From rosiofl at cnh.com Sat Jan 1 00:40:02 2011 From: rosiofl at cnh.com (Keely Rosio) Date: Sat, 01 Jan 2011 01:40:02 -0700 Subject: Ro1exWatches Are The Best Christmas Gift Message-ID: <201101010142.636CC5ABCCDEBD0E1DB8@mc133ey36c> Rep1icaWatches - perfect clones of well-known watches Cartier, Chopard, Panerai, Breitling, Bvlgari, Panerai, Franck Muller, Glashutte, Omega, ... http://handrun.ru From tandratg at themoscowtimes.com Sat Jan 1 22:30:04 2011 From: tandratg at themoscowtimes.com (Shaina Tandra) Date: Sat, 01 Jan 2011 23:30:04 -0700 Subject: PenisEnlargement Pill - $59.95 Message-ID: <63x53s13v64-41611609-423g3c81@fhhutfavi> PenisEnlargement Pill - $59.95 EnlargeYourPenis size up to 4 inches in length and up to 25% in girth with most powerful and 100% Natural and Safe Pills RiskFree 60-day money back guaraanteeed http://greetscrub.ru From 0-2ces at elistas.net Sat Jan 1 21:23:32 2011 From: 0-2ces at elistas.net (~Order-Cialis~) Date: Sun, 2 Jan 2011 00:23:32 -0500 Subject: The Best Meds On The Net Message-ID: <5219300230.4UHA2HRR521221@ewhuzxf.ludauiyomyfjn.ua> Dont let your relationship become Stale, keep it exciting! Satisfaction Guaranteed! http://lb.vg/yA9CQ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 281 bytes Desc: not available URL: From stephanieterripa at gartmore.com Sun Jan 2 01:48:30 2011 From: stephanieterripa at gartmore.com (Stephanie Terri) Date: Sun, 02 Jan 2011 02:48:30 -0700 Subject: Exact Rep1icaWatches - Cheap Quality Exact Rep1icaWatches For Sale Message-ID: <4d2049ee.d8849fd4@gartmore.com> Rep1icaWatches - perfect clones of well-known watches Cartier, Chopard, Panerai, Breitling, Bvlgari, Panerai, Franck Muller, Glashutte, Omega, ... http://lockadmit.ru From p.milaps at guwahatifunda.com Sun Jan 2 14:52:45 2011 From: p.milaps at guwahatifunda.com (Louanne Mila) Date: Sun, 02 Jan 2011 15:52:45 -0700 Subject: BuyViagra 60 pills 100mg $98.12 Message-ID: <4d2101bd.80992d1a@guwahatifunda.com> BuyViagra 60 pills 100mg $98.12 High quality Generic and OriginalViagra. 100% Satisfaction Guaranteed. Fast shipping to USA with 2nd day delivery option. Up to 10 Free Pills with your order! Visa, MC, Amex accepted. http://pmxxi.ru From joseph.prasad at gmail.com Sun Jan 2 22:03:36 2011 From: joseph.prasad at gmail.com (Joseph Prasad) Date: Sun, 2 Jan 2011 22:03:36 -0800 Subject: Wikileaks, Friend or Foe? Message-ID: A very good interview with John Young on Russia Today. http://www.youtube.com/watch?v=oMRUiB_8tTc ------- mentioned in the interview------ http://cryptome.org/ http://en.wikipedia.org/wiki/Cypherpunks *--------------------------------* *The only power people exert over us, is the power we allow them to exert.* * * *http://www.projectcensored.org/* * * *http://www.thenewamerican.com/* *--------------------------------* * * ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From ionamariello at aenigma.net Mon Jan 3 01:54:14 2011 From: ionamariello at aenigma.net (Iona Mariel) Date: Mon, 03 Jan 2011 02:54:14 -0700 Subject: Save your time and money! {EnlargePenis} Message-ID: <4d219cc6.41c90977@aenigma.net> EnlargeYourPenis. {EnlargePenis} The Safest & Most Effective Method Of Penis Enlargement Save your time and money with our pills! http://bilidlo.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 522 bytes Desc: not available URL: From eugen at leitl.org Mon Jan 3 00:41:21 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 3 Jan 2011 09:41:21 +0100 Subject: Wikileaks, Friend or Foe? Message-ID: <20110103084121.GI16518@leitl.org> ----- Forwarded message from Joseph Prasad ----- From measl at mfn.org Mon Jan 3 10:58:56 2011 From: measl at mfn.org (J.A. Terranson) Date: Mon, 3 Jan 2011 12:58:56 -0600 (CST) Subject: Computers That See You and Keep Watch Over You In-Reply-To: <20110103165757.GA16518@leitl.org> References: <20110103165757.GA16518@leitl.org> Message-ID: > Google could have put face recognition into the Goggles application; indeed, > many users have asked for it. But Google decided against it because > smartphones can be used to take pictures of individuals without their > knowledge, and a face match could retrieve all kinds of personal information > b name, occupation, address, workplace. > > b It was just too sensitive, and we didnbt want to go there,b said Eric E. > Schmidt, the chief executive of Google. b You want to avoid enabling stalker > behavior.b Coming from Google, "not wanting to enable stalker behaviour" is a rich irony indeed. The world's largest and most sophisticated stalker "has concerns"... Yeah. //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From 0-osa-0 at jcom.home.ne.jp Mon Jan 3 06:39:49 2011 From: 0-osa-0 at jcom.home.ne.jp (The_#1_internet ~RX~) Date: Mon, 3 Jan 2011 15:39:49 +0100 Subject: Pehntiemrne is the leading appetite suppressant Message-ID: <7698727474.HH59BZZU878112@ieojaqqmb.nflpvoyedv.info> Our Product does wonders in the bed-room... Follow the link to Order http://www.buzzroll.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 273 bytes Desc: not available URL: From eugen at leitl.org Mon Jan 3 08:57:57 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 3 Jan 2011 17:57:57 +0100 Subject: Computers That See You and Keep Watch Over You Message-ID: <20110103165757.GA16518@leitl.org> http://www.nytimes.com/2011/01/02/science/02see.html?_r=1&pagewanted=print Computers That See You and Keep Watch Over You By STEVE LOHR Hundreds of correctional officers from prisons across America descended last spring on a shuttered penitentiary in West Virginia for annual training exercises. Some officers played the role of prisoners, acting like gang members and stirring up trouble, including a mock riot. The latest in prison gear got a workout b body armor, shields, riot helmets, smoke bombs, gas masks. And, at this yearbs drill, computers that could see the action. Perched above the prison yard, five cameras tracked the play-acting prisoners, and artificial-intelligence software analyzed the images to recognize faces, gestures and patterns of group behavior. When two groups of inmates moved toward each other, the experimental computer system sent an alert b a text message b to a corrections officer that warned of a potential incident and gave the location. The computers cannot do anything more than officers who constantly watch surveillance monitors under ideal conditions. But in practice, officers are often distracted. When shifts change, an observation that is worth passing along may be forgotten. But machines do not blink or forget. They are tireless assistants. The enthusiasm for such systems extends well beyond the nationbs prisons. High-resolution, low-cost cameras are proliferating, found in products like smartphones and laptop computers. The cost of storing images is dropping, and new software algorithms for mining, matching and scrutinizing the flood of visual data are progressing swiftly. A computer-vision system can watch a hospital room and remind doctors and nurses to wash their hands, or warn of restless patients who are in danger of falling out of bed. It can, through a computer-equipped mirror, read a manbs face to detect his heart rate and other vital signs. It can analyze a womanbs expressions as she watches a movie trailer or shops online, and help marketers tailor their offerings accordingly. Computer vision can also be used at shopping malls, schoolyards, subway platforms, office complexes and stadiums. All of which could be helpful b or alarming. bMachines will definitely be able to observe us and understand us better,b said Hartmut Neven, a computer scientist and vision expert at Google. bWhere that leads is uncertain.b Google has been both at the forefront of the technologybs development and a source of the anxiety surrounding it. Its Street View service, which lets Internet users zoom in from above on a particular location, faced privacy complaints. Google will blur out peoplebs homes at their request. Google has also introduced an application called Goggles, which allows people to take a picture with a smartphone and search the Internet for matching images. The companybs executives decided to exclude a facial-recognition feature, which they feared might be used to find personal information on people who did not know that they were being photographed. Despite such qualms, computer vision is moving into the mainstream. With this technological evolution, scientists predict, people will increasingly be surrounded by machines that can not only see but also reason about what they are seeing, in their own limited way. The uses, noted Frances Scott, an expert in surveillance technologies at the National Institute of Justice, the Justice Departmentbs research agency, could allow the authorities to spot a terrorist, identify a lost child or locate an Alzheimerbs patient who has wandered off. The future of law enforcement, national security and military operations will most likely rely on observant machines. A few months ago, the Defense Advanced Research Projects Agency, the Pentagonbs research arm, awarded the first round of grants in a five-year research program called the Mindbs Eye. Its goal is to develop machines that can recognize, analyze and communicate what they see. Mounted on small robots or drones, these smart machines could replace human scouts. bThese things, in a sense, could be team members,b said James Donlon, the programbs manager. Millions of people now use products that show the progress that has been made in computer vision. In the last two years, the major online photo-sharing services b Picasa by Google, Windows Live Photo Gallery by Microsoft, Flickr by Yahoo and iPhoto by Apple b have all started using face recognition. A user puts a name to a face, and the service finds matches in other photographs. It is a popular tool for finding and organizing pictures. Kinect, an add-on to Microsoftbs Xbox 360 gaming console, is a striking advance for computer vision in the marketplace. It uses a digital camera and sensors to recognize people and gestures; it also understands voice commands. Players control the computer with waves of the hand, and then move to make their on-screen animated stand-ins b known as avatars b run, jump, swing and dance. Since Kinect was introduced in November, game reviewers have applauded, and sales are surging. To Microsoft, Kinect is not just a game, but a step toward the future of computing. bItbs a world where technology more fundamentally understands you, so you donbt have to understand it,b said Alex Kipman, an engineer on the team that designed Kinect. bPlease Wash Your Handsb A nurse walks into a hospital room while scanning a clipboard. She greets the patient and washes her hands. She checks and records his heart rate and blood pressure, adjusts the intravenous drip, turns him over to look for bed sores, then heads for the door but does not wash her hands again, as protocol requires. bPardon the interruption,b declares a recorded womenbs voice, with a slight British accent. bPlease wash your hands.b Three months ago, Bassett Medical Center in Cooperstown, N.Y., began an experiment with computer vision in a single hospital room. Three small cameras, mounted inconspicuously on the ceiling, monitor movements in Room 542, in a special care unit (a notch below intensive care) where patients are treated for conditions like severe pneumonia, heart attacks and strokes. The cameras track people going in and out of the room as well as the patientbs movements in bed. The first applications of the system, designed by scientists at General Electric, are immediate reminders and alerts. Doctors and nurses are supposed to wash their hands before and after touching a patient; lapses contribute significantly to hospital-acquired infections, research shows. The camera over the bed delivers images to software that is programmed to recognize movements that indicate when a patient is in danger of falling out of bed. The system would send an alert to a nearby nurse. If the results at Bassett prove to be encouraging, more features can be added, like software that analyzes facial expressions for signs of severe pain, the onset of delirium or other hints of distress, said Kunter Akbay, a G.E. scientist. Hospitals have an incentive to adopt tools that improve patient safety. Medicare and Medicaid are adjusting reimbursement rates to penalize hospitals that do not work to prevent falls and pressure ulcers, and whose doctors and nurses do not wash their hands enough. But it is too early to say whether computer vision, like the system being tried out at Bassett, will prove to be cost-effective. Mirror, Mirror Daniel J. McDuff, a graduate student, stood in front of a mirror at the Massachusetts Institute of Technologybs Media Lab. After 20 seconds or so, a figure b 65, the number of times his heart was beating per minute b appeared at the mirrorbs bottom. Behind the two-way mirror was a Web camera, which fed images of Mr. McDuff to a computer whose software could track the blood flow in his face. The software separates the video images into three channels b for the basic colors red, green and blue. Changes to the colors and to movements made by tiny contractions and expansions in blood vessels in the face are, of course, not apparent to the human eye, but the computer can see them. bYour heart-rate signal is in your face,b said Ming-zher Poh, an M.I.T. graduate student. Other vital signs, including breathing rate, blood-oxygen level and blood pressure, should leave similar color and movement clues. The pulse-measuring project, described in research published in May by Mr. Poh, Mr. McDuff and Rosalind W. Picard, a professor at the lab, is just the beginning, Mr. Poh said. Computer vision and clever software, he said, make it possible to monitor humansb vital signs at a digital glance. Daily measurements can be analyzed to reveal that, for example, a personbs risk of heart trouble is rising. bThis can happen, and in the future it will be in mirrors,b he said. Faces can yield all sorts of information to watchful computers, and the M.I.T. studentsb adviser, Dr. Picard, is a pioneer in the field, especially in the use of computing to measure and communicate emotions. For years, she and a research scientist at the university, Rana el-Kaliouby, have applied facial-expression analysis software to help young people with autism better recognize the emotional signals from others that they have such a hard time understanding. The two women are the co-founders of Affectiva, a company in Waltham, Mass., that is beginning to market its facial-expression analysis software to manufacturers of consumer products, retailers, marketers and movie studios. Its mission is to mine consumersb emotional responses to improve the designs and marketing campaigns of products. John Ross, chief executive of Shopper Sciences, a marketing research company that is part of the Interpublic Group, said Affectivabs technology promises to give marketers an impartial reading of the sequence of emotions that leads to a purchase, in a way that focus groups and customer surveys cannot. bYou can see and analyze how people are reacting in real time, not what they are saying later, when they are often trying to be polite,b he said. The technology, he added, is more scientific and less costly than having humans look at store surveillance videos, which some retailers do. The facial-analysis software, Mr. Ross said, could be used in store kiosks or with Webcams. Shopper Sciences, he said, is testing Affectivabs software with a major retailer and an online dating service, neither of which he would name. The dating service, he said, was analyzing usersb expressions in search of btrigger wordsb in personal profiles that people found appealing or off-putting. Watching the Watchers Maria Sonin, 33, an office worker in Waltham, Mass., sat in front of a notebook computer looking at a movie trailer while Affectivabs software, through the PCbs Webcam, calibrated her reaction. The trailer was for bLittle Fockers,b starring Robert De Niro and Ben Stiller, which opened just before Christmas. The software measured her reactions by tracking movements on a couple of dozen points on her face b mostly along the eyes, eyebrows, nose and the perimeter of her lips. To the human eye, Ms. Sonin appeared to be amused. The software agreed, said Dr. Kaliouby, though it used a finer-grained analysis, like recording that her smiles were symmetrical (signaling amusement, not embarrassment) and not smirks. The software, Ms. Kaliouby said, allows for continuous, objective measurement of viewersb response to media, and in the future will do so in large numbers on the Web. Ms. Sonin, an unpaid volunteer, said later that she did not think about being recorded by the Webcam. bIt wasnbt as if it was a big camera in front of you,b she said. Christopher Hamilton, a technical director of visual effects, has used specialized software to analyze facial expressions and recreate them on the screen. The films he has worked on include bKing Kong,b bCharlottebs Webb and bThe Matrix Revolutions.b Using facial-expression analysis technology to gauge the reaction of viewers, who agree to be watched, may well become a valuable tool for movie makers, said Mr. Hamilton, who is not involved with Affectiva. Today, sampling audience reaction before a movie is released typically means gathering a couple of hundred people at a preview screening. The audience members then answer questions and fill out surveys. Yet viewers, marketing experts say, are often inarticulate and imprecise about their emotional reactions. The software bmakes it possible to measure audience response with a scene-by-scene granularity that the current survey-and-questionnaire approach cannot,b Mr. Hamilton said. A director, he added, could find out, for example, that although audience members liked a movie over all, they did not like two or three scenes. Or he could learn that a particular character did not inspire the intended emotional response. Emotion-sensing software, Mr. Hamilton said, might become part of the entertainment experience b especially as more people watch movies and programs on Internet-connected televisions, computers and portable devices. Viewers could share their emotional responses with friends using recommendation systems based on what scene b say, the protagonistsb dancing or a car chase b delivered the biggest emotional jolt. Affectiva, Dr. Picard said, intends to offer its technology as bopt-in only,b meaning consumers have to be notified and have to agree to be watched online or in stores. Affectiva, she added, has turned down companies, which she declined to name, that wanted to use its software without notifying customers. Darker Possibilities Dr. Picard enunciates a principled stance, but one that could become problematic in other hands. The challenge arises from the prospect of the rapid spread of less-expensive yet powerful computer-vision technologies. At work or school, the technology opens the door to a computerized supervisor that is always watching. Are you paying attention, goofing off or daydreaming? In stores and shopping malls, smart surveillance could bring behavioral tracking into the physical world. More subtle could be the effect of a person knowing that he is being watched b and how that awareness changes his thinking and actions. It could be beneficial: a person thinks twice and a crime goes uncommitted. But might it also lead to a society that is less spontaneous, less creative, less innovative? bWith every technology, there is a dark side,b said Hany Farid, a computer scientist at Dartmouth. bSometimes you can predict it, but often you canbt.b A decade ago, he noted, no one predicted that cellphones and text messaging would lead to traffic accidents caused by distracted drivers. And, he said, it was difficult to foresee that the rise of Facebook and Twitter and personal blogs would become troves of data to be collected and exploited in tracking peoplebs online behavior. Often, a technology that is benign in one setting can cause harm in a different context. Google confronted that problem this year with its face-recognition software. In its Picasa photo-storing and sharing service, face recognition helps people find and organize pictures of family and friends. But the company took a different approach with Goggles, which lets a person snap a photograph with a smartphone, setting off an Internet search. Take a picture of the Eiffel Tower and links to Web pages with background information and articles about it appear on the phonebs screen. Take a picture of a wine bottle and up come links to reviews of that vintage. Google could have put face recognition into the Goggles application; indeed, many users have asked for it. But Google decided against it because smartphones can be used to take pictures of individuals without their knowledge, and a face match could retrieve all kinds of personal information b name, occupation, address, workplace. bIt was just too sensitive, and we didnbt want to go there,b said Eric E. Schmidt, the chief executive of Google. bYou want to avoid enabling stalker behavior.b From eugen at leitl.org Mon Jan 3 11:02:16 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 3 Jan 2011 20:02:16 +0100 Subject: Computers That See You and Keep Watch Over You In-Reply-To: References: <20110103165757.GA16518@leitl.org> Message-ID: <20110103190216.GC16518@leitl.org> On Mon, Jan 03, 2011 at 12:58:56PM -0600, J.A. Terranson wrote: > Coming from Google, "not wanting to enable stalker behaviour" is a rich > irony indeed. The world's largest and most sophisticated stalker "has > concerns"... Yeah. Yeah, the Schmidt person is probably engaging in belated perception management. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From measl at mfn.org Mon Jan 3 22:38:29 2011 From: measl at mfn.org (J.A. Terranson) Date: Tue, 4 Jan 2011 00:38:29 -0600 (CST) Subject: Assange as the Stainless Steel Rat Message-ID: http://bajanreporter.com/julian-assange-the-stainless-steel-rat-by-mattokunobaka/ Julian Assange: The Stainless Steel Rat by Mattokunobaka Going through news stories this morning, I found one that had caught my eye: .Julian Assange to Appear in Court to Appeal. , located at http://www.commondreams.org/headline/2010/12/13-13 . Having an interest in the case against Mr Assange, and especially the behavior of the United States towards him, I proceeded to read the report, when a certain passage suddenly leapt out at me. .Meanwhile a dating site profile from 2007, supposedly created by Assange, had prompted by some lively online debate. The profile on the OKCupid site featured pictures of Assange, though gave the name Harry Harrison . who described himself as a .passionate and often pig- headed activist intellectual. who sought to change the world. He concluded: .Write to me if you are brave.. (emphasis mine). I went to the site named and saved a screenshot of the page, located at http://www.okcupid.com/profile/HarryHarrison (NOTE: as of 1.30pm today, OKCupid has removed the page from public view, requiring registration to view the page.) While I was looking over the page, however, it suddenly hit me.I had a major key to his personality and the way his thought processes work. Quite simple, actually. I.ll refrain from commenting on the case itself at this time, but I can clear up one little mystery: the nom de guerre or username on the OKCupid site. If the site is confirmed as his, as is likely, the pseudonym .Harry Harrison. is entirely reasonable and to be expected, because it confirms that Assange is a fan of science fiction. And it.s a key to the mind of Julian Assange. The author Harry Harrison wrote a series of science fiction novels about a character named James Bolivar deGriz, alias .Slippery Jim., or .The Stainless Steel Rat.. The original novel was written in 1961; the last was published this year. I have the first five or so novels in my personal library, and they.re great favorites of mine. deGriz lived in a future which had no crime, no wrongdoing, and was ultimately dull and boring. He refused to be a part of such a boring utopia. Thus he decided to give police something to do, and entertain the people, by performing fantastic feats of theft and other nonviolent crimes, while making the police look like fools. He was wanted by law enforcement across numerous solar systems, as well as by planetary governments, some with a price on his head. (Sound familiar so far?) Eventually, he was captured by (and joined) a supersecret intelligence organization, which solved difficult problems concerning societies on different worlds. Subsequent novels followed those assignments and adventures. One sees from this admittedly sketchy description of the novels (by memory, I admit) that Julian Assange and Wikileaks serve as the .Stainless Steel Rat. of the present. His .crimes., if any, have been virtually nonviolent, leading .law enforcement. (including the CIA) on a merry chase, while he transmits secret documents from corporations and governments around the world. He has done this successfully for some years now. It.s evident that he identified intensely with the character of Slippery Jim deGriz from his first reading. Using the alias .Harry Harrison. is therefore a tribute to the writer he idolizes. I don.t believe Harrison himself is aware of this, but the connection seems very clear to me. And yet, as a globetrotter, it.s possible that Julian Assange might have met Harry Harrison, even in disguise. It.s also apparent to me that he not only determined to be our .Stainless Steel Rat., but that.knowing he couldn.t do it alone.Wikileaks was built around the concept. Assange, as a hacker, shows the independent, .antisocial. and anarchist nature of deGriz, although his actions ultimately benefit society. Wikileaks (and Assange) have repeatedly thwarted past efforts to contain or stop them. They have repeatedly angered corporations and governments by disseminating information revealing corruption, lies or otherwise embarrassing material. Assange, although an Australian citizen, has no .home. as such, moving from place to place. His support team are volunteers from diverse places. His equipment, funds and supplementary resources are likewise scattered. He has supporters across the world, much like some citizens of the fictional future who idolized James Bolivar deGriz. Harrison.s deGriz was a master of disguise, and loved thumbing his nose at the cops, performing feats literally under their very eyes. Yesterday, I found this story: Assange attended US embassy party in Iceland at http://www.thefirstpost.co.uk/72733,people,news,julian-assange-attended-us-embassy-party-in-iceland?DCMP=NLC-daily, dated December 13, 2010. It.s worth quoting at length. By December 2009, Assange had received the US embassy cables, the Iraq war logs, a video of US helicopter pilots mowing down innocent Iraqis, and documents relating to the Afghanistan war, all of which were subsequently published on WikiLeaks. Although he had already upset the US, Assange was the toast of Iceland at the time of the party, having published a secret report relating to the 2008 collapse of the country.s banks on WikiLeaks. It was against this background that Assange apparently thought it would be amusing to go into the lion.s den. On the day of the ambassador.s reception, he didn.t even bother to wait for Jonsdottir before heading over to the US embassy. Jonsdottir explains: .The irony was that I went to collect him from his guesthouse and couldn.t find him, so just went back to work and didn.t even go myself. .I found out later he.d just decided to go on his own and got in by saying he was my guest. He said he.d spent a long time talking to Mr Watson.. And, at this time, he was already being sought out by the government of the United States. It would appear that the pattern holds. Assange.s boldness and behavior in this instance would mirror exactly the behavior of the deGriz of science fiction. This analysis is only partial and, as I stated, sketchy. I do believe there are enough parallels that it offers an important insight into the mind and personality of Julian Assange. It.s doubtful that the United States government would be aware of such important connections to understanding their .enemy.. Often political appointees, or even those of the traditional hierarchy, are ignorant of the subjects they are supposed to deal with. And events of the past ten years have confirmed that they do not understand whom they.re fighting very well, even now. Such was the case with Michael D Brown, of Hurricane Katrina infamy (.Heckuva job, Brownie.), who was appointed head of FEMA under President Bush. He had no qualifications and no experience in Emergency Management. Prior to his assignment, he had been a Commissioner for the International Arabian Horse Association. I also remember reading a story some time later about a man assigned to head counterterrorism in the FBI. He admitted he knew nothing about Islam, and said something to the extent that it .wasn.t needed. for the job. It.d seem to me that it.s difficult to fight something you don.t understand. Sun Tzu realized this some thousands of years ago when he wrote .The Art Of War.. If this pattern has continued into the Obama Administration, then, I highly doubt they.ve made the connection I.ve described above. Imagination is not a quality associated with politics, in my opinion. Only fans of science fiction.probably the older ones.would even be aware of Harry Harrison.s novels, as I am. If I am correct, I believe these are important clues to his personality of Julian Assange and the nature of Wikileaks itself. From arma at mit.edu Tue Jan 4 05:14:36 2011 From: arma at mit.edu (Roger Dingledine) Date: Tue, 4 Jan 2011 08:14:36 -0500 Subject: The Skype begin refusing payments making on their site through the Tor Message-ID: On Tue, Jan 04, 2011 at 08:02:40AM -0500, Praedor Atrebates wrote: > For something like skype or paying for ANYTHING via credit card/paypal >or the like, your anonymity is lost upon making payment so having to pay >online outside the tor network cannot be a privacy/anonymity violation. > > I would never use tor to make privacy/anonymity breaking payments or >enter anonymity breaking information - it totally negates the function >or point of tor in the first place. Basically, I'm not sure that being >blocked from making a payment to a company over the tor network is really >a problem at all. > > Am I missing something? You're missing the diversity of adversaries that various Tor users might care about. For example, imagine you're using Tor to prevent a local observer (e.g. your government-owned ISP) from discovering that you're going to Skype's payment page. More generally, there are people who use Tor to ssh to a server somewhere -- they really do want to make sure the ssh server is the one they wanted, and the ssh server really does want to make sure it's them, but they worry about network-level observers on both sides of the transaction. Yet another variation is where you don't mind that Skype knows *who* you are, but you don't want them to know which country you're in today. --Roger *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jya at pipeline.com Tue Jan 4 07:04:42 2011 From: jya at pipeline.com (John Young) Date: Tue, 04 Jan 2011 10:04:42 -0500 Subject: Assange as the Stainless Steel Rat In-Reply-To: Message-ID: What might be most enviable about Julian is that he has held few if any jobs to distract him from exploring personal philosophy and to plot great conquests and become very rich. During the twenty years from about 18 to 38, he has managed to obtain food, shelter, clothing, child care payments, health care, expenses for travel and entertainment, laptops and network service, and a motorbike for 2-3 years of globe circling -- perhaps setting up a network of cohorts. (He described his itinerary on this noble forum in 2001.) Nothing unusual about this off-the-grid lifestyle among hackers. Like a lot of thoughtful humans not convinced steady work for bosses is a good thing, they do have a knack for avoiding regular employment. Some speculate they sell their hacker fruits of network (TOR, DoD, et al) siphoning on the black market, or extort payments from targets to return material or to not report nasty info to the authorities or news media -- or most profitable, to gin up the bidding for stolen data among competitors. Say, the Bank of America ploy, "hard drive" certified, fool. Those not adept at keeping income coming this way, can pick up a few thousands ratting on other hacker-entrepreneurs to the authorities, or best, to commercial spies who extort the ratee for information then mark it up as their own product. These techniques appear to be in full flower with Wikileaks and its desparate MSM partners, agog fans and penny-ante sock-puppets, but are hardly restricted to the newbie initiative. Businesses have alwayes used the same tawdry practices to assure profitability to the bosses, to screw the workers and investors, and the methods are taught in business schools and fine-tuned in lawyers and publicist-cum-journalists' conference rooms. The deals negotiated among WL and the MSM will make great reading in the slacker colleges someday but not so long as they are laying golden eggs. Off the grid is where the real money flows. As is often yelled in this very iniquitous den. It must have been said somewhere in blatherdom that Assange's model is Zuckenberg not Harry the Rat. He is likely in touch with Goldman and JP Morgan and the giants of Europe and Asia to get bid on the BoA wad and the others in his sample kit. Think about what he's got, or says he's got on the globe's tax authorities. Nobody here knows anything about this despite what the archives reveal. Those are forgeries. From ledalashaunax at ndtv.com Tue Jan 4 09:30:59 2011 From: ledalashaunax at ndtv.com (Leda Lashaun) Date: Tue, 04 Jan 2011 10:30:59 -0700 Subject: We accept Visa, MC & E-Check. Best BuyViagra Generic Online Message-ID: <201101041031.DF6EC30BB2894FDB950C@c935g0y1x9> Best BuyViagra Generic Online 10% Discount. Holiday's Special Offer for OrderViagra 100mg and we accept Visa, MC & E-Check. http://gphdv.ru From rsw at jfet.org Tue Jan 4 15:06:25 2011 From: rsw at jfet.org (Riad S. Wahby) Date: Tue, 4 Jan 2011 18:06:25 -0500 Subject: administrivia: surviving nodes? In-Reply-To: References: <1293264788.11336.8.camel@afterburner> <20101225130932.GZ16518@leitl.org> <4D160EC8.80609@rayservers.com> Message-ID: <20110104230625.GA9149@sp.serverpronto.com.serverpronto.com> "J.A. Terranson" wrote: > If anyone has these instructions, please, *do* post them. Im not getting > any reply from Riah at jfet/aq. Sorry, I've been busy with work/life/&c. I will try to put together a howto later on tonight and post it here. -=rsw From nfatimahqz at yowzahost.com Tue Jan 4 19:13:40 2011 From: nfatimahqz at yowzahost.com (Nella Fatimah) Date: Tue, 04 Jan 2011 20:13:40 -0700 Subject: No Prescription Required - Express Delivery - Secured Checkout, Vicodin ES - 7.5/750 mg 60 pills - $219 Message-ID: <4d23e1e4.426bf395@yowzahost.com> Vicodin ES - 7.5/750 mg 60 pills - $219 ; 90 tabs $299.00 ; 120 tabs $359.00 No Prescription Required - Express Delivery - Secured Checkout � Discount 10% for All! ACCEPT VISA & MC! Vicodin, Oxycodone http://jolegitsrx.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 427 bytes Desc: not available URL: From gil_hamilton at hotmail.com Tue Jan 4 18:58:26 2011 From: gil_hamilton at hotmail.com (Gil Hamilton) Date: Wed, 5 Jan 2011 02:58:26 +0000 Subject: No subject Message-ID: http://hagykeve.110mb.com/turejiqa.html DoYou Spec ializ eInTim eM anagem ent? From ejesusawy at mapleleafmail.com Wed Jan 5 03:10:42 2011 From: ejesusawy at mapleleafmail.com (Estefana Jesusa) Date: Wed, 05 Jan 2011 04:10:42 -0700 Subject: Buy Rep1icaRo1ex watches at RolexHeaven! Message-ID: <43h35l61j15-52507345-696m1y55@lvgszdzkon> Rep1icaWatches - high quality rep1icaWatches of well known brands - Jacob & Co, TAG Heuer, Cartier, Panerai and much more. http://lockadmit.ru From mchristianaib at talb.com Wed Jan 5 04:50:17 2011 From: mchristianaib at talb.com (Margo Christiana) Date: Wed, 05 Jan 2011 05:50:17 -0700 Subject: Low Cost Hydrocodone 10/500 mg (WATSON 540) - 90 pills $339 Message-ID: <4d246909.56448592@talb.com> NEW !!! Hydrocodone 10/500mg-60 pills $249 Hydrocodone 10/500 mg (WATSON 540) - 60 pills $249 Hydrocodone 10/500 mg (WATSON 540) - 90 pills $339 Hydrocodone 10/500 mg (WATSON 540) - 120 pills $429 CLICK THIS LINK FOR BEST PRICE http://cacheapmeds.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 619 bytes Desc: not available URL: From particiatu at got.net Wed Jan 5 07:23:25 2011 From: particiatu at got.net (Marylyn Particia) Date: Wed, 05 Jan 2011 08:23:25 -0700 Subject: Online luxury watch store, offer rep1icawatches and SwissRep1ica watches,swiss made rep1icawatches, Message-ID: <201101050820.2A72E6881BEBB5AA705FBD@h73c97z15> $159 Rep1icaWatches at Rep1icaExpert Top qua1ity replicaWatches of Swiss luxury watch brands - Ro1ex, Breitling, Omega, TAG Heuer, Cartier, Panerai, Patek Philippe, Hublot and many more. FREE worldwide shipping with every order http://spomene.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 608 bytes Desc: not available URL: From eugen at leitl.org Wed Jan 5 03:17:56 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 5 Jan 2011 12:17:56 +0100 Subject: The Skype begin refusing payments making on their site through the Tor Message-ID: <20110105111756.GB16518@leitl.org> ----- Forwarded message from Roger Dingledine ----- From 0-usexfnhybqkebfcg at artandcommerce.com Wed Jan 5 04:49:12 2011 From: 0-usexfnhybqkebfcg at artandcommerce.com (-Canadian Pharm.-) Date: Wed, 5 Jan 2011 14:49:12 +0200 Subject: Prmentihene 37.5 Tablets Available Message-ID: <4756510045.4HFLQC9H608037@sugspg.riiupfsnatqoqm.va> The #1 Reason Relationships fail is in the bedroom We Care about your Health http://sales.treatgroan.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 279 bytes Desc: not available URL: From rsw at jfet.org Wed Jan 5 12:52:33 2011 From: rsw at jfet.org (Riad S. Wahby) Date: Wed, 5 Jan 2011 15:52:33 -0500 Subject: CDR Howto (WIP) Message-ID: <20110105205233.GA26785@sp.serverpronto.com.serverpronto.com> All, Twelve hours (or maybe three years, depending who you are) later than promised, here's the first cut at the CDR howto: http://al-qaeda.net/cpunk/howto.html Getting it all set up on your end is not terribly difficult. In fact, in the past I've cobbled together other implementations where everything was dispatched through procmail filtering on the Received header (the list ran that way in 2004 for a month or two), so feel free to riff on the basic config as long as you don't break anything at the boundary. The part we have to redesign is the way CDR nodes share their subscriber lists / maintain a common whitelist. In the past this was done with Majordomo "who", but I think it's a bad idea to enable this. I propose instead that each node push its local subscription list to the other nodes, possibly PGP signed to defend against the obvious attack whereby massive amounts of garbage can be injected into the whitelist with very little effort. (Yes, someone can still subscribe a massive number of addresses to a node, but such activity has less leverage and will draw attention.) I'll put together the appropriate scripts tonight(ish), and once someone else has a node set up we can do some testing and put the D back in CDR. Regards, -=rsw From declan at well.com Wed Jan 5 23:16:31 2011 From: declan at well.com (Declan McCullagh) Date: Thu, 6 Jan 2011 01:16:31 -0600 Subject: Assange as the Stainless Steel Rat In-Reply-To: ; from jya@pipeline.com on Tue, Jan 04, 2011 at 10:04:42AM -0500 References: Message-ID: <20110106011631.A19080@baltwash.com> On Tue, Jan 04, 2011 at 10:04:42AM -0500, John Young wrote: > The deals negotiated among WL and the MSM will make great reading > in the slacker colleges someday but not so long as they are laying > golden eggs. Off the grid is where the real money flows. As is often > yelled in this very iniquitous den. A friend mentioned this discussion to me, and, egads, I found out I'm still subscribed to this list after all these years. John Young is more right than he knows (or, being John, he may know more about this than the rest of us). This Vanity Fair article posted a few hours ago makes for some interesting reading about the carefully curated, not always civil, relationship between WL and the MSM: http://www.vanityfair.com/politics/features/2011/02/the-guardian-201102?printable=true -Declan From jya at pipeline.com Thu Jan 6 05:33:16 2011 From: jya at pipeline.com (John Young) Date: Thu, 06 Jan 2011 08:33:16 -0500 Subject: Assange as the Stainless Steel Rat In-Reply-To: <20110106011631.A19080@baltwash.com> References: Message-ID: A shitty account for it leaves out the crucial information about money changing hands between WL and its partners, not even under the ruse of underwriting "expenses." Assange's rage at MSM is about getting financially screwed not dissimulation of editorial and publication control. Assange wants his fortune just as much as publishers and journalists and the rest of us do. The nobility of getting information to the public untainted by venality is ridiculous -- even as PR it is rancid bacon. Assange's chronic bitch has been from Day One of WL about getting those who use Wikileaks to pay handsomely for it. That was, and is, his business model, not public service, at least no more public service than the public service racketeers. It is not about getting press coverage simply but coverage for advertising what can be bought under the table and on the black market -- just like official and criminal managers of information flow do -- spies the most generous payers. The peurile Vanitry Fair gossip about the MSM struggling financially avoids the real issue of paying sources like WL and hackers and insiders is as if there is a solemn compact to pretend that never occurs. Mutual love and admiration it aint. Why be coy about paying WL, out with it. Maybe Daniel will spill those secrets but not likely due to the money to be made by pretending to tell all but not really, tell enough to become a player, then play to the max. What might break the complicity of silence is what leads so many to leak, getting financially screwed by your partners -- the ever present threat to human intercourse, not limited to bed partners. You can bet Bank of America or whoever knows what it will take for WL not to publish financially damaging data. By now the targets have been given samples to ponder, just as the MSM were given. And Assange will continue to shop in the black market what is merely advertised by public disclosures. This is a well-established business model of hackers and publishing and as we have seen in this noble training and bragging forum, security experts. This is an ad, the good stuff is not available for free. From jbates at brightok.net Thu Jan 6 09:17:30 2011 From: jbates at brightok.net (Jack Bates) Date: Thu, 06 Jan 2011 11:17:30 -0600 Subject: NIST IPv6 document Message-ID: On 1/6/2011 10:44 AM, Joe Greco wrote: > On the flip side, however, I would point out that attackers have had vastly > more resources made available to them in part *because* IPv4 has been so > easily scanned and abused. To be sure, a lot of viruses have spread via > e-mail spam and drive-by downloads, and sparse addressing will not prevent > script kiddies from banging away on ssh brute force attacks against > www.yoursite.com. But there's been a lot of spread through stupidity as > well. > A randomly setup ssh server without DNS will find itself brute force attacked. Darknets are setup specifically for detection of scans. One side effect of v6, is determining how best to deploy darknets, as we can't just take one or two blocks to do it anymore. We'll need to interweave the darknets with the production blocks. I wish it was possible via DHCPv6-PD to assign a block minus a sub-block (hey, don't use this /64 in the /48 I gave you). It could be that darknets will have to go and flow analysis is all we'll be left with. Jack ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From dahonig at cox.net Thu Jan 6 18:15:51 2011 From: dahonig at cox.net (David Honig) Date: Thu, 06 Jan 2011 18:15:51 -0800 Subject: Assange as the Stainless Steel Rat In-Reply-To: References: <20110106011631.A19080@baltwash.com> Message-ID: <3.0.5.32.20110106181551.035678e8@pop.west.cox.net> At 08:33 AM 1/6/2011 -0500, John Young wrote: >Assange wants his fortune just as much as publishers and journalists >and the rest of us do. The nobility of getting information to the public >untainted by venality is ridiculous -- even as PR it is rancid bacon. Frankly ridiculuous, JA must realize that only ideological motivations are robust enough for his purposes. Actually, religion would be sufficient motivation as well, but all the clueful are atheists. One must have a day job, semiretired architect, say, so that one can pursue one's own noble ideals. Mozart had to tutor and perform and otherwise sell his time so he could do what he wanted. I won't speculate on JA's personal finances but intelligent people capable of controlling their environment are always valuable. I'll mention Gilmore and May as examples of selfish-atruistic-techsaints. Young and Assange will be discussed this way, one day. On the Daniel <---> JA axis of access-to-leaks I look forward to those more brazen than JA who don't bother with protecting (US) Collaborators and other collateral damage. Daniel, by offering material only to MSM, is a distraction. If MSM were adequate there would be no niche for cryptome, WL, or Daniel's honeypot. WL's current trickle is a disgrace. Open the pod bay doors, Hal. ... who'd you rather? Ardin or Wilen? ---------------- David Honig (714) 544 9727 36 Laurelwood Dr. Irvine, CA 92620 From eugen at leitl.org Thu Jan 6 09:25:02 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 6 Jan 2011 18:25:02 +0100 Subject: NIST IPv6 document Message-ID: <20110106172502.GE16518@leitl.org> ----- Forwarded message from Jack Bates ----- From toshia.crosariapn at naturalimpulse.com Fri Jan 7 09:32:49 2011 From: toshia.crosariapn at naturalimpulse.com (Toshia Rosaria) Date: Fri, 07 Jan 2011 10:32:49 -0700 Subject: Hydrocodone - Brand & Generic. Great Quality, U.S. Licensed Doctors & Pharmacies! Call our Toll-Free Number. Message-ID: <201101071035.4A8A6DA3F57BE288630B72@up233167> LOWEST PRICE in USA GUARANTEED! Drug: Hydrocodone - Brand & Generic Great Quality Brand & Generic. FREE PRESCRIPTIONS! LIMITED Time Offer! U.S. Licensed Doctors & Pharmacies! FedEx Shipping ORDER ONLINE NOW http://afnew-rx-brands.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 613 bytes Desc: not available URL: From support at rayservers.com Fri Jan 7 04:19:04 2011 From: support at rayservers.com (Rayservers) Date: Fri, 07 Jan 2011 12:19:04 +0000 Subject: Assange as the Stainless Steel Rat In-Reply-To: <3.0.5.32.20110106181551.035678e8@pop.west.cox.net> References: <20110106011631.A19080@baltwash.com> <3.0.5.32.20110106181551.035678e8@pop.west.cox.net> Message-ID: <4D2704B8.8020309@rayservers.com> On 07/01/11 02:15, David Honig wrote: > At 08:33 AM 1/6/2011 -0500, John Young wrote: >> Assange wants his fortune just as much as publishers and journalists and >> the rest of us do. The nobility of getting information to the public >> untainted by venality is ridiculous -- even as PR it is rancid bacon. > > Frankly ridiculuous, JA must realize that only ideological motivations are > robust enough for his purposes. Actually, religion would be sufficient > motivation as well, but all the clueful are atheists. > > One must have a day job, semiretired architect, say, so that one can pursue > one's own noble ideals. Mozart had to tutor and perform and otherwise sell > his time so he could do what he wanted. I won't speculate on JA's personal > finances but intelligent people capable of controlling their environment are > always valuable. I'll mention Gilmore and May as examples of > selfish-atruistic-techsaints. Young and Assange will be discussed this way, > one day. > > On the Daniel <---> JA axis of access-to-leaks I look forward to those more > brazen than JA who don't bother with protecting (US) Collaborators and other > collateral damage. Daniel, by offering material only to MSM, is a > distraction. If MSM were adequate there would be no niche for cryptome, WL, > or Daniel's honeypot. > > WL's current trickle is a disgrace. Open the pod bay doors, Hal. > > ... who'd you rather? Ardin or Wilen? > > > > ---------------- David Honig (714) 544 9727 36 Laurelwood Dr. Irvine, CA > 92620 Hello David, http://www.rayservers.com/blog/physics-drives-finance-finance-drives-politics "Today, we do not have money or stock markets. We have debt tokens, slave identification cards, money markets instead of stock markets, and fascists in charge. In a related note, we do not have news, we have propaganda. This is because we do not have a market for news, we have a market for advertising. News merely turns into filler in-between the paid advertising spots. Naturally parasites arise to replace news with propaganda." So, hell no, religious idealism won't cut it. You need a market. Best, Ray -- Rayservers http://www.rayservers.com/ Zurich: +41 43 5000 728 London: +44 20 30 02 74 72 Panama: +507 832 1846 San Francisco: +1 408 419 1978 USA Toll Free: +1 888 265 5009 10:00 - 24:00 GMT We prefer to be paid in gold Globals and silver Isles Global Standard - Global Settlement Foundation http://www.global-settlement.org/ Our PGP key 0x079CCE10 on http://keyserver.rayservers.com/ From 0-ppf at ceramique.org Fri Jan 7 02:07:55 2011 From: 0-ppf at ceramique.org (~C1alis~) Date: Fri, 7 Jan 2011 14:07:55 +0400 Subject: Is it time to reorder your Prthemenine? Message-ID: <5569748931.E2L6T5ZJ250434@apjux.ubkgfdslykcfgd.com> Most studies have found that women don't feel satisfied after getting it on... Change that fact! Results Guaranteed http://lb.vg/yA9CQ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 329 bytes Desc: not available URL: From candra.bernitakt at urscorp.com Fri Jan 7 18:49:18 2011 From: candra.bernitakt at urscorp.com (Candra Bernita) Date: Fri, 07 Jan 2011 19:49:18 -0700 Subject: High quality Generic and OriginalViagra. 100% Satisfaction Guaranteed. Message-ID: <4d27d0ae.3e61382f@urscorp.com> BuyViagra 60 pills 100mg $98.12 High quality Generic and OriginalViagra. 100% Satisfaction Guaranteed. Fast shipping to USA with 2nd day delivery option. Up to 10 Free Pills with your order! Visa, MC, Amex accepted. http://pmxxi.ru From camera_lumina at hotmail.com Sat Jan 8 11:03:45 2011 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sat, 8 Jan 2011 14:03:45 -0500 Subject: [p2p-hackers] Whistle-blower site platform design In-Reply-To: References: , Message-ID: Alif wrote... Much of the WL debacle has been caused by having Julian associated with WL in the first place. Anyone who comes after him has the same problem: by acting as the releaser's mouthpiece, they become the face of the organization, and in turn they become the object being sold by the MSM, as opposed to the leaks themselves. Well, yes and no. The public seems to be far more interested in a person, as opposed to information. If the existence of a person causes a lot of info pull, then I'm all for it. Other sites can repost the info, as well as accept information directly. In other words, I'm not sure there's a huge overall downside to having an Assange. -TD > Date: Wed, 22 Dec 2010 20:37:03 -0600 > From: measl at mfn.org > To: jya at pipeline.com > CC: cypherpunks at al-qaeda.net > Subject: Re: [p2p-hackers] Whistle-blower site platform design > > On Wed, 22 Dec 2010, John Young wrote: > > > > The site has a link to an article in which Daniel D-B explains > > the initiative. > > > > Daniel generated a PK on December 13, 2010 with the address > > ddb at openleaks.org. > > > > He welcomes inquiries and advice, as he says, from those with > > > My biggest complaint is being re-implemented, rather than "repaired": WL > fell over when they used a person, rather than an organization account > with no human corrolary, to act as the > acceptor/releaser/ObjPublicRelationsFlac (Julian in WL case). > > Much of the WL debacle has been caused by having Julian associated with WL > in the first place. Anyone who comes after him has the same problem: by > acting as the releaser's mouthpiece, they become the face of the > organization, and in turn they become the object being sold by the MSM, as > opposed to the leaks themselves. > > Any public interfacing should be from a role account, which acts as both > an anonymizer and a composite "face" for the press. Not having a real > person to attach their interests to will help force their interest to > concentrate upon the leaks themselves. > > //Alif > > -- > "Never belong to any party, always oppose privileged classes and public > plunderers, never lack sympathy with the poor, always remain devoted to > the public welfare, never be satisfied with merely printing news, always > be drastically independent, never be afraid to attack wrong, whether by > predatory plutocracy or predatory poverty." > > Joseph Pulitzer, 1907 Speech From callieclarissade at placementusa.com Sat Jan 8 13:41:35 2011 From: callieclarissade at placementusa.com (Callie Clarissa) Date: Sat, 08 Jan 2011 14:41:35 -0700 Subject: Up to 10 Free Pills with your order! Visa, MC, Amex accepted. Quality Generic and OriginalViagra Message-ID: <29b57j93c69-55201700-216c6d19@rhfewqva> BuyViagra 60 pills 100mg $98.12 High quality Generic and OriginalViagra. 100% Satisfaction Guaranteed. Fast shipping to USA with 2nd day delivery option. Up to 10 Free Pills with your order! Visa, MC, Amex accepted. http://pmxxi.ru From camera_lumina at hotmail.com Sat Jan 8 11:44:00 2011 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sat, 8 Jan 2011 14:44:00 -0500 Subject: Cypherpunks Targeted In-Reply-To: References: Message-ID: Fuck 'em. We won, plain and simple. And what is the persecution of Assange but some sort of revenge from a society that has, all of a sudden, woken up to the reality of the global internet? Not only is this cat out of the bag, but an identical cat is out of the bag in practically every country on earth. And as amusing as Sterling can be to listen to, if he thinks BlackNet didn't happen then he has to be high: BlackNet has practically swallowed the internet and it poops out free files all over the place. No doubt too there's all sorts of anonymous transactions flowing in there. Soon, the Pundits will be asking what diplomacy looks like in a world where big secrets can't be kept. -TD > > Perhaps indicating a revival of a Red Scare initiative against > Cyperhpunks in connection with promoting Wikileaks panic, > three attacks have been published in recent days: > > 1. Bruce Sterling, 22 December 2010, opens with naming Tim > May's writing on BlackNet and more: > > > http://www.webstock.org.nz/blog/2010/the-blast-shack/ > > 2. Philip Pilkington, 21 December 2010, attacks Cryptome > by recylcing a Readers Digest smear from 2005: > > > https://fixingtheeconomists.wordpress.com/2010/12/21/cryptome-org-weighing- > in-on-the-debate-on-freedom-of-information/ > > 3. Jaron Lanier, 20 December 2010, attacks Tim May, John > Gilmore and others: > > > http://www.theatlantic.com/technology/archive/2010/12/the-hazards-of-nerd-s > upremacy-the-case-of-wikileaks/68217/ > > If the Red Scare is duplicated more of this will likely come as the > conspiracy > net is spread to round up co-conspirators, fellow travellers, fronts like > EFF, EPIC, > ACLU, ProPublica and many more. > > A long list of suspects here: > > > http://cryptome.org/0002/siss.htm > > A shorter Wikileaks-related suspects and documentation here: > > > http://cryptome.org/0003/wikileaks-series.htm > > As the campaign heats up it will include deep-pocketed funders, traitors > planted > inside security agencies, universities and corporations, squeezed informants > against the ringleaders, congressional hearings, subpoenas, frightened naming > of names, scouring of files for connecting dots at Archive.org, search > engines, > social media, mail lists, news lists, chat rooms, IMs, email, and the > bountiful > data collected by corporations, researchers, governments and their > contractors > who claimed they were merely studying the fantastic growth of empowering > digital culture or more sinisterly, preparing to protect the people from > anarchist > enemies of centralized authoritatives. > > Now this list predicted this reaction and described how to preposition > defenses. Or was that just pretending overthrow of authoritatives? > > Read the EFF and others' letter to Congress yesterday defending Wikileaks > and compare it to similar actions in the 1930s-1950s protesting clamp down > on the worldwide Red Menace. Then read Sterling, Pilkington and Lanier > more closely. These smart guys know which way the wind is blowing and, > as they write, they want no part in the insanity of taking freedom of > information > too literally. In short, punish Assange, Wikileaks and co-conspirators as > a lesson to others that dissidence is "taken very seriously." From rmolliewq at eaglegl.com Sat Jan 8 15:33:02 2011 From: rmolliewq at eaglegl.com (Riva Mollie) Date: Sat, 08 Jan 2011 16:33:02 -0700 Subject: LOWEST PRICE in USA GUARANTEED! Drug: hydrocodone - Brand & Generic. Great Quality Message-ID: <201101081632.17EC1DB99BAEB4AE1773@x7sq6zpm> LOWEST PRICE in USA GUARANTEED! Drug: Hydrocodone - Brand & Generic Great Quality Brand & Generic. FREE PRESCRIPTIONS! LIMITED Time Offer! U.S. Licensed Doctors & Pharmacies! FedEx Shipping ORDER ONLINE NOW http://cynew-rx-brands.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 605 bytes Desc: not available URL: From albertha.w.neomido at utahrealtors.com Sat Jan 8 18:37:33 2011 From: albertha.w.neomido at utahrealtors.com (Albertha Neomi) Date: Sat, 08 Jan 2011 19:37:33 -0700 Subject: Fast shipping to USA with 2nd day delivery option. High quality Generic and OriginalViagra Message-ID: <53w71x96w88-78838581-927a8a31@bdvnctzo> BuyViagra 60 pills 100mg $98.12 High quality Generic and OriginalViagra. 100% Satisfaction Guaranteed. Fast shipping to USA with 2nd day delivery option. Up to 10 Free Pills with your order! Visa, MC, Amex accepted. http://pmxxi.ru From eugen at leitl.org Sat Jan 8 13:18:31 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 8 Jan 2011 22:18:31 +0100 Subject: A Walled Wide Web for Nervous Autocrats Message-ID: <20110108211831.GP16518@leitl.org> http://online.wsj.com/article/SB10001424052748704415104576065641376054226.html?mod=WSJASIA_hpp_MIDDLESecondNews A Walled Wide Web for Nervous Autocrats Beijing and Moscow see American information technology as a threat. They want systems of their own By EVGENY MOROZOV At the end of 2010, the "open-source" software movement, whose activists tend to be fringe academics and ponytailed computer geeks, found an unusual ally: the Russian government. Vladimir Putin signed a 20-page executive order requiring all public institutions in Russia to replace proprietary software, developed by companies like Microsoft and Adobe, with free open-source alternatives by 2015. The move will save billions of dollars in licensing fees, but Mr. Putin's motives are not strictly economic. In all likelihood, his real fear is that Russia's growing dependence on proprietary software, especially programs sold by foreign vendors, has immense implications for the country's national security. Free open-source software, by its nature, is unlikely to feature secret back doors that lead directly to Langley, Va. Anthony Russo Nor is Russia alone in its distrust of commercial software from abroad. Just two weeks after Mr. Putin's executive order, Iran's minister of information technology, citing security concerns, announced plans for a national open-source operating system. China has also expressed a growing interest. When state-owned China Mobile recently joined the Linux Foundation, the nonprofit entity behind the most famous open-source project, one of the company's executives announcedbominously to the ears of somebthat the company was "looking forward to contributing to Linux on a global scale." Information technology has been rightly celebrated for flattening traditional boundaries and borders, but there can be no doubt that its future will be shaped decisively by geopolitics. Over the past few years, policymakers around the world have had constant reminders of their growing dependence onband vulnerability tobthe new technology: the uncovering of the mysterious China-based GhostNet network, which spied on diplomatic missions around the globe; the purported crippling of Iran's nuclear capability by the Stuxnet virus; and, of course, the whole WikiLeaks affair. Governments are taking a closer look at who is providing their hardware, software and servicesband they are increasingly deciding that it is dangerous not to develop independent national capabilities of their own. Open-source software can allay some of these security concerns. Though such systems are more democratic than closed ones, they are also easier to manipulate, especially for governments with vast resources at their command. But open-source solutions can't deal with every perceived threat. As Google learned, the Chinese government continues to see Western search engines as a challenge to its carefully managed presentation of controversial subjects. Similarly, email can be read by the host government of the company offering the service, and the transmission of sensitive data can be intercepted via secret back doors and sent to WikiLeaks or its numerous local equivalents. For these reasons, more governments are likely to start designating Internet services as a strategic industry, with foreign firms precluded from competing in politically sensitive niches. The Turkish government has emerged as the leading proponent of such "information independence," floating the idea of both a national search engine and a national email system. Authorities in Russia, China and Iran have debated similar proposals. Judging by last year's standoff between the BlackBerry maker Research in Motion and the governments of India, Saudi Arabia and the United Arab Emirates, questions of access also will play a growing role in shaping technology. If a government suspects that the U.S. National Security Agency has arranged to be able to retrieve private emails sent with BlackBerry's secure encryption technology, it starts to wonder why it doesn't have similar streams of intelligence data, from BlackBerry as well as from services like Gmail and Skype. At a minimum, more governments will demand that data servers base their operations in their own jurisdictions, inconveniencing global Internet companies that have based their business plans on the assumption that they could run their Indian operations from Iowa. The real Internet trade wars will begin once Russian and Chinese technology giants, with their poorly veiled government connections and piles of cash, come looking for American and European acquisitions. How will officials in Washington or Brussels react when China's Tencent (with a market capitalization of $42 billion, almost twice that of Yahoo) or Russia's Yandex makes a bid for AOL or Skype? Painful decisions will need to be made soon. The Russian company Digital Sky Technologies, owned by a Kremlin-friendly oligarch, has a nearly 10% stake in Facebook and a 5% stakes in such hot Web properties as Zynga and Groupon. What will happen once Russian or Chinese firms seek to purchase a stake in companies like Google (a contractor to the National Geospatial Intelligence Agency) or Amazon (which caters to nearly 20 U.S. government agencies through its Web hosting services)? The unpleasant effects of this rising nationalism are already evident in the case of hardware exports. When Sprint Nextel began considering bids from China's Huawei and ZTE Technologies in 2010 for a projected $5 billion upgrade of its network, a group of American senators wrote to the company's chief executive, expressing their concern that Huawei might be subject to "significant influence by the Chinese military" and that communications in the U.S. could be "disrupted, intercepted, tampered with, or purposely misrouted." Sprint Nextel turned down the bids. The European Union recently announced plans to create an authority similar to the U.S. Committee on Foreign Investment to specifically vet approaches from China's technology giants. Even if they are spurned by the U.S. and Europe, China's tech giants are likely to resurface elsewhere. For several years China has been using its huge cash reserves to hand out loansbmostly to governments in Africa, but also to neighbors like Cambodiabwith the condition that those governments only do business with China's telecom companies. With or without secret access to that data, the fact that China controls so much of the communications infrastructure in the developing world gives it political leverage. At the same time, Yota, a partly state-owned Russian telecom provider, has been trying to build a base in Latin America, launching its 4G service in Nicaragua and, soon, in Peru. Other Russian companies are busy building (or buying up) the telecom infrastructure in the former Soviet republics, perhaps in a bid to do for the Internet what Russia's gas giant Gazprom has done for energy: build up physical infrastructure and then use it as a tool of political leverage. What does all of this mean for the future of America's technology industry? If China's expansion into Africa and Russia's into Latin America and the former Soviet Union are any indication, Silicon Valley's ability to expand globally will be severely limited, if only because Beijing and Moscow have no qualms about blending politics and business. The global triumph of American technology has been predicated on the implicit separation between the business interests of Silicon Valley and the political interests of Washington. In the past, foreign governments have rushed to install the latest version of Microsoft Office or Google's Chrome browser because it was hard to imagine that Washington would tinker with technology to advance its strategic interests. But just a few weeks before Mr. Putin publicly endorsed open-source software, FBI Director Robert Mueller toured Silicon Valley's leading companies to ask their CEOs to build back doors into their software, making it easier for American law enforcement and intelligence gathering agencies to eavesdrop on online conversations. The very possibility of such talks is likely to force foreign governments to reconsider their dependence on American technology. Whatever the outcome of Washington's engagement with the Internet, Silicon Valley will be the one to bear the costs. For ordinary Internet users, there is one silver lining: The embrace of open-source technology by governments may result in more intuitive software applications, written by a more diverse set of developers. The possible downside is that the era of globally oriented services like Skype may soon come to an end, as they are replaced by almost certainly less user-friendly domestic alternatives that would provide secret back-door access. As governments seek to assert control, companies will be providing fewer and fewer guarantees about both data security and access by third partiesbsuch as governments. The irony in these developments is hard to miss. Information technology has been one of the leading drivers of globalization, and it may also become one of its major victims. b Evgeny Morozov is a visiting scholar at Stanford University and a fellow at the New America Foundation. His new book is "The Net Delusion: The Dark Side of Internet Freedom." From paulettewrobenadc at yowzahost.com Sat Jan 8 21:49:50 2011 From: paulettewrobenadc at yowzahost.com (Paulette Robena) Date: Sat, 08 Jan 2011 22:49:50 -0700 Subject: The Safest & Most Effective Method Of Penis Enlargement. Save your time and money! Message-ID: <4d294c7e.7e750257@yowzahost.com> EnlargeYourPenis. {EnlargePenis} The Safest & Most Effective Method Of Penis Enlargement Save your time and money with our pills! http://romajis.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 513 bytes Desc: not available URL: From herminebpazhg at lxe.com Sun Jan 9 02:08:35 2011 From: herminebpazhg at lxe.com (Hermine Paz) Date: Sun, 09 Jan 2011 03:08:35 -0700 Subject: Exact Rep1icaWatches - Cheap Quality Exact Rep1icaWatches For Sale Message-ID: <4d298923.694fe06b@lxe.com> Rep1icaWatches - perfect clones of well-known watches Cartier, Chopard, Panerai, Breitling, Bvlgari, Panerai, Franck Muller, Glashutte, Omega, ... http://lockadmit.ru From stepheniedannetteqw at gallifreyone.com Sun Jan 9 10:24:49 2011 From: stepheniedannetteqw at gallifreyone.com (Stephenie Dannette) Date: Sun, 09 Jan 2011 11:24:49 -0700 Subject: Most women would love to have a guy with a larger penis as well. Message-ID: <4d29fd71.15f96861@gallifreyone.com> Most women would love to have a guy with a larger penis. This is why numerous male enhancement techniques flood the market today. Sadly, a lot of men are being misinformed. Some think that increasing the size of penis can be done overnight. But this notion is entirely false..... Read further here http://enlargepillem.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 433 bytes Desc: not available URL: From irina at emira.com Sun Jan 9 01:28:29 2011 From: irina at emira.com (Salvador Ball) Date: Sun, 9 Jan 2011 12:28:29 +0300 Subject: =?koi8-r?B?/MzFy9TSz8nO09TS1c3FztQgySDUxcjOycvBIMTM0SDTwcTB?= Message-ID: <40C07AE3B55A43B9BE76639372EB8BD8@625dd7e0e2934ca> Компания "КРОССЕР Инструмент" приглашает к сотрудничеству: - торговые компании, - магазины по продаже садовой техники и электроинструмента, - организации и - предпринимателей, специализирующиеся на реализации садовой техники и электроинструментов. Мы заинтересованы в расширении дилерской сети во всех регионах России и гарантируем представителям компании "КРОССЕР Инструмент" наиболее выгодные условия сотрудничества. Гибкая система скидок на весь модельный ряд. Компания "КРОССЕР Инструмент" предлагает клиентам три формы партнерства: - оптовая продажа садовой техники и электроинструмента, - дилерство (продвижение и распространение продукции CROSSER) и - сервисное обслуживание техники (гарантийное и послегарантийное) телефон: 8 495 729 66 15, 8 903 729-6615 эл. почта: crossertm at yandex.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1926 bytes Desc: not available URL: From vinitajannaap at hughburchill.net.jfet.org Mon Jan 10 10:20:16 2011 From: vinitajannaap at hughburchill.net.jfet.org (Vinita Janna) Date: Mon, 10 Jan 2011 11:20:16 -0700 Subject: Cheap Phentermine for you, Secure order processing this way Message-ID: <201101101118.A88499D02CB6FE08BFE8B@6108596> Phentermine online from $2.12 per pill! Your Best Online-Drugstores! Cheap Phentermine for you, Secure order processing this way http://legitsrxck.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 319 bytes Desc: not available URL: From eugen at leitl.org Mon Jan 10 05:03:40 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 10 Jan 2011 14:03:40 +0100 Subject: Last Mile Meshwork Cooperatives Message-ID: <20110110130340.GE16518@leitl.org> http://blog.p2pfoundation.net/last-mile-meshwork-cooperatives/2011/01/09 Last Mile Meshwork Cooperatives Sepp Hasslberger 9th January 2011 There is a movement just starting up b it is not very well developed yet b that has as its vision the establishment of an independent layer of connectivity between end users, by means of directly networking (mesh network) Wifi or similar wireless connections. The connectivity layer is owned by users, who form a cooperative which takes care of the technical details such as choice of equipment and installation, and which acts as a representative of its members towards internet access providers, negotiating one or more high bandwidth internet connections which are then made available to all the members of the cooperative network. The idea here is that end users can, through their own network, connect with each other without having to go through the internet access provider. Local traffic does not have to exit the local network. In this way, we can communicate and exchange information directly with our neighbors in a networked environment, and we only have to access the rest of the internet if we wish to access information that is not locally available, or to communicate with people who are distant. The members of cooperatives so organized have at their disposition unlimited local connectivity (to which they contribute by running their own router) and they have a high performance connection to the world through one or more high bandwidth connections that are paid by for by all. The price of connection will be lower than that of every separate end user having an adsl or similar connection and it will be better performing than an adsl line. This would add a robust and sustainable local layer of connectivity and communication to the internet, and it would make the net much more resilient against centralized control and even against unforseen catastrophic events. Once a local network is functioning, data can be cached, making each neighborhood more independent and more resilient to outside interference. Examples of this are the Italian Progetto Ragnatela and Mark Wallacesb bThe Connectiveb Links: Progetto Ragnatela facebook page: http://www.facebook.com/pages/Progetto-RAGNATELA-rete-a-maglia-wi-fi-mesh-di-proprieta-dei-cittadini/129047530469054 Progetto Ragnatela English description: http://p2pfoundation.ning.com/forum/topics/project-spiderweb-a The Connective homepage: http://www.theconnective.net/ This is just a sampling, and there may be numerous such initiatives. A few of them are linked in my description of Progetto Ragnatela. This was written to explain how local connectivity could be a useful element in developing the concept of a desirable digital commons infrastructure as developed by the Free Culture Forum (http://fcforum.net/) on their wiki here: http://wiki.fcforum.net/index.php?title=Collective_editing_Infrastructure_part_final_declaration From ekca at snip.ru Mon Jan 10 00:26:10 2011 From: ekca at snip.ru (Dewayne Laird) Date: Mon, 10 Jan 2011 15:26:10 +0700 Subject: =?koi8-r?B?8sHT0NLPxMHWwSDNz9TPwszPy8/X?= Message-ID: <84AB23926BF64DAAA66101A3DF496466@May> Компания "КРОССЕР Инструмент" приглашает к сотрудничеству: - торговые компании, - магазины по продаже садовой техники и электроинструмента, - организации и - предпринимателей, специализирующиеся на реализации садовой техники и электроинструментов. Мы заинтересованы в расширении дилерской сети во всех регионах России и гарантируем представителям компании "КРОССЕР Инструмент" наиболее выгодные условия сотрудничества. Гибкая система скидок на весь модельный ряд. Компания "КРОССЕР Инструмент" предлагает клиентам три формы партнерства: - оптовая продажа садовой техники и электроинструмента, - дилерство (продвижение и распространение продукции CROSSER) и - сервисное обслуживание техники (гарантийное и послегарантийное) телефон: 8 495 729 66 15, 8 903 729-6615 эл. почта: crossertm at yandex.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1926 bytes Desc: not available URL: From maurajuanaer at gaiennie.com Tue Jan 11 06:18:53 2011 From: maurajuanaer at gaiennie.com (Maura Juana) Date: Tue, 11 Jan 2011 07:18:53 -0700 Subject: Discount Online Pharmacy | Buy Generic Medicines at Discount Message-ID: <201101110719.E2445FE8A92AE78D4DEBBDE@46r4x5fh> Discount Online Pharmacy | Buy Generic Medicines at Discount Buy cheap generic prescription drugs at discount from the best online ... Buy Cheap Generic Viagra [Sildenafil Citrate] Online at 80% Discount Prices ... http://dietpillsdrugstore.ru From iri224765 at powder-coatings.ru Tue Jan 11 01:23:32 2011 From: iri224765 at powder-coatings.ru (=?koi8-r?B?98zBxME=?=) Date: Tue, 11 Jan 2011 10:23:32 +0100 Subject: =?koi8-r?B?7c/Ty9fBIM/UIDIwMDAg0tXCLg==?= Message-ID: Предлагаем качественную доставку рекламы Базы адресов постоянно обновляются Очень гибкая система скидок постоянным клиентам до 50% При заказе 2х рассылок, 3я бесплатная; Подготовка макета бесплатно; Быстрый выход рассылки, по желанию день в день; Самый массовый охват целевой аудитории Пробив фильтров. Любые формы оплаты; Каждая рассылка перед отправкой тестируется; Москва от 2 тыс руб. Россия от 3000 руб. Страны СНГ от 2,5 тыс руб. Наши цены самые альтернативные, закажите у Нас и Вы будете удивлены качеством обслуживания. Формируем базы под каждое направление, продукт реализации. Фокусировка себя полностью оправдывает. тел: \964/ 7О2 36 85 From measl at mfn.org Tue Jan 11 09:18:45 2011 From: measl at mfn.org (J.A. Terranson) Date: Tue, 11 Jan 2011 11:18:45 -0600 (CST) Subject: Cypherpunks Targeted In-Reply-To: References: Message-ID: On Sat, 8 Jan 2011, Tyler Durden wrote: > Fuck 'em. We won, plain and simple. > And what is the persecution of Assange but some sort of revenge from a society > that has, all of a sudden, woken up to the reality of the global internet? Not > only is this cat out of the bag, but an identical cat is out of the bag in > practically every country on earth. > > And as amusing as Sterling can be to listen to, if he thinks BlackNet didn't > happen then he has to be high: BlackNet has practically swallowed the internet > and it poops out free files all over the place. No doubt too there's all sorts > of anonymous transactions flowing in there. > > Soon, the Pundits will be asking what diplomacy looks like in a world where > big secrets can't be kept. Jeff? You there Jeff??? //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From coderman at gmail.com Tue Jan 11 12:21:13 2011 From: coderman at gmail.com (coderman) Date: Tue, 11 Jan 2011 12:21:13 -0800 Subject: BHDC11 - De-anonymizing Live CDs through Physical Memory Analysis Message-ID: does anyone know more about the methods to be discussed by Andrew Case next week? the memory analysis of Tor seems interesting. (do Tor Live CDs need a new kexec target for memtest sweeps / ram zeroisation? :) http://www.blackhat.com/html/bh-dc-11/bh-dc-11-briefings.html#Case """ Traditional digital forensics encompasses the examination of data from an offline or bdeadb source such as a disk image. Since the filesystem is intact on these images, a number of forensics techniques are available for analysis such as file and metadata examination, timelining, deleted file recovery, indexing, and searching. Live CDs present a large problem for this forensics model though as they run solely in RAM and do not interact with the local disk. This removes the ability to perform an orderly examination since the filesystem is no longer readily available and putting random pages of data into context can be very difficult for in-depth investigations. In order to solve this problem, we present a number of techniques that allow for complete recovery of a live CDbs in-memory filesystem and partial recovery of its previously deleted contents. We also present memory analysis of the popular Tor application as it is used by a number of live CDs in an attempt to keep network communications encrypted and anonymous. """ *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From kristianra at mail4y.com Tue Jan 11 14:19:46 2011 From: kristianra at mail4y.com (Fanny Kristian) Date: Tue, 11 Jan 2011 15:19:46 -0700 Subject: Buy Vicodin Online Without Prescription >> Lowest Prices Guaranteed Message-ID: <4d2cd782.2e32b00d@mail4y.com> Buy Vicodin Online Without Prescription >> Lowest Prices Guaranteed Next Day Delivery. We accept: VISA, MasterCard, E-check, AMEX and more. To Buy Vicodin, click here and go to the pharmacy http://cohealth-rx.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 591 bytes Desc: not available URL: From irs at rastan.com.ua Tue Jan 11 07:03:15 2011 From: irs at rastan.com.ua (Tanya Farley) Date: Tue, 11 Jan 2011 18:03:15 +0300 Subject: =?koi8-r?B?9MHL1MnLwSDQz9fFxMXOydEuIPfOxdrB0M7ZxSDQ0s/XxdLLyS4=?= Message-ID: <000d01cbb1a0$ac8c7140$6400a8c0@irs> 17 Января ВНЕЗАПНЫЕ ПРОВЕРКИ КОНТРОЛИРУЮЩИМИ ОРГАНАМИ. ТАКТИКА ПОВЕДЕНИЯ ПРОВЕРЯЕМЫХ Курс включает в себя формирование теоретической базы знаний, а также рас-смотрение конкретных ситуаций, моделирование возможных действий и реакций во взаимоотношениях с проверяющими органами, психологическую подготовку и настройку к проверке руководителей предприятия и менеджмента. Курс проведут сотрудники образовательного учреждения силовой структуры с опытом практической оперативной и руководящей работы, создатели авторских методик поведения в экстремальных ситуациях. Приняв участие в семинаре, Вы получите знания, достаточные для уверенного и успешного поведения в случае проверок контролирующими органами, навыки кон-кретных действий и отношений с проверяющими органами. \Моск. код/ 4Ч5.З2/66 \\// 445*З/9/6*8 Цель: формирование теоретической базы знаний, а также рассмотрение конкретных ситуаций, моделирование возможных действий и реакций во взаимоотношениях с проверяющими органами, психологическую подготовку и настройку к проверке руководителей предприятия и менеджмента. Программа: 1. Полезные знания о контролирующих органах и процедурах проведения проверок. * Правовые основания деятельности контролирующих органов - какие законы и внутренние приказы ее регламентируют. * Полномочия контролирующих органов - что разрешено и что запрещено им делать. * Условия проведения проверок - виды, продолжительность, документальное оформление, что проверяется, что предоставлять, куда пускать и что показывать, а что и нет. 2. Права и возможности предпринимателей при проведении проверок. * Какие законы и инстанции защищают предпринимателя, как ими пользоваться, что от них ожидать. * Куда экстренно обращаться в случае внезапной проверки и куда обжаловать ее последствия. * Как поддерживать постоянные конструктивные отношения с органами власти и контролирующими органами и пользоваться их поддержкой. 3. Действия при контактах с контролирующими органами. * Внезапные и плановые проверки, оперативно-розыскные и следственные действия, судебное разбирательство, отношения с местными органами власти. * Как узнать о предстоящих проверках, как подготовиться, как встретить проверяющих и удостовериться, что это не мошенники, как выяснить истинные цели проверки - просто проверка, вымогательство, содействие конкурентам. * Что делать от начала проверки и до ее окончания проверяемым - руководителям и персоналу. * Как влиять на ход и результаты проверки, используя правовые, организационные и психологические механизмы. * Что делать после проверки, чтобы смягчить ее последствия. 4. Готовность к проверкам и общению с органами власти. * Как сформировать конструктивный настрой и боевой дух. * Как повысить "сопротивляемость организма" - каждого сотрудника и предприятия в целом, усилить "иммунитет" к проверкам. По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 Московский код: 742/9-1_9*8 \\// 4Ч5*З*9-6/8 From kgbuubvt at racoonplastic.ru Tue Jan 11 05:50:45 2011 From: kgbuubvt at racoonplastic.ru (=?koi8-r?B?7sEgy8/M0cTLySDLIMvBw8vB0tHNLg==?=) Date: Tue, 11 Jan 2011 19:20:45 +0530 Subject: =?koi8-r?B?IPfZxdrEzs/FIM3F0s/Q0snR1MnFIO3Z28vJziCWIO3B0tTZzs/Xzw==?= Message-ID: <000d01cbb196$8bcd7620$6400a8c0@kgbuubvt> 15 Января Выездное мероприятие Мышкин √ Мартыново. На колядки к кацкарям. Последние изменения в законодательстве. Обмен опытом Цель: Совместить обучение и отдых; Расширить деловые контакты; Обсудить актуальные вопросы и обменяться опытом с коллегами; Получить яркие впечатления от экскурсий Отправление / прибытие: Ст. метро "Алексеевская", последний вагон из центра, Проспект Мира, д. 112. Выезд - 7:30. Возвращение около 22:30 По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: Московский код; Ч454О95 > 742_9I.98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1399 bytes Desc: not available URL: From gerli at marklaud.ee Tue Jan 11 10:58:27 2011 From: gerli at marklaud.ee (=?koi8-r?B?5M/T1MHXy8Eg3MwuINPPz8LdLg==?=) Date: Tue, 11 Jan 2011 19:58:27 +0100 Subject: =?koi8-r?B?8s/T08nRIM/UIDM1MDAg0tXCLg==?= Message-ID: <000d01cbb1c1$879bf2e0$6400a8c0@gerli> Предлагаем качественную доставку рекламы Базы адресов постоянно обновляются Очень гибкая система скидок постоянным клиентам до 50% При заказе 2х рассылок, 3я бесплатная; Подготовка макета бесплатно; Быстрый выход рассылки, по желанию день в день; Самый массовый охват целевой аудитории Пробив фильтров. Любые формы оплаты; Каждая рассылка перед отправкой тестируется; Москва от 2 тыс руб. Россия от 3000 руб. Страны СНГ от 2,5 тыс руб. Наши цены самые альтернативные, закажите у Нас и Вы будете удивлены качеством обслуживания. Формируем базы под каждое направление, продукт реализации. Фокусировка себя полностью оправдывает. тел: +7 (964) 7О2-3685 From eugen at leitl.org Tue Jan 11 12:24:10 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 11 Jan 2011 21:24:10 +0100 Subject: BHDC11 - De-anonymizing Live CDs through Physical Memory Analysis Message-ID: <20110111202410.GY16518@leitl.org> ----- Forwarded message from coderman ----- From anna at mail.nadir.org Tue Jan 11 15:15:14 2011 From: anna at mail.nadir.org (Anna) Date: Wed, 12 Jan 2011 00:15:14 +0100 Subject: Glenn Greenwald: DOJ subpoenas Twitter records of several WikiLeaks volunteers (Salon.com) Message-ID: Hi, an interesting article concerning this was published in the New York Times on monday: Twitter Shines a Spotlight on Secret F.B.I. Subpoenas http://www.nytimes.com/2011/01/10/business/media/10link.html?_r=1 It seems that Twitter was only able to unseal the subpoena because of a case that was made public last August: Nick Merrill got a gag order by the FBI under the Patriot Act in 2004. He ran a small ISP, hosting NGOs, independent media and more. The FBI wanted information about one of his clients. With the support of the ACLU he fought the gag order, not being allowed to tell *anyone* that this was going on for six years. He was the first person to fight a gag order and only because he was partly successful it was possible for Twitter to unseal the subpoenas and let the account owners know about it. Nick told his story during the CCC congress in December in Berlin (27c3), see http://events.ccc.de/congress/2010/Fahrplan/events/4263.en.html http://mirror.fem-net.de/CCC/27C3/mp4-h264-HQ/27c3-4263-en-resisting_excessive_government_surveillance.mp4 or http://mirror.fem-net.de/CCC/27C3/mp3-audio-only/27c3-4263-en-resisting_excessive_government_surveillance.mp3 or http://www.youtube.com/user/kkkwwwaaakkk#p/u/6/sDkHPNbCC1M Rop Gonggrijp, one of the people about whom Twitter is being subpoenad, held the keynote of the 27c3 and also talked about his experience with Wikileaks in Iceland, and why he withdrew from that work. At the time of the keynote he didn't know about the subpoena, I believe. http://mirror.fem-net.de/CCC/27C3/mp4-h264-HQ/27c3-4302-en-27c3_keynote_we_come_in_peace.mp4 or http://mirror.fem-net.de/CCC/27C3/mp3-audio-only/27c3-4302-en-27c3_keynote_we_come_in_peace.mp3 or http://www.youtube.com/user/kkkwwwaaakkk#p/search/2/ALNovMk3fC8 Two remarkable talks. Best A. Am 11.01.11 11:20, schrieb Patrice Riemens: > bwo IAC2009 list > > original at: > http://www.salon.com/news/opinion/glenn_greenwald/2011/01/07/twitter/index.html > (http://bit.ly/fPXo7E ) > > The most interesting part is of course about all the other service > providers which probably also have been 'approached' by the DOJ, and have > not disclosed the such. Generally I think Twitter has acted remarkably > well in this. See also the <>'s blog: > http://rop.gonggri.jp <...> # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From kathrinehelainebn at acbs.com Wed Jan 12 03:54:23 2011 From: kathrinehelainebn at acbs.com (Kathrine Helaine) Date: Wed, 12 Jan 2011 04:54:23 -0700 Subject: Buy Cheap Generic Viagra [Sildenafil Citrate] Online at 80% Discount Prices ... Message-ID: <201101120455.6CBE1BBDDD4C58B817AE5@up6qu3b> Discount Online Pharmacy | Buy Generic Medicines at Discount Buy cheap generic prescription drugs at discount from the best online ... Buy Cheap Generic Viagra [Sildenafil Citrate] Online at 80% Discount Prices ... http://dietpillsdrugstore.ru From eugen at leitl.org Wed Jan 12 00:24:29 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 12 Jan 2011 09:24:29 +0100 Subject: Glenn Greenwald: DOJ subpoenas Twitter records of several WikiLeaks volunteers (Salon.com) Message-ID: <20110112082429.GI16518@leitl.org> ----- Forwarded message from Anna ----- From lmireyavs at currentmail.com Wed Jan 12 09:13:18 2011 From: lmireyavs at currentmail.com (Linsey Mireya) Date: Wed, 12 Jan 2011 10:13:18 -0700 Subject: Buy Cheap online Generic Viagra. Medication for people having erectile dysfunction. Message-ID: <4d2de12e.a7042cf7@currentmail.com> Discount Online Pharmacy | Buy Generic Medicines at Discount Buy cheap generic prescription drugs at discount from the best online ... Buy Cheap Generic Viagra [Sildenafil Citrate] Online at 80% Discount Prices ... http://dietpillsdrugstore.ru From irinka-07 at 100200.ru Wed Jan 12 00:32:57 2011 From: irinka-07 at 100200.ru (Concetta Pendleton) Date: Wed, 12 Jan 2011 11:32:57 +0300 Subject: =?koi8-r?B?9NLVwtkg09TBzNjO2cU=?= Message-ID: > ТРУБЫ СТАЛЬНЫЕ от 219 до 1420 мм Постоянное складское наличие Прямые Поставки с заводов-производителей Гибкая система сотрудничества с постоянными клиентами Всегда актуальные цены Вся продукция сертифицирована Квалифицированные консультации Сотрудничество с Нами приятно удивит Вас компетентностью и оперативностью выполнения Ваших заказов по доступным ценам. Формируем самые сложные заказы в самые короткие сроки. тел: \928/ 229 ОО 65 Юлия -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2034 bytes Desc: not available URL: From lee at royalgardens.us Wed Jan 12 14:40:05 2011 From: lee at royalgardens.us (Lee @ Royal Gardens) Date: Wed, 12 Jan 2011 12:40:05 -1000 Subject: Fwd: VOLCANO: Establishment of international preserve for Kilauea Volcano In-Reply-To: References: Message-ID: ---------- Forwarded message ---------- From: Kirsten Chojnicki Date: Wed, 12 Jan 2011 11:16:48 -0700 Subject: VOLCANO: Establishment of international preserve for Kilauea Volcano To: VOLCANO at asu.edu ************************************************************************************ Establishment of international preserve for Kilauea Volcano From: "Lee @ Royal Gardens" ************************************************************************************ ESTABLISHMENT OF INTERNATIONAL PRESERVE for the active flow fields of KILAUEA VOLCANO and related areas. The active flow fields contiguous with Kilauea and Pu'u O'o volcanic systems cover a wide area adjacent to the Hawaii Volcanos National Park and state or local preserve areas and include small areas of privately owned and state owned land. UNESCO has indicated these areas as protected sites and religious and cultural groups globally respect this area as a place of significance and natural wonder. Thousands of individuals visit daily at a makeshift viewing area. - This area is frequently innundated with diverse lava flows and is expected to continue as an active volcanic area for a long time. - The majority of the area is a collection of state, county, and national protected areas or state holdings which are entirely unmanaged and most frequently under exclusion orders for prohibiting public access and for situations related to the volcano. - State of Hawaii DLNR (Department of Land and Natural Resources) is also responsible for numerous fragmented sections which they would prefer to dispose given fire and safety liability and impossibility to manage. - Of the remaining private property, 40% is in tax default and can be transferred by county order and most parcels are appraised at $100 per parcel for intended emanent domain and are vacant having not been touched since the original lava flows. - The National Park has trouble managing its eastern expansion as it is active flows and out of range for rescue and safety crews and local emergency services refuse to respond throughout the entire area. These combined factors strongly encourage the establishment of an INTERNATIONAL PRESERVE. Parties represented include: Royal Gardens Community Association, Keone Ranches Estates, Kalapana Gardens Subdivision, land owners in Kaimu, Kalapana, Kupahua, etc representing a strong majority of land holders in this exciting but dangerous area. ============================================================== To unsubscribe from the volcano list, send the message: signoff volcano to: listserv at asu.edu, or write to: volcano-request at asu.edu. To contribute to the volcano list, send your message to: volcano at asu.edu. Please do not send attachments. ============================================================== From john.hearns at mclaren.com Wed Jan 12 04:58:17 2011 From: john.hearns at mclaren.com (Hearns, John) Date: Wed, 12 Jan 2011 12:58:17 -0000 Subject: [Beowulf] Amazon cloud computing used to crack wi-fi passwords Message-ID: http://www.theregister.co.uk/2011/01/11/amazon_cloud_wifi_cracking/ I think this is appropriate for an HPC list. This guy is using GPUs on Amazon's cloud service to brute force 400 000 passwords per second. Smart, but a bit depressing really. John Hearns | CFD Hardware Specialist | McLaren Racing Limited McLaren Technology Centre, Chertsey Road, Woking, Surrey GU21 4YH, UK T: +44 (0) 1483 261000 D: +44 (0) 1483 262352 F: +44 (0) 1483 261010 E: john.hearns at mclaren.com W: www.mclaren.com The contents of this email are confidential and for the exclusive use of the intended recipient. If you receive this email in error you should not copy it, retransmit it, use it or disclose its contents but should return it to the sender immediately and delete your copy. _______________________________________________ Beowulf mailing list, Beowulf at beowulf.org sponsored by Penguin Computing To change your subscription (digest mode or unsubscribe) visit http://www.beowulf.org/mailman/listinfo/beowulf ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Jan 12 05:12:48 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 12 Jan 2011 14:12:48 +0100 Subject: [Beowulf] Amazon cloud computing used to crack wi-fi passwords Message-ID: <20110112131248.GM16518@leitl.org> ----- Forwarded message from "Hearns, John" ----- From eugen at leitl.org Wed Jan 12 06:15:34 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 12 Jan 2011 15:15:34 +0100 Subject: EDRi-gram newsletter - Number 9.1, 12 January 2011 Message-ID: <20110112141534.GO16518@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From edrigram at edri.org Wed Jan 12 05:37:20 2011 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 12 Jan 2011 15:37:20 +0200 Subject: EDRi-gram newsletter - Number 9.1, 12 January 2011 Message-ID: ============================================================ EDRi-gram biweekly newsletter about digital civil rights in Europe Number 9.1, 12 January 2011 ============================================================ Contents ============================================================ 1. Web blocking discussions in European Parliament reach critical stage 2. EU Commissioner criticises US for the data protection negotiations 3. IPR Enforcement Plan: Blocking, filtering and monitoring via injunction 4. New media law in Hungary allows Internet censorship 5. Polish Supreme Court: All electronic press must be registered 6. French law Loppsi 2 adopted by the General Assembly 7. RapidShare wins another alleged copyright infringement case 8. ENDitorial: EDRi's data retention workshop at CCC 9. Recommended Reading 10. Agenda 11. About ============================================================ 1. Web blocking discussions in European Parliament reach critical stage ============================================================ The European Parliament is currently at a crucial stage in the discussions on the European Commission's proposals on web blocking. The MEP in charge, Roberta Angelilli, has presented her draft report, other parliamentarians have until 20 January to propose other amendments and an "orientation vote" which will informally set Parliament policy on issues of general agreement will take place on 3 February. Despite the fact that the original proposal was made by the Commission in March 2009, the level of debate has not developed to any great extent after almost two years of discussion. The fact that the Commission failed to provide any evidence from countries that already block websites has not had any positive impact whatsoever. The fact that blocking is increasingly irrelevant due to the use of P2P and hacked servers instead of static "blockable" websites or the fact that blocking will give criminals immediate warning that they have been detected are of no particular importance in the debate. Indeed, even the actual purpose of blocking - accidental access, deliberate access or something else - is not an issue which has been discussed in any detail. Nonetheless, in the debate held in the Civil Liberties Committee on 10 January 2011, eleven of the twelve parliamentarians who spoke were opposed to the introduction of mandatory EU-wide blocking, German conservative MEP Axel Voss being the sole exception. Roberta Angelilli's position is somewhat unclear - in the legally binding articles of her report, she suggests making blocking optional. However, in the explanatory "recitals", she suggests that mechanisms "be put in place to block access from the Union's territory to internet pages identified as containing or disseminating child pornography" and promotes the concept that Internet access providers should take on the role of extra-judicial censors. With regard to extra-judicial blocking, the Commission supports this approach, despite having stated in an impact assessment in 2007 that "the adoption of blocking measures necessarily implies a restriction of human rights, in particular the freedom of expression and therefore, it can only be imposed by law". The blocking proposal has even led the European Commission to enter the public affairs market. On 12 January, they cooperated with the Child Exploitation and Online Protection Centre (CEOP - affiliated to the UK police Serious Organised Crime Agency) to transport parliamentarians to London for a day of pro-blocking lobbying. EDRi campaign page (10.01.2011) http://www.edri.org/stop_web_blocking Draft parliament report on the proposal for a directive of the European Parliament and of the Council on combating sexual abuse, sexual exploitation of children and child pornography, repealing Framework Decision 2004/68/JHA (16.12.2010) http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/pr/837/837120/837120en.pdf Proposal for a Directive on combating the sexual abuse, sexual exploitation of children and child pornography, repealing Framework Decision 2004/68/JHA (29.03.2010) http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2010:0094:FIN:EN:PDF Impact Assessment - Proposal for a Council Framework Decision amending Framework Decision 2002/475/JHA on combating terrorism (6.11.2007) http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=SEC:2007:1424:FIN:EN:PDF (contribution by Joe McNamee - EDRi) ============================================================ 2. EU Commissioner criticises US for the data protection negotiations ============================================================ Following a meeting she had in December 2010 with US attorney general Eric Holder and Interior Minister Janet Napolitano, the EU Justice Commissioner Viviane Reding expressed her concern on what she believed to be a lack of interest of the US officials regarding the data protection agreement to be negotiated between EU and US. "The meeting turned out to be somewhat disappointing on data protection. > From the outset, we have noted an apparent lack of interest on the US side to talk seriously about data protection," Ms Reding said in a statement adding that the US have not appointed a negotiator yet. The US administration disagreed with Ms. Reding and William Kennard, the United States ambassador to the European Union, stated that in his opinion things had moved ahead and that, in order to decide on the negotiator, the US administration needed to better understand what EU negotiators wanted to include in the agreement. The EU-US data-sharing agreement (so-called SWIFT deal) that gives US authorities access to bank transfer information for anti-terrorism purposes was rejected by EU legislature in February 2010 pending better data protection conditions. An agreement became operational in August 2010 when further protections were added to the SWIFT deal, such as the presence of an EU supervisor in Washington to check that no abuse occurs. In the meantime, US authorities continue talks for the existing EU-US PNR (Passenger Name Record) exchange agreement which obliges airlines to send details on passengers flying to USA that are to be cross-checked with the US terrorist watch list. The scope of the data use is wider than the European Parliament is comfortable with. EP is asking for a high level of protection of the transferred personal data (such as PNR data and financial information) and wants a charter of rights outlining the fundamental principles that should stand at the basis of future data-sharing, covering also bilateral agreements. According to leaked information, the US authorities have several parallel bilateral data sharing agreements with European governments."Member states do business with the US and don't tell anyone, not even their own parliaments. So the things the European Parliament can do on PNR for instance, are marginal, because if Washington doesn't get it that way, they do it bilaterally," stated MEP Sophie in't Veld. The EU wants citizens to get the right to rectify and delete data and to go to court in case of data misuse and asks for a more proportionate use of the data by the authorities. Reding wants to obtain limitations of retained data , a strict ban on the transfer of data to other countries and asks for an independent data protection supervisor to be appointed by the US for the supervision of the authorities' use of citizen data, as there is in Europe. Reding slams US over data privacy (21.12.2010) http://euobserver.com/22/31555 Reding asks the "Kissinger question" on Data Protection Agreement with US (22.12.2010) http://bendrath.blogspot.com/2010/12/reding-asks-kissinger-question-on-data.html Viviane Reding takes on US over data privacy rights in anti-terror campaign (20.12.2010) http://www.guardian.co.uk/world/2010/dec/20/eu-accuse-us-on-data-protection US envoy rejects Reding's charges on data protection (20.12.2010) http://www.europeanvoice.com/article/2010/12/us-envoy-rejects-reding-s-charges-on-data-protection/69795.aspx EDRi-gram: Data protection authorities call for a strict EU-US privacy agreement (1.12.2010) http://www.edri.org/edrigram/number8.23/eu-us-privacy-agreement ============================================================ 3. IPR Enforcement Plan: Blocking, filtering and monitoring via injunction ============================================================ Just before Christmas, the European Commission published its report on the application of the IPR Enforcement Directive. The text, while written in fairly neutral terms, does subtly show the Commission's plans for the enforcement of intellectual property rights and the dangers that these hold for citizens' rights. Two points in particular stand out - the circumvention of the E-Commerce Directive, in particular to overturn the ban on imposing a "general obligation to monitor" on Internet providers, and the intended weakening of the EU's data protection regime for the benefit of copyright holders. A.General obligation to monitor The text explains that in order to have injunctions work "efficiently, it could be useful to clarify that injunctions should not depend on the liability of the intermediary". As the "no obligation to monitor" obligation in the E-Commerce Directive is part of the intermediary liability section of the Directive, this "clarification" in any revision of the Directive would aim to give Member States the green light to impose monitoring and blocking obligations on Internet intermediaries. One example of how this would work in practice can be found in the Belgian Scarlet/Sabam case, which is currently before the European Court of Justice. In that case, the lower Belgian court decided that the Internet Provider Scarlet was obliged to implement software on its network which would block all "infringing" communications (identified automatically via software) of sound files transferred via peer to peer over its network. Commissioner Malmstrvm, who said in May 2010 that the "Commission has absolutely no plans to propose blocking of other types of content" (apart from child abuse images) and who promised to "personally very strongly oppose any such idea" has so far been silent on this issue. Furthermore, the findings reported in the Staff Working Paper that accompanies this Report indicate that the currently available laws are not strong enough to combat infringements of intellectual property rights effectively, so it proposes deputizing internet intermediaries in an extra-judicial policing role. "Given intermediaries' favourable position to contribute to the prevention and termination of online infringements, the Commission could explore how to involve them more closely." B. Data protection The Communication also seeks to undermine the fundamental right to privacy by implying that a "rebalancing" is necessary between the right to privacy and the right to property, as defined in the EU Charter on Fundamental Rights. This has been one of the key demands of the content industry, which argues that industry (that should be involved more closely in the enforcement of IPR according to the Commission) should have greater rights to use consumer data in order to police and prosecute their own clients. The following text is from page 7 of the report: "National laws implementing the various directives must therefore be construed in a way that allows a balance to be struck between these rights in each case in order to guarantee that the provision on the right of information can protect the rightholders effectively without compromising rights relating to the protection of personal data." The Communication is part of a consultation and replies should be received by 31 March 2011. All citizens who care about fundamental rights should respond to the Communication. Commission Communication - Application of Directive 2004/48/EC of the European Parliament and the Council of 29 April 2004 on the enforcement of intellectual property rights (22.12.2010) http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2010:0779:FIN:EN:PDF SABAM v. S.A. Scarlet, District Court of Brussels, No. 04/8975/A, Decision of 29 June 2007, published in CAELJ Translation Series #001 (Mady, Bourrouilhou, & Hughes, trans.), 25 Cardozo Arts & Ent. L. J. 1279 (2008) http://www.cardozoaelj.net/issues/08/case001.pdf Malmstrvm's promise: "Combating sexual abuse, sexual exploitation of children and child pornography: the Commission's proposed Directive" (6.05.2010) http://www.meldpunt-kinderporno.nl/files/Biblio/Speech-Malmstrom-Combating-sexual-abuse06_05_2010.pdf (contribution by Joe McNamee - EDRi) ============================================================ 4. New media law in Hungary allows Internet censorship ============================================================ On 1 January 2011, a new Hungarian media law entered into force, giving the government the power to control the Internet, endangering the freedom of speech and journalism in general. As Hungary took over the EU Presidency on 6 January 2011, in a context where there are strong attempts from various EU governments to censor the Internet, the Hungarian authorities started the year with a new law giving excessive powers and control to the government over the public media including Internet content. According to the newly introduced law, all media must be registered and the licences may be suspended or withdrawn for breaches. The text does not distinguish between different types of media - traditional broadcasters as well as online platforms have to obey the same standards - and extends the protection against content, ranging from hate speech to unintentional insult and incitement to hatred. The law introduces the creation of a strong censorship authority which has the power to unilaterally judge content material on the basis of broad and unclearly defined criteria such as the protection of public order or the appropriate information in relation to public affairs. Perceived breaching of the law may bring forth fines of thousands of Euro which will likely lead to media self-censorship, so much than the text limits the journalists' capacity of protecting their sources, the authority having the power to seize documents and files if it deems necessary (even legally protected data). The law is largely criticised and opposed by civil liberties organisations, civil groups, media lawyers and even by other EU governments. Werner Hoyer, the German deputy foreign minister stated that in his opinion the media law "does not represent the idea of a union that is built on unity in diversity," and added that Hungary should not be allowed to speak on violations of free speech in Belarus as "the right to speak in the name of Europe naturally implies a duty to respect internal European norms to be able to represent them to the outside world in credible fashion." A spokesperson for the French Presidency also stated France wanted the Hungarian media law text to be altered, deeming it "incompatible" with the idea of freedom of the press. All the Hungarian parliamentary opposition parties said that they would submit an appeal to the country's Constitutional Court. A joint analysis of the Hungarian Civil Liberties Union, the Evtvvs Karoly Institute and the Hungarian Helsinki Committee, assessing the method and pace of the legislative work of the newly elected Hungarian Parliament, concluded the law violated the principle of the rule of law. A group of Internet citizens, blackout4hungary, initiated a movement calling on all Hungarians to turn their websites black starting with 5 January 2010, as a protest against Internet censorship. Following a meeting with the EU college of Commissioners on the EU priorities for the next 6 years, the Hungarian Government seems to have a softer attitude and Viktor Orban, the Hungarian Prime Minister admitted that his government needed to ensure that "adverse debate" did not overshadow the Hungarian EU presidency. Commission President Jose Manuel Barroso stated for the press that he had "received reassurances from the (Hungarian) prime minister that the law is drawn up and will be implemented in full respect of European Union values on media freedom and relevant EU legislation," and that the Prime Minister "equally made clear that adjustments would be made, should the commission, after a legal assessment, find that this is not the case for all aspects of the law." The Commission is now to issue a legal opinion on the matter but no official date has yet been established. Websites Black-out as Drastic Internet Censorship is Introduced in Hungary http://blackout4hungary.net/en/Websites_Black-out_as_Drastic_Internet_Censorship_is_Introduced_in_Hungary.html The second wave of legislation by Hungary's new Parliament - Violating the rule of law (13.12.2010) http://www.ekint.org/ekint_files/File/hungarian%20ngos%20assessing%20the%20second%20wave%20of%20legislation.pdf Barroso puts the squeeze on Hungary over media law (6.01.2011) http://euobserver.com/9/31597/?rk=1 Hungary to change media law if EU deems necessary (7.01.2011) http://euobserver.com/9/31607/?rk=1 Hungary to Regulate All Media (31.12.2010) http://online.wsj.com/article/SB10001424052748704543604576053503044587490.html Neelie Kroes Vice-President of the European Commission responsible for the Digital Agenda Hungary's new media law Open Hearing on Freedom of the Press in Hungary European Parliament (11.01.2011) http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/11/6&format=HTML&aged=0&language=EN&guiLanguage=en ============================================================ 5. Polish Supreme Court: All electronic press must be registered ============================================================ On 15 December 2010, in a cassation proceeding, the Polish Supreme Court decided that all electronic press in Poland must be registered. This decision goes along the line traced by its 2007 decision of the same substance, followed by a corresponding press law amendment proposal by the Ministry of Culture and National Heritage, including obligatory registration of all "electronic press", both of which were strongly criticized by the Polish legal doctrine and internet community. Recently, it seemed that things were improving - the 2010 Ministry of Culture's proposition of press law amendment oozed hope, as it included a voluntary registration of "electronic media" (giving those registering the privileges foreseen by the press law such as journalistic secrecy), excluding from its scope the webpages of personal character, in particular blogs. This recent Supreme Court decision however reverses the positive course of the debate and takes Poland three years back in the discussion on free speech on-line. It must be emphasized that such a Supreme Court decision is literally contrary to Polish press law regulation, as it is based on extensive interpretation of criminal press law liability. The Polish Press Law Act from 26 January 1984 defines "press" as "any periodic publications which do not constitute a closed, uniform entity, appearing no less than once a year, having a regular title or name, current number and date, and in particular: journals, periodicals, news services, regular fax transmissions, bulletins, radio and television programs and film chronicles;" but also "any means of mass media, existing or appearing as a result of technical progress, including broadcasting stations, public television and radio address systems, that broadcast publications periodically as print, picture, sound or using any other broadcasting technique"(Article 7 par. 2 pt. 1). Although arguable, one might consider some examples of electronic publications as constituting press (rather as a particular "mean of mass media", then a "periodic publication" of a "closed form" with a "current number"). Art. 20 of the Press Law Act requires the registration not of press as such, but only for journals and periodicals. Such registration should be done with a district court at the place of the domicile of the publisher. The Act defines "journals" ("dzienniki") as well as "periodicals" ("czasopisma") in art. 7 par. 2 items 2 and 3. There, a journal is defined as "a periodic print or a transmission of sound or sound and vision of general information, appearing no less than once a week", (item 2), while "a periodical is a periodic print appearing no more than once a week and no less than once a year; the regulation may also apply appropriately to transmissions of sound or sound and vision other than described in par. 2." (item 3). According to Press Law Article 45, publishing a journal or a periodical without registration may result in a fine or a criminal sentence of up to 12 months of public service. It ought to be emphasized that the sentence of the 15 December 2010 decision sets the administrator of the subject web-page (gazetabytowska.pl) free. The Supreme Court upholds the decision of the Slupsk district court that did find the plaintiff guilty of infringing Press Law Article 45, that is publishing (on-line) a journal or a periodical without registration, however acquitted him due to the minimal public menace of the offence. The Supreme Court decision upholds this sentence, which means that it finds that failure to register an electronic publication constitutes a crime. In an oral statement, the reporting judge commented that the Court did not aim at registering the entire content of the Internet but wished for the obligation of registering press foreseen in Article 7 to be properly obeyed. It ought to be emphasized that as cited above, Article 7 does not include an obligation to register press as such - this obligation is foreseen in Article 20 and concerns only journals and periodicals, meaning "periodic print or a transmission of sound or sound and vision", so a rare characteristic for electronic media which are available mainly in written, electronic form. This decision goes along the line of the 2007 "Szyciepoprzemysku" decision, concerning another electronic publication available solely on-line. The Supreme Court, in its decision from 26 July 2007 (IV KK 174/07) found that the " deliberations on the fact that, in the light of law, publishing press in electronic form does not require registration are wrong and contrary to entrenched doctrine opinions. (...) It is clear, that the Internet may not be registered (...), just like paper. Paper as such does not have to be registered, however the printed paper must be registered, what is more - not the very paper itself, but rather the activity of printing on it and publishing it in the form of a journal or periodical - meaning press." It went on to say, that "the person distributing without registration in the suitable district court, a journal or a periodical on the Internet, regardless whether such a distribution is accompanied by a transmission in print, next to its electronic form, or whether it exists solely in the electronic form on the Internet, suffices to recognize the crime described in art 45 of Press Law as having been committed." The core problem with the interpretation presented by the Supreme Court lies in the wide responsibility of the web-publisher that in this case is the page-administrator, who, according to the Supreme Court Decision, should be saddled with all the responsibilities of an Editor in Chief of a traditional newspaper. The Polish Press Law foresees this responsibility as encompassing the responsibility for the press material published in the periodical or journal under his authority. Furthermore, there is no legal rule allowing for a clear distinction between the web-pages that require registration and those that do not. Leaving this difficult analysis solely to web-page administrators seems a task far too heavy for them to shoulder. What is more, such an obligation, and - following the suggestion of the Supreme Court - the punishment of the ones who do not fulfil it should be considered a breach of one of the basic rules of criminal law: nullum crimen sine lege certa et stricta (this argument was also raised by the defendant accused in the "Gazeta Bytowska" case and by the Helsinki Federation). There is no "clear" and "certain" rule of law that tells the web-administrators of a certain category of web-pages that it is their duty to register their webpage (a webpage of a certain sort, as it is clear that not all web-pages may be considered journals or periodicals). Interpreting that rule out of the existing regulations is an expanding interpretation of a criminal norm that is inadmissible. One must not forget that in the Polish legal system, the Supreme Court Decision is binding solely in the particular case. Nonetheless the role that the legal interpretations made by the highest legal instance plays in the further application of legal norms must not be under appreciated. The decision will not be published, as according to Polish procedural regulations this kind of decision (a provisional ruling "postanowienie") need not be done in writing, when the Court finds the claim "clearly unjustified" and refers to it in an oral statement during a session (such as this case ). Polish Helsinki Foundation statement on the decision (only in Polish, 15.12.2010) http://www.hfhrpol.waw.pl/obserwatorium/index.php?option=com_content&view=article&id=3406:sn-rejestracja-prasy-internetowej-obowizkowa&catid=40:zkraju&Itemid=34 J. Kulesza, Which Legal Standards Should Apply To Web-logs? The present legal position of Internet journals in the European jurisprudence in the light of the European Parliament Committee's on Culture and Education report and Polish Supreme Court decision, Lex Electronica, 2009/3(13) http://www.lex-electronica.org/docs/articles_221.pdf Supreme Court: online newspapers have to register with the court as well as paper ones (only in Polish, 15.12.2010) http://prawo.gazetaprawna.pl/artykuly/472191,sn_gazety_internetowe_trzeba_rejestrowac_w_sadzie_tak_samo_jak_papierowe.htm (Contribution by Joanna Kulesza, University of Lodz, Poland) ============================================================ 6. French law Loppsi 2 adopted by the General Assembly ============================================================ The so-called Loppsi 2 law (loi d'orientation et de programmation pour la performance de la sicuriti intirieure - law on guidelines and programming for the performance of internal security) was approved by the French General Assembly in its second reading on 21 December 2010 with a large majority and is now to go under debate in the Senate in the second reading, in a toughened version. The law which, among several measures covers a mix of security domains, asks ISPs to block Internet sites deemed to have child pornographic content, now includes a version that will no longer require a previous judicial approval, which is actually against the French Constitution, and which may lead to abuses. The law also gives the police the power to install remote spyware on PCs, although in this case, under judicial control. Yet, these types of operations seems to have already been undertaken by DRCI (The Direction Centrale du Renseignement Intirieur - Central Directorate of Interior Intelligence) even before the implementation of the law. The approved text also allows for generalised video surveillance in public places. A very worrying and contested measure is that of giving authorities the power to limit the use of public data only to people whose "morality" has been previously verified. While the draft law waits to enter into its second reading in the Senate, a group of several French liberty groups, union federations, civil associations as well as several political parties have called for a general mobilisation in a protest movement all over the country on 15 January 2011. "This law prepares a control society based on tension and stigmatisations. It materialises the phantasm of the interior enemy and assimilates any contesting act to an attack to the State. It will weaken the prevention and judicial guarantees," says the call to the manifestation. The deputies adopt Loppsi law with a great majority (only in French, 21.12.2010) http://www.numerama.com/magazine/17643-les-deputes-adoptent-la-loi-loppsi-a-une-tres-forte-majorite.html LOPPSI 2: they sell off freedoms! (only in French) http://antiloppsi2.net/002-loppsi-2-ils-soldent-nos-libertes.html Loppsi 2: Return to the contested items (only in French, 7.01.2011) http://www.20minutes.fr/article/649278/societe-loppsi-2-retour-points-contestes EDRigram : French law Loppsi 2 under debate again (15.12.2010) http://www.edri.org/edrigram/number8.24/loppsi-2-french-law ============================================================ 7. RapidShare wins another alleged copyright infringement case ============================================================ RapidShare, the Swiss based file-hosting service, won the appeal against the computer game distributor Atari Europe. In March 2010, D|sseldorf Regional Court ruled that the company had not taken sufficient measures to hinder the distribution of the computer game "Alone in the Dark" via its platform. The Higher Regional Court of D|sseldorf has now dismissed Atari's claim through an amendment of the original ruling, acknowledging RapidShare's efforts to take measures against the illegal distribution of copyrighted material. The Court also ruled against Atari's demands for a keyword filter and an automatic retrieval and deletion of all files containing certain keywords considering such a measure as unreasonable and creating the risk of also deleting legal files that match the same keywords. Other proposed measures such as a manual verification of suspect files and the removal of links on third party search engines were considered impossible, unreasonable and pointless. "The ruling demonstrates once again that RapidShare is operating a fully legal range and has taken measures against the misuse of its service which go beyond the level that is legally required. We are confident that copyright holders will gradually come to accept this conclusion," stated Daniel Raimer, RapidShare's lawyer and spokesman. This is the second decision of the kind taken by the German court in favour of RapidShare. In July 2010 The Higher Regional Court of D|sseldorf ruled against Capelight Pictures giving a similar decision. Also, in May 2009, a US court ruled that RapidShare was not guilty of copyright infringement. RapidShare wins appeal against Atari (6.01.2011) http://www.rapidshare.com/#!rapidshare-ag/rapidshare-ag_news RapidShare's Measures Against Piracy Are Sufficient, Court Rules (6.01.2011) http://torrentfreak.com/rapidshare-wins-appeal-against-atari-110106/ Game over for Atari case against Rapidshare (6.01.2011) http://www.theinquirer.net/inquirer/news/1935366/game-atari-rapidshare EDRi-gram: Germany: Filtering by keywords is not an obligation for a hosting company (28.07.2010) http://www.edri.org/edrigram/number8.15/filter-keywords-not-hosting-germany ============================================================ 8. ENDitorial: EDRi's data retention workshop at CCC ============================================================ Two EDRi members, Bits of Freedom and Panoptykon Foundation, together with one observer Patrick Breyer from AK Vorrat, gave a talk on data retention and hosted a workshop for activists during the Chaos Communication Congress (CCC) which is Europe's biggest meeting of the hacking communities and which takes place every year in Berlin. The 27th congress was held under the revealing title "We come in peace". During four days of meetings, hackers, journalists, activists and a few MEPs discussed the conflicts that threaten freedom in the digital world, the challenges we will face in 2011, technological discoveries made in 2010 and strategies for activism. What we prepared for this occasion was an hour-long lecture presented along with a dynamic slide show. The presentation was composed of five parts: (i) explanation of how data retention came about and what problems we have with it; (ii) overview of key jurisprudence undermining the principle of blanket data retention; (iii) outcomes of the evaluation process and the state of affairs in the European Commission; (iv) cases of abuse from various Member States; and (v) strategies for further action against data retention. Our primary goal was to show that the year 2011 will be crucial in the fight against blanket data retention and therefore we need to create a broad activist movement and gain more social support to make our voice heard. We explained how civil society could exert an influence on the decision makers in Brussels and MEPs and what time frames we faced. We stressed the need for an EU-wide shadow report to be drafted by March and published right before the official report by DG Home. Another point was that we needed to gather data on the use of retention data from various EU countries, translate it into clear and convincing messages for the media and prepare a consistent campaigning strategy. These needs and initial concepts were elaborated during an informal discussion at our workshop, which was announced in the plenary. CCC gave us this opportunity to organise our own event on the second day meant as a discussion space and informal gathering for activists interested in the data retention campaign. We welcomed about 50 persons who discussed with us practical aspects of the campaign for nearly two hours. The energy was high and we felt that another AK Vorrat-type of mobilisation is possible. As a result of this meeting we decided to set up provisional discussion tools - a wiki and a mailing list - where the conversation may continues. Everybody is welcome to join. You can also do it by e-mailing: info at bof dot nl Presentation slides (27.12.2010) http://www.edri.org/files/edri at 27c3.pdf Video recording of the talk (27.12.2010) http://www.vorratsdatenspeicherung.de/content/view/415/1/lang,de/ Summary of the workshop (joint effort, in progress) https://etherpad.foebud.org/dataretentionworkshop Wiki - dedicated to discussion on the campaign name https://etherpad.foebud.org/nameforcampaign (Contribution by Katarzyna Szymielewicz - EDRi-member Panoptykon Foundation, Poland) ============================================================ 9. Recommended Reading ============================================================ Report of the "Comiti des Sages" reflection group on bringing Europe's cultural heritage online (10.01.2011) http://ec.europa.eu/information_society/activities/digital_libraries/doc/reflection_group/final-report-cdS3.pdf Article 29 Working Party - Opinion 8/2010 on applicable law (16.12.2010) http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp179_en.pdf Statewatch is pleased to announce free access to its specialist civil liberties websites: 1. The Statewatch database with 27 000 articles on civil liberties in Europe dating back 20 years http://database.statewatch.org 2. The SEMDOC website: Statewatch European Monitoring Centre on EU Justice and Home Affairs policy http://www.statewatch.org/semdoc ============================================================ 10. Agenda ============================================================ 15-16 January 2011, Galway, Ireland Reset Ireland - action plan for open government and media reform http://resetireland.com/ 25-28 January 2011, Brussels, Belgium The annual Conference Computers, Privacy & Data Protection CPDP 2011 European Data Protection: In Good Health? http://www.cpdpconferences.org/ 26 January 2011, Brussels, Belgium Cultural Diversity and Europe 2020: Nuisance or necessity? http://conferences.euobserver.com/cultural/index/ 23-28 February 2011, Gosier, Guadeloupe, France ICDS 2011- 5th International Conference on Digital Society http://www.iaria.org/conferences2011/ICDS11.html 24-25 February 2011, Berlin, Germany The First OAPEN Conference http://meetings.copernicus.org/oapen2011/ 11-12 March 2011, Ankara, Turkey ICEGEG-2011- 3rd International Conference on E-Government and E-Governance http://www.icegeg.com/index.html 28 March 2011, Paris, France 5th European eAccessbility Forum: Benefits and costs of e-accessibility http://inova.snv.jussieu.fr/evenements/colloques/colloques/70_index_en.html 1 April 2011, Bielefeld, Germany Big Brother Awards Germany http://www.bigbrotherawards.de/index_html-en 17-18 May 2011, Berlin Germany European Data Protection Reform & International Data Protection Compliance http://www.edpd-conference.com 12-15 June 2011, Bled, Slovenia 24th Bled eConference, eFuture: Creating Solutions for the Individual, Organisations and Society http://www.bledconference.org/index.php/eConference/2011 11-12 July 2011, Barcelona, Spain 7th International Conference on Internet, Law & Politics (IDP 2011): Net Neutrality and other challenges for the future of the Internet Abstract submission: 18 February 2011 http://p2pfoundation.ning.com/profiles/blogs/7th-international-conference ============================================================ 11. About ============================================================ EDRI-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRI has 29 members based or with offices in 18 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRI-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and are visible on the EDRI website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. Unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/edri/2.html - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From cryptome at earthlink.net Wed Jan 12 12:54:47 2011 From: cryptome at earthlink.net (John Young) Date: Wed, 12 Jan 2011 15:54:47 -0500 Subject: Leaks do an end around the media mix? Message-ID: Bear in mind that despite the blovia about 250,000 cables allegedly to be released, only 2,017 have been made public, less than 1 percent. Not in waves but in very slow drips with days when none appear despite tongues drooling in expectation. It remains to be seen what the full collection will reveal about the first tiny biased batch which was apparently selected for highest dramatic impact and as the article states, controversy, in accord with Wikileaks' intention, with ever greater hyperbolic bombshells since the fall of 2009. A comprehensive grasp of the Cablegate-branded cache is yet to come, for now only artful and dreadful extrapolation fed very carefully by WL and its media partners for commercial rewards -- rewards which they admittedly relish bragging about yet continue to beg for more under various schemes of imaginary threat and insistence on public protection against boogeymen all too like themselves. Due to the lack of transparency in Wikileaks and its MSM partners, all of which claim confidentiality about their finances, sources, editorial policy and complicity with authorities, and all of whom have refused to provide to the public the raw, undoctored, unspun, files to which they have full, privileged access, it is not possible to verify much of anything that has been claimed by the Wikileaks business cartel hiding behind public benefit cloaks -- typical of scoundrels. They presume to claim their trustworthiness compared to those they allegedly oppose but do not disclose their own secrets, in effect mirroring those they claim to challenge, in behavior, in braggardy, in disdain for criticism, in vaunting their importance, in unceasing appeal financial and, ye gads get in bed with the enemy, legislative protection to head off rather long-toothed conventional threats that are no different in vaporosity from opponents. This lack of imagination by Wikileaks and cohorts could be excused if it was seen as carnivalesque clownism. Or lower spinal stem advertisment. Or fey ignorant anti-intellectualism favored by bald and shaggy maned continentals. Or Onion grade sophmoric halitosic humor. Or simply tawdry political cupidity. These are all successful, and thus highly reproducible in the abysmal standards of screedism, not to tar all honest journalists with this brush but very much to mastic their editors, publishers and the investors jerking the strings of the craven wretches. To wit, old fart Pilger sucking Julian's pickle in The New Statesman, aping Ellsberg's shamelessness. There will be those who will find gold among this dross, and to those a salute, the venals will profit from your freely given investigation which they will take credit for as Wikileaks has fucked Bradley Manning and other sources kept secret nor for their safety but for the benefit of the public fuckers. Bear too in mind little light has been shed on secret operations of authoritatives, Wikileaks among them, instead the informative light has grown dimmer as the celebrity spotlights increase luminosity of the stars and their sucklings. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From teddks at gmail.com Wed Jan 12 17:48:31 2011 From: teddks at gmail.com (Ted Smith) Date: Wed, 12 Jan 2011 20:48:31 -0500 Subject: [Beowulf] Amazon cloud computing used to crack wi-fi passwords In-Reply-To: <20110112131248.GM16518@leitl.org> References: <20110112131248.GM16518@leitl.org> Message-ID: <1294883311.31652.14.camel@anglachel> On Wed, 2011-01-12 at 14:12 +0100, Eugen Leitl wrote: > ----- Forwarded message from "Hearns, John" ----- > > From: "Hearns, John" > Date: Wed, 12 Jan 2011 12:58:17 -0000 > To: beowulf at beowulf.org > Subject: [Beowulf] Amazon cloud computing used to crack wi-fi passwords > > http://www.theregister.co.uk/2011/01/11/amazon_cloud_wifi_cracking/ > > > I think this is appropriate for an HPC list. This guy is using GPUs on > Amazon's > cloud service to brute force 400 000 passwords per second. > Smart, but a bit depressing really. Been done before: ...on CPUs, at least. I wonder if wpacracker.com will update? [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From kere at wheelweb.com Wed Jan 12 17:10:45 2011 From: kere at wheelweb.com (=?koi8-r?B?8sXLz83FzsTBw8nJIMTM0SDV3sHT1M7Jy8/XIPf85C4=?=) Date: Wed, 12 Jan 2011 21:10:45 -0400 Subject: =?koi8-r?B?987F287F1M/Sx8/XwdEg08TFzMvBIMkgxcUg1MHNz9bFzs7PxSDPxs/S?= =?koi8-r?B?zczFzsnF?= Message-ID: <08C92949D6EC48B08A995675164DA16F@USER21> Участникам ВЭД Тема: Внешнеторговая сделка: особенности заключения и реализации I8 Января С 1 ноября 2010г. вступил в силу приказ ФТС об отмене таможенного транзита грузов прибывших на территорию РФ морским и воздушным транспортом. С 1 января 2011г. вводятся новые формы таможенных документов (декларация на товары, транзитная декларация, декларация таможенной стоимости и др.) и новый порядок их заполнения. С 1 января 2011г. вступили в силу отдельные нормы таможенного кодекса в отношении юридических и физических лиц, осуществляющих деятельность в сфере таможенного регулирования. С 1 января 2011г. ФТС внедряет таможенные процедуры и технологии, предусматривающие, в том числе, переход на электронное декларирование при экспорте и импорте товаров без предоставления в таможенные органы соответствующих документов на бумажных носителях. код: (четыре девять пять) ЧЧ*54.О95 **** Ч45*32*66 Цель: Ознакомится с действующими конвенциями в области внешнеторговой сделки. Помочь участникам ВЭД избежать ошибок при осуществлении внешнеторговой сделки. Минимизировать риски и оптимизировать действия при осуществлении внешнеторговой сделки. Программа: Организации внешнеторговой сделки на международных рынках. Разработка стратегии компании в области внешнеэкономической деятельности (ВЭД). Оценка доли и места компании в конкретном сегменте рынка. Источники информации для анализа рынка и конкурентов. Место и роль службы ВЭД в организационной структуре компании. Задачи, функции, должностные обязанности сотрудников службы ВЭД. Использование информационных технологий во ВЭД. Классификация иностранных компаний. Особенности выбора и построения взаимоотношений с различными категориями иностранных партнёров Риски во внешнеэкономической деятельности, их классификация и способы минимизации. Особенности реализации внешнеторговой сделки. Внешнеэкономическая сделка - этапы и способы её оформления. Структура и содержание внешнеторгового контракта купли-продажи. Оплата внешнеторговых сделок. Система валютного регулирования и валютного контроля внешнеторговых операций. Налогообложение внешнеторговых операций. Проблемы возмещения НДС. Особенности подготовки основных документов для реализации внешнеторговой сделки и таможенного оформления товаров:- инвойсы; - спецификации; - упаковочные листы; - международные транспортные документы; - сертификаты; - санитарно-эпидемиологические заключения; - прайс-листы; - экспортные декларации; Таможенное оформление внешнеторговых грузов. Нормативно-правовая база таможенного регулирования ВЭД. Тарифные и нетарифные методы регулирования внешнеторговых сделок. - Задачи, функции и структура таможенных органов РФ. Классификация товаров и товарная номенклатура внешнеэкономической деятельности. Товары "группы риска" и "группы прикрытия". - Страна происхождения товара и система преференций РФ. Как использовать режим преференций в целях экономии таможенных платежей. Таможенная стоимость товаров. Как правильно определить, подтвердить и отстоять таможенную стоимость. Порядок расчета и сроки уплаты таможенных платежей. - Декларирование и таможенное оформление внешнеторговых грузов. "Серые" схемы таможенного оформления. Предпринимательские и таможенные риски и способы их минимизации. - Таможенный контроль внешнеторговых операций и оптово-розничной торговли импортными товарами. Стоимость участия 7500 руб. Вся информация по тел: (код Москвы) 792.2l/2/2 \\\/// 7.9-2-2.1*2/2 *** 19-20 Января 2011 г. Нововведения в таможенное законодательстве: новые формы таможенных деклараций и новый порядок декларирования, контроля и корректировки таможенной стоимости товаров с 01 января 2011 года. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6413 bytes Desc: not available URL: From verdielindsayvv at saeca.com Thu Jan 13 02:10:32 2011 From: verdielindsayvv at saeca.com (Verdie Lindsay) Date: Thu, 13 Jan 2011 03:10:32 -0700 Subject: Cheapest viagra - LOWEST PRICES ON THE WEB, We Accept Visa and Mastercard Credit Cards. Message-ID: <4d2ecf98.2cd172c3@saeca.com> Cheapest viagra - LOWEST PRICES ON THE WEB, We Accept Visa and Mastercard Credit Cards. http://dietpillsdrugstore.ru From lyndseyarielfu at jeraisy.com Thu Jan 13 06:51:24 2011 From: lyndseyarielfu at jeraisy.com (Lyndsey Ariel) Date: Thu, 13 Jan 2011 07:51:24 -0700 Subject: Swiss Watches - Low Prices - Large Selection Of 2011 Models Huge Website & Discount Pricing Message-ID: <41a55q97h29-03032986-143k8v68@drnofdcnn> Swiss Watches - Low Prices Large Selection Of 2011 Models Huge Website & Discount Pricing >> VISIT WEBSITE NOW!<< http://cheapreplicard.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 475 bytes Desc: not available URL: From cadrianaqu at zealllc.com Thu Jan 13 07:05:44 2011 From: cadrianaqu at zealllc.com (Chanda Adriana) Date: Thu, 13 Jan 2011 08:05:44 -0700 Subject: Order VICODIN Online - Best Cheap Price! Message-ID: <201101130806.C92A25DF4F8A1BACB451EF92@n77h15s23> Buy Vicodin Online Without Prescription - Cheap VICODIN Order VICODIN Online - Best Price! http://med-rxsolutions.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 294 bytes Desc: not available URL: From udhay at pobox.com Wed Jan 12 19:13:09 2011 From: udhay at pobox.com (Udhay Shankar N) Date: Thu, 13 Jan 2011 08:43:09 +0530 Subject: [silk] Stochastic Terrorism Message-ID: Fascinating idea. A logical extension of dead drops (or even multi-part crypto keys, if you think about it). Or even Psychohistory. On a related note, I'd recommend John Robb's [1] thoughts on "Open Source Warfare" [2]. Udhay [1] http://globalguerrillas.typepad.com/ [2] http://www.boingboing.net/2010/06/15/john-robb-interview.html http://www.dailykos.com/story/2011/1/10/934890/-Stochastic-Terrorism:-Triggering-the-shooters Stochastic Terrorism: Triggering the shooters. by G2geek Mon Jan 10, 2011 at 05:37:39 PM PST Stochastic terrorism is the use of mass communications to stir up random lone wolves to carry out violent or terrorist acts that are statistically predictable but individually unpredictable. This is what occurs when Bin Laden releases a video that stirs random extremists halfway around the globe to commit a bombing or shooting. This is also the term for what Beck, O'Reilly, Hannity, and others do. And this is what led directly and predictably to a number of cases of ideologically-motivated murder similar to the Tucson shootings. Update: the mechanism spelled out. (This update is to resolve some ambiguity.) The person who actually plants the bomb or assassinates the public official is not the stochastic terrorist, they are the "missile" set in motion by the stochastic terrorist. The stochastic terrorist is the person who uses mass media as their means of setting those "missiles" in motion. Here's the mechanism spelled out concisely: The stochastic terrorist is the person who uses mass media to broadcast memes that incite unstable people to commit violent acts. One or more unstable people responds to the incitement by becoming a lone wolf and committing a violent act. While their action may have been statistically predictable (e.g. "given the provocation, someone will probably do such-and-such"), the specific person and the specific act are not predictable (yet). The stochastic terrorist then has plausible deniability: "Oh, it was just a lone nut, nobody could have predicted he would do that, and I'm not responsible for what people in my audience do." The lone wolf who was the "missile" gets captured and sentenced to life in prison, while the stochastic terrorist keeps his prime time slot and goes on to incite more lone wolves. Further, the stochastic terrorist may be acting either negligently or deliberately, or may be in complete denial of their impact, just like a drunk driver who runs over a pedestrian without even realizing it. Finally, there is no conspiracy here: merely the twisted acts of individuals who are promoting extremism, who get access to national media in which to do it, and the rest follows naturally just as an increase in violent storms follows from an increase in average global temperature. And now we return to the rest of the original diary... -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Jan 12 23:52:01 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 13 Jan 2011 08:52:01 +0100 Subject: [silk] Stochastic Terrorism Message-ID: <20110113075201.GD16518@leitl.org> ----- Forwarded message from Udhay Shankar N ----- From 0-usealiciastanley at fact-tum.com Thu Jan 13 01:07:39 2011 From: 0-usealiciastanley at fact-tum.com (Watches_Jewelry_and_Accessories) Date: Thu, 13 Jan 2011 15:07:39 +0600 Subject: an sea. incompatible A medicine novice surprises Message-ID: <0082435020.PSPREMQP063041@vcndyfstv.wmcqxhpkz.su> Why spend thousands on a Rolex, when we have them for 10x less? Select from Dozens of Products http://10.rs/47V -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 290 bytes Desc: not available URL: From irfanullah at hotsheet.com Wed Jan 12 23:07:46 2011 From: irfanullah at hotsheet.com (Latisha Geiger) Date: Thu, 13 Jan 2011 16:07:46 +0900 Subject: =?koi8-r?B?++Xu5+Xu8+vp5SD36fr5IC0gODAwINUuxSAvIMfPxCAtIMTPIDE0INHO?= =?koi8-r?B?18HS0Q==?= Message-ID: <4D77BB5353DA4833BDADF07AC475AF70@02> ШЕНГЕНСКИЕ ВИЗЫ - СРОЧНО - 800 у.е / год (цена со скидкой 15%) +7 (495) 646 13 93 (круглосуточно / без выходных) Специальное предложение - до 14 января - СКИДКА 15% на мультивизы-шенген Шенгенские ДЕЛОВЫЕ мульти-визы (Италия, Швейцария, Франция, Германия) Мульти-виза за 3 РАБОЧИХ ДНЯ Краткосрочные - от 3 до 30 дней - 100-220 у.е (+ консульский сбор) Среднесрочные - 1 год - 950 у.е, 6 месяцев - 750 у.е, 3 месяца - 550 у.е. (сбор включен) Долгосрочные - 2 года - 1800 у.е, 3 года - 2 650 у.е, 4 года - 3 200 у.е. (сбор включен) Шенгенские мультивизы для уроженцев и жителей Северного Кавказа и паспортов с отказами (граждане России). Мы также поможем с визой в: США, Великобритания, Канада, Австралия, Мексика, ОАЭ. Найдете ДЕШЕВЛЕ - мы дадим СКИДКУ !!! ОПЛАТА только ПОСЛЕ ВЫХОДА ВИЗЫ. ГАРАНТИЯ. +7 (495) 646 13 93 (круглосуточно / без выходных) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2536 bytes Desc: not available URL: From eugen at leitl.org Thu Jan 13 07:37:39 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 13 Jan 2011 16:37:39 +0100 Subject: Leaks do an end around the media mix? Message-ID: <20110113153739.GM16518@leitl.org> ----- Forwarded message from John Young ----- From support at rayservers.com Thu Jan 13 08:51:21 2011 From: support at rayservers.com (Rayservers) Date: Thu, 13 Jan 2011 16:51:21 +0000 Subject: [cryptography] current digital cash / anonymous payment projects? In-Reply-To: <20110113072228.GB18341@subspacefield.org> References: <20101130191248.GC10799@subspacefield.org> <4CF64B26.8050006@iang.org> <4CF65D81.8060902@rayservers.com> <20110113072228.GB18341@subspacefield.org> Message-ID: <4D2F2D89.9010004@rayservers.com> On 13/01/11 07:22, travis+ml-rbcryptography at subspacefield.org wrote: > On Wed, Dec 01, 2010 at 02:36:49PM +0000, Rayservers wrote: >> You mean top down... :) Which is exactly going on here: >> http://www.global-settlement.org/ >> >> And when you start at the top, you have to start at the very top. >> See Public Notice. >> >> So yes, there is a locus of information, it is referenced in the signature. And >> no, admiralty lawyers cannot help you. They don't know the law of the land. > > So, it may be a measure of naivet'e on my part but I just Sunday > realized that apparently there's a fair number of > anti-money-laundering laws designed to prevent anonymous financial > transactions. Silly me, I figured the traceability was simply so they > could reverse certain payments from reversible systems in the case of > theft (well, apart from Western Union and cash, which seem to have > been grandfathered in). Traceability has to exist because there is no money in circulation. > So now I finally get the reference to admiralty courts and lawyers. Seen this?: http://freedom-school.com/keating/how-a-prisoner-funds-america.pdf > Ray, that's a classic and hilarious quote, going down in my digital > memory. ;) > I wonder where one would begin investigating the law around this, > without looking like a money launderer. Basically everywhere that your attorney would never look ;). The GSF documents are a start. There is more in the pipeline. You need to learn Common Law, how to do a Claim of Right, etc. FYI, such a /Claim of Right/ is far advanced. Lessons on Common Law: http://1215.org/ - how it works is basically how a real Court of Record works: At a minimum read every essay here: http://1215.org/lawnotes/lawnotes/foundation.htm At a minimum listen to this: http://1215.org/lawnotes/lawnotes/lectures/introduction/index.html Then go back and read all the GSF documents and claim of right: http://www.global-settlement.org/cms/node/5 This for bonus points (latest developments): http://www.rayservers.com/blog/rod-class-15-issue-doc Basic quiz after all that: 1. What is the difference between money and currency? 2. What is the difference between one of the People of America and a US Citizen? 3. Is the President (the current one, and, say, the last dozen) of the United States an American? 4. What is a Court of Record? 5. What kind of court is a US Federal or State Court or UK equivalent? 6. What is on deposit at a US or UK retail bank? 7. Who /can claim/ to *represent* the people? 8. Define the territory of the United States. 9. What *is* the United States and/or the United Kingdom? 10. What is the /law of the land/ and who can claim to enforce it? The GSF System allows for multiple, independent issuers. The idea is, to start an economy, not a monopoly. See claim of right. Best, Ray. p.s. Feel free to forward a copy to anyone you *know* (do not spam), including but not limited to: Judge Advocate General of US Navy, US Coast Guard, US Supreme Court Justices, World Court, the President of the United States, Prime Minister of UK, US & UK Army Provost Marshal, FBI, CIA, MI5, MI6, House of Commons, US Congress, House of Lords, US Senate, US Fed Res, BoE, SEC, FSA, Interpol and similar in other countries. Any such high powered recipient can then forward his or her response to the quiz to us or one of the lists. Responses will be published, gag orders *notwithstanding*. If you wish to write, write to: Joseph Ray Sundarsson Global Isles Court of Record 115 George Lane South Woodford London E18 1AB -- Rayservers http://www.rayservers.com/ Zurich: +41 43 5000 728 London: +44 20 30 02 74 72 Panama: +507 832 1846 San Francisco: +1 408 419 1978 USA Toll Free: +1 888 265 5009 10:00 - 24:00 GMT We prefer to be paid in gold Globals and silver Isles Global Standard - Global Settlement Foundation http://www.global-settlement.org/ Our PGP key 0x079CCE10 on http://keyserver.rayservers.com/ From dir at 911tlt.ru Thu Jan 13 23:20:37 2011 From: dir at 911tlt.ru (Davis Read) Date: Fri, 14 Jan 2011 16:20:37 +0900 Subject: =?koi8-r?B?5+/y8f3p5SD09fL5IMkg0NXUxdfLySAtIM/UIDE3MCDVLsUuIC0gz8LO?= =?koi8-r?B?z9fMxc7J0SDLwdbE2cUgMTUgzcnO1dQ=?= Message-ID: <40F8EAB44EC34168B83929B36315A709@your1> ГОРЯЧИЕ ПУТЕВКИ И ТУРЫ от 390 тур-операторов по лучшей цене Офисы в Москве и региональный отдел МНОГОКАНАЛЬНЫЙ ТЕЛЕФОН - +7 (495) 646 11 32 (КРУГЛОСУТОЧНО / БЕЗ ВЫХОДНЫХ) Офисы работают с 10:00 до 21:00. ПРЕДЛОЖЕНИЯ ДНЯ Шри-Ланка, Вадувва, отель Villa Ocean View 4* на 11 дней, с 22.01.2011, завтраки - 1210 у.е Доминикана, Пунта Кана, отель Be Live Grand Punta Cana (ex.Grand Oasis Punta Cana) 5*, все включено, на 8 дней, с 15.01.2011 - 960 у.е Чехия, Прага, отель U Sladku 3*, завтраки, на 8 дней, с 23.01 - 175 евро с человека + виза 80 евро Новые горячие туры каждые 15 минут в ленте туров на сайте. Всегда в наличии более 1000 горящих туров и специальных предложений ПЛЯЖНЫЕ ПРЕДЛОЖЕНИЯ ДО 500 У.Е. - Египет, Шарм-Эль-Шейх, Хургада - от 200 долларов - Турция, Белек - от 390 у.е - Индия, ГОА - от 390 у.е. ЭКЗОТИЧЕСКИЕ ТУРЫ - Тайланд, Паттайя - от 490 у.е - Шри-Ланка - от 750 у.е - Доминикана - Пунта-Кана - 1050 у.е - Куба - Варадеро - от 1150 у.е - Мальдивы - от 1 250 у.е - Бали - от 1 350 у.е ТУРЫ В ЕВРОПУ - Чехия, Прага - от 280 евро - Италия, Рим - от 480 евро - Австрия, Вена - от 320 евро - Франция, Париж - от 490 евро СПЕЦИАЛЬНЫЕ ПРЕДЛОЖЕНИЯ НА ДЕНЬ СВЯТОГО ВАЛЕНТИНА, 23 ФЕВРАЛЯ, 8 МАРТА - ГОА, ДОМИНИКАНА, КУБА, ПРАГА, ГОРНОЛЫЖНЫЕ ТУРЫ - БОЛЕЕ 300 ПРЕДЛОЖЕНИЙ ГОРНОЛЫЖНЫЕ ТУРЫ (скидка на группы от 6 человек) - Австрия - от 600 евро - Болгария - от 390 евро - Италия - от 550 евро - Россия - от 6000 рублей - Турция - от 450 у.е - Финляндия - от 380 евро - Франция - от 630 евро - Швейцария - от 670 евро МНОГОКАНАЛЬНЫЙ ТЕЛЕФОН - +7 (495) 646 11 32(КРУГЛОСУТОЧНО / БЕЗ ВЫХОДНЫХ) Офисы работают с 10:00 до 21:00. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3754 bytes Desc: not available URL: From gevlat at motogonki.ru Fri Jan 14 12:42:06 2011 From: gevlat at motogonki.ru (=?koi8-r?B?89TSwcjP19nFINfazi4g1dbFIM7FINPU0sHbzs8=?=) Date: Fri, 14 Jan 2011 17:42:06 -0300 Subject: =?koi8-r?B?7sHMz8fP18/FINDMwc7J0s/Xwc7JxTogzcnOyc3J2sHDydEg7uTm7Cwg?= =?koi8-r?B?09TSwcjP19nIINfazs/Tz9c=?= Message-ID: <8E0A61F12BB34B2E86C5265201412428@junior> Девятнадцатого января Налоговое планирование налогообложения доходов с физических лиц. (НДФЛ, страховые взносы) +7 Московский код: 792-2l.22 или 792_2|/22 Цель: С 2010 года единый социальный налог (ЕСН) отменен – он заменен обязательными страховыми взносами в ФОМС, ФСС и ПФР, ставка которых с 2011 года составит 34% почти для всех налогоплательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала взносов заменена отменой их уплаты, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1.Обзор изменений законодательства, связанных с заменой ЕСН обязательными страховыми взносами. Cколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2010-2011 гг. Какие схемы стали или станут невыгодными; у каких налогоплательщиков положение даже улучшается; в каком случае выплата зарплаты на спецрежимах сохраняет свою актуальность. 2.Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц, которые рассматриваются на семинаре. 3.Использование специальных налоговых режимов: * дивидендные схемы – замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с кассовой дисциплиной и политикой ЦБ. Текущая ситуация с обложением таких доходов НДФЛ. 4.Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5.Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Страхование жизни работников и ДМС за счет предприятия. 6.Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. 7.Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 8.Использование процентных займов от физлиц. Расчет эффективности. 9.Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 10.Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, 11.Создание недоимки по налогам с ФОТ на фирме, не обремененной активами – пример "серой" схемы (как нельзя "оптимизировать"!), 12.Способы подтверждения источников крупных расходов физлиц и когда это необходимо. Продажа имущества физическими лицами без НДФЛ через вклад в уставный капитал и ЕНВД. 13.Ответы на вопросы. По желанию – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 Московский код: 445.З9/68 \\\/// 7_9/2*2.I_2*2 From diana.kiesel at ruhr-uni-bochum.de Fri Jan 14 04:03:22 2011 From: diana.kiesel at ruhr-uni-bochum.de (=?koi8-r?B?8M8g2sHS0MzB1MU=?=) Date: Fri, 14 Jan 2011 18:03:22 +0600 Subject: =?koi8-r?B?z9DUyc3J2sHDyckg0sHTyM/Ez9cgzsEg19nQzMHU1SDCxczPyiDawdLQ?= =?koi8-r?B?zMHU2Q==?= Message-ID: <7C1C530463F5461F96F9A5E8FD2BFEFA@d76c7bf11fc7490> I9 января 2011г. Методы оптимизации расходов на выплату белой зарплаты: уменьшаем страховые взносы Московский код; 4Ч/5_*З2*66 <> 792/_2l_.22 Цель: С 2010 года единый социальный налог (ЕСН) отменен – он заменен обязательными страховыми взносами в ФОМС, ФСС и ПФР, ставка которых с 2011 года составит 34% почти для всех налогоплательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала взносов заменена отменой их уплаты, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1.Обзор изменений законодательства, связанных с заменой ЕСН обязательными страховыми взносами. Cколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2010-2011 гг. Какие схемы стали или станут невыгодными; у каких налогоплательщиков положение даже улучшается; в каком случае выплата зарплаты на спецрежимах сохраняет свою актуальность. 2.Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц, которые рассматриваются на семинаре. 3.Использование специальных налоговых режимов: * дивидендные схемы – замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с кассовой дисциплиной и политикой ЦБ. Текущая ситуация с обложением таких доходов НДФЛ. 4.Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5.Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Страхование жизни работников и ДМС за счет предприятия. 6.Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. 7.Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 8.Использование процентных займов от физлиц. Расчет эффективности. 9.Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 10.Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, 11.Создание недоимки по налогам с ФОТ на фирме, не обремененной активами – пример "серой" схемы (как нельзя "оптимизировать"!), 12.Способы подтверждения источников крупных расходов физлиц и когда это необходимо. Продажа имущества физическими лицами без НДФЛ через вклад в уставный капитал и ЕНВД. 13.Ответы на вопросы. По желанию – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Информацию можно получить по телефонам: 8 (Ч95) 4453266 : 74_291/98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6857 bytes Desc: not available URL: From camera_lumina at hotmail.com Fri Jan 14 18:47:43 2011 From: camera_lumina at hotmail.com (Tyler Durden) Date: Fri, 14 Jan 2011 21:47:43 -0500 Subject: Question about (cypher)Twitter Message-ID: OK, those remaining aged and frail cypherpunks can bash me for not being current... But are there TOR or other-based services that can (kinda) anonymize (for instance) twitter subscriptions? Of course, there could be something fancy that 2-way anonymizes twitter subscriptions within the TOR cloud, but I'm thinking something like that doesn't exist. It would be challenging (and possibly unsecure) for a service to sustainably retain the mapping between twitter subscriber and tweet feed. (Or perhaps that isn't necessary if some subset of tweetstreams are dumped into the cloudsomewhere and then a subscriber goes and gets the relevant ones periodically.*) A cheaper version would be to hide who actively signs up for a feed in a bigass cloud of fake subscriptions to a twitter feed. Of course, ONE of them will be the real subscriber, but the others won't, and it may be fairly tedious (as well as telling) for authorities within certain domains to go through and check each subscriber. -TD *: Come to think of it, there are plenty of web services that log specific tweet streams so that non-cellphone users can go get them. One could access such a service through TOR but then the push capability of tweets and text messages is lost, and also it may be hard to go through TOR with many (cheaper) mobile devices. From measl at mfn.org Fri Jan 14 20:24:03 2011 From: measl at mfn.org (J.A. Terranson) Date: Fri, 14 Jan 2011 22:24:03 -0600 (CST) Subject: Unf**ingBelieveable! Glenn Beck is picking on a 60+++ year old professor at CCNY Message-ID: http://www.democracynow.org/2011/1/14/why_is_glenn_beck_obsessively_targeting This woam "is responsibe for the economic collapse"? Not to mention VERY other negative financial event in the last 4+ years! Priceless... //Alif -- "Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty." Joseph Pulitzer, 1907 Speech From skquinn at speakeasy.net Fri Jan 14 23:13:10 2011 From: skquinn at speakeasy.net (Shawn K. Quinn) Date: Sat, 15 Jan 2011 01:13:10 -0600 Subject: Question about (cypher)Twitter In-Reply-To: References: Message-ID: <1295075590.15872.5.camel@afterburner> On Fri, 2011-01-14 at 21:47 -0500, Tyler Durden wrote: > OK, those remaining aged and frail cypherpunks can bash me for not being > current... > > But are there TOR or other-based services that can (kinda) anonymize (for > instance) twitter subscriptions? Twitter is accessible via Tor; they have done nothing to block it. Or am I misunderstanding your question? Unless you plan to follow protected accounts, you don't need to actually sign up for a Twitter account to keep up with anyone. Each Twitter account has an RSS feed for that account, which does not need authentication with a Twitter account to access. Interesting note: not that long ago, Twitter actually used your authentication info against you and obstructed attempts to read single tweets from accounts that had you blocked, and for a while even the entire feed of accounts blocking you. They have since given up their pathetic attempt to imitate Facebook's (dangerously overpowered, IMO) block function. -- Shawn K. Quinn From jcwinniepj at wwdb.org Sat Jan 15 05:44:03 2011 From: jcwinniepj at wwdb.org (Jude Winnie) Date: Sat, 15 Jan 2011 06:44:03 -0700 Subject: Order VICODIN Online - Best Cheap Price! Message-ID: <201101150644.22EDC2BED4D0379F9DCD4@elxp79p2s> Buy Vicodin Online Without Prescription - Cheap VICODIN Order VICODIN Online - Best Price! http://barx-meds2011.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 278 bytes Desc: not available URL: From michaelslists at gmail.com Fri Jan 14 19:09:15 2011 From: michaelslists at gmail.com (silky) Date: Sat, 15 Jan 2011 14:09:15 +1100 Subject: Question about (cypher)Twitter In-Reply-To: References: Message-ID: On Sat, Jan 15, 2011 at 1:47 PM, Tyler Durden wrote: > OK, those remaining aged and frail cypherpunks can bash me for not being > current... > > But are there TOR or other-based services that can (kinda) anonymize (for > instance) twitter subscriptions? ? -- silky http://dnoondt.wordpress.com/ (Noon Silk) | http://www.mirios.com.au:8081 > "Every morning when I wake up, I experience an exquisite joy  the joy of being this signature." From shinrayleneav at afterwork.com Sat Jan 15 13:35:51 2011 From: shinrayleneav at afterwork.com (Shin Raylene) Date: Sat, 15 Jan 2011 14:35:51 -0700 Subject: Having a bigger weapon can definitely boost one's ego because he knows he can impress any woman he meets. Message-ID: <4d321337.f08243fa@afterwork.com> Just like millions of other men out there, you desire that your penis is a few more inches longer. Having a bigger weapon can definitely boost one's ego because he knows he can impress any woman he meets. Moreover, a guy with an enlarged penis will enjoy mind-blowing sex! click here to give yourself 2-3 inches start from today http://enlargepilltr.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 516 bytes Desc: not available URL: From oyaekoyx at matrix.com Sun Jan 16 06:20:48 2011 From: oyaekoyx at matrix.com (Ofelia Yaeko) Date: Sun, 16 Jan 2011 07:20:48 -0700 Subject: Generic Viagra is used to treat ED or impotence in male. Message-ID: <4d32fec0.88b22407@matrix.com> Generic Viagra | Buy Viagra Generic | Viagra Online | Generic ... Generic Viagra online no Prescription at our reliable and trusted pharmacy with Fastest shipping. Generic Viagra is used to treat ED or impotence in male. http://medsdrugstoretablets.ru From elena at ra2.ru Sat Jan 15 21:52:39 2011 From: elena at ra2.ru (=?koi8-r?B?/MvT0MXEydTP0tUgzyD3/OQ=?=) Date: Sun, 16 Jan 2011 08:52:39 +0300 Subject: =?koi8-r?B?8yAwMSDRztfB0tEgMjAxMSDJ2s3FzsXOydEg1yDUwc3P1sXOzs/NIMvP?= =?koi8-r?B?xMXL08Uu?= Message-ID: 26 Января 2О11г. > C 01 января 2011 года Новое в таможенном законодательстве: нововведения таможенных деклараций (новые формы) изменен порядок декларирования, контроля и корректировки таможенной стоимости товаров. < (код Москвы) ЧЧ5Ч095 \\// Ч45-Ч095 Образование Таможенного союза и единой таможенной территории привело к значительным изменениям в таможенном законодательстве. С 1 июля 2010 года вступил в силу Таможенный кодекс Таможенного союза. С 01 января 2011 года на единой таможенной территории таможенного союза вступают в силу: * новые формы бланков декларации на товары (решение Комиссии таможенного союза №257 от 20 мая 2010 года) и транзитной декларации (решение Комиссии таможенного союза № 289 от 18 июня 2010 года) * инструкция о порядке заполнения декларации на товары (утвержденная в окончательной редакции решением Комиссии таможенного союза №379 от 20 сентября 2010 года) * инструкция о порядке заполнения транзитной декларации (решение Комиссии таможенного союза №289 от 18 июня 2010 года) * новые классификаторы, используемые для заполнения таможенных деклараций (решение Комиссии таможенного союза №378 от 20 сентября 2010 года) * новый порядок декларирования таможенной стоимости и новые формы бланков декларации таможенной стоимости (ДТС и ДТС-1) и корректировки таможенной стоимости и таможенных платежей (КТС) (решение Комиссии таможенного союза № 376 от 20.09.2010 года) Цель: * ознакомить участников ВЭД с особенностями заполнения новых форм деклараций, изменениями в классификаторах, используемых для заполнения таможенных деклараций. * подготовить участников ВЭД к практической работе в условиях действия новых нормативно-правовых документов таможенного союза, регламентирующих вопросы определения, декларирования, контроля и корректировки таможенной стоимости товаров * обсудить проблемы правоприменительной практики по вопросам таможенной стоимости, в том числе дать ответы на вопросы участников ВЭД по актуальным проблемам определения и контроля таможенной стоимости товаров Программа: 1. Новая форма таможенной декларации: особенности заполнения * Изменения в порядке заполнения декларации на товары (ДТ) при декларировании товаров, ввозимых (ввезенных) на таможенную территорию Таможенного союза * Особенности заполнения новой формы декларации на товары, вывозимые с таможенной территории Таможенного союза * Порядок внесения изменений и (или) дополнений в сведения, заявленные в декларации на товары, до и после выпуска товаров * Особенности заполнения графы 47 "Исчисление платежей" 2. Классификаторы и перечни нормативно-справочной информации, используемые для заПолнения таможенных деклараций. Основные изменения. 3. Транзитная декларация: новая форма и правила ее заполнения. 4. Особенности электронного и интернет декларирования. 5. Законодательство Таможенного союза по вопросам таможенной стоимости товаров * Таможенный кодекс Таможенного союза * Соглашение по определению таможенной стоимости товаров, перемещаемых через таможенную границу Таможенного союза; * Решения Комиссии таможенного союза по вопросам таможенной стоимости товаров: * порядок декларирования таможенной стоимости товаров * порядок контроля таможенной стоимости товаров * порядок корректировки таможенной стоимости товаров * новые формы бланков декларации (ДТС и ДТС-1) и корректировки таможенной стоимости (КТС). 6. Практические проблемы заявления, контроля и корректировки таможенной стоимости товаров * решения, принимаемые таможенными органами в ходе таможенного контроля * дополнительная проверка заявленной таможенной стоимости товаров * корректировка таможенной стоимости товаров * порядок обжалования в арбитражных судах решений таможенных органов по вопросам корректировки таможенной стоимости Информацию можно получить по телефонам: +7 (код Москвы) 4Ч5*3266 и Ч45-ЧО95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7423 bytes Desc: not available URL: From dir at 4108402.ru Sun Jan 16 09:42:21 2011 From: dir at 4108402.ru (=?koi8-r?B?+sHSwcLP1M7B0SDQzMHUwQ==?=) Date: Mon, 17 Jan 2011 01:42:21 +0800 Subject: =?koi8-r?B?6dPeydPMxc7J0SDT0sXEzsXHzyDawdLBws/Uy8Eg1yAyMDExIMfPxNUu?= =?koi8-r?B?IA==?= Message-ID: <70AF09A575CE4163A1A1F5719CE881F7@your2e9a419aad> 27 Января ТЕМА: ИЗМЕНЕНИЯ 2011г. Заработная плата: бухгалтерские, налоговые и правовые вопросы +7 (495) ЧЧ_539/68 **** 445З266 Цель: Изучить основные принципы организации и построения систем оплаты труда, рассмотреть порядок и методику расчета среднего заработка, получить рекомендации Лектор профессионально и достоверно расскажет обо всех нюансах и изменениях в расчетах по заработной плате. Программа мероприятия: 1. Классификация выплат, производимых в пользу физических лиц: заработная плата, гарантии, компенсации, прочие. Особенности порядка налогообложения каждого вида выплат. Начисление на выплаты в пользу физических лиц страховых взносов во внебюджетные фонды. 2. Порядок исчисления среднего заработка в 2010 году. Определение расчетного периода. Пе-риоды, исключаемые из расчетного. Выплаты, включаемые в расчет среднего заработка. Порядок учета премий. Корректировка среднего заработка в случае повышения тарифных ставок и окла-дов. 3. Пособия за счет средств ФСС РФ в 2010 году. Особенности исчисления среднего заработка: определение расчетного периода; выплаты, принимаемые в расчет. Алгоритмы исчисления посо-бий по временной нетрудоспособности, по беременности и родам, по уходу за ребенком. Порядок назначения и выплаты пособий. 4. Гарантии: виды и порядок расчетов. Выплаты при направлении работника в командировку. Расчеты с работником при увольнении. 5. Компенсации: виды, порядок предоставления, расчеты. 6. Ответы на вопросы слушателей. Cтоимоcть: 8968 руб. За более подробной информацuей обpащайтеcь по тел: 8 Моск. код: 742_9i98 ; 4Ч5-3968 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3289 bytes Desc: not available URL: From samuel.rose at gmail.com Mon Jan 17 05:04:00 2011 From: samuel.rose at gmail.com (Samuel Rose) Date: Mon, 17 Jan 2011 08:04:00 -0500 Subject: [P2P-F] Bitcoin donation Message-ID: On Mon, Jan 17, 2011 at 5:40 AM, Sepp Hasslberger wrote: > Although I have misgivings about the stability of bitcoin, I support its > use. (It's the only thing out there that is completely de-linked from > official currencies and from things like precious metals, that is workable > for more than just local exchange). > To explain my perplexity on bitcoin stability, I quote from the site > cyclonite linked: > "How much is a Bitcoin worth? > > More all the time... > > As you can see, over a 4 week period, recently... > > The value of B `8?1.00B BTC (one Bitcoin), went from B US$0.06B B to > B US$0.50B B ...within only about 4 weeks. B Yes... B That was an 833% increase > in it's value. B Wow." > (http://www.bitcoinme.com/) > For me, a currency that is to be widely used, should be stable. Stable means > it doesn't go down in value, but it also doesn't go up in value excessively. > It should be roughly keeping its value. Going up as much as bitcoin > evidently does, is a form of instability that will bring disturbance to a > marketplace using bitcoin as its means of exchange. bitcoin does seem to have stabilized after that initial jump. I think the initial jump was due to the network effect of how fast the current group of adopters jumped on board and started using bitcoin. Still, this is a of course a valid point. Although, the value increase seems to have been mostly beneficial to the early adopters. But, I could see how if the system stabilized, then a new wave of adopters jumped on board, it could suddenly become very unbalanced for the initial participants if various scenarios unfold. Although, I am not sure *if* the bitcoin system would automatically inflate in an exponential way each time a new wave of participants joins the system. One real potential problem is making sure that "honest nodes" control the majority of CPU power. So far, so good. It won't be easy for anyone to spoof this system. But, if a group of people wants to intentionally attack the system, there could be problems. Bitcoin is a good candidate for complex systems models as a means to put more foresight into stability, health, etc > This instability could and should be remedied by adjusting the target total > of bitcoin creation with an algorithm that takes into account the number of > active bitcoin users. As the number of users increases, the total target > amount of bitcoins to be created (which currently is fixed at 21,000,000) > should increase, slowly creeping up to accomodate the demand of new users > for bitcoins, in a way to keep the value of one single coin roughly stable. > I do not know whether the creators of bitcoin would be willing to do this. > For me, such an adjustment will be necessary to take bitcoin from > experimental status to widely-used alternative means of payment status. Sepp, this is a great point. One of the nice things about bitcoin is that it is F/LOSS, so it is ultimately fork-able. If bad decisions are made about the growth, the project could be forked, a different governance scheme could be implemented, etc. I don't yet know enough about bitcoin to be 100% sure, but the system at least for the time being does seem to have stabilized (it could simply mean that participation has stabilized). Bit coin claims: "Once a predetermined number of coins have entered circulation, the incentive can transition entirely to transaction fees and be completely inflation free." And yes Michel, I will post this on the blog and in wiki :) > Kind regards > Sepp > > > > > On Jan 17, 2011, at 4:44 AM, Samuel Rose wrote: > > Cyclonite, personally I am ready to work with bitcoin today, although > the rest of p2pf may not be, which I'll respect > > On Sun, Jan 16, 2011 at 5:17 PM, Cyclonite wrote: > > Hi Guys, > > I think there is some kind of misunderstanding here, you do not need to > manually generate any kind of public/private keys as with OpenPGP. > > You can even sign up in a website as mybitcoin.com and start making or > receiving donations. > > In my opinion the best available info for beginners is http://bitcoinme.com. > Please take a look and you will get your doubts clear. > > Best regards, > > Cyclonite. > > -- > > Secure Email contact: https://privacybox.de/cyclonite.msg > > Bitcoin donations jar: 16FVZweaaJLvhAy91oDugqaf84kXiDJ9PG > > > > -------- Original Message -------- > > From: Samuel Rose > > To: james burke > > Cc: Michel Bauwens , cyclonite at safe-mail.net, > p2p-foundation , Sepp Hasslberger > , Georg Pleger > > Subject: Re: Bitcoin donation > > Date: Sat, 15 Jan 2011 09:30:23 -0500 > > On Sat, Jan 15, 2011 at 5:54 AM, james burke wrote: > > Hi Michel, > > Yes, I do have a public key, but yet again, > > another nice idea with terrible interaction design and userbility > > - most people have no clue about public private keys, so this keeps it a > > geek thing > > I agree, although as far as I can see, the application at least takes > > care of this for the user. Still, your point is valid in that some > > people may not understand what is happening. > > > Most of the users of bitcoin now are early adopters, however. So, if > > p2pf did support donation via bitcoin, it would be joining an ecology > > of early adopters, and would likely only receive donation from those > > early adopters. > > - the actual app upon launch is unclear. Where to click, what to do,gah! > > I can't really support this even if it is a p2p solution. > > James > > > Seems reasonable. If p2pf changes it's mind, I'm willing to > > participate in any experiments with bitcoin > > > On Sat, Jan 15, 2011 at 5:57 AM, Michel Bauwens > > wrote: > > James, > > do you have a public key? > > Michel > > On Sat, Jan 15, 2011 at 11:20 AM, Samuel Rose > > wrote: > > This is a p2p application, so we would need to post your's or James's > > public key, and people who want to donate bitcoins would need then > > send you the bitcoins by downloading the bitcoin application and > > sending it to you > > quote: > > "Bitcoin utilizes public/private key digital signatures (ECDSA). A > > coin has its owner's public key on it. When a coin is transferred from > > user A to user B, A adds Bbs public key to the coin and signs it with > > his own private key. Now B owns the coin and can transfer it further. > > To prevent A from transferring the already used coin to another user > > C, a public list of all the previous transactions is collectively > > maintained by the network of Bitcoin nodes, and before each > > transaction the coinbs unusedness will be checked." > > > > On Fri, Jan 14, 2011 at 11:17 PM, Michel Bauwens > > wrote: > > Sam, can you help us install it on the wiki and blog? > > On Sat, Jan 15, 2011 at 11:16 AM, Samuel Rose > > wrote: > > I've downloaded and installed and am game to try with p2pf network > > folks. > > This could actually be really useful for lots of local economy efforts > > too. > > > > On Fri, Jan 14, 2011 at 5:32 AM, Michel Bauwens > > > > wrote: > > Dear, > > thanks a lot for this email, > > it seems that it is worthwhile for us to experiment with this, but I > > will > > forward this to James Burke for possible implementation > > James, I think we should do this, what doB you think? > > Michel > > On Thu, Jan 13, 2011 at 11:42 PM, wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA1 > > Dear friends, > > I have been looking in your site for any reference to Bitcoin for > > making a > > small donation. > > As B you B probably B know, B Bitcoin B (bitcoin.org) B is B a B new kind > > of a > > P2P > > crypto-currency in which the general public can B make donations, > > macro > > B or > > micropayments B in B a B secure B and B anonymous B way B usually > > B without > > B any > > transaction fee involved. > > You can change Bitcoins for real money (eg: https://mtgox.com) or > > purchase > > services or goods in an increasing number of sites. > > In B order to B receive B donations you B only have B to B publish B one > > B of > > your > > accounts B as generated B by the B bitcoin client B or any specialized > > bitcoin > > trader (eg: mybitcoin.com). > > Currently B some B projects B as B www.i2p2.de, > > B www.torrentservers.net > > and > > organizations like the EFF are accepting donations. > > In B my B opinion B this B kind B of decentralized solution without the > > need > > to > > trust B any B middlemen B is much better than B Paypal, Visa or > > Mastercard > > for > > security-minded people as most of your donors are. > > If B you B are B interested in B pushing B Bitcoin forward, B do not > > hesitate > > to > > contact me if you have any doubt. > > Yours, > > Cyclonite > > -- -- Sam Rose Future Forward Institute and Forward Foundation Tel:+1(517) 639-1552 Cel: +1-(517)-974-6451 skype: samuelrose email: samuel.rose at gmail.com http://forwardfound.org http://futureforwardinstitute.org http://hollymeadcapital.com http://p2pfoundation.net http://socialmediaclassroom.com "The universe is not required to be in perfect harmony with human ambition." - Carl Sagan _______________________________________________ P2P Foundation - Mailing list http://www.p2pfoundation.net https://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From shonta.millyut at interstaterelocation.net Mon Jan 17 07:48:54 2011 From: shonta.millyut at interstaterelocation.net (Shonta Milly) Date: Mon, 17 Jan 2011 08:48:54 -0700 Subject: BEST Natural Erection Pills and for all the best herbal sex pills for hard erections Message-ID: <201101170849.1B93B1ACA69EC7CDBAB8A85@j4812d31o> For everything to do with getting a rock hard erection and more on the BEST Natural Erection Pills and for all the best herbal sex pills for hard erections visit: http://bigpenisbusiness.ru From manager at viadan.ru Mon Jan 17 01:27:45 2011 From: manager at viadan.ru (=?koi8-r?B?xMXLzMHSydLP18HOycUgx9LV2s/X?=) Date: Mon, 17 Jan 2011 11:27:45 +0200 Subject: =?koi8-r?B?8yAwMSDRztfB0tEgMjAxMSDJ2s3FzsXOydEg1yDUwc3P1sXOzs/NIMvP?= =?koi8-r?B?xMXL08Uu?= Message-ID: <000d01cbb628$cc95af60$6400a8c0@manager> Двадцатьшестое января > C 01 января 2011 года Новое в таможенном законодательстве: нововведения таможенных деклараций (новые формы) изменен порядок декларирования, контроля и корректировки таможенной стоимости товаров. < (код Москвы) 4Ч5-4О95 и ЧЧ54053 Образование Таможенного союза и единой таможенной территории привело к значительным изменениям в таможенном законодательстве. С 1 июля 2010 года вступил в силу Таможенный кодекс Таможенного союза. С 01 января 2011 года на единой таможенной территории таможенного союза вступают в силу: * новые формы бланков декларации на товары (решение Комиссии таможенного союза ╧257 от 20 мая 2010 года) и транзитной декларации (решение Комиссии таможенного союза ╧ 289 от 18 июня 2010 года) * инструкция о порядке заполнения декларации на товары (утвержденная в окончательной редакции решением Комиссии таможенного союза ╧379 от 20 сентября 2010 года) * инструкция о порядке заполнения транзитной декларации (решение Комиссии таможенного союза ╧289 от 18 июня 2010 года) * новые классификаторы, используемые для заполнения таможенных деклараций (решение Комиссии таможенного союза ╧378 от 20 сентября 2010 года) * новый порядок декларирования таможенной стоимости и новые формы бланков декларации таможенной стоимости (ДТС и ДТС-1) и корректировки таможенной стоимости и таможенных платежей (КТС) (решение Комиссии таможенного союза ╧ 376 от 20.09.2010 года) Цель: * ознакомить участников ВЭД с особенностями заполнения новых форм деклараций, изменениями в классификаторах, используемых для заполнения таможенных деклараций. * подготовить участников ВЭД к практической работе в условиях действия новых нормативно-правовых документов таможенного союза, регламентирующих вопросы определения, декларирования, контроля и корректировки таможенной стоимости товаров * обсудить проблемы правоприменительной практики по вопросам таможенной стоимости, в том числе дать ответы на вопросы участников ВЭД по актуальным проблемам определения и контроля таможенной стоимости товаров Программа: 1. Новая форма таможенной декларации: особенности заполнения * Изменения в порядке заполнения декларации на товары (ДТ) при декларировании товаров, ввозимых (ввезенных) на таможенную территорию Таможенного союза * Особенности заполнения новой формы декларации на товары, вывозимые с таможенной территории Таможенного союза * Порядок внесения изменений и (или) дополнений в сведения, заявленные в декларации на товары, до и после выпуска товаров * Особенности заполнения графы 47 "Исчисление платежей" 2. Классификаторы и перечни нормативно-справочной информации, используемые для заПолнения таможенных деклараций Основные изменения. 3. Транзитная декларация: новая форма и правила ее заполнения. 4. Особенности электронного и интернет декларирования. 5. Законодательство Таможенного союза по вопросам таможенной стоимости товаров * Таможенный кодекс Таможенного союза * Соглашение по определению таможенной стоимости товаров, перемещаемых через таможенную границу Таможенного союза; * Решения Комиссии таможенного союза по вопросам таможенной стоимости товаров: * порядок декларирования таможенной стоимости товаров * порядок контроля таможенной стоимости товаров * порядок корректировки таможенной стоимости товаров * новые формы бланков декларации (ДТС и ДТС-1) и корректировки таможенной стоимости (КТС). 6. Практические проблемы заявления, контроля и корректировки таможенной стоимости товаров * решения, принимаемые таможенными органами в ходе таможенного контроля * дополнительная проверка заявленной таможенной стоимости товаров * корректировка таможенной стоимости товаров * порядок обжалования в арбитражных судах решений таможенных органов по вопросам корректировки таможенной стоимости По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: (код Москвы) 742-9l.98 <<<>>> 4Ч_539.68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7379 bytes Desc: not available URL: From sepp at lastrega.com Mon Jan 17 02:40:52 2011 From: sepp at lastrega.com (Sepp Hasslberger) Date: Mon, 17 Jan 2011 11:40:52 +0100 Subject: [P2P-F] Bitcoin donation Message-ID: Although I have misgivings about the stability of bitcoin, I support its use. (It's the only thing out there that is completely de-linked from official currencies and from things like precious metals, that is workable for more than just local exchange). To explain my perplexity on bitcoin stability, I quote from the site cyclonite linked: "How much is a Bitcoin worth? More all the time... As you can see, over a 4 week period, recently... The value of `8?1.00 BTC (one Bitcoin), went from US$0.06 to US$0.50 ...within only about 4 weeks. Yes... That was an 833% increase in it's value. Wow." (http://www.bitcoinme.com/) For me, a currency that is to be widely used, should be stable. Stable means it doesn't go down in value, but it also doesn't go up in value excessively. It should be roughly keeping its value. Going up as much as bitcoin evidently does, is a form of instability that will bring disturbance to a marketplace using bitcoin as its means of exchange. This instability could and should be remedied by adjusting the target total of bitcoin creation with an algorithm that takes into account the number of active bitcoin users. As the number of users increases, the total target amount of bitcoins to be created (which currently is fixed at 21,000,000) should increase, slowly creeping up to accomodate the demand of new users for bitcoins, in a way to keep the value of one single coin roughly stable. I do not know whether the creators of bitcoin would be willing to do this. For me, such an adjustment will be necessary to take bitcoin from experimental status to widely-used alternative means of payment status. Kind regards Sepp On Jan 17, 2011, at 4:44 AM, Samuel Rose wrote: > Cyclonite, personally I am ready to work with bitcoin today, although > the rest of p2pf may not be, which I'll respect > > On Sun, Jan 16, 2011 at 5:17 PM, Cyclonite wrote: >> Hi Guys, >> >> I think there is some kind of misunderstanding here, you do not need to manually generate any kind of public/private keys as with OpenPGP. >> >> You can even sign up in a website as mybitcoin.com and start making or receiving donations. >> >> In my opinion the best available info for beginners is http://bitcoinme.com. Please take a look and you will get your doubts clear. >> >> Best regards, >> Cyclonite. >> -- >> Secure Email contact: https://privacybox.de/cyclonite.msg >> Bitcoin donations jar: 16FVZweaaJLvhAy91oDugqaf84kXiDJ9PG >> >> >> >> -------- Original Message -------- >> From: Samuel Rose >> To: james burke >> Cc: Michel Bauwens , cyclonite at safe-mail.net, p2p-foundation , Sepp Hasslberger , Georg Pleger >> Subject: Re: Bitcoin donation >> Date: Sat, 15 Jan 2011 09:30:23 -0500 >> >>> On Sat, Jan 15, 2011 at 5:54 AM, james burke wrote: >>>> Hi Michel, >>>> Yes, I do have a public key, but yet again, >>>> another nice idea with terrible interaction design and userbility >>>> - most people have no clue about public private keys, so this keeps it a >>>> geek thing >>> >>> I agree, although as far as I can see, the application at least takes >>> care of this for the user. Still, your point is valid in that some >>> people may not understand what is happening. >>> >>> >>> Most of the users of bitcoin now are early adopters, however. So, if >>> p2pf did support donation via bitcoin, it would be joining an ecology >>> of early adopters, and would likely only receive donation from those >>> early adopters. >>> >>>> - the actual app upon launch is unclear. Where to click, what to do,gah! >>>> >>>> I can't really support this even if it is a p2p solution. >>>> James >>>> >>> >>> Seems reasonable. If p2pf changes it's mind, I'm willing to >>> participate in any experiments with bitcoin >>> >>> >>>> On Sat, Jan 15, 2011 at 5:57 AM, Michel Bauwens >>>> wrote: >>>>> >>>>> James, >>>>> >>>>> do you have a public key? >>>>> >>>>> Michel >>>>> >>>>> On Sat, Jan 15, 2011 at 11:20 AM, Samuel Rose >>>>> wrote: >>>>>> >>>>>> This is a p2p application, so we would need to post your's or James's >>>>>> public key, and people who want to donate bitcoins would need then >>>>>> send you the bitcoins by downloading the bitcoin application and >>>>>> sending it to you >>>>>> >>>>>> quote: >>>>>> >>>>>> "Bitcoin utilizes public/private key digital signatures (ECDSA). A >>>>>> coin has its owner's public key on it. When a coin is transferred from >>>>>> user A to user B, A adds Bbs public key to the coin and signs it with >>>>>> his own private key. Now B owns the coin and can transfer it further. >>>>>> To prevent A from transferring the already used coin to another user >>>>>> C, a public list of all the previous transactions is collectively >>>>>> maintained by the network of Bitcoin nodes, and before each >>>>>> transaction the coinbs unusedness will be checked." >>>>>> >>>>>> >>>>>> >>>>>> On Fri, Jan 14, 2011 at 11:17 PM, Michel Bauwens >>>>>> wrote: >>>>>>> Sam, can you help us install it on the wiki and blog? >>>>>>> >>>>>>> On Sat, Jan 15, 2011 at 11:16 AM, Samuel Rose >>>>>>> wrote: >>>>>>>> >>>>>>>> I've downloaded and installed and am game to try with p2pf network >>>>>>>> folks. >>>>>>>> >>>>>>>> This could actually be really useful for lots of local economy efforts >>>>>>>> too. >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> On Fri, Jan 14, 2011 at 5:32 AM, Michel Bauwens >>>>>>>> >>>>>>>> wrote: >>>>>>>>> Dear, >>>>>>>>> >>>>>>>>> thanks a lot for this email, >>>>>>>>> >>>>>>>>> it seems that it is worthwhile for us to experiment with this, but I >>>>>>>>> will >>>>>>>>> forward this to James Burke for possible implementation >>>>>>>>> >>>>>>>>> James, I think we should do this, what do you think? >>>>>>>>> >>>>>>>>> Michel >>>>>>>>> >>>>>>>>> On Thu, Jan 13, 2011 at 11:42 PM, wrote: >>>>>>>>>> >>>>>>>>>> -----BEGIN PGP SIGNED MESSAGE----- >>>>>>>>>> Hash: SHA1 >>>>>>>>>> >>>>>>>>>> Dear friends, >>>>>>>>>> >>>>>>>>>> I have been looking in your site for any reference to Bitcoin for >>>>>>>>>> making a >>>>>>>>>> small donation. >>>>>>>>>> >>>>>>>>>> As you probably know, Bitcoin (bitcoin.org) is a new kind >>>>>>>>>> of a >>>>>>>>>> P2P >>>>>>>>>> crypto-currency in which the general public can make donations, >>>>>>>>>> macro >>>>>>>>>> or >>>>>>>>>> micropayments in a secure and anonymous way usually >>>>>>>>>> without >>>>>>>>>> any >>>>>>>>>> transaction fee involved. >>>>>>>>>> >>>>>>>>>> You can change Bitcoins for real money (eg: https://mtgox.com) or >>>>>>>>>> purchase >>>>>>>>>> services or goods in an increasing number of sites. >>>>>>>>>> >>>>>>>>>> In order to receive donations you only have to publish one >>>>>>>>>> of >>>>>>>>>> your >>>>>>>>>> accounts as generated by the bitcoin client or any specialized >>>>>>>>>> bitcoin >>>>>>>>>> trader (eg: mybitcoin.com). >>>>>>>>>> >>>>>>>>>> Currently some projects as www.i2p2.de, >>>>>>>>>> www.torrentservers.net >>>>>>>>>> and >>>>>>>>>> organizations like the EFF are accepting donations. >>>>>>>>>> >>>>>>>>>> In my opinion this kind of decentralized solution without the >>>>>>>>>> need >>>>>>>>>> to >>>>>>>>>> trust any middlemen is much better than Paypal, Visa or >>>>>>>>>> Mastercard >>>>>>>>>> for >>>>>>>>>> security-minded people as most of your donors are. >>>>>>>>>> >>>>>>>>>> If you are interested in pushing Bitcoin forward, do not >>>>>>>>>> hesitate >>>>>>>>>> to >>>>>>>>>> contact me if you have any doubt. >>>>>>>>>> >>>>>>>>>> Yours, >>>>>>>>>> Cyclonite _______________________________________________ P2P Foundation - Mailing list http://www.p2pfoundation.net https://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From mranaewd at afterwork.com Mon Jan 17 10:55:54 2011 From: mranaewd at afterwork.com (Maris Ranae) Date: Mon, 17 Jan 2011 11:55:54 -0700 Subject: Impotence pills such as Viagra, Buy Cialis Online, have proven to be very successful in treating Erectile Dysfunction Message-ID: <201101171155.C55DF841137D70E26A30FA@k25801z72> Erectile Dysfunction Pills | Buy Viagra, Cialis, Levitra Online Impotence pills such as Viagra, Buy Cialis Online, have proven to be very successful in treating Erectile Dysfunction http://pharmacymedsdrugstore.ru From eugen at leitl.org Mon Jan 17 03:08:15 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 17 Jan 2011 12:08:15 +0100 Subject: [P2P-F] Bitcoin donation Message-ID: <20110117110815.GG23560@leitl.org> ----- Forwarded message from Sepp Hasslberger ----- From dima at for-notebook.ru Mon Jan 17 00:55:37 2011 From: dima at for-notebook.ru (Leona Shaffer) Date: Mon, 17 Jan 2011 14:25:37 +0530 Subject: =?koi8-r?B?7MXHwczYzs8gySDC2dPU0s8hIPvFzsfFztPLycUg98na2SEg79QgMyDS?= =?koi8-r?B?wcIuxM7FyiEg4sXaIMzJ3s7Px88g0NLJ09XU09TXydEh?= Message-ID: <000d01cbb624$4f4215c0$6400a8c0@dima> ЛЕГАЛЬНЫЙ ВИЗОВЫЙ ОПЕРАТОР Телефоны: +7 (495) 649 9170; +7 (499)3431902; СПЕЦПРЕДЛОЖЕНИЕ. Испания. Шенгенская мульти-виза - 6 месяцев за 350 у.е. ДЕЛОВАЯ МУЛЬТИВИЗА в ГРЕЦИЮ СПЕЦПРЕДЛОЖЕНИЕ 6 мес- 650 ЕВРО! Шенгенские ДЕЛОВЫЕ мульти-визы за 4 РАБОЧИХ ДНЯ Скидка 10% АКЦИЯ!!!!! ДО КОНЦА НЕДЕЛИ СКИДКА НА ДЕЛОВЫЕ МУЛЬТИВИЗЫ 10% Среднесрочные - 1 год - 950 у.е, 6 месяцев - 750 у.е, 3 месяца - 550 у.е. (сбор включен) Долгосрочные - 2 года - 1800 у.е, 3 года - 2 650 у.е. (сбор включен) БЕЗ СОБЕСЕДОВАНИЯ, БЕЗ ПРИСУТСТВИЯ!!!! Работаем со сложными случаями - мультивизы для уроженцев и жителей Северного Кавказа и паспортов с отказами ВИЗЫ в США, Великобританию, Кипр, Китай и др. страны ОПЛАТА только ПОСЛЕ ВЫХОДА ВИЗЫ. ГАРАНТИЯ. Телефоны: +7 (495) 649 9170; +7 (499)3431902; (без выходных) ПРИГЛАШЕНИЯ для иностранцев, страхование, на даты поездки, ПЕРЕВОДЫ документов. Телефоны: +7 (499)3431902; +7 (495) 649 9170 (без выходных) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3799 bytes Desc: not available URL: From eugen at leitl.org Mon Jan 17 05:32:45 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 17 Jan 2011 14:32:45 +0100 Subject: [P2P-F] Bitcoin donation Message-ID: <20110117133245.GI23560@leitl.org> ----- Forwarded message from Samuel Rose ----- From kga at oil.sumy.ua Mon Jan 17 10:18:57 2011 From: kga at oil.sumy.ua (=?koi8-r?B?7sHMz8fP18/FINDMwc7J0s/Xwc7JxQ==?=) Date: Mon, 17 Jan 2011 20:18:57 +0200 Subject: =?koi8-r?B?7cnOyc3J2sHDydEg7uTm7Cwg09TSwcjP19nIINfazs/Tz9c=?= Message-ID: <8FC8E36E183847D390459CC3017C5378@vasia3c1157a4a> 19 Января 2011г. Методы оптимизации расходов на выплату белой зарплаты: как выжить после замены ЕСН страховыми взносами код: (четыре девять пять) 445-32-66 ; 445/З9.68 Цель: С 2010 года единый социальный налог (ЕСН) отменен – он заменен обязательными страховыми взносами в ФОМС, ФСС и ПФР, ставка которых с 2011 года составит 34% почти для всех налогоплательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала взносов заменена отменой их уплаты, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1.Обзор изменений законодательства, связанных с заменой ЕСН обязательными страховыми взносами. Cколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2010-2011 гг. Какие схемы стали или станут невыгодными; у каких налогоплательщиков положение даже улучшается; в каком случае выплата зарплаты на спецрежимах сохраняет свою актуальность. 2.Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц, которые рассматриваются на семинаре. 3.Использование специальных налоговых режимов: * дивидендные схемы – замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с кассовой дисциплиной и политикой ЦБ. Текущая ситуация с обложением таких доходов НДФЛ. 4.Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5.Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Страхование жизни работников и ДМС за счет предприятия. 6.Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. 7.Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 8.Использование процентных займов от физлиц. Расчет эффективности. 9.Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 10.Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, 11.Создание недоимки по налогам с ФОТ на фирме, не обремененной активами – пример "серой" схемы (как нельзя "оптимизировать"!), 12.Способы подтверждения источников крупных расходов физлиц и когда это необходимо. Продажа имущества физическими лицами без НДФЛ через вклад в уставный капитал и ЕНВД. 13.Ответы на вопросы. По желанию – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. По вопpоcам pегucтаpацuu обpащайтеcь по тел: (495) 7Ч2-9l98 и 4Ч5*З_9_6_8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6861 bytes Desc: not available URL: From ptony82 at gmail.com Mon Jan 17 20:13:55 2011 From: ptony82 at gmail.com (Pierre St Juste) Date: Mon, 17 Jan 2011 23:13:55 -0500 Subject: [p2p-hackers] what would you like to see most in a p2p social network? Message-ID: I would like to point out the SocialVPN project http://socialvpn.org It is basically a P2P VPN which creates direct encrypted tunnels to friends. It currently uses the XMPP protocol for friend discovery and public key exchange. This VPN thus creates a social graph where edges are IP links. This infrastructure can be used as an enabler for many other social services. Here are a few examples 1 - Instead of using Skype, you can use Ekiga with Avahi, Avahi extension for Ekiga will discover online friends through multicast over the social virtual private network, you can then place SIP call directly over IP link. 2. For instant messaging, you can use Empathy or Pidgin with Bonjour/Avahi support, as concept as above. 3. For video stream, you can stream a video over HTTP or RTP using VLC and your friends can connect directly. 4. For social networking, you can run a wordpress blog locally and have your friends connect to that, or you can write an social networking application that communicates with friends over SocialVPN using Berkeley sockets API instead of having to deal with building P2P library that deals with NAT traversal, peer search and so on. 5. All data sent between peers is encrypted and authenticated, basically the same idea behind IPSec if you support PKI certificate exchanges. One of the hardest thing about building social P2P systems is having with a user-friendly way to bootstrap these social links (or Darknets). SocialVPN makes that step trivial so that developers can focus more on making cool apps versus figuring out how to traverse NATs. I hope this helps. On Mon, 2011-01-17 at 18:57 -0800, David Barrett wrote: > I'd suggest first figuring out why someone would pick a P2P social > network over Facebook, from a perspective of legitimate functionality > rather than just privacy (which as Facebook has demonstrated, isn't a > killer feature). I'd suggest really emphasizing the fact that with > P2P-Book, there is no "uploading" photos or videos: you can share entire > folders of files, videos, documents, or whatever and their instantly > available to your friends -- without first uploading them somewhere else. > > Furthermore, emphasize that you're not sharing *copies* of the videos, > songs, and photos -- you're sharing the originals: change the original > (crop, reorient, touch up, tag with metadata, etc) and its automatically > updated. > > -david > > On 01/17/2011 12:51 PM, Jan DomaEski wrote: > > Hey Michael, > > > > Thanks for the comments, they're helpful. > > > > A lot of this boils down to having two (or more) 'sides' of self. One > > for general public, others for the rest; this is doable. > > > > Grudge-friendly and jackboot resistant, in ideal world, comes with the > > 'distributed' and 'secure+encrypted'. But sure, seems to have been lost > > in the implementation of at least one social network i can think of. > > > > As to the grandmother compatibility, at least to me, this is not > > absolutely essential at first. > > > > Cherio, Jan > > > > 2011/1/16 Michael Rogers > > > > > Hi Jan, > > > > Here's a quick list of features I'd like to see in any social network > > (not just P2P ones): > > > > * Grandmother-compatible. It should be possible to be friends with my > > grandmother without her seeing the photo of the time I did that thing > > with the grapes. > > > > * Alcohol-compatible. There should be something as easy to remember as > > an email address that I can give to random people I befriend while > > drunk. And if they look me up the next day, there should be a polite way > > of not responding. > > > > * Schoolproof. People should not be able to find my profile just because > > we went to school together 20 years ago. Similarly, people should not be > > able to find my profile just because I applied for a job at their > > company (or at least, they shouldn't be able to see the photo of the > > thing with the grapes). > > > > * Grudge-friendly. It should be possible to move my data from one > > provider to another when the current provider accuses me of lacking > > integrity because I don't want my grandmother to see the photo etc etc. > > > > * Jackboot-resistant. The Tunisian government should not be able to > > steal my password by setting up a fake login page. > > > > Cheers, > > Michael > > > > On 15/01/11 20:35, Jan DomaEski wrote: > > > Hello everybody out there interested in p2p social networking, > > > > > > I'm doing a (free) p2p social network (just a hobby, wonbt be big and > > > professional like diaspora). It has been in the works since > > summer, and > > > begins to get some shape. I'd like any feedback on things people > > > like/dislike in the idea of a p2p social network and how this is > > solved > > > by the little toy. > > > > > > I've currently written it in java, netty handles the networking, > > Qt is > > > used for GUI. Some yml for configs and db4o for storage. Non-blocking > > > xml (XMPP) parser is a missing puzzle. The app has been run only on a > > > single machine, but it's already practical and I'd like to know what > > > features most people would want. Any suggestions are welcome, but I > > > wonbt promise Ibll implement them :] > > > > > > Two demos (the top one is new) below, gitorious and blog links inside > > > http://www.youtube.com/watch?v=0rAwCsYt16w > > > http://www.youtube.com/watch?v=K1dujrhGvBQ > > > > > > Jan (jan.domanski at new.ox.ac.uk > > >) > > > > > > PS. Yes - it's all my own work and done as a scientist not a > > programmer, > > > which has terrible implications for code ;) > > > > > > > > > > > > _______________________________________________ > > > p2p-hackers mailing list > > > p2p-hackers at lists.zooko.com > > > http://lists.zooko.com/mailman/listinfo/p2p-hackers > > > > > > > > > > _______________________________________________ > > p2p-hackers mailing list > > p2p-hackers at lists.zooko.com > > http://lists.zooko.com/mailman/listinfo/p2p-hackers > _______________________________________________ > p2p-hackers mailing list > p2p-hackers at lists.zooko.com > http://lists.zooko.com/mailman/listinfo/p2p-hackers _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From ptony82 at gmail.com Mon Jan 17 23:49:44 2011 From: ptony82 at gmail.com (Pierre St Juste) Date: Tue, 18 Jan 2011 02:49:44 -0500 Subject: [p2p-hackers] what would you like to see most in a p2p social network? Message-ID: Here's some explanation about distributed NAT traversal. We currently run a structured P2P overlay on Planetlab, when you run SocialVPN you join that structured overlay, we usually have about 500 - 600 nodes running. If node A wants to connect to node B, the following happens: 1 - node A sends a ConnectToMe (CTM) message to node B by using node B's P2P address (160-bit randomly chosen address). 2 - The CTM message contains node A's public IP and UDP port. 3 - Node B replies through the overlay with his public IP and UDP port and simultaneous sends a UDP packet to node A's public IP and port. 4. When node A receives the reply with node B's IP and UDP port, node A sends a UDP packet to node B's public IP and UDP port. 5. If you have a friendly NAT (not symmetric), then node A's packet will make it to node B's machine since node B has already sent a packet to that IP and port. We call it a distributed STUN server because the Brunet P2P library allows for discovery of one's public IP address and port and it also provides an all-to-all messaging layer needed to signal the start of UDP hole punching. As we all know, direct P2P communication is not always possible, in this case, a node that is reachable by both parties is chosen as the relay nodes and peers communicate through that. Finally our NAT traversal is a bit slower than regular STUN because the initial message is routed through a structured overlay that takes log(N) hops on average, but you may have dropped UDP packets and retries, so it may take milliseconds or a few seconds to set up direct P2P connection. These papers explain in more detail http://byron.acis.ufl.edu/papers/ipdps06ipop.pdf http://byron.acis.ufl.edu/papers/hpdc145-ganguly.pdf http://byron.acis.ufl.edu/papers/cops08.pdf Hope this helps. I encourage anyone interesting to download SocialVPN and try it out, there is windows installer and debian package. It currently works with GoogleChat or by emailing each other your P2P address. On Tue, Jan 18, 2011 at 12:49 AM, David Barrett wrote: > Wow, this looks really fantastic. I hadn't followed its progress but it > sounds like it's come a long way really fast. I'd love to hear more > about its distributed STUN service and NAT traversal. Do you have any > data on its effectiveness, perhaps expressed as the likelihood that two > arbitrary nodes will be able to connect directly via the internet? Is > there a TURN or other relay service available as a fallback? Thanks! > > -david > > On 01/17/2011 08:13 PM, Pierre St Juste wrote: > > I would like to point out the SocialVPN project > > > > http://socialvpn.org > > > > It is basically a P2P VPN which creates direct encrypted tunnels to > > friends. It currently uses the XMPP protocol for friend discovery and > > public key exchange. This VPN thus creates a social graph where edges > > are IP links. This infrastructure can be used as an enabler for many > > other social services. Here are a few examples > > > > 1 - Instead of using Skype, you can use Ekiga with Avahi, Avahi > > extension for Ekiga will discover online friends through multicast over > > the social virtual private network, you can then place SIP call directly > > over IP link. > > > > 2. For instant messaging, you can use Empathy or Pidgin with > > Bonjour/Avahi support, as concept as above. > > > > 3. For video stream, you can stream a video over HTTP or RTP using VLC > > and your friends can connect directly. > > > > 4. For social networking, you can run a wordpress blog locally and have > > your friends connect to that, or you can write an social networking > > application that communicates with friends over SocialVPN using Berkeley > > sockets API instead of having to deal with building P2P library that > > deals with NAT traversal, peer search and so on. > > > > 5. All data sent between peers is encrypted and authenticated, basically > > the same idea behind IPSec if you support PKI certificate exchanges. > > > > One of the hardest thing about building social P2P systems is having > > with a user-friendly way to bootstrap these social links (or Darknets). > > SocialVPN makes that step trivial so that developers can focus more on > > making cool apps versus figuring out how to traverse NATs. > > > > I hope this helps. > > > > On Mon, 2011-01-17 at 18:57 -0800, David Barrett wrote: > >> I'd suggest first figuring out why someone would pick a P2P social > >> network over Facebook, from a perspective of legitimate functionality > >> rather than just privacy (which as Facebook has demonstrated, isn't a > >> killer feature). I'd suggest really emphasizing the fact that with > >> P2P-Book, there is no "uploading" photos or videos: you can share entire > >> folders of files, videos, documents, or whatever and their instantly > >> available to your friends -- without first uploading them somewhere > else. > >> > >> Furthermore, emphasize that you're not sharing *copies* of the videos, > >> songs, and photos -- you're sharing the originals: change the original > >> (crop, reorient, touch up, tag with metadata, etc) and its automatically > >> updated. > >> > >> -david > >> > >> On 01/17/2011 12:51 PM, Jan DomaEski wrote: > >>> Hey Michael, > >>> > >>> Thanks for the comments, they're helpful. > >>> > >>> A lot of this boils down to having two (or more) 'sides' of self. One > >>> for general public, others for the rest; this is doable. > >>> > >>> Grudge-friendly and jackboot resistant, in ideal world, comes with the > >>> 'distributed' and 'secure+encrypted'. But sure, seems to have been lost > >>> in the implementation of at least one social network i can think of. > >>> > >>> As to the grandmother compatibility, at least to me, this is not > >>> absolutely essential at first. > >>> > >>> Cherio, Jan > >>> > >>> 2011/1/16 Michael Rogers> > >>> > >>> Hi Jan, > >>> > >>> Here's a quick list of features I'd like to see in any social > network > >>> (not just P2P ones): > >>> > >>> * Grandmother-compatible. It should be possible to be friends with > my > >>> grandmother without her seeing the photo of the time I did that > thing > >>> with the grapes. > >>> > >>> * Alcohol-compatible. There should be something as easy to > remember as > >>> an email address that I can give to random people I befriend while > >>> drunk. And if they look me up the next day, there should be a > polite way > >>> of not responding. > >>> > >>> * Schoolproof. People should not be able to find my profile just > because > >>> we went to school together 20 years ago. Similarly, people should > not be > >>> able to find my profile just because I applied for a job at their > >>> company (or at least, they shouldn't be able to see the photo of > the > >>> thing with the grapes). > >>> > >>> * Grudge-friendly. It should be possible to move my data from one > >>> provider to another when the current provider accuses me of > lacking > >>> integrity because I don't want my grandmother to see the photo etc > etc. > >>> > >>> * Jackboot-resistant. The Tunisian government should not be able > to > >>> steal my password by setting up a fake login page. > >>> > >>> Cheers, > >>> Michael > >>> > >>> On 15/01/11 20:35, Jan DomaEski wrote: > >>> > Hello everybody out there interested in p2p social networking, > >>> > > >>> > I'm doing a (free) p2p social network (just a hobby, wonbt be > big and > >>> > professional like diaspora). It has been in the works since > >>> summer, and > >>> > begins to get some shape. I'd like any feedback on things > people > >>> > like/dislike in the idea of a p2p social network and how this > is > >>> solved > >>> > by the little toy. > >>> > > >>> > I've currently written it in java, netty handles the > networking, > >>> Qt is > >>> > used for GUI. Some yml for configs and db4o for storage. > Non-blocking > >>> > xml (XMPP) parser is a missing puzzle. The app has been run > only on a > >>> > single machine, but it's already practical and I'd like to > know what > >>> > features most people would want. Any suggestions are welcome, > but I > >>> > wonbt promise Ibll implement them :] > >>> > > >>> > Two demos (the top one is new) below, gitorious and blog links > inside > >>> > http://www.youtube.com/watch?v=0rAwCsYt16w > >>> > http://www.youtube.com/watch?v=K1dujrhGvBQ > >>> > > >>> > Jan (jan.domanski at new.ox.ac.uk jan.domanski at new.ox.ac.uk> > >>> jan.domanski at new.ox.ac.uk>>) > >>> > > >>> > PS. Yes - it's all my own work and done as a scientist not a > >>> programmer, > >>> > which has terrible implications for code ;) > >>> > > >>> > > >>> > > >>> > _______________________________________________ > >>> > p2p-hackers mailing list > >>> > p2p-hackers at lists.zooko.com p2p-hackers at lists.zooko.com> > >>> > http://lists.zooko.com/mailman/listinfo/p2p-hackers > >>> > >>> > >>> > >>> > >>> _______________________________________________ > >>> p2p-hackers mailing list > >>> p2p-hackers at lists.zooko.com > >>> http://lists.zooko.com/mailman/listinfo/p2p-hackers > >> _______________________________________________ > >> p2p-hackers mailing list > >> p2p-hackers at lists.zooko.com > >> http://lists.zooko.com/mailman/listinfo/p2p-hackers > > > > > > _______________________________________________ > > p2p-hackers mailing list > > p2p-hackers at lists.zooko.com > > http://lists.zooko.com/mailman/listinfo/p2p-hackers > _______________________________________________ > p2p-hackers mailing list > p2p-hackers at lists.zooko.com > http://lists.zooko.com/mailman/listinfo/p2p-hackers > -- Pierre St Juste _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From ptony82 at gmail.com Tue Jan 18 00:17:04 2011 From: ptony82 at gmail.com (Pierre St Juste) Date: Tue, 18 Jan 2011 03:17:04 -0500 Subject: [p2p-hackers] what would you like to see most in a p2p social network? Message-ID: Currently when you run SocialVPN, you will connect to our global planetlab pool (essentially our bootstrap nodes). I would say that success rate is pretty high (95% to 99.999%, I think we have some numbers in our papers) if UDP is allowed on the network. We do support TCP as well, but not TCP NAT traversal (that is hard), I am not sure of success rate if you are on TCP only network. And of course, success rate is zero if you are behind a corporate firewall that only allows specific ports such as HTTP or SSH. Planetlab and most ISPs do not let users host services on these popular ports. I think our use of Planetlab (hence a static list of bootstrap nodes) made our solution much easier to implement. We also have a feature which allows peers to use the XMPP's STUN support to facilitate direct connections without having to depend on Planetlab. On Mon, 2011-01-17 at 23:58 -0800, David Barrett wrote: > Oh, is it possible to connect to the SocialVPN overlay on PlanetLab via > the Internet? Neat! As for the STUN approach, that sounds about right > -- have you measured the actual success rate of peers attempting to > connect with it? I know a few people on the list (including me) have > spent *A LOT* of energy on this topic, and it's really freakin' hard, > but super awesome. > > -david > > On 01/17/2011 11:49 PM, Pierre St Juste wrote: > > Here's some explanation about distributed NAT traversal. > > > > We currently run a structured P2P overlay on Planetlab, when you run > > SocialVPN you join that structured overlay, we usually have about 500 - > > 600 nodes running. If node A wants to connect to node B, the following > > happens: > > > > 1 - node A sends a ConnectToMe (CTM) message to node B by using node B's > > P2P address (160-bit randomly chosen address). > > > > 2 - The CTM message contains node A's public IP and UDP port. > > > > 3 - Node B replies through the overlay with his public IP and UDP port > > and simultaneous sends a UDP packet to node A's public IP and port. > > > > 4. When node A receives the reply with node B's IP and UDP port, node A > > sends a UDP packet to node B's public IP and UDP port. > > > > 5. If you have a friendly NAT (not symmetric), then node A's packet will > > make it to node B's machine since node B has already sent a packet to > > that IP and port. > > > > We call it a distributed STUN server because the Brunet P2P library > > allows for discovery of one's public IP address and port and it also > > provides an all-to-all messaging layer needed to signal the start of UDP > > hole punching. > > > > As we all know, direct P2P communication is not always possible, in this > > case, a node that is reachable by both parties is chosen as the relay > > nodes and peers communicate through that. > > > > Finally our NAT traversal is a bit slower than regular STUN because the > > initial message is routed through a structured overlay that takes log(N) > > hops on average, but you may have dropped UDP packets and retries, so it > > may take milliseconds or a few seconds to set up direct P2P connection. > > > > These papers explain in more detail > > > > http://byron.acis.ufl.edu/papers/ipdps06ipop.pdf > > > > http://byron.acis.ufl.edu/papers/hpdc145-ganguly.pdf > > > > http://byron.acis.ufl.edu/papers/cops08.pdf > > > > Hope this helps. I encourage anyone interesting to download SocialVPN > > and try it out, there is windows installer and debian package. It > > currently works with GoogleChat or by emailing each other your P2P address. > > > > On Tue, Jan 18, 2011 at 12:49 AM, David Barrett > > wrote: > > > > Wow, this looks really fantastic. I hadn't followed its progress but it > > sounds like it's come a long way really fast. I'd love to hear more > > about its distributed STUN service and NAT traversal. Do you have any > > data on its effectiveness, perhaps expressed as the likelihood that two > > arbitrary nodes will be able to connect directly via the internet? Is > > there a TURN or other relay service available as a fallback? Thanks! > > > > -david > > > > On 01/17/2011 08:13 PM, Pierre St Juste wrote: > > > I would like to point out the SocialVPN project > > > > > > http://socialvpn.org > > > > > > It is basically a P2P VPN which creates direct encrypted tunnels to > > > friends. It currently uses the XMPP protocol for friend discovery and > > > public key exchange. This VPN thus creates a social graph where edges > > > are IP links. This infrastructure can be used as an enabler for many > > > other social services. Here are a few examples > > > > > > 1 - Instead of using Skype, you can use Ekiga with Avahi, Avahi > > > extension for Ekiga will discover online friends through > > multicast over > > > the social virtual private network, you can then place SIP call > > directly > > > over IP link. > > > > > > 2. For instant messaging, you can use Empathy or Pidgin with > > > Bonjour/Avahi support, as concept as above. > > > > > > 3. For video stream, you can stream a video over HTTP or RTP > > using VLC > > > and your friends can connect directly. > > > > > > 4. For social networking, you can run a wordpress blog locally > > and have > > > your friends connect to that, or you can write an social networking > > > application that communicates with friends over SocialVPN using > > Berkeley > > > sockets API instead of having to deal with building P2P library that > > > deals with NAT traversal, peer search and so on. > > > > > > 5. All data sent between peers is encrypted and authenticated, > > basically > > > the same idea behind IPSec if you support PKI certificate exchanges. > > > > > > One of the hardest thing about building social P2P systems is having > > > with a user-friendly way to bootstrap these social links (or > > Darknets). > > > SocialVPN makes that step trivial so that developers can focus > > more on > > > making cool apps versus figuring out how to traverse NATs. > > > > > > I hope this helps. > > > > > > On Mon, 2011-01-17 at 18:57 -0800, David Barrett wrote: > > >> I'd suggest first figuring out why someone would pick a P2P social > > >> network over Facebook, from a perspective of legitimate > > functionality > > >> rather than just privacy (which as Facebook has demonstrated, > > isn't a > > >> killer feature). I'd suggest really emphasizing the fact that with > > >> P2P-Book, there is no "uploading" photos or videos: you can > > share entire > > >> folders of files, videos, documents, or whatever and their instantly > > >> available to your friends -- without first uploading them > > somewhere else. > > >> > > >> Furthermore, emphasize that you're not sharing *copies* of the > > videos, > > >> songs, and photos -- you're sharing the originals: change the > > original > > >> (crop, reorient, touch up, tag with metadata, etc) and its > > automatically > > >> updated. > > >> > > >> -david > > >> > > >> On 01/17/2011 12:51 PM, Jan DomaEski wrote: > > >>> Hey Michael, > > >>> > > >>> Thanks for the comments, they're helpful. > > >>> > > >>> A lot of this boils down to having two (or more) 'sides' of > > self. One > > >>> for general public, others for the rest; this is doable. > > >>> > > >>> Grudge-friendly and jackboot resistant, in ideal world, comes > > with the > > >>> 'distributed' and 'secure+encrypted'. But sure, seems to have > > been lost > > >>> in the implementation of at least one social network i can > > think of. > > >>> > > >>> As to the grandmother compatibility, at least to me, this is not > > >>> absolutely essential at first. > > >>> > > >>> Cherio, Jan > > >>> > > >>> 2011/1/16 Michael Rogers > >> > > >>> > > >>> Hi Jan, > > >>> > > >>> Here's a quick list of features I'd like to see in any > > social network > > >>> (not just P2P ones): > > >>> > > >>> * Grandmother-compatible. It should be possible to be > > friends with my > > >>> grandmother without her seeing the photo of the time I did > > that thing > > >>> with the grapes. > > >>> > > >>> * Alcohol-compatible. There should be something as easy to > > remember as > > >>> an email address that I can give to random people I > > befriend while > > >>> drunk. And if they look me up the next day, there should > > be a polite way > > >>> of not responding. > > >>> > > >>> * Schoolproof. People should not be able to find my > > profile just because > > >>> we went to school together 20 years ago. Similarly, people > > should not be > > >>> able to find my profile just because I applied for a job > > at their > > >>> company (or at least, they shouldn't be able to see the > > photo of the > > >>> thing with the grapes). > > >>> > > >>> * Grudge-friendly. It should be possible to move my data > > from one > > >>> provider to another when the current provider accuses me > > of lacking > > >>> integrity because I don't want my grandmother to see the > > photo etc etc. > > >>> > > >>> * Jackboot-resistant. The Tunisian government should not > > be able to > > >>> steal my password by setting up a fake login page. > > >>> > > >>> Cheers, > > >>> Michael > > >>> > > >>> On 15/01/11 20:35, Jan DomaEski wrote: > > >>> > Hello everybody out there interested in p2p social networking, > > >>> > > > >>> > I'm doing a (free) p2p social network (just a hobby, wonbt > > be big and > > >>> > professional like diaspora). It has been in the works since > > >>> summer, and > > >>> > begins to get some shape. I'd like any feedback on things people > > >>> > like/dislike in the idea of a p2p social network and how this is > > >>> solved > > >>> > by the little toy. > > >>> > > > >>> > I've currently written it in java, netty handles the networking, > > >>> Qt is > > >>> > used for GUI. Some yml for configs and db4o for storage. > > Non-blocking > > >>> > xml (XMPP) parser is a missing puzzle. The app has been run > > only on a > > >>> > single machine, but it's already practical and I'd like to > > know what > > >>> > features most people would want. Any suggestions are > > welcome, but I > > >>> > wonbt promise Ibll implement them :] > > >>> > > > >>> > Two demos (the top one is new) below, gitorious and blog > > links inside > > >>> > http://www.youtube.com/watch?v=0rAwCsYt16w > > >>> > http://www.youtube.com/watch?v=K1dujrhGvBQ > > >>> > > > >>> > Jan (jan.domanski at new.ox.ac.uk > > > > > > >>> > > >>) > > >>> > > > >>> > PS. Yes - it's all my own work and done as a scientist not a > > >>> programmer, > > >>> > which has terrible implications for code ;) > > >>> > > > >>> > > > >>> > > > >>> > _______________________________________________ > > >>> > p2p-hackers mailing list > > >>> > p2p-hackers at lists.zooko.com > > > > > > >>> > http://lists.zooko.com/mailman/listinfo/p2p-hackers > > >>> > > >>> > > >>> > > >>> > > >>> _______________________________________________ > > >>> p2p-hackers mailing list > > >>> p2p-hackers at lists.zooko.com > > >>> http://lists.zooko.com/mailman/listinfo/p2p-hackers > > >> _______________________________________________ > > >> p2p-hackers mailing list > > >> p2p-hackers at lists.zooko.com > > >> http://lists.zooko.com/mailman/listinfo/p2p-hackers > > > > > > > > > _______________________________________________ > > > p2p-hackers mailing list > > > p2p-hackers at lists.zooko.com > > > http://lists.zooko.com/mailman/listinfo/p2p-hackers > > _______________________________________________ > > p2p-hackers mailing list > > p2p-hackers at lists.zooko.com > > http://lists.zooko.com/mailman/listinfo/p2p-hackers > > > > > > > > > > -- > > Pierre St Juste > > > > > > > > _______________________________________________ > > p2p-hackers mailing list > > p2p-hackers at lists.zooko.com > > http://lists.zooko.com/mailman/listinfo/p2p-hackers > _______________________________________________ > p2p-hackers mailing list > p2p-hackers at lists.zooko.com > http://lists.zooko.com/mailman/listinfo/p2p-hackers _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From delphiarz at equistarchem.com Tue Jan 18 04:52:44 2011 From: delphiarz at equistarchem.com (Vicenta Delphia) Date: Tue, 18 Jan 2011 05:52:44 -0700 Subject: Getting a rock hard erection and more on the BEST Natural Erection Pills Message-ID: <201101180552.5CFBF752D3D9A9F6CEB2F@wa10igyg4> For everything to do with getting a rock hard erection and more on the BEST Natural Erection Pills and for all the best herbal sex pills for hard erections visit: http://bigpeniscar.ru From renato at acis.ufl.edu Tue Jan 18 05:08:59 2011 From: renato at acis.ufl.edu (Renato Figueiredo) Date: Tue, 18 Jan 2011 08:08:59 -0500 Subject: [p2p-hackers] what would you like to see most in a p2p social network? Message-ID: David, In addition to STUN, we also have a decentralized mechanism to select 1-hop relays in the overlay when NAT traversal fails. We have done simulation-based studies and our empirical evidence from the deployed SocialVPN/Brunet systems is that these approaches work pretty well, but we don't have a study of the system "in the wild" with large numbers of real users behind NATs. We are planning to reach to a reasonably large number of users to use the software to collect this among other kinds of data; any suggestions/ideas on how to reach out to potential users for an experiment would be welcome. Thanks! --rf On Tue, Jan 18, 2011 at 2:58 AM, David Barrett wrote: > Oh, is it possible to connect to the SocialVPN overlay on PlanetLab via > the Internet? Neat! As for the STUN approach, that sounds about right > -- have you measured the actual success rate of peers attempting to > connect with it? I know a few people on the list (including me) have > spent *A LOT* of energy on this topic, and it's really freakin' hard, > but super awesome. > > -david > > On 01/17/2011 11:49 PM, Pierre St Juste wrote: > > Here's some explanation about distributed NAT traversal. > > > > We currently run a structured P2P overlay on Planetlab, when you run > > SocialVPN you join that structured overlay, we usually have about 500 - > > 600 nodes running. If node A wants to connect to node B, the following > > happens: > > > > 1 - node A sends a ConnectToMe (CTM) message to node B by using node B's > > P2P address (160-bit randomly chosen address). > > > > 2 - The CTM message contains node A's public IP and UDP port. > > > > 3 - Node B replies through the overlay with his public IP and UDP port > > and simultaneous sends a UDP packet to node A's public IP and port. > > > > 4. When node A receives the reply with node B's IP and UDP port, node A > > sends a UDP packet to node B's public IP and UDP port. > > > > 5. If you have a friendly NAT (not symmetric), then node A's packet will > > make it to node B's machine since node B has already sent a packet to > > that IP and port. > > > > We call it a distributed STUN server because the Brunet P2P library > > allows for discovery of one's public IP address and port and it also > > provides an all-to-all messaging layer needed to signal the start of UDP > > hole punching. > > > > As we all know, direct P2P communication is not always possible, in this > > case, a node that is reachable by both parties is chosen as the relay > > nodes and peers communicate through that. > > > > Finally our NAT traversal is a bit slower than regular STUN because the > > initial message is routed through a structured overlay that takes log(N) > > hops on average, but you may have dropped UDP packets and retries, so it > > may take milliseconds or a few seconds to set up direct P2P connection. > > > > These papers explain in more detail > > > > http://byron.acis.ufl.edu/papers/ipdps06ipop.pdf > > > > http://byron.acis.ufl.edu/papers/hpdc145-ganguly.pdf > > > > http://byron.acis.ufl.edu/papers/cops08.pdf > > > > Hope this helps. I encourage anyone interesting to download SocialVPN > > and try it out, there is windows installer and debian package. It > > currently works with GoogleChat or by emailing each other your P2P > address. > > > > On Tue, Jan 18, 2011 at 12:49 AM, David Barrett > > wrote: > > > > Wow, this looks really fantastic. I hadn't followed its progress but > it > > sounds like it's come a long way really fast. I'd love to hear more > > about its distributed STUN service and NAT traversal. Do you have > any > > data on its effectiveness, perhaps expressed as the likelihood that > two > > arbitrary nodes will be able to connect directly via the internet? > Is > > there a TURN or other relay service available as a fallback? Thanks! > > > > -david > > > > On 01/17/2011 08:13 PM, Pierre St Juste wrote: > > > I would like to point out the SocialVPN project > > > > > > http://socialvpn.org > > > > > > It is basically a P2P VPN which creates direct encrypted tunnels > to > > > friends. It currently uses the XMPP protocol for friend discovery > and > > > public key exchange. This VPN thus creates a social graph where > edges > > > are IP links. This infrastructure can be used as an enabler for > many > > > other social services. Here are a few examples > > > > > > 1 - Instead of using Skype, you can use Ekiga with Avahi, Avahi > > > extension for Ekiga will discover online friends through > > multicast over > > > the social virtual private network, you can then place SIP call > > directly > > > over IP link. > > > > > > 2. For instant messaging, you can use Empathy or Pidgin with > > > Bonjour/Avahi support, as concept as above. > > > > > > 3. For video stream, you can stream a video over HTTP or RTP > > using VLC > > > and your friends can connect directly. > > > > > > 4. For social networking, you can run a wordpress blog locally > > and have > > > your friends connect to that, or you can write an social > networking > > > application that communicates with friends over SocialVPN using > > Berkeley > > > sockets API instead of having to deal with building P2P library > that > > > deals with NAT traversal, peer search and so on. > > > > > > 5. All data sent between peers is encrypted and authenticated, > > basically > > > the same idea behind IPSec if you support PKI certificate > exchanges. > > > > > > One of the hardest thing about building social P2P systems is > having > > > with a user-friendly way to bootstrap these social links (or > > Darknets). > > > SocialVPN makes that step trivial so that developers can focus > > more on > > > making cool apps versus figuring out how to traverse NATs. > > > > > > I hope this helps. > > > > > > On Mon, 2011-01-17 at 18:57 -0800, David Barrett wrote: > > >> I'd suggest first figuring out why someone would pick a P2P > social > > >> network over Facebook, from a perspective of legitimate > > functionality > > >> rather than just privacy (which as Facebook has demonstrated, > > isn't a > > >> killer feature). I'd suggest really emphasizing the fact that > with > > >> P2P-Book, there is no "uploading" photos or videos: you can > > share entire > > >> folders of files, videos, documents, or whatever and their > instantly > > >> available to your friends -- without first uploading them > > somewhere else. > > >> > > >> Furthermore, emphasize that you're not sharing *copies* of the > > videos, > > >> songs, and photos -- you're sharing the originals: change the > > original > > >> (crop, reorient, touch up, tag with metadata, etc) and its > > automatically > > >> updated. > > >> > > >> -david > > >> > > >> On 01/17/2011 12:51 PM, Jan DomaEski wrote: > > >>> Hey Michael, > > >>> > > >>> Thanks for the comments, they're helpful. > > >>> > > >>> A lot of this boils down to having two (or more) 'sides' of > > self. One > > >>> for general public, others for the rest; this is doable. > > >>> > > >>> Grudge-friendly and jackboot resistant, in ideal world, comes > > with the > > >>> 'distributed' and 'secure+encrypted'. But sure, seems to have > > been lost > > >>> in the implementation of at least one social network i can > > think of. > > >>> > > >>> As to the grandmother compatibility, at least to me, this is not > > >>> absolutely essential at first. > > >>> > > >>> Cherio, Jan > > >>> > > >>> 2011/1/16 Michael Rogers > >> > > >>> > > >>> Hi Jan, > > >>> > > >>> Here's a quick list of features I'd like to see in any > > social network > > >>> (not just P2P ones): > > >>> > > >>> * Grandmother-compatible. It should be possible to be > > friends with my > > >>> grandmother without her seeing the photo of the time I did > > that thing > > >>> with the grapes. > > >>> > > >>> * Alcohol-compatible. There should be something as easy to > > remember as > > >>> an email address that I can give to random people I > > befriend while > > >>> drunk. And if they look me up the next day, there should > > be a polite way > > >>> of not responding. > > >>> > > >>> * Schoolproof. People should not be able to find my > > profile just because > > >>> we went to school together 20 years ago. Similarly, people > > should not be > > >>> able to find my profile just because I applied for a job > > at their > > >>> company (or at least, they shouldn't be able to see the > > photo of the > > >>> thing with the grapes). > > >>> > > >>> * Grudge-friendly. It should be possible to move my data > > from one > > >>> provider to another when the current provider accuses me > > of lacking > > >>> integrity because I don't want my grandmother to see the > > photo etc etc. > > >>> > > >>> * Jackboot-resistant. The Tunisian government should not > > be able to > > >>> steal my password by setting up a fake login page. > > >>> > > >>> Cheers, > > >>> Michael > > >>> > > >>> On 15/01/11 20:35, Jan DomaEski wrote: > > >>> > Hello everybody out there interested in p2p social > networking, > > >>> > > > >>> > I'm doing a (free) p2p social network (just a hobby, wonbt > > be big and > > >>> > professional like diaspora). It has been in the works since > > >>> summer, and > > >>> > begins to get some shape. I'd like any feedback on things > people > > >>> > like/dislike in the idea of a p2p social network and how this > is > > >>> solved > > >>> > by the little toy. > > >>> > > > >>> > I've currently written it in java, netty handles the > networking, > > >>> Qt is > > >>> > used for GUI. Some yml for configs and db4o for storage. > > Non-blocking > > >>> > xml (XMPP) parser is a missing puzzle. The app has been run > > only on a > > >>> > single machine, but it's already practical and I'd like to > > know what > > >>> > features most people would want. Any suggestions are > > welcome, but I > > >>> > wonbt promise Ibll implement them :] > > >>> > > > >>> > Two demos (the top one is new) below, gitorious and blog > > links inside > > >>> > http://www.youtube.com/watch?v=0rAwCsYt16w > > >>> > http://www.youtube.com/watch?v=K1dujrhGvBQ > > >>> > > > >>> > Jan (jan.domanski at new.ox.ac.uk > > > > > > >>> > > >>) > > >>> > > > >>> > PS. Yes - it's all my own work and done as a scientist not a > > >>> programmer, > > >>> > which has terrible implications for code ;) > > >>> > > > >>> > > > >>> > > > >>> > _______________________________________________ > > >>> > p2p-hackers mailing list > > >>> > p2p-hackers at lists.zooko.com > > p2p-hackers at lists.zooko.com > > > > > >>> > http://lists.zooko.com/mailman/listinfo/p2p-hackers > > >>> > > >>> > > >>> > > >>> > > >>> _______________________________________________ > > >>> p2p-hackers mailing list > > >>> p2p-hackers at lists.zooko.com > > > >>> http://lists.zooko.com/mailman/listinfo/p2p-hackers > > >> _______________________________________________ > > >> p2p-hackers mailing list > > >> p2p-hackers at lists.zooko.com > > >> http://lists.zooko.com/mailman/listinfo/p2p-hackers > > > > > > > > > _______________________________________________ > > > p2p-hackers mailing list > > > p2p-hackers at lists.zooko.com > > > http://lists.zooko.com/mailman/listinfo/p2p-hackers > > _______________________________________________ > > p2p-hackers mailing list > > p2p-hackers at lists.zooko.com > > http://lists.zooko.com/mailman/listinfo/p2p-hackers > > > > > > > > > > -- > > Pierre St Juste > > > > > > > > _______________________________________________ > > p2p-hackers mailing list > > p2p-hackers at lists.zooko.com > > http://lists.zooko.com/mailman/listinfo/p2p-hackers > _______________________________________________ > p2p-hackers mailing list > p2p-hackers at lists.zooko.com > http://lists.zooko.com/mailman/listinfo/p2p-hackers > -- Dr. Renato J. Figueiredo Associate Professor ACIS Lab - ECE - University of Florida UF Site Director, Center for Autonomic Computing http://byron.acis.ufl.edu ph: 352-392-6430 _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From a at foo.be Tue Jan 18 00:43:26 2011 From: a at foo.be (Alexandre Dulaunoy) Date: Tue, 18 Jan 2011 09:43:26 +0100 Subject: [p2p-hackers] How Piracy Will Hyperlocalize with Mesh Networks Message-ID: On Tue, Jan 18, 2011 at 8:06 AM, David Barrett wrote: > It occurs to me that you could probably do most of this, today, using > Bluetooth. Indeed, does anybody know anything about the various > Bluetooth mesh networks / scatternets I see on Google? There are some experiments or academic test like piconetwork. There was one call NAN : Near-me area network but I don't know any public implementation. Piconet was something foreseen for Bluetooth but I don't know if there is current any use of it. In the same spirit (relying on any local IP networks), I prototyped Forban to share files in an opportunist way on temporary networks or mobile networks. The protocol is really simple : relying on HTTP for everything except the announce part in broadcast (in IPv4) and in multicast (in IPv6). http://www.foo.be/forban/ https://github.com/adulau/Forban I looked at the early beginning at Bluetooth but the most common network, where everyone is connected to, is more wireless local area networks using IP even recent phone are using plain standard IP over 802.11. If you have any ideas, let me know. Kind regards, -- -- Alexandre Dulaunoy (adulau) -- http://www.foo.be/ -- http://www.foo.be/cgi-bin/wiki.pl/Diary -- "Knowledge can create problems, it is not through ignorance -- that we can solve them" Isaac Asimov _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Jan 18 03:39:26 2011 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 18 Jan 2011 12:39:26 +0100 Subject: Coming soon: A new way to hack into your smartphone Message-ID: <20110118113926.GM23560@leitl.org> (closely related to 0wning the NIC instead of the whole host) http://www.itworld.com/print/133796 Coming soon: A new way to hack into your smartphone by Robert McMillan January 17, 2011 b Ralf-Philipp Weinmann (center) with organizers of the Pwn2Own contest at the 2010 CanSecWest conference in Vancouver. Weinmann will be demoing a new way of breaking into mobile phones this week. He's found a way of breaking into the baseband processors used by phones to communicate with cellular towers. Last year, Weinmann won the Pwn2Own contest with another mobile hack. Photo credit: Robert McMillan / IDG News Service More than three years after the iPhone was first hacked, computer security experts think they've found a whole new way to break into mobile phones -- one that could become a big headache for Apple, or for smartphone makers using Google's Android software. In a presentation set for next week's Black Hat conference in Washington D.C., University of Luxembourg research associate Ralf-Philipp Weinmann says he plans to demonstrate his new technique on an iPhone and an Android device, showing how they could be converted into clandestine spying systems. "I will demo how to use the auto-answer feature present in most phones to turn the telephone into a remote listening device," he said in an e-mail interview. Weinmann says he can do this by breaking the phone's "baseband" processor, used to send and receive radio signals as the device communicates on its cellular network. He has found bugs in the way the firmware used in chips sold by Qualcomm and Infineon Technologies processes radio signals on the GSM (Global System for Mobile Communications) networks used by the majority of the world's wireless carriers. This is a new area of research. Until recently, mobile phone attacks had focused on another part of the phone: the programs and operating systems that runs on the device's CPU. By tricking someone into visiting a malicious Web site, for example, hackers could take advantage of a Web browser bug on the phone and start messing around with the computer's memory. With baseband hacking, security researchers are looking at a brand new way to get into this memory. "[It's] like tipping over a rock that no one ever thought would be tipped over," said the Grugq -- a pseudonymous, but well-respected, wireless phone hacker, and one of a handful of people who have done research in this area. "There are a lot of bugs hidden there," he said, "It is just a matter of actively looking for them." But hacking a smartphone with a baseband attack is very tricky, to say the least. The mobile phone's radio communicates with a cell phone tower. So in Weinmann's attack, he has to first set up a fake cell phone tower and then convince his target phone to connect to it. Only then can he deliver his malicious code. And even then, the malicious code he writes must run on the firmware that's used by obscure radio processors -- something that most hackers know nothing about. "This is an extremely technical attack," said Don Bailey, a security consultant with Isec Partners. He says that while the work on baseband hacking is very exciting -- and ultimately a big deal for the mobile phone industry -- he doesn't expect any attacks that target the general public to emerge anytime soon. But the research into this area is just starting to take off, fuelled by new open-source software called OpenBTS that allows virtually anyone to set up their own cellular network radio tower with about $2,000 worth of computer hardware. Five years ago device makers didn't have to worry about this type of hacking, because it used to cost tens of thousands of dollars to set up a cellular tower. But OpenBTS has changed all that. "Now it's a completely different game," Bailey said. It's a risky game too. In the U.S., federal wiretapping laws make it illegal to intercept phone calls over the licensed frequencies used by mobile phones. In August, it took intense last-minute negotiations between lawyers from the Electronic Frontier Foundation and the U.S. Federal Communications Commission before security researcher Chris Paget could demonstrate a very simple tower spoofing technique at the Defcon hacking conference in Las Vegas. Two months from now another hacker conference, Vancouver's CanSecWest, will invite hackers to break into mobile phones using a low power transmitter. If their baseband attacks work, they can win cash prices. Conference organizer Dragos Ruiu said that Canada's broadcast laws are "more lenient' for researchers who want to set up low-power towers for research purposes. Still, it remains a touchy subject. "Last year we were worried about falling afoul of regulations," he said."Now we've figured out a nice safe way to do that so that we don't mess up anybody else's cell phones at the conference." Ruiu expects some interesting results from the contest, called Pwn2Own. "It sounds like the radio parts of the phones are very shaky indeed and pretty vulnerable," he said. Robert McMillan covers computer security and general technology breaking news for The IDG News Service. Follow Robert on Twitter at @bobmcmillan. Robert's e-mail address is robert_mcmillan at idg.com From 0-559147-1-nifty_com at jmb.jal.com Tue Jan 18 01:41:19 2011 From: 0-559147-1-nifty_com at jmb.jal.com (HolidaySale) Date: Tue, 18 Jan 2011 15:41:19 +0600 Subject: mercury. the an family Within alone sexy trails Message-ID: <8450646316.10BX35BC053156@mkuzr.acewrevdaqtouf.va> Dont spend thousands on a Rolex or Gucci product?Comparison shop! FREE SHIPPING all year long! http://i5.be/cZW -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 292 bytes Desc: not available URL: From gersh at baza.in.ua Tue Jan 18 16:05:54 2011 From: gersh at baza.in.ua (=?koi8-r?B?5MzRIMLVyMfBzNTF0sE=?=) Date: Wed, 19 Jan 2011 03:05:54 +0300 Subject: =?koi8-r?B?7sHMz8fP18/FICDQzMHOydLP18HOycUgwsXaICLQz83PxcsiIMkgIt7F?= =?koi8-r?B?0s7Px88gzsHMwSI=?= Message-ID: <000d01cbb76c$a42e9ba0$6400a8c0@gersh> 28 Января 2011г. +7 (Ч95) 7922I*22 <> 7Ч2-9I98 Правильное Налоговое планирование исключает фирмы-однодневки и обналичку 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности┘); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) √ как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 Моск. код:*7Ч*29|_98 <<>> 792/2i22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4801 bytes Desc: not available URL: From cryptome at earthlink.net Wed Jan 19 07:10:20 2011 From: cryptome at earthlink.net (John Young) Date: Wed, 19 Jan 2011 10:10:20 -0500 Subject: monitoring and surveillance Message-ID: Odd that the Weimar-Princeton announcement makes no mention of scholars and researchers gathering, aggregating, mining and messing with Internet users data under guise of investigating and analyzing the world's greatest-ever spying machine by spying on the gullible users "to protect them," the motto of secret agents forever. Bundles of irresistable funding for that, indeed, alliances and standards-setting bodies have been established to bless this villainy and the finely-coutured apologists for the villainous institutions and "leading" scholars. Be sure tell the public right away with every media study announcement about the spy agencies' multi-millions being distributed to eager institutions to foster open source spying, spy training, covert spying and camouflage thereof. Admire the spread of euphemistic "security studies" and "surveillance studies" and "social media studies" and in particular "open source studies." Even the spy agencies vaunt these luser lures in their recruiting materials. High-tech seekers, media mavens especially solicited by CIA University, rush to intern in home bases of spies and pursue advanced degrees in their cash-rich outliers in universities. Note who runs these social studies programs ever adaptable to the king's coin. Remember the invention by Plato of Socrates, a friendly fellow favoring open discourse, to undergird the highly privileged philosopher as king. Machiavelli adored Plato's conceit. Remember the invention of philosophy to undergird dissimulation, wise faculty club debate tea cup held with little finger poised just so to signal how pleasurable it is to outsmart. Meta surveillance studies presumably sanitizes the vile practice of social studies long invested in codifying human behavior, first as allegedly disinterested scholarship, then to repackage and sell as means of political control to full-spectrum authoritatives ever indebted to funding sources open and secret, especially the secret which requires non-disclosure as a condition of scholarly bribery. Dissimulation provides an escape from complicity, thank heavens for duplictious obfuscation. "I had no idea my work would be used that way." Here's a suggestion: if any use of scholarly research is ever used for secret purposes the original scholars shall be hung until dead from Alma Mater, left to rot as a signal of why secrecy is the greatest threat to democracy. Monitoring the extended use of scholarly research shall no longer be forgiven by exculpatory sophistry. No more excusing the study of complicity by deeper treachery of exploiting hard-up students to do spies' "dirty work." Oops that is the name of a famous spy story dissimulation. Odd that the illegality of data gathering on the Internet is never admitted by overseers of the intellectual commonweal. Odd that privacy policies are always taken "very seriously," but never disclosed as duplicitous. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From mladen.gladic at gmail.com Wed Jan 19 04:09:25 2011 From: mladen.gladic at gmail.com (Mladen Gladic) Date: Wed, 19 Jan 2011 13:09:25 +0100 Subject: monitoring and surveillance Message-ID: Maybe this might be of interest for the list? Thank you, Mladen Gladic Monitoring and Surveillance Inaugural Weimar-Princeton Summer School for Media Studies The first international Summer School for Media Studies, a co-operation between the Bauhaus-UniversitC$t Weimar (Internationales Kolleg fC: no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From maria at packet.zaporizhzhe.ua Wed Jan 19 04:57:54 2011 From: maria at packet.zaporizhzhe.ua (=?koi8-r?B?7s/X2cUg08jFzdkgz8LOwczB?=) Date: Wed, 19 Jan 2011 15:57:54 +0300 Subject: =?koi8-r?B?+sHLz87O2cUg09DP08/C2SDTzsnWxc7JxSDOwczPx8/Xz8ogzsHH0tXa?= =?koi8-r?B?y8k=?= Message-ID: <5F4A21B9AA7648D8B541C195283E5688@microsof2cab77> 28 Января 2О1lг. +7 Московский код: 7Ч2.9|*98 <> 7/Ч2/9I/98 Максимум выживаемости без фирм-однодневок как правильно себя чувствовать без обналички 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности…); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) – как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП – легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 Моск. код:/Ч/Ч*5_З_2//6_6 : ЧЧ5/3266 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4029 bytes Desc: not available URL: From 0-3y at cancer.org Wed Jan 19 07:06:47 2011 From: 0-3y at cancer.org (AffordableHoliday-Items) Date: Wed, 19 Jan 2011 16:06:47 +0100 Subject: led the Can rainbow bolt? Message-ID: <6048682028.VBRK51NZ373977@vmkigfqnfs.ixtqyrmou.ua> Diamonds, Watches, Handbags, and MANY more gift ideas We can still get your order to you before Christmas but you must act fast! http://10.rs/n5M -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 283 bytes Desc: not available URL: From camera_lumina at hotmail.com Wed Jan 19 17:20:27 2011 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 19 Jan 2011 20:20:27 -0500 Subject: Question about (cypher)Twitter In-Reply-To: References: , Message-ID: Cool. It'll be a bit before I can figure out whether this does what I'm looking for. Basically, the application is a deniable subscription to certain twitter feeds. In any event, looks interesting. -TD > Date: Sat, 15 Jan 2011 14:09:15 +1100 > Subject: Re: Question about (cypher)Twitter > From: michaelslists at gmail.com > To: camera_lumina at hotmail.com > CC: cypherpunks at al-qaeda.net > > On Sat, Jan 15, 2011 at 1:47 PM, Tyler Durden > wrote: > > OK, those remaining aged and frail cypherpunks can bash me for not being > > current... > > > > But are there TOR or other-based services that can (kinda) anonymize (for > > instance) twitter subscriptions? > > ? > > -- > silky > > http://dnoondt.wordpress.com/ (Noon Silk) | http://www.mirios.com.au:8081 > > > "Every morning when I wake up, I experience an exquisite joy  the joy > of being this signature." From camera_lumina at hotmail.com Wed Jan 19 17:26:31 2011 From: camera_lumina at hotmail.com (Tyler Durden) Date: Wed, 19 Jan 2011 20:26:31 -0500 Subject: Question about (cypher)Twitter In-Reply-To: <1295075590.15872.5.camel@afterburner> References: ,<1295075590.15872.5.camel@afterburner> Message-ID: Possibly this answers it. But it would require being able to send that RSS feed into the TOR cloud, which I will admit to not knowing if such is possible with minimal ScriptFu. Basically, what I'm wondering is, if someone gets ahold of a twitter distribution list, is it possible to create enough of a cloud so as to remove the possibility of authorities coming to visit the subscriber? -TD > Subject: Re: Question about (cypher)Twitter > From: skquinn at speakeasy.net > To: cypherpunks at al-qaeda.net > Date: Sat, 15 Jan 2011 01:13:10 -0600 > > On Fri, 2011-01-14 at 21:47 -0500, Tyler Durden wrote: > > OK, those remaining aged and frail cypherpunks can bash me for not being > > current... > > > > But are there TOR or other-based services that can (kinda) anonymize (for > > instance) twitter subscriptions? > > Twitter is accessible via Tor; they have done nothing to block it. Or am > I misunderstanding your question? > > Unless you plan to follow protected accounts, you don't need to actually > sign up for a Twitter account to keep up with anyone. Each Twitter > account has an RSS feed for that account, which does not need > authentication with a Twitter account to access. > > Interesting note: not that long ago, Twitter actually used your > authentication info against you and obstructed attempts to read single > tweets from accounts that had you blocked, and for a while even the > entire feed of accounts blocking you. They have since given up their > pathetic attempt to imitate Facebook's (dangerously overpowered, IMO) > block function. > > -- > Shawn K. Quinn From basile at opensource.dyc.edu Wed Jan 19 18:04:07 2011 From: basile at opensource.dyc.edu (Anthony G. Basile) Date: Wed, 19 Jan 2011 21:04:07 -0500 Subject: tor-ramdisk 20110119 released Message-ID: Hi everyone I want to announce to the list that a new release of tor-ramdisk is out. Tor-ramdisk is an i686, x86_64 or MIPS uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Security is enhanced by hardening the kernel and binaries, and privacy is enhanced by forcing logging to be off at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key, which may be exported/imported by FTP or SCP. Changelog: This release addresses a heap overflow in tor which allows arbitrary remote code execution. Tor was bumped to version 0.2.1.29 to address CVE-2011-0427. Busybox was bumped to... 1.18.2 and the kernel to 2.6.32.28 plus Gentoo's hardened-patches-2.6.32-37.extras. i686: Homepage: http://opensource.dyc.edu/tor-ramdisk Download: http://opensource.dyc.edu/tor-ramdisk-downloads x86_64: Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads MIPS: Homepage: http://opensource.dyc.edu/tor-mips-ramdisk Download: http://opensource.dyc.edu/tor-mips-ramdisk-downloads -- Anthony G. Basile, Ph. D. Chair of Information Technology D'Youville College Buffalo, NY 14201 (716) 829-8197 *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Jan 19 12:47:13 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 19 Jan 2011 21:47:13 +0100 Subject: monitoring and surveillance Message-ID: <20110119204713.GW23560@leitl.org> ----- Forwarded message from Mladen Gladic ----- From eugen at leitl.org Wed Jan 19 12:49:26 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 19 Jan 2011 21:49:26 +0100 Subject: monitoring and surveillance Message-ID: <20110119204926.GX23560@leitl.org> ----- Forwarded message from John Young ----- From hyuy at rada.ua Wed Jan 19 14:54:33 2011 From: hyuy at rada.ua (=?koi8-r?B?7s/X2cUg08jFzdkgz8LOwczB?=) Date: Thu, 20 Jan 2011 00:54:33 +0200 Subject: =?koi8-r?B?+sHLz87O2cUg09DP08/C2SDTzsnWxc7JxSDOwczPx8/Xz8ogzsHH0tXa?= =?koi8-r?B?y8k=?= Message-ID: <000d01cbb82b$d6661570$6400a8c0@hyuy> 28 Января 2011г. (Ч95) 4Ч-5Ч/095 <<<>>> 4Ч5З266 Налоговое планирование в условиях кризиса: как жить без обналички и фирм-однодневок и не разориться 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности┘); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) √ как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: Московский код; 4Ч5_З266 ; 742/9I/98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4006 bytes Desc: not available URL: From eugen at leitl.org Wed Jan 19 23:48:50 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Jan 2011 08:48:50 +0100 Subject: tor-ramdisk 20110119 released Message-ID: <20110120074850.GC23560@leitl.org> ----- Forwarded message from "Anthony G. Basile" ----- From coderman at gmail.com Thu Jan 20 09:10:23 2011 From: coderman at gmail.com (coderman) Date: Thu, 20 Jan 2011 09:10:23 -0800 Subject: Alleged Wikileaks Use of P2P to Siphon Documents In-Reply-To: References: <20110120150527.GT23560@leitl.org> Message-ID: On Thu, Jan 20, 2011 at 7:37 AM, John Young wrote: > Is the report below both technologically and legally credible ... ? in the past i've used p2p networks along with traditional search engines to locate documents of interest. in particular, PDF and DOC formats, especially related to "Confidential Information" and court filings. i won't go into details, but suffice to say this is very effective if pursued as a consistent strategy over a modest time period. ("it only takes one..."). and if they've used "redaction" to white-on-white the sensitive bits it's even easier to pull out the high value details within. preaching to the choir here, i was more interested in critical infrastructure at the time, rather than political or other cruft. yet the principal is the same for WL or whoever. From jya at pipeline.com Thu Jan 20 07:37:20 2011 From: jya at pipeline.com (John Young) Date: Thu, 20 Jan 2011 10:37:20 -0500 Subject: Alleged Wikileaks Use of P2P to Siphon Documents In-Reply-To: <20110120150527.GT23560@leitl.org> Message-ID: Is the report below both technologically and legally credible or just typical cybersecrurity farting for news coverage? What are the P2P Hackers saying about it? Recall Assange claimed to have a million files on hand at the start of Wikileaks and says WL continued to received millions more until recently. To be sure, WL always maximizes counts of whatever it claims to have, the cables amounting to some 261M _words_ of which a 1% have been made public although the statistically insignificant percentage is never farted. http://www.bloomberg.com/news/2011-01-20/wikileaks-may-have-exploited-music -photo-networks-to-get-classified-data.html Snippet: WikiLeaks, condemned by the U.S. government for posting secret data leaked by insiders, may have used music- and photo-sharing networks to obtain and publish classified documents, according to a computer security firm. Tiversa Inc., a company based in Cranberry Township, Pennsylvania, has evidence that WikiLeaks, which has said it doesnt know who provides it with information, may seek out secret data itself, using so-called "peer-to-peer" networks, Chief Executive Officer Robert Boback claimed. He said the government is examining evidence that Tiversa has turned over. The company, which has done investigative searches on behalf of U.S. agencies including the FBI, said it discovered that computers in Sweden were trolling through hard drives accessed from popular peer-to-peer networks such as LimeWire and Kazaa. The same information obtained in those searches later appeared on WikiLeaks, Boback said. WikiLeaks bases its most important servers in Sweden. End snippet. From michaelslists at gmail.com Wed Jan 19 18:07:43 2011 From: michaelslists at gmail.com (silky) Date: Thu, 20 Jan 2011 13:07:43 +1100 Subject: Question about (cypher)Twitter In-Reply-To: References: <1295075590.15872.5.camel@afterburner> Message-ID: On Thu, Jan 20, 2011 at 12:26 PM, Tyler Durden wrote: > Possibly this answers it. But it would require being able to send that RSS > feed into the TOR cloud, which I will admit to not knowing if such is possible > with minimal ScriptFu. > > Basically, what I'm wondering is, if someone gets ahold of a twitter > distribution list, is it possible to create enough of a cloud so as to remove > the possibility of authorities coming to visit the subscriber? I think this is trivially possible with, well, just the twitter rss feeds. But, with yahoo pipes you make *them* follow the rss feeds, and you watch the output of that. In that way, you aren't directly linked to them, yahoo is, and they'd need to follow the pipe and see who owns it/visits it. But if you make it public, it's visitable by anyone. And I don't think yahoo requires any personal info. Of course, the idea with the pipes is that you could forward the data around a bit, munge it, mix it in with some other services, perhaps encrypt or what-not. But I've not gone to town on what is available with them. Are you thinking specifically about the request for info on Wikileaks followers? If you just follow the public RSS of that twitter account (assuming it is public) surely they don't have any info on you, because you haven't had to join twitter to do that. I must admit, I don't have much of an idea of how twitter handles that stuff, as I haven't used it for a few years. > -TD -- silky From c.mitchellkd at nzmp.com Thu Jan 20 12:11:04 2011 From: c.mitchellkd at nzmp.com (Cecilia Mitchell) Date: Thu, 20 Jan 2011 13:11:04 -0700 Subject: Pharmacy Without Prescription - Buy 100mg Viagra Message-ID: <4d3896d8.fe5a20aa@nzmp.com> Pharmacy Without Prescription - Buy 100mg Viagra Order generic Viagra and other prescription drugs online Buy100Viagra.com offers you the finest quality generic drugs for a very competative price. http://dietpillrxtablets.ru From coderman at gmail.com Thu Jan 20 13:29:25 2011 From: coderman at gmail.com (coderman) Date: Thu, 20 Jan 2011 13:29:25 -0800 Subject: Alleged Wikileaks Use of P2P to Siphon Documents In-Reply-To: References: <20110120150527.GT23560@leitl.org> Message-ID: On Thu, Jan 20, 2011 at 9:10 AM, coderman wrote: > ... documents of interest. in particular, PDF and DOC > formats, ... what is implied, which i should have stated clearly: the less popular extensions and mime types (PDF, DOC, XLS, ODT, etc.) are easy to match and vastly less polluted than the primary media focused content. From coderman at gmail.com Thu Jan 20 13:47:39 2011 From: coderman at gmail.com (coderman) Date: Thu, 20 Jan 2011 13:47:39 -0800 Subject: Alleged Wikileaks Use of P2P to Siphon Documents In-Reply-To: <20110120214357.GR23560@leitl.org> References: <20110120150527.GT23560@leitl.org> <20110120214357.GR23560@leitl.org> Message-ID: On Thu, Jan 20, 2011 at 1:43 PM, Eugen Leitl wrote: > ... > So is this deliberately leaked, or accidentally leaked? Accidentally, > right? the vast majority are accidental. the nature of how these incidents occur, and the user interface design failures which encourage them is an interesting tale in and of itself... ;) From coderman at gmail.com Thu Jan 20 15:10:03 2011 From: coderman at gmail.com (coderman) Date: Thu, 20 Jan 2011 15:10:03 -0800 Subject: Alleged Wikileaks Use of P2P to Siphon Documents In-Reply-To: References: <20110120150527.GT23560@leitl.org> <20110120214357.GR23560@leitl.org> Message-ID: On Thu, Jan 20, 2011 at 2:53 PM, John Young wrote: > It may be that the cybersec wizard encountered a TLA sting being > run on P2P... honeytokens++ From eugen at leitl.org Thu Jan 20 07:05:27 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Jan 2011 16:05:27 +0100 Subject: [p2p-hackers] what would you like to see most in a p2p social network? Message-ID: <20110120150527.GT23560@leitl.org> ----- Forwarded message from Pierre St Juste ----- From eugen at leitl.org Thu Jan 20 07:28:41 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Jan 2011 16:28:41 +0100 Subject: [p2p-hackers] what would you like to see most in a p2p social network? Message-ID: <20110120152840.GW23560@leitl.org> ----- Forwarded message from Pierre St Juste ----- From eugen at leitl.org Thu Jan 20 07:29:41 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Jan 2011 16:29:41 +0100 Subject: [p2p-hackers] what would you like to see most in a p2p social network? Message-ID: <20110120152941.GY23560@leitl.org> ----- Forwarded message from Pierre St Juste ----- From eugen at leitl.org Thu Jan 20 07:30:23 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Jan 2011 16:30:23 +0100 Subject: [p2p-hackers] How Piracy Will Hyperlocalize with Mesh Networks Message-ID: <20110120153022.GZ23560@leitl.org> ----- Forwarded message from Alexandre Dulaunoy ----- From alenlpeacock at gmail.com Thu Jan 20 15:43:23 2011 From: alenlpeacock at gmail.com (Alen Peacock) Date: Thu, 20 Jan 2011 16:43:23 -0700 Subject: [p2p-hackers] NAT traversal state of the art Message-ID: A question for those who've built NAT traversal for their apps in the past: If you were starting from scratch today, how would you do it? Is there a library you think has everything you need (libjingle, pjnath, amicima, socialvpn, etc)? Or would you roll your own, perhaps implementing ANTS (http://nattest.net.in.tum.de/pubs/globecom09-draft.pdf) instead of ICE? What if you need super-high success rates for direct connectivity (+95%)? Would you use libutp (https://github.com/bittorrent/libutp) or libjingle's psuedo-tcp classes, or some other, or just use plain UDP and manage segmentation/retransmit/reordering yourself? I know this is a well trodden topic in p2p-hackers, but things change quickly, and although most of the above have been mentioned in passing in the past year here, I haven't seen a good drag-down, knock-out, "Here's the Best Way To Do It" discussion in a while. Any takers? Alen _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Jan 20 07:52:37 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Jan 2011 16:52:37 +0100 Subject: Alleged Wikileaks Use of P2P to Siphon Documents In-Reply-To: References: <20110120150527.GT23560@leitl.org> Message-ID: <20110120155237.GB23560@leitl.org> On Thu, Jan 20, 2011 at 10:37:20AM -0500, John Young wrote: > Is the report below both technologically and legally credible or just Publishing via an anonymous Internet connection directly to P2P makes sense, and scanning for such information does also make sense, as you can't notify Wikileaks about a document published without drawing even more scrutiny to you. Whether this is happening, or the Tiversa is just being a blowhard will be difficult to say without further evidence, either from WL or from Tiversa. > typical cybersecrurity farting for news coverage? What are the P2P > Hackers saying about it? P2P hackers (mostly) write code, so I don't think they're privy to this. I can ask, of course. > Recall Assange claimed to have a million files on hand at the start of > Wikileaks and says WL continued to received millions more until recently. > > To be sure, WL always maximizes counts of whatever it claims to have, > the cables amounting to some 261M _words_ of which a 1% have been > made public although the statistically insignificant percentage is never > farted. > > > http://www.bloomberg.com/news/2011-01-20/wikileaks-may-have-exploited-music > -photo-networks-to-get-classified-data.html > > Snippet: > > WikiLeaks, condemned by the U.S. government for posting secret data leaked > by insiders, may have used music- and photo-sharing networks to obtain and > publish classified documents, according to a computer security firm. > > Tiversa Inc., a company based in Cranberry Township, Pennsylvania, has > evidence that WikiLeaks, which has said it doesn?t know who provides it with > information, may seek out secret data itself, using so-called > "peer-to-peer" networks, > Chief Executive Officer Robert Boback claimed. He said the government is > examining evidence that Tiversa has turned over. > > The company, which has done investigative searches on behalf of U.S. agencies > including the FBI, said it discovered that computers in Sweden were > trolling through > hard drives accessed from popular peer-to-peer networks such as LimeWire and > Kazaa. The same information obtained in those searches later appeared on > WikiLeaks, Boback said. WikiLeaks bases its most important servers in Sweden. > > End snippet. > > -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Jan 20 07:58:00 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Jan 2011 16:58:00 +0100 Subject: [p2p-hackers] what would you like to see most in a p2p social network? Message-ID: <20110120155800.GE23560@leitl.org> ----- Forwarded message from Renato Figueiredo ----- From jya at pipeline.com Thu Jan 20 14:53:15 2011 From: jya at pipeline.com (John Young) Date: Thu, 20 Jan 2011 17:53:15 -0500 Subject: Alleged Wikileaks Use of P2P to Siphon Documents In-Reply-To: References: <20110120214357.GR23560@leitl.org> <20110120150527.GT23560@leitl.org> <20110120214357.GR23560@leitl.org> Message-ID: It may be that the cybersec wizard encountered a TLA sting being run on P2P -- those exact six IP addresses among tens of thousands, each wearing a sign that says Wikileaks right here, log us. Someone writes that the USG has been seeding P2P with bogus files for quite a while in order to trace their arranged discovery and appearance elsewhere. Following the lead and using the means and methoids of the copyright pig kissers. To be sure that is what the USG and its contractors would claim to cover their ineptitude. Meanwhile, using old style bribing, burgling, paying lawyers and journalists and whistleblowers and hackers and goofy soldiers to entrap would-be info liberators, then turning those captured into pig kissers. No disrespect to pig kissers, they happily admit to doing whatever is necessary to outwit professionals. From eugen at leitl.org Thu Jan 20 13:43:58 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 20 Jan 2011 22:43:58 +0100 Subject: Alleged Wikileaks Use of P2P to Siphon Documents In-Reply-To: References: <20110120150527.GT23560@leitl.org> Message-ID: <20110120214357.GR23560@leitl.org> On Thu, Jan 20, 2011 at 01:29:25PM -0800, coderman wrote: > On Thu, Jan 20, 2011 at 9:10 AM, coderman wrote: > > ... documents of interest. in particular, PDF and DOC > > formats, ... > > what is implied, which i should have stated clearly: > > the less popular extensions and mime types (PDF, DOC, XLS, ODT, etc.) > are easy to match and vastly less polluted than the primary media > focused content. So is this deliberately leaked, or accidentally leaked? Accidentally, right? -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From 0-vc at cancer.org Thu Jan 20 09:30:16 2011 From: 0-vc at cancer.org (MUST-SELL-SALE) Date: Fri, 21 Jan 2011 02:30:16 +0900 Subject: Watches and Luxury Products starting at $99 Message-ID: <9481441233.502UL6B2097312@nuhpvwyrzj.qbmioruoqk.ru> Take advantage of our Overstock of Jewelry and WatchesDont empty your wallet for your next Luxury item! Follow our link to Browse our brand new collection of sites! http://itchname.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 333 bytes Desc: not available URL: From samuel.rose at gmail.com Fri Jan 21 04:48:44 2011 From: samuel.rose at gmail.com (Samuel Rose) Date: Fri, 21 Jan 2011 07:48:44 -0500 Subject: [P2P-F] Bitcoin donation Message-ID: On Fri, Jan 21, 2011 at 6:14 AM, Michel Bauwens wrote: > ok, I get it, so there are people out there actually wanting to 'buy' > bitcoins, and I wasn't aware of that, and obviously, this needs to be bought > and expressed by another existing currency, hence the 'value' > Yes, from what I can tell, *now* the best way to get bitcoins is to buy them. However, it seems based on reading online discussions that in the earliest days of bitcoin activity, that it was a bit easier to contribute your personal computer power to the network and "generate" coins. Now, it the calculations are over a year for a typical laptop (ref: http://www.alloscomp.com/bitcoin/calculator.php ) A whole history of trading can be viewed here: https://mtgox.com/trade/history Again, I think there is only one real issue with bitcoin: that it is a homogenous currency. I am looking at the idea of soliciting donations towards extending bitcoin software so that users may either issue new currency (with new rules), or participate in existing currencies all from the same protocol/software. > I 'got' it > > By the way, alt.currency/credit commons expert Thomas Greco is in Chiang > Mai! > > > Michel > > On Wed, Jan 19, 2011 at 9:14 PM, Sepp Hasslberger wrote: >> >> Basically Michel, the value of any commodity is determined by whether >> people believe it is of value. >> The fact that you can buy and sell something establishes a base-line value >> for it. The value is a balance between how much of the stuff is available, >> and how much demand there is for it from potential buyers. Economists called >> it the law of supply and demand. >> In the case of bitcoin, we are looking at a commodity (exchangeable >> electronic "coins") that is scarce - there are only so many coins in >> existence, and making more of them is a slow, difficult prcess - and for >> which there is a demand. People are looking around for some kind of means of >> exchange that can de-link them from the official currencies. Potentially, we >> have a great demand for bitcoins ... if the idea of using them as a means of >> payment ever really catches on. Even as it is, there is enough of a demand >> for bitcoins to "feel their scarcity", and thus, to make them valuable. A >> price is being set for bitcoins in exchange services. The price is entirely >> dependent on how badly people want bitcoins, and it seems that the price is >> on the upswing. >> This is really the same mechanism as with any kind of money. As long as >> there are people who want to use it to conduct their business (or to put >> away for future use), and as long as there is a restricted amount of it, >> money can be said to have value. >> The value of any commodity or any kind of money will go up if 1) more >> people want it or 2) some of it is destroyed or withdrawn from circulation, >> making it more scarce. >> Similarly, the value of any commodity or any kind of money will go down if >> 1) less people want it or 2) more of it is put into circulation, making it >> comparatively more abundant. > > >> >> That is the mechanism that determines the value of money - ANY kind of >> money. >> Sepp >> >> >> >> >> "The individual is supreme and finds the way through intuition" >> http://www.newmediaexplorer.org/sepp/ >> http://www.laleva.org >> http://blog.hasslberger.com/ >> http://www.facebook.com/hasslberger >> http://twitter.com/healthsupreme >> . >> On Jan 19, 2011, at 2:19 PM, Michel Bauwens wrote: >> >> there are still basic aspects of bitcoin I don't understand >> >> how can a self-invented coin have any value at all, >> >> who determines that value? >> >> what makes people accept that it has the value it says >> >> which bank is willing to give me other types of money in exchange for that >> value? >> >> On Mon, Jan 17, 2011 at 8:04 PM, Samuel Rose >> wrote: >>> >>> On Mon, Jan 17, 2011 at 5:40 AM, Sepp Hasslberger >>> wrote: >>> > Although I have misgivings about the stability of bitcoin, I support >>> > its >>> > use. (It's the only thing out there that is completely de-linked from >>> > official currencies and from things like precious metals, that is >>> > workable >>> > for more than just local exchange). >>> > To explain my perplexity on bitcoin stability, I quote from the site >>> > cyclonite linked: >>> > "How much is a Bitcoin worth? >>> > >>> > More all the time... >>> > >>> > As you can see, over a 4 week period, recently... >>> > >>> > The value of B `8?1.00B BTC (one Bitcoin), went from B US$0.06B B to >>> > B US$0.50B B ...within only about 4 weeks. B Yes... B That was an 833% >>> > increase >>> > in it's value. B Wow." >>> > (http://www.bitcoinme.com/) >>> > For me, a currency that is to be widely used, should be stable. Stable >>> > means >>> > it doesn't go down in value, but it also doesn't go up in value >>> > excessively. >>> > It should be roughly keeping its value. Going up as much as bitcoin >>> > evidently does, is a form of instability that will bring disturbance to >>> > a >>> > marketplace using bitcoin as its means of exchange. >>> >>> bitcoin does seem to have stabilized after that initial jump. I think >>> the initial jump was due to the network effect of how fast the current >>> group of adopters jumped on board and started using bitcoin. >>> >>> Still, this is a of course a valid point. Although, the value increase >>> seems to have been mostly beneficial to the early adopters. But, I >>> could see how if the system stabilized, then a new wave of adopters >>> jumped on board, it could suddenly become very unbalanced for the >>> initial participants if various scenarios unfold. >>> >>> Although, I am not sure *if* the bitcoin system would automatically >>> inflate in an exponential way each time a new wave of participants >>> joins the system. >>> >>> One real potential problem is making sure that "honest nodes" control >>> the majority of CPU power. So far, so good. It won't be easy for >>> anyone to spoof this system. But, if a group of people wants to >>> intentionally attack the system, there could be problems. Bitcoin is a >>> good candidate for complex systems models as a means to put more >>> foresight into stability, health, etc >>> >>> > This instability could and should be remedied by adjusting the target >>> > total >>> > of bitcoin creation with an algorithm that takes into account the >>> > number of >>> > active bitcoin users. As the number of users increases, the total >>> > target >>> > amount of bitcoins to be created (which currently is fixed at >>> > 21,000,000) >>> > should increase, slowly creeping up to accomodate the demand of new >>> > users >>> > for bitcoins, in a way to keep the value of one single coin roughly >>> > stable. >>> > I do not know whether the creators of bitcoin would be willing to do >>> > this. >>> > For me, such an adjustment will be necessary to take bitcoin from >>> > experimental status to widely-used alternative means of payment status. >>> >>> Sepp, this is a great point. >>> >>> One of the nice things about bitcoin is that it is F/LOSS, so it is >>> ultimately fork-able. If bad decisions are made about the growth, the >>> project could be forked, a different governance scheme could be >>> implemented, etc. >>> >>> I don't yet know enough about bitcoin to be 100% sure, but the system >>> at least for the time being does seem to have stabilized (it could >>> simply mean that participation has stabilized). >>> >>> Bit coin claims: >>> >>> "Once a predetermined number of coins have entered >>> circulation, the incentive can transition entirely to transaction fees >>> and be completely inflation >>> free." >>> >>> And yes Michel, I will post this on the blog and in wiki :) >>> >>> >>> > Kind regards >>> > Sepp >>> > >>> > >>> > >>> > >>> > On Jan 17, 2011, at 4:44 AM, Samuel Rose wrote: >>> > >>> > Cyclonite, personally I am ready to work with bitcoin today, although >>> > the rest of p2pf may not be, which I'll respect >>> > >>> > On Sun, Jan 16, 2011 at 5:17 PM, Cyclonite >>> > wrote: >>> > >>> > Hi Guys, >>> > >>> > I think there is some kind of misunderstanding here, you do not need to >>> > manually generate any kind of public/private keys as with OpenPGP. >>> > >>> > You can even sign up in a website as mybitcoin.com and start making or >>> > receiving donations. >>> > >>> > In my opinion the best available info for beginners is >>> > http://bitcoinme.com. >>> > Please take a look and you will get your doubts clear. >>> > >>> > Best regards, >>> > >>> > Cyclonite. >>> > >>> > -- >>> > >>> > Secure Email contact: https://privacybox.de/cyclonite.msg >>> > >>> > Bitcoin donations jar: 16FVZweaaJLvhAy91oDugqaf84kXiDJ9PG >>> > >>> > >>> > >>> > -------- Original Message -------- >>> > >>> > From: Samuel Rose >>> > >>> > To: james burke >>> > >>> > Cc: Michel Bauwens , cyclonite at safe-mail.net, >>> > p2p-foundation , Sepp Hasslberger >>> > , Georg Pleger >>> > >>> > Subject: Re: Bitcoin donation >>> > >>> > Date: Sat, 15 Jan 2011 09:30:23 -0500 >>> > >>> > On Sat, Jan 15, 2011 at 5:54 AM, james burke >>> > wrote: >>> > >>> > Hi Michel, >>> > >>> > Yes, I do have a public key, but yet again, >>> > >>> > another nice idea with terrible interaction design and userbility >>> > >>> > - most people have no clue about public private keys, so this keeps it >>> > a >>> > >>> > geek thing >>> > >>> > I agree, although as far as I can see, the application at least takes >>> > >>> > care of this for the user. Still, your point is valid in that some >>> > >>> > people may not understand what is happening. >>> > >>> > >>> > Most of the users of bitcoin now are early adopters, however. So, if >>> > >>> > p2pf did support donation via bitcoin, it would be joining an ecology >>> > >>> > of early adopters, and would likely only receive donation from those >>> > >>> > early adopters. >>> > >>> > - the actual app upon launch is unclear. Where to click, what to >>> > do,gah! >>> > >>> > I can't really support this even if it is a p2p solution. >>> > >>> > James >>> > >>> > >>> > Seems reasonable. If p2pf changes it's mind, I'm willing to >>> > >>> > participate in any experiments with bitcoin >>> > >>> > >>> > On Sat, Jan 15, 2011 at 5:57 AM, Michel Bauwens >>> > >>> > >>> > wrote: >>> > >>> > James, >>> > >>> > do you have a public key? >>> > >>> > Michel >>> > >>> > On Sat, Jan 15, 2011 at 11:20 AM, Samuel Rose >>> > >>> > wrote: >>> > >>> > This is a p2p application, so we would need to post your's or James's >>> > >>> > public key, and people who want to donate bitcoins would need then >>> > >>> > send you the bitcoins by downloading the bitcoin application and >>> > >>> > sending it to you >>> > >>> > quote: >>> > >>> > "Bitcoin utilizes public/private key digital signatures (ECDSA). A >>> > >>> > coin has its owner's public key on it. When a coin is transferred from >>> > >>> > user A to user B, A adds Bbs public key to the coin and signs it with >>> > >>> > his own private key. Now B owns the coin and can transfer it further. >>> > >>> > To prevent A from transferring the already used coin to another user >>> > >>> > C, a public list of all the previous transactions is collectively >>> > >>> > maintained by the network of Bitcoin nodes, and before each >>> > >>> > transaction the coinbs unusedness will be checked." >>> > >>> > >>> > >>> > On Fri, Jan 14, 2011 at 11:17 PM, Michel Bauwens >>> > >>> > wrote: >>> > >>> > Sam, can you help us install it on the wiki and blog? >>> > >>> > On Sat, Jan 15, 2011 at 11:16 AM, Samuel Rose >>> > >>> > wrote: >>> > >>> > I've downloaded and installed and am game to try with p2pf network >>> > >>> > folks. >>> > >>> > This could actually be really useful for lots of local economy efforts >>> > >>> > too. >>> > >>> > >>> > >>> > On Fri, Jan 14, 2011 at 5:32 AM, Michel Bauwens >>> > >>> > >>> > >>> > wrote: >>> > >>> > Dear, >>> > >>> > thanks a lot for this email, >>> > >>> > it seems that it is worthwhile for us to experiment with this, but I >>> > >>> > will >>> > >>> > forward this to James Burke for possible implementation >>> > >>> > James, I think we should do this, what doB you think? >>> > >>> > Michel >>> > >>> > On Thu, Jan 13, 2011 at 11:42 PM, wrote: >>> > >>> > -----BEGIN PGP SIGNED MESSAGE----- >>> > >>> > Hash: SHA1 >>> > >>> > Dear friends, >>> > >>> > I have been looking in your site for any reference to Bitcoin for >>> > >>> > making a >>> > >>> > small donation. >>> > >>> > As B you B probably B know, B Bitcoin B (bitcoin.org) B is B a B new kind >>> > >>> > of a >>> > >>> > P2P >>> > >>> > crypto-currency in which the general public can B make donations, >>> > >>> > macro >>> > >>> > B or >>> > >>> > micropayments B in B a B secure B and B anonymous B way B usually >>> > >>> > B without >>> > >>> > B any >>> > >>> > transaction fee involved. >>> > >>> > You can change Bitcoins for real money (eg: https://mtgox.com) or >>> > >>> > purchase >>> > >>> > services or goods in an increasing number of sites. >>> > >>> > In B order to B receive B donations you B only have B to B publish B one >>> > >>> > B of >>> > >>> > your >>> > >>> > accounts B as generated B by the B bitcoin client B or any specialized >>> > >>> > bitcoin >>> > >>> > trader (eg: mybitcoin.com). >>> > >>> > Currently B some B projects B as B www.i2p2.de, >>> > >>> > B www.torrentservers.net >>> > >>> > and >>> > >>> > organizations like the EFF are accepting donations. >>> > >>> > In B my B opinion B this B kind B of decentralized solution without the >>> > >>> > need >>> > >>> > to >>> > >>> > trust B any B middlemen B is much better than B Paypal, Visa or >>> > >>> > Mastercard >>> > >>> > for >>> > >>> > security-minded people as most of your donors are. >>> > >>> > If B you B are B interested in B pushing B Bitcoin forward, B do not >>> > >>> > hesitate >>> > >>> > to >>> > >>> > contact me if you have any doubt. >>> > >>> > Yours, >>> > >>> > Cyclonite >>> > >>> > >>> >>> >>> >>> -- >>> -- >>> Sam Rose >>> Future Forward Institute and Forward Foundation >>> Tel:+1(517) 639-1552 >>> Cel: +1-(517)-974-6451 >>> skype: samuelrose >>> email: samuel.rose at gmail.com >>> http://forwardfound.org >>> http://futureforwardinstitute.org >>> http://hollymeadcapital.com >>> http://p2pfoundation.net >>> http://socialmediaclassroom.com >>> >>> "The universe is not required to be in perfect harmony with human >>> ambition." - Carl Sagan >> >> >> >> -- >> P2P Foundation: http://p2pfoundation.netB - http://blog.p2pfoundation.net >> >> Connect: http://p2pfoundation.ning.com; Discuss: >> http://listcultures.org/mailman/listinfo/p2presearch_listcultures.org >> >> Updates: http://del.icio.us/mbauwens; http://friendfeed.com/mbauwens; >> http://twitter.com/mbauwens; http://www.facebook.com/mbauwens >> >> Think tank: http://www.asianforesightinstitute.org/index.php/eng/The-AFI >> >> >> >> >> > > > > -- > P2P Foundation: http://p2pfoundation.netB - http://blog.p2pfoundation.net > > Connect: http://p2pfoundation.ning.com; Discuss: > http://listcultures.org/mailman/listinfo/p2presearch_listcultures.org > > Updates: http://del.icio.us/mbauwens; http://friendfeed.com/mbauwens; > http://twitter.com/mbauwens; http://www.facebook.com/mbauwens > > Think tank: http://www.asianforesightinstitute.org/index.php/eng/The-AFI > > > > > -- -- Sam Rose Future Forward Institute and Forward Foundation Tel:+1(517) 639-1552 Cel: +1-(517)-974-6451 skype: samuelrose email: samuel.rose at gmail.com http://forwardfound.org http://futureforwardinstitute.org http://hollymeadcapital.com http://p2pfoundation.net http://socialmediaclassroom.com "The universe is not required to be in perfect harmony with human ambition." - Carl Sagan _______________________________________________ P2P Foundation - Mailing list http://www.p2pfoundation.net https://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Jan 20 23:37:24 2011 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 21 Jan 2011 08:37:24 +0100 Subject: [p2p-hackers] NAT traversal state of the art Message-ID: <20110121073724.GS23560@leitl.org> ----- Forwarded message from Alen Peacock ----- From eugen at leitl.org Fri Jan 21 04:55:46 2011 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 21 Jan 2011 13:55:46 +0100 Subject: [P2P-F] Bitcoin donation Message-ID: <20110121125546.GF23560@leitl.org> ----- Forwarded message from Samuel Rose ----- From 0-t_operations at business-post.com Fri Jan 21 01:06:45 2011 From: 0-t_operations at business-post.com (Canada Pharm-) Date: Fri, 21 Jan 2011 18:06:45 +0900 Subject: Get the medication you need Message-ID: <0884204530.HMDUZLC4322531@cebvxhriynzwj.clixvayjgynujs.org> Keep your bedroom EXOTIC at night Follow the link to Order http://www.treatgroan.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 261 bytes Desc: not available URL: From no-reply990 at jobbankusa.com Fri Jan 21 19:17:47 2011 From: no-reply990 at jobbankusa.com (no-reply990 at jobbankusa.com) Date: Fri, 21 Jan 2011 22:17:47 -0500 Subject: The list below shows all vacancies available Message-ID: <201101220317.p0M3Hl7c015624@proton.jfet.org> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2723 bytes Desc: not available URL: From contact at oversi.ru Fri Jan 21 12:56:55 2011 From: contact at oversi.ru (=?koi8-r?B?98HbIMHO1MnL0snaydPO2cog28HO0w==?=) Date: Fri, 21 Jan 2011 22:56:55 +0200 Subject: =?koi8-r?B?9M/Sx8/X2cog0MXS08/OwcwgKNDPxMLP0iwgz8LV3sXOycUp?= Message-ID: <000d01cbb9ad$bcb12d80$6400a8c0@contact> Тема: Торговый персонал √ подбор, обучение, оценка эффективности Внешний и внутренний консультант по управлению предприятием и работе с персоналом, практик-консультант по реструктуризации и построению управленческих структур, сертифицированный специалист по ИСО стандартам, постановщик задач по вопросам оценки и аттестации для программы "Босс-кадровик". +7 (код Москвы) Ч45/З968 \\\/// ЧЧ54О53 26 Января (продолжительность 8 часов) Цель: Торговый персонал отличается большой текучестью. Там где есть такая категория работников, никогда не перестают искать и принимать новых сотрудников. Большая часть вновь принятых увольняются в первые три месяца работы. Как минимизировать ошибки при приеме торгового персонала и отсечь на этапе подбора совершенно неподходящие кандидатуры, какие приемы при собеседовании помогут выявить полную профнепригодность кандидатов. И как не потерять потенциально хороших работников в начале их работы на предприятии Кого, когда и чему следует обучать Как узнать результативность обучения Для чего нужны периодические и внеплановые оценки (аттестации) Как организовать оценку, чтобы она прошла с наименьшим отвлечением персонала, но в то же время дала практические результаты Программа мероприятия: Подбор торгового персонала: 1.1 Особенности торгового персонала 1.2 Виды торгового персонала 1.3 Как минимизировать ошибки при приеме: 1.3.1 Тесты 1.3.2 Проверка на стрессоустойчивость 1.3.3 "Плохие" вопросы 1.4 Коллективные испытания 1.5 Испытательный срок: 1.5.1 Конкретные задания 1.5.1 Шефство 1.5.1 Выводы по результатам испытательного срока 1.6 Образцы документов по подбору и приему Обучение: 2.1 Непрерывность обучения 2.2 Категории обучающихся 2.3 Программы обучения 2.4 Плюсы и минусы внешнего и внутреннего обучения 2.5 Оценка результативности обучения 2.6 Образцы документов по обучению (повышению квалификации) Оценка, аттестация торгового персонала: 3.1 Подготовка процедуры оценки: 3.1.1 Вопросы 3.1.2 Практические задания 3.1.3 Отзывы 3.1.4 Тесты 3.1.5 Анонимный покупатель 3.2 Сроки и частота оценки 3.3 Цели оценки 3.4 Результаты оценки 3.5 Действия после оценки: 3.5.1 Резерв 3.5.2 Перемещение 3.5.3 Обучение 3.5.4 Увольнение 3.6 Образцы документов по подготовке и проведению оценки (аттестации) Практические рекомендации, ответы на вопросы слушателей Cтоимоcть: 7 900 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: (код Москвы) 44/5..32-66 <<>> Ч45_4.0.95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5422 bytes Desc: not available URL: From julia at yourlab.ru Fri Jan 21 13:10:17 2011 From: julia at yourlab.ru (=?koi8-r?B?79DUyc3J2sHDydEg2sHU0sHU?=) Date: Sat, 22 Jan 2011 05:10:17 +0800 Subject: =?koi8-r?B?9M/Sx8/X2cog0MXS08/OwcwgKNDPxMLP0iwgz8LV3sXOycUp?= Message-ID: <2A506A6139104077B065A98A3B1A8EC2@888tigeraef342> Тема: Торговый персонал: как подбирать, обучать и оценивать эффективность Внешний и внутренний консультант по управлению предприятием и работе с персоналом, практик-консультант по реструктуризации и построению управленческих структур, сертифицированный специалист по ИСО стандартам, постановщик задач по вопросам оценки и аттестации для программы "Босс-кадровик". код: (четыре девять пять) 7922|_22 \\// 4Ч5-32*66 26 Января 2О1lг. (продолжительность 8 часов) Цель: Торговый персонал отличается большой текучестью. Там где есть такая категория работников, никогда не перестают искать и принимать новых сотрудников. Большая часть вновь принятых увольняются в первые три месяца работы. Как минимизировать ошибки при приеме торгового персонала и отсечь на этапе подбора совершенно неподходящие кандидатуры, какие приемы при собеседовании помогут выявить полную профнепригодность кандидатов. И как не потерять потенциально хороших работников в начале их работы на предприятии Кого, когда и чему следует обучать Как узнать результативность обучения Для чего нужны периодические и внеплановые оценки (аттестации) Как организовать оценку, чтобы она прошла с наименьшим отвлечением персонала, но в то же время дала практические результаты Программа мероприятия: Подбор торгового персонала: 1.1 Особенности торгового персонала 1.2 Виды торгового персонала 1.3 Как минимизировать ошибки при приеме: 1.3.1 Тесты 1.3.2 Проверка на стрессоустойчивость 1.3.3 "Плохие" вопросы 1.4 Коллективные испытания 1.5 Испытательный срок: 1.5.1 Конкретные задания 1.5.1 Шефство 1.5.1 Выводы по результатам испытательного срока 1.6 Образцы документов по подбору и приему Обучение: 2.1 Непрерывность обучения 2.2 Категории обучающихся 2.3 Программы обучения 2.4 Плюсы и минусы внешнего и внутреннего обучения 2.5 Оценка результативности обучения 2.6 Образцы документов по обучению (повышению квалификации) Оценка, аттестация торгового персонала: 3.1 Подготовка процедуры оценки: 3.1.1 Вопросы 3.1.2 Практические задания 3.1.3 Отзывы 3.1.4 Тесты 3.1.5 Анонимный покупатель 3.2 Сроки и частота оценки 3.3 Цели оценки 3.4 Результаты оценки 3.5 Действия после оценки: 3.5.1 Резерв 3.5.2 Перемещение 3.5.3 Обучение 3.5.4 Увольнение 3.6 Образцы документов по подготовке и проведению оценки (аттестации) Практические рекомендации, ответы на вопросы слушателей Cтоимоcть: 7 900 рублей Вся информация по тел: (код Москвы) 742.9-1_9/8 ; Ч4*53_96-8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5470 bytes Desc: not available URL: From agalishiamq at eurocentres.com Sat Jan 22 05:13:48 2011 From: agalishiamq at eurocentres.com (Alica Alishia) Date: Sat, 22 Jan 2011 06:13:48 -0700 Subject: Pharmacy Without Prescription - Buy 100mg Viagra Message-ID: <201101220610.99AE5F30BD572FBF0668@q08j1ci8v> Pharmacy Without Prescription - Buy 100mg Viagra Order generic Viagra and other prescription drugs online Buy100Viagra.com offers you the finest quality generic drugs for a very competative price. http://graphictabletpillshealth.ru From gmagius at gmail.com Fri Jan 21 23:29:09 2011 From: gmagius at gmail.com (magius) Date: Sat, 22 Jan 2011 08:29:09 +0100 Subject: [P2P-F] Bitcoin @ EFF Message-ID: https://www.eff.org/deeplinks/2011/01/bitcoin-step-toward-censorship-resistant _______________________________________________ P2P Foundation - Mailing list http://www.p2pfoundation.net https://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sat Jan 22 00:35:29 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 22 Jan 2011 09:35:29 +0100 Subject: [P2P-F] Bitcoin @ EFF Message-ID: <20110122083529.GR23560@leitl.org> ----- Forwarded message from magius ----- From michi1 at michaelblizek.twilightparadox.com Sat Jan 22 04:16:48 2011 From: michi1 at michaelblizek.twilightparadox.com (Michael Blizek) Date: Sat, 22 Jan 2011 13:16:48 +0100 Subject: [p2p-hackers] How Piracy Will Hyperlocalize with Mesh Networks Message-ID: Hi! On 09:35 Sat 22 Jan , Eugen Leitl wrote: > On Sat, Jan 22, 2011 at 08:00:45AM +0100, Michael Blizek wrote: ... > > Besides IPv6 is as broken as IPv4 in meshes. It provides zero security, > > I'm seeing a loophole in IPv6 by way of providing a local /64 which > is effectively scratch space. This would prepare the way for geographic > routing when the table space growth goes exponential again. In how far is this geographic routing supposed to help? Finding routes to the other end of the mesh which you do not use anyway? > > privacy and a single high-bandwidth application can slow everything down > > extremely - and there is close to nothing you can do about this. The only > > thing IPv6 does slightly better in meshes than IPv4 is automatic address > > Positioning information is a good source of automatic address assignment, > and there's machinery (DAD) helping you to deal with rare collisions. Well, let's see which possibilities exist for defining addresses: 1) You have a very small address space and search the network to see if your randomly generated address is already in use before you use it. 2) You have a big address space and just generate an address and assume nodody else uses it. 3) You use public keys of a public-private key crypto to make sure nobody can "take over" somebody else's address. If IPv6 can not even do 2 without any quirks it has *zero* reason for existance in mesh networks. Not even "the outside is using IPv6" (they are *not*) is an argument, because you usually want to create an encrypted tunnel to the exit node anyway. > > assignment - and even this probably is not that hard to do in IPv4 unless you > > have extreme situations. > > IPv4 is dead, Jim. IPv4 is *not* dead. Everybody is using it. I do not know a single ISP who provides it to their customers. Besides IPv6 is close to being the worst you can do from a privacy point of view. Getting rid of NAT is a very bad idea. Having the last 64 bits globally unique no matter where you more is very bad is well. Even privacy extensions (*if* used) are not as good, because addresses will not get reused. Having the first 64 bits static is even worse. I seriously doubt that it is not even necessary. Providers start implementing carrier side NAT and if done right (with UPnP or other means of forwarding ports without user intervention), this can be a significant privacy gain without any side effects. Yes I know how much application can be fingerprinted, but this does not mean that we should constantly be adding ever more identifying information. -Michi -- programing a layer 3+4 network protocol for mesh networks see http://michaelblizek.twilightparadox.com ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From gmagius at gmail.com Sat Jan 22 11:26:13 2011 From: gmagius at gmail.com (magius) Date: Sat, 22 Jan 2011 20:26:13 +0100 Subject: [P2P-F] Bitcoin @ EFF Message-ID: imho is more interesting this one, although less developped http://opencoin.org/ 2011/1/22 Samuel Rose : > I think Bitcoin is really awesome. I just hope to be able to create a > way to issue and use new currencies with it in addition to using the > existing one in the same application. > > On Sat, Jan 22, 2011 at 2:29 AM, magius wrote: >> https://www.eff.org/deeplinks/2011/01/bitcoin-step-toward-censorship-resistant >> >> _______________________________________________ >> P2P Foundation - Mailing list >> http://www.p2pfoundation.net >> https://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation >> > > > > -- > -- > Sam Rose > Future Forward Institute and Forward Foundation > Tel:+1(517) 639-1552 > Cel: +1-(517)-974-6451 > skype: samuelrose > email: samuel.rose at gmail.com > http://forwardfound.org > http://futureforwardinstitute.org > http://hollymeadcapital.com > http://p2pfoundation.net > http://socialmediaclassroom.com > > "The universe is not required to be in perfect harmony with human > ambition." - Carl Sagan > > _______________________________________________ > P2P Foundation - Mailing list > http://www.p2pfoundation.net > https://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation > _______________________________________________ P2P Foundation - Mailing list http://www.p2pfoundation.net https://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From anabelxv at idial.net.jfet.org Sat Jan 22 19:40:05 2011 From: anabelxv at idial.net.jfet.org (Alvera Anabel) Date: Sat, 22 Jan 2011 20:40:05 -0700 Subject: Cheap Phentermine for you, Secure order processing this way Message-ID: <26e60i69c77-01055019-550q1c58@bnfijamhmn> Phentermine online from $2.12 per pill! Your Best Online-Drugstores! Cheap Phentermine for you, Secure order processing this way http://rxonlinepills.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 327 bytes Desc: not available URL: From core at prescript.ru Sat Jan 22 19:58:32 2011 From: core at prescript.ru (=?koi8-r?B?88nT1MXNwSDP0MzB1Nkg1NLVxME=?=) Date: Sun, 23 Jan 2011 09:28:32 +0530 Subject: =?koi8-r?B?6frt5e7l7unxIDIwMTHHLiD6wdLBws/UzsHRINDMwdTB?= Message-ID: <000d01cbbab1$cd5923e0$6400a8c0@core> 27 Января ТЕМА: Заработная плата в 2011 году: правовые, бухгалтерские и налоговые вопросы (Ч95) ЧЧ-5/Ч0/*95 ; Ч45.З9-68 Цель: Изучить основные принципы организации и построения систем оплаты труда, рассмотреть порядок и методику расчета среднего заработка, получить рекомендации Лектор профессионально и достоверно расскажет обо всех нюансах и изменениях в расчетах по заработной плате. Программа мероприятия: 1. Классификация выплат, производимых в пользу физических лиц: заработная плата, гарантии, компенсации, прочие. Особенности порядка налогообложения каждого вида выплат. Начисление на выплаты в пользу физических лиц страховых взносов во внебюджетные фонды. 2. Порядок исчисления среднего заработка в 2010 году. Определение расчетного периода. Пе-риоды, исключаемые из расчетного. Выплаты, включаемые в расчет среднего заработка. Порядок учета премий. Корректировка среднего заработка в случае повышения тарифных ставок и окла-дов. 3. Пособия за счет средств ФСС РФ в 2010 году. Особенности исчисления среднего заработка: определение расчетного периода; выплаты, принимаемые в расчет. Алгоритмы исчисления посо-бий по временной нетрудоспособности, по беременности и родам, по уходу за ребенком. Порядок назначения и выплаты пособий. 4. Гарантии: виды и порядок расчетов. Выплаты при направлении работника в командировку Расчеты с работником при увольнении. 5. Компенсации: виды, порядок предоставления, расчеты. 6. Ответы на вопросы слушателей. Cтоимоcть: 8968 руб. Информацию можно получить по телефонам: 8 Моск. код:*4-4*5/3.2--6/6 или 445/39-68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3256 bytes Desc: not available URL: From eugen at leitl.org Sun Jan 23 02:04:08 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 23 Jan 2011 11:04:08 +0100 Subject: [p2p-hackers] How Piracy Will Hyperlocalize with Mesh Networks Message-ID: <20110123100408.GT23560@leitl.org> ----- Forwarded message from Michael Blizek ----- From eugen at leitl.org Sun Jan 23 02:27:32 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 23 Jan 2011 11:27:32 +0100 Subject: [P2P-F] Bitcoin @ EFF Message-ID: <20110123102732.GY23560@leitl.org> ----- Forwarded message from magius ----- From rushkoff at gmail.com Sun Jan 23 09:16:31 2011 From: rushkoff at gmail.com (Douglas Rushkoff) Date: Sun, 23 Jan 2011 12:16:31 -0500 Subject: [P2P-F] Bitcoin @ EFF Message-ID: Fascinating. Sounds like he got the same attack that Paypal did in the early days, when the banks went after the company for earning its profit on the "float." The thing that could bring Bitcoin to its knees in the US is the tax law. Ultimately, the network operator would be responsible for tax reporting when people are making exchanges of value and not using cash. I found all this out while working with the Superfluid guys. If I administrate trades for you like ebay does, in US currency, I'm not obligated to produce 1099's. If I don't do the value exchange in dollars, I must report the dollar equivalency to the IRS. This law has yet to be enforced, but it surely would be if any of these currencies scaled up. On Jan 23, 2011, at 11:59 AM, magius wrote: > Bitcoin and Opencoin are "sons" of David Chaum's Digicash both. Chaum > is one of the most important cryptographers and freedom fighters in > the world and invented in the eighties the first digital cash, that > was refused, attacked and destroyed by credit card companies > societies, that instead wanted to propagate a model not based on > anonimity. The big difference between them is that Bitcoin is a > complete currency system instead Opencoin is the system to make a > currency (a digital mint). Bitcoin you need to use as-it-is, with > Opencoin instead you can create your own currency system. > > _______________________________________________ > P2P Foundation - Mailing list > http://www.p2pfoundation.net > https://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation _______________________________________________ P2P Foundation - Mailing list http://www.p2pfoundation.net https://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From fbiondi at centrotecman.com Sun Jan 23 03:17:49 2011 From: fbiondi at centrotecman.com (=?koi8-r?B?6c7XxdPUycPJz87O2co=?=) Date: Sun, 23 Jan 2011 14:17:49 +0300 Subject: =?koi8-r?B?9/kg1dfF0sXO2Swg3tTPIPfBzSDO1dbFziDJzcXOzs8gyc7XxdPUycPJ?= =?koi8-r?B?z87O2cog0NLPxcvUPw==?= Message-ID: <000d01cbbaef$2b4e8f70$6400a8c0@fbiondi> Тема: Бизнес план, тэо, инвестиционный проект √ разработка и анализ. Вся информация по тел: +7 Московский код: 792_2|/22 **** ЧЧ5ЧО5З Дата проведения семинара: 31 Января - 01 Февраля. Целu Уч. курса: Изучение и применение информации для оценки проекта и его разработки. Типы инвестиционных проектов и их особенности, а также их принципиальное отличие от бизнес планов, различные методы и инструментарий для разработки и оценки. Основные критерии принятия решения по инвестиционному проекту. Практическое занятие с участниками, выяснение и обучение таким методам как: 1.Нестандартные проекты и особенности их расчета. 2.Подготовить исходную информацию для оценки проекта: определение доходной и затратной частей, их классификация по статьям для: * новых компаний. * функционирующего предприятия. 4.Определить состав инвестиционных затрат. 5.Определение и построение источников финансирования: кредиты, нераспределенная прибыль, инвестиционный капитал. 6.Организовать управление формированием прибыли от продаж товаров (работ, услуг) 7.Доходность проекта, анализ, показатели, которые определяют критерии рентабельности и прибыли. Финансовые результаты проекта. 8.Провести структурный анализ отчета о прибылях и убытках, операционный анализ и управление затратами + классификация затрат. 9.Инфляция и ее влияние на расчеты и результаты проекта. 10.Понятие Критерия Эффективности при построении инвестиционной программы. Анализ целесообразности. 11.Разработать отчеты для дальнейшей консолидации между головным предприятием и филиалами и прочими подразделениям, входящим в структуру предприятия: * Понять принцип консолидации отчетности для групп компаний (холдингов); * Подготовить последовательность операций при консолидации; * Понять и подготовить анализ консолидированной отчетности; 12.ДИСКОНТИРОВАНИЕ √ критерий разногласия! Вопрос применения и понятия метода. 13.Понять и самостоятельно разработать структуру инвестиционного проекта и изучить правила построения анализа для данного проекта. 14.Разработать процесс утверждения (принятия) инвестиционного проекта. 15.Маркетинговая информация, как ее подготовить? 16.Грамотно подготовить текстовую часть документа. 17.Подготовка финансового плана: * Объем и требования к расчетам; * Объем расчетов и описание в финансовом плане; * Самостоятельная подготовка электронных таблиц; * Описание расчетов в финансовом плане, необходимый объем; * Рассмотрение финансовых показателей и их корректировка с учетом выбранного интервала расчетов; * Анализ финансовых показателей деятельности предприятия; * Определение уровня безубыточности, запаса финансовой прочности проекта; * Использование полученных данных. Каждому участнику для дальнейшей успешной работы и внедрения методики планирования на предприятии предоставляются бесплатно следующие методические материалы и программы: * Материал методический: печатный для самостоятельной разработки бизнес планов, ТЭО, инвестиционных проектов. * На CD диске электронную версию метод. материала для разработки финансовых проектов. * Книга - ╚О Методах разработки бизнес плана╩. Книга написана как - практическое руководство. В комплект с книгой прилагается специализированная программа по разработке технико-экономического обоснования. (Продукт создан для экспресс подготовки экономической документации. Возможности программы это быстрая, качественная, профессиональная подготовка эконом. документации для представления партнерам, инвесторам, кредитодателям и т.п..).. Вся информация по тел: +7 (код Москвы) 7.9/2.2.1/2.2 и ЧЧ5_32/66 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6677 bytes Desc: not available URL: From gmagius at gmail.com Sun Jan 23 08:59:29 2011 From: gmagius at gmail.com (magius) Date: Sun, 23 Jan 2011 17:59:29 +0100 Subject: [P2P-F] Bitcoin @ EFF Message-ID: Bitcoin and Opencoin are "sons" of David Chaum's Digicash both. Chaum is one of the most important cryptographers and freedom fighters in the world and invented in the eighties the first digital cash, that was refused, attacked and destroyed by credit card companies societies, that instead wanted to propagate a model not based on anonimity. The big difference between them is that Bitcoin is a complete currency system instead Opencoin is the system to make a currency (a digital mint). Bitcoin you need to use as-it-is, with Opencoin instead you can create your own currency system. _______________________________________________ P2P Foundation - Mailing list http://www.p2pfoundation.net https://lists.ourproject.org/cgi-bin/mailman/listinfo/p2p-foundation ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sun Jan 23 10:06:07 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 23 Jan 2011 19:06:07 +0100 Subject: [P2P-F] Bitcoin @ EFF Message-ID: <20110123180607.GP23560@leitl.org> ----- Forwarded message from magius ----- From eugen at leitl.org Sun Jan 23 10:06:30 2011 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 23 Jan 2011 19:06:30 +0100 Subject: [P2P-F] Bitcoin @ EFF Message-ID: <20110123180630.GQ23560@leitl.org> ----- Forwarded message from Douglas Rushkoff ----- From camera_lumina at hotmail.com Sun Jan 23 17:50:47 2011 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sun, 23 Jan 2011 20:50:47 -0500 Subject: Alleged Wikileaks Use of P2P to Siphon Documents In-Reply-To: References: <20110120214357.GR23560@leitl.org>,<20110120150527.GT23560@leitl.org>,,,,<20110120214357.GR23560@leitl.org>, Message-ID: I noticed that certain descriptions of the Wikileaks extraction of P2P files tried to link this form of extraction to "hacking", particularly as some of those files were extracted via surreptitious P2P. Of course, this was an attempt to throw up some dust and create a plausible scenario under which Wikileaks could be accused of actively obtaining the files. (I've seen some other attempts to suggest that Wikileaks paid Manning for the files). Meanwhile, I haven't yet seen an indictment or anything here in the US. Did I miss something? At this juncture, is it possible that they just can't find anything convincing enough to indict Assange or Wikileaks with? I still say hooray for Wikileaks, hooray for Assange. Did he do it for his own personal glory? Hell yeah, but that just further proves he's the Rock Star(TM) of the Cypherpunks. -TD > Date: Thu, 20 Jan 2011 17:53:15 -0500 > To: coderman at gmail.com; cypherpunks at al-qaeda.net > From: jya at pipeline.com > Subject: Re: Alleged Wikileaks Use of P2P to Siphon Documents > > It may be that the cybersec wizard encountered a TLA sting being > run on P2P -- those exact six IP addresses among tens of thousands, > each wearing a sign that says Wikileaks right here, log us. > > Someone writes that the USG has been seeding P2P with bogus files > for quite a while in order to trace their arranged discovery and > appearance elsewhere. Following the lead and using the means > and methoids of the copyright pig kissers. > > To be sure that is what the USG and its contractors would claim to > cover their ineptitude. Meanwhile, using old style bribing, burgling, > paying lawyers and journalists and whistleblowers and hackers and > goofy soldiers to entrap would-be info liberators, then turning those > captured into pig kissers. > > No disrespect to pig kissers, they happily admit to doing whatever > is necessary to outwit professionals. From camera_lumina at hotmail.com Sun Jan 23 18:05:32 2011 From: camera_lumina at hotmail.com (Tyler Durden) Date: Sun, 23 Jan 2011 21:05:32 -0500 Subject: Question about (cypher)Twitter In-Reply-To: References: ,<1295075590.15872.5.camel@afterburner>,, Message-ID: > Are you thinking specifically about the request for info on Wikileaks > followers? If you just follow the public RSS of that twitter account > (assuming it is public) surely they don't have any info on you, > because you haven't had to join twitter to do that. I must admit, I > don't have much of an idea of how twitter handles that stuff, as I > haven't used it for a few years. > silky Well, say for instance you're in Iran or Tunisia. You want to keep up with where protests are occuring or where the JBTs have recently been seen. BUT, said authorities somehow obtain a list of subscribers to that Twitter feed and go chase them down. If the tweets can somehow get routed into a TOR-ish cloud and then pass through some service located therein, it could be made impossible for the authorities to find where those Tweets are going. Of course, as twitter is an American company, you could argue that in Iran they would not be able to get ahold of a such a list. But consider it possible (through various means) for them to obtain such a list. That list, then, becomes veritable gold insofar as it lets the authorities know who a large number of troublemakers are. (Of course, this could never happen in the US where civil liberties are so highly respected.) RSS is OK, better than nothing, but in many situations (ie, with dumbphones or where conditions are rapidly changing), a pull model has some distinct disadvantages to twitter's push model. Or am I missing something? Seems both real time as well as anonymity are hard to do in this context. (I'm assuming that if a twitfeed is sent to an RSS-iator, then authorities could see that and then find who is subscribing to the RSS.) -TD From 0-slave-0 at excite.it Sun Jan 23 15:40:13 2011 From: 0-slave-0 at excite.it (Purchase -rX~) Date: Mon, 24 Jan 2011 02:40:13 +0300 Subject: Try Cialis Today Message-ID: <0815685648.HRDP8QZI653309@hgmqeaodo.kojgtv.ua> Low Priced Excitement for both the man and the woman! Dozens of Products http://www.buzzroll.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 284 bytes Desc: not available URL: From biosterol309841 at skypool.ru Sun Jan 23 16:23:42 2011 From: biosterol309841 at skypool.ru (=?koi8-r?B?4sXM2cUg88jFzdk=?=) Date: Mon, 24 Jan 2011 08:23:42 +0800 Subject: =?koi8-r?B?78LV3sXOycUt88HOy9Qt8MXUxdLC1dLHOiDMxcfBzNjOwdEgwczY1MXS?= =?koi8-r?B?zsHUydfBIM/CzsHMyd7J18HOycA=?= Message-ID: Место проведения: г.Санкт-Петербург 2 дня O7-08 Февраля +7 (код Москвы) 792-2|.22 и Ч.Ч5/Ч/О-95 НАЛОГОВОЕ ПЛАНИРОВАНИЕ В УСЛОВИЯХ КРИЗИСА: КАК ЖИТЬ БЕЗ ОБНАЛИЧКИ И ФИРМ-ОДНОДНЕВОК И НЕ РАЗОРИТЬСЯ Цель: помочь компаниям, применяющим "серые" и "черные" схемы оптимизации налогов, уйти от них, и при этом не разориться, не уступить конкурентам, не уйти с рынка. Найти законные альтернативы таким схемам, платить налоги, но не переплачивать – вот основная идея налогового планирования без "помоек" и "черного нала". Программа мероприятия: 1 день. Общие положения и налоги с доходов физических лиц: методы оптимизации расходов на выплату белой зарплаты, уменьшаем страховые взносы. 1. Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.). Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2. Обналичивание. Для чего используется: * "черная" зарплата и доходы собственников бизнеса; * оплата расходов, которые не хочется проводить официально; * незаконная деятельность (взятки, откаты…); 3. Законные альтернативы обналичиванию (только для законных целей!): * ИП на ЕНВД или УСН (в т.ч. на патенте) – как использовать. Договоры с ИП: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр., * дарение физлицом наличных денег, заработанных в качестве ИП – легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п. Выбор банков, * Аутсорсинг и аутстаффинг (предоставление персонала), в т.ч. использование филиалов общественных организаций инвалидов и их фирм. Центры обслуживания (Кадровые центры). Когда применение аутстаффинга может быть оправдано. Рекомендации по выбору договорных форм для разных категорий персонала. Риски, нюансы, практика внедрения и новая судебная практика. Частые ошибки, * дивиденды от субъектов спецрежимов – замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"), офшоре, * выплата процентов, * выплата компенсаций задержку зарплаты, использование личного имущества и др., * аренда имущества у физлиц или закупка у них ТМЦ, * платежи от компаний-нерезидентов на корпоративные (офшорные) или личные пластиковые карты иностранных банков. Основания - зарплата, гонорары и иные легальные доходы от нерезидента. Предоставление от нерезидента высшего управленческого персонала, использование в строительстве; * суточные, * зарплата в большом размере – нулевая ставка страховых взносов; * в каком случае выплата зарплаты на спецрежимах сохраняет свою актуальность; * перевод расходов в безналичную форму. Представительские расходы. Расчеты эффективности по рассмотренным вариантам. 4. Условия применения всех налоговых схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен. Отсутствие "явных признаков налоговой схемы". Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5. Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 6. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 2 день. Альтернативные схемы в противовес однодневкам ,"черным", "серым" схемам для оптимизации налогов (НДС, Налог на прибыль) 7. Однодневки. Для чего используются: * псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; * "серый импорт"; * "серая конвертация"; * незаконная деятельность. 8. "Серые" (полулегальные) альтернативы однодневкам: как нельзя "оптимизировать"! Фирмы-"прокладки", контактирующие с недобросовестными налогоплательщиками ("белая" - "серая" - "черная" фирмы). 9. Законные альтернативы однодневкам (только для законных целей!). "Белые" схемы планирования налога на прибыль и НДС. Низконалоговые субъекты: * субъекты специальных налоговых режимов – ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе налогообложения, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Нюансы и цели применения. Принципиальная невозможность экономии НДС "белыми" схемами и случаи, когда это все же возможно. Выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС". Использование ИП на ЕНВД с уплатой символического налога (маленький торговый зал, торговое место, развозная торговля). Нюансы. Ограничение использования: покупатели, не нуждающиеся в вычете НДС. Риски, связанные определением розничной торговли по ГК. Экономия НДС в производстве, выполнении работ, оказании услуг через разделение финансовых потоков "с НДС" и "без НДС". Способы переноса налогооблагаемой базы по налогу на прибыль на низконалоговых субъектов. Трансфертное ценообразование. "Затратные механизмы": * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. Простое товарищество субъектов упрощенной системы налогообложения, в т.ч. из "низконалоговых" регионов. Нужно или нет платить НДС? Перенос прибыли товарищества на низконалоговых субъектов (УСН 6%, ЕНВД, офшор, физлицо и др.). Отсрочка уплаты налога при непередаче прибыли на счета товарищей. Возможен ли обход с помощью простого товарищества правил налогового учета (гл. 25 НК) и ограничений гл. 26.2 НК РФ в части перечня затрат? Иностранные низконалоговые компании. Их использование при проведении внутрироссийских операций для оптимизации налога на прибыль: традиционные (торговля, проценты, дивиденды, роялти, услуги, и т.п.) и нетрадиционные схемы (простое товарищество, работа по агентским или комиссионным договорам с нерезидентами). Выбор низконалоговых юрисдикций. 10. Законные альтернативы "серому импорту" и "серой конвертации": * прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; * выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 11. Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. 12. Как можно и как нельзя оптимизировать налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменения. Обзор изменений налогового законодательства в 2011 г., как они повлияли на налоговые схемы. Ответы на вопросы. По желанию и возможности – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Стоимость участия в семинаре 14 900 рублей Вся информация по тел: Московский код; 7/9*2/2_|*2/2 **** 7/9.2_2.1_2.2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12032 bytes Desc: not available URL: From eugen at leitl.org Sun Jan 23 23:40:22 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 24 Jan 2011 08:40:22 +0100 Subject: Alleged Wikileaks Use of P2P to Siphon Documents In-Reply-To: References: Message-ID: <20110124074022.GT23560@leitl.org> On Sun, Jan 23, 2011 at 08:50:47PM -0500, Tyler Durden wrote: > Meanwhile, I haven't yet seen an indictment or anything here in the US. Did I > miss something? At this juncture, is it possible that they just can't find > anything convincing enough to indict Assange or Wikileaks with? In order to be able to maintain a straight face they'll probably fabricate something in Australia (the axis UKUSAOz works very well in intelligence, so why not elsewhere). The Swedes and U.K. are doing a fine job of keeping Julian pinned, until New! Dramatic! accusations come forth. Sooner or later the public attention will wane, at which point you can whisk him away and torture at leisure. > I still say hooray for Wikileaks, hooray for Assange. Did he do it for his own > personal glory? Hell yeah, but that just further proves he's the Rock Star(TM) > of the Cypherpunks. -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From nd at streamline.ru Sun Jan 23 17:01:44 2011 From: nd at streamline.ru (=?koi8-r?B?4tXIx8HM1MXS1SDLwcsg1crUySDP1CDu5PM=?=) Date: Mon, 24 Jan 2011 09:01:44 +0800 Subject: =?koi8-r?B?69XS0yDXIPDJ1MXSxTog7uTzLiD1yM/EIM/UINDSydrOwc7J0SDOwczP?= =?koi8-r?B?x8/Xz8og19nHz8TZIM7Fz8LP087P18HOzs/K?= Message-ID: 09 Февраля Тема: ПРИЗНАКИ НЕДОБРОСОВЕСТНЫХ ПОСТАВЩИКОВ. СПОСОБЫ ПРОТИВОДЕЙСТВИЯ ПРИДИРКАМ НАЛОГОВОЙ И СНИЖЕНИЕ НАЛОГОВОЙ НАГРУЗКИ ПО НДС +7 Московский код: ЧЧ_539/68 <> Ч45_Ч0_95 Цель обучения: Обучающий курс даст слушателям ответ на то, как правильно заключать договоры и что делать, если он ошибся, но при этом хотел бы сохранить свои налоговые обязательства без изменений. Слушатели будут точно знать, что и как отвечать налоговой инспекции в случае проверки таких контрагентов. Поймут, как можно уйти от НДС без последствий. В период кризисных явлений в экономике, и как следствие острой нужды государства в пополнении бюджета, ФНС ужесточила требования к проверкам - повысила границу результативности проверок до миллиона рублей (приказ ФНС №409), а также предложила идти простым путем – находить среди контрагентов налогоплательщика компании, которые подпадают под признаки недобросовестных и лишать налогоплательщика налоговых льгот полученных в результате взаимодействия с такими организациями (Приказ ФНС России №ММ-3-2/467@). Практика свидетельствует, что практически все проверки налогоплательщиков применяющих ОСН затрагивают данный вопрос с негативными для налогоплательщика последствиями. При этом налоговый орган исключает из состава затрат НП и вычетов по НДС суммы по контрагентам, которые, например, просто не отвечают на запрос в рамках встречных проверок, либо не заплатили налоги и т.п. Подчас очень тяжело отстоять свою правоту в спорах с налоговым органом. Курс посвящен вопросу защиты налогоплательщика, призван помочь ему как не погрязнуть в тотальных проверках своих контрагентов, так и впоследствии защитить свои права по взаимоотношениям я такими компаниями. На Обучении не только будут показаны способы противодействия придиркам налоговой, но и будут разобраны способы заключения договоров, которые в принципе исключают возможность признания лица недобросовестным, а также законные способы снижение налоговой нагрузки по НДС в том случае, если налогоплательщик в этом заинтересован. Программа: 1. Методические указания Минфина о назначении выездных налоговых проверок (включая Приказ ФНС от 22.09.10 N ММB-7-2/461@, Приказ УФНС по г. Москве от 1 сентября 2008 г №409 и др.) 2. Методические указания Минфина по поиску недобросовестных контрагентов. Рассмотрение мер, которые планирует принять Минфин, Минюст по борьбе с однодневками. 3. Основания признания налоговой выгоды необоснованной (на основании судебной практики, писем Минфина, практики проверок). 4. Что необходимо сделать, чтобы проявить разумную осмотрительность. Какие документы и какую информацию о контрагенте необходимо собрать. 5. Как защититься от претензий налогового органа о том, что контрагент: * не платит налоги и не сдает отчетность; * не отвечает на встречные проверки; * не находиться по месту регистрации, либо зарегистрирован по адресу массовой регистрации; * директор БОМЖ, ничего не подписывал, его подпись подделали и т.п. * директор является "массовым", в отношении руководителя проводятся розыскные мероприятия; * проведенный осмотр показал, что компания не могла отгрузить товар с адреса, указанного в накладной, счете-фактуре; * коды ОКВЭД контрагента не позволяют ему произвести действия, которые он якобы произвел по отношению к налогоплательщику (не может выполнять работы, поставлять товар и т.п., так как создан для иных целей); * иные претензии. 6. Анализ предмета доказывания по спорам о получении необоснованной налоговой выгоды. Установление размера требований по подобным делам. Взыскание всех ранее заявленных вычетов и расходов как нарушение принципа соразмерности и справедливости. Анализ аналогичной практики Европейского Суда. 7. Разбор основных ошибок допускаемых налоговыми органами в процессе доказывания получение налоговый выгоды (встречные проверки реально не проводятся, а данные берется из компьютерной системы учета, вместо допросов проводиться опрос, вместо экспертизы получаются заключения специалиста и т.п.). Как использовать ошибки (подробно). 8. Создание преюдиции для доказывания реальности сделки. 9. Способ ухода от признания налоговой выгоды необоснованной при заключении договоров с поставщиками при помощи посредника. Как построить договор, чтобы претензии по поставщикам нельзя было предъявить. 10. Уход от признания налоговой выгоды необоснованной путем особого способа заключения договоров. 11. Уход от уплаты НДС с наценки путем: * заключения договора с дополнительной выгодой; * включение условий о неустойки; * использование простого товарищества. 12. Кто отвечает за работу с недобросовестными контрагентами (директор или бухгалтер) и в какой части. Рассмотрение основных законодательных инициатив и принятых в последнее время законов, направленных на борьбу с "однодневками". 13. Потеря документов по недобросовестным поставщикам. Налоговые последствия. Указания Минфина по привлечению к ответственности в таком случае. Способ защиты от налоговых претензий. Является ли потеря документов защитой от претензий правоохранительных органов. 14. Анализ возможности рассмотрения любого налогового спора в Арбитражном суде г. Москвы, как способ обойти негативную практику конкретного региона. 15. Изменение практики компенсации судебных издержек. 16. Ответы на индивидуальные вопросы. Cтоимоcть: 7900 руб. За более подробной информацuей обpащайтеcь по тел: +7 Московский код: 7Ч2-9l.98 \\\/// ЧЧ5Ч053 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7059 bytes Desc: not available URL: From measl at mfn.org Mon Jan 24 16:00:08 2011 From: measl at mfn.org (J.A. Terranson) Date: Mon, 24 Jan 2011 18:00:08 -0600 (CST) Subject: [RAISETHEFIST] Corporations as PersonHoods or RobinHoods? (fwd) Message-ID: ---------- Forwarded message ---------- Date: Mon, 24 Jan 2011 14:10:34 -0800 From: "Banuelos, Max" Reply-To: raisethefist at lists.riseup.net To: raisethefist at lists.riseup.net Subject: [RAISETHEFIST] Corporations as PersonHoods or RobinHoods? It's unbelievable that in the united states colleges and university students and people are taught this garbage, A Corporate Soul, untouchable by the hand of any creation or creator, above the divine and any citizen. A plant has more respect and more logical right to exist as opposed to corporations 'whose' claim is above anybody, anything, and everything. The result......borrowed time. ---------------- Resolution Calling to Amend the Constitution Banning Corporate Personhood Introduced in Vermont The Image of Corporations on Nature. Any Questions? On the anniversary of the Citizens United decision, Vermont politicians are moving to deny corporations the rights that humans enjoy. By Christopher Ketcham January 22, 2011 "AlterNet " -- - A year ago today, the Supreme Court issued its bizarre Citizens United decision, allowing unlimited corporate spending in elections as a form of "free speech" for the corporate "person." Justice John Paul Stevens, writing for the dissent, had the task of recalling the majority to planet earth and basic common sense. "Corporations have no consciences, no beliefs, no feelings, no thoughts, no desires," wrote Stevens. "Corporations help structure and facilitate the activities of human beings, to be sure, and their 'personhood' often serves as a useful legal fiction. But they are not themselves members of 'We the People' by whom and for whom our Constitution was established." Fortunately, movements are afoot to reverse a century of accumulated powers and protections granted to corporations by wacky judicial decisions. In Vermont, state senator Virginia Lyons on Friday presented an anti-corporate personhood resolution for passage in the Vermont legislature. The resolution, the first of its kind, proposes "an amendment to the United States Constitution ... which provides that corporations are not persons under the laws of the United States." Sources in the state house say it has a good chance of passing. This same body of lawmakers, after all, once voted to impeach George W. Bush, and is known for its anti-corporate legislation. Last year the Vermont senate became the first state legislature to weigh in on the future of a nuclear power plant, voting to shut down a poison-leeching plant run by Entergy Inc. Lyons' Senate voted 26-4 to do it, demonstrating the level of political will of the state's politicians to stand up to corporate power. The language in the Lyons resolution is unabashed. "The profits and institutional survival of large corporations are often in direct conflict with the essential needs and rights of human beings," it states, noting that corporations "have used their so-called rights to successfully seek the judicial reversal of democratically enacted laws." Thus the unfolding of the obvious: "democratically elected governments" are rendered "ineffective in protecting their citizens against corporate harm to the environment, health, workers, independent business, and local and regional economies." The resolution goes on to note that "large corporations own most of America's mass media and employ those media to loudly express the corporate political agenda and to convince Americans that the primary role of human beings is that of consumer rather than sovereign citizens with democratic rights and responsibilities." Denouncing this situation as an "intolerable societal reality," the document concludes that the "only way" toward a solution is the amendment of the Constitution "to define persons as human beings." Constitutional lawyer David Cobb, the 2004 Green Party presidential candidate, recently traveled to Vermont to help draft the resolution. Cobb says it is an historic document. "This is the first state to introduce at the legislative level a statement of principles that corporations are not persons and do not have constitutional rights," he told AlterNet. "This is how a movement gets started. It's the beginning of a revolutionary action completely and totally within the legal framework." Such an amendment would be the 28th time we have corrected our founding document to reflect political reality and social change. In other words, we've done it 27 times before in answer to the call of history, and we can do it again. There is a groundswell of support: 76 percent of Americans, according to a recent ABC News poll, said they opposed the Citizens United decision. The Total Weirdness of Corporate Personhood The corporate person is the product of some plainly weird metaphysics. This astonishing fictional "person," accorded all the rights of a human, can split off pieces of itself to form new fictional persons, can marry many other similar persons in a process called a merger, is immortal, can change its name and identity overnight, and can aggregate gigantic streams of capital with which it somehow has the right to speak. Strangely enough, the corporate person, who has neither soul nor body, is at the same time owned by many other persons called shareholders who buy and sell its parts every day -- it is owned, in fact, much the way a slave is owned. Additionally, the many-limbed, mercurial, shape-changing god-person-as-chattel can connive to murder wretched fleshy mortal persons and not be hanged by the neck or electrocuted in a chair or go to jail for life as punishment. Instead the corporate person pays out a paltry sum and goes about his or her blithe business as if no murder was committed, no crime accomplished. The corporate person can shut down whole communities by driving out business, can spread cancers in the air and water, can destroy fisheries or lay waste to forests, and do all of this with a degree of impunity provided under the vaunted protections of the Bill of Rights. The best-known and most insidious of these rights is that which allows the corporation under the First Amendment to speak freely using money -- yet another twist of metaphysics masquerading as law, and one that has not gone unnoticed by the highest jurists in the land. The "useful legal fictions," launched into society as creatures of commerce and ostensibly at the beck and call of their creators, have freed themselves to wreak havoc on the people they were designed to help. Mere humans are arrayed against a dangerous automaton army, the army of the fictional corporate super-persons that deploy power with real-world consequences. If corporate hegemony is rightly understood as the overarching threat to world democracy today -- the threat from which all other threats derive when governments stand captured by corporatocracies -- then it is the absurdist legality of corporate personhood that serves as the functional lever of that hegemony. In this epochal battle for the future of planet earth, the humans against the corporations, the survival of the humans will depend on a dramatic legal assault, with nothing less than the murder of corporate personhood as the goal. Christopher Ketcham has written for Vanity Fair, Harper's, the Nation, Mother Jones, and many other publications. He can be contacted at cketcham99 at mindspring.com. http://www.informationclearinghouse.info/article27327.htm ----------------------------------------------------------- ))) Mitakuye Oyasin - Panche Be - En Lakech - Itzea ((( [demime 1.01d removed an attachment of type IMAGE/PNG which had a NAME of image003.png] From schristialr at jackriceinsurance.com Tue Jan 25 01:53:21 2011 From: schristialr at jackriceinsurance.com (Sona Christia) Date: Tue, 25 Jan 2011 02:53:21 -0700 Subject: Watches Replica - Explore 5000+ Watches. Save on Watches Replicas! Message-ID: <58c87n97z12-25738409-659y7z36@bpvnnipkzi> Watches Replica Explore 5000+ Watches. Save on Watches Replicas! http://topwatchchase.ru From c.cristinakw at bungi.com Tue Jan 25 03:40:13 2011 From: c.cristinakw at bungi.com (Cherie Cristina) Date: Tue, 25 Jan 2011 04:40:13 -0700 Subject: Buy Vicodin Online Without Prescription - Cheap VICODIN Message-ID: <4d3eb69d.559c6090@bungi.com> Buy Vicodin Online Without Prescription - Cheap VICODIN Order VICODIN Online - Best Price! http://medrx-solutions.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 292 bytes Desc: not available URL: From freefinder at sideko.ru Mon Jan 24 23:30:31 2011 From: freefinder at sideko.ru (Glenda Dickinson) Date: Tue, 25 Jan 2011 10:30:31 +0300 Subject: =?koi8-r?B?08XS1MnGycvB1CDn7/P0IPI=?= Message-ID: <847287815.01671531158043@sideko.ru> СЕРТИФИКАЦИЯ ПРОДУКЦИИ: * нефтегазохимическая и газоиспользующая; * машиностроительная; * электротехническая; * приборостроительная; * радиотехническая; * парфюмерия и косметика; * инструменты и строительные материалы; * оборудование для пищевой промышленности; * бытовая техника; * мебель; * одежда и обувь; и другие виды продукции. Более 12 лет на рынке, работаем профессионально, быстро, качественно. Телефон: (495) 671-70-75, 8-926-659-86-74, ICQ 412 112 161 8-915-365-04-33, ICQ 6222 388 27 Email: certification-gost-r at yandex.ru From mazziefo at jacobsenholz.com Tue Jan 25 11:02:58 2011 From: mazziefo at jacobsenholz.com (Marilu Azzie) Date: Tue, 25 Jan 2011 12:02:58 -0700 Subject: buy cheap generic viagra online to cure impotence. Generic Viagra is an alternative to Brand Viagra. Message-ID: <4d3f1e62.adbbabc2@jacobsenholz.com> Generic Viagra - Buy Generic Viagra Online, Cheap Viagra No Prescription Buy Cheap online Generic Viagra. Medication for people having erectile dysfunction. Buy cheap generic viagra online to cure impotence.Generic Viagra is an alternative to Brand Viagra. http://lensrxtabletspharmacy.ru From billdirk at odezia.ru Tue Jan 25 00:02:57 2011 From: billdirk at odezia.ru (Ava Durham) Date: Tue, 25 Jan 2011 13:32:57 +0530 Subject: =?koi8-r?B?8sXHydPU0sHDydEg0NLFxNDSydHUycogKPfTxSDSxcfJz87ZIPLmKQ==?= Message-ID: <000d01cbbc66$47537910$6400a8c0@billdirk> ЛИКВИДАЦИЯ ПРЕДПРИЯТИЙ без проверок (Все регионы России) Вариант ликвидации компании, который предлагаем мы - перевод предприятия на наших учредителей с заменой генерального директора на иностранную управляющую компанию, либо на иностранного директора. Перерегистрация ООО - 2 900 рублей Подготовка документов в течение 1 рабочего дня Возможна сдача документов в ГНИ-46 без директора +7(495) 211-17-11 - круглосуточно / без выходных Полный комплекс услуг по регистрации и перерегистрации предприятий Юридический адрес - от 10 000 рублей 1. Регистрация ООО √ от 2 900 рублей 2. Регистрация Индивидуального предпринимателя - 1 500 рублей 3. Регистрация ОАО, ЗАО - 15 000 рублей 4. Аккредитация представительств √ от 6 000 рублей 5. Регистрация изменений (без внесения изменений в УД) √ от 2 900 рублей Регистрация оффшоров Ликвидация ООО и ЗАО Юридические услуги, АРБИТРАЖ +7(495) 211-17-11 - круглосуточно / без выходных ПЕРЕЧЕНЬ ДОКУМЕНТОВ И ИНФОРМАЦИЯ НЕОБХОДИМАЯ ДЛЯ ПЕРЕРЕГИСТРАЦИИ ООО: Предоставить простые (не заверенные) ксерокопии (можно выслать по факсу или электронной почте) - устав + все изменения к ним (если были); - свидетельство о постановке на налоговый учет (ИНН); - справка о присвоении статистических кодов (ОКВЭД); - протоколы (решения) о создании и назначении исполнительных органов (Директора); - паспортные данные участников и директора; -выписка из ЕГРЮЛ (для подготовки документов нам можно предоставить старую, но актуальную выписку, а для заверения Заявления у нотариуса, необходимо предоставить выписку сроком не более месяца v можете получить сами или заказать получение у нас (получение выписки за сутки 1500 рублей) From foxylove-89 at turbopar.ru Tue Jan 25 06:09:26 2011 From: foxylove-89 at turbopar.ru (=?koi8-r?B?3sXSztnFIPPIxc3Z?=) Date: Tue, 25 Jan 2011 17:09:26 +0300 Subject: =?koi8-r?B?79POz9fOwdEg1MXNwSDLwcsgz8LPytTJ09ggwsXaIM/CzsHMyd7LyQ==?= Message-ID: <000d01cbbc99$798f1730$6400a8c0@foxylove-89> 28 января 2011г. 8 Моск. код: 742*9*l*9/8 ; 7922|*22 Налоговое планирование: как жить без обналички и фирм-однодневок и не разориться, уход от "черных" и "серых" схем, оптимизация налогов с использованием законных альтернативных схем 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности┘); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) √ как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: \Моск. код/ 4-45_Ч_О*95 <<<>>> ЧЧ5-З968 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3982 bytes Desc: not available URL: From 0-501053569info at fijalkowo.pl Tue Jan 25 05:31:40 2011 From: 0-501053569info at fijalkowo.pl (~Order-Cialis~) Date: Tue, 25 Jan 2011 19:01:40 +0530 Subject: Feel like you're under a pile of bricks? We carry Xa_ax and Valium Message-ID: <5463713169.HQLDAN0M277372@qimnxwlwdhnveo.qmeirwpji.info> Dont let your relationship become Stale, keep it exciting! We Care about your Health http://www.treatgroan.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 291 bytes Desc: not available URL: From leeanneinezpa at amkor.com Tue Jan 25 18:07:51 2011 From: leeanneinezpa at amkor.com (Leeanne Inez) Date: Tue, 25 Jan 2011 19:07:51 -0700 Subject: buy generic viagra, levitra, cialis and other ed drugs. ... Message-ID: <25q27d83d91-27595559-480w8n38@enzaqfklwn> Buy Cialis Online at The Leading Generic Pharmacy | Buy Cialis Pills Buy generic cialis, generic viagra, generic levitra, soft tabs, generic propecia and many more ... Buy generic cialis, viagra, levitra and other ed drugs. ... http://pillprescriptiondrugstorerx.ru From evemelyndayv at ksb.com Tue Jan 25 19:38:47 2011 From: evemelyndayv at ksb.com (Eve Melynda) Date: Tue, 25 Jan 2011 20:38:47 -0700 Subject: lowest prices on the web, cheapest viagra, we accept visa and mastercard credit cards. Message-ID: <21d82d41i53-23831706-702n4o15@bzdacgpv> Cheapest viagra - LOWEST PRICES ON THE WEB, We Accept Visa and Mastercard Credit Cards. http://sleepingpillstabletspharmacy.ru From camillakathlenehb at lyondell.com Tue Jan 25 19:52:59 2011 From: camillakathlenehb at lyondell.com (Camilla Kathlene) Date: Tue, 25 Jan 2011 20:52:59 -0700 Subject: The BEST of the online pharmacies are recommended to enable you to buy Phentermine online at the lowest possible prices! Message-ID: <201101252053.CECDA7F66C2F653A42AC3@7llg503> :: PHENTERMINE :: Buy BRAND Phentermine online at $2.83/pill The BEST of the online pharmacy is recommended to enable you to buy Phentermine online at the lowest possible prices! Phentermine starting at $2.83 per pill. Order Here http://pillsrxonline.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 614 bytes Desc: not available URL: From bhubbard_qoksanao at smart-leasing.ru Tue Jan 25 08:51:31 2011 From: bhubbard_qoksanao at smart-leasing.ru (=?koi8-r?B?4tXIx8HM1MXSydE=?=) Date: Tue, 25 Jan 2011 22:21:31 +0530 Subject: =?koi8-r?B?68HLINfZ0dfJ1Ngg187F287Fx88gy8/O1NLBx8XO1MEtz8TOz8TOxdfL?= =?koi8-r?B?1Q==?= Message-ID: <000d01cbbcb0$1e3b2650$6400a8c0@bhubbard_qoksanao> 28 Января +7 (код Москвы) 4Ч/53*96*8 \\\/// 7*9.2.2.|.2.2 Налоговое планирование в условиях кризиса: как жить без обналички и фирм-однодневок и не разориться 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности┘); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) √ как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей Информацию можно получить по телефонам: +7 (код Москвы) ЧЧ5/32-66 ; 44.53.96.8 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4946 bytes Desc: not available URL: From bioreg at skypool.ru Tue Jan 25 17:41:13 2011 From: bioreg at skypool.ru (=?koi8-r?B?7sHMz8fP18/FINDMwc7J0s/Xwc7JxQ==?=) Date: Tue, 25 Jan 2011 22:41:13 -0300 Subject: =?koi8-r?B?78LV3sXOycUt88HOy9Qt8MXUxdLC1dLHOiDv087P187B0SDUxc3BIMvB?= =?koi8-r?B?yyDPws/K1MnT2CDCxdogz8LOwczJ3svJ?= Message-ID: <000d01cbbcfa$1d9f0dc0$6400a8c0@bioreg> Место проведения: г.Санкт-Петербург 2 дня Седьмое-восьмое февраля \Моск. код/ Ч45.32/66 <<<>>> 4Ч5-3/9/6.8 НАЛОГОВОЕ ПЛАНИРОВАНИЕ В УСЛОВИЯХ КРИЗИСА: КАК ЖИТЬ БЕЗ ОБНАЛИЧКИ И ФИРМ-ОДНОДНЕВОК И НЕ РАЗОРИТЬСЯ Цель: помочь компаниям, применяющим "серые" и "черные" схемы оптимизации налогов, уйти от них, и при этом не разориться, не уступить конкурентам, не уйти с рынка. Найти законные альтернативы таким схемам, платить налоги, но не переплачивать √ вот основная идея налогового планирования без "помоек" и "черного нала". Программа мероприятия: 1 день. Общие положения и налоги с доходов физических лиц: как выжить после увеличения страховых взносов 1. Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.). Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2. Обналичивание. Для чего используется: * "черная" зарплата и доходы собственников бизнеса; * оплата расходов, которые не хочется проводить официально; * незаконная деятельность (взятки, откаты┘); 3. Законные альтернативы обналичиванию (только для законных целей!): * ИП на ЕНВД или УСН (в т.ч. на патенте) √ как использовать. Договоры с ИП: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр., * дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п. Выбор банков, * Аутсорсинг и аутстаффинг (предоставление персонала), в тч. использование филиалов общественных организаций инвалидов и их фирм. Центры обслуживания (Кадровые центры). Когда применение аутстаффинга может быть оправдано. Рекомендации по выбору договорных форм для разных категорий персонала. Риски, нюансы, практика внедрения и новая судебная практика. Частые ошибки, * дивиденды от субъектов спецрежимов √ замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"), офшоре, * выплата процентов, * выплата компенсаций задержку зарплаты, использование личного имущества и др., * аренда имущества у физлиц или закупка у них ТМЦ, * платежи от компаний-нерезидентов на корпоративные (офшорные) или личные пластиковые карты иностранных банков. Основания - зарплата, гонорары и иные легальные доходы от нерезидента. Предоставление от нерезидента высшего управленческого персонала, использование в строительстве; * суточные, * зарплата в большом размере √ нулевая ставка страховых взносов; * в каком случае выплата зарплаты на спецрежимах сохраняет свою актуальность; * перевод расходов в безналичную форму. Представительские расходы. Расчеты эффективности по рассмотренным вариантам. 4. Условия применения всех налоговых схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен. Отсутствие "явных признаков налоговой схемы". Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5. Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 6. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 2 день. Затратные механизмы в налоговых схемах для оптимизации НДС и налога на прибыль Законные альтернативы "черным" "серым" схемам. 7. Однодневки. Для чего используются: * псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; * "серый импорт"; * "серая конвертация"; * незаконная деятельность. 8. "Серые" (полулегальные) альтернативы однодневкам: как нельзя "оптимизировать"! Фирмы-"прокладки", контактирующие с недобросовестными налогоплательщиками ("белая" - "серая" - "черная" фирмы). 9. Законные альтернативы однодневкам (только для законных целей!). "Белые" схемы планирования налога на прибыль и НДС. Низконалоговые субъекты: * субъекты специальных налоговых режимов √ ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе налогообложения, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Нюансы и цели применения. Принципиальная невозможность экономии НДС "белыми" схемами и случаи, когда это все же возможно. Выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС". Использование ИП на ЕНВД с уплатой символического налога (маленький торговый зал, торговое место, развозная торговля). Нюансы. Ограничение использования: покупатели, не нуждающиеся в вычете НДС. Риски, связанные определением розничной торговли по ГК. Экономия НДС в производстве, выполнении работ, оказании услуг через разделение финансовых потоков "с НДС" и "без НДС". Способы переноса налогооблагаемой базы по налогу на прибыль на низконалоговых субъектов. Трансфертное ценообразование. "Затратные механизмы": * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. Простое товарищество субъектов упрощенной системы налогообложения, в т.ч. из "низконалоговых" регионов. Нужно или нет платить НДС? Перенос прибыли товарищества на низконалоговых субъектов (УСН 6%, ЕНВД, офшор, физлицо и др.). Отсрочка уплаты налога при непередаче прибыли на счета товарищей. Возможен ли обход с помощью простого товарищества правил налогового учета (гл. 25 НК) и ограничений гл. 26.2 НК РФ в части перечня затрат? Иностранные низконалоговые компании. Их использование при проведении внутрироссийских операций для оптимизации налога на прибыль: традиционные (торговля, проценты, дивиденды, роялти, услуги, и т.п.) и нетрадиционные схемы (простое товарищество, работа по агентским или комиссионным договорам с нерезидентами). Выбор низконалоговых юрисдикций. 10. Законные альтернативы "серому импорту" и "серой конвертации": * прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; * выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 11. Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. 12. Как можно и как нельзя оптимизировать налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменения Обзор изменений налогового законодательства в 2011 г., как они повлияли на налоговые схемы. Ответы на вопросы. По желанию и возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Стоимость участия в семинаре 14 900 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: (код Москвы) ЧЧ5_3968 **** Ч4.5-_З2.66 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 11953 bytes Desc: not available URL: From y.mpeggieib at adolfo-toledo.com Wed Jan 26 00:49:47 2011 From: y.mpeggieib at adolfo-toledo.com (Yoshiko Peggie) Date: Wed, 26 Jan 2011 01:49:47 -0700 Subject: Rock Hard Erections - Get Harder and Longer Lasting Erections Naturally Message-ID: <62d74f68c75-63396320-927r4l24@avklulgivq> Rock Hard Erections - Get Harder and Longer Lasting Erections Naturally NEW! Best HERBAL SEX PILL - 17 X POTENT HERBS ALL IN 1 PILL! http://bigpenisdesign.ru From him-sale at uralprom.org Tue Jan 25 19:18:42 2011 From: him-sale at uralprom.org (Erica Church) Date: Wed, 26 Jan 2011 05:18:42 +0200 Subject: =?koi8-r?B?5MXbxdfZxSDTy8zBxNkg1yDtz9PL18UgySDwz8TNz9PLz9fYxQ==?= Message-ID: <8ECB873B15974D2A996E6D7002406118@pc77882200> Дешевле только даром. Хранение 10 р./сут. кв. м. при напольном хранении. 8 р./сут. за хранение европаллеты на стеллажах. Цены включают НДС. Склады теплые, капитальные. Охрана. Погрузка-разгрузка, комплектация Ваших заказов, доставка их по Москве и Подмосковью. тел. /925/ I8Ч^9I^57  Аркадий. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1002 bytes Desc: not available URL: From edrigram at edri.org Wed Jan 26 10:12:36 2011 From: edrigram at edri.org (EDRI-gram newsletter) Date: Wed, 26 Jan 2011 20:12:36 +0200 Subject: EDRi-gram newsletter - Number 9.2, 26 January 2011 Message-ID: ============================================================ EDRi-gram biweekly newsletter about digital civil rights in Europe Number 9.2, 26 January 2011 ============================================================ Contents ============================================================ 1. EDRi responds to data protection consultation 2. EC's leak describes blocking as "challenging", "costly" and ineffective 3. EU institutions want clarifications form Hungary on its media legislation 4. European Commission concerned over illegal eavesdropping in Bulgaria 5. Romanian NGOs demand stopping data retention in Europe 6. Spain: Right to be forgotten and Google 7. Sarkozy wants a "civilised" Internet 8. ENDitorial: EDRi publishes study on self-regulation and censorship 9. Recommended Action 10. Recommended Reading 11. Agenda 12. About ============================================================ 1. EDRi responds to data protection consultation ============================================================ Building on the analysis produced for the European Commission's initial data protection consultation in 2009, European Digital Rights has submitted its second round of comments on the review of the 1995 Data Protection Directive. One of EDRi's primary concerns with regard to the existing legal framework is the lack of predictability - due to vast differences in the way basic parts of the Directive are understood by Member States' authorities and courts as well as the powers and resources of national data protection authorities. This led EDRi to the conclusion that a directly applicable EU Regulation is needed, rather than the current situation, where 27 Member States have to implement a Directive into their national law, leading to these diverging implementations. Another core problem to address is the plummeting costs of data processing which causes more and more data to be collected and used. Such processing will lead to ever-greater risks being taken with personal data unless legal provisions ensure that the risk-reward balance for data processors is adapted appropriately. Processing of personal data by states comes in for particular criticism in EDRi's submission. The actions of Member States must be consistent with what they expect from private companies, and there are many examples of this not being the case. There are numerous examples of electronic patient records, e-government systems and public transport payment systems which do not respect "privacy by design", data minimization and other key principles. Worse still, the broad exception given to Council of Europe Member States in that institution's Recommendation on profiling, which accepts in principle that the most basic of privacy protections, may be set aside by European governments. Regarding data processing by companies, EDRi welcomes many of the policies described in the Commission Communication, such as data minimization, the right to be forgotten, rights of access and erasure of data etc, but points out that many of these rights are already in the existing legislation. The task at hand, therefore, is not to re-legislate for existing rights, but to establish why these rights are not readily enforceable. Concerning new technologies, EDRi suggests that there are three trends which need to be taken into account - the exponential growth in personal data processing capabilities, the growing disconnection between data processing and physical location and the Internet of Things. In order to improve implementation, EDRi called for increased implementation powers for national data protection authorities (DPAs) as well as a targeted reduction in the administrative burden. The reduction of the administrative burden should (and must) lead to national DPAs having more time and resources to devote to practical improvements in privacy protection for data subjects. Both the change of legal environment as a result of the Lisbon Treaty and the increasing trend for data collected by private companies to be used for policing purposes means that it is essential to include data collected for policing purposes in the Directive. A strong data protection framework is the minimum price that should be paid for the levels of police and security cooperation that are currently demanded and enacted within the EU and between the EU and third states. EDRi believes that a Regulation would be a better instrument to ensure clarification and simplification of rules for international data transfers. EDRi believes that the current "safe harbour" exceptions result in an opaque and unaccountable situation for data subjects. At the same time, EDRi feels very strongly about retaining the base principle that personal data should not be exported to jurisdictions without safeguards that are materially similar to those within the European Free Trade Area. Finally, EDRi drew attention to a separate consultation that overlaps with the Commission's work on Data Protection - the Communication on the IPR Enforcement Directive. This latter Communication seeks to undermine the fundamental right to privacy by suggesting an opaque effort to "rebalance" rights to the benefit of so-called property rights. It is entirely and obviously unacceptable that the European Commission can simultaneously be negotiating ratification of the European Convention on Human Rights and seeking to undermine its core provisions. EDRi response to 2010 Communication on Data Protection Directive revision (15.01.2011) http://www.edri.org/files/20110115_EDRi_data_protection_final.pdf European Commission 2010 Communication on Data Protection Directive revision (4.11.2010) http://ec.europa.eu/justice/news/consulting_public/0006/com_2010_609_en.pdf Data Protection Reform Strategy: EDPS sets out his vision for the new framework (18.01.2011) http://www.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/Consultation/Opinions/2011/11-01-14_Personal_Data_Protection_EN.pdf Communication on IPR Enforcement Directive (22.12.2010) http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2010:0779:FIN:EN:PDF EDRi response to 2009 Consultation on Data Protection Directive revision (13.01.2010) http://www.edri.org/edrigram/number8.1/position-data-protection-review (Contribution by Joe McNamee - EDRi) ============================================================ 2. EC's leak describes blocking as "challenging", "costly" and ineffective ============================================================ A leaked draft of the European Commission's (EC) Green Paper on gambling provides some valuable insights into the Commission's views on web blocking. Firstly, contrary to Commissioner Malmstrvm's repeated promises to the contrary, the leak shows that the Commission has no objections in principle to blocking being used against content other than child abuse. The document states that blocking of unlicensed gambling websites "might be justified". The draft policy document goes on to describe what it sees as a key advantage of DNS blocking - that it can be used to hijack users' connections to direct them to approved sites. Nonetheless, while in favour of blocking in principle, the document explicitly recognises that blocking is "technically challenging and costly" and that blocking will leave a "significant" residual level of illegal sites publicly available. In particular, and this is of importance for blocking in relation to child abuse material, the document says that regular updating of a blocking list will be "costly" - a point studiously avoided by the European Commission in the blocking debate so far. Meanwhile, the Civil Liberties Committee of the European Parliament is getting ready for its vote on blocking next week. 342 amendments have been tabled to the Child Exploitation Directive as a whole, with 45 addressing the issue of Internet blocking. While there is a large consensus that blocking should not be mandatory on Member States, there is a wide divergence of opinion on whether blocking should be promoted or not by the Directive and whether "non-legislative" measures should be encouraged as a means of achieving blocking. Among MEPs that have been diligently working on the dossier in the 22 months since the original proposal was made, there is widespread agreement that neither blocking nor non-legislative measures should not be promoted. However, numerous amendments have been tabled by MEPs that have never spoken in a single debate on the issue. When the vote happens, therefore, all will hang on the efforts by activists to contact MEPs and persuade them that blocking is dangerous and that extra-judicial actions by Internet access providers to restrict access to content would be wrong and contrary to the most basic principles of fundamental rights. Draft European Commission Green Paper on online gambling in the Internal market (01.2011) http://www.statewatch.org/news/2011/jan/eu-com-draft-green-paper-on-internet-gambling.pdf EDRi's web blocking campaign page http://www.edri.org/stop_web_blocking (Contribution by Joe McNamee - EDRi) ============================================================ 3. EU institutions want clarifications form Hungary on its media legislation ============================================================ The Hungarian EU Presidency was met on 19 January 2011 with opposition and criticism due to the controversial media legislation Hungary has recently introduced. Some MEPs displayed white banners that read "censored". Viktor Orban, the Hungarian Prime-Minister started his speech by stating that the Hungarian government was willing to change the legislation if the European Commission finds it to be at fault, as the law is presently under its legal review to establish whether it contravenes the EU law. Orban added that Hungary would follow the EC opinion provided it was scrupulously objective, and insisted that Hungary should be treated like any other EU member state. Also, that a separation should be made between Hungary's EU presidency and Hungary's internal affairs. Several MEPs expressed the opinion that the legislation ought to be scrapped entirely. The new law establishes a Media Council (MC) to ensure "balanced" reporting, and requires all media types to be registered, including online media such as forums and blogs. Miklos Haraszti, former OSCE Representative on Freedom of the Media, explained that there are actually five interconnected legislative acts introduced in Hungary since June 2010 that were passed in a rush, at the end of the year, without any consultation. According to the corroborated legislation, all media (including the Internet) are bound to provide "comprehensive, factual, up-to-date, objective and balanced coverage on local, national and European issues that may be of interest for the general public and on any event bearing relevance to the citizens of the Republic of Hungary and members of the Hungarian nation." In Haraszti's opinion, the obligation of the registration for all news providers (including print and Internet-based ) is specifically forbidden in the Council of Europe guidelines. The new Hungarian legislation stipulates high penalties, from 90 000 to 722000 Euro for infringements such as the provision of content that may potentially hurt any community. In order to verify the violations, MC may access any data, including legally protected information.. Refusal to offer the required data may bring a fine of up to180 000 Euro to any media provider.. The legislation thus puts the entire media under the power of a single governmental authority and, according to Judit Bayer, associate professor of media law at King Sigismund College in Budapest, the law is "unquestionably a serious attack on press freedom, and contrary to Article 2 of Lisbon Treaty, Article 10 of the European Convention of Human Rights and Article 19 of the International Covenant on Civil and Political Rights." On 21 January 2011, the European Commission sent a letter to the Hungarian government, giving them two weeks to answer the concerns related to this law. In case of an inadequate answer, Hungary may face legal action. "The commission services have serious doubts as to the compatibility of the Hungarian legislation with Union law," wrote Vice-President of the Commission in charge of the Digital Agenda, , Neelie Kroes. The letter also refers to the provisions of the law that allow Hungary to fine broadcasters based outside the country for what is deemed hate speech, as well as the mandatory registration of all media, including websites, which appear to be incompatible with EU rules. Orban meets barrage of MEP criticism over media law (19.01.2011) http://euobserver.com/9/31669/?rk=1 Hungary's Media Law Package (16.01.2011) http://www.statewatch.org/news/2011/jan/hungary-haraszti-media-law-package.pdf Hungary's new law a threat to democracy (17.01.2011) http://www.indexoncensorship.org/2011/01/hungary-media-law/ EC to inform Hungary about concerns with media law this week (19.01.2011) http://www.politics.hu/20110119/ec-to-inform-hungary-about-concerns-with-media-law-this-week EU gives Hungary two weeks to reply on media law (22.01.2011) http://www.earthtimes.org/articles/news/363678,hungary-reply-media-law.html EDRi-gram: New media law in Hungary allows Internet censorship (12.01.2011) http://www.edri.org/edrigram/number9.1/media-law-hungary-blocks-internet ============================================================ 4. European Commission concerned over illegal eavesdropping in Bulgaria ============================================================ Based on a request for access to public information, Dnevnik daily newspaper has been able to access and publish information showing that a third of the wiretaps in Bulgaria have no proper legal coverage, being performed without an authorisation from a judge. This is possible due to a "flexible" formulation of the procedure for requesting the interception of a person's communications. An internal directive issued by Boris Velchev, the prosecutor-general allows prosecutors to request eavesdropping without the authorisation of a judge when a criminal investigation has been opened. According to Dvevnik, based on this procedure, 2 767 such cases of illegal eavesdropping have already taken place in seven months. The daily also revealed that, according to economists, Bulgaria spends 50 times more than the UK on eavesdropping. While the Bulgarian press reveals a significant increase of eavesdropping under the government of Boyko Borissov, the Bulgarian Prime-Minister justifies the government eavesdropping as an important instrument in fighting organised crime. The European Commission has recently requested information from the Bulgarian authorities related to the legality of the eavesdropping activities, following leaks into Galeria tabloid concerning taped phone conversations in which apparently Boyko Borissov spoke of the need to "protect" a controversial businessperson from customs checks. As a result of the scandal in the press, Borissov asked for a vote of confidence in the Parliament, which he won on 20 January 2011. The ALDE group submitted on 21 January 2011 a question to the Commission asking clarifications over the application of the Bulgarian wiretap law, which infringes the Bulgarian Constitution, the provisions of the Lisbon Treaty, the ECHR and the European Charter of Fundamental Rights. "The current Bulgarian scandal over the escalating use of Special Intelligence Means is a stain on the image of Bulgaria in the same way as the Hungarian media law this week taints the international image of that country. The data collected from the special services in Bulgaria is leaking widely and the only independent mechanism for control over the special services has been abolished. There is a widespread paranoia spreading amongst Bulgarian society. The European Commission should step in and uphold the rights of Bulgarian citizens under EU law before this situation gets out of hand," said ALDE MEP Stanimir Ilchev. The European Commission is expected to present a report in February on progress made by Bulgaria under the Cooperation and Verification Mechanism monitoring procedure. One third of eavesdropping in Bulgaria illegal (21.01.2011) http://www.euractiv.com/en/enlargement/third-eavesdropping-bulgaria-illegal-news-501461 Wiretap scandal rocks Bulgarian government (18.01.2011) http://www.euractiv.com/en/enlargement/wiretap-scandal-rocks-bulgarian-government-news-501300 Any third monitoring of GSM and the Internet has no control (only in Bulgarian, 22.01.2011) http://www.dnevnik.bg/bulgaria/2011/01/20/1028603_vsiako_treto_sledene_na_gsm_i_v_internet_e_bez_kontrol/ Eavesdropping scandal in Bulgaria: Commission must investigate (21.01.2011) http://www.alde.eu/press/press-and-release-news/press-release/article/eavesdropping-scandal-in-bulgaria-commission-must-investigate-36918/ EDRi-gram: Protests in Bulgaria against eavesdropping and data retention law (13.01.2010) http://www.edri.org/edrigram/number8.1/bulgarian-protests-data-retention ============================================================ 5. Romanian NGOs demand stopping data retention in Europe ============================================================ In an open letter sent to the European institutions, several Romanian NGOs, including EDRi-member APTI Romania, demanded stopping data retention in Europe, following the decisions of the Constitutional Courts in Romania and Germany. The letter asks the European Commission to take advantage of the evaluation process of the Data Retention Directive in order to correct the mistakes of the past and to nullify the Directive, as it has been shown there are difficulties in obtaining the relevant data regarding the efficiency of such a system. The Commission has also received clear examples of abuses and adverse effects on privacy. The signatories underline that a Romanian implementation of the EU Directive on data retention is impossible, after the 2009 decision of the Constitutional Court that considered that the fundamental scope of the law (and thus of the Directive) - legal obligation to continuously and indiscriminately store telecommunication data- is unconstitutional. They are also asking the competent European institutions to take note of the irreconcilable conflict between the telecommunication data retention and the human right to privacy and to act accordingly to respect the principles in the Charter of Fundamental Rights of the European Union. The text is meant to remind, support and respect the decision of the Romanian Constitutional Court and not to put an EU Member State in a position that will breach its constitutional texts: "The decision stipulates that keeping all traffic data for all Romanian citizens is a measure that breaches human rights, as foreseen by the Romanian Constitution. Thus 'the legal obligation with a continuous character, generally applicable, of data retention (...) harms in an unacceptable way the exercise of the right to privacy or the freedom of expression.'" Telecommunication data retention must be stopped in Europe (26.01.2011) http://www.apti.ro/pastrare-date-trafic.pdf Decision of the Romanian Constitutional Court (8.10.2009) http://www.legi-internet.ro/english/jurisprudenta-it-romania/decizii-it/romanian-constitutional-court-decision-regarding-data-retention.html EDRi-gram: Data Retention Directive evaluation: expect the unexpected? (15.12.2010) http://www.edri.org/edrigram/number8.24/evaluation-data-retention-directive ============================================================ 6. Spain: Right to be forgotten and Google ============================================================ The Spanish data protection authority (AEPD) has recently been focusing on a privacy-related campaign against major Internet intermediaries, accusing them to "have crossed the red line" in regard to protection of personal data on the Internet. Facebook, Google or Myspace are under scrutiny for their privacy policies and how they are respected. On 17 January 2010, AEPD accused Google of invading personal privacy of users, arguing the company was in breach of the "right to be forgotten", the Spanish law allowing people to control information about them. The Spanish Authority ordered the search engine company to remove links to more than 100 Spanish online articles and to delete links to websites that contained out of date or inaccurate information about a specific individual that complained to the AEPD. Google argues that deleting results "would be a form of censorship", that the company, as an intermediary, is not liable for the content of the materials it links to. Moreover deleting content is not the role of search engines but of publishers. "We are disappointed by the actions of the Spanish privacy regulator. Spanish and European law rightly hold the publisher of the material responsible for its content. Requiring intermediaries like search engines to censor material published by others would have a profound, chilling effect on free expression without protecting people's privacy," stated Peter Barron, Google's director of external relations for Europe. But even if Google loses the case, the articles blocked by the search engine will still be available on the websites of the newspapers and journals that published the respective articles. However, Google will have to delete information about the concerned individuals from its Spanish site and respond to another 88 cases also brought to the Spanish regulator. The case is closely followed by the European Union because its outcomes may have implications outside Spain, having in view that EU has already announced looking at how the application of the right to be forgotten is implemented in the online world. "Internet users must have effective control of what they put online and be able to correct, withdraw or delete it at will. What happens if you want to permanently delete your profile on a social networking site? Can this be done easily? The right to be forgotten is essential in today's digital world." said Viviane Reding, European Commission's Vice-president, in a statement made in November 2010. Building Trust in Europe's Online Single Market Speech at the American Chamber of Commerce to the EU Brussels - Viviane Reding speech (22.06.2010) http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/10/327 Google fights Spanish privacy order in court (20.01.2011) http://www.bbc.co.uk/news/technology-12239674 Google fights Spanish court order over libel (17.01.2011) http://www.dw-world.de/dw/article/0,,14771969,00.html AEPD Director warns that the large Internet company has crossed "several red lines" of the respect to privacy (only in Spanish, 12.2010) https://www.agpd.es/portalwebAGPD/revista_prensa/revista_prensa/2010/notas_prensa/common/diciembre/101201_NP_comparecencia.pdf Google search engine, ripe for judgment (only in Spanish, 22.01.2011) http://www.larazon.es/noticia/5222-el-buscador-google-visto-para-sentencia ============================================================ 7. Sarkozy wants a "civilised" Internet ============================================================ With France at the Presidency of the G20 group in 2011, Nicolas Sarkozy has recently announced the intention to convene a G20 meeting to discuss Internet and copyright issues, before the full G20 summit of heads of state and government in Cannes in November. The French President has had the same discourse for some time now, having pushed the idea of a "civilised" Internet on various occasions since the signature in November 2007 of the so-called "Olivennes agreement", which established the Hadopi authority. The subject of a "civilised" Internet will also be discussed during the G8 meeting that will take place in Deauville, France, on 26 and 27 May 2011. "We will table a central question, that of a civilised Internet (....).We cannot consume as never before images, music, authors, creation, and not ensure the property rights for the person who put all the emotion, talent and creativity (...). The day we no longer remunerate the creation, we will kill the creation" said Sarkozy. In the French government's opinion, expressed by Deputy Muriel Marland-Militello, France is the "world's pioneer of the civilised Internet", thanks to Hadopi. A pioneer who obstinately continues its efforts to promote its repressive three-strikes system with every occasion. In October 2010, an international conference on online freedom of expression was supposed to be organised by French minister of Foreign Affairs Bernard Kouchner. A letter sent by Nicolas Sarkozy to Houchner shows that Sarkozy was trying to take the opportunity of the conference to promote Hadopi law establishing the three-strikes system. In Sarkozy's opinion, the conference provided "the opportunity to promote the balanced regulatory initiatives carried on by France during these past three years, and in particular the HADOPI law in the field of copyright." In the meantime, Hadopi presented on 23 January 2011, on the occasion of MIDEM 2011 (Marchi International du Disque et de l'Edition Musicale - International Market of the Record and Musical Edition) the results of its first study, performed between 25 October and 4 November 2010, on Internet usage in France. The study revealed that half of the French Internet users engage in alleged illegal downloads. A rather unpleasant finding for Hadopi is that 29 % of the "pirates" admit to having started downloading during the last 6 months, meaning after the introduction of Hadopi law and the issuing of the first warnings by the authority. Moreover 50% of the "pirates" stated they did not intend to change their habits, irrespective of the authority's actions. The study has also revealed that the persons who illegally download cultural goods are also the ones that spend more on culture than others who do not. The main obstacle to legal consumption of digital cultural goods is the price for 37% of users, while for 21% of them the reason is a lack of offer diversity, and only 13% state they are more used to "illegal consumption." The findings of the report are not quite in favour of Hadopi and only prove the inefficiency of the system. Sarkozy wants a G20 of the copyright for a "civilised Internet" (only in French, 19.01.2011) http://www.numerama.com/magazine/17849-sarkozy-veut-un-g20-du-droit-d-auteur-pour-34un-internet-civilise34.html Sarkozy Exports Repressive Internet (21.10.2010) http://www.laquadrature.net/en/sarkozy-exports-repressive-internet Hadopi presents its study: 50 % of the pirates don't want to change (only in French, 24.01.2011) http://www.numerama.com/magazine/17864-l-hadopi-presente-son-etude-50-des-pirates-ne-veulent-pas-changer.html Hadopi, Cultural goods and Internet use: the French users' practices and perceptions (only in French, 23.01.2011) http://www.scribd.com/doc/47451295/hadopiT0 ============================================================ 8. ENDitorial: EDRi publishes study on self-regulation and censorship ============================================================ European Digital Rights has published a study on the scale of measures being undertaken to outsource policing activities to private companies in the Internet environment and its significance for fundamental rights, transparency and openness on the Internet. Internet intermediaries around the world are taking on more important roles in their states' efforts to address the dissemination of illegal online content and this trend is likely to become stronger as we move into a new environment of "extra-judicial sanctions" against consumers. With some notable exceptions, these activities are being forced onto Internet intermediaries rather than being demanded by them. The study found that the term "self-regulation" is being inappropriately used to describe what is not self-regulation at all, but the monitoring, policing and even punishing of alleged illegal activities of citizens. Proposed legislation and "non-binding guidelines" are forcing intermediaries into a position in which they can no longer avail themselves of legal protections - where they are obliged, in effect, to police private online communications, often in blatant disregard of legal safeguards and even to impose sanctions for alleged infringements. Should Internet intermediaries become privatised enforcement systems? The measures recently taken by Visa, Mastercard, PayPal and EveryDNS against WikiLeaks are a case in point. Even without WikiLeaks being charged with any particular crime, private companies have acted unilaterally against it. The devolved enforcement initiatives documented in the report aim to persuade industry to engage in a vigilante system of monitoring and sanctioning; the report catalogues current international proposals, which include: - a series of ongoing "public-private dialogues" organised by the European Commission to encourage hosting providers to engage in extra-judicial rulings of illegality; - a 2010 European Commission funding proposal incentivising companies to engage in "self-regulatory" Internet blocking of allegedly illegal online material; - discussions launched by the Council of Europe's Assembly in 2010 whose intention appears to be to increase the legal obligations of intermediaries, despite the fact that this would be "contrary both to the letter and the spirit of the 2003 Declaration on freedom of communication on the Internet"; - 2010 OECD discussions, which aim to increase the responsibility of Internet intermediaries in advancing "public policy objectives"; - the Anti-Counterfeiting Trade Agreement (ACTA) that contains provisions that would encourage or coerce ISPs into policing their networks and enforcing extra-judicial sanctions, where they deem it to be appropriate; - an OSCE consultation in 2010, the aim of which was to explore ways to enable ISPs to "'regulate' online legal or illegal 'hate speech'"'; - EU/India and EU/Korea bilateral free trade agreements that would change the EU acquis on intermediary liability. The encouragement of extra-legal measures to limit access to information, proactive policing of the Internet and the exclusion of law enforcement authorities in investigating serious crimes are factors that contribute to the weakening of the rule of law and democracy. Indeed, by taking responsibility away from legal authorities, such measures can result in serious crime, such as the publication of child abuse material online, being addressed by industry through cosmetic measures (such as blocking) rather than proper investigation and prosecution. While these appear to be regressive steps away from freedom, the study found, for instance, that the European Commission appears far from perturbed by the dangers for fundamental rights of this approach and appears keen to export the approach. This process is gradually strangling the openness that is at the core of the Internet. This openness has enhanced democracy, has shaken dictatorships and has boosted economies worldwide. This openness is what we will lose through privatised policing of the Internet by private companies - what will we gain? EDRi report: The slide from "self-regulation" to corporate censorship (24.01.2011) http://www.edri.org/files/EDRI_selfreg_final_20110124.pdf Text of the press releas also available in: German http://www.edri.org/files/EDRi_pressemiteilung_deutsch.pdf Swedish http://www.edri.org/files/EDRi_pressmedel_svenska.pdf French http://www.edri.org/files/EDRi_communique_francaise.pdf Hungarian http://www.edri.org/files/magyar_sajtokozlemeny_EDRi_jelentes.pdf Slovak: http://www.soit.sk/sk/aktualne/oit-vo-svete/2011-01-26/106-nova-studia-dokumentuje-vzrastajucu-ulohu-sukromych-spolocnosti-pri-vykonavani-dozoru-nad-online-komunikaciou (Contribution by Joe McNamee - EDRi) ============================================================ 9. Recommended Action ============================================================ Opinion of European Academics on ACTA Open for signatures until 7 February 2011 http://www.iri.uni-hannover.de/acta-1668.html http://www.iri.uni-hannover.de/tl_files/pdf/ACTA_opinion_200111_2.pdf ============================================================ 10. Recommended Reading ============================================================ ACTA Blog: Certainly, the professors should know the difference between 'shall' and 'may' (25.01.2011) http://acta.ffii.org/wordpress/?p=390 ENISA: Review of the current situation in the implementation of data breach notifications requirement, set up by the Article 4 of the reviewed ePrivacy Directive (14.01.2011) http://www.enisa.europa.eu/media/press-releases/new-report-data-breach-notifications-in-europe http://www.enisa.europa.eu/act/it/dbn/ Statewatch analysis: Six months on: An update on the UK coalition government's commitment to civil liberties (21.01.2011) http://www.statewatch.org/analyses/no-118-uk-civil-liberties-six-months-on.pdf The Commission is publishing the statistics and the responses to the on-line public consultation on the PSI Directive. The full analysis of the responses will be published in the form of a report in the coming weeks. (20.01.2011) http://ec.europa.eu/information_society/policy/psi/index_en.htm ============================================================ 11. Agenda ============================================================ 25-28 January 2011, Brussels, Belgium The annual Conference Computers, Privacy & Data Protection CPDP 2011 European Data Protection: In Good Health? http://www.cpdpconferences.org/ 26 January 2011, Brussels, Belgium Cultural Diversity and Europe 2020: Nuisance or necessity? http://conferences.euobserver.com/cultural/index/ 28 January 2011, Brussels, Belgium Joint High Level meeting on Data Protection: "Data protection (30 years later): from European to international standards?" http://www.data-protection-day.net 31 January 2011, Brussels, Belgium Public Workshop on indicators for the independence and efficient functioning of AVMS regulatory bodies http://cmcs.ceu.hu/news/31-january-public-workshop-indicators-independence-and-efficient-functioning-avms-regulatory-bo 23-28 February 2011, Gosier, Guadeloupe, France ICDS 2011- 5th International Conference on Digital Society http://www.iaria.org/conferences2011/ICDS11.html 24-25 February 2011, Berlin, Germany The First OAPEN Conference http://meetings.copernicus.org/oapen2011/ 11-12 March 2011, Ankara, Turkey ICEGEG-2011- 3rd International Conference on E-Government and E-Governance http://www.icegeg.com/index.html 28 March 2011, Paris, France 5th European eAccessbility Forum: Benefits and costs of e-accessibility http://inova.snv.jussieu.fr/evenements/colloques/colloques/70_index_en.html 1 April 2011, Bielefeld, Germany Big Brother Awards Germany http://www.bigbrotherawards.de/index_html-en 17-18 May 2011, Berlin Germany European Data Protection Reform & International Data Protection Compliance http://www.edpd-conference.com 12-15 June 2011, Bled, Slovenia 24th Bled eConference, eFuture: Creating Solutions for the Individual, Organisations and Society http://www.bledconference.org/index.php/eConference/2011 11-12 July 2011, Barcelona, Spain 7th International Conference on Internet, Law & Politics (IDP 2011): Net Neutrality and other challenges for the future of the Internet Abstract submission: 18 February 2011 http://p2pfoundation.ning.com/profiles/blogs/7th-international-conference ============================================================ 12. About ============================================================ EDRI-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRI has 29 members based or with offices in 18 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRI-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and are visible on the EDRI website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. Unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/edri/2.html - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From buh at otdyh-krym.ru Wed Jan 26 16:45:07 2011 From: buh at otdyh-krym.ru (=?koi8-r?B?7sXTwc7Lw8nPzsnSz9fBzs7ZyiDEz9PU1dAgyyDJzsbP0s3Bw8nJ?=) Date: Wed, 26 Jan 2011 20:45:07 -0400 Subject: =?koi8-r?B?6c7Gz9LNwcPJz87OwdEgwsXaz9DB087P09TYINcg68/N0MHOyck=?= Message-ID: <3B67D3B146874AA6930A25511DD2DD5B@desktop> ------------------------------------------------------------------------- | ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ: |инновационный подход, современные технологии и практические решения |в условиях экономической нестабильности ------------------------------------------------------------------------- • 31 Января • 2011 г. > Московский код; 742.9i98 или 7_9_2*2/1/2_2 > ПPОГРАММА 1.Актуальность вопроса защиты информации •Актуальность проблемы защиты информации. Защита информации как составная часть общей системы безопасности организации (предприятия) •Основные понятия, термины и определения в области защиты информации •Основные направления защиты информации •Законодательная и нормативная база правового регулирования вопросов защиты информации •Требования к организации защиты конфиденциальной информации на предприятии (организации) •Составные части (основа) системы защиты информации 2.Коммерческая тайна •Понятие "коммерческой тайны" в предпринимательской деятельности. Законодательство РФ в области защиты коммерческой тайны •Методика составления Перечня сведений, содержащих коммерческую тайну •Внутренние нормативные документы, регламентирующие деятельность компании в области защиты коммерческой тайны 3.Угрозы информации. Возможные каналы утечки информации •Виды угроз информационной безопасности •Определение предмета и объекта защиты. •Технические каналы утечки информации. Их классификация. Механизмы образования •Организационные, организационно-технические меры и технические средства защиты информации от утечки по техническим каналам • Угрозы несанкционированного доступа (НСД) к информации. Источники угроз. Классификация угроз •Возможная тактика использование программных и аппаратных закладных устройств (ЗУ). Уязвимость современных технических средств обработки информации (проводные и беспроводные системы, Интернет, мобильные средства связи и пр.) 4.Мероприятия по защите информации. Противодействие промышленному шпионажу. Технические средства защиты информации •Формирование организационной структуры системы защиты информации на предприятии. Принципы формирования, факторы и критерии принятия решения •Технические средства промышленного шпионажа •Защита информации от утечки по техническим каналам •Меры и средства защиты информации от технических средств ее съема •Приборы обнаружения технических средств промышленного шпионажа •Общие требования по защите помещений и технических средств •Организационные мероприятия по защите информации. Допуск, доступ, учет, хранение •Организационно- технические мероприятия защиты информации •Человеческий фактор в утечке информации. Превентивные мероприятия по предупреждению возможной утечки защищаемой информации. 5.Методы и средства защиты компьютерных систем •Возможные способы утери, искажения, изменения компьютерной информации или получения к ней несанкционированного доступа. •Вирусная угроза компьютерной информации. •Возможность защиты информации при работе в сети Internet. Межсетевое экранирование. •Активный аудит. •Основы криптографической защиты информации. Классификация методов криптографического закрытия информации. Шифрование (симметричные криптосистемы и криптосистемы с открытым ключом). Кодирование и сжатие информации. Стеганография. •VPN (виртуальная частная сеть). Преимущества организации виртуальных частных сетей на основе Internet. •Электронная цифровая подпись. Электронная цифровая подпись как базовый механизм обеспечения юридической силы документа при электронном документообороте. •Практические примеры применения криптографических методов защиты информации. 6.Аудит информационной безопасности компании. Политика информационной безопасности •Анализ внутренних и внешних угроз информационной безопасности компании. Общие подходы •Методика разработки политики информационной безопасности в компании •Международные и российские стандарты безопасности информационных систем (ISO 17799, ГОСТ Р ИСО/МЭК 17799-2005) •Американская концепция системного подхода к обеспечению защиты конфиденциальной информации (OPSEC Operation Security) 7.Организация работы Службы информационной безопасности (СИБ) предприятия. Практический опыт •Процедура создания СИБ на предприятии. Разделение функций между СИБ и IT-подразделением. Место СИБ в структуре предприятия •Организация взаимодействия с Руководством и руководителями структурных IT-подразделений компании. Стоимость участия 9853 рублей За более подробной информацuей обpащайтеcь по тел: (код Москвы) 7Ч2-9I98 и 742/9i98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8222 bytes Desc: not available URL: From eugen at leitl.org Wed Jan 26 12:38:43 2011 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 26 Jan 2011 21:38:43 +0100 Subject: EDRi-gram newsletter - Number 9.2, 26 January 2011 Message-ID: <20110126203843.GR23560@leitl.org> ----- Forwarded message from EDRI-gram newsletter ----- From michaelslists at gmail.com Wed Jan 26 03:36:37 2011 From: michaelslists at gmail.com (silky) Date: Wed, 26 Jan 2011 22:36:37 +1100 Subject: Question about (cypher)Twitter In-Reply-To: References: <1295075590.15872.5.camel@afterburner> Message-ID: On Mon, Jan 24, 2011 at 1:05 PM, Tyler Durden wrote: > > RSS is OK, better than nothing, but in many situations (ie, with dumbphones > or where conditions are rapidly changing), a pull model has some distinct > disadvantages to twitter's push model. Or am I missing something? Seems both > real time as well as anonymity are hard to do in this context. (I'm assuming > that if a twitfeed is sent to an RSS-iator, then authorities could see that > and then find who is subscribing to the RSS.) Subscribing, though, only takes place on the readers side. That is, it's just as if you were visiting it anyway. So, just don't subscribe, and view it every so often. What you need, though, is some strategy that means if the attacker visits the same rss feed, then they don't get the same information. Or, the information they get is not useful to them. So, you need some sort of encoding yahoo pipe as well. But that's probably possible. > -TD -- silky From 0-tnoe at orf.at Wed Jan 26 05:13:52 2011 From: 0-tnoe at orf.at (Viagra+Cialis ComboPack_$69.95) Date: Wed, 26 Jan 2011 23:13:52 +1000 Subject: Need Vi.gra? Message-ID: <3819924905.MX413YRC846662@tktrkgdqs.boqoc.biz> 80% of Women are NOT happy after inter-course... this CAN be changed with our product Satisfaction Guaranteed! http://sales.treatgroan.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 315 bytes Desc: not available URL: From formulate at lustrous.ru Wed Jan 26 08:09:16 2011 From: formulate at lustrous.ru (=?koi8-r?B?+sHLz87O2cUgwczY1MXSzsHUydfZ?=) Date: Thu, 27 Jan 2011 04:09:16 +1200 Subject: =?koi8-r?B?68HLINbJ1NggwsXaIM/CzsHMyd7LySDJIMbJ0s0tz8TOz8TOxdfPyw==?= Message-ID: <000d01cbbd6a$ffc73720$6400a8c0@formulate> 28 января 2011г. +7 Московский код: 7922|/22 <<<>>> 4Ч5З9.68 Налоговое планирование: как жить без обналички и фирм-однодневок и не разориться, уход от "черных" и "серых" схем, оптимизация налогов с использованием законных альтернативных схем. 1.Что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.).Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2.Обналичивание. Для чего используется: -"черная" зарплата и доходы собственников бизнеса; -оплата расходов, которые не хочется проводить официально; -незаконная деятельность (взятки, откаты, финансирование политической деятельности┘); Законные альтернативы (только для законных целей!): -зарплата и дивиденды на спецрежимах, выплата процентов, компенсаций, аренда, покупка у физлиц ТМЦ, ИП на ЕНВД или УСН (в т.ч. на патенте) √ как использовать; -дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Текущая ситуация с обложением таких доходов НДФЛ. Получение наличных по чеку на расходы ИП, через личные (карточные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п.; -зарплата в большом размере - нулевая ставка страховых взносов; -платежи от нерезидентов на карты, основания. Аутстафинг от нерезидента; -перевод расходов в безналичную форму. Представительские расходы. 3.Однодневки. Для чего используются: -псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; --"серый импорт"; --"серая конвертация"; --незаконная деятельность. Законные альтернативы однодневкам (только для законных целей!): -затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; -выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение финансовых потоков "с НДС" и "без НДС"; -простое товарищество с участием субъектов УСН и/или нерезидентов, работа по агентским или комиссионным договорам с ними; -прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; -выплата нерезидентам дивидендов, роялти, процентов вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 4.Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. Стоимость участия в семинаре 7 900 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: Московский код; 7_Ч2/91_98 или 445/З9_68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4095 bytes Desc: not available URL: From flamsmark at gmail.com Thu Jan 27 08:51:56 2011 From: flamsmark at gmail.com (Flamsmark) Date: Thu, 27 Jan 2011 11:51:56 -0500 Subject: Tor exits in .edu space Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 My name is Thomas Lowenthal, and I'm and undergraduate student at Princeton University. I'm majoring in the Politics Department, with a certificate from the Program in Applications of Computing, and the Program in Information Technology and Society. I'm also an Undergraduate Fellow at Princeton's Center for Information Technology Policy[1]. I'll be graduating this summer, in 2011. I run the exit TempleSouth[2] inside the IP space of Princeton University. The computer itself isn't a departmental or University piece of equipment, it's just my own machine that lives under my desk. Over time, it's had different names and fingerprints, as I moved from machine to machine, and operating system to operating system. Running an exit node here has been a lot of work, but it's been extremely interesting to see the reactions that different administrators here have had. I run a Tor exit node because I support the ubiquitous availability of strong anonymity for anyone who wants it. Tor is one of the strongest, best- researched, and most widely-used online anonymity system, and I want to help keep it running at maximum capacity. Initially, I operated a relay but -- not one to shy away from a fight -- reviewed the EFF's legal guidance, and switched to an exit node. This was in the days before Mike Perry's excellent /Tips for Running and Exit Node with Minimal Harassment/[3], and I used a wide open exit policy. Of course, after a little while some DMCA complaints started showing up. I responded with polite and precise variations on the abuse templates. However, Princeton has a policy of assuming the accuracy of such notices, and that they refer to actually illegal behavior. I was sanctioned on the basis that I was personally violating copyright law. Of course, I argued back. I gradually made my way through different administrative procedures, talking with several administrators, and committees, and finally Princeton's general counsel. It took a few years (and untold meetings) but I've managed to persuade them that running an exit node is neither illegal nor unethical (if not actively altruistic). The most interesting part has been the reactions from the various people involved in the the discipline/discussion process. The first few administrators, and the committee that sanctioned me to begin with, were completely incredulous that this whole Tor business could be anything but an elaborate ploy to download movies and music online. It was beyond imagining that a message sent by -- highly reputable -- entertainment companies could be anything but cold hard fact: prima facie evidence of wrongdoing. I had to pull out Section 230 of the Communications Decency Act[4] and subtly hint that sanctioning me might be illegal itself, before they'd consider seeking a second opinion on my "wrongdoing". Our DMCA contact was much more pragmatic, and genuinely interested in what was going on. She went out and did her homework on the Tor project, examining things with a non-judgemental eye. She empathized with my desire to work towards internet freedom. Her concerns were pragmatic and legal. Se was worried that I could move towards giving the University a bad name, or causing it actual harm. She was also skeptical that I -- a student with a home-made computer under my desk -- could be considered a "service provider" in the eyes of the DMCA, especially since I hadn't registered a DMCA contact. However, the school's general counsel was the most understanding. After I explained to him exactly how Tor works, and we reviewed the safe harbor provisions of the DMCA, he got on board with the EFF's legal position. He also realized that this left the University with negligible liability for what was going on, and that -- on the contrary -- it was only sanctioning me that would raise the legal risk under the CDA. The support that I received from the project was somewhat limited, but I can't really imagine receiving that much more. I spoke with arma on the IRC channel, and he provided me with moral support, and offered to get me in touch with Ed Felten at Princeton's CITP. An open letter from lawyers, addressing an ISP or University's liability concerns might be valuable, but then again it might not. It's my feeling that this sort of situation is best resolved with polite determination and some mild politicking, but I don't see that there's much that the Tor project can do to persuade large organizations of its worth. The most valuable resource that I have right now is Mike Perry's excellent /Tips for Running and Exit Node with Minimal Harassment/. That's exactly the sort of thing that's really valuable to people like me. I'd like it to be linked directly from 'so you want to be a server' section of the torproject.org . Beyond that, the most valuable thing for the project to do is advocacy. The more people know about Tor, and respect the value of online anonymity, the easier people should find it to run exits That's the position as it currently stands. I think that the University is not happy, per se, but that they realize that running a Tor node is one of the many forms of autonomy that must be granted in a liberal academic institution. There are still blips from time to time when it seems that someone has made a death threat, or committed a criminal offense while exiting from my node. Mostly, however, the University just lives and lets live. - -Thomas Lowenthal GPG key 80AF07D3 thomas.lowenthal at gmail.com http://flamsmark.com A note: Princeton is home to the Center for Information Technology Policy, directed by Professor Ed Felten, my Computer Science adviser. CITP is home to research fellows, including Wendy Seltzer, one of Tor's Board of Directors, and has even had Roger Dingledine visit as a guest speaker. If needed, it's possible that I could have requested backup, or reinforcements from CITP during the saga described above, however I preferred to fight this one on my own, as far as possible. If you want to get in touch with me, please email me, or contact StrangeCharm in #nottor on irc.oftc.net . My resume is available at: http://flamsmark.com/docs/lowenthal-resume.pdf . The viewpoints expressed here are my own, and not representative of my university or employers. Please feel free to redistribute these comments widely. They are available under a Creative Commons Attribution-ShareAlike 3.0 United States license[5]. If you excerpt from them, please link to email archives and/or http://flamsmark.com/docs/lowenthal-tor-edu.txt , and attribute them to my full name - Thomas Lowenthal. [1] http://citp.princeton.edu/ [2] Fingerprint $500B25C1240DAC33AC6621D1A87D77A0FF91DE33 [3] https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment [4] https://secure.wikimedia.org/wikipedia/en/wiki/Section_230_of_the_Communications_Decency_Act [5] http://creativecommons.org/licenses/by-sa/3.0/us/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iF4EAREIAAYFAk1Bm0kACgkQMHyzSdX0lpx7RQD+Lyxsj6/P8pHzd2nqllpcueGH YhRAA6c63aOrgWCjWMQA/3PHSVixJzo4zXZe268KpaMXHlp0awwdzxQ0hL81e+hF =uTp8 -----END PGP SIGNATURE----- *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From arctica at arctica.nw.ru Thu Jan 27 05:37:13 2011 From: arctica at arctica.nw.ru (=?koi8-r?B?89DFw8nBzMnT1MHNINDPINrB0tDMwdTF?=) Date: Thu, 27 Jan 2011 15:37:13 +0200 Subject: =?koi8-r?B?7sHMz8fP18/FINDMwc7J0s/Xwc7JxTogzcnOyc3J2sHDydEg7uTm7Cwg?= =?koi8-r?B?09TSwcjP19nIINfazs/Tz9c=?= Message-ID: <74A2208EB03242CEB0CB4465ACE08B48@Dapu> 07 Февраля Методы оптимизации расходов на выплату белой зарплаты: уменьшаем страховые взносы (Ч95) Ч45З266 ; 445/32/66 Цель: Ставка обязательных страховых взносов с зарплаты с 2011 года составляет 34% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала ЕСН заменена отменой уплаты взносов с суммы дохода свыше 463 тыс. рублей, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1. Обзор изменений законодательства, связанных с повышением ставки страховых взносов. Сколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2011 гг. Какие схемы стали невыгодными; у каких налогоплательщиков положение даже улучшилось. 2. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. 3. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность в 2011 г.; * дивидендные схемы – замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с кассовой дисциплиной и политикой ЦБ. Текущая ситуация с обложением таких доходов НДФЛ. 4. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 5. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Страхование жизни работников и ДМС за счет предприятия. 6. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. 7. Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. 8. Использование процентных займов от физлиц. Расчет эффективности. 9. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 10. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, 11. Создание недоимки по налогам с ФОТ на фирме, не обремененной активами – пример "серой" схемы (как нельзя "оптимизировать"!), 12. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 13. Ответы на вопросы. По желанию – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. За более подробной информацuей обpащайтеcь по тел: +7 (Ч95) 7Ч2-9.|*9_8 : 4-45/4-О/95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6722 bytes Desc: not available URL: From mail at digitalclub.ru Thu Jan 27 05:14:00 2011 From: mail at digitalclub.ru (=?koi8-r?B?7cnOyc3J2sHDydEgzsHMz8fP1w==?=) Date: Thu, 27 Jan 2011 21:14:00 +0800 Subject: =?koi8-r?B?68HLIM3P1s7PIMkgy8HLIM7FzNja0SDP0NTJzcnaydLP18HU2CDOwczP?= =?koi8-r?B?x8k=?= Message-ID: <23910DB24F8340DEAEE1EE6F2CB70C69@PC2010120921bzg> 08 Февраля Тема: Налоговое планирование. Затратные механизмы для оптимизации НДС и налога на прибыль (код Москвы). 792_2|22 <<>> 4Ч53266 Цель: Курс посвящен изучению затратых механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Участники получат краткие индивидуальные консультации по тематике данного курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные","серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов – ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. 4. Виды приемлимых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 5. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 6. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 7. Ответы на вопросы. По желанию и при наличии возможности – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Информацию можно получить по телефонам: \Моск. код/ 792_2i/22 : 445.З2/66 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6753 bytes Desc: not available URL: From eugen at leitl.org Thu Jan 27 14:04:31 2011 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 27 Jan 2011 23:04:31 +0100 Subject: Tor exits in .edu space Message-ID: <20110127220431.GG23560@leitl.org> ----- Forwarded message from Flamsmark ----- From tatyanamanqy at arteitaly.com Thu Jan 27 22:21:29 2011 From: tatyanamanqy at arteitaly.com (Tatyana Man) Date: Thu, 27 Jan 2011 23:21:29 -0700 Subject: Erectile Dysfunction Pills | Buy Viagra, Cialis, Levitra Online Message-ID: <96j12q34f94-57211550-513q4i51@gvuuvcweo> Erectile Dysfunction Pills | Buy Viagra, Cialis, Levitra Online Impotence pills such as Viagra, Buy Cialis Online, have proven to be very successful in treating Erectile Dysfunction http://drugstoremedstablets.ru From magicbit at swhost.ru Thu Jan 27 21:14:21 2011 From: magicbit at swhost.ru (=?koi8-r?B?88jFzdkg2sHU0sHU?=) Date: Fri, 28 Jan 2011 00:14:21 -0500 Subject: =?koi8-r?B?+sHU0sHUztnFIM3FyMHOydrN2SDEzNEgz9DUyc3J2sHDyckg7uTz?= Message-ID: <000d01cbbeaa$38bc66a0$6400a8c0@magicbit> O8 февраля 2011г. Тема: Варианты затратных схем. Оптимизируем НДС и налога на прибыль 8 (495) 44.5*_32-66 \\// ЧЧ5Ч095 Цель: Курс посвящен изучению затратых механизмов с точки зрения их использования в схемах планирования по налогу на прибыль и (в той степени, в которой это возможно) НДС. В качестве затратных механизмов подробно рассматриваются различные услуги и работы, аренда (лизинг), лицензионные платежи (роялти), проценты по любым долговым обязательствам, штрафные санкции и др. Участники получат краткие индивидуальные консультации по тематике данного курса. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные","серые" и "белые" схемы. 2. Кто может быть участником "затратных" схем: * субъекты специальных налоговых режимов √ ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 3. Варианты затратных механизмов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. 4. Виды приемлимых услуг и работ: * различные работы по договору подряда (субподряда); * посреднические услуги по закупке или реализации товаров, а также связанные с закупкой и реализацией; * услуги управленческого характера: по передаче полномочий единоличного исполнительного органа, содействие в привлечении и возврате финансирования, плата за предоставление залога или поручительства, коллекторские, факторинг; * логистические: автотранспортные, экспедиторские, по техническому обслуживанию автотранспорта, погрузочно-разгрузочные работы, пакетирование, переупаковка, складская обработка товаров, (складское) хранение, а также все это в комплексе; * связанные с основными средствами: услуги по их содержанию, эксплуатации и техническому обслуживанию. Распространенные "плохие" варианты "виртуальных" услуг и работ (информационные, консультационные, маркетинговые, рекламные, ремонт...). Когда они все же допустимы. 5. Минимизация рисков "затратных" схем. "Явные признаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличие деловых целей, "легенда", отсутствие дублирующихся функций. Грамотное обоснование расходов и цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельность участников "затратных" схем. 6. Иностранные низконалоговые компании в "затратных" схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п. Выбор низконалоговых юрисдикций. 7. Ответы на вопросы. По желанию и при наличии возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. По вопpоcам pегucтаpацuu обpащайтеcь по тел: Московский код; 4Ч53266 или Ч4/54/О95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6745 bytes Desc: not available URL: From jtrjtrjtr2001 at yahoo.com Fri Jan 28 07:07:40 2011 From: jtrjtrjtr2001 at yahoo.com (Sarad AV) Date: Fri, 28 Jan 2011 07:07:40 -0800 (PST) Subject: seL4 Microkernel Message-ID: <25805.59824.qm@web33301.mail.mud.yahoo.com> "The L4.verified project A Formally Correct Operating System Kernel L4.verified The University of New South Wales Function calls in the seL4 kernel [What's this?] In current software practice it is widely accepted that software will always have problems and that we will just have to live with the fact that it may crash at the worst possible moment: You might be on a deadline. Or, much scarier, you might be on a plane and there's a problem with the board computer. Now think what we constantly want from software: more features, better performance, cheaper prices. And we want it everywhere: in mobile phones, cars, planes, critical infrastructure, defense systems. What do we get? Mobile phones that can be hacked by SMS. Cars that have more software problems than mechanical ones. Planes where computer problems have lead to serious incidents. Computer viruses spreading through critical infrastructure control systems and defense systems. And we think "See, it happens to everybody." " Full text in url below http://ertos.org/research/l4.verified/ One of their papers from wilipedia's citations http://www.sigops.org/sosp/sosp09/papers/klein-sosp09.pdf Now, can all these above mentioned problems disappear with seL4 microkernel? Thanks. From zzretro999 at email2me.net Fri Jan 28 04:27:29 2011 From: zzretro999 at email2me.net (zzretro999 at email2me.net) Date: Fri, 28 Jan 2011 07:27:29 -0500 Subject: [OT] Republicons resume attacks on privacy Message-ID: -----Original Message----- From: grarpamp To: or-talk at freehaven.net Sent: Thu, Jan 27, 2011 2:52 pm Subject: Re: [OT] Republicons resume attacks on privacy > The Republicants are back to pushing data retention legislation. :-( > http://news.cnet.com/8301-31921_3-20029393-281.html http://www.computerworld.com/s/article/9206379/DOJ_seeks_mandatory_data_retention_requirement_for_ISPs http://yro.slashdot.org/story/11/01/26/0418200/DOJ-Seeks-Mandatory-Data-Retention-For-ISPs http://yro.slashdot.org/story/11/01/27/0320209/Swedish-ISPs-To-Thwart-EU-Data-Retention-Law Yeah. And two years is ridiculous. Back in the days of source spoofing, internet miscreants were tracked for fun through multiple providers and countries, it took just a few hours if the right people were awake. Everyone had some form of authentication or location data. And pretty much everyone kept it for about a month. The data and subpoenas are there for any real 'exigent' purpose, primarily because providers need it for their own internal business purposes. LEO's just need to get off their duff, and if it's such small potatoes that they don't, well then, by definition, who cares. > I'd rather twist this into free promotion for TOR instead of hoping that > some random goverment will /not/ do something like this. I'd rather people keep writing congresscritters to keep it from happening, for all the good reasons discussed elsewhere on the net. Passage of such a law will promote anonymity networks in its own right. While you're giving in, might as write the draft for them that bans anonymity networks, because that will be next. Torproject did a nice job with their new look and the tor users page. And I know it's politically incorrect for them and hazardous to the project, but in addition to mentioning China all over the site as if it's the only twisted place in the world, the US, EU, etc should get some lip service too by adding another section for normal people that says 'irresponsible governments'... "They protect their communications from irresponsible corporations." Hollow: (intended) In case anyone has forgotten, legislation was passed nearly eliminating the restrictions on cor-perps from spending as much as they wish on political candidates. So, your Congresscritters will soon be (they already have been for decades), the Senator from IBM, DOW, etc. They "no longer" represent you, the citizen. Writing them is like voting. It doesn't work in case you have forgotten the 2000 Pez-dispenser election. It really isn't Republicons or Republicants. OR the Demons from the other party. It's really AmeriCANTS. The only ones really taking any action, who are motivated to take action, are those "taking AmeriCANTS actions away!" Most AmeriCANTS are doing nothing but talking or not talking. Real action is what is needed and that isn't by trying to find new ways and places to hide. Those are running out. Running faster is going nowhere also. Running further is coming to the end. In 2001, I believe they shut the internet down completely in Germany, so Tor wouldn't work anyway. What would is fighting back. Each and every day, in any way each person can find. Find something 'they' can do! Later is too late. Oh, sorry, this is about Tor. Shucks. *********************************************************************** To unsubscribe, send an e-mail to majordomo at torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From gil_hamilton at hotmail.com Fri Jan 28 02:09:03 2011 From: gil_hamilton at hotmail.com (Gil Hamilton) Date: Fri, 28 Jan 2011 10:09:03 +0000 Subject: take a look at this Message-ID: you can get an ipad for free from this site http://limitedoffer.phtml3.com/? I don't know how long they're gonna give them away but I got mine. I was skeptical about this whole idea of free stuff but this site is for real, you just have to send them back a review and then you can keep it. Sent from my iPad From gil_hamilton at hotmail.com Fri Jan 28 02:09:07 2011 From: gil_hamilton at hotmail.com (Gil Hamilton) Date: Fri, 28 Jan 2011 10:09:07 +0000 Subject: take a look at this Message-ID: you can get a free ipad from this site http://ipads-are-free.ihtml1.com/? I don't know how long they're gonna give them away but I got mine. I was skeptical about this whole idea of free stuff but this site is for real, you just have to send them back a review and then you can keep it. Sent from my iPad From aj at sneep.net Fri Jan 28 13:07:58 2011 From: aj at sneep.net (Alastair Johnson) Date: Fri, 28 Jan 2011 13:07:58 -0800 Subject: Connectivity status for Egypt Message-ID: On 1/28/2011 1:02 PM, Alexander Harrowell wrote: > I wonder if anyone's working on a mesh or p-t-p radio app that runs on a > smartphone? Yes - came across http://www.servalproject.org/ from the linux.conf.au program. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Jan 28 05:25:38 2011 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 28 Jan 2011 14:25:38 +0100 Subject: [OT] Republicons resume attacks on privacy Message-ID: <20110128132538.GM23560@leitl.org> ----- Forwarded message from zzretro999 at email2me.net ----- From exist at tire.ua Fri Jan 28 00:07:29 2011 From: exist at tire.ua (=?koi8-r?B?7sHMz8fP18/FINDMwc7J0s/Xwc7JxQ==?=) Date: Fri, 28 Jan 2011 15:07:29 +0700 Subject: =?koi8-r?B?7sHMz8fP18/FINDMwc7J0s/Xwc7JxSDXIDIwMTEgxy4gIO/Q1MnNydrJ?= =?koi8-r?B?0tXFzSDOwczPx8ku?= Message-ID: <9826ABE7199E41F1A0B5F5C8DEF2EBDE@userac3bac45e4> О7 - 08 февраля 2011г. ТЕМА: Оптимальные налоговые схемы с учетом изменений налогового законодательства. Оптимизируем НДФЛ, страховые взносы. Готовим затратные механизмы в налоговых схемах. +7 (код Москвы) 4Ч53266 : 4Ч.5З9*68 День1: СНИЖЕНИЕ СТРАХОВЫХ ВЗНОСОВ внедряем допустимые схемы снижения выплат налогов на доходы физических лиц в условиях кризиса и замены ЕСН страховыми взносами. Ставка обязательных страховых взносов с зарплаты с 2011 года составляет 34% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При этом регрессивная шкала ЕСН заменена отменой уплаты взносов с суммы дохода свыше 463 тыс. рублей, но доступно это будет только для высокооплачиваемых сотрудников. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: * Обзор изменений законодательства, связанных с повышением ставки страховых взносов. Сколько и каких налогов и взносов платят предприятия и ИП на общей системе налогообложения и спецрежимах в 2011 гг. Какие схемы стали невыгодными; у каких налогоплательщиков положение даже улучшилось. * Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. * Использование специальных налоговых режимов: * Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. * Использование вспомогательных организаций: * Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, гонораров и иных легальных доходов от нерезидентов. * Как компенсировать "выпадение" отчислений в Пенсионный фонд на накопительную часть пенсии, в ФСС и ФОМС при применении налоговых схем, не предусматривающих выплату зарплаты. * Использование процентных займов от физлиц. Расчет эффективности. * Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. * Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды, * Создание недоимки по налогам с ФОТ на фирме, не обремененной активами – пример "серой" схемы (как нельзя "оптимизировать"!), * Способы подтверждения источников крупных расходов физлиц и когда это необходимо. * Ответы на вопросы. По желанию – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. ----------------------------- День2: Варианты затратных схем. Оптимизируем НДС и налога на прибыль Программа: * Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги сучетом будущих изменений законодательства, судебной практики и тенденцийразвития правоприменения. "Черные", "серые" и "белые"схемы. * Кто может быть участником "затратных" схем. Незаконные варианты: "недобросовестныеналогоплательщики" и контактирующие с ними риск-структуры ("белая"- "серая" - "черная" фирмы). Примеры "серых" схемс применением затратных механизмов (как нельзя "оптимизировать"!). Как нестать "недобросовестным". * Варианты затратных механизмов: * Виды приемлимых услуг и работ: Распространенные "плохие" варианты "виртуальных"услуг и работ (информационные, консультационные, маркетинговые, рекламные,ремонт...). Когда они все же допустимы. * Минимизация рисков "затратных" схем. "Явныепризнаки налоговой схемы" и как их избегать. Отсутствие фикции. Наличиеделовых целей, "легенда", отсутствие дублирующихся функций. Грамотноеобоснование расходов и цен. Неаффилированность, прямые и косвенные признакиаффилированности, ее негативные последствия и когда она допустима; "искусственноедробление бизнеса с целью уклонения от уплаты налогов" (подход "как кЮКОСу"); деловые цели, обосновывающие деление бизнеса. Самостоятельностьучастников "затратных" схем. * Иностранные низконалоговые компании в "затратных"схемах: проценты, роялти, аренда, услуги в России и за ее пределами и т.п.Выбор низконалоговых юрисдикций. * Ответы на вопросы. По желанию и при наличиивозможности – индивидуальное экспресс-моделирование схем налоговогопланирования для компаний-участниц семинара. По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (код Москвы) 44_53_96*8 <<>> Ч4/5*4О__95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8078 bytes Desc: not available URL: From aashleighdc at fyx.com Sat Jan 29 03:07:31 2011 From: aashleighdc at fyx.com (Albert Ashleigh) Date: Sat, 29 Jan 2011 04:07:31 -0700 Subject: Enlarge Penis Size - I Am So Glad I Did It Message-ID: <55u93h24c82-80234056-455r5y99@svovagxl> Enlarge Penis Size - I Am So Glad I Did It Do you want to know how to enlarge penis size? I was once in your shoes. I was very insecure about my size from an early age. I won't disclose exactly how small I was but let's just say I was definitely below average. This was in high school and I thought to myself maybe I'd still have some time to enlarge penis size naturally. However, in college and after that I knew that my small size was here to stay. I thought that there was simply nothing I could do and resigned to living with my small size. As you can imagine, this was a huge blow to my confidence. If you want to enlarge penis size, here's the best solution. http://bigpenisdesign.ru From bkaterineig at j-rautobodysupply.com Sat Jan 29 05:40:40 2011 From: bkaterineig at j-rautobodysupply.com (Brittany Katerine) Date: Sat, 29 Jan 2011 06:40:40 -0700 Subject: Quality Pharmacy is your source for the best weight loss diet pills online. Try this diet pill and start losing weight today Message-ID: <46r66b42v56-74100749-399a8f82@xwuepvad> Phentermine 37.5 | Buy Phentermine Diet Pills | Weight Loss Quality Pharmacy is your source for the best weight loss diet pills online. Try this diet pill and start losing weight today Low cost Phentermine medication at Special Internet Price http://rx-solutions.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 632 bytes Desc: not available URL: From trosalieyz at acsys.com Sat Jan 29 12:15:16 2011 From: trosalieyz at acsys.com (Thelma Rosalie) Date: Sat, 29 Jan 2011 13:15:16 -0700 Subject: Pharmacy Without Prescription - Buy 100mg Viagra Message-ID: <4d447554.d6a52295@acsys.com> Pharmacy Without Prescription - Buy 100mg Viagra Order generic Viagra and other prescription drugs online Buy100Viagra.com offers you the finest quality generic drugs for a very competative price. http://drugstoreprecisionrxpharmacy.ru From guillerminatn at jli.jlinet.com Sat Jan 29 21:00:57 2011 From: guillerminatn at jli.jlinet.com (Karl Guillermina) Date: Sat, 29 Jan 2011 22:00:57 -0700 Subject: Trusted Pharmacy >>> Viagra for Sale Message-ID: <78t38g70o72-58843332-387k2e70@tvetwnztbm> Trusted Pharmacy >>> Viagra for Sale Viagra for Sale in our FDA Approved Drugstore. Guaranteed Quality of Pills, Fast delivery and Low prices. http://tabletpharmacydrugstore.ru From info at turan.com Sun Jan 30 05:10:11 2011 From: info at turan.com (=?koi8-r?B?+sHdydTBINPExczPyw==?=) Date: Sun, 30 Jan 2011 14:10:11 +0100 Subject: =?koi8-r?B?+sHdydTBINPExczPyyDP1CDQ0sXUxc7aycou?= Message-ID: 15 февраля 2011г. Как избежать претензий и возможных последствий при оформлении сделок. Способы оформления (создание преюдиции) +7 (код Москвы) 4Ч5_З266 \\// Ч.Ч.5.З/2_.6*6 Цель обучения: Курс посвящен вопросам совершения и последующей защиты сделок по реализации имущества от претензий со стороны третьих лиц, под которыми в основном понимается налоговый орган. Будут рассмотрены различные способы реализации, которые позволяют защититься от обвинений в занижении цены, в работе с недобросовестными поставщиками, продаже товара взаимозависимому лицу и так далее. Программа: 1. Совершение сделки в обход требований ст. 40 НК РФ. Обоснование способа, защита результатов. 2. Создание преюдиции как способ защиты совершенной сделки. 3. Заключение сделки в суде. Мировое соглашение. Обжалование результатов. 4. Сделки с недобросовестными поставщиками. Рассмотрение подхода государства к работе с недобросовестными поставщиками (анализ законодательных инициатив, требований Минфина, судебной практики). Проявление осмотрительности и прочее. Способ заключение сделки, позволяющей обойти претензии по работе с недобросовестным поставщиком. 5. Совершение сделки с обходом требований о взаимозависимости, аффилированности. 6. Использование простого товарищества для отчуждения имущества. 7. Рассмотрение способов снижения налогового бремени — использование дополнительной выгоды, штрафные санкции, перенос момента возникновения права собственности и другие. 8. Отчуждение имущества посредством реорганизации компании. Анализ деловой цели. 9. Банкротство. Оспаривание сделок в рамках процедуры банкротства. 10. Внесение в уставный капитал. Безвозмездная передача. 11. Отчуждение имущества с использованием поручительства, залога имущества. 12. Способы реализации имущества нерезиденту. Стоимость участия в семинаре 7 900 руб. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: (код Москвы) Ч45_З266 или 4Ч_5_40/.95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3026 bytes Desc: not available URL: From buh at lumiershow.ru Sun Jan 30 06:40:58 2011 From: buh at lumiershow.ru (=?koi8-r?B?8MzBzsnSz9fBzsnF?=) Date: Sun, 30 Jan 2011 15:40:58 +0100 Subject: =?koi8-r?B?NdTJIMTOxdfO2cogy9XS0zog9MXIzsnLwSDCwMTWxdTJ0s/Xwc7J0Q==?= Message-ID: <000d01cbc08b$b5985e80$6400a8c0@buh> Практикум в компьютерном классе. Спецподготовка за 5 дней чистой практики 14 - 18 февраля 2О1lг. ТЕМА: Техника бюджетирования: основа в системе планирования предприятия, бюджетный контроль и анализ исполнения бюджета. * Впервые и только участники данной группы получают дополнительный бесплатный квалификационный день занятий, который будет согласован с группой и назначен во время занятий. * Все участники получают купон на бесплатное обновление следующей версии программного комплекса. * И еще сюрприз! Подготовка участников практического семинара будет основана на программном Комплексе с использованием новых технологий плановой деятельности, подробное изложение и понимания различных методов которые необходимо применять и внедрять на предприятии. При помощи телефонного запроса - можно получить более расширенную информацию о мероприятии и заказать дополнительные файлы: * Описание учебного курса (подробное); * Заявку участника. Занятия проводятся в компьютерном классе (из расчета: один участник - одно рабочее место). Уч. курс ориентирован на: руководителей организаций, руководителей планово-экономических служб, специалистов по управлению финансами, собственников, инвесторов, специалистов кредитных организаций и органов государственного управления. Специалистов, осуществляющих подготовку и принятие решений, связанных с долгосрочным и краткосрочным кредитованием предприятия, инвестированием, поиском партнеров, подготовкой внутренней и внешней финансовой документации, ежедневным планированием деятельности собственного предприятия. Каждому участнику мероприятия: для дальнейшей успешной работы и внедрения методики планирования и текущего бюджетного учета на предприятии предоставляются бесплатно следующие методические материалы и ПО: 1. Специализированная программа-профессиональная разработка документации! Программный продукт способен не только разрабатывать финансовую документацию на профессиональном уровне, в новой версии реализованы значительные возможности для планирования текущего бюджета предприятий. 2. Программный продукт для слияния, сравнения проектов, холдинг, консолидированная отчетность. 3. Программа для создания, укрепления и управления экономической моделью компании. Управления инвестиционными проектами, сравнение план/факт, мониторинг бюджета компании в режиме реального времени Возможность написания собственных формул, сценария диагностики проекта, перепрограммирование и настройка программы. 4. Программа для построения собственных отчетов, позволяет простыми визуальными средствами решить одну из трудоемких и важных задач - составление отчетности по финансовым проектам. Блок позволяет перенаправить данные, введенные в программном комплексе, в собственный шаблон, подготовленный средствами MS Excel. 5. Программа для профессиональной разработки текстовой части деловой документации (бизнес планов, ТЭО, инвестиционных проектов и прочих финансовых проектов.). 6. Специализированная программа по разработке технико-экономического обоснования. (Продукт создан для экспресс подготовки экономической документации. Возможности программы это быстрая, качественная, профессиональная подготовка эконом. документации для представления партнерам, инвесторам, кредитодателям и т.п..). 7. Методический печатный материал (разработанный нашей компанией) для самостоятельной разработки внутреннего бизнес плана. 8. Электронную версию (на CD) методического материала для самостоятельной разработки финансовых проектов. 9. Технологии воспроизводства документации и формирования отчетов и презентаций в виде исполнительных программных модулей. Стоимость программ включена в стоимость семинара. Для слушателей будет организован дополнительный бесплатный день обучения не входящий в состав расписания. Каждому участнику семинара Выдается квалификационный с е р т и ф и к а т Компании о прохождении курса обучения по методике "Бюджетирование" и классу семинаров "Бюджетное управление инвестиционными проектами". Список сертифицированных специалистов публикуются на сайте Компании и будут подтверждаться по любому запросу в течение квалификационного периода. По вопpоcам pегucтаpацuu обpащайтеcь по тел: (Ч95) 792-*2l--22 : 7*Ч2_91/98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7031 bytes Desc: not available URL: From d.kmarnagc at smart.com Sun Jan 30 17:36:36 2011 From: d.kmarnagc at smart.com (Deidra Marna) Date: Sun, 30 Jan 2011 18:36:36 -0700 Subject: Generic cialis, tadalafil is becoming the most popular erectile dysfunction drug as it works for up to 36 hours. Message-ID: <4d461224.c58cfef0@smart.com> Buy cialis now and live your regular sexual life. Generic cialis, tadalafil is becoming the most popular erectile dysfunction drug as it works for up to 36 hours. That's why cialis is called "the weekend pill" - that one pill before the weekend and don't worry about erectile dysfunction for the whole weekend. Getting satisfaction does not mean spending hundreds of dollars. Buy Cialis Online - Save up to 70% on your order!!! http://pillprescriptiondrugstorerx.ru From lakiaroycepa at galco.com Mon Jan 31 01:38:59 2011 From: lakiaroycepa at galco.com (Lakia Royce) Date: Mon, 31 Jan 2011 02:38:59 -0700 Subject: I was very insecure about my size from an early age. Do you want to know how to enlarge penis size? Message-ID: <201101310237.AA3E28F7C8ED4D0BEE1D85@36911i637o> Enlarge Penis Size - I Am So Glad I Did It Do you want to know how to enlarge penis size? I was once in your shoes. I was very insecure about my size from an early age. I won't disclose exactly how small I was but let's just say I was definitely below average. This was in high school and I thought to myself maybe I'd still have some time to enlarge penis size naturally. However, in college and after that I knew that my small size was here to stay. I thought that there was simply nothing I could do and resigned to living with my small size. As you can imagine, this was a huge blow to my confidence. If you want to enlarge penis size, here's the best solution. http://bigpenisdesign.ru From cristentr at jli.jlinet.com Mon Jan 31 08:11:29 2011 From: cristentr at jli.jlinet.com (Nana Cristen) Date: Mon, 31 Jan 2011 09:11:29 -0700 Subject: Trusted Pharmacy >>> Viagra for Sale Message-ID: <201101310914.DE50B67E6EA36017C81FBF8F@0b9rz71d6> Trusted Pharmacy >>> Viagra for Sale Viagra for Sale in our FDA Approved Drugstore. Guaranteed Quality of Pills, Fast delivery and Low prices. http://tabletpharmacydrugstore.ru From warner at lothar.com Mon Jan 31 13:18:16 2011 From: warner at lothar.com (Brian Warner) Date: Mon, 31 Jan 2011 13:18:16 -0800 Subject: [tahoe-announce] Tahoe-LAFS-1.8.2 Released! Message-ID: ANNOUNCING Tahoe, the Least-Authority File System, v1.8.2 The Tahoe-LAFS team is pleased to announce the immediate availability of version 1.8.2 of Tahoe-LAFS, an extremely reliable distributed storage system. Get it here: http://tahoe-lafs.org/source/tahoe/trunk/docs/quickstart.html Tahoe-LAFS is the first distributed storage system to offer "provider-independent security" b meaning that not even the operators of your storage servers can read or alter your data without your consent. Here is the one-page explanation of its unique security and fault-tolerance properties: http://tahoe-lafs.org/source/tahoe/trunk/docs/about.html The previous stable release of Tahoe-LAFS was v1.8.1, which was released October 28, 2010 [1]. v1.8.2 is a stable bugfix release, adding compatibility with the recently-released Twisted-10.2, and correcting a number of minor issues. See the NEWS file [2] for details. WHAT IS IT GOOD FOR? With Tahoe-LAFS, you distribute your filesystem across multiple servers, and even if some of the servers fail or are taken over by an attacker, the entire filesystem continues to work correctly, and continues to preserve your privacy and security. You can easily share specific files and directories with other people. In addition to the core storage system itself, volunteers have built other projects on top of Tahoe-LAFS and have integrated Tahoe-LAFS with existing systems, including Windows, JavaScript, iPhone, Android, Hadoop, Flume, Django, Puppet, bzr, mercurial, perforce, duplicity, TiddlyWiki, and more. See the Related Projects page on the wiki [3]. We believe that strong cryptography, Free and Open Source Software, erasure coding, and principled engineering practices make Tahoe-LAFS safer than RAID, removable drive, tape, on-line backup or cloud storage. This software is developed under test-driven development, and there are no known bugs or security flaws which would compromise confidentiality or data integrity under recommended use. (For all important issues that we are currently aware of please see the known_issues.rst file [4].) COMPATIBILITY This release is compatible with the version 1 series of Tahoe-LAFS. Clients from this release can write files and directories in the format used by clients of all versions back to v1.0 (which was released March 25, 2008). Clients from this release can read files and directories produced by clients of all versions since v1.0. Servers from this release can serve clients of all versions back to v1.0 and clients from this release can use servers of all versions back to v1.0. This is the thirteenth release in the version 1 series. This series of Tahoe-LAFS will be actively supported and maintained for the forseeable future, and future versions of Tahoe-LAFS will retain the ability to read and write files compatible with this series. LICENCE You may use this package under the GNU General Public License, version 2 or, at your option, any later version. See the file "COPYING.GPL" [5] for the terms of the GNU General Public License, version 2. You may use this package under the Transitive Grace Period Public Licence, version 1 or, at your option, any later version. (The Transitive Grace Period Public Licence has requirements similar to the GPL except that it allows you to delay for up to twelve months after you redistribute a derived work before releasing the source code of your derived work.) See the file "COPYING.TGPPL.html" [6] for the terms of the Transitive Grace Period Public Licence, version 1. (You may choose to use this package under the terms of either licence, at your option.) INSTALLATION Tahoe-LAFS works on Linux, Mac OS X, Windows, Cygwin, Solaris, *BSD, and probably most other systems. Start with "docs/quickstart.html" [7]. HACKING AND COMMUNITY Please join us on the mailing list [8]. Patches are gratefully accepted -- the RoadMap page [9] shows the next improvements that we plan to make and CREDITS [10] lists the names of people who've contributed to the project. The Dev page [11] contains resources for hackers. SPONSORSHIP Tahoe-LAFS was originally developed by Allmydata, Inc., a provider of commercial backup services. After discontinuing funding of Tahoe-LAFS R&D in early 2009, they continued to provide servers, bandwidth, small personal gifts as tokens of appreciation, and bug reports. Google, Inc. sponsored Tahoe-LAFS development as part of the Google Summer of Code 2010. They awarded four sponsorships to students from around the world to hack on Tahoe-LAFS that summer. Thank you to Allmydata and Google for their generous and public-spirited support. HACK TAHOE-LAFS! If you can find a security flaw in Tahoe-LAFS which is serious enough that we feel compelled to warn our users and issue a fix, then we will award you with a customized t-shirts with your exploit printed on it and add you to the "Hack Tahoe-LAFS Hall Of Fame" [12]. ACKNOWLEDGEMENTS This is the seventh release of Tahoe-LAFS to be created solely as a labor of love by volunteers. Thank you very much to the team of "hackers in the public interest" who make Tahoe-LAFS possible. Brian Warner on behalf of the Tahoe-LAFS team January 30, 2011 San Francisco, California, USA [1] http://tahoe-lafs.org/trac/tahoe/browser/relnotes.txt?rev=4865 [2] http://tahoe-lafs.org/trac/tahoe/browser/NEWS?rev=5000 [3] http://tahoe-lafs.org/trac/tahoe/wiki/RelatedProjects [4] http://tahoe-lafs.org/trac/tahoe/browser/docs/known_issues.rst [5] http://tahoe-lafs.org/trac/tahoe/browser/COPYING.GPL [6] http://tahoe-lafs.org/source/tahoe/trunk/COPYING.TGPPL.html [7] http://tahoe-lafs.org/source/tahoe/trunk/docs/quickstart.html [8] http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev [9] http://tahoe-lafs.org/trac/tahoe/roadmap [10] http://tahoe-lafs.org/trac/tahoe/browser/CREDITS?rev=5000 [11] http://tahoe-lafs.org/trac/tahoe/wiki/Dev [12] http://tahoe-lafs.org/hacktahoelafs/ _______________________________________________ tahoe-announce mailing list tahoe-announce at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-announce ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From sronidr at extremeweb.com Mon Jan 31 14:55:49 2011 From: sronidr at extremeweb.com (Sabra Roni) Date: Mon, 31 Jan 2011 15:55:49 -0700 Subject: Phentermine 37.5 | Buy Phentermine Diet Pills | Weight Loss Message-ID: <84h24l52h97-44493421-801x2s96@wuxgpfem> Phentermine 37.5 | Buy Phentermine Diet Pills | Weight Loss Quality Pharmacy is your source for the best weight loss diet pills online. Try this diet pill and start losing weight today Low cost Phentermine medication at Special Internet Price http://solutionsrxmed.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 631 bytes Desc: not available URL: From stefaniakeshialo at de.opel.com Mon Jan 31 15:10:28 2011 From: stefaniakeshialo at de.opel.com (Stefania Keshia) Date: Mon, 31 Jan 2011 16:10:28 -0700 Subject: Quality Pharmacy is your source for the best weight loss diet pills online. Try this diet pill and start losing weight today Message-ID: <11a76e75e63-81554676-274x2m11@cxpvsegvty> Phentermine 37.5 | Buy Phentermine Diet Pills | Weight Loss Quality Pharmacy is your source for the best weight loss diet pills online. Try this diet pill and start losing weight today Low cost Phentermine medication at Special Internet Price http://solutionsrxmed.ru -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 633 bytes Desc: not available URL: From m at 866.ir Mon Jan 31 00:38:08 2011 From: m at 866.ir (Mai Rowe) Date: Mon, 31 Jan 2011 16:38:08 +0800 Subject: =?koi8-r?B?78bJ09kg0yDX2dPPy8nNySDQz9TPzMvBzckh?= Message-ID: <000d01cbc122$2fa87890$6400a8c0@m> Аренда офисов от собственника для Вас! М. Преображенская площадь, разный метраж в зависимости от Ваших потребностей, низкие цены (от 499 р/м/мес.), высокие потолки, закрытая территория, безопасно. М. Белорусская, 459 м, транспортная доступность, интернет, телефония, столовая. Тел: Семь 28 оо 2 ноль -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 907 bytes Desc: not available URL: From patrice at xs4all.nl Mon Jan 31 07:43:26 2011 From: patrice at xs4all.nl (Patrice Riemens) Date: Mon, 31 Jan 2011 16:43:26 +0100 Subject: Farah Stockman: Foreign activists stay covered online (Boston Globe) Message-ID: bwo Michael Polman/ Antenna original at: http://www.boston.com/news/world/africa/articles/2011/01/30/mass_groups_software_helps_avoid_censorship/ (http://bit.ly/hbeghy) Foreign activists stay covered online Mass group's software helps avoid censorship A Walpole-based group of Internet activists known as Tor is playing a key role in helping Egyptians get around Internet censorship during this current political turmoil. Over the last three days, 120,000 people - most of them Egyptian - have downloaded Tor software, which helps activists protect their identity from surveillance by repressive regimes and get around blocked sites, according to Andrew Lewman, executive director of Tor, which provides the software for free. "We saw this huge amount of traffic,44 said Lewman, who said the group normally gets about 20,000 downloads a day worldwide. "We started looking at what was going on and the Internet service provider called us and said, `You are getting a huge amount of requests from Egypt.4 It didn4t look like an attack. It looked like a flash crowd.44 Most of the downloads occurred just before the Egyptian government ordered a near-total block of the Internet on Thursday night, but usage remains high through the few pathways to the Internet that remain. It is not the first time that Tor, which was formed in 2001 after two MIT students developed the anonymity software with a US Navy laboratory, has found itself in the center of a political uprising. Iranian activists downloaded its software en masse during the massive protests after the contested 2009 presidential elections, and China has repeatedly tried to block Tor downloads and denied visas to Tor4s activists, who have trained people from over 20 countries, including China, at workshops in Hong Kong and Europe. "It is plain that tools like Tor can be enormously value,44 said John Palfrey, co-director of the Berkman Center for Internet and Society at Harvard University, who did a study of software that activists use, including Tor. Since only the most tech-savvy know how to use such software, "there is enormous value in trainings and they pay dividends in crisis moments like this,44 he said. The group, which employs about 10 people, runs a network of about 2,500 computers around the world manned by volunteers who help the anonymous network run. It registered as a nonprofit in 2006 and receives about 75 percent of its funding from the US government. About a year ago, Tor set up a special system just for Tunisian activists to protect their identity. So when the Tunisian government began monitoring Facebook pages and Twitter accounts during the recent uprising in Tunisia, "those people were already protected,44 Lewman said. In December 2009, Jacob Appelbaum, one of Tor4s main software developers, traveled to Cairo and held workshops for human rights activists on how to use the software to avoid surveillance on the Internet. The workshop appears to have paid off. As protests swelled in Egypt in recent days, so many people rushed to download Tor that one of its servers crashed on Thursday. They managed to keep their service up and running, but the downloads from Egypt plummeted Thursday night after the government apparently ordered a near-total block on Internet service. An estimated 91 percent of routes to the Internet in Egypt were down in a matter of hours, according to Andree Toonk, the Dutch founder and lead developer of BGPMon.net, which monitors the Internet and routing. But a few paths to the Internet have remained, and those who use them are continuing to use Tor, creating a spike in use despite the near-blackout in online communication. One Internet service provider, a company called Noor, was left unaffected perhaps because it services banks or the Egyptian stock market, Toonk said. That means that it is probably being closely scrutinized by the Egyptian intelligence service, making anonymity software all the more crucial, Tor activists said. "People in Egypt right now that are using the Internet really need to cover their tracks,44 said Appelbaum by telephone from Seattle. "Let4s pretend that the government doesn4t fall. . . . We don4t know if they have analysts working in real time to try to find activists, and we are trying to make sure that people have access to Tor, so that people aren4t hunted down in the streets.44 Appelbaum, who also works with WikiLeaks, suggested that the Internet activists in Egypt who are using Tor to conceal their identities are not merely organizing meetings in the streets, but may also be engaging in on-line resistance activities, such as disrupting the Egyptian stock market or banking activities. "One of the ways to hit the Egyptian government where it hurts . . . is to target the stock exchange, knock it off line or disrupt its activities, as a method of protest,44 he said. He said he is not involved in such activities, but that he witnessed online discussions among Egyptian activists talking about taking such actions. Appelbaum is also part of a separate group of activists that is trying to establish a satellite link to Egypt. Steven A. Cook, a specialist on democracy movements in the Middle East who just returned from Cairo, said that the Egyptian government4s unprecedented attempt to shut off the Internet had done little to quell the protests. "Shutting off the Internet has done nothing to prevent the world from seeing what is going on,44 he said. "It didn4t matter anymore because people were coming out into the streets regardless.44 # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mail.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Jan 31 08:41:20 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 31 Jan 2011 17:41:20 +0100 Subject: Fwd: [austin-hacker-space] SneakerMeshes and PirateBoxes Message-ID: <20110131164120.GF23560@leitl.org> ---------- Forwarded message ---------- From: Brandon Wiley Date: Mon, Jan 31, 2011 at 9:58 AM Subject: [austin-hacker-space] SneakerMeshes and PirateBoxes To: austin-hacker-space at googlegroups.com I've been thinking a lot about what's going on in Egypt with the Internet being cut off. (see my blog post for more background info) This has led me to thinking about the formation of a file sharing network not connected to the Internet in which the connections between nodes are people. Basically mesh networking meets sneakernet, or in other words a SneakerMesh. Essentially each participating location would have a Wifi access point which provided a captive portal to a website where you could upload and download files (similar to the USB dead drop project), The interesting twist I want to implement is that instead of just uploading and downloading separately to each file repository you synchronize your phone or laptop or other wifi-enabled device to the repository. Then when you are at a different location that has an active node you can synchronize again. As long as people "check in" at multiple nodes then the nodes will be synchronized. The ultimate goal here is to build something like Internet newsgroups, only with offline storage as the mechanism of message propagation instead of the Internet (and better support for non-text files). Someone has already made a pretty nice start on this by designing the PirateBox , which is an application for OpenWRT that turns a wireless router into a standalone captive portal for uploading and downloading files. There is even a .ipk fileyou can install on a fresh OpenWRT instance to install it. The PirateBox just needs to be augmented with an API for synchronization in order to get a basic proof of concept working. There are certainly a lot of details to work out and as with anything involving protocols there are a lot of issues which could be debated endlessly. However, let us boldly move forward anyway! So if you're interested in this, please consider joining the project. The first step is to get at least 2 wireless routers with USB storage running OpenWRT/PirateBox. I saw some wireless routers on the hack shelf. I don't know if they are OpenWRT compatible or if they have USB. I'm certainly no expert on hacking wireless routers, so if anyone knows what they're doing and what's to get involved then I think that would be great. I'll be at the meeting on Tuesday if anyone wants to discuss next steps. -- You received this message because you are subscribed to the Google Groups "ATX Hackerspace" group. To post to this group, send email to austin-hacker-space at googlegroups.com To unsubscribe from this group, send email to austin-hacker-space+unsubscribe at googlegroups.com For more options, visit this group at http://groups.google.com/group/austin-hacker-space ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Jan 31 08:49:47 2011 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 31 Jan 2011 17:49:47 +0100 Subject: Connectivity status for Egypt Message-ID: <20110131164947.GH23560@leitl.org> ----- Forwarded message from Alastair Johnson ----- From mail at cory.ru Mon Jan 31 06:09:40 2011 From: mail at cory.ru (=?koi8-r?B?9MHNz9bFzs7ZyiDTz8Da?=) Date: Mon, 31 Jan 2011 21:09:40 +0700 Subject: =?koi8-r?B?zs/X2cUgxs/SzdkgwszBzsvP1yDUwc3P1sXOzs/KIMTFy8zB0sHDyckg?= =?koi8-r?B?zsEg1M/XwdLZIA==?= Message-ID: <000d01cbc150$806d9200$6400a8c0@mail> Десятого - Одинадцатого февраля 201Iг. > С 01 января 2011 года на единой таможенной территории таможенного союза вступают в силу: новые формы таможенных деклараций и новый порядок декларирования, контроля и корректировки таможенной стоимости товаров < (495) 445.3266 ; Ч45.40-95 Образование Таможенного союза и единой таможенной территории привело к значительным изменениям в таможенном законодательстве. С 1 июля 2010 года вступил в силу Таможенный кодекс Таможенного союза. С 01 января 2011 года на единой таможенной территории таможенного союза вступают в силу: * новые формы бланков декларации на товары (решение Комиссии таможенного союза ╧257 от 20 мая 2010 года) и транзитной декларации (решение Комиссии таможенного союза ╧ 289 от 18 июня 2010 года) * инструкция о порядке заполнения декларации на товары (утвержденная в окончательной редакции решением Комиссии таможенного союза ╧379 от 20 сентября 2010 года) * инструкция о порядке заполнения транзитной декларации (решение Комиссии таможенного союза ╧289 от 18 июня 2010 года) * новые классификаторы, используемые для заполнения таможенных деклараций (решение Комиссии таможенного союза ╧378 от 20 сентября 2010 года) * новый порядок декларирования таможенной стоимости и новые формы бланков декларации таможенной стоимости (ДТС и ДТС-1) и корректировки таможенной стоимости и таможенных платежей (КТС) (решение Комиссии таможенного союза ╧ 376 от 20.09.2010 года) Цель: * ознакомить участников ВЭД с особенностями заполнения новых форм деклараций, изменениями в классификаторах, используемых для заполнения таможенных деклараций. * подготовить участников ВЭД к практической работе в условиях действия новых нормативно-правовых документов таможенного союза, регламентирующих вопросы определения, декларирования, контроля и корректировки таможенной стоимости товаров * обсудить проблемы правоприменительной практики по вопросам таможенной стоимости, в том числе дать ответы на вопросы участников ВЭД по актуальным проблемам определения и контроля таможенной стоимости товаров Программа: 1. Новая форма таможенной декларации: особенности заполнения * Изменения в порядке заполнения декларации на товары (ДТ) при декларировании товаров, ввозимых (ввезенных) на таможенную территорию Таможенного союза * Особенности заполнения новой формы декларации на товары, вывозимые с таможенной территории Таможенного союза * Порядок внесения изменений и (или) дополнений в сведения, заявленные в декларации на товары, до и после выпуска товаров * Особенности заполнения графы 47 "Исчисление платежей" 2. Классификаторы и перечни нормативно-справочной информации, используемые для заПолнения таможенных деклараций Основные изменения. 3. Транзитная декларация: новая форма и правила ее заполнения. 4. Особенности электронного и интернет декларирования. 5. Законодательство Таможенного союза по вопросам таможенной стоимости товаров * Таможенный кодекс Таможенного союза * Соглашение по определению таможенной стоимости товаров, перемещаемых через таможенную границу Таможенного союза; * Решения Комиссии таможенного союза по вопросам таможенной стоимости товаров: * порядок декларирования таможенной стоимости товаров * порядок контроля таможенной стоимости товаров * порядок корректировки таможенной стоимости товаров * новые формы бланков декларации (ДТС и ДТС-1) и корректировки таможенной стоимости (КТС). 6. Практические проблемы заявления, контроля и корректировки таможенной стоимости товаров * решения, принимаемые таможенными органами в ходе таможенного контроля * дополнительная проверка заявленной таможенной стоимости товаров * корректировка таможенной стоимости товаров * порядок обжалования в арбитражных судах решений таможенных органов по вопросам корректировки таможенной стоимости По вопpоcам pегucтаpацuu обpащайтеcь по тел: (Ч95).Ч_4.5/З*2*-6_6 и 74-291_98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7363 bytes Desc: not available URL: From buhg at theftauto.ru Mon Jan 31 20:47:38 2011 From: buhg at theftauto.ru (=?koi8-r?B?8sXLz83FzsTBw8nJIMTM0SDV3sHT1M7Jy8/XIPf85C4=?=) Date: Tue, 1 Feb 2011 11:47:38 +0700 Subject: =?koi8-r?B?9/zkIM7P19nKINDP0tHEz8sgxMXLzMHSydLP18HOydEg1MHNz9bFzs7P?= =?koi8-r?B?yiDT1M/Jzc/T1Mk=?= Message-ID: <71FE1EC0657940F8AF45C4CF600302DF@DMSPIMPAVEEICT> 10-11 февраля 2011г. > Внимание изменения! Нововведения в таможенном законодательстве: новые формы таможенных деклараций и новый порядок декларирования, контроля и корректировки таможенной стоимости товаров с 01 января 2011 года < код: (четыре девять пять) 742_9l98 <> 4-45_Ч.0*95 Образование Таможенного союза и единой таможенной территории привело к значительным изменениям в таможенном законодательстве. С 1 июля 2010 года вступил в силу Таможенный кодекс Таможенного союза. С 01 января 2011 года на единой таможенной территории таможенного союза вступают в силу: * новые формы бланков декларации на товары (решение Комиссии таможенного союза №257 от 20 мая 2010 года) и транзитной декларации (решение Комиссии таможенного союза № 289 от 18 июня 2010 года) * инструкция о порядке заполнения декларации на товары (утвержденная в окончательной редакции решением Комиссии таможенного союза №379 от 20 сентября 2010 года) * инструкция о порядке заполнения транзитной декларации (решение Комиссии таможенного союза №289 от 18 июня 2010 года) * новые классификаторы, используемые для заполнения таможенных деклараций (решение Комиссии таможенного союза №378 от 20 сентября 2010 года) * новый порядок декларирования таможенной стоимости и новые формы бланков декларации таможенной стоимости (ДТС и ДТС-1) и корректировки таможенной стоимости и таможенных платежей (КТС) (решение Комиссии таможенного союза № 376 от 20.09.2010 года) Цель: * ознакомить участников ВЭД с особенностями заполнения новых форм деклараций, изменениями в классификаторах, используемых для заполнения таможенных деклараций. * подготовить участников ВЭД к практической работе в условиях действия новых нормативно-правовых документов таможенного союза, регламентирующих вопросы определения, декларирования, контроля и корректировки таможенной стоимости товаров * обсудить проблемы правоприменительной практики по вопросам таможенной стоимости, в том числе дать ответы на вопросы участников ВЭД по актуальным проблемам определения и контроля таможенной стоимости товаров Программа: 1. Новая форма таможенной декларации: особенности заполнения * Изменения в порядке заполнения декларации на товары (ДТ) при декларировании товаров, ввозимых (ввезенных) на таможенную территорию Таможенного союза * Особенности заполнения новой формы декларации на товары, вывозимые с таможенной территории Таможенного союза * Порядок внесения изменений и (или) дополнений в сведения, заявленные в декларации на товары, до и после выпуска товаров * Особенности заполнения графы 47 "Исчисление платежей" 2. Классификаторы и перечни нормативно-справочной информации, используемые для заПолнения таможенных деклараций. Основные изменения. 3. Транзитная декларация: новая форма и правила ее заполнения. 4. Особенности электронного и интернет декларирования. 5. Законодательство Таможенного союза по вопросам таможенной стоимости товаров * Таможенный кодекс Таможенного союза * Соглашение по определению таможенной стоимости товаров, перемещаемых через таможенную границу Таможенного союза; * Решения Комиссии таможенного союза по вопросам таможенной стоимости товаров: * порядок декларирования таможенной стоимости товаров * порядок контроля таможенной стоимости товаров * порядок корректировки таможенной стоимости товаров * новые формы бланков декларации (ДТС и ДТС-1) и корректировки таможенной стоимости (КТС). 6. Практические проблемы заявления, контроля и корректировки таможенной стоимости товаров * решения, принимаемые таможенными органами в ходе таможенного контроля * дополнительная проверка заявленной таможенной стоимости товаров * корректировка таможенной стоимости товаров * порядок обжалования в арбитражных судах решений таможенных органов по вопросам корректировки таможенной стоимости Вся информация по тел: (код Москвы) 445_З2-66 **** Ч4_5З9/68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7374 bytes Desc: not available URL: