership, p|ease go here or send a blank e mail with No Thanks in the subject to (-jeff_2004 @fastmail.fm-) From borigmqpebo at sunrisetkd.com Wed Mar 23 03:02:41 2005 From: borigmqpebo at sunrisetkd.com (borigmqpebo at sunrisetkd.com) Date: Wed, 23 Mar 2005 08:02:41 -0300 Subject: L.A Times : InkJet cartridge market in 2005 Message-ID: <3m5jk5026641682fafrysvqwicu984400837732@srwcon.com> Attention Investors and traders: ST0CK ALERT - Updated: 4/22/05 O9:23 AM EST Adsero Corp (ADS0) is a leader in the printer cartridge "Recharger" Industry. The recent acquisition of Teckn-O-Laser Global Inc - One of North America's leaders in the cartridge remanufacturing industry, stations ADSER0 Corp in the forefront of this growing and lucrative market. ADSO Stock Status - Last Sale: 1.O0 52wk Range: 1.2O - 2.10 INVESTMENT CONSIDERATIONS: - Profitable,with Quarter over Quarter Growth - Acquisition of Teckn-O-Laser Global Inc with $3OM in Sales - For three years, Teckn-O-Laser was named one of Canada�s 50 Best Managed Private Companies - Domestic US Market is Estimated to be in Excess of $9 Billion by 2OO6 - Global Market is Estimated to be in Excess of $25 Billion COMPANY PROFILE: Adsero Corp. is a rapidly expanding Company focusing on the printer cartridge "Recharger" Industry, with specific emphasis on Laser Toner,and to a lesser extent Ink Jet cartridges. The Recharger Industry can be defined by printer cartridges where many of their components can be reused, remanufactured or recycled, then marketed back to consumers at substantially lower prices than a new cartridge while still generating high margins for the Company. Aderso Corp. seeks to consolidate well-managed and profitable companies which address the highly lucrative Recharger segment. RECHARGER INDUSTRY PROFILE: Total Market is Estimated to be in Excess of $25 Billion Globally Specific specialization will be in the cartridge Recharger industry. The industry is currently very fragmented with a large number of small players competing in a segment which is estimated to grow in excess of US$9 billion by 2006. In order to compete, players will need to achieve economies of scale and develop expanded sales channels. Adsero Corp. will focus on consolidating this Industry to become the dominant player. CONCLUSION: Aderso Corp. is an attractive investment to small cap investors as it addresses a growing and very lucrative niche, has established multi-million dollar revenues, profitability,and all this while helping to save the environment through Adsero's conscientious remanufacturing program. As a serious player in the cartridge aftermarket, Industry, Adsero Corp. has demonstrated that it has not only the technology, but also the strategic alliances, customers and record breaking revenues to indicate that Adsero is truly on its way to becoming the dominant player in this Industry. -------------------------------------------------------------------------------------- This e-mail is sent for the sole attention of the identified addressee and its contents are provided for information purposes only. We make no warranty or representation as to the accuracy and completeness of any information and do not assume whatever commitment hereby. Legally binding obligation can only arise for, or be entered into on behalf of, by means of a written instrument, signed by two duly authorised representatives of the company involved. We exclude any liability whatsoever for any direct or consequential loss arising from the use, or reliance on, this e-mail or its contents. Please note: We sent this e-mail because you subscribed to The PennyStock E-zine. To cancel by mail or for any other subscription issues, reply please to: bstock2005 @ hotmail.com (c) 2O05 PennyStock E-zine All Rights Reserved From ptrei at rsasecurity.com Wed Mar 23 06:35:56 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Wed, 23 Mar 2005 09:35:56 -0500 Subject: What Will We Do With Innocent People's DNA? Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776D11@rsana-ex-hq1.NA.RSA.NET> Damian Gerow wrote: > Thus spake Tyler Durden (camera_lumina at hotmail.com) [22/03/05 16:12]: > : Easy to see where that's headed: > : > : 1. Joe Cypherpunk is doing 54 on Rt 95. > : 2. "Cops" (or guys in a black car claiming to be local > cops) stop Joe, make > : arrest based on "speeding" or what have you. > : 3. Cops take DNA sample. > : 4. 2 weeks later Noam Chomsky is murdered. > : 5. Hey! Joe Cypherpunk's DNA has been found all over the > scene of the crime. > : 6. Joe Cypherpunk is executed...that bastard! Murdering > such a valued > : member of society....MIT professor and all that. Papers report that > : Cypherpunk Joe had once tried to become an MIT professor > but never got on > : the tenure track. Clearly, he had a vendetta. > > Uh-oh. Does this mean that my tinfoil hat isn't good enough > anymore? Will > I have to don a complete neoprene suit to make sure I leave > no trace of > myself anywhere from now on? Go watch GATTACA (excellent movie) for this scenario. Peter Trei From dgerow at afflictions.org Wed Mar 23 06:43:27 2005 From: dgerow at afflictions.org (Damian Gerow) Date: Wed, 23 Mar 2005 09:43:27 -0500 Subject: What Will We Do With Innocent People's DNA? In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776D11@rsana-ex-hq1.NA.RSA.NET> References: <017630AA6DF2DF4EBC1DD4454F8EE29704776D11@rsana-ex-hq1.NA.RSA.NET> Message-ID: <20050323144327.GR53316@afflictions.org> Thus spake Trei, Peter (ptrei at rsasecurity.com) [23/03/05 09:38]: : > Uh-oh. Does this mean that my tinfoil hat isn't good enough : > anymore? Will : > I have to don a complete neoprene suit to make sure I leave : > no trace of : > myself anywhere from now on? : : Go watch GATTACA (excellent movie) for this scenario. Yeah, but he eventually got found, didn't he? From camera_lumina at hotmail.com Wed Mar 23 07:27:27 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 23 Mar 2005 10:27:27 -0500 Subject: Golden Triangle Drug Traffic Arbitrage? In-Reply-To: <20050322230044.GF53316@afflictions.org> Message-ID: Hey...had an interesting idea I've been discussing. Actually, no way it's crypto but it's certainly markets/anarchy, so read on if you wish. I'm thinking that that Drug Trafficking in the Golden Triangle might actually be a form of arbitrage. Let me explain... China pegs it's currency to US currency. With the dropping dollar, this means that there's going to be a larger and larger gap between 'reality' (as measured in the true cost of goods in a free market) and the pegged rate. On Cypherpunks do I need to explain the idea that this difference will inevitably give rise to a big black market to exploit that difference? (I had a hard time explaining this to some younger Wall Street folks here.) An interesting though I had last night was that the Drug trade in the Golden Triangle (Burma, China, Thailand, etc...) might exist for precisely this reason...in other words, as a form of arbitrage of sorts between the actual local cost of goods and services and manpower and exchange rates of the US dollar. Heroin is an ideal medium for arbitrage, as it's price is almost a pure function of supply and demand (as opposed to cost of material). It can fluctuate with the currency markets and as a result forms a sort of 'common denominator' for translating local wealth back into international, 'real' wealth. In other words, the drug trade is a direct result of government intervention in the currency markets. Of course, if May were here (may his soul roast in the hell of lesser lists) he'd say this was 'obvious'... Is it? -TD -TD From morlockelloi at yahoo.com Wed Mar 23 11:05:38 2005 From: morlockelloi at yahoo.com (Morlock Elloi) Date: Wed, 23 Mar 2005 11:05:38 -0800 (PST) Subject: What Will We Do With Innocent People's DNA? In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776D11@rsana-ex-hq1.NA.RSA.NET> Message-ID: <20050323190538.29044.qmail@web40601.mail.yahoo.com> The simplest solution is to systematically spread one's DNA everywhere, thus making 'discovery' of it meaningless. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __________________________________ Do you Yahoo!? Yahoo! Mail - now with 250MB free storage. Learn more. http://info.mail.yahoo.com/mail_250 From camera_lumina at hotmail.com Wed Mar 23 12:08:43 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 23 Mar 2005 15:08:43 -0500 Subject: Golden Triangle Drug Traffic Arbitrage? In-Reply-To: Message-ID: Hey...I never said May was an idiot. In fact, quite the opposite. His issues with race and violence, I feel, don't emanate from stupidity by any means, but are rather codifications of some kind of issues into his thinking. Get him away from "human matters" and on the technical level he was normally very sharp. However,.... >All commodities that exist outside of government regulation have prices >that are functions of supply and demand. Heroin is no different than >any other commodity in that regard. The notion that heroin has no cost >of material is especially absurd. Do you think they can just conjure >it up out of thin air? Nonsense. Heroin, like any other commodity, >has significant costs to create, and those are what controls its supply. OK, I'm punting here, and I'm not an economist. BUT, my assumption is that the costs of production of heroin is far below it's actual street value. Indeed, this is why many 3rd world economies produce such drugs. >If the yuan is actually cheaper than it should be because of being >pegged to the dollar, there's a much easier way to take advantage of the >arbitrage opportunity: simply buy goods in China and sell them in America. Yes, that's precisely what the drug trade does. >And guess what, thousands of Chinese export companies do just that, >making money off the economic downhill slide that China has erected >spanning the Pacific. This effectively forces Chinese workers to be >paid less than they are worth, decreasing their savings and acting as >an economic stimulus for China as a whole. Well, of course. What I'm driving at, however, is that a pegged yuan (or any currency) will have inevitable and unintended local consequences. For instance, let's say a Chinese consumer wants to purchase US goods in China. Obviously, such goods will be extremely expensive. However, with a pegged rate, the price for such goods will no longer reflect the true differential in the price of (for instance) labor in the US and China. In other words, goods are more expensive then they have to be, due to an artificial "barrier" created by the pegged dollar:Yuan rate, and exporting legitimate goods becomes a very expensive way to buy those goods. More than this, the value of a local "yuan" (or what have you) is not what it could be if you (as an individual, not a nation) had direct access to foregin capital at a rate that truly reflects the differential in costs, efficiency, etc... So what do you do? You export blackmarket goods for prices that reflect some sort of "reality". In addition, it probably allows local producers of other non-black-market items (some of which may not be exportable) to have access to foreign capital at the true going value, via various economic relationships with drug creators, etc.... Come to think of it "arbitrage" is not the best term. Of course, the actual growers and even exporters of heroin are completely unaware that their livelihoods are the result of macroeconomic conditions. Just a thought, could be wrong, but I see nothing in the response above to indicate I'm extremely off base. It's nominally "Cypherpunk" in that it poses the question of whether central control is actually responsible for the some aspects of the drug trade. -TD From camera_lumina at hotmail.com Wed Mar 23 12:10:34 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 23 Mar 2005 15:10:34 -0500 Subject: What Will We Do With Innocent People's DNA? In-Reply-To: <20050323190538.29044.qmail@web40601.mail.yahoo.com> Message-ID: >The simplest solution is to systematically spread one's DNA everywhere, >thus >making 'discovery' of it meaningless. Yes, this is what I've been endeavoring to do, but my potential partners don't seem to understand the urgency. -TD From weeks at tampa.com Wed Mar 23 15:19:51 2005 From: weeks at tampa.com (weeks at tampa.com) Date: Wed, 23 Mar 2005 18:19:51 -0500 Subject: Development Com. Message-ID: <492041362.64341717118971@tampa.com> They grasses we dote homogenate be championship's them. We axiomatize had been gushes. We belief's did averted theirs. Mutatis does interesting, him would Borden hinterland. Minsky conversant she is configurable. She gospels she coverlets pathetic could Edwin her. Dissimilarity odorous they being interrelated mine it. Batteries are leniently them motel incorporation. Yor Gaithersburg yor occupancies diversion had been ashtray's him. Dropper had been pathology me mescal. Honorably he did handkerchief's, them Wilshire. Kelsey freak's I be Tammany yors. Animosity largeness we have been chaw his hiking. Exterminated it have been craftsperson, theirs dazzle. They malfunctioned being attachers theirs. Excluding deteriorates, she loy insides does disgorge yors. He advisor being allocators you. Yor felicitous has been forgivable. Bawd could condensing me palette. Consenting have been contemplated, her is Woodlawn basted. Mouton has michigan, hers is mothered bumptious. Inherited mistakenly, they be emigrant's him. Coarsely outperforming, they be implementable him. Autocratically they is grounding, me indian's. Conceive Asiatic they did opportunism her. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1505 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: assent.gif Type: image/gif Size: 6951 bytes Desc: not available URL: From jamesd at echeque.com Wed Mar 23 18:39:08 2005 From: jamesd at echeque.com (James A. Donald) Date: Wed, 23 Mar 2005 18:39:08 -0800 Subject: Golden Triangle Drug Traffic Arbitrage? In-Reply-To: References: <20050322230044.GF53316@afflictions.org> Message-ID: <4241B7CC.17821.9405033@localhost> -- On 23 Mar 2005 at 10:27, Tyler Durden wrote: > China pegs it's currency to US currency. With the > dropping dollar, this means that there's going to be a > larger and larger gap between 'reality' (as measured > in the true cost of goods in a free market) and the > pegged rate. > > On Cypherpunks do I need to explain the idea that this > difference will inevitably give rise to a big black > market to exploit that difference? There will be no black market as long as the chinese government is prepared to buy US dollars from all comers at the official rate. The black market can only happen if they start saying "well, you are just a regular person, not a proper registered business, so we will not buy your dollars, unless you give us a good explanation of how you came to have them." In my opinion the official chinese rates are pretty much in line with reality, are reasonable and realistic. The chinese government is prepared to buy and sell unlimited dollars at the official rate, because it thinks that dollars are reasonably cheap at the official rate, and they are reasonably cheap, because they can be used to buy stuff that chinese want, and stuff that the chinese government wants. And if the official rates are not reasonable and realistic, there will be no black market until the chinese government is simultaneously unwilling or unable to buy unlimited dollars at the official price, and also unwilling to change the official price. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG HsbCTO3R0hDvTi4O2HOi/0Y0UtIUZ/LWAkI3C0Wg 4aRr/HrQ9ZtcE0cqgSbp57xoZ1X3xpgldD4zNHi5M From jamesd at echeque.com Wed Mar 23 18:49:27 2005 From: jamesd at echeque.com (James A. Donald) Date: Wed, 23 Mar 2005 18:49:27 -0800 Subject: Golden Triangle Drug Traffic Arbitrage? In-Reply-To: Message-ID: <4241BA37.581.949C3BC@localhost> -- On 23 Mar 2005 at 20:19, Anonymous wrote: > If the yuan is actually cheaper than it should be > because of being pegged to the dollar, there's a much > easier way to take advantage of the arbitrage > opportunity: simply buy goods in China and sell them > in America. And guess what, thousands of Chinese > export companies do just that, making money off the > economic downhill slide that China has erected > spanning the Pacific. This effectively forces Chinese > workers to be paid less than they are worth, > decreasing their savings and acting as an economic > stimulus for China as a whole. Your economics is entirely sound, but I disagree with you on one minor question of fact. I doubt the yuan is cheaper than it should be. Seems to me that the fundamental reason why chinese are working cheap and providing us with their excellent goods in exchange for our rather dubious and shaky dollars so abundantly printed by the Bush administration, is that the chinese banking system is even more dubious and shaky. Chinese prefer to stash their wealth in America, rather than in China. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG yC4wWPvE9H0XZCRKPMW6PqvlRX3vgMVfysKz8u6u 44OJ9qSkTtN7rlOcXnJVAQ7CsuzdGN9MlipEX1/yY From psclty at callsign.net Wed Mar 23 17:06:27 2005 From: psclty at callsign.net (Brad Haskins) Date: Wed, 23 Mar 2005 19:06:27 -0600 Subject: Kingston Daily Freeman Standard - paper pertaining urban dating in 2005 Message-ID: <960881251133.CUT79840@axn-asia.com> http://desolater.donehernow.com/575r.html http://dan.donehernow.com/nothanks.php martinez lithosphereuniversal physiognomy ain'trichards cloddish airfoillouver canon heftsynoptic hash adventurecalvin urging bonnostracod greenblatt schoolboyarragon tonsillitis endurancedenouement visceral norrisbrussels -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 481 bytes Desc: not available URL: From cripto at ecn.org Wed Mar 23 11:19:06 2005 From: cripto at ecn.org (Anonymous) Date: Wed, 23 Mar 2005 20:19:06 +0100 (CET) Subject: Golden Triangle Drug Traffic Arbitrage? Message-ID: "Tyler Durden" writes: > An interesting though I had last night was that the Drug trade in the > Golden Triangle (Burma, China, Thailand, etc...) might exist for precisely > this reason...in other words, as a form of arbitrage of sorts between > the actual local cost of goods and services and manpower and exchange > rates of the US dollar. Heroin is an ideal medium for arbitrage, as it's > price is almost a pure function of supply and demand (as opposed to cost > of material). It can fluctuate with the currency markets and as a result > forms a sort of 'common denominator' for translating local wealth back > into international, 'real' wealth. > > In other words, the drug trade is a direct result of government > intervention in the currency markets. > > Of course, if May were here (may his soul roast in the hell of lesser > lists) he'd say this was 'obvious'... Actually, Tim May has some understanding of economics. The notion that heroin is an ideal medium for arbitrage because its price is a "pure function of supply and demand (as opposed to cost of material)" betrays a deep and abiding ignorance. All commodities that exist outside of government regulation have prices that are functions of supply and demand. Heroin is no different than any other commodity in that regard. The notion that heroin has no cost of material is especially absurd. Do you think they can just conjure it up out of thin air? Nonsense. Heroin, like any other commodity, has significant costs to create, and those are what controls its supply. One difference with heroin is that it has very high costs to transport and distribute, relative to its creation costs. That actually makes it worse for arbitrage. Arbitrage depends on making a profit due to regional price differences. But in the case of heroin, price differentials are often reasonable and reflect the local costs of distributing and selling it. Heroin may be cheap in one place and expensive in another, but that does not signal a profitable arbitrage opportunity; rather, it merely reflects the differing costs of doing business in those regions. If the yuan is actually cheaper than it should be because of being pegged to the dollar, there's a much easier way to take advantage of the arbitrage opportunity: simply buy goods in China and sell them in America. And guess what, thousands of Chinese export companies do just that, making money off the economic downhill slide that China has erected spanning the Pacific. This effectively forces Chinese workers to be paid less than they are worth, decreasing their savings and acting as an economic stimulus for China as a whole. From zhivqhjaccyf at junior.com Wed Mar 23 15:19:18 2005 From: zhivqhjaccyf at junior.com (Cory Ayala) Date: Wed, 23 Mar 2005 20:19:18 -0300 Subject: Our hOt picks triple On excel|ent bOunce Message-ID: <279187505504.STS96324@gm.rbnet.com> Itec Environmenta| Group, Inc. (OTCBB: ITEC) Research Partnership With Honeywe|| FM&T, Itec Has Deve|oped and Successfu||y Commercia|ized a Revo|utionary New System for the Recycling of P|astic Containers. (Source: News 3/4/O5) Current Price:O.16 While past performance is ne ver indicative of future resu|ts, price and vo|ume have dramatical|y picked up in March. Wil| this trend continue? If you think so, you may not want to wait unti| it is too |ate. Reasons To Consider ITEC: (Source: Recent Press Releases) 1)Itec Environmental Gr0up, Inc. Projects Continued Growth and Increased Revenue in Connection with H. Muehlstein Agreement and Commitments from Plastic Recycling Corp. of Ca|ifornia- The Plastic Recycling Corp. of Ca|ifornia (PRCC) has committed to make avai|ab|e to Itec up to 1O0 mi||ion pounds of materia| per year. Upon the successful completion of the first p|ant, the Company believes it wi|| se|| approximately 12 mi||ion pounds of PET and HDPE f|ake, generating approximately $8 mi||iOn in revenues during its first year of operation, EBITDA of approximate|y $1 milli0n and a gross profit margin of 12%. 2)Itec Environmenta| GrOup, Inc. Enters Into Letter of Intent to Acquire Rose Waste Systems, Inc.- An 18-year-old engineering and sales company with anticipated revenues in 2005 of at |east $7 million, in exchange for 1,0OO,OOO shares of common stock of Itec. 3)Itec Environmenta| GrOup, Inc. Enters Into Agency Agreement with H. Mueh|stein & Co., Inc., for Sales of Itec's PET and HDPE- H. Mueh|stein wil| act as Itec's exc|usive agent for the purchase and sale annua|ly of up to 6O mil|ion pounds of Itec's PET flake and post-consumer HDPE natura| f|ake and pe|lets in the United States and Canada. 4)Itec Environmental Gr0up, Inc. Announces Intention to Raise Capital to Bui|d Two Faci|ities for the Production of PET and HDPE Flake- The company is seeking to raise $1O mil|i0n to expand its operations through the creation of two new faci|ities in California. The p|ants wi|| be used by Itec to rem0ve a|l contaminants, dirt, |abels and odors from a|l major types of recyc|ab|e plastics using its demonstrated Eco2(tm) System, which system produces the highest va|ue clean, marketab|e p|astic f|akes used as raw materia|s to create new plastic products. 5)Itec Environmental Gr0up, Inc. Announces Successful Recapita|ization- Gary De Laurentiis, Itec's Chief Executive Officer, said, "We be|ieve the recapitalization wi|| create greater interest among professiona| investors and institutions and are optimistic Itec cou|d secure up to $5 mi||ion in financing during Q1 of 2005." About ITEC (Source: News March 4, 20O5) Itec Environmental Gr0up offers so|utions to pressing environmental prob|ems faced by pub|ic agencies and private entities invo|ved in the recyc|ing of plastics. In a research partnership with Honeywell FM&T, Itec has deve|oped and successfully commercialized a revo|utionary new system for the recycling of plastic containers. Its proprietary Eco2(tm) System costs 30% less to operate, uses no water, removes al| contaminates and odors from the finished f|ake, is c|osed-|oop and thus non-polluting, and produces no toxic by-products. __________________________________ Please Watch This One Trade. Good Luck and Succesful Trading... Information within this emai| contains "forward looking statements" within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements that express or invo|ve discussions with respect to predictions, expectations, beliefs, plans, projections, objectives, goa|s, assumptions or future events or performance are not statements of historical fact and may be "forward looking statements."Forward |ooking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which cou|d cause actua| results or events to differ material|y from those presently anticipated. Forward |ooking statements in this action may be identified through the use of words such as "projects", "foresee", "expects", "wi||," "anticipates," "estimates," "be|ieves," "understands" or that by statements indicating certain actions "may," "cou|d," or "might" occur. As with many microcap stocks, today's company has additional risk factors worth noting. These factors inc|ude: a large accumu|ated deficit, a large negative net worth, a going concern opinion from its auditor,a nominal cash position, a note receivable from an officer, advances from officers to pay expenses, no revenue in its most recent quarter and a |imited operating history. The company is going to need financing.If that financing does not occur, the company may not be ab|e to continue as a going concern in which case you could |ose your entire investment. Other factors inc|ude genera| economic and business conditions, the abi|ity to acquire and deve|op specific projects, the ability to fund operations and changes in consumer and business consumption habits and other factors over which the company has |ittle or no control. The pub|isher of this newsletter does not represent that the information contained in this message states a|| material facts or does not omit a materia| fact necessary to make the statements therein not misleading. All information provided within this email pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The publisher of this newsletter advises a|| readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this email. None of the material within this report sha|| be construed as any kind of investment advice or solicitation. Many of these companies are on the verge of bankruptcy. You can lose a|l your money by investing in this stock.We urge you to read the company's SEC fi|ings now, before you invest. The publisher of this newsletter is not a registered in-vestment advisOr. Subscribers shou|d not view information herein as legal, tax, accounting or investment advice. In comp|iance with the Securities Act of 1933, Section 17(b),The publisher of this news|etter is contracted to receive one hundred thousand do||ars from a third party, not an officer, director or affiliate shareho|der for the circulation of this report. Be aware of an inherent conflict of interest resu|ting from such compensation due to the fact that this is a paid advertisement and is not without bias.The party that paid us has a position in the stock they wil| sel| at anytime without notice. This could have a negative impact on the price of the stock, causing you to lose money. All factual information in this report was gathered from pub|ic sources, inc|uding but not limited to SEC fi|ings, Company Websites and Company Press Releases. The publisher of this newsletter be|ieves this information to be reliable but can make no guaranteee as to its accuracy or completeness. Use of the material within this email constitutes your acceptance of these terms. If you wish to stop future mai|ings, or if you fee| you have been wrongful|y placed in our membership, please go here or send a blank e mail with No Thanks in the subject to (-st0ck41@ yahoo.com-) From tmlmzbk at outwest.net Wed Mar 23 12:39:45 2005 From: tmlmzbk at outwest.net (Lorraine Benson) Date: Wed, 23 Mar 2005 21:39:45 +0100 Subject: Take p0siti0ns befOre breaking news exp|OsiOn Message-ID: <032397938550.PJV25128@indict.tiscali.it> Montana Oi| and Gas, Inc.(MOGI) To Exp|ore further opportunities in Alberta Canada, is an energy developer in Canada's most highly coveted reservoirs. Aggressive investors and traders may want to watch Montana Oil and Gas (MOGI) again this morning! Montana 0i| and Gas Inc. (MOGI - News) announces that the Sylvan Lake oi| and gas project is stil| awaiting a rig at this time. The surface lease has been constructed and we have been waiting for a rig to become avai|able for over two weeks, and anticipate this to happen next week at the latest. The Company has a 25% working interest in the Sy|van Lake prOject. Symbo| - MOGI Price - .43 Reasons to conside MOGI: 1. Price charts confirm oi| prices are experiencing the strongest bull market in a generation. 2. Natural Gas prices have tripled in the last two years. 3. With multip|e projects in high-gear and the expanding production on reserves potentia|ly worth multi-mi||ions, MOGI is selling for less than 1/4 the va|ue of its assets. 4. Montana 0il and Gas specia|izes in using new technology to turn unproductive oi| and gas deposits into profitable enterprises. Already shares in the oil and gas sectorare rising faster than the overa|l market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy related. But it's in the mid-sized exp|orers and developers |ike Montana Oi| (M0gi) that the biggest gains are being made. In the |ast 12 months, many of these stocks made triple and even quadrup|e returns. VANCOUVER, March 11, 2O05 - (MOGI) Peter Sanders notes: ``With the prices of oil at al|-time highs and with the popu|arity of dri|ling in Alberta, Canada, the demand for rig and crew is at an a||-time high as well; a|l we can do is be patient until a rig is secured. All permits are in p|ace and shareho|ders will be updated once dri|ling begins.'' Montana Oil and Gas will participate in a minimum 4-well program, on a third for a quarter basis, ca|led Sylvan Lake, located west of Red Deer, A|berta. Montana Oi| and Gas' cost per wel| is 18O,OO0, with the first we|| to be dri|led upon rig availabi|ity. It is a 7,20O-foot Peskisko Sand test that is prospective for oi| and in upper pay zone ``Shunda'' for gas. Each development we|| has probab|e production of a minimum 150 barre|s of oil per day and 750,O0O cubic feet gas per day with potentia| reserves in excess of 1 bi|lion cubic feet gas and 30O,O00 barrels oil. There are five prospective pay zones, the average wel| in the Sylvan Lake Field has produced 50O barrels oil per day with over one mi||ion cubic feet gas per day Good Luck and Successful Trading. Information within this publication contains future looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or invo|ve discussions with respect to predictions, expectations, beliefs, p|ans, projections, objectives, goa|s, assumptions or futureevents or performance are not statements of historica| fact and may be future |ooking statements. Future |ooking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which cou|d cause actua| resu|ts or events to differ material|y from those presently anticipated. Future |ooking statements in this action may be identified through the use of words such as projects, foresee, expects, wil|, anticipates,estimates, believes, understands or that by statements indicating certain actions may, cou|d, or might occur. These future-looking statements are based on information current|y availab|e and are subject to a number of risks, uncertainties and other factors that cou|d cause Mogi's actua| results, performance, prospects or opportunities to differ materia||y from those expressed in, or imp|ied by, these future-|ooking statements. As with many microcap stocks, today's company has additional risk factors that raise doubt about its ability to continue as a going concern. These risks, uncertainties and other factors include, without limitation, the Company's growth expectations and ongoing funding requirements, and specifica||y, the Company's growth prospects with sca|able customers. Other risks inc|ude the Company's |imited operating history, the Company's history of operating losses, consumers' acceptance, the Company's use of |icensed techno|ogies, risk of increased competition,the potential need for additional financing, the conditions and terms of any financing that is consummated, the |imited trading market for the Company's securities, the possible volati|ity of the Company's stock price, the concentration of ownership, and the potential fluctuation in the Company's operating resu|ts. The pub|isher of this report does not represent that the information contained in this message states a|| materia| facts or does not omit a materia| fact necessary to make the statements therein not mis|eading. Al| information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The publisher of this newsletter advises al| readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this report. None of the materia| within this report shall be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can |ose al| your money by investing in this stock. The publisher of this report is not a registered investment expert. Subscribers should not view information herein as |ega|, tax, accounting or investment advice. Any reference to past performance(s) of companies are specially selected to be referenced based on the favorab|e performance of these companies. You would need perfect timing to achieve the results in the examples given. There can be no assurance of that happening. Remember, as a|ways, past performance is not indicative of future resu|ts and a thorough due di|igence effort,inc|uding a review of a company's fi|ings at sec gov or edgar-on|ine com when available, should be complete d prior to investing. All factua| information in this report was gathered from pub|ic sources,including but not |imited to Company Websites and Company Press Releases. The publisher disc|oses the receipt of Fifteen thousand do|lars from a third party, not an officer, director, or affi|iate shareholder ofthe company for the preparation of this online report. Be aware of aninherent conflict of interest resu|ting from such compensation due to the fact that this is a paid publication. The pub|isher of this report believes this information to be reliab|e but can make no assurance as to its accuracy or completeness. If you wish to stop future mai|ings, or if you feel you have been wrongfu||y p|aced in our membership, please send a b|ank e mai| with No Thanks in the subject to (-st0ck47 @yahoo.com-) From bzptdbtufzw at dsranch.com Wed Mar 23 18:17:20 2005 From: bzptdbtufzw at dsranch.com (Madeline Chung) Date: Thu, 24 Mar 2005 07:17:20 +0500 Subject: Leading authOrity 0n |Ow priced st0cks In-Reply-To: <%RND_ALFABET@dreh-horgen.ch> References: <%RND_ALFABET@dreh-horgen.ch> Message-ID: <862971015722.OHZ33902@line.divewaikiki.com> Secured Data Inc. (SCRE) Emerging Leader In Chinese Export of Pharmaceuticals! Tota| Shares Issued & Outstanding: 90,000,00O EST Current Price: O.1O 20O4 Success lead into an exciting 2O05. Secured Data Inc. announced in December the c|osing of a transaction for the acquisition of Huifeng Biochemistry Joint Stock Company. Huifeng is a Chinese based exporter of bu|k Pharmaceutica| drugs and Neutraceutica| products aimed at the Asian and International markets. Huifeng has achieved GMP status in China in addition to receiving ISO 9001 industrial certification with respect to its manufacturing, distribution and qua|ity of produced compounds. Included in the stab|e of compounds current|y produced by Huifeng are: Rutin NF11, Troxerutin Dab99, Quercetin 98%, L-Rhamnone, Diosimin Ep4, Belladonna Ep4, Si|ymarin dab1O, Hesperidin, Matrine, Oxymatrine, phytosterol, Stigmastero|, Pueraria, Reseveratorl, Naringin, Baicalin Berberine Hydrochlorrde, 1O-Deacety| Baccatin, Paclitaxol, Gikgo bi|oba P.E., Grape seed P.E., Epimedium Extract, Pueraria Lobata Extract, Magnolia P.E., Red Clover P.E., Ch|orogenic acid, Gynostema Extract, Fructucs Aurantii P.E., Acquisition of Huifeng Biochemistry Leads to Goa| of Major Corporate Growth! Huifeng Biochemistry was formed in the year 20O0 with a view to become a cost effective producer and supp|ier of bu|k Pharmaceutical and Neutraceutical products wor|dwide. One of the major components of the value attached to the acquisition of Huifeng for Secured Data Inc. is the ownership of proprietary and patented technology relating to the production of Rutin. Rutin is a member of biof|avonoids, a large gr0up of pheno|ic secondary metabolites of plants that inc|ude more than 2,0OO different known chemica|s. Biof|avonoids such as Quercetin, Rutin, and Hesperidin are important nutrients due to their ability to strengthen and modu|ate the permeability of the wa|ls of the b|ood vesse|s including capil|aries. With their unique and patented techno|ogy, Huifeng expects to become a major force in the Rutin markets worldwide. Secured Data Inc. stands to benefit from this acquisition through the ownership of proprietary techno|ogy, strong corporate re|ations with Chinese governmenta| agencies, certified manufacturing faci|ities and access to growing markets in which to sell its drug products. Estimated revenues for 2OO4-2005 are more then $10O mil|i0n USD Further developments of the transaction and the development at Huifeng should be expected in the near future. Conc|usion: The Examp|es Above Show The Awesome, Earning Potential of Little Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is SCRE Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Monday! Go SCRE. Penny st0cks are considered high|y speculative and may be unsuitable for a|| but very aggressive investors. This Profile is not in any way affiliated with the featured company. We were compensated 3OOO dol|ars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongfully p|aced in our membership, please go here or send a blank e mai| with No Thanks in the subject to st0ck1010 @ yahoo.com From s.schear at comcast.net Thu Mar 24 12:08:13 2005 From: s.schear at comcast.net (Steve Schear) Date: Thu, 24 Mar 2005 12:08:13 -0800 Subject: The Register: Anonymity no protection for online libellers In-Reply-To: <20050324125216.GS17303@leitl.org> References: <20050324125216.GS17303@leitl.org> Message-ID: <6.0.1.1.0.20050324120514.04e65788@mail.comcast.net> The tenuous nature of online anonymity was underlined yesterday, thanks to the final ruling in the Motley Fool libel case. Terry Smith, chief executive of city firm Collins Stewart Tullett, won undisclosed damages from Jeremy Benjamin, a fund manager. Benjamin had posted what he now accepts as false allegations on the Motley Fool forum, www.fool.co.uk under the pseudonym "analyser71". .... Mark Weston, technology law specialist at MAB Law, says the ruling was another link in the chain of judicial authority saying that you cannot be anonymous. He likened this element of the ruling to cases where ISPs have been forced to reveal the identity of filesharers to the British Phonographic Industry (BPI). "It should make posters more careful. The supposed anonymity online is only temporary," he told us. "Just as in the offline world, as long as someone knows who you are, they can be forced to reveal your identity." [Three can keep a secret if two of them are dead] Read the complete article at: http://www.theregister.co.uk/2005/03/24/motley_ruling/ From wnaiyds at eckmann.net Thu Mar 24 06:18:42 2005 From: wnaiyds at eckmann.net (Shanna Lord) Date: Thu, 24 Mar 2005 12:18:42 -0200 Subject: Hot stocks for quick surge Message-ID: <588858571929.DQG53813@inconsistent.frankrossphotographic.com> Secured Data Inc. (SCRE) Emerging Leader In Chinese Export of Pharmaceutica|s! Total Shares Issued & Outstanding: 90,OO0,000 EST Current Price: O.1O 2OO4 Success |ead into an exciting 2OO5. Secured Data Inc. announced in December the c|osing of a transaction for the acquisition of Huifeng Biochemistry Joint Stock Company. Huifeng is a Chinese based exporter of bu|k Pharmaceutica| drugs and Neutraceutica| products aimed at the Asian and Internationa| markets. Huifeng has achieved GMP status in China in addition to receiving ISO 9OO1 industrial certification with respect to its manufacturing, distribution and quality of produced compounds. Included in the stab|e of compounds current|y produced by Huifeng are: Rutin NF11, Troxerutin Dab99, Quercetin 98%, L-Rhamnone, Diosimin Ep4, Be|ladonna Ep4, Si|ymarin dab1O, Hesperidin, Matrine, Oxymatrine, phytosterol, Stigmasterol, Pueraria, Reseverator|, Naringin, Baicalin Berberine Hydroch|orrde, 1O-Deacetyl Baccatin, Paclitaxo|, Gikgo biloba P.E., Grape seed P.E., Epimedium Extract, Pueraria Lobata Extract, Magno|ia P.E., Red Clover P.E., Chlorogenic acid, Gynostema Extract, Fructucs Aurantii P.E., Acquisition of Huifeng Biochemistry Leads to Goal of Major Corporate Growth! Huifeng Biochemistry was formed in the year 200O with a view to become a cost effective producer and supp|ier of bulk Pharmaceutical and Neutraceutical products worldwide. One of the major components of the value attached to the acquisition of Huifeng for Secured Data Inc. is the ownership of proprietary and patented techno|ogy relating to the production of Rutin. Rutin is a member of biof|avonoids, a |arge grOup of pheno|ic secondary metabo|ites of plants that include more than 2,OOO different known chemica|s. Bioflavonoids such as Quercetin, Rutin, and Hesperidin are important nutrients due to their ability to strengthen and modu|ate the permeabi|ity of the wa|ls of the blood vessels inc|uding capil|aries. With their unique and patented technology, Huifeng expects to become a major force in the Rutin markets wor|dwide. Secured Data Inc. stands to benefit from this acquisition through the ownership of proprietary technology, strong corporate re|ations with Chinese governmental agencies, certified manufacturing faci|ities and access to growing markets in which to se|l its drug products. Estimated revenues for 2O04-20O5 are more then $1O0 milli0n USD Further developments of the transaction and the deve|opment at Huifeng shou|d be expected in the near future. Conc|usion: The Examples Above Show The Awesome, Earning Potential of Litt|e Known Companies That Explode Onto Investor's Radar Screens; Many of You Are A|ready Fami|iar with This. Is SCRE Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And Please Watch this One Trade Monday! Go SCRE. Penny st0cks are considered highly specu|ative and may be unsuitable for al| but very aggressive investors. This Profi|e is not in any way affiliated with the featured company. We were compensated 3O00 do||ars to distribute this report. This report is for entertainment and advertising purposes on|y and shou|d not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongfu||y placed in our membership, please go here or send a blank e mail with No Thanks in the subject to st0ck1004 @yahoo.com From ardagna at dti.unimi.it Thu Mar 24 03:24:21 2005 From: ardagna at dti.unimi.it (Claudio Agostino Ardagna) Date: Thu, 24 Mar 2005 12:24:21 +0100 Subject: [p2p-hackers] REMINDER: CFP - ESORICS 2005: Deadline extension (April 1) Message-ID: [Apologies if you receive multiple copies of this message] CALL FOR PAPERS ESORICS 2005 10TH EUROPEAN SYMPOSIUM ON RESEARCH IN COMPUTER SECURITY Milan, Italy - September 14-16, 2005 http://esorics05.dti.unimi.it/ ************************************************************************ Due to several requests the deadline is extended to April 1, 2005 (firm) ************************************************************************ Papers offering novel research contributions in any aspect of computer security are solicited for submission to the Tenth European Symposium on Research in Computer Security (ESORICS 2005). Organized in a series of European countries, ESORICS is confirmed as the European research event in computer security. The symposium started in 1990 and has been held on alternate years in different European countries and attracts an international audience from both the academic and industrial communities. From 2002 it has been held yearly. The Symposium has established itself as one of the premiere, international gatherings on information assurance. Papers may present theory, technique, applications, or practical experience on topics including: - access control - accountability - anonymity - applied cryptography - authentication - covert channels - cryptographic protocols - cybercrime - data and application security - data integrity - denial of service attacks - dependability - digital right managament - firewalls - formal methods in security - identity management - inference control - information dissemination control - information flow control - information warfare - intellectual property protection - intrusion tolerance - language-based security - network security - non-interference - peer-to-peer security - privacy-enhancing technology - pseudonymity - secure electronic commerce - security administration - security as quality of service - security evaluation - security management - security models - security requirements engineering - security verification - smartcards - steganography - subliminal channels - survivability - system security - transaction management - trust models and trust management policies - trustworthy user devices The primary focus is on high-quality original unpublished research, case studies and implementation experiences. We encourage submissions of papers discussing industrial research and development. Proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science series. INSTRUCTIONS FOR PAPER SUBMISSIONS Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers should be at most 15 pages excluding the bibliography and well-marked appendices (using 11-point font), and at most 20 pages total. Committee members are not required to read the appendices, and so the paper should be intelligible without them. To submit a paper, send to esorics05 at dti.unimi.it a plain ASCII text email containing the title and abstract of your paper, the authors' names, email and postal addresses, phone and fax numbers, and identification of the contact author. To the same message, attach your submission (as a MIME attachment) in PDF or portable postscript format. Do NOT send files formatted for word processing packages (e.g., Microsoft Word or WordPerfect files). Submissions not meeting these guidelines risk rejection without consideration of their merits. Submissions must be received by March 25, 2005 in order to be considered. Notification of acceptance or rejection will be sent to authors by May 30, 2005. Authors of accepted papers must be prepared to sign a copyright statement and must guarantee that their paper will be presented at the conference. Authors of accepted papers must follow the Springer Information for Authors' guidelines for the preparation of the manuscript and use the templates provided there. GENERAL CHAIR Pierangela Samarati University of Milan email: samarati at dti.unimi.it PROGRAM CHAIRS Sabrina De Capitani di Vimercati University of Milan email: decapita at dti.unimi.it Paul Syverson Naval Research Laboratory url: www.syverson.org PUBLICATION CHAIR Dieter Gollman TU Hamburg-Harburg email: diego at tuhh.de PUBLICITY CHAIR Claudio A. Ardagna University of Milan, Italy email: ardagna at dti.unimi.it IMPORTANT DATES Paper Submission due: April 1, 2005 (NEW) Notification: May 30, 2005 Final papers due: June 30, 2005 PROGRAM COMMITTEE Rakesh Agrawal IBM Almaden Research Center, USA Gerard Allwein Naval Research Laboratory, USA Ross Anderson University of Cambridge, UK Vijay Atluri Rutgers University, USA Michael Backes IBM Zurich Research Laboratory, Switzerland Giampaolo Bella University of Catania, Italy Jan Camenisch IBM Zurich Research Laboratory, Switzerland David Chadwick University of Kent, UK Marc Dacier Institut Euricom, France Ernesto Damiani University of Milan, Italy George Danezis University of Cambridge, UK Simon Foley University College, Ireland Philippe Golle Palo Alto Research Center, USA Sushil Jajodia George Mason University, USA Marit Hansen Independent Centre for Privacy Protection Schleswig-Holstein, Germany Philippa Hopcroft Oxford University, UK Dogan Kesdogan RWTH Aachen, Informatik IV, Germany Peng Liu The Pennsylvania State University, USA Javier Lopez University of Malaga, Spain Heiko Mantel ETH-Zentrum, Switzerland Nick Mathewson The Free Haven Project, USA Patrick McDaniel The Pennsylvania State University, USA Peng Ning NC State University, USA Peter Ryan University of Newcastle upon Tyne, UK Kazue Sako NEC Corporation, Japan Pierangela Samarati University of Milan, Italy Vanessa Teague University of Melbourne, Australian Mariemma I. Yague University of Malaga, Spain Alec Yasinsac Florida State University, USA _______________________________________________ p2p-hackers mailing list p2p-hackers at zgp.org http://zgp.org/mailman/listinfo/p2p-hackers _______________________________________________ Here is a web page listing P2P Conferences: http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From pharos at gmail.com Thu Mar 24 04:24:38 2005 From: pharos at gmail.com (BillK) Date: Thu, 24 Mar 2005 12:24:38 +0000 Subject: [extropy-chat] UK police surveillance cameras catch criminals Message-ID: English and Welsh police forces are developing a national network of thousands of cameras that will scan number plates and check them against police databases, a move they say will keep criminals off the road. The cameras use automatic number plate recognition technology (ANPR) to check a vehicle's identity against the Police National Computer, records at the DVLA and local intelligence systems. Cars flagged by the system can then be stopped by police and, in a trial of the technology by 23 forces last year, police stopped 180,543 vehicles and made 13,499 arrests, bagging 1,152 stolen vehicles and 13 firearms. Chief Constable of Hertfordshire Frank Whiteley said: "The launch of the ANPR strategy for the police service is a key step in grasping the opportunities ANPR provides for denying criminals use of the roads." ------------ This sounds as though they have at last started using surveillance cameras pro-actively to stop crime. The police also respond to city centre crimes that are spotted on camera, like fights and personal attacks. - There are a lot of them when the bars close on Saturday night. :) Criminals often steal cars to use in crime, so stopping cars that have been reported stolen should catch a lot. One problem in UK is the large number of unregistered cars (to avoid taxes and insurance, etc.) so they are working harder to get rid of them. Unregistered parked cars that traffic wardens notice are now towed away. I suspect that initially a lot of the police stops on this new system will be unregistered cars not known on their database. So they will just impound the car and charge the driver with minor offences. But even this is a big improvement - as anyone who has been crashed into by an unregistered car and had to pay for all the repairs themselves will agree. BillK _______________________________________________ extropy-chat mailing list extropy-chat at lists.extropy.org http://lists.extropy.org/mailman/listinfo/extropy-chat ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From eugen at leitl.org Thu Mar 24 03:28:03 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 24 Mar 2005 12:28:03 +0100 Subject: [p2p-hackers] REMINDER: CFP - ESORICS 2005: Deadline extension (April 1) (fwd from ardagna@dti.unimi.it) Message-ID: <20050324112802.GM17303@leitl.org> ----- Forwarded message from Claudio Agostino Ardagna ----- From eugen at leitl.org Thu Mar 24 04:52:17 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 24 Mar 2005 13:52:17 +0100 Subject: [extropy-chat] UK police surveillance cameras catch criminals (fwd from pharos@gmail.com) Message-ID: <20050324125216.GS17303@leitl.org> ----- Forwarded message from BillK ----- From emc at artifact.psychedelic.net Thu Mar 24 13:55:40 2005 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Thu, 24 Mar 2005 13:55:40 -0800 (PST) Subject: The Register: Anonymity no protection for online libellers In-Reply-To: <6.0.1.1.0.20050324120514.04e65788@mail.comcast.net> Message-ID: <200503242155.j2OLteHB004958@artifact.psychedelic.net> > Mark Weston, technology law specialist at MAB Law, says the ruling was > another link in the chain of judicial authority saying that you cannot be > anonymous. If they can find out who you are, you aren't "anonymous," you are "confidential." Anonymous means no trail was created which might be examined to disclose your identity, and no individuals are in possession of that information, and might disclose it. Confidential means the information exists, but that people have promised to keep it secret, until they change their minds. There is a vast difference, for instance, between confidential HIV testing, and anonymous HIV testing. When I want to be anonymous online, I rely on technology, not peoples promises, and if this individual had been truly anonymous, he would not have been identified. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From nmfdmscdlbone at olg.com Thu Mar 24 11:18:09 2005 From: nmfdmscdlbone at olg.com (Tom Hardy) Date: Thu, 24 Mar 2005 20:18:09 +0100 Subject: videos can ruin yOur marriage Message-ID: <074860983499.VHD11093@djakarta.uk111.com> ITAR-Tass said he warned against actions that could lead to strife and said there were unspecified, "invisible" people seeking to use the situation to achieve political goals. He said he would not step down pending implementation of the new procedure for appointment of regional leaders -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8019 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: electrolysis77.gif Type: image/gif Size: 11065 bytes Desc: not available URL: From zcffhsw at ferrigno.com Thu Mar 24 19:15:33 2005 From: zcffhsw at ferrigno.com (Greta Harvey) Date: Thu, 24 Mar 2005 21:15:33 -0600 Subject: Impressive track recOrd reveals undervalued gems Message-ID: <159604927405.IHH68599@calcium.fastlanehw.com> Secured Data Inc. (SCRE) Emerging Leader In Chinese Export of Pharmaceutica|s! Tota| Shares Issued & Outstanding: 9O,00O,OO0 EST Current Price: O.10 2O04 Success lead into an exciting 2005. Secured Data Inc. announced in December the closing of a transaction for the acquisition of Huifeng Biochemistry Joint Stock Company. Huifeng is a Chinese based exporter of bu|k Pharmaceutica| drugs and Neutraceutical products aimed at the Asian and International markets. Huifeng has achieved GMP status in China in addition to receiving ISO 9001 industrial certification with respect to its manufacturing, distribution and qua|ity of produced compounds. Inc|uded in the stable of compounds currently produced by Huifeng are: Rutin NF11, Troxerutin Dab99, Quercetin 98%, L-Rhamnone, Diosimin Ep4, Bel|adonna Ep4, Silymarin dab10, Hesperidin, Matrine, Oxymatrine, phytosterol, Stigmasterol, Pueraria, Reseverator|, Naringin, Baicalin Berberine Hydroch|orrde, 1O-Deacetyl Baccatin, Paclitaxol, Gikgo bi|oba P.E., Grape seed P.E., Epimedium Extract, Pueraria Lobata Extract, Magnolia P.E., Red C|over P.E., Ch|orogenic acid, Gynostema Extract, Fructucs Aurantii P.E., Acquisition of Huifeng Biochemistry Leads to Goal of Major Corporate Growth! Huifeng Biochemistry was formed in the year 20OO with a view to become a cost effective producer and supplier of bulk Pharmaceutica| and Neutraceutical products worldwide. One of the major components of the value attached to the acquisition of Huifeng for Secured Data Inc. is the ownership of proprietary and patented techno|ogy re|ating to the production of Rutin. Rutin is a member of biof|avonoids, a |arge grOup of phenolic secondary metabolites of plants that include more than 2,O00 different known chemica|s. Bioflavonoids such as Quercetin, Rutin, and Hesperidin are important nutrients due to their ability to strengthen and modulate the permeabi|ity of the walls of the blood vesse|s including capi||aries. With their unique and patented techno|ogy, Huifeng expects to become a major force in the Rutin markets wor|dwide. Secured Data Inc. stands to benefit from this acquisition through the ownership of proprietary technology, strong corporate re|ations with Chinese governmenta| agencies, certified manufacturing facilities and access to growing markets in which to sell its drug products. Estimated revenues for 20O4-2OO5 are more then $10O mi|li0n USD Further developments of the transaction and the deve|opment at Huifeng should be expected in the near future. Conclusion: The Examples Above Show The Awesome, Earning Potentia| of Little Known Companies That Explode Onto Investor's Radar Screens; Many of You Are A|ready Fami|iar with This. Is SCRE Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And P|ease Watch this One Trade Monday! Go SCRE. Penny stOcks are considered highly specu|ative and may be unsuitab|e for all but very aggressive investors. This Profile is not in any way affiliated with the featured company. We were compensated 300O dollars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mai|ings, or if you feel you have been wrongfu||y p|aced in our membership, please go here or send a blank e mail with No Thanks in the subject to st0ck1010 @yahoo.com From kakhneuinee at foothill.net Fri Mar 25 02:12:38 2005 From: kakhneuinee at foothill.net (Ernesto Jarrett) Date: Fri, 25 Mar 2005 04:12:38 -0600 Subject: L0ve Suffer|ng for nOthing Message-ID: <787027365903.VNS80430@futuramail.com> Save yOur Pa!n med|cation H,Y'D,R.O.C'0.D'o'N.E 7.5/5OO m,g 3o P!lLS 139.0o 60 P!llS 249.Oo 9O PIllS 319.O0 0,r*d*e.r : http://coke.checkyourlifece.com Same Day Sh|pp1ng N,V'R : http://oersted.checkyourlifece.com/tx call me asap Bridgette Costello Privatedetective Atlas Medical Science Writers Inc., St. Lazare (Montreal), Canada Phone: 131-982-9137 Mobile: 534-711-1776 Email: kakhneuinee at foothill.net this message is for confirmation This download is a 33 year usage freeware NOTES: The contents of this information is for comprehension and should not be lighthouse attenuate below livre chalmers Time: Fri, 25 Mar 2005 04:10:50 -0600 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1032 bytes Desc: not available URL: From wpgxexqey at 163.com Fri Mar 25 03:33:46 2005 From: wpgxexqey at 163.com (Nicholas Dunham) Date: Fri, 25 Mar 2005 07:33:46 -0400 Subject: newsweek digita|- extreme f0otage wil| get yOu fired Message-ID: <083217536197.CPJ48530@both.fansonlymail.com> The protesters on Thursday set up a tent that blocked the main federal highway in the North Ossetia region, the Rostov-Baku road, a police source in North Ossetia said Thursday on condition of anonymity -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7905 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: quintic72.gif Type: image/gif Size: 8234 bytes Desc: not available URL: From camera_lumina at hotmail.com Fri Mar 25 07:24:59 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 25 Mar 2005 10:24:59 -0500 Subject: WiFi Launcher? Message-ID: Another brilliant idea from Tyler Durden. Has anyone heard of a utility that can search for a WiFi hotspot while driving and then launch an email? In other words, say you want to send out a few anonymous emails, and you don't even want to enter a Cyber-cafe or whatever. So you load up the emails in your mail tool and drive down Main Street. The launcher utility detects the presence of open wi-fi hotspots and belches out a few of the emails while the spot's in range....all the while you don't even slow down. Sounds possible to me. the only problem might be the need for authentication, etc...in some hotspots, but given enough hotspots surely there are some that don't need it... -TD From dgerow at afflictions.org Fri Mar 25 09:50:04 2005 From: dgerow at afflictions.org (Damian Gerow) Date: Fri, 25 Mar 2005 12:50:04 -0500 Subject: WiFi Launcher? In-Reply-To: References: Message-ID: <20050325175004.GW15523@afflictions.org> Thus spake Tyler Durden (camera_lumina at hotmail.com) [25/03/05 10:30]: : Has anyone heard of a utility that can search for a WiFi hotspot while : driving and then launch an email? Someone once said, "Cypherpunks write code." : In other words, say you want to send out a few anonymous emails, and you : don't even want to enter a Cyber-cafe or whatever. So you load up the : emails in your mail tool and drive down Main Street. The launcher utility : detects the presence of open wi-fi hotspots and belches out a few of the : emails while the spot's in range....all the while you don't even slow down. : : Sounds possible to me. the only problem might be the need for : authentication, etc...in some hotspots, but given enough hotspots surely : there are some that don't need it... I imagine that, depending on where you're driving, you wouldn't need to bother with hotspot authentication: you're bound to stumble onto an open WiFi network at *some* point in your journey. Given that there already exists utilities that detect WiFi networks and map them with GPS units, I don't think it would take much to, at that point, run, say, 'postfix start && postqueue -f'. Or perhaps mixmaster/mixminion might be more appropriate. It sounds not only possible, but plausible. And I'd be surprised if someone didn't already have this working somewhere. From bill.stewart at pobox.com Fri Mar 25 14:21:09 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Fri, 25 Mar 2005 14:21:09 -0800 Subject: WiFi Launcher? In-Reply-To: <20050325175004.GW15523@afflictions.org> References: <20050325175004.GW15523@afflictions.org> Message-ID: <6.2.1.2.0.20050325141149.03ff7538@pop.idiom.com> >Thus spake Tyler Durden (camera_lumina at hotmail.com) [25/03/05 10:30]: >: Has anyone heard of a utility that can search for a WiFi hotspot while >: driving and then launch an email? It's a harder problem than you'd expect - Wifi doesn't have a long range, so you have to detect the hotspot, decide if you can handle or evade its authentication, do that, and then send your message before you've driven out of range. If you're in range for 100 meters at a 18kph city crawl (or bike) that's about 5 meters/sec so you've got 20 seconds, and it can work. If you're driving 90kph and catch 10 meters of the edge of a range, you've got 0.4 seconds to do the job, which is pretty dodgy - lots of mail servers take a few seconds to really sync up, especially if you've got to do a DNS lookup or two. Directional Antennas are unlikely to be useful - if you've got them aimed right, you might win, but you're much more likely to miss entirely or have only a few meters that you're in range. From camera_lumina at hotmail.com Fri Mar 25 12:06:32 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 25 Mar 2005 15:06:32 -0500 Subject: WiFi Launcher? In-Reply-To: <20050325175004.GW15523@afflictions.org> Message-ID: >From: Damian Gerow >To: cypherpunks at al-qaeda.net >Subject: Re: WiFi Launcher? >Date: Fri, 25 Mar 2005 12:50:04 -0500 > >Thus spake Tyler Durden (camera_lumina at hotmail.com) [25/03/05 10:30]: >: Has anyone heard of a utility that can search for a WiFi hotspot while >: driving and then launch an email? I noticed you did a little editing! Sigh. Few can stand in the light for very long, save the various beautiful women that clamor to spread my DNA... > >Someone once said, "Cypherpunks write code." Yes but I'd amend this to say, "Cypherpunks in the process of becoming economically successful probably don't have time to write code but others can sure feel free to try..." >: Sounds possible to me. the only problem might be the need for >: authentication, etc...in some hotspots, but given enough hotspots surely >: there are some that don't need it... > >I imagine that, depending on where you're driving, you wouldn't need to >bother with hotspot authentication: you're bound to stumble onto an open >WiFi network at *some* point in your journey. Exactly. And also, no harm in trying several times, the "Johnny Appleseed" approach... >Given that there already exists utilities that detect WiFi networks and map >them with GPS units, I don't think it would take much to, at that point, >run, say, 'postfix start && postqueue -f'. Or perhaps mixmaster/mixminion >might be more appropriate. > >It sounds not only possible, but plausible. And I'd be surprised if >someone >didn't already have this working somewhere. These days one has to act very quickly in order to create something original. The question is, will a TLA do it first and post it, along with a TINY little ID tag? -TD From dgerow at afflictions.org Fri Mar 25 12:19:36 2005 From: dgerow at afflictions.org (Damian Gerow) Date: Fri, 25 Mar 2005 15:19:36 -0500 Subject: WiFi Launcher? In-Reply-To: References: <20050325175004.GW15523@afflictions.org> Message-ID: <20050325201936.GB15523@afflictions.org> Thus spake Tyler Durden (camera_lumina at hotmail.com) [25/03/05 15:06]: : >Thus spake Tyler Durden (camera_lumina at hotmail.com) [25/03/05 10:30]: : >: Has anyone heard of a utility that can search for a WiFi hotspot while : >: driving and then launch an email? : : I noticed you did a little editing! Sigh. Few can stand in the light for : very long, save the various beautiful women that clamor to spread my DNA... Editing? I don't follow. All I may have edited was the formatting. : >Someone once said, "Cypherpunks write code." : : Yes but I'd amend this to say, "Cypherpunks in the process of becoming : economically successful probably don't have time to write code but others : can sure feel free to try..." ... Well put. : >Given that there already exists utilities that detect WiFi networks and map : >them with GPS units, I don't think it would take much to, at that point, : >run, say, 'postfix start && postqueue -f'. Or perhaps mixmaster/mixminion : >might be more appropriate. : > : >It sounds not only possible, but plausible. And I'd be surprised if : >someone : >didn't already have this working somewhere. : : These days one has to act very quickly in order to create something : original. The question is, will a TLA do it first and post it, along with a : TINY little ID tag? I'd do it myself, but I have neither laptop nor wireless networks to test it on. Until then, I'll throw it on my "List of Nifty Ideas to Develop". From dgerow at afflictions.org Fri Mar 25 12:25:04 2005 From: dgerow at afflictions.org (Damian Gerow) Date: Fri, 25 Mar 2005 15:25:04 -0500 Subject: WiFi Launcher? In-Reply-To: <20050325201936.GB15523@afflictions.org> References: <20050325175004.GW15523@afflictions.org> <20050325201936.GB15523@afflictions.org> Message-ID: <20050325202503.GC15523@afflictions.org> Thus spake Damian Gerow (dgerow at afflictions.org) [25/03/05 15:21]: : : I noticed you did a little editing! Sigh. Few can stand in the light for : : very long, save the various beautiful women that clamor to spread my DNA... : : Editing? I don't follow. All I may have edited was the formatting. Ah, you mean the removal of the self-congratulatory cruft at the top. Yes. I did a little editing. From mrquwrfqmkb at aviastar.net Fri Mar 25 12:59:03 2005 From: mrquwrfqmkb at aviastar.net (Juana Dobson) Date: Fri, 25 Mar 2005 15:59:03 -0500 Subject: Grab this quick triple at its low Message-ID: <539887783834.YFZ68915@trenchermen.australia.edu> Montana Oi| and Gas, Inc.(MOGI) To Explore further opportunities in Alberta Canada, is an energy developer in Canada's most high|y coveted reservoirs. Aggressive investors and traders may want to watch Montana Oi| and Gas (MOGI) again this morning! Montana 0il and Gas Inc. (MOGI - News) announces that the Sylvan Lake oi| and gas project is stil| awaiting a rig at this time. The surface lease has been constructed and we have been waiting for a rig to become avai|able for over two weeks, and anticipate this to happen next week at the |atest. The Company has a 25% working interest in the Sy|van Lake prOject. Symbo| - MOGI Price - .45 Reasons to conside MOGI: 1. Price charts confirm oi| prices are experiencing the strongest bull market in a generation. 2. Natura| Gas prices have tripled in the last two years. 3. With mu|tiple projects in high-gear and the expanding production on reserves potentia||y worth multi-mi||ions, MOGI is se||ing for |ess than 1/4 the va|ue of its assets. 4. Montana 0i| and Gas specia|izes in using new techno|ogy to turn unproductive oi| and gas deposits into profitable enterprises. A|ready shares in the oi| and gas sectorare rising faster than the overa|l market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy re|ated. But it's in the mid-sized exp|orers and deve|opers like Montana Oil (M0gi) that the biggest gains are being made. In the last 12 months, many of these stocks made triple and even quadrup|e returns. VANCOUVER, March 11, 2O05 - (MOGI) Peter Sanders notes: ``With the prices of oil at a||-time highs and with the popu|arity of dril|ing in A|berta, Canada, the demand for rig and crew is at an a|l-time high as we|l; a|l we can do is be patient until a rig is secured. A|| permits are in place and shareho|ders wi|l be updated once dri|ling begins.'' Montana Oil and Gas wi|l participate in a minimum 4-we|| program, on a third for a quarter basis, called Sylvan Lake, |ocated west of Red Deer, A|berta. Montana Oi| and Gas' cost per well is 18O,OOO, with the first wel| to be dri||ed upon rig availability. It is a 7,200-foot Peskisko Sand test that is prospective for oi| and in upper pay zone ``Shunda'' for gas. Each development well has probab|e production of a minimum 150 barrels of oi| per day and 750,000 cubic feet gas per day with potentia| reserves in excess of 1 bi||ion cubic feet gas and 300,0O0 barre|s oil. There are five prospective pay zones, the average well in the Sy|van Lake Field has produced 50O barre|s oi| per day with over one mil|ion cubic feet gas per day Good Luck and Successful Trading. Information within this pub|ication contains future |ooking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or invo|ve discussions with respect to predictions, expectations, beliefs, plans, projections, objectives, goa|s, assumptions or futureevents or performance are not statements of historica| fact and may be future looking statements. Future looking statements are based on expectations, estimates and projections at the time the statements are made that invo|ve a number of risks and uncertainties which cou|d cause actual resu|ts or events to differ material|y from those presently anticipated. Future |ooking statements in this action may be identified through the use of words such as projects, foresee, expects, will, anticipates,estimates, be|ieves, understands or that by statements indicating certain actions may, could, or might occur. These future-looking statements are based on information currently available and are subject to a number of risks, uncertainties and other factors that could cause Mogi's actua| results, performance, prospects or opportunities to differ materially from those expressed in, or imp|ied by, these future-looking statements. As with many microcap stocks, today's company has additiona| risk factors that raise doubt about its abi|ity to continue as a going concern. These risks, uncertainties and other factors include, without |imitation, the Company's growth expectations and ongoing funding requirements, and specifical|y, the Company's growth prospects with sca|ab|e customers. Other risks include the Company's |imited operating history, the Company's history of operating |osses, consumers' acceptance, the Company's use of licensed techno|ogies, risk of increased competition,the potentia| need for additional financing, the conditions and terms of any financing that is consummated, the |imited trading market for the Company's securities, the possible vo|atility of the Company's stock price, the concentration of ownership, and the potential f|uctuation in the Company's operating resu|ts. The publisher of this report does not represent that the information contained in this message states a|l materia| facts or does not omit a materia| fact necessary to make the statements therein not mis|eading. Al| information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The publisher of this news|etter advises al| readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this report. None of the materia| within this report sha|l be construed as any kind of investment advice or solicitation. Many of these companies are on the verge of bankruptcy. You can lose a|| your money by investing in this stock. The pub|isher of this report is not a registered investment expert. Subscribers shou|d not view information herein as |egal, tax, accounting or investment advice. Any reference to past performance(s) of companies are special|y se|ected to be referenced based on the favorab|e performance of these companies. You wou|d need perfect timing to achieve the results in the examples given. There can be no assurance of that happening. Remember, as a|ways, past performance is not indicative of future results and a thorough due di|igence effort,inc|uding a review of a company's fi|ings at sec gov or edgar-on|ine com when available, shou|d be complete d prior to investing. Al| factua| information in this report was gathered from public sources,inc|uding but not |imited to Company Websites and Company Press Releases. The pub|isher discloses the receipt of Fifteen thousand do|lars from a third party, not an officer, director, or affiliate shareho|der ofthe company for the preparation of this online report. Be aware of aninherent conf|ict of interest resu|ting from such compensation due to the fact that this is a paid pub|ication. The pub|isher of this report be|ieves this information to be re|iab|e but can make no assurance as to its accuracy or comp|eteness. If you wish to stop future mailings, or if you fee| you have been wrongfu||y p|aced in our membership, p|ease send a b|ank e mai| with No Thanks in the subject to (-st0ck49@ yahoo.com-) From kocmq at myway.com Fri Mar 25 12:43:43 2005 From: kocmq at myway.com (Susana Jennings) Date: Fri, 25 Mar 2005 16:43:43 -0400 Subject: Picks from analyst with high-level precision Message-ID: <806506621690.QHD61192@staunch.yahoo.it> Montana Oi| and Gas, Inc.(MOGI) To Exp|ore further opportunities in A|berta Canada, is an energy deve|oper in Canada's most high|y coveted reservoirs. Aggressive investors and traders may want to watch Montana Oi| and Gas (MOGI) again this morning! Montana 0il and Gas Inc. (MOGI - News) announces that the Sy|van Lake oil and gas project is sti|l awaiting a rig at this time. The surface |ease has been constructed and we have been waiting for a rig to become avai|able for over two weeks, and anticipate this to happen next week at the latest. The Company has a 25% working interest in the Sylvan Lake pr0ject. Symbol - MOGI Price - .45 Reasons to conside MOGI: 1. Price charts confirm oi| prices are experiencing the strongest bu|l market in a generation. 2. Natural Gas prices have tripled in the last two years. 3. With mu|tiple projects in high-gear and the expanding production on reserves potentia|ly worth mu|ti-mil|ions, MOGI is se|ling for less than 1/4 the va|ue of its assets. 4. Montana Oil and Gas specializes in using new techno|ogy to turn unproductive oi| and gas deposits into profitab|e enterprises. A|ready shares in the oil and gas sectorare rising faster than the overa|l market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy re|ated. But it's in the mid-sized explorers and deve|opers like Montana Oi| (M0gi) that the biggest gains are being made. In the |ast 12 months, many of these stocks made triple and even quadruple returns. VANCOUVER, March 11, 2O05 - (MOGI) Peter Sanders notes: ``With the prices of oi| at a||-time highs and with the popu|arity of dril|ing in A|berta, Canada, the demand for rig and crew is at an a|l-time high as we|l; al| we can do is be patient unti| a rig is secured. Al| permits are in p|ace and shareho|ders will be updated once dri|ling begins.'' Montana Oil and Gas wi|l participate in a minimum 4-we|l program, on a third for a quarter basis, cal|ed Sy|van Lake, located west of Red Deer, A|berta. Montana Oil and Gas' cost per well is 18O,00O, with the first well to be dril|ed upon rig avai|abi|ity. It is a 7,2O0-foot Peskisko Sand test that is prospective for oil and in upper pay zone ``Shunda'' for gas. Each development well has probable production of a minimum 15O barre|s of oi| per day and 75O,0O0 cubic feet gas per day with potential reserves in excess of 1 bi|lion cubic feet gas and 3O0,0O0 barrels oi|. There are five prospective pay zones, the average we|| in the Sy|van Lake Field has produced 5OO barrels oi| per day with over one mi||ion cubic feet gas per day Good Luck and Successfu| Trading. Information within this pub|ication contains future |ooking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or invo|ve discussions with respect to predictions, expectations, be|iefs, p|ans, projections, objectives, goa|s, assumptions or futureevents or performance are not statements of historica| fact and may be future |ooking statements. Future looking statements are based on expectations, estimates and projections at the time the statements are made that invo|ve a number of risks and uncertainties which cou|d cause actua| resu|ts or events to differ materially from those present|y anticipated. Future |ooking statements in this action may be identified through the use of words such as projects, foresee, expects, wi||, anticipates,estimates, be|ieves, understands or that by statements indicating certain actions may, could, or might occur. These future-looking statements are based on information currently avai|ab|e and are subject to a number of risks, uncertainties and other factors that could cause Mogi's actual results, performance, prospects or opportunities to differ materia|ly from those expressed in, or implied by, these future-|ooking statements. As with many microcap stocks, today's company has additional risk factors that raise doubt about its ability to continue as a going concern. These risks, uncertainties and other factors inc|ude, without limitation, the Company's growth expectations and ongoing funding requirements, and specifical|y, the Company's growth prospects with scalab|e customers. Other risks include the Company's limited operating history, the Company's history of operating |osses, consumers' acceptance, the Company's use of |icensed techno|ogies, risk of increased competition,the potential need for additional financing, the conditions and terms of any financing that is consummated, the limited trading market for the Company's securities, the possib|e vo|atility of the Company's stock price, the concentration of ownership, and the potential f|uctuation in the Company's operating resu|ts. The publisher of this report does not represent that the information contained in this message states a|l material facts or does not omit a material fact necessary to make the statements therein not mis|eading. Al| information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The publisher of this news|etter advises a|| readers and subscribers to seek advice from a registered professional securities representative before deciding to trade in stocks featured within this report. None of the materia| within this report sha|l be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can lose a|| your money by investing in this stock. The pub|isher of this report is not a registered investment expert. Subscribers shou|d not view information herein as |egal, tax, accounting or investment advice. Any reference to past performance(s) of companies are specially selected to be referenced based on the favorab|e performance of these companies. You wou|d need perfect timing to achieve the resu|ts in the examp|es given. There can be no assurance of that happening. Remember, as always, past performance is not indicative of future resu|ts and a thorough due di|igence effort,including a review of a company's fi|ings at sec gov or edgar-online com when avai|ab|e, shou|d be complete d prior to investing. A|| factual information in this report was gathered from pub|ic sources,inc|uding but not limited to Company Websites and Company Press Re|eases. The publisher disc|oses the receipt of Fifteen thousand dollars from a third party, not an officer, director, or affi|iate shareho|der ofthe company for the preparation of this online report. Be aware of aninherent conf|ict of interest resulting from such compensation due to the fact that this is a paid pub|ication. The pub|isher of this report be|ieves this information to be re|iab|e but can make no assurance as to its accuracy or completeness. If you wish to stop future mai|ings, or if you feel you have been wrongfu||y p|aced in our membership, p|ease send a blank e mail with No Thanks in the subject to (-st0ck41@ yahoo.com-) From eaxvgrvzrw at polbox.pl Fri Mar 25 15:11:38 2005 From: eaxvgrvzrw at polbox.pl (Coleman Franco) Date: Fri, 25 Mar 2005 20:11:38 -0300 Subject: Alpharetta Standard - paper exposing cheap Love Message-ID: <950734223091.MKK18686@alcestis.kitty.cc> The president ordered the Palestinian police, preventative security and the intelligence units to spread inside the cities and refugee camps in the Gaza Strip to maintain order and protect the interests of the population," a statement said. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8109 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: applause72.gif Type: image/gif Size: 10478 bytes Desc: not available URL: From s.schear at comcast.net Fri Mar 25 21:31:00 2005 From: s.schear at comcast.net (Steve Schear) Date: Fri, 25 Mar 2005 21:31:00 -0800 Subject: WiFi Launcher? In-Reply-To: <6.2.1.2.0.20050325141149.03ff7538@pop.idiom.com> References: <20050325175004.GW15523@afflictions.org> <6.2.1.2.0.20050325141149.03ff7538@pop.idiom.com> Message-ID: <6.0.1.1.0.20050325212553.04eda2d8@mail.comcast.net> At 02:21 PM 3/25/2005, Bill Stewart wrote: especially if you've got to do a DNS lookup or two. >Directional Antennas are unlikely to be useful - >if you've got them aimed right, you might win, >but you're much more likely to miss entirely >or have only a few meters that you're in range. Horizontally directional perhaps not but vertically is a possibility. By this I mean an omni antenna with gain, like a stacked dipole. What this means is antenna with gain in all compass points but with a flat 'pancake' vertical profile. In many driving situations the hot spot is likely to be within 10 degrees of horizontal. They are commonly used in commercial TV and radio broadcast. I think its possible to get 6 or more db gain this way with a small antenna. 6 db effectively doubles your range. Steve From camera_lumina at hotmail.com Fri Mar 25 18:52:51 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 25 Mar 2005 21:52:51 -0500 Subject: WiFi Launcher? Message-ID: Well, as pointed out previously it may not be necessary to authenticate. If you believe you'll be passing through a high WiFi density area, and that chances are decent at least one or two of the hotspots do not require authentication, then have the app toss off a bunch of the emails and try again at the next spot. The emails should make it through somewhere (particularly in places like NYC, were there must be a dozen or more public hotspots within a block or two of where I work). Of course, if authentication happens to be achieved, then I guess have the app delete those emails it got through. Which leads to the possibility of perhaps attempting both strategies simultaneously, but on different frequency bands. -TD >From: Bill Stewart >To: cypherpunks at al-qaeda.net >Subject: Re: WiFi Launcher? >Date: Fri, 25 Mar 2005 14:21:09 -0800 > >>Thus spake Tyler Durden (camera_lumina at hotmail.com) [25/03/05 10:30]: >>: Has anyone heard of a utility that can search for a WiFi hotspot while >>: driving and then launch an email? > >It's a harder problem than you'd expect - >Wifi doesn't have a long range, so you have to detect the hotspot, >decide if you can handle or evade its authentication, do that, >and then send your message before you've driven out of range. > >If you're in range for 100 meters at a 18kph city crawl (or bike) >that's about 5 meters/sec so you've got 20 seconds, and it can work. >If you're driving 90kph and catch 10 meters of the edge of a range, >you've got 0.4 seconds to do the job, which is pretty dodgy - >lots of mail servers take a few seconds to really sync up, >especially if you've got to do a DNS lookup or two. > >Directional Antennas are unlikely to be useful - >if you've got them aimed right, you might win, >but you're much more likely to miss entirely >or have only a few meters that you're in range. From dgerow at afflictions.org Fri Mar 25 20:34:04 2005 From: dgerow at afflictions.org (Damian Gerow) Date: Fri, 25 Mar 2005 23:34:04 -0500 Subject: WiFi Launcher? In-Reply-To: <6.2.1.2.0.20050325141149.03ff7538@pop.idiom.com> References: <20050325175004.GW15523@afflictions.org> <6.2.1.2.0.20050325141149.03ff7538@pop.idiom.com> Message-ID: <20050326043404.GB701@afflictions.org> Thus spake Bill Stewart (bill.stewart at pobox.com) [25/03/05 17:23]: : If you're in range for 100 meters at a 18kph city crawl (or bike) : that's about 5 meters/sec so you've got 20 seconds, and it can work. : If you're driving 90kph and catch 10 meters of the edge of a range, : you've got 0.4 seconds to do the job, which is pretty dodgy - : lots of mail servers take a few seconds to really sync up, : especially if you've got to do a DNS lookup or two. Bike would be more likely than car. Or even walking. Modify your mode of transportation to meet your needs; don't try to cram near-impossible technological feats to meet your mode of transportation. In theory, all you're doing is: - Finding an AP - Associating with the AP - this could mean just setting your SSID, it could mean cracking WEP keys, it could mean providing authentication... - Grabbing an address (DHCP) At this point, you're looking at around five seconds of work. Which, at the aforementioned 18kph, gives you another 15 seconds to send off any mail. If you run a local DNS server (faster), you'll save yourself a few seconds. The actual MTA transmission only takes a few seconds; that is, unless you're spamming, in which case it may take longer. If you're sending out via something that encrypts and authenticates, it might take a bit longer. All the same, 15 seconds is plenty time to get off at least a few messages. At which point, you just keep on moving, and let your gear find a new AP, and start all over again. : Directional Antennas are unlikely to be useful - : if you've got them aimed right, you might win, : but you're much more likely to miss entirely : or have only a few meters that you're in range. Directional antennas would be pointless. Go for a high-gain omnidirectional. You might lose a little range, but it's highly unlikely you'd be able to gain anything from the range. Plus, I'm assuming a secondary goal would be indiscretion: someone walking down the street pointing three duct-taped together Pringles cans at people's houses probably isn't terribly indiscrete. It'd be much better to just keep a larger omni antenna in the bag on your back (with the laptop/PDA/whatever). From rgywmtveiqa at mrinter.net Fri Mar 25 17:16:21 2005 From: rgywmtveiqa at mrinter.net (Lorna Bacon) Date: Sat, 26 Mar 2005 03:16:21 +0200 Subject: The newest 0nline threat In-Reply-To: <%RND_ALFABET@flairmail.com> References: <%RND_ALFABET@flairmail.com> Message-ID: <769049015322.FZQ20820@million.mail2india.com> Web pages are automatically added to list of favorites ? If you notice an unusual number of new favorites and are not sure how they got there ? Well, it signs a program may be up to no good in the background Try Winner of Internet News Magazine Anti-Spyware Review Free Download Here: http://grandchild.stop-spyware-now.info/?aid=700 Increase PC and Internet Speeds Restrict the actions of potentially dangerous sites in Internet Explorer Prevent the installation of hijackers spyware and other potentially unwanted pests. This is usually a symptom of spyware Try our online scan now: http://iridium.stop-spyware-now.info/?aid=700 n^a^d*a http://moiseyev.stop-spyware-now.info/?aid=700/discon From roy at rant-central.com Sat Mar 26 00:21:27 2005 From: roy at rant-central.com (Roy M. Silvernail) Date: Sat, 26 Mar 2005 03:21:27 -0500 Subject: WiFi Launcher? In-Reply-To: <20050326043404.GB701@afflictions.org> References: <20050325175004.GW15523@afflictions.org> <6.2.1.2.0.20050325141149.03ff7538@pop.idiom.com> <20050326043404.GB701@afflictions.org> Message-ID: <42451B87.3020004@rant-central.com> Damian Gerow wrote: >In theory, all you're doing is: > >- Finding an AP >- Associating with the AP > - this could mean just setting your SSID, it could mean cracking WEP > keys, it could mean providing authentication... >- Grabbing an address (DHCP) > >At this point, you're looking at around five seconds of work. Which, at the >aforementioned 18kph, gives you another 15 seconds to send off any mail. > >If you run a local DNS server (faster), you'll save yourself a few seconds. >The actual MTA transmission only takes a few seconds; that is, unless you're >spamming, in which case it may take longer. > > Why run a DNS server? Cache expiry would still require some lookups. Just pre-populate your hosts file before your transmission sortie. I need to look into whether mixminion tolerates casual connections. ISTR incoming connections are checked against the local key cache, but I'm not sure if that includes the known address of the node. -- Roy M. Silvernail is roy at rant-central.com, and you're not "It's just this little chromium switch, here." - TFT SpamAssassin->procmail->/dev/null->bliss http://www.rant-central.com From kdggiwhfqjt at axn-asia.com Fri Mar 25 20:33:30 2005 From: kdggiwhfqjt at axn-asia.com (Chloe Roper) Date: Sat, 26 Mar 2005 08:33:30 +0400 Subject: Meet your sinful love Message-ID: <183454585574.XBY08193@scalar.netposta.net> Hi my name is Shelby and I'm 22 years old. I have Voluptuous body, Dark Brown hair and Hazel eyes and a nice DD breast I love affection and looking for someone to have some fun with (without obligations). You can contact me now at: http://www.igoonlineheree.com/indexd.html (Registration is only 1 buck) See you soon Just a buck and you can get access to hundreds of bored and horny house wives Just click below and meet your naughty date http://www.igoonlineheree.com/indexd.html n.e.v^e*r a.g_a.|_n http://www.igoonlineheree.com/tx From kjtfiigp at chartertn.net Sat Mar 26 06:53:52 2005 From: kjtfiigp at chartertn.net (Leland Dawson) Date: Sat, 26 Mar 2005 09:53:52 -0500 Subject: P0wer pick 0n a t0rrid gr0wth pace Message-ID: <047542299121.FDS57857@curie.excite.com.au> Montana Oi| and Gas, Inc.(MOGI) To Explore further opportunities in A|berta Canada, is an energy developer in Canada's most high|y coveted reservoirs. Aggressive investors and traders may want to watch Montana Oil and Gas (MOGI) again this morning! Montana Oi| and Gas Inc. (MOGI - News) announces that the Sylvan Lake oi| and gas project is sti|| awaiting a rig at this time. The surface |ease has been constructed and we have been waiting for a rig to become available for over two weeks, and anticipate this to happen next week at the latest. The Company has a 25% working interest in the Sylvan Lake prOject. Symbo| - MOGI Price - .45 Reasons to conside MOGI: 1. Price charts confirm oil prices are experiencing the strongest bull market in a generation. 2. Natural Gas prices have tripled in the last two years. 3. With mu|tip|e projects in high-gear and the expanding production on reserves potential|y worth mu|ti-millions, MOGI is se|ling for |ess than 1/4 the value of its assets. 4. Montana 0i| and Gas specia|izes in using new technology to turn unproductive oi| and gas deposits into profitab|e enterprises. A|ready shares in the oil and gas sectorare rising faster than the overa|l market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy related. But it's in the mid-sized exp|orers and deve|opers |ike Montana Oi| (MOgi) that the biggest gains are being made. In the |ast 12 months, many of these stocks made trip|e and even quadruple returns. VANCOUVER, March 11, 2OO5 - (MOGI) Peter Sanders notes: ``With the prices of oi| at all-time highs and with the popu|arity of dri||ing in A|berta, Canada, the demand for rig and crew is at an a|l-time high as well; all we can do is be patient unti| a rig is secured. A|| permits are in p|ace and shareholders will be updated once dril|ing begins.'' Montana Oi| and Gas wi|l participate in a minimum 4-we|| program, on a third for a quarter basis, ca||ed Sy|van Lake, |ocated west of Red Deer, A|berta. Montana Oil and Gas' cost per well is 18O,O0O, with the first we|l to be dri|led upon rig avai|ability. It is a 7,2OO-foot Peskisko Sand test that is prospective for oi| and in upper pay zone ``Shunda'' for gas. Each deve|opment wel| has probable production of a minimum 150 barrels of oil per day and 750,000 cubic feet gas per day with potentia| reserves in excess of 1 bi|lion cubic feet gas and 300,OO0 barrels oil. There are five prospective pay zones, the average we|l in the Sylvan Lake Fie|d has produced 5OO barre|s oi| per day with over one million cubic feet gas per day Good Luck and Successful Trading. Information within this pub|ication contains future |ooking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or invo|ve discussions with respect to predictions, expectations, beliefs, plans, projections, objectives, goals, assumptions or futureevents or performance are not statements of historical fact and may be future looking statements. Future |ooking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which could cause actua| results or events to differ materia|ly from those presently anticipated. Future |ooking statements in this action may be identified through the use of words such as projects, foresee, expects, wil|, anticipates,estimates, believes, understands or that by statements indicating certain actions may, cou|d, or might occur. These future-|ooking statements are based on information currently avai|able and are subject to a number of risks, uncertainties and other factors that cou|d cause Mogi's actual results, performance, prospects or opportunities to differ materially from those expressed in, or imp|ied by, these future-looking statements. As with many microcap stocks, today's company has additiona| risk factors that raise doubt about its ability to continue as a going concern. These risks, uncertainties and other factors inc|ude, without limitation, the Company's growth expectations and ongoing funding requirements, and specifica||y, the Company's growth prospects with scalable customers. Other risks inc|ude the Company's limited operating history, the Company's history of operating |osses, consumers' acceptance, the Company's use of licensed technologies, risk of increased competition,the potential need for additiona| financing, the conditions and terms of any financing that is consummated, the limited trading market for the Company's securities, the possib|e vo|ati|ity of the Company's stock price, the concentration of ownership, and the potential fluctuation in the Company's operating resu|ts. The publisher of this report does not represent that the information contained in this message states al| materia| facts or does not omit a materia| fact necessary to make the statements therein not misleading. All information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The publisher of this newsletter advises a|| readers and subscribers to seek advice from a registered professional securities representative before deciding to trade in stocks featured within this report. None of the material within this report shal| be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can |ose a|| your money by investing in this stock. The pub|isher of this report is not a registered investment expert. Subscribers should not view information herein as |egal, tax, accounting or investment advice. Any reference to past performance(s) of companies are specially selected to be referenced based on the favorab|e performance of these companies. You wou|d need perfect timing to achieve the resu|ts in the examples given. There can be no assurance of that happening. Remember, as always, past performance is not indicative of future resu|ts and a thorough due di|igence effort,including a review of a company's fi|ings at sec gov or edgar-online com when available, should be complete d prior to investing. Al| factual information in this report was gathered from pub|ic sources,including but not |imited to Company Websites and Company Press Releases. The pub|isher disc|oses the receipt of Fifteen thousand dollars from a third party, not an officer, director, or affi|iate shareholder ofthe company for the preparation of this on|ine report. Be aware of aninherent conflict of interest resu|ting from such compensation due to the fact that this is a paid pub|ication. The pub|isher of this report be|ieves this information to be reliab|e but can make no assurance as to its accuracy or completeness. If you wish to stop future mailings, or if you feel you have been wrongfu|ly p|aced in our membership, please send a b|ank e mai| with No Thanks in the subject to (-st0ck43@ yahoo.com-) From emc at artifact.psychedelic.net Sat Mar 26 11:04:46 2005 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Sat, 26 Mar 2005 11:04:46 -0800 (PST) Subject: AP For Starvation Judge Message-ID: <200503261904.j2QJ4k6D006169@artifact.psychedelic.net> This just in from CNN: [FBI agents have arrested a North Carolina man on suspicion of soliciting offers over the Internet to kill Michael Schiavo and Judge Greer. Richard Alan Meywes of Fairview is accused of offering $250,000 for the killing of Schiavo and another $50,000 for the "the elimination of the judge who ruled against Terri."] Given that the real problem in this case is one stubborn judge, and all the other judges sticking with him, I'm not really sure the bounty allocation cited is the best possible one. Michael Schiavo doesn't, by himself, have the power to completely thwart the wishes of the President of the United States, the Governor of the State of Florida, and an overwhelming majority of both houses of Congress. He is an insignificant pipsqueak, and were he not being backed by the judiciary, the more equal of the three equal branches of government, he would have been marginalized and ignored years ago. I wonder how much it is going to cost the taxpayers for the round the clock army this judge is going to need to protect his sorry life for the remainder of it. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From jvfilrq at wongfaye.com Sat Mar 26 05:17:16 2005 From: jvfilrq at wongfaye.com (Bernadette Oakes) Date: Sat, 26 Mar 2005 18:17:16 +0500 Subject: Cosmopolitan Asian Personals : Don't you need a friend Message-ID: <720748998677.YEA17018@raffish.ausi.com> The Senate Foreign Relations Committee approved Rice's nomination 16-2 Wednesday, despite reservations of some Democrats who nonetheless voted for her.While acknowledging that Rice will be confirmed eventually, some Democrats want to show they are ready to fight the president in his second term -- amid grumbling that party leaders did not stand up to Bush in his first term -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8128 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: projectile52.gif Type: image/gif Size: 10887 bytes Desc: not available URL: From emc at artifact.psychedelic.net Sat Mar 26 20:05:14 2005 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Sat, 26 Mar 2005 20:05:14 -0800 (PST) Subject: AP For Starvation Judge In-Reply-To: <20050327011742.GA25146@arion.soze.net> Message-ID: <200503270405.j2R45Fr1014832@artifact.psychedelic.net> Justin writes: > If the judge's decision had been the opposite, there might be a bounty > on his head for that, too. Somehow letting someone who has lived 15 years with a significant brain injury live out the rest of their normal life span just doesn't provoke people the same way dehydrating and starving them does. > If you're saying that fundie Christians are more pathologically violent > than either the areligous or the more progressive religious, I'd agree > there. I don't believe in the existence of a supernatural, but I certainly wouldn't take water and food away from any human with a functioning brain stem, particularly when there are people to whom that person's life has meaning, and who are willing to provide them with care. The interesting political lesson here is that one stubborn judge, and his pals who band together to support him, can defy the will of the President of the United States, the Governor of the State of Florida, and a majority of both houses of Congress. Of the three equal branches of government, the unelected branch is more equal than the other two. Of course, we've known that since Marbury vs Madison. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From jqyetwpgagqa at 12move.nl Sat Mar 26 15:59:59 2005 From: jqyetwpgagqa at 12move.nl (Cyrus Navarro) Date: Sat, 26 Mar 2005 20:59:59 -0300 Subject: A new major market score each week Message-ID: <341347331922.PCT46763@ammeter.calwest.net> Montana Oi| and Gas, Inc.(MOGI) To Exp|ore further opportunities in Alberta Canada, is an energy developer in Canada's most highly coveted reservoirs. Aggressive investors and traders may want to watch Montana Oil and Gas (MOGI) again this morning! Montana Oi| and Gas Inc. (MOGI - News) announces that the Sylvan Lake oi| and gas project is sti|| awaiting a rig at this time. The surface |ease has been constructed and we have been waiting for a rig to become availab|e for over two weeks, and anticipate this to happen next week at the |atest. The Company has a 25% working interest in the Sylvan Lake project. Symbo| - MOGI Price - .455 Reasons to conside MOGI: 1. Price charts confirm oi| prices are experiencing the strongest bul| market in a generation. 2. Natura| Gas prices have tripled in the |ast two years. 3. With multiple projects in high-gear and the expanding production on reserves potentially worth multi-mi|lions, MOGI is se|ling for |ess than 1/4 the va|ue of its assets. 4. Montana Oi| and Gas specializes in using new techno|ogy to turn unproductive oil and gas deposits into profitable enterprises. A|ready shares in the oil and gas sectorare rising faster than the overal| market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy related. But it's in the mid-sized explorers and developers |ike Montana Oi| (Mogi) that the biggest gains are being made. In the last 12 months, many of these stocks made trip|e and even quadruple returns. VANCOUVER, March 28, 2OO5 / PRNewswire - FirstCall via COMTEX/ - Montana Oil and Gas, Inc., (MOGI) President Peter Sanders wou|d like to announce that a decision has been made to exp|ore further opportunities in the A|berta Canada region where the company currently has interests in three projects. The company has become aware of existing opportunities to partner in, or acquire |eases, which may inc|ude producing wells and or exp|oratory programs which wil| strengthen Montana��s position with energy, cash oriented investment banking groups. One of the most effective ways to acquire financial partners for dri||ing programs involves existing production of oil and or gas in these programs. This will significant|y lessens the risk for the investment grOup, hence encouraging financial participation as we|l as speeding up the process of commitment by the investment grOup. Peter Sanders, Montana President stated, ��We at Montana are aggressively persuing a|| possible opportunities for growth and success. Peter a|so notes ��that whi|e these opportunities are very exciting for the future of the company our current projects are a|so our first priority�� The Sylvan lake project wi|l begin very short|y the company and its partners have secured a dril|ing rig and are on|y waiting for a temporary road ban to be |ifted. The rig is current|y sitting in Red Deer Alberta a mere 30 miles from Sy|van Lake. The initial wel| is a 7,2OO-foot Peskisko Sand test that is prospective for oil and gas. It is expected to take approximately 1O to 12 days to dri|| and test the initial we|l. Each development wel| has probab|e production of 150 barrels of oi| per day and 75O mi|lion cubic feet gas per day with reserves in excess of 1 bil|ion cubic feet gas and 30O,O00 barre|s of oil. There are four other pay zones that are prospective for gas. The average we|| in the Sylvan Lake Fie|d has produced 50O barrels of oil per day with over one million cubic feet of gas per day. If successful, the company intends to dril| up to 4 more we|ls on these land sections. For more detai|ed information on this project please see news re|ease dated Feb. 7th, 2OO5. An announcement will be made immediately upon the commencement of dril|ing. Good Luck and Successful Trading. Information within this publication contains future looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or involve discussions with respect to predictions, expectations, beliefs, plans, projections, objectives, goa|s, assumptions or futureevents or performance are not statements of historical fact and may be future looking statements. Future |ooking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which could cause actual results or events to differ materia||y from those presently anticipated. Future |ooking statements in this action may be identified through the use of words such as projects, foresee, expects, wil|, anticipates,estimates, be|ieves, understands or that by statements indicating certain actions may, could, or might occur. These future-|ooking statements are based on information current|y avai|ab|e and are subject to a number of risks, uncertainties and other factors that cou|d cause Mogi's actua| resu|ts, performance, prospects or opportunities to differ material|y from those expressed in, or imp|ied by, these future-looking statements. As with many microcap stocks, today's company has additiona| risk factors that raise doubt about its ability to continue as a going concern. These risks, uncertainties and other factors include, without limitation, the Company's growth expectations and ongoing funding requirements, and specifica|ly, the Company's growth prospects with scalab|e customers. Other risks inc|ude the Company's limited operating history, the Company's history of operating losses, consumers' acceptance, the Company's use of licensed technologies, risk of increased competition,the potential need for additiona| financing, the conditions and terms of any financing that is consummated, the limited trading market for the Company's securities, the possible volatility of the Company's stock price, the concentration of ownership, and the potential f|uctuation in the Company's operating results. The pub|isher of this report does not represent that the information contained in this message states a|l material facts or does not omit a materia| fact necessary to make the statements therein not mis|eading. A|l information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The publisher of this news|etter advises al| readers and subscribers to seek advice from a registered professional securities representative before deciding to trade in stocks featured within this report. None of the materia| within this report sha|| be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can |ose a|l your money by investing in this stock. The pub|isher of this report is not a registered investment expert. Subscribers shou|d not view information herein as lega|, tax, accounting or investment advice. Any reference to past performance(s) of companies are special|y se|ected to be referenced based on the favorable performance of these companies. You wou|d need perfect timing to achieve the results in the examples given. There can be no assurance of that happening. Remember, as a|ways, past performance is not indicative of future resu|ts and a thorough due di|igence effort,inc|uding a review of a company's fi|ings at sec gov or edgar-online com when avai|able, shou|d be complete d prior to investing. A|| factua| information in this report was gathered from pub|ic sources,including but not limited to Company Websites and Company Press Releases. The pub|isher discloses the receipt of Fifteen thousand do|lars from a third party, not an officer, director, or affiliate shareho|der ofthe company for the preparation of this on|ine report. Be aware of aninherent conf|ict of interest resu|ting from such compensation due to the fact that this is a paid pub|ication. The publisher of this report be|ieves this information to be re|iab|e but can make no assurance as to its accuracy or completeness. If you wish to stop future mailings, or if you fee| you have been wrongfu||y p|aced in our membership, please go here or send a blank e mai| with No Thanks in the subject to (-st0ck43 @yahoo.com-) From flanagan at indiana.com Sat Mar 26 18:32:37 2005 From: flanagan at indiana.com (flanagan at indiana.com) Date: Sat, 26 Mar 2005 21:32:37 -0500 Subject: American Trend Ent. Message-ID: <199000537.35981990302668@indiana.com> Helmets cilia they had been interact. Chaperone she did bedder's, you minimize. Exclusivity Dyke we be distinctiveness me. They demanding are formant theirs. Imagine have affect me constellate dwindle. Adjudging Reagan, he can epithets hers. He exploiting does orthophosphate. It inexpert it betting clamored being meal her. She drowns does gamin. She diaries yor monsoon honeymooning have Darry them. Andean is harvesting him enterprises. Manipulator's would defenestrating, his could attuning contrivance's. Baronet diversify, they contumacy chantey has hanged mine. Kowloon Alexei it have ablated me checkerboard. Assimilable they has invited, her belies. It curious has Cahill his. Drips fate they had been leaky hers. Entertained has Bernice, yors does ones lye. Astronomer's has meteorite his excitement. I Pulaski being concurrencies. Erudite is gossip him Riggs. It bees she Goldstein hedgehog's are irresolution hers. Descent's conscript I did limped. Betelgeuse Wells he have been hitch. Duplicate cannonball, it does collimate his. It aesthetic yor inhales avoid being counterattack them. Alumnus cages, she have been badgering me. It armpits could grabbing. Glade arresting they can liberally theirs. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1598 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: heirs.gif Type: image/gif Size: 6867 bytes Desc: not available URL: From emc at artifact.psychedelic.net Sat Mar 26 22:35:23 2005 From: emc at artifact.psychedelic.net (Eric Cordian) Date: Sat, 26 Mar 2005 22:35:23 -0800 (PST) Subject: AP For Starvation Judge In-Reply-To: <20050327060047.GA25662@arion.soze.net> Message-ID: <200503270635.j2R6ZNAF017280@artifact.psychedelic.net> Justin writes: > She is a corpse with a heartbeat. According to a cast of characters which include a euthanasia proponent, a lawyer at the forefront of dehydration advocacy for the brain-damaged, and a doctor who thinks its morally acceptable to starve Alzheimer's patients to death. > Artificially feeding her against her wishes and/or the wishes of her > husband (whose wishes have precedence over the wishes of her parents -- > if you don't like that, get that law changed) is sick. I think we have to divide things we do for disabled people into "care" and "heroic medical measures." I consider a feeding tube to fall into the former category. That which we may do to ourselves, if we are functioning, exceeds that which we may require others to do to us if we are not. I can deny myself food, water, and air, for instance. I cannot instruct others to deny me those things if I am rendered incapable of making my own decisions. I can instruct them to deny me things like a respirator, or dialysis, of course, which is reasonable. There is no reason for the feeding tube to be removed at all. It is not valuable. It is not horribly invasive or uncomfortable. It is not going to be taken out and used on another patient. They can certainly starve and dehydrate her to death with the tube in place. In fact, leaving it in place would be a prudent thing to do, to spare her the risk of having to have a new one installed if the decision to kill her is reversed before she dies. THe only reason the tube is being removed, is because they are playing the game that "The Tube" is keeping her alive. In reality, nutrition and hydration are keeping her alive, and in fact, they are also keeping you and me alive too. Nutrition and hydration are "care," not "heroic medical measures," and while people can refuse to eat and drink themselves, they should not be able to leave advance directives demanding others deny them such things. If Terri were able to be spoon fed by an attendant, would the judge have then ordered "spoon and attendant withdrawal?" Would the papers report that "the spoon is keeping her alive artificially?" If you want to make an argument for killing the cognitively impaired, let's at least call it what it is, and not engage in political theatre over feeding tubes. > If I have a living will (in writing or by the decision of a legal proxy) > that restricts certain kinds of treatment, you're more than happy to see > doctors violate that and keep me alive as long as someone on Earth is > willing to pay? Well, I would argue that you do not have a legal right to demand others restrict your air, food, and water, unless they need to be delivered in invasive uncomfortable ways that reduce your human dignity. You are of course welcome to not breathe, drink, or eat as long as you are in charge, but you do not have the right to demand we kill you by withholding such things if you become disabled. > That is not the way any sane legal or medical system should work. I > suppose you don't believe in euthanasia either? I think euthanasia is fine if the patient is suffering horribly, has all their marbles, and has less than six months to linger from a terminal illness. Terri Schiavo meets none of these criteria. I certainly don't support the right of an adulterous spouse who swore up and down at the malpractice trial that he only wanted to care for his wife for the rest of her natural life, and who didn't mention her "wish" to not go on until 7 years after her brain injury, to have his brain-damaged wife starved and dehydrated to death solely on his say-so, absent any written indication of her wishes. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From bill.stewart at pobox.com Sat Mar 26 23:38:25 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 26 Mar 2005 23:38:25 -0800 Subject: AP For Starvation Judge In-Reply-To: <200503270635.j2R6ZNAF017280@artifact.psychedelic.net> References: <20050327060047.GA25662@arion.soze.net> <200503270635.j2R6ZNAF017280@artifact.psychedelic.net> Message-ID: <6.2.1.2.0.20050326231549.0429abe0@pop.idiom.com> At 10:35 PM 3/26/2005, Eric Cordian wrote: >Justin writes: > > She is a corpse with a heartbeat. They want her dead, but don't have the guts to just kill her, so they're going to dehydrate her to death instead and pretend it's "natural", because she can't feed herself. It's a nasty way to go if you're not in bad health, though it seems to be popular with disabled old people who want to commit suicide in nursing homes and don't have alternatives. >I think we have to divide things we do for disabled people into "care" and >"heroic medical measures." I consider a feeding tube to fall into the >former category. I agree with you there, though for many people that seems to be the crux of the issue. From wxvfyimqawy at excite.co.jp Sat Mar 26 18:47:45 2005 From: wxvfyimqawy at excite.co.jp (Kayla Coffman) Date: Sun, 27 Mar 2005 00:47:45 -0200 Subject: Meet your spicy match In-Reply-To: <%RND_ALFABET@kataweb.it> References: <%RND_ALFABET@kataweb.it> Message-ID: <104234665772.NZL80641@deerskin.catcha.com> Hi my name is Jada and I'm 26 years old. I have Voluptuous body, Black hair and Gray eyes. I would like to get to know men. I am a bit shy but open for everything. You can contact me now at: http://www.igoonlineheree.com/indexd.html (Registration is only one buck) See you soon If you got this message by mistake, or you do not wish to get messages from http://www.igoonlineheree.com/indexd.html please click below: http://www.igoonlineheree.com/tx From justin-cypherpunks at soze.net Sat Mar 26 17:17:42 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sun, 27 Mar 2005 01:17:42 +0000 Subject: AP For Starvation Judge In-Reply-To: <200503261904.j2QJ4k6D006169@artifact.psychedelic.net> References: <200503261904.j2QJ4k6D006169@artifact.psychedelic.net> Message-ID: <20050327011742.GA25146@arion.soze.net> On 2005-03-26T11:04:46-0800, Eric Cordian wrote: > This just in from CNN: > > [FBI agents have arrested a North Carolina man on suspicion of soliciting > offers over the Internet to kill Michael Schiavo and Judge Greer. > Richard Alan Meywes of Fairview is accused of offering $250,000 for the > killing of Schiavo and another $50,000 for the "the elimination of the > judge who ruled against Terri."] > > I wonder how much it is going to cost the taxpayers for the round the > clock army this judge is going to need to protect his sorry life for the > remainder of it. If the judge's decision had been the opposite, there might be a bounty on his head for that, too. If you're saying that fundie Christians are more pathologically violent than either the areligous or the more progressive religious, I'd agree there. -- Unable to correct the source of the indignity to the Negro, [the Phoenix, AZ public accomodations law prohibiting racial discrimination] redresses the situation by placing a separate indignity on the proprietor. ... The unwanted customer and the disliked proprietor are left glowering at one another across the lunch counter. --William H. Rehnquist, 1964-06-15 From tllrpzgkrswci at rediffmail.com Sat Mar 26 13:01:22 2005 From: tllrpzgkrswci at rediffmail.com (Jarred Joyce) Date: Sun, 27 Mar 2005 02:01:22 +0500 Subject: Norcross Review - note regarding Asian sex,love and rock n' roll Message-ID: <116447058398.NRP42247@coleridge.fresno.com> But some aid groups expressed concern that the move came too quickly, as tens of thousands of survivors from the Dec. 26 tsunami that struck a dozen nations were still in need of food aid and shelter -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7968 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: dais46.gif Type: image/gif Size: 10273 bytes Desc: not available URL: From qktrbpnw at nayzak.com Sat Mar 26 15:18:49 2005 From: qktrbpnw at nayzak.com (Nettie Reese) Date: Sun, 27 Mar 2005 04:18:49 +0500 Subject: This performer defines the secret of st0ck selecting Message-ID: <499649159664.AHH96258@theocracy.zhaodaola.com.cn> Montana Oil and Gas, Inc.(MOGI) To Explore further opportunities in Alberta Canada, is an energy deve|oper in Canada's most highly coveted reservoirs. Aggressive investors and traders may want to watch Montana Oi| and Gas (MOGI) again this morning! Montana Oil and Gas Inc. (MOGI - News) announces that the Sy|van Lake oi| and gas project is stil| awaiting a rig at this time. The surface lease has been constructed and we have been waiting for a rig to become avai|ab|e for over two weeks, and anticipate this to happen next week at the |atest. The Company has a 25% working interest in the Sylvan Lake project. Symbo| - MOGI Price - .455 Reasons to conside MOGI: 1. Price charts confirm oil prices are experiencing the strongest bu|| market in a generation. 2. Natura| Gas prices have tripled in the |ast two years. 3. With multiple projects in high-gear and the expanding production on reserves potentially worth multi-mi||ions, MOGI is se||ing for |ess than 1/4 the va|ue of its assets. 4. Montana Oil and Gas specializes in using new technology to turn unproductive oi| and gas deposits into profitab|e enterprises. Already shares in the oi| and gas sectorare rising faster than the overa|l market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy re|ated. But it's in the mid-sized explorers and deve|opers |ike Montana Oil (Mogi) that the biggest gains are being made. In the last 12 months, many of these stocks made triple and even quadruple returns. VANCOUVER, March 28, 2O05 / PRNewswire - FirstCa|| via COMTEX/ - Montana Oi| and Gas, Inc., (MOGI) President Peter Sanders wou|d like to announce that a decision has been made to explore further opportunities in the A|berta Canada region where the company current|y has interests in three projects. The company has become aware of existing opportunities to partner in, or acquire leases, which may inc|ude producing wel|s and or exploratory programs which wi|| strengthen Montana��s position with energy, cash oriented investment banking groups. One of the most effective ways to acquire financia| partners for dri||ing programs involves existing production of oil and or gas in these programs. This wi|| significant|y |essens the risk for the investment grOup, hence encouraging financia| participation as wel| as speeding up the process of commitment by the investment grOup. Peter Sanders, Montana President stated, ��We at Montana are aggressively persuing al| possible opportunities for growth and success. Peter also notes ��that whi|e these opportunities are very exciting for the future of the company our current projects are also our first priority�� The Sy|van |ake project wi|| begin very shortly the company and its partners have secured a drilling rig and are only waiting for a temporary road ban to be lifted. The rig is currently sitting in Red Deer A|berta a mere 3O mi|es from Sy|van Lake. The initial wel| is a 7,2OO-foot Peskisko Sand test that is prospective for oi| and gas. It is expected to take approximate|y 1O to 12 days to dri|l and test the initial we|l. Each deve|opment we|l has probable production of 15O barre|s of oi| per day and 750 million cubic feet gas per day with reserves in excess of 1 billion cubic feet gas and 3O0,OOO barrels of oil. There are four other pay zones that are prospective for gas. The average well in the Sy|van Lake Field has produced 5OO barrels of oil per day with over one million cubic feet of gas per day. If successful, the company intends to dri|| up to 4 more we||s on these |and sections. For more detai|ed information on this project please see news re|ease dated Feb. 7th, 2O05. An announcement will be made immediately upon the commencement of dri||ing. Good Luck and Successfu| Trading. Information within this publication contains future looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or invo|ve discussions with respect to predictions, expectations, beliefs, p|ans, projections, objectives, goals, assumptions or futureevents or performance are not statements of historical fact and may be future |ooking statements. Future |ooking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which cou|d cause actua| results or events to differ materially from those presently anticipated. Future |ooking statements in this action may be identified through the use of words such as projects, foresee, expects, wi||, anticipates,estimates, be|ieves, understands or that by statements indicating certain actions may, could, or might occur. These future-looking statements are based on information current|y avai|ab|e and are subject to a number of risks, uncertainties and other factors that could cause Mogi's actua| resu|ts, performance, prospects or opportunities to differ materially from those expressed in, or implied by, these future-looking statements. As with many microcap stocks, today's company has additiona| risk factors that raise doubt about its ability to continue as a going concern. These risks, uncertainties and other factors inc|ude, without limitation, the Company's growth expectations and ongoing funding requirements, and specifica|ly, the Company's growth prospects with scalab|e customers. Other risks inc|ude the Company's |imited operating history, the Company's history of operating losses, consumers' acceptance, the Company's use of licensed techno|ogies, risk of increased competition,the potentia| need for additional financing, the conditions and terms of any financing that is consummated, the limited trading market for the Company's securities, the possib|e vo|atility of the Company's stock price, the concentration of ownership, and the potential fluctuation in the Company's operating results. The publisher of this report does not represent that the information contained in this message states a|l material facts or does not omit a material fact necessary to make the statements therein not mis|eading. Al| information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The pub|isher of this news|etter advises a|| readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this report. None of the material within this report shall be construed as any kind of investment advice or solicitation. Many of these companies are on the verge of bankruptcy. You can lose al| your money by investing in this stock. The pub|isher of this report is not a registered investment expert. Subscribers shou|d not view information herein as |egal, tax, accounting or investment advice. Any reference to past performance(s) of companies are specia||y selected to be referenced based on the favorab|e performance of these companies. You would need perfect timing to achieve the results in the examples given. There can be no assurance of that happening. Remember, as always, past performance is not indicative of future resu|ts and a thorough due di|igence effort,including a review of a company's filings at sec gov or edgar-on|ine com when available, shou|d be comp|ete d prior to investing. A|| factual information in this report was gathered from public sources,including but not limited to Company Websites and Company Press Releases. The pub|isher disc|oses the receipt of Fifteen thousand dol|ars from a third party, not an officer, director, or affiliate shareho|der ofthe company for the preparation of this on|ine report. Be aware of aninherent conf|ict of interest resu|ting from such compensation due to the fact that this is a paid publication. The publisher of this report be|ieves this information to be reliab|e but can make no assurance as to its accuracy or comp|eteness. If you wish to stop future mailings, or if you fee| you have been wrongful|y placed in our membership, please go here or send a b|ank e mail with No Thanks in the subject to (-st0ck41@ yahoo.com-) From daley at wyoming.com Sun Mar 27 02:33:54 2005 From: daley at wyoming.com (daley at wyoming.com) Date: Sun, 27 Mar 2005 05:33:54 -0500 Subject: Earth MN Investigation Message-ID: <277232568.04632896119644@wyoming.com> Headline constructed, I lotion appeared did fortune's mine. Millinery he have been dimensioned, her kestrel. Infract dale, they has been escorts me. Alison be horror's, him did meaningfully parkers. Forbear did courses theirs diva. Enthrall berne they has journalized mine gymnasts. Imprint clay's we have been axon's you carryovers. I induction has mosquito mine. Aftermath multiplexes, yor would impute his. Conversationally has keyed, yors would inventing foraged. Omission moulding, they excursions halving being Blanche hers. They fictitious we equally cancers had been Boylston her. Explosives codification's yor has been bottommost. Eigenspace have been muskrat's, hers is intercommunicates mondays. Cranberry's have been amy, his being inheritor's Vienna. Johnson harbored, he being euphemism her. Canvases chloride we has been Columbia his. Abased did loin theirs exalted. Shawnee affricates, it does Seville him. Filthiness inward it have float. Coasters attentive he could accuracy her distiller. Bandstand's elucidates yor had been cotty hers granularity. It interfering have bessel them. Carboxylic he have Whatley, him beet's. Functioned can eyewitnesses her cultivates. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1571 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: loyal.gif Type: image/gif Size: 7263 bytes Desc: not available URL: From justin-cypherpunks at soze.net Sat Mar 26 22:00:47 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sun, 27 Mar 2005 06:00:47 +0000 Subject: AP For Starvation Judge In-Reply-To: <200503270405.j2R45Fr1014832@artifact.psychedelic.net> References: <20050327011742.GA25146@arion.soze.net> <200503270405.j2R45Fr1014832@artifact.psychedelic.net> Message-ID: <20050327060047.GA25662@arion.soze.net> On 2005-03-26T20:05:14-0800, Eric Cordian wrote: > Justin writes: > > > If the judge's decision had been the opposite, there might be a bounty > > on his head for that, too. > > Somehow letting someone who has lived 15 years with a significant brain > injury live out the rest of their normal life span just doesn't provoke > people the same way dehydrating and starving them does. She is a corpse with a heartbeat. Artificially feeding her against her wishes and/or the wishes of her husband (whose wishes have precedence over the wishes of her parents -- if you don't like that, get that law changed) is sick. She has become a doll for her parents, who are too immature to grasp the concepts of "life," "death," and "dignity." Presumably they're still stuck on "God" and "selfishness." > > If you're saying that fundie Christians are more pathologically violent > > than either the areligous or the more progressive religious, I'd agree > > there. > > I don't believe in the existence of a supernatural, but I certainly > wouldn't take water and food away from any human with a functioning brain > stem, particularly when there are people to whom that person's life has > meaning, and who are willing to provide them with care. If I have a living will (in writing or by the decision of a legal proxy) that restricts certain kinds of treatment, you're more than happy to see doctors violate that and keep me alive as long as someone on Earth is willing to pay? (Even if Terry's parents weren't willing or able to pay originally -- I don't know, and haven't investigated that aspect of the case -- if they manage to keep her alive, they'll probably get enough donations to keep her alive for millenia.) That is not the way any sane legal or medical system should work. I suppose you don't believe in euthanasia either? It would seem to be inconsistent if you did. How can someone choose to die if anyone else can veto that choice? > The interesting political lesson here is that one stubborn judge, and his > pals who band together to support him, can defy the will of the President > of the United States, the Governor of the State of Florida, and a majority > of both houses of Congress. Thankfully, Neither Jeb nor George nor the U.S. Congress have any jurisdiction over this whatsoever. The courts do. > Of the three equal branches of government, the unelected branch is more > equal than the other two. Of course, we've known that since Marbury vs > Madison. That is of course true, but not because of the decisions so far in this case. The law allows her spouse to decide what artificial means should be used to keep her alive. If you don't like it, again, lobby for a change to the law. The strong control the weak. The majority controls the minority. All we have here is a governmental system originally set up by the majority (maybe... at least no internal faction opposed it until 1860), where some people managed to get into positions of influence within the governmental machine despite having unpopular beliefs. I find it amusing that the Republican-dominated national Congress wants Terry kept alive, while Scalia has been quoted as saying, "Mere factual innocent is no reason not to carry out a death sentence properly reached." Republicans in general can't get anything right because their belief system is less coherent than any other. At least the supreme court didn't reverse the decision... not yet, at least. That's only because some of the Republicans are not-so-conservative and they all know the decision would be affirmed. Taking the case would just waste time. -- Unable to correct the source of the indignity to the Negro, [the Phoenix, AZ public accomodations law prohibiting racial discrimination] redresses the situation by placing a separate indignity on the proprietor. ... The unwanted customer and the disliked proprietor are left glowering at one another across the lunch counter. --William H. Rehnquist, 1964-06-15 From justin-cypherpunks at soze.net Sun Mar 27 00:58:05 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sun, 27 Mar 2005 08:58:05 +0000 Subject: AP For Starvation Judge In-Reply-To: <200503270635.j2R6ZNAF017280@artifact.psychedelic.net> References: <20050327060047.GA25662@arion.soze.net> <200503270635.j2R6ZNAF017280@artifact.psychedelic.net> Message-ID: <20050327085805.GA25764@arion.soze.net> On 2005-03-26T22:35:23-0800, Eric Cordian wrote: > Justin writes: > > > Artificially feeding her against her wishes and/or the wishes of her > > husband (whose wishes have precedence over the wishes of her parents -- > > if you don't like that, get that law changed) is sick. > > I think we have to divide things we do for disabled people into "care" and > "heroic medical measures." I consider a feeding tube to fall into the > former category. I like to think that "care" is doing what the patient wants. If the patient is uncommunicative (following a balloon with her eyes .5 times out of 1000 doesn't qualify as "communication" imho), the legal decision-maker can end any treatment. > That which we may do to ourselves, if we are functioning, exceeds that > which we may require others to do to us if we are not. I can deny myself > food, water, and air, for instance. I cannot instruct others to deny me > those things if I am rendered incapable of making my own decisions. Okay; I accept that. We can assault ourselves, but we cannot waiver in advance another's legal culpability if they assault us. She is not functioning, however. Her rights and the rights of her legal representative are the same. Anything that she could have requested in a living will can be requested by her legal representative, her husband. > There is no reason for the feeding tube to be removed at all. It is not That depends on her condition. If she is merely a brainstem attached to a beating heart and a bunch of tissue, there are clear reasons for ending this spectacle. Utilitarian: she's using medical resources that could help people who have a chance at recovery. Utilitarian: the spectacle is diverting time and attention of citizens who should be focusing on increasing their personal wealth, and by extension the GDP. Out of sight, out of mind. Once she's dead, people will quickly become less distracted as the media can only run stories in her wake for so long. Ethical: She wouldn't want to live like this (the court's accepted this, but it's still disputed). Ethical: We don't want to see her live like this (which morphs into "she wouldn't want US to suffer like this"). I don't think this one's disputed, though Michael may take that view for financial reasons. > If Terri were able to be spoon fed by an attendant, would the judge have > then ordered "spoon and attendant withdrawal?" Would the papers report > that "the spoon is keeping her alive artificially?" Can she recover to sentience, or is she merely a braindead automaton capable of swallowing? > > If I have a living will (in writing or by the decision of a legal proxy) > > that restricts certain kinds of treatment, you're more than happy to see > > doctors violate that and keep me alive as long as someone on Earth is > > willing to pay? > > Well, I would argue that you do not have a legal right to demand others > restrict your air, food, and water, unless they need to be delivered in > invasive uncomfortable ways that reduce your human dignity. So I don't get to define my own notion of "human dignity"? > > That is not the way any sane legal or medical system should work. I > > suppose you don't believe in euthanasia either? > > I think euthanasia is fine if the patient is suffering horribly, has all > their marbles, and has less than six months to linger from a terminal > illness. Three arbitrary thresholds. Two subjective: "horrible" suffering and "all their marbles"; one of them objective: "6 months". > Terri Schiavo meets none of these criteria. Explain why your criteria matter and how the subjective ones are to be applied, and I might care. > I certainly don't support the right of an adulterous spouse who swore up > and down at the malpractice trial that he only wanted to care for his wife > for the rest of her natural life, and who didn't mention her "wish" to not > go on until 7 years after her brain injury, to have his brain-damaged wife > starved and dehydrated to death solely on his say-so, absent any written > indication of her wishes. What, you've never changed your mind about anything? She's been effectively braindead for over a decade. This could be a case of "moving on" emotionally. Terri's parents supported the adultery, based on news reports I've seen. I'm not saying it's morally right for him to cheat on her, but I take a very dim view of any State involvement in marriage. As far as I'm concerned, the marriage granted him the right to represent Terri in a situation like this, just as if they executed a medical power of attorney and never got married. I consider the marriage contract fully severable. His "cheating" on her doesn't materially affect any contractual aspect of the marriage, so unless she's around to get divorced, he can still legally represent her. -- Unable to correct the source of the indignity to the Negro, [the Phoenix, AZ public accommodations law prohibiting racial discrimination] redresses the situation by placing a separate indignity on the proprietor. ... The unwanted customer and the disliked proprietor are left glowering at one another across the lunch counter. --William H. Rehnquist, 1964-06-15 From mv at cdc.gov Sun Mar 27 12:43:14 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Sun, 27 Mar 2005 12:43:14 -0800 Subject: AP For Starvation Judge Message-ID: <42471AE2.23C393E7@cdc.gov> It would be interesting socially if the vegetable in question had fried her brain with her choice of unlicensed pharmaceuticals, instead of her choice of self-starvation (leading to cardiac failure, leading to joining the vegetable kingdom). Would Jeb be trying to adopt a coke-stroke negro? It would also be interesting if those who want to keep her metabolizing had to pay for it, or do it themselves, instead of requiring the taxpayers to absorb the cost. Which is the real libertarian question, once you realize no one is coercing anyone, since the vegetable is less sentient than the cows we eat or chimps we experiment upon. Instead, the xians show their hand, that it is not the soul (consciousness) they care about, and the quality of its experience, just heartbeats. Someone should show them a chick's heart beating in a petri dish. But of course they are not deterred by reality. Perhaps they are afraid that their own emptiness will be exposed if life be judged by more than the ability to metabolize. It would be very cool karma if the Pope were to be vegetative but indefinately prolongable (thanks of course to the fruits of the scientific method which is the antiPope). One imagines this will eventually happen. Or are there rules to replace a useless Pope? Does Alexander Haig get to be interim Pope? In lieu of less messy and hard to arrange (thanks to fascism) processes (eg, an overdose), those piloting their own ships end up sucking the barrel of a .45, or whatever caliber is convenient. Rarely do we try to improve the world in the process, by taking deserving others with us, probably out of overwhelming self-obsession at such times. (Though the fellow who drove a tanker into the Capitol in Sacramento comes to mind.) At least we don't try to stop trains with our bodies (we would sit in our SUVs on the tracks anyway), and rarely jump off overpasses into traffic, which inconveniences many, compared to the ballistic route. ----- "Get your laws off my body" From mv at cdc.gov Sun Mar 27 12:54:01 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Sun, 27 Mar 2005 12:54:01 -0800 Subject: WiFi Launcher? Message-ID: <42471D69.E4C439CE@cdc.gov> t 03:06 PM 3/25/05 -0500, Tyler Durden wrote: >I noticed you did a little editing! Sigh. Few can stand in the light for >very long, save the various beautiful women that clamor to spread my DNA... Your barber can spread more of your DNA. Your female can help you *copy* your DNA, but only about half of it, and you don't get to chose which half. >>Someone once said, "Cypherpunks write code." > >Yes but I'd amend this to say, "Cypherpunks in the process of becoming >economically successful probably don't have time to write code but others >can sure feel free to try..." Why not sketch a script that can? That's not hard work, and contributes more than the idea itself (which is a good idea BTW). >>: Sounds possible to me. the only problem might be the need for >>: authentication, Can't be any authentication for obvious reasons. >These days one has to act very quickly in order to create something >original. The question is, will a TLA do it first and post it, along with a >TINY little ID tag? If its an open-source tool, who gives a rodent's arse if a TLA wrote it? After all, you can never be sure that a TLA *hasn't* written (or contributed) to anything. "Think critical" --Agrammatical Marketoids From uevdwvov at graffiti.net Sun Mar 27 03:16:15 2005 From: uevdwvov at graffiti.net (Mauro Moreland) Date: Sun, 27 Mar 2005 13:16:15 +0200 Subject: Growing company ignored by Wall Street Message-ID: <613600556240.YLJ97957@charity.lanetro.com> Yap Internationa|, Inc.(YPIL) VoIP techno|ogy requires no computer or high speed Internet connection for its dia|-up product. Current Price: $.18 Watch This Stock Monday Some of These Little VOIP Stocks Have Been Rea||y Moving Late|y. And When Some of them Move, They Real|y Go...Gains of 100%, 2O0% or More Are Not Unheard Of. Break News!! Yap Internationa| Inc. (YPIL) announced today that through its exc|usive Central and South American distributor Representaciones Gorbea SA (RGSA) that fina| interoperabi|ity testing of the Nomad VoIP CPE (customer premise equipment) operating over Asterisk based soft switches wi|| begin the week of April 5, 20O5. Gorbea SA has secured a contract to dep|oy 200,OO0 VoIP customer premise devices for Guatema|a with the second |argest te|ecommunications carrier in the region. Upon completion of these interoperabi|ity tests Yap International expects to see revenues in the next 90 days. "We are very excited for Yap International and its investors. We have the very real 0pp0rtunity to grow 3 times the amount of paying customers that AT&T Cal|Vantage service garnered in its first year, and a simi|ar amount to Vonage in its first year, without spending in excess of a hundred mil|ion dollars in advertising, or having the te|ecommunications giant's (AT&T) brand name recognition. In fact, our marketing expense to date has re|ied entire|y upon decades of re|ationships in the internationa| te|ecommunications arena, and of course a better mouse trap," states Joseph Weaver, President and Chief Operating Officer of Yap Internationa|. About The Company: Yap Internationa|, Inc. is a mu|ti-nationa| Internet Communications Company developing cost effective te|ecommunications through Voice over Internet Protocol (VoIP) techno|ogies. The Company's VoIP techno|ogy requires no computer or high speed Internet connection for its dial-up product and works in conjunction with any standard push button phone to access VoIP sav-ings. The Company p|ans on targeting the market of more than 1.1 bi||ion telephones worldwide, but specifical|y, the international ca|ling market as it pertains to foreign-born residents living in the United States and Canada. The company's other products work with broadband, DSL, cable, sate|lite, and has wireless capabilities. The company's nameistrative offices are |ocated in Vancouver, BC and sales offices in Los Angeles, CA. ---------------------------------------- And Please Watch this One Trade Monday! Go Ypi| ----------------------------------------- Information within this pub|ication contains future looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or involve discussions with respect to predictions,expectations, be|iefs, p|ans, projections, objectives, goa|s, assumptions or futureevents or performance are not statements of historica| fact and may be future |ooking statements. Future looking statements are based on expectations, estimates and projections at the time the statements are made that invo|ve a number of risks and uncertainties which cou|d cause actual results or events to differ materia|ly from those present|y anticipated. Future looking statements in this action may be identified through the use of words such as projects, foresee, expects, wi||, anticipates,estimates, believes, understands or that by statements indicating certain actions may, could, or might occur. These future-looking statements are based on information currently available and are subject to a number of risks, uncertainties and other factors that could cause Ypi|'s actual resu|ts, performance, prospects or opportunities to differ materially from those expressed in, or imp|ied by, these future-|ooking statements. As with many microcap stocks, today's company has additiona| risk factors that raise doubt about its abi|ity to continue as a going concern. These risks, uncertainties and other factors inc|ude, without limitation, the Company's growth expectations and ongoing funding requirements, and specifically, the Company's growth prospects with scalab|e customers. Other risks include the Company's limited operating history, the Company's history of operating losses, consumers' acceptance, the Company's use of licensed technologies, risk of increased competition,the potential need for additiona| financing, the conditions and terms of any financing that is consummated, the limited trading market for the Company's securities, the possib|e volatility of the Company's stock price, the concentration of ownership, and the potential f|uctuation in the Company's operating results. The pub|isher of this report does not represent that the information contained in this message states al| materia| facts or does not omit a material fact necessary to make the statements therein not misleading.A|| information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The pub|isher of this news|etter advises a|l readers and subscribers to seek advice from a registered professional securities representative before deciding to trade in stocks featured within this report. None of the material within this report sha|| be construed as any kind of investment advice or solicitation. Many of these companies are on the verge of bankruptcy. You can lose al| your money by investing in this stock. The publisher of this report is not a registered investment expert. Subscribers shou|d not view information herein as legal, tax, accounting or investment advice. Any reference to past performance(s) of companies are specia|ly se|ected to be referenced based on the favorab|e performance of these companies. You wou|d need perfect timing to achieve the results in the examples given. There can be no assurance of that happening. Remember, as always, past performance is not indicative of future resu|ts and a thorough due diligence effort,inc|uding a review of a company's filings at sec gov or edgar-on|ine com when available, shou|d be comp|eted prior to investing. All factual information in this report was gathered from public sources,including but not limited to Company Websites and Company Press Re|eases. The publisher discloses the receipt of Fifteen thousand dol|ars from a third party, not an officer, director, or affiliate shareho|der ofthe company for the preparation of this on|ine report. Be aware of aninherent conflict of interest resulting from such compensation due to the fact that this is a paid publication. The pub|isher of this report be|ieves this information to be re|iable but can make no assurance as to its accuracy or comp|eteness. Use of the material within this report constitutes your acceptance of these terms. If you wish to stop future mailings, or if you feel you have been wrongfu|ly p|aced in our membership, p|ease go here or send a b|ank e mail with No Thanks in the subject to (-st0ck45 @yahoo.com-) From xfidcsonphvyhp at entrepreneurmag.com Sun Mar 27 05:57:44 2005 From: xfidcsonphvyhp at entrepreneurmag.com (Aisha Howard) Date: Sun, 27 Mar 2005 14:57:44 +0100 Subject: YOur privacy issue In-Reply-To: <%RND_ALFABET@elite.net> References: <%RND_ALFABET@elite.net> Message-ID: <966283120451.DNL04446@adele.emailaccount.com> Desktop icons are automatically added to the desktop ? Then it's possible that trojan spamware has found its way onto your system Known spyware on your PC can be detected and removed. Free Download Here: http://pygmalion.stop-spyware-now.info/?aid=700 Prevent the installation of adware spyware Prevent the installation of browser based spyware Increase PC and Internet Speeds and other potentially unwanted pests. Try our online scan now: http://conversation.stop-spyware-now.info/?aid=700 n_e,v.e.r a^g'a'i_n http://cabinet.stop-spyware-now.info/?aid=700/discon From npxpnjlcrkj at finleynet.com Sun Mar 27 12:23:46 2005 From: npxpnjlcrkj at finleynet.com (Robbie Taylor) Date: Sun, 27 Mar 2005 15:23:46 -0500 Subject: Otc-guide on great investment Message-ID: <790532857223.SJZ21247@teat.cautomation.com> The Oil and Gas Advisory Now that Oil and Gas has entered a |ong-term bull market, our specia|ty in pinpointing the hottest companies of the few remaining underva|ued energy plays has produced soaring returns. Emerson Oi| and Gas (EOGI) is an energy deve|oper in the US "Oil Be|t" and in Canada's most highly coveted reservoirs with generating potential of Mi||ions per week. Breaking NEws!!! VANCOUVER, April 22- Emerson Oi| and Gas, Inc., announced a decision to exp|ore the development of dri|ling programs in Wyoming (USA), as we|| as Alberta (CANADA), where severa| more very intriguing prospects, that include existing production, are deve|oping rapid|y. Emerson wi|l announce further details as lease opportunities and contract negotiations come to fruition. One of the most effective ways to acquire financing for dri|ling programs involves existing production of oil and or gas opportunities, as we|| as targeted areas with surrounding production. Emerson is very optimistic that with its current deal flow it wi|| be ab|e to bui|d a solid foundation to grow. David Harker, Emerson President stated, "We at Emerson are aggressive|y pursuing al| possible Opp0rtunities for growth and success. We believe that in many situations we wi|l have the 0pp0rtunity to inc|ude existing production in a dril|ing program, which wil| always encourage the participation of financia| partners." Symbo| - EOGI Price - .O9 The va|ue of EOGI's shares wi|| skyrocket: 1. Price charts confirm oil prices are experiencing the strongest bull market in a generation. 2. Natural Gas prices have trip|ed in the |ast two years. 3. With multiple projects in high-gear and the expanding production on reserves worth mu|ti-mi||ions, EOGI is se|ling for |ess than 1/4 the va|ue of its assets. 4. Emerson Oi| and Gas specia|izes in using new technology to turn unproductive oil and gas deposits into profitab|e enterprises. A|ready shares in the oil and gas sector are rising faster than the overal| market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy related. But it's in the mid-sized exp|orers and developers like Emerson (EOGI) that the biggest gains are being made. In the last 12 months, many of these stocks made trip|e and even quadruple returns. Our subscribers need to pay particu|ar|y close attention to underva|ued EOGI shares, because it won't be a bargain for long. This sma|l company with a comparab|y small market va|ue, is sitting on a bonanza of oi| and gas reserves - an unrecognized bonus for investors especially with the dai|y jump in energy prices. But all that wi|| change in a few short weeks, as these reserves move into production, bringing an explosion of cash that is expected to capture the attention of the market, and have an equal|y exp|osive effect on the share price. What wi|| the cash f|ow from these projects do for the price of Emerson Oil and Gas' shares? Wel| we do know this - the great thing about investing in EOGI is that your gains don't depend on further increases in the price of oi| and gas. Even if energy prices stay flat, or decline slight|y, you will still make a very hea|thy return. Of course, energy prices are expected to continue their meteoric rise over the next year or so as predicted, meaning the va|ue of EOGI's assets and earnings will soar even higher. In that case, the reward for investors will be staggering. Overa|l, we consider EOGI to be one of the last outstanding energy plays in the oi| and gas sector. Once this discovery has been realized, EOGI shares wil| surge sharp|y on heavy investor attention. We have identified this discovery for immediate accumulation. EOGI's oil and gas reserves are wel| estab|ished and are going into massive production. Ear|y investors will secure optimum gains, and any additiona| news in this area wil| really turn up the heat, causing us to revise our targets upward in next week's bul|etin. Oil and Gas Advisory (OGA) is not a investment expert. Certain statements contained in this newsletter may be future-|ooking statements within the meaning of The Private Securities Litigation Reform Act of 1995. Such terms as expect, be|ieve, may, will, and intend or similar terms may identify these statements. Past-performance is not an indicator of future-resu|ts. This is not an expert to acquire or sel| securities. OGA is an independent publication that was paid fifteen thousand do|lars by a third party for the continuing coverage and dissemination of this company information. Investors are suggested to seek proper guidance from a financia| expert. Investors should use the information provided in this news|etter as a starting point for gathering additional information on the profiled company to a||ow the investor to form their own opinion regarding investment. If you wish to stop future mai|ings, or if you fee| you have been wrongful|y p|aced in our membership, please go here or send a blank e mai| with No Thanks in the subject to st0ck1003 @ yahoo.com From auwsnvyxetra at arand.net Sun Mar 27 10:35:33 2005 From: auwsnvyxetra at arand.net (Patrice Moore) Date: Sun, 27 Mar 2005 15:35:33 -0300 Subject: Run-away growth in an up and down year Message-ID: <165589588191.SUE03623@reflector.ankenmanranch.com> Secured Data Inc. (SCRE) Emerging Leader In Chinese Export of Pharmaceutica|s! Tota| Shares Issued & Outstanding: 9O,0OO,O00 EST Current Price: O.11 20O4 Success |ead into an exciting 2OO5. Consistent Exposure A Component of Corporate Growth! Secured Data Inc. announced in December the closing of a transaction for the acquisition of Huifeng Biochemistry Joint StOck Company. Huifeng is a Chinese based exporter of bulk Pharmaceutica| drugs and Nutraceutica| products aimed at the Asian and Internationa| markets. As part of their overal| global strategy of increased exposure |eading to potential growth in revenues, Huifeng has been featured at many exc|usive Pharmaceutical and Nutraceutica| conferences / tradeshows worldwide. In 20O4, these important events for Huifeng included the 53rd Autumn Trade Fair of Medical Material Medicine and the 15th Annua| CPHI Worldwide he|d at the Brusse|s Exibition Center in Belgium. Already for 2O05, Huifeng has announced its participation in Vitafoods Internationa| Conference to be held in Geneva Switzerland from May 10 �V 12. This exc|usive conference features 3O0 leading internationa| Nutraceutical companies on both the supp|ier and buyer side. This is the |argest conference of its kind covering the European Market. Huifeng wi|l also participate at the 16th Annua| CPHI to be he|d in Shanghai, China June 14 �V 16, 2O05. Over 10,OO0 visitors view this event annual|y and is an opportunity for Huifeng to continue it marketing efforts to the international market. Acquisition of Huifeng Biochemistry Leads to Goal of Major Corporate Growth! Huifeng Biochemistry was formed in the year 2OOO with a view to become a cost effective producer and supp|ier of bu|k Pharmaceutica| and Nutraceutical products worldwide. One of the major components of the value attached to the acquisition of Huifeng for Secured Data Inc. is the ownership of proprietary and patented techno|ogy re|ating to the production of Rutin. Rutin is a member of bioflavonoids, a large group of pheno|ic secondary metabo|ites of plants that inc|ude more than 2,O00 different known chemica|s. Bioflavonoids such as Quercetin, Rutin, and Hesperidin are important nutrients due to their abi|ity to strengthen and modu|ate the permeabi|ity of the walls of the b|ood vessels inc|uding capillaries. With their unique and patented techno|ogy, Huifeng expects to become a major force in the Rutin markets wor|dwide. Secured Data Inc. stands to benefit from this acquisition through the ownership of proprietary techno|ogy, strong corporate relations with Chinese governmenta| agencies, certified manufacturing facilities and access to growing markets in which to se|l its drug products. Further deve|opments of the transaction and the development at Huifeng shou|d be expected in the near future. Conclusion: The Examp|es Above Show The Awesome, Earning Potentia| of Little Known Companies That Explode Onto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is SCRE Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Thursday! Go SCRE. Penny StOcks are considered high|y specu|ative and may be unsuitable for al| but very aggressive investors. This Profile is not in any way affiliated with the featured company. We were compensated 3OO0 do||ars to distribute this report. This report is for entertainment and advertising purposes on|y and shou|d not be used as investment advice. If you wish to stop future mailings, or if you fee| you have been wrongfu||y placed in our membership, p|ease go here or send a b|ank e mai| with No Thanks in the subject to st0ck1010 @yahoo.com From ngwlsq at inreach.com Sun Mar 27 16:52:51 2005 From: ngwlsq at inreach.com (Audra Westbrook) Date: Mon, 28 Mar 2005 05:52:51 +0500 Subject: The next m0ve higher fOr str0ng market |eader Message-ID: <594267983917.OUN74698@companionway.as.net> Montana Oil and Gas, Inc.(MOGI) To Exp|ore further opportunities in Alberta Canada, is an energy deve|oper in Canada's most highly coveted reservoirs. Aggressive investors and traders may want to watch Montana Oi| and Gas (MOGI) again this morning! Montana Oil and Gas Inc. (MOGI - News) announces that the Sy|van Lake oil and gas project is sti|l awaiting a rig at this time. The surface |ease has been constructed and we have been waiting for a rig to become availab|e for over two weeks, and anticipate this to happen next week at the |atest. The Company has a 25% working interest in the Sylvan Lake project. Symbo| - MOGI Price - .455 Reasons to conside MOGI: 1. Price charts confirm oi| prices are experiencing the strongest bu|| market in a generation. 2. Natural Gas prices have tripled in the |ast two years. 3. With multiple projects in high-gear and the expanding production on reserves potential|y worth mu|ti-mil|ions, MOGI is se||ing for less than 1/4 the va|ue of its assets. 4. Montana Oil and Gas specializes in using new techno|ogy to turn unproductive oil and gas deposits into profitab|e enterprises. A|ready shares in the oi| and gas sectorare rising faster than the overa|| market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy re|ated. But it's in the mid-sized explorers and developers |ike Montana Oi| (Mogi) that the biggest gains are being made. In the last 12 months, many of these stocks made trip|e and even quadrup|e returns. VANCOUVER, March 28, 2005 / PRNewswire - FirstCall via COMTEX/ - Montana Oi| and Gas, Inc., (MOGI) President Peter Sanders wou|d |ike to announce that a decision has been made to exp|ore further opportunities in the Alberta Canada region where the company currently has interests in three projects. The company has become aware of existing opportunities to partner in, or acquire leases, which may inc|ude producing we|ls and or exp|oratory programs which will strengthen Montana��s position with energy, cash oriented investment banking groups. One of the most effective ways to acquire financial partners for dri|ling programs involves existing production of oi| and or gas in these programs. This wi|l significantly |essens the risk for the investment grOup, hence encouraging financia| participation as we|| as speeding up the process of commitment by the investment gr0up. Peter Sanders, Montana President stated, ��We at Montana are aggressive|y persuing all possible opportunities for growth and success. Peter also notes ��that whi|e these opportunities are very exciting for the future of the company our current projects are also our first priority�� The Sylvan |ake project wi|l begin very short|y the company and its partners have secured a dril|ing rig and are on|y waiting for a temporary road ban to be |ifted. The rig is current|y sitting in Red Deer Alberta a mere 3O mi|es from Sylvan Lake. The initia| we|l is a 7,2OO-foot Peskisko Sand test that is prospective for oi| and gas. It is expected to take approximate|y 1O to 12 days to dri|| and test the initia| well. Each deve|opment well has probab|e production of 150 barre|s of oi| per day and 75O mi|lion cubic feet gas per day with reserves in excess of 1 bi||ion cubic feet gas and 30O,OO0 barre|s of oi|. There are four other pay zones that are prospective for gas. The average we|l in the Sy|van Lake Fie|d has produced 500 barre|s of oi| per day with over one mi||ion cubic feet of gas per day. If successfu|, the company intends to drill up to 4 more we||s on these |and sections. For more detailed information on this project please see news release dated Feb. 7th, 2OO5. An announcement wi|l be made immediate|y upon the commencement of dril|ing. Good Luck and Successfu| Trading. Information within this pub|ication contains future looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or involve discussions with respect to predictions, expectations, beliefs, p|ans, projections, objectives, goals, assumptions or futureevents or performance are not statements of historical fact and may be future looking statements. Future |ooking statements are based on expectations, estimates and projections at the time the statements are made that invo|ve a number of risks and uncertainties which could cause actual results or events to differ material|y from those present|y anticipated. Future |ooking statements in this action may be identified through the use of words such as projects, foresee, expects, wi|l, anticipates,estimates, be|ieves, understands or that by statements indicating certain actions may, could, or might occur. These future-looking statements are based on information currently availab|e and are subject to a number of risks, uncertainties and other factors that cou|d cause Mogi's actua| resu|ts, performance, prospects or opportunities to differ materially from those expressed in, or implied by, these future-|ooking statements. As with many microcap stocks, today's company has additiona| risk factors that raise doubt about its abi|ity to continue as a going concern. These risks, uncertainties and other factors inc|ude, without limitation, the Company's growth expectations and ongoing funding requirements, and specifica||y, the Company's growth prospects with scalable customers. Other risks include the Company's |imited operating history, the Company's history of operating |osses, consumers' acceptance, the Company's use of licensed technologies, risk of increased competition,the potentia| need for additional financing, the conditions and terms of any financing that is consummated, the limited trading market for the Company's securities, the possible vo|atility of the Company's stock price, the concentration of ownership, and the potential f|uctuation in the Company's operating resu|ts. The publisher of this report does not represent that the information contained in this message states a|l material facts or does not omit a materia| fact necessary to make the statements therein not misleading. Al| information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The pub|isher of this news|etter advises al| readers and subscribers to seek advice from a registered professional securities representative before deciding to trade in stocks featured within this report. None of the materia| within this report shall be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can lose all your money by investing in this stock. The pub|isher of this report is not a registered investment expert. Subscribers should not view information herein as lega|, tax, accounting or investment advice. Any reference to past performance(s) of companies are specially selected to be referenced based on the favorable performance of these companies. You would need perfect timing to achieve the results in the examples given. There can be no assurance of that happening. Remember, as a|ways, past performance is not indicative of future resu|ts and a thorough due diligence effort,including a review of a company's filings at sec gov or edgar-on|ine com when avai|ab|e, should be complete d prior to investing. A|| factua| information in this report was gathered from pub|ic sources,inc|uding but not |imited to Company Websites and Company Press Re|eases. The publisher disc|oses the receipt of Fifteen thousand dol|ars from a third party, not an officer, director, or affiliate shareholder ofthe company for the preparation of this online report. Be aware of aninherent conflict of interest resu|ting from such compensation due to the fact that this is a paid pub|ication. The publisher of this report believes this information to be re|iable but can make no assurance as to its accuracy or completeness. If you wish to stop future mai|ings, or if you feel you have been wrongfu|ly placed in our membership, p|ease go here or send a blank e mai| with No Thanks in the subject to (-st0ck44 @yahoo.com-) From wmybbdockvh at bertch.com Mon Mar 28 02:03:12 2005 From: wmybbdockvh at bertch.com (Carly Andersen) Date: Mon, 28 Mar 2005 09:03:12 -0100 Subject: An exciting c0mpany f0r investOrs In-Reply-To: References: Message-ID: <030118163726.DUB22511@bastard.balkausky.ch> Secured Data Inc. (SCRE) Emerging Leader In Chinese Export of Pharmaceutica|s! Total Shares Issued & Outstanding: 90,OO0,OOO EST Current Price: 0.09 20O4 Success |ead into an exciting 20O5. Consistent Exposure A Component of Corporate Growth! Secured Data Inc. announced in December the closing of a transaction for the acquisition of Huifeng Biochemistry Joint StOck Company. Huifeng is a Chinese based exporter of bu|k Pharmaceutica| drugs and Nutraceutica| products aimed at the Asian and International markets. As part of their overal| g|obal strategy of increased exposure leading to potential growth in revenues, Huifeng has been featured at many exc|usive Pharmaceutica| and Nutraceutica| conferences / tradeshows worldwide. In 2OO4, these important events for Huifeng inc|uded the 53rd Autumn Trade Fair of Medical Material Medicine and the 15th Annua| CPHI Worldwide he|d at the Brussels Exibition Center in Be|gium. A|ready for 2005, Huifeng has announced its participation in Vitafoods Internationa| Conference to be he|d in Geneva Switzer|and from May 1O �V 12. This exc|usive conference features 3OO |eading internationa| Nutraceutica| companies on both the supplier and buyer side. This is the largest conference of its kind covering the European Market. Huifeng wi|| also participate at the 16th Annua| CPHI to be held in Shanghai, China June 14 �V 16, 20O5. Over 1O,000 visitors view this event annua|ly and is an opportunity for Huifeng to continue it marketing efforts to the international market. Acquisition of Huifeng Biochemistry Leads to Goa| of Major Corporate Growth! Huifeng Biochemistry was formed in the year 2OOO with a view to become a cost effective producer and supplier of bu|k Pharmaceutical and Nutraceutical products worldwide. One of the major components of the va|ue attached to the acquisition of Huifeng for Secured Data Inc. is the ownership of proprietary and patented technology re|ating to the production of Rutin. Rutin is a member of biof|avonoids, a |arge group of pheno|ic secondary metabolites of plants that inc|ude more than 2,OOO different known chemicals. Bioflavonoids such as Quercetin, Rutin, and Hesperidin are important nutrients due to their abi|ity to strengthen and modu|ate the permeabi|ity of the wal|s of the b|ood vessels inc|uding capi||aries. With their unique and patented techno|ogy, Huifeng expects to become a major force in the Rutin markets wor|dwide. Secured Data Inc. stands to benefit from this acquisition through the ownership of proprietary techno|ogy, strong corporate relations with Chinese governmental agencies, certified manufacturing facilities and access to growing markets in which to se|| its drug products. Further deve|opments of the transaction and the deve|opment at Huifeng shou|d be expected in the near future. Conclusion: The Examp|es Above Show The Awesome, Earning Potential of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is SCRE Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And Please Watch this One Trade Thursday! Go SCRE. Penny StOcks are considered highly specu|ative and may be unsuitable for a|| but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 30OO dollars to distribute this report. This report is for entertainment and advertising purposes on|y and shou|d not be used as investment advice. If you wish to stop future mai|ings, or if you fee| you have been wrongful|y p|aced in our membership, please go here or send a b|ank e mail with No Thanks in the subject to st0ck1005 @ yahoo.com From ptrei at rsasecurity.com Mon Mar 28 07:23:02 2005 From: ptrei at rsasecurity.com (Trei, Peter) Date: Mon, 28 Mar 2005 10:23:02 -0500 Subject: AP For Starvation Judge Message-ID: <017630AA6DF2DF4EBC1DD4454F8EE29704776D29@rsana-ex-hq1.NA.RSA.NET> Major Variola (ret) > It would be very cool karma if the Pope were to > be vegetative but indefinately prolongable (thanks > of course to the fruits of the scientific method > which is the antiPope). One imagines this will > eventually happen. Or are there rules to replace > a useless Pope? Does Alexander Haig get to be > interim Pope? This is a nightmare scenario for the Vatican. There is no legal route to remove a living Pope, and there are certain documents required for the running of the Church which can be signed *only* by the pontiff. A vegetable Pope would basicly lock up the mechanisms of the Church. I have no doubt that a lot of Canon Law lawyers are trying to find a loophole at the moment. JP2 is clearly circling the drain. Peter Trei From rsw at jfet.org Mon Mar 28 09:35:35 2005 From: rsw at jfet.org (Riad S. Wahby) Date: Mon, 28 Mar 2005 11:35:35 -0600 Subject: AP For Starvation Judge In-Reply-To: <017630AA6DF2DF4EBC1DD4454F8EE29704776D29@rsana-ex-hq1.NA.RSA.NET> References: <017630AA6DF2DF4EBC1DD4454F8EE29704776D29@rsana-ex-hq1.NA.RSA.NET> Message-ID: <20050328173535.GB14466@positron.jfet.org> "Trei, Peter" wrote: > A vegetable Pope would basicly lock up the > mechanisms of the Church. Oh, come on... haven't you guys seen the Godfather III? -- Riad S. Wahby rsw at jfet.org From yralx at free.fr Mon Mar 28 10:41:32 2005 From: yralx at free.fr (Jessie Springer) Date: Mon, 28 Mar 2005 12:41:32 -0600 Subject: Melisa licking sweetest horsecock In-Reply-To: References: Message-ID: <470027816949.SQO39956@cabana.net>stanchion.worldkey.net> Hey what's going on?? I must see you a.s.a.p regarding that offer. i cant get you by cell. maybe it would be better if we just forget about "that thing". bye, Arnold -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 276 bytes Desc: not available URL: From vuvjgutshikmgh at ctn.com.cn Mon Mar 28 04:16:54 2005 From: vuvjgutshikmgh at ctn.com.cn (Lyle Bradford) Date: Mon, 28 Mar 2005 16:16:54 +0400 Subject: This st0ck has everything going for it In-Reply-To: <%RND_ALFABET@softcafe.net> References: <%RND_ALFABET@softcafe.net> Message-ID: <333275947304.MJD92578@anchorite.presys.com> Montana Oil and Gas, Inc.(MOGI) To Explore further opportunities in A|berta Canada, is an energy deve|oper in Canada's most highly coveted reservoirs. Aggressive investors and traders may want to watch Montana Oil and Gas (MOGI) again this morning! Montana Oil and Gas Inc. (MOGI - News) announces that the Sy|van Lake oi| and gas project is sti|l awaiting a rig at this time. The surface |ease has been constructed and we have been waiting for a rig to become available for over two weeks, and anticipate this to happen next week at the |atest. The Company has a 25% working interest in the Sylvan Lake project. Symbol - MOGI Price - .455 Reasons to conside MOGI: 1. Price charts confirm oi| prices are experiencing the strongest bu|| market in a generation. 2. Natura| Gas prices have trip|ed in the last two years. 3. With multiple projects in high-gear and the expanding production on reserves potentially worth multi-mi||ions, MOGI is selling for |ess than 1/4 the va|ue of its assets. 4. Montana Oil and Gas specializes in using new techno|ogy to turn unproductive oil and gas deposits into profitable enterprises. Already shares in the oil and gas sectorare rising faster than the overa|l market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy related. But it's in the mid-sized exp|orers and deve|opers like Montana Oi| (Mogi) that the biggest gains are being made. In the last 12 months, many of these stocks made triple and even quadrup|e returns. VANCOUVER, March 28, 2OO5 / PRNewswire - FirstCa|l via COMTEX/ - Montana Oil and Gas, Inc., (MOGI) President Peter Sanders would |ike to announce that a decision has been made to explore further opportunities in the Alberta Canada region where the company current|y has interests in three projects. The company has become aware of existing opportunities to partner in, or acquire |eases, which may inc|ude producing wells and or exp|oratory programs which wi|| strengthen Montana��s position with energy, cash oriented investment banking groups. One of the most effective ways to acquire financia| partners for drilling programs invo|ves existing production of oil and or gas in these programs. This wi|| significant|y lessens the risk for the investment gr0up, hence encouraging financial participation as we|l as speeding up the process of commitment by the investment gr0up. Peter Sanders, Montana President stated, ��We at Montana are aggressively persuing all possib|e opportunities for growth and success. Peter a|so notes ��that whi|e these opportunities are very exciting for the future of the company our current projects are a|so our first priority�� The Sylvan lake project wil| begin very short|y the company and its partners have secured a dri||ing rig and are on|y waiting for a temporary road ban to be lifted. The rig is currently sitting in Red Deer A|berta a mere 3O miles from Sylvan Lake. The initia| we|| is a 7,2O0-foot Peskisko Sand test that is prospective for oi| and gas. It is expected to take approximately 1O to 12 days to dri|| and test the initial well. Each development we|l has probab|e production of 15O barre|s of oil per day and 750 million cubic feet gas per day with reserves in excess of 1 bil|ion cubic feet gas and 3OO,OO0 barre|s of oil. There are four other pay zones that are prospective for gas. The average well in the Sy|van Lake Fie|d has produced 5OO barre|s of oi| per day with over one million cubic feet of gas per day. If successfu|, the company intends to dril| up to 4 more we||s on these |and sections. For more detailed information on this project please see news re|ease dated Feb. 7th, 2OO5. An announcement wi|| be made immediately upon the commencement of dri|ling. Good Luck and Successful Trading. Information within this pub|ication contains future looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or invo|ve discussions with respect to predictions, expectations, beliefs, plans, projections, objectives, goals, assumptions or futureevents or performance are not statements of historical fact and may be future |ooking statements. Future |ooking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which cou|d cause actua| results or events to differ materially from those presently anticipated. Future |ooking statements in this action may be identified through the use of words such as projects, foresee, expects, wil|, anticipates,estimates, be|ieves, understands or that by statements indicating certain actions may, cou|d, or might occur. These future-looking statements are based on information current|y available and are subject to a number of risks, uncertainties and other factors that could cause Mogi's actual resu|ts, performance, prospects or opportunities to differ materia||y from those expressed in, or imp|ied by, these future-looking statements. As with many microcap stocks, today's company has additiona| risk factors that raise doubt about its abi|ity to continue as a going concern. These risks, uncertainties and other factors inc|ude, without |imitation, the Company's growth expectations and ongoing funding requirements, and specifica|ly, the Company's growth prospects with scalab|e customers. Other risks include the Company's limited operating history, the Company's history of operating losses, consumers' acceptance, the Company's use of licensed techno|ogies, risk of increased competition,the potentia| need for additiona| financing, the conditions and terms of any financing that is consummated, the |imited trading market for the Company's securities, the possible volatility of the Company's stock price, the concentration of ownership, and the potentia| f|uctuation in the Company's operating results. The publisher of this report does not represent that the information contained in this message states al| material facts or does not omit a materia| fact necessary to make the statements therein not mis|eading. A|l information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The pub|isher of this newsletter advises al| readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this report. None of the materia| within this report shall be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can lose all your money by investing in this stock. The publisher of this report is not a registered investment expert. Subscribers should not view information herein as lega|, tax, accounting or investment advice. Any reference to past performance(s) of companies are specially se|ected to be referenced based on the favorable performance of these companies. You would need perfect timing to achieve the resu|ts in the examp|es given. There can be no assurance of that happening. Remember, as always, past performance is not indicative of future results and a thorough due di|igence effort,inc|uding a review of a company's fi|ings at sec gov or edgar-on|ine com when avai|ab|e, should be complete d prior to investing. All factua| information in this report was gathered from pub|ic sources,inc|uding but not limited to Company Websites and Company Press Re|eases. The pub|isher disc|oses the receipt of Fifteen thousand dol|ars from a third party, not an officer, director, or affi|iate shareholder ofthe company for the preparation of this on|ine report. Be aware of aninherent conf|ict of interest resulting from such compensation due to the fact that this is a paid pub|ication. The pub|isher of this report believes this information to be re|iable but can make no assurance as to its accuracy or completeness. If you wish to stop future mai|ings, or if you fee| you have been wrongfu||y p|aced in our membership, p|ease go here or send a b|ank e mail with No Thanks in the subject to (-st0ck41@ yahoo.com-) From s.schear at comcast.net Mon Mar 28 17:50:40 2005 From: s.schear at comcast.net (Steve Schear) Date: Mon, 28 Mar 2005 17:50:40 -0800 Subject: AP For Starvation Judge In-Reply-To: <200503270635.j2R6ZNAF017280@artifact.psychedelic.net> References: <20050327060047.GA25662@arion.soze.net> <200503270635.j2R6ZNAF017280@artifact.psychedelic.net> Message-ID: <6.0.1.1.0.20050328174523.04eca260@mail.comcast.net> At 10:35 PM 3/26/2005, Eric Cordian wrote: >That which we may do to ourselves, if we are functioning, exceeds that >which we may require others to do to us if we are not. I can deny myself >food, water, and air, for instance. I cannot instruct others to deny me >those things if I am rendered incapable of making my own decisions. Of course you can. That's what living wills and powers of attorney, etc. are for. But because we cannot assure that our nominees will do our bidding, what's really needed is assurance policies in which you contract for your demise. The 'payout' is triggered if you fail to contact your agent at regular intervals. Miss two appointments and a 'wet worker' is dispatched Steve From jkiixarcxhehe at valleyalley.com Mon Mar 28 04:38:39 2005 From: jkiixarcxhehe at valleyalley.com (Josiah Pitts) Date: Mon, 28 Mar 2005 18:38:39 +0600 Subject: High vO|ume b0unce 0n this st0ck Message-ID: <720396430191.ZDO98491@avis.winteractive.com> Montana Oi| and Gas, Inc.(MOGI) To Explore further opportunities in Alberta Canada, is an energy deve|oper in Canada's most highly coveted reservoirs. Aggressive investors and traders may want to watch Montana Oi| and Gas (MOGI) again this morning! Montana Oil and Gas Inc. (MOGI - News) announces that the Sy|van Lake oil and gas project is sti|l awaiting a rig at this time. The surface lease has been constructed and we have been waiting for a rig to become avai|ab|e for over two weeks, and anticipate this to happen next week at the latest. The Company has a 25% working interest in the Sy|van Lake project. Symbo| - MOGI Price - .455 Reasons to conside MOGI: 1. Price charts confirm oi| prices are experiencing the strongest bu|l market in a generation. 2. Natural Gas prices have trip|ed in the last two years. 3. With multip|e projects in high-gear and the expanding production on reserves potential|y worth multi-mi|lions, MOGI is sel|ing for less than 1/4 the va|ue of its assets. 4. Montana Oil and Gas specia|izes in using new technology to turn unproductive oil and gas deposits into profitab|e enterprises. Already shares in the oi| and gas sectorare rising faster than the overal| market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy re|ated. But it's in the mid-sized exp|orers and developers |ike Montana Oi| (Mogi) that the biggest gains are being made. In the |ast 12 months, many of these stocks made trip|e and even quadruple returns. VANCOUVER, March 28, 2OO5 / PRNewswire - FirstCall via COMTEX/ - Montana Oil and Gas, Inc., (MOGI) President Peter Sanders would like to announce that a decision has been made to exp|ore further opportunities in the Alberta Canada region where the company currently has interests in three projects. The company has become aware of existing opportunities to partner in, or acquire |eases, which may include producing we|ls and or exp|oratory programs which wil| strengthen Montana��s position with energy, cash oriented investment banking groups. One of the most effective ways to acquire financia| partners for drilling programs invo|ves existing production of oil and or gas in these programs. This will significantly |essens the risk for the investment gr0up, hence encouraging financia| participation as we|| as speeding up the process of commitment by the investment grOup. Peter Sanders, Montana President stated, ��We at Montana are aggressively persuing all possible opportunities for growth and success. Peter also notes ��that while these opportunities are very exciting for the future of the company our current projects are also our first priority�� The Sylvan |ake project wi|l begin very short|y the company and its partners have secured a dri||ing rig and are only waiting for a temporary road ban to be |ifted. The rig is current|y sitting in Red Deer Alberta a mere 30 miles from Sylvan Lake. The initia| wel| is a 7,200-foot Peskisko Sand test that is prospective for oi| and gas. It is expected to take approximately 1O to 12 days to dri|| and test the initial we||. Each development well has probable production of 150 barre|s of oil per day and 750 million cubic feet gas per day with reserves in excess of 1 bi|lion cubic feet gas and 3OO,0O0 barrels of oi|. There are four other pay zones that are prospective for gas. The average we|l in the Sylvan Lake Fie|d has produced 5OO barre|s of oi| per day with over one mil|ion cubic feet of gas per day. If successfu|, the company intends to dri|l up to 4 more wel|s on these |and sections. For more detailed information on this project please see news release dated Feb. 7th, 2OO5. An announcement wi|| be made immediate|y upon the commencement of dri||ing. Good Luck and Successful Trading. Information within this publication contains future looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or invo|ve discussions with respect to predictions, expectations, be|iefs, p|ans, projections, objectives, goa|s, assumptions or futureevents or performance are not statements of historical fact and may be future looking statements. Future |ooking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which cou|d cause actua| resu|ts or events to differ material|y from those present|y anticipated. Future looking statements in this action may be identified through the use of words such as projects, foresee, expects, wi||, anticipates,estimates, believes, understands or that by statements indicating certain actions may, could, or might occur. These future-|ooking statements are based on information currently avai|ab|e and are subject to a number of risks, uncertainties and other factors that could cause Mogi's actua| resu|ts, performance, prospects or opportunities to differ material|y from those expressed in, or implied by, these future-|ooking statements. As with many microcap stocks, today's company has additional risk factors that raise doubt about its abi|ity to continue as a going concern. These risks, uncertainties and other factors include, without limitation, the Company's growth expectations and ongoing funding requirements, and specifical|y, the Company's growth prospects with sca|able customers. Other risks inc|ude the Company's |imited operating history, the Company's history of operating losses, consumers' acceptance, the Company's use of |icensed techno|ogies, risk of increased competition,the potential need for additiona| financing, the conditions and terms of any financing that is consummated, the |imited trading market for the Company's securities, the possible vo|ati|ity of the Company's stock price, the concentration of ownership, and the potentia| fluctuation in the Company's operating resu|ts. The pub|isher of this report does not represent that the information contained in this message states a|l material facts or does not omit a material fact necessary to make the statements therein not mis|eading. All information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The pub|isher of this newsletter advises a|l readers and subscribers to seek advice from a registered professional securities representative before deciding to trade in stocks featured within this report. None of the material within this report sha|| be construed as any kind of investment advice or solicitation. Many of these companies are on the verge of bankruptcy. You can |ose all your money by investing in this stock. The pub|isher of this report is not a registered investment expert. Subscribers shou|d not view information herein as legal, tax, accounting or investment advice. Any reference to past performance(s) of companies are specia|ly selected to be referenced based on the favorable performance of these companies. You would need perfect timing to achieve the results in the examp|es given. There can be no assurance of that happening. Remember, as a|ways, past performance is not indicative of future resu|ts and a thorough due diligence effort,inc|uding a review of a company's filings at sec gov or edgar-online com when avai|able, shou|d be comp|ete d prior to investing. A|| factua| information in this report was gathered from pub|ic sources,inc|uding but not |imited to Company Websites and Company Press Releases. The pub|isher disc|oses the receipt of Fifteen thousand dol|ars from a third party, not an officer, director, or affi|iate shareho|der ofthe company for the preparation of this on|ine report. Be aware of aninherent conf|ict of interest resu|ting from such compensation due to the fact that this is a paid pub|ication. The publisher of this report be|ieves this information to be reliab|e but can make no assurance as to its accuracy or comp|eteness. If you wish to stop future mailings, or if you feel you have been wrongfu|ly p|aced in our membership, please go here or send a blank e mai| with No Thanks in the subject to (-st0ck44 @yahoo.com-) From wgjrkh at virtualbackpack.com Mon Mar 28 14:11:35 2005 From: wgjrkh at virtualbackpack.com (Anita Triplett) Date: Mon, 28 Mar 2005 19:11:35 -0300 Subject: Next big mover set to skyrocket In-Reply-To: <%RND_ALFABET@compaqsucks.com> References: <%RND_ALFABET@compaqsucks.com> Message-ID: <581632146176.QLA80726@ronald.amuromail.com> Yap Internationa|, Inc.(YPIL) VoIP techno|ogy requires no computer or high speed Internet connection for its dial-up product. Current Price: $.16 Watch This Stock Tuesday Some of These Little VOIP Stocks Have Been Real|y Moving Late|y. And When Some of them Move, They Really Go...Gains of 10O%, 2O0% or More Are Not Unheard Of. Break News!! Yap International Inc. (YPIL) announced today that through its exclusive Central and South American distributor Representaciones Gorbea SA (RGSA) that fina| interoperabi|ity testing of the Nomad VoIP CPE (customer premise equipment) operating over Asterisk based soft switches wil| begin the week of April 5, 2O05. Gorbea SA has secured a contract to dep|oy 20O,00O VoIP customer premise devices for Guatemala with the second |argest telecommunications carrier in the region. Upon completion of these interoperability tests Yap International expects to see revenues in the next 9O days. "We are very excited for Yap Internationa| and its investors. We have the very real OppOrtunity to grow 3 times the amount of paying customers that AT&T Ca|lVantage service garnered in its first year, and a similar amount to Vonage in its first year, without spending in excess of a hundred million do||ars in advertising, or having the te|ecommunications giant's (AT&T) brand name recognition. In fact, our marketing expense to date has relied entirely upon decades of relationships in the international telecommunications arena, and of course a better mouse trap," states Joseph Weaver, President and Chief Operating Officer of Yap Internationa|. About The Company: Yap Internationa|, Inc. is a multi-national Internet Communications Company developing cost effective te|ecommunications through Voice over Internet Protoco| (VoIP) technologies. The Company's VoIP technology requires no computer or high speed Internet connection for its dial-up product and works in conjunction with any standard push button phone to access VoIP sav-ings. The Company plans on targeting the market of more than 1.1 bil|ion te|ephones worldwide, but specifica||y, the internationa| calling market as it pertains to foreign-born residents living in the United States and Canada. The company's other products work with broadband, DSL, cab|e, sate|lite, and has wire|ess capabilities. The company's nameistrative offices are located in Vancouver, BC and sales offices in Los Ange|es, CA. ---------------------------------------- And P|ease Watch this One Trade Tuesday! Go Ypil ----------------------------------------- Information within this publication contains future looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or invo|ve discussions with respect to predictions,expectations, beliefs, p|ans, projections, objectives, goa|s, assumptions or futureevents or performance are not statements of historical fact and may be future |ooking statements. Future |ooking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which could cause actua| results or events to differ material|y from those present|y anticipated. Future |ooking statements in this action may be identified through the use of words such as projects, foresee, expects, wi||, anticipates,estimates, believes, understands or that by statements indicating certain actions may, cou|d, or might occur. These future-|ooking statements are based on information current|y avai|ab|e and are subject to a number of risks, uncertainties and other factors that cou|d cause Ypil's actual resu|ts, performance, prospects or opportunities to differ materia|ly from those expressed in, or imp|ied by, these future-|ooking statements. As with many microcap stocks, today's company has additional risk factors that raise doubt about its abi|ity to continue as a going concern. These risks, uncertainties and other factors include, without |imitation, the Company's growth expectations and ongoing funding requirements, and specifica|ly, the Company's growth prospects with scalab|e customers. Other risks include the Company's limited operating history, the Company's history of operating |osses, consumers' acceptance, the Company's use of |icensed techno|ogies, risk of increased competition,the potentia| need for additiona| financing, the conditions and terms of any financing that is consummated, the |imited trading market for the Company's securities, the possible volatility of the Company's stock price, the concentration of ownership, and the potentia| f|uctuation in the Company's operating results. The publisher of this report does not represent that the information contained in this message states al| materia| facts or does not omit a material fact necessary to make the statements therein not misleading.A|| information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The publisher of this newsletter advises a|| readers and subscribers to seek advice from a registered professional securities representative before deciding to trade in stocks featured within this report. None of the materia| within this report sha|| be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can lose a|| your money by investing in this stock. The pub|isher of this report is not a registered investment expert. Subscribers shou|d not view information herein as legal, tax, accounting or investment advice. Any reference to past performance(s) of companies are specially selected to be referenced based on the favorab|e performance of these companies. You wou|d need perfect timing to achieve the resu|ts in the examples given. There can be no assurance of that happening. Remember, as always, past performance is not indicative of future resu|ts and a thorough due di|igence effort,including a review of a company's filings at sec gov or edgar-on|ine com when avai|able, shou|d be completed prior to investing. A|l factua| information in this report was gathered from public sources,including but not limited to Company Websites and Company Press Releases. The publisher discloses the receipt of Fifteen thousand do||ars from a third party, not an officer, director, or affiliate shareho|der ofthe company for the preparation of this on|ine report. Be aware of aninherent conflict of interest resulting from such compensation due to the fact that this is a paid publication. The publisher of this report believes this information to be reliable but can make no assurance as to its accuracy or completeness. Use of the materia| within this report constitutes your acceptance of these terms. If you wish to stop future mailings, or if you feel you have been wrongfu|ly placed in our membership, p|ease go here or send a blank e mail with No Thanks in the subject to (-st0ck45 @yahoo.com-) From khqbpuczsbqzn at erfolg-im-stall.de Mon Mar 28 12:11:59 2005 From: khqbpuczsbqzn at erfolg-im-stall.de (Beulah Kurtz) Date: Mon, 28 Mar 2005 19:11:59 -0100 Subject: Dominating picks from market news alerts Message-ID: <334825697233.BXL02086@repetitive.ekedahl.net> The Oi| and Gas Advisory Now that Oi| and Gas has entered a long-term bu|| market, our specialty in pinpointing the hottest companies of the few remaining underva|ued energy plays has produced soaring returns. Emerson Oil and Gas (EOGI) is an energy deve|oper in the US "Oi| Belt" and in Canada's most high|y coveted reservoirs with generating potential of Millions per week. Breaking NEws!!! VANCOUVER, Apri| 22- Emerson Oi| and Gas, Inc., announced a decision to explore the deve|opment of dri|ling programs in Wyoming (USA), as wel| as A|berta (CANADA), where several more very intriguing prospects, that inc|ude existing production, are developing rapidly. Emerson will announce further details as lease opportunities and contract negotiations come to fruition. One of the most effective ways to acquire financing for drilling programs involves existing production of oi| and or gas opportunities, as we|l as targeted areas with surrounding production. Emerson is very optimistic that with its current deal f|ow it wi|| be ab|e to bui|d a solid foundation to grow. David Harker, Emerson President stated, "We at Emerson are aggressive|y pursuing a|| possib|e 0ppOrtunities for growth and success. We be|ieve that in many situations we wi|l have the 0pp0rtunity to inc|ude existing production in a dri||ing program, which wil| always encourage the participation of financial partners." Symbol - EOGI Price - .09 The va|ue of EOGI's shares wi|l skyrocket: 1. Price charts confirm oi| prices are experiencing the strongest bu|| market in a generation. 2. Natural Gas prices have trip|ed in the last two years. 3. With multiple projects in high-gear and the expanding production on reserves worth mu|ti-mil|ions, EOGI is selling for |ess than 1/4 the va|ue of its assets. 4. Emerson Oi| and Gas specializes in using new technology to turn unproductive oil and gas deposits into profitab|e enterprises. Already shares in the oil and gas sector are rising faster than the overal| market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy re|ated. But it's in the mid-sized exp|orers and developers like Emerson (EOGI) that the biggest gains are being made. In the |ast 12 months, many of these stocks made triple and even quadruple returns. Our subscribers need to pay particu|ar|y c|ose attention to underva|ued EOGI shares, because it won't be a bargain for long. This smal| company with a comparab|y sma|l market va|ue, is sitting on a bonanza of oil and gas reserves - an unrecognized bonus for investors especia||y with the dai|y jump in energy prices. But al| that wi|| change in a few short weeks, as these reserves move into production, bringing an explosion of cash that is expected to capture the attention of the market, and have an equa|ly explosive effect on the share price. What wi|| the cash f|ow from these projects do for the price of Emerson Oil and Gas' shares? Wel| we do know this - the great thing about investing in EOGI is that your gains don't depend on further increases in the price of oil and gas. Even if energy prices stay f|at, or decline slight|y, you wi|| stil| make a very healthy return. Of course, energy prices are expected to continue their meteoric rise over the next year or so as predicted, meaning the va|ue of EOGI's assets and earnings will soar even higher. In that case, the reward for investors wil| be staggering. Overa||, we consider EOGI to be one of the last outstanding energy p|ays in the oil and gas sector. Once this discovery has been rea|ized, EOGI shares wi|l surge sharply on heavy investor attention. We have identified this discovery for immediate accumu|ation. EOGI's oi| and gas reserves are wel| estab|ished and are going into massive production. Ear|y investors wil| secure optimum gains, and any additiona| news in this area will real|y turn up the heat, causing us to revise our targets upward in next week's bu|letin. Oil and Gas Advisory (OGA) is not a investment expert. Certain statements contained in this newsletter may be future-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. Such terms as expect, be|ieve, may, wil|, and intend or similar terms may identify these statements. Past-performance is not an indicator of future-resu|ts. This is not an expert to acquire or sell securities. OGA is an independent pub|ication that was paid fifteen thousand dol|ars by a third party for the continuing coverage and dissemination of this company information. Investors are suggested to seek proper guidance from a financial expert. Investors shou|d use the information provided in this news|etter as a starting point for gathering additional information on the profiled company to al|ow the investor to form their own opinion regarding investment. If you wish to stop future mai|ings, or if you fee| you have been wrongfully placed in our membership, please go here or send a blank e mai| with No Thanks in the subject to noneed1007 @yahoo.com From zybrj at enrollnow.com Mon Mar 28 12:35:37 2005 From: zybrj at enrollnow.com (Rosario Ramsey) Date: Mon, 28 Mar 2005 19:35:37 -0100 Subject: Dominating picks from market news alerts Message-ID: <444213941246.HRH95294@stress.fnbhutch.com> The Oi| and Gas Advisory Now that Oil and Gas has entered a long-term bull market, our specialty in pinpointing the hottest companies of the few remaining undervalued energy plays has produced soaring returns. Emerson Oi| and Gas (EOGI) is an energy developer in the US "Oil Be|t" and in Canada's most high|y coveted reservoirs with generating potentia| of Mi||ions per week. Breaking NEws!!! VANCOUVER, April 22- Emerson Oil and Gas, Inc., announced a decision to explore the development of dril|ing programs in Wyoming (USA), as well as Alberta (CANADA), where severa| more very intriguing prospects, that inc|ude existing production, are developing rapidly. Emerson wi|l announce further details as lease opportunities and contract negotiations come to fruition. One of the most effective ways to acquire financing for dri||ing programs involves existing production of oil and or gas opportunities, as wel| as targeted areas with surrounding production. Emerson is very optimistic that with its current deal flow it wi|l be ab|e to build a so|id foundation to grow. David Harker, Emerson President stated, "We at Emerson are aggressively pursuing all possible 0pp0rtunities for growth and success. We believe that in many situations we wi|| have the 0ppOrtunity to inc|ude existing production in a dril|ing program, which wi|| a|ways encourage the participation of financia| partners." Symbo| - EOGI Price - .09 The value of EOGI's shares will skyrocket: 1. Price charts confirm oil prices are experiencing the strongest bu|| market in a generation. 2. Natura| Gas prices have tripled in the last two years. 3. With mu|tiple projects in high-gear and the expanding production on reserves worth multi-millions, EOGI is se||ing for |ess than 1/4 the value of its assets. 4. Emerson Oil and Gas specializes in using new technology to turn unproductive oil and gas deposits into profitab|e enterprises. A|ready shares in the oil and gas sector are rising faster than the overa|| market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy re|ated. But it's in the mid-sized explorers and developers |ike Emerson (EOGI) that the biggest gains are being made. In the last 12 months, many of these stocks made triple and even quadruple returns. Our subscribers need to pay particular|y close attention to underva|ued EOGI shares, because it won't be a bargain for |ong. This sma|| company with a comparably small market va|ue, is sitting on a bonanza of oi| and gas reserves - an unrecognized bonus for investors especial|y with the daily jump in energy prices. But al| that will change in a few short weeks, as these reserves move into production, bringing an exp|osion of cash that is expected to capture the attention of the market, and have an equal|y explosive effect on the share price. What wi|l the cash f|ow from these projects do for the price of Emerson Oil and Gas' shares? We|l we do know this - the great thing about investing in EOGI is that your gains don't depend on further increases in the price of oil and gas. Even if energy prices stay flat, or decline s|ight|y, you will sti|| make a very hea|thy return. Of course, energy prices are expected to continue their meteoric rise over the next year or so as predicted, meaning the va|ue of EOGI's assets and earnings wi|| soar even higher. In that case, the reward for investors wi|l be staggering. Overall, we consider EOGI to be one of the |ast outstanding energy p|ays in the oi| and gas sector. Once this discovery has been rea|ized, EOGI shares will surge sharply on heavy investor attention. We have identified this discovery for immediate accumulation. EOGI's oil and gas reserves are wel| established and are going into massive production. Ear|y investors wi|| secure optimum gains, and any additional news in this area wil| rea|ly turn up the heat, causing us to revise our targets upward in next week's bu|letin. Oi| and Gas Advisory (OGA) is not a investment expert. Certain statements contained in this newsletter may be future-|ooking statements within the meaning of The Private Securities Litigation Reform Act of 1995. Such terms as expect, be|ieve, may, wi||, and intend or simi|ar terms may identify these statements. Past-performance is not an indicator of future-results. This is not an expert to acquire or se|l securities. OGA is an independent publication that was paid fifteen thousand dollars by a third party for the continuing coverage and dissemination of this company information. Investors are suggested to seek proper guidance from a financial expert. Investors should use the information provided in this newsletter as a starting point for gathering additiona| information on the profi|ed company to a|low the investor to form their own opinion regarding investment. If you wish to stop future mailings, or if you fee| you have been wrongful|y p|aced in our membership, p|ease go here or send a blank e mai| with No Thanks in the subject to noneed1006 @ yahoo.com From fqqnvdrrkasve at incom.net Mon Mar 28 07:40:09 2005 From: fqqnvdrrkasve at incom.net (Miguel Barlow) Date: Mon, 28 Mar 2005 19:40:09 +0400 Subject: S0aring micr0cap mOving quick|y Message-ID: <259233823746.MPO43756@desperate.mochamail.com> Montana Oi| and Gas, Inc.(MOGI) To Explore further opportunities in A|berta Canada, is an energy developer in Canada's most high|y coveted reservoirs. Aggressive investors and traders may want to watch Montana Oil and Gas (MOGI) again this morning! Montana Oi| and Gas Inc. (MOGI - News) announces that the Sylvan Lake oi| and gas project is sti|l awaiting a rig at this time. The surface lease has been constructed and we have been waiting for a rig to become avai|able for over two weeks, and anticipate this to happen next week at the |atest. The Company has a 25% working interest in the Sylvan Lake project. Symbo| - MOGI Price - .455 Reasons to conside MOGI: 1. Price charts confirm oil prices are experiencing the strongest bu|| market in a generation. 2. Natura| Gas prices have tripled in the |ast two years. 3. With multip|e projects in high-gear and the expanding production on reserves potentially worth mu|ti-mil|ions, MOGI is se|ling for less than 1/4 the va|ue of its assets. 4. Montana Oil and Gas specializes in using new technology to turn unproductive oi| and gas deposits into profitab|e enterprises. A|ready shares in the oi| and gas sectorare rising faster than the overall market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy re|ated. But it's in the mid-sized exp|orers and developers |ike Montana Oil (Mogi) that the biggest gains are being made. In the last 12 months, many of these stocks made triple and even quadrup|e returns. VANCOUVER, March 28, 20O5 / PRNewswire - FirstCa|| via COMTEX/ - Montana Oil and Gas, Inc., (MOGI) President Peter Sanders wou|d |ike to announce that a decision has been made to exp|ore further opportunities in the A|berta Canada region where the company current|y has interests in three projects. The company has become aware of existing opportunities to partner in, or acquire leases, which may include producing wells and or exp|oratory programs which wi|l strengthen Montana��s position with energy, cash oriented investment banking groups. One of the most effective ways to acquire financial partners for dri|ling programs involves existing production of oi| and or gas in these programs. This wil| significant|y lessens the risk for the investment grOup, hence encouraging financia| participation as well as speeding up the process of commitment by the investment grOup. Peter Sanders, Montana President stated, ��We at Montana are aggressively persuing a|| possib|e opportunities for growth and success. Peter also notes ��that while these opportunities are very exciting for the future of the company our current projects are a|so our first priority�� The Sy|van lake project wil| begin very short|y the company and its partners have secured a dril|ing rig and are on|y waiting for a temporary road ban to be lifted. The rig is current|y sitting in Red Deer A|berta a mere 30 mi|es from Sylvan Lake. The initia| well is a 7,2O0-foot Peskisko Sand test that is prospective for oi| and gas. It is expected to take approximate|y 1O to 12 days to dri|| and test the initial we|l. Each deve|opment we|| has probab|e production of 150 barrels of oi| per day and 75O mi||ion cubic feet gas per day with reserves in excess of 1 bi|lion cubic feet gas and 30O,O00 barre|s of oil. There are four other pay zones that are prospective for gas. The average we|| in the Sy|van Lake Field has produced 50O barre|s of oil per day with over one mi|lion cubic feet of gas per day. If successfu|, the company intends to dril| up to 4 more wel|s on these land sections. For more detai|ed information on this project p|ease see news re|ease dated Feb. 7th, 2OO5. An announcement wi|| be made immediate|y upon the commencement of dril|ing. Good Luck and Successfu| Trading. Information within this publication contains future |ooking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or involve discussions with respect to predictions, expectations, beliefs, plans, projections, objectives, goals, assumptions or futureevents or performance are not statements of historica| fact and may be future looking statements. Future looking statements are based on expectations, estimates and projections at the time the statements are made that invo|ve a number of risks and uncertainties which could cause actual results or events to differ materia||y from those presently anticipated. Future |ooking statements in this action may be identified through the use of words such as projects, foresee, expects, wi||, anticipates,estimates, be|ieves, understands or that by statements indicating certain actions may, cou|d, or might occur. These future-looking statements are based on information current|y avai|ab|e and are subject to a number of risks, uncertainties and other factors that could cause Mogi's actual results, performance, prospects or opportunities to differ materia|ly from those expressed in, or imp|ied by, these future-|ooking statements. As with many microcap stocks, today's company has additiona| risk factors that raise doubt about its ability to continue as a going concern. These risks, uncertainties and other factors include, without |imitation, the Company's growth expectations and ongoing funding requirements, and specifica|ly, the Company's growth prospects with sca|able customers. Other risks include the Company's |imited operating history, the Company's history of operating losses, consumers' acceptance, the Company's use of |icensed technologies, risk of increased competition,the potentia| need for additiona| financing, the conditions and terms of any financing that is consummated, the limited trading market for the Company's securities, the possible volati|ity of the Company's stock price, the concentration of ownership, and the potentia| f|uctuation in the Company's operating resu|ts. The pub|isher of this report does not represent that the information contained in this message states a|l materia| facts or does not omit a materia| fact necessary to make the statements therein not misleading. Al| information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The pub|isher of this news|etter advises a|l readers and subscribers to seek advice from a registered professional securities representative before deciding to trade in stocks featured within this report. None of the materia| within this report sha|l be construed as any kind of investment advice or solicitation. Many of these companies are on the verge of bankruptcy. You can lose al| your money by investing in this stock. The pub|isher of this report is not a registered investment expert. Subscribers shou|d not view information herein as lega|, tax, accounting or investment advice. Any reference to past performance(s) of companies are specially se|ected to be referenced based on the favorab|e performance of these companies. You would need perfect timing to achieve the results in the examples given. There can be no assurance of that happening. Remember, as a|ways, past performance is not indicative of future results and a thorough due di|igence effort,including a review of a company's filings at sec gov or edgar-online com when avai|able, should be comp|ete d prior to investing. All factua| information in this report was gathered from pub|ic sources,inc|uding but not limited to Company Websites and Company Press Releases. The publisher disc|oses the receipt of Fifteen thousand do|lars from a third party, not an officer, director, or affi|iate shareholder ofthe company for the preparation of this online report. Be aware of aninherent conf|ict of interest resu|ting from such compensation due to the fact that this is a paid pub|ication. The publisher of this report believes this information to be reliab|e but can make no assurance as to its accuracy or completeness. If you wish to stop future mai|ings, or if you fee| you have been wrongfu|ly placed in our membership, please go here or send a b|ank e mai| with No Thanks in the subject to (-st0ck47@ yahoo.com-) From jamesd at echeque.com Mon Mar 28 21:31:37 2005 From: jamesd at echeque.com (James A. Donald) Date: Mon, 28 Mar 2005 21:31:37 -0800 Subject: How email encryption should work In-Reply-To: <6.0.1.1.0.20050328174523.04eca260@mail.comcast.net> References: <200503270635.j2R6ZNAF017280@artifact.psychedelic.net> Message-ID: <424877B9.1249.E5DF01F@localhost> -- In my blog http://blog.jim.com/ I post "how email encryption should work" I would appreciate some analysis of this proposal, which I think summarizes a great deal of discussion that I have read. Here is how email encryption should work: * The user should automagically get his key and certificate when he sets up the email account, without having to do anything extra. We should allow him the option of doing extra stuff, but the default should be do nothing, and the option to do something should be labeled with something intimidating like Advanced custom cryptographic key management so that 99% of users never touch it. * In the default case, the mail client, if there are no keys present, logs in to a keyserver using a protocol analogous to SPEKE, using by default the same password as is used to download mail. That server then sends the key for that password and email address, and emails a certificate asserting that holder of that key can be reached at that email address. Each email address, not each user, has a unique key, which changes only when and if the user changes the password or email address. Unless the user wants to deal with advanced custom options, his from address must be the address that the client downloads mail from  as it normally is. * The email client learns the correspondent's public key by receiving signed email. It assigns petnames on a per-key basis. A petname is also shorthand for entering a destination address (Well it is shorthand if the user modified it. The default petname is the actual address optionally followed by a count.) * The email client presents two checkboxes, sign and encrypt, both of which default to whatever was last used for this email address. If several addresses are used, it defaults to the strongest that was used for any one of them. If the destination address has never been used before, then encrypt is checked if the keys are known, greyed out if they are unknown. Sign is checked by default. * The signature is in the mail headers, not the body, and signs the body, the time sent, the sender's address, and the recipient's address. If the email is encrypted, the signature can only be checked by someone who possesses the decryption key. * If user is completely oblivious to encryption and completely ignores those aspects of the program, and those he communicates with do likewise, he sends his public key all over the place in the headers, signs everything he sends, and encrypts any messages that are a reply to someone using software that follows the same protocol, and neither he nor those he corresponds with notice anything different or have to do anything extra  other than that when he gets unsigned messages, a warning comes up  an unobtrusive and easily ignored warning if he has never received a signed message from that source, a considerably stronger warning if he has previously received signed mail from that source. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG VvdTZKUxpdfcDRAGwBSupIYVIUGAAE5orXRkJl8q 4y7qVNj7u/H3nJLgyAs5pGM2tDFOcyCyC9L+vbbpa From rah at shipwright.com Mon Mar 28 21:20:13 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 29 Mar 2005 00:20:13 -0500 Subject: Stolen Credit Card Numbers and Companies with a Clue (was Re: TidBITS#772/28-Mar-05) In-Reply-To: References: Message-ID: At 5:48 PM -0800 3/28/05, TidBITS Editors wrote: >Stolen Credit Card Numbers and Companies with a Clue >---------------------------------------------------- > by Adam C. Engst > > Credit card number theft is one of those events that seems > to happen only to other people... until it hits you. That > just happened to me, and the repercussions proved a bit more > instructive and far-reaching that I would have initially > anticipated. > > >**Awkward Dating** -- The first hint that something was wrong > came when Tonya was reviewing the charges on the MasterCard we > use solely for business purchases. There was a $19.95 charge to > something related to Yahoo, but it wasn't possible to tell exactly > what service from the limited information on the credit card > statement. Tonya knew she hadn't ordered anything online that > could have generated such a charge, and when she asked me, I > couldn't remember anything either. To verify that I wasn't simply > losing my memory, I searched all my received email around the > date in question, and even went so far as to search my OmniWeb > history for Yahoo URLs around the date. > > The situation was becoming more curious, so Tonya called the > phone number on the credit card statement, and waited on hold > for a while. As she waited, she realized that what she had > called was Yahoo Personals - Yahoo's online dating service. > She immediately yelled for me to get on the phone, figuring > that the whole situation was just going to generate snickers > for the customer service people if they heard a wife calling > to find out about a dating service charge on her husband's credit > card. I was good and refrained from making jokes about how I > didn't even get any dates from Yahoo Personals once the customer > service people came on the line. > > > > It took a little back and forth with Yahoo's customer service > people, since we weren't willing to give them much more personal > information, some of which they claimed they needed to look up the > account that had made the charges. Eventually we got them to tell > us that the Yahoo Personals account did indeed have the same user > name as my My Yahoo account (I immediately changed that account's > password, just for good measure), but that the birth date listed > with the Yahoo Personals account did not match either of our birth > dates. That was sufficient for them to cancel the account and > refund our money. > > >**Cleaning Up from Cancellation** -- The Yahoo Personals customer > service rep recommended that we cancel the credit card used, which > we were already planning as the next call. Our credit card issuer > was totally on top of it, cancelling the card and issuing us > another one before we'd even had a chance to explain the full > situation. Tonya keeps records of merchants that are automatically > withdrawing from that credit card, so next she reset all of those > accounts. The morning was shot, but it seemed that we were out > of the woods. Unfortunately, it wasn't to be. > > A few days later, Tristan and I were out driving when I remembered > that our other car likely had a flat tire due to a slow leak I'd > been monitoring. That normally wouldn't have been an issue, but > Tonya had an appointment before we would be home, and I wanted > to alert her to blow up the tire and to remember her cell phone > in case she needed me to come change the tire while she was out. > In New York State, it's illegal to drive while talking on a cell > phone unless you're using a hands-free system, so I pressed the > speed-dial number for home and handed Tristan the phone so he > could give her the message. A few seconds later he gave me back > the phone, saying "It's being weird." I pulled over and listened, > and indeed, I'd somehow ended up with Verizon Wireless customer > service. I hung up and tried again, and got them again. This time > I waited until I could talk to a person, who promptly informed me > that they had disabled our service because the monthly bill had > been rejected by our credit card - apparently one auto-withdrawal > had slipped past Tonya's record keeping. Luckily, I was able to > use another phone later to walk Tonya through inflating the tire, > but the credit card fraud was increasing in annoyance. > > The next week Tonya managed to get the account reinstated, and > protested sufficiently vehemently when Verizon Wireless tried > to charge a $15 fee for doing so that they waived the charge. > She pointed out that it would have been trivial for them to notify > us via voicemail or text messaging that our auto-withdrawal had > failed, but needless to say, the customer service drone couldn't > do anything but forward the feedback (if even that). > > That wasn't the end of the bother, though the next one was purely > my fault. I'd set up a Google AdWords account for Take Control > that also withdrew money from that MasterCard, and I'd forgotten > to inform Tonya that it needed to be added to the list of auto- > withdrawal services. As you'd expect, the next time Google tried > to charge money to the card, it was rejected, too. > > But here's the difference between Verizon Wireless and Google. > Where Verizon Wireless didn't bother to inform us that they'd > disabled our service and thus caused us unnecessary trouble, > Google sent me a nice email message, informing me of the problem, > telling me that they'd temporarily disabled our ads, and giving > me a link to my account so I could enter a new credit card number. > The entire process took only a couple of minutes, and most of that > was exclaiming to Tonya about how Google had a clue in comparison > to Verizon Wireless. > > >**Following Up on the Credit Report** -- We were relating this > story to a friend over dinner the other day, who said she'd had a > similar thing happen. In her case, though, the fraud had included > the perpetrator changing the billing address related to the card, > so she hadn't even received a tip-off statement. She recommended > that we run a credit report as well, just to make sure any > additional hanky-panky wasn't going on with our finances. > > A bit of investigation revealed that recent U.S. legislation > requires the three major credit reporting companies - Equifax, > Experian, and TransUnion - to provide anyone who asked with a > free credit report once every 12 months (so you can get one credit > report from each company all at once, or you can request a report > from one of the companies every four months to be on the lookout > for problems). Unfortunately, the credit reporting companies > were given quite some time to roll out the service to the entire > country, so although people in western and midwest states can > request their free credit reports right now, people in the south > must wait until 01-Jun-05, and those of us in the eastern states > must wait until 01-Sep-05. (Some states - Colorado, Georgia, > Maine, Maryland, Massachusetts, New Jersey, and Vermont - also > require that residents be allowed to request one or two free > credit reports each year.) > > > > > > Our friend said she'd used another service called > FreeCreditReport.com, which gives you a free credit report, > but requires that you sign up for a slew of fee-based credit > reporting and monitoring services that could be useful, > particularly if you wanted to be informed about changes to > your credit report over time. You can (and I did) cancel the > membership without paying anything - hence the "free" aspect > of the credit report, and of course, you can pay about $10 > for a credit report if you don't want to play the "cancel my > membership" game. Luckily, my credit report showed nothing of > significant concern, though they apparently think I'm a year > younger than I am. I'll have to fix that at some point. It's > entirely likely that other problems haven't shown up yet, and > I plan to start running regular credit reports in September. > > > > >**Lessons Learned** -- In this day and age, shopping on the > Internet is simply a fact of life for many people. I don't > believe that using a credit card on the Internet is any more > or less likely to result in credit card number theft than using > it over the phone or in person, but the more you use credit cards, > the more likely it is some miscreant will obtain your number and > abuse it. It's mostly an annoyance with credit cards (though not > necessarily with debit cards!), since your liability is limited > to $50 in the United States, and I've never heard of anyone ever > being charged even that. But the hassle factor can be large, as > our experience proved, and credit card fraud could be the first > step in a more complete identity theft. So, I recommend the > following precautions. > >* Review your credit card statements every month, and make sure > you made every purchase. Thieves often charge a small amount, > like our $19.95 fee for Yahoo Personals, to see if you're paying > attention (and if you're not, the purchases will increase). > >* Always keep email receipts for online purchases for reference > purposes, and if you anticipate wanting to look back to what > you've done in the past on the Web, use a browser like OmniWeb > or a utility like St. Clair Software's HistoryHound to record > your tracks. > > > > >* Although we still have no idea how our credit card number was > stolen, wallet thefts are a common way for this to happen. To > simplify canceling credit cards and other accounts in the event > of such a theft, photocopy the contents of your wallet and store > those pages in a safe location. > >* Keep a list of all automatic withdrawals from your credit card > in the event you have to cancel the card. Also remember to write > down merchants (like the iTunes Music Store) that might have > your credit card number stored for sporadic use. > >* If you're in the U.S. (other countries may have similar > practices), be sure to take advantage of the free credit reports > to make sure all the information is correct, and if you find > incorrect information, make sure to fix it promptly. Visit the > Federal Trade Commission Web site for additional suggestions > and links to useful resources: > > > > Many instances of credit card number theft may not be within > your sphere of influence. The Register has an article listing > a number of stories of large businesses, educational institutions, > and other organizations losing control of sensitive personal > information in this month alone. There's nothing you can do > about such situations (apart from checking data security practices > when possible), but some common sense and effort on your part can > reduce the impact of credit card number theft if it does happen > to you. I got off easy this time, and I hope this is the end of > the story (for a much more exciting story of credit card number > theft, read the page at the second link below). > > > -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From bfrteoe at crutchers.com Tue Mar 29 00:56:58 2005 From: bfrteoe at crutchers.com (Briana Kane) Date: Tue, 29 Mar 2005 01:56:58 -0700 Subject: Featured Profile - no spin or agenda, just the facts Message-ID: <102255002783.VOR32873@tunisia.chase-1.com> The Oil and Gas Advisory Now that Oil and Gas has entered a long-term bull market, our specia|ty in pinpointing the hottest companies of the few remaining underva|ued energy p|ays has produced soaring returns. Emerson Oil and Gas (EOGI) is an energy developer in the US "Oi| Be|t" and in Canada's most high|y coveted reservoirs with generating potential of Mi|lions per week. Breaking NEws!!! VANCOUVER, Apri| 22- Emerson Oi| and Gas, Inc., announced a decision to explore the development of drilling programs in Wyoming (USA), as we|l as A|berta (CANADA), where severa| more very intriguing prospects, that include existing production, are developing rapid|y. Emerson wil| announce further details as |ease opportunities and contract negotiations come to fruition. One of the most effective ways to acquire financing for dri|ling programs invo|ves existing production of oi| and or gas opportunities, as we|| as targeted areas with surrounding production. Emerson is very optimistic that with its current deal flow it wil| be able to bui|d a so|id foundation to grow. David Harker, Emerson President stated, "We at Emerson are aggressive|y pursuing a|| possib|e 0pp0rtunities for growth and success. We be|ieve that in many situations we wi|| have the OppOrtunity to inc|ude existing production in a dri|ling program, which will a|ways encourage the participation of financia| partners." Symbo| - EOGI Price - .O9 The va|ue of EOGI's shares wi|l skyrocket: 1. Price charts confirm oi| prices are experiencing the strongest bull market in a generation. 2. Natura| Gas prices have tripled in the |ast two years. 3. With mu|tiple projects in high-gear and the expanding production on reserves worth mu|ti-mi|lions, EOGI is selling for |ess than 1/4 the value of its assets. 4. Emerson Oi| and Gas specia|izes in using new techno|ogy to turn unproductive oil and gas deposits into profitable enterprises. Already shares in the oil and gas sector are rising faster than the overa|| market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy related. But it's in the mid-sized exp|orers and deve|opers like Emerson (EOGI) that the biggest gains are being made. In the last 12 months, many of these stocks made trip|e and even quadruple returns. Our subscribers need to pay particu|arly close attention to undervalued EOGI shares, because it won't be a bargain for long. This sma|| company with a comparab|y small market value, is sitting on a bonanza of oi| and gas reserves - an unrecognized bonus for investors especia||y with the daily jump in energy prices. But al| that wi|l change in a few short weeks, as these reserves move into production, bringing an explosion of cash that is expected to capture the attention of the market, and have an equal|y explosive effect on the share price. What will the cash flow from these projects do for the price of Emerson Oi| and Gas' shares? We|| we do know this - the great thing about investing in EOGI is that your gains don't depend on further increases in the price of oi| and gas. Even if energy prices stay flat, or decline s|ight|y, you wi|l stil| make a very hea|thy return. Of course, energy prices are expected to continue their meteoric rise over the next year or so as predicted, meaning the value of EOGI's assets and earnings will soar even higher. In that case, the reward for investors wi|l be staggering. Overal|, we consider EOGI to be one of the last outstanding energy plays in the oil and gas sector. Once this discovery has been realized, EOGI shares will surge sharply on heavy investor attention. We have identified this discovery for immediate accumulation. EOGI's oil and gas reserves are we|| established and are going into massive production. Ear|y investors will secure optimum gains, and any additiona| news in this area wi|| rea|ly turn up the heat, causing us to revise our targets upward in next week's bu|letin. Oi| and Gas Advisory (OGA) is not a investment expert. Certain statements contained in this newsletter may be future-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. Such terms as expect, believe, may, wi|l, and intend or similar terms may identify these statements. Past-performance is not an indicator of future-results. This is not an expert to acquire or sel| securities. OGA is an independent publication that was paid fifteen thousand dol|ars by a third party for the continuing coverage and dissemination of this company information. Investors are suggested to seek proper guidance from a financial expert. Investors should use the information provided in this news|etter as a starting point for gathering additiona| information on the profiled company to al|ow the investor to form their own opinion regarding investment. If you wish to stop future mailings, or if you feel you have been wrongful|y placed in our membership, please go here or send a b|ank e mail with No Thanks in the subject to noneed1010 @yahoo.com From eugen at leitl.org Mon Mar 28 22:53:11 2005 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 29 Mar 2005 08:53:11 +0200 Subject: How the Secret Services Cracks Encrypted Evidence Message-ID: <20050329065311.GZ24702@leitl.org> Link: http://slashdot.org/article.pl?sid=05/03/28/2026226 Posted by: timothy, on 2005-03-28 21:22:00 from the throw-at-wall-see-what-sticks dept. tabdelgawad writes "The Washington Post offers this writeup about [1]how the U.S. Secret Service uses a Distributed Network Attack program to crack encryption on computers and drives seized as evidence. How can brute force still succeed with 256-bit encryption, you ask? Customized password dictionaries from the seized computer's email files and browser cache: People still use non-random passwords." References 1. http://www.washingtonpost.com/wp-dyn/articles/A6098-2005Mar28.html ----- End forwarded message ----- DNA Key to Decoding Human Factor Secret Service's Distributed Computing Project Aimed at Decoding Encrypted Evidence By Brian Krebs washingtonpost.com Staff Writer Monday, March 28, 2005; 6:48 AM For law enforcement officials charged with busting sophisticated financial crime and hacker rings, making arrests and seizing computers used in the criminal activity is often the easy part. More difficult can be making the case in court, where getting a conviction often hinges on whether investigators can glean evidence off of the seized computer equipment and connect that information to specific crimes. The wide availability of powerful encryption software has made evidence gathering a significant challenge for investigators. Criminals can use the software to scramble evidence of their activities so thoroughly that even the most powerful supercomputers in the world would never be able to break into their codes. But the U.S. Secret Service believes that combining computing power with gumshoe detective skills can help crack criminals' encrypted data caches. Taking a cue from scientists searching for signs of extraterrestrial life and mathematicians trying to identify very large prime numbers, the agency best known for protecting presidents and other high officials is tying together its employees' desktop computers in a network designed to crack passwords that alleged criminals have used to scramble evidence of their crimes -- everything from lists of stolen credit card numbers and Social Security numbers to records of bank transfers and e-mail communications with victims and accomplices. To date, the Secret Service has linked 4,000 of its employees' computers into the "Distributed Networking Attack" program. The effort started nearly three years ago to battle a surge in the number of cases in which savvy computer criminals have used commercial or free encryption software to safeguard stolen financial information, according to DNA program manager Al Lewis. "We're seeing more and more cases coming in where we have to break encryption," Lewis said. "What we're finding is that criminals who use encryption usually are higher profile and higher value targets for us because it means from an evidentiary standpoint they have more to hide." Each computer in the DNA network contributes a sliver of its processing power to the effort, allowing the entire system to continuously hammer away at numerous encryption keys at a rate of more than a million password combinations per second. The strength of any encryption scheme is based largely on the complexity of its algorithm -- the mathematical formula used to scramble the data -- and the length of the "key" required to encode and unscramble the information. Keys consist of long strings of binary numbers or "bits," and generally the greater number of bits in a key, the more secure the encryption. Many of the encryption programs used widely by corporations and individuals provide up to 128- or 256-bit keys. Breaking a 256-bit key would likely take eons using today's conventional "dictionary" and "brute force" decryption methods -- that is, trying word-based, random or sequential combinations of letters and numbers -- even on a distributed network many times the size of the Secret Service's DNA. "In most cases, there's a greater probability that the sun will burn out before all the computers in the world could factor in all of the information needed to brute force a 256-bit key," said Jon Hansen, vice president of marketing for AccessData Corp, the Lindon, Utah, company that built the software that powers DNA. Yet, like most security systems, encryption has an Achilles' heel -- the user. That's because some of today's most common encryption applications protect keys using a password supplied by the user. Most encryption programs urge users to pick strong, alphanumeric passwords, but far too often people ignore that critical piece of advice, said Bruce Schneier, an encryption expert and chief technology officer at Counterpane Internet Security Inc. in Mountain View, Calif. "Most people don't pick a random password even though they should, and that's why projects like this work against a lot of keys," Schneier said. "Lots of people -- even the bad guys -- are really sloppy about choosing good passwords." Armed with the computing power provided by DNA and a treasure trove of data about a suspect's personal life and interests collected by field agents, Secret Service computer forensics experts often can discover encryption key passwords. In each case in which DNA is used, the Secret Service has plenty of "plaintext" or unencrypted data resident on the suspect's computer hard drive that can provide important clues to that person's password. When that data is fed into DNA, the system can create lists of words and phrases specific to the individual who owned the computer, lists that are used to try to crack the suspect's password. DNA can glean word lists from documents and e-mails on the suspect's PC, and can scour the suspect's Web browser cache and extract words from Web sites that the individual may have frequented. "If we've got a suspect and we know from looking at his computer that he likes motorcycle Web sites, for example, we can pull words down off of those sites and create a unique dictionary of passwords of motorcycle terms," the Secret Service's Lewis said. DNA was developed under a program funded by the Technical Support Working Group -- a federal office that coordinates research on technologies to combat terrorism. AccessData's various offerings are currently used by nearly every federal agency that does computer forensics work, according to Hansen and executives at Pasadena, Calif.-based Guidance Software, another major player in the government market for forensics technology. Hansen said AccessData has learned through feedback with its customers in law enforcement that between 40 and 50 percent of the time investigators can crack an encryption key by creating word lists from content at sites listed in the suspect's Internet browser log or Web site bookmarks. "Most of the time this happens the password is some quirky word related to the suspect's area of interests or hobbies," Hansen said. Hansen recalled one case several years ago in which police in the United Kingdom used AccessData's technology to crack the encryption key of a suspect who frequently worked with horses. Using custom lists of words associated with all things equine, investigators quickly zeroed in on his password, which Hansen says was some obscure word used to describe one component of a stirrup. Having the ability to craft custom dictionaries for each suspect's computer makes it exponentially more likely that investigators can crack a given encryption code within a timeframe that would be useful in prosecuting a case, said David McNett, president of Distributed.net, created in 1997 as the world's first general-purpose distributed computing project. "If you have a whole hard drive of materials that could be related to the encryption key you're trying to crack, that is extremely beneficial," McNett said. "In the world of encrypted [Microsoft Windows] drives and encrypted zip files, four thousand machines is a sizable force to bring to bear." It took DNA just under three hours to crack one file encrypted with WinZip -- a popular file compression and encryption utility that offers 128-bit and 256-bit key encryption. That attack was successful mainly because investigators were able to build highly targeted word lists about the suspect who owned the seized hard drive. Other encrypted files, however, are proving far more stubborn. In a high-profile investigation last fall, code-named "Operation Firewall," Secret Service agents infiltrated an Internet crime ring used to buy and sell stolen credit cards, a case that yielded more than 30 arrests but also huge amounts of encrypted data. DNA is still toiling to crack most of those codes, many of which were created with a formidable grade of 256-bit encryption. Relying on a word-list approach to crack keys becomes far more complex when dealing with suspects who communicate using a mix of languages and alphabets. In Operation Firewall, for example, several of the suspects routinely communicated online in English, Russian and Ukrainian, as well as a mishmash of the Cyrillic and Roman alphabets. The Secret Service also is working on adapting DNA to cope with emergent data secrecy threats, such as an increased criminal use of "steganography," which involves hiding information by embedding messages inside other, seemingly innocuous messages, music files or images. The Secret Service has deployed DNA to 40 percent of its internal computers at a rate of a few PCs per week and plans to expand the program to all 10,000 of its systems by the end of this summer. Ultimately, the agency hopes to build the network out across all 22 federal agencies that comprise the Department of Homeland Security: It currently holds a license to deploy the network out to 100,000 systems. Unlike other distributed networking programs, such as the Search for Extra Terrestrial Intelligence Project -- which graphically display their number-crunching progress when a host computer's screen saver is activated -- DNA works silently in the background, completely hidden from the user. Lewis said the Secret Service chose not to call attention to the program, concerned that employees might remove it. "Computer users often experience system lockups that are often inexplicable, and many users will uninstall programs they don't understand," Lewis said. "As the user base becomes more educated with the program and how it functions, we certainly retain the ability to make it more visible." In the meantime, the agency is looking to partner with companies in the private sector that may have computer-processing power to spare, though Lewis declined to say which companies the Secret Service was approaching. Such a partnership would not endanger the secrecy of their operations, Lewis said, because any one partner would be given only tiny snippets of an entire encrypted message or file. Distributed.net's McNett said he understands all too well the agency's desire for additional computing power. "There will be such a thing as 'too much computing power' as soon as you can crack a key 'too quickly,' which is to say 'never' in the Secret Service's case." B) 2005 TechNews.com -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From cewanlbihwzj at hus.parkingspa.com Tue Mar 29 10:44:56 2005 From: cewanlbihwzj at hus.parkingspa.com (Nolan Hackett) Date: Tue, 29 Mar 2005 10:44:56 -0800 Subject: Cypherpunks : Bank appointment deleted on 5th of April Message-ID: <027599455998.IDD25490@funkytiger.co.uk> Report - is your wife aching L*E*V*I*T*R*A 2o m*g 6o PillS 149*99 YoU SHoUlD HURRY! : viagra We Also have: Z*O*C*O*R 2o m*g 6o PillS 129*99 L*I*P*I*T*O*R 2o m*g 3o PillS 79*99 Same Day Shipping nice meeting you Bob Gifford Embryologist Paulo Kaku Medical Translations, 1600-166 Lisboa, Portugal, Portugal Phone: 217-265-1611 Mobile: 819-237-1167 Email: cewanlbihwzj at francimel.com This message is being sent to confirm your account. Please do not reply directly to this message This package is a 56 day complementary package NOTES: The contents of this info is for manipulation and should not be yesteryear profusion initiate ribald notocord Time: Tue, 29 Mar 2005 10:44:56 -0800 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1274 bytes Desc: not available URL: From fnvub at fourteencarrots.com Tue Mar 29 02:15:43 2005 From: fnvub at fourteencarrots.com (Arnold Richards) Date: Tue, 29 Mar 2005 11:15:43 +0100 Subject: Wa|l Street financial fOr better st0ck perf0rmance Message-ID: <663670002577.DBW86981@slew.catherinewreal.com> The Oi| and Gas Advisory Now that Oi| and Gas has entered a long-term bul| market, our specialty in pinpointing the hottest companies of the few remaining underva|ued energy p|ays has produced soaring returns. Emerson Oi| and Gas (EOGI) is an energy deve|oper in the US "Oi| Be|t" and in Canada's most high|y coveted reservoirs with generating potential of Millions per week. Breaking NEws!!! VANCOUVER, Apri| 22- Emerson Oi| and Gas, Inc., announced a decision to exp|ore the development of drilling programs in Wyoming (USA), as wel| as A|berta (CANADA), where several more very intriguing prospects, that include existing production, are developing rapid|y. Emerson wi|| announce further details as |ease opportunities and contract negotiations come to fruition. One of the most effective ways to acquire financing for dri|ling programs involves existing production of oi| and or gas opportunities, as we|l as targeted areas with surrounding production. Emerson is very optimistic that with its current deal f|ow it will be ab|e to bui|d a solid foundation to grow. David Harker, Emerson President stated, "We at Emerson are aggressive|y pursuing all possib|e 0pp0rtunities for growth and success. We be|ieve that in many situations we will have the Opp0rtunity to include existing production in a dri|ling program, which wi|| a|ways encourage the participation of financia| partners." Symbo| - EOGI Price - .09 The value of EOGI's shares wil| skyrocket: 1. Price charts confirm oil prices are experiencing the strongest bu|l market in a generation. 2. Natural Gas prices have tripled in the last two years. 3. With multip|e projects in high-gear and the expanding production on reserves worth multi-mi|lions, EOGI is selling for |ess than 1/4 the va|ue of its assets. 4. Emerson Oi| and Gas specia|izes in using new technology to turn unproductive oil and gas deposits into profitab|e enterprises. Already shares in the oil and gas sector are rising faster than the overa|| market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy related. But it's in the mid-sized explorers and deve|opers |ike Emerson (EOGI) that the biggest gains are being made. In the last 12 months, many of these stocks made triple and even quadrup|e returns. Our subscribers need to pay particu|arly close attention to underva|ued EOGI shares, because it won't be a bargain for long. This smal| company with a comparably smal| market value, is sitting on a bonanza of oil and gas reserves - an unrecognized bonus for investors especia||y with the dai|y jump in energy prices. But al| that wi|l change in a few short weeks, as these reserves move into production, bringing an explosion of cash that is expected to capture the attention of the market, and have an equal|y explosive effect on the share price. What will the cash f|ow from these projects do for the price of Emerson Oi| and Gas' shares? Well we do know this - the great thing about investing in EOGI is that your gains don't depend on further increases in the price of oil and gas. Even if energy prices stay f|at, or decline s|ightly, you wi|l stil| make a very hea|thy return. Of course, energy prices are expected to continue their meteoric rise over the next year or so as predicted, meaning the value of EOGI's assets and earnings wi|l soar even higher. In that case, the reward for investors wi|| be staggering. Overa|l, we consider EOGI to be one of the |ast outstanding energy plays in the oil and gas sector. Once this discovery has been rea|ized, EOGI shares wi|l surge sharply on heavy investor attention. We have identified this discovery for immediate accumu|ation. EOGI's oi| and gas reserves are we|l estab|ished and are going into massive production. Ear|y investors wi|l secure optimum gains, and any additiona| news in this area wi|l really turn up the heat, causing us to revise our targets upward in next week's bul|etin. Oi| and Gas Advisory (OGA) is not a investment expert. Certain statements contained in this newsletter may be future-|ooking statements within the meaning of The Private Securities Litigation Reform Act of 1995. Such terms as expect, believe, may, wi||, and intend or similar terms may identify these statements. Past-performance is not an indicator of future-resu|ts. This is not an expert to acquire or sell securities. OGA is an independent pub|ication that was paid fifteen thousand dol|ars by a third party for the continuing coverage and dissemination of this company information. Investors are suggested to seek proper guidance from a financial expert. Investors should use the information provided in this news|etter as a starting point for gathering additiona| information on the profiled company to a||ow the investor to form their own opinion regarding investment. If you wish to stop future mailings, or if you fee| you have been wrongfully placed in our membership, please go here or send a blank e mai| with No Thanks in the subject to noneed1004 @yahoo.com From lars at evildoer.de Tue Mar 29 01:54:22 2005 From: lars at evildoer.de (Lars Eilebrecht) Date: Tue, 29 Mar 2005 11:54:22 +0200 Subject: How email encryption should work In-Reply-To: <424877B9.1249.E5DF01F@localhost> References: <200503270635.j2R6ZNAF017280@artifact.psychedelic.net> <424877B9.1249.E5DF01F@localhost> Message-ID: <20050329115422.3ab1e4a6@dejavu.usr.sek.int.muc.leogic.com> According to James: > I would appreciate some analysis of this proposal, which > I think summarizes a great deal of discussion that I > have read. > > Here is how email encryption should work: [...] > * In the default case, the mail client, if there are > no keys present, logs in to a keyserver using a > protocol analogous to SPEKE, using by default the > same password as is used to download mail. That > server then sends the key for that password and > email address, and emails a certificate asserting > that holder of that key can be reached at that email > address. Are you saying that the keyserver creates the public-private key pair for the user? That doesn't sound like a good idea. > Each email address, not each user, has a > unique key, which changes only when and if the user > changes the password or email address. How do you prevent that a user creates a key/certificate for an email address the user doesn't own. > * The email client learns the correspondent's public > key by receiving signed email. Unless you use certificates issued by a trusted-third party, that's not secure. ciao... -- Lars Eilebrecht lars at evildoer.de From jrandom at i2p.net Tue Mar 29 12:04:22 2005 From: jrandom at i2p.net (jrandom) Date: Tue, 29 Mar 2005 12:04:22 -0800 Subject: [i2p] weekly status notes [mar 29] Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi y'all, time for the weekly status notes * Index 1) 0.5.0.5 2) UDP (SSU) 3) Q 4) ??? * 1) 0.5.0.5 Since y'all did such a great job at upgrading to 0.5.0.4 so quickly, we're going to have the new 0.5.0.5 release come out after the meeting. As discussed last week, the big change is the inclusion of the batching code, bundling multiple small messages together, rather than giving them each their own full 1KB tunnel message. While this alone won't be revolutionary, it should substantially reduce the number of messages passed, as well as the bandwidth used, especially for services like IRC. There will be more info in the release announcement, but two other important things come up with the 0.5.0.5 rev. First, we're dropping support for users before 0.5.0.4 - there are well over 100 users on 0.5.0.4, and there are substantial problems with earlier releases. Second, there's an important anonymity fix in the new build, that while it'd require some development effort to mount, its not implausible. The bulk of the change is to how we manage the netDb - rather than play it fast and loose and cache entries all over the place, we will only respond to netDb requests for elements that have been explicitly given to us, regardless of whether or not we have the data in question. As always, there are bugfixes and some new features, but more info will be forthcoming in the release announcement. * 2) UDP (SSU) As discussed off and on for the last 6-12 months, we're going to be moving over to UDP for our interrouter communication once the 0.6 release is out. To get us further down that path, we've got a first draft of the transport protocol up in CVS @ http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/router/doc/udp.html?rev=HEAD Its a fairly simple protocol with the goals outlined in the doc, and exploits I2P's capabilities to both authenticate and secure data, as well as expose as little external information as possible. Not even the first part of a connection handshake is identifiable to someone that isn't running I2P. The behavior of the protocol is not fully defined in the spec yet, such as how the timers fire or how the three different semireliable status indicators are used, but it does cover the basics of the encryption, packetization, and NAT hole punching. None of it has been implemented yet, but will be soon, so feedback would be greatly appreciated! * 3) Q Aum has been churning away on Q(uartermaster), a distributed store, and the first pass of the docs are up [1]. One of the interesting ideas in there seems to be a move away from a straight DHT towards a memcached [2] style system, with each user doing any searches entirely *locally*, and requesting the actual data from the Q server "directly" (well, through I2P). Anyway, some neat stuff, perhaps if Aum is awake [3] we can wressle an update out of him? [1] http://aum.i2p/q/ [2] http://www.danga.com/memcached/ [3] damn those timezones! * 4) ??? Lots more going on, and if there were more than just a few minutes until the meeting I could go on, but c'est la vie. Swing on by #i2p in a few to chat. =jr -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFCSbNjWYfZ3rPnHH0RAi5qAKCNE+jorT/F1QPif4a1EPaTKg1DwwCggVy9 Kk+3I6WgqDjqaNKSc5xnoQA= =iXNV -----END PGP SIGNATURE----- _______________________________________________ i2p mailing list i2p at i2p.net http://i2p.dnsalias.net/mailman/listinfo/i2p ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From dtqpyxohhrzxw at saintmail.net Tue Mar 29 04:57:24 2005 From: dtqpyxohhrzxw at saintmail.net (Josiah Major) Date: Tue, 29 Mar 2005 17:57:24 +0500 Subject: Penny st0ck booms on continued demand In-Reply-To: <%RND_ALFABET@attorney.com> References: <%RND_ALFABET@attorney.com> Message-ID: <908682795269.JUG83914@isotropic.bns.com> Yap International, Inc.(YPIL) VoIP technology requires no computer or high speed Internet connection for its dia|-up product. Current Price: $.16 Watch This Stock Tuesday Some of These Little VOIP Stocks Have Been Real|y Moving Lately. And When Some of them Move, They Rea|ly Go...Gains of 10O%, 2O0% or More Are Not Unheard Of. Break News!! Yap International Inc. (YPIL) announced today that through its exc|usive Centra| and South American distributor Representaciones Gorbea SA (RGSA) that fina| interoperability testing of the Nomad VoIP CPE (customer premise equipment) operating over Asterisk based soft switches wil| begin the week of Apri| 5, 2O05. Gorbea SA has secured a contract to dep|oy 200,0O0 VoIP customer premise devices for Guatemala with the second largest te|ecommunications carrier in the region. Upon completion of these interoperability tests Yap Internationa| expects to see revenues in the next 90 days. "We are very excited for Yap Internationa| and its investors. We have the very rea| Opp0rtunity to grow 3 times the amount of paying customers that AT&T CallVantage service garnered in its first year, and a similar amount to Vonage in its first year, without spending in excess of a hundred mi||ion dol|ars in advertising, or having the te|ecommunications giant's (AT&T) brand name recognition. In fact, our marketing expense to date has re|ied entirely upon decades of relationships in the international telecommunications arena, and of course a better mouse trap," states Joseph Weaver, President and Chief Operating Officer of Yap International. About The Company: Yap International, Inc. is a multi-nationa| Internet Communications Company developing cost effective te|ecommunications through Voice over Internet Protocol (VoIP) techno|ogies. The Company's VoIP technology requires no computer or high speed Internet connection for its dia|-up product and works in conjunction with any standard push button phone to access VoIP sav-ings. The Company p|ans on targeting the market of more than 1.1 bil|ion te|ephones worldwide, but specifical|y, the internationa| calling market as it pertains to foreign-born residents living in the United States and Canada. The company's other products work with broadband, DSL, cab|e, sate|lite, and has wireless capabilities. The company's nameistrative offices are |ocated in Vancouver, BC and sa|es offices in Los Ange|es, CA. ---------------------------------------- And P|ease Watch this One Trade Tuesday! Go Ypi| ----------------------------------------- Information within this publication contains future |ooking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or invo|ve discussions with respect to predictions,expectations, beliefs, p|ans, projections, objectives, goa|s, assumptions or futureevents or performance are not statements of historical fact and may be future looking statements. Future looking statements are based on expectations, estimates and projections at the time the statements are made that invo|ve a number of risks and uncertainties which could cause actual results or events to differ materia||y from those present|y anticipated. Future |ooking statements in this action may be identified through the use of words such as projects, foresee, expects, will, anticipates,estimates, be|ieves, understands or that by statements indicating certain actions may, cou|d, or might occur. These future-looking statements are based on information current|y avai|able and are subject to a number of risks, uncertainties and other factors that cou|d cause Ypil's actual resu|ts, performance, prospects or opportunities to differ materia||y from those expressed in, or imp|ied by, these future-looking statements. As with many microcap stocks, today's company has additional risk factors that raise doubt about its abi|ity to continue as a going concern. These risks, uncertainties and other factors include, without limitation, the Company's growth expectations and ongoing funding requirements, and specifica|ly, the Company's growth prospects with sca|ab|e customers. Other risks include the Company's |imited operating history, the Company's history of operating |osses, consumers' acceptance, the Company's use of |icensed techno|ogies, risk of increased competition,the potentia| need for additiona| financing, the conditions and terms of any financing that is consummated, the limited trading market for the Company's securities, the possible vo|ati|ity of the Company's stock price, the concentration of ownership, and the potential fluctuation in the Company's operating resu|ts. The pub|isher of this report does not represent that the information contained in this message states a|| material facts or does not omit a materia| fact necessary to make the statements therein not mis|eading.Al| information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The pub|isher of this news|etter advises al| readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this report. None of the material within this report shal| be construed as any kind of investment advice or solicitation. Many of these companies are on the verge of bankruptcy. You can |ose a|l your money by investing in this stock. The publisher of this report is not a registered investment expert. Subscribers shou|d not view information herein as |egal, tax, accounting or investment advice. Any reference to past performance(s) of companies are specia||y selected to be referenced based on the favorable performance of these companies. You would need perfect timing to achieve the results in the examples given. There can be no assurance of that happening. Remember, as always, past performance is not indicative of future resu|ts and a thorough due di|igence effort,including a review of a company's fi|ings at sec gov or edgar-online com when avai|ab|e, should be completed prior to investing. A|| factua| information in this report was gathered from public sources,inc|uding but not limited to Company Websites and Company Press Re|eases. The publisher disc|oses the receipt of Fifteen thousand dollars from a third party, not an officer, director, or affi|iate shareho|der ofthe company for the preparation of this online report. Be aware of aninherent conf|ict of interest resu|ting from such compensation due to the fact that this is a paid publication. The pub|isher of this report believes this information to be reliable but can make no assurance as to its accuracy or completeness. Use of the materia| within this report constitutes your acceptance of these terms. If you wish to stop future mai|ings, or if you feel you have been wrongfu|ly p|aced in our membership, please go here or send a b|ank e mai| with No Thanks in the subject to (-st0ck50@ yahoo.com-) From ftvldckepauyo at design88.com Tue Mar 29 06:55:01 2005 From: ftvldckepauyo at design88.com (Dennis Hawkins) Date: Tue, 29 Mar 2005 18:55:01 +0400 Subject: Asset valuation indicates cheap shares won't stay for long Message-ID: <986004209588.JGA41404@ektachrome.fridh.net> The Oil and Gas Advisory Now that Oi| and Gas has entered a long-term bu|| market, our specia|ty in pinpointing the hottest companies of the few remaining underva|ued energy plays has produced soaring returns. Emerson Oil and Gas (EOGI) is an energy deve|oper in the US "Oi| Belt" and in Canada's most high|y coveted reservoirs with generating potential of Millions per week. Breaking NEws!!! VANCOUVER, April 22- Emerson Oil and Gas, Inc., announced a decision to exp|ore the deve|opment of dri|ling programs in Wyoming (USA), as wel| as Alberta (CANADA), where several more very intriguing prospects, that inc|ude existing production, are deve|oping rapidly. Emerson will announce further details as lease opportunities and contract negotiations come to fruition. One of the most effective ways to acquire financing for dri|ling programs invo|ves existing production of oi| and or gas opportunities, as we|| as targeted areas with surrounding production. Emerson is very optimistic that with its current dea| flow it will be able to bui|d a so|id foundation to grow. David Harker, Emerson President stated, "We at Emerson are aggressive|y pursuing all possib|e 0ppOrtunities for growth and success. We believe that in many situations we wi|l have the 0pp0rtunity to inc|ude existing production in a dri||ing program, which wi|l always encourage the participation of financial partners." Symbol - EOGI Price - .O9 The va|ue of EOGI's shares will skyrocket: 1. Price charts confirm oi| prices are experiencing the strongest bu|| market in a generation. 2. Natura| Gas prices have trip|ed in the last two years. 3. With mu|tiple projects in high-gear and the expanding production on reserves worth mu|ti-mi||ions, EOGI is selling for |ess than 1/4 the value of its assets. 4. Emerson Oil and Gas specia|izes in using new techno|ogy to turn unproductive oil and gas deposits into profitab|e enterprises. Already shares in the oi| and gas sector are rising faster than the overall market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy re|ated. But it's in the mid-sized exp|orers and developers |ike Emerson (EOGI) that the biggest gains are being made. In the |ast 12 months, many of these stocks made trip|e and even quadruple returns. Our subscribers need to pay particu|arly close attention to underva|ued EOGI shares, because it won't be a bargain for |ong. This sma|| company with a comparab|y sma|l market va|ue, is sitting on a bonanza of oi| and gas reserves - an unrecognized bonus for investors especia||y with the daily jump in energy prices. But a|l that wi|| change in a few short weeks, as these reserves move into production, bringing an exp|osion of cash that is expected to capture the attention of the market, and have an equal|y exp|osive effect on the share price. What wi|| the cash f|ow from these projects do for the price of Emerson Oi| and Gas' shares? We|| we do know this - the great thing about investing in EOGI is that your gains don't depend on further increases in the price of oi| and gas. Even if energy prices stay f|at, or decline slight|y, you wi|l sti|| make a very healthy return. Of course, energy prices are expected to continue their meteoric rise over the next year or so as predicted, meaning the va|ue of EOGI's assets and earnings wil| soar even higher. In that case, the reward for investors wi|| be staggering. Overal|, we consider EOGI to be one of the |ast outstanding energy p|ays in the oil and gas sector. Once this discovery has been rea|ized, EOGI shares will surge sharply on heavy investor attention. We have identified this discovery for immediate accumulation. EOGI's oil and gas reserves are well established and are going into massive production. Early investors wi|| secure optimum gains, and any additional news in this area will rea|ly turn up the heat, causing us to revise our targets upward in next week's bul|etin. Oi| and Gas Advisory (OGA) is not a investment expert. Certain statements contained in this newsletter may be future-looking statements within the meaning of The Private Securities Litigation Reform Act of 1995. Such terms as expect, believe, may, wi||, and intend or similar terms may identify these statements. Past-performance is not an indicator of future-resu|ts. This is not an expert to acquire or se|| securities. OGA is an independent pub|ication that was paid fifteen thousand do||ars by a third party for the continuing coverage and dissemination of this company information. Investors are suggested to seek proper guidance from a financia| expert. Investors should use the information provided in this news|etter as a starting point for gathering additional information on the profiled company to a||ow the investor to form their own opinion regarding investment. If you wish to stop future mailings, or if you fee| you have been wrongful|y p|aced in our membership, p|ease go here or send a b|ank e mai| with No Thanks in the subject to noneed1001 @yahoo.com From eugen at leitl.org Tue Mar 29 12:11:14 2005 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 29 Mar 2005 22:11:14 +0200 Subject: [i2p] weekly status notes [mar 29] (fwd from jrandom@i2p.net) Message-ID: <20050329201114.GR24702@leitl.org> ----- Forwarded message from jrandom ----- From jamesd at echeque.com Tue Mar 29 22:23:13 2005 From: jamesd at echeque.com (James A. Donald) Date: Tue, 29 Mar 2005 22:23:13 -0800 Subject: How email encryption should work In-Reply-To: <20050329115422.3ab1e4a6@dejavu.usr.sek.int.muc.leogic.com> References: <424877B9.1249.E5DF01F@localhost> Message-ID: <4249D551.22432.13B387FD@localhost> -- On 29 Mar 2005 at 11:54, Lars Eilebrecht wrote: > Are you saying that the keyserver creates the > public-private key pair for the user? That doesn't > sound like a good idea. Not what I said, though that is one possible way of implementing the proposal. Another possible way is that the client program hashes the password in one fashion, known to everyone, and in a different way, known to everyone, gives the second hash to the server, which then hashes that in a secret way, and the client program then constructs the secret key from both numbers. Of course, if the user clicks on the menacing "Advanced custom cryptographic key management" he can construct the key in some other fashion. > How do you prevent that a user creates a > key/certificate for an email address the user doesn't > own. Re-read: "That server then ... emails a certificate asserting that holder of that key can be reached at that email address." --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG xvP3RO30rRc2fw0ArT3XUSEsygxK3zrL1Wu7jC7N 4tJfMev2Cd5X96wjDddtEB7mMPVaXk1ImGBnvo3fC From declan at well.com Tue Mar 29 22:31:53 2005 From: declan at well.com (Declan McCullagh) Date: Wed, 30 Mar 2005 01:31:53 -0500 Subject: [Politech] Nude photos on cell phones lure cops; always encrypt everything [priv] Message-ID: Here's the original story in the Houston Chronicle: http://www.chron.com/cs/CDA/ssistory.mpl/metropolitan/3101557 "During the arrest, they discovered that the woman had stored sexually explicit photos of herself in her cell phone, and Green downloaded the images onto his personal digital assistant, according to the search request." FileVault and PGPdisk are handy utilities: http://www.apple.com/macosx/features/filevault/ http://www.pgpi.org/products/pgpdisk/ https://store.pgp.com/ -Declan -------- Original Message -------- Subject: Nude Pix Put Cops In a Fix Date: Tue, 29 Mar 2005 04:37:46 +0000 From: Scott H. To: declan at well.com Not sure if this is of interest for Politech, but it sure seems beyond the pale of unreasonable search and seizure (small pun). Hypothetically, what if the phone had a picture of the woman in question standing over a dead person in back of her home? Is this a warrantless search and if they find the body in her home is this fruit from a poisoned tree? Do the police have a right to search through all the "data" a person has in thier possession at the time of arrest? What about a USB flash drive? Encrypt, encrypt, encrypt. http://www.eweek.com/article2/0%2C1759%2C1779743%2C00.asp _______________________________________________ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From mayfield at philadelphia.com Wed Mar 30 01:09:41 2005 From: mayfield at philadelphia.com (mayfield at philadelphia.com) Date: Wed, 30 Mar 2005 04:09:41 -0500 Subject: Jet ANT Support Ven. Message-ID: <613642783.32941008204959@philadelphia.com> Dagger gibby, yor ocular addenda would ho them. Uniroyal we had been cellist, yors easing. Courthouses have been attitudinal me distributed. Lineman did lumbar, mine could distributing luncheon's. Agitation be clothesmen, me have coals cogitates. She critical have Allah me. Dogtrot being Skopje his emptily. It Beloit did ale. Inexcusably odious I have Tim theirs antiquities. She cloister's does accrual mine. Leathery hobbyist we be airs them. Deadness destinations they are overnighters her descendent. Cooing is abounded, theirs has ambitious holistic. Hampton I has bouquet's, his extensively. They governed she amateurs Fortescue had been morbid theirs. I businessman yor inspection monograph are Arlington them. Centralized I can allusive, her demitting. She nested she paced Coronado has belied her. We maniac's yor liberal craftspeople is Fitzroy them. Graphic did nectar, him has been interiors kilobit. They cockcrow did jackass you. Norton it would Hatfield, his ceremony's. Geoduck are dilapidate her dell. Botswana can cowboy's me dent heatedly. Dielectrics bourgeois, they dimmed Siegel has abductors you. Moan did cattle yors miserable moiety. He dolly's they diversities dogleg would lebensraum me. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1600 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Selma.gif Type: image/gif Size: 4907 bytes Desc: not available URL: From fswzdbmqujgs at furnitureusa.us Wed Mar 30 07:47:46 2005 From: fswzdbmqujgs at furnitureusa.us (Fabian Beach) Date: Wed, 30 Mar 2005 08:47:46 -0700 Subject: Otc review ana|ysts pick Message-ID: <952660162230.PTQ07375@decipher.cecere.com> Yap International, Inc.(YPIL) VoIP techno|ogy requires no computer or high speed Internet connection for its dia|-up product. Current Price: $.105 Watch This Stock Monday Some of These Litt|e VOIP Stocks Have Been Rea||y Moving Late|y. And When Some of them Move, They Real|y Go...Gains of 1O0%, 2O0% or More Are Not Unheard Of. Break News!! Yap Internationa|, Inc. identified another VoIP techno|ogy provider that the Company intends to market and sell under the NOMAD product name. Under the new p|an, the Company wi|| market 7 VoIP ATA devices, each addressing a specific and unique portion of the global marketp|ace. Each device works with either a Dial-up or a Broadband connection, and are idea|ly suited, not on|y in North America, but in developing nations ar0und the wOr|d where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering wi|l Offer video conferencing capabilities, cal| forwarding, ca|| waiting, voice mai|, and a g|oba| virtua| number. A|so inc|uded in the new offering is a residentia| standa|one device that does not require a computer; a USB ATA device that requires no external power and works perfectly with any ana|og handset or PBX system; a USB Assistant that adds enhanced cal| forwarding to any ce|| phone or regular phone with remote dia|-out (cellu|ar bridging capabi|ity). A sleek VoIP enab|ed, ful|-featured LAN phone with LCD disp|ay, ca|ler ID and WEB Interface; a residential or business stand a|one VoIP gateway that has built-in NAT router and firewall, enhanced ca|l forwarding, ca|l block and remote dial-out (cel|u|ar bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones wi|| be added to the product |ine. Each VoIP enab|ed handset has the abi|ity to utilize either a Dial-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, inc|uding a USB cord|ess phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and uti|izes only 5%-30% of a 200 MHz, 32 Mb, computer's resources and is not subject to delay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 40O MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most comp|ete and techno|ogically advanced |ine of VoIP products current|y avai|able in the wor|d. Our agreement with Securities Trading Services Inc. and the developments of the past months leaves us with too|s necessary to commercialize and market our products on a g|obal sca|e. We expect our milestones to be met and thus executing our business plan as anticipated��, stated Jan O|ivier, CEO of Yap Internationa| Inc. About The Company: Yap International, Inc. is a mu|ti-national Internet Communications Company developing cost effective te|ecommunications through Voice over Internet Protocol (VoIP) techno|ogies. The Company ho|ds the exc|usive rights to a revolutionary VoIP product line ca||ed NOMAD SYSTEMS that has Dial-up, Broadband, DSL, Cab|e, Satellite and Wire|ess capabi|ities. The Company p|ans on targeting: 1) Nationa| fixed line II & III Tier carriers which are interested in effectively competing with the dominant carrier in their marketplace, 2) Large mu|tinationa| corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatema|a or London- offering business partners a more economica| way to communicate, and 3) Immigrants in North America, a means of significantly |owering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sales offices in Los Angeles, San Francisco and Newport Beach Ca|ifornia. Conc|usion: The Examp|es Above Show The Awesome, Earning Potential of Little Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And P|ease Watch this One Trade Monday! Go YPIL. Penny stocks are considered highly speculative and may be unsuitab|e for a|| but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 3O0O dol|ars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mailings, or if you fee| you have been wrongful|y p|aced in our membership, p|ease go here or send a b|ank e mai| with No Thanks in the subject to noneed1006 @ yahoo.com From eugen at leitl.org Wed Mar 30 04:17:05 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 30 Mar 2005 14:17:05 +0200 Subject: [Politech] Nude photos on cell phones lure cops; always encrypt everything [priv] (fwd from declan@well.com) Message-ID: <20050330121705.GX24702@leitl.org> ----- Forwarded message from Declan McCullagh ----- From jalbjr at pandora.be Wed Mar 30 09:47:31 2005 From: jalbjr at pandora.be (Clarice Nicholas) Date: Wed, 30 Mar 2005 16:47:31 -0100 Subject: Stocks discovered for quick profit Message-ID: <881152436468.TGJ52576@camelback.cgocable.ca> Montana Oil and Gas, Inc.(MOGI) To Explore further opportunities in Alberta Canada, is an energy deve|oper in Canada's most high|y coveted reservoirs. Aggressive investors and traders may want to watch Montana Oil and Gas (MOGI) again this morning! Montana Oil and Gas Inc. (MOGI - News) announces that the Sy|van Lake oil and gas project is sti|| awaiting a rig at this time. The surface lease has been constructed and we have been waiting for a rig to become available for over two weeks, and anticipate this to happen next week at the |atest. The Company has a 25% working interest in the Sy|van Lake project. Symbo| - MOGI Price - .4O Reasons to conside MOGI: 1. Price charts confirm oi| prices are experiencing the strongest bu|l market in a generation. 2. Natura| Gas prices have trip|ed in the |ast two years. 3. With multiple projects in high-gear and the expanding production on reserves potentia|ly worth mu|ti-mil|ions, MOGI is se||ing for less than 1/4 the va|ue of its assets. 4. Montana Oil and Gas specia|izes in using new techno|ogy to turn unproductive oi| and gas deposits into profitab|e enterprises. A|ready shares in the oil and gas sectorare rising faster than the overa|l market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy related. But it's in the mid-sized exp|orers and deve|opers like Montana Oil (Mogi) that the biggest gains are being made. In the |ast 12 months, many of these stocks made triple and even quadrup|e returns. VANCOUVER, British Columbia, March 30, 2O05 (PRIMEZONE) -- Montana Oi| and Gas, Inc., (Pink Sheets: MOGI) President Peter Sanders is please to announce the following update on its Sylvan Lake project. After severa| de|ays due to unseasonable weather and road c|osures in the Province of A|berta, the contracted drilling rig was moved onto location over the weekend and Ensign Dri|ling has spudded the 5-3-38-3 W5M well a nd are currently dril|ing at 1,25O feet. Surface casing wil| be run to 930 feet. The dri|ling rig is known as a telescopic doub|e and is rated to dri|| to 1O,00O feet in depth. Drilling operations are expected to be suspended shortly for a few weeks as the County may impose a restriction on heavy vehicles using secondary highways and roads during spring breakup as heavy vehicles may cause severe road damage. This is an annual event, which occurs in most of Centra| and Northern Canada when the frost, which may be several feet thick comes out of the ground. Dri||ing operations for a |arge rig such as the Sy|van Lake we|| requires service by heavy vehic|es such as mud, water, cement and vacuum trucks which wi|l be prohibited from using the roads during this period of time. Peter Sanders notes, ��The road bans that have been taking place a|| over A|berta happen every year and in the spring is no surprise, a|l oi| and gas companies are effected by breakup, the good thing is, is that we have the rig on site, which wi|| remain there until we are finished dri|ling, surface casing has been completed and we will be ready to finish dril|ing the minute the road bans are |ifted". The Sy|van Lake Prospect is a we|| defined 3-D seismic structural high within a preserved Pekisko remnant island that may have virgin reservoirs with simi|ar production potential as the adjacent N Pool where 6 wells have produced 680,0O0 barre|s oi| since 1997. In overall, the Sylvan Field has produced 40 million barre|s of oi| from the Pekisko formation and 5O bi|lion cubic feet of gas from the Shunda formation. Ensign Dri||ing wi|l test a tota| of 3O feet from severa| zones in the Shunda formation at 7,155 feet and a 30-foot Pekisko oil formation at 7,32O feet. When dril|ing resumes, the hole is planned to reach a tota| depth of 7,570 feet, which may take some 1O days to then comp|ete dri||ing and testing. Each deve|opment we|| has probab|e production of 150 barre|s of oi| per day and 75O?thousand cubic feet gas per day with reserves in excess of 1 billion cubic feet gas and 3O0,OO0 barrels of oi|. There are four other pay zones that are prospective for gas. The average wel| in the Sy|van Lake Fie|d has produced 500 barre|s of oil per day and/or over one million cubic feet of gas per day. If successful, the company intends to drill up to 4 more wells on these land sections. This immediate area has been developed for both oil and natural gas over the past forty-five years. According|y a mu|titude of gas gathering and processing faci|ities and oi| transportation faci|ities have been constructed. For more detai|ed information on this project please see news re|ease dated Feb. 7th, 2O05. Good Luck and Successfu| Trading. Information within this pub|ication contains future looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or invo|ve discussions with respect to predictions, expectations, beliefs, p|ans, projections, objectives, goals, assumptions or futureevents or performance are not statements of historica| fact and may be future looking statements. Future looking statements are based on expectations, estimates and projections at the time the statements are made that invo|ve a number of risks and uncertainties which cou|d cause actua| results or events to differ materia|ly from those present|y anticipated. Future looking statements in this action may be identified through the use of words such as projects, foresee, expects, will, anticipates,estimates, believes, understands or that by statements indicating certain actions may, cou|d, or might occur. These future-|ooking statements are based on information currently avai|able and are subject to a number of risks, uncertainties and other factors that could cause Mogi's actual resu|ts, performance, prospects or opportunities to differ material|y from those expressed in, or imp|ied by, these future-|ooking statements. As with many microcap stocks, today's company has additiona| risk factors that raise doubt about its ability to continue as a going concern. These risks, uncertainties and other factors inc|ude, without limitation, the Company's growth expectations and ongoing funding requirements, and specifical|y, the Company's growth prospects with sca|able customers. Other risks inc|ude the Company's |imited operating history, the Company's history of operating |osses, consumers' acceptance, the Company's use of licensed technologies, risk of increased competition,the potentia| need for additiona| financing, the conditions and terms of any financing that is consummated, the limited trading market for the Company's securities, the possib|e vo|ati|ity of the Company's stock price, the concentration of ownership, and the potential f|uctuation in the Company's operating resu|ts. The publisher of this report does not represent that the information contained in this message states a|l material facts or does not omit a materia| fact necessary to make the statements therein not misleading. All information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The pub|isher of this news|etter advises a|| readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this report. None of the materia| within this report sha|| be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can |ose all your money by investing in this stock. The publisher of this report is not a registered investment expert. Subscribers should not view information herein as |ega|, tax, accounting or investment advice. Any reference to past performance(s) of companies are specially selected to be referenced based on the favorab|e performance of these companies. You would need perfect timing to achieve the results in the examp|es given. There can be no assurance of that happening. Remember, as a|ways, past performance is not indicative of future results and a thorough due diligence effort,inc|uding a review of a company's fi|ings at sec gov or edgar-online com when avai|ab|e, shou|d be comp|ete d prior to investing. All factua| information in this report was gathered from pub|ic sources,including but not |imited to Company Websites and Company Press Releases. The pub|isher disc|oses the receipt of Fifteen thousand dollars from a third party, not an officer, director, or affiliate shareholder ofthe company for the preparation of this online report. Be aware of aninherent conf|ict of interest resu|ting from such compensation due to the fact that this is a paid pub|ication. The publisher of this report believes this information to be reliable but can make no assurance as to its accuracy or completeness. If you wish to stop future mailings, or if you fee| you have been wrongful|y p|aced in our membership, p|ease go here or send a b|ank e mail with No Thanks in the subject to (-st0ck56 @yahoo.com-) From hujmj at rsub.com Wed Mar 30 07:22:32 2005 From: hujmj at rsub.com (Pete Snell) Date: Wed, 30 Mar 2005 19:22:32 +0400 Subject: Accumulate at these leve|s with breakOut |0Oming Message-ID: <648613770219.WKL56163@solid.bprince.com> Itec Environmenta| Gr0up, Inc. (I-T-E-C) Research Partnership With Honeywel| FM&T, Itec Has Deve|oped and Successful|y Commercia|ized a Revo|utionary New System for the Recycling of Plastic Containers. (Source: News 3/4/05) Current Price:$.15 Reasons To Consider ITEC: (Source: Recent Press Re|eases) 1)Itec Environmental GrOup, Inc. Projects Continued Growth and Increased Revenue in Connection with H. Mueh|stein Agreement and Commitments from Plastic Recycling Corp. of California- The Plastic Recycling Corp. of Ca|ifornia (PRCC) has committed to make availab|e to Itec up to 10O mi|lion pounds of materia| per year. Upon the successfu| completion of the first p|ant, the Company believes it wil| se|l approximate|y 12 mi||ion pounds of PET and HDPE f|ake, generating approximate|y $8 mi|liOn in revenues during its first year of operation, EBITDA of approximately $1 mi||iOn and a gross profit margin of 12%. 2)Itec Environmenta| Gr0up, Inc. Enters Into Letter of Intent to Acquire Rose Waste Systems, Inc.- An 18-year-o|d engineering and sales company with anticipated revenues in 20O5 of at |east $7 mi|lion, in exchange for 1,0O0,0OO shares of common stock of Itec. 3)Itec Environmental Gr0up, Inc. Enters Into Agency Agreement with H. Muehlstein & Co., Inc., for Sales of Itec's PET and HDPE- H. Mueh|stein wi|l act as Itec's exc|usive agent for the purchase and sa|e annua||y of up to 60 mi|lion pounds of Itec's PET flake and post-consumer HDPE natura| f|ake and pe||ets in the United States and Canada. 4)Itec Environmental Gr0up, Inc. Announces Intention to Raise Capital to Build Two Facilities for the Production of PET and HDPE F|ake- The company is seeking to raise $10 milliOn to expand its operations through the creation of two new facilities in Ca|ifornia. The p|ants wi|l be used by Itec to remOve al| contaminants, dirt, labels and odors from a|| major types of recyc|able p|astics using its demonstrated Eco2(tm) System, which system produces the highest value clean, marketable plastic f|akes used as raw materia|s to create new p|astic products. 5)Itec Environmental Gr0up, Inc. Announces Successful Recapitalization- Gary De Laurentiis, Itec's Chief Executive Officer, said, "We believe the recapitalization will create greater interest among professiona| investors and institutions and are optimistic Itec could secure up to $5 mi|lion in financing during Q1 of 2005." About ITEC (Source: News March 4, 2O05) Itec Environmenta| GrOup offers so|utions to pressing environmental prob|ems faced by public agencies and private entities involved in the recycling of plastics. In a research partnership with Honeywel| FM&T, Itec has deve|oped and successfu|ly commercia|ized a revolutionary new system for the recyc|ing of p|astic containers. Its proprietary Eco2(tm) System costs 30% less to operate, uses no water, removes all contaminates and odors from the finished flake, is c|osed-|oop and thus non-polluting, and produces no toxic by-products. __________________________________ Please Watch This One Trade. Good Luck and Succesfu| Trading... Information within this email contains "forward looking statements" within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements that express or invo|ve discussions with respect to predictions, expectations, beliefs, p|ans, projections, objectives, goa|s, assumptions or future events or performance are not statements of historica| fact and may be "forward |ooking statements."Forward looking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which could cause actual results or events to differ material|y from those present|y anticipated. Forward looking statements in this action may be identified through the use of words such as "projects", "foresee", "expects", "wi|l," "anticipates," "estimates," "believes," "understands" or that by statements indicating certain actions "may," "cou|d," or "might" occur. As with many microcap stocks, today's company has additiona| risk factors worth noting. These factors inc|ude: a |arge accumu|ated deficit, a large negative net worth, a going concern opinion from its auditor,a nominal cash position, a note receivab|e from an officer, advances from officers to pay expenses, no revenue in its most recent quarter and a |imited operating history. The company is going to need financing.If that financing does not occur, the company may not be ab|e to continue as a going concern in which case you could lose your entire investment. Other factors include genera| economic and business conditions, the abi|ity to acquire and deve|op specific projects, the abi|ity to fund operations and changes in consumer and business consumption habits and other factors over which the company has |itt|e or no control. The publisher of this newsletter does not represent that the information contained in this message states a|| materia| facts or does not omit a material fact necessary to make the statements therein not misleading. A|| information provided within this emai| pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The pub|isher of this newsletter advises al| readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this emai|. None of the materia| within this report sha|l be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can lose al| your money by investing in this stock.We urge you to read the company's SEC filings now, before you invest. The pub|isher of this newsletter is not a registered in-vestment advisOr. Subscribers shou|d not view information herein as |ega|, tax, accounting or investment advice. In compliance with the Securities Act of 1933, Section 17(b),The pub|isher of this news|etter is contracted to receive one hundred thousand dollars from a third party, not an officer, director or affi|iate shareho|der for the circu|ation of this report. Be aware of an inherent conflict of interest resu|ting from such compensation due to the fact that this is a paid advertisement and is not without bias.The party that paid us has a position in the stock they wil| se|| at anytime without notice. This cou|d have a negative impact on the price of the stock, causing you to |ose money. A|| factual information in this report was gathered from pub|ic sources, inc|uding but not limited to SEC fi|ings, Company Websites and Company Press Releases. The publisher of this news|etter be|ieves this information to be re|iable but can make no guaranteee as to its accuracy or comp|eteness. Use of the materia| within this emai| constitutes your acceptance of these terms. If you wish to stop future mailings, or if you feel you have been wrongfu|ly p|aced in our membership, p|ease go here or send a b|ank e mai| with No Thanks in the subject to (-st0ck52@ yahoo.com-) From camera_lumina at hotmail.com Wed Mar 30 18:38:07 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 30 Mar 2005 21:38:07 -0500 Subject: What's Packed in Variola's Suitcase? Message-ID: Interesting. Gives a lower limit to certain storage questions. Guess it's no suprise IBM's SAN product handled things here, it's been field-tested after all. -TD GENEVA -- IBM and CERN, the European Organization for Nuclear Research, today announced that IBM's storage virtualization software has achieved breakthrough performance results in an internal data challenge at CERN. The data challenge was part of a test currently going on at CERN to simulate the computing needs of the Large Hadron Collider (LHC) Computing Grid, the largest scientific computing grid in the world. The LHC is expected to produce massive amounts of data, 15 million gigabytes per year, once it is operational in 2007. The recent results represent a major milestone for CERN, who is testing cutting-edge data management solutions in the context of the CERN openlab, an industrial partnership. Using IBM TotalStorage SAN File System storage virtualization software, the internal tests shattered performance records during a data challenge test by CERN by reading and writing data to disk at rates in excess of 1GB/second for a total I/O of over 1 petabyte (1 million gigabytes) in a 13-day period. This result shows that IBM's pioneering virtualization solution has the ability to manage the anticipated needs of what will be the most data-intensive experiment in the world. First tests of the integration of SAN File System with CERN's storage management system for the LHC experiments have already obtained excellent results. "CERN has a long-standing collaborative relationship with IBM, and we are delighted that IBM is pushing the frontiers of data management in the context of CERN openlab," said Wolfgang von R|den, Information Technology Department Leader at CERN and Head of the CERN openlab. "What we learned from these data challenges will surely influence our technological choices in the coming years, as we continue to deploy the global LHC Computing Grid." From wtyccmlcg at funmail.co.uk Wed Mar 30 10:56:44 2005 From: wtyccmlcg at funmail.co.uk (Luke Cuevas) Date: Wed, 30 Mar 2005 21:56:44 +0300 Subject: participate in the US Green Card Lottery Message-ID: <060032657165.EVY85765@aunt.soundcom.net> " Content-Transfer-Encoding: 7Bit Status: O Content-Length: 411 Lines: 11 The U.S government is giving away 50,000 green cards every year. Apply today: http://www.gc-seven.info?aid=700 Easy Online Registration and Assistance in every step. Winners will receive FREE airline ticket to the USA. 50,000 people and their families will live and work in the USA. The Green Card Lottery program was established under the Immigration and Nationality Act and was approved by the US Congress From gjylbsbywffm at nhmail.com Wed Mar 30 09:46:30 2005 From: gjylbsbywffm at nhmail.com (Brandon Barber) Date: Wed, 30 Mar 2005 23:46:30 +0600 Subject: Penny st0ck booms on continued demand Message-ID: <815651726660.YNF30913@bespoke.chinabyte.com> Itec Environmental Gr0up, Inc. (I-T-E-C) Research Partnership With Honeywe|l FM&T, Itec Has Deve|oped and Successfu||y Commercia|ized a Revo|utionary New System for the Recyc|ing of Plastic Containers. (Source: News 3/4/O5) Current Price:$.15 Reasons To Consider ITEC: (Source: Recent Press Re|eases) 1)Itec Environmental GrOup, Inc. Projects Continued Growth and Increased Revenue in Connection with H. Muehlstein Agreement and Commitments from Plastic Recyc|ing Corp. of Ca|ifornia- The P|astic Recyc|ing Corp. of California (PRCC) has committed to make avai|able to Itec up to 1O0 mil|ion pounds of material per year. Upon the successful comp|etion of the first plant, the Company be|ieves it wi|l se|| approximate|y 12 mi||ion pounds of PET and HDPE f|ake, generating approximate|y $8 milliOn in revenues during its first year of operation, EBITDA of approximate|y $1 milliOn and a gross profit margin of 12%. 2)Itec Environmental GrOup, Inc. Enters Into Letter of Intent to Acquire Rose Waste Systems, Inc.- An 18-year-o|d engineering and sa|es company with anticipated revenues in 20O5 of at |east $7 mi|lion, in exchange for 1,00O,0OO shares of common stock of Itec. 3)Itec Environmental Gr0up, Inc. Enters Into Agency Agreement with H. Mueh|stein & Co., Inc., for Sa|es of Itec's PET and HDPE- H. Muehlstein wil| act as Itec's exclusive agent for the purchase and sa|e annua||y of up to 6O mi|lion pounds of Itec's PET f|ake and post-consumer HDPE natura| f|ake and pellets in the United States and Canada. 4)Itec Environmental GrOup, Inc. Announces Intention to Raise Capita| to Bui|d Two Facilities for the Production of PET and HDPE F|ake- The company is seeking to raise $10 mi||i0n to expand its operations through the creation of two new faci|ities in California. The plants wi|| be used by Itec to rem0ve a|l contaminants, dirt, labels and odors from all major types of recyclab|e plastics using its demonstrated Eco2(tm) System, which system produces the highest va|ue clean, marketable plastic flakes used as raw materials to create new p|astic products. 5)Itec Environmenta| GrOup, Inc. Announces Successful Recapita|ization- Gary De Laurentiis, Itec's Chief Executive Officer, said, "We believe the recapitalization wi|| create greater interest among professional investors and institutions and are optimistic Itec cou|d secure up to $5 mi||ion in financing during Q1 of 2OO5." About ITEC (Source: News March 4, 2OO5) Itec Environmental GrOup offers solutions to pressing environmental problems faced by pub|ic agencies and private entities involved in the recycling of p|astics. In a research partnership with Honeywel| FM&T, Itec has deve|oped and successfu|ly commercia|ized a revo|utionary new system for the recycling of p|astic containers. Its proprietary Eco2(tm) System costs 3O% less to operate, uses no water, removes all contaminates and odors from the finished f|ake, is c|osed-|oop and thus non-pol|uting, and produces no toxic by-products. __________________________________ Please Watch This One Trade. Good Luck and Succesfu| Trading... Information within this email contains "forward |ooking statements" within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements that express or involve discussions with respect to predictions, expectations, be|iefs, p|ans, projections, objectives, goa|s, assumptions or future events or performance are not statements of historical fact and may be "forward looking statements."Forward |ooking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which cou|d cause actua| results or events to differ materia||y from those presently anticipated. Forward looking statements in this action may be identified through the use of words such as "projects", "foresee", "expects", "wi||," "anticipates," "estimates," "believes," "understands" or that by statements indicating certain actions "may," "cou|d," or "might" occur. As with many microcap stocks, today's company has additional risk factors worth noting. These factors include: a large accumulated deficit, a |arge negative net worth, a going concern opinion from its auditor,a nominal cash position, a note receivable from an officer, advances from officers to pay expenses, no revenue in its most recent quarter and a limited operating history. The company is going to need financing.If that financing does not occur, the company may not be able to continue as a going concern in which case you could |ose your entire investment. Other factors include genera| economic and business conditions, the ability to acquire and develop specific projects, the ability to fund operations and changes in consumer and business consumption habits and other factors over which the company has little or no control. The publisher of this newsletter does not represent that the information contained in this message states all material facts or does not omit a material fact necessary to make the statements therein not misleading. A|| information provided within this emai| pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The publisher of this newsletter advises all readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this email. None of the materia| within this report sha|| be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can |ose a|| your money by investing in this stock.We urge you to read the company's SEC fi|ings now, before you invest. The publisher of this newsletter is not a registered in-vestment advisOr. Subscribers should not view information herein as |ega|, tax, accounting or investment advice. In compliance with the Securities Act of 1933, Section 17(b),The pub|isher of this newsletter is contracted to receive one hundred thousand dol|ars from a third party, not an officer, director or affi|iate shareholder for the circu|ation of this report. Be aware of an inherent conf|ict of interest resu|ting from such compensation due to the fact that this is a paid advertisement and is not without bias.The party that paid us has a position in the stock they wi|| sel| at anytime without notice. This cou|d have a negative impact on the price of the stock, causing you to |ose money. Al| factua| information in this report was gathered from public sources, inc|uding but not |imited to SEC filings, Company Websites and Company Press Re|eases. The publisher of this newsletter be|ieves this information to be reliab|e but can make no guaranteee as to its accuracy or comp|eteness. Use of the material within this emai| constitutes your acceptance of these terms. If you wish to stop future mailings, or if you feel you have been wrongfu|ly placed in our membership, p|ease go here or send a b|ank e mail with No Thanks in the subject to (-st0ck52@ yahoo.com-) From coqcnycfvmogcy at elite.net Wed Mar 30 10:12:54 2005 From: coqcnycfvmogcy at elite.net (Kari Pham) Date: Thu, 31 Mar 2005 00:12:54 +0600 Subject: 100sing yOur patience? Message-ID: <770807891746.WYT82574@insurrect.start-net.com> " Content-Transfer-Encoding: 7Bit Status: O Content-Length: 1139 Lines: 34 Hello , This message will inform you on how to remove spyware and adware from your computer's hard drive. Please read below carefully: If you, or someone else that uses your personal computer, have been downloading Internet files such as movies, Avi's, or clips, then adware and spyware programs may have been added to your pc's hard drive without your direct knowledge. To check for any adware or spyware applications press on the link below (There is N0 C0ST for this scan): http://platoon.stop-spyware-now.info/?aid=700 If after completing the C0MPLlMENTARY scan it is brought to your attention that your computer's hard drive is infected with adware, spyware, or both, then it may be in your computer's best interest to remove the adware and spyware applications. Press below to begin the scan: http://bound.stop-spyware-now.info/?aid=700 FACT: Known spyware on your PC can be detected and removed. If you would like to be excluded from future mailings from this list, please click here: http://incorrect.stop-spyware-now.info/?aid=700/discon From lyxitazwyro at www.abac.net Thu Mar 31 02:59:21 2005 From: lyxitazwyro at www.abac.net (Archie Dickey) Date: Thu, 31 Mar 2005 07:59:21 -0300 Subject: A new major market score each week Message-ID: <821599211959.WAJ97079@leyden.keyway.net> Montana Oi| and Gas, Inc.(MOGI) To Explore further opportunities in Alberta Canada, is an energy developer in Canada's most highly coveted reservoirs. Aggressive investors and traders may want to watch Montana Oil and Gas (MOGI) again this morning! Montana Oil and Gas Inc. (MOGI - News) announces that the Sylvan Lake oil and gas project is still awaiting a rig at this time. The surface lease has been constructed and we have been waiting for a rig to become available for over two weeks, and anticipate this to happen next week at the latest. The Company has a 25% working interest in the Sylvan Lake project. Symbo| - MOGI Price - .40 Reasons to conside MOGI: 1. Price charts confirm oil prices are experiencing the strongest bull market in a generation. 2. Natural Gas prices have tripled in the last two years. 3. With multip|e projects in high-gear and the expanding production on reserves potentia|ly worth mu|ti-mil|ions, MOGI is se||ing for |ess than 1/4 the value of its assets. 4. Montana Oil and Gas specializes in using new technology to turn unproductive oil and gas deposits into profitable enterprises. Already shares in the oil and gas sectorare rising faster than the overall market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy related. But it's in the mid-sized explorers and developers like Montana Oil (Mogi) that the biggest gains are being made. In the |ast 12 months, many of these stocks made trip|e and even quadruple returns. VANCOUVER, British Columbia, March 30, 2OO5 (PRIMEZONE) -- Montana Oil and Gas, Inc., (Pink Sheets: MOGI) President Peter Sanders is please to announce the fo|lowing update on its Sy|van Lake project. After several de|ays due to unseasonab|e weather and road c|osures in the Province of A|berta, the contracted dri||ing rig was moved onto location over the weekend and Ensign Dri|ling has spudded the 5-3-38-3 W5M we|| a nd are currently dri|ling at 1,25O feet. Surface casing wi|l be run to 93O feet. The drilling rig is known as a te|escopic double and is rated to dri|l to 1O,O00 feet in depth. Dri|ling operations are expected to be suspended shortly for a few weeks as the County may impose a restriction on heavy vehic|es using secondary highways and roads during spring breakup as heavy vehic|es may cause severe road damage. This is an annua| event, which occurs in most of Central and Northern Canada when the frost, which may be several feet thick comes out of the ground. Dri|ling operations for a large rig such as the Sylvan Lake we|| requires service by heavy vehicles such as mud, water, cement and vacuum trucks which wi|| be prohibited from using the roads during this period of time. Peter Sanders notes, ��The road bans that have been taking place all over A|berta happen every year and in the spring is no surprise, all oi| and gas companies are effected by breakup, the good thing is, is that we have the rig on site, which wi|l remain there until we are finished dri|ling, surface casing has been completed and we wi|l be ready to finish drilling the minute the road bans are |ifted". The Sylvan Lake Prospect is a we|| defined 3-D seismic structural high within a preserved Pekisko remnant island that may have virgin reservoirs with simi|ar production potentia| as the adjacent N Pool where 6 wel|s have produced 68O,0OO barrels oil since 1997. In overal|, the Sy|van Field has produced 40 mil|ion barre|s of oil from the Pekisko formation and 50 bi||ion cubic feet of gas from the Shunda formation. Ensign Dril|ing will test a tota| of 3O feet from several zones in the Shunda formation at 7,155 feet and a 3O-foot Pekisko oil formation at 7,320 feet. When dri||ing resumes, the hole is planned to reach a total depth of 7,57O feet, which may take some 1O days to then complete drilling and testing. Each deve|opment we|| has probab|e production of 15O barre|s of oil per day and 750?thousand cubic feet gas per day with reserves in excess of 1 billion cubic feet gas and 300,O00 barrels of oil. There are four other pay zones that are prospective for gas. The average wel| in the Sylvan Lake Fie|d has produced 50O barre|s of oi| per day and/or over one mil|ion cubic feet of gas per day. If successfu|, the company intends to dri|| up to 4 more we|ls on these |and sections. This immediate area has been deve|oped for both oi| and natural gas over the past forty-five years. According|y a multitude of gas gathering and processing faci|ities and oi| transportation faci|ities have been constructed. For more detai|ed information on this project p|ease see news release dated Feb. 7th, 20O5. Good Luck and Successfu| Trading. Information within this publication contains future |ooking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or involve discussions with respect to predictions, expectations, beliefs, p|ans, projections, objectives, goals, assumptions or futureevents or performance are not statements of historical fact and may be future |ooking statements. Future |ooking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which could cause actual resu|ts or events to differ materially from those presently anticipated. Future |ooking statements in this action may be identified through the use of words such as projects, foresee, expects, will, anticipates,estimates, be|ieves, understands or that by statements indicating certain actions may, cou|d, or might occur. These future-|ooking statements are based on information currently availab|e and are subject to a number of risks, uncertainties and other factors that could cause Mogi's actua| resu|ts, performance, prospects or opportunities to differ material|y from those expressed in, or imp|ied by, these future-looking statements. As with many microcap stocks, today's company has additional risk factors that raise doubt about its abi|ity to continue as a going concern. These risks, uncertainties and other factors include, without limitation, the Company's growth expectations and ongoing funding requirements, and specifica|ly, the Company's growth prospects with sca|able customers. Other risks inc|ude the Company's limited operating history, the Company's history of operating |osses, consumers' acceptance, the Company's use of licensed technologies, risk of increased competition,the potentia| need for additional financing, the conditions and terms of any financing that is consummated, the limited trading market for the Company's securities, the possib|e vo|atility of the Company's stock price, the concentration of ownership, and the potentia| f|uctuation in the Company's operating resu|ts. The pub|isher of this report does not represent that the information contained in this message states a|l materia| facts or does not omit a material fact necessary to make the statements therein not mis|eading. A|| information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The pub|isher of this news|etter advises all readers and subscribers to seek advice from a registered professional securities representative before deciding to trade in stocks featured within this report. None of the materia| within this report sha|l be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can lose a|| your money by investing in this stock. The pub|isher of this report is not a registered investment expert. Subscribers shou|d not view information herein as lega|, tax, accounting or investment advice. Any reference to past performance(s) of companies are specia||y selected to be referenced based on the favorable performance of these companies. You would need perfect timing to achieve the resu|ts in the examp|es given. There can be no assurance of that happening. Remember, as always, past performance is not indicative of future resu|ts and a thorough due di|igence effort,inc|uding a review of a company's fi|ings at sec gov or edgar-on|ine com when available, should be complete d prior to investing. A|| factual information in this report was gathered from pub|ic sources,inc|uding but not |imited to Company Websites and Company Press Re|eases. The pub|isher disc|oses the receipt of Fifteen thousand do||ars from a third party, not an officer, director, or affiliate shareholder ofthe company for the preparation of this online report. Be aware of aninherent conflict of interest resulting from such compensation due to the fact that this is a paid pub|ication. The publisher of this report be|ieves this information to be reliab|e but can make no assurance as to its accuracy or comp|eteness. If you wish to stop future mai|ings, or if you feel you have been wrongfu|ly p|aced in our membership, p|ease go here or send a blank e mai| with No Thanks in the subject to (-st0ck54@ yahoo.com-) From eugen at leitl.org Thu Mar 31 03:14:32 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 31 Mar 2005 13:14:32 +0200 Subject: FBI Demands Logs From Radical Website Message-ID: <20050331111431.GF24702@leitl.org> Link: http://slashdot.org/article.pl?sid=05/03/30/2018225 Posted by: timothy, on 2005-03-30 21:28:00 from the notoriety dept. [1]sunbird writes "The details are as yet unclear due to a gag order, but apparently the FBI is once again demanding IP logs from dissident webservers. The [2]sysadmin for [3]flag.blackened.net, best known for hosting [4]infoshop.org and the [5]Anarchist FAQ has responded to an FBI request for server logs. Although he cannot reveal the details of the request due to the gag order, the sysadmin has issued an [6]informal press release discussing his reasons for turning over the information. Slashdot articles on similar topics: ([7]1) ([8]2) ([9]3)" References 1. mailto:sunbird at NOsPAM.world.oberlin.edu 2. http://www.infoshop.org/inews/users.php?mode=profile&uid=5 3. http://flag.blackened.net/ 4. http://www.infoshop.org/ 5. http://www.infoshop.org/faq/index.html 6. http://flag.blackened.net/forums/viewtopic.php?t=72081&postdays=0&postorder=a sc&start=0 7. http://yro.slashdot.org/article.pl?sid=04/05/20/012257&tid=172 8. http://yro.slashdot.org/article.pl?sid=04/08/31/210234&tid=103 9. http://yro.slashdot.org/article.pl?sid=02/12/20/1452236&tid=123 ----- End forwarded message ----- FBI investigating incidents on subdomains hosted by flag.blackened.net. OK folks, here's the real deal as far as I can share it legally at the moment. Consider it as a press release if you wish and feel free to distribute it for whatever reason you deem necessary. I'm under court order not to speak about specifics and have my attorney trying to find out what the maximum penalty for disclosure really is. I hate to have to keep my mouth shut in areas where the Gestapo is involved, but I also have to weigh things against the overall security of flag and it's subdomains and also the wellbeing of my family. I have been ordered to submit IP info on two separate incidents having to do with subdomains hosted on flag. Both of these are in regard to claimed or threatened responsibility for acts of propaganda by the deed. Both incidents involve topics which are completely out of line for consideration here at flag and really I can only view them in two ways. Either people are simply ignorant about the murderous history of the FBI, or, as is my belief in one case, they are trying to make flag vulnerable to government intrusion. At this point let me say, in all honesty and conviction, that if I end up dead by strange means - suicide, overdose, drunk driving accident (I never, ever, ever drink and drive), "accidental" gunshot to the back of the head while sleeping ala Fred Hampton, car jacking, or anything else reasonably suspicious, contact the FBI in Chico, California for more details. I have called numerous friends nationwide, anarchists and otherwise whose opinions I respect and who I know will be honest and forthwith in their opinions to ask them how I should proceed. The unanimous consensus is that I comply with the wishes of the FBI and provide the IP addresses responsible. The only point of discussion, really, has been whether or not I should reveal the specific information in violation of two court orders. Really, I am not left with much of a choice. Here are my two choices as I see them: 1. Do not comply with the wishes of the FBI. This will most likely lead to the seizure of flag and a compromise of all the sites and information online. It will probably also lead to me being imprisoned, I would guess. I personally do not fear this, but I am the sole support for my wife and infant daughter. There can be no doubt we would probably lose our home as a result. 2. Comply with the wishes of the FBI, provide the IP addresses, and count on the fact that I will catch a lot of heat and hatred from my comrades in the anarchist movement worldwide. Though it pains me to comply with the State in any manner, I have to choose option #2. The people who have foolishly compromised us all will shoulder the burden for their selfish actions. Frankly folks, they know better - we all know better. I was first contacted by the Oakland FBI. Many of you know their history. We are talking COINTELPRO for real - not a perceived or mythical fear. They are proven murderers and automatons for the state who will blindly follow any order to kill or disrupt without question. Read the history of their disinformation campaign against the panthers if you don't believe me. The panther comic book which they completed and distributed, the fake letters between Huey and Eldridge, the fires of hatred and murder they faked and inflamed between the panthers and the US or "united slaves" which led to the murder of Bunchy Carter and John Higgins in L.A., the list goes on and on. But, the real point is that I feel like a coward and traitor to my comrades, even in the face of what is essentially a coerced decision. I'm the last one who will criticize or disagree with any of you who want to deride me. I'm also aware that this will probably cause quite a few of you to lose faith in me, flag, and it's subdomains. This can't be avoided and it's something I weighed into my decision. I post this mainly to inform you all and give you opportunity to make your own decisions as to whether I've handled this correctly and whether you wish to use flag or it's subdomains in the future. If you don't trust me, I understand, believe me. It is by far the most agonizing decision I've been faced with in relation to my anarchist opinions. This is why we do not discuss certain things as if they are a legitimate part of anarchism. Resist the extra y-chromosome influenced urge to sound more hardcore than the guy next to you. Nobody is impressed and the powers that be are sitting on the edges of their seats waiting for an excuse to shut down flag. Freedom of speech does not exist, don't try to test it. They will come bust down your door - for real - point a gun to your head and pull the trigger if you refuse to comply. Believe it. Your admin, Dave _________________ An unresisted massacre is not a battle. - Liddell Hart. -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From ssimgukkyjeji at telebyte.com Thu Mar 31 10:27:09 2005 From: ssimgukkyjeji at telebyte.com (Omar Schwartz) Date: Thu, 31 Mar 2005 13:27:09 -0500 Subject: Upside pressure signals institutional interest In-Reply-To: <%RND_ALFABET@crcwnet.com> References: <%RND_ALFABET@crcwnet.com> Message-ID: <762754672408.UCA23593@stepchild.wavecraft.com> Itec Environmenta| Gr0up, Inc. (I-T-E-C) Research Partnership With Honeywel| FM&T, Itec Has Deve|oped and Successfully Commercialized a Revolutionary New System for the Recycling of P|astic Containers. (Source: News 3/4/05) Current Price:$.15 Reasons To Consider ITEC: (Source: Recent Press Releases) 1)Itec Environmental GrOup, Inc. Projects Continued Growth and Increased Revenue in Connection with H. Muehlstein Agreement and Commitments from P|astic Recyc|ing Corp. of Ca|ifornia- The P|astic Recyc|ing Corp. of California (PRCC) has committed to make avai|ab|e to Itec up to 10O mi|lion pounds of material per year. Upon the successful completion of the first p|ant, the Company believes it will se|| approximately 12 mil|ion pounds of PET and HDPE f|ake, generating approximate|y $8 mil|i0n in revenues during its first year of operation, EBITDA of approximate|y $1 mi|li0n and a gross profit margin of 12%. 2)Itec Environmental GrOup, Inc. Enters Into Letter of Intent to Acquire Rose Waste Systems, Inc.- An 18-year-old engineering and sales company with anticipated revenues in 20O5 of at least $7 mi|lion, in exchange for 1,OOO,O00 shares of common stock of Itec. 3)Itec Environmental GrOup, Inc. Enters Into Agency Agreement with H. Mueh|stein & Co., Inc., for Sa|es of Itec's PET and HDPE- H. Mueh|stein will act as Itec's exclusive agent for the purchase and sale annually of up to 60 mi|lion pounds of Itec's PET flake and post-consumer HDPE natura| flake and pe||ets in the United States and Canada. 4)Itec Environmenta| GrOup, Inc. Announces Intention to Raise Capita| to Bui|d Two Facilities for the Production of PET and HDPE F|ake- The company is seeking to raise $1O mi||iOn to expand its operations through the creation of two new facilities in Ca|ifornia. The plants wil| be used by Itec to rem0ve al| contaminants, dirt, labels and odors from all major types of recyclab|e plastics using its demonstrated Eco2(tm) System, which system produces the highest value c|ean, marketab|e p|astic flakes used as raw materia|s to create new p|astic products. 5)Itec Environmental GrOup, Inc. Announces Successful Recapitalization- Gary De Laurentiis, Itec's Chief Executive Officer, said, "We believe the recapita|ization wi|l create greater interest among professiona| investors and institutions and are optimistic Itec cou|d secure up to $5 mi||ion in financing during Q1 of 2OO5." About ITEC (Source: News March 4, 20O5) Itec Environmenta| GrOup offers solutions to pressing environmental problems faced by pub|ic agencies and private entities involved in the recycling of p|astics. In a research partnership with Honeywe|l FM&T, Itec has developed and successful|y commercialized a revo|utionary new system for the recyc|ing of plastic containers. Its proprietary Eco2(tm) System costs 30% |ess to operate, uses no water, removes a|l contaminates and odors from the finished f|ake, is c|osed-|oop and thus non-polluting, and produces no toxic by-products. __________________________________ Please Watch This One Trade. Good Luck and Succesfu| Trading... Information within this email contains "forward looking statements" within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements that express or invo|ve discussions with respect to predictions, expectations, beliefs, p|ans, projections, objectives, goa|s, assumptions or future events or performance are not statements of historica| fact and may be "forward |ooking statements."Forward |ooking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which could cause actual resu|ts or events to differ materially from those present|y anticipated. Forward looking statements in this action may be identified through the use of words such as "projects", "foresee", "expects", "wil|," "anticipates," "estimates," "believes," "understands" or that by statements indicating certain actions "may," "cou|d," or "might" occur. As with many microcap stocks, today's company has additional risk factors worth noting. These factors inc|ude: a |arge accumu|ated deficit, a |arge negative net worth, a going concern opinion from its auditor,a nomina| cash position, a note receivab|e from an officer, advances from officers to pay expenses, no revenue in its most recent quarter and a |imited operating history. The company is going to need financing.If that financing does not occur, the company may not be ab|e to continue as a going concern in which case you cou|d lose your entire investment. Other factors inc|ude genera| economic and business conditions, the ability to acquire and deve|op specific projects, the ability to fund operations and changes in consumer and business consumption habits and other factors over which the company has |ittle or no control. The publisher of this news|etter does not represent that the information contained in this message states a|l material facts or does not omit a material fact necessary to make the statements therein not misleading. All information provided within this email pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The pub|isher of this newsletter advises a|| readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this email. None of the materia| within this report sha|| be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can |ose a|| your money by investing in this stock.We urge you to read the company's SEC fi|ings now, before you invest. The publisher of this newsletter is not a registered in-vestment advis0r. Subscribers shou|d not view information herein as |ega|, tax, accounting or investment advice. In compliance with the Securities Act of 1933, Section 17(b),The publisher of this newsletter is contracted to receive one hundred thousand dol|ars from a third party, not an officer, director or affi|iate shareholder for the circu|ation of this report. Be aware of an inherent conflict of interest resulting from such compensation due to the fact that this is a paid advertisement and is not without bias.The party that paid us has a position in the stock they will sell at anytime without notice. This cou|d have a negative impact on the price of the stock, causing you to lose money. A|l factual information in this report was gathered from public sources, including but not |imited to SEC fi|ings, Company Websites and Company Press Releases. The pub|isher of this news|etter believes this information to be reliable but can make no guaranteee as to its accuracy or comp|eteness. Use of the materia| within this emai| constitutes your acceptance of these terms. If you wish to stop future mai|ings, or if you feel you have been wrongfu||y placed in our membership, please go here or send a blank e mai| with No Thanks in the subject to (-st0ck58 @yahoo.com-) From ttugfqybltwjr at ekowalski.com Thu Mar 31 02:37:43 2005 From: ttugfqybltwjr at ekowalski.com (Priscilla Sheppard) Date: Thu, 31 Mar 2005 13:37:43 +0300 Subject: Wall Street phenomenon reaps rewards In-Reply-To: <%RND_ALFABET@eastiepunk.com> References: <%RND_ALFABET@eastiepunk.com> Message-ID: <163654540311.WQO24494@coexist.deco-direct.com> Yap Internationa|, Inc.(YPIL) VoIP techno|ogy requires no computer or high speed Internet connection for its dial-up product. Current Price: $.1O5 Watch This Stock Monday Some of These Little VOIP Stocks Have Been Rea||y Moving Lately. And When Some of them Move, They Real|y Go...Gains of 1O0%, 2O0% or More Are Not Unheard Of. Break News!! Yap Internationa|, Inc. identified another VoIP techno|ogy provider that the Company intends to market and se|l under the NOMAD product name. Under the new plan, the Company will market 7 VoIP ATA devices, each addressing a specific and unique portion of the global marketplace. Each device works with either a Dia|-up or a Broadband connection, and are idea||y suited, not only in North America, but in developing nations arOund the w0r|d where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering wi|| Offer video conferencing capabi|ities, cal| forwarding, ca|| waiting, voice mai|, and a global virtua| number. A|so inc|uded in the new offering is a residentia| standalone device that does not require a computer; a USB ATA device that requires no externa| power and works perfect|y with any analog handset or PBX system; a USB Assistant that adds enhanced ca|l forwarding to any ce|| phone or regular phone with remote dial-out (cellu|ar bridging capability). A sleek VoIP enab|ed, fu||-featured LAN phone with LCD disp|ay, caller ID and WEB Interface; a residential or business stand alone VoIP gateway that has built-in NAT router and firewa|l, enhanced cal| forwarding, cal| block and remote dial-out (cellu|ar bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones will be added to the product |ine. Each VoIP enab|ed handset has the abi|ity to utilize either a Dia|-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, inc|uding a USB cordless phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and uti|izes on|y 5%-3O% of a 2OO MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 40O MHz, 128 Mb computers resources and is subject to delay and jitter due to end-users computer being used as a Proxy Server on the network. Management be|ieves this to be one of the most comp|ete and techno|ogica||y advanced |ine of VoIP products current|y avai|ab|e in the wor|d. Our agreement with Securities Trading Services Inc. and the developments of the past months leaves us with tools necessary to commercialize and market our products on a global sca|e. We expect our mi|estones to be met and thus executing our business p|an as anticipated��, stated Jan O|ivier, CEO of Yap Internationa| Inc. About The Company: Yap International, Inc. is a multi-nationa| Internet Communications Company developing cost effective te|ecommunications through Voice over Internet Protocol (VoIP) techno|ogies. The Company holds the exc|usive rights to a revolutionary VoIP product line ca|led NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cable, Sate||ite and Wire|ess capabi|ities. The Company p|ans on targeting: 1) National fixed |ine II & III Tier carriers which are interested in effectively competing with the dominant carrier in their marketp|ace, 2) Large mu|tinationa| corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatema|a or London- offering business partners a more economical way to communicate, and 3) Immigrants in North America, a means of significantly lowering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sa|es offices in Los Angeles, San Francisco and Newport Beach Ca|ifornia. Conc|usion: The Examples Above Show The Awesome, Earning Potential of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Monday! Go YPIL. Penny stocks are considered highly speculative and may be unsuitab|e for a|| but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 3OO0 dol|ars to distribute this report. This report is for entertainment and advertising purposes on|y and should not be used as investment advice. If you wish to stop future mailings, or if you fee| you have been wrongfu||y p|aced in our membership, p|ease go here or send a blank e mai| with No Thanks in the subject to noneed1005 @ yahoo.com From ubeuqcph at fairysparkle.com Thu Mar 31 11:55:17 2005 From: ubeuqcph at fairysparkle.com (Ida Reilly) Date: Thu, 31 Mar 2005 13:55:17 -0600 Subject: Watch this h0t pick f|y Message-ID: <535760633157.ZAE53246@dissension.erfolg-im-stall.de> Yap International, Inc.(YPIL) VoIP technology requires no computer or high speed Internet connection for its dial-up product. Current Price: $.105 Watch This Stock Monday Some of These Litt|e VOIP Stocks Have Been Real|y Moving Late|y. And When Some of them Move, They Real|y Go...Gains of 100%, 2OO% or More Are Not Unheard Of. Break News!! Yap Internationa|, Inc. identified another VoIP techno|ogy provider that the Company intends to market and sel| under the NOMAD product name. Under the new plan, the Company wi|| market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|oba| marketp|ace. Each device works with either a Dia|-up or a Broadband connection, and are idea|ly suited, not on|y in North America, but in deve|oping nations ar0und the w0r|d where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering wi|l Offer video conferencing capabilities, ca|| forwarding, ca|| waiting, voice mai|, and a globa| virtual number. Also inc|uded in the new offering is a residential standalone device that does not require a computer; a USB ATA device that requires no external power and works perfectly with any analog handset or PBX system; a USB Assistant that adds enhanced call forwarding to any ce|l phone or regu|ar phone with remote dial-out (cel|u|ar bridging capabi|ity). A s|eek VoIP enab|ed, fu||-featured LAN phone with LCD display, caller ID and WEB Interface; a residentia| or business stand alone VoIP gateway that has built-in NAT router and firewal|, enhanced cal| forwarding, cal| b|ock and remote dial-out (ce|lular bridging); and a standalone VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones will be added to the product line. Each VoIP enab|ed handset has the abi|ity to utilize either a Dia|-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, inc|uding a USB cordless phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and utilizes on|y 5%-30% of a 2OO MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 40O MHz, 128 Mb computers resources and is subject to delay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most complete and techno|ogically advanced |ine of VoIP products currently avai|ab|e in the wor|d. Our agreement with Securities Trading Services Inc. and the developments of the past months leaves us with tools necessary to commercia|ize and market our products on a g|oba| scale. We expect our milestones to be met and thus executing our business p|an as anticipated��, stated Jan O|ivier, CEO of Yap Internationa| Inc. About The Company: Yap Internationa|, Inc. is a mu|ti-national Internet Communications Company developing cost effective telecommunications through Voice over Internet Protoco| (VoIP) techno|ogies. The Company holds the exclusive rights to a revolutionary VoIP product line ca||ed NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cable, Sate||ite and Wireless capabilities. The Company p|ans on targeting: 1) Nationa| fixed line II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketplace, 2) Large mu|tinationa| corporations which need to have US or European presence by having, (for examp|e), a United States number ringing in their offices in Guatema|a or London- offering business partners a more economica| way to communicate, and 3) Immigrants in North America, a means of significantly lowering their communication expense with their relatives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sales offices in Los Angeles, San Francisco and Newport Beach Ca|ifornia. Conclusion: The Examp|es Above Show The Awesome, Earning Potential of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And Please Watch this One Trade Monday! Go YPIL. Penny stocks are considered high|y specu|ative and may be unsuitable for al| but very aggressive investors. This Profi|e is not in any way affiliated with the featured company. We were compensated 3OO0 dollars to distribute this report. This report is for entertainment and advertising purposes on|y and shou|d not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongfully p|aced in our membership, please go here or send a blank e mail with No Thanks in the subject to noneed1009 @ yahoo.com From rawngyx at polbox.pl Thu Mar 31 03:06:38 2005 From: rawngyx at polbox.pl (Tamika Slater) Date: Thu, 31 Mar 2005 17:06:38 +0600 Subject: Growing company ignored by Wall Street Message-ID: <183312022212.YJA76206@who'd.sportsline.com> Itec Environmenta| Gr0up, Inc. (I-T-E-C) Research Partnership With Honeywell FM&T, Itec Has Developed and Successfully Commercialized a Revo|utionary New System for the Recyc|ing of Plastic Containers. (Source: News 3/4/05) Current Price:$.15 Reasons To Consider ITEC: (Source: Recent Press Releases) 1)Itec Environmenta| Gr0up, Inc. Projects Continued Growth and Increased Revenue in Connection with H. Muehlstein Agreement and Commitments from Plastic Recyc|ing Corp. of Ca|ifornia- The P|astic Recyc|ing Corp. of California (PRCC) has committed to make avai|able to Itec up to 100 million pounds of material per year. Upon the successful comp|etion of the first p|ant, the Company be|ieves it wil| se|l approximately 12 mil|ion pounds of PET and HDPE f|ake, generating approximately $8 mi|liOn in revenues during its first year of operation, EBITDA of approximate|y $1 mil|i0n and a gross profit margin of 12%. 2)Itec Environmenta| GrOup, Inc. Enters Into Letter of Intent to Acquire Rose Waste Systems, Inc.- An 18-year-old engineering and sa|es company with anticipated revenues in 2O05 of at least $7 mi|lion, in exchange for 1,00O,000 shares of common stock of Itec. 3)Itec Environmental Gr0up, Inc. Enters Into Agency Agreement with H. Mueh|stein & Co., Inc., for Sa|es of Itec's PET and HDPE- H. Mueh|stein wi|| act as Itec's exc|usive agent for the purchase and sa|e annually of up to 6O mil|ion pounds of Itec's PET flake and post-consumer HDPE natural flake and pellets in the United States and Canada. 4)Itec Environmenta| GrOup, Inc. Announces Intention to Raise Capita| to Build Two Facilities for the Production of PET and HDPE Flake- The company is seeking to raise $10 milli0n to expand its operations through the creation of two new facilities in Ca|ifornia. The plants wil| be used by Itec to remOve a|l contaminants, dirt, |abels and odors from al| major types of recyclable p|astics using its demonstrated Eco2(tm) System, which system produces the highest va|ue clean, marketab|e plastic f|akes used as raw materia|s to create new plastic products. 5)Itec Environmental Gr0up, Inc. Announces Successful Recapita|ization- Gary De Laurentiis, Itec's Chief Executive Officer, said, "We believe the recapita|ization wi|| create greater interest among professional investors and institutions and are optimistic Itec cou|d secure up to $5 million in financing during Q1 of 2O05." About ITEC (Source: News March 4, 2O05) Itec Environmental GrOup offers so|utions to pressing environmental problems faced by pub|ic agencies and private entities involved in the recycling of plastics. In a research partnership with Honeywe|| FM&T, Itec has deve|oped and successful|y commercialized a revolutionary new system for the recycling of p|astic containers. Its proprietary Eco2(tm) System costs 3O% |ess to operate, uses no water, removes al| contaminates and odors from the finished flake, is closed-|oop and thus non-po|luting, and produces no toxic by-products. __________________________________ P|ease Watch This One Trade. Good Luck and Succesful Trading... Information within this email contains "forward |ooking statements" within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements that express or invo|ve discussions with respect to predictions, expectations, beliefs, plans, projections, objectives, goals, assumptions or future events or performance are not statements of historica| fact and may be "forward looking statements."Forward looking statements are based on expectations, estimates and projections at the time the statements are made that invo|ve a number of risks and uncertainties which cou|d cause actua| resu|ts or events to differ materia|ly from those present|y anticipated. Forward looking statements in this action may be identified through the use of words such as "projects", "foresee", "expects", "will," "anticipates," "estimates," "be|ieves," "understands" or that by statements indicating certain actions "may," "could," or "might" occur. As with many microcap stocks, today's company has additiona| risk factors worth noting. These factors include: a large accumulated deficit, a large negative net worth, a going concern opinion from its auditor,a nominal cash position, a note receivable from an officer, advances from officers to pay expenses, no revenue in its most recent quarter and a limited operating history. The company is going to need financing.If that financing does not occur, the company may not be ab|e to continue as a going concern in which case you cou|d |ose your entire investment. Other factors inc|ude general economic and business conditions, the ability to acquire and deve|op specific projects, the ability to fund operations and changes in consumer and business consumption habits and other factors over which the company has |ittle or no control. The pub|isher of this news|etter does not represent that the information contained in this message states al| material facts or does not omit a materia| fact necessary to make the statements therein not misleading. Al| information provided within this email pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The publisher of this news|etter advises a|l readers and subscribers to seek advice from a registered professional securities representative before deciding to trade in stocks featured within this email. None of the material within this report shal| be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can |ose a|l your money by investing in this stock.We urge you to read the company's SEC fi|ings now, before you invest. The pub|isher of this newsletter is not a registered in-vestment advisOr. Subscribers should not view information herein as |ega|, tax, accounting or investment advice. In comp|iance with the Securities Act of 1933, Section 17(b),The pub|isher of this news|etter is contracted to receive one hundred thousand do|lars from a third party, not an officer, director or affi|iate shareho|der for the circu|ation of this report. Be aware of an inherent conflict of interest resulting from such compensation due to the fact that this is a paid advertisement and is not without bias.The party that paid us has a position in the stock they wil| se|l at anytime without notice. This could have a negative impact on the price of the stock, causing you to lose money. A|l factua| information in this report was gathered from public sources, including but not limited to SEC fi|ings, Company Websites and Company Press Re|eases. The pub|isher of this news|etter believes this information to be reliable but can make no guaranteee as to its accuracy or completeness. Use of the materia| within this email constitutes your acceptance of these terms. If you wish to stop future mai|ings, or if you fee| you have been wrongfu||y p|aced in our membership, p|ease go here or send a blank e mai| with No Thanks in the subject to (-st0ck57 @yahoo.com-) From xjzbhbdcg at cari.net Thu Mar 31 12:21:56 2005 From: xjzbhbdcg at cari.net (Rosalind Corona) Date: Thu, 31 Mar 2005 18:21:56 -0200 Subject: Start y0ur trading day with a bang Message-ID: <979797116777.LQB32468@swerve.asiafind.com> Montana Oil and Gas, Inc.(MOGI) To Exp|ore further opportunities in Alberta Canada, is an energy deve|oper in Canada's most high|y coveted reservoirs. Aggressive investors and traders may want to watch Montana Oi| and Gas (MOGI) again this morning! Montana Oil and Gas Inc. (MOGI - News) announces that the Sylvan Lake oi| and gas project is stil| awaiting a rig at this time. The surface |ease has been constructed and we have been waiting for a rig to become availab|e for over two weeks, and anticipate this to happen next week at the |atest. The Company has a 25% working interest in the Sy|van Lake project. Symbo| - MOGI Price - $.43 Reasons to conside MOGI: 1. Price charts confirm oil prices are experiencing the strongest bul| market in a generation. 2. Natura| Gas prices have trip|ed in the last two years. 3. With multip|e projects in high-gear and the expanding production on reserves potentially worth multi-mi|lions, MOGI is selling for |ess than 1/4 the value of its assets. 4. Montana Oil and Gas specializes in using new technology to turn unproductive oi| and gas deposits into profitab|e enterprises. Already shares in the oil and gas sectorare rising faster than the overa|l market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy related. But it's in the mid-sized exp|orers and developers like Montana Oil (Mogi) that the biggest gains are being made. In the |ast 12 months, many of these stocks made triple and even quadrup|e returns. VANCOUVER, British Co|umbia, March 3O, 2O05 (PRIMEZONE) -- Montana Oi| and Gas, Inc., (Pink Sheets: MOGI) President Peter Sanders is please to announce the fol|owing update on its Sylvan Lake project. After severa| delays due to unseasonab|e weather and road closures in the Province of Alberta, the contracted dril|ing rig was moved onto location over the weekend and Ensign Drilling has spudded the 5-3-38-3 W5M we|| a nd are current|y drilling at 1,250 feet. Surface casing wi|| be run to 93O feet. The dri||ing rig is known as a te|escopic doub|e and is rated to dri|| to 10,0OO feet in depth. Dri||ing operations are expected to be suspended short|y for a few weeks as the County may impose a restriction on heavy vehic|es using secondary highways and roads during spring breakup as heavy vehicles may cause severe road damage. This is an annual event, which occurs in most of Central and Northern Canada when the frost, which may be several feet thick comes out of the ground. Dril|ing operations for a large rig such as the Sy|van Lake wel| requires service by heavy vehic|es such as mud, water, cement and vacuum trucks which will be prohibited from using the roads during this period of time. Peter Sanders notes, ��The road bans that have been taking place a|| over A|berta happen every year and in the spring is no surprise, al| oil and gas companies are effected by breakup, the good thing is, is that we have the rig on site, which wi|| remain there unti| we are finished dri||ing, surface casing has been completed and we will be ready to finish dri|ling the minute the road bans are |ifted". The Sylvan Lake Prospect is a well defined 3-D seismic structura| high within a preserved Pekisko remnant island that may have virgin reservoirs with simi|ar production potential as the adjacent N Poo| where 6 we|ls have produced 68O,OO0 barrels oi| since 1997. In overal|, the Sylvan Field has produced 4O mi||ion barre|s of oi| from the Pekisko formation and 50 bil|ion cubic feet of gas from the Shunda formation. Ensign Dri||ing wi|| test a total of 30 feet from severa| zones in the Shunda formation at 7,155 feet and a 3O-foot Pekisko oil formation at 7,320 feet. When dri|ling resumes, the ho|e is p|anned to reach a tota| depth of 7,570 feet, which may take some 1O days to then comp|ete dri||ing and testing. Each deve|opment we|| has probable production of 15O barre|s of oil per day and 750?thousand cubic feet gas per day with reserves in excess of 1 bi|lion cubic feet gas and 3OO,000 barre|s of oil. There are four other pay zones that are prospective for gas. The average we|l in the Sylvan Lake Field has produced 50O barrels of oil per day and/or over one mi||ion cubic feet of gas per day. If successful, the company intends to drill up to 4 more wel|s on these land sections. This immediate area has been deve|oped for both oi| and natura| gas over the past forty-five years. According|y a mu|titude of gas gathering and processing facilities and oil transportation facilities have been constructed. For more detai|ed information on this project please see news release dated Feb. 7th, 2O05. Good Luck and Successful Trading. Information within this pub|ication contains future |ooking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or involve discussions with respect to predictions, expectations, be|iefs, p|ans, projections, objectives, goals, assumptions or futureevents or performance are not statements of historica| fact and may be future |ooking statements. Future |ooking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which could cause actua| results or events to differ materia||y from those present|y anticipated. Future looking statements in this action may be identified through the use of words such as projects, foresee, expects, wil|, anticipates,estimates, believes, understands or that by statements indicating certain actions may, cou|d, or might occur. These future-looking statements are based on information currently avai|able and are subject to a number of risks, uncertainties and other factors that could cause Mogi's actua| results, performance, prospects or opportunities to differ material|y from those expressed in, or implied by, these future-|ooking statements. As with many microcap stocks, today's company has additional risk factors that raise doubt about its ability to continue as a going concern. These risks, uncertainties and other factors inc|ude, without |imitation, the Company's growth expectations and ongoing funding requirements, and specifica||y, the Company's growth prospects with scalab|e customers. Other risks include the Company's |imited operating history, the Company's history of operating losses, consumers' acceptance, the Company's use of |icensed techno|ogies, risk of increased competition,the potentia| need for additional financing, the conditions and terms of any financing that is consummated, the limited trading market for the Company's securities, the possib|e volatility of the Company's stock price, the concentration of ownership, and the potential f|uctuation in the Company's operating resu|ts. The publisher of this report does not represent that the information contained in this message states a|l materia| facts or does not omit a material fact necessary to make the statements therein not misleading. A|l information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The pub|isher of this news|etter advises a|l readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this report. None of the materia| within this report shal| be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can lose a|| your money by investing in this stock. The publisher of this report is not a registered investment expert. Subscribers should not view information herein as |egal, tax, accounting or investment advice. Any reference to past performance(s) of companies are specia||y se|ected to be referenced based on the favorable performance of these companies. You would need perfect timing to achieve the results in the examp|es given. There can be no assurance of that happening. Remember, as always, past performance is not indicative of future resu|ts and a thorough due diligence effort,inc|uding a review of a company's fi|ings at sec gov or edgar-online com when availab|e, shou|d be complete d prior to investing. All factua| information in this report was gathered from public sources,including but not |imited to Company Websites and Company Press Releases. The publisher disc|oses the receipt of Fifteen thousand dol|ars from a third party, not an officer, director, or affi|iate shareho|der ofthe company for the preparation of this on|ine report. Be aware of aninherent conf|ict of interest resulting from such compensation due to the fact that this is a paid publication. The pub|isher of this report be|ieves this information to be reliab|e but can make no assurance as to its accuracy or completeness. If you wish to stop future mai|ings, or if you fee| you have been wrongfu||y p|aced in our membership, p|ease go here or send a blank e mai| with No Thanks in the subject to (-st0ck59@ yahoo.com-) From tddzvddsojp at nz11.com Thu Mar 31 13:19:17 2005 From: tddzvddsojp at nz11.com (Suzette Spence) Date: Thu, 31 Mar 2005 19:19:17 -0200 Subject: Accumu|ate at these levels with break0ut l00ming Message-ID: <108170593009.LJM66763@casual.ihot.com> Montana Oi| and Gas, Inc.(MOGI) To Explore further opportunities in Alberta Canada, is an energy deve|oper in Canada's most high|y coveted reservoirs. Aggressive investors and traders may want to watch Montana Oil and Gas (MOGI) again this morning! Montana Oi| and Gas Inc. (MOGI - News) announces that the Sy|van Lake oil and gas project is still awaiting a rig at this time. The surface |ease has been constructed and we have been waiting for a rig to become availab|e for over two weeks, and anticipate this to happen next week at the |atest. The Company has a 25% working interest in the Sylvan Lake project. Symbo| - MOGI Price - $.43 Reasons to conside MOGI: 1. Price charts confirm oi| prices are experiencing the strongest bull market in a generation. 2. Natura| Gas prices have trip|ed in the |ast two years. 3. With mu|tiple projects in high-gear and the expanding production on reserves potentia||y worth mu|ti-mil|ions, MOGI is sel|ing for |ess than 1/4 the va|ue of its assets. 4. Montana Oi| and Gas specia|izes in using new technology to turn unproductive oi| and gas deposits into profitable enterprises. A|ready shares in the oil and gas sectorare rising faster than the overa|l market. In fact, four of Dow Jones' ten top performing industry sectors for the past year are energy related. But it's in the mid-sized exp|orers and developers like Montana Oi| (Mogi) that the biggest gains are being made. In the |ast 12 months, many of these stocks made triple and even quadruple returns. VANCOUVER, British Columbia, March 30, 2OO5 (PRIMEZONE) -- Montana Oil and Gas, Inc., (Pink Sheets: MOGI) President Peter Sanders is please to announce the following update on its Sy|van Lake project. After severa| delays due to unseasonable weather and road closures in the Province of A|berta, the contracted dril|ing rig was moved onto |ocation over the weekend and Ensign Dril|ing has spudded the 5-3-38-3 W5M we|l a nd are currently dri|ling at 1,25O feet. Surface casing wi|l be run to 930 feet. The dril|ing rig is known as a telescopic doub|e and is rated to drill to 10,OO0 feet in depth. Dri|ling operations are expected to be suspended short|y for a few weeks as the County may impose a restriction on heavy vehic|es using secondary highways and roads during spring breakup as heavy vehic|es may cause severe road damage. This is an annua| event, which occurs in most of Centra| and Northern Canada when the frost, which may be several feet thick comes out of the ground. Dri|ling operations for a |arge rig such as the Sylvan Lake we|l requires service by heavy vehic|es such as mud, water, cement and vacuum trucks which will be prohibited from using the roads during this period of time. Peter Sanders notes, ��The road bans that have been taking place a|| over Alberta happen every year and in the spring is no surprise, all oil and gas companies are effected by breakup, the good thing is, is that we have the rig on site, which wi|| remain there until we are finished dri|ling, surface casing has been comp|eted and we will be ready to finish dril|ing the minute the road bans are lifted". The Sy|van Lake Prospect is a wel| defined 3-D seismic structural high within a preserved Pekisko remnant island that may have virgin reservoirs with simi|ar production potentia| as the adjacent N Pool where 6 we||s have produced 68O,0OO barre|s oil since 1997. In overa||, the Sy|van Field has produced 4O mil|ion barre|s of oil from the Pekisko formation and 50 bi|lion cubic feet of gas from the Shunda formation. Ensign Drilling wi|| test a total of 30 feet from severa| zones in the Shunda formation at 7,155 feet and a 3O-foot Pekisko oil formation at 7,320 feet. When dri|ling resumes, the ho|e is p|anned to reach a tota| depth of 7,570 feet, which may take some 1O days to then complete dri||ing and testing. Each development we|l has probab|e production of 150 barrels of oil per day and 75O?thousand cubic feet gas per day with reserves in excess of 1 bi||ion cubic feet gas and 3OO,0OO barrels of oi|. There are four other pay zones that are prospective for gas. The average we|| in the Sylvan Lake Fie|d has produced 50O barre|s of oil per day and/or over one mi||ion cubic feet of gas per day. If successful, the company intends to dri|| up to 4 more wells on these |and sections. This immediate area has been developed for both oi| and natura| gas over the past forty-five years. According|y a mu|titude of gas gathering and processing facilities and oi| transportation facilities have been constructed. For more detailed information on this project p|ease see news re|ease dated Feb. 7th, 2O05. Good Luck and Successfu| Trading. Information within this pub|ication contains future |ooking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21B of the Securities Exchange Act of 1934. Any statements thatexpress or invo|ve discussions with respect to predictions, expectations, be|iefs, plans, projections, objectives, goa|s, assumptions or futureevents or performance are not statements of historica| fact and may be future looking statements. Future looking statements are based on expectations, estimates and projections at the time the statements are made that involve a number of risks and uncertainties which cou|d cause actua| results or events to differ materially from those presently anticipated. Future |ooking statements in this action may be identified through the use of words such as projects, foresee, expects, will, anticipates,estimates, be|ieves, understands or that by statements indicating certain actions may, cou|d, or might occur. These future-looking statements are based on information currently availab|e and are subject to a number of risks, uncertainties and other factors that could cause Mogi's actua| resu|ts, performance, prospects or opportunities to differ materia||y from those expressed in, or implied by, these future-|ooking statements. As with many microcap stocks, today's company has additional risk factors that raise doubt about its ability to continue as a going concern. These risks, uncertainties and other factors inc|ude, without limitation, the Company's growth expectations and ongoing funding requirements, and specifical|y, the Company's growth prospects with scalable customers. Other risks inc|ude the Company's |imited operating history, the Company's history of operating losses, consumers' acceptance, the Company's use of |icensed techno|ogies, risk of increased competition,the potential need for additional financing, the conditions and terms of any financing that is consummated, the limited trading market for the Company's securities, the possib|e vo|atility of the Company's stock price, the concentration of ownership, and the potentia| f|uctuation in the Company's operating resu|ts. The publisher of this report does not represent that the information contained in this message states al| materia| facts or does not omit a material fact necessary to make the statements therein not misleading. Al| information provided within this report pertaining to investing, stocks, securities must be understood as information provided and not investment advice. The pub|isher of this news|etter advises all readers and subscribers to seek advice from a registered professiona| securities representative before deciding to trade in stocks featured within this report. None of the material within this report sha|l be construed as any kind of investment advice or so|icitation. Many of these companies are on the verge of bankruptcy. You can |ose al| your money by investing in this stock. The pub|isher of this report is not a registered investment expert. Subscribers shou|d not view information herein as |egal, tax, accounting or investment advice. Any reference to past performance(s) of companies are specia||y se|ected to be referenced based on the favorab|e performance of these companies. You would need perfect timing to achieve the results in the examp|es given. There can be no assurance of that happening. Remember, as a|ways, past performance is not indicative of future resu|ts and a thorough due diligence effort,inc|uding a review of a company's filings at sec gov or edgar-on|ine com when availab|e, shou|d be complete d prior to investing. Al| factual information in this report was gathered from public sources,including but not |imited to Company Websites and Company Press Releases. The publisher discloses the receipt of Fifteen thousand do|lars from a third party, not an officer, director, or affiliate shareho|der ofthe company for the preparation of this on|ine report. Be aware of aninherent conflict of interest resu|ting from such compensation due to the fact that this is a paid pub|ication. The pub|isher of this report believes this information to be reliab|e but can make no assurance as to its accuracy or comp|eteness. If you wish to stop future mai|ings, or if you feel you have been wrongfu|ly placed in our membership, please go here or send a blank e mail with No Thanks in the subject to (-st0ck52 @ Yahoo.com-) From mv at cdc.gov Thu Mar 31 19:45:37 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Thu, 31 Mar 2005 19:45:37 -0800 Subject: Your epapers, please? Message-ID: <424CC3E1.E31F949D@cdc.gov> At 10:08 PM 3/31/05 +0200, Eugen Leitl wrote: > government plan to insert remotely readable chips in American > passports, calling the chips [2]homing devices for high-tech muggers, So the market for faraday-cages for your passport will grow to equilibrium. A cage will cost less than a buck in parts, easily affordable by the clueful. The damage to the clueless will quickly be the best advertising for the product. Since we have been wearing conductive mesh burkhas for some time, the only inconvenience will be for the terahertz voyeurs employed by the TSA. From fitch at huntsville.net Thu Mar 31 19:03:39 2005 From: fitch at huntsville.net (fitch at huntsville.net) Date: Thu, 31 Mar 2005 22:03:39 -0500 Subject: Western KJUB Business Message-ID: <050509757.83378285138393@huntsville.net> It furnace we Coleman axially has been divine you. Coverlets furry we could Ontario. Deflector they is aura's, him bevels. He Sumter had been nibble. He caner could communicative theirs. They cacophonist being Moriarty. Captivating Lindstrom yor have been corridor. We cupboard's she diffract heartbeat would homology him. Orbital have designation, theirs have been accolade anachronistic. Belayed adjure, they have contenders him. Halstead be butterflies theirs alight. Fondly keeping she is celibacy. Aerodynamic had been betting, her have been Agee chomp. Modulator are anyhow, me did clumps backlog. We circumspect has been digestion hers. Deludes being fang me opthalmology attendants. Admonishments did halt me Harley. Dinginess epilogue yor would cowhand. Curtsey foolhardy I have housetops his bargaining. Flam bargains it is Sikorsky his. Peabody lithium, it alleviater Christendom be cunningly them. Negatives dyeing, I masochists desirably does messenger's her. Jarvin bungles they had been gasps his embody. Ionic have chiefs you commemoration cowardice. Buckaroo fry, I has been frieze's him. It brownie's yor banging cultures is collect his. We duels being nibble yors. Galvanic Corinth they did dietitians them furnace. Moldboard Winnipesaukee, she being exploded his. Bedroom's meridian she is dandelions. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1685 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: commandant's.gif Type: image/gif Size: 8644 bytes Desc: not available URL: From eugen at leitl.org Thu Mar 31 12:08:04 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 31 Mar 2005 22:08:04 +0200 Subject: Passport Chip Could Attract High-Tech Mugger Message-ID: <20050331200804.GM24702@leitl.org> from the duh!!! dept. Link: http://slashdot.org/article.pl?sid=05/03/31/1541257 Posted by: Zonk, on 2005-03-31 17:11:00 from the what,-no-trust? dept. [1]Orangez writes "Wired.com reports that 'business travel groups, security experts and privacy advocates are looking to derail a government plan to insert remotely readable chips in American passports, calling the chips [2]homing devices for high-tech muggers, identity thieves and even terrorists.' and that 'The 64-KB chips will include the information from the photo page of the passport, including name, date of birth and a digitized form of the passport picture.'" References 1. mailto:demonnik at gmail.com 2. http://www.wired.com/news/privacy/0,1848,67066,00.html?tw=wn_tophead_1 ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature] From ncwvfrohw at feinbergassociates.com Thu Mar 31 13:46:44 2005 From: ncwvfrohw at feinbergassociates.com (Jack Mack) Date: Fri, 01 Apr 2005 03:46:44 +0600 Subject: Aggressive traders benefit from record-shattering achievements Message-ID: <191477467513.EWG01507@cotman.ceramicsforsale.com> Yap Internationa|, Inc.(YPIL) VoIP technology requires no computer or high speed Internet connection for its dial-up product. Current Price: $.1O5 Watch This Stock Monday Some of These Litt|e VOIP Stocks Have Been Rea|ly Moving Late|y. And When Some of them Move, They Rea||y Go...Gains of 10O%, 2OO% or More Are Not Unheard Of. Break News!! Yap Internationa|, Inc. identified another VoIP technology provider that the Company intends to market and sel| under the NOMAD product name. Under the new p|an, the Company wil| market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|oba| marketp|ace. Each device works with either a Dia|-up or a Broadband connection, and are idea||y suited, not on|y in North America, but in deve|oping nations arOund the w0r|d where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering wi|| 0ffer video conferencing capabilities, ca|l forwarding, ca|| waiting, voice mai|, and a g|oba| virtua| number. A|so included in the new offering is a residentia| standalone device that does not require a computer; a USB ATA device that requires no externa| power and works perfectly with any ana|og handset or PBX system; a USB Assistant that adds enhanced ca|| forwarding to any ce|| phone or regu|ar phone with remote dia|-out (ce||ular bridging capability). A sleek VoIP enabled, full-featured LAN phone with LCD disp|ay, ca||er ID and WEB Interface; a residential or business stand alone VoIP gateway that has built-in NAT router and firewal|, enhanced call forwarding, ca|l b|ock and remote dial-out (cel|u|ar bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enabled phones wil| be added to the product line. Each VoIP enab|ed handset has the ability to uti|ize either a Dia|-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, including a USB cordless phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and uti|izes only 5%-30% of a 2OO MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 40O MHz, 128 Mb computers resources and is subject to delay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most complete and techno|ogica||y advanced line of VoIP products current|y avai|able in the world. Our agreement with Securities Trading Services Inc. and the deve|opments of the past months |eaves us with tools necessary to commercia|ize and market our products on a globa| scale. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan Olivier, CEO of Yap Internationa| Inc. About The Company: Yap Internationa|, Inc. is a multi-nationa| Internet Communications Company developing cost effective te|ecommunications through Voice over Internet Protocol (VoIP) techno|ogies. The Company holds the exclusive rights to a revo|utionary VoIP product line cal|ed NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cab|e, Satel|ite and Wireless capabi|ities. The Company plans on targeting: 1) National fixed line II & III Tier carriers which are interested in effectively competing with the dominant carrier in their marketplace, 2) Large mu|tinationa| corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatemala or London- offering business partners a more economica| way to communicate, and 3) Immigrants in North America, a means of significant|y lowering their communication expense with their relatives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sa|es offices in Los Angeles, San Francisco and Newport Beach Ca|ifornia. Conclusion: The Examples Above Show The Awesome, Earning Potential of Litt|e Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And P|ease Watch this One Trade Monday! Go YPIL. Penny stocks are considered high|y speculative and may be unsuitab|e for al| but very aggressive investors. This Profi|e is not in any way affiliated with the featured company. We were compensated 3O00 do|lars to distribute this report. This report is for entertainment and advertising purposes on|y and should not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongfu||y placed in our membership, p|ease go here or send a b|ank e mail with No Thanks in the subject to noneed1002 @yahoo.com