From sincereo86 at sainj.samsung.com Fri Jun 1 02:46:33 2012 From: sincereo86 at sainj.samsung.com (=?koi8-r?B?IvLFzc/O1CI=?=) Date: Fri, 1 Jun 2012 01:46:33 -0800 Subject: =?koi8-r?B?8sXNz87UIMvXwdLUydIgySDPxsnTz9cg7NXe28nFIMPFztk=?= Message-ID: Ремонт квартир и офисов "под ключ". Внимание, АКЦИЯ!!! Только до 11 июня при заказе комплексного ремонта вы получаете КОНДИЦИОНЕР General Fujitsu CLASSIC ASH7U в ПОДАРОК! www.ремонт-тут.рф From standoffs at dassaero.com Fri Jun 1 03:10:47 2012 From: standoffs at dassaero.com (=?koi8-r?B?IkUtzcXKzCDNwdLLxdTJzsci?=) Date: Fri, 1 Jun 2012 02:10:47 -0800 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAgKyDIz9PUyc7HIM7BIM3F09HDINcg?= =?koi8-r?B?8O/k4fLv6w==?= Message-ID: <8AFF4D783AA94F608B0427A1A293C972@acer> 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК (для указания вашего сайта в письме) По вашему графику Без ограничений по срокам Возможно менять макеты все 8 раз !!! Подготовка макетов бесплатно АКЦИИ: Месяц 44(46) рассылок - 2 раза в день - 5 раз в неделю - 20 000 рублей Год 500 рассылок - 2 раза в день - 5 раз в неделю - 100 000 рублей Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,7 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 From unisex at estesbuilders.com Fri Jun 1 04:22:23 2012 From: unisex at estesbuilders.com (=?koi8-r?B?IuvPzdDMxcvTzsHRINPF0tTJxsnLwcPJ0SI=?=) Date: Fri, 1 Jun 2012 08:22:23 -0300 Subject: =?koi8-r?B?79DMwdTBINDP08zFINDPzNXexc7J0SDz5fL06ebp6+H04Q==?= Message-ID: <770766733.30353085057982@estesbuilders.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2207 bytes Desc: not available URL: From eugen at leitl.org Fri Jun 1 00:02:08 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 1 Jun 2012 09:02:08 +0200 Subject: [HacDC:Byzantium] A new radio protocol for the mesh network? Message-ID: <20120601070208.GC17120@leitl.org> ----- Forwarded message from Martin ----- From eugen at leitl.org Fri Jun 1 00:03:00 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 1 Jun 2012 09:03:00 +0200 Subject: Wacky Weekend: The '.secure' gTLD Message-ID: <20120601070300.GD17120@leitl.org> ----- Forwarded message from Jay Ashworth ----- From sdw at lig.net Fri Jun 1 13:13:39 2012 From: sdw at lig.net (Stephen D. Williams) Date: Fri, 01 Jun 2012 13:13:39 -0700 Subject: [FoRK] SANS NewsBites Vol. 14 Num. 44 : FLASH: President Obama (and predecessor) ordered Stuxnet and campaign of cyber attacks against Iran's nuclear program Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 FLASH: The New York Times reported this morning that President Obama (and his predecessor) ordered a sophisticated campaign of cyberattacks against Iran's nuclear program, and has either attacked or considered attacking networks in China, Syria, and North Korea as well. Because the publication of this story is likely to herald substantive and far-ranging changes in the way cybersecurity is managed in the US and in many other countries, we have included an analysis by Gautham Nagesh. Under normal circumstances, his thoughtful, in-depth analyses are available only to paid subscribers to CQ Roll Call "Executive Briefing on Technology." This is an abnormal circumstance. There is great value in the security community understanding that the game has changed, and what it means. Alan PS Another very valuable piece of cybersecurity reporting will appear on the front page of the Washington Post on Sunday or Monday and then be discussed on National Public Radio (the Diane Rehm show) on Monday morning. TOP OF THE NEWS --President Obama Ordered Stuxnet and More Attacks on Iran (June 1, 2012) (By Gautham Nagesh, CQ Executive Briefing on Technology) The New York Times has a bombshell this morning: President Obama began ordering cyberattacks on Iran within days of taking office. The story, which is a must-read, finally confirms what many cybersecurity experts have suspected: the Stuxnet worm, which disabled industrial equipment in Iran and Europe, was originally designed by Israel and the U.S. to slow down Iran's nuclear enrichment plant. The virus' escape from Iran's Natanz plant and subsequent discovery in Germany in 2010 was a mistake that U.S. authorities blamed on Israel. Former CIA chief Michael Hayden also acknowledged to the Times that Stuxnet is the first major cyberattack intended to cause physical destruction (to Iranian centrifuges). "Somebody crossed the Rubicon," he said. The article includes a history of the classified cyberweapons program, dubbed "Olympic Games," which began under President Bush, and includes details of how President Obama decided that digital attacks were preferable to a potential military conflict between Iran and Israel. But the bottom line is that President Obama (and his predecessor) ordered a sophisticated campaign of cyberattacks against Iran's nuclear program, and has either attacked or considered attacking networks in China, Syria, and North Korea as well. The Obama administration previously acknowledged that it might respond to cyberattacks with physical force, but the report makes it clear that even as the U.S. was making those threats, it was perpetrating cyberattacks on the very nations it accuses of targeting its networks. In doing so, the White House has seemingly opened a Pandora's box. Administration officials have placed a greater emphasis on cybersecurity and the threat to our nation's networks that any previous administration, doubtless because they had first-hand knowledge of just how much damage sophisticated cyberattacks are capable of causing. Those officials might have also feared reprisals from nations that were targeted by Stuxnet and other digital attacks from the U.S. The revelation also sheds some light on the Pentagon's reluctance to outline its cyberwarfare policies in detail, since doing so might have involved disclosing to Congress that the U.S. already was fully engaged in online battle. Having taken such an aggressive stance on deploying Stuxnet, it will be very difficult for the U.S. to keep casting itself as the innocent victim of unprovoked attacks by countries looking to steal our economic and military secrets. Today's report makes it clear that the White House long ago decided to embrace digital warfare, and puts the onus squarely back on the administration to clearly explain its rules of engagement online. But the greatest impact may be internationally, where hostile nations now have confirmation the U.S. could be targeting their networks. If hackers in those countries weren't already attempting to take down U.S. critical infrastructure, they probably are now. http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?_r=1&pagewanted=all > Then the N.S.A. and a secret Israeli unit respected by American > intelligence officials for its cyberskills set to work developing the > enormously complex computer worm that would become the attacker from > within. > > The unusually tight collaboration with Israel was driven by two > imperatives. Israelbs Unit 8200, a part of its military, had technical > expertise that rivaled the N.S.A.bs, and the Israelis had deep > intelligence about operations at Natanz that would be vital to making > the cyberattack a success. But American officials had another interest, > to dissuade the Israelis from carrying out their own pre-emptive strike > against the Iranian nuclear facilities. To do that, the Israelis would > have to be convinced that the new line of attack was working. The only > way to convince them, several officials said in interviews, was to have > them deeply involved in every aspect of the program. > > Soon the two countries had developed a complex worm that the Americans > called bthe bug.b But the bug needed to be tested. So, under enormous > secrecy, the United States began building replicas of Iranbs P-1 > centrifuges, an aging, unreliable design that Iran purchased from Abdul > Qadeer Khan, the Pakistani nuclear chief who had begun selling > fuel-making technology on the black market. Fortunately for the United > States, it already owned some P-1s, thanks to the Libyan dictator, Col. > Muammar el-Qaddafi. > > When Colonel Qaddafi gave up his nuclear weapons program in 2003, he > turned over the centrifuges he had bought from the Pakistani nuclear > ring, and they were placed in storage at a weapons laboratory in > Tennessee. The military and intelligence officials overseeing Olympic > Games borrowed some for what they termed bdestructive testing,b > essentially building a virtual replica of Natanz, but spreading the test > over several of the Energy Departmentbs national laboratories to keep > even the most trusted nuclear workers from figuring out what was afoot. > > Those first small-scale tests were surprisingly successful: the bug > invaded the computers, lurking for days or weeks, before sending > instructions to speed them up or slow them down so suddenly that their > delicate parts, spinning at supersonic speeds, self-destructed. After > several false starts, it worked. One day, toward the end of Mr. Bushbs > term, the rubble of a centrifuge was spread out on the conference table > in the Situation Room, proof of the potential power of a cyberweapon. > The worm was declared ready to test against the real target: Iranbs > underground enrichment plant. > > bPrevious cyberattacks had effects limited to other computers,b Michael > V. Hayden, the former chief of the C.I.A., said, declining to describe > what he knew of these attacks when he was in office. bThis is the first > attack of a major nature in which a cyberattack was used to effect > physical destruction,b rather than just slow another computer, or hack > into it to steal data. > > bSomebody crossed the Rubicon,b he said. > > Getting the worm into Natanz, however, was no easy trick. The United > States and Israel would have to rely on engineers, maintenance workers > and others b both spies and unwitting accomplices b with physical access > to the plant. bThat was our holy grail,b one of the architects of the > plan said. bIt turns out there is always an idiot around who doesnbt > think much about the thumb drive in their hand.b > ... > > But by the time Mr. Bush left office, no wholesale destruction had been > accomplished. Meeting with Mr. Obama in the White House days before his > inauguration, Mr. Bush urged him to preserve two classified programs, > Olympic Games and the drone program in Pakistan. Mr. Obama took Mr. > Bushbs advice. > > *The Stuxnet Surprise* > > Mr. Obama came to office with an interest in cyberissues, but he had > discussed them during the campaign mostly in terms of threats to > personal privacy and the risks to infrastructure like the electrical > grid and the air traffic control system. He commissioned a major study > on how to improve Americabs defenses and announced it with great fanfare > in the East Room. > > What he did not say then was that he was also learning the arts of > cyberwar > . > The architects of Olympic Games would meet him in the Situation Room, > often with what they called the bhorse blanket,b a giant foldout > schematic diagram of Iranbs nuclear production facilities. Mr. Obama > authorized the attacks to continue, and every few weeks b certainly > after a major attack b he would get updates and authorize the next step. > Sometimes it was a strike riskier and bolder than what had been tried > previously. > > bFrom his first days in office, he was deep into every step in slowing > the Iranian program b the diplomacy, the sanctions, every major > decision,b a senior administration official said. bAnd itbs safe to say > that whatever other activity might have been under way was no exception > to that rule.b > --Pentagon's Plan X Aims to Develop Robust Cyberwarfare Capabilities (May 30, 2012) The Pentagon's Defense Advanced Research Projects Agency (DARPA) is launching a five-year, US $110 million research program dubbed Plan X. DARPA is seeking input from private sector organizations, universities, and computer game companies in its effort to develop improved cyberwarfare capabilities. Goals include creating a comprehensive map of cyberspace that is updated continuously, developing an operating system strong enough to launch cyber attacks and withstand counterattacks, and creating systems that allow commanders to launch speed-of-light attacks. http://www.washingtonpost.com/world/national-security/with-plan-x-pentagon-seeks-to-spread-us-military-might-to-cyberspace/2012/05/30/gJQAEca71U_story.html --US Legislators Poised to Reauthorize FISA Amendments Act (May 31, 2012) US legislators appear to be ready to reauthorize the FISA Amendments Act, which grants the government authority to conduct warrantless surveillance on American citizens. The law allows the government to eavesdrop on phone calls and email correspondence of Americans as long as one of the parties in the conversation is outside the US. The FISA Amendments Act requires the Foreign Intelligence Surveillance Act Court to give blanket approval to electronic surveillance requests. The target of the surveillance does not have to be identified, and the surveillance can begin up to a week before the request is made. The FISA Court rulings are not public. Some US legislators did say that intelligence agencies need to be more accountable for how they are using the authority. http://www.wired.com/threatlevel/2012/05/congress-mulls-spy-powers/ --Backdoor in Privacy Tool Sparks Concern Over Cyber Surveillance in Iran (May 30, 2012) Versions of a privacy tool called Simurgh that contain backdoor components have been detected on filesharing sites in Iran, leading to speculation that the government could be using the software to spy on its citizens. Simurgh, a proxy tool, is widely used in Iran to evade censorship technology that the government has put in place. Simurgh in its original form is standalone software that can be run from a USB stick. The version with the backdoor must be installed on PCs. It has the capacity to log users' keystrokes and gather information about which sites they visit. The harvested data are sent to US-based servers that are registered to a Saudi Arabian organization. Because both versions of the software connect with a page that confirms the use of a proxy, the developers are using the opportunity to warn users whose versions appear to be infected. http://www.theregister.co.uk/2012/05/30/trojaned_privacy_tool_hits_iran/ [Editor's Note (Ullrich): Hashes are good. Even better to have the software digitally signed. If you are publishing software, and you are not offering signatures, you are putting your customers (and with that your reputation) at risk.] --White House Anti-Botnet Effort (May 29 & 30, 2012) The US government is planning to take a number of steps in an effort to fight botnets. The coordinated efforts will be undertaken by the Departments of Commerce and Homeland Security, the White House Cybersecurity Office, and the Industry Botnet group, a coalition of private organizations. Plans include increased sharing of information about botnets among government agencies and private organizations and a campaign to educate consumers about botnets. http://krebsonsecurity.com/2012/05/white-house-aims-to-stoke-botnet-fight/ http://www.computerworld.com/s/article/9227569/White_House_launches_coordinated_effort_to_battle_botnets?taxonomyId=17 http://news.cnet.com/8301-1009_3-57443380-83/white-house-prepares-to-convene-anti-botnet-summit/ http://www.darkreading.com/threat-intelligence/167901121/security/antivirus/240001203/obama-administration-partners-with-industry-to-fight-botnets.html http://www.nextgov.com/cybersecurity/2012/05/new-partnership-aims-combat-zombie-computer-networks/55974/?oref=ng-channelriver [Editor's Note (Ullrich): The US Govt. might consider just declaring Wednesday "Botnet Day". Appears these efforts spring up about once a week.] --Pentagon to Issue New Social Media Policy for DoD Employees (May 25 & 29, 2012) A new policy to be used by the Pentagon will require troops to hide certain identifying information on social media sites. There have been reports that hackers could gather sensitive information, including military unit location, from some social media posts. The new policy comes in the wake of an attack on a dating site that compromised the personal information of military users. The new policy will require that DoD employees "use non-mission related contact information ... to establish personal accounts." http://www.nextgov.com/cybersecurity/cybersecurity-report/2012/05/no-more-dot-mil-accounts-dating-sites/55930/?oref=ng-voicestop http://gcn.com/articles/2012/05/29/dod-social-media-policy-no-dot-mil.aspx [Editor's Note (Murray): We call this "operational security," OPSEC for short. OPSEC policy must be implemented with training. sdw _______________________________________________ FoRK mailing list http://xent.com/mailman/listinfo/fork ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From ellenjorgensen at aol.com Fri Jun 1 13:31:46 2012 From: ellenjorgensen at aol.com (EJ) Date: Fri, 1 Jun 2012 13:31:46 -0700 (PDT) Subject: [DIYbio] Re: Lethal Bird Flu Transmission Among Humans Now Possible Thanks to Biochemists Message-ID: According to articles in Nature and Science, the thing that tipped the scales in favor of publication was the discovery of natural flu variants that were halfway towards the full complement of mutations necessary for increased transmission. That supported the argument that such research could help predict what variants should be carefully monitored. -- You received this message because you are subscribed to the Google Groups "DIYbio" group. To view this discussion on the web visit https://groups.google.com/d/msg/diybio/-/xIuTf6sHsHUJ. To post to this group, send email to diybio at googlegroups.com. To unsubscribe from this group, send email to diybio+unsubscribe at googlegroups.com. For more options, visit this group at http://groups.google.com/group/diybio?hl=en. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From apokruphos at gmail.com Fri Jun 1 13:35:59 2012 From: apokruphos at gmail.com (ruphos) Date: Fri, 1 Jun 2012 13:35:59 -0700 Subject: [DIYbio] Re: Lethal Bird Flu Transmission Among Humans Now Possible Thanks to Biochemists Message-ID: On Fri, Jun 1, 2012 at 1:31 PM, EJ wrote: > According to articles in Nature and Science, the thing that tipped the > scales in favor of publication was the discovery of natural flu variants > that were halfway towards the full complement of mutations necessary for > increased transmission. Who was so reckless to let that information slip? Now all those 'Merica-hating terrorists will be out stealing used tissues to get a jump on the game! -- "And if ye cannot be saints of knowledge, then be at least its warriors." -- Friedrich Nietzsche -- You received this message because you are subscribed to the Google Groups "DIYbio" group. To post to this group, send email to diybio at googlegroups.com. To unsubscribe from this group, send email to diybio+unsubscribe at googlegroups.com. For more options, visit this group at http://groups.google.com/group/diybio?hl=en. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From gwennlillia at telenor.com Fri Jun 1 11:25:05 2012 From: gwennlillia at telenor.com (Theda Kirsten) Date: Fri, 01 Jun 2012 14:25:05 -0400 Subject: ExactWatches has the best quality rolex replica, replica rolex, fake rolex, breitling replica watches and breitling replicas available. 6b0xsk2z5w Message-ID: <60k77x21j54-57728369-004q3b93@hkxoqto> Rolex Replica : Replica Rolex : Fake Rolex : Breitling Replica Watc... ExactWatches has the best quality rolex replica, replica rolex, fake rolex, breitling replica watches and breitling replicas available. http://ampon.ru From rudiger.koch at googlemail.com Fri Jun 1 08:02:40 2012 From: rudiger.koch at googlemail.com (R|diger Koch) Date: Fri, 1 Jun 2012 17:02:40 +0200 Subject: [ZS] Bitcoin Price Manipulation Message-ID: A while ago, Bitcoin was almost a synonym for volatility. The price could easily change 30% and more in a single day. That ended a few months ago. Since then, the price to the $ is as stable or even more stable than the Euro. What happened? http://mtgoxlive.com/orders is a graphical representation of MtGox's order book and the price. You can see that there is a bid wall at $5.20 and an ask wall at $5.30. I believe that is the same trader. He is limiting the range within which the price can fluctuate - *in other words, the price is manipulated*. The past weeks of history seem to indicate that the guy is slowly increasing his stash of Bitcoins - if the bid wall is weakened, it is enforced. You cannot break through. If the ask wall is attacked, the guy seems less dedicated to holding it. To cut the story short: I believe there may be someone slowly buying up large amounts of Bitcoins. And I believe that he is not interested in volatility. If true, this is good news and bad news. Good news because we can expect the price going up considerably at some point, probably triggered by large announcements or a hype campaign (Everybody did get a good position already, no?). Bad news, because it's possible that a single person is trying to own a large amount of future cash reserves - cash reserves that cannot be increased by definition. You have to consider that $10 Million is sufficient to buy up 10% of all Bitcoins that will ever exist - if you are able to keep the market oblivious of it. I believe that is a strong incentive for any Billionaire who understands the dynamics of Bitcoin. Cheers R|diger -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Jun 1 08:19:18 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 1 Jun 2012 17:19:18 +0200 Subject: [ZS] Bitcoin Price Manipulation Message-ID: <20120601151918.GZ17120@leitl.org> ----- Forwarded message from R|diger Koch ----- From eugen at leitl.org Fri Jun 1 13:33:41 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 1 Jun 2012 22:33:41 +0200 Subject: [DIYbio] Re: Lethal Bird Flu Transmission Among Humans Now Possible Thanks to Biochemists Message-ID: <20120601203341.GP17120@leitl.org> ----- Forwarded message from EJ ----- From eugen at leitl.org Fri Jun 1 13:34:49 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 1 Jun 2012 22:34:49 +0200 Subject: [FoRK] SANS NewsBites Vol. 14 Num. 44 : FLASH: President Obama (and predecessor) ordered Stuxnet and campaign of cyber attacks against Iran's nuclear program Message-ID: <20120601203449.GQ17120@leitl.org> ----- Forwarded message from "Stephen D. Williams" ----- From eugen at leitl.org Fri Jun 1 13:40:56 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 1 Jun 2012 22:40:56 +0200 Subject: [DIYbio] Re: Lethal Bird Flu Transmission Among Humans Now Possible Thanks to Biochemists Message-ID: <20120601204056.GS17120@leitl.org> ----- Forwarded message from ruphos ----- From eugen at leitl.org Fri Jun 1 13:58:33 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 1 Jun 2012 22:58:33 +0200 Subject: [ExI] battle tanks to a five yr old Message-ID: <20120601205833.GU17120@leitl.org> ----- Forwarded message from ddraig ----- From Fabiola.Prall at fonville.com Fri Jun 1 11:35:06 2012 From: Fabiola.Prall at fonville.com (Fabiola Prall) Date: Sat, 02 Jun 2012 00:35:06 +0600 Subject: Toronto manufactured pilules Message-ID: <84229339723346-ODMMSQEUJHBJADFKVKJLLAEGQ@dns0.fonville.com> Get it on discounts! You can drill her well! http://y.ahoo.it/tCt19 From ddraig at gmail.com Fri Jun 1 13:42:40 2012 From: ddraig at gmail.com (ddraig) Date: Sat, 2 Jun 2012 06:42:40 +1000 Subject: [ExI] battle tanks to a five yr old Message-ID: Hi weird synchronicity, I started reading this book yesterday: http://www.amazon.com/New-Model-Army-Adam-Roberts/dp/0575083638/ref=sr_1_1?s=books&ie=UTF8&qid=1338583285&sr=1-1 "A giant has brought war to the fields and towns of England's heartland. When the British army brings in air support and deploys heavy weapons he simply melts away, only to form again somewhere else and deliver another devastating blow. He is called Pantegrel, and he is a New Model Armyba giant whose thoughts flow through countless wireless connections, whose intelligence comes from the internet and real-time camera updates, whose mind is made up of thousands of minds, each deciding what he will choose to do. He has chosen the joy of the fight, and his fury is truly democraticbhe is me and you. This is a terrifying vision of a near future war as new technologies allow the world's first truly democratic army to wrest control from the powers that be. Taking advances in modern communication and the new eagerness for power from the bottom upwards, Adam Roberts has produced at once an exciting war novel and a philosophical examination of war and democracy. It shows an exciting and innovative literary voices working at the height of his powers and investing SF with the literary significance that is its due." Dwayne -- B ddraig at pobox.com irc.bluesphereweb.com #dna B B B B B ...r.e.t.u.r.n....t.o....t.h.e....s.o.u.r.c.e... B B B B http://tinyurl.com/he-is-right-you-know-jpg our aim is wakefulness,B our enemy is dreamless sleep _______________________________________________ extropy-chat mailing list extropy-chat at lists.extropy.org http://lists.extropy.org/mailman/listinfo.cgi/extropy-chat ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From surroundingr48 at rossis.com Fri Jun 1 23:09:24 2012 From: surroundingr48 at rossis.com (=?koi8-r?B?7snay8/OwczPx8/X2cogxM/Iz8Q=?=) Date: Sat, 2 Jun 2012 09:39:24 +0330 Subject: =?koi8-r?B?7snay88tzsHMz8fP19nKIMTPyM/EINcgyM/MxMnOx8HI?= Message-ID: <000d01cd407d$e081e030$6400a8c0@surroundingr48> 06 июня 2012г. Оптимизация налогообложения в холдинговых структурах: как снизить расходы и увеличить прибыль Московский код; 742_9I98 \\\/// код (499) - 445.4095 Цель: На занятиях будут рассмотрены организационно-правовые, экономико-правовые аспекты создания и деятельности холдингов; вопросы управления холдингом, взаимодействие с дочерними и зависимыми компаниями Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. Как можно и как нельзя оптимизировать налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменения. "Черные", "серые" и "белые" схемы. "Метод холдинга" в налоговом планировании. Понятие виртуального холдинга как средства налогового планирования. Рациональное построение финансовых потоков и договорных отношений в холдинге через разделение оборотов, капитала (прибыли), активов, персонала, отношений с контрагентами и рисков. Элементы холдинга √ Операционные компании, Управляющая или финансирующая компания (Казначейство), Хранитель активов, Торговый дом (Снабжающая или закупочная организация), Центры обслуживания (Кадровые центры), риск-структуры и их роли в налоговом планировании. 2. Методы планирования налога на прибыль и НДС в холдингах Низконалоговые субъекты (ННС): * субъекты специальных налоговых режимов √ ЕНВД и УСН, в т.ч. патентная система, а также субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5-10%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * зарубежные офшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, "Недобросовестные налогоплательщики" и контактирующие с ними риск-структуры: как нельзя "оптимизировать". Принципиальная невозможность экономии НДС "белыми" схемами и случаи, когда это все же возможно. Способы переноса налогооблагаемой базы по налогу на прибыль на низконалоговых субъектов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. * механизм трансфертных цен, Условия их применения: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование трансфертных цен. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. Безналоговые способы передачи денежных средств в холдинге. Займы и аналогичные им договоры как способ возвратного рефинансирования √ преимущества и недостатки, риск ведения незаконной банковской деятельности. Рефинансирование и капитализация прибыли предприятия (холдинга) через уставной капитал, безвозмездную передачу имущества или добавочный капитал. Ст. 27 Закона "Об ООО". Другие способы безвозвратного рефинансирования. Простое товарищество субъектов упрощенной системы налогообложения, в т.ч. из "низконалоговых" регионов. Нужно или нет платить НДС? Перенос прибыли товарищества на низконалоговых субъектов (УСН 6%, ЕНВД, офшор и др.). Отсрочка уплаты налога при непередаче прибыли на счета товарищей. Возможен ли обход с помощью простого товарищества правил налогового учета (гл. 25 НК) и ограничений гл. 26.2 НК РФ в части перечня затрат? Экономия НДС в производстве, выполнении работ, оказании услуг через разделение финансовых потоков "с НДС" и "без НДС". Ограничение использования: покупатели/заказчики, не нуждающиеся в вычете НДС, как их выявить или создать искусственно. 3. Создание рациональной финансовой и организационной холдинговой структуры, схемы товарно-финансовых потоков и договорных отношений холдинга. Оперативное распределение налоговой нагрузки между участниками холдинга. Реальный пример комплексного налогового планирования в холдингах. 4. Принципы налогового планирования использования основных средств. Формирование холдинговой структуры для целей минимизации налогообложения имущества. "Хранитель активов" (лицо √ собственник имущественного комплекса). Низконалоговые и безналоговые способы передачи имущества "Хранителю активов". 5. Принципы налогового планирования (оптимизации) выплаты заработной платы в холдинге Дивидендные схемы √ замена выплаты зарплате на "упрощенке"? Договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Расчеты эффективности. Краткий обзор других (компенсационных, процентных и прочих) схем выплаты низконалогового дохода. 6. Встраивание иностранных (в т.ч. низконалоговых) компаний в структуру российских холдингов. Защита владения и скрытие собственника, уход от аффилированности, использование для оптимизации налога на прибыль: традиционные (торговля, проценты, дивиденды, роялти, услуги, и т.п.) и нетрадиционные схемы (простое товарищество, агентские). Выбор юрисдикций. 7. Обзор планируемых изменений налогового законодательства, как они повлияютs на налоговые схемы. Ответы на вопросы. По вопpоcам pегucтаpацuu обpащайтеcь по тел: \Моск. код/ 742/91\98 <<<>>> +7 (Ч95) 742/91\98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8130 bytes Desc: not available URL: From virtualadept at gmail.com Sat Jun 2 10:04:33 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Sat, 2 Jun 2012 13:04:33 -0400 Subject: [ZS] Bitcoin Price Manipulation Message-ID: On Sat, Jun 2, 2012 at 12:53 PM, R|diger Koch wrote: > Problem is that a few Bitcoins tend to go quite quickly. There are many > interesting things to buy for Bitcoins and a shopping tour tends to drain > your Bitcoin funds with similar ease as in any other currency. While irritating, that also says something about Bitcon's ease of use. If it's easy to make impulse purchases it's easy enough for the majority of people to use on their own. Along similar lines in this discussion: https://github.com/bitcoin/bitcoin/pull/1174 A few coders are working on adding Tor hidden service support to the Bitcoin client, i.e. when a Bitcoin client is configured to use Tor it automagically sets up a .onion address for itself. -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sat Jun 2 10:45:11 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 2 Jun 2012 19:45:11 +0200 Subject: [ZS] Bitcoin Price Manipulation Message-ID: <20120602174511.GM17120@leitl.org> ----- Forwarded message from Bryce Lynch ----- From ravelsjgj52 at anautics.com Sun Jun 3 14:26:13 2012 From: ravelsjgj52 at anautics.com (=?koi8-r?B?IvDSz8TBxdTT0SDEz80g1yDCzMnWwcrbxc0g8M/Ezc/Ty8/X2MUi?=) Date: Mon, 4 Jun 2012 06:26:13 +0900 Subject: =?koi8-r?B?8NLPxMHF1NPRINrBx8/Sz8TO2cogxM/N?= Message-ID: <000d01cd41cf$80883be0$6400a8c0@ravelsjgj52> Новорижское ш. 14 км от МКАД. Продаётся готовый жилой дом 300 кв.м в охраняемом посёлке Премиум класса. 100% авторский архитектурный проект. Территория посёлка окружена лесом, парковая зона, спортивные площадки. Телефон: 8(916) 088 08 92 Дарья From emeryantoinette at nz.eds.com Sun Jun 3 17:34:05 2012 From: emeryantoinette at nz.eds.com (Ernie Garza) Date: Mon, 04 Jun 2012 07:34:05 +0700 Subject: Buy Cialis Online :: OVERNIGHT Delivery! Exclusive & competitive discount prices, express shipping & discrete packaging. 27r1lok275 Message-ID: <201206032137.E56A33DD37E80833ACEE9@sbq89o8> Buy Cialis Online :: OVERNIGHT Delivery! Buy Cialis online from an official certified pharmacy, OVERNIGHT Shipping, Exclusive & competitive discount prices, express shipping & discrete packaging. http://cjzkef.ru From assav49 at zins.com Mon Jun 4 09:20:59 2012 From: assav49 at zins.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Mon, 4 Jun 2012 08:20:59 -0800 Subject: =?koi8-r?B?7MXUzywg0M/WwdLZIQ==?= Message-ID: За 2011 год по данным МЧС произошло 168 528 тысяч пожаров, имей средства защиты от пожара, новые средства защиты уже у Вас дома! www.защити-себя.рф From lecharis at aautomate.com Mon Jun 4 05:24:28 2012 From: lecharis at aautomate.com (MilagroNeda) Date: Mon, 04 Jun 2012 09:24:28 -0300 Subject: Buy Cialis Online :: OVERNIGHT Delivery! Exclusive & competitive discount prices, express shipping & discrete packaging. n6e4tc Message-ID: <18c22l91l63-41085795-029c7o46@faedryzp> Buy Cialis Online :: OVERNIGHT Delivery! Buy Cialis online from an official certified pharmacy, OVERNIGHT Shipping, Exclusive & competitive discount prices, express shipping & discrete packaging. http://dfdohf.ru From boggshunter at deluxe.com Sun Jun 3 22:32:11 2012 From: boggshunter at deluxe.com (Goldie Couch) Date: Mon, 04 Jun 2012 09:32:11 +0400 Subject: Choose from hundreds of perfect replica watches: Rolex, Cartier, Breitling, Omega & many more. Enjoy our monthly promotions! Visit us now! faj8ag Message-ID: <201206040431.B00E14DDEE8423F1DBDFC@lgdf42868> Rolex Replica Watches & More Choose from hundreds of perfect replica watches: Rolex, Cartier, Breitling, Omega & many more. Enjoy our monthly promotions! Visit us now! http://ampon.ru From deeps1587 at realsavvymoms.com Sun Jun 3 20:49:07 2012 From: deeps1587 at realsavvymoms.com (=?koi8-r?B?4c7BzMnaIMjPzMTJzsfP19nIINPU0tXL1NXS?=) Date: Mon, 4 Jun 2012 10:49:07 +0700 Subject: =?koi8-r?B?6M/MxMnOxywg0M/T1NLPxc7JxSwg1dDSwdfMxc7JxQ==?= Message-ID: Место проведения: г.Москва Тема: Холдинговые структуры: построение, управление, защита от претензий код (495) - 7-42/91/98 или \Моск. код/ 7Ч2/9I98 05 июня (продолжительность 1 день) Цель: Изучить холдинги: построение, управление, защиту от претензий. Программа мероприятия: 1. Способы объединений. Договорные способы объединений, участие в капитале, отношение дочерности и т.п. Взаимная ответственность по гражданско-правовым обязательствам. 2. Организационные структуры холдингов. Описание возможных структур холдингов: линейный, круговой, имущественный, договорный, проектный, инвестиционный, многоотраслевой, территориальный холдинг. Вертикально и горизонтально ориентированные холдинги. Диверсифицированные холдинги и т.п. Дочерние общества: способы управления, экономические отношения. Правовое регулирование экономических отношений основного и дочернего обществ. Договор. Основные правомочия субъектов договорных отношений 3. Управления холдингом. Вертикальное и горизонтальное управление холдингом. Управляющая компания. Проблема совмещения полномочий директора управляющей компании и председателя совета директоров управляемого лица. Полномочия независимой управляющей компании и основного общества. Управление дочерним обществом посредством передачи полномочий основному обществу. Сращение аппаратов управления дочернего общества и основного общества. Сепарация полномочий между структурами управляющих/управляемых компаний. Организация передачи управленческой информации в холдинге. Способы управления холдингом на оперативном уровне. Обеспечение контроля внутри дочерних обществ. 4. Договорная модель управления в холдинге, централизация. Договоры о предоставлении управленческих услуг, предоставлении персонала и другие разновидности аутсорсинга. Налоговый проблемы взаимодействия компаний, переквалификация сделок. Способы снижения рисков. Оформление отношений. Создание единого правового пространства. Концепция внутренних документов холдинговой компании Основные внутренние документы. Управление персоналом холдинга(организация смены персонала, внутренней аттестации, создание кадрового резерва и пр.) 5. Построение холдингов с нерезидентами. Краткий анализ построение холдинговых структур с нерезидентами на примере Кипра. 6. Правовые аспекты деятельности холдингов. Права и обязанности дочернего общества и основного общества, управляющей компании. Распределение функций и полномочий, распределение активов в холдинге. Крупные сделки, сделки с заинтересованностью. Основания оспаривания и защиты. Способы заключения сделок минимизирующие возможные претензии. 7. Регулирование холдингов антимонопольным законодательством. "Аффилированные лица", "холдинг" и т.п. Основания контроля. Последствия нарушений требований антимонопольного законодательства. 8. Финансирование и передача имущества. Возможности безвозмездной передачи имущества и денежных средств. Суть налоговых претензий, налогообложение сделок. Проблемы квалификации сделок. Способы передачи активов. Способы финансирования, замена займов иными сделками. 9. Налоговый аспект. Рассмотрение группы компаний как взаимозависимых лиц. Переквалификация сделок. Применение критериев недобросовестности к группе лиц. Основные деловые цели, объясняющие объединение. Привлечение участников холдинга к исполнению налоговых обязанностей друг за друга. Анализ материалов судебной практики. 10. Банкротство. Анализ нововведений в законодательство о банкротстве в части ответственности контролирующих должника лиц, директора и специальных оснований оспаривания сделок с заинтересованностью. Анализ проекта закона о трансграничных банкроствах позволяющих одновренно банкротить группу лиц. Cтоимоcть: 9000 руб За более подробной информацuей обpащайтеcь по тел: +7 (495)- 7429I-98 ; \Моск. код/ 792*2I\2-2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5528 bytes Desc: not available URL: From mixter at gmail.com Mon Jun 4 07:05:31 2012 From: mixter at gmail.com (mixter at gmail.com) Date: Mon, 4 Jun 2012 16:05:31 +0200 Subject: [ZS] Researchers To Release an Anonymous BitTorrent Client Message-ID: Not a super new idea, but a comprehensive anonymization package from a single source is usually more secure. http://torrentfreak.com/researchers-anonymous-bittorrent-client-120601/ Researchers at Delft University of Technology have taken up the ambitious challenge of creating a BitTorrent client which secures the privacy of its users. Their Tribler client is already completely decentralized, meaning it will still work even in the event that all BitTorrent sites are shut down. Anonymity is the next big step in its evolution. bWebre going to take Internet privacy to the next level,b the lead researcher says about the upcoming release. BitTorrent users are increasingly looking for more anonymity but right now their options are limited. For a monthly fee they can sign up with a VPN or proxy to hide their IP-address. Free options with decent speeds or without other restrictions arenbt easily available. This lack of fast, unlimited and free anonymous BitTorrent options is what the Tribler team at Delft University of Technology are hoping to change. Their Tribler client has been around for more than half a decade already, and during that time itbs developed into the only truly decentralized BitTorrent client out there. Unlike traditional BitTorrent clients, Tribler does not rely on central servers or third-party sites. Users can search, download and moderate files from within the application itself, based on pure peer-to-peer communication. Quite a remarkable achievement, but itbs also just the beginning for the research team. During a talk at the Stanford University this week, Dr. Johan Pouwelse talked about the past and the future of Tribler, announcing the ambitious play to add make BitTorrent transfers more private. Talking to TorrentFreak, Pouwelse explained that the idea is to add a proxy layer where proxies act as bcachesb of content. This can hugely improve downloads speeds, but also makes BitTorrent downloads more private. bOur goal is to provide all users with the download speed which today can only be found in private BitTorrent communities, combined with the privacy that is currently only offered by paid VPN services,b said Pouwelse. The Triber team has been perfecting the technology for years and itbs expected to be released in two or three months. Initial tests show that even with the added anonymity, people donbt have to sacrifice speed at all. Quite the contrary. bExperimental results have shown that the performance of the proposed mechanism is better than that of regular BitTorrent in a large number of scenarios. At the same time, the proxy layer can be used to offer the users a shield of plausible deniability enhancing their privacy,b Pouwelse told us. With the new code Tribler says it outperforms other clients such as uTorrent in download speeds. Ultimately, the researchers hope to compete with on-demand video services such as YouTube. bBitTorrent has served us well for 11 years, but modern features such as YouTube-like easy streaming, sharing of your 1 Terabyte harddisk and solid anonymity are needed. The BitTorrent protocol simply does not scale to safe private sharing of 1 Terabyte, which would begin to bridge the gap between the wealth of content on YouTube versus the weak archive capability of BitTorrent.b Helped by money from European tax payers, the bunderstaffedb team say they are now at a point where Tribler can compete with some of the fastest centralized services. Their P2P streaming technology is currently under consideration to become an official Internet standard and is being actively tested by major broadcasting companies including the BBC. The Tribler proxy layer is expected to be implemented this fall, but those who want to give the current version of Tribler a spin are welcome download it here. The client is completely Open Source and has a version for Windows, Mac and Linux. -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Jun 4 07:07:55 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 4 Jun 2012 16:07:55 +0200 Subject: [ZS] Researchers To Release an Anonymous BitTorrent Client Message-ID: <20120604140755.GM17120@leitl.org> ----- Forwarded message from "mixter at gmail.com" ----- From kb at karelbilek.com Mon Jun 4 07:50:38 2012 From: kb at karelbilek.com (=?ISO-8859-1?Q?Karel_B=EDlek?=) Date: Mon, 4 Jun 2012 16:50:38 +0200 Subject: [ZS] Researchers To Release an Anonymous BitTorrent Client In-Reply-To: <20120604140755.GM17120@leitl.org> References: <20120604140755.GM17120@leitl.org> Message-ID: I don't understand this idea, at all. (I don't like the current tribler, its decentralized search is a throwback to all the gnutella systems of the past; I think bittorrent is showing that there is still a need for centralized repository with control) What are the proxy nodes? Is it like Tor with only volunteers? Is it like Freenet where every user is a proxy? Or are they themselves the proxy servers? Also, I think they are basically doing two things that are in opposition - making bittorrent faster and making it more anonymous. This will not work. K On Jun 4, 2012 4:21 PM, "Eugen Leitl" wrote: > ----- Forwarded message from "mixter at gmail.com" ----- > > From: "mixter at gmail.com" > Date: Mon, 4 Jun 2012 16:05:31 +0200 > To: doctrinezero at googlegroups.com > Subject: [ZS] Researchers To Release an Anonymous BitTorrent Client > Reply-To: doctrinezero at googlegroups.com > > Not a super new idea, but a comprehensive anonymization package from a > single source is usually more secure. > > > http://torrentfreak.com/researchers-anonymous-bittorrent-client-120601/ > > Researchers at Delft University of Technology have taken up the > ambitious challenge of creating a BitTorrent client which secures the > privacy of its users. Their Tribler client is already completely > decentralized, meaning it will still work even in the event that all > BitTorrent sites are shut down. Anonymity is the next big step in its > evolution. b Web re going to take Internet privacy to the next level,b > the lead researcher says about the upcoming release. > > BitTorrent users are increasingly looking for more anonymity but right > now their options are limited. > > For a monthly fee they can sign up with a VPN or proxy to hide their > IP-address. Free options with decent speeds or without other > restrictions arenb t easily available. > > This lack of fast, unlimited and free anonymous BitTorrent options is > what the Tribler team at Delft University of Technology are hoping to > change. Their Tribler client has been around for more than half a > decade already, and during that time itb s developed into the only > truly decentralized BitTorrent client out there. > > Unlike traditional BitTorrent clients, Tribler does not rely on > central servers or third-party sites. Users can search, download and > moderate files from within the application itself, based on pure > peer-to-peer communication. Quite a remarkable achievement, but itb s > also just the beginning for the research team. > > During a talk at the Stanford University this week, Dr. Johan Pouwelse > talked about the past and the future of Tribler, announcing the > ambitious play to add make BitTorrent transfers more private. > > Talking to TorrentFreak, Pouwelse explained that the idea is to add a > proxy layer where proxies act as b cachesb of content. This can hugely > improve downloads speeds, but also makes BitTorrent downloads more > private. > > b Our goal is to provide all users with the download speed which today > can only be found in private BitTorrent communities, combined with the > privacy that is currently only offered by paid VPN services,b said > Pouwelse. > > The Triber team has been perfecting the technology for years and itb s > expected to be released in two or three months. Initial tests show > that even with the added anonymity, people donb t have to sacrifice > speed at all. Quite the contrary. > > b Experimental results have shown that the performance of the proposed > mechanism is better than that of regular BitTorrent in a large number > of scenarios. At the same time, the proxy layer can be used to offer > the users a shield of plausible deniability enhancing their privacy,b > Pouwelse told us. > > With the new code Tribler says it outperforms other clients such as > uTorrent in download speeds. Ultimately, the researchers hope to > compete with on-demand video services such as YouTube. > > b BitTorrent has served us well for 11 years, but modern features such > as YouTube-like easy streaming, sharing of your 1 Terabyte harddisk > and solid anonymity are needed. The BitTorrent protocol simply does > not scale to safe private sharing of 1 Terabyte, which would begin to > bridge the gap between the wealth of content on YouTube versus the > weak archive capability of BitTorrent.b > > Helped by money from European tax payers, the b understaffedb team say > they are now at a point where Tribler can compete with some of the > fastest centralized services. Their P2P streaming technology is > currently under consideration to become an official Internet standard > and is being actively tested by major broadcasting companies including > the BBC. > > The Tribler proxy layer is expected to be implemented this fall, but > those who want to give the current version of Tribler a spin are > welcome download it here. The client is completely Open Source and has > a version for Windows, Mac and Linux. > > -- > Zero State mailing list: > http://groups.google.com/group/DoctrineZero > > ----- End forwarded message ----- > -- > Eugen* Leitl leitl http://leitl.org > ______________________________________________________________ > ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org > 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From press-office at wikileaks.org Mon Jun 4 16:57:57 2012 From: press-office at wikileaks.org (Wikileaks Press Office) Date: Mon, 4 Jun 2012 16:57:57 -0700 (PDT) Subject: [WIKILEAKS] Friends of WikiLeaks Message-ID: You have been invited to join Friends of WikiLeaks https://wlfriends.org/ MANIFESTO We, Friends of Wikileaks, support WikiLeaks, its people, its principles and its goals. We are committed to these broad ideals: 1. The right to communicate, including the right to speak, and the right to listen, the freedom of thought, the right to communicate privately, and the right to communicate anonymously. 2. The inviolability of history. 3. Privacy for the weak. 4. Transparency for the powerful. 5. The pursuit of truth, as the primary prerequisite for a more just civilization. Friends of WikiLeaks aim to do the following: 1. To defend WikiLeaks against attacks by, - becoming informed and informing each other, - promoting public awareness in the wider population, - counteracting misinformation, online and offline, - helping to raise funds, - addressing new and unforeseeable threats to WikiLeaks' continued functioning. 2. To vindicate the sources of WikiLeaks, whoever they may be, by, - defending through speech the good name of anyone alleged to have risked life and comfort to inform the public, - keeping WikiLeaks strong so that it is able to defend its sources, - ensuring through advocacy that the information they sought to bring to the world does not fall on deaf ears. 3. To defend the alleged sources of WikiLeaks, by, - organizing legal defense funding and support groups for them, - defending the motives of whistleblowers, - exercising care not to prejudice their rights by assuming legal culpability for the actions they are accused of. 4. To aid organizations and individuals who share the principles and goals of WikiLeaks. How is FoWL different? FoWL gives you new friends to instantly build a mass global movement. Unlike traditional social networks, FoWL is hardened against surveillance and attack. The primary spaces for online activism are watched by private and state intelligence agencies. FoWL is built to counter this. By design your details are encrypted, and hidden from everyone except your immediate contacts. Even we can't access them. Connected by FoWL, friends of WikiLeaks will communicate how ever they like, including using secure person-to-person methods. As the network grows away from the site infrastructure, it becomes autonomous and decentralized, opaque to observers and impossible to compromise. Why FoWL? Our attackers are wealthy and powerful organizations and governments. Their attacks - legal, financial and reputational - are sophisticated, and well resourced. For example: In late 2010, an informal consortium of banking institutions including VISA, Mastercard, Bank of America, Paypal and Western Union, moved to illegally blockade donations sent to WikiLeaks from its supporters. This blockade is ongoing. [More... http://wikileaks.org/Banking-Blockade.html] In 2011, a private security firm, HBGary Federal, contracted with US government agencies to marginalize WikiLeaks by spying on supporters and attacking the reputation of supportive journalists, such as Glenn Greenwald. http://www.salon.com/2011/02/15/palantir/singleton/ +-------------------------------------------------- | Why you receive this mail and what to do with it | | We rely on you to distribute the content of this mail to your | community, industry, press and regulators, to defend us in your | country and to invite people of integrity and commitment via | via https://lists.riseup.net/www/subscribe/wl-press ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From caffeineq52 at royalcliff.com Mon Jun 4 13:02:57 2012 From: caffeineq52 at royalcliff.com (=?koi8-r?B?0NLP18XSy8kg7ffkINcgMjAxMiDHz8TV?=) Date: Mon, 4 Jun 2012 21:02:57 +0100 Subject: =?koi8-r?B?0NLP18XSy8kg7ffkIMkg7sHMz8fP19nFINDSz9fF0svJINcgMjAxMiDH?= =?koi8-r?B?z8TV?= Message-ID: <000d01cd4284$a7489300$6400a8c0@caffeineq52> 18 июня 2012г. Проверки МВД и Налоговые проверки в 2012 году (код Москвы) 792_2122 ; +7 499 - 445*4О*95 Программа: 1. Налоговое администрирование в 2012 году. * Совершенствование системы налоговых правоотношений в 2012 году. * Разъясняющие письма МФ РФ √ в целях единообразного применения норм налогового законодательства. * Как будет складываться взаимодействие налоговых и правоохранительных органов. * Борьба с фирмами-однодневками продолжается с учетом нового ФЗ от 07.12.2011 г. ╧ 419-ФЗ. 2. Недобросовестность налогоплательщика. * Признаки недобросовестности налогоплательщика. * Критерии законности налоговой оптимизации. * Доказывание фактов, свидетельствующих об уклонении от налогов. * Недействительные сделки, мнимые и притворные сделки; последствия недействительности. * Срок давности для привлечения к ответственности при выявлении уклонения от уплаты налогов. * Типичные налогосберегающие схемы: ошибки применения и последствия. 3. Проверки налоговыми органами. * Специфика проверок камеральных, встречных, выездных. * Правила поведения первых лиц организации при выездной налоговой проверке. * Оформление результатов проверки. Обжалование результатов налоговых проверок. * Взыскание недоимки по налогам и пени. Срок давности для взыскания налогов и пени. * Порядок бесспорного взыскания недоимки по налогам и пени. * Взыскание штрафных санкций Срок давности для взыскания штрафных санкций. * Ответственность должностных лиц по налоговым преступлениям. 4. Проверки, проводимые совместно с ОБЭП и органами МВД РФ. * Основные причины, по которым приходит ОБЭП. Подтверждение полномочий инспекторов и порядок проведения проверки. * Опрос, допрос, обыск и изъятие: правила поведения налогоплательщика. Основные виды экономических преступлений. Как избежать уголовной ответственности руководителю, бухгалтеру, юристу. 5. Новые направления в налоговом контроле: о критериях признания получения налогоплательщиком необоснованной налоговой выгоды. 6. Что нужно знать о порядке проведения проверки. 7. Что нужно знать о том, как обычно действуют проверяющие. 8. Изменения в регламенте проведения проверок налоговыми органами. Изменения в части I НК РФ. * Формы и методы контроля со стороны правоохранительных органов. Финансовая, административная и уголовная ответственность за нарушение налогового законодательства. * Применение срока давности по налоговым правонарушениям. 9. Что нужно знать о том, как правильно проверяющие должны оформлять свои действия. * Как начинается проверка и что требовать от проверяющих. * Что делать, если проверяющие приходят, а директора нет на месте. * Как проходит и чем заканчивается проверка. * Как оформляются проверочные мероприятия. * Что можно позволить проверяющим, а что лучше запретить. * Как правильно вести себя при проверке. * Нужно ли отвечать на все вопросы. * Нужно ли незамедлительно предоставлять документы. * Нужно ли показывать и разъяснять компьютерные программы и файлы. 10. Что нужно знать, если намерениями проверяющих являются: ревизия финансово-хозяйственной деятельности, изъятие товара, изъятие компьютеров, обследование помещений, зданий, сооружений, транспортных средств и других объектов, выемка документов, вскрытие сейфов, обыск. 11. Что нужно знать, если Вы решили жаловаться или инициировать судебное разбирательство. 12. Способы защиты прав налогоплательщика при процедурных нарушениях со стороны налоговых и правоохранительных органов. Составление протокола разногласий. Стоимость участия: 8 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 499 - 4Ч5/40\95 или 8 Моск. код: 79221-22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7732 bytes Desc: not available URL: From extincto at amerispec.com Mon Jun 4 07:01:24 2012 From: extincto at amerispec.com (=?koi8-r?B?IvPF0tTJxsnLwcPJ0SI=?=) Date: Mon, 4 Jun 2012 22:01:24 +0800 Subject: =?koi8-r?B?79DMwdTBINDP08zFINDPzNXexc7J0SDz5fL06ebp6+H04Q==?= Message-ID: <9B6EB030797F44FCB0576C11E8804A1C@PC200908302024> Все виды сертификации АКЦИЯ Оплата после получения СЕРТИФИКАТА Только у нас СЕРТИФИКАТ СООТВЕТСТВИЯ ГОСТ Р ЗА ЧАС!!! (495) 227 94 43 From jya at pipeline.com Tue Jun 5 03:11:01 2012 From: jya at pipeline.com (John Young) Date: Tue, 05 Jun 2012 06:11:01 -0400 Subject: Cypherpunks Begat WikiLeaks Message-ID: The Assange Show on RT tonight, June 5, covers Cypherpunks as source of WikiLeaks: http://www.rt.com/news/julian-assange-internet-war-cypherpunk-989/ RT blurb: -Cypherpunks is a movement originating from Cypherpunks Electronic Mailing List, which was set up by activists aiming to improve Internet privacy and security through proactive use of cryptography. The movement has been active since the late 1980s. WikiLeaks is one of the many projects derived from Cypherpunks. A furious invisible war over our society is underway. Finer technologies to collect netizens private data pop up every week  and what now exactly is private? Julian Assange asks his Cypherpunk guests: is the worlds future tied to the Internet? -WikiLeaks founder, Julian Assange, gets back in touch with the Cypherpunks movement to discuss the unseen battlefield  the Internet: how cyber wars are no longer a sheer paranoid fantasy, how your life turns into goods sold at the market, why a math problem is not exactly a problem when private data is concerned and what the best antidote is to political storytelling. "A furious invisible war" is no longer a poetic comparison, you will find out, and this is a battle in your backyard. From virtualadept at gmail.com Tue Jun 5 06:43:34 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Tue, 5 Jun 2012 09:43:34 -0400 Subject: [ZS] Why centralized infrastructure doesn't work Message-ID: On Tue, Jun 5, 2012 at 2:51 AM, R|diger Koch wrote: > http://news.slashdot.org/story/12/06/04/1211206/microsoft-certificate-was-used-to-sign-flame-malware SSL and CAs being completely b0rked out of the gate and all that... #include Moxie Marlinspike's talk last summer. > imagine such an incident in something that's really important - such as a > payment infrastructure. I think this goes to show that *anything* that > relies on trust authorities must be avoided like the plague. Centralized SSL authorities being compromised has been a problem for nearly five years now. Plus, there is no way of knowing how many "*.*" certs are floating around out there because they're just files that can be copied. Also, there are CAs which will sell *.* MITM-capable certs to whomever is willing to pay for them because they are then loaded into "loss prevention" devices to look for data exfiltration. So, on that front the battle's already lost because one corporation's MITM cert is another's surveillance tool. Has convergance.io gotten any easier to use, or does it still have a certificate-hairball heart attack the first time one runs a Google search? -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From investdlt at ovako.com Tue Jun 5 00:18:43 2012 From: investdlt at ovako.com (=?koi8-r?B?IuvPzdDMxcvTzsHRINPF0tTJxsnLwcPJ0SI=?=) Date: Tue, 5 Jun 2012 10:18:43 +0300 Subject: =?koi8-r?B?79DMwdTBINDP08zFINDPzNXexc7J0SDz5fL06ebp6+H04Q==?= Message-ID: <854395738.37559043509124@ovako.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2207 bytes Desc: not available URL: From eugen at leitl.org Tue Jun 5 02:54:32 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 5 Jun 2012 11:54:32 +0200 Subject: [WIKILEAKS] Friends of WikiLeaks Message-ID: <20120605095432.GD17120@leitl.org> ----- Forwarded message from Wikileaks Press Office ----- From bleederh6 at airworldtravel.com Mon Jun 4 23:37:43 2012 From: bleederh6 at airworldtravel.com (=?koi8-r?B?IuTPzSDXIOjBzc/XzsnLwcgi?=) Date: Tue, 5 Jun 2012 14:37:43 +0800 Subject: =?koi8-r?B?8NLPxMHA1NPRIMvXwdLUydLZINcg6MHNz9fOycvByCA=?= Message-ID: <8759C8392BAD42D4A67E83635D5D3EC4@N> Продаются квартиры в Хамовниках в вблизи Новодевичьего монастыря www.дом-хамовники.рф From eugen at leitl.org Tue Jun 5 06:48:54 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 5 Jun 2012 15:48:54 +0200 Subject: [ZS] Why centralized infrastructure doesn't work Message-ID: <20120605134854.GM17120@leitl.org> ----- Forwarded message from Bryce Lynch ----- From playoffsjp0 at nguinternational.com Tue Jun 5 00:00:40 2012 From: playoffsjp0 at nguinternational.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Tue, 5 Jun 2012 16:00:40 +0900 Subject: =?koi8-r?B?79PUz9LP1s7PIPDv9uHy+SE=?= Message-ID: <553DB1F13A1F4C5096180C948B0B2A59@USERGROUPUSER> За 2011 год по данным МЧС пожары принесли Материального ущерба на 17 280 086 000 млрд. рублей, защити свою квартиру, дачу, гараж от пожара! www.защити-себя.рф From placeboscfw at soiltech-agri.com Tue Jun 5 03:50:34 2012 From: placeboscfw at soiltech-agri.com (=?koi8-r?B?IsbJ0s3BINcg+9fFysPB0snJIg==?=) Date: Tue, 5 Jun 2012 16:20:34 +0530 Subject: =?koi8-r?B?89fP0SDGydLNwSDXIPvXxcrDwdLJySAtINPQxcPJwczYzs/FINDSxcTM?= =?koi8-r?B?z9bFzsnFIQ==?= Message-ID: Своя фирма в Швейцарии - специальное предложение! Регистрация фирмы в Швейцарии "под ключ" всего за 7999 франков - только до 1 сентября! Номинальный сервис, ведение бухгалтерии, юридические адреса, виртуальный офис. Для юридических фирм и посредников - скидки до 30% Телефон +41 44 51 52 59 0 (Цюрих) www.мтип.рф From huckleberrypsg2 at relay130.msgfocus.com Tue Jun 5 12:45:28 2012 From: huckleberrypsg2 at relay130.msgfocus.com (=?koi8-r?B?MjAxMiDHLjogzsHMz8fP19nFICDQ0s/XxdLLySA=?=) Date: Tue, 5 Jun 2012 16:45:28 -0300 Subject: =?koi8-r?B?7sHMz8fP19nFINDSz9fF0svJIMkg0NLP18XSy8kg7ffkINcgMjAxMiDH?= =?koi8-r?B?z8TV?= Message-ID: <000d01cd4353$c2504740$6400a8c0@huckleberrypsg2> 18 июня 2012г. Налоговые проверки и проверки МВД в 2012 году. Рекомендации бухгалтеру и руководителю +7 499 ЧЧ5_Ч0/95 и 8 (499) Ч454О95 Программа: 1. Налоговое администрирование в 2012 году. * Совершенствование системы налоговых правоотношений в 2012 году. * Разъясняющие письма МФ РФ √ в целях единообразного применения норм налогового законодательства. * Как будет складываться взаимодействие налоговых и правоохранительных органов. * Борьба с фирмами-однодневками продолжается с учетом нового ФЗ от 07.12.2011 г. ╧ 419-ФЗ. 2. Недобросовестность налогоплательщика. * Признаки недобросовестности налогоплательщика. * Критерии законности налоговой оптимизации. * Доказывание фактов, свидетельствующих об уклонении от налогов. * Недействительные сделки, мнимые и притворные сделки; последствия недействительности. * Срок давности для привлечения к ответственности при выявлении уклонения от уплаты налогов. * Типичные налогосберегающие схемы: ошибки применения и последствия. 3. Проверки налоговыми органами. * Специфика проверок камеральных, встречных, выездных. * Правила поведения первых лиц организации при выездной налоговой проверке. * Оформление результатов проверки. Обжалование результатов налоговых проверок. * Взыскание недоимки по налогам и пени. Срок давности для взыскания налогов и пени. * Порядок бесспорного взыскания недоимки по налогам и пени. * Взыскание штрафных санкций Срок давности для взыскания штрафных санкций. * Ответственность должностных лиц по налоговым преступлениям. 4. Проверки, проводимые совместно с ОБЭП и органами МВД РФ. * Основные причины, по которым приходит ОБЭП. Подтверждение полномочий инспекторов и порядок проведения проверки. * Опрос, допрос, обыск и изъятие: правила поведения налогоплательщика. Основные виды экономических преступлений. Как избежать уголовной ответственности руководителю, бухгалтеру, юристу. 5. Новые направления в налоговом контроле: о критериях признания получения налогоплательщиком необоснованной налоговой выгоды. 6. Что нужно знать о порядке проведения проверки. 7. Что нужно знать о том, как обычно действуют проверяющие. 8. Изменения в регламенте проведения проверок налоговыми органами. Изменения в части I НК РФ. * Формы и методы контроля со стороны правоохранительных органов. Финансовая, административная и уголовная ответственность за нарушение налогового законодательства. * Применение срока давности по налоговым правонарушениям. 9. Что нужно знать о том, как правильно проверяющие должны оформлять свои действия. * Как начинается проверка и что требовать от проверяющих. * Что делать, если проверяющие приходят, а директора нет на месте. * Как проходит и чем заканчивается проверка. * Как оформляются проверочные мероприятия. * Что можно позволить проверяющим, а что лучше запретить. * Как правильно вести себя при проверке. * Нужно ли отвечать на все вопросы. * Нужно ли незамедлительно предоставлять документы. * Нужно ли показывать и разъяснять компьютерные программы и файлы. 10. Что нужно знать, если намерениями проверяющих являются: ревизия финансово-хозяйственной деятельности, изъятие товара, изъятие компьютеров, обследование помещений, зданий, сооружений, транспортных средств и других объектов, выемка документов, вскрытие сейфов, обыск. 11. Что нужно знать, если Вы решили жаловаться или инициировать судебное разбирательство. 12. Способы защиты прав налогоплательщика при процедурных нарушениях со стороны налоговых и правоохранительных органов. Составление протокола разногласий. Стоимость участия: 8 000 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 495 7Ч2*91\98 <<>> +7 Московский код: 792/2I22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7719 bytes Desc: not available URL: From asepticr66 at robertselliott.com Tue Jun 5 01:00:42 2012 From: asepticr66 at robertselliott.com (=?koi8-r?B?1NLBztPGxdLUzs/FIMPFzs/PwtLB2s/Xwc7JxSAyMDEy?=) Date: Tue, 5 Jun 2012 17:00:42 +0900 Subject: =?koi8-r?B?9NLBztPGxdLUzs/FIMPFzs/PwtLB2s/Xwc7JxTog89DP08/C2SDVyM/E?= =?koi8-r?B?wSDP1CDLz87U0s/M0SDawSDTxMXMy8HNyQ==?= Message-ID: <000d01cd42f1$4e2e9680$6400a8c0@asepticr66> 08 июня 2012г. Изменения в законодательство о налоговом регулировании трансфертных цен с 2012 года. Как налогоплательщикам обосновать применяемые цены и минимизировать риски? +7 499 - Ч45_Ч0\95 <> код (495) - 7/Ч2*9I-98 Цель: С 1 января 2012 года НК РФ дополнен новым разделом V.1, посвященным контролю цен сделок. Семинар посвящен подробному рассмотрению произошедших в этой сфере изменений и практическим рекомендациям налогоплательщикам по адаптации к ним (подготовка защитной документации, избежание взаимозависимости и контроля сделок, снижение риска претензий). Рассматриваются новые обязанности, права и ответственность налогоплательщиков, новый вид проверок √ "проверка полноты исчисления и уплаты налогов в связи с совершением сделок между взаимозависимыми лицами", способы обоснования трансфертных цен в различных сделках. Вместе с тем, рассматриваются и законные способы ухода от обременительного контроля за ценами сделок по новому законодательству, его пробелы и противоречия, перспективы новых поправок в НК РФ. Программа: 1. Контролируемые сделки, что изменилось: * сделки между взаимозависимыми лицами; * сделки в области внешней торговли биржевыми товарами; * сделки с офшорами; 2. Когда сделки не признаются контролируемыми и как избежать контроля. Методика расчета минимальной суммы для признания внутрироссийских сделок контролируемыми. 3. Взаимозависимые лица, новый перечень оснований взаимозависимости, ее косвенные признаки. Установление взаимозависимости "по иным основаниям" в рамках судебного разбирательства. Способы ухода от взаимозависимости. Использование номинальных учредителей и директоров компаний, ИП Кто может быть номиналом? Номиналы-нерезиденты: юридические и физические лица. Траст: номиналы по закону, а не "по понятиям". Как защититься от номинала: юридические и экономические способы. Простое товарищество с физлицом-номиналом? 4. Новые обязанности и права налогоплательщиков, совершающих контролируемые сделки: * определение перечня контролируемых сделок, форма и сроки подачи; * подача документации по трансфертным ценам; * добровольные корректировки цен. 5. Новый вид налоговых проверок √ "проверка полноты исчисления и уплаты налогов в связи с совершением сделок между взаимозависимыми лицами". Случаи освобождения от ответственности. 6.Методы определения соответствия цен сделки рыночным: * сопоставимые рыночные цены √ где их найти. Расчет интервала рыночных цен; * сопоставимые сделки √ как доказать сопоставимость. Методика корректировки; * открытые источники информации √ что это; * анализа уровня рентабельности √ как найти сопоставимые компании. Расчет интервала рентабельности; * метод распределения прибыли √ реально ли применение на практике?; 6. Международная практика применения методов ценообразования (ОЭСР, США). 7. Способы защиты прав и интересов налогоплательщика: * соглашение о ценообразовании: порядок определения цен и порядок применения методов ценообразования в контролируемых сделках. Насколько это реально?; * симметричные корректировки: потенциальные проблемы в применении; * консолидированная группа налогоплательщиков: далекое будущее? 8. Что конкретно должно быть сделано сейчас для успешной адаптации к новым правилам: * анализ соответствия применяемых цен и существующей методики ценообразования требованиям НК; * что изменить в договорах; * разработка типовой документации для обоснования цен. 9. Примеры подходов к исследованию трансфертных цен по разным видам деятельности. 10.Ответы на вопросы. Стоимость участия: 9 000 рублей Вся информация по тел: 8 (499) 4454О95 \\\/// 8 (495) 792.21-22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6620 bytes Desc: not available URL: From interlards45 at delmonacofoods.com Tue Jun 5 02:58:00 2012 From: interlards45 at delmonacofoods.com (=?koi8-r?B?IuUtzcXJzCDNwdLLxdTJzsci?=) Date: Tue, 5 Jun 2012 17:58:00 +0800 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAgKyDIz9PUyc7HIM7BIM3F09HDINcg?= =?koi8-r?B?8O/k4fLv6w==?= Message-ID: <149314482.39142050685790@delmonacofoods.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 15415 bytes Desc: not available URL: From armax at tim.ca Tue Jun 5 05:56:04 2012 From: armax at tim.ca (=?koi8-r?B?IvPM1dbCwSDCxdrP0MHTzs/T1Mki?=) Date: Tue, 5 Jun 2012 18:26:04 +0530 Subject: =?koi8-r?B?/NTB0Nkg08/axMHOydEg8+IgySDQz9LRxM/LIMXFIMbVzsvDyc/OyQ==?= =?koi8-r?B?0s/Xwc7J0Q==?= Message-ID: <01cd4348$aa734600$fea1fc7b@armax> 13 - 14 июня 2012 г., СЕМИНАР: Э К О Н О М И Ч Е С К А Я Б Е З О П А С Н О С Т Ь П Р Е Д П Р И Я Т И Я (о месте проведения узнавайте по тел. (812) 642.76 61 ____________________________________________________ ПРОГРАММА СЕМИНАРА: 1. Основы экономической безопасности предприятия. 2. Функционирование и реорганизация системы безопасности предприятия в соответствии с Законом РФ # 272-ФЗ от 22.12.2008 и его влияние на функционирование систем безопасности предприятий. Нормативно-правовая база РФ по вопросам обеспечения безопасности предприятий. 3. Направления деятельности по реорганизации системы безопасности предприятия в соответствии с изменившимися условиями. Организация взаимодействия структурных подразделений предприятия. Порядок перераспределения контрольных функций. 4. Определение эффективности работы службы экономической безопасности. Функции, задачи и направления деятельности СБ. Планирование работы. Организация личной защиты. Этапы создания СБ и порядок ее функционирования. Направления обеспечения безопасности предприятия, которые могут быть переданы на аутсорсинг. Организация взаимодействия с партнёрами. 5. Система и методы анализа и управления экономическими рисками. Корпоративные захваты: инструменты обнаружения и противодействия корпоративным захватам. Правовые и экономические аспекты процесса недружественного поглощения. Сценарии проведения. 6. Построение системы внутреннего контроля (СВК) на предприятии. Сущность и необходимость СВК. Международный опыт в организации и деятельности СВК. Анализ результативности процедур. 7. Место деловой разведки в обеспечении экономической безопасности бизнеса. 8. Внезапная проверка. Правовые основы деятельности контролирующих органов. процедура проведения проверок, виды проверок и основания проведения, правовое положение руководителя организации и должностных лиц. 9. Интегрированная система охраны объектов, Общие положения. Концепция комплексной защиты объекта. Модель объекта защиты. Модель угроз объекту защиты. 10. Основы информационной безопасности предприятия. 11. Правовые основы защиты конфиденциальной информации. Определение понятий 'конфиденциальная информация' и 'коммерческая' тайна Возможность получения конф. инф-ции органами, осуществляющими оперативно-розыскные мероприятия и правила, которые должны соблюдаться в процессе ОРД. Мероприятия по защите конфиденциальной информации. Обеспечение сохранения коммерческой тайны предприятия. 12. Технические средства промышленного шпионажа и средства их обнаружения. Мероприятия по пресечению несанкционированного доступа к конфиденциальной информации. Защита компьютерной информации. Обеспечение безопасности каналов связи. Технические средства информационной безопасности. Технические ср-ва промышленного шпионажа. Акустический канал утечки информации и его защита. Акустоэлектрический канал утечки информации и его защита. Телефонный (в том числе радиотелефонный) канал утечки информации и его защита. Электромагнитный канал утечки информации и его защита. Меры и ср-ва защиты информации от технических средств ее съема. Приборы обнаружения технических ср-в промышленного шпионажа. 13. Защита компьютерной информации; правила при выборе средства защиты компьютерной информации; основы криптографической защиты информации; вирусная угроза; возможность защиты информации при работе в сети "Интернет". Электронно-цифровая подпись как средство защиты документов, представленных в электронном виде. Защита компьютерных сетей. 14. Практическая демонстрация возможностей средств контроля и управления доступом, средств противодействия промышленному шпионажу ____________________________________________________ Bcя подpобнaя инфоpмaция будет выcлaнa Baм по запросу в Caнкт-Пeтepбypг: (812) 642_76..61 From libidinousmz8 at miami-airport.com Tue Jun 5 11:19:55 2012 From: libidinousmz8 at miami-airport.com (=?koi8-r?B?Iu3By9PJzcHM2M7B0SDSxcvMwc3BICI=?=) Date: Tue, 5 Jun 2012 19:19:55 +0100 Subject: =?koi8-r?B?7cXT0cMg0sHT09nMz8sgMjAgMDAw?= Message-ID: Месяц рассылок 44(46) - 2 раза в день - 5 раз в неделю - 20 000 Тел: (495) 585-79-04 ICQ: 286-926-971 From brotherhoodig59 at farmagro.com Tue Jun 5 04:39:46 2012 From: brotherhoodig59 at farmagro.com (=?koi8-r?B?IvLFzc/O1CI=?=) Date: Tue, 5 Jun 2012 19:39:46 +0800 Subject: =?koi8-r?B?8sXNz87UIMvXwdLUydIgySDPxsnTz9cg7NXe28nFIMPFztk=?= Message-ID: <061032E388A84462A08B10DA50D5C039@microsof5dbc5d> Ремонт квартир и офисов "под ключ". Внимание, АКЦИЯ!!! Только до 11 июня при заказе комплексного ремонта вы получаете КОНДИЦИОНЕР General Fujitsu CLASSIC ASH7U в ПОДАРОК! www.ремонт-тут.рф From bill at slatteryco.com Tue Jun 5 07:18:20 2012 From: bill at slatteryco.com (=?koi8-r?B?IvzLz87PzcnexdPLycUg0snTy8kgySDLz9LQz9LB1MnXztnFINrByA==?= =?koi8-r?B?18HU2SI=?=) Date: Tue, 5 Jun 2012 19:48:20 +0530 Subject: =?koi8-r?B?8NLJws/S2SDPws7B0tXWxc7J0SDUxcjOyd7F08vJyCDT0sXE09TXIA==?= =?koi8-r?B?0NLPzdnbzMXOzs/HzyDb0MnPzsHWwQ==?= Message-ID: <01cd4354$28891a00$8709b83b@bill> 13 - 14 июня 2012 г., СЕМИНАР: Э К О Н О М И Ч Е С К А Я Б Е З О П А С Н О С Т Ь П Р Е Д П Р И Я Т И Я (о месте проведения узнавайте по тел. (812) 642__76...61 ____________________________________________________ ПРОГРАММА СЕМИНАРА: 1. Основы экономической безопасности предприятия. 2. Функционирование и реорганизация системы безопасности предприятия в соответствии с Законом РФ # 272-ФЗ от 22.12.2008 и его влияние на функционирование систем безопасности предприятий. Нормативно-правовая база РФ по вопросам обеспечения безопасности предприятий. 3. Направления деятельности по реорганизации системы безопасности предприятия в соответствии с изменившимися условиями. Организация взаимодействия структурных подразделений предприятия. Порядок перераспределения контрольных функций. 4. Определение эффективности работы службы экономической безопасности. Функции, задачи и направления деятельности СБ. Планирование работы. Организация личной защиты. Этапы создания СБ и порядок ее функционирования. Направления обеспечения безопасности предприятия, которые могут быть переданы на аутсорсинг. Организация взаимодействия с партнёрами. 5. Система и методы анализа и управления экономическими рисками. Корпоративные захваты: инструменты обнаружения и противодействия корпоративным захватам. Правовые и экономические аспекты процесса недружественного поглощения. Сценарии проведения. 6. Построение системы внутреннего контроля (СВК) на предприятии. Сущность и необходимость СВК. Международный опыт в организации и деятельности СВК. Анализ результативности процедур. 7. Место деловой разведки в обеспечении экономической безопасности бизнеса. 8. Внезапная проверка. Правовые основы деятельности контролирующих органов. процедура проведения проверок, виды проверок и основания проведения, правовое положение руководителя организации и должностных лиц. 9. Интегрированная система охраны объектов, Общие положения. Концепция комплексной защиты объекта. Модель объекта защиты. Модель угроз объекту защиты. 10. Основы информационной безопасности предприятия. 11. Правовые основы защиты конфиденциальной информации. Определение понятий 'конфиденциальная информация' и 'коммерческая' тайна Возможность получения конф. инф-ции органами, осуществляющими оперативно-розыскные мероприятия и правила, которые должны соблюдаться в процессе ОРД. Мероприятия по защите конфиденциальной информации. Обеспечение сохранения коммерческой тайны предприятия. 12. Технические средства промышленного шпионажа и средства их обнаружения. Мероприятия по пресечению несанкционированного доступа к конфиденциальной информации. Защита компьютерной информации. Обеспечение безопасности каналов связи. Технические средства информационной безопасности. Технические ср-ва промышленного шпионажа. Акустический канал утечки информации и его защита. Акустоэлектрический канал утечки информации и его защита. Телефонный (в том числе радиотелефонный) канал утечки информации и его защита. Электромагнитный канал утечки информации и его защита. Меры и ср-ва защиты информации от технических средств ее съема. Приборы обнаружения технических ср-в промышленного шпионажа. 13. Защита компьютерной информации; правила при выборе средства защиты компьютерной информации; основы криптографической защиты информации; вирусная угроза; возможность защиты информации при работе в сети "Интернет". Электронно-цифровая подпись как средство защиты документов, представленных в электронном виде. Защита компьютерных сетей. 14. Практическая демонстрация возможностей средств контроля и управления доступом, средств противодействия промышленному шпионажу ____________________________________________________ Bcя подpобнaя инфоpмaция будет выcлaнa Baм по запросу в Caнкт-Пeтepбypг: (812) 642 76__61 From anthropoid27 at royalhc.com Tue Jun 5 12:51:24 2012 From: anthropoid27 at royalhc.com (=?koi8-r?B?MjAxMiDHLjogzsHMz8fP19nFICDQ0s/XxdLLySA=?=) Date: Tue, 5 Jun 2012 21:51:24 +0200 Subject: =?koi8-r?B?7ffkIMkg7sHMz8fP18HRLiDQ0s/XxdLLySDXIDIwMTIgx8/E1Q==?= Message-ID: <0F9E05B9F0FB4606AAFABBD8F4BE68BF@pc1> 18 июня 2012г. МВД и Налоговая. проверки в 2012 году. Рекомендации бухгалтеру и руководителю +7 Ч95 7Ч2.9I_98 \\\/// +7 499 - 445/4О.95 Программа: 1. Налоговое администрирование в 2012 году. * Совершенствование системы налоговых правоотношений в 2012 году. * Разъясняющие письма МФ РФ – в целях единообразного применения норм налогового законодательства. * Как будет складываться взаимодействие налоговых и правоохранительных органов. * Борьба с фирмами-однодневками продолжается с учетом нового ФЗ от 07.12.2011 г. № 419-ФЗ. 2. Недобросовестность налогоплательщика. * Признаки недобросовестности налогоплательщика. * Критерии законности налоговой оптимизации. * Доказывание фактов, свидетельствующих об уклонении от налогов. * Недействительные сделки, мнимые и притворные сделки; последствия недействительности. * Срок давности для привлечения к ответственности при выявлении уклонения от уплаты налогов. * Типичные налогосберегающие схемы: ошибки применения и последствия. 3. Проверки налоговыми органами. * Специфика проверок камеральных, встречных, выездных. * Правила поведения первых лиц организации при выездной налоговой проверке. * Оформление результатов проверки. Обжалование результатов налоговых проверок. * Взыскание недоимки по налогам и пени. Срок давности для взыскания налогов и пени. * Порядок бесспорного взыскания недоимки по налогам и пени. * Взыскание штрафных санкций. Срок давности для взыскания штрафных санкций. * Ответственность должностных лиц по налоговым преступлениям. 4. Проверки, проводимые совместно с ОБЭП и органами МВД РФ. * Основные причины, по которым приходит ОБЭП. Подтверждение полномочий инспекторов и порядок проведения проверки. * Опрос, допрос, обыск и изъятие: правила поведения налогоплательщика. Основные виды экономических преступлений. Как избежать уголовной ответственности руководителю, бухгалтеру, юристу. 5. Новые направления в налоговом контроле: о критериях признания получения налогоплательщиком необоснованной налоговой выгоды. 6. Что нужно знать о порядке проведения проверки. 7. Что нужно знать о том, как обычно действуют проверяющие. 8. Изменения в регламенте проведения проверок налоговыми органами. Изменения в части I НК РФ. * Формы и методы контроля со стороны правоохранительных органов. Финансовая, административная и уголовная ответственность за нарушение налогового законодательства. * Применение срока давности по налоговым правонарушениям. 9. Что нужно знать о том, как правильно проверяющие должны оформлять свои действия. * Как начинается проверка и что требовать от проверяющих. * Что делать, если проверяющие приходят, а директора нет на месте. * Как проходит и чем заканчивается проверка. * Как оформляются проверочные мероприятия. * Что можно позволить проверяющим, а что лучше запретить. * Как правильно вести себя при проверке. * Нужно ли отвечать на все вопросы. * Нужно ли незамедлительно предоставлять документы. * Нужно ли показывать и разъяснять компьютерные программы и файлы. 10. Что нужно знать, если намерениями проверяющих являются: ревизия финансово-хозяйственной деятельности, изъятие товара, изъятие компьютеров, обследование помещений, зданий, сооружений, транспортных средств и других объектов, выемка документов, вскрытие сейфов, обыск. 11. Что нужно знать, если Вы решили жаловаться или инициировать судебное разбирательство. 12. Способы защиты прав налогоплательщика при процедурных нарушениях со стороны налоговых и правоохранительных органов. Составление протокола разногласий. Стоимость участия: 8 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: код (499) - 4Ч5*4О95 **** 8 Моск. код: 7Ч2\9I98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7717 bytes Desc: not available URL: From winsomed1 at chinookwindsgaming.com Tue Jun 5 07:48:23 2012 From: winsomed1 at chinookwindsgaming.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Tue, 5 Jun 2012 22:48:23 +0800 Subject: =?koi8-r?B?+sHdydTJINPXz8ogxM/NIM/UINDP1sHSwSE=?= Message-ID: <941683E0F2C7405BB6EE2C93409BAD4C@mypce1d3cb64e3> За 2011 год по данным МЧС при пожарах погибло 12 028 человек! Защити свою жизнь и жизнь своих близких! www.защити-себя.рф From billing at beelzepub.com Tue Jun 5 06:51:46 2012 From: billing at beelzepub.com (=?koi8-r?B?IuvSydrJ0yDJINzLz87PzcnexdPLwdEgwsXaz9DB087P09TYIg==?=) Date: Tue, 5 Jun 2012 22:51:46 +0900 Subject: =?koi8-r?B?+sHdydTBIMvPzdDYwNTF0s7ZyCDTxdTFyg==?= Message-ID: <01cd436d$c89f6d00$c211d870@billing> 13 - 14 июня 2012 г., СЕМИНАР: Э К О Н О М И Ч Е С К А Я Б Е З О П А С Н О С Т Ь П Р Е Д П Р И Я Т И Я (о месте проведения узнавайте по тел. (812) 642 76...61 ____________________________________________________ ПРОГРАММА СЕМИНАРА: 1. Основы экономической безопасности предприятия. 2. Функционирование и реорганизация системы безопасности предприятия в соответствии с Законом РФ # 272-ФЗ от 22.12.2008 и его влияние на функционирование систем безопасности предприятий. Нормативно-правовая база РФ по вопросам обеспечения безопасности предприятий. 3. Направления деятельности по реорганизации системы безопасности предприятия в соответствии с изменившимися условиями. Организация взаимодействия структурных подразделений предприятия. Порядок перераспределения контрольных функций. 4. Определение эффективности работы службы экономической безопасности. Функции, задачи и направления деятельности СБ. Планирование работы. Организация личной защиты. Этапы создания СБ и порядок ее функционирования. Направления обеспечения безопасности предприятия, которые могут быть переданы на аутсорсинг. Организация взаимодействия с партнёрами. 5. Система и методы анализа и управления экономическими рисками. Корпоративные захваты: инструменты обнаружения и противодействия корпоративным захватам. Правовые и экономические аспекты процесса недружественного поглощения. Сценарии проведения. 6. Построение системы внутреннего контроля (СВК) на предприятии. Сущность и необходимость СВК. Международный опыт в организации и деятельности СВК. Анализ результативности процедур. 7. Место деловой разведки в обеспечении экономической безопасности бизнеса. 8. Внезапная проверка. Правовые основы деятельности контролирующих органов. процедура проведения проверок, виды проверок и основания проведения, правовое положение руководителя организации и должностных лиц. 9. Интегрированная система охраны объектов, Общие положения. Концепция комплексной защиты объекта. Модель объекта защиты. Модель угроз объекту защиты. 10. Основы информационной безопасности предприятия. 11. Правовые основы защиты конфиденциальной информации. Определение понятий 'конфиденциальная информация' и 'коммерческая' тайна Возможность получения конф. инф-ции органами, осуществляющими оперативно-розыскные мероприятия и правила, которые должны соблюдаться в процессе ОРД. Мероприятия по защите конфиденциальной информации. Обеспечение сохранения коммерческой тайны предприятия. 12. Технические средства промышленного шпионажа и средства их обнаружения. Мероприятия по пресечению несанкционированного доступа к конфиденциальной информации. Защита компьютерной информации. Обеспечение безопасности каналов связи. Технические средства информационной безопасности. Технические ср-ва промышленного шпионажа. Акустический канал утечки информации и его защита. Акустоэлектрический канал утечки информации и его защита. Телефонный (в том числе радиотелефонный) канал утечки информации и его защита. Электромагнитный канал утечки информации и его защита. Меры и ср-ва защиты информации от технических средств ее съема. Приборы обнаружения технических ср-в промышленного шпионажа. 13. Защита компьютерной информации; правила при выборе средства защиты компьютерной информации; основы криптографической защиты информации; вирусная угроза; возможность защиты информации при работе в сети "Интернет". Электронно-цифровая подпись как средство защиты документов, представленных в электронном виде. Защита компьютерных сетей. 14. Практическая демонстрация возможностей средств контроля и управления доступом, средств противодействия промышленному шпионажу ____________________________________________________ Bcя подpобнaя инфоpмaция будет выcлaнa Baм по запросу в Caнкт-Пeтepбypг: (812) 642.76.61 From assemblerqgv7 at fotoveronica.com Wed Jun 6 00:01:15 2012 From: assemblerqgv7 at fotoveronica.com (=?koi8-r?B?Iu3By9PJzcHM2M7B0SDSxcvMwc3BICI=?=) Date: Tue, 5 Jun 2012 23:01:15 -0800 Subject: =?koi8-r?B?7cXT0cMg0sHT09nMz8sgMjAgMDAw?= Message-ID: <40DDA0B91A894B53ABCCC973AD141192@honda29ee14c14> Месяц рассылок 44(46) - 2 раза в день - 5 раз в неделю - 20 000 Тел: (495) 585-79-04 ICQ: 286-926-971 From dnepropetrovskq11 at hachik.com Tue Jun 5 23:40:10 2012 From: dnepropetrovskq11 at hachik.com (=?koi8-r?B?IuvPzdDMxcvTzsHRINPF0tTJxsnLwcPJ0SI=?=) Date: Wed, 6 Jun 2012 00:40:10 -0600 Subject: =?koi8-r?B?79DMwdTBINDP08zFINDPzNXexc7J0SDz5fL06ebp6+H04Q==?= Message-ID: <893715717.76979023528701@hachik.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2207 bytes Desc: not available URL: From ales at alberti-import-export.com Tue Jun 5 10:19:51 2012 From: ales at alberti-import-export.com (=?koi8-r?B?Is/Sx8HOwc0gzsHMz8fP18/HzyDLz87U0s/M0SI=?=) Date: Wed, 6 Jun 2012 02:19:51 +0900 Subject: =?koi8-r?B?/NTB0Nkg08/axMHOydEg8+IgySDQz9LRxM/LIMXFIMbVzsvDyc/OyQ==?= =?koi8-r?B?0s/Xwc7J0Q==?= Message-ID: <01cd438a$da433d80$8dac2576@ales> 13 - 14 июня 2012 г., СЕМИНАР: Э К О Н О М И Ч Е С К А Я Б Е З О П А С Н О С Т Ь П Р Е Д П Р И Я Т И Я (о месте проведения узнавайте по тел. (812) 642 76 61 ____________________________________________________ ПРОГРАММА СЕМИНАРА: 1. Основы экономической безопасности предприятия. 2. Функционирование и реорганизация системы безопасности предприятия в соответствии с Законом РФ # 272-ФЗ от 22.12.2008 и его влияние на функционирование систем безопасности предприятий. Нормативно-правовая база РФ по вопросам обеспечения безопасности предприятий. 3. Направления деятельности по реорганизации системы безопасности предприятия в соответствии с изменившимися условиями. Организация взаимодействия структурных подразделений предприятия. Порядок перераспределения контрольных функций. 4. Определение эффективности работы службы экономической безопасности. Функции, задачи и направления деятельности СБ. Планирование работы. Организация личной защиты. Этапы создания СБ и порядок ее функционирования. Направления обеспечения безопасности предприятия, которые могут быть переданы на аутсорсинг. Организация взаимодействия с партнёрами. 5. Система и методы анализа и управления экономическими рисками. Корпоративные захваты: инструменты обнаружения и противодействия корпоративным захватам. Правовые и экономические аспекты процесса недружественного поглощения. Сценарии проведения. 6. Построение системы внутреннего контроля (СВК) на предприятии. Сущность и необходимость СВК. Международный опыт в организации и деятельности СВК. Анализ результативности процедур. 7. Место деловой разведки в обеспечении экономической безопасности бизнеса. 8. Внезапная проверка. Правовые основы деятельности контролирующих органов. процедура проведения проверок, виды проверок и основания проведения, правовое положение руководителя организации и должностных лиц. 9. Интегрированная система охраны объектов, Общие положения. Концепция комплексной защиты объекта. Модель объекта защиты. Модель угроз объекту защиты. 10. Основы информационной безопасности предприятия. 11. Правовые основы защиты конфиденциальной информации. Определение понятий 'конфиденциальная информация' и 'коммерческая' тайна Возможность получения конф. инф-ции органами, осуществляющими оперативно-розыскные мероприятия и правила, которые должны соблюдаться в процессе ОРД. Мероприятия по защите конфиденциальной информации. Обеспечение сохранения коммерческой тайны предприятия. 12. Технические средства промышленного шпионажа и средства их обнаружения. Мероприятия по пресечению несанкционированного доступа к конфиденциальной информации. Защита компьютерной информации. Обеспечение безопасности каналов связи. Технические средства информационной безопасности. Технические ср-ва промышленного шпионажа. Акустический канал утечки информации и его защита. Акустоэлектрический канал утечки информации и его защита. Телефонный (в том числе радиотелефонный) канал утечки информации и его защита. Электромагнитный канал утечки информации и его защита. Меры и ср-ва защиты информации от технических средств ее съема. Приборы обнаружения технических ср-в промышленного шпионажа. 13. Защита компьютерной информации; правила при выборе средства защиты компьютерной информации; основы криптографической защиты информации; вирусная угроза; возможность защиты информации при работе в сети "Интернет". Электронно-цифровая подпись как средство защиты документов, представленных в электронном виде. Защита компьютерных сетей. 14. Практическая демонстрация возможностей средств контроля и управления доступом, средств противодействия промышленному шпионажу ____________________________________________________ Bcя подpобнaя инфоpмaция будет выcлaнa Baм по запросу в Caнкт-Пeтepбypг: (812) 642_76..61 From Rachilde.Aubry at in-touchtech.com Tue Jun 5 18:35:33 2012 From: Rachilde.Aubry at in-touchtech.com (Rachilde Aubry) Date: Wed, 06 Jun 2012 06:35:33 +0500 Subject: Best licensed ero-meds Message-ID: <206477870410593-AQROUTTPPYMSPSIGNVOWL@mggpgrrng.in-touchtech.com> Life will be great once again with lots of sex! No trouble with making it with your girl! http://y.ahoo.it/IhRLD From circulatefkf at roughcountry.com Wed Jun 6 01:04:51 2012 From: circulatefkf at roughcountry.com (=?koi8-r?B?7NXe28nFIMLFzNnFINPIxc3Z?=) Date: Wed, 6 Jun 2012 09:04:51 +0100 Subject: =?koi8-r?B?7sHMz8fP18/FINDMwc7J0s/Xwc7JxSDVyM/EIM/UIP7F0s7ZyCDTyMXN?= Message-ID: <16189387EB674748AA3811DF22D22B2F@Kompi> 21-22 июня 2012г. Налоговое планирование с учетом изменений законодательства – лучшие белые схемы 8 (499) ЧЧ54О95 <<>> (495) 792/2I-2_2 Цель: Ставка обязательных страховых взносов (СВ) с зарплаты с 2012 года составляет 30% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При формальном снижении нагрузки по зарплате многих сотрудников фактически выплаты возрастут: если раньше с больших зарплат СВ не уплачивались, то теперь их ставка составит 10% с суммы дохода свыше 512 тыс. рублей в год. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Есть возможность посещения любого одного дня: программа разбита на два логических блока, каждый из которых занимает один день. Рекомендуется посещение обоих дней. Первый день посвящен поиску путей выживания компаний при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Кроме того, рассматриваются общие для всех налоговых схем условия и принципы применения – такие как наличие деловых целей, отсутствие аффилированности и фиктивных сделок, грамотное оформление. Второй день посвящен изучению основных практических методов оптимизации налога на прибыль и (в той степени, в которой это возможно) НДС в торговых (оптовых и розничных) и производственных предприятиях, предприятиях, оказывающих услуги или выполняющих работы, в т.ч. строительные. Рассматриваются субъекты льготного налогообложения, способы переноса на них налогооблагаемой базы и пути безналогового рефинансирования (возврата) выведенных сумм. Участники получат краткие индивидуальные консультации по тематике курса. Программа: 1 день: Общие положения о налоговом планировании и налоги с доходов физических лиц (НДФЛ, страховые взносы) 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. Обзор изменений законодательства по страховым взносам на 2012-13 гг., как они повлияли на налоговые схемы. 2. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность; * дивидендные схемы – замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Способы минимизации рисков имущественной ответственности предпринимателя. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с новым порядком ведения кассовых операций. 3. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и качественное документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 4. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Долгосрочное накопительное страхование жизни работников и ДМС за счет предприятия. 5. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, компенсаций, гонораров и иных легальных доходов от нерезидентов. 6. Как компенсировать снижение социальных гарантий (включая пенсионные накопления) работников при применении налоговых схем, не предусматривающих выплату зарплаты? 7. Использование процентных займов от физлиц. Расчет эффективности. Потребительский кредитный кооператив граждан – способ получения безналогового дохода в виде процентов. 8. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 9. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды. 10. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 2 день: Общие положения о налоговом планировании и налоги с доходов физических лиц (НДФЛ, страховые взносы) 1. Методы планирования налога на прибыль и НДС. Принципиальная невозможность экономии НДС "белыми" схемами и случаи, когда это все же возможно. 2. Низконалоговые субъекты: * субъекты специальных налоговых режимов – ЕНВД и УСН, в т.ч. патентная система, субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * оффшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, 3. Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 4. Способы переноса налогооблагаемой базы по налогу на прибыль на низконалоговых субъектов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. лицензионные и франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. * механизм трансфертных цен. Новое антитрансфертное законодательство, способы ухода от контроля за сделками, грамотное обоснование трансфертных цен, 5. Займы как способ возвратного рефинансирования – преимущества и недостатки, риск ведения незаконной банковской деятельности. Безналоговое рефинансирование (возврат) и капитализация выведенной прибыли предприятия (холдинга) через уставный капитал, безвозмездную передачу имущества, увеличение чистых активов, ст. 27 Закона "Об ООО". 6. Простое товарищество субъектов упрощенной системы налогообложения, в т.ч. из "низконалоговых" регионов. Уплата НДС. Перенос прибыли товарищества на низконалоговых субъектов (УСН 6%, ЕНВД, оффшор и др.). Отсрочка уплаты налога при непередаче прибыли на счета товарищей. Возможен ли обход с помощью простого товарищества правил налогового учета (гл. 25 НК) и ограничений гл. 26.2 НК РФ в части перечня затрат? 7. Экономия НДС в торговле, производстве, выполнении работ, оказании услуг через разделение финансово-товарных потоков "с НДС" и "без НДС". Ограничение использования: покупатели/заказчики, не нуждающиеся в вычете НДС, как их выявить, или создать искусственно. Риски и рекомендации по использованию схемы. 8. Иностранные низконалоговые компании, цели применения. Их использование при проведении внутрироссийских операций для оптимизации налога на прибыль: традиционные (торговля, проценты, дивиденды, роялти, услуги и т.п.) и нетрадиционные схемы (простое товарищество, агентские). Выбор низконалоговых юрисдикций. 9. Обзор изменений налогового законодательства, как они повлияют на налоговые схемы. Ответы на вопросы. По желанию и по возможности – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц курса. Стоимость участия:1 день 9 000 руб. Стоимость участия:2 дня 16 000 руб. По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 (Ч95) 792\21/22 или +7 499 ЧЧ54.095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12610 bytes Desc: not available URL: From claustrophobics54 at pipusa.com Wed Jun 6 07:14:00 2012 From: claustrophobics54 at pipusa.com (=?koi8-r?B?IvPF0tTJxsnLwcPJ0SI=?=) Date: Wed, 6 Jun 2012 15:14:00 +0100 Subject: =?koi8-r?B?79DMwdTBINDP08zFINDPzNXexc7J0SDz5fL06ebp6+H04Q==?= Message-ID: <28FD131334F448369B0A2502C5160518@gok1> Все виды сертификации АКЦИЯ Оплата после получения СЕРТИФИКАТА Только у нас СЕРТИФИКАТ СООТВЕТСТВИЯ ГОСТ Р ЗА ЧАС!!! (495) 227 94 43 From iti20178 at mweb.co.za Wed Jun 6 06:48:34 2012 From: iti20178 at mweb.co.za (Eric Hodgson) Date: Wed, 06 Jun 2012 15:48:34 +0200 Subject: [CCM-L] New tactical care teams aim to save more lives Message-ID: Military expects TCCET teams to reduce combat mortality U.S. military planners hope to improve upon casualty survival rates by strengthening the capabilities of tactical critical care evacuation teams. TCCETs are trained and equipped to manage the most common causes for battlefield deaths such as uncontrolled bleeding, restricted airway and tension pneumothorax. OR http://tinyurl.com/828vps8 _______________________________________________ CCM-L mailing list CCM-L at list.pitt.edu https://list.pitt.edu/mailman/listinfo/ccm-l ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Jun 6 06:56:26 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 6 Jun 2012 15:56:26 +0200 Subject: [CCM-L] New tactical care teams aim to save more lives Message-ID: <20120606135626.GJ17120@leitl.org> ----- Forwarded message from Eric Hodgson ----- From commentatedh2 at actionim.com Wed Jun 6 04:26:11 2012 From: commentatedh2 at actionim.com (=?koi8-r?B?IvTp8O/n8uHm6fEi?=) Date: Wed, 6 Jun 2012 16:56:11 +0530 Subject: =?koi8-r?B?++/rIC0g4+Xu+SDu4SDw7+zp5/Lh5ung?= Message-ID: <3F7CA3CB578C4DEC8B3BD1563FDF2EE4@agpoground> ШОК - ЦЕНЫ НА ПОЛИГРАФИЮ ИЗ МОЖАЙСКА СТАРТУЕТ ВЕСЕННЕ-ЛЕТНЯЯ АКЦИЯ = СКИДКИ НА ПОЛИГРАФИЮ НА ПЕРИОД ВЕСЕННЕ-ЛЕТНЕГО "ЗАТИШЬЯ" Визитки 100 шт - от 350 руб Плакаты А1 500 шт с ламинацией - 11 000 руб + Каталоги, плакаты, буклеты по лучшим ценам в Москве! * 2 Машины Rapida формата А1 5 секций, Хедельберг А3, конгрев, тиснение, выборочный лак, ВШРА, ламинация * СКЛАД И ПРЕДСТАВИТЕЛЬСТВО - Г. МОСКВА * ЦЕНЫ И СРОКИ - ВНЕ КОНКУРЕНЦИИ! * ВНИМАТЕЛЬНЫЕ И ПРОФЕССИОНАЛЬНЫЕ МЕНЕДЖЕРЫ ОТВЕТЯТ НА ВСЕ ВАШИ ВОПРОСЫ www.логотип-л.рф (495) 589-76-12 From tumidtr5 at farmagro.com Wed Jun 6 09:40:37 2012 From: tumidtr5 at farmagro.com (=?koi8-r?B?IkUtzcXKzCDNwdLLxdTJzsci?=) Date: Wed, 6 Jun 2012 17:40:37 +0100 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAgKyDIz9PUyc7HIM7BIM3F09HDINcg?= =?koi8-r?B?8O/k4fLv6w==?= Message-ID: 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК (для указания вашего сайта в письме) По вашему графику Без ограничений по срокам Возможно менять макеты все 8 раз !!! Подготовка макетов бесплатно АКЦИИ: Месяц 44(46) рассылок - 2 раза в день - 5 раз в неделю - 20 000 рублей Год 500 рассылок - 2 раза в день - 5 раз в неделю - 100 000 рублей Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,7 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 From brantleydd at fellowes.com Wed Jun 6 09:33:29 2012 From: brantleydd at fellowes.com (=?koi8-r?B?IvfP0NLP09kg09TSz8nUxczYzs/KIMTF0dTFzNjOz9PUySI=?=) Date: Wed, 6 Jun 2012 22:03:29 +0530 Subject: =?koi8-r?B?zs/X2cUgzs/Szdkg5/Lh5O/z9PLv6fTl7Pju7+fvIOvv5OXr8+E=?= Message-ID: <01cd4430$344a0e80$ba003d78@brantleydd> Строители! С 1 апреля 2012 года вступили в силу новые нормы Градостроительного кодекса РФ, уточняющие основания и порядок осуществления государственной и негосударственной экспертизы проектной документации и результатов инженерных изысканий. - Последние изменения в законодательстве, регулирующие строительную деятельность - Сложные вопросы бухгалтерского и налогового учета строительных и подрядных организаций - Правовое регулирование вопросов эксплуатации зданий и сооружений - Новый порядок выдачи разрешения на строительство - Ценообразование и сметное нормирование в строительстве - Федеральный закон от 18 июля 2011 года N 243-ФЗ "О внесении изменений в Градостроительный кодекс РФ и отдельные законодательные акты РФ" Эти и другие вопросы в ультра-актуальном мероприятии: "СТРОИТЕЛЬНАЯ ДЕЯТЕЛЬНОСТЬ: ПРАВОВОЕ РЕГУЛИРОВАНИЕ СТРОИТЕЛЬСТВА ОБЪЕКТОВ НЕДВИЖИМОСТИ. НАЛОГОВЫЕ АСПЕКТЫ. ПРАКТИЧЕСКИЕ ВОПРОСЫ СТРОИТЕЛЬНОЙ ДЕЯТЕЛЬНОСТИ"! Дата проведения: I8,I9 ИЮНЯ Расписание мероприятия и РЕГИСТРАЦИЯ по телефону: |812| 984 53 63 From berrycolby at abunayyangroup.com Wed Jun 6 08:19:49 2012 From: berrycolby at abunayyangroup.com (WILLIAMS JEWELL) Date: Wed, 06 Jun 2012 22:19:49 +0700 Subject: 100% Natural - Most Effective Male Enhancement and Male Enlargement Products - Guaranteed to Work! 9gq74svf9k Message-ID: <4fcf7515.5afc2e39@abunayyangroup.com> Recommended Penis Enlargement Pills to Increase Your Penis Size In the world of penis enlargement pills, two brands stand clearly above the rest. BigMan and Manhood Plus and are proven to increase penis size. http://alphadfg.ru From lancetmag25 at escttoulon.com Wed Jun 6 09:44:03 2012 From: lancetmag25 at escttoulon.com (Ariel Mccann) Date: Thu, 7 Jun 2012 01:44:03 +0900 Subject: =?koi8-r?B?6M/UydTFIN7J1MHU2CDe1dbJxSDTzdM/IO3ZINfBzSDQz83P1sXNINcg?= =?koi8-r?B?3NTPzSE=?= Message-ID: Хотите читать чужие смс? Мы вам поможем в этом! Работаем по всем операторам и регионам. Гарантии достоверности и анонимности заказа 100%. www.gatessms.ru icq: 617156630 From moochedhd2 at americanvexillum.com Thu Jun 7 03:45:50 2012 From: moochedhd2 at americanvexillum.com (=?koi8-r?B?IPPM1dbCwSDC2dTBIg==?=) Date: Thu, 7 Jun 2012 02:45:50 -0800 Subject: =?koi8-r?B?8sXNz87ULCDEydrBys4gySDP1MTFzMvBIMvXwdLUydIgySDQz83F3cXO?= =?koi8-r?B?yco=?= Message-ID: <000d01cd4492$52bacbe0$6400a8c0@moochedhd2> Предлагаем Вам качественные услуги по отделке и ремонту квартир, складских и офисных помещений. Задайте любой интересующий Вас вопрос по телефону в Москве: (495) 589 -6 2-9 9 From prisoning at gnugeneration.com Thu Jun 7 03:59:12 2012 From: prisoning at gnugeneration.com (=?koi8-r?B?IPPM1dbCwSDC2dTBIg==?=) Date: Thu, 7 Jun 2012 02:59:12 -0800 Subject: =?koi8-r?B?8sXNz87ULCDEydrBys4gySDP1MTFzMvBIMvXwdLUydIgySDQz83F3cXO?= =?koi8-r?B?yco=?= Message-ID: <000d01cd4494$3056dce0$6400a8c0@prisoning> Предлагаем Вам качественные услуги по отделке и ремонту квартир, складских и офисных помещений. Задайте любой интересующий Вас вопрос по телефону в Москве: (495) 589 -6 2-9 9 From mbabanepl7 at qop-re.com Thu Jun 7 06:36:10 2012 From: mbabanepl7 at qop-re.com (=?koi8-r?B?Iu/GydPZINcg7c/Ty9fFIg==?=) Date: Thu, 7 Jun 2012 08:36:10 -0500 Subject: =?koi8-r?B?7sUgzsHEzyDQzMHUydTYIMvPzcnT08nJwCwgz8bJ09kgz9Qg88/C09TX?= =?koi8-r?B?xc7OycvBIQ==?= Message-ID: <000d01cd44b2$7fe53e50$6400a8c0@mbabanepl7> Маленькие и не очень маленькие ОФИСЫ ждут Вас! Помещения находятся на БольшойЧеркизовской улице Охраняемая территория, удобный подъезд с! Telefon8/903/ 7=2-8 -0=0 = 2-0 From adorewu4 at stcarlos.com Wed Jun 6 23:30:03 2012 From: adorewu4 at stcarlos.com (Rieber) Date: Thu, 7 Jun 2012 10:00:03 +0330 Subject: =?koi8-r?B?78LP0tXEz9fBzsnFIMTM0SDQ0s/GxdPTyc/OwczYztnIIMvVyM/O2A==?= Message-ID: <509CC10F159246D295626439B574ACFB@narvan> Уважаемые дамы и господа! Направляем вам информацию об оборудовании немецкой фирмы Rieber, предназначенной для профессиональных кухонь. Проведение банкетов, обслуживание по принципу "шведский стол", приготовление на глазах у посетителей, выездное обслуживание и многое другое без проблем возможно с Rieber. По запросу могут быть предоставлены материалы на немецком или английском языках. Наш т/факс: 8(495)781-59-03 Веб-сайт: www.для-профессиональных-кухонь.рф From hitchhikett at maousherji.com Wed Jun 6 23:19:06 2012 From: hitchhikett at maousherji.com (Mail Group) Date: Thu, 7 Jun 2012 10:19:06 +0400 Subject: =?koi8-r?B?8sHaz9vMxc0g98Hb1SDSxcvMwc3VINDPINzMxcvU0s/Ozs/KINDP3tTF?= =?koi8-r?B?IO3P08vXwSDJIPLP09PJ0Q==?= Message-ID: <000d01cd4475$716aa7d0$6400a8c0@hitchhikett> Рассылаем ваше предложение по базе электронной почты Москвы и России! Эффективно! Сегодня акция 3 рассылки всего за 5000 рублей Звоните проконсультирую (Ч95) 585 - 48 - Пять Семь From skyjackervy3 at rangenet.com Thu Jun 7 02:45:47 2012 From: skyjackervy3 at rangenet.com (Merle Donaldson) Date: Thu, 7 Jun 2012 11:45:47 +0200 Subject: =?koi8-r?B?8NLPxMHWwSDQz83F3cXOydEg09fPws/Ezs/HzyDOwdrOwd7FzsnR?= Message-ID: <000d01cd4489$ef257470$6400a8c0@skyjackervy3> Продажа от собственника ул. Коломенская, д. 21, к.3 Продажа помещения свободного назначения в жилом доме бизнес класса, подвал, 1-2 этажи с отдельными входами.Общая площадь помещения 1603,8 кв.м т. (495) 969 32 95 From goitrefx2 at studio1ny.com Thu Jun 7 05:16:57 2012 From: goitrefx2 at studio1ny.com (=?koi8-r?B?IvPPwtPU18XOzsnLINDP08XMy8Eg68nF19PLz8Ug2y4i?=) Date: Thu, 7 Jun 2012 13:16:57 +0100 Subject: =?koi8-r?B?7sXEz9LPx88g0NLPxMHNINPXz8og0NLJzMXTzs/KINXewdPUz8sgINMg?= =?koi8-r?B?INfP2s3P1s7P09TYwCDT1NLPydTFzNjT1NfBINfPxM/FzcEh?= Message-ID: <000d01cd449f$0d2aa5c0$6400a8c0@goitrefx2> Продается прилесной участок для строительства родового имения в 89 км от мкад по Киевскому ш. Панорамный вид, лес, сосновый бор, Возможность строительства собственного водоема Звоните Собственник 8 ( 903 ) 193 0 6 ДВА-ТРИ From sod5 at cobhamhall.com Thu Jun 7 01:09:44 2012 From: sod5 at cobhamhall.com (=?koi8-r?B?Ivvr7+zhIOHu9Onr9+Hy7u/n7yDk5ezhIg==?=) Date: Thu, 7 Jun 2012 13:39:44 +0530 Subject: =?koi8-r?B?++vv7OEg4e706ev34fLu7+fvIOTl7OE6ICDv4vX+5e7p5SAtIPcg9eTv?= =?koi8-r?B?9+/s+PP09+nlISA=?= Message-ID: <4BD3963A7A15491589C5157BEC7C79B4@elctrins> ШКОЛА АНТИКВАРНОГО ДЕЛА: ОБУЧЕНИЕ - В УДОВОЛЬСТВИЕ! Умение отличить полотно Ван Гога от произведений Поля Гогена, Классический стиль от стиля Ар Деко, шедевры ювелирного искусства Карла Фаберже от изделий Западных мастеров выгодно отличает человека культурно образованного и интеллектуально развитого. Наши лекции познакомят Вас с различными традициями в искусстве, научат отличать подлинник от подделки, повысят культурный уровень и расширят кругозор! Мы ждем Вас! Тел.: +7 (495) 650-12-62; +7 (495) 999-11-45; +7 (963) 990-33-33. Сайт: www.школа-антиквар.рф From aurahxu577 at omnicar-center.com Wed Jun 6 22:09:52 2012 From: aurahxu577 at omnicar-center.com (=?koi8-r?B?IuTPzSDXIOjBzc/XzsnLwcgi?=) Date: Thu, 7 Jun 2012 14:09:52 +0900 Subject: =?koi8-r?B?8NLPxMHA1NPRIMvXwdLUydLZINcg6MHNz9fOycvByCA=?= Message-ID: <38252307EED948AEA4E087F50EBB9148@pc1404d69ad1df> Продаются квартиры в Хамовниках в вблизи Новодевичьего монастыря www.дом-хамовники.рф From turkishzf3 at reprofw.com Thu Jun 7 06:35:37 2012 From: turkishzf3 at reprofw.com (=?koi8-r?B?78bbz9LZ?=) Date: Thu, 7 Jun 2012 15:35:37 +0200 Subject: =?koi8-r?B?68nQ0iDawcvPzs/EwdTFzNjT1NfP?= Message-ID: <000d01cd44aa$0a6e6af0$6400a8c0@turkishzf3> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 339 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 25043 bytes Desc: not available URL: -------------- next part -------------- From vacuousr8 at tucker.com Thu Jun 7 01:29:38 2012 From: vacuousr8 at tucker.com (=?koi8-r?B?IvLh8/P57OvpIPDvIOUtzcXKzCI=?=) Date: Thu, 7 Jun 2012 17:29:38 +0900 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAgICsgINDPxMHSz8sgyM/T1MnOxw==?= Message-ID: <749147971.38496706028315@tucker.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2096 bytes Desc: not available URL: From strategiesil4 at allyearah.com Thu Jun 7 04:11:55 2012 From: strategiesil4 at allyearah.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Thu, 7 Jun 2012 18:11:55 +0700 Subject: =?koi8-r?B?4sXaz9DB087P09TYINPFzdjJIQ==?= Message-ID: <69EE2A7F736644CA9137D26DE9591ADB@darkedition> За 2011 год по данным МЧС произошло 168 528 тысяч пожаров, ПОДУМАЙТЕ, есть ли у Вас средства защиты от пожара! www.защити-себя.рф From adotta1opera at avsi.org Thu Jun 7 09:20:39 2012 From: adotta1opera at avsi.org (=?koi8-r?B?IsnOxs/SzcHDydEgzyDTzcXOxSDLz87UwcvUz9ci?=) Date: Thu, 7 Jun 2012 18:20:39 +0200 Subject: =?koi8-r?B?y8/S0M/SwdTJ187PxSDUwcvTyQ==?= Message-ID: <01cd44da$3d8fb580$f36c6b4f@adotta1opera> Здравствуйте! Ваш адрес сохранен в моей записной книжке. Скорее всего, Вы заказывали Мерседес с англоговорящим водителем. Сообщаю Вам свой новый номер телефона: (495) 721...76.32 Наша компания приобрела еще 18 Мерседесов Е-класса и 6 Мерседесов S-класса. Это говорит о том, что если Вам или Вашей компании понадобиться автомобиль с водителем, то мы сможем предоставить его очень быстро. Напоминаю наши цены. Мерседес Е-класс - по Москве 1200 р. / час, минимальная оплата за час, в аэропорт по фиксированной стоимости √ 2300 р. При заказе более 5-и часов предоставим скидки. Теперь возможна оплата банковской картой и безналичным перечислением. - С уважением, Виктор Мартынов, Менеджер по работе с клиентами, ООО ТК "Прайм авто" (495) 721__76 32 prime-auto at bk.ru From makeshiftjw25 at tapteil.com Thu Jun 7 06:23:59 2012 From: makeshiftjw25 at tapteil.com (=?koi8-r?B?IvfBzSDwydPYzc8i?=) Date: Thu, 7 Jun 2012 18:53:59 +0530 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAgKyDT0MXDIOjP09TJzscgINDPxMHS?= =?koi8-r?B?z8sg?= Message-ID: <060281405.43423040880436@tapteil.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12454 bytes Desc: not available URL: From 3dvb at atrium.no Thu Jun 7 07:27:49 2012 From: 3dvb at atrium.no (=?koi8-r?B?IvLVy8/Xz8TJ1MXM2CDA0snEyd7F08vPyiDTzNXWwtki?=) Date: Thu, 7 Jun 2012 19:57:49 +0530 Subject: =?koi8-r?B?/MvPzM/Hyd7F08vJxSDU0sXCz9fBzsnRINcg09fR2skg088g09TSzw==?= =?koi8-r?B?ydTFzNjT1NfPzSDMyc7Fys7ZyCDPwt/Fy9TP1w==?= Message-ID: <01cd44e7$d0831c80$e2c6ce75@3dvb> информация-приглашение для главного инженера! (во вложении) From zooko at zooko.com Thu Jun 7 21:30:04 2012 From: zooko at zooko.com (Zooko Wilcox-O'Hearn) Date: Thu, 7 Jun 2012 22:30:04 -0600 Subject: [Freedombox-discuss] Tahoe-LAFS is like a Bittorrent with which you can upload as well as download Message-ID: On Thu, Jun 7, 2012 at 7:29 AM, Nick Daly wrote: > > What's Tahoe's required overhead? Is it static (5KB, regardless of > partition size), or does it grow with the reserved space (2% from 0 - > 5 GB, 3% for > 5GB)? Hm, I'm not exactly sure. In general, people tend to allocate large amounts of disk space to one Tahoe-LAFS storage server, like at least 0.5 TB, and then not worry about the few KB or MB of overhead that Tahoe-LAFS adds. The storage server process is the one that stores ciphertext on disk and sends and receives ciphertext over TCP on behalf of a storage client. It stores each piece of ciphertext in a separate file in its local filesystem, and it organizes those files into 2-level hierarchy of directories. That's a source of overhead, since it takes a little more than X bytes of disk space to store an X byte file in your file system. That overhead is proportional to the number of files stored and the exact amount is determined by the filesystem, but I would estimate 2 KiB per file. Another source of overhead is that the storage server maintains a couple of small files of metadata about which files it has processed. That is a small fixed amount that doesn't grow with the number or size of files. It's probably around 10 KB. Another source of overhead is per-file metadata -- leases (markings showing that someone said "I'm interested in this file -- please don't garbage-collect it for at least 30 more days!"), and integrity-checking hashes. The integrity checks are proportional to the size of each file, but small. It's about 64 bytes of hashes for each 40 KB of file. > My biggest concern with this is space, as the 2GB microSD card the DreamPlug comes with is tough to manage. If we can use the SD card slot when it's available, this'll be less of a problem, but I haven't really thought about that problem yet. My instinct would be not to try to make use of such scarce storage resources, but instead say "Want to contribute to the great FreedomBox Cloud Storage grid? Then plug in a 1 TB hard drive to the USB port!". That would actually make the resulting storage much more reliable, because only people who felt a certain level of willingness to contribute would run a Tahoe-LAFS storage server at all. By excluding all the people who turned it on at some point and then got bored a few hours later and turned it off again, we would greatly reduce the churn and unreliability. Regards, Zooko _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From rachelearmandina at emr.net Thu Jun 7 22:16:44 2012 From: rachelearmandina at emr.net (Senaida Tosha) Date: Fri, 08 Jun 2012 00:16:44 -0500 Subject: HCG Diet Direct - hCG Diet Drops - Homeopathic Drops 5rxqxo Message-ID: <16u70w98b67-97057811-437b3k58@styinmp> HCG Diet Direct - hCG Diet Drops - Homeopathic Drops HCG Diet Direct - Lose weight on the homeopathic HCG Diet without heavy exercise or without frozen or prepared foods to buy. HCG Diet Direct - a brand you can trust http://neotuu.ru From cecilw at gistransport.com Fri Jun 8 01:37:05 2012 From: cecilw at gistransport.com (=?koi8-r?B?Iu3By9PJzcHM2M7B0SDSxcvMwc3BICI=?=) Date: Fri, 8 Jun 2012 00:37:05 -0800 Subject: =?koi8-r?B?7cXT0cMg0sHT09nMz8sgMjAgMDAw?= Message-ID: <9464D7ECED4D417999131BED92E5E9EA@jnmpgcad4a3027> Месяц рассылок 44(46) - 2 раза в день - 5 раз в неделю - 20 000 Тел: (495) 585-79-04 ICQ: 286-926-971 From tridentsb025 at newdominion.com Fri Jun 8 02:00:08 2012 From: tridentsb025 at newdominion.com (=?koi8-r?B?Ivfv5OEi?=) Date: Fri, 8 Jun 2012 01:00:08 -0800 Subject: =?koi8-r?B?98/EwSAtIDExMCDSxcLMxcogwtXU2czY?= Message-ID: Уважаемый клиент! Обращаем ваше внимание на наше специальное предложение! Спешите воспользоваться! Оформить заказ по спецпредложению по телефону (495) 640-9876 www.Вода-19.рф При оформлении нового договора (переоформлении старого) на доставку воды 19 л в офис или домой цена для Вас составит*: Более 20 бутылей - 110 рублей/бутыль От 11 до 20 бутылей - 130 рублей/бутыль От 4 до 10 бутылей - 150 рублей/бутыль При заключении договора на 1 год и более - скидка на кулер 15%! *Предложение ограничено - не откладывайте звонок на завтра. Доставка по Москве и 2-3км от МКАД - бесплатно Оформить заказ по телефону (495) 640-9876 From bonnies at sjlm.org Thu Jun 7 14:58:05 2012 From: bonnies at sjlm.org (=?koi8-r?B?IubJzsHO08/X2cogxMnSxcvUz9Ii?=) Date: Fri, 8 Jun 2012 03:28:05 +0530 Subject: =?koi8-r?B?x8nQz9TF2sEg0NLP0M/Sw8nPzsHM2M7P09TJINrB1NLB1CDJIN7B0w==?= =?koi8-r?B?1MkgwcvUydfP1yDPwt/FzdUg0NLPxMHW?= Message-ID: <01cd4526$b74d9080$1452cc75@bonnies> Уважаемые господа! Начинается набор участников на Курс повышения квалификации для специалистов финансовых и экономических служб по ФИНАНСОВОМУ МЕНЕДЖМЕНТУ и БЮДЖЕТИРОВАНИЮ. Занятия начинаются с 18 июня 2012г. в центре Санкт-Петербурга. Курс предлагает четкий алгоритм построения системы управления финансами компании в кризисный период, благодаря которому Вы существенно расширите профессиональные компетенции, внедрите в работу эффективные инструменты и методы антикризисного финансового управления. По окончании курса выдается Аттестат о повышении квалификации государственного образца. Также, для слушателей будут организованы ежедневные обеды и культурная программа. ПРОГРАММУ курса, расписание, условия участия и список лекторов Вы можете запросить у нашего секретаря в Петербурге: 8 (812) 986 82 29 From mousesqq at lankaweb.com Fri Jun 8 04:54:45 2012 From: mousesqq at lankaweb.com (=?koi8-r?B?IkUtzcXKzCDNwdLLxdTJzsci?=) Date: Fri, 8 Jun 2012 03:54:45 -0800 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAgKyDIz9PUyc7HIM7BIM3F09HDINcg?= =?koi8-r?B?8O/k4fLv6w==?= Message-ID: <4AC281AD86A0494C824AB79965CB0518@rm024pc03> 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК (для указания вашего сайта в письме) По вашему графику Без ограничений по срокам Возможно менять макеты все 8 раз !!! Подготовка макетов бесплатно АКЦИИ: Месяц 44(46) рассылок - 2 раза в день - 5 раз в неделю - 20 000 рублей Год 500 рассылок - 2 раза в день - 5 раз в неделю - 100 000 рублей Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,7 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 From Thcle.Fontaine at hotelinrotterdam.com Thu Jun 7 16:29:30 2012 From: Thcle.Fontaine at hotelinrotterdam.com (Thcle Fontaine) Date: Fri, 08 Jun 2012 05:29:30 +0600 Subject: World's Biggest Web-Supplier of Pharmaceuticals Message-ID: <3984899402567-VAOCXTEYSKUYKQKQQDYWKD@coqkmjm.hotelinrotterdam.com> Best prices today! Never let your shaft go down! http://y.ahoo.it/o+n54 From Tatienne.Etienne at immigrant-jobsearch.com.jfet.org Fri Jun 8 07:19:28 2012 From: Tatienne.Etienne at immigrant-jobsearch.com.jfet.org (Tatienne Etienne) Date: Fri, 08 Jun 2012 07:19:28 -0700 Subject: Erection pills, Cheap Prices! Message-ID: <7921313531-YXVQNJVATPKDDMDGNXZECLNX@wdrpp.immigrant-jobsearch.com> On the verge of breakage, because you cannot satisfy her? We have top-quality products for surprisingly low cost. http://y.ahoo.it/yn9Lw From brian at bmclab.com Thu Jun 7 16:15:55 2012 From: brian at bmclab.com (=?koi8-r?B?IvPF1Mkgyc7Wxc7F0s7PLdTFyM7J3sXTy8/HzyDPwsXT0MXexc7J0Q==?= =?koi8-r?B?ICjz6fTvKSI=?=) Date: Fri, 8 Jun 2012 08:15:55 +0900 Subject: =?koi8-r?B?89TSz8nUxczY09TXzyDs6e7l6u756CDv4v/l6/Tv9w==?= Message-ID: <01cd454e$ed066f80$40089370@brian> информация-приглашение для главного инженера! (во вложении) From glaucoma2 at review.com Fri Jun 8 06:30:04 2012 From: glaucoma2 at review.com (=?koi8-r?B?0NLP18XSy8kg7ffkINcgMjAxMiDHz8TV?=) Date: Fri, 8 Jun 2012 09:30:04 -0400 Subject: =?koi8-r?B?7ffkIMkg7sHMz8fP18HRLiDQ0s/XxdLLySDXIDIwMTIgx8/E1Q==?= Message-ID: <000d01cd457a$d01b7740$6400a8c0@glaucoma2> 18 июня 2012г. Налоговые проверки и проверки МВД в 2012 году 8 Моск. код: 7922I22 : +7 499 ЧЧ54.О95 Программа: 1. Налоговое администрирование в 2012 году. * Совершенствование системы налоговых правоотношений в 2012 году. * Разъясняющие письма МФ РФ √ в целях единообразного применения норм налогового законодательства. * Как будет складываться взаимодействие налоговых и правоохранительных органов. * Борьба с фирмами-однодневками продолжается с учетом нового ФЗ от 07.12.2011 г. ╧ 419-ФЗ. 2. Недобросовестность налогоплательщика. * Признаки недобросовестности налогоплательщика. * Критерии законности налоговой оптимизации. * Доказывание фактов, свидетельствующих об уклонении от налогов. * Недействительные сделки, мнимые и притворные сделки; последствия недействительности. * Срок давности для привлечения к ответственности при выявлении уклонения от уплаты налогов. * Типичные налогосберегающие схемы: ошибки применения и последствия. 3. Проверки налоговыми органами. * Специфика проверок камеральных, встречных, выездных. * Правила поведения первых лиц организации при выездной налоговой проверке. * Оформление результатов проверки. Обжалование результатов налоговых проверок. * Взыскание недоимки по налогам и пени. Срок давности для взыскания налогов и пени. * Порядок бесспорного взыскания недоимки по налогам и пени. * Взыскание штрафных санкций Срок давности для взыскания штрафных санкций. * Ответственность должностных лиц по налоговым преступлениям. 4. Проверки, проводимые совместно с ОБЭП и органами МВД РФ. * Основные причины, по которым приходит ОБЭП. Подтверждение полномочий инспекторов и порядок проведения проверки. * Опрос, допрос, обыск и изъятие: правила поведения налогоплательщика. Основные виды экономических преступлений. Как избежать уголовной ответственности руководителю, бухгалтеру, юристу. 5. Новые направления в налоговом контроле: о критериях признания получения налогоплательщиком необоснованной налоговой выгоды. 6. Что нужно знать о порядке проведения проверки. 7. Что нужно знать о том, как обычно действуют проверяющие. 8. Изменения в регламенте проведения проверок налоговыми органами. Изменения в части I НК РФ. * Формы и методы контроля со стороны правоохранительных органов. Финансовая, административная и уголовная ответственность за нарушение налогового законодательства. * Применение срока давности по налоговым правонарушениям. 9. Что нужно знать о том, как правильно проверяющие должны оформлять свои действия. * Как начинается проверка и что требовать от проверяющих. * Что делать, если проверяющие приходят, а директора нет на месте. * Как проходит и чем заканчивается проверка. * Как оформляются проверочные мероприятия. * Что можно позволить проверяющим, а что лучше запретить. * Как правильно вести себя при проверке. * Нужно ли отвечать на все вопросы. * Нужно ли незамедлительно предоставлять документы. * Нужно ли показывать и разъяснять компьютерные программы и файлы. 10. Что нужно знать, если намерениями проверяющих являются: ревизия финансово-хозяйственной деятельности, изъятие товара, изъятие компьютеров, обследование помещений, зданий, сооружений, транспортных средств и других объектов, выемка документов, вскрытие сейфов, обыск. 11. Что нужно знать, если Вы решили жаловаться или инициировать судебное разбирательство. 12. Способы защиты прав налогоплательщика при процедурных нарушениях со стороны налоговых и правоохранительных органов. Составление протокола разногласий. Стоимость участия: 8 000 рублей Вся информация по тел: 8 (499) 445_4О_95 <<>> +7 Московский код: 79221.22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7754 bytes Desc: not available URL: From finelywym62 at calvinedwardscompany.com Fri Jun 8 02:54:42 2012 From: finelywym62 at calvinedwardscompany.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Fri, 8 Jun 2012 09:54:42 +0000 Subject: =?koi8-r?B?+sHdydTJINPXz8Ag08XN2MAgz9Qg0M/WwdLBIQ==?= Message-ID: <3616F836E0734FF0A885B96EC3FE2499@xpsp3248b6d113> За 2011 год по данным МЧС пожары принесли Материального ущерба на 17 280 086 000 млрд. рублей, защити свое заработанное имущества! www.защити-себя.рф From gloamingsc3 at gramont.com Thu Jun 7 21:45:12 2012 From: gloamingsc3 at gramont.com (=?koi8-r?B?IufF0s3BzsnRIg==?=) Date: Fri, 8 Jun 2012 10:15:12 +0530 Subject: =?koi8-r?B?98HbwSDGydLNwSDXIOfF0s3BzsnJIC0g0sXHydPU0sHDydE=?= Message-ID: Профессиональным регистраторам и юридическим фирмам - отличные условия работы и агентсткая комиссия. Телефон: +49 40 209 327 590 (Пять офисов в Германии) www.мтип.рф From hithertous7 at drakes7dees.com Fri Jun 8 01:19:36 2012 From: hithertous7 at drakes7dees.com (=?koi8-r?B?Iu7P18HRIPLJx8Ei?=) Date: Fri, 8 Jun 2012 10:19:36 +0200 Subject: =?koi8-r?B?8NLPxMHF1NPRINXewdPUz8sg0M8g7s/Xz8og8snHxSE=?= Message-ID: <000d01cd4547$0f28a950$6400a8c0@hithertous7> Обустроенные участки с лесными деревьями у БОЛЬШОЙ ВОДЫ! Берег Истринского водохранилища. К парковым участкам подведены коммуникации, асфальтированные дороги.Звоните по телефону: 8-916_088_08_92 Дарья From eugen at leitl.org Fri Jun 8 01:35:07 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 8 Jun 2012 10:35:07 +0200 Subject: [Freedombox-discuss] Tahoe-LAFS is like a Bittorrent with which you can upload as well as download Message-ID: <20120608083507.GN17120@leitl.org> ----- Forwarded message from Zooko Wilcox-O'Hearn ----- From theesnf1 at mandic.com Fri Jun 8 07:28:50 2012 From: theesnf1 at mandic.com (=?koi8-r?B?IvLB09PT2czLwTog/MzFy9TSz87LYSI=?=) Date: Fri, 8 Jun 2012 11:28:50 -0300 Subject: =?koi8-r?B?8sHT09nMy8Eg18HbxcfPINDSxcTMz9bFzsnRINDPIMLB2sUgwNIgzMnD?= =?koi8-r?B?IO3P08vX2Q==?= Message-ID: <000d01cd4583$05ce7060$6400a8c0@theesnf1> РАССЫЛКА сообщений по электронной почте! Баз 12 000 000 Юр+физ лица всего от 1500 руб за раасылку! Консультируем помогаем заботимся о долгосрочном сотрудничестве! Позвоните мне 8(495)58 5...48.. .57 From toyeddei2076 at romack.com Thu Jun 7 23:32:32 2012 From: toyeddei2076 at romack.com (=?koi8-r?B?7s/Xz8UgzyD3wczA1M7ZyCDP0MXSwcPJ0cg=?=) Date: Fri, 8 Jun 2012 12:02:32 +0530 Subject: =?koi8-r?B?7s/Xz8UgLfDP0tHEz8sgz9PV3cXT1NfMxc7J0SDXwczA1M7Px88gy8/O?= =?koi8-r?B?1NLPzNE=?= Message-ID: <000d01cd4540$7becea80$6400a8c0@toyeddei2076> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 339 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 18095 bytes Desc: not available URL: -------------- next part -------------- From logjamsiy39 at composite.emv1.com Fri Jun 8 01:31:57 2012 From: logjamsiy39 at composite.emv1.com (=?koi8-r?B?IuvPzdDMxcvTzsHRINPF0tTJxsnLwcPJ0SI=?=) Date: Fri, 8 Jun 2012 14:01:57 +0530 Subject: =?koi8-r?B?79DMwdTBINDP08zFINDPzNXexc7J0SDz5fL06ebp6+H04Q==?= Message-ID: <174900128.81283309895958@composite.emv1.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2207 bytes Desc: not available URL: From fatalityl4172 at larchlane.com Thu Jun 7 22:39:37 2012 From: fatalityl4172 at larchlane.com (=?koi8-r?B?IvzOxdLHz9zGIg==?=) Date: Fri, 8 Jun 2012 14:39:37 +0900 Subject: =?koi8-r?B?/M7F0sfPwdXEydQhIOnO09TS1c3FztTBzNjO2cog/M7F0sfPwdXEydQs?= =?koi8-r?B?IPzL09DSxdPTLdzOxdLHz8HVxMnULCD8zsXSx8/QwdPQz9LULg==?= Message-ID: <269BB11C07294F688CEDEF4EDAA78222@LocalHost> Проводим энергетические обследования, формируем энергопаспорт. Инструментальные замеры, тепловизионное обследование. торопитесь! по 261 ФЗ необходимо провести энергоаудит до 31.12.2012г! www.энергоэф-спб.рф From whisky58 at fleiner.com Thu Jun 7 23:52:45 2012 From: whisky58 at fleiner.com (=?koi8-r?B?Ivvr7+zhIOHu9Onr9+Hy7u/n7yDk5ezhIg==?=) Date: Fri, 8 Jun 2012 14:52:45 +0800 Subject: =?koi8-r?B?++vv7OEg4e706ev34fLu7+fvIOTl7OE6ICDv4vX+5e7p5SAtIPcg9eTv?= =?koi8-r?B?9+/s+PP09+nlISA=?= Message-ID: ШКОЛА АНТИКВАРНОГО ДЕЛА: ОБУЧЕНИЕ - В УДОВОЛЬСТВИЕ! Умение отличить полотно Ван Гога от произведений Поля Гогена, Классический стиль от стиля Ар Деко, шедевры ювелирного искусства Карла Фаберже от изделий Западных мастеров выгодно отличает человека культурно образованного и интеллектуально развитого. Наши лекции познакомят Вас с различными традициями в искусстве, научат отличать подлинник от подделки, повысят культурный уровень и расширят кругозор! Мы ждем Вас! Тел.: +7 (495) 650-12-62; +7 (495) 999-11-45; +7 (963) 990-33-33. Сайт: www.школа-антиквар.рф From piratedqc23 at sturgisweb.com Fri Jun 8 16:06:13 2012 From: piratedqc23 at sturgisweb.com (=?koi8-r?B?IsvV0tMt0sHa0sHCz9TeycvBIg==?=) Date: Fri, 8 Jun 2012 15:06:13 -0800 Subject: =?koi8-r?B?S1BJOiDUxcjOz8zPx8nJINLB2tLBws/Uy8kgySDc1MHQ2SDXzsXE0sXO?= =?koi8-r?B?ydE=?= Message-ID: <128703036.05614390404994@sturgisweb.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8874 bytes Desc: not available URL: From downier309 at royalcomputers.com Fri Jun 8 01:47:46 2012 From: downier309 at royalcomputers.com (=?koi8-r?B?IvPXz8kgzMDEySEi?=) Date: Fri, 8 Jun 2012 15:47:46 +0700 Subject: =?koi8-r?B?98XExc7JxSDExcwg1yDT1cTByC4g78fSz83O2cogz9DZ1CDSwcLP1Nku?= =?koi8-r?B?IPDP0tTGz8zJzyDX2cnH0sHOztnIIMTFzA==?= Message-ID: <000d01cd4553$6024f7d0$6400a8c0@downier309> Ведение дел в судах. Огромный опыт работы. Портфолио выигранных дел.Телефон (903) 715 18 18 From hebeh at sponsorship.com Fri Jun 8 02:11:16 2012 From: hebeh at sponsorship.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Fri, 8 Jun 2012 16:11:16 +0700 Subject: =?koi8-r?B?4sXaz9DB087P09TYINPFzdjJIQ==?= Message-ID: За 2011 год по данным МЧС пожары принесли Материального ущерба на 17 280 086 000 млрд. рублей, не хочешь оказаться в этой статистике имей средства защиты! www.защити-себя.рф From pensively967 at alldata.bfi0.com Fri Jun 8 07:43:34 2012 From: pensively967 at alldata.bfi0.com (=?koi8-r?B?IvTp8O/n8uHm6fEi?=) Date: Fri, 8 Jun 2012 16:43:34 +0200 Subject: =?koi8-r?B?++/rIC0g4+Xu+SDu4SDw7+zp5/Lh5ung?= Message-ID: ШОК - ЦЕНЫ НА ПОЛИГРАФИЮ ИЗ МОЖАЙСКА СТАРТУЕТ ВЕСЕННЕ-ЛЕТНЯЯ АКЦИЯ = СКИДКИ НА ПОЛИГРАФИЮ НА ПЕРИОД ВЕСЕННЕ-ЛЕТНЕГО "ЗАТИШЬЯ" Визитки 100 шт - от 350 руб Плакаты А1 500 шт с ламинацией - 11 000 руб + Каталоги, плакаты, буклеты по лучшим ценам в Москве! * 2 Машины Rapida формата А1 5 секций, Хедельберг А3, конгрев, тиснение, выборочный лак, ВШРА, ламинация * СКЛАД И ПРЕДСТАВИТЕЛЬСТВО - Г. МОСКВА * ЦЕНЫ И СРОКИ - ВНЕ КОНКУРЕНЦИИ! * ВНИМАТЕЛЬНЫЕ И ПРОФЕССИОНАЛЬНЫЕ МЕНЕДЖЕРЫ ОТВЕТЯТ НА ВСЕ ВАШИ ВОПРОСЫ www.логотип-л.рф (495) 589-76-12 From makariost97 at razzi.com Fri Jun 8 13:13:25 2012 From: makariost97 at razzi.com (=?koi8-r?B?9dDSwdfMxc7JxSDQxdLTz87BzM/N?=) Date: Fri, 8 Jun 2012 17:13:25 -0300 Subject: =?koi8-r?B?9dDSwdfM0cXNINDF0tPPzsHMz80gliD38+Ugz9Qg4SDEzyDxLg==?= Message-ID: <4B8E92D228264C3C88F198847FF0B236@suportenobreak> 18-20 июня 2012 г. УПРАВЛЕНИЕ ПЕРСОНАЛОМ – ОТ А ДО Я +7 (495)- 74291_98 \\\/// 8 Моск. код: 792\2I/2_2 Цель: "Кадры решают все". Как сделать так, чтобы на Вашем предприятии работали сотрудники, которые все свои знания, навыки и умение отдавали работе? Как найти тех сотрудников, которые Вам нужны? Как удержать нужных и как по-хорошему расстаться с плохими работниками? Что лучше кнут или пряник в управлении персонала? Как подготовится к проверке инспекции по труду? Что нового можно применить в управлении персоналом? В ходе курса Вы узнаете, какие меры стоит предпринять для минимизации ошибок в работе с персоналом, как построить четкую систему документооборота и его учета, которая защитит при проверках, как подготовить и провести эффективную аттестация (оценку) персонала и правильно мотивировать своих сотрудников. В результате участия в курсе участник приобретет следующие знания: * Возможность оценить работу с персоналом на своем предприятии * Внедрить современные методы в соответствии с потребностями предприятия * Построить оптимальную систему кадрового документооборота * Определить и уточнить компетенции персонала, как работающего, так и принимаемого * Построить системы мотивации, адаптации и оценки, которые не будут отторгаться коллективом * Создать сбалансированную систему управления персоналом Программа: 1 день ПОИСК, ОТБОР, ПРИЕМ И АДАПТАЦИЯ СОТРУДНИКОВ 1. Критерии отбора персонала: * Заявка руководителя подразделения, имеющего вакансию, * Идеальный портрет работника, * Гармонизация идеального портрета работника и возможностей предприятия: * По навыкам, * По заработной плате, * Др. запросам. 2. Методики поиска персонала: * По категориям персонала: * Печатные издания, * Интернет, * Службы занятости, * Рекрутинговые компании, * Работа с молодежью: * Вузы и колледжи, * Военкоматы, * Heardhunting. 3. Отбор персонала: * Первоначальный отбор, * Первичное собеседование, * Собеседование в подразделении, * На что следует обратить внимание: * В документах, * При личном общение, * "Сканируем" кандидата, * Вопросы тестирования – за и против. 4. Решение о приеме: * Условия испытательного срока и последующей работы, * Кто принимает решение, * Ответственность принимающих решение. 5. Прием на работу: * Оформление документов, * Адаптация нового сотрудника: * Ознакомительные материалы по предприятию, * Вхождение в должность, * Наставник и наставничество. 6. Прохождение испытательного срока: * Заключение руководителя, наставника, * Заключение самого работника, * Выводы по окончанию испытательного срока. 7. Движение персонала: * Переводы: * Вертикальные и горизонтальные, * По собственному желанию и по инициативе руководства, * Документальное обеспечение движения персонала, * Др. виды движения персонала. 8. Анализ движения кадров 9. Ответы на вопросы, разбор конкретных ситуаций. 2 день КАДРОВОЕ СОПРОВОЖДЕНИЕ 1. Проверки инспекции по труду: * Плановые проверки, * Внеплановые проверки: * Обращение работников в надзорные органы, * Выявление нарушений в оплате труда и начислениях работникам, * Др. моменты. 2. На что обращают внимание инспекторы: * Приказы по личному составу, * Трудовые книжки, * Личные дела работников. 3. Решение спорных вопросов: * В ходе проверки, * После проверки. 4. Выполнение предписаний инспекторов: * Сроки исполнения, * Отчет об исполнении, * Повторные проверки. 5. Ответственность руководителей предприятия: * Наложение взысканий на руководителей предприятий, * Передача дел в суд, * Ответственность работника кадрового подразделения. 6. Кадровые документы, регламентируемые законодательством: * Придание документам юридической силы, * Состав и виды документов, * Основные требования к оформлению кадровой документации, * Учет кадровой документации на предприятии (ведение регистрационных книг, журналов, др.), * Своевременное внесение изменений в учетную документацию. 7. Архив предприятия: * Виды документов по срокам хранения. 8. Применение IT-программ. 9. Минимизация ошибок в работе с персоналом: * При приеме на работу: * Анализ документов кандидатов, * Выводы по результатам собеседований и интервью. * При переходе внутри предприятия. * При оформлении отпусков: * Учебных, * Очередных. * При увольнении по инициативе администрации: * Сокращения, * Ликвидация предприятия. 10. Ответы на вопросы слушателей, разбор конкретных ситуаций. 3 день СЛОЖНЫЕ АСПЕКТЫ УПРАВЛЕНИЯ ПЕРСОНАЛОМ – МОТИВАЦИЯ, ОБУЧЕНИЕ, АТТЕСТАЦИЯ 1. Структура мотивации: * Потребность работника * Материальное или нематериальное благо, способное удовлетворить эту потребность * Трудовое действие, необходимое для получения этого блага * Цена получения этого блага 2. Экономические и неэкономические стороны мотивации труда 3. Неэффективность немотивированного или узко мотивированного труда * Низкая производительность труда * Плохая дисциплина * Текучесть кадров 4. Правила мотивации труда * Эффект поощрения * Разнообразие способов и форм мотивации * Подкрепленная мотивация * Нестандартная мотивация * Промежуточная мотивация * Уровни ответственности, права свободы выбора * Неоправданность большого вознаграждения * Конкуренция в коллективе * Переобучение и переподготовка 5. Цели мотивации * На развитие предприятия и удержание сотрудников * На приток новых работников * На сокращение и увольнение 6. Моменты мотивации * Заработная плата * Определение оптимального уровня заработной платы * Доплаты и вычеты * Повышение квалификации, переподготовка, переобучение работников * Карьерный рост * Нематериальные поощрения 7. Эффективная мотивация 8. Критерии оценки эффективной мотивации * Удовлетворенность работников * Текучесть кадров * Производительность и качество труда 9. Когда надо обучать персонал: * Недостаточный профессионализм работников, * Новое направление деятельности или расширение предприятия, * Создание резерва на выдвижение, * Др. 10. Категории персонала по обучению: * Обучаемые и необучаемые работники, * Работники, чья профессия требует постоянного совершенствования и поддержания (бухгалтеры, IT-специалисты, др.), * Как заинтересовать работника. 11. Выбор способа и методик обучения: * Внутри предприятия: * Наставничество, * Коллективный обмен опытом, * Приглашение внешнего преподавателя, тренера: * * Коллективное обучение, * * Индивидуальное обучение, консультация, * Как лучше организовать процесс обучения. * * Вне предприятия: * Выбор обучающей фирмы, тренера, программы. 12. Планирование результатов обучения: * Цели обучения персонала, * Планы повышения квалификации и обучения. * Периодичность обучения. 13. Оценка результативности обучения: * Соотношение ожиданий и результатов обучения, * Непосредственно после обучения, * Через определенный промежуток времени, * Закрепление результатов. 14. Цели и задачи аттестации, оценки: * Оценка компетентности персонала, * Определение потребности в обучении и повышении квалификации, * Запуск нового направления деятельности, * Оптимизация численности персонала. 15. Виды оценок и аттестаций: * Плановые и внеплановые оценки, * Юридическая правомерность результатов аттестации. 16. Подготовка к проведению аттестации: * Положение об аттестации на предприятии, * Аттестационная комиссия, * План проведения аттестации, * Выработка критериев оценки отдельных групп работников, * Документы по аттестации. 17. Собственно аттестация: * Сроки проведения, * Опросные листы, * Роль аттестационной комиссии, * Самооценка и оценка руководителя, коллег, др., * Заключение по результатам аттестации, * Сравнение с предыдущими аттестациями. 18. Результативность аттестации: * Ротация кадров, * Планы повышения квалификации, * Оптимизация оплаты труда конкретного работника, * Конкретизация требований для подбора персонала, * Уточнение должностных инструкций и должностных обязанностей. 19. Практические рекомендации, ответы на вопросы: * Положения об аттестации, * Минимизация затрат на проведение аттестации. 20. Ответы на вопросы слушателей Стоимость участия: 17 000 рублей Информацию можно получить по телефонам: +7 499 - 445/40.95 или +7 499 Ч45Ч_095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 23129 bytes Desc: not available URL: From heartbreakscr56 at servihabitat.com Fri Jun 8 03:52:38 2012 From: heartbreakscr56 at servihabitat.com (=?koi8-r?B?IvPPwtPU18XOzsnLLevJxdfTy8/FINsuIg==?=) Date: Fri, 8 Jun 2012 19:52:38 +0900 Subject: =?koi8-r?B?7sXEz9LPx88g0NLPxMHNINPXz8ogINXewdPUz8sgINMgINfP2s3P1s7P?= =?koi8-r?B?09TYwCDT1NLPydTFzNjT1NfBINDS1cTBIQ==?= Message-ID: <000d01cd4564$d205bd10$6400a8c0@heartbreakscr56> Продается прилесной участок 89 км от мкад по Киевскому ш. Панорамный вид, лес, сосновый бор, Возможность строительства собственного водоема Звоните Собственник 8 ( 903 ) 193 0 6 ДВА ТРИ From brian.gomez at fuelmastersllc.com Fri Jun 8 07:27:19 2012 From: brian.gomez at fuelmastersllc.com (=?koi8-r?B?IvDSz8XL1M7PLdPNxdTOwdEgxM/L1c3FztTBw8nRIg==?=) Date: Fri, 8 Jun 2012 19:57:19 +0530 Subject: =?koi8-r?B?9NLFws/Xwc7J0SDzzsnw?= Message-ID: <01cd45b0$e90b3980$2529b37a@brian.gomez> СТРОИТЕЛЬНАЯ ЭКСПЕРТИЗА: - как это будет работать? В соответствии с последними изменениями в Градостроительный кодекс, изменяется порядок прохождения экспертизы строительной документации, а также выдача разрешений на строительство. Поможем Вам сориентироваться в новых нормах проведения строительной экспертизы. Вы узнаете: - последние изменения в градкодекс, вступающие в силу 01.04.2012 г. - порядок взаимодействия служб государственного строительного надзора и негосударственной экспертизы; порядок выдачи разрешения на строительство - обзор актуального законодательства: 337-ФЗ от 28.11.2011; 224-ФЗ от 18 июля 2011 года; N224-ФЗ и 243-ФЗ от 18 июля 2011 года и другие нормативно-правовые акты - новые положения архитектурно-строительного проектирования - актуальные вопросы планирования развития городских территорий и правого статуса объектов недвижимости Курс 25 - 26 июня, Санкт-Петербург. Условия и регистрация: (812) 6Ч2-2I-З2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3158 bytes Desc: not available URL: From blenchingsp at lepatatou.com Fri Jun 8 11:40:53 2012 From: blenchingsp at lepatatou.com (=?koi8-r?B?Iu7P18/FINcg/Ovz8OXy9On65SDT1NLPydTFzNjOz8ogxM/L1c3Fzg==?= =?koi8-r?B?1MHDycki?=) Date: Fri, 8 Jun 2012 20:40:53 +0200 Subject: =?koi8-r?B?8NLJztHUIM7P19nKINLFx8zBzcXO1CDz9PLv6fTl7Pju7+og/Ovz8A==?= =?koi8-r?B?5fL06fr5?= Message-ID: <01cd45b6$ff1bf880$df53b35e@blenchingsp> СТРОИТЕЛЬНАЯ ЭКСПЕРТИЗА: - как это будет работать? В соответствии с последними изменениями в Градостроительный кодекс, изменяется порядок прохождения экспертизы строительной документации, а также выдача разрешений на строительство. Поможем Вам сориентироваться в новых нормах проведения строительной экспертизы. Вы узнаете: - последние изменения в градкодекс, вступающие в силу 01.04.2012 г. - порядок взаимодействия служб государственного строительного надзора и негосударственной экспертизы; порядок выдачи разрешения на строительство - обзор актуального законодательства: 337-ФЗ от 28.11.2011; 224-ФЗ от 18 июля 2011 года; N224-ФЗ и 243-ФЗ от 18 июля 2011 года и другие нормативно-правовые акты - новые положения архитектурно-строительного проектирования - актуальные вопросы планирования развития городских территорий и правого статуса объектов недвижимости Курс 25 - 26 июня, Санкт-Петербург. Условия и регистрация: (812) 6Ч2-2I-З2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3158 bytes Desc: not available URL: From sateen at angelolucas.com Fri Jun 8 15:43:36 2012 From: sateen at angelolucas.com (=?koi8-r?B?IvPPwtPU18XOzsnLINDP08XMy8EgzsEg68nF19PLz80g2y4i?=) Date: Sat, 9 Jun 2012 00:43:36 +0200 Subject: =?koi8-r?B?88vJxMvBIM7BIMvSwdPJ19nKINXewdPUz8sg1yDexdPU2CDkztEg7sXa?= =?koi8-r?B?wdfJ08nNz9PUySE=?= Message-ID: <000d01cd45bf$c2088220$6400a8c0@sateen> Продается прилесной участок 89 км от мкад по Киевскому ш. Панорамный вид, лес, сосновый бор,Возможность строительства собственного водоема Позвоните 8 ( 903 ) 1+9+3 +0 +6 +2+3 From jacqualinemelvina at nzmp.com Fri Jun 8 21:51:11 2012 From: jacqualinemelvina at nzmp.com (DELORAFRIDA) Date: Sat, 09 Jun 2012 06:51:11 +0200 Subject: High Quality Global Replica a0ghfd1y Message-ID: <4fd2d63f.67005592@nzmp.com> High Quality Global Replica Top quality replica watches of Swiss luxury watch brands - Rolex, Breitling, TAG Heuer, Cartier, Panerai, Patek Philippe, Hublot.EXPRESS DELIVERY, we accept VISA / MASTERCARD http://purae.ru From fielder0 at eblengineers.com Fri Jun 8 22:26:13 2012 From: fielder0 at eblengineers.com (=?koi8-r?B?Ivvr7+zhIOHu9Onr9+Hy7u/n7yDk5ezhIg==?=) Date: Sat, 9 Jun 2012 08:26:13 +0300 Subject: =?koi8-r?B?++vv7OEg4e706ev34fLu7+fvIOTl7OE6ICDv4vX+5e7p5SAtIPcg9eTv?= =?koi8-r?B?9+/s+PP09+nlISA=?= Message-ID: <3F4F1E7F2D5F4FD1B8618EE3BC2659C9@edaatd3d7c09c0> ШКОЛА АНТИКВАРНОГО ДЕЛА: ОБУЧЕНИЕ - В УДОВОЛЬСТВИЕ! Умение отличить полотно Ван Гога от произведений Поля Гогена, Классический стиль от стиля Ар Деко, шедевры ювелирного искусства Карла Фаберже от изделий Западных мастеров выгодно отличает человека культурно образованного и интеллектуально развитого. Наши лекции познакомят Вас с различными традициями в искусстве, научат отличать подлинник от подделки, повысят культурный уровень и расширят кругозор! Мы ждем Вас! Тел.: +7 (495) 650-12-62; +7 (495) 999-11-45; +7 (963) 990-33-33. Сайт: www.школа-антиквар.рф From intractabilityw1 at larchlane.com Fri Jun 8 23:14:14 2012 From: intractabilityw1 at larchlane.com (=?koi8-r?B?IuTPzSDXIOjBzc/XzsnLwcgi?=) Date: Sat, 9 Jun 2012 09:14:14 +0300 Subject: =?koi8-r?B?8NLPxMHA1NPRIMvXwdLUydLZINcg6MHNz9fOycvByCA=?= Message-ID: Продаются элитные квартиры в Хамовниках в близи Новодевичьего монастыря www.дом-хамовники.рф From terrariuml72 at carpentermotorsports.com Fri Jun 8 22:14:41 2012 From: terrariuml72 at carpentermotorsports.com (=?koi8-r?B?Iu/UxMXMINDSz8TB1iDLz9TUxcTWzs/HzyDQz9PFzMvBIg==?=) Date: Sat, 9 Jun 2012 10:44:41 +0530 Subject: =?koi8-r?B?8NLPxMHF1NPRINXewdPUz8sg0M8g68nF19PLz83VINvP09PFLiDnz9LR?= =?koi8-r?B?3sXFINDSxcTMz9bFzsnFIQ==?= Message-ID: <000d01cd45fe$c63bccf0$6400a8c0@terrariuml72> Предлагаю Вам участок 26 соток с деревянным домом по самой низкой цене. Звоните единственное предложение. Телефон для получения получения подробной информации (Ч95) 6-ЧЗ2-777 Александр. From hallelujahsz31 at colour-analysis.com Fri Jun 8 22:45:16 2012 From: hallelujahsz31 at colour-analysis.com (=?koi8-r?B?IuHK/MvT0NLF09Mi?=) Date: Sat, 9 Jun 2012 11:15:16 +0530 Subject: =?koi8-r?B?8s/T08nK08vB0SDBzNjUxdLOwdTJ18EgREhMIMkgUE9OWS4=?= Message-ID: Российская альтернатива DHL и PONY. Московская компания АйЭкспресс предлагает УНИКАЛЬНОЕ соотношение цены и качества по доставке корреспонденции по Москве и Московской области. (включая доствку небольших грузов) Гарантируем: Индивидуальный подход к каждому клиенту, конфиденциальность и экспресс-условия по срокам доставки. тел. +7(495)9847578 www.кк-экспресс.рф From slowerg at livingsolstice.com Sat Jun 9 02:45:47 2012 From: slowerg at livingsolstice.com (=?koi8-r?B?IvUgzsHTIPPXz8kgzMDEySEi?=) Date: Sat, 9 Jun 2012 12:45:47 +0300 Subject: =?koi8-r?B?99rZ08vBzsnFIMTPzMfP1y4g9MXMxcbPziAoOTI1KSA1MDkgMjkgOTk=?= Message-ID: <000d01cd4624$a57fb730$6400a8c0@slowerg> Взыскание долгов через банкротство должника. Должника можно зацепить за живое! Привлечение к субсидиарной и уголовной ответственности руководителей должника. Телефон (925) 509 29 99 From leslieleonor at promero.com Sat Jun 9 06:40:05 2012 From: leslieleonor at promero.com (Bertha Chan) Date: Sat, 09 Jun 2012 15:40:05 +0200 Subject: Top quality replica watches of Swiss luxury watch brands - Rolex, Breitling, TAG Heuer, Cartier, Panerai, Patek Philippe, Hublot.EXPRESS DELIVERY, we accept VISA / MASTERCARD 7o87r12f Message-ID: <27s75i26o79-77178976-946p3s93@awswgydkd> High Quality Global Replica Top quality replica watches of Swiss luxury watch brands - Rolex, Breitling, TAG Heuer, Cartier, Panerai, Patek Philippe, Hublot.EXPRESS DELIVERY, we accept VISA / MASTERCARD http://supat.ru From yellowestu221 at vdsi.verizon.com Sat Jun 9 03:10:12 2012 From: yellowestu221 at vdsi.verizon.com (=?koi8-r?B?Iu3By9PJzcHM2M7B0SDSxcvMwc3BICI=?=) Date: Sat, 9 Jun 2012 15:40:12 +0530 Subject: =?koi8-r?B?7cXT0cMg0sHT09nMz8sgMjAgMDAw?= Message-ID: <92412C71FCF1413499647B014979EA0E@anilkant> Месяц рассылок 44(46) - 2 раза в день - 5 раз в неделю - 20 000 Тел: (495) 585-79-04 ICQ: 286-926-971 From chokinggrq at stolzlaw.com Sat Jun 9 04:55:27 2012 From: chokinggrq at stolzlaw.com (=?koi8-r?B?Iu/GydPZINcg7c/Ty9fFIg==?=) Date: Sat, 9 Jun 2012 17:25:27 +0530 Subject: =?koi8-r?B?7sUgzsHEzyDQzMHUydTYIMvPzcnT08nJwCwgz8bJ09kgz9Qg88/C09TX?= =?koi8-r?B?xc7OycvBIQ==?= Message-ID: <000d01cd4636$c29bc860$6400a8c0@chokinggrq> Маленькие и не очень маленькие ОФИСЫ ждут Вас! Помещения находятся на БольшойЧеркизовской улице Охраняемая территория, удобный подъезд с! Telefon8/903/ 7=2-8 -0=0 = 2- 0 From orientationh8 at racer-x.com Sat Jun 9 02:59:54 2012 From: orientationh8 at racer-x.com (=?koi8-r?B?8NLP18XSy8EgzsHMz8fP0MzB1MXM2N3Jy8E=?=) Date: Sat, 9 Jun 2012 18:59:54 +0900 Subject: =?koi8-r?B?0NLP18XSy8kg7ffkIMkg7sHMz8fP19nFINDSz9fF0svJINcgMjAxMiDH?= =?koi8-r?B?z8TV?= Message-ID: <000d01cd4626$9e654170$6400a8c0@orientationh8> 18 июня 2012г. Проверки МВД и Налоговые проверки в 2012 году +7 (495)- 7Ч291.98 : +7 (Ч95) 7Ч2\9I*98 Программа: 1. Налоговое администрирование в 2012 году. * Совершенствование системы налоговых правоотношений в 2012 году. * Разъясняющие письма МФ РФ √ в целях единообразного применения норм налогового законодательства. * Как будет складываться взаимодействие налоговых и правоохранительных органов. * Борьба с фирмами-однодневками продолжается с учетом нового ФЗ от 07.12.2011 г. ╧ 419-ФЗ. 2. Недобросовестность налогоплательщика. * Признаки недобросовестности налогоплательщика. * Критерии законности налоговой оптимизации. * Доказывание фактов, свидетельствующих об уклонении от налогов. * Недействительные сделки, мнимые и притворные сделки; последствия недействительности. * Срок давности для привлечения к ответственности при выявлении уклонения от уплаты налогов. * Типичные налогосберегающие схемы: ошибки применения и последствия. 3. Проверки налоговыми органами. * Специфика проверок камеральных, встречных, выездных. * Правила поведения первых лиц организации при выездной налоговой проверке. * Оформление результатов проверки. Обжалование результатов налоговых проверок. * Взыскание недоимки по налогам и пени. Срок давности для взыскания налогов и пени. * Порядок бесспорного взыскания недоимки по налогам и пени. * Взыскание штрафных санкций Срок давности для взыскания штрафных санкций. * Ответственность должностных лиц по налоговым преступлениям. 4. Проверки, проводимые совместно с ОБЭП и органами МВД РФ. * Основные причины, по которым приходит ОБЭП. Подтверждение полномочий инспекторов и порядок проведения проверки. * Опрос, допрос, обыск и изъятие: правила поведения налогоплательщика. Основные виды экономических преступлений. Как избежать уголовной ответственности руководителю, бухгалтеру, юристу. 5. Новые направления в налоговом контроле: о критериях признания получения налогоплательщиком необоснованной налоговой выгоды. 6. Что нужно знать о порядке проведения проверки. 7. Что нужно знать о том, как обычно действуют проверяющие. 8. Изменения в регламенте проведения проверок налоговыми органами. Изменения в части I НК РФ. * Формы и методы контроля со стороны правоохранительных органов. Финансовая, административная и уголовная ответственность за нарушение налогового законодательства. * Применение срока давности по налоговым правонарушениям. 9. Что нужно знать о том, как правильно проверяющие должны оформлять свои действия. * Как начинается проверка и что требовать от проверяющих. * Что делать, если проверяющие приходят, а директора нет на месте. * Как проходит и чем заканчивается проверка. * Как оформляются проверочные мероприятия. * Что можно позволить проверяющим, а что лучше запретить. * Как правильно вести себя при проверке. * Нужно ли отвечать на все вопросы. * Нужно ли незамедлительно предоставлять документы. * Нужно ли показывать и разъяснять компьютерные программы и файлы. 10. Что нужно знать, если намерениями проверяющих являются: ревизия финансово-хозяйственной деятельности, изъятие товара, изъятие компьютеров, обследование помещений, зданий, сооружений, транспортных средств и других объектов, выемка документов, вскрытие сейфов, обыск. 11. Что нужно знать, если Вы решили жаловаться или инициировать судебное разбирательство. 12. Способы защиты прав налогоплательщика при процедурных нарушениях со стороны налоговых и правоохранительных органов. Составление протокола разногласий. Стоимость участия: 8 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: \Моск. код/ 792/2I/2\2 **** 8 (499) Ч45.ЧО.95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7723 bytes Desc: not available URL: From fitnessiv3 at remcorp.com Sat Jun 9 10:36:58 2012 From: fitnessiv3 at remcorp.com (=?koi8-r?B?79DUyc3J2sHDydEg2sHS0MzB1Nk=?=) Date: Sat, 9 Jun 2012 23:06:58 +0530 Subject: =?koi8-r?B?4sXM2cUgzsHMz8fP19nFINPIxc3ZINcgMjAxMiDH?= Message-ID: <747D92BA3E994B7AA18A4DC64CF10776@af26e454084274> 21-22 июня 2012г. Лучшие белые налоговые схемы в 2012 г. с учетом изменений законодательства: полный курс код (495) - 7*Ч2*91-98 <<>> \Моск. код/ 792*2I22 Цель: Ставка обязательных страховых взносов (СВ) с зарплаты с 2012 года составляет 30% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При формальном снижении нагрузки по зарплате многих сотрудников фактически выплаты возрастут: если раньше с больших зарплат СВ не уплачивались, то теперь их ставка составит 10% с суммы дохода свыше 512 тыс. рублей в год. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь – назад, к "черным" схемам. Есть возможность посещения любого одного дня: программа разбита на два логических блока, каждый из которых занимает один день. Рекомендуется посещение обоих дней. Первый день посвящен поиску путей выживания компаний при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Кроме того, рассматриваются общие для всех налоговых схем условия и принципы применения – такие как наличие деловых целей, отсутствие аффилированности и фиктивных сделок, грамотное оформление. Второй день посвящен изучению основных практических методов оптимизации налога на прибыль и (в той степени, в которой это возможно) НДС в торговых (оптовых и розничных) и производственных предприятиях, предприятиях, оказывающих услуги или выполняющих работы, в т.ч. строительные. Рассматриваются субъекты льготного налогообложения, способы переноса на них налогооблагаемой базы и пути безналогового рефинансирования (возврата) выведенных сумм. Участники получат краткие индивидуальные консультации по тематике курса. Программа: 1 день: Общие положения о налоговом планировании и налоги с доходов физических лиц (НДФЛ, страховые взносы) 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. Обзор изменений законодательства по страховым взносам на 2012-13 гг., как они повлияли на налоговые схемы. 2. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность; * дивидендные схемы – замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Способы минимизации рисков имущественной ответственности предпринимателя. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с новым порядком ведения кассовых операций. 3. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и качественное документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 4. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Долгосрочное накопительное страхование жизни работников и ДМС за счет предприятия. 5. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, компенсаций, гонораров и иных легальных доходов от нерезидентов. 6. Как компенсировать снижение социальных гарантий (включая пенсионные накопления) работников при применении налоговых схем, не предусматривающих выплату зарплаты? 7. Использование процентных займов от физлиц. Расчет эффективности. Потребительский кредитный кооператив граждан – способ получения безналогового дохода в виде процентов. 8. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 9. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды. 10. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 2 день: Налоговое планирование по страховым взносам и НДФЛ в 2012 г. с учетом изменений законодательства 1. Методы планирования налога на прибыль и НДС. Принципиальная невозможность экономии НДС "белыми" схемами и случаи, когда это все же возможно. 2. Низконалоговые субъекты: * субъекты специальных налоговых режимов – ЕНВД и УСН, в т.ч. патентная система, субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * оффшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, 3. Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 4. Способы переноса налогооблагаемой базы по налогу на прибыль на низконалоговых субъектов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. лицензионные и франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. * механизм трансфертных цен. Новое антитрансфертное законодательство, способы ухода от контроля за сделками, грамотное обоснование трансфертных цен, 5. Займы как способ возвратного рефинансирования – преимущества и недостатки, риск ведения незаконной банковской деятельности. Безналоговое рефинансирование (возврат) и капитализация выведенной прибыли предприятия (холдинга) через уставный капитал, безвозмездную передачу имущества, увеличение чистых активов, ст. 27 Закона "Об ООО". 6. Простое товарищество субъектов упрощенной системы налогообложения, в т.ч. из "низконалоговых" регионов. Уплата НДС. Перенос прибыли товарищества на низконалоговых субъектов (УСН 6%, ЕНВД, оффшор и др.). Отсрочка уплаты налога при непередаче прибыли на счета товарищей. Возможен ли обход с помощью простого товарищества правил налогового учета (гл. 25 НК) и ограничений гл. 26.2 НК РФ в части перечня затрат? 7. Экономия НДС в торговле, производстве, выполнении работ, оказании услуг через разделение финансово-товарных потоков "с НДС" и "без НДС". Ограничение использования: покупатели/заказчики, не нуждающиеся в вычете НДС, как их выявить, или создать искусственно. Риски и рекомендации по использованию схемы. 8. Иностранные низконалоговые компании, цели применения. Их использование при проведении внутрироссийских операций для оптимизации налога на прибыль: традиционные (торговля, проценты, дивиденды, роялти, услуги и т.п.) и нетрадиционные схемы (простое товарищество, агентские). Выбор низконалоговых юрисдикций. 9. Обзор изменений налогового законодательства, как они повлияют на налоговые схемы. Ответы на вопросы. По желанию и по возможности – индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц курса. Стоимость участия:1 день 9 000 руб. Стоимость участия:2 дня 16 000 руб. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 Московский код: 7Ч2\9198 или 8 (Ч95) 792*21\22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 12694 bytes Desc: not available URL: From ftn768 at gmail.com Sat Jun 9 21:07:20 2012 From: ftn768 at gmail.com (Jack Byer) Date: Sat, 9 Jun 2012 23:07:20 -0500 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: >> Do you think the more broader scope of Mojo Nation as a platform for >> market based allocated of computing resources is unworkable in >> principle or was it just a matter of being too ambitious for its time >> and/or poorly managed as a project? > >Level 1: Tahoe-LAFS as it currently exists. One set of storage servers >constitutes a grid. The administrator(s) authorize someone to run a >storage server by sharing the introducer furl with them. This same act >is also necessary and sufficient to authorize someone to run a storage >*client*. > >Level 2: the first results from Brian's imminent Accounting project. ... > >Hey, wait a second. Could we have this conversation on the tahoe-dev >mailing list? Just subscribe to it and post your question above. >Thanks! :-) > >Regards, > >Zooko Hello, all. My name is Jack and I am a non-coding Linux geek with an interest in economics. I was an avid Slashdot reader when the Mojo Nation project was announced and was very excited by the idea. My takeaway from the project was that it was about using market economics to allocate computing resources. Unfortunately it didn't work out but parts of it still live on, such as this project. Recently on the Bitcoin forums the idea came up to form a digital currency-based filesharing network and that thread (https://bitcointalk.org/index.php?topic=86384.0) reminded me of MN, leading to a discussion of whether or not it would be practical to bring back the idea of a market-based computing resource allocation. This isn't the first time a combination of Bitcoin and tahoe-lafs has been suggested but I'd like to ask a different question than just whether or not is makes sense to use bitcoins to pay people for storage. Is it practical to go back to the original goal of MN instead of a limited subset if the reasons for the project's failure are addressed? From what I can tell the pricing mechanism of MN was broken because it didn't really have a market. A market needs independent decision-making agents bidding against each other to resolve conflicting goals and MN didn't have that. It's not realistic to expect users to sit in front of a screen all day and daytrade Mojo in order to achieve price discovery. Now, ten years later, automated trading algorithms are common so perhaps it would be possible for a network to use dynamic pricing to allocate hard drive space, bandwidth, and CPU power. Are there any fundamental reason why a system like Mojo Nation couldn't work now that certain capabilities are available that weren't a decade ago? Jack _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From metahorse at googlemail.com Sun Jun 10 06:42:22 2012 From: metahorse at googlemail.com (Michael Hrenka) Date: Sun, 10 Jun 2012 06:42:22 -0700 (PDT) Subject: [ZS] Re: Is there a consumer market at all? Message-ID: I see there's some confusion here in this thread. First of all, my suggestions of a consumer market process is completely compatible with our current system. I'm not suggesting replacing all current forms of advertisement and Monte Carlo market placement with the more interactive model. Instead, the interactive market model is to be understood as complement to the current reactive market model. It looks like some here think the reactive market doesn't work badly enough and that the interactive market is too costly (in time and money) to justify its expansion. Is that a really justified judgment? Partially it seems to be, because the majority is probably too comfortable to participate in an interactive market, just as the majority is too comfortable to participate actively in politics (I see votes as reactive participation). However, in politics there are still a few people who are actively engaged. Why don't we see the same in a similar fashion in the economic realm? Currently it looks like there's only the binary choice between reactive market participation or owning/ working for a company which produces goods. There's not much in between. This is a vacuum which demands a serious explanation - and not just naive dismissals. There are a few possible explanations - the argument about an interactive participation costing too much time is only half of an explanation, because time is a given fixed factor - the only variable are the preferences and priorities of different persons. Here are a few options how to explain the vacuum: 1. People care more about what they DON'T want than what they actually want. 2. People don't know what they actually want, so they can't ask actively for it. 3. People really don't want anything really strongly and thus remain solely passive or reactive. 4. There are other psychological factors which are adverse to interactive markets (status quo bias for example). 5. People are simply too stupid to participate in interactive markets. 6. People are too stupid to devise practicable procedures for interactive markets. If 6. turns out to be a major factor in the true explanation of the phenomenon there's a real chance for Zero State to exploit the current situation by designing effective interactive market procedures. There are just no good places for producers and consumers to meet each other. In other words there are no good forums - and "forum" is simply the Latin word for "market". With our modern online technology the time and resource requirements for an interactive participation of consumers in the production process might be minimized drastically. Some companies start to reach out for customers on platforms like Twitter and Facebook and try to get into a real conversation with them. However, Twitter and Facebook look like very suboptimal forums for interactive markets. I'm rather looking for something that changes our production processes like Khan Academy changed our education processes. There might be a serious amount of cash behind an idea like this. What if the new interactive market process could lead to products which have 10 times higher quality while only being half as expensive? Impossible you say? Well, then prove that! -- Michael Hrenka P.S.: Furthermore I propose that we refrain from using terms like "capitalist", "socialist", "free markets", "centralised", "decentralised", "planning", and so on, because those terms come with too much ideological baggage! Please try to use other words that actually describe what you mean. Otherwise we really land in a situation where capitalism = socialism = planning = centralised = markets = free markets = capitalism. -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From sommerearlie at jci.com Sat Jun 9 21:57:40 2012 From: sommerearlie at jci.com (Bari Genevive) Date: Sun, 10 Jun 2012 09:57:40 +0500 Subject: Try it Risk Free for 60 Days. Erect Plus - Amazing Results With Clinically Supported & Doctor Approved Male Erection Enhancement Pills. m8gnym26 Message-ID: <37d79j49p26-98008882-621t8j15@wqcpgadypm> Erect Plus - Amazing Results With Clinically Supported & Doctor Approved Male Erection Enhancement Pills. Delivery in 2-3 Days Worldwide. Try it Risk Free for 60 Days. http://hunit.ru From eugen at leitl.org Sun Jun 10 02:09:02 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 10 Jun 2012 11:09:02 +0200 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: <20120610090902.GK17120@leitl.org> ----- Forwarded message from Jack Byer ----- From eugen at leitl.org Sun Jun 10 02:28:19 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 10 Jun 2012 11:28:19 +0200 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: <20120610092819.GN17120@leitl.org> ----- Forwarded message from "James A. Donald" ----- From digestedf797 at rdooley.com Sun Jun 10 11:30:14 2012 From: digestedf797 at rdooley.com (=?koi8-r?B?zsXawcvPzs7B0SDExdHUxczYzs/T1NguIA==?=) Date: Sun, 10 Jun 2012 15:30:14 -0300 Subject: =?koi8-r?B?78bJw8nBzNjOz8Ugz8LOwczJ3snXwc7JxS4=?= Message-ID: <941898254.47920717429539@rdooley.com> 26 июня 2012г. Налоговое планирование : "как обойтись без криминальной обналички и фирм-однодневок и не разориться √ оптимизация налогообложения законными способам╩ 8 (499) Ч454095 <<<>>> +7 Ч95 7Ч2\9I*98 Цель: Глобальный экономический кризис привел в том числе к ужесточению налоговой политики государства, повышению ставок налогов и активизации борьбы за их собираемость. В современных условиях использование таких традиционных способов псевдооптимизации, как обналичка и фирмы-однодневки становится более опасным, дорогим и малодоступным. Помочь компаниям, применяющим "серые" и "черные" схемы оптимизации налогов, уйти от них, и при этом не разориться, не уступить конкурентам, не уйти с рынка. Найти законные альтернативы таким схемам, платить налоги, но не переплачивать √ вот основная идея налогового планирования без "помоек" и "черного нала". Программа: 1. Договоримся о терминах: что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.). Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2. Обналичивание. Для чего используется: * "черная" зарплата и доходы собственников бизнеса; * оплата расходов, которые не хочется проводить официально; * незаконная деятельность (взятки, откаты, финансирование политической деятельности┘). 3. Законные альтернативы обналичиванию (только для законных целей!): * в каком случае выплата зарплаты на спецрежимах сохраняет свою актуальность; * дивиденды от компаний на спецрежимах или от компании-нерезидента; * предприниматель (ИП) √ как использовать; * дарение физлицом наличных денег, заработанных в качестве ИП √ легальная альтернатива обналичиванию, дающая безналоговый доход? Новый порядок ведения кассовой операций ЦБР. Получение наличных по чеку, через личные (карточные и иные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п. Выбор банков, ограничения; * зарплата в большом размере √ льготная (в некоторых случаях √ нулевая) ставка страховых взносов; * платежи от нерезидентов на карты, основания платежей. * Однодневки. Для чего используются: * псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; * "серый импорт"; * "серая конвертация"; * незаконная деятельность. 4. "Серые" (полулегальные) альтернативы: как нельзя "оптимизировать"! Фирмы-"прокладки", контактирующие с недобросовестными налогоплательщиками ("белая" - "серая" - "черная" фирмы). Краткий обзор других "серых" альтернатив. 5. Законные альтернативы однодневкам (только для законных целей!): * выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение доходов и расходов "с НДС" и "без НДС"; * затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; * прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; * выплата нерезидентам дивидендов, роялти, процентов, вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 6. Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. 7. Как можно и как нельзя оптимизировать налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменения. Обзор изменений налогового законодательства, их влияние на налоговые схемы. Ответы на вопросы. По желанию и возможности √ индивидуальное экспресс-моделирование налоговых схем для компаний-участниц курса. Стоимость участия: 9 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (495)- 7Ч29I.98 **** 8 (499) Ч45\ЧО/95 From info at zerostate.net Sun Jun 10 08:27:28 2012 From: info at zerostate.net (ZeroState.net) Date: Sun, 10 Jun 2012 16:27:28 +0100 Subject: [ZS] Re: Is there a consumer market at all? Message-ID: On 10 June 2012 14:42, Michael Hrenka wrote: > If 6. turns out to be a major factor in the true explanation of the > phenomenon there's a real chance for Zero State to exploit the current > situation by designing effective interactive market procedures. There > are just no good places for producers and consumers to meet each > other. In other words there are no good forums - and "forum" is simply > the Latin word for "market". With our modern online technology the > time and resource requirements for an interactive participation of > consumers in the production process might be minimized drastically. > Some companies start to reach out for customers on platforms like > Twitter and Facebook and try to get into a real conversation with > them. However, Twitter and Facebook look like very suboptimal forums > for interactive markets. I'm rather looking for something that changes > our production processes like Khan Academy changed our education > processes. There might be a serious amount of cash behind an idea like > this. I've stayed out of this conversation so far, but there are a couple of points here I can't resist. This first is the idea of developing a ZS-affiliated trading forum that could end up being of tremendous value, even if your arguments are incorrect, Michael. You may remember that in Munich we talked about setting up some kind of trading forum as part of project RES-2: https://sites.google.com/site/zsorg2/10-res-2-bitcoin/res-2-b-implementation That was envisaged as a way to encourage use of Bitcoin, and also probably anonymous. Right now I have 2 questions: (1) Are these two features compatible with the idea of an interactive market, do you think? (2) What other features would be good or necessary? > P.S.: Furthermore I propose that we refrain from using terms like > "capitalist", "socialist", "free markets", "centralised", > "decentralised", "planning", and so on, because those terms come with > too much ideological baggage! Please try to use other words that > actually describe what you mean. Otherwise we really land in a > situation where capitalism = socialism = planning = centralised = > markets = free markets = capitalism. I second this wholeheartedly. At first I had hoped that we could talk about the big ideological poles or trends in a detached way, but we are being distracted by ingrained thought habits and preconceptions. In fact, I think that insisting that people focus upon specifics rather than shorthand would be very much in the spirit of our Principle of Construction - well said, and many thanks Michael! http://transhumanpraxis.wordpress.com/2012/01/28/37-pillars-4-the-principle-of-construction/ - A -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From frisbeestu at ripec.com Sun Jun 10 08:12:40 2012 From: frisbeestu at ripec.com (=?koi8-r?B?4MzJ0SD3ycvUz9LP187B?=) Date: Sun, 10 Jun 2012 17:12:40 +0200 Subject: =?koi8-r?B?8PLv9+Xk5e7p5SDh9evj6e/u4SD3IPzs5ev08u/u7u/qIObv8u3l?= Message-ID: <000d01cd4713$18a01ef0$6400a8c0@frisbeestu> МОСКВА: 27-28 июня 2012 г. Госзаказ от "А" до "Я" для Заказчиков и Поставщиков "ГОСУДАРСТВЕННЫЕ ЗАКУПКИ: котировки, конкурсы, электронные аукционы. Разъяснения и практические рекомендации по порядку применения норм ФЗ-94 при проведении торгов. Федеральная контрактная система" +7 499 ЧЧ5.4О_95 **** 8 Моск. код: 792\2122 Программа: 1 день _- ОБЗОР ПОСЛЕДНИХ ИЗМЕНЕНИЙ В ЗАКОНОДАТЕЛЬСТВЕ РФ О РАЗМЕЩЕНИИ ЗАКАЗОВ _- Основные отличительные идеи нового законопроекта в сфере Госзакупок "О федеральной контрактной системе" _- Новшества системы: * регламентация работы по прогнозированию и планированию обеспечения государственных нужд, установление состава обязательных документов планирования и определение порядка обоснования ключевых параметров планируемых контрактов в целях последующего мониторинга размещения и исполнения контрактов, анализа контрактных результатов предоставление государственным заказчикам свободу выбора способа размещения заказа. * стимуляция государственных заказчиков и закупщиков по обеспечению надлежащего исполнения условий контракта, * введение новых закупочных процедур и ограничений на закупку дорогостоящих товаров, * возможность формирования реестра недобросовестных заказчиков и т.д.. _- Порядок установления начальной (максимальной) стоимости контакта, возможные источники информации, обязанность заказчиков по опубликованию обоснования НМЦ. _- Введение порядка обязательного опубликования планов-графиков закупок с 2012 года. _- ОСНОВНЫЕ ВОПРОСЫ ПРОВЕДЕНИЯ ПРОЦЕДУР РАЗМЕЩЕНИЯ ЗАКАЗА _- Выбор формы торгов: конкурс или аукцион. _- Подготовка и проведение конкурса: последовательность и продолжительность этапов, оформляемые документы. Рассмотрение заявок и допуск к конкурсу. Оценка и сопоставление заявок, выбор победителя. Изменения в Постановлении Правительства ╧ 722 _- Размещение заказа путем проведения запроса котировок. _- Размещение заказа у единственного поставщика _- ЗАКЛЮЧЕНИЕ ГОСУДАРСТВЕННЫХ (МУНИЦИПАЛЬНЫХ) КОНТРАКТОВ ПОДГОТОВКА И СДАЧА ОТЧЕТНОСТИ ЗАКАЗЧИКУ _- Подготовка контракта. Обязательные положения контракта: приемка товаров, работ, услуг и ответственность поставщика. _- Обеспечение исполнения контракта. _- Исполнение контракта: приемка поставляемых товаров, выполненных работ. Действия поставщиков, направленные на уклонение от исполнения обязательств. Действия заказчика в случаях нарушения обязательств по контракту. _- Расторжение контракта. _- Размещение в реестре недобросовестных поставщиков _- Ответы на вопросы _- ФЕДЕРАЛЬНЫЙ ЗАКОН ОТ 26 ИЮЛЯ 2006 Г. N 135-ФЗ "О ЗАЩИТЕ КОНКУРЕНЦИИ" _- Процедуры, попадающие под контроль ФАС РФ. _- Порядок принятия и формы подачи жалоб при наличии признаков ограничения конкуренции. _- Сроки рассмотрения жалоб. _- Изменение порядка закупки финансовых услуг государственными заказчиками. 2 день _- 10.00-13.00 РАЗМЕЩЕНИЕ ЗАКАЗА ПУТЕМ ПРОВЕДЕНИЯ АУКЦИОНА. ОФИЦИАЛЬНЫЙ САЙТ РФ ДЛЯ РАЗМЕЩЕНИЯ ЗАКАЗОВ НА ПОСТАВКИ ТОВАРОВ, ВЫПОЛНЕНИЯ РАБОТ И ОКАЗАНИЯ УСЛУГ. ОБЗОР ДЕЙСТВУЮЩИХ ПЛОЩАДОК. ПОРЯДОК ПРОВЕДЕНИЯ АУКЦИОНА В ЭЛЕКТРОННОЙ ФОРМЕ. _- Новое в информационном обеспечении Госзаказа √ работа официального сайта и электронных торговых площадок. Требования законодательства к извещению о закупках. Вопросы информационной безопасности в системе размещения государственных и муниципальных заказов _- Электронный аукцион. Размещение заказов на электронных аукционах. Аукционный перечень (Распоряжение Правительства 236-р). _- Обзор электронных площадок: ГУП "Агентство по государственному заказу, инвестиционной деятельности и межрегиональным связям Республики Татарстан", ОАО "Единая электронная торговая площадка", ЗАО "Сбербанк - Автоматизированная система торгов", ООО "РТС-тендер", ЗАО ММВБ "ГОСЗАКУПКИ". _- Электронный аукцион для Заказчиков Программное обеспечение, ЭЦП и порядок ее регистрации, документы на регистрацию, размещение извещения, документации об аукционе и протоколов. Порядок дачи разъяснений положений аукционной документации. _- Электронный аукцион для Участников Где можно приобрести ЭЦП, как ее зарегистрировать. Какие документы нужно предоставить для прохождения аккредитации на торговой площадке? Обеспечение заявок на участие в аукционе в электронной форме: как и кому предоставляется. Условия удержания обеспечения. _- Универсальный алгоритм проведения аукциона в электронной форме. Получение и регистрация ЭЦП; аккредитация участника; порядок опубликования информации об аукционе; _- Заключение контракта по итогам аукциона. Изменение сроков заключения контакта; Протокол разногласий; Новые требования по обеспечению исполнения контракта _- Ответы на вопросы слушателей _- 14.00 √ 17.00 ПРАКТИЧЕСКИЙ ТРЕНИНГ В КОМПЬЮТЕРНОМ КЛАССЕ ПО ФОРМИРОВАНИЮ И РАЗМЕЩЕНИЮ ИЗВЕЩЕНИЙ НА ОФИЦИАЛЬНОМ САЙТЕ ЗАКУПОК РФ И ПРОВЕДЕНИЮ АУКЦИОНА В ЭЛЕКТРОННОЙ ФОРМЕ НА ТОРГОВОЙ ПЛОЩАДКЕ ООО "РТС-тендер" _- Ответы на вопросы Стоимость участия: 15 200 рублей Вся информация по тел: 8 (499) 445Ч095 \\\/// 8 (Ч95) 792/2I\22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8893 bytes Desc: not available URL: From bushnumbers at cpdns.net Sun Jun 10 18:10:28 2012 From: bushnumbers at cpdns.net (Mattie Mann) Date: Sun, 10 Jun 2012 19:10:28 -0600 Subject: On-line Shop High Quality Replica Swiss Watches & Jewelry ... bnscuy1 Message-ID: <201206110611.7073A4DF50BD81B48ECB9@26ted5ir8> On-line Shop High Quality Replica Swiss Watches & Jewelry ... Replica Watches & Jewelry at ProWatches - high luxury quality replica Swiss watches. We have a lot of famous brands. Such as Jacob & Co, TAG Heuer, ... http://sliky.ru From jamesd at echeque.com Sun Jun 10 02:26:14 2012 From: jamesd at echeque.com (James A. Donald) Date: Sun, 10 Jun 2012 19:26:14 +1000 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: On 2012-06-10 2:07 PM, Jack Byer wrote: > This isn't the first time a combination of Bitcoin and tahoe-lafs has > been suggested but I'd like to ask a different question than just > whether or not is makes sense to use bitcoins to pay people for > storage. Is it practical to go back to the original goal of MN instead > of a limited subset if the reasons for the project's failure are > addressed? From what I can tell the pricing mechanism of MN was broken > because it didn't really have a market. A market needs independent > decision-making agents bidding against each other to resolve > conflicting goals and MN didn't have that. It's not realistic to > expect users to sit in front of a screen all day and daytrade Mojo in > order to achieve price discovery. Mojo nation had an automatic auction scheme: When acting as a server your computer serviced requests starting with those offering the best price, down to the worst, thus when operating as a server, automatic price discovery. When acting as a client the client should have automatically adjusted its offers in accordance with its user's performance goals and price limits, trying automatically to pay the lowest price consistent with adequate service, trying to discover market clearing prices with minimal human intervention and make that information available to the user. I don't think it did. So as a server, there was automatic price discovery, as a client, there was, to the best of my knowledge, no useful automatic price discovery. For micropayments, where your computer performs lots of transactions on your behalf without consulting you, this was an unacceptable flaw. I have never seen a post mortem from the Mojo Nation developers. Would like to see one. Perhaps one exists, and I just missed it. Seems to me that Tahoe fails because it retreated from the goals of Mojo Nation - as Mojo Nation itself did. To achieve reliability, you really want a large number of servers, for a large number of servers you need a large community, preferably the entire world as one community, but if you have large community, tahoe gives you the tragedy of the commons. Tahoe relies on social enforcement of good behavior. A community large enough to produce benefits from shared and distributed storage is large enough that the cost of informal social enforcement of good behavior is excessive - and bad social behavior results in unreliable storage. Also, tahoe abandons EGTP. We need a replacement for TCP that provides end to end encryption, protocol negotiation, and NAT tunneling. TCP is an unworkable protocol in a large, untrusting, and untrustworthy society. EGTP was such a replacement, or was intended to be such a replacement. I would say that the main result of the Tahoe experiment is that you really have to do what Mojo Nation attempted to do, and that the subset has problems. Bittorrent was a successful descendent of Mojo Nation, but because storage is not rewarded, torrents go unseeded. Need to reward both storage and bandwidth. Mojo Nation done right would be bittorrent with the capability to support both mutable and immutable files (a torrent is an immutable file), with an incentive to seed, and with the capability to support an enormous number of inactive seeds without overhead costs. We would like the capability to support mutable files, as tahoe does, so that we can have lists of immutable files, as tahoe does. Such a mutable list would be the equivalent of the pirate bay. _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sun Jun 10 10:33:49 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 10 Jun 2012 19:33:49 +0200 Subject: [ZS] Re: Is there a consumer market at all? Message-ID: <20120610173349.GT17120@leitl.org> ----- Forwarded message from "ZeroState.net" ----- From eugen at leitl.org Sun Jun 10 10:40:13 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 10 Jun 2012 19:40:13 +0200 Subject: [ZS] Re: Is there a consumer market at all? Message-ID: <20120610174013.GV17120@leitl.org> ----- Forwarded message from Michael Hrenka ----- From narcisalaureen at iland.net Mon Jun 11 04:09:08 2012 From: narcisalaureen at iland.net (Epifania Lorena) Date: Mon, 11 Jun 2012 07:09:08 -0400 Subject: Buy Cialis Online - the LOWEST PRICES GUARANTEED, fast worldwide shipping, no prescription required uvw7rrl Message-ID: <23v45i22h30-03711882-708a4t16@kjetrjjc> Buy Cialis Online - the LOWEST PRICES GUARANTEED, fast worldwide shipping, no prescription required http://nmvsqc.ru From marlowe at antagonism.org Mon Jun 11 05:27:18 2012 From: marlowe at antagonism.org (Patrick R McDonald) Date: Mon, 11 Jun 2012 07:27:18 -0500 Subject: [tahoe-lafs-weekly-news] TWN 33 Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================== Tahoe-LAFS Weekly News, issue number 33, June 11 2012 ===================================================== Welcome to the Tahoe-LAFS Weekly News (TWN). Tahoe-LAFS_ is a secure, distributed storage system. `View TWN on the web`_ *or* `subscribe to TWN`_. If you would like to view the "new and improved" TWN, complete with pictures; please take a `look`_. .. _Tahoe-LAFS: https://tahoe-lafs.org .. _View TWN on the web: https://tahoe-lafs.org/trac/tahoe-lafs/wiki/TahoeLAFSWeeklyNews .. _subscribe to TWN: https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-lafs-weekly-news .. _look: https://tahoe-lafs.org/~marlowe/TWN33.html Announcement and News ===================== TWN Moves to Mondays - -------------------- Sorry for failing to post a TWN last week. Unfortunately both of my children were sick with a stomach bug and they take priority. They are much doing fine now, but loved Saturdays with Dad. As such, Saturdays are now theirs and TWN has been moved to Mondays. I apologize for any inconvenience this may cause. LAFS-RPG on Tor Hidden Service - ------------------------------ Markus Reichelt |markus| provided a fantastic concept of running lafs-rpg on a `Tor`_ hidden service. While the grid itself is not on the Tor network, users may access the grid through the hidden service helping to provide the users anonymity for the grid owners. At my request Markus was kind enough to provide a `HOWTO`_ with sample configuration files. Please note, there appears to be an issue when access the service via `tor2web`_. Markus was also kind enough to provide a `live PoC`_. Please note, you will need to use the Tor network to access this PoC. .. |markus| image:: markus.jpg :height: 35 :alt: Markus .. _`Tor`: https://torporject.org .. _`HOWTO`: http://mareichelt.com/pub/mine/tahoe-lafs/lafs-rpg-tor-hs.html .. _`tor2web`: http://tor2web.org/ .. _`live PoC`: http://27jplscnzqi2sser.onion/ Glowing Quotes ============== bAbsolutely, I've been very impressed with Tahoe-LAFS, both the underlying concepts and ideas and the implementation (I was playing with it just yesterday). It's fast, reliable, and has been making steady progress.b b Mourad De Clerck Tahoe-LAFS on Twitter ===================== I still want to organize a Tahoe-LAFS Unit Test Writing Party. Somebody give me a little encouragement here! http://identi.ca/url/70271963 [`0`_] @sameerverma @koolhead17 I'd like to see a Juju charm to manage Tahoe-LAFS instances. Seems pretty simple.. [`1`_] .. _`0`: https://twitter.com/zooko/status/210139741386055680 .. _`1`: https://twitter.com/zooko/status/209190319147851777 - From the tahoe-dev Mailing List =============================== Exception in tahoe deep-check - ----------------------------- Brad Rupp experienced `an exception when running tahoe deep-check`_. The exception occurred with Tahoe-LAFS 1.9.1. Brian |brian| suggested the issues might be similar to `#1676`_ and `#1689`_. If this is correct, the developers resolved the issue in trunk two months ago and it will be part of the upcoming 1.9.2 release. Resurrecting MojoNation - ----------------------- Jack Byer expressed interest in `resurrecting Mojo Nation`_. `MojoNation`_ was the creation of Evil Geniuses for a Better Tomorrow. Their ranks included Bram Cohen of BitTorrent fame and our very own Zooko |zooko|. MojoNation provided the ability for users to set prices for any service which their node might offer and for clients to bid on services they desired. Inspired by `a discussion on BitcoinTalk`_ discussing a currency-based filesharing network, Jack wishes to discuss whether it would be practical to reintroduce the idea of market-based computing resource allocation. .. _`an exception when running tahoe deep-check`: https://tahoe-lafs.org/pipermail/tahoe-dev/2012-June/007413.html .. |brian| image:: warner.png :height: 35 :alt: Brian Warner :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs .. _`#1676`: https://tahoe-lafs.org/trac/tahoe-lafs/tickets/1676 .. _`#1689`: https://tahoe-lafs.org/trac/tahoe-lafs/tickets/1689 .. _`resurrecting Mojo Nation`: https://tahoe-lafs.org/pipermail/tahoe-dev/2012-June/007416.html .. _`MojoNation`: https://en.wikipedia.org/wiki/Mojo_nation .. _`a discussion on BitcoinTalk`: https://bitcointalk.org/index.php?topic=86384.0 Patches Needing Review of the Week ================================== There is one (1) ticket still needing review for 1.9.2: * `#1115`_: add servers-of-happiness to reports (post-repair says 10 hosts have good shares but there only 4 hosts) There are six (6) ticket still needing review for 1.10.0: * `#166`_: command line order is problematic * `#937`_: 'tahoe run' doesn't work for an introducer node * `#1539`_: stop putting pkg_resources.require() into .tac files * `#1159`_: stop using .tac files: make it possible to change appname, Python package-directory name, perhaps other names * `#1693`_: flogtool doesn't get automatically provided * `#1240`_: add functional test of ResponseCache in favour of MDMFSlotReadProxy's cache There are two (2) tickets still needing review of 1.11.0: * `#1265`_: New Visualizer is insufficiently labelled/documented (plus layout problem) * `#1382`_: immutable peer selection refactoring and enhancements .. _`#1115`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1115 .. _`#166`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/166 .. _`#937`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/937 .. _`#1539`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1539 .. _`#1159`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1159 .. _`#1693`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1693 .. _`#1240`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1240 .. _`#1265`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1265 .. _`#1382`: http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1382 - ---- *The Tahoe-LAFS Weekly News is published once a week by The Tahoe-LAFS* *Software Foundation, President and Treasurer: Peter Secor* |peter| *. Scribes: Patrick "marlowe" McDonald* |marlowe| *, Zooko Wilcox-O'Hearn* *, Editor: Zooko.* `View TWN on the web`_ *or* `subscribe to TWN`_ *. Send your news stories to* `marlowe at antagonism.org`_ *b submission deadline: Friday night.* .. _marlowe at antagonism.org: mailto:marlowe at antagonism.org .. |zooko| image:: zooko.png :height: 35 :alt: zooko :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs .. |peter| image:: psecor.jpg :height: 35 :alt: peter :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs .. |marlowe| image:: marlowe-x75-bw.jpg :height: 35 :alt: marlowe :target: http://tahoe-lafs.org/trac/tahoe-lafs/wiki/AboutUs -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJP1eQhAAoJEAT4nRyi0elyxXwQAOON5EorAtNmfbR0t58BMRy8 ut9ujieZmQ4pEU+l7t/mGeXVoPdTJQh+gAqUNweyF/+DaAkbGFp4Z1u2lI8BJkKm Izes3evzl7QtX8i3oMMJLjRsPmnTmZ01hHvLWUDvNZgs/eyconT2RMOeQFwBNbaD fBQqxGD7E6F1D2GhUB23sy+rsemxgPJJyA4k2+HqoTuSS68gIG2zKJG0BVeSFfN0 R7/nd1DqD67nkEhzMAEkdW+K54GUgDy+3BdsfLd8Pow1Gkzsm3NVsV15PtHiPz2j mI8WIHwD13xdhc0/B+JF26h2bxdAGcdKycCp/QBQsLyUXWbA8IFMvO9OnXIcHJid wNMi902gpBK57mnMH1E/vr4FbHo5mYVkfnbIB7CnTZmcGM6gDdkKltaPuj8jnH3F TmfH2V2PnhK5Akk0ubkGazcetqHFTr7fDVl6bn9s8obZTL7iqsug6QOadPiqWcGu juFW2TtZBInVbXlMfq16LI8N5do08Oy/U1BqKOTMNQ3gl3OsFzqqNd+BkswNLOfC nwf+g9CROENLKredBL4GEuuyD3nAa6Y/dP7yMN7zWddFFebtfpABdXyOppHfC/NV 6IsSy2ExYkdoRVkyh63cZHTcO1YrRNO4pUoEwS2x850RTBAxoij82n4404lohXaY Nuh8a/gOmcvv5iVuFrS2 =4COP -----END PGP SIGNATURE----- _______________________________________________ tahoe-lafs-weekly-news mailing list tahoe-lafs-weekly-news at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-lafs-weekly-news ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From tony.arcieri at gmail.com Mon Jun 11 09:06:24 2012 From: tony.arcieri at gmail.com (Tony Arcieri) Date: Mon, 11 Jun 2012 09:06:24 -0700 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: If you're interested in the ideas of MojoNation you might check out my project the Cryptosphere: https://github.com/tarcieri/cryptosphere On Sat, Jun 9, 2012 at 9:07 PM, Jack Byer wrote: > Recently on the Bitcoin forums the idea came up to form a digital > currency-based filesharing network and that thread > (https://bitcointalk.org/index.php?topic=86384.0) reminded me of MN, > leading to a discussion of whether or not it would be practical to > bring back the idea of a market-based computing resource allocation. I'm shooting for a barter economy instead of a digital currency. -- Tony Arcieri _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Jun 11 05:50:58 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 11 Jun 2012 14:50:58 +0200 Subject: [tahoe-lafs-weekly-news] TWN 33 Message-ID: <20120611125058.GG17120@leitl.org> ----- Forwarded message from Patrick R McDonald ----- From companys at stanford.edu Mon Jun 11 18:02:02 2012 From: companys at stanford.edu (Yosem Companys) Date: Mon, 11 Jun 2012 18:02:02 -0700 Subject: [liberationtech] TOMORROW - June 12 - Differential Privacy in the Real World: Imperfect Randomness and Floating-Point Arithmetic - Ilya Mironov Message-ID: From: Ankur Taly TITLE: Differential Privacy in the Real World: Imperfect Randomness and Floating-Point Arithmetic SPEAKER: Ilya Mironov ABSTRACT: Differential privacy, introduced by Dwork et al in 2006, has become a de facto standard for definition of privacy for aggregate computations over sensitive data. In this talk we consider two challenges in implementing differential privacy that remarkably result in very similar procedures for evaluating one basic differentially-private mechanism. The first challenge is implementing differential privacy with access only to a single imperfect source of randomness. It has been shown that information-theoretic private-key encryption is impossible unless the source of randomness is extractable (Bosley and Dodis, TCC'07). Somewhat surprisingly, we show that the answer is reversed if the target notion of security is differential privacy. We prove that an accurate and differentially-private approximation to the Laplacian mechanism is feasible even if the only source of randomness accessible to the mechanism is semi-random (Santha-Vazirani). Another problem area confronting implementations of differential privacy in the real world is floating-point arithmetic. We demonstrate that all four publicly available general-purpose systems for differential privacy are vulnerable to the same attack exploiting the gap between mathematical abstractions and their implementations. We also discuss a fix to the problem, which coincides with the mechanism robust to imperfect randomness. The talk is going to be self-contained, with all important concepts and definitions introduced and developed as needed. The first part of the talk is based on the joint work (to appear at CRYPTO'12) by Yevgeniy Dodis, Adriana Lopez-Alt (both - NYU), and Salil Vadhan (Harvard, Stanford, and MSR). TIME and PLACE June 12 2012 (Tuesday) at 1630 hrs Gates 463A _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Jun 11 09:48:05 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 11 Jun 2012 18:48:05 +0200 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: <20120611164805.GP17120@leitl.org> ----- Forwarded message from Tony Arcieri ----- From gisellelorriane at wmle.com Mon Jun 11 19:33:50 2012 From: gisellelorriane at wmle.com (Jaclyn) Date: Mon, 11 Jun 2012 19:33:50 -0700 Subject: Generic Xanax As Low As $1.33 Per Pill!! NO RX NEEDED!! Reliable Online Pharmacy - Fast & Secure Shipping!! VISA & E-CHECK ACCEPTED!! Order Today & Save!! t3p8lm Message-ID: <50t51u12k68-68176951-414b1v63@lpinnkoyqq> Xanax Generic 1mg 60 Pills $169!! NO RX! Buy Xanax (Alprazolam) Generic As Low As $1.33 Per Pill!! NO RX NEEDED!! Reliable Online Pharmacy - Fast & Secure Shipping!! VISA & E-CHECK ACCEPTED!! Order Today & Save!! http://hererefillitems.ru From ftn768 at gmail.com Mon Jun 11 18:04:22 2012 From: ftn768 at gmail.com (Jack Byer) Date: Mon, 11 Jun 2012 20:04:22 -0500 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: (This is a cross-post from: https://bitcointalk.org/index.php?topic=86384) A market mechanism for buying and selling hard drive space would look a lot like the commodity markets. If you express a contract in a standard form they can be traded on an exchange to achieve price discovery. The following is not a complete specification but just an example of how such a system might work. Contract trading could be done on #bitcoin-otc or a similar platform (including the reputation function). Contracts will be priced in bitcoins. Storage is expressed in blocks of 1 MiB and the base time interval is one increment of the Bitcoin block chain. Block servers (nodes that sell space) can list the contracts they are willing to accept in human and machine-readable form as something like this: "BLOCKSTORAGE,O,10,10000,144,0.001,0.0005,0.00025" This means that the node is offering (O) to contract with any node with a reputation of 10 or more. Up to 10000 blocks are available for 144 time units. The total cost of the contract is 0.001 BTC per block. Of this total cost 0.0005 is due up front and 0.00025 is due at the completion of the contract. The remainder is due in periodic intervals (perhaps as often as every time increment). When a node that is looking to sell storage can express the contract it is looking for as a bid (B). It could either work as both the block server and the client can scan the order book to look for a matching contract or the exchange can handle the matching. There would need to be a means to express what should happen to the data at the end of the contract. It can either be deleted (the client no longer needs it) or it can be transferred to another block server or it can be returned to the client. At the end of each contract the client and the block server both leave feedback on each other which will either increase or decrease their respective reputations. Block servers with high reputations will be able to charge more up front because the clients can be more confident they will actually be able to get their data back at the end of the contract. Clients with high reputation won't need to pay as much up front because the block servers can be more confident they will be paid at the end of the contract. In general a higher reputation will lead to better prices for both a client and a block server. The client should have a method of verifying that the block server actually retained the data instead of just tossing it into the bitbucket. One possible way to do this is to periodically transmit a block number and two offsets and ask for the hash of the data between the two offsets. The client could pre-select this verification blocks before transmitting the data and have enough hashes stored ahead of time for the number of verification it expects to need. This is just a rough draft and probably still has holes that need to be filled in but how does it look as a basic outline? _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bronchus at zurich.ibm.com Tue Jun 12 06:26:56 2012 From: bronchus at zurich.ibm.com (=?koi8-r?B?IuvB3sXT1NfFzs7ZxSBXRUIg08HK1Nki?=) Date: Tue, 12 Jun 2012 05:26:56 -0800 Subject: =?koi8-r?B?IPPBytTZIM/UIDQwMDAg0tXCLiDywdPL0tXUy8Egz9QgNTAwMCDS1cIu?= Message-ID: <000d01cd4896$a7e8d280$6400a8c0@bronchus> Создадим сайт для вашей компании. Качественно и не дорого! Телефон специалиста: (495) 774-62-13 From kragen at canonical.org Tue Jun 12 03:39:58 2012 From: kragen at canonical.org (Kragen Javier Sitaker) Date: Tue, 12 Jun 2012 06:39:58 -0400 Subject: short-term predictions: 2014, 2017, 2022 Message-ID: The release of Meteor in April reminded me about an abandoned project of my own called Kogluktualuk, which was basically Meteor, but never implemented to any significant extent. It was kind of obvious that something like Meteor needed to exist. So I thought I would record some other predictions about things that haven't happened yet, to see if my foresight is really as good as it seems in hindsight. After all, it's easy to fool yourself into thinking about only your correct predictions, forgetting the stupid ones. So this is, like debugging, a sort of exercise in therapeutically feeling stupid. --- Two years from now, most iOS applications will be written in Cordova (formerly PhoneGap) or a successor, rather than in ObjC. This is both because JS is a much more productive language than ObjC and in order to target Android as well. Within 5 years, P2P protocols will resurge in importance. This is despite the massive move from desktop and laptop computers to handheld computers running iOS and Android and using cellphone networks. The driver will be better connectivity and crackdowns on user-generated content on centrally-operated network services like YouTube and Megaupload. When automated fabricationbthe scenario where you get your next bicycle by downloading bicycle blueprints over the network and sending them to a machine that then produces a bicycle for you without human interventionbhappens, it will not be by means of 3-D printers, which work by depositing layers of a small number of materials. Instead, it will take the form of automated assembly by robots of parts mostly made by other means, such as laser cutting, torch cutting, CNC machining, and planar printing processes. More and more communication between people will be mediated by computers. Within a few years, most of our lives will be recorded and permanently archived without our knowledge or consent. Android will continue to grow over the next three years at the expense of iOS. Apple will release at most one groundbreaking new product (like the Apple ][, Macintosh, Newton, HyperCard, NeXTStep, iMac, iPad, Lisa, iPhone, iTunes Music Store, and Macbook Air, in the next ten years. Nokia will collapse. Their Windows phones will be a failure. Solar energy will provide nearly as much marketed energy as coal by 2022. Oil production will not exceed its 2008 peak by more than 30% by 2022. Traditional oil production has peaked. Oil prices will exceed their 2008 peak at least once by 2017. US influence will wane; that is, it will be less significant in 2022 than today. China's laissez-faire copyright enforcement will become more widespread by 2017, despite US protests. Argentina will have another financial crisis by 2017, with a collapse of the peso, but not as severe as in 2001. Photovoltaic, rather than solar thermal, will still be the major form of marketed solar energy until 2022. In 2022, the rather stupid opinion that Chinese manufacturers are mere copycats will be much less widespread, held only by the occasional crank rather than, as today, garden-variety ignorant people. By 2022, Brazil will be a bigger startup hub than New York, England, Russia, Australia, or Japan, but not Silicon Valley or China. The murder rate in Argentina will be higher in 2013, 2014, and 2015 than in 2012. A generic GPU programming language will arise to replace CUDA and enable competition with NVIDIA by 2020. Photographic and audio recording evidence will be easy to fake so that human eyes can't tell the difference by 2017. Quantum computers will turn out to work, but building ones big enough to revolutionize anything will take longer than five more years. Most performance-critical code will scale up to at least 16 cores by 2017, despite doing it with explicit concurrency, such as threads and locks or message passing like Erlang and Golang, rather than implicit forms like transactional memory or APL-like array operations. Cash payment will still be common throughout the poor countries in 2022. As computerized communication, planning, and manufacturing take over the economy, companies will continue to shrink while depending on ever more custom software. The consequence is that programming will partly displace management as a core competency of running a business. China will largely shift to nuclear power generation for electricity by 2022. By 2017, desktop computers will be something like CRTs a couple of years back: used in special circumstances (gamers, say) and where money is tight, but not many places. Instead people will use laptops, phones, cloud applications, microservers, and rackmount servers. As I explained in "people, places, things. and ideas" in 1999, I see this development as profoundly prejudicial to software freedom, but it is, if anything, accelerating. Computer security will keep getting worse at least until 2017, with exponentially more software deployed on networks, almost all without the requisite knowledge to secure or audit it. This will drive OS-level sandboxing like PNaCl, but that will be only moderately effective, in large part because free operating systems will not be used much (although Linux is) so users will not be allowed to make their own computers secure, and absent that, software vendors don't have the right incentives. Self-driving cars will be a substantial minority of cars in rich countries by 2017. Assassinations will rise dramatically by 2017 as their cost falls dramatically, due to the lack of computer security, to the pervasive gathering and warehousing of previously private information, and to lower-cost killer robots. Spam and viruses will remain major problems at least until 2017. No language will replace C as the language of nearly all serious software by 2022. C lost that position around 1992, to a combination of C and C++, and since then there's been a diversity of languages in use. That will remain true. Not Scala, not JS, not Python or Ruby, will shut out the other languages like CRTs did. Mining mineral resources such as copper from existing landfills will employ tens of thousands of people by 2022, mostly illegally and in very hazardous conditions. Population growth will continue to slow until 2022. The US GDP in 2022 will not be more than 22% bigger than in 2011, measured in oil, kilowatt hours, or wheat, or probably measured in gold, at their average prices over the year. US GDP in 2011 is estimated at US$15.1 billion. Humans will not go beyond low Earth orbit, for example to geosynchronous orbit, to the moon, or to other planets, by 2022. -- To unsubscribe: http://lists.canonical.org/mailman/listinfo/kragen-tol ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From scalega313 at czechairlines.com Tue Jun 12 10:01:49 2012 From: scalega313 at czechairlines.com (=?koi8-r?B?IvrFzczRINUg79rF0sEi?=) Date: Tue, 12 Jun 2012 09:01:49 -0800 Subject: =?koi8-r?B?8NLPxMHF1NPRINXewdPUz8sg0M/EIOTB3tU=?= Message-ID: <000d01cd48b4$ac9d8550$6400a8c0@scalega313> Прилесный участок в деревне. Рядом озеро. Рядом с Москвой. Недорого. Тел. (915) 122 73 26 From info at zerostate.net Tue Jun 12 02:04:11 2012 From: info at zerostate.net (ZeroState.net) Date: Tue, 12 Jun 2012 10:04:11 +0100 Subject: [ZS] Bitcoin payment for ZS membership now set up Message-ID: 25 Bitcoin payment for ZS membership now set up http://zerostate.net/membership.html The Zero State (ZS) network of Affiliate Organizations operates a system of shared membership, meaning that all members of any one organization within the network may exercise membership rights within any other. The Affiliate Organizations (i.e. The Consensus, Praxis, TETRAD, and Zero State Media) shouldn't be confused with the much larger and much less formal group of Networked Organizations. The network has three levels of membership common to all of its affiliate organizations: The most basic category of membership is free, but accords no voting rights of any sort, in any of the organizations, other than ad hoc direct-democratic working groups within ZS itself. The second category is paid membership costs 15.00 GBP per year, and gives full voting rights in all ZS Affiliate Organizations. The third category (sometimes called the 'respected member') is characterised by voluntary donations to ZS Affiliate Organizations above and beyond membership dues, or the performance of some exceptional service to the network, and may come with special rights or advantages at the discretion of specific Affiliate Organizations. If you would like to enquire about becoming an official member of the Zero State network at any of these three levels, then please send an email with your name to membership at zerostate.net. PAYMENTS FOR CATEGORY 2 & 3 MEMBERSHIP: We currently support two types of payment for both membership fees and donations; Bitcoin (BTC) and PayPal. To work out how much #15 currently costs in Bitcoins, you can find a BTC currency calculator here: http://coinmill.com/BTC_calculator.html#GBP=15 To pay in Bitcoins, send them to the following address: 1N7qYwQfdZHrGWdiLroCPHSs8VZubzbDi3 To pay via PayPal, you will need the following details: Email: info at zerostate.net Company name: TETRAD (ZS Affiliate Orgs) Individual name: Amon Kalkin IMPORTANT NOTE: However you choose to pay, it is very important that you send a note - preferably with your payment, or via membership at zerostate.net as a second option - to let us know your name, email address, the amount you have paid, and what the payment is for. When payment is confirmed, you will receive an email as appropriate. -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From ftn768 at gmail.com Tue Jun 12 08:45:07 2012 From: ftn768 at gmail.com (Jack Byer) Date: Tue, 12 Jun 2012 10:45:07 -0500 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: On Tue, Jun 12, 2012 at 3:08 AM, James A. Donald wrote: > Price discovery, when done by human agents, is expensive. The stock > exchange and its traders have a lot of overheads. > > One explanation for the failure of Mojo Nation was that people would not > take the time to do price discovery for micro transactions. I agree. That is why price discovery should be automated by software agents. _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From oratingen39 at bonprole.com Tue Jun 12 07:09:58 2012 From: oratingen39 at bonprole.com (=?koi8-r?B?IuTPzS3Q0sXE09TB18nUxczY09TXzywg78bJ0yDXIO3P08vXxSI=?=) Date: Tue, 12 Jun 2012 11:09:58 -0300 Subject: =?koi8-r?B?8NLPxMHF1NPRIMTPzSDXIO3P08vXxQ==?= Message-ID: <000d01cd48a5$0cf4b5a0$6400a8c0@oratingen39> Особняк в Москве на Соколе. Поселок художников. Телефон для получения информации (495) 6-432-999 From Amazon.com at jfet.org Tue Jun 12 08:00:35 2012 From: Amazon.com at jfet.org (digital-no-reply@amazon.com) Date: Tue, 12 Jun 2012 12:00:35 -0300 Subject: Your Amazon.com Kindle e-book order. Message-ID: <4FD75985.906050@amazon.com> Your Order with Amazon.com Thanks for your order, cypherpunks at jfet.org! Did you know you can view and edit your orders online, 24 hours a day? Visit Your Account. Order Information: E-mail Address: cypherpunks at jfet.org Billing Address: Av. FL 67151 United States Phone: 1-495-357-2587 Order Grand Total: $ 61.99 Earn 3% rewards on your Amazon.com orders with the Amazon Visa Card. Learn More Order Summary: Details: Order #: F31-3735687-9682342 Subtotal of items: $ 61.99 ------ Total before tax: $ 61.99 Tax Collected: $0.00 ------ Grand Total: $ 60.00 Gift Certificates: $ 1.99 ------ Total for this Order: $ 61.99 The following item is auto-delivered to your Kindle or other device. You can view more information about this order by clicking on the title on the Manage Your Kindle page at Amazon.com. The Hunger Games by Suzanne Collins [Kindle Edition] $ 61.99 Sold By: Random House Digital, Inc. You can review your orders in Your Account. If you've explored the links on that page but still have a question, please visit our online Help Department. Please note: This e-mail was sent from a notification-only address that cannot accept incoming e-mail. Please do not reply to this message. Thanks again for shopping with us. Amazon.com Earth's Biggest Selection Prefer not to receive HTML mail? Click here -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 17982 bytes Desc: not available URL: From circumstanceswo at rainbowsflowers.com Mon Jun 11 20:13:18 2012 From: circumstanceswo at rainbowsflowers.com (=?koi8-r?B?89DFw8nBzMnT1MHNINDPINrB0tDMwdTF?=) Date: Tue, 12 Jun 2012 12:13:18 +0900 Subject: =?koi8-r?B?wsXMwdEg2sHS0MzB1MEg0NXUxc0g1c3Fztjbxc7J0SDT1NLByM/X2cgg?= =?koi8-r?B?19rOz9PP1w==?= Message-ID: <000d01cd4849$50902990$6400a8c0@circumstanceswo> 21 июня 2012г. Как уменьшить расходы на выплату белой зарплаты +7 (495) 7922122 или 8 (Ч95) 792.2I_22 Цель: Ставка обязательных страховых взносов (СВ) с 2012 года составляет 30% почти для всех плательщиков. При формальном снижении нагрузки на зарплату для многих сотрудников фактически выплаты возрастут: если раньше с больших зарплат СВ не уплачивались, то теперь их ставка составит 10% с суммы дохода свыше 512 тыс. рублей в год. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь √ возврат к "черным" схемам. Курс посвящен поиску путей выживания компаний в новой ситуации при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом будущих изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Программа: 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. Обзор изменений законодательства по страховым взносам на 2012-13 гг., как они повлияли на налоговые схемы. 2. Использование специальных налоговых режимов: * В каком случае выплата зарплаты на спецрежимах сохраняет актуальность. * Дивидендные схемы √ замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности. * Договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Способы минимизации рисков имущественной ответственности предпринимателя. Расчет эффективности. * Дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с новым порядком ведения кассовых операций. 3. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и качественное документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 4. Использование вспомогательных организаций: * "Инвалидные" организации и их филиалы, актуальность. * Страховые компании. Долгосрочное накопительное страхование жизни работников и ДМС за счет предприятия. 5. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, компенсаций, гонораров и иных легальных доходов от нерезидентов. 6. Как компенсировать снижение социальных гарантий (включая пенсионные накопления) работников при применении налоговых схем, не предусматривающих выплату зарплаты? 7. Использование процентных займов от физлиц. Расчет эффективности. Потребительский кредитный кооператив граждан √ способ получения безналогового дохода в виде процентов. 8. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 9. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды. 10. Создание недоимки по налогам с ФОТ на фирме, не обремененной активами √ пример "серой" схемы (как нельзя "оптимизировать"!). 11. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 12. Ответы на вопросы. По желанию √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц мероприятия. Стоимость участия: 9 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 Московский код: 79221\22 \\// 8 (499) 445ЧО95 From eugen at leitl.org Tue Jun 12 03:33:05 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 12 Jun 2012 12:33:05 +0200 Subject: [liberationtech] TOMORROW - June 12 - Differential Privacy in the Real World: Imperfect Randomness and Floating-Point Arithmetic - Ilya Mironov Message-ID: <20120612103305.GZ17120@leitl.org> ----- Forwarded message from Yosem Companys ----- From eugen at leitl.org Tue Jun 12 03:33:32 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 12 Jun 2012 12:33:32 +0200 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: <20120612103332.GA17120@leitl.org> ----- Forwarded message from Jack Byer ----- From eugen at leitl.org Tue Jun 12 04:05:38 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 12 Jun 2012 13:05:38 +0200 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: <20120612110538.GJ17120@leitl.org> ----- Forwarded message from "James A. Donald" ----- From eugen at leitl.org Tue Jun 12 04:06:09 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 12 Jun 2012 13:06:09 +0200 Subject: [ZS] Bitcoin payment for ZS membership now set up Message-ID: <20120612110609.GK17120@leitl.org> ----- Forwarded message from "ZeroState.net" ----- From eugen at leitl.org Tue Jun 12 04:09:13 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 12 Jun 2012 13:09:13 +0200 Subject: short-term predictions: 2014, 2017, 2022 Message-ID: <20120612110913.GM17120@leitl.org> ----- Forwarded message from Kragen Javier Sitaker ----- From eugen at leitl.org Tue Jun 12 08:46:10 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 12 Jun 2012 17:46:10 +0200 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: <20120612154610.GU17120@leitl.org> ----- Forwarded message from Jack Byer ----- From biju.chacko at gmail.com Tue Jun 12 05:34:12 2012 From: biju.chacko at gmail.com (Biju Chacko) Date: Tue, 12 Jun 2012 18:04:12 +0530 Subject: [silk] Flame is Lame Message-ID: http://www.f-secure.com/weblog/archives/00002383.html When the Flame malware was found two weeks ago, it was characterized as 'Highly advanced', 'Supermalware' and 'The biggest malware in history'. These comments were immediately met with ridicule from experts who were quick to point out that there was nothing particularly new or interesting in Flame. In fact, the only unique thing in Flame seemed to be its large size. Even that was not too exciting as analysts went digging for examples of even larger malware and indeed found them (some malware tries to look like video files so they carry full-length movies inside their bodies). Suggestions that Flame was created by a government and, like Stuxnet and Duqu, would be the product of a nation-state were met with ridicule as well. But let's have a look at what we've learned about Flame over these two weeks. 1. Flame has a keylogger and a screengrabber They naysayers are unimpressed. "We've seen that before. Flame is lame." 2. Flame has built-in SSH, SSL and LUA libraries "Bloated. Slow. Flame is still lame." 3. Flame searches for all Office documents, PDF files, Autodesk files and text files on the local drives and on network drives. As there would easily be too much information to steal, it uses IFilters to extract text excerpts from the documents. These are stored in a local SQLLite database and sent to the malware operators. This way they can instruct the malware to hone in on the really interesting material. "Flame is lame" 4. Flame can turn on the microphone of the infected computer to record discussions spoken near the machine. These discussions are saved as audio files and sent back to the malware operators. "Flame is lame, lol" 5. Flame searches the infected computer and the network for image files taken with digital cameras. It extracts the GPS location from these images and sends it back to the malware operators. "Still, Flame is lame" 6. Flame checks if there are any mobile phones paired via Bluetooth to the infected computer. If so, it connects to the phone (iPhone, Android, Nokia etc), collects the Address Book from the phone and sends it to the malware operators. "Flame is still lame, kind of." 7. The stolen info is sent out by infecting USB sticks that are used in an infected machine and copying an encrypted SQLLite database to the sticks, to be sent when they are used outside of the closed environment. This way data can be exfiltrated even from a high-security environment with no network connectivity. "Agent.BTZ did something like this already in 2008. Flame is lame." 8. When Flame was now finally caught, the attackers have been busy destroying all evidence and actively removing the infections from the affected machines. "Doesn't prove anything. Lame." 9. Latest research proves that Flame is indeed linked to Stuxnet. And just one week after Flame was discovered, US Government admitted that they had developed Stuxnet together with the Israeli Armed Forces. "You're just trying to hype it up. Still lame." 10. Flame creates a local proxy which it uses to intercept traffic to Microsoft Update. This is used to spread Flame to other machines in a local area network. "Lame. Even if other computers would receive such a bogus update, they wouldn't accept it as it wouldn't be signed by Microsoft". The fake update was signed with a certificate linking up to Microsoft root, as the attackers found a way to repurpose Microsoft Terminal Server license certificates. Even this wasn't enough to spoof newer Windows versions, so they did some cutting-edge cryptographic research and came up with a completely new way to create hash collisions, enabling them to spoof the certificate. They still needed a supercomputer though. And they've been doing this silently since 2010. "b&" And suddenly, just like that, the discussion on whether Flame is lame or not b&vanished. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jamesd at echeque.com Tue Jun 12 01:08:19 2012 From: jamesd at echeque.com (James A. Donald) Date: Tue, 12 Jun 2012 18:08:19 +1000 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: On 2012-06-12 11:04 AM, Jack Byer wrote: > (This is a cross-post from: https://bitcointalk.org/index.php?topic=86384) > > > > A market mechanism for buying and selling hard drive space would look > a lot like the commodity markets. If you express a contract in a > standard form they can be traded on an exchange to achieve price > discovery. The following is not a complete specification but just an > example of how such a system might work. Price discovery, when done by human agents, is expensive. The stock exchange and its traders have a lot of overheads. One explanation for the failure of Mojo Nation was that people would not take the time to do price discovery for micro transactions. Not that I know why Mojo Nation failed. I have not seen a post mortem from anyone knowledgeable. _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Jun 12 09:18:09 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 12 Jun 2012 18:18:09 +0200 Subject: [silk] Flame is Lame Message-ID: <20120612161809.GV17120@leitl.org> ----- Forwarded message from Biju Chacko ----- From Amazon.com at jfet.org Tue Jun 12 07:56:35 2012 From: Amazon.com at jfet.org (digital-no-reply@amazon.com) Date: Tue, 12 Jun 2012 22:56:35 +0800 Subject: Your Amazon.com order receipt. Message-ID: <4FD75841.804070@amazon.com> Your Order with Amazon.com Thanks for your order, cypherpunks at jfet.org! Did you know you can view and edit your orders online, 24 hours a day? Visit Your Account. Order Information: E-mail Address: cypherpunks at jfet.org Billing Address: 503-8878 Vel Avenue Fort Wayne United States Phone: 1-495-357-2587 Order Grand Total: $ 56.99 Earn 3% rewards on your Amazon.com orders with the Amazon Visa Card. Learn More Order Summary: Details: Order #: M13-2831044-2159747 Subtotal of items: $ 56.99 ------ Total before tax: $ 56.99 Tax Collected: $0.00 ------ Grand Total: $ 50.00 Gift Certificates: $ 6.99 ------ Total for this Order: $ 56.99 The following item is auto-delivered to your Kindle or other device. You can view more information about this order by clicking on the title on the Manage Your Kindle page at Amazon.com. The Hunger Games by Suzanne Collins [Kindle Edition] $ 56.99 Sold By: Random House Digital, Inc. You can review your orders in Your Account. If you've explored the links on that page but still have a question, please visit our online Help Department. Please note: This e-mail was sent from a notification-only address that cannot accept incoming e-mail. Please do not reply to this message. Thanks again for shopping with us. Amazon.com Earth's Biggest Selection Prefer not to receive HTML mail? Click here -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 18126 bytes Desc: not available URL: From warner at lothar.com Tue Jun 12 23:34:45 2012 From: warner at lothar.com (Brian Warner) Date: Tue, 12 Jun 2012 23:34:45 -0700 Subject: [tahoe-dev] verification of subset of file == proof of retrievability Message-ID: On 6/12/12 10:57 PM, Zooko Wilcox-O'Hearn wrote: > Folks: > > Over on the Bitcoin discussion forums (warning: wretched hive of scum > and villainy), someone was asserting that they wanted a "proof of > retrievability" protocol and saying that, while they hadn't looked, > they were pretty sure Tahoe-LAFS didn't do it right: > > https://bitcointalk.org/index.php?topic=2236.msg847771#msg847771 > > I was mildly annoyed by this, because actually we have some extremely > strong features along those lines. Well, we've never implemented a POR because we've never really wanted one. "Proof-of-retrievability" is achieved by just retrieving the data. What the cryptography literature calls proof-of-retention (or -retrievability, -data-posession, or -ownership) gives you is a way to *cheaply* (i.e. using less storage and bandwidth than the whole file) assert that some remote server still has the data they claimed to have, and haven't found some clever (i.e. cheaper) way to just pass the test without really holding the whole file. There's a number of protocols already out there. In general the verifier can assert that either the server is holding the full original file, or a collection of calculated verification data that is at least as large as the original file (so if they want to pass the test, they might as well be honest). http://www.rsa.com/rsalabs/node.asp?id=3357 is one example. The simplest way to do this, however, is for the verifier to hold the whole file too. When we've discussed this in the Tahoe "one grid to rule them all" context, we've talked about "share buddies": two non-collaborating servers, each purportedly holding a copy of the same share. They check up on each other by asking for keyed hashes of random sections of the share (or the whole thing, if they're willing to spend the disk IO on it). The idea was part of a larger server-driven-repair thing we were thinking of: servers check up on the files they're helping to store, and if they notice problems, they can trigger repair all by themselves. Distributed reputation measurements are involved too: servers can boost their reputation by delivering POR proofs on a timely basis, and share-buddies can vouch for each other. Anyways, it's sort of a neat idea, but we probably need some more extensive accounting / server-reputation frameworks in place before it'll be super useful in the Tahoe context. cheers, -Brian _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From shl705 at ratell.com Tue Jun 12 11:12:28 2012 From: shl705 at ratell.com (=?koi8-r?B?IvPM1dbCwSDC2dTBIg==?=) Date: Tue, 12 Jun 2012 23:42:28 +0530 Subject: =?koi8-r?B?8sXNz87ULCDEydrBys4gySDP1MTFzMvBIMvXwdLUydIgySDQz83F3cXO?= =?koi8-r?B?ycog?= Message-ID: <000d01cd48c6$ed572c10$6400a8c0@shl705> Ремонт от дизайна интерьера до полной реализации. Качественно. Доступные цены. Соблюдение сроков. Задайте любой интересующий Вас вопрос по телефону в Москве: (495) 589-62-99 From urbanityuhy91 at commworldpacific.com Tue Jun 12 13:44:28 2012 From: urbanityuhy91 at commworldpacific.com (=?koi8-r?B?IuTPzSDXINDSxdPUydbOz80gzcXT1MUi?=) Date: Tue, 12 Jun 2012 23:44:28 +0300 Subject: =?koi8-r?B?8NLPxMHF1NPRINLP08vP287ZyiDawcfP0s/EztnKIMTPzQ==?= Message-ID: <000d01cd48dc$29168880$6400a8c0@urbanityuhy91> Продается дом по Новорижскому ш. 14 км - участок 10 соток ИЖС, 295 м кв. Все коммуникации в доме! д. Александровка. Предложение ограничено. Телефон - 8 (916) 088-08-92 Дарья. From beatthechip at gmail.com Tue Jun 12 21:13:50 2012 From: beatthechip at gmail.com (BeatTheChip) Date: Wed, 13 Jun 2012 00:13:50 -0400 Subject: [drone-list] A few odds and ends Message-ID: Hi, There's Telecomix dropped off some information on drone carrier designs and the DRT surveillacne description, the most detailed I have yet seen. https://twitter.com/TelecomixBSRE/status/212755861607677952 This... U.S. Drone Crashes in Maryland Swamp http://bit.ly/KSdJoc @democracynow and finally... Sen. Paul Introduces Bill to Protect Americans Against Unwarranted b*#*Drone* b, b*#*Surveillance*b, Rand Paul http://bit.ly/KQ1rN0 -- BeatTheChip.org 511Campaign.org ____________________ Twitter: BeatTheChip **I am a United States citizen. My phone and electronic communications may be monitored by the NSA, the FBI, DHS and private contractors who will be held unaccountable for crimes against privacy according to illegal and unenforceable laws, FISA & The Patriot Act. Due to the invasive and unconstitutional nature of these laws, I do not recognize the authority of the surveillants and will prosecute on stalking, habitual harassment if there is no legal grounds for reasonable suspicion of wrongdoing in my private conversations. Get a warrant.* _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From saintger at gmail.com Tue Jun 12 15:44:28 2012 From: saintger at gmail.com (Saint Germain) Date: Wed, 13 Jun 2012 00:44:28 +0200 Subject: [tahoe-dev] Proposed short description of tahoe-LAFS for personal backup Message-ID: Hello, As explained before, I am writing an article on open source software which include deduplication. Here is how I proposed to describe tahoe-LAFS. tahoe-LAFS is not really a backup software but rather a storage solution. The primary objective is to secure your data, either for privacy or for safety (against damage). To do so, it stores your encrypted data (encrypted at the source) on several machines organized in a network with a configurable policy (specifying K=2 and N=5 for instance, will spread your data on 5 machines, 2 of which need at least to be available to access your data). A few remarkable points: - I like its "paranoid" approach. The idea is to trust no one (and especially not your online storage provider) - Don't need any redundant PAR2 checksum, given that the data are duplicated and spread on the network (I however recommend to make another backup on another media from times to times) - Community et mailing-list are very active and very helpful (post a message to see how welcoming they are !) - Documentation is excellent - You can join an already existing network (like VolunteerGrid2) by adding your machine. That way all members of the network will have access to a part of your (encrypted !) data et vice versa. It is quite a psychological jump to accept (you have to trust encryption). - You can also rent storage nodes to Least Authority Enterprises - No delta encoding but has deduplication at the source, however only on a file level. - Works on Linux, Mac OS X and Windows. I have however a few doubts on the Windows compatibility for managing locked files. But you can use Duplicati which uses Windows VSS and can use tahoe-LAFS as backend. - In case of backup interruption, resume is possible but you have to upload the whole file again. - Encryption is with AES-128 (soon to be combined with XSalsa20) I would be very interested to have any comment. But please be aware that I have to keep it quite short and simple. Sorry for the bad translation from french ! Thanks, _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From zooko at zooko.com Tue Jun 12 22:57:59 2012 From: zooko at zooko.com (Zooko Wilcox-O'Hearn) Date: Wed, 13 Jun 2012 02:57:59 -0300 Subject: [tahoe-dev] verification of subset of file == proof of retrievability Message-ID: Folks: Over on the Bitcoin discussion forums (warning: wretched hive of scum and villainy), someone was asserting that they wanted a "proof of retrievability" protocol and saying that, while they hadn't looked, they were pretty sure Tahoe-LAFS didn't do it right: https://bitcointalk.org/index.php?topic=2236.msg847771#msg847771 I was mildly annoyed by this, because actually we have some extremely strong features along those lines. However, when I wrote a reply explaining exactly what we do have, I was forced to admit that it isn't fully there yet. We already have verification of complete files (although see #568), but we don't have verification of a randomly-chosen subset of a file, which would be a "Proof of Retrievability". See below for the message I posted to the Bitcoin forum. See also an old rant of mine complaining that academic cryptographers have failed to study the papers and documentation of Tahoe-LAFS closely enough to realize that there is most of a proof-of-retrievability in there: https://lafsgateway.zooko.com/uri/URI:DIR2-RO:d73ap7mtjvv7y6qsmmwqwai4ii:tq5tqejzulg7yj4h7nxuurpiuuz5jsgvczmdamcalpk2rc6gmbsq/klog.html#[[HAIL%3A%20A%20High-Availability%20and%20Integrity%20Layer%20for%20Cloud%20Storage]] https://tahoe-lafs.org/trac/tahoe-lafs/ticket/568# make immutable check/verify/repair and mutable check/verify work given only a verify cap ------- message I posted to the Bitcoin forum > Correct, to verify every bit of every share you need to download every bit of every share. It's expensive - hopefully future versions of Tahoe-LAFS will implement a probabilistic "proof of retrievability" protocol like the one you suggest. Downloading only a subset of a file is already implemented, but there isn't a command implemented that says "pick a random segment of this file, download it from that server, and let me know if it passed integrity checks". You can approximate it with the current Tahoe-LAFS client, like this (the following lines that begin with "$" is me typing in stuff as though I were using a bash prompt): 1. Pick a random spot in the file. Let's say the file size is 10 MB: $ FILESIZE=29153345 $ python -c "import random;print random.randrange(0, $FILESIZE)" 2451799 2. Fetch the segment that contains that point. Segments are (unless you've tweaked the configuration in a way that nobody does) 128 KiB in size, so this will download the 128 KiB of the file that contain byte number 2451799 and check the integrity of all 128 KiB: $ curl --range 2451799-2451799 http://localhost/uri/URI:CHK:jwq3f6lkcioyxeuxlt3exlulqe:sccvpp27agfz32lqjghq2djaxetcuo7luko5dhrpdgs7bfidbasa:1:1:29153345 | hexdump -C % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 1 0 1 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 00000000 a9 |.| 00000001 As you can see it took only a second to download and emitted only one byte to stdout, but it downloaded and verified the integrity of the 128 KiB segment that contained that byte. If you are using multiple servers, using Tahoe-LAFS's awesome erasure coding feature to spread out the data among multiple servers, then this will download the data from the 3 fastest servers (unless you've changed the default setting from "3" to some other number). There is no good way to force it to download the data from specific servers in order to test them -- it always picks the fastest servers. You can see which server(s) it used by looking at the "Recent Uploads and Downloads" page on the web user interface, which will also tell you a bunch of performance statistics about this download. In short, this feature is *almost* there. We just need someone to write some code to do this automatically in the client (which is written in Python) instead of as a series of bash commands. Also this code should download one (randomly chosen) block from every server it can find instead of from just the three fastest servers, and it should print out a useful summary of what it tried and which servers had good shares. Oh, there is a different function which does print out a useful summary of results -- the "verify" feature. But, that downloads and tests every block instead of just one randomly chosen block. Another way to implement this is to add an option to that to indicate how many blocks it should try: $ time tahoe check --verify URI:CHK:jwq3f6lkcioyxeuxlt3exlulqe:sccvpp27agfz32lqjghq2djaxetcuo7luko5dhrpdgs7bfidbasa:1:1:29153345 Summary: Healthy storage index: 7qhuoagk4z4ugsjkjgjcre6sx4 good-shares: 1 (encoding is 1-of-1) wrong-shares: 0 real 1m2.705s user 0m0.570s sys 0m0.060s _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From sappyc at btv.vnet.ibm.com Wed Jun 13 06:20:06 2012 From: sappyc at btv.vnet.ibm.com (=?koi8-r?B?IvLFzc/O1CI=?=) Date: Wed, 13 Jun 2012 05:20:06 -0800 Subject: =?koi8-r?B?8sXNz87UIMvXwdLUydIgySDPxsnTz9cg7NXe28nFIMPFztk=?= Message-ID: <5DA79F544F274031956FB3BD5E15C0F3@brilliance9b6d> Ремонт квартир и офисов "под ключ". Внимание, АКЦИЯ!!! Только до 11 июня при заказе комплексного ремонта вы получаете КОНДИЦИОНЕР General Fujitsu CLASSIC ASH7U в ПОДАРОК! www.ремонт-тут.рф From liningk3 at jarretteng.com Wed Jun 13 07:17:34 2012 From: liningk3 at jarretteng.com (=?koi8-r?B?IvPPwtPU18XOzsnLINDP08XMy8EgzsEg68nF19PLz80g2y4i?=) Date: Wed, 13 Jun 2012 06:17:34 -0800 Subject: =?koi8-r?B?88vJxMvBIM7BIMvSwdPJ19nKINXewdPUz8sg1yDexdPU2CDkztEg7sXa?= =?koi8-r?B?wdfJ08nNz9PUySE=?= Message-ID: <000d01cd4966$e5831f80$6400a8c0@liningk3> Продается прилесной участок 89 км от мкад по Киевскому ш. Панорамный вид, лес, сосновый бор,Возможность строительства собственного водоема Позвоните 8 ( 903 ) 1+9+3 +0 +6 +2+3 From nathan at guardianproject.info Wed Jun 13 04:09:30 2012 From: nathan at guardianproject.info (Nathan of Guardian) Date: Wed, 13 Jun 2012 07:09:30 -0400 Subject: [liberationtech] AES-encyrpted telephony in Iran? Message-ID: On 06/13/2012 01:24 AM, Naiz Mudin wrote: > We must be prepared, in my country, to communicate with one another > without fear of the govermnment having automatic access to our data, as > is the case currently, whenever we (for example) use Skype VOIP outside > of the country. One question Naiz - are you using Skype on mobile phones today to communicate, or only from desktops? Is this from 3G or wifi? I ask because I think that it is important to that while PrivateGSM software is technically very sound, there are some additional risks and perhaps limitations when it comes to running VoIP, and even more so secure VoIP, on a 3G network such as is available in Iran. Skype is tolerated in many places in the world where encryption and VoIP are considered illegal. Skype is allowed both because it is very difficult to block (it uses many different IPs/hosts to connect in a peer to peer like manner), but also because it is understood that most people are using it to talk with family and conduct business. If you use a VoIP system like PrivateGSM, or any SIP/RTP VoIP software, it will look very different on the network than Skype. It will most likely connect to one server, with a single IP address, for the SIP portion (registration, call setup), and then it will stream the RTP media stream through that same server. With secure VoIP that SIP stream will be secured using SSL or TLS, the RTP media stream using something like ZRTP or SRTP (basically the "AES encrypted" part you referenced). If two people are calling each other using this service, it will be very clear who is talking to whom and when. In some cases even, the RTP media stream will stream directly between the two people/devices communicating, clearly tying the two IP addresses together. If those IPs are connected to a registered SIM card, then you see how this can be problematic. With Skype, this is hidden in the cloud a bit more because there are millions of people, though obviously Skype has many, many security issues, and can suffer from this same direct IP-to-IP problem. Still, Skype is tolerated, while Secure VoIP may not be. Finally, there is another, more practical problem, which is speed or "latency". Skype is really good at low bandwidth connections, while Secure VoIP, mostly designed for enterprise/business use in the west, is not. PrivateGSM is very good as Jacob mentioned, so it may be able to adjust its call quality to the bandwidth/latency of your network, but your expectations should be set a bit lower, and amount of patience of your users higher... meaning, don't expect Skype simplicity and quality right away. Best, Nathan _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Jun 13 02:09:24 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 13 Jun 2012 11:09:24 +0200 Subject: [tahoe-dev] verification of subset of file == proof of retrievability Message-ID: <20120613090924.GK17120@leitl.org> ----- Forwarded message from Brian Warner ----- From eugen at leitl.org Wed Jun 13 02:10:39 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 13 Jun 2012 11:10:39 +0200 Subject: [tahoe-dev] verification of subset of file == proof of retrievability Message-ID: <20120613091039.GL17120@leitl.org> ----- Forwarded message from Zooko Wilcox-O'Hearn ----- From eugen at leitl.org Wed Jun 13 02:31:01 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 13 Jun 2012 11:31:01 +0200 Subject: [tahoe-dev] Proposed short description of tahoe-LAFS for personal backup Message-ID: <20120613093101.GS17120@leitl.org> ----- Forwarded message from Saint Germain ----- From eugen at leitl.org Wed Jun 13 02:45:53 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 13 Jun 2012 11:45:53 +0200 Subject: [drone-list] A few odds and ends Message-ID: <20120613094553.GV17120@leitl.org> ----- Forwarded message from BeatTheChip ----- From warner at lothar.com Wed Jun 13 13:00:02 2012 From: warner at lothar.com (Brian Warner) Date: Wed, 13 Jun 2012 13:00:02 -0700 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: On 6/9/12 9:07 PM, Jack Byer wrote: > Is it practical to go back to the original goal of MN instead of a > limited subset if the reasons for the project's failure are addressed? Great question! So, I wasn't at Mojo Nation (I was fascinated by the concept in 97 or 99 or whenever it made a splash, but never worked there, and only joined its descendant AllMyData in 2005, many years after MN ran aground). But my understanding was that many of the following contributed to its failure: * overly ambitious scope, would have required an impossibly good engineering and management team to implement everything * too much science needed inventing to make it work * real markets require diverse motivated players. MN users didn't bother tweaking agent behaviors, so you didn't get diversity. Users were accidentally encouraged to hoard Mojo (the client displayed your balance like a game score, users sought to maximize that number more than actually using it), so motivations were broken. * nodes were transient, so reliability was unpredictable For Tahoe, we reduced the scope, threw out the economic games, and narrowed the use-case to commercial grids and friendnets (where uptime is more predictable). Bittorrent did the same, reducing the scope to short-term transfers instead of long-term storage. Both have achieved their own smaller goals. > Now, ten years later, automated trading algorithms are common so > perhaps it would be possible for a network to use dynamic pricing to > allocate hard drive space, bandwidth, and CPU power. > Are there any fundamental reason why a system like Mojo Nation > couldn't work now that certain capabilities are available that weren't > a decade ago? I think Mojo Nation is still a promising idea, and I think it's got a better chance of working today than 15 years ago. Many of the challenges are still there, but yeah, some of them are easier to address: * overambition is still a big problem. Personally I'm trying to build Tahoe up to the point where we can re-introduce MN ideas, but it'll be a long road. Strive to break it into smaller pieces, make sure you can tolerate missing parts (if you fail to make progress on component A, are components B and C still usable?), develop some plausible use-cases first, start with the simplest thing that could possibly work, let the UI and user feedback drive the design * Bitcoin makes automated payment easier, for the tiny fraction of the world that is willing to use it, but it's probably the right way to go, and removes a big centralized engineering hassle (the MN bank). We need some better/safer wallet-control protocols (you want your storage node to have control over some small stash of BTC, and most of the bitcoin clients I've seen are aimed at human-scale transactions), like Purses in the Waterken/E/SES examples, but that's just engineering. I think MN's extend-pairwise-credit amortization is still important, since even with BTC's reduced friction (transaction fees) you don't want to be shuffling pennies every few minutes. * measuring/predicting reliability of storage nodes is still an unsolved (and possibly unsolveable) problem. You need servers to stick around for a long period of time, otherwise repair costs will swamp your bandwidth and leave you no room for real traffic. Needing long-term servers interacts badly with adoption (you want to encourage experimentation, folks who want to install it just to play around with it should be able to do that quickly, but you can't afford to use them as servers, since many of them will get bored and delete it or let it break the next day, so they don't really get the full experience, so they may not really be motivated to stick around). As a client you need to distinguish between good servers and transient ones, so you really want everyone to monitor and publish uptime data on each other, but they could be lying, which gets you back into the reputation graph thing. There's been a lot of work on reputation graphs (starting with Raph Levien's Advogato, and motivated by EBay and Amazon), but I don't know how much of it is buried in proprietary/closed codebases (since it's easier to game a system when you have the source) vs being available as an off-the-shelf library. * disk capacity and broadband speeds are faster. Unfortunately people are creating more data than ever, and disk speeds (seek times) are pretty flat. One metric is how long it takes to read out the full contents of a disk, or how long it takes to copy a disk over your internet connection: both numbers are kind of sobering (usually measured in days or months). Home internet connections remain very asymmetric, upload speeds are lousy. Disk prices are dropping, so distributed storage has to compete with cheaper local storage, which can be a hard sell. * do people really want remote storage? Why? One reason is to get access from their data from elsewhere (sharing with friends, using it from someone else's computer, publishing to the world). Another reason is for backup. Both are handled pretty well by centralized solutions, especially when that solution (e.g. Facebook, Flickr) comes with some nice integrated display/edit/discovery/search tools for the data. A distributed storage solution has to compete with the incumbents, and many of the benefits of Tahoe/MojoNation-style storage aren't compelling ("no SPOF" isn't exciting when Facebook never goes down, "private" is not something a lot of those folks want or care about, "cheap" is competing with free-as-in-eyeballs). * backup is a question of inspiring confidence. Random servers run by strangers does not inspire confidence. Anyways, I think it's still a fun idea, but still big and difficult. I'd love to see someone charge ahead on it, but as a business I'd still consider it pretty risky. cheers, -Brian _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From warner at lothar.com Wed Jun 13 13:26:20 2012 From: warner at lothar.com (Brian Warner) Date: Wed, 13 Jun 2012 13:26:20 -0700 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: On 6/9/12 9:07 PM, Jack Byer wrote: > Are there any fundamental reason why a system like Mojo Nation > couldn't work now that certain capabilities are available that weren't > a decade ago? Oh, one other thought: another challenge of Mojo Nation was that each file involved hundreds or thousands of backend blocks, and the overhead of finding/tracking/downloading all of them was pretty bad. If I remember right, the blocks came in fixed sizes (powers of two, up to maybe 1MB), and each included a little bit of data about all segments of the file (to avoid the "chunking" reliability problem). The result was high alacrity (you had to download the whole file before any part of it became readable, so no streaming) and really bad disk IO patterns on both upload and download. The very first simplification we made in the Tahoe design process was to use a small number (N=10) of variable-sized shares (sharesize=filesize/k), and to locate those shares algorithmically (both to decide where to put them, and to find them again during download). That means fewer things to keep track of, and nobody trying to actually keep track of them all the time. In a more market-driven scheme, you need to be able to push shares to cheap+reliable servers, find them again later, and also find the copies that servers have bought from each other. Shares move around on you, even when no clients are looking at them. That means more overhead: instead of being able to determine offline (permuted ring) where shares are likely to be, you have to actually ask everyone. To do this efficiently requires log(N) DHT cleverness (where you don't actually ask *everybody*), which allows some of them to lie (which they will, because they don't want you to discover the competition's cheaper copies). So the flexible share-placement required by a free storage market probably comes at the cost of complexity and share-tracking overhead. cheers, -Brian _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From commonlyjl1 at tomgrizzard.com Wed Jun 13 04:02:26 2012 From: commonlyjl1 at tomgrizzard.com (=?koi8-r?B?IuzV3tvJyiDQz8TB0s/LIg==?=) Date: Wed, 13 Jun 2012 14:02:26 +0300 Subject: =?koi8-r?B?7MXUztHRINPLycTLwSA1MCUgLSDDxc7BINDSz9PUzyDTzcXbzsHRIC0g?= =?koi8-r?B?MTQ5MNLVwiDXzcXT1M8gMzAwMNLVwiEg?= Message-ID: <000d01cd4954$04a33de0$6400a8c0@commonlyjl1> Прекрасный подарок с доставкой - картина в роскошной раме Продается здесь: www.картина-тут.рф/11.shtml -------------- next part -------------- A non-text attachment was scrubbed... Name: 28-04.jpg Type: image/jpeg Size: 29501 bytes Desc: not available URL: From jointwo6111 at geimgi.com Wed Jun 13 10:07:39 2012 From: jointwo6111 at geimgi.com (=?koi8-r?B?IuPJxtJhIg==?=) Date: Wed, 13 Jun 2012 14:07:39 -0300 Subject: =?koi8-r?B?89LP3s7B0SAgw8nG0s/XwdEg0MXewdTYINcg7c/Ty9fFISDwzyDOydrL?= =?koi8-r?B?yc0gw8XOwc0=?= Message-ID: <000d01cd4987$09672660$6400a8c0@jointwo6111> Срочная цифровая печать. Буклеты. Листовки. Каталоги.Конверты. Визитки. Календари +7(495)78622 31 From chastisedkb3 at equitaxllp.com Wed Jun 13 03:41:05 2012 From: chastisedkb3 at equitaxllp.com (=?koi8-r?B?IvzOxdLHz9zGIg==?=) Date: Wed, 13 Jun 2012 14:11:05 +0330 Subject: =?koi8-r?B?/M7F0sfPwdXEydQhIOnO09TS1c3FztTBzNjO2cog/M7F0sfPwdXEydQs?= =?koi8-r?B?IPzL09DSxdPTLdzOxdLHz8HVxMnULCD8zsXSx8/QwdPQz9LULg==?= Message-ID: <9575C1401E814A3A98913144171A8134@fn2> Проводим энергетические обследования, формируем энергопаспорт. Инструментальные замеры, тепловизионное обследование. торопитесь! по 261 ФЗ необходимо провести энергоаудит до 31.12.2012г! www.энергоэф-спб.рф From eugen at leitl.org Wed Jun 13 06:24:04 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 13 Jun 2012 15:24:04 +0200 Subject: [liberationtech] AES-encyrpted telephony in Iran? Message-ID: <20120613132404.GB17120@leitl.org> ----- Forwarded message from Nathan of Guardian ----- From eugen at leitl.org Wed Jun 13 06:35:20 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 13 Jun 2012 15:35:20 +0200 Subject: Euro fears boost virtual currency Bitcoin Message-ID: <20120613133520.GC17120@leitl.org> http://business.financialpost.com/2012/06/08/euro-fears-boost-virtual-currency-bitcoin/ Euro fears boost virtual currency Bitcoin John Greenwood Jun 8, 2012 b 6:31 PM ET | Last Updated: Jun 12, 2012 8:02 AM ET Akos Stiller/Bloomberg The bad news out of Europe is benefitting safe haven countries, pushing down borrowing costs for a whole swath of governments. On May 30 the yield on the benchmark 10-year U.S. Treasury slipped to 1.6%, the lowest since the Second World War. Fearful of the future, Europeans are moving their money out of their banks and dumping it into safe havens such as U.S. Treasuries, Government of Canada bonds b and apparently the virtual currency Bitcoin. bWebre getting requests from people saying, can we mail you euros? We canbt do that legally, but they keep askingb bEuropean volume has been skyrocketing,b said Charlie Shrem, chief executive of BitInstant LLC, a company in New York that enables clients to transfer funds between Bitcoin and U.S. and Canadian dollars, British pounds, euros and other major currencies. According to Mr. Shrem, the sudden rise has been driven by people in countries like Greece, Italy, Spain b and even the Netherlands b anxious to protect their savings. bWebre getting requests from people literally saying, can we mail you euros? We canbt do that legally, but they keep asking.b The bad news out of Europe is benefitting safe haven countries, pushing down borrowing costs for a whole swath of governments. On May 30 the yield on the benchmark 10-year U.S. Treasury slipped to 1.6%, the lowest since the Second World War. Ten-year bond yields in Germany, France and Canada have all hit record lows in recent weeks. Even the U.K. is getting a lift. But why is Bitcoin caught up in the frenzy? The darling of techies, hipsters and, increasingly, currency traders, it was created back in 2009 as an Internet-only currency regulated by a network algorithm. Traditional currencies, the thinking went, are cumbersome and expensive to use in online transactions. Every time a purchase is made, fees must be paid to a bank or credit card company. Costs are even more onerous when one currency is converted to another. Bitcoin solved these problems and others as well, since it operates outside the payment systems operated by the banks. More importantly, itbs not under the control of any central bank or government. In fact, the supply of Bitcoins is controlled by an algorithm. Proponents argue that makes it safer than traditional fiat currencies and essentially immune to the political pressures. Indeed, at a time when governments around the world are pumping massive amounts of so-called fiscal stimulus into the economy, potentially setting the stage for untold inflation down the road, itbs not surprising that Bitcoin is suddenly attracting a lot of attention, as are other digital currencies. For fans of the currency, itbs hard to imagine a better way to shelter your savings from the ravages of the gales that are blowing through global financial markets. But itbs not the only alternative currency thatbs garnering attention. Second Life, a popular online game, has its own cyber money, known as linden dollars. Originally intended for use only within the game, linden dollars have morphed into a real currency that is becoming widely used across the internet by real consumers. Earlier this year the Canadian Mint announced a project to create its own digital money, MintChip. Analysts call it a positive sign, since it shows that even the government has recognized the importance of digital currency. So far though, the concept mostly remains a work in progress. Almost since its creation, Bitcoin has been struggling with hurdles, including software bugs and, more worryingly, hacker attacks. Last June, Mount Gox, one of the biggest Bitcoin exchanges, suffered a security breach with hackers reportedly making off with thousands of account passwords and a substantial amount of Bitcoin money, inflicting a huge blow to user confidence. Since then the value has recovered somewhat b it was trading around US$4 in April. But amid renewed fears around the eurozone itbs been on a steady upward trajectory, climbing from around $5.20 at the start of June to an intraday high of $5.65 on Friday. From montserratoibr0 at sfmusicbox.com Wed Jun 13 03:24:11 2012 From: montserratoibr0 at sfmusicbox.com (=?koi8-r?B?IsnaxMXMydEgydogzsHU1dLBzNjOz8ogy8/WySI=?=) Date: Wed, 13 Jun 2012 15:54:11 +0530 Subject: =?koi8-r?B?8M/S1MbFzMksINDB0MvJLCDT1c3LySAtINzUzyDX08Ug1SDOwdMgxdPU?= =?koi8-r?B?2CDP0NTPzSDJINcg0s/azsnD1SDP1CDQ0s/J2tfPxMnUxczRLg==?= Message-ID: Изысканные изделия из натуральной кожи очень хорошего качества. Портфели, папки, сумки - это все у нас есть оптом и в розницу от производителя. www.алиас-з.рф From poor.ricardo at gmail.com Wed Jun 13 16:55:40 2012 From: poor.ricardo at gmail.com (Poor Richard) Date: Wed, 13 Jun 2012 16:55:40 -0700 (PDT) Subject: PeerPoint (building-a-distributed-decentralized-internet@googlegroups.com) Message-ID: With all due respect, Patrick and others turned this thread in an off-topic direction. Getting back to the original topic, I would like to know if there is (or is not) still any interest in this group in discussing p2p application architecture. Either way, I encourage all Next Net group members to discuss and to mention in your blogs, presentations, training, etc. the difference between real p2p application software (still fairly uncommon and under-developed) and the useful but corporate-controlled client-server applications like Google Docs and Google Groups. Most open source/free software also still uses a client-server architecture. Until end-users learn the difference between client-server and p2p software architecture it will be hard to pull the software designers and developers further in the p2p direction. "Peer-to-peer (abbreviated to P2P) refers to a computer network in which each computer in the network can act as a client or server for the other computers in the network, allowing shared access to files and peripherals *without the need for a central server* [emphasis added]." (Wikipedia) http://en.wikipedia.org/wiki/Peer-to-peer What is less often understood is that the individual applications (such as email or shared document editing) must also have the p2p architecture built into each one. So far that is seldom the case. Somehow we must create greater awareness to drive greater demand for these kinds of p2p software products. BTW as far as I can tell, there is no online forum dedicated to the general topic of p2p application software architecture for free/open source software designers, developers, engineers, etc. Discussions of p2p architecture tend to be found mostly in the discussions of specific p2p networking projects like freenet and FreedomBox and they tend to apply to the lower-level network routing and file-sharing issues instead of the higher application software level for real-time, interactive collaboration. If anyone knows of a general p2p *application* architecture group or forum, please let me know. Thanks, PR On Wednesday, June 6, 2012 9:33:24 PM UTC-5, Poor Richard wrote: > > [image: Document] I've shared PeerPoint > * > * > > Next Net group members: I've shared a Google Doc called "PeerPoint" with the group. Members have edit permission but please follow the two simple procedures mentioned at the top of the document. > > > Click to open: > > - PeerPoint > > > Google Docs makes it easy to create, store and share online documents, > spreadsheets and presentations. > [image: Logo for Google Docs] > ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From pgut001 at cs.auckland.ac.nz Tue Jun 12 22:26:39 2012 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Wed, 13 Jun 2012 17:26:39 +1200 Subject: [silk] Flame is Lame In-Reply-To: <20120612161809.GV17120@leitl.org> Message-ID: Eugen Leitl quotes: >And suddenly, just like that, the discussion on whether Flame is lame or not >b&vanished. Yeah, because cryptographacamy is magic. The exploit may have used 0day and rootkits and ROP and stealth techniques and self-modifying code and who knows what else, but any five-year-old can do that. However, if there's any cryptographi... cryptograma... magic involved then it had to have been done by sikrit gummint agencies. I'm not saying it was or it wasn't, but I am a bit disturbed at the level of magical thinking that goes with anything involving crypto. There have been some pretty sophisticated attacks on crypto keys in embedded devices for jailbreaking purposes that were done by enthusiastic amateurs, not even the likes of (to pick some random examples of crypto people who've done this before) David Wagner or Ed Felten or Markus Kuhn but just some random guys who decided to give it a go. Looked at another way, if you submitted a paper "Yet another chosen prefix attack on MD5" to Crypto/AsiaCrypt/Eurocrypt, do you think it'd get accepted?. I'm not trying to denigrate the achievement, just to add a little perspective. Peter. From slovenlyzpxj at dreamtown.com Wed Jun 13 08:07:25 2012 From: slovenlyzpxj at dreamtown.com (=?koi8-r?B?IvUgzsHTIPPXz8kgzMDEySEi?=) Date: Wed, 13 Jun 2012 18:07:25 +0300 Subject: =?koi8-r?B?IPLFx8nT1NLBw8nRIMvPzdDBzsnKICDJIPLFz9LHwc7J2sHDydEgy8/N?= =?koi8-r?B?0MHOycoh?= Message-ID: <000d01cd4976$3dd72190$6400a8c0@slovenlyzpxj> Регистрация компаний. Реорганизация компаний (слияние/присоединение). Коллективно и индивидуально. Скидки постоянным клиентам. (495) 924 92 29 From misrulingkv23 at vcbonline.com Wed Jun 13 17:54:55 2012 From: misrulingkv23 at vcbonline.com (=?koi8-r?B?IuzAwsnNwdEg2sXNzNEi?=) Date: Wed, 13 Jun 2012 19:54:55 -0500 Subject: =?koi8-r?B?8NLPxMHF1NPRIPXewdPUz8s=?= Message-ID: <000d01cd49c8$50758ba0$6400a8c0@misrulingkv23> Участок - лес, природа. Удобный подъезд. Телефон (915) 122 73 26 From rocketryy at k-meleon.com Wed Jun 13 08:11:41 2012 From: rocketryy at k-meleon.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Wed, 13 Jun 2012 20:41:41 +0530 Subject: =?koi8-r?B?4sXaz9DB087P09TYIPfB28XHzyDJzdXdxdPU18Eh?= Message-ID: За 2011 год по данным МЧС пожары принесли Материального ущерба на 17 280 086 000 млрд. рублей, не хочешь оказаться в этой статистике имей средства защиты! www.защити-себя.рф From krakatoarc6 at safeidcard.com Wed Jun 13 13:11:23 2012 From: krakatoarc6 at safeidcard.com (=?koi8-r?B?IuzAwsnNwdEg2sXNzNEi?=) Date: Wed, 13 Jun 2012 21:11:23 +0100 Subject: =?koi8-r?B?8NLPxMHF1NPRIPXewdPUz8s=?= Message-ID: <000d01cd4998$52d54e60$6400a8c0@krakatoarc6> Предложение месяца √ скидка на участки. Каскад прудов. Лесной массив. Отдел продаж (495) 6 432 999 From barrielzq42 at nlmi.com Wed Jun 13 22:48:42 2012 From: barrielzq42 at nlmi.com (=?koi8-r?B?IvLFzc/O1CDP0sfUxcjOycvJIg==?=) Date: Wed, 13 Jun 2012 21:48:42 -0800 Subject: =?koi8-r?B?8sXNz87UIM/Sx9TFyM7Jy8ksINrB0NLB18vBIMvB0tTSycTWxcog0yDX?= =?koi8-r?B?2cXaxM/NLCDSwdPIz8TO2cUgzcHUxdLJwczZIMTM0SDLz9DJ0s/X?= Message-ID: Ремонт оргтехники, заправка картриджей с выездом, расходные материалы для копиров, принтеров, факсов телефон: (499) 246-40-80. сервисное обслуживание МФУ, принтеров и копиров четвертая заправка - бесплатно гарантия на работу, оперативность система скидок From anita at hms-senteret-vesteralen.no Thu Jun 14 09:07:41 2012 From: anita at hms-senteret-vesteralen.no (=?koi8-r?B?IuPFztTSINDP19nbxc7J0SDL18HMycbJy8HDycki?=) Date: Thu, 14 Jun 2012 08:07:41 -0800 Subject: =?koi8-r?B?68HEwdPU0s/X2cog1d7F1A==?= Message-ID: <01cd4a04$c50e8480$031f660e@anita> Не пропустите! В период со 2 по 3 июля в Санкт-Петербурге пройдет актуальный для строителей курс повышения квалификации: "Строительство и регистрация прав на линейные объекты" В рамках курса: - Виды линейных объектов. - Оформление прав на земельные участки под строительство линейных объектов. - Линейные объекты как объекты недвижимости. - Ограничение (обременение) прав на землю в связи со строительством, реконструкцией и эксплуатацией линейных объектов. - Экологические требования в связи с проектированием, строительством и эксплуатацией линейных объектов. - Использование недр при строительстве, реконструкции и эксплуатации линейных объектов. - Новый порядок осуществления кадастровых работ по образованию земельных участков, межевой план. - Проведения предпроектной подготовки строительства, реконструкции, капитального ремонта линейных объектов. Всем участникам выдается Удостоверение государственного образца о повышении квалификации! В стоимость курса входят: бесплатные обеды, кофе-брейки, фото участников и экскурсия по городу! Подробности можно уточнить по телефону: (812) 642...53 41 From eugen at leitl.org Wed Jun 13 23:21:51 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 14 Jun 2012 08:21:51 +0200 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: <20120614062151.GE17120@leitl.org> ----- Forwarded message from Brian Warner ----- From eugen at leitl.org Wed Jun 13 23:23:59 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 14 Jun 2012 08:23:59 +0200 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: <20120614062359.GG17120@leitl.org> ----- Forwarded message from Brian Warner ----- From eugen at leitl.org Thu Jun 14 01:44:33 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 14 Jun 2012 10:44:33 +0200 Subject: PeerPoint (building-a-distributed-decentralized-internet@googlegroups.com) Message-ID: <20120614084433.GR17120@leitl.org> ----- Forwarded message from Poor Richard ----- From metallurgy618 at studiored.com Thu Jun 14 00:58:43 2012 From: metallurgy618 at studiored.com (=?koi8-r?B?IvrBx8/Sz8TO2cogxM/NINDPIOvBzNXW08vPzdUg2y4i?=) Date: Thu, 14 Jun 2012 10:58:43 +0300 Subject: =?koi8-r?B?8NLPxMHF1NPRIOTPzSDTIPXewdPUy8/N?= Message-ID: <000d01cd4a03$84e09340$6400a8c0@metallurgy618> Продается дом с мебелью и всеми удобствами для круглогодичной комфортной жизни. Мой телефон: (916) 162-03-08 Никита From bew at chello.no Thu Jun 14 07:06:18 2012 From: bew at chello.no (=?koi8-r?B?Iu/C1d7FzsnFICLvxs/SzczFzsnFINDSwdcgzsEg+vUg0M/EINPU0g==?= =?koi8-r?B?z8nUxczY09TXzyDs7yIi?=) Date: Thu, 14 Jun 2012 11:06:18 -0300 Subject: =?koi8-r?B?8tXLz9fPxMnUxczAINDSz8XL1M/X?= Message-ID: <01cd4a1d$b8e2f100$573e20bb@bew> Не пропустите! В период со 2 по 3 июля в Санкт-Петербурге пройдет актуальный для строителей курс повышения квалификации: "Строительство и регистрация прав на линейные объекты" В рамках курса: - Виды линейных объектов. - Оформление прав на земельные участки под строительство линейных объектов. - Линейные объекты как объекты недвижимости. - Ограничение (обременение) прав на землю в связи со строительством, реконструкцией и эксплуатацией линейных объектов. - Экологические требования в связи с проектированием, строительством и эксплуатацией линейных объектов. - Использование недр при строительстве, реконструкции и эксплуатации линейных объектов. - Новый порядок осуществления кадастровых работ по образованию земельных участков, межевой план. - Проведения предпроектной подготовки строительства, реконструкции, капитального ремонта линейных объектов. Всем участникам выдается Удостоверение государственного образца о повышении квалификации! В стоимость курса входят: бесплатные обеды, кофе-брейки, фото участников и экскурсия по городу! Подробности можно уточнить по телефону: (812) 642 53..41 From 3charpeys at rivercityhd.com Thu Jun 14 07:28:42 2012 From: 3charpeys at rivercityhd.com (=?koi8-r?B?IuzvIg==?=) Date: Thu, 14 Jun 2012 11:28:42 -0300 Subject: =?koi8-r?B?9MXIzsnexdPLz83VINLVy8/Xz8TJ1MXMwA==?= Message-ID: <01cd4a20$d9f91100$573e20bb@3charpeys> Не пропустите! В период со 2 по 3 июля в Санкт-Петербурге пройдет актуальный для строителей курс повышения квалификации: "Строительство и регистрация прав на линейные объекты" В рамках курса: - Виды линейных объектов. - Оформление прав на земельные участки под строительство линейных объектов. - Линейные объекты как объекты недвижимости. - Ограничение (обременение) прав на землю в связи со строительством, реконструкцией и эксплуатацией линейных объектов. - Экологические требования в связи с проектированием, строительством и эксплуатацией линейных объектов. - Использование недр при строительстве, реконструкции и эксплуатации линейных объектов. - Новый порядок осуществления кадастровых работ по образованию земельных участков, межевой план. - Проведения предпроектной подготовки строительства, реконструкции, капитального ремонта линейных объектов. Всем участникам выдается Удостоверение государственного образца о повышении квалификации! В стоимость курса входят: бесплатные обеды, кофе-брейки, фото участников и экскурсия по городу! Подробности можно уточнить по телефону: (812) 642 53-41 From eugen at leitl.org Thu Jun 14 02:33:47 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 14 Jun 2012 11:33:47 +0200 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: <20120614093347.GU17120@leitl.org> ----- Forwarded message from "James A. Donald" ----- From eugen at leitl.org Thu Jun 14 02:34:49 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 14 Jun 2012 11:34:49 +0200 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: <20120614093449.GV17120@leitl.org> ----- Forwarded message from "James A. Donald" ----- From jamesd at echeque.com Wed Jun 13 18:45:44 2012 From: jamesd at echeque.com (James A. Donald) Date: Thu, 14 Jun 2012 11:45:44 +1000 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: On 2012-06-14 6:00 AM, Brian Warner wrote: > On 6/9/12 9:07 PM, Jack Byer wrote: > Users were > accidentally encouraged to hoard Mojo (the client displayed your > balance like a game score, users sought to maximize that number more This was an incorrect diagnosis of the problem. The Mojo Nation team were thinking like Keynesians. If markets are failing to clear, prices should fall. Even if users are hoarding mojo, at some sufficiently low price point, supply and demand will match. Hoarding money can never be a problem, for that is what money is for. You are *supposed* to hoard money, otherwise it would not be worth anything. Gold is not good for much, other than hoarding, and government paper is good for even less. Failure of price discovery is frequently a very large problem. Price discovery is always arduous, laborious, costly, slow, and not very accurate, something Keynesians blissfully ignore. > For Tahoe, we reduced the scope, threw out the economic games, and > narrowed the use-case to commercial grids and friendnets (where uptime > is more predictable). Bittorrent did the same, reducing the scope to > short-term transfers instead of long-term storage. Both have achieved > their own smaller goals. Bittorrent, by focusing on short term exchange of like data for like data, has, as was expected, a permanent and massive seeding problem. It is not apparent to me that Tahoe has achieved the goal of reliable storage on friendnets. Too large a friendnet, anti social behavior makes the net unreliable, too small a friendnet, k of n storage runs into the problem that k and n are small making the net unreliable. The problems that Mojo Nation sought to solve are still there, unsolved, and pissing people off. > * overambition is still a big problem. Xanadu disease. > * measuring/predicting reliability of storage nodes is still an unsolved > (and possibly unsolveable) problem. You need servers to stick around > for a long period of time, otherwise repair costs will swamp your > bandwidth and leave you no room for real traffic. Needing long-term > servers interacts badly with adoption (you want to encourage > experimentation, folks who want to install it just to play around with > it should be able to do that quickly, but you can't afford to use them > as servers, since many of them will get bored and delete it or let it > break the next day, so they don't really get the full experience, so > they may not really be motivated to stick around). As a client you > need to distinguish between good servers and transient ones, so you > really want everyone to monitor and publish uptime data on each other, > but they could be lying, which gets you back into the reputation graph > thing. There's been a lot of work on reputation graphs (starting with > Raph Levien's Advogato, and motivated by EBay and Amazon), but I don't > know how much of it is buried in proprietary/closed codebases (since > it's easier to game a system when you have the source) vs being > available as an off-the-shelf library. Any reputation system will have good inputs, evil inputs, insane inputs, and evil insane inputs. The evil or insane inputs will be rated as good by fellow members or sibyls of each evil or insane faction, so we will get graphs that are by some measure, in some sense, disjoint. If one starts at a good node in the good faction, reflecting a well known good guy, everyone well linked will be good, thus connection analysis of the reputation graph generates faction subgraphs. Faction subgraphs will typically have important highly connected nodes. Mencius refers to such nodes as Kings. You give your allegiance to a good King, and your problem is solved. You give your allegiance to a bad King, you are hosed. The graph analysis system may help you find a good King, but cannot reliably find one for you, because whatever criteria it uses will be gamed by the evil. A simple solution is to bake a single king node into the client software - otherwise known as a central point of failure. A default king node will, however, work, or at least fail less disastrously than a baked in king node. > * do people really want remote storage? Why? One reason is to get access > from their data from elsewhere (sharing with friends, using it from > someone else's computer, People don't really want remote storage. They want file sharing, in some cases highly controlled sharing - sharing with only with themselves at different logins, only with other instances of themselves, being a special case of controlled sharing. Thus, it is a communication and publication system, not a hard drive. _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jamesd at echeque.com Wed Jun 13 19:04:20 2012 From: jamesd at echeque.com (James A. Donald) Date: Thu, 14 Jun 2012 12:04:20 +1000 Subject: [tahoe-dev] Resurrecting Mojo Nation Message-ID: On 2012-06-14 6:15 AM, Brian Warner wrote: > The "entire world as one community" case is what we call > the "one grid to rule them all". There are a lot of > engineering/scaling challenges to it (you need log(N) DHTs, > supernodes), in addition to features needed by a > mass-market product if you want that kind of scale (NAT > handling, bandwidth limiting, automatic update, nice UI, > easy installation, etc, etc). On 2012-06-14 6:26 AM, Brian Warner wrote: > Oh, one other thought: another challenge of Mojo Nation was > that each file involved hundreds or thousands of backend > blocks, and the overhead of finding/tracking/downloading > all of them was pretty bad. If I remember right, the blocks > came in fixed sizes (powers of two, up to maybe 1MB), and > each included a little bit of data about all segments of > the file (to avoid the "chunking" reliability problem). The > result was high alacrity (you had to download the whole > file before any part of it became readable, so no > streaming) and really bad disk IO patterns on both upload > and download. This challenge, and its solution, (DHT, host discovery) corresponds to a bittorrent magnet link, and the software that makes such links work. This may well be the most widely used form of file sharing, so the way to go is likely some kind of superset of this existing solution, if we think of the task to solved as file sharing. _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From enosk at toutango.com Thu Jun 14 02:59:17 2012 From: enosk at toutango.com (=?koi8-r?B?IuvB3sXT1NfPINDPICDM1d7bxcogw8XOxSEi?=) Date: Thu, 14 Jun 2012 12:59:17 +0300 Subject: =?koi8-r?B?8sHT0NLPxMHWwSEg58XOxdLB1M/S2Swgzc/Uz9DPzdDZLCDLz83Q0sXT?= =?koi8-r?B?08/S2S4=?= Message-ID: <000d01cd4a14$5c8258a0$6400a8c0@enosk> Генераторы, мотопомпы, компрессоры. Распродажа - лучше цены не найдете! Розница и опт. по всей России Звоните по тел. + 7 (926) 717 =80=88 From departing8951 at schoemer.com Thu Jun 14 05:25:11 2012 From: departing8951 at schoemer.com (=?koi8-r?B?IvbV0s7BzCI=?=) Date: Thu, 14 Jun 2012 13:25:11 +0100 Subject: =?koi8-r?B?9tXSzsHMIM8gxNXIz9fOz8ogySDL1czY1NXSzs/KINbJ2s7JIOna0sHJ?= =?koi8-r?B?zNEu?= Message-ID: <872196091.75626066137646@schoemer.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 549 bytes Desc: not available URL: From gorge at inns.com Wed Jun 13 23:46:01 2012 From: gorge at inns.com (=?koi8-r?B?Iu3J0s/Xz8og0sXLz9LEIg==?=) Date: Thu, 14 Jun 2012 14:46:01 +0800 Subject: =?koi8-r?B?8NLJyM/EySDOwSDtydLP18/KINLFy8/SxA==?= Message-ID: <926518356.97597074043044@inns.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 357 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: v2-2.jpg Type: image/jpeg Size: 86011 bytes Desc: not available URL: From jancsika at yahoo.com Thu Jun 14 14:48:59 2012 From: jancsika at yahoo.com (Jonathan Wilkes) Date: Thu, 14 Jun 2012 14:48:59 -0700 (PDT) Subject: [Freedombox-discuss] What Do You want to use the FreedomBox for? Message-ID: With the way most residential routers are set up, and the way in which most privacy-preserving software leaves the ugly details of traversing a NAT to the user, I can think of only a few ways I would benefit from having a freedombox. That is-- I can't think of a single instance where routing around the most common ISP obstacles (like not wanting me to run a globally- reachable service from my home, throttling, etc.) would be made easier by introducing another piece of hardware into the mix. However, I would still like to use the Freedombox for three inter-related purposes. In order of immediate importance for potential users, they are: 1) As a foolproof, turn-key solution for low risk, private browsing and data retention. 2) As an introduction to f2f identities, and chat that is end-to-end encrypted. 3) As a physical metaphor for seriousness about control over one's data. #1 is the most important because it is the only use case for which the Freedombox offers a unique solution that _doesn't_ depend on potential users understanding the dangers of online surveillance vis a vis Google, Facebook, and others. Even those who are perfectly happy expressing a large part of their social lives on Facebook have a need/desire for privacy in _some_ domain. For one who lacks any knowledge whatsoever of privacy issues, this domain is probably pornography. With limited knowledge it is pornography and career-sensitive data. And so on up the ladder until we arrive at complex technical and philosophical issues of privacy and data control for which members of this list are quite familiar. Basically I'm talking about Freedombox as a machine on which the user runs Vidalia or the Tor Browser Bundle (not exactly sure how that would work), plus some encrypted storage. As far as I know, these are the only pieces of peer-reviewed, actively maintained software for which the user can simply click an icon and have the privacy-preserving service "just work". The benefit of running it on a separate piece of hardware is small, but the benefit exists (ease of mind knowing that any data stored from private browsing or anything else is encrypted, without having to follow an online tutorial). More importantly, that benefit exists and is meaningful to the user whether the data itself is frivolous or potentially life-altering. #2 is secondary because there really isn't a benefit to the user who has no understanding of the importance of online privacy. It's also questionable whether this is even important to users with an above-average understanding of privacy issues. I see an enormous amount of data shared _publicly_ on Diaspora by people who left Facebook ostensibly because of its privacy issues, for example. It's not clear to me that such users would understand the importance of developing a bottom-up system of peer-to-peer trust themselves, rather than just having their data housed unencrypted on a server and making it available to the public. There is the future benefit of being able to backup data with your friends' Freedomboxes. But that presupposes a critical mass of online activity happening through the Freedbombox rather than the current centralized services being used. #3 Is probably most important as an explanatory technique. Here's a block of hardware. This is your data vault. Get seven of your friends to run one and you've got an encrypted backup. Put it where it's safe, and that's where it stays. (I think this is how Eben Moglen originally described it.) Anyway, as I see it this is the only set of uses that doesn't exclude 99% of the population from actually wanting to buy a box, plug it in, and get to work on it. Everything else is great _if_ one already understands about privacy and freedom; unfortunately, most people do not, and I'd rather they find out through software updates that add a feature to the box they are already using for _some_purpose, or by a friend programming it to route around the govt's filters, than by yet more of their data getting leaked, or picked through for potential profit, or harassment. _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From zooko at zooko.com Thu Jun 14 11:03:52 2012 From: zooko at zooko.com (Zooko Wilcox-O'Hearn) Date: Thu, 14 Jun 2012 15:03:52 -0300 Subject: [tahoe-dev] Proposed short description of tahoe-LAFS for personal backup Message-ID: On Tue, Jun 12, 2012 at 7:44 PM, Saint Germain wrote: > > tahoe-LAFS is not really a backup software but rather a storage solution. How about: """ Tahoe-LAFS is not just a backup tool, but rather a distributed file system. It also comes with an integrated backup tool. """ > The primary objective is to secure your data, either for > privacy or for safety (against damage). To do so, it stores your > encrypted data (encrypted at the source) on several machines organized > in a network with a configurable policy (specifying K=2 and N=5 for > instance, will spread your data on 5 machines, 2 of which need at least > to be available to access your data). Nicely written. > A few remarkable points: > - I like its "paranoid" approach. The idea is to trust no one (and especially not your online storage provider) This is fine and I don't think you need to change it, but for your information whenever I see the word "trust" a little warning flag goes up in my brain, and I go back and mentally rewrite the sentence without the word "trust". This is because that word combines two things: 1. Whether you think a person or tool is going to fail or betray you, and 2. Whether your system relies on that person or tool operating correctly and loyally. A lot of the architecture of Tahoe-LAFS is focused on question 2 and the interference of question 1 just confuses everyone. If you think about question 1 then you'll sometimes end up choosing the wrong answer for question 2. For example: think of Least Authority Enterprises. As a company, we don't want our users to think that we are weak or malicious -- that we are likely to fail or to betray our customers to someone else. But, we very much want our customers to be *invulnerable* to us, so that *if* we were to fail or to betray our customers to someone else, there would be very little damage that we would be able to do. If you use the word "trust", then it is hard to explain why you don't want to give LAE your encryption keys. Does that mean you think we are dishonest? Don't you trust us? If you force yourself not to use the word trust, then you can usually rewrite the sentences to be in terms of "reliance" or "vulnerability" instead of trust, and suddenly the confusion about question 1 vs. question 2 disappears. Why do you withhold your capabilities from LAE? Because you don't wish to be vulnerable to a failure or betrayal at LAE. Because you don't want the safety of your backups to *rely on* the continued security of LAE's servers and the continued loyalty of its employees. Doing that transformation on your sentence above would give something like: """ I like its "paranoid" approach. The idea is that no one (not even your online storage provider) should have read or write access to your backups. """ > - Don't need any redundant PAR2 checksum, given that the data are By the way, zfec is an alternative to PAR2. https://tahoe-lafs.org/trac/zfec/browser/zfec/README.rst zfec is much more efficient than PAR2 for some settings. (See the benchmarks in the README.rst.) I don't know of anyone who is actively using zfec's command-line tool in the way that one uses PAR2's command-line tool, though. There are lots of people using zfec as a library inside other tools. Looking forward to reading your article! Maybe I'll painfully struggle through the first 10 words in French and then get my Francophone wife to read it to me. :-) Regards, Zooko _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From gibbetsr at mobilier.com Thu Jun 14 12:29:17 2012 From: gibbetsr at mobilier.com (=?koi8-r?B?IvPXz8kgzMDEySEi?=) Date: Thu, 14 Jun 2012 16:29:17 -0300 Subject: =?koi8-r?B?68/S0M/SwdTJ187ZyiDA0snT1C4g8MXS18HB0SDLz87T1czY1MHDydEg?= =?koi8-r?B?1yDQz8TB0s/LISD618/OydTF?= Message-ID: <000d01cd4a63$fd7e6830$6400a8c0@gibbetsr> Мы выгоднее. Нас много. Мы оперативнее, опытнее и заинтересованнее. Юридическое обслуживание организаций. От 5000 руб./мес. Гарантия конфиденциальности. Корпоративный юрист. (925) 509 29 99 From lispedex2399 at w3.monsanto.com Thu Jun 14 02:26:58 2012 From: lispedex2399 at w3.monsanto.com (E-marketing) Date: Thu, 14 Jun 2012 17:26:58 +0800 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAgKyDIz9PUyc7HIM7BIM3F09HDINcg?= =?koi8-r?B?8O/k4fLv6w==?= Message-ID: <5FA4C59707E64CE5A07A6484778C1DD8@x6x820120130JV> 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК (для указания вашего сайта в письме) По вашему графику Без ограничений по срокам Возможно менять макеты все 8 раз !!! Подготовка макетов бесплатно АКЦИИ: Месяц 44(46) рассылок - 2 раза в день - 5 раз в неделю - 20 000 рублей Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,7 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 From parboilso at rosslevinedesign.com Thu Jun 14 02:46:57 2012 From: parboilso at rosslevinedesign.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Thu, 14 Jun 2012 17:46:57 +0800 Subject: =?koi8-r?B?7MXUzywg0M/WwdLZIQ==?= Message-ID: <09E75632B1464FDCBD88057B0B3FAF00@vaio330eb312ed> За 2011 год по данным МЧС пожары принесли Материального ущерба на 17 280 086 000 млрд. рублей, защити свою квартиру, дачу, гараж от пожара! www.защити-себя.рф From trunkingqv at sabakcic.com Thu Jun 14 06:24:12 2012 From: trunkingqv at sabakcic.com (=?koi8-r?B?IvPPwtPU18XOzsnLINDP08XMy8EgzsEg68nF19PLz80g2y4i?=) Date: Thu, 14 Jun 2012 20:24:12 +0700 Subject: =?koi8-r?B?89LP3s7PINLB09DSz8TBwCDT18/JINXewdPUy8kgMzAsIDcwLCDJIDI1?= =?koi8-r?B?MCDTz9TPyyEg69LB08nXxcrbycogIMvP1NTFxNbO2cog0M/TxczPyyE=?= Message-ID: <000d01cd4a30$fcd2a000$6400a8c0@trunkingqv> Срочно распродаю свои участки 30, 70, и 250 соток! Панорамный вид, лес, сосновый бор, Возможность строительства собственного водоема Позвоните о цене договоримся 8 ( 903 ) 193 0623 From auto-notify at ups.com Thu Jun 14 11:29:45 2012 From: auto-notify at ups.com (UPS Quantum View) Date: Thu, 14 Jun 2012 20:29:45 +0200 Subject: Track your UPS delivery online. Message-ID: <4FDA2D02.706050@ups.com> Discover more about UPS: Visit www.ups.com Sign Up For Additional E-Mail From UPS Read Compass Online This message was sent to you at the request of ICRealtime Security Solutions LLC to notify you that the electronic shipment information below has been transmitted to UPS. The physical package(s) may or may not have actually been tendered to UPS for shipment. To verify the actual transit status of your shipment, click on the tracking link below or contact ICRealtime Security Solutions LLC directly. Important Delivery Information Scheduled Delivery: 09-May-2012 Shipment Detail Ship To: cypherpunks at jfet.org CSI SECURITY 2269 JEFFERIES HWY. WALTERBORO SC 29488 US Number of Packages: 1 UPS Service: GROUND Weight: 9.0 LBS Tracking Number: 1ZX603R40369384687 Reference Number 1: 47479 Reference Number 2: 20872 Click here to track if UPS has received your shipment or visit http://www.ups.com/WebTracking/track?loc=en_US on the Internet. ____2@@2@@2wowT7qQAXmBSs4ogrWusagY4wa____ ) 2012 United Parcel Service of America, Inc. UPS, the UPS brandmark, and the color brown are trademarks of United Parcel Service of America, Inc. All rights reserved. For more information on UPS's privacy practices, refer to the UPS Privacy Policy. Please do not reply directly to this e-mail. UPS will not receive any reply message. For questions or comments, visit Contact UPS. This communication contains proprietary information and may be confidential. If you are not the intended recipient, the reading, copying, disclosure or other use of the contents of this e-mail is strictly prohibited and you are instructed to please delete this e-mail immediately. Privacy Notice Contact UPS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9130 bytes Desc: not available URL: From stammerersj4 at inewly.com Thu Jun 14 10:13:49 2012 From: stammerersj4 at inewly.com (=?koi8-r?B?Iu/GydPZINcg7c/Ty9fFIg==?=) Date: Thu, 14 Jun 2012 22:43:49 +0530 Subject: =?koi8-r?B?7sUgzsHEzyDQzMHUydTYIMvPzcnT08nJwCwgz8bJ09kgz9Qg88/C09TX?= =?koi8-r?B?xc7OycvBIQ==?= Message-ID: <000d01cd4a51$105cb550$6400a8c0@stammerersj4> Маленькие и не очень маленькие ОФИСЫ ждут Вас! Помещения находятся на БольшойЧеркизовской улице Охраняемая территория, удобный подъезд с! Telefon 8/903/ 728 -00 = 2- 0 From Mia.Nelson at icaourense.com Thu Jun 14 12:47:19 2012 From: Mia.Nelson at icaourense.com (Mia Nelson) Date: Fri, 15 Jun 2012 00:47:19 +0500 Subject: Classic bluepills at affordable prices Message-ID: <210100167320886-WQMHBBJDZZKATQGOXJLJ@fpd9.icaourense.com> If you wish not to visit doctors any more, read this. Revive your lovemaking, using our super supplements! http://y.ahoo.it/BGL4t From choressd53 at chaffee.com Thu Jun 14 21:49:40 2012 From: choressd53 at chaffee.com (=?koi8-r?B?Ivvr7+zhIOHu9Onr9+Hy7u/n7yDk5ezhIg==?=) Date: Fri, 15 Jun 2012 01:49:40 -0300 Subject: =?koi8-r?B?++vv7OEg4e706ev34fLu7+fvIOTl7OE6ICDv4vX+5e7p5SAtIPcg9eTv?= =?koi8-r?B?9+/s+PP09+nlISA=?= Message-ID: ШКОЛА АНТИКВАРНОГО ДЕЛА: ОБУЧЕНИЕ - В УДОВОЛЬСТВИЕ! Умение отличить полотно Ван Гога от произведений Поля Гогена, Классический стиль от стиля Ар Деко, шедевры ювелирного искусства Карла Фаберже от изделий Западных мастеров выгодно отличает человека культурно образованного и интеллектуально развитого. Наши лекции познакомят Вас с различными традициями в искусстве, научат отличать подлинник от подделки, повысят культурный уровень и расширят кругозор! Мы ждем Вас! Тел.: +7 (495) 650-12-62; +7 (495) 999-11-45; +7 (963) 990-33-33. Сайт: www.школа-антиквар.рф From simonecorbin at jclc.com Fri Jun 15 04:40:27 2012 From: simonecorbin at jclc.com (LAUREN) Date: Fri, 15 Jun 2012 05:40:27 -0600 Subject: Here is the product that works! Make her Yearn More of You = For men who want bigger, harder, longer-lasting erections bgxj5234s Message-ID: <88v29t98k25-75941337-720c4l29@khrrkdr3yqqgj> Make her Yearn More of You For men who want bigger, harder, longer-lasting erections. Here is the product that works! http://eventdfg.ru From eugen at leitl.org Thu Jun 14 21:34:49 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 15 Jun 2012 06:34:49 +0200 Subject: [tahoe-dev] Proposed short description of tahoe-LAFS for personal backup Message-ID: <20120615043449.GK17120@leitl.org> ----- Forwarded message from Zooko Wilcox-O'Hearn ----- From eugen at leitl.org Thu Jun 14 21:54:22 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 15 Jun 2012 06:54:22 +0200 Subject: [Freedombox-discuss] What Do You want to use the FreedomBox for? Message-ID: <20120615045422.GP17120@leitl.org> ----- Forwarded message from Jonathan Wilkes ----- From auto-notify at ups.com Fri Jun 15 06:47:35 2012 From: auto-notify at ups.com (UPS Quantum View) Date: Fri, 15 Jun 2012 10:47:35 -0300 Subject: Track your UPS delivery online. Message-ID: <4FDB3C66.704010@ups.com> Discover more about UPS: Visit www.ups.com Sign Up For Additional E-Mail From UPS Read Compass Online This message was sent to you at the request of ICRealtime Security Solutions LLC to notify you that the electronic shipment information below has been transmitted to UPS. The physical package(s) may or may not have actually been tendered to UPS for shipment. To verify the actual transit status of your shipment, click on the tracking link below or contact ICRealtime Security Solutions LLC directly. Important Delivery Information Scheduled Delivery: 09-May-2012 Shipment Detail Ship To: rsw at jfet.org CSI SECURITY 2269 JEFFERIES HWY. WALTERBORO SC 29488 US Number of Packages: 1 UPS Service: GROUND Weight: 9.0 LBS Tracking Number: 1ZX603R40369384687 Reference Number 1: 47479 Reference Number 2: 20872 Click here to track if UPS has received your shipment or visit http://www.ups.com/WebTracking/track?loc=en_US on the Internet. ____2@@2@@2wowT7qQAXmBSs4ogrWusagY4wa____ ) 2012 United Parcel Service of America, Inc. UPS, the UPS brandmark, and the color brown are trademarks of United Parcel Service of America, Inc. All rights reserved. For more information on UPS's privacy practices, refer to the UPS Privacy Policy. Please do not reply directly to this e-mail. UPS will not receive any reply message. For questions or comments, visit Contact UPS. This communication contains proprietary information and may be confidential. If you are not the intended recipient, the reading, copying, disclosure or other use of the contents of this e-mail is strictly prohibited and you are instructed to please delete this e-mail immediately. Privacy Notice Contact UPS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9038 bytes Desc: not available URL: From jesuitsn33 at wellsgrp.com Thu Jun 14 20:11:58 2012 From: jesuitsn33 at wellsgrp.com (=?koi8-r?B?IuLPzNjbwdEg18/EwSI=?=) Date: Fri, 15 Jun 2012 11:11:58 +0800 Subject: =?koi8-r?B?8M/T1NLPytTFIMTB3tUgzsEg9+/k5Q==?= Message-ID: <000d01cd4aa4$a0035f80$6400a8c0@jesuitsn33> Участок на первой береговой линии Можайского моря. Сосны. Тел. 8-906-616-92-67 Анна From lexica at hotelgander.com Thu Jun 14 22:52:03 2012 From: lexica at hotelgander.com (Mail Group) Date: Fri, 15 Jun 2012 11:22:03 +0530 Subject: =?koi8-r?B?8sHaz9vMxc0g98Hb1SDSxcvMwc3VINDPINzMxcvU0s/Ozs/KINDP3tTF?= =?koi8-r?B?IO3P08vXwSDJIPLP09PJ0Q==?= Message-ID: <000d01cd4aba$fcec00b0$6400a8c0@lexica> Рассылаем ваше предложение по базе электронной почты Москвы и России! Эффективно! Сегодня акция 3 рассылки всего за 5000 рублей Звоните проконсультирую (Ч95) 585 - 48 - Пять Семь From Pablo.Pichon at krct.org Fri Jun 15 10:25:55 2012 From: Pablo.Pichon at krct.org (Pablo Pichon) Date: Fri, 15 Jun 2012 12:25:55 -0500 Subject: Only genuine goods Message-ID: <236741030164832-WXWJTEDACFBRBZTCXMIIPNK@dns464.krct.org> Ask us what is the secret of x_x_x_movie starts and we will answer your question. To make your muscles bulging, you need a gym. http://y.ahoo.it/zxwlN From mirabeaunsx92 at asac.com Thu Jun 14 22:11:56 2012 From: mirabeaunsx92 at asac.com (=?koi8-r?B?IuTPzSDXIOjBzc/XzsnLwcgi?=) Date: Fri, 15 Jun 2012 14:11:56 +0900 Subject: =?koi8-r?B?8NLPxMHA1NPRIMvXwdLUydLZINcg6MHNz9fOycvByCA=?= Message-ID: Продаются элитные квартиры в Хамовниках в близи Новодевичьего монастыря www.дом-хамовники.рф From recapitulationsgs32 at getradiotag.com Fri Jun 15 02:46:26 2012 From: recapitulationsgs32 at getradiotag.com (=?koi8-r?B?IuUt8sHT09nMy8ki?=) Date: Fri, 15 Jun 2012 15:16:26 +0530 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAgKyDIz9PUyc7HIM7BIM3F09HDINcg?= =?koi8-r?B?8O/k4fLv6w==?= Message-ID: <0308DA72792F48729FD8B3FB16A5146D@Import> 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК (для указания вашего сайта в письме) По вашему графику Без ограничений по срокам Возможно менять макеты все 8 раз !!! Подготовка макетов бесплатно АКЦИИ: Месяц 44(46) рассылок - 2 раза в день - 5 раз в неделю - 20 000 рублей Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,7 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 From lexiemyrtie at honeywell.com Fri Jun 15 06:23:38 2012 From: lexiemyrtie at honeywell.com (Anna Hien) Date: Fri, 15 Jun 2012 16:23:38 +0300 Subject: we accept Visa cards Safe & Secure Processing since the year 1999. Buy Viagra for Lowest Cost on Net 2cazh Message-ID: <201206151223.5CF867B655DD1DD3374C5B@3n62t75> Buy Viagra for Lowest Cost on Net - Order Viagra Online 100mg, 50mg for Cheapest Price on Net and get Free Pills, we accept Visa cards Safe & Secure Processing since the year 1999 http://vcbxn.ru From zooko at zooko.com Fri Jun 15 12:53:59 2012 From: zooko at zooko.com (Zooko Wilcox-O'Hearn) Date: Fri, 15 Jun 2012 16:53:59 -0300 Subject: [tahoe-dev] Announcing RentaNode.nl: Tahoe-LAFS storage nodes for rent Message-ID: Welcome to the world, rentanode.nl! I'm delighted to hear that there is another company focused on helping customers use Tahoe-LAFS. I've already had two potential customers ask (on twitter) if it would be possible for someone to lease service from both rentanode.nl *and* leastauthority.com and spread the ciphertext across both services. Because of the architecture of Tahoe-LAFS, it would be easy for us to make that possible. Let's talk about making sure it can work. With our current setup, leastauthority.com always provides the introducer, and since you said the customer can provide their own introducer for rentanode.nl, then the easiest way to do it would be to use LAE's introducer. Note: decentralized introduction, either by running multiple redundant introducers per #68, or by some more advanced gossip protocol, will probably be coming out in a future version of Tahoe-LAFS. Presumably that would make it even easier for customers to combine our services. Regards, Zooko P.S. I think the announcement of rentanode.nl should be a headline in the next edition of the Tahoe-LAFS Weekly News! https://tahoe-lafs.org/trac/tahoe-lafs/ticket/68# implement distributed introduction, remove Introducer as a single point of failure _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From estesxwby5 at vauvert.com Fri Jun 15 01:16:06 2012 From: estesxwby5 at vauvert.com (=?koi8-r?B?IvPSz97OzywgzsXEz9LPx88sIMLF2iDQz9PSxcTOycvP1yI=?=) Date: Fri, 15 Jun 2012 17:16:06 +0900 Subject: =?koi8-r?B?8NLPxMHNINXewdPUz8sg0M/EINPU0s/J1MXM2NPU188g1yDrz9TUxcTW?= =?koi8-r?B?LtDP08XMLiDrycXXy8Eh?= Message-ID: <000d01cd4acf$1cfc39b0$6400a8c0@estesxwby5> Срочно распродаю свои участки 30, 70, и 250 соток! Панорамный вид, лес, сосновый бор, Возможность строительства собственного водоема Позвоните о цене договоримся 8 (z903 )z193zz06z23 From guido at wtmnd.nl Fri Jun 15 08:52:20 2012 From: guido at wtmnd.nl (Guido Witmond) Date: Fri, 15 Jun 2012 17:52:20 +0200 Subject: [tahoe-dev] Announcing RentaNode.nl: Tahoe-LAFS storage nodes for rent Message-ID: Hello Everyone, Some people might have guessed it from my activity on this list: As of today I announce my Tahoe-LAFS rental service. I'll offer private Tahoe-LAFS storage grids on geographically spread servers. Each customer gets their 'own' grid so they will have full control over access control, n-of-k encoding, data retention (garbage collection) and even introducer-rekeying. An introducer node is included for free to help those behind NAT-routers. Or bring your own. Although the Tahoe-protocol can do much more, the initial focus of the offering is on: 1) long term cloud backup of data and; 2) closed user group collaborative sharing. For now it will be a subscription service over the Internet to technocrats that can handle self-configuration. Later I'll add a hands-on service at customer sites and when the there is demand, preconfigured hardware, ready to deploy as a private grid for when the customer has more data to store than is viable with their network connection. I'll open the business soon, in the mean time feel free to have a look at my advertising: https://www.rentanode.nl/ With gratitude to the people that have made Tahoe-LAFS possible. /Me tips his hat to all of you! With regards, Guido Witmond. _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Jun 15 08:56:12 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 15 Jun 2012 17:56:12 +0200 Subject: [tahoe-dev] Announcing RentaNode.nl: Tahoe-LAFS storage nodes for rent Message-ID: <20120615155612.GJ17120@leitl.org> ----- Forwarded message from Guido Witmond ----- From torturerslg at deterrent.com Fri Jun 15 04:03:16 2012 From: torturerslg at deterrent.com (=?koi8-r?B?IvrBx8/Sz8TO2cogxM/NIg==?=) Date: Fri, 15 Jun 2012 20:03:16 +0900 Subject: =?koi8-r?B?8NLPxMHF1NPRIOTPzQ==?= Message-ID: <000d01cd4ae6$77250220$6400a8c0@torturerslg> Шикарный участок 40 соток рядом с Москвой (19 км). Коммуникации. Тел. (915) 122 73 26 From deidracarletta at wwdb.org Fri Jun 15 22:43:03 2012 From: deidracarletta at wwdb.org (LISE) Date: Sat, 16 Jun 2012 06:43:03 +0100 Subject: Viagra 100mg x 80 Pills $125, Free Pills & Reorder Discount, Top Selling 100% Quality & Satisfaction guaranteed! g50ik Message-ID: <201206161142.746ABF2F5843FE7D136E3@l06088e> Best Buy Viagra Generic Online - Viagra 100mg x 100 Pills $125, Free Pills & Reorder Discount, Top Selling 100% Quality & Satisfaction guaranteed! We accept VISA & e-check Payments, 90000+ Satisfied Customers! http://vchvvc.ru From eugen at leitl.org Sat Jun 16 01:52:55 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 16 Jun 2012 10:52:55 +0200 Subject: [tahoe-dev] Announcing RentaNode.nl: Tahoe-LAFS storage nodes for rent Message-ID: <20120616085255.GR17120@leitl.org> ----- Forwarded message from Zooko Wilcox-O'Hearn ----- From Alva.Campbell at inorp.com Sat Jun 16 07:28:21 2012 From: Alva.Campbell at inorp.com (Alva Campbell) Date: Sat, 16 Jun 2012 11:28:21 -0300 Subject: Drug s for ED cure Message-ID: <744016802098-PZVMBIRMCVBBSLDQUXFND@jwtxqz.inorp.com> Send your girl to the universe of pleasure using manhood-improving potion! Best variant for curing male device-associated problems! http://y.ahoo.it/88JyG From Wendell.Wheeler at ibiza-villa.net Sat Jun 16 12:26:07 2012 From: Wendell.Wheeler at ibiza-villa.net (Wendell Wheeler) Date: Sat, 16 Jun 2012 12:26:07 -0700 Subject: ED-pills Pure Herbal Medicine Message-ID: <33414663459-HCPILDRPVAKHKDDVKVIGD@dns631.ibiza-villa.net> Take one pilule and make your lovemaking wild and never-ending! You can return vigor right now! http://y.ahoo.it/0cPtX From brianc at smallworldnews.tv Sat Jun 16 12:30:32 2012 From: brianc at smallworldnews.tv (Brian Conley) Date: Sat, 16 Jun 2012 12:30:32 -0700 Subject: [liberationtech] Ethiopia criminalizes Skype? Message-ID: That was also my first thought. In Afghanistan, for example, out Iyad illegal to run voice or SMS gateways due to telco restrictions (and probably others). Until last year this made running SMS projects legally very difficult because the telcos didn't have good facilities for interfacing with small contractors, among other things. On Jun 15, 2012 3:16 PM, "Eva Galperin" wrote: > Criminalizing VOIP in order to preserve government and crony-held > monopolies on telecommunications is not uncommon. Companies like BiTek > sell VOIP-management tools to governments specifically aimed at > detecting and blocking Skype calls in order to preserve the revenue for > state-run telecoms. > > I would be much more worried about the proclamationsb anti-terrorism and > defamatory laws related provisions. > > > ************************************************ > Eva Galperin > International Freedom of Expression Coordinator > Electronic Frontier Foundation > eva at eff.org > (415) 436-9333 ex. 111 > ************************************************ > > On 6/15/12 11:18 AM, David Johnson wrote: > > http://www.techcentral.co.za/ethiopia-criminalises-skype/32723/ > > > > Ethiopiabs state-owned Internet service provider, the Ethiopian > > Telecommunication Corporation (Ethio-Telcom), has begun performing > > deep-packet inspection of all Internet traffic in the country. The > > countrybs government recently ushered in new legislation that > criminalises > > the use of services such as Skype, Google Talk and other forms of > Internet > > phone calling. ... > > > > > > > > > > _______________________________________________ > > liberationtech mailing list > > liberationtech at lists.stanford.edu > > > > Should you need to change your subscription options, please go to: > > > > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > > > If you would like to receive a daily digest, click "yes" (once you click > above) next to "would you like to receive list mail batched in a daily > digest?" > > > > You will need the user name and password you receive from the list > moderator in monthly reminders. You may ask for a reminder here: > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > > > Should you need immediate assistance, please contact the list moderator. > > > > Please don't forget to follow us on http://twitter.com/#!/Liberationtech > _______________________________________________ > liberationtech mailing list > liberationtech at lists.stanford.edu > > Should you need to change your subscription options, please go to: > > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > If you would like to receive a daily digest, click "yes" (once you click > above) next to "would you like to receive list mail batched in a daily > digest?" > > You will need the user name and password you receive from the list > moderator in monthly reminders. You may ask for a reminder here: > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > Should you need immediate assistance, please contact the list moderator. > > Please don't forget to follow us on http://twitter.com/#!/Liberationtech > _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From Reyna.Woodruff at haveabucket.com Sat Jun 16 17:00:52 2012 From: Reyna.Woodruff at haveabucket.com (Reyna Woodruff) Date: Sun, 17 Jun 2012 01:00:52 +0100 Subject: Sex Enhance Medicine Message-ID: <901324668627332-EIHZNDXUUQTHZGEDWTBAJLSR@mkkybikn.haveabucket.com> All girls will love to take a ride on your disco stick! Why suffering from dysfunction, when via-pilules are easy of access! http://y.ahoo.it/Jwk0J From lolitaingrid at christian.com Sat Jun 16 14:21:20 2012 From: lolitaingrid at christian.com (Christal) Date: Sun, 17 Jun 2012 01:21:20 +0400 Subject: Best Male Enhancement Penis Enlargement Pills 2012. Order Now! See The 4 Free Great Bonus Gifts 4e373g Message-ID: <201206170021.D01FAD2D4D60375AD8BD9C30@36si2oz> Bonus Gifts - PenisSolution Pills - 2012 Best Male Enhancement Penis Enlargement Pills 2012. Order Now! See The 4 Free Great Bonus Gifts http://scade.ru From Cesar.Hathaway at informeditalia.net Sat Jun 16 19:04:53 2012 From: Cesar.Hathaway at informeditalia.net (Cesar Hathaway) Date: Sun, 17 Jun 2012 03:04:53 +0100 Subject: Only licensed remedies Message-ID: <0525858794932-DETFUEAEFJEUEFXCSGCZRMZ@jjtrsxhbyr.informeditalia.net> Click here, we know what to do! Sad because of bad analysis? http://y.ahoo.it/jx168 From Goldie.Charles at garciamorales.com Sun Jun 17 03:34:03 2012 From: Goldie.Charles at garciamorales.com (Goldie Charles) Date: Sun, 17 Jun 2012 03:34:03 -0700 Subject: Reliable source of pharmaceuticals Message-ID: <160505981764306-MMNRCFVRACEBGINVVZPJ@eyzdre.garciamorales.com> Give your semen more energy! Free 4-12 items for you with Any Purchase http://y.ahoo.it/oizWz From alex.comninos at gmail.com Sun Jun 17 02:59:23 2012 From: alex.comninos at gmail.com (Alex Comninos) Date: Sun, 17 Jun 2012 11:59:23 +0200 Subject: [liberationtech] Ethiopia criminalizes Skype? Message-ID: Seeing as Addis is the seat of the African Union, there are two scenarios here: 1. Business as usual at The African Union will be severely impaired. 2. This will be unevenly implemented, with expatriates and AU officials informally exempt. On 15 Jun 2012 20:18, "David Johnson" wrote: > http://www.techcentral.co.za/ethiopia-criminalises-skype/32723/ > > Ethiopiabs state-owned Internet service provider, the Ethiopian > Telecommunication Corporation (Ethio-Telcom), has begun performing > deep-packet inspection of all Internet traffic in the country. The > countrybs government recently ushered in new legislation that criminalises > the use of services such as Skype, Google Talk and other forms of Internet > phone calling. ... > > -- > > David V. Johnson > Web Editor > Boston Review > Website: http://www.bostonreview.net > > Twitter: http://twitter.com/BostonReview > Tumblr: http://bostonreview.tumblr.com > > Mailing Address: > San Francisco Writers' Grotto > 490 2nd Street, 2nd Fl. > San Francisco, CA 94107 > > Cell: (917)903-3706 > > > > _______________________________________________ > liberationtech mailing list > liberationtech at lists.stanford.edu > > Should you need to change your subscription options, please go to: > > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > If you would like to receive a daily digest, click "yes" (once you click > above) next to "would you like to receive list mail batched in a daily > digest?" > > You will need the user name and password you receive from the list > moderator in monthly reminders. You may ask for a reminder here: > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > Should you need immediate assistance, please contact the list moderator. > > Please don't forget to follow us on http://twitter.com/#!/Liberationtech > _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sun Jun 17 03:35:24 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 17 Jun 2012 12:35:24 +0200 Subject: [liberationtech] Ethiopia criminalizes Skype? Message-ID: <20120617103524.GK17120@leitl.org> ----- Forwarded message from Alex Comninos ----- From lists at infosecurity.ch Sun Jun 17 04:03:40 2012 From: lists at infosecurity.ch (Fabio Pietrosanti (naif)) Date: Sun, 17 Jun 2012 13:03:40 +0200 Subject: [liberationtech] Chinese preparing for a "Autonomous Internet" ? Message-ID: Hi all, i wanted to notice that there is a new internet draft in IETF that should make us think on the chinese government respect strategies to internet governance issues. DNS Extension for Autonomous Internet(AIP) https://tools.ietf.org/html/draft-diao-aip-dns-00 This proposal by China Telecom, China Mobile & Guangdong Commercial College propose. Even if we know that "root servers" are very well distributed across the world / countries trough a collaborative system, chinese see this as a "central control". >From Introduction on Root DNS: " But its central control method is not suitable to autonomy and scalability and can't keep up with the fast development of Internet. To national internet network, owning its independent root DNS server and realize autonomy in Internet is a problem not only for the cost but also for the technical difficulty. It is almost impossible in current DNS architecture." >From AIP DNS Architecture: "In order to realize the transition from Internet to Autonomous Internet, each partition of current Internet should first realize possible self-government and gradually reduce its dependence on the foreign domain names, such as COM, NET et al." So basically the chinese play is not of being part of a collaborative internet, but driving strategically the direction to become an independent island in the world. -naif _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sun Jun 17 04:09:22 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 17 Jun 2012 13:09:22 +0200 Subject: [liberationtech] Chinese preparing for a "Autonomous Internet" ? Message-ID: <20120617110922.GP17120@leitl.org> ----- Forwarded message from "Fabio Pietrosanti (naif)" ----- From bill.stewart at pobox.com Sun Jun 17 13:44:31 2012 From: bill.stewart at pobox.com (Bill Stewart) Date: Sun, 17 Jun 2012 13:44:31 -0700 Subject: [liberationtech] Ethiopia criminalizes Skype? In-Reply-To: <20120617103524.GK17120@leitl.org> References: <20120617103524.GK17120@leitl.org> Message-ID: <20120617204430.82E1BB5EA@b-pb-sasl-sd.pobox.com> > > http://www.techcentral.co.za/ethiopia-criminalises-skype/32723/ > > > > Ethiopiabs state-owned Internet service provider, the Ethiopian > > Telecommunication Corporation (Ethio-Telcom), has begun performing > > deep-packet inspection of all Internet traffic in the country. The > > countrybs government recently ushered in new legislation that criminalises > > the use of services such as Skype, Google Talk and other forms of Internet > > phone calling. ... This isn't entirely surprising. Aside from the traditional problem of monopoly telecom companies not liking competition, Ethiopia's been routinely wiretapping phone calls for years. Back in the 90s, a Dutch friend of mine was doing development work in Somaliland and Ethiopia, and the phone operator once interrupted one of his calls to tell him to stop speaking Dutch, and use some language the police could understand, like English, Italian, Amharic, or one of the local languages. He considered getting PGP for his email, but decided it was more likely to give the police an excuse to confiscate his computers, which they'd have done more for general corruption than actual politics. Bill Stewart From Justine.Wolf at fatihpen.com.jfet.org Sun Jun 17 03:17:42 2012 From: Justine.Wolf at fatihpen.com.jfet.org (Justine Wolf) Date: Sun, 17 Jun 2012 14:17:42 +0400 Subject: Shop for Viagra here Message-ID: <210194375433750-VJBKBXKNQSIZRDMSKNGHG@jq7.fatihpen.com> Super hot nights without any problems with getting and maintaining a bone-on! It can make your wiener a real piece of steel when it comes to action! http://y.ahoo.it/MfHhY From tuttleholly at overlandpartners.com Sun Jun 17 07:53:35 2012 From: tuttleholly at overlandpartners.com (BRIGITTE) Date: Sun, 17 Jun 2012 18:53:35 +0400 Subject: Exclusive & competitive discount prices, express shipping & discrete packaging. Buy Cialis online from an official certified pharmacy ljhrh533 Message-ID: <201206171655.53DC2BFECFBBB469B3D78E@71p48j7p1m> Buy Cialis Online :: OVERNIGHT Delivery! Buy Cialis online from an official certified pharmacy, OVERNIGHT Shipping, Exclusive & competitive discount prices, express shipping & discrete packaging. http://zjfkqf.ru From poor.ricardo at gmail.com Sun Jun 17 21:48:19 2012 From: poor.ricardo at gmail.com (Poor Richard) Date: Sun, 17 Jun 2012 21:48:19 -0700 (PDT) Subject: PeerPoint (building-a-distributed-decentralized-internet@googlegroups.com) Message-ID: Hi Isaac. I've just subscribed to the p2p-hackers list and I'm reaching out to all the other groups and projects that have been mentioned. I've also been invited to post the PeerPoint proposal on the P2P Foundation Blog. The idea is to invite a wider community to crowdsource further evolution of the specs. I added an intro to the specs that I and others can easily email with the link to the full doc: Greets, p2p peeps! > > PeerPoint is an evolving crowdsourced design specification for a suite of > integrated peer-to-peer applications to include (but not limited to) social > networking, real-time project collaboration, content management, database > management, voting, trust/reputation metrics, complementary currency, crowd > funding, etc. This specification overlaps with many existing p2p > infrastructure and social networking projects but also goes substantially > beyond anything yet existing. Members of other projects are encouraged to > participate in further developing the open PeerPoint specs and to adopt any > part of the specs that they can use. > > To participate in developing this specification, please join the Next Net > Google Groupand read the PeerPoint > topic. > I am not actually trying to start another development project. PeerPoint is an open, high-level functional specification for where I think all the open p2p projects are eventually heading as a group. I want to get as many of those current projects as I can to participate in evolving the PeerPoint spec further and adding increasing levels of detail that are beyond my competence. Any suggestions? PR On Sunday, June 17, 2012 8:00:54 PM UTC-5, Isaac Wilder wrote: > > Zooko Wilcox O'Hearn runs a mailing list called p2p-hackers, but it's > more for protocol/network design. > There's SecuShare, GNUnet, Tonika, and Sneer. All of which are existing > projects in the space that could certainly use your help. I still do not > understand the need for another separate project. Why not work with what's > out there? > > imw > > > On 06/17/2012 07:45 PM, Poor Richard wrote: > > Thanks for the suggestions, Mark. I'll try to hook up with theglobalsquare > folks. As for the P2P Foundation, they seem more interested in the movement > and culture than the technology at the moment. I'm on their mail list and > I'm curating a facebook groupfor the p2p peeps there. > > PR > > On Wednesday, June 13, 2012 7:45:55 PM UTC-5, Mark Janssen-Rosenbluth > wrote: >> >> On Wed, Jun 13, 2012 at 6:55 PM, Poor Richard wrote: >>> >>> BTW as far as I can tell, there is no online forum dedicated to the >>> general topic of p2p application software architecture for free/open source >>> software designers, developers, engineers, etc. Discussions of p2p >>> architecture tend to be found mostly in the discussions of specific >>> p2p networking projects like freenet and FreedomBox and they tend to apply >>> to the lower-level network routing and file-sharing issues instead of >>> the higher application software level for real-time, interactive >>> collaboration. If anyone knows of a general p2p *application*architecture group or forum, please let me know. >>> >>> (In case you don't know,) you might want to check out the >> P2P-Foundation (which has a long-standing discussion on these topics) and >> theglobalsquare which is trying to implement same. >> >> mark >> > > ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From noreply at faceboook.com.jfet.org Mon Jun 18 03:13:54 2012 From: noreply at faceboook.com.jfet.org (Facebook Team) Date: Mon, 18 Jun 2012 11:13:54 +0100 Subject: New comment on your status update Message-ID: <3BF7FF31.3A8D0D6D@faceboook.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 867 bytes Desc: not available URL: From eugen at leitl.org Mon Jun 18 04:38:31 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 18 Jun 2012 13:38:31 +0200 Subject: PeerPoint (building-a-distributed-decentralized-internet@googlegroups.com) Message-ID: <20120618113831.GL17120@leitl.org> ----- Forwarded message from Poor Richard ----- From brandon.novak at student.ottawa.edu Mon Jun 18 07:22:49 2012 From: brandon.novak at student.ottawa.edu (=?koi8-r?B?IuvV0tMgIuvh5PLv9+/lIOTl7O8iIg==?=) Date: Mon, 18 Jun 2012 16:22:49 +0200 Subject: =?koi8-r?B?6c7T0MXL1M/S1SDQzyDLwcTSwc0=?= Message-ID: <01cd4d6e$9a0e9280$beedadbc@brandon.novak> В отдел кадров Не упустите возможность провести лето с пользой в культурной столице России! 25-26 июня в Санкт-Петербурге пройдет КУРС ПОВЫШЕНИЯ КВАЛИФИКАЦИИ: "Применение трудового кодекса в 2012 году" Записаться на курс или задать вопросы можно по телефону: /8l2/ 6Ч2/86/95 Курс полезен для кадровых служб и руководителей. План проведения курса: 1. Основные вопросы кадрового делопроизводства. 2. Правовые аспекты деятельности кадровых служб. 3. Локальные нормативные акты организации. 4. Порядок найма персонала. 5. Расстановка кадров в организации. 6. Система увольнения персонала. 7. Трудовой договор, нормативно-правовая база. 8. Трудовая книжка, виды трудовых книжек, стандарты бланков. 9. Система оплаты труда, заработная плата, премирование, исчисление средней заработной платы. 10. Ежегодные отпуска, компенсации за неиспользованный отпуск. 11. Больничный лист, новые правила заполнения, страховой стаж. 12. Обязательные медицинские обследования работников, новое в законодательстве. 13. Архивное делопроизводство, новые сроки хранения кадровой документации, номенклатура дел. From brian at netisi.com Mon Jun 18 08:28:56 2012 From: brian at netisi.com (=?koi8-r?B?IufP09zL09DF0tTJ2sEgxM/L1c3FztTBw8nJIg==?=) Date: Mon, 18 Jun 2012 16:28:56 +0100 Subject: =?koi8-r?B?1yDLwcvJyCDTzNXewdHIINfZ0M/MztHF1NPRIMfP09XEwdLT1NfFzg==?= =?koi8-r?B?zsHRINzL09DF0tTJ2sEg0NLPxcvUzs/KIMTPy9XNxc7UwcPJySDOwQ==?= =?koi8-r?B?IMfB2s/TzsHC1sXOycU/?= Message-ID: <01cd4d6f$74ce5400$2f13e559@brian> Центр повышения квалификации приглашает всех желающихна образовательное мероприятие по теме:"НОВЫЙ ПОРЯДОК ГОСУДАРСТВЕННОЙ СТРОИТЕЛЬНОЙ ЭКСПЕРТИЗЫ, СТРОИТЕЛЬНЫЙ НАДЗОР, АДМИНИСТРАТИВНАЯ ОТВЕТСТВЕННОСТЬ",который пройдет в Санкт-Петербургев период с 25 по 26 июня! Телефон для получения подробной информации: (812) 642. 07. 76 ПРОГРАММА КУРСА: Современная законодательно-нормативная база инвестиционно-строительного процесса в т.ч. новый Градостроительный Кодекс РФ и другие документы. Изменения в законодательстве РФ по вопросам проведения государственной экспертизы проектной документации. Постановление Правительства РФ от 05.03.2007 # 145 "О порядке организации и проведения государственной экспертизы проектной документации и результатов инженерных изысканий". Новое в подготовке исходно-разрешительной документации на проектирование и строительство; порядок разработки, согласования и утверждения проектной документации, ее состав и содержание; обоснование инвестиций и проекта строительства. Стоимость проектно-изыскательских работ. Порядок проверки достоверности заявленной стоимости строительства и стоимости проектно-изыскательных работ. Проведение Единой государственной экспертизы проектной документации и результатов инженерных изысканий. Требования к составу проектной документации, сроки проведения экспертизы. Негосударственная экспертиза проектно-сметной документации. Новый порядок экспертизы проектно-сметной документации (введен в действие с 1.01.2006г.). Экспертные органы, их перечень, распределение функций между ними, методические рекомендации по проведению экспертизы на строительство зданий жилищно-гражданского и производственного назначения, экспертный мониторинг объектов, новое в определении стоимости экспертизы. Госэкспертиза документации по принципу "одного окна", практика оценки качества проектных решений с учетом соблюдения стандартов качества. Требования по составу документации, предъявляемой на экспертизу в зависимости от стадии проектирования. Особенности обследования зданий и сооружений и составления материалов для разработки проектной документации по реконструкции и капитальному ремонту. Требования к предъявляемым на экспертизу результатам материалов инженерных изысканий. Порядок проведения экспертизы результатов по материалам инженерных изысканий. Экспертиза проектной документации по конструктивным решениям. Применение нестандартных методов расчета конструкций и конструкционных систем, при которых объект может быть отнесен к разряду уникальных объектов. Требования к сметной части проектно-сметной документации. Особенности формирования сметной стоимости строительства при представлении документации на переутверждение. Выдача разрешений на строительство. Состав документов; содержание градостроительного плана участка; специфика выдачи разрешений на различные виды объектов. Требования СниП и других нормативов при проектировании и строительстве, практика их соблюдения. Подготовка задания на проектирование объекта, определение стоимости проектных работ, согласование проектных работ. Государственный строительный надзор. Комментарии к руководящим документам. Выдача разрешений на ввод объектов в эксплуатацию. Практика привлечения к административной ответственности за нарушения в сфере градостроительной деятельности. Стандарты саморегулируемых организаций в строительстве. Последние изменения в законодательстве о саморегулировании в строительстве. Нормативно-техническое регулирование в условиях саморегулирования. Экономическая эффективность инвестиций и ее обоснование в проектах строительства. Обоснование инвестиций. РЕГИСТРАЦИЯ на мероприятие по телефону оргкомитета: |8I2| 6 Ч 2 : О 7 : 7 6 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6095 bytes Desc: not available URL: From alzavala at irco.com Mon Jun 18 03:06:08 2012 From: alzavala at irco.com (Jefferey Singh) Date: Mon, 18 Jun 2012 17:06:08 +0700 Subject: Bonus Gifts - PenisSolution Pills - 2012 btcdum Message-ID: <201206180402.4BBC34A3A7BE19BF1522@b2p9hko8> Bonus Gifts - PenisSolution Pills - 2012 Best Male Enhancement Penis Enlargement Pills 2012. Order Now! See The 4 Free Great Bonus Gifts http://fraro.ru From allan.jones at bbandt.com Mon Jun 18 07:46:36 2012 From: allan.jones at bbandt.com (=?koi8-r?B?IvLVy8/Xz8TJ1MXM2CDQzMHOz9fPLdzLz87PzcnexdPLz8og08zV1g==?= =?koi8-r?B?wtki?=) Date: Mon, 18 Jun 2012 17:46:36 +0300 Subject: =?koi8-r?B?x8TFINDPzNXeydTYINLB2tLF28XOydEgzsEg09TSz8nUxczY09TXzw==?= =?koi8-r?B?Pw==?= Message-ID: <01cd4d7a$4e61e600$cd8e854f@allan.jones> Центр повышения квалификации приглашает всех желающихна образовательное мероприятие по теме:"НОВЫЙ ПОРЯДОК ГОСУДАРСТВЕННОЙ СТРОИТЕЛЬНОЙ ЭКСПЕРТИЗЫ, СТРОИТЕЛЬНЫЙ НАДЗОР, АДМИНИСТРАТИВНАЯ ОТВЕТСТВЕННОСТЬ",который пройдет в Санкт-Петербургев период с 25 по 26 июня! Телефон для получения подробной информации: (812) 642. 07. 76 ПРОГРАММА КУРСА: Современная законодательно-нормативная база инвестиционно-строительного процесса в т.ч. новый Градостроительный Кодекс РФ и другие документы. Изменения в законодательстве РФ по вопросам проведения государственной экспертизы проектной документации. Постановление Правительства РФ от 05.03.2007 # 145 "О порядке организации и проведения государственной экспертизы проектной документации и результатов инженерных изысканий". Новое в подготовке исходно-разрешительной документации на проектирование и строительство; порядок разработки, согласования и утверждения проектной документации, ее состав и содержание; обоснование инвестиций и проекта строительства. Стоимость проектно-изыскательских работ. Порядок проверки достоверности заявленной стоимости строительства и стоимости проектно-изыскательных работ. Проведение Единой государственной экспертизы проектной документации и результатов инженерных изысканий. Требования к составу проектной документации, сроки проведения экспертизы. Негосударственная экспертиза проектно-сметной документации. Новый порядок экспертизы проектно-сметной документации (введен в действие с 1.01.2006г.). Экспертные органы, их перечень, распределение функций между ними, методические рекомендации по проведению экспертизы на строительство зданий жилищно-гражданского и производственного назначения, экспертный мониторинг объектов, новое в определении стоимости экспертизы. Госэкспертиза документации по принципу "одного окна", практика оценки качества проектных решений с учетом соблюдения стандартов качества. Требования по составу документации, предъявляемой на экспертизу в зависимости от стадии проектирования. Особенности обследования зданий и сооружений и составления материалов для разработки проектной документации по реконструкции и капитальному ремонту. Требования к предъявляемым на экспертизу результатам материалов инженерных изысканий. Порядок проведения экспертизы результатов по материалам инженерных изысканий. Экспертиза проектной документации по конструктивным решениям. Применение нестандартных методов расчета конструкций и конструкционных систем, при которых объект может быть отнесен к разряду уникальных объектов. Требования к сметной части проектно-сметной документации. Особенности формирования сметной стоимости строительства при представлении документации на переутверждение. Выдача разрешений на строительство. Состав документов; содержание градостроительного плана участка; специфика выдачи разрешений на различные виды объектов. Требования СниП и других нормативов при проектировании и строительстве, практика их соблюдения. Подготовка задания на проектирование объекта, определение стоимости проектных работ, согласование проектных работ. Государственный строительный надзор. Комментарии к руководящим документам. Выдача разрешений на ввод объектов в эксплуатацию. Практика привлечения к административной ответственности за нарушения в сфере градостроительной деятельности. Стандарты саморегулируемых организаций в строительстве. Последние изменения в законодательстве о саморегулировании в строительстве. Нормативно-техническое регулирование в условиях саморегулирования. Экономическая эффективность инвестиций и ее обоснование в проектах строительства. Обоснование инвестиций. РЕГИСТРАЦИЯ на мероприятие по телефону оргкомитета: |8I2| 6 Ч 2 : О 7 : 7 6 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6017 bytes Desc: not available URL: From brendan at gerber.com Mon Jun 18 08:52:05 2012 From: brendan at gerber.com (=?koi8-r?B?Iu/UxMXMIM/C1d7FzsnRIg==?=) Date: Mon, 18 Jun 2012 17:52:05 +0200 Subject: =?koi8-r?B?68HE0s/Xz8UgxMXMz9DSz8na18/E09TXzw==?= Message-ID: <01cd4d7b$127b5080$94b687b2@brendan> В отдел кадров Не упустите возможность провести лето с пользой в культурной столице России! 25-26 июня в Санкт-Петербурге пройдет КУРС ПОВЫШЕНИЯ КВАЛИФИКАЦИИ: "Применение трудового кодекса в 2012 году" Записаться на курс или задать вопросы можно по телефону: /8l2/ 6Ч2/86/95 Курс полезен для кадровых служб и руководителей. План проведения курса: 1. Основные вопросы кадрового делопроизводства. 2. Правовые аспекты деятельности кадровых служб. 3. Локальные нормативные акты организации. 4. Порядок найма персонала. 5. Расстановка кадров в организации. 6. Система увольнения персонала. 7. Трудовой договор, нормативно-правовая база. 8. Трудовая книжка, виды трудовых книжек, стандарты бланков. 9. Система оплаты труда, заработная плата, премирование, исчисление средней заработной платы. 10. Ежегодные отпуска, компенсации за неиспользованный отпуск. 11. Больничный лист, новые правила заполнения, страховой стаж. 12. Обязательные медицинские обследования работников, новое в законодательстве. 13. Архивное делопроизводство, новые сроки хранения кадровой документации, номенклатура дел. From auto-notify at ups.com Mon Jun 18 09:33:38 2012 From: auto-notify at ups.com (UPS Quantum View) Date: Mon, 18 Jun 2012 18:33:38 +0200 Subject: Your UPS delivery tracking. Message-ID: <4FDF5851.204050@ups.com> Discover more about UPS: Visit www.ups.com Sign Up For Additional E-Mail From UPS Read Compass Online This message was sent to you at the request of ICRealtime Security Solutions LLC to notify you that the electronic shipment information below has been transmitted to UPS. The physical package(s) may or may not have actually been tendered to UPS for shipment. To verify the actual transit status of your shipment, click on the tracking link below or contact ICRealtime Security Solutions LLC directly. Important Delivery Information Scheduled Delivery: 09-May-2012 Shipment Detail Ship To: cypherpunks at jfet.org CSI SECURITY 2269 JEFFERIES HWY. WALTERBORO SC 29488 US Number of Packages: 1 UPS Service: GROUND Weight: 9.0 LBS Tracking Number: 1ZX603R40369384687 Reference Number 1: 47479 Reference Number 2: 20872 Click here to track if UPS has received your shipment or visit http://www.ups.com/WebTracking/track?loc=en_US on the Internet. ____2@@2@@2wowT7qQAXmBSs4ogrWusagY4wa____ ) 2012 United Parcel Service of America, Inc. UPS, the UPS brandmark, and the color brown are trademarks of United Parcel Service of America, Inc. All rights reserved. For more information on UPS's privacy practices, refer to the UPS Privacy Policy. Please do not reply directly to this e-mail. UPS will not receive any reply message. For questions or comments, visit Contact UPS. This communication contains proprietary information and may be confidential. If you are not the intended recipient, the reading, copying, disclosure or other use of the contents of this e-mail is strictly prohibited and you are instructed to please delete this e-mail immediately. Privacy Notice Contact UPS -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9151 bytes Desc: not available URL: From noreply at mygoodtogo.com Mon Jun 18 10:45:43 2012 From: noreply at mygoodtogo.com (Facebook Team) Date: Mon, 18 Jun 2012 18:45:43 +0100 Subject: News from Facebook Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/html Size: 842 bytes Desc: not available URL: From mfidelman at meetinghouse.net Mon Jun 18 21:34:20 2012 From: mfidelman at meetinghouse.net (Miles Fidelman) Date: Tue, 19 Jun 2012 00:34:20 -0400 Subject: PeerPoint Discussion - please don't use for other topics Message-ID: Actually, I think both comments are partially on the mark, and partially off the mark. We HAVE had peer-to-peer applications, of various sorts, for years. USENET comes to mind (I can't think of very much that any centralized social networks do that USENET news wasn't doing years ago. And at one point, someone did a very nice implementation of USENET on top of a distributed hash table). The failure of USENET has a lot more do to with not finding a viable solution to spam than anything else. Currently, distributed CVS systems (notably GIT) are a peer-to-peer application that's very successful. And then there's torrent. Re. Wikipedia and Linux: Both build on rather rich ecosystems of prior art, and development communities. Wikis came first, in various flavors, wikipedia. The world wide web virtual library predated wikipedia by decades. It took a lot of experimentation, plus vision and drive before wikipedia coalesced. Linux builds on the legacy of Unix and lets not forget all the stuff done by Stallman and the FSF (e.g, all the gnu tools and gnu userspace without which Linux would be useless). The problem with Poor Richard's proposal is severalfold: 1. lack of specificity - "let's build a P2P application suite" is a pretty content free statement - the PeerPoint "specification" really isn't anything resembling much of a specification 2. lack of vision - Ted Nelson's "Dream Machine's" book and Xanadu concept never really led to any widely used code, but they sure inspired a lot of people - precisely because Nelson laid out a vision of new capabilities -- other people went on to implement some of those ideas 3. lack of understanding about how technology evolves - open source or not - it involves an ecosystem and a process of incremental development, punctuated by flashes of insight 4. lack of anything motivating - is there really that much dissatisfaction with FaceBook? I mean, an awful lot of people use it, and there are alternatives for old reprobates like me who find FaceBook pretty insipid and useless (except for keeping track of my kid). For real work, email lists have been around an awfully long time, and don't seem to be going away anytime soon. The folks who REALLY worry about privacy/secrecy are using VPNs, encryption, darknets, etc. "Let's build an application suite" is a mantra that leads to things like MS Office. "Let's build an open source application suite" leads to OpenOffice and LibreOffice - which are essentially not-as-good imitations of MS Office. I simply don't see anything in the PeerPoint proposal that goes beyond "let's do x, y, and z, but let's do it peer-to-peer." Now if Poor Richard were to start developing stuff, that actually did useful and interesting things, I expect it would attract a community. But just saying "I think people should do ," where is generally uninspired and uninteresting, is not a recipe for anything. Paul Hughes wrote: > Mark, > > Wikipedia and Linux are two prime examples of substantive creations greater than Poor Richard's proposal that were done almost entirely by volunteers with no desire for compensation other than the joy of creating something awesome. > > I believe the time is ripe for PeerPoint or something equivalent. In fact it's long overdue. Because of the growing dissatisfaction with Facebook, and efforts to control and censor the net, there are more people wanting, and willing to build something like this than ever before. > > Paul > > > > On Jun 18, 2012, at 20:15, Mark Janssen-Rosenbluth wrote: > >> Richard, there is very little such application suites on the "drawing board" because we're way ahead of you. These conversations have been going on for over a decade. You're excited to get started, so you start afresh, but many of us have heard it all before. That there isn't something more by now is a difficult fact to explain. But probably the biggest reason is that after the litigation over p2p file-sharing and such, no one (with financial resources or political clout) has taken the "leap of faith" to "get it done". Such a comprehensive and radical project isn't that far from the process that created the protocols of the whole Internet to begin with... and you know how many years and millions that took.... >> >> So, if you want this to happen, I suggest you solve the political and/or financing problem.... don't go rei-inventing the wheel. >> >> mark j -- In theory, there is no difference between theory and practice. In practice, there is. .... Yogi Berra ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bhurtig at eccmllc.com Mon Jun 18 10:09:54 2012 From: bhurtig at eccmllc.com (=?koi8-r?B?IvPU0s/J1MXM2M7ZyiDOwcTaz9Ig08XNyc7B0iI=?=) Date: Tue, 19 Jun 2012 02:09:54 +0900 Subject: =?koi8-r?B?0sHa0sXbxc7JxSDOwSDT1NLPydTFzNjT1NfPIMTM0SDT1cLQz8TS0Q==?= =?koi8-r?B?xN7Jy8E=?= Message-ID: <01cd4dc0$9dcb0500$c535973a@bhurtig> Центр повышения квалификации приглашает всех желающихна образовательное мероприятие по теме:"НОВЫЙ ПОРЯДОК ГОСУДАРСТВЕННОЙ СТРОИТЕЛЬНОЙ ЭКСПЕРТИЗЫ, СТРОИТЕЛЬНЫЙ НАДЗОР, АДМИНИСТРАТИВНАЯ ОТВЕТСТВЕННОСТЬ",который пройдет в Санкт-Петербургев период с 25 по 26 июня! Телефон для получения подробной информации: (812) 642. 07. 76 ПРОГРАММА КУРСА: Современная законодательно-нормативная база инвестиционно-строительного процесса в т.ч. новый Градостроительный Кодекс РФ и другие документы. Изменения в законодательстве РФ по вопросам проведения государственной экспертизы проектной документации. Постановление Правительства РФ от 05.03.2007 # 145 "О порядке организации и проведения государственной экспертизы проектной документации и результатов инженерных изысканий". Новое в подготовке исходно-разрешительной документации на проектирование и строительство; порядок разработки, согласования и утверждения проектной документации, ее состав и содержание; обоснование инвестиций и проекта строительства. Стоимость проектно-изыскательских работ. Порядок проверки достоверности заявленной стоимости строительства и стоимости проектно-изыскательных работ. Проведение Единой государственной экспертизы проектной документации и результатов инженерных изысканий. Требования к составу проектной документации, сроки проведения экспертизы. Негосударственная экспертиза проектно-сметной документации. Новый порядок экспертизы проектно-сметной документации (введен в действие с 1.01.2006г.). Экспертные органы, их перечень, распределение функций между ними, методические рекомендации по проведению экспертизы на строительство зданий жилищно-гражданского и производственного назначения, экспертный мониторинг объектов, новое в определении стоимости экспертизы. Госэкспертиза документации по принципу "одного окна", практика оценки качества проектных решений с учетом соблюдения стандартов качества. Требования по составу документации, предъявляемой на экспертизу в зависимости от стадии проектирования. Особенности обследования зданий и сооружений и составления материалов для разработки проектной документации по реконструкции и капитальному ремонту. Требования к предъявляемым на экспертизу результатам материалов инженерных изысканий. Порядок проведения экспертизы результатов по материалам инженерных изысканий. Экспертиза проектной документации по конструктивным решениям. Применение нестандартных методов расчета конструкций и конструкционных систем, при которых объект может быть отнесен к разряду уникальных объектов. Требования к сметной части проектно-сметной документации. Особенности формирования сметной стоимости строительства при представлении документации на переутверждение. Выдача разрешений на строительство. Состав документов; содержание градостроительного плана участка; специфика выдачи разрешений на различные виды объектов. Требования СниП и других нормативов при проектировании и строительстве, практика их соблюдения. Подготовка задания на проектирование объекта, определение стоимости проектных работ, согласование проектных работ. Государственный строительный надзор. Комментарии к руководящим документам. Выдача разрешений на ввод объектов в эксплуатацию. Практика привлечения к административной ответственности за нарушения в сфере градостроительной деятельности. Стандарты саморегулируемых организаций в строительстве. Последние изменения в законодательстве о саморегулировании в строительстве. Нормативно-техническое регулирование в условиях саморегулирования. Экономическая эффективность инвестиций и ее обоснование в проектах строительства. Обоснование инвестиций. РЕГИСТРАЦИЯ на мероприятие по телефону оргкомитета: |8I2| 6 Ч 2 : О 7 : 7 6 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6095 bytes Desc: not available URL: From a.greisl at actuariesunlimited.com Mon Jun 18 13:40:02 2012 From: a.greisl at actuariesunlimited.com (=?koi8-r?B?Iu/UxMXMIM/C1d7FzsnRIg==?=) Date: Tue, 19 Jun 2012 02:10:02 +0530 Subject: =?koi8-r?B?9yDTzNXWwtUg0MXS08/OwczB?= Message-ID: <01cd4dc0$a28fb900$4120a37a@a.greisl> В отдел кадров Не упустите возможность провести лето с пользой в культурной столице России! 25-26 июня в Санкт-Петербурге пройдет КУРС ПОВЫШЕНИЯ КВАЛИФИКАЦИИ: "Применение трудового кодекса в 2012 году" Записаться на курс или задать вопросы можно по телефону: /8l2/ 6Ч2/86/95 Курс полезен для кадровых служб и руководителей. План проведения курса: 1. Основные вопросы кадрового делопроизводства. 2. Правовые аспекты деятельности кадровых служб. 3. Локальные нормативные акты организации. 4. Порядок найма персонала. 5. Расстановка кадров в организации. 6. Система увольнения персонала. 7. Трудовой договор, нормативно-правовая база. 8. Трудовая книжка, виды трудовых книжек, стандарты бланков. 9. Система оплаты труда, заработная плата, премирование, исчисление средней заработной платы. 10. Ежегодные отпуска, компенсации за неиспользованный отпуск. 11. Больничный лист, новые правила заполнения, страховой стаж. 12. Обязательные медицинские обследования работников, новое в законодательстве. 13. Архивное делопроизводство, новые сроки хранения кадровой документации, номенклатура дел. From coderman at gmail.com Tue Jun 19 02:30:22 2012 From: coderman at gmail.com (coderman) Date: Tue, 19 Jun 2012 02:30:22 -0700 Subject: [cryptography] Intel RNG Message-ID: On Tue, Jun 19, 2012 at 12:48 AM, Marsh Ray wrote: >... > Right, 500 MB/s of random numbers out to be enough for anybody. these rates often are not useful. even busy secure web or VPN servers use orders of magnitude less. initialization of full disk crypto across an SSD RAID could consume it, but that's the only "practical" use case i've encountered so far :) that said, a typical host entropy gathering daemon is often insufficient, and even off-die serial bus and other old skewl sources were providing entropy in kbit/sec rates, not MByte/sec. > My main point in running the perf numbers was to figure out the > justification for this RNG not being vulnerable to entropy depletion attacks > in shared hosting environments. some (many?) HWRNG designs use bit accumulators that feed a register that is read by a userspace instruction. consider the following configuration: - this register is collecting single bits from two high speed oscillators that is sub-sampling single bits at a quarter clock. - only whitened / non-run bits collected, as set in a configuration write / initialization. in short: providing slow, non-deterministic output rates to this entropy instruction. if the instruction is configured to not-block, you could starve the available pool in one thread, in one process, by using it aggressively. if the instruction is configured to block, you could introduce significantly processing delays (unexpectedly so?) to other consumers in other threads of execution, or other processes. Intel did an end run around this problem with the DRBG, which is similar to urandom, in the sense that it does not provide a 1:1 correlation of entropy in the system to entropy bits returned out, as you may get in /dev/random linux behavior, which blocks once the kernel entropy pool is exhausted. (that's another rant/tangent. let's not go there :) > Still, 150 clocks is a crazy long time for an instruction that doesn't > involve a cache miss or a TLB flush or the like. >... > So something is causing AES-NI to take 300 clocks/block to run this DRBG. > Again, more than 3x slower than the benchmarks I see for the hardware > primitive. My interpretation is that either RdRand is blocking due to > "entropy depletion", there's some internal data pipe bottleneck, or maybe > some of both. it is also seeding from the physical noise sources, running sanity checks of some type, and then handing over to DRBG. so there is clearly more involved than just a call to AES-NI. 3x as expensive doesn't sound unreasonable if the seeding and validation overhead is significant. > If in reality there's no way RDRAND can ever fail to return 64 bits of > random data, then Intel could document that fact and we could save the world > from yet another untested exceptional code path that only had a moderate > chance of working the first time it's really needed anyway. that's a great idea, and my reading of it is that they have said as much. perhaps they should more clearly state it so for the usual case. my understanding is that you will never fail unless the hardware itself "starts up"? with a broken physical source returning clearly invalid bits. E.g. "In the rare event that the DRNG fails during runtime, it would cease to issue random numbers rather than issue poor quality random numbers." as for stating that it should never "run dry", or fail to not return bits as long as the instruction is working, no matter how frequently it is invoked, see: """ With respect to the RNG taxonomy discussed above, the DRNG follows the cascade construction RNG model, using a processor resident entropy source to repeatedly seed a hardware-implemented CSPRNG. Unlike software approaches, it includes a high-quality entropy source implementation that can be sampled quickly to repeatedly seed the CSPRNG with high-quality entropy. Furthermore, it represents a self-contained hardware module that is isolated from software attacks on its internal state. The result is a solution that achieves RNG objectives with considerable robustness: statistical quality (independence, uniform distribution), highly unpredictable random number sequences, high performance, and protection against attack. .... Protecting online services against RNG attacks [read: high entropy consumption servers] ... Throughput ceiling is insensitive to the number of contending parallel threads """ take with a gran of salt; this is all from their documentation: http://software.intel.com/en-us/articles/intel-digital-random-number-generator-drng-software-implementation-guide/ _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From boone at vctinc.com Tue Jun 19 06:24:57 2012 From: boone at vctinc.com (=?koi8-r?B?IuXXx8XOycog4sXSxdrLyc4i?=) Date: Tue, 19 Jun 2012 05:24:57 -0800 Subject: =?koi8-r?B?4sXazMnNydTOwdEgzcXWxNXHz9LPxM7B0SDT19Ha2A==?= Message-ID: <01cd4ddb$dd531a80$962e1771@boone> Безлимитная междугородная связь Звонки по всей России всего за 3 000 р. в месяц. Звоните сегодня: (495) 225-04-62 Безлимитными являются звонки не только на городские номера, а так же и междугородные звонки на номера мобильных операторов. From eugen at leitl.org Mon Jun 18 23:52:51 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 19 Jun 2012 08:52:51 +0200 Subject: PeerPoint Discussion - please don't use for other topics Message-ID: <20120619065251.GL17120@leitl.org> ----- Forwarded message from Miles Fidelman ----- From dmorton at bitfurnace.com Tue Jun 19 08:08:53 2012 From: dmorton at bitfurnace.com (Damien Morton) Date: Tue, 19 Jun 2012 11:08:53 -0400 Subject: [FoRK] food for the dhs line eater Message-ID: Step 1. Acquire Chinese RC aircraft factory Step 1a Design foam copy of a WWII Stuka aircraft Step 1b Stage dive bombing competitions with good prize money to encourage this new sport Step 1c Ramp up production to meet the demands of this new sport Step 2. Clone Ardupilot Step 3 Clone Gumstix Step 4. Port OpenCL to gumstix Step 4a Implement rudimentary human body recognition software Step 5 Design a custard pie with good aerodynamics Step 6 mount custard pies under the wings of Stuka aircraft Step 7 release thousands of autonomous custard pie dive bombers over washington for maximum cream-based terrorism _______________________________________________ FoRK mailing list http://xent.com/mailman/listinfo/fork ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From Lamar.Jacobson at fabrieksverkoop.com Tue Jun 19 07:57:32 2012 From: Lamar.Jacobson at fabrieksverkoop.com (Lamar Jacobson) Date: Tue, 19 Jun 2012 13:57:32 -0100 Subject: Best Prices on Male Enhancement Message-ID: <96060781426-UBKZEOREHPXNIMHLEAESUYULB@wluwrlyhhg.fabrieksverkoop.com> Discontented with your male size? Solve all the problems with IT. http://y.ahoo.it/z87Qb From eugen at leitl.org Tue Jun 19 05:46:44 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 19 Jun 2012 14:46:44 +0200 Subject: [liberationtech] Ethiopia criminalizes Skype? Message-ID: <20120619124643.GF17120@leitl.org> ----- Forwarded message from Brian Conley ----- From abodesl0 at bwfa.com Tue Jun 19 15:52:16 2012 From: abodesl0 at bwfa.com (=?koi8-r?B?IuvV0tMgwsnazsXTIMHOx8zJytPLz8fPINcg7c/Ty9fFIg==?=) Date: Tue, 19 Jun 2012 14:52:16 -0800 Subject: =?koi8-r?B?88vJxMvJIMTPIDUwJSDOwSDrz9LQz9LB1MnXztnKIMHOx8zJytPLycog?= =?koi8-r?B?1M/M2MvPINzUyc0gzMXUz80hIA==?= Message-ID: <000d01cd4e65$cabe6070$6400a8c0@abodesl0> Британская школа бизнес английского языка, оказывающая полный комплекс услуг по обучению студентов как в Москве, так и на базе европейских образовательных учреждений по более чем 20 программам. Занятия ведут как российские преподаватели, так и носители языка из Великобритании, США, Ирландии и Новой Зеландии. Программы обучения Курсы английского языка в Москве подбираются в зависимости от целей студента и его уровня владения языком. Подготовка к экзаменам. BBLC предлагает курсы английского в Москве для подготовки к международным экзаменам PET, FCE, CPE, CAE, IELTS, TOEFL, TOEIC и российскому ЕГЭ. Курс включает обучение следующим навыкам: ∙ Как правильно сделать презентацию Вас и Вашей компании ∙ Как провести презентацию деловой информации ∙ Ведение переговоров ∙ Деловые встречи ∙ Бизнес-корреспонденция (в т.ч. электронные письма) ∙ Телефонные переговоры ∙ Описание технических процессов ∙ Устройство на работу (прохождение собеседования) Индивидуальный подход В процессе корпоративного обучения принимаются во внимание индивидуальные особенности учащихся, в том числе уровень знаний, особенности мышления, требования, предъявляемые к процессу и результату обучения и т.п. Так, каждая группа компонуется из студентов, имеющих одинаковые цели и уровень владения английским языком Наши преподаватели Применение методик корпоративного обучения обуславливает повышенные требования к квалификации и уровню профессиональной подготовки преподавателя. Корпоративное обучение английскому языку в Москве проводится специалистами, имеющими опыт работы в той области, с которой они знакомят студентов - бухгалтерии, кадровой политике, юриспруденции и т.д., а также имеющими международный сертификат преподавателя английского языка. Тел: 8-495-626-04-73, 8-495-626-03-76. From eugen at leitl.org Tue Jun 19 07:06:55 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 19 Jun 2012 16:06:55 +0200 Subject: [cryptography] Intel RNG Message-ID: <20120619140655.GL17120@leitl.org> ----- Forwarded message from coderman ----- From djb at cr.yp.to Tue Jun 19 09:13:23 2012 From: djb at cr.yp.to (D. J. Bernstein) Date: 19 Jun 2012 16:13:23 -0000 Subject: [cryptography] Last call: DIAC: Directions in Authenticated Ciphers Message-ID: For people interested in the future of secret-key cryptography, the list of talks for next month's ECRYPT DIAC workshop has now been posted: http://hyperelliptic.org/DIAC Registration is still open today: http://hyperelliptic.org/DIAC/registration.html Here's the list of invited speakers and refereed papers: * Invited: Joan Daemen, STMicroelectronics * Invited: David McGrew, Cisco * Invited: Phillip Rogaway, University of California at Davis * Invited: Palash Sarkar, ISI Kolkata * Refereed papers: - A Do-It-All-Cipher for RFID: design requirements (extended abstract) (Saarinen, Engels) - AEGIS: a fast authenticated encryption algorithm (Wu, Preneel) - An improved hardware implementation of the Grain-128a stream cipher (Mansouri, Dubrova) - Authenticated encryption in civilian space missions: context and requirements (Sanchez, Fischer) - Cryptanalysis of EAXprime (Minematsu, Lucks, Morita, Iwata) - Hash-CFB (Forler, McGrew, Lucks, Wenzel) - Heavy Quark for secure AEAD (Aumasson, Knellwolf, Meier) - How fast can a two-pass mode go? A parallel deterministic authenticated encryption mode for AES-NI (Aoki, Iwata, Yasuda) - Lightweight AES-based authenticated encryption (Bogdanov, Mendel, Regazzoni, Rijmen) - Permutation-based encryption, authentication and authenticated encryption (Bertoni, Daemen, Peeters, Van Assche) - SipHash: a fast short-input PRF (Aumasson, Bernstein) - Stronger security guarantees for authenticated encryption (Boldyreva, Paterson, Stam) - Suggestions for hardware evaluation of cryptographic algorithms (Gurkaynak) See you in Stockholm! ---D. J. Bernstein Research Professor, Computer Science, University of Illinois at Chicago _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From 46f147f0.207755991 at vummail.be Tue Jun 19 12:20:28 2012 From: 46f147f0.207755991 at vummail.be (=?koi8-r?B?IuDMydEg6cfP0sXXzsEi?=) Date: Tue, 19 Jun 2012 16:20:28 -0300 Subject: =?koi8-r?B?4sXazMnNydTOwdEgzcXWxNXHz9LPxM7B0SDT19Ha2A==?= Message-ID: <01cd4e37$706d6e00$e62113bd@46f147f0.207755991> Безлимитная междугородная связь Звонки по всей России всего за 3 000 р. в месяц. Звоните сегодня: (495) 225-04-62 Безлимитными являются звонки не только на городские номера, а так же и междугородные звонки на номера мобильных операторов. From ddd at crisis-force.org Tue Jun 19 17:11:48 2012 From: ddd at crisis-force.org (Dave Duchesneau) Date: Tue, 19 Jun 2012 17:11:48 -0700 Subject: [HacDC:Byzantium] I'd like to help out Message-ID: > "Rooting the phone will allow for adhoc mesh network capability and is > required for full functionality of the software. By choosing not to > root the phone, the software will still be able to provide free calls > to phones that are connected to the same Access Point." AFAIK, although Serval currently requires a rooted phone for the phone itself to be part of the mesh, the standard Serval download for Android allows phone-to-phone communications through an AP with a non-rooted phone. This is more of a fallback plan, since a key aspect of the Serval project is to have the phones be mesh nodes. However, as one may surmise, even such AP-based communications would not be possible if the AP is configured to disallow client-to-client communications (i.e., client isolation mode). On the other hand, if the AP is really just an SSID offered by the nodes on a bridged mesh network, then AP-based Serval communications may reach anywhere that the underlying mesh network reaches. Because such a network is in bridged mode, it operates at layer 2 (based on MAC addresses), and thus is effectively a big software switch, so collectively, all the nodes act as one big AP (in some configurations, clients can roam between mesh nodes without losing sessions, IP addresses, etc.). For those who may not be aware, two examples of such bridged mesh networks are the open-source SECN offering from Village-Telco.org (which is also collaborating with the Serval project to make their meshes interoperate), and also Open-Mesh.com (providing the bridge-mode option is selected). Both meshes are based on batman-adv, so you could expect similar behavior from any mesh based on batman-adv (in bridge mode), and possibly other bridged meshes. Bridged meshes are relatively straightforward, but are not without issues, especially with respect to scalability. One avenue to address scalability issues is to adopt hybrid models where layer 2 is used for localized mesh clusters (up to 20-200 nodes, let's say), and layer 3 is used to route between localized mesh clusters. Note that with a hybrid approach, layer 3 may also serve as an interoperability layer to connect meshes with differing protocols, so that Byzantium-style OLSR meshes may be routed to VillageTelco-style batman-adv meshes. Layer 3 routing consumes more resources than layer 2, so such an approach may not be feasible on every mesh node. Of course, multiple protocols may coexist on run-of-the-mill mesh nodes, too, if there's enough local capacity (memory, CPU, radio bandwidth, etc.). In general, it would be good to make all the meshes work together, at least at arm's length (i.e., this can be done a non-trusted basis, assuming end-to-end encryption). To maximize communications survivability, our own approach incorporates a smattering of optional multi-radio nodes (multiple bands, channels, protocols) in every mesh. These nodes have extra capacity for routing, proxying, protocol translation, serving, store-and-forward, caching, etc. Preachin' to the Choir, Dave Duchesneau ddd at crisis-force.org CRISIS-FORCE Emergency Network -----Original Message----- From: Ben Mendis [mailto:dragonwisard at gmail.com] Sent: Tuesday, June 19, 2012 5:20 AM To: byzantium at hacdc.org Subject: Re: [HacDC:Byzantium] I'd like to help out -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 It may be accurate. I may have misunderstood something. I haven't gotten an opportunity to test out Serval myself yet. On Tue, 19 Jun 2012, John wrote: > On 6/12/2012 11:40 AM, Ben Mendis wrote: >> It seems that Serval (http://www.servalproject.org/) has >> managed to get BATMAN-Adv to run as an Android app without requiring >> root, so maybe it's possible for Babel and OLSR too. > > Does that mean this document is out-of-date? > > http://developer.servalproject.org/files/Serval_Manual_Prototype_v0.05.pdf > > Scroll down to 2.3, > "Rooting the phone will allow for adhoc mesh network capability and is > required for > full functionality of the software. By choosing not to root the phone, the > software > will still be able to provide free calls to phones that are connected to the > same > Access Point." > > John > > -- > You received this message because you are subscribed to the Google Groups > "Project Byzantium (Emergency Mesh Networking)" group. > To post to this group, send email to Byzantium at hacdc.org. > To unsubscribe from this group, send email to > Byzantium+unsubscribe at hacdc.org. > For more options, visit this group at > http://groups.google.com/a/hacdc.org/group/Byzantium/?hl=en. > > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQEcBAEBAgAGBQJP4G57AAoJEMco5sYyM+0wq58H/RmhKlbWA7prhiD2CaJS0h4s SVH9Wj/HfFh2D3Rs25gyOYnZ/o05/KRMS38MSNCDrUxg9uqqUavZ+85I2yfw6XKJ p905Ejo0E1SXpiWpxtTeZ3J8ZKQP5vTFa0NTSs07U0dCE1h59vTkEdjA8cQk6oEc z0yytSLlXNa9okLof1AK6U0m0Jjdkps/NcjScQFOsuJ0gT4SYluzecrV2E5UL/tI HFqtdsxvtil8m9xnmVfg7z3GvqhpCbPxVMVsCEvWXCSDiVL6euw/a4Usz3/8IBps 8TCiYnkQvZvtXMJ83zG7uVogdMOHt0BRGhM+s0RFlNNUvPFG6P832yD8b2mD1qU= =2Vlj -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "Project Byzantium (Emergency Mesh Networking)" group. To post to this group, send email to Byzantium at hacdc.org. To unsubscribe from this group, send email to Byzantium+unsubscribe at hacdc.org. For more options, visit this group at http://groups.google.com/a/hacdc.org/group/Byzantium/?hl=en. -- You received this message because you are subscribed to the Google Groups "Project Byzantium (Emergency Mesh Networking)" group. To post to this group, send email to Byzantium at hacdc.org. To unsubscribe from this group, send email to Byzantium+unsubscribe at hacdc.org. For more options, visit this group at http://groups.google.com/a/hacdc.org/group/Byzantium/?hl=en. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Jun 19 08:20:43 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 19 Jun 2012 17:20:43 +0200 Subject: [FoRK] food for the dhs line eater Message-ID: <20120619152043.GT17120@leitl.org> ----- Forwarded message from Damien Morton ----- From bost at bost.ch Tue Jun 19 05:10:28 2012 From: bost at bost.ch (=?koi8-r?B?Iufz/CI=?=) Date: Tue, 19 Jun 2012 17:40:28 +0530 Subject: =?koi8-r?B?/MvT0MXS1MnawSDQ0s/Fy9TOz8ogxM/L1c3FztTBw8nJ?= Message-ID: <01cd4e42$9d734e00$3d4bc675@bost> Уважаемые коллеги! Информируем вас, что в связи с изменениями в Градостроительном Кодексе, Центр Подготовки Специалистов проводит уникальный 4-дневный курс повышения квалификации "ГРАДОСТРОИТЕЛЬНЫЙ КОДЕКС В 20l2 ГОДУ" Мероприятие пройдет со 2 по 5 июля 20l2 года в Санкт-Петербурге Кратко о программе курса: 1) Нормативная база строительства. 2) Санкции за нарушения требований законодательства о градостроительной деятельности. 3) Строительный надзор и его правовые особенности. 4) Порядок проведения подрядчиком строительного контроля. 5) Нововведения в Градостроительном Кодексе 2012 года, практика работы с измененным законодательством в области строительства. 6) Выдача разрешений на строительство различными органами власти. 7) Стандарт оформления и содержания проектной документации. 8) Нормативная база деятельности застройщика, технического заказчика. После проходжения курса вы получаете Удостоверение государственного образца о кратком повышении квалификации! В стоимость курса входят кофе-брейки, обеды и экскурсия по городу. Для гостей Петербурга бесплатная услуга бронирования гстиницы!! Регистрация на мероприятие, вопросы по стоимости и полной программе: (8l2) 6Ч2-92-83 From adjuncto928 at iplmail.orl.lmco.com Tue Jun 19 20:04:39 2012 From: adjuncto928 at iplmail.orl.lmco.com (=?koi8-r?B?IuHOxNLFyiI=?=) Date: Tue, 19 Jun 2012 19:04:39 -0800 Subject: =?koi8-r?B?88TBxdTT0SDSwcLP3snKIMHX1M/TxdLXydMg0yDPws/S1cTP18HOycXN?= =?koi8-r?B?IM7BIM0uIPXOydfF0tPJ1MXULg==?= Message-ID: <000d01cd4e89$0ceac150$6400a8c0@adjuncto928> Сдается рабочий автосервис с оборудованием на м. Университет. Сдаётся рабочий автосервис с оборудованием (отдельностоящее помещение из металлоконструкции). Площадь 225 кв. м. Высота потолков 5 м. Пластиковые ворота. Электричество (220/380), Вода, отопление. Канализация. Арендная ставка 150 тыс. рублей в месяц. Арендные каникулы. Охрана. Парковка. Отдельный асфальтированный въезд. Оборудование: 3 подъемника, компрессор, верстаки, масляная отопительная печка. Возможна докупка необходимого оборудования. Тел.: 8 (963) 782 0885, Андрей Рассмотрю варианты покупки земельного участка по Осташковскому/Ярославскому/Дмитровскому шоссе до 15 км от МКАД. От 10 до 30 соток. From brian at aplus.net Tue Jun 19 06:48:16 2012 From: brian at aplus.net (=?koi8-r?B?IvTFyM7J3sXTy8nKIMTJ0sXL1M/SINDSz83Z28zFzs7Px88g0NLFxA==?= =?koi8-r?B?0NLJ0dTJ0SAi?=) Date: Tue, 19 Jun 2012 19:18:16 +0530 Subject: =?koi8-r?B?6e725e7l8u755SDz5fTpIPPw4g==?= Message-ID: <01cd4e50$470d0c00$46f4bb01@brian> Уважаемые коллеги! Сообщаем, что в период с 25 по 26 июня 2ОI2 года В Санкт-Петербурге пройдет ОБРАЗОВАТЕЛЬНЫЙ КУРС по теме: ИНЖЕНЕРНЫЕ СЕТИ И ЛИНЕЙНЫЕ ОБЪЕКТЫ, КАК ОБЪЕКТ ИМУЩЕСТВЕННЫХ ОТНОШЕНИЙ. В рамках курса будут рассмотрены следующие темы: -Инженерные сети как объект имущества. Нормативно-правовые вопросы владения и распоряжения инженерными сетями. Виды линейных объектов. Линейные объекты как объекты недвижимости. Последние изменения в Градостроительном кодексе. -Порядок и правила формирования объекта недвижимости ╚Инженерные сети╩. Особенности технической инвентаризации и технического учета инженерных сетей. Формы технических и кадастровых паспортов. -Оформление прав на земельные участки под строительство линейных объектов и сетевых инженерных инфраструктур. -Порядок осуществления кадастровых работ по образованию земельных участков, межевой план, постановка земельных участков на государственный кадастровый учет и государственная регистрации прав на земельные участки для строительства, реконструкции и эксплуатации линейных объектов, объектов инженерной инфраструктуры. -Порядок подключения инженерных сетей к ресурсоснабжающим организациям. Передача наружных сетей на баланс специализированным энергоснабжающим организациям. -Проведение предпроектной подготовки строительства, реконструкции, капитального ремонта линейных объектов. Подготовка и состав проектной документации на строительство, реконструкцию и капитальный ремонт линейных объектов и инженерных сетей. -Оформление сделок, связанных с арендой, куплей-продажей, приватизацией инженерных сетей. Оформление прав на объекты инфраструктуры в составе имущественных комплексов. -Организация эксплуатации инженерных сетей. -Экологические требования в связи с проектированием, строительством и эксплуатацией инженерных объектов. -Современные стандарты и требования нормативных документов к проектированию систем водоснабжения и водоотведения. -Особенности землепользования объектов ЛЭП. -Особенности проектирования, строительства и ввода в эксплуатацию систем газоснабжения и газораспределения. Занятия проводят высококвалифицированные специалисты отрасли. По окончании выдается аттестат о краткосрочном повышении квалификации. ПОЛНУЮ программу курса, РАСПИСАНИЕ и список ЛЕКТОРОВ можно получить по телефону: |812| 986 93 47 From eugen at leitl.org Tue Jun 19 10:20:37 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 19 Jun 2012 19:20:37 +0200 Subject: [cryptography] Last call: DIAC: Directions in Authenticated Ciphers Message-ID: <20120619172037.GX17120@leitl.org> ----- Forwarded message from "D. J. Bernstein" ----- From avanzanten at amersfoort-zoo.nl Tue Jun 19 07:14:33 2012 From: avanzanten at amersfoort-zoo.nl (=?koi8-r?B?IvPU0s/J1MXM2M7B0SDcy9PQxdLUydrBIg==?=) Date: Tue, 19 Jun 2012 19:44:33 +0530 Subject: =?koi8-r?B?6drNxc7FzsnRINcgx9LBxM/T1NLPydTFzNjOz80gy8/ExcvTxSAyMA==?= =?koi8-r?B?MTI=?= Message-ID: <01cd4e53$f3042680$48d4a87a@avanzanten> Уважаемые коллеги! Информируем вас, что в связи с изменениями в Градостроительном Кодексе, Центр Подготовки Специалистов проводит уникальный 4-дневный курс повышения квалификации "ГРАДОСТРОИТЕЛЬНЫЙ КОДЕКС В 20l2 ГОДУ" Мероприятие пройдет со 2 по 5 июля 20l2 года в Санкт-Петербурге Кратко о программе курса: 1) Нормативная база строительства. 2) Санкции за нарушения требований законодательства о градостроительной деятельности. 3) Строительный надзор и его правовые особенности. 4) Порядок проведения подрядчиком строительного контроля. 5) Нововведения в Градостроительном Кодексе 2012 года, практика работы с измененным законодательством в области строительства. 6) Выдача разрешений на строительство различными органами власти. 7) Стандарт оформления и содержания проектной документации. 8) Нормативная база деятельности застройщика, технического заказчика. После проходжения курса вы получаете Удостоверение государственного образца о кратком повышении квалификации! В стоимость курса входят кофе-брейки, обеды и экскурсия по городу. Для гостей Петербурга бесплатная услуга бронирования гстиницы!! Регистрация на мероприятие, вопросы по стоимости и полной программе: (8l2) 6Ч2-92-83 From bakunz at ida.net Tue Jun 19 07:59:45 2012 From: bakunz at ida.net (=?koi8-r?B?IuzJxMnRIOnTwcXXzsEi?=) Date: Tue, 19 Jun 2012 20:29:45 +0530 Subject: =?koi8-r?B?/MvPzs/NydEgzsEg0M/L1dDLxSDUxczFxs/Ozs/KINPUwc7Dyck=?= Message-ID: <01cd4e5a$437e8280$d69e3c78@bakunz> Виртуальная АТС за 300 рублей в месяц Прямой городской многоканальный номер в коде 495 и 499 Звоните сегодня: (495) 225-04-62 5 причин заказать номер сейчас: - Экономия на покупке телефонной станции - Всегда свободная линия для входящих звонков - Сохранение телефонного номера при переезде компании в другой офис - Оптимизация распределения входящих звонков - Подробная статистика по прямым и переадресованным звонкам From pennantssq at deafvision.com Tue Jun 19 18:43:41 2012 From: pennantssq at deafvision.com (=?koi8-r?B?IuHSxc7EwSwgIMLF2iDOwcPFzsvJISI=?=) Date: Tue, 19 Jun 2012 20:43:41 -0500 Subject: =?koi8-r?B?4dLFzsTBINDPzcXdxc7J0SDOwSDNLiD1zsnXxdLTydTF1CDQz8Qg08vM?= =?koi8-r?B?wcQvwdfUz9PF0tfJ0y4=?= Message-ID: <000d01cd4e7d$bd13ea90$6400a8c0@pennantssq> Аренда помещения под склад/автосервис/производство. Ул. Проспект Вернадского. Сдаётся отдельностоящее капитальное помещение под склад/автосервис/производство. Площадь 180 кв. м. Высота потолков 4,5-5 м. Металлические ворота. Электричество (220/380), отопление, канализация. Арендная ставка 100 000 рублей в месяц. Тел.: 8 (963)782 0885, Андрей From rwandaeh0 at primornp.ru Tue Jun 19 23:40:18 2012 From: rwandaeh0 at primornp.ru (=?koi8-r?B?IvfZy9XQIMHX1M8g7c/Ty9fBIg==?=) Date: Tue, 19 Jun 2012 22:40:18 -0800 Subject: =?koi8-r?B?89LP3s7ZyiDX2cvV0CDB19TPzc/CyczFyiA=?= Message-ID: <000d01cd4ea7$2cf76c50$6400a8c0@rwandaeh0> Срочный выкуп автомобилей 2006,2007,2008,2009,2010.годов выпуска. Старые и битые автомобили не берем. Лучшие цены на выкуп в России. Тел. 84959997607 From brambila at mes.ca Tue Jun 19 08:22:02 2012 From: brambila at mes.ca (=?koi8-r?B?IuHOwdPUwdPJ0SDn1cTaxc7LzyI=?=) Date: Wed, 20 Jun 2012 00:22:02 +0900 Subject: =?koi8-r?B?4sXazMnNydTOwdEgzcXWxNXHz9LPxM7B0SDT19Ha2A==?= Message-ID: <01cd4e7a$b697f100$bfae68b7@brambila> Безлимитная междугородная связь Звонки по всей России всего за 3 000 р. в месяц. Звоните сегодня: (495) 225-04-62 Безлимитными являются звонки не только на городские номера, а так же и междугородные звонки на номера мобильных операторов. From 544johnsoncity at leonardusa.com Tue Jun 19 13:30:55 2012 From: 544johnsoncity at leonardusa.com (=?koi8-r?B?Ivz0Ig==?=) Date: Wed, 20 Jun 2012 02:00:55 +0530 Subject: =?koi8-r?B?8tXLz9fPxMnUxczAIM/UxMXMwSDQ0s/EwdY=?= Message-ID: <01cd4e88$86efe580$d5bccb74@544johnsoncity> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 315 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 42076 bytes Desc: not available URL: From brittmari.tidehag at vll.ca Tue Jun 19 14:16:26 2012 From: brittmari.tidehag at vll.ca (=?koi8-r?B?IuzJxMnRIPDP2sTOxdfBIg==?=) Date: Wed, 20 Jun 2012 02:46:26 +0530 Subject: =?koi8-r?B?4sXazMnNydTOwdEgzcXWxNXHz9LPxM7B0SDT19Ha2A==?= Message-ID: <01cd4e8e$e2bd6d00$dc8fec7b@brittmari.tidehag> Безлимитная междугородная связь Звонки по всей России всего за 3 000 р. в месяц. Звоните сегодня: (495) 225-04-62 Безлимитными являются звонки не только на городские номера, а так же и междугородные звонки на номера мобильных операторов. From 37foster.monika at philander.edu Tue Jun 19 11:34:58 2012 From: 37foster.monika at philander.edu (=?koi8-r?B?Ivz0Ig==?=) Date: Wed, 20 Jun 2012 03:34:58 +0900 Subject: =?koi8-r?B?/MzFy9TSz87O2cUg1M/Sx8kgKMHVy8PJz84p?= Message-ID: <01cd4e95$aa6d5d00$21bbd7ca@37foster.monika> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 317 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 42076 bytes Desc: not available URL: From punt at b-f.com Wed Jun 20 07:36:28 2012 From: punt at b-f.com (=?koi8-r?B?IvfJ2s/X2cogw8XO1NIi?=) Date: Wed, 20 Jun 2012 06:36:28 -0800 Subject: =?koi8-r?B?+8XOx8XO08vJxSD3ydrZINPBzcHRIM7J2svB0SDDxc7BINcg7e/z6/fl?= =?koi8-r?B?ISA=?= Message-ID: <000d01cd4ee9$b21db410$6400a8c0@punt> Шенген Визы - самая низкая цена в Москве от 2500 руб. (495) 618-51-41 From upstartzuw at tacomail.tacobell.com Wed Jun 20 07:51:06 2012 From: upstartzuw at tacomail.tacobell.com (=?koi8-r?B?Iu3By9PJzcHM2M7B0SDSxcvMwc3BICI=?=) Date: Wed, 20 Jun 2012 06:51:06 -0800 Subject: =?koi8-r?B?7cXT0cMg0sHT09nMz8sgNDQg29TVy8kg2sEgMjAgMDAw?= Message-ID: <54112064AFD84E81960D4FCC683D5F05@naqvic33788a87> Месяц рассылок 44 (46) - 2 раза в день - 5 раз в неделю - 20 000 рублей Тел: (495) 585 79 04 ICQ: 286 926 971 Базы Россия 23 млн Москва 8 млн Украина 4 млн 1 тестовая рассылка по любой базе 2000 руб. From saftergood at fas.org Wed Jun 20 08:33:11 2012 From: saftergood at fas.org (Steven Aftergood) Date: Wed, 20 Jun 2012 08:33:11 -0700 Subject: Secrecy News -- 06/20/12 Message-ID: Format Note: If you cannot easily read the text below, or you prefer to receive Secrecy News in another format, please reply to this email to let us know. SECRECY NEWS from the FAS Project on Government Secrecy Volume 2012, Issue No. 60 June 20, 2012 Secrecy News Blog: http://www.fas.org/blog/secrecy/ ** DNI DIRECTIVE SEEKS TO TIGHTEN PROTECTION OF INTELLIGENCE ** HISTORY OF EXECUTIVE PRIVILEGE, AND MORE FROM CRS DNI DIRECTIVE SEEKS TO TIGHTEN PROTECTION OF INTELLIGENCE Director of National Intelligence James R. Clapper issued a directive earlier this month to improve the protection of intelligence information and to help prevent unauthorized disclosures. The newly revised Intelligence Community Directive 700 requires a new degree of collaboration between counterintelligence and security activities. While counterintelligence (CI) was scarcely mentioned in the previous version of the policy on protecting intelligence in 2007, it is now being elevated to a central role and integrated with security. http://www.fas.org/irp/dni/icd/icd-700.pdf "Together, CI and security provide greater protection for national intelligence than either function operating alone," the new directive states. In order to combat the insider threat of unauthorized disclosures, the directive prescribes that "all personnel with access to national intelligence... shall be continually evaluated and monitored...." But since there are more than a million government employees and contractors holding Top Secret clearances who are potentially eligible for access to intelligence information, it seems unlikely that any significant fraction of them can literally be "continually monitored." Still, that is now formally the objective. A copy of the June 7, 2012 directive on "Protection of National Intelligence" was released by the Office of the Director of National Intelligence under the Freedom of Information Act. The new directive has been under development for at least several months. It was not specifically devised as a response to the latest controversy over leaks of classified information. It serves as a reminder that the implementation of revised policies to address unauthorized disclosures of classified information (including congressional action just last year to establish an "insider threat detection program") is ongoing, possibly obviating the need for new legislation. HISTORY OF EXECUTIVE PRIVILEGE, AND MORE FROM CRS A 2008 report by the Congressional Research Service discussed the history of claims of executive privilege, including various unresolved questions surrounding its use. The Obama Administration asserted executive privilege today in connection with records sought by a House Committee. See "Presidential Claims of Executive Privilege: History, Law, Practice and Recent Developments," updated August 21, 2008: http://www.fas.org/sgp/crs/secrecy/RL30319.pdf Newly updated reports from the Congressional Research Service that Congress has not made publicly available include the following. U.S.-China Military Contacts: Issues for Congress, June 19, 2012: http://www.fas.org/sgp/crs/natsec/RL32496.pdf Free Trade Agreements: Impact on U.S. Trade and Implications for U.S. Trade Policy, June 18, 2012: http://www.fas.org/sgp/crs/row/RL31356.pdf Madagascar's Political Crisis, June 18, 2012: http://www.fas.org/sgp/crs/row/R40448.pdf Armenia, Azerbaijan, and Georgia: Political Developments and Implications for U.S. Interests, June 15, 2012: http://www.fas.org/sgp/crs/row/RL33453.pdf U.S. Trade Deficit and the Impact of Changing Oil Prices, June 18, 2012: http://www.fas.org/sgp/crs/misc/RS22204.pdf Unauthorized Alien Students: Issues and "DREAM Act" Legislation, June 19, 2012: http://www.fas.org/sgp/crs/misc/RL33863.pdf Federal Taxation of Aliens Working in the United States, May 18, 2012: http://www.fas.org/sgp/crs/misc/RS21732.pdf _______________________________________________ Secrecy News is written by Steven Aftergood and published by the Federation of American Scientists. The Secrecy News Blog is at: http://www.fas.org/blog/secrecy/ To SUBSCRIBE to Secrecy News, go to: http://www.fas.org/sgp/news/secrecy/subscribe.html To UNSUBSCRIBE, go to http://www.fas.org/sgp/news/secrecy/unsubscribe.html OR email your request to saftergood at fas.org Secrecy News is archived at: http://www.fas.org/sgp/news/secrecy/index.html Support the FAS Project on Government Secrecy with a donation: http://www.fas.org/member/donate_today.html _______________________ Steven Aftergood Project on Government Secrecy Federation of American Scientists web: www.fas.org/sgp/index.html email: saftergood at fas.org voice: (202) 454-4691 twitter: @saftergood ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From interposing27 at dolphinencounters.com Tue Jun 19 20:04:11 2012 From: interposing27 at dolphinencounters.com (=?koi8-r?B?Iu3P08vXwSAtIPDSz9PQxcvUIPfF0s7BxNPLz8fPIg==?=) Date: Wed, 20 Jun 2012 08:34:11 +0530 Subject: =?koi8-r?B?797FztggxMXbxdfB0SDJIMvB3sXT1NfFzs7B0SDNz8rLwS4g8sXNz87U?= =?koi8-r?B?IMHX1M8g0yA5MCUg08vJxMvBzck=?= Message-ID: <000d01cd4e91$5dedea70$6400a8c0@interposing27> Очень дешевая и качественная мойка на м. Университет. Ремонт авто с 90% скидками. Лучше любых купонов. Звоните. Автосервис, автомойка, покраска авто на м. Университет - Проспект Вернадского (ЮЗАО): ∙ автомойка - от 100 р. ∙ покраска авто от 4000 р. ∙ ремонт подвески, ходовой части от 300 р. ∙ ремонт коробки переключения передач (АКПП) от 5000 р. ∙ техническое обслуживание автомобилей в Москве от 500 р. ∙ замена масла, тормозной жидкости, тосола (антифриза) от 200 р. ∙ замена тормозных колодок, ремонт тормозной системы от 200 р. ∙ промывка инжекторной системы двигателя от 300 р. ∙ установка сигнализации в Москве от 1000 р. ∙ ремонт бампера в Москве от 1000 р. ∙ защитная полировка кузова жидким воском от 100 р. ∙ тонирование стекол автомобиля в Москве от 500 р. ∙ локальная покраска автомобиля в Москве от 1000 р. ∙ химчистка автомобиля в Москве от 2000 р. ∙ шиномонтаж от 100 р. Адрес: Проспект Вернадского 10а Телефоны: 8 (967) 138 3878, 8 (901) 516 0107 From eugen at leitl.org Tue Jun 19 23:47:26 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 20 Jun 2012 08:47:26 +0200 Subject: [HacDC:Byzantium] I'd like to help out Message-ID: <20120620064726.GK17120@leitl.org> ----- Forwarded message from Dave Duchesneau ----- From cuspid74 at psc-evg.com Tue Jun 19 20:56:45 2012 From: cuspid74 at psc-evg.com (=?koi8-r?B?Iu3P08vXwSI=?=) Date: Wed, 20 Jun 2012 08:56:45 +0500 Subject: =?koi8-r?B?8NLJ18XExc7JxSDXINPPz9TXxdTT1NfJxSDQzyAxNTIt5vouIOvB3sXT?= =?koi8-r?B?1NfFzs7PIMkgz9DF0sHUydfOzy4=?= Message-ID: <000d01cd4e98$b5fd8a20$6400a8c0@cuspid74> Приведение в соответствие по 152-ФЗ. Качественно и оперативно. Защита персональных данных, выполненная в соответствии с требованиями законодательства (152 ФЗ), организация технических мер. Организационные и технические мероприятия: ∙ Уведомление уполномоченного органа по защите прав субъектов персональных данных о своем намерении осуществлять обработку персональных данных. ∙ Разработка документов, регламентирующих обработку персональных данных в организации (положение по обработке персональных данных, регламенты, положения по защите персональных данных). ∙ Создание системы защиты персональных данных, в т.ч. выполнение требований по инженерно-технической защите помещений. ∙ Аттестация или декларирование соответствия Мы предлагаем провести аудит систем обработки персональных данных, разработать необходимый комплект документов и рекомендации, которые позволят обеспечить безопасность персональных данных в соответствии с требованиями регуляторов. Основным результатом аудита является план мероприятий, проведение которых необходимо для обеспечения соответствия требованиям закона О персональных данных. Мы разработали предложения по защите персональных данных для разных категорий операторов персональных данных. г. Москва, Нахимовский проспект, 47 Тел.: + 7 (915) 330 7661 From eugen at leitl.org Wed Jun 20 00:04:21 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 20 Jun 2012 09:04:21 +0200 Subject: [silk] Flame is Lame Message-ID: <20120620070421.GU17120@leitl.org> ----- Forwarded message from Udhay Shankar N ----- From gladiolusesyeu72 at rockfordanimalhospital.com Tue Jun 19 23:06:30 2012 From: gladiolusesyeu72 at rockfordanimalhospital.com (=?koi8-r?B?Ivvr7+zhIOHu9Onr9+Hy7u/n7yDk5ezhIg==?=) Date: Wed, 20 Jun 2012 09:36:30 +0330 Subject: =?koi8-r?B?++vv7OEg4e706ev34fLu7+fvIOTl7OE6ICDv4vX+5e7p5SAtIPcg9eTv?= =?koi8-r?B?9+/s+PP09+nlISA=?= Message-ID: <168AA353A63645CBABC225293D0A2977@ARGHAVAN> ШКОЛА АНТИКВАРНОГО ДЕЛА: ОБУЧЕНИЕ - В УДОВОЛЬСТВИЕ! Умение отличить полотно Ван Гога от произведений Поля Гогена, Классический стиль от стиля Ар Деко, шедевры ювелирного искусства Карла Фаберже от изделий Западных мастеров выгодно отличает человека культурно образованного и интеллектуально развитого. Наши лекции познакомят Вас с различными традициями в искусстве, научат отличать подлинник от подделки, повысят культурный уровень и расширят кругозор! Мы ждем Вас! Тел.: +7 (495) 650-12-62; +7 (495) 999-11-45; +7 (963) 990-33-33. Сайт: www.школа-антиквар.рф From tricklesgeq708 at pornsickle.com Tue Jun 19 21:45:31 2012 From: tricklesgeq708 at pornsickle.com (=?koi8-r?B?IvfJxMXPIMkgxs/UzyDV08zVx8kg1yDtz9PL18Ui?=) Date: Wed, 20 Jun 2012 10:15:31 +0530 Subject: =?koi8-r?B?89/FzcvBINfJxMXP0s/MycvP1y4g5s/Uzy4gIPLB08vS1dTLwSDSz8zJ?= =?koi8-r?B?y8/XIM7BIPT3IMkgyc7UxdLOxdTFLg==?= Message-ID: <000d01cd4e9f$85eb7660$6400a8c0@tricklesgeq708> Съемка очень качественных минифильмов и видеороликов. Съемка видеороликов: рекламных, музыкальных, презентационных. Репортажное видео. Все виды монтажа и постпродакшна. Раскрутка роликов на ТВ и интернете. Написание сценариев. Подбор актеров. Обработка видео, цифровая обработка видео, компьютерная графика. Фото услуги: - модельное, актерское портфолио - портретная съемка - репортажная и свадебная съемка г. Москва, ул. Дмитрия Ульянова, 42 +7 (916) 225 4302 From gnu at toad.com Wed Jun 20 11:13:55 2012 From: gnu at toad.com (John Gilmore) Date: Wed, 20 Jun 2012 11:13:55 -0700 Subject: [Freedombox-discuss] Freedombox Mesh Network Simulator Message-ID: > My wife and I are walking in mall with at least one other person every > 40 feet or so. We decide to separate and go shopping. I walk this way, > she walks that way. Before long we're out of direct WiFi communication > range to each other. Now, if enough people there in the mall had > WiFi-enabled devices running some mesh software, I'd like to be able to > stay in contact with my wife as she moves about in her random way, and > as they all move about in their random ways. The One Laptop per Child project also wanted to satisfy this goal. They wanted kids all over a village to be able to reach each other and to reach the Internet via a gateway at their school. They had the advantage of designing and building both the hardware and software. But they failed, partly due to system integration issues. They were using a buggy implementation of 802.11 meshing that preceded 802.11s. But they also used higher level user interface software, which used multicast packets to find and communicate with other nearby laptops. The mesh software worked poorly with multicast. Not only did it send multicasts at the slowest speed (1 megabit), which took up a lot of airtime, but the various nodes would repeat the multicasts to make sure that every node had heard them. This limited the size of the network that they could scale to. They did not discover this unfortunate interaction until very late in the hardware/software/firmware integration process (when the multicast-based application sharing software started working). Another major problem was that a mesh network is very hard to reproduce. If it does something unexpected or suboptimal, the developers can't just teleport themselves to the part of the world where that particular physical configuration of radio nodes, physical antennas, software versions, and firmware versions exists. In many cases they can't even reach into the nodes of that network over the Internet while the problem is happening, to debug it. Many, many OLPC mesh problems occurred in the field which could not be replicated in the lab, which made them 10x or 100x harder to fix. This meant that buggy mesh network firmware and software didn't improve at the usual rate (of the rest of their software). The result was that despite a lot of work addressing bugs and performance in the mesh firmware, they never got their automatic mesh network working with more than a handful of XO laptops. If you put 30 laptops in a classroom, they would burn up 100% of the radio bandwidth (and chew up their batteries) merely with overhead packets ("Hi, i'm here." "Hi you, I'm me; have you heard about Joe and Alice over there?" "In case you want to send a message to Joe, send it via me to Alice; I can hear Alice just fine."). There was no bandwidth left for the users to actually communicate; connections would time out, nodes would appear and disappear from the mesh, etc. So OLPC stopped using the mesh and recommended that each classroom install one or more 802.11 access points. Which has worked ok. They also switched to support ad-hoc 802.11 without meshing, for automatically networking "a few students sitting around under a tree", which also works ok. There ARE some mesh networks that I hear are working on a larger scale, such as B.A.T.M.A.N. I suspect that the large scale meshes are in largely static networks that are tuned by humans to work well (just as the broader Internet's routing system is tuned by humans to work; it's not automatic). I do not know if other meshes support multicast (or other portable ways for high level software to find what nodes are on the network), nor whether they work in a network of mobile nodes with limited battery life. All I can report on is the one project I was involved in (OLPC), in which their mesh implementation failed to accomplish its goals, and was dropped from the next generation hardware and software. This is part of why I recommend using wired connections wherever possible. For FreedomBox to succeed, it needs to succeed at scale. A FreedomBox network that can't route packets for more than 500 nodes worldwide wouldn't be worth building. (Clue: this is why the Internet exists today: it scaled up and kept working, while the proprietary networks that preceded it didn't scale up to worldwide scale.) In a substantial network, your mesh and dynamic routing protocol could require a few megabits of traffic at all times on each node, just keeping track of everything. Over a 100-megabit Ethernet that's just 2 or 3% of the bandwidth. But over 802.11, that burns up most of the available bandwidth. Every connection you move off wireless onto a wire makes more radio bandwidth available for the folks who truly can't run a wire. I have some ideas about how FreedomBox nodes could provide censorship resistant networking via running an overlay IPv6 network using geographically based addressing to simplify the routing problem. I'll dig those up and repost them in the next few days. It isn't an automatic mesh, though; it has explicit connections made by humans among friendly nodes. The part that's automatic is how the packets flow after the humans make those connections. John PS: If you think a mesh protocol shouldn't use even a megabit/second of continuous overhead, please design and build one that doesn't, and that scales up and keeps working. It's harder than it looks. _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From matthewdgreen at gmail.com Wed Jun 20 08:35:07 2012 From: matthewdgreen at gmail.com (Matthew Green) Date: Wed, 20 Jun 2012 11:35:07 -0400 Subject: [cryptography] cryptanalysis of 923-bit ECC? Message-ID: I'm definitely /not/ an ECC expert, but this is a pairing-friendly curve, which means it's vulnerable to a type of attack where EC group elements can be mapped into a field (using a bilinear map), then attacked using an efficient field-based solver. (Coppersmith's). NIST curves don't have this property. In fact, they're specifically chosen so that there's no efficiently-computable pairing. Moreover, it seems that this particular pairing-friendly curve is particularly tractable. The attack they used has an estimated running time of 2^53 steps. While the 'steps' here aren't directly analogous to the operations you'd use to brute-force a symmetric cryptosystem, it gives a rough estimate of the symmetric-equivalent key size. (Apologies to any real ECC experts whose work I've mangled hereb& :) Matt On Jun 20, 2012, at 10:59 AM, Charles Morris wrote: > "NIST guidelines state that ECC keys should be twice the length of > equivalent strength symmetric key algorithms." > So according to NIST solving a 923b ECC is like brute-forcing a 461b > bit symmetric key (I assume in a perfect cipher?). > > Of course there are weak keys in almost any system e.g. badly > implemented RSA picking p=q > > I wonder if a weak-key scenario has occurred, or if this is a genuine > generalized mathematical advance? > Comments from ECC experts? _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From udhay at pobox.com Tue Jun 19 23:33:08 2012 From: udhay at pobox.com (Udhay Shankar N) Date: Wed, 20 Jun 2012 12:03:08 +0530 Subject: [silk] Flame is Lame Message-ID: On 12/06/12 12-Jun-2012;6:04 PM, Biju Chacko wrote: > http://www.f-secure.com/weblog/archives/00002383.html More on this, for those not following along: http://www.wired.com/threatlevel/2012/06/us-and-israel-behind-flame/ Report: US and Israel Behind Flame Espionage Tool By Kim Zetter June 19, 2012 | The United States and Israel are responsible for developing the sophisticated espionage rootkit known as Flame, according to anonymous Western sources quoted in a news report. The malware was designed to provide intelligence about Iranbs computer networks and spy on Iranian officials through their computers as part of an ongoing cyberwarfare campaign, according to the Washington Post. The program was a joint effort of the National Security Agency, the CIA and Israelbs military, which also produced the Stuxnet worm that is believed to have sabotaged centrifuges used for Iranbs uranium enrichment program in 2009 and 2010. bThis is about preparing the battlefield for another type of covert action,b a former high-ranking US intelligence official told the Post. bCyber collection against the Iranian program is way further down the road than this.b Flame was discovered last month by Russia-based antivirus firm Kaspersky Lab, following reports in Iran that malware aimed at computers belonging to that countrybs oil industry had wiped data from the computers. In trying to investigate that issue, Kaspersky came across components of the Flame malware, which the researcher believed was not directly connected to the malware that wiped the Iranian computers clean but which they believed was created by the same nation states behind Stuxnet. Kaspersky disclosed last week that Flame in fact contained some of the same code as Stuxnet, directly tying the two pieces of malware together. According to the Post Flame was designed to infiltrate highly secure networks in order to siphon intelligence from them, including information that would help the attackers map a target network. Flame, as previously reported, can activate a computerbs internal microphone to record conversations conducted via Skype or in the vicinity of the computer. It also contains modules that log keyboard strokes, take screen shots of whatbs occurring on a machine, extract geolocation data from images and turn an infected computer into a Bluetooth beacon to siphon information from Bluetooth-enabled phones that are near the computer. Flame exploited a vulnerability in Microsoftbs terminal service system to allow the attackers to obtain a fraudulent Microsoft digital certificate to sign their code, so that it could masquerade as legitimate Microsoft code and be installed on a target machine via the Microsoft software update function. Flame was developed at least five years ago as part of a classified program code-named Olympic Games, the same program that produced Stuxnet. bIt is far more difficult to penetrate a network, learn about it, reside on it forever and extract information from it without being detected than it is to go in and stomp around inside the network causing damage,b said Michael V. Hayden, a former NSA director and CIA director who left office in 2009, told the Post. Itbs still unclear whether the malware used to attack computers in Iranbs oil ministry is the same malware now known as Flame. According to the Post, the attack on the oil ministry computers was directed by Israel alone, a matter which apparently caught US officials off guard, according to anonymous sources who spoke with the newspaper. Kim Zetter Kim Zetter is a senior reporter at Wired covering cybercrime, privacy, security and civil liberties. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bicknell at ufp.org Wed Jun 20 12:43:44 2012 From: bicknell at ufp.org (Leo Bicknell) Date: Wed, 20 Jun 2012 12:43:44 -0700 Subject: LinkedIn password database compromised Message-ID: In a message written on Wed, Jun 20, 2012 at 03:30:58PM -0400, AP NANOG wrote: > So the question falls back on how can we make things better? Dump passwords. The tech community went through this back in oh, 1990-1993 when folks were sniffing passwords with tcpdump and sysadmins were using Telnet. SSH was developed, and the problem was effectively solved. If you want to give me access to your box, I send you my public key. In the clear. It doesn't matter if the hacker has it or not. When I want to log in I authenticate with my private key, and I'm in. The leaks stop immediately. There's almost no value in a database of public keys, heck if you want one go download a PGP keyring now. I can use the same "password" (key) for every web site on the planet, web sites no longer need to enforce dumb rules (one letter, one number, one character your fingers can't type easily, minimum 273 characters). SSL certificates could be used this way today. SSH keys could be used this way today. PGP keys could be used this way today. What's missing? A pretty UI for the users. Apple, Mozilla, W3C, Microsoft IE developers and so on need to get their butts in gear and make a pretty UI to create personal key material, send the public key as part of a sign up form, import a key, and so on. There is no way to make passwords "secure". We've spent 20 years trying, simply to fail in more spectacular ways each time. Death to traditional passwords, they have no place in a modern world. -- Leo Bicknell - bicknell at ufp.org - CCIE 3440 PGP keys at http://www.ufp.org/~bicknell/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From frank at journalistsecurity.net Wed Jun 20 13:51:43 2012 From: frank at journalistsecurity.net (frank at journalistsecurity.net) Date: Wed, 20 Jun 2012 13:51:43 -0700 Subject: [liberationtech] CPJ blog building on EFF, Citizen Lab -- BlackShades Skype Trojan Message-ID: I am grateful to Eff and Morgan, Eva, and Citizen Lab and Seth Hardy for allowing us to build on their fine work and help spread the message. If anyone knows whether any of this information has yet appeared online in Arabic please let us know. Thank you. FS [1]http://cpj.org/security/2012/06/skype-trojan-targets-syrian-citizen- journalists-ac.php Skype Trojan targets Syrian citizen journalists, activists By [2]Frank Smyth/Senior Adviser for Journalist Security The Russian manufacturer promises results. The software can be used to control your own or, say, a customer's computer by making it a remote software client. Or it could be used for spying on others. "BlackShades Remote Controller also provides an [3]efficient way of turning your machine into a surveillance/spy-device or to spy on a specific system," reads one line of the online product description. The software [4]sells online for $40 (an additional $12.60 brings premium support) through the Canadian E-Commerce reseller [5]paypro, and it can surreptitiously record keystrokes and screen views while giving the intruder clandestine remote access to the target computer. The [6]terms of service include several disclaimers. Purchasers must be "of legal age to use our services and are not a person barred from receiving services under the laws of Russia or other applicable jurisdiction." Purchasers must further agree to not use BlackShades to "harm people in any way," or "upload, post or otherwise make available any Content that you do not have a right to make available," or "provide material support or resources...to any organization(s) designated by the Russian government as a foreign terrorist organization." The spyware has been embedded into what looks like just one of many .pif video files being circulated by Syrian activists on Skype to help document attacks and human rights abuses by Syrian government and pro-government forces, according to a report [7]posted yesterday by the University of Toronto's Citizen Lab. North American-based forensic experts dissected the Trojan spyware embedded in the video file circulating on Skype, which ends with the extension "new_new.pif." The digital workings of the latest Skype Trojan are similar to those of a prior YouTube video Trojan that also targeted Syrian activists, according to a [8]report yesterday by the San Francisco-based nonprofit Electronic Frontier Foundation. The EFF report includes screen shots to help Syrian activists and other users identify the specific harmful files. Yet merely deleting the files or using anti-virus software "does not guarantee that your computer will be safe or secure," added EFF. The remote control access that BlackShades provides could allow intruders to install other spyware on one's computer. What's the safest bet? EFF suggests re-installing the computer's Operating System and changing all passwords to any accounts that one has logged into since the infection. [userpic-26-100x100.png] Frank Smyth is CPJ's senior adviser for journalist security. He has reported on armed conflicts, organized crime, and human rights from nations including El Salvador, Guatemala, Colombia, Cuba, Rwanda, Uganda, Eritrea, Ethiopia, Sudan, Jordan, and Iraq. Follow him on Twitter [9]@JournoSecurity. Tags: * [10]Cyberattack, * [11]Internet, * [12]Skype June 20, 2012 3:25 PM ET Frank Smyth Executive Director Global Journalist Security [13]frank at journalistsecurity.net T. + 1 202 244 0717 C. + 1 202 352 1736 Twitter: @JournoSecurity Website: [14]www.journalistsecurity.net Please consider our Earth before printing this email. Confidentiality Notice: This email and any files transmitted with it are confidential. If you have received this email in error, please notify the sender and delete this message and any copies. If you are not the intended recipient, you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited. References 1. http://cpj.org/security/2012/06/skype-trojan-targets-syrian-citizen-journalists-ac.php 2. file://localhost/blog/author/frank-smyth 3. http://bshades.eu/bsscmds.php 4. https://secure.payproglobal.com/orderpage.aspx?products=57625 5. http://www.payproglobal.com/aboutus.html 6. http://bshades.eu/legal.php 7. https://citizenlab.org/2012/06/syrian-activists-targeted-with-blackshades-spy-software/ 8. https://www.eff.org/deeplinks/2012/06/darkshades-rat-and-syrian-malware 9. https://twitter.com/#!/JournoSecurity 10. file://localhost/tags/cyberattack 11. file://localhost/tags/internet 12. file://localhost/tags/skype 13. mailto:frank at journalistsecurity.net 14. http://www.journalistsecurity.net/ _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From foxmuldrster at yahoo.com Wed Jun 20 11:29:20 2012 From: foxmuldrster at yahoo.com (Rick C. Hodgin) Date: Wed, 20 Jun 2012 14:29:20 -0400 Subject: [Freedombox-discuss] Freedombox Mesh Network Simulator Message-ID: Rick, These are mine: The mesh network should be able to route packets from any geographic location to another, merely by knowing where it (itself) is, where the packet came from and where it's going. There are certain aspects of forward-transmissions for packets each FBX would have to maintain for a period time in case one or more of the FBXs fell off the mesh and are no longer available, which would require re-routing through a less-than-optimal route, although given the circumstances of the FBX "holes" that now exist in the living, dynamic mesh, perhaps may NOW actually be THE optimal route. I think getting away from IP addresses (except as mechanical means to coordinate with FBX devices that indicate they're "over there in the direction I want to send stuff"), and going entirely with geographic addresses will solve everything. There is still the issue of geographic identity for a roaming target, but I think a lifetime relative to the nature of the roaming speed for nearby FBXs would solve that as well. We'll see. I could be wrong. Probably am. My hard-headedness and stubbornness will mandate that I prove it to myself though, which I may well do this weekend. Ever see a 42-yr old man eat crow on a mailing list? Stay tuned... I might just do that come Sunday evening! :-) LOL! Best regards, Rick C. Hodgin On 06/20/2012 02:21 PM, Rick wrote: > > Would it be useful to discuss requirements from scratch? > > On Wed, Jun 20, 2012 at 2:13 PM, John Gilmore > wrote: > > > My wife and I are walking in mall with at least one other person > every > > 40 feet or so. We decide to separate and go shopping. I walk > this way, > > she walks that way. Before long we're out of direct WiFi > communication > > range to each other. Now, if enough people there in the mall had > > WiFi-enabled devices running some mesh software, I'd like to be > able to > > stay in contact with my wife as she moves about in her random > way, and > > as they all move about in their random ways. > > The One Laptop per Child project also wanted to satisfy this goal. > They wanted kids all over a village to be able to reach each other and > to reach the Internet via a gateway at their school. They had the > advantage of designing and building both the hardware and software. > But they failed, partly due to system integration issues. > > They were using a buggy implementation of 802.11 meshing that preceded > 802.11s. But they also used higher level user interface software, > which used multicast packets to find and communicate with other nearby > laptops. The mesh software worked poorly with multicast. Not only > did it send multicasts at the slowest speed (1 megabit), which took up > a lot of airtime, but the various nodes would repeat the multicasts to > make sure that every node had heard them. This limited the size of > the network that they could scale to. They did not discover this > unfortunate interaction until very late in the > hardware/software/firmware integration process (when the > multicast-based application sharing software started working). > > Another major problem was that a mesh network is very hard to > reproduce. If it does something unexpected or suboptimal, the > developers can't just teleport themselves to the part of the world > where that particular physical configuration of radio nodes, physical > antennas, software versions, and firmware versions exists. In many > cases they can't even reach into the nodes of that network over the > Internet while the problem is happening, to debug it. Many, many OLPC > mesh problems occurred in the field which could not be replicated in > the lab, which made them 10x or 100x harder to fix. This meant that > buggy mesh network firmware and software didn't improve at the usual > rate (of the rest of their software). > > The result was that despite a lot of work addressing bugs and > performance in the mesh firmware, they never got their automatic mesh > network working with more than a handful of XO laptops. If you put 30 > laptops in a classroom, they would burn up 100% of the radio bandwidth > (and chew up their batteries) merely with overhead packets ("Hi, i'm > here." "Hi you, I'm me; have you heard about Joe and Alice over > there?" "In case you want to send a message to Joe, send it via me to > Alice; I can hear Alice just fine."). There was no bandwidth left for > the users to actually communicate; connections would time out, nodes > would appear and disappear from the mesh, etc. So OLPC stopped using > the mesh and recommended that each classroom install one or more > 802.11 access points. Which has worked ok. They also switched to > support ad-hoc 802.11 without meshing, for automatically networking "a > few students sitting around under a tree", which also works ok. > > There ARE some mesh networks that I hear are working on a larger > scale, such as B.A.T.M.A.N. I suspect that the large scale meshes are > in largely static networks that are tuned by humans to work well (just > as the broader Internet's routing system is tuned by humans to work; > it's not automatic). I do not know if other meshes support multicast > (or other portable ways for high level software to find what nodes are > on the network), nor whether they work in a network of mobile nodes > with limited battery life. All I can report on is the one project I > was involved in (OLPC), in which their mesh implementation failed to > accomplish its goals, and was dropped from the next generation > hardware and software. > > This is part of why I recommend using wired connections wherever > possible. For FreedomBox to succeed, it needs to succeed at scale. A > FreedomBox network that can't route packets for more than 500 nodes > worldwide wouldn't be worth building. (Clue: this is why the Internet > exists today: it scaled up and kept working, while the proprietary > networks that preceded it didn't scale up to worldwide scale.) In a > substantial network, your mesh and dynamic routing protocol could > require a few megabits of traffic at all times on each node, just > keeping track of everything. Over a 100-megabit Ethernet that's just > 2 or 3% of the bandwidth. But over 802.11, that burns up most of the > available bandwidth. Every connection you move off wireless onto a > wire makes more radio bandwidth available for the folks who truly > can't run a wire. > > I have some ideas about how FreedomBox nodes could provide censorship > resistant networking via running an overlay IPv6 network using > geographically based addressing to simplify the routing problem. I'll > dig those up and repost them in the next few days. It isn't an > automatic mesh, though; it has explicit connections made by humans > among friendly nodes. The part that's automatic is how the packets > flow after the humans make those connections. > > John > > PS: If you think a mesh protocol shouldn't use even a megabit/second > of continuous overhead, please design and build one that doesn't, > and that scales up and keeps working. It's harder than it looks. > > _______________________________________________ > Freedombox-discuss mailing list > Freedombox-discuss at lists.alioth.debian.org > > http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss > > > > > -- > /Ramen./ _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From declarationyj36 at caliber.com Wed Jun 20 06:34:13 2012 From: declarationyj36 at caliber.com (=?koi8-r?B?IuLJzMTF0tMt8/Ai?=) Date: Wed, 20 Jun 2012 15:34:13 +0200 Subject: =?koi8-r?B?68/OxMnDyc/OxdLZIMzAwtnIIM3B0s/LLiDtz87UwdYuIO/exc7YIM7J?= =?koi8-r?B?2svJxSDDxc7ZLg==?= Message-ID: <000d01cd4ee0$ff95a350$6400a8c0@declarationyj36> Кондиционеры любых марок. Монтаж. Очень низкие цены. т.(495)9952723 т.(495)7233603 From grenadiershm8889 at sandspit.com Wed Jun 20 01:49:11 2012 From: grenadiershm8889 at sandspit.com (=?koi8-r?B?IuUtzcXJzCDNwdLLxdTJzsci?=) Date: Wed, 20 Jun 2012 15:49:11 +0700 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAgKyDIz9PUyc7HIM7BIM3F09HDINcg?= =?koi8-r?B?8O/k4fLv6w==?= Message-ID: <065416392.13787323723629@sandspit.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 15415 bytes Desc: not available URL: From sana at bolobhi.org Wed Jun 20 08:48:22 2012 From: sana at bolobhi.org (Sana Saleem) Date: Wed, 20 Jun 2012 16:48:22 +0100 Subject: [liberationtech] Pakistan: PTAbs alleged persistent pursuit of a URL filtration and blocking system is not acceptable Message-ID: Hi all, Sharing this with caution. Since the liberationtech community played a crucial role in working with Pakistani civil society in pressuring the Pakistan Government to back out of the URL Filtration System. *Please note we are following up on the situation, moving with caution, but since a court case is involved the statement has been issued in light of legal requirements. Notices have been issued to PTA, Ministry of IT and the Government. * Statement Link (See here) *Please note that this is an unconfirmed report but from a reliable source, we are following the situation and will be publishing confirmed reports immediately. * *Karachi 20th June 2012:* We received information from a reliable source that Pakistan Telecommunication Authority (PTA) issued a notification to other government departments announcing the installation of a filtering system. This has in turn been sent to some IT companies. As citizens concerned about internet freedom and free flow of information, this unconfirmed news is of grave concern to us. With great caution, we would like to share an update on this situation: The exact words in the email are pasted below. bPlease note that PTA has deployed an automatic filtering system and is directly blocking sites deemed as disseminating objectionable content. Our upstream providers are no longer managing this process. We regret any inconvenience this may have caused you.b The content in the email suggests that the ISPs will no longer be responsible for blocking websites and that the PTA will now be able to block sites at will. The content in the email suggests that the Internet Service Providers (ISPs) will no longer be responsible for blocking websites and that the PTA will now be able to block sites at will. *We are currently working in to verifying this news from various other sources. We are in communication with government officials who have committed to update us on the issue. We issue this statement with caution.* As a reminder: On the 17th of April 2012, seven individuals* through their advocates Haider Waheed and Basil Nabi Malik, petitioned the High Court of Sindh at Karachi challenging the arbitrary and random acts of the PTA in blocking/censoring and restricting access to various websites in violation of the fundamental rights of the owners of the websites/online forums as well as the public at large, and without affording the aggrieved persons an opportunity of being heard or due notice. The Honorable High Court of Sindh issued notice to the Federation of Pakistan, through the Secretary, Ministry of Information Technology and Telecommunication, and the Pakistan Telecommunication Authority, through its Chairman, and furthermore ordered the PTA said not to block any website other than in accordance with the provisions of the Pakistan Telecommunication (Re-Organization) Act, 1996. A letter to the PTA has already been issued demanding a clarification on the issue and we would like to reassert that any steps by the PTA to pursue ad hoc blocking will be a violation of the court stay order. If true, this is a set-back to the free-flow of information and internet freedom in Pakistan. Despite the Ministry of IT making a commitment to Bushra Gohar, Member of National Assembly,the PTAbs persistent pursuit of a URL filtration and blocking system is extremely disappointing and shows disregard for democratic values. *Bolo Bhi means bSpeak upb, we are an organization with focus on advocacy, policy and research. Our focus areas include human rights with focus on gender and minority rights, internet freedom and privacy. We believe it is crucial to bridge the gap between rights advocates, policy makers, media and average citizens. Bridging the gap enables collective strength and concentrated focus on the areas that require attention. * _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From patrickbx at gmail.com Wed Jun 20 14:13:16 2012 From: patrickbx at gmail.com (Patrick B) Date: Wed, 20 Jun 2012 17:13:16 -0400 Subject: [tor-talk] Orbot Data Overhead Message-ID: I made a blog post on the Guardian site about the data cost incurred by Orbot usage. It generally seems quite manageable for most use cases. Running in the backround 24/7 for 30 days does incur ~200MB of idle usage which would be significant for mobile users with smaller data plans. Check out the post for more details. I'm also curious if anyone has taken similar measurements with Tor to compare the results. -Patrick _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Jun 20 08:40:04 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 20 Jun 2012 17:40:04 +0200 Subject: [cryptography] cryptanalysis of 923-bit ECC? Message-ID: <20120620154004.GE17120@leitl.org> ----- Forwarded message from Matthew Green ----- From eugen at leitl.org Wed Jun 20 08:58:33 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 20 Jun 2012 17:58:33 +0200 Subject: [liberationtech] Pakistan: =?utf-8?Q?PTA?= =?utf-8?Q?=E2=80=99s_alleged_persistent_pursui?= =?utf-8?Q?t?= of a URL filtration and blocking system is not acceptable Message-ID: <20120620155833.GH17120@leitl.org> ----- Forwarded message from Sana Saleem ----- From eugen at leitl.org Wed Jun 20 09:15:33 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 20 Jun 2012 18:15:33 +0200 Subject: Secrecy News -- 06/20/12 Message-ID: <20120620161533.GI17120@leitl.org> ----- Forwarded message from Steven Aftergood ----- From brandym at murillomodular.com Wed Jun 20 07:20:40 2012 From: brandym at murillomodular.com (=?koi8-r?B?IuHMxcvTxcog4sHWxc7P1yI=?=) Date: Wed, 20 Jun 2012 19:50:40 +0530 Subject: =?koi8-r?B?4sXazMnNydTOwdEgzcXWxNXHz9LPxM7B0SDT19Ha2A==?= Message-ID: <01cd4f1d$f82da800$3e3cb73b@brandym> Безлимитная междугородная связь Звонки по всей России всего за 3 000 р. в месяц. Звоните сегодня: (495) 225-04-62 Безлимитными являются звонки не только на городские номера, а так же и междугородные звонки на номера мобильных операторов. From braun at symetri.com Wed Jun 20 10:52:53 2012 From: braun at symetri.com (=?koi8-r?B?Iu3JyMHJzCI=?=) Date: Wed, 20 Jun 2012 19:52:53 +0200 Subject: =?koi8-r?B?4sXazMnNydTOwdEgzcXWxNXHz9LPxM7B0SDT19Ha2A==?= Message-ID: <01cd4f1e$4773d880$a36de958@braun> Безлимитная междугородная связь Звонки по всей России всего за 3 000 р. в месяц. Звоните сегодня: (495) 225-04-62 Безлимитными являются звонки не только на городские номера, а так же и междугородные звонки на номера мобильных операторов. From windpipesv8 at ramafab.com Wed Jun 20 21:07:20 2012 From: windpipesv8 at ramafab.com (MailGroup+) Date: Wed, 20 Jun 2012 20:07:20 -0800 Subject: =?koi8-r?B?68HexdPU18XOzs8g0sHawdvMxc0gzMDC1cAg0sXLzMHN1SDQzyDczMXL?= =?koi8-r?B?1NLPzs7PyiDQz97UxSDtz9PL19kh?= Message-ID: <000d01cd4f5a$f90f8fd0$6400a8c0@windpipesv8> Сегодня акция 3 рассылки всего за 5000 рублей или 5 рассылок за 7 000руб! Закажите сегодня и используйте в любые дни лета! Наш telefon- (Ч95) 585 - Четыре Восемь - 57 From biggs at siras.com Wed Jun 20 11:18:59 2012 From: biggs at siras.com (=?koi8-r?B?Iu/06/L59PnqIOH16+Pp7+4i?=) Date: Wed, 20 Jun 2012 20:18:59 +0200 Subject: =?koi8-r?B?9MnQyd7O2cUgz9vJwsvJINDSySDQ0s/XxcTFzsnJIMHVy8PJz87P1w==?= =?koi8-r?B?LiA=?= Message-ID: <01cd4f21$ecdc7b80$ba60811f@biggs> 02 - 03 июля 2012 г., САНКТ-ПЕТЕРБУРГ ГОСУДАРСТВЕННЫЙ И МУНИЦИПАЛЬНЫЙ ЗАКАЗ - РЕФОРМИРОВАНИЕ СИСТЕМЫ. НОВОЕ В ПРАВОВОМ МЕХАНИЗМЕ ЗАКУПОК ТОВАРОВ И УСЛУГ ДЛЯ ГОСУДАРСТВЕННЫХ И МУНИЦИПАЛЬНЫХ НУЖД. ЭЛЕКТРОННЫЕ ТОРГИ (аукцион). ПРОГРАММА МЕРОПРИЯТИЯ: 1. Правовое регулирование размещения государственного заказа на федеральные и муниципальные нужды. Обзор законодательства в области размещения государственного заказа. Гражданский кодекс, антимонопольное законодательство и др. регламентирующие акты. Размещение госзаказа в электронной форме согласно положениям главы 3.1 Федерального закона 94-ФЗ. Новые требования к закупочной деятельности в соответствии с 223-ФЗ. Электронные торги (аукцион). 2. Сфера применения законов 94-ФЗ и 223-ФЗ: основные особенности, отличия, взаимодополняемость, практика применения. 3. Новая редакция Федерального закона "О защите конкуренции" в соответствии с 401-ФЗ от 06.12.2011 г., вступившего в силу 6 января 2012 года. Изменения требований к торгам и порядку заключения договоров в отношении государственного и муниципального заказа. 4. Хозяйствующие субъекты, закупочная деятельность которых регламентируется в соответствие с 223-ФЗ от 18.07.2011. Сроки применения положений Закона. 5. Информация, подлежащая размещению с 1 июля 2012 г. на Общероссийском официальном сайте. 6. Подготовка типовой документации о закупочной деятельности. Регламент закупок; требования к разработке Положения о закупках; формирование и утверждение плана закупок на год; закупочная комиссия; техническое задание, типовые требования к участникам закупок и штату квалифицированных сотрудников участника закупок для работы по ФЗ-223; обоснование цены контракта. Комментарии к положениям Закона, вступающим в силу с 01 апреля 2012 года. 7. Выбор способа закупки. Закупки путем проведения конкурса, аукциона, аукциона в электронной форме, путем проведения запроса котировок, предложений, путем проведения конкурентных переговоров. Порядок и сроки проведения. Размещение заказа у единственного поставщика. Обоснование способа закупки в соответствии с 223-ФЗ. 8. Особенности проведения аукционов: порядок опубликования извещения,аукционной документации, изменений, разъяснений, итогов аукциона, структура аукционной документации, обеспечение аукционной заявки и гарантии выполнения контракта, аукциона с одним участником. Электронные заявки. Типичные ошибки при проведении аукционов. Новые аспекты организации и проведения. 9. Закупки на электронные площадках. Обзор действующих электронных торговых и федеральных площадок: ЭТП "Сбербанк - АСТ", ЭТП "РТС-тендер", ЭТП ММВБ, ЭТП "Единая электронная торговая площадка", ЭТП Агентства по государственному заказу Республики Татарстан. Электронные торговые площадки субъектов РФ. Правила регистрации, условия участия в торгах. 10. Электронный аукцион - что нужно знать Участнику, чтобы принять участие в электронном аукционе: соответствующее программное обеспечение, ЭЦП и порядок ее регистрации, документы на регистрацию, размещение извещения, документации об аукционе и протоколов. На каких площадках могут проводиться электронные аукционы?"Отрицательный электронный аукцион", правовые последствия его проведения. Какие документы нужно предоставить для прохождения аккредитации на торговой площадке? Обеспечение заявок на участие в аукционе в электронной форме: как и кому предоставляется. Условия удержания обеспечения. Как подготовить и подать заявку на участие в открытом аукционе в электронной форме? 11. Специфика размещения государственного заказа в различных отраслях.Государственный и муниципальный контракт на поставку лекарственных средств и медицинского оборудования. Открытый аукцион в электронной форме на строительные работы. Особенности работы с электронными площадками размещения заказа госкорпораций ("Росатом", ОАО "Оборонсервис" и др.) 12. Полномочия, функции, формы работы органов, контролирующих законодательство о размещении заказов. Реестр недобросовестных поставщиков. 13. Защита прав и интересов участников размещения заказов. Обжалование действий заказчиков и конкурсных компаний в области государственных и муниципальных закупок. Порядок составления и рассмотрения жалоб и исковых требований участников размещения заказов. 14. Ответственность за ненадлежащее исполнение государственного контракта. Ответственность за неприменение 223-ФЗ. Роль ФАС в контроле корпоративных закупок. Обзор практики. 15. Федеральная контрактная система: перспектива развития системы в 2012-2013 годах. НА ВСЕ ИНТЕРЕСУЮЩИЕ ВОПРОСЫ ВАМ ОТВЕТИТ НАШ СЕКРЕТАРЬ: (812) 6Ч2..21.З2 From eugen at leitl.org Wed Jun 20 11:35:17 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 20 Jun 2012 20:35:17 +0200 Subject: [Freedombox-discuss] Freedombox Mesh Network Simulator Message-ID: <20120620183517.GM17120@leitl.org> ----- Forwarded message from John Gilmore ----- From eugen at leitl.org Wed Jun 20 11:37:00 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 20 Jun 2012 20:37:00 +0200 Subject: [Freedombox-discuss] Freedombox Mesh Network Simulator Message-ID: <20120620183700.GN17120@leitl.org> ----- Forwarded message from "Rick C. Hodgin" ----- From bovo at jnm.be Wed Jun 20 08:15:10 2012 From: bovo at jnm.be (=?koi8-r?B?IuPFztTSIPDPxMfP1M/Xy8kg89DFw8nBzMnT1M/XIg==?=) Date: Wed, 20 Jun 2012 20:45:10 +0530 Subject: =?koi8-r?B?68/O1NLPzNgg2sEgxsnOwc7Tz9fPyiDExdHUxczYzs/T1NjAIOHv?= Message-ID: <01cd4f25$95400f00$0f1aa87a@bovo> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 313 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 62789 bytes Desc: not available URL: From adriano at fitt.ca Wed Jun 20 08:41:54 2012 From: adriano at fitt.ca (=?koi8-r?B?IuHMzMEg5sXMycvTz9fOwSI=?=) Date: Wed, 20 Jun 2012 21:11:54 +0530 Subject: =?koi8-r?B?8NLRzdnFIMfP0s/E08vJxSDOz83F0sEg1yDLz8TFIDQ5NSDJIDQ5OQ==?= Message-ID: <01cd4f29$514f0900$267cca75@adriano> Виртуальная АТС за 300 рублей в месяц Прямой городской многоканальный номер в коде 495 и 499 Звоните сегодня: (495) 225-04-62 5 причин заказать номер сейчас: - Экономия на покупке телефонной станции - Всегда свободная линия для входящих звонков - Сохранение телефонного номера при переезде компании в другой офис - Оптимизация распределения входящих звонков - Подробная статистика по прямым и переадресованным звонкам From behalf1 at gepolis.com Wed Jun 20 05:35:39 2012 From: behalf1 at gepolis.com (=?koi8-r?B?IufFz9LHycog98nUwczYxdfJ3iI=?=) Date: Wed, 20 Jun 2012 21:35:39 +0900 Subject: =?koi8-r?B?4sXazMnNydTOwdEgzcXWxNXHz9LPxM7B0SDT19Ha2A==?= Message-ID: <01cd4f2c$a2acc780$544724d3@behalf1> Безлимитная междугородная связь Звонки по всей России всего за 3 000 р. в месяц. Звоните сегодня: (495) 225-04-62 Безлимитными являются звонки не только на городские номера, а так же и междугородные звонки на номера мобильных операторов. From edrigram at edri.org Wed Jun 20 11:48:00 2012 From: edrigram at edri.org (EDRi-gram) Date: Wed, 20 Jun 2012 21:48:00 +0300 Subject: EDRi-gram newsletter - Number 10.12, 20 June 2012 Message-ID: ======================================================================= EDRi-gram biweekly newsletter about digital civil rights in Europe Number 10.12, 20 June 2012 ======================================================================= Contents ======================================================================= 1. The rise of the European upload filter 2. Austria: Data retention petition ignored by the Parliament 3. Google Transparency report: increasing trend of government censorship 4. German news article removed from search results after DMCA complaint 5. Article 29 WPbs opinion on the cookie exemptions 6. UK websites might have to identify btrollsb 7. Spanish Supreme Court says Google is not breaching copyright 8. Googlebs Street View privacy breach again in the public eye 9. Prague ICANN meeting to discuss Whois data 10. Culture: Global changes in production and consumption 11. ENDitorial: Data retention - faint heart never won fair lady 12. Recommended Reading 13. Agenda 14. About ======================================================================= 1. The rise of the European upload filter ======================================================================= In 2011, the European Union decided against the introduction of mandatory filtering in Europe, because a democratic analysis of the evidence showed that this was not necessary. In 2012, the European Union is working on a variety of projects to introduce bvoluntaryb upload filters and, because they would be introduced on a so-called bvoluntaryb basis, there will be no democratic analysis. There are at least three different initiatives currently underway with this target. Firstly, Commissioner Kroes' bCEO Coalitionb. As previously mentioned in the EDRi-gram, this initiative involves the Commission inviting big business to propose measures that will make the Internet a bsafer place for childrenb. The fact that Facebook is in charge of privacy settings and Microsoft is in charge of bnotice and takedownb appears to raise no concerns about the process being instrumentalised for business purposes. Microsoft's history in bnotice and takedownb is hardly exemplary. Recent cases showing that Microsoft, using Google's global application of US copyright law, has repeatedly demanded that Google removes links from its search results b links which remain available on Microsoft's own search engine. Microsoft, on the other hand, has also developed a product called bphotoDNA,b used by Facebook UK as an upload filter to prevent known child abuse material being added to their site. What happens when somebody tries to do this? Nobody knows. What happens if a criminal tries to upload innocent parts of images as a way of filtering his/her own collection of illegal images to identify images unknown to the police? We don't know. How big is the risk that this could lead to incentives to creating new illegal images and new abuse? We don't know. In the same vein, the bSafer Internet Programme 2012b announced that one of its strategies was to bdevelop a pilot test for trusted hash code / fingerprint series for preventing re-uploading of identified child sexual abuse materialb. Remarkably, the Commission's proposal includes an explicit reference to PhotoDNA, Microsoft's product. The plan is also to extend beyond photographic material and cover videos. Finally, the European Parliament is currently working on a non-legislative resolution on bthe protection of minors in the digital world,b with Silvia Costa (S&D, Italy) as MEP in charge. Neither her draft report nor any of the amendments make a reference to filtering of any kind. However, the text, largely (as it seems reasonable to assume) donated by the child protection industry, is replete with references to bpreventingb various online activities, without any discussions in the Parliament about filtering uploads to the Internet. The draft report also masterfully confuses illegal content with unspecified bunsuitableb content arguing that bmeasures to prevent illegal online content lead to differing approaches to the prevention of unsuitable conduct". But one can't really oppose the use of such a far-reaching strategy for child protection. If it protects children, why ask questions about whether there will be unforeseen or even counter-productive consequences? Why ask questions about whether this is the most effective use of resources? Why ask for democratic oversight or evidence of usefulness? And, of course, nobody would be so cynical as to re-use the technology for any other purpose, would they? Well, apart from terrorism, of course. The EU-funded bClean ITb (not to be confused with the Iranian bclean Internetb) project is proposing the creation of a database of content bconsideredb illegal. bWhy not try and create a database where internet companies can check it to see if it's known illegal materialb asks the project manager? And if it protects society, why ask questions about whether there will be unforeseen or even counter-productive consequences? And all of the questions that are not asked about upload filters for child abuse material are not asked again in relation to terrorism. Well, apart from copyright, of course. The European Commission's report from 2010 on the application of the IPR Enforcement Directive argues that, bgiven intermediaries' favourable position to contribute to the prevention and termination of online infringements, the Commission could explore how to involve them more closely.b Safer Internet Programme http://ec.europa.eu/information_society/activities/sip/docs/call_2012/work_programme_final.pdf IPR Enforcement Directive http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2010:0779:FIN:EN:PDF Draft European Parliament report on protection of minors (2.04.2012) http://www.europarl.europa.eu/sides/getDoc.do?type=COMPARL&mode=XML&language=EN&reference=PE486.198 Clean IT project considers terrorist content database (6.06.2012) http://www.itnews.com.au/News/303729,clean-it-project-considers-terrorist-content-database.aspx Busted: Microsoft Harbors BitTorrent Pirates (27.05.2012) http://torrentfreak.com/busted-microsoft-harbors-bittorrent-pirates-120527/ Facebook & PhotoDNA (19.05.2011) http://blogs.technet.com/b/microsoft_on_the_issues/archive/2011/05/19/facebook-to-use-microsoft-s-photodna-technology-to-combat-child-exploitation.aspx (Contribution by Joe McNamee - EDRi) ======================================================================= 2. Austria: Data retention petition ignored by the Parliament ======================================================================= The Austrian Working Group on Data Retention counters the lack of responsiveness to citizens' political participation with even more participation. Albeit gaining support of over 100 000 citizens, the Austrian citizens' petition against data retention has been deferred to the Parliament Justice Committee by the Petition Committee. The Austrian working group on data retention (AKVorrat.at) has decided to change pace in the campaign and asks its supporters to contact the representatives in the justice committee, to ensure that their concerns are taken seriously. In October 2011, the Austrian working group on data retention (AKVorrat.at) started a petition, called citizens' initiative, asking the Austrian government to oppose the EU data retention directive and to evaluate all laws created with the aim to fight terrorism. In December, the initiative was passed to the Parliament with more than 4400 supporters. Since mid-December the initiative could be signed online and reached a total of 106 067 supporters until 30 May 2012. The Petition Committee of the Austrian Parliament dealt with the issue twice: in March and on 30 May 2012. Both times their schedule allowed only less than 5 minutes to deal with the initiative and its consequences. In March 2012, the Committee decided to ask three ministries (Justice, Interior and Infrastructure) as well as the Chancellor's office for statements. All ministries' statements clearly missed the point by stating that Austria had to implement data retention because of the Data Retention Directive of the European Parliament and of the Council. These statements are quite surprising as one of the key demands of the initiative is that the Austrian government should act within the European Union to abolish the Data Retention Directive. The other main demand - the evaluation of laws designed to fight terrorism - was completely ignored. In the second meeting, there was no reaction to the statements and the initiative was passed on to the Justice Committee. AKVorrat.at reacted quickly: "After being astonished initially by the brief treatment in the petition committee a new campaign was kicked off. Since the citizens' initiative can no longer be signed the new campaign asks all the supporters to contact the representatives in the justice committee to ensure proper treatment of the demands supported by more than 100,000 citizens. To date it is unclear how and when the initiative will be discussed in the committee. Nevertheless, the activists of AKVorrat.at are determined to maintain data retention as one of the hot topics in Austrian politics." Austrian Parliament - Citizens' initiative - Stop Data retention (only in German) http://www.parlament.gv.at/PAKT/VHG/XXIV/BI/BI_00037/index.shtml AK Vorrat Austria campaign against data retention (only in German) https://zeichnemit.at (Contribution by AK Vorrat - Austria) ======================================================================= 3. Google Transparency report: increasing trend of government censorship ======================================================================= According to Googlebs latest bi-annual transparency report covering the July-December 2011 period, the number of governmental requests for usersb private data and content taking down has continued to grow. The report shows the situation for each country separately and refers to the requests received from judiciary and executive power authorities, the request for content removal related to copyright infringements being dealt with separately. Thus, the total number of requests has reached 11 936 in the second half of 2011 as compared with 9 600 in the same period in 2010 and 8 959 in the second half of 2009. The Spanish Data Protection Agency, for instance, has made 14 requests for content removal, most of them related to results leading to blogs or websites that referred to political or public people. The agency has also requested the elimination of three blogs hosted by Blogger and 3 video clips from YouTube. Google has however refused to comply with the requests which had no court support, considering them as governmental censorship. In Poland the Agency for Development of Businesses had demanded the search engine to delete a search result that was not favourable to the Agency and 8 other links that were pointing to this result. In France, the state demanded the deletion of 61 content pieces by 31 requests, most of them for defamatory content or pornography on YouTube. Googlebs report is giving the number of requests the company complied with or rejected making a distinction between the judicial requests and the administrative ones. bThere are several reasons why we do not comply with certain requests. Some of them may be specific enough so that we may know what the government wants us to suppressb. Google policy analyst Dorothy Chou has stated for Forbes that Google requires certain criteria for the requests. These must be submitted in a written form, have to come from an appropriate agency, must cite a criminal case and have to be narrow enough regarding the number of users that they affect and the time frame of data that is requested. bWe want to show that webre advocating on your behalf. But we also want to do right by the spirit and letter of the law,b says Chou. Google considers as alarming the fact that even countries considered democratic, such as Spain, France, Poland, UK, US or Canada have increased their requests related to political expressions. bWe noticed that government agencies from different countries would sometimes ask us to remove political content that our users had posted on our services. We hoped this was an aberration. But now we know itbs not. Just like every other time before, webve been asked to take down political speech. Itbs alarming not only because free expression is at risk, but because some of these requests come from countries you might not suspectbWestern democracies not typically associated with censorship,b stated Chou. Google Transparency Report for July-December 2011 http://www.google.com/transparencyreport/removals/government/ Google denounces an alarming level of governmental censorship (only in French, 18.06.2012) http://www.numerama.com/magazine/22912-google-denonce-un-niveau-alarmant-de-censure-gouvernementale.html Google refuses the removal of the links that the Protection of Data requires (only in Spanish, 18.06.2012) http://tecnologia.elpais.com/tecnologia/2012/06/18/actualidad/1339999915_714909.html U.S. Government Requests For Google Users' Private Data Jump 37% In One Year (17.06.2012) http://www.forbes.com/sites/andygreenberg/2012/06/17/u-s-government- requests-for-google-users-private-data-spike-37-in-one-year/ ======================================================================= 4. German news article removed from search results after DMCA complaint ======================================================================= European procedures for the removal of online content that is judged or accused of being illegal currently depend on the interpretation of the e-Commerce Directive by Member States and private companies. This means that whenever sites, blog posts, images or comments on the internet are accused of being illegal, procedures implementing this Directive are not clear, not harmonised and lead to legal uncertainty. Internet service and hosting providers risk liability for the content of their customers once they have bactual knowledgeb of its illegality or, possibly, just its existence, and do not remove the content 'expeditiously'. It is however very foggy what bactual knowledgeb or bexpeditiousb means and what the requirements for a valid notice can be. Any lack of clarity leads almost automatically to the undermining of fundamental freedoms and the due process of law, because online companies will seek to defend themselves by deleting any content that creates a legal risk for them. In the US, service and hosting providers can maintain their immunity via the so-called Digital Millennium Copyright Act (DMCA). Under these safe harbour protections, they cannot be held responsible for material that has been posted in breach of copyright. However, as soon as they receive a notification meeting certain conditions, they need to remove it from their services. Even though it can be argued that the structured US system is more predictable than the current European approach, it also has major flaws. Google's latest transparency report, which focuses on the takedowns for search links, has revealed how absurd some requests are. Microsoft for instance has requested the removal of over 2.5 million URLs. The sheer volume means that the complaints procedure is mainly or fully automatic, with Google and other recipients of the "notices" automatically deleting the information in question. On the basis of DMCA complaints, Google also deletes sites from global search results b with no concern for whether the content is legal outside the U S. For example, on 6 June 2012, Microsoft sent a DMCA takedown notice to Google regarding an article about Windows 8 published by the German IT-news platform Heise. The link to the article was removed without questioning the validity of the complaint. It was removed without even asking if the content would be legal in Germany. And it was removed without any consultation with the author of the article. Heise staff noticed accidentally that the link was removed only after finding the DMCA report on their Webmaster Tools service. The German publisher immediately sent a counter-notice which however implied that the counter-notifier gives its consent that the legal competent authority is the District Court of Santa Clara County in California b despite the fact that the affected company, blog, news platform or website owner is based in Europe. The initial notifying party then has 10 working days to react to the counter-notice. During this period, the website will still not appear in search results. According to Google's DMCA report received by Heise, it can take up to 11 hours to remove links from its search result upon receipt of a DMCA takedown request. However, it can take several weeks until a takedown is reported by the collaborative archive Chilling Effects Clearinghouse (chillingeffects.org). This recent example shows that the DMCA is, despite being more predictable than the European system, a process in which a website is first shut down and only then questions are being asked with regards to the legality of the content. In the US and elsewhere, the application of the DMCA has led to the deletion of speech content without warning in numerous cases. In Europe, it is now essential to establish a differentiated approach, procedures that are transparent and allow for due process to avoid void, accidental and deliberate abuse leading to the take down of legitimate, non-infringing content and to ensure the functioning of the Digital Single Market. With the aim to establish a framework and to provide guidance on European notice and takedown procedures, the EU Commission has just launched a public consultation in order to clarify the implementation of the e-Commerce Directive by the end of this year. All stakeholders and interested individuals are invited to reply to the public consultation and to provide the Commission with input before 5 September. Microsoft asked to delete Heise article from Google search results (only in German, 8.06.2012) http://www.heise.de/newsticker/meldung/Microsoft-liess-Heise-Meldung-aus-Google-Suchergebnissen-loeschen-1614082.html Google's Transparency Report on takedown requests http://www.google.com/transparencyreport/removals/copyright/ RIAA Demands Unlimited DMCA Power From Google (2.06.2012) http://torrentfreak.com/riaa-demands-unlimited-dmca-power-from-google-120502/ European Commission consultation questionnaire - A clean and open Internet: Public consultation on procedures for notifying and acting on illegal content hosted by online intermediaries Deadline: 5 September 2012 http://ec.europa.eu/yourvoice/ipm/forms/dispatch?form=noticeandaction (Contribution by Kirsten Fiedler - EDRi) ======================================================================= 5. Article 29 WPbs opinion on the cookie exemptions ======================================================================= On 12 June 2012, the Article 29 Working Party (WP 29) published an opinion on the issue, focusing on two exemption criteria established by the new cookie-related provisions in the ePrivacy Directive: A- the use of the cookie bfor the sole purpose of carrying out the transmission of a communication over an electronic communications networkb and B - the use of a cookie if bstrictly necessary in order for the provider of an information society service explicitly requested by the subscriber or user to provide the serviceb. WP 29 established in its opinion the circumstances when the exemption criteria do not apply such as forcing controllers, processors, and third party actors to obtain informed consent before using a cookie. As regarding criterion A, the WP 29 considers this exemption can be used only when the cookies are pivotal to the transmission of the communication and when the transmission is not be possible without the use of the cookies. "Simply using a cookie to assist, speed up or regulate the transmission of a communication over an electronic communications network is not sufficient," says the opinion. Regarding criterion B, the opinion says: "There has to be a clear link between the strict necessity of a cookie and the delivery of the service explicitly requested by the user for the exemption to apply." Cookies served for the purposes of providing a specific functionality within websites will not be considered bstrictly necessaryb unless "the functionality will not be available" without the cookie and the user has "explicitly requested" the functionality from the website. According to the opinion, some cookies can be exempted from informed consent under certain conditions if they are not used for additional purposes - these cookies include for example buser-inputb cookies (used to keep track of the userbs input when filling online forms or as a shopping cart, also known as session-id cookies), multimedia player session cookies and user interface customization cookies (for example language preference cookies to remember the language selected by a user). The cookies that should not be covered by the exemption include social plug-in tracking cookies; third party advertising cookies, third party and first party analytics cookies. Regarding third party and first party analytics cookies, WP 29 remarks however that they carry low privacy risks when they are limited to first party aggregated statistical purposes and when used by websites which also provide adequate privacy safeguards. WP 29 also believes e-Privacy Directive should be amended in order to introduce a new exemption to consent "for cookies that are strictly limited to first party anonymized and aggregated statistical purposes." Opinion 04/2012 on Cookie Consent Exemption (7.06.2012) http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2012/wp194_en.pdf Article 29 Press Release on cookie consent exemption (12.06.2012) http://www.statewatch.org/news/2012/jun/eu-wp-29-dp-cookies.pdf Websites may only place cookies without user consent if services would not work without them, say regulators (13.06.2012) http://www.out-law.com/en/articles/2012/june/websites-may-only-place-cookies-without-user-consent-if-services-would-not-work-without-them-say-regulators/ ======================================================================= 6. UK websites might have to identify btrollsb ======================================================================= According to the new UK government proposals, website operators might soon have to identify users who have posted defamatory messages online, so that the victims of the respective messages may take legal action against the "trolls". Presently in UK, a website operator is liable for everything that appears on its site and therefore it can be taken to court by anybody who claims something defamatory has been posted about him/her on the respective website. The websites are now removing content as soon as a defamation claim is made, irrespective of whether it is right or wrong. "As the law stands, individuals can be the subject of scurrilous rumour and allegation on the web with little meaningful remedy against the person responsible. Website operators are in principle liable as publishers for everything that appears on their sites, even though the content is often determined by users,b says Justice Secretary Ken Clarke. The UK Ministry of Justice is now proposing a Defamation Bill, which is under debate in the House of Commons, that will force operators to identify the creator of a defamatory message and to give that information to the victim so that he (she) may take action directly against the person having posted the defamatory content. The government states that there will also be measures to strengthen freedom of speech and prevent false claims meant to get material removed. "It will be very important to ensure that these measures do not inadvertently expose genuine whistleblowers, and we are committed to getting the detail right to minimise this risk," said Clarke. The present rule that currently counts each separate viewing of a controversial web page as a separate defamatory offence will be removed and a one-year time limit will be introduced to online defamation claims in order to stop people complaining about old articles. However, privacy advocates are concerned about the possible abuse that the new bill might bring forth. Privacy International believes that a large part of the content posted by online trolls is not actually defamatory being rather bharassment, invasion of privacy or simply unpleasant but lawfully-expressed opinionb and is concerned that "gun-shy website operators will start automatically divulging user details the moment someone alleges defamation in order to shield themselves from libel actions". bIf the choice is between protecting users' anonymity and avoiding a potentially costly lawsuit, many small operators are not going to be overly concerned about whether or not a user has genuinely defamed the complainant," said Emma Draper, head of communications at Privacy International to BBC News. For the time being, ISPs seem critical to the proposal as they will be forced to store more information about Internet usage and emails. The proposal will also force them to block all access to pornography websites unless customers specifically state otherwise. Websites to be forced to identify trolls under new measures (12.06.2012) http://www.bbc.co.uk/news/technology-18404621 Victims of internet abuse to get new power to identify 'trolls' (12.06.2012) http://www.telegraph.co.uk/technology/news/9324956/Victims-of-internet-abuse-to-get-new-power-to-identify-trolls.html Q&A: Who are internet trolls - and how is the law changing? (12.06.2012) http://www.bbc.co.uk/news/technology-18408457 ======================================================================= 7. Spanish Supreme Court says Google is not breaching copyright ======================================================================= The Spanish Supreme Court ruled on 3 April 2012 that Google was not in breach of copyright with its browser and cache services. The ruling was given in a case filed in 2006 by the owner of a web page (Megakini.com) for having reproduced and made available its contents, by means of the Google search engine and the Google Cache service, without authorisation. The Supreme Court comes to confirm the previous decision given by the lower court in Barcelona, on 30 March 2007, and the ruling on the appeal of the Provincial Audience of Barcelona, on 17 Sept. 2008, which both concluded the same, although on different grounds. Regarding the reproduction and making available of parts of the webpage contents, all three courts agreed this was not an infringement of the copyright law as it had a temporary, incidental and minimal character. The Supreme Court also rejected the infringement claim in relation to Google cache service. The reason that laid at the basis of the decision was the three-step-test guiding the interpretation of the statutory limitations to the exclusive copyrights. Google Cache service is a bsocially toleratedb use which was not prejudicial to the interests of the claimant. The claimant had asked for 2000 Euro in damages and for the shut down the whole operation of the search engine which the court considered a bmaximalist petitum". According to the court the copyright laws "do not authorize abusive claims nor absurd hypotheses meant to prejudice another without own benefit". However, the court made it clear that the ruling only extended to the specific circumstances of the case and that bcourts do not solve doctrinal polemics.b Court decision (only in Spanish, 3.04.2012) http://pdfs.wke.es/8/6/1/5/pd0000078615.pdf The Supreme Court agrees with Google and considers that its activity does not breach copyright (only in Spanish, 13.06.12) http://www.elmundo.es/elmundo/2012/06/13/navegante/1339570444.html The Supreme Court makes clear that the ruling only extends to the specific circumstances of this case and Spanish Supreme Court rules in favour of Google search engine (15.06.2012) http://kluwercopyrightblog.com/2012/06/15/spanish-supreme-court-rules-in-favor-of-google-search-engine/ ======================================================================= 8. Googlebs Street View privacy breach again in the public eye ======================================================================= Recently, the UK Data Protection Authority - Information Commissioner's Office (ICO) has decided to reopen its investigation on Google over the collection of personal information by Google Street View project from May 2010. As a reaction to the US Federal Communications Commission (FCC)bs report issued earlier this year into the Street View data collection, ICO has now sent a written request to the search engine asking for more details regarding its knowledge of, and reaction to, the data collection. FCCbs report concluded that an engineer working for the company, with the approval of a manager of the company, had written a software code allowing the Street View cars to collect "payload" data from unencrypted Wi-Fi networks in the area covered by the cars "for possible use in other Google projects." The software allowed for the gathering of entire emails, usernames and passwords. "The ICO have reviewed the findings of the FCC report and we understand that a wide range of personal data together with some sensitive data was present in the payloads including, IP addresses, full user names, telephone numbers, complete email messages, email headings, instant messages and their content, logging in credentials, medical listing's and legal infractions, information in relation to online dating and visits to pornographic sites and data contained in video and audio files," says Steve Eckersley, the ICO's head of enforcement, in the letter addressed to Google. Having in view that in 2010 Google admitted to have gathered personal data but stated this had been done by mistake and that now the situation reported by FCC shows that it is likely that such information was deliberately captured, the ICO asks now more information regarding what personal and sensitive personal data was captured in the UK. It also wants details regarding the time when Google managers first became aware that personal information was being gathered and about the technological or organisational measures taken by the company to limit any further data collection. Google is also asked to provide a bsubstantial explanation" of the sample data sent during the initial assessment of the issue as well as copies of the design documents and associated logs containing "managerial decisions and rationale". Google stands in a better position in Switzerland however where the Federal Tribunal has recently ruled that Google did not have to guarantee absolute anonymity for people pictured in its Street View service. "It must be accepted that up to a maximum of 1 percent of the images uploaded are insufficiently anonymized," ruled the Supreme Court on 8 June 2012. However, the Court also stated that Google had to make it easy for people to have their images manually blurred, and ensure total anonymity in sensitive areas such as schools, hospitals, women's shelters and courts. ICO reinvestigates Google's Street View data collection (13.06.2012) http://www.out-law.com/en/articles/2012/june/ico-reinvestigates-googles-street-view-data-collection/ Google wins partial repeal of Swiss privacy ruling (8.06.2012) http://www.google.com/hostednews/ap/article/ALeqM5jqamDsi-XekvVlZOrHULCU9Hm6EA?docId=568d7691903a470a91a5730ab7b41ca8 EDRi-gram: Google admits it was gathering passwords and emails via StreetView (3.11.2010) http://www.edri.org/edrigram/number8.21/street-view-collects-emails ======================================================================= 9. Prague ICANN meeting to discuss Whois data ======================================================================= An ICANN meeting will be held in Prague between 24-29 June 2012, where issues and topics impacting users, consumers and registrants, like whois access and the extension of domain space with ongoing new gTLD program, will be discussed. As a reminder, ICANN is an Internet governing body managing mainly IP addressing and domain names and which is implementing a multi-stakeholder model, bottom-up and consensus-based policy-making process . ICANN as an organization still needs important improvements on accountability, transparency and public interest aspects and also in the involvement of the civil society, activists and academics. It is also developing more complex structure and processes advantaging insiders. The debates are dominated by business and trademark perspective and privacy, human rights, freedom of expression are still marginalized and not systematically included or assessed in the policy making process. One of the rare open spaces in ICANN for the participation of the civil society remains the Non-commercial Stakeholder Group (which includes for example NCUC - the historical non-commercial users constituency). It is one of the stakeholders forming the GNSO (the structure responsible for policy making for gTLD). Prague meeting is an opportunity for NGOs in Europe to follow ICANN activities more closely and to participate in the process since there are several public sessions and in particular the traditional public forum on Thursdays where they can express their concerns. >From a European perspective, the discussion about Thick Whois may definitely interest privacy advocacy organization and also people interested in data protection. ICANN is getting pressure from LEAs with support of some governments (US,UK etc), members of GAC (Governmental Advisory Committee) to implement Thick Whois without real privacy safeguards or a privacy impact assessment and pushing to include those provisions in the registrar's agreements or RAA (Registrar Accreditation Agreement) which is currently under negotiations as well as in the expected new gTLDs to be launched in next years. The ongoing new gTLD program also represents new challenges, benefits and risks for consumers and users. The list of applications for new gTLD was revealed on the 13 June 2012. The process will continue and will include a period for community comments and also possible objections against some TLDs, which may raise a Freedom of Expression issue, in particular, with giving governments, via GAC, the possibility to send "early warnings". Finally, European NGOs are strongly advised to attend the ICANN meeting to be more familiar with those topics and to see how they can be involved in the process to influence it although domain names issues seem narrow as compared to Internet policy topics in general. The development of policies in ICANN and its own model are setting a precedent in the Internet governance context that we need to care about. Website with practical information about ICANN Prague meeting (24-29 June 2012) http://prague44.icann.org Explanation of the process to object an applied gTLD http://newgtlds.icann.org/en/program-status/objection-dispute-resolution Whois recommendations from the review team (5.12.2011) http://www.icann.org/en/news/public-comment/whois-rt-draft-final-report-05dec11-en.htm Homepage of Non-commercial Stakeholder Group http://gnso.icann.org/en/about/non-commercial.htm (Contribution by Rafik Dammak - Non-Commercial Users Constituency/Non-commercial Stakeholder Group) ======================================================================= 10. Culture: Global changes in production and consumption ======================================================================= The Green MEPs Eva Lichtenberger, Sandrine BC)lier and Helga TrC Information about EDRI and its members: http://www.edri.org/ European Digital Rights needs your help in upholding digital rights in the EU. If you wish to help us promote digital rights, please consider making a private donation. http://www.edri.org/about/sponsoring http://flattr.com/thing/417077/edri-on-Flattr - EDRI-gram subscription information subscribe by e-mail To: edri-news-request at edri.org Subject: subscribe You will receive an automated e-mail asking to confirm your request. Unsubscribe by e-mail To: edri-news-request at edri.org Subject: unsubscribe - EDRI-gram in Macedonian EDRI-gram is also available partly in Macedonian, with delay. Translations are provided by Metamorphosis http://www.metamorphosis.org.mk/mk/vesti/edri - EDRI-gram in German EDRI-gram is also available in German, with delay. Translations are provided by Andreas Krisch from the EDRI-member VIBE!AT - Austrian Association for Internet Users http://www.unwatched.org/ - Newsletter archive Back issues are available at: http://www.edri.org/edrigram - Help Please ask if you have any problems with subscribing or unsubscribing. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Jun 20 13:07:00 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 20 Jun 2012 22:07:00 +0200 Subject: LinkedIn password database compromised Message-ID: <20120620200700.GR17120@leitl.org> ----- Forwarded message from Leo Bicknell ----- From amiconeb at readingsd.org Wed Jun 20 10:26:04 2012 From: amiconeb at readingsd.org (=?koi8-r?B?IvLPzcHOIPfB08nM2MXXyd4i?=) Date: Wed, 20 Jun 2012 22:56:04 +0530 Subject: =?koi8-r?B?88/I0sHOxc7JxSDUxczFxs/Ozs/HzyDOz83F0sEg0NLJINDF0sXF2g==?= =?koi8-r?B?xMUgy8/N0MHOyckg1yDE0tXHz8ogz8bJ0w==?= Message-ID: <01cd4f37$de995a00$bb0ca37a@amiconeb> Виртуальная АТС за 300 рублей в месяц Прямой городской многоканальный номер в коде 495 и 499 Звоните сегодня: (495) 225-04-62 5 причин заказать номер сейчас: - Экономия на покупке телефонной станции - Всегда свободная линия для входящих звонков - Сохранение телефонного номера при переезде компании в другой офис - Оптимизация распределения входящих звонков - Подробная статистика по прямым и переадресованным звонкам From bpatel4 at utk.edu Wed Jun 20 06:56:34 2012 From: bpatel4 at utk.edu (=?koi8-r?B?IvPF0sfFyiI=?=) Date: Wed, 20 Jun 2012 22:56:34 +0900 Subject: =?koi8-r?B?8NLRzc/KIMfP0s/E08vPyiDOz83F0g==?= Message-ID: <01cd4f37$f07afd00$1669df70@bpatel4> Виртуальная АТС за 300 рублей в месяц Прямой городской многоканальный номер в коде 495 и 499 Звоните сегодня: (495) 225-04-62 5 причин заказать номер сейчас: - Экономия на покупке телефонной станции - Всегда свободная линия для входящих звонков - Сохранение телефонного номера при переезде компании в другой офис - Оптимизация распределения входящих звонков - Подробная статистика по прямым и переадресованным звонкам From shirkerse35 at radiomagnetic.com Wed Jun 20 13:21:59 2012 From: shirkerse35 at radiomagnetic.com (=?koi8-r?B?6c7P09TSwc7D2Togy8HE0s/X2cUgwdPQxcvU2S4=?=) Date: Thu, 21 Jun 2012 01:21:59 +0500 Subject: =?koi8-r?B?6c7P09TSwc7D2Tog0MzB1MnNIM7BzM/HyQ==?= Message-ID: <000d01cd4f22$585d14f0$6400a8c0@shirkerse35> 26 июня Иностранные работники: кадровые, правовые и налоговые аспекты. +7 (код Москвы) 792\2I22 или +7 Московский код: 7922122 Цель: Изучить особенности бухгалтерского и налогового учета при оформлении на работу иностранных работников. Программа: 1. Уплата социальных страховых взносов за иностранных граждан: новый порядок в 2012 году. Порядок уплаты в зависимости от статуса иностранного гражданина (постоянно или временно проживающий, временно пребывающий, высококвалифицированный специалист). Уплата взносов "на травматизм" за иностранцев. Особенности персонифицированного учета, оформления пенсионных свидетельств. 2. Порядок обеспечения иностранных граждан пособиями по социальному страхованию в 2012 году, особенности выплаты "детских" пособий. 3. НДФЛ с иностранца: резидентство, ставки, льготы для отдельных категорий иностранцев, порядок перерасчета, зачета и возврата налога при смене налогового статуса, заполнение 2-НДФЛ на иностранного работника. Как правильно подсчитать срок пребывания в России для определения статуса резидент/нерезидент. Необходим ли иностранцу ИНН? Как зачесть НДФЛ, уплаченный в России на Родине иностранца? Избежание двойного налогообложения в РФ. 4. Расходы на переезд в РФ, наем жилья, оформление разрешений, медосмотры иностранцев, ДМС, легализацию документов и т.п.: можно ли их признать в целях налогообложения прибыли? Расходы на услуги посредников при трудоустройстве иностранцев. Расходы на лизинг иностранного персонала в налоговом учете. 5. Особенности выплаты иностранцам вознаграждений по трудовым и гражданско-правовым договорам (требования валютного законодательства в форме выплаты). 6. Особые случаи выплаты иностранным гражданам выходных пособий. 7. Особенности командирования иностранных граждан. 8. Проверки и штрафы, связанные с иностранными сотрудниками: что должен знать бухгалтер. Стоимость участия: 8 000 рублей Вся информация по тел: 8 (499) ЧЧ5ЧО95 **** +7 Московский код: 792\2I\2.2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3301 bytes Desc: not available URL: From eugen at leitl.org Wed Jun 20 23:29:43 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 21 Jun 2012 08:29:43 +0200 Subject: [liberationtech] CPJ blog building on EFF, Citizen Lab -- BlackShades Skype Trojan Message-ID: <20120621062943.GT17120@leitl.org> ----- Forwarded message from frank at journalistsecurity.net ----- From eugen at leitl.org Wed Jun 20 23:33:10 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 21 Jun 2012 08:33:10 +0200 Subject: [tor-talk] Orbot Data Overhead Message-ID: <20120621063310.GU17120@leitl.org> ----- Forwarded message from Patrick B ----- From eugen at leitl.org Thu Jun 21 01:41:04 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 21 Jun 2012 10:41:04 +0200 Subject: EDRi-gram newsletter - Number 10.12, 20 June 2012 Message-ID: <20120621084104.GG17120@leitl.org> ----- Forwarded message from EDRi-gram ----- From validatexfcz81 at kamebishisyouyu.com Wed Jun 20 22:20:28 2012 From: validatexfcz81 at kamebishisyouyu.com (=?koi8-r?B?Iu/GydPZINcg7c/Ty9fFIg==?=) Date: Thu, 21 Jun 2012 10:50:28 +0530 Subject: =?koi8-r?B?7sUgzsHEzyDQzMHUydTYIMvPzcnT08nJwCwgz8bJ09kgz9Qg88/C09TX?= =?koi8-r?B?xc7OycvBIQ==?= Message-ID: <000d01cd4f6d$9223c620$6400a8c0@validatexfcz81> Маленькие и не очень маленькие ОФИСЫ ждут Вас! Помещения находятся на БольшойЧеркизовской улице Охраняемая территория, удобный подъезд с! Telefon 8/903/ 728 -00 = 2- 0 From monologuesuv726 at gaccsouth.com Fri Jun 22 00:19:33 2012 From: monologuesuv726 at gaccsouth.com (=?koi8-r?B?IvDPzc/Wxc0gzsHK1Mkgzs/X2cggy8zJxc7Uz9chIg==?=) Date: Thu, 21 Jun 2012 23:19:33 -0800 Subject: =?koi8-r?B?MyDSwdPT2czLySDQzyDtz9PL18Ug2sEgNDk5OdIuIPrXz87J1MUtNTg1?= =?koi8-r?B?NDg1Nw==?= Message-ID: <000d01cd503e$fda18d70$6400a8c0@monologuesuv726> Звоните прококнсультируем по всем вопросам! Телефон в теме письма From gmaxwell at gmail.com Thu Jun 21 21:13:06 2012 From: gmaxwell at gmail.com (Gregory Maxwell) Date: Fri, 22 Jun 2012 00:13:06 -0400 Subject: [tor-talk] Forbes article: Tor and Bitcoin Message-ID: On Thu, Jun 21, 2012 at 11:51 PM, grarpamp wrote: > http://www.forbes.com/sites/jonmatonis/2012/06/19/torwallet-sparks-trust-without-jurisdiction-debate/ A word to the wise: Perhaps this is an earnest effort, but it's impossible to tell. From appearances it is indistinguishable from a scam which will accrue a large amount of third party owned bitcoin and either vanish or get "hacked". Promotion on the Forbes.com site shouldn't be taken to signify any evidence of reputability. I've seen first hand that they do not do much research for this sort of thing, and articles there have previously plugged services operated by people known to have stolen from others. Anonymity can an important tool for social good, but it can also be misused people should take great caution in handing over control of valuable information to parties that operate under the veil of anonymity. Many people have been robbed under similar circumstances. The open source Bitcoin client software runs excellently over Tor. If you want to use Bitcoin anonymously its a good combination and you don't need services like this website. The next major release of the Bitcoin software will feature much better support for inbound connections in hidden services and automatic hidden service peer discovery, making it work even better. _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From illuminingdvre60 at citratubindo.com Fri Jun 22 02:20:56 2012 From: illuminingdvre60 at citratubindo.com (=?koi8-r?B?Iusu8C4tIOvJxdfTy8/FINsuIg==?=) Date: Fri, 22 Jun 2012 01:20:56 -0800 Subject: =?koi8-r?B?7sXEz9LPx88g0NLPxMHNINXewdPUy8kg1yDLLtDP08XMy8UhIDgoOTAz?= =?koi8-r?B?KTE5MzA2MjM=?= Message-ID: <000d01cd504f$f25b98a0$6400a8c0@illuminingdvre60> Продам свои участки без посредников! От 30 соток до 2.5 га ! в 90 км от Москвы по киевскому направлению Телефон в теме письма From misappropriatejfh5 at dyconex.com Fri Jun 22 02:40:27 2012 From: misappropriatejfh5 at dyconex.com (=?koi8-r?B?Iusu8C4tIOvJxdfTy8/FINsuIg==?=) Date: Fri, 22 Jun 2012 01:40:27 -0800 Subject: =?koi8-r?B?7sXEz9LPx88g0NLPxMHNINXewdPUy8kg1yDLLtDP08XMy8UhIDgoOTAz?= =?koi8-r?B?KTE5MzA2MjM=?= Message-ID: <000d01cd5052$ac9dde60$6400a8c0@misappropriatejfh5> Продам свои участки без посредников! От 30 соток до 2.5 га ! в 90 км от Москвы по киевскому направлению Телефон в теме письма From yeagervov0 at ervincpas.com Fri Jun 22 03:51:26 2012 From: yeagervov0 at ervincpas.com (=?koi8-r?B?IvPv7vzr8yAtIMTXxdLJIM/UINDSz8na18/EydTFzNEhIg==?=) Date: Fri, 22 Jun 2012 02:51:26 -0800 Subject: =?koi8-r?B?6d3FzSDEyczF0s/XINrBIMjP0s/bycog0NLPw8XO1CEg8NLPydrXz8TJ?= =?koi8-r?B?zSDQ0sXT1MnWztnFINfIz8TO2cUgxNfF0skhIA==?= Message-ID: <590486326.05249357921053@ervincpas.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2577 bytes Desc: not available URL: From duosxd8383 at convoyband.com Fri Jun 22 04:13:47 2012 From: duosxd8383 at convoyband.com (=?koi8-r?B?IvPv7vzr8yAtIMTXxdLJIM/UINDSz8na18/EydTFzNEhIg==?=) Date: Fri, 22 Jun 2012 03:13:47 -0800 Subject: =?koi8-r?B?6d3FzSDEyczF0s/XINrBIMjP0s/bycog0NLPw8XO1CEg8NLPydrXz8TJ?= =?koi8-r?B?zSDQ0sXT1MnWztnFINfIz8TO2cUgxNfF0skhIA==?= Message-ID: <037033979.67571011455367@convoyband.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2577 bytes Desc: not available URL: From ming at tormail.org Thu Jun 21 23:48:13 2012 From: ming at tormail.org (ming at tormail.org) Date: Fri, 22 Jun 2012 06:48:13 -0000 Subject: [tor-talk] LivelyBlog Encourages Tor Users To Blog With Special Setup Message-ID: Lively blog[1], a free blogging service, offers a special configuration[2] for Tor users. It's the first free blogging service on the open web I've discovered which encourages Tor users to join and blog anonymously. (unlike the .onion sites which require Tor in order to access and usually experience poor up time and longevity) [1] http://livelyblog.com [2] http://livelyblog.com/tor-users/ _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bombardment61 at fullhyd.com Fri Jun 22 07:54:58 2012 From: bombardment61 at fullhyd.com (=?koi8-r?B?IvPXz8kgzMDEySI=?=) Date: Fri, 22 Jun 2012 06:54:58 -0800 Subject: =?koi8-r?B?99rZ08vBzsnFIMTPzMfP1yEg5M/M1s7Jy8Egzc/Wzs8g2sHDxdDJ1Ngg?= =?koi8-r?B?2sEg1snXz8Uh?= Message-ID: <000d01cd507e$9caa4bc0$6400a8c0@bombardment61> Взыскание долгов через банкротство должника. Должника можно зацепить за живое! Привлечение к субсидиарной и уголовной ответственности руководителей должника. . Телефон (925) 509 29 99 From basile at opensource.dyc.edu Fri Jun 22 06:03:24 2012 From: basile at opensource.dyc.edu (Anthony G. Basile) Date: Fri, 22 Jun 2012 09:03:24 -0400 Subject: [tor-talk] Tor-ramdisk 20120622 released Message-ID: Hi everyone I want to announce to the list that a new release of tor-ramdisk is out. Tor-ramdisk is an i686, x86_64 or MIPS uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Security is enhanced by hardening the kernel and binaries, and privacy is enhanced by forcing logging to be off at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key, which may be exported/imported by FTP or SCP. Changelog: Tor was updated to 0.2.2.37, BusyBox to 1.20.1 and the kernel to 3.4.2 plus Gentoo's hardened-patches-3.4.2-2.extras. The MIPS port also incorporated these changes, but for this architecture the kernel was kept at vanilla 3.2.5. i686: Homepage: http://opensource.dyc.edu/tor-ramdisk Download: http://opensource.dyc.edu/tor-ramdisk-downloads x86_64: Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads MIPS: Homepage: http://opensource.dyc.edu/tor-mips-ramdisk Download: http://opensource.dyc.edu/tor-mips-ramdisk-downloads -- Anthony G. Basile, Ph. D. Chair of Information Technology D'Youville College Buffalo, NY 14201 (716) 829-8197 _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From virtualadept at gmail.com Fri Jun 22 06:45:29 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Fri, 22 Jun 2012 09:45:29 -0400 Subject: ISP sniffing day begins July 1 Message-ID: On Fri, Jun 22, 2012 at 8:27 AM, rushkoff wrote: > I'm guessing everyone here knows about this: > http://www.rawstory.com/rs/2012/03/15/american-isps-to-launch-massive-copyright-spying-scheme-on-july-12/ Yep. I wrote a couple of scripts that package meta-X-spook text in UDP packets and launch them at random intervals, just to give them something to look at. > What I want to know is what does this mean for business clients of ISPs? > Does this mean that everything they do, including their business secrets, > are now being watched by the ISPs as well? The safe thing to do would be to assume that companies' communications are being recorded for analysis as well. I don't see why ISPs would differentiate between home and business customers on their networks for this, if only to cover their butts in case somebody pwns example.com's office LAN and uses it as a staging ground for an attack. It would minimize liability on the part of the ISP. Office-to-office VPN connections might become popular as a result. I wish it were so, but I don't think this'll be the event that tips PGP/GnuPG usage over the top into commonality, though I do advocate and train for it at work for this reason. -- The Doctor [412/724/301/703] [ZS] https://drwho.virtadpt.net/ "I am everywhere." ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From resuppliedgfx9 at bucktom.com Fri Jun 22 00:10:12 2012 From: resuppliedgfx9 at bucktom.com (Morgan Morrison) Date: Fri, 22 Jun 2012 10:40:12 +0330 Subject: =?koi8-r?B?4NIuINXTzNXHySDtz9PLz9fTy8HRIM/CzC4g4McsIODHzy3awdDBxCA=?= Message-ID: <5ADD3F2673CB4C0989221B39445C9705@mohammad61e87a> Предлагаем юридические услуги: - Оформление земли в аренду и собственность - Разрешение на строительство, ввод в эксплуатацию - Юридическое сопровождение сделок - Регистрация Юр. лиц и решение всех вопросов с ИФНС - Консалтинг: "Юридические тонкости на присоединенных территориях" 10 лет работы на территории Московской области Юг, Юго-запад, ЮЗАО Москвы тел. +7 915 119-02-05 Сайт: avant-advisor точка ru p.s. Приносим извинения за беспокойство From thematick89 at hobbytractors.com Thu Jun 21 23:28:35 2012 From: thematick89 at hobbytractors.com (=?koi8-r?B?IvDPzc/Wxc0gzsHK1Mkgzs/X2cggy8zJxc7Uz9chIg==?=) Date: Fri, 22 Jun 2012 11:58:35 +0530 Subject: =?koi8-r?B?MyDSwdPT2czLySDQzyDtz9PL18Ug2sEgNDk5OdIuIPrXz87J1MUtNTg1?= =?koi8-r?B?NDg1Nw==?= Message-ID: <000d01cd5040$408a0ad0$6400a8c0@thematick89> Звоните прококнсультируем по всем вопросам! Телефон в теме письма From zooko at zooko.com Fri Jun 22 08:51:59 2012 From: zooko at zooko.com (Zooko Wilcox-O'Hearn) Date: Fri, 22 Jun 2012 12:51:59 -0300 Subject: [tahoe-dev] tahoe-lafs 1.9.1 shipped in the next Debian stable Message-ID: Dear Bertagaz: We're almost ready to release Tahoe-LAFS v1.9.2, and I wonder if it is okay to take a couple more days for extra testing or if we should hurry and finalize it so you can package it for Debian? We've fixed all but one of the issues that we intended to fix. You can see the issue tickets here: https://tahoe-lafs.org/trac/tahoe-lafs/milestone/1.9.2 The one serious issue that isn't fixed yet is https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1670# KeyError in mutable retrieve We know of a bug in the code (dict instead of tuple being returned from get_verinfo() of MDMFs), but we're not sure if that bug is causing that failure. There is no unit test currently demonstrating that failure. We prefer not to fix bugs when we don't have a unit test that goes from red to green by that fix, so if it won't make us miss the Debian deadline, I'd like to take a couple more days to figure out how to write a unit test of #1670. Then we'll find out if the dict-instead-of-tuple bug is causing #1670 or not. Also I'm doing an experiment of converting all of the existing unit tests from using SDMFs to using MDMFs as a way to find any bugs in MDMFs. So far I haven't found any more bugs in MDMFs that way. (Because there were already quite a few tests of MDMFs.) Also, it would be great to have some actual users try out 1.9.2 before we finalize it. Users! You can do this right now if you're willing to use darcs to fetch the source. This is actually painless -- you just acquire darcs (http://wiki.darcs.net/Binaries) and then you run darcs get --lazy https://tahoe-lafs.org/source/tahoe-lafs/1.9.2 Then you never have to touch darcs again. That command takes about 60 seconds to run. Oh, but it might fail if the darcs binary you got is incapable of handling HTTPS. In that case, you give up and complain to us and we'll post some tar.gz files for you to try out... Regards, Zooko _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From beatthechip at gmail.com Fri Jun 22 11:01:13 2012 From: beatthechip at gmail.com (BeatTheChip) Date: Fri, 22 Jun 2012 14:01:13 -0400 Subject: [drone-list] Smart phones fly mini drones Message-ID: By Tom Koehler Boeing engineer George Windsor sat in a small room at a Boeing building in Seattle and picked up an iPhone. After a short series of finger movements and taps, a miniature unmanned aircraft that's about as big as a pizza box started to hover, turn and fly. In some cases, Windsor tapped on locations on a map on the iPhone, and the UAV went to that spot; in other instances, Windsor moved the phone up, down, left and right, and the vehicle moved accordingly. What made this flight demonstration even more fascinating is that the UAV was hovering over a baseball field on the Massachusetts Institute of Technology campus in Cambridge, Mass. b some 3,000 miles away. http://www.boeing.com/Features/2011/08/corp_drone_08_29_11.html -- BeatTheChip.org 511Campaign.org ____________________ Twitter: BeatTheChip **I am a United States citizen. My phone and electronic communications may be monitored by the NSA, the FBI, DHS and private contractors who will be held unaccountable for crimes against privacy according to illegal and unenforceable laws, FISA & The Patriot Act. Due to the invasive and unconstitutional nature of these laws, I do not recognize the authority of the surveillants and will prosecute on stalking, habitual harassment if there is no legal grounds for reasonable suspicion of wrongdoing in my private conversations. Get a warrant.* _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Jun 22 05:13:13 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 22 Jun 2012 14:13:13 +0200 Subject: [tor-talk] Forbes article: Tor and Bitcoin Message-ID: <20120622121313.GT17120@leitl.org> ----- Forwarded message from Gregory Maxwell ----- From eugen at leitl.org Fri Jun 22 05:14:28 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 22 Jun 2012 14:14:28 +0200 Subject: [tor-talk] LivelyBlog Encourages Tor Users To Blog With Special Setup Message-ID: <20120622121428.GU17120@leitl.org> ----- Forwarded message from ming at tormail.org ----- From boocm at microgen.com Fri Jun 22 06:21:46 2012 From: boocm at microgen.com (=?koi8-r?B?IuzAwsnNwdEg2sXNzNEi?=) Date: Fri, 22 Jun 2012 15:21:46 +0200 Subject: =?koi8-r?B?8NLPxMHF1NPRIPXewdPUz8suIPfQxd7B1MzRwN3FIMvSwdPJ188gySDE?= =?koi8-r?B?z9PU1dDOzyE=?= Message-ID: <000d01cd5071$97184890$6400a8c0@boocm> Участок на берегу, около хвойного леса. Телефон (9I6) 688-З4-З9 Ева From eugen at leitl.org Fri Jun 22 07:11:34 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 22 Jun 2012 16:11:34 +0200 Subject: [tor-talk] Tor-ramdisk 20120622 released Message-ID: <20120622141134.GA17120@leitl.org> ----- Forwarded message from "Anthony G. Basile" ----- From eugen at leitl.org Fri Jun 22 07:11:57 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 22 Jun 2012 16:11:57 +0200 Subject: ISP sniffing day begins July 1 Message-ID: <20120622141157.GB17120@leitl.org> ----- Forwarded message from Bryce Lynch ----- From eugen at leitl.org Fri Jun 22 08:56:55 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 22 Jun 2012 17:56:55 +0200 Subject: [tahoe-dev] tahoe-lafs 1.9.1 shipped in the next Debian stable Message-ID: <20120622155655.GH17120@leitl.org> ----- Forwarded message from Zooko Wilcox-O'Hearn ----- From replacementzv512 at bullhosting.com Fri Jun 22 07:30:10 2012 From: replacementzv512 at bullhosting.com (=?koi8-r?B?IvPXz8kgzMDEySI=?=) Date: Fri, 22 Jun 2012 21:30:10 +0700 Subject: =?koi8-r?B?99rZ08vBzsnFIMTPzMfP1yEg5M/M1s7Jy8Egzc/Wzs8g2sHDxdDJ1Ngg?= =?koi8-r?B?2sEg1snXz8Uh?= Message-ID: <000d01cd5083$877a75e0$6400a8c0@replacementzv512> Взыскание долгов через банкротство должника. Должника можно зацепить за живое! Привлечение к субсидиарной и уголовной ответственности руководителей должника. . Телефон (925) 509 29 99 From l at odewijk.nl Fri Jun 22 13:06:59 2012 From: l at odewijk.nl (Lodewijk andri de la porte) Date: Fri, 22 Jun 2012 22:06:59 +0200 Subject: [ZS] Bitcoincard - a Vingean localizer? Message-ID: Upon more review of the website I'd say it's some solar panels (the thin, 10% efficiency type) some sort of e-paper like display (like on calculators, lack of product pictures makes it hard to say) and a flex-PCB with a radio segment, extremely small battery and microcontroller on it. It's a smartcard with energy efficient display, antenna, capacitor and solar panels. My guess is the radio distance will in practice never make the 300m and if it does it wouldn't for very long (think <1m bursts). I also don't think it'd last very long without sunlight (which is not widely available in my wallet). Then again I don't think it'll actually do that much. It'll basically be a nearly passive radio and run arduino like applications. On the subject of mesh networks, they can be done in a lightweight manner. They just can't be done right like that. If you'd run a generic mesh of this thing it won't be secure and robust IOW: won't be useful. I doubt it'd do consistent addressing in a true-p2p manner. It looks like it's intended more for burst bitcoin transaction flooding, nothing more. And flooding can be done without addressing so that's good. It also makes sense that they'd have "gateways" and that tracking would be helped so much. Fun but site is build to hype it up. (someone referenced Apple, very justified) It's a BITCOINcard, make no mistakes. I actually do think it's quite awesome for Bitcoin transactions, and the formfactor makes more sense. 2012/6/22 Lodewijk andri de la porte > I'm currently working on something that'll do world-scale wireless mesh > networking, routing included, and I can confidently say that routing over > infinite amount of nodes is impossible, if only because one cannot address > an infinite amount of nodes directly. If you can only send to groups it > will not scale. > > True P2P is also very difficult, my technique uses central for speed and > falls back on smaller scale freely setup true p2p. It's also presently > impossible to prevent man in the middle attacks without either a large > amount of trouble (think web of trust) or a central authority (think > certificate authority). > > Let's hope my technique will still be relevant when I release the paper :) > -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From visgean at gmail.com Fri Jun 22 14:02:33 2012 From: visgean at gmail.com (Visgean Skeloru) Date: Fri, 22 Jun 2012 23:02:33 +0200 Subject: LinkedIn password database compromised In-Reply-To: <20120620200700.GR17120@leitl.org> References: <20120620200700.GR17120@leitl.org> Message-ID: About six months ago I had a previous idea and I have found following: https://www.gnu.org/software/gnutls/ http://enigform.mozdev.org/ https://github.com/firegpg/firegpg/tree/master/content/GpgAuth http://gpgauth.org/ but none of them seems to be user friendly... 2012/6/20 Eugen Leitl > ----- Forwarded message from Leo Bicknell ----- > > From: Leo Bicknell > Date: Wed, 20 Jun 2012 12:43:44 -0700 > To: nanog at nanog.org > Subject: Re: LinkedIn password database compromised > Organization: United Federation of Planets > > In a message written on Wed, Jun 20, 2012 at 03:30:58PM -0400, AP NANOG > wrote: > > So the question falls back on how can we make things better? > > Dump passwords. > > The tech community went through this back in oh, 1990-1993 when > folks were sniffing passwords with tcpdump and sysadmins were using > Telnet. SSH was developed, and the problem was effectively solved. > > If you want to give me access to your box, I send you my public > key. In the clear. It doesn't matter if the hacker has it or not. > When I want to log in I authenticate with my private key, and I'm > in. > > The leaks stop immediately. There's almost no value in a database of > public keys, heck if you want one go download a PGP keyring now. I can > use the same "password" (key) for every web site on the planet, web > sites no longer need to enforce dumb rules (one letter, one number, one > character your fingers can't type easily, minimum 273 characters). > > SSL certificates could be used this way today. > > SSH keys could be used this way today. > > PGP keys could be used this way today. > > What's missing? A pretty UI for the users. Apple, Mozilla, W3C, > Microsoft IE developers and so on need to get their butts in gear > and make a pretty UI to create personal key material, send the > public key as part of a sign up form, import a key, and so on. > > There is no way to make passwords "secure". We've spent 20 years > trying, simply to fail in more spectacular ways each time. Death to > traditional passwords, they have no place in a modern world. > > -- > Leo Bicknell - bicknell at ufp.org - CCIE 3440 > PGP keys at http://www.ufp.org/~bicknell/ > > > > ----- End forwarded message ----- > -- > Eugen* Leitl leitl http://leitl.org > ______________________________________________________________ > ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org > 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE > -- GPG pub key | github/visgean | jabber From poor.ricardo at gmail.com Sat Jun 23 03:54:47 2012 From: poor.ricardo at gmail.com (Poor Richard) Date: Sat, 23 Jun 2012 03:54:47 -0700 (PDT) Subject: PeerPoint Discussion - please don't use for other topics Message-ID: I'm disappointed but not surprised that the PeerPoint project is viewed with scorn by old-guard digital libertarians and anarchists. I am accused of being naive--they've seen everything and done everything and they have a superior, smug outlook. They argue that what works is more of what they are accustomed to. But it is exactly that approach that resulted in the present state of affairs in which the internet is colonized and dominated by large corporate actors. Anarchists and libertarians are the unwitting pawns of the powerful actors they mean to resist. I've been around IT since long before the internet, since it was called data processing. Since before email and electronic bulletin boards and USENET. And I've been involved in every aspect of it since we operated mainframes with teletype terminals and punched tape right through until today. I was old guard once, very old guard. I've also been a political, social, and environmental activist since the sixties, witnessing the horrifying failure of almost all our movements from the inside. But recently I woke up to the fact that it was on our watch--MY watch--that the world went to hell in a handbasket. My confederates and I all screwed up. We all get a big-assed #FAIL. Einstein's definition of insanity is doing the same thing over and over and expecting different results. By that definition anybody who thinks that libertarian and anarchist business-as-usual is going to pull us through the crises and threats we now face is not just naive--they are burried inside a mystery wrapped in a conundrum, locked within an enigma. They are lost in space. The threats to privacy, liberty, democracy, and equality have steadily grown despite all our BRILLIANT efforts up to now, so only a new strategy can be expected to reverse that trend. That strategy is not a continued, exclusive reliance on slef-organizing, emergent systems. That by itself has not worked. We need to try something else. That something else might even be something that was tried in the past and discredited because it was impractical then. It might be large-scale collective organization and design. In the past large-scale collective design failed because it was forced to adopt centralized, top-down planning and organization. Now we can do it in a much more distributed, horizontal, and agile manner. It failed because it adopted organizational structures and created designs that were monolithic. Now we can do organizations and designs that are modular and composable. *Wikipedia: Composability* is a system design principle that deals with the inter-relationships of components. A highly composable system provides recombinant components that can be selected and assembled in various combinations to satisfy specific user requirements. In information systems, the essential features that make a component composable are that it be: - self-contained (modular): it can be deployed independently - note that it may cooperate with other components, but dependent components are replaceable - stateless : it treats each request as an independent transaction, unrelated to any previous request. *Stateless* is just one technique; *managed state* and * transactional* systems can also be composable, but with greater difficulty. Finally, many past revolutions have failed or succeeded upon their access to technology. Somehow ignoring the story of "guns, germs, and steel" the old guard now wants to say that revolutions are not about tools or technology, they are just about people and social relations. They pontificate that technology doesn't make revolutions, people make revolutions. Tell that to an Afghan tribesman and see if he will discard his AK-47 or his satellite phone. As I wrote in PeerPoint, I thought quite plainly and clearly, PeerPoint is a non-violent weapon of revolution. Let those who don't think we need a revolution shut the hell up and get out of the way. Poor Richard On Monday, June 18, 2012 9:14:27 AM UTC-5, Poor Richard wrote: > > *Welcome to the PeerPoint Discussion Thread* > > PeerPoint Design Specifications > > PeerPoint is an evolving crowdsourced design specification for a suite of > integrated peer-to-peer applications to include (but not limited to) social > networking, real-time project collaboration, content management, database > management, voting, trust/reputation metrics, complementary currency, crowd > funding, etc. This specification overlaps with several existing p2p > infrastructure and social networking projects but also goes substantially > beyond anything yet existing. > > Members of p2p projects, interested programmers and designers, power > users, and others are encouraged to participate in the collaborative > development of the open PeerPoint specs and to adopt any part of the specs > they can use in their own work. To participate, please read the PeerPoint > Design Specifications. > If you then wish to edit the PeerPoint document you will need to join this > Next Net Group. > > In the near future we will have a PeerPoint repository and wiki at GitHub. > > Poor Richard > > > > > ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sat Jun 23 02:24:10 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 23 Jun 2012 11:24:10 +0200 Subject: [drone-list] Smart phones fly mini drones Message-ID: <20120623092410.GN17120@leitl.org> ----- Forwarded message from BeatTheChip ----- From email at franciscorrigan.com Sat Jun 23 04:21:56 2012 From: email at franciscorrigan.com (Frank Corrigan) Date: Sat, 23 Jun 2012 12:21:56 +0100 Subject: [liberationtech] Single board mini computers as circumvention tools Message-ID: Does anyone know of any research being done on the use of low-cost single board mini computers to run the likes of online circumvention tools like VPN, Tor, Gibberbot etc Whilst these boards have been around for sometime, since the introduction of Rasberry Pi, interest has grown and now there are many boards are being created like: ARM Mini PCs http://www.reghardware.com/2012/05/10/product_round_up_arm_mini_computers_the _best_and_the_rest/ http://liliputing.com/2012/06/74-mk802-android-4-0-mini-pc-first-impressions- video.html Android OS and other Linux OS appears to run easily on these boards and allows for use of software from the likes of: https://guardianproject.info/apps/ and http://www.whispersys.com/ (sadly now defunct) Some of these boards are also so cheap as to be disposable single use, or at least simple reuse after OS/Data erase. I am looking at how easy it would be to develop and use a Linux OS that only runs from the board's ram (LiveCD/USB/SDcard), such as TAILs Frank _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From jacob at appelbaum.net Sat Jun 23 14:07:34 2012 From: jacob at appelbaum.net (Jacob Appelbaum) Date: Sat, 23 Jun 2012 14:07:34 -0700 Subject: [liberationtech] Single board mini computers as circumvention tools Message-ID: On 06/23/2012 04:21 AM, Frank Corrigan wrote: > Does anyone know of any research being done on the use of low-cost > single board mini computers to run the likes of online circumvention > tools like VPN, Tor, Gibberbot etc > The Guardian Project...? > Whilst these boards have been around for sometime, since the > introduction of Rasberry Pi, interest has grown and now there are many > boards are being created like: > Rasberry Pi easily runs Debian - so it's basically the same as the Torouter project with different hardware: https://trac.torproject.org/projects/tor/wiki/doc/Torouter > ARM Mini PCs > http://www.reghardware.com/2012/05/10/product_round_up_arm_mini_computers_the_best_and_the_rest/ > http://liliputing.com/2012/06/74-mk802-android-4-0-mini-pc-first-impressions-video.html > Yep that's what we did with the Excito and the DreamPlug. > Android OS and other Linux OS appears to run easily on these boards and > allows for use of software from the likes of: > https://guardianproject.info/apps/ and http://www.whispersys.com/ (sadly > now defunct) > > Some of these boards are also so cheap as to be disposable single use, > or at least simple reuse after OS/Data erase. > There are some really nice things coming soon. > I am looking at how easy it would be to develop and use a Linux OS that > only runs from the board's ram (LiveCD/USB/SDcard), such as TAILs > Use Tails. All the best, Jacob _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From arma at mit.edu Sat Jun 23 15:20:31 2012 From: arma at mit.edu (Roger Dingledine) Date: Sat, 23 Jun 2012 18:20:31 -0400 Subject: [tor-talk] Roger's status report, May 2012 Message-ID: Hi folks! As the Tor Project has grown in scope, we've been struggling to keep up with simultaneously a) doing all the development that needs to be done (including meeting deliverables for our funders), and b) keeping the community up-to-date on our in-progress work. Lately I've been writing monthly status summaries, much like what we have our GSoC students do. In an effort to be more transparent, I'm going to start sending them to tor-talk rather than just to the other developers. Note that I will need to omit or anonymize things sometimes -- some research groups I meet with don't want to announce their paper draft until it gets accepted at a conference, some funders don't want the publicity that would come from admitting their interest in Internet freedom, etc. I'll try to err on the side of sunlight though. For those here who are totally taken by surprise by this email (and the fact that Tor does things :), I encourage you to to lurk on the irc channels if you want to follow along more closely. https://www.torproject.org/about/contact#irc And finally, please do ask questions! Here's your chance to understand my role in Tor and how it fits with what other people are doing. But since the root of the problem here has been that we do too many things and don't have time to do more, please focus on your most burning question(s). --Roger ------------------------------------------------------------------------ Here's what I said at the beginning of May that I hoped to do: > - Allocate FOCI papers to reviewers. Done. We got 20 submissions, and reviewing is ongoing. We'll pick some in early June. https://blog.torproject.org/blog/call-papers-free-and-open-communications-internet-foci-workshop https://www.usenix.org/conference/foci12/ > - Actually release 0.2.2.36, this time for sure, no take-backs. Done. https://lists.torproject.org/pipermail/tor-announce/2012-June/000084.html > - Help Radu put in the NIST proposal. Done. We submitted a grant proposal to work with a team of research institutions on questions around privacy, identity, and mobile. I'll write more details here if the grant agency turns out to like the proposal. > - Help Nick and Mike interview and make decisions about core developers. Done (well, mostly they did it). https://blog.torproject.org/blog/dedicated-core-tor-developer https://www.torproject.org/about/jobs-coredev.html.en Our new core developer is getting up to speed now. I'm really excited that this will mean Nick can make more progress on core development! I'll let them make a further announcement when they're ready. > - I'm going to try to be absent from the world May 11-15. Done (vacation). > - May 14 is the PETS stipend deadline. After that I'll help Andrei > allocate the stipends. The PETS people wanted us to push the deadline back to June 1. I dealt with all the mails and allocated stipends in early June. http://petsymposium.org/2012/stipends http://petsymposium.org/2012/ > - Get the PETS papers up on the PETS website. They're up at http://freehaven.net/anonbib/papers/pets2012/ and I will add links to http://petsymposium.org/2012/program.php but I'm doing a cursory check with Matt first to see if he knows whether any authors want to keep their papers unpublished for now. > - Launch a working-group of pluggable transport developers and > researchers, and make sure they all know about each other. Not done. I'll aim to get a pluggable transport development page up on the website in June. > - Try to help vmon and Zack Weinberg feel more accepted in the > community, since I'm the backup mentor for vmon's gsoc project. Ongoing. We succeeded at getting the Stegotorus code approved for publication by Zack's funders, so vmon's gsoc project can proceed as planned. You can read vmon's periodic status reports on the tor-dev mailing list. Next step is to help get the Stegotorus git repository cleaned up, make the code itself more functional, and encourage them to make a tech report version of the paper available. https://gitweb.torproject.org/stegotorus.git > - Flesh out more SponsorZ tasks so we're more aware of our future. Not finished. But you can follow along on our current "I wish we had a funder for this task so we could spend time on it" task list: https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorZ > - Help SponsorF come up with metrics by which the SponsorF Red Team > will judge the project's success. Not done. I expect more progress in June though -- stay tuned. > - Rewrite the "how governments and military use Tor" section on the > webpage, since they actually don't run hidden services to our knowledge, > but we do have good new stories like IWF's use of Tor. Not done. More generally, I wish I had some extra weeks to sit down and update the FAQ and other web pages, since it's been years since I wrote many of them. > - I'm going to Oakland Done. http://www.ieee-security.org/TC/SP2012/ I talked to a bunch of people, such as - Micah Sherr, professor at Georgetown, who wants to help us with ExperimenTor and simulation bugs. I will send him a pile of trac ticket links around our recent performance simulation problems. https://trac.torproject.org/projects/tor/wiki/org/roadmaps/Tor/Performance http://crysp.uwaterloo.ca/software/exptor/ - Rob Cunningham who is Kevin Bauer's new boss. I spent a while trying to convince Rob that he should have Kevin work on Tor simulation and performance questions as part of his new job at Lincoln Labs. http://www.mit.edu/~ke23793/ - Camilo Viecco, who now works for Mozilla on adding privacy features to Firefox. He has been frustrated so far at getting his commits in: he has buy-in from the security team, but other teams block his commits with statements like "it's an arms race we can't win, so don't even bother trying to make things better". I encouraged him to get his mid-level manager to play the politics game better on his behalf. - Tariq Elahi, Ryan Henry, and Tao Wang are grad students from Ian's group doing interesting things: http://crysp.uwaterloo.ca/ In particular Tariq is working on a paper showing that we shouldn't replace guards in our list as soon as they go away, since it significantly increases the exposure to other guards. I helped Tariq quite a bit with his paper. http://cacr.uwaterloo.ca/techreports/2012/cacr2012-11.pdf But Ryan is working on privacy-preserving ways to gather Tor statistics data, and I don't have time to help him figure out what most needs collecting. Please jump in if you're interested. http://www.cs.uwaterloo.ca/~rhenry/pdf/torstat-poster-Oakland.pdf - I talked to several anonymous communications professors about having them use their sabbatical to become the Tor research coordinator. What we need to replace me as research coordinator is not a grad student -- we need someone who already knows how to set a research agenda and get other people to do it, i.e. a professor. Several are going on sabbatical soon, and we could supplement their salary for cheap. - I spoke at length with the authors of the "Peekaboo" and "LasTor" papers, and somewhat less with the LAP authors. I'll publish some paper analyses and summaries on the blog as I get time. http://freehaven.net/anonbib/#oakland2012-peekaboo http://freehaven.net/anonbib/#oakland2012-lastor http://freehaven.net/anonbib/#oakland2012-lap > - I'll aim to drop by SponsorF and/or Stanford at the end of the month > to give them some facetime. I met with Zack Weinberg and Jeroen Massar. I've been working with Zack to kick SponsorF into making the Stegotorus code available. I think it will benefit a lot from the light of day -- we've already discovered a lot of usability issues. I fear that key parts of the underlying design (like, say, the Stego part) are going to need to be discarded though. Jeroen is working on their "get lots of bridge addresses and handle routing traffic through them at the iptables layer" design. They're also working on a program to take in a blob (e.g. from bridgedb), do some network interactions, and produce a bridge address -- see also item 7 on https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorF/Year2 I expect that I'm going to have to wrestle them to the ground to make it open before we can find out if it will be of any use to us or the world. The wrestling will continue at the upcoming SponsorF meeting in June. Also stay tuned for their FOCI paper describing the overall architecture. I also met with David Fifield, the Flashproxy developer (grad student at Stanford, and an nmap developer). I now believe that Flashproxy is ready for further deployment and use by real users. The main drawback is that the censored users currently need to have a public IP address (i.e. not be behind a NAT) to use it. I expect as websockets tries harder to replace Skype, it will be easier for us to do nat piercing inside the browser and resolve this limitation. https://gitweb.torproject.org/flashproxy.git/blob/HEAD:/README http://crypto.stanford.edu/flashproxy/ http://crypto.stanford.edu/flashproxy/flashproxy.pdf At the upcoming developer meeting in Florence, we should have a discussion about all these great people doing great work for Tor that aren't hearing our status report discussions currently. Maybe I should contribute to the solution by putting my monthly status reports on the blog or on tor-talk. ------------------------------------------------------------------------ Here are some other things I did in May: - Met with two of Rachel Greenstadt's grad students at Drexel University who want to do their class project on Tor after seeing our Berlin 28C3 talk. They had wanted to try to measure linkability between exiting streams on a given circuit. I encouraged them instead to work on https://trac.torproject.org/projects/tor/ticket/5752 and in particular https://trac.torproject.org/projects/tor/ticket/5830 - Talked to Nick Feamster at Georgia Tech (soon to be University of Maryland) about OONI vs his Bismark project. He doesn't think his Bismark devices are big enough to handle Python, so he's been writing his tests in lua. I suggested that OONI and Bismark should at least share a common output format. I think Arturo is right to keep asking him "Are you sure your devices can't run python? Really sure?" http://projectbismark.net/ http://ooni.nu/index.html - Continued to put time into moderating and responding to blog comments. They've turned into a great source of real bugs, especially among Windows users. Let me reiterate my hopes for a forum where we can turn these people into more of a community. If only secure maintainable forum software existed in the world. [Update: one of our new funders has included funding to get some forums up and running and maintained -- I'm not sure on the timeframe for it yet though.] https://blog.torproject.org/ - Turned down an IEEE TDSC academic journal review request, and an IEEE ToN journal review request, because of IEEE's anti-science publishing policy. http://www.researchwithoutwalls.org/ - Our CSET submission comparing Shadow to ExperimenTor got accepted! Details (including a camera-ready version) coming soon. https://www.usenix.org/conference/cset12 ------------------------------------------------------------------------ Here are some items I expect to do in June: - Participate in the Q2 Tor directors board meeting, including approving the updated 2012 budget. - Understand the open positions in our current budget, what funders each one maps to, and what the priorities are in terms of spending the money. Then we can start putting some calls-for-resumes-and-code-samples up on the website, as well as prioritizing which calls we want to do when. Unless I ignore all of this until July. - Get 0.2.3.16-alpha out. Get 0.2.2.37 out. Get 0.2.3.17-alpha out. - Orchestrate the FOCI discussion and select the program. - Tell Micah Sherr and Chris Wacek (Georgetown) about the open simulation questions; and get Rob Jansen (UMN/NRL), Mashael AlSabah (Waterloo), etc a good summary of the current situation. - Read and consider http://microsoftjobsblog.com/zen-of-pm so I can help Adam Shostack help us get a good project manager. - I have a three hour slot at the SponsorF meeting this month. I'm going to try to bring everybody there up to speed on everything. While also letting other people talk for most of the time. Preparing for this talk will be a big part of my June. - Meet with Kevin Dyer's lab at Portland State before the SponsorF meeting. Rob Jansen and Aaron Johnson (NRL) will be joining me. - Help prepare for the SponsorF site visit that will occur a few days before PETS. We'll need to provide slides/etc, and likely even call in and do the phone presentation thing. - Go to Stamford CT to do a Tor talk for one of Ian's past students. http://privacyandsecurity.pbiresearch.com/agenda.html - Write an abstract for the ecrypt talk I'm doing at the workshop before PETS: https://www.cosic.esat.kuleuven.be/ecrypt/provpriv2012/invited.html - Fly to Florence, for the Tor developers meeting and hackfest in July. https://trac.torproject.org/projects/tor/wiki/org/meetings/2012SummerDevMeeting https://trac.torproject.org/projects/tor/wiki/org/meetings/2012FlorenceHackfest ------------------------------------------------------------------------ Things I'm still dropping the ball on: - I wonder if I should follow up with Carol @ google about our obfsproxy post in February and the interest they expressed in doing a repost on the gsoc blog. https://blog.torproject.org/blog/obfsproxy-next-step-censorship-arms-race http://google-opensource.blogspot.com/ - Transparently document the secteam process, especially since we have concluded to use it far less often and only for critical security things. - Answer the thread between Karsten and Jake where we had an excited volunteer with a clearly useful contribution that we totally dropped on the floor. Try to generalize the experience to improve our response to new contributors. We used to be great at it, and lately we're all overloaded. - Add a "scientific papers" exception to our trademark-faq: I want to give blanket permission to scientific papers to use the word Tor in their paper name, so long as they don't go and write software under that name too. https://www.torproject.org/docs/trademark-faq - Make a plan for fixing all the "CBT sometimes breaks Tor" issues. https://trac.torproject.org/projects/tor/ticket/3443 - Try to teach the Virtus Linux guy about how to make a safe Tor distro. http://sourceforge.net/projects/virtuslinux/ - Start summarizing Tor research papers on the blog more regularly. There have been a huge number of really important research papers lately, and most Tor people don't know about them. Should I summarize them on the blog (for a broader audience), or on tor-dev (for the rest of the Tor developers), or what? - Add Zack Weinberg, David Fifield, etc to tor-assistants, so they can be more integrated into the community. And then to tor-internal. And then dissolve tor-internal and make us all be transparent again. - Figure out where we are on the "change our cipher suite" tickets, and try to help them move forward. https://trac.torproject.org/projects/tor/ticket/4744 - I need new business cards. - Get https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorA through D back up on the wiki somewhere (Andrew took them down since they were concluded, and since they just listed contract deliverables rather than the progress reports and trac ticket links that we've been doing for later funders; but we should keep them there for posterity). _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From Carlene.Mcintyre at jeunes-putes.com Sat Jun 23 18:38:10 2012 From: Carlene.Mcintyre at jeunes-putes.com (Carlene Mcintyre) Date: Sat, 23 Jun 2012 18:38:10 -0700 Subject: Pharmaceuticals from Pfizer Message-ID: <4716099863699-VNSSTQQQPGYFYHQVTQLPBI@urhef22.jeunes-putes.com> Thousands of men dream about having a strong woody! We have a Sale on them! http://tarddrugs.ru/ From mfidelman at meetinghouse.net Sat Jun 23 17:34:43 2012 From: mfidelman at meetinghouse.net (Miles Fidelman) Date: Sat, 23 Jun 2012 20:34:43 -0400 Subject: PeerPoint Discussion - please don't use for other topics Message-ID: Poor Richard wrote: > I'm disappointed but not surprised that the PeerPoint project is viewed > with scorn by old-guard digital libertarians and anarchists. Please don't count me as either of those, as I am neither. > > I am accused of being naive--they've seen everything and done > everything and they have a superior, smug outlook. They argue that what > works is more of what they are accustomed to. Personally, my criticisms are based precisely on lessons learned the hard way about what NOT to do, because it hasn't worked. > > But it is exactly that approach that resulted in the present state of > affairs in which the internet is colonized and dominated by large > corporate actors. > > Anarchists and libertarians are the unwitting pawns of the powerful > actors they mean to resist. I'll certainly agree with you there. Part of the mess we're in with the Internet comes precisely from folks who refused to play in the political or business arenas - leaving the Internet ripe for colonization by both corporate types and by old style regulators. Unfortunately, nobody wanted to get involved early to help craft a regulatory environment that would protect the net. > > I've been around IT since long before the internet, since it was called > data processing. Since before email and electronic bulletin boards and > USENET. And I've been involved in every aspect of it since we operated > mainframes with teletype terminals and punched tape right through until > today. I was old guard once, very old guard. > And it shows. PeerPoint strikes me as a classic case of analyze, analyze, analyze, then design the one true solution, by committee. To a degree that was necessary in the days of expensive mainframes - but it's also what led to the "PC wars" where corporate IT tried to hold the reigns of control, while departments bought microcomputers and PCs, and suddenly everyone was a spreadsheet jockey. Made life a lot easier for folks who wanted to get their jobs done, not so good for data sharing and long term preservation. It's not clear that the best balance has been found after 30 years or so. (I lived on both sides of those wars, not fun. And I, too, punched cards and toggled boot loaders into front panel switches before that.) One of the clear lessons of the past decade or so, is that developing software in today's world is a lot more like gardening, or maybe farming, than design and manufacturing. Define simple interfaces, create a climate, fertilize, cut weeds, do some selective seeding, trim stuff, and otherwise stand back. The clearest example is SOA vs. REST. Huge amounts of time and money have gone into defining SOA architectures, but noboday actually uses them. On the other hand, we have lots of mashups. There are lessons to be learned about developing software ecosystems. My sense is that PeerPoint is based on a set of premises and approaches that simply don't work anymore. -- In theory, there is no difference between theory and practice. In practice, there is. .... Yogi Berra ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From Isabella.Ledford at girlsfrombrazil.com Sat Jun 23 20:24:37 2012 From: Isabella.Ledford at girlsfrombrazil.com (Isabella Ledford) Date: Sat, 23 Jun 2012 21:24:37 -0600 Subject: E-store offers Original pharmacueticals Message-ID: <930524242566-NTVXFZAGQEUOYBHCTAIVYX@dns31.girlsfrombrazil.com> How would you like to spend your nights with gf? Not enough firmness for penetrating? http://tarddrugs.ru/ From Sylvia.Burks at kruhlmann.org.jfet.org Sat Jun 23 19:53:28 2012 From: Sylvia.Burks at kruhlmann.org.jfet.org (Sylvia Burks) Date: Sat, 23 Jun 2012 23:53:28 -0300 Subject: Viagra from UK warehouse Message-ID: <65400596959-OZERQJOZVGQRRBTFDYLNN@xzgwpx.kruhlmann.org> What if every nigth could be that splendid? It is time to show the world new Casanova! http://tarddrugs.ru/ From joshmcwilliams at adeptis.com Sat Jun 23 09:49:29 2012 From: joshmcwilliams at adeptis.com (Perry Stevens) Date: Sun, 24 Jun 2012 00:49:29 +0800 Subject: Buy Cialis Online Without Prescription! Lowest Prices and Satisfaction Guaranteed! Generic and brand drugs with 100% satisfaction guaranteed. Bonus 4-12 pills for every order lzugzk2fx Message-ID: <201206232051.50C1F3A0BAC1C2CBB241C@38wt2207s> Buy Cialis Without Prescription! Buy Cialis Online Without Prescription! Lowest Prices and Satisfaction Guaranteed! Generic and brand drugs with 100% satisfaction guaranteed. Bonus 4-12 pills per order http://fnsmfs.ru From sonnyxi at dancetango.com Sun Jun 24 05:12:01 2012 From: sonnyxi at dancetango.com (=?koi8-r?B?IvDSz8TBwCDaxc3FzNjO2cog1d7B09TPyyI=?=) Date: Sun, 24 Jun 2012 04:12:01 -0800 Subject: =?koi8-r?B?8NLPxMHF1NPRINXewdPUz8sg0M/EIOTB3tU=?= Message-ID: <000d01cd51fa$2dc261c0$6400a8c0@sonnyxi> Участок - лес, природа. Удобный подъезд. Телефон (915) 122 73 26 From kb at karelbilek.com Sat Jun 23 20:06:28 2012 From: kb at karelbilek.com (=?ISO-8859-1?Q?Karel_B=EDlek?=) Date: Sun, 24 Jun 2012 05:06:28 +0200 Subject: my little tool for torrents Message-ID: Because I think it's still a bit hard to share bigger data than a pastebin with the world anonymously, I did a little "tool" for anonymous file sharing what I mean by that - you upload the data on my server with Tor via web interface, accessible only as a hidden service, and I then seed the file until it gets "traction", which I arbitrarily say is 20 seeders I don't have an idea how popular will that be, so I am sharing it with this not-exactly-alive mailing list first :) http://karelbilek.com/anontorrent/ (only the intro) , http://zy2kmlftye36cunf.onion/ KB From shunted8 at revisionsucks.com Sat Jun 23 15:21:18 2012 From: shunted8 at revisionsucks.com (=?koi8-r?B?0NLP18XExc7J0SDB1cvDyc/OwQ==?=) Date: Sun, 24 Jun 2012 06:21:18 +0800 Subject: =?koi8-r?B?5+/z+uHr4fog7/Qg4SDk7yDxLiD64fLh4uH0+ffh9Pgg7uEg5+/zIPDy?= =?koi8-r?B?7+Xr9OHoIPDy7/P07yE=?= Message-ID: <000d01cd518e$82bc8050$6400a8c0@shunted8> МОСКВА: 27-28 июня 2012 г. Госзаказ от "А" до "Я" для Заказчиков и Поставщиков "ГОСУДАРСТВЕННЫЕ ЗАКУПКИ: котировки, конкурсы, электронные аукционы. Разъяснения и практические рекомендации по порядку применения норм ФЗ-94 при проведении торгов. Федеральная контрактная система" +7 (код Москвы) 792_2I22 <<>> код (495) - 7-Ч2_91_98 Программа: 1 день _- ОБЗОР ПОСЛЕДНИХ ИЗМЕНЕНИЙ В ЗАКОНОДАТЕЛЬСТВЕ РФ О РАЗМЕЩЕНИИ ЗАКАЗОВ _- Основные отличительные идеи нового законопроекта в сфере Госзакупок "О федеральной контрактной системе" _- Новшества системы: * регламентация работы по прогнозированию и планированию обеспечения государственных нужд, установление состава обязательных документов планирования и определение порядка обоснования ключевых параметров планируемых контрактов в целях последующего мониторинга размещения и исполнения контрактов, анализа контрактных результатов предоставление государственным заказчикам свободу выбора способа размещения заказа. * стимуляция государственных заказчиков и закупщиков по обеспечению надлежащего исполнения условий контракта, * введение новых закупочных процедур и ограничений на закупку дорогостоящих товаров, * возможность формирования реестра недобросовестных заказчиков и т.д.. _- Порядок установления начальной (максимальной) стоимости контакта, возможные источники информации, обязанность заказчиков по опубликованию обоснования НМЦ. _- Введение порядка обязательного опубликования планов-графиков закупок с 2012 года. _- ОСНОВНЫЕ ВОПРОСЫ ПРОВЕДЕНИЯ ПРОЦЕДУР РАЗМЕЩЕНИЯ ЗАКАЗА _- Выбор формы торгов: конкурс или аукцион. _- Подготовка и проведение конкурса: последовательность и продолжительность этапов, оформляемые документы. Рассмотрение заявок и допуск к конкурсу. Оценка и сопоставление заявок, выбор победителя. Изменения в Постановлении Правительства ╧ 722 _- Размещение заказа путем проведения запроса котировок. _- Размещение заказа у единственного поставщика _- ЗАКЛЮЧЕНИЕ ГОСУДАРСТВЕННЫХ (МУНИЦИПАЛЬНЫХ) КОНТРАКТОВ ПОДГОТОВКА И СДАЧА ОТЧЕТНОСТИ ЗАКАЗЧИКУ _- Подготовка контракта. Обязательные положения контракта: приемка товаров, работ, услуг и ответственность поставщика. _- Обеспечение исполнения контракта. _- Исполнение контракта: приемка поставляемых товаров, выполненных работ. Действия поставщиков, направленные на уклонение от исполнения обязательств. Действия заказчика в случаях нарушения обязательств по контракту. _- Расторжение контракта. _- Размещение в реестре недобросовестных поставщиков _- Ответы на вопросы _- ФЕДЕРАЛЬНЫЙ ЗАКОН ОТ 26 ИЮЛЯ 2006 Г. N 135-ФЗ "О ЗАЩИТЕ КОНКУРЕНЦИИ" _- Процедуры, попадающие под контроль ФАС РФ. _- Порядок принятия и формы подачи жалоб при наличии признаков ограничения конкуренции. _- Сроки рассмотрения жалоб. _- Изменение порядка закупки финансовых услуг государственными заказчиками. 2 день _- 10.00-13.00 РАЗМЕЩЕНИЕ ЗАКАЗА ПУТЕМ ПРОВЕДЕНИЯ АУКЦИОНА. ОФИЦИАЛЬНЫЙ САЙТ РФ ДЛЯ РАЗМЕЩЕНИЯ ЗАКАЗОВ НА ПОСТАВКИ ТОВАРОВ, ВЫПОЛНЕНИЯ РАБОТ И ОКАЗАНИЯ УСЛУГ. ОБЗОР ДЕЙСТВУЮЩИХ ПЛОЩАДОК. ПОРЯДОК ПРОВЕДЕНИЯ АУКЦИОНА В ЭЛЕКТРОННОЙ ФОРМЕ. _- Новое в информационном обеспечении Госзаказа √ работа официального сайта и электронных торговых площадок. Требования законодательства к извещению о закупках. Вопросы информационной безопасности в системе размещения государственных и муниципальных заказов _- Электронный аукцион. Размещение заказов на электронных аукционах. Аукционный перечень (Распоряжение Правительства 236-р). _- Обзор электронных площадок: ГУП "Агентство по государственному заказу, инвестиционной деятельности и межрегиональным связям Республики Татарстан", ОАО "Единая электронная торговая площадка", ЗАО "Сбербанк - Автоматизированная система торгов", ООО "РТС-тендер", ЗАО ММВБ "ГОСЗАКУПКИ". _- Электронный аукцион для Заказчиков Программное обеспечение, ЭЦП и порядок ее регистрации, документы на регистрацию, размещение извещения, документации об аукционе и протоколов. Порядок дачи разъяснений положений аукционной документации. _- Электронный аукцион для Участников Где можно приобрести ЭЦП, как ее зарегистрировать. Какие документы нужно предоставить для прохождения аккредитации на торговой площадке? Обеспечение заявок на участие в аукционе в электронной форме: как и кому предоставляется. Условия удержания обеспечения. _- Универсальный алгоритм проведения аукциона в электронной форме. Получение и регистрация ЭЦП; аккредитация участника; порядок опубликования информации об аукционе; _- Заключение контракта по итогам аукциона. Изменение сроков заключения контакта; Протокол разногласий; Новые требования по обеспечению исполнения контракта _- Ответы на вопросы слушателей _- 14.00 √ 17.00 ПРАКТИЧЕСКИЙ ТРЕНИНГ В КОМПЬЮТЕРНОМ КЛАССЕ ПО ФОРМИРОВАНИЮ И РАЗМЕЩЕНИЮ ИЗВЕЩЕНИЙ НА ОФИЦИАЛЬНОМ САЙТЕ ЗАКУПОК РФ И ПРОВЕДЕНИЮ АУКЦИОНА В ЭЛЕКТРОННОЙ ФОРМЕ НА ТОРГОВОЙ ПЛОЩАДКЕ ООО "РТС-тендер" _- Ответы на вопросы Стоимость участия: 15 200 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: Московский код; 792\2122 <> код: (четыре девять пять) 792_2122 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 8885 bytes Desc: not available URL: From hurlsssa at ictco.com Sun Jun 24 07:25:58 2012 From: hurlsssa at ictco.com (=?koi8-r?B?IuzFzsnOx9LBxNPLz8Ug28/T08Ui?=) Date: Sun, 24 Jun 2012 06:25:58 -0800 Subject: =?koi8-r?B?8NLPxMHAINXewdPUz8sg1yAxNSDNyc7V1MHIIMXaxNkgz9Qg7c/Ty9fZ?= Message-ID: <000d01cd520c$e4449f00$6400a8c0@hurlsssa> Продается участок в охраняемом поселке в окружении векового леса. К участку подведены все центральные коммуникации и организован асфальтированный подъезд! Подробности по телефону (916) 088-08-92 Дарья From Jamel.Chaney at hotstuffcatering.com Sat Jun 23 19:46:43 2012 From: Jamel.Chaney at hotstuffcatering.com (Jamel Chaney) Date: Sun, 24 Jun 2012 07:46:43 +0500 Subject: Sex Penis Pills Message-ID: <01385802939769-DANZWZXHZDQRLZOBXEFVCQO@fimjyfh.hotstuffcatering.com> Make love to all girls near you! Become the master of erotic deeds with our products! http://tarddrugs.ru/ From moveskdy3 at greenwoodcourt.com Sun Jun 24 06:55:09 2012 From: moveskdy3 at greenwoodcourt.com (=?koi8-r?B?IuzFzsnOx9LBxNPLz8Ug28/T08Ui?=) Date: Sun, 24 Jun 2012 08:55:09 -0500 Subject: =?koi8-r?B?8NLPxMHAINXewdPUz8sg1yAxNSDNyc7V1MHIIMXaxNkgz9Qg7c/Ty9fZ?= Message-ID: <000d01cd5210$f8078850$6400a8c0@moveskdy3> Срочно продается участок 13 соток в 7 км от МКАД по Ленинградскому шоссе. На участке: хозблок, туалет, дом, и беседка в старом фруктовом саду. Звоните: (916) 688-34-39 Ева. From wagonsrc5 at giorgiorocco.com Sun Jun 24 12:47:21 2012 From: wagonsrc5 at giorgiorocco.com (=?koi8-r?B?IvPM1dbCwSDC2dTBIg==?=) Date: Sun, 24 Jun 2012 11:47:21 -0800 Subject: =?koi8-r?B?8sXNz87ULCDEydrBys4gySDP1MTFzMvBIMvXwdLUydIgySDQz83F3cXO?= =?koi8-r?B?ycog?= Message-ID: <000d01cd5239$c9928a50$6400a8c0@wagonsrc5> Ремонт от дизайна интерьера до полной реализации. Качественно. Доступные цены. Соблюдение сроков. Задайте любой интересующий Вас вопрос по телефону в Москве: (495) 589-62-99 From chestnutsbif27 at leedo.com Sun Jun 24 10:11:13 2012 From: chestnutsbif27 at leedo.com (=?koi8-r?B?IvDSz8TBxdTT0SDEz80g1yDCzMnWwcrbxc0g8M/Ezc/Ty8/X2MUi?=) Date: Sun, 24 Jun 2012 12:11:13 -0500 Subject: =?koi8-r?B?IPDSz8TBxdTT0SDHz9TP18HRIMTB3sEgMzUgy80gz9Qg7evh5CDnz9LY?= =?koi8-r?B?y8/X08vPxSDbz9PTxQ==?= Message-ID: <000d01cd5223$fa24a150$6400a8c0@chestnutsbif27> Участок с деревьями. Лес, природа, пруды. Дом из бруса. Удобный подъезд. Телефон (9I5) I22-73-26 From contusingr344 at gcorbett-motors.com Sun Jun 24 13:15:37 2012 From: contusingr344 at gcorbett-motors.com (=?koi8-r?B?IvPM1dbCwSDC2dTBIg==?=) Date: Sun, 24 Jun 2012 12:15:37 -0800 Subject: =?koi8-r?B?8sXNz87ULCDEydrBys4gySDP1MTFzMvBIMvXwdLUydIgySDQz83F3cXO?= =?koi8-r?B?ycog?= Message-ID: <000d01cd523d$bc9b00d0$6400a8c0@contusingr344> Ремонт от дизайна интерьера до полной реализации. Качественно. Доступные цены. Соблюдение сроков. Задайте любой интересующий Вас вопрос по телефону в Москве: (495) 589-62-99 From eugen at leitl.org Sun Jun 24 03:28:58 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 24 Jun 2012 12:28:58 +0200 Subject: [ZS] Bitcoincard - a Vingean localizer? Message-ID: <20120624102857.GA17120@leitl.org> ----- Forwarded message from Lodewijk andri de la porte ----- From tedks at riseup.net Sun Jun 24 12:08:45 2012 From: tedks at riseup.net (Ted Smith) Date: Sun, 24 Jun 2012 15:08:45 -0400 Subject: [Fwd: Re: [tor-talk] vwfws4obovm2cydl.onion ??] Message-ID: <1340564925.12165.1.camel@anglachel> Not much actual information, but it's nifty that bitcoin-mining malware is maybe using Tor hidden services for command and control. -------- Forwarded Message -------- From: Zebro kojos Reply-to: tor-talk at lists.torproject.org To: tor-talk at lists.torproject.org Subject: Re: [tor-talk] vwfws4obovm2cydl.onion ?? Date: Sat, 23 Jun 2012 16:26:32 +0300 So from what it seems, the malware included a bitcoin miner that perhaps is to report found blocks / sub-hashes (? is that a term; i.e. if it works in a mining pool) to a server, perhaps this site in question. On Sat, Jun 23, 2012 at 4:06 PM, David H. Lipman wrote: > From: "grarpamp" > > Anbody have any information on; vwfws4obovm2cydl.onion ? >>> >> >> You must have obtained the address from somewhere. >> So what did the ad copy or context associated with it say? >> > > 1. It was harvested from malware which dropped a file; hostname.tmp > which contained the name; vwfws4obovm2cydl.onion > > 2. It contained a script file named; poclbm120222.cl > // -ck modified kernel taken from Phoenix taken from poclbm, with > aspects of > // phatk and others. > // Modified version copyright 2011-2012 Con Kolivas > > // This file is taken and modified from the public-domain poclbm > project, and > // we have therefore decided to keep it public-domain in Phoenix. > > 3. It contained the file; private_key.tmp which contains certificate > keys > > 4. It contained the DLLs; pthreadGC2.dll, libpdcurses.dll, libcurl-4.dll > > > > > -- > Dave > Multi-AV Scanning Tool - http://multi-av.thespykiller.**co.uk > http://www.pctipp.ch/**downloads/dl/35905.asp > > ______________________________**_________________ > tor-talk mailing list > tor-talk at lists.torproject.org > https://lists.torproject.org/**cgi-bin/mailman/listinfo/tor-**talk > _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- Sent from Ubuntu [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From limag50 at fineartslitho.com Sun Jun 24 03:51:37 2012 From: limag50 at fineartslitho.com (=?koi8-r?B?IvDSz8TBwCDaxc3FzNjO2cog1d7B09TPyyI=?=) Date: Sun, 24 Jun 2012 15:51:37 +0500 Subject: =?koi8-r?B?8NLPxMHF1NPRINXewdPUz8sg0M/EIOTB3tU=?= Message-ID: <000d01cd51f7$5477ed10$6400a8c0@limag50> Участок √ от 28 т.р. за сотку. Река. Телефон (915) 122 73 26 From nyasax7 at kernelrom.com Sun Jun 24 04:06:52 2012 From: nyasax7 at kernelrom.com (=?koi8-r?B?IvDSz8TBwCDaxc3FzNjO2cog1d7B09TPyyI=?=) Date: Sun, 24 Jun 2012 16:36:52 +0530 Subject: =?koi8-r?B?8NLPxMHF1NPRINXewdPUz8sg0M/EIOTB3tU=?= Message-ID: <000d01cd51f9$75734e90$6400a8c0@nyasax7> Участок √ от 28 т.р. за сотку. Река. Телефон (915) 122 73 26 From kalaracquel at aem1.com.jfet.org Sun Jun 24 06:25:35 2012 From: kalaracquel at aem1.com.jfet.org (Rose Ines) Date: Sun, 24 Jun 2012 19:25:35 +0600 Subject: MaxPenis Pills - Penis Pill 95% Success Rate. MaxPenis is Powerful! Click For Details teo0ogw Message-ID: <73x18w18c34-53240053-260n4w68@gwunjuqe> MaxPenis Pills - Penis Pill 95% Success Rate. MaxPenis is Powerful! Click For Details http://adenn.ru From coercesni0559 at absolutecollection.com Sun Jun 24 09:41:11 2012 From: coercesni0559 at absolutecollection.com (=?koi8-r?B?IvDSz8TBxdTT0SDEz80g1yDCzMnWwcrbxc0g8M/Ezc/Ty8/X2MUi?=) Date: Sun, 24 Jun 2012 21:41:11 +0500 Subject: =?koi8-r?B?IPDSz8TBxdTT0SDHz9TP18HRIMTB3sEgMzUgy80gz9Qg7evh5CDnz9LY?= =?koi8-r?B?y8/X08vPxSDbz9PTxQ==?= Message-ID: <000d01cd5228$2978bb40$6400a8c0@coercesni0559> Участок с деревьями. Лес, природа, пруды. Дом из бруса. Удобный подъезд. Телефон (9I5) I22-73-26 From plundersk3 at northcantonohio.com Sun Jun 24 17:46:44 2012 From: plundersk3 at northcantonohio.com (=?koi8-r?B?Iu/GydPZINcg7c/Ty9fFIg==?=) Date: Mon, 25 Jun 2012 03:46:44 +0300 Subject: =?koi8-r?B?7sUgzsHEzyDQzMHUydTYIMvPzcnT08nJwCwgz8bJ09kgz9Qg88/C09TX?= =?koi8-r?B?xc7OycvBIQ==?= Message-ID: <000d01cd526b$fe49cc40$6400a8c0@plundersk3> Маленькие и не очень маленькие ОФИСЫ ждут Вас! Помещения находятся на БольшойЧеркизовской улице Охраняемая территория, удобный подъезд с! Telefon 8/903/ 728 -00 = 2- 0 From kittenish37 at esincorporated.com Sun Jun 24 16:35:06 2012 From: kittenish37 at esincorporated.com (=?koi8-r?B?Iu/GydPZINcg7c/Ty9fFIg==?=) Date: Mon, 25 Jun 2012 08:35:06 +0900 Subject: =?koi8-r?B?7sUgzsHEzyDQzMHUydTYIMvPzcnT08nJwCwgz8bJ09kgz9Qg88/C09TX?= =?koi8-r?B?xc7OycvBIQ==?= Message-ID: <000d01cd5261$fc48fec0$6400a8c0@kittenish37> Маленькие и не очень маленькие ОФИСЫ ждут Вас! Помещения находятся на БольшойЧеркизовской улице Охраняемая территория, удобный подъезд с! Telefon 8/903/ 728 -00 = 2- 0 From vergesi057 at pozzo.com Sun Jun 24 20:19:02 2012 From: vergesi057 at pozzo.com (=?koi8-r?B?IvPXz8kgzMDEySI=?=) Date: Mon, 25 Jun 2012 10:19:02 +0700 Subject: =?koi8-r?B?99rZ08vBzsnFIMTPzMfP1yEg5M/M1s7Jy8Egzc/Wzs8g2sHDxdDJ1Ngg?= =?koi8-r?B?2sEg1snXz8Uh?= Message-ID: <000d01cd5281$45389f90$6400a8c0@vergesi057> Взыскание долгов через банкротство должника. Должника можно зацепить за живое! Привлечение к субсидиарной и уголовной ответственности руководителей должника. . Телефон (925) 509 29 99 From eugen at leitl.org Mon Jun 25 02:10:00 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 25 Jun 2012 11:10:00 +0200 Subject: PeerPoint Discussion - please don't use for other topics Message-ID: <20120625091000.GM17120@leitl.org> ----- Forwarded message from Poor Richard ----- From eugen at leitl.org Mon Jun 25 02:11:44 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 25 Jun 2012 11:11:44 +0200 Subject: [liberationtech] Single board mini computers as circumvention tools Message-ID: <20120625091144.GN17120@leitl.org> ----- Forwarded message from Frank Corrigan ----- From bowden at lach-diamond.com Mon Jun 25 08:40:13 2012 From: bowden at lach-diamond.com (=?koi8-r?B?IvPFy9LF1MHSwCDT0s/ezs8hIg==?=) Date: Mon, 25 Jun 2012 17:40:13 +0200 Subject: =?koi8-r?B?9M/M2MvPIMTM0SDQz83P3c7Jy8/XINLVy8/Xz8TJ1MXMxcohIA==?= Message-ID: <01cd52f9$92fcfc80$178bf173@bowden> Тренинг для секретаря - повысь свой профессиональный уровень и личный потенциал! Психология бизнес-коммуникаций - секретарь как менеджер информационных потоков Must have - бизнес-этикет, бизнес-подарки, необходимый антураж для организации успешных встреч руководителя Правила оформления документации - это ваш профессиональный стиль! Профессиональные компетенции - проверь свой уровень! Это и многое другое на тренинге в СПб 09 июля 2012. Запись на тренинг, условия по телефону: |8.1.2| 6 Ч 2 - 7 6 - 6 I P.S. Специальное предложение для руководителей: вы знаете, каким должен быть идеальный секретарь? Позвоните и мы организуем вам встречу! From reducedlwo at burzenski.com Mon Jun 25 06:45:13 2012 From: reducedlwo at burzenski.com (=?koi8-r?B?IvPt8yI=?=) Date: Mon, 25 Jun 2012 18:45:13 +0500 Subject: =?koi8-r?B?/snUwdTYIN7V1snFINPN0yDTz8/C3cXOydEgz97Fztgg0NLP09TP?= Message-ID: <2D826FFC602545998EE4D05BD7D098D7@memoona22e18ff> Читать чужие смс сообщения очень просто! Мы вам поможем в этом! Работаем по всем операторам и регионам! Гарантии анонимности и достоверности 100%. www.supersms123.ru ICQ: 613921726 From pgut001 at cs.auckland.ac.nz Mon Jun 25 03:01:14 2012 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Mon, 25 Jun 2012 22:01:14 +1200 Subject: [liberationtech] Single board mini computers as circumvention tools In-Reply-To: <20120625091144.GN17120@leitl.org> Message-ID: Eugen Leitl quotes: >Whilst these boards have been around for sometime, since the introduction of >Rasberry Pi, interest has grown and now there are many boards are being >created like: > >ARM Mini PCs >http://www.reghardware.com/2012/05/10/product_round_up_arm_mini_computers_the_best_and_the_rest/ >http://liliputing.com/2012/06/74-mk802-android-4-0-mini-pc-first-impressions-video.html I like the Alix boards from PCEngines, they come with nice cases, don't have the severe heat problems that many of the Arm-based boards do, and run any standard x86 binaries. Peter. From brdel at dynamatics.net Mon Jun 25 06:50:08 2012 From: brdel at dynamatics.net (=?koi8-r?B?Iu/Uy9LZ1NnFINTP0sfJIg==?=) Date: Mon, 25 Jun 2012 22:50:08 +0900 Subject: =?koi8-r?B?5+/z9eTh8vP09+Xu7vnqIOkg7fXu6ePp8OHs+O756iD64evh+iAtIA==?= =?koi8-r?B?8uXm7/Lt6fLv9+Hu6eUg8+nz9OXt+Q==?= Message-ID: <01cd5324$de78d000$28b29970@brdel> 02 - 03 июля 2012 г., САНКТ-ПЕТЕРБУРГ ГОСУДАРСТВЕННЫЙ И МУНИЦИПАЛЬНЫЙ ЗАКАЗ - РЕФОРМИРОВАНИЕ СИСТЕМЫ. НОВОЕ В ПРАВОВОМ МЕХАНИЗМЕ ЗАКУПОК ТОВАРОВ И УСЛУГ ДЛЯ ГОСУДАРСТВЕННЫХ И МУНИЦИПАЛЬНЫХ НУЖД. ЭЛЕКТРОННЫЕ ТОРГИ (аукцион). ПРОГРАММА МЕРОПРИЯТИЯ: 1. Правовое регулирование размещения государственного заказа на федеральные и муниципальные нужды. Обзор законодательства в области размещения государственного заказа. Гражданский кодекс, антимонопольное законодательство и др. регламентирующие акты. Размещение госзаказа в электронной форме согласно положениям главы 3.1 Федерального закона 94-ФЗ. Новые требования к закупочной деятельности в соответствии с 223-ФЗ. Электронные торги (аукцион). 2. Сфера применения законов 94-ФЗ и 223-ФЗ: основные особенности, отличия, взаимодополняемость, практика применения. 3. Новая редакция Федерального закона "О защите конкуренции" в соответствии с 401-ФЗ от 06.12.2011 г., вступившего в силу 6 января 2012 года. Изменения требований к торгам и порядку заключения договоров в отношении государственного и муниципального заказа. 4. Хозяйствующие субъекты, закупочная деятельность которых регламентируется в соответствие с 223-ФЗ от 18.07.2011. Сроки применения положений Закона. 5. Информация, подлежащая размещению с 1 июля 2012 г. на Общероссийском официальном сайте. 6. Подготовка типовой документации о закупочной деятельности. Регламент закупок; требования к разработке Положения о закупках; формирование и утверждение плана закупок на год; закупочная комиссия; техническое задание, типовые требования к участникам закупок и штату квалифицированных сотрудников участника закупок для работы по ФЗ-223; обоснование цены контракта. Комментарии к положениям Закона, вступающим в силу с 01 апреля 2012 года. 7. Выбор способа закупки. Закупки путем проведения конкурса, аукциона, аукциона в электронной форме, путем проведения запроса котировок, предложений, путем проведения конкурентных переговоров. Порядок и сроки проведения. Размещение заказа у единственного поставщика. Обоснование способа закупки в соответствии с 223-ФЗ. 8. Особенности проведения аукционов: порядок опубликования извещения,аукционной документации, изменений, разъяснений, итогов аукциона, структура аукционной документации, обеспечение аукционной заявки и гарантии выполнения контракта, аукциона с одним участником. Электронные заявки. Типичные ошибки при проведении аукционов. Новые аспекты организации и проведения. 9. Закупки на электронные площадках. Обзор действующих электронных торговых и федеральных площадок: ЭТП "Сбербанк - АСТ", ЭТП "РТС-тендер", ЭТП ММВБ, ЭТП "Единая электронная торговая площадка", ЭТП Агентства по государственному заказу Республики Татарстан. Электронные торговые площадки субъектов РФ. Правила регистрации, условия участия в торгах. 10. Электронный аукцион - что нужно знать Участнику, чтобы принять участие в электронном аукционе: соответствующее программное обеспечение, ЭЦП и порядок ее регистрации, документы на регистрацию, размещение извещения, документации об аукционе и протоколов. На каких площадках могут проводиться электронные аукционы?"Отрицательный электронный аукцион", правовые последствия его проведения. Какие документы нужно предоставить для прохождения аккредитации на торговой площадке? Обеспечение заявок на участие в аукционе в электронной форме: как и кому предоставляется. Условия удержания обеспечения. Как подготовить и подать заявку на участие в открытом аукционе в электронной форме? 11. Специфика размещения государственного заказа в различных отраслях.Государственный и муниципальный контракт на поставку лекарственных средств и медицинского оборудования. Открытый аукцион в электронной форме на строительные работы. Особенности работы с электронными площадками размещения заказа госкорпораций ("Росатом", ОАО "Оборонсервис" и др.) 12. Полномочия, функции, формы работы органов, контролирующих законодательство о размещении заказов. Реестр недобросовестных поставщиков. 13. Защита прав и интересов участников размещения заказов. Обжалование действий заказчиков и конкурсных компаний в области государственных и муниципальных закупок. Порядок составления и рассмотрения жалоб и исковых требований участников размещения заказов. 14. Ответственность за ненадлежащее исполнение государственного контракта. Ответственность за неприменение 223-ФЗ. Роль ФАС в контроле корпоративных закупок. Обзор практики. 15. Федеральная контрактная система: перспектива развития системы в 2012-2013 годах. НА ВСЕ ИНТЕРЕСУЮЩИЕ ВОПРОСЫ ВАМ ОТВЕТИТ НАШ СЕКРЕТАРЬ: (812) 6Ч2..21 З2 From beagledht572 at tritonius.com Tue Jun 26 01:55:05 2012 From: beagledht572 at tritonius.com (=?koi8-r?B?Iu3P08vXwSAtIPDSz9PQxcvUIPfF0s7BxNPLz8fPIg==?=) Date: Tue, 26 Jun 2012 00:55:05 -0800 Subject: =?koi8-r?B?797FztggxMXbxdfB0SDJIMvB3sXT1NfFzs7B0SDNz8rLwS4g8sXNz87U?= =?koi8-r?B?IMHX1M8g0yA5MCUg08vJxMvBzck=?= Message-ID: <000d01cd5370$ffbc8580$6400a8c0@beagledht572> Очень дешевая и качественная мойка на м. Университет. Ремонт авто с 90% скидками. Лучше любых купонов. Звоните. Автосервис, автомойка, покраска авто на м. Университет - Проспект Вернадского (ЮЗАО): ∙ автомойка - от 100 р. ∙ покраска авто от 4000 р. ∙ ремонт подвески, ходовой части от 300 р. ∙ ремонт коробки переключения передач (АКПП) от 5000 р. ∙ техническое обслуживание автомобилей в Москве от 500 р. ∙ замена масла, тормозной жидкости, тосола (антифриза) от 200 р. ∙ замена тормозных колодок, ремонт тормозной системы от 200 р. ∙ промывка инжекторной системы двигателя от 300 р. ∙ установка сигнализации в Москве от 1000 р. ∙ ремонт бампера в Москве от 1000 р. ∙ защитная полировка кузова жидким воском от 100 р. ∙ тонирование стекол автомобиля в Москве от 500 р. ∙ локальная покраска автомобиля в Москве от 1000 р. ∙ химчистка автомобиля в Москве от 2000 р. ∙ шиномонтаж от 100 р. Адрес: Проспект Вернадского 10а Телефоны: 8 (967) 138 3878, 8 (901) 516 0107 From brett at 3sp.com Mon Jun 25 10:25:50 2012 From: brett at 3sp.com (=?koi8-r?B?IvPU0s/J1MXM2M7B0SDcy9PQxdLUydrBIg==?=) Date: Tue, 26 Jun 2012 02:25:50 +0900 Subject: =?koi8-r?B?6drNxc7FzsnRINcgx9LBxM/T1NLPydTFzNjOz80gy8/ExcvTxSAyMA==?= =?koi8-r?B?MTI=?= Message-ID: <01cd5343$00814b00$50d10b6e@brett> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 314 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 56836 bytes Desc: not available URL: From bfandco at suth.com Mon Jun 25 15:43:20 2012 From: bfandco at suth.com (=?koi8-r?B?Iuvv7en05fQg8PLv7fn77OXu7u/qIPDv7On06evpIg==?=) Date: Tue, 26 Jun 2012 02:43:20 +0400 Subject: =?koi8-r?B?98nE2SDB1cvDyc/Oz9cuIA==?= Message-ID: <01cd5345$725a9400$9cbc1759@bfandco> 02 - 03 июля 2012 г., САНКТ-ПЕТЕРБУРГ ГОСУДАРСТВЕННЫЙ И МУНИЦИПАЛЬНЫЙ ЗАКАЗ - РЕФОРМИРОВАНИЕ СИСТЕМЫ. НОВОЕ В ПРАВОВОМ МЕХАНИЗМЕ ЗАКУПОК ТОВАРОВ И УСЛУГ ДЛЯ ГОСУДАРСТВЕННЫХ И МУНИЦИПАЛЬНЫХ НУЖД. ЭЛЕКТРОННЫЕ ТОРГИ (аукцион). ПРОГРАММА МЕРОПРИЯТИЯ: 1. Правовое регулирование размещения государственного заказа на федеральные и муниципальные нужды. Обзор законодательства в области размещения государственного заказа. Гражданский кодекс, антимонопольное законодательство и др. регламентирующие акты. Размещение госзаказа в электронной форме согласно положениям главы 3.1 Федерального закона 94-ФЗ. Новые требования к закупочной деятельности в соответствии с 223-ФЗ. Электронные торги (аукцион). 2. Сфера применения законов 94-ФЗ и 223-ФЗ: основные особенности, отличия, взаимодополняемость, практика применения. 3. Новая редакция Федерального закона "О защите конкуренции" в соответствии с 401-ФЗ от 06.12.2011 г., вступившего в силу 6 января 2012 года. Изменения требований к торгам и порядку заключения договоров в отношении государственного и муниципального заказа. 4. Хозяйствующие субъекты, закупочная деятельность которых регламентируется в соответствие с 223-ФЗ от 18.07.2011. Сроки применения положений Закона. 5. Информация, подлежащая размещению с 1 июля 2012 г. на Общероссийском официальном сайте. 6. Подготовка типовой документации о закупочной деятельности. Регламент закупок; требования к разработке Положения о закупках; формирование и утверждение плана закупок на год; закупочная комиссия; техническое задание, типовые требования к участникам закупок и штату квалифицированных сотрудников участника закупок для работы по ФЗ-223; обоснование цены контракта. Комментарии к положениям Закона, вступающим в силу с 01 апреля 2012 года. 7. Выбор способа закупки. Закупки путем проведения конкурса, аукциона, аукциона в электронной форме, путем проведения запроса котировок, предложений, путем проведения конкурентных переговоров. Порядок и сроки проведения. Размещение заказа у единственного поставщика. Обоснование способа закупки в соответствии с 223-ФЗ. 8. Особенности проведения аукционов: порядок опубликования извещения,аукционной документации, изменений, разъяснений, итогов аукциона, структура аукционной документации, обеспечение аукционной заявки и гарантии выполнения контракта, аукциона с одним участником. Электронные заявки. Типичные ошибки при проведении аукционов. Новые аспекты организации и проведения. 9. Закупки на электронные площадках. Обзор действующих электронных торговых и федеральных площадок: ЭТП "Сбербанк - АСТ", ЭТП "РТС-тендер", ЭТП ММВБ, ЭТП "Единая электронная торговая площадка", ЭТП Агентства по государственному заказу Республики Татарстан. Электронные торговые площадки субъектов РФ. Правила регистрации, условия участия в торгах. 10. Электронный аукцион - что нужно знать Участнику, чтобы принять участие в электронном аукционе: соответствующее программное обеспечение, ЭЦП и порядок ее регистрации, документы на регистрацию, размещение извещения, документации об аукционе и протоколов. На каких площадках могут проводиться электронные аукционы?"Отрицательный электронный аукцион", правовые последствия его проведения. Какие документы нужно предоставить для прохождения аккредитации на торговой площадке? Обеспечение заявок на участие в аукционе в электронной форме: как и кому предоставляется. Условия удержания обеспечения. Как подготовить и подать заявку на участие в открытом аукционе в электронной форме? 11. Специфика размещения государственного заказа в различных отраслях.Государственный и муниципальный контракт на поставку лекарственных средств и медицинского оборудования. Открытый аукцион в электронной форме на строительные работы. Особенности работы с электронными площадками размещения заказа госкорпораций ("Росатом", ОАО "Оборонсервис" и др.) 12. Полномочия, функции, формы работы органов, контролирующих законодательство о размещении заказов. Реестр недобросовестных поставщиков. 13. Защита прав и интересов участников размещения заказов. Обжалование действий заказчиков и конкурсных компаний в области государственных и муниципальных закупок. Порядок составления и рассмотрения жалоб и исковых требований участников размещения заказов. 14. Ответственность за ненадлежащее исполнение государственного контракта. Ответственность за неприменение 223-ФЗ. Роль ФАС в контроле корпоративных закупок. Обзор практики. 15. Федеральная контрактная система: перспектива развития системы в 2012-2013 годах. НА ВСЕ ИНТЕРЕСУЮЩИЕ ВОПРОСЫ ВАМ ОТВЕТИТ НАШ СЕКРЕТАРЬ: (812) 6Ч2 21...З2 From cubists at koerneragro.com Tue Jun 26 06:09:02 2012 From: cubists at koerneragro.com (=?koi8-r?B?IuUtzcHSy8XUyc7HIg==?=) Date: Tue, 26 Jun 2012 05:09:02 -0800 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAgKyDT0MXDIOjP09TJzscgINDPxMHS?= =?koi8-r?B?z8sg?= Message-ID: <3A16A7DD68D34EE88BE81E23E43618BD@bilal641139887> АКЦИЯ 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК + По вашему графику + Без ограничений по срокам + возможно менять макеты все 8 раз!!!! + Подготовка макетов бесплатно Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 2,4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,35 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2220 bytes Desc: not available URL: From 27ivo.veraldi at iscar.ch Mon Jun 25 14:29:24 2012 From: 27ivo.veraldi at iscar.ch (=?koi8-r?B?IvPU0s/J1MXM2M7B0SDcy9PQxdLUydrBIg==?=) Date: Tue, 26 Jun 2012 05:29:24 +0800 Subject: =?koi8-r?B?8NLJzcXOxc7JxSDn0sHEz9PU0s/J1MXM2M7Px88g68/ExcvTwQ==?= Message-ID: <01cd535c$a55c5200$df1edab4@27ivo.veraldi> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 313 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/gif Size: 56836 bytes Desc: not available URL: From churchyardtwm at glades.com Tue Jun 26 07:38:58 2012 From: churchyardtwm at glades.com (=?koi8-r?B?IvPPwtPU18XOzsnLICDrycXX08vPxSDbLiI=?=) Date: Tue, 26 Jun 2012 06:38:58 -0800 Subject: =?koi8-r?B?8NLPxMHF1NPRINXewdPUz8sgMjUwINPP1M/LINMg0MHOz9LBzc7ZzSDX?= =?koi8-r?B?ycTPzSE=?= Message-ID: <000d01cd53a1$09e3b350$6400a8c0@churchyardtwm> Продается участок в 90 км по киеской трассе, 250 соток с панорамным видом на лес, на самой высокой точке поселка, 6 метровые сосны, экология, лес, возможность построить личный водоем, коммуникации, охрана. Постройте свое родовое поместье, посадите семейное дерево, разбейте яблоневый сад, позабодьтесь о своем здоровье и здоровье своих близких, черпайте жизненную силу для новых побед, почувствуйте энергию природы. Вырвитесь из каменного плена Москвы. +7 903 1930623 From kerchiefingjvr95 at bay-forge.com Mon Jun 25 22:44:17 2012 From: kerchiefingjvr95 at bay-forge.com (=?koi8-r?B?IuvB3sXT1NfPINDPICDM1d7bxcogw8XOxSEi?=) Date: Tue, 26 Jun 2012 11:14:17 +0530 Subject: =?koi8-r?B?8sHT0NLPxMHWwSEg58XOxdLB1M/S2Swgzc/Uz9DPzdDZLCDLz83Q0sXT?= =?koi8-r?B?08/S2S4=?= Message-ID: <000d01cd535e$b9eb28c0$6400a8c0@kerchiefingjvr95> Генераторы, мотопомпы, компрессоры. Распродажа - лучше цены не найдете! Розница и опт. по всей России Звоните по тел. + 7 (926) 717 =80=88 From quotayi5 at opisa.com Tue Jun 26 00:40:34 2012 From: quotayi5 at opisa.com (=?koi8-r?B?Iu3P08vXwSAtIPDSz9PQxcvUIPfF0s7BxNPLz8fPIg==?=) Date: Tue, 26 Jun 2012 12:40:34 +0500 Subject: =?koi8-r?B?797FztggxMXbxdfB0SDJIMvB3sXT1NfFzs7B0SDNz8rLwS4g8sXNz87U?= =?koi8-r?B?IMHX1M8g0yA5MCUg08vJxMvBzck=?= Message-ID: <000d01cd536e$f862b9a0$6400a8c0@quotayi5> Очень дешевая и качественная мойка на м. Университет. Ремонт авто с 90% скидками. Лучше любых купонов. Звоните. Автосервис, автомойка, покраска авто на м. Университет - Проспект Вернадского (ЮЗАО): ∙ автомойка - от 100 р. ∙ покраска авто от 4000 р. ∙ ремонт подвески, ходовой части от 300 р. ∙ ремонт коробки переключения передач (АКПП) от 5000 р. ∙ техническое обслуживание автомобилей в Москве от 500 р. ∙ замена масла, тормозной жидкости, тосола (антифриза) от 200 р. ∙ замена тормозных колодок, ремонт тормозной системы от 200 р. ∙ промывка инжекторной системы двигателя от 300 р. ∙ установка сигнализации в Москве от 1000 р. ∙ ремонт бампера в Москве от 1000 р. ∙ защитная полировка кузова жидким воском от 100 р. ∙ тонирование стекол автомобиля в Москве от 500 р. ∙ локальная покраска автомобиля в Москве от 1000 р. ∙ химчистка автомобиля в Москве от 2000 р. ∙ шиномонтаж от 100 р. Адрес: Проспект Вернадского 10а Телефоны: 8 (967) 138 3878, 8 (901) 516 0107 From mainsrs60 at indians.com Tue Jun 26 07:04:15 2012 From: mainsrs60 at indians.com (=?koi8-r?B?IvP08uH05efp8SDpIPDh8un05fQi?=) Date: Tue, 26 Jun 2012 15:04:15 +0100 Subject: =?koi8-r?B?T1NCLTMsIObh7uXy+Q==?= Message-ID: <121682540.17729089991941@indians.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 37401 bytes Desc: not available URL: From cooperedq6 at delraybeach.com Tue Jun 26 06:33:26 2012 From: cooperedq6 at delraybeach.com (=?koi8-r?B?IvPPwtPU18XOzsnLICDrycXX08vPxSDbLiI=?=) Date: Tue, 26 Jun 2012 16:33:26 +0300 Subject: =?koi8-r?B?8NLPxMHF1NPRINXewdPUz8sgMjUwINPP1M/LINMg0MHOz9LBzc7ZzSDX?= =?koi8-r?B?ycTPzSE=?= Message-ID: <000d01cd53a0$444a5f90$6400a8c0@cooperedq6> Продается участок в 90 км по киеской трассе, 250 соток с панорамным видом на лес, на самой высокой точке поселка, 6 метровые сосны, экология, лес, возможность построить личный водоем, коммуникации, охрана. Постройте свое родовое поместье, посадите семейное дерево, разбейте яблоневый сад, позабодьтесь о своем здоровье и здоровье своих близких, черпайте жизненную силу для новых побед, почувствуйте энергию природы. Вырвитесь из каменного плена Москвы. +7 903 1930623 From edensis7 at surapon.com Tue Jun 26 19:38:09 2012 From: edensis7 at surapon.com (=?koi8-r?B?Iu/GydPZINcg7c/Ty9fFIg==?=) Date: Tue, 26 Jun 2012 18:38:09 -0800 Subject: =?koi8-r?B?7sUgzsHEzyDQzMHUydTYIMvPzcnT08nJwCwgz8bJ09kgz9Qg88/C09TX?= =?koi8-r?B?xc7OycvBIQ==?= Message-ID: <000d01cd5405$81a81b60$6400a8c0@edensis7> Маленькие и не очень маленькие ОФИСЫ ждут Вас! Помещения находятся на БольшойЧеркизовской улице Охраняемая территория, удобный подъезд с! Telefon 8/903/ 728 -00 = 2- 0 From whisperszt at sbdcomputers.com Tue Jun 26 23:10:28 2012 From: whisperszt at sbdcomputers.com (=?koi8-r?B?IuzV3tvJyiDQz8TB0s/LIg==?=) Date: Tue, 26 Jun 2012 22:10:28 -0800 Subject: =?koi8-r?B?7MXUztHRINPLycTLwSA1MCUgLSDDxc7BINDSz9PUzyDTzcXbzsHRIC0g?= =?koi8-r?B?MTQ5MNLVwiDXzcXT1M8gMzAwMNLVwiEg?= Message-ID: <000d01cd5423$2b2d4cb0$6400a8c0@whisperszt> Оригинальный подарок с доставкой - картина в роскошной раме - 1490руб Продается здесь: www.картина-тут.рф/11.shtml -------------- next part -------------- A non-text attachment was scrubbed... Name: 28-04.jpg Type: image/jpeg Size: 29501 bytes Desc: not available URL: From minimally57 at bronstee.com Tue Jun 26 23:13:19 2012 From: minimally57 at bronstee.com (=?koi8-r?B?IvDSz8TBxdTT0SDr7/T05eT2Ig==?=) Date: Tue, 26 Jun 2012 22:13:19 -0800 Subject: =?koi8-r?B?8NLPxMHF1NPRICDu7/f56iDr7/T05eT2?= Message-ID: <8F9BEBB3A3374B42841F968DAF098676@nadeem96507b5d> Продается НОВЫЙ КОТТЕДЖ Коттедж, 200 м2 Участок: 12 сот. Киевское шоссе, Боровск Газ, вода, Электрика, Канализация, все заведено в дом и функционирует Под чистовую отделку ТРЕБУЕТСЯ ТОЛЬКО ФИНИШНАЯ ОТДЕЛКА. немецкие технологии 6,7 млн. руб www.продам-дом-тут.рф From brainer at speakeasy.org Tue Jun 26 09:44:03 2012 From: brainer at speakeasy.org (=?koi8-r?B?IuvPzsbF0sXOw8nRIMTM0SDT1NLPydTFzNjO2cggy8/N0MHOycoi?=) Date: Tue, 26 Jun 2012 22:14:03 +0530 Subject: =?koi8-r?B?7s/Xz8Ug1yDr4eTh8/Ty5SE=?= Message-ID: <01cd53e8$fe71c780$04f1e0dc@brainer> Объекты недвижимости: регистрация, оформление прав, кадастр Подтвержденное право на объект недвижимости возникает с момента государственной регистрации. Каким образом осуществить необходимые действия по кадастровому учету, паспортированию и регистрации прав? Какие ведомства и службы отвечают за регистрацию недвижимого имущества? Как провести сделку с имущественным комплексом? Последние актуальные правовые вопросы и изменения в консультационном семинаре: кадастр объектов недвижимости: принципы ведения и предоставление сведений; межевание, кадастровые паспорта; взаимодействие служб Росреестра, БТИ и пр. последние законодательные акты в сфере землеустройства, ГКН, регистрации сделок с недвижимостью; особенности предоставления участков по строительство; возникновение прав на объект при вводе объекта в эксплуатацию; линейные объекты и инженерные сети; сделки с землей; требования к эксплуатацию зданий и сооружений, в соответствии с N 337-ФЗ от 28.11.2011 __________ Консультационное мероприятие 16 √ 17 июля 2012 г., в Санкт-Петербурге Участие на основе РЕГИСТРАЦИИ : (812) 6Ч2. I7. 7З -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3435 bytes Desc: not available URL: From brabinprwig at indresognbil.no Tue Jun 26 10:09:16 2012 From: brabinprwig at indresognbil.no (=?koi8-r?B?IuzvIg==?=) Date: Tue, 26 Jun 2012 22:39:16 +0530 Subject: =?koi8-r?B?8sXHydPU0sHDydEg0NLB1yDOwSDMyc7Fys7ZxSDPwt/Fy9TZ?= Message-ID: <01cd53ec$84434200$3435a87a@brabinprwig> предложение для строителей (в приложении) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 285 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: application/vnd.ms-excel Size: 31232 bytes Desc: not available URL: From hippopotamus at handjekontantje.com Wed Jun 27 00:21:33 2012 From: hippopotamus at handjekontantje.com (=?koi8-r?B?IvTJ0M/H0sHGydEi?=) Date: Tue, 26 Jun 2012 23:21:33 -0800 Subject: =?koi8-r?B?8M/MycfSwcbJ0SDXIO3P08vXxQ==?= Message-ID: Типография в Москве. Рядом с метро. Свое производство. - Офсетная печать - Цифровая печать - Дизайн-студия - Любая послепечатная отделка Наша типография профессионально изготовит любую полиграфическую продукцию. Каталоги, Листовки, Буклеты, Визитки, Календари и многое, многое другое – доступные цены! Визитки цветные - 250 р за комплект (96 штук). Каталог А4, полноцвет, 16 стр., тираж 1000 шт. - 25,20 р.шт. Блокнот фирменный А5, 24 листа, 1000 шт. - 23,70 р.шт. Для постоянных клиентов - гибкая система СКИДОК! Звоните! Тел.: 782-58-94 From bardy80 at marketwatch.com Tue Jun 26 12:10:34 2012 From: bardy80 at marketwatch.com (=?koi8-r?B?IvDSwdfJzMEgz8bP0s3Mxc7J0SDQ0sHXIM7BIM7FxNfJ1snNz9PU2A==?= =?koi8-r?B?Ig==?=) Date: Wed, 27 Jun 2012 00:40:34 +0530 Subject: =?koi8-r?B?7s/Xz8Ug1yDr4eTh8/Ty5SE=?= Message-ID: <01cd53fd$7649ed00$b86d610e@bardy80> Объекты недвижимости: регистрация, оформление прав, кадастр Подтвержденное право на объект недвижимости возникает с момента государственной регистрации. Каким образом осуществить необходимые действия по кадастровому учету, паспортированию и регистрации прав? Какие ведомства и службы отвечают за регистрацию недвижимого имущества? Как провести сделку с имущественным комплексом? Последние актуальные правовые вопросы и изменения в консультационном семинаре: кадастр объектов недвижимости: принципы ведения и предоставление сведений; межевание, кадастровые паспорта; взаимодействие служб Росреестра, БТИ и пр. последние законодательные акты в сфере землеустройства, ГКН, регистрации сделок с недвижимостью; особенности предоставления участков по строительство; возникновение прав на объект при вводе объекта в эксплуатацию; линейные объекты и инженерные сети; сделки с землей; требования к эксплуатацию зданий и сооружений, в соответствии с N 337-ФЗ от 28.11.2011 __________ Консультационное мероприятие 16 √ 17 июля 2012 г., в Санкт-Петербурге Участие на основе РЕГИСТРАЦИИ : (812) 6Ч2. I7. 7З -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3357 bytes Desc: not available URL: From bowman at utk.edu Tue Jun 26 14:46:23 2012 From: bowman at utk.edu (=?koi8-r?B?IvrFzcXM2M7ZyiDLz8TFy9Mi?=) Date: Wed, 27 Jun 2012 00:46:23 +0300 Subject: =?koi8-r?B?+sXNxczYztnKIMvPxMXL0ywg08TFzMvJLCDPxs/SzczFzsnFLCDLwQ==?= =?koi8-r?B?xMHT1NI=?= Message-ID: <01cd53fe$464f1980$5026284d@bowman> Объекты недвижимости: регистрация, оформление прав, кадастр Подтвержденное право на объект недвижимости возникает с момента государственной регистрации. Каким образом осуществить необходимые действия по кадастровому учету, паспортированию и регистрации прав? Какие ведомства и службы отвечают за регистрацию недвижимого имущества? Как провести сделку с имущественным комплексом? Последние актуальные правовые вопросы и изменения в консультационном семинаре: кадастр объектов недвижимости: принципы ведения и предоставление сведений; межевание, кадастровые паспорта; взаимодействие служб Росреестра, БТИ и пр. последние законодательные акты в сфере землеустройства, ГКН, регистрации сделок с недвижимостью; особенности предоставления участков по строительство; возникновение прав на объект при вводе объекта в эксплуатацию; линейные объекты и инженерные сети; сделки с землей; требования к эксплуатацию зданий и сооружений, в соответствии с N 337-ФЗ от 28.11.2011 __________ Консультационное мероприятие 16 √ 17 июля 2012 г., в Санкт-Петербурге Участие на основе РЕГИСТРАЦИИ : (812) 6Ч2. I7. 7З -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3435 bytes Desc: not available URL: From bordal at briz.no Tue Jun 26 09:17:47 2012 From: bordal at briz.no (=?koi8-r?B?IvLVy8/Xz8TJ1MXM2CDJzsbP0s3Bw8nPzs7Px88gw8XO1NLBIg==?=) Date: Wed, 27 Jun 2012 01:17:47 +0900 Subject: =?koi8-r?B?7MnOxcrO2cUgz8LfxcvU2Q==?= Message-ID: <01cd5402$a942af80$48428c73@bordal> предложение для строителей (в приложении) -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 283 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: application/vnd.ms-excel Size: 31232 bytes Desc: not available URL: From progenitorszpx5 at vegasgolfer.com Wed Jun 27 06:05:16 2012 From: progenitorszpx5 at vegasgolfer.com (=?koi8-r?B?IuUt8sHT09nMy8ki?=) Date: Wed, 27 Jun 2012 05:05:16 -0800 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAgKyDIz9PUyc7HIM7BIM3F09HDINcg?= =?koi8-r?B?8O/k4fLv6w==?= Message-ID: 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК (для указания вашего сайта в письме) По вашему графику Без ограничений по срокам Возможно менять макеты все 8 раз !!! Подготовка макетов бесплатно АКЦИИ: Месяц 44(46) рассылок - 2 раза в день - 5 раз в неделю - 20 000 рублей Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,7 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 From joystickau360 at twoeyes.com Tue Jun 26 22:44:02 2012 From: joystickau360 at twoeyes.com (=?koi8-r?B?IvzMydTO2cUgy9fB0tTJ0tkg1yDowc3P187Jy8HIIg==?=) Date: Wed, 27 Jun 2012 10:44:02 +0500 Subject: =?koi8-r?B?8NLPxMHA1NPRIMvXwdLUydLZINcg6MHNz9fOycvByCA=?= Message-ID: Продаются элитные квартиры в Хамовниках в близи Новодевичьего монастыря www.дом-хамовники.рф From howellvvz75 at ingerluxmadrid.com Tue Jun 26 23:44:58 2012 From: howellvvz75 at ingerluxmadrid.com (=?koi8-r?B?IvTJ0M/H0sHGydEi?=) Date: Wed, 27 Jun 2012 12:14:58 +0530 Subject: =?koi8-r?B?8M/MycfSwcbJ0SDXIO3P08vXxQ==?= Message-ID: <8417E27E798645749E3FCD7E61D9CFF8@san> Типография в Москве. Рядом с метро. Свое производство. - Офсетная печать - Цифровая печать - Дизайн-студия - Любая послепечатная отделка Наша типография профессионально изготовит любую полиграфическую продукцию. Каталоги, Листовки, Буклеты, Визитки, Календари и многое, многое другое – доступные цены! Визитки цветные - 250 р за комплект (96 штук). Каталог А4, полноцвет, 16 стр., тираж 1000 шт. - 25,20 р.шт. Блокнот фирменный А5, 24 листа, 1000 шт. - 23,70 р.шт. Для постоянных клиентов - гибкая система СКИДОК! Звоните! Тел.: 782-58-94 From nicodemusw677 at feedback2.lastminute.com Wed Jun 27 00:05:38 2012 From: nicodemusw677 at feedback2.lastminute.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Wed, 27 Jun 2012 12:35:38 +0530 Subject: =?koi8-r?B?+sHdydTJINPXz8Ug2sTP0s/X2MUh?= Message-ID: <0A2AE167475045E883B83BE7D36C3285@SYSTEM1> ���������� ������� � ���������� ���������. �� 6 ������� 2011 ���� � �� ��������� 82 181 �������, ��� ������� ������� 6 572 �������� � �������� ������ 6 684 �������. ������ ������������ ����� �� ������� �������� 5 746 597 000 ������. www.������-����.�� -------------- next part -------------- A non-text attachment was scrubbed... Name: deveau.jpg Type: image/jpeg Size: 58754 bytes Desc: not available URL: From ionianso2 at waterplay.com Wed Jun 27 05:05:51 2012 From: ionianso2 at waterplay.com (=?koi8-r?B?IvPt8yI=?=) Date: Wed, 27 Jun 2012 15:05:51 +0300 Subject: =?koi8-r?B?6M/UydTFINDSz97J1MHU2CDe1dbJxSDTzdMg08/Pwt3FzsnRPyD81M8g?= =?koi8-r?B?z97Fztgg0NLP09TPINPExczB1Ngh?= Message-ID: <356BB076628E4CAEBC8F86E69A4E28A3@afia> Предоставляем услуги по распечатке смс сообщений! Работаем по всем операторам и регионам. Предоставляем гарантии достоверности и анонимности! admin at supersms123.ru ICQ: 613921726 From invited0 at deepdesign.com Wed Jun 27 01:19:04 2012 From: invited0 at deepdesign.com (=?koi8-r?B?IuUtzcHSy8XUyc7HIg==?=) Date: Wed, 27 Jun 2012 15:19:04 +0700 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAgKyDT0MXDIOjP09TJzscgINDPxMHS?= =?koi8-r?B?z8sg?= Message-ID: <77573E9E0BA841829104BCD1A43B2A07@S> АКЦИЯ 8 рассылок за 10 000 рублей + хостинг на месяц в ПОДАРОК + По вашему графику + Без ограничений по срокам + возможно менять макеты все 8 раз!!!! + Подготовка макетов бесплатно Под акцию попадают базы: Вся Россия - 23 млн адресов - из них 2,4 млн ЮР. Вся Москва - 8 млн адресов - из них 1,35 млн ЮР. Вся Украина - 4 млн адресов - из них 1 млн ЮР. и др. Тел: (495) 585-79-04 ICQ: 286 926 971 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2220 bytes Desc: not available URL: From temperaf at chedington.com Wed Jun 27 03:24:02 2012 From: temperaf at chedington.com (=?koi8-r?B?IvPF0tTJxsnLwcPJ0SI=?=) Date: Wed, 27 Jun 2012 15:54:02 +0530 Subject: =?koi8-r?B?79DMwdTBINDP08zFINDPzNXexc7J0SDz5fL06ebp6+H04Q==?= Message-ID: <85B5874ED534432996E12822574351D2@abc4> Все виды сертификации АКЦИЯ Оплата после получения СЕРТИФИКАТА Только у нас СЕРТИФИКАТ СООТВЕТСТВИЯ (ГОСТ Р) ЗА 1 ДЕНЬ!!! (495) 227 94 43 www.сертификация-быстро.рф From tortuoush at fillmoretech.com Wed Jun 27 03:26:33 2012 From: tortuoush at fillmoretech.com (=?koi8-r?B?IvPF0tTJxsnLwcPJ0SI=?=) Date: Wed, 27 Jun 2012 15:56:33 +0530 Subject: =?koi8-r?B?79DMwdTBINDP08zFINDPzNXexc7J0SDz5fL06ebp6+H04Q==?= Message-ID: <508BC130CDF24E30BE5AD7DDA4C5A24C@poem> Все виды сертификации АКЦИЯ Оплата после получения СЕРТИФИКАТА Только у нас СЕРТИФИКАТ СООТВЕТСТВИЯ (ГОСТ Р) ЗА 1 ДЕНЬ!!! (495) 227 94 43 www.сертификация-быстро.рф From hobsoz04 at on-the-bund.com Wed Jun 27 03:50:10 2012 From: hobsoz04 at on-the-bund.com (=?koi8-r?B?IvDPxM/M2NPLycog0sHKz84sIDY1IMvNIM/UIO3r4eQi?=) Date: Wed, 27 Jun 2012 18:50:10 +0800 Subject: =?koi8-r?B?8NLPxMHAIMTB3tUgMTIg08/Uz8sg1yDMxdPVLCDXIM/C1snUz80g8+70?= =?koi8-r?B?LCAyMDA5IMcuINDP09TSz8rLyS4g?= Message-ID: <000d01cd5452$9f8b4b50$6400a8c0@hobsoz04> Продаю дачу 12 соток в лесу, в обжитом СНТ, 2009 г. постройки. Подольский район, 65 км от МКАД, круглогодичный подъезд. Рубленый двухэтажный дом 108 кв.м, 4 спальни, пластиковые окна, русская печь, электричество, колодец, надворные постройки, плодовые деревья и кустарники. Охрана. 3,5 млн.рублей. Обращайтесь: 8-499-346-09-91 From rearspu7 at webkazoo.com Wed Jun 27 06:57:33 2012 From: rearspu7 at webkazoo.com (=?koi8-r?B?IuXXwSI=?=) Date: Wed, 27 Jun 2012 18:57:33 +0500 Subject: =?koi8-r?B?8NLPxMHAINXewdPUz8sgNyDLzSDP1CDt6+HkINDPIOzFzsnOx9LBxNPL?= =?koi8-r?B?z83VINvP09PF?= Message-ID: <000d01cd546c$ccf51f70$6400a8c0@rearspu7> Продается прилесной участок 13 соток в стародачной месте, близ д. Подрезково. До ближайшей станции метро Планерная или Речной вокзал - 20 мин на маршрутке. На участке хозблок, туалет, дом и беседка в старом фруктовом саду. Место очень тихое и живописное в 300 метрах от участка протекает река Сходня. Телефон: 8(916) 688-34-39 Ева. From 3dbbos at lighthousegroup.net Wed Jun 27 07:25:17 2012 From: 3dbbos at lighthousegroup.net (=?koi8-r?B?IvfTxdfPzM/EIPDF1NLP18neIg==?=) Date: Wed, 27 Jun 2012 19:55:17 +0530 Subject: =?koi8-r?B?18nS1NXBzNjOwdEg4fTz?= Message-ID: <01cd549e$c62cc080$d9c13e78@3dbbos> Виртуальная АТС всего за 300 рублей в месяц Звоните сегодня (495) 225...04 62 - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции ОСТАЛОСЬ ВСЕГО ДВА ДНЯ Выбирайте московский номер и получайте виртуальную АТС для склада/офиса/ресторана/магазина From sinusesh9 at global-mfg.com Wed Jun 27 08:21:20 2012 From: sinusesh9 at global-mfg.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Wed, 27 Jun 2012 20:51:20 +0530 Subject: =?koi8-r?B?9yDT1NLBzsUg1d7B09TJzMnT2CDw7/bh8vkh?= Message-ID: <248DCF69583A4747904F38338038E040@pramukh07> Статистика пожаров в Российской Федерации. За 6 месяцев 2011 года в РФ произошло 82 181 пожаров, при которых погибли 6 572 человека и получили травмы 6 684 человек. Прямой материальный ущерб от пожаров составил 5 746 597 000 рублей. www.защити-себя.рф From bolgphilippines at desertdiamondsco.com Wed Jun 27 06:59:31 2012 From: bolgphilippines at desertdiamondsco.com (=?koi8-r?B?Iu7Jy8/Mwcog4tney8/XIg==?=) Date: Wed, 27 Jun 2012 20:59:31 +0700 Subject: =?koi8-r?B?wsXazMnNydTO2cogzcXWx8/Sz8Q=?= Message-ID: <01cd54a7$bf567b80$10a9157b@bolgphilippines> Безлимитный межгород Безлимитка по всей России на все номера Всего за 3000 рублей Звоните сегодня - (495) 225--04-62 From landslidesc at lax.bm.com Thu Jun 28 02:26:09 2012 From: landslidesc at lax.bm.com (=?koi8-r?B?Iu7V1s7BIMvXwdLUydLBIg==?=) Date: Wed, 27 Jun 2012 21:26:09 -1200 Subject: =?koi8-r?B?6d3VIMvXwdLUydLVINcg8M/Ezc/Ty8/X2MU=?= Message-ID: <730B39907A7A43749791419793C8FE4B@win2006> Требуется квартира в Подмосковье. Обменяю или куплю с альтернативой на: Дом в альпийском стиле в городе Яхрома, с участком 15 соток. 42 км от Москвы по Дмитровскому шоссе, на закрытой охраняемой территории. Дом для круглогодичного проживания - ИЖС, ПМЖ. Участок граничит вплотную с горнолыжным курортом "Волен". Общая площадь дома 360 кв.м., жилая 240 кв.м. Рай для любителя горных лыж и сноуборда. Посмотреть здесь: www. www.купи-дом-здесь.рф Собственник, возможен торг. Рассмотрю любые варианты. From schoen at eff.org Wed Jun 27 22:28:20 2012 From: schoen at eff.org (Seth David Schoen) Date: Wed, 27 Jun 2012 22:28:20 -0700 Subject: [tor-talk] possible to identify tor user via hardware DRM? Message-ID: Nick M. Daly writes: > I've actually been reading similar concerns (about hardware-based > tracking) on the FreedomBox list, and I have no basis for validating the > claims. Wondering if anybody could shed some light on just how serious > these claims are and how they'd impact Tor users (or privacy generally)? > The mail seems full of generalizations, but the author seems genuine: > > http://lists.alioth.debian.org/pipermail/freedombox-discuss/2012-June/004049.html I find this message misleading in various ways. The basic thing that I've been telling people is that there are few situations in which either PSN or TPM uniqueness makes things qualitatively worse. There are lots of hardware unique IDs. On Linux, try "sudo lshw" and be surprised at all the things that have unique serial numbers. There are also things that are unique about your machine that are not hardware serial numbers, like filesystem serial numbers and observed combinations of software configurations. These can be bad for privacy because software can tell which computer it's running on. If the software has an adversarial relationship with you, it can then use that information in a way that you don't like. We would be better off in some regards if operating systems let us hide local uniqueness from software so that the software couldn't tell what machine it was running on, or set fake values for these unique identifiers. Some proprietary software including Microsoft Windows already makes a sophisticated profile of the local machine, including many kinds of observations, to tie a copy of the software (or an "activation") to a particular device (!). The only substantive difference with the TPM uniqueness is that the TPM uniqueness lets you prove (like a smartcard) to a remote system that you're running some software on the same machine as before. Even if the OS did let you set fake values when software tried to examine the system it was running on, the remote system could see that the TPM-related values were fake. That's useful for some applications, including but not limited to DRM-like ones. I've argued that this is bad in some ways, but at least you can still turn off the TPM. Then your system can't attempt to offer that kind of proof. As far as I know, turning off the TPM is pretty robust: it really is turned off. All of these things are anonymity problems in particular when some software on your computer is actively _trying_ to tell someone else what machine you're running on, either because it's programmed to do so or because someone has broken into your computer and installed spyware and is trying to use it to monitor you. If you're not in that situation, there is nothing especially magical about having unique hardware IDs in your machine, because everyone's machine has some uniqueness, and (for the most part) that uniqueness isn't part of standard network protocols like TCP/IP and doesn't automatically leak out to anyone and everyone you communicate with over the Internet. (There is a possible exception about clock skew, which you can read about in Steven Murdoch's paper from 2006.) Similarly, having a GPS receiver in your phone does not mean that everyone you send an SMS to or everyone you call will learn your exact physical location. However, it does mean that if there's spyware on your phone, that spyware is able to use the GPS to learn your location and leak it. If you're worried about spyware threats on your phone, which can be quite a realistic concern, the GPS itself isn't necessarily the unique core of the threat, because there are also lots of other things in the phone that can be read to help physically locate you (like wifi base station MAC addresses, taking photographs of your surroundings with the phone's camera, recording the identities and signal strengths of the GSM base stations your phone sees...). So a more fundamental question might be whether your phone operating system is able to either prevent you from getting malware or prevent the malware from accessing the sensors on your phone. In the case of a desktop PC, the hardware uniqueness is _there to be read by software_, and if it's in a TPM it _may be able to give the software remotely verifiable cryptographic proof that the software is really running on the machine containing that particular TPM_. In neither case does the hardware uniqueness directly broadcast itself to other machines, and in neither case does the hardware uniqueness prevent the operating system from preventing other software from reading it. If you do have some kind of software running on your machine that's trying to track you or trying to help other people track you, hardware uniqueness is one thing that the software might look at. But if you're a Tor user, a more basic thing for the software to try to do is make network connections to leak your real IP address in order to associate your Tor-based network activity with your non-Tor-based network activity. That might be even easier because the tracking software could just try to make a direct network connection. If you're not using Tor, at least not at a particular moment, but are still concerned about tracking, there's another problem, which is that all existing browsers _already_ reveal a great deal of software-based uniqueness to any interested web site, usually enough to make your browser unique. See https://panopticlick.eff.org/browser-uniqueness.pdf This is important because it doesn't require there to be any malicious software on your computer, just a traditional web browser. One of the defenses people have talked about against hardware fingerprinting is running inside a virtual machine. Normally, software inside the virtual machine, even if it's malicious, doesn't learn much about the physical machine that hosts the VM. If you always use Tor inside a VM, then even if there's a bug that lets someone take over your computer (or if they trick you into installing spyware), the malicious software won't be able to read much real uniqueness from the host hardware, unless there's also a bug in the VM software. Running in a VM isn't exactly a defense against software fingerprinting (like browser fingerprinting) if you use the VM for various non-Tor activities that you don't want to be linked to one another, because the software configuration inside the VM might be, or become, sufficiently different from others that it can be recognized. There's probably more research to be done about the conditions under which VMs can be uniquely identified both "from the inside" by malware, and remotely by remote software fingerprinting, absent VM bugs that give unintended access to the host. -- Seth Schoen Senior Staff Technologist https://www.eff.org/ Electronic Frontier Foundation https://www.eff.org/join 454 Shotwell Street, San Francisco, CA 94110 +1 415 436 9333 x107 _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From brain.net.pk at mcsv12.net Wed Jun 27 10:03:06 2012 From: brain.net.pk at mcsv12.net (=?koi8-r?B?IvDB18XMIODO1dPP18neIg==?=) Date: Wed, 27 Jun 2012 22:33:06 +0530 Subject: =?koi8-r?B?zc7Px8/Lz87BzNjO2cogzs/NxdI=?= Message-ID: <01cd54b4$d2237d00$83213e78@brain.net.pk> Виртуальная АТС всего за 300 рублей в месяц Звоните сегодня (495) 225...04.62 - Номер с Вами, куда бы вы ни переехали - Неограниченное количество линий - Экономия на покупке телефонной станции ОСТАЛОСЬ ВСЕГО ДВА ДНЯ Выбирайте московский номер и получайте виртуальную АТС для склада/офиса/ресторана/магазина From alla at aviatour.com Wed Jun 27 11:50:25 2012 From: alla at aviatour.com (=?koi8-r?B?Iu7Jy8/Mwcog69XExczRIg==?=) Date: Wed, 27 Jun 2012 23:20:25 +0430 Subject: =?koi8-r?B?xMXbxdfB0SDNxdbE1cfP0s/EzsHRINPX0drYIQ==?= Message-ID: <01cd54bb$6e508280$8414b74e@alla> Безлимитный межгород Безлимитка по всей России на все номера Всего за 3000 рублей Звоните сегодня - (495) 225_04--62 From 3dmohd_n-azam at murphyoilcorp.com Wed Jun 27 09:33:47 2012 From: 3dmohd_n-azam at murphyoilcorp.com (=?koi8-r?B?IuHO1sXMwSDmwdLbwdTP187BIg==?=) Date: Wed, 27 Jun 2012 23:33:47 +0700 Subject: =?koi8-r?B?wsXazMnNydTO2cogzcXWx8/Sz8Q=?= Message-ID: <01cd54bd$4c57ff80$40a9a671@3dmohd_n-azam> Безлимитный межгород Безлимитка по всей России на все номера Всего за 3000 рублей Звоните сегодня - (495) 225-04-62 From 46e4d315.202916626 at vummail.be Wed Jun 27 07:53:41 2012 From: 46e4d315.202916626 at vummail.be (=?koi8-r?B?ItLVy8/Xz8TJ1MXM2CDj7yI=?=) Date: Wed, 27 Jun 2012 23:53:41 +0900 Subject: =?koi8-r?B?7cnH0sHDyc/OztnKINXexdQgyc7P09TSwc7O2cggx9LB1sTBzg==?= Message-ID: <01cd54c0$1405f080$e1fd2476@46e4d315.202916626> изменения в законодательстве -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 273 bytes Desc: not available URL: -------------- next part -------------- поЮ║╠А>ЧЪ 13ЧЪЪЪ0ЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЛ╔аyюП©Дbjbj╫╫. ъ{ъ{╕ЪЪЪЪЪЪ╥··ЪЪЪЪ++++? +, 0KKKKKААА÷ ║ ║ ║ ║ ║ ║ $\ ╡!>е !А©"АААе KKtФ _ _ _ А"KK÷ _ А÷ _ _ _ KЪЪЪЪ@ёЩ┌≈SмЪЪЪЪ _ ▀ Э 0, _ L! FL!_ L!_ ,АА_ АААААе е _ ААА, ААААЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪL!ААААААААА·? щ:AQ 1>;55 ?>?C;O@=K< 2 =0H8 4=8 AB0=>28BAO ?@82;5G5=85 @01>B>40B5;5< : A>B@C4=8G5AB2C 8=>AB@0==KE 3@0640=.  MB><, 157CA;>2=>, 5ABL <=>3> ?;NA>2, => 8 =5 <5=LH5 ?>42>4=KE :0<=59. 0 ?@82;5G5=85 8=>AB@0==KE 3@0640= 157 =5>1E>48<KE @07@5H5=89 CAB0=>2;5= HB@0D 2 @07<5@5 >B 250 4> 800 BKA. @C1;59 70 :064>3> 8=>AB@0==>3> 3@0640=8=0, ;81> 04<8=8AB@0B82=>5 ?@8>AB0=>2;5=85 45OB5;L=>AB8 =0 A@>: 4> 452O=>AB0 ACB>: (AB. 18.15, 18.16 > $). #7=09B5 ?>4@>1=K9 ?>@O4>: ?@8Q<0 =0 @01>BC 8 ?@028;0 B@C4>2KE 2708<>>B=>H5=89 @01>B>40B5;O A 8=>AB@0==K<8 @01>B=8:0<8 =0 0:BC0;L=>9 8 206=>9 :>=D5@5=F88 4;O @C:>2>48B5;59 8 :04@>2KE A;C61: "@C4>CAB@>9AB2> 8=>AB@0==KE 3@0640= 2 @0<:0E 109-$ ╚  <83@0F8>==>< CG5B5 8=>AB@0==KE 3@0640= 8 ;8F 157 3@0640=AB20 2 $╩. >A;54=85 87<5=5=8O 2 70:>=>40B5;LAB25. >=D5@5=F8O ?@>945B 11 8N;O 2 5B5@1C@35.  @>3@0<<0 :>=D5@5=F88 (:@0B:>): 1. @5<5==>5 ?@51K20=85, 2@5<5==>5/?>AB>O==>5 ?@>6820=85 8=>AB@0==KE @01>B=8:>2. f Б f h ┌ ≤ ч Ю Б (NPz|~─╬бфлнД  fh╤Жz|x╨НПРТюдБЭУЭУЯМЕЮЕЭою╧Е╧╚╓ ╓М╧М╧М╧М╧≤╧М╧М╧М╧М╧МЯМЕ▀z h·b<h |5│B* CJ aJ ph!Xhh·b<h |5│B* ph!XhUh |h |5│>* h |5│>*jh·b<UmHnHu h |h | h·b<h |fHqй Ъыыы h·b<h |5│B*CJ aJ ph1└⌡ h |5│h |h |5│h |h·b< hщW∙hщW∙hщW∙+h Б (|─юбh╗▓Ь|"ПРТXДЩЩЩПЩИИИИИИИИИИИИзз╓-DMф ЪРРРgd·b<╓gd | -DMф ЪРРРgd·b<2. 538AB@0F8O 8=>AB@0==KE @01>B=8:>2 ?> <5ABC ?@51K20=8O 8 ?> <5ABC 68B5;LAB20. 3. @028;0 >ACI5AB2;5=8O <83@0F8>==>3> CG5B0 8=>AB@0==KE @01>B=8:>2 8 ;8F 157 3@0640=AB20 2 >AA89A:>9 $545@0F88. 4. >@O4>: B@C4>CAB@>9AB20 8=>AB@0==KE 3@0640=. 5. K40G0 @07@5H5=89 =0 >B45;L=K5 284K B@C4>2>9 45OB5;L=>AB8. 6. @028;0 >1O70B5;L=>3> ?5=A8>==>3> AB@0E>20=8O 8=>AB@0==KE @01>B=8:>2. 7. 564C=0@>4=K5 A>3;0H5=8O > B@C4>2KE >B=>H5=8OE A 8=>AB@0==K<8 3@0640=0<8 8 ?>@O4>: @01>BK 2 $ 3@0640= 5;>@CAA88 8 070EAB0=0. 8. !@>:8 ?>AB0=>2:8 =0 <83@0F8>==K9 CG5B 8=>AB@0==>3> @01>B=8:0 2 :><0=48@>2:5 8 A;C651=>9 ?>574:5. >;55 ?>4@>1=0O ?@>3@0<<0 2KAK;05BAO ?> 70?@>AC. =D>@<0F8O > AB>8<>AB8 8 4@C38E 2>?@>A0E ?> B5;5D>=C: (812) 642-98-60 БДСh |h |5│CJ aJ ,1░h╟┌. ╟фA!╟╔"╟R#░n$░n%╟╟д╟д ░дj ≤········666666666vvvvvvvvv666666>666666666666666666666666666╗6666666666╦666666666666hH66666666666666666666666666666666666666666666666666666666666666666╟62юпЮП 0@P`p─░юпЮП2(ьХ 0@P`p─░юпЮП 0@P`p─░юпЮП 0@P`p─░юпЮП 0@P`p─░юпЮП 0@P`p─░юпЮП 0@P`p─░8XЬV~ OJPJQJ_HmHnHsHtHL`ЯЪL  1KG=K9 d╓хCJ_HaJmHsHtH BA РЪ║B  A=>2=>9 H@8DB 0170F0XiСЪЁX 0 1KG=0O B01;8F0 Ж4ж l4жaЖ .k ТЪа. 0 5B A?8A:0 PK!Ич©Ъ [Content_Types].xml╛▒кNц0EВHЭ┐Е-J°╡@%И┌г▌г╒|юх≥$иь╡╖UШВLрTB╗ l,ы3В·;Цr╫╣ц≤°╖J╞РB+$КG]╔ъ7Oы╜V┴│C═┼тWЮ⌡≥щУN╪║IAм!ч²Щ}ЪЪл7╩/щ┴з%BR 7╪ЙЫ┼┤HЛС█┐├wёв9╥Л!╘p<ю▄г╓А█┴Т.╜╬ШнE╪╒BТ╠\а /T*Y≥⌡⌠>,cy·'$├gC."╛ЮVs│В─oдФФ+∙╔╧сьC1▌─МД⌡иO⌠г⌠t}8╓>ЯV3ЧmBb%У┌оDWs'явOВ'⌠'⌠G⌠┐╖wАЗ Э~lh;UM!г╡езе╛А│ХъК▒;йC K^еЭys╚ГПJJдт1╢╨▌ЫKИR┌ан╪▒)┌~.╢з╘у/╛ГЭ ─╘Y\╩щn╣╚9?ю╬√[]┼6э7)qбЩРnp┐▌JсяOF╒$√≈ wР╥;fCLL╚│&ОТЙ┬фв╦┘нm%°]Ц├VЫЛк%z©╘-{ v╞╡ ы8р╗▐ц mо-.ТмОнКxo(┬ы-Йms~ш°╫Ъ|s>╝·о╬%O╩04h=▀ьаш▄Ая┴╖П!e╛╚ф▄\∙f≈╟ :╟╗Ы≤C*иOiI≈╨╡A═┐ 64HpУUa7д ЯUO3 dй:░(А⌠f╧■╥фцA@ыёХ╒>╓ьN"╠зД╩╪═≈ЁЁHнфh≤p&hA38╘╟┘ )S╟МU└U╣R'√V5╙≥&ИHкMж.6┤xpyn,Фч└!аh^^┌вZ4 ~0#Мwё,,& g"БIc╓М·█Qу)к∙C╢ 6ТаР%^+H╚k╤╞!М$A*┼╚ #.▀чКD)кЮi■─шяrdq╠8Y▄Ж^}q~яC>Nчнмp%u╘ГJлx?Е+aсЧ╔еl╙|мzf≤[Ux5bЩ>c╟с!у:√║M С(MkIVЪЫEpКYPр█N╕еб2$ц©╕Ья -┴╞┼а.╛hъыш╢∙Р▒"╒ЖP÷█д6├ПКT{TбКсТ ╪╩сч6▐эФ°]Я█≥аыuл▓╖МV≈hVиnR╝┐╧+╗╤∙Йn▄;╫)╕Дох■bЪоLяШ ╪█XХЬП6Y`╓+╔Аq║B]( ╘ъ0H≤чыОА1$╪с6©┌ЛЙ_[s√┤)k8T╙m Aa?R║ d з▓и╬≈0╚╕{≈eиRF&ё Ййд╙щ'╩└Уt\р{╩┤BHuсMр6`pGСо╫O+╗Х!╖XoN'кВ^[ЪТДc▀▄rШ╟h2ЪГ*ФЦаtW╣Т├<ш{▀├Хс1╚√U+lУ╢Л_Q┘Sn╣╤cмX<©≤)Q°╣С│(│wJHЪ┐Щ▐ ÷ы╞#zCМЯmХ╜>nhf░6░уГЛЮ│t┐╢▀}°Л╒M&мй╨6 ²╢в╡мЗ▄'щ\НgkмNОS:;н\qN-·╔ЁS;╬╤kг╨"{╢Dai≤ lL`л≈╣Б≈/ч© │^┤o#╕╓I&Ь▌%0лп]SPЭV╒!]Щ ЪЪPK! я░÷╤'theme/theme/_rels/themeManager.xml.rels└▐M б0└В┌wooс╨▒&щ┬п╜т└Д5 6?$QЛМ ╝,.┤a╬≥i╩≈²иc2ч1h╙:И∙q аm╦Л▌@RN┴ы;d╟`┌▌o7Мg▒K(M&$R(.1≤r'J⌠°п┼TЫ─╝8ё▐VД"ё╕Aх╩пHВu}═Я⌡|е$╫b{у√P ЪЁЩ8┴g/]ЧQAsы┘(╒флЮ#⌡╙Lй[╨╨дъЪЪPK-!Ич©Ъ [Content_Types].xmlPK-!╔ж╖Гю6 0_rels/.relsPK-!ky√┐┼ theme/theme/themeManager.xmlPK-!╔^}-гвжtheme/theme/theme1.xmlPK-! я░÷╤'я theme/theme/_rels/themeManager.xml.relsPK]л ╕ ЪЪЪЪБД Д П8П@ ЯЪЪЪ───ВП+ППиП( П ПП▒ П ┐ ПP┤©©юВ√Fк8cЪ─ц ©"@O<>C3>;L=8: 1C"Я Ъ@╘цЯ©┌┌дPK!╤┐8▓ЧА[Content_Types].xml■▒ANц0EВHэаР%N╩@%И┌╢K@╗ `dO▀dlyLho▐⌠╤D▒Xз3Ъ©'╩э фALь:╙Д*/╓@рнXЙ*Ы╬ъeRp208бJ ▒Е╕╬╫)ВG▐,R ╦▓}▄ЧQ)ж=▌ю╧СHiр╨0BLгп)З:TК╒╦WзQD┼Y°;d]6ьбГеЖ░╝O&√БИ╢8Ё* чVCL╕j"С┐▓² yJ.;э[оwIC╙_ СД:Ю°{IO╛AЯ !>ц≤4■ ╛pМ╖С©;fи▒3в╤Vcчч.╘▀с╣nЦ╬(ЮТъР&ечp╨╢╚Е┐ЙoЪЪPK!8Щ!Ъж■ _rels/.rels╓░аjц0 ├О┐╫┐я}q цёN/ёпkИ юь┼c[F2ыЗЖ3┐а2zшQ©пВ┴ЬL▀Z▒%R6╟КzP≤ Ы≤┐│ВкЯИ■T⌡╫](ё│ фг┤Щ[ш▒л╠┬j■,ФZк╚жБfLV:*≤шf"N╤╤▒┐.ж]m@=ТЩЁФъ 7LuРЬДP≈[iФ?Л ⌠пT;GIс4Ew▐╙=}Д3╝█b9`5ЮY╬Cф╣kо│╬ОщЩсь√9╨#ш└oД╤~ ╗e?z╫ИrЭЪЪPK!лnё┐цdrs/e2oDoc.xml╛TKnш0щХ Ны├?█;0╦($°"К1EZЬ+I[NW╨-п#ТщЩД Р█:╓■Oс╝┼n╗нПqФЯ█▌▌wJ▓-w╬2zJШ=J╦f╕╗ТzJъ\-^╪╓дпHёЫ■чpO▐gо÷ у6ГSYpGDШ╪╤SZ├`С,С╛Д Э│╠\cP╖ ═КжYА═Ft%ЁA╞7нjЦ К ЦчЦНi╓Ё└/gАBо▒S┼╣┘╢╨╢╝Б м▌ _;╟eе╨2Ю╙PPi╪Т Й░█╚Ч─Rsф≤Q≥╒b<У─щТ{O╨Y√`yЙиЯЖ·&ЪЪ`ыЫЖр▒╙ю╥ёD┐б'j>ОъО?5? шЩ┤ФKsш|ъl~6_⌡o╓Ы╙╜оЯьр^╨нСhфФwб╘Ье╤х.q|sо1ъбpsэО█F┐% c┐иh0Aq╡┤ЦжЫП┼E╒1╔1q ш3зт╩■x⌡6▀JJэ┤\jR#Йhьц╥f─z йb┤^╞)╧F║╡Ю╓7╡*БЯxз╩УЙD:╡кbr8 ▌╩й~K▀w÷┌/ш╪Йр╓▌0<и╝+5▓ур╜∙)n░ngZ zк╒²│≈ЮPxX6S╦юEH┐╫≤н╒╓4НщъЖc>Йё■т(dЛСМ ╖D╬ж╗■цЧp∙÷°Аh2@г=▌╛ GТF²lу─у%3Фyg gт5нэ<ч┼!п ОnМ°⌠пN-ЦСyJC╣[gziY▐h2╨w└ nХa_щъ∙╨0n╕O°▌║ B╬п з├BJ_╥h╣_╩┴oъn╢:П:6р▄zФpшк8┼2iuGЭ║у Z╛/г╚U`⌠tр4oЯЩЦ ≈:=еЩ⌡R▐кСDю%ЭаП╚оЙP╠сы]иxя+Xmр▄Qq·┐` OR н ▓l⌡─╛JЫ©BУЪЪPK-!╤┐8▓ЧА[Content_Types].xmlPK-!8Щ!Ъж■ /_rels/.relsPK-!лnё┐ц.drs/e2oDoc.xmlPK-!{╟Ы╚ч щdrs/downrev.xmlPKСХПППB ПS П ©кЪ ?П>╕dЪЪЪ+С$t>?|░╗>?╗Л>?@_╢╨РЬ╗Е·b<÷XS |щW∙▐Bз╕╗Ъ@─├├├├ ╢╕╦╦ЪЪUnknownЪЪЪЪЪЪЪЪЪЪЪЪG ░лЪ*ЮAxю ЪTimes New Roman5 ░─Symbol3.░л Ъ*ЮCxю ЪArial7.░лЪАЪ╛@ ÷CalibriA ░лЪЮЪ$B÷Cambria Math"1┬ПдhтG тGЧ╗░ Ч╗ !П╔n╢╢││0ёёJ┐ПЭЩHP ПЪ $PЦЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪщW∙2! xx═ эЪЪrobotrobotЧЪЮ┘÷РЫOh╚▒+'Ёы0 px┬≤ ╗╢ т Ю ЛЬЦ robot Normal robot 1 Microsoft Office Word@ж~@~ И⌠Sм@T0g≈SмЧ╗ЧЪуму°.⌠≈+,Ы╝0Э hp▄■°╓ ╛╢╪д л ыЦ SPecialiST RePack ё   мЮГБЮМХЕ ЧЪЪЪ ЧЪЪЪ!"#$%&'ЧЪЪЪ)*+,-./ЧЪЪЪЩЪЪЪ2ЧЪЪЪЧЪЪЪЧЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪRoot EntryЪЪЪЪЪЪЪЪ юFЮ|┐≈Sм4─1TableЪЪЪЪЪЪЪЪL!WordDocumentЪЪЪЪЪЪЪЪ. SummaryInformation(ЪЪЪЪ DocumentSummaryInformation8ЪЪЪЪЪЪЪЪЪЪЪЪ(CompObjЪЪЪЪЪЪЪЪЪЪЪЪrЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЧЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЧЪ ЪЪЪЪ юF дНЙСЛЕМР Microsoft Word 97-2003 MSWordDocWord.Document.8Т9╡q From ann-sofie.landstrom at koskisen.com Wed Jun 27 15:55:38 2012 From: ann-sofie.landstrom at koskisen.com (=?koi8-r?B?IuTNydTSycog8sHEycXXyd4i?=) Date: Wed, 27 Jun 2012 23:55:38 +0100 Subject: =?koi8-r?B?2tfPzsvJINDPIPLP09PJySDExdvF188=?= Message-ID: <01cd54c0$59c2b900$fde4a553@ann-sofie.landstrom> Безлимитный межгород Безлимитка по всей России на все номера Всего за 3000 рублей Звоните сегодня - (495) 225-04-62 From brian.gibbon at startentertainments.com Wed Jun 27 08:17:15 2012 From: brian.gibbon at startentertainments.com (=?koi8-r?B?IvfJ1MHMycog8M/EzMXTztnIIg==?=) Date: Thu, 28 Jun 2012 00:17:15 +0900 Subject: =?koi8-r?B?xMXbxdfB0SDNxdbE1cfP0s/EzsHRINPX0drYIQ==?= Message-ID: <01cd54c3$5ed53780$7086d7ca@brian.gibbon> Безлимитный межгород Безлимитка по всей России на все номера Всего за 3000 рублей Звоните сегодня - (495) 225 04..62 From winxot39 at simbolo.com Thu Jun 28 01:26:12 2012 From: winxot39 at simbolo.com (=?koi8-r?B?IuLSxc7Ez9fZxSDUz9fB0tki?=) Date: Thu, 28 Jun 2012 00:26:12 -0800 Subject: =?koi8-r?B?4tLFzsTP19nFINTP18HS2SDP1CDQ0s/J2tfPxMnUxczFyiDP0NTPzSDJ?= =?koi8-r?B?INcg0s/azsnD1Q==?= Message-ID: www.бренды-оптом.рф Каталог брендовых товаров, цены ниже рыночных. Одежда и обувь, мужская, женская, детская, сумки, очки Приглашаем к сотрудничеству компании, ИЧП, физических лиц. Розничные заказы через наших представителей во всех регионах России. Вот неполный список предлагаемых брендов Abercrombie & Fitch, Adidas, Alexander McQueen , Andrew&Angel, Armani, Herve Leger, Burberry, BVLGARI , Calvin Klein , Carrera, Cavalli , Chanel, Chloe, Christian Audigier , Christian Louboutin , Coach , Columbia , D&G , Denis Simachev , Diesel , Disney , DKNY , Doraemon , Dsquared2 , Ed Hardy , Fendi , Frankie Morello , Fred Perry , Galliano, GAP , Gianmarco Lorenzi, Giuseppe Zanotti , Gucci, GUESS , Hello Kitty , Hermes, Iceberg, Jimmy Choo , Juicy Couture , KAREN MILLEN, Kurosawa, Lee, Levi's, Louis Vuitton, Manolo Blahnik, Miu Miu, Moncler, Mont Blanc, Moschino, Nike, Paul Smith , Peak Performance, Polo, Prada, Puma, RUKKA, The North Face, Tod's , Tommy Hilfiger, UGG , Yves Saint Laurent, Zara. Ответим на вопросы по телефону (495) 989-68-11 или info at china-trad.ru , скайпу: china2russia Пожалуйста не отвечайте на это письмо кнопкой "Ответить", т.к оно было выслано не с нашего ящика From overjoy91 at stoutknives.com Thu Jun 28 03:28:33 2012 From: overjoy91 at stoutknives.com (=?koi8-r?B?IvfJxMXPIMkgxs/UzyDV08zVx8kg1yDtz9PL18Ui?=) Date: Thu, 28 Jun 2012 02:28:33 -0800 Subject: =?koi8-r?B?89/FzcvBINfJxMXP0s/MycvP1y4g5s/Uzy4gIPLB08vS1dTLwSDSz8zJ?= =?koi8-r?B?y8/XIM7BIPT3IMkgyc7UxdLOxdTFLg==?= Message-ID: <000d01cd5510$632be070$6400a8c0@overjoy91> Съемка очень качественных минифильмов и видеороликов. Съемка видеороликов: рекламных, музыкальных, презентационных. Репортажное видео. Все виды монтажа и постпродакшна. Раскрутка роликов на ТВ и интернете. Написание сценариев. Подбор актеров. Обработка видео, цифровая обработка видео, компьютерная графика. Фото услуги: - модельное, актерское портфолио - портретная съемка - репортажная и свадебная съемка г. Москва, ул. Дми трия Уль янова, 42 +7 (916) 2 2 5 43 02 From bowdlerizesat at wordsasweapons.com Wed Jun 27 14:32:06 2012 From: bowdlerizesat at wordsasweapons.com (=?koi8-r?B?Iub6IDEwOSwgyc7P09TSwc7O2cUgx9LB1sTBzsUi?=) Date: Thu, 28 Jun 2012 03:02:06 +0530 Subject: =?koi8-r?B?5vogMTA5?= Message-ID: <01cd54da$66540b00$5a21c975@bowdlerizesat> предложение для отдела кадров -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 273 bytes Desc: not available URL: -------------- next part -------------- поЮ║╠А>ЧЪ 13ЧЪЪЪ0ЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЛ╔аyюП©Дbjbj╫╫. ъ{ъ{╕ЪЪЪЪЪЪ╥··ЪЪЪЪ++++? +, 0KKKKKААА÷ ║ ║ ║ ║ ║ ║ $\ ╡!>е !А©"АААе KKtФ _ _ _ А"KK÷ _ А÷ _ _ _ KЪЪЪЪ@ёЩ┌≈SмЪЪЪЪ _ ▀ Э 0, _ L! FL!_ L!_ ,АА_ АААААе е _ ААА, ААААЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪL!ААААААААА·? щ:AQ 1>;55 ?>?C;O@=K< 2 =0H8 4=8 AB0=>28BAO ?@82;5G5=85 @01>B>40B5;5< : A>B@C4=8G5AB2C 8=>AB@0==KE 3@0640=.  MB><, 157CA;>2=>, 5ABL <=>3> ?;NA>2, => 8 =5 <5=LH5 ?>42>4=KE :0<=59. 0 ?@82;5G5=85 8=>AB@0==KE 3@0640= 157 =5>1E>48<KE @07@5H5=89 CAB0=>2;5= HB@0D 2 @07<5@5 >B 250 4> 800 BKA. @C1;59 70 :064>3> 8=>AB@0==>3> 3@0640=8=0, ;81> 04<8=8AB@0B82=>5 ?@8>AB0=>2;5=85 45OB5;L=>AB8 =0 A@>: 4> 452O=>AB0 ACB>: (AB. 18.15, 18.16 > $). #7=09B5 ?>4@>1=K9 ?>@O4>: ?@8Q<0 =0 @01>BC 8 ?@028;0 B@C4>2KE 2708<>>B=>H5=89 @01>B>40B5;O A 8=>AB@0==K<8 @01>B=8:0<8 =0 0:BC0;L=>9 8 206=>9 :>=D5@5=F88 4;O @C:>2>48B5;59 8 :04@>2KE A;C61: "@C4>CAB@>9AB2> 8=>AB@0==KE 3@0640= 2 @0<:0E 109-$ ╚  <83@0F8>==>< CG5B5 8=>AB@0==KE 3@0640= 8 ;8F 157 3@0640=AB20 2 $╩. >A;54=85 87<5=5=8O 2 70:>=>40B5;LAB25. >=D5@5=F8O ?@>945B 11 8N;O 2 5B5@1C@35.  @>3@0<<0 :>=D5@5=F88 (:@0B:>): 1. @5<5==>5 ?@51K20=85, 2@5<5==>5/?>AB>O==>5 ?@>6820=85 8=>AB@0==KE @01>B=8:>2. f Б f h ┌ ≤ ч Ю Б (NPz|~─╬бфлнД  fh╤Жz|x╨НПРТюдБЭУЭУЯМЕЮЕЭою╧Е╧╚╓ ╓М╧М╧М╧М╧≤╧М╧М╧М╧М╧МЯМЕ▀z h·b<h |5│B* CJ aJ ph!Xhh·b<h |5│B* ph!XhUh |h |5│>* h |5│>*jh·b<UmHnHu h |h | h·b<h |fHqй Ъыыы h·b<h |5│B*CJ aJ ph1└⌡ h |5│h |h |5│h |h·b< hщW∙hщW∙hщW∙+h Б (|─юбh╗▓Ь|"ПРТXДЩЩЩПЩИИИИИИИИИИИИзз╓-DMф ЪРРРgd·b<╓gd | -DMф ЪРРРgd·b<2. 538AB@0F8O 8=>AB@0==KE @01>B=8:>2 ?> <5ABC ?@51K20=8O 8 ?> <5ABC 68B5;LAB20. 3. @028;0 >ACI5AB2;5=8O <83@0F8>==>3> CG5B0 8=>AB@0==KE @01>B=8:>2 8 ;8F 157 3@0640=AB20 2 >AA89A:>9 $545@0F88. 4. >@O4>: B@C4>CAB@>9AB20 8=>AB@0==KE 3@0640=. 5. K40G0 @07@5H5=89 =0 >B45;L=K5 284K B@C4>2>9 45OB5;L=>AB8. 6. @028;0 >1O70B5;L=>3> ?5=A8>==>3> AB@0E>20=8O 8=>AB@0==KE @01>B=8:>2. 7. 564C=0@>4=K5 A>3;0H5=8O > B@C4>2KE >B=>H5=8OE A 8=>AB@0==K<8 3@0640=0<8 8 ?>@O4>: @01>BK 2 $ 3@0640= 5;>@CAA88 8 070EAB0=0. 8. !@>:8 ?>AB0=>2:8 =0 <83@0F8>==K9 CG5B 8=>AB@0==>3> @01>B=8:0 2 :><0=48@>2:5 8 A;C651=>9 ?>574:5. >;55 ?>4@>1=0O ?@>3@0<<0 2KAK;05BAO ?> 70?@>AC. =D>@<0F8O > AB>8<>AB8 8 4@C38E 2>?@>A0E ?> B5;5D>=C: (812) 642-98-60 БДСh |h |5│CJ aJ ,1░h╟┌. ╟фA!╟╔"╟R#░n$░n%╟╟д╟д ░дj ≤········666666666vvvvvvvvv666666>666666666666666666666666666╗6666666666╦666666666666hH66666666666666666666666666666666666666666666666666666666666666666╟62юпЮП 0@P`p─░юпЮП2(ьХ 0@P`p─░юпЮП 0@P`p─░юпЮП 0@P`p─░юпЮП 0@P`p─░юпЮП 0@P`p─░юпЮП 0@P`p─░8XЬV~ OJPJQJ_HmHnHsHtHL`ЯЪL  1KG=K9 d╓хCJ_HaJmHsHtH BA РЪ║B  A=>2=>9 H@8DB 0170F0XiСЪЁX 0 1KG=0O B01;8F0 Ж4ж l4жaЖ .k ТЪа. 0 5B A?8A:0 PK!Ич©Ъ [Content_Types].xml╛▒кNц0EВHЭ┐Е-J°╡@%И┌г▌г╒|юх≥$иь╡╖UШВLрTB╗ l,ы3В·;Цr╫╣ц≤°╖J╞РB+$КG]╔ъ7Oы╜V┴│C═┼тWЮ⌡≥щУN╪║IAм!ч²Щ}ЪЪл7╩/щ┴з%BR 7╪ЙЫ┼┤HЛС█┐├wёв9╥Л!╘p<ю▄г╓А█┴Т.╜╬ШнE╪╒BТ╠\а /T*Y≥⌡⌠>,cy·'$├gC."╛ЮVs│В─oдФФ+∙╔╧сьC1▌─МД⌡иO⌠г⌠t}8╓>ЯV3ЧmBb%У┌оDWs'явOВ'⌠'⌠G⌠┐╖wАЗ Э~lh;UM!г╡езе╛А│ХъК▒;йC K^еЭys╚ГПJJдт1╢╨▌ЫKИR┌ан╪▒)┌~.╢з╘у/╛ГЭ ─╘Y\╩щn╣╚9?ю╬√[]┼6э7)qбЩРnp┐▌JсяOF╒$√≈ wР╥;fCLL╚│&ОТЙ┬фв╦┘нm%°]Ц├VЫЛк%z©╘-{ v╞╡ ы8р╗▐ц mо-.ТмОнКxo(┬ы-Йms~ш°╫Ъ|s>╝·о╬%O╩04h=▀ьаш▄Ая┴╖П!e╛╚ф▄\∙f≈╟ :╟╗Ы≤C*иOiI≈╨╡A═┐ 64HpУUa7д ЯUO3 dй:░(А⌠f╧■╥фцA@ыёХ╒>╓ьN"╠зД╩╪═≈ЁЁHнфh≤p&hA38╘╟┘ )S╟МU└U╣R'√V5╙≥&ИHкMж.6┤xpyn,Фч└!аh^^┌вZ4 ~0#Мwё,,& g"БIc╓М·█Qу)к∙C╢ 6ТаР%^+H╚k╤╞!М$A*┼╚ #.▀чКD)кЮi■─шяrdq╠8Y▄Ж^}q~яC>Nчнмp%u╘ГJлx?Е+aсЧ╔еl╙|мzf≤[Ux5bЩ>c╟с!у:√║M С(MkIVЪЫEpКYPр█N╕еб2$ц©╕Ья -┴╞┼а.╛hъыш╢∙Р▒"╒ЖP÷█д6├ПКT{TбКсТ ╪╩сч6▐эФ°]Я█≥аыuл▓╖МV≈hVиnR╝┐╧+╗╤∙Йn▄;╫)╕Дох■bЪоLяШ ╪█XХЬП6Y`╓+╔Аq║B]( ╘ъ0H≤чыОА1$╪с6©┌ЛЙ_[s√┤)k8T╙m Aa?R║ d з▓и╬≈0╚╕{≈eиRF&ё Ййд╙щ'╩└Уt\р{╩┤BHuсMр6`pGСо╫O+╗Х!╖XoN'кВ^[ЪТДc▀▄rШ╟h2ЪГ*ФЦаtW╣Т├<ш{▀├Хс1╚√U+lУ╢Л_Q┘Sn╣╤cмX<©≤)Q°╣С│(│wJHЪ┐Щ▐ ÷ы╞#zCМЯmХ╜>nhf░6░уГЛЮ│t┐╢▀}°Л╒M&мй╨6 ²╢в╡мЗ▄'щ\НgkмNОS:;н\qN-·╔ЁS;╬╤kг╨"{╢Dai≤ lL`л≈╣Б≈/ч© │^┤o#╕╓I&Ь▌%0лп]SPЭV╒!]Щ ЪЪPK! я░÷╤'theme/theme/_rels/themeManager.xml.rels└▐M б0└В┌wooс╨▒&щ┬п╜т└Д5 6?$QЛМ ╝,.┤a╬≥i╩≈²иc2ч1h╙:И∙q аm╦Л▌@RN┴ы;d╟`┌▌o7Мg▒K(M&$R(.1≤r'J⌠°п┼TЫ─╝8ё▐VД"ё╕Aх╩пHВu}═Я⌡|е$╫b{у√P ЪЁЩ8┴g/]ЧQAsы┘(╒флЮ#⌡╙Lй[╨╨дъЪЪPK-!Ич©Ъ [Content_Types].xmlPK-!╔ж╖Гю6 0_rels/.relsPK-!ky√┐┼ theme/theme/themeManager.xmlPK-!╔^}-гвжtheme/theme/theme1.xmlPK-! я░÷╤'я theme/theme/_rels/themeManager.xml.relsPK]л ╕ ЪЪЪЪБД Д П8П@ ЯЪЪЪ───ВП+ППиП( П ПП▒ П ┐ ПP┤©©юВ√Fк8cЪ─ц ©"@O<>C3>;L=8: 1C"Я Ъ@╘цЯ©┌┌дPK!╤┐8▓ЧА[Content_Types].xml■▒ANц0EВHэаР%N╩@%И┌╢K@╗ `dO▀dlyLho▐⌠╤D▒Xз3Ъ©'╩э фALь:╙Д*/╓@рнXЙ*Ы╬ъeRp208бJ ▒Е╕╬╫)ВG▐,R ╦▓}▄ЧQ)ж=▌ю╧СHiр╨0BLгп)З:TК╒╦WзQD┼Y°;d]6ьбГеЖ░╝O&√БИ╢8Ё* чVCL╕j"С┐▓² yJ.;э[оwIC╙_ СД:Ю°{IO╛AЯ !>ц≤4■ ╛pМ╖С©;fи▒3в╤Vcчч.╘▀с╣nЦ╬(ЮТъР&ечp╨╢╚Е┐ЙoЪЪPK!8Щ!Ъж■ _rels/.rels╓░аjц0 ├О┐╫┐я}q цёN/ёпkИ юь┼c[F2ыЗЖ3┐а2zшQ©пВ┴ЬL▀Z▒%R6╟КzP≤ Ы≤┐│ВкЯИ■T⌡╫](ё│ фг┤Щ[ш▒л╠┬j■,ФZк╚жБfLV:*≤шf"N╤╤▒┐.ж]m@=ТЩЁФъ 7LuРЬДP≈[iФ?Л ⌠пT;GIс4Ew▐╙=}Д3╝█b9`5ЮY╬Cф╣kо│╬ОщЩсь√9╨#ш└oД╤~ ╗e?z╫ИrЭЪЪPK!лnё┐цdrs/e2oDoc.xml╛TKnш0щХ Ны├?█;0╦($°"К1EZЬ+I[NW╨-п#ТщЩД Р█:╓■Oс╝┼n╗нПqФЯ█▌▌wJ▓-w╬2zJШ=J╦f╕╗ТzJъ\-^╪╓дпHёЫ■чpO▐gо÷ у6ГSYpGDШ╪╤SZ├`С,С╛Д Э│╠\cP╖ ═КжYА═Ft%ЁA╞7нjЦ К ЦчЦНi╓Ё└/gАBо▒S┼╣┘╢╨╢╝Б м▌ _;╟eе╨2Ю╙PPi╪Т Й░█╚Ч─Rsф≤Q≥╒b<У─щТ{O╨Y√`yЙиЯЖ·&ЪЪ`ыЫЖр▒╙ю╥ёD┐б'j>ОъО?5? шЩ┤ФKsш|ъl~6_⌡o╓Ы╙╜оЯьр^╨нСhфФwб╘Ье╤х.q|sо1ъбpsэО█F┐% c┐иh0Aq╡┤ЦжЫП┼E╒1╔1q ш3зт╩■x⌡6▀JJэ┤\jR#Йhьц╥f─z йb┤^╞)╧F║╡Ю╓7╡*БЯxз╩УЙD:╡кbr8 ▌╩й~K▀w÷┌/ш╪Йр╓▌0<и╝+5▓ур╜∙)n░ngZ zк╒²│≈ЮPxX6S╦юEH┐╫≤н╒╓4НщъЖc>Йё■т(dЛСМ ╖D╬ж╗■цЧp∙÷°Аh2@г=▌╛ GТF²lу─у%3Фyg gт5нэ<ч┼!п ОnМ°⌠пN-ЦСyJC╣[gziY▐h2╨w└ nХa_щъ∙╨0n╕O°▌║ B╬п з├BJ_╥h╣_╩┴oъn╢:П:6р▄zФpшк8┼2iuGЭ║у Z╛/г╚U`⌠tр4oЯЩЦ ≈:=еЩ⌡R▐кСDю%ЭаП╚оЙP╠сы]иxя+Xmр▄Qq·┐` OR н ▓l⌡─╛JЫ©BУЪЪPK-!╤┐8▓ЧА[Content_Types].xmlPK-!8Щ!Ъж■ /_rels/.relsPK-!лnё┐ц.drs/e2oDoc.xmlPK-!{╟Ы╚ч щdrs/downrev.xmlPKСХПППB ПS П ©кЪ ?П>╕dЪЪЪ+С$t>?|░╗>?╗Л>?@_╢╨РЬ╗Е·b<÷XS |щW∙▐Bз╕╗Ъ@─├├├├ ╢╕╦╦ЪЪUnknownЪЪЪЪЪЪЪЪЪЪЪЪG ░лЪ*ЮAxю ЪTimes New Roman5 ░─Symbol3.░л Ъ*ЮCxю ЪArial7.░лЪАЪ╛@ ÷CalibriA ░лЪЮЪ$B÷Cambria Math"1┬ПдhтG тGЧ╗░ Ч╗ !П╔n╢╢││0ёёJ┐ПЭЩHP ПЪ $PЦЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪщW∙2! xx═ эЪЪrobotrobotЧЪЮ┘÷РЫOh╚▒+'Ёы0 px┬≤ ╗╢ т Ю ЛЬЦ robot Normal robot 1 Microsoft Office Word@ж~@~ И⌠Sм@T0g≈SмЧ╗ЧЪуму°.⌠≈+,Ы╝0Э hp▄■°╓ ╛╢╪д л ыЦ SPecialiST RePack ё   мЮГБЮМХЕ ЧЪЪЪ ЧЪЪЪ!"#$%&'ЧЪЪЪ)*+,-./ЧЪЪЪЩЪЪЪ2ЧЪЪЪЧЪЪЪЧЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪRoot EntryЪЪЪЪЪЪЪЪ юFЮ|┐≈Sм4─1TableЪЪЪЪЪЪЪЪL!WordDocumentЪЪЪЪЪЪЪЪ. SummaryInformation(ЪЪЪЪ DocumentSummaryInformation8ЪЪЪЪЪЪЪЪЪЪЪЪ(CompObjЪЪЪЪЪЪЪЪЪЪЪЪrЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЧЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЪЧЪ ЪЪЪЪ юF дНЙСЛЕМР Microsoft Word 97-2003 MSWordDocWord.Document.8Т9╡q From grarpamp at gmail.com Thu Jun 28 00:46:14 2012 From: grarpamp at gmail.com (grarpamp) Date: Thu, 28 Jun 2012 03:46:14 -0400 Subject: [tor-talk] possible to identify tor user via hardware DRM? Message-ID: >> can these chips be used to spying and identifying people The summary is probably... Only those with access to the chip masks, or an equally serious amount of reverse engineering gear, knows what goes into a chipset. Therefore anything is possible. And if you're not proxying the output of suspected spy systems through your own masks to validate them, well... you could very well be screwed :) The rest is documented stuff you can read in any spec sheet. Part of that material is indeed new firmware capabilities and ways to lock it down, or not. Don't run windows or closed source stuff if you're concerned about what it might phone home about. UUID's, serials, MAC's, your data, etc. If the platform + OS can't be trusted, neither can any app running on it, including Tor. Act accordingly. Nothing here related to Tor.... your questions should go to the author of that post or comp.risks. _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From fitfully90 at hse.com Thu Jun 28 01:51:03 2012 From: fitfully90 at hse.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Thu, 28 Jun 2012 04:51:03 -0400 Subject: =?koi8-r?B?+sHdydTJINPXz8Ag08XN2MAgz9Qg0M/WwdLBIQ==?= Message-ID: <6D50F74F6D684F68870B7434A0381EC5@home36928228de> За 2011 год по данным МЧС пожары принесли Материального ущерба на 17 280 086 000 млрд. рублей, защити свое заработанное имущества! www.защити-себя.рф From sacramentsg4 at drunkenbastards.com Wed Jun 27 22:37:52 2012 From: sacramentsg4 at drunkenbastards.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Thu, 28 Jun 2012 10:37:52 +0500 Subject: =?koi8-r?B?4sXaz9DB087P09TYINPFzdjJIQ==?= Message-ID: За 2011 год по данным МЧС пожары принесли Материального ущерба на 17 280 086 000 млрд. рублей, защити свое заработанное имущества! www.защити-себя.рф From czarinasn50 at kenty.com Wed Jun 27 22:15:03 2012 From: czarinasn50 at kenty.com (=?koi8-r?B?IuT85u8i?=) Date: Thu, 28 Jun 2012 10:45:03 +0530 Subject: =?koi8-r?B?78bJ087B0SDNxcLFzNgg088g2s7B3snUxczYzs/KINPLycTLz8ouIPDS?= =?koi8-r?B?z8na18/EydTFzNggxMXMwcXUINLB09DSz8TB1tU=?= Message-ID: <5A4DC11C01664941A31B85335D3F2500@orbitcca09b98a> 30% - такую скидку на мебель вы получите, если воспользуетесь персональным сертификатом от крупнейшей мебельной компании "ДЭФО" Шкафы, столы, стулья, кабинеты руководителя, стеллажи, кресла, диваны – мы предлагаем со скидкой все, что нужно для обустройства офиса, ресторана, классов для обучения и тренингов, классических офисов и опенспейсов. Ваш персональный номер сертификата на скидку: BA328 827637D Телефон отдела продаж: +7(495)-640-41-90, доб. 105, 116. Сайт с каталогом продукции: www.мебель-дэфо.рф Условия использование сертификата: Предложение от производителя действительно в период с 01 июня2012г.по 01 сентября 2012г. Порядок использования подарочных сертификатов: Скидки, предоставляемые по ПС, не распространяются на изделия , продаваемые по специальным ценам, а также на изделия учавствующие в специальных акциях. Мебельная компания ДЭФО From interim3 at wavesick.com Wed Jun 27 23:25:23 2012 From: interim3 at wavesick.com (=?koi8-r?B?IvDSz8TBxdTT0SDr7/T05eT2Ig==?=) Date: Thu, 28 Jun 2012 11:55:23 +0530 Subject: =?koi8-r?B?8NLPxMHF1NPRICDu7/f56iDr7/T05eT2?= Message-ID: <8A3BB3DFB04144F8975D54818DDE05C2@akash> Продается НОВЫЙ КОТТЕДЖ Коттедж, 200 м2 Участок: 12 сот. Киевское шоссе, Боровск Газ, вода, Электрика, Канализация, все заведено в дом и функционирует Под чистовую отделку ТРЕБУЕТСЯ ТОЛЬКО ФИНИШНАЯ ОТДЕЛКА. немецкие технологии 6,7 млн. руб www.продам-дом-тут.рф From proper at secure-mail.biz Thu Jun 28 03:15:47 2012 From: proper at secure-mail.biz (proper at secure-mail.biz) Date: Thu, 28 Jun 2012 12:15:47 +0200 Subject: [tor-talk] possible to identify tor user via hardware DRM? Message-ID: wrote: > One of the defenses people have talked about against hardware > fingerprinting is running inside a virtual machine. Normally, > software inside the virtual machine, even if it's malicious, > doesn't learn much about the physical machine that hosts the VM. > If you always use Tor inside a VM, then even if there's a bug > that lets someone take over your computer (or if they trick you > into installing spyware), the malicious software won't be able > to read much real uniqueness from the host hardware, unless > there's also a bug in the VM software. > > [...] There's probably more research to be done > about the conditions under which VMs can be uniquely identified > both "from the inside" by malware, and remotely by remote > software fingerprinting, absent VM bugs that give unintended > access to the host. We documented, which data, malware inside a VM could collect to identify users. [1] That doesn't mean, we wouldn't be happy about sophisticated, dedicated research. However, here is a summary: - (Apart from obvious and known, IP, DNS, (browser) fingerprinting.) - internal LAN IP (of virtualized operating system) - time zone (of virtualized operating system) - username (of virtualized operating system) - hostname (of virtualized operating system) - mac address of virtual machine - mac address of host (if using bridged networking) or mac address of gateway (if using virtual internal networking) - virtual disk uuids - Some information about the real CPU, depends on VM software. There might be options to further hide information about the CPU. - Installed software packages. - If you copy data into the VM: metadata. [1] https://trac.torproject.org/projects/tor/wiki/doc/TorBOX/SecurityAndHardening#TorBOXsProtocol-Leak-ProtectionandFingerprinting-Protection ______________________________________________________ powered by Secure-Mail.biz - anonymous and secure e-mail accounts. _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From vagueinglv0 at gowdeyreed.com Thu Jun 28 00:28:26 2012 From: vagueinglv0 at gowdeyreed.com (=?koi8-r?B?IuvPzsTJw8nPzsXS2SDJIMzAwtnFINfJxNkg19nTz9TO2cgg0sHCz9Qi?=) Date: Thu, 28 Jun 2012 12:28:26 +0500 Subject: =?koi8-r?B?68/OxMnDyc/OxdLZIMzAwtnIIM3B0s/LINDPIM/Q1M/Xz8ogw8XOxSEg?= =?koi8-r?B?7c/O1MHWLiDv3sXO2CDOydrLycUgw8XO2S4=?= Message-ID: <000d01cd54ff$9b4582b0$6400a8c0@vagueinglv0> Кондиционеры и сплит системы в розницу по оптовым ценам! Hitachi, LG, General Climate, Mitsubishi, Ballu, Samsung, Toshiba, Fujitsu, Panasonic, DAIKIN. На Монтирование-Демонтирование. Сверхнизкие цены! А также любые виды высотных работ: герметизация межпанельных швов; герметизация балконов,лоджий,окон Зачем переплачивать когда можно экономить! Подробности по т.(495) 9 9 5 - 2 7 - 2 4 или 7 2 3 - 3 6 - 0 3 From cognaccpm9 at atlanticbkk.com Thu Jun 28 01:01:34 2012 From: cognaccpm9 at atlanticbkk.com (=?koi8-r?B?IvzMydTO2cUgy9fB0tTJ0tkg1yDowc3P187Jy8HIIg==?=) Date: Thu, 28 Jun 2012 13:31:34 +0530 Subject: =?koi8-r?B?8NLPxMHA1NPRIMvXwdLUydLZINcg6MHNz9fOycvByCA=?= Message-ID: <416656C90469453DB67C0CB4F148F6C3@police> Продаются элитные квартиры в Хамовниках в близи Новодевичьего монастыря www.дом-хамовники.рф From eugen at leitl.org Thu Jun 28 04:47:42 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 28 Jun 2012 13:47:42 +0200 Subject: [tor-talk] possible to identify tor user via hardware DRM? Message-ID: <20120628114742.GX7109@leitl.org> ----- Forwarded message from Seth David Schoen ----- From eugen at leitl.org Thu Jun 28 05:14:44 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 28 Jun 2012 14:14:44 +0200 Subject: [tor-talk] possible to identify tor user via hardware DRM? Message-ID: <20120628121444.GD7109@leitl.org> ----- Forwarded message from grarpamp ----- From eugen at leitl.org Thu Jun 28 05:20:03 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 28 Jun 2012 14:20:03 +0200 Subject: [tor-talk] possible to identify tor user via hardware DRM? Message-ID: <20120628122002.GI7109@leitl.org> ----- Forwarded message from proper at secure-mail.biz ----- From likenesscm7 at centrefrance.com Thu Jun 28 04:09:01 2012 From: likenesscm7 at centrefrance.com (=?koi8-r?B?Iu3P08vXwSI=?=) Date: Thu, 28 Jun 2012 16:39:01 +0530 Subject: =?koi8-r?B?+sHdydTBINDF0tPPzsHM2M7ZyCDEwc7O2cgg1yDTz8/U18XU09TXycUg?= =?koi8-r?B?0M8gMTUyLeb6LiDrwd7F09TXxc7OzyDJIM/QxdLB1MnXzs8u?= Message-ID: <000d01cd551e$6c64af10$6400a8c0@likenesscm7> Приведение в соответствие по 152-ФЗ. Качественно и оперативно. Защита персональных данных, выполненная в соответствии с требованиями законодательства (152 ФЗ), организация технических мер. Организационные и технические мероприятия: ∙ Уведомление уполномоченного органа по защите прав субъектов персональных данных о своем намерении осуществлять обработку персональных данных. ∙ Разработка документов, регламентирующих обработку персональных данных в организации (положение по обработке персональных данных, регламенты, положения по защите персональных данных). ∙ Создание системы защиты персональных данных, в т.ч. выполнение требований по инженерно-технической защите помещений. ∙ Аттестация или декларирование соответствия Мы предлагаем провести аудит систем обработки персональных данных, разработать необходимый комплект документов и рекомендации, которые позволят обеспечить безопасность персональных данных в соответствии с требованиями регуляторов. Основным результатом аудита является план мероприятий, проведение которых необходимо для обеспечения соответствия требованиям закона О персональных данных. Мы разработали предложения по защите персональных данных для разных категорий операторов персональных данных. г. Москва, Нахимовский проспект, 47 Тел.: + 7 (915) 330 7661 From halloweenyul15 at sowafinancial.com Thu Jun 28 06:17:43 2012 From: halloweenyul15 at sowafinancial.com (=?koi8-r?B?IuHOzsEi?=) Date: Thu, 28 Jun 2012 16:47:43 +0330 Subject: =?koi8-r?B?8NLPxMHF1NPRINXewdPUz8sgzsEg0i4g78vBINDPxCDT1NLPydTFzNjT?= =?koi8-r?B?1NfPINrBx8/Sz8TOz8fPIMTPzcE=?= Message-ID: <000d01cd5530$66d727a0$6400a8c0@halloweenyul15> Участок берегу реки Ока, песчаный пляж, Сосновый бор, охраняемая территория. Развитая инфраструктура и готовые коммуникации. 8-906-616-92-67 Анна From measl at mfn.org Thu Jun 28 14:53:14 2012 From: measl at mfn.org (J.A. Terranson) Date: Thu, 28 Jun 2012 16:53:14 -0500 (CDT) Subject: [OT-whats not these days?] 29 June calls o/b/o Citizens United C/A Message-ID: ---------- Forwarded message ---------- Date: Thu, 28 Jun 2012 15:40:37 -0400 (EDT) From: Move to Amend Subject: Dial it up National Call-in Day for Move To Amend on June 29 The Senate Judiciary Committee, Subcommittee on the Constitution, Civil Rights and Human Rights, chaired by Sen. Dick Durbin (D-IL), will be holding hearings on July 17, 2012, to examine the three proposed constitutional amendments currently introduced in the Senate, which address "Citizens United v. FEC". Invitations will be issued to the senators who have introduced amendments and to a panel of advocates/experts, who will testify to: * The impact of Citizen's United v. FEC * The rise of SUPER PACs * The impact of unlimited corporate spending on individual candidates Move To Amend (MTA) has not been invited to participate yet. We have been in touch with Senator Durbin, who has complete discretion over who to invite, and MTA members in the eleven states of the individual committee members have already been in contact with their senators in pursuit of an invitation. We are now calling on all of our members to contact Senator Durbin -- please make a quick call tomorrow: (202) 224-2152. Click here for call in details and a script: [ http://movetoamend.org/toolkit/national-call-day-senator-dick-durbin-june-29 ] Question: Why should we care about being invited to this hearing, despite the fact that our amendment has no Senate sponsor yet? Answer: We don't expect that the Senate will actually pass an amendment any time soon, but it is important that our viewpoint be heard inside the beltway. Our movement is growing, our demands are clear. When and if Congress begins to move, it is imperative they know what the real solution is and that there is a broad movement supporting it. We must make clear to them that the issue goes beyond Citizens United. The amendment must address corporate personhood and money as speech -- nothing short of that will do. Tomorrow, June 29, is National Call-in Day for MTA! Please call Senator Durbin's office and express your desire that Move To Amend be invited to the July 17 hearing. Find a short script, talking points, and the phone number here: [ http://movetoamend.org/toolkit/national-call-day-senator-dick-durbin-june-29 ] We're hoping to raise a polite and non-violent ruckus by generating thousands of calls, and we're counting on you to raise your voice tomorrow. It will take no more than five minutes of your time, so please add this event to your schedule: [ http://movetoamend.org/toolkit/national-call-day-senator-dick-durbin-june-29 ] MOVE TO AMEND: The National Campaign to End Corporate Personhood and Demand Real Democracy! http://MoveToAmend.org | PO Box 610, Eureka CA 95502 | (707) 269-0984 We, the People of the United States of America, reject the U.S. Supreme Court's Citizens United ruling, and move to amend our Constitution to firmly establish that money is not speech, and that human beings, not corporations, are persons entitled to constitutional rights. From updates at linkedin.com Thu Jun 28 09:32:48 2012 From: updates at linkedin.com (Facebook) Date: Thu, 28 Jun 2012 17:32:48 +0100 Subject: New comment on Facebook Message-ID: <1CF23F5F.F9D34907@linkedin.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 872 bytes Desc: not available URL: From freebirds at hushmail.com Thu Jun 28 16:15:32 2012 From: freebirds at hushmail.com (freebirds at hushmail.com) Date: Thu, 28 Jun 2012 19:15:32 -0400 Subject: [Freedombox-discuss] open source hardware exists Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Nick Daly, thanks for your empathy. But my abuser's hackers are accessing AMT and DASH. Because reflashing the BIOS did NOT erase the firmware rootkit and because firmware rootkits also infected my graphic card, I purchased a brand new netbook. I didn't copy files to the internal hard drive. I used a live Fedora DVD. Jack's hackers hacked my AMD DASH. Nick Daly, its not that I shouldn't or can't avoid unavoidable hardware. Its that the hackers can and do use the hardware's backdoors. FreeScale, MIPS, Texas Instruments are not on Intel's adapter list. http://www.intel.com/design/servers/ipmi/adopterlist.htm BeagleBoard and PandaBoard use Texas Instrument's processor. Olimex board, Genesi linux netbook and Hercules linux netbook use FreeScale's processor. The Ben NanoNote micro netbok uses MIPS processor. What I have not been able to find out yet is whether they have ARM's TrustZone and how to hide the PSN. Both Olimex and Beagleboard forums replied that their processor has a PSN. Several days ago, I cited a link to Qi hardware, which is open source hardware. http://en.qi-hardware.com. They manufacture for Ben NanoNote. I am considering purchasing a Ben NanoNote even I cannot follow the complex tutorial on flashing Debian onto a SDcard. Yes, I can download and burn an ISO. But flashing to a SDcard is complex. I am not suggesting to give up on Marvell. I disagree with Ben's post that a nondisclosure agreement means not answering my questions. If the Freedombox Foundation forum signs a nondisclosure agreement with Marvell the Freedombox Foundation can share this information among themselves. If the forum, as a group, has preferences not met with Marvell, the forum as a group can ask Marvell to customize the dreamplug. If Marvell refuses, we can look at the above mentioned alternatives or create our new open source hardware jointly with Qi. The first step is to ask Marvell. Please do. -----BEGIN PGP SIGNATURE----- Charset: UTF8 Version: Hush 3.0 Note: This signature can be verified at https://www.hushtools.com/verify wsBcBAEBAgAGBQJP7OWUAAoJEMry4TZLOfxmH4IH/173BAwd7jtFiHmtKYCP73+PUB3W WTwxy+Apc3ZFVNSovfFq2Qw0nmIASyGdUVOpifaStQ4MeKvNhKeMLB3vYz6KOO7tPzyx xUFFUnSzJ+Ye/fOVDDyCggmLSaN8fmQT1smKfnNyq4BjiC+6gb0eMchePf9l9bW3vL3G bwLlBiNVNoQZq2Vg9+YGaSuuvVZAbvrytqMY5sAB+wedWDU4vVceAKoI6xmVrGR36BEz 5uSThJY3gj40XJINUAJfc8tD+t7G62w8/vdNw71jGomB3b8yYu2UYgBQXVpaxVaC5tRk WrmVPGXkSfP/IV+lWLfXBCSJG97MvcF/0QAzRSY1V/E= =c3rI -----END PGP SIGNATURE----- _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From gnu at toad.com Thu Jun 28 23:21:55 2012 From: gnu at toad.com (John Gilmore) Date: Thu, 28 Jun 2012 23:21:55 -0700 Subject: [Freedombox-discuss] open source hardware exists Message-ID: > The first step is to ask Marvell. Please do. You don't have to ask Marvell. The info is widely available. The DreamPlug has a JTAG interface that lets an external debugger stop the processor, access memory, etc. The manufacturer (Global Scale Technologies) sells an easy JTAG interface kit for $39. It attaches to USB on one end, and a few wires attach it to the JTAG connector on the DreamPlug. (The same JTAG interface works with the GuruPlug and the D2Plug.) There's a free software debugger (openocd, Open On-Chip Debugger) that works with JTAG interfaces. I have barely scratched the surface of using it. I haven't found a great reference for what it can do, but see: http://openocd.sourceforge.net/ http://openocd.sourceforge.net/2012/04/kernel-debugging/ (2-hr video tutorial on OpenOCD and kernel debugging) http://www.madore.org/~david/linux/dreamplug.html#u-boot In general JTAG is a way to debug chips without removing them from the system. It uses a few wires that are daisy-chained on the board to each complex chip in the system. Software to drive a JTAG port sends commands serially down the "data in" wire and causes a bitstream to be shifted out of the chips and back to the software on the "data out" wire. The interpretation of the bitstream depends on which chips are attached, and there are some standards for identifying them. All chips with JTAG let you read the pins of the chip ("boundary scan"), and often write them as well. Many chips also make internal values accessible (such as, in a processor, the current program counter, registers, etc). In a system-on-chip, the JTAG interface pins will connect up to many different subsystems inside the chip (like the processor, the ethernet, the memory controller, the serial ports, etc), which can each be addressed from the JTAG interface. For more details, see: https://en.wikipedia.org/wiki/JTAG The JTAG interface doesn't let anybody send an Ethernet or WiFi packet and take over your system. You need to plug a specific hardware connector into a hardware socket designed to fit with it (and on most systems that socket is inside the guts of the system, under the plastic or metal case). But when you have the hardware under your physical control, JTAG is very powerful for accessing and/or reverse-engineering a system. Many free-software folks use JTAG to figure out what a proprietary system's chips are doing, so they can write free software that works with them. Like any tool, it can be used for "good" or "evil"... John _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From sadduceesq at islandmist.com Thu Jun 28 10:10:33 2012 From: sadduceesq at islandmist.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Fri, 29 Jun 2012 00:10:33 +0700 Subject: =?koi8-r?B?9d7B09TJzMnT2CDw7/bh8vkh?= Message-ID: <3C43770A78514B709B1B7493F4C49411@PHCOMPUTER> За 2011 год по данным МЧС при пожарах погибло 12 028 человек! Защити свою жизнь и жизнь своих близких! www.защити-себя.рф From repetitionspv at berkshire.rr.com Fri Jun 29 01:43:58 2012 From: repetitionspv at berkshire.rr.com (=?koi8-r?B?Iu/GydPZINcg7c/Ty9fFIg==?=) Date: Fri, 29 Jun 2012 00:43:58 -0800 Subject: =?koi8-r?B?7sUgzsHEzyDQzMHUydTYIMvPzcnT08nJwCwgz8bJ09kgz9Qg88/C09TX?= =?koi8-r?B?xc7OycvBIQ==?= Message-ID: <000d01cd55ca$f14ecb00$6400a8c0@repetitionspv> Маленькие и не очень маленькие ОФИСЫ ждут Вас! Помещения находятся на Большой Черкизовской улице Охраняемая территория, удобный подъезд! 8 903 728 00 2 0 From spotsu76 at pamias.com Fri Jun 29 03:21:52 2012 From: spotsu76 at pamias.com (=?koi8-r?B?IvLFzc/O1CI=?=) Date: Fri, 29 Jun 2012 02:21:52 -0800 Subject: =?koi8-r?B?99PFINfJxNkg0sXNz87UwQ==?= Message-ID: Все виды ремонта www.ремонт-тут.рф From hussiesja0 at techworks.com Fri Jun 29 05:36:48 2012 From: hussiesja0 at techworks.com (=?koi8-r?B?IvPPwtPU18XOzsnLINDP08XMy8Eg68nF19PLz8Ug2y4i?=) Date: Fri, 29 Jun 2012 04:36:48 -0800 Subject: =?koi8-r?B?8sHT0NLPxMHWwSDaxc3FzNjO2cgg1d7B09TLz9cgz9QgMzAg08/Uz8sh?= =?koi8-r?B?IA==?= Message-ID: <000d01cd55eb$7847f670$6400a8c0@hussiesja0> Распродаю свои участки по Киевск. ш в коттеджном поселке! Все коммуникации дорогои инфраструктура! Участки от 30 соток до 2.5га Очень красивое место Звоните+7903 1 9 3 06 23 From senselessly885 at grafixoft.com Thu Jun 28 21:53:47 2012 From: senselessly885 at grafixoft.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Fri, 29 Jun 2012 10:23:47 +0530 Subject: =?koi8-r?B?+sHdydTJINPXz8Ag08XN2MAgz9Qg0M/WwdLBIQ==?= Message-ID: <14BEAD106AA7453D871EB159E0F2A86A@1A11678> За 2011 год по данным МЧС произошло 168 528 тысяч пожаров, есть ли у Вас средства защиты от пожара! www.защити-себя.рф From eugen at leitl.org Fri Jun 29 02:20:05 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 29 Jun 2012 11:20:05 +0200 Subject: [Freedombox-discuss] open source hardware exists Message-ID: <20120629092005.GA7109@leitl.org> Sounds pretty paranoid, but this doesn't mean it's impossible. It is possible to compromise NICs with ARM cores. ----- Forwarded message from freebirds at hushmail.com ----- From eugen at leitl.org Fri Jun 29 02:34:02 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 29 Jun 2012 11:34:02 +0200 Subject: [Freedombox-discuss] open source hardware exists Message-ID: <20120629093402.GK7109@leitl.org> ----- Forwarded message from John Gilmore ----- From footingsd543 at fuggdesign.com Thu Jun 28 23:33:13 2012 From: footingsd543 at fuggdesign.com (=?koi8-r?B?IuvXwdLUydLBIMLF2iDLz83J09PJySI=?=) Date: Fri, 29 Jun 2012 12:03:13 +0530 Subject: =?koi8-r?B?8NLPxMHF1NPRIDItyCDLz80uIMvXLdLBIM7BIO3J3tXSyc7Ty8/NINDS?= =?koi8-r?B?LdTFINLRxM/NINMg7ef1IMnNLuzPzc/Oz9PP18EhISA=?= Message-ID: Срочно Продается 2-х комнатная квартира 51 кв.м в престижном районе Москвы рядом с МГУ им.Ломоносова по адресу: Мичуринский проспект 13 корпус 1 - монолитно кирпичный дом-башня 24 этажа 2008 года, полностью заселен. Рядом находятся известный эксклюзивные ЖК "Шуваловский" и ЖК "Коллизей". Характеристики квартиры: Общая: 51 м2 Кухня: 8 м2 Комнаты 18 + 13 метров Имеется балкон и лоджия Лифты: 2 грузовых и 2 пассажирских Санузел: раздельный Этаж: 20 Полный и качественный ЕВРОРЕМОНТ, импортная сантехника, итальянская кухня с встроенной техникой (остается после продажи). Уютная и комфортабельная квартира. Маленькое "гнездышко" для людей со вкусом. Окна на две стороны, солнечная сторона. После ремонта никто не жил, квартира освобождена и готова к продаже! Удалена на 400 метров от Мичуринского и Ломоносовского проспектов, поэтому чистейший воздух. Бронированная дверь, чистый подъезд, домофон, консьерж. До метро "Университет" в настоящее время расстояние 1 км. Там находится крупный торговый центр "Капитолий" с Ашаном, много бутиков и ресторанов. В 2014 году будет открыта станция метро "Ломоносовский проспект" в 500 метрах от дома. Если Вы или ваши близкие учитесь или планируете учиться в МГУ или хотите добираться до Центра Москвы без пробок и дышать чистым воздухом - ЭТО ИДЕАЛЬНЫЙ вариант!!! Отличное соотношение цена - качество для этого престижного района Москвы! ЧИСТАЯ ПРОДАЖА! Квартира в собственности! Один собственник, никто не прописан. Юридически и физически свободна! СТОИМОСТЬ - 12 000 000 РУБ Телефон: +79653093660 Сергей www.мичуринский-мгу.рф From eugen at leitl.org Fri Jun 29 03:04:27 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 29 Jun 2012 12:04:27 +0200 Subject: [liberationtech] Single board mini computers as circumvention tools Message-ID: <20120629100427.GQ7109@leitl.org> ----- Forwarded message from Jacob Appelbaum ----- From eugen at leitl.org Fri Jun 29 03:08:55 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 29 Jun 2012 12:08:55 +0200 Subject: [tor-talk] Roger's status report, May 2012 Message-ID: <20120629100855.GU7109@leitl.org> ----- Forwarded message from Roger Dingledine ----- From eugen at leitl.org Fri Jun 29 03:12:21 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 29 Jun 2012 12:12:21 +0200 Subject: PeerPoint Discussion - please don't use for other topics Message-ID: <20120629101221.GW7109@leitl.org> ----- Forwarded message from Miles Fidelman ----- From boxesftbw7 at laraint.com Thu Jun 28 23:48:47 2012 From: boxesftbw7 at laraint.com (=?koi8-r?B?IuvXwdLUydLBIMLF2iDLz83J09PJySI=?=) Date: Fri, 29 Jun 2012 12:18:47 +0530 Subject: =?koi8-r?B?8NLPxMHF1NPRIDItyCDLz80uIMvXLdLBIM7BIO3J3tXSyc7Ty8/NINDS?= =?koi8-r?B?LdTFINLRxM/NINMg7ef1IMnNLuzPzc/Oz9PP18EhISA=?= Message-ID: <9A21C13F689A4A47A8667BDF5448EA40@manager> Срочно Продается 2-х комнатная квартира 51 кв.м в престижном районе Москвы рядом с МГУ им.Ломоносова по адресу: Мичуринский проспект 13 корпус 1 - монолитно кирпичный дом-башня 24 этажа 2008 года, полностью заселен. Рядом находятся известный эксклюзивные ЖК "Шуваловский" и ЖК "Коллизей". Характеристики квартиры: Общая: 51 м2 Кухня: 8 м2 Комнаты 18 + 13 метров Имеется балкон и лоджия Лифты: 2 грузовых и 2 пассажирских Санузел: раздельный Этаж: 20 Полный и качественный ЕВРОРЕМОНТ, импортная сантехника, итальянская кухня с встроенной техникой (остается после продажи). Уютная и комфортабельная квартира. Маленькое "гнездышко" для людей со вкусом. Окна на две стороны, солнечная сторона. После ремонта никто не жил, квартира освобождена и готова к продаже! Удалена на 400 метров от Мичуринского и Ломоносовского проспектов, поэтому чистейший воздух. Бронированная дверь, чистый подъезд, домофон, консьерж. До метро "Университет" в настоящее время расстояние 1 км. Там находится крупный торговый центр "Капитолий" с Ашаном, много бутиков и ресторанов. В 2014 году будет открыта станция метро "Ломоносовский проспект" в 500 метрах от дома. Если Вы или ваши близкие учитесь или планируете учиться в МГУ или хотите добираться до Центра Москвы без пробок и дышать чистым воздухом - ЭТО ИДЕАЛЬНЫЙ вариант!!! Отличное соотношение цена - качество для этого престижного района Москвы! ЧИСТАЯ ПРОДАЖА! Квартира в собственности! Один собственник, никто не прописан. Юридически и физически свободна! СТОИМОСТЬ - 12 000 000 РУБ Телефон: +79653093660 Сергей www.мичуринский-мгу.рф From whistlerk5 at villagolfdisney.com Fri Jun 29 00:56:41 2012 From: whistlerk5 at villagolfdisney.com (=?koi8-r?B?IvP08uH05efp8SDpIPDh8un05fQi?=) Date: Fri, 29 Jun 2012 13:26:41 +0530 Subject: =?koi8-r?B?T1NCLTMg5uHu5fL5?= Message-ID: Оптовые и розничные поставки - САМЫЕ НИЗКИЕ ЦЕНЫ! - OSB-3 производства Bolderaja (Латвия) , Arbec (Канада), Egger (Германия) - ФАНЕРЫ ФК березовая , ФСФ хвойная, ФОФ ламинированная в любую точку России , склад в Москве. С уважением и надеждой на дальнейшее сотрудничество, Отдел продаж и доставки: (495) 772-60-94 www.стратегия-и-паритет.рф From freebirds at hushmail.com Fri Jun 29 13:06:06 2012 From: freebirds at hushmail.com (freebirds at hushmail.com) Date: Fri, 29 Jun 2012 16:06:06 -0400 Subject: [Freedombox-discuss] Processors without visual serial numbers exist Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Tim Schmidt wrote: "The Ben Nanonote uses a CPU designed and made in China. For which there's not terribly much documentation. Just saying..." True but not for long. When AMD or Google buy out MIPS, there will be a global monopoly on processors. I need to purchase a MIPS as soon as possible! See: "AMD and Google in Race to Buy Out MIPS" http://www.techpowerup.com/164394/AMD-and-Google-in-Race-to-Buy-Out- MIPS.html?cp=2 Tim Schmidt, I think the entire Ben Nanonote is manufactured in China, not just the Ingenic JZ4720 processor. You are correct there is not much documentation from Ingenic. Ingenic has not responded to my two emails. The Qi forum is practically dead. No responses to my posts. There is another open hardware project I just read about today, OpenHardware.org. I will check them out. There are a few SoC without a visual processor serial number. Great news: DreamPlug is one of them. ARM Forum answered: "The ARM CPU itself doesn't have a unique identifier, although someone building an SoC using an ARM CPU could add one at the system level." http://forums.arm.com Yuri at Freescale technical support, support at freescale.com, answered that devices of i.MXS or i.MXL series do not have PSN. http://www.freescale.com/webapp/sps/site/overview. jsp?code=IMXS_FAMILY > On June 29, 2012, Globalscale Technologies answered my question whether the DreamPlug has a visual PSN. Sales at globalscaletechnologies.com wrote: "For our current production, we do not burn device ID in OTP memory, this ID is not visible to the internet." I just Globalscale whether DreamPlug has ARM FreeZone or out of band monitoring. -----BEGIN PGP SIGNATURE----- Charset: UTF8 Version: Hush 3.0 Note: This signature can be verified at https://www.hushtools.com/verify wsBcBAEBAgAGBQJP7gqvAAoJEMry4TZLOfxmyDQH/RDO2soFV7r4hYR3M2v3A68g63vm 8w6TTdCiaXo2iTrCxAyAOLkYEpH9UqqMhZTDrnuGcvFrUDmojhq5dJdmWKxjHR87dKYa ymdKdBjCzwazsdINzS/picd9Kvn/3Fyj2wnBc8iC4rqfn6ZuNVZdxwJuZ8Ec10Dh7Q1a Qd5NENCrvZEbyMxfiriw0yOrXvqHCcWBGSmGyBKSkFiHRicDuwFn1Bu3HkEkU8YKnwed /BHiP5zQA66LciSDwEuH3fenLxgPehNTGtOwJ0K+URhDd0sgymNyUkUbMWg5Wh/aZ9VY mNdbqIW3soGm/Bv1Pu73XzeGKWxPKMphJE/BMGehdrw= =5Inm -----END PGP SIGNATURE----- _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From bridal9701 at wendco.com Fri Jun 29 03:55:02 2012 From: bridal9701 at wendco.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Fri, 29 Jun 2012 16:25:02 +0530 Subject: =?koi8-r?B?4sXaz9DB087P09TYINPFzdjJIQ==?= Message-ID: <2B984072743947FCB064EB0165A4190B@Node250> За 2011 год по данным МЧС при пожарах погибло 12 028 человек! Защити свою жизнь и жизнь своих близких! www.защити-себя.рф From caliberfiq1 at jackandron.com Fri Jun 29 04:42:17 2012 From: caliberfiq1 at jackandron.com (=?koi8-r?B?IuzV3tvJyiDQz8TB0s/LIg==?=) Date: Fri, 29 Jun 2012 17:12:17 +0530 Subject: =?koi8-r?B?7MXUztHRINPLycTLwSA1MCUgLSDDxc7BINDSz9PUzyDTzcXbzsHRIC0g?= =?koi8-r?B?MTQ5MNLVwiDXzcXT1M8gMzAwMNLVwiEg?= Message-ID: <000d01cd55ec$3bfe5960$6400a8c0@caliberfiq1> Ищите подарок на свадьбу?! - картина в прекрасной раме и подарочной упаковке - 1490руб Продается здесь: www.картина-тут.рф/11.shtml -------------- next part -------------- A non-text attachment was scrubbed... Name: 28-04.jpg Type: image/jpeg Size: 29501 bytes Desc: not available URL: From inquisitivelyl at lam.mbvsc.com Fri Jun 29 05:10:38 2012 From: inquisitivelyl at lam.mbvsc.com (=?koi8-r?B?IuvXwdLUydLBIMLF2iDLz83J09PJySI=?=) Date: Fri, 29 Jun 2012 17:40:38 +0530 Subject: =?koi8-r?B?8NLPxMHF1NPRIDItyCDLz80uIMvXLdLBIM7BIO3J3tXSyc7Ty8/NINDS?= =?koi8-r?B?LdTFINLRxM/NINMg7ef1IMnNLuzPzc/Oz9PP18EhISA=?= Message-ID: <2C6F71A9A4034D76B39644609571C264@pmcbankserver> Срочно Продается 2-х комнатная квартира 51 кв.м в престижном районе Москвы рядом с МГУ им.Ломоносова по адресу: Мичуринский проспект 13 корпус 1 - монолитно кирпичный дом-башня 24 этажа 2008 года, полностью заселен. Рядом находятся известный эксклюзивные ЖК "Шуваловский" и ЖК "Коллизей". Характеристики квартиры: Общая: 51 м2 Кухня: 8 м2 Комнаты 18 + 13 метров Имеется балкон и лоджия Лифты: 2 грузовых и 2 пассажирских Санузел: раздельный Этаж: 20 Полный и качественный ЕВРОРЕМОНТ, импортная сантехника, итальянская кухня с встроенной техникой (остается после продажи). Уютная и комфортабельная квартира. Маленькое "гнездышко" для людей со вкусом. Окна на две стороны, солнечная сторона. После ремонта никто не жил, квартира освобождена и готова к продаже! Удалена на 400 метров от Мичуринского и Ломоносовского проспектов, поэтому чистейший воздух. Бронированная дверь, чистый подъезд, домофон, консьерж. До метро "Университет" в настоящее время расстояние 1 км. Там находится крупный торговый центр "Капитолий" с Ашаном, много бутиков и ресторанов. В 2014 году будет открыта станция метро "Ломоносовский проспект" в 500 метрах от дома. Если Вы или ваши близкие учитесь или планируете учиться в МГУ или хотите добираться до Центра Москвы без пробок и дышать чистым воздухом - ЭТО ИДЕАЛЬНЫЙ вариант!!! Отличное соотношение цена - качество для этого престижного района Москвы! ЧИСТАЯ ПРОДАЖА! Квартира в собственности! Один собственник, никто не прописан. Юридически и физически свободна! СТОИМОСТЬ - 12 000 000 РУБ Телефон: +79653093660 Сергей www.мичуринский-мгу.рф From poor.ricardo at gmail.com Fri Jun 29 20:07:33 2012 From: poor.ricardo at gmail.com (Poor Richard) Date: Fri, 29 Jun 2012 20:07:33 -0700 (PDT) Subject: FreedomBox - reports of its death greatly exaggerated? Message-ID: Wired: Good News For Spies and Dictators: bFreedomBoxb Is in Danger of an Early Death http://www.wired.com/threatlevel/2012/06/freedombox/all/ ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From nick.m.daly at gmail.com Fri Jun 29 19:16:49 2012 From: nick.m.daly at gmail.com (Nick M. Daly) Date: Fri, 29 Jun 2012 21:16:49 -0500 Subject: [Freedombox-discuss] FreedomBox Unstable Image 2012.0629 Available Message-ID: Hi folks, welcome to the fourth weekly FreedomBox test image and progress report. This image is designed to allow anyone to test the current state of the FreedomBox. However, it's not yet a complete privacy solution, so you should rely on other, more established, solutions until we produce a stable release. This is not a stable or complete release. The image is available at: https://www.betweennowhere.net/tracker/freedombox-unstable.torrent https://www.betweennowhere.net/tracker/freedombox-unstable.tar.bz2 Tonight's image was produced with: $ make weekly-card The image includes several FreedomBox-related projects. The changes are changes made by project contributors in the last week that have made it into the test image. The outstanding TODOs are the changes needed before the beta-release is complete. If you'd like to contribute in any way, fork and send me a pull request. Freedom Maker: https://github.com/nickdaly/freedom-maker Changes: - The weekly card is now a make target. Outstanding TODOs: - Build the first run config/setup. - The setup process generates keys for user. - Setup generates keys for the box itself. - Turn DHCP on by default (on first boot). - Enable Wireless Access Point (WAP) by default. Plinth: https://github.com/nickdaly/plinth Changes: - Santiago (FreedomBuddy) gained a UI and JSON output. Outstanding TODOs: - Turn DHCP on/off through Plinth - Select DHCP or Static IP in Plinth - Integrate basic OpenVPN settings into Plinth - Integrate Dnsmasq into Plinth - Point "fbx" and "freedombox" URLs to the Plinth UI - Integrate FreedomBuddy into Plinth. - Hook FreedomBuddy into OpenVPN. - Hook FreedomBuddy into SSH. FreedomBox Privoxy: https://github.com/nickdaly/freedombox-privoxy Outstanding TODOs: - Privoxy should use the released HTTPS Everywhere regexp. - Add enabling and disabling Privoxy to the Plinth UI. PlugServer Setup: https://bitbucket.org/nickdaly/plugserver Outstanding TODOs: - Integrate into Freedom Maker. With SQLite: https://github.com/nickdaly/withsqlite No known TODOs, this is complete. Errata: - The Freedom Maker version on the card doesn't have the weekly-card changes, because I was testing it by building the card. I didn't really feel like rebuilding the entire card after it worked the first time. - Tom Galloway contributed a FreedomBuddy SSH VPN service that I didn't have time to integrate into this week's image. Thanks for your time, Nick _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss at lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From fuselagedj5 at fila-usa.com Fri Jun 29 06:28:31 2012 From: fuselagedj5 at fila-usa.com (=?koi8-r?B?IvrB3cnUwSI=?=) Date: Fri, 29 Jun 2012 21:28:31 +0800 Subject: =?koi8-r?B?79PUz9LP1s7PIPDv9uHyIQ==?= Message-ID: <977DFA04B27C4542B76FC26CFF219E5C@prieto> За 2011 год по данным МЧС произошло 168 528 тысяч пожаров, имея средства защиты Вы будете обеспечены защитой! www.защити-себя.рф From edicts6 at qwicnet.com Fri Jun 29 10:14:17 2012 From: edicts6 at qwicnet.com (=?koi8-r?B?88jFzc/UxcjOycvB?=) Date: Fri, 29 Jun 2012 22:44:17 +0530 Subject: =?koi8-r?B?68/HxMEg0NLJxMXUIMvPzsXDIM/GxtvP0sHNPw==?= Message-ID: 10 июля 2012 г. Оффшорный бизнес: о чем молчат другие? +7 499 - ЧЧ5.40-95 : (код Москвы) 7922I22 Цель: Отличительной особенностью данного курса является практическая направленность и отсутствие лишних теоретических и исторических отступлений. курс строится в форме интерактивного практического занятия при постоянном взаимодействии с аудиторией с разбором большого количества примеров и подробным описанием налоговых, финансовых и правовых последствий или рисков. Для участия в курсе мы приглашаем как специалистов с многолетним опытом работы в сфере международного налогового планирования, стремящихся расширить область своих знаний, так и слушателей, еще не сталкивавшихся с иностранными юрисдикциями. Насыщенность материала конкретными примерами, взятыми из жизни, решение нестандартных и частных задач в ходе занятия, а также доступность объяснений относятся к неоспоримым достоинствам данного курса. Важно отметить, что ведущий курса имеет не только многолетний опыт разработки и курирования крупных консалтинговых проектов, но также многократного участия в их реализации "под ключ" с последующим сопровождением. Это позволяет наполнить курс уникальным материалом, посвященным не только схемам оптимизации налогов, но и многочисленными практическими комментариями и описанием проблем, с которыми сталкивается бизнес, даже при выборе "правильных и выверенных" схем. По ходу и после окончания курса будет предусмотрено время для индивидуальных вопросов как по заявленным темам, так и по вопросам, которые не предусматривала программа курса. Оффшоры, Кипр и другие иностранные юрисдикции не являются налоговой панацеей, и в некоторых случаях их использование принесет лишь новые финансовые издержки и бессмысленные риски конфликтов с налоговыми органами. К счастью, таких случаев пока меньшинство. Программа: БЛОК 1. ОФФШОРЫ, НИЗКОНАЛОГОВЫЕ И ПРЕСТИЖНЫЕ ЕВРОПЕЙСКИЕ ЮРИСДИКЦИИ: КРИТЕРИИ ВЫБОРА. * Сравнение популярных оффшорных юрисдикций (Британские Виргинские острова, Белиз, Сейшелы, Панама и т.д.) – от каких стоит отказаться и почему? * Гонконг как инструмент работы с азиатским рынком * Зачем использовать низконалоговые юрисдикции, если есть полностью безналоговые? * Использование престижных юрисдикций: Швейцария, Люксембург, Нидерланды и т.д. – когда это обоснованно? * "Черные списки" ФАТФ, ОЭСР, Минфина, ЦБ РФ – кому о них можно забыть? БЛОК 2. ПРАКТИКА ИСПОЛЬЗОВАНИЯ КИПРСКИХ КОМПАНИЙ * Особенности работы с кипрским администратором: как не дать себя обмануть? ** налог на прибыль (Corporate Income Tax), сбор на оборону (Defence Contribution Tax), НДС и применение “reverse charge” * Изменения кипрского законодательства 2012 и тенденции 2013. * Ратификация Протокола к Соглашению между РФ и Кипром: кто понесет убытки, а кому удастся на этом заработать? * Почему Кипр редко используют при экспорте/импорте товаров? * Кипр как инструмент работы с ценными бумагами БЛОК 3.СХЕМЫ, ПРИМЕНЯЕМЫЕ В МЕЖДУНАРОДНОМ НАЛОГОВОМ ПЛАНИРОВАНИИ * Внешнеторговые операции (экспорт/импорт): ** схемы с использованием оффшоров и Гонконга; ** схемы с использование английских LTD и партнерств LLP; ** эстонские, чешские, датские, нидерландские компании в торговых схемах. * Холдинговые структуры ** выплаты дивидендов и построение холдинговых структур; ** займы как оптимальный путь финансирования; ** (суб)лицензионные договоры и выплаты роялти за использование прав интеллектуальной собственности; ** анализ сложностей и рисков, расчет предельных величин отчислений по займам и роялти. * Владение и сдача в аренду недвижимости с использованием нерезидентов БЛОК 4. КОНФИДЕНЦИАЛЬНОСТЬ И НОМИНАЛЬНОЕ ВЛАДЕНИЕ * Номинальный сервис: ** инструменты контроля номинальных директоров и номинальных акционеров; ** лица, которым будут известны имена бенефициаров; * Какие данные о компании хранятся в публичных реестрах Кипра и оффшоров, и кто имеет к ним доступ? * Обмен информацией – в каких случаях государственные органы РФ могут получить информацию о владельцах? * Изменения в Гражданском Кодексе: бенефициар должен раскрыть себя сам. * Трасты и семейные фонды – когда их использование оправдано? * "Подводные камни" при использовании номинального сервиса и трастов/фондов. БЛОК 5. ОТКРЫТИЕ СЧЕТОВ НА ИНОСТРАННЫЕ КОМПАНИИ * Надежность, оперативность работы, лояльность – какой банк выбрать? * Какие банки не делятся информацией с российскими спецслужбами? * Раскрытие банковской тайны – факты и выводы * Пути снятия средств со счета иностранного банка в России * Росфинмониторинг: когда можно не опасаться? БЛОК 6. ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ, СИТУАЦИИ ИЗ ПРАКТИКИ, ОБЗОР СУДОВ И ПИСЕМ МИНФИНА. * Насколько международная структура владения защищает от рейдерских захватов? * Как часто нужно предоставлять сертификат налогового резидентства и нужно ли проходить аудит для его выпуска? * Ведет ли использование доверенностей с широким кругом полномочий к возникновению постоянного представительства? Официальная позиция. * Дает ли регистрация компании в ЕС возможность на привлечение кредитов и получение гражданства? * Если компания не нужна: нужно ликвидировать или можно "бросить"? * и т.д. Стоимость участия: 9 000 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 Московский код: 792/2I22 <> код (499) - Ч45.ЧО95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9951 bytes Desc: not available URL: From rudiger.koch at gmail.com Fri Jun 29 14:02:56 2012 From: rudiger.koch at gmail.com (R|diger Koch) Date: Fri, 29 Jun 2012 23:02:56 +0200 Subject: [ZS] Neat wallet Message-ID: Bitcoin is the client from bitcoin.org, right? Wrong! There are a number of wallets. And the official client is more and more pushed into the role of a reference implementation. Use it if you know what you do, otherwise, there are better alternative. In fact you can (ab)-use exchanges like Intersango (https://intersango.com/) as a wallet. But that's not a smart idea. There are plenty of wallet implementations. There are limitations in Javascript that prevent running a wallet only in the browser, but some offerings are getting really close: https://blockchain.info/wallet https://www.strongcoin.com/ The problem here is that they still keep enough stuff on their server so they may take your wallet. I looked at some of the Javascript and it looked safe, but there is no obstacle to change this tomorrow. On the plus side: This wallet runs on everything that can run a decent browser and if you don't put large sums into it, it should be fine. Here is what you do if you want to store large sums and are as paranoid as I am: 1. Create a VM for this purpose (if you are paranoid, this is a simple "unzip" of a VM template) 2. Go to https://www.bitaddress.org in the browser of the VM 3. Disconnect your computer physically from the network (pull the network plug) 4. Generate the keys, using the "Wallet Details", using a secret key phase; copy the address on a memory stick 5. Shut down the VM and delete it 6. Turn off the computer and reconnect the plug 7. transfer Bitcoins on the address from the memory stick. -Anu -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From holtj1 at rjrudden.com Sat Jun 30 08:29:34 2012 From: holtj1 at rjrudden.com (=?koi8-r?B?+sHSwcLP1M7B0SDQzMHUwSDXwcjUz9fJy8E=?=) Date: Sat, 30 Jun 2012 07:29:34 -0800 Subject: =?koi8-r?B?98HI1M/X2cogzcXUz8Qgz9LHwc7J2sHDyckg0sHCz9Q=?= Message-ID: <000d01cd56cc$c5342b20$6400a8c0@holtj1> 04 июля 2012 г. ОРГАНИЗАЦИЯ ВАХТОВОГО МЕТОДА РАБОТ НА ТЕРРИТОРИИ РФ 8 (499) ЧЧ5Ч095 **** +7 (495) 792-2I22 Цель: рассмотреть особенности вахтового метода работы, изучить систему оплаты труда, применение районных коэффициентов к выплатам вахтовикам. Программа: 1. Вахтовый метод организации работ: нормативное регулирование. Нормативные акты, регулирующие применение вахтового метода. 2. Особенности вахтового метода работы: * отличие служебной командировки от вахтового метода работы; * разработка положения о вахтовом методе работе; * вахтовый метод организации работ: нормативное регулирование; * место нахождения организации, место жительства работника, место выполнения работ и пункт сбора; * особенности приема на работу вахтовиков. Виды договоров с сотрудниками. Порядок прохода медицинского осмотра. 3. Оплата труда при вахтовом методе работы. Гарантии и компенсации для лиц, работающих вахтовым методом: * компенсационная и стимулирующая части заработной платы; * оплата сверхурочных часов, работы в ночное время и в выходные дни; * оплата труда в районах крайнего севера и приравненных к ним местностях; * дополнительные отпуска, исчисление стажа работы при предоставлении отпуска; * надбавка за вахтовый метод; * доставка к месту проведения работ, организация питания и проживания работников. 4. Суммированный учет рабочего времени. Учет рабочего времени при вахтовом методе Учетный период при вахтовом методе организации работ. 5. Понятие вахты. Продолжительность вахты. Продолжительность рабочей смены и междусменного отдыха. Дни еженедельного отдыха. Дни в пути. Междувахтовый отдых. 6. Система оплаты труда при вахтовом методе. Страховые взносы во внебюджетные фонды. Часовая тарифная ставка. Надбавка за вахтовый метод работы Оплата дней в пути. Оплата дней междувахтового отдыха. 7. Доплаты при вахтовом методе работы. Надбавка за работу в тяжелых, вредных и опасных условиях труда. Оплата работ в ночное время, в праздничные и предпраздничные дни. 8. Применение районных коэффициентов к выплатам вахтовикам. Северная надбавка. Продолжительность дополнительного отпуска за работу в северных регионах. Стаж, дающий право на дополнительный отпуск. 9. Командировка на вахте и в период междувахтового отдыха. 10. Расчет отпускных и компенсаций за неиспользованный отпуск. Выплаты пособий по временной нетрудоспособности в период вахты и в период междувахтового отдыха. 11. Расходы на содержание вахтового поселка. Расходы на проезд, проживание и питания. Оплата проезда от пункта сбора к месту выполнения работ и от места жительства работника до пункта сбора. Стоимость участия: 7 800 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: \Моск. код/ 7922122 <> код (495) - 7*Ч2/9I\98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5106 bytes Desc: not available URL: From coderman at gmail.com Sat Jun 30 09:47:52 2012 From: coderman at gmail.com (coderman) Date: Sat, 30 Jun 2012 09:47:52 -0700 Subject: [ZS] Neat wallet In-Reply-To: <20120630101207.GH12615@leitl.org> References: <20120630101207.GH12615@leitl.org> Message-ID: On Sat, Jun 30, 2012 at 3:12 AM, Eugen Leitl wrote: >... > 1. Create a VM for this purpose (if you are paranoid, this is a simple > "unzip" of a VM template) > ... > 4. Generate the keys, using the "Wallet Details", using a secret key > phase; copy the address on a memory stick unless a newly started VM has poor entropy, then keys generated there are potentially weak. there should be some fun new concerns along this angle soon... (and plenty of bad precedent already) ;) From rudiger.koch at gmail.com Sat Jun 30 01:44:27 2012 From: rudiger.koch at gmail.com (R|diger Koch) Date: Sat, 30 Jun 2012 10:44:27 +0200 Subject: [ZS] Bitcoin, Empire of void* Message-ID: 2012/6/30 Lodewijk andri de la porte > I can't help but plug my e-wallet, bitvau.lt. And about time! Don't keep us oblivious about your progress. > It's going to get a lot more work the next half year but it does what the > reference wallet does already (balance/history/transact/addressmange). > > I intent to offer much more usability oriented services. I don't really > see the value of an online but javascript and encrypted wallet, why not use > a deterministic wallet and seed it with full name, place and date of birth, > etc. and a normal password? You'd get much more security, which is what you > wanted right? > I agree - I actually tried to convince Thomas (author of Electrum) to do it that way. Name, birthplace.... is not really a password, but it's a salt that chages the situation of an attacker. Instead of trying out a passphrase and checking if *any* address matches, he needs to target specifically you. But Thomas doesn't see the difference. Prefixing a good password with an unknown, but guessable salt "R|diger Koch - Anu - Haidelberga - 19121965" is making life of an attacker really miserable - particularly if you add deliberate spelling errors in. The beauty of JS from your POV is that you can shift the responsibility 100% to the user. And there is no point to hack your server, because you hold no user data on your server if the wallet is re-created from the passphrase every time the user "logs in". So you don't need to back-up anything and you can't be taken legally responsible for data loss. -Anu -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sat Jun 30 03:02:52 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 30 Jun 2012 12:02:52 +0200 Subject: [Freedombox-discuss] Processors without visual serial numbers exist Message-ID: <20120630100252.GF12615@leitl.org> ----- Forwarded message from freebirds at hushmail.com ----- From eugen at leitl.org Sat Jun 30 03:12:07 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 30 Jun 2012 12:12:07 +0200 Subject: [ZS] Neat wallet Message-ID: <20120630101207.GH12615@leitl.org> ----- Forwarded message from R|diger Koch ----- From tor at lists.grepular.com Sat Jun 30 06:06:00 2012 From: tor at lists.grepular.com (tor at lists.grepular.com) Date: Sat, 30 Jun 2012 14:06:00 +0100 Subject: [tor-talk] Can one make money running anonymity services? Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 30/06/12 12:06, Eugen Leitl wrote: >> But are there anonymous payment tools in this days of control? I >> just > > Anonymous prepaid cards, or BitCoin over Tor would come to mind. Does anyone know a method of obtaining BitCoins anonymously, other than mining them yourself? - -- Mike Cardwell https://grepular.com/ http://cardwellit.com/ OpenPGP Key 35BC AF1D 3AA2 1F84 3DC3 B0CF 70A5 F512 0018 461F XMPP OTR Key 8924 B06A 7917 AAF3 DBB1 BF1B 295C 3C78 3EF1 46B4 -----BEGIN PGP SIGNATURE----- iQGGBAEBCgBwBQJP7vm4MBSAAAAAACAAB3ByZWZlcnJlZC1lbWFpbC1lbmNvZGlu Z0BwZ3AuY29tcGdwbWltZTgUgAAAAAAVABpwa2EtYWRkcmVzc0BnbnVwZy5vcmdt aWtlLmNhcmR3ZWxsQGdyZXB1bGFyLmNvbQAKCRCdJiMBwdHnBKYwB/97blKzGaIe dE6RdRpFFwGxrnRPZCrSaxL2pr35tmHGlECv6fa3cGOLb3ThczkJpZDWQOkgpO3b fAEaC5R2aeLE9tBlRkURBx+pY1Kr/+4MUh3VTRX5ggUswPE1Nts6ygrdyP8ga3v2 UO4njvyRZHlcr8HTiZaO7D75tus/K4iI1gwIMyf0jGUzIBPAMjQ80qoIhHcoXOc4 IbQY8gkFwjrVRJPHKUhZI4Xg+9uDNpPBuZO3b1QLvm7M2EaLars+kUiF1ZPUgHJ5 PTHPlkhHJo44iw0Nucn4iManK2v6DxDaPxbCw/+Qufk9KYnVz9C2rFjBTVwq5WHN iTz6vnqp0XFx =MY4s -----END PGP SIGNATURE----- _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From gbnewby at pglaf.org Sat Jun 30 15:16:32 2012 From: gbnewby at pglaf.org (Greg Newby) Date: Sat, 30 Jun 2012 15:16:32 -0700 Subject: FreedomBox - reports of its death greatly exaggerated? In-Reply-To: <20120630184649.GP12615@leitl.org> References: <20120630184649.GP12615@leitl.org> Message-ID: <20120630221632.GB27487@pglaf.org> Indeed. They're even part of a pre-HOPE workshop at Columbia U.: "The Open Internet Tools Project has partnered with FreedomBox, InformSec and ISOC-NY to host a circumvention tools hackfest in NYC right before HOPE," and the group will have a presence at HOPE Number Nine: http://www.hopenumbernine.net/index.php?id=news&post=circumvention-tools-ha ckfest-in-nyc-before-hope On Sat, Jun 30, 2012 at 08:46:49PM +0200, Eugen Leitl wrote: > ----- Forwarded message from Poor Richard ----- > > From: Poor Richard > Date: Fri, 29 Jun 2012 20:07:33 -0700 (PDT) > To: building-a-distributed-decentralized-internet at googlegroups.com > Subject: FreedomBox - reports of its death greatly exaggerated? > Reply-To: building-a-distributed-decentralized-internet at googlegroups.com > > Wired: Good News For Spies and Dictators: bFreedomBoxb Is in Danger of an > Early Death > > http://www.wired.com/threatlevel/2012/06/freedombox/all/ > > ----- End forwarded message ----- > -- > Eugen* Leitl leitl http://leitl.org > ______________________________________________________________ > ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org > 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE -- gbn From eugen at leitl.org Sat Jun 30 07:13:46 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 30 Jun 2012 16:13:46 +0200 Subject: [tor-talk] Can one make money running anonymity services? Message-ID: <20120630141346.GZ12615@leitl.org> ----- Forwarded message from tor at lists.grepular.com ----- From eugen at leitl.org Sat Jun 30 08:50:37 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 30 Jun 2012 17:50:37 +0200 Subject: [Freedombox-discuss] FreedomBox Unstable Image 2012.0629 Available Message-ID: <20120630155037.GC12615@leitl.org> ----- Forwarded message from "Nick M. Daly" ----- From jake at aol.jp Sat Jun 30 18:47:38 2012 From: jake at aol.jp (Jacob Schultz) Date: Sat, 30 Jun 2012 18:47:38 -0700 (PDT) Subject: [ZS] Re: Bitcoin, Empire of void* Message-ID: My request comes from the fact that, as far as I know, you cannot use a QR code to pay POS at an establishment, say at like 7/11. People easily become more well antiquated with quick POS payment methods. I.E. (not in chronological order) Charlie cards in boston, the upcoming paypass enabled NYC subway turnstiles (they completed a trial a little while back), the mobil speedpass which has been around for years (https://www.speedpass.com/forms/frmSpHome.aspx), and then most recently NFC enabled payment terminals popping up everywhere in the US. Anyone can apply for an NFC (really RFID, but same tapping concept...) enabled credit/debit cards easily now: http://www.paypass.com/, http://usa.visa.com/personal/cards/card_technology/paywave.html, https://www295.americanexpress.com/cards/loyalty.do?page=expresspay, https://www.discover.com/credit-cards/help-center/account/zip/. I'm sorry, but you cannot tell me NFC is uncommon functionality. Three to four of Sprint's cellphone are now NFC enabled; I'm sure other carriers are simultaneously following suit. Familiarity with tapping to pay will reach the masses through mobile phones, if it hasn't already through the card companies ... On Saturday, June 30, 2012 9:30:01 PM UTC-4, The Doctor [412/724/301/703] wrote: > > I am uncertain about what you mean by NFC phones. At first scratch it > sounds like an uncommon functionality in the United States. What I can say > is that people generate and use QR codes right now. They recognize and > make use of them and have for a while. What I suggest is that we make use > of what is being used right now. > > --- > The Doctor [412/724/301/703] > Web: https://drwho.virtadpt.net/ > Sent from a Global Frequency satphone. > On Jun 29, 2012 10:57 PM, "Jacob Schultz" wrote: > >> You're right, I spoke too generally. People are familiar in some way with >> QR codes, they've overtaken the NYC subway for example...fair enough. >> >> I don't mean to really get down to brass tacks, but "generating a QR >> code" is exactly the problem I'm trying to combat. You have to open an app >> (the duration of this action is variable depending on the hardware and >> software involved) and then push a button to generate the code. Then you >> have to line up the receiving camera to the code! I'm not sure this system >> actually takes 1-2 seconds. Yes, you could put a shortcut on the home >> screen but, seriously, who wants more home screen clutter? - don't take >> this notion as the keystone of my argument though: the true argument is >> about aesthetics. >> >> The NFC chip instantly recognizes its proximity with another. I think one >> would find it difficult to argue that the QR code is a more attractive >> payment solution. I maintain that we're looking for elegance here: I hope >> I'm not speaking too generally again, but I think the bitcoin is still >> understood by many to be some kind of hacker-demon-currency, no? I want to >> create a paradigm change through ease of use. >> >> I feel like your attitude is not just your own, but is shared by many, >> and I believe it will hinder ubiquitous adoption...where are my bitcoin NFC >> interface developers? >> >> much love, >> >> Jake >> >> >> On Friday, June 29, 2012 10:10:30 PM UTC-4, The Doctor [412/724/301/703] >> wrote: >>> >>> On Fri, Jun 29, 2012 at 10:07 PM, Jacob Schultz wrote: >>> >>> They only take a second or two to generate. It takes long than that >>> to send a text message over here. >>> >>> > In addition, I'm pretty sure the average user in the United States >>> doesn't >>> > know what a QR code is. I'm asking for an NFC solution because it >>> provides >>> >>> The average user in the States knows what a QR code is. They're all >>> over the place. On buses. In magazines. They encode nutritional >>> information on menus in restaurants for the Weight Watchers mobile >>> app. On street signs. On packaging. There is even QR code graffiti >>> stencilled on walls and on stickers. >>> >>> > the necessary incentive for popular adoption - NFC is what people are >>> going >>> > to become used to for mobile payments, not QR codes. >>> >>> Let's see what happens. >>> >>> -- >>> The Doctor [412/724/301/703] [ZS] >>> https://drwho.virtadpt.net/ >>> "I am everywhere." >>> >> -- >> Zero State mailing list: >> http://groups.google.com/group/DoctrineZero >> > -- -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sat Jun 30 11:46:49 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 30 Jun 2012 20:46:49 +0200 Subject: FreedomBox - reports of its death greatly exaggerated? Message-ID: <20120630184649.GP12615@leitl.org> ----- Forwarded message from Poor Richard ----- From eugen at leitl.org Sat Jun 30 12:29:21 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 30 Jun 2012 21:29:21 +0200 Subject: [ZS] Bitcoin, Empire of void* Message-ID: <20120630192921.GE12615@leitl.org> ----- Forwarded message from R|diger Koch ----- From eugen at leitl.org Sat Jun 30 14:02:05 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 30 Jun 2012 23:02:05 +0200 Subject: [tor-talk] Anonymous Publishing Is Dead. Message-ID: <20120630210205.GX12615@leitl.org> ----- Forwarded message from Anonymous Person ----- From anonymousperson90 at in.com Sat Jun 30 13:15:33 2012 From: anonymousperson90 at in.com (Anonymous Person) Date: Sun, 01 Jul 2012 01:45:33 +0530 Subject: [tor-talk] Anonymous Publishing Is Dead. Message-ID: I know it is dead, because I have tried to do it, and I can assure you it is dead.Text is easy of course I can still blast a simple email out to a mailing list, I can lay my claims out in 7bit ASCII and let the world judge the merits solely on this simple medium.But media publishing a story with supporting images, scans, video or audio it is dead, left only to the elites. And perhaps worst of all is the promise made by all of you that if you just.... try a little harder, if you just use this service over here, if you just think about it another way that it is still possible.It is not.Some time ago as an experiment I began the process to publish material fully anonymously no compromises.I obtained a prepaid line of credit, paid in cash, verified with a prepaid telephone, also paid in cash, and only turned on in an ambiguous physical location.And I set about to find a Virtual Private Server I could run a Tor Hidden Service on.My requirements throughout all of this were si mple: use Tor for everything, pay cash or cashequivalent for everything, leave no account on a service run by a US/UK/AUS/NZ/CA company, have the VPS hosted outside the same, pay a reasonable sum.I needed an email of course.Nymservers like http://isnotmy.name/ or http://mixnym.net should have been the solution but of course they didn't work.No amount of guesswork or trial and error got me a nym.Free webmail became the next goal.The more trustworthy (gmail), the less satisfactorily anonymous it was.The easier it was to register (in.com) the less trustworthy it was deemed.After signing up for a lowtrust but easytoget email, I narrowed down my hosting options to a group of VPS in the price range, hosted outside the 'bad' countries, and whose company itself was also outside.There aren't a lot.The next problem became finding a VPS I could pay for.You see, most VPS sellers are small resellers and don't process their own credit cards they outsource it to a payment processor, usu ally Paypal. Paypal doesn't work.Paypal or AlertPay too stringent verification; Liberty Reserve blocks Tor; CashU no easily found online merchant able to convert from a prepaid Credit Card; one after another all online payment methods fell by the wayside.You might think 'Bitcoin'.You would be wrong.No bitcoin service accepts any anonymous funding source most only accept bank transfers.Apparently people performed chargebacks on credit cards to defraud the merchants.I can't blame them for this, but it certainly kills the idea of 'anonymity'.And I don't trust the blockchain to provide anonymity.After finding one of three or four VPS' I thought I could pay for, I encountered the next obstacle: MaxMind.MaxMind is a fraud detector built into WHMCompleteSolution which in turn is the VPS management tool used by every budget VPS.I set off every detector it had: proxy software, low trust email account, strange addresses, no valid phone number, etc etc.When I inquired to one compan y about this, I was laughed off.Even though I was willing to let them charge my card and sit on it for a month before providing service no such luck.At this point, I needed to find a company large enough they processed their own credit cards, didn't block Tor, and didn't use fraud detectors.I found one, a competitor to Amazon EC2, that I thought I could fall through the cracks of.It didn't like my low trust email address, but after enough searching, I found an ISP I could get an account on without paying.After getting that, creating and verifying an account, and finally set up to make my payment... the prepaid card is declined.There's no explanation, it just didn't work.I thought at this point, perhaps there was a service that could be used.There was an announcement recently: http://karelbilek.com/anontorrent/ Supposedly this guy will seed anything until it has 20 seeders of its own.Except the file limit is 50MB.And you can't upload copyrighted material.How about any of the muchacclaimed 'leak sites' that spun up after Wikileaks shuttered their wiki and submission system?Well, I went through all of these: leakdirectory.org/index.php/LeakSiteDirectory and all of them seemed to be either wannabes who had never published a thing or news organizations who were security illiterate and had no way to accept content.Anonymous Publishing Is Dead.You may seek to respond with the 'right way' to do it, the company you know will let me fall through the cracks, the trick you use to whitelie your way through the process.Don't bother.If there is a way through, and I'm not convinced there is, it is so difficult to find that a technically unsavvy user would never be able to; and even technically savvy users like myself who understand all the tricks of firewalling off my machine so nothing but Tor escapes are groping blindly for it, unlikely to find it.What can be done about this?What compromises are 'safe'?Is a Hidden Service sufficiently trustworthy to host any material, and have it stand up to investigation when the server running it is in your name?Is the correct approach not to publish anonymously at all, as cryptome.org does?Should we rely on the Streisand effect, bittorrent, newsgroups, something else?These are mostly rhetorical questions.My purpose in this email is to tell you that anonymous publishing is an unsolved problem.Any solution available today is not robust: it falls down in some situation: content, capacity, anonymity, or something else.What can be done about it? What will be done about it?Dear tortalk! Get Yourself a cool, short @in.com Email ID now! _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE