From vengeancebe74 at ravsoftsolutions.com Wed Aug 1 01:26:40 2012 From: vengeancebe74 at ravsoftsolutions.com (=?koi8-r?B?IvTJ0M/H0sHGydEi?=) Date: Wed, 1 Aug 2012 00:26:40 -0800 Subject: =?koi8-r?B?++/rIJYg4+Xu+SDu4SDw7+zp5/Lh5ung?= Message-ID: <5617C5AD71FD4C84A04AB95F730CE21E@waqas0150eac6f> Типография полного цикла ЛУЧШИЕ ЦЕНЫ И СРОКИ на офсетную и цифровую печать по Москве и области (т. 940-7322) УДОБНО – склад/офис - м. Курская ВЫГОДНО - гарантировано(!) самые низкие цены БЫСТРО - 5-10 рабочих дней КОМПЛЕКСНО - Каталоги, брошюры, плакаты, пакеты, буклеты, листовки, воблеры, шелфтокеры, кашированные изделия, коробки и т. д. КАЧЕСТВЕННО - Машины формата А1 5 красок, теперь и машина формата А2(!), Хедельберг А3, евроскоба,КБС,выборочный лак КОМФОРТНО - профессиональные менеджеры ответят на все Ваши вопросы Ждем Ваши заказы на просчет! Телефон Московского представительства: 940-7322 log at maillog.ru From bennett at cs.niu.edu Wed Aug 1 01:14:27 2012 From: bennett at cs.niu.edu (Scott Bennett) Date: Wed, 1 Aug 2012 03:14:27 -0500 (CDT) Subject: [tor-relays] Call for discussion: turning funding into more exit relays Message-ID: On Fri, 27 Jul 2012 01:23:57 -0400 grarpamp wrote: >>> 4) What exactly do we mean by diversity? >> >> I would look at this almost entirely from a jurisdictional and ISP level. I >> believe the biggest "sudden impact" threats to the tor network are going to >> be from legal changes (jurisdictional, i.e. "save the children, nullroute >> the nodes") and local business policy changes ("sorry tor customers, no more >> tor egress from our DC due to complaints"). > >I'm not sure which thread I mentioned this on so I'll put it here to be sure. >I think one main thing needed is a project to catalog all the current >exits as to their diversity... >Box: ISP/hoster, AS, datacenter, country, upstream AS/Tier-n path, >relay-operator >Relay-operator: country > >Without that, seems like placing nodes amounts to, 'Well, >we don't have any in Iran, let's go there'. If it turns out that >IP is more or less fed as a courtesy from UAE across the >gulf, there's not much gain. Repeat analysis for any of the >above parameters. > >More nodes are probably good, just not all as USA, Equinix, >Level3, with whatever hoster has a rack in all the DC's. I agree completely. But I would also like to add that, aside from Brasil, most of South America is still dark. Central America is not much better either. Many of those states are not especially cooperative with each other, politically speaking, yet they all need the benefits of commerce associated with the Internet. That combination strikes me as beneficial to placement of tor relays in as many of those countries as possible. Much of Africa may be worth closer examination for the same reasons. We really need to keep political diversity in view, especially given the large fractions of the tor network currently concentrated inside a mere handful of politically allied states. The Dictator of the U.S., for example, has already made the threat of shutting down the entire U.S. portion of the Internet, including relaying between other countries, which would certainly have a severely disruptive effect upon tor users all around the globe were it to happen under today's distribution of tor relays. Even more drastic would be if any of, for example, the U.K., France, Germany, or the Netherlands were to follow suit. Having countries like Venezuela, Bolivia, Peru, and Ecuador more tor-populated looks to me like a good thing. Another point I'd like to make is that I don't see why having one 100 MB/s relay is somehow better than having ten 10 MB/s relays or 20 5 MB/s relays. The superhigh-speed relays push operating system limits on the number of connections. Due to tor's design, distributing the workload of such relays across multiple CPU cores is problematic. Olaf Selke got around that problem by running four nodes on a quad-core machine with two IP addresses, but that meant that each node usually ran at less than 15 MB/s. For a superfast setup today, it might mean running multiple 25 MB/s nodes in similar fashion to what Olaf did, rather than a single 100 MB/s node. The benefit to tor users would seem to me to be the same either way, but the multinode method would not satisfy the demand of the funding source, as I understood it. Either way, though, the operating system limits may place keep a lid on the actual tor capacity of a very fast setup. From an infrastructure standpoint, I acknowledge that there can be problems in setting up really fast relays in Latin American countries. However, adding a few relays on the order of 500 - 5,000 KB/s in each Latin American country could probably be done, even if it meant they could only be set up in national capitals, which are mostly megalopolises of several million people, and might involve making special arrangements with the ISPs. Other major cities in some countries may also have the infrastructure to make moderately fast relays possible. Scott Bennett, Comm. ASMELG, CFIAG ********************************************************************** * Internet: bennett at cs.niu.edu * *--------------------------------------------------------------------* * "A well regulated and disciplined militia, is at all times a good * * objection to the introduction of that bane of all free governments * * -- a standing army." * * -- Gov. John Hancock, New York Journal, 28 January 1790 * ********************************************************************** _______________________________________________ tor-relays mailing list tor-relays at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bttf at datacosystems.com Wed Aug 1 05:17:12 2012 From: bttf at datacosystems.com (=?koi8-r?B?88XNyc7B0iDQ0s8gz8bG28/S2Q==?=) Date: Wed, 1 Aug 2012 04:17:12 -0800 Subject: =?koi8-r?B?68HLINPU0s/J1NggzMXHydTJzc7ZxSDPxsbbz9LO2cUg08jFzdk/?= Message-ID: <000d01cd6fd7$32d3b740$6400a8c0@bttf> 10 Августа 2012 г. Оффшорный бизнес: о чем молчат другие? 8 (Ч95) 792\21.22 <> код (499) - 4Ч5-4О95 Цель: Отличительной особенностью данного курса является практическая направленность и отсутствие лишних теоретических и исторических отступлений. курс строится в форме интерактивного практического занятия при постоянном взаимодействии с аудиторией с разбором большого количества примеров и подробным описанием налоговых, финансовых и правовых последствий или рисков. Для участия в курсе мы приглашаем как специалистов с многолетним опытом работы в сфере международного налогового планирования, стремящихся расширить область своих знаний, так и слушателей, еще не сталкивавшихся с иностранными юрисдикциями. Насыщенность материала конкретными примерами, взятыми из жизни, решение нестандартных и частных задач в ходе занятия, а также доступность объяснений относятся к неоспоримым достоинствам данного курса. Важно отметить, что ведущий курса имеет не только многолетний опыт разработки и курирования крупных консалтинговых проектов, но также многократного участия в их реализации "под ключ" с последующим сопровождением. Это позволяет наполнить курс уникальным материалом, посвященным не только схемам оптимизации налогов, но и многочисленными практическими комментариями и описанием проблем, с которыми сталкивается бизнес, даже при выборе "правильных и выверенных" схем. По ходу и после окончания курса будет предусмотрено время для индивидуальных вопросов как по заявленным темам, так и по вопросам, которые не предусматривала программа курса. Оффшоры, Кипр и другие иностранные юрисдикции не являются налоговой панацеей, и в некоторых случаях их использование принесет лишь новые финансовые издержки и бессмысленные риски конфликтов с налоговыми органами. К счастью, таких случаев пока меньшинство. Программа: БЛОК 1. ОФФШОРЫ, НИЗКОНАЛОГОВЫЕ И ПРЕСТИЖНЫЕ ЕВРОПЕЙСКИЕ ЮРИСДИКЦИИ: КРИТЕРИИ ВЫБОРА. * Сравнение популярных оффшорных юрисдикций (Британские Виргинские острова, Белиз, Сейшелы, Панама и т.д.) √ от каких стоит отказаться и почему? * Гонконг как инструмент работы с азиатским рынком * Зачем использовать низконалоговые юрисдикции, если есть полностью безналоговые? * Использование престижных юрисдикций: Швейцария, Люксембург, Нидерланды и т.д. √ когда это обоснованно? * "Черные списки" ФАТФ, ОЭСР, Минфина, ЦБ РФ √ кому о них можно забыть? БЛОК 2. ПРАКТИКА ИСПОЛЬЗОВАНИЯ КИПРСКИХ КОМПАНИЙ * Особенности работы с кипрским администратором: как не дать себя обмануть? ** налог на прибыль (Corporate Income Tax), сбор на оборону (Defence Contribution Tax), НДС и применение ⌠reverse charge■ * Изменения кипрского законодательства 2012 и тенденции 2013. * Ратификация Протокола к Соглашению между РФ и Кипром: кто понесет убытки, а кому удастся на этом заработать? * Почему Кипр редко используют при экспорте/импорте товаров? * Кипр как инструмент работы с ценными бумагами БЛОК 3.СХЕМЫ, ПРИМЕНЯЕМЫЕ В МЕЖДУНАРОДНОМ НАЛОГОВОМ ПЛАНИРОВАНИИ * Внешнеторговые операции (экспорт/импорт): ** схемы с использованием оффшоров и Гонконга; ** схемы с использование английских LTD и партнерств LLP; ** эстонские, чешские, датские, нидерландские компании в торговых схемах. * Холдинговые структуры ** выплаты дивидендов и построение холдинговых структур; ** займы как оптимальный путь финансирования; ** (суб)лицензионные договоры и выплаты роялти за использование прав интеллектуальной собственности; ** анализ сложностей и рисков, расчет предельных величин отчислений по займам и роялти. * Владение и сдача в аренду недвижимости с использованием нерезидентов БЛОК 4. КОНФИДЕНЦИАЛЬНОСТЬ И НОМИНАЛЬНОЕ ВЛАДЕНИЕ * Номинальный сервис: ** инструменты контроля номинальных директоров и номинальных акционеров; ** лица, которым будут известны имена бенефициаров; * Какие данные о компании хранятся в публичных реестрах Кипра и оффшоров, и кто имеет к ним доступ? * Обмен информацией √ в каких случаях государственные органы РФ могут получить информацию о владельцах? * Изменения в Гражданском Кодексе: бенефициар должен раскрыть себя сам. * Трасты и семейные фонды √ когда их использование оправдано? * "Подводные камни" при использовании номинального сервиса и трастов/фондов. БЛОК 5. ОТКРЫТИЕ СЧЕТОВ НА ИНОСТРАННЫЕ КОМПАНИИ * Надежность, оперативность работы, лояльность √ какой банк выбрать? * Какие банки не делятся информацией с российскими спецслужбами? * Раскрытие банковской тайны √ факты и выводы * Пути снятия средств со счета иностранного банка в России * Росфинмониторинг: когда можно не опасаться? БЛОК 6. ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ, СИТУАЦИИ ИЗ ПРАКТИКИ, ОБЗОР СУДОВ И ПИСЕМ МИНФИНА. * Насколько международная структура владения защищает от рейдерских захватов? * Как часто нужно предоставлять сертификат налогового резидентства и нужно ли проходить аудит для его выпуска? * Ведет ли использование доверенностей с широким кругом полномочий к возникновению постоянного представительства? Официальная позиция. * Дает ли регистрация компании в ЕС возможность на привлечение кредитов и получение гражданства? * Если компания не нужна: нужно ликвидировать или можно "бросить"? * и т.д. Стоимость участия: 9 000 рублей Информацию можно получить по телефонам: +7 (Ч95) 7922I.22 \\\/// 8 (499) ЧЧ54О95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9951 bytes Desc: not available URL: From reverberatedua16 at reelsensations.com Wed Aug 1 00:02:09 2012 From: reverberatedua16 at reelsensations.com (=?koi8-r?B?Iubh7uXy+SI=?=) Date: Wed, 1 Aug 2012 09:02:09 +0200 Subject: =?koi8-r?B?8MzJ1NkgT1NCLTMg5uHu5fL5?= Message-ID: Оптовые и розничные поставки - САМЫЕ НИЗКИЕ ЦЕНЫ! - OSB-3 производства Bolderaja (Латвия) , Arbec (Канада), Egger (Германия) - ФАНЕРЫ ФК березовая , ФСФ хвойная, ФОФ ламинированная в любую точку России , склад в Москве С уважением и надеждой на дальнейшее сотрудничество www.стратегия-и-паритет.рф From saftergood at fas.org Wed Aug 1 10:09:11 2012 From: saftergood at fas.org (Steven Aftergood) Date: Wed, 01 Aug 2012 10:09:11 -0700 Subject: Secrecy News -- 08/01/12 Message-ID: Format Note: If you cannot easily read the text below, or you prefer to receive Secrecy News in another format, please reply to this email to let us know. SECRECY NEWS from the FAS Project on Government Secrecy Volume 2012, Issue No. 78 August 1, 2012 Secrecy News Blog: http://www.fas.org/blog/secrecy/ ** WHAT IS AN UNAUTHORIZED DISCLOSURE? ** US ARMS SALES TO PAKISTAN, AND MORE FROM CRS WHAT IS AN UNAUTHORIZED DISCLOSURE? The anti-leak provisions proposed by the Senate Intelligence Committee in the pending FY2013 intelligence authorization act have been widely criticized as misconceived and ill-suited to achieving their presumed goals. http://www.fas.org/blog/secrecy/2012/07/press_public.html But they also suffer from a lack of clarity and an absence of definitions of crucial terms. For example, there is no clear definition of "the news media" to whom unauthorized disclosures are to be prohibited, as noted today by Josh Gerstein in Politico. Certainly a reporter for a national news organization is a member of the news media, but what about a blogger who produces original reporting? Or a tweeter who spreads previously undisclosed information? Nor is the term "classified information" defined in the new bill as precisely as one would wish. By contrast, the Freedom of Information Act, for example, limits withholding of information on national security grounds to records that are "properly classified." Merely being "classified" is not enough to warrant an exemption from disclosure under FOIA. (In a pending lawsuit, a court has ordered the US Trade Representative to publicly release a classified document that the court said was not properly classified. The government has so far refused. Which position is "authorized"?) The new Senate bill does not make any practical distinction between properly and improperly classified information, though it directs the DNI to address the issue in a report to Congress (section 504). In fact, the very concept of an "unauthorized disclosure" is not clearly articulated in the bill. What is it, exactly? Though the answer may seem obvious, it is actually subject to conflicting interpretations. According to a May 8, 2004 FBI interview with then-Vice President Dick Cheney, "it is possible to talk about something contained in a classified document without violating the law regarding declassification [sic]." http://www.governmentattic.org/6docs/FBICheneyPlame_2004.pdf "For example, the Vice President has made numerous public statements about Iraq's weapons of mass destruction which were based on and, in some cases tracked, his reading of classified information...," according to the FBI record of the interview. "However, he did not violate any relevant laws or rules in making these statements because he did not reveal the confidential sources or methods involved in gathering the classified information," the Vice President told the FBI (at p. 26). "Vice President Cheney advised that he believed it was justifiable to rely on classified information to shape and inform what one says publicly." This is not a particularly orthodox view of classification policy. But would such reliance on classified information in public statements constitute an unauthorized disclosure in the eyes of the Senate Intelligence Committee? It's unclear. In any event, the Senate Intelligence Committee bill would not apply to White House officials. Nor would it penalize unauthorized disclosures originating in Congress. The inconsistency in the Senate approach was highlighted today in two articles: "Bill to plug leaks doesn't reach White House" by Josh Gerstein, Politico: http://www.politico.com/news/stories/0712/79237.html and "Senate's anti-leaking bill doesn't address the real sources of information" by David Ignatius, Washington Post: http://wapo.st/N1XQZJ US ARMS SALES TO PAKISTAN, AND MORE FROM CRS New products of the Congressional Research Service that have not been made readily available to the public include these: Major U.S. Arms Sales and Grants to Pakistan Since 2001, July 25, 2012: http://www.fas.org/sgp/crs/row/pakarms.pdf Direct Overt U.S. Aid and Military Reimbursements to Pakistan, FY2002-FY2013, July 27, 2012: http://www.fas.org/sgp/crs/row/pakaid.pdf Georgia [Republic]: Recent Developments and U.S. Interests, July 13, 2012: http://www.fas.org/sgp/crs/row/97-727.pdf The Proposed Anti-Counterfeiting Trade Agreement: Background and Key Issues, July 19, 2012: http://www.fas.org/sgp/crs/misc/R41107.pdf _______________________________________________ Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists. The Secrecy News Blog is at: http://www.fas.org/blog/secrecy/ To SUBSCRIBE to Secrecy News, go to: http://www.fas.org/sgp/news/secrecy/subscribe.html To UNSUBSCRIBE, go to http://www.fas.org/sgp/news/secrecy/unsubscribe.html OR email your request to saftergood at fas.org Secrecy News is archived at: http://www.fas.org/sgp/news/secrecy/index.html Support the FAS Project on Government Secrecy with a donation: http://www.fas.org/member/donate_today.html _______________________ Steven Aftergood Project on Government Secrecy Federation of American Scientists web: www.fas.org/sgp/index.html email: saftergood at fas.org voice: (202) 454-4691 twitter: @saftergood ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Aug 1 02:00:46 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 1 Aug 2012 11:00:46 +0200 Subject: [liberationtech] Comments from Chile Message-ID: <20120801090046.GR12615@leitl.org> ----- Forwarded message from Nadim Kobeissi ----- From eugen at leitl.org Wed Aug 1 02:52:48 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 1 Aug 2012 11:52:48 +0200 Subject: [tor-relays] Call for discussion: turning funding into more exit relays Message-ID: <20120801095248.GY12615@leitl.org> ----- Forwarded message from Scott Bennett ----- From eugen at leitl.org Wed Aug 1 04:45:37 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 1 Aug 2012 13:45:37 +0200 Subject: [silk] Trolling as counter-terrorism Message-ID: <20120801114537.GI12615@leitl.org> ----- Forwarded message from Udhay Shankar N ----- From tony.arcieri at gmail.com Wed Aug 1 14:03:55 2012 From: tony.arcieri at gmail.com (Tony Arcieri) Date: Wed, 1 Aug 2012 14:03:55 -0700 Subject: [p2p-hackers] The Cryptosphere Message-ID: On Sun, Jul 15, 2012 at 5:10 PM, Tony Arcieri wrote: > I'm hacking on this regularly enough I'd like to officially announce it > here: > > https://github.com/tarcieri/cryptosphere > I'm not sure if you saw, but the Cryptosphere was linked on both Hacker News and TechCrunch: http://news.ycombinator.com/item?id=4316632 http://techcrunch.com/2012/07/31/new-darknet-wants-to-match-up-cypherpunks-in-crypto-utopia/ Most of the discussion centered around child pornography and people being afraid of being party to it even if they have plausible deniability. -- Tony Arcieri _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From cravingsnl5 at roxore.com Wed Aug 1 02:48:25 2012 From: cravingsnl5 at roxore.com (=?koi8-r?B?Iu3By9PJzcHM2M7B0SDSxcvMwc3BIg==?=) Date: Wed, 1 Aug 2012 14:48:25 +0500 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAg0tXCzMXKLCDtxdPRwyA0NCDSwdPT?= =?koi8-r?B?2czLySAyMCAwMDAg0tXCzMXK?= Message-ID: 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК (для указания вашего сайта в письме) - По вашему графику - Без ограничений по срокам - Возможно менять макеты все 8 раз !!! - Подготовка макетов бесплатно АКЦИИ: Месяц 44(46) рассылок - 2 раза в день - 5 раз в неделю - 20 000 рублей Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,7 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 From udhay at pobox.com Wed Aug 1 04:42:13 2012 From: udhay at pobox.com (Udhay Shankar N) Date: Wed, 01 Aug 2012 17:12:13 +0530 Subject: [silk] Trolling as counter-terrorism Message-ID: No comment. Udhay http://www.wired.com/dangerroom/2012/07/counterterrorism-trolls/all/ Newest U.S. Counterterrorism Strategy: Trolling By Spencer Ackerman July 18, 2012 | In the decade since 9/11, the U.S. government has used a wide variety of tactics against terrorists. Itbs invaded countries where they operated (and ones where they didnbt). Itbs tried to win the backing of foreign populations in which the terrorists hide. And itbs sent commandos and deadly flying robots to kill them one by one. One thing it hasnbt done, until now: troll them. Within the State Department, a Silicon Valley veteran has quietly launched an improbable new initiative to annoy, frustrate and humiliate denizens of online extremist forums. Itbs so new that it hasnbt fully taken shape: Even its architects concede it hasnbt fleshed out an actual strategy yet, and accordingly canbt point to any results itbs yielded. Its annual budget is a rounding error. The Pentagon will spend more in Afghanistan in the time it takes you to finish reading this sentence. But it also represents, in the mind of its creator, a chance to discourage impressionable youth from becoming terrorists b all in an idiom they firmly understand. And if it actually works, it might stand a chance of cutting off al-Qaidabs ability to replenish its ranks at a time when it looks to be reeling. The program, called Viral Peace, seeks to occupy the virtual space that extremists fill, one thread or Twitter exchange at a time. Shahed Amanullah, a senior technology adviser to the State Department and Viral Peacebs creator, tells Danger Room he wants to use blogic, humor, satire, [and] religious arguments, not just to confront [extremists], but to undermine and demoralize them.b Think of it as strategic trolling, in pursuit of geopolitical pwnage. Outside the first Viral Peace/Generation Change seminar in Davao City, Philippines, April 2012. Photo: Crishyl Ann/Facebook Al-Qaidabs influence has waxed and waned during the past decade, but its adherents, both current and potential, have gradually drifted online. Forums like the password-protected Shumukh site host extremist bulletin boards, where regulars debate the finer points of jihadist theory and boast of grandiose plans to assassinate senior U.S. officials. The denizens of those forums might be scrubs. But the online havens are, increasingly, the town square for extremism, especially as drones and commandos batter the terroristsb physical sanctuaries. Al-Qaidabs Yemen branch publishes an English-language web magazine; its Somali branch recently joined Twitter. The U.S. has thought of several strategies for confronting the not-so-new wave of online extremism, from apparent DDoS attacks on extremist websites to infiltrating them using fake jihadi personas. The White Housebs broad counterterrorism strategy, meanwhile, all but ignores the internet. Amanullah has a different view. You donbt necessarily need to deface the forums if you can troll them to the point where their most malign influences are neutralized. In an interview at a Washington coffee shop near his State Department office, Amanullah explains that online extremists have ban energy, theybve got a vitality that frankly attracts some of these at-risk people,b Amanullah says. bIt appeals to macho, it appeals to peoplebs rebellious nature, it appeals to people who feel downtrodden.b Creating a comparable passion on the other side is difficult. But itbs easier if the average online would-be jihadi has his mystique challenged through the trial by fire that is online ridicule. To Jarret Brachman, itbs an idea with promise. Brachman is one of the leading researchers of online jihadism. The people who post to the forums are bare massive narcissists [who] need constant ego boosts,b Brachman says b and, like other online blowhards, they tend to talk outside their areas of presumed expertise. Omar Farouk Abdulmutallab, the would-be Christmas bomber, used to bloviate on an Islamic forum about blove and marriageb while simultaneously complaining about his moribund love life. And that makes Abdulmutallabbs virtual contemporaries vulnerable to trolling b hopefully, before they can command attract an audience. The jihadi braggarts bkeep the momentum, the anger and the virulence going in forums, and they have a disproportionate impact, so if you can get rid of them, itbll pay dividends,b Brachman says. But not every extremist forum is alike. Will McCants, a former State Department official now at the CNA think tank and another scholar of online jihadism, argues Amanullahbs pupils canbt focus on the hardcore extremist forums like Shumukh. bThe admins will immediately take downb posts that challenge the jihadi narrative, McCants tells Danger Room. bFor something like that to work, it would have to be in more mainstream fora where extremists are trying to recruit,b like the conservative muslm.net, where byou can engage and the admins wouldnbt necessarily take you offline.b But all that is several steps ahead of Viral Peace at the moment. Viral Peace doesnbt have a strategy yet. And to hear Amanullah and his colleagues tell it, the State Department wonbt be the ones who come up with one. Itbs better, they argue, to let Muslims in various foreign countries figure out which message boards to troll and how to properly troll them. Americans wonbt know, say, the Tagalog-language Internet better than Filipinos; and as outsiders, they wonbt have the credibility necessary to actually make an impact. The best the State Department can do is train good trolls b which Amanullah began to do this spring. That means taking a big risk. If Viral Peace works as intended, with the trainees taking control of the program, Amanullah and the State Department will have little control over how the program actually trolls the terrorists. And the first wave of meetings in Muslim countries shows how far the program has to go. Inside a Viral Peace meeting in the Philippines, April 2012. Photo courtesy of Humera Khan. It makes sense that someone like Amanullah would think about pwning terrorists. A 44-year old proud Muslim and proud California geek, he was the editor-in-chief of the web magazine Altmuslim; started an online restaurant-rating service called Zabihah thatbs like a Halal version of Yelp; and launched a business service called Halalfire to drive advertising to the Muslim consumer market. Long before he arrived at the State Department in October 2010, he was profiled in Newsweek, which described the bookshelves at his El Cerrito home as blined with copies of Wired magazine and Jack Kerouac novels.b In April, Amanullah dispatched two young associates, Humera Khan of the U.S.-based counter-radicalization think tank Muflehun and the playwright and essayist Wajahat Ali, to set the idea into practice. They took a quickie tour of Muslim nations to meet young local leaders who might be interested in confronting extremism. It was a pilot program for Viral Peace and a related program of Amanullahbs called Generation Change. The idea was to connect notable people b rising stars in the arts, business and culture fields, who had an online following b with one another and to people who focused on counterterrorism. bYou donbt need to teach this generation how to use social media. They know how to use Twitter. They know how to use Facebook,b says Khan, who participated in Viral Peace in her individual capacity. bThe whole [Viral Peace] curriculum is about learning what strategy is.b Except that the first wave of Viral Peace didnbt yield a strategy. In Singapore, Malaysia, the Philippines and Indonesia b Ali went to Pakistan as well b the opening meetings brought together about 30 people per country, selected by the State Department and Amanullahbs own social networks, for sprawling brainstorming sessions. Some of them were just about how Muslim communities are perceived in their own countries. And some participants didnbt place counterterrorism at the top of their agendas. bYes, there were issues of extremismb discussed, Khan says. bBut by and large, the people felt that if you could deal with economics, education, making sure the rights of the underprivileged were maintained, it would take care of a lot of the other problems.b That may be, but itbs also far afield from trolling the trolls. Amanullah accepts that mission creep is a risk. But, he contends, if you want to get the most effective people denouncing jihadis online, itbs a risk worth accepting. And unlike the U.S. government, they stand the better chance of getting lurkers to think of them as bactually a cool group of people to be in,b as Amanullah puts it. Whatbs more, Amanullah has basically no budget. Viral Peace, a global program, has mere thousands of dollars in annual seed money so far; the Obama administration is asking for about $85 billion for the Afghanistan war next year. Participants are staying connected via Facebook, with minimal U.S. government presence as a middleman; Amanullah wants to expand to more countries soon. But itbs not clear where Viral Peace fits in Obamabs broader counterterrorism strategy: White House officials declined repeated requests to comment for this story. Amanullah sees it as a supplement to existing counterterrorism efforts b not a replacement for, say, drone strikes in Yemen b and he also concedes that his project will take a long time before it starts to pay counterterrorism dividends. But Amanullah doesnbt view that as an unconquerable obstacle. He thinks of counterterrorism like a venture capitalist might. bI come from Silicon Valley, from the start-up environment. I want to prove you can do small, inexpensive, high-impact projects that donbt just talk about the problem but solve the problem,b he says. bAnd solve it the right way: not with the governmentbs heavy hand but by empowering local people to do what they already know to do but donbt know how.b -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From edrigram at edri.org Wed Aug 1 10:10:16 2012 From: edrigram at edri.org (EDRi-gram) Date: Wed, 01 Aug 2012 20:10:16 +0300 Subject: EDRi-gram newsletter - Number 10.15, 1 August 2012 Message-ID: ======================================================================= EDRi-gram biweekly newsletter about digital civil rights in Europe Number 10.15, 1 August 2012 ======================================================================= Contents ======================================================================= 1. A new Net Neutrality EC consultation delays possible regulations 2. Czech Republic: Data retention - almost back in business 3. Stravos Lambrinidis: EU First Special Representative for Human Rights 4. ETSI standard for lawful interception triggers privacy questions 5. Belarusian journalist detained for showing subway security flaws 6. Google still holds data unlawfully obtained by StreetView 7. France: Update on website blocking without a judicial decision 8. Reporters Sans FrontiC(res follows on the Wikileaks footsteps 9. Recommended Action 10. Recommended Reading 11. Agenda 12. About ======================================================================= 1. A new Net Neutrality EC consultation delays possible regulations ======================================================================= Following BERECbs report in May 2012 on Net Neutrality, the European Commission launched on 23 July 2012 another consultation, open by 15 October 2012, to investigate on whether ISPs are manipulating online traffic management, thus postponing new regulatory laws on Net Neutrality. But this consultation follows a similar one from BEREC that ended just yesterday, 31 July 2012. As BERECb report was revealing, 20-50% of the European ISPs use measures to block or restrict access to web sites and/or products run by their competitors. Although the EU communications rules say that users should be able to choose the applications and services they want without restrictions, the report has shown that a large number of European users are under contracts with their ISPs that limit their access to services such as Voip (Voice over Internet Protocol) or file-sharing sites. Other practices such as bandwidth throttling (deliberate slowing down of the services to certain websites) have been revealed. Digital Agenda Commissioner Neelie Kroes stated that the consultation would be used bto help prepare recommendations that will generate more real choices and end the net neutrality waiting game in Europe. There is a lack of effective consumer choice when it comes to Internet offers," she said. Yet, although Kroes mentioned the introduction of new EU guidelines in 2012 considering bregulatory intervention in competitive markets as inappropriateb, the new consultation opened by the Commission pushes back any possible decision. La Quadrature du Net has published a non-answer to the new consultation considering there is no time for another consultation on the subject. bThe only way to protect a free Internet as well as freedoms and innovation online is to clearly enact and protect Net Neutrality in EU law.b It is already clear that European ISPs are applying restrictions to their usersb access and that national regulators cannot investigate and sanction. In UK, for instance, several ISPs such as BT, BSkyB, O2 and TalkTalk have already signed an Open Internet Code of Practice that generally requires them to ensure that they are offering their customers "full and open internet access". The code allows them to restrict open use of the internet through "traffic management" of their services provided they do not use it "in a manner that targets and degrades the content or application(s) of specific providers" and they ensure that a best effort Internet access is a "viable choice" to consumers even where other "managed services" are available. They signatories must also use "clear and transparent traffic management policies". Yet, the code has not been signed by large ISPs such as Virgin Media, Vodafone or T-Mobile and Orange operator Everything Everywhere who consider the text of the code may lead to bmisinterpretation and potential exploitation" or have reservations regarding the restrictions on the use of the binternet accessb term. On-line public consultation on "specific aspects of transparency, traffic management and switching in an Open Internet" Deadline for reply: 15 October 2012 http://ec.europa.eu/information_society/digital-agenda/actions/oit-consultation/index_en.htm Public consultation on 'net neutrality' to delay EU rules on ISPs (24.07.2012) http://euobserver.com/871/117055 Non-answer to BEREC's Consultation: We need Net Neutrality Law! (25.07.2012) https://www.laquadrature.net/en/non-answer-to-berecs-consultation-we-need-net-neutrality-law Net Neutrality: Brussels opens an umpteenth public consultation (only in French, 23.07.2012) http://www.numerama.com/magazine/23245-neutralite-du-net-bruxelles-ouvre-une-enieme-consultation-publique.html Ten UK ISPs commit to new 'open internet' code (25.07.2012) http://www.out-law.com/en/articles/2012/july/ten-uk-isps-commit-to-new-open-internet-code/ EDRi-gram 10.11: BERECbs findings on net neutrality (6.06.2012) http://www.edri.org/edrigram/number10.11/berec-net-neutrality ======================================================================= 2. Czech Republic: Data retention - almost back in business ======================================================================= Nationwide preventive monitoring of electronic communication finds its way back into the Czech legal system. The original act was repealed in 2011 by the Constitutional Court b however, a new one is waiting only for the President's signature. Privacy campaigners fear possible data abuse given the insufficient regulation provided by the current Police Act as well as monitoring of contents of Internet communications which could potentially be made possible by the implementing decree to the new Act. Not only the Chamber of Deputies, but now also the Senate approved the government draft of the amended Electronic Communication Act, as well as amendments to several other laws reintroducing the obligation of telephone or Internet services providers to monitor the communications of their clients and provide them, upon request, to the police, intelligence services or the Czech National Bank. After the previous legal regulation was repealed by two decisions of the Constitutional Court in March and December 2011, nationwide monitoring of citizensb communications thus finds its way back into the Czech legal system. The government proposal of the Act that was passed in the Senate on 18 July 2012, reacts to the Constitutional Court decision and implements the European Directive which prescribes storing of traffic and localization data on electronic communications. According to EDRi-member Iuridicum Remedium (IuRe), which initiated the March decision of the Constitutional Court and also filed its comments during the preparation phase of the new legal regulation, the new Act is better than the repealed regulation b however it still contains a number of errors that will lead to unconstitutional interference with the privacy of citizens. The major problem, according to IuRe, is the very existence of the obligation of operators to generally monitor the communications of all citizens without any specific suspicion. Thus, a revision of the European Directive which introduced this obligation, and an assessment of its constitutionality by the European Court of Justice is seen by Iure as the key issues in this respect. "As for the Czech implementation of the Directive, when submitting comments during the preparatory phase, we tried to push for maximum limits in terms of monitoring of citizens and possible abuse of such data," says Jan Voboril, lawyer at IuRe. "The original proposal introduced by the Ministry of Interior in the summer of last year was from our perspective entirely unacceptable. During the legislative process, we have stepwise prepared comments for the Ministry of Interior, Members of Parliament as well as Senators. We are pleased that during subsequent discussions with representatives of the Ministry of Interior and other key institutions, we managed to get acceptance for stricter rules regarding the use of such data. For example, what we consider important is the introduction of the obligation to inform the respective persons that their data have been requested under the Criminal Code, highlighting the subsidiarity when using such data in criminal investigation, or the necessity of court permission when the data is requested by intelligence services or the Czech National Bank," adds Voboril. Many crucial issues still remain unresolved, which will, in IuReB4s opinion, lead to further unconstitutional use of such data in the future. "What we consider to be the most serious issue of the new legislation is that it ignores the current situation where the Police Act authorizes the police to use the data outside of criminal proceedings. Under the current Police Act, police officers may require data more or less without any limits, without court supervision and without any clearly defined and controlled processes. It is striking that although the police themselves wanted to define stricter rules for such use of the data during the preparatory phase of the new Act, this was refused by the Ministry of Interior. Not even Deputies or Senators paid attention to this huge gap opening up possibilities for information abuse by individual police officers b and this despite of repeated warnings from our side," explains Voboril. "We also have our concerns regarding the awaited implementing decree of the Act, which will among other things determine which data will be generally stored. This decree can put the new Act into entirely new light, both in respect of the invasion into citizensB4 privacy as well as technical and personnel details necessary - which will be reimbursed by the state. Crucial is the particular question of whether data on the recipientB4s side of Internet communication will be stored as well. Such provisions would mean not only de facto monitoring of the content of what we are surfing through on the Internet, but also a tremendous increase in public expenditures related to such monitoring. It is surprising that such a significant issue which can change the entire meaning of the Act and should be provisioned for directly in the Act, has gone entirely unnoticed by," concludes Voboril. The Act is currently still to be signed by the President. LetB4s wait and see whether, during his decision making, Vaclav Klaus will also think of the fact that, apart from dozens of other persons - not excluding the chairman of the Constitutional Court - also some people from his immediate surrounding appeared among the victims of data abuse resulting from the police authorization to require such data. (Contribution by EDRi-member Iuridicum remedium - Czech Republic) ======================================================================= 3. Stravos Lambrinidis: EU First Special Representative for Human Rights ======================================================================= On 25 July 2012, on a proposal by Catherine Ashton, EU High Representative for Foreign Affairs and Security Policy, the Council of the European Union appointed Mr Stravos Lambridinis, former MEP, as EU Special Representative for Human Rights. This appointment is the result of repeated demands from the European Parliament and a recommendation of the Foreign Affairs Committee. On 24 May 2012, indeed, the Foreign Affairs Committee called on the Council to appoint a EU's high-level human rights envoy with an international reputation. The creation of the human rights envoy follows the EU's Strategic Framework and Action Plan on Human Rights and Democracy that was adopted on 25 June 2012. As requested by the European Parliament, Mr. Lambridinis has a long-standing experience in human rights and international relations. In his earlier carrier, he was indeed nominated Chairman of the Committee for Human Rights at the Washington D.C.'s bar association. He also worked at the Greek Ministry of Foreign Affairs and became the Ambassador at Large of the Hellenic Republic. He was elected Member of the European Parliament in 2006, where he was Vice-Chairman of the Civil Liberties Committee. In 2009, he was elected Vice-President of the European Parliament. He served as Minister of Foreign Affairs for Greece from June to November 2011. The task of the EU Special Representative for Human Rights is to ensure the promotion of EU human rights policy worldwide. The mandate will be broad and flexible in order to give Mr Lambridinis the ability to adapt to different situations. He will work closely with the European External Action Service. He will in particular represent the EU at the international level, be responsible for the interactions with the UN and chair human rights dialogues with third countries. Mr Lambridinis' initial mandate will run until 30 June 2014. The goal is to enhance the effectiveness and consistency of EU policy. The news was broadly appreciated by the MEPs, and bwarmlyb welcomed by the President of the European Parliament Martin Schulz (Germany, S&D), and by the chairwoman of the EP human rights subcommittee Barbara Lochbihler (Germany, Groups of the Greens). This appointment shows the willingness of the European Union to make human rights one of its strategic priorities and to give the EU a united voice on human rights issues. Mr Lambridinis said that he would bensure the Human Rights gets integrated into all EU external policyb. Stavros Lambrinidis appointed first EU Special Representative for Human Rights (25.07.2012) http://www.consilium.europa.eu/uedocs/cms_data/docs/pressdata/EN/foraff/132029.pdf Stavros Lambrinidis appointed EU Special Representative for Human Rights (26.07.2012) http://www.europarl.europa.eu/the-president/en/press/press_release_speeches/press_release/2012/2012-july/press_release-2012-july-13.html MEPs congratulate new EU human rights envoy, Stavros Lambrinidis (25.07.2012) http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+IM-PRESS+20120724IPR49266+0+DOC+XML+V0//EN EC press briefing (25.07.2012) http://ec.europa.eu/avservices/audio/audioDetails.cfm?ref=87254&sitelang=fr (Contribution by Marie Humeau - EDRi) ======================================================================= 4. ETSI standard for lawful interception triggers privacy questions ======================================================================= The draft UK Communication Bill raises new privacy concerns after it has been revealed that the UK has also been driving the development of a European Telecommunications Standards Institute (ETSI) standard framework that allows interception of the content of communication as well. The Bill will allow the government to compel service companies like Google and Facebook to provide information to the police and intelligence services, while the framework sets out the technical standards for this. The draft Communication Bill is supposed to deal only with traffic data, according with the Government position: bThe changes we are making only relate to the who, where and when of communications data. The interception of the content of any communications is a completely separate matter and continues to be strictly controlled by the Regulation of Investigatory Powers Act, requiring a warrant signed by the secretary of state" said a Home Office spokesman. But an April 2012 draft report from ETSI on Lawful Interception (LI) and Cloud/Virtual Services explains that an electronic communication provider that offers cloud services must maintain its obligation to LI. This means that "the cloud service provider must implement a Cloud Lawful Interception Function (CLIF). This can be by way of Applications Programming Interface (API) or more likely ensuring presentation of information in a format recognisable to interception mechanisms." The Guardian explains it as being measures to monitor "nomadic access", which means surveillance of an individual whether they go online from their home computer, mobile or an Internet cafC). "They are saying this is only about communications data, but in fact it is not. If you build the infrastructure that ETSI have agreed, it can be used for interception. The documents show that there is a clear and continuing intention to use it for interceptionb, explains Prof. Ross Anderson, from the University of Cambridge Computer Laboratory, "We're seeing moves at an international level to make it easier for the content of communications to be intercepted. For Home Office officials behind the communications data bill, spying on who we are emailing or Skyping is not their final objective. Officials from Britain are working internationally to force service providers to ensure that their systems are easy to tap into," concluded Nick Pickles, from Big Brother Watch. Security services to get more access to monitor emails and social media (28.07.2012) http://www.guardian.co.uk/technology/2012/jul/28/isecurity-services-emails-social-media Draft ETSI DTR 101 567 V0.0.5 (2012-04) - Lawful Interception (LI); Cloud/Virtual Services (CLI) http://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_LI/2012_45_Bratislava/SA3LI12_044.doc EDRi-gram 10.10: Concerns over the proposed Communication Bill in UK (23.05.2012) http://edri.org/edrigram/number10.10/draft-communications-bill-uk ======================================================================= 5. Belarusian journalist detained for showing subway security flaws ======================================================================= Several Belarusian journalists have been lately arrested for having shown flows in the security system of Belarus. The latest arrest, on 25 July 2012, was that of Vital Ruhayn on charges of hooliganism and obscene language in public. In fact, he became infamous for publishing a video online showing a lack of security on the Minsk subway although it was the target of a deadly bombing in April 2011. The video was clearly showing the journalist carrying a large bag into the Minsk metro and following the same route as the 2011 bomber - the police did not react in any way. Although the court released Ruhayn, he is still under prosecution and the hearing was only postponed for five days in order to allow the police to correct the inconsistencies in their testimonies and written reports. bVital Ruhaynbs arrest is indicative of the regimebs sensitivities about matters related b closely or otherwise b to the Minsk bombing and national security. A journalist should not be arrested for highlighting police violations of security regulations. We call for the withdrawal of the trumped-up charges brought against him,b was the reaction of Reporters Without Borders. Also, in June, ERB reporter Pavel Svyardlow was arrested on similar obscene language charges, and was given a 15-day jail sentence and on 13 July journalist Anton Surapin was arrested for having posting on the Internet photos of the action of a Swedish advertising agency of 4 July - the agency people flew a light aircraft into the Belarusian airspace dropping hundreds of teddy-bears with messages supporting free speech in Belarus. Surapin is still held by the Committee for State Security on the charge of helping foreigners to cross the border illegally and is facing a three to seven years prison sentence. Journalist facing jail sentence for exposing Minsk metro security flaws (27.07.2012) http://en.rsf.org/belarus-journalist-facing-jail-sentence-28-07-2012,43120.html Ruhain's case to be revised due to witnesses' confusion (26.07.2012) http://euroradio.fm/en/report/ruhains-case-be-revised-due-witnesses-confusion-113719 Euroradio journalist Vital Ruhain is released (26.07.2012) http://euroradio.fm/en/report/euroradio-journalist-vital-ruhain-spend-night-akrestsina-updated-113644 ======================================================================= 6. Google still holds data unlawfully obtained by StreetView ======================================================================= Google admitted, in a letter addressed on 27 July 2012 to UK Information Commissioner's Office (ICO) as well as to the Irish Data Protection Commission office that it had not yet deleted all the data unlawfully obtained in UK by its Street View cars. After the discovery in May 2010 that Google had scanned, by means of its Street View cars, the airwaves to identify and map WiFi thus unlawfully obtaining private data, the company was instructed to delete all data thus gathered. According to the present Googlebs letter, a bsmall portionb of the respective data is still in the companybs possession. Google also asked in its letter for instruction on how to proceed in deleting the rest of the data. "In recent months, Google has been reviewing its handling of Street View disks and undertaking a comprehensive manual review of our Street View disk inventory. That review involves the physical inspection and re-scanning of thousands of disks. In conducting that review, we have determined that we continue to have payload data from the UK and other countries. We are in the process of notifying the relevant authorities in those countries," said Google's privacy counsel Peter Fleischer. ICO answered the letter on 28 July saying Google should promptly supply the remaining data to the ICO which would "examine the contents" warning at the same time the company that it might be in breach of the terms previously agreed following the investigation into the issue in 2010. Billy Hawkes, the Irish Data Protection Commissioner, said Google was supposed to have deleted all the data and considered the situation "clearly unacceptable". ICO stated that it would coordinate its further actions in the matter with other data protection authorities through the Article 29 Working Party and the GPEN network. Google admits not all unlawfully-collected Street View data has been deleted (27.07.2012) http://www.out-law.com/en/articles/2012/july/google-admits-not-all-unlawfully-collected-street-view-data-has-been-deleted/ Google warned on data deletion delay (28.07.2012) http://www.independent.ie/national-news/google-warned-on-data-deletion-delay-3182216.html EDRi-gram 10.12: Googlebs Street View privacy breach again in the public eye (20.06.2012) http://www.edri.org/edrigram/number10.12/google-steet-view-identification-again ======================================================================= 7. France: Update on website blocking without a judicial decision ======================================================================= Fleur Pellerin, the French State Secretary for Digital Economy announced on 24 July 2012 the intention of the French Government to give up the Decree on the application of a very controversial Article of LOPPSI 2 law which allowed online filtering of websites with child pornographic content without a court decision. Article 4 was stipulating that when bthe necessities of the fight against broadcasting of images representing minors as per article 227-23 of the Criminal Code justify it, the administrative authority notifies (the ISPs) the electronic addresses of public electronic online communication services which contravene the provisions of this article that these must block or delay access to them.b One of the main concerns regarding this article is that the blocking could be done without the intervention of a court order. The draft decree for the entering into force of Article 4 from LOPPSI 2 (6 months after its publication) was to be published on 15 March 2012, after a consultation with CNN (Conseil National Numerique b National Digital Council) which never happened. However, the text of article 4 is still in the text of the law, so in order to solve the problem, it is necessary to change the law itself. Loppsi: the decree on site blocking without judge is abandoned (only in French, 25.07.2012) http://www.numerama.com/magazine/23260-loppsi-le-decret-sur-le-blocage-des-sites-sans-juge-est-abandonne.html Loppsi: the government abandons blocking without judge (only in French, 25.07.2012) http://www.pcinpact.com/news/72658-loppsi-gouvernement-abandonne-blocage-sites-sans-juge.htm EDRi-gram 9.4: France: Loppsi 2 adopted - Internet filtering without court order (23.02.2011) http://www.edri.org/edrigram/number9.4/web-blocking-adopted-france-loppsi-2 ======================================================================= 8. Reporters Sans FrontiC(res follows on the Wikileaks footsteps ======================================================================= Reporters Sans FrontiC(res (RSF) is looking to take the Wikileaks path and will start accepting the publication of censured documents in October 2012 on a new dedicated platform. Called bWe Fight Censorshipb, the RSF platform will distribute censored documents received from journalists, bloggers or political dissidents in order to offer a bdigital shelterb for those who, by revealing such documents, might be persecuted, condemned, imprisoned or even assassinated. bThanks to a digital ultra-secured safe, the Internet users will be able to provide the organisation, anonymously, with documents affected by censorship or interdicted for publicationb stated RSF who also added that the documents will not be published as such but put into context and the contents included will be verified to ensure the accuracy and correctness of the shared information. RSF already organised in 2010 an banti-censure shelterb space for the protection of political dissidents, journalists and bloggers threatened by authorities, which allows them to surf and communicate rather safely by using various ciphering and anonymization tools. On 21 July 2012, the association organised a hackathon in order to test the reliability of the platform and the security of the document transmission system. RSF wants to fight censorship by publishing banned documents (only in French, 25.07.2012) http://www.numerama.com/magazine/23261-rsf-veut-combattre-la-censure-en-publiant-des-documents-interdits.html We fight censorship http://wefightcensorship.org/en.html Hackathon "We fight censorship" on 21 July (20.07.2012) http://fr.rsf.org/france-hackathon-we-fight-censorship-05-07-2012,42964.html ======================================================================= 9. Recommended Action ======================================================================= Call for Papers for a special edition of IEEE Internet Computing on Internet Censorship and Control. The editors are looking for short (up to 5,000 words) articles on the technical, social, and political mechanisms and impacts of Internet censorship and control.They are soliciting both technical and social science articles, and especially encourage those that combine the two. Deadline for a brief description of the article: 15 August 2012 http://www.computer.org/portal/web/computingnow/iccfp3 Commission consults on a future EU Network and Information Security legislative initiative (27.07.2012) Deadline: 15 October 2012 http://europa.eu/rapid/pressReleasesAction.do?reference=IP/12/818&format=HTML&aged=0&language=EN&guiLanguage=en ======================================================================= 10. Recommended Reading ======================================================================= Online traceability: Who did that? (27.07.2012) http://www.lightbluetouchpaper.org/2012/07/27/online-traceability/ http://www.consumerfocus.org.uk/files/2012/07/Online-traceability-Who-did-that-original.pdf Big data at your service http://ec.europa.eu/information_society/newsroom/cf/dae/itemdetail.cfm?item_id=8337 Linked Open Government Data http://www.computer.org/portal/web/csdl/doi/10.1109/MIS.2012.56 European Telco Proposal to ITU: A Threat to the Open Web? (27.07.2012) http://advocacy.globalvoicesonline.org/2012/07/27/european-telco-proposal-to-itu-a-threat-to-the-open-web/ ======================================================================= 11. Agenda ======================================================================= 25-26 August 2012, Bonn, Germany Free and Open Source software conference (FrOSCon) http://www.froscon.de/en/program/call-for-papers/ 6-7 September 2012, Cluj-Napoca, Romania CONSENT policy conference: Perceptions, Privacy and Permissions: the role of consent in on-line services http://conference.ubbcluj.ro/consent/ 8-9 September 2012, Vienna, Austria Daten, Netz & Politik 2012 https://dnp12.unwatched.org/ 12-14 September 2012, Louvain-la-Neuve, Belgium Building Institutions for Sustainable Scientific, Cultural and Genetic Resources Commons. http://biogov.uclouvain.be/iasc/index.php 14-17 September 2012, Brussels, Belgium Freedom not Fear 2012 http://www.freedomnotfear.org/ http://www.freedom-not-fear.eu 7-10 October 2012, Amsterdam, Netherlands 2012 Amsterdam Privacy Conference http://www.apc2012.org/ 25-28 October 2012, Barcelona, Spain Free Culture Forum 2012 http://fcforum.net/ 6-9 November 2012, Baku, Azerbaijan Seventh Annual IGF Meeting: "Internet Governance for Sustainable Human, Economic and Social Development" http://www.intgovforum.org/cms/ 9-11 November 2012, Fulda, Germany Digitalisierte Gesellschaft - Wege und Irrwege FIfF Annual Conference in cooperation with Fuldaer Informatik Kollquium http://www.fiff.de/2012 ============================================================ 12. About ============================================================ EDRi-gram is a biweekly newsletter about digital civil rights in Europe. Currently EDRi has 32 members based or with offices in 20 different countries in Europe. European Digital Rights takes an active interest in developments in the EU accession countries and wants to share knowledge and awareness through the EDRi-grams. All contributions, suggestions for content, corrections or agenda-tips are most welcome. Errors are corrected as soon as possible and are visible on the EDRi website. Except where otherwise noted, this newsletter is licensed under the Creative Commons Attribution 3.0 License. See the full text at http://creativecommons.org/licenses/by/3.0/ Newsletter editor: Bogdan Manolea Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring http://flattr.com/thing/417077/edri-on-Flattr - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. Unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/mk/vesti/edri - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided by Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From telegraph4 at rcsgroup.com Wed Aug 1 07:13:26 2012 From: telegraph4 at rcsgroup.com (=?koi8-r?B?IvDSz8TBxdTT0SDEz80i?=) Date: Wed, 1 Aug 2012 21:13:26 +0700 Subject: =?koi8-r?B?8NLPxMHF1NPRIMTPzSDXIMHM2NDJytPLz80g09TJzMUg1yA0MsvNIM/U?= =?koi8-r?B?IO3P08vX2Swg1SDHz9LOz8zZ1s7Px88gy9XSz9LUwQ==?= Message-ID: <3966471D9490461691CCC4808B4BAE74@AnhDung> Продается здесь www.купи-дом-здесь.рф From eugen at leitl.org Wed Aug 1 13:53:16 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 1 Aug 2012 22:53:16 +0200 Subject: Secrecy News -- 08/01/12 Message-ID: <20120801205315.GT12615@leitl.org> ----- Forwarded message from Steven Aftergood ----- From eugen at leitl.org Wed Aug 1 13:54:00 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 1 Aug 2012 22:54:00 +0200 Subject: EDRi-gram newsletter - Number 10.15, 1 August 2012 Message-ID: <20120801205400.GU12615@leitl.org> ----- Forwarded message from EDRi-gram ----- From eugen at leitl.org Wed Aug 1 14:16:50 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 1 Aug 2012 23:16:50 +0200 Subject: [p2p-hackers] The Cryptosphere Message-ID: <20120801211650.GZ12615@leitl.org> ----- Forwarded message from Tony Arcieri ----- From nutria2910 at rautaruukki.com Wed Aug 1 23:04:45 2012 From: nutria2910 at rautaruukki.com (=?koi8-r?B?IuL58/Ty7ywg6+H+5fP09+Xu7u8sIOTl++X37yI=?=) Date: Thu, 2 Aug 2012 11:34:45 +0530 Subject: =?koi8-r?B?88TFzMHFzSDSwdPT2czL1SDXwdvFyiDSxcvMwc3ZLg==?= Message-ID: Сделаем рассылку вашей рекламы. БЫСТРО, КАЧЕСТВЕННО, ДЕШЕВО! Россия Юр+Ч 18.5 млн - 5000 руб - 1250 грн. Москва Юр+Ч 7.3 млн - 4000 руб - 1000 грн. Украина 4.2млн - 3000 руб - 800 грн. Заказываете две рассылки - третью дарим!!! Тел: +38 (096) 302 88 03 ICQ: 624 657 171 Вы дочитали нашу рекламу-значит это работает! Имеются базы всех стран!!! From stomachs96 at repeatafterme.com Thu Aug 2 01:00:53 2012 From: stomachs96 at repeatafterme.com (=?koi8-r?B?Ivfv7O/n5OHz9PLv6iI=?=) Date: Thu, 2 Aug 2012 15:00:53 +0700 Subject: =?koi8-r?B?8uHz8PLv5OH24SDk5fLl9/Hu7vnoIOTv7e/3LiDz6+nk6+Eg5O8gMjAl?= Message-ID: <84606F151CE042ACAB19999E73E6A3FF@lenovo> "ВОЛОГДАСТРОЙ" тел в Москве: +7 495 9733427; +7 495 РАСПРОДАЖА ДЕРЕВЯННЫХ ДОМОВ. СКИДКА ДО 20% В стоимость дома входит: проект, легкие фундаментные блоки, готовый к сборке комплект стен и перегородок, стропильная система и кровельный материал типа "Ондулин", окна и входные двери из ПВХ. www.важное-тут.рф/10/1.html From oatsd65 at rangerv.com Thu Aug 2 02:55:29 2012 From: oatsd65 at rangerv.com (=?koi8-r?B?Iu3By9PJzcHM2M7B0SDSxcvMwc3BIg==?=) Date: Thu, 2 Aug 2012 15:25:29 +0530 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAg0tXCzMXKLCDtxdPRwyA0NCDSwdPT?= =?koi8-r?B?2czLySAyMCAwMDAg0tXCzMXK?= Message-ID: <6D405FA3ECAF45D28A66D2B5C2F1F0D8@sarwaruddin> 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК (для указания вашего сайта в письме) - По вашему графику - Без ограничений по срокам - Возможно менять макеты все 8 раз !!! - Подготовка макетов бесплатно АКЦИИ: Месяц 44(46) рассылок - 2 раза в день - 5 раз в неделю - 20 000 рублей Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,7 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 From eugen at leitl.org Thu Aug 2 07:30:49 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 2 Aug 2012 16:30:49 +0200 Subject: Drones: From War Weapon To Homemade Toy Message-ID: <20120802143049.GT12615@leitl.org> http://www.npr.org/2012/08/02/157441681/drones-from-war-weapon-to-homemade-toy Drones: From War Weapon To Homemade Toy by Larry Abramson Morning Edition A homemade drone over Cesar Chavez Park in Berkeley, Calif. Hobbyists and commercial manufacturers are anticipating new rules governing their domestic use. Enlarge Larry Abramson/NPR A homemade drone over Cesar Chavez Park in Berkeley, Calif. Hobbyists and commercial manufacturers are anticipating new rules governing their domestic use. August 2, 2012 Drones transformed the battlefield in Iraq and Afghanistan. But their use has been extremely limited in U.S. skies. The Federal Aviation Administration essentially bans the commercial use of drones, and government use is still highly restricted. But that's changing. For a long time, drones, which are formally known as unmanned aerial vehicles, or UAVs, were exotic, expensive and out of reach for all but military users. Today, however, a clever hobbyist can have his own eye in the sky. That's the case for Andreas Oesterer and Mark Harrison. On a recent weekend, the two hobbyists are flying their collection of hi-tech toys over Cesar Chavez Park in Berkeley, Calif. With a little push, a homemade UAV takes off into the sky. The fixed-wing plane they've launched is definitely unarmed. In fact, it looks like a simple remote-control plane you might find at RadioShack. Hi-tech hobbyists Andreas Oesterer and Mark Harrison line up their homemade drones in Berkeley, Calif. Enlarge Larry Abramson/NPR Hi-tech hobbyists Andreas Oesterer and Mark Harrison line up their homemade drones in Berkeley, Calif. But as Oesterer flies his plane around the park, it becomes obvious how much power is available for a couple thousand dollars. Using a control box, he puts the plane on autopilot, and it begins to follow a lazy, predetermined path around the park. It's smart enough to stay airborne on its own, and it's outfitted with a camera that provides a wide view of this bayside park. Oesterer then dons homemade video goggles. In order to block out glare from the sun, he's wrapped some gray foam around them, so he looks like some sort of welder from the future. Instantly, it's as if he's in the pilot's seat, 100 or so feet up in the air, looking down on us. As the small plane passes above, Oesterer can see the tops of our heads through the goggles. Manned And Unmanned Vehicles Converging Hobbyists like Oesterer are excited about the technology, as are the big companies that have been working on it for years. John Langford, chief executive of Aurora Flight Sciences, which makes components for military UAVs, has been designing drones for scientists for decades. "I think the distinction between a manned and an unmanned airplane is arbitrary and vanishing, honestly," Langford says. But right now, the FAA treats manned and unmanned vehicles completely differently. If you want to fly a manned plane, you just have to file a flight plan. For unmanned vehicles, you have to get special authorization from the FAA, and commercial use is still not allowed. But new legislation says the FAA must reduce that divide over the next few years. Langford says these vehicles will soon be part of our lives. "The civilian market will emerge," he says. "It will happen." A Tool For Police But why are drones needed at home in the U.S.? For years, scientists have found them useful b for doing air sampling, for example. But now, police departments in big cities like Miami to not-so-big places like Mesa County, in rural western Colorado see these vehicles as the next cool tool, from Deputy Amanda Hill of the Mesa County Sheriff's Office in western Colorado prepares to use a Draganflyer X6 drone equipped with a video camera to help search for a suspect in a knife attack in this undated photo. Enlarge Mesa County Sheriff's Dept./AP Deputy Amanda Hill of the Mesa County Sheriff's Office in western Colorado prepares to use a Draganflyer X6 drone equipped with a video camera to help search for a suspect in a knife attack in this undated photo. Ben Miller has an unusual job title in Mesa, which includes the city of Grand Junction: He's the "unmanned aircraft program officer" for the Mesa County Sheriff's Office. The agency has two small camera-equipped drones. They came in handy recently for a fairly basic function: gathering evidence after extensive vandalism at a public school. "We went out and were able to fly over the damaged area, and took a series of still images," Miller says. The pictures have been useful in prosecuting the crime. Search-and-rescue teams also see great potential in drones. Miller says one of his department's drones recently helped wayward hikers. They were lost, but it wasn't a life-or-death situation. "We probably wouldn't have been able to justify the expenses to put in manned aviation [such as a helicopter]," Miller says. "But now that we're flying for $25 an hour, it's kind of a no-brainer for us." A Threat To Privacy? But for others, the specter of unmanned aerial systems patrolling the homeland has sparked a call to arms. Conservative pundit Charles Krauthammer recently called for a ban on drones in the U.S. Speaking on Fox News, Krauthammer said, "And I would predict b I'm not encouraging, but I'm predicting b the first guy who uses a Second Amendment weapon to bring a drone down that's been hovering over his house is going to be a folk hero in this country." The suggestion that drones need to be shot down alarmed the UAV industry. Drone enthusiast Andreas Oesterer wears homemade video goggles, wrapped in gray foam to block out the glare of the sun, as he flies a drone over Cesar Chavez Park. Enlarge Larry Abramson/NPR Drone enthusiast Andreas Oesterer wears homemade video goggles, wrapped in gray foam to block out the glare of the sun, as he flies a drone over Cesar Chavez Park. After years of selling its wares to the military, these companies are desperately trying to depict the next generation of domestic drones as friendly, more like "Robby the Robot" than HAL, the computer antagonist of Arthur C. Clarke's Space Odyssey novels and the films based on them. But you can't blame people for getting the wrong idea if online ads pitching drones to law enforcement are anything to go by. One comes from Aerovironment, a California-based company preparing to sell smaller drones to police. In the video, cops pull the small unmanned plane out of their cruiser's trunk, quickly assemble it and use it to monitor the movements of an armed suspect. While a driving guitar serves as soundtrack, the police use the UAV's camera to see that the bad guy is setting up an ambush. Thanks to aerial surveillance, the cops outmaneuver the villain, cuff him and take him away. While police are eager to keep an eye on criminals, civil liberties groups warn that these devices are tailor-made to spy on ordinary citizens. Jennifer Lynch with the Electronic Frontier Foundation says many police departments plan to use drones to photograph public gatherings, just as they do with helicopters. "With the advent of facial recognition and the ability to store images for a long period of time, it becomes really worrisome when you have a drone hovering over that sort of situation," she says. "And it's not clear what sort of legal restrictions would prevent that activity." Lynch and others say that now is the time to pass legislation to limit drone use by police, before it becomes commonplace. But fans of unmanned aviation caution that more restrictions could stifle innovation. Right now, there are thousands of small companies in this field. And hobbyists like Harrison in California, whose day job is at Pixar, see the drone era as the next frontier, as a marketplace that could power the next economic boom. "I personally think that it's going to be a lot like the PC industry in the 1970s," he predicts. "There were just dozens or hundreds of little itty-bitty companies trying to fill the various niches." From guisesh70 at ringorealty.com Thu Aug 2 06:16:18 2012 From: guisesh70 at ringorealty.com (=?koi8-r?B?Iu7v9/nqIOvv9PTl5PYi?=) Date: Thu, 2 Aug 2012 18:46:18 +0530 Subject: =?koi8-r?B?8NLPxMHF1NPRICDu7/f56iDr7/T05eT2?= Message-ID: Продается НОВЫЙ КОТТЕДЖ Коттедж, 200 м2 Участок: 12 сот. Киевское шоссе, Боровск Газ, вода, Электрика, Канализация, все заведено в дом и функционирует Под чистовую отделку ТРЕБУЕТСЯ ТОЛЬКО ФИНИШНАЯ ОТДЕЛКА. немецкие технологии 6,7 млн. руб www.продам-дом-тут.рф From arvav at carbonstudio.com Thu Aug 2 13:47:40 2012 From: arvav at carbonstudio.com (=?koi8-r?B?IuvMwdfEydEg9MHS1c7JzsEi?=) Date: Thu, 2 Aug 2012 21:47:40 +0100 Subject: =?koi8-r?B?wsXazMnNydTOwdEgzcXWxNXHz9LPxM7B0SDT19Ha2CE=?= Message-ID: <01cd70f8$702fe600$012560d9@arvav> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции From bird at aztrib.com Thu Aug 2 15:17:30 2012 From: bird at aztrib.com (=?koi8-r?B?IuHOwdTPzMnKIOLP0snTz9fJ3iI=?=) Date: Thu, 2 Aug 2012 23:17:30 +0100 Subject: =?koi8-r?B?wsXazMnNydTOwdEgzcXWxNXHz9LPxM7B0SDT19Ha2A==?= Message-ID: <01cd7104$fce0a100$c25fdfb2@bird> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1463 bytes Desc: not available URL: From blee at cvec.com Thu Aug 2 08:07:20 2012 From: blee at cvec.com (=?koi8-r?B?IvfMwcTJzcnSIO3JyMHKzM/Xyd4i?=) Date: Fri, 3 Aug 2012 00:07:20 +0900 Subject: =?koi8-r?B?2tfPzsvJINDPIPLP09PJySDExdvF188h?= Message-ID: <01cd710b$f30e6c00$eab9b079@blee> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции From allan.jones at bbandt.com Thu Aug 2 12:15:39 2012 From: allan.jones at bbandt.com (=?koi8-r?B?Iu7BxMXWxMEg4dLLwcTYxdfOwSI=?=) Date: Fri, 3 Aug 2012 04:15:39 +0900 Subject: =?koi8-r?B?xMXbxdfZyiDNxdbHz9LPxCE=?= Message-ID: <01cd712e$a38d6780$77e9ac70@allan.jones> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали
- Неограниченное количество линий
- Экономия на покупке телефонной станции
-------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1463 bytes Desc: not available URL: From eugen at leitl.org Fri Aug 3 01:24:32 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Aug 2012 10:24:32 +0200 Subject: Bitcoin + Open Transactions + Web Of Trust Message-ID: <20120803082432.GM12615@leitl.org> http://www.reddit.com/r/Bitcoin/comments/xk7dx/opentransactions_new_gui_mockups/c5n3uzj?context=1 [b]hugolp 7 points 17 hours ago You might want to remind the people around here what Open Transaction is and how does it combine with Bitcoin. permalink report reply [b]anykind 13 points 16 hours ago I finally understood Open Transactions thanks to this post at Bitcointalk from da2ce7: Bitcoin + Open Transactions + Web Of Trust are the building blocks for a complete replacement of the traditional finance industry. They each solve a different problem. Bitcoin: Provides: Low-Trust transfer of Value between two parties. Needs: Way to transfer ownership of real-life goods and service contracts. (Open Transactions) Needs: Trust network so people can have more confidence that they are dealing with somebody whom is trusted and respected. (Web-Of-Trust) Open Transactions: Provides: Tools to transfer the ownership of anything that can be described in a contract. Needs: Low-Trust transfer of value, without the risk of counter-party. (Bitcoin) Needs: Trust Network, so the contracts can have some breputationb backing them. Web-Of-Trust Web-Of-Trust: Provides: Reputation system so there is consequences if somebody scams (nobody will trade with them), and good reputations have value. Needs: Low-Trust transfer of value, so parties with no reputation can build a good reputation: (Bitcoin) Needs: Formal way to describe contracts, that can describe the transfer of ownership in a un-deniable way: (Open Transactions) Each technology provides a solution to a different problemb& When working together, they provide the basis for a very secure, strong, and comprehensive financial system. https://bitcointalk.org/index.php?topic=47501.msg831406#msg831406 From owen at delong.com Fri Aug 3 13:01:35 2012 From: owen at delong.com (Owen DeLong) Date: Fri, 3 Aug 2012 13:01:35 -0700 Subject: Verizon FiOS - is BGP an option? Message-ID: On Aug 3, 2012, at 12:31 , William Herrin wrote: > On Fri, Aug 3, 2012 at 8:51 AM, Seth Mattinen wrote: >> On 8/3/12 8:56 AM, William Herrin wrote: >>> It >>> seems the telcos and cable companies don't consider the commodity >>> Internet part of their equipment to be something which needs >>> electricity during an extended grid outage. Cox. Verizon. I'm looking >>> at you. >> >> Most don't, and for the price being paid on commodity connections I feel >> indifferent about it. > > Back in the day they kept my land line phone on during extended power > outages. And that was when they had to power the phone. Now all they > have to do is power the equipment on their end of the line. My phone's > out because hey, voip. My Sprint cell phone's out because the fools > can't power their towers. It's 105 degrees out and I'm screwed if > someone has a heat stroke because we can't even call 911. > 48vDC battery to power your phone up to 3 ringer equivalences was a pretty light load overall, compared to PON aggregators for all those neighborhoods. Further, as noted above the PON equipment is much more widely distributed than powering your phone. Powering your phone was straight DC down the same copper wire as your service. Powering the PON aggregators, well, unless you've got some magic new technology for powering them via fiber is a bit more involved and quite a bit more amperage per conductor than POTS. > >> The central plant days are mostly gone; there's >> fiber huts everywhere and not enough trucks/manpower (in my area a >> lineman sits in his truck and reads a book while tethered to the power >> kiosk) to run them all if the outage is too widespread for too long. > > They put a quarter million dollars into the fiber hut. They can't put > a $500 gasoline generator in a warehouse 50 miles away and go pick it > up when there's an extended outage? That's a lot of generators and a lot of people to go pull them out and make sure they don't walk off during said extended outage. > I'll give Verizon a little credit. They restored service after about > 12 hours of outage. Cox didn't restore service until 12 hours *after* > my power came back on. > Seems pretty reasonable to me given the scale of the outage. > Could be worse. I could have Pepco instead of Dominion. But it could > be better. And 20 years ago the reliability was. 20 years ago you didn't have a megabit to your home let alone many megabits. 20 years ago, POTS was much simpler than the converged networks we have today. There is something to be said for the simplicity of POTS. If you're that concerned about calling 911 for a heat stroke, why don't you maintain a POTS line? Owen ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From mikeperry at torproject.org Fri Aug 3 20:08:57 2012 From: mikeperry at torproject.org (Mike Perry) Date: Fri, 3 Aug 2012 20:08:57 -0700 Subject: [liberationtech] The Tor Project has funding for a Firefox developer Message-ID: The Tor Project is looking for a Firefox developer as a contractor position likely starting in October and going through Q1 2013, with the possibility of later in 2013 and beyond. There may also be a possibility for part-time work prior to October. This would be a telecommuting position, with collaboration happening primarily over IRC and email. The purpose of our browser is to build a private-by-design reference implementation of "Do Not Track", but through the alteration of browser behavior and without the need for regulation or begging: https://www.torproject.org/projects/torbrowser/design/#privacy https://blog.torproject.org/blog/improving-private-browsing-modes-do-not-track-vs-real-privacy-design Your job would be to work on that Firefox-based browser as a developer. This includes triaging, diagnosing, and fixing bugs; looking for and resolving web privacy issues; responding on short notice to security issues; and working collaboratively with coworkers and volunteers on implementing new features and web behavior changes. You'd also be reviewing other people's code, designs, and academic research papers, and looking for ways to improve upon them. For information on how to apply and what to send in with your application, please see the job posting: https://www.torproject.org/about/jobs-browserhacker.html.en -- Mike Perry _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Aug 3 13:57:50 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 3 Aug 2012 22:57:50 +0200 Subject: Verizon FiOS - is BGP an option? Message-ID: <20120803205750.GC12615@leitl.org> ----- Forwarded message from Owen DeLong ----- From eugen at leitl.org Sat Aug 4 02:53:05 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 4 Aug 2012 11:53:05 +0200 Subject: [liberationtech] The Tor Project has funding for a Firefox developer Message-ID: <20120804095305.GQ12615@leitl.org> ----- Forwarded message from Mike Perry ----- From lists at infosecurity.ch Sat Aug 4 03:01:39 2012 From: lists at infosecurity.ch (Fabio Pietrosanti (naif)) Date: Sat, 04 Aug 2012 12:01:39 +0200 Subject: [tor-talk] Tor on Raspberry Pi Message-ID: On 7/21/12 3:00 PM, Dave Page wrote: > This seemed like a pretty obvious application of RaspPi to me, so I'm > wondering whether anybody else is working on it. It's not a million miles away > from the Torouter project, but it's also quite close to a custom distro of > Raspian with certain packages preinstalled and configured out of the box. Now that Rasberry Pi support Android, it maybe easily possible to use Guardian Project's ORBot to implement it, by creating a custom Android Image: http://androidpi.wikia.com/wiki/Android_Pi_Wiki It would be really cool also to see in future a CryptoCat Server or GlobaLeaks server running on Android over a Rasberry Pi| :-) -naif _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From moritz at torservers.net Sat Aug 4 03:04:56 2012 From: moritz at torservers.net (Moritz Bartl) Date: Sat, 04 Aug 2012 12:04:56 +0200 Subject: [tor-talk] Tor on Raspberry Pi Message-ID: On 04.08.2012 12:01, Fabio Pietrosanti (naif) wrote: > It would be really cool also to see in future a CryptoCat Server or > GlobaLeaks server running on Android over a Rasberry Pi| :-) My vision are secure "dedicated shells" on epoxified Pis :-) -- Moritz Bartl https://www.torservers.net/ _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sat Aug 4 03:48:44 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 4 Aug 2012 12:48:44 +0200 Subject: [tor-talk] Tor on Raspberry Pi Message-ID: <20120804104844.GT12615@leitl.org> ----- Forwarded message from "Fabio Pietrosanti (naif)" ----- From eugen at leitl.org Sat Aug 4 03:48:57 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 4 Aug 2012 12:48:57 +0200 Subject: [tor-talk] Tor on Raspberry Pi Message-ID: <20120804104857.GU12615@leitl.org> ----- Forwarded message from Moritz Bartl ----- From moxie at thoughtcrime.org Sat Aug 4 12:58:51 2012 From: moxie at thoughtcrime.org (Moxie Marlinspike) Date: Sat, 04 Aug 2012 12:58:51 -0700 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: I've noticed that this discussion has a tendency to be framed in terms of the crypto primitives. The core problems, as I see them, are actually somewhat unrelated to whether it's possible to efficiently perform cryptographic operations in JavaScript or not. In my reading, this blog post seems to imply that the recent decisions CryptoCat has made are a result of that question, but my understanding is that they're actually fairly unrelated. A W3C standardized Crypto API, or a browser extension that acts as a generic crypto provider, are a little too myopic to fully address the fundamental question of the interaction between dynamically loaded JS and the user's interface to their browser. The problem isn't so much whether JS can perform a cryptographic operation, but whether the user knows that it is, to what extent, to whom, and what *else* the JS is doing. The questions that CryptoCat has brought up for me are: 1) How does one create a webapp that provides client-based cryptography, without the security of that app simply being reduced to the security of SSL? If every time I initiate a chat session, it's a JS app that I'm loading over SSL, any attacker who could intercept that SSL connection (a lot of people today) would be able to intercept the contents of that chat session simply by modifying the JS in transit (so that it sends the attacker a copy of the plaintext, etc). Doesn't matter whether the crypto primitives are good are not. 2) How does one create a webapp that provides client-based cryptography, without the security of that app simply being reduced to the security of server-based cryptography? If every time I go to encrypt something client-side, I have to ask the server for the JS to perform that encryption, it's reducible to trusting the server with my plaintext. The server could choose, at any time, to hand me JS that appears to be performing encrypted operations, but is also transmitting a copy of the plaintext as well. Again, this doesn't depend on the existence of solid crypto primitives. 3) Is there any value at all to "warnings" that are placed on tools for providing secure communication or privacy, and is there something we can do better or instead? These types of warnings are beginning to suffer from a "certificate warning" effect. Users are so accustomed to seeing them that they ignore them. Even Tor, which has been around for years, and is widely recommended for use in a number of dangerous situations, still comes with a warning about its beta nature. In some sense, it's possible that a "warning" is now almost an incentive for someone to use that tool in a hostile context: people who are serious about security put warnings on their tools, while charlatans wouldn't be so inclined. 4) How do we experiment with security/privacy solutions? If we don't have all the answers, but want to attempt to start a discussion or an effort in a specific direction, what do we do? If we do it in public, chance are that people might actually start using our solution (perhaps proportionate to the number of warnings we include!), or reporters might start writing articles with shamefully ridiculous headlines about it. - moxie -- http://www.thoughtcrime.org On 08/04/2012 12:06 PM, Uncle Zzzen wrote: > https://crypto.cat will soon stop being a web-based service, and will > only exist as a browser extension. > The question is, what should future web-app developers do if they need > crypto? Rewrite all crypto primitives from scratch [and hope there's > enough interest in reviewing the code], then let users install yet > another extension? > > I believe there's a better solution. I've posted something about it. I > hope some of you would find it interesting. > http://thedod.noblogs.org/post/2012/08/04/what-ive-learned-from-cryptocat/ > > Cheers, > The Dod > _______________________________________________ > liberationtech mailing list > liberationtech at lists.stanford.edu > > Should you need to change your subscription options, please go to: > > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" > > You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech > > Should you need immediate assistance, please contact the list moderator. > > Please don't forget to follow us on http://twitter.com/#!/Liberationtech > > _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From Boyce-Tayloralax at chiprunner.ca Sat Aug 4 07:56:56 2012 From: Boyce-Tayloralax at chiprunner.ca (Mason Scott) Date: Sat, 04 Aug 2012 16:56:56 +0200 Subject: Big, strong, firm - an effective method Message-ID: It is done with loving care, firm and reliable. All are happy http://eozikep.huuosboaf.suprisehernow.ru/?elfocosi From schoen at eff.org Sat Aug 4 19:17:58 2012 From: schoen at eff.org (Seth David Schoen) Date: Sat, 4 Aug 2012 19:17:58 -0700 Subject: [liberationtech] Revised Liberationtech Mailing List Guidelines Message-ID: Greg Norcie writes: > This is a good logic, but there is still a problem even if Google scans > uploads. > > Both state and nonstate actors often use zero day vulnerabilities. Since > a zero day has never been seen before, there is no signature for it in > any virus database. This is totally true in general, and of course these zero days have been used in real attacks, and of course Google can't necessarily recognize zero-day vulnerabilities. In the particular case of text documents shared through Google Docs -- as opposed to Word files hosted for download with some sort of file sharing site! -- I think malware is a comparatively minor risk. The reason is that when you upload a document to Google Docs, Google imports the content of the document into Google's own internal format. When you then download a document from Google Docs, Google is generating _a new document from scratch_ with the same text and formatting content as the original, but the result is not the same file that was originally uploaded. If someone mails you an attachment, or hosts a document file of their own creation on a web site, your word processor could be compromised if there are software vulnerabilities that the document exploits, like a buffer overflow. And this is also true of, say, a PDF document that you're going to open in a PDF reader; we know that there have been exploits used in the wild against PDF readers. By contrast, if you were to import some Microsoft Word file into Google Docs and then export the resulting Google Docs document in Microsoft Word format, what you'd get back would _not_ be the original file or any modified form of the original file. Instead, you would get a completely new Microsoft Word file, generated from scratch by Google, with essentially the same textual content as the original. (And if you were to export the Google Docs document as a PDF, what you'd get would be a PDF that Google generated from scratch.) Since these documents are being generated by Google in this way, using its own internally-developed software, Google will presumably create safe and valid documents for its users, not ones that contain exploits and malware. We might still worry that someone could _upload_ a malicious document to Google in order to attack Google's import process (and perhaps attack the Google Docs servers in various ways, whether to disable other security features or access private information), but I presume Google's security folks have been very cautious about this aspect and Google Docs import is probably much less vulnerable to malware and exploits than the file import features in popular desktop word processors like Microsoft Word, OpenOffice, and LibreOffice. (Also, attackers can study the binary code of Microsoft Word -- as well as Microsoft's security patches to it! -- or the source code of OpenOffice and LibreOffice -- as well as their developers' security patches to them! -- in order to try to find specific vulnerabilities. It's harder for attackers to speculate usefully about what vulnerabilities may exist in Google Docs import functionality because the attackers probably don't have access to any of the Google Docs code, whether source or binary. So even if there are exploitable vulnerabilities in the way Google Docs parses documents, it will be much harder for attackers to find and exploit them than it would be for published desktop software.) (How do I square this with my observation that "Google can't necessarily recognize vulnerabilities"? I think the main point is that the zero-day vulnerabilities we're likely to encounter are vulnerabilities in desktop software. Google may not be able to detect these, but it may not be vulnerable to them either! And with cautious programming, it can also default to rejecting files that are suspicious in some general ways, even if it doesn't know exactly what's bad about them. For instance, Andreas Bogk gave a talk last year at the CCC Camp about a PDF security scanner he's been developing which is able to reject several kinds of invalid PDFs automatically. Some of those invalid PDFs may be innocent and not contain any malware or exploits, but Google could still use a scanner like this to reject them and refuse to import them out of an abundance of caution.) -- Seth Schoen Senior Staff Technologist https://www.eff.org/ Electronic Frontier Foundation https://www.eff.org/join 454 Shotwell Street, San Francisco, CA 94110 +1 415 436 9333 x107 _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sat Aug 4 12:55:07 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 4 Aug 2012 21:55:07 +0200 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: <20120804195507.GS12615@leitl.org> ----- Forwarded message from Uncle Zzzen ----- From eugen at leitl.org Sat Aug 4 13:09:33 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 4 Aug 2012 22:09:33 +0200 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: <20120804200932.GU12615@leitl.org> ----- Forwarded message from Moxie Marlinspike ----- From mfidelman at meetinghouse.net Sat Aug 4 21:24:13 2012 From: mfidelman at meetinghouse.net (Miles Fidelman) Date: Sun, 05 Aug 2012 00:24:13 -0400 Subject: [Freedombox-discuss] Who's interested in project management & collaboration tools? And... Message-ID: Jay Sulzberger wrote: > >>> >>> http://www.kickstarter.com/projects/1947703258/smart-notebooks-keeping-on-the-same-page-across-th >>> >>> > > Perhaps just limited encrypted Usenet? Funny you should mention that. NNTP is, to my mind, the world's greatest messaging protocol. Back in the day, Netscape built a "collaboration server" that added access controls and some management functions to an NNTP server - it was an incredibly powerful tool. In some sense, the model sitting in the back of my mind, is: - NNTP (with encryption and crypto-based access controls) - easier management of (private) group creation - messages containing HTML & JavaScript that can do some embedded threading (think about sending a Wiki page, the initial page shows up as a news message, edits are automatically applied rather than showing up as separate messages) > > Also perhaps: > > http://www.kickstarter.com/projects/joeyh/git-annex-assistant-like-dropbox-but-with-your-own > > > with a daemon that labels files, presents histories, and such like. > > Yes... saw that a while back - does look really interesting. Miles -- In theory, there is no difference between theory and practice. In practice, there is. .... Yogi Berra _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From unclezzzen at gmail.com Sat Aug 4 12:06:39 2012 From: unclezzzen at gmail.com (Uncle Zzzen) Date: Sun, 5 Aug 2012 02:06:39 +0700 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: https://crypto.cat will soon stop being a web-based service, and will only exist as a browser extension. The question is, what should future web-app developers do if they need crypto? Rewrite all crypto primitives from scratch [and hope there's enough interest in reviewing the code], then let users install yet another extension? I believe there's a better solution. I've posted something about it. I hope some of you would find it interesting. http://thedod.noblogs.org/post/2012/08/04/what-ive-learned-from-cryptocat/ Cheers, The Dod _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jya at pipeline.com Sun Aug 5 04:15:58 2012 From: jya at pipeline.com (John Young) Date: Sun, 05 Aug 2012 07:15:58 -0400 Subject: [liberationtech] Revised Liberationtech Mailing List Guidelines In-Reply-To: <20120805103211.GD12615@leitl.org> References: <20120805103211.GD12615@leitl.org> Message-ID: Informative post by Seth. But why would Google Docs be any more trustworthy than Google search and other freebies by the Gorgon? With the admitted cooperation of Google with authorities by law and by commercial opportunity? Same dubity applies to cloud servers whose biggest most lucrative customers are governments and those most eager to gain government favor. The seemingly endless pursuit of the holy grail of online security, yet remain within government protection, is daunting if Sisyphean: the Soviet-style collectivization of hiding, exposing and faking vulnerabilities and illusory defenses; Guevara insurgencies of work-arounds, Cheney-like enforcing of fire rediscovery and wheel reinvention; David Blaine levitation of wizard coding reputations to cover deliberate back-dooring for personal gain and patriotism; TLA-grade proliferating outlets for inseminating infected blood into coding with rigged modules under cover of malware combat aka as freedom fighting for chauvinistic-tainted comsec validation as diseased as Crypto AG. It was for a brief period security-wise to reject any major enterprise as a means to protect communications due to certainty those will be compromised by commercial interest and state protection. Now the bigger the better, the more venal the more desirable. Never mind the obvious trickle down from accumulated wealth to needy researchers ready to wear whatever hats fit ambition, personal debt, family obligations, withering of courage, no apologies for changing camps offered. From eugen at leitl.org Sun Aug 5 02:21:58 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 5 Aug 2012 11:21:58 +0200 Subject: [Freedombox-discuss] Who's interested in project management & collaboration tools? And... Message-ID: <20120805092157.GZ12615@leitl.org> ----- Forwarded message from Miles Fidelman ----- From eugen at leitl.org Sun Aug 5 03:32:11 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 5 Aug 2012 12:32:11 +0200 Subject: [liberationtech] Revised Liberationtech Mailing List Guidelines Message-ID: <20120805103211.GD12615@leitl.org> ----- Forwarded message from Seth David Schoen ----- From millay at beerintheevening.com Sun Aug 5 05:02:10 2012 From: millay at beerintheevening.com (=?koi8-r?B?0NLPxcvUIMLJ2s7F0yDQzMHOwQ==?=) Date: Sun, 5 Aug 2012 13:02:10 +0100 Subject: =?koi8-r?B?68HLINPBzc/T1M/R1MXM2M7PIM7B0MnTwdTYIMLJ2s7F0y3QzMHO?= Message-ID: <000d01cd72f9$c2df7520$6400a8c0@millay> КАК РАЗРАБОТАТЬ БИЗНЕС ПЛАН? КАК АНАЛИЗИРОВАТЬ В БИЗНЕС ПЛАНИРОВАНИИ, МЕТОДЫ ЗАЩИТЫ ФИНАНСОВЫХ ПРОЕКТОВ. За более подробной информацuей обpащайтеcь по тел: +7 499 4Ч54.095 или 8 (Ч95) 792_21\22 Дата учебного курса: 13-14 августа Краткая информация о предстоящем мероприятии: Методы из практики по разработке БП и технико-экономических обоснований. Применение литературы (на что требуется обращать внимание), использование электронных таблиц, правильный выбор и работа со специализированным ПО. Восприятие подготовленной документации инвестором или партнером √ как правильно подготовить и оформить документацию. Методы и практические рекомендации: Построение структуры бизнес плана; Определение состава затрат на построение инвестиционной программы (что и как следует учитывать). Понятие Критерия Эффективности при построении инвестиционной программы. Анализ целесообразности. Подготовить исходную информацию для оценки проекта: определение доходной и затратной частей, их классификация по статьям для: вновь создаваемых предприятий.функционирующего предприятия. Определение и построение источников финансирования: кредиты, не распределенная прибыль, инвестиционный капитал. Определить и рассчитать влияние учетной политики и инфляции на финансовые результаты проекта. ДИСКОНТИРОВАНИЕ √ критерий разногласия! Вопрос применения и понятия метода. Подготовка финансовой части документации: Требования к расчетам и их объем;Фин. План его структура финансовых приложений; Самостоятельная подготовка электронных таблиц;Описание расчетов в финансовом плане, необходимый объем;Финансовые показатели их определение и необходимые коррективы;Определение фин. показателей и их анализ;Точа (0), определение финансовой прочности проекта;Полученные данные и их использование. Доходность проекта, анализ, показатели, которые определяют критерии рентабельности и прибыли. Финансовые результаты проекта. Нестандартные проекты и особенности их расчета. Грамотно подготовить текстовую часть документа. Где можно почерпнуть информацию для маркетинговых исследований. Обработка информации для маркетинговых исследований √ управление объемом информации, понятие, что такое Маркетинговые исследования в стандартном варианте и использование обработанной информации в структуре бизнес плана. Вся информация по тел: код (495) - 7.42/91_98 +7 499 445/40_95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4240 bytes Desc: not available URL: From virtualadept at gmail.com Sun Aug 5 16:18:56 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Sun, 5 Aug 2012 19:18:56 -0400 Subject: [ZS] Bitcoin + Open Transactions + Web Of Trust Message-ID: On Fri, Aug 3, 2012 at 4:24 AM, Eugen Leitl wrote: > Web-Of-Trust: Provides: Reputation system so there is consequences if somebody scams (nobody will > trade with them), and good reputations have value. Needs: Low-Trust transfer of value, so parties with no > reputation can build a good reputation: (Bitcoin) Needs: Formal way to describe contracts, that can describe > the Didn't the cypherpunks do research on zero-trust reputation management networks back in the 90's? Also, the trust metric normalization research being done now should be part of that if it's not already. -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From virtualadept at gmail.com Sun Aug 5 16:20:48 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Sun, 5 Aug 2012 19:20:48 -0400 Subject: [ZS] Bitcoin + Open Transactions + Web Of Trust Message-ID: On Sat, Aug 4, 2012 at 1:52 PM, Lodewijk andri de la porte wrote: > Seeing as how he's performed a lot and done so perfectly thus far his > present rating is exactly accurate. To be fair, some of the biggest and most hard hitting scams on the Silk Road so far were perpetrated by people who spent stupid amounts of time (well over a year) and effort (rep scores in the double, if not triple digits) building reputations before they blew it all to scrap with a single massive rip-off. > In finance it is more important to have explained what someone's plan is and > to have reason to assume one will not cheat his/her way out of that plan > (like greater loss/discomfort, jail for example. Death is popular too, in > some circles). These two things are quite much what pirateat40 lacks. Assassination markets, while an interesting idea, haven't yet really taken off. There are a few out there but nobody seems to be taking them seriously. -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From guardedlt8 at rotechkeg.com Sun Aug 5 23:10:14 2012 From: guardedlt8 at rotechkeg.com (=?koi8-r?B?IvTJ0M/H0sHGydEi?=) Date: Sun, 5 Aug 2012 22:10:14 -0800 Subject: =?koi8-r?B?++/rIJYg4+Xu+SDu4SDw7+zp5/Lh5ung?= Message-ID: <829BF461608143C1A9F2ADD07B298020@nazary794ee7ae> Типография полного цикла ЛУЧШИЕ ЦЕНЫ И СРОКИ на офсетную и цифровую печать по Москве и области (т. 940-7322) УДОБНО – склад/офис - м. Курская ВЫГОДНО - гарантировано(!) самые низкие цены БЫСТРО - 5-10 рабочих дней КОМПЛЕКСНО - Каталоги, брошюры, плакаты, пакеты, буклеты, листовки, воблеры, шелфтокеры, кашированные изделия, коробки и т. д. КАЧЕСТВЕННО - Машины формата А1 5 красок, теперь и машина формата А2(!), Хедельберг А3, евроскоба,КБС,выборочный лак КОМФОРТНО - профессиональные менеджеры ответят на все Ваши вопросы Ждем Ваши заказы на просчет! Телефон Московского представительства: 940-7322 log at maillog.ru From cavort3 at rowzie.com Mon Aug 6 00:02:13 2012 From: cavort3 at rowzie.com (=?koi8-r?B?IuLSxc7E2SDP0NTPzSI=?=) Date: Sun, 5 Aug 2012 23:02:13 -0800 Subject: =?koi8-r?B?NTAgJSDTy8nEy8EgzsEgwtLFzsTP19nFINTP18HS2SDP1CDQ0s/J2tfP?= =?koi8-r?B?xMnUxczFyiDP0NTPzSDJINcg0s/azsnD1Q==?= Message-ID: <62DC7C5528024D8E8D3F4FB5DC9F46CF@transpor8a178e> www.бренды-оптом.рф Акция - вторая вещь со скидкой 50% . Срок действия акции ограничен. Каталог брендовых товаров, цены ниже рыночных. Одежда и обувь, мужская, женская, детская, сумки, очки. Более 150 тысяч брендовых товаров. Приглашаем к сотрудничеству Организаторов Совместных Закупок, компании, ИЧП, физических лиц. Вот неполный список предлагаемых брендов Abercrombie & Fitch, Adidas, Alexander McQueen , Andrew&Angel, Armani, Herve Leger, Burberry, BVLGARI , Calvin Klein , Carrera, Cavalli , Chanel, Chloe, Christian Audigier , Christian Louboutin , Coach , Columbia, D&G , Denis Simachev , Diesel , Dior, Disney , DKNY , Doraemon , Dsquared2 , Ed Hardy , Fendi , Frankie Morello , Fred Perry , Galliano, GAP , Gianmarco Lorenzi, Giuseppe Zanotti , Gucci, GUESS , Hello Kitty , Hermes, Iceberg, Jimmy Choo , Juicy Couture , KAREN MILLEN, Kurosawa, Lee, Levi's, Louis Vuitton, Manolo Blahnik, Miu Miu, Moncler, Mont Blanc, Moschino, Nike, Paul Smith , Peak Performance, Polo, Prada, Puma, RUKKA, The North Face, Tod's , Tommy Hilfiger, UGG , Yves Saint Laurent, Zara. Ответим на вопросы по телефону (495) 989 68 11 или info at china-trad.ru , скайпу: china2russia Пожалуйста не отвечайте на это письмо кнопкой "Ответить", т.к оно было выслано не с нашего ящика From wigwagging4 at rccl.com Mon Aug 6 04:45:20 2012 From: wigwagging4 at rccl.com (=?koi8-r?B?IuL58/Ty7ywg6+H+5fP09+Xu7u8sIOTl++X37yI=?=) Date: Mon, 6 Aug 2012 03:45:20 -0800 Subject: =?koi8-r?B?88TFzMHFzSDSwdPT2czL1SDXwdvFyiDSxcvMwc3ZLg==?= Message-ID: Сделаем рассылку вашей рекламы. БЫСТРО, КАЧЕСТВЕННО, ДЕШЕВО! Россия Юр+Ч 18.5 млн - 5000 руб - 1250 грн. Москва Юр+Ч 7.3 млн - 4000 руб - 1000 грн. Украина 4.2млн - 3000 руб - 800 грн. Заказываете две рассылки - третью дарим!!! Тел: +38 (096) 302 88 03 ICQ: 624 657 171 Вы дочитали нашу рекламу-значит это работает! Имеются базы всех стран!!! From beetlinggbx at r-p.com Sun Aug 5 23:27:35 2012 From: beetlinggbx at r-p.com (=?koi8-r?B?Iu3By9PJzcHM2M7B0SDSxcvMwc3BIg==?=) Date: Mon, 6 Aug 2012 08:27:35 +0200 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAg0tXCzMXKLCDtxdPRwyA0NCDSwdPT?= =?koi8-r?B?2czLySAyMCAwMDAg0tXCzMXK?= Message-ID: <8868ED366D5F4E8DB20C7613C6369D9F@6d8e6e2e650848a> 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК (для указания вашего сайта в письме) - По вашему графику - Без ограничений по срокам - Возможно менять макеты все 8 раз !!! - Подготовка макетов бесплатно АКЦИИ: Месяц 44(46) рассылок - 2 раза в день - 5 раз в неделю - 20 000 рублей Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,7 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 From eugen at leitl.org Sun Aug 5 23:36:55 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 6 Aug 2012 08:36:55 +0200 Subject: [ZS] Bitcoin + Open Transactions + Web Of Trust Message-ID: <20120806063655.GD12615@leitl.org> ----- Forwarded message from Bryce Lynch ----- From eugen at leitl.org Sun Aug 5 23:36:59 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 6 Aug 2012 08:36:59 +0200 Subject: [ZS] Bitcoin + Open Transactions + Web Of Trust Message-ID: <20120806063659.GE12615@leitl.org> ----- Forwarded message from Bryce Lynch ----- From oozesrgsh6 at retailcouncilnys.com Mon Aug 6 01:27:40 2012 From: oozesrgsh6 at retailcouncilnys.com (=?koi8-r?B?Iv7V1snFINPN0yAi?=) Date: Mon, 6 Aug 2012 10:27:40 +0200 Subject: =?koi8-r?B?9MXQxdLYIN7J1MHU2CDe1dbJxSDTzdMg08/Pwt3FzsnRIM/exc7YINDS?= =?koi8-r?B?z9PUzyE=?= Message-ID: Хотите читать чужие смс сообщения? Мы вам поможем! Работаем по всем операторам и регионам. Гарантии 100%. Наш сайт: www.smska007.ru From tallyhoedoa8 at racerxill.com Sun Aug 5 23:46:19 2012 From: tallyhoedoa8 at racerxill.com (=?koi8-r?B?Iubh7uXy+SI=?=) Date: Mon, 6 Aug 2012 12:16:19 +0530 Subject: =?koi8-r?B?8MzJ1NkgT1NCLTMg5uHu5fL5?= Message-ID: Оптовые и розничные поставки - САМЫЕ НИЗКИЕ ЦЕНЫ! - OSB-3 производства Bolderaja (Латвия) , Arbec (Канада), Egger (Германия) - ФАНЕРЫ ФК березовая , ФСФ хвойная, ФОФ ламинированная в любую точку России , склад в Москве С уважением и надеждой на дальнейшее сотрудничество www.стратегия-и-паритет.рф From tomskm529 at rosswins.com Mon Aug 6 00:07:44 2012 From: tomskm529 at rosswins.com (=?koi8-r?B?IuTP0s/WztnKIM3B09TF0iI=?=) Date: Mon, 6 Aug 2012 12:37:44 +0530 Subject: =?koi8-r?B?9NLFwtXF1NPRIMHHxc7UINDPINDSz8TB1sHNINPQxcPUxcjOycvJINcg?= =?koi8-r?B?18Hbxc0gx8/Sz8TF?= Message-ID: <76F58BA1F1D14A4AA461DDEDE0E8C69E@xyzb3f1132659f> Требуется агент по продажам спецтехники. Работа в вашем городе. В наличии имеются автомобили «Дорожный мастер ISUZU». Автомобиль востребован муниципальными структурами и фирмами, занимающимися строительством и обслуживанием автомобильных дорог. Способ привлечения покупателя, график работы - на ваше усмотрение. Вознаграждение - от 100 000 рублей за каждую проданную единицу техники. При желании - заключение договора о посреднических услугах Дополнительная информация - по телефону +7 903 591 2845 круглосуточно. Подробности - здесь www.дорожный-мастер-тут.рф From motorbikegh at royal-orleans.com Mon Aug 6 04:25:19 2012 From: motorbikegh at royal-orleans.com (=?koi8-r?B?IvPl8vTp5unr4fQi?=) Date: Mon, 6 Aug 2012 13:25:19 +0200 Subject: =?koi8-r?B?79DMwdTBINDP08zFINDPzNXexc7J0SDz5fL06ebp6+H04Q==?= Message-ID: <3A3D4FDF3EC54EDA9D6342532F14D7DA@WKNTGIMUS003> Все виды сертификации АКЦИЯ Оплата после получения СЕРТИФИКАТА Только у нас СЕРТИФИКАТ СООТВЕТСТВИЯ (ГОСТ Р) ЗА 1 ДЕНЬ!!! (495) 227 94 43 From joustingub at rmbarchitects.com Mon Aug 6 00:59:44 2012 From: joustingub at rmbarchitects.com (=?koi8-r?B?Iu7v9/nqIOvv9PTl5PYi?=) Date: Mon, 6 Aug 2012 13:29:44 +0530 Subject: =?koi8-r?B?8NLPxMHF1NPRICDu7/f56iDr7/T05eT2?= Message-ID: Продается НОВЫЙ КОТТЕДЖ Коттедж, 200 м2 Участок: 12 сот. Киевское шоссе, Боровск Газ, вода, Электрика, Канализация, все заведено в дом и функционирует Под чистовую отделку ТРЕБУЕТСЯ ТОЛЬКО ФИНИШНАЯ ОТДЕЛКА. немецкие технологии 6,7 млн. руб www.продам-дом-тут.рф From wag3 at regentfinancial.com Mon Aug 6 00:42:52 2012 From: wag3 at regentfinancial.com (=?koi8-r?B?IuUt0sXLzMHNwSI=?=) Date: Mon, 6 Aug 2012 13:42:52 +0600 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAg0tXCzMXKICvIz9PUyc7HIM7BIM3F?= =?koi8-r?B?09HDINcg8O/k4fLv6w==?= Message-ID: <172593523.71919951249028@regentfinancial.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 14622 bytes Desc: not available URL: From vacancy58 at reportcollection.com Mon Aug 6 01:37:46 2012 From: vacancy58 at reportcollection.com (=?koi8-r?B?IvDSz8TBxdTT0SDEz80i?=) Date: Mon, 6 Aug 2012 14:07:46 +0530 Subject: =?koi8-r?B?8NLPxMHF1NPRIMTPzSDXIMHM2NDJytPLz80g09TJzMUg1yA0MsvNIM/U?= =?koi8-r?B?IO3P08vX2Swg1SDHz9LOz8zZ1s7Px88gy9XSz9LUwQ==?= Message-ID: Продается здесь www.купи-дом-здесь.рф From senatorbfow5 at randrimages.com Mon Aug 6 01:56:13 2012 From: senatorbfow5 at randrimages.com (=?koi8-r?B?IvPl8vTp5unr4fQi?=) Date: Mon, 6 Aug 2012 14:26:13 +0530 Subject: =?koi8-r?B?79DMwdTBINDP08zFINDPzNXexc7J0SDz5fL06ebp6+H04Q==?= Message-ID: Все виды сертификации АКЦИЯ Оплата после получения СЕРТИФИКАТА Только у нас СЕРТИФИКАТ СООТВЕТСТВИЯ (ГОСТ Р) ЗА 1 ДЕНЬ!!! (495) 227 94 43 From festereda415 at rlsinc.com Mon Aug 6 02:21:32 2012 From: festereda415 at rlsinc.com (=?koi8-r?B?IvTJ0M/H0sHGydEi?=) Date: Mon, 6 Aug 2012 14:51:32 +0530 Subject: =?koi8-r?B?++/rIJYg4+Xu+SDu4SDw7+zp5/Lh5ung?= Message-ID: <671C4C0D3A7648F9B3827D17EABE5574@sels3ca9177d45> Типография полного цикла ЛУЧШИЕ ЦЕНЫ И СРОКИ на офсетную и цифровую печать по Москве и области (т. 940-7322) УДОБНО – склад/офис - м. Курская ВЫГОДНО - гарантировано(!) самые низкие цены БЫСТРО - 5-10 рабочих дней КОМПЛЕКСНО - Каталоги, брошюры, плакаты, пакеты, буклеты, листовки, воблеры, шелфтокеры, кашированные изделия, коробки и т. д. КАЧЕСТВЕННО - Машины формата А1 5 красок, теперь и машина формата А2(!), Хедельберг А3, евроскоба,КБС,выборочный лак КОМФОРТНО - профессиональные менеджеры ответят на все Ваши вопросы Ждем Ваши заказы на просчет! Телефон Московского представительства: 940-7322 log at maillog.ru From protozooneh8 at redarrows.com Mon Aug 6 03:07:05 2012 From: protozooneh8 at redarrows.com (=?koi8-r?B?ItzMydTO2cUgIMvXwdLUydLZIg==?=) Date: Mon, 6 Aug 2012 15:37:05 +0530 Subject: =?koi8-r?B?8NLPxMHA1NPRIMvXwdLUydLZINcg6MHNz9fOycvByCA=?= Message-ID: Продаются элитные квартиры в Хамовниках в близи Новодевичьего монастыря www.дом-хамовники.рф From nadim at nadim.cc Mon Aug 6 15:53:15 2012 From: nadim at nadim.cc (Nadim Kobeissi) Date: Mon, 6 Aug 2012 15:53:15 -0700 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: Thanks, Moxie, for clarifying a lot already. I have some more things to add as Cryptocat's lead developer: This is a very misinformed blog post that's been going around concerning Cryptocat's development roadmap that I need to address, simply because not only is the post so fundamentally incorrect on its technical assumptions, but it goes around being written in a surprisingly authoritative tone: The blog post suggests that becoming a local browser app means that Cryptocat no longer uses JavaScript cryptography. This is nonsense: JavaScript is a *language*, and since browser apps/plugins are written in an HTML5 framework, we will still be using JavaScript to implement cryptographic functions. The only thing that has changed is *the method of code delivery.* Cryptocat research, even with this change in code delivery, remains within the purview of JavaScript cryptography research, not abandoning it but improving it by suggesting a different method of code delivery. The articles that the blog post links to attack JS crypto code delivery methods, and we are answering those concerns: * We have NOT "Abandoned JS crypto" and "officially declared" that JavaScript crypto is "wrong." * We have NOT "declared that you cannot do serious crypto in pure JavaScript" * We HAVE simply changed the method of JS code delivery into a local browser plugin, in order to further advance the security of JS cryptography. I have absolutely no idea where the author pulled his conclusions from and I'm really surprised as to how certainly he posits them in his blog post. The author goes on to posit that a browser extension be used in order to provide a standard cryptographic API for browsers. This is redundant for two reasons: * The W3C is already working on a standard cryptographic API for browsers: http://www.w3.org/2012/webcrypto/ (Cryptocat is part of this working group.) * There exists a variety of vetted, very well-designed standard libraries for client-side browser crypto, such as http://crypto.stanford.edu/sjcl/and http://code.google.com/p/crypto-js/. When writing a blog posts that takes ideas as granted facts, please make sure you know what you're talking about. NK On Sat, Aug 4, 2012 at 12:58 PM, Moxie Marlinspike wrote: > > I've noticed that this discussion has a tendency to be framed in terms > of the crypto primitives. The core problems, as I see them, are > actually somewhat unrelated to whether it's possible to efficiently > perform cryptographic operations in JavaScript or not. In my reading, > this blog post seems to imply that the recent decisions CryptoCat has > made are a result of that question, but my understanding is that they're > actually fairly unrelated. > > A W3C standardized Crypto API, or a browser extension that acts as a > generic crypto provider, are a little too myopic to fully address the > fundamental question of the interaction between dynamically loaded JS > and the user's interface to their browser. The problem isn't so much > whether JS can perform a cryptographic operation, but whether the user > knows that it is, to what extent, to whom, and what *else* the JS is doing. > > The questions that CryptoCat has brought up for me are: > > 1) How does one create a webapp that provides client-based cryptography, > without the security of that app simply being reduced to the security of > SSL? If every time I initiate a chat session, it's a JS app that I'm > loading over SSL, any attacker who could intercept that SSL connection > (a lot of people today) would be able to intercept the contents of that > chat session simply by modifying the JS in transit (so that it sends the > attacker a copy of the plaintext, etc). Doesn't matter whether the > crypto primitives are good are not. > > 2) How does one create a webapp that provides client-based cryptography, > without the security of that app simply being reduced to the security of > server-based cryptography? If every time I go to encrypt something > client-side, I have to ask the server for the JS to perform that > encryption, it's reducible to trusting the server with my plaintext. > The server could choose, at any time, to hand me JS that appears to be > performing encrypted operations, but is also transmitting a copy of the > plaintext as well. Again, this doesn't depend on the existence of solid > crypto primitives. > > 3) Is there any value at all to "warnings" that are placed on tools for > providing secure communication or privacy, and is there something we can > do better or instead? These types of warnings are beginning to suffer > from a "certificate warning" effect. Users are so accustomed to seeing > them that they ignore them. Even Tor, which has been around for years, > and is widely recommended for use in a number of dangerous situations, > still comes with a warning about its beta nature. In some sense, it's > possible that a "warning" is now almost an incentive for someone to use > that tool in a hostile context: people who are serious about security > put warnings on their tools, while charlatans wouldn't be so inclined. > > 4) How do we experiment with security/privacy solutions? If we don't > have all the answers, but want to attempt to start a discussion or an > effort in a specific direction, what do we do? If we do it in public, > chance are that people might actually start using our solution (perhaps > proportionate to the number of warnings we include!), or reporters might > start writing articles with shamefully ridiculous headlines about it. > > - moxie > > -- > http://www.thoughtcrime.org > > On 08/04/2012 12:06 PM, Uncle Zzzen wrote: > > https://crypto.cat will soon stop being a web-based service, and will > > only exist as a browser extension. > > The question is, what should future web-app developers do if they need > > crypto? Rewrite all crypto primitives from scratch [and hope there's > > enough interest in reviewing the code], then let users install yet > > another extension? > > > > I believe there's a better solution. I've posted something about it. I > > hope some of you would find it interesting. > > > http://thedod.noblogs.org/post/2012/08/04/what-ive-learned-from-cryptocat/ > > > > Cheers, > > The Dod > > _______________________________________________ > > liberationtech mailing list > > liberationtech at lists.stanford.edu > > > > Should you need to change your subscription options, please go to: > > > > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > > > If you would like to receive a daily digest, click "yes" (once you click > above) next to "would you like to receive list mail batched in a daily > digest?" > > > > You will need the user name and password you receive from the list > moderator in monthly reminders. You may ask for a reminder here: > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > > > Should you need immediate assistance, please contact the list moderator. > > > > Please don't forget to follow us on http://twitter.com/#!/Liberationtech > > > > > > _______________________________________________ > liberationtech mailing list > liberationtech at lists.stanford.edu > > Should you need to change your subscription options, please go to: > > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > If you would like to receive a daily digest, click "yes" (once you click > above) next to "would you like to receive list mail batched in a daily > digest?" > > You will need the user name and password you receive from the list > moderator in monthly reminders. You may ask for a reminder here: > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > Should you need immediate assistance, please contact the list moderator. > > Please don't forget to follow us on http://twitter.com/#!/Liberationtech > _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From virtualadept at gmail.com Mon Aug 6 13:31:25 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Mon, 6 Aug 2012 16:31:25 -0400 Subject: [ZS] IMPORTANT: Delegation, decentralization, personal initiative & flying the ZS flag Message-ID: On Fri, Aug 3, 2012 at 8:01 AM, ZeroState.net wrote: > Basically I'm going to keep churning away doing everything I can, and > setting up infrastructure that helps everyone else to be as effective as > possible, but at the same time everyone else needs to just run with their There are bits of infrastructure that the rest of us can set up, Amon. The Zero State wants to use the Tor network to communicate, yes? So, let's set up Tor nodes. All of us. Not necessarily exit nodes or routers - not everyone's in a position to do that - but to run a Tor hidden service you don't need to run an exit node or router, just a Tor client. Tor in client mode is perfectly capable of making arbitrary TCP-based services available on the Tor network, in fact that's how Torchat works. There are some services we've been talking about for nearly a year now, from a private link aggregator ala delicious.com to a distributed software development and revision control system. Let's set a few of these things up as Tor services, spread the .onion URLs out of band (i.e. not on this mailing list) and hammer on them. For those of us who use IRC, set up #zerostate channels if they don't exist already (or join the ones that do) so we can have a presence. Let's set up a Tor-only Zero State IRC server, for that matter. > ZS isn't just the people on this list, or the official members register, or > the facebook group, or the blog readers or whatever. It is all of us, PLUS > the people we personally go out there to connect with. If you're involved in any projects (and a lot of us are) there isn't any harm in stating that you're a member of the Zero State in addition to being a dev on $project. > 1) What am I interested in or working on that fits with the ZS spirit? > Whatever that thing is, THAT is the ZS you need to be promoting and engaging > with! Again, practically all of us on this mailing list have projects running in the background. Let's collaborate on them. Project Byzantium (my pet project) needs translators for the control panel, the captive portal, and some other stuff. We're refactoring code right now but when we get i18n going I could really use some help with that. I'm willing to try out some transcranial electrostimulation systems to see how well they work on my non-standard neurology, plus I'm going to need to cram a few languages for some overseas travel coming up, so I'd like to see if I can do an "I know Kung-Fu" while under the electrical influence. What else does everyone have? What are we willing to put even two hours toward on someone else's project? -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From churchyards499 at robinsons-intl.com Mon Aug 6 02:31:37 2012 From: churchyards499 at robinsons-intl.com (=?koi8-r?B?IuTF0sXX0c7OwdEg0MHMz97LwSI=?=) Date: Mon, 6 Aug 2012 16:31:37 +0700 Subject: =?koi8-r?B?5MXSxdfRzs7B0SDQwczP3svBIMTM0SAgzc/Sz9bFzs7Px88gz9Qg0NLP?= =?koi8-r?B?ydrXz8TJ1MXM0Q==?= Message-ID: Деревянная палочка для мороженного от производителя Палочка для кофе и медицинский шпатель. Береза, ольха все документы на внутренний и внешний рынок 114x10x2 мм, 94x10x2 мм, 94x17/11x2 мм Тел. +380 67 470 52 40 From exponentially59 at roundsquaretech.com Mon Aug 6 04:06:46 2012 From: exponentially59 at roundsquaretech.com (=?koi8-r?B?Is3PzM/LzyI=?=) Date: Mon, 6 Aug 2012 16:36:46 +0530 Subject: =?koi8-r?B?7c/Mz8vPINXL0sHJzsE=?= Message-ID: <7CEC6955AE064B4885FB0919F0091EC1@bernell> Сухое обезжиренное молоко Молоко цельное сухое Молоко цельное сгущенное с сахаром Палочка для мороженого Украина, Черкассы +3 80 472 54 42 69 From helots6 at rosenbergverft.com Mon Aug 6 04:50:48 2012 From: helots6 at rosenbergverft.com (=?koi8-r?B?IuTM0SD3wdMgySD3wdvFyiDkxdfV28vJIg==?=) Date: Mon, 6 Aug 2012 17:20:48 +0530 Subject: =?koi8-r?B?6M/UydTFIOnNxdTYIDEwMCUg8M/Uxc7DycA/IDEg1MHCzMXUy8Eg0sHC?= =?koi8-r?B?z9TBxdQgNzIgIN7B08E=?= Message-ID: Хотите Иметь 100% Потенцию и Навсегда Избавиться от Неуверенности в Своей Мужской Состоятельности? 1 таблетка работает 72 часа, но "включается" когда необходимо Натуральный, безопасный и эффективный препарат для мужчин. Уникальная сбалансированная формула безопасно воздействует на мужской организм, заметно повышая уровень тестостерона - главного мужского гормона. Препарат позволяет каждому мужчине быть успешным, уверенным в себе и иметь максимум энергии. Закажите сейчас и получите 1 упаковку бесплатно www.энергия-человека.рф From whitingl980 at rmhs.com Mon Aug 6 03:28:16 2012 From: whitingl980 at rmhs.com (=?koi8-r?B?IvTJ0M/H0sHGydEi?=) Date: Mon, 6 Aug 2012 17:28:16 +0700 Subject: =?koi8-r?B?++/rIJYg4+Xu+SDu4SDw7+zp5/Lh5ung?= Message-ID: <14B050DCA28A4808BE01DB664CF34ABC@6Q3IDLHB9JQS39I> Типография полного цикла ЛУЧШИЕ ЦЕНЫ И СРОКИ на офсетную и цифровую печать по Москве и области (т. 940-7322) УДОБНО – склад/офис - м. Курская ВЫГОДНО - гарантировано(!) самые низкие цены БЫСТРО - 5-10 рабочих дней КОМПЛЕКСНО - Каталоги, брошюры, плакаты, пакеты, буклеты, листовки, воблеры, шелфтокеры, кашированные изделия, коробки и т. д. КАЧЕСТВЕННО - Машины формата А1 5 красок, теперь и машина формата А2(!), Хедельберг А3, евроскоба,КБС,выборочный лак КОМФОРТНО - профессиональные менеджеры ответят на все Ваши вопросы Ждем Ваши заказы на просчет! Телефон Московского представительства: 940-7322 log at maillog.ru From vociferousr0 at rolandguerin.com Mon Aug 6 02:58:20 2012 From: vociferousr0 at rolandguerin.com (=?koi8-r?B?Ivfv7O/n5OHz9PLv6iI=?=) Date: Mon, 6 Aug 2012 17:58:20 +0800 Subject: =?koi8-r?B?8uHz8PLv5OH24SDk5fLl9/Hu7vnoIOTv7e/3LiDz6+nk6+Eg5O8gMjAl?= Message-ID: <1D39A0AD9A034F6A935B82366FD0C379@A27> "ВОЛОГДАСТРОЙ" тел в Москве: +7 495 9733427; +7 495 РАСПРОДАЖА ДЕРЕВЯННЫХ ДОМОВ. СКИДКА ДО 20% В стоимость дома входит: проект, легкие фундаментные блоки, готовый к сборке комплект стен и перегородок, стропильная система и кровельный материал типа "Ондулин", окна и входные двери из ПВХ. www.важное-тут.рф/10/1.html From eugen at leitl.org Mon Aug 6 09:04:09 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 6 Aug 2012 18:04:09 +0200 Subject: The Armory is about to close Message-ID: <20120806160409.GS12615@leitl.org> A good thing actually, less heat towards BitCoin. http://bitcoinmagazine.net/not-ready-silk-roads-the-armory-terminated/ Silk Roadbs bThe Armoryb Terminated More articles by Justin Porter B; Written by: Justin Porter Tags: breaking news, spotlight, the armory The Armory is Shutting Down The owner and operator of Silk Road, aliased as Dread Pirate Roberts, announced on August 2nd, 2012 that bThe Armoryb, an extension of Silk Road focused on allowing users to anonymously buy and sell munitions, will be closing. Roberts cited a low and continuously declining number of transactions b enough that the 10% take of Silk Road wasnbt even enough to keep the servers paid b as reason for discontinuing this particular arm of the Silk Road marketplace. Some users explain user dis-interest with high prices on The Armory, and too much competition from local dealers, who can still retain customer privacy while conducting legal transactions. The Armory is not yet closed b a countdownhas been initiated. Roberts warns users to finish up their current business and withdraw any lingering funds before the countdown is reached. Many Bitcoin users have expressed joy over the closure, either for personal anti-gun reasons, or for the removal of a potential derogatory connotation of Bitcoins with the illegal sale of firearms. Despite this closure, there may be hope in the future for those interested in anonymously pawning and procuring guns online. Roberts states, bif we are going to serve an anonymous weapons market, I think it will require more careful thought an[d] planning,b indicating the possibility of a future restoration of the service after some additional forethought on the design. From gmaxwell at gmail.com Mon Aug 6 16:28:53 2012 From: gmaxwell at gmail.com (Gregory Maxwell) Date: Mon, 6 Aug 2012 19:28:53 -0400 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: On Mon, Aug 6, 2012 at 6:53 PM, Nadim Kobeissi wrote: > The blog post suggests that becoming a local browser app means that > Cryptocat no longer uses JavaScript cryptography. This is nonsense: > JavaScript is a *language*, and since browser apps/plugins are written in an > HTML5 framework, we will still be using JavaScript to implement > cryptographic functions. The only thing that has changed is *the method of > code delivery.* This makes me a little sad. Previously, I understood what cryptocat was for: It was an insecure system, which was still probably significantly more secure than the common default unencrypted system, for use where deployment/usability issues meant it the choice was insecure-hosted-software or totally-insecure-plaintext. Non-server-replaceable systems like OTR were strictly preferable, of course, but in reality aren't ubiquitously used like they ought to be. With it becoming a browser extensionb it seems like it would gain much, although not all, of the usability challenges that precluded using OTR in the first place and in those places where the extension can't be pre-installed we still have short term SSL CA trust challenges (for the on-demand distribution of the extension). It also still retains many of the JS crypto specific technical challenges (no mlock, so no way to prevent long term keying material from hitting disk; generational GC so overwriting can't be trusted to reduce cold boot attack exposure). No doubt you'll find this an unwanted barb when you're already working hard trying to make good software to protect people, and that isn't my intention... but I don't know how to illustrate my confusion otherwise. _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From ali at packetknife.com Mon Aug 6 17:53:48 2012 From: ali at packetknife.com (Ali-Reza Anghaie) Date: Mon, 6 Aug 2012 20:53:48 -0400 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: On Mon, Aug 6, 2012 at 8:43 PM, Jillian C. York wrote: > It's difficult. I'm not a technologist, but I understand the issues and the > user needs well. My "type," I'd surmise, is few and far between. The problem isn't that your type is few and far between - the problem is that InfoSec has almost wholly ignored ESTABLISHED activists. As if the techniques, acceptable risk levels, etc. are new issues. They're simply not. > Security experts have obvious reasons for being conservative, and I get > that. Nevertheless, there are a lot of users who would benefit from a > little bit of added security. The question, then, as I see it, is: > > How do we provide that little bit while still making users aware of risks? It's been my experience that providing these risks in-band is just not doable - and the target end-users don't have time to worry about it. So OPSEC has to be something that tools like Cryptocat don't assume responsibility for. These is InfoSec sacrilege but it's the way activists have traditionally had to work in the first place. As an example, lets say w/ Iran, you're never - ever - going to be able to address the OPSEC concerns of a given Internet cafe. What you can do instead is provide a tool that works from every possible cafe and trust the end-user to manage the OPSEC of their surroundings such that perimeter controls, MITM risks, etc. are mitigated another way. If that's not tenable for Nadim or his particular crowd then a shift from developer to activist needs to be made. Just like any other process, the product isn't out their for product's sake - it has "customers".. and it's not those people who think they need an easier lazier option to setting up OTR or PGP. BTW, you're not without understanding and support in the Security community. Meredith Patterson among others have batted this around with me on Twitter - and understand the economics of the situation fine. Good luck Nadim and friends, -Ali _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From frank at journalistsecurity.net Mon Aug 6 22:19:44 2012 From: frank at journalistsecurity.net (frank at journalistsecurity.net) Date: Mon, 06 Aug 2012 22:19:44 -0700 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: Hey guys, I appreciate the importance and depth of this discussion. But I also wish to underscore that most of the people who are at risk are not using any tools whether they be CrytoCat, PGP, GChat or others for the simple reason that they either cannot figure them out, or don't have time to figure them out, or both. And I am talking about people at risk in many different nations. No doubt the functional security of tools is an indispensable, essential concern. Ignoring any vulnerabilities is dangerous, indeed. But the usability of the same tools and making them accessible to non-technologists is just as big a concern, in my view. I know you guys think that many such users including Western journalists are simply lazy. But many, if not most of the available tools are simply not intuitive, or not as much as most technologists who already know how to use them seem to think. How many people on this list have spent time asking non-technologists and other users who have tried, but have since given up even trying to use tools like PGP? Or have examined how new users interact with such tools? I have a great deal of respect for this community. But to be honest it seems to me that neither the technologists nor the donors have spent much time asking such questions. If a novice user make a mistake in PGP, for example, it's over. Options are not intuitive if you don't already know them. And if you hit the wrong button, you can end up at a deadend with no guidance how to get back on track. Trust me. I know. And I am not trashing PGP. I know well and fully appreciate it's value and I have used it and continue to use it hostile environments. And I also know that users and only users can make crucial choices during use for their own security. I get that, too. But most digital security tools still do not do a good job of laying out, let alone explaining the options. And I say that with respect for the value of the tools and options themselves. Cryptocat is one of the most user-friendly tools out there, and I think Nadim deserves credit for the effort. Of course, the vulnerabilities must be fixed before anyone should use it in a hostile environment. Although the level of vulnerability might also depend on the nature of the threat in any particular environment. But I also think we need to spend as much time making tools accessible as we do making them secure if we are going to reach the people who really need them. And right now few if any of these tools are having the reach that we all agree is needed. And that is an issue largely of usability. I think with more constructive collaboration we would achieve both. We need to. Thanks. Best, Frank Frank Smyth Executive Director Global Journalist Security [1]frank at journalistsecurity.net Tel. + 1 202 244 0717 Cell + 1 202 352 1736 Twitter: @JournoSecurity Website: [2]www.journalistsecurity.net [3]PGP Public Key Please consider our Earth before printing this email. Confidentiality Notice: This email and any files transmitted with it are confidential. If you have received this email in error, please notify the sender and delete this message and any copies. If you are not the intended recipient, you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited. -------- Original Message -------- Subject: Re: [liberationtech] What I've learned from Cryptocat From: Moxie Marlinspike <[4]moxie at thoughtcrime.org> Date: Mon, August 06, 2012 10:29 pm To: [5]liberationtech at lists.stanford.edu On 08/06/2012 06:59 PM, Eleanor Saitta wrote: > Except that with your harm mitigation, you push many potential users > back to plaintext, where they are guaranteed to be owned. What > percentage of potential cryptocat users would the plugin version have to > stop from using the tool for you to accept that there was a place for > the non-plugin version? Let's stop using the word "plaintext," because my understanding is that none of the chat services we're speaking of transmit data in the clear. As I see it, there are currently three possible vectors for attack with "existing" web-based chat services: 1) SSL interception. 2) Server compromise. 3) Server operator. The technology in CryptoCat v1 does not address any of these three vectors, and all of them remain possible. My position is that it's actually more susceptible to attack via #1 and #2 than existing web-based chat solutions. I believe your position is that it improves on vector #3 by virtue of being not-Facebook. (I'm curious how you measure #3 in comparison to GChat.) If we postulate that CryptoCat does improve vector #3 by virtue of being not-Facebook, it isn't a result of the technology, but simply that we've agreed Nadim has a better monitoring/interception track record than Facebook. If that's something you think is valuable, it actually seems like it'd potentially be better served by having someone like the EFF or Riseup host a web-based and SSL-protected chat service, without brining any additional cryptography confusion into the mix. A trust project, not a cryptography project. Unfortunately for me, I'd rather depend on cryptography than people. But I believe that CryptoCat is actually well positioned to drive changes in the ecosystem that will allow them to really improve on those three vectors in time. I think it's difficult to experiment in public with security tools, however, and that it's a sage decision to make a secure solution available (CryptoCat v2) and work on reducing friction while maintaining security from there. - moxie -- [6]http://www.thoughtcrime.org _______________________________________________ liberationtech mailing list [7]liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: [8]https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: [9]https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on [10]http://twitter.com/#!/Liberationtech References 1. mailto:frank at journalistsecurity.net 2. http://www.journalistsecurity.net/ 3. http://www.journalistsecurity.net/franks-pgp-public-key 4. mailto:moxie at thoughtcrime.org 5. mailto:liberationtech at lists.stanford.edu 6. http://www.thoughtcrime.org/ 7. mailto:liberationtech at lists.stanford.edu 8. https://mailman.stanford.edu/mailman/listinfo/liberationtech 9. https://mailman.stanford.edu/mailman/listinfo/liberationtech 10. http://twitter.com/#!/Liberationtech _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From yarrkov at gmail.com Mon Aug 6 13:27:45 2012 From: yarrkov at gmail.com (Elias Yarrkov) Date: Mon, 6 Aug 2012 23:27:45 +0300 Subject: [cryptography] A small public key encryption program Message-ID: Greetings, guys. I thought you might be interested in this little ECDH-based public key encryption program that I wrote. Primarily this is an experiment in how simple and small this stuff can be. It probably contains the simplest public C implementation of usably efficient elliptic curve point scalar multiplication, and thus might be useful in learning practical ECC. In particular, Curve25519. For symmetric stuff, I use EnRUPT in the sponge construction. XXTEA could've been alternatively used (with increased rounds, of course), but it does not appear to provide as much resistance to attacks per processing time in this context, and is slightly more complex. For EnRUPT, I use twice the standard number of rounds. I use a custom KDF. I intend to write about this manner of constructing KDFs later. The goal is to cause a high area*time cost for massively parallel brute force via ASIC, similar to scrypt. That's about it. More information here: http://cipherdev.org/dhbitty.html -- yarrkov -- http://cipherdev.org/ _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Aug 6 23:33:15 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Aug 2012 08:33:15 +0200 Subject: [cryptography] A small public key encryption program Message-ID: <20120807063315.GX12615@leitl.org> ----- Forwarded message from Elias Yarrkov ----- From eugen at leitl.org Mon Aug 6 23:34:33 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Aug 2012 08:34:33 +0200 Subject: [ZS] IMPORTANT: Delegation, decentralization, personal initiative & flying the ZS flag Message-ID: <20120807063433.GZ12615@leitl.org> ----- Forwarded message from Bryce Lynch ----- From dan at eff.org Tue Aug 7 09:02:20 2012 From: dan at eff.org (Dan Auerbach) Date: Tue, 07 Aug 2012 09:02:20 -0700 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: Making an informed decision as a user or a developer when it comes to real-world tradeoffs between usability and security of course hinges upon your threat model. I think this is ultimately an empirical question -- we should be aiming to create a taxonomy of various actual tools packaged and sold by companies like FinFisher, beyond just the brochures. For example, Morgan and Citizen Lab did an excellent analysis recently of FinSpy (in case you missed it: http://citizenlab.org/2012/07/from-bahrain-with-love-finfishers-spy-kit-exposed/). Expanding this research and getting an inside view into the industry will help everyone make non-speculative decisions about threat models. It's a difficult problem -- getting this inside view -- but it seems worthwhile. Is anyone working towards compiling such a list? And I'll just add that I agree with Moxie about recommending gchat over cryptocat for users in jurisdictions where Google is unlikely to hand over information to LE. However, even in this case it may not be so black and white. The FinSpy software mentioned above, for example, may intercept Google's chat traffic because it's a popular service, and may ignore cryptocat because it is relatively unknown. This isn't an argument that cryptocat v1 is a tenable long-term alternative, but just shows that it's very difficult to be maximally protect every single user when it comes to real-world recommendations. Finally, I'll just support the idea that usability is critical and the burden of making something usable should always be on the developer, never on the intelligence or know-how of the user. Although I agree cryptocat v1 has significantly more security issues than v2, I think the sacrifice in usability moving to v2 is significant and I'd hypothesize that installing an extension is much harder for people than visiting a website. Though, again, it's an empirical question that can be answered rigorously through user experience research. On 08/07/2012 08:02 AM, Maxim Kammerer wrote: > On Tue, Aug 7, 2012 at 4:21 AM, Moxie Marlinspike > wrote: >> However, my position is that Google Chat is currently more secure than >> CryptoCat. To be more specific, if I were recommending a chat tool for >> activists to use, *particularly* outside of the United States, I would >> absolutely recommend that they use Google Chat instead of CryptoCat. >> Just as I would recommend that they use GMail instead HushMail. >> >> The security of CryptoCat v1 is reducible to the security of SSL, as >> well as to the security of the server infrastructure serving the page. >> Any attacker who can intercept SSL traffic can intercept a CryptoCat >> chat session, just as any attacker who can compromise the server (or the >> server operator themselves) can intercept a CryptoCat chat session. > Are you equating passive attacks with active attacks? If I understand > how CryptoCat works correctly, it is resistant against passive > interception attacks, whereas Google Chat stores cleartext on Google > servers, which are easily accessible to law enforcement. Active > attacks against SSL can be mitigated by pinning CryptoCat > certificates, so you are left with what, compromise of server > infrastructure? That requires LE jurisdiction where the servers are > located, domain expertise, and dealing with the risk that the > compromise is detected. All that vs. Google servers, which, if I > remember right, provide a friendly interface to user accounts once > served with a simple wiretapping order (and as has been already > mentioned, Google is a multinational corporation, subject to a > multitude of jurisdictions, and is known to bend over for whoever is > in charge). > _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From tom at ritter.vg Tue Aug 7 06:30:52 2012 From: tom at ritter.vg (Tom Ritter) Date: Tue, 7 Aug 2012 09:30:52 -0400 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: I agree with a lot of the points being raised, including all of Moxie's (especially about Google v Riseup) but also Eleanor's regarding niche products and irrelevancy. In particular I want to expand on this bit: On 6 August 2012 22:29, Moxie Marlinspike wrote: > Let's stop using the word "plaintext," because my understanding is that > none of the chat services we're speaking of transmit data in the clear. > As I see it, there are currently three possible vectors for attack with > "existing" web-based chat services: > > 1) SSL interception. > 2) Server compromise. > 3) Server operator. > > The technology in CryptoCat v1 does not address any of these three > vectors, and all of them remain possible. My position is that it's > actually more susceptible to attack via #1 and #2 than existing > web-based chat solutions. I agree with that position wholeheartedly. Still, possible does not equate to easy. Cryptocat is the Jackie Robinson of Web Crypto Services[0]. And not to fault Nadim, as this is a volunteer effort, but there is more it can and should do to make it harder for #1 - just as Google and Facebook have done. - Cryptocat should use DNSSEC - even if validating resolvers are not deployed, it's another piece. Maybe down the road when a binary plugin is developed, it can validate the DNSSEC chain.[1] - It should Pin certificates in Chrome. As soon as the header is supported in any other browser it should use it. Same with TACK. - It should assert the SSL certificate with both DANE and DNSSEC-Stapled Certificates - It should (it does for the record, just saying) use Strict Transport Security - It should (it now does as of Sunday) deploy Content Security Policy - It should do all the other security techniques recommended: x-frame-options, X-Content-Type-Options, etc - Where it is possible, plugins should assert the validity of the Code and Keys - Controversial: It should use per-request mutated javascript obfuscation to make it more difficult to inline-middle the application in realtime[2] - It could experiment with browser enhancements to provide signed javascript files and so on All of those are not too difficult for an individual to try, and it makes SSL Interception harder. It's not any less possible, but it raises the bar. If you think these techniques aren't effective - I challenge you to do a live MITM of the gmail interface and have it still function seemlessly. It just flat-out won't work in Chrome of course, but even in Firefox - it is not trivial.[4] That's what I mean by being Jackie Robinson - you just have to be 'better'. Above and beyond. Trying to fix #2 is way, way harder because it's just impractical to tell someone "Oh, compile everything from source, run a perfectly secure Linux box with PaX and grsecurity, etc etc" Ideally, that's what we'd have. I suppose the important part is to acknowledge the risk of server compromise, and keep the bars approximately equal. If all the above measures were employed, but the server left the way it was - then rooting the box is absolutely easier. Google and Facebook have a huge advantage here. [0] If you don't get the reference, Jackie Robinson broke the segegration barrier in US baseball - he was spit, cursed, threatened with murder, had pitches thrown at his head - and through it all, he just played the game steadfastly. There's an urban legend (I'm unsure on it's truth) that his contract stated he couldn't complain, even when fans spit on him. [1] If your arguement is 'I don't trust DNSSEC' my response is 'Me neither, but I believe in beaurcracy and turf wars and that it'd be more difficult for a government to subvert two PKIs than one.' [2] If your arguement against it is "but then I can't audit it" my argument is "you don't audit it now." If your argument is still "I can't trust the code delivered" my response is "well, since you obviously are doing local SSL interception to read the server responses, hash the mutated javascript serverside, and send a PGP signature along with it so you can do the same and trust it that way". [3] [3] Heck, maybe that's a way to upgrade web services to thick client services - have an optional thick client someone can run that sits as a proxy running verification. Same web interface works with or without the tool, but the tool provides run-time verification. [4] Javascript obfuscation makes it difficult to rewrite the code; if you add code - CSP prevents you from exfiltrating easily; and if you exfiltrate to another user in the chat the chatters *should see* this other user in the chat they don't trust. > I believe your position is that it improves > on vector #3 by virtue of being not-Facebook. (I'm curious how you > measure #3 in comparison to GChat.) > > If we postulate that CryptoCat does improve vector #3 by virtue of being > not-Facebook, it isn't a result of the technology, but simply that we've > agreed Nadim has a better monitoring/interception track record than > Facebook. If that's something you think is valuable, it actually seems > like it'd potentially be better served by having someone like the EFF or > Riseup host a web-based and SSL-protected chat service, without brining > any additional cryptography confusion into the mix. A trust project, > not a cryptography project. Yes, yes, yes. There is a *tremendous* amount of implicit and unmentioned TRUST in the person operating the service or relying on the software. That's why anyone would use RedPhone, TextSecure or WhisperCore back when it was closed source. Because people *trusted* Moxie. If the EFF hosted an e-mail solution I'd be throwing money at them to let me sign up. Because Google is huge and diverse - they are obligated to respond to legal threats in most of the countries of the world. Because Google is huge and opaque - I have little faith in their ability to notify me/etc in the event of a LE request. But the EFF has both juristiction on their side (arguably they'd have more if they were based in, say, Scandenavia) and they have trust. I trust that the EFF will fight harder for me than Google. And there's intimidation factor - a LE agency ought to know if they come the the EFF with a request they need to back it up with a supoena or warrant. I absolutely think of riseup as a trust project. I would like to see many more of them. Nick Merril's Calyx Institute I think of as a Trust Project. He's trying very hard to remove Trust, and make it a cryptography project - but he literally has to build the infrastructure for that because it doesn't exist. (Which is one of the reasons you can't actually buy any services from them yet.) It will be *very* interesting to see how Phil Z's and Jon Callas' Silent Circle positions itself. A trust project? They're aiming to remove trust also; but to what extent can they? Trying to improve upon the trust factor is extraordinarily difficult. I think, in the short term, it relies on linking up with a person or organization people already trust - and therefore somehow convincing them to trust you. And in the long term - devoting your life to being a trustworthy individual. Not something we can solve with cryptography - even a thick client. Anyway, I realize I haven't addressed the issue of 'Should cryptocat move to this model or that, shut itself down, add warnings, push forward with users, etc'. But I wanted to raise the point that it can do more, today, to make users safers - and if _any_ webapp in this sphere wants to push the envelope, it should probably do those things first.* And since people are already using it, these are options to improve security besides just shutting it down. -tom * None of this is meant to be a slight at Nadim, who has certainly earned my respect for both his effort and his results so far. _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Aug 7 01:34:20 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Aug 2012 10:34:20 +0200 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: <20120807083420.GL12615@leitl.org> ----- Forwarded message from Nadim Kobeissi ----- From eugen at leitl.org Tue Aug 7 01:36:16 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Aug 2012 10:36:16 +0200 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: <20120807083616.GM12615@leitl.org> ----- Forwarded message from Gregory Maxwell ----- From dal at riseup.net Tue Aug 7 08:53:31 2012 From: dal at riseup.net (Douglas Lucas) Date: Tue, 07 Aug 2012 10:53:31 -0500 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: Hi Libtech, Moxie Marlinspike wrote: >> However, my position is that Google Chat is currently more secure >> than CryptoCat. To be more specific, if I were recommending a chat >> tool for activists to use, *particularly* outside of the United >> States, I would absolutely recommend that they use Google Chat >> instead of CryptoCat. Just as I would recommend that they use GMail >> instead HushMail. >> >> The security of CryptoCat v1 is reducible to the security of SSL, as >> well as to the security of the server infrastructure serving the >> page. Any attacker who can intercept SSL traffic can intercept a >> CryptoCat chat session, just as any attacker who can compromise the >> server (or the server operator themselves) can intercept a CryptoCat >> chat session. Maxim Kammerer replied: > Are you equating passive attacks with active attacks? If I understand > how CryptoCat works correctly, it is resistant against passive > interception attacks, whereas Google Chat stores cleartext on Google > servers, which are easily accessible to law enforcement. Active > attacks against SSL can be mitigated by pinning CryptoCat > certificates, so you are left with what, compromise of server > infrastructure? That requires LE jurisdiction where the servers are > located, domain expertise, and dealing with the risk that the > compromise is detected. All that vs. Google servers, which, if I > remember right, provide a friendly interface to user accounts once > served with a simple wiretapping order (and as has been already > mentioned, Google is a multinational corporation, subject to a > multitude of jurisdictions, and is known to bend over for whoever is > in charge). Maxim's comments match my thoughts with regards to both current Cryptocat over SSL and my analogy to Riseup webmail over SSL. If Riseup does what they say they do[1], emails sitting on their servers are not mined for advertising or LE (unlike Facebook chat, or as Maxim suggests, gmail); their servers do not log IPs; IPs are not embedded in emails; and outgoing emails to other secure email providers are encrypted (StartTLS). Furthermore, it appears Riseup plans[2] encryption for stored emails on their servers in the future. Such a scheme would make the emails difficult for LE, or more broadly, attackers, to get, even with a warrant -- not only would they have to obtain forced decryption power, which I don't think they have as of yet in the US, but also Riseup might not be able to provide the relevant keys in any case. (That the NSA has copies is a vulnerability, but perhaps not a relevant one, as to my knowledge LE can't introduce NSA copies as evidence.) Similarly with current Cryptocat over SSL: if the server and server operator do what they say they do, there aren't data-mining operations going on for the benefit of LE or advertisers. Both Riseup and current Cryptocat over SSL rely on good SSL connections and also trust that the server and server operator aren't compromised (including incorrect implementations). Those 3 dependencies are far from ideal, but at least the risk calculations are ones some activists without access to OTR or PGP or their own .mx can make. Better than known bad actors, known bad servers. Maybe my technical understanding is lacking something here, but I believe the above to be correct. :-Douglas 1. https://help.riseup.net/en/email#what-is-special-about-riseup-net-email 2. https://we.riseup.net/riseuplabs+fsoc/personally-encrypted-imap-storage _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From moritz at torservers.net Tue Aug 7 03:37:29 2012 From: moritz at torservers.net (Moritz Bartl) Date: Tue, 07 Aug 2012 12:37:29 +0200 Subject: [tor] New 2x 1 Gbit/s USA exits Message-ID: Hi, Announcing new 2x1 Gbit/s exits at Axigy in Miami and Dallas. E3-1230v2 8 GB DDR3 RAM 500 GB SATA Full Gbit/s 6 IP Addresses with 24/7 KVM $400/m * http://axigy1.torservers.net/ https://torstatus.blutmagie.de/router_detail.php?FP=9F7A37446BC034B4FDB27CAE2C6CAAB83A40A361 https://torstatus.blutmagie.de/router_detail.php?FP=C1E2CF4BB774A030FF5408FF35CC637ACE24D439 https://torstatus.blutmagie.de/router_detail.php?FP=4F8D80A0F768A2A29856A8F26B05D35DEAA39850 * http://axigy2.torservers.net/ https://torstatus.blutmagie.de/router_detail.php?FP=073F27934762FF8BA956FFCE136AAC1CCF45EA13 https://torstatus.blutmagie.de/router_detail.php?FP=D0236B1908B3CC686DB0A361F4931073A25793F1 https://torstatus.blutmagie.de/router_detail.php?FP=80F870DD215A0C56005266A71C46F92F39F1973B -- Moritz Bartl https://www.torservers.net/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Aug 7 03:54:44 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Aug 2012 12:54:44 +0200 Subject: [tor] New 2x 1 Gbit/s USA exits Message-ID: <20120807105444.GR12615@leitl.org> ----- Forwarded message from Moritz Bartl ----- From eugen at leitl.org Tue Aug 7 06:19:25 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Aug 2012 15:19:25 +0200 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: <20120807131925.GF12615@leitl.org> ----- Forwarded message from Ali-Reza Anghaie ----- From eugen at leitl.org Tue Aug 7 06:59:46 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Aug 2012 15:59:46 +0200 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: <20120807135946.GJ12615@leitl.org> ----- Forwarded message from frank at journalistsecurity.net ----- From eugen at leitl.org Tue Aug 7 07:02:06 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Aug 2012 16:02:06 +0200 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: <20120807140206.GL12615@leitl.org> ----- Forwarded message from Tom Ritter ----- From eugen at leitl.org Tue Aug 7 08:17:46 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Aug 2012 17:17:46 +0200 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: <20120807151746.GR12615@leitl.org> ----- Forwarded message from Maxim Kammerer ----- From eugen at leitl.org Tue Aug 7 08:20:20 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Aug 2012 17:20:20 +0200 Subject: Parallel Currencies And The Roadmap To Monetary Freedom Message-ID: <20120807152020.GT12615@leitl.org> http://www.forbes.com/sites/jonmatonis/2012/08/07/parallel-currencies-and-the-roadmap-to-monetary-freedom/ Parallel Currencies And The Roadmap To Monetary Freedom It may not be as historically significant as President Nixon closing the gold window in 1971, but Rep. Ron Paul laid out the framework for the inevitable monetary confrontation of the future in his final U.S. Domestic Monetary Policy Subcommittee hearing on bSound Money: Parallel Currencies and the Roadmap to Monetary Freedom.b The experts testifying included Robert Gray, Executive Director of the American Open Currency Standard, Forbes contributor Nathan Lewis, author of Gold: The Once and Future Money, and Dr. Richard Ebeling, Northwood University economics professor. Rep. Paul also included a prepared statement from constitutional lawyer and monetary expert, Dr. Edwin Vieira, who was unable to attend. Summarizing the August 2nd Congressional hearing, Alex Newman wrote for The New American: According to Paul, the only way to stabilize the economy is by returning to monetary freedom and legalizing constitutional money. And until the U.S. government and the Fed get out of the way so the American people can choose what money to use without government coercion, the economy will never be truly stable and the supposed brecoveryb will be billusory,b he added. Meanwhile, other nations are already catching on to the hoax even as Americans lack the freedoms that citizens in some other parts of the world have to invest and protect their wealth from inflation. Largely echoing the sentiments of the chairman, the experts agreed that since the creation of the Federal Reserve in 1913 the dollar has lost 98% of its value and that central banking is a form of central planning with no place in a free society. Generally, the repeal of legal tender laws will allow individuals to decide what to use as the preferred medium of exchange and open the door to alternative currencies without threat of prosecution. Rob Gray has been a tireless advocate for alternative open currency systems and he is right to say bleave our money aloneb but I fundamentally disagree with his stance on legal tender laws. He believes that the only effect of legal tender laws is that if a debt is incurred without a specific agreement for a particular type of payment, then that debt can be discharged with the declared legal tender, or federal reserve notes. He even goes on say that, in addition to not calling for repeal, he is in favor of existing legal tender laws because they are so innocuous. Although technically correct in stating that legal tender laws do not result in btax obligation, exclusive requirement, and/or mandatory acceptance,b Gray misses a major and symbolic effect that they do have and sometimes itbs a chilling effect. The legal tender laws have the effect of giving one form of money an artificial preference over another by making that form of money acceptable for the payment of taxes. Therefore, it indirectly puts forms of money without legal tender status at a disadvantage because people will perceive the blegallyb preferred monetary unit as having an underlying value greater than zero. That is why I oppose legal tender laws, Mr. Gray. Then, a bit of bitcoin drama occurred when Rep. David Schweikert (R-Arizona) initially referred to the cryptocurrency as bumb&.what was one of them called?b&.somethingb&.coinb near the end of the hearing. To my knowledge, that is only the second time that bitcoin has been entered into the congressional record. The first being when Prof. Larry White mentioned bitcoin in his prepared testimony for the Free Competition in Currency Act of 2011. Contrary to Nathan Lewisb statement that bevery currency has an issuer,b bitcoin does not require an issuer. Proving once again that events in the real world unfold faster than those in power can comprehend, the participants probably did not know that bitcoin is currently the largest distributed computing project in existence today, passing the Search for Extra-Terrestrial Intelligence (SETI) project some time ago. They probably were also not aware that bitcoin is a three-year-old decentralized bootstrapped currency with a $100 million plus monetary base that is immune from government regulation and, more importantly, immune from the crippling effects of monetary policy. From brady.kazar at speak-write.com Tue Aug 7 09:37:31 2012 From: brady.kazar at speak-write.com (=?koi8-r?B?IuXXx8XOydEg7cHSy8/XzsEi?=) Date: Tue, 7 Aug 2012 17:37:31 +0100 Subject: =?koi8-r?B?wsXazMnNydTO2cogzcXWx8/Sz8Q=?= Message-ID: <01cd74c3$5230ff80$134e3152@brady.kazar> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1541 bytes Desc: not available URL: From eugen at leitl.org Tue Aug 7 08:56:07 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Aug 2012 17:56:07 +0200 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: <20120807155607.GX12615@leitl.org> ----- Forwarded message from Douglas Lucas ----- From mk at dee.su Tue Aug 7 08:02:28 2012 From: mk at dee.su (Maxim Kammerer) Date: Tue, 7 Aug 2012 18:02:28 +0300 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: On Tue, Aug 7, 2012 at 4:21 AM, Moxie Marlinspike wrote: > However, my position is that Google Chat is currently more secure than > CryptoCat. To be more specific, if I were recommending a chat tool for > activists to use, *particularly* outside of the United States, I would > absolutely recommend that they use Google Chat instead of CryptoCat. > Just as I would recommend that they use GMail instead HushMail. > > The security of CryptoCat v1 is reducible to the security of SSL, as > well as to the security of the server infrastructure serving the page. > Any attacker who can intercept SSL traffic can intercept a CryptoCat > chat session, just as any attacker who can compromise the server (or the > server operator themselves) can intercept a CryptoCat chat session. Are you equating passive attacks with active attacks? If I understand how CryptoCat works correctly, it is resistant against passive interception attacks, whereas Google Chat stores cleartext on Google servers, which are easily accessible to law enforcement. Active attacks against SSL can be mitigated by pinning CryptoCat certificates, so you are left with what, compromise of server infrastructure? That requires LE jurisdiction where the servers are located, domain expertise, and dealing with the risk that the compromise is detected. All that vs. Google servers, which, if I remember right, provide a friendly interface to user accounts once served with a simple wiretapping order (and as has been already mentioned, Google is a multinational corporation, subject to a multitude of jurisdictions, and is known to bend over for whoever is in charge). -- Maxim Kammerer Liberti Linux: http://dee.su/liberte _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Aug 7 09:12:40 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 7 Aug 2012 18:12:40 +0200 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: <20120807161240.GZ12615@leitl.org> ----- Forwarded message from Dan Auerbach ----- From alybe at lvcm.com Tue Aug 7 15:05:27 2012 From: alybe at lvcm.com (=?koi8-r?B?Iu/L08HOwSI=?=) Date: Tue, 7 Aug 2012 19:05:27 -0300 Subject: =?koi8-r?B?wsXazMnNydTOwdEgzcXWxNXHz9LPxM7B0SDT19Ha2CE=?= Message-ID: <01cd74cf$9aeeb580$0f4c35ba@alybe> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции From 260a601h.2506157 at auburnhousingauth.org Tue Aug 7 10:11:43 2012 From: 260a601h.2506157 at auburnhousingauth.org (=?koi8-r?B?IvfTxdfPzM/EIg==?=) Date: Tue, 7 Aug 2012 22:41:43 +0530 Subject: =?koi8-r?B?xMXbxdfZyiDNxdbHz9LPxCE=?= Message-ID: <01cd74ed$d13b2d80$8a06fe73@260a601h.2506157> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции From bplath at cplltd.com Tue Aug 7 13:44:19 2012 From: bplath at cplltd.com (=?koi8-r?B?IvzE1cHSxCDrz83B0s/XIg==?=) Date: Tue, 7 Aug 2012 22:44:19 +0200 Subject: =?koi8-r?B?xMXbxdfZyiDNxdbHz9LPxCE=?= Message-ID: <01cd74ee$2e3bc580$1c238859@bplath> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1541 bytes Desc: not available URL: From jacob at appelbaum.net Tue Aug 7 16:06:47 2012 From: jacob at appelbaum.net (Jacob Appelbaum) Date: Tue, 07 Aug 2012 23:06:47 +0000 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: Jillian C. York: > Gotta agree with others who note consensus as a problem...the reason (in my > view) being that risk assessment is imperative and that no single guide can > respond to various risk models. It's interesting because one outcome seems to be that almost everyone agrees that plaintext should not be considered reasonable. That's a great outcome so far - I remember a time when people felt that it was fine, most of the time, to have unencrypted communications as the norm. I look forward to the day when those same people start to get the big picture on general social graph style traffic analysis. All the best, Jake _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From brainwashrnsi35 at tekobouzu.com Tue Aug 7 12:15:10 2012 From: brainwashrnsi35 at tekobouzu.com (=?koi8-r?B?IvPFzcXOIPPVyMHOz9ci?=) Date: Wed, 8 Aug 2012 00:45:10 +0530 Subject: =?koi8-r?B?xMXbxdfB0SDNxdbE1cfP0s/EzsHRINPX0drYIQ==?= Message-ID: <01cd74ff$1025af00$dac43b78@brainwashrnsi35> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции From morristan at tormail.org Tue Aug 7 19:27:59 2012 From: morristan at tormail.org (morristan) Date: Wed, 08 Aug 2012 02:27:59 +0000 Subject: [tor-talk] Tor as ecommerce platform Message-ID: Silk Road reported to make $1.9 million per month, http://www.forbes.com/sites/andygreenberg/2012/08/06/black-market-drug-site-silk-road-booming-22-million-in-annual-mostly-illegal-sales/ Tor Project reported to make $1.3 million per year, https://www.torproject.org/about/findoc/2010-TorProject-combined-Form990_PC_Audit_Results.pdf (page 3). Read carefully, Tor Project lost $17,285 in 2010 on revenues of $1.336 million. In plain english, they spent more than they received. Perhaps the Silk Road people should donate to Tor. Perhaps they should fund hidden service improvements in Tor. Perhaps both. This informs me a few things: 1. Tor is easier to use than we think, given motivation to do so. 2. 150,000 or so people use Tor for hidden services, or for silk road alone (a hidden service). 3. Tor is not profiting from hidden services. 4. Tor and hidden services are good enough for an ecommerce platform. Who will make the first profitable, legal ecommerce site on dot onion? Morris Tan Prisoner #655321 _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From arma at mit.edu Wed Aug 8 02:50:46 2012 From: arma at mit.edu (Roger Dingledine) Date: Wed, 8 Aug 2012 05:50:46 -0400 Subject: [tor-talk] Roger's status report, July 2012 Message-ID: Here's what I said at the beginning of July that I hoped to do: > - Attend the Dev meeting and hack fest in Florence. Help everybody > understand about our upcoming grants, and the upcoming deliverables that > go with them. Done. It was a great dev meeting and hack fest -- we had something like 40 Tor developers in one place. How the community has grown! https://trac.torproject.org/projects/tor/wiki/org/meetings/2012SummerDevMeeting Thanks again to Gunner for helping us making sure everything went smoothly and we kept moving forward: http://aspirationtech.org/about/people/gunner > - Attend PETS Done: http://petsymposium.org/2012/program.php David Fifield gave a fantastic talk on our Flash Proxy design: http://crypto.stanford.edu/flashproxy/ I talked to Greg Norcie a lot about Tor Browser usability issues, progress we've made so far, and what remains to be done: http://petsymposium.org/2012/papers/hotpets12-1-usability.pdf If we had enough money we should totally be funding research grants for people like Greg to do further usability analysis. On the other hand, we have a pile of known problems and not enough developers to actually fix them -- so accruing *more* known problems, while great, maybe shouldn't be the most immediate goal. I should also draw your attention to Yossi Gilad's paper, "Spying in the Dark: TCP and Tor Traffic Analysis": http://freehaven.net/anonbib/papers/pets2012/paper_57.pdf It's another in the line of congestion-based traffic analysis papers (watch Alice's connection into the Tor network, send some packets to the suspected exit relay and/or destination website to reduce its TCP window, and then see if the flow on Alice's side slows down). It's unclear how bad it is in practice (i.e. how practical the attack is), but it's a nice example of how congestion attacks are not yet fully understood. The next PETS will be at Indiana University next summer. >plus do a talk at the 'provably privacy' workshop in Vigo. Done: https://www.cosic.esat.kuleuven.be/ecrypt/provpriv2012/program.html The ecrypt workshop was a tough combination of people who already did Tor research and people who didn't know that Tor doesn't mix. It ended up being in part a group discussion of Tor's toughest research attacks, to try to raise awareness of issues rather than suggest solutions. > - Probably go to Berkeley for the last week in July. Done. I met with EFF people for a day (mainly Peter Eckersley, talking with Mike Perry and Isis about how to salvage our browser situation in the face of both Firefox and Chrome including new privacy-invasive features at a faster clip than we can keep up with). I had lunch with Prateek Mittal, a post-doc at Berkeley who used to be in Nikita Borisov's lab at Illinois. Prateek is working on Sybil resistance and social-network-based security -- e.g. routing through your social network to resist some of the attacks that Tor has problems with. I also met briefly with Doug Tygar, a Berkeley prof who is working on evaluating circumvention tools, and with Vern Paxson's group at ICSI, who are looking into how to reason about pluggable transports and find ways to do better at the arms race. > - Summarize open simulation tickets and open performance tickets, so we > can prioritize them and get more developer attention on them. I talked to Karsten and Rob about performance work at the dev meeting, and we moved each ticket forward individually. I haven't had a chance to sit down and organize them en masse though: https://trac.torproject.org/projects/tor/wiki/org/roadmaps/Tor/Performance Nickm now has a list of specific Tor development tasks (mostly of the form "clean up this patch so it's something we'd be willing to merge"). And Rob has been doing simulations on our current patches to help us decide which ones should actually help: https://trac.torproject.org/projects/tor/ticket/6401 > - Publicize one or more new job openings on our jobs page: > https://www.torproject.org/about/jobs.html.en > and start collecting applications. I helped Mike get the Tor Browser Hacker job description up and announced: https://www.torproject.org/about/jobs-browserhacker Now we need to get enough applications and interest that we have great people to select from. > - Make sure our new core dev gets added to the people page, and make > sure we do some sort of announcement so there's closure. Follow-up on > the original core dev job announcements to say we've got one (but leave > the job announcement up, because we wouldn't mind having another if the > perfect person came along). I just added Andrea to the core people page, along with some other people who have been core people for a while but never made it onto the page. We continue to have a blurry line between which of our fine volunteers happens to make it into the core people page. I think we should probably put more of them on it -- isis and Moritz come to mind, as well as David Fifield, Philipp Winter, the Tails people, Ian Goldberg, and others. All that said, I don't think we've actually done any sort of announcement or acknowledgement about the core dev spot. Should we? > - Ian told me that Tariq's "Changing of the Guards" paper was flawed. I > don't yet agree that it's flawed -- I should follow up with them and see > which parts of the design need to be discarded and which I can resurrect. Tariq, Ian, I, and others ended up adapting the paper into a WPES submission, which focuses on Tariq's framework for how to answer questions about bridge churn. I still think the investigation has uncovered a really interesting privacy vulnerability: if the Tor client has perfect connectivity, it will pick three guards, and if one of them goes offline it will continue in a degraded "two guard" state rather than picking a fourth guard and risking showing its circuits to a new relay. So far so good. But a client with bad connectivity will end up with dozens or even hundreds of guards on its list, and when one of its top three goes away it will move to a fourth. Somewhere in there it would seem this is suboptimal behavior. More research required, as they say. > - Get Tor 0.2.3.x closer to stable. We released 0.2.3.19-rc on 2012-07-06. > - Organize and announce (hopefully in that order) our upcoming plans > for encouraging more exit relays. Done: https://lists.torproject.org/pipermail/tor-relays/2012-July/001433.html I spent much of my second half of July on this topic, including individual mail threads with many of the fast exit and non-exit relay operators, to strengthen the community and learn who is in a good position for growing their relay. We have several trac tickets following the "diversity metrics" side: https://trac.torproject.org/projects/tor/ticket/6232 https://trac.torproject.org/projects/tor/ticket/6443 https://trac.torproject.org/projects/tor/ticket/6498 https://metrics.torproject.org/fast-exits.html I also talked to Sathya about having him do his undergrad thesis on the question of measuring and tracking diversity in the Tor network. It would be great to see more Tor research groups take an interest and give him some guidance. Next steps for me on the exit relay front are to hit up my contacts at universities (Boston University and University of Waterloo run fast exits, but many more want to if I just help them enough); figure out how logistically we can get money to the exit relay operators who need it; and figure out how to integrate Moritz into the "continuing to strengthen the relay operator community" role. > - Track down all the plans for my November trip to Amsterdam. The original > plan was to speak in Rotterdam at their CA conference (organized after > the DigiNotar thing), but that expanded to maybe talking to Dutch law > enforcement, and then maybe Austrian law enforcement, and now the Belgian > law enforcement want me to come explain the Internet to them too. All of > these things are worth doing (the more law enforcement groups understand > Tor, the less they hassle our exit relay operators and the less they > lobby for laws to outlaw privacy), but we'll see how many I can fit in. Not started. Should do rsn. > - Start looking into properties we want for a more DPI-resistant "obfs3" > protocol. I talked to Ian Goldberg about it, and got him talking to George (asn) at PETS. I believe they have a plan, and I think Brandon Wiley (our gsoc student) is even planning to integrate it into his python pluggable transport library. Stay tuned for more details. ------------------------------------------------------------------------ Here are some other things I did in July: - While in Vigo, I called in to the SponsorF site visit to help brief the program manager on our progress. One of the followups is that we should either get a 320KB torperf instance running (since 50KB is very small), or better, get something running that fetches some actual popular web pages including their css, images, etc. We could either do it as "this is how long it takes in practice to load the frontpage of foo.com", which would show us realistic performance over time, or we could set up a fake foo.com so real-world website changes don't add another variable. - Had multiple tor-exec budget meetings to figure out how to do all the new things our sponsors want, without running out of money. We have a plan, and it looks good. I look forward to learning how much that means we can scale up in 2013. - Helped Karsten plan for the SponsorL deliverables: https://lists.torproject.org/pipermail/tor-dev/2012-July/003808.html - Did a bit of actual Tor development, including tracking down some fun bugs like https://trac.torproject.org/projects/tor/ticket/6404 ------------------------------------------------------------------------ Here are some items I expect to do in August: - Chair the FOCI workshop at Usenix Security, and also attend the rest of Usenix Security. https://www.usenix.org/conference/foci12/tech-schedule/workshop-program https://www.usenix.org/conference/usenixsecurity12/tech-schedule/technical-sessions - Talk to Ralf-Philipp Weinmann about his TorScan paper (upcoming at Esorics) and what we can do to address his attacks. - Look at Rob Jansen's performance graphs from his new Shadow simulations. Try to move the performance tickets forward. - Expand on the set of metrics by which the SponsorF Red Team will judge the project's success. Specifically, I should list the anonymity attacks that they shouldn't evaluate since the PETS community is already doing a good job at evaluating anonymity attacks. - Launch the "run fast bridges for BBG" campaign, ideally by gathering volunteers on tor-relays. - Launch the "exit relays at universities" push, and send BBG a timetable for how our exit relay rollout is looking. - Get some money to some exit relay operators, since it turns out (ha) that it's harder than I expected on our side to do it in a way we'll pass our audits. - Get 0.2.3.20-alpha and 0.2.3.21-alpha out. - Consider an 0.2.2.38 stable update. - Consider an 0.2.4.1-alpha release. - Sort out my September travel to Germany, and my November travel to Netherlands et al. - Schedule our NSF "censorship measurement" kickoff meeting, perhaps the last week of September or first of October. - Encourage Andrew to put our "project coordinator" job description up and announce it. - Try to take a vacation Aug 11-19. ------------------------------------------------------------------------ Things I'm still dropping the ball on: - Transparently document the secteam process, especially since we have concluded to use it far less often and only for critical security things. - Answer the thread between Karsten and Jake where we had an excited volunteer with a clearly useful contribution that we totally dropped on the floor. Try to generalize the experience to improve our response to new contributors. We used to be great at it, and lately we're all overloaded. - Add a "scientific papers" exception to our trademark-faq: I want to give blanket permission to scientific papers to use the word Tor in their paper name, so long as they don't go and write software under that name too. https://www.torproject.org/docs/trademark-faq - Make a plan for fixing all the "CBT sometimes breaks Tor" issues. https://trac.torproject.org/projects/tor/ticket/3443 - Start summarizing Tor research papers on the blog more regularly. There have been a huge number of really important research papers lately, and most Tor people don't know about them. Should I summarize them on the blog (for a broader audience), or on tor-dev (for the rest of the Tor developers), or what? - I need new business cards. - Get https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorA through D back up on the wiki somewhere (Andrew took them down since they were concluded, and since they just listed contract deliverables rather than the progress reports and trac ticket links that we've been doing for later funders; but we should keep them there for posterity). - Tell Micah Sherr and Chris Wacek (Georgetown) about the open simulation questions; and get Rob Jansen (UMN/NRL), Mashael AlSabah (Waterloo), etc a good summary of the current performance situation. _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From astid at bi-esse.com Wed Aug 8 08:17:06 2012 From: astid at bi-esse.com (=?koi8-r?B?IunSyc7BIPvVwtLB18HRIg==?=) Date: Wed, 8 Aug 2012 07:17:06 -0800 Subject: =?koi8-r?B?xMXbxdfB0SDNxdbE1cfP0s/EzsHRINPX0drY?= Message-ID: <01cd7535$d0c68500$5eb93f78@astid> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции From grarpamp at gmail.com Wed Aug 8 04:23:46 2012 From: grarpamp at gmail.com (grarpamp) Date: Wed, 8 Aug 2012 07:23:46 -0400 Subject: [tor-talk] Tor as ecommerce platform Message-ID: > 4. Tor and hidden services are good enough for an ecommerce platform. Be careful the words... this is like saying the US Gov is doing great at preventing 'terrorist' attacks simply because there haven't been any. And although I might trust Tor, it's not wise to trust a GPA such as the NSA, nor its supposed restriction on communicating with law enforcement etc against SR. Even without that, it's pretty easy to presume some reverse mail covers against the sellers are in effect. SR's only been around for a year or two. It takes at least that long for any really big sealed case to go down in public. So we truly must wait much longer in order to presume the statement in (4) is true. >> Perhaps the Silk Road people should donate to Tor. Perhaps they >> should fund hidden service improvements in Tor. Perhaps both. > I doubt that the Tor Project will ever acknowledge such support. Tor cannot accept known 'illegal' money, therefore acknowledgement is moot. About the best Tor could do is be able to accept anonymous donations in the first place. Then publish a bitcoin address for donations from anyone. Then surely some unaffiliated and helpful bird would send to SR the links to that address and to this thread. Not sure, but I think at one point Tor accepted bitcoin, but then recanted. Link to paper: http://arxiv.org/pdf/1207.7139v1 _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From moxie at thoughtcrime.org Wed Aug 8 08:38:10 2012 From: moxie at thoughtcrime.org (Moxie Marlinspike) Date: Wed, 08 Aug 2012 08:38:10 -0700 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: On 08/08/2012 06:37 AM, liberationtech at lewman.us wrote: > On Tue, Aug 07, 2012 at 05:18:02PM -0700, erik at sundelof.com wrote 4.7K bytes in 111 lines about: > :partial defenses using any technology tool. I may feel too strong about > :tools being discussed as THE solution or THE bulletproof vest so to speak. > > I'm not picking on you Erik, but this comment finally struck me > about what's bothered me with this debate. There is no such thing as 'the > bulletproof vest'. I don't think anyone is saying we want an "ultimate solution." We have a set of technologies that we're trying to replace with a more secure solution (GChat, Facebook, etc...). It's as simple as looking at the attack vectors that we're concerned users will experience with these existing web-based chat solutions and asking the question of whether CryptoCat improves on any of them. Again, as I see it, there are three possible vectors for attack with existing web-based chat solutions: 1) SSL intercept. 2) Server infrastructure. 3) Operator. These are not theoretical, pie-in-the-sky vectors. These are things that are actually happening, are within the state of the art of an average adversary, and are within the scope of what this type of technology problem could potentially address. My analysis is that the CryptoCat technology does not improve any of these three vectors, and in fact might make the user more at risk to compromise through #1 and #2 than with existing web-based chat solutions (GChat, etc...). So again, I don't believe that those of us who have concerns about CryptoCat are asking for a "bulletproof vest." We're not demanding the "ultimate tool." To use your analogy, I'm looking for a bulletproof vest that's at minimum not rated *worse* than GChat, and ideally is rated some degree higher. - moxie -- http://www.thoughtcrime.org _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From saftergood at fas.org Wed Aug 8 08:46:11 2012 From: saftergood at fas.org (Steven Aftergood) Date: Wed, 08 Aug 2012 08:46:11 -0700 Subject: Secrecy News -- 08/08/12 Message-ID: Format Note: If you cannot easily read the text below, or you prefer to receive Secrecy News in another format, please reply to this email to let us know. SECRECY NEWS from the FAS Project on Government Secrecy Volume 2012, Issue No. 81 August 8, 2012 Secrecy News Blog: http://www.fas.org/blog/secrecy/ ** SECRECY NEWS ODDS AND ENDS ** UNEMPLOYMENT BENEFITS FOR MILLIONAIRES, AND MORE FROM CRS SECRECY NEWS ODDS AND ENDS A coalition of public interest groups asked the Senate and House Intelligence Committees to preserve an existing requirement for the Intelligence Community to produce an annual report on the number of security clearances. "We believe the annual report on security clearances provides exceptional value to the public and should continue to be published," the groups wrote. The Senate Intelligence Committee markup of the 2013 intelligence authorization bill would repeal the reporting requirement. http://www.fas.org/sgp/news/2012/08/clearance_rpt.pdf Last week the Senate confirmed four of the five nominees to the long-dormant Privacy and Civil Liberties Oversight Board. The nominations of James Dempsey, Elisabeth Collins Cook, Rachel Brand and Patricia Wald were unanimously confirmed. For unexplained reasons, the Senate did not act upon the nomination of David Medine to serve as Board chairman. http://bit.ly/MyauU7 The Naval Criminal Investigative Service contacted the Wired Danger Room blog to inquire where its reporter obtained a certain unclassified document five years ago and to ask that the document, which was marked "for official use only," be taken offline. "Danger Room, through its attorney, declined to provide the information, or to answer any questions related to the reporting of the story. The document has not been removed." http://www.wired.com/dangerroom/2012/08/ncis-vs-danger-room/ A government information security official not involved in the matter said it was possible there was more to the story than appeared on the surface. "If the [NCIS] investigation is about the FOUO document, then it's ridiculous. If it's about something else, we might not ever know." The House Intelligence Committee filed its report on the extension of the FISA Amendments Act. Like its counterparts on the Judiciary Committee, the Intelligence Committee rejected amendments that would shorten the extension of the law and increase public oversight of its implementation. http://www.fas.org/irp/congress/2012_rpt/hrpt112-645pt2.html With little fanfare or self-congratulation, the National Reconnaissance Office and the National Security Agency have been steadily declassifying and releasing historical intelligence records. "This tremendous amount of information released in the past year is credit to an impressive declassification program within the intelligence services," wrote historian Dwayne Day in an assessment of the latest NRO releases. "The US military and intelligence space programs during the first couple of decades of the space age can now be described in incredible detail and understood far better than before." http://www.thespacereview.com/article/2131/1 UNEMPLOYMENT BENEFITS FOR MILLIONAIRES, AND MORE FROM CRS Thousands of Americans who have a gross annual income of more than a million dollars have also been collecting unemployment benefits, according to IRS data compiled in a new report from the Congressional Research Service. That description fits only a tiny fraction of a percent of those receiving unemployment benefits, and is obviously not typical of recipients of unemployment insurance. But neither does it violate any law. The issue has prompted pending legislation to restrict benefits based on income. See Receipt of Unemployment Insurance by Higher-Income Unemployed Workers ("Millionaires"), August 2, 2012: http://www.fas.org/sgp/crs/misc/R42643.pdf A persistent controversy in Japan concerning a U.S. Marine base in Okinawa is reviewed in another new report from the Congressional Research Service. See The U.S. Military Presence in Okinawa and the Futenma Base Controversy, August 3, 2012: http://www.fas.org/sgp/crs/natsec/R42645.pdf Other new and updated CRS reports that CRS is not authorized to release to the public include the following. Comprehensive Nuclear-Test-Ban Treaty: Background and Current Developments, August 3, 2012: http://www.fas.org/sgp/crs/nuke/RL33548.pdf U.S.-China Relations: Policy Issues, August 2, 2012: http://www.fas.org/sgp/crs/row/R41108.pdf Uzbekistan: Recent Developments and U.S. Interests, August 3, 2012: http://www.fas.org/sgp/crs/row/RS21238.pdf Global Security Contingency Fund (GSCF): Summary and Issue Overview, August 1, 2012: http://www.fas.org/sgp/crs/row/R42641.pdf Science, Technology, Engineering, and Mathematics (STEM) Education: A Primer, August 1, 2012: http://www.fas.org/sgp/crs/misc/R42642.pdf Continuing Resolutions: Overview of Components and Recent Practices, August 6, 2012: http://www.fas.org/sgp/crs/misc/R42647.pdf Department of Homeland Security: FY2013 Appropriations, August 3, 2012: http://www.fas.org/sgp/crs/homesec/R42644.pdf _______________________________________________ Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists. The Secrecy News Blog is at: http://www.fas.org/blog/secrecy/ To SUBSCRIBE to Secrecy News, go to: http://www.fas.org/sgp/news/secrecy/subscribe.html To UNSUBSCRIBE, go to http://www.fas.org/sgp/news/secrecy/unsubscribe.html OR email your request to saftergood at fas.org Secrecy News is archived at: http://www.fas.org/sgp/news/secrecy/index.html Support the FAS Project on Government Secrecy with a donation: http://www.fas.org/member/donate_today.html _______________________ Steven Aftergood Project on Government Secrecy Federation of American Scientists web: www.fas.org/sgp/index.html email: saftergood at fas.org voice: (202) 454-4691 twitter: @saftergood ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Aug 7 23:55:37 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Aug 2012 08:55:37 +0200 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: <20120808065537.GM12615@leitl.org> ----- Forwarded message from Jacob Appelbaum ----- From mk at dee.su Tue Aug 7 23:07:49 2012 From: mk at dee.su (Maxim Kammerer) Date: Wed, 8 Aug 2012 09:07:49 +0300 Subject: [tor-talk] Tor as ecommerce platform Message-ID: On Wed, Aug 8, 2012 at 5:27 AM, morristan wrote: > Perhaps the Silk Road people should donate to Tor. Perhaps they should fund > hidden service improvements in Tor. Perhaps both. I doubt that the Tor Project will ever acknowledge such support. Tor developers (or at least policy people) like to pretend that Tor is used for purposes that they consider morally right, and ignore the uses that are morally wrong [1]. I believe it's an american thing b one typical tell-tale sign is treating criminals as some masterminds who can already easily achieve what they want [2] (americans are used to doing the same in gun control debates), and ignoring the fact that the project facilitates anonymity for criminals just as well, if not more, as for non-criminals. Personally, I don't understand what's the big deal about the make-believe game, and it probably detracts from the project's credibility, but it's fun to watch nevertheless. I actually intend to write a Tor server patch to be able to gather .onion access statistics on relays, once I am sufficiently bored, just for the fun cognitive dissonance potential (expecting drugs and CP forums to top the list). [1] https://www.torproject.org/about/torusers.html [2] https://www.torproject.org/docs/faq-abuse.html#WhatAboutCriminals [3] http://www.reddit.com/r/IAmA/comments/vdhs8/hi_iama_we_are_core_members_of_the_tor_project/c53j9j9 -- Maxim Kammerer LibertC) Linux: http://dee.su/liberte _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From virtualadept at gmail.com Wed Aug 8 06:39:35 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Wed, 8 Aug 2012 09:39:35 -0400 Subject: [ZS] IMPORTANT: Delegation, decentralization, personal initiative & flying the ZS flag Message-ID: On Tue, Aug 7, 2012 at 11:59 AM, Dirk Bruere wrote: > In which case TOR is going to be a very minority interest, except for > very occasional use. > In fact, I cannot think of any instance where I have needed such > anonymity over the past decade Please keep in mind the following things: An increasing number of world powers (i.e., goverments) are deploying hardware at both the ISP and the national levels of communications infrastructure which are capable of monitoring the traffic of thousands of people in realtime, 24 hours a day, seven days a week, year 'round. There is no shortage of manufacturers of this hardware and software: http://werebuild.telecomix.org/wiki/Blue_cabinet Surveillance deployment in the Middle East is on the mind of many, chiefly because they think it can't happen where they live. It already has happened where they live. The country I live in - the United States - deployed this functionality over a decade ago and has gone to incredible lengths to keep it not only unaccountable but safe from any sort of oversight or legal interdiction. The only reason this is known is a pair of whistleblowers who are now nearly as hot targets as Julian Assange is these days. Depending on whom you talk to, Great Britain either has plans in the works for, or already has implemented the Interception Modernisation Programme, which is designed to carry out exactly the same tasks for the same reasons. Same with Sweden, and there is absolutely no reason at all to think that other countries did not do precisely the same thing years ago. This equipment's been on the market for over a decade to whomever can pay for it. We are attempting to bootstrap a transnational social state, unbound by political or geographic boundries, making use of and pushing the envelope of bleeding edge technology, and functioning more or less in parallel with everything else. That is not only highly unusual, but in a time of amazing paranoia and fear it is extremely suspicious. By "amazing paranoia and fear," I refer to the following groups that have been investigated (and occasionally infiltrated) because they are considered potential terrorist threats: Vegan cooking classes in California, the War Resisters League, Code Pink, the Rhode Island Community Coalition for Peace, Food Not Bombs (which is de facto illegal in Florida now), the People's Summit (held in 2008), the Free Mumia Abu-Jamal Coalition, a couple of pro-Palestinian organizers (I have an interesting video squirreled away about that), the Critical Mass Bike Ride, the New York sports club Extreme-Goers, anti-death penalty groups in Maryland... To think that we're not on someone's radar already is folly; we already are whether or not the humans in the same orbit as the technology are aware of it yet. If we don't start following through with our plans now, pretty soon it won't matter. -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From virtualadept at gmail.com Wed Aug 8 06:43:14 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Wed, 8 Aug 2012 09:43:14 -0400 Subject: [ZS] IMPORTANT: Delegation, decentralization, personal initiative & flying the ZS flag Message-ID: On Tue, Aug 7, 2012 at 12:16 PM, Dirk Bruere wrote: > Then it has got to be seriously dumbed down and reduced to (at most) > two mouse clicks. Here I have to politely disagree with you: By double-clicking on the "Start Tor" icon not only was the Tor control panel started up, but a fully configured instance of Tor and a fully configured and hardened web browser ready for use. That's hard to beat. > If it's harder than installing a game it will not be used by most people. What was the last game you installed? People routinely go to much farther lengths to conceal their points of origin just to access Etherpad or search for a .torrent file. Much farther lengths, and they're a lot more strict about maintaining their OPSEC than most of us on this 'list are, I have a feeling. -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jya at pipeline.com Wed Aug 8 07:50:16 2012 From: jya at pipeline.com (John Young) Date: Wed, 08 Aug 2012 10:50:16 -0400 Subject: [ZS] IMPORTANT: Delegation, decentralization, personal initiative & flying the ZS flag In-Reply-To: <20120808141034.GR12615@leitl.org> References: <20120808141034.GR12615@leitl.org> Message-ID: >An increasing number of world powers (i.e., goverments) are deploying >hardware at both the ISP and the national levels of communications >infrastructure which are capable of monitoring the traffic of >thousands of people in realtime, 24 hours a day, seven days a week, >year 'round. Wait a minute, wasn't this long ago established as the reason for the Internet, extending the reasons for telecommunications? And that spying by its orginators and operators built into it in such a way that nothing could be done to stop the spying otherwise why would governments allow it to happen, and not only that pump huge resources into keeping it going. The key to getting it adopted worldwide was to assure users that valiant freedom loving coders could find ways to beat the system. Sure, a few failures would occur, but in the long haul it could be made secure for users, "trust us this will work." Why look what came along: encryption, then anonymity, then lawsuits, then leakers, then data haverns, then traffic hiders, then privacy policies, then social media, then more lawsuits, then "Anonynmous", then clouds, then campaigns to beat back governmental and commercial and criminal and "Chinese" and "Iranian" and Stuxnet attacks on all these pitiful initiatives. While in the netherworld of Internet transactions the data gobblers were feeding at levels well below what boom-fed security coders and hackers could access. Except the few who welcomed the chance to feed at multi-levels of illusory security. Those who claim Internet security is impossible due to the way the system was designed and operates feed paranoia just like governments warn of enemies at the gates, knowing how bread is buttered. From eugen at leitl.org Wed Aug 8 02:05:29 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Aug 2012 11:05:29 +0200 Subject: [tor-talk] Tor as ecommerce platform Message-ID: <20120808090529.GV12615@leitl.org> ----- Forwarded message from morristan ----- From eugen at leitl.org Wed Aug 8 02:50:54 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Aug 2012 11:50:54 +0200 Subject: [tor-talk] Tor as ecommerce platform Message-ID: <20120808095054.GA12615@leitl.org> ----- Forwarded message from Maxim Kammerer ----- From brianc at smallworldnews.tv Wed Aug 8 11:57:35 2012 From: brianc at smallworldnews.tv (Brian Conley) Date: Wed, 8 Aug 2012 11:57:35 -0700 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: Hi all, I've been trying to decide how to weigh in on this thread, I'm sure some of you are surprised its taken me this long to jump in. That said, I'll keep this brief, because I'm going to write up more detailed thoughts on a blog post that I'll share with the list. The first issue I see is related to this succinct comment from Michael: That's only speculation on my part, of course. But if it's right, it > raises a difficult question: how do we maintain rigorous standards of > critique within the information security community, without giving > potential users of our tools the counterproductive impression that > nothing works and you might as well give up? The number one issue I see here is the culture of what i call "geek rage" "fear mongering" and "black and white response" First let me say I think this is *getting better*. However, it stands that there are *many* privacy/security tools with fairly significant flaws. I'm writing a security curriculum at the moment for a new mobile reporting app that SWN is creating. In the process I've begun to see bevy of flaws in tools that I myself misunderstood previously. A few of these tools are Truecrypt, TextSecure, OTR clients, and of course Cryptocat. I think there is a lack of clarity about "safety" and "security" as well as numerous other semantic problems with the way security experts, trainers, and researchers present tools. Truecrypt's issue with journaling filesystems is a flaw that many of the members of the list are no doubt aware of. I however was not aware of this serious issue. The Protektor Services and FrontlineDefenders Digital Privacy manuals do not cover this issue, yet TrueCrypt is now considered a standard tool by most organizations doing training. I recently assisted an "internet freedom" training on TrueCrypt, yet I was unaware, which means even if the issue was covered(I am fairly certain it was not) it wasn't covered well enough that I, a relatively knowledgeable user, picked up on it. Cryptocat's web interface as has been clearly described is only as secure as SSL/TLS and the lack of a keylogger. However, the implication of this discussion is that a MITM attack or having my IP address is enough to identify me. I am sure most of you don't believe this, however that is the implication of your talk. The primary issue comes down to the semantics and lack of clarity in communications. I think this could be solved by recruiting more people with strong writing skills and a focus on training methodology, and perhaps starting to host roundtables and dinners with the technologists in the group. I would love to have been at dinner with Nadim Jacob et al. I think this could be solved by creating an open consortium of technology researchers, trainers, and practitioners. Last point, I agree we are helped by a diversity of manuals, but a lack of clear standards is frustrating. Furthermore, I'm certainly not satisfied with the guides that exist, which is why I am still working on crafting new manuals, however the curriculum I'm currently producing is essentially an effort to edit and collate the best elements of the existing manuals. I hope this will result in a hybrid that still answers a lot of needs, but does it in a more user-friendly fashion. Brian On Wed, Aug 8, 2012 at 10:22 AM, Michael Rogers wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On 07/08/12 06:19, frank at journalistsecurity.net wrote: > > How many people on this list have spent time asking > > non-technologists and other users who have tried, but have since > > given up even trying to use tools like PGP? Or have examined how > > new users interact with such tools? I have a great deal of respect > > for this community. But to be honest it seems to me that neither > > the technologists nor the donors have spent much time asking such > > questions. > > Hi Frank, > > I'd just like to make an anecdotal point here. A few months ago I > spent an interesting afternoon talking to some activists in the UK > about what communication tools they use for what tasks. > > None of them regularly used PGP, Tor, or disk encryption software, but > the reasons they gave had nothing to do with usability. They were > aware of the tools and knew how to use them, but they didn't believe > that doing so provided any practical security benefits. They believed > that encryption software probably contained backdoors and could be > defeated by keyloggers. They'd seen evidence trails from computers and > phones produced in court, and rather than relying on technology to > solve technology's problems, some of them preferred to avoid > electronic communication altogether for secret work. > > It's tempting to say they were right and leave it at that. Keep your > secrets away from your gadgets and your gadgets away from your > secrets. But that wasn't what they were actually doing. They all > carried phones, even though they knew they were being tracked and > possibly bugged. They all had email accounts, and some of them used > mailing lists and forums for planning, even though they knew that if a > keylogger could get their encryption passwords it could get everything > else they typed. Why the apparent inconsistency? > > One possible interpretation is that they were assessing encryption > tools with a typical information security mindset: if there's any weak > point, the adversary will exploit it, so the strong points are > irrelevant. But they were assessing other techniques with a more > balanced mindset: weigh up the risks and potential benefits, compare > the available alternatives, and choose the best (or the least bad). > > That's only speculation on my part, of course. But if it's right, it > raises a difficult question: how do we maintain rigorous standards of > critique within the information security community, without giving > potential users of our tools the counterproductive impression that > nothing works and you might as well give up? > > Cheers, > Michael > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.10 (GNU/Linux) > > iQEcBAEBAgAGBQJQIqBNAAoJEBEET9GfxSfMRLEH/04+ESJyNH9S6NYEwno1BvKe > J8kMLCmR6OpolJ15nu3K7GkE4wQnhTmZVIrHApjWGz+8TACGiIQg7rOBl19r4MvA > o/7tANsoUEgLRAO2hHQzA5tg+ZRtS+9oDe6LBVE3arHTCt9dYMW711ToOkgQwdoD > ekNWbC4Ba2aKm3t8JmSUF+goDiadF+nSP0HByvNhKHCjzP/2SLBxDOQqeOMF/kpK > Zej+0BZPCUGLaN6XaqoWw7DxgYfa9uUgx3E2ljwYnZZqcXr41kJp2uHQTZlExyxN > TfiI+2P4bQfJtkK7KcOZtp/QWCAz3whmqV6F5y3tjfcHiEywzByInnKFr3tT5D0= > =mHhw > -----END PGP SIGNATURE----- > _______________________________________________ > liberationtech mailing list > liberationtech at lists.stanford.edu > > Should you need to change your subscription options, please go to: > > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > If you would like to receive a daily digest, click "yes" (once you click > above) next to "would you like to receive list mail batched in a daily > digest?" > > You will need the user name and password you receive from the list > moderator in monthly reminders. You may ask for a reminder here: > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > Should you need immediate assistance, please contact the list moderator. > > Please don't forget to follow us on http://twitter.com/#!/Liberationtech > -- Brian Conley Director, Small World News http://smallworldnews.tv m: 646.285.2046 Skype: brianjoelconley public key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xCEEF938A1DBDD587 _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Aug 8 03:24:45 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Aug 2012 12:24:45 +0200 Subject: [tor-talk] Roger's status report, July 2012 Message-ID: <20120808102445.GD12615@leitl.org> ----- Forwarded message from Roger Dingledine ----- From eugen at leitl.org Wed Aug 8 03:28:47 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Aug 2012 12:28:47 +0200 Subject: Appeals Court OKs Warrantless Wiretapping Message-ID: <20120808102847.GG12615@leitl.org> http://www.wired.com/threatlevel/2012/08/appeals-court-oks-wiretapping/ Appeals Court OKs Warrantless Wiretapping By David Kravets 08.07.12 3:16 PM Judge M. Margaret McKeown The federal government may spy on Americansb communications without warrants and without fear of being sued, a federal appeals court ruled Tuesday in a decision reversing the first and only case that successfully challenged President George W. Bushbs once-secret Terrorist Surveillance Program. bThis case effectively brings to an end the plaintiffsb ongoing attempts to hold the executive branch responsible for intercepting telephone conversations without judicial authorization,b a three-judge panel of the 9th U.S. Circuit Court of Appeals wrote. (.pdf) The case concerned a lower court decision in which two American attorneys b who were working with the now-defunct al-Haramain Islamic Foundation b were awarded more than $20,000 each in damages and their lawyers $2.5 million in legal fees after a tortured legal battle where they proved they were spied on without warrants. They sued under domestic spying laws Congress adopted in the wake of President Richard M. Nixonbs Watergate scandal. The government appealed their victory, and the appeals court Tuesday dismissed the suit and the damages. Jon Eisenberg, the lawyer for the two attorneys, said he may request the court to reconsider its decision with a larger panel of judges, or petition the Supreme Court. bThis case was the only chance to litigate and hold anybody accountable for the warrantless wiretapping program,b he said in a telephone interview. bAs illegal as it was, it evaded accountability.b Jon Eisenberg. Photo: Ryan Singel/Wired The San Francisco-based appeals court ruled that when Congress wrote the law regulating eavesdropping on Americans and spies, it never waived sovereign immunity in the section prohibiting targeting Americans without warrants. That means Congress did not allow for aggrieved Americans to sue the government, even if their constitutional rights were violated by the United States breaching its own wiretapping laws. bUnder this scheme, Al-Haramain can bring a suit for damages against the United States for use of the collected information, but cannot bring suit against the government for collection of the information itself,b Judge M. Margaret McKeown wrote for the majority. She was joined by Judge Michael Daly Hawkins and Judge Harry Pregerson. bAlthough such a structure may seem anomalous and even unfair, the policy judgment is one for Congress, not the courts.b The court, during oral arguments in June, expressed concern that it may reach this result. Judge Hawkins, during those arguments, noted that the law spells out that those who were illegally spied upon may seek monetary damages. But if Congress did not intend for the government to be sued, bit would make the remedy illusory,b Hawkins said. The court did not comment on the spying allegations of those involved in the case. It also dismissed claims against FBI Director Robert Mueller, saying there was not enough evidence linking him to the spy program the Bush administration adopted in the wake of the 2001 terror attacks. Subsequently, Congress authorized Bushbs spy program in 2008, five years after the illegal wiretapping involved in this case. The Bush spy program was first disclosed by The New York Times in December 2005, and the government subsequently admitted that the National Security Agency was eavesdropping on Americansb telephone calls without warrants if the government believed the person on the other end was overseas and associated with terrorism. The government also secretly enlisted the help of major U.S. telecoms, including AT&T, to spy on Americansb phone and internet communications without getting warrants as required by the 1978 Foreign Intelligence Surveillance Act, the law at the center of the al-Haramain dispute. A lower court judge found in 2010 that two American lawyersb telephone conversations with their clients in Saudi Arabia were siphoned to the National Security Agency without warrants. The allegations were initially based on a classified document the government accidentally mailed to the former al-Haramain Islamic Foundation lawyers Wendell Belew and Asim Ghafoor. The document was later declared a state secret, removed from the long-running lawsuit and has never been made public. With that document ruled out as evidence, the lawyers instead cited a bevy of circumstantial evidence that a trial judge concluded showed the government illegally wiretapped the lawyers as they spoke on U.S. soil to Saudi Arabia. The other major case challenging the wiretapping program, the Electronic Frontier Foundationbs case against the government, alleges a wholesale vacuuming of Americansb communications. That case was sent back to a district court after it survived an appeals court ruling in December. David Kravets David Kravets is a senior staff writer for Wired.com and founder of the fake news site TheYellowDailyNews.com. He's a dad of two boys and has been a reporter since the manual typewriter days. From eugen at leitl.org Wed Aug 8 03:31:31 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Aug 2012 12:31:31 +0200 Subject: Black Market Drug Site 'Silk Road' Booming: $22 Million In Annual Sales Message-ID: <20120808103131.GH12615@leitl.org> http://www.forbes.com/sites/andygreenberg/2012/08/06/black-market-drug-site-silk-road-booming-22-million-in-annual-mostly-illegal-sales/print/ Black Market Drug Site 'Silk Road' Booming: $22 Million In Annual Sales In the year since Senator Joe Manchin called for the baudaciousb drug-selling website Silk Road to be bshut down immediately,b the worldbs most high-profile underground pharmacy hasnbt just survived. With $22 million in annual sales and around double the commission for the sitebs owners compared with just six months ago, its black market business is booming. In a research paper (PDF here) released earlier this month, Carnegie Mellon computer security professor Nicolas Christin has taken a crack at measuring the sales activity on Silk Roadbs underground online marketplace, which runs as a bhidden serviceb on the Tor network and uses tough-to-trace digital Bitcoins as currency, two measures that have helped to obscure its sellers, buyers and operators from law enforcement. His findings: the sitebs number of sellers, who offer everything from cocaine to ecstasy, has jumped from around 300 in February to more than 550. Its total sales now add up to around $1.9 million a month. And its operators generate more than $6,000 a day in commissions for themselves, compared with around $2,500 in February. Christin cautions that his study only looks at a six month period of Silk Roadbs sales, and that a big part of the sitebs measured success comes from appreciation in the highly volatile Bitcoin currency Silk Road trades in, which has itself increased close to 70% in value over the course of Christinbs study. But even accounting for changes in that crypto currency, the sitebs numbers point to very real growth. bItbs very bursty and spikey, but overall the numbers are moving up,b says Christin. bItbs a stable marketplace, and overall itbs growing steadily.b Silk Road's revenue over time. (Click to enlarge.) To dig up Silk Roadbs sales numbers, Christin ran a program that crawled the site and scraped its content, including sales and pricing information, about once a day for a six month period. He used the feedback reviews posted to sellersb pages to count sales and calculated the site operatorsb revenue based first on their 6.23% commission, and then later using the tiered model with higher commissions that the site switched to in the middle of the period he studied. The results, with both commission models, are shown at right. What surprised Christin most was the high level of customer satisfaction: 97.8% of customers gave sellers positive reviews, despite the fact that Silk Roadbs use of Torbs IP-masking abilities and Bitcoin makes it nearly impossible for anyone who uses the site to identify anyone else. bOn a site like Silk Road, whereb&most of the goods sold are illicit, one would expect a certain amount of deception to occur. Indeed, a buyer choosing, for instance, to purchase heroin from an anonymous seller would have very little recourse if the goods promised are not delivered,b Christin writes. bSurprisingly, though, most transactions on Silk Road seem to generate excellent feedback from buyers.b Silk Road's number of sellers over time. (Click to enlarge.) Christin was also struck by the fact that Silk Road has managed to grow steadily even with its complete lack of advertising. Despite requiring visitors to run special software and know a long and impossible-to-remember URL that doesnbt show up in Google results, it now generates roughly as much revenue, comparing with numbers from another recent study, as illegal online pharmacies that drum up sales with spam emails and black hat search engine tricks. The site hasnbt had much of a public profile lately, either: After some early notoriety from a Gawker story on the site last year and some political attention to the sitebs criminal activities from Senator Chuck Schumer and others, itbs mostly slipped off the media radar, says Christin bIf you imagine them selling paperclips and buttons, theybre a stable business thatbs growing without advertising or being in the news, just by word of mouth,b says Christin. bThat was the surprising thing: How normal the whole thing seems.b The fact that it doesnbt sell paperclips and buttons, however, but rather psilocybin and benzedrine, means that law enforcement likely still has Silk Road in its sights. The business takes significant precautions: Tor masks both the location of its servers and of its users by ricocheting Internet traffic through proxies, and Bitcoin makes its payments difficult to trace by avoiding traditional banks or payment companies. But users on the site have worried in forum conversations recently that its operators may have been infiltrated by law enforcement, and that several of its high-profile sellers have disappeared. Eight operators of another anonymous drug-sales site, the Farmerbs Market, were indicted in April, possibly after the encrypted email service Hushmail decrypted their communications and gave them to police. According to the Farmerbs Market indictment, however, that site sold around $1 million worth of illegal drugs between January of 2007 and October of 2009. With Silk Road generating close to twice that amount in a mere month, its operation has reduced its recently-busted competitor to a street-corner hustler by comparison. Read Christinbs full paper on Silk Road here: http://arxiv.org/abs/1207.7139 From eugen at leitl.org Wed Aug 8 04:55:29 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Aug 2012 13:55:29 +0200 Subject: [tor-talk] Tor as ecommerce platform Message-ID: <20120808115529.GM12615@leitl.org> ----- Forwarded message from grarpamp ----- From eugen at leitl.org Wed Aug 8 07:10:34 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Aug 2012 16:10:34 +0200 Subject: [ZS] IMPORTANT: Delegation, decentralization, personal initiative & flying the ZS flag Message-ID: <20120808141034.GR12615@leitl.org> ----- Forwarded message from Bryce Lynch ----- From eugen at leitl.org Wed Aug 8 07:11:03 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Aug 2012 16:11:03 +0200 Subject: [ZS] IMPORTANT: Delegation, decentralization, personal initiative & flying the ZS flag Message-ID: <20120808141103.GS12615@leitl.org> ----- Forwarded message from Bryce Lynch ----- From eugen at leitl.org Wed Aug 8 08:47:04 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Aug 2012 17:47:04 +0200 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: <20120808154704.GY12615@leitl.org> ----- Forwarded message from Moxie Marlinspike ----- From fishersv014 at greaterlouisville.com Wed Aug 8 05:44:05 2012 From: fishersv014 at greaterlouisville.com (=?koi8-r?B?Iubh4vLp6+Eg8OX+4fTpIg==?=) Date: Wed, 8 Aug 2012 18:14:05 +0530 Subject: =?koi8-r?B?9SDu4fMg7/7l7vgg7un66+nlIOPl7vkg7uEg8O/s6efy4ebp4CE=?= Message-ID: <2791750923.WIFG0A5O056860@ghstqpkiok.ahubg.ua> ЦЕНОВАЯ РЕВОЛЮЦИЯ МОЖАЙСКОЙ ФАБРИКИ ПЕЧАТИ ГАРАНТИРОВАННО ЛУЧШИЕ ЦЕНЫ Сроки исполнения - 5-10 дней Каталоги, брошюры, плакаты, буклеты, листовки, воблеры, шелфтокеры, коробки и т. д. Склад и представительство √ м. Курская Звоните и просчитывайте! +7(495)9407322 From eugen at leitl.org Wed Aug 8 09:20:33 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Aug 2012 18:20:33 +0200 Subject: Secrecy News -- 08/08/12 Message-ID: <20120808162033.GD12615@leitl.org> ----- Forwarded message from Steven Aftergood ----- From eugen at leitl.org Wed Aug 8 12:33:22 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 8 Aug 2012 21:33:22 +0200 Subject: [liberationtech] What I've learned from Cryptocat Message-ID: <20120808193322.GH12615@leitl.org> ----- Forwarded message from Brian Conley ----- From a0btb at naturemed.ca Wed Aug 8 12:43:26 2012 From: a0btb at naturemed.ca (=?koi8-r?B?IvLBydPBIOLJ0sXOwsHVzSI=?=) Date: Thu, 9 Aug 2012 04:43:26 +0900 Subject: =?koi8-r?B?wsXazMnNydTOwdEgzcXWxNXHz9LPxM7B0SDT19Ha2A==?= Message-ID: <01cd75e9$83a3eb00$4aaa9270@a0btb> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали
- Неограниченное количество линий
- Экономия на покупке телефонной станции
-------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1463 bytes Desc: not available URL: From trivialitiesqs83 at hendrickauto.com Wed Aug 8 22:29:04 2012 From: trivialitiesqs83 at hendrickauto.com (=?koi8-r?B?IvPPwtPU18XOzsnLIg==?=) Date: Thu, 9 Aug 2012 10:59:04 +0530 Subject: =?koi8-r?B?89LP3s7PINPEwc0g09fPySDvxsnTIO7FxM/Sz8fPISDNLu3B0tjJzg==?= =?koi8-r?B?wSDyz93B?= Message-ID: <3196613023.BT07HBC9487306@dfybplqvrpnugry.msvttbqvfi.ru> Срочно сдам Офис 34м2 и Офис 46 м2 Недорого! Офисный центр - 5 минут пешком от м.Марьина Роща. Помещения с ремонтом. Круглосуточная охрана, уборка. ТЕЛ.(495)645 - 15- 75 From bucharest.acorn at rp.org.ua Thu Aug 9 13:24:27 2012 From: bucharest.acorn at rp.org.ua (=?koi8-r?B?0NLJzcXOxc7JxSDT1MHXy8kgzsTTIDA=?=) Date: Thu, 9 Aug 2012 12:24:27 -0800 Subject: =?koi8-r?B?7sHMz8fP19nKIMHHxc7UINDPIO7k8w==?= Message-ID: <000d01cd7664$97c5eb30$6400a8c0@bucharest.acorn> 16 августа 2012 г. ПОРЯДОК ВЗИМАНИЯ И ВЫЧЕТА НДС В РАМКАХ ТАМОЖЕННОГО СОЮЗА. ИМПОРТ - ЭКСПОРТ ТОВАРОВ (РАБОТ, УСЛУГ) С РФ, БЕЛАРУСИЕЙ, КАЗАХСТАНОМ. ЗАДАЧИ НАЛОГОВЫХ АГЕНТОВ ПО НДС ПРИ РАБОТЕ С ИНОСТРАННЫМИ ПАРТНЕРАМИ. НАЛОГООБЛОЖЕНИЕ РОССИЙСКИХ И ИНОСТРАННЫХ ПЕРЕВОЗЧИКОВ В 2011-2012Г.Г. +7 (495)- 74291_98 : +7 499 ЧЧ5Ч-О95 Программа: 1. Что должен знать бухгалтер , чтобы работать с внешнеторговым контрактом. 2. Нюансы и специфика внешнеторгового контракта с иностранным партнером. 3. Специфика налогообложения НДС: 4. Новая жизнь НДС по договорам , заключенным в иностранной валюте или условных единицах с 1 октября 2011 года 5. Импорт 2012 года 6. Задачи налоговых агентов по НДС при работе с иностранными партнерами (новые счета-фактуры , книги покупок и продаж с 24 января 2012г √Постановление Правительства РФ от 26 декабря 2011г ╧ 1137) 7. Покупка и продажа товара без ввоза на таможенную территорию. 8. Новые правила экспортных операций с 1 октября 2011г 9. Налоговые проблемы уплаты НДС на территории иностранного государства. Налоговые потери. Позиция чиновников. 10. Порядок взимания и вычета НДС в рамках Таможенного союза (РФ, Белоруссия, Казахстан) 11. Налогообложение российских, иностранных перевозчиков и транспортно-экспедиционных компаний при перевозках импортных и экспортных товаров в 2012 году (Федеральные законы от 27 ноября 2010г ╧ 309-ФЗ и от 19 июля 2011г ╧ 245-ФЗ) 12. Применения нулевой ставки НДС при оказании услуг, связанных с экспортом и импортом товаров. 13. Особенности налогообложения перевозок всеми видами транспорта и транспортно-экспедиционных услуг в рамках Таможенного союза 2010-2012 г.г. 14. Позиция Минфина по отдельным вопросам, связанным с перевозками внутри таможенного союза. Стоимость участия: 9 000 рублей Рекомендуем: 24 Августа: Лекторы Минфин РФ: НДС при осуществлении внешнеторговых операций с учетом изменений, внесенных в НК РФ. Применение нулевой ставки НДС с учетом изменений, внесенных в НК РФ. Новое в 2012 году. Стоимость участия: 9 000 рублей За более подробной информацuей обpащайтеcь по тел: Московский код; 7922I22 \\\/// 8 (Ч95) 792/2122 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3941 bytes Desc: not available URL: From Esmeralda.Hamon at genericlab.com Thu Aug 9 13:48:43 2012 From: Esmeralda.Hamon at genericlab.com (Esmeralda Hamon) Date: Thu, 09 Aug 2012 16:48:43 -0400 Subject: Is Worth Over $2,000! Message-ID: <37846422870257-XWDUMZQVUZAELQNGHHVYTDPDG@dh7.genericlab.com> "Since getting my Online Wealth Formula I actually make about $5,000-$7,000 a month using the internet. It is enough to comfortably replace my old job's income. And the best thing is that I only work about 10-12 hours a week from home so I now have a lot more time for my family." http://snipurl.com/24ix9w6 From bowens at northernstar-ng.com Thu Aug 9 11:27:13 2012 From: bowens at northernstar-ng.com (=?koi8-r?B?IuHM2MLJzsEg68HUy8/XwSI=?=) Date: Thu, 9 Aug 2012 19:27:13 +0100 Subject: =?koi8-r?B?wsXazMnNydTO2cogzcXWx8/Sz8Q=?= Message-ID: <01cd7664$fa31fe80$482a632e@bowens> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции From 2stoneware at oreck.com Thu Aug 9 06:48:40 2012 From: 2stoneware at oreck.com (=?koi8-r?B?IvTBzcHSwSDowcTWyc3V0sHUz9fOwSI=?=) Date: Thu, 9 Aug 2012 22:48:40 +0900 Subject: =?koi8-r?B?wsXazMnNydTO2cogzcXWx8/Sz8Q=?= Message-ID: <01cd7681$1e9bd400$c7a4a379@2stoneware> БЕЗЛИМИТНЫЕ звонки по межгороду всего 3000 руб. в месяц. Все зоны РФ (фиксированная и мобильная связь) Звоните сегодня: (495) 225-04-62 МНОГОКАНАЛЬНЫЙ номер Прямой московский номер 495, 499 Абонентская плата - 300 руб./месяц Большой выбор КРАСИВЫХ номеров. - Номер с Вами, куда бы вы ни переехали
- Неограниченное количество линий
- Экономия на покупке телефонной станции
-------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1463 bytes Desc: not available URL: From azie at usadbann.ru Thu Aug 9 22:28:59 2012 From: azie at usadbann.ru (=?koi8-r?B?zsTTINXQzMHUwSA=?=) Date: Fri, 10 Aug 2012 10:58:59 +0530 Subject: =?koi8-r?B?8NLJzcXOxc7JxSDO1czF18/KINPUwdfLySDu5PMg0yDV3sXUz80gydrN?= =?koi8-r?B?xc7FzsnKLg==?= Message-ID: <000d01cd76b9$0b5fafa0$6400a8c0@azie> 16 августа 2012 г. ПОРЯДОК ВЗИМАНИЯ И ВЫЧЕТА НДС В РАМКАХ ТАМОЖЕННОГО СОЮЗА ИМПОРТ - ЭКСПОРТ ТОВАРОВ (РАБОТ, УСЛУГ) С РФ, БЕЛАРУСИЕЙ, КАЗАХСТАНОМ. ЗАДАЧИ НАЛОГОВЫХ АГЕНТОВ ПО НДС ПРИ РАБОТЕ С ИНОСТРАННЫМИ ПАРТНЕРАМИ. НАЛОГООБЛОЖЕНИЕ РОССИЙСКИХ И ИНОСТРАННЫХ ПЕРЕВОЗЧИКОВ В 2011-2012Г.Г. \Моск. код/ 742/9I98 : +7 (495) 7Ч2_91_98 Программа: 1. Что должен знать бухгалтер , чтобы работать с внешнеторговым контрактом. 2. Нюансы и специфика внешнеторгового контракта с иностранным партнером. 3. Специфика налогообложения НДС: 4. Новая жизнь НДС по договорам , заключенным в иностранной валюте или условных единицах с 1 октября 2011 года 5. Импорт 2012 года 6. Задачи налоговых агентов по НДС при работе с иностранными партнерами (новые счета-фактуры , книги покупок и продаж с 24 января 2012г √Постановление Правительства РФ от 26 декабря 2011г ╧ 1137) 7. Покупка и продажа товара без ввоза на таможенную территорию. 8. Новые правила экспортных операций с 1 октября 2011г 9. Налоговые проблемы уплаты НДС на территории иностранного государства. Налоговые потери. Позиция чиновников. 10. Порядок взимания и вычета НДС в рамках Таможенного союза (РФ, Белоруссия, Казахстан) 11. Налогообложение российских, иностранных перевозчиков и транспортно-экспедиционных компаний при перевозках импортных и экспортных товаров в 2012 году (Федеральные законы от 27 ноября 2010г ╧ 309-ФЗ и от 19 июля 2011г ╧ 245-ФЗ) 12. Применения нулевой ставки НДС при оказании услуг, связанных с экспортом и импортом товаров. 13. Особенности налогообложения перевозок всеми видами транспорта и транспортно-экспедиционных услуг в рамках Таможенного союза 2010-2012 г.г. 14. Позиция Минфина по отдельным вопросам, связанным с перевозками внутри таможенного союза. Стоимость участия: 9 000 рублей Рекомендуем: 24 Августа: Лекторы Минфин РФ: НДС при осуществлении внешнеторговых операций с учетом изменений, внесенных в НК РФ. Применение нулевой ставки НДС с учетом изменений, внесенных в НК РФ. Новое в 2012 году. Стоимость участия: 9 000 рублей За более подробной информацuей обpащайтеcь по тел: 8 (499) Ч45*4О\95 \\// \Моск. код/ 7922I22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3917 bytes Desc: not available URL: From grarpamp at gmail.com Sat Aug 11 00:39:27 2012 From: grarpamp at gmail.com (grarpamp) Date: Sat, 11 Aug 2012 03:39:27 -0400 Subject: [tor-talk] Tor as ecommerce platform Message-ID: > expand the network instead of just using it as a proxy. Make everyone > a relay (even if low-bandwidth relays are not useful, and even if > there are theoretical issues b solve the issues instead) and have a > hidden service address by default. Work with file sharing software > developers to have a one-click setup of P2P sharing via Tor. Make an > easy interface for publishing files or simple sites on user's .onion > host. This is where Phantom has a huge advantage over Tor... always on, native IPv6 transport via tunnel interface. You don't have to create all sorts of 'only with Tor' hooked apps like come with I2P. All the software you use today just works [1]. Just point OS, apache, games, azureus, etc into that address space and you're done. And so long as you don't mind src spoofing, extra setup, and some non-optimums here and there, you can get that on Tor with onioncat today. [1] You did IPv6 feature ticket your favorite IPv4 only app didn't you... > Don't invent use cases, because users have their own (which you > don't like and hence ignore) b facilitate network expansion which will > actually bring in new use cases. Torproject isn't inventing select cases, they're the only cases they can publish. And they do so for two reasons... 1) Attract funding 2) Attempt to stave off legal action to shut it down... such standoff hopefully made possible through big sticks doing the funding, and a verifiable subset of published use cases. There's nothing stopping anyone from forking Tor, throwing it up on github and moving to an unfunded, unspoken development model to do all these things. People can even fork their own and specifically pimp it for drugs, guns, contract killing and CP. It won't do them or Tor or either's users any good though. _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From grarpamp at gmail.com Sat Aug 11 01:11:44 2012 From: grarpamp at gmail.com (grarpamp) Date: Sat, 11 Aug 2012 04:11:44 -0400 Subject: [tor-talk] Tor as ecommerce platform Message-ID: > Still, it is a little surprising they can't trace bitcoin yet, though. > Maybe they can. If you're using an anonet, a new address for every transaction, a good mix that at least guarantees lack of per session taint, and are willing to accept a random variance in your input and output BTC amount and timing to prevent lining up the net totals, I don't think anyone could. Part of it probably hinges on the overall coin flux rate through commerce at scale too. I'm sure the answer is on bitcointalk somewhere. > I think my bet is also on Silk Road not surviving in the > long run for that reason... Good systems are usually stronger than human factors. 1BTC says SR screws up the real life parts first. _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From flyingkiwiguy at gmail.com Sun Aug 12 12:46:10 2012 From: flyingkiwiguy at gmail.com (Gary Mulder) Date: Sun, 12 Aug 2012 20:46:10 +0100 Subject: [ZS] Gauss Cyber Espionage Threat Targets Banking Info Message-ID: Gauss joins the ranks of Stuxnet, Duqu, and Flame as an apparently state-sponsored tool ofcyber espionage. This latest threat appears to be built from the same code foundation as Flame, and specifically targets bank credentials and financial data. http://www.pcworld.com/businesscenter/article/260715/gauss_cyber_espionage_threat_targets_banking_info.html -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From cervantesrolland at essix.com Mon Aug 13 14:57:20 2012 From: cervantesrolland at essix.com (BIANCA CUNNINGHAM) Date: Mon, 13 Aug 2012 18:57:20 -0300 Subject: Recommended Penis Enlargement Pills to Increase Your Penis Size o0yd1r3fj Message-ID: <201208131555.EDFEFF22B36A40FE253473@y2ru10ng5> Recommended Penis Enlargement Pills to Increase Your Penis Size In the world of penis enlargement pills, two brands stand clearly above the rest. BigMan and Manhood Plus and are proven to increase penis size. http://gameeryy.ru From ethiotor at gmail.com Mon Aug 13 13:31:40 2012 From: ethiotor at gmail.com (ethio tor) Date: Mon, 13 Aug 2012 22:31:40 +0200 Subject: [tor-talk] Tor virus Message-ID: I am from Ethiopia. The problem faced by descendants in Ethiopia is many fold. 90 million people, a brutal repressive government by any standard, a single government owned ISP that has more government spies than actual telecommunication workers, a very poor and limited mobile and data infrastructure and sophisticated snooping ( https://blog.torproject.org/blog/ethiopia-introduces-deep-packet-inspection) regime. Certainly tor could benefit many people if it could be used widely. But with all the above problems how? And it just occurred to me!! I am not a coder so I don't know if it is possible. I am not certain what ethical questions it could raise or if it should at all under the above circumstance. Most of the PCs in the country are in government offices or given to government workers. And most of this PCs are the only once that has a relatively fast and free Internet access. Some thing that is common about all this PCs is that most of them are full of virus and Trojan horses (some say Chinese origin). Even state minsters offices. I am sure by now you are guessing where I am going with this. What if there is a tor "virus" (pardon for the choice of word) that can infect such pc and make a relay, bridge, or what ever on the background undetected. I have a feeling that if it were a smart idea some one would have thought of it but I could not sleep until I know how stupid an idea it is. _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Aug 13 13:56:44 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 13 Aug 2012 22:56:44 +0200 Subject: [tor-talk] Tor virus Message-ID: <20120813205644.GB12615@leitl.org> ----- Forwarded message from ethio tor ----- From flyingkiwiguy at gmail.com Tue Aug 14 06:25:01 2012 From: flyingkiwiguy at gmail.com (Gary Mulder) Date: Tue, 14 Aug 2012 14:25:01 +0100 Subject: [ZS] Bitcoin @ $1000 - unlikely any time soon Message-ID: Some pondering: I've been thinking about the recent super-bull market in BTC. Let's assume for a moment that BTC goes to $1000. That would mean with around 10M BTC issued, the Bitcoin economy would be the $10B in size. That is a very sizeable and noticeable event that governments would likely start to take notice and act, similar to Wikileaks, Piratebay, etc. Remember, Bitcoins compete directly against central banks' monopoly as a currency issuer, which is the most powerful financial tool all governments use manipulate their fiat currency and economies. Any major governmental reaction and the resulting negative publicity and loss of confidence would likely knock back the price of BTC significantly. Therefore it is unlikely under the present governmental and financial conditions that we'll ever see BTC at $1000, or at least not for long. It is much more likely that the for either dying lack of interest in Bitcoin or way too much of the wrong interest the price of BTC will hover a bit above the marginal cost to mine BTC at best. So what is the marginal cost of mining Bitcoin? At 50BTC per block mined it was estimated to be $3-4 about 6 months ago, depending on the local electricity costs of running GPUs. The difficulty has increased by about 30%, and the rate of Bitcoin mining will halve to 25BTC/block in about November 2012. I don't think fees make up any significant amount of mining profits, yet. The major destabilising unknown is the marginal cost of mining using FPGAs. It would be very interesting to determine the ratio of GPU to FPGA miners. Let's however assume the worst case GPU costing, and we get a marginal cost of around $8 to mine a BTC. This doesn't include the capital costs of buying, maintaining, and housing the GPUs or FPGAs. It looks like people are paying a 50% premium at the current price of $12/BTC. Your thoughts? Gary -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bookdepot at depot.ca Tue Aug 14 08:00:45 2012 From: bookdepot at depot.ca (=?koi8-r?B?Iu/C1d7FzsnFICL6wcvPzs/EwdTFzNjT1NfPINcg08bF0sUgz8LSwQ==?= =?koi8-r?B?3cXOydEg0yDP1MjPxMHNySDXIDIwMTIgx8/E1SIi?=) Date: Tue, 14 Aug 2012 16:00:45 +0100 Subject: =?koi8-r?B?6c7Wxc7F0tUt3MvPzM/H1Q==?= Message-ID: <01cd7a35$f66ff480$d3521253@bookdepot> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 310 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: othodi Type: image/gif Size: 68099 bytes Desc: not available URL: From l at odewijk.nl Tue Aug 14 07:02:44 2012 From: l at odewijk.nl (Lodewijk andri de la porte) Date: Tue, 14 Aug 2012 16:02:44 +0200 Subject: [ZS] Bitcoin @ $1000 - unlikely any time soon Message-ID: 2012/8/14 Gary Mulder > Any major governmental reaction and the resulting negative publicity and > loss of confidence would > Any publicity is good publicity. The more the US gov bashed on drug trading with BTC the better it was. Same will go for "it is undermining governmental authority and putting civilians at risk". So what is the marginal cost of mining Bitcoin? > The cost is not marginal. The performance of the network exceeds even SETI at Home. It is the largest distributed computing effort ever done by end-users (supercomputernetworks for the LHC for example are still bigger). It would seem you're taking this the wrong way around. If the Bitcoin rises in value the mining increases with it. If there's money to be made with mining it is done right away and thus the amount of money made is lowered. On the other hand no miner will sell for underneath the mining cost. The 50% premium may well be the cost of running hardware at the current risk assesment. Nevertheless the cost of mining Bitcoin knows no upper bound. If Bitcoin would break 1000$ mining will cost right around there. The two prices push and pull eachother. Be carefull not to confuse money theory with practical considerations or at least do so conciously. GPU/FPGA/ASIC doesn't matter when we talk about mining as we do now. -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Aug 14 09:07:21 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 14 Aug 2012 18:07:21 +0200 Subject: [ZS] Bitcoin @ $1000 - unlikely any time soon Message-ID: <20120814160721.GZ12615@leitl.org> ----- Forwarded message from Gary Mulder ----- From eugen at leitl.org Tue Aug 14 09:28:41 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 14 Aug 2012 18:28:41 +0200 Subject: [ZS] Bitcoin @ $1000 - unlikely any time soon Message-ID: <20120814162841.GA12615@leitl.org> ----- Forwarded message from Lodewijk andri de la porte ----- From eugen at leitl.org Tue Aug 14 10:04:01 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 14 Aug 2012 19:04:01 +0200 Subject: [ZS] Gauss Cyber Espionage Threat Targets Banking Info Message-ID: <20120814170401.GD12615@leitl.org> ----- Forwarded message from Gary Mulder ----- From eugen at leitl.org Tue Aug 14 11:20:18 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 14 Aug 2012 20:20:18 +0200 Subject: [tor-talk] Tor as ecommerce platform Message-ID: <20120814182018.GL12615@leitl.org> ----- Forwarded message from grarpamp ----- From eugen at leitl.org Tue Aug 14 11:22:34 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 14 Aug 2012 20:22:34 +0200 Subject: [tor-talk] Tor as ecommerce platform Message-ID: <20120814182234.GM12615@leitl.org> ----- Forwarded message from grarpamp ----- From bounce-171848-4804178 at necinteractive.com Tue Aug 14 11:32:20 2012 From: bounce-171848-4804178 at necinteractive.com (=?koi8-r?B?IuvV0tMgIvzLz8zPx8nexdPLycogy8/O1NLPzNgiIg==?=) Date: Tue, 14 Aug 2012 20:32:20 +0200 Subject: =?koi8-r?B?8NLPwszFzc7ZxSDXz9DSz9PZINcgz8LSwd3FzsnJINMgz9TIz8TBzQ==?= =?koi8-r?B?ySDQ0s/J2tfPxNPU18E=?= Message-ID: <01cd7a5b$e703a200$3034f758@bounce-171848-4804178> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 312 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: othodi Type: image/gif Size: 68099 bytes Desc: not available URL: From identity.function at gmail.com Tue Aug 14 11:45:19 2012 From: identity.function at gmail.com (Philipp Winter) Date: Tue, 14 Aug 2012 20:45:19 +0200 Subject: [tor-talk] Tor virus Message-ID: On Tue, Aug 14, 2012 at 12:29:05AM +0200, HardKor wrote: > Is it possible to connect to Tor from Ethiopia ? Is there any blocking > strategy ? The standard TBB does not work because Ethiopia is currently fingerprinting and dropping both, the TLS client and server hello. More details are available here: https://trac.torproject.org/projects/tor/wiki/doc/OONI/censorshipwiki/CensorshipByCountry/Ethiopia However, there are slightly modified bridges which can circumvent this block and make Tor usable from within Ethiopia. (You'll get such a bridge by writing to "help at rt.torproject.org".) Philipp _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Aug 14 12:12:51 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 14 Aug 2012 21:12:51 +0200 Subject: [tor-talk] Tor virus Message-ID: <20120814191251.GX12615@leitl.org> ----- Forwarded message from Philipp Winter ----- From liberationtech at lewman.us Wed Aug 15 06:46:01 2012 From: liberationtech at lewman.us (liberationtech at lewman.us) Date: Wed, 15 Aug 2012 09:46:01 -0400 Subject: [liberationtech] Images of Blocking in Different Countries? Message-ID: On Wed, Aug 15, 2012 at 02:55:33PM +0800, crates at oneotaslopes.org wrote 14K bytes in 386 lines about: : As far as I can tell, China doesn't "keyword-filter" in the sense most : people think of that phrase. That is, the Great Firewall isn't inspecting : all the text which flows through it, failing to deliver any web pages which : have offending words. The filtering is of two main types: China does lots of things in various ways. Best educated guesses as to why this is so are around lack of coordination internally and they like to try new things to see how much under- or over-blocking happens. What's been interesting is that I ran an IPv6-only host for the past year and queried all sorts of banned terms and known-blocked sites without issue. It seems China only focuses on IPv4 right now. When Huawei, Cisco, ZTE, and others have an IPv6 firewalling solution, I'm sure the censorship will expand to include IPv6 as well. -- Andrew http://tpo.is/contact pgp 0x6B4D6475 _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bsh at trust.kiev.ua Tue Aug 14 22:14:47 2012 From: bsh at trust.kiev.ua (=?koi8-r?B?89TB18vBIDAlLiDwxdLT0MXL1MnX2SAyMDEyIMfPxMEu?=) Date: Wed, 15 Aug 2012 13:14:47 +0800 Subject: =?koi8-r?B?8M/S0cTPyyDQz8TU18XS1sTFzsnRINPUwdfLySDu5PMgMCUu?= Message-ID: <0A8D52C2C4DF405A988F51C1B4526AAD@201208132016> 24 августа НДС при осуществлении внешнеторговых операций с учетом изменений, внесенных в НК РФ в 2011-2012 гг.. Применение нулевой ставки НДС с учетом изменений, внесенных в НК РФ в 2013 году. Перспективы 2013 года. Курс читает - Ведущий советник Отдела косвенных налогов Департамента налоговой и таможенно-тарифной политики Минфина России +7 495 7Ч2.91-98 или +7 (495)- 7Ч29I.98 Внимание! Ваши вопросы! которые Вы будете присылать включаются в программу. Программа будет скорректирована по мере поступления вопросов от участников курса. Программа: 1. Порядок определения налоговой базы по НДС. Момент определения налоговой базы при реализации товаров (работ, услуг), имущественных прав. 2. Применение НДС при поставках товаров на экспорт. Налогообложение НДС работ (услуг), предусмотренных подпунктами 2.1-2.8, 3 пункта 1 статьи 164 НК (в том числе, услуги по международной перевозке, услуги по предоставлению вагонов и контейнеров, транспортно-экспедиционные услуги, услуги по перевалке и хранению товаров в портах, услуги по переработке товаров (документы, обосновывающие применение нулевой ставки НДС и требования к ним; срок представления документов; момент определения налоговой базы). 3. Особенности применения НДС при выполнении работ (оказании услуг), облагаемых по ставке НДС 0%, в том числе работ (услуг), связанных с международной перевозкой 4. Порядок подтверждения обоснованности применения ставки НДС 0%. 5. Применение налоговых вычетов, в том числе при осуществлении операций, подлежащих налогообложению по ставке НДС 0%. 6. Определение места реализации работ (услуг) в целях применения НДС. 7. Исполнение обязанности налогового агента по НДС. 8. Особенности применения НДС при заключении договоров в иностранной валюте. 9. Счета-фактуры, книга покупок, книга продаж, декларация по НДС. 10. Исчисление НДС при осуществлении посреднических операций по реализации и приобретению товаров (по договорам комиссии, поручения и т.д.) 11. Особенности применения НДС при осуществлении внешнеторговых операций в рамках Таможенного союза. 12. НДС при ввозе товаров на территорию Российской Федерации (определение налоговой базы, уплата НДС в зависимости от избранной таможенной процедуры, вычет уплаченных сумм налога). Стоимость участия: 9 000 рублей Вся информация по тел: +7 499 - 445/40/95 ; +7 495 742_91.98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4219 bytes Desc: not available URL: From michaelr at cfileasing.com Wed Aug 15 05:20:31 2012 From: michaelr at cfileasing.com (=?koi8-r?B?98/a19IuIPTBzc/Wxc7O2cgg0MzB1MXWxco=?=) Date: Wed, 15 Aug 2012 15:20:31 +0300 Subject: =?koi8-r?B?9MHNz9bFzs7ZyiDGz9LVzSDXIO3P08vXxQ==?= Message-ID: <000d01cd7ad7$fb42aaa0$6400a8c0@michaelr> Тема: Новации таможенного законодательства.Кодекс таможенного союза.Контракт и таможенные формальности 28 августа Цель: полученные знания помогут минимизировать риски и оптимизировать бизнес в сфере ВЭД за счет правильного применения нового таможенного законодательства Таможенного союза и изменившихся норм национального законодательства, грамотного (с учетом правоприменительной практики) толкования таможенных правил и логистического подхода к составлению внешнеторговой сделки. Слушатели обеспечиваются содержательным методическим пособием с полным, по каждому рассматриваемому вопросу, перечнем нормативных документов, актуализированных на момент проведения курса. Программа мероприятия: Таможенный кодекс Таможенного союза. Область применения, нововведения, поправки. Таможенное законодательство Таможенного союза. Особенности применения национальных норм. Закон о "О таможенном регулировании в РФ". Структура и функции таможенных органов. Приближение к границе. Контракт и таможенные формальности. Понятие внешнеторговой сделки. Контрагенты и третья сторона в лице таможенных органов. Применимое право. Форма и структура контракта, типичные ошибки при составлении. Документы, регулирующие заключение международных сделок. Роль контракта при таможенном оформлении и таможенном контроле. Соотнесение статей контракта и таможенных формальностей. Статус, полномочия и ответственность лиц, декларирующих товар. Таможенный брокер (представитель). Таможенный представитель по Таможенному кодексу Таможенного Союза и в Законе "О таможенном регулировании в РФ". Что меняется? Условия включения в Реестр, полномочия, ответственность. Когда следует обращаться к услугам брокера (таможенного представителя) и на что следует обратить внимание при заключении договора с ним. Проект договора с брокером. "Серые брокеры". Административная ответственность за недостоверное декларирование. Судебная практика. Декларант. Статус декларанта в Таможенном Кодексе Таможенного Союза и в ФЗ "О таможенном регулировании в РФ". Перечень лиц, имеющих право выступать в качестве декларантов (собственник товара, посредник?). Контроль таможенными органами полномочий лиц на декларирование товаров. Список требуемых таможней документов. Позиция судов. Может ли "Грузополучатель" быть декларантом? Административная ответственность лиц, осуществляющих незаконную деятельность в качестве декларантов. Классификация товаров по коду ТНВЭД в рамках Таможенного союза. ТН ВЭД РФ и ТН ВЭД Таможенного Союза (структура, изменения). Рекомендации по определению и заявлению кода ТН ВЭД при декларировании. Особенности заполнения 31-й графы ГТД. Описание товара и статья "Предмет договора". Предварительное классификационное решение по коду ТН ВЭД и законодательство таможенного союза. Является ли заявление "неправильного" кода в ГТД недостоверным декларированием? Товары риска и прикрытия. Арбитражные споры. Перечень нормативных документов. Страна происхождения товаров в условиях таможенного союза. Принципы определения. Дифференциация таможенных платежей в зависимости от страны происхождения. Перечень стран-пользователей преференций (в условиях Таможенного Союза). Контроль таможенными органами страны происхождения товаров. Документы, подтверждающие право на права на преференции. Страна происхождения товара и Контракт. Рекомендации по подтверждению страны происхождения при декларировании товаров. Предварительное решение по стране происхождения в условиях таможенного союза. Судебная практика. Нормативные документы. Нетарифные меры регулирования в условиях Таможенного союза. Запреты и ограничения. Лицензирование экспорта и импорта. Подтверждение соответствия (сертификация). Применение ветеринарных, санитарных и фитосанитарных мер. Перечни товаров, нормативные документы, уполномоченные органы. Таможенная стоимость √ база для начисления платежей. Таможенная стоимость в рамках Таможенного Союза. Определение, заявление, контроль и корректировка таможенной стоимости ввозимых и вывозимых товаров. Методы определения таможенной стоимости. Первый метод определения таможенной стоимости и требования к внешнеторговому Контракту. Рекомендации по подтверждению и снижению таможенной стоимости. Вычеты и скидки из таможенной стоимости - законные пути ее снижения. Основные нормативные документы. Примеры заполнения ДТС. Примеры расчета таможенной стоимости и таможенных платежей. Практические аспекты определения таможенной стоимости и риска корректировки по новому таможенному законодательству. Правоприменительная практика по вопросам таможенной стоимости. Обжалование действий и решений таможенных органов. Условия поставки. ИНКОТЕРМС 90/2000. Новый ИНКОТЕРМС 2010. Изменения, в связи с принятием последней редакции ИНКОТЕРМС 2010. Статус документа. Особенности каждой группы и отдельных терминов. Сравнение редакций. ИНКОТЕРМС и таможенная очистка. ИНКОТЕРМС и вид транспорта. Ошибки при выборе условий поставки. Рекомендации по выбору оптимальных условий поставки, "подводные" камни. ИНКОТЕРМС и страхование. Обратите внимание: 21 сентября Новое таможенное законодательство - практическое применение. Таможенная стоимость, корректировка, контроль. Таможенные аспекты контракта ВЭД. Возврат таможенных платежей. Споры с таможенными органами Вся информация по тел: 8 (499) 4Ч54095 <<>> Московский код; 7922I*22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10635 bytes Desc: not available URL: From eugen at leitl.org Wed Aug 15 07:34:28 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 15 Aug 2012 16:34:28 +0200 Subject: [liberationtech] Images of Blocking in Different Countries? Message-ID: <20120815143428.GH12615@leitl.org> ----- Forwarded message from liberationtech at lewman.us ----- From joss-liberationtech at pseudonymity.net Wed Aug 15 08:46:43 2012 From: joss-liberationtech at pseudonymity.net (Joss Wright) Date: Wed, 15 Aug 2012 16:46:43 +0100 Subject: [liberationtech] Images of Blocking in Different Countries? Message-ID: On Aug 15, 2012, at 2:46 AM, "Eric S Johnson" wrote: > There are persistent reports that China?s cybercensorship can > sometimes vary (a little) by ISP, but I?ve never seen this (I?ve only > been to ~13 of the 34 PRC-defined provinces), and Alkasir hasn?t ever > detected any such variations. I carried out a few experiments last year, looking at regional variations in the responses of Chinese DNS servers for domains that had been reported as blocked by Herdict. (Using a list of DNS servers pulled from the APNIC WHOIS database.) There are plenty of caveats to the approach I took: DNS server location doesn't map reliably onto where the user is, DNS poisoning can occur at border routers, DNS servers can return different responses to different people, my methods for detecting poisoning were quite crude, etc. Given all that, I found a lot of variation in the DNS responses across China. I published a paper about it in FOCI'11 last year, but that mainly focused on the ethical issues of censorship research: http://static.usenix.org/events/foci11/tech/final_files/Wright.pdf There are some preliminary results and visualisations in this presentation: http://www.slideshare.net/josswright/finegrained-censorship-mapping (Apologies for my terrible GIS skills...) The approach was quite crude, but does support the hypothesis of filtering being at least partially decentralised. (Which makes sense for such a massive project.) I'm currently looking at quite a promising approach for a much more interesting set of experiments based on IP scans rather than DNS. Watch this space. :) Joss _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Aug 15 09:13:49 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 15 Aug 2012 18:13:49 +0200 Subject: [liberationtech] Images of Blocking in Different Countries? Message-ID: <20120815161349.GL12615@leitl.org> ----- Forwarded message from Joss Wright ----- From bbrewer at littledystopia.net Wed Aug 15 16:00:53 2012 From: bbrewer at littledystopia.net (b. brewer) Date: Wed, 15 Aug 2012 19:00:53 -0400 Subject: Fwd: [briar-devel] Foo security In-Reply-To: <502BDE6E.2090902@briarproject.org> References: <502BDE6E.2090902@briarproject.org> Message-ID: <502C2A25.3020903@littledystopia.net> -------- Original Message -------- Subject: [briar-devel] Foo security Date: Wed, 15 Aug 2012 18:37:50 +0100 From: Michael Rogers To: briar-devel at lists.sourceforge.net -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi all, Recently I've been thinking about an idea I'll call foo security, since I haven't thought of a better name. It's possible that someone else has already thought of this idea, but if so, I don't know what they called it. Foo security is an attempt to rethink information security from a usability perspective. It's defined as follows: A system is foo secure with respect to a user if the system's security properties match or exceed the user's beliefs about those properties. A few strange things are apparent from this definition. First, foo security is defined with respect to a user, so a system may be foo secure for one user and foo insecure for another. Second, foo security is defined with respect to a user's beliefs, so a system may become foo secure or foo insecure due to a change in the user's beliefs, with no change to the system. Third, a system that provides a security property may be less foo secure than a system that doesn't, if the user understands the latter system better than the former. That last point is what led me to think about foo security. I wanted to capture that fact that users change their behaviour based on their beliefs about the systems they're using. If a user wrongly believes a system to provide a stronger security property than it actually does, she may be better off using a system that she knows does not provide that property. An example: BarChat is an unencrypted chat application. BazChat is an encrypted chat application. BazChat's encryption can be defeated by the chat server. Alice believes that the conversations she has over BarChat can be read by third parties. This belief is true, so BarChat is foo secure with respect to Alice. Alice believes that the conversations she has over BazChat cannot be read by any third party. This belief exceeds reality, so BazChat is not foo secure with respect to Alice. Later, Alice learns that the conversations she has over BazChat can be read by a third party who controls the server. This belief is true, so BazChat is now foo secure with respect to Alice, even though the system itself hasn't changed. I like this perspective because it suggests that we can improve the security of systems we can't change, by improving the users' understanding of the systems. In the case of systems we can change, we might get a bigger improvement in foo security by changing the way security properties are explained than by changing the properties themseves. For example, we might improve a system's foo security by using UI metaphors that suggest the actual security properties. Cheers, Michael -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQEcBAEBAgAGBQJQK95uAAoJEBEET9GfxSfMzXsH/1StNEzWMvclHqT5ExarEJbn slkxo+ih1I6iiIfLqpW/WnavilG3QI4dNVSLqNMub7zEgUDrD4PxiyNxazmVzztN reLtBzpYlnVbqyS8QPZupebabySDLjKEnrlRj+fNyrmhp83+4m5Qd97vg+Bt85nC neLUoYc+YREsZIJqEpdolrLPnsH+jCKKEVYaB6CAObrLAH4bi721gnBmdrMxRCX/ DBsvANePFppuOXMOpZJ7ilhgoXsNg7BUfN7q9W3PSg3dnkIZ7mvoqmv2GGmTXSGo dyBDLU5NRV26s2xonjFGLQILsaIcu5e44nkt4IleiNO3uhGuPNolWYzWpyXypZE= =WzjW -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ briar-devel mailing list briar-devel at lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/briar-devel From Imogene.Driver at johnbruceusa.com Wed Aug 15 07:14:34 2012 From: Imogene.Driver at johnbruceusa.com (Imogene Driver) Date: Wed, 15 Aug 2012 20:14:34 +0600 Subject: Medsshop online Message-ID: <653370518535051-LRZPLOVSCDKADGVCIBWTW@ajgmjqtoa.johnbruceusa.com> Absolutely new edge of breathtaking sex is open for you with the help of our brand new drug! http://rod.gs/uUl http://hex.io/iFs From aceta.opinion at asuni.com Wed Aug 15 06:25:08 2012 From: aceta.opinion at asuni.com (=?koi8-r?B?IuvV0tMgIu7P18/FINcg2sHLz87PxMHUxczY09TXxSDy5iDXIM/CzA==?= =?koi8-r?B?wdPUySDT1NLPydTFzNjT1NfBIOzvIiI=?=) Date: Wed, 15 Aug 2012 20:25:08 +0700 Subject: =?koi8-r?B?68HEwdPU0s/X2cog1d7F1A==?= Message-ID: <01cd7b24$0fef6a00$07a2157b@aceta.opinion> информация для строителей во вложении -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 279 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: application/vnd.ms-excel Size: 31744 bytes Desc: not available URL: From kleinesk-ec at jenniferlopezfan.com Wed Aug 15 19:58:48 2012 From: kleinesk-ec at jenniferlopezfan.com (=?koi8-r?B?88zP1s7ZxSDXz9DSz9PZIM/U3sXUzs/T1Mk=?=) Date: Thu, 16 Aug 2012 08:28:48 +0530 Subject: =?koi8-r?B?7sHMz8cgzsEg0NLJwtnM2CwgIO7k8yDJIM7BzM/HIM7BIMnN1d3F09TX?= =?koi8-r?B?zy4g6drNxc7FzsnRINcgMjAxMiDHz8TVLg==?= Message-ID: 24 августа 2012 г. Налог на прибыль, НДС и налог на имущество. Изменения в 2012 году. Сложные вопросы отчетности +7 499 Ч45Ч\О95 \\\/// 8 (495) 7922I22 Программа: 1. НАЛОГ НА ПРИБЫЛЬ - ПРАКТИЧЕСКИЕ ВОПРОСЫ С УЧЕТОМ ПОЗИЦИИ ВАС РФ И РАЗЪЯСНЕНИЙ МИНФИНА РОССИИ * Доходы от реализации товаров, работ и услуг отражаем своевременно (в том числе объектов недвижимости с учетом постановления Президиума ВАС РФ от 08.11.2011 г. № 15726/10) и правильно оцениваем с учетом валюты расчетов, скидок и иных корректировок; возврат товаров в налоговом учете с учетом ст. 54 НК РФ и разъяснений Минфина России (письма от 23.03.2012 № 03-07-11/79; от 16.06.2011 г. № 03-03-06/1/351 и др). * Порядок определения доходов по производству с длительным циклом. * Особенности налогового учета стоимости приобретения МПЗ, основных средств, нематериальных активов, товаров для перепродажи. * Расходы, связанные с реализацией: дата признания в соответствии со статьей 272 НК РФ; виды расходов, подлежащих распределению, налоговые риски при сокращении перечня прямых расходов по сравнению с перечнем таких расходов в бухгалтерском учете. * Экономическое обоснование расходов; расходы, с которыми согласно арбитражной практике связаны налоговые риски: маркетинговые, консультационные, юридические услуги, возвратный лизинг, представительские расходы, услуги по управлению компанией, аутсорсинг, и др. * Амортизируемое имущество: амортизация основных средств и нематериальных активов; капитальный ремонт и реконструкция - принципиальные отличия; арендные платежи по договорам, составленным с нарушением требований ГК РФ (позиция судов и налоговых органов) амортизация после увеличения стоимости в разъяснениях Минфина России- безопасный вариант; капитальные вложения в арендованные основные средства; расходы на ликвидацию основных средств и нематериальных активов- учитываем по правилам бухгалтерского учета. * Прочие расходы: командировочные, представительские, рекламные расходы на охрану труда и создание условий труда на производстве; расходы на питьевую воду с учетом письма Минфина России от 25.05.2012 г. № 03-03-06/1/274. * Проценты по долговым обязательствам: есть ли риски по беспроцентным займам и у какой стороны договора? Начислять или не начислять доходы (расходы) в виде процентов по договорам, предусматривающим уплату процентов одновременно или после возврата долга (постановления Президиума ВАС РФ от 24.11.2009 г. № 11200/09; от 07.06.2011 г. № 17586/10; постановление ФАС Московского округа от 21.05.2012 г. № А41-20291/11 и др.)? Как применять положения статьи 269 НК РФ при использовании метода сопоставимости долговых обязательств с учетом постановления Президиума ВАС РФ от 17.01.2012 № 9898/11; как определить предельную величину процентов по займам, выраженным в иностранной валюте, но полученным в рублях? * Курсовые разницы с учетом постановления Президиума ВАС РФ от29.05.2012 г. № 16335/11; суммовые разницы - возникают ли они при предоплате письма Минфина России от 13.02.2012 № 03-03-06/1/83; пени, штрафы неустойки за нарушение условий договоров; безвозмездная передача имущества и имущественных прав (выполнение работ, оказания услуг): налоговые последствия для передающей и принимающей стороны. * Налогообложение дивидендов. Ответственность общества за несвоевременную выплату дивидендов. * Налоговый учет взносов участников (акционеров) в целях увеличения чистых активов. * Убытки учитываемые и не учитываемые для целей налогообложения прибыли - безнадежные долги в соответствии с п.2 ст.266 НК РФ; от уступки прав требования; от списания финансовых вложений; перенос убытков на будущее. * Исправление ошибок в налоговом учете. * Порядок уплаты налога организациями, имеющими обособленные подразделения. * Декларация по налогу на прибыль за 9 месяцев 2012 года. 2. НАЛОГ НА ДОБАВЛЕННУЮ СТОИМОСТЬ - ПРАКТИЧЕСКИЕ ВОПРОСЫ ПРИМЕНЕНИЯ В 2012 ГОДУ * Вопросы применения постановления Правительства РФ от 26.12.2011 г. № 1137 "О формах и правилах заполнения (ведения) документов, применяемых при расчетах по НДС": * счета-фактуры - недостатки, не препятствующие вычетам; ситуации, при которых составляются корректировочные счета-фактуры, и ситуации, при которых выписанный ранее счет-фактура исправляется путем заполнения нового бланка; счета-фактуры при определении цены в у.е; счета-фактуры при недостаче, браке и возврате товаров; в каких случаях полученные счета-фактуры не регистрируются в книге покупок? * проблемы восстановления НДС по основным средствам, используемым частично для осуществления операций, облагаемых по ставке "0"%. * Определение момента начисления НДС в различных хозяйственных ситуациях, понятия "отгрузка" и "оплата"( в том числе в неденежной форме) в разъяснениях Минфина России и ФНС России; начисление и вычеты НДС по авансам;восстановление НДС по авансам у покупателя с учетом определения ВАС РФ от 22.05.2012 № ВАС-5972/12. * Вычеты при отсутствии налоговой базы - позиция ФНС России – вычет возможен (письмо от 28.02.2012 г. № ЕД-3-3/631. * Скидки с учетов постановления Президиума ВАС РФ от 07.02.2012 № 11637/11 - проблемы у покупателя. * НДС при уступке прав требования. * Ситуации, требующие раздельного учёта по НДС (при наличии облагаемых и необлагаемых операций, операций, при наличии ставки "0" %; и др.). * Исчисление и уплата НДС и вычеты у налогового агента с учетом определения Президиума ВАС РФ от 01.02.2012 г № ВАС-15483/11. * НДС при посреднических договорах. 3. НАЛОГ НА ИМУЩЕСТВО ОРГАНИЗАЦИЙ * Рекомендации по расчёту налоговой базы по налогу на имущество в сложных ситуациях: по построенным и приобретённым объектам недвижимости, по основным средствам, приобретённым по договору купли- продажи, в качестве вклада в уставный капитал, безвозмездно. Порядок расчёта и уплаты налога на имущество при создании и ликвидации обособленных подразделений. * Порядок уплаты налога по объектам недвижимости. * Зачёт налога на имущество, уплаченного за рубежом. * Порядок налогообложения имущества переданного в доверительное управление. * Расчет авансовых платежей по налогу на имущество. * Новая арбитражная практика (Решение ВАС РФ от 27.01.2012 № 16291/11; Информационное письмо ВАС РФ от 17.11.2011 г. № 148 "Обзор практики разрешения споров, связанных с применением главы 30 НК РФ"). Стоимость участия: 8 900 рублей Информацию можно получить по телефонам: (495) 7Ч2_9I98 : +7 499 - 445.40/95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10140 bytes Desc: not available URL: From bicknell at ufp.org Thu Aug 16 12:39:12 2012 From: bicknell at ufp.org (Leo Bicknell) Date: Thu, 16 Aug 2012 12:39:12 -0700 Subject: Any Idea About Spectrum-DMR-104-1 ?! Message-ID: In a message written on Thu, Aug 16, 2012 at 11:30:40PM +0430, Shahab Vahabzadeh wrote: > Dear Owen, > Thanks for your reply, in reply to your factors: > > 1. 1~2 Kilometers > 2. PTP > 3. Directional > 4. 29db Dish (single or dual) I know someone already pointed you to the product, but that just screams like what you want is the Ubiquity airFiber product. You should easily get near the max 1.4Gbps throughput at 1-2km if you have clear line of site. It's "plug and play", in that you should have to do very mimimal tuning to get that performance. Mostly making sure the two units are aligned properly. I've not gotten a quote myself, but the Internet forums suggest the gear is $3k for a single link (so two units). Just to do high quality 801.11n with dish antennas would probably cost $1k or more. The 24Ghz band they use should be worldwide license free (check with your country) and also have less interference than the 5Ghz band. http://www.ubnt.com/airfiber -- Leo Bicknell - bicknell at ufp.org - CCIE 3440 PGP keys at http://www.ufp.org/~bicknell/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From brad.litchfield at eugene-law.com Thu Aug 16 06:41:48 2012 From: brad.litchfield at eugene-law.com (=?koi8-r?B?IuzvIg==?=) Date: Thu, 16 Aug 2012 16:41:48 +0300 Subject: =?koi8-r?B?8tXLz9fPxMnUxczAINDSz8XL1M/X?= Message-ID: <01cd7bce$07536e00$bd6384b2@brad.litchfield> Центр Подготовки Специалистов приглашает строителей на полезный курс повышения квалификации: Строительство и регистрация прав на линейные объекты. Конференция пройдет в период с 3 по 4 сентября в Петербурге Краткая программа конференции: 1) Виды линейных объектов. 2) Оформление прав на земельные участки под строительство линейных объектов. 3) Перевод земельных участков из категории в категорию в целях строительства, реконструкции и эксплуатации линейных объектов. 4) Ограничение прав на землю в связи со строительством, реконструкцией и эксплуатацией линейных объектов. 5) Экологические требования в связи с проектированием линейных объектов. 6) Использование недр при строительстве, реконструкции и эксплуатации линейных объектов. 7) Новый порядок осуществления кадастровых работ по образованию земельных участков. 8) Ответственность за нарушения законодательства при строительстве, реконструкции и эксплуатации линейных объектов. Телефон для записи на обучение и обращения за дополнительной информацией: (812) 642-47-68 С уважением, оргкомитет Обучающего Центра! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2403 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 12725 bytes Desc: not available URL: From camera_lumina at hotmail.com Thu Aug 16 15:50:10 2012 From: camera_lumina at hotmail.com (Tyler Durden) Date: Thu, 16 Aug 2012 18:50:10 -0400 Subject: Jim Bell Released from Prison In-Reply-To: References: Message-ID: And Julian, of course, is in the Ecuadorian Embassy. One can only imagine the kind of pressure being brought to bear (bare? I dunno) in the UK government that they would threaten (or pretend to threaten) some sort of violation. For that matter, why in hell did they even send token support into Iraq? The only thing I can figure out is that they fear American consumers somehow. I just can't imagine why the reasonably sensible British would seem to bow and scrape to Amerikkkan pressure. With Assange, it's just a damned extradition order to Sweden for God's sake. What the F is going on here? Are USA-ian TLA bigshots taking Assange personally and calling in all and every favor? Let me hereby officially proclaim (within the Cypherpunks Governance manual) that Assange is a fuckin' rockstar. Yeah, you know every rockstar is in it for the glory and chicks, but he's still a fuckin' rockstar. > Date: Tue, 3 Jul 2012 18:40:47 -0400 > To: cypherpunks at al-qaeda.net > From: jya at pipeline.com > Subject: Jim Bell Released from Prison > > Jim was released March 12, 2012: > > http://www.bop.gov/iloc2/InmateFinderServlet?Transaction=NameSearch&needingMo reList=false&FirstName=james&Middle=dalton&LastName=bell&Race=U&Sex=U&Age=&x= 77&y=28Bell%27s > > Taken from a long article on Bitcoin in IEEE Spectrum, June 2012, which > credits 1992 cypherpunks for Bitcoin foundation: > > http://spectrum.ieee.org/computing/software/bitcoin-the-cryptoanarchists-answ er-to-cash/0 From billing at alltimehost.biz Thu Aug 16 08:53:14 2012 From: billing at alltimehost.biz (=?koi8-r?B?IiDy1cvP18/EydTFzNggyc7Gz9LNwcPJz87Oz8fPIMPFztTSwSI=?=) Date: Thu, 16 Aug 2012 18:53:14 +0300 Subject: =?koi8-r?B?8sXHydPU0sHDydEg0NLB1yDOwSDMyc7Fys7ZxSDPwt/Fy9TZ?= Message-ID: <01cd7be0$63bf8900$f0cee09f@billing> Центр Подготовки Специалистов приглашает строителей на полезный курс повышения квалификации: Строительство и регистрация прав на линейные объекты. Конференция пройдет в период с 3 по 4 сентября в Петербурге Краткая программа конференции: 1) Виды линейных объектов. 2) Оформление прав на земельные участки под строительство линейных объектов. 3) Перевод земельных участков из категории в категорию в целях строительства, реконструкции и эксплуатации линейных объектов. 4) Ограничение прав на землю в связи со строительством, реконструкцией и эксплуатацией линейных объектов. 5) Экологические требования в связи с проектированием линейных объектов. 6) Использование недр при строительстве, реконструкции и эксплуатации линейных объектов. 7) Новый порядок осуществления кадастровых работ по образованию земельных участков. 8) Ответственность за нарушения законодательства при строительстве, реконструкции и эксплуатации линейных объектов. Телефон для записи на обучение и обращения за дополнительной информацией: (812) 642-47-68 С уважением, оргкомитет Обучающего Центра! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2403 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 12725 bytes Desc: not available URL: From eugen at leitl.org Thu Aug 16 13:15:56 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 16 Aug 2012 22:15:56 +0200 Subject: Any Idea About Spectrum-DMR-104-1 ?! Message-ID: <20120816201556.GF12615@leitl.org> ----- Forwarded message from Leo Bicknell ----- From blindaj at blindaj.by Thu Aug 16 06:52:34 2012 From: blindaj at blindaj.by (=?koi8-r?B?9NLBztPGxdLUzs/FIMPFzs/PwtLB2s/Xwc7JxQ==?=) Date: Thu, 16 Aug 2012 22:52:34 +0900 Subject: =?koi8-r?B?68/O1NLPzNggzsHMz8fP18nLz9cg0M8g1NLBztPGxdLUztnNIMPFzsHN?= Message-ID: <000d01cd7bb6$639e8590$6400a8c0@blindaj> 27 августа 2012г. "Ликбез " для налогоплательщика и "как жить дальше ". Трансфертное ценообразование: новый порядок контроля с 2012 г. Способы ухода от контроля за сделками \Моск. код/ 742\9I/98 \\\/// код (495) - 7/42/91*98 Цель: С 1 января 2012 года НК РФ дополнен новым разделом V.1, посвященным контролю цен сделок. Семинар посвящен подробному рассмотрению произошедших в этой сфере изменений и практическим рекомендациям налогоплательщикам по адаптации к ним (подготовка защитной документации, избежание взаимозависимости и контроля сделок, снижение риска претензий). Рассматриваются новые обязанности, права и ответственность налогоплательщиков, новый вид проверок √ "проверка полноты исчисления и уплаты налогов в связи с совершением сделок между взаимозависимыми лицами", способы обоснования трансфертных цен в различных сделках. Вместе с тем, рассматриваются и законные способы ухода от обременительного контроля за ценами сделок по новому законодательству, его пробелы и противоречия, перспективы новых поправок в НК РФ. Программа: 1. Контролируемые сделки, что изменилось: * сделки между взаимозависимыми лицами; * сделки в области внешней торговли биржевыми товарами; * сделки с офшорами; 2. Когда сделки не признаются контролируемыми и как избежать контроля. Методика расчета минимальной суммы для признания внутрироссийских сделок контролируемыми. 3. Взаимозависимые лица, новый перечень оснований взаимозависимости, ее косвенные признаки. Установление взаимозависимости "по иным основаниям" в рамках судебного разбирательства. Способы ухода от взаимозависимости. Использование номинальных учредителей и директоров компаний, ИП. Кто может быть номиналом? Номиналы-нерезиденты: юридические и физические лица. Траст: номиналы по закону, а не "по понятиям". Как защититься от номинала: юридические и экономические способы. Простое товарищество с физлицом-номиналом? 4. Новые обязанности и права налогоплательщиков, совершающих контролируемые сделки: * определение перечня контролируемых сделок, форма и сроки подачи; * подача документации по трансфертным ценам; * добровольные корректировки цен. 5. Новый вид налоговых проверок √ "проверка полноты исчисления и уплаты налогов в связи с совершением сделок между взаимозависимыми лицами". Случаи освобождения от ответственности. 6.Методы определения соответствия цен сделки рыночным: * сопоставимые рыночные цены √ где их найти. Расчет интервала рыночных цен; * сопоставимые сделки √ как доказать сопоставимость. Методика корректировки; * открытые источники информации √ что это; * анализа уровня рентабельности √ как найти сопоставимые компании. Расчет интервала рентабельности; * метод распределения прибыли √ реально ли применение на практике?; 6. Международная практика применения методов ценообразования (ОЭСР, США). 7. Способы защиты прав и интересов налогоплательщика: * соглашение о ценообразовании: порядок определения цен и порядок применения методов ценообразования в контролируемых сделках. Насколько это реально?; * симметричные корректировки: потенциальные проблемы в применении; * консолидированная группа налогоплательщиков: далекое будущее? 8. Что конкретно должно быть сделано сейчас для успешной адаптации к новым правилам: * анализ соответствия применяемых цен и существующей методики ценообразования требованиям НК; * что изменить в договорах; * разработка типовой документации для обоснования цен. 9. Примеры подходов к исследованию трансфертных цен по разным видам деятельности. 10.Ответы на вопросы. Стоимость участия: 9 000 рублей Вся информация по тел: 8 (Ч95) 792*2I*22 ; \Моск. код/ 7922I22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6650 bytes Desc: not available URL: From anks at sgcm.com Thu Aug 16 07:07:33 2012 From: anks at sgcm.com (=?koi8-r?B?IuvV0tMgIu7P18/FINcg2sHLz87PxMHUxczY09TXxSDy5iDXIM/CzA==?= =?koi8-r?B?wdPUySDT1NLPydTFzNjT1NfBIOzvIiI=?=) Date: Thu, 16 Aug 2012 23:07:33 +0900 Subject: =?koi8-r?B?9MXIzsnexdPLz83VINLVy8/Xz8TJ1MXMwA==?= Message-ID: <01cd7c03$ead22880$b31f65de@anks> Центр Подготовки Специалистов приглашает строителей на полезный курс повышения квалификации: Строительство и регистрация прав на линейные объекты. Конференция пройдет в период с 3 по 4 сентября в Петербурге Краткая программа конференции: 1) Виды линейных объектов. 2) Оформление прав на земельные участки под строительство линейных объектов. 3) Перевод земельных участков из категории в категорию в целях строительства, реконструкции и эксплуатации линейных объектов. 4) Ограничение прав на землю в связи со строительством, реконструкцией и эксплуатацией линейных объектов. 5) Экологические требования в связи с проектированием линейных объектов. 6) Использование недр при строительстве, реконструкции и эксплуатации линейных объектов. 7) Новый порядок осуществления кадастровых работ по образованию земельных участков. 8) Ответственность за нарушения законодательства при строительстве, реконструкции и эксплуатации линейных объектов. Телефон для записи на обучение и обращения за дополнительной информацией: (812) 642-47-68 С уважением, оргкомитет Обучающего Центра! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2404 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 12725 bytes Desc: not available URL: From bruno89 at pmouse.ru Thu Aug 16 22:03:01 2012 From: bruno89 at pmouse.ru (=?koi8-r?B?7uTzINXQzMHUwSA=?=) Date: Fri, 17 Aug 2012 07:03:01 +0200 Subject: =?koi8-r?B?7sHMz8fPz8LMz9bFzsnFIO7k8yDSwcLP1CAo1dPM1ccpLA==?= Message-ID: <000d01cd7c2d$31e2c490$6400a8c0@bruno89> 24 августа Применение нулевой ставки НДС с учетом изменений, внесенных в НК РФ в 2012 году. НДС при осуществлении внешнеторговых операций с учетом изменений, внесенных в НК РФ в 2012 году. Перспективы 2013 года. Курс читает - Ведущий советник Отдела косвенных налогов Департамента налоговой и таможенно-тарифной политики Минфина России код (495) - 7.42.9I*98 или +7 (495)- 7Ч291/98 Внимание! Ваши вопросы! которые Вы будете присылать включаются в программу. Программа будет скорректирована по мере поступления вопросов от участников курса. Программа: 1. Порядок определения налоговой базы по НДС. Момент определения налоговой базы при реализации товаров (работ, услуг), имущественных прав. 2. Применение НДС при поставках товаров на экспорт. Налогообложение НДС работ (услуг), предусмотренных подпунктами 2.1-2.8, 3 пункта 1 статьи 164 НК (в том числе, услуги по международной перевозке, услуги по предоставлению вагонов и контейнеров, транспортно-экспедиционные услуги, услуги по перевалке и хранению товаров в портах, услуги по переработке товаров (документы, обосновывающие применение нулевой ставки НДС и требования к ним; срок представления документов; момент определения налоговой базы). 3. Особенности применения НДС при выполнении работ (оказании услуг), облагаемых по ставке НДС 0%, в том числе работ (услуг), связанных с международной перевозкой 4. Порядок подтверждения обоснованности применения ставки НДС 0%. 5. Применение налоговых вычетов, в том числе при осуществлении операций, подлежащих налогообложению по ставке НДС 0%. 6. Определение места реализации работ (услуг) в целях применения НДС. 7. Исполнение обязанности налогового агента по НДС. 8. Особенности применения НДС при заключении договоров в иностранной валюте. 9. Счета-фактуры, книга покупок, книга продаж, декларация по НДС. 10. Исчисление НДС при осуществлении посреднических операций по реализации и приобретению товаров (по договорам комиссии, поручения и т.д.) 11. Особенности применения НДС при осуществлении внешнеторговых операций в рамках Таможенного союза. 12. НДС при ввозе товаров на территорию Российской Федерации (определение налоговой базы, уплата НДС в зависимости от избранной таможенной процедуры, вычет уплаченных сумм налога). Стоимость участия: 9 000 рублей Вся информация по тел: 8 (495) 792-21/22 **** код (495) - 7*42\9I.98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4341 bytes Desc: not available URL: From bounce3 at netdating.dk Fri Aug 17 09:15:26 2012 From: bounce3 at netdating.dk (=?koi8-r?B?Iu/C1d7FzsnFICL08vXk7/fv6iDr7+Tl6/MgMjAxMiIi?=) Date: Fri, 17 Aug 2012 08:15:26 -0800 Subject: =?koi8-r?B?6c7T0MXL1M/S1SDQzyDLwcTSwc0=?= Message-ID: <01cd7c50$74a7e300$bdab64af@bounce3> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 313 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 62971 bytes Desc: not available URL: From macavity at well.com Fri Aug 17 02:06:57 2012 From: macavity at well.com (Will Morton) Date: Fri, 17 Aug 2012 10:06:57 +0100 Subject: Jim Bell Released from Prison In-Reply-To: References: Message-ID: On 16 August 2012 23:50, Tyler Durden wrote: > > For that matter, why in hell did they even send token support into Iraq? The > only thing I can figure out is that they fear American consumers somehow. > A mixture of the crypto-papist* Blair getting his holy crusade antennae tickled by Dubya, and plain old keeping the big bully on your side. You never know if there's another Falklands around the corner - or another Suez! Regarding the current Ecuador excitement... the populace here in the UK is very much behind Assange, although this is purely love of an heroic underdog rather than his politics. Still, not bad for an aspie :-) W * http://news.bbc.co.uk/1/hi/7157409.stm From bleyd777 at lasercomponents.ru Thu Aug 16 19:23:49 2012 From: bleyd777 at lasercomponents.ru (=?koi8-r?B?88zP1s7ZxSDXz9DSz9PZIM/U3sXUzs/T1Mk=?=) Date: Fri, 17 Aug 2012 10:23:49 +0800 Subject: =?koi8-r?B?7sHMz8cgzsEg0NLJwtnM2CwgIO7k8yDJIM7BzM/HIM7BIMnN1d3F09TX?= =?koi8-r?B?zy4g6drNxc7FzsnRINcgMjAxMiDHz8TVLg==?= Message-ID: <000d01cd7c1f$563ed080$6400a8c0@bleyd777> 24 августа 2012 г. Налог на прибыль, НДС и налог на имущество. Изменения в 2012 году. Сложные вопросы отчетности +7 499 - 445\Ч0\95 ; +7 (495)- 7Ч29I-98 Программа: 1. НАЛОГ НА ПРИБЫЛЬ - ПРАКТИЧЕСКИЕ ВОПРОСЫ С УЧЕТОМ ПОЗИЦИИ ВАС РФ И РАЗЪЯСНЕНИЙ МИНФИНА РОССИИ * Доходы от реализации товаров, работ и услуг отражаем своевременно (в том числе объектов недвижимости с учетом постановления Президиума ВАС РФ от 08.11.2011 г. ╧ 15726/10) и правильно оцениваем с учетом валюты расчетов, скидок и иных корректировок; возврат товаров в налоговом учете с учетом ст. 54 НК РФ и разъяснений Минфина России (письма от 23.03.2012 ╧ 03-07-11/79; от 16.06.2011 г. ╧ 03-03-06/1/351 и др). * Порядок определения доходов по производству с длительным циклом. * Особенности налогового учета стоимости приобретения МПЗ, основных средств, нематериальных активов, товаров для перепродажи. * Расходы, связанные с реализацией: дата признания в соответствии со статьей 272 НК РФ; виды расходов, подлежащих распределению, налоговые риски при сокращении перечня прямых расходов по сравнению с перечнем таких расходов в бухгалтерском учете. * Экономическое обоснование расходов; расходы, с которыми согласно арбитражной практике связаны налоговые риски: маркетинговые, консультационные, юридические услуги, возвратный лизинг, представительские расходы, услуги по управлению компанией, аутсорсинг, и др. * Амортизируемое имущество: амортизация основных средств и нематериальных активов; капитальный ремонт и реконструкция - принципиальные отличия; арендные платежи по договорам, составленным с нарушением требований ГК РФ (позиция судов и налоговых органов) амортизация после увеличения стоимости в разъяснениях Минфина России- безопасный вариант; капитальные вложения в арендованные основные средства; расходы на ликвидацию основных средств и нематериальных активов- учитываем по правилам бухгалтерского учета. * Прочие расходы: командировочные, представительские, рекламные расходы на охрану труда и создание условий труда на производстве; расходы на питьевую воду с учетом письма Минфина России от 25.05.2012 г. ╧ 03-03-06/1/274. * Проценты по долговым обязательствам: есть ли риски по беспроцентным займам и у какой стороны договора? Начислять или не начислять доходы (расходы) в виде процентов по договорам, предусматривающим уплату процентов одновременно или после возврата долга (постановления Президиума ВАС РФ от 24.11.2009 г. ╧ 11200/09; от 07.06.2011 г. ╧ 17586/10; постановление ФАС Московского округа от 21.05.2012 г. ╧ А41-20291/11 и др.)? Как применять положения статьи 269 НК РФ при использовании метода сопоставимости долговых обязательств с учетом постановления Президиума ВАС РФ от 17.01.2012 ╧ 9898/11; как определить предельную величину процентов по займам, выраженным в иностранной валюте, но полученным в рублях? * Курсовые разницы с учетом постановления Президиума ВАС РФ от29.05.2012 г. ╧ 16335/11; суммовые разницы - возникают ли они при предоплате письма Минфина России от 13.02.2012 ╧ 03-03-06/1/83; пени, штрафы неустойки за нарушение условий договоров; безвозмездная передача имущества и имущественных прав (выполнение работ, оказания услуг): налоговые последствия для передающей и принимающей стороны. * Налогообложение дивидендов. Ответственность общества за несвоевременную выплату дивидендов. * Налоговый учет взносов участников (акционеров) в целях увеличения чистых активов. * Убытки учитываемые и не учитываемые для целей налогообложения прибыли - безнадежные долги в соответствии с п.2 ст.266 НК РФ; от уступки прав требования; от списания финансовых вложений; перенос убытков на будущее. * Исправление ошибок в налоговом учете. * Порядок уплаты налога организациями, имеющими обособленные подразделения. * Декларация по налогу на прибыль за 9 месяцев 2012 года. 2. НАЛОГ НА ДОБАВЛЕННУЮ СТОИМОСТЬ - ПРАКТИЧЕСКИЕ ВОПРОСЫ ПРИМЕНЕНИЯ В 2012 ГОДУ * Вопросы применения постановления Правительства РФ от 26.12.2011 г. ╧ 1137 "О формах и правилах заполнения (ведения) документов, применяемых при расчетах по НДС": * счета-фактуры - недостатки, не препятствующие вычетам; ситуации, при которых составляются корректировочные счета-фактуры, и ситуации, при которых выписанный ранее счет-фактура исправляется путем заполнения нового бланка; счета-фактуры при определении цены в у.е; счета-фактуры при недостаче, браке и возврате товаров; в каких случаях полученные счета-фактуры не регистрируются в книге покупок? * проблемы восстановления НДС по основным средствам, используемым частично для осуществления операций, облагаемых по ставке "0"%. * Определение момента начисления НДС в различных хозяйственных ситуациях, понятия "отгрузка" и "оплата"( в том числе в неденежной форме) в разъяснениях Минфина России и ФНС России; начисление и вычеты НДС по авансам;восстановление НДС по авансам у покупателя с учетом определения ВАС РФ от 22.05.2012 ╧ ВАС-5972/12. * Вычеты при отсутствии налоговой базы - позиция ФНС России √ вычет возможен (письмо от 28.02.2012 г. ╧ ЕД-3-3/631. * Скидки с учетов постановления Президиума ВАС РФ от 07.02.2012 ╧ 11637/11 - проблемы у покупателя. * НДС при уступке прав требования. * Ситуации, требующие раздельного учёта по НДС (при наличии облагаемых и необлагаемых операций, операций, при наличии ставки "0" %; и др.). * Исчисление и уплата НДС и вычеты у налогового агента с учетом определения Президиума ВАС РФ от 01.02.2012 г ╧ ВАС-15483/11. * НДС при посреднических договорах. 3. НАЛОГ НА ИМУЩЕСТВО ОРГАНИЗАЦИЙ * Рекомендации по расчёту налоговой базы по налогу на имущество в сложных ситуациях: по построенным и приобретённым объектам недвижимости, по основным средствам, приобретённым по договору купли- продажи, в качестве вклада в уставный капитал, безвозмездно. Порядок расчёта и уплаты налога на имущество при создании и ликвидации обособленных подразделений. * Порядок уплаты налога по объектам недвижимости. * Зачёт налога на имущество, уплаченного за рубежом. * Порядок налогообложения имущества переданного в доверительное управление. * Расчет авансовых платежей по налогу на имущество. * Новая арбитражная практика (Решение ВАС РФ от 27.01.2012 ╧ 16291/11; Информационное письмо ВАС РФ от 17.11.2011 г. ╧ 148 "Обзор практики разрешения споров, связанных с применением главы 30 НК РФ"). Стоимость участия: 8 900 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: (Ч95) 792\21_2_2 : код: (четыре девять пять) 792-2122 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 10216 bytes Desc: not available URL: From g.edu at k.is Fri Aug 17 04:24:33 2012 From: g.edu at k.is (=?koi8-r?B?+sHLz87O2cUgwczY1MXSzsHUydfZ?=) Date: Fri, 17 Aug 2012 12:24:33 +0100 Subject: =?koi8-r?B?7sHMz8fP18/FINDMwc7J0s/Xwc7JxSDXIMvSydrJ0w==?= Message-ID: <43FBEA7A7E70412DB0B6F6031D32A630@xpsp2eb13ef0e5> 28 августа 2012г. Налоговое планирование: как жить без обналички и фирм-однодневок и не разориться, уход от "черных" и "серых" схем, оптимизация налогов с использованием законных альтернативных схем +7 499 Ч45*40-95 или код (499) - ЧЧ5*4095 Цель: Глобальный экономический кризис привел в том числе к ужесточению налоговой политики государства, повышению ставок налогов и активизации борьбы за их собираемость. В современных условиях использование таких традиционных способов псевдооптимизации, как обналичка и фирмы-однодневки становится более опасным, дорогим и малодоступным. Помочь компаниям, применяющим "серые" и "черные" схемы оптимизации налогов, уйти от них, и при этом не разориться, не уступить конкурентам, не уйти с рынка. Найти законные альтернативы таким схемам, платить налоги, но не переплачивать – вот основная идея налогового планирования без "помоек" и "черного нала". Программа: 1. Договоримся о терминах: что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.). Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2. Обналичивание. Для чего используется: * "черная" зарплата и доходы собственников бизнеса; * оплата расходов, которые не хочется проводить официально; * незаконная деятельность (взятки, откаты, финансирование политической деятельности…). 3. Законные альтернативы обналичиванию (только для законных целей!): * в каком случае выплата зарплаты на спецрежимах сохраняет свою актуальность; * дивиденды от компаний на спецрежимах или от компании-нерезидента; * предприниматель (ИП) – как использовать; * дарение физлицом наличных денег, заработанных в качестве ИП – легальная альтернатива обналичиванию, дающая безналоговый доход? Новый порядок ведения кассовой операций ЦБР. Получение наличных по чеку, через личные (карточные и иные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п. Выбор банков, ограничения; * зарплата в большом размере – льготная (в некоторых случаях – нулевая) ставка страховых взносов; * платежи от нерезидентов на карты, основания платежей. * Однодневки. Для чего используются: * псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; * "серый импорт"; * "серая конвертация"; * незаконная деятельность. 4. "Серые" (полулегальные) альтернативы: как нельзя "оптимизировать"! Фирмы-"прокладки", контактирующие с недобросовестными налогоплательщиками ("белая" - "серая" - "черная" фирмы). Краткий обзор других "серых" альтернатив. 5. Законные альтернативы однодневкам (только для законных целей!): * выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение доходов и расходов "с НДС" и "без НДС"; * затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; * прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; * выплата нерезидентам дивидендов, роялти, процентов, вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 6. Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. 7. Как можно и как нельзя оптимизировать налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменения. Обзор изменений налогового законодательства, их влияние на налоговые схемы. Ответы на вопросы. По желанию и возможности – индивидуальное экспресс-моделирование налоговых схем для компаний-участниц курса. Стоимость участия: 9 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 499 Ч45-ЧО_95 \\\/// +7 499 4Ч54-095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6333 bytes Desc: not available URL: From bryanite_palatist at kontursoft.ru Thu Aug 16 23:29:17 2012 From: bryanite_palatist at kontursoft.ru (=?koi8-r?B?7sHMz8fJIM7BIOvJ0NLF?=) Date: Fri, 17 Aug 2012 13:29:17 +0700 Subject: =?koi8-r?B?6+/u5unk5e7j6eHs+O7v8/T4IO7hIOvp8PLl?= Message-ID: <048BAFF0062F4DECAE7D35F0845AE861@1068E7ECA2AA26> 28 августа 2012 г. ОФФШОРНЫЙ БИЗНЕС: КИПР ДО И ПОСЛЕ РАТИФИКАЦИИ ПРОТОКОЛА. ДЕТАЛЬНЫЙ АНАЛИЗ И ПРАКТИКА ИСПОЛЬЗОВАНИЯ. (Налоги на Кипре – не пересекая грань между оптимизаций и уклонением. Схемы с использованием Кипрских компаний) код (495) - 7*42-91\98 или код (495) - 7.Ч2\91-98 Цель: Для участия мы приглашаем как слушателей, уже использующих кипрские компании в своей работе, так и тех, кто только планирует воспользоваться данным инструментом налогового планирования, конфиденциальности и защиты активов. Содержание семинара можно разделить на блоки: * последствия ратификации Протокола к соглашению об избежании двойного налогообложения между РФ и Кипром; * практика использования и сопровождения кипрских компаний; * пути применения Кипра в налоговом планировании; * налогообложение на Кипре (с детальным рассмотрением НДС). По мнению автора, ратификация Протокола не приведет к массовой реструктуризации или отказам от налоговых решений с использованием Кипра, поскольку данный Протокол лишь "перетасовывает" сложившиеся принципы работы. Во многих случаях оптимальным решением будет "косметическая" коррекция договорных отношений и хозяйственных операций, которой будет уделено особое внимание в рамках данного семинара. Тщательного рассмотрения заслуживает налоговое законодательство Кипра и его "пересечение" с российским в налоговых решениях. Например, в уставной капитал кипрских компаний можно вложить не только денежные средства, но и акции российских компаний. Налоговые последствия при этом и методика оценки вклада в натуральной форме вызывают особенно много вопросов слушателей. При использовании кипрских компаний многие сталкиваются с проблемами в виде непредвиденных налоговых обязательств, штрафов и пеней, возникающих из-за незнания тонкостей и особенностей налоговой системы ЕС и Кипра, эволюционирующей столь же стремительно, как и российская. В рамках данного семинара будут рассмотрены детали налоговой системы Кипра, при этом особое внимание будет уделено НДС – наиболее сложному налогу, который регулируется не только местным законодательством, но и многочисленными европейскими директивами. Не менее важны технические вопросы использования кипрских компаний. К сожалению, на практике взаимодействие с администратором, или регистрационным агентом, часто сопряжено с большим количеством трудностей, выливающимся в противостояние владельца компании и неторопливых кипрских юристов. Также многие сталкиваются с непрозрачностью ценообразования на отдельные услуги, особенно на аудит и номинальный сервис. Данный семинар поможет Вам оптимизировать свои отношения с администратором, и определить: за что, кому и когда Вы должны платить при использовании кипрских компаний. Особенностью данного семинара является практическая направленность и отсутствие лишних теоретических и исторических отступлений. Семинар строится в форме интерактивного практического занятия при постоянном взаимодействии с аудиторией с разбором большого количества примеров и подробным описанием налоговых, финансовых и правовых последствий или рисков. Программа: НАЛОГИ НА КИПРЕ – НЕ ПЕРЕСЕКАЯ ГРАНЬ МЕЖДУ ОПТИМИЗАЦИЙ И УКЛОНЕНИЕМ * Налог на прибыль (Corporate Income Tax); предварительный налог на прибыль (Preliminary Tax); налог на оборону (Special Defence Contribution); налог на прирост капитала (Capital Gains Tax) и т.д. * Пути минимизации налоговых отчислений на Кипре: практические примеры и анализ ошибок * Налогообложение операций с ценными бумагами: пределы освобождения * Налоговый календарь на 2012 год: сдача отчетностей, оплата налогов и сборов * Изменения кипрского законодательства 2012 и тенденции 2013 * Ратификация Протокола к Соглашению между РФ и Кипром: кто понесет убытки, а кому удастся на этом заработать? * Как не попасть в "петлю" негативных нововведений Протокола? НДС ПРИ ИСПОЛЬЗОВАНИИ КИПРСКИХ КОМПАНИЙ * Когда нужно получать номер НДС (VAT number) и можно ли это сделать в другой стране ЕС? * Применение механизма “reverse charge” * Анализ основных европейских директив на предмет определения места оказания услуг (“the place of supply”) * Обложение НДС услуг, оказанных через интернет (“electronically supplied services”) * Сложные случаи экспорта-импорта: когда возникает НДС? * Налоговые последствия по НДС при совершении трехсторонних сделок в ЕС (triangular operations) * НДС и роялти, консалтинг, маркетинг – всегда ли можно принять к вычету всю сумму входящего НДС? СХЕМЫ С ИСПОЛЬЗОВАНИЕМ КИПРСКИХ КОМПАНИЙ * Владение недвижимостью с использованием кипрских компаний * Займы: анализ правил тонкой капитализации и прочих ограничений (ст.269 НК РФ), риски и примеры ошибок * Роялти: риски, оптимальная величина размеров выплат, НДС, экономическое и документальное обоснование (“substance”) * Операции с ценными бумагами и векселями * ЗПИФы – применимы ли после ратификации Протокола? * Построение комплексной действующей холдинговой структуры и дивиденды * Схемы коллективных инвестиций и инвестиционные фонды на Кипре РАБОТА С АДМИНИСТРАТОРОМ (АГЕНТОМ) И АУДИТОРОМ КИПРСКОЙ КОМПАНИИ * Наличие представительства администратора в Москве: преимущество или недостаток? * Как не дать администратору и аудитору обмануть Вас? Примеры и рекомендации * За что кипрские администраторы деньги брать не должны? * Переход к другому администратору: "подводные камни" * Принципы ценообразования аудиторских услуг и пути минимизации их стоимости * Вправе ли кипрский аудитор одновременно проверять и вести отечность? * Анализ среднерыночных цен и сроков оказания услуг: оцените своего администратора. РЕАЛЬНЫЙ ОФИС НА КИПРЕ * Сравнение "виртуального" и реального офисов * Случаи, когда реальное присутствие на Кипре необходимо * Инструменты создания видимости контроля компании с территории Кипра * Наем персонала в кипрскую компанию: налоговые и практические вопросы НОМИНАЛЬНЫЙ СЕРВИС И КОНФИДЕНЦИАЛЬНОСТЬ * Документы, регламентирующие возникающие отношения: на что следует обратить внимание? * Раскрытие информации в связи с ратификацией Протокола * Полномочия номинальных директоров и акционеров: где границы и кем они устанавливаются? * Что делать, если номинальный директор отказывается подписывать документы? БАНКОВСКИЕ СЧЕТА * Анализ надежности кипрских банков на фоне ухудшения ситуации в ЕС * Пути снятия средств со счета кипрского банка в России * Раскрытие банковской тайны – факты и выводы * Тарифы популярных кипрский и прибалтийских банков. Использование SEPA. * Выплаты зарплаты путем выпуска карт к счетам в кипрских банках Стоимость участия: 9 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 (499) 445.40_95 <<>> 8 (499) ЧЧ54095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 11580 bytes Desc: not available URL: From fzqoz at leader-hr.ru Thu Aug 16 23:33:07 2012 From: fzqoz at leader-hr.ru (=?koi8-r?B?7sHMz8fP19nKIMvPztPVzNjUwc7U?=) Date: Fri, 17 Aug 2012 13:33:07 +0700 Subject: =?koi8-r?B?8+jl7fkg8yDp8/Dv7Pj67/fh7unl7SDr6fDy8+vp6CDr7+3w4e7p6g==?= Message-ID: <000d01cd7c42$29e63190$6400a8c0@fzqoz> 28 августа 2012 г. ОФФШОРНЫЙ БИЗНЕС: КИПР ДО И ПОСЛЕ РАТИФИКАЦИИ ПРОТОКОЛА. ДЕТАЛЬНЫЙ АНАЛИЗ И ПРАКТИКА ИСПОЛЬЗОВАНИЯ. (Налоги на Кипре √ не пересекая грань между оптимизаций и уклонением. Схемы с использованием Кипрских компаний) +7 (495)- 74291-98 или +7 499 ЧЧ5Ч.095 Цель: Для участия мы приглашаем как слушателей, уже использующих кипрские компании в своей работе, так и тех, кто только планирует воспользоваться данным инструментом налогового планирования, конфиденциальности и защиты активов. Содержание семинара можно разделить на блоки: * последствия ратификации Протокола к соглашению об избежании двойного налогообложения между РФ и Кипром; * практика использования и сопровождения кипрских компаний; * пути применения Кипра в налоговом планировании; * налогообложение на Кипре (с детальным рассмотрением НДС). По мнению автора, ратификация Протокола не приведет к массовой реструктуризации или отказам от налоговых решений с использованием Кипра, поскольку данный Протокол лишь "перетасовывает" сложившиеся принципы работы. Во многих случаях оптимальным решением будет "косметическая" коррекция договорных отношений и хозяйственных операций, которой будет уделено особое внимание в рамках данного семинара. Тщательного рассмотрения заслуживает налоговое законодательство Кипра и его "пересечение" с российским в налоговых решениях. Например, в уставной капитал кипрских компаний можно вложить не только денежные средства, но и акции российских компаний. Налоговые последствия при этом и методика оценки вклада в натуральной форме вызывают особенно много вопросов слушателей. При использовании кипрских компаний многие сталкиваются с проблемами в виде непредвиденных налоговых обязательств, штрафов и пеней, возникающих из-за незнания тонкостей и особенностей налоговой системы ЕС и Кипра, эволюционирующей столь же стремительно, как и российская. В рамках данного семинара будут рассмотрены детали налоговой системы Кипра, при этом особое внимание будет уделено НДС √ наиболее сложному налогу, который регулируется не только местным законодательством, но и многочисленными европейскими директивами. Не менее важны технические вопросы использования кипрских компаний. К сожалению, на практике взаимодействие с администратором, или регистрационным агентом, часто сопряжено с большим количеством трудностей, выливающимся в противостояние владельца компании и неторопливых кипрских юристов. Также многие сталкиваются с непрозрачностью ценообразования на отдельные услуги, особенно на аудит и номинальный сервис. Данный семинар поможет Вам оптимизировать свои отношения с администратором, и определить: за что, кому и когда Вы должны платить при использовании кипрских компаний. Особенностью данного семинара является практическая направленность и отсутствие лишних теоретических и исторических отступлений. Семинар строится в форме интерактивного практического занятия при постоянном взаимодействии с аудиторией с разбором большого количества примеров и подробным описанием налоговых, финансовых и правовых последствий или рисков. Программа: НАЛОГИ НА КИПРЕ √ НЕ ПЕРЕСЕКАЯ ГРАНЬ МЕЖДУ ОПТИМИЗАЦИЙ И УКЛОНЕНИЕМ * Налог на прибыль (Corporate Income Tax); предварительный налог на прибыль (Preliminary Tax); налог на оборону (Special Defence Contribution); налог на прирост капитала (Capital Gains Tax) и т.д. * Пути минимизации налоговых отчислений на Кипре: практические примеры и анализ ошибок * Налогообложение операций с ценными бумагами: пределы освобождения * Налоговый календарь на 2012 год: сдача отчетностей, оплата налогов и сборов * Изменения кипрского законодательства 2012 и тенденции 2013 * Ратификация Протокола к Соглашению между РФ и Кипром: кто понесет убытки, а кому удастся на этом заработать? * Как не попасть в "петлю" негативных нововведений Протокола? НДС ПРИ ИСПОЛЬЗОВАНИИ КИПРСКИХ КОМПАНИЙ * Когда нужно получать номер НДС (VAT number) и можно ли это сделать в другой стране ЕС? * Применение механизма ⌠reverse charge■ * Анализ основных европейских директив на предмет определения места оказания услуг (⌠the place of supply■) * Обложение НДС услуг, оказанных через интернет (⌠electronically supplied services■) * Сложные случаи экспорта-импорта: когда возникает НДС? * Налоговые последствия по НДС при совершении трехсторонних сделок в ЕС (triangular operations) * НДС и роялти, консалтинг, маркетинг √ всегда ли можно принять к вычету всю сумму входящего НДС? СХЕМЫ С ИСПОЛЬЗОВАНИЕМ КИПРСКИХ КОМПАНИЙ * Владение недвижимостью с использованием кипрских компаний * Займы: анализ правил тонкой капитализации и прочих ограничений (ст.269 НК РФ), риски и примеры ошибок * Роялти: риски, оптимальная величина размеров выплат, НДС, экономическое и документальное обоснование (⌠substance■) * Операции с ценными бумагами и векселями * ЗПИФы √ применимы ли после ратификации Протокола? * Построение комплексной действующей холдинговой структуры и дивиденды * Схемы коллективных инвестиций и инвестиционные фонды на Кипре РАБОТА С АДМИНИСТРАТОРОМ (АГЕНТОМ) И АУДИТОРОМ КИПРСКОЙ КОМПАНИИ * Наличие представительства администратора в Москве: преимущество или недостаток? * Как не дать администратору и аудитору обмануть Вас? Примеры и рекомендации * За что кипрские администраторы деньги брать не должны? * Переход к другому администратору: "подводные камни" * Принципы ценообразования аудиторских услуг и пути минимизации их стоимости * Вправе ли кипрский аудитор одновременно проверять и вести отечность? * Анализ среднерыночных цен и сроков оказания услуг: оцените своего администратора. РЕАЛЬНЫЙ ОФИС НА КИПРЕ * Сравнение "виртуального" и реального офисов * Случаи, когда реальное присутствие на Кипре необходимо * Инструменты создания видимости контроля компании с территории Кипра * Наем персонала в кипрскую компанию: налоговые и практические вопросы НОМИНАЛЬНЫЙ СЕРВИС И КОНФИДЕНЦИАЛЬНОСТЬ * Документы, регламентирующие возникающие отношения: на что следует обратить внимание? * Раскрытие информации в связи с ратификацией Протокола * Полномочия номинальных директоров и акционеров: где границы и кем они устанавливаются? * Что делать, если номинальный директор отказывается подписывать документы? БАНКОВСКИЕ СЧЕТА * Анализ надежности кипрских банков на фоне ухудшения ситуации в ЕС * Пути снятия средств со счета кипрского банка в России * Раскрытие банковской тайны √ факты и выводы * Тарифы популярных кипрский и прибалтийских банков. Использование SEPA. * Выплаты зарплаты путем выпуска карт к счетам в кипрских банках Стоимость участия: 9 000 рублей Информацию можно получить по телефонам: +7 (код Москвы) 79221-22 : 8 (499) 4454095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 11606 bytes Desc: not available URL: From bstjohnt at karnegi.ru Fri Aug 17 07:37:07 2012 From: bstjohnt at karnegi.ru (=?koi8-r?B?7s/X2cog2sHLz84gzyDC1cjV3sXUxQ==?=) Date: Fri, 17 Aug 2012 16:37:07 +0200 Subject: =?koi8-r?B?99OjIM7P18/FIM8gwtXI1d6j1MU=?= Message-ID: 28 августа 2012 г. Новый закон "О бухгалтерском учете" (Ч95) 792-2I22 : код (495) - 7\Ч2/9I.98 Цель: Новый закон "О бухгалтерском учете" вступает в силу с 2013 года. Подготовка к применению требований закона займет много времени, поэтому начинать освоение новых норм нужно заранее. Минфин РФ спланировал разработку основных нормативных документов по бухгалтерскому учету и внедрение в России МСФО до 2015 года. Разберемся в новых правилах, которые уже приняты и к тех, принятие которых – дело ближайшего будущего. Программа: 1. Правовой контекст, в котором будет действовать новый закон "О бухгалтерском учете": глобальная реформа бухучета, ее стратегия и направления в ближайшем будущем; рост значения бухгалтерского учета; сближение бухгалтерского и налогового учетов за счет грядущих изменений в НК РФ. 2. Сфера применения закона: * Отмена освобождения от ведения учета плательщиков УСН с 2013 года, постановка учета "упрощенцами", возможности упростить бухучет и сблизить его с налоговым. * Обязательно ли ведение бухучета самозанятыми гражданами (ИП, адвокатами, учредившими адвокатские кабинеты, нотариусами и иными лицами, занимающимися частной практикой) с 2013 года? * Филиалы и представительства иностранных компаний – обязанности по ведению бухучета по российским стандартам в качестве вспомогательного с 2013 года. 3. Объекты бухгалтерского учета: новые доминанты. Обязательный учет всех фактов хозяйственной жизни (в том числе, при недостаточности информации и отсутствии первичных документов): как это сделать практически? Денежное измерение объектов бухгалтерского учета (сравним подход с правилами оценки в налоговом учете). 4. Организация ведения бухучета на предприятии. Бухгалтерская служба или аутсорсинг? Может ли руководитель совмещать должность главбуха по новому закону? Каковы новые требования к главному бухгалтеру или аутсорсеру (образование, стаж работы и т.п.)? Новые критерии повышения квалификации бухгалтеров. 5. Новые грани ответственности главного бухгалтера. Новые риски аутсорсера в связи законом № 402-ФЗ. 6. Закон о бухгалтерском документообороте: * Первичная документация по-новому. Готовимся к вступлению нового закона в силу заранее. Возможен ли отказ от унифицированных форм первичной документации и в какой степени он оправдан на практике? Обязательна ли печать на первичных документах? Возможности использования факсимильной подписи на первичном документе в 2013 году. Возможности внедрения и развития электронного документооборота. * Новые требования к учетным регистрам. * Бухгалтерская отчетность по-новому. Состав отчетности. Требование нового законодательства по адаптации форм отчетности для нужд организации, рекомендации по такой адаптации. Новые адреса и периодичность представления отчетности с 2013 года. Когда согласно новому закону бухгалтерская отчетность считается составленной? Новые правила публикации отчетности с 2013 года. * Правила хранения бухгалтерской документации на основании закона. 7. Требование закона к организации внутреннего контроля совершаемых фактов хозяйственной жизни, а также ведения бухгалтерского учета и составления бухгалтерской (финансовой) отчетности. Как составить процедуры контроля и реализовать их? Стоимость участия: 8 900 рублей Информацию можно получить по телефонам: +7 499 ЧЧ54.О95 <> 8 (495) 792/2I\22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5199 bytes Desc: not available URL: From btmpig4use at cosmetol.ru Fri Aug 17 20:43:48 2012 From: btmpig4use at cosmetol.ru (=?koi8-r?B?5s/S1c0g1yDz7/7pLeLy6fogU1BB?=) Date: Fri, 17 Aug 2012 19:43:48 -0800 Subject: =?koi8-r?B?88/eyTog78LV3sXOycUg0M8gOTQt5vosIObr8ywgMjIzIOb6Lg==?= Message-ID: <000d01cd7ceb$4b837e80$6400a8c0@btmpig4use> 21-24 августа 2012 г. СОЧИ, В ОТЕЛЕ "СОЧИ-БРИЗ SPA" Настоящее и будущее государственных и муниципальных закупок: 94-ФЗ, ФКС (Федеральная контрактная система), 223-ФЗ код (499) - 4Ч5*4О95 \\\/// 8 (495) 7922122 Программа: 21 августа 2012г. √ заезд, рабочая встреча участников семинара с организаторами и лекторами 22 августа 2012г. 10.00-13.00 СРАВНЕНИЕ ОСНОВНЫХ ПОЛОЖЕНИЙ ПРОЕКТА ЗАКОНА "О ФЕДЕРАЛЬНОЙ КОНТРАКТНОЙ СИСТЕМЕ" И 94-ФЗ. * Федеральная контрактная система: основные отличия от действующего порядка организации * Закупок; * Закупки бюджетных учреждений: способы, специфика, ограничения; управление контрактами; * Общественный контроль; * Планирование в ФКС; * Нормирование; * Обоснование НМЦК (начальной (максимальной) цены контракта): обоснованность закупок и установление минимальных требований; * Новые правила выбора способа закупки по ФКС; * Свобода заказчика по выбору способа размещения заказа; * Совместные закупки; * Объем закупок у СМП; * Описание объектов закупки; * Требования к участникам; * Отклонение заявки с демпинговой ценой; * Обеспечение заявок при проведении торгов; * Обеспечение исполнения контракта. 22 августа 2012г. 14.00-16.00 ЗАКОНОДАТЕЛЬСТВО О ЗАКУПКАХ ТОВАРОВ, РАБОТ И УСЛУГ ОТДЕЛЬНЫМИ ВИДАМИ ЮРИДИЧЕСКИХ ЛИЦ В РЕДАКЦИИ 223-ФЗ. ПОШАГОВЫЙ АЛГОРИТМ ДЕЙСТВИЙ ЗАКАЗЧИКА (ОРГАНИЗАТОРА ТОРГОВ): * Составление Плана закупок товаров, работ и услуг. Содержание: обязательные и не обязательные компоненты; * Разработка и утверждение Положения "О закупке". Готовые решения для организаций от ЭТП "ФАБРИКАНТ"; * Информационная прозрачность закупок. Готовые решения для организаторов торгов: "Доска объявлений" и "Регистрация" на сайте www.fabrikant.ru, как способ не нарушить требования 223-ФЗ; * Перечень документов размещаемых на сайтах организаций- заказчиков; * Порядок работы с Официальным сайтом закупок РФ начиная с 01 июля 2012г.; * Порядок получения и использования ЭЦП (электронно-цифровой подписи) - ╧63-ФЗ от 06.04.12. * Проблемные вопросы работы с Официальным сайтом закупок РФ- механизмы защиты интересов заказчиков; * Формирование Извещения о проведении торгов: содержание, выбор видов и форм торгов; * Внесение изменений в Извещение, Положение, закупочную документацию; * Изменения, вносимые в договор, цену, сроки закупочных процедур; ПРИМЕНЕНИЕ ЭЛЕКТРОННЫХ ТОРГОВ ПО 223-ФЗ. ТОВАРЫ, РАБОТЫ И УСЛУГИ, ЗАКУПАЕМЫЕ С ИСПОЛЬЗОВАНИЕМ РЕСУРСОВ ЭЛЕКТРОННЫХ ТОРГОВЫХ СИСТЕМ (ПЛОЩАДОК): * Постановление Правительства РФ от 21 Июня 2012 г. N 616 "Об утверждении перечня товаров, работ и услуг, закупка которых осуществляется в электронной форме". * Перечень товаров, работ и услуг, закупаемых в электронной форме; * Преимущества проведения электронных торгов- технические возможности ЭТП "ФАБРИКАНТ", как удобного инструмента для работы заказчиков и поставщиков; * Корректировка разработанного положения "О закупке". Внедрение торгов в электронной форме в собственные положения "О закупке"; ВИДЫ И ФОРМЫ ЭЛЕКТРОННЫХ ТОРГОВ: ЗАПРОСЫ, АУКЦИОНЫ, КОНКУРСЫ * запросы предложений в форме ПДО покупателя; * запросы котировок цен покупателя; * аукционы покупателя на понижение цены; * конкурсы покупателя; КВАЛИФИКАЦИОННЫЕ И ИНЫЕ ТРЕБОВАНИЯ К УЧАСТНИКАМ ТОРГОВ: * Практические рекомендации для организаторов торгов; * Практические рекомендации для участников торгов; ПРИВЛЕКАТЕЛЬНОСТЬ РЫНКА ТОРГОВ ПО 223-ФЗ ДЛЯ ОРГАНИЗАЦИЙ- ПРОИЗВОДИТЕЛЕЙ, ПОСТАВЩИКОВ ТОВАРОВ, РАБОТ И УСЛУГ, ПОДРЯДЧИКОВ: * Объем рынка торгов РФ по 223-ФЗ, в сравнении с госзаказом и коммерческими (корпоративными) тендерами; * Упрощенная система оповещения о новых тендерах со стороны площадки, оповещение о проведении торгов со стороны заказчика; * Обзор тарифов 23 августа 2012г. 10.00-13.00 СЛОЖНЫЕ ВОПРОСЫ ПРАКТИКИ ПРИМЕНЕНИЯ ЗАКОНОДАТЕЛЬСТВА О ГОСЗАКУПКАХ. ОТВЕТСТВЕННОСТЬ ЗАКАЗЧИКОВ И ПОСТАВЩИКОВ. * Особенности проведения процедур (конкурс): вес критериев оценки заявок (предложений); критерии оценки заявок (предложений); * Особенности проведения процедур (электронный аукцион); * Особенности проведения процедур (запрос котировок); * Особенности закупки у единственного источника; * Комиссии по размещению заказов / по осуществлению закупок; * Контрактная служба заказчика; * Изменение и расторжение контракта; * Информационное обеспечение; * Ответственность в ФКС и 94-ФЗ; * Реестр недобросовестных заказчиков; * Типовые контракты 23 августа 14.00-16.00 ПРАКТИКА УЧЕБНЫХ ТОРГОВ В СООТВЕТСТВИИ С 223-ФЗ НА ЭЛЕКТРОННОЙ ТОРГОВОЙ ПЛОЩАДКЕ "ФАБРИКАНТ". * Заключение договоров по результатам торгов; * Ответы на вопросы слушателей 24 августа 2012г. 10.00-13.00 ПРАКТИЧЕСКИЙ ТРЕНИНГ ПО РАБОТЕ С ОФИЦИАЛЬНЫМ САЙТОМ ЗАКУПОК РФ И УЧЕБНЫМ ЭЛЕКТРОННЫМ АУКЦИОНОМ НА БАЗЕ АККРЕДИТОВАННОЙ ПЛОЩАДКИ ООО "РТС-тендер" * Регистрация на общероссийском сайте РФ о размещении заказов; * Аккредитация участников торгов на площадке; * Формирование извещений, размещение извещения о проведении открытого аукциона в электронной форме; * Поиск информации о торгах на ОС, площадке "РТС-тендер"; * Запросы на разъяснения положений документации; * Порядок отмены электронного аукциона; * Внесение изменений в документацию и извещение; * Формирование заявки на участие в аукционе; * Рассмотрение 1-х частей заявок; * Участие в тестовых торгах, снижение цены контракта; * Формирование протокола проведения электронного аукциона; * Рассмотрение 2-х частей заявок; * Подписание контракта; * Ответы на вопросы слушателей 24 августа 2012г. 14.00-16.00 ПОРЯДОК ДЕЙСТВИЙ КОММЕРЧЕСКИХ ОРГАНИЗАЦИЙ - ПРОИЗВОДИТЕЛЕЙ, ПОСТАВЩИКОВ ТОВАРОВ, РАБОТ И УСЛУГ, ПОДРЯДЧИКОВ, ДЛЯ РАБОТЫ ПО НОРМАМ 223-ФЗ НА ЭТП "ФАБРИКАНТ" * Кто может стать поставщиком (подрядчиком) по нормам 223-ФЗ; * Требования Законодательства РФ, предъявляемые к участникам торгов; * Порядок регистрации в системе электронных торгов; РАБОТА В ЛИЧНОМ КАБИНЕТЕ ПОСТАВЩИКА: * Заполнение Информационной карты; * Формирование заявки на участие в торгах (предложения); * Как выиграть в тендерах. Алгоритм формирования "победных" предложений; ПРАКТИКА УЧЕБНЫХ ТОРГОВ НА ЭЛЕКТРОННОЙ ТОРГОВОЙ ПЛОЩАДКЕ "ФАБРИКАНТ". ДЕЛОВАЯ ИГРА В РЕЖИМЕ РЕАЛЬНОГО ВРЕМЕНИ! * Заключение договоров по результатам торгов; * Ответы на вопросы слушателей; Стоимость участия: 19 900 16 рублей Вся информация по тел: 8 Моск. код: 792.2I22 или +7 495 7Ч2/91\98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 14389 bytes Desc: not available URL: From bt872 at systematika.ru Fri Aug 17 16:25:30 2012 From: bt872 at systematika.ru (=?koi8-r?B?7sHMz8fP18/FINDMwc7J0s/Xwc7JxQ==?=) Date: Fri, 17 Aug 2012 20:25:30 -0300 Subject: =?koi8-r?B?7NXe28nFIMLFzNnFIM7BzM/Hz9fZxSDTyMXN2SDXIDIwMTIgxy4=?= Message-ID: <75B86B7812324565B4AECED5F5E88538@PC06> 29-30 августа Налоговое планирование с учетом изменений законодательства – лучшие белые схемы +7 (495)- 7Ч291*98 ; 8 (495) 792.2I_22 Цель: Ставка обязательных страховых взносов (СВ) с зарплаты с 2012 года составляет 30% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При формальном снижении нагрузки по зарплате многих сотрудников фактически выплаты возрастут: если раньше с больших зарплат СВ не уплачивались, то теперь их ставка составит 10% с суммы дохода свыше 512 тыс. рублей в год. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Есть возможность посещения любого одного дня: программа разбита на два логических блока, каждый из которых занимает один день. Рекомендуется посещение обоих дней. Первый день посвящен поиску путей выживания компаний при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Кроме того, рассматриваются общие для всех налоговых схем условия и принципы применения – такие как наличие деловых целей, отсутствие аффилированности и фиктивных сделок, грамотное оформление. Второй день посвящен изучению основных практических методов оптимизации налога на прибыль и (в той степени, в которой это возможно) НДС в торговых (оптовых и розничных) и производственных предприятиях, предприятиях, оказывающих услуги или выполняющих работы, в т.ч. строительные. Рассматриваются субъекты льготного налогообложения, способы переноса на них налогооблагаемой базы и пути безналогового рефинансирования (возврата) выведенных сумм. Участники получат краткие индивидуальные консультации по тематике курса. Программа: 1 день: Налоговое планирование по страховым взносам и НДФЛ в 2012 г. с учетом изменений законодательства 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. Обзор изменений законодательства по страховым взносам на 2012-13 гг., как они повлияли на налоговые схемы. 2. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность; * дивидендные схемы – замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Способы минимизации рисков имущественной ответственности предпринимателя. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с новым порядком ведения кассовых операций. 3. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и качественное документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 4. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Долгосрочное накопительное страхование жизни работников и ДМС за счет предприятия. 5. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, компенсаций, гонораров и иных легальных доходов от нерезидентов. 6. Как компенсировать снижение социальных гарантий (включая пенсионные накопления) работников при применении налоговых схем, не предусматривающих выплату зарплаты? 7. Использование процентных займов от физлиц. Расчет эффективности. Потребительский кредитный кооператив граждан – способ получения безналогового дохода в виде процентов. 8. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 9. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды. 10. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 2 день: Оптимизация налога на прибыль. Затратные механизмы в налоговых схемах 1. Методы планирования налога на прибыль и НДС. Принципиальная невозможность экономии НДС "белыми" схемами и случаи, когда это все же возможно. 2. Низконалоговые субъекты: * субъекты специальных налоговых режимов – ЕНВД и УСН, в т.ч. патентная система, субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * оффшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, 3. Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 4. Способы переноса налогооблагаемой базы по налогу на прибыль на низконалоговых субъектов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. лицензионные и франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. * механизм трансфертных цен. Новое антитрансфертное законодательство, способы ухода от контроля за сделками, грамотное обоснование трансфертных цен, 5. Займы как способ возвратного рефинансирования – преимущества и недостатки, риск ведения незаконной банковской деятельности. Безналоговое рефинансирование (возврат) и капитализация выведенной прибыли предприятия (холдинга) через уставный капитал, безвозмездную передачу имущества, увеличение чистых активов, ст. 27 Закона "Об ООО". 6. Простое товарищество субъектов упрощенной системы налогообложения, в т.ч. из "низконалоговых" регионов. Уплата НДС. Перенос прибыли товарищества на низконалоговых субъектов (УСН 6%, ЕНВД, оффшор и др.). Отсрочка уплаты налога при непередаче прибыли на счета товарищей. Возможен ли обход с помощью простого товарищества правил налогового учета (гл. 25 НК) и ограничений гл. 26.2 НК РФ в части перечня затрат? 7. Экономия НДС в торговле, производстве, выполнении работ, оказании услуг через разделение финансово-товарных потоков "с НДС" и "без НДС". Ограничение использования: покупатели/заказчики, не нуждающиеся в вычете НДС, как их выявить, или создать искусственно. Риски и рекомендации по использованию схемы. 8. Иностранные низконалоговые компании, цели применения. Их использование при проведении внутрироссийских операций для оптимизации налога на прибыль: традиционные (торговля, проценты, дивиденды, роялти, услуги и т.п.) и нетрадиционные схемы (простое товарищество, агентские). Выбор низконалоговых юрисдикций. 9. Обзор изменений налогового законодательства, как они повлияют на налоговые схемы. Ответы на вопросы. По желанию и по возможности – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц курса. Стоимость участия:1 день 9 000 руб. Стоимость участия:2 дня 16 000 руб. Вся информация по тел: +7 Московский код: 742/9I98 <<>> +7 499 - 4Ч5_40/95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12432 bytes Desc: not available URL: From britt.johansson at vll.ca Fri Aug 17 10:46:18 2012 From: britt.johansson at vll.ca (=?koi8-r?B?IuvV0tMgIuvh5PLv9+/lIOTl7O8iIg==?=) Date: Fri, 17 Aug 2012 23:16:18 +0530 Subject: =?koi8-r?B?6drNxc7FzsnRINcg9NLVxM/Xz80g+sHLz87PxMHUxczY09TXxQ==?= Message-ID: <01cd7cce$4e288d00$b6a0a0ca@britt.johansson> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 316 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 62971 bytes Desc: not available URL: From briancady413 at yahoo.com Sat Aug 18 01:12:37 2012 From: briancady413 at yahoo.com (briancady413) Date: Sat, 18 Aug 2012 01:12:37 -0700 (PDT) Subject: [HacDC:Byzantium] Wi-fi range extension with phased pherical array antennae? Message-ID: Perhaps wi-fi range could be extended without increased power with spherical phased arrays of antennae, which can be used to directionally amplify sent and received signals. Maybe a physics or engineering student could put into the public domain hardware designs to control signal directionality of such an icosahedral array, and open source software could be devised to discover other signal's direction, and transpond 'in' that right direction with that signal's transponder. Here's some related papers: http://www.jpier.org/PIER/pier.php?paper=06081101 http://www.ursi.org/Proceedings/ProcGA02/papers/p1274.pdf Brian -- You received this message because you are subscribed to the Google Groups "Project Byzantium (Emergency Mesh Networking)" group. To view this discussion on the web visit https://groups.google.com/a/hacdc.org/d/msg/Byzantium/-/Vnlm6e2pXG0J. To post to this group, send email to Byzantium at hacdc.org. To unsubscribe from this group, send email to Byzantium+unsubscribe at hacdc.org. For more options, visit this group at http://groups.google.com/a/hacdc.org/group/Byzantium/?hl=en. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From andrew at pdqvpn.com Sat Aug 18 01:16:56 2012 From: andrew at pdqvpn.com (Andrew Lewis) Date: Sat, 18 Aug 2012 04:16:56 -0400 Subject: [HacDC:Byzantium] Pie-in-the-sky potential... Message-ID: FWIW some people that hang around Telecomix might also be interested in collaboration on stuff outside of just regular Byzantium. I also know that there are some people doing space stuff that we can reach out to, via the DARPA funding for hackerspaces and Space. I think that Byzantium is a very cool subproject that loops into a whole slew of mesh networking projects that can build an ecosystem of communication gear that can be put together in a hurry. I think that the community might be reaching critical mass where we start to integrate all this stuff. As an aside, it blew my mind that for $20k you could build a blue force/situational awareness system for a 20 kilometer radius using mesh networking. Byzantium should really look at integrating serval-maps project, as it can do some really cool stuff with mapping. Andrew On Aug 18, 2012, at 3:00 AM, haxwithaxe wrote: > replies below > > On 08/18/2012 12:51 AM, Crate8 wrote: >> Greetings all, >> >> As a security and defence scholar, with an interest in technology and >> emergency management, I'm glad I've stumbled across this project.(thank >> you Reddit and Ars Technica, I think). I've been searching for an >> adaptable mesh networking application for quite some time and haven't >> found anything robust and cost-effective (read: cheap/free) until now. >> Happy to see something like this being pushed out. > thanks we're glad to be pushing it :P > >> Tossing the idea around in my noodle brought up an idea of loading this >> kind of software onto a constellation of tiny cubesats >> (http://en.wikipedia.org/wiki/CubeSat) in orbit, offering potentially >> global coverage. While I recognize that this is not the specific aim of >> the Byzantium Project, I can't help but think that with ground-based >> high-gain Wi-Fi antennas pointed to the sky, such a system would be >> wonderful. Not to mention access in the event of disaster in seriously >> remote areas. > i like the idea }:P > i was gonna put something here about power required to get to space but > then i read this :P > http://www.engadget.com/2007/06/19/venezuelans-set-new-wifi-distance-record-237-miles/ > > i'm not familiar enough to know whether tracking would be an issue but > that might be something to consider since getting geosyncronous orbit > for cubesats is pricey (compared to polar orbit). > >> I'll give a look-see into the project documentation, etc. I'm >> particularly interested to see how handing off is accomplished when a >> mobile user moves out of the range of one node and into another... > for the different protocols we use they might be different but the one > we use by default is babeld and i think it just waits for it to not > respond to the mesh protocol traffic and then drops it from the routing > table. > >> Any side-threads dedicated to long-term potential of this distro? I'm >> not much of a coder (mostly hobbyist Java stuff :P) but I'm creative and >> determined and would love to lend any hand I can to improving this project. > testing (including light security audits) are very useful at this point, > as are translations and documentation writing/editing. > > haxwithaxe > -- You received this message because you are subscribed to the Google Groups "Project Byzantium (Emergency Mesh Networking)" group. To post to this group, send email to Byzantium at hacdc.org. To unsubscribe from this group, send email to Byzantium+unsubscribe at hacdc.org. For more options, visit this group at http://groups.google.com/a/hacdc.org/group/Byzantium/?hl=en. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bettyanngoss at sunmarkbank.com Fri Aug 17 14:03:46 2012 From: bettyanngoss at sunmarkbank.com (=?koi8-r?B?Iu/C1d7FzsnFICL08vXk7/fv6iDr7+Tl6/MgMjAxMiIi?=) Date: Sat, 18 Aug 2012 06:03:46 +0900 Subject: =?koi8-r?B?6drNxc7FzsnRINcg9NLVxM/Xz80g+sHLz87PxMHUxczY09TXxQ==?= Message-ID: <01cd7d07$3a4d4d00$9b772076@bettyanngoss> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 315 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 62971 bytes Desc: not available URL: From blhina1 at skypool.ru Sat Aug 18 09:44:40 2012 From: blhina1 at skypool.ru (=?koi8-r?B?88/L0sHdxc7JxSDT1NLByM/X2cgg19rOz9PP1w==?=) Date: Sat, 18 Aug 2012 08:44:40 -0800 Subject: =?koi8-r?B?9c3FztjbwcXNINLB08jPxNkgzsEg2sHS0MzB1NU=?= Message-ID: 29 августа 2012г. Уменьшаем расходы на выплату белой зарплаты +7 499 - 445_40/95 **** +7 499 ЧЧ5Ч*095 Цель: Ставка обязательных страховых взносов (СВ) с 2012 года составляет 30% почти для всех плательщиков. При формальном снижении нагрузки на зарплату для многих сотрудников фактически выплаты возрастут: если раньше с больших зарплат СВ не уплачивались, то теперь их ставка составит 10% с суммы дохода свыше 512 тыс. рублей в год. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – возврат к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. Обзор изменений законодательства по страховым взносам на 2012-13 гг., как они повлияли на налоговые схемы. 2. Использование специальных налоговых режимов: * В каком случае выплата зарплаты на спецрежимах сохраняет актуальность. * Дивидендные схемы – замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности. * Договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Способы минимизации рисков имущественной ответственности предпринимателя. Расчет эффективности. * Дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с новым порядком ведения кассовых операций. 3. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и качественное документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 4. Использование вспомогательных организаций: * "Инвалидные" организации и их филиалы, актуальность. * Страховые компании. Долгосрочное накопительное страхование жизни работников и ДМС за счет предприятия. 5. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, компенсаций, гонораров и иных легальных доходов от нерезидентов. 6. Как компенсировать снижение социальных гарантий (включая пенсионные накопления) работников при применении налоговых схем, не предусматривающих выплату зарплаты? 7. Использование процентных займов от физлиц. Расчет эффективности. Потребительский кредитный кооператив граждан – способ получения безналогового дохода в виде процентов. 8. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 9. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды. 10. Создание недоимки по налогам с ФОТ на фирме, не обремененной активами – пример "серой" схемы (как нельзя "оптимизировать"!). 11. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 12. Ответы на вопросы. По желанию – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц мероприятия. Стоимость участия: 9 000 рублей Информацию можно получить по телефонам: +7 (код Москвы) 7Ч2-91\98 и +7 499 - 4Ч5\40*95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6558 bytes Desc: not available URL: From miail at 3s.spb.ru Sat Aug 18 01:01:47 2012 From: miail at 3s.spb.ru (=?koi8-r?B?79LHwc7ZIMvPztTSz8zR?=) Date: Sat, 18 Aug 2012 15:01:47 +0700 Subject: =?koi8-r?B?9NLBztPGxdLUztnFIMPFztkuIPfax8zRxCDLz87U0s/MydLVwN3JyCDP?= =?koi8-r?B?0sfBzs/X?= Message-ID: <000d01cd7d17$b7261ae0$6400a8c0@miail> 27 августа 2012г. Трансфертное ценообразование: новый порядок контроля с 2012 г. "Ликбез " для налогоплательщика и "как жить дальше ". Способы ухода от контроля за сделками 8 Моск. код: 7922I\22 или +7 499 - 445*ЧО.95 Цель: С 1 января 2012 года НК РФ дополнен новым разделом V.1, посвященным контролю цен сделок. Семинар посвящен подробному рассмотрению произошедших в этой сфере изменений и практическим рекомендациям налогоплательщикам по адаптации к ним (подготовка защитной документации, избежание взаимозависимости и контроля сделок, снижение риска претензий). Рассматриваются новые обязанности, права и ответственность налогоплательщиков, новый вид проверок √ "проверка полноты исчисления и уплаты налогов в связи с совершением сделок между взаимозависимыми лицами", способы обоснования трансфертных цен в различных сделках. Вместе с тем, рассматриваются и законные способы ухода от обременительного контроля за ценами сделок по новому законодательству, его пробелы и противоречия, перспективы новых поправок в НК РФ. Программа: 1. Контролируемые сделки, что изменилось: * сделки между взаимозависимыми лицами; * сделки в области внешней торговли биржевыми товарами; * сделки с офшорами; 2. Когда сделки не признаются контролируемыми и как избежать контроля. Методика расчета минимальной суммы для признания внутрироссийских сделок контролируемыми. 3. Взаимозависимые лица, новый перечень оснований взаимозависимости, ее косвенные признаки. Установление взаимозависимости "по иным основаниям" в рамках судебного разбирательства. Способы ухода от взаимозависимости. Использование номинальных учредителей и директоров компаний, ИП Кто может быть номиналом? Номиналы-нерезиденты: юридические и физические лица. Траст: номиналы по закону, а не "по понятиям". Как защититься от номинала: юридические и экономические способы. Простое товарищество с физлицом-номиналом? 4. Новые обязанности и права налогоплательщиков, совершающих контролируемые сделки: * определение перечня контролируемых сделок, форма и сроки подачи; * подача документации по трансфертным ценам; * добровольные корректировки цен. 5. Новый вид налоговых проверок √ "проверка полноты исчисления и уплаты налогов в связи с совершением сделок между взаимозависимыми лицами". Случаи освобождения от ответственности. 6.Методы определения соответствия цен сделки рыночным: * сопоставимые рыночные цены √ где их найти. Расчет интервала рыночных цен; * сопоставимые сделки √ как доказать сопоставимость. Методика корректировки; * открытые источники информации √ что это; * анализа уровня рентабельности √ как найти сопоставимые компании. Расчет интервала рентабельности; * метод распределения прибыли √ реально ли применение на практике?; 6. Международная практика применения методов ценообразования (ОЭСР, США). 7. Способы защиты прав и интересов налогоплательщика: * соглашение о ценообразовании: порядок определения цен и порядок применения методов ценообразования в контролируемых сделках. Насколько это реально?; * симметричные корректировки: потенциальные проблемы в применении; * консолидированная группа налогоплательщиков: далекое будущее? 8. Что конкретно должно быть сделано сейчас для успешной адаптации к новым правилам: * анализ соответствия применяемых цен и существующей методики ценообразования требованиям НК; * что изменить в договорах; * разработка типовой документации для обоснования цен. 9. Примеры подходов к исследованию трансфертных цен по разным видам деятельности. 10.Ответы на вопросы. Стоимость участия: 9 000 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 495 742.9I/98 \\\/// код (499) - Ч45\ЧО95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6628 bytes Desc: not available URL: From brittoo at canes.ru Sat Aug 18 09:33:47 2012 From: brittoo at canes.ru (=?koi8-r?B?88jFzdkgxMzRINrB0tDMwdTZ?=) Date: Sat, 18 Aug 2012 18:33:47 +0200 Subject: =?koi8-r?B?z9DUyc3J2sHDyckg0sHTyM/Ez9cgzsEg19nQzMHU1SDCxczPyiDawdLQ?= =?koi8-r?B?zMHU2Q==?= Message-ID: 29 августа 2012г. Оптимизируем расходы на выплату белой зарплаты (495) 742.9I.98 <<>> 8 (499) ЧЧ5_4О/95 Цель: Ставка обязательных страховых взносов (СВ) с 2012 года составляет 30% почти для всех плательщиков. При формальном снижении нагрузки на зарплату для многих сотрудников фактически выплаты возрастут: если раньше с больших зарплат СВ не уплачивались, то теперь их ставка составит 10% с суммы дохода свыше 512 тыс. рублей в год. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – возврат к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. Обзор изменений законодательства по страховым взносам на 2012-13 гг., как они повлияли на налоговые схемы. 2. Использование специальных налоговых режимов: * В каком случае выплата зарплаты на спецрежимах сохраняет актуальность. * Дивидендные схемы – замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности. * Договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Способы минимизации рисков имущественной ответственности предпринимателя. Расчет эффективности. * Дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с новым порядком ведения кассовых операций. 3. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и качественное документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 4. Использование вспомогательных организаций: * "Инвалидные" организации и их филиалы, актуальность. * Страховые компании. Долгосрочное накопительное страхование жизни работников и ДМС за счет предприятия. 5. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, компенсаций, гонораров и иных легальных доходов от нерезидентов. 6. Как компенсировать снижение социальных гарантий (включая пенсионные накопления) работников при применении налоговых схем, не предусматривающих выплату зарплаты? 7. Использование процентных займов от физлиц. Расчет эффективности. Потребительский кредитный кооператив граждан – способ получения безналогового дохода в виде процентов. 8. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 9. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды. 10. Создание недоимки по налогам с ФОТ на фирме, не обремененной активами – пример "серой" схемы (как нельзя "оптимизировать"!). 11. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 12. Ответы на вопросы. По желанию – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц мероприятия. Стоимость участия: 9 000 рублей Информацию можно получить по телефонам: код (495) - 7-Ч2_91.98 <<>> код (495) - 7/Ч2*91.98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6486 bytes Desc: not available URL: From coderman at gmail.com Sat Aug 18 19:36:56 2012 From: coderman at gmail.com (coderman) Date: Sat, 18 Aug 2012 19:36:56 -0700 Subject: [briar-devel] Foo security In-Reply-To: <502C2A25.3020903@littledystopia.net> References: <502BDE6E.2090902@briarproject.org> <502C2A25.3020903@littledystopia.net> Message-ID: On Wed, Aug 15, 2012 at 4:00 PM, b. brewer wrote: > ... > Recently I've been thinking about an idea I'll call foo security, > since I haven't thought of a better name. It's possible that someone > else has already thought of this idea, but if so, I don't know what > they called it. > > Foo security is an attempt to rethink information security from a > usability perspective. It's defined as follows: > > A system is foo secure with respect to a user if the system's > security properties match or exceed the user's beliefs about those > properties. this is also known as hypothesis #3. [0] anything more is a usability liability ;) 0. "Hypothesis #3 -- There is only one Mode, and it is Secure." http://iang.org/ssl/h3_there_is_only_one_mode_and_it_is_secure.html From kleinesk-qz at jenniferlopezfan.com Sat Aug 18 07:20:20 2012 From: kleinesk-qz at jenniferlopezfan.com (=?koi8-r?B?7NXe28nFIMLFzNnFINPIxc3Z?=) Date: Sat, 18 Aug 2012 21:20:20 +0700 Subject: =?koi8-r?B?7NXe28nFIMLFzNnFINPIxc3ZIO7BzM/Hz9fPxSDQzMHOydLP18HOycUg?= =?koi8-r?B?1yAyMDEyIMcu?= Message-ID: <000d01cd7d4c$98efeee0$6400a8c0@kleinesk-qz> 29-30 августа Налоговое планирование с учетом изменений законодательства √ лучшие белые схемы 8 (499) 445Ч095 <<>> код (495) - 7*42-9I-98 Цель: Ставка обязательных страховых взносов (СВ) с зарплаты с 2012 года составляет 30% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При формальном снижении нагрузки по зарплате многих сотрудников фактически выплаты возрастут: если раньше с больших зарплат СВ не уплачивались, то теперь их ставка составит 10% с суммы дохода свыше 512 тыс. рублей в год. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь √ назад, к "черным" схемам. Есть возможность посещения любого одного дня: программа разбита на два логических блока, каждый из которых занимает один день. Рекомендуется посещение обоих дней. Первый день посвящен поиску путей выживания компаний при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Кроме того, рассматриваются общие для всех налоговых схем условия и принципы применения √ такие как наличие деловых целей, отсутствие аффилированности и фиктивных сделок, грамотное оформление. Второй день посвящен изучению основных практических методов оптимизации налога на прибыль и (в той степени, в которой это возможно) НДС в торговых (оптовых и розничных) и производственных предприятиях, предприятиях, оказывающих услуги или выполняющих работы, в т.ч. строительные. Рассматриваются субъекты льготного налогообложения, способы переноса на них налогооблагаемой базы и пути безналогового рефинансирования (возврата) выведенных сумм. Участники получат краткие индивидуальные консультации по тематике курса. Программа: 1 день: Налоговое планирование по страховым взносам и НДФЛ в 2012 г. с учетом изменений законодательства 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. Обзор изменений законодательства по страховым взносам на 2012-13 гг., как они повлияли на налоговые схемы. 2. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность; * дивидендные схемы √ замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Способы минимизации рисков имущественной ответственности предпринимателя. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с новым порядком ведения кассовых операций. 3. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и качественное документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 4. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Долгосрочное накопительное страхование жизни работников и ДМС за счет предприятия. 5. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, компенсаций, гонораров и иных легальных доходов от нерезидентов. 6. Как компенсировать снижение социальных гарантий (включая пенсионные накопления) работников при применении налоговых схем, не предусматривающих выплату зарплаты? 7. Использование процентных займов от физлиц. Расчет эффективности. Потребительский кредитный кооператив граждан √ способ получения безналогового дохода в виде процентов. 8. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 9. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды. 10. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 2 день: Оптимизации налога на прибыль и НДС, практика оптимальных решений: как снизить расходы и увеличить прибыль 1. Методы планирования налога на прибыль и НДС. Принципиальная невозможность экономии НДС "белыми" схемами и случаи, когда это все же возможно. 2. Низконалоговые субъекты: * субъекты специальных налоговых режимов √ ЕНВД и УСН, в т.ч. патентная система, субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * оффшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, 3. Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 4. Способы переноса налогооблагаемой базы по налогу на прибыль на низконалоговых субъектов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. лицензионные и франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. * механизм трансфертных цен. Новое антитрансфертное законодательство, способы ухода от контроля за сделками, грамотное обоснование трансфертных цен, 5. Займы как способ возвратного рефинансирования √ преимущества и недостатки, риск ведения незаконной банковской деятельности. Безналоговое рефинансирование (возврат) и капитализация выведенной прибыли предприятия (холдинга) через уставный капитал, безвозмездную передачу имущества, увеличение чистых активов, ст. 27 Закона "Об ООО". 6. Простое товарищество субъектов упрощенной системы налогообложения, в т.ч. из "низконалоговых" регионов. Уплата НДС. Перенос прибыли товарищества на низконалоговых субъектов (УСН 6%, ЕНВД, оффшор и др.). Отсрочка уплаты налога при непередаче прибыли на счета товарищей. Возможен ли обход с помощью простого товарищества правил налогового учета (гл. 25 НК) и ограничений гл. 26.2 НК РФ в части перечня затрат? 7. Экономия НДС в торговле, производстве, выполнении работ, оказании услуг через разделение финансово-товарных потоков "с НДС" и "без НДС". Ограничение использования: покупатели/заказчики, не нуждающиеся в вычете НДС, как их выявить, или создать искусственно. Риски и рекомендации по использованию схемы. 8. Иностранные низконалоговые компании, цели применения. Их использование при проведении внутрироссийских операций для оптимизации налога на прибыль: традиционные (торговля, проценты, дивиденды, роялти, услуги и т.п.) и нетрадиционные схемы (простое товарищество, агентские). Выбор низконалоговых юрисдикций. 9. Обзор изменений налогового законодательства, как они повлияют на налоговые схемы. Ответы на вопросы. По желанию и по возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц курса. Стоимость участия:1 день 9 000 руб. Стоимость участия:2 дня 16 000 руб. По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 Моск. код: 792.21/2.2 и +7 (495) 7922I/22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12415 bytes Desc: not available URL: From eugen at leitl.org Sat Aug 18 12:48:19 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 18 Aug 2012 21:48:19 +0200 Subject: [HacDC:Byzantium] Wi-fi range extension with phased pherical array antennae? Message-ID: <20120818194819.GF12615@leitl.org> ----- Forwarded message from briancady413 ----- From eugen at leitl.org Sat Aug 18 12:49:04 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 18 Aug 2012 21:49:04 +0200 Subject: [HacDC:Byzantium] Pie-in-the-sky potential... Message-ID: <20120818194904.GG12615@leitl.org> ----- Forwarded message from Andrew Lewis ----- From aysh at kolobokit.ru Sat Aug 18 21:11:35 2012 From: aysh at kolobokit.ru (=?koi8-r?B?9dDSwdfMxc7JxSDLz8zMxcvUydfPzSDC1cjHwczUxdLJyQ==?=) Date: Sun, 19 Aug 2012 05:11:35 +0100 Subject: =?koi8-r?B?58zB187ZyiDC1cjHwczUxdI6INXQ0sHXzMXO3sXTy8nFIM7B19nLyQ==?= Message-ID: <000d01cd7dc0$b8d67e30$6400a8c0@aysh> 22 августа 2012 г. Управленческие навыки главного бухгалтера. Позиционирование в компании, приемы управления коллективом бухгалтерии +7 499 - 4Ч5\Ч0/95 <<>> код (495) - 7/Ч2/91.98 Цель: Главный бухгалтер √ одна из ключевых фигур в компании. Работа Главбуха требует обширных знаний в области бухгалтерского учета и налогообложения, практических навыков и постоянного повышения квалификации. Вместе с тем, для большинства Главных Бухгалтеров требуются компетенции в сфере управления непосредственными подчиненными (сотрудниками бухгалтерии), позиционирования себя как руководителя в составе высшего менеджмента организации, налаживания продуктивных взаимоотношений с руководителями подразделений фирмы. Нередко главный бухгалтер испытывает дефицит перечисленных управленческих навыков. Семинар позволит восполнить его. Программа: 1. Позиционирование Главного Бухгалтера как руководителя высшего звена. * Организация взаимодействия Главного бухгалтера с Руководителем предприятия. * Главный бухгалтер: функционер или топ-менеджер? 2. Технологии и методики управления людьми в организации. * Власть в организации: источники, каналы, инструменты. * Конфликты в организации: откуда они возникают и как урегулировать. 3. Индивидуальные стили менеджеров, сотрудников организации и реакция на изменения. * Как различать стили менеджеров. * Проблемы и решения во взаимодействии представителей разных стилей. 4. Манипуляции и менеджерские игры: как противостоять манипуляторам. 5. Управление коллективом бухгалтерии. * Ваши помощники и "сложные" сотрудники: технология "карты расстановки сил". * Чего хотят ваши подчиненные? Как выстроить в бухгалтерии систему материального и морального вознаграждения. * Делегирование задач и полномочий своим заместителям, сотрудникам бухгалтерии. * Обучение и развитие сотрудников бухгалтерии. Как определить потребности в обучении. Методика обучения взрослых людей на рабочем месте. * Удержание сотрудников бухгалтерии: как не стать "учебным центром бухгалтеров" для других компаний. Стоимость участия: 8 900 рублей Вся информация по тел: код (495) - 7\Ч2.91_98 : код (499) - Ч45-4095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4473 bytes Desc: not available URL: From mk at dee.su Mon Aug 20 00:33:29 2012 From: mk at dee.su (Maxim Kammerer) Date: Mon, 20 Aug 2012 10:33:29 +0300 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: Hello gentlemen, Here and there I see references to bglobalb or bstate-levelb powerful adversaries when it comes to end-to-end traffic correlation b i.e., it's supposed to be very hard. Because Tor network has many nodes, there are guard nodes, there is research, blog posts, CIA funding (well, not anymore, but similar funding from EU is in the works), useless bureaucracy, college kids playing in serious development, yada yada b you know the drill. Anyway, let's do some math. Below, you will find a table where left column denotes the number of Guard+Exit+Fast+Stable Tor relays one needs to sniff at Class-C level, and right column denotes the probability that a given circuit will go through both intercepted entry and exit nodes. This is slightly imprecise, because same node can't be both entry and exit for a circuit, and there are other ignored intricacies (e.g., port policies) that push the estimates in the other direction b the reason is that I am better with writing quick scripts [1] than with Excel. The consensus taken for analysis is from a few hours ago, and I read Tor server code from current stable version in Gentoo (0.2.2.35) b this probably doesn't matter. 10 11.50% 11 14.56% 12 16.52% 13 16.80% 14 17.69% 15 17.98% 16 18.90% 17 19.20% 18 19.50% 19 20.46% 20 20.46% 21 21.76% 22 22.77% 23 23.43% 24 23.43% 25 24.48% 26 24.48% 27 24.82% 28 25.55% 29 25.90% 30 25.90% As you can see, sniffing just 25 Class-C networks (or 42 individual nodes) lets an adversary correlate ~25% of (non-.onion) circuits. Which networks are these? DE 31.172.30.[1-4] GB 146.185.23.179 NL 77.247.181.{162,164} RO 109.163.233.{200,201,205} CA 198.96.155.3 US 199.48.147.{35,36,37,38,39,40,41} DE 212.84.206.250 FR 178.32.211.{130,140} US 204.8.156.142 US 173.254.216.[66-69] SE 78.108.63.44 US 96.44.189.102 GB 178.33.169.35 CZ 212.79.110.28 US 66.180.193.219 DE 88.198.100.{230,233} LU 212.117.180.65 SE 81.170.186.175 CH 62.220.135.129 SE 84.55.117.251 DE 85.31.187.132 CA 8.18.172.156 FR 213.251.185.74 US 69.42.212.2 FR 37.59.82.50 All of these servers are in US/CA or EU jurisdiction, so even an unsophisticated LE operation can issue ~20 wiretapping orders at ISP level (many of these networks are operated by same hosting providers), and immediately deanonymize ~25% of Tor traffic. So far for anonymity! Oh, and if you are just into looking what sites Tor users visit, the situation is even better b intercepting the same 25 Class-C networks will let you see 72% of the traffic. Picking better non-Guard Exits will improve this figure to 78%. That's right b 4/5th of Tor traffic exits through just 25 LANs. [1] http://pastebin.com/hgtXMSyx -- Maxim Kammerer LibertC) Linux: http://dee.su/liberte _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From noonslists at gmail.com Sun Aug 19 17:41:48 2012 From: noonslists at gmail.com (Noon Silk) Date: Mon, 20 Aug 2012 10:41:48 +1000 Subject: [FoRK] On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces Message-ID: Awesome. " Brain computer interfaces (BCI) are becoming increasingly popular in the gaming and entertainment industries. Consumer-grade BCI devices are available for a few hundred dollars and are used in a variety of applications, such as video games, hands-free keyboards, or as an assistant in relaxation training. There are application stores similar to the ones used for smart phones, where application developers have access to an API to collect data from the BCI devices. The security risks involved in using consumer-grade BCI devices have never been studied and the impact of malicious software with access to the device is unexplored. We take a first step in studying the security implications of such devices and demonstrate that this upcoming technology could be turned against users to reveal their private and secret information. We use inexpensive electroencephalography (EEG) based BCI devices to test the feasibility of simple, yet effective, attacks. The captured EEG signal could reveal the userbs private informa- tion about, e.g., bank cards, PIN numbers, area of living, the knowledge of the known persons. This is the first attempt to study the security implications of consumer-grade BCI devices. We show that the entropy of the private information is decreased on the average by approximately 15 % - 40 % compared to random guessing attacks. " More: https://www.usenix.org/conference/usenixsecurity12/feasibility-side-channel-attacks-brain-computer-interfaces -- Noon Silk Fancy a quantum lunch? https://sites.google.com/site/quantumlunch/ "Every morning when I wake up, I experience an exquisite joy b the joy of being this signature." _______________________________________________ FoRK mailing list http://xent.com/mailman/listinfo/fork ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Aug 20 03:20:34 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 20 Aug 2012 12:20:34 +0200 Subject: [FoRK] On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces Message-ID: <20120820102034.GY12615@leitl.org> ----- Forwarded message from Noon Silk ----- From fakefake at tormail.org Mon Aug 20 05:49:16 2012 From: fakefake at tormail.org (fakefake at tormail.org) Date: Mon, 20 Aug 2012 12:49:16 -0000 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: Good pointing at this. Gets much too less attention. You need much less wiretapping orders. Just one. Wiretap the internet exchange point and get any Tor user. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf AS-awareness in Tor path selection http://www.cs.rpi.edu/~edmanm2/ccs159-edman.pdf LASTor: A Low-Latency AS-Aware Tor Client http://www.cs.ucr.edu/~harsha/papers/oakland12.pdf _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From fwind_cmd at garmap.ru Mon Aug 20 15:01:50 2012 From: fwind_cmd at garmap.ru (=?koi8-r?B?9dDSwdfMxc7JxSDLz8zMxcvUydfPzSDC1cjHwczUxdLJyQ==?=) Date: Mon, 20 Aug 2012 19:01:50 -0300 Subject: =?koi8-r?B?58zB187ZyiDC1cjHwczUxdI6INXQ0sHXzMXO3sXTy8nFIM7B19nLyQ==?= Message-ID: <42A67E476F0A41C68CDF98C99CA0DA55@Dudinha> 22 августа 2012 г. Управленческие навыки главного бухгалтера. Позиционирование в компании, приемы управления коллективом бухгалтерии +7 499 - 445*ЧО-95 ; код (499) - 445.4095 Цель: Главный бухгалтер – одна из ключевых фигур в компании. Работа Главбуха требует обширных знаний в области бухгалтерского учета и налогообложения, практических навыков и постоянного повышения квалификации. Вместе с тем, для большинства Главных Бухгалтеров требуются компетенции в сфере управления непосредственными подчиненными (сотрудниками бухгалтерии), позиционирования себя как руководителя в составе высшего менеджмента организации, налаживания продуктивных взаимоотношений с руководителями подразделений фирмы. Нередко главный бухгалтер испытывает дефицит перечисленных управленческих навыков. Семинар позволит восполнить его. Программа: 1. Позиционирование Главного Бухгалтера как руководителя высшего звена. * Организация взаимодействия Главного бухгалтера с Руководителем предприятия. * Главный бухгалтер: функционер или топ-менеджер? 2. Технологии и методики управления людьми в организации. * Власть в организации: источники, каналы, инструменты. * Конфликты в организации: откуда они возникают и как урегулировать. 3. Индивидуальные стили менеджеров, сотрудников организации и реакция на изменения. * Как различать стили менеджеров. * Проблемы и решения во взаимодействии представителей разных стилей. 4. Манипуляции и менеджерские игры: как противостоять манипуляторам. 5. Управление коллективом бухгалтерии. * Ваши помощники и "сложные" сотрудники: технология "карты расстановки сил". * Чего хотят ваши подчиненные? Как выстроить в бухгалтерии систему материального и морального вознаграждения. * Делегирование задач и полномочий своим заместителям, сотрудникам бухгалтерии. * Обучение и развитие сотрудников бухгалтерии. Как определить потребности в обучении. Методика обучения взрослых людей на рабочем месте. * Удержание сотрудников бухгалтерии: как не стать "учебным центром бухгалтеров" для других компаний. Стоимость участия: 8 900 рублей Информацию можно получить по телефонам: 8 Моск. код: 792-2I22 \\\/// +7 (код Москвы) 742_9I-98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4424 bytes Desc: not available URL: From 310oxfordst at ariannelingerie.com Mon Aug 20 06:53:51 2012 From: 310oxfordst at ariannelingerie.com (=?koi8-r?B?IuvV0tMgIvzLz8zPx8nexdPLycogy8/O1NLPzNgiIg==?=) Date: Mon, 20 Aug 2012 19:23:51 +0530 Subject: =?koi8-r?B?9yDcy8/Mz8fJ3sXTy8nKIM/UxMXM?= Message-ID: <01cd7f09$54567d80$d79ad975@310oxfordst> Уважаемые руководители и экологи!Напоминаем Вам, что скоро состоится важная экологическая конференция, которая нацелена помочь Вам в главных вопросах по обращению с отходами: Порядок обращения с отходами производства и потребления Конференция пройдет в период с 3 по 4 сентября в Петербурге В рамках конеференции будут раскрыты темы: 1) Законодательство Российской Федерации в сфере обращения с отходами производства и потребления. 2) Государственное регулирование в области обращения с отходами. 3) Лицензирование деятельности по сбору, использованию, обезвреживанию, размещению отходов I-IV классов опасности. 4) Требования по паспортизации отходов I-IV классов опасности. 5) Нормирование образования отходов производства и потребления. 6) Государственный контроль за деятельностью в области обращения с отходами. 7) Экономический механизм природопользования и охраны окружающей среды. 8) Ответственность за нарушения требований природоохранного законодательства в области обращения с отходами. Наши специалисты готовы проконсультировать Вас по этому и другим обучающим мероприятиям*: (812) 642-94-56 С уважением, руководитель рекламного отдела ЦПС! *а так же удалить ваш адрес из базы информационной рассылки -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2518 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 10428 bytes Desc: not available URL: From eugen at leitl.org Mon Aug 20 12:43:07 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 20 Aug 2012 21:43:07 +0200 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: <20120820194307.GB12615@leitl.org> ----- Forwarded message from Maxim Kammerer ----- From eugen at leitl.org Mon Aug 20 12:57:10 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 20 Aug 2012 21:57:10 +0200 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: <20120820195710.GD12615@leitl.org> ----- Forwarded message from fakefake at tormail.org ----- From annmgrant at celanese.com Mon Aug 20 07:28:32 2012 From: annmgrant at celanese.com (=?koi8-r?B?IuPFztTSINDP19nbxc7J0SDL18HMycbJy8HDycki?=) Date: Mon, 20 Aug 2012 23:28:32 +0900 Subject: =?koi8-r?B?89TSz8nUxczYztnKIM7BxNrP0g==?= Message-ID: <01cd7f2b$82e55000$3d21e6de@annmgrant> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 317 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 36364 bytes Desc: not available URL: From allison at williams-gee.com Tue Aug 21 05:35:41 2012 From: allison at williams-gee.com (=?koi8-r?B?IuvV0tMgIvzLz8zPx8nexdPLycogy8/O1NLPzNgiIg==?=) Date: Tue, 21 Aug 2012 09:35:41 -0300 Subject: =?koi8-r?B?9yDcy8/Mz8fJ3sXTy8nKIM/UxMXM?= Message-ID: <01cd7f80$54459480$99d539ba@allison> Уважаемые руководители и экологи!Напоминаем Вам, что скоро состоится важная экологическая конференция, которая нацелена помочь Вам в главных вопросах по обращению с отходами: Порядок обращения с отходами производства и потребления Конференция пройдет в период с 3 по 4 сентября в Петербурге В рамках конеференции будут раскрыты темы: 1) Законодательство Российской Федерации в сфере обращения с отходами производства и потребления. 2) Государственное регулирование в области обращения с отходами. 3) Лицензирование деятельности по сбору, использованию, обезвреживанию, размещению отходов I-IV классов опасности. 4) Требования по паспортизации отходов I-IV классов опасности. 5) Нормирование образования отходов производства и потребления. 6) Государственный контроль за деятельностью в области обращения с отходами. 7) Экономический механизм природопользования и охраны окружающей среды. 8) Ответственность за нарушения требований природоохранного законодательства в области обращения с отходами. Наши специалисты готовы проконсультировать Вас по этому и другим обучающим мероприятиям*: (812) 642-94-59 С уважением, руководитель рекламного отдела ЦПС! *а так же удалить ваш адрес из базы информационной рассылки -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2512 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 10428 bytes Desc: not available URL: From b.sj at h.de Mon Aug 20 22:28:08 2012 From: b.sj at h.de (=?koi8-r?B?18/azcXdxc7JxSDu5PM=?=) Date: Tue, 21 Aug 2012 10:58:08 +0530 Subject: =?koi8-r?B?8M/S0cTPyyDQz8TU18XS1sTFzsnRINPUwdfLySDu5PMgMCUu?= Message-ID: <000d01cd7f5d$bf4bbbb0$6400a8c0@b.sj> 24 августа Применение нулевой ставки НДС с учетом изменений, внесенных в НК РФ в 2011-2012 гг. Перспективы 2013 года. Курс читает - Ведущий советник Отдела косвенных налогов Департамента налоговой и таможенно-тарифной политики Минфина России +7 495 742-9I*98 \\\/// +7 499 ЧЧ54*О95 Внимание! Ваши вопросы! которые Вы будете присылать включаются в программу. Программа будет скорректирована по мере поступления вопросов от участников курса. Программа: 1. Порядок определения налоговой базы по НДС. Момент определения налоговой базы при реализации товаров (работ, услуг), имущественных прав. 2. Применение НДС при поставках товаров на экспорт. Налогообложение НДС работ (услуг), предусмотренных подпунктами 2.1-2.8, 3 пункта 1 статьи 164 НК (в том числе, услуги по международной перевозке, услуги по предоставлению вагонов и контейнеров, транспортно-экспедиционные услуги, услуги по перевалке и хранению товаров в портах, услуги по переработке товаров (документы, обосновывающие применение нулевой ставки НДС и требования к ним; срок представления документов; момент определения налоговой базы). 3. Особенности применения НДС при выполнении работ (оказании услуг), облагаемых по ставке НДС 0%, в том числе работ (услуг), связанных с международной перевозкой 4. Порядок подтверждения обоснованности применения ставки НДС 0%. 5. Применение налоговых вычетов, в том числе при осуществлении операций, подлежащих налогообложению по ставке НДС 0%. 6. Определение места реализации работ (услуг) в целях применения НДС. 7. Исполнение обязанности налогового агента по НДС. 8. Особенности применения НДС при заключении договоров в иностранной валюте. 9. Счета-фактуры, книга покупок, книга продаж, декларация по НДС. 10. Исчисление НДС при осуществлении посреднических операций по реализации и приобретению товаров (по договорам комиссии, поручения и т.д.) 11. Особенности применения НДС при осуществлении внешнеторговых операций в рамках Таможенного союза. 12. НДС при ввозе товаров на территорию Российской Федерации (определение налоговой базы, уплата НДС в зависимости от избранной таможенной процедуры, вычет уплаченных сумм налога). Стоимость участия: 9 000 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 (499) 445\4О\95 \\\/// +7 (495) 792*2I/2-2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4191 bytes Desc: not available URL: From kmex at poin.org Tue Aug 21 13:46:32 2012 From: kmex at poin.org (=?koi8-r?B?4tXIx8HM1MXS1SEg7uTzINcg7usg8uYg1yAyMDEyIMfPxNU=?=) Date: Tue, 21 Aug 2012 12:46:32 -0800 Subject: =?koi8-r?B?7uTzICjsxcvUz9LZIO3JzsbJziDy5iku?= Message-ID: 24 августа Лекторы Минфин РФ: НДС при осуществлении внешнеторговых операций с учетом изменений, внесенных в НК РФ. Применение нулевой ставки НДС с учетом изменений, внесенных в НК РФ в 2011-2012 гг. Перспективы 2013 года Курс читает - Ведущий советник Отдела косвенных налогов Департамента налоговой и таможенно-тарифной политики Минфина России +7 (495) 7922I_22 <<<>>> +7 (код Москвы) 7Ч2_9I\98 Внимание! Ваши вопросы! которые Вы будете присылать включаются в программу. Программа будет скорректирована по мере поступления вопросов от участников курса. Программа: 1. Порядок определения налоговой базы по НДС. Момент определения налоговой базы при реализации товаров (работ, услуг), имущественных прав. 2. Применение НДС при поставках товаров на экспорт. Налогообложение НДС работ (услуг), предусмотренных подпунктами 2.1-2.8, 3 пункта 1 статьи 164 НК (в том числе, услуги по международной перевозке, услуги по предоставлению вагонов и контейнеров, транспортно-экспедиционные услуги, услуги по перевалке и хранению товаров в портах, услуги по переработке товаров (документы, обосновывающие применение нулевой ставки НДС и требования к ним; срок представления документов; момент определения налоговой базы). 3. Особенности применения НДС при выполнении работ (оказании услуг), облагаемых по ставке НДС 0%, в том числе работ (услуг), связанных с международной перевозкой 4. Порядок подтверждения обоснованности применения ставки НДС 0%. 5. Применение налоговых вычетов, в том числе при осуществлении операций, подлежащих налогообложению по ставке НДС 0%. 6. Определение места реализации работ (услуг) в целях применения НДС. 7. Исполнение обязанности налогового агента по НДС. 8. Особенности применения НДС при заключении договоров в иностранной валюте. 9. Счета-фактуры, книга покупок, книга продаж, декларация по НДС. 10. Исчисление НДС при осуществлении посреднических операций по реализации и приобретению товаров (по договорам комиссии, поручения и т.д.) 11. Особенности применения НДС при осуществлении внешнеторговых операций в рамках Таможенного союза. 12. НДС при ввозе товаров на территорию Российской Федерации (определение налоговой базы, уплата НДС в зависимости от избранной таможенной процедуры, вычет уплаченных сумм налога). Стоимость участия: 9 000 рублей Вся информация по тел: Московский код; 792_2I22 <<>> +7 (код Москвы) 7922I22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4194 bytes Desc: not available URL: From freebsd-listen at fabiankeil.de Tue Aug 21 04:14:47 2012 From: freebsd-listen at fabiankeil.de (Fabian Keil) Date: Tue, 21 Aug 2012 13:14:47 +0200 Subject: [tor-talk] Freedom not Fear 2012: Great opportunity for Tor advocacy Message-ID: There's an upcoming bar camp in Brussels (2012-09-14 - 2012-09-17) that is relevant to our interests, but doesn't seem to be on the calendar yet: http://www.freedomnotfear.org/ https://wiki.vorratsdatenspeicherung.de/Freedom_Not_Fear_2012 It's likely to be attended by a fair number of non-technical people who strongly care about privacy and can reach other people that feel the same, but for various reasons aren't using Tor already, or use it but have misconceptions about what it protects against. It would be great if an official member of the Tor project could make it. People who are willing to provide the EU with a bunch of personal information additionally may be able to meet with representatives of the EU commission and the EU parliament and qualify for a travel allowance of up to 120 EUR. For details see: https://shop.foebud.org/fahrt-nach-bruessel-zu-den-aktionstagen-freedom-not-fear-2012.html I intend to be there and feel confident talking about Tor in general, arm and Vidalia (which I only use as monitor, though), but I'm not in a good position to say more than a couple of words about e.g. Orbot, Tor cloud, TBB or Obfsproxy. Fabian _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Aug 21 05:32:56 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 21 Aug 2012 14:32:56 +0200 Subject: [tor-talk] Freedom not Fear 2012: Great opportunity for Tor advocacy Message-ID: <20120821123256.GV12615@leitl.org> ----- Forwarded message from Fabian Keil ----- From tompkinsmaurice at onesource.com Tue Aug 21 04:49:11 2012 From: tompkinsmaurice at onesource.com (Esmeralda Johns) Date: Tue, 21 Aug 2012 14:49:11 +0300 Subject: Make her Yearn More of You = For men who want bigger, harder, longer-lasting erections. Here is the product that works! i2il43 Message-ID: <98y98v56n11-37731818-759f1h70@vcyks2c> Make her Yearn More of You For men who want bigger, harder, longer-lasting erections. Here is the product that works! http://goldtuu.ru From zooko at zooko.com Tue Aug 21 15:08:25 2012 From: zooko at zooko.com (Zooko Wilcox-O'Hearn) Date: Tue, 21 Aug 2012 16:08:25 -0600 Subject: [tahoe-dev] Tahoe-LAFS Weekly Call notes Message-ID: Folks: We had another Tahoe-LAFS Weekly Call. Here are my notes, which are patchy and could be inaccurate. You could check this publicly editable notepad for updates from the other attendees of the call. http://titanpad.com/qnudyEsEoR In attendance: Brian, David-Sarah, Zooko About leasedb schema and Python code: b" Use ascii-encoded or binary blobs in the leasedb (sqlite db)? b" Use ascii-encoded or binary strings to hold things like shareids inside the Python interpreter? About accounting: Server admin should be able to see aggregate usage per account. We have read-only admin WUIs because we don't yet have a good technology to authorize the administrator to access a WUI without exposing the same access to CSRF attacks. (Brian has a prototype solution in his "toolbed" project.) Use cases of sharing: b" Club b" For-profit service (e.g. Least Authority) Individual pairwise storage relationships: b" Social (as long as there is visibility and control, Bob doesn't need to feel like he needs something explicit specific in exchange) b" Money b" Tit for Tat b" 3-way: Bob is running a server, Alice is running a client. She is also, separately running a server (or hiring someone else to run a server that Bob can use). So, Bob wants to let Alice's client use his server because he knows that she is responsible for that other server that he can use. Somewhere along the line there is going to be a graph of who likes whom -- who has accepted storage obligations for whom. Eventually Brian wants to provide tools at *least* to visualize, and ideally to manage, this network of social relationships. People could, perhaps configure their node to give anybody storage space as long as that person is giving you at least X% as much storage space (Tit for Tat). The three messages are: 1. I will accept shares from this other person. 2. I'm willing to send shares to this other person. 3. I'm working for this other person (as a storage server). Next week: b" Try some alternate tech such as Google Hangouts or Skype? POTS quality is bad enough to interfere with communication. b" More about accounting relationship management -- present the higher-altitude picture of the roadmap from Brian's mind. The short-term decision that we have to make is whether to have one key or two keys -- a separate key for the client and for the server. After David-Sarah rang off for dinner, Zooko made the following proposal to Brian as a "baby step". Zooko's motivation is that this would be simple to understand (especially for non-Brian people), and useful (e.g. to volunteergrid2 folks), and hopefully forward-compatible with the better "invitation protocol" design that Brian has in mind. Baby Step Proposal: There is a file named "clients.txt" which is edited by a human and is treated as read-only by the Tahoe-LAFS storage server (and is ignored entirely by Tahoe-LAFS the storage client). It is a text file with one record per line. Each record is a complete ascii-encoded public key followed by an optional whitespace and pet name. If your client's public key appears in the server's "clients.txt" file, then your storage usage gets accounted for and displayed to the storage server owner with his petname for you. If your client's public key does not appear in that clients.txt, then your storage usage goes into the "open, anonymous" accounting bucket (or else maybe gets tracked under your public key?). Or, the storage server operator can turn on the mode where if your client's public key does not appear in his "clients.txt" file, then it refuses to let you store data there at all. There is an analogous file named "servers.txt" which is read but not written by Tahoe-LAFS storage clients and is ignored entirely by Tahoe-LAFS storage servers. This file contains a list of public keys and optional petnames for storage servers. In "backwards compatibility mode", it tracks which of those servers you store how much data with. In "strict mode", it refuses to store data with storage servers that don't have public keys in that file. _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bjorn at barr.ca Tue Aug 21 16:04:23 2012 From: bjorn at barr.ca (=?koi8-r?B?IvziIg==?=) Date: Tue, 21 Aug 2012 18:04:23 -0500 Subject: =?koi8-r?B?3MvPzs/Nyd7F08vB0SDCxdrP0MHTzs/T1Ngg0NLFxNDSydHUydE=?= Message-ID: <01cd7fc7$64cd2d80$f29a3ec8@bjorn> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 316 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 68365 bytes Desc: not available URL: From broker33 at wlotos.ru Tue Aug 21 04:47:03 2012 From: broker33 at wlotos.ru (=?koi8-r?B?5MzRIMLVyMfBzNTF0sE=?=) Date: Tue, 21 Aug 2012 18:47:03 +0700 Subject: =?koi8-r?B?78TOz8TOxdfLyS4g78zY1MXSzsHUydfO2cUg2sHLz87O2cUg08jFzdk=?= Message-ID: 28 августа 2012г. Налоговое планирование: как жить без обналички и фирм-однодневок и не разориться, уход от "черных" и "серых" схем, оптимизация налогов с использованием законных альтернативных схем. +7 499 4Ч5.Ч0_95 <<<>>> 8 Моск. код: 742_9198 Цель: Глобальный экономический кризис привел в том числе к ужесточению налоговой политики государства, повышению ставок налогов и активизации борьбы за их собираемость. В современных условиях использование таких традиционных способов псевдооптимизации, как обналичка и фирмы-однодневки становится более опасным, дорогим и малодоступным. Помочь компаниям, применяющим "серые" и "черные" схемы оптимизации налогов, уйти от них, и при этом не разориться, не уступить конкурентам, не уйти с рынка. Найти законные альтернативы таким схемам, платить налоги, но не переплачивать – вот основная идея налогового планирования без "помоек" и "черного нала". Программа: 1. Договоримся о терминах: что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.). Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2. Обналичивание. Для чего используется: * "черная" зарплата и доходы собственников бизнеса; * оплата расходов, которые не хочется проводить официально; * незаконная деятельность (взятки, откаты, финансирование политической деятельности…). 3. Законные альтернативы обналичиванию (только для законных целей!): * в каком случае выплата зарплаты на спецрежимах сохраняет свою актуальность; * дивиденды от компаний на спецрежимах или от компании-нерезидента; * предприниматель (ИП) – как использовать; * дарение физлицом наличных денег, заработанных в качестве ИП – легальная альтернатива обналичиванию, дающая безналоговый доход? Новый порядок ведения кассовой операций ЦБР. Получение наличных по чеку, через личные (карточные и иные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п. Выбор банков, ограничения; * зарплата в большом размере – льготная (в некоторых случаях – нулевая) ставка страховых взносов; * платежи от нерезидентов на карты, основания платежей. * Однодневки. Для чего используются: * псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; * "серый импорт"; * "серая конвертация"; * незаконная деятельность. 4. "Серые" (полулегальные) альтернативы: как нельзя "оптимизировать"! Фирмы-"прокладки", контактирующие с недобросовестными налогоплательщиками ("белая" - "серая" - "черная" фирмы). Краткий обзор других "серых" альтернатив. 5. Законные альтернативы однодневкам (только для законных целей!): * выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение доходов и расходов "с НДС" и "без НДС"; * затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; * прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; * выплата нерезидентам дивидендов, роялти, процентов, вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 6. Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. 7. Как можно и как нельзя оптимизировать налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменения. Обзор изменений налогового законодательства, их влияние на налоговые схемы. Ответы на вопросы. По желанию и возможности – индивидуальное экспресс-моделирование налоговых схем для компаний-участниц курса. Стоимость участия: 9 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (495)- 7Ч29I\98 \\// (код Москвы) 7Ч2_91/98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6300 bytes Desc: not available URL: From arma at mit.edu Tue Aug 21 16:11:07 2012 From: arma at mit.edu (Roger Dingledine) Date: Tue, 21 Aug 2012 19:11:07 -0400 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: On Mon, Aug 20, 2012 at 10:33:29AM +0300, Maxim Kammerer wrote: > As you can see, sniffing just 25 Class-C networks (or 42 individual > nodes) lets an adversary correlate ~25% of (non-.onion) circuits. I think your numbers may not be right (there are a lot of other subtleties to the calculation), but your point is still generally correct. The Tor network doesn't have enough diversity relative to an ideal Tor network we could imagine. Worse, the Internet itself doesn't have as much diversity as we'd like either. http://freehaven.net/anonbib/#feamster:wpes2004 http://freehaven.net/anonbib/#DBLP:conf:ccs:EdmanS09 http://freehaven.net/anonbib/#oakland2012-lastor all examine AS-level path diversity. See also http://freehaven.net/anonbib/#murdoch-pet2007 for another worrying concern about bottlenecks besides ASes. I also worry about the bottleneck created by trans-ocean cables. For more details calculating diversity, see https://blog.torproject.org/blog/research-problem-measuring-safety-tor-network https://trac.torproject.org/projects/tor/ticket/6232 https://trac.torproject.org/projects/tor/ticket/6443 https://trac.torproject.org/projects/tor/attachment/ticket/6443/exit-probability-cdf-a.png https://trac.torproject.org/projects/tor/ticket/6460 Help appreciated on those tickets! > All of these servers are in US/CA or EU jurisdiction, so even an > unsophisticated LE operation can issue ~20 wiretapping orders at ISP > level Really? Across jurisdictions? And for 'all traffic of those relays'? I don't want to downplay the risk too far, but I think you overestimate "unsophisticated law enforcement operations". > (many of these networks are operated by same hosting providers), > and immediately deanonymize ~25% of Tor traffic. So far for anonymity! Well, do you have an alternative design that scales adequately to 6 or 7 figures of users, provides roughly-real-time browsing and other TCP connections, works on the Internet that we have, and has better traffic confirmation resistance? Or said another way, how well do other usable low-latency anonymity systems hold up to ongoing wiretaps at 25 arbitrary network locations? I believe the answer is 'mostly less well than Tor'. tagnaq pointed to my response to a similar question on the tor-relays list: https://lists.torproject.org/pipermail/tor-relays/2012-July/001436.html talking about the tradeoff between "make it faster but more concentrated" vs "make it less fast but less concentrated". https://metrics.torproject.org/performance.html?graph=torperf&start=2009-06-01&end=2012-08-21&filesize=1mb#torperf It would be interesting to see your stats on as AS level rather than a /24 netblock level. But the challenge really is that we need to know what networks the traffic flows traverse upstream -- e.g. how pervasive a surveiller of Tor traffic could Deutsch Telekom be? This topic goes back to my earlier blog post: https://blog.torproject.org/blog/research-problem-measuring-safety-tor-network I think we still do a pretty good job explaining the risks and limitations of using a system like Tor, e.g. in each Tor talk. Tor used to print a warning message on start, to explain that it isn't perfect. But a) no Windows users saw it, and b) it backfired in surprising ways, like having journalists write "Tor recommends that you use something else for now, since they're not ready yet": https://trac.torproject.org/projects/tor/ticket/2474 > [1] http://pastebin.com/hgtXMSyx Thanks for presenting the code too! --Roger _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From brokeris at eurohaus.lt Tue Aug 21 19:10:41 2012 From: brokeris at eurohaus.lt (=?koi8-r?B?7uTzIMvBzNjL1czR1M/S?=) Date: Tue, 21 Aug 2012 20:10:41 -0600 Subject: =?koi8-r?B?98/azcXdxc7JxSDu5PMg0NLJINzL09DP0tTFIMkgyc3Qz9LUxS4=?= Message-ID: <000d01cd8002$f2b5c0e0$6400a8c0@brokeris> 24 августа Применение нулевой ставки НДС с учетом изменений, внесенных в НК РФ в 2012 году. НДС при осуществлении внешнеторговых операций с учетом изменений, внесенных в НК РФ в 2012 году. Перспективы 2013 года. Курс читает - Ведущий советник Отдела косвенных налогов Департамента налоговой и таможенно-тарифной политики Минфина России 8 Моск. код: 79221-22 <<<>>> (495) 792.2I22 Внимание! Ваши вопросы! которые Вы будете присылать включаются в программу. Программа будет скорректирована по мере поступления вопросов от участников курса. Программа: 1. Порядок определения налоговой базы по НДС. Момент определения налоговой базы при реализации товаров (работ, услуг), имущественных прав. 2. Применение НДС при поставках товаров на экспорт. Налогообложение НДС работ (услуг), предусмотренных подпунктами 2.1-2.8, 3 пункта 1 статьи 164 НК (в том числе, услуги по международной перевозке, услуги по предоставлению вагонов и контейнеров, транспортно-экспедиционные услуги, услуги по перевалке и хранению товаров в портах, услуги по переработке товаров (документы, обосновывающие применение нулевой ставки НДС и требования к ним; срок представления документов; момент определения налоговой базы). 3. Особенности применения НДС при выполнении работ (оказании услуг), облагаемых по ставке НДС 0%, в том числе работ (услуг), связанных с международной перевозкой 4. Порядок подтверждения обоснованности применения ставки НДС 0%. 5. Применение налоговых вычетов, в том числе при осуществлении операций, подлежащих налогообложению по ставке НДС 0%. 6. Определение места реализации работ (услуг) в целях применения НДС. 7. Исполнение обязанности налогового агента по НДС. 8. Особенности применения НДС при заключении договоров в иностранной валюте. 9. Счета-фактуры, книга покупок, книга продаж, декларация по НДС. 10. Исчисление НДС при осуществлении посреднических операций по реализации и приобретению товаров (по договорам комиссии, поручения и т.д.) 11. Особенности применения НДС при осуществлении внешнеторговых операций в рамках Таможенного союза. 12. НДС при ввозе товаров на территорию Российской Федерации (определение налоговой базы, уплата НДС в зависимости от избранной таможенной процедуры, вычет уплаченных сумм налога). Стоимость участия: 9 000 рублей За более подробной информацuей обpащайтеcь по тел: +7 499 ЧЧ5-Ч0-95 <> +7 (Ч95) 792.2I-2_2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4296 bytes Desc: not available URL: From tedks at riseup.net Tue Aug 21 17:29:42 2012 From: tedks at riseup.net (Ted Smith) Date: Tue, 21 Aug 2012 20:29:42 -0400 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: On Mon, 2012-08-20 at 10:33 +0300, Maxim Kammerer wrote: > Hello gentlemen, > [1] http://pastebin.com/hgtXMSyx I ran this script on the current consensus. The full results (the nodes-sniff-summary file) are below my signature. How did you compile the country-codes to IPs list? That wasn't produced by the script. It's comforting that this approach yields quickly diminishing returns. Going from 25 to 60 networks only gets you a 10% increase in networks surveillance (if I'm reading the output correctly), and returns plateau entirely at that point (I'm considering about two percent to be in the noise, which may not be appropriate to this domain). Also, it's not immediately clear whether eavesdropping those networks would actually get you strong enough correlation to accurately de-anonymize users[1]. If our rodent(?) friend(s?) could comment on this, I'd appreciate their expertise. I also think that if it were possible for "unsophisticated law enforcement" to deanonymize Tor users, they would already do it. If I remember correctly, the Tor project gets a lot of requests from law enforcement to deanonymize Tor users for them, which indicates that they can't do it themselves (Andrew Lewman would be able to say if I'm correct or not). I've also never heard of a conviction obtained through the use of this material, though sophisticated TLAs might not much care. I wonder what a search through the email dumps leaked by Anonymous in the past year for Tor would yield. If this attack were possible in the wild, I'd expect one or more of those contractors to be using it. [1] https://lists.torproject.org/pipermail/tor-talk/2008-September/019231.html -- Sent from Ubuntu 1 .32% 2 2.76% 3 4.50% 4 6.30% 5 7.03% 6 9.24% 7 10.12% 8 10.80% 9 11.75% 10 14.04% 11 15.95% 12 16.24% 13 18.60% 14 23.10% 15 23.45% 16 24.84% 17 26.27% 18 27.36% 19 27.74% 20 27.74% 21 28.86% 22 28.86% 23 29.25% 24 29.25% 25 30.40% 26 30.40% 27 30.40% 28 30.80% 29 30.80% 30 31.57% 31 31.98% 32 31.98% 33 32.39% 34 32.39% 35 33.60% 36 33.60% 37 33.60% 38 34.02% 39 34.02% 40 35.26% 41 35.26% 42 35.26% 43 35.26% 44 35.69% 45 35.69% 46 36.52% 47 36.96% 48 36.96% 49 36.96% 50 36.96% 51 36.96% 52 36.96% 53 36.96% 54 37.40% 55 37.40% 56 37.40% 57 37.40% 58 38.25% 59 38.25% 60 38.25% 61 38.25% 62 38.70% 63 38.70% 64 38.70% 65 38.70% 66 38.70% 67 38.70% 68 38.70% 69 38.70% 70 38.70% 71 38.70% 72 39.15% 73 39.15% 74 39.15% 75 39.15% 76 40.02% 77 40.02% 78 40.02% 79 40.02% 80 40.02% 81 40.02% 82 40.02% 83 40.02% 84 40.02% 85 40.48% 86 40.48% 87 40.48% 88 40.48% 89 40.48% 90 40.48% 91 40.48% 92 40.48% 93 40.48% 94 40.48% 95 40.48% 96 40.48% 97 40.48% 98 40.48% 99 40.48% 100 40.48% 101 40.48% 102 40.48% 103 40.48% 104 40.48% 105 40.48% 106 40.48% 107 40.94% 108 40.94% 109 40.94% 110 40.94% 111 40.94% 112 40.94% 113 40.94% 114 40.94% 115 41.83% 116 41.83% 117 41.83% 118 41.83% 119 41.83% 120 41.83% 121 41.83% 122 41.83% 123 41.83% 124 41.83% 125 41.83% 126 41.83% 127 41.83% 128 41.83% 129 41.83% 130 41.83% 131 41.83% 132 41.83% 133 41.83% 134 41.83% 135 41.83% 136 41.83% 137 41.83% 138 41.83% 139 41.83% 140 41.83% 141 41.83% 142 41.83% 143 41.83% 144 41.83% 145 41.83% 146 41.83% 147 41.83% 148 41.83% 149 41.83% 150 42.30% 151 42.30% 152 42.30% 153 42.30% 154 42.30% 155 42.30% 156 42.30% 157 42.30% 158 42.30% 159 42.30% 160 42.30% 161 42.30% 162 42.30% 163 42.30% 164 42.30% 165 42.30% 166 42.30% 167 42.30% 168 42.30% 169 42.30% 170 42.30% 171 42.30% 172 42.30% 173 42.30% 174 42.30% 175 42.30% 176 42.30% 177 42.30% 178 42.30% 179 42.30% 180 42.30% 181 42.30% 182 42.30% 183 42.30% 184 42.30% 185 42.30% 186 42.30% 187 42.30% 188 42.30% 189 42.30% 190 42.30% 191 42.30% 192 42.30% 193 42.30% 194 42.30% 195 42.30% 196 42.30% 197 42.30% 198 42.30% 199 42.30% 200 42.30% 201 42.30% 202 42.30% 203 42.30% _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bonnie at aconfidential.com Tue Aug 21 07:13:44 2012 From: bonnie at aconfidential.com (=?koi8-r?B?IvLVy8/Xz8TJ1MXM2CDLzMnFztTTy8/HzyDP1MTFzMEi?=) Date: Tue, 21 Aug 2012 23:13:44 +0900 Subject: =?koi8-r?B?79LHwc7J2sHDydEg/OIg0NLFxNDSydHUydE=?= Message-ID: <01cd7ff2$9c050400$4e31817d@bonnie> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 316 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 68365 bytes Desc: not available URL: From dragonwisard at gmail.com Tue Aug 21 21:22:13 2012 From: dragonwisard at gmail.com (Ben Mendis) Date: Wed, 22 Aug 2012 00:22:13 -0400 (EDT) Subject: [Freedombox-discuss] Wireless routers "knitted" together Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The paper they refer to acknowledges the recent research into using ad-hoc mesh networks as a backup communication system for emergency responders. They assert that mesh node density may be insufficient in certain geographic areas to maintain the necessary coverage of the mesh. Based on this assertion, they are proposing that "at some point in the future" an emergency switch would be implemented into all (or most?) home routers such that the could be flipped from normal mode into an emergency mesh network mode granting access to emergency responders. They then proceed to use an Android wardriving app to collect data on existing residential WiFi-enabled routers one neighborhood and make the case that these routers would be capable of running the necessary software to form a mesh network with consistent coverage of that neighborhood. Although the paper appears to be well-researched and well-written, I think they focus too much on the wardriving aspect and trying to establish the proliferation of privately owned WiFi equipment in a particular urban neighborhood in a well-developed country. There is a lot of important discussion which they seem to leave out of this paper. They may have already addressed it in their previous paper, which they reference several times, however I have not read that one. Some of the issues I see, which I would have liked to see addressed further: 1. Who has the authority to activate the emergency switch, and what mechanisms prevent its abuse? 2. What mechanism is used to activate this emergency switch? 3. Who has access to make use of the mesh network after it has been activated? The paper seems to imply that it would only be used by emergency responders, but their methodology is to open it up such that anyone would be able to connect and access the network. 4. What liability would individuals face if their network was misused by guests while this emergency switch was activated? Eg, what happens if someone uses your now-unlocked network to commit a crime such as illegally transferring copyrighted materials or child pornography? 5. How would the network be utilized in the absence of Internet access? In the use case the authors describe, the mesh network is being activiated because of a failure of traditional infrastructure, so it's reasonable to assume that Internet access would be scare to impossible in the region. 6. If traditional infrastructure is disrupted, that could include power lines, how many of the residential routers they identified would still be online if power was lost? Could FreedomBox implement something similar to what they describe? Easily. However I think it would be more interesting and arguably more valuable for FreedomBox to implement an always-on mesh network rather than one that is only switched on when emergency responders deem it is appropriate. That's my two cents. On Wed, 22 Aug 2012, Sandy Harris wrote: > http://www.securityweek.com/home-wifi-could-be-used-emergency-responders > > Is this something the Box should/could support? Is the method discussed in > the article the right one for us? > > _______________________________________________ > Freedombox-discuss mailing list > Freedombox-discuss at lists.alioth.debian.org > http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBAgAGBQJQNF51AAoJEMco5sYyM+0wyRgH/0vatkh6n+WtOrJAvQ29lzq4 vKs9wjODzw1O7n7X2Wo56/U0KlMNnb/e/v8YujMPUXIjOwfBEjFuIyVvI1hhw1tp MEnSkZ+btZMOdMcdsYACmg3GmvRd5mPZB6fgrvPWX/n0KKBn3AXjvDbb/ztR8qTK fqcQqyy+nkQsiMwB7u8oyI/ztK9TOEmJ1DPNqPAC8tIP9VEoOaAM/CjT4iH7jcEX f/IxN6S9/TwCN2DfByW6qdbwNr2oKsR4T7Cn5kIdkrtsFg8H48rlUds2SQBmUDlB FhKrLFz7kDtg8QqP0F43UJfUo3qubV/HsjmTAjZKfbjyUn8udfIl/HjG0JtNc0g= =iZ45 -----END PGP SIGNATURE----- _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From 470b5378.1080706 at selesta.ca Tue Aug 21 08:40:58 2012 From: 470b5378.1080706 at selesta.ca (=?koi8-r?B?IuvV0tMgIvDP0tHEz8sgz8LSwd3FzsnRINMgz9TIz8TBzckiIg==?=) Date: Wed, 22 Aug 2012 00:40:58 +0900 Subject: =?koi8-r?B?/MvPzM/Hyd7F08vJyiDLz87U0s/M2A==?= Message-ID: <01cd7ffe$cbba0900$5ed28c79@470b5378.1080706> Уважаемые руководители и экологи!Напоминаем Вам, что скоро состоится важная экологическая конференция, которая нацелена помочь Вам в главных вопросах по обращению с отходами: Порядок обращения с отходами производства и потребления Конференция пройдет в период с 3 по 4 сентября в Петербурге В рамках конеференции будут раскрыты темы: 1) Законодательство Российской Федерации в сфере обращения с отходами производства и потребления. 2) Государственное регулирование в области обращения с отходами. 3) Лицензирование деятельности по сбору, использованию, обезвреживанию, размещению отходов I-IV классов опасности. 4) Требования по паспортизации отходов I-IV классов опасности. 5) Нормирование образования отходов производства и потребления. 6) Государственный контроль за деятельностью в области обращения с отходами. 7) Экономический механизм природопользования и охраны окружающей среды. 8) Ответственность за нарушения требований природоохранного законодательства в области обращения с отходами. Наши специалисты готовы проконсультировать Вас по этому и другим обучающим мероприятиям*: (812) 642-94-59 С уважением, руководитель рекламного отдела ЦПС! *а так же удалить ваш адрес из базы информационной рассылки -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2516 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 10428 bytes Desc: not available URL: From mk at dee.su Tue Aug 21 14:52:04 2012 From: mk at dee.su (Maxim Kammerer) Date: Wed, 22 Aug 2012 00:52:04 +0300 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: On Tue, Aug 21, 2012 at 11:25 PM, tagnaq wrote: > I think karsten's graphs from #6443 fit also well to this thread: Bingo b in the first graph in the ticket [1] you see that the probability gets to ~80% when the number of nodes gets to 40. What this graph doesn't show, however, is that many of these nodes are attached to the same switch, or even run on same machine in different VMs, or on different IPs (some even run on same IP). After accounting for that, the number of tiny networks (at least /28, from going over the list in the original message) and nodes one needs to intercept in order to get the same 80% figure gets down to ~25. And of course, if one is smarter about choosing which nodes to intercept, the probability of seeing both entry and exit traffic is also significant: ~25%. It is also possible to do something in between (choose some Guard-only and Exit-only nodes), but my laziness kicked in at that point of analysis. Here are the network again, in case anyone has the resources and is curious enough about who does what with Tor: DE 31.172.30.[1-4] GB 146.185.23.179 NL 77.247.181.{162,164} RO 109.163.233.{200-201,205} CA 198.96.155.3 US 199.48.147.[35-41] DE 212.84.206.250 FR 178.32.211.{130,140} US 204.8.156.142 US 173.254.216.[66-69] SE 78.108.63.44 US 96.44.189.102 GB 178.33.169.35 CZ 212.79.110.28 US 66.180.193.219 DE 88.198.100.{230,233} LU 212.117.180.65 SE 81.170.186.175 CH 62.220.135.129 SE 84.55.117.251 DE 85.31.187.132 CA 8.18.172.156 FR 213.251.185.74 US 69.42.212.2 FR 37.59.82.50 [1] https://trac.torproject.org/projects/tor/attachment/ticket/6443/exit-probability-cdf-2012-07-23-2.png -- Maxim Kammerer LibertC) Linux: http://dee.su/liberte _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From noreply at cityofportaransas.org Wed Aug 22 08:13:51 2012 From: noreply at cityofportaransas.org (noreply) Date: Wed, 22 Aug 2012 04:13:51 -1100 Subject: Your Chase Credit Card Account Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6928 bytes Desc: not available URL: From mk at dee.su Tue Aug 21 18:42:35 2012 From: mk at dee.su (Maxim Kammerer) Date: Wed, 22 Aug 2012 04:42:35 +0300 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: On Wed, Aug 22, 2012 at 3:29 AM, Ted Smith wrote: > I ran this script on the current consensus. The full results (the > nodes-sniff-summary file) are below my signature. How did you compile > the country-codes to IPs list? That wasn't produced by the script. Manually, using WHOIS and traceroute. This can be done automatically using GeoIP, but I wanted to be sure in the results (also visited some hosting sites), and writing a proper program would deviate too much from the initially intended bquick hackb design. > It's comforting that this approach yields quickly diminishing returns. > Going from 25 to 60 networks only gets you a 10% increase in networks > surveillance (if I'm reading the output correctly), and returns plateau > entirely at that point (I'm considering about two percent to be in the > noise, which may not be appropriate to this domain). That's why I insist that everyone should be a relay by default, even if there are some theoretical issues that weren't worked out yet [1]. Making everyone a relay also results in a healthier users community (I think I2P is one), and more intrinsic network growth. > Also, it's not immediately clear whether eavesdropping those networks > would actually get you strong enough correlation to accurately > de-anonymize users[1]. If our rodent(?) friend(s?) could comment on > this, I'd appreciate their expertise. Quoting [2] (referenced by fakefake): bTor has been long suspected, and later confirmed [11,12], to be vulnerable to an attacker who could observe both the entry and exit point of a connection through an anonymity network.b > I also think that if it were possible for "unsophisticated law > enforcement" to deanonymize Tor users, they would already do it. If I > remember correctly, the Tor project gets a lot of requests from law > enforcement to deanonymize Tor users for them, which indicates that they > can't do it themselves (Andrew Lewman would be able to say if I'm > correct or not). Well, it of course depends on what one calls bunsophisticatedb. E.g., if one judges by IACIS email dump [3], then most investigators hardly understand what they are doing when it comes to unfamiliar technologies (like Tor). So maybe you need them to be bsophisticatedb, after all, but my point was that you don't need something exceptional like involving state security agencies b i.e., FBI + UK Police + DE Police + a couple of other countries, coordinating via Interpol does not sound impossible to me. I will also expand on that in a reply to Roger. [1] https://www.torproject.org/docs/faq#EverybodyARelay [2] http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf [3] http://www.theregister.co.uk/2011/11/25/anon_cybercrime_investigator_leak/ -- Maxim Kammerer LibertC) Linux: http://dee.su/liberte _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From a.krey at gmx.de Tue Aug 21 22:51:52 2012 From: a.krey at gmx.de (Andreas Krey) Date: Wed, 22 Aug 2012 07:51:52 +0200 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: On Wed, 22 Aug 2012 04:42:35 +0000, Maxim Kammerer wrote: ... > technologies (like Tor). So maybe you need them to be ?sophisticated?, > after all, but my point was that you don't need something exceptional > like involving state security agencies ? i.e., FBI + UK Police + DE > Police + a couple of other countries, coordinating via Interpol does > not sound impossible to me. Not impossible; but even if they start intercepting the relay communication that data (and no small amount of it) is still sitting in disparate systems and needs a) the software to actually do the correlation and b) the means of all data being moved to one place. Buying software for a) will probably show up in public records, and b) may be hindered by the paranoia of the participating LEAs. Even the software needed to get all the intercepted data in one place could be nightmarish. Andreas -- "Totally trivial. Famous last words." From: Linus Torvalds Date: Fri, 22 Jan 2010 07:29:21 -0800 _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From mk at dee.su Tue Aug 21 23:48:19 2012 From: mk at dee.su (Maxim Kammerer) Date: Wed, 22 Aug 2012 09:48:19 +0300 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: On Wed, Aug 22, 2012 at 8:51 AM, Andreas Krey wrote: > Buying software for a) will probably show up in public records, and b) > may be hindered by the paranoia of the participating LEAs. Even the software > needed to get all the intercepted data in one place could be nightmarish. I don't think that buying the software would be that difficult. For a big project, LE could outsource it to one of those shady companies selling exploits, or (more likely) to a government contractor with security clearance. For something smaller, a hungry grad student should do, after making them sign an NDA, or, in case of a really arrogant LE, some national secrecy act. Writing the service as something innocent in accounting is probably par for the course. Closer to the topic, I think that traffic correlation can be performed in a distributed fashion, if you know the target IPs to watch for (which can be gathered beforehand locally on exit nodes, and aggregated and analyzed afterwards). Exit nodes that see packets to/from target hosts aggregate their exact timestamps for a few seconds, and then send the chunks to all other nodes (so yes, you can't correlate too much traffic). All other (guard) nodes then try to locally correlate the received packets with their own traffic, and aggregate successes for later reports. In this fashion, each node needs to keep perhaps a minute of timestamped traffic. It is also possible to play with traffic / disk space / success probability tradeoffs: send chunks to rotating sets of nodes, increase recorded traffic window (to be able to send old chunks to nodes that didn't see traffic to a given IP yet), etc. -- Maxim Kammerer Liberti Linux: http://dee.su/liberte _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From dragonwisard at gmail.com Wed Aug 22 09:15:53 2012 From: dragonwisard at gmail.com (Ben Mendis) Date: Wed, 22 Aug 2012 12:15:53 -0400 (EDT) Subject: [HacDC:Byzantium] The Untapped Potential of Wi-Fi in Emergencies Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 To repeat the critique I posted to the Freedombox list: The paper they refer to acknowledges the recent research into using ad-hoc mesh networks as a backup communication system for emergency responders. They assert that mesh node density may be insufficient in certain geographic areas to maintain the necessary coverage of the mesh. Based on this assertion, they are proposing that "at some point in the future" an emergency switch would be implemented into all (or most?) home routers such that the could be flipped from normal mode into an emergency mesh network mode granting access to emergency responders. They then proceed to use an Android wardriving app to collect data on existing residential WiFi-enabled routers one neighborhood and make the case that these routers would be capable of running the necessary software to form a mesh network with consistent coverage of that neighborhood. Although the paper appears to be well-researched and well-written, I think they focus too much on the wardriving aspect and trying to establish the proliferation of privately owned WiFi equipment in a particular urban neighborhood in a well-developed country. There is a lot of important discussion which they seem to leave out of this paper. They may have already addressed it in their previous paper, which they reference several times, however I have not read that one. Some of the issues I see, which I would have liked to see addressed further: 1. Who has the authority to activate the emergency switch, and what mechanisms prevent its abuse? 2. What mechanism is used to activate this emergency switch? 3. Who has access to make use of the mesh network after it has been activated? The paper seems to imply that it would only be used by emergency responders, but their methodology is to open it up such that anyone would be able to connect and access the network. 4. How would the network be utilized in the absence of Internet access? In the use case the authors describe, the mesh network is being activiated because of a failure of traditional infrastructure, so it's reasonable to assume that Internet access would be scare to impossible in the region. 5. If traditional infrastructure is disrupted, that could include power lines, how many of the residential routers they identified would still be online if power was lost? They seemed to focus at lot on wardriving using and Android app, but wardriving is sooo last decade. Still, it's good to see validation of our premise. This story seems to be really picking up, despite the lack of implementation specifics, which implies that there is interest and need for what we are building. That's my two cents. Best regards, Ben the Pyrate On Wed, 22 Aug 2012, buzz wrote: > When mobile networks collapse in natural disasters relief workers can be stranded. But German researchers say it's possible to tap > domestic WiFi to create emergency mesh networks. > > http://www.dw.de/dw/article/0,,16183453,00.html > > -- > You received this message because you are subscribed to the Google Groups "Project Byzantium (Emergency Mesh Networking)" group. > To view this discussion on the web visit https://groups.google.com/a/hacdc.org/d/msg/Byzantium/-/ES5swIhqzVkJ. > To post to this group, send email to Byzantium at hacdc.org. > To unsubscribe from this group, send email to Byzantium+unsubscribe at hacdc.org. > For more options, visit this group at http://groups.google.com/a/hacdc.org/group/Byzantium/?hl=en. > > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBAgAGBQJQNQW5AAoJEMco5sYyM+0wou0IAIzZTM7dfQh+D7zaCai4GIdy 2FHARFfZWK1zC3JGvJ8uAPtFEljdnR6VdhIGJzcoddLDQUTZqexk+4eaH6fNnFQe 7JMxFh5MmTTV0VBNkORCdACYmQlBvAVwfHyG5peOPybTVIVtHaLhDfTmCxqEOzvV wA/vePoZwfd5y13BayBidCehuEhNf8BFt78tLV5rgJM3M4/xbTqOUlY/dy6kcncI bdtRSgNP/hzFmQ4vSCwmnSohkyhmqR5sZUXQA6pXbk0vnQfGgMM6hgJ+svNFxeT1 vJU8pRGMhhARIKVTYW1kBU1xr7iQhpzsgWA33Ou9wBxsJg7ibqUE15uBfVuQbxE= =F7tp -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "Project Byzantium (Emergency Mesh Networking)" group. To post to this group, send email to Byzantium at hacdc.org. To unsubscribe from this group, send email to Byzantium+unsubscribe at hacdc.org. For more options, visit this group at http://groups.google.com/a/hacdc.org/group/Byzantium/?hl=en. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From amitchell at isipp.com Wed Aug 22 11:17:02 2012 From: amitchell at isipp.com (Anne P. Mitchell, Esq.) Date: Wed, 22 Aug 2012 12:17:02 -0600 Subject: Copyright infringement notice Message-ID: > On Thu, Aug 16, 2012 at 6:16 AM, groupstudytac groupstudytac > wrote: >> I get copyright notices from companies like Irdeto , saying that one of my >> customers IP is downloading unauthorized material using bittorent. I also >> have processes in place to handle such notices . >> >> Can anyone share how he handles such notices in his ISP environment , i am >> ready to adapt some valid steps to improve the existing process. >> >> Or should i just ignore such messages ? > > If you're in the U.S., the process for handling these notices is > prescribed by law, specifically the Digital Millennium Copyright Act > (search: DMCA takedown notice). It details what the infringement > notice must include in order to be actionable and what steps the ISP > must take on receipt of an actionable notice. It also prescribes > procedures for the alleged infringer to object and for the ISP to > restore the material following an objection. > > Follow the procedures described in the law to retain your immunity as > an ISP. Consult a local lawyer if you don't find them sufficiently > obvious. The thing that muddies this is that, as I understand it, the notice was not for takedown (i.e. there is not an allegation that they are *hosting* infringing material) - it is a notice that one of their users *downloaded* copyrighted material (IP, do I have that right?) This is part of the RIAA's "graduated response" program, to which several major ISPs, including AT&T, Verizon, and Comcast, have agreed. Basically, the accuser contacts the ISP, and the ISP sends a warning (a "copyright alert") to their user (without giving up the user to the accuser). If the same user is accused subsequently, they get another, sterner warning. In total there is a series of six warnings, with "mitigation measures" accompanying the fifth and sixth warning. If I were counseling an ISP - whether one that was part of the agreement, or not - I would say that the first order is to *put your policy around copyright alerts in writing* - asap - and make it as specific as possible - and then *ALWAYS FOLLOW IT EVERY SINGLE TIME*. It almost (I say almost) doesn't matter what the policy is so long as it's reasonable, but it matters that it be followed to the letter every time, no exceptions. And, if you are an ISP that isn't part of the agreement with the RIAA, it's still not a bad idea to structure your policy to follow the six "copyright alert" structure, because there is some precedent there, and then you come off looking like you are trying to do the right thing, which will make you a less easy target. These two articles give a pretty good explanation of the deal: https://www.eff.org/deeplinks/2012/03/graduated-response-deal-steamrollers-towards-july-1-launch http://arstechnica.com/tech-policy/2011/07/major-isps-agree-to-six-strikes-copyright-enforcement-plan/ Anne Anne P. Mitchell, Esq CEO/President Institute for Social Internet Public Policy http://www.ISIPP.com Member, Cal. Bar Cyberspace Law Committee ISIPP Email Accreditation: http://www.SuretyMail.com ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Aug 22 08:38:53 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 22 Aug 2012 17:38:53 +0200 Subject: [tahoe-dev] Tahoe-LAFS Weekly Call notes Message-ID: <20120822153853.GM12615@leitl.org> ----- Forwarded message from Zooko Wilcox-O'Hearn ----- From eugen at leitl.org Wed Aug 22 08:39:46 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 22 Aug 2012 17:39:46 +0200 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: <20120822153946.GN12615@leitl.org> ----- Forwarded message from Maxim Kammerer ----- From eugen at leitl.org Wed Aug 22 08:45:14 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 22 Aug 2012 17:45:14 +0200 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: <20120822154513.GO12615@leitl.org> ----- Forwarded message from Roger Dingledine ----- From eugen at leitl.org Wed Aug 22 08:48:24 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 22 Aug 2012 17:48:24 +0200 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: <20120822154824.GP12615@leitl.org> ----- Forwarded message from Ted Smith ----- From eugen at leitl.org Wed Aug 22 09:08:17 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 22 Aug 2012 18:08:17 +0200 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: <20120822160817.GR12615@leitl.org> ----- Forwarded message from Maxim Kammerer ----- From eugen at leitl.org Wed Aug 22 09:36:43 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 22 Aug 2012 18:36:43 +0200 Subject: [Freedombox-discuss] Wireless routers "knitted" together Message-ID: <20120822163643.GT12615@leitl.org> ----- Forwarded message from Ben Mendis ----- From eugen at leitl.org Wed Aug 22 09:39:35 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 22 Aug 2012 18:39:35 +0200 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: <20120822163935.GU12615@leitl.org> ----- Forwarded message from Andreas Krey ----- From eugen at leitl.org Wed Aug 22 09:40:47 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 22 Aug 2012 18:40:47 +0200 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: <20120822164047.GV12615@leitl.org> ----- Forwarded message from Maxim Kammerer ----- From brocks3 at shevaton.ru Wed Aug 22 02:52:37 2012 From: brocks3 at shevaton.ru (=?koi8-r?B?1NLBztPGxdLUzs/FIMPFzs/PwtLB2s/Xwc7JxSAyMDEy?=) Date: Wed, 22 Aug 2012 18:52:37 +0900 Subject: =?koi8-r?B?9NLBztPGxdLUzs/FIMPFzs/PwtLB2s/Xwc7JxTo=?= Message-ID: 27 августа 2012г. "Ликбез " для налогоплательщика и "как жить дальше ". Трансфертное ценообразование: новый порядок контроля с 2012 г. Способы ухода от контроля за сделками код (495) - 7*Ч2-91*98 или +7 499 - 4Ч5_Ч0-95 Цель: С 1 января 2012 года НК РФ дополнен новым разделом V.1, посвященным контролю цен сделок. Семинар посвящен подробному рассмотрению произошедших в этой сфере изменений и практическим рекомендациям налогоплательщикам по адаптации к ним (подготовка защитной документации, избежание взаимозависимости и контроля сделок, снижение риска претензий). Рассматриваются новые обязанности, права и ответственность налогоплательщиков, новый вид проверок – "проверка полноты исчисления и уплаты налогов в связи с совершением сделок между взаимозависимыми лицами", способы обоснования трансфертных цен в различных сделках. Вместе с тем, рассматриваются и законные способы ухода от обременительного контроля за ценами сделок по новому законодательству, его пробелы и противоречия, перспективы новых поправок в НК РФ. Программа: 1. Контролируемые сделки, что изменилось: * сделки между взаимозависимыми лицами; * сделки в области внешней торговли биржевыми товарами; * сделки с офшорами; 2. Когда сделки не признаются контролируемыми и как избежать контроля. Методика расчета минимальной суммы для признания внутрироссийских сделок контролируемыми. 3. Взаимозависимые лица, новый перечень оснований взаимозависимости, ее косвенные признаки. Установление взаимозависимости "по иным основаниям" в рамках судебного разбирательства. Способы ухода от взаимозависимости. Использование номинальных учредителей и директоров компаний, ИП. Кто может быть номиналом? Номиналы-нерезиденты: юридические и физические лица. Траст: номиналы по закону, а не "по понятиям". Как защититься от номинала: юридические и экономические способы. Простое товарищество с физлицом-номиналом? 4. Новые обязанности и права налогоплательщиков, совершающих контролируемые сделки: * определение перечня контролируемых сделок, форма и сроки подачи; * подача документации по трансфертным ценам; * добровольные корректировки цен. 5. Новый вид налоговых проверок – "проверка полноты исчисления и уплаты налогов в связи с совершением сделок между взаимозависимыми лицами". Случаи освобождения от ответственности. 6.Методы определения соответствия цен сделки рыночным: * сопоставимые рыночные цены – где их найти. Расчет интервала рыночных цен; * сопоставимые сделки – как доказать сопоставимость. Методика корректировки; * открытые источники информации – что это; * анализа уровня рентабельности – как найти сопоставимые компании. Расчет интервала рентабельности; * метод распределения прибыли – реально ли применение на практике?; 6. Международная практика применения методов ценообразования (ОЭСР, США). 7. Способы защиты прав и интересов налогоплательщика: * соглашение о ценообразовании: порядок определения цен и порядок применения методов ценообразования в контролируемых сделках. Насколько это реально?; * симметричные корректировки: потенциальные проблемы в применении; * консолидированная группа налогоплательщиков: далекое будущее? 8. Что конкретно должно быть сделано сейчас для успешной адаптации к новым правилам: * анализ соответствия применяемых цен и существующей методики ценообразования требованиям НК; * что изменить в договорах; * разработка типовой документации для обоснования цен. 9. Примеры подходов к исследованию трансфертных цен по разным видам деятельности. 10.Ответы на вопросы. Стоимость участия: 9 000 рублей Вся информация по тел: код (495) - 7*Ч2\9I\98 <> +7 (495)- 74291_98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6666 bytes Desc: not available URL: From eugen at leitl.org Wed Aug 22 09:58:17 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 22 Aug 2012 18:58:17 +0200 Subject: [HacDC:Byzantium] The Untapped Potential of Wi-Fi in Emergencies Message-ID: <20120822165817.GA12615@leitl.org> ----- Forwarded message from Ben Mendis ----- From eugen at leitl.org Wed Aug 22 11:59:45 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 22 Aug 2012 20:59:45 +0200 Subject: Copyright infringement notice Message-ID: <20120822185945.GD12615@leitl.org> ----- Forwarded message from "Anne P. Mitchell, Esq." ----- From companys at stanford.edu Wed Aug 22 22:35:28 2012 From: companys at stanford.edu (Yosem Companys) Date: Wed, 22 Aug 2012 22:35:28 -0700 Subject: [liberationtech] Introducing 'Tent' - The decentralized social web Message-ID: The founder is a friend of the late Ilya Zhitomirskiy and a member of this list... YC "Introducing 'Tent' - The decentralized social web" http://j.mp/Q0eDjz (tent.io) "Tent is a new protocol for open, distributed social networking. What we believe - The Tent Manifesto What makes Tent different? Tent is decentralized, not federated or centralized. Any Tent server can connect to any other Tent server. All features are available to any server as first-class citizens. Anyone can host their own Tent server. Tent servers can also be run as Tor hidden services to create a social darknet for at-risk organizers and activists. Anyone can write applications that connect to Tent in order to display or create user content. Relationships are between users, independent of their service providers, so users take their data and relationships with them when they change Tent service providers. Every user decide which other users can follow them and what information will be shared with each of their followers." -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From companys at stanford.edu Wed Aug 22 23:16:13 2012 From: companys at stanford.edu (Yosem Companys) Date: Wed, 22 Aug 2012 23:16:13 -0700 Subject: [liberationtech] The Dictator's Practical Guide to Internet Power Retention, Global Edition - Boing Boing Message-ID: http://boingboing.net/2012/08/22/the-dictators-practical-guid.html The Dictator's Practical Guide to Internet Power Retention, Global Edition By Cory Doctorow at 8:57 pm Wednesday, Aug 22 The Dictator's Practical Guide to Internet Power Retention, Global Edition is a wry little 45-page booklet that is, superfically, a book of practical advice for totalitarian, autocratic and theocratic dictators who are looking for advice on how to shape their countries' Internet policy to ensure that the network doesn't loosen their grip on power. Really, though, this is Laurier Rochon's very good critique of the state of Internet liberation technologies -- a critical analysis of what works, what needs work, and what doesn't work in the world of networked technologies that hope to serve as a force for democratization and self-determination. It's also a literal playbook for using technology, policy, economics and propaganda to diffuse political dissent, neutralize opposition movements, and distract and de-politicize national populations. Rochon's device is an admirably compact and efficient means of setting out the similarities (and dissimilarities) in the Internet control programs used by Singapore, Iran, China, Azerbaijan, and other non-democratic states -- and the programs set in place by America and other "democratic" states in the name of fighting Wikileaks and piracy. Building on the work of such fierce and smart critics as Rebecca McKinnon (see my review of her book *Consent of the Networked* ), *The Dictator's Guide* is a short, sharp look at the present and future of networked liberation. Firstly, the country you rule must be somewhat "stable" politically. Understandably "stable" can be defined differently in different contexts. It is essential that the last few years (at least) have not seen too many demonstrations, protests questioning your legitimacy, unrest, political dissidence, etc. If it is the case, trying to exploit the internet to your advantage can quickly backfire, especially if you can't fully trust your fellow party officials (this is linked to condition #3). Many examples of relatively stable single-leader states exist if in need of inspiration, Fidel Castro's Cuba for example. Castro successfully reigned over the country for decades, effectively protecting his people from counter-revolutionary individuals. He appointed his brother as the commander in chief of Cuba's army and managed his regime using elaborate surveillance and strict dissuasive mechanisms against enemies of the state.[49] As is always the case, political incidents will occur and test your regime's resilience (the Bay of Pigs invasion or the missile crisis, for example), but even massive states have managed to uphold a single-party model and have adapted beautifully to the digital age - in China's case, despite close to 87 000 protests in 2005.[2] Follow these states' example and seek stability, no matter what your regime type is. Without it, you are jeopardizing the two next prerequisites and annihilating your chances to rule with the internet at your side. If you are in the midst of an important political transformation, busy chasing counter-revolutionary dissidents or sending your military to the streets in order to educate protesters, you will need to tame these fires first and come back to this guide afterwards. The Dictator's Practical Guide to Internet Power Retention, Global Edition -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From axsaeq at samcot.ru Wed Aug 22 17:41:14 2012 From: axsaeq at samcot.ru (=?koi8-r?B?78bbz9LZ?=) Date: Thu, 23 Aug 2012 06:11:14 +0530 Subject: =?koi8-r?B?7uHs7+fpIO7hIOvp8PLl?= Message-ID: <855E548258D246A49989247B33C92B18@hclcd63c9f81d7> 28 августа 2012 г. ОФФШОРНЫЙ БИЗНЕС: КИПР ДО И ПОСЛЕ РАТИФИКАЦИИ ПРОТОКОЛА. ДЕТАЛЬНЫЙ АНАЛИЗ И ПРАКТИКА ИСПОЛЬЗОВАНИЯ. (Налоги на Кипре – не пересекая грань между оптимизаций и уклонением. Схемы с использованием Кипрских компаний) \Моск. код/ 792-2I-2.2 : +7 499 445Ч\О95 Цель: Для участия мы приглашаем как слушателей, уже использующих кипрские компании в своей работе, так и тех, кто только планирует воспользоваться данным инструментом налогового планирования, конфиденциальности и защиты активов. Содержание семинара можно разделить на блоки: * последствия ратификации Протокола к соглашению об избежании двойного налогообложения между РФ и Кипром; * практика использования и сопровождения кипрских компаний; * пути применения Кипра в налоговом планировании; * налогообложение на Кипре (с детальным рассмотрением НДС). По мнению автора, ратификация Протокола не приведет к массовой реструктуризации или отказам от налоговых решений с использованием Кипра, поскольку данный Протокол лишь "перетасовывает" сложившиеся принципы работы. Во многих случаях оптимальным решением будет "косметическая" коррекция договорных отношений и хозяйственных операций, которой будет уделено особое внимание в рамках данного семинара. Тщательного рассмотрения заслуживает налоговое законодательство Кипра и его "пересечение" с российским в налоговых решениях. Например, в уставной капитал кипрских компаний можно вложить не только денежные средства, но и акции российских компаний. Налоговые последствия при этом и методика оценки вклада в натуральной форме вызывают особенно много вопросов слушателей. При использовании кипрских компаний многие сталкиваются с проблемами в виде непредвиденных налоговых обязательств, штрафов и пеней, возникающих из-за незнания тонкостей и особенностей налоговой системы ЕС и Кипра, эволюционирующей столь же стремительно, как и российская. В рамках данного семинара будут рассмотрены детали налоговой системы Кипра, при этом особое внимание будет уделено НДС – наиболее сложному налогу, который регулируется не только местным законодательством, но и многочисленными европейскими директивами. Не менее важны технические вопросы использования кипрских компаний. К сожалению, на практике взаимодействие с администратором, или регистрационным агентом, часто сопряжено с большим количеством трудностей, выливающимся в противостояние владельца компании и неторопливых кипрских юристов. Также многие сталкиваются с непрозрачностью ценообразования на отдельные услуги, особенно на аудит и номинальный сервис. Данный семинар поможет Вам оптимизировать свои отношения с администратором, и определить: за что, кому и когда Вы должны платить при использовании кипрских компаний. Особенностью данного семинара является практическая направленность и отсутствие лишних теоретических и исторических отступлений. Семинар строится в форме интерактивного практического занятия при постоянном взаимодействии с аудиторией с разбором большого количества примеров и подробным описанием налоговых, финансовых и правовых последствий или рисков. Программа: НАЛОГИ НА КИПРЕ – НЕ ПЕРЕСЕКАЯ ГРАНЬ МЕЖДУ ОПТИМИЗАЦИЙ И УКЛОНЕНИЕМ * Налог на прибыль (Corporate Income Tax); предварительный налог на прибыль (Preliminary Tax); налог на оборону (Special Defence Contribution); налог на прирост капитала (Capital Gains Tax) и т.д. * Пути минимизации налоговых отчислений на Кипре: практические примеры и анализ ошибок * Налогообложение операций с ценными бумагами: пределы освобождения * Налоговый календарь на 2012 год: сдача отчетностей, оплата налогов и сборов * Изменения кипрского законодательства 2012 и тенденции 2013 * Ратификация Протокола к Соглашению между РФ и Кипром: кто понесет убытки, а кому удастся на этом заработать? * Как не попасть в "петлю" негативных нововведений Протокола? НДС ПРИ ИСПОЛЬЗОВАНИИ КИПРСКИХ КОМПАНИЙ * Когда нужно получать номер НДС (VAT number) и можно ли это сделать в другой стране ЕС? * Применение механизма “reverse charge” * Анализ основных европейских директив на предмет определения места оказания услуг (“the place of supply”) * Обложение НДС услуг, оказанных через интернет (“electronically supplied services”) * Сложные случаи экспорта-импорта: когда возникает НДС? * Налоговые последствия по НДС при совершении трехсторонних сделок в ЕС (triangular operations) * НДС и роялти, консалтинг, маркетинг – всегда ли можно принять к вычету всю сумму входящего НДС? СХЕМЫ С ИСПОЛЬЗОВАНИЕМ КИПРСКИХ КОМПАНИЙ * Владение недвижимостью с использованием кипрских компаний * Займы: анализ правил тонкой капитализации и прочих ограничений (ст.269 НК РФ), риски и примеры ошибок * Роялти: риски, оптимальная величина размеров выплат, НДС, экономическое и документальное обоснование (“substance”) * Операции с ценными бумагами и векселями * ЗПИФы – применимы ли после ратификации Протокола? * Построение комплексной действующей холдинговой структуры и дивиденды * Схемы коллективных инвестиций и инвестиционные фонды на Кипре РАБОТА С АДМИНИСТРАТОРОМ (АГЕНТОМ) И АУДИТОРОМ КИПРСКОЙ КОМПАНИИ * Наличие представительства администратора в Москве: преимущество или недостаток? * Как не дать администратору и аудитору обмануть Вас? Примеры и рекомендации * За что кипрские администраторы деньги брать не должны? * Переход к другому администратору: "подводные камни" * Принципы ценообразования аудиторских услуг и пути минимизации их стоимости * Вправе ли кипрский аудитор одновременно проверять и вести отечность? * Анализ среднерыночных цен и сроков оказания услуг: оцените своего администратора. РЕАЛЬНЫЙ ОФИС НА КИПРЕ * Сравнение "виртуального" и реального офисов * Случаи, когда реальное присутствие на Кипре необходимо * Инструменты создания видимости контроля компании с территории Кипра * Наем персонала в кипрскую компанию: налоговые и практические вопросы НОМИНАЛЬНЫЙ СЕРВИС И КОНФИДЕНЦИАЛЬНОСТЬ * Документы, регламентирующие возникающие отношения: на что следует обратить внимание? * Раскрытие информации в связи с ратификацией Протокола * Полномочия номинальных директоров и акционеров: где границы и кем они устанавливаются? * Что делать, если номинальный директор отказывается подписывать документы? БАНКОВСКИЕ СЧЕТА * Анализ надежности кипрских банков на фоне ухудшения ситуации в ЕС * Пути снятия средств со счета кипрского банка в России * Раскрытие банковской тайны – факты и выводы * Тарифы популярных кипрский и прибалтийских банков. Использование SEPA. * Выплаты зарплаты путем выпуска карт к счетам в кипрских банках Стоимость участия: 9 000 рублей Вся информация по тел: 8 (499) ЧЧ5/Ч0*95 ; 8 (499) ЧЧ54095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 11585 bytes Desc: not available URL: From gfoster at entersection.org Thu Aug 23 06:19:14 2012 From: gfoster at entersection.org (Gregory Foster) Date: Thu, 23 Aug 2012 08:19:14 -0500 Subject: [liberationtech] NYT Op-Doc on NSA Whistleblower William Binney Message-ID: 10-minutes, well done. http://www.nytimes.com/2012/08/23/opinion/the-national-security-agencys-domestic-spying-program.html On a related note, #CryptoParty . gf -- Gregory Foster || gfoster at entersection.org @gregoryfoster <> http://entersection.com/ -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jstyre at eff.org Thu Aug 23 09:54:42 2012 From: jstyre at eff.org (James S. Tyre) Date: Thu, 23 Aug 2012 09:54:42 -0700 Subject: [liberationtech] NYT Op-Doc on NSA Whistleblower William Binney Message-ID: For those who may be interested, the Declarations of Bill Binney, Tom Drake and Kirk Wiebe (no relation to Rick Wiebe, one of our team lawyers) in Jewel v. NSA, our case against the government. https://www.eff.org/sites/default/files/filenode/binneydeclaration.pdf https://www.eff.org/sites/default/files/filenode/drakedeclaration.pdf https://www.eff.org/sites/default/files/filenode/wiebedeclaration.pdf -- James S. Tyre Law Offices of James S. Tyre 10736 Jefferson Blvd., #512 Culver City, CA 90230-4969 310-839-4114/310-839-4602(fax) jstyre at jstyre.com Policy Fellow, Electronic Frontier Foundation https://www.eff.org From: liberationtech-bounces at lists.stanford.edu [mailto:liberationtech-bounces at lists.stanford.edu] On Behalf Of Gregory Foster Sent: Thursday, August 23, 2012 6:19 AM To: effaustin-discuss at lists.effaustin.org; liberationtech at lists.stanford.edu Subject: [liberationtech] NYT Op-Doc on NSA Whistleblower William Binney 10-minutes, well done. http://www.nytimes.com/2012/08/23/opinion/the-national-security-agencys-domestic-spying-program.html On a related note, #CryptoParty . gf -- Gregory Foster || gfoster at entersection.org @gregoryfoster <> http://entersection.com/ -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From amitchell at isipp.com Thu Aug 23 10:16:13 2012 From: amitchell at isipp.com (Anne P. Mitchell, Esq.) Date: Thu, 23 Aug 2012 11:16:13 -0600 Subject: Copyright infringement notice Message-ID: > > > The 6 strikes system doesn't kick in til Jan 2013 AFAIK. My understanding was that it started kicking in last month, but in any event, for whomever sent the original poster the complaint, it's clearly in effect now. > > Does the legal letter make any kind of demand? Usually the sender (aka copyright troll - a technical term) will be looking for personal info to associate with the IP in order to institute a shakedown of some nature. IANAL but I believe one can wait for a subpoena, and even then it's not open and closed. Actually under the "copyright alert" scheme, the ISPs specifically are *not* to give up personal information, they are simply to take the IP address being reported as downloading copyrighted material, and determine *internally* who the user is, and then send the user the copyright alert, *without* sharing with the accuser who the user is. And yes, in order to share user information forward-facing, one not only can - but one *should* - insist on a subpoena, as that will protect you from breach and invasion of privacy allegations by your own users (assuming your TOS, as it should, says something like "we will not share your private information *unless* required to by law" (and, IAAL :-) ). Anne Anne P. Mitchell, Esq CEO/President Institute for Social Internet Public Policy http://www.ISIPP.com Member, Cal. Bar Cyberspace Law Committee How do you get legitimate email through in a spam-filtered world? SuretyMail! Helping businesses get their email delivered to the inbox since 1998 http://www.isipp.com/SuretyMail Author, "They're Your Kids Too: The Single Father's Guide to Defending Your Fatherhood in a Broken Family Law System" http://www.amazon.com/Theyre-Your-Kids-Too-Fatherhood/dp/061551443X ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From dragonwisard at gmail.com Thu Aug 23 13:20:28 2012 From: dragonwisard at gmail.com (Ben Mendis) Date: Thu, 23 Aug 2012 16:20:28 -0400 (EDT) Subject: [HacDC:Byzantium] Re: [HacDC:BOD] Inquiry from website... Byzantium at Occupy S17? Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi Ryan, This is Ben the Pyrate. I'm glad you're interested in Project Byzantium. On Thu, 23 Aug 2012, Ryan Bennett wrote: > Hey There, > Not sure if this is the proper channel to reach The Doctor, Haxwithxe, and Bed The Pyrate, but I figured I'd try. Well you reached me, at least. I'm forwarding this on to the Project Byzantium mailing list to bring everyone else in the loop. There is a lot of good information in your email which I believe will be of interest to everyone. You can join our mailing list by signing up at the following link: http://groups.google.com/a/hacdc.org/group/Byzantium/?hl=en > My name is Ryan, I'm > a member of a hackerspace in Boulder CO called Solid State Depot, and I've recently come across Byzantium through the r/darknetplan > subreddit. I'm hoping to attend the Occupy anniversary event in NYC mid-september, and as I've long been interested in meshnets and > decentralized communications, I'm trying to assemble a suite of tools to bring with me to the demonstration. I realize that Byzantium > (as well as just about every other tool I've been looking at) is in super-alpha stage and not ready for primetime, but my thinking is > that the more stress testing that can be done, the faster the project will progress. In addition, I think that Occupy would be an > incredible place to plant seeds and get people involved and interested in the project for further applications. I agree, that sounds like a great place to test and demonstrate a project like Byzantium. As long as there is the understanding that Byzantium is still in development and not ready for use in life-or-death situations. > I wanted to get in touch with you first to ask if anyone from HacDC will be making the trip to NYC for S17, I am not planning on attending, but perhaps other members are? We still have a number of v0.2a CDs left over and I would be willing to send them up with someone so they can get into the hands of testers. > and also to mention some of > the other projects that I'm looking to bring with me. Perhaps this email can serve as some food for thought regarding apps that may > make valuable additions to the Byzantium distro... Any thoughts on how I might duct-tape these projects together within the framework > of Byzantium, or indications of severe problems with my thought process would be much appreciated, as I am very much a novice when it > comes to the nitty-gritty of coding. > > Tent http://tent.io/ > "Tent is a protocol for open, decentralized social networking. Tent users share content with apps and each other. Anyone can run a Tent > server, or write an app or alternative server implementation that uses the Tent protocol." --between Byzantium and Tent, I believe a > core framework can be set up to allow serving over the meshnet. Forgive me if Tent is redundant to features already implimented in > Byzantium. Yep, we have heard about this one but so far there is no code, only some documentation on the protocol. We're not certain wether or not this is redundant with other solutions we have also been looking at. We are planning to keep an eye on their developments. > > Forban http://www.foo.be/forban/ > "Forban is a kind of p2p (peer2peer) filesharing application for link-local and local area network. Forban works independently from > Internet and use only the local area capabilities to announce, discover, search or share files." --Forban, at least in theory, > automatically copies newly discovered files to a local drive from a fellow forbans /share folder. Forban's inclusion in Byzantium would > potentially would be helpful, partly because I believe that if Forban can be installed on Android, phones can act as data bridges > between otherwise isolated pockets of meshed laptops/netbooks by means of... I was not aware of Forban, but it certainly does look like something that might be useful to us. I will look into it further and perhaps we can try it out at our development sprint this weekend. > > Serval http://www.servalproject.org/ > "a mesh-based phone network between Wi-Fi enabled mobile phones," Serval allows for the creation of an ad-hoc network directly between > phones allowing voice and text service within the mesh. Voice has a significant lag, but they have a feature in development that's > basically an in-house version of forban for transferring files along the mesh. I'm going to send them an email to see If I can get my > hands on it early, but failing that I need to find a way to run the forban Python script on an android in parallel with the serval mesh > app. Serval can use either OSLR or an older version of BATMAN. If Byzantium could interact with this network in any way, I would be > very interested. Yes, we're aware of the Serval project and we're also eager to make sure that our networks can interoperate seamlessly. They are doing a lot of good work and we are keeping an eye on them as well. We may incorporate some of their software into future versions of Byzantium. > > Potential Apps to run/deploy over a Byzantium mesh network > > Smallest Federated Wiki http://wardcunningham.github.com/ --A decentralized wiki service. Open source, might be handy to have as a > starter app. uses JSON and Ruby. > > BTLIVE http://live.bittorrent.com/ > --Bittorrent style video streaming, so support for videocasting by end users yet, as this project is under development and not open > source, but it or something like it would be of enormous value as a n app on the ground. Open source projects that might be more > deployment friendly are > > GoalBit - http://goalbit.sourceforge.net/ or FreeCast http://www.freecast.org/ --Both of these projects operate over the existing web, > but a) implementation via byzantium would be excellent in bridging the gap between the meshnet on the ground and the greater world > population and b) if they could be deployed over a meshnet then news could spread very fast and effectively through video from one > corner of the network to another, keeping everyone on up to date on the latest developments. > > Ushahidi http://ushahidi.com/products > "Tools for democratizing information, increasing transparency and lowering the barriers for individuals to share their stories." --This > open-source platform allows for real-time crowdmapping and news updates from the ground to a centralized map. The usefulness of this > as, at least in regards to Occupy, is incredible. If This platform, or something like it, could be deployed on a Byzantium node and > federated in a way that each instance stores the mapping data and forwards it to other instances, then each pool of laptops on the > ground can have a map of what's going on where in their immediate vicinity, plus either forwarding the data via Serval/Forban to other > pools, or upstreaming to a Ushahidi instance that aggregates the sum on the WWW. > Thanks, the above projects are all very interesting and definitely in-line with what we're trying to offer. We will try to evaluate and intregrate these into future builds. > > BitCoin - http://bitcoin.org/ > -"Bitcoin is an experimental new digital currency that enables instant payments to anyone, anywhere in the world. Bitcoin uses > peer-to-peer technology to operate with no central authority: managing transactions and issuing money are carried out collectively by > the network. Bitcoin is also the name of the open source software which enables the use of this currency." --Might be getting a little > ahead of myself here, but Bitcoin has a fascinating structure for currency generation and transaction. From my understanding, the > minting of the currency is made possible by the facilitation of transactions involving existing bitcoins. As the project is > open-source, a clone of it that could operate over a mesh-network, or a scaled down version of it that could work within Byzantium, > could be a feasible way of facilitating bartering on the ground, first with digital services, and eventually with analog services and > commodities. Bitcoin is quite a fascinating idea in many ways, however I don't think it is very relevant to Byzantium's core mission. I'm very sure it could be operated over a mesh network like Byzanitum. However, I don't really see how Bitcoin would be useful from an emergency response perspective. I could be wrong and I would be glad to hear opposing arguments. However, for now I don't think it will be part of the standard distribution. (Of course, there's nothing stopping you from installing it yourself or making a re-spin of our distribution.) > > I hope I haven't completely overloaded you with text. A lot of this is more food for thought than anything, but to whatever extent I > can put any of this together by mid September for the Occupy event is what I'll do. I really think this would be an incredible testing > ground for a lot of these projects, just as I think these projects would be a valuable addition to the Occupy toolbelt. I'll be getting > in contact with the teams working on each of them over the next several days with similar emails outlining the suite of tools I have in > mind, and encouraging them to support operability over the Babel protocol used in Byzantium. Hopefully all you brilliant folks can find > a way to make your software work together. It may even be worth reaching out to them directly. I understand that open-source projects > are often done in spare time on shoestring budgets though, so I don't expect all of this just handed to me because I wrote an email. If > all you can do is wish me good luck, I'll take that too. We are currently doing our best to reach out to other mesh networking projects and communities to collaborate on a set of standards and best practices for interoperability. We are working on a proposal which will be presenting in early October. Byzantium is somewhat narrowly focused on one piece of the problem-set, so we are eager to collabroate with complimentary projects who are solving other pieces (such as Serval and Commotion Wireless). However, we are currently working in our spare time on almost no budget so don't expect overnight progress. Our next release won't happen for several months so the v0.2a release will still be the most current version in mid-September. We don't have the resource to make an updated release for S17. Even if we did, there haven't been any significant changes to warrant it. Good luck, and please let us know how Byzanitum does "in the field". We are always eager to see user feedback and bug reports. > > Once again, let me know if anyone from HacDC or the Byzantium project is planning to attent S17 in NYC, as I'd love the chance to meet > up and do some old school analog social networking. > > Regards, > > -Ryan > > Thank you, Ben the Pyrate -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBAgAGBQJQNpCMAAoJEMco5sYyM+0w92UH/jTGRJt1+6CuXrOvrFEYT86K TVUDQ3fHOcbjswlVQcmRgOlZjlaR629SycIK4pdPwF18kwaggWY5hKAa0aCKc+pj LINq0xRxh7Ek09Cl/gxYHPBNTcNfZR/YyEaD2Uwri/Q2j3yAGbI+AgN+Zltaedhl TQyX5il2m8ayiB1CUuXUHzfzIXD1oPQoe3CS2dTUL6tVX4GiwdAhpRABR9x9mb9M jRARh9pvZY86K3XsKkAJ929yJBTNjfluELrIdhp/5hpF1Gzh2QxI/EcZBKFp+K99 74bciD+FE6V0krV3a0Z3klde/X7Q62Fa0TChPuEBsx9IAE+jimtCqTxIA9FhHM0= =ar8a -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "Project Byzantium (Emergency Mesh Networking)" group. To post to this group, send email to Byzantium at hacdc.org. To unsubscribe from this group, send email to Byzantium+unsubscribe at hacdc.org. For more options, visit this group at http://groups.google.com/a/hacdc.org/group/Byzantium/?hl=en. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From ei8fdb at ei8fdb.org Thu Aug 23 08:56:57 2012 From: ei8fdb at ei8fdb.org (Bernard Tyers - ei8fdb) Date: Thu, 23 Aug 2012 16:56:57 +0100 Subject: [liberationtech] TeliaSonera and Azerbaijan, Belarus and Uzbekistan Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Some wonderful quotes from Mr. Nyberg: "the company itself could not solve the underlying problem that undemocratic governments could abuse their legal right to access and shut down telecoms networks" "We need help from national and international organisations whether that be the UN, EU, (or) NGOs if we are going to make any significant impact on human rights" "If we experience a situation where under a certain government there are serious breaches of human rights on a regular basis ... we must be ready to have a debate in the company whether we should be in that country or not" Telecoms firm TeliaSonera to focus more on human rights http://uk.reuters.com/article/2012/08/23/uk-telia-responsibility-idUKBRE87M0LC20120823 (Reuters) - TeliaSonera (TLSN.ST), burnt by charges it cooperated with authoritarian governments, said on Thursday it would focus more on human rights issues where it operates and is eying Myanmar as a possible target for expansion. The Nordic and emerging markets telecoms group, in which Sweden has a 37 percent stake, came under scathing criticism earlier this year for allowing authorities in Azerbaijan, Belarus and Uzbekistan to access its network to keep tabs on anti-government activists. CEO Lars Nyberg said Telia, which has businesses across central Asia as well as the Nordic and Baltic regions, would take measures to bolster the protection of freedom of expression and privacy. Requests from governments to close sites or networks would now be dealt with at board level not nationally, he said. Telia will also cooperate with 10 other companies - including Alcatel-Lucent (ALUA.PA), France Telecom (FTE.PA), Nokia Siemens Networks NOKI.UL Vodafone (VOD.L), AT&T (T.N) and Telefonica (TEF.MC) - to draw up rules on how telecoms firms implement the United Nation's guidelines for preserving privacy and freedom of expression. Although Telia is not considering withdrawing from any of the countries in which it operates and has management control, it would have to consider that possibility if the situation merited it, Nyberg said. "If we experience a situation where under a certain government there are serious breaches of human rights on a regular basis ... we must be ready to have a debate in the company whether we should be in that country or not," Nyberg said. Telia has been in hot water again in recent days after its daughter company in Tajikistan blocked news sites at the request of the government. Nyberg said the company itself could not solve the underlying problem that undemocratic governments could abuse their legal right to access and shut down telecoms networks. "We need help from national and international organisations whether that be the UN, EU, (or) NGOs if we are going to make any significant impact on human rights," he said. Telia said criticism of its actions in central Asia has not undermined the company in countries without full democracy and where telecoms markets are set to develop fast. Nyberg said that Telia was looking at the possibility of entering the market in Myanmar where, after decades of military rule, the government has introduced sweeping reforms, including allowing elections, easing rules on protests and censorship and freeing dissidents. Nyberg said the developments were such that Telia could now consider operating in the country, where the telecoms network for the country's 60 million people is barely developed. "Two years ago I would never have thought that we could even think about going into Myanmar," he said. "But what has happened in Myanmar over the last 18 months allows us to consider if we could do something in Myanmar." (Reporting by Simon Johnson and Olof Swahnberg; Editing by David Cowell) Some history on the story: TeliaSonera 'profits by helping dictators spy' http://www.thelocal.se/40334/20120418/ "The Black Boxes" - How Teliasonera Sells to Dictatorships (Swedish TV Uppdrag Granskning Mission investigation) (VIDEO) http://archive.org/details/theBlackBoxes-HowTeliasoneraSellsToDictatorshipsuppdragGranskning Teliasonera i hemligt samarbete med diktaturer (Swedish only) http://www.svt.se/ug/teliasonera-i-hemligt-samarbete-med-diktaturer - -------------------------------------- Bernard / bluboxthief / ei8fdb IO91XM / www.ei8fdb.org -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQEcBAEBAgAGBQJQNlLKAAoJENsz1IO7MIrrtKUH/3x+PJ0AdBZTgS5aTErhLZl+ XT3HuufzE5Z4Cf2hTrpjyc41BHOACWb39i4EFArepEjCUm1HknRtrW/QtyFJgTXY L6sronQwLiFinIn8T8dS6YEiabNiIDj47wTjzsprKwCUyBOmWa1KzMpcsubdaJUO rJt6TObxa+6xkCpeuGg0oFimTDXOU7TFmqroq4y3GRQxnMhQCnfj0StaxO2t0RTA r+3vsECNjf6kTjug2ouVV2qODDN1Sqh4fNuax5n4sb7B/4sDwyypX3iqO6taQTwa aUtZAu3Di+O/g0JLS4N1jJOGD7ns1k/5XcZIWev4S+ZKuY2WfB4igLS84LvxwCY= =+dAk -----END PGP SIGNATURE----- -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From m0nk.omg.pwnies at gmail.com Thu Aug 23 19:03:14 2012 From: m0nk.omg.pwnies at gmail.com (m0nk) Date: Thu, 23 Aug 2012 19:03:14 -0700 (PDT) Subject: [HacDC:Byzantium] Collaboration? Message-ID: So I'm way late to the game on this but I was wondering if there is something we could do to collaborate on mesh projects. It seems there are way to many splinter groups wanting the same thing but are slightly too divergent to combine. I just spoke @ DefCon XX with my Android Mesh project: SPAN More info here: http://youtu.be/RrI3MUnExJM In a nutshell, we have injected transparent proxies into the smart phones below the network stack to control routing. This allows us to be just another network interface and all apps behave as normal. anyway, is there interest in chatting / sharing? We are open source and are mostly interested in routing protocols and security, the initial mesh implementation was more of a platform to allo my team to explore these things easily. Thanks! m0nk -- You received this message because you are subscribed to the Google Groups "Project Byzantium (Emergency Mesh Networking)" group. To view this discussion on the web visit https://groups.google.com/a/hacdc.org/d/msg/Byzantium/-/pe5O_7dNfsgJ. To post to this group, send email to Byzantium at hacdc.org. To unsubscribe from this group, send email to Byzantium+unsubscribe at hacdc.org. For more options, visit this group at http://groups.google.com/a/hacdc.org/group/Byzantium/?hl=en. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bombastry at eclosiond.com Fri Aug 24 00:13:30 2012 From: bombastry at eclosiond.com (=?koi8-r?B?887J2tggzsHMz8fJ?=) Date: Thu, 23 Aug 2012 23:13:30 -0800 Subject: =?koi8-r?B?8PX06SDw8unt5e7l7unxIOvp8PLhIPcg7uHs7+fv9+/tIPDs4e7p8u/3?= =?koi8-r?B?4e7p6Q==?= Message-ID: <000d01cd81bf$950ebc80$6400a8c0@bombastry> 28 августа 2012 г. ОФФШОРНЫЙ БИЗНЕС: КИПР ДО И ПОСЛЕ РАТИФИКАЦИИ ПРОТОКОЛА. ДЕТАЛЬНЫЙ АНАЛИЗ И ПРАКТИКА ИСПОЛЬЗОВАНИЯ. (Налоги на Кипре √ не пересекая грань между оптимизаций и уклонением. Схемы с использованием Кипрских компаний) \Моск. код/ 7922I22 и 8 (499) Ч45Ч095 Цель: Для участия мы приглашаем как слушателей, уже использующих кипрские компании в своей работе, так и тех, кто только планирует воспользоваться данным инструментом налогового планирования, конфиденциальности и защиты активов. Содержание семинара можно разделить на блоки: * последствия ратификации Протокола к соглашению об избежании двойного налогообложения между РФ и Кипром; * практика использования и сопровождения кипрских компаний; * пути применения Кипра в налоговом планировании; * налогообложение на Кипре (с детальным рассмотрением НДС). По мнению автора, ратификация Протокола не приведет к массовой реструктуризации или отказам от налоговых решений с использованием Кипра, поскольку данный Протокол лишь "перетасовывает" сложившиеся принципы работы. Во многих случаях оптимальным решением будет "косметическая" коррекция договорных отношений и хозяйственных операций, которой будет уделено особое внимание в рамках данного семинара. Тщательного рассмотрения заслуживает налоговое законодательство Кипра и его "пересечение" с российским в налоговых решениях. Например, в уставной капитал кипрских компаний можно вложить не только денежные средства, но и акции российских компаний. Налоговые последствия при этом и методика оценки вклада в натуральной форме вызывают особенно много вопросов слушателей. При использовании кипрских компаний многие сталкиваются с проблемами в виде непредвиденных налоговых обязательств, штрафов и пеней, возникающих из-за незнания тонкостей и особенностей налоговой системы ЕС и Кипра, эволюционирующей столь же стремительно, как и российская. В рамках данного семинара будут рассмотрены детали налоговой системы Кипра, при этом особое внимание будет уделено НДС √ наиболее сложному налогу, который регулируется не только местным законодательством, но и многочисленными европейскими директивами. Не менее важны технические вопросы использования кипрских компаний. К сожалению, на практике взаимодействие с администратором, или регистрационным агентом, часто сопряжено с большим количеством трудностей, выливающимся в противостояние владельца компании и неторопливых кипрских юристов. Также многие сталкиваются с непрозрачностью ценообразования на отдельные услуги, особенно на аудит и номинальный сервис. Данный семинар поможет Вам оптимизировать свои отношения с администратором, и определить: за что, кому и когда Вы должны платить при использовании кипрских компаний. Особенностью данного семинара является практическая направленность и отсутствие лишних теоретических и исторических отступлений. Семинар строится в форме интерактивного практического занятия при постоянном взаимодействии с аудиторией с разбором большого количества примеров и подробным описанием налоговых, финансовых и правовых последствий или рисков. Программа: НАЛОГИ НА КИПРЕ √ НЕ ПЕРЕСЕКАЯ ГРАНЬ МЕЖДУ ОПТИМИЗАЦИЙ И УКЛОНЕНИЕМ * Налог на прибыль (Corporate Income Tax); предварительный налог на прибыль (Preliminary Tax); налог на оборону (Special Defence Contribution); налог на прирост капитала (Capital Gains Tax) и т.д. * Пути минимизации налоговых отчислений на Кипре: практические примеры и анализ ошибок * Налогообложение операций с ценными бумагами: пределы освобождения * Налоговый календарь на 2012 год: сдача отчетностей, оплата налогов и сборов * Изменения кипрского законодательства 2012 и тенденции 2013 * Ратификация Протокола к Соглашению между РФ и Кипром: кто понесет убытки, а кому удастся на этом заработать? * Как не попасть в "петлю" негативных нововведений Протокола? НДС ПРИ ИСПОЛЬЗОВАНИИ КИПРСКИХ КОМПАНИЙ * Когда нужно получать номер НДС (VAT number) и можно ли это сделать в другой стране ЕС? * Применение механизма ⌠reverse charge■ * Анализ основных европейских директив на предмет определения места оказания услуг (⌠the place of supply■) * Обложение НДС услуг, оказанных через интернет (⌠electronically supplied services■) * Сложные случаи экспорта-импорта: когда возникает НДС? * Налоговые последствия по НДС при совершении трехсторонних сделок в ЕС (triangular operations) * НДС и роялти, консалтинг, маркетинг √ всегда ли можно принять к вычету всю сумму входящего НДС? СХЕМЫ С ИСПОЛЬЗОВАНИЕМ КИПРСКИХ КОМПАНИЙ * Владение недвижимостью с использованием кипрских компаний * Займы: анализ правил тонкой капитализации и прочих ограничений (ст.269 НК РФ), риски и примеры ошибок * Роялти: риски, оптимальная величина размеров выплат, НДС, экономическое и документальное обоснование (⌠substance■) * Операции с ценными бумагами и векселями * ЗПИФы √ применимы ли после ратификации Протокола? * Построение комплексной действующей холдинговой структуры и дивиденды * Схемы коллективных инвестиций и инвестиционные фонды на Кипре РАБОТА С АДМИНИСТРАТОРОМ (АГЕНТОМ) И АУДИТОРОМ КИПРСКОЙ КОМПАНИИ * Наличие представительства администратора в Москве: преимущество или недостаток? * Как не дать администратору и аудитору обмануть Вас? Примеры и рекомендации * За что кипрские администраторы деньги брать не должны? * Переход к другому администратору: "подводные камни" * Принципы ценообразования аудиторских услуг и пути минимизации их стоимости * Вправе ли кипрский аудитор одновременно проверять и вести отечность? * Анализ среднерыночных цен и сроков оказания услуг: оцените своего администратора. РЕАЛЬНЫЙ ОФИС НА КИПРЕ * Сравнение "виртуального" и реального офисов * Случаи, когда реальное присутствие на Кипре необходимо * Инструменты создания видимости контроля компании с территории Кипра * Наем персонала в кипрскую компанию: налоговые и практические вопросы НОМИНАЛЬНЫЙ СЕРВИС И КОНФИДЕНЦИАЛЬНОСТЬ * Документы, регламентирующие возникающие отношения: на что следует обратить внимание? * Раскрытие информации в связи с ратификацией Протокола * Полномочия номинальных директоров и акционеров: где границы и кем они устанавливаются? * Что делать, если номинальный директор отказывается подписывать документы? БАНКОВСКИЕ СЧЕТА * Анализ надежности кипрских банков на фоне ухудшения ситуации в ЕС * Пути снятия средств со счета кипрского банка в России * Раскрытие банковской тайны √ факты и выводы * Тарифы популярных кипрский и прибалтийских банков. Использование SEPA. * Выплаты зарплаты путем выпуска карт к счетам в кипрских банках Стоимость участия: 9 000 рублей Информацию можно получить по телефонам: 8 (Ч95) 792/2I22 <<<>>> +7 (495) 7922I/22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 11577 bytes Desc: not available URL: From m0nk.omg.pwnies at gmail.com Thu Aug 23 23:27:00 2012 From: m0nk.omg.pwnies at gmail.com (monk dot) Date: Fri, 24 Aug 2012 02:27:00 -0400 Subject: [HacDC:Byzantium] Collaboration? Message-ID: The serval project is really cool, and I like it a ton. The problem I have is that they still force the end user to run custom software written for the mesh. That is the main reason we went with a transparent proxy at a low layer in the android stack. It's still an offshoot of OLSRd, and though routing is improved I still think we can do better. By we I mean the community, not me personally. (I have ideas, but by no means to I presume to be smarter than anyone) We are on the github @: https://github.com/monk-dot I honestly have little ego in this and don't really care if our project takes off... What I really want is for Mesh networking to be a viable and reliable alternative to what is out there now. I don't like infrastructure that dies, I don't like governmental ability to shut down the internet, I don't like subway stations not having connections.... I don't see a point to it anymore. We should be help and not hindered by technology. I am speaking @ DerbyCon in Louisville, KY about our project soon, but what I really want to talk about is why we need mesh networks and how to get there. Again, I honestly don't care who "wins", I just want a mesh that I can use. If it's yours thats awesome, if it's mine thats awesome (but more work for me), if it's someone we don't know yet that also awesome (to me). I'm hoping we can share our routing insight with the community at large. We have a nice niche space (lots of extra sensors and info) in smart phone/mobile that desktops and the like don't have. My real personal interest for research is in routing protocols, mesh leveling power and bandwidth consumption, porting BitTorrent to the mesh so we can use the entire network as a redundant RAID device... Please let me know how I can help and contribute besides simply evangelizing the concepts and benefits. They seem so self evident to me at this point... thanks! m0nk On Thu, Aug 23, 2012 at 10:30 PM, Ben Mendis wrote: > Hi m0nk, > > I agree that it looks like your project is complementary to what we're > working on. And you're right, it would be great if more mesh projects could > work together. We are actually headed to Barcelona in October to attend the > International Summit for Community Wireless Networks ( > http://wirelesssummit.org/). We will be presenting our proposal for > inter-mesh interoperability and seeking feedback from other, most > established mesh networking projects and communities. We are hoping to > build out the necessary standards and best practices to allow all of the > different projects who are working in this problem space to work with each > other rather than compete against each other. > > Until we have those standards ironed out, you can still design your > network to be interop-ready by conforming to the same BSSID value used by > Project Byzantium and Commotion Wireless: 02:CA:FF:EE:BA:BE. This will put > your nodes on the same ad-hoc cell meaning that devices will be able to > hear each other, from there it's just a matter of negotiating a common mesh > routing protocol and addressing scheme. > > > https://github.com/Byzantium/Byzantium/wiki/Setting-up-a-mesh-node-without-byzantium. > > Having watched your youtube video, I'm curious how you would > compare/contrast your SPAN project to the Serval Project ( > http://www.servalproject.org/). It seems like your proposal is very > similar to what they are working on. > > I look forward to working with you on this important problem space. > Best regards, > Ben the Pyrate > > > On 08/23/2012 10:03 PM, m0nk wrote: > > So I'm way late to the game on this but I was wondering if there is > something we could do to collaborate on mesh projects. It seems there are > way to many splinter groups wanting the same thing but are slightly too > divergent to combine. > > I just spoke @ DefCon XX with my Android Mesh project: SPAN > More info here: > http://youtu.be/RrI3MUnExJM > > In a nutshell, we have injected transparent proxies into the smart > phones below the network stack to control routing. This allows us to be > just another network interface and all apps behave as normal. > > anyway, is there interest in chatting / sharing? We are open source and > are mostly interested in routing protocols and security, the initial mesh > implementation was more of a platform to allo my team to explore these > things easily. > > Thanks! > m0nk > -- > You received this message because you are subscribed to the Google Groups > "Project Byzantium (Emergency Mesh Networking)" group. > To view this discussion on the web visit > https://groups.google.com/a/hacdc.org/d/msg/Byzantium/-/pe5O_7dNfsgJ. > To post to this group, send email to Byzantium at hacdc.org. > To unsubscribe from this group, send email to > Byzantium+unsubscribe at hacdc.org. > For more options, visit this group at > http://groups.google.com/a/hacdc.org/group/Byzantium/?hl=en. > > > -- You received this message because you are subscribed to the Google Groups "Project Byzantium (Emergency Mesh Networking)" group. To post to this group, send email to Byzantium at hacdc.org. To unsubscribe from this group, send email to Byzantium+unsubscribe at hacdc.org. For more options, visit this group at http://groups.google.com/a/hacdc.org/group/Byzantium/?hl=en. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From mikeperry at torproject.org Fri Aug 24 15:12:42 2012 From: mikeperry at torproject.org (Mike Perry) Date: Fri, 24 Aug 2012 15:12:42 -0700 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: Thus spake Ted Smith (tedks at riseup.net): > On Mon, 2012-08-20 at 10:33 +0300, Maxim Kammerer wrote: > > Hello gentlemen, > > > [1] http://pastebin.com/hgtXMSyx > > I ran this script on the current consensus. The full results (the > nodes-sniff-summary file) are below my signature. How did you compile > the country-codes to IPs list? That wasn't produced by the script. > > It's comforting that this approach yields quickly diminishing returns. > Going from 25 to 60 networks only gets you a 10% increase in networks > surveillance (if I'm reading the output correctly), and returns plateau > entirely at that point (I'm considering about two percent to be in the > noise, which may not be appropriate to this domain). > > Also, it's not immediately clear whether eavesdropping those networks > would actually get you strong enough correlation to accurately > de-anonymize users[1]. If our rodent(?) friend(s?) could comment on > this, I'd appreciate their expertise. The Raccoon has made a believer out of me, but there are some limits to both of his/her proofs.. The full proofs can still be found here: http://web.archive.org/web/20100416150300/http://archives.seul.org/or/dev/Sep-2008/msg00016.html https://lists.torproject.org/pipermail/tor-dev/2012-March/003347.html The actual numbers from the examples of the first proof are affected by the resolution of the data retention. The core concept of the proof seems to hold no matter what (that full dragnet n^2 correlation is hard, and the amount of similar co-incident traffic - aka the base rate - is what makes it hard), but if the adversary has full observation of *all* traffic data, they *might* be able to do better than 99.9% true positive rate. It's not clear that low-resolution connection-level data retention or even sampled netflow data can provide anywhere near that true positive rate, though. A full adversary may also get to combine repeat observations (assuming it is possible to identify them as from the same user), but the post mentions that. Incidentally, my guess is that's probably one of the reasons for the huge boondoggle^W datacenter in Utah. They probably realized that to reliably track large botnet activity, they really needed to log all data forever. Well, keep sitting on the unpublished 0day software vulnerabilities, guys. That should totally help you solve both those problems, once and for all. Oh wait. ;) Anyways, the key thing I think the first proof tells us is that even sloppy defenses against correlation attacks are likely to work against dragnet surveillance/data retention, especially if you have a lot of co-incident traffic to blend in with and if the data retention resolution is low. I think this alone can justify experimentation with traffic padding to/from Guard nodes, where bandwidth is relatively cheap and plentiful. It especially justifies minimal amounts of Guard node padding to defend against the single-ended version of the end-to-end correlation attack, which is also known as the "website traffic fingerprinting attack". The single ended version is even *more* vulnerable to the properties of background traffic than the double-ended version, and has far fewer reliably recognizable traffic features to extract from data streams as well. See this blog post and its links for more details: https://blog.torproject.org/blog/experimental-defense-website-traffic-fingerprinting It's my personal opinion that we should also experiment with Guard padding against the website traffic fingerprinting attack, and see how far that gets us against e2e correlation while we're at it. Unfortunately, current academic religious dogma tends to hold that correlation is unbeatable no matter what. This publication and research bias already has hindered and will likely continue to hinder research into viable defenses :(. The second proof wrt tagging attacks scared the crap out of me. However, the "c/n" compromise result at the end hinges crucially on nodes that fail circuits being able to attract additional traffic to make up for it. The bandwidth authorities might do this to a certain extent currently, and will certainly do it if operated in "PID feedback mode". However it's still not clear that the 3 guard node round-robin circuit selection properties of Tor wouldn't end up also hampering the attack against specific clients (unless the Guard nodes' keys were stolen and the attack is locally targeted). Either way, it's caused me to drive Nick nuts by pushing hard to include at least *some* kind of simple defense for circuit failure attacks on the client-side. How much of that actually survives in 0.2.3.x in a functional form remains to be seen :/. P.S. Incidentally, you used to be able to get the full copy of the first proof in the old seul archives at http://archives.seul.org/or/dev/Sep-2008/msg00016.html, but since seul is currently down with unknown hardware and disk issues, http://web.archive.org/web/20100416150300/http://archives.seul.org/or/dev/Sep-2008/msg00016.html might be the last full public copy other than your repost. I've added the Raccoon on Cc so s/he can hopefully do a full repost if the seul archives end up being destroyed forever. -- Mike Perry _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Aug 24 09:45:26 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 24 Aug 2012 18:45:26 +0200 Subject: [HacDC:Byzantium] Collaboration? Message-ID: <20120824164526.GQ12615@leitl.org> ----- Forwarded message from monk dot ----- From eugen at leitl.org Fri Aug 24 09:56:13 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 24 Aug 2012 18:56:13 +0200 Subject: [HacDC:Byzantium] Collaboration? Message-ID: <20120824165613.GS12615@leitl.org> ----- Forwarded message from m0nk ----- From eugen at leitl.org Fri Aug 24 10:15:19 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 24 Aug 2012 19:15:19 +0200 Subject: [liberationtech] Introducing 'Tent' - The decentralized social web Message-ID: <20120824171519.GX12615@leitl.org> ----- Forwarded message from Yosem Companys ----- From eugen at leitl.org Fri Aug 24 12:22:00 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 24 Aug 2012 21:22:00 +0200 Subject: [HacDC:Byzantium] Re: [HacDC:BOD] Inquiry from website... Byzantium at Occupy S17? Message-ID: <20120824192200.GJ12615@leitl.org> ----- Forwarded message from Ben Mendis ----- From eugen at leitl.org Fri Aug 24 13:23:53 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 24 Aug 2012 22:23:53 +0200 Subject: [liberationtech] The Dictator's Practical Guide to Internet Power Retention, Global Edition - Boing Boing Message-ID: <20120824202353.GT12615@leitl.org> ----- Forwarded message from Yosem Companys ----- From eugen at leitl.org Fri Aug 24 13:36:52 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 24 Aug 2012 22:36:52 +0200 Subject: Copyright infringement notice Message-ID: <20120824203652.GA12615@leitl.org> ----- Forwarded message from "Anne P. Mitchell, Esq." ----- From eugen at leitl.org Fri Aug 24 13:37:33 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 24 Aug 2012 22:37:33 +0200 Subject: [liberationtech] NYT Op-Doc on NSA Whistleblower William Binney Message-ID: <20120824203733.GB12615@leitl.org> ----- Forwarded message from "James S. Tyre" ----- From eugen at leitl.org Fri Aug 24 13:47:46 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 24 Aug 2012 22:47:46 +0200 Subject: [liberationtech] NYT Op-Doc on NSA Whistleblower William Binney Message-ID: <20120824204746.GG12615@leitl.org> ----- Forwarded message from Gregory Foster ----- From eugen at leitl.org Fri Aug 24 13:59:09 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 24 Aug 2012 22:59:09 +0200 Subject: [liberationtech] TeliaSonera and Azerbaijan, Belarus and Uzbekistan Message-ID: <20120824205909.GK12615@leitl.org> ----- Forwarded message from Bernard Tyers - ei8fdb ----- From mk at dee.su Fri Aug 24 16:51:29 2012 From: mk at dee.su (Maxim Kammerer) Date: Sat, 25 Aug 2012 02:51:29 +0300 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: On Sat, Aug 25, 2012 at 1:12 AM, Mike Perry wrote: > The Raccoon has made a believer out of me, but there are some limits to > both of his/her proofs.. The full proofs can still be found here: > http://web.archive.org/web/20100416150300/http://archives.seul.org/or/dev/Sep-2008/msg00016.html Wrt. the first proof, it seems to me that the assumed correlation accuracy rate of 99.9% is incredibly low, and I think that the Raccoon recognized that by referring to sampling and retention at the end of his post. With the targeted attack that's similar to bExample 3b in Raccoon's post that I described in my previous comment here, where one analyzes all exit traffic without missing packets, I would expect the correlation accuracy (and as a result, match confidence) to exponentially approach 100% very quickly with the number of relevant packets seen, and extremely quickly if the traffic is interactive (i.e., browsing). Actually, c/n of 30% in bExample 3b is close to the 25% that's discussed in the OP here, so let's redo the example with c/n=25% and different correlation accuracies (leaving the other numbers intact): (using bbc -lb) ca = 0.999 pm = (1/5000) * (0.25)^2 ca*pm / (pm*ca + (1-pm)*(1-ca)) ca = 0.999 .01233363786760166917 ca = 0.9999 .11110246894375430565 ca = 0.99999 .55555617284636495961 ca = 0.999999 .92592671467910125759 ca = 0.9999999 .99206358969515668554 ca = 0.99999999 .99920064946444143613 ca = 0.999999999 .99992000739924807495 So reducing correlation accuracy error to 10^-9 will give you 99.99% confidence in end-to-end correlation match. I suspect that a few seconds of interactive traffic will give you a correlation accuracy that's much better than a 10^-9 error. -- Maxim Kammerer LibertC) Linux: http://dee.su/liberte _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bs.gifo at plitainfo.ru Sat Aug 25 08:59:33 2012 From: bs.gifo at plitainfo.ru (=?koi8-r?B?68HLIM3P1s7PINXK1Mkgz9Qg7uTz?=) Date: Sat, 25 Aug 2012 07:59:33 -0800 Subject: =?koi8-r?B?7sXEz8LSz9PP18XT1M7ZxSDQz9PUwdfdycvJLiDrwcsgzc/Wzs8g1crU?= =?koi8-r?B?ySDP1CDu5PMgwsXaINDP08zFxNPU18nK?= Message-ID: <000d01cd82d2$3c69eb90$6400a8c0@bs.gifo> 28 августа 2012г. Недобросовестные поставщики. Как сохранить вычеты, уйти от ответственности (код Москвы) 792/2I22 и 8 (495) 792.21.22 Цель: Курс даст слушателям ответ на то, как правильно заключать договоры и что делать, если он ошибся, но при этом хотел бы сохранить свои налоговые обязательства без изменений. Слушатели будут точно знать что и как отвечать налоговой инспекции в случае проверки таких контрагентов. Поймут, как можно уйти от НДС без последствий. Программа: * Установление предмета доказывания по делам о признании налоговой выгоды необоснованной. Рассмотрение необходимость установления реального ущерба бюджету. Установление размера требований по подобным делам. Взыскание всех ранее заявленных вычетов и расходов как нарушение принципа соразмерности и справедливости. Анализ аналогичной практики Европейского Суда. * Рассмотрение комплекса мер применяемых для проявления надлежащей осмотрительности и осторожности при выборе контрагента. Обоснование позиции, что фактически можно практически ничего не проверять. * Анализ требований по проверке контрагента предъявляемые налоговым органом без оснований. * Методические указания Минфина о назначении выездных налоговых проверок (включая Приказ ФНС от 22.09.10 ╧ ММB-7-2/461@, Приказ УФНС по г. Москве от 1 сентября 2008 г ╧409 и др.). * Методические указания Минфина по поиску недобросовестных контрагентов. Рассмотрение мер, которые планирует принять Минфин, Минюст по борьбе с однодневками. * Как защититься от претензий налогового органа о том, что контрагент: * Разбор основных ошибок допускаемых налоговыми органами в процессе доказывания получение налоговый выгоды (встречные проверки реально не проводятся, а данные берется из компьютерной системы учета, вместо допросов проводиться опрос, вместо экспертизы получаются заключения специалиста и т.п.). Как использовать ошибки (подробно). * Рассмотрение комплекса мер в целях защиты от незаконных допросов, осмотров, выемок, экспертиз и т.п. Анализ норм НК, АПК, судебной практики по оспариванию мероприятий налогового контроля. * Создание преюдиции для доказывания реальности сделки. * Способ ухода от признания налоговой выгоды необоснованной при заключении договоров с поставщиками при помощи посредника. Как построить договор, чтобы претензии по поставщикам нельзя было предъявить. * Уход от уплаты НДС с наценки путем: * Кто отвечает за работу с недобросовестными контрагентами (директор или бухгалтер) и в какой части. Рассмотрение основных законодательных инициатив и принятых в последнее время законов, направленных на борьбу с ╚однодневками╩. * Анализ гражданско-правовой ответственности за работу с ╚однодневками╩ возлагаемой на директора в рамках закона о несостоятельности. * Потеря документов по недобросовестным поставщикам. Налоговые последствия. Указания Минфина по привлечению к ответственности в таком случае. Способ защиты от налоговых претензий. * Анализ возможности рассмотрения любого налогового спора в Арбитражном суде г. Москвы, как способ обойти негативную практику конкретного региона. * Изменение практики компенсации судебных издержек. * Ответы на индивидуальные вопросы. Стоимость участия: 9 000 рублей За более подробной информацuей обpащайтеcь по тел: код (499) - ЧЧ5/Ч095 <<>> 8 Моск. код: 7922I22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5810 bytes Desc: not available URL: From brunetka113 at ruremont.ru Sat Aug 25 00:13:45 2012 From: brunetka113 at ruremont.ru (=?koi8-r?B?7s/X2cog2sHLz84gzyDC1cjV3sXUxQ==?=) Date: Sat, 25 Aug 2012 12:43:45 +0530 Subject: =?koi8-r?B?99PFIM7P19vF09TXwSDXIMLVyMfBzNTF0snJ?= Message-ID: <000d01cd8291$2a1aa330$6400a8c0@brunetka113> 28 августа 2012 г. Новый закон "О бухгалтерском учете" +7 499 445\ЧО*95 ; код (495) - 7_42/91.98 Цель: Новый закон "О бухгалтерском учете" вступает в силу с 2013 года. Подготовка к применению требований закона займет много времени, поэтому начинать освоение новых норм нужно заранее. Минфин РФ спланировал разработку основных нормативных документов по бухгалтерскому учету и внедрение в России МСФО до 2015 года. Разберемся в новых правилах, которые уже приняты и к тех, принятие которых √ дело ближайшего будущего. Программа: 1. Правовой контекст, в котором будет действовать новый закон "О бухгалтерском учете": глобальная реформа бухучета, ее стратегия и направления в ближайшем будущем; рост значения бухгалтерского учета; сближение бухгалтерского и налогового учетов за счет грядущих изменений в НК РФ. 2. Сфера применения закона: * Отмена освобождения от ведения учета плательщиков УСН с 2013 года, постановка учета "упрощенцами", возможности упростить бухучет и сблизить его с налоговым. * Обязательно ли ведение бухучета самозанятыми гражданами (ИП, адвокатами, учредившими адвокатские кабинеты, нотариусами и иными лицами, занимающимися частной практикой) с 2013 года? * Филиалы и представительства иностранных компаний √ обязанности по ведению бухучета по российским стандартам в качестве вспомогательного с 2013 года. 3. Объекты бухгалтерского учета: новые доминанты. Обязательный учет всех фактов хозяйственной жизни (в том числе, при недостаточности информации и отсутствии первичных документов): как это сделать практически? Денежное измерение объектов бухгалтерского учета (сравним подход с правилами оценки в налоговом учете). 4. Организация ведения бухучета на предприятии. Бухгалтерская служба или аутсорсинг? Может ли руководитель совмещать должность главбуха по новому закону? Каковы новые требования к главному бухгалтеру или аутсорсеру (образование, стаж работы и т.п.)? Новые критерии повышения квалификации бухгалтеров. 5. Новые грани ответственности главного бухгалтера. Новые риски аутсорсера в связи законом ╧ 402-ФЗ. 6. Закон о бухгалтерском документообороте: * Первичная документация по-новому. Готовимся к вступлению нового закона в силу заранее. Возможен ли отказ от унифицированных форм первичной документации и в какой степени он оправдан на практике? Обязательна ли печать на первичных документах? Возможности использования факсимильной подписи на первичном документе в 2013 году. Возможности внедрения и развития электронного документооборота. * Новые требования к учетным регистрам. * Бухгалтерская отчетность по-новому. Состав отчетности Требование нового законодательства по адаптации форм отчетности для нужд организации, рекомендации по такой адаптации. Новые адреса и периодичность представления отчетности с 2013 года. Когда согласно новому закону бухгалтерская отчетность считается составленной? Новые правила публикации отчетности с 2013 года. * Правила хранения бухгалтерской документации на основании закона. 7. Требование закона к организации внутреннего контроля совершаемых фактов хозяйственной жизни, а также ведения бухгалтерского учета и составления бухгалтерской (финансовой) отчетности. Как составить процедуры контроля и реализовать их? Стоимость участия: 8 900 рублей За более подробной информацuей обpащайтеcь по тел: 8 (495) 792.2I22 <<<>>> 8 (499) Ч45ЧО95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5198 bytes Desc: not available URL: From mikeperry at torproject.org Sat Aug 25 18:11:46 2012 From: mikeperry at torproject.org (Mike Perry) Date: Sat, 25 Aug 2012 18:11:46 -0700 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: Thus spake Maxim Kammerer (mk at dee.su): > On Sat, Aug 25, 2012 at 1:12 AM, Mike Perry wrote: > > The Raccoon has made a believer out of me, but there are some limits to > > both of his/her proofs.. The full proofs can still be found here: > > http://web.archive.org/web/20100416150300/http://archives.seul.org/or/dev/Sep-2008/msg00016.html > > Wrt. the first proof, it seems to me that the assumed correlation > accuracy rate of 99.9% is incredibly low, and I think that the Raccoon > recognized that by referring to sampling and retention at the end of > his post. With the targeted attack that's similar to bExample 3b in > Raccoon's post that I described in my previous comment here, where one > analyzes all exit traffic without missing packets, I would expect the > correlation accuracy (and as a result, match confidence) to > exponentially approach 100% very quickly with the number of relevant > packets seen, and extremely quickly if the traffic is interactive > (i.e., browsing). > > Actually, c/n of 30% in bExample 3b is close to the 25% that's > discussed in the OP here, so let's redo the example with c/n=25% and > different correlation accuracies (leaving the other numbers intact): > > (using bbc -lb) > ca = 0.999 > pm = (1/5000) * (0.25)^2 > ca*pm / (pm*ca + (1-pm)*(1-ca)) > > ca = 0.999 > .01233363786760166917 > ca = 0.9999 > .11110246894375430565 > ca = 0.99999 > .55555617284636495961 > ca = 0.999999 > .92592671467910125759 > ca = 0.9999999 > .99206358969515668554 > ca = 0.99999999 > .99920064946444143613 > ca = 0.999999999 > .99992000739924807495 > > So reducing correlation accuracy error to 10^-9 will give you 99.99% > confidence in end-to-end correlation match. I suspect that a few > seconds of interactive traffic will give you a correlation accuracy > that's much better than a 10^-9 error. Well, the argument over correlation accuracy comes down to observation resolution, feature extraction ability, and academic lab conditions versus reality. For an example, let's assume that the adversary cannot see inside of Guard TLS connections. With this assumption: if at any point there's concurrent Guard TLS activity from a single client (either other circuit activity, directory fetch activity, or circuit pre-building activity), then some or all of your fine-grained timing and size information features go out the window. To see the effects of this currently, consider: Is it *really* the case that only one connection in *a billion* experiences incidental concurrent activity that interferes with or obliterates high-resolution feature extraction? I think the actual rate of random (or deliberate) concurrent activity is much higher than that, especially for heavily used tor clients, and even more so if they are serving as bridges or relays. But, against high-resolution adversaries, the really interesting question is: How little real cover traffic is actually needed to obscure timing and size information to the point where the remaining features are insufficient for high rates of correlation success? And over how many observations can such activity be expected to survive for a given base rate of similar activity? I suspect that for relatively short-lived bursts of traffic like web site views and random webapp AJAX activity, we can actually do pretty well with very little effort and overhead. Especially against the one-ended version of the correlation attack: the website fingerprinting attack, but probably against both. But for long-lived or otherwise atypical connections, you're absolutely right. There's just a whole lot of information encoded there.. Almost any level of observation will likely be able to correlate such flows eventually, and it's also hard to imagine generalized padding techniques that could blend these flows with web traffic. Unfortunately, because academia has mostly concluded that this work is uninteresting and that all forms of this problem are generally "impossible", we have no solid answers to these types of questions wrt what can be done in practice. Perhaps it is merely because defense work is less sexy than attack work when it comes to getting publications. I don't know for sure. I haven't yet figured out exactly why CS academia is broken. There's a whole lot of symptoms, though... But anyway, failing real research, there's always the botnets, the drug war, and the aliens to guide us... Can I get three cheers for Big Data? After all, I'm sure we can trust Them to tell us how the science shakes out in the end, amirite? ;). -- Mike Perry _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From virtualadept at gmail.com Sat Aug 25 19:24:57 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Sat, 25 Aug 2012 22:24:57 -0400 Subject: [ZS] Project RES: #cryptoparties Message-ID: In response to Australia's new data rentention laws, Telecomix has begun spreading the meme and organizing cryptoparties - parties at which privacy, anonymity, and cryptographic technologies are taught to all and sundry - around the world. I would recommend that, as part of the privacy and anonymity parts of RES everyone look around for cryptoparties being held in their local areas and attending to receive training. I'm organizing one in the DC metroplex, most likely at HacDC for early September. Realtime updates: https://twitter.com/#!/search/?q=%23CryptoParty&src=hash The wiki is a little thin at the moment but people are beginning to capture information about local parties there: http://www.cryptoparty.org/wiki/CryptoParty -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From udhay at pobox.com Sat Aug 25 20:05:21 2012 From: udhay at pobox.com (Udhay Shankar N) Date: Sun, 26 Aug 2012 08:35:21 +0530 Subject: [silk] Fwd: Role of the US Tech Companies in Government Surveillance: A Lecture by Christopher Soghoian b Centre for Internet and Society Message-ID: For those in Bangalore, this sounds like fun. Udhay http://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance Role of the US Tech Companies in Government Surveillance: A Lecture by Christopher Soghoian Christopher Soghoian will deliver a lecture on the role US tech companies play in assisting government surveillance at the Centre for Internet & Society office in Bangalore on August 27, 2012. When Aug 27, 2012 from 05:00 PM to 07:00 PM Where The Centre for Internet & Society, Bangalore Your internet, phone and web application providers are all, for the most part, in bed with US and other foreign government agencies. They all routinely disclose their customers' communications and other private data to law enforcement and intelligence agencies. Worse, firms like Google and Microsoft specifically log data in order to assist the government. How many government requests does your ISP get for its customers' communications each year? How many do they comply with? How many do they fight? How much do they charge for the surveillance assistance they provide? Who knows? Most companies have a strict policy of not discussing such topics. The differences in the privacy practices of the major players in the telecommunications and internet applications market are significant. Some firms retain identifying data for years, while others retain no data at all; some voluntarily provide the government access to user data, while other companies refuse to voluntarily disclose data without a court order; some companies charge government agencies when they request user data, while others disclose it for free. For an individual, later investigated by the police or intelligence services, the data retention practices adopted by their phone company or email provider can significantly impact their freedom. Unfortunately, although many companies claim to care about end-user privacy, and some even that they compete on their privacy features, none seem to be willing to compete on the extent to which they assist or resist the government in its surveillance activities. Because information about each firms' practices is not publicly known, consumers cannot vote with their wallets, and pick service providers that best protect their privacy. This talk will pierce the veil of secrecy surrounding these practices. Based upon a combination of Freedom of Information Act requests, off the record conversations with industry lawyers, and investigative journalism, the practices of many of these firms will be revealed. ________________________________ Christopher's Personal Experience In the year 2006, the Federal Bureau of Investigation (FBI) raided Christopherbs home at 2.00 a.m. seizing his personal documents and computers. Two attorneys, Stephen Braga and Jennifer Granick came to his defence. With their expert assistance, Christopher was able to get back his possessions within three weeks, and FBIbs criminal and TSAbs civil investigations were closed without any charges being filed. Jennifer Granick came to Christopherbs assistance once again (joined by Steve Leckar) in 2010 after the Federal Trade Commissionbs Inspector General investigated Christopher for using his government badge to attend a closed-door surveillance industry conference. It was at that event that Christopher recorded an executive from wireless carrier bSprintb bragging about the eight million times his company had obtained GPS data on its customers for law enforcement agencies in the previous years. To know more, read Christopher Soghoianbs dissertation titled "The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance". [PDF, 1056 Kb] ________________________________ About Christopher Soghoian Christopher Soghoian is a privacy researcher and activist, working at the intersection of technology, law and policy. He is a Principal Technologist and Senior Policy Analyst at the American Civil Liberties Union and is based in Washington, D.C. Soghoian completed his Ph.D. at Indiana University in 2012, which focused on the role that third party service providers play in facilitating law enforcement surveillance of their customers. In order to gather data, he has made extensive use of the Freedom of Information Act, sued the Department of Justice pro se, and used several other investigative research methods. His research has appeared in publications including the Berkeley Technology Law Journal and been cited by several federal courts, including the Ninth Circuit Court of Appeals. Between the years, 2009-2010, he was the first ever in-house technologist at the Federal Trade Commission's Division of Privacy and Identity Protection, where he worked on investigations of Facebook, Twitter, MySpace and Netflix. Prior to joining the FTC, he co-created the Do Not Track privacy anti-tracking mechanism now adopted by all of the major web browsers. He is a TEDGlobal 2012 Fellow, was an Open Society Foundations Fellow between the years, 2011-2012, and was a Student Fellow at the Berkman Center for Internet & Society, Harvard University between 2008 and 2009. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From StealthMonger at nym.mixmin.net Sun Aug 26 03:40:13 2012 From: StealthMonger at nym.mixmin.net (StealthMonger) Date: Sun, 26 Aug 2012 11:40:13 +0100 (BST) Subject: Hawala on the big screen Message-ID: <20120826104013.EC5C9EAA9D@snorky.mixmin.net> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 For a dramatic and touching story of hawala in use, see the current film release "Premium Rush". Lots of bicycle action, too, if you like that. - -- -- StealthMonger Long, random latency is part of the price of Internet anonymity. anonget: Is this anonymous browsing, or what? http://groups.google.ws/group/alt.privacy.anon-server/msg/073f34abb668df33?dmode=source&output=gplain stealthmail: Hide whether you're doing email, or when, or with whom. mailto:stealthsuite at nym.mixmin.net?subject=send%20index.html Key: mailto:stealthsuite at nym.mixmin.net?subject=send%20stealthmonger-key -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.9 iEYEARECAAYFAlA57YIACgkQDkU5rhlDCl7vBACdGJLGsliniBne6LWctc2FZqxo gpgAnA0Ziyj+Y9bpQv2p5ZigXfSRHKfh =hR7W -----END PGP SIGNATURE----- From andst7 at gmail.com Sun Aug 26 08:20:31 2012 From: andst7 at gmail.com (Andrea St) Date: Sun, 26 Aug 2012 17:20:31 +0200 Subject: [tor-talk] Tor, Facebook and Google+ - my point of view Message-ID: I've thoroughly read the blog post about the position of Tor regarding the Online presence within Facebook and G+ and I'd like to use these short lines to express my point of view. Let me state in advance that I'm not particularly fond of neither FB nor G+ policies, but that does not prevent me to strongly think that Tor should be present whithin both these SN. First of all telling Twitter is a better place to stay and others should be avoided is not a suitable answer: Twitter has been known to censor HashTags, to sell the entire feed, just for example. On the second point I strongly believe in Tor's educational mission: avoiding a widespread used medium insetad of using it in the best possible way is IMHO very wrong. On the third point it should be taken into consideration that an unofficial BF Fan page is already present with 5000+ fans: the newborn one is in less than a week 300+ fans strong and there are numerous other unofficial smaller ones. In these pages users ask for help, write comments and feedbacks. The same is true for G+, where 100+ people has added Tor page in their circles. These numbers alone should demonstrate without further doubt that there is a more than sizable part of the users who strongly prefer to interact with the Tor Project using these SM channels instead of IRC. Even if some people strongly object to the use of these channel, I strongly believe that democracy itself is based on allowing users the same chance to express themselves in their preferred form, giving all the same chance to obtain what seem to be just and fair. It is not time to understand if Tor Project is ready or not to embrace these prerogatives and to open up to Social: if no-one cares likes and following a page is not mandatory, but for those who are eager to follow the chance to talk to the Tor Project will be there, even in "the enemy territory". You can even look at this as opening a representative place, a safe harbour, a little outpost directly within the enemy's line, giving chance to talk to users about our views of the SN and what we think is evil within their policies. It's time to take a strong and sure direction, without dubts. That, of course, will add-up to other more worldly problems of not being present: some people will surely think Tor is anachronistic, not fit for the new generations, and someone other could open up a fake "official" page with could lead to scams, wrong downloads etc... This is only my very humble opinion, open for discussion and, why not, for disagreement with me. Best, Andrea _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From buddha at germantown.ru Sun Aug 26 15:46:42 2012 From: buddha at germantown.ru (=?koi8-r?B?7sXEz8LSz9PP18XT1M7ZxSDQz9PUwdfdycvJ?=) Date: Mon, 27 Aug 2012 05:46:42 +0700 Subject: =?koi8-r?B?79TXxdTT1NfFzs7P09TYINrBINLBws/U1SDTIM7FxM/C0s/Tz9fF09TO?= =?koi8-r?B?2c3JIMvPztTSwcfFztTBzck=?= Message-ID: <000d01cd83dc$a9bea5e0$6400a8c0@buddha> 28 августа 2012г. (Недобросовестные поставщики.) Практические рекомендации как отвечать налоговой инспекции в случае проверки недобросовестных контрагентов и как можно уйти от НДС без последствий +7 Московский код: 7922I*22 : +7 (Ч95) 792\21.2*2 Цель: Курс даст слушателям ответ на то, как правильно заключать договоры и что делать, если он ошибся, но при этом хотел бы сохранить свои налоговые обязательства без изменений. Слушатели будут точно знать что и как отвечать налоговой инспекции в случае проверки таких контрагентов. Поймут, как можно уйти от НДС без последствий. Программа: * Установление предмета доказывания по делам о признании налоговой выгоды необоснованной. Рассмотрение необходимость установления реального ущерба бюджету. Установление размера требований по подобным делам. Взыскание всех ранее заявленных вычетов и расходов как нарушение принципа соразмерности и справедливости. Анализ аналогичной практики Европейского Суда. * Рассмотрение комплекса мер применяемых для проявления надлежащей осмотрительности и осторожности при выборе контрагента. Обоснование позиции, что фактически можно практически ничего не проверять. * Анализ требований по проверке контрагента предъявляемые налоговым органом без оснований. * Методические указания Минфина о назначении выездных налоговых проверок (включая Приказ ФНС от 22.09.10 ╧ ММB-7-2/461@, Приказ УФНС по г. Москве от 1 сентября 2008 г ╧409 и др.). * Методические указания Минфина по поиску недобросовестных контрагентов. Рассмотрение мер, которые планирует принять Минфин, Минюст по борьбе с однодневками. * Как защититься от претензий налогового органа о том, что контрагент: * Разбор основных ошибок допускаемых налоговыми органами в процессе доказывания получение налоговый выгоды (встречные проверки реально не проводятся, а данные берется из компьютерной системы учета, вместо допросов проводиться опрос, вместо экспертизы получаются заключения специалиста и т.п.). Как использовать ошибки (подробно). * Рассмотрение комплекса мер в целях защиты от незаконных допросов, осмотров, выемок, экспертиз и т.п. Анализ норм НК, АПК, судебной практики по оспариванию мероприятий налогового контроля. * Создание преюдиции для доказывания реальности сделки. * Способ ухода от признания налоговой выгоды необоснованной при заключении договоров с поставщиками при помощи посредника. Как построить договор, чтобы претензии по поставщикам нельзя было предъявить. * Уход от уплаты НДС с наценки путем: * Кто отвечает за работу с недобросовестными контрагентами (директор или бухгалтер) и в какой части. Рассмотрение основных законодательных инициатив и принятых в последнее время законов, направленных на борьбу с ╚однодневками╩. * Анализ гражданско-правовой ответственности за работу с ╚однодневками╩ возлагаемой на директора в рамках закона о несостоятельности. * Потеря документов по недобросовестным поставщикам. Налоговые последствия. Указания Минфина по привлечению к ответственности в таком случае. Способ защиты от налоговых претензий. * Анализ возможности рассмотрения любого налогового спора в Арбитражном суде г. Москвы, как способ обойти негативную практику конкретного региона. * Изменение практики компенсации судебных издержек. * Ответы на индивидуальные вопросы. Стоимость участия: 9 000 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: код (495) - 7.Ч2*9I.98 : 8 (495) 792_21*22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5912 bytes Desc: not available URL: From saftergood at fas.org Mon Aug 27 07:00:10 2012 From: saftergood at fas.org (Steven Aftergood) Date: Mon, 27 Aug 2012 07:00:10 -0700 Subject: Secrecy News -- 08/27/12 Message-ID: Format Note: If you cannot easily read the text below, or you prefer to receive Secrecy News in another format, please reply to this email to let us know. SECRECY NEWS from the FAS Project on Government Secrecy Volume 2012, Issue No. 85 August 27, 2012 Secrecy News Blog: http://www.fas.org/blog/secrecy/ ** GUIDANCE ON NUCLEAR TARGETING IS "TIGHTLY CONTROLLED" ** SCI NONDISCLOSURE AGREEMENT REQUIRES PREPUBLICATION REVIEW ** PRESIDENTIAL CLAIMS OF EXECUTIVE PRIVILEGE, AND MORE FROM CRS GUIDANCE ON NUCLEAR TARGETING IS "TIGHTLY CONTROLLED" U.S. government guidance on the targeting of nuclear weapons is perhaps the most tightly held of all national security secrets, and "fewer than twenty" copies of the President's instructions on the subject are extant within the entire Department of Defense. Following a November 2011 hearing of the House Armed Services Committee, Rep. Michael Turner (R-OH) asked "How many military and civilian personnel in the executive branch have full or partial access to nuclear employment and targeting guidance?" In newly published responses to questions for the record, Under Secretary of Defense James N. Miller said the answer was "a very small group of personnel in the executive branch." http://www.fas.org/irp/congress/2011_hr/nw-qfr.pdf "Even within the Department of Defense (DOD), access to this sensitive material is tightly controlled," Dr. Miller added. "Within the Department of Defense, fewer than twenty copies of the President's guidance are distributed in the Office of the Secretary of Defense, the Joint Staff, and U.S. Strategic Command." The nuclear weapons guidance issued by the Secretary of Defense and the Chairman of the Joint Chiefs to implement the President's instructions is somewhat more broadly disseminated. "Fewer than 200 copies of the most recent amplifying guidance issued by the Secretary of Defense were produced, and distribution was limited primarily to Office of the Secretary of Defense, the Joint Staff, U.S. Strategic Command, and other Combatant Commanders. The Chairman's guidance is distributed more widely within DOD (fewer than 200 copies), as the document assigns responsibilities to several defense agencies and the intelligence community. Commander, U.S. Strategic Command must issue guidance to his planners and forces in the field, so distribution is somewhat wider because of that need." What about congressional access? "How many personnel in the legislative branch have full or partial access to each level of guidance?", Rep. Turner asked. Dr. Miller declined to answer that question directly. "There is a long history of debate about providing the legislative branch access to this material," he said. "As a result, instances of providing access to a member of Congress and senior staff personnel have been quite limited and under restrictive terms." In fact, the history of debate over congressional access to nuclear targeting information was never conclusively resolved, as far as is publicly known. In 2000, then-Sen. Robert Kerrey criticized the Department of Defense repeatedly for refusing to provide the information. http://www.fas.org/sgp/news/2000/12/iaf122200.html "As elected representatives of the people, and with a Constitutional role in determining national security policy, Congress should have an understanding of the principles underpinning our nuclear policy. Both the guidance provided by the President and the details of the SIOP [nuclear weapons targeting plan] are necessary for us to make informed national security decisions," Sen. Kerrey said on the Senate floor on June 30, 2000. http://www.fas.org/sgp/congress/2000/kerrey.html Sen. Kerrey wrote to then-Secretary of Defense William Cohen seeking an explanation of the Department's policy on congressional access to nuclear targeting information. http://www.fas.org/sgp/congress/2000/kerrey2.html But no reply was ever received. In the newly released questions for the record, which address a multiplicity of nuclear policy issues, Rep. Turner also asked "How many military personnel have full or partial access to STRATCOM's OPLAN 8010?", referring to the U.S. Strategic Command nuclear war plan. "Full access to all portions of OPLAN 8010 is limited to our most senior leadership," replied Gen. C. Robert Kehler, STRATCOM Commander. For background on OPLAN 8010, see "Obama and the Nuclear War Plan" by Hans M. Kristensen, Federation of American Scientists, February 2010: http://fas.org/programs/ssp/nukes/publications1/WarPlanIssueBrief2010.pdf SCI NONDISCLOSURE AGREEMENT REQUIRES PREPUBLICATION REVIEW If the former Navy SEAL who co-authored a new book about killing of Osama bin Laden signed a non-disclosure agreement for access to "sensitive compartmented information" (i.e., classified intelligence information), then he was obliged to submit his manuscript to the government for prepublication review even if he believed that it contained no classified information. A sample SCI non-disclosure agreement that is used by the Department of Defense is here: http://www.fas.org/sgp/othergov/dd_1847_1.pdf If the book did contain classified information, then the author could conceivably be subject to criminal prosecution under the Espionage Act. But even if it did not contain classified information, its publication without prior review could be deemed a breach of contract, with the proceeds subject to seizure by the government. The government's authority to enforce a non-disclosure agreement in this way was affirmed by a federal court most recently in the case of USA v. Ishmael Jones. In that case, Jones (the pseudonym of a former CIA officer) published his manuscript without completing the prepublication review process. Last week, Adm. William H. McRaven of U.S. Special Operations Command condemned the disclosure of classified information by former special operators, as well as other forms of activism that tended to politicize the service. "While as retired or former service members, they are well within their rights to advocate for certain causes or write books about their adventures, it is disappointing when these actions either try to represent the broader S.O.F. community, or expose sensitive information that could threaten the lives of their fellow warriors," McRaven wrote in an email to all special operation personnel. http://www.defense.gov/news/newsarticle.aspx?id=117635 "We will pursue every option available to hold members accountable, including criminal prosecution where appropriate," he wrote, as reported by Kimberly Dozier of the Associated Press. "Today, U.S. Special Operations Forces are in 78 countries around the world supporting U.S. policy objectives," Adm. McRaven told Congress last March. The SOCOM budget request for FY2013 is $10.4 billion. "The FY 2013 budget includes 21 construction projects in nine states, one overseas, and one at a classified location," Adm. McRaven said in the 2012 SOCOM posture statement. http://www.fas.org/irp/congress/2012_hr/030612mcraven.pdf PRESIDENTIAL CLAIMS OF EXECUTIVE PRIVILEGE, AND MORE FROM CRS New and updated reports from the Congressional Research Service that Congress has not made available to the public include the following. Presidential Claims of Executive Privilege: History, Law, Practice, and Recent Developments, August 21, 2012: http://www.fas.org/sgp/crs/secrecy/R42670.pdf Congress's Contempt Power and the Enforcement of Congressional Subpoenas: Law, History, Practice, and Procedure, updated August 17, 2012: http://www.fas.org/sgp/crs/misc/RL34097.pdf Iraq: Politics, Governance, and Human Rights, updated August 21, 2012: http://www.fas.org/sgp/crs/mideast/RS21968.pdf An Overview of the "Patent Trolls" Debate, August 20, 2012: http://www.fas.org/sgp/crs/misc/R42668.pdf _______________________________________________ Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists. The Secrecy News Blog is at: http://www.fas.org/blog/secrecy/ To SUBSCRIBE to Secrecy News, go to: http://www.fas.org/sgp/news/secrecy/subscribe.html To UNSUBSCRIBE, go to http://www.fas.org/sgp/news/secrecy/unsubscribe.html OR email your request to saftergood at fas.org Secrecy News is archived at: http://www.fas.org/sgp/news/secrecy/index.html Support the FAS Project on Government Secrecy with a donation: http://www.fas.org/member/donate_today.html _______________________ Steven Aftergood Project on Government Secrecy Federation of American Scientists web: www.fas.org/sgp/index.html email: saftergood at fas.org voice: (202) 454-4691 twitter: @saftergood ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Aug 27 09:59:22 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 27 Aug 2012 18:59:22 +0200 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: <20120827165922.GR12615@leitl.org> ----- Forwarded message from Mike Perry ----- From eugen at leitl.org Mon Aug 27 10:01:33 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 27 Aug 2012 19:01:33 +0200 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: <20120827170133.GT12615@leitl.org> ----- Forwarded message from Maxim Kammerer ----- From btv8hthaqwc1ofjhpvr at iw.sa Mon Aug 27 15:35:50 2012 From: btv8hthaqwc1ofjhpvr at iw.sa (=?koi8-r?B?8NLP18XSy8Eg0MXS18ney8k=?=) Date: Tue, 28 Aug 2012 05:35:50 +0700 Subject: =?koi8-r?B?8MXS18ney8E6IN7UzyDJIMvByyDQ0s/XxdLRwNQgy8/O1NLPzMnS1cDd?= =?koi8-r?B?ycUgz9LHwc7Z?= Message-ID: <000d01cd84a4$4f2748d0$6400a8c0@btv8hthaqwc1ofjhpvr> "Первичка": что и как проверяют контролирующие органы 03 сентября 2012 г. +7 499 - 4Ч5-40\95 \\\/// 8 (499) ЧЧ5-Ч0_95 Программа: 1.Новый Закон о бухгалтерском учете √ новые требования к первичным документам. Новый порядок ведения кассовых операций. Электронный документооборот. Право подписи на документах, использование факсимиле. Печать на документах. Внесение исправлений в учетные документы. Копии первичных документов √ когда можем учесть в расходах. Несвоевременное получение документов. Некомплектные документы. Налоговые и административные штрафы за первичку. Организация документооборота в организации. Первичные документы по отдельным хозяйственным операциям: транспортная накладная и ТТН, ТОРГ-12, документы для учета ГСМ (талоны, топливные карты, путевые листы). Первичка по учету основных средств и МПЗ, командировочным расходам. Условные единицы в первичном документе. 2.Первичные документы для налогового учета. Новый порядок заполнения счетов-фактур, книги покупок и книги продаж по Постановлению Правительства от 26.12.2011г. ╧1137. Электронные счет-фактуры. "Факсимильная подпись на счете√фактуре не дает право на вычет" - так решил ВАС РФ. Оправдание сделки: договор подряда, консультационные услуги, маркетинговые исследования, договор аренды и др. Какими документами подтвердить реальные хозяйственные операции. Оформление первичных документов на вознаграждение за объем продаж, при возврате товара. 3.Хранение документации. Сроки и организация хранения документов. Ответственность руководителя и бухгалтера за хранение документации. Действия должностных лиц предприятия при утрате документов. 4.Если у Вас есть филиал: как организовать документооборот, где хранить, кто может проводить налоговый контроль филиала, как избежать штрафа за несвоевременное представление документов налоговым органам. 5.Как работают с "первичкой" налоговые и правоохранительные органы. Какие документы налогоплательщика могут подтверждать получение необоснованной налоговой выгоды по критериям Постановления Пленума ВАС РФ от 12.10.2006 ╧53. Когда и какие первичные документы могут служить основанием для возбуждения уголовного дела в отношении должностных лиц организации за неуплату налогов. Борьба с фирмами - "однодневками" продолжается с учетом нового ФЗ от 07.12.2011г. ╧419-ФЗ. Информацию можно получить по телефонам: 8 Моск. код: 7Ч2\91_98 <<>> +7 (495)- 7429I*98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3525 bytes Desc: not available URL: From kmackl at project-smeta.ru Tue Aug 28 10:16:32 2012 From: kmackl at project-smeta.ru (=?koi8-r?B?8NLP18XSy8Eg0MXS18ney8k=?=) Date: Tue, 28 Aug 2012 09:16:32 -0800 Subject: =?koi8-r?B?8MXS18ney8E6IN7UzyDJIMvByyDQ0s/XxdLRwNQgy8/O1NLPzMnS1cDd?= =?koi8-r?B?ycUgz9LHwc7Z?= Message-ID: <000d01cd8538$7d008020$6400a8c0@kmackl> "Первичка": что и как проверяют контролирующие органы 03 сентября 2012 г. (495) 792_2I22 или 8 (Ч95) 79221\22 Программа: 1.Новый Закон о бухгалтерском учете √ новые требования к первичным документам. Новый порядок ведения кассовых операций. Электронный документооборот. Право подписи на документах, использование факсимиле. Печать на документах. Внесение исправлений в учетные документы. Копии первичных документов √ когда можем учесть в расходах. Несвоевременное получение документов. Некомплектные документы. Налоговые и административные штрафы за первичку. Организация документооборота в организации. Первичные документы по отдельным хозяйственным операциям: транспортная накладная и ТТН, ТОРГ-12, документы для учета ГСМ (талоны, топливные карты, путевые листы). Первичка по учету основных средств и МПЗ, командировочным расходам. Условные единицы в первичном документе. 2.Первичные документы для налогового учета. Новый порядок заполнения счетов-фактур, книги покупок и книги продаж по Постановлению Правительства от 26.12.2011г. ╧1137. Электронные счет-фактуры. "Факсимильная подпись на счете√фактуре не дает право на вычет" - так решил ВАС РФ. Оправдание сделки: договор подряда, консультационные услуги, маркетинговые исследования, договор аренды и др. Какими документами подтвердить реальные хозяйственные операции. Оформление первичных документов на вознаграждение за объем продаж, при возврате товара. 3.Хранение документации. Сроки и организация хранения документов. Ответственность руководителя и бухгалтера за хранение документации. Действия должностных лиц предприятия при утрате документов. 4.Если у Вас есть филиал: как организовать документооборот, где хранить, кто может проводить налоговый контроль филиала, как избежать штрафа за несвоевременное представление документов налоговым органам. 5.Как работают с "первичкой" налоговые и правоохранительные органы. Какие документы налогоплательщика могут подтверждать получение необоснованной налоговой выгоды по критериям Постановления Пленума ВАС РФ от 12.10.2006 ╧53. Когда и какие первичные документы могут служить основанием для возбуждения уголовного дела в отношении должностных лиц организации за неуплату налогов. Борьба с фирмами - "однодневками" продолжается с учетом нового ФЗ от 07.12.2011г. ╧419-ФЗ. Информацию можно получить по телефонам: +7 (495)- 7Ч29I-98 \\// +7 499 Ч45Ч/095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3510 bytes Desc: not available URL: From briankherrington at novopost.ru Mon Aug 27 19:17:02 2012 From: briankherrington at novopost.ru (=?koi8-r?B?8NLP18XSy8Eg0MXS18ney8k=?=) Date: Tue, 28 Aug 2012 10:17:02 +0800 Subject: =?koi8-r?B?8MXS18ney8E6IN7UzyDJIMvByyDQ0s/XxdLRwNQgy8/O1NLPzMnS1cDd?= =?koi8-r?B?ycUgz9LHwc7Z?= Message-ID: <000d01cd84c3$35fe4d80$6400a8c0@briankherrington> "Первичка": что и как проверяют контролирующие органы 03 сентября 2012 г. +7 Московский код: 7Ч2.9198 ; (код Москвы) 7Ч2.9I98 Программа: 1.Новый Закон о бухгалтерском учете √ новые требования к первичным документам. Новый порядок ведения кассовых операций. Электронный документооборот. Право подписи на документах, использование факсимиле. Печать на документах. Внесение исправлений в учетные документы. Копии первичных документов √ когда можем учесть в расходах. Несвоевременное получение документов. Некомплектные документы. Налоговые и административные штрафы за первичку. Организация документооборота в организации. Первичные документы по отдельным хозяйственным операциям: транспортная накладная и ТТН, ТОРГ-12, документы для учета ГСМ (талоны, топливные карты, путевые листы). Первичка по учету основных средств и МПЗ, командировочным расходам. Условные единицы в первичном документе. 2.Первичные документы для налогового учета. Новый порядок заполнения счетов-фактур, книги покупок и книги продаж по Постановлению Правительства от 26.12.2011г. ╧1137. Электронные счет-фактуры. "Факсимильная подпись на счете√фактуре не дает право на вычет" - так решил ВАС РФ. Оправдание сделки: договор подряда, консультационные услуги, маркетинговые исследования, договор аренды и др. Какими документами подтвердить реальные хозяйственные операции. Оформление первичных документов на вознаграждение за объем продаж, при возврате товара. 3.Хранение документации. Сроки и организация хранения документов. Ответственность руководителя и бухгалтера за хранение документации. Действия должностных лиц предприятия при утрате документов. 4.Если у Вас есть филиал: как организовать документооборот, где хранить, кто может проводить налоговый контроль филиала, как избежать штрафа за несвоевременное представление документов налоговым органам. 5.Как работают с "первичкой" налоговые и правоохранительные органы. Какие документы налогоплательщика могут подтверждать получение необоснованной налоговой выгоды по критериям Постановления Пленума ВАС РФ от 12.10.2006 ╧53. Когда и какие первичные документы могут служить основанием для возбуждения уголовного дела в отношении должностных лиц организации за неуплату налогов. Борьба с фирмами - "однодневками" продолжается с учетом нового ФЗ от 07.12.2011г. ╧419-ФЗ. Информацию можно получить по телефонам: Московский код; 792_2I22 или \Моск. код/ 792-21*2/2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3620 bytes Desc: not available URL: From virtualadept at gmail.com Tue Aug 28 07:36:54 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Tue, 28 Aug 2012 10:36:54 -0400 Subject: [ZS] Fwd: Announcement: Diaspora* Will Now Be A Community Project Message-ID: On Tue, Aug 28, 2012 at 10:26 AM, Dirk Bruere wrote: > We are still nowhere near getting a crucial piece of ZS infrastructure > - the geographically based skills/business exchange we could integrate > with LETS. The fact that there is no off the shelf s/w or social site > that does this either means there is no market for it, or there is a > huge opportunity. Or maybe I have simply never heard of it. Thinking back to an article Douglas Rushkoff wrote a while back, let's see what's out there... Established gratis orgs that already do this: http://www.ces.org.za/index.asp#_blank https://hourworld.org/ Open Source Currency: https://github.com/oscurrency/oscurrency Based on Rails, F/OSS timebanking software. Community Forge: http://communityforge.net/ Based on Drupal, implements LETS. Ripple: https://ripplepay.com/ Track obligations through a socnet. This will also be of interest: http://ma.juii.net/blog/time-banking-software-recommendation -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From mikhail at nulix.ru Tue Aug 28 00:38:05 2012 From: mikhail at nulix.ru (=?koi8-r?B?9/zkOiDi1cjHwczUxdLJ0Q==?=) Date: Tue, 28 Aug 2012 13:08:05 +0530 Subject: =?koi8-r?B?zsHMz8fPz8LMz9bFzsnFIPf85A==?= Message-ID: <000d01cd84f0$0fa60b50$6400a8c0@mikhail> 31 августа 2012г. Бухгалтерский учет и налогообложение внешнеэкономической деятельности и валютных операций +7 495 742-9I*98 **** 8 (Ч95) 792/21.2/2 Программа: 1. Нормативная база, регулирующая учет и налогообложение валютных операций и внешнеэкономической деятельности. Изменения в 2012 году. 2. Особенности налогообложения курсовых разниц в условиях применения ПБУ 3/2006 "Учет активов и обязательств, стоимость которых выражена в иностранной валюте". Налогообложение суммовых разниц. 3. Налогообложение по налогу на прибыль у экспортера, получающего доход в иностранной валюте. 4. Новый порядок подтверждения у экспортера ставки 0% по НДС, в т.ч. при экспорте в страны Таможенного Союза. 5. Порядок вычета НДС, уплаченного таможенным органам. Порядок вычета НДС, уплаченного налоговым органам при импорте из стран Таможенного Союза. 6. Проблемы с возмещением экспортного НДС: практические рекомендации по их разрешению. 7. Формирование налоговой стоимости амортизируемых основных средств, сырья, материалов и товаров, приобретенных по импортным контрактам. 8. Налогообложение доходов нерезидентов у российского агента √ источника выплаты. 9. Типичные ошибки, встречающиеся при отражении в учете и уплате налогов операций, связанных с осуществлением внешнеэкономической деятельности. Стоимость участия: 8 900 рублей Информацию можно получить по телефонам: (495) 792*2122 <<>> +7 Московский код: 7922122 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2776 bytes Desc: not available URL: From eugen at leitl.org Tue Aug 28 05:17:26 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 28 Aug 2012 14:17:26 +0200 Subject: [tor-talk] End-to-end correlation for fun and profit Message-ID: <20120828121726.GS12615@leitl.org> ----- Forwarded message from Mike Perry ----- From eugen at leitl.org Tue Aug 28 05:22:06 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 28 Aug 2012 14:22:06 +0200 Subject: [ZS] Project RES: #cryptoparties Message-ID: <20120828122206.GU12615@leitl.org> ----- Forwarded message from Bryce Lynch ----- From eugen at leitl.org Tue Aug 28 06:01:50 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 28 Aug 2012 15:01:50 +0200 Subject: [silk] Fwd: Role of the US =?utf-8?Q?Tech_?= =?utf-8?Q?Companies_in_Government_Surveillance=3A_A_Lecture_by_Christophe?= =?utf-8?Q?r_Soghoian_=E2=80=94?= Centre for Internet and Society Message-ID: <20120828130150.GX12615@leitl.org> ----- Forwarded message from Udhay Shankar N ----- From eugen at leitl.org Tue Aug 28 06:54:13 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 28 Aug 2012 15:54:13 +0200 Subject: [tor-talk] Tor, Facebook and Google+ - my point of view Message-ID: <20120828135413.GB12615@leitl.org> ----- Forwarded message from Andrea St ----- From bucjnrieaz at szorin.ru Tue Aug 28 19:55:26 2012 From: bucjnrieaz at szorin.ru (=?koi8-r?B?9/zkOiDi1cjHwczUxdLJ0Q==?=) Date: Tue, 28 Aug 2012 18:55:26 -0800 Subject: =?koi8-r?B?zsHMz8fPz8LMz9bFzsnFINfBzMDUztnIIM/QxdLBw8nK?= Message-ID: <637F3589ABA0427E96DA83178BF3F720@softnetcaac450> 31 августа 2012г. Бухгалтерский учет и налогообложение внешнеэкономической деятельности и валютных операций +7 (495)- 7Ч291*98 \\// код: (четыре девять пять) 7922122 Программа: 1. Нормативная база, регулирующая учет и налогообложение валютных операций и внешнеэкономической деятельности. Изменения в 2012 году. 2. Особенности налогообложения курсовых разниц в условиях применения ПБУ 3/2006 "Учет активов и обязательств, стоимость которых выражена в иностранной валюте". Налогообложение суммовых разниц. 3. Налогообложение по налогу на прибыль у экспортера, получающего доход в иностранной валюте. 4. Новый порядок подтверждения у экспортера ставки 0% по НДС, в т.ч. при экспорте в страны Таможенного Союза. 5. Порядок вычета НДС, уплаченного таможенным органам. Порядок вычета НДС, уплаченного налоговым органам при импорте из стран Таможенного Союза. 6. Проблемы с возмещением экспортного НДС: практические рекомендации по их разрешению. 7. Формирование налоговой стоимости амортизируемых основных средств, сырья, материалов и товаров, приобретенных по импортным контрактам. 8. Налогообложение доходов нерезидентов у российского агента – источника выплаты. 9. Типичные ошибки, встречающиеся при отражении в учете и уплате налогов операций, связанных с осуществлением внешнеэкономической деятельности. Стоимость участия: 8 900 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 (499) ЧЧ5_ЧО*95 **** (код Москвы) 742-9198 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2704 bytes Desc: not available URL: From milfredinr at weather.yandex.ru Tue Aug 28 08:09:34 2012 From: milfredinr at weather.yandex.ru (=?koi8-r?B?9MHSwdPP18Eg7i7hLiDPIPf85A==?=) Date: Tue, 28 Aug 2012 23:09:34 +0800 Subject: =?koi8-r?B?4tXIx8HM1MXS08vJyiDV3sXUINfOxdvOxdzLz87PzcnexdPLz8ogxMXR?= =?koi8-r?B?1MXM2M7P09TJ?= Message-ID: <000d01cd852f$21cc80e0$6400a8c0@milfredinr> 31 августа 2012г. Бухгалтерский учет и налогообложение внешнеэкономической деятельности и валютных операций +7 495 742.91*98 или +7 (код Москвы) 742-91\98 Программа: 1. Нормативная база, регулирующая учет и налогообложение валютных операций и внешнеэкономической деятельности. Изменения в 2012 году. 2. Особенности налогообложения курсовых разниц в условиях применения ПБУ 3/2006 "Учет активов и обязательств, стоимость которых выражена в иностранной валюте". Налогообложение суммовых разниц. 3. Налогообложение по налогу на прибыль у экспортера, получающего доход в иностранной валюте. 4. Новый порядок подтверждения у экспортера ставки 0% по НДС, в т.ч. при экспорте в страны Таможенного Союза. 5. Порядок вычета НДС, уплаченного таможенным органам. Порядок вычета НДС, уплаченного налоговым органам при импорте из стран Таможенного Союза. 6. Проблемы с возмещением экспортного НДС: практические рекомендации по их разрешению. 7. Формирование налоговой стоимости амортизируемых основных средств, сырья, материалов и товаров, приобретенных по импортным контрактам. 8. Налогообложение доходов нерезидентов у российского агента √ источника выплаты. 9. Типичные ошибки, встречающиеся при отражении в учете и уплате налогов операций, связанных с осуществлением внешнеэкономической деятельности. Стоимость участия: 8 900 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 499 - 4Ч5*ЧО\95 или 8 (499) 445.ЧО\95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2695 bytes Desc: not available URL: From bobiemerkin at alcotour.ru Wed Aug 29 02:08:37 2012 From: bobiemerkin at alcotour.ru (=?koi8-r?B?887J2tggzsHMz8fJ?=) Date: Wed, 29 Aug 2012 01:08:37 -0800 Subject: =?koi8-r?B?68/OxsnExc7DycHM2M7P09TYIM7BIOvJ0NLF?= Message-ID: <000d01cd85bd$7e361880$6400a8c0@bobiemerkin> 07 сентября 2012 г. Оффшорный бизнес: о чем молчат другие? +7 499 - ЧЧ5-4О\95 и Московский код; 742.9I_98 Цель: Отличительной особенностью данного курса является практическая направленность и отсутствие лишних теоретических и исторических отступлений. курс строится в форме интерактивного практического занятия при постоянном взаимодействии с аудиторией с разбором большого количества примеров и подробным описанием налоговых, финансовых и правовых последствий или рисков. Для участия в курсе мы приглашаем как специалистов с многолетним опытом работы в сфере международного налогового планирования, стремящихся расширить область своих знаний, так и слушателей, еще не сталкивавшихся с иностранными юрисдикциями. Насыщенность материала конкретными примерами, взятыми из жизни, решение нестандартных и частных задач в ходе занятия, а также доступность объяснений относятся к неоспоримым достоинствам данного курса. Важно отметить, что ведущий курса имеет не только многолетний опыт разработки и курирования крупных консалтинговых проектов, но также многократного участия в их реализации "под ключ" с последующим сопровождением. Это позволяет наполнить курс уникальным материалом, посвященным не только схемам оптимизации налогов, но и многочисленными практическими комментариями и описанием проблем, с которыми сталкивается бизнес, даже при выборе "правильных и выверенных" схем. По ходу и после окончания курса будет предусмотрено время для индивидуальных вопросов как по заявленным темам, так и по вопросам, которые не предусматривала программа курса. Оффшоры, Кипр и другие иностранные юрисдикции не являются налоговой панацеей, и в некоторых случаях их использование принесет лишь новые финансовые издержки и бессмысленные риски конфликтов с налоговыми органами. К счастью, таких случаев пока меньшинство. Программа: БЛОК 1. ОФФШОРЫ, НИЗКОНАЛОГОВЫЕ И ПРЕСТИЖНЫЕ ЕВРОПЕЙСКИЕ ЮРИСДИКЦИИ: КРИТЕРИИ ВЫБОРА. * Сравнение популярных оффшорных юрисдикций (Британские Виргинские острова, Белиз, Сейшелы, Панама и т.д.) √ от каких стоит отказаться и почему? * Гонконг как инструмент работы с азиатским рынком * Зачем использовать низконалоговые юрисдикции, если есть полностью безналоговые? * Использование престижных юрисдикций: Швейцария, Люксембург, Нидерланды и т.д. √ когда это обоснованно? * "Черные списки" ФАТФ, ОЭСР, Минфина, ЦБ РФ √ кому о них можно забыть? БЛОК 2. ПРАКТИКА ИСПОЛЬЗОВАНИЯ КИПРСКИХ КОМПАНИЙ * Особенности работы с кипрским администратором: как не дать себя обмануть? ** налог на прибыль (Corporate Income Tax), сбор на оборону (Defence Contribution Tax), НДС и применение ⌠reverse charge■ * Изменения кипрского законодательства 2012 и тенденции 2013. * Ратификация Протокола к Соглашению между РФ и Кипром: кто понесет убытки, а кому удастся на этом заработать? * Почему Кипр редко используют при экспорте/импорте товаров? * Кипр как инструмент работы с ценными бумагами БЛОК 3.СХЕМЫ, ПРИМЕНЯЕМЫЕ В МЕЖДУНАРОДНОМ НАЛОГОВОМ ПЛАНИРОВАНИИ * Внешнеторговые операции (экспорт/импорт): ** схемы с использованием оффшоров и Гонконга; ** схемы с использование английских LTD и партнерств LLP; ** эстонские, чешские, датские, нидерландские компании в торговых схемах. * Холдинговые структуры ** выплаты дивидендов и построение холдинговых структур; ** займы как оптимальный путь финансирования; ** (суб)лицензионные договоры и выплаты роялти за использование прав интеллектуальной собственности; ** анализ сложностей и рисков, расчет предельных величин отчислений по займам и роялти. * Владение и сдача в аренду недвижимости с использованием нерезидентов БЛОК 4. КОНФИДЕНЦИАЛЬНОСТЬ И НОМИНАЛЬНОЕ ВЛАДЕНИЕ * Номинальный сервис: ** инструменты контроля номинальных директоров и номинальных акционеров; ** лица, которым будут известны имена бенефициаров; * Какие данные о компании хранятся в публичных реестрах Кипра и оффшоров, и кто имеет к ним доступ? * Обмен информацией √ в каких случаях государственные органы РФ могут получить информацию о владельцах? * Изменения в Гражданском Кодексе: бенефициар должен раскрыть себя сам. * Трасты и семейные фонды √ когда их использование оправдано? * "Подводные камни" при использовании номинального сервиса и трастов/фондов. БЛОК 5. ОТКРЫТИЕ СЧЕТОВ НА ИНОСТРАННЫЕ КОМПАНИИ * Надежность, оперативность работы, лояльность √ какой банк выбрать? * Какие банки не делятся информацией с российскими спецслужбами? * Раскрытие банковской тайны √ факты и выводы * Пути снятия средств со счета иностранного банка в России * Росфинмониторинг: когда можно не опасаться? БЛОК 6. ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ, СИТУАЦИИ ИЗ ПРАКТИКИ, ОБЗОР СУДОВ И ПИСЕМ МИНФИНА. * Насколько международная структура владения защищает от рейдерских захватов? * Как часто нужно предоставлять сертификат налогового резидентства и нужно ли проходить аудит для его выпуска? * Ведет ли использование доверенностей с широким кругом полномочий к возникновению постоянного представительства? Официальная позиция. * Дает ли регистрация компании в ЕС возможность на привлечение кредитов и получение гражданства? * Если компания не нужна: нужно ликвидировать или можно "бросить"? * и т.д. Стоимость участия: 9 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 495 742\9I-98 \\// +7 Ч95 742_9I-98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9958 bytes Desc: not available URL: From kleinesk-fa at jenniferlopezfan.com Tue Aug 28 14:05:33 2012 From: kleinesk-fa at jenniferlopezfan.com (=?koi8-r?B?8NLP18XSy8Eg0MXS18ney8k=?=) Date: Wed, 29 Aug 2012 04:05:33 +0700 Subject: =?koi8-r?B?8MXS18ney8E6IN7UzyDJIMvByyDQ0s/XxdLRwNQgy8/O1NLPzMnS1cDd?= =?koi8-r?B?ycUgz9LHwc7Z?= Message-ID: <000d01cd8560$dcbed160$6400a8c0@kleinesk-fa> "Первичка": что и как проверяют контролирующие органы 03 сентября 2012 г. 8 (495) 792-2I/2_2 и (Ч95) 742.9I/98 Программа: 1.Новый Закон о бухгалтерском учете √ новые требования к первичным документам. Новый порядок ведения кассовых операций. Электронный документооборот. Право подписи на документах, использование факсимиле. Печать на документах. Внесение исправлений в учетные документы. Копии первичных документов √ когда можем учесть в расходах. Несвоевременное получение документов. Некомплектные документы. Налоговые и административные штрафы за первичку. Организация документооборота в организации. Первичные документы по отдельным хозяйственным операциям: транспортная накладная и ТТН, ТОРГ-12, документы для учета ГСМ (талоны, топливные карты, путевые листы). Первичка по учету основных средств и МПЗ, командировочным расходам. Условные единицы в первичном документе. 2.Первичные документы для налогового учета. Новый порядок заполнения счетов-фактур, книги покупок и книги продаж по Постановлению Правительства от 26.12.2011г. ╧1137. Электронные счет-фактуры. "Факсимильная подпись на счете√фактуре не дает право на вычет" - так решил ВАС РФ. Оправдание сделки: договор подряда, консультационные услуги, маркетинговые исследования, договор аренды и др. Какими документами подтвердить реальные хозяйственные операции. Оформление первичных документов на вознаграждение за объем продаж, при возврате товара. 3.Хранение документации. Сроки и организация хранения документов. Ответственность руководителя и бухгалтера за хранение документации. Действия должностных лиц предприятия при утрате документов. 4.Если у Вас есть филиал: как организовать документооборот, где хранить, кто может проводить налоговый контроль филиала, как избежать штрафа за несвоевременное представление документов налоговым органам. 5.Как работают с "первичкой" налоговые и правоохранительные органы. Какие документы налогоплательщика могут подтверждать получение необоснованной налоговой выгоды по критериям Постановления Пленума ВАС РФ от 12.10.2006 ╧53. Когда и какие первичные документы могут служить основанием для возбуждения уголовного дела в отношении должностных лиц организации за неуплату налогов. Борьба с фирмами - "однодневками" продолжается с учетом нового ФЗ от 07.12.2011г. ╧419-ФЗ. По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 (499) 4454О95 \\// \Моск. код/ 792*2122 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3532 bytes Desc: not available URL: From bryantsell at shevaton.ru Tue Aug 28 18:53:16 2012 From: bryantsell at shevaton.ru (=?koi8-r?B?9/zkOiDi1cjHwczUxdLJ0Q==?=) Date: Wed, 29 Aug 2012 08:53:16 +0700 Subject: =?koi8-r?B?9/zkzsHMz8fPz8LMz9bFzsnFINfBzMDUztnIIM/QxdLBw8nK?= Message-ID: 31 августа 2012г. Бухгалтерский учет и налогообложение валютных операций (Ч95) 792.2I22 \\// 8 (499) 4Ч54095 Программа: 1. Нормативная база, регулирующая учет и налогообложение валютных операций и внешнеэкономической деятельности. Изменения в 2012 году. 2. Особенности налогообложения курсовых разниц в условиях применения ПБУ 3/2006 "Учет активов и обязательств, стоимость которых выражена в иностранной валюте". Налогообложение суммовых разниц. 3. Налогообложение по налогу на прибыль у экспортера, получающего доход в иностранной валюте. 4. Новый порядок подтверждения у экспортера ставки 0% по НДС, в т.ч. при экспорте в страны Таможенного Союза. 5. Порядок вычета НДС, уплаченного таможенным органам. Порядок вычета НДС, уплаченного налоговым органам при импорте из стран Таможенного Союза. 6. Проблемы с возмещением экспортного НДС: практические рекомендации по их разрешению. 7. Формирование налоговой стоимости амортизируемых основных средств, сырья, материалов и товаров, приобретенных по импортным контрактам. 8. Налогообложение доходов нерезидентов у российского агента – источника выплаты. 9. Типичные ошибки, встречающиеся при отражении в учете и уплате налогов операций, связанных с осуществлением внешнеэкономической деятельности. Стоимость участия: 8 900 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 (499) 4Ч54О95 **** (код Москвы) 742.9I/98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2717 bytes Desc: not available URL: From andrew at jarbox.org Wed Aug 29 12:02:44 2012 From: andrew at jarbox.org (J. Andrew Rogers) Date: Wed, 29 Aug 2012 12:02:44 -0700 Subject: [FoRK] Newsroom score: American Taliban Message-ID: On Aug 29, 2012, at 9:56 AM, "Stephen D. Williams" wrote: > Is there also a conspiracy by local government not to report this voter fraud to the Federal government? > Recent stories have cited 86 or 26 verified cases of voter fraud, nationally, in the last 6 or so years. Were they all in Garden Grove? If not, what's wrong with the local election board that has prevented them from reporting these problems? Where are links to proof that this has happened? I think you are taking a bit of a naive view of the reality. I know someone that does transaction analysis at one of the major banks for the purposes of detecting irregularities such as money laundering. To do that job, they look at pretty much the entire ebb and flow of money throughout the country. While the bank only cares about irregularities it has some liability for, they detect a much broader range of crimes in the analysis. The most pervasive crime detected is securities fraud, but most people probably do not find that surprising. The second most pervasive crime, on the other hand, is very surprising to many people: judicial bribery. If we were to go by "verified cases" of judicial bribery as evidence, we would conclude that it is very rare. The people who could verify cases to your satisfaction have no significant incentive to do so and there is rarely a smoking gun that the victims of the crime can point to. In fact, most of the victims have no idea that it even occurred. Furthermore, on what basis could someone in the government responsible for investigating judicial corruption run the kind of privacy-violating fishing expeditions that the banks do? As far as the government is concerned, there is no evidence of widespread corruption in the judiciary even though they know they would find it if they actually looked. Voter fraud likely falls into a similar category. It is "rare" because it is institutionally implausible for the people who could verify it to look for it. Like with judicial bribery, there is an enormous amount of resistance to putting into place the kinds of policies that would make it possible for the government to officially verify its existence. There are many things that, as far as the government is concerned, do not exist because the government goes to great lengths to not look for them. _______________________________________________ FoRK mailing list http://xent.com/mailman/listinfo/fork ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From zooko at zooko.com Wed Aug 29 12:58:57 2012 From: zooko at zooko.com (Zooko Wilcox-O'Hearn) Date: Wed, 29 Aug 2012 13:58:57 -0600 Subject: [tahoe-dev] Tahoe-LAFS Weekly Call report 2012-08-29 Message-ID: Folks: Here is your traditional, once-a-week, cryptic, and potentially inaccurate summary of the developer conference call. In what follows I make no attempt to explain the context. Sorry -- don't have time right now! However, we do try to explain contexts on tickets, so if this sounds interesting to you, you can probably figure out what we're talking about by reading #127, #615, #821, #827, #1455, #1797, and/or #1798. The ultimate goal is to allow you to view arbitrary content when loaded from your Tahoe-LAFS gateway without allowing it to spy on or interfere with other content also loaded from your Tahoe-LAFS gateway. (And by "view" content I mean execute that content as a program.) This is good to prevent exploits of "decentralized web apps" (such as my blog: B9). Note that decentralized web apps hosted on Tahoe-LAFS are _already_ pretty well-defended from one another. The unguessable URIs go a long way to preventing a lot of attacks. This work is just about closing off that one weird attack (which requires the user to navigate *from* the prize content *to* the malicious content for it to work) and also about providing Defense In Depth so that other unforeseen attacks will be defeated before we even imagine them. B9 https://lafsgateway.zooko.com/uri/URI:DIR2-RO:d73ap7mtjvv7y6qsmmwqwai4ii:tq5tqejzulg7yj4h7nxuurpiuuz5jsgvczmdamcalpk2rc6gmbsq/klog.html https://tahoe-lafs.org/trac/tahoe-lafs/ticket/127# Cap URLs leaked via HTTP Referer header https://tahoe-lafs.org/trac/tahoe-lafs/ticket/615# Can JavaScript loaded from Tahoe access all your content which is loaded from Tahoe? https://tahoe-lafs.org/trac/tahoe-lafs/ticket/821# A script in a file viewed through the WUI can obtain the file's read cap https://tahoe-lafs.org/trac/tahoe-lafs/ticket/827# Put file download links ('?save=true') in WUI directory listings https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1455# WUI: ambiently accessible pages should framebust in order to prevent UI redressing attacks https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1797# WUI: view content in an HTML5 sandboxed iframe https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1798# Segregate gateway HTTP ports: one for raw bytes and one for generated WUI pages Tahoe-LAFS Developer Conference Call 2012-08-28 In attendance: Zooko, David-Sarah, Brian scribe: Zooko defense against malicious javascript Using html5 iframe sandboxing, each request to the gateway to load the content of a cap "$CAP" actually returns a generated HTML page containing a sandboxed iframe tag with src=SERVER:BYTESPORT/cap/$CAP. b" Kaminsky back-jacking b" an additional authority when the attacker knows the readcap, but we want to prevent him from causing your browser to execute the contents in certain context? / David-Sarah's weird idea of an extra key per gateway b" backward compatibility with scripts/apps that use the WAPI to load raw bytes of caps? What authority to I intend to extend to target content when I click on its link in source content? proposal: I intend for the target content to receive *no more authority* when I click on its link than if I had typed in its URL. Ways that this is not what the web currently does: b" Click on a little question mark next to a field, it pops open a very small explanation. If you go back to the original window and click the question mark again, it will pop open the same explanation window instead of a new one. b" Generate a virtual history when everything is really /app#pageid possible threat models: Game 1: There is a secret prize cap, and you -- the attacker -- win if any code of yours learns the secret cap. I will run your code, and navigate around however you like, as a user. (The Kaminsky back-jacking attack is a successful attack in this sort of game. It requires that the user will navigate *from* the secret prize document *to* attacker-controlled content.) Game 2: There is a secret prize cap, and the user has it loaded *from the barenakedcap port* in a window. Then the user navigates from that content to an attacker-provided link. The link can, at the attacker's discretion, point to attacker-controlled content stored in LAFS. So, if the link goes to a barenakedcap containing attacker-controlled content, then the Kaminsky back-jacking attack will work, letting that attacker-controlled content gain access to the prize cap. But if the link goes to an HTML5 sandbox wrappedcap, our use of HTML5 sandboxing will prevent the resulting attacker-controlled content from gaining the prize cap. David-Sarah had an idea for a defense that might help in this Game 2 or in a related game, involving another encryption key which is known to this gateway and unknown to the attacker. Brian argued that the attacker-controlled content, that gets loaded in this gateway and given access to that content, will eventually learn any such key or any such transformation of the URL. Zooko proposed one-time barenaked URLs -- when the gateway receives a request to load a wrappedcap, then it generates an unguessable nonce, serves up the HTML5 sandbox wrapper which includes