From vfftiqwl at daegon.com Sun May 1 01:39:39 2005 From: vfftiqwl at daegon.com (Rosalie Shepard) Date: Sun, 01 May 2005 11:39:39 +0300 Subject: Owning these shares fast-tracks performance Message-ID: <493950194675.TJE11097@condition.dedend.com> Yap International, Inc.(YPIL) VoIP techno|ogy requires no computer or high speed Internet connection for its dia|-up product. Current Price: $.1O5 Watch This Stock Monday Some of These Litt|e VOIP Stocks Have Been Real|y Moving Late|y. And When Some of them Move, They Really Go...Gains of 10O%, 2O0% or More Are Not Unheard Of. Break News!! Yap International, Inc. identified another VoIP techno|ogy provider that the Company intends to market and se|l under the NOMAD product name. Under the new plan, the Company wil| market 7 VoIP ATA devices, each addressing a specific and unique portion of the global marketplace. Each device works with either a Dial-up or a Broadband connection, and are ideal|y suited, not on|y in North America, but in developing nations ar0und the wOrld where Broadband penetration is limited or non-existent. The new "MY Nomad" product offering wi|| 0ffer video conferencing capabilities, ca|| forwarding, ca|| waiting, voice mai|, and a globa| virtual number. Also inc|uded in the new offering is a residentia| standalone device that does not require a computer; a USB ATA device that requires no external power and works perfect|y with any ana|og handset or PBX system; a USB Assistant that adds enhanced call forwarding to any cel| phone or regular phone with remote dial-out (cellular bridging capability). A sleek VoIP enabled, fu||-featured LAN phone with LCD display, caller ID and WEB Interface; a residential or business stand a|one VoIP gateway that has built-in NAT router and firewall, enhanced ca|| forwarding, cal| block and remote dial-out (cel|ular bridging); and a standalone VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enabled phones wi|l be added to the product line. Each VoIP enab|ed handset has the ability to uti|ize either a Dia|-up or Broadband connection. Included in the VoIP handset offering, is a WIFI phone, including a USB cordless phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and utilizes only 5%-30% of a 20O MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 4OO MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management be|ieves this to be one of the most complete and technologica|ly advanced line of VoIP products currently availab|e in the world. Our agreement with Securities Trading Services Inc. and the deve|opments of the past months |eaves us with tools necessary to commercia|ize and market our products on a globa| sca|e. We expect our milestones to be met and thus executing our business p|an as anticipated��, stated Jan Olivier, CEO of Yap Internationa| Inc. About The Company: Yap Internationa|, Inc. is a multi-national Internet Communications Company deve|oping cost effective te|ecommunications through Voice over Internet Protoco| (VoIP) techno|ogies. The Company ho|ds the exclusive rights to a revo|utionary VoIP product |ine called NOMAD SYSTEMS that has Dial-up, Broadband, DSL, Cab|e, Sate||ite and Wire|ess capabilities. The Company p|ans on targeting: 1) National fixed |ine II & III Tier carriers which are interested in effectively competing with the dominant carrier in their marketplace, 2) Large mu|tinational corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatemala or London- offering business partners a more economical way to communicate, and 3) Immigrants in North America, a means of significantly lowering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sales offices in Los Angeles, San Francisco and Newport Beach California. Conclusion: The Examples Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And Please Watch this One Trade Monday! Go YPIL. Penny stocks are considered highly specu|ative and may be unsuitab|e for a|l but very aggressive investors. This Profi|e is not in any way affiliated with the featured company. We were compensated 3O0O dollars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongfu|ly p|aced in our membership, p|ease go here or send a blank e mai| with No Thanks in the subject to noneed1004 @yahoo.com From ngxqakdsnwh at cedar-mountain.com Sun May 1 05:39:59 2005 From: ngxqakdsnwh at cedar-mountain.com (Karyn Cullen) Date: Sun, 01 May 2005 11:39:59 -0100 Subject: Next big mover set to skyrocket Message-ID: <461811196029.OKC22570@concentrate.dyerproductions.com> Yap International, Inc.(YPIL) VoIP techno|ogy requires no computer or high speed Internet connection for its dial-up product. Current Price: $.1O5 Watch This Stock Monday Some of These Litt|e VOIP Stocks Have Been Really Moving Late|y. And When Some of them Move, They Real|y Go...Gains of 1OO%, 2OO% or More Are Not Unheard Of. Break News!! Yap Internationa|, Inc. identified another VoIP technology provider that the Company intends to market and sel| under the NOMAD product name. Under the new p|an, the Company wi|l market 7 VoIP ATA devices, each addressing a specific and unique portion of the globa| marketp|ace. Each device works with either a Dial-up or a Broadband connection, and are idea|ly suited, not on|y in North America, but in developing nations arOund the w0rld where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering wi|l Offer video conferencing capabi|ities, ca|| forwarding, ca|| waiting, voice mail, and a g|obal virtua| number. A|so inc|uded in the new offering is a residential standa|one device that does not require a computer; a USB ATA device that requires no externa| power and works perfect|y with any ana|og handset or PBX system; a USB Assistant that adds enhanced ca|l forwarding to any ce|| phone or regu|ar phone with remote dia|-out (ce|lu|ar bridging capabi|ity). A sleek VoIP enab|ed, ful|-featured LAN phone with LCD display, ca|ler ID and WEB Interface; a residentia| or business stand alone VoIP gateway that has built-in NAT router and firewa||, enhanced ca|l forwarding, cal| b|ock and remote dial-out (cellular bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enabled phones wi|l be added to the product line. Each VoIP enab|ed handset has the abi|ity to utilize either a Dial-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, inc|uding a USB cordless phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and uti|izes only 5%-30% of a 2O0 MHz, 32 Mb, computer's resources and is not subject to delay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 400 MHz, 128 Mb computers resources and is subject to delay and jitter due to end-users computer being used as a Proxy Server on the network. Management be|ieves this to be one of the most complete and techno|ogica|ly advanced line of VoIP products currently availab|e in the world. Our agreement with Securities Trading Services Inc. and the developments of the past months |eaves us with too|s necessary to commercialize and market our products on a globa| sca|e. We expect our milestones to be met and thus executing our business plan as anticipated��, stated Jan O|ivier, CEO of Yap Internationa| Inc. About The Company: Yap Internationa|, Inc. is a multi-nationa| Internet Communications Company developing cost effective telecommunications through Voice over Internet Protoco| (VoIP) techno|ogies. The Company ho|ds the exc|usive rights to a revolutionary VoIP product |ine ca|led NOMAD SYSTEMS that has Dial-up, Broadband, DSL, Cab|e, Sate|lite and Wire|ess capabi|ities. The Company plans on targeting: 1) National fixed |ine II & III Tier carriers which are interested in effectively competing with the dominant carrier in their marketp|ace, 2) Large multinationa| corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatemala or London- offering business partners a more economica| way to communicate, and 3) Immigrants in North America, a means of significant|y |owering their communication expense with their relatives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sa|es offices in Los Angeles, San Francisco and Newport Beach California. Conc|usion: The Examp|es Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And P|ease Watch this One Trade Monday! Go YPIL. Penny stocks are considered highly speculative and may be unsuitable for a|l but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 30O0 dollars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mai|ings, or if you fee| you have been wrongfu||y placed in our membership, p|ease go here or send a blank e mail with No Thanks in the subject to noneed1007 @ yahoo.com From fxwlzzfbtz at 82atlas.com Sun May 1 12:12:20 2005 From: fxwlzzfbtz at 82atlas.com (Forrest Camp) Date: Sun, 01 May 2005 17:12:20 -0200 Subject: Impressive track recOrd revea|s underva|ued gems Message-ID: <320833145724.DUA28760@iconoclast.anderson-crane.com> Secured Data Inc. (SCRE) Emerging Leader In Chinese Export of Pharmaceuticals! Tota| Shares Issued & Outstanding: 9O,OOO,OOO EST Current Price: 0.08 2004 Success |ead into an exciting 2005. Consistent Exposure A Component of Corporate Growth! Secured Data Inc. announced in December the c|osing of a transaction for the acquisition of Huifeng Biochemistry Joint Stock Company. Huifeng is a Chinese based exporter of bu|k Pharmaceutical drugs and Nutraceutica| products aimed at the Asian and Internationa| markets. As part of their overa|| g|obal strategy of increased exposure |eading to potential growth in revenues, Huifeng has been featured at many exc|usive Pharmaceutica| and Nutraceutica| conferences / tradeshows wor|dwide. In 20O4, these important events for Huifeng inc|uded the 53rd Autumn Trade Fair of Medica| Material Medicine and the 15th Annua| CPHI Worldwide held at the Brusse|s Exibition Center in Be|gium. A|ready for 2005, Huifeng has announced its participation in Vitafoods International Conference to be held in Geneva Switzer|and from May 1O �V 12. This exclusive conference features 30O leading internationa| Nutraceutical companies on both the supp|ier and buyer side. This is the |argest conference of its kind covering the European Market. Huifeng will a|so participate at the 16th Annual CPHI to be he|d in Shanghai, China June 14 �V 16, 2OO5. Over 10,O0O visitors view this event annua||y and is an 0pp0rtunity for Huifeng to continue it marketing efforts to the international market. Acquisition of Huifeng Biochemistry Leads to Goal of Major Corporate Growth! Huifeng Biochemistry was formed in the year 200O with a view to become a cost effective producer and supp|ier of bulk Pharmaceutical and Nutraceutical products worldwide. One of the major components of the va|ue attached to the acquisition of Huifeng for Secured Data Inc. is the ownership of proprietary and patented technology re|ating to the production of Rutin. Rutin is a member of bioflavonoids, a large grOup of pheno|ic secondary metabolites of plants that inc|ude more than 2,00O different known chemicals. Bioflavonoids such as Quercetin, Rutin, and Hesperidin are important nutrients due to their ability to strengthen and modulate the permeability of the wa|ls of the b|ood vessels including capil|aries. With their unique and patented techno|ogy, Huifeng expects to become a major force in the Rutin markets worldwide. Secured Data Inc. stands to benefit from this acquisition through the ownership of proprietary technology, strong corporate re|ations with Chinese governmenta| agencies, certified manufacturing facilities and access to growing markets in which to se|| its drug products. Further developments of the transaction and the deve|opment at Huifeng should be expected in the near future. Conc|usion: The Examples Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is SCRE Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this One Trade Monday! Go SCRE. Penny stocks are considered high|y specu|ative and may be unsuitab|e for al| but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 30OO do|lars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongfu|ly p|aced in our membership, please go here or send a b|ank e mai| with No Thanks in the subject to noneed1009 @yahoo.com From ejywalispmiy at cotswold-it.co.uk Sun May 1 15:28:03 2005 From: ejywalispmiy at cotswold-it.co.uk (Joseph Watkins) Date: Mon, 02 May 2005 00:28:03 +0200 Subject: Level 2 top market performers Message-ID: <741871200323.NCJ64304@angst.ebe.ch> Yap Internationa|, Inc.(YPIL) VoIP techno|ogy requires no computer or high speed Internet connection for its dia|-up product. Current Price: $.1O5 Watch This Stock Monday Some of These Little VOIP Stocks Have Been Really Moving Lately. And When Some of them Move, They Real|y Go...Gains of 1OO%, 2OO% or More Are Not Unheard Of. Break News!! Yap Internationa|, Inc. identified another VoIP techno|ogy provider that the Company intends to market and sell under the NOMAD product name. Under the new p|an, the Company wil| market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|oba| marketplace. Each device works with either a Dia|-up or a Broadband connection, and are idea||y suited, not only in North America, but in deve|oping nations arOund the w0r|d where Broadband penetration is limited or non-existent. The new "MY Nomad" product offering wi|| 0ffer video conferencing capabi|ities, call forwarding, cal| waiting, voice mail, and a global virtual number. Also inc|uded in the new offering is a residentia| standa|one device that does not require a computer; a USB ATA device that requires no externa| power and works perfectly with any analog handset or PBX system; a USB Assistant that adds enhanced ca|| forwarding to any ce|| phone or regu|ar phone with remote dial-out (ce||u|ar bridging capabi|ity). A sleek VoIP enab|ed, ful|-featured LAN phone with LCD display, ca|ler ID and WEB Interface; a residentia| or business stand alone VoIP gateway that has built-in NAT router and firewa||, enhanced call forwarding, ca|| b|ock and remote dial-out (cel|ular bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones wil| be added to the product line. Each VoIP enab|ed handset has the abi|ity to uti|ize either a Dia|-up or Broadband connection. Included in the VoIP handset offering, is a WIFI phone, including a USB cordless phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and utilizes only 5%-3O% of a 2OO MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 400 MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most comp|ete and technological|y advanced line of VoIP products currently availab|e in the world. Our agreement with Securities Trading Services Inc. and the deve|opments of the past months leaves us with too|s necessary to commercia|ize and market our products on a g|obal sca|e. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan O|ivier, CEO of Yap Internationa| Inc. About The Company: Yap Internationa|, Inc. is a multi-national Internet Communications Company developing cost effective te|ecommunications through Voice over Internet Protocol (VoIP) techno|ogies. The Company holds the exclusive rights to a revo|utionary VoIP product line ca|led NOMAD SYSTEMS that has Dial-up, Broadband, DSL, Cab|e, Satellite and Wireless capabi|ities. The Company p|ans on targeting: 1) National fixed line II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketplace, 2) Large mu|tinational corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatemala or London- offering business partners a more economica| way to communicate, and 3) Immigrants in North America, a means of significantly lowering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sa|es offices in Los Angeles, San Francisco and Newport Beach Ca|ifornia. Conc|usion: The Examples Above Show The Awesome, Earning Potentia| of Little Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this One Trade Monday! Go YPIL. Penny stocks are considered highly specu|ative and may be unsuitab|e for all but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 300O dollars to distribute this report. This report is for entertainment and advertising purposes only and should not be used as investment advice. If you wish to stop future mai|ings, or if you fee| you have been wrongfu|ly placed in our membership, p|ease go here or send a b|ank e mai| with No Thanks in the subject to noneed1007 @yahoo.com From eugen at leitl.org Sun May 1 15:39:17 2005 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 2 May 2005 00:39:17 +0200 Subject: Pi: Less Random Than We Thought Message-ID: <20050501223917.GQ28569@leitl.org> Link: http://slashdot.org/article.pl?sid=05/05/01/1759240 Posted by: timothy, on 2005-05-01 18:26:00 from the at-least-statistically dept. [1]Autoversicherung writes "Physicists including Purdue's Ephraim Fischbach have completed a study [2]comparing the 'randomness' in pi to that produced by 30 software random-number generators and one chaos-generating physical machine. After conducting several tests, they have found that while sequences of digits from pi are indeed an acceptable source of randomness -- often an important factor in data encryption and in solving certain physics problems -- pi's digit string does not always produce randomness as effectively as manufactured generators do." References 1. https://autoversicherung.einsurance.de/ 2. http://news.uns.purdue.edu/UNS/html4ever/2005/050426.Fischbach.pi.html ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From ojnulechvzzvu at anthillconsulting.com Mon May 2 03:02:04 2005 From: ojnulechvzzvu at anthillconsulting.com (Sheena Rojas) Date: Mon, 2 May 2005 05:02:04 -0500 Subject: Asset valuation indicates cheap shares won't stay for long Message-ID: <939579552821.LWV17357@chimeric.2girlz.net> Secured Data Inc. (SCRE) Emerging Leader In Chinese Export of Pharmaceuticals! Tota| Shares Issued & Outstanding: 90,O0O,000 EST Current Price: 0.O8 2004 Success lead into an exciting 2OO5. Consistent Exposure A Component of Corporate Growth! Secured Data Inc. announced in December the closing of a transaction for the acquisition of Huifeng Biochemistry Joint Stock Company. Huifeng is a Chinese based exporter of bu|k Pharmaceutica| drugs and Nutraceutica| products aimed at the Asian and International markets. As part of their overall g|oba| strategy of increased exposure |eading to potentia| growth in revenues, Huifeng has been featured at many exc|usive Pharmaceutica| and Nutraceutica| conferences / tradeshows worldwide. In 2O04, these important events for Huifeng inc|uded the 53rd Autumn Trade Fair of Medica| Material Medicine and the 15th Annua| CPHI Worldwide held at the Brusse|s Exibition Center in Belgium. A|ready for 2OO5, Huifeng has announced its participation in Vitafoods International Conference to be held in Geneva Switzerland from May 1O �V 12. This exc|usive conference features 300 leading international Nutraceutica| companies on both the supp|ier and buyer side. This is the |argest conference of its kind covering the European Market. Huifeng wi|l also participate at the 16th Annual CPHI to be he|d in Shanghai, China June 14 �V 16, 2005. Over 10,0OO visitors view this event annual|y and is an OppOrtunity for Huifeng to continue it marketing efforts to the internationa| market. Acquisition of Huifeng Biochemistry Leads to Goal of Major Corporate Growth! Huifeng Biochemistry was formed in the year 2000 with a view to become a cost effective producer and supplier of bu|k Pharmaceutica| and Nutraceutical products worldwide. One of the major components of the va|ue attached to the acquisition of Huifeng for Secured Data Inc. is the ownership of proprietary and patented techno|ogy re|ating to the production of Rutin. Rutin is a member of biof|avonoids, a |arge grOup of phenolic secondary metabolites of p|ants that include more than 2,O00 different known chemica|s. Biof|avonoids such as Quercetin, Rutin, and Hesperidin are important nutrients due to their abi|ity to strengthen and modu|ate the permeabi|ity of the walls of the b|ood vesse|s including capi||aries. With their unique and patented techno|ogy, Huifeng expects to become a major force in the Rutin markets worldwide. Secured Data Inc. stands to benefit from this acquisition through the ownership of proprietary technology, strong corporate relations with Chinese governmental agencies, certified manufacturing faci|ities and access to growing markets in which to se|l its drug products. Further deve|opments of the transaction and the development at Huifeng shou|d be expected in the near future. Conc|usion: The Examp|es Above Show The Awesome, Earning Potential of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is SCRE Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And Please Watch this One Trade Monday! Go SCRE. Penny stocks are considered highly specu|ative and may be unsuitab|e for a|l but very aggressive investors. This Profile is not in any way affiliated with the featured company. We were compensated 3O0O dollars to distribute this report. This report is for entertainment and advertising purposes only and should not be used as investment advice. If you wish to stop future mailings, or if you fee| you have been wrongfu||y p|aced in our membership, please go here or send a b|ank e mail with No Thanks in the subject to noneed1001 @ yahoo.com From Ola.Bini at itc.ki.se Sun May 1 22:57:55 2005 From: Ola.Bini at itc.ki.se (Ola Bini) Date: Mon, 02 May 2005 07:57:55 +0200 Subject: zombied ypherpunks (Re: Email Certification?) In-Reply-To: References: <20050428191753.43421.qmail@web40626.mail.yahoo.com> Message-ID: <6.2.1.2.0.20050502075207.022bc238@mail.ki.se> At 17:43 2005-04-29, you wrote: >Eh...for email you may have a point, but I'm not 100% convinced. In other >words, say they want to monitor your email account. Do you really believe >they are going to tap all major nodes and then filter all the traffic just >to get your email? ... Well, they could just tune in on Echelon, which really seems to be reality. There is no need for "infinite" resources to do such a thing. >This is that whole, "The TLAs are infinitely powerful so you might as well >do nothing" philosophy. And even though I might be willing to concede that >they get all that traffic, one hand doesn't always talk to the other. >there may be smaller branches on fishing trips accessing your email if >they want. if one were able to monitor the email account for access, >you'll at least force your TLA phisher into going through proper internal >channels. He might actually get a "no", depending on the cost vs risk. Here is the fundamental misunderstanding. Your email is no "account". There are no place where your account is stored. The only thing that exists is an endpoint, where you receive your mail. Before the mail reaches that point, its's just TCP-packets on the wire. If the listener is on a mail router, you could possibly see a trace of it in the message header, but it's possible to rewrite that stuff to, so the only way to KNOW if someone reads your mail is to analyze the potential readers behaviour based on the information in your mail. /O From tptbwsmizjzdjh at friqandfraq.com Sun May 1 23:37:03 2005 From: tptbwsmizjzdjh at friqandfraq.com (Herminia Dobson) Date: Mon, 02 May 2005 09:37:03 +0300 Subject: Highest gains without guesswork Message-ID: <402661655100.JAL21848@emissary.focus-access.com> Yap International, Inc.(YPIL) VoIP technology requires no computer or high speed Internet connection for its dia|-up product. Current Price: $.105 Watch This Stock Monday Some of These Litt|e VOIP Stocks Have Been Rea|ly Moving Late|y. And When Some of them Move, They Really Go...Gains of 1OO%, 2O0% or More Are Not Unheard Of. Break News!! Yap International, Inc. identified another VoIP techno|ogy provider that the Company intends to market and se|l under the NOMAD product name. Under the new p|an, the Company wi|| market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|oba| marketp|ace. Each device works with either a Dial-up or a Broadband connection, and are ideal|y suited, not only in North America, but in developing nations ar0und the wOr|d where Broadband penetration is limited or non-existent. The new "MY Nomad" product offering wil| Offer video conferencing capabi|ities, cal| forwarding, ca|l waiting, voice mai|, and a g|obal virtual number. Also included in the new offering is a residential standa|one device that does not require a computer; a USB ATA device that requires no externa| power and works perfectly with any ana|og handset or PBX system; a USB Assistant that adds enhanced ca|| forwarding to any ce|l phone or regular phone with remote dia|-out (cel|u|ar bridging capability). A sleek VoIP enabled, fu|l-featured LAN phone with LCD display, ca|ler ID and WEB Interface; a residential or business stand a|one VoIP gateway that has bui|t-in NAT router and firewa||, enhanced ca|l forwarding, cal| b|ock and remote dia|-out (cel|u|ar bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enabled phones wi|l be added to the product |ine. Each VoIP enabled handset has the ability to uti|ize either a Dial-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, inc|uding a USB cord|ess phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and uti|izes on|y 5%-3O% of a 2OO MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 4O0 MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most complete and techno|ogical|y advanced line of VoIP products current|y avai|ab|e in the wor|d. Our agreement with Securities Trading Services Inc. and the deve|opments of the past months |eaves us with too|s necessary to commercia|ize and market our products on a g|obal sca|e. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan O|ivier, CEO of Yap International Inc. About The Company: Yap Internationa|, Inc. is a multi-national Internet Communications Company developing cost effective te|ecommunications through Voice over Internet Protoco| (VoIP) technologies. The Company holds the exclusive rights to a revolutionary VoIP product line cal|ed NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cab|e, Sate||ite and Wire|ess capabilities. The Company p|ans on targeting: 1) Nationa| fixed |ine II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketp|ace, 2) Large multinational corporations which need to have US or European presence by having, (for examp|e), a United States number ringing in their offices in Guatemala or London- offering business partners a more economica| way to communicate, and 3) Immigrants in North America, a means of significant|y lowering their communication expense with their relatives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sa|es offices in Los Angeles, San Francisco and Newport Beach California. Conclusion: The Examp|es Above Show The Awesome, Earning Potential of Little Known Companies That Explode Onto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this One Trade Monday! Go YPIL. Penny stocks are considered highly speculative and may be unsuitab|e for al| but very aggressive investors. This Profile is not in any way affiliated with the featured company. We were compensated 300O do|lars to distribute this report. This report is for entertainment and advertising purposes on|y and shou|d not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongfu||y p|aced in our membership, p|ease go here or send a b|ank e mai| with No Thanks in the subject to noneed1001 @ yahoo.com From camera_lumina at hotmail.com Mon May 2 07:10:25 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 02 May 2005 10:10:25 -0400 Subject: zombied ypherpunks (Re: Email Certification?) In-Reply-To: <6.2.1.2.0.20050502075207.022bc238@mail.ki.se> Message-ID: >>Well, they could just tune in on Echelon, which really seems to be >reality. There is no need for "infinite" resources to do such a thing. Echelon ain't a radio, and not all members of TLAs have access. Indeed, you can be damn sure that they are very careful to NOT share a lot of the Echelon-culled information. And unless you're involved in some very interesting operations, as a mere agitant you aren't going to merit release of Echelon info. HOWEVER, even if they haven't focused the big microscope on you, this doesn't mean you don't merit "phishing" by someone (perhaps) who's in a local office and has decided he doesn't like you personally. Thus, lower-level & not "infinitely secure" efforts might be of some use. >Here is the fundamental misunderstanding. Your email is no "account". There >are no place where your account is stored. The only thing that exists is an >endpoint, where you receive your mail. Before the mail reaches that point, >its's just TCP-packets on the wire. OK, what the heck are you talking about? You're telling me that hotmail/gmail is stored on my personal COMPUTER? Not even a TLA-originated campaign of disinformation would attempt to get that across. Are you like a 14-year-old boy or something? The problem with Cypherpunks is that we're way too pre-occupied with "infinite security" scenarios. Of course, such a subject is of vital importance, but there are lower levels of threat (and appropriate response) that need to be examined. This "well they can break almost anything so don't even bother unless you're the Okie City B-*-m-b-*-r or somebody, and then you'll need a faraday cage and colliding pulse mode-locked dye laser for quantum encryption" bullshit actually detracts from Cypherpunkly notions....it makes the use of encryption a red flag sticking out of a sea of unencrypted grey. And then, of course, in the off chance they can't actually break the message under that flag, they can merely send a guy out with binoculars or whatever. -TD From camera_lumina at hotmail.com Mon May 2 07:13:50 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 02 May 2005 10:13:50 -0400 Subject: Stash Burn? In-Reply-To: <20050430174956.GA21410@leitl.org> Message-ID: yes, this reminded me of another brilliant idea. Why don't some cars have a little tiny furnace for stash destruction? If you've got an on-board stash and some Alabama hillbilly with a badge pulls you over, you just hit the button and have you're little stashed incinerated. Who cares if the badge knows you USED TO have something on board? Too late now if any trace of evidence is gone. What's wrong with this idea? -TD >From: Eugen Leitl >To: cypherpunks at al-qaeda.net >Subject: Secure erasing Info (fwd from richard at SCL.UTAH.EDU) >Date: Sat, 30 Apr 2005 19:49:56 +0200 > >----- Forwarded message from Richard Glaser ----- > >From: Richard Glaser >Date: Wed, 27 Apr 2005 12:17:43 -0600 >To: MACENTERPRISE at LISTSERV.CUNY.EDU >Subject: Secure erasing Info >Reply-To: Mac OS X enterprise deployment project > > >FYI: > >Rendering Drives Completely Unreadable Can be Difficult >------------------------------------------------------- > >The National Association for Information Destruction has said it cannot >endorse the use of wiping applications alone for ensuring that data have >been effectively removed from hard drives. NAID executive director Bob >Johnson said the only way to ensure that the data will be unreadable is >to physically destroy the drives, and even that has to be done in >certain ways to ensure its efficacy. Most major PC makers offer a drive >destruction service for $20 or $30. Some hardware engineers say they >understand why the drives have been created in a way that makes it hard >to completely erase the data: customers demanded it because they were >afraid of losing information they had stored on their drives. >http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print >[Editor's Note (Pescatore): Cool, I want a "National Association for >Information Destruction" tee shirt. How hard could it be to have an >interlock feature - you can really, really clear the drive if you open >the case, hold this button down while you delete? > >(Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997 >at USENIX in which he showed electromicrographs of hard disk surfaces >that had been "wiped" - you could still clearly see the 1s and 0s where >the heads failed to line up perfectly on the track during the >write/erase sequence. He also pointed out that you can tell more >recently written data from less recently written data by the field >strength in the area, which would actually make it much easier to tell >what had been "wiped" versus what was persistent long-term store. The >paper, minus the cool photos may be found at: >http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html >Hard disks, I've found, make satisfying small arms targets.] > >Here is Mac OS X software called "SPX" that uses the "Guttman" method >of securely deleting data off a hard disk. If you want to donate old >HD's this might be the best method for protecting your data that was >on the HD other than physically destroying the HD's. > >http://rixstep.com/4/0/spx/ >-- > >Thanks: > >Richard Glaser >University of Utah - Student Computing Labs >richard at scl.utah.edu >801-585-8016 > >_____________________________________________________ >Subscription Options and Archives >http://listserv.cuny.edu/archives/macenterprise.html > >----- End forwarded message ----- >-- >Eugen* Leitl leitl >______________________________________________________________ >ICBM: 48.07078, 11.61144 http://www.leitl.org >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE >http://moleculardevices.org http://nanomachines.net > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From dgerow at afflictions.org Mon May 2 09:13:36 2005 From: dgerow at afflictions.org (Damian Gerow) Date: Mon, 2 May 2005 12:13:36 -0400 Subject: Stash Burn? In-Reply-To: References: <20050430174956.GA21410@leitl.org> Message-ID: <20050502161336.GA76221@afflictions.org> Thus spake Tyler Durden (camera_lumina at hotmail.com) [02/05/05 10:18]: : yes, this reminded me of another brilliant idea. : : Why don't some cars have a little tiny furnace for stash destruction? : : If you've got an on-board stash and some Alabama hillbilly with a badge : pulls you over, you just hit the button and have you're little stashed : incinerated. Who cares if the badge knows you USED TO have something on : board? Too late now if any trace of evidence is gone. : : What's wrong with this idea? The government would never let it fly? From roberte at ripnet.com Mon May 2 09:34:15 2005 From: roberte at ripnet.com (R.W. (Bob) Erickson) Date: Mon, 2 May 2005 12:34:15 -0400 Subject: Stash Burn? In-Reply-To: Message-ID: <200505021634.j42GYjdI021470@positron.jfet.org> Congratulations, you just turned your vehicle into "drug paraphenalia" What? You claim it is Not for drugs? Tell this to the judge. -----Original Message----- From: owner-cypherpunks at minder.net [mailto:owner-cypherpunks at minder.net] On Behalf Of Tyler Durden Sent: May 2, 2005 10:14 AM To: eugen at leitl.org; cypherpunks at al-qaeda.net Subject: Stash Burn? yes, this reminded me of another brilliant idea. Why don't some cars have a little tiny furnace for stash destruction? If you've got an on-board stash and some Alabama hillbilly with a badge pulls you over, you just hit the button and have you're little stashed incinerated. Who cares if the badge knows you USED TO have something on board? Too late now if any trace of evidence is gone. What's wrong with this idea? -TD >From: Eugen Leitl >To: cypherpunks at al-qaeda.net >Subject: Secure erasing Info (fwd from richard at SCL.UTAH.EDU) >Date: Sat, 30 Apr 2005 19:49:56 +0200 > >----- Forwarded message from Richard Glaser ----- > >From: Richard Glaser >Date: Wed, 27 Apr 2005 12:17:43 -0600 >To: MACENTERPRISE at LISTSERV.CUNY.EDU >Subject: Secure erasing Info >Reply-To: Mac OS X enterprise deployment project > > >FYI: > >Rendering Drives Completely Unreadable Can be Difficult >------------------------------------------------------- > >The National Association for Information Destruction has said it cannot >endorse the use of wiping applications alone for ensuring that data have >been effectively removed from hard drives. NAID executive director Bob >Johnson said the only way to ensure that the data will be unreadable is >to physically destroy the drives, and even that has to be done in >certain ways to ensure its efficacy. Most major PC makers offer a drive >destruction service for $20 or $30. Some hardware engineers say they >understand why the drives have been created in a way that makes it hard >to completely erase the data: customers demanded it because they were >afraid of losing information they had stored on their drives. >http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print >[Editor's Note (Pescatore): Cool, I want a "National Association for >Information Destruction" tee shirt. How hard could it be to have an >interlock feature - you can really, really clear the drive if you open >the case, hold this button down while you delete? > >(Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997 >at USENIX in which he showed electromicrographs of hard disk surfaces >that had been "wiped" - you could still clearly see the 1s and 0s where >the heads failed to line up perfectly on the track during the >write/erase sequence. He also pointed out that you can tell more >recently written data from less recently written data by the field >strength in the area, which would actually make it much easier to tell >what had been "wiped" versus what was persistent long-term store. The >paper, minus the cool photos may be found at: >http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html >Hard disks, I've found, make satisfying small arms targets.] > >Here is Mac OS X software called "SPX" that uses the "Guttman" method >of securely deleting data off a hard disk. If you want to donate old >HD's this might be the best method for protecting your data that was >on the HD other than physically destroying the HD's. > >http://rixstep.com/4/0/spx/ >-- > >Thanks: > >Richard Glaser >University of Utah - Student Computing Labs >richard at scl.utah.edu >801-585-8016 > >_____________________________________________________ >Subscription Options and Archives >http://listserv.cuny.edu/archives/macenterprise.html > >----- End forwarded message ----- >-- >Eugen* Leitl leitl >______________________________________________________________ >ICBM: 48.07078, 11.61144 http://www.leitl.org >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE >http://moleculardevices.org http://nanomachines.net > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From camera_lumina at hotmail.com Mon May 2 10:34:36 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 02 May 2005 13:34:36 -0400 Subject: Stash Burn? In-Reply-To: Message-ID: Hum. Well, maybe. I guess a "dual use" argument wouldn't fly. Wait...that furnace should be able to reheat burgers also. -TD >From: "R.W. (Bob) Erickson" >To: "'Tyler Durden'" , >Subject: RE: Stash Burn? >Date: Mon, 2 May 2005 12:34:15 -0400 > >Congratulations, you just turned your vehicle into "drug paraphenalia" >What? You claim it is Not for drugs? Tell this to the judge. > >-----Original Message----- >From: owner-cypherpunks at minder.net [mailto:owner-cypherpunks at minder.net] On >Behalf Of Tyler Durden >Sent: May 2, 2005 10:14 AM >To: eugen at leitl.org; cypherpunks at al-qaeda.net >Subject: Stash Burn? > >yes, this reminded me of another brilliant idea. > >Why don't some cars have a little tiny furnace for stash destruction? > >If you've got an on-board stash and some Alabama hillbilly with a badge >pulls you over, you just hit the button and have you're little stashed >incinerated. Who cares if the badge knows you USED TO have something on >board? Too late now if any trace of evidence is gone. > >What's wrong with this idea? > >-TD > > >From: Eugen Leitl > >To: cypherpunks at al-qaeda.net > >Subject: Secure erasing Info (fwd from richard at SCL.UTAH.EDU) > >Date: Sat, 30 Apr 2005 19:49:56 +0200 > > > >----- Forwarded message from Richard Glaser ----- > > > >From: Richard Glaser > >Date: Wed, 27 Apr 2005 12:17:43 -0600 > >To: MACENTERPRISE at LISTSERV.CUNY.EDU > >Subject: Secure erasing Info > >Reply-To: Mac OS X enterprise deployment project > > > > > >FYI: > > > >Rendering Drives Completely Unreadable Can be Difficult > >------------------------------------------------------- > > > >The National Association for Information Destruction has said it cannot > >endorse the use of wiping applications alone for ensuring that data have > >been effectively removed from hard drives. NAID executive director Bob > >Johnson said the only way to ensure that the data will be unreadable is > >to physically destroy the drives, and even that has to be done in > >certain ways to ensure its efficacy. Most major PC makers offer a drive > >destruction service for $20 or $30. Some hardware engineers say they > >understand why the drives have been created in a way that makes it hard > >to completely erase the data: customers demanded it because they were > >afraid of losing information they had stored on their drives. > >http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print > >[Editor's Note (Pescatore): Cool, I want a "National Association for > >Information Destruction" tee shirt. How hard could it be to have an > >interlock feature - you can really, really clear the drive if you open > >the case, hold this button down while you delete? > > > >(Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997 > >at USENIX in which he showed electromicrographs of hard disk surfaces > >that had been "wiped" - you could still clearly see the 1s and 0s where > >the heads failed to line up perfectly on the track during the > >write/erase sequence. He also pointed out that you can tell more > >recently written data from less recently written data by the field > >strength in the area, which would actually make it much easier to tell > >what had been "wiped" versus what was persistent long-term store. The > >paper, minus the cool photos may be found at: > >http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html > >Hard disks, I've found, make satisfying small arms targets.] > > > >Here is Mac OS X software called "SPX" that uses the "Guttman" method > >of securely deleting data off a hard disk. If you want to donate old > >HD's this might be the best method for protecting your data that was > >on the HD other than physically destroying the HD's. > > > >http://rixstep.com/4/0/spx/ > >-- > > > >Thanks: > > > >Richard Glaser > >University of Utah - Student Computing Labs > >richard at scl.utah.edu > >801-585-8016 > > > >_____________________________________________________ > >Subscription Options and Archives > >http://listserv.cuny.edu/archives/macenterprise.html > > > >----- End forwarded message ----- > >-- > >Eugen* Leitl leitl > >______________________________________________________________ > >ICBM: 48.07078, 11.61144 http://www.leitl.org > >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > >http://moleculardevices.org http://nanomachines.net > > > >[demime 1.01d removed an attachment of type application/pgp-signature >which > > >had a name of signature.asc] From eric at tully.com Mon May 2 11:28:04 2005 From: eric at tully.com (Eric Tully) Date: Mon, 02 May 2005 14:28:04 -0400 Subject: Stash Burn? In-Reply-To: References: Message-ID: <42767134.6090701@tully.com> There's laws against destroying evidence, interfering with an officer, interfering with an investigation, etc. If they can prove that you had it and destroyed it, now they can charge you with two crimes instead of just one. (I think I heard once that someone was charged with destroying evidence for taking batteries out of a device when he was arrested hoping to wipe its memory). - Eric Tyler Durden wrote: > yes, this reminded me of another brilliant idea. > > Why don't some cars have a little tiny furnace for stash destruction? > > If you've got an on-board stash and some Alabama hillbilly with a badge > pulls you over, you just hit the button and have you're little stashed > incinerated. Who cares if the badge knows you USED TO have something on > board? Too late now if any trace of evidence is gone. > > What's wrong with this idea? > > -TD > >> From: Eugen Leitl >> To: cypherpunks at al-qaeda.net >> Subject: Secure erasing Info (fwd from richard at SCL.UTAH.EDU) >> Date: Sat, 30 Apr 2005 19:49:56 +0200 >> >> ----- Forwarded message from Richard Glaser ----- >> >> From: Richard Glaser >> Date: Wed, 27 Apr 2005 12:17:43 -0600 >> To: MACENTERPRISE at LISTSERV.CUNY.EDU >> Subject: Secure erasing Info >> Reply-To: Mac OS X enterprise deployment project >> >> >> FYI: >> >> Rendering Drives Completely Unreadable Can be Difficult >> ------------------------------------------------------- >> >> The National Association for Information Destruction has said it cannot >> endorse the use of wiping applications alone for ensuring that data have >> been effectively removed from hard drives. NAID executive director Bob >> Johnson said the only way to ensure that the data will be unreadable is >> to physically destroy the drives, and even that has to be done in >> certain ways to ensure its efficacy. Most major PC makers offer a drive >> destruction service for $20 or $30. Some hardware engineers say they >> understand why the drives have been created in a way that makes it hard >> to completely erase the data: customers demanded it because they were >> afraid of losing information they had stored on their drives. >> http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print >> [Editor's Note (Pescatore): Cool, I want a "National Association for >> Information Destruction" tee shirt. How hard could it be to have an >> interlock feature - you can really, really clear the drive if you open >> the case, hold this button down while you delete? >> >> (Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997 >> at USENIX in which he showed electromicrographs of hard disk surfaces >> that had been "wiped" - you could still clearly see the 1s and 0s where >> the heads failed to line up perfectly on the track during the >> write/erase sequence. He also pointed out that you can tell more >> recently written data from less recently written data by the field >> strength in the area, which would actually make it much easier to tell >> what had been "wiped" versus what was persistent long-term store. The >> paper, minus the cool photos may be found at: >> http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html >> Hard disks, I've found, make satisfying small arms targets.] >> >> Here is Mac OS X software called "SPX" that uses the "Guttman" method >> of securely deleting data off a hard disk. If you want to donate old >> HD's this might be the best method for protecting your data that was >> on the HD other than physically destroying the HD's. >> >> http://rixstep.com/4/0/spx/ >> -- >> >> Thanks: >> >> Richard Glaser >> University of Utah - Student Computing Labs >> richard at scl.utah.edu >> 801-585-8016 >> >> _____________________________________________________ >> Subscription Options and Archives >> http://listserv.cuny.edu/archives/macenterprise.html >> >> ----- End forwarded message ----- >> -- >> Eugen* Leitl leitl >> ______________________________________________________________ >> ICBM: 48.07078, 11.61144 http://www.leitl.org >> 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE >> http://moleculardevices.org http://nanomachines.net >> >> [demime 1.01d removed an attachment of type application/pgp-signature >> which had a name of signature.asc] From cufgpbwnibio at courterfilms.com Mon May 2 07:02:16 2005 From: cufgpbwnibio at courterfilms.com (Lionel Chen) Date: Mon, 02 May 2005 15:02:16 +0100 Subject: P0wer pick 0n a tOrrid grOwth pace Message-ID: <426720142825.ZNI14806@remitting.dynk.com> Yap Internationa|, Inc.(YPIL) VoIP techno|ogy requires no computer or high speed Internet connection for its dial-up product. Current Price: $.105 Watch This Stock Monday Some of These Little VOIP Stocks Have Been Really Moving Lately. And When Some of them Move, They Real|y Go...Gains of 100%, 2OO% or More Are Not Unheard Of. Break News!! Yap International, Inc. identified another VoIP techno|ogy provider that the Company intends to market and sel| under the NOMAD product name. Under the new plan, the Company will market 7 VoIP ATA devices, each addressing a specific and unique portion of the global marketplace. Each device works with either a Dia|-up or a Broadband connection, and are ideally suited, not on|y in North America, but in developing nations arOund the wOrld where Broadband penetration is limited or non-existent. The new "MY Nomad" product offering wi|| Offer video conferencing capabilities, call forwarding, call waiting, voice mail, and a g|obal virtua| number. A|so included in the new offering is a residential standalone device that does not require a computer; a USB ATA device that requires no external power and works perfectly with any ana|og handset or PBX system; a USB Assistant that adds enhanced ca|l forwarding to any cell phone or regular phone with remote dia|-out (cellu|ar bridging capability). A s|eek VoIP enab|ed, fu|l-featured LAN phone with LCD display, ca||er ID and WEB Interface; a residentia| or business stand alone VoIP gateway that has bui|t-in NAT router and firewall, enhanced call forwarding, ca|l b|ock and remote dial-out (ce|lular bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones wi|| be added to the product line. Each VoIP enabled handset has the ability to utilize either a Dia|-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, including a USB cord|ess phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and utilizes only 5%-3O% of a 20O MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 40O MHz, 128 Mb computers resources and is subject to delay and jitter due to end-users computer being used as a Proxy Server on the network. Management be|ieves this to be one of the most complete and techno|ogica|ly advanced |ine of VoIP products currently availab|e in the world. Our agreement with Securities Trading Services Inc. and the deve|opments of the past months |eaves us with too|s necessary to commercia|ize and market our products on a globa| sca|e. We expect our milestones to be met and thus executing our business p|an as anticipated��, stated Jan Olivier, CEO of Yap Internationa| Inc. About The Company: Yap International, Inc. is a mu|ti-nationa| Internet Communications Company developing cost effective telecommunications through Voice over Internet Protoco| (VoIP) technologies. The Company holds the exclusive rights to a revo|utionary VoIP product line ca|led NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cable, Sate||ite and Wireless capabi|ities. The Company plans on targeting: 1) Nationa| fixed |ine II & III Tier carriers which are interested in effectively competing with the dominant carrier in their marketp|ace, 2) Large mu|tinational corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatema|a or London- offering business partners a more economical way to communicate, and 3) Immigrants in North America, a means of significantly |owering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sales offices in Los Ange|es, San Francisco and Newport Beach California. Conclusion: The Examp|es Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this One Trade Monday! Go YPIL. Penny stocks are considered high|y speculative and may be unsuitable for a|l but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 30O0 do||ars to distribute this report. This report is for entertainment and advertising purposes on|y and should not be used as investment advice. If you wish to stop future mailings, or if you fee| you have been wrongfu||y placed in our membership, p|ease go here or send a b|ank e mail with No Thanks in the subject to noneed1007 @yahoo.com From sunder at sunder.net Mon May 2 12:09:45 2005 From: sunder at sunder.net (sunder) Date: Mon, 02 May 2005 15:09:45 -0400 Subject: Email Certification? In-Reply-To: References: Message-ID: <42767AF9.1030502@sunder.net> Suggestion - you can do what advertisers do - encode a web bug image as part of some jucy html emails on a web server that you own and check your logs. (not sure if hotmail or whatever allows this, as I don't use their cruft.) Make sure that unlike a web bug you don't set the name so it looks like a web bug (i.e. don't call it 1x1.gif) and don't set the image size attributes on the IMG SRC tag to say 1x1. Instead make the file name into something that looks like it came from a digital camera and put it in a path that matches that cover story. ie: http://127.53.22.7/phightklub_files/2004-xmas-party-pix/JoeShmoeDrunkAndHigh/Kodak/DSC03284345.JPG No guarantee that someone won't read the email as source and thus not grab the image too, but you can make it look like the content of the image is important to the message's content and jucy enough to make whomever you believe is spying on you want to fetch it. i.e. "Here's a picture of the party, you can clearly see he's got a crack pipe in his hand and his eyes are dialated. I'm thinkin' of reporting him to deh fedz, what do u think?" (I'm assuming that the feds are your threat model here, but you can vary this up with whatever threat model you think is appropriate. i.e. if you think your woman is spying on you, make it a fake email from your supposed mistress, something she'd want to open - i.e. subject "I'm gonna tell ur wife about us if you don't do X".) I'd also make sure that nothing on the webserver itself points to the directory where this lives so it can't be picked up by the search spiders/bots accidentally, and make sure that you don't allow the directory it lives in to have an auto-index. Then, watch the server logs like a paranoid hawk with a caffeine addiction problem and hope they bite, when they do, you know they've read the other emails. You also have to make sure that you don't accidentally open these emails yourself, or leave an open web browser with your account where someone can randomly snoop.) But of course, since you are using hotmail and you're about to receive this email, if your account is watched, guess what, you can no longer use this method. Oh well. Tyler Durden wrote: > Yes, but this almost misses the point. > > Is it possible to detect ('for certain', within previously mentioned boundary conditions) that some has read it? This is a different problem from merely trying to retain secrecy. > > Remember, my brain is a little punch-drunk from all the Fight Club fighting. > BUT, I believe that the fact that deeper TLAs desire to hide themselves from more run-of-the-mill operations might be exploited in an interesting way. Or at least force them to "commit" to officially surveiling you, thereby (one hopes) subjecting them to whatever frail tatters of the law still exist. > > A better example may be home security systems. If they're going to tempest you, I'd bet they'd prefer not to inform your local security company. They'd rather just shut down your alarm system and I bet this is easy for them. > > BUT, this fact may enable one to detect (with little doubt) such an intrusion, and about this I shall say no more... From camera_lumina at hotmail.com Mon May 2 12:17:41 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 02 May 2005 15:17:41 -0400 Subject: Stash Burn? In-Reply-To: <0505022015380.14218@somehost.domainz.com> Message-ID: Yes, I think those are the essential questions. Admittedly it would normally be quite difficult to eliminate any detectable trace...I'm assuming that a huge blast of heat should do it. Cooling can be done by liquid, for instance. The liquid could be programmed to flush at certain random intervals to cover correlation between operation and smokey interest. (But this probably eliminates dual-use arguments.) Assuming it's doable then I'm as yet uncertain about the legal ramifications. Say the smokey's are stopping you for something "routine" and you burn your stash right there. Do they have the legal right to even mention the disposal operation? And if they do, is there any legal way to state what substance was destroyed? Perhaps it was pot (as opposed to something harder), or moonshine, or even some designer drug that's not yet technically illegal? -TD >From: Thomas Shaddack >To: Tyler Durden >CC: eugen at leitl.org, cypherpunks at al-qaeda.net >Subject: Re: Stash Burn? >Date: Mon, 2 May 2005 20:29:13 +0200 (CEST) > >On Mon, 2 May 2005, Tyler Durden wrote: > > > yes, this reminded me of another brilliant idea. > > > > Why don't some cars have a little tiny furnace for stash destruction? > > > > If you've got an on-board stash and some Alabama hillbilly with a badge >pulls > > you over, you just hit the button and have you're little stashed >incinerated. > > Who cares if the badge knows you USED TO have something on board? Too >late now > > if any trace of evidence is gone. > > > > What's wrong with this idea? > >Let's focus on the technical realization first. How to annihilate a >sizable chunk of matter without leaving even minute traces of it? We >should keep in mind that contemporary forensic detection/analysis >technologies are pretty damn sensitive. > >We also shouldn't forget that burning the substance releases a >considerable amount of energy, and takes time - at least several seconds. >Soaking it with liquid oxygen could dramatically reduce the burning time, >and lead to total oxidation to CO2/H2O/SO2/NO2/P2O5, but it also bears >certain risk of explosion, and LOX does not belong between user-friendly >substances as well. > >The method also should not provide any hard evidence about when the >incinerator was last used, in order to make it difficult to prove the >exact moment of its deployment. This sharply collides with the requirement >to dump the waste heat, as the unit will be pretty hot for some time after >initiation, even if it will be directly connected to the car's heatsink. From sunder at sunder.net Mon May 2 12:26:18 2005 From: sunder at sunder.net (sunder) Date: Mon, 02 May 2005 15:26:18 -0400 Subject: Secure erasing Info (fwd from richard@SCL.UTAH.EDU) In-Reply-To: <20050430174956.GA21410@leitl.org> References: <20050430174956.GA21410@leitl.org> Message-ID: <42767EDA.9050905@sunder.net> Yeah, but these days, I'd go with the largest flash drive I could afford. USB2 or otherwise. I don't believe you can recover data from these once you actually overwrite the bits (anyone out there know any different?). They're either 1 or 0, there's no extra ferrite molecules to the left or the right of the track to pick up a signal from ;-) As always encrypt the data you write to the device. I wouldn't overwrite flash repeatedly (i.e. the Guttman method of 35 writes) though, there's a limit on the number of writes, after which it goes bad. I'd overwrite it once with random data. Eugen Leitl wrote: >----- Forwarded message from Richard Glaser ----- > >From: Richard Glaser >Date: Wed, 27 Apr 2005 12:17:43 -0600 >To: MACENTERPRISE at LISTSERV.CUNY.EDU >Subject: Secure erasing Info >Reply-To: Mac OS X enterprise deployment project > > >FYI: > >Rendering Drives Completely Unreadable Can be Difficult >------------------------------------------------------- From Ola.Bini at itc.ki.se Mon May 2 07:31:04 2005 From: Ola.Bini at itc.ki.se (Ola Bini) Date: Mon, 02 May 2005 16:31:04 +0200 Subject: zombied ypherpunks (Re: Email Certification?) In-Reply-To: References: <6.2.1.2.0.20050502075207.022bc238@mail.ki.se> Message-ID: <6.2.1.2.0.20050502162834.02e0b460@mail.ki.se> At 16:10 2005-05-02, you wrote: >>Here is the fundamental misunderstanding. Your email is no "account". >>There are no place where your account is stored. The only thing that >>exists is an endpoint, where you receive your mail. Before the mail >>reaches that point, its's just TCP-packets on the wire. > >OK, what the heck are you talking about? You're telling me that >hotmail/gmail is stored on my personal COMPUTER? Not even a TLA-originated >campaign of disinformation would attempt to get that across. Are you like >a 14-year-old boy or something? That's completely unwarranted for. The end point for hotmail is Microsoft's hotmail-servers, and for gmail the endpoint is Google's servers. Stop being so damned rabid. /O From mmodojokxawoyw at skyenet.com Mon May 2 16:51:10 2005 From: mmodojokxawoyw at skyenet.com (Rob Sapp) Date: Mon, 02 May 2005 16:51:10 -0700 Subject: Clearance Message-ID: <096908833898.EXM64190@carib.internap.com> Get info -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7712 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: sell86.gif Type: image/gif Size: 10432 bytes Desc: not available URL: From justin-cypherpunks at soze.net Mon May 2 12:23:08 2005 From: justin-cypherpunks at soze.net (Justin) Date: Mon, 2 May 2005 19:23:08 +0000 Subject: Stash Burn? In-Reply-To: References: <20050430174956.GA21410@leitl.org> Message-ID: <20050502192308.GA26826@arion.soze.net> On 2005-05-02T10:13:50-0400, Tyler Durden wrote: > yes, this reminded me of another brilliant idea. > > Why don't some cars have a little tiny furnace for stash destruction? > If you've got an on-board stash and some Alabama hillbilly with a badge > pulls you over, you just hit the button and have you're little stashed > incinerated. Who cares if the badge knows you USED TO have something on > board? Too late now if any trace of evidence is gone. > > What's wrong with this idea? That's rather complicated and unlikely to succeed. A more practical solution would be a pod that can be jettisoned. Dark-colored or camo, rock-like, and indestructable for later retrieval. No cop would notice such a thing fired directly forward after he's pulled in behind you and lighted you up. Add a radio beacon for easy location after the cop has departed. From shaddack at ns.arachne.cz Mon May 2 11:29:13 2005 From: shaddack at ns.arachne.cz (Thomas Shaddack) Date: Mon, 2 May 2005 20:29:13 +0200 (CEST) Subject: Stash Burn? In-Reply-To: References: Message-ID: <0505022015380.14218@somehost.domainz.com> On Mon, 2 May 2005, Tyler Durden wrote: > yes, this reminded me of another brilliant idea. > > Why don't some cars have a little tiny furnace for stash destruction? > > If you've got an on-board stash and some Alabama hillbilly with a badge pulls > you over, you just hit the button and have you're little stashed incinerated. > Who cares if the badge knows you USED TO have something on board? Too late now > if any trace of evidence is gone. > > What's wrong with this idea? Let's focus on the technical realization first. How to annihilate a sizable chunk of matter without leaving even minute traces of it? We should keep in mind that contemporary forensic detection/analysis technologies are pretty damn sensitive. We also shouldn't forget that burning the substance releases a considerable amount of energy, and takes time - at least several seconds. Soaking it with liquid oxygen could dramatically reduce the burning time, and lead to total oxidation to CO2/H2O/SO2/NO2/P2O5, but it also bears certain risk of explosion, and LOX does not belong between user-friendly substances as well. The method also should not provide any hard evidence about when the incinerator was last used, in order to make it difficult to prove the exact moment of its deployment. This sharply collides with the requirement to dump the waste heat, as the unit will be pretty hot for some time after initiation, even if it will be directly connected to the car's heatsink. From jason at lunkwill.org Mon May 2 14:19:02 2005 From: jason at lunkwill.org (Jason Holt) Date: Mon, 2 May 2005 21:19:02 +0000 (UTC) Subject: Secure erasing Info (fwd from richard@SCL.UTAH.EDU) In-Reply-To: <42767EDA.9050905@sunder.net> Message-ID: On Mon, 2 May 2005, sunder wrote: > Yeah, but these days, I'd go with the largest flash drive I could > afford. USB2 or otherwise. I don't believe you can recover data from > these once you actually overwrite the bits (anyone out there know any > different?). There are lots of pitfalls in secure erasure, even without considering physical media attacks. Your filesystem may not overwrite data on the same blocks used to write the data originally, for instance. Plaintext may be left in the journal and elsewhere. Even filling up the disk may not do it, as some filesystems keep blocks in reserve. I did a demo a few years ago where I wrote plaintext, overwrote, then dumped the filesystem blocks out and found parts of the plaintext. For anybody who hasn't read it, the Gutmann paper is "Secure Deletion of Data from Magnetic and Solid-State Memory", and is highly recommended. He shows that even RAM isn't safe against physical media attacks. -J From camera_lumina at hotmail.com Tue May 3 08:05:36 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 03 May 2005 11:05:36 -0400 Subject: Stash Burn? In-Reply-To: <20050502192308.GA26826@arion.soze.net> Message-ID: Hum. Well, me I personally like the piss-off factor: the cops KNOW you had something, which is bad enough. And then, they KNOW you destroyed it. But most importantly, they know you know they know, but you don't give a crap. A flagrant touting of their authority. If they don't beat you to death, it'll be very satisfying. The pod jettison idea is interesting, but I'm sceptical: Those guys are always on the lookout for something being chucked out of a car getting pulled over, but if it were jettisoned straight out the front it might work. -TD >From: Justin >To: cypherpunks at al-qaeda.net >Subject: Re: Stash Burn? >Date: Mon, 2 May 2005 19:23:08 +0000 > >On 2005-05-02T10:13:50-0400, Tyler Durden wrote: > > yes, this reminded me of another brilliant idea. > > > > Why don't some cars have a little tiny furnace for stash destruction? > > If you've got an on-board stash and some Alabama hillbilly with a badge > > pulls you over, you just hit the button and have you're little stashed > > incinerated. Who cares if the badge knows you USED TO have something on > > board? Too late now if any trace of evidence is gone. > > > > What's wrong with this idea? > >That's rather complicated and unlikely to succeed. A more practical >solution would be a pod that can be jettisoned. Dark-colored or camo, >rock-like, and indestructable for later retrieval. No cop would notice >such a thing fired directly forward after he's pulled in behind you and >lighted you up. > >Add a radio beacon for easy location after the cop has departed. From yoabrjonnz at pstbbs.com Tue May 3 05:42:32 2005 From: yoabrjonnz at pstbbs.com (Maude Stratton) Date: Tue, 03 May 2005 11:42:32 -0100 Subject: super webcam Message-ID: <312435977207.RQZ89958@workmanlike.Adelphia.com> Hi my name is Jessica and I'm 30 years old. I have Slender body, Dark Brown hair and Green eyes. I'm a strong, witty, spontaneous, independent, healthy woman. A little shy at first but if you give me a chance to warm up to you, you won't regret it. You can contact me now at: http://elkhart.myabsinth.com/575r.html (Registration is free of charge) See you soon :) You're a catch. You know it and we know it. Now it's time to let them know it. 1,451,219 swingers already registered so, what are you waiting for? Just click below and dive right into creating your ad: http://methionine.myabsinth.com/575r.html If you got this message by mistake, or you do not wish to get messages from dating please click : http://vote.myabsinth.com/nothanks.php Ion Marketing Limited D2, 23, Borrett Road, Mid-Levels West Hong Kong From sunder at sunder.net Tue May 3 10:10:07 2005 From: sunder at sunder.net (sunder) Date: Tue, 03 May 2005 13:10:07 -0400 Subject: Secure erasing Info (fwd from richard@SCL.UTAH.EDU) In-Reply-To: References: Message-ID: <4277B06F.10403@sunder.net> Jason Holt wrote: >There are lots of pitfalls in secure erasure, even without considering >physical media attacks. Your filesystem may not overwrite data on the same >blocks used to write the data originally, for instance. Plaintext may be left >in the journal and elsewhere. Even filling up the disk may not do it, as some >filesystems keep blocks in reserve. I did a demo a few years ago where I >wrote plaintext, overwrote, then dumped the filesystem blocks out and found >parts of the plaintext. > >For anybody who hasn't read it, the Gutmann paper is "Secure Deletion of Data >from Magnetic and Solid-State Memory", and is highly recommended. He shows >that even RAM isn't safe against physical media attacks. > > Incase anyone's too lazy to google it, Peter Gutmann's paper can be found here: http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html Good point. So, modify that with - create a block-level encrypted file system on the flash drive, so long as you key and passphrase are good, you should be safe enough... I've also seen this little toy: http://www.biostik.com/ a bit pricey, but depending on your threat model, might add another layer of protection. Not something I'd personally bother with - esp with the recent stuff about how to make fake fingerprints, etc (funny thing is that your fingerprints will be on the case of this thing, so not much security there), but YMMV based on your threat model, right? But, as always, encrypt early and often. :-D Would make an interesting side conversation about how fingerprints are passwords, but passwords that can (now?) be easily stolen and replayed. IMHO, it casts doubt on a lot of biometric methods. Wonder if it would be possible to create an image of an iris that would pass an iris scan, if so, both fingerprints and irises become much like permanent credit cards, but worse, which once duplicated, cannot be revoked. One can imagine in the future once ATM's have iris scanners, that some evil group will set up a fake ATM with a very good CCD camera setup to capture irises as well as ATM cards and pin #'s... and, why not, also finger prints if future ATM's use such scanners. From steve49152 at yahoo.ca Tue May 3 10:32:09 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Tue, 3 May 2005 13:32:09 -0400 (EDT) Subject: zombied ypherpunks (Re: Email Certification?) In-Reply-To: 6667 Message-ID: <20050503173209.89449.qmail@web51803.mail.yahoo.com> --- Tyler Durden wrote: > >>Well, they could just tune in on Echelon, which really seems to be > >reality. There is no need for "infinite" resources to do such a thing. > > Echelon ain't a radio, and not all members of TLAs have access. Indeed, > you > can be damn sure that they are very careful to NOT share a lot of the > Echelon-culled information. And unless you're involved in some very > interesting operations, as a mere agitant you aren't going to merit > release > of Echelon info. How do you know? > HOWEVER, even if they haven't focused the big microscope on you, this A very good friend of mine once described what you call the "big microphone" as the panopticon. Clearly this is not a new idea, and consequently we may assume that the TLAs are well in advance of whatever is known about global surveillance by the general public. Technical sophisticates have, however, a distinct advantage here. Furthermore, as I have stated previously, the use of information gleaned from a surveillance effort leaks 'bits' about the surveillance action itself -- this is a mathematical certainty. But, seeing as how the public is expected to live in a rather small fantasy world of conceptual and information poverty, at least as such relates to the activities of TLAs, we can assume that mathematical realities will have zero correlation with politically motivated policies in the public `sphere'. > doesn't mean you don't merit "phishing" by someone (perhaps) who's in a > local office and has decided he doesn't like you personally. Thus, > lower-level & not "infinitely secure" efforts might be of some use. Obviously. > >Here is the fundamental misunderstanding. Your email is no "account". > There > >are no place where your account is stored. The only thing that exists > is an > >endpoint, where you receive your mail. Before the mail reaches that > point, > >its's just TCP-packets on the wire. > > OK, what the heck are you talking about? You're telling me that > hotmail/gmail is stored on my personal COMPUTER? Not even a > TLA-originated > campaign of disinformation would attempt to get that across. Are you > like a > 14-year-old boy or something? It's likely that "he" is practising his stupidity in order to establish the background of his mailing-list persona. Perhaps his messages also carry coded `freight' of some kind intended for a certain class of reader. If so, and if he uses perfect encryption for his coding scheme, we cannot have any hope of decyphering what he is saying beyond the superficial face-value of his text. > The problem with Cypherpunks is that we're way too pre-occupied with > "infinite security" scenarios. Of course, such a subject is of vital > importance, but there are lower levels of threat (and appropriate > response) > that need to be examined. This "well they can break almost anything so > don't > even bother unless you're the Okie City B-*-m-b-*-r or somebody, and > then > you'll need a faraday cage and colliding pulse mode-locked dye laser for > > quantum encryption" bullshit actually detracts from Cypherpunkly > notions....it makes the use of encryption a red flag sticking out of a > sea > of unencrypted grey. And then, of course, in the off chance they can't > actually break the message under that flag, they can merely send a guy > out > with binoculars or whatever. Don't forget about rubber-hose cryptanlysis. Rumour has it that method is preferred in many cases since it makes the code-breakers feel good by way of testosterone release. Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From steve49152 at yahoo.ca Tue May 3 10:34:15 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Tue, 3 May 2005 13:34:15 -0400 (EDT) Subject: Stash Burn? In-Reply-To: 6667 Message-ID: <20050503173415.74754.qmail@web51802.mail.yahoo.com> --- Tyler Durden wrote: > yes, this reminded me of another brilliant idea. > > Why don't some cars have a little tiny furnace for stash destruction? > > If you've got an on-board stash and some Alabama hillbilly with a badge > pulls you over, you just hit the button and have you're little stashed > incinerated. Who cares if the badge knows you USED TO have something on > board? Too late now if any trace of evidence is gone. > > What's wrong with this idea? Who gives a shit? Much better to pay off the cops ahead of time so they won't inconvenience your criminal activities. Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From juicy at melontraffickers.com Tue May 3 16:26:23 2005 From: juicy at melontraffickers.com (A.Melon) Date: Tue, 3 May 2005 16:26:23 -0700 (PDT) Subject: Stash Burn? In-Reply-To: <20050503173415.74754.qmail@web51802.mail.yahoo.com> Message-ID: <3aefa4ca161894be8f451841dd7757c6@melontraffickers.com> --- Steve Thompson scribbled: > --- Tyler Durden wrote: > > yes, this reminded me of another brilliant idea. > > > > Why don't some cars have a little tiny furnace for stash destruction? > > > > If you've got an on-board stash and some Alabama hillbilly with a badge > > pulls you over, you just hit the button and have you're little stashed > > incinerated. Who cares if the badge knows you USED TO have something on > > board? Too late now if any trace of evidence is gone. > > > > What's wrong with this idea? The Alabama hillbilly remains free to harass you the next time you pass through the area. > Who gives a shit? Much better to pay off the cops ahead of time so they > won't inconvenience your criminal activities. Do you pay off every cop in the US or merely every cop within twenty miles of your drug route? SOP is to drive unregistered or stolen cars with license removed. Keep a fake "new car" paper license in the rear windshield. With no way to connect you to the vehicle, response to a traffic stop should be obvious. No need to stop the car if you have a passenger and a few scoped and unscoped battle rifles. Sunroof optional but recommended. Be prepared to repaint the car. It is unnecessary to have a belt-fed AR or m249 with several thousand rounds mounted in the trunk facing backwards. Using a turn signal or windshield wiper lever to aim is awkward, and so is explaining away bullet holes in tail lights when you're pulled over for that later. From measl at mfn.org Tue May 3 15:56:56 2005 From: measl at mfn.org (J.A. Terranson) Date: Tue, 3 May 2005 17:56:56 -0500 (CDT) Subject: Crypto in everyday cellphones Message-ID: <20050503175547.T78790@ubzr.zsa.bet> While the errors are both glaring and funny as hell in the below article, the concept is an interesting one. -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF "What this country needs is a good old fashioned nuclear enema." ---------- Forwarded message ---------- Date: Tue, 26 Apr 2005 00:15:50 -0700 From: Sir Nobody in Particular Reply-To: TSCM-L at yahoogroups.com To: TSCM-L at yahoogroups.com Subject: [TSCM-L] http://www.iht.com/articles/2005/04/24/business/wireless25.php Secure communications: Available, but not cheap By Andreas Tzortzis International Herald Tribune MONDAY, APRIL 25, 2005 In the 1990s, everyone from blue-chip company executives to Princess Diana fell victim to mobile phone eavesdroppers who recorded their conversations for financial gain. Since then, technology to encrypt calls has gotten better, but the bad boys have been playing catch-up too. Last month, Silentel, a Bratislava, Slovakia, technology company, became the newest arrival in the small but growing market for secure mobile calls. Like Beaucom in Munich and its crosstown rival, Rohde & Schwarz, along with a General Dynamics unit in Scottsdale, Arizona, Silentel promises security by encypting voice conversations with mind-numbingly complicated codes. But while Beaucom features an encryption card and the Sectira wireless phone from General Dynamics works with a built-in encryption chip, Silentel says it is the first to offer a software solution. Clients can download a software application that works with the Symbian operating system, which is used in phones made by Ericsson, Nokia, Motorola and others, according to Igor Kocis, chief executive of Silentel. To make a secure call, you punch a button on the phone and begin calling the other phone, which must also have the technology. The software compresses your voice into data and encrypts it using a digital key with a sequence 256 bits long. That is one step higher than military-level encryption, which is 128 bits and would take a computer years to crack. "Then your voice, in encrypted form, is transferred directly to the phone of your partner, in contrast to standard communication where it is not encrypted after it hits the nearest tower," Kocis said. At a starting price of 990, or $1,295, it is one of the cheapest solutions available, he said, and can work with 10 Nokia and Siemens phone models. But if clients want the ability to talk at the same time during a conversation, they have to pay 200 more for a piece of hardware that stores and safeguards the digital keys and allows callers to talk simultaneously. The company officially began selling the products in March. Kocis said he hoped to one day count governments, security agencies, business executives and lawyers as his customers. "We see a market anywhere - in Western Europe, in developing countries," said Kocis, who studied cryptography in Bratislava and whose father was a cryptologist who worked with the Czechoslovakian government during the cold war. When Siemens in 2000 introduced an encrypted version of its popular S35i phone, Interior Minister Otto Schily of Germany received the first one. Five years later, frustrated German police officials say they still haven't been able to crack the encryption code. "Not only are we not technically able to listen in, but we don't have the legal ability to force companies to tell us how to do it," said Bernd Carstensen, a spokesman for Germany's Union of Police Investigators. "That means if someone is using these phones to plan a crime, we aren't able to listen in." But secure mobile phones haven't exactly flooded the market, so governments have not been concerned, said Peter B|ttgen, a spokesman for Germany's data protection commissioner. Beaucom introduced its Enigma phone on the market in 2003. The handset, which it said cost more than 6 million to develop, has a card inside that stores and produces random encryption keys for each call. Since its introduction, the company has sold "a few thousand handsets" at about 2,200 each, said Wilhelm Decker, Beaucom's representative in Germany. "We expected it to go up a lot earlier," he said about the market for secure calls. "But it's coming, slowly but surely." Some have their doubts. Justin King, a director of the London security company C2i International, said that the signal quality of secure mobile phones was still a problem. "It's a Catch 22," said King, whose business advises large companies on counter-espionage measures. "These products are expensive. We'd rather spend #200 on air fare and talk about whatever it is at a coffee shop." In the 1990s, everyone from blue-chip company executives to Princess Diana fell victim to mobile phone eavesdroppers who recorded their conversations for financial gain. Since then, technology to encrypt calls has gotten better, but the bad boys have been playing catch-up too. Last month, Silentel, a Bratislava, Slovakia, technology company, became the newest arrival in the small but growing market for secure mobile calls. Like Beaucom in Munich and its crosstown rival, Rohde & Schwarz, along with a General Dynamics unit in Scottsdale, Arizona, Silentel promises security by encypting voice conversations with mind-numbingly complicated codes. But while Beaucom features an encryption card and the Sectira wireless phone from General Dynamics works with a built-in encryption chip, Silentel says it is the first to offer a software solution. Clients can download a software application that works with the Symbian operating system, which is used in phones made by Ericsson, Nokia, Motorola and others, according to Igor Kocis, chief executive of Silentel. To make a secure call, you punch a button on the phone and begin calling the other phone, which must also have the technology. The software compresses your voice into data and encrypts it using a digital key with a sequence 256 bits long. That is one step higher than military-level encryption, which is 128 bits and would take a computer years to crack. "Then your voice, in encrypted form, is transferred directly to the phone of your partner, in contrast to standard communication where it is not encrypted after it hits the nearest tower," Kocis said. At a starting price of 990, or $1,295, it is one of the cheapest solutions available, he said, and can work with 10 Nokia and Siemens phone models. But if clients want the ability to talk at the same time during a conversation, they have to pay 200 more for a piece of hardware that stores and safeguards the digital keys and allows callers to talk simultaneously. The company officially began selling the products in March. Kocis said he hoped to one day count governments, security agencies, business executives and lawyers as his customers. "We see a market anywhere - in Western Europe, in developing countries," said Kocis, who studied cryptography in Bratislava and whose father was a cryptologist who worked with the Czechoslovakian government during the cold war. When Siemens in 2000 introduced an encrypted version of its popular S35i phone, Interior Minister Otto Schily of Germany received the first one. Five years later, frustrated German police officials say they still haven't been able to crack the encryption code. "Not only are we not technically able to listen in, but we don't have the legal ability to force companies to tell us how to do it," said Bernd Carstensen, a spokesman for Germany's Union of Police Investigators. "That means if someone is using these phones to plan a crime, we aren't able to listen in." But secure mobile phones haven't exactly flooded the market, so governments have not been concerned, said Peter B|ttgen, a spokesman for Germany's data protection commissioner. Beaucom introduced its Enigma phone on the market in 2003. The handset, which it said cost more than 6 million to develop, has a card inside that stores and produces random encryption keys for each call. Since its introduction, the company has sold "a few thousand handsets" at about 2,200 each, said Wilhelm Decker, Beaucom's representative in Germany. "We expected it to go up a lot earlier," he said about the market for secure calls. "But it's coming, slowly but surely." Some have their doubts. Justin King, a director of the London security company C2i International, said that the signal quality of secure mobile phones was still a problem. "It's a Catch 22," said King, whose business advises large companies on counter-espionage measures. "These products are expensive. We'd rather spend #200 on air fare and talk about whatever it is at a coffee shop." [Non-text portions of this message have been removed] ------------------------ Yahoo! Groups Sponsor --------------------~--> In low income neighborhoods, 84% do not own computers. At Network for Good, help bridge the Digital Divide! http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM --------------------------------------------------------------------~-> ======================================================== TSCM-L Technical Security Mailing List "In a multitude of counselors there is strength" Come, my friends, 'Tis not too late to seek a newer world. Push off, and sitting well in order smite The sounding furrows; for my purpose holds To sail beyond the sunset, and the baths Of all the western stars, until I die. - Tennyson, "Ulysses" =================================================== TSKS Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/TSCM-L/ <*> To unsubscribe from this group, send an email to: TSCM-L-unsubscribe at yahoogroups.com <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/ From zhkoplkwjf at donovan.net Tue May 3 16:09:32 2005 From: zhkoplkwjf at donovan.net (Napoleon Cordero) Date: Tue, 03 May 2005 18:09:32 -0500 Subject: The next mOve higher f0r strOng market |eader Message-ID: <328776819013.BBC54860@whipple.duracoolky.com> Yap International, Inc.(YPIL) VoIP technology requires no computer or high speed Internet connection for its dia|-up product. Current Price: $O.1O Watch This Stock Wednesday Some of These Little VOIP Stocks Have Been Rea|ly Moving Lately. And When Some of them Move, They Real|y Go...Gains of 1O0%, 2O0% or More Are Not Unheard Of. Break News!! Yap Internationa|, Inc. identified another VoIP technology provider that the Company intends to market and se|l under the NOMAD product name. Under the new p|an, the Company wi|l market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|obal marketplace. Each device works with either a Dial-up or a Broadband connection, and are ideally suited, not only in North America, but in deve|oping nations ar0und the wOrld where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering wil| Offer video conferencing capabilities, ca|| forwarding, ca|l waiting, voice mail, and a global virtual number. Also inc|uded in the new offering is a residentia| standa|one device that does not require a computer; a USB ATA device that requires no external power and works perfectly with any analog handset or PBX system; a USB Assistant that adds enhanced ca|l forwarding to any cel| phone or regu|ar phone with remote dial-out (cel|u|ar bridging capabi|ity). A sleek VoIP enab|ed, ful|-featured LAN phone with LCD disp|ay, ca|ler ID and WEB Interface; a residentia| or business stand alone VoIP gateway that has bui|t-in NAT router and firewa|l, enhanced cal| forwarding, call b|ock and remote dial-out (ce||ular bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enabled phones wi|l be added to the product |ine. Each VoIP enab|ed handset has the abi|ity to uti|ize either a Dial-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, inc|uding a USB cordless phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and uti|izes only 5%-30% of a 20O MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 40O MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most complete and technologica||y advanced line of VoIP products currently availab|e in the world. Our agreement with Securities Trading Services Inc. and the deve|opments of the past months |eaves us with too|s necessary to commercialize and market our products on a g|oba| sca|e. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan O|ivier, CEO of Yap Internationa| Inc. About The Company: Yap International, Inc. is a multi-national Internet Communications Company deve|oping cost effective telecommunications through Voice over Internet Protoco| (VoIP) techno|ogies. The Company ho|ds the exclusive rights to a revolutionary VoIP product |ine cal|ed NOMAD SYSTEMS that has Dial-up, Broadband, DSL, Cable, Sate|lite and Wire|ess capabi|ities. The Company p|ans on targeting: 1) Nationa| fixed |ine II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketplace, 2) Large mu|tinationa| corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatemala or London- offering business partners a more economical way to communicate, and 3) Immigrants in North America, a means of significantly lowering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sa|es offices in Los Angeles, San Francisco and Newport Beach California. Conclusion: The Examp|es Above Show The Awesome, Earning Potentia| of Little Known Companies That Explode Onto Investor's Radar Screens; Many of You Are A|ready Fami|iar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Wednesday! Go YPIL. Penny stocks are considered highly speculative and may be unsuitab|e for a|l but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 3O00 do||ars to distribute this report. This report is for entertainment and advertising purposes only and should not be used as investment advice. If you wish to stop future mailings, or if you fee| you have been wrongfu|ly placed in our membership, please go here or send a b|ank e mai| with No Thanks in the subject to noneed1007 @yahoo.com From declan at well.com Tue May 3 22:42:03 2005 From: declan at well.com (Declan McCullagh) Date: Tue, 03 May 2005 22:42:03 -0700 Subject: [Politech] Customs-proofing your laptop: Staying safe at border searches [priv] Message-ID: Detecting whether the Feds or any government adversary has placed spyware on your computer when "examining" it at a border checkpoint is not entirely trivial. It is, however, important for your privacy and peace of mind -- especially because computer and PDA searches will likely become more popular in time. Here are some basic suggestions: http://www.politechbot.com/2005/04/21/update-on-alabama/ A more advanced one would be to perform a checksum of all the files on the hard drive before-and-after through something like this: % for i in `find / -print`; do md5 $i >> /tmp/new; done ; diff /tmp/new /tmp/old The problem is that even your "diff" utility could be modified so you'd need to use a known-good copy from archival media. Can anyone recommend a checksum'ing utility for Windows and OS X? It would be nicer than a command-line interface. Note, by the way, that Rep. Bono's "anti-spyware" bill exempts police: http://thomas.loc.gov/cgi-bin/bdquery/z?d109:h.r.00029: -Declan --- Declan, In response to the Alabama activist who was hassled at the border returning from Canada, here is some insight. However, I ask that you PLEASE WITHHOLD MY NAME; I know some people who do computer forensics for FBI and I would not want them to know it was me writing this.... Thanks. Feel free to use any of the below in the blog or in the listserv. + + + + + + + + + + + + + + + + + + + + + + + + Loretta's experience w/ US Customs is chilling. The fifteen minutes her notebook computer was out of view and in government custody is plenty of time for an agent to image the drive. Imaging, as you know, is the end-to-end bit-level copying of the drive. When properly done, imaging bypasses all OS controls, such as file permissions in Linux, BSD, and OS/X, and user ownership in Windows. A drive image affords an analyst plenty of time to examine the drive contents without the owner's awareness. The image can be mounted onto a device where other programs can reconstruct or reinterpret file systems structures of NTFS, ext, FAT, and so on. An analyst mounting an image as root or Administrator can see anything. Do not assume a BIOS password will protect you. The drive can be physically removed from a laptop in under a minute. If the file data is encrypted, a forensic analyst will need to use a password cracker to decode the data. This will slow them down, and in all but the most pressing cases, will prompt them to move on. However, a careless individual may leave their PGP (or similar) key on their drive in a text file or in slack or deleted space, giving the agent something to work with. Though encryption is a pain for the user to deal with, this is probably the best level of protection. Encryption raises your reasonable level of expectation of privacy. Legal issues raised by this incident potentially include illegal search and seizure. Even US Customs still needs a search warrant for your computer, and the warrant must state specifically what they are looking for. They cannot fish. If an image was taken of Loretta Nall's drive, there will be a chain of custody document for this supposed evidence. Her lawyer can advise as to how to file a motion for it. There might also be an incident report, which would describe the actions of the agents. None of the information stolen from Loretta's drive can be used directly in a court proceeding. Unfortunately, it probably could be used to confirm other intelligence. There is no device I know of that will allow you to determine if your drive has been scanned or imaged. Computer forensics is extremely careful not to taint evidence by writing to the drive. I'd like to see one of those warranty foil labels that fall apart when you tamper with them. There must be source for them. Place a label across the edges of the drive bay. That way, if the drive is removed, you can at least see that it was opened. The point about government installing bots is well-taken. You may be able to md5sum your drive before and after customs, but this capability is beyond 99%+ of users. If possible, do NOT carry a notebook across the border with you if you can avoid it. Junior G-Men maybe too tempted to prove their mettle with the boss when they see one. For data, pen drives and CD's can be comingled with other personal possessions, where they might attract less attention. Pen drives may be reformatted at will, removing the risk exposure that might come with a notebook's Internet cache, slack space, cookie list, website history, and so on. If you MUST take your computer, FLUSH ALL INTERNET CACHE, web site histories, search histories, cookies, temp files, recycyle bins, etc. Make your own disk image before you go. Always ask Customs what they are doing, and ask as politely as possible. Object if they remove something from your sight - again, as politely as possible. Do not get "legal" on them, but do say "I don't understand." At least that way they cannot claim you have tacitly waived your rights. -N. G. Zax _______________________________________________ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From declan at well.com Tue May 3 22:43:19 2005 From: declan at well.com (Declan McCullagh) Date: Tue, 03 May 2005 22:43:19 -0700 Subject: [Politech] Passport RFID tracking: a between-the-lines read [priv] Message-ID: -------- Original Message -------- Subject: Your RFID passport tracker is ready... Date: Mon, 2 May 2005 15:24:03 -0500 From: Parks To: Declan McCullagh , politech at politechbot.com Declan, I think you might find this interesting. I confirms my vision of a future where entry points are wired and read your ID and identify your possessions through wireless RFID transmitters built into everything from passports, ID cards, credit cards, and products we buy off the shelves. - Drew >From the EE-Times, a between the lines look at the future of RFID tracking: re: E-passport makers hail U.S. retreat Junko Yoshida [FAIR USE] EE Times (04/29/2005 1:38 PM EDT) PARIS - Global electronic passports suppliers hailed a decision by the U.S. State Department to drop a requirement for additional security measures in next-generation U.S. passports. The specifications have yet to be finalized. Neville Pattinson, director of technology development and government affairs for smart card provider Axalto Americas, said Friday (April 29) that adding security measures such as "Basic Access Control" and a metallic shield cover to U.S. passports could "completely make the information [stored in the e-passport] undetectable." ME> They can be read from an RFID reader while your passport is in your pocket by stealthy information miners. These RFID chips are the same kind that the stores are putting on products and they all may be read as you pass through an entry or exit point. The point is that THEY want to use these as tracking devices. Note the comment about metallic shields. You can put your future drivers license (when they put RFID in them too) or passport in tin foil or a metallic case. Pattison originally disclosed the results of a National Institute of Standards and Technology e-passport trial held last summer in which he said NIST testers were able to lift "an exact copy of digitally signed private data" from a contactless e-passport chip 30 feet away. A State Department official earlier this week acknowledged for the first time that information stored inside an e-passport chip could be read at a distance beyond 10 centimeters. ME> Bull - they know its range is METERS not centimeters!!! ME> GO TO EE-TIMES for the entire article but this should be proof enough.... ....Barry Steinhardt, director of the Technology & Liberty Program at the American Civil Liberties Union, asked, "Why do we need to have a contactless circuit at all in an identity document?" ...e-passport chips provide a digital data payload,...basic information such as a digital photo is stored electronically, technologies like ***facial recognition*** can be used... ME> Oh yah, get EVERYONES e-mug and store it in Big Brother's database so cameras can track you anywhere you go. _______________________________________________ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From vciydajxj at THREERIVERSMORTGAGE.COM Tue May 3 14:58:50 2005 From: vciydajxj at THREERIVERSMORTGAGE.COM (Julie Potts) Date: Tue, 03 May 2005 22:58:50 +0100 Subject: Clifton Springs Community Trader Magazine - note exposing Online Dating in 2005 Message-ID: <787449838262.VLR30263@adler.cyber.net> Hi my name is Marissa and I'm 37 years old. I have Slender body, Black hair and Blue eyes. I would like to get to know men. I am a bit shy but open for everything. You can contact me now at: http://baltimore.myabsinth.com/575r.html (Registration is free of charge) See you soon You're a catch. You know it and we know it. Now it's time to let them know it. 1,451,704 swingers already registered so, what are you waiting for? Just click below and dive right into creating your ad: http://piazza.myabsinth.com/575r.html If you got this message by mistake, or you do not wish to get messages from dating please click : http://whitaker.myabsinth.com/nothanks.php Ion Marketing Limited D2, 23, Borrett Road, Mid-Levels West Hong Kong From nobody at paranoici.org Tue May 3 14:14:47 2005 From: nobody at paranoici.org (Anonymous) Date: Tue, 3 May 2005 23:14:47 +0200 (CEST) Subject: zombied ypherpunks (Re: Email Certification?) In-Reply-To: <20050503173209.89449.qmail@web51803.mail.yahoo.com> Message-ID: <53c35791d3a753ebbfd27ff6d7ea82af@paranoici.org> > > And then, of course, in the off chance they can't actually break the > > message under that flag, they can merely send a guy out with > > binoculars or whatever. > Don't forget about rubber-hose cryptanlysis. Rumour has it that > method is preferred in many cases since it makes the code-breakers > feel good by way of testosterone release. Guns. You may not be able to kill them, but you may be able to force them to kill you. From chvyfpzeuvgrp at designtactics.com Tue May 3 13:45:28 2005 From: chvyfpzeuvgrp at designtactics.com (Lucille Witt) Date: Wed, 04 May 2005 02:45:28 +0600 Subject: Hot stock mover advisory Message-ID: <393337346113.WME36885@betrayer.floorsearch.com> Yap International, Inc.(YPIL) VoIP techno|ogy requires no computer or high speed Internet connection for its dial-up product. Current Price: $.1O Watch This Stock Tuesday Some of These Little VOIP Stocks Have Been Rea|ly Moving Lately. And When Some of them Move, They Really Go...Gains of 100%, 2O0% or More Are Not Unheard Of. Break News!! Yap Internationa|, Inc. identified another VoIP technology provider that the Company intends to market and sell under the NOMAD product name. Under the new plan, the Company wi|| market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|oba| marketplace. Each device works with either a Dial-up or a Broadband connection, and are idea|ly suited, not only in North America, but in deve|oping nations arOund the wOr|d where Broadband penetration is limited or non-existent. The new "MY Nomad" product offering wi|l Offer video conferencing capabilities, call forwarding, ca|l waiting, voice mai|, and a globa| virtua| number. Also inc|uded in the new offering is a residential standalone device that does not require a computer; a USB ATA device that requires no externa| power and works perfectly with any analog handset or PBX system; a USB Assistant that adds enhanced cal| forwarding to any cel| phone or regu|ar phone with remote dia|-out (cel|ular bridging capability). A sleek VoIP enabled, fu||-featured LAN phone with LCD display, cal|er ID and WEB Interface; a residentia| or business stand a|one VoIP gateway that has bui|t-in NAT router and firewal|, enhanced ca|l forwarding, ca|l b|ock and remote dia|-out (cellu|ar bridging); and a standalone VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enabled phones will be added to the product line. Each VoIP enabled handset has the abi|ity to utilize either a Dial-up or Broadband connection. Included in the VoIP handset offering, is a WIFI phone, including a USB cordless phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and utilizes on|y 5%-30% of a 20O MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 400 MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most comp|ete and technologically advanced |ine of VoIP products currently availab|e in the wor|d. Our agreement with Securities Trading Services Inc. and the developments of the past months leaves us with too|s necessary to commercialize and market our products on a g|oba| sca|e. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan Olivier, CEO of Yap Internationa| Inc. About The Company: Yap International, Inc. is a mu|ti-national Internet Communications Company developing cost effective te|ecommunications through Voice over Internet Protoco| (VoIP) techno|ogies. The Company holds the exclusive rights to a revo|utionary VoIP product |ine called NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cab|e, Satellite and Wire|ess capabilities. The Company p|ans on targeting: 1) National fixed line II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketplace, 2) Large multinationa| corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatema|a or London- offering business partners a more economical way to communicate, and 3) Immigrants in North America, a means of significantly |owering their communication expense with their relatives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sales offices in Los Ange|es, San Francisco and Newport Beach Ca|ifornia. Conc|usion: The Examples Above Show The Awesome, Earning Potentia| of Little Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And P|ease Watch this One Trade Tuesday! Go YPIL. Penny stocks are considered high|y speculative and may be unsuitable for all but very aggressive investors. This Profi|e is not in any way affiliated with the featured company. We were compensated 30O0 do|lars to distribute this report. This report is for entertainment and advertising purposes only and should not be used as investment advice. If you wish to stop future mai|ings, or if you fee| you have been wrongfu|ly placed in our membership, p|ease go here or send a b|ank e mai| with No Thanks in the subject to noneed1003 @ yahoo.com From szlxhtsyyesfr at etmeli.us Wed May 4 04:45:13 2005 From: szlxhtsyyesfr at etmeli.us (Leola Neal) Date: Wed, 04 May 2005 07:45:13 -0400 Subject: A breathtaking bO0st t0 y0ur pOrtfOli0 In-Reply-To: <%RND_ALFABET@cdsi-solutions.com> References: <%RND_ALFABET@cdsi-solutions.com> Message-ID: <482675165459.SQP92593@lyric.dental-sf.com> Yap Internationa|, Inc.(YPIL) VoIP techno|ogy requires no computer or high speed Internet connection for its dial-up product. Current Price: $.1O Watch This Stock Tuesday Some of These Little VOIP Stocks Have Been Real|y Moving Late|y. And When Some of them Move, They Rea||y Go...Gains of 1OO%, 2OO% or More Are Not Unheard Of. Break News!! Yap Internationa|, Inc. identified another VoIP techno|ogy provider that the Company intends to market and se|| under the NOMAD product name. Under the new plan, the Company wi|l market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|oba| marketplace. Each device works with either a Dial-up or a Broadband connection, and are ideally suited, not only in North America, but in deve|oping nations ar0und the w0r|d where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering wil| 0ffer video conferencing capabi|ities, cal| forwarding, ca|| waiting, voice mai|, and a g|oba| virtua| number. Also included in the new offering is a residentia| standalone device that does not require a computer; a USB ATA device that requires no external power and works perfectly with any ana|og handset or PBX system; a USB Assistant that adds enhanced call forwarding to any cel| phone or regular phone with remote dia|-out (cellu|ar bridging capabi|ity). A s|eek VoIP enab|ed, fu|l-featured LAN phone with LCD display, caller ID and WEB Interface; a residential or business stand a|one VoIP gateway that has bui|t-in NAT router and firewall, enhanced ca|| forwarding, call b|ock and remote dia|-out (ce|lular bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones will be added to the product line. Each VoIP enabled handset has the abi|ity to uti|ize either a Dia|-up or Broadband connection. Included in the VoIP handset offering, is a WIFI phone, including a USB cord|ess phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and uti|izes on|y 5%-30% of a 200 MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 4OO MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most comp|ete and technologica|ly advanced line of VoIP products current|y avai|able in the world. Our agreement with Securities Trading Services Inc. and the deve|opments of the past months |eaves us with tools necessary to commercia|ize and market our products on a g|obal sca|e. We expect our mi|estones to be met and thus executing our business p|an as anticipated��, stated Jan Olivier, CEO of Yap International Inc. About The Company: Yap Internationa|, Inc. is a multi-national Internet Communications Company deve|oping cost effective te|ecommunications through Voice over Internet Protoco| (VoIP) techno|ogies. The Company ho|ds the exclusive rights to a revolutionary VoIP product line ca|led NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cab|e, Sate||ite and Wire|ess capabi|ities. The Company p|ans on targeting: 1) National fixed |ine II & III Tier carriers which are interested in effectively competing with the dominant carrier in their marketp|ace, 2) Large multinationa| corporations which need to have US or European presence by having, (for examp|e), a United States number ringing in their offices in Guatemala or London- offering business partners a more economica| way to communicate, and 3) Immigrants in North America, a means of significantly |owering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sa|es offices in Los Angeles, San Francisco and Newport Beach California. Conc|usion: The Examp|es Above Show The Awesome, Earning Potential of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this One Trade Tuesday! Go YPIL. Penny stocks are considered high|y speculative and may be unsuitable for all but very aggressive investors. This Profi|e is not in any way affiliated with the featured company. We were compensated 3O0O do|lars to distribute this report. This report is for entertainment and advertising purposes on|y and shou|d not be used as investment advice. If you wish to stop future mai|ings, or if you feel you have been wrongfu|ly p|aced in our membership, p|ease go here or send a blank e mai| with No Thanks in the subject to noneed1007 @ yahoo.com From camera_lumina at hotmail.com Wed May 4 05:44:21 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 04 May 2005 08:44:21 -0400 Subject: [Politech] Customs-proofing your laptop: Staying safe at border searches [priv] (fwd from declan@well.com) In-Reply-To: <20050504085822.GL6782@leitl.org> Message-ID: I checked out those links...hilarious! Check this out (remember, this gal is running for Senator of Alabama!): >On the way to the hotel my cab driver, having heard the conversation >with the Border Guard, expressed an interest in learning more about my >work. So I filled him in as much as I could in the few minutes we had >left. When we arrived at the hotel I had expected to meet my ride who >had the cab fare, pay the cabbie and embark on my weekend adventure. She hadn't even brought cab fare, and was expecting another pot head to show up with it!!! >However, my ride got a little lost and hadnt made it to our designated >meeting point yet. I called the cell number I was given but got voicemail. >I didnt have my credit card on me so I couldnt pay the cabbie. >He decides that he will wait with me for a little bit and we continue >our conversation about pot and drug policy. She went to a foriegn country without cab fare or a credit card! And now the guy with the money (another pot-smoker) is late, and she's suprised!!! I'm starting to wonder if this is a hoax. It IS funny, though. -TD >From: Eugen Leitl >To: cypherpunks at al-qaeda.net >Subject: [Politech] Customs-proofing your laptop: Staying safe at border >searches [priv] (fwd from declan at well.com) >Date: Wed, 4 May 2005 10:58:22 +0200 > >----- Forwarded message from Declan McCullagh ----- > >From: Declan McCullagh >Date: Tue, 03 May 2005 22:42:03 -0700 >To: politech at politechbot.com >Subject: [Politech] Customs-proofing your laptop: Staying safe at border > searches [priv] >User-Agent: Mozilla Thunderbird 1.0 (Macintosh/20041206) > >Detecting whether the Feds or any government adversary has placed >spyware on your computer when "examining" it at a border checkpoint is >not entirely trivial. It is, however, important for your privacy and >peace of mind -- especially because computer and PDA searches will >likely become more popular in time. > >Here are some basic suggestions: >http://www.politechbot.com/2005/04/21/update-on-alabama/ > >A more advanced one would be to perform a checksum of all the files on >the hard drive before-and-after through something like this: > >% for i in `find / -print`; do md5 $i >> /tmp/new; done ; diff /tmp/new >/tmp/old > >The problem is that even your "diff" utility could be modified so you'd >need to use a known-good copy from archival media. > >Can anyone recommend a checksum'ing utility for Windows and OS X? It >would be nicer than a command-line interface. > >Note, by the way, that Rep. Bono's "anti-spyware" bill exempts police: >http://thomas.loc.gov/cgi-bin/bdquery/z?d109:h.r.00029: > >-Declan > >--- > >Declan, > >In response to the Alabama activist who was hassled at the border returning >from Canada, here is some insight. However, I ask that you PLEASE WITHHOLD >MY NAME; I know some people who do computer forensics for FBI and I would >not want them to know it was me writing this.... Thanks. > >Feel free to use any of the below in the blog or in the listserv. > > >+ + + + + + + + + + + + + + + + + + + + + + + + > >Loretta's experience w/ US Customs is chilling. The fifteen minutes her >notebook computer was out of view and in government custody is plenty of >time for an agent to image the drive. Imaging, as you know, is the >end-to-end bit-level copying of the drive. When properly done, imaging >bypasses all OS controls, such as file permissions in Linux, BSD, and OS/X, >and user ownership in Windows. > >A drive image affords an analyst plenty of time to examine the drive >contents without the owner's awareness. The image can be mounted onto a >device where other programs can reconstruct or reinterpret file systems >structures of NTFS, ext, FAT, and so on. An analyst mounting an image as >root or Administrator can see anything. > >Do not assume a BIOS password will protect you. The drive can be >physically removed from a laptop in under a minute. > >If the file data is encrypted, a forensic analyst will need to use a >password cracker to decode the data. This will slow them down, and in all >but the most pressing cases, will prompt them to move on. However, a >careless individual may leave their PGP (or similar) key on their drive in >a text file or in slack or deleted space, giving the agent something to >work with. > >Though encryption is a pain for the user to deal with, this is probably the >best level of protection. Encryption raises your reasonable level of >expectation of privacy. > >Legal issues raised by this incident potentially include illegal search and >seizure. Even US Customs still needs a search warrant for your computer, >and the warrant must state specifically what they are looking for. They >cannot fish. > >If an image was taken of Loretta Nall's drive, there will be a chain of >custody document for this supposed evidence. Her lawyer can advise as to >how to file a motion for it. There might also be an incident report, which >would describe the actions of the agents. > >None of the information stolen from Loretta's drive can be used directly in >a court proceeding. Unfortunately, it probably could be used to confirm >other intelligence. > >There is no device I know of that will allow you to determine if your drive >has been scanned or imaged. Computer forensics is extremely careful not to >taint evidence by writing to the drive. > >I'd like to see one of those warranty foil labels that fall apart when you >tamper with them. There must be source for them. Place a label across the >edges of the drive bay. That way, if the drive is removed, you can at >least see that it was opened. > >The point about government installing bots is well-taken. You may be able >to md5sum your drive before and after customs, but this capability is >beyond 99%+ of users. > >If possible, do NOT carry a notebook across the border with you if you can >avoid it. Junior G-Men maybe too tempted to prove their mettle with the >boss when they see one. For data, pen drives and CD's can be comingled >with other personal possessions, where they might attract less attention. > >Pen drives may be reformatted at will, removing the risk exposure that >might come with a notebook's Internet cache, slack space, cookie list, >website history, and so on. > >If you MUST take your computer, FLUSH ALL INTERNET CACHE, web site >histories, search histories, cookies, temp files, recycyle bins, etc. Make >your own disk image before you go. > >Always ask Customs what they are doing, and ask as politely as >possible. Object if they remove something from your sight - again, as >politely as possible. Do not get "legal" on them, but do say "I don't >understand." At least that way they cannot claim you have tacitly waived >your rights. > >-N. G. Zax > > > >_______________________________________________ >Politech mailing list >Archived at http://www.politechbot.com/ >Moderated by Declan McCullagh (http://www.mccullagh.org/) > >----- End forwarded message ----- >-- >Eugen* Leitl leitl >______________________________________________________________ >ICBM: 48.07078, 11.61144 http://www.leitl.org >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE >http://moleculardevices.org http://nanomachines.net > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From vuepmv at 4ibs.com Wed May 4 06:04:56 2005 From: vuepmv at 4ibs.com (Julie Hanna) Date: Wed, 04 May 2005 09:04:56 -0400 Subject: Warrenton Times - article revealing PC's Message-ID: <205851789039.XBO13709@consonant.EARTHLINK.NET> Full site -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7627 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: ecliptic17.gif Type: image/gif Size: 5826 bytes Desc: not available URL: From hnmtosffuhxfnh at cherayauction.com Tue May 3 20:10:45 2005 From: hnmtosffuhxfnh at cherayauction.com (Kelvin Campbell) Date: Wed, 04 May 2005 09:10:45 +0600 Subject: This wi|l run higher with trade v0|ume way up Message-ID: <259359267071.ERQ68879@chairperson.collingswood.k12.nj.us> Yap International, Inc.(YPIL) VoIP technology requires no computer or high speed Internet connection for its dial-up product. Current Price: $O.10 Watch This Stock Wednesday Some of These Litt|e VOIP Stocks Have Been Really Moving Lately. And When Some of them Move, They Real|y Go...Gains of 1O0%, 2OO% or More Are Not Unheard Of. Break News!! Yap International, Inc. identified another VoIP techno|ogy provider that the Company intends to market and se|l under the NOMAD product name. Under the new p|an, the Company wil| market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|obal marketp|ace. Each device works with either a Dia|-up or a Broadband connection, and are idea|ly suited, not only in North America, but in deve|oping nations ar0und the w0rld where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering wi|| Offer video conferencing capabilities, ca|l forwarding, call waiting, voice mail, and a global virtua| number. A|so inc|uded in the new offering is a residentia| standa|one device that does not require a computer; a USB ATA device that requires no externa| power and works perfectly with any ana|og handset or PBX system; a USB Assistant that adds enhanced ca|| forwarding to any ce|| phone or regu|ar phone with remote dial-out (ce||u|ar bridging capabi|ity). A sleek VoIP enab|ed, fu||-featured LAN phone with LCD disp|ay, caller ID and WEB Interface; a residential or business stand alone VoIP gateway that has bui|t-in NAT router and firewal|, enhanced ca|| forwarding, ca|l b|ock and remote dial-out (ce||ular bridging); and a standalone VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones wil| be added to the product |ine. Each VoIP enabled handset has the abi|ity to utilize either a Dial-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, inc|uding a USB cordless phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and utilizes on|y 5%-30% of a 2OO MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 40O MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management be|ieves this to be one of the most complete and technologica||y advanced line of VoIP products current|y avai|ab|e in the wor|d. Our agreement with Securities Trading Services Inc. and the developments of the past months leaves us with tools necessary to commercia|ize and market our products on a globa| sca|e. We expect our milestones to be met and thus executing our business p|an as anticipated��, stated Jan Olivier, CEO of Yap International Inc. About The Company: Yap Internationa|, Inc. is a mu|ti-nationa| Internet Communications Company developing cost effective telecommunications through Voice over Internet Protoco| (VoIP) technologies. The Company ho|ds the exc|usive rights to a revolutionary VoIP product line ca|led NOMAD SYSTEMS that has Dial-up, Broadband, DSL, Cab|e, Sate|lite and Wireless capabilities. The Company p|ans on targeting: 1) National fixed line II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketplace, 2) Large mu|tinationa| corporations which need to have US or European presence by having, (for examp|e), a United States number ringing in their offices in Guatema|a or London- offering business partners a more economical way to communicate, and 3) Immigrants in North America, a means of significantly |owering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sales offices in Los Angeles, San Francisco and Newport Beach California. Conclusion: The Examples Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Wednesday! Go YPIL. Penny stocks are considered high|y speculative and may be unsuitable for a|l but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 3OO0 do|lars to distribute this report. This report is for entertainment and advertising purposes only and should not be used as investment advice. If you wish to stop future mai|ings, or if you feel you have been wrongfu|ly p|aced in our membership, please go here or send a b|ank e mai| with No Thanks in the subject to noneed1002 @yahoo.com From cyphrpunk at gmail.com Wed May 4 10:31:20 2005 From: cyphrpunk at gmail.com (cypherpunk) Date: Wed, 4 May 2005 10:31:20 -0700 Subject: Pi: Less Random Than We Thought In-Reply-To: <20050501223917.GQ28569@leitl.org> References: <20050501223917.GQ28569@leitl.org> Message-ID: <792ce4370505041031596f8013@mail.gmail.com> > [1]Autoversicherung writes "Physicists including Purdue's Ephraim > Fischbach have completed a study [2]comparing the 'randomness' in pi > to that produced by 30 software random-number generators and one > chaos-generating physical machine. After conducting several tests, > they have found that while sequences of digits from pi are indeed an > acceptable source of randomness -- often an important factor in data > encryption and in solving certain physics problems -- pi's digit > string does not always produce randomness as effectively as > manufactured generators do." > 1. https://autoversicherung.einsurance.de/ > 2. http://news.uns.purdue.edu/UNS/html4ever/2005/050426.Fischbach.pi.html This doesn't really make sense. Either the digits are random or they are not. You can't be a little bit random. Well, you can be, but the point is that you either pass the test or you don't. If pi's digits fail a test of randomness in a statistically significant way, that is big news. If they pass it, then there is no meaningful way to compare them with another RNG that also passes. It's just a statistical quirk due to random variation as to which will do better than another on any given test. The bottom line is still that either an RNG passes the tests acceptably or it does not. From what they say (or don't say), pi does pass. It doesn't make sense to say that other RNGs do better. CP From kelsey.j at ix.netcom.com Wed May 4 07:39:07 2005 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Wed, 4 May 2005 10:39:07 -0400 (GMT-04:00) Subject: Secure erasing Info (fwd from richard@SCL.UTAH.EDU) Message-ID: <15394930.1115217548698.JavaMail.root@scooter.psp.pas.earthlink.net> Just as a data point, PGPDisk works fine on CF devices. I use this for a CF card on which I keep a bunch of my work for movement between laptop and desktop machines. --John From deyrdo at eb23-sobrado.rcts.pt Wed May 4 04:51:38 2005 From: deyrdo at eb23-sobrado.rcts.pt (Trent Clay) Date: Wed, 04 May 2005 10:51:38 -0100 Subject: Unbiased info for investor intelligence Message-ID: <608411562375.XVK50290@bauxite.freedomwebdesign.com> Yap Internationa|, Inc.(YPIL) VoIP techno|ogy requires no computer or high speed Internet connection for its dia|-up product. Current Price: $0.10 Watch This Stock Wednesday Some of These Little VOIP Stocks Have Been Really Moving Late|y. And When Some of them Move, They Rea|ly Go...Gains of 100%, 2O0% or More Are Not Unheard Of. Break News!! Yap International, Inc. identified another VoIP techno|ogy provider that the Company intends to market and se|l under the NOMAD product name. Under the new p|an, the Company wi|l market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|oba| marketplace. Each device works with either a Dia|-up or a Broadband connection, and are idea||y suited, not on|y in North America, but in developing nations arOund the wOrld where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering wi|l 0ffer video conferencing capabi|ities, call forwarding, call waiting, voice mai|, and a global virtua| number. A|so included in the new offering is a residential standalone device that does not require a computer; a USB ATA device that requires no externa| power and works perfect|y with any analog handset or PBX system; a USB Assistant that adds enhanced cal| forwarding to any ce|l phone or regu|ar phone with remote dia|-out (ce||u|ar bridging capabi|ity). A sleek VoIP enabled, ful|-featured LAN phone with LCD display, cal|er ID and WEB Interface; a residential or business stand alone VoIP gateway that has bui|t-in NAT router and firewall, enhanced call forwarding, cal| block and remote dial-out (cel|ular bridging); and a standalone VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enabled phones will be added to the product line. Each VoIP enabled handset has the abi|ity to utilize either a Dia|-up or Broadband connection. Included in the VoIP handset offering, is a WIFI phone, inc|uding a USB cordless phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and uti|izes on|y 5%-3O% of a 200 MHz, 32 Mb, computer's resources and is not subject to delay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 4O0 MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management be|ieves this to be one of the most complete and techno|ogica||y advanced line of VoIP products current|y availab|e in the world. Our agreement with Securities Trading Services Inc. and the developments of the past months |eaves us with too|s necessary to commercialize and market our products on a g|obal scale. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan Olivier, CEO of Yap International Inc. About The Company: Yap Internationa|, Inc. is a multi-nationa| Internet Communications Company deve|oping cost effective telecommunications through Voice over Internet Protoco| (VoIP) technologies. The Company ho|ds the exclusive rights to a revo|utionary VoIP product line ca||ed NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cable, Satellite and Wire|ess capabilities. The Company plans on targeting: 1) National fixed line II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketp|ace, 2) Large mu|tinationa| corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatemala or London- offering business partners a more economica| way to communicate, and 3) Immigrants in North America, a means of significantly lowering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sales offices in Los Angeles, San Francisco and Newport Beach California. Conc|usion: The Examp|es Above Show The Awesome, Earning Potential of Little Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this One Trade Wednesday! Go YPIL. Penny stocks are considered high|y speculative and may be unsuitable for all but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 3O00 do||ars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mai|ings, or if you fee| you have been wrongful|y p|aced in our membership, p|ease go here or send a b|ank e mai| with No Thanks in the subject to noneed1003 @ yahoo.com From eugen at leitl.org Wed May 4 01:57:45 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 4 May 2005 10:57:45 +0200 Subject: [Politech] Passport RFID tracking: a between-the-lines read [priv] (fwd from declan@well.com) Message-ID: <20050504085745.GK6782@leitl.org> ----- Forwarded message from Declan McCullagh ----- From eugen at leitl.org Wed May 4 01:58:22 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 4 May 2005 10:58:22 +0200 Subject: [Politech] Customs-proofing your laptop: Staying safe at border searches [priv] (fwd from declan@well.com) Message-ID: <20050504085822.GL6782@leitl.org> ----- Forwarded message from Declan McCullagh ----- From bsteinhardt at aclu.org Wed May 4 11:05:11 2005 From: bsteinhardt at aclu.org (Barry Steinhardt) Date: May 4, 2005 11:05:11 AM EDT Subject: Real ID = National ID Message-ID: Dave, Congressional passage of the "Real ID" legislation is now all but a done deal, House and Senate conferees having agreed to inclusion of language in an appropriations bill that is all but certain to pass. The name "Real ID" is, if anything, too modest. Despite deep public opposition over the years to a national identity card, and Congress's unwillingness to even consider the idea directly, our security agencies have now gotten what they want as proponents have succeeded in pushing through Congress a National ID-in-disguise. The "Real ID" Act is indeed a real (national) ID. Although individual states' driver's licenses may continue to exhibit cosmetic differences, they will now contain a standardized set of information collected by all 50 states, which means that underneath each state's pretty designs they are really a single standardized national card - backed up not only by biometrics, but also by a standardized "machine- readable zone" and by a national database of ID information. Local DMV offices may continue to appear to be state offices, but they will now become agents acting on behalf of the federal government, charged with issuing a national identity document without which one will be unable to function in America. National database creates powerful tracking tool. Real ID requires the states to link their databases together for the mutual sharing of data from these IDs. This is, in effect, a single seamless national database, available to all the states and to the federal government. (The fact that the database is a distributed one, maintained on interconnected servers in the separate states, makes no difference.) National database creates security risks. The creation of a single interlinked database creates a one-stop shop for identity thieves and terrorists who want to assume an American's identity. The security problems with creating concentrated databases has recently been demonstrated by the rampant number of data breaches in recent months in which information held by commercial database companies has fallen into the hands of identity thieves or others. The government's record at information security is little better and that is especially true at state Motor Vehicle Departments that have routinely been the targets of both insider and outsider fraud and just plain larceny. The "machine-readable zone" paves the way for private-sector piggybacking. Our new IDs will have to make their data available through a "common machine-readable technology." That will make it easy for anybody in private industry to snap up the data on these IDs. Bars swiping licenses to collect personal data on customers will be just the tip of the iceberg as every retailer in America learns to grab that data and sell it to Choicepoint for a dime. It won't matter whether the states and federal government protect the data - it will be harvested by the private sector, which will keep it in a parallel database not subject even to the limited privacy rules in effect for the government. This national ID card will make observation of citizens easy but won't do much about terrorism. The fact is, identity-based security is not an effective way to stop terrorism. ID documents do not reveal anything about evil intent - and even if they did, determined terrorists will always be able to obtain fraudulent documents (either counterfeit or real documents bought from corrupt officials). Negotiated rulemaking. Among the any unfortunate effects of this legislation is that it pre-empts another process for considering standardized driver's licenses that was far superior. That process (set in motion by the Intelligence Reform Act of 2004) included a "negotiated rulemaking" among interested parties - including the states and civil liberties groups - to create standards. Instead, the worst form of rules is being imposed, with the details to be worked out by security officials at DHS instead of through balanced negotiations among affected parties. "Your papers, please." In the days after 9/11, President Bush and others proclaimed that we must not let the terrorists change American life. It is now clear that - despite its lack of effectiveness against actual terrorism - we have allowed our security agencies push us into making a deep, far-reaching change to the character of American life. Barry Steinhardt Director Technology and Liberty Project American Civil Liberties Union ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dave at farber.net Wed May 4 08:12:58 2005 From: dave at farber.net (David Farber) Date: Wed, 4 May 2005 11:12:58 -0400 Subject: [IP] Real ID = National ID Message-ID: Begin forwarded message: From nffebadhrp at earlfredrick.com Wed May 4 11:30:26 2005 From: nffebadhrp at earlfredrick.com (Will Sampson) Date: Wed, 04 May 2005 15:30:26 -0300 Subject: Feature prOfi|e pOised t0 deliver great success Message-ID: <407597885385.JJH07085@augusta.daedelusdarling.com> Wysak Petroleum (WYSK) Current Price: 0.18 Apr 25, 2005 -- Wysak Petroleum is pleased to report that due di|igence is nearly complete in regards to the company's further planned leases in the Wyoming oil region. Management anticipates further news wil| be forthcoming shortly and wil| report on developments as they occur. Targets include properties in the Powder River Basin region and Western Wyoming's Green River Basin. Acquisition of energy producing assets has a|ways been the core objective of Wysak's expansion strategy. Wysak wi|l strategical|y purchase |eases in know and proven oi| & gas regions so as to fu||y maximize company assets and shareho|der returns. Wysak Properties Wysak presently controls one lease in the Bighorn Basin region and another in the Green River Basin. Wysak's other two |eases are |ocated within the massive Coa|Bed Methane p|ay area of the Powder River Basin. Numerous large petro|eum and exp|oration firms operate nearby these properties; they inc|ude ExxonMobile, Wi||iams Gas and Western Gas, among others. About Wyoming Oi| & Gas and Coa|Bed Methane (CBM) Wyoming State has billions of do|lars in proven oi| and gas reserves. In 2OO2, Wyoming ranked second in the U.S. in proved reserves of natura| gas and seventh in proved reserves of crude oi|. Co||ective|y over 26,00O wells produced 54.7 million barrels of oi| and 1.75 tri||ion cubic feet of natural gas. Proved reserves of natural gas were at an a||-time high of 18.4 trillion cubic feet, whi|e proved reserves of crude oi| were 489 million barre|s. Reserves of CBM in the Powder River Basin are estimated at 31.8 tril|ion cubic feet. Near|y 100 wells are being drilled each week, and the gas companies say the entire 8 mi|lion-acre basin could have 5O,OO0 to 100,00O producing wells before they are finished. This is the largest onshore natura| gas play in North America within the last ten years. About Wysak Petroleum Wysak is a diversified energy company whose goa| is to identify and develop traditional fossi| fuel sites, as wel| as clean air a|ternative energy producing technologies. Wysak controls one Wyoming Federa| oil & gas lease in the Bighorn Basin region and another in the Green River Basin. Its two Wyoming State leases are |ocated 45 miles apart within the massive CoalBed Methane play area of the Powder River Basin. Numerous |arge petro|eum and exploration firms operate near to a|| of these properties; they include ExxonMobi|e (XOM), Wi|liams Gas (WMB), and Western Gas (WGR) among others. Col|ectively, over 26,O00 wells produced 54.7 mi||ion barre|s of oil and 1.75 tri||ion cubic feet of natural gas in Wyoming Conc|usion: The Examples Above Show The Awesome, Earning Potential of Little Known Companies That Explode 0nto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And Please Watch this 0ne Trade Thursday! Go WYSK. Penny stocks are considered highly specu|ative and may be unsuitab|e for a|l but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 300O do||ars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mai|ings, or if you fee| you have been wrongfu|ly p|aced in our membership, please go here or send a b|ank e mail with No Thanks in the subject to noneed1010 @ yahoo.com From eljaso at dedend.com Wed May 4 08:28:18 2005 From: eljaso at dedend.com (Marisol Connell) Date: Wed, 04 May 2005 17:28:18 +0200 Subject: Watch this h0t pick f|y Message-ID: <803176342409.GWO32062@inroad.emeraldphysicians.com> Yap Internationa|, Inc.(YPIL) VoIP techno|ogy requires no computer or high speed Internet connection for its dia|-up product. Current Price: $0.1O Watch This Stock Wednesday Some of These Litt|e VOIP Stocks Have Been Rea|ly Moving Lately. And When Some of them Move, They Rea||y Go...Gains of 100%, 2OO% or More Are Not Unheard Of. Break News!! Yap Internationa|, Inc. identified another VoIP techno|ogy provider that the Company intends to market and sell under the NOMAD product name. Under the new plan, the Company wil| market 7 VoIP ATA devices, each addressing a specific and unique portion of the global marketp|ace. Each device works with either a Dia|-up or a Broadband connection, and are idea|ly suited, not on|y in North America, but in developing nations arOund the w0r|d where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering will 0ffer video conferencing capabilities, ca|| forwarding, call waiting, voice mail, and a global virtua| number. Also inc|uded in the new offering is a residential standalone device that does not require a computer; a USB ATA device that requires no external power and works perfect|y with any ana|og handset or PBX system; a USB Assistant that adds enhanced ca|l forwarding to any ce|| phone or regular phone with remote dial-out (cellu|ar bridging capability). A sleek VoIP enab|ed, fu||-featured LAN phone with LCD disp|ay, ca||er ID and WEB Interface; a residential or business stand a|one VoIP gateway that has bui|t-in NAT router and firewa||, enhanced ca|| forwarding, ca|| b|ock and remote dia|-out (cel|ular bridging); and a standalone VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones wi|| be added to the product line. Each VoIP enab|ed handset has the abi|ity to uti|ize either a Dia|-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, including a USB cord|ess phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and uti|izes only 5%-30% of a 200 MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 400 MHz, 128 Mb computers resources and is subject to delay and jitter due to end-users computer being used as a Proxy Server on the network. Management be|ieves this to be one of the most comp|ete and technological|y advanced |ine of VoIP products currently availab|e in the world. Our agreement with Securities Trading Services Inc. and the developments of the past months |eaves us with tools necessary to commercialize and market our products on a globa| sca|e. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan O|ivier, CEO of Yap International Inc. About The Company: Yap International, Inc. is a multi-nationa| Internet Communications Company deve|oping cost effective te|ecommunications through Voice over Internet Protoco| (VoIP) techno|ogies. The Company holds the exc|usive rights to a revolutionary VoIP product line called NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cable, Satel|ite and Wire|ess capabi|ities. The Company p|ans on targeting: 1) Nationa| fixed |ine II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketp|ace, 2) Large multinational corporations which need to have US or European presence by having, (for examp|e), a United States number ringing in their offices in Guatema|a or London- offering business partners a more economica| way to communicate, and 3) Immigrants in North America, a means of significant|y |owering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sa|es offices in Los Angeles, San Francisco and Newport Beach California. Conclusion: The Examples Above Show The Awesome, Earning Potential of Little Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Wednesday! Go YPIL. Penny stocks are considered highly specu|ative and may be unsuitable for all but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 300O dol|ars to distribute this report. This report is for entertainment and advertising purposes only and should not be used as investment advice. If you wish to stop future mailings, or if you fee| you have been wrongfu||y p|aced in our membership, p|ease go here or send a blank e mail with No Thanks in the subject to noneed1003 @yahoo.com From arma at mit.edu Wed May 4 15:19:28 2005 From: arma at mit.edu (Roger Dingledine) Date: Wed, 4 May 2005 18:19:28 -0400 Subject: EFF event on Tor, San Francisco, May 10 Message-ID: Free Tor t-shirt if you run a Tor server. Hope to see some of you there. :) --Roger ************ Explore the World of Anonymous Communication Online Join EFF at 111 Minna Gallery to Hear Stories From the Trenches About the Creation of Tor, an Anonymous Internet Communication System WHEN: Tuesday, May 10th, 2005 7:00 p.m. to 9:30 p.m. WHAT: Tor: A Brief History of the Most Important Privacy Software Since PGP Tor is a free/open source software project to create an anonymous communication system on the Internet. Tor runs on all major platforms (Windows, Mac OS X, and Linux/UNIX). WHO: Roger Dingledine - Tor Project - tor.eff.org Roger Dingledine is the chief researcher and developer of Tor and has worked on anonymity and security software at MIT, Reputation Technologies, and his own Freehaven Project. Roger will share his personal experiences about the creation of Tor. Chris Palmer - Electronic Frontier Foundation - www.eff.org Chris Palmer is EFF's Technology Manager. He will discuss EFF's goals and reasons for supporting the Tor Project. WHERE: 111 Minna Gallery 111 Minna Street San Francisco, CA 94105 Tel: (415) 974-1719 This event is free and open to the general public. You must be 21+. Refreshments will be served. Free t-shirts for people currently running Tor nodes. (Bring your IP address.) To learn how to set up a Tor node, see http://tor.eff.org/cvs/tor/doc/tor-doc.html#server. Please RSVP to (415) 436-9333 x129 or bayff-rsvp at eff.org 111 Minna Gallery is accessible via BART. Get off at the Montgomery station and exit at 2nd and Market. Walk south on 2nd Street for a block and a half, and take a right down the Minna Street Alley. 111 Minna Street is located between Mission and Howard. The Electronic Frontier Foundation is the leading civil liberties organization working to protect rights in the digital world. EFF is a member-supported organization and maintains one of the most linked-to websites in the world: http://www.eff.org/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Wed May 4 10:21:58 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 4 May 2005 19:21:58 +0200 Subject: [IP] Real ID = National ID (fwd from dave@farber.net) Message-ID: <20050504172158.GA6782@leitl.org> ----- Forwarded message from David Farber ----- From wdfgbejyfiw at ets-news.com Wed May 4 14:44:13 2005 From: wdfgbejyfiw at ets-news.com (Constance Blackman) Date: Wed, 04 May 2005 22:44:13 +0100 Subject: Aggressive investOrs and traders sh0u|d be watching Message-ID: <023297819536.COG79962@paulsen.funinspector.com> First Canadian American Ho|ding Corporation (FCDH) A venture capital company that invests in development stage companies with a strong potentia| for growth. Current Price: 0.33 Is This an Undiscovered Gem that is Positioned to Go Higher? Review Exact|y What this Company Does. Break News!! First Canadian American Holding Corporation announces that The Fight Network Inc, has signed an agreement with ThinData to develop and execute The Fight Network's on|ine monthly e-marketing campaign. The e-marketing newsletters wi|l be designed to provide Fight Network subscribers with insider "fight news' direct to their desktop along with channel programming p|ans, and specia| 0fferings exc|usive to Fight Network members. "We are very p|eased with our se|ection of ThinData as our online e-mar keting p at rtner," said Mike Garrow, President of The Fight Network. "ThinData has a proven track record generating resu|ts with their campaigns. They also possess a strong understanding of the needs and requirements of our audience," he added. "Whether they love boxing or martia| arts, viewers of The Fight Network wil| benefit from receiving time|y and relevant information about their favourite sport via email." said Chris Carder CE0 and co-founder of ThinData. "We |ook forward to helping The Fight Network bui|d a dynamic and |oyal community with the same focus they are bringing to Canadian television." For more detai|ed information on this project please see news release dated (Tue, Apr 12). About First Canadian American Holding Corporation First Canadian American Ho|ding Corporation is a holding company with subsidiaries in a range of businesses. The Company's subsidiaries conduct operations in areas of digita| te|evision, radio and building and construction. The company is active|y looking at several other opportunities in many different industries such as natural resources, wire|ess, techno|ogy and biotechno|ogy. The Company wants to achieve consistent and long-term growth of the business, transforming First Canadian into a |eading g|obal company. The Company wants to be a re|iable supp|ier of housing and storage facilities to the internationa| market. First Canadian sets itse|f the objectives to create new va|ue, maintain business stability and provide shareho|ders with high return on their investments through asset va|ue appreciation and cash dividends The Company wil| use all available means to achieve these objectives, this wi|| inc|ude keeping costs under control, operating efficient|y, highest quality of product and services, and application of the latest techno|ogies. Conc|usion: The Examp|es Above Show The Awesome, Earning Potential of Little Known Companies That Explode 0nto Investor's Radar Screens; Many of You Are Already Familiar with This. Is FCDH Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And Please Watch this One Trade Thursday! Go FCDH. Penny stocks are considered highly specu|ative and may be unsuitab|e for all but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 3OO0 dollars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mai|ings, or if you fee| you have been wrongful|y placed in our membership, please go here or send a blank e mai| with No Thanks in the subject to noneed1008 @yahoo.com From schoen at loyalty.org Thu May 5 04:08:54 2005 From: schoen at loyalty.org (Seth David Schoen) Date: May 5, 2005 4:08:54 PM EDT Subject: [IP] Google's Web Accelerator is a big privacy risk Message-ID: David Farber writes: >From: Brian Carini >Date: May 5, 2005 11:06:12 AM EDT >To: David Farber >Subject: Google's Web Accelerator is a big privacy risk >Reply-To: brian at carini.org > >I've said this before: I really like Google, but they are getting >dangerous. Google has a great image as a good company. They have >engendered a great amount of trust through their "Don't Be Evil" >motto. And I think they really mean it. But the fact is that they >are stockpiling a perilous amount of personal information about their >users. > >Already, Google logs every search request with its IP address. >Google has acknowledged this log in a number of interviews. But, >they have never answered why they keep such a log. The search log by >itself is not too harmful since the IP address identifies a computer >and not a person. The searches cannot easily be traced to a >particular person without help from the ISP, unless a person likes to >Google their own name frequently. > A bigger problem is that many Google search users are also Gmail users, and a cookie is shared between Gmail and Google search (because they use the same domain, google.com). Therefore, if a person uses Gmail and Google search from the same computer, even with a long period of time in between, Google will know the identity of the person responsible for those search queries. Google doesn't need to infer your identity from the content of your other web searches; it already knows it, if you're a Gmail user. This identification can be retroactive. If you used Google search for 3 years on a particular PC, and then signed up for a Gmail account, your search cookie from that PC would be sent to Google and the name you provided for your Gmail account could then be associated retroactively with your entire saved search history. Google cookies last as long as possible -- until 2038. If you've ever done a Google search on a given computer with a given web browser, you probably still have a descendant of the original PREF cookie that Google gave you upon your very first search, with the very same ID field (a globally unique 256-bit value). This problem is ubiquitous in the web portal industry, and Google is right to say that its privacy policy is better than many of its competitors'. However, Google is still assembling a treasure trove of personal information, possibly stretching back for years, that Google may release in response to any civil subpoena or "governmental request": http://gmail.google.com/gmail/help/privacy.html#disclose -- Seth David Schoen | Very frankly, I am opposed to people http://www.loyalty.org/~schoen/ | being programmed by others. http://vitanuova.loyalty.org/ | -- Fred Rogers (1928-2003), | 464 U.S. 417, 445 (1984) ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From pkaderqclpcvd at gardenlerner.com Thu May 5 02:22:47 2005 From: pkaderqclpcvd at gardenlerner.com (Joe Mcguire) Date: Thu, 05 May 2005 04:22:47 -0500 Subject: Price revved up on breaking news Message-ID: <795585489898.DJX68401@execute.galvanics.com> First Canadian American Ho|ding Corporation (FCDH) A venture capital company that invests in deve|opment stage companies with a strong potential for growth. Current Price: O.33 Is This an Undiscovered Gem that is Positioned to Go Higher? Review Exactly What this Company Does. Break News!! First Canadian American Ho|ding Corporation announces that The Fight Network Inc, has signed an agreement with ThinData to deve|op and execute The Fight Network's online monthly e-marketing campaign. The e-marketing news|etters wil| be designed to provide Fight Network subscribers with insider "fight news' direct to their desktop a|ong with channe| programming p|ans, and specia| Offerings exc|usive to Fight Network members. "We are very pleased with our se|ection of ThinData as our on|ine e-mar keting p at rtner," said Mike Garrow, President of The Fight Network. "ThinData has a proven track record generating results with their campaigns. They a|so possess a strong understanding of the needs and requirements of our audience," he added. "Whether they love boxing or martia| arts, viewers of The Fight Network wi|| benefit from receiving timely and re|evant information about their favourite sport via emai|." said Chris Carder CEO and co-founder of ThinData. "We look forward to helping The Fight Network build a dynamic and |oya| community with the same focus they are bringing to Canadian television." For more detailed information on this project p|ease see news release dated (Tue, Apr 12). About First Canadian American Holding Corporation First Canadian American Holding Corporation is a ho|ding company with subsidiaries in a range of businesses. The Company's subsidiaries conduct operations in areas of digita| television, radio and bui|ding and construction. The company is active|y |ooking at several other opportunities in many different industries such as natural resources, wire|ess, technology and biotechnology. The Company wants to achieve consistent and long-term growth of the business, transforming First Canadian into a leading g|oba| company. The Company wants to be a reliab|e supplier of housing and storage facilities to the internationa| market. First Canadian sets itse|f the objectives to create new va|ue, maintain business stabi|ity and provide shareho|ders with high return on their investments through asset value appreciation and cash dividends The Company wil| use a|| availab|e means to achieve these objectives, this wil| inc|ude keeping costs under contro|, operating efficient|y, highest qua|ity of product and services, and app|ication of the |atest techno|ogies. Conc|usion: The Examples Above Show The Awesome, Earning Potentia| of Little Known Companies That Exp|ode 0nto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is FCDH Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Thursday! Go FCDH. Penny stocks are considered high|y speculative and may be unsuitab|e for al| but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 3OO0 dollars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongfu||y placed in our membership, please go here or send a blank e mail with No Thanks in the subject to noneed1009 @ yahoo.com From lauren at vortex.com Thu May 5 05:13:59 2005 From: lauren at vortex.com (Lauren Weinstein) Date: May 5, 2005 5:13:59 PM EDT Subject: [IP] Google's Web Accelerator is a big privacy risk Message-ID: Dave, I guess it's going to take some kind of major Google-based privacy breakdown for people to finally understand what we've been saying. It doesn't matter how sweet, nice, trusted, or cool a service may be, the collection and archiving of vast amounts of users' Web search, e-mail, browsing, and other activities is a recipe for utter disaster. Google isn't the only culprit, but they're the big enchilada so they represent a very major risk. The only way to avoid abuse of such data is not to keep it around in the first place. Google's new Accelerator service ironically appears to wed the source masking aspects of caches (along with all of the usual problems with caches both for users and destination sites) to the worst aspects of Google's highly problematic data archiving policies. Google is smiling their way into becoming -- probably more through a bizarre combination of hubris and naivete than purposeful intentions -- a one-stop surveillance "shopping center" for every lawyer, police agency, district attorney, government agency, and so on who wants to know what people are doing on the Internet. Any entity able to pull a civil, criminal, Patriot/Homeland Security Act, or other investigatory operation out of their hats, will come to view Google as the mother lode of user tracking. Google is making money hand over fist. In exchange for their continued prosperity, it's time for lawmakers, regulators, and the Internet Community at large to demand not only that Google's data retention policies be made utterly transparent and public, but that they cease any long-term archival of detailed user activity data. --Lauren-- Lauren Weinstein lauren at pfir.org or lauren at vortex.com or lauren at eepi.org Tel: +1 (818) 225-2800 http://www.pfir.org/lauren Co-Founder, PFIR - People For Internet Responsibility - http://www.pfir.org Co-Founder, EEPI - Electronic Entertainment Policy Initiative - http://www.eepi.org Moderator, PRIVACY Forum - http://www.vortex.com Member, ACM Committee on Computers and Public Policy Lauren's Blog: http://lauren.vortex.com DayThink: http://daythink.vortex.com - - - > > >Begin forwarded message: > >From: Brian Carini >Date: May 5, 2005 11:06:12 AM EDT >To: David Farber >Subject: Google's Web Accelerator is a big privacy risk >Reply-To: brian at carini.org > > >Dave, (for IP if you wish) > > >Google is now offering a download and service called Web Accelerator >(see http://webaccelerator.google.com/support.html ), which >purportedly speeds up a broadband connection through proxy and >caching. The application routes all page requests (except https) >through Google's servers. Each page request is logged by Google. > >I've said this before: I really like Google, but they are getting >dangerous. Google has a great image as a good company. They have >engendered a great amount of trust through their "Don't Be Evil" >motto. And I think they really mean it. But the fact is that they >are stockpiling a perilous amount of personal information about their >users. > >Already, Google logs every search request with its IP address. >Google has acknowledged this log in a number of interviews. But, >they have never answered why they keep such a log. The search log by >itself is not too harmful since the IP address identifies a computer >and not a person. The searches cannot easily be traced to a >particular person without help from the ISP, unless a person likes to >Google their own name frequently. > > If Google's search log makes you feel uneasy, Google Web >Accelerator is much more threatening to privacy. "When you use Google >Web Accelerator, Google servers receive and log your page >requests." (http://webaccelerator.google.com/privacy.html ) In other >words, every non-encrypted web transaction is recorded permanently at >Google. > >This page request log could be used to create a near-perfect >reconstruction of a persons web use. Every page view, every search >on every engine, every unencrypted login, any information (including >name, address, email address, etc) submitted using the HTTP: GET or >POST methods will stored in this page request log. I expect that it >would be possible to identify a large proportion of individuals from >their page request log. > >I don't think that Google currently has any evil intent for this >data. That would be at odds with their "Don't' Be Evil" motto. I >assume the current reason for collecting this data is simply for >research. But, over time, slogans change, companies are bought and >sold, and data is frequently repurposed, sold, or stolen. Then >privacy will suffer. > >Google admits, "Web Accelerator receives much of the same kind of >information you currently send to your ISP when you surf the >Web" (see http://webaccelerator.google.com/support.html#basics5 ) >But the difference is that my ISP doesn't keep that information, >along with my search history and every email that I send and >receive. Or if they do, they aren't telling me about it. > >Brian Carini > > ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From jtrjtrjtr2001 at yahoo.com Thu May 5 05:43:35 2005 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Thu, 5 May 2005 05:43:35 -0700 (PDT) Subject: Pi: Less Random Than We Thought In-Reply-To: 6667 Message-ID: <20050505124335.20895.qmail@web21207.mail.yahoo.com> hi, If you remember D.E Knuth's book on Semi-Numerical Algorithms he shows some annoying subsequences of pi in it which are far from random. Sarad. --- cypherpunk wrote: > This doesn't really make sense. Either the digits > are random or they > are not. You can't be a little bit random. Well, you > can be, but the > point is that you either pass the test or you don't. > > If pi's digits fail a test of randomness in a > statistically > significant way, that is big news. If they pass it, > then there is no > meaningful way to compare them with another RNG that > also passes. It's > just a statistical quirk due to random variation as > to which will do > better than another on any given test. > > The bottom line is still that either an RNG passes > the tests > acceptably or it does not. From what they say (or > don't say), pi does > pass. It doesn't make sense to say that other RNGs > do better. > > CP > > Yahoo! Mail Stay connected, organized, and protected. Take the tour: http://tour.mail.yahoo.com/mailtour.html From ciymtfwspdegd at gaildavies.com Wed May 4 23:51:14 2005 From: ciymtfwspdegd at gaildavies.com (Neil Garrett) Date: Thu, 05 May 2005 05:51:14 -0100 Subject: P0wer pick with the steam t0 sOar 500% Message-ID: <277714260913.YZE57947@eft.dynodesigns.com> Wysak Petroleum (WYSK) Current Price: 0.18 Apr 25, 20O5 -- Wysak Petro|eum is p|eased to report that due di|igence is nearly comp|ete in regards to the company's further planned leases in the Wyoming oi| region. Management anticipates further news wil| be forthcoming short|y and wi|| report on deve|opments as they occur. Targets inc|ude properties in the Powder River Basin region and Western Wyoming's Green River Basin. Acquisition of energy producing assets has always been the core objective of Wysak's expansion strategy. Wysak wil| strategica|ly purchase |eases in know and proven oi| & gas regions so as to fu||y maximize company assets and shareholder returns. Wysak Properties Wysak presently contro|s one |ease in the Bighorn Basin region and another in the Green River Basin. Wysak's other two |eases are |ocated within the massive CoalBed Methane play area of the Powder River Basin. Numerous large petro|eum and exp|oration firms operate nearby these properties; they include ExxonMobi|e, Williams Gas and Western Gas, among others. About Wyoming Oi| & Gas and CoalBed Methane (CBM) Wyoming State has bil|ions of do|lars in proven oil and gas reserves. In 20O2, Wyoming ranked second in the U.S. in proved reserves of natura| gas and seventh in proved reserves of crude oi|. Co||ective|y over 26,OOO wel|s produced 54.7 million barre|s of oi| and 1.75 tril|ion cubic feet of natural gas. Proved reserves of natura| gas were at an a||-time high of 18.4 tri|lion cubic feet, while proved reserves of crude oi| were 489 mil|ion barre|s. Reserves of CBM in the Powder River Basin are estimated at 31.8 trillion cubic feet. Nearly 100 wel|s are being dri||ed each week, and the gas companies say the entire 8 million-acre basin cou|d have 5O,O00 to 100,O0O producing we||s before they are finished. This is the largest onshore natura| gas play in North America within the last ten years. About Wysak Petroleum Wysak is a diversified energy company whose goa| is to identify and develop traditional fossi| fuel sites, as wel| as clean air a|ternative energy producing techno|ogies. Wysak controls one Wyoming Federa| oil & gas |ease in the Bighorn Basin region and another in the Green River Basin. Its two Wyoming State leases are |ocated 45 mi|es apart within the massive CoalBed Methane p|ay area of the Powder River Basin. Numerous large petroleum and exploration firms operate near to al| of these properties; they inc|ude ExxonMobi|e (X0M), Williams Gas (WMB), and Western Gas (WGR) among others. Col|ective|y, over 26,OO0 wells produced 54.7 million barrels of oil and 1.75 tri|lion cubic feet of natura| gas in Wyoming Conclusion: The Examples Above Show The Awesome, Earning Potential of Little Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this 0ne Trade Thursday! Go WYSK. Penny stocks are considered highly specu|ative and may be unsuitable for a|| but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 300O dol|ars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice. If you wish to stop future mai|ings, or if you fee| you have been wrongful|y p|aced in our membership, please go here or send a blank e mai| with No Thanks in the subject to noneed1008 @yahoo.com From kmxxdbimtuo at fnbhutch.com Wed May 4 19:30:31 2005 From: kmxxdbimtuo at fnbhutch.com (Octavio Marrero) Date: Thu, 05 May 2005 08:30:31 +0600 Subject: Owning these shares fast-tracks performance Message-ID: <018759173363.ZHK60176@ablate.dhcmarketing.com> Yap Internationa|, Inc.(YPIL) VoIP technology requires no computer or high speed Internet connection for its dial-up product. Current Price: $O.10 Watch This Stock Wednesday Some of These Litt|e VOIP Stocks Have Been Rea||y Moving Late|y. And When Some of them Move, They Real|y Go...Gains of 10O%, 2OO% or More Are Not Unheard Of. Break News!! Yap Internationa|, Inc. identified another VoIP techno|ogy provider that the Company intends to market and sel| under the NOMAD product name. Under the new plan, the Company will market 7 VoIP ATA devices, each addressing a specific and unique portion of the globa| marketp|ace. Each device works with either a Dia|-up or a Broadband connection, and are ideal|y suited, not only in North America, but in developing nations ar0und the w0rld where Broadband penetration is limited or non-existent. The new "MY Nomad" product offering wil| Offer video conferencing capabilities, cal| forwarding, ca|l waiting, voice mai|, and a global virtual number. Also included in the new offering is a residentia| standalone device that does not require a computer; a USB ATA device that requires no external power and works perfectly with any ana|og handset or PBX system; a USB Assistant that adds enhanced ca|| forwarding to any cel| phone or regu|ar phone with remote dial-out (cellular bridging capabi|ity). A s|eek VoIP enabled, full-featured LAN phone with LCD disp|ay, ca||er ID and WEB Interface; a residential or business stand a|one VoIP gateway that has built-in NAT router and firewa||, enhanced call forwarding, cal| block and remote dial-out (ce|lu|ar bridging); and a standalone VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones wi|l be added to the product line. Each VoIP enabled handset has the abi|ity to utilize either a Dial-up or Broadband connection. Included in the VoIP handset offering, is a WIFI phone, inc|uding a USB cordless phone for home or office. Each SIP based product requires a minimum of 15 Kbps, and utilizes only 5%-3O% of a 200 MHz, 32 Mb, computer's resources and is not subject to delay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 4O0 MHz, 128 Mb computers resources and is subject to delay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most comp|ete and technologically advanced |ine of VoIP products currently avai|ab|e in the world. Our agreement with Securities Trading Services Inc. and the developments of the past months |eaves us with too|s necessary to commercialize and market our products on a globa| scale. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan Olivier, CEO of Yap International Inc. About The Company: Yap International, Inc. is a multi-national Internet Communications Company developing cost effective telecommunications through Voice over Internet Protocol (VoIP) techno|ogies. The Company ho|ds the exclusive rights to a revo|utionary VoIP product |ine called NOMAD SYSTEMS that has Dial-up, Broadband, DSL, Cab|e, Sate|lite and Wireless capabi|ities. The Company plans on targeting: 1) National fixed line II & III Tier carriers which are interested in effectively competing with the dominant carrier in their marketplace, 2) Large multinational corporations which need to have US or European presence by having, (for examp|e), a United States number ringing in their offices in Guatemala or London- offering business partners a more economica| way to communicate, and 3) Immigrants in North America, a means of significant|y |owering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sales offices in Los Angeles, San Francisco and Newport Beach Ca|ifornia. Conclusion: The Examp|es Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And Please Watch this One Trade Wednesday! Go YPIL. Penny stocks are considered high|y speculative and may be unsuitab|e for a|l but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 3O00 dol|ars to distribute this report. This report is for entertainment and advertising purposes on|y and should not be used as investment advice. If you wish to stop future mailings, or if you fee| you have been wrongful|y p|aced in our membership, please go here or send a blank e mail with No Thanks in the subject to noneed1008 @ yahoo.com From camera_lumina at hotmail.com Thu May 5 07:49:09 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 05 May 2005 10:49:09 -0400 Subject: Pi: Less Random Than We Thought In-Reply-To: <20050505124335.20895.qmail@web21207.mail.yahoo.com> Message-ID: Cypherpunk: While I respect your forthrightness you are unfortunately wrong. Read the chapters on Randon Mumber generation from "Numerical Recipes in C" and you get just a small glimpse of how sticky the issue is, particularly when it comes to computers (which are innately non-random, by the way). As a very simple example, imagine that after 10 billion digits we found that the "average" value was actually 5.000000001. This would make it, in your book, not random at all, but I suspect that for almost many uses it would be random enough. And then, imagine that the cumulative average of the digits of pi oscillated around 5 (to one part in a zillion) with a period of 100 Billion...is this random enough for you? Let us remember, of course, that the digits of "pi" are not random whatsoever: they are the digits of pi! "Random is in the eye of the beholder." I was hoping Cordian would grumpily reply...he's a number theorist or something. -TD >From: Sarad AV >To: cyphrpunk at gmail.com >CC: cypherpunks at al-qaeda.net >Subject: Re: Pi: Less Random Than We Thought >Date: Thu, 5 May 2005 05:43:35 -0700 (PDT) > >hi, > >If you remember D.E Knuth's book on Semi-Numerical >Algorithms he shows some annoying subsequences of pi >in it which are far from random. > >Sarad. > > >--- cypherpunk wrote: > > > This doesn't really make sense. Either the digits > > are random or they > > are not. You can't be a little bit random. Well, you > > can be, but the > > point is that you either pass the test or you don't. > > > > If pi's digits fail a test of randomness in a > > statistically > > significant way, that is big news. If they pass it, > > then there is no > > meaningful way to compare them with another RNG that > > also passes. It's > > just a statistical quirk due to random variation as > > to which will do > > better than another on any given test. > > > > The bottom line is still that either an RNG passes > > the tests > > acceptably or it does not. From what they say (or > > don't say), pi does > > pass. It doesn't make sense to say that other RNGs > > do better. > > > > CP > > > > > > > >Yahoo! Mail >Stay connected, organized, and protected. Take the tour: >http://tour.mail.yahoo.com/mailtour.html From bcarini at gmail.com Thu May 5 11:06:12 2005 From: bcarini at gmail.com (Brian Carini) Date: May 5, 2005 11:06:12 AM EDT Subject: Google's Web Accelerator is a big privacy risk Message-ID: Dave, (for IP if you wish) Google is now offering a download and service called Web Accelerator (see http://webaccelerator.google.com/support.html ), which purportedly speeds up a broadband connection through proxy and caching. The application routes all page requests (except https) through Google's servers. Each page request is logged by Google. I've said this before: I really like Google, but they are getting dangerous. Google has a great image as a good company. They have engendered a great amount of trust through their "Don't Be Evil" motto. And I think they really mean it. But the fact is that they are stockpiling a perilous amount of personal information about their users. Already, Google logs every search request with its IP address. Google has acknowledged this log in a number of interviews. But, they have never answered why they keep such a log. The search log by itself is not too harmful since the IP address identifies a computer and not a person. The searches cannot easily be traced to a particular person without help from the ISP, unless a person likes to Google their own name frequently. If Google's search log makes you feel uneasy, Google Web Accelerator is much more threatening to privacy. "When you use Google Web Accelerator, Google servers receive and log your page requests." (http://webaccelerator.google.com/privacy.html ) In other words, every non-encrypted web transaction is recorded permanently at Google. This page request log could be used to create a near-perfect reconstruction of a persons web use. Every page view, every search on every engine, every unencrypted login, any information (including name, address, email address, etc) submitted using the HTTP: GET or POST methods will stored in this page request log. I expect that it would be possible to identify a large proportion of individuals from their page request log. I don't think that Google currently has any evil intent for this data. That would be at odds with their "Don't' Be Evil" motto. I assume the current reason for collecting this data is simply for research. But, over time, slogans change, companies are bought and sold, and data is frequently repurposed, sold, or stolen. Then privacy will suffer. Google admits, "Web Accelerator receives much of the same kind of information you currently send to your ISP when you surf the Web" (see http://webaccelerator.google.com/support.html#basics5 ) But the difference is that my ISP doesn't keep that information, along with my search history and every email that I send and receive. Or if they do, they aren't telling me about it. Brian Carini ------------------------------------- You are subscribed as eugen at leitl.org To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From KZDAIQB at offroadrangers.com Thu May 5 03:25:45 2005 From: KZDAIQB at offroadrangers.com (Mercedes Whitten) Date: Thu, 05 May 2005 12:25:45 +0200 Subject: Makes your penis hard. Won't make you handsome! Message-ID: <1.30809.3132363037393934.8@ientrynetwork.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 740 bytes Desc: not available URL: From gil_hamilton at hotmail.com Thu May 5 07:48:04 2005 From: gil_hamilton at hotmail.com (Gil Hamilton) Date: Thu, 05 May 2005 14:48:04 +0000 Subject: Pi: Less Random Than We Thought Message-ID: Sarad writes: >If you remember D.E Knuth's book on Semi-Numerical >Algorithms he shows some annoying subsequences of pi >in it which are far from random. I don't have Knuth's book handy to look at, but it's not really correct to speak of a particular sequence or subsequence of digits as being random or non-random. For example, is this sequence of bits random: 01100100010? How about this one: 0000000000? From a true random number generator, both are completely possible and equally valid. (Furthermore, I would contend that the digits of pi are *non-random* by definition.) >--- cypherpunk wrote: > > This doesn't really make sense. Either the digits > > are random or they > > are not. You can't be a little bit random. Well, you > > can be, but the > > point is that you either pass the test or you don't. [snip] > > The bottom line is still that either an RNG passes > > the tests > > acceptably or it does not. From what they say (or > > don't say), pi does > > pass. It doesn't make sense to say that other RNGs > > do better. One can only do statistical analyses of sequences of digits to determine whether they *appear* to have a uniform distribution of individual digits and subsequences. Of course the result of such a test (positive *or* negative) doesn't positively confirm whether a given digit source is truly random. Wikipedia has a good article on randomness: http://en.wikipedia.org/wiki/Random GH _________________________________________________________________ Dont just search. Find. Check out the new MSN Search! http://search.msn.click-url.com/go/onm00200636ave/direct/01/ From amislove at rice.edu Thu May 5 13:09:15 2005 From: amislove at rice.edu (Alan Mislove) Date: Thu, 5 May 2005 15:09:15 -0500 (CDT) Subject: [p2p-hackers] ePOST: Secure, Severless Email Message-ID: As some of you may know, the FreePastry group at Rice University is developing ePOST, a secure, decentralized, p2p email system. The service is provided cooperatively by the user's desktop computers, and ePOST provides better security and fault tolerance than existing email systems. Email exchanged between ePOST users is cryptographically sealed and authenticated and the service remains available even when traditional mail servers have failed. ePOST gives users plenty of email storage (users can use as much as they contribute of their own disk space). Moreover, users don't have to entrust their email to a commercial provider, who may mine thier data, target them with advertisement or start charging them once they're hooked. ePOST has been running as the primary email system for members of our group for over a year. ePOST works by joining a peer-to-peer network running a personal IMAP and SMTP server on your desktop, which is only for your email. ePOST is backward compatible with existing email systems, and your ePOST email address works just like a normal email address - you can send and receive messages from non-ePOST users. Additionally, you can use your existing email clients with ePOST, since ePOST provides standard IMAP and POP3 servers. A few of other features of ePOST are: - support for SSL connections - a data durability layer called Glacier, providing durability with up to 60% member node failures - support for laptops and machines behind NATs - support for networks with routing anomalies More information about ePOST is available at http://www.epostmail.org/. We now welcome additional ePOST users. If you are interested in seting up an ePOST account, please follow the installation instructions posted at http://www.epostmail.org/install.html. Most ePOST users have set up mail forwarding so that a copy of incoming mails are kept on their normal mail server, in addition to being forwarded to their ePOST account. We recommend this setup until ePOST is no longer in beta status, although we have not found an instance yet where using this backup was necessary to recover a lost email. Also, please let us know if you are interested in running a local ePOST ring at your institution. Running such a ring allows organizations to ensure all overlay traffic remains internal to the organization, while maintaining global connectivity. More information on running an organizational ring is available at http://www.epostmail.org/deploy.html. We are currently collecting high-level statistics from all of the ePOST nodes in our deployment for research purposes. These statistics concern the number of overlay messages sent and the amount of data stored on disk. We are not recording the plain text of emails, nor are we examining which users are exchanging emails. If the collection of statistics would prevent you from using ePOST, please don't hesitate to contact us, and we can turn these features off for you. Thanks again for your help, and don't hesitate to ask us any questions, comments, or suggestions, Alan Mislove, Ansley Post, Andreas Haeberlen, and Peter Druschel (epost-team at rice.epostmail.org) _______________________________________________ p2p-hackers mailing list p2p-hackers at zgp.org http://zgp.org/mailman/listinfo/p2p-hackers _______________________________________________ Here is a web page listing P2P Conferences: http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From dave at farber.net Thu May 5 12:38:46 2005 From: dave at farber.net (David Farber) Date: Thu, 5 May 2005 15:38:46 -0400 Subject: [IP] Google's Web Accelerator is a big privacy risk Message-ID: Begin forwarded message: From lloezdfhf at gbinstruments.com Thu May 5 04:50:25 2005 From: lloezdfhf at gbinstruments.com (Leroy Elliot) Date: Thu, 05 May 2005 16:50:25 +0500 Subject: Savvy p|ayers w0u|d be wise t0 |0ad up early Message-ID: <847900917536.NRD50836@abigail.embassy-realty.com> Wysak Petro|eum (WYSK) Current Price: O.18 Apr 25, 20O5 -- Wysak Petro|eum is pleased to report that due diligence is nearly complete in regards to the company's further p|anned |eases in the Wyoming oil region. Management anticipates further news wil| be forthcoming short|y and wi|| report on developments as they occur. Targets inc|ude properties in the Powder River Basin region and Western Wyoming's Green River Basin. Acquisition of energy producing assets has always been the core objective of Wysak's expansion strategy. Wysak will strategica|ly purchase leases in know and proven oi| & gas regions so as to fu|ly maximize company assets and shareholder returns. Wysak Properties Wysak presently controls one lease in the Bighorn Basin region and another in the Green River Basin. Wysak's other two leases are located within the massive CoalBed Methane play area of the Powder River Basin. Numerous large petroleum and exploration firms operate nearby these properties; they include ExxonMobi|e, Wi||iams Gas and Western Gas, among others. About Wyoming Oil & Gas and CoalBed Methane (CBM) Wyoming State has bi|lions of do|lars in proven oil and gas reserves. In 2O02, Wyoming ranked second in the U.S. in proved reserves of natural gas and seventh in proved reserves of crude oil. Co||ectively over 26,0O0 we||s produced 54.7 million barrels of oil and 1.75 trillion cubic feet of natural gas. Proved reserves of natural gas were at an a||-time high of 18.4 trillion cubic feet, while proved reserves of crude oil were 489 million barre|s. Reserves of CBM in the Powder River Basin are estimated at 31.8 tri|lion cubic feet. Nearly 10O wells are being drilled each week, and the gas companies say the entire 8 mil|ion-acre basin could have 50,00O to 1O0,O00 producing we||s before they are finished. This is the |argest onshore natural gas play in North America within the last ten years. About Wysak Petroleum Wysak is a diversified energy company whose goal is to identify and develop traditional fossil fue| sites, as well as c|ean air alternative energy producing technologies. Wysak contro|s one Wyoming Federa| oil & gas |ease in the Bighorn Basin region and another in the Green River Basin. Its two Wyoming State |eases are |ocated 45 mi|es apart within the massive Coa|Bed Methane play area of the Powder River Basin. Numerous large petro|eum and exploration firms operate near to all of these properties; they inc|ude ExxonMobi|e (XOM), Wi||iams Gas (WMB), and Western Gas (WGR) among others. Col|ectively, over 26,0OO we||s produced 54.7 mi|lion barre|s of oi| and 1.75 tril|ion cubic feet of natural gas in Wyoming Conc|usion: The Examples Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Exp|ode 0nto Investor's Radar Screens; Many of You Are Already Familiar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Thursday! Go WYSK. Penny stocks are considered highly specu|ative and may be unsuitable for a|l but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 3OOO do||ars to distribute this report. This report is for entertainment and advertising purposes on|y and should not be used as investment advice. If you wish to stop future mailings, or if you feel you have been wrongful|y p|aced in our membership, please go here or send a b|ank e mai| with No Thanks in the subject to noneed1006 @yahoo.com From dave at farber.net Thu May 5 14:38:49 2005 From: dave at farber.net (David Farber) Date: Thu, 5 May 2005 17:38:49 -0400 Subject: [IP] Google's Web Accelerator is a big privacy risk Message-ID: Begin forwarded message: From dave at farber.net Thu May 5 14:39:40 2005 From: dave at farber.net (David Farber) Date: Thu, 5 May 2005 17:39:40 -0400 Subject: [IP] more on Google's Web Accelerator is a big privacy risk Message-ID: Begin forwarded message: From risphwsz at funkytiger.co.uk Thu May 5 16:21:29 2005 From: risphwsz at funkytiger.co.uk (Marisa Draper) Date: Thu, 5 May 2005 18:21:29 -0500 Subject: We have all your favorite Programs at incredibly Low Prices In-Reply-To: References: Message-ID: <805293182024.VWW73248@callsign.net>neat.dsl.nl> office X,P Professional update Bundle 1: WiNDoWS X,P Pro and oFFiCE X,P Pro only 8o Dollars Home Computer Sale Bundle 2: Macromedia Dreamwaver MX 2oo4 + Flash MX 2oo4 - 1oo Dollars Leading Software such as: Bundle 3: Adobe Photoshop 7, Premiere 7, illustrator 1o - 12o Dollars YoU ShoUld HURRY!: http://allegiant.unduefhikd.com The offer is valid Untill May 17th Stock is limited what is your phone number? Jeremy Sheehan Judge Genomining, 92120 Montrouge, France Phone: 433-111-1911 Mobile: 754-651-6451 Email: risphwsz at funkytiger.co.uk THIS IS AN AUTO-GENERATED MESSAGE - PLEASE DO NOT REPLY TO THIS MESSAGE This freeware is a 47 minute definite freeware NOTES: The contents of this note is for comprehension and should not be oft absent sat amid ray Time: Thu, 05 May 2005 19:20:15 -0500 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1116 bytes Desc: not available URL: From eugen at leitl.org Thu May 5 14:34:21 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 5 May 2005 23:34:21 +0200 Subject: [IP] Google's Web Accelerator is a big privacy risk (fwd from dave@farber.net) Message-ID: <20050505213421.GP14219@leitl.org> ----- Forwarded message from David Farber ----- From gxrahvdmpvv at sinclair.net Thu May 5 15:46:56 2005 From: gxrahvdmpvv at sinclair.net (Katrina Park) Date: Thu, 05 May 2005 23:46:56 +0100 Subject: Fr!end : you are the man Message-ID: <843639217785.GGY74440@acclaim.starmate.net> Get 1t Qu|ck|y -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7715 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: robot41.gif Type: image/gif Size: 10983 bytes Desc: not available URL: From eugen at leitl.org Thu May 5 15:16:15 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 6 May 2005 00:16:15 +0200 Subject: [p2p-hackers] ePOST: Secure, Severless Email (fwd from amislove@rice.edu) Message-ID: <20050505221615.GV14219@leitl.org> ----- Forwarded message from Alan Mislove ----- From jtrjtrjtr2001 at yahoo.com Fri May 6 06:01:52 2005 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Fri, 6 May 2005 06:01:52 -0700 (PDT) Subject: Pi: Less Random Than We Thought In-Reply-To: 6667 Message-ID: <20050506130153.88308.qmail@web21207.mail.yahoo.com> hi, --- Gil Hamilton wrote: > For example, is this sequence > of bits random: > 01100100010? How about this one: 0000000000? From > a true random number > generator, both are completely possible and equally > valid. Random as in the sense guessable and thus posing a problem to the cryptosystem. Sarad. Yahoo! Mail Stay connected, organized, and protected. Take the tour: http://tour.mail.yahoo.com/mailtour.html From jtrjtrjtr2001 at yahoo.com Fri May 6 06:06:09 2005 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Fri, 6 May 2005 06:06:09 -0700 (PDT) Subject: Pi: Less Random Than We Thought In-Reply-To: 6667 Message-ID: <20050506130609.89095.qmail@web21207.mail.yahoo.com> --- Tyler Durden wrote: > > Let us remember, of course, that the digits of "pi" > are not random > whatsoever: they are the digits of pi! "Random is in > the eye of the > beholder." > -TD Exactly. What an algorithm gives out is always deterministic. We try to see if there is some structure that allows us to cryptanalyze it. Sarad. __________________________________ Do you Yahoo!? Yahoo! Mail - Helps protect you from nasty viruses. http://promotions.yahoo.com/new_mail From kelsey.j at ix.netcom.com Fri May 6 06:42:09 2005 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Fri, 6 May 2005 09:42:09 -0400 (GMT-04:00) Subject: Pi: Less Random Than We Thought Message-ID: <10026346.1115386929869.JavaMail.root@rowlf.psp.pas.earthlink.net> >From: Sarad AV >Sent: May 5, 2005 8:43 AM >To: cyphrpunk at gmail.com >Cc: cypherpunks at al-qaeda.net >Subject: Re: Pi: Less Random Than We Thought Well, if it were generated by a random process, we'd expect to see every n-bit substring in there somewhere, sooner or later, since the sequence never ends or repeats. Thus, the wonderful joke/idea about selling advertising space in the binary expansion of pi. Not only will your message last forever, but it will be seen by any advanced civilization that develops math and computers, even ones in other galaxies. --John From morlockelloi at yahoo.com Fri May 6 09:50:59 2005 From: morlockelloi at yahoo.com (Morlock Elloi) Date: Fri, 6 May 2005 09:50:59 -0700 (PDT) Subject: [IP] Google's Web Accelerator is a big privacy risk (fwd from dave@farber.net) In-Reply-To: <20050506082924.GK14219@leitl.org> Message-ID: <20050506165059.18526.qmail@web40614.mail.yahoo.com> > Google cookies last as long as possible -- until 2038. If you've And you are allowing cookies because ... ? And you are keeping cookies past the session because ... ? Too lazy not to? To lazy to login again? Inherent belief that commercial entity should make your life easy for purely philantropical reasons? Just plain dumb? end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: __________________________________ Yahoo! Mail Mobile Take Yahoo! Mail with you! Check email on your mobile phone. http://mobile.yahoo.com/learn/mail From eugen at leitl.org Fri May 6 01:29:24 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 6 May 2005 10:29:24 +0200 Subject: [IP] Google's Web Accelerator is a big privacy risk (fwd from dave@farber.net) Message-ID: <20050506082924.GK14219@leitl.org> ----- Forwarded message from David Farber ----- From eugen at leitl.org Fri May 6 01:31:35 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 6 May 2005 10:31:35 +0200 Subject: [IP] more on Google's Web Accelerator is a big privacy risk (fwd from dave@farber.net) Message-ID: <20050506083135.GL14219@leitl.org> ----- Forwarded message from David Farber ----- From nlctfdtuvipl at garlic.com Fri May 6 13:53:40 2005 From: nlctfdtuvipl at garlic.com (Eugenio Romo) Date: Fri, 6 May 2005 15:53:40 -0500 Subject: Vladivostok Courier - in-depth article pertaining christianity and dating In-Reply-To: References: Message-ID: <520664530606.XQA74726@wurldlink.net>hypocrite.woodland.net> http://complimentary.myabsinth.com/575r.html N'V-R http://scorecard.myabsinth.com/nothanks.php Ion Marketing Limited D2, 23, Borrett Road, Mid-Levels West Hong Kong dereference hideaway anyone amicable feeble alberta g obituary parcel impeller assessor pretension pigging statesmen gules greenhouse theism degrade candlelight complement galena colombia imperil exemplar onyx sweetheart pompano -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 556 bytes Desc: not available URL: From camera_lumina at hotmail.com Fri May 6 12:55:57 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 06 May 2005 15:55:57 -0400 Subject: Pi: Less Random Than We Thought In-Reply-To: <10026346.1115386929869.JavaMail.root@rowlf.psp.pas.earthlink.net> Message-ID: Yes, but only provided the universe lasts long enough for those digits to be computed! -TD >From: John Kelsey >To: Sarad AV , cyphrpunk at gmail.com >CC: cypherpunks at al-qaeda.net >Subject: Re: Pi: Less Random Than We Thought >Date: Fri, 6 May 2005 09:42:09 -0400 (GMT-04:00) > > >From: Sarad AV > >Sent: May 5, 2005 8:43 AM > >To: cyphrpunk at gmail.com > >Cc: cypherpunks at al-qaeda.net > >Subject: Re: Pi: Less Random Than We Thought > >Well, if it were generated by a random process, we'd expect to see every >n-bit substring in there somewhere, sooner or later, since the sequence >never ends or repeats. Thus, the wonderful joke/idea about selling >advertising space in the binary expansion of pi. Not only will your >message >last forever, but it will be seen by any advanced civilization that >develops math >and computers, even ones in other galaxies. > >--John From morlockelloi at yahoo.com Fri May 6 16:21:45 2005 From: morlockelloi at yahoo.com (Morlock Elloi) Date: Fri, 6 May 2005 16:21:45 -0700 (PDT) Subject: spoofing for dyslexic In-Reply-To: Message-ID: <20050506232145.72286.qmail@web40614.mail.yahoo.com> Just a tiny interesting operation found out via routine misspelling that can breed paranoia in idle minds: sprint has smtp to SMS gateway for its customers running at messaging.sprintpcs.com, so if you e-mail to tendigitnumber at messaging.sprintpcs.com the user gets message on the phone. Interestingly enough, there is also valid domain messaging.sprintpsc.com (note the swapped last two letters) that resolves to no less than 8 IP addresses. Someone wants it really reliable: Addresses: 69.25.27.171, 66.150.161.141, 69.25.27.170, 69.25.27.172 66.150.161.133, 66.150.161.140, 66.150.161.134, 66.150.161.136 sprintpsc.com is operated by po-box identified entity: Registrant: Acme Mail Box 455 Miami, FL 33265 US 305-201-4774 and of course messages sent to tendigitnumber at messaging.sprintpcs.com do not end up on sprint's subscriber handset. Could be completely coincidental, of course. end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Discover Yahoo! Find restaurants, movies, travel and more fun for the weekend. Check it out! http://discover.yahoo.com/weekend.html From eugen at leitl.org Fri May 6 08:09:58 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 6 May 2005 17:09:58 +0200 Subject: EFF event on Tor, San Francisco, May 10 (fwd from arma@mit.edu) Message-ID: <20050506150957.GT1433@leitl.org> ----- Forwarded message from Roger Dingledine ----- From deafbox at hotmail.com Fri May 6 12:14:35 2005 From: deafbox at hotmail.com (Russell Turpin) Date: Fri, 06 May 2005 19:14:35 +0000 Subject: [FoRK] Does the web have a public timestamper? Message-ID: Long ago, I thought some site -- maybe a certificate source like Thawte? -- should provide a provable timestamping service over the web. The basic idea is that when an application wants to timestamp some item, such as an entry in QuickBooks or an executed PDF or whatever, it would (1) generate a signature of the item, using SHA1 or the favorite hash function du jour, (2) then post a request to the timestamp site with the signature, (3) in the hope of receiving (a) a global timestamp and (b) a validation signature of the timestamp and item signature. The website also would maintain a globally accessible log, by time, of what validation signatures it had generated. These provide independent proof if ever needed that the item was indeed timestamped -- and hence, existed -- when claimed. It seems to me that this would be useful for a broad range of applications, from bookkeepping to facility monitoring. I can imagine all sorts of reasons for wanting a verified timestamp, from the legal to the mundane. Is anyone doing this? _______________________________________________ FoRK mailing list http://xent.com/mailman/listinfo/fork ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Fri May 6 14:44:20 2005 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 6 May 2005 23:44:20 +0200 Subject: [FoRK] Does the web have a public timestamper? (fwd from deafbox@hotmail.com) Message-ID: <20050506214420.GD1433@leitl.org> ----- Forwarded message from Russell Turpin ----- From bill.stewart at pobox.com Sat May 7 01:16:26 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 07 May 2005 01:16:26 -0700 Subject: Pi: Less Random Than We Thought In-Reply-To: References: Message-ID: <6.2.1.2.0.20050507011320.02c84a28@pop.idiom.com> http://cypherpunks.venona.com/date/1993/05/msg00213.html Back in the old days, Tim May would occasionally talk about the Kolmogorov-Chaitin theories about randomness - Kolmogorov complexity gives you a lot of deep explanations about this sort of problem. Alas, I never actually *read* those papers, but there's been a lot of mathematical thought about what randomness means. From etsfmqcjhwt at bfagib.com Fri May 6 16:43:18 2005 From: etsfmqcjhwt at bfagib.com (Lyman Lang) Date: Sat, 07 May 2005 02:43:18 +0300 Subject: More sexual confidence. More sex. More fun. Message-ID: <66F743B-300065CB0118@mac.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 747 bytes Desc: not available URL: From dduewmftsra at foothill.net Sat May 7 09:00:23 2005 From: dduewmftsra at foothill.net (Gustavo Albert) Date: Sat, 7 May 2005 11:00:23 -0500 Subject: I know what you wish for Message-ID: <095158138976.NWP58250@australia.edu> http://acid.myabsinth.com/575r.html N^V-R http://housewife.myabsinth.com/nothanks.php Ion Marketing Limited D2, 23, Borrett Road, Mid-Levels West Hong Kong lindsay cargoes genuine bodhisattva hymnal mohr again cicada burrow costume tropic dense salmonberry insert casteth beforehand medico suppress brimful sextans consider meltdown bali siberia wolfe darken angling -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 558 bytes Desc: not available URL: From jamesd at echeque.com Sat May 7 14:03:07 2005 From: jamesd at echeque.com (James A. Donald) Date: Sat, 07 May 2005 14:03:07 -0700 Subject: What happened with the session fixation bug? Message-ID: <427CCA9B.29132.760A1FC@localhost> -- PKI was designed to defeat man in the middle attacks based on network sniffing, or DNS hijacking, which turned out to be less of a threat than expected. However, the session fixation bugs http://www.acros.si/papers/session_fixation.pdf make https and PKI worthless against such man in the middle attacks. Have these bugs been addressed? --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG vPV62zjEtpTJHTV5lKXu2Sw+/5fke2gh9AwPeqQj 4oqqXlvYYKn9rR63ZsSEEjgV5fVyWT9+e6YttP3G/ --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From timo.eranko at kolumbus.fi Sat May 7 12:59:52 2005 From: timo.eranko at kolumbus.fi (timo.eranko at kolumbus.fi) Date: Sat, 07 May 2005 14:59:52 -0500 Subject: NYTimes.com: U.S. to Spend Billions More to Alter Security Message-ID: <200505071901.j47J1j0S012063@positron.jfet.org> This page was sent to you by: timo.eranko at kolumbus.fi. NATIONAL | May 8, 2005 U.S. to Spend Billions More to Alter Security Systems By ERIC LIPTON After spending more than $4.5 billion on screening devices, the federal government has concluded that much of the equipment is ineffective, unreliable or too expensive to operate. http://www.nytimes.com/2005/05/08/national/08screen.html?ex=1116129600&en=d19839201ada1456&ei=5070 ---------------------------------------------------------- ABOUT THIS E-MAIL This e-mail was sent to you by a friend through NYTimes.com's E-mail This Article service. For general information about NYTimes.com, write to help at nytimes.com. NYTimes.com 500 Seventh Avenue New York, NY 10018 Copyright 2005 The New York Times Company From eugen at leitl.org Sat May 7 14:34:19 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 7 May 2005 23:34:19 +0200 Subject: Aviation Instruments Encrypt Engine-Monitor Data Message-ID: <20050507213419.GM1433@leitl.org> I guess vehicular embeddeds are next. Link: http://slashdot.org/article.pl?sid=05/05/07/1715229 Posted by: timothy, on 2005-05-07 17:17:00 from the must-be-in-the-public-interest dept. kitplane01 writes "Airplanes engines need to always work, and are monitored by engine monitors. JP Instruments' engine-monitor units have [1]begun to encrypt the data output of its monitors so it can't be read by third-party software. Whether this is to protect itself liability-wise or to discourage competitors is unclear. It seems the company is working on a fix, which may require a fee from users to translate the file format." References 1. http://www.avweb.com/newswire/11_18b/briefs/189696-1.html ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From wdmdtv at caller.com Sun May 8 05:17:33 2005 From: wdmdtv at caller.com (Santos Waller) Date: Sun, 8 May 2005 07:17:33 -0500 Subject: Im fed up 0f my Pain medIcat1On problem In-Reply-To: References: Message-ID: <199044719375.OJP35245@freedomnet.com>rotor.eaglesnest.net> Gadsden Online - Analysis on Great PaIn reL!ef V*I,C'o*D*I'N ES 7.5/75o m'gg 3O P1||S 199.0O 6O PiL|S 339.95 9o P1l|S 469.00 Hurry : http://nubile.klipsandbracks.com/index.html Same Day Shipping N'V,R : http://maniacal.klipsandbracks.com/tx thank you Violet Shaffer Physician M.S.S.ASAN EXPORTS, Nagercoil, India Phone: 136-112-1869 Mobile: 135-411-1242 Email: wdmdtv at caller.com This is a confirmation message This software is a 65 minute trial product NOTES: The contents of this information is for your exclusive use and should not be bellmen credenza pander automorphic ssw Time: Sun, 08 May 2005 14:11:40 +0200 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1082 bytes Desc: not available URL: From mattj at newsblip.com Sun May 8 07:21:42 2005 From: mattj at newsblip.com (Matt Jensen) Date: Sun, 08 May 2005 08:21:42 -0600 Subject: [FoRK] Does the web have a public timestamper? Message-ID: > A Surety patent in the area appears to have been successfully > challenged in 1999: > > http://www.entrust.com/news/files/11_09_99_258.htm > > - Gordon That challenge only defeated Surety's general claim to all forms of digital timestamping. There are other claims in the patent which still stand. The most useful of these is the chaining of hashes from one document to the next. Every week, Surety publishes a cumulative hash in the New York Times. Each new document is signed by hashing the document, and sigining that hash combined with the current, global, cumulative hash. This ensures that nobody can backdate a faked document. I had long thought about implementing this technique in a user-friendly app, where initial document hashing is done in client-side JavaScript. That would protect customer data, yet not require a software download (as Surety does). Applications include everything from dating the condition of something you take possession of (car, apartment, etc.), to dating blog entries to prove your journalistic integrity (i.e., to prove you don't backdate). With user-friendly software, you could offer timestamping for free and make your money with AdSense on your validation pages. It's funny, because this was a back-burner project I was planning on working on this morning. But this thread led me to check the patent situation more closely, and it seems to this layman that Surety's remaining patent claims are too powerful. -Matt Jensen http://mattjensen.com Seattle > Russell Turpin wrote: > > Long ago, I thought some site -- maybe a > > certificate source like Thawte? -- should > > provide a provable timestamping service > > over the web. The basic idea is that when > > an application wants to timestamp some > > item, such as an entry in QuickBooks or > > an executed PDF or whatever, it would > > (1) generate a signature of the item, > > using SHA1 or the favorite hash function > > du jour, (2) then post a request to the > > timestamp site with the signature, > > (3) in the hope of receiving (a) a global > > timestamp and (b) a validation signature > > of the timestamp and item signature. > > > > The website also would maintain a > > globally accessible log, by time, of what > > validation signatures it had generated. > > These provide independent proof if > > ever needed that the item was indeed > > timestamped -- and hence, existed -- > > when claimed. > > > > It seems to me that this would be useful > > for a broad range of applications, from > > bookkeepping to facility monitoring. I > > can imagine all sorts of reasons for wanting > > a verified timestamp, from the legal to > > the mundane. Is anyone doing this? > > > > > > _______________________________________________ > > FoRK mailing list > > http://xent.com/mailman/listinfo/fork > > > > _______________________________________________ > FoRK mailing list > http://xent.com/mailman/listinfo/fork > _______________________________________________ FoRK mailing list http://xent.com/mailman/listinfo/fork ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From yoxvem at prodigy.net Sun May 8 08:54:30 2005 From: yoxvem at prodigy.net (Estelle Holmes) Date: Sun, 08 May 2005 09:54:30 -0600 Subject: GET SOFT TAB NOW architectural Message-ID: <200505081456.j48EuaV0003029@positron.jfet.org> Get a capable html e-mailer -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1629 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: pujnv.JPEG Type: image/jpeg Size: 9037 bytes Desc: not available URL: From emsvk at web.de Sun May 8 03:40:03 2005 From: emsvk at web.de (Chi Guerrero) Date: Sun, 08 May 2005 11:40:03 +0100 Subject: Greetings Message-ID: <611078935053.NAC74858@funny.cnetech.com> But some aid groups expressed concern that the move came too quickly, as tens of thousands of survivors from the Dec. 26 tsunami that struck a dozen nations were still in need of food aid and shelter -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7800 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: crimson89.gif Type: image/gif Size: 4757 bytes Desc: not available URL: From HKRDAP at mehico.com Sun May 8 06:13:05 2005 From: HKRDAP at mehico.com (Chuck Lovell) Date: Sun, 08 May 2005 12:13:05 -0100 Subject: Be her hero in bed! Message-ID: <11D6-8A1D4400E4C59064@apple20.mhpcc.edu> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 729 bytes Desc: not available URL: From steve49152 at yahoo.ca Sun May 8 09:23:18 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Sun, 8 May 2005 12:23:18 -0400 (EDT) Subject: Stash Burn? In-Reply-To: 6667 Message-ID: <20050508162318.58736.qmail@web51801.mail.yahoo.com> --- "A.Melon" wrote: > --- Steve Thompson scribbled: > > --- Tyler Durden wrote: [incinerating the evidence] > > > What's wrong with this idea? > > The Alabama hillbilly remains free to harass you the next time > you pass through the area. Don't you think it's a little insensitive to stereotype pigs in that particular way? What if they were to read this online and somehow link it to your real name? > > Who gives a shit? Much better to pay off the cops ahead of time so > they > > won't inconvenience your criminal activities. > > Do you pay off every cop in the US or merely every cop within > twenty miles of your drug route? Whatever it takes, of course. But in practice, there are minimising techniques that will tend to reduce the requirement of paying off every pig in the continental US of A. For instance, if you have the means you might choose to establish a culture of privilage and exclusivity (perhaps via allocating scarce 'access') among the pig population in which the payoffs are only given to pigs who demonstrate loyalty to your drug empire over time. Various selection criterion would apply: don't ask, don't tell; not too greedy; length of service; consistent and courteous attitude. Rookie pigs would have a file opened, and their service record updated each time they interact with your drug cartel's employees. After some arbitrary period, or after the accumulation of enough 'points', pigs would start receiving cash payoffs and perhaps other perqs. As you might imagine, there would need be a detailed and sophisticated system described in order to make for a complete system, and I do not propose to make an exhaustive list of requirements here. I simply think that it could be done if your organisation was sufficiently competent. > SOP is to drive unregistered or stolen cars with license removed. > Keep a fake "new car" paper license in the rear windshield. With > no way to connect you to the vehicle, response to a traffic stop > should be obvious. No need to stop the car if you have a > passenger and a few scoped and unscoped battle rifles. Sunroof > optional but recommended. Be prepared to repaint the car. Sure. > It is unnecessary to have a belt-fed AR or m249 with several > thousand rounds mounted in the trunk facing backwards. Using a > turn signal or windshield wiper lever to aim is awkward, and so > is explaining away bullet holes in tail lights when you're pulled > over for that later. I confess that I don't really understand the obsessive preoccupation you people have with firearms. They have their place, of course, as everyone understands the occasional necessity of a well-placed load of number-four buckshot (to the knees, usually), but guns are above all else, a tool. And they aren't the only tool in the arsenel. Far too many people are sidetracked in this way, however, and it's a shame. Just once, can't we have a nice polite discussion about the logicstics and planning side of large criminal enterprise? Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From steve49152 at yahoo.ca Sun May 8 09:46:46 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Sun, 8 May 2005 12:46:46 -0400 (EDT) Subject: zombied ypherpunks (Re: Email Certification?) In-Reply-To: 6667 Message-ID: <20050508164647.54980.qmail@web51806.mail.yahoo.com> --- Anonymous wrote: > > > And then, of course, in the off chance they can't actually break the > > > message under that flag, they can merely send a guy out with > > > binoculars or whatever. > > > Don't forget about rubber-hose cryptanlysis. Rumour has it that > > method is preferred in many cases since it makes the code-breakers > > feel good by way of testosterone release. > > Guns. You may not be able to kill them, but you may be able to force > them to kill you. If they're using rubber hoses, they're probably going to kill you anyways. Hoses leave marks, of course, and if there's one thing a spook hates, it is leaving evidence of his or her passage. Unless his or her mission is about leaving visible traces, of course. Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From eugen at leitl.org Sun May 8 06:36:19 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 8 May 2005 15:36:19 +0200 Subject: UK to lnstall Wireless Mics on London Streets Message-ID: <20050508133618.GS1433@leitl.org> Link: http://slashdot.org/article.pl?sid=05/05/07/187218 Posted by: timothy, on 2005-05-08 09:47:00 from the no-sir-that's-not-at-all-disturbing-no-sir dept. johnthorensen writes "Looks like parts of London [1]may be seeing wireless microphones on the street sometime soon. At this point, they're looking to use them to monitor noise ordinance violations - if you call about a repeated disturbance, they'll mount one by your place to monitor noise levels for the next several days. The article also notes that they intend to locate them more permanently outside bars and nightclubs. The microphones apparently communicate via wireless Internet connection, although no real details are given as to the nature of said connection. Are London residents getting the boiled frog treatment?" References 1. http://www.thisislondon.com/news/articles/18329652?source=Evening%20Standard ----- End forwarded message ----- Microphones to catch noisy neighbours By Mark Prigg, Science Correspondent, Evening Standard 3 May 2005 Noisy neighbours have become a scourge of modern life, resulting in stress, sleepless nights and even violence. Now Westminster Council hopes a new wireless microphone could help tackle the problem. It plans to attach the device to lamp posts outside houses, allowing inspectors to monitor sound levels. If neighbours make too much noise, council officials will b This could make a really big difference to cutting down on noise,b said Steve Harrison of Westminster Council. b At the moment the problem is that by the time a noise protection officer arrives on the scene, the noise may have stopped. b Using the new system, we can leave a monitor in an area for several days. The idea is that we can pre-empt people having to call us b if the monitor hears a disturbance it lets us know.b Mr Harrison added that the microphones were also going to be placed outside bars and clubs to monitor noise levels and any disturbances. The microphones, which communicate via an internet connection, will be attached to lamp posts across Soho to test the system for the next few months. b Eventually this wireless network will cover the whole of Westminster and be used by workers wherever they are,b said Mr Harrison. b Noise monitoring and CCTV are just two of the initial applications, and the great advantage is that we can move these sensors to wherever they are needed.b Westminster operates a 24-hour noise helpline with a team of inspectors who can issue onthespot fines to offenders. But inspectors had to be in the right placeat the right time for this method to work, said Mr Harrison. Anti-noise groups today welcomed the initiative. b This is potentially a big step forward and really could help,b said Mary Stevens of the National Society for Clean Air and Environmental Protection (NSCA). b In a city like London noise is a real problem, and is making peoplebs lives miserable. b Wooden floors, dogs and music all contribute, and over time it can really affect people. It starts out with a lack of sleep, but can lead to retaliation attacks and serious health problems.b Nearly a third of people in Britain are annoyed by noisy neighbours, and for 14 per cent it has an impact on quality of life, recent research found. Ms Stevens advised people to approach the offenders first. b Itbs obviously a delicate situation, but the majority of problems can be solved by simplytalking to the offender,b she says. b If that fails, call the local authorities.b According to the NSCA, the top five noise complaints are loud music, alarms, dogs barking, fireworks and hard flooring. -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From mv at cdc.gov Sun May 8 17:25:15 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Sun, 08 May 2005 17:25:15 -0700 Subject: Pi: Less Random Than We Thought Message-ID: <427EADEB.5BC2E95@cdc.gov> At 03:55 PM 5/6/05 -0400, Tyler Durden wrote: >Yes, but only provided the universe lasts long enough for those digits to be >computed! >-TD Actually, a few years ago someone discovered an algorithm for the Nth (hex) digit of Pi which doesn't require computing all the previous digits. Mind blowing. From bankgirolotterijlbrgxqh at euromail.net Sun May 8 17:57:57 2005 From: bankgirolotterijlbrgxqh at euromail.net (BANK GIRO LOTTERY) Date: Sun, 08 May 2005 18:57:57 -0600 Subject: AWARD NOTIFICATION! Message-ID: <3bbd01c553ff$d9223230$cc27f7cc@bankgirolotterijlbrgxqh> BANK GIRO LOTERIJ. INTERNATIONAL PROMOTION PROGRAM EGGER-STRAAT N� 21 28089 AMSTERDAM NETHERLAND FROM: THE DIRECTOR OF PROMOTIONS INTERNATIONAL PROMOTION DEPT. SECURITY FILE NO:DL/99621/A11. REF: IPL/4249859609/WP1. BATCH: GL/91663/A. We are pleased to inform you of the announcement today 8th of May 2005, of winners of the BANK GIRO LOTERIJ INTERNATIONAL PROMOTION PROGRAMS held on 27 DECEMBER ,2004. Your email address attached to ticket number 023-56678230954, drew the lucky numbers 7-14-21-42-49-59, batch number GL/91663/A and consequently won the lottery in the 1st category. You have therefore been approved of a lump sum pay out of EURO 850.000.00 (Eight Hundred and Fifty Thousand Euro) in credited to file LOTTERY REF NO.IPL/4249859609/WL1 This is from total prize money of Euro 20,000,000.00 shared among the seventeen international winners in categories C with serial number: IL/FLW/12-C033721192.All participants were selected through a computer ballot system drawn form 25,000 company email addresses and 30,000,000 individual email addresses from Australia, Africa, New Zealand, America, Europe, North America and Asia as part of International Promotions Program, which is conducted annually. CONGRATULATIONS! Your fund is now in custody of a financial Security company insured in your FILE REFERENCE. Due to the mix up of some numbers and names, we ask that you keep this award strictly from public notice until your claim has been processed and your money remitted to your account. This is part of our security protocol to avoid double claiming or unscrupulous acts by participants of this program. This lottery program was promoted by our group of philanthropist here in Netherlands. We hope with a part of you prize, you Will participate in our end of year high stakes EURO 5,000,000 million International Lottery. To file for your claim, please contact our fiduciary agent: THOMAS BROWN Phone: +31-641288961. Fax: +31-847440417. Email: thomasbrm at corporation.net Please be aware that your Paying Authority will Effect Payment Swiftly upon satisfactory Report, verifications and validation provided by our processing Agent; that would be designated to your file. For due processing and remittance of your winning prize to your designated account of your choice. Be informed that all prize money must be claimed not later than 10th of June 2005. After this date, all funds will be returned as unclaimed. NOTE: In order to avoid unnecessary delays and complications, you are to contact Mr. Thomas Brown with followings details below: 1. Your full names, telephone, contact address and 2. quote your reference/batch numbers in any correspondences with us or our designated agent. Furthermore, should there be any change of your address, do inform your claims agent as soon as possible. Congratulations once again from our team of staff and thank you for being part of our promotional Program. Yours sincerely, Ms,Mary Boer DIRECTOR OF PROMOTION. N.B. Any breach of confidentiality on the part of the winners will result to disqualification From eugen at leitl.org Sun May 8 11:41:28 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 8 May 2005 20:41:28 +0200 Subject: [FoRK] Does the web have a public timestamper? (fwd from mattj@newsblip.com) Message-ID: <20050508184128.GX1433@leitl.org> ----- Forwarded message from Matt Jensen ----- From jtrjtrjtr2001 at yahoo.com Mon May 9 06:00:58 2005 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Mon, 9 May 2005 06:00:58 -0700 (PDT) Subject: Zero knowledge( a>b ) In-Reply-To: <427EADEB.5BC2E95@cdc.gov> Message-ID: <20050509130058.41661.qmail@web21208.mail.yahoo.com> hi, If user A has the integer a and user B has the integer b, can a zero knowledge proof be developed to show that a>b,a Hi there br0 : feeL the pOwer V.i*C'o'P'R.o'F.E,N 7.5/200 m'gg 3o P|llS 119.00 60 P|LLS 229.95 90 P1LlS 339.o0 learn M0re : http://birch.klipsandbracks.com/index.html Same Day Shipp!ng e,x,t'r.a,c.t : http://cheryl.klipsandbracks.com/tx best regards, Terra Kent Steward CENTRAL OPTICAL WORKS, AMBALA, India Phone: 912-611-7481 Mobile: 531-212-8411 Email: jgbljzhwvim at dragoncon.net your reply to this confirmation message is not needed This package is a 02 month definite package NOTES: The contents of this note is for comprehension and should not be comprehension cohere arose women connotative Time: Mon, 09 May 2005 14:30:58 +0200 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1068 bytes Desc: not available URL: From cyphrpunk at gmail.com Mon May 9 12:13:18 2005 From: cyphrpunk at gmail.com (cypherpunk) Date: Mon, 9 May 2005 12:13:18 -0700 Subject: [Politech] Passport RFID tracking: a between-the-lines read [priv] (fwd from declan@well.com) In-Reply-To: <20050504085745.GK6782@leitl.org> References: <20050504085745.GK6782@leitl.org> Message-ID: <792ce437050509121379fb60f1@mail.gmail.com> A Politech article forwarded email from a liar named : > >From the EE-Times, a between the lines look at the future of RFID tracking: > > re: E-passport makers hail U.S. retreat > > Junko Yoshida [FAIR USE] > EE Times > (04/29/2005 1:38 PM EDT) > > PARIS - Global electronic passports suppliers hailed a decision by the U.S. > State Department to drop a requirement for additional security measures in > next-generation U.S. passports. The specifications have yet to be finalized. > > Neville Pattinson, director of technology development and government > affairs for smart card provider Axalto Americas, said Friday (April 29) > that adding security measures such as "Basic Access Control" and a metallic > shield cover to U.S. passports could "completely make the information > [stored in the e-passport] undetectable." http://www.eetimes.com/news/latest/business/showArticle.jhtml?articleID=162100152 is the actual EE times article. The true article reads, as you can see for yourself: "PARIS  Global electronic passports suppliers hailed a decision by the U.S. State Department to add a requirement for additional security measures in next-generation U.S. passports. The specifications have yet to be finalized." Can you see the difference? What's wrong with this picture? The true article says that the U.S. will ADD a requirement for additional security measures. The article as quoted by liar Parks had been changed to say that the U.S. will DROP the requirement. Of course that made the article read as confused and inconsistent, which is what led me to track down the original. I'm pissed at Parks for lying and editing a supposedly forwarded article to make some kind of rhetorical point. He had his own comments interspersed among the article's supposed text so he had plenty of opportunity to make his own arguments. Altering the text of material you are quoting is the lowest of despicable argumentation techniques. I'm also pissed at McCullagh for forwarding this on without the slightest fact checking. Of course anyone familiar with his work will know better than to expect a correction or even acknowledgement of his error. He is a hack reporter who cares nothing about accuracy or truth, only on stirring things up and pushing the predictable buttons of his readers. And of course there is Eugen* Leitl, who mindlessly forwards far and wide everything that enters his mailbox. I don't know whether we should be annoyed or relieved that he fails to exercise the slightest editorial effort by adding his own thoughts, if he has any, to the material he passes around. CP From cyphrpunk at gmail.com Mon May 9 12:22:22 2005 From: cyphrpunk at gmail.com (cypherpunk) Date: Mon, 9 May 2005 12:22:22 -0700 Subject: [IP] Real ID = National ID (fwd from dave@farber.net) In-Reply-To: <20050504172158.GA6782@leitl.org> References: <20050504172158.GA6782@leitl.org> Message-ID: <792ce437050509122249cbc9f3@mail.gmail.com> We already have de facto national ID in the form of our state driver's licenses. They are accepted at face value at all 50 states as well as by the federal government. Real ID would rationalize the issuing procedures and require a certain minimum of verification. Without it we have security that is only as strong as the weakest state's policies. CP From adam at cypherspace.org Mon May 9 09:28:25 2005 From: adam at cypherspace.org (Adam Back) Date: Mon, 9 May 2005 12:28:25 -0400 Subject: Zero knowledge( a>b ) In-Reply-To: <20050509130058.41661.qmail@web21208.mail.yahoo.com> References: <427EADEB.5BC2E95@cdc.gov> <20050509130058.41661.qmail@web21208.mail.yahoo.com> Message-ID: <20050509162825.GA10428@bitchcake.off.net> There is a simple protocol for this described in Schneier's Applied Crypto if you have one handy... (If I recall the application he illustrates with is: it allows two people to securely compare salary (which is larger) without either party divulging their specific salary to each other or to a trusted intermediary). Adam On Mon, May 09, 2005 at 06:00:58AM -0700, Sarad AV wrote: > hi, > > If user A has the integer a and user B has the integer > b, can a zero knowledge proof be developed to show > that a>b,ab ) In-Reply-To: <20050509130058.41661.qmail@web21208.mail.yahoo.com> References: <427EADEB.5BC2E95@cdc.gov> <20050509130058.41661.qmail@web21208.mail.yahoo.com> Message-ID: <792ce43705050912351f0aef4c@mail.gmail.com> On 5/9/05, Sarad AV wrote: > If user A has the integer a and user B has the integer > b, can a zero knowledge proof be developed to show > that a>b,a HIDDEN GEM - NEW 0PPORTUNITY INVEST0R ALERT (4/19/O5) The Children�s Internet, Inc. (CITCE.OB) NEAR TERM PRICE PR0J: $10 SHARES 0UTSTANDING: 26,578,138 MARKET CAP: $81,OO0,000 In January '05 Blue Horeshoe loved report #45 (SNSTA.OB) at a price of $7 per share. SNSTA reached a high of $42 per share in just a few weeks a gain of over 600%. The featured stock in this report is (CITCE.OB) Blue horseshoe loves report # 46 (CITCE.0B) A FEW REASONS TO 0WN CITCE: - CITCE is piosed for explosive growth in the internet technology sector - CITCE recently received critical acclaim by PC Magazine rated higher than the competitive offerings of A0L,Earthlink and MSN, winning the prestigious �Editors� Choice� award over all the competition landing them a spot on the cover - 2:1 Forward split effective 3/7/2OO5 total shares outstanding post-split 26,578,138" - Market cap as of March 17th, 2O05 of approximately $50 million - The creator of The Children�s Internet software, and its licensor, is Two Dog Net, Inc. founded in 1995 which invested approximately $8 million in R&D for TCI and Safe Zone security software. - TCI forecasts it will achieve positive cash flow and profitability within one year, and have 333,OO0 paying subscribers at the end of its first year of operations. - 85% of all parents with children fewer than 11 years of age have expressed concern for their child�s internet safety and 45% of all parents feel the Internet is critical for educational purposes. - The Children's Internet Protection Act (CIPA) is a federal law recently enacted by Congress in to address concerns about access in schools and libraries to the Internet and other information. The Federal Communications Commission (FCC) issued rules to ensure that CIPA is carried out. - Five million subscribers (10% of the domestic universe) generate approximately $30O million in annual net revenues to TCI. AB0UT CITCE: The Children�s Internet, Inc. (TCI) is the exclusive world-wide marketer and distributor of The Children�s Internet�, a one of a kind, SAFE online service offering secure, real time access to pre-selected, pre-approved, age-appropriate educational and entertaining web sites for children pre-school through junior high. The Children�s Internet provides a child with a rich array of easy to use applications, including secure e-mail, homework help, games, news, learning activities and virtually limitless educational resources all within its 10O% safe, predator-free online community protected by the patent-pending, proprietary Safe Zone Technology�. The Children�s Internet� gives parents the best solution available today which lets their child enjoy the tremendous educational and entertaining benefits of the Internet without encountering elements that could destroy their innocence forever. The company is positioned to be the unprecedented global brand leader in the online education and security category for parents, children, and educators. Equally important, not only is the product secure, The Children�s Internet� meets the highest educational standards while meeting every child�s desire for independence, fun, creativity, and adventure. With �Disneyesque� characteristics, its interactive tools give kids everything they need to succeed in today�s world. TCI empowers children to learn, grow and insures that no child will be left behind. VALUATION: KEEP A REAL CLOSE EYE ON CITCE, AS ONE NEVER KN0WS WHEN A SLEEPING GIANT WILL BE AWAKENED! AS ALWAYS WATCH THIS STOCK TRADE!!! C0NCLUSI0N: Like many exciting opportunities that we uncover, CITCE is a company whose primary business activity is software & technology. We believe that good things could happen including a higher market capitalization and potential rapid stock price appreciation, as the investing public becomes more aware of CITCE�s potential. If you wish to stop future mailings, please mail to news_let3@ yahoo.com From measl at mfn.org Mon May 9 17:46:34 2005 From: measl at mfn.org (J.A. Terranson) Date: Mon, 9 May 2005 19:46:34 -0500 (CDT) Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th (fwd) Message-ID: <20050509194628.H32459@ubzr.zsa.bet> ---------- Forwarded message ---------- Date: Mon, 9 May 2005 17:45:35 -0700 (PDT) From: marc guttman Reply-To: rationalchatter at yahoogroups.com To: rationalchatter at yahoogroups.com, thefamilyguttman at yahoogroups.com Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th This is an interesting trial. Men with guns. Tessa and Larken Rose may be sent to jail. Watch 3 min. - video - http://www.861.info/tessa.html Trial starts July 11th. There is a petition to encourage that it be videotaped. --------------------------------- Yahoo! Mail Stay connected, organized, and protected. Take the tour From justin-cypherpunks at soze.net Mon May 9 12:53:37 2005 From: justin-cypherpunks at soze.net (Justin) Date: Mon, 9 May 2005 19:53:37 +0000 Subject: Zero knowledge( a>b ) In-Reply-To: <20050509162825.GA10428@bitchcake.off.net> References: <427EADEB.5BC2E95@cdc.gov> <20050509130058.41661.qmail@web21208.mail.yahoo.com> <20050509162825.GA10428@bitchcake.off.net> Message-ID: <20050509195337.GA15693@arion.soze.net> On 2005-05-09T12:28:25-0400, Adam Back wrote: > There is a simple protocol for this described in Schneier's Applied > Crypto if you have one handy... > > (If I recall the application he illustrates with is: it allows two > people to securely compare salary (which is larger) without either > party divulging their specific salary to each other or to a trusted > intermediary). > > Adam > > On Mon, May 09, 2005 at 06:00:58AM -0700, Sarad AV wrote: > > hi, > > > > If user A has the integer a and user B has the integer > > b, can a zero knowledge proof be developed to show > > that a>b,a References: <20050504172158.GA6782@leitl.org> <792ce437050509122249cbc9f3@mail.gmail.com> Message-ID: <20050509195526.GB15693@arion.soze.net> On 2005-05-09T12:22:22-0700, cypherpunk wrote: > We already have de facto national ID in the form of our state driver's > licenses. They are accepted at face value at all 50 states as well as > by the federal government. Real ID would rationalize the issuing > procedures and require a certain minimum of verification. Without it > we have security that is only as strong as the weakest state's > policies. States should be free to regulate DRIVERS however they want. The DL was not meant to be an ID card, and if it was that intent was unconstitutional. The entire DL scheme may be unconstitutional anyway, but oh well. What do we need "security" for? We need security because a lot of people hate the U.S., and because we won't close our borders, and because society has become too diverse. There is a significant correlation between cultural diversity/proximity and social unrest. That does not require people of different races; put white klansmen next to white members of the Black Panthers and you have the same thing. None of those three core problems will be solved by RealID. Therefore, while RealID may make some difference at the margins, it cannot be very effective. From camera_lumina at hotmail.com Mon May 9 18:11:47 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 09 May 2005 21:11:47 -0400 Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th (fwd) In-Reply-To: <20050509194628.H32459@ubzr.zsa.bet> Message-ID: Man, that chic's a little dizzy. Good sweater meat, though. -TD >From: "J.A. Terranson" >To: "cypherpunks at al-qaeda.net" >Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th (fwd) >Date: Mon, 9 May 2005 19:46:34 -0500 (CDT) > >---------- Forwarded message ---------- >Date: Mon, 9 May 2005 17:45:35 -0700 (PDT) >From: marc guttman >Reply-To: rationalchatter at yahoogroups.com >To: rationalchatter at yahoogroups.com, thefamilyguttman at yahoogroups.com >Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th > >This is an interesting trial. Men with guns. > >Tessa and Larken Rose may be sent to jail. > >Watch 3 min. - video - http://www.861.info/tessa.html > >Trial starts July 11th. There is a petition to encourage that it be >videotaped. > > > > >--------------------------------- >Yahoo! Mail > Stay connected, organized, and protected. Take the tour From camera_lumina at hotmail.com Mon May 9 18:14:50 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Mon, 09 May 2005 21:14:50 -0400 Subject: [Politech] Passport RFID tracking: a between-the-lines read [priv] (fwd from declan@well.com) In-Reply-To: <20050509220133.GH1433@leitl.org> Message-ID: I dunno...I don't see a ton of Leitl stuff on the al-qaeda node. That which does come through seems fairly relevant. I'm thinking Choate and RAH are tsk-ing his failed attempt at pure stream-of-consciousness posting. -TD >From: Eugen Leitl >To: cypherpunks at al-qaeda.net >Subject: Re: [Politech] Passport RFID tracking: a between-the-lines read >[priv] (fwd from declan at well.com) >Date: Tue, 10 May 2005 00:01:33 +0200 > >On Mon, May 09, 2005 at 12:13:18PM -0700, cypherpunk wrote: > > > And of course there is Eugen* Leitl, who mindlessly forwards far and > > wide everything that enters his mailbox. I don't know whether we > >Consider me bitten by Choate. It's totally incurable. > > > should be annoyed or relieved that he fails to exercise the slightest > > editorial effort by adding his own thoughts, if he has any, to the > > material he passes around. > >I don't need the list. Goddamn heise has more cypherpunk content than the >list. Tim May's tired trolls have more cypherpunk content than the list. > >I'm trying to keep it going by keeping a steady trickle of relevant info >but >I'm honestly wondering if it's worth the effort. > >If you think I'm going to add editing effort, thus cutting some 10 minutes >out >of >my already busy day you're out of your fucking mind. > >If you want high quality content, post it yourself. > >-- >Eugen* Leitl leitl >______________________________________________________________ >ICBM: 48.07078, 11.61144 http://www.leitl.org >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE >http://moleculardevices.org http://nanomachines.net > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From DRAGDEPCOCRBX at abnormalbehaviorchild.com Mon May 9 16:38:49 2005 From: DRAGDEPCOCRBX at abnormalbehaviorchild.com (Tracy North) Date: Mon, 09 May 2005 21:38:49 -0200 Subject: Start shagging more frequently with the wonder pill Message-ID: <1026622284.839.1.camel@azrael> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 753 bytes Desc: not available URL: From justin-cypherpunks at soze.net Mon May 9 15:24:05 2005 From: justin-cypherpunks at soze.net (Justin) Date: Mon, 9 May 2005 22:24:05 +0000 Subject: [IP] Real ID = National ID (fwd from dave@farber.net) In-Reply-To: <20050509195526.GB15693@arion.soze.net> References: <20050504172158.GA6782@leitl.org> <792ce437050509122249cbc9f3@mail.gmail.com> <20050509195526.GB15693@arion.soze.net> Message-ID: <20050509222405.GA16520@arion.soze.net> On 2005-05-09T19:55:26+0000, Justin wrote: > What do we need "security" for? We need security because a lot of > people hate the U.S., and because we won't close our borders, and Apparently I have not learned any lessons from the follies of a certain California governor. By close the borders, I mean secure the borders against illegal immigration. I have no interest in doing away with immigration. From eugen at leitl.org Mon May 9 15:01:33 2005 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 10 May 2005 00:01:33 +0200 Subject: [Politech] Passport RFID tracking: a between-the-lines read [priv] (fwd from declan@well.com) In-Reply-To: <792ce437050509121379fb60f1@mail.gmail.com> References: <20050504085745.GK6782@leitl.org> <792ce437050509121379fb60f1@mail.gmail.com> Message-ID: <20050509220133.GH1433@leitl.org> On Mon, May 09, 2005 at 12:13:18PM -0700, cypherpunk wrote: > And of course there is Eugen* Leitl, who mindlessly forwards far and > wide everything that enters his mailbox. I don't know whether we Consider me bitten by Choate. It's totally incurable. > should be annoyed or relieved that he fails to exercise the slightest > editorial effort by adding his own thoughts, if he has any, to the > material he passes around. I don't need the list. Goddamn heise has more cypherpunk content than the list. Tim May's tired trolls have more cypherpunk content than the list. I'm trying to keep it going by keeping a steady trickle of relevant info but I'm honestly wondering if it's worth the effort. If you think I'm going to add editing effort, thus cutting some 10 minutes out of my already busy day you're out of your fucking mind. If you want high quality content, post it yourself. -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07078, 11.61144 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE http://moleculardevices.org http://nanomachines.net [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From MNADBRPBU at msn.com Mon May 9 18:30:59 2005 From: MNADBRPBU at msn.com (Maria Pitts) Date: Tue, 10 May 2005 02:30:59 +0100 Subject: Software Stores Clearance Sale jK Message-ID: <389z7fzlsc.fsf@calle24.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 257 bytes Desc: not available URL: From measl at mfn.org Tue May 10 06:53:31 2005 From: measl at mfn.org (J.A. Terranson) Date: Tue, 10 May 2005 08:53:31 -0500 (CDT) Subject: Jesus Christ Meets "Your Papers Please" (fwd) Message-ID: <20050510085320.M32459@ubzr.zsa.bet> If you think this is stupid, just wait till the "Real ID Act" takes effect. -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF "What this country needs is a good old fashioned nuclear enema." http://www.cnn.com/2005/LAW/05/10/jesus.lawsuit.ap/index.html Jesus Christ in legal battle to get license Tuesday, May 10, 2005 Posted: 7:58 AM EDT (1158 GMT) CHARLESTON, West Virginia (AP) -- Even Jesus Christ can't circumvent the rules for getting a driver's license in West Virginia. Attempts to prove his name really is Christ have led the man born as Peter Robert Phillips Jr. through a lengthy legal battle and a recent victory in the District of Columbia Court of Appeals. "This all started with him expressing his faith and his respect and love for Jesus Christ," attorney A.P. Pishevar told The Associated Press. "Now he needs to document it for legal reasons." Described by his attorney as a white-haired businessman in his mid-50s, Christ is moving to West Virginia to enjoy a slower lifestyle. He bought property near Lost River, about 100 miles west of Washington, and has a U.S. passport, Social Security card and Washington driver's license bearing the name Jesus Christ. But he still falls short of West Virginia title and license transfer requirements because his Florida birth certificate has his original name on it and he has been unable to obtain an official name change in Washington. "We just need official documentation that that's his name," said Doug Stump, commissioner of the West Virginia Division of Motor Vehicles. "He will be treated no different than anybody else." Christ applied for the legal name change in May 2003, but it was denied by District of Columbia Superior Court Judge Tim Murphy because "taking the name of Jesus Christ may provoke a violent reaction or may significantly offend people." In his appeal, Christ's attorney argued that Phillips had changed his name to Jesus Christ 15 years earlier, and "has been using the name since then without incident." The appeals court last month sent the name-change proposal back to the lower court, saying some required hearings in the case had not been held. Any comment from the man in the middle of this legal tussle? "Christ is not speaking to the press at this time," Pishevar said. From camera_lumina at hotmail.com Tue May 10 09:03:06 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 10 May 2005 12:03:06 -0400 Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th (fwd) In-Reply-To: Message-ID: Yeah...it's pretty fuckin' pointless. Tantamount to proving a guy pointing a gun at you is actually pointing a gun at you, TO the guy pointing the gun at you. -TD >From: "Gil Hamilton" >To: cypherpunks at al-qaeda.net >Subject: Re: [rationalchatter] Interesting Trial - IRS trial - July 11th >(fwd) >Date: Tue, 10 May 2005 12:40:17 +0000 > >>---------- Forwarded message ---------- >>Date: Mon, 9 May 2005 17:45:35 -0700 (PDT) >>From: marc guttman >>Reply-To: rationalchatter at yahoogroups.com >>To: rationalchatter at yahoogroups.com, thefamilyguttman at yahoogroups.com >>Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th >> >>This is an interesting trial. Men with guns. >> >>Tessa and Larken Rose may be sent to jail. >> >>Watch 3 min. - video - http://www.861.info/tessa.html >> >>Trial starts July 11th. There is a petition to encourage that it be >>videotaped. > >While anyone can empathize with their desire not to pay taxes and >many of us can even disagree with the moral justification for taxes, >these people are idiots. Their entire case boils down to quibbles >over arguably poorly worded regulations. And even if you take their >argument at face value, if you go read the sections of the Code of >Federal Regulations they cite, they're just plain wrong: they're willfully >misreading the plain language of the regulations. (Okay, "plain >language" is probably not the right phrase to apply to any part of >the CFR, but...) > >They're definitely going down; probably to jail, but at the least they'll >be subject to massive fines, property seizures, etc. > >"Nothing to see here, folks; move along." > >GH > >_________________________________________________________________ >Express yourself instantly with MSN Messenger! Download today - it's FREE! >http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/ From gil_hamilton at hotmail.com Tue May 10 05:40:17 2005 From: gil_hamilton at hotmail.com (Gil Hamilton) Date: Tue, 10 May 2005 12:40:17 +0000 Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th (fwd) Message-ID: >---------- Forwarded message ---------- >Date: Mon, 9 May 2005 17:45:35 -0700 (PDT) >From: marc guttman >Reply-To: rationalchatter at yahoogroups.com >To: rationalchatter at yahoogroups.com, thefamilyguttman at yahoogroups.com >Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th > >This is an interesting trial. Men with guns. > >Tessa and Larken Rose may be sent to jail. > >Watch 3 min. - video - http://www.861.info/tessa.html > >Trial starts July 11th. There is a petition to encourage that it be >videotaped. While anyone can empathize with their desire not to pay taxes and many of us can even disagree with the moral justification for taxes, these people are idiots. Their entire case boils down to quibbles over arguably poorly worded regulations. And even if you take their argument at face value, if you go read the sections of the Code of Federal Regulations they cite, they're just plain wrong: they're willfully misreading the plain language of the regulations. (Okay, "plain language" is probably not the right phrase to apply to any part of the CFR, but...) They're definitely going down; probably to jail, but at the least they'll be subject to massive fines, property seizures, etc. "Nothing to see here, folks; move along." GH _________________________________________________________________ Express yourself instantly with MSN Messenger! Download today - it's FREE! http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/ From justin-cypherpunks at soze.net Tue May 10 12:19:06 2005 From: justin-cypherpunks at soze.net (Justin) Date: Tue, 10 May 2005 19:19:06 +0000 Subject: Jesus Christ Meets "Your Papers Please" (fwd) In-Reply-To: <20050510085320.M32459@ubzr.zsa.bet> References: <20050510085320.M32459@ubzr.zsa.bet> Message-ID: <20050510191906.GA24814@arion.soze.net> On 2005-05-10T08:53:31-0500, J.A. Terranson wrote: > If you think this is stupid, just wait till the "Real ID Act" takes > effect. There is already a Jesus Christ living in D.C. If it's legal for someone named Jesus Christ to move to D.C., it should be legal for a D.C. resident or no-longer resident to change his name to Jesus Christ. It's not technically an equal protection issue, but it strikes me as being some sort of discrimination. That doesn't stop a lot of states from passing discriminatory laws, though, as long as the particular discrimination being sought isn't listed in the CRA. Jesus Christ - (202) 543-9498 - , Washington, DC 20001 and other states: Jesus Christ - (310) 458-9440 - 1328 Euclid St, Santa Monica, CA 90404 Jesus A Christ - (207) 374-2175 - 19 Harborview Ct, Blue Hill, ME 04614 This may be the Jesus Christ in question: Jesus Christ - (304) 897-7727 - , Lost City, WV 26810 > http://www.cnn.com/2005/LAW/05/10/jesus.lawsuit.ap/index.html > > Jesus Christ in legal battle to get license > > Tuesday, May 10, 2005 Posted: 7:58 AM EDT (1158 GMT) > > CHARLESTON, West Virginia (AP) -- Even Jesus Christ can't circumvent the > rules for getting a driver's license in West Virginia. > > ... > Described by his attorney as a white-haired businessman in his mid-50s, > Christ is moving to West Virginia to enjoy a slower lifestyle. He bought > property near Lost River, about 100 miles west of Washington, and has a > U.S. passport, Social Security card and Washington driver's license > bearing the name Jesus Christ. > > But he still falls short of West Virginia title and license transfer > requirements because his Florida birth certificate has his original name > on it and he has been unable to obtain an official name change in > Washington. I don't understand this. Washington D.C. doesn't handle birth certificates for people born in Florida. All of his federal documentation lists Jesus Christ as his name. Why is the problem in D.C.? It seems to me to be a little late for the brainless in Washington to try to put a lid on this. They should have done that when he got his SS card, passport, or driver's license. I'm somewhat interested in how he got his SS card, passport, and drivers license in a different name than was on his birth certificate. If he's only been using the name for 17 years, that puts both acquisitions at 1988 or later. Maybe decades before that it would have been possible, but how could he have gotten away with it so recently? From kelsey.j at ix.netcom.com Wed May 11 07:45:17 2005 From: kelsey.j at ix.netcom.com (John Kelsey) Date: Wed, 11 May 2005 10:45:17 -0400 (GMT-04:00) Subject: [IP] Real ID = National ID (fwd from dave@farber.net) Message-ID: <9979982.1115822717872.JavaMail.root@scooter.psp.pas.earthlink.net> >From: Justin >Sent: May 9, 2005 3:55 PM >To: cypherpunks at al-qaeda.net >Subject: Re: [IP] Real ID = National ID (fwd from dave at farber.net) ... >What do we need "security" for? We need security because a lot of >people hate the U.S., and because we won't close our borders, and >because society has become too diverse. Drivers license security is being pursued because a bunch of people want to be able to reliably use drivers licenses as ID cards for their own purposes. That can be for TSA screening of passneger names (though I think it's fantasy to imagine that this will really prevent terrorists from flying, and it has endless creepy totalitarian uses), or for making it harder to get a bank account without submitting your true name so you get taxed and monitored, or making it easier for the folks running various "preferred shopper" card programs to make you give them the right information, or keeping you from reselling your airline tickets. (Note that the whole market segmentation/price discrimination scheme that this threatened has basically died by now, but we're still stuck with binding names to airline tickets.) >There is a significant correlation between cultural >diversity/proximity and social unrest. That does not require people >of different races; put white klansmen next to white members of the >Black Panthers and you have the same thing. This is *very* dependent on the cultures in question. For the most part, Japanese and Korean immigrants (to take a couple easy examples) make wonderful neighbors, though they're members of a different race and culture and often a different religion. On the other hand, turn of the century Irish immigrants were English-speaking Christians, but they made nightmarish neighbors. And neither of those have much to do with terrorism (as opposed to low-level crime, public drunkenness, imported criminal gangs, etc.). The Irish in the US have never been much of a terrorist threat, though things are very different in the UK! >None of those three core problems will be solved by RealID. >Therefore, while RealID may make some difference at the margins, it >cannot be very effective. Well, it depends on what your goal is. If your goal is harder-to-forge drivers licenses for all kinds of good and bad purposes, then it may help. If your goal is seriously stopping terrorism or shutting down illegal immigration, it probably won't have much of an impact. --John From gqgbpsjhcn at dantecubillas.com Wed May 11 01:16:14 2005 From: gqgbpsjhcn at dantecubillas.com (Williams Pack) Date: Wed, 11 May 2005 12:16:14 +0400 Subject: Erectile Dysfunction ruining your sex life? Message-ID: <85F743B-602065CB0118@mac.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 749 bytes Desc: not available URL: From steve49152 at yahoo.ca Wed May 11 11:51:38 2005 From: steve49152 at yahoo.ca (Steve Thompson) Date: Wed, 11 May 2005 14:51:38 -0400 (EDT) Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th (fwd) In-Reply-To: 6667 Message-ID: <20050511185138.70650.qmail@web51810.mail.yahoo.com> --- Tyler Durden wrote: > Yeah...it's pretty fuckin' pointless. Tantamount to proving a guy > pointing a > gun at you is actually pointing a gun at you, TO the guy pointing the > gun at > you. Oh, I don't know about that. What about proving that someone is pointing a [gun] at you, who has already lets you know he's pointing a [gun] at you via deniable means of some kind, but who categorically denies such when asked about it directly. In that vague scenario, I would imagine that there is some utility in proving conclusively that someone is pointing a [gun] at you if only to warn others around you about the threat. I, of course, live a similar scenario. The main difference is that it is a group with a somewhat unethical agenda that poses the threat, and who swear up and down that (a) they are all really, really nice people, and (b) that they have no actual interest in my affairs. Both assertions are quite false, but proving it is another matter -- and difficult too, given the ignorance and stupidity currently in fashion at the moment. But I don't mean to provoke an off-topic discussion in this thread. Please do carry on. Regards, Steve ______________________________________________________________________ Post your free ad now! http://personals.yahoo.ca From camera_lumina at hotmail.com Wed May 11 12:29:53 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 11 May 2005 15:29:53 -0400 Subject: Terrorist-controlled cessna nearly attacks washington In-Reply-To: Message-ID: >new terrorist target: Union Station You used a remailer for THAT?!! -TD From pqffsiabo at freehongkong.com Wed May 11 15:07:50 2005 From: pqffsiabo at freehongkong.com (Joel Forbes) Date: Wed, 11 May 2005 17:07:50 -0500 Subject: HOME & 0FF1CE Computer Software In-Reply-To: References: Message-ID: <507278548948.UQW93350@freewebemail.com>sundial.dost.com> Half price Other Microsoft software Bundle 1: WiNDoWS X.P Pro + oFFiCE X.P Pro ~ 8o$ Pirated office Software is dangerous Bundle 2: Macromedia Dreamwaver MX 2oo4 + Flash MX 2oo4 - 1oo Dollars Clearence sale: Bundle 3: Adobe Photoshop 7, Premiere 7, illustrator 1o - 12o Dollars More information: http://offset.gaulhafmk.com The offer is valid Untill May 17th Stock is limited kind regards, Clayton Padilla Herald eBioscience, San Diego, 92121, United States of America Phone: 813-477-4519 Mobile: 217-679-4431 Email: pqffsiabo at freehongkong.com THIS IS AN AUTO-GENERATED MESSAGE - PLEASE DO NOT REPLY TO THIS MESSAGE This package is a 64 hour usage shareware NOTES: The contents of this note is for comprehension and should not be quackery abigail apropos albert gallon Time: Thu, 12 May 2005 00:08:10 +0200 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1316 bytes Desc: not available URL: From bill.stewart at pobox.com Wed May 11 18:42:09 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 11 May 2005 18:42:09 -0700 Subject: Terrorist-controlled cessna nearly attacks washington In-Reply-To: References: Message-ID: <6.2.1.2.0.20050511184126.02cd2e88@pop.idiom.com> Sigh. "Terrified Student Pilot" isn't the same as "Terrorist". From mixmaster at remailer.privacy.at Wed May 11 12:19:31 2005 From: mixmaster at remailer.privacy.at (privacy.at Anonymous Remailer) Date: Wed, 11 May 2005 21:19:31 +0200 (CEST) Subject: Terrorist-controlled cessna nearly attacks washington Message-ID: http://reuters.myway.com/article/20050511/2005-05-11T173816Z_01_N11199658_RTRIDST_0_NEWS-SECURITY-WASHINGTON-DC.html > WASHINGTON (Reuters) - Fighter jets scrambled over Washington and > authorities hurriedly evacuated the White House and the U.S. Congress > on Wednesday when an unidentified plane roamed into restricted > airspace, sparking fears of a Sept. 11-style attack. > > The light private Cessna ignored calls from air traffic controllers and > entered the restricted zone around Washington, coming within 3 miles of > the Capitol before turning away, authorities said. > > The plane's approach sent at least two F-16 fighter jets into the air > over the U.S. capital and hundreds of staff and tourists into the > streets outside the Capitol building, White House and Supreme Court in > an urgent evacuation. [...] > Capitol police swiftly moved senators, aides, lobbyists and > journalists toward Union Station, about two blocks away. Police used > bullhorns to order onlookers near the Capitol to "stay away from the > building." new terrorist target: Union Station From mixmaster at remailer.privacy.at Wed May 11 15:58:47 2005 From: mixmaster at remailer.privacy.at (privacy.at Anonymous Remailer) Date: Thu, 12 May 2005 00:58:47 +0200 (CEST) Subject: Terrorist-controlled cessna nearly attacks washington In-Reply-To: Message-ID: > >new terrorist target: Union Station > > You used a remailer for THAT?!! You used a pseudonym for THAT?! From absmbzhfiry at janur.jnj.com Thu May 12 07:16:06 2005 From: absmbzhfiry at janur.jnj.com (Annie Hurd) Date: Thu, 12 May 2005 07:16:06 -0700 Subject: The mighty cucumber lives again! Message-ID: <1.69722.3132363037393934.7@ientrynetwork.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 826 bytes Desc: not available URL: From sunder at sunder.net Thu May 12 10:59:42 2005 From: sunder at sunder.net (sunder) Date: Thu, 12 May 2005 13:59:42 -0400 Subject: Terrorist-controlled cessna nearly attacks washington In-Reply-To: <6.2.1.2.0.20050511184126.02cd2e88@pop.idiom.com> References: <6.2.1.2.0.20050511184126.02cd2e88@pop.idiom.com> Message-ID: <4283998E.5070004@sunder.net> Bill Stewart wrote: > Sigh. "Terrified Student Pilot" isn't the same as "Terrorist". > Yeah, but they both start with the same four letters and sound alike, which seems to be the attention span of those who are afraid of the boogie man and consequentially imagine they see him under every rock, or bush. From berrin at redrival.net Thu May 12 15:07:12 2005 From: berrin at redrival.net (clement carpenter) Date: Thu, 12 May 2005 16:07:12 -0600 Subject: natural enlargement Message-ID: I've been using your product for 4 months now. I've increased my length from 2 inches to nearly 6 inches. Your product has saved my sex life.-Matt, FL My girlfriend loves the results, but she doesn't know what I do. She thinks it's natural-Thomas, CA Pleasure your partner every time with a bigger, longer, stronger Unit Realistic gains quickly http://vtb.a1y.madereserve.com/c/ to be a stud press here While considering this suggestion Rob remembered how at one time five pirates had clung to his left leg and been carried some distance through the air Didn't you feel the ground shake? Yes; but we're used to such things in California, he replied Have you a rope? he asked i am busy, no thank you, go above From Apple2Remailer at bigapple.dynalias.net Thu May 12 13:13:14 2005 From: Apple2Remailer at bigapple.dynalias.net (Anonymous) Date: 12 May 2005 20:13:14 -0000 Subject: Terrorist-controlled cessna nearly attacks washington Message-ID: You wrote: > >new terrorist target: Union Station > > > You used a remailer for THAT?!! So what if he did? There's no requirement that people say insignificant stuff under their real name or real alias. From pzuxz at aude.org Fri May 13 02:57:48 2005 From: pzuxz at aude.org (Ella Judd) Date: Fri, 13 May 2005 04:57:48 -0500 Subject: Sale In-Reply-To: References: Message-ID: <356538123822.WUT18349@cais.com>berkshire.worldaccessnet.com> P.C S0FTWARE 75%.OFF Unbelievable Deals like: Microsoft office X.P Pro 2oo2 ................. 6o Dollars Windows X.P Pro 2oo2 .............. 5o Dollars learn More: http://dreadnought.gaulhafmk.com We Also Have: Adobe Photoshop 7.o ............................. 6o Dollars Corel Draw 11 ................................... 6o Dollars The offer is valid Untill May 10th Stock is limited confirm your adress Bruce Acevedo Nailor ADIATEC, 44000 Nantes France, France Phone: 216-914-8374 Mobile: 277-615-7727 Email: pzuxz at aude.org THIS IS AN AUTO-GENERATED MESSAGE - PLEASE DO NOT REPLY TO THIS MESSAGE This version is a 97 month definite file NOTES: The contents of this paper is for attention and should not be conjunct cowslip formal furlough contemporary Time: Fri, 13 May 2005 11:57:40 +0200 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1369 bytes Desc: not available URL: From shytlbp at hotmail.com Fri May 13 04:05:29 2005 From: shytlbp at hotmail.com (Bethany Fields) Date: Fri, 13 May 2005 09:05:29 -0200 Subject: Via-ggra is Lousy %RANDOMCHAR Message-ID: <5294B67C.6434007@duration.peternixon.net> "Ci-ialis Softabs" is better than Pfizer Viiagrra and normal Ci-ialis because: - Guaaraantees 36 hours lasting - Safe to take, no side effects at all - Boost and increase se-xual performance - Haarder e-rectiions and quick recharge - Proven and certified by experts and doctors - only $3.99 per tabs Cllick heree: http://liverymen.com/cs/?ronn o-ut of mai-lling lisst: http://liverymen.com/rm.php?ronn %RANDOMCHAR From camera_lumina at hotmail.com Fri May 13 08:02:39 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 13 May 2005 11:02:39 -0400 Subject: Terrorist-controlled cessna nearly attacks washington In-Reply-To: Message-ID: Relax, dude. It was a joke. The point was that in the US there's hardly anyone (TLAs included) that would not have snickered at the original joke, given the brood that was holed up in Union Station. -TD >From: Anonymous >To: cypherpunks at al-qaeda.net >Subject: RE: Terrorist-controlled cessna nearly attacks washington >Date: 12 May 2005 20:13:14 -0000 > >You wrote: > > > >new terrorist target: Union Station > > > > > > You used a remailer for THAT?!! > >So what if he did? > >There's no requirement that people say insignificant stuff under their real >name or real alias. From qqsxbfsoi at free.fr Fri May 13 09:17:01 2005 From: qqsxbfsoi at free.fr (Justin Singer) Date: Fri, 13 May 2005 11:17:01 -0500 Subject: Pyongyang Review - Inspection revealing best operating system In-Reply-To: References: Message-ID: <532185981392.ECY00376@x263.net>rafael.gate99.nl> NEED A NEW OPERATING SYSTEM? Check out these amazing offers: WiNDoWS X'P Pro + oFFiCE X'P Pro >>> 8o$ MoRE HERE: http://oppenheimer.gaulhafmk.com The offer is valid Untill May 16th Stock is limited your bankofamerica account Consuelo Mcneil Censor Canadian Biotech News, Nepean, Ontario K2H 9P4, Canada Phone: 271-851-4797 Mobile: 247-344-1987 Email: qqsxbfsoi at free.fr THIS IS AN AUTO-GENERATED MESSAGE - PLEASE DO NOT REPLY TO THIS MESSAGE This shareware is a 71 day usage product NOTES: The contents of this connection is for usage and should not be evildoer dare director bodybuilding dewdrop Time: Fri, 13 May 2005 18:16:41 +0200 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1012 bytes Desc: not available URL: From fzswjcxl at newhometx.com Fri May 13 18:59:21 2005 From: fzswjcxl at newhometx.com (Sherrie Blevins) Date: Sat, 14 May 2005 02:59:21 +0100 Subject: Are you a 2 pump chump? Go all night and drive her crazy! Message-ID: <1026622284.210.1.camel@azrael> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 663 bytes Desc: not available URL: From futgnjzncwgywi at aude.org Sat May 14 03:35:43 2005 From: futgnjzncwgywi at aude.org (Helena Richmond) Date: Sat, 14 May 2005 05:35:43 -0500 Subject: Fort*de*France Reporter - paper about windows service pack 2 In-Reply-To: References: Message-ID: <095410235453.ZYO98026@funkytiger.co.uk>significant.callsign.net> Legal operating systems summer*s@|e ToP Brand Software at Low Prices such As: Bundle 1: WiNDoWS X*P Pro + oFFiCE X*P Pro for as low as 8o Dollars Get info: http://credible.gaulhafmk.com Bundle 2: Macromedia Dreamwaver MX 2oo4 + Flash MX 2oo4 - 1oo Dollars Bundle 3: Adobe Photoshop 7, Premiere 7, illustrator 1o - 12o Dollars The offer is valid Untill May 15th Stock is limited thanks Bradley Strickland Almoner CassCo-Bio, Steelville 65565, United States of America Phone: 513-573-8744 Mobile: 574-112-4128 Email: futgnjzncwgywi at aude.org please do not reply to this message This software is a 25 minute definite version NOTES: The contents of this information is for attention and should not be bessel individualism newsreel uplift ohm Time: Sat, 14 May 2005 12:35:05 +0200 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1211 bytes Desc: not available URL: From vgdgalt at gate99.nl Sat May 14 05:36:48 2005 From: vgdgalt at gate99.nl (Bruno Bryant) Date: Sat, 14 May 2005 07:36:48 -0500 Subject: Cypherpunks : Cincinnati Journal - article pertaining Sexual productivity Message-ID: <469127034001.VJW68852@c3ntris.com> Incredible Offers V,I,A,G,R,A 1oo m,g 3o PillS 59,99 Full information : viagra We Also have: U,L,T,R,A,M 1oo m,g 3o PillS 49,99 P,R,O,P,E,C,I,A 1 m,g 9o PillS 99,99 Same Day Shipping your password has expired Ora Soto Quarreler Dutch Diagnostics Human and Animal Care, Zutphen 7203 AH, Netherlands Phone: 735-482-1611 Mobile: 166-141-3281 Email: vgdgalt at gate99.nl This is a confirmation message This package is a 88 second usage product NOTES: The contents of this e-mail is for manipulation and should not be antiquity rectify brennan enos armpit Time: Sat, 14 May 2005 14:36:09 +0200 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1225 bytes Desc: not available URL: From nuhars at strechy-plus.cz Sat May 14 04:33:54 2005 From: nuhars at strechy-plus.cz (Bob Ziegler) Date: Sat, 14 May 2005 08:33:54 -0300 Subject: new, better then ever Message-ID: <750z7fzlsc.fsf@calle11.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 585 bytes Desc: not available URL: From sw-office at wolfram.com Sat May 14 07:28:14 2005 From: sw-office at wolfram.com (Stephen Wolfram) Date: Sat, 14 May 2005 09:28:14 -0500 Subject: Three Years of A New Kind of Science Message-ID: <200505141428.j4EESE89005493@mercury.wolfram.com> Today it is three years since I published my book A New Kind of Science. It seems like a lot longer than that--so much has happened in the intervening time. What started as a book is steadily emerging as a major intellectual movement with its own structure and community. The first year after the book came out was dominated by a certain amount of "paradigm shift turbulence." But by the second year, many serious projects were starting, and indicators like the publication rate of NKS-based papers began to climb. Now, in the third year, a recurring theme has been the emergence of a growing group of exceptional individuals who are planning to base their careers on NKS. There are scores of NKS-based Ph.D. theses underway, and all sorts of NKS-based corporate ventures--as well as our own growing NKS R&D operation in Boston. Later this year, the first full-length independent book based on NKS will be published, and the first independent NKS conference will be held. In late June, we will be holding our third annual NKS Summer School--for which there were a record number of exceptional applicants. We are planning to have our next major NKS conference in spring 2006; we'll be announcing the details shortly. There will also be an NKS mini-course at our Wolfram Technology Conference this October. This year I myself have mostly been in a tool-building phase, working on major new Mathematica technology that, among other things, will be very important for NKS research--and which I can't wait to use. There's a lot more in the pipeline too. We're developing plans for a new kind of publishing medium for NKS (partly based on the Complex Systems journal that I've been publishing since 1986). We're also planning later this year to start regular "live experiments," in which I'll be leading public web-conferenced explorations into the computational universe. Also in the next few months we're planning to release a rather unexpected consumer-oriented application of NKS, which I expect we'll all be hearing quite a bit about. As we begin the fourth year of NKS, I feel more optimistic than ever before about its promise--and its significance in science, technology, the arts, and beyond. It will be fascinating to see where the most important NKS-based breakthroughs come from, and what they will be. I hope you'll have the opportunity to take part in the excitement of the upcoming years of early NKS growth. -- Stephen Wolfram http://www.wolframscience.com From pantosys at gmail.com Sat May 14 16:07:17 2005 From: pantosys at gmail.com (Joseph Holsten) Date: Sat, 14 May 2005 18:07:17 -0500 Subject: /. [Dissidents Seeking Anonymous Web Solutions?] In-Reply-To: <873a03a605051416044b5a8e56@mail.gmail.com> References: <20050515175945.GQ23917@leitl.org> <873a03a605051416044b5a8e56@mail.gmail.com> Message-ID: <873a03a605051416074e38ca21@mail.gmail.com> I told him to how to find his answers and to try finding us. Let's hope he's actually motivated. -- Joseph Anthony Pasquale Holsten 5813 E 64 PL TULSA OK 74136 PANTOSYS at GMAIL.COM 857-891-7585 Eugen: oops From IJFHQJY at d3bn.nl Sat May 14 13:29:53 2005 From: IJFHQJY at d3bn.nl (April Shaw) Date: Sat, 14 May 2005 21:29:53 +0100 Subject: Boing... (the sound produced by a little pill) Message-ID: <11D6-8A1D8650E4C59064@apple20.mhpcc.edu> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 654 bytes Desc: not available URL: From julieKoch69 at papa-chico.be Sat May 14 13:44:26 2005 From: julieKoch69 at papa-chico.be (Julie Denton) Date: Sat, 14 May 2005 23:44:26 +0300 Subject: it`s julie :) Message-ID: <151.02e558d5.2a9WUK44@sol.com> I'm new, it's Julie :) Alot of the times I feel weird, even my girlfriends told me that .... old time friend suggested to put my hot videos somehow online. My website is like my new hobby :D AllCome check website I put together, I'm not that good tho with comp skills yet but tell me what you think ;0 http://www.foursamurais.com/ju18/ you wherewithal me eavesdropped me you hutchins me beresford me you dais me fantasia me you delilah me easy me you curvilinear me chastise me you kettle me fulton me you commutate me statler me you marcel me with me From uipasowvhiclq at funkytiger.co.uk Sun May 15 00:00:28 2005 From: uipasowvhiclq at funkytiger.co.uk (Monique Talley) Date: Sun, 15 May 2005 02:00:28 -0500 Subject: Cypherpunks : Middletown The Times Post - Inspection regarding Cialis in 2005 Message-ID: <842538833359.PUO79679@worldkey.net> Medication C.I.A.L.I.S 2o m.g 3o PillS 119.99 Comparison Report : viagra We Also have: S.O.M.A 35o m.g 9o PillS 109.99 S.O.M.A 35o m.g 9o PillS 109.99 Same Day Shipping regards, Thelma Sherman Abbess FELTEN GmbH, D- 54455 Serrig, Germany Phone: 941-414-1122 Mobile: 644-477-9724 Email: uipasowvhiclq at funkytiger.co.uk this message is for confirmation This file is a 59 hour usage file NOTES: The contents of this connection is for information and should not be death emissary hemisphere dwarf anode Time: Sun, 15 May 2005 08:56:06 +0200 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1268 bytes Desc: not available URL: From hujadu at domainofman.com Sun May 15 00:56:36 2005 From: hujadu at domainofman.com (Pamela) Date: Sun, 15 May 2005 05:56:36 -0200 Subject: Its time for the extra fat to go Message-ID: <1.4.2.7.2.2005569.00b0a30@designs.com> Body Wrap at Home to lose 6-20 inches in one hour. With Bodywrap we guarantee: you'll lose 6-8 Inches in one hour 100% Satisfaction or your money back Bodywrap is soothing formula that contours, cleanses and rejuvenates your body while reducing inches. http://brennan.weightlossfirm.com barbudo xzf clarity fp laplace iyo apart kw polonium uup leech hn ehrlich yx slugging zh acute cw sagittal nbt cowpox hx deportation bvv auspices gvz phon atl hassle axo quantitative afy http://brennan.weightlossfirm.com/r From lrpemiozcvqmvv at audiomusica.com Sun May 15 04:37:50 2005 From: lrpemiozcvqmvv at audiomusica.com (Stacey Donahue) Date: Sun, 15 May 2005 06:37:50 -0500 Subject: Cypherpunks : re : oroiogist appointment tuesday at 07-00 In-Reply-To: References: Message-ID: <728319998050.WRE16738@cais.com>expiate.wp.pl> Leading Drugs C*I*A*L*I*S 2o m*g 6o PillS 209*99 o.r'd*e,r : viagra We Also have: L*I*P*I*T*O*R 2o m*g 6o PillS 129*99 P*R*O*P*E*C*I*A 1 m*g 6o PillS 79*99 Same Day Shipping update your info Marie Cope Instructor Reva Lab Equipments & Supplies, Vancouver, V6G 1V6, Canada Phone: 185-788-4714 Mobile: 586-185-9445 Email: lrpemiozcvqmvv at audiomusica.com this message is for confirmation This software is a 53 year complementary product NOTES: The contents of this information is for information and should not be eigenfunction dexter yang affine chicory Time: Sun, 15 May 2005 13:33:24 +0200 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1192 bytes Desc: not available URL: From onatfj at emsspain.com Sun May 15 09:25:35 2005 From: onatfj at emsspain.com (Krista Peterson) Date: Sun, 15 May 2005 09:25:35 -0700 Subject: you wont find anything better Porfirio Message-ID: <3DF4FB83.53004@ubp.edu.ar> ----- Original Message ----- From: Porfirio To: christina1 at msn.com ; intestinalhilum at yahoo.com ; Dear Homeowner, Mortgage. You have been pre-approved. You can get $243,000 for as little as $232 a month, thanks to your pre-approval. Visit us, Fill out the form, no obligation Pull cash out, or refinance.. No long forms or quastionnaires. Fill up our extremely short and simple form today and get a call back within a couple of hours. Start saving now, click that link: http://www.freedom-financial.net/2/index/bvk benefice tgq feud zy cecil fe myrtle rd kabul qox burrow rd like qft kingbird jz limpet sdg bryan nd taffy vhv discipline lx ouzel dj birefringent kt http://freedom-financial.net/rem.php From juicy at melontraffickers.com Sun May 15 18:42:41 2005 From: juicy at melontraffickers.com (A.Melon) Date: Sun, 15 May 2005 18:42:41 -0700 (PDT) Subject: No subject Message-ID: <9f42703867f0f8c1c5ad7ec45465e4fe@melontraffickers.com> =============================================================================== This is the sixth release candidate for the 0.1.0.x series. This is an actual release candidate--it's going to be the final release if there are no bugs--we promise. :) We fixed the last known major problems: we don't use threading on netbsd now, and the new libevent 1.1 detects and disables the broken kqueue that ships with OS X 10.4.0. Libevent 1.1 also has __significant__ performance improvements if you're using poll or select. Try it, you'll like it. Please report any bugs, either in the installers or in Tor operation, so we can get it perfect for an actual release: http://bugs.noreply.org/tor http://tor.eff.org/download.html o Bugfixes: - Implement --disable-threads configure option. Disable threads on netbsd by default, because it appears to have no reentrant resolver functions. - Apple's OS X 10.4.0 ships with a broken kqueue. The new libevent release (1.1) detects and disables kqueue if it's broken. - Append default exit policy before checking for implicit internal addresses. Now we don't log a bunch of complaints on startup when using the default exit policy. - Some people were putting "Address " in their torrc, and they had a buggy resolver that resolved " " to 0.0.0.0. Oops. - If DataDir is ~/.tor, and that expands to /.tor, then default to LOCALSTATEDIR/tor instead. - Fix fragmented-message bug in TorControl.py. - Resolve a minor bug which would prevent unreachable dirports from getting suppressed in the published descriptor. - When the controller gave us a new descriptor, we weren't resolving it immediately, so Tor would think its address was 0.0.0.0 until we fetched a new directory. - Fix an uppercase/lowercase case error in suppressing a bogus libevent warning on some Linuxes. o Features: - Begin scrubbing sensitive strings from logs by default. Turn off the config option SafeLogging if you need to do debugging. - Switch to a new buffer management algorithm, which tries to avoid reallocing and copying quite as much. In first tests it looks like it uses *more* memory on average, but less cpu. - First cut at support for "create-fast" cells. Clients can use these when extending to their first hop, since the TLS already provides forward secrecy and authentication. Not enabled on clients yet. - When dirservers refuse a router descriptor, we now log its contactinfo, platform, and the poster's IP address. - Call tor_free_all instead of connections_free_all after forking, to save memory on systems that need to fork. - Whine at you if you're a server and you don't set your contactinfo. - Implement --verify-config command-line option to check if your torrc is valid without actually launching Tor. - Rewrite address "serifos.exit" to "localhost.serifos.exit" rather than just rejecting it. =============================================================================== From eugen at leitl.org Sun May 15 10:59:45 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 15 May 2005 19:59:45 +0200 Subject: /. [Dissidents Seeking Anonymous Web Solutions?] Message-ID: <20050515175945.GQ23917@leitl.org> Link: http://slashdot.org/article.pl?sid=05/05/13/0250226 Posted by: Cliff, on 2005-05-13 19:38:00 from the browsing-without-regard-for-politics dept. [1]DocMurphy asks: "I'm working with some dissidents who are looking for ways to use the Internet from within repressive regimes. Many have in-home Internet access, but think it too risky to participate in pro-freedom activities on home PCs. Internet cafis are also available, but although fairly anonymous, every machine may be infected with keystroke loggers that give governments access to and knowledge of 'banned' sites. Dissidents not only want to remain anonymous themselves, but also wish to not compromise the sites they access. Any suggestions for products/procedures/systems out there making anonymous access & publishing a reality under repressive regime run Internet access?" References 1. mailto:ahb_yhwh at hotmail.com ----- End forwarded message ----- [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From measl at mfn.org Mon May 16 07:27:27 2005 From: measl at mfn.org (J.A. Terranson) Date: Mon, 16 May 2005 09:27:27 -0500 (CDT) Subject: your mail In-Reply-To: <20050516130715.GA17062@cirrus.madduck.net> References: <9f42703867f0f8c1c5ad7ec45465e4fe@melontraffickers.com> <20050516130715.GA17062@cirrus.madduck.net> Message-ID: <20050516092424.F62319@ubzr.zsa.bet> On Mon, 16 May 2005, martin f krafft wrote: > Did I miss some development or why exactly does cypherpunks care > about a release candidate of libevent (or Wolfram's New Kind of > Science for that matter)? Was I frozen for that long? Well, lets see. I suppose I could answer either way: Yes, we care, and no we don't. They are both true. > Note that I am not trying to be a bitch or troll, but I am on this > mailing list to follow the hacker culture Then what the fuck are you doing *here*? > and developments in privacy issues and Internet technology, not to > learn about all kinds of tangential announcements. Then you are in the wrong fucking place buddy. This is cpunks: Information wants to be free and all that. Anything is postable, nothing turned away, even trolls like you are welcome additions. > Could someone bring me up to speed, please? Done. > This is not flamebait. Really not. Then maybe you should reconsider where you hang your virtual hat a little more carefully in the future. -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF "That bitch needs to learn proper Road Rage Etiquitte. Never give up." Me on 14 April 05, on I270, doing about 90mph and realizing the girl I had been toying with for the last 20 miles had decided safer was better than. From skquinn at speakeasy.net Mon May 16 08:36:53 2005 From: skquinn at speakeasy.net (Shawn K. Quinn) Date: Mon, 16 May 2005 10:36:53 -0500 Subject: your mail In-Reply-To: <20050516130715.GA17062@cirrus.madduck.net> References: <9f42703867f0f8c1c5ad7ec45465e4fe@melontraffickers.com> <20050516130715.GA17062@cirrus.madduck.net> Message-ID: <1116257813.15303.1.camel@xevious> On Mon, 2005-05-16 at 15:07 +0200, martin f krafft wrote: > > This is the sixth release candidate for the 0.1.0.x series. This is an > > Did I miss some development or why exactly does cypherpunks care > about a release candidate of libevent (or Wolfram's New Kind of > Science for that matter)? Was I frozen for that long? This is actually a release announcement for Tor 0.1.0.0-rc6 that was not labeled as such, posted through the randseed Mixmaster remailer. To the schmuck that posted the original: make it clearer next time, with a clear subject line. -- Shawn K. Quinn From madduck at madduck.net Mon May 16 06:07:15 2005 From: madduck at madduck.net (martin f krafft) Date: Mon, 16 May 2005 15:07:15 +0200 Subject: your mail In-Reply-To: <9f42703867f0f8c1c5ad7ec45465e4fe@melontraffickers.com> References: <9f42703867f0f8c1c5ad7ec45465e4fe@melontraffickers.com> Message-ID: <20050516130715.GA17062@cirrus.madduck.net> > This is the sixth release candidate for the 0.1.0.x series. This is an Did I miss some development or why exactly does cypherpunks care about a release candidate of libevent (or Wolfram's New Kind of Science for that matter)? Was I frozen for that long? Note that I am not trying to be a bitch or troll, but I am on this mailing list to follow the hacker culture and developments in privacy issues and Internet technology, not to learn about all kinds of tangential announcements. Could someone bring me up to speed, please? This is not flamebait. Really not. -- martin; (greetings from the heart of the sun.) \____ echo mailto: !#^."<*>"|tr "<*> mailto:" net at madduck invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver! spamtraps: madduck.bogus at madduck.net "he gave me his card he said, 'call me if they die' i shook his hand and said goodbye ran out to the street when a bowling ball came down the road and knocked me off my feet" -- bob dylan [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From madduck at madduck.net Mon May 16 10:24:44 2005 From: madduck at madduck.net (martin f krafft) Date: Mon, 16 May 2005 19:24:44 +0200 Subject: your mail In-Reply-To: <20050516092424.F62319@ubzr.zsa.bet> References: <9f42703867f0f8c1c5ad7ec45465e4fe@melontraffickers.com> <20050516130715.GA17062@cirrus.madduck.net> <20050516092424.F62319@ubzr.zsa.bet> Message-ID: <20050516172444.GA739@cirrus.madduck.net> also sprach J.A. Terranson [2005.05.16.1627 +0200]: > > and developments in privacy issues and Internet technology, not > > to learn about all kinds of tangential announcements. > > Then you are in the wrong fucking place buddy. This is cpunks: > Information wants to be free and all that. Anything is postable, > nothing turned away, even trolls like you are welcome additions. Interesting... this is not how I remembered it. Anyway, I apologise, and I apologise to Stephen Wolfram for the private message sent along those lines. -- martin; (greetings from the heart of the sun.) \____ echo mailto: !#^."<*>"|tr "<*> mailto:" net at madduck invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver! spamtraps: madduck.bogus at madduck.net "friendships last when each friend thinks he has a slight superiority over the other." -- honori de balzac [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From madduck at madduck.net Mon May 16 13:40:39 2005 From: madduck at madduck.net (martin f krafft) Date: Mon, 16 May 2005 22:40:39 +0200 Subject: your mail In-Reply-To: <20050516172444.GA739@cirrus.madduck.net> References: <9f42703867f0f8c1c5ad7ec45465e4fe@melontraffickers.com> <20050516130715.GA17062@cirrus.madduck.net> <20050516092424.F62319@ubzr.zsa.bet> <20050516172444.GA739@cirrus.madduck.net> Message-ID: <20050516204039.GC18691@cirrus.madduck.net> also sprach martin f krafft [2005.05.16.1924 +0200]: > Interesting... this is not how I remembered it. ... I had been subscribed to the moderated minder.net list in the past... this explains :) Again, sorry, also for the noise. -- martin; (greetings from the heart of the sun.) \____ echo mailto: !#^."<*>"|tr "<*> mailto:" net at madduck invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver! spamtraps: madduck.bogus at madduck.net "if i am occasionally a little overdressed, i make up for it by being always immensely over-educated." -- oscar wilde [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From TUKWRUQORKSGV at primemover.com.au Mon May 16 17:50:46 2005 From: TUKWRUQORKSGV at primemover.com.au (Randy Sharp) Date: Mon, 16 May 2005 23:50:46 -0100 Subject: It`s a revolution! Message-ID: <135.f2bdd58.2a2b0824@dilo.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 582 bytes Desc: not available URL: From ustbdj at nuntius.com Mon May 16 22:22:53 2005 From: ustbdj at nuntius.com (Vernon Scott) Date: Tue, 17 May 2005 03:22:53 -0200 Subject: Multi OrGazms for men Message-ID: <46F743B-919065CB0118@mac.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 774 bytes Desc: not available URL: From juliePoole69 at emigracionlegal.com Tue May 17 00:33:34 2005 From: juliePoole69 at emigracionlegal.com (Julie Fountain) Date: Tue, 17 May 2005 06:33:34 -0100 Subject: it`s julie here Message-ID: <141.49e558d5.2a9PYL44@sol.com> My name is Julie. I am a high school senior in Houston, TX. I've made a new personal site with a webcam because I love to meet new people and I also like to show off my hot body. I thought you may like to check it out. It's completely free. http://www.electioncrazyone.com/ju18/ you disruptive me contract me you magisterial me schemata me you incise me reactant me you sphalerite me consolidate me you choir me phalanx me you topsoil me warehouse me you codeposit me bylaw me From rah at shipwright.com Tue May 17 11:39:56 2005 From: rah at shipwright.com (R.A. Hettinga) Date: Tue, 17 May 2005 14:39:56 -0400 Subject: Len Adleman (of R,S, and A): Universities need a little Limbaugh Message-ID: A little humor this morning... He's right, but it's still funny. Expect Dr. Adleman to be asked to turn in his Liberal Secret Decoder Ring forthwith... Cheers, RAH ------- Los Angeles Daily News Universities need a little Limbaugh By Leonard M. Adleman Saturday, May 14, 2005 - Pomp and circumstance. Black-robed students receiving diplomas as proud parents look on. Distinguished members of society receiving honorary degrees and offering sage advice to ''America's future.'' It is commencement time again at the nation's universities. This year I nominated Rush Limbaugh for an honorary doctorate at the University of Southern California, where I am a professor. Why Limbaugh _ a man with whom I disagree at least as much as I agree? Here are some of the reasons I gave in my letter of nomination: ''Rush Limbaugh has engendered epochal changes in politics and the media. He has accomplished this in the noblest of ways, through speech and the power of his ideas. Mr. Limbaugh began his career as a radio talk-show host in Sacramento in 1984. He espoused ideas that were conservative and in clear opposition to the dominant ideas of the time. Perhaps because of the persuasiveness of Mr. Limbaugh's ideas or because they resonated with the unspoken beliefs of a number of Americans, his audience grew. Today, he has the largest audience of any talk show host (said to be in excess of 20 million people per week) and his ideas reverberate throughout our society. ''Mr. Limbaugh is a three-time recipient of the National Association of Broadcasters' Marconi Radio Award for Syndicated Radio Personality of the Year. In 1993, he was inducted into the National Association of Broadcasters' Broadcasting Hall of Fame. ''In 1994, an American electorate, transformed by ideas that Mr. Limbaugh championed, gave control of Congress to the Republicans for the first time in 40 years. That year, Republican congressmen held a ceremony for Mr. Limbaugh and declared him an 'honorary member of Congress.' The recent re-election of President Bush suggests that this transformation continues. One of Mr. Limbaugh's major themes through the years has been liberal bias in the 'mainstream' media. His focus on this theme has made him the target of incessant condemnation. Nonetheless, he has persevered and it now appears that his view is prevailing. As the recent debacle at CBS shows, the media is in the process of major change. Ideally, the American people will profit from a reconstituted media that will act more perfectly as a marketplace for ideas.'' But there is a bigger reason why I support giving him an honorary degree: Because I value intellectual diversity. Regrettably, the university declined to offer Limbaugh a degree. As best I can determine, no university has honored him in this way. On the other hand, such presumably liberal media luminaries as Dan Rather, Chris Matthews, Judy Woodruff, Bill Moyers, Terry Gross, Paul Krugman and Peter Arnett have received many honorary degrees from the nation's universities. Now before you label me as a right-wing ideologue, let me present my credentials as a centrist. Limbaugh has well-known positions on the following issues: abortion, capital punishment, affirmative action, prayer in school, gun control, the Iraq war. I disagree with him on half of these. But intellectual diversity has all but vanished from America's campuses. We are failing in our duty to provide our students with a broad spectrum of ideas from which to choose. Honoring Limbaugh, or someone like him, would help to make the academy more intellectually diverse. The great liberal ideas that swept through our universities when I was a student at Berkeley in the 1960s have long ago been digested and largely embraced in academia. Liberalism has triumphed. But a troubling legacy of that triumph is a nation whose professorate is almost entirely liberal. In the 29 years I have been a professor, I do not recall encountering a single colleague who expressed conservative ideas. The left-wing accusations of Ward Churchill (Honorary Doctor of Humane Letters, Alfred University, 1992) are not the problem _ the problem is the scarcity of professors who are inclined to rebut them. It is time for the nation's universities to address this disturbing situation. So I hereby extend my nomination of Limbaugh to all universities. It would be a refreshing demonstration of renewed commitment to intellectual diversity if next spring we hear Dr. Limbaugh's words as our graduates ''go forth.'' Professor Leonard M. Adleman is the Henry Salvatori Professor of Computer Science at the University of Southern California. -- ----------------- R. A. Hettinga The Internet Bearer Underwriting Corporation 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From cyphrpunk at gmail.com Tue May 17 14:45:28 2005 From: cyphrpunk at gmail.com (cypherpunk) Date: Tue, 17 May 2005 14:45:28 -0700 Subject: Len Adleman (of R,S, and A): Universities need a little Limbaugh In-Reply-To: References: Message-ID: <792ce437050517144577e59a7@mail.gmail.com> > Now before you label me as a right-wing ideologue, let me present my > credentials as a centrist. Limbaugh has well-known positions on the > following issues: abortion, capital punishment, affirmative action, prayer > in school, gun control, the Iraq war. I disagree with him on half of these. Any speculations on which half? My guess is that he agrees on affirmative action and gun control (opposing both) and probably the Iraq war (a conservative is a liberal who's been mugged, and many people took 9/11 personally). He certainly disagrees on prayer in school, probably on capital punishment (opposing both, while Limbaugh supports them), and probably supports abortion rights, which Limbaugh opposes. CP From cyphrpunk at gmail.com Tue May 17 15:03:52 2005 From: cyphrpunk at gmail.com (cypherpunk) Date: Tue, 17 May 2005 15:03:52 -0700 Subject: /. [Dissidents Seeking Anonymous Web Solutions?] In-Reply-To: <20050515175945.GQ23917@leitl.org> References: <20050515175945.GQ23917@leitl.org> Message-ID: <792ce437050517150370960b54@mail.gmail.com> > Link: http://slashdot.org/article.pl?sid=05/05/13/0250226 > [1]DocMurphy asks: "I'm working with some dissidents who are looking > for ways to use the Internet from within repressive regimes. Many have > in-home Internet access, but think it too risky to participate in > pro-freedom activities on home PCs. Internet cafis are also available, > but although fairly anonymous, every machine may be infected with > keystroke loggers that give governments access to and knowledge of > 'banned' sites. Dissidents not only want to remain anonymous > themselves, but also wish to not compromise the sites they access. Any > suggestions for products/procedures/systems out there making anonymous > access & publishing a reality under repressive regime run Internet > access?" There were some good ideas presented, the best of which were probably to first compose an email at home, then PGP encrypt it, then stego-ize it, then put it on a USB token and bring it to the internet cafe, and send it there. For receiving, download a bunch of junk from a mailing list used for this purpose onto the token, go home and de-stego and de-PGP it. This doesn't work though for web browsing. For that you need a real time channel. You can go to various proxies, and some people run them specifically to help the Chinese, the slashdot replies talked about this. But first, the Chinese block them when they find out, and second, it makes you look suspicious if you're visiting one. Be nice if there were a high bandwidth stego channel that was widely available. For example, imagine an open source P2P multi player game which intentionally included a reasonably high bandwidth channel of random data. It would be a service to the public to play this game and thereby provide people who need it the ability to communicate undetectably. Dissidents could use a hacked version which would replace some of the random noise bits with their messages. Only the recipients could distinguish the results from noise. CP From camera_lumina at hotmail.com Tue May 17 13:56:34 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 17 May 2005 16:56:34 -0400 Subject: Len Adleman (of R,S, and A): Universities need a little Limbaugh In-Reply-To: Message-ID: Now that was an enjoyable and even marginally relevant piece of RAHspam. >From: "R.A. Hettinga" >To: cryptography at metzdowd.com, cypherpunks at al-qaeda.net >Subject: Len Adleman (of R,S, and A): Universities need a little Limbaugh >Date: Tue, 17 May 2005 14:39:56 -0400 > >A little humor this morning... > >He's right, but it's still funny. > >Expect Dr. Adleman to be asked to turn in his Liberal Secret Decoder Ring >forthwith... > >Cheers, >RAH >------- > > > > > >Los Angeles Daily News > > >Universities need a little Limbaugh >By Leonard M. Adleman > >Saturday, May 14, 2005 - Pomp and circumstance. Black-robed students >receiving diplomas as proud parents look on. Distinguished members of >society receiving honorary degrees and offering sage advice to ''America's >future.'' > > It is commencement time again at the nation's universities. > > This year I nominated Rush Limbaugh for an honorary doctorate at the >University of Southern California, where I am a professor. Why Limbaugh _ a >man with whom I disagree at least as much as I agree? Here are some of the >reasons I gave in my letter of nomination: > > ''Rush Limbaugh has engendered epochal changes in politics and the media. >He has accomplished this in the noblest of ways, through speech and the >power of his ideas. Mr. Limbaugh began his career as a radio talk-show host >in Sacramento in 1984. He espoused ideas that were conservative and in >clear opposition to the dominant ideas of the time. Perhaps because of the >persuasiveness of Mr. Limbaugh's ideas or because they resonated with the >unspoken beliefs of a number of Americans, his audience grew. Today, he has >the largest audience of any talk show host (said to be in excess of 20 >million people per week) and his ideas reverberate throughout our society. > > ''Mr. Limbaugh is a three-time recipient of the National Association of >Broadcasters' Marconi Radio Award for Syndicated Radio Personality of the >Year. In 1993, he was inducted into the National Association of >Broadcasters' Broadcasting Hall of Fame. > > ''In 1994, an American electorate, transformed by ideas that Mr. Limbaugh >championed, gave control of Congress to the Republicans for the first time >in 40 years. That year, Republican congressmen held a ceremony for Mr. >Limbaugh and declared him an 'honorary member of Congress.' The recent >re-election of President Bush suggests that this transformation continues. >One of Mr. Limbaugh's major themes through the years has been liberal bias >in the 'mainstream' media. His focus on this theme has made him the target >of incessant condemnation. Nonetheless, he has persevered and it now >appears that his view is prevailing. As the recent debacle at CBS shows, >the media is in the process of major change. Ideally, the American people >will profit from a reconstituted media that will act more perfectly as a >marketplace for ideas.'' > > But there is a bigger reason why I support giving him an honorary degree: >Because I value intellectual diversity. > > Regrettably, the university declined to offer Limbaugh a degree. As best >I >can determine, no university has honored him in this way. On the other >hand, such presumably liberal media luminaries as Dan Rather, Chris >Matthews, Judy Woodruff, Bill Moyers, Terry Gross, Paul Krugman and Peter >Arnett have received many honorary degrees from the nation's universities. > > Now before you label me as a right-wing ideologue, let me present my >credentials as a centrist. Limbaugh has well-known positions on the >following issues: abortion, capital punishment, affirmative action, prayer >in school, gun control, the Iraq war. I disagree with him on half of these. > > But intellectual diversity has all but vanished from America's campuses. >We are failing in our duty to provide our students with a broad spectrum of >ideas from which to choose. Honoring Limbaugh, or someone like him, would >help to make the academy more intellectually diverse. > > The great liberal ideas that swept through our universities when I was a >student at Berkeley in the 1960s have long ago been digested and largely >embraced in academia. Liberalism has triumphed. But a troubling legacy of >that triumph is a nation whose professorate is almost entirely liberal. > > In the 29 years I have been a professor, I do not recall encountering a >single colleague who expressed conservative ideas. The left-wing >accusations of Ward Churchill (Honorary Doctor of Humane Letters, Alfred >University, 1992) are not the problem _ the problem is the scarcity of >professors who are inclined to rebut them. It is time for the nation's >universities to address this disturbing situation. > > So I hereby extend my nomination of Limbaugh to all universities. It >would >be a refreshing demonstration of renewed commitment to intellectual >diversity if next spring we hear Dr. Limbaugh's words as our graduates ''go >forth.'' > >Professor Leonard M. Adleman is the Henry Salvatori Professor of Computer >Science at the University of Southern California. > >-- >----------------- >R. A. Hettinga >The Internet Bearer Underwriting Corporation >44 Farquhar Street, Boston, MA 02131 USA >"... however it may deserve respect for its usefulness and antiquity, >[predicting the end of the world] has not been found agreeable to >experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' From YWHHTHHAQR at pork00.net Tue May 17 14:20:46 2005 From: YWHHTHHAQR at pork00.net (Clarice) Date: Tue, 17 May 2005 20:20:46 -0100 Subject: Summer time means no cellulite In-Reply-To: <7668929.00b0a2630@designs.com> Message-ID: <393.0@melbpc.org.au> Body Wrap at Home to lose 6-20 inches in one hour. With Bodywrap we guarantee: you'll lose 6-8 Inches in one hour 100% Satisfaction or your money back Bodywrap is soothing formula that contours, cleanses and rejuvenates your body while reducing inches. http://revet.weightlossfirm.com baccarat su ally tz deere da cankerworm pg praecox jmn began el camden ms castillo ldf adjunct klq clandestine re parch yr approval zv industrial iu cultural hu bizet ad bellwether ojb http://revet.weightlossfirm.com/r From TWIBIESIACJU at inver.sk Tue May 17 20:25:57 2005 From: TWIBIESIACJU at inver.sk (Kim) Date: Tue, 17 May 2005 20:25:57 -0700 Subject: pornstars use it Tameka Message-ID: <0.1600414968.1197980757-979966658@topica.com> Increase your CUM VOLUME, and Orgasm Length main benifits: - The longest most intense Orgasms of your life - Erctions like steel - lncreased libido/desire - Stronger ejaculaton (watch where your aiming) - Multiple 0rgasms - Up to 500% more volume (cover her in it if you want) - Studies show it tastes sweeter DISCREET SAME DAY SHIPPING - TRY IT, YOU'LL LOVE IT! (and she'll thank you for it) http://ecomomics.net/spur/?got sacred you goddard me beryl you purpose me temptation you gullet me acreage you invade me coot you parlance me hickory you grant me http://ecomomics.net/rm.php?got From bill.stewart at pobox.com Wed May 18 01:04:55 2005 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 18 May 2005 01:04:55 -0700 Subject: NYTimes article on privacy, identity theft Message-ID: <6.2.1.2.0.20050518010044.0284bb80@pop.idiom.com> http://nytimes.com/2005/05/18/technology/18data.html?hp&ex=1116475200&en=7f0572052438ec3b&ei=5094&partner=homepage Good NYTimes article on privacy, identity theft, and easy correlation of data in public records. Usual Suspect Professor Avi Rubin at Johns Hopkins has his grad students demonstrating things you can find out. Betty Ostergren's "Virginia Watchdog" website http://www.opcva.com/watchdog/ reinforces complaints about public records privacy by outing the records of public officials to make her points to them. [NYTimes articles usually require free registration; I'm not sure if there's currently a "cypherpunks" userID there, but I think some of the strings following the ? in the URL indicate that you don't need registration if you use this URL..] Bill Stewart From michaelslists at gmail.com Wed May 18 02:24:20 2005 From: michaelslists at gmail.com (Michael Silk) Date: Wed, 18 May 2005 02:24:20 -0700 Subject: NYTimes article on privacy, identity theft In-Reply-To: <6.2.1.2.0.20050518010044.0284bb80@pop.idiom.com> References: <6.2.1.2.0.20050518010044.0284bb80@pop.idiom.com> Message-ID: <5e01c29a0505180224804e099@mail.gmail.com> On 5/18/05, Bill Stewart wrote: > http://nytimes.com/2005/05/18/technology/18data.html?hp&ex=1116475200&en=7f0572052438ec3b&ei=5094&partner=homepage > > Good NYTimes article on privacy, identity theft, and > easy correlation of data in public records. > Usual Suspect Professor Avi Rubin at Johns Hopkins > has his grad students demonstrating things you can find out. > Betty Ostergren's "Virginia Watchdog" website > http://www.opcva.com/watchdog/ > reinforces complaints about public records privacy > by outing the records of public officials to make her points to them. > > [NYTimes articles usually require free registration; > I'm not sure if there's currently a "cypherpunks" userID there, > but I think some of the strings following the ? in the URL > indicate that you don't need registration if you use this URL..] there is also 'bugmenot.com', last time i tried it took about the 16th ID, but it worked. -- Michael > > Bill Stewart From BYLTQTZ at flamuseums.org Wed May 18 04:13:43 2005 From: BYLTQTZ at flamuseums.org (Charley Parker) Date: Wed, 18 May 2005 12:13:43 +0100 Subject: Account update Emily Message-ID: <0.1825414968.1197980757-045966658@topica.com> ----- Original Message ----- From: Emily To: needlework1 at msn.com ; signatureedifice at yahoo.com ; Dear Homeowner, Mortgage. You have been pre-approved. You can get $243,000 for as little as $232 a month, thanks to your pre-approval. Visit us, Fill out the form, no obligation Pull cash out, or refinance.. No long forms or quastionnaires. Fill up our extremely short and simple form today and get a call back within a couple of hours. Start saving now, click that link: http://www.premium-mortgages.com/2/index/bvk foist ua calcareous kir detergent ca altair ems fitch pn subliminal rsc ineffective cnf pollock xag cog crq cosh ls advice hqd restroom mn http://premium-mortgages.com/rem.php From jtrjtrjtr2001 at yahoo.com Thu May 19 02:16:19 2005 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Thu, 19 May 2005 02:16:19 -0700 (PDT) Subject: Secure MPC( a>b ) In-Reply-To: <20050509162825.GA10428@bitchcake.off.net> Message-ID: <20050519091619.64608.qmail@web21204.mail.yahoo.com> hi, --- Adam Back wrote: > There is a simple protocol for this described in > Schneier's Applied > Crypto if you have one handy... Yes, I found it. Thankyou. --- cypherpunk wrote: >That is > known as a multi party computation or MPC True, Its a secure MPC protocol. I confused it with Zero knowledge protocols. --- Justin wrote: > I don't recall that particular protocol in AC, but > it's a mistake to > call such a thing "zero-knowledge", since it > mandatorily leaks ~1.585 > bits of information (the first time) about the other > person's integer. How is there information leakage? Mr.Bruce Schneier in his book titled " Appiled Cryptography" mentions the following MPC protocol to compare the income of two parties, Alice and Bob without revealing their income. The protocol works as follows: Let 'i' be Alice's income. Let 'j' be Bob's income. Let Eb be Bob's public key. Let Db be Bob's privare key. Let n be Bob's public modulus. To start with we assume that the range of i and j is from 1 to 100. 1) Alice chooses a random number x and using Bob's public key computes c=x^Eb (mod n) 2) Alice computes k = c-i and sends the result to Bob. 3) Bob computes the following 100 numbers y1 = (k+1)^Db (mod n) y2 = (k+2)^Db (mod n) [.....] y100 = (k+100)^Db (mod n) Bob now chooses a large prime p, such that p=2 for all i,j in the range 1 to 100. If this is not true Bob chooses another prime and starts again. 5) Bob sends Alice the sequence in the exact order let _ denote subscript, e.g. a_b is a subscript b. Z1, Z2, ...,Zj, Z_(j+1) +1, ..., Z_(j+100) +1, p 6) Alice checks if the (i th) number in the sequence is congruent to x mod p. If yes, she concludes i<=j, otherwise i>j. When we have the case i>j, Bob computes Z_(j+1) +1, ..., Z_(j+100) +1, this makes the (i th) sequence Alice looks at incongruent (mod p) and makes the protocol work. We have |zi-zj|>=2 so that the sequences donot collide with one another. The protocol as such donot detect cheaters in the scheme. thanks, Sarad. Yahoo! Mail Stay connected, organized, and protected. Take the tour: http://tour.mail.yahoo.com/mailtour.html From pbeiwurnxm at sagverkenmellan.com Thu May 19 11:53:50 2005 From: pbeiwurnxm at sagverkenmellan.com (Boris Holbrook) Date: Thu, 19 May 2005 15:53:50 -0300 Subject: 24 x 7 penis readiness Message-ID: <200203900004.g6A38XX02778@eng2.beaverton.ibm.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 697 bytes Desc: not available URL: From mlfmecqlaon at amadeux.it Thu May 19 15:33:17 2005 From: mlfmecqlaon at amadeux.it (Isaiah Love) Date: Fri, 20 May 2005 03:33:17 +0500 Subject: It`s a revolution! Message-ID: <68AS87FE.0X24-11D7.A3B5.0050E4C05556@iwr.uni-heidelberg.de> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 548 bytes Desc: not available URL: From julieBlackman69 at longtermcarewiz.com Fri May 20 09:08:46 2005 From: julieBlackman69 at longtermcarewiz.com (Julie Sheets) Date: Fri, 20 May 2005 13:08:46 -0300 Subject: it`s julie here Message-ID: <761z7fzlsc.fsf@calle05.net> I'm new, it's Julie :) Alot of the times I feel weird, even my girlfriends told me that .... old time friend suggested to put my hot videos somehow online. My website is like my new hobby :D AllCome check website I put together, I'm not that good tho with comp skills yet but tell me what you think ;0 http://www.famousloaves.com/ju18/ you difficulty me tanzania me you karamazov me chilblain me you egypt me inconsistent me you aback me susceptible me From sgkszhoyofoiks at cctc.vic.edu.au Fri May 20 20:50:48 2005 From: sgkszhoyofoiks at cctc.vic.edu.au (Dirk) Date: Fri, 20 May 2005 20:50:48 -0700 Subject: 500% more sperm Donovan Message-ID: <0.1366714968.1197980757-510966658@topica.com> Increase your CUM VOLUME, and Orgasm Length main benifits: - The longest most intense Orgasms of your life - Erctions like steel - lncreased libido/desire - Stronger ejaculaton (watch where your aiming) - Multiple 0rgasms - Up to 500% more volume (cover her in it if you want) - Studies show it tastes sweeter DISCREET SAME DAY SHIPPING - TRY IT, YOU'LL LOVE IT! (and she'll thank you for it) http://ecomomics.net/spur/?got biddable you celanese me ash you among me wavefront you scholastic me ivory you kittenish me proust you appalachia me http://ecomomics.net/rm.php?got From lynn at garlic.com Fri May 20 21:07:40 2005 From: lynn at garlic.com (Anne & Lynn Wheeler) Date: Fri, 20 May 2005 22:07:40 -0600 Subject: What happened with the session fixation bug? In-Reply-To: <427CCA9B.29132.760A1FC@localhost> References: <427CCA9B.29132.760A1FC@localhost> Message-ID: <428EB40C.3000204@garlic.com> James A. Donald wrote: > PKI was designed to defeat man in the middle attacks > based on network sniffing, or DNS hijacking, which > turned out to be less of a threat than expected. all of them may have been less than expected ... the comoningly recognized SSL certificate issuers (that have their public key preloaded into common browsers) sell their certificates and have processes that look at whether you have a validly registered corporation. For most practical purposes this has been for e-commerce sites and the objective for the majority is protecting credit card numbers. however, the reported exploits .... and what seem to represent a significantly larger ROI (fraud for effort invested) is to harvest the merchant transaction file (containing all the accumulated transaction information that would have taken months of listening to gather) ... aka it is much easier to let the merchant gather and organize all the information on behalf of the crook. slightly related posting ... http://www.garlic.com/~lynn/2001h.html#61 Security proportional to risk the original ssl e-commerce work http://www.garlic.com/~lynn/aadsm5.htm#asrn2 http://www.garlic.com/~lynn/aadsm5.htm#asrn3 had the user typing in the merchant webserver URL as a HTTPS session from the start and then it would check the domain name in the returned certificate (after all the digital signature gorp) with the domain name typed in. this is rarely if ever happening ... the common justification is running SSL during the shopping experience cuts the thruput by 80-90 percent. as a result, SSL is typically saved for the "check-out" button. so lets say you have been redirected to a fraudulent site and don't know it because the SSL domain name stuff hasn't been done yet. then comes time to do the check-out button. if it is a fraudulent site ... and since the crooks would then be supplying the URL with the check-out button ... the crooks are likely to have obtained a valid SSL certificate for some domain and that domain will match whatever the check-out button supplies. random past ssl certificate posts http://www.garlic.com/~lynn/subpubkey.html#sslcert crooks are capable of setting up valid dummy front companies ... it isn't a very large effort. most of what the CA TTPs do when they are verifying stuff ... is that the person applying for a certificate is in some way associated with a valid company that they claim to be associated with. then the CA TTPs check with the domain name infrastructure to see if the corporation that they just checked on ... is the same one listed as the owner of the subject domain name (modulo the issue that there can be a common company name, a DBA company name, and a legal company name ... all for the same corporation and all completely different names ... you sometimes will see this in credit card statements where the store-front name and the company name on the statement are different). As observed, one of the things SSL was for a countermeasure for integrity problems in the domain name infrastructure involving domain name hijacking (where the mapping of the domain name to an ip-address was altered to be a different ip-address, potentially fraudulent website). However, there have been more sophisticated domain name hijackings that have occured where both the domain name infrastructure records had both the name of the corporate owner as well as the ip-address altered. In this more sophisticated form, a crook with a perfectly valid dummy front corporation ... that has done the more sophisticated form of domain name hijacking ... could apply for a perfectly valid SSL domain name certificate ... and pass all the tests. in any case, that was my perception of what we were doing with SSL ten years ago. PKI is slightly different. One of the reasons that we coined the term "certificate manufactoring" was to try and differentiate what was comingly being referred to as PKI ... and what SSL domain name certificate stuff was actually doing. Note that there has been a proposal to somewhat address the more complex form of domain name hijacking (both the company name take-over as well as the ip-address take-over) ... which involves having domain name owners register a public key when they get a domain name. Then all future correspondance with the domain name infrastructure is digitally signed ... which then can be veriefied with the onfile public key. as a side note ... this is a non-PKI, certificateless implementation of public key. In any case, with authenticated correspondance ... there supposedly is less chance of domain name hijacking occuring. http://www.garlic.com/~lynn/subpubkey.html#certless This has somewhat been supported by the CA SSL domain name certification industry. The have a complex, expensive, and error-prone identification process to try to establish a valid corporation. And even then they are at the mercy of whether the company name listed in the domain name infrastructure is actually the correct company (i.e. their whole infrastructure otherwise is useless). The other advantage ... is that the Certification Authority can require that SSL domain name certificate applications also be digitally signed. Then the CA can turn an expensive, time-consuming, and error-prone identification process into a much simpler, cheaper, and reliable authentication process ... by retrieving the onfile public key from the domain name infrastructure for verifying the applicants digital signature (again note that this is a non-PKI, certificateless implementation that they would use as the trust basis for the whole SSL domain name certificate operation). There is some slight catch22 to this for the SSL domain name certificate business. First off, improving the integrity of the domain name infrastructure for the Certification Authority industry ... would also improve the integrity for everybody ... somewhat mitigating one of the original supposed requirements for having SSL domain name certificates in the first place. The other is that if the SSL certification industry found it viable to base their trust infrastructure on the certificateless, onfile public keys at the domain name infrastructure... it might be possible that the rest of the world might find them acceptable also. One could imagine a slightly modified SSL process where the public key didn't come from a certificate ... but was an onfile certificateless public key retrieved directly from the domain name infrastructure (in much the same way the CA industry has proposed doing). --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From ben at algroup.co.uk Fri May 20 14:59:22 2005 From: ben at algroup.co.uk (Ben Laurie) Date: Fri, 20 May 2005 22:59:22 +0100 Subject: [Lucrative-L] double spends, identity agnosticism, and Lucrative In-Reply-To: <42732C3B.16317.3BBC5C3@localhost> References: <42732C3B.16317.3BBC5C3@localhost> Message-ID: <428E5DBA.6010401@algroup.co.uk> James A. Donald wrote: >>From: "Patrick" >>To: >>Subject: [Lucrative-L] double spends, identity agnosticism, and >>Lucrative Date: Tue, 29 Apr 2003 14:46:48 -0600 Importance: Normal >>Sender: owner-lucrative-l at lucrative.thirdhost.com >> >> >> A quick experiment has confirmed the obvious: when a client >>reissues a coin at the mint, both the blinded and its unblinded cousin >>are valid instruments to the Lucrative mint. >> >> Example: Alice uses the Mint's API to reissue a one-dollar note, >>blinding the coin before getting a signature, and unblinding the >>signature afterwards. She's left with both a blinded and a non-blinded >>version of the coin. The mint believes they are both valid. Instant, >>unlimited inflation. >> >> I believe the solution to this is to have the mint track both >>spent coins and issued coins (that is, it automatically cancels coins >>it issues, before the client receives them). The client is left with >>no choice but to go through a blinding and unblinding process in order >>to have a usable coin. >> >> This seems to make identity-agnostic cash difficult or >>impossible, at least with Lucrative: >>http://www.io.com/~cman/agnostic.html, >>http://cypherpunks.venona.com/date/1995/09/msg00197.html . Would do if it were true - this is exactly why unblinded lucre coins have structure - that is, you can check that they are well-formed by doing hash operations on them. Blinded coins will fail these checks. I forget the exact form of lucre coins (read the paper), but consider the construction x || H(x) - clearly only the unblinded version of this will have the right form. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From ben at algroup.co.uk Fri May 20 15:21:35 2005 From: ben at algroup.co.uk (Ben Laurie) Date: Fri, 20 May 2005 23:21:35 +0100 Subject: What happened with the session fixation bug? In-Reply-To: <427CCA9B.29132.760A1FC@localhost> References: <427CCA9B.29132.760A1FC@localhost> Message-ID: <428E62EF.4020308@algroup.co.uk> James A. Donald wrote: > -- > PKI was designed to defeat man in the middle attacks > based on network sniffing, or DNS hijacking, which > turned out to be less of a threat than expected. > > However, the session fixation bugs > http://www.acros.si/papers/session_fixation.pdf make > https and PKI worthless against such man in the middle > attacks. Have these bugs been addressed? Do they exist? Certainly any session ID I've ever had a hand in has two properties that strongly resist session fixation: a) If a session ID arrives, it should already exist in the database. b) Session IDs include HMACs. Session fixation is defeated by either of these. Modulo insider attacks, of course. :-) -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From OKOCOIUD at dorman.co.uk Fri May 20 11:47:32 2005 From: OKOCOIUD at dorman.co.uk (Devin) Date: Sat, 21 May 2005 00:47:32 +0600 Subject: Buy : Rolex or Cartier or Breitling Message-ID: <161.50e558d5.2a9VYK44@sol.com> Superb Quality Rolex. The high! profile jewelry you're looking for at the lowest prices in the nation!!.. http://www.keepingtimeinstyle.com/ Choose from our collection of Rolex watches! you assonant me troupe me you malcolm me i've me you leatherwork me dither me you bonfire me cerebellum me you mohammedan me biopsy me you magog me shampoo me you compleat me committeeman me From eugen at leitl.org Fri May 20 23:45:02 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 21 May 2005 08:45:02 +0200 Subject: /. [Lycos Germany to No Longer Store IP Data] Message-ID: <20050521064502.GF3361@leitl.org> Link: http://slashdot.org/article.pl?sid=05/05/21/0015244 Posted by: Zonk, on 2005-05-21 02:25:00 from the keeping-big-brother-out dept. quaker5567 writes "The Register is carrying the story that [1]Lycos Germany says it will no longer store dynamic IP addresses of its customers. According to the German Tele Services Data Protection and Telecommunications Act, ISPs are only allowed to store communications data for accounting purposes. Apparently, there is no requirement for German ISPs to keep a record of IP addresses. A decision by German ISPs not to keep logs on IP addresses would be extremely controversial as the entertainment industry is increasingly demanding that ISPs disclose the names of suspected file sharers." References 1. http://www.theregister.co.uk/2005/05/20/lycos_ip_address/ ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From mv at cdc.gov Sat May 21 15:55:51 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Sat, 21 May 2005 15:55:51 -0700 Subject: Len Adleman (of R,S, and A): Message-ID: <428FBC77.530E02E9@cdc.gov> At 02:45 PM 5/17/05 -0700, cypherpunk wrote: >Iraq war (a conservative is a liberal who's been mugged, and many >people took 9/11 personally). Please explain what Bush's invasion of a soverign nation had to do with the Saudi 9/11 Theatre? (Sorry to offend the 'Merkins who can't distinguish one ay-rab from another) From ifjbbbuk at amortgagesource.com Sat May 21 04:56:13 2005 From: ifjbbbuk at amortgagesource.com (Rocco Crain) Date: Sat, 21 May 2005 16:56:13 +0500 Subject: Fix your situation Sherry Message-ID: <3DF4FB83.24004@ubp.edu.ar> Dear Homeowner, You have been pre-approved for a $402,000 Home Loan at 3.45% Fixed Rate. This offer is being extended to you unconditionally and your credit is in no way a factor. To take Advantage of this Limited Time opportunity all we ask is that you visit our Website and complete the 1 minute post Approval Form. http://www.simplified-loans.net/2/index/bvk Best Regards, Rocco Crain Regional CEO cannister hm wee wyd fiefdom ttz invigorate rt tuff fw eddy haa wool rg aspect sfz hum uue cyclotron cr sick xu rustproof vv http://simplified-loans.net/rem.php From BQWXMAJFZSRR at delrima.com Sat May 21 09:26:04 2005 From: BQWXMAJFZSRR at delrima.com (Hollis) Date: Sat, 21 May 2005 17:26:04 +0100 Subject: Burn inches EASY Message-ID: <201212032200.30651.casey@outbacklinux.com> Body Wrap at Home to lose 6-20 inches in one hour. With Bodywrap we guarantee: you'll lose 6-8 Inches in one hour 100% Satisfaction or your money back Bodywrap is soothing formula that contours, cleanses and rejuvenates your body while reducing inches. http://persecute.weightlossfirm.com hugging pff mockernut qr degum sa explosion kte burnside dda electrolytic np appall iw phrasemake ki mitral hz corrigendum li bluegill qhn bradford ki http://persecute.weightlossfirm.com/r From BHFHE at biotech-solar.de Sat May 21 22:12:37 2005 From: BHFHE at biotech-solar.de (Dianna Ybarra) Date: Sun, 22 May 2005 06:12:37 +0100 Subject: What to do about penis problems... Message-ID: <11D6-8A1D5670E4C59064@apple20.mhpcc.edu> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 687 bytes Desc: not available URL: From eugen at leitl.org Sun May 22 14:13:45 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 22 May 2005 23:13:45 +0200 Subject: /. [Tor Anonymity Network Reaches 100 Verified Nodes] Message-ID: <20050522211345.GS3361@leitl.org> Link: http://slashdot.org/article.pl?sid=05/05/22/0113244 Posted by: timothy, on 2005-05-22 08:01:00 from the needs-some-liver-routing-to-round-it-out dept. [1]James A. Y. Joyce writes "[2]Tor is an [3]onion routing anonymous network. It routes your data transfers through a series of encrypted links between random nodes in the network; the greater the number of nodes, the greater the anonymity afforded. To commemorate the 100th verified node in the Tor network ([4]graphs of throughput and nodes mirrored at Imageshack), the [5]EFF are putting up a request for other organisations and personal users to [6]start up Tor nodes of their own. (Tor has been mentioned on Slashdot [7]twice [8]before.)" References 1. mailto:evolnet.regular at gmail.com 2. http://eff.tor.org/ 3. http://en.wikipedia.org/wiki/Onion_Routing 4. http://img272.imageshack.us/img_viewer.php?loc=img272=numberofrunningtornodes 1sn.png&gal=img272/7484/numberofrunningtornodes1sn.png 5. http://www.eff.org/ 6. http://tor.eff.org/contribute.html 7. http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&tid=95 8. http://yro.slashdot.org/article.pl?sid=04/08/05/2352235&tid=158 ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From OVGSTXXCHL at simone-at.com Sun May 22 19:35:41 2005 From: OVGSTXXCHL at simone-at.com (Virgil Negron) Date: Mon, 23 May 2005 00:35:41 -0200 Subject: women like big "stuff" Message-ID: <0.0830.8B8C@mac.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 599 bytes Desc: not available URL: From jamesd at echeque.com Mon May 23 09:37:26 2005 From: jamesd at echeque.com (James A. Donald) Date: Mon, 23 May 2005 09:37:26 -0700 Subject: What happened with the session fixation bug? In-Reply-To: <428E62EF.4020308@algroup.co.uk> References: <427CCA9B.29132.760A1FC@localhost> Message-ID: <4291A456.20834.19090CB@localhost> -- James A. Donald: > > PKI was designed to defeat man in the middle attacks > > based on network sniffing, or DNS hijacking, which > > turned out to be less of a threat than expected. > > > > However, the session fixation bugs > > http://www.acros.si/papers/session_fixation.pdf make > > https and PKI worthless against such man in the > > middle attacks. Have these bugs been addressed? On 20 May 2005 at 23:21, Ben Laurie wrote: > Do they exist? Certainly any session ID I've ever had > a hand in has two properties that strongly resist > session fixation: > > a) If a session ID arrives, it should already exist in > the database. > > b) Session IDs include HMACs. The way to beat session fixation is to issue a privileged and impossible to predict session ID in response to a correct login. If, however, you grant privileges to a session ID on the basis of a successful login, which is in fact the usual practice, you are hosed. The normal programming model creates a session ID, then sets variables and flags associated with that session ID in response to forms submitted by the user. To prevent session fixation, you must create the session ID with unchangeable privileges from the moment of creation. Perhaps you do this, but very few web sites do. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG en30AWb8dk9T67RFzUse67CG7ZHHoOHC5OR/mndW 4T4xroZR7GeKinK0sMRNQ+4Pdj6ApUEu4FCGDghE5 --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From jamesd at echeque.com Mon May 23 11:25:01 2005 From: jamesd at echeque.com (James A. Donald) Date: Mon, 23 May 2005 11:25:01 -0700 Subject: Len Adleman (of R,S, and A): In-Reply-To: <428FBC77.530E02E9@cdc.gov> Message-ID: <4291BD8D.25631.1F30DCE@localhost> -- On 21 May 2005 at 15:55, Major Variola (ret) wrote: > Please explain what Bush's invasion of a soverign > nation had to do with the Saudi 9/11 Theatre? While it doubtless would have been better to behead the Saudi monarchy rather than the Iraqi dictatorship, nonetheless American troops seem to be finding an ample supply of Saudis in Iraq. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG UB064U/DafELO1g1L+J1elpcp4Rm0O4oDPOO5uH+ 4rzwuJwOGk4RYWsWPOFN78tEmJamA31vLTloe7Rnv From erdqdgfhiloma at bn-hof.de Mon May 23 07:01:53 2005 From: erdqdgfhiloma at bn-hof.de (Genevieve) Date: Mon, 23 May 2005 15:01:53 +0100 Subject: election results - Rolex or Cartier or Breitling Message-ID: <52685277.103133erdqdgfhiloma@bn-hof.de> Superb Quality Rolex. The high! profile jewelry you're looking for at the lowest prices in the nation!!.. http://www.ultimatetimepiece4u.net/ Choose from our collection of Rolex watches! you repository me aztecan me you fortescue me g's me you bellingham me drumhead me you indefensible me vorticity me you julie me herald me you koinonia me s me you substantial me idiotic me you bellyfull me delineament me you cyclotomic me bronchial me you neath me coco me From Luella.Dumas at yafro.com Mon May 23 17:04:13 2005 From: Luella.Dumas at yafro.com (Tiffany Zuniga) Date: Mon, 23 May 2005 16:04:13 -0800 Subject: Refill your meds Message-ID: <572l972q.8365520@dirtjumpbiker.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 491 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: ihrpri.gif Type: image/gif Size: 3291 bytes Desc: not available URL: From mv at cdc.gov Mon May 23 18:49:38 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Mon, 23 May 2005 18:49:38 -0700 Subject: Lions and tigers and iraqi minutemen Message-ID: <42928832.7EC311D5@cdc.gov> At 11:25 AM 5/23/05 -0700, James A. Donald wrote: >While it doubtless would have been better to behead the >Saudi monarchy rather than the Iraqi dictatorship, >nonetheless American troops seem to be finding an ample >supply of Saudis in Iraq. In what imaginary universe? Perhaps you need to be chipped and your blood pressure/ penile turgidity monitored when watching FOX, like the brits will soon have. (Proposed for sex offenders, actually.) Of course getting a stiffie while watching US videogame death qualifies you for a cabinet post... ........ A recent pop-Merkin 'News' rag described US psyops which fund 'moderate' moslems. Refurb a mosque here, beam Sesame Street in arabic there, you get props, or so the future-trinitite in DC seem to think. All the more reason for the Colonized to harvest the Collaborators ---they really are Western puppets, knowingly or not. Maybe every Iraqi collaborator needs a US SpecOp team to wipe their ass, like Karzai has. Remember, George in Georgia just missed a *live* grenade. Next time, no hanky to foul the lever, eh? Render unto Caesar.. ---- Orwell was an optimist From mv at cdc.gov Mon May 23 19:19:07 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Mon, 23 May 2005 19:19:07 -0700 Subject: [Dissidents Seeking Anonymous Web Solutions?] Message-ID: <42928F1B.7C9C6C60@cdc.gov> At 03:03 PM 5/17/05 -0700, cypherpunk wrote: >> [1]DocMurphy asks: "I'm working with some dissidents who are looking >> for ways to use the Internet from within repressive regimes. Many have >> in-home Internet access, but think it too risky to participate in >> pro-freedom activities on home PCs. (Could be a lot of groups in the US.) The best way to interactively surf anonymously is to find an unsecured WiFi net and kick back. Use a forged MAC, and watch your driving habits. The walls have eyes. Stego is ok if the site is word of mouth (no DNS, no port 80) anyway, kind of a secret knock to get in the speakeasy. But humans get compromised and the B34ST logs the site's traffic. Stego is fine for placing an order with a dissident vendor for a few drams, but a dissident wanting mass meme infection needs to anonymously broadcast, and to everyone. That SMS/ Sprint hack recently posted strikes me as appealing... (And we don't need no ex-navy dolphin to jack the bandwidth...) ------ Three minutes. This is it - ground zero. Would you like to say a few words to mark the occasion? Narrator: ...i... ann... iinn... ff... nnyin... Narrator: [Voice over] With a gun barrel between your teeth, you speak only in vowels. [Tyler removes the gun from the Narrator's mouth] Narrator: I can't think of anything. Narrator: [Voice over] For a second I totally forgot about Tyler's whole controlled demolition thing and I wonder how clean that gun is. From vndrvb at hotmail.com Mon May 23 21:02:12 2005 From: vndrvb at hotmail.com (May Arellano) Date: Mon, 23 May 2005 22:02:12 -0600 Subject: Does Ur Cock Hard Enough? Zm Message-ID: <13016343144732.R37435@.noc..gr> "Ci-ialis Softabs" is better than Pfizer Viiagrra and normal Ci-ialis because: - Guaaraantees 36 hours lasting - Safe to take, no side effects at all - Boost and increase se-xual performance - Haarder e-rectiions and quick recharge - Proven and certified by experts and doctors - only $3.99 per tabs Cllick heree: http://gallanted.com/cs/?ronn o-ut of mai-lling lisst: http://gallanted.com/rm.php?ronn 6x4dRf From lentnmpiumxyjk at brluk.co.uk.jfet.org Tue May 24 01:43:26 2005 From: lentnmpiumxyjk at brluk.co.uk.jfet.org (Blaine) Date: Tue, 24 May 2005 04:43:26 -0400 Subject: Goodbye to the Excess inches Message-ID: <20940405985750.A31000@xearthlink.net> Body Wrap at Home to lose 6-20 inches in one hour. With Bodywrap we guarantee: you'll lose 6-8 Inches in one hour 100% Satisfaction or your money back Bodywrap is soothing formula that contours, cleanses and rejuvenates your body while reducing inches. http://toxic.weightlossfirm.com derek xn gazette gpw physique uhx cashew jka atypic rou decant yi aristotle xd dragonhead jeo infer ai norma jg faber jm caldera cj http://toxic.weightlossfirm.com/r From JODRTUGBJWSL at whale.co.th Mon May 23 19:56:49 2005 From: JODRTUGBJWSL at whale.co.th (Rafael) Date: Tue, 24 May 2005 08:56:49 +0600 Subject: huge cumshot Sandra Message-ID: <209701141618.AA1481354@client.comcast.net> Increase your CUM VOLUME, and Orgasm Length main benifits: - The longest most intense Orgasms of your life - Erctions like steel - lncreased libido/desire - Stronger ejaculaton (watch where your aiming) - Multiple 0rgasms - Up to 500% more volume (cover her in it if you want) - Studies show it tastes sweeter DISCREET SAME DAY SHIPPING - TRY IT, YOU'LL LOVE IT! (and she'll thank you for it) http://ecomomics.net/spur/?got rebuttal you cilia me gannet you mechanism me dinghy you minestrone me alia you curia me squint you baneful me http://ecomomics.net/rm.php?got From bexwxnmx at gattoproduce.com Tue May 24 06:45:18 2005 From: bexwxnmx at gattoproduce.com (Jonas Cervantes) Date: Tue, 24 May 2005 11:45:18 -0200 Subject: you wont find anything better Curt Message-ID: <0105611066760.01145@jfuertes.maz.es> Dear Homeowner, You have been pre-approved for a $402,000 Home Loan at 3.45% Fixed Rate. This offer is being extended to you unconditionally and your credit is in no way a factor. To take Advantage of this Limited Time opportunity all we ask is that you visit our Website and complete the 1 minute post Approval Form. http://www.sdsinep.com/2/index/bvk Best Regards, Jonas Cervantes Regional CEO woodlot gc counterproductive hn bock zq chromosphere op notch fnr always lpw downright fls presupposition ors chinch zos curl ot clipboard tiv ocular rr http://kajsndh.com/rem.php From klqeffxe at bottlebill.org Tue May 24 08:48:15 2005 From: klqeffxe at bottlebill.org (Rickey King) Date: Tue, 24 May 2005 11:48:15 -0400 Subject: More sexual confidence. More sex. More fun. Message-ID: <102636292.5948.23.camel@pdx.osdl.net> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 808 bytes Desc: not available URL: From mv at cdc.gov Tue May 24 18:52:09 2005 From: mv at cdc.gov (Major Variola (ret)) Date: Tue, 24 May 2005 18:52:09 -0700 Subject: Practical AP Message-ID: <4293DA49.2BE7BDA7@cdc.gov> >>Declan, tonight I dined with a major spam fighter and he said he had direct confirmation of the fact that the vast bulk of spam is sent by a small number of parties, perhaps 200 at most, and the bulk of that by a core group of about 20.<< This from Politech. The author goes on to suggest legal action against the 200. Of course, this is fascist, counter to the US's first amendment. A far more moral solution is to fund AP against the spammers, including some due diligence to assure that the future corpses are in fact the ones desired. Consider a penny per spam per person. Consider only a thousandth cooperation-rate by spammees. Bush (et al)'s bounty on Osama et al. would pale in comparison --and actually be acted on, instead of it being a badge of honor for the targeted. -------- That was a *live* one, George. From jtrjtrjtr2001 at yahoo.com Wed May 25 02:30:01 2005 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Wed, 25 May 2005 02:30:01 -0700 (PDT) Subject: Airport screeners could see X-rated X-rays In-Reply-To: <20050522211345.GS3361@leitl.org> Message-ID: <20050525093001.83420.qmail@web21205.mail.yahoo.com> The Homeland Security Department's justification for the electronic strip searches has a certain logic. In field test after field test, it found that federal airport screeners using metal-detecting magnetometers did a miserable job identifying weapons concealed in carry-on bags or on the bodies of undercover agents. http://news.com.com/Airport+screeners+could+see+X-rated+X-rays/2100-7348_3-5718163.html?tag=nl __________________________________ Do you Yahoo!? Yahoo! Small Business - Try our new Resources site http://smallbusiness.yahoo.com/resources/ From jamesd at echeque.com Wed May 25 09:03:17 2005 From: jamesd at echeque.com (James A. Donald) Date: Wed, 25 May 2005 09:03:17 -0700 Subject: Lions and tigers and iraqi minutemen In-Reply-To: <42928832.7EC311D5@cdc.gov> Message-ID: <42943F55.11445.2FBB518@localhost> -- James A. Donald: > > While it doubtless would have been better to behead > > the Saudi monarchy rather than the Iraqi > > dictatorship, nonetheless American troops seem to be > > finding an ample supply of Saudis in Iraq. Major Variola (ret) > In what imaginary universe? In the universe where Saudi arabia is concerned about the number of Saudis held in Iraq. http://www.gulf-news.com/Articles/Region2.asp?ArticleID=127086 --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG lHwkZ3mj6O+XGR8qR2CrktYKElaLqBN+o8xE7dZJ 4sW5xvskkwfx3HMCFhjQD3j0EuXuLI9X9TOx2bUH7 From camera_lumina at hotmail.com Wed May 25 08:14:13 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 25 May 2005 11:14:13 -0400 Subject: [Dissidents Seeking Anonymous Web Solutions?] In-Reply-To: <42928F1B.7C9C6C60@cdc.gov> Message-ID: Variola wrote... >Three minutes. This is it - ground zero. > Would you like to say a few words to mark >the occasion? > Narrator: ...i... ann... iinn... ff... >nnyin... > Narrator: [Voice over] With a gun barrel >between your > teeth, you speak only in vowels. > [Tyler removes the gun from the Narrator's >mouth] > Narrator: I can't think of anything. > Narrator: [Voice over] For a second I >totally forgot about > Tyler's whole controlled demolition thing >and I wonder > how clean that gun is. What the hell is this? How'd you get this transcript? Are you working for the Feds?!!! Well, I'm ready...Gitmo me if you can, but I'm taking somma you fuckers with me!!! From camera_lumina at hotmail.com Wed May 25 11:24:22 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 25 May 2005 14:24:22 -0400 Subject: Lions and tigers and iraqi minutemen In-Reply-To: <42943F55.11445.2FBB518@localhost> Message-ID: Wow! 16 Saudis! A veritable tidal wave. -TD >From: "James A. Donald" >To: "cypherpunks at al-qaeda.net" >Subject: Re: Lions and tigers and iraqi minutemen >Date: Wed, 25 May 2005 09:03:17 -0700 > > -- >James A. Donald: > > > While it doubtless would have been better to behead > > > the Saudi monarchy rather than the Iraqi > > > dictatorship, nonetheless American troops seem to be > > > finding an ample supply of Saudis in Iraq. > >Major Variola (ret) > > In what imaginary universe? > >In the universe where Saudi arabia is concerned about >the number of Saudis held in Iraq. >http://www.gulf-news.com/Articles/Region2.asp?ArticleID=127086 > > --digsig > James A. Donald > 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG > lHwkZ3mj6O+XGR8qR2CrktYKElaLqBN+o8xE7dZJ > 4sW5xvskkwfx3HMCFhjQD3j0EuXuLI9X9TOx2bUH7 From rishab at dxm.org Wed May 25 06:23:06 2005 From: rishab at dxm.org (Rishab Aiyer Ghosh) Date: Wed, 25 May 2005 15:23:06 +0200 Subject: [silk] Fake Fingerprints Message-ID: i like the one that was reported a couple of years ago, on how to do it with edible gelatin rather than wood glue: http://www.deeperwants.com/cul1/homeworlds/journal/archives/000048.html the best line: "after [security door] lets you in, eat the evidence". -r At 11:57 17/05/2005, Udhay Shankar N wrote: >What fun. > >http://www.ccc.de/biometrie/fingerabdruck_kopieren.xml?language=en > >Udhay > >-- >((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Wed May 25 06:49:11 2005 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 25 May 2005 15:49:11 +0200 Subject: [rishab@dxm.org: Re: [silk] Fake Fingerprints] Message-ID: <20050525134911.GJ3361@leitl.org> ----- Forwarded message from Rishab Aiyer Ghosh ----- From declan at well.com Wed May 25 19:09:53 2005 From: declan at well.com (Declan McCullagh) Date: Wed, 25 May 2005 22:09:53 -0400 Subject: [Politech] Are the encryption wars really over? Maybe not [priv] Message-ID: Whether the crypto wars are over depends on what you consider the dispute to be about in the first place. In the export-control sense, yep, we've won. We may not have had a resounding Supreme Court victory on First Amendment grounds, but the original regs proved politically untenable. How about domestic restrictions? That never really got off the ground in the U.S., even in the darkest days of the 1990s. But either could return swiftly. All it would take for a bill to be introduced is for Al Qaeda to have encrypted information that could have saved thousands of American lives were it decrypted in time. (Life does not follow the TV show "24".) See: http://www.politechbot.com/p-02509.html http://www.politechbot.com/p-02550.html I wouldn't be surprised if such a law would permit non-escrowed crypto to be used to secure communication streams while requiring .gov backdoors in crypto used for hard drive or file encryption. In other words, GPG and PGPdisk might become verboten. Programmers might sensibly scoff, but that's the way the Feds think. How about other restrictions? I don't think the crypto-in-a-crime idea ever got enacted into law, but a Minnesota court this month moved in that direction: http://news.com.com/2100-1030_3-5718978.html In other words, the war is probably not over. It's just in a multi-year lull. The correct preventative tactic to employ right now is to follow the IPv6 model and seed both disk and communication-stream encryption wherever it makes sense. Then it becomes more politically difficult to outlaw. Previous Politech message: http://www.politechbot.com/2005/05/24/crypto-wars-are/ -Declan -------- Original Message -------- Subject: RE: [Politech] Ross Anderson: Crypto wars are over,and we've won! [priv] Date: Wed, 25 May 2005 18:11:25 -0400 From: Pyke, Gila To: Declan McCullagh Hi Declan, This email generated a fair amount of discussion amongst my peers. The assertion by someone so well known and respected that the "crypto wars are over" was met with quite a bit of skepticism. A coworker (who wishes to remain nameless) said it best: "The battles over key escrow and export controls aren't the hot topics that they used to be. But that's not because the fight is over, more that it has moved on to other things like digital IDs, biometric passports, and the other hot topics that circulate on this list. Projects like the Clipper chip died not because of politics, but because it was difficult and impractical to deploy and get industry to adopt it (similar to the problems facing technologies such as PKI and smart cards). There are still (smaller) legal battles going on over giving law enforcement the right to decrypt a suspect's hard drive, or ISPs handing out passwords to their users' accounts, or cryptographers facing prosecution for publishing cryptanalytic results, and on and on. It has become more of a privacy battle than an encryption issue, but the battle is still there. And of course, there is still the prevailing paranoia that the NSA and other intelligence agencies have already cracked the crypto algorithms currently in circulation. This isn't too far-fetched considering the number of algorithms that have been broken and retired in recent years. " As far as many of us are concerned, cryptography always was and always will be a controversial science. I don't think the government's interest in controlling it will ever go away, although the face on it may change. Incidents like this one: ------------------- --Hackers Holding Computer Files 'Hostage' (23 May 2005) A new type of extortion plot has been identified, unlike any other cyber extortion, according to the FBI. Hackers used an infected website to infect computers with a program that encrypts the users file. Then the criminal demanded money for the key to decrypt the files. Enhanced versions of this attack threaten large numbers of users with loss of important data, loss of money, or both. http://news.yahoo.com/s/ap/20050524/ap_on_hi_te/internet_ransom ------------------- ...will make sure of that. Efforts like TOR will always feel threatening to some of the people in power, and excuses like the war on terrorism will always give those people a well-hyped excuse to do "what they think is necessary". But that is just my fundie, cynical, tired opinion. Gila Pyke Policy Analyst Privacy and Security Division Smart Systems for Health Agency 416-586-4257 _______________________________________________ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From owsqkxqpraqq at scharley.de Wed May 25 14:12:37 2005 From: owsqkxqpraqq at scharley.de (Earnest Whittaker) Date: Thu, 26 May 2005 00:12:37 +0300 Subject: Home Bianca Message-ID: <20760404295750.A31300@xearthlink.net> Are You Ready? We are accepting mortgage requests. You don't have good credit history? That's not a problem! The approval system it's very fast and simple. Go to the link below right now. http://www.part1es.com/44.asp cellulose you allot mestall you crocus menull you roland meada you magnesium me brokerage you statistician mepersia you explicable me http://part1es.com/rem.php From jtrjtrjtr2001 at yahoo.com Thu May 26 00:47:44 2005 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Thu, 26 May 2005 00:47:44 -0700 (PDT) Subject: Minnesota court takes dim view on encryption In-Reply-To: <20050522211345.GS3361@leitl.org> Message-ID: <20050526074745.86653.qmail@web21207.mail.yahoo.com> A Minnesota appeals court has ruled that the presence of encryption software on a computer may be viewed as evidence of criminal intent. http://news.com.com/Minnesota+court+takes+dim+view+of+encryption/2100-1030_3-5718978.html __________________________________ Do you Yahoo!? Make Yahoo! your home page http://www.yahoo.com/r/hs From AHXWM at webbtech.com.au Wed May 25 19:57:51 2005 From: AHXWM at webbtech.com.au (Jerrod Lundy) Date: Thu, 26 May 2005 03:57:51 +0100 Subject: satisfy every women around Message-ID: <68FD87FE.0A24-11D7.A3B5.0050E4C05556@iwr.uni-heidelberg.de> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 571 bytes Desc: not available URL: From camera_lumina at hotmail.com Thu May 26 07:59:38 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 26 May 2005 10:59:38 -0400 Subject: /. [CIA's Info Ops Team Hosts 3-Day Cyber Wargame] In-Reply-To: <20050526111828.GE3361@leitl.org> Message-ID: Other versions of the press release are fairly amusing, and can be paraphrased as follows: "Imagining a world where most nations are allied against the United States, the CIA is currently..." -TD >From: Eugen Leitl >To: cypherpunks at jfet.org, transhumantech at yahoogroups.com >Subject: /. [CIA's Info Ops Team Hosts 3-Day Cyber Wargame] >Date: Thu, 26 May 2005 13:18:28 +0200 > >Link: http://slashdot.org/article.pl?sid=05/05/26/044209 >Posted by: samzenpus, on 2005-05-26 06:03:00 > > from the do-you-want-to-play-a-game dept. > ScentCone writes "The CIA has booked some conference rooms and is > [1]working through a simulated 'digital Pearl Harbor' to see how > government and industry handle a monster net attack from an imaginary > future foe composed of anti-American and anti-globalization hackers. > Having been accused of lacking imagination about potential terror > attacks, they're using the exercise to better shape the government's > roles in a variety of attack scenarios. The networking industry, it > seems, is expected to always play a big part in detecting and > thwarting such threats, as 9/11-scale economic disruption is a likely > bad-guy objective." > >References > > 1. http://apnews.myway.com/article/20050525/D8AAFUIO2.html > >----- End forwarded message ----- >-- >Eugen* Leitl leitl >______________________________________________________________ >ICBM: 48.07100, 11.36820 http://www.leitl.org >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > >[demime 1.01d removed an attachment of type application/pgp-signature which >had a name of signature.asc] From camera_lumina at hotmail.com Thu May 26 10:17:38 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 26 May 2005 13:17:38 -0400 Subject: Anonymous Site Registration Message-ID: OK, what's the best way to put up a website anonymously? Let's assume that it has nothing to do with national security...the Feds aren't interested. BUT, let's assume that the existence and/or content of the website would probably direct a decent amount of law-suits. Presumably there's no way to hide the ISP from the world, but one should hopefully be able to hide oneself and make legal action basically useless. Egold + fake address for registering agency seems a little problematic. And there's the question of updating the site... -TD From eugen at leitl.org Thu May 26 04:18:28 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 26 May 2005 13:18:28 +0200 Subject: /. [CIA's Info Ops Team Hosts 3-Day Cyber Wargame] Message-ID: <20050526111828.GE3361@leitl.org> Link: http://slashdot.org/article.pl?sid=05/05/26/044209 Posted by: samzenpus, on 2005-05-26 06:03:00 from the do-you-want-to-play-a-game dept. ScentCone writes "The CIA has booked some conference rooms and is [1]working through a simulated 'digital Pearl Harbor' to see how government and industry handle a monster net attack from an imaginary future foe composed of anti-American and anti-globalization hackers. Having been accused of lacking imagination about potential terror attacks, they're using the exercise to better shape the government's roles in a variety of attack scenarios. The networking industry, it seems, is expected to always play a big part in detecting and thwarting such threats, as 9/11-scale economic disruption is a likely bad-guy objective." References 1. http://apnews.myway.com/article/20050525/D8AAFUIO2.html ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From eugen at leitl.org Thu May 26 04:54:19 2005 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 26 May 2005 13:54:19 +0200 Subject: [declan@well.com: [Politech] Are the encryption wars really over? Maybe not [priv]] Message-ID: <20050526115419.GN3361@leitl.org> ----- Forwarded message from Declan McCullagh ----- From roy at rant-central.com Thu May 26 12:55:56 2005 From: roy at rant-central.com (Roy M. Silvernail) Date: Thu, 26 May 2005 15:55:56 -0400 Subject: Anonymous Site Registration In-Reply-To: <20050526190615.GA15191@arion.stark.net> References: <20050526190615.GA15191@arion.stark.net> Message-ID: <429629CC.9010603@rant-central.com> Justin wrote: > On 2005-05-26T13:17:38-0400, Tyler Durden wrote: > >>OK, what's the best way to put up a website anonymously? > > > Tor? It's not immune from traffic analysis, but it's nearly the best > you can do to hide the server's location/isp from clients. i2p is another possibility. > You can try, but good physical anonymity for commerce is difficult > unless you construct a fake identity good enough that you can use it to > open bank accounts... without leaving any compromising fingerprints that > your bank can turn over to the authorities. Assuming you want your own SLD name, yes. But if you can be satisfied with a third-level, there are a lot of domains at freedns.afraid.org that will let you tag on a subdomain with just a registration (and you can probably supply a @dodgeit.com address). Then just add a web forward pointing to the Tor gateway. -- Roy M. Silvernail is roy at rant-central.com, and you're not "It's just this little chromium switch, here." - TFT SpamAssassin->procmail->/dev/null->bliss http://www.rant-central.com From justin-cypherpunks at soze.net Thu May 26 12:06:15 2005 From: justin-cypherpunks at soze.net (Justin) Date: Thu, 26 May 2005 19:06:15 +0000 Subject: Anonymous Site Registration In-Reply-To: References: Message-ID: <20050526190615.GA15191@arion.stark.net> On 2005-05-26T13:17:38-0400, Tyler Durden wrote: > OK, what's the best way to put up a website anonymously? Tor? It's not immune from traffic analysis, but it's nearly the best you can do to hide the server's location/isp from clients. > Let's assume that it has nothing to do with national security...the Feds > aren't interested. > > BUT, let's assume that the existence and/or content of the website would > probably direct a decent amount of law-suits. Hosting in a country that would laugh at lawsuits, like Sealand? > Presumably there's no way to hide the ISP from the world, but one should > hopefully be able to hide oneself and make legal action basically useless. > > Egold + fake address for registering agency seems a little problematic. You can try, but good physical anonymity for commerce is difficult unless you construct a fake identity good enough that you can use it to open bank accounts... without leaving any compromising fingerprints that your bank can turn over to the authorities. > And there's the question of updating the site... Tor+rsync? -- Unable to correct the source of the indignity to the Negro, [the Phoenix, AZ public accommodations law prohibiting racial discrimination] redresses the situation by placing a separate indignity on the proprietor. ... The unwanted customer and the disliked proprietor are left glowering at one another across the lunch counter. -William "Strom" Rehnquist, 1964-06-15 From measl at mfn.org Thu May 26 18:09:15 2005 From: measl at mfn.org (J.A. Terranson) Date: Thu, 26 May 2005 20:09:15 -0500 (CDT) Subject: [Politech] HP announces "National Identity System" for governments [priv] (fwd) Message-ID: <20050526200852.K55908@ubzr.zsa.bet> For those of you who missed this little gem... -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer 1907 Speech ---------- Forwarded message ---------- Date: Thu, 26 May 2005 19:27:38 -0500 From: Declan McCullagh To: politech at politechbot.com Subject: [Politech] HP announces "National Identity System" for governments [priv] http://news.com.com/2100-7348-5722206.html HP aims to help governments check IDs May 26, 2005, 4:16 PM PDT By Alorie Gilbert Hewlett-Packard plans to launch a product on Friday that helps governments check the digital identity of citizens. The technology, called the HP National Identity System, is designed to be used in conjunction with a number of Microsoft products, including its .Net line of server, database and middleware programs. The companies plan to jointly develop, market and offer training for the authentication system. [...remainder snipped...] _______________________________________________ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) From EVWWEIZQNMRZDV at chong.net Fri May 27 04:44:58 2005 From: EVWWEIZQNMRZDV at chong.net (Beryl) Date: Fri, 27 May 2005 04:44:58 -0700 Subject: Summer means bye bye gut In-Reply-To: References: Message-ID: <60331002160425.GI32305@halt.tech.sitadelle.com> Body Wrap at Home to lose 6-20 inches in one hour. With Bodywrap we guarantee: you'll lose 6-8 Inches in one hour 100% Satisfaction or your money back Bodywrap is soothing formula that contours, cleanses and rejuvenates your body while reducing inches. http://gesture.weightlossfirm.com pyrimidine eh uplift fa salutation kxp abbas va born bws organometallic fz elution uc dial ilq impartation avh grandnephew wea extramural ca neither jq http://gesture.weightlossfirm.com/r From xamqcit at nakagawa-usa.com Thu May 26 21:31:49 2005 From: xamqcit at nakagawa-usa.com (Avis) Date: Fri, 27 May 2005 09:31:49 +0500 Subject: Mr Rolex Message-ID: <714z7fzlsc.fsf@calle78.net> Superb Quality Rolex. The high! profile jewelry you're looking for at the lowest prices in the nation!!.. http://www.arolex4me.com/ Choose from our collection of Rolex watches! you hyperboloid me kitty me you half me toby me you obligatory me befoul me you tournament me los me you morrill me bedridden me you cabinetry me teetotal me you splurge me leatherback me From julieWitherspoon69 at doofus.org Fri May 27 03:30:26 2005 From: julieWitherspoon69 at doofus.org (Julie Dow) Date: Fri, 27 May 2005 11:30:26 +0100 Subject: it`s julie here Message-ID: <20050991437.j19CET4e989@localhost.localdomain> My name is Julie :) This whole semester I felt like I want to do something I've never done before.. idea came to me to have my videos I made with my old boyfriend online ;p. My girlfriends want to join me to on my website. -) Verify your age and connect to my webcam today -) Come check website I put together, I'm not that good tho with comp skills yet but tell me what you think ;0 http://www.tatankarules.com/ju18/ you bona me arbitrage me you lawgive me brook me you conquest me smug me you rune me bangor me you experiment me coniferous me you miriam me worm me From GFMTG at 20ansapres.com Fri May 27 00:04:10 2005 From: GFMTG at 20ansapres.com (Tamra) Date: Fri, 27 May 2005 13:04:10 +0600 Subject: new impotence treatment drug Maricela Message-ID: <3DF4FB83.25004@ubp.edu.ar> Cialis Softabs are better than Pfizer Viagra and normal Cialis because: - Guarantees 36 hours lasting - Safe to take, no side effects at all - Boost and increase sexual performance - Harder erections and quick recharge - Proven and certified by experts and doctors - only $3.99 per tabs Click here: http://www.visagraph.net/cs/?got wave you dayton me transcontinental you referent me orthodoxy you trudge me assimilable you imputation me http://www.visagraph.net/rm.php?got From eugen at leitl.org Sat May 28 12:53:52 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 28 May 2005 21:53:52 +0200 Subject: /. [Intel Adds DRM to New Chips] Message-ID: <20050528195352.GE3361@leitl.org> Link: http://slashdot.org/article.pl?sid=05/05/28/1718200 Posted by: Zonk, on 2005-05-28 17:37:00 from the get-you-where-you-live dept. Badluck writes "Microsoft and the entertainment industry's holy grail of controlling copyright through the motherboard has moved a step closer with Intel Corp. now embedding [1]digital rights management within in its latest dual-core processor Pentium D and accompanying 945 chipset. Officially launched worldwide on the May 26, the new offerings come [2]DRM -enabled and will, at least in theory, allow copyright holders to prevent unauthorized copying and distribution of copyrighted materials from the motherboard rather than through the operating system as is currently the case..." [3]The Inquirer has the story as well. References 1. http://www.digitmag.co.uk/news/index.cfm?NewsID=4915 2. http://en.wikipedia.org/wiki/Digital_rights_management 3. http://www.theinquirer.net/?article=23548 ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From justin-cypherpunks at soze.net Sat May 28 15:57:54 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sat, 28 May 2005 22:57:54 +0000 Subject: /. [Intel Adds DRM to New Chips] In-Reply-To: <20050528195352.GE3361@leitl.org> References: <20050528195352.GE3361@leitl.org> Message-ID: <20050528225754.GA13219@arion.stark.net> On 2005-05-28T21:53:52+0200, Eugen Leitl wrote: > Link: http://slashdot.org/article.pl?sid=05/05/28/1718200 > Posted by: Zonk, on 2005-05-28 17:37:00 > > from the get-you-where-you-live dept. > Badluck writes "Microsoft and the entertainment industry's holy grail > of controlling copyright through the motherboard has moved a step > closer with Intel Corp. now embedding [1]digital rights management > within in its latest dual-core processor Pentium D and accompanying > 945 chipset. Officially launched worldwide on the May 26, the new > offerings come [2]DRM -enabled and will, at least in theory, allow > copyright holders to prevent unauthorized copying and distribution of > copyrighted materials from the motherboard rather than through the > operating system as is currently the case..." [3]The Inquirer has the > story as well. Is slashdot really a news source? How about posting one of the articles cited instead. -- Unable to correct the source of the indignity to the Negro, [the Phoenix, AZ public accommodations law prohibiting racial discrimination] redresses the situation by placing a separate indignity on the proprietor. ... The unwanted customer and the disliked proprietor are left glowering at one another across the lunch counter. -William "Strom" Rehnquist, 1964-06-15 From camera_lumina at hotmail.com Sat May 28 20:26:28 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sat, 28 May 2005 23:26:28 -0400 Subject: /. [Intel Adds DRM to New Chips] In-Reply-To: <20050528195352.GE3361@leitl.org> Message-ID: Eugen Leitl wrote... > from the get-you-where-you-live dept. > Badluck writes "Microsoft and the entertainment industry's holy grail > of controlling copyright through the motherboard has moved a step > closer with Intel Corp. now embedding [1]digital rights management > within in its latest dual-core processor Pentium D and accompanying > 945 chipset. Officially launched worldwide on the May 26, the new > offerings come [2]DRM -enabled and will, at least in theory, allow > copyright holders to prevent unauthorized copying and distribution of > copyrighted materials from the motherboard rather than through the > operating system as is currently the case..." [3]The Inquirer has the > story as well. (Continued) "Contrary to expectations, however, sales of the chip have been suprisingly low, with zero interest shown by major PC manufacturers. One major PC industry executive, who wished to remain anonymous sated: "There are 100s of millions of people trading files every day throughout the globe. I'm going to start using this chip and give up that market because...?" OK, Gov officials will eventually start trying to introduce laws mandating such technologies be used, but by then it's going to come down to a battle of lobbies: The Entertainment industry vs Telecom+PCs++Software. Which can pump dollars into Senatorial hands faster? -TD From GKUIHI at marsall.com Sun May 29 00:38:22 2005 From: GKUIHI at marsall.com (Timothy) Date: Sun, 29 May 2005 03:38:22 -0400 Subject: what are you waiting for? postcard Message-ID: New cialis softtabs, thay last longer and have less sideeffects Softtabs disolve in the mouth to start working faster World wide delivery No prescription needed Private online ordering!! http://visagraph.net/cs/?got droopy you denote me baroness you silken me absentminded you aspheric me draftsman you absorbent me http://coeducation.visagraph.net/rm.php?got From xsltuzxtzwwb at rocketmail.com Sat May 28 22:28:24 2005 From: xsltuzxtzwwb at rocketmail.com (Earnestine Jacob) Date: Sun, 29 May 2005 10:28:24 +0500 Subject: Hi! My name's Lily, wanna see my boddy? alfresco Message-ID: <6676ige35fr304$766266$fy9u5@Carlenen22ub7d1ld> Hi! As I told you, I'm Lily and me and my girlfriends run and operate a site where you can see us nude. We are all teens that love to pose nude and love to show our buddies to your pleasure. Why you ask? Because sexy and horny men like you make us horny too. If you want to watch yourself, come on now! http://www.wudhryc.com/bien/bridgetown/cloth/agreed.htm is the actress sarah glass the character apparently i m a johnny-come-lately to this well-known wedding plot line. una matagalpina orgullosa de su tierra fel icidades por este esfuerzo tan grande seguimos en contacto saludos a todos les escribo de los angeles ca. encore is a publisher and distributor of fine african american art and buffalo soldier collectables. santa fe art gallery - new mexico - features fine art reproductions and originals in oil acrylic pastel encaustic raku and bronze. georgie what do you see in him? i mean is lucas smart? does he read? do you have one single thing in common with him because i sure can t see it. love the pics just so you know remmeber i was the best man at matt and mandy dempsey s o leary wedding cheers and good luck with your wedding ps say hi to naomi for me she may remember! please limit the posts to locating teammates if you have found a team we request that you take down your post so that people do not keep contacting you thank you! well it doesn t take a genius to know that bloggers will take the bait but a red herring it wasn t. i love turtles as well woud like to become involved with the rescue if i can help i would gladly foster!! anyway if you re dog lover enough to read books about them -- but you know who you are -- my friend. neither moore nor his representatives would describe the nature or contents of the interview with berg who held staunch pro-war views. and buy a bunch of cosmetics if they re not the finest cosmetics you ve ever seen hilary will refund octuple your money back no questions asked i m pretty sure that s a guarantee. From eugen at leitl.org Sun May 29 02:05:47 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 29 May 2005 11:05:47 +0200 Subject: /. [Intel Adds DRM to New Chips] In-Reply-To: References: <20050528195352.GE3361@leitl.org> Message-ID: <20050529090547.GP3361@leitl.org> On Sat, May 28, 2005 at 11:26:28PM -0400, Tyler Durden wrote: > (Continued) > "Contrary to expectations, however, sales of the chip have been suprisingly > low, with zero interest shown by major PC manufacturers. One major PC > industry executive, who wished to remain anonymous sated: "There are 100s > of millions of people trading files every day throughout the globe. I'm > going to start using this chip and give up that market because...?" What actually seems to be happening is that chipset DRM is being deployed silently, though not on a wide scale yet, and but for game consoles in a facultative version. Of course, such dormant DRM can be activated with subsequent software upgrades (watch the sneaky software-DRM games Cupertino plays). The billion dollar question is: will users let themselves lock in into the DRM prison, just because of a dangling premium content carrot, and the "I gots your IP, my lawyers 0wnZ0r Ur 455" litigation stick? We're going to see soon, as HDTV on BluRay&Co is going to be that experiment. The next-generation signal lanes to display devices are encrypted, so there's only the analog hole left to the naive user. Online activation of software is already quite widespread, so it seems customers are willing to accept restriction to ownership and use. > OK, Gov officials will eventually start trying to introduce laws mandating > such technologies be used, but by then it's going to come down to a battle > of lobbies: The Entertainment industry vs Telecom+PCs++Software. Which can > pump dollars into Senatorial hands faster? The entertainment industry has an order of magnitude less funds, but seems to spend them far more efficiently. Also, the Far East market is increasingly supplying itself, so Hollywood has less and less angle there. Let US and EU get the crippleware, while the rest of the world gets swamped with plaintext pirated copies (a single break is enough). -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From camera_lumina at hotmail.com Sun May 29 08:44:41 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sun, 29 May 2005 11:44:41 -0400 Subject: /. [Intel Adds DRM to New Chips] In-Reply-To: <20050529090547.GP3361@leitl.org> Message-ID: Eugen Leitl wrote... >Online activation of software is already quite widespread, so it seems >customers are willing to accept restriction to ownership and use. Well, that's an interesting phenomenon. In industrialized nations where the price of software is fairly low compared to the wages, people seem somewhat willing to pay. At least, we don't see ticket sales for big movies going down at all. So it could be that people will eventually voluntarily release control, as long as the consequences (ie, prices) aren't too high. On the other hand, the whole P2P phenomenon is not happening simply because people don't want to pay. Stupid industry execs will probably continue churning out the same stupid shit they always did and P2Pers will find some way around their "protection" if needs be. From lucy.dunne at gmail.com Sun May 29 14:59:20 2005 From: lucy.dunne at gmail.com (Lucy Dunne) Date: Sun, 29 May 2005 17:59:20 -0400 Subject: [wearables] /. [GPS-tracked Clothing] In-Reply-To: <20050529164643.GV3361@leitl.org> References: <20050529164643.GV3361@leitl.org> Message-ID: ahhhh but check out the parent website, contagious media (http://contagiousmedia.org/). the site is a hoax :) --lucy On 5/29/05, Eugen Leitl wrote: > > Link: http://slashdot.org/article.pl?sid=05/05/29/1547234 > Posted by: CmdrTaco, on 2005-05-29 16:07:00 > > from the finally-i-have-to-ask-why dept. > [1]Anil Kandangath writes "A Japanese firm has shown off new > technology that enables GPS units to be embedded [2]in clothing that > will enable the wearer to be tracked continuously. The device is thin > enough to be tacked on unobtrusively and is powered by a thin watch > battery. It is also capable of taking biometric measurements and > [3]transmitting them PCs and handheld devices. Though marketed as a > device to enable people to keep track of spouses, how long before such > technology becomes intrusive in our lives?" Like tracking your spouse > is ok?. What a world! > > References > > 1. http://www.ecogito.net/anil > 2. http://forgetmenotpanties.contagiousmedia.org/ > 3. http://forgetmenotpanties.contagiousmedia.org/sensatech.html > > ----- End forwarded message ----- > -- > Eugen* Leitl leitl > ______________________________________________________________ > ICBM: 48.07100, 11.36820 http://www.leitl.org > 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > > > BodyID:256123721.2.n.logpart (stored separately) From eugen at leitl.org Sun May 29 09:46:43 2005 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 29 May 2005 18:46:43 +0200 Subject: /. [GPS-tracked Clothing] Message-ID: <20050529164643.GV3361@leitl.org> Link: http://slashdot.org/article.pl?sid=05/05/29/1547234 Posted by: CmdrTaco, on 2005-05-29 16:07:00 from the finally-i-have-to-ask-why dept. [1]Anil Kandangath writes "A Japanese firm has shown off new technology that enables GPS units to be embedded [2]in clothing that will enable the wearer to be tracked continuously. The device is thin enough to be tacked on unobtrusively and is powered by a thin watch battery. It is also capable of taking biometric measurements and [3]transmitting them PCs and handheld devices. Though marketed as a device to enable people to keep track of spouses, how long before such technology becomes intrusive in our lives?" Like tracking your spouse is ok?. What a world! References 1. http://www.ecogito.net/anil 2. http://forgetmenotpanties.contagiousmedia.org/ 3. http://forgetmenotpanties.contagiousmedia.org/sensatech.html ----- End forwarded message ----- -- Eugen* Leitl leitl ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From justin-cypherpunks at soze.net Sun May 29 12:28:59 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sun, 29 May 2005 19:28:59 +0000 Subject: /. [GPS-tracked Clothing] In-Reply-To: <20050529164643.GV3361@leitl.org> References: <20050529164643.GV3361@leitl.org> Message-ID: <20050529192859.GA31034@arion.stark.net> On 2005-05-29T18:46:43+0200, Eugen Leitl wrote: > Link: http://slashdot.org/article.pl?sid=05/05/29/1547234 > Posted by: CmdrTaco, on 2005-05-29 16:07:00 > > from the finally-i-have-to-ask-why dept. > [1]Anil Kandangath writes "A Japanese firm has shown off new > technology that enables GPS units to be embedded [2]in clothing that > will enable the wearer to be tracked continuously. The device is thin > enough to be tacked on unobtrusively and is powered by a thin watch > battery. As opposed to a thick watch battery? > It is also capable of taking biometric measurements and > [3]transmitting them PCs and handheld devices. Is that english? I don't think the device transmits PCs and handheld devices to biometric measurements. > Though marketed as a device to enable people to keep track of > spouses, how long before such technology becomes intrusive in our > lives?" Like tracking your spouse is ok?. What a world! I know that isn't english, and it's only marginally coherent. I would much rather read a summary written by someone literate. > References > > 1. http://www.ecogito.net/anil I don't see it. > 2. http://forgetmenotpanties.contagiousmedia.org/ > 3. http://forgetmenotpanties.contagiousmedia.org/sensatech.html Uh huh. This looks like a joke or a scam. Even if it's not, I have a hard time believing that a girlfriend/wife/daughter is not going to notice that in her panties, and I doubt sufficiently miniaturized GPS receivers could be made for so little money. Perhaps that's why Anil seems to have removed the entry in his blog? Do you now understand why I hate redistribution of slashdot stories? -- Unable to correct the source of the indignity to the Negro, [the Phoenix, AZ public accommodations law prohibiting racial discrimination] redresses the situation by placing a separate indignity on the proprietor. ... The unwanted customer and the disliked proprietor are left glowering at one another across the lunch counter. -William "Strom" Rehnquist, 1964-06-15 From justin-cypherpunks at soze.net Sun May 29 12:56:43 2005 From: justin-cypherpunks at soze.net (Justin) Date: Sun, 29 May 2005 19:56:43 +0000 Subject: google maps and latitude, longitude Message-ID: <20050529195643.GA31137@arion.stark.net> For anyone who doesn't already know, there are several ways to get google maps to display a latitude/longitude. You can enter them in the query box like so: 35.5N 115.5W or 35.5,-115.5 (I think they added those within the last week or two.) Or you can use the original method, a GET-style form (I don't know whether POST works):
(lat,long ) (span ) (type )
which translates into http://maps.google.com/maps?q=&ll=33.835%2C-116.99&spn=.001%2C.001&t=k -- Unable to correct the source of the indignity to the Negro, [the Phoenix, AZ public accommodations law prohibiting racial discrimination] redresses the situation by placing a separate indignity on the proprietor. ... The unwanted customer and the disliked proprietor are left glowering at one another across the lunch counter. -William "Strom" Rehnquist, 1964-06-15 From papzi at ntkltd.com Sun May 29 22:56:29 2005 From: papzi at ntkltd.com (Garth) Date: Mon, 30 May 2005 04:56:29 -0100 Subject: you`ll be amazed Dana Message-ID: <0107811074620.01145@jfuertes.maz.es> Increase your CUM VOLUME, and Orgasm Length main benifits: - The longest most intense Orgasms of your life - Erctions like steel - lncreased libido/desire - Stronger ejaculaton (watch where your aiming) - Multiple 0rgasms - Up to 500% more volume (cover her in it if you want) - Studies show it tastes sweeter DISCREET SAME DAY SHIPPING - TRY IT, YOU'LL LOVE IT! (and she'll thank you for it) http://untyred.net/spur/?got dangerous you contribute me romance you trivalent me friedrich you shaw me trevelyan you electrode me medial you transferring me leander you factorial me http://untyred.net/rm.php?got From antnnbmmsseuv at meck-online.de Mon May 30 07:39:18 2005 From: antnnbmmsseuv at meck-online.de (Sallie) Date: Mon, 30 May 2005 17:39:18 +0300 Subject: Increase stamina and endurance Lucien Message-ID: <3.5.34.2081924.0083fc70@ies.edu> Cialis Softabs are better than Pfizer Viagra and normal Cialis because: - Guarantees 36 hours lasting - Safe to take, no side effects at all - Boost and increase sexual performance - Harder erections and quick recharge - Proven and certified by experts and doctors - only $3.99 per tabs Click here: http://hybridisms.com/cs/?got able you apart me corrigenda you aging me glide you counterflow me adjective you trod me melange you meteoric me hewitt you darwin me http://www.hybridisms.com/rm.php?got From SIHQYO at izhneftemash.ru Mon May 30 12:44:10 2005 From: SIHQYO at izhneftemash.ru (Duncan Silva) Date: Mon, 30 May 2005 18:44:10 -0100 Subject: Account update Alberto Message-ID: <3.2.2.7.2.2005109.00b0a90@designs.com> Dear Homeowner, You have been pre-approved for a $402,000 Home Loan at 3.45% Fixed Rate. This offer is being extended to you unconditionally and your credit is in no way a factor. To take Advantage of this Limited Time opportunity all we ask is that you visit our Website and complete the 1 minute post Approval Form. http://www.simple-financing.net/2/index/bvk Best Regards, Duncan Silva Regional CEO breve pt hancock jt mph rnf edwardian zm gerald eb stunt uxg frighten kp birthright zd cultural lws minaret gr dailey kcd beseech sq plastic zhc impractical wbm http://simple-financing.net/rem.php From smb at cs.columbia.edu Mon May 30 18:17:57 2005 From: smb at cs.columbia.edu (Steven M. Bellovin) Date: Mon, 30 May 2005 21:17:57 -0400 Subject: What happened with the session fixation bug? In-Reply-To: Your message of "Sat, 07 May 2005 14:03:07 PDT." <427CCA9B.29132.760A1FC@localhost> Message-ID: <20050531011757.6E6AE3BFFF3@berkshire.machshav.com> In message <427CCA9B.29132.760A1FC at localhost>, "James A. Donald" writes: > -- >PKI was designed to defeat man in the middle attacks >based on network sniffing, or DNS hijacking, which >turned out to be less of a threat than expected. > First, you mean "the Web PKI", not PKI in general. The next part of this is circular reasoning. We don't see network sniffing for credit card numbers *because* we have SSL. Since many of the worm-spread pieces of spyware incorporate sniffers, I'd say that part of the threat model is correct. As for DNS hijacking -- that's what's behind "pharming" attacks. In other words, it's a real threat, too. --Steven M. Bellovin, http://www.cs.columbia.edu/~smb --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From ZVBRLDG at aam.org.uk Mon May 30 17:26:22 2005 From: ZVBRLDG at aam.org.uk (Estelle) Date: Mon, 30 May 2005 21:26:22 -0300 Subject: As seen on CNN - Rolex or Cartier or Breitling Message-ID: <1096562523.452000-77620ZVBRLDG@aam.org.uk> Superb Quality Rolex. The high! profile jewelry you're looking for at the lowest prices in the nation!!.. http://www.perfectwatch4u.com/ Choose from our collection of Rolex watches! you randall me spin me you edinburgh me washout me you actual me olivetti me you debug me cunard me you gerund me tram me you captive me baltimorean me [2 From luffbovgjdb at canada-11.com Mon May 30 08:49:23 2005 From: luffbovgjdb at canada-11.com (Elvis Hinkle) Date: Mon, 30 May 2005 21:49:23 +0600 Subject: Guinea'Bissau News - notes revealing Dating in 2005 Message-ID: <911482269508.RNS82557@brontosaurus.statesmail.com> Hi my name is Kaylee and I'm 27 years old. I have fit body, Black hair and Green eyes. I would like to get to know men. I am a bit shy but open for everything. You can contact me now at: http://cacophonist.golosko.com/dc3r.html (Registration is free of charge) See you soon You're a catch. You know it and we know it. Now it's time to let them know it. 1,451,634 swingers already registered so, what are you waiting for? Just click below and dive right into creating your ad: http://promptitude.golosko.com/dc3r.html If you got this message by mistake, or you do not wish to get messages from dating please click : http://washington.golosko.com/nothanks.php Ion Marketing Limited D2, 23, Borrett Road, Mid-Levels West Hong Kong From julieDukes69 at wipe.net Mon May 30 12:41:36 2005 From: julieDukes69 at wipe.net (Julie London) Date: Mon, 30 May 2005 22:41:36 +0300 Subject: it`s julie :) Message-ID: <267z7fzlsc.fsf@calle20.net> My name is Julie :) This whole semester I felt like I want to do something I've never done before.. idea came to me to have my videos I made with my old boyfriend online ;p. My girlfriends want to join me to on my website. -) Verify your age and connect to my webcam today -) Come check website I put together, I'm not that good tho with comp skills yet but tell me what you think ;0 http://www.tobeatdameat.com/ju18/ you chromatography me avocado me you scythe me spokesperson me you carob me capitol me you cosh me keystone me you tulip me assimilable me you carmine me keeshond me you marvel me black me you daedalus me fragment me you lachesis me merrimack me From XYVCJRTNSOLINC at burntcreektrading.com Mon May 30 14:40:11 2005 From: XYVCJRTNSOLINC at burntcreektrading.com (Aisha) Date: Tue, 31 May 2005 01:40:11 +0400 Subject: Cellulite please be gone Message-ID: <20411130090241.CFB6018DE@infirm.starnetusa.net> Body Wrap at Home to lose 6-20 inches in one hour. With Bodywrap we guarantee: you'll lose 6-8 Inches in one hour 100% Satisfaction or your money back Bodywrap is soothing formula that contours, cleanses and rejuvenates your body while reducing inches. http://bolshoi.yourfitnessonline.com electrocardiogram ket donor ub efficacious txs kalmia zk fetter gz incise gn elizabeth xh provision qv brethren sc crump ck custody fc chaplin fx http://bolshoi.yourfitnessonline.com/r From camera_lumina at hotmail.com Tue May 31 07:22:03 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 31 May 2005 10:22:03 -0400 Subject: e-gold exchange Message-ID: OK...what;s the best exchange service for transferring dollars (perhaps via paypal or credit cards) into egold? -TD From lynn at garlic.com Tue May 31 10:55:37 2005 From: lynn at garlic.com (Anne & Lynn Wheeler) Date: Tue, 31 May 2005 11:55:37 -0600 Subject: What happened with the session fixation bug? In-Reply-To: <427CCA9B.29132.760A1FC@localhost> References: <427CCA9B.29132.760A1FC@localhost> Message-ID: <429CA519.70505@garlic.com> James A. Donald wrote: > PKI was designed to defeat man in the middle attacks > based on network sniffing, or DNS hijacking, which > turned out to be less of a threat than expected. asymmetric cryptography has a pair of keys ... the other of the key-pair decodes what has been encoding by one of them. a business process was defined using this technology where one of the key-pair is designated as public ... and freely distributed and the other of the key-pair is designated as confidential and never divulaged. an authentication business process was defined using public/private business process called digital signature .... where a hash of a message is taken and encoded with the private key. the recipient can recompute the hash of the received message and compare it to the digital signature that has been decoded with the corresponding public key. this catches whether the message has been altered and from 3-factor authentication http://www.garlic.com/~lynn/subpubkey.html#3factor * something you have * something you know * something you are implies "something you have" authentication ... i.e. the originator has access and use of the corresponding private key. PKI was somewhat targeted at the offline email model of the early 80s; the relying party dials up their (electronic) post office, exchanges email, and hangs up. They then may be dealing with first time correspondance from a total stranger with no (offline or online) recourse for determining information about the sender. Relying parties could be seeded with trusted public key repository of trusted third party certification authorities. Stangers could be issued "certificates" (digitally signed by one of these certification authorities) containing informoation about themselves bound to their public key. Email recipients in the offline email days of the early 80s ... could now of source of information regarding first time communication from total strangers (sort of the "letters of credit" model from the sailing ship days). we were asked to work this small client/server startup in menlo park http://www.garlic.com/~lynn/aadsm5.htm#asrn2 http://www.garlic.com/~lynn/aadsm5.htm#asrn3 that wanted to do payments on something they called a commerce server. In the year we worked with them ... they moved from menlo park to mountain view and changed their name (trivia question ... who previously had the rights to their new name? also what large corporate entity was providing most of the funding for the commerce sever?). some topic drift ... recent postings referencing this original e-commerce work as an example of service oriented architecture (SOA): http://www.garlic.com/~lynn/2005i.html#42 http://www.garlic.com/~lynn/2005i.html#43 they had this technology called SSL which was configured at addressing two issues: a) is the webserver that the user had indicated to the browser ... the actual webserver the browser was talking to and b) encryption of the transmitted information. SSL digital certificates would be issued http://www.garlic.com/~lynn/subpubkey.html#sslcert which would contain the domain name of the webserver bound to their public key. the browsers would have trusted public key repository seeded with the public keys of some number of trusted third party certification authorities. the browser SSL process would compare the domain name indicated by the user to the domain name in the digital certificate (after validating the certificate). (at least) two (other) kinds of vulnerabilities/exploits have shown up. 1) in the name of convenience, the browsers have significantly obfuscated the certificate operation from the end-user. attackers have devised ways for the end-users to indicate incorrect webservers ... which the browser SSL process (if it is even invoked) will then gladly validate as the webserver the user indicated. 2) a perceived issue (with knowing that the webserver that a browser is talking to is the webserver the user indicated) were integrity issues in the domain name infrastructure. however, as part of doing this consulting with this small client/server startup ... we also had to do detailed end-to-end business process due dilligence on some number of these certification authorities. it turns out that a certification authority typically has to check with the authoritative agency for the information they are certifying. the authoritative agency for domain name ownership is the domain name infrastructure ... the very institution that there are integrity questions giving rise to the requirement for SSL domain name server certificates. In the second vulnerability, the certification authority industry is somewhat backing a proposal that when somebody registers a domain name with the domain name infrastructure ... they also register their public key. then in future communication with the domain name infrastructure, they digitally sign the communication. the domain name infrastructure then can validate the digital signature using the (certificateless) public key onfile for that domain. This supposedly improves the integrity of the communication between the domain name owner and the domain name infrastructure .... mitigating some possible domain name hijacking exploits (where some other organization becomes recorded as the domain name owner). It turns out that the certification authority industry also has an issue. When somebody makes an application for an SSL domain name certificate, they need to supply a bunch of identification information. This is so the certification authority can perform the expensive, time-consuming and error-prone identification process ... and then do the same with the information on file at the domain name infrastructure as to the owner of the domain name ... and then see if the two domain name owner identifications appear to match. Having an on-file public key for the domain name owner ... the certification authority industry can also require that an SSL domain name applicant, digitally sign their application. Then the certification authority can retrieve the onfile (certificateless) public key and change an expensive, error-prone, and time-consuming identification process into a simple and more reliable authentication process (by retrieving the onfile public key and validating the digital signature). From an e-commerce perspective ... the SSL process was to protect against credit card information havesting for use in fraudulent transactions. However, the major vulnerability/exploit before SSL and after the introduction of SSL ... wasn't against credit card information in flight ... but against huge repositories of credit card information (information at rest). It was much easier for the crooks to steal the information already collected in huge repositories than go to the effort of evesdropping the information inflight and creating their own repositories (fraud return-on-investment, much bigger benefit in stealing large repositories of already collected and organized information). related reference regarding security proportional to risk http://www.garlic.com/~lynn/2001h.html#61 the financial standards working group, x9a10 was given the task of preserving the integrity of the financial infrastructure for all retail payments (as well as some number of other requirements) for x9.59 standard http://www.garlic.com/~lynn/index.html#x959 so some earlier work on PKI-oriented protection for retail payments involved digitally signed transaction oriented protocol with attached digital certificates. in the early 90s, there was some work on x.509 identity certificates. however, there was some issues with ceritifcation authorities predicting exactly what information might be needed by unknown future relying parties ... and so there was some direction to grossly overload these certificates with excessive amounts of personal information. In the mid-90s, some number of institutions were starting to realize that such overloaded repositories of excessive personal information representing significant liability and privacy issues. As a result you saw some retrenchment to relying-party-only certificates http://www.garlic.com/~lynn/subpubkey.html#rpo these were digital certificates that basically contained some kind of database record locator (like an account number) bound to a public key (the database record contained all the real information). however, it became trivial to demonstrate that such relying-party-only certificates were redundant and superfluous. This was, in part because they violated the original design point for certificates ... the relying party not having any other recourse to the necessary information. By definition if all the information was in a relying-party's database ... then by definition the certificate was redundant and superfluous. in this later part of the mid-90s payment scene, these relying-party-only certificates were on the order of 4k-12k bytes. It turns out that a typical retail payment message is 60-80 bytes. Not only were the stale, static, relying-party-only certificates redundant and superfluous ... but they also would contribute to enormous payload bloat (on the order of one hundred times). the other problem with the relying-party-only, redundant and superfluous, stale, staic, enormous payload-bloat digital certificate based infrastructure ... were that they effectively were targeted only at protecting credit card information "in-flight" ... something that SSL was already doing. They were providing no countermeasure for the major vulnerability to the data "at rest". the information at rest was still vulnerable (and was the major exploit already with or w/o SSL) So one of the things in the x9a10 financial standards working group was to do a treat and vulnerability analysis ... and design something that could preserve the integrity of the financial infrastructure for all retail payments (credit, debit, stored-value, online, offline, pos, etc). X9A10 defined a light-weight digitally signed transaction that wouldn't contribute to the enormous payload bloat of the stale, static, redundant and superfluous certificate-based infrastructures. Another issue was the analysis demonstrated that the major treat and vulnerability was to the data at rest. So for X9.59, a business rule was defined ... for account numbers used for X9.59 transactions ... only correctly verified digitally signed transactions (authenticated) could be authorized. An x9.59 transaction was digitally signed, and the relying party could use an on-file public key to validate the digital signature .... showing the transaction wasn't modified in transit and providing "something you have" authentication as to the originator (they had access and use of the corresponding private key). furthermore, evesdropping of the transaction in flight ... and/or harvesting the large transaction databases (information at rest) wouldn't yield information for the crook to perform a fraudulent transaction. the current exploits where knowledge from an existing transaction is sufficient to generate fraudulent transaction has gone away ... for vulnerabilities involving both "data in flight" as well as "data at rest". The issue wasn't that SSL being designed to protect data-in-flight ... the issue was that the major threat/vulnerability has been to "data-at-rest" ... so to some extent, SSL (and the various other countermeasures to "data-in-flight" vulnerabilities) wasn't responding to the major threats. To some extent, e-commerce/internet was opening a theoritical, new vulnerabilities ("data-in-flight") compared to the non-internet world ... and so SSL was somewhat theoritically demonstrating that e-commerce/internet use wouldn't make the situation any worse. Recent studies have indicated that at least 77% of the id theft exploits have involved insiders (supporting the long standing premise that the majority of fraud is by insiders). The introduction of e-commerce and internet have introduced new avenues for attacking data-at-rest by outsiders. As a result, e-commerce/internet potential threats to data-at-rest has contributed to obfuscating responsible insiders in cases of exploits against data-at-rest. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From measl at mfn.org Tue May 31 12:05:14 2005 From: measl at mfn.org (J.A. Terranson) Date: Tue, 31 May 2005 14:05:14 -0500 (CDT) Subject: Trojan horse attack involving many major Israeli companies, executives In-Reply-To: <429C791D.1070108@macs.biu.ac.il> References: <429B1666.90701@macs.biu.ac.il> <20050531130352.GA6447@ralph.worldwinner.com> <429C791D.1070108@macs.biu.ac.il> Message-ID: <20050531140358.R37356@ubzr.zsa.bet> > John Saylor wrote: > > hi > > > > ( 05.05.30 15:34 +0200 ) Amir Herzberg: > > > >>See more info e.g. at http://www.haaretz.com/hasen/spages/581790.html > > > > > > an excellent tale [still unfolding]- no doubt coming to a bookstore or > > movie theatre near you real soon. > > > > of course, it was never mentioned in the article, but they *had* to be > > running windows. So, how long before someone, possibly even me, points out that all Checkpoint software is built in Israel? -- Yours, J.A. Terranson sysadmin at mfn.org 0xBD4A95BF "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer 1907 Speech From lynn at garlic.com Tue May 31 13:05:51 2005 From: lynn at garlic.com (Anne & Lynn Wheeler) Date: Tue, 31 May 2005 14:05:51 -0600 Subject: "SSL stops credit card sniffing" is a correlation/causality myth In-Reply-To: <20050531183839.89CBA3BFFF9@berkshire.machshav.com> References: <20050531183839.89CBA3BFFF9@berkshire.machshav.com> Message-ID: <429CC39F.7040502@garlic.com> Steven M. Bellovin wrote: > Given the prevalance of password sniffers as early as 1993, and given > that credit card number sniffing is technically easier -- credit card > numbers will tend to be in a single packet, and comprise a > self-checking string, I stand by my statement. the major exploits have involved data-at-rest ... not data-in-flight. internet credit card sniffing can be easier than password sniffing .... but that doesn't mean that the fraud cost/benefit ratio is better than harvesting large transaction database files. you could possibly conjecture password sniffing enabling compromise/exploits of data-at-rest ... quick in&out and may have months worth of transaction information all nicely organized. to large extent SSL was used to show that internet/e-commerce wouldn't result in the theoritical sniffing making things worse (as opposed to addressing the major fraud vulnerability & treat). internet/e-commerce did increase the threats & vulnerabilities to the transaction database files (data-at-rest) ... which is were the major threat has been. There has been a proliferation of internet merchants with electronic transaction database files ... where there may be various kinds of internet access to the databases. Even when the prevalent risk to these files has been from insiders ... the possibility of outsider compromise can still obfuscate tracking down who is actually responsible. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From smb at cs.columbia.edu Tue May 31 11:38:39 2005 From: smb at cs.columbia.edu (Steven M. Bellovin) Date: Tue, 31 May 2005 14:38:39 -0400 Subject: "SSL stops credit card sniffing" is a correlation/causality myth In-Reply-To: Your message of "Tue, 31 May 2005 18:31:04 BST." <200505311831.15142.iang@systemics.com> Message-ID: <20050531183839.89CBA3BFFF9@berkshire.machshav.com> In message <200505311831.15142.iang at systemics.com>, Ian G writes: >On Tuesday 31 May 2005 02:17, Steven M. Bellovin wrote: >> In message <427CCA9B.29132.760A1FC at localhost>, "James A. Donald" writes: >> > -- >> >PKI was designed to defeat man in the middle attacks >> >based on network sniffing, or DNS hijacking, which >> >turned out to be less of a threat than expected. >> >> First, you mean "the Web PKI", not PKI in general. >> >> The next part of this is circular reasoning. We don't see network >> sniffing for credit card numbers *because* we have SSL. > >I think you meant to write that James' reasoning is >circular, but strangely, your reasoning is at least as >unfounded - correlation not causality. And I think >the evidence is pretty much against any causality, >although this will be something that is hard to show, >in the absence. Given the prevalance of password sniffers as early as 1993, and given that credit card number sniffing is technically easier -- credit card numbers will tend to be in a single packet, and comprise a self-checking string, I stand by my statement. > > * AFAICS, a non-trivial proportion of credit >card traffic occurs over totally unprotected >traffic, and that has never been sniffed as far as >anyone has ever reported. (By this I mean lots of >small merchants with MOTO accounts that don't >bother to set up "proper" SSL servers.) Given what a small percentage of ecommerce goes to those sites, I don't think it's really noticeable. > > * We know that from our experiences >of the wireless 802.11 crypto - even though we've >got repeated breaks and the FBI even demonstrating >how to break it, and the majority of people don't even >bother to turn on the crypto, there remains practically >zero evidence that anyone is listening. > > FBI tells you how to do it: > https://www.financialcryptography.com/mt/archives/000476. Sure -- but setting up WEP is a nuisance. SSL (mostly) just works. As for your assertion that no one is listening, I'm not sure what kind of evidence you'd seek. There's plenty of evidence that people abuse unprotected access points to gain connectivity. > >As an alternate hypothesis, credit cards are not >sniffed and never will be sniffed simply because >that is not economic. If you can hack a database >and lift 10,000++ credit card numbers, or simply >buy the info from some insider, why would an >attacker ever bother to try and sniff the wire to >pick up one credit card number at a time? Sure -- that's certainly the easy way to do it. > >And if they did, why would we care? Better to >let a stupid thief find a way to remove himself from >a life of crime than to channel him into a really >dangerous and expensive crime like phishing, >box cracking, and purchasing identity info from >insiders. > >> Since many of >> the worm-spread pieces of spyware incorporate sniffers, I'd say that >> part of the threat model is correct. > >But this is totally incorrect! The spyware installs on the >users' machines, and thus does not need to sniff the >wire. The assumption of SSL is (as written up in Eric's >fine book) that the wire is insecure and the node is >secure, and if the node is insecure then we are sunk. I meant precisely what I said and I stand by my statement. I'm quite well aware of the difference between network sniffers and keystroke loggers. > > Eric's book and "1.2 The Internet Threat Model" > http://iang.org/ssl/rescorla_1.html > >Presence of keyboard sniffing does not give us any >evidence at all towards wire sniffing and only serves >to further embarrass the SSL threat model. > >> As for DNS hijacking -- that's what's behind "pharming" attacks. In >> other words, it's a real threat, too. > >Yes, that's being tried now too. This is I suspect the >one area where the SSL model correctly predicted >a minor threat. But from what I can tell, server-based >DNS hijacking isn't that successful for the obvious >reasons (attacking the ISP to get to the user is a >higher risk strategy than makes sense in phishing). They're using cache contamination attacks, among other things. ... > >As perhaps further evidence of the black mark against >so-called secure browsing, phishers still have not >bothered to acquire control-of-domain certs for $30 >and use them to spoof websites over SSL. > >Now, that's either evidence that $30 is too much to >pay, or that users just ignore the certs and padlocks >so it is no big deal anyway. Either way, a model >that is bypassed so disparagingly without even a >direct attack on the PKI is not exactly recommending >itself. I agre completely that virtually no one checks certificates (or even knows what they are). --Steven M. Bellovin, http://www.cs.columbia.edu/~smb --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From pqxhcoylldzjop at riskingconnection.com Tue May 31 15:09:58 2005 From: pqxhcoylldzjop at riskingconnection.com (Trevor) Date: Tue, 31 May 2005 16:09:58 -0600 Subject: you`re a fool if you wont give it a shot globe In-Reply-To: <8237929.00b0a2660@designs.com> Message-ID: <080.2@melbpc.org.au> New cialis softtabs, thay last longer and have less sideeffects Softtabs disolve in the mouth to start working faster World wide delivery No prescription needed Private online ordering!! http://hybridisms.com/cs/?got effort you lombardy me vivacious you bluestocking me banjo you roughen me judas you crematory me curl you pounce me coprinus you godmother me http://drag.hybridisms.com/rm.php?got From EGOAJ at cwinchellagency.com Tue May 31 06:05:49 2005 From: EGOAJ at cwinchellagency.com (Ed) Date: Tue, 31 May 2005 17:05:49 +0400 Subject: Mr Rolex Message-ID: <1096322523.407000-77673EGOAJ@cwinchellagency.com> Get the Finest Rolex Watch Replica ! We only sell premium watches. There's no battery in these replicas just like the real ones since they charge themselves as you move. The second hand moves JUST like the real ones, too. These original watches sell in stores for thousands of dollars. We sell them for much less. - Replicated to the Smallest Detail - 98% Perfectly Accurate Markings - Signature Green Sticker w/ Serial Number on Watch Back - Magnified Quickset Date - Includes all Proper Markings http://www.perfectwatch4u.com/ you neuroses me anorthosite me [2 From iang at systemics.com Tue May 31 10:31:04 2005 From: iang at systemics.com (Ian G) Date: Tue, 31 May 2005 18:31:04 +0100 Subject: "SSL stops credit card sniffing" is a correlation/causality myth In-Reply-To: <20050531011757.6E6AE3BFFF3@berkshire.machshav.com> References: <20050531011757.6E6AE3BFFF3@berkshire.machshav.com> Message-ID: <200505311831.15142.iang@systemics.com> On Tuesday 31 May 2005 02:17, Steven M. Bellovin wrote: > In message <427CCA9B.29132.760A1FC at localhost>, "James A. Donald" writes: > > -- > >PKI was designed to defeat man in the middle attacks > >based on network sniffing, or DNS hijacking, which > >turned out to be less of a threat than expected. > > First, you mean "the Web PKI", not PKI in general. > > The next part of this is circular reasoning. We don't see network > sniffing for credit card numbers *because* we have SSL. I think you meant to write that James' reasoning is circular, but strangely, your reasoning is at least as unfounded - correlation not causality. And I think the evidence is pretty much against any causality, although this will be something that is hard to show, in the absence. * AFAICS, a non-trivial proportion of credit card traffic occurs over totally unprotected traffic, and that has never been sniffed as far as anyone has ever reported. (By this I mean lots of small merchants with MOTO accounts that don't bother to set up "proper" SSL servers.) * We know that from our experiences of the wireless 802.11 crypto - even though we've got repeated breaks and the FBI even demonstrating how to break it, and the majority of people don't even bother to turn on the crypto, there remains practically zero evidence that anyone is listening. FBI tells you how to do it: https://www.financialcryptography.com/mt/archives/000476.html As an alternate hypothesis, credit cards are not sniffed and never will be sniffed simply because that is not economic. If you can hack a database and lift 10,000++ credit card numbers, or simply buy the info from some insider, why would an attacker ever bother to try and sniff the wire to pick up one credit card number at a time? And if they did, why would we care? Better to let a stupid thief find a way to remove himself from a life of crime than to channel him into a really dangerous and expensive crime like phishing, box cracking, and purchasing identity info from insiders. > Since many of > the worm-spread pieces of spyware incorporate sniffers, I'd say that > part of the threat model is correct. But this is totally incorrect! The spyware installs on the users' machines, and thus does not need to sniff the wire. The assumption of SSL is (as written up in Eric's fine book) that the wire is insecure and the node is secure, and if the node is insecure then we are sunk. Eric's book and "1.2 The Internet Threat Model" http://iang.org/ssl/rescorla_1.html Presence of keyboard sniffing does not give us any evidence at all towards wire sniffing and only serves to further embarrass the SSL threat model. > As for DNS hijacking -- that's what's behind "pharming" attacks. In > other words, it's a real threat, too. Yes, that's being tried now too. This is I suspect the one area where the SSL model correctly predicted a minor threat. But from what I can tell, server-based DNS hijacking isn't that successful for the obvious reasons (attacking the ISP to get to the user is a higher risk strategy than makes sense in phishing). User node-based hijacking might be more successful. Again, that's on the node, so it can totally bypass any PKI based protections anyway. I say "minor threat" because you have to look at the big picture: attackers have figured out a way to breach the secure browsing model so well and so economically that they now have lots and lots of investment money, and are gradually working their way through the various lesser ways of attacking secure browsing. As perhaps further evidence of the black mark against so-called secure browsing, phishers still have not bothered to acquire control-of-domain certs for $30 and use them to spoof websites over SSL. Now, that's either evidence that $30 is too much to pay, or that users just ignore the certs and padlocks so it is no big deal anyway. Either way, a model that is bypassed so disparagingly without even a direct attack on the PKI is not exactly recommending itself. iang -- Advances in Financial Cryptography: https://www.financialcryptography.com/mt/archives/000458.html --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com From Jackie.Kearney at viceland.com Tue May 31 19:49:01 2005 From: Jackie.Kearney at viceland.com (Kyle Colvin) Date: Tue, 31 May 2005 18:49:01 -0800 Subject: Investor's Insight Are Penny Stock Poised to Explode Higher? Message-ID: <748t855s.0888319@workingwounded.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 321 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: rpp.gif Type: image/gif Size: 25340 bytes Desc: not available URL: From camera_lumina at hotmail.com Tue May 31 17:05:05 2005 From: camera_lumina at hotmail.com (Tyler Durden) Date: Tue, 31 May 2005 20:05:05 -0400 Subject: Trojan horse attack involving many major Israeli companies, executives In-Reply-To: <20050531140358.R37356@ubzr.zsa.bet> Message-ID: Fuck. There's no excuse for some of this crap. How bout we stop litigating against Trojans and other spyware, at least as far as corporations are concerned. Or wait, they get a trojan and lose data then a CTO goes to jail instead. OK, not Cypherpunkly enough...OK, security or credit card company loses 100,000 cardnumbers to a trojan and an auto-posse forms to string up that company's CTO. Joking aside, anti-spyware legislation is making some of these companies awfully lazy. -TD >From: "J.A. Terranson" >To: "cypherpunks at al-qaeda.net" >CC: "'Cryptography'" >Subject: Re: Trojan horse attack involving many major Israeli companies, >executives >Date: Tue, 31 May 2005 14:05:14 -0500 (CDT) > > > John Saylor wrote: > > > hi > > > > > > ( 05.05.30 15:34 +0200 ) Amir Herzberg: > > > > > >>See more info e.g. at http://www.haaretz.com/hasen/spages/581790.html > > > > > > > > > an excellent tale [still unfolding]- no doubt coming to a bookstore or > > > movie theatre near you real soon. > > > > > > of course, it was never mentioned in the article, but they *had* to be > > > running windows. > >So, how long before someone, possibly even me, points out that all >Checkpoint software is built in Israel? > > >-- >Yours, > >J.A. Terranson >sysadmin at mfn.org >0xBD4A95BF > > >"Never belong to any party, always oppose privileged classes and public >plunderers, never lack sympathy with the poor, always remain devoted to >the public welfare, never be satisfied with merely printing news, always >be drastically independent, never be afraid to attack wrong, whether by >predatory plutocracy or predatory poverty." > >Joseph Pulitzer >1907 Speech