From risapa at aerocloset.com Thu Mar 1 06:06:39 2012 From: risapa at aerocloset.com (SueannMelissa) Date: Thu, 01 Mar 2012 10:06:39 -0400 Subject: Best Buy Viagra Generic Online - Viagra 100mg x 100 Pills $125, Free Pills & Reorder Discount eiffrj3 Message-ID: <99x73j96n47-75218984-583q1i53@vdjyjxljf> Best Buy Viagra Generic Online Viagra 100mg x 100 Pills $125, Free Pills & Reorder Discount, We accept VISA Payments, 90000 Satisfied Customers! Top Selling 100% Quality & Satisfaction guaranteed! http://medtechspillstablets.ru From measl at mfn.org Thu Mar 1 10:28:44 2012 From: measl at mfn.org (J.A. Terranson) Date: Thu, 1 Mar 2012 12:28:44 -0600 (CST) Subject: [cryptography] Constitutional Showdown Voided as Feds Decrypt Laptop (fwd) Message-ID: How convenient :-/ ---------- Forwarded message ---------- Date: Thu, 1 Mar 2012 12:02:32 -0500 From: Jeffrey Walton To: James S. Tyre Cc: cryptography at randombit.net Subject: Re: [cryptography] Constitutional Showdown Voided as Feds Decrypt Laptop On Wed, Feb 29, 2012 at 5:53 PM, James S. Tyre wrote: > (This is the case in Colorado, not the 11th Circuit Court of Appeals case which has been > much discussed of late.) > > http://www.wired.com/threatlevel/2012/02/decryption-flap-mooted > > Constitutional Showdown Voided as Feds Decrypt Laptop > > By David Kravets > Email Author > February 29, 2012 | > 5:17 pm > > Colorado federal authorities have decrypted a laptop seized from a bank-fraud defendant, > mooting a judge's order that the defendant unlock the hard drive so the government could > use its contents as evidence against her. > > The development ends a contentious legal showdown over whether forcing a defendant to > decrypt a laptop is a breach of the 5th Amendment right against compelled self > incrimination. > > The authorities seized the encrypted Toshiba laptop from defendant Ramona Fricosu in 2010 > with valid court warrants while investigating alleged mortgage fraud, and demanded she > decrypt it. Colorado U.S. District Judge Robert Blackburn ordered the woman in January to > decrypt the laptop by the end of February. The judge refused to stay his decision to allow > Fricosu time to appeal. > > "They must have used or found successful one of the passwords the co-defendant provided > them," Fricosu's attorney, Philip Dubois, said in a telephone interview Wednesday. Perhaps Fricosu reused a password and was on a mailing list using Mailman... _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography From oli at cryptosms.org Thu Mar 1 03:46:59 2012 From: oli at cryptosms.org (oli) Date: Thu, 01 Mar 2012 12:46:59 +0100 Subject: [liberationtech] jamming satellite phones in Homs Message-ID: Hi, according to: http://www.aljazeera.com/news/middleeast/2012/03/20123175034166718.html "But communication with residents in the district was difficult. Electricity and phone lines have been cut off, and an activist from the Syrian Network for Human Rights told Al Jazeera that the government was using a new technology to jam satellite phone signals." Anyone any ideas what this "new technology" is? Oli _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Mar 1 04:32:28 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 1 Mar 2012 13:32:28 +0100 Subject: [liberationtech] jamming satellite phones in Homs Message-ID: <20120301123228.GU7343@leitl.org> ----- Forwarded message from oli ----- From tor.steinar at lyngenplast.no Thu Mar 1 01:00:40 2012 From: tor.steinar at lyngenplast.no (=?koi8-r?B?IvPU0s/J1MXM2M7B0SDcy9PQxdLUydrBIg==?=) Date: Thu, 1 Mar 2012 14:30:40 +0530 Subject: =?koi8-r?B?58/T1cTB0tPU18XOztnKINPU0s/J1MXM2M7ZyiDOwcTaz9I=?= Message-ID: <01ccf7b7$e03be800$f246ee7b@tor.steinar> СТРОИТЕЛЬНАЯ ЭКСПЕРТИЗА: негосударственная и государственная - как это будет работать? В соответствии с последними изменениями в Градостроительный кодекс, изменяется порядок прохождения экспертизы строительной документации, а также выдача разрешений на строительство. Поможем Вам сориентироваться в новых нормах проведения строительной экспертизы. Вы можете узнать: - последние изменения в градкодекс, вступающие в силу 01.04.2012 г. - порядок взаимодействия служб государственного строительного надзора и негосударственной экспертизы; порядок выдачи разрешения на строительство - обзор актуального законодательства: 337-ФЗ от 28.11.2011; 224-ФЗ от 18 июля 2011 года; N224-ФЗ и 243-ФЗ от 18 июля 2011 года и другие нормативно-правовые акты - новые положения архитектурно-строительного проектирования - актуальные вопросы планирования развития городских территорий и правого статуса объектов недвижимости Курс 12-13 марта, Санкт-Петербург. Условия и регистрация: (812) 6Ч2-ЧЗ-58 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3180 bytes Desc: not available URL: From ski at ospreyfilters.com Thu Mar 1 02:06:35 2012 From: ski at ospreyfilters.com (=?koi8-r?B?IubFxM/SIOnHz9LF18neIg==?=) Date: Thu, 1 Mar 2012 15:36:35 +0530 Subject: =?koi8-r?B?8sXHydPU0sHDydEg7+/vIMkg6fAg?= Message-ID: <01ccf7c1$15990380$aa285e3b@ski> Регистрация ООО - 4 000 рублей Регистрация ИП - 2 000 рублей Юридические адреса - от 8 000 рублей Готовые ООО под заказ - 25 000 рублей Внесение изменений Изменения - от 2 000 рублей Ликвидация (Смена Генерального директора и учредителей) - 20 000 рублей Реорганизация (прекращение деятельности компании) - 80 000 рублей т/ф: 8-968-818-19-61 Елена From lacycandra at wmle.com Thu Mar 1 12:04:30 2012 From: lacycandra at wmle.com (SHAUNDA CHELSIE) Date: Thu, 01 Mar 2012 17:04:30 -0300 Subject: Buy CIALIS Now from Online Pharmacy. Lowest Prices and Satisfaction Guaranteed! jejkr Message-ID: <65u20s17v56-51923365-506h4q30@zarrhfam> Buy Cialis Online OVERNIGHT Shipping! and Satisfaction Guaranteed! Best Quality. Worldwide delivery (1-3 days). 24h online support. Absolute privacy. (viagra - cialis - levitra). Friendly support and best offers! http://mallpro-drug.ru From mrosenfeld at aegworldwide.com Thu Mar 1 03:41:44 2012 From: mrosenfeld at aegworldwide.com (=?koi8-r?B?IuHSzcXOIPPFzcXOz9fJ3iI=?=) Date: Thu, 1 Mar 2012 17:11:44 +0530 Subject: =?koi8-r?B?8sXHydPU0sHDydEg7+/vICAgICA=?= Message-ID: <01ccf7ce$606d4800$887fca75@mrosenfeld> Регистрация ООО - 4 000 рублей Регистрация ИП - 2 000 рублей Юридические адреса - от 8 000 рублей Готовые ООО под заказ - 25 000 рублей Внесение изменений Изменения - от 2 000 рублей Ликвидация (Смена Генерального директора и учредителей) - 20 000 рублей Реорганизация (прекращение деятельности компании) - 80 000 рублей т/ф: 8-968-818-19-61 Елена From aaamn at gmail.com Thu Mar 1 00:35:52 2012 From: aaamn at gmail.com ( ) Date: Thu, 01 Mar 2012 17:35:52 +0900 Subject: No subject Message-ID: <201202280839.q1S8dZVG017217@proton.jfet.org> ※冷かしでの参加は絶対にお止め下さい!! お金持ちな人妻から"お小遣い"が貰える!! "嘘"無しの報酬先払い!!女性を満足させよう。 嘘のような本当の話。逆援助を望んでいる方は実在します。 当サイトは本物を"報酬先払い"という形で証明します。 信じる人だけご入場下さい。男性はもちろん無料です。 何をすればお金を貰えるのか?  ↓↓ http://boobooden.info/slp37/ 【 報酬例 Aさんの場合】  一晩で平均報酬3万円  3万円×15日=45万円/月   ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ★こちらが実際の体験談  ↓↓ http://boobooden.info/slp37/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From patterscq14 at holleytek.com Thu Mar 1 04:13:09 2012 From: patterscq14 at holleytek.com (=?koi8-r?B?IsnO18XT1M/SIg==?=) Date: Thu, 1 Mar 2012 17:43:09 +0530 Subject: =?koi8-r?B?99nEwd7BINLB2tLF28XOycogzsEg19fPxCDPwt/Fy9TP1yDXINzL0w==?= =?koi8-r?B?0MzVwdTBw8nA?= Message-ID: <01ccf7d2$c3f97480$ed043f65@patterscq14> СТРОИТЕЛЬНАЯ ЭКСПЕРТИЗА: негосударственная и государственная - как это будет работать? В соответствии с последними изменениями в Градостроительный кодекс, изменяется порядок прохождения экспертизы строительной документации, а также выдача разрешений на строительство. Поможем Вам сориентироваться в новых нормах проведения строительной экспертизы. Вы можете узнать: - последние изменения в градкодекс, вступающие в силу 01.04.2012 г. - порядок взаимодействия служб государственного строительного надзора и негосударственной экспертизы; порядок выдачи разрешения на строительство - обзор актуального законодательства: 337-ФЗ от 28.11.2011; 224-ФЗ от 18 июля 2011 года; N224-ФЗ и 243-ФЗ от 18 июля 2011 года и другие нормативно-правовые акты - новые положения архитектурно-строительного проектирования - актуальные вопросы планирования развития городских территорий и правого статуса объектов недвижимости Курс 12-13 марта, Санкт-Петербург. Условия и регистрация: (812) 6Ч2-ЧЗ-58 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 3102 bytes Desc: not available URL: From fkeyamn at yahoo.co.jp Thu Mar 1 00:48:03 2012 From: fkeyamn at yahoo.co.jp ( ѓ) Date: Thu, 01 Mar 2012 17:48:03 +0900 Subject: No subject Message-ID: <201202280851.q1S8plqv017525@proton.jfet.org> [高額報酬]SEXペットとして女性に尽くして下さい!! 最近、お金持ちのマダム達の間で"男を買い"が流行しています。 彼女達のSEXペットになってお金を稼ぎませんか?! フリメ登録するだけで月収数十万稼げるチャンスが手に入ります! http://boobooden.info/t02/ どうせ嘘だと思っていませんか?でもやってみなきゃ結果は分かり ませんよね?! 費用0円でリスクが全く無いので試すだけでも損は有りませんよ! 正直、当クラブはセレブ会から女性会員を集めているので年齢層が 高いですし全員が綺麗で大金持ちとはいえません!! ですが貴方のがんばり次第で最高の女性に巡り合え、リッチな生活 が手に入るんです!男性会員の少ない今がチャンスですよ!! 当クラブ会員一同、ご参加心よりお待ちしてます。 http://boobooden.info/t02/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From magnoliarenata at activeware.com Thu Mar 1 16:48:07 2012 From: magnoliarenata at activeware.com (Olympia Edda) Date: Thu, 01 Mar 2012 17:48:07 -0700 Subject: CANADIAN PHARMACY - FREE PILLS AND DISCOUNT CODE AVAILABLE! VIAGRA from $1.12 mtm4zd3z Message-ID: <201203011948.6CDCC7C25CADDB4E2C03AB@0p356e62> VIAGRA from $1.12 per pill BONUS BIG SALE! Prices for Viagra packages and other Men's Health medications reduced! CANADIAN PHARMACY - FREE PILLS AND DISCOUNT CODE AVAILABLE! http://onlinemedsphysic.ru From nikk-nikafylc at obrfc.com Thu Mar 1 03:10:20 2012 From: nikk-nikafylc at obrfc.com (=?koi8-r?B?IvrB3cnUwSDP1CDNwc7J0NXM0cPJyS4gIg==?=) Date: Thu, 1 Mar 2012 18:10:20 +0700 Subject: =?koi8-r?B?8sHT0M/azsHXwc7JxSDNwc7J0NXM0cPJySDXINbJ18/NIM/C3cXOyQ==?= =?koi8-r?B?yS4g?= Message-ID: <01ccf7d6$90204e00$de681a7b@nikk-nikafylc> Приглашаем на тренинг в Петербурге, посвящённый формированию практических навыков эффективного ведения переговоров и успешного достижения целей: Т Р У Д Н Ы Е П Е Р Е Г О В О Р Ы, П Р О Т И В О С Т О Я Н И Е М А Н И П У Л Я Ц И Я М. 26, 27 марта 2012 г., Санкт-Петербург (812) 642-43-84 ________________________________________ Методика тренинга Интенсивное обучение, основанное на практической отработке навыков и умений ведения переговоров; индивидуальный подход; работа с реальными ситуациями; деловые, ролевые и ситуативные игры; групповые и индивидуальные упражнения. Краткие теоретические и методические материалы. Использование аудио и видео аппаратуры. ПРОГРАММА:  Подготовка к переговорам: поиск и обработка информации; пространственная организация; постановка целей и разработка путей их реализации. - Установление контакта. - Проведение переговоров. - Стили ведения переговоров. Умение владеть собой и ситуацией. Как взаимодействовать с трудными партнерами по общению. Как обратиться с просьбой? Как сказать "нет" и не обидеть? Как похвалить, чтобы это не было лестью? Как выражать несогласие и отстаивать свою точку зрения? Что такое адекватная обратная связь? - Личностные особенности переговорщика. - Реализация плана: поведение в сложных ситуациях. Технологии и механизмы манипуляции. Корни манипуляции. Метафора манипуляции. Критерии манипуляции. Место манипуляции в системе человеческих взаимоотношений. Манипулятивные технологии. Механизмы манипулятивного воздействия. Распознавание манипуляции в живом общении. Манипуляция и вопросы этики. - Защита от манипуляции. Виды и механизмы защит. Межличностные и внутриличностные защиты. Специфические и неспецифические защиты. Базовые защитные установки. Чувственный и рациональный уровень. Конформизм, нонконформизм и внеконформизм. Укрепление защитного арсенала. Собранность и психотехники совладания. - Манипуляция и психологическое давление на переговорах. Информационный и психологический уровень манипуляции. Манипуляция фактами. Манипуляция полномочиями. Формы психологического давления. Способы противостояния манипуляции и психологическому давлению на переговорах. - Завершение обсуждения и фиксация договоренностей. Выход из контакта. - Техники снятия эмоционального напряжения. - Проведение комплексной ролевой игры ╚Деловые переговоры╩ (в благоприятных условиях). - Проведение комплексной ролевой игры ╚Деловые переговоры╩ (в неблагоприятных условиях). - Анализ и разбор игры. Выход из тренинга и общее завершение работы с подведением итогов. ________________________________________ По окончании тренинга участники смогут: проводить тщательную подготовку переговоров; Распознавать особенности участников переговоров; активно использовать средства вербальной и невербальной коммуникации для создания гармоничной атмосферы переговоров; прогнозировать и работать с возможными вопросами и возражениями; управлять эмоциями и быстро самовосстанавливаться; применять методы корректного психологического влияния на ход переговоров. Каждому участнику выдается Свидетельство о прохождении обучения. В стоимость семинара входят обеды и кофе-брейки. Вы можете ЗАРЕГИСТРИРОВАТЬСЯ, узнать условия участия, а также БЕСПЛАТНО получить ПОЛНУЮ программу семинара, список преподавателей и расписание у наших менеджеров по телефону в Санкт-Петербурге: (812) 642-43-84 From measl at mfn.org Thu Mar 1 19:13:24 2012 From: measl at mfn.org (J.A. Terranson) Date: Thu, 1 Mar 2012 21:13:24 -0600 (CST) Subject: CagePrisoners Newsletter Message-ID: ---------- Forwarded message ---------- Date: Wed, 29 Feb 2012 16:19:47 +0000 From: Editor Subject: CP Newsletter Visit our website www.cageprisoners.com ( http://www.cageprisoners.com/ ) MAYBE CHRISTOPHER TAPPIN SHOULD HAVE DONATED TO CAGEPRISONERS? Last Friday, Christopher Tappin turned himself into the custody of British police. He has since been extradited to the United States, where he faces charges for arms-dealing. * Read more... ( /index.php?option=com_k2&view=item&id=3603&Itemid=999 ) BAGRAM QURAN BURNING: HOW THE WAR IN AFGHANISTAN WAS LOST Burning Qurans in Afghanistan is a sure sign that the US battle for hearts and minds is lost * Read more... ( /index.php?option=com_k2&view=item&id=3569&Itemid=999 ) AN INTRODUCTION TO EFFECTIVE LOBBYING & CAMPAIGNING Practical guidelines and tips to bup-skillingb with the necessary information, tools and guidance to become not just active but proactive citizens b and ultimately to play a better and more efective role in society. * Read more... ( /index.php?option=com_k2&view=item&id=3530&Itemid=999 ) RENDITION: DID UK PLAY SECRET ROLE? New evidence has emerged of an alleged cover-up of Britainbs secret role in the b extraordinary renditionb of terror suspects * Read more... ( /index.php?option=com_k2&view=item&id=3602&Itemid=999 ) NYPD SURVEILLANCE ON AMERICAN MUSLIMS AIDED BY WHITE HOUSE CASH The money was part of the little-known High Intensity Drug Trafficking Area program, intended to help police fight drug crimes * Read more... ( /index.php?option=com_k2&view=item&id=3599&Itemid=999 ) AMERICAN IN NYC BOMB CASE WILL LIKELY FACE CHARGES (Reuters) - Lawyers for an American accused of building a pipe bomb said on Sunday they expected an indictment against him on terrorism and other charges to be unsealed in court this week. * Read more... ( /index.php?option=com_k2&view=item&id=3597&Itemid=999 ) ABSENT JUSTICE WITH MOAZZAM BEGG: SAVING THE FAROOQI FAMILY HOME This week Moazzam speaks to the family of Munir Farooqi who are fighting to save their family home from police seizure after he was convicted of terrorism-related offences last year * Read more... ( /index.php?option=com_k2&view=item&id=3594&Itemid=999 ) AFTER A WONDERFUL VISIT TO KUWAIT, NEW PLANS TO CLOSE GUANTCB!NAMO AND TO FREE THE LAST TWO KUWAITI PRISONERS Now that my first ever visit to Kuwait has come to an end b in which I was involved in events and discussions designed to raise the profile in Kuwait, and internationally, of the two remaining Kuwaitis in GuantC!namo, Fayiz al-Kandari and Fawzi al-Odah b I feel as though I have been away from my home in London for weeks, and not just for five days, as the time was so busy. * Read more... ( /index.php?option=com_k2&view=item&id=3593&Itemid=999 ) VIEW: A LICENCE TO KILL Judging from the recent polls, American voters seem pretty gung-ho on the use of unmanned drones to go after terrorists, which makes it unlikely that the US will agree to stop or scale down drone operations in Pakistan, especially in an election year * Read more... ( /index.php?option=com_k2&view=item&id=3580&Itemid=999 ) OBAMAC"BBS DRONE WAR: WAR ON TERROR OR WAR ON THE TERRORIZED? On January 30th, President Obama finally conceded that the United States was orchestrating drone strikes in Pakistan, insisting however that they are b kept on a very tight leashb . * Read more... ( /index.php?option=com_k2&view=item&id=3576&Itemid=999 ) Connect with us: Facebook ( http://www.facebook.com/#!/pages/Cageprisoners/122052607808255 ) Twitter ( http://twitter.com/#!/cageprisoners ) Cageprisoners Ltd 27 Old Gloucester Street London WC1N 3XX Tel: (+44) 2073776700 From mikkilaci at mygothicblog.com Thu Mar 1 12:32:51 2012 From: mikkilaci at mygothicblog.com (Simona Leeann) Date: Thu, 01 Mar 2012 22:32:51 +0200 Subject: Click For Details - Erection Pill 95% Success Rate. MenMax is Powerful! zwfdj Message-ID: <11d70w48o90-09260753-441n3j43@zlsueifvxz> MenMax Pills Erection Pill 95% Success Rate. MenMax is Powerful! Click For Details http://bestenlargementknown.ru From wagnl at softbank.jp Thu Mar 1 07:27:54 2012 From: wagnl at softbank.jp ( ) Date: Fri, 02 Mar 2012 00:27:54 +0900 Subject: No subject Message-ID: <201202281531.q1SFVcji023664@proton.jfet.org> 当倶楽部のマダムの肉欲を解消していただける方募集しています!!    【報酬1回3万円〜7万円】 内容はホテルで待ち合わせてSEXして頂くだけです。 ホテル代ももちろんこちらで負担します。 ⇒http://boobooden.info/slp37/ 人とそれぞれ好みがあると思いますので、 お相手はこちらのなかからお選び頂けます。 ⇒http://boobooden.info/slp37/ トラブル防止の為、報酬は行為の前に支払われますので 安心してご参加下さい。 ⇒http://boobooden.info/slp37/ このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp From nannieremona at zionsbank.com Thu Mar 1 18:30:11 2012 From: nannieremona at zionsbank.com (Madeleine Verdie) Date: Fri, 02 Mar 2012 00:30:11 -0200 Subject: HCG Pills For Weight Loss - HCG Diet Drops - 3X Guarantee tljn5esu Message-ID: <36o40m90d44-86503026-414o4i85@lldgazusxn> HCG Pills For Weight Loss - HCG Diet Drops - 3X Guarantee Best packages and prices on HCG Pills, with Triple Platinum Guarantee. Enjoy quick weight loss, and keep it off! Click for a thinner, healthier new you. http://hcgdietdirectfield.ru From measl at mfn.org Fri Mar 2 00:07:09 2012 From: measl at mfn.org (J.A. Terranson) Date: Fri, 2 Mar 2012 02:07:09 -0600 (CST) Subject: [Pigdog] Hallo Heimatlandsicherheitsdienst In-Reply-To: <20120229100700.GY7343@leitl.org> References: <20120229100700.GY7343@leitl.org> Message-ID: To be eligible for the Grand Prize (an all expenses paid vacation to a 3rd world interrogation room, aboard your own privately chartered Learjet), entries should be fowarded to at least 10 people in the US, UK, or NZ... //Alif On Wed, 29 Feb 2012, Eugen Leitl wrote: > Date: Wed, 29 Feb 2012 11:07:00 +0100 > From: Eugen Leitl > To: Schweinehundlisten , tt at postbiota.org > Subject: [Pigdog] Hallo Heimatlandsicherheitsdienst > > Department of Homeland Security (DHS) > Federal Emergency Management Agency (FEMA) > Coast Guard (USCG) > Customs and Border Protection (CBP) > Border Patrol > Secret Service (USSS) > National Operations Center (NOC) > Homeland Defense > Immigration Customs Enforcement (ICE) > Agent > Task Force > Central Intelligence Agency (CIA) > Fusion Center > Drug Enforcement Agency (DEA) > Secure Border Initiative (SBI) > Federal Bureau of Investigation (FBI) > Alcohol Tobacco and Firearms (ATF) > U.S. Citizenship and Immigration Services (CIS) > Federal Air Marshal Service (FAMS) > Transportation Security Administration (TSA) > Air Marshal > Federal Aviation Administration (FAA) > National Guard > Red Cross > United Nations (UN) > > Assassination > Attack > Domestic security > Drill > Exercise > Cops > Law enforcement > Authorities > Disaster assistance > Disaster management > DNDO (Domestic Nuclear Detection Office) > National preparedness > Mitigation > Prevention > Response > Recovery > Dirty Bomb > Domestic nuclear detection > Emergency management > Emergency response > First responder > Homeland security > Maritime domain awareness (MDA) > National preparedness initiative > Militia > Shooting > Shots fired > Evacuation > Deaths > Hostage > Explosion (explosive) > Police > Disaster medical assistance team (DMAT) > Organized crime > Gangs > National security > State of emergency > Security > Breach > Threat > Standoff > SWAT > Screening > Lockdown > Bomb (squad or threat) > Crash > Looting > Riot > Emergency Landing > Pipe bomb > Incident > Facility > > Hazmat > Nuclear > Chemical Spill > Suspicious package/device > Toxic > National laboratory > Nuclear facility > Nuclear threat > Cloud > Plume > Radiation > Radioactive > Leak > Biological infection (or event) > Chemical > Chemical burn > Biological > Epidemic > Hazardous > Hazardous material incident > Industrial spill > Infection > Powder (white) > Gas > Spillover > Anthrax > Blister agent > Exposure > Burn > Nerve agent > Ricin > Sarin > North Korea > > Outbreak > Contamination > Exposure > Virus > Evacuation > Bacteria > Recall > Ebola > Food Poisoning > Foot and Mouth (FMD) > H5N1 > Avian > Flu > Salmonella > Small Pox > Plague > Human to human > Human to ANIMAL > Influenza > Center for Disease Control (CDC) > Drug Administration (FDA) > Public Health > Toxic > Agro Terror > Tuberculosis (TB) > Agriculture > Listeria > Symptoms > Mutation > Resistant > Antiviral > Wave > Pandemic > Infection > Water/air borne > Sick > Swine > Pork > Strain > Quarantine > H1N1 > Vaccine > Tamiflu > Norvo Virus > Epidemic > World Health Organization (WHO and components) > Viral Hemorrhagic Fever > E. Coli > > Infrastructure security > Airport > CIKR (Critical Infrastructure & Key Resources) > AMTRAK > Collapse > Computer infrastructure > Communications infrastructure > Telecommunications > Critical infrastructure > National infrastructure > Metro > WMATA > Airplane (and derivatives) > Chemical fire > Subway > BART > MARTA > Port Authority > NBIC (National Biosurveillance Integration Center) > Transportation security > Grid > Power > Smart > Body scanner > Electric > Failure or outage > Black out > Brown out > Port > Dock > Bridge > Canceled > Delays > Service disruption > Power lines > > Drug cartel > Violence > Gang > Drug > Narcotics > Cocaine > Marijuana > Heroin > Border > Mexico > Cartel > Southwest > Juarez > Sinaloa > Tijuana > Torreon > Yuma > Tucson > Decapitated > U.S. Consulate > Consular > El Paso > Fort Hancock > San Diego > Ciudad Juarez > Nogales > Sonora > Colombia > Mara salvatrucha > MS13 or MS-13 > Drug war > Mexican army > Methamphetamine > Cartel de Golfo > Gulf Cartel > La Familia > Reynose > Nuevo Leon > Narcos > Narco banners (Spanish equivalents) > Los Zetas > Shootout > Execution > Gunfight > Trafficking > Kidnap > Calderon > Reyosa > Bust > Tamaulipas > Meth Lab > Drug trade > Illegal immigrants > Smuggling (smugglers) > Matamoros > Michoacana > Guzman > Arellano-Felix > Beltran-Leyva > Barrio Azteca > Artistics Assassins > Mexicles > New Federation > > Terrorism > Al Queda (all spellings) > Terror > Attack > Iraq > Afghanistan > Iran > Pakistan > Agro > Environmental terrorist > Eco terrorism > Conventional weapon > Target > Weapons grade > Dirty bomb > Enriched > Nuclear > Chemical weapon > Biological weapon > Ammonium nitrate > Improvised explosive device > IED (Improvised Explosive Device) > Abu Sayyaf > Hamas > FARC (Armed Revolutionary Forces Colombia) > IRA (Irish Republican Army) > ETA (Euskadi ta Askatasuna) > Basque Separatists > Hezbollah > Tamil Tiger > PLF (Palestine Liberation Front) > PLO (Palestine Libration Organization) > Car bomb > Jihad > Taliban > Weapons cache > Suicide bomber > Suicide attack > Suspicious substance > AQAP (Al Qaeda Arabian Peninsula) > AQIM (Al Qaeda in the Islamic Maghreb) > TTP (Tehrik-i-Taliban Pakistan) > Yemen > Pirates > Extremism > Somalia > Nigeria > Radicals > Al-Shabaab > Home grown > Plot > Nationalist > Recruitment > Fundamentalism > Islamist > > Emergency > Hurricane > Tornado > Twister > Tsunami > Earthquake > Tremor > Flood > Storm > Crest > Temblor > Extreme weather > Forest fire > Brush fire > Ice > Stranded/Stuck > Help > Hail > Wildfire > Tsunami Warning Center > Magnitude > Avalanche > Typhoon > Shelter-in-place > Disaster > Snow > Blizzard > Sleet > Mud slide or Mudslide > Erosion > Power outage > Brown out > Warning > Watch > Lightening > Aid > Relief > Closure > Interstate > Burst > Emergency Broadcast System > > Cyber security > Botnet > DDOS (dedicated denial of service) > Denial of service > Malware > Virus > Trojan > Keylogger > Cyber Command > 2600 > Spammer > Phishing > Rootkit > Phreaking > Cain and abel > Brute forcing > Mysql injection > Cyber attack > Cyber terror > Hacker > China > Conficker > Worm > Scammers > Social media > > _______________________________________________ > Pigdog mailing list > Pigdog at lists.pigdog.org > http://lists.pigdog.org/listinfo.cgi/pigdog-pigdog.org > //Alif -- "A reputable physician does NOT: promise a cure; demand advance payment; advertise." [Capitalization as in original] [1936] U.S. Public Health Service poster alerting the public to the dangers of "Quack Cancer Cures" specifically, and "Quackery" in general. From sevilla at temporingett.com Fri Mar 2 04:14:24 2012 From: sevilla at temporingett.com (=?koi8-r?B?IuvPzcnUxdQg58/T1cTB0tPU18XOzs/HzyDT1NLPydTFzNjOz8fPIA==?= =?koi8-r?B?zsHE2s/SwSI=?=) Date: Fri, 2 Mar 2012 04:14:24 -0800 Subject: =?koi8-r?B?5/Lh5O/z9PLv6iAyMDEy?= Message-ID: <01ccf82a$f33bd000$508afede@sevilla> Строители! А вы готовы к 1-ому апреля? С 1 апреля 2012 года вступят в силу новые нормы Градостроительного кодекса РФ, уточняющие основания и порядок осуществления государственной и негосударственной экспертизы проектной документации и результатов инженерных изысканий. - Последние изменения в законодательстве, регулирующие строительную деятельность - Сложные вопросы бухгалтерского и налогового учета строительных и подрядных организаций - Правовое регулирование вопросов эксплуатации зданий и сооружений - Новый порядок выдачи разрешения на строительство - Ценообразование и сметное нормирование в строительстве - Федеральный закон от 18 июля 2011 года N 243-ФЗ "О внесении изменений в Градостроительный кодекс РФ и отдельные законодательные акты РФ" Эти и другие вопросы в ультра-актуальном мероприятии: "СТРОИТЕЛЬНАЯ ДЕЯТЕЛЬНОСТЬ: ПРАВОВОЕ РЕГУЛИРОВАНИЕ СТРОИТЕЛЬСТВА ОБЪЕКТОВ НЕДВИЖИМОСТИ. НАЛОГОВЫЕ АСПЕКТЫ. ПРАКТИЧЕСКИЕ ВОПРОСЫ СТРОИТЕЛЬНОЙ ДЕЯТЕЛЬНОСТИ" ! РЕГИСТРАЦИЯ и условия по телефону: |812| 6Ч2.О7...76 From quintettes81 at remove.zmaildirect.com Fri Mar 2 03:09:47 2012 From: quintettes81 at remove.zmaildirect.com (Erich Puckett) Date: Fri, 2 Mar 2012 12:09:47 +0100 Subject: =?koi8-r?B?8sHT0NLPxMHWwSDLwdLMycvP19nIIMTF0sXX2MXXIMLPztPByiDEzyAz?= =?koi8-r?B?MSDPy9TRwtLRIQ==?= Message-ID: <000d01ccf864$fafbb640$6400a8c0@quintettes81> Распродажа японских цветущих карликовых деревьев бонсай до 31 октября! Бесплатная доставка за 2 часа или в любое удобное для Вас время Звоните (495) 410-87-03 Цветущая кармона бонсай Высота 30 см. Возраст 7 лет 8 000 рублей  4 000 рублей Цветущая кармона-домашнее дерево Высота 55 см. Возраст 17 лет 20 000 рублей 10 000 рублей С каждым деревом в подарок удобрения и статуэтка под бонсай!   Московская бонсай галерея. Звоните (495) 410-87-03 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2996 bytes Desc: not available URL: -------------- next part -------------- From subscriptions at irs.com Fri Mar 2 04:12:16 2012 From: subscriptions at irs.com (subscriptions at irs.com) Date: Fri, 2 Mar 2012 14:12:16 +0200 Subject: Festal prices only at our drug store Message-ID: <4F50B90B.107070@irs.com> Google -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 341 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: google.jpg Type: image/gif Size: 32909 bytes Desc: not available URL: From tawnyasheba at iaai.com Fri Mar 2 15:01:30 2012 From: tawnyasheba at iaai.com (Eleonora) Date: Fri, 02 Mar 2012 16:01:30 -0700 Subject: Best Male Sexual Enhancement Product. Delivery in 2-3 Days Worldwide. auxma7 Message-ID: <93x58y20s61-08030264-854j5t17@uovbulma> Best Site For Penis Pill Best Male Sexual Enhancement Product. Delivery in 2-3 Days Worldwide. Try it Risk Free for 60 Days. http://penislargewarehouse.ru From marisolfitzpatrick_dp at teltronics.com Fri Mar 2 02:40:49 2012 From: marisolfitzpatrick_dp at teltronics.com (=?koi8-r?B?ItPFzcnOwdLZIMTM0SDJztfF09TP0s/XIg==?=) Date: Fri, 2 Mar 2012 16:10:49 +0530 Subject: =?koi8-r?B?89TB1NXTICDawcvB2t7Jy8Eu?= Message-ID: <01ccf88f$084a4a80$71f7b07a@marisolfitzpatrick_dp> Строители! А вы готовы к 1-ому апреля? С 1 апреля 2012 года вступят в силу новые нормы Градостроительного кодекса РФ, уточняющие основания и порядок осуществления государственной и негосударственной экспертизы проектной документации и результатов инженерных изысканий. - Последние изменения в законодательстве, регулирующие строительную деятельность - Сложные вопросы бухгалтерского и налогового учета строительных и подрядных организаций - Правовое регулирование вопросов эксплуатации зданий и сооружений - Новый порядок выдачи разрешения на строительство - Ценообразование и сметное нормирование в строительстве - Федеральный закон от 18 июля 2011 года N 243-ФЗ "О внесении изменений в Градостроительный кодекс РФ и отдельные законодательные акты РФ" Эти и другие вопросы в ультра-актуальном мероприятии: "СТРОИТЕЛЬНАЯ ДЕЯТЕЛЬНОСТЬ: ПРАВОВОЕ РЕГУЛИРОВАНИЕ СТРОИТЕЛЬСТВА ОБЪЕКТОВ НЕДВИЖИМОСТИ. НАЛОГОВЫЕ АСПЕКТЫ. ПРАКТИЧЕСКИЕ ВОПРОСЫ СТРОИТЕЛЬНОЙ ДЕЯТЕЛЬНОСТИ" ! РЕГИСТРАЦИЯ и условия по телефону: |812| 6Ч2..О7_76 From fenian547 at rozylowicz.com Fri Mar 2 03:35:20 2012 From: fenian547 at rozylowicz.com (=?koi8-r?B?8MXMwcfF0Q==?=) Date: Fri, 2 Mar 2012 17:05:20 +0530 Subject: Message-ID: Добрый день, Представляю Вашему вниманию эксклюзивные коллекции фильмов, сериалов, мультфильмов и документальных фильмов записанные на жестких дисках и медиа плеерах по низким праздничным ценам! http://www.зарубежныефильмы.рф Мы добавили новую коллекцию из 110 лучших фильмов США в Full HD качестве по версии популярного рейтинга кинопоиск. Спешите сделать заказ и насладиться лучшими фильмами Америки! С уважением, Злата From barnabyw752 at reelhorror.com Fri Mar 2 02:08:02 2012 From: barnabyw752 at reelhorror.com (=?koi8-r?B?+s/R?=) Date: Fri, 2 Mar 2012 18:08:02 +0800 Subject: Re Message-ID: Здравствуйте дорогие друзья! Поздравляю вас с наступлением весны и желаю весеннего настроения! Дорогие мужчины, вы наверняка сейчас ломаете голову, чтобы подарить своей любимой женщине или просто подруге. Восьмое марта уже на носу. Забудьте о банальностях. Удивите свою женщину! Подарите ей идеальный подарок! Почему он идеальный? Скажу вам по секрету, этот подарок для вас двоих. Именно вы, в первую очередь, заинтересованы в том, чтобы ваша женщина смотрела коллекции фильмов и сериалы рядом с вами. Вы ведь заинтересованы, > чтобы сократились или совсем исчезли ссоры и разногласия? > чтобы женщина перестала капризничать и предъявлять к вам завышенные требования? > чтобы она, наконец , вас услышала и поняла, когда вы говорите о действительно важных для вас вещах? > чтобы секс с вашей женщиной стал еще более потрясающим и незабываемым? Если вы ответили ДА хотя бы на один вопрос, тогда не раздумывая переходите по ссылке и заказывайте своей любой лучшую коллекцию фильмов на жестком диске или медиа плеере! Тут есть выбор: www.видеофильмы2011.рф Уверяю лучше подарка вы не найдете! From stengel31 at readingbody.com Fri Mar 2 16:35:56 2012 From: stengel31 at readingbody.com (=?koi8-r?B?6MHCwdLP18Eg7C7wLiDJIPDPzNHLz9fBIO0u8y4=?=) Date: Fri, 2 Mar 2012 19:35:56 -0500 Subject: =?koi8-r?B?7uTzINcgMjAxMiDHz8TV?= Message-ID: <000d01ccf8d5$98dd8a80$6400a8c0@stengel31> 13 марта 2012 г. НДС в 2012 году +7 499 - 4Ч5-40/95 \\\/// +7 (499) - 4Ч5/39*68 Программа: 10.00 √ 13.00. НДС: новое в методологии и практике исчисления в 2012 году. Лектор: Хабарова Л. П. 1. Налоговая база (уступка права требования, безвозмездная передача, СМР и др.). Момент определения налоговой базы. Новое в учете курсовых и суммовых разниц в налоговой базе 2. Счета-фактуры: сложные ситуации (возврат товаров, скидки, штрафные санкции по хоздоговорам, приобретение и реализация товаров через обособленные подразделения). Корректировочные счета-фактуры 3. Налоговые вычеты в сложных ситуациях: по авансам выданным; по нормируемым расходам; по ОС и НМА; по коммунальным платежам при аренде; при переуступке права требования; в отношении объектов недвижимости при их строительстве, модернизации, реконструкции; при изменении стоимости отгруженных товаров (выполненных работ, оказанных услуг); в случаях, когда обязательство об уплате предусмотрено в рублях в сумме, эквивалентной сумме в иностранной валюте или в условных единицах, и пр. 4. Восстановление НДС: при ликвидации объекта ОС; по недостачам, выявленным при инвентаризации; в иных случаях (с учетом норм гл. 21 НК РФ, измененных Законом ╧ 245-ФЗ) 5. Необлагаемые операции. Отказ от льгот. Раздельный учет по НДС. 14.00 √ 17.00 Налог на прибыль: новое с 2012 года. Особенности формирования отчетности за 2011 год. Налоговая учетная политика. Лектор: Полякова М. С. 1. Изменения по налогу на прибыль с 2012 года * Списание расходов на компьютерные программы * Новые правила налогового учета НИОКР с 2012 года * Создание консолидированной группы налогоплательщиков в целях исчисления налога на прибыль с 2012 года * Другие изменения по налогу на прибыль с 2012 г. (сопоставимые долговые обязательства, резерв расходов в НКО, социальная реклама, поступления от жителей на капремонт многоквартирного дома) 2. Что нужно учитывать при составлении налоговой декларации за 2011 год * Особенности налогового учета нематериальных активов * Расходы на содержание обслуживающего производства (хозяйства) * Проценты по долговым обязательствам * Увеличение чистых активов организации за счет помощи акционеров (участников, собственников) * Применение нулевой ставки налога на прибыль с дивидендов * Применение нулевой ставки налога на прибыль в образовательных и медицинских организациях * Ограничение по переносу убытка на будущие периоды * Как определять обязанность по уплате ежемесячных авансовых платежей 3. Особенности формирования налоговой учетной политики на 2012 год. Стоимость участия: 8 000 рублей Информацию можно получить по телефонам: 8 (499) 445.ЧО_95 \\// +7 499 ЧЧ5Ч*095 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4980 bytes Desc: not available URL: From coderman at gmail.com Fri Mar 2 22:06:20 2012 From: coderman at gmail.com (coderman) Date: Fri, 2 Mar 2012 22:06:20 -0800 Subject: 8107 odell rd Message-ID: speaking of fun topics, anyone know what the sign reads at: 8107 Odell Rd Laurel, MD 20708 ? From supermarketskr80 at rescuewelding.com Fri Mar 2 10:10:10 2012 From: supermarketskr80 at rescuewelding.com (=?koi8-r?B?8M/S0cTPyyDXxcTFzsnR?=) Date: Sat, 3 Mar 2012 02:10:10 +0800 Subject: =?koi8-r?B?7s/X2cog8M/S0cTPyyDXxcTFzsnRIMvB09PP19nIIM/QxdLBw8nK?= Message-ID: 15 марта 2012 г. КАССОВЫЕ ОПЕРАЦИИ. НОВЫЙ ПОРЯДОК ВЕДЕНИЯ КАССОВЫХ ОПЕРАЦИЙ, ВСТУПИВШИХ В ДЕЙСТВИЕ 1 ЯНВАРЯ 2012 ГОДА 8 (499) 4Ч5/4О\95 <<<>>> 8 (499) Ч45З9.68 С 1 января 2012 года в РФ установлен новый порядок ведения кассовых операций, обязательный для всех организаций, а теперь – и для индивидуальных предпринимателей. Изменений много и они коснулись почти всех сложных моментов осуществления операций с наличными деньгами. Мы уделим внимание всем новшествам, а также тем проблемам, которые остаются неразрешенными! Программа: 1. Новое Положение о порядке ведения кассовых операций от 12.10.2011 № 373-П. Обзор новшеств. 2. Необходимые локальные акты по организации кассовой работы. 3. Новые принципы установления лимита остатка кассы и новые требования к его соблюдению. 4. Новые требования и возможности при ведении кассовой книги. Новые требования к заполнению расходных ордеров. Особенности заполнения приходных ордеров. Ведении книги учета принятых и выданных денежных средств с учетом нового порядка. Особенности оформление кассовых документов – за что штрафуют налоговые органы в 2012 году? 5. Выдача денег по доверенности: совершенно новый порядок в 2012 году. 6. Переход на оформление кассовых документов в электронном виде: новые возможности и обязанности. 7. Новый порядок работы с подотчетными суммами. 8. Денежные документы и БСО: порядок хранения в кассе и учета на счетах, выдачи, отчета ответственных лиц. БСО и НДС. 9. Лимит расчетов наличными: сложные ситуации и типичные ошибки. Наличная выручка и порядок ее расходования без сдачи в банк. 10. Применение ККМ. Расчеты с применением платежных банковских карт. Возвраты покупателям наличных в случае отказа от товара в день приобретения и позже. 11. Изменение требований к оборудованию кассовых комнат и хранению денежных средств. 12. Должность кассира: обязанности, ответственность. Совмещение и временное замещение должности кассира. Новые условия возложения материальной ответственности на кассира. 13. Контроль за осуществлением кассовых операций. Кто может Вас проверять и какие санкции грозят. Что изменилось в 2012 году? Типичные нарушения со стороны контролеров: как отстоять свою правоту. Стоимость участия: 8 000 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 (495) 792-21/22 ; 8 (495) 792-21/22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4092 bytes Desc: not available URL: From measl at mfn.org Sat Mar 3 01:39:28 2012 From: measl at mfn.org (J.A. Terranson) Date: Sat, 3 Mar 2012 03:39:28 -0600 (CST) Subject: 8107 odell rd In-Reply-To: References: Message-ID: On Fri, 2 Mar 2012, coderman wrote: > speaking of fun topics, anyone know what the sign reads at: > > 8107 Odell Rd Laurel, MD 20708 > > ? Good luck with that: it's been intentionally blurred (circular blur zone). Likely just a playground for some lettered agency. //Alif -- "A reputable physician does NOT: promise a cure; demand advance payment; advertise." [Capitalization as in original] [1936] U.S. Public Health Service poster alerting the public to the dangers of "Quack Cancer Cures" specifically, and "Quackery" in general. From delenatracy at pacificnet.net Fri Mar 2 19:52:02 2012 From: delenatracy at pacificnet.net (Reita) Date: Sat, 03 Mar 2012 04:52:02 +0100 Subject: Click for a thinner, healthier new you. HCG Pills For Weight Loss Fast 9sln Message-ID: <44y56t98m41-20925094-582v7d76@ozuwpzdii> HCG Pills For Weight Loss - HCG Diet Drops - 3X Guarantee Best packages and prices on HCG Pills, with Triple Platinum Guarantee. Enjoy quick weight loss, and keep it off! Click for a thinner, healthier new you. http://hcgdietdirectbut.ru From stefanieeula at adopt-now.com Fri Mar 2 21:33:18 2012 From: stefanieeula at adopt-now.com (Alyssa Suzan) Date: Sat, 03 Mar 2012 05:33:18 +0000 Subject: Cialis 20mg x 100 Pills $155, We accept VISA Payments, 90000+ Satisfied Customers! 7octc61l Message-ID: <66k28n86a43-19953848-041b5l61@xeorwsbwoo> Best Buy Cialis Generic Online Cialis 20mg x 100 Pills $155, We accept VISA Payments, 90000+ Satisfied Customers! Free Pills & Reorder Discount Top Selling 100% Quality & Satisfaction guaranteed! http://onlinedrugspharmacy.ru From jya at pipeline.com Sat Mar 3 04:07:17 2012 From: jya at pipeline.com (John Young) Date: Sat, 03 Mar 2012 07:07:17 -0500 Subject: 8107 odell rd In-Reply-To: References: Message-ID: Although the sign likely does not say so, that entrance is to a State Department-CIA communications facility. Another entrance nearby goes to the CIA-NSA Special Collections Service which develops the technology and prepares and runs operations for black bag and bugging jobs. This has a pretty detailed description with names and titles of personnel a few years back: http://cryptome.org/state-cia.htm Bing.com/maps has oblique views From nkjlkj at gmail.com Fri Mar 2 19:28:55 2012 From: nkjlkj at gmail.com (R RI) Date: Sat, 03 Mar 2012 12:28:55 +0900 Subject: No subject Message-ID: <201203010332.q213WalH031584@proton.jfet.org> [高額報酬]SEXペットとして女性に尽くして下さい!! 最近、お金持ちのマダム達の間で"男を買い"が流行しています。 彼女達のSEXペットになってお金を稼ぎませんか?! フリメ登録するだけで月収数十万稼げるチャンスが手に入ります! http://boobooden.info/t02/ どうせ嘘だと思っていませんか?でもやってみなきゃ結果は分かり ませんよね?! 費用0円でリスクが全く無いので試すだけでも損は有りませんよ! 正直、当クラブはセレブ会から女性会員を集めているので年齢層が 高いですし全員が綺麗で大金持ちとはいえません!! ですが貴方のがんばり次第で最高の女性に巡り合え、リッチな生活 が手に入るんです!男性会員の少ない今がチャンスですよ!! 当クラブ会員一同、ご参加心よりお待ちしてます。 http://boobooden.info/t02/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From r.rohozinski at psiphon.ca Sat Mar 3 17:16:14 2012 From: r.rohozinski at psiphon.ca (Rafal Rohozinski) Date: Sat, 3 Mar 2012 17:16:14 -0800 Subject: [liberationtech] Kill the Messenger: What Russia taught Syria Message-ID: Good article on TAC SIGINT capabilities for laypersons. Rafal http://www.foreignpolicy.com/articles/2012/03/02/kill_the_messenger?page=full Kill the Messenger What Russia taught Syria: When you destroy a city, make sure no one -- not even the story -- gets out alive. BY ROBERT YOUNG PELTON | MARCH 2, 2012 It was a star-filled night in Chechnya's besieged capital of Grozny. The snow crunched under my feet as I walked with the Chechen rebel commander away from the warmth of our safe house. When we entered a bombed-out neighborhood 15 minutes away, I put the battery in my Iridium satellite phoneand waited for the glowing screen to signal that I had locked on to the satellites. I made my call. It was short. Then the commander made a call; he quickly hung up and handed me back the phone. "Enough," he said, motioning for me to remove the battery. As we walked briskly back to the safe house, it was exactly 10 minutes before the cascade of double wa-whumps announced the Grad rocket batteries pounding the vacant neighborhood we had just left. It was December 1999, and the Russian assault on Grozny was unfolding in all its gruesome detail. After the dissolution of so much of the former Soviet empire, Chechnya was one country that the newly minted prime minister, Vladimir Putin, refused to let go of. His boss, Boris Yeltsin, and the Russian army had been defeated and then humiliated in the media by Chechen forces in the first war. Five years later, Russia was back. And Putin's new strategy was unbending: silence, encircle, pulverize, and "cleanse." It was a combination of brutal tactics -- a Stalinist purge of fighting-age males plus Orwellian propaganda that fed Russians a narrative wherein Chechen freedom fighters were transformed into Islamist mercenaries and terrorists. More than 200,000 civilians were to die in this war, the echoes of which continue to this day. This time, journalists were specifically targeted to prevent sympathetic or embarrassing reports from escaping the killing zone. As such, you can't find a lot of stories about the second Chechen war. One of the few and best accounts was written by Marie Colvin, who described her terrifying escape from Grozny for the Sunday Times. Last month, Colvin thought she could roll the dice and enter the besieged Syrian city of Homs to defy yet another brutal war of oppression. This time she lost. It's impossible to know whether Syrian President Bashar al-Assad -- a longtime ally of Russia -- studied the success of the last Chechen war before launching his own assault on the restive city of Homs. However, his Russian military advisors surely know the tactics well. The crackdown in Homs carries a grim echo of Grozny, both in its use of signals intelligence to track down and silence the regime's enemies and in its bloody determination to obliterate any opposition, including Western journalists. Assad's ability to lethally target journalists using satellite-phone uplinks could well have cost Colvin her life. Multiple reports have suggested that Syrian forces used phone signals to pinpoint her location and then launched a rocket barrage that resulted in her death on Feb. 22, along with that of French photographer Remi Ochlik and multiple Syrian civilians. The use of satellite and cellular transmissions to determine a subject's location was relatively new a decade ago, when I was in Grozny. Tracking phone transmissions to hunt down targets began in earnest with a covert unit of U.S. intelligence officers from the National Security Agency (NSA), CIA, Navy, Air Force, and special operations called "The Activity." This snooping unit was also called the Army of Northern Virginia, Grey Fox, and even Task Force Orange. We see much of this technology used to inform modern drone and U.S. Joint Special Operations Command strikes. My decade covering U.S. spec ops, intelligence gathering, and their contractors highlighted the impressive ability of various countries to monitor, locate, network, and act on what is called SIGINT, or signals intelligence. The Russians have their own version of this capability, which fell under the command of the Federal Agency of Government Communications and Information, now part of the Federal Protective Service. In the United States, it would be equivalent to the NSA and FBI combined, and the agency provides sophisticated eavesdropping support to Russia's military, intelligence, and counterterrorism units -- and to Russia's allies, including Syria. Russia has spent a long time perfecting these techniques. On April 21, 1996, Chechnya's breakaway president, Dzhokhar Dudayev, was speaking on a satellite phone with Russian envoy Konstantin Borovoi about setting peace talks with Yeltsin. During the phone call, he was killed by a signal-guided missile fired from a Russian jet fighter. The warplane had received Dudayev's coordinates from a Russian ELINT (electronic intelligence) plane that had picked up and locked on to the signal emitted by the satellite phone. It was Russian deception and brutality at its finest. It should have been clear even back then that there was a benefit and a distinct penalty to modern communications on the battlefield. Flash forward to Syria today. The opposition Free Syrian Army is officially run by a former air force colonel who commands a barely organized group of army defectors supported by energetic youth. They rely almost entirely on cell-phone service, satellite phones, the Internet, and social media to organize and communicate. Early in February, according to a Fox News report, Qatar provided3,000 satellite phones, which the Syrian rebels have used to upload numerous impactful videos and stories. These past few weeks, under a barrage of mortar, tank, and artillery shells, their plaintive calls for help from inside the besieged Baba Amr neighborhood of Homs sparked international outrage. But without Western journalists filing for newspapers and television outlets, these videos -- mostly shaky, low-resolution footage of corpses and artillery strikes -- wouldn't have had the impact they deserve. In a welcome resurgence of non-embedded journalism, brave reporters like Colvin and many others risked their lives to enter Homs and report from the ground. What they showed us was moving, horrific, and embarrassing. Once again, Western governments were caught doing nothing -- while women, children, and innocents were murdered by their own government. It's a playbook the Syrians are good at: The shelling of Homs began on Feb. 3, 2012 -- exactly 30 years after the Hama massacre, in which Hafez al-Assad, Bashar's father, killed up to 15,000 civilians over three weeks in a similar program of wanton destruction. What we haven't seen as clearly is the extent to which the Syrian regime (thanks to its Russian advisors) now has the tools of electronic warfare to crush this popular uprising -- and anything that happens to get in the way. Syria is one of Russia's biggest clients for weapons, training, and intelligence. In return for such largesse, it has offered the Russian Navy use of Tartus, a new deep-water military port in the Mediterranean. Moscow sold Damascus nearly $1 billion worth of weapons in 2011, despite growing sanctions against the oppressive Assad regime. With these high-tech weapons comes the less visible Russian-supplied training on technologies, tactics, and strategies. The sounds of rockets pulverizing civilians should have brought back memories and warnings to Colvin. She would have recognized all the signs from her previous reporting in Chechnya, where she and her escorts were hunted relentlessly by Russian domestic security agents who sought to arrest, silence, or kill any journalist attempting to report on the slaughter of civilians. My time in Grozny included being surrounded three times by the Russian army, numerous direct bombardments, and frequent close calls. I paid attention to the safety warnings of the Chechen rebel commanders who kept me alive. These rebels were once part of the Soviet military and intelligence apparatus and were fully schooled in Russia's dirty tricks. They taught me much. Chief among them was not communicating electronically while in country, not trusting "media guides," and never telling people where I was going. If captured by Russian troops, they urged me -- for my own safety -- to say that I had been kidnapped by Chechen forces. Just as I exited Chechnya, I met Colvin, who was heading in. She wanted to know as much as she could. I warned her of the duplicity and violent intent of the Russian military and their Chechen proxies. Despite my warnings, she bravely entered Chechnya and wrote riveting, award-winning stories that now sound almost identical to her coverage from Syria. I was distressed to read of Colvin's death in Syria, and even more distressed to think she might still be alive now if she had remembered some basic warnings. Her first error was that she stayed inside the rebel "media center" -- in reality, a four-story family home converted to this use as it was one of the few places that had a generator. The second was communication. The Syrian army had shut down the cell-phone system and much of the power in Baba Amr -- and when journalists sent up signals it made them a clear target. After CNN's Arwa Damon broadcast live from the "media center" for a week, the house was bombarded until the top floor collapsed. Colvin may have been trapped, but she chose to make multiple phone reports and even went live on CNN and other media channels, clearly mentioning that she was staying in the bombed building. The third mistake was one of tone. She made her sympathies in the besieged city clearly known as she emotionally described the horrors and documented the crimes of the Syrian government. Unsurprisingly, the next day at 9 a.m., a barrage of rockets was launched at the "media center." She was killed -- along her cameraman, Remi Ochlik, and at least 80 Syrian civilians across the city -- targeted with precision rocket barrages, bombs, and the full violence of the Syrian army. In Grozny, Russian forces decided that they would eliminate everything, everybody, and every voice that stood up to the state -- including journalists who tried to enter. Syria has clearly made the same determination in Homs. This military action is intended to be a massacre, a Stalinist-style lesson to those who dare defy the rulers of Syria. The United Nations estimates that more than 7,500 Syrians have so far been killed in the yearlong spasm of violence there. Perhaps this ghastly toll would be even higher now if brave reporters like Colvin had not entered. With the recent news that the rebels have retreated from the bombardment of Baba Amr to safer territory, Assad's forces, as well as their Russian advisors, are claiming victory. According to official news reports from the Syrian Information Ministry, "the foreign-backed mercenaries and armed terrorist groups" have fled, the corpses of three Western journalists have been "discovered," and Homs is now "peaceful." Despite what Damascus claims, this fight is not yet over. And we need more brave and bright journalists who will shine a light in places like Syria, where a regime works diligently to plunge its people into darkness. But let's not forget whose callous playbook they're using. Save big when you subscribe to FP. LOUAI BESHARA/AFP/Getty Images _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From armandanelly at syngenta.com Sat Mar 3 13:31:55 2012 From: armandanelly at syngenta.com (Marquitta Dion) Date: Sat, 03 Mar 2012 18:31:55 -0300 Subject: Enjoy quick weight loss, and keep it off! Click for a thinner, healthier new you. orpetd3 Message-ID: <93x18p57j43-56573241-285v9w73@tpgaw37sse> HCG Pills For Weight Loss - HCG Diet Drops - 3X Guarantee Best packages and prices on HCG Pills, with Triple Platinum Guarantee. Enjoy quick weight loss, and keep it off! Click for a thinner, healthier new you. http://hcgdietdirectpartial.ru From brianc at smallworldnews.tv Sat Mar 3 20:51:40 2012 From: brianc at smallworldnews.tv (Brian Conley) Date: Sat, 3 Mar 2012 20:51:40 -0800 Subject: [liberationtech] Kill the Messenger: What Russia taught Syria Message-ID: I have to respecfully disagree. If our only concern is to properly scare people about the implications of targeting based on RF transmissions, then yes, the article does a good job of that. My concern is to ensure that journalists, activists, and their enablers have access to the best information and the most likely/accurate review of events about which we may never have "facts." I guess I should specify the elements of the article that I consider to be sensational, speculative, and/or downright misleading/scare-mongering. First of all, Mr. Pelton is well known for being a glory-hound, his book "The World's Most Dangerous Places" should be enough to make that clear. So firstly, he starts with his own "glory days" covering Chechnya, and the first issue I would raise is this quote: "As we walked briskly back to the safe house, it was exactly 10 minutes before the cascade of double *wa-whumps* announced the Grad rocket batteries pounding the vacant neighborhood we had just left." Mr. Pelton has mentioned previously in a forum of journalists, human rights reporters, and their colleagues(fixers, translators etc), known as the Vulture Club, that the Russians have equipment that can lock onto an RF signal and fire Grad rockets at the location within a matter of minutes, taking merely 10 minutes from starting a phone call to hitting the location. I asked him repeatedly if he would clarify which targeting system, specifically, Unfortunately none of the details he provided suggested such a capacity, therefore while it's certainly possible this capacity exists, to just state it as fact, to my mind, qualifies as scaremongering, and does not serve to improve our general understanding of the risks of satellite communications. There follows three paragraphs serving only to establish that yes indeed journalists have been directly targeted in Russia's war in Chechnya. This is then used to suggest it is self-evident that: " journalists were specifically targeted to prevent sympathetic or embarrassing reports from escaping the killing zone." This is just outright unsubstantiated. There was one account in the Telegraph paper that sourced Lebanese intelligence stating that the Syrian regime has claimed it would target journalists directly. If it is prime facie fact, isn't it strange that there is only one source and no other papers directly carried this allegation? Next Mr. Pelton asserts that satellite phone uplinks: "could well have cost Colvin her life." and "Multiple reports have suggested that Syrian forces used phone signals to pinpoint her location" Now then, if Mr. Pelton were simply another ignorant journalist printing what he understood as potential threats, that would be one thing, however he has been privy to extended discussions about the relative improbability that satellite phones were targeted, vs the much more likely case that the VSAT and/or BGAN on the roof of the "makeshift media centre" or, equally likely, old-fashioned human intelligence targeting resulted in the deaths of the individuals noted. Further these "multiple reports" are essentially rehashings of the same initial report, of which Mr. Pelton should be well aware. It is very sad that Colvin and Ochlik were killed, and other journalists grievously wounded. It's even more sad that so many Syrians lost their lives evacuating the survivors. Given these facts and the importance of honoring their loss, I would prefer to see less hyperbole and sensationalism and more soul-searching and review of just how these events happened. As I stated last week on this list, Marie Colvin herself was quoted as saying that she would not use her satellite phone because of her fear that it could be intercepted/targeted. Instead she opted to depend on Skype which, though variously secure, relies on a much higher bandwidth connection which is vastly easier to target. Rather than continuing the magical thinking that may well have led to Colvin's death, we should take a hard look at what we know about the facts and review the lack of approachable, available documentation about communications security, particularly satellite-based communications. Brian On Sat, Mar 3, 2012 at 6:47 PM, Jillian C. York wrote: > Not really. The writer clearly notes that this is reported, not fact, and > these lessons, if not pertinent to Colvin specifically, no doubt will be. > > As you note, it's still all speculation, but the author makes that pretty > clear. > On Mar 3, 2012 5:49 PM, "Brian Conley" wrote: > >> There is all kinds of sensationalism and speculation in this article. >> >> Further, I think I've already clearly explained that the speculation the >> journalists were directly targeted is speculation and the most likely >> transmissions related target is the satellite modem setup likely provided >> by Avaaz to the opposition, not the phones. >> >> Sent from my iPad >> >> On Mar 3, 2012, at 17:16, Rafal Rohozinski >> wrote: >> >> Good article on TAC SIGINT capabilities for laypersons. >> >> Rafal >> >> >> >> >> http://www.foreignpolicy.com/articles/2012/03/02/kill_the_messenger?page=full >> >> >> Kill the Messenger What >> Russia taught Syria: When you destroy a city, make sure no one -- not even >> the story -- gets out alive. >> BY ROBERT YOUNG PELTON | MARCH 2, 2012 >> >> >> It was a star-filled night in Chechnya's besieged capital of Grozny. The >> snow crunched under my feet as I walked with the Chechen rebel commander >> away from the warmth of our safe house. When we entered a bombed-out >> neighborhood 15 minutes away, I put the battery in my Iridium satellite >> phone**and waited for the glowing screen to signal that I had locked on >> to the satellites. >> >> I made my call. It was short. Then the commander made a call; he quickly >> hung up and handed me back the phone. "Enough," he said, motioning for me >> to remove the battery. >> >> As we walked briskly back to the safe house, it was exactly 10 minutes >> before the cascade of double *wa-whumps* announced the Grad rocket >> batteries pounding the vacant neighborhood we had just left. >> >> It was December 1999, and the Russian assault on Grozny was unfolding in >> all its gruesome detail. After the dissolution of so much of the former >> Soviet empire, Chechnya was one country that the newly minted prime >> minister, Vladimir Putin, refused to let go of. His boss, Boris Yeltsin, >> and the Russian army had been defeated and then humiliated in the media by >> Chechen forces in the first war. Five years later, Russia was back. And >> Putin's new strategy was unbending: silence, encircle, pulverize, and >> "cleanse." It was a combination of brutal tactics -- a Stalinist purge of >> fighting-age males plus Orwellian propaganda that fed Russians a narrative >> wherein Chechen freedom fighters were transformed into Islamist mercenaries >> and terrorists. More than 200,000 civilians were to die in this war, the >> echoes of which continue to this day. >> >> This time, journalists were specifically targeted to prevent sympathetic >> or embarrassing reports from escaping the killing zone. As such, you can't >> find a lot of stories about the second Chechen war. One of the few and best >> accounts was written by Marie Colvin, who described her terrifying escape >> from Grozny for the *Sunday Times*. Last month, Colvin thought she could >> roll the dice and enter the besieged Syrian city of Homs to defy yet >> another brutal war of oppression. This time she lost. >> >> It's impossible to know whether Syrian President Bashar al-Assad -- a >> longtime ally of Russia -- studied the success of the last Chechen war >> before launching his own assault on the restive city of Homs. However, his >> Russian military advisors surely know the tactics well. The crackdown in >> Homs carries a grim echo of Grozny, both in its use of signals intelligence >> to track down and silence the regime's enemies and in its bloody >> determination to obliterate any opposition, including Western journalists. >> >> Assad's ability to lethally target journalists using satellite-phone >> uplinks could well have cost Colvin her life. Multiple reports have >> suggested that >> Syrian forces used phone signals to pinpoint her location and then launched >> a rocket barrage that resulted in her death on Feb. 22, along with that of >> French photographer Remi Ochlik and multiple Syrian civilians. >> >> The use of satellite and cellular transmissions to determine a subject's >> location was relatively new a decade ago, when I was in Grozny. Tracking >> phone transmissions to hunt down targets began in earnest with a covert >> unit of U.S. intelligence officers from the National Security Agency (NSA), >> CIA, Navy, Air Force, and special operations called "The Activity." This >> snooping unit was also called the Army of Northern Virginia, Grey Fox, and >> even Task Force Orange. We see much of this technology used to inform >> modern drone and U.S. Joint Special Operations Command strikes. My decade >> covering U.S. spec ops, intelligence gathering, and their contractors >> highlighted the impressive ability of various countries to monitor, locate, >> network, and act on what is called SIGINT, or signals intelligence. >> >> The Russians have their own version of this capability, which fell under >> the command of the Federal Agency of Government Communications and >> Information , now part of the >> Federal Protective Service. In the United States, it would be equivalent to >> the NSA and FBI combined, and the agency provides sophisticated >> eavesdropping support to Russia's military, intelligence, and >> counterterrorism units -- and to Russia's allies, including Syria. >> >> Russia has spent a long time perfecting these techniques. On April 21, >> 1996, Chechnya's breakaway president, Dzhokhar Dudayev, was speaking on a >> satellite phone* *with Russian envoy Konstantin Borovoi about setting >> peace talks with Yeltsin. During the phone call, he was killed by >> a signal-guided missile fired from a Russian jet fighter. The warplane had >> received Dudayev's coordinates from a Russian ELINT (electronic >> intelligence)* *plane that had picked up and locked on to the signal >> emitted by the satellite phone. It was Russian deception and brutality at >> its finest. >> >> It should have been clear even back then that there was a benefit and a >> distinct penalty to modern communications on the battlefield. >> >> Flash forward to Syria today. The opposition Free Syrian Army is >> officially run by a former air force colonel who commands a barely >> organized group of army defectors supported by energetic youth. They rely >> almost entirely on cell-phone service, satellite phones, the Internet, and >> social media to organize and communicate. Early in February, according to a >> Fox News report, Qatar provided3,000 satellite phones, >> which the Syrian rebels have used to upload numerous impactful videos and >> stories. >> >> These past few weeks, under a barrage of mortar, tank, and artillery >> shells, their plaintive calls for help from inside the besieged Baba Amr >> neighborhood of Homs sparked international outrage. But without Western >> journalists filing for newspapers and television outlets, these videos -- >> mostly shaky, low-resolution footage of corpses and artillery strikes -- >> wouldn't have had the impact they deserve. >> >> In a welcome resurgence of non-embedded journalism, brave reporters like >> Colvin and many others risked their lives to enter Homs and report from the >> ground. What they showed us was moving, horrific, and embarrassing. Once >> again, Western governments were caught doing nothing -- while women, >> children, and innocents were murdered by their own government. It's a >> playbook the Syrians are good at: The shelling of Homs began on Feb. 3, >> 2012 -- exactly 30 years after the Hama massacre, in which Hafez al-Assad, >> Bashar's father, killed up to 15,000 civilians over three weeks in a >> similar program of wanton destruction. >> >> What we haven't seen as clearly is the extent to which the Syrian regime >> (thanks to its Russian advisors) now has the tools of electronic warfare to >> crush this popular uprising -- and anything that happens to get in the way. >> Syria is one of Russia's biggest clients for weapons, training, and >> intelligence. In return for such largesse, it has offered the Russian Navy >> use of Tartus, a new deep-water military port in the Mediterranean. Moscow >> sold Damascus nearly $1 billion worth >> of weapons in 2011, despite growing sanctions against the oppressive Assad >> regime. With these high-tech weapons comes the less visible >> Russian-supplied training on technologies, tactics, and strategies. >> >> The sounds of rockets pulverizing civilians should have brought back >> memories and warnings to Colvin. She would have recognized all the signs >> from her previous reporting in Chechnya, where she and her escorts were >> hunted relentlessly by Russian domestic security agents who sought to >> arrest, silence, or kill any journalist attempting to report on the >> slaughter of civilians. >> >> My time in Grozny included being surrounded three times by the Russian >> army, numerous direct bombardments, and frequent close calls. I paid >> attention to the safety warnings of the Chechen rebel commanders who kept >> me alive. These rebels were once part of the Soviet military and >> intelligence apparatus and were fully schooled in Russia's dirty tricks. >> They taught me much. Chief among them was not communicating electronically >> while in country, not trusting "media guides," and never telling people >> where I was going. If captured by Russian troops, they urged me -- for my >> own safety -- to say that I had been kidnapped by Chechen forces. >> >> Just as I exited Chechnya, I met Colvin, who was heading in. She wanted >> to know as much as she could. I warned her of the duplicity and violent >> intent of the Russian military and their Chechen proxies. Despite my >> warnings, she bravely entered Chechnya and wrote riveting, award-winning >> stories that >> now sound almost identical to her coverage from Syria. >> >> I was distressed to read of Colvin's death in Syria, and even more >> distressed to think she might still be alive now if she had remembered some >> basic warnings. Her first error was that she stayed inside the rebel "media >> center" -- in reality, a four-story family home converted to this use as it >> was one of the few places that had a generator. >> >> The second was communication. The Syrian army had shut down the >> cell-phone system and much of the power in Baba Amr -- and when journalists >> sent up signals it made them a clear target. After CNN's Arwa Damon broadcast >> live from >> the "media center" for a week, the house was bombarded until the top floor >> collapsed. Colvin may have been trapped, but she chose to make multiple >> phone reports and even went live on CNN and >> other media channels, clearly mentioning that she was staying in the bombed >> building. >> >> The third mistake was one of tone. She made her sympathies in the >> besieged city clearly known as she emotionally described the horrors and >> documented the crimes of the Syrian government. >> >> Unsurprisingly, the next day at 9 a.m., a barrage of rockets was launched >> at the "media center." She was killed -- along her cameraman, Remi Ochlik, >> and at least 80 Syrian civilians across the city -- targeted with precision >> rocket barrages, bombs, and the full violence of the Syrian army. >> >> In Grozny, Russian forces decided that they would eliminate everything, >> everybody, and every voice that stood up to the state -- including >> journalists who tried to enter. Syria has clearly made the same >> determination in Homs. This military action is intended to be a massacre, a >> Stalinist-style lesson to those who dare defy the rulers of Syria. >> >> The United Nations estimates that >> more than 7,500 Syrians have so far been killed in the yearlong spasm of >> violence there. Perhaps this ghastly toll would be even higher now if brave >> reporters like Colvin had not entered. With the recent news that the rebels >> have retreated from the bombardment of Baba Amr to safer territory, Assad's >> forces, as well as their Russian advisors, are claiming victory. According >> to official news reports from the Syrian Information Ministry, "the >> foreign-backed mercenaries and armed terrorist groups" have fled, the >> corpses of three Western journalists have been "discovered," and Homs is >> now "peaceful." >> >> Despite what Damascus claims, this fight is not yet over. And we need >> more brave and bright journalists who will shine a light in places like >> Syria, where a regime works diligently to plunge its people into darkness. >> But let's not forget whose callous playbook they're using. >> **** >> Save big when you *subscribe* to FP. >> >> LOUAI BESHARA/AFP/Getty Images >> >> _______________________________________________ >> liberationtech mailing list >> liberationtech at lists.stanford.edu >> >> Should you need to change your subscription options, please go to: >> >> https://mailman.stanford.edu/mailman/listinfo/liberationtech >> >> If you would like to receive a daily digest, click "yes" (once you click >> above) next to "would you like to receive list mail batched in a daily >> digest?" >> >> You will need the user name and password you receive from the list >> moderator in monthly reminders. >> >> Should you need immediate assistance, please contact the list moderator. >> >> Please don't forget to follow us on http://twitter.com/#!/Liberationtech >> >> >> _______________________________________________ >> liberationtech mailing list >> liberationtech at lists.stanford.edu >> >> Should you need to change your subscription options, please go to: >> >> https://mailman.stanford.edu/mailman/listinfo/liberationtech >> >> If you would like to receive a daily digest, click "yes" (once you click >> above) next to "would you like to receive list mail batched in a daily >> digest?" >> >> You will need the user name and password you receive from the list >> moderator in monthly reminders. >> >> Should you need immediate assistance, please contact the list moderator. >> >> Please don't forget to follow us on http://twitter.com/#!/Liberationtech >> > -- Brian Conley Director, Small World News http://smallworldnews.tv m: 646.285.2046 Skype: brianjoelconley public key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xCEEF938A1DBDD587 _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From lahomasierra at keykertusa.com Sat Mar 3 08:08:43 2012 From: lahomasierra at keykertusa.com (Keila Margorie) Date: Sun, 04 Mar 2012 00:08:43 +0800 Subject: HCG Pills For Weight Loss - HCG Diet Drops - 3X Guarantee 7sg0bt Message-ID: <201203031211.C36ECD4A7CBCA02FFD7B74DB@1p93ss7> HCG Pills For Weight Loss - HCG Diet Drops - 3X Guarantee Best packages and prices on HCG Pills, with Triple Platinum Guarantee. Enjoy quick weight loss, and keep it off! Click for a thinner, healthier new you. http://hcgdietdirectfollow.ru From gfoster at entersection.org Sun Mar 4 02:25:15 2012 From: gfoster at entersection.org (Gregory Foster) Date: Sun, 04 Mar 2012 04:25:15 -0600 Subject: [drone-list] North Dakota Sheriff's Dept preparing to deploy UAVs Message-ID: @sUASnews (Mar 4) - "Grand Forks Sheriff's Department launching UAS program" by Chris Bieri of @GFHerald: http://www.suasnews.com/2012/03/12582/grand-forks-sheriff%E2%80%99s-department-launching-uas-program/ It looks like the Grand Forks Herald has been reporting a LOT of articles about UAS's: http://www.grandforksherald.com/event/search/order/date/keywords/UAS In part, that must be because the University of North Dakota has embraced the opportunity to become a locus for research, education, and training for unmanned aircraft systems: http://www.uasresearch.com/home.aspx It is therefore appropriate that The Center for UAS Research, Education and Training's homepage prominently features an image of a Department of Homeland Security Customs and Border Protection General Atomics MQ-9 Reaper "Predator B" drone, as five of DHS's seven MQ-9's are based in North Dakota at the Grand Forks Air Force Base: http://en.wikipedia.org/wiki/General_Atomics_MQ-9_Reaper#US_Homeland_Security In December, Brian Bennett [ @thingsblowup ] of the LA Times reported " Local police say they have used two unarmed Predators based at Grand Forks Air Force Base to fly at least two dozen surveillance flights since June" in the first widely reported case of American citizens being arrested by local authorities with the assistance of drone surveillance provided by federal authorities upon request from a local law enforcement agency: http://articles.latimes.com/2011/dec/10/nation/la-na-drone-arrest-20111211 On September 13, 2010, North Dakota Senator Byron L. Dorgan convened a field hearing "at 8 a.m. in the Red River Valley Room of the Memorial Union, University of North Dakota, Grand Forks" on the subject of "The Integration of Unmanned Aircraft Systems (UASs) Into the National Airspace System (NAS): Fulfilling Imminent Operational and Training Requirements". North Dakota Representative Earl Pomeroy was also in attendance, helping convene a check-in meeting to spur cooperation between the FAA and Defense officials. Secrecy News' Steven Aftergood [ @saftergood ] archived a copy of the complete transcript of the meeting, including all statements by witnesses and prepared testimony included in the record: http://www.fas.org/irp/congress/2010_hr/uas.html Senator Dorgan described the context for the meeting in his opening statement, The hearing is about the subject of unmanned aerial vehicles, and most particularly, the issue of training and operations for UAVs in this region. Grand Forks and this region of North Dakota is slated to become a major UAV center. We will have the Predators and the Global Hawks. We'll have fleets of Global Hawks and Predators stationed here at the Grand Forks Air Force Base. We have Homeland Security, which flies UAVs here. The University of North Dakota Center for Aerospace Science is designated by law and in the DOD descriptions as the center for UAV research. I did that because we fly unmanned aerial vehicles in all kinds of weather, and I had visited Nellis and Creach a number of times and discovered they do quite well when it's warm, flying over desert sand, but they'll be flying them in other areas of the country as well, and the world, and having a center for research of UAVs here, connected to the Air Force and the University of North Dakota, one of the--probably the preeminent aviation school in the world, just made a lot of sense. The Senator goes on to describe reasons for convening the meeting and mentions a kickoff roundtable discussion 19 months earlier: Here at the University of North Dakota, at the Center for Research for UAVs, there's a lot of work going on, on sensitive technologies and radar and so on, on just this very subject. About a year ago, February 16, 2009, we met in this room, not in a hearing, but in a roundtable discussion, and we had a very substantial discussion about what needed to be done and the timelines to do it, in which to create routine training and operation capability for UAVs here in this region. We had the Air Force and the FAA talk about creating a working group, and from that meeting, a working group was created and has been working between then and now. The February 2009 confluence of "Federal and state dignitaries" in Grand Forks coincided with the opening of the U.S. Customs and Border Protection Unmanned Aircraft Operations Center of North Dakota. http://www.cbp.gov/xp/cgov/newsroom/news_releases/archives/2009_news_releases/february_2009/02162009.xml The reason for the presence of drones in Grand Forks can be dated to 2005, when then-Secretary of Defense Donald Rumsfeld issued a " report to the Base Realignment and Closure (BRAC) Commission [which] noted the strategic importance of maintaining an air base in the north central United States and specifically cited the Grand Forks base for an 'emerging mission' involving UAVs, the fastest growing mission area in the Air Force." http://conrad.senate.gov/pressroom/record.cfm?id=276203 In the Defense Base Closure and Realignment Commission's Final Report to the President (Sep 8 2005), page 151 (Chapter 1, "Air Force") indicates the Grand Forks Air Force Base mission was realigned from a KC-135 tanker hub "to include the Department of Defensebs intent to bed down a family of Unmanned Aerial Vehicles (UAVs)": http://www.brac.gov/finalreport.html The drones have had nests prepared to come home to roost for quite some time, much longer than might be gauged by the amount of welcome attention garnered by a controversial Congressional mandate in the FAA Reauthorization and Reform Act of 2012: " Not later than 270 days after the date of enactment of this Act [(February 13, 2012)], the Secretary of Transportation, in consultation with representatives of the aviation industry, Federal agencies that employ unmanned aircraft systems technology in the national airspace system, and the unmanned aircraft systems industry, shall develop a comprehensive plan to safely accelerate the integration of civil unmanned aircraft systems into the national airspace system." http://www.fas.org/sgp/news/2012/02/faa-uas.html http://www.opencongress.org/bill/112-h658/show It is important to understand the scope of the bureaucratic inertia (and agility) that has been painstakingly transformed into kinetic motion over time as well as the actors involved, their dispositions, and constraints (or lack thereof). The unmanned aircraft systems industry is represented first and foremost by the Association for Unmanned Vehicle Systems International [ @auvsi ] which lobbies Congress (and presumably other "government, industry, and academia" officials) on behalf of its more than 7,000 members and "2,100 member organizations from 60 allied countries": http://www.auvsi.org/home/aboutus/ Lobbyists from AUVSI frequently speak with elected officials, 53 of whom are members of the Congressional Unmanned Systems Caucus [ @CUSCaucus ], co-chaired by Representatives Howard P. "Buck" McKeon (R-CA-25) and Henry Cuellar (D-TX-28): http://unmannedsystemscaucus.mckeon.house.gov/ Representative Buck McKeon also speaks directly to AUVSI members, as in his keynote at the AUVSI Unmanned Systems Program Review (Feb 7-9), here documented by Zaid Jilani of Republic Report: http://www.republicreport.org/2012/mckeon-drone-lobby-speech/ http://www.auvsi.org/events/auvsievents/auvsisunmannedsystemsprogramreview/Proceedings12/ During his keynote, CodePink co-founder @MedeaBenjamin interrupted the proceedings and was forcibly removed. "War Bucks" McKeon, unruffled, continued: " Wouldnbt we all like to cut our swords, and pull our ploughshares and live in total world peace? Ibll tell ya, it's not...thatbs not happening." http://www.youtube.com/watch?v=EsLLVW88k20 http://www.latimes.com/business/money/la-fi-mo-mckeon-auvsi-drone-20120208,0,341564.story Finally, returning to the theme of the original link, here is a list of all currently planned upcoming AUVSI events, including a webinar March 14th titled "UAVs Take to the Sky for Law Enforcement": http://www.auvsi.org/AUVSI/Events/Calendar/?ShowAsList=True gf -- Gregory Foster || gfoster at entersection.org @gregoryfoster<> http://entersection.com/ _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From loreankizzy at johnsonandbryan.com Sun Mar 4 08:05:27 2012 From: loreankizzy at johnsonandbryan.com (Kindra Cathryn) Date: Sun, 04 Mar 2012 09:05:27 -0700 Subject: Rock solid, bigger, harder, more intense erections and enlarge your penis by up to 3 inches with #1 Male Extra Penis Enhancement Pills. c7xp4 Message-ID: <15t63x93t58-51715908-690b1o24@oblulvcb> MenMax Pills Erection Pill 95% Success Rate. MenMax is Powerful! Click For Details http://herbalpenisseem.ru From bulgeafz26 at rim.steelcase.com Sun Mar 4 09:53:06 2012 From: bulgeafz26 at rim.steelcase.com (=?koi8-r?B?7cHSyc7B?=) Date: Sun, 4 Mar 2012 09:53:06 -0800 Subject: =?koi8-r?B?9M/M2MvPIEZ1bGwgSEQgy8Hexd7T1NfPIMbJzNjNz9cg0NLJzsXTxdQg?= =?koi8-r?B?18HNIMnT1MnOztnKINfP09TP0sc=?= Message-ID: <9E637DEDAEF74A4EA4D93D58ECDE2D3C@sethi2c373eb38> Приятные решения для милых дам. Наш интернет магазин в преддверии 8-го марта дарит всем своим покупателем выбор. Выбор подарков из всего многообразия фильмов, сериалов, мультфильмов, документальных фильмов, которые представлены в нашем каталоге. Найдите свободную минуту, доверьтесь Вашему вкусу и подберите для себя и своих близких самые интересные коллекции фильмов. Сделай свой выбор здесь: www.коллекциифильмов.рф С праздником Вас и Ваших любимых! From eugen at leitl.org Sun Mar 4 01:44:13 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 4 Mar 2012 10:44:13 +0100 Subject: [liberationtech] Kill the Messenger: What Russia taught Syria Message-ID: <20120304094413.GZ7343@leitl.org> ----- Forwarded message from Rafal Rohozinski ----- From eugen at leitl.org Sun Mar 4 01:53:01 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 4 Mar 2012 10:53:01 +0100 Subject: [liberationtech] Kill the Messenger: What Russia taught Syria Message-ID: <20120304095301.GB7343@leitl.org> ----- Forwarded message from Brian Conley ----- From eugen at leitl.org Sun Mar 4 02:34:25 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 4 Mar 2012 11:34:25 +0100 Subject: [drone-list] North Dakota Sheriff's Dept preparing to deploy UAVs Message-ID: <20120304103425.GE7343@leitl.org> ----- Forwarded message from Gregory Foster ----- From unsaysjqu3 at residentialtitle.com Sun Mar 4 03:06:12 2012 From: unsaysjqu3 at residentialtitle.com (=?koi8-r?B?8M/S0cTPyyDXxcTFzsnR?=) Date: Sun, 4 Mar 2012 12:06:12 +0100 Subject: =?koi8-r?B?uSAzNzMt8C4g78Laz9Igzs/X28XT1Ncu?= Message-ID: <52F30A64AF924321BD2150908A3F531F@tihomiramd> 15 марта 2012 г. КАССОВЫЕ ОПЕРАЦИИ. НОВЫЙ ПОРЯДОК ВЕДЕНИЯ КАССОВЫХ ОПЕРАЦИЙ, ВСТУПИВШИХ В ДЕЙСТВИЕ 1 ЯНВАРЯ 2012 ГОДА 8 (495) 792\21/2_2 <<<>>> 8 (499) ЧЧ539.68 С 1 января 2012 года в РФ установлен новый порядок ведения кассовых операций, обязательный для всех организаций, а теперь – и для индивидуальных предпринимателей. Изменений много и они коснулись почти всех сложных моментов осуществления операций с наличными деньгами. Мы уделим внимание всем новшествам, а также тем проблемам, которые остаются неразрешенными! Программа: 1. Новое Положение о порядке ведения кассовых операций от 12.10.2011 № 373-П. Обзор новшеств. 2. Необходимые локальные акты по организации кассовой работы. 3. Новые принципы установления лимита остатка кассы и новые требования к его соблюдению. 4. Новые требования и возможности при ведении кассовой книги. Новые требования к заполнению расходных ордеров. Особенности заполнения приходных ордеров. Ведении книги учета принятых и выданных денежных средств с учетом нового порядка. Особенности оформление кассовых документов – за что штрафуют налоговые органы в 2012 году? 5. Выдача денег по доверенности: совершенно новый порядок в 2012 году. 6. Переход на оформление кассовых документов в электронном виде: новые возможности и обязанности. 7. Новый порядок работы с подотчетными суммами. 8. Денежные документы и БСО: порядок хранения в кассе и учета на счетах, выдачи, отчета ответственных лиц. БСО и НДС. 9. Лимит расчетов наличными: сложные ситуации и типичные ошибки. Наличная выручка и порядок ее расходования без сдачи в банк. 10. Применение ККМ. Расчеты с применением платежных банковских карт. Возвраты покупателям наличных в случае отказа от товара в день приобретения и позже. 11. Изменение требований к оборудованию кассовых комнат и хранению денежных средств. 12. Должность кассира: обязанности, ответственность. Совмещение и временное замещение должности кассира. Новые условия возложения материальной ответственности на кассира. 13. Контроль за осуществлением кассовых операций. Кто может Вас проверять и какие санкции грозят. Что изменилось в 2012 году? Типичные нарушения со стороны контролеров: как отстоять свою правоту. Стоимость участия: 8 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 (499) 4Ч53968 и 8 (499) 445.40*95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4085 bytes Desc: not available URL: From qnlkmn at docomo.ne.jp Sat Mar 3 21:45:58 2012 From: qnlkmn at docomo.ne.jp (n ) Date: Sun, 04 Mar 2012 14:45:58 +0900 Subject: No subject Message-ID: <201203020549.q225ni7A026792@proton.jfet.org> 当倶楽部のマダムの肉欲を解消していただける方募集しています!!    【報酬1回3万円〜7万円】 内容はホテルで待ち合わせてSEXして頂くだけです。 ホテル代ももちろんこちらで負担します。 ⇒http://boobooden.info/slp37/ 人とそれぞれ好みがあると思いますので、 お相手はこちらのなかからお選び頂けます。 ⇒http://boobooden.info/slp37/ トラブル防止の為、報酬は行為の前に支払われますので 安心してご参加下さい。 ⇒http://boobooden.info/slp37/ このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp From classicistsjv35 at rheinmetall-de.com Sun Mar 4 23:02:05 2012 From: classicistsjv35 at rheinmetall-de.com (=?koi8-r?B?8M/S0cTPyyDXxcTFzsnR?=) Date: Sun, 4 Mar 2012 23:02:05 -0800 Subject: =?koi8-r?B?8M/S0cTPyyDXxcTFzsnRIMvB09PZINMgMSDRztfB0tEgMjAxMiDHLg==?= Message-ID: <000d01ccfa9d$dfb71970$6400a8c0@classicistsjv35> 15 марта 2012 г. КАССОВЫЕ ОПЕРАЦИИ. НОВЫЙ ПОРЯДОК ВЕДЕНИЯ КАССОВЫХ ОПЕРАЦИЙ, ВСТУПИВШИХ В ДЕЙСТВИЕ 1 ЯНВАРЯ 2012 ГОДА 8 (495) 792\21-22 \\// 8 (499) 445З968 С 1 января 2012 года в РФ установлен новый порядок ведения кассовых операций, обязательный для всех организаций, а теперь √ и для индивидуальных предпринимателей. Изменений много и они коснулись почти всех сложных моментов осуществления операций с наличными деньгами. Мы уделим внимание всем новшествам, а также тем проблемам, которые остаются неразрешенными! Программа: 1. Новое Положение о порядке ведения кассовых операций от 12.10.2011 ╧ 373-П. Обзор новшеств. 2. Необходимые локальные акты по организации кассовой работы. 3. Новые принципы установления лимита остатка кассы и новые требования к его соблюдению. 4. Новые требования и возможности при ведении кассовой книги. Новые требования к заполнению расходных ордеров. Особенности заполнения приходных ордеров. Ведении книги учета принятых и выданных денежных средств с учетом нового порядка. Особенности оформление кассовых документов √ за что штрафуют налоговые органы в 2012 году? 5. Выдача денег по доверенности: совершенно новый порядок в 2012 году. 6. Переход на оформление кассовых документов в электронном виде: новые возможности и обязанности. 7. Новый порядок работы с подотчетными суммами. 8. Денежные документы и БСО: порядок хранения в кассе и учета на счетах, выдачи, отчета ответственных лиц. БСО и НДС. 9. Лимит расчетов наличными: сложные ситуации и типичные ошибки. Наличная выручка и порядок ее расходования без сдачи в банк. 10. Применение ККМ. Расчеты с применением платежных банковских карт. Возвраты покупателям наличных в случае отказа от товара в день приобретения и позже. 11. Изменение требований к оборудованию кассовых комнат и хранению денежных средств. 12. Должность кассира: обязанности, ответственность. Совмещение и временное замещение должности кассира. Новые условия возложения материальной ответственности на кассира. 13. Контроль за осуществлением кассовых операций. Кто может Вас проверять и какие санкции грозят. Что изменилось в 2012 году? Типичные нарушения со стороны контролеров: как отстоять свою правоту. Стоимость участия: 8 000 рублей По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 (499) 44539-68 \\\/// 8 (499) ЧЧ53968 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4063 bytes Desc: not available URL: From juleladonna at steincommunications.com Sun Mar 4 08:33:06 2012 From: juleladonna at steincommunications.com (Alycia Angila) Date: Sun, 04 Mar 2012 23:33:06 +0700 Subject: Save BIG $$$!!! Lowest Cialis Prices On The INTERNET! 97c01x29 Message-ID: <28v92k68i44-51368438-232b3w60@mehfsxw> Best Buy Cialis Generic Online Cialis 20mg x 100 Pills $155, We accept VISA Payments, 90000+ Satisfied Customers! Free Pills & Reorder Discount Top Selling 100% Quality & Satisfaction guaranteed! http://pharmacytabletsbuy.ru From lynettadessie at wipro.com Sun Mar 4 12:41:03 2012 From: lynettadessie at wipro.com (CristalTran) Date: Mon, 05 Mar 2012 02:41:03 +0600 Subject: Get Max Discount. 100% risk free money back guarantee. Rock solid, bigger, harder, more intense erections.2 qa24xg2j Message-ID: <4f53d35f.a352c9b5@wipro.com> Male Penis Enhancement - Male Extra Pills Rock solid, bigger, harder, more intense erections and enlarge your penis by up to 3 inches with #1 Male Extra Penis Enhancement Pills. Get Max Discount. 100% risk free money back guarantee. http://herbalpenisside.ru From eugen at leitl.org Sun Mar 4 20:54:47 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 5 Mar 2012 05:54:47 +0100 Subject: [HSF] insulin pump can be controlled wirelessly Message-ID: <20120305045447.GM7343@leitl.org> ----- Forwarded message from saurabh varshney ----- From baridanica at starnursery.com Sun Mar 4 19:13:14 2012 From: baridanica at starnursery.com (Jose Haydee) Date: Mon, 05 Mar 2012 06:13:14 +0300 Subject: Penis enhancement pill helps increase sexual health for bigger, harder erections, increased erect penis length and girth, increase in sexual stamina, sex drive, and more - TRY THIS! mbm0yb23 Message-ID: <4f542f4a.d00f0bf3@starnursery.com> World's Best Penis Pills - Virility Pills 100% Satisfaction Guaranteed Penis Enlargement, Clinically Proven Now in USA Buy 3 Get One Free, Buy 4 Get 2 Free Limited Time Only http://giantpenismart.ru From glimmerings7 at ticketmaster.com Sun Mar 4 16:18:33 2012 From: glimmerings7 at ticketmaster.com (=?koi8-r?B?4dfEz9TY0Q==?=) Date: Mon, 5 Mar 2012 09:18:33 +0900 Subject: =?koi8-r?B?7NXe28nFIMbJzNjN2SDJIM3VzNjUxsnM2M3ZIM7BIM3FxMnB0MzFxdLB?= =?koi8-r?B?yCBJY29uQml0?= Message-ID: <7BE0125243464B19901B005CAF88E5A9@LocalHost> Вы можете получить всю мультимедийную вселенную безо всяких усилий, просто воспользуйтесь линейкой FullHD – медиаплееров с уже записанной коллекцией новых фильмов, документальных фильмов и мультфильмов. Наслаждайтесь музыкой, фильмами, фотографиями отличного качества и просматривайте их на своём телевизоре – вам не нужны никакие преобразования форматов. Вас ждут сотни фильмов с качеством FullHD (1920х1080р) всего на 1 жёстком диске. Мы осуществляем доставку бесплатно прямо на дом или в офис по всем регионам России. Рады сообщить вам, мы добавили для вас 2 новые коллекции фильмов, 250 лучших зарубежных фильмов по версии сайта Кинопоиск в DVD-качестве, выпущенных в период 1980-2011 годов и 520 лучших зарубежных фильмов, наш ассортимент постоянно растёт. Посмотреть полный каталог вы можете здесь: www.коллекции-фильмов.рф C Уважением, Марья From drsaurabhvarshney at gmail.com Sun Mar 4 20:26:55 2012 From: drsaurabhvarshney at gmail.com (saurabh varshney) Date: Mon, 5 Mar 2012 09:56:55 +0530 Subject: [HSF] insulin pump can be controlled wirelessly Message-ID: modern insulin pump can be hacked from 300 feet away and told to deliver a lethal dose of insulin, http://www.massdevice.com/news/hacker-demonstrates-insulin-pump-attack-300-ft-away-massdevicecom-call _______________________________________________ OpenHeart-L mailing list Send postings to: OpenHeart-L at lists.hsforum.com To UNSUBSCRIBE, to CHANGE email address, or to view archives: http://mmp.cjp.com/mailman/listinfo/openheart-l All messages transmitted by the OpenHeart-L are subject to the policies and disclaimers posted at: http://www.hsforum.com/listdisclaim ----------------------------------------- ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From relived at klarisma.com Sun Mar 4 21:17:13 2012 From: relived at klarisma.com (=?koi8-r?B?IvfBzMDUzs/FINrBy8/Oz8TB1MXM2NPU188i?=) Date: Mon, 5 Mar 2012 10:47:13 +0530 Subject: =?koi8-r?B?18HMwNTO2cogy8/O1NLPzNg=?= Message-ID: <01ccfabd$52b10e80$5d18a47a@relived> 12 - 13 марта 2012г., Петербург. Бизнес-семинар: Валютное регулирование и валютный контроль. Программа семинара (краткая): 1. Последние изменения системы валютного регулирования. 2. Порядок открытия и ведения счетов резидентов за пределами территории РФ. 3. Правила осуществления резидентами валютных операций за счет средств, находящихся на счетах за рубежом. 4. Валютный контроль при осуществлении валютных операций, связанных с внешнеторговой деятельностью, получением и предоставлением кредитов и займов. 5. Актуальные вопросы, связанные с порядком оформления паспортов сделок и представлением подтверждающих документов. 6. Валютный контроль, осуществляемый с участием таможенных органов. 7. Практика осуществления налоговыми органами валютного контроля. 8. Особенности представления уполномоченными банками форм отчетности по валютным операциям. 9. Административная ответственность за нарушение валютного законодательства. Для пoлyчeния пoлнoй прoгрaммы и ycлoвий yчacтия cвяжитecь c нaми пo тeлeфoнy в Caнкт-Пeтeрбyргe: (812) 642.24 07 From adenafrankie at panalpina.com Mon Mar 5 08:55:40 2012 From: adenafrankie at panalpina.com (Joy Taunya) Date: Mon, 05 Mar 2012 11:55:40 -0500 Subject: Male Penis Enhancement - Male Extra Pills - Rock solid, bigger, harder, more intense erections. 7hhlbg Message-ID: <30q40z18z68-39073029-475e2y12@lvsaamvfll> Male Penis Enhancement - Male Extra Pills Rock solid, bigger, harder, more intense erections and enlarge your penis by up to 3 inches with #1 Male Extra Penis Enhancement Pills. Get Max Discount. 100% risk free money back guarantee. http://herbalpenismen.ru From dk at telekommunisten.net Mon Mar 5 03:18:51 2012 From: dk at telekommunisten.net (Dmytri Kleiner) Date: Mon, 05 Mar 2012 12:18:51 +0100 Subject: Mute article on Bitcoin Message-ID: On 04.03.2012 16:50, Jaromil wrote: > hi Josie, >> The Wine and Cheese Appreciation Society and Scott Len take the >> currency seriously but ask, how exactly does it differ from 'real' >> money? > A rather quick conclusion, comprehensible since it takes some > knowledge of cryptography to understand that Bitcoin is less than > what you are talking about, while what might come next is the most > interesting part. BitCoin is nothing more and nothing less than electronic specie. Sure, the cryptography behind has some interesting possibilities, like Namecoin. But BitCoin is like digital gold coins, it's main advantage over gold is that it can be electronically transfered, however, it also has disadvantages, it can't be made into a gold tooth, and earring or a pimpin' belt buckle. In terms of electronic commerce, this can be quite usefully, but macroeconomically the significance of electronic specie seems quite negligible, taking it place among various less interesting, non-decentralized, exchangeables, including pre-paid telephone credit and online shopping gift codes. It's main advantage over these is it utility for unsanctioned economic activity, which certainly is critical for some undertakings, but hardly disruptive to the economy as a whole. I'd very interested in a co-herent argument otherwise. Best, -- Dmyri Kleiner Venture Communist # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mx.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From gfoster at entersection.org Mon Mar 5 10:54:07 2012 From: gfoster at entersection.org (Gregory Foster) Date: Mon, 05 Mar 2012 12:54:07 -0600 Subject: [drone-list] Montgomery Cty drone crashes during test Message-ID: @sUASnews (Mar 5) - "Drone crashes into SWAT team tank during police test near Houston" [1]http://www.suasnews.com/2012/03/12711/drone-crashes-into-swat-team-t ank-during-police-test-near-houston/ gf -- Gregory Foster || [2]gfoster at entersection.org @gregoryfoster <> [3]http://entersection.com/ References 1. http://www.suasnews.com/2012/03/12711/drone-crashes-into-swat-team-tank-during-police-test-near-houston/ 2. mailto:gfoster at entersection.org 3. http://entersection.com/ _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From alerts at bbb.org Mon Mar 5 03:23:20 2012 From: alerts at bbb.org (Stefan Hayes) Date: Mon, 5 Mar 2012 13:23:20 +0200 Subject: Better Business Bureau needs your urgent attention. Message-ID: <07DSLO-OHXNQS-PU@bbb.org> BBB complaint center BusinessOwner/Manager,One of your customers has filed a complaintwith The Better Business Bureauconcerning the negativeexperience he had withyour company. The consumerreport isplaced below. Pleasefile your feedback to this matter assoon as possible. The promptestway to provide your response isby using the Online Complaintsystem. Please follow thislink toaccess the above-mentionedcustomer complaint and submit yourresponse to it: BBB complaintcenterUse the following data to login: Case ID:#6068400Password:01609The Better Business Bureau provides an efficientthird-party role, and helps you resolve your customerdisputes fast and efficiently. Wedevelop and maintain online Reliabilityreports on American companies, available tothe Public and used by millions of business customers. Apositive customer report canhave a distinctly positiveinfluence on your business.We hope for your immediate attention to this matter.Sincerely, JacobMoralesDispute Counselor BetterBusiness Bureau Serving Metropolitan New York, Inc.30 East 33rd St., 12th FloorNew York, NY 10016Office Hours: 9-5 Monday through Friday212.533.6200Fax: 212.477.4912Inquiry at newyork.bbb.org -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2804 bytes Desc: not available URL: From michel at farish.com Sun Mar 4 22:33:50 2012 From: michel at farish.com (=?koi8-r?B?IvLVy8/Xz8TJ1MXM2CDQ0sXE0NLJ0dTJ0SI=?=) Date: Mon, 5 Mar 2012 13:33:50 +0700 Subject: =?koi8-r?B?5M/L1c3FztTZINfBzMDUzs/HzyDLz87U0s/M0Q==?= Message-ID: <01ccfad4$995e3300$fc61fdde@michel> 12 - 13 марта 2012г., Петербург. Бизнес-семинар: Валютное регулирование и валютный контроль. Программа семинара (краткая): 1. Последние изменения системы валютного регулирования. 2. Порядок открытия и ведения счетов резидентов за пределами территории РФ. 3. Правила осуществления резидентами валютных операций за счет средств, находящихся на счетах за рубежом. 4. Валютный контроль при осуществлении валютных операций, связанных с внешнеторговой деятельностью, получением и предоставлением кредитов и займов. 5. Актуальные вопросы, связанные с порядком оформления паспортов сделок и представлением подтверждающих документов. 6. Валютный контроль, осуществляемый с участием таможенных органов. 7. Практика осуществления налоговыми органами валютного контроля. 8. Особенности представления уполномоченными банками форм отчетности по валютным операциям. 9. Административная ответственность за нарушение валютного законодательства. Для пoлyчeния пoлнoй прoгрaммы и ycлoвий yчacтия cвяжитecь c нaми пo тeлeфoнy в Caнкт-Пeтeрбyргe: (812) 642.24..07 From eugen at leitl.org Mon Mar 5 04:36:24 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 5 Mar 2012 13:36:24 +0100 Subject: Mute article on Bitcoin Message-ID: <20120305123624.GJ9891@leitl.org> ----- Forwarded message from Dmytri Kleiner ----- From fireswj6 at rmhs.com Mon Mar 5 05:56:34 2012 From: fireswj6 at rmhs.com (Manuela Tyler) Date: Mon, 5 Mar 2012 16:56:34 +0300 Subject: =?koi8-r?B?/snUwdTYIN7V1snFINPN0yDTz8/C3cXOydEgz97Fztgg0NLP09TP?= Message-ID: <498029A71CBA4DCDB07E2B17A697381D@acewarehouse> Поможем прочитать чужие смс сообщения! Выведи близкого тебе человека на чистую воду. Закажи у нас распечатку смс сообщений! Наш email: smska at smska099.su icq: 617487987 From nabiha.syed at gmail.com Mon Mar 5 14:08:53 2012 From: nabiha.syed at gmail.com (Nabiha Syed) Date: Mon, 5 Mar 2012 17:08:53 -0500 Subject: [drone-list] Eric Holder's speech on the legality of drone use Message-ID: Good afternoon, folks: In case you haven't seen it yet, here's the full-text of Attorney General Eric Holder's speech at Northwestern University, in which he touches upon the legality of targeted killing (via drones). Thought some of you would find it interesting. http://www.lawfareblog.com/2012/03/text-of-the-attorney-generals-national-security-speech/ Nabiha _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From joehall at gmail.com Mon Mar 5 14:25:06 2012 From: joehall at gmail.com (Joseph Lorenzo Hall) Date: Mon, 5 Mar 2012 17:25:06 -0500 Subject: [tor-talk] Teaching Non-technical Folks About Tor... Message-ID: Hi tor-talk! This is a request for input. Pedagogical input, but I'm also aware of how crazy smart you all are in general! About six months ago, one of you described vaguely how your servers were seized by German cops and you explained to the police how Tor works using envelopes within envelopes. I had the thought that this kind of a technique could be really helpful in teaching non-technical folks how some aspects of Tor works through a hands-on demonstration. This semester, I'm teaching a class of upper-division undergraduate students in a Communications department at NYU about privacy. I want them to know more about Tor, and thankfully I have Runa and Aaron stopping by my class. woo! However, I sat down recently and tried to sketch out how an in-class hands-on exercise might work that explained some of the core features of Tor. Here is the result: https://josephhall.org/tor/tor-exercise.html https://josephhall.org/tor/tor-exercise.text (Markdown input) This is my first draft. It really only works with a small class (mine is 11) or a sub-set of a larger class. It also doesn't let the students choose much about the messaging (this is to avoid distractions like the hunky guy getting a bunch of love letters during an in-class exercise! ... or more negative versions of the same.). However, it has some serious flaws... for example, the students don't "build circuits" through successive tunnels; the circuits are sort of handed to them. Also, the way it works right now the instructor is a central big brother node. I have tried to think about ways students could be assigned a message and recipient and then roll dice to decide the circuit path, but nothing seems terribly workable (and I don't want it to get much more complex!). Another self-criticism is that it's not immediately apparent what part of this who charade Tor takes care of. ::) So, having a real physical demonstration of onion-routing may be unrealistic... but I'm wondering if you all have comments or better ideas about how to make it realistic without making it terribly complex (Ideally, smart high school or grammar school students could be taught about Tor using this kind of an exercise). best and thanks, Joe -- Joseph Lorenzo Hall Postdoctoral Research Fellow Media, Culture and Communication New York University https://josephhall.org/ _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From ilsechastity at garzanet.com Mon Mar 5 06:42:48 2012 From: ilsechastity at garzanet.com (Henrietta Racquel) Date: Mon, 05 Mar 2012 18:42:48 +0400 Subject: Save With The Lowest Price And Get Overnight Delivery. Cheap Viagra from $29.95 gxmyxq1 Message-ID: <24b98c70c96-51266835-511i4r73@zceswobyld> Find Cheap Viagra Overnight? Buy 100mg x 10pills $29,95 Only! Buy Cheap Generic Viagra (Sildenafil), Cialis, Levitra Online. Secure Checkout, Visa & Mastercard Accepted. Save With The Lowest Price And Get Overnight Delivery. http://pillspharmacytabs.ru From sarahlauretta at dyckes.com Mon Mar 5 07:41:42 2012 From: sarahlauretta at dyckes.com (Shaniqua Ebony) Date: Mon, 05 Mar 2012 19:41:42 +0400 Subject: Buy Viagra(Sildenafil) WITHOUT PRESCRIPTION. Internet Pharmacy You Can Trust. FREE BONUS Pills uflxyu2g Message-ID: <4f54deb6.41cda8ad@dyckes.com> Cheapest VIAGRA. FREE Shipping - FREE BONUS Pills Buy Viagra(Sildenafil) WITHOUT PRESCRIPTION. Internet Pharmacy You Can Trust. Large selection of Cheap Brand & Generic VIAGRA! FREE Pills! http://lifemed-market.ru From eugen at leitl.org Mon Mar 5 12:05:16 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 5 Mar 2012 21:05:16 +0100 Subject: [drone-list] Montgomery Cty drone crashes during test Message-ID: <20120305200516.GU9891@leitl.org> ----- Forwarded message from Gregory Foster ----- From x at yahoo.co.jp Tue Mar 6 01:59:08 2012 From: x at yahoo.co.jp (k Ȃ‚) Date: Tue, 06 Mar 2012 03:59:08 -0600 Subject: No subject Message-ID: <@gmail.com> ��������̎ቜ�l���W�܂�t�����T�[�N���ɖ������� ����Ǝ��Ԃ͂��邯�ǁA�h���������c ����Ȏቜ�l�B���W�܂�t�����T�[�N��!! �j���͏�����������Ƃŕ�V���������܂�!! http://sefrelove.info/2efm02/ �����A�j��������W���ł��B�j���̏��Ȃ������`�����X!! ���Ȃ犮�S�����̃m�[���X�N�ŋt�������̊��ł��܂��B �ˑR�t�������܂�!!�Ƃ����Ă�A�M�����Ȃ��Ǝv���̂� �ŏ��͗₩���̃t���A�h�o�^��”\�ł�!! http://sefrelove.info/2efm02/ ���̃����}�K�͌��܃T�C�g����l�ɔz�M����Ă��܂��B ------------------------------------------------------------ �����[���}�K�W���̉��͂����炩��I sup_ado_123 at yahoo.co.jp From shericeshaneka at pacificnet.net Mon Mar 5 21:46:59 2012 From: shericeshaneka at pacificnet.net (Kym Paulene) Date: Tue, 06 Mar 2012 04:46:59 -0100 Subject: Get Max Discount. 100% risk free money back guarantee. Rock solid, bigger, harder, more intense erections.2 rh32 Message-ID: <4f55a4d3.32c0b16b@pacificnet.net> Male Penis Enhancement - Male Extra Pills Rock solid, bigger, harder, more intense erections and enlarge your penis by up to 3 inches with #1 Male Extra Penis Enhancement Pills. Get Max Discount. 100% risk free money back guarantee. http://herbalpenisthan.ru From wilheminamiranda at garnerengr.com Tue Mar 6 02:12:31 2012 From: wilheminamiranda at garnerengr.com (LEWISDARCEY) Date: Tue, 06 Mar 2012 06:12:31 -0400 Subject: LOWEST CIALIS PRICES - Save BIG $$$!!! Fast Worldwide shipping! ub5wm Message-ID: <26g57b50j90-37031347-337r7a37@hfrfmokg> LOWEST CIALIS PRICES Lowest Prices On The INTERNET! Buy Cialis Online - Save BIG $$$!!! Fast Worldwide shipping! http://rxdrugstoretabs.ru From eugen at leitl.org Mon Mar 5 22:33:02 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 6 Mar 2012 07:33:02 +0100 Subject: [drone-list] Eric Holder's speech on the legality of drone use Message-ID: <20120306063302.GB9891@leitl.org> ----- Forwarded message from Nabiha Syed ----- From eugen at leitl.org Mon Mar 5 22:34:01 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 6 Mar 2012 07:34:01 +0100 Subject: [tor-talk] Teaching Non-technical Folks About Tor... Message-ID: <20120306063401.GC9891@leitl.org> ----- Forwarded message from Joseph Lorenzo Hall ----- From wallabyho321 at rmscorp.com Mon Mar 5 20:10:10 2012 From: wallabyho321 at rmscorp.com (=?koi8-r?B?68HLINrBy8/Ozs8gz8LOwczJ3snU2D8=?=) Date: Tue, 6 Mar 2012 09:40:10 +0530 Subject: =?koi8-r?B?68HLINbJ1NggwsXaIM/CzsHMyd7LySDJIMbJ0s0tz8TOz8TOxdfPyw==?= Message-ID: <143FD8F5C0274FBFB16318A317A8B3AF@indsoftserver> 30 Марта 2012г. Правильное Налоговое планирование исключает фирмы-однодневки и обналичку +7 Московский код: 7922122 и +7 495 7Ч2-9I.98 Цель: Глобальный экономический кризис привел в том числе к ужесточению налоговой политики государства, повышению ставок налогов и активизации борьбы за их собираемость. В современных условиях использование таких традиционных способов псевдооптимизации, как обналичка и фирмы-однодневки становится более опасным, дорогим и малодоступным. Помочь компаниям, применяющим "серые" и "черные" схемы оптимизации налогов, уйти от них, и при этом не разориться, не уступить конкурентам, не уйти с рынка. Найти законные альтернативы таким схемам, платить налоги, но не переплачивать – вот основная идея налогового планирования без "помоек" и "черного нала". Программа: 1. Договоримся о терминах: что такое "черные", "серые" и "белые" схемы, обналичка, фирма-однодневка ("помойка", "недобросовестный" или "проблемный" налогоплательщик, "фонарь" и т.п.). Как выявить внешнего контрагента-однодневку и исключить отношения с ним. 2. Обналичивание. Для чего используется: * "черная" зарплата и доходы собственников бизнеса; * оплата расходов, которые не хочется проводить официально; * незаконная деятельность (взятки, откаты, финансирование политической деятельности…). 3. Законные альтернативы обналичиванию (только для законных целей!): * в каком случае выплата зарплаты на спецрежимах сохраняет свою актуальность; * дивиденды от компаний на спецрежимах или от компании-нерезидента; * предприниматель (ИП) – как использовать; * дарение физлицом наличных денег, заработанных в качестве ИП – легальная альтернатива обналичиванию, дающая безналоговый доход? Новый порядок ведения кассовой операций ЦБР. Получение наличных по чеку, через личные (карточные и иные) счета, по сделкам с другими ИП, занимающимися розницей, общепитом, услугами населению и т.п. Выбор банков, ограничения; * зарплата в большом размере – льготная (в некоторых случаях – нулевая) ставка страховых взносов; * платежи от нерезидентов на карты, основания платежей. * Однодневки. Для чего используются: * псевдооптимизация НДС и налога на прибыль в отдельных сделках или всей деятельности; * "серый импорт"; * "серая конвертация"; * незаконная деятельность. 4. "Серые" (полулегальные) альтернативы: как нельзя "оптимизировать"! Фирмы-"прокладки", контактирующие с недобросовестными налогоплательщиками ("белая" - "серая" - "черная" фирмы). Краткий обзор других "серых" альтернатив. 5. Законные альтернативы однодневкам (только для законных целей!): * выявление (создание) покупателей (заказчиков), не нуждающихся в вычете НДС, разделение доходов и расходов "с НДС" и "без НДС"; * затратные механизмы или трансфертное ценообразование с участием низконалоговых субъектов; * прямой импорт с использованием или не использованием трансфертных цен и затратных механизмов; * выплата нерезидентам дивидендов, роялти, процентов, вклады в их уставные капиталы, покупка акций, инвестиции и т.п. 6. Расчет налоговой нагрузки на примере. Каковы будут (и будут ли) потери при отказе от "черных" схем. Когда при этом можно даже сэкономить. 7. Как можно и как нельзя оптимизировать налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменения. Обзор изменений налогового законодательства, их влияние на налоговые схемы. Ответы на вопросы. По желанию и возможности – индивидуальное экспресс-моделирование налоговых схем для компаний-участниц курса. Стоимость участия: 9 000 рублей За более подробной информацuей обpащайтеcь по тел: 8 (499) 4Ч539_68 \\// +7 (499) - ЧЧ5-З9*68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6526 bytes Desc: not available URL: From laureenjoy at aditamiles.com Tue Mar 6 09:00:15 2012 From: laureenjoy at aditamiles.com (LUCIENNE GUADALUPE) Date: Tue, 06 Mar 2012 11:00:15 -0600 Subject: TRY THIS! Penis enhancement pill helps increase sexual health for bigger, harder erections nioxy6 Message-ID: <201203062300.7D8F107FA5510C5CAED0@kei3y9918> World's Best Penis Pills - Virility Pills 100% Satisfaction Guaranteed Penis Enlargement, Clinically Proven Now in USA Buy 3 Get One Free, Buy 4 Get 2 Free Limited Time Only http://yourpenismall.ru From rellandyd at greatlakesfilmfest.com Tue Mar 6 02:16:19 2012 From: rellandyd at greatlakesfilmfest.com (=?koi8-r?B?IsTJ0sXL1M/SICDQ0s/N2dvMxc7Oz8fPINDSxcTQ0snR1MnRIg==?=) Date: Tue, 6 Mar 2012 12:16:19 +0200 Subject: =?koi8-r?B?8M/S0cTPyyDLwcTB09TSz9fPx88g1d6j1ME=?= Message-ID: <01ccfb92$ef91ab80$d8660c2e@rellandyd> Пpиглaшaeм Bac пpинять yчacтиe в ежемесяном обучении: HOBOE B ПPABOBOМ PEГУЛИPOBAHИИ OФOPМЛEHИЯ ПPAB HA OБЪEКTЫ HEДBИЖИМOCTИ. Правовые особенности кадастровой деятельности. ЗЕМЕЛЬНЫЙ КОДЕКС РФ: последние изменения, практика применения. Мepопpиятиe пpойдёт c 19 по 20 марта 2012 г. в Caнкт-Пeтepбypгe. Рассматриваемые вопросы: Последние изменения в правовом регулировании оформления прав на объекты недвижимости. Поправки в Земельный кодекс РФ. Изменения в ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним". Принципы ведения государственного кадастра недвижимости. Порядок предоставления сведений ГКН. Порядок и особенности осуществления кадастрового учёта земельных участков, зданий, сооружений, объектов незавершённого строительства, помещений. Основания приостановления и отказа в проведении кадастрового учёта. Межевой план.Порядок согласования местоположения границ земельных участков Кадастровые паспорта на земельные участки, здания, сооружения, объекты незавершённого строительства, помещения. Разграничение полномочий федеральной, региональной и муниципальной власти на сделки с землёй. Проблемы и рекомендации. Сделки с землёй. Регламент предоставления земельного участка в собственность. Особенности перехода права собственности на землю при переходе прав на строение. Порядок приобретения прав на земельные участки, находящиеся в государственной или муниципальной собственности, на которых расположены здания, строения, сооружения (в т.ч. приватизированные). Особенности предоставления земельных участков для строительства. Порядок предоставления земель для различных целей. административные ограничения прав на землю. Заключение договоров аренды земельных участков. Анализ арбитражной практики. Особенности оборота земельных участков, относящихся к землям сельскохозяйственного назначения. Особенности оформления прав на земельные участки под строительство линейных объектов. Регистрация прав собственности на линейные объекты и объекты инженерной инфраструктуры. Для бpониpовaния гоcтиницы в Caнкт-Пeтepбypгe пpоcим Bac зapaнee cообщить о Baшeм нaмepeнии.Дополнитeльнyю инфоpмaцию и ПОЛНУЮ ПРОГРАММУ Bы можeтe зaпpоcить по телефонy: (812) 642 47 43 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4258 bytes Desc: not available URL: From andrew at torproject.is Tue Mar 6 09:22:16 2012 From: andrew at torproject.is (Andrew Lewman) Date: Tue, 6 Mar 2012 12:22:16 -0500 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: On Tue, 06 Mar 2012 11:22:33 -0500 Ted Smith wrote: > While I like the graphic overall, I think the "NSA as a global passive > adversary" element is an example of the graphic being overloaded with > information that will confuse/scare away most people. So far, there is one story where Eva claims the NSA can break tor easily, see this Tor and HTTPS graphic as proof: https://secure.security.nl/artikel/40574/1/%2522NSA_kan_Tor-gebruikers_identificeren%2522.html If your adversary is any rumored global passive adversary that can watch and record the entire Internet at once, then you've probably already lost the game. At PETS in 2009[0], Paul did a talk on 'why I'm not an entropist' and suggested that people need to start working on defeating a mythical global passive adversary. Maybe in the near future some government will have the capability of being the global passive adversary. [0] http://petsymposium.org/2009/program.php -- Andrew http://tpo.is/contact pgp 0x6B4D6475 _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From dogtrottedjq9 at lycnet.com Mon Mar 5 19:49:11 2012 From: dogtrottedjq9 at lycnet.com (=?koi8-r?B?IuLPztPByiI=?=) Date: Tue, 6 Mar 2012 12:49:11 +0900 Subject: =?koi8-r?B?OCDNwdLUwSDQ0snCzMnWwcXU09EuIOzAwsnN2cog0M/EwdLPyyAtINHQ?= =?koi8-r?B?z87Ty8nFIMvB0szJy8/X2cUgxMXSxdfY0SDCz87Twcou?= Message-ID: <4261D03E598E4D7F9DFB169595296F56@pos02> Любимый подарок - японские карликовые деревья бонсай. Распродажа к 8 марта. Подарки всем! Специальные цены пр заказе от 2 от 5 от 20 штук! Звоните 780-21-94 www.подари-бонсай.рф From joannekarolyn at abcn.com Tue Mar 6 00:42:19 2012 From: joannekarolyn at abcn.com (Meg Evelina) Date: Tue, 06 Mar 2012 13:42:19 +0500 Subject: Penis enhancement pill helps increase sexual health for bigger, harder erections, increased erect penis length and girth, increase in sexual stamina, sex drive, and more - TRY THIS! c664e3 Message-ID: <201203061540.CEC92527E9D08CEDA4CEF8@45qi78n43v> World's Best Penis Pills - Virility Pills 100% Satisfaction Guaranteed Penis Enlargement, Clinically Proven Now in USA Buy 3 Get One Free, Buy 4 Get 2 Free Limited Time Only http://penisshopdirect.ru From monroewilkerson_cw at quint-nooren.nl Tue Mar 6 02:53:00 2012 From: monroewilkerson_cw at quint-nooren.nl (=?koi8-r?B?IvPU0s/J1MXM2M7B0SDLz87GxdLFzsPJ0SI=?=) Date: Tue, 6 Mar 2012 13:53:00 +0300 Subject: =?koi8-r?B?6drNxc7FzsnRINcg5vogIu8gx8/T1cTB0tPU18XOzs/KINLFx8nT1A==?= =?koi8-r?B?0sHDyckg0NLB1yDOwSDOxcTXydbJzc/FIMnN1d3F09TXzyDJINPExQ==?= =?koi8-r?B?zM/LINMgzsnNIi4=?= Message-ID: <01ccfba0$713c0600$c22fceb2@monroewilkerson_cw> Пpиглaшaeм Bac пpинять yчacтиe в ежемесяном обучении: HOBOE B ПPABOBOМ PEГУЛИPOBAHИИ OФOPМЛEHИЯ ПPAB HA OБЪEКTЫ HEДBИЖИМOCTИ. Правовые особенности кадастровой деятельности. ЗЕМЕЛЬНЫЙ КОДЕКС РФ: последние изменения, практика применения. Мepопpиятиe пpойдёт c 19 по 20 марта 2012 г. в Caнкт-Пeтepбypгe. Рассматриваемые вопросы: Последние изменения в правовом регулировании оформления прав на объекты недвижимости. Поправки в Земельный кодекс РФ. Изменения в ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним". Принципы ведения государственного кадастра недвижимости. Порядок предоставления сведений ГКН. Порядок и особенности осуществления кадастрового учёта земельных участков, зданий, сооружений, объектов незавершённого строительства, помещений. Основания приостановления и отказа в проведении кадастрового учёта. Межевой план.Порядок согласования местоположения границ земельных участков Кадастровые паспорта на земельные участки, здания, сооружения, объекты незавершённого строительства, помещения. Разграничение полномочий федеральной, региональной и муниципальной власти на сделки с землёй. Проблемы и рекомендации. Сделки с землёй. Регламент предоставления земельного участка в собственность. Особенности перехода права собственности на землю при переходе прав на строение. Порядок приобретения прав на земельные участки, находящиеся в государственной или муниципальной собственности, на которых расположены здания, строения, сооружения (в т.ч. приватизированные). Особенности предоставления земельных участков для строительства. Порядок предоставления земель для различных целей. административные ограничения прав на землю. Заключение договоров аренды земельных участков. Анализ арбитражной практики. Особенности оборота земельных участков, относящихся к землям сельскохозяйственного назначения. Особенности оформления прав на земельные участки под строительство линейных объектов. Регистрация прав собственности на линейные объекты и объекты инженерной инфраструктуры. Для бpониpовaния гоcтиницы в Caнкт-Пeтepбypгe пpоcим Bac зapaнee cообщить о Baшeм нaмepeнии.Дополнитeльнyю инфоpмaцию и ПОЛНУЮ ПРОГРАММУ Bы можeтe зaпpоcить по телефонy: (812) 642 47 43 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4336 bytes Desc: not available URL: From bamnmt at yahoo.com Mon Mar 5 21:49:02 2012 From: bamnmt at yahoo.com ( xq) Date: Tue, 06 Mar 2012 14:49:02 +0900 Subject: No subject Message-ID: <201203060556.q265ut8L010398@proton.jfet.org> お金持ちの若奥様が集まる逆援助サークルに無料招待 お金と時間はあるけど、刺激が無い… そんな若奥様達が集まる逆援助サークル!! 男性は女性を抱くことで報酬が発生します!! http://sefrelove.info/slp37/ 只今、男性会員を募集中です。男性の少ない今がチャンス!! 今なら完全無料のノーリスクで逆援助が体感できます。 突然逆援助します!!といわれても、信じられないと思うので 最初は冷かしのフリアド登録も可能です!! http://sefrelove.info/slp37/ このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp From cheryldonya at qualor.com Tue Mar 6 13:25:12 2012 From: cheryldonya at qualor.com (Mackenzie Christinia) Date: Tue, 06 Mar 2012 15:25:12 -0600 Subject: TRY THIS! Penis enhancement pill helps increase sexual health for bigger, harder erections x356u92 Message-ID: <89n85l12k47-67509389-707s2y34@75gscqz38d> World's Best Penis Pills - Virility Pills 100% Satisfaction Guaranteed Penis Enlargement, Clinically Proven Now in USA Buy 3 Get One Free, Buy 4 Get 2 Free Limited Time Only http://bigpenisstore.ru From succulencepws079 at luisaviaroma.com Tue Mar 6 02:08:49 2012 From: succulencepws079 at luisaviaroma.com (=?koi8-r?B?Ivvr7+zhIOHu9Onr9+Hy7u/n7yDk5ezhIg==?=) Date: Tue, 6 Mar 2012 15:38:49 +0530 Subject: =?koi8-r?B?+uEg+u/s7/Tv7SD3IODh8iD37eXz9OUg8+8g++vv7O/qIOHu9Onr9+Hy?= =?koi8-r?B?7u/n7yA=?= Message-ID: <029333670.23753115834507@luisaviaroma.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1588 bytes Desc: not available URL: From eugen at leitl.org Tue Mar 6 09:36:10 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 6 Mar 2012 18:36:10 +0100 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: <20120306173610.GO9891@leitl.org> ----- Forwarded message from Andrew Lewman ----- From warner at lothar.com Tue Mar 6 19:23:39 2012 From: warner at lothar.com (Brian Warner) Date: Tue, 06 Mar 2012 19:23:39 -0800 Subject: [tahoe-dev] Idea for a Publish/Subscribe Message System on Tahoe-LAFS Message-ID: >> On Sat, Feb 11, 2012 at 11:08 AM, darrob wrote: >> >> I'd like to discuss my idea for a messaging system on Tahoe with you. >> As far as I know there is currently no such thing. Great idea! We've discussed this a bit in the past, in the context of helping AllMyData users send files to each other, but never got around to building most of it. (We did build a tinyurl-like service that pointed at filecaps, with some Javascript in the frontend that acted upon the link by inserting the filecap into your root directory, but it was mostly out-of-band). Our thought was to give each pair of users a pair of directories. Each one would be an "inbox" for one of them and an "outbox" for the other. You'd give your friend the writecap to your inbox, and they'd add things to it. Then you'd read from it later. A user agent could notice when something was added to the inbox and move it somewhere else (sort of like maildir's new/ and cur/ directories), to keep the inbox tidy. >> The file naming scheme here is -- >> -. The user_ID could be the directory URI or a shorter >> hash of it etc. You could just use the file's filecap: those are unique. Or the storage-index if you wanted to show someone else the directory listing without revealing the filecaps. >> [1]: A text file containing a list of URIs would work, too, I >> suppose. I don't know which will be more efficient. The benefit of using a dircap to track them is that you could fetch your messages from a different machine by just remembering the dircap, instead of the whole list of URIs. >> [4]: A quick Google search brought up >> http://muffinresearch.co.uk/archives/2010/10/15/fake-smtp-server-with-python/ Twisted has a lot of SMTP functionality built-in, which would make it easier to integrate into the Tahoe process, if that ended up being useful. On 3/5/12 9:26 PM, David Reid wrote: > I've so far considered the problem from a fairly email centric point > of view. My ideas also require the so far non-existant append-only > capability and draw inspiration from systems like StubMail[1] and > Internet Mail 2000[2]. > > You see an email address, is capability in it's own right. It's a > transferable (practically) non-revocable append-only capability for a > message queue that is directly linked to your attention span. At this > point I should hope that the negative properties of an email address > are obvious. You've read my http://petmail.lothar.com/ paper, right? It probably won't surprise you that some of these ideas influenced Tahoe too. > Alice has bob's append-cap. > Alice creates a new message on the grid. > Alice takes the read-cap for that message and writes that (perhaps > with other metadata) into bob's append-cap. As above, you can mostly avoid the need for append-caps by using pairwise inbox/outbox directories. Drawbacks: * Giving Alice a one-inbox writecap allows her to cancel messages (deleting it before Bob has a chance to read it), but you could actually argue this is a feature * For long-term storage, Bob might want to have a user agent (or a cron job) copy/move messages out of the inbox and into some archive directory where Alice can't delete them any longer Advantages: * it's clear where the message came from: Alice cannot write into the inbox that Bob has created for Carol * append-only caps are, cryptographically speaking, really hard > Bob then uses the read-cap to his inbox to look at all the message > metadata and download the messages he wants to read. This is where the > system resembles Internet Mail 2000, in a grid with accounting the > cost of storing the unread sent message is pushed to the sender. Yeah, my problem with IM2k was always that storage of the message body is not the important cost: as you pointed out, it's the recipient's attention that really matters. In IM2k, or this scheme, you have to give the recipient enough information about the message (typically the subject line) to decide whether to download the rest. It'll take the spammers at most an hour before every subject line is "Help I've been mugged and lost my wallet", or "Hi sweetie", or "Important your account has been suspended", and the recipient has to download every message (or ignore them and suffer false-positives). Actually, I take it back, every spam I get already has those subject lines :). What you really need is to rate-limit attention-grabbing behavior that comes from outside a "social contract". New connections (people who learn about me out-of-band, from a conference or a blog post or on the street) are only enabled by allowing strangers to consume your time, but if you can require them to spend their time too, then you can keep things to a comfortably civilized level. That rate-limiting could take the form of CAPTCHA, or money (either a refundable bond or outright payment), or proof of membership in some group, whatever fits your tastes. You also want reciprocal access and easy third-party introductions to reduce the barrier to natural human communication patterns, and you want gradual revocation to discourage abuse by otherwise normal correspondents (that uncle who keeps forwarding chain letters to you). > My ideas sort of hinge on something which is not quite possible in > Tahoe today, the revocable append-only capability. Sadly I don't even > feel I have a good understanding of how hard it is. But if it existed > it would be an incredibly powerful primitive for all sorts of > applications. Append-only caps are possible but tricky: we've had them sketched out for years. They need pubkey-encryption (which we don't currently have or need in Tahoe), but that's not too hard. The biggest part is deciding how much complexity we're willing to accept in exchange for reducing the server-attacker's ability to selectively roll-back individual records. There's a big fun multi-way tradeoff here. Zooko is keen on using client-side storage to remember the most-recent state of the mutable object (so they can reject attempts to roll it back). I keep fantasizing about a per-share DAG of record dependencies to make it hard for N-1 of the servers to convince you that a record has gone away. And there's a funny lattice of caps (append+write+read, append-only, append-and-read, write-only, read-only, verify) that need some thought. It gets even weirder when you consider the failure modes: if each record is erasure-coded, and you get 4 shares that show evidence of record A being added, and 3 with record B added, but k=5 and neither is enough to recover the new records.. what should a new record-appender do? Adding revocation to append-only caps is more complicated, but not horribly so. You'd keep a list of pubkeys (verifiying keys) in each share, signed by a master key (which gets to add/revoke append-caps). It adds an extra dimension of failure modes. The server needs to be more aware of the share format (to enforce some of the writer restrictions, to prevent simple availability-threatening graffiti), but that's the case for irrevocable appendcaps too. > Of course, I leave the UX model of interacting with these long random > cryptographic URLs as address for contacting people as an exercises > for the reader. Bah (/me waves hands), that's what petnames are for :). cheers, -Brian _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From wja2ja at yahoo.com Tue Mar 6 02:48:17 2012 From: wja2ja at yahoo.com (Y q) Date: Tue, 06 Mar 2012 19:48:17 +0900 Subject: No subject Message-ID: <201203061048.q26Am53S014754@proton.jfet.org> 軽いお食事・カラオケ同伴だけでお小遣いがもらえる!? 心配無用!!登録料・紹介料なんて一切ありません!! 何故こんな事が可能なのか…⇒ http://boobooden.info/slp37/ 興味がおあり方は是非早めのご参加を!! http://boobooden.info/slp37/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From oafkg0 at redesign.com Tue Mar 6 10:25:08 2012 From: oafkg0 at redesign.com (=?koi8-r?B?INDPxMHSz8sgyyA4IM3B0tTBIQ==?=) Date: Tue, 6 Mar 2012 20:25:08 +0200 Subject: =?koi8-r?B?49fF1NXdycog0dDPztPLycogws/O08HKIC0g18/TyMnUydTFzNjO2cog?= =?koi8-r?B?0M/EwdLPyyDLIDggzcHS1MEh?= Message-ID: Распродажа японских карликовых деревьев бонсай. Доставка за 2 часа. Подарки всем покупателям. Дарите чудо и красоту! http://подари-бонсай.рф From khsu at stanford.edu Tue Mar 6 20:53:57 2012 From: khsu at stanford.edu (Kevin Hsu) Date: Tue, 6 Mar 2012 20:53:57 -0800 Subject: [liberationtech] Atlantic: How Western Tech Firms Are Helping Arab Dictators Message-ID: Article of interest from *The Atlantic Monthly* http://www.theatlantic.com/international/archive/2012/03/how-western-tech-firms-are-helping-arab-dictators/254008/ Surveillance Inc: How Western Tech Firms Are Helping Arab Dictators By Trevor Timm & Jillian C. York Mar 6 2012, 7:01 AM ET *As democratic movements spread in the Middle East, governments are cracking down, and that means big business for the companies who help them do it.* [image: tunis march5 p.jpg] A computer systems coordinator at Tunisia Television in Tunis / Reuters Reliance means vulnerability, and the activists and citizen journalists of the Arab uprisings rely heavily on the Internet and mobile technology. They use text messaging to coordinate protests, for example, or social media sites to upload the photos and videos that then make it into mainstream global media. In the first protests in Tunisia, because traditional journalists could not get access, citizen journalists filled in, using YouTube and the live-streaming platform UStream to give the world -- including, for example, the Egyptians and Syrians who later began revolts of their own -- a window into the events there. For all of the good this technology has done, activists are also beginning to understand the harm it can do. As Evgeny Morozov wrote in *The Net Delusion *, his book on the Internet's darker sides, "Denying that greater information flows, combined with advanced technologies ... can result in the overall strengthening of authoritarian regimes is a dangerous path to take, if only because it numbs us to potential regulatory interventions and the need to rein in our own Western corporate excesses." The communications devices activists use are not as safe as they might believe, and dozens of companies -- many of them based in North America and Europe -- are selling technology to authoritarian governments that can be used against democratic movements. Such tools can exploit security flaws in the activists' technology, intercept a user's communications, or even pinpoint their location. In many cases, this technology has led to the arrest, torture, and even death of individuals whose only "crime" was exercising their universal right to free speech. And, in most of these cases, the public knew nothing about it. Recent investigations by the *Wall Street Journal * and *Bloomberg News * have revealed just how expansively these technologies are already being used. Intelligence agencies throughout the Middle East can today scan, catalogue, and read virtually every email in their country. The technology even allows them to change emails while en route to their recipient, as Tunisian authorities sometimes did before the revolution. These technologies turn activists' phones against them, allowing governments to listen in on phone calls, read text messages, even scan cell networks and pinpoint callers with voice recognition. They allow intelligence agents to monitor movements of activists via a GPS locator updated every fifteen seconds. And by tricking users into installing malware on their devices -- as is currently happeningin Syria - government agents can remotely turn on a laptop webcam or a cell phone microphone without its user knowing. In Syria recently, American journalist Marie Colvin and French photographer Rimi Ochlik were killed by a mortar attack that may have been targeted to the locations of their satellite phones. We don't know for sure how the Syrian army tracked them, but Lebanese intelligence had recorded Syrian officials as planning to targetWestern journalists, and following satellite phone signals is just one of the tech-aided ways they could have done it. Syria and other abusive Middle Eastern regimes rely on technology companies such as Area SpA, the Italian firm that contracted with the regime there to build a surveillance center, and that pulled out only after exposure by Bloomberg News prompted protests at their Italian headquarters. There's also the American company Bluecoat Systems. When it was reported that their Internet-monitoring equipment had been re-sold to the Syrian government, a senior VP toldthe *Wall Street Journal*, "We don't want our products to be used by the government of Syria or any other country embargoed by the United States." For all the evil of Syria's regime, it's hard to ignore the role and often the complicity of Western technology companies that can sometimes act as dictator's little helper. While Syria's use of surveillance has been particularly egregious and well-documented, this problem goes far beyond just one country. For years, Western firms have been selling surveillance equipment to the most brutal regimes. And while sales to Syria often violate sanctions policy, such companies can sell to many other authoritarian countries -- many of them U.S. and E.U. allies -- without repercussions. In pre-revolutionary Tunisia, surveillance firms gave discountsto a government agency because the firms wanted to use the country for testing and bug-tracking. The technology was so advanced that it prompted the post-revolutionary head of the Tunisian government's Internet agency to remark, "I had a group of international experts from a group here lately, who looked at the equipment and said: 'The Chinese could come here and learn from you.'" In Bahrain, dozens of political activists have testifiedthat the security officers who detained and beat them also read transcripts of their text messages and emails likely gathered from technology purchased from Germany-based Trovicor , a former Nokia Siemens subsidiary. According to *Bloomberg* *News*, a spokesman for the latter confirmedthe sale and maintenance of this equipment to the Bahraini government. "The bulk of this digital arms trade happens under the radar. Qaddafi's regime was later found to have spied on *Al Jazeera* journalist Khaled Mehiri by monitoring his emails and Facebook messages using technologymade by French company Amesys. Mehiri was later interrogated and threatened by the head of Libya's intelligence service. The reporters who found Mehiri's surveillance file in Tripoli's abandoned Internet monitoring center discovered similar files on many other journalists, human rights advocates, and democratic activists. The mass surveillance industry is a large one -- estimates now putthe global market at $5 billion per year. The businesspeople getting rich from the crackdown industry don't often talk to the media, but some of the few who do can seem less than concerned about their potential role in their clients' violence. Jerry Lucas is the president of Telestragies Inc, the company that runs ISS World, the trade show circuit (also known as the "Wiretapper's Ball") that brings these companies and their clients together. Asked by the *Guardian*in November if he would be comfortable knowing that regimes in Zimbabwe and North Korea were purchasing the technology from his trade shows, he responded, "That's just not my job to determine who's a bad country and who's a good country." He added, "That's not our business, we're not politicians ... we're a for-profit company. Our business is bringing governments together who want to buy this technology." This is the crux of the problem: These companies seem fully aware of what they're doing - after all, the better they understand how to help secret police find and terrorize dissidents, the better their products will do on the market -- but far less concerned about the implications. As Dutch member of the E.U. Parliament Marietje Schaake told us last week, "The bulk of this digital arms trade happens under the radar; through spin-offs of well-known companies, but mostly by players without a reputation to lose with consumers." Schaake, who has been leading an effort in Europe to halt the sale of surveillance technologies to repressive regimes, helped pass E.U. export restrictions to some government actors in Syria. In the U.S., Rep. Chris Smith introduceda bill in the House that would require American companies listed on the stock exchange to report to the U.S. Securities and Exchange Commission on how they conduct due diligence on human rights issues. Unfortunately, apart from the work of a few individuals, this problem has gone mostly ignored by Western governments, and the digital surveillance trade still seems to be flourishing. Congress, the E.U., and the U.N. all have the ability act -- by requiring the relevant companies to at least transparently evaluate whether or not their technology is aiding in human rights abuses, if not banning those sales outright -- but so far, even as dozens of Syrians die every day, they haven't. _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From rgess at sogeasoft.com Tue Mar 6 19:46:30 2012 From: rgess at sogeasoft.com (=?koi8-r?B?IsTJ0sXL1M/SINPU0s/J1MXM2M7PyiDLz83Qwc7JySAi?=) Date: Tue, 6 Mar 2012 22:46:30 -0500 Subject: =?koi8-r?B?68HEwdPU0s/X2cog0MzBzg==?= Message-ID: <01ccfbea$f8ae6700$eeebebbe@rgess> Пpиглaшaeм Bac пpинять yчacтиe в ежемесяном обучении: HOBOE B ПPABOBOМ PEГУЛИPOBAHИИ OФOPМЛEHИЯ ПPAB HA OБЪEКTЫ HEДBИЖИМOCTИ. Правовые особенности кадастровой деятельности. ЗЕМЕЛЬНЫЙ КОДЕКС РФ: последние изменения, практика применения. Мepопpиятиe пpойдёт c 19 по 20 марта 2012 г. в Caнкт-Пeтepбypгe. Рассматриваемые вопросы: Последние изменения в правовом регулировании оформления прав на объекты недвижимости. Поправки в Земельный кодекс РФ. Изменения в ФЗ "О государственной регистрации прав на недвижимое имущество и сделок с ним". Принципы ведения государственного кадастра недвижимости. Порядок предоставления сведений ГКН. Порядок и особенности осуществления кадастрового учёта земельных участков, зданий, сооружений, объектов незавершённого строительства, помещений. Основания приостановления и отказа в проведении кадастрового учёта. Межевой план.Порядок согласования местоположения границ земельных участков Кадастровые паспорта на земельные участки, здания, сооружения, объекты незавершённого строительства, помещения. Разграничение полномочий федеральной, региональной и муниципальной власти на сделки с землёй. Проблемы и рекомендации. Сделки с землёй. Регламент предоставления земельного участка в собственность. Особенности перехода права собственности на землю при переходе прав на строение. Порядок приобретения прав на земельные участки, находящиеся в государственной или муниципальной собственности, на которых расположены здания, строения, сооружения (в т.ч. приватизированные). Особенности предоставления земельных участков для строительства. Порядок предоставления земель для различных целей. административные ограничения прав на землю. Заключение договоров аренды земельных участков. Анализ арбитражной практики. Особенности оборота земельных участков, относящихся к землям сельскохозяйственного назначения. Особенности оформления прав на земельные участки под строительство линейных объектов. Регистрация прав собственности на линейные объекты и объекты инженерной инфраструктуры. Для бpониpовaния гоcтиницы в Caнкт-Пeтepбypгe пpоcим Bac зapaнee cообщить о Baшeм нaмepeнии.Дополнитeльнyю инфоpмaцию и ПОЛНУЮ ПРОГРАММУ Bы можeтe зaпpоcить по телефонy: (812) 642 47 43 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4336 bytes Desc: not available URL: From syverson at itd.nrl.navy.mil Tue Mar 6 20:14:39 2012 From: syverson at itd.nrl.navy.mil (Paul Syverson) Date: Tue, 6 Mar 2012 23:14:39 -0500 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: On Tue, Mar 06, 2012 at 08:15:58PM -0500, Mansour Moufid wrote: > On Tue, Mar 6, 2012 at 4:04 PM, Paul Syverson wrote: > > I'm a mere four years behind in putting my work up on the web, and > > this one wasn't co-authored so nobody else did either. I'll try to do > > something about that in my copious free time this week and send a > > link. > > Please do, this attack you mention is one I've been very interested > in. I'm sure many others would also love to read more about it. > I'll try to get to it soon. > It's time the myth of the GPA was challenged. I don't think active > correlation attacks can be defended against, but I think they can at > least be detected. Actually there are many papers over the last several years (e.g., at ACM CCS and Info Hiding) showing that one can place undetectable timing channels on flows (for some schemes provably undetectable for others practically undetectable). But passive correlation is adequate anyway, even at very low sampling rates (cf. Murdoch and Zielinski, PETS 2007). This is long known and well understood. It's why we have always said that onion routing resists traffic analysis not traffic confirmation. -Paul _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From raggedier1 at pcai.com Tue Mar 6 08:41:28 2012 From: raggedier1 at pcai.com (=?koi8-r?B?7cHSx8HSydTB?=) Date: Tue, 6 Mar 2012 23:41:28 +0700 Subject: =?koi8-r?B?7cXEycHQzMXF0tkgSWNvbmJpdCArIMvPzMzFy8PJySDGyczYzc/X?= Message-ID: <7F0CA511536C4B7AA020EF539E6332DA@1C65DBCC01CD4DA> Все фильмы и сериалы для милых дам в честь 8 марта! Праздник 8 марта не за горами и вот –вот накроет всех огромной волной ароматов, слов и подарков. Наш интернет магазин станет Вашим лоцманом в океане подарков для милых дам. Выберите самый лучший из каталога : фильмов, сериалов, документальных фильмов и мультфильмов – всё многообразие наших коллекций в преддверии праздника весны только для Вас! www.сериалы-фильмы.рф C Уважением, Надежда From mk at dee.su Tue Mar 6 15:18:01 2012 From: mk at dee.su (Maxim Kammerer) Date: Wed, 7 Mar 2012 01:18:01 +0200 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: On Tue, Mar 6, 2012 at 23:04, Paul Syverson wrote: > The suggestion was that people _stop_ working on > defeating the GPA, which is unrealistic as both too strong (global) > and too weak (passive). While this may be true in the theoretical sense, it doesn't mean that one can't make correlation attacks less practical. I find it hard to believe that right now NSA, for instance, has Tor traffic analysis tightly integrated into its worldwide communications sniffing framework, simply because it's too much of a logistic problem, and anonymous networks are unlikely to be sufficiently high-profile targets so as to warrant expending the resources to deal with the logistics (yet). But I think that it is entirely believable that NSA has a dedicated project (even if only for research purposes) where the traffic from all known relays (a relatively stable pool of ~3000 nodes?) is sniffed and analyzed b that would be relatively simple to setup and maintain, given the unlimited interception capabilities. And you can combat the latter b by extending and popularizing the entry bridges concept, implementing exit bridges, making all clients relays by default (even if that won't contribute significant bandwidth), etc. -- Maxim Kammerer LibertC) Linux (discussion / support: http://dee.su/liberte-contribute) _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From owend at he.net Wed Mar 7 01:53:47 2012 From: owend at he.net (Owen DeLong) Date: Wed, 7 Mar 2012 01:53:47 -0800 Subject: [ipv6hackers] IPv6 prefix changing Message-ID: It isn't law (yet) in Germany, but, since many of the ISPs there think that it is, it might as well be. Also, likely it will become a law, especially if a significant fraction of ISPs don't implement it without one. It's really unfortunate, because the recommendation is actually more concerned about the suffix portion than the prefix portion and states that it should be up to the subscriber's preference. However, like most recommendations, it suffers from the telephone game (the more parties involved in relaying a message, the more mutated the message becomes) and the human tendency towards over-simplification creates an implementation attitude of simply forcing periodic prefix changes to "satisfy German privacy laws". IMHO, better would be to default to a static prefix, inform customers of the option of using privacy addresses (non-MAC based SLAAC addresses) which are now default (unfortunately) on Windows and MacOS anyway. Offer customers that want a dynamic prefix the option. This should satisfy German privacy concerns while still allowing most customers to get sane IPv6 deployments. Owen On Mar 6, 2012, at 12:11 PM, Alex List wrote: > According to [1] there's no such law in Germany. Btw, if someone could > point me out where one could find such law in any country, I would be very > thankful. > > @Sara: try to search for 'dynamic prefix nanog' > > Regards, Alex > > Refs: > [1] > http://www.datenschutz-hamburg.de/uploads/media/IPv6_Aufsatz_in_MMR-08-2011.pdf, > page 5: "Regulierung der Adressvergabe" > _______________________________________________ > Ipv6hackers mailing list > Ipv6hackers at lists.si6networks.com > http://lists.si6networks.com/listinfo/ipv6hackers _______________________________________________ Ipv6hackers mailing list Ipv6hackers at lists.si6networks.com http://lists.si6networks.com/listinfo/ipv6hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From AllegraUlmer at mail.com Tue Mar 6 23:28:19 2012 From: AllegraUlmer at mail.com (NickyBrydges) Date: Wed, 07 Mar 2012 02:28:19 -0500 Subject: Looks like we didn't really know anything about her:) Message-ID: <9EF63C16.5764A3E3@mail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 173 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Photo.zip Type: application/octet-stream Size: 23793 bytes Desc: not available URL: From the.raccoon23 at gmail.com Tue Mar 6 20:55:54 2012 From: the.raccoon23 at gmail.com (The23rd Raccoon) Date: Wed, 7 Mar 2012 04:55:54 +0000 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: On Wed, Mar 7, 2012 at 12:20 AM, Seth David Schoen wrote: > andrew at torproject.is writes: > > I was concerned that the graphic should not make people think that > _no one_ can ever associate them with their browsing when they use > Tor. I've been taught to think of the GPA threat (and other traffic > correlation threats) as real, so I thought people should have some > indication of those threats. Now bear in mind that I'm just a Raccoon, but some time ago I scrawled a proof out that showed that the correlation accuracy of a "dragnet GPA" goes down in proportion to the square of the number of concurrent users using an anonymization service: http://archives.seul.org/or/dev/Sep-2008/msg00016.html The belief that you can test a correlation system independent of a population size is called the Base Rate Fallacy, and I believe much of the PETS timing attack literature suffers from it. In that post I demonstrated the effect the Fallacy has on dragnet correlation. I also gave some example calculations for how accuracy changes from different points of network surveillance with respect to population size and correlation accuracy. With end-to-end encryption and proper Tor cell size choice, the NSAs odds of watching everyone all the time (Example 1 in my post) and getting the correlation right are low and do clearly drop as more people use Tor. Therefore, I think the most accurate representation would be to put a question mark next to the data link between the two NSA dudes in your graphic, because they aren't exactly sharing perfectly; they are consulting each other, correlating observed traffic patterns with some error rate, and rolling the dice. A question mark captures this well. Putting "Capabilities Uncertain" underneath the question mark or as a footnote might be even better, if we already have newspaper articles citing the graphic as proof Tor is broken... P.S. To the list administrators, it looks like the new archives have truncated my proof at the new archive: https://lists.torproject.org/pipermail/tor-dev/2008-September/002493.html _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From immunityre271 at clovertechnologies.com Wed Mar 7 04:56:49 2012 From: immunityre271 at clovertechnologies.com (=?koi8-r?B?98XSwQ==?=) Date: Wed, 7 Mar 2012 04:56:49 -0800 Subject: =?koi8-r?B?9Nkg1dbFINLF28nMwSDe1M8g0M/EwdLJ29ggzdXW1SDOwSDQ0sHaxM7J?= =?koi8-r?B?y8k/?= Message-ID: <94BFD2652EC74E7C85BB5D94E378C048@stvetanka> Хотите, чтобы вам стала доступна вся мультимедийная вселенная без всяких усилий? Воспользуйтесь линейкой медиа плееров Full HD с коллекцией лучших фильмов, документальных фильмов и сериалов. Вы сможете полностью насладиться музыкой, фильмами, фотографиями высочайшего качества и получите возможность смотреть всё это на своём телевизоре - без каких-либо преобразований форматов. Множество фильмов в Full HD на 1 жёстком диске. Лучшие экслюзивные коллекции! Доставим бесплатно на дом или в офис по всем регионам России. Дополнительная информация тут: www.коллекциифильмов.рф From angelitaamerica at raincode.net Tue Mar 6 22:36:12 2012 From: angelitaamerica at raincode.net (Youlanda Stacy) Date: Wed, 07 Mar 2012 05:36:12 -0100 Subject: Buy Cialis Online - Save BIG $$$!!! Fast Worldwide shipping! 8wzxui39 Message-ID: <82g44x89l60-72319004-370x8i74@fbhytpw> LOWEST CIALIS PRICES Lowest Prices On The INTERNET! Buy Cialis Online - Save BIG $$$!!! Fast Worldwide shipping! http://tabdrugstorepills.ru From dewarw at maplevest.com Tue Mar 6 20:44:52 2012 From: dewarw at maplevest.com (=?koi8-r?B?IuLPztPByiI=?=) Date: Wed, 7 Mar 2012 07:44:52 +0300 Subject: =?koi8-r?B?OCDNwdLUwSDQ0snCzMnWwcXU09EuIOzAwsnN2cog0M/EwdLPyyAtINHQ?= =?koi8-r?B?z87Ty8nFIMvB0szJy8/X2cUgxMXSxdfY0SDCz87Twcou?= Message-ID: Любимый подарок - японские карликовые деревья бонсай. Распродажа к 8 марта. Подарки всем! Специальные цены пр заказе от 2 от 5 от 20 штук! Звоните 780-21-94 www.подари-бонсай.рф From jaimiefleta at jwamalls.com Wed Mar 7 07:40:26 2012 From: jaimiefleta at jwamalls.com (CARLEE LAEL) Date: Wed, 07 Mar 2012 08:40:26 -0700 Subject: Male Penis Enhancement - Male Extra Pills - Rock solid, bigger, harder, more intense erections. x8mwa Message-ID: <4f57816a.5551dfb0@jwamalls.com> Male Penis Enhancement - Male Extra Pills Rock solid, bigger, harder, more intense erections and enlarge your penis by up to 3 inches with #1 Male Extra Penis Enhancement Pills. Get Max Discount. 100% risk free money back guarantee. http://herbalpenisTRUE.ru From eugen at leitl.org Wed Mar 7 00:57:35 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 7 Mar 2012 09:57:35 +0100 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: <20120307085735.GC9891@leitl.org> ----- Forwarded message from Maxim Kammerer ----- From eugen at leitl.org Wed Mar 7 01:13:15 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 7 Mar 2012 10:13:15 +0100 Subject: [tahoe-dev] Idea for a Publish/Subscribe Message System on Tahoe-LAFS Message-ID: <20120307091315.GE9891@leitl.org> ----- Forwarded message from Brian Warner ----- From bloodmobilefce at westportfund.com Wed Mar 7 00:14:48 2012 From: bloodmobilefce at westportfund.com (=?koi8-r?B?7cHSx8HSydTB?=) Date: Wed, 7 Mar 2012 10:14:48 +0200 Subject: =?koi8-r?B?68/MzMXLw8nRIM3VzNjUxsnM2M3P1yDR187PINDP0sHE1cXUIPfB28nI?= =?koi8-r?B?IMTF1Mnbxcs=?= Message-ID: <000d01ccfc3a$5cbcedd0$6400a8c0@bloodmobilefce> Используете домашний ПК для просмотра фильмов и воспроизведения музыки? А не хотели бы вы насладиться просмотром любимого фильма или видео с качеством Full HD,у себя дома в удобном кресле? Суперсовременный Full HD (1920x1080р) - это медиа плеер, который поддерживает просмотр 3D фильмов Iconbit XDS1003D с большими коллекциями, позволит воплотить вам вашу мечту. Дополнительная информация тут: www.лучшиеколлекции.рф From eugen at leitl.org Wed Mar 7 01:17:11 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 7 Mar 2012 10:17:11 +0100 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: <20120307091711.GG9891@leitl.org> ----- Forwarded message from Paul Syverson ----- From eugen at leitl.org Wed Mar 7 01:18:20 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 7 Mar 2012 10:18:20 +0100 Subject: [liberationtech] Atlantic: How Western Tech Firms Are Helping Arab Dictators Message-ID: <20120307091820.GH9891@leitl.org> ----- Forwarded message from Kevin Hsu ----- From eugen at leitl.org Wed Mar 7 01:19:10 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 7 Mar 2012 10:19:10 +0100 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: <20120307091910.GI9891@leitl.org> ----- Forwarded message from The23rd Raccoon ----- From eugen at leitl.org Wed Mar 7 01:57:39 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 7 Mar 2012 10:57:39 +0100 Subject: [ipv6hackers] IPv6 prefix changing Message-ID: <20120307095739.GM9891@leitl.org> ----- Forwarded message from Owen DeLong ----- From seedusa at ecscontrols.com Tue Mar 6 20:38:17 2012 From: seedusa at ecscontrols.com (=?koi8-r?B?IvfTxdfPzM/EIOvVxNLJziI=?=) Date: Wed, 7 Mar 2012 11:38:17 +0700 Subject: =?koi8-r?B?9enrLfzu5CD3ICLk8vXn7+0g9OXh9PLlIg==?= Message-ID: <01ccfc56$c9cdda80$7f4bb271@seedusa> Праздники и выходные в "ДРУГОМ ТЕАТРЕ" ! 9 марта на сцене ДК имени Зуева (ул. Лесная 18) спектакль "КТО" режиссер М.Виторган В ролях: Елена Ксенофонтова, Андрей Ильин, Сергей Белоголовцев 9 марта на сцене Центра-музея В. Высоцкого (Нижний Таганский тупик, дом 3) "В обществе мертвых поэтов" Режиссер А.Огарев В ролях: Вера Воронкова, Константин Чепурин, Артем Смола и др. 11 марта на малой сцене т.Луны (М. Ордынка, 31) "ПРО БАБ" Режиссеры: О.Субботина, Л.Тимцуник В ролях: Агриппина Стеклова, Вера Воронкова, Александр Самойленко, Андрей Кузичев Билеты - по цене театра. Без комиссий и наценок. Возможна доставка. Телефон: 8(499) 973...21...41 Театральное агентство "Рампа". From baavmd91 at elmecon.com Wed Mar 7 03:09:51 2012 From: baavmd91 at elmecon.com (=?koi8-r?B?6c7HwQ==?=) Date: Wed, 7 Mar 2012 12:09:51 +0100 Subject: =?koi8-r?B?7dkg1dbFINDSycTVzcHMySDe1M8gzc/Wzs8g0M/EwdLJ1NggwszJ2svP?= =?koi8-r?B?zdU=?= Message-ID: <000d01ccfc52$d130dce0$6400a8c0@baavmd91> Хотите, чтобы вам стала доступна вся мультимедийная вселенная без всяких усилий? Воспользуйтесь линейкой медиа плееров Full HD с коллекцией лучших фильмов, документальных фильмов и сериалов. Вы сможете полностью насладиться музыкой, фильмами, фотографиями высочайшего качества и получите возможность смотреть всё это на своём телевизоре - без каких-либо преобразований форматов. Множество фильмов в Full HD на 1 жёстком диске. Лучшие экслюзивные коллекции! Доставим бесплатно на дом или в офис по всем регионам России. Перейти к магазину: www.покупайфильмы.рф From stercor at gmail.com Wed Mar 7 09:21:36 2012 From: stercor at gmail.com (Ted Rolle, Jr.) Date: Wed, 07 Mar 2012 12:21:36 -0500 Subject: [tahoe-dev] Instant messaging. Message-ID: Did I read correctly? An Instant Messaging (IM) add-on to Tahoe-LAFS? SILC is all but dead. I can't even find the source code nor contact its author, Pekka Riikonen. I don't know whether there are alternatives to SILC. SILC was a really cool project. Ted _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From mikeperry at torproject.org Wed Mar 7 12:27:53 2012 From: mikeperry at torproject.org (Mike Perry) Date: Wed, 7 Mar 2012 12:27:53 -0800 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: Thus spake Paul Syverson (syverson at itd.nrl.navy.mil): > > It's time the myth of the GPA was challenged. I don't think active > > correlation attacks can be defended against, but I think they can at > > least be detected. > > Actually there are many papers over the last several years (e.g., at > ACM CCS and Info Hiding) showing that one can place undetectable > timing channels on flows (for some schemes provably undetectable for > others practically undetectable). Thanks to Mark Klein, we know that the NSA wiretaps in the US are passive in nature, not active. But who knows what they do to overseas links and specific high-value targets... > But passive correlation is adequate anyway, even at very low sampling > rates (cf. Murdoch and Zielinski, PETS 2007). This is long known and > well understood. It's why we have always said that onion routing > resists traffic analysis not traffic confirmation. I have to agree with the Raccoon here. I actually don't think Murdoch's work demonstrated that sampling adversaries can adequately correlate web-sized traffic. It seems pretty clear to me that the typical sampling rate of 1/2048 did not become effective until you were around O(100MB) in transfer. He wrote that 1/500 became effective at around O(1MB) in transfer, but that is still a bit above most web page sizes. There is also the question of an extremely low concurrent flow count compared to reality today. He used only 500 flows/hour to correlate, where as at any given *second* O(10k) TCP connections are opened through every gbit Tor node in operation today. He also used an artificial prior distribution on connection sizes. Both of these properties alter the event rate and thus the overall accuracy in the experimental results as compared to reality. I think we can agree that large video uploaders stick out like sore thumbs (due to relative lack of upload traffic frequency), but I don't think The Man can correlate millions of simultaneous web page views and expect to have certainty over who is viewing what at all times. At some point, you simply run out of differentiating bits to extract from size and timing information to properly segment the userbase. And as far as I know, no one has really considered the full impact of userbase size on correlation in the research community (aside from the Raccoon). -- Mike Perry _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From lynncqa56 at swtia.com Wed Mar 7 02:50:00 2012 From: lynncqa56 at swtia.com (=?koi8-r?B?IuLPztPByiI=?=) Date: Wed, 7 Mar 2012 12:50:00 +0200 Subject: =?koi8-r?B?OCDNwdLUwSDQ0snCzMnWwcXU09EuIOzAwsnN2cog0M/EwdLPyyAtINHQ?= =?koi8-r?B?z87Ty8nFIMvB0szJy8/X2cUgxMXSxdfY0SDCz87Twcou?= Message-ID: <0CE9AE428CF1410BA3687A2332B14E32@psiho> Любимый подарок - японские карликовые деревья бонсай. Распродажа к 8 марта. Подарки всем! Специальные цены пр заказе от 2 от 5 от 20 штук! Звоните 780-21-94 www.подари-бонсай.рф From online at uiu.ca Tue Mar 6 23:27:38 2012 From: online at uiu.ca (=?koi8-r?B?IunOzsEg6czAyMnOwSI=?=) Date: Wed, 7 Mar 2012 12:57:38 +0530 Subject: =?koi8-r?B?8NLFzdjF0tkg1yAixNLVx8/NINTFwdTSxSIg?= Message-ID: <01ccfc61$df94cd00$9c57c875@online> Праздники и выходные в "ДРУГОМ ТЕАТРЕ" ! 9 марта на сцене ДК имени Зуева (ул. Лесная 18) спектакль "КТО" режиссер М.Виторган В ролях: Елена Ксенофонтова, Андрей Ильин, Сергей Белоголовцев 9 марта на сцене Центра-музея В. Высоцкого (Нижний Таганский тупик, дом 3) "В обществе мертвых поэтов" Режиссер А.Огарев В ролях: Вера Воронкова, Константин Чепурин, Артем Смола и др. 11 марта на малой сцене т.Луны (М. Ордынка, 31) "ПРО БАБ" Режиссеры: О.Субботина, Л.Тимцуник В ролях: Агриппина Стеклова, Вера Воронкова, Александр Самойленко, Андрей Кузичев Билеты - по цене театра. Без комиссий и наценок. Возможна доставка. Телефон: 8(499) 973..21__41 Театральное агентство "Рампа". From grarpamp at gmail.com Wed Mar 7 10:57:23 2012 From: grarpamp at gmail.com (grarpamp) Date: Wed, 7 Mar 2012 13:57:23 -0500 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: > The nodes must reside in commercial data centers Subject only to Tor's defenses, such as CIDR block restrictions, a node is a node. Going with the USA idea: what if the FBI, in the normal course of business, calls up all their local cable/dsl/fiber/cell providers and has a few lines run to each office and outhouse nationwide. Not enough nodes? Maybe they offer their workers free internet access and give them a secure little 'router'. Or use routing and vpn tricks to buy/borrow enough CIDR safe node IP's from whoever and route them all back to a node farm for easier management. > the resulting possibility of discovering the interception framework > employed Only the node list needs to be classified against FOIA to prevent blockage. Once the tech is figured out to the point that product is producible, the remaining thing is what can be legally done with it all. Warrantless and dragnet tap projects are holding up pretty well so far, right? Certainly targeted actions are no problem. > run untrusted software (including necessarily modified Tor clients), > all of which exposes them to hacking risks No news of Tor daemons being cracked to date, right? Isn't Tor full of nodes running all sorts of untrusted software under less than perfect admin skills? It's pretty unlikely that 'chat room' busts use Common Criteria systems either. > But one could try correlating Tor relays and Tor clients growth > graphs since, say, 2000 - if at some point there was a sharp > growth in USA-located relays without a corresponding growth in > total clients, and if those relays have similar bandwidth / data > center quality capabilities, then that could be "The Man". There is this thread for starters: http://archives.seul.org/or/talk/Jun-2009/msg00253.html I would also look to make sure the timing to a node makes sense with its presumed geolocation. It should never be shorter than possible, nor really much longer either. Perhaps the threat is unlikely, but not impossible. _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From CharitaGreear at mail.com Tue Mar 6 23:19:22 2012 From: CharitaGreear at mail.com (ColtonCravalho) Date: Wed, 07 Mar 2012 15:19:22 +0800 Subject: I need your opinion on this. Message-ID: Hello admin at al-qaeda.net, What do you think about this pircure in attachment? Is it really him?? Looks really drugged up and having no clue what he does. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 488 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Photo.zip Type: application/octet-stream Size: 23793 bytes Desc: not available URL: From satietyp387 at toshibadirect.com Wed Mar 7 01:56:33 2012 From: satietyp387 at toshibadirect.com (=?koi8-r?B?IuLPztPByiI=?=) Date: Wed, 7 Mar 2012 15:26:33 +0530 Subject: =?koi8-r?B?OCDNwdLUwSDQ0snCzMnWwcXU09EuIOzAwsnN2cog0M/EwdLPyyAtINHQ?= =?koi8-r?B?z87Ty8nFIMvB0szJy8/X2cUgxMXSxdfY0SDCz87Twcou?= Message-ID: Любимый подарок - японские карликовые деревья бонсай. Распродажа к 8 марта. Подарки всем! Специальные цены пр заказе от 2 от 5 от 20 штук! Звоните 780-21-94 www.подари-бонсай.рф From mk at dee.su Wed Mar 7 06:43:03 2012 From: mk at dee.su (Maxim Kammerer) Date: Wed, 7 Mar 2012 16:43:03 +0200 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: On Wed, Mar 7, 2012 at 06:30, grarpamp wrote: > Setting aside the taps, what if half the 3000 nodes are 'The Man'? I think that's quite unlikely. The nodes must reside in commercial data centers and run untrusted software (including necessarily modified Tor clients), all of which exposes them to hacking risks and to the resulting possibility of discovering the interception framework employed (which is probably not unique to Tor, so that's a huge risk). But one could try correlating Tor relays and Tor clients growth graphs since, say, 2000 b if at some point there was a sharp growth in USA-located relays without a corresponding growth in total clients, and if those relays have similar bandwidth / data center quality capabilities, then that could be "The Man". -- Maxim Kammerer LibertC) Linux (discussion / support: http://dee.su/liberte-contribute) _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From matteodellamico at gmail.com Wed Mar 7 07:52:19 2012 From: matteodellamico at gmail.com (Matteo Dell'Amico) Date: Wed, 07 Mar 2012 16:52:19 +0100 Subject: [p2p-hackers] Nash equilibrium on p2p networks Message-ID: On 07/03/2012 15:02, danimoth wrote: > Il giorno mar, 06/03/2012 alle 16.34 +0000, Michael Rogers ha scritto: > If you're modelling a DHT as a game then who are the players, what are >> the possible strategies, what are the payoffs, how much do the players >> know about each other's strategies and payoffs, and what strategy do > you >> want to encourage? >> > That's are the questions I'm asking to myself since first post, and > looking to other's work (if exists) applied to p2p networks maybe could > help me. There's actually plenty of work on incentives to cooperation in P2P systems that can actually interest you. The keywords to look for in Google Scholar are probably "p2p incentives", "p2p reputation". The papers about the topic that I like most are: "Incentives build robustness in BitTorrent" by Bram Cohen (P2PEcon 2003) and "Sybilproof reputation mechanisms" by Alice Cheng and Eric Friedman (P2PEcon 2005). I wrote my Ph.D. thesis on incentives to cooperation in P2P, and you might be interested in the Background chapter: http://www.disi.unige.it/person/DellamicoM/research/phd-thesis.pdf cheers! matteo _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From paltryp024 at packstaff.com Wed Mar 7 00:49:01 2012 From: paltryp024 at packstaff.com (Cleo Oconnor) Date: Wed, 7 Mar 2012 17:49:01 +0900 Subject: =?koi8-r?B?89TJzNjO2cog0M/EwdLPyyDLIDggzcHS1MEgLSDLwdLUyc7BINcg0s/T?= =?koi8-r?B?y8/bzs/KINLBzcU=?= Message-ID: Наши картины оформлены в прекрасные рамы с паспарту под стеклом и упакованы в подарочные коробки. Размер картины с рамой 30х24см Специальное предложение для корпоративных подарков! Звоните!!! Полная коллекция цветных Ботанических картин: !!!!!!! ССЫЛКА http://картина-тут.рф/8.shtml !!!!!! Доставка курьером по Москве, Питеру и еще в 721 город! From eugen at leitl.org Wed Mar 7 08:56:56 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 7 Mar 2012 17:56:56 +0100 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: <20120307165656.GD9891@leitl.org> ----- Forwarded message from Maxim Kammerer ----- From eugen at leitl.org Wed Mar 7 08:58:32 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 7 Mar 2012 17:58:32 +0100 Subject: [p2p-hackers] Nash equilibrium on p2p networks Message-ID: <20120307165832.GE9891@leitl.org> ----- Forwarded message from Matteo Dell'Amico ----- From eugen at leitl.org Wed Mar 7 09:19:55 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 7 Mar 2012 18:19:55 +0100 Subject: AG Sort of Explains When and Why the President Could Drop a Bomb on You Message-ID: <20120307171955.GJ9891@leitl.org> (you keep using that word. it doesn't mean what you think it means. also, furriners are never out of season, apparently) http://www.loweringthebar.net/2012/03/ag-sort-of-explains-when-and-why-the-president-could-drop-a-bomb-on-you.html AG Sort of Explains When and Why the President Could Drop a Bomb on You In case you missed it, the Attorney General of the United States spent a little time yesterday discussing the circumstances under which the President could order your death without having a trial or even having charged you with any crime. I just wrote that sentence myself, and I still keep re-reading it, thinking "that can't be true." I wrote this up in more detail yesterday over at Forbes, where as you may have noticed I tend to post (or initially post) things masquerading as more serious items. "Attorney General Explains Why It's Okay to Kill U.S. Citizens Without a Trial," Forbes.com (Mar. 5, 2012); see also "You Say 'Indefinite Military Detention of Citizens Like It's a Bad Thing," Forbes.com (Dec. 7, 2011). I do think there are some decent lines in yesterday's post, although maybe not as good as Jonathan Turley's crack about the same speech: "The good news is that Holder promised not to hunt citizens for sport." I think that's a pretty good summary. The lowlights of the speech, I think, were Holder's promise that no citizen would be blown up unless the government had determined (among other things) "that the individual poses an imminent threat of violent attack against the United States," and his somewhat unusual definition of "due process." First, it turns out that "imminent" doesn't mean what you think it means (or what the dictionary thinks it means). Rather, the concept "incorporates considerations of the relevant window of opportunity to act, the possible harm that missing the window would cause to civilians, and the likelihood of heading off future disastrous attacks against the United States." If you see anything in there that has to do with being "imminent," please let me know. The "future" is a big place, and just because something might be in it does not make that thing "imminent." Major Kong rides the bomb in Dr. Strangelove Not quite on point, but a great picture anyway Second, Holder did promise that nobody would be killed without "due process." Comforting! But no! Because this also doesn't mean what you think it means. "'Due process' and 'judicial process' are not one and the same," Holder said, "particularly when it comes to national security. The Constitution guarantees due process, not judicial process." Oh. So what process are we due? Executive process. But have no fear, you won't be put on a death list without a "thorough and careful review" of the (secret) evidence against you by the Executive Branch, Holder basically promised. So there's really no need to get those other branches involved. Let's just keep this between us. Again, more details in the Forbes post, here. From eugen at leitl.org Wed Mar 7 09:25:50 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 7 Mar 2012 18:25:50 +0100 Subject: [tahoe-dev] Instant messaging. Message-ID: <20120307172549.GL9891@leitl.org> ----- Forwarded message from "Ted Rolle, Jr." ----- From mcqueen at wc.com Wed Mar 7 06:03:22 2012 From: mcqueen at wc.com (=?koi8-r?B?Iu/M2MfBIOHMxcvTxcXXzsEi?=) Date: Wed, 7 Mar 2012 19:33:22 +0530 Subject: =?koi8-r?B?9enrLfzu5CD3ICLk8vXn7+0g9OXh9PLlIiE=?= Message-ID: <01ccfc99$281bad00$9e16b43b@mcqueen> Праздники и выходные в "ДРУГОМ ТЕАТРЕ" ! 9 марта на сцене ДК имени Зуева (ул. Лесная 18) спектакль "КТО" режиссер М.Виторган В ролях: Елена Ксенофонтова, Андрей Ильин, Сергей Белоголовцев 9 марта на сцене Центра-музея В. Высоцкого (Нижний Таганский тупик, дом 3) "В обществе мертвых поэтов" Режиссер А.Огарев В ролях: Вера Воронкова, Константин Чепурин, Артем Смола и др. 11 марта на малой сцене т.Луны (М. Ордынка, 31) "ПРО БАБ" Режиссеры: О.Субботина, Л.Тимцуник В ролях: Агриппина Стеклова, Вера Воронкова, Александр Самойленко, Андрей Кузичев Билеты - по цене театра. Без комиссий и наценок. Возможна доставка. Телефон: 8(499) 973 21 41 Театральное агентство "Рампа". From eugen at leitl.org Wed Mar 7 11:47:49 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 7 Mar 2012 20:47:49 +0100 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: <20120307194749.GQ9891@leitl.org> ----- Forwarded message from grarpamp ----- From eugen at leitl.org Wed Mar 7 11:58:46 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 7 Mar 2012 20:58:46 +0100 Subject: [p2p-hackers] Nash equilibrium on p2p networks Message-ID: <20120307195846.GR9891@leitl.org> ----- Forwarded message from "James A. Donald" ----- From grarpamp at gmail.com Wed Mar 7 23:37:23 2012 From: grarpamp at gmail.com (grarpamp) Date: Thu, 8 Mar 2012 02:37:23 -0500 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: > Thanks to Mark Klein, we know that the NSA wiretaps in the US are > passive in nature, not active. We know that *back then* *one* of their possible tap systems was passive. All thanks due of course. > But who knows what they do [...] ... today, to whoever. > I don't think The Man can correlate millions of simultaneous web > page views and expect to have certainty over who is viewing what > at all times. At some point, you simply run out of differentiating > bits to extract from size and timing information to properly > segment the userbase. It's now possible to do well timed rx/tx at 10Gb line rate on a single commodity system (FreeBSD, Linux)... http://www.ntop.org/products/nprobe/ http://info.iet.unipi.it/~luigi/netmap/ http://www.ntop.org/products/pf_ring/ http://www.ntop.org/blog/ http://en.wikipedia.org/wiki/Precision_Time_Protocol _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From grarpamp at gmail.com Wed Mar 7 23:38:17 2012 From: grarpamp at gmail.com (grarpamp) Date: Thu, 8 Mar 2012 02:38:17 -0500 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: > I think that it is important to differentiate national security > and law enforcement here. Yes. They are two separate camps. Who now more regularly talk with each other to varying degrees, both in the office, and in the pub. It's likely only a legal question as to what tools either may use. Then saying, 'hey, we have this program', seems not a big deal. > yet FBI is apparently unable to locate members of pedophile > networks who use Tor Based on 4+ year old methods up against a first time case. What were the lessons learned? What gaps are being filled? > National security agencies, on the other hand, have to think about > the "big picture", and would not put their methods of work in > danger of disclosure Of course. That's why I put out possible examples that would only utilize publicly known methods. There are no secrets in anonbib. > or indulge in otherwise risky behavior (routing tricks and the > like, which can be discovered by regular employees). Secret projects have secret nets with secret admins... http://en.wikipedia.org/wiki/Joint_Worldwide_Intelligence_Communications_System I'm not really suggesting that any such global or national all seeing system is in place. Only that given budgets and current tech, the odds are surely not zero on some of the scenarios. Particularly concerning results available even with limited visibility. Such as running both a HS and an entry node that a user happens to use. Or running enough nodes that having an interesting circuit transit all three/six is less than a rare occurance. Scaling Note: If the network needs to scale, such as keeping nodes very busy but not saturated, non-exit relay by default (NE-RBD) could be metered out by way of a client self enabling it (or whatever other scale factor) based on the client's/relay's own fingerprint. Whether driven by release or net consensus: 0-9a-g = on, h-z = off _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jamesd at echeque.com Wed Mar 7 11:48:50 2012 From: jamesd at echeque.com (James A. Donald) Date: Thu, 08 Mar 2012 05:48:50 +1000 Subject: [p2p-hackers] Nash equilibrium on p2p networks Message-ID: On 2012-03-08 1:52 AM, Matteo Dell'Amico wrote: > On 07/03/2012 15:02, danimoth wrote: >> Il giorno mar, 06/03/2012 alle 16.34 +0000, Michael Rogers ha scritto: >> If you're modelling a DHT as a game then who are the players, what are >>> the possible strategies, what are the payoffs, how much do the players >>> know about each other's strategies and payoffs, and what strategy do >> you >>> want to encourage? >>> >> That's are the questions I'm asking to myself since first post, and >> looking to other's work (if exists) applied to p2p networks maybe could >> help me. > > There's actually plenty of work on incentives to cooperation in P2P > systems that can actually interest you. The keywords to look for in > Google Scholar are probably "p2p incentives", "p2p reputation". > > The papers about the topic that I like most are: "Incentives build > robustness in BitTorrent" by Bram Cohen (P2PEcon 2003) and "Sybilproof > reputation mechanisms" by Alice Cheng and Eric Friedman (P2PEcon 2005). Available at http://www.ee.ucl.ac.uk/~mrio/papers/infocom09.pdf I would summarize their proposal as ripple for bittorrent with a routing algorithm. The paper fails to consider the UI for managing reputation information, or the UI for finding and identifying services With a method for finding torrents and information about torrents, would be a major improvement on bittorrent, since it provides seeding incentive. _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From idaliamarcelene at blazenetme.net Thu Mar 8 05:52:57 2012 From: idaliamarcelene at blazenetme.net (Meda Tamela) Date: Thu, 08 Mar 2012 06:52:57 -0700 Subject: LOWEST CIALIS PRICES - Save BIG $$$!!! Fast Worldwide shipping! egw5am2 Message-ID: <201203081553.087860793E7950F6A5CC9F@haz9r8zf> LOWEST CIALIS PRICES Lowest Prices On The INTERNET! Buy Cialis Online - Save BIG $$$!!! Fast Worldwide shipping! http://tabletsrxfitness.ru From the.raccoon23 at gmail.com Wed Mar 7 23:52:57 2012 From: the.raccoon23 at gmail.com (The23rd Raccoon) Date: Thu, 8 Mar 2012 07:52:57 +0000 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: On Wed, Mar 7, 2012 at 9:54 PM, Mike Perry wrote: > You know, in hindsight, I don't want to sound like I'm hating on Steven > or his work. His work was quite clear along all of the dimensions I am > talking about, and was excellent research. > > He in fact did even compare 500 flows/hour to 50 flows/hour and found > that the success rate did drastically improve, implicitly acknowledging > and measuring the relationship between event rate and accuracy. Yes. Murdoch's work was quite informative, one of the more palatable dumpster morsels I've happened across. If you draw a line straight down figure 5(a) of [1] at 10k packets, you actually can see the effect of the base rate fallacy right there. As his concurrent flow count increases, the P(M|C) (which he calls P(correct target)) rate drops rather quickly. I bet if you got the actual P(C|M) values and adjusted the units appropriately, you'd find a 1/M^2 in there. George Danezis claimed in [2] that the best-match decision process of modern classifiers eliminates the quadratic 1/M^2 drop-off, but I don't believe that to be the case. I think that experimentally you'll find that your best-match classifier performs worse when you throw more items at it, just as Murdoch did. This effect is also seen in authorship classification work. The more authors you try to correlate, the worse off your rankings are. In fact, the last time I checked, state of the art text classification currently breaks down at around just 100 authors, using a best-match classifier. [1]. http://www.cl.cam.ac.uk/~sjm217/papers/pet07ixanalysis.pdf [2]. https://conspicuouschatter.wordpress.com/2008/09/30/the-base-rate-fallacy-and-the-traffic-analysis-of-tor/ _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Mar 7 23:24:30 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 8 Mar 2012 08:24:30 +0100 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: <20120308072429.GT9891@leitl.org> ----- Forwarded message from Mike Perry ----- From eugen at leitl.org Thu Mar 8 02:05:09 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 8 Mar 2012 11:05:09 +0100 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: <20120308100509.GH9891@leitl.org> ----- Forwarded message from grarpamp ----- From eugen at leitl.org Thu Mar 8 02:05:42 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 8 Mar 2012 11:05:42 +0100 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: <20120308100542.GI9891@leitl.org> ----- Forwarded message from grarpamp ----- From eugen at leitl.org Thu Mar 8 02:06:12 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 8 Mar 2012 11:06:12 +0100 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: <20120308100612.GJ9891@leitl.org> ----- Forwarded message from The23rd Raccoon ----- From risk.manager at bbb.org Thu Mar 8 03:33:54 2012 From: risk.manager at bbb.org (Ignacio Gaines) Date: Thu, 8 Mar 2012 13:33:54 +0200 Subject: IRS notification of your tax appeal status. Message-ID: <4F589587.502090@bbb.org> Income Tax Appeal% Dear AccountantOfficer, Hereby you are notified that yourIncome Tax Refund Appeal id#1395530 hasbeen REJECTED. If youbelieve the IRS did not properlyapply the law due to amisinterpretation of thecase details, beprepared to provide additional information. You canobtain the rejectionreport and re-submit your appealusing the following link Online Tax Appeal.InternalRevenue Service Telephone Assistance forBusinesses:Toll-Free, 1-800-829-4933Hours of Operation: Monday  Friday, 7:00 a.m.  7:00 p.m.your local time (Alaska & Hawaii follow Pacific Time). -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1868 bytes Desc: not available URL: From teofilalaverna at jamesmarzo.com Thu Mar 8 13:37:22 2012 From: teofilalaverna at jamesmarzo.com (KIYOKO) Date: Thu, 08 Mar 2012 18:37:22 -0300 Subject: Male Penis Enhancement - Male Extra Pills - Rock solid, bigger, harder, more intense erections. 5k90ww1i Message-ID: <79q17s73a50-36352973-058q8b35@qgeawgokpz> Male Penis Enhancement - Male Extra Pills Rock solid, bigger, harder, more intense erections and enlarge your penis by up to 3 inches with #1 Male Extra Penis Enhancement Pills. Get Max Discount. 100% risk free money back guarantee. http://herbalpenissense.ru From number6 at elitemail.org Thu Mar 8 19:54:37 2012 From: number6 at elitemail.org (Number Six) Date: Thu, 08 Mar 2012 19:54:37 -0800 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: On Tue, Mar 6, 2012, at 04:20 PM, Seth David Schoen wrote: > andrew at torproject.is writes: > > > The GPA is in every paper on the topic. But only Seth has the real > > answer. > > I was concerned that the graphic should not make people think that > _no one_ can ever associate them with their browsing when they use > Tor. I've been taught to think of the GPA threat (and other traffic > correlation threats) as real, so I thought people should have some > indication of those threats. Why do you assume that the NSA can break Tor but not HTTPS? As I see it, if you extrapolate the timing attack literature to justify ignoring fixing active attacks, why do you not extrapolate the work on RSA key cracking to assume that the NSA can factor popular website keys in bathtubs full of DNA? Or, at the very least, why not extrapolate it to the NSA compromising one of the 1000-some wildcard root certificates your own SSL Observatory scan has detected? This paywall (ie non-"dumpster available") abstract appears to indicate that the research community is within striking distance of factoring an RSA keys in use by many HTTPS servers today. At least, when compared to how close timing attack research is to breaking Tor. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1435370 I guess I'm just wondering: where do we draw the line? In addition to the decentralized HTTPS certificate observatory, one could imagine a network verifying the DH parameters are the same when received by two endpoints of an HTTPS session. If perfect forward secrecy is universally deployed, a bathtub full of DNA or server compromise that yielded an RSA private key for google.com could be used transparently to escape your decentralized observatory scan, but a DH-recording scanning network will still see different DH parameters at the endpoints. But how do deploy such a network? Is planetlab up to the task? Is anyone studying endpoint consensus on DH parameters? Shouldn't they be? It seems like our rabbit hole is very deep. Do we really have what it takes to watch the watchers? I fucking hope so, but it does seem that consensus reality wrt cryptographic security is hard to establish. -- http://www.fastmail.fm - Access all of your messages and folders wherever you are _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From companys at stanford.edu Thu Mar 8 21:17:04 2012 From: companys at stanford.edu (Yosem Companys) Date: Thu, 8 Mar 2012 21:17:04 -0800 Subject: [drone-list] New Meetup: Drone Journalism: Reporting from above (with Wired's Chris Anderson, Occucopter) Message-ID: [image: Meetup] New Meetup Drone Journalism: Reporting from above (with Wired's Chris Anderson, Occucopter) Hacks and Hackers Added by Burt Herman Thursday, March 29, 2012 7:00 PM Storify 149 9th street, Suite 404 San Francisco, CA 94103 Price: $10.00 per person Pay online Will you attend? **Yes** **No** 98 spots left! 2 Hacks and Hackers going, including: nicole martinelli English-language editor & community manager at IJNet.org , a DC-based non-profit... Burt Herman I'm a longtime journalist who is taking the entrepreneurial path in this time of... Drones aren't just for the miitary anymore. Remote-controlled flying devices are becoming more widely available, and journalists have begun to consider their use in reporting. That may or may not be a good thing, and our panelists have strong opi... Learn more Sponsored by Pearson Follow us! Add *info at meetup.com* to your address book to receive all Meetup emails To manage your email settings, click here Meetup, PO Box 4668 #37895 New York, New York 10163-4668 *Meetup HQ in NYC is hiring!* http://www.meetup.com/jobs/ BEGIN:VCALENDAR VERSION:2.0 PRODID:-//Meetup//Meetup Events v1.0//EN CALSCALE:GREGORIAN METHOD:PUBLISH X-WR-CALNAME:Meetup Events X-MS-OLK-FORCEINSPECTOROPEN:TRUE BEGIN:VTIMEZONE TZID:America/Los_Angeles TZURL:http://tzurl.org/zoneinfo-outlook/America/Los_Angeles X-LIC-LOCATION:America/Los_Angeles BEGIN:DAYLIGHT TZOFFSETFROM:-0800 TZOFFSETTO:-0700 TZNAME:PDT DTSTART:19700308T020000 RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU END:DAYLIGHT BEGIN:STANDARD TZOFFSETFROM:-0700 TZOFFSETTO:-0800 TZNAME:PST DTSTART:19701101T020000 RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU END:STANDARD END:VTIMEZONE BEGIN:VEVENT DTSTAMP:20120309T012550Z DTSTART;TZID=America/Los_Angeles:20120329T190000 DTEND;TZID=America/Los_Angeles:20120329T210000 STATUS:CONFIRMED SUMMARY:Drone Journalism: Reporting from above (with Wired's Chris Anders on\, Occucopter) DESCRIPTION:Hacks and Hackers\nThursday\, March 29 at 7:00 PM\n\nDrones a ren't just for the miitary anymore. Remote-controlled flying devices are becoming more widely available\, and journalists have begun to consider ...\n\nFee: Price: USD 10.00 per person\n\nDetails: http://meetupbayarea .hackshackers.com/events/55590572/ ORGANIZER;CN=Meetup Reminder:MAILTO:info at meetup.com CLASS:PUBLIC CREATED:20120309T011947Z GEO:37.77;-122.40 URL:http://meetupbayarea.hackshackers.com/events/55590572/ SEQUENCE:1 LAST-MODIFIED:20120309T012529Z UID:event_55590572 at meetup.com END:VEVENT END:VCALENDAR _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Mar 8 13:29:32 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 8 Mar 2012 22:29:32 +0100 Subject: [liberationtech] Pakistan's Firewall: Need your help and support Message-ID: <20120308212932.GS9891@leitl.org> ----- Forwarded message from Sana Saleem ----- From sana at bolobhi.org Thu Mar 8 10:31:39 2012 From: sana at bolobhi.org (Sana Saleem) Date: Thu, 8 Mar 2012 23:31:39 +0500 Subject: [liberationtech] Pakistan's Firewall: Need your help and support Message-ID: Hi all, There's been significant media coverage of the impending internet censorship plans by Pakistan's Government. The anti-censorship campaign has been able to garner support from national and international organizations. The positive news is that, we were able to push the government to extend the tender closing date, for URL filtering and blocking system, from 1st of March to the 16th of March. Our partners in the campaign, Business Human Rights Resource Centre, were able to forward our petition and letter to company CEO's and we received commitments form: -Websense - Cisco -Verizon -Sandvine They have committed not to bid for the URL filtering system. However, Mcafee,ZTE , Huawei, Bluecoat has not responded. We are now getting very close to the tender closing date and have entered a crucial phase in the campaign. We believe at this point it would be most beneficial to keep building pressure. - Getting businesses with investments in Pakistan to speak up and write to the Ministry of IT - Getting media to focus on various aspects of the issues, including how this could effectively turn online spaces as tools for surveillance, how this would hurt the economy, academic paralysis and halt innovation. We have put together a Press Kit, it is comprehensive and has basic info that most of you might already be aware of, to inform journalists within and outside of Pakistan about the situation and it's repercussions. Please feel free to share, amongst your contacts: http://bolobhi.org/press-release-public-statements/press-kit/national-url-filtering-blocking-system/ Here is a timeline for the campaign so far: http://bolobhi.org/timeline-campaign-against-internet-censorship-in-pakistan/ Thank you and I would really appreciate your suggestions, feedback and help, Best, Sana -- Chief Operating Officer Bolo Bhi Privacy-Advocacy-Research http://bolobhi.org _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From martinobal at gmail.com Thu Mar 8 17:39:49 2012 From: martinobal at gmail.com (Martin Baldan) Date: Fri, 9 Mar 2012 02:39:49 +0100 Subject: [tahoe-dev] General questions about TAHOE-LAFS, local filesystems and P2P. Message-ID: Hello, I'm basically just a curious potential end user of this awesome technology. I've read a couple of posts that got me thinking: [Freedombox-discuss] Tahoe-LAFS is not a filesystem http://lists.alioth.debian.org/pipermail/freedombox-discuss/2011-November/003162.html [tahoe-dev] "BitTorrent for storage" is a bad idea -- [p2p-hackers] P2P file storage systems https://tahoe-lafs.org/pipermail/tahoe-dev/2011-February/006150.html This is a little example of what I think a nice user experience could be like, realistically (ie, assuming files and applications as currently understood are still relevant): I create a document, let's say a LibreOffice presentation. I save it. I modify it and save it again. I right-click on it (or similar procedure) and I can see that a copy is stored locally, another copy is stored in an online server I pay for (fully encrypted), and a third copy is stored in my laptop (or smartphone). They are all synced, unobstrusively (I don't experience any latency, syncing just works in the background). Now, let's say I want to share this document with a friend. I open a menu on the file (right click or whatever), select "share", select friend (like in Google docs). Now he will have a notification that I shared a document with him. My friend right-clicks on this document and he selects "follow this document". Now If I delete my document later, my friend will still be able to see all the snapshots up to the time I deleted it. My friend likes the document, so he recommends that I publish it. So I simply share it with a some popular swarm of peers. My question is, where does Tahoe fit in this picture, if at all? I mean, what would be the best way to merge local storage, single-user distributed storage, F2F (like Tahoe seems to be) and full-scale P2P, at the lowest level possible and in a transparent, but configurable, way? Since Tahoe is not intended to fill all those roles, how could it be combined with other services in order to produce a seamless user experience? Should Tahoe be the manager and delegate to other filesystems, should it be the other way around, should they coexist and be managed by some upper layer? And how does Tahoe relate right now with other projects such as XtreemFS (very similar to Tahoe) , Camlistore (more emphasis on metadata, less on duplication logistics), OneSwarm (privacy-preserving P2P), Tribler (a trackerless Bittorrent), to name a few? I would say XtreemFS is a direct competitor (but there could also be cooperation). As for the others, maybe they could be somehow combined with Tahoe to build an awesome user experience. What do you think? Best, -Martin _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From m-- at gmx.com Fri Mar 9 00:11:50 2012 From: m-- at gmx.com (Michael Rogers) Date: Fri, 09 Mar 2012 08:11:50 +0000 Subject: [p2p-hackers] Nash equilibrium on p2p networks Message-ID: On 07/03/12 20:05, James A. Donald wrote: > If I understand the proposed system > http://www.ee.ucl.ac.uk/~mrio/papers/infocom09.pdf correctly: > > Every entity has a public key. > > Leechers issue IOUs to seeders. This creates a network of IOUs. The > pledgeroute software looks for ways to cancel out IOUs, thus honoring > them - for example Ann seeds Bob, Bob seeds Carol, and Carol seeds Ann. > > If your IOUs get cancelled out, your key gains reputation, causing your > IOUs to be valued. > > It is not clear to me how the sybil attack is avoided: Is it that you > only gain reputation with those benefiting from the cancellation? If you consider a cluster of Sybils, the creator of the Sybils is free to create any structure of IOUs within the cluster, and any structure of IOUs from Sybils to non-Sybils. But IOUs from non-Sybils to Sybils can only be created by non-Sybils, and that only happens when the Sybils provide a service. No matter how many Sybils a person creates, the total debt owed to them by non-Sybils is limited by the total amount of service they provide. So there's no advantage in creating Sybils. It's not impossible - it's just pointless. I think that's how it works, anyway - it's been a while since I read the paper and I could be confusing it with the Sybilproof reputation mechanisms paper Matteo mentioned. Cheers, Michael _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From teleconferenceds51 at rainsoft.com Thu Mar 8 17:40:52 2012 From: teleconferenceds51 at rainsoft.com (=?koi8-r?B?5MXCydTP0tPLwdEgySDL0sXEydTP0tPLwdEg2sHEz8zWxc7Oz9PU2A==?=) Date: Fri, 9 Mar 2012 10:40:52 +0900 Subject: =?koi8-r?B?5MXCydTP0tPLwdEgySDL0sXEydTP0tPLwdEg2sHEz8zWxc7Oz9PU2Dog?= =?koi8-r?B?z9TSwdbFzsnFINcgwtXIx8HM1MXS08vPzSDJIM7BzM/Hz9fPzSDV3sXU?= =?koi8-r?B?xQ==?= Message-ID: <156004660.73856646189931@rainsoft.com> 16 марта ДЕБИТОРСКАЯ И КРЕДИТОРСКАЯ ЗАДОЛЖЕННОСТЬ: ОТРАЖЕНИЕ В БУХГАЛТЕРСКОМ И НАЛОГОВОМ УЧЕТЕ +7 499 ЧЧ5.40-95 и +7 (499) - ЧЧ5-З9*68 Цель: формирование полной и достоверной информации о порядке учета для целей налогообложения. Программа: 1.Состав и правила оценки дебиторской и кредиторской задолженности в бухгалтерском учете и отчетности. Правила оценки дебиторской и кредиторской задолженности в зависимости от валюты исполнения обязательств. 2.Раскрытие информации о дебиторах и кредиторах в бухгалтерской отчетности. 3.Учет долговых требований и обязательств по расчетным операциям за реализованные товары (работы, услуги) √ с учетом коммерческого кредита, скидок, предоставления товаров в качестве бонуса и т.д. 4.Учет погашения дебиторской и кредиторской задолженности путем взаимозачета, перевода денежных средств в пользу третьих лиц, получения денежных средств со счетов третьих лиц. 5.Учет расчетов по претензиям и штрафам за нарушения долговых отношений. 6.Инвентаризация дебиторской и кредиторской задолженности. Документальное оформление результатов инвентаризации. Срок исковой давности. Прерывание и прекращение срока исковой давности. 7.Учет и налогообложение операций по списанию просроченной дебиторской и кредиторской задолженности. Бухгалтерский и налоговый учет резерва по сомнительным долгам. 8.Бухгалтерский и налоговый учет кредиторской задолженности по полученным кредитам и займам. 9.Учет и налогообложение продажи (покупки) дебиторской задолженности (договор цессии). 10.Арбитражная практика по спорам, связанным с долговыми требованиями и обязательствами. Стоимость участия: 8 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: 7 (499) 4Ч5*З968 \\\/// код (499) ЧЧ5З9.68 From syverson at itd.nrl.navy.mil Fri Mar 9 07:51:39 2012 From: syverson at itd.nrl.navy.mil (Paul Syverson) Date: Fri, 9 Mar 2012 10:51:39 -0500 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: On Tue, Mar 06, 2012 at 11:14:39PM -0500, Paul Syverson wrote: > On Tue, Mar 06, 2012 at 08:15:58PM -0500, Mansour Moufid wrote: > > On Tue, Mar 6, 2012 at 4:04 PM, Paul Syverson wrote: > > > I'm a mere four years behind in putting my work up on the web, and > > > this one wasn't co-authored so nobody else did either. I'll try to do > > > something about that in my copious free time this week and send a > > > link. > > > > Please do, this attack you mention is one I've been very interested > > in. I'm sure many others would also love to read more about it. > > > I'll try to get to it soon. And there was a star in the east... I actually updated my webpage, not as fully as I would like, but I updated all the dead links and added about a dozen or so papers. In particular there is now a link to the "Why I'm not an Entropist" paper, the "Practical Vulnerabilities of the Tor Anonymity Network" paper that Andrew asked me to post over a year ago, my recent historical review "A Peel of Onion", etc. HTH. -Paul _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Mar 9 02:13:51 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 9 Mar 2012 11:13:51 +0100 Subject: [p2p-hackers] Nash equilibrium on p2p networks Message-ID: <20120309101351.GC9891@leitl.org> ----- Forwarded message from Michael Rogers ----- From eugen at leitl.org Fri Mar 9 02:17:53 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 9 Mar 2012 11:17:53 +0100 Subject: [drone-list] New Meetup: Drone Journalism: Reporting from above (with Wired's Chris Anderson, Occucopter) Message-ID: <20120309101752.GE9891@leitl.org> ----- Forwarded message from Yosem Companys ----- From eugen at leitl.org Fri Mar 9 04:15:58 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 9 Mar 2012 13:15:58 +0100 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: <20120309121558.GM9891@leitl.org> ----- Forwarded message from Number Six ----- From eugen at leitl.org Fri Mar 9 04:40:14 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 9 Mar 2012 13:40:14 +0100 Subject: [tahoe-dev] General questions about TAHOE-LAFS, local filesystems and P2P. Message-ID: <20120309124014.GU9891@leitl.org> ----- Forwarded message from Martin Baldan ----- From shannatomlinnn at ed2.com Fri Mar 9 04:27:46 2012 From: shannatomlinnn at ed2.com (=?koi8-r?B?Iu3JyMHJzCDsxc7Lz9ci?=) Date: Fri, 9 Mar 2012 15:27:46 +0300 Subject: =?koi8-r?B?99nIz8TO2cUg1yAi5PL15+/tIPTl4fTy5SIg?= Message-ID: <01ccfe09$2d980500$2a6a9f2e@shannatomlinnn> Праздники и выходные в "ДРУГОМ ТЕАТРЕ" ! 9 марта на сцене ДК имени Зуева (ул. Лесная 18) спектакль "КТО" режиссер М.Виторган В ролях: Елена Ксенофонтова, Андрей Ильин, Сергей Белоголовцев 9 марта на сцене Центра-музея В. Высоцкого (Нижний Таганский тупик, дом 3) "В обществе мертвых поэтов" Режиссер А.Огарев В ролях: Вера Воронкова, Константин Чепурин, Артем Смола и др. 11 марта на малой сцене т.Луны (М. Ордынка, 31) "ПРО БАБ" Режиссеры: О.Субботина, Л.Тимцуник В ролях: Агриппина Стеклова, Вера Воронкова, Александр Самойленко, Андрей Кузичев Билеты - по цене театра. Без комиссий и наценок. Возможна доставка. Телефон: 8(499) 973.21_41 Театральное агентство "Рампа". From nmnllkj at gmail.com Thu Mar 8 23:08:08 2012 From: nmnllkj at gmail.com (Lc ޒÎq) Date: Fri, 09 Mar 2012 16:08:08 +0900 Subject: No subject Message-ID: <201203090708.q2978A7s017453@proton.jfet.org> ○──────────────────────────○ ●費用 : 男性 完全無料 ●資格 : 18歳以上の男性 ●報酬 : 3万円以上 ●内容 : デートから肉体関係 ●募集人数 : 各県50名  ○──────────────────────────○ http://boobooden.info/t02/ 女性と男性のバランスを保つ為、限定50名の応募となっております。 (ページが表示される内は参加可能) また当サークルには本当に出会いを求めている方のみが参加しています。 冷かしでの参加は迷惑ですので絶対におやめ下さい。 http://boobooden.info/t02/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From nmnllkj at gmail.com Thu Mar 8 23:08:08 2012 From: nmnllkj at gmail.com (Lc ޒÎq) Date: Fri, 09 Mar 2012 16:08:08 +0900 Subject: No subject Message-ID: <201203090709.q2979dB8017502@proton.jfet.org> ○──────────────────────────○ ●費用 : 男性 完全無料 ●資格 : 18歳以上の男性 ●報酬 : 3万円以上 ●内容 : デートから肉体関係 ●募集人数 : 各県50名  ○──────────────────────────○ http://boobooden.info/t02/ 女性と男性のバランスを保つ為、限定50名の応募となっております。 (ページが表示される内は参加可能) また当サークルには本当に出会いを求めている方のみが参加しています。 冷かしでの参加は迷惑ですので絶対におやめ下さい。 http://boobooden.info/t02/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From rvbde at nationalcity.com Fri Mar 9 02:54:16 2012 From: rvbde at nationalcity.com (=?koi8-r?B?IvLPzcHOIOTY0d7FzsvPIg==?=) Date: Fri, 9 Mar 2012 16:24:16 +0530 Subject: =?koi8-r?B?99nIz8TO2cUg1yAi5PL15+/tIPTl4fTy5SI=?= Message-ID: <01ccfe11$1230f800$977e8f72@rvbde> Праздники и выходные в "ДРУГОМ ТЕАТРЕ" ! 9 марта на сцене ДК имени Зуева (ул. Лесная 18) спектакль "КТО" режиссер М.Виторган В ролях: Елена Ксенофонтова, Андрей Ильин, Сергей Белоголовцев 9 марта на сцене Центра-музея В. Высоцкого (Нижний Таганский тупик, дом 3) "В обществе мертвых поэтов" Режиссер А.Огарев В ролях: Вера Воронкова, Константин Чепурин, Артем Смола и др. 11 марта на малой сцене т.Луны (М. Ордынка, 31) "ПРО БАБ" Режиссеры: О.Субботина, Л.Тимцуник В ролях: Агриппина Стеклова, Вера Воронкова, Александр Самойленко, Андрей Кузичев Билеты - по цене театра. Без комиссий и наценок. Возможна доставка. Телефон: 8(499) 973 21.41 Театральное агентство "Рампа". From eugen at leitl.org Fri Mar 9 08:15:10 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 9 Mar 2012 17:15:10 +0100 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: <20120309161510.GO9891@leitl.org> ----- Forwarded message from Paul Syverson ----- From zjajam at ezweb.ne.jp Fri Mar 9 01:58:41 2012 From: zjajam at ezweb.ne.jp (ߓc z) Date: Fri, 09 Mar 2012 18:58:41 +0900 Subject: No subject Message-ID: <201203071002.q27A2R5K006274@proton.jfet.org> セックス無しの生活は考えられない女性が集まっております セックスの為ならお金を惜しみません 『私が満足するエッチをしてくれる』 これが女性の望む条件です 女性が満足出来るエッチをしてお礼を貰いましょう http://sefrelove.info/1p05/ 金額、日時の交渉は女性と直接お願いします 男性会員様の利用は無料です http://sefrelove.info/1p05/ このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp From cheeni at gmail.com Fri Mar 9 10:02:05 2012 From: cheeni at gmail.com (Srini RamaKrishnan) Date: Fri, 9 Mar 2012 19:02:05 +0100 Subject: [silk] [liberationtech] Pakistan's Firewall: Need your help and support Message-ID: On Fri, Mar 9, 2012 at 5:23 PM, Raj Shekhar wrote: > > Did not know India had a firewall in place. I know that the ISPs are > under the thumb of the government and will dance to whatever tune is > played. Is that what you are referring to? India is intending to gett its national version of Echelon http://goo.gl/5EFlF (links to) http://timesofindia.indiatimes.com/tech/news/internet/Govt-to-set-up-a-national-internet-scanning-agency/articleshow/12066010.cms Feb 28, 2012, 09.51AM IST Govt to set up a national internet scanning agency NEW DELHI/BARCELONA: The Government is setting up an internet scanning agency which will monitor all web traffic passing through Internet service providers in the country. The scanning agency to be called 'National Cyber Coordination Centre, will issue 'actionable alerts' to government departments in cases of perceived security threats. The move comes as the government has been unable to prevent many terror attacks, in the absence of a credible internet scanning system. According to the minutes of a meeting held on February 3, 2012, at the National Security Council Secretariat under the Prime Minister's Office, a National Cyber Coordination Centre will 'also scan cyber traffic flowing at the point of entry and exit at India's international internet gateways.' The web scanning centre will provide 'actionable alerts for proactive actions' to be taken by government departments. All government departments will now talk to the Internet Service Providers such as Bharti Airtel, Reliance Communication, BSNL, MTNL and Tata Communications through NCCC for real time information and data on threats. According to sources, government is planning to invest about Rs 800 crore in the setup. "The coordination centre will be the first layer of threat monitoring in the country. It would always be in virtual contact with the control room of the Internet Service Providers," the Deputy National Security Advisor Vijay Latha Reddy said, as per minutes of the meeting. The government is collating manpower requirements for the centre currently. "At present, the monitoring of web traffic is done by Centre for Development of Telematics ( C-DoT) which has installed its equipments at the premises of ISPs and gateways," informs Rajesh Chharia, President at association of Internet service providers. All tweets, messages, emails, status updates and even email drafts will now pass through the new scanning centre. The centre may probe further into any email or social media account if it finds a perceived threat. India's National Security Council Secretariat (NCSC) has asked various departments to assess their needs for officials, who will coordinate with the scanning agency. The National Security Council handles the political, nuclear, energy and strategic security concerns of the country. As per the minutes seen by ET, Defence Research and Development Organization (DRDO) officials were of the view that there is no perfect system. "There is always an element of risk in using ICT. Efforts should be focused on reducing cyber security vulnerabilities," DRDO said. The meeting was attended by officials from DRDO, intelligence bureau, Indian Army, Ministry of Home Affairs, Indian Navy, Department of IT, National Technical Research Organization (NTRO), Telecom Department and Computer Emergency Response Teams of various departments. Internet scanning policy is followed in many countries. In US, the Department of Homeland Security (DHS) scans the internet for keywords such as 'virus', 'bomb', or 'collapse.' The DHS sets up fake social media and Twitter accounts to scan the internet. Iran uses web surveillance to suppress dissidents. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Mar 9 10:41:06 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 9 Mar 2012 19:41:06 +0100 Subject: [silk] [liberationtech] Pakistan's Firewall: Need your help and support Message-ID: <20120309184106.GS9891@leitl.org> ----- Forwarded message from Srini RamaKrishnan ----- From rjrm at msn.com Fri Mar 9 04:34:14 2012 From: rjrm at msn.com (Oc Mq) Date: Fri, 09 Mar 2012 21:34:14 +0900 Subject: No subject Message-ID: <201203091234.q29CYF2l021847@proton.jfet.org> お金に困った人妻は風俗より格安で生ハメ出来るんです!!  人妻を自宅に呼んでデリバリーして助けてあげて下さい…。 最近、人妻の売春が急増しております!! お金には困っているけど、風俗では働きたくないし…。 そんな人妻達の為に期間限定で当サイトがオープンしました!! http://boobooden.info/t02/ 旦那の借金、シングルマザーの養育費稼ぎなどお金に困った人妻は 風俗より格安で生ハメ出来るんです!! 男性はフリーアドレスOKの完全無料で登録いただけます!! [参加はコチラ] http://boobooden.info/t02/ ※入会金、使用料など一切かからないので安心下さい。 このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp From carmenz9 at radware.com Fri Mar 9 07:27:20 2012 From: carmenz9 at radware.com (=?koi8-r?B?9/zkLCD3wczA1MEsIM7BzM/HyQ==?=) Date: Fri, 9 Mar 2012 22:27:20 +0700 Subject: =?koi8-r?B?98/azcXdxc7JxSAi3MvT0M/S1M7Px88iIO7k8w==?= Message-ID: <000d01ccfe09$1e9e3fb0$6400a8c0@carmenz9> 14 марта 2012г. Бухгалтерский учет и налогообложение валютных операций 7 (499) 445*З968 ; +7 495 742_91_98 Программа: 1. Нормативная база, регулирующая учет и налогообложение валютных операций и внешнеэкономической деятельности. Изменения в 2012 году. 2. Особенности налогообложения курсовых разниц в условиях применения ПБУ 3/2006 "Учет активов и обязательств, стоимость которых выражена в иностранной валюте". Налогообложение суммовых разниц. 3. Налогообложение по налогу на прибыль у экспортера, получающего доход в иностранной валюте. 4. Новый порядок подтверждения у экспортера ставки 0% по НДС, в т.ч. при экспорте в страны Таможенного Союза. 5. Порядок вычета НДС, уплаченного таможенным органам. Порядок вычета НДС, уплаченного налоговым органам при импорте из стран Таможенного Союза. 6. Проблемы с возмещением экспортного НДС: практические рекомендации по их разрешению. 7. Формирование налоговой стоимости амортизируемых основных средств, сырья, материалов и товаров, приобретенных по импортным контрактам. 8. Налогообложение доходов нерезидентов у российского агента √ источника выплаты. 9. Типичные ошибки, встречающиеся при отражении в учете и уплате налогов операций, связанных с осуществлением внешнеэкономической деятельности. Стоимость участия: 8 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 Московский код: 742\9I98 \\// код (499) - ЧЧ5-ЧО95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2728 bytes Desc: not available URL: From treenakiara at paceworldwide.com Fri Mar 9 19:05:45 2012 From: treenakiara at paceworldwide.com (Krysta Myesha) Date: Sat, 10 Mar 2012 01:05:45 -0200 Subject: High quality Replica Watches store. ndj30s Message-ID: <201203100606.D7FDEEDEEFDEABCDBBA10@cmoyi6k> Replica Watches, Replica Rolex Watches, Swiss Replica Watches Buy Replica Rolex Watches, Breitling, Tag Heuer, Omega, Swiss Replica Watches, Replica Luxury Watches from Watchesair. 80% off! High quality Replica Watches store. http://copiesbags.ru From tericahilary at novellus.com Sat Mar 10 00:14:04 2012 From: tericahilary at novellus.com (Araceli Melvin) Date: Sat, 10 Mar 2012 02:14:04 -0600 Subject: Penis enhancement pill helps increase sexual health for bigger, harder erections, increased erect penis length and girth, increase in sexual stamina, sex drive, and more - TRY THIS! dbgz Message-ID: <201203100213.E7AF44CA8CBB906FBFFD979C@j8gb8j5> World's Best Penis Pills - Virility Pills 100% Satisfaction Guaranteed Penis Enlargement, Clinically Proven Now in USA Buy 3 Get One Free, Buy 4 Get 2 Free Limited Time Only http://largegreekpenis.ru From loganetsuko at oracle.com Fri Mar 9 19:15:46 2012 From: loganetsuko at oracle.com (Celena Sophie) Date: Sat, 10 Mar 2012 10:15:46 +0700 Subject: Get Max Discount. 100% risk free money back guarantee. Rock solid, bigger, harder, more intense erections.2 eug09s2 Message-ID: <26t94e65j62-67793346-803z1p81@apojywodp> Male Penis Enhancement - Male Extra Pills Rock solid, bigger, harder, more intense erections and enlarge your penis by up to 3 inches with #1 Male Extra Penis Enhancement Pills. Get Max Discount. 100% risk free money back guarantee. http://herbalpenissound.ru From thunderstruckxv2 at rebeccafox.com Sat Mar 10 11:26:43 2012 From: thunderstruckxv2 at rebeccafox.com (=?koi8-r?B?6MHCwdLP18Eg7C7wLiDJIPDPzNHLz9fBIO0u8y4=?=) Date: Sat, 10 Mar 2012 14:26:43 -0500 Subject: =?koi8-r?B?7uTzINcgMjAxMiDHz8TV?= Message-ID: <75615DCB513D4C5897FFC975FD51C513@g4> 13 марта 2012 г. НДС в 2012 году 8 (499) ЧЧ5_Ч0-95 <> 7 (499) 4Ч5/З968 Программа: 10.00 – 13.00. НДС: новое в методологии и практике исчисления в 2012 году. Лектор: Хабарова Л. П. 1. Налоговая база (уступка права требования, безвозмездная передача, СМР и др.). Момент определения налоговой базы. Новое в учете курсовых и суммовых разниц в налоговой базе 2. Счета-фактуры: сложные ситуации (возврат товаров, скидки, штрафные санкции по хоздоговорам, приобретение и реализация товаров через обособленные подразделения). Корректировочные счета-фактуры 3. Налоговые вычеты в сложных ситуациях: по авансам выданным; по нормируемым расходам; по ОС и НМА; по коммунальным платежам при аренде; при переуступке права требования; в отношении объектов недвижимости при их строительстве, модернизации, реконструкции; при изменении стоимости отгруженных товаров (выполненных работ, оказанных услуг); в случаях, когда обязательство об уплате предусмотрено в рублях в сумме, эквивалентной сумме в иностранной валюте или в условных единицах, и пр. 4. Восстановление НДС: при ликвидации объекта ОС; по недостачам, выявленным при инвентаризации; в иных случаях (с учетом норм гл. 21 НК РФ, измененных Законом № 245-ФЗ) 5. Необлагаемые операции. Отказ от льгот. Раздельный учет по НДС. 14.00 – 17.00 Налог на прибыль: новое с 2012 года. Особенности формирования отчетности за 2011 год. Налоговая учетная политика. Лектор: Полякова М. С. 1. Изменения по налогу на прибыль с 2012 года * Списание расходов на компьютерные программы * Новые правила налогового учета НИОКР с 2012 года * Создание консолидированной группы налогоплательщиков в целях исчисления налога на прибыль с 2012 года * Другие изменения по налогу на прибыль с 2012 г. (сопоставимые долговые обязательства, резерв расходов в НКО, социальная реклама, поступления от жителей на капремонт многоквартирного дома) 2. Что нужно учитывать при составлении налоговой декларации за 2011 год * Особенности налогового учета нематериальных активов * Расходы на содержание обслуживающего производства (хозяйства) * Проценты по долговым обязательствам * Увеличение чистых активов организации за счет помощи акционеров (участников, собственников) * Применение нулевой ставки налога на прибыль с дивидендов * Применение нулевой ставки налога на прибыль в образовательных и медицинских организациях * Ограничение по переносу убытка на будущие периоды * Как определять обязанность по уплате ежемесячных авансовых платежей 3. Особенности формирования налоговой учетной политики на 2012 год. Стоимость участия: 8 000 рублей Информацию можно получить по телефонам: 7 (499) 445З9.68 **** (495) 792\21/2_2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4995 bytes Desc: not available URL: From congratulatel1 at reavey-ni.com Fri Mar 9 23:09:28 2012 From: congratulatel1 at reavey-ni.com (=?koi8-r?B?4sDE1sXUydLP18HOycU=?=) Date: Sat, 10 Mar 2012 15:09:28 +0800 Subject: =?koi8-r?B?68HLPyDJIN7FzT8g8sHa0sHCz9TB1Nggyc7XxdPUycPJz87O2cog0MzB?= =?koi8-r?B?zg==?= Message-ID: <000d01ccfe8c$bbbec520$6400a8c0@congratulatel1> Тема: Разработка и внедрение бизнес плана на предприятии. За более подробной информацuей обpащайтеcь по тел: \Моск. код/ 7922122 <<<>>> 8 (499) Ч4539_68 Дата проведения: 29-30 марта 2012г.. Целu Уч. курса: Изучение и применение информации для оценки проекта и его разработки. Типы инвестиционных проектов и их особенности, а также их принципиальное отличие от бизнес планов, различные методы и инструментарий для разработки и оценки. Основные критерии принятия решения по инвестиционному проекту. Практическое занятие с участниками, выяснение и обучение таким методам как: 1.Нестандартные проекты и особенности их расчета. 2.Подготовить исходную информацию для оценки проекта: определение доходной и затратной частей, их классификация по статьям для: * новых компаний. * функционирующего предприятия. 4.Определить состав инвестиционных затрат. 5.Определение и построение источников финансирования: кредиты, нераспределенная прибыль, инвестиционный капитал. 6.Организовать управление формированием прибыли от продаж товаров (работ, услуг) 7.Доходность проекта, анализ, показатели, которые определяют критерии рентабельности и прибыли. Финансовые результаты проекта. 8.Провести структурный анализ отчета о прибылях и убытках, операционный анализ и управление затратами + классификация затрат. 9.Инфляция и ее влияние на расчеты и результаты проекта. 10.Понятие Критерия Эффективности при построении инвестиционной программы. Анализ целесообразности. 11.Разработать отчеты для дальнейшей консолидации между головным предприятием и филиалами и прочими подразделениям, входящим в структуру предприятия: * Понять принцип консолидации отчетности для групп компаний (холдингов); * Подготовить последовательность операций при консолидации; * Понять и подготовить анализ консолидированной отчетности; 12.ДИСКОНТИРОВАНИЕ √ критерий разногласия! Вопрос применения и понятия метода. 13.Понять и самостоятельно разработать структуру инвестиционного проекта и изучить правила построения анализа для данного проекта. 14.Разработать процесс утверждения (принятия) инвестиционного проекта. 15.Маркетинговая информация, как ее подготовить? 16.Грамотно подготовить текстовую часть документа. 17.Подготовка финансового плана: * Объем и требования к расчетам; * Объем расчетов и описание в финансовом плане; * Самостоятельная подготовка электронных таблиц; * Описание расчетов в финансовом плане, необходимый объем; * Рассмотрение финансовых показателей и их корректировка с учетом выбранного интервала расчетов; * Анализ финансовых показателей деятельности предприятия; * Определение уровня безубыточности, запаса финансовой прочности проекта; * Использование полученных данных. Каждому участнику для дальнейшей успешной работы и внедрения методики планирования на предприятии предоставляются бесплатно следующие методические материалы и программы: * Материал методический: печатный для самостоятельной разработки бизнес планов, ТЭО, инвестиционных проектов. * На CD диске электронную версию метод. материала для разработки финансовых проектов. * Книга - ╚О Методах разработки бизнес плана╩. Книга написана как - практическое руководство. В комплект с книгой прилагается специализированная программа по разработке технико-экономического обоснования. (Продукт создан для экспресс подготовки экономической документации. Возможности программы это быстрая, качественная, профессиональная подготовка эконом. документации для представления партнерам, инвесторам, кредитодателям и т.п..).. Вся информация по тел: (495) 742*9I/98 <> +7 499 4Ч5Ч*О95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6349 bytes Desc: not available URL: From zooko at zooko.com Sat Mar 10 16:55:19 2012 From: zooko at zooko.com (Zooko Wilcox-O'Hearn) Date: Sat, 10 Mar 2012 16:55:19 -0800 Subject: [tahoe-dev] Boulder Hack Fest! Message-ID: Folks: Let's have a Hack Fest in Boulder, Colorado, and on the Internet on the weekend of March 30! David-Sarah will be in town, visiting LAE World Headquarters. Marlowe and possibly other members of the Marlowe family will drive over from Kansas City. If anybody else wants to physically attend the Hack Fest, please let me know so I can make sure to get access to a big enough conference room, and map out crash space on our floor. I know Jean Lorchat wants to be linked in over the Internet. If anybody else wants that, let me know. Regards, Zooko _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From morlockelloi at yahoo.com Sat Mar 10 19:55:37 2012 From: morlockelloi at yahoo.com (Morlock Elloi) Date: Sat, 10 Mar 2012 19:55:37 -0800 (PST) Subject: What do you think about .art? Message-ID: DNS and ICANN and such are on their way out. Private namespaces are back. The assumption - that, for example, xyz.com *must* resolve to the same IP number wherever the query is done - went curiously unchallenged for a long time. Now, seriously, why is it so important that google.com means the same in New Zealand and Czech Republic? Where is this notion that the planet needs the globally unique name space coming from? What makes it "good" (hint - you can't use Google, Inc. profits as an argument) ? Historically, only the state insisted on unique identifiers, for its own needs. The unique namespace is a terrible idea. It's a shit amplifier. It skips and disables local roadsigns and greatly reduces the number of roadsign posters. It's no wonder that ICANN attracts slimy thugs - a prospect that few can decide on global naming has attractiveness of a dung pile for flies miles away. There are very good reasons for having things harder to find. A complex discovery process itself is a great moron filter. During the search you may find things and people you didn't look for. # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mx.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From miyokomakeda at khj.com Sat Mar 10 07:30:20 2012 From: miyokomakeda at khj.com (Collen Yadira) Date: Sat, 10 Mar 2012 21:30:20 +0600 Subject: Save BIG $$$!!! Lowest Cialis Prices On The INTERNET! c7j6ki30 Message-ID: <201203100927.4ADA8DED512DB0B5391C7AFF@rl258w9rf> LOWEST CIALIS PRICES Lowest Prices On The INTERNET! Buy Cialis Online - Save BIG $$$!!! Fast Worldwide shipping! http://tabletsrxwellbeing.ru From rbjoj at yahoo.com Sat Mar 10 19:12:10 2012 From: rbjoj at yahoo.com (=?ISO-2022-JP?B?GyRCJSslJiVzJTslaSE8Smc9ODBGRmIbKEI=?=) Date: Sun, 11 Mar 2012 00:12:10 -0300 Subject: =?ISO-2022-JP?B?GyRCIX08Z0lYJE5BakNMQWo8aiRLJEokQyRGJCQkPyRAJDEka0NLQC1KZz04Q2YhQyVhITwlayVcJWklcyVGJSMlIhsoQg==?= Message-ID: こちらは、 くらしのための女性フォーラム『婦人の掲示板』です。 カジュアル・カウンセラー(男性)募集のご案内をさせていただきます。 --------------------------------------------------------------  ◎第三者の男性として、既婚女性の相談相手になるボランティア ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ ・「夫以外の男性の意見を聞きたい」 ・「もっと気軽に、メールで話を聞いてもらえる男性がいたら」 2011年より募集を開始したカジュアル・カウンセラーは、 メンバー(女性)から予想を超える反響をいただいているため、、 今回、増員のため男性の募集を再開いたします。 カジュアル・カウンセラーは、 女性有資格者による心理カウンセリング・コンテンツとは別に、 既婚女性のちょっとした悩みや話をきくメール・ボランティアですので、 一般男性の方も安心してご参加いただけます。 お悩みの女性とメールして、毎日をもっと充実させませんか?      ◎ カジュアル・カウンセラー(男性)募集     【活動】サイトメンバー(女性)とのメール相談     【資格】25歳以上の男性・既婚独身問わず       【報酬】報酬なし、参加、退会そのほかの費用無料     【受付】メールアドレスのみご用意していただき、下記より受付してください。       ⇒無料受付はこちら http://www.tenderns.net/mail_volunteer/ ――――――――――――――――――――――――――――――― ※メールの頻度などは、できる範囲でかまいません。 ※募集は随時しておりますので、受付後に辞退されてもかまいません。 ※不倫を奨励するものではありませんが、交流についての制限はございません。 ※かんたんな選択式のアンケートに答えていただく場合がございます。 ――――――――――――――――――――――――――――――― [発行] 婦人の掲示板 [URL] http://www.tenderns.net/mail_volunteer/ ――――――――――――――――――――――――――――――― Copyright(c) Lady's Forum. All Right Reserved From nighat at bytesforall.pk Sun Mar 11 00:41:12 2012 From: nighat at bytesforall.pk (nighat at bytesforall.pk) Date: Sun, 11 Mar 2012 03:41:12 -0500 Subject: [liberationtech] Pakistan Firewall Message-ID: You all may like to read something more on Pakistan Firewall. http://futurechallenges.org/local/build-the-great-firewall-follow-the-masters/ Regards Nighat Dad Bytes for All, Pakistan @nighatdad _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From leonoremana at urbanflavorz.com Sat Mar 10 22:51:18 2012 From: leonoremana at urbanflavorz.com (LAVONE GRETA) Date: Sun, 11 Mar 2012 07:51:18 +0100 Subject: Buy Viagra(Sildenafil) WITHOUT PRESCRIPTION. Internet Pharmacy You Can Trust. FREE BONUS Pills ynzm Message-ID: <68u77j67e93-02042898-481c3s32@cymfnpfza> Cheapest VIAGRA. FREE Shipping - FREE BONUS Pills Buy Viagra(Sildenafil) WITHOUT PRESCRIPTION. Internet Pharmacy You Can Trust. Large selection of Cheap Brand & Generic VIAGRA! FREE Pills! http://2012-medpills.ru From sammyphyllis at themoscowtimes.com Sun Mar 11 06:03:57 2012 From: sammyphyllis at themoscowtimes.com (Aisha Albertina) Date: Sun, 11 Mar 2012 08:03:57 -0500 Subject: Complete HCG Weight Loss Kit. Safely Lose 10-15 Pounds in 40 Days - GUARANTEED kxyojr Message-ID: <4f5ca2bd.faa3ac37@themoscowtimes.com> Complete HCG Weight Loss Kit #1 Doctor Endorsed HCG. Made in the USA. Safely Lose 10-15 Pounds in 40 Days - GUARANTEED http://hcgdietdirectchildhood.ru From eugen at leitl.org Sun Mar 11 01:10:49 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 11 Mar 2012 10:10:49 +0100 Subject: [liberationtech] Pakistan Firewall Message-ID: <20120311091049.GM9891@leitl.org> ----- Forwarded message from nighat at bytesforall.pk ----- From eugen at leitl.org Sun Mar 11 01:32:58 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 11 Mar 2012 10:32:58 +0100 Subject: What do you think about .art? Message-ID: <20120311093258.GQ9891@leitl.org> ----- Forwarded message from Morlock Elloi ----- From eugen at leitl.org Sun Mar 11 01:51:08 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 11 Mar 2012 10:51:08 +0100 Subject: [tahoe-dev] Boulder Hack Fest! Message-ID: <20120311095108.GU9891@leitl.org> ----- Forwarded message from Zooko Wilcox-O'Hearn ----- From aggravating54 at regus.com Sun Mar 11 03:53:38 2012 From: aggravating54 at regus.com (=?koi8-r?B?0MzBziDP1MvS2dTJ0SDCydrOxdPB?=) Date: Sun, 11 Mar 2012 11:53:38 +0100 Subject: =?koi8-r?B?08/T1MHXzMXOycUgwsnazsXTINDMwc7B?= Message-ID: <000d01ccff75$3721cbc0$6400a8c0@aggravating54> КАК ПРАВИЛЬНО РАЗРАБОТАТЬ БИЗНЕС ПЛАН, ТЭО По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 (499) 445*39_68 ; +7 499 - Ч45_Ч0-95 Дата учебного курса: 29-30 марта 2012г. Краткая информация о семинаре: Различные практические методы разработки Бизнес Планов, ТЭО, с помощью, методической литературы, электронных таблиц, специализированного программного обеспечения. Как правильно изложить, оформить, представить (преподнести) документ, что бы его воспринимали банки, инвесторы и партнеры. Методы и практические рекомендации: Построение структуры бизнес плана; Инвестиционная программа: учет, правильное построение и классификация затрат. Организовать анализ целесообразности инвестиционных затрат с использованием простых и динамических критериев эффективности. Подготовить исходную информацию для оценки проекта: определение доходной и затратной частей, их классификация по статьям для: новых компаний.функционирующего предприятия. Определение и построение источников финансирования: кредиты, не распределенная прибыль, инвестиционный капитал. Определить и рассчитать влияние учетной политики и инфляции на финансовые результаты проекта. ДИСКОНТИРОВАНИЕ √ критерий разногласия! Вопрос применения и понятия метода. Подготовка финансовой части документации: Требования к расчетам и их объем;Фин. План его структура финансовых приложений; Самостоятельная подготовка электронных таблиц;Описание расчетов в финансовом плане, необходимый объем;Финансовые показатели их определение и необходимые коррективы;Определение фин. показателей и их анализ;Точа (0), определение финансовой прочности проекта;Полученные данные и их использование. Подготовить анализ доходности: основные показатели, характеризующие доходность деятельности организации (рентабельность, прибыльность) и их использование для целей анализа финансовых результатов. Нестандартные проекты и особенности их расчета. Грамотно подготовить текстовую часть документа. Маркетинговая информация, как ее подготовить? Обработка информации для маркетинговых исследований √ управление объемом информации, понятие, что такое Маркетинговые исследования в стандартном варианте и использование обработанной информации в структуре бизнес плана. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: 8 (495) 792/2I_22 \\\/// +7 499 Ч45Ч-О95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4225 bytes Desc: not available URL: From moritz at torservers.net Sun Mar 11 05:45:15 2012 From: moritz at torservers.net (Moritz Bartl) Date: Sun, 11 Mar 2012 13:45:15 +0100 Subject: [liberationtech] Hackerbus: First Tour Dates: Switzerland, France, Spain, Portugal Message-ID: Hi Libtechs, I was asked to keep this list updated every once in a while, and I am happy to do so. Libtech readers are amongst the most important people I want to reach out to. Are you a researcher working on liberation technology in Europe? Human rights activist? Journalist focussing on privacy? I would very much like to meet and chat with you! Please also fill me in about related conferences and other events taking place in Europe. http://www.hackerbus.eu/blog/2012/03/11/first-tour-dates-switzerland-france-spain-portugal.html I am excited to finally announce the beginning of my tour! As a reminder, the Hackerbus serves as a bframeworkb for documenting modern forms of living and working: It carries professional equipment for high quality movie making, taking pictures, recording interviews b whatever you and me make out of it! There is no way for me to do this alone, and it is unlikely to find someone to tour with me the whole year. While I do have some ideas about what to visit, I donbt want to constrain this tour too much, to be open for all kinds of suggestions and detours. I hope you understand that for this reason I can only give you a very rough schedule. Please contact me if you know people and places I should come visit! * from March 18th, 2012: Switzerland * April 2012: Southern France, Spain * May 2012: Portugal, Northern France Some of the equipment: * Panasonic Lumix GH2 with 14-42mm and 20mm lenses * Rode NTG-2 shotgun microphone * Zoom H4N audio recorder * >10 TB storage * last not least: a van with several spare seats and a bed etc. What do you get from inviting me? Many of you know me as the founder of Torservers.net. Apart from the obvious offer to get your message out on video, I am very interested to talk about communication security (proper use of PGP, Tor etc), apocalyptical thinking as philosophical discipline, and community building. In preparation I was not as organized as I could have been, but hey b webre all in it for the fun! ;-) Please donbt be mad at me if you have already contacted me and never heard back. Ping me again! Stay tuned for more updates soon. Now is a good time to add the RSS feed to your reader and follow me on Twitter. http://www.hackerbus.eu/feed http://www.twitter.com/hackerbus -- Moritz Bartl @gamamb http://www.hackerbus.eu/ https://www.torservers.net/ _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sun Mar 11 06:44:43 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 11 Mar 2012 14:44:43 +0100 Subject: [liberationtech] Hackerbus: First Tour Dates: Switzerland, France, Spain, Portugal Message-ID: <20120311134443.GY9891@leitl.org> ----- Forwarded message from Moritz Bartl ----- From sheraronda at evisionmail.com Sun Mar 11 00:46:35 2012 From: sheraronda at evisionmail.com (Slyvia Tula) Date: Sun, 11 Mar 2012 15:46:35 +0700 Subject: TRY THIS! Penis enhancement pill helps increase sexual health for bigger, harder erections tvgy Message-ID: <41w90m58f44-68305424-833h9q24@ytqcdrs> World's Best Penis Pills - Virility Pills 100% Satisfaction Guaranteed Penis Enlargement, Clinically Proven Now in USA Buy 3 Get One Free, Buy 4 Get 2 Free Limited Time Only http://largepenisbuy.ru From teddks at gmail.com Sun Mar 11 13:39:31 2012 From: teddks at gmail.com (Ted Smith) Date: Sun, 11 Mar 2012 16:39:31 -0400 Subject: [tt] [silk] library.nu In-Reply-To: <20120311093151.GO9891@leitl.org> References: <20120311093151.GO9891@leitl.org> Message-ID: <1331498371.12520.6.camel@anglachel> One of the things I've come to love about the sort of people that are on tt/cypherpunks is that they tend to care more about action than rhetoric. People can debate "intellectual property" and "pirates vs. freedom fighters" forever, if you let them. But that seems not to happen here, at least not very often. So, who has a library.nu rip? I'd seed it. [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc] From yuuarj at gmail.com Sun Mar 11 05:01:02 2012 From: yuuarj at gmail.com ({{ M) Date: Sun, 11 Mar 2012 21:01:02 +0900 Subject: No subject Message-ID: <201203091204.q29C4kbN021350@proton.jfet.org> 当倶楽部のマダムの肉欲を解消していただける方募集しています!!    【報酬1回3万円〜7万円】 内容はホテルで待ち合わせてSEXして頂くだけです。 ホテル代ももちろんこちらで負担します。 ⇒http://sefrelove.info/2efm02/ 人とそれぞれ好みがあると思いますので、 お相手はこちらのなかからお選び頂けます。 ⇒http://sefrelove.info/2efm02/ トラブル防止の為、報酬は行為の前に支払われますので 安心してご参加下さい。 ⇒http://sefrelove.info/2efm02/ このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp From fulanioul at clarge.com Mon Mar 12 00:35:41 2012 From: fulanioul at clarge.com (=?koi8-r?B?Iu3FwsXM2CI=?=) Date: Sun, 11 Mar 2012 23:35:41 -0800 Subject: =?koi8-r?B?68HCyc7F1Nkg0tXLz9fPxMnUxczRIMkgzcXCxczYIMTM0SDTz9TS1cTO?= =?koi8-r?B?ycvP1w==?= Message-ID: <2D7659E9128445CBBE5FBA648222D040@admin3675366bf> Кабинеты руководителя и мебель для сотрудников от эконом до премиум класса на складе. Доставка в день заказа. 77-88-319 From qtvddleygp at yahoo.co.jp Sun Mar 11 12:00:42 2012 From: qtvddleygp at yahoo.co.jp (ebqnhbh@yahoo.co.jp) Date: Mon, 12 Mar 2012 00:00:42 +0500 Subject: =?ISO-2022-JP?B?GyRCIVo6RkF3IVtGfDoiJE4kNDAmOFwkSzQ2PFUhKk14MVc0VDg1JS0lYyVzJVohPCVzPEI7XENmISobKEI=?= Message-ID: <201203111801.q2BI1h0V011029@proton.jfet.org> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 特選◇プラチナキングマガジン =-=-=-=-=-=-=-=-=-=-=-=-=-=-= 当マガジンは公営競技のオッズ微調整の為に民間より不定期にて配布されている『事前平衡馬券』のエントリー通知でございます。 該当金額が約束されているため、お気軽にご利用ください。 (あくまでオッズ平衡調整となる為、回収金額は150,000円を超えないようにされております。あらかじめご了承ください。) ■ENTRYはこちらから http://bit.ly/xqFnji 獲得金額は、85%の換金率で即日お口座に入金されます。 ID・PASSをお持ちの方はマイメニュー画面より随時ご確認可能です。 ≪追加募集対象期間≫ 2012年3月12日から2012年3月14日まで ■追加募集対象人数 全国にて50名様まで(20歳以上に限る) 注1→人数を締め切ると登録が出来なくなります。 注2→ENTRYは無料です。 ■募集対象条件 20歳以上である事 ■次回配布予定時期 2012年3月18日から ──────────── 【2012年3月4日の詳細】 情報カテゴリー:一般提供枠 購入金額: 3,000円 回収金額:14,4400円  ☆利益: 141,400円 ──────────── ■ENTRYはこちらから http://bit.ly/xqFnji ☆☆☆提供システム☆☆☆ 注3→ 前日までにメール(お電話も可)にて、馬券の当該番号5つを通知します。 平衡対象馬券ですので150,000円を超えると事後調査が入る事がございます。 ☆☆☆☆☆☆☆☆☆☆☆☆ ■■■■■■■■■■■■ (株)プラチナキングマガジンは随時人数限定でメンバーを募集しております。 http://bit.ly/xqFnji お問合せ先 info at pppking_service.net ──────────── 配信停止依頼↓↓↓↓↓↓ http://bit.ly/xqFnji お手数ですがお名前欄に[配信停止]とご記入ください。その際ご連絡先,Eメールアドレス欄にご記入を頂けなかった場合、対応致しかねますのでご了承ください。 ■■■■■■■■■■■ From renegadese857 at lingyun.com Sun Mar 11 23:43:06 2012 From: renegadese857 at lingyun.com (=?koi8-r?B?Iu3FwsXM2CI=?=) Date: Mon, 12 Mar 2012 10:13:06 +0330 Subject: =?koi8-r?B?68HCyc7F1Nkg0tXLz9fPxMnUxczRIMkgzcXCxczYIMTM0SDTz9TS1cTO?= =?koi8-r?B?ycvP1w==?= Message-ID: <2CD58EE2F375438F991E6C71B103D3F1@sazgar5bcec547> Кабинеты руководителя и мебель для сотрудников от эконом до премиум класса на складе. Доставка в день заказа. 77-88-319 From kegcz4 at rookes.com Sun Mar 11 22:22:06 2012 From: kegcz4 at rookes.com (=?koi8-r?B?8M/S0cTPyyDXxcTFzsnR?=) Date: Mon, 12 Mar 2012 10:52:06 +0530 Subject: =?koi8-r?B?68HT08/X2cUgz9DF0sHDyckuIO7P19nKIPDP0tHEz8sg?= Message-ID: <000d01cd0010$10efa530$6400a8c0@kegcz4> 15 марта 2012 г. КАССОВЫЕ ОПЕРАЦИИ. НОВЫЙ ПОРЯДОК ВЕДЕНИЯ КАССОВЫХ ОПЕРАЦИЙ, ВСТУПИВШИХ В ДЕЙСТВИЕ 1 ЯНВАРЯ 2012 ГОДА 8 (499) ЧЧ5Ч095 и +7 (Ч95) 742*9I98 С 1 января 2012 года в РФ установлен новый порядок ведения кассовых операций, обязательный для всех организаций, а теперь √ и для индивидуальных предпринимателей. Изменений много и они коснулись почти всех сложных моментов осуществления операций с наличными деньгами. Мы уделим внимание всем новшествам, а также тем проблемам, которые остаются неразрешенными! Программа: 1. Новое Положение о порядке ведения кассовых операций от 12.10.2011 ╧ 373-П. Обзор новшеств. 2. Необходимые локальные акты по организации кассовой работы. 3. Новые принципы установления лимита остатка кассы и новые требования к его соблюдению. 4. Новые требования и возможности при ведении кассовой книги. Новые требования к заполнению расходных ордеров. Особенности заполнения приходных ордеров. Ведении книги учета принятых и выданных денежных средств с учетом нового порядка. Особенности оформление кассовых документов √ за что штрафуют налоговые органы в 2012 году? 5. Выдача денег по доверенности: совершенно новый порядок в 2012 году. 6. Переход на оформление кассовых документов в электронном виде: новые возможности и обязанности. 7. Новый порядок работы с подотчетными суммами. 8. Денежные документы и БСО: порядок хранения в кассе и учета на счетах, выдачи, отчета ответственных лиц. БСО и НДС. 9. Лимит расчетов наличными: сложные ситуации и типичные ошибки. Наличная выручка и порядок ее расходования без сдачи в банк. 10. Применение ККМ. Расчеты с применением платежных банковских карт. Возвраты покупателям наличных в случае отказа от товара в день приобретения и позже. 11. Изменение требований к оборудованию кассовых комнат и хранению денежных средств. 12. Должность кассира: обязанности, ответственность. Совмещение и временное замещение должности кассира. Новые условия возложения материальной ответственности на кассира. 13. Контроль за осуществлением кассовых операций. Кто может Вас проверять и какие санкции грозят. Что изменилось в 2012 году? Типичные нарушения со стороны контролеров: как отстоять свою правоту. Стоимость участия: 8 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: Московский код; 792/2122 : 8 (499) Ч45.39-68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4088 bytes Desc: not available URL: From lee at royalgardens.us Mon Mar 12 14:29:50 2012 From: lee at royalgardens.us (Lee @ Royal Gardens) Date: Mon, 12 Mar 2012 11:29:50 -1000 Subject: Cryptome Downed Message-ID: Obviously, Downy, a feces company, does not comprehend that their client system voluntarily requested, received, and loaded raw data as binary on their system. Why the hell are there still scripts on cryptome? Get a hardware server (buffer mem, hardware http1, sdcard/cd, ethernet plug) and stop making idiots of selves. JYA use .ht* to block/redirect //Index http://cryptomeorg.siteprotect.net/ From radar0 at bustybabesclips.com Sun Mar 11 21:59:26 2012 From: radar0 at bustybabesclips.com (=?koi8-r?B?IuTv8/Th9+vhIPfh++Xn7yDn8vX64SI=?=) Date: Mon, 12 Mar 2012 12:59:26 +0800 Subject: =?koi8-r?B?5M/T1MHXyc0g18HbySDH0tXa2SDC2dPU0s8=?= Message-ID: <7FE31D1775064C8DB9D5E15BB87A9B89@user> > Все виды транспортных услуг по территории России > Телефон грузоперевозок (838) 22-22-22-22 Круглосуточно ! > Ежедневная отправка ваших грузов . > Дотавка любых грузов из Москвы в Сибирский регион,Алтайский край, > Кузбасс,Красноярский край, Бурятия .... и обратно. > > Заключаем договора на транспортное обслуживание. > Страховка вашего груза входит в стоимость ! > Собственные склады. Примем ваши грузы на ответственное хранение ! > > > > ДОСТАВКА ВАШЕГО ГРУЗА - ЭТО НАША РАБОТА !!! www.доставка-вашего-груза.рф From libidosmlb5 at divecortez.com Sun Mar 11 23:56:29 2012 From: libidosmlb5 at divecortez.com (=?koi8-r?B?5MHS2NE=?=) Date: Mon, 12 Mar 2012 15:56:29 +0900 Subject: =?koi8-r?B?8M/SwcTVytTFINfB29Ug08XN2MAgzs/X2c0gzcXEycHQzMXF0s/NINMg?= =?koi8-r?B?xsnM2M3Bzck=?= Message-ID: <723895036.07276456127863@divecortez.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 393 bytes Desc: not available URL: From seleucusbhs at vatee.com Mon Mar 12 01:27:46 2012 From: seleucusbhs at vatee.com (=?koi8-r?B?Iu3FwsXM2CI=?=) Date: Mon, 12 Mar 2012 16:27:46 +0800 Subject: =?koi8-r?B?68HCyc7F1Nkg0tXLz9fPxMnUxczRIMkgzcXCxczYIMTM0SDTz9TS1cTO?= =?koi8-r?B?ycvP1w==?= Message-ID: <3EB0EC81514D4700B6924BC328E4CF3D@tuya> Кабинеты руководителя и мебель для сотрудников от эконом до премиум класса на складе. Диваны дёшево Доставка в день заказа. 77-88-319 From lodewijkadlp at gmail.com Mon Mar 12 11:16:46 2012 From: lodewijkadlp at gmail.com (=?UTF-8?Q?lodewijk_andr=C3=A9_de_la_porte?=) Date: Mon, 12 Mar 2012 19:16:46 +0100 Subject: [info] What do you think about .art? In-Reply-To: <20120311093258.GQ9891@leitl.org> References: <20120311093258.GQ9891@leitl.org> Message-ID: Morlock Elloi wrote: > A complex discovery process itself is a great moron filter. How do we earn the moron's cash? Put kindly the duplication of brand names will create confusion among non-technical users and from that confusion will result a loss of income. Besides why would I want google.com to lead elsewhere than what I expect it to? Do I want to have to go through a DNS(-ish?) config procedure when I want to show nyan cat at my friends house? What else than a unique name do you want, 20Q? Good luck getting free from "slimy thugs". Naturally we could don the DNS system and use onion-id style identifiers. Good luck making the usability plea on that one. "Don't worry Google can find it for you"? Not to mention we can already use IPv4/6 addresses without DNS. Why don't you? The only thing that really fucking frustrates me is the requirement of "."'s in the name. Why not just accept any string as an ID? Why does Google have to register Google.[com|org|net|nl|co.uk|be|sp|hu|etc.]? Why not just "google" or "google"? Tie it right in with the brand-name protection stuff we've got going on. They should've done that from the beginning. You register your company, you get a unique address. Strip the "Inc", "AG", "BV" and stick to the company name. There is some cross-business-type problems, fix them by either appending a ".accounting" or by changing names. Allow people to register addresses but override them if a business comes in the way. Why didn't they do it? Politics, man. Seriously though, we should figure out a way of splitting the responsibility for who gets what address. ICANN is now screwing that bigtime by spamming gTLD's. Maybe we'll abandon them completely in the future. I suspect the switch'll be quite painful. From kb at karelbilek.com Mon Mar 12 12:12:04 2012 From: kb at karelbilek.com (=?ISO-8859-1?Q?Karel_B=EDlek?=) Date: Mon, 12 Mar 2012 20:12:04 +0100 Subject: [info] What do you think about .art? In-Reply-To: References: <20120311093258.GQ9891@leitl.org> Message-ID: I never understood how it works exactly, but what is wrong with namecoin? (besides the fact that noone uses it) 2012/3/12 lodewijk andri de la porte : > Morlock Elloi wrote: > >> A complex discovery process itself is a great moron filter. > > > How do we earn the moron's cash? Put kindly the duplication of brand names > will create confusion among non-technical users and from that confusion > will result a loss of income. > > Besides why would I want google.com to lead elsewhere than what I expect it > to? Do I want to have to go through a DNS(-ish?) config procedure when I > want to show nyan cat at my friends house? What else than a unique name do > you want, 20Q? Good luck getting free from "slimy thugs". > > Naturally we could don the DNS system and use onion-id style identifiers. > Good luck making the usability plea on that one. "Don't worry Google can > find it for you"? Not to mention we can already use IPv4/6 addresses > without DNS. Why don't you? > > The only thing that really fucking frustrates me is the requirement of > "."'s in the name. Why not just accept any string as an ID? Why does Google > have to register Google.[com|org|net|nl|co.uk|be|sp|hu|etc.]? Why not just > "google" or "google"? Tie it right in with the brand-name protection stuff > we've got going on. They should've done that from the beginning. You > register your company, you get a unique address. Strip the "Inc", "AG", > "BV" and stick to the company name. There is some cross-business-type > problems, fix them by either appending a ".accounting" or by changing > names. Allow people to register addresses but override them if a business > comes in the way. > > Why didn't they do it? Politics, man. > > Seriously though, we should figure out a way of splitting the > responsibility for who gets what address. ICANN is now screwing that > bigtime by spamming gTLD's. Maybe we'll abandon them completely in the > future. I suspect the switch'll be quite painful. From ragoutsatb2137 at riverboat.com Mon Mar 12 17:18:32 2012 From: ragoutsatb2137 at riverboat.com (=?koi8-r?B?z8LSwdrFwyDCydrOxdMg0MzBzsE=?=) Date: Mon, 12 Mar 2012 21:18:32 -0300 Subject: =?koi8-r?B?9d7Fws7ZyiDL1dLTOuLJ2s7F0yDQzMHOLCD0/O8sIJYg0sHa0sHCz9TL?= =?koi8-r?B?wSDJIMHOwczJ2i4=?= Message-ID: <000d01cd00ae$d2c7a060$6400a8c0@ragoutsatb2137> КАК ПРАВИЛЬНО РАЗРАБОТАТЬ БИЗНЕС ПЛАН, ТЭО По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 (499) - 445-39_68 >> 8 (499) Ч45ЧО95 Дата проведения: 29-30 марта 2012г. Краткая информация о предстоящем мероприятии: Различные практические методы разработки Бизнес Планов, ТЭО, с помощью, методической литературы, электронных таблиц, специализированного программного обеспечения. Восприятие подготовленной документации инвестором или партнером √ как правильно подготовить и оформить документацию. Методы и практические рекомендации: Структура Бизнес плана ее правильное построение; Инвестиционная программа: учет, правильное построение и классификация затрат. Понятие Критерия Эффективности при построении инвестиционной программы. Анализ целесообразности. Сбор и подготовка информации для оценивания проекта: назначение классов структуре затрат, определение с получаемыми доходами для: новых компаний.проектов на действующем производстве. Определение и построение источников финансирования: кредиты, не распределенная прибыль, инвестиционный капитал. Определить и рассчитать влияние учетной политики и инфляции на финансовые результаты проекта. ДИСКОНТИРОВАНИЕ √ критерий разногласия! Вопрос применения и понятия метода. Подготовка финансовой части документации: Объем и требования к расчетам;Объем расчетов и описание в финансовом плане;Как самостоятельно подготовить электронные таблицы;Объем расчетов и описание в финансовом плане;Рассмотрение финансовых показателей и их корректировка с учетом выбранного интервала расчетов;Анализ финансовых показателей деятельности предприятия;Определение уровня безубыточности, запаса финансовой прочности проекта;Использование полученных данных. Подготовить анализ доходности: основные показатели, характеризующие доходность деятельности организации (рентабельность, прибыльность) и их использование для целей анализа финансовых результатов. Учет особенности расчета нестандартных проектов. Текстовая часть проекта и особенности подготовки. Маркетинговая информация, как ее подготовить? Обработка информации для маркетинговых исследований √ управление объемом информации, понятие, что такое Маркетинговые исследования в стандартном варианте и использование обработанной информации в структуре бизнес плана. По вопpоcам подробной информации и pегucтаpацuu обpащайтеcь по тел: +7 (Ч95) 7922I_22 >> \Моск. код/ 792.21*2.2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4268 bytes Desc: not available URL: From untidiera10 at au.ey.com Mon Mar 12 07:33:58 2012 From: untidiera10 at au.ey.com (=?koi8-r?B?IlNlbnNvcnVzIC0gwsXTy8/O1MHL1M7ZxSDUxcjOz8zPx8nJIg==?=) Date: Mon, 12 Mar 2012 21:33:58 +0700 Subject: =?koi8-r?B?88XO08/Szs/FINfFxNLP?= Message-ID: <115B449412FD479C931D7B6063B121C6@VANHOME> Мусорные ведра с бесконтактной технологией «no touch» (не надо прикасаться) от 1,5 до 85 литров ИЩЕМ ДИЛЕРОВ в России, Белоруссии и Казахстане, в Украине и др. странах СНГ, в Прибалтике +7-911-959-89-48 www.бесконтактные-технологии.рф • Гигиеничность – открывается само (датчик реагирует), не нужно прикасаться к крышке. • Долговечность (гарантия от производителя). • Удобство и компактность (любой дизайн, литраж от 1,5 до 95л) • Бесшумность: работает от батареек, аккумуляторов и 220В • Покрытие - хром, красный, синий, черный, белый цвета • Имеется форма банки от кока-колы и пива (1,5л, 2,0л, 2,5л) Удобно, экономично и практично! С 2009 года используют в России • отели, рестораны, бары • бизнес-центры и офисы • спортивные комплексы • медицинские учреждения • квартиры • коттеджи • загородные дома Лучший подарок сотрудникам, шефу и любимой теще. +7-911-959-89-48 From pass at lleida.org Mon Mar 12 23:01:21 2012 From: pass at lleida.org (=?koi8-r?B?Iu7JzsEi?=) Date: Mon, 12 Mar 2012 22:01:21 -0800 Subject: =?koi8-r?B?88vJxMvBIM7BINDPy9XQy9UgwsnMxdTP1yDXINTFwdTSLg==?= Message-ID: <01cd009b$a8784e80$d787b43b@pass> БИЛЕТЫ НА ЭТУ ЛИРИЧЕСКУЮ КОМЕДИЮ ВЫ МОЖЕТЕ ПРИОБРЕСТИ С 10-30% СКИДКОЙ ПОДРОБНОСТИ ПО ТЕЛЕФОНУ (495) 641-89-75 ------------------------------------------------ Театр Киноактера 16 Марта, начало в 19.00 Заложники любви Лирическая комедия Автор пьесы: Наталья Демчик (входит в пятерку лучших современных драматургов-комедиографов). Вот и встретились два одиночества в Рождественский вечер. Он - командированный в Россию американец, Она - очаровательная русская вдовушка. А в Рождество, как известно, происходят всякие чудеса. В самый интересный момент, в момент предложения руки и сердца, к влюблённым неожиданно являются с "небес" их покойные супруги - "рубаха-парень" Гришаня, и феминистка Дебора... Начинается бурное выяснение отношений: тут и ревность, и шовинизм, и прошлые обиды...Водка подогревает споры, и каждая сторона высказывается сполна, не жалея эпитетов. К утру наступает умиротворение. "Пришельцам" пора возвращаться. А Екатерина и Скотт серьезно задумываются над тем, как же им на этом свете выстроить отношения друг с другом, чтобы прожить счастливо. Незамысловатый, в общем-то, сюжет, но как играют актеры! Действующие лица и исполнители: Нар.артистка России Наталия Егорова, Засл.артист России Андрей Харитонов, Засл.артистка России Светлана Тома, Нар.артист России Александр Панкратов-Черный. ------------------------------------------------- ДЛЯ ПОЛУЧЕНИЯ СКИДКИ ОБРАЩАЙТЕСЬ К НАМ ПО ТЕЛЕФОНУ Тел: (495) 641-89-75 ВАШ ПРОМО КОД 1458 From visgean at gmail.com Mon Mar 12 14:41:56 2012 From: visgean at gmail.com (Visgean Skeloru) Date: Mon, 12 Mar 2012 22:41:56 +0100 Subject: [info] What do you think about .art? In-Reply-To: References: <20120311093258.GQ9891@leitl.org> Message-ID: Well that would be the problem of all these dns alternatives, nobody uses them. After the IPv6 will spread things will probably change slightly, as there will be more demand for cheaper yet safe dns. 2012/3/12 Karel BC-lek > I never understood how it works exactly, but what is wrong with namecoin? > > (besides the fact that noone uses it) > > 2012/3/12 lodewijk andri de la porte : > > Morlock Elloi wrote: > > > >> A complex discovery process itself is a great moron filter. > > > > > > How do we earn the moron's cash? Put kindly the duplication of brand > names > > will create confusion among non-technical users and from that confusion > > will result a loss of income. > > > > Besides why would I want google.com to lead elsewhere than what I > expect it > > to? Do I want to have to go through a DNS(-ish?) config procedure when I > > want to show nyan cat at my friends house? What else than a unique name > do > > you want, 20Q? Good luck getting free from "slimy thugs". > > > > Naturally we could don the DNS system and use onion-id style identifiers. > > Good luck making the usability plea on that one. "Don't worry Google can > > find it for you"? Not to mention we can already use IPv4/6 addresses > > without DNS. Why don't you? > > > > The only thing that really fucking frustrates me is the requirement of > > "."'s in the name. Why not just accept any string as an ID? Why does > Google > > have to register Google.[com|org|net|nl|co.uk|be|sp|hu|etc.]? Why not > just > > "google" or "google"? Tie it right in with the brand-name protection > stuff > > we've got going on. They should've done that from the beginning. You > > register your company, you get a unique address. Strip the "Inc", "AG", > > "BV" and stick to the company name. There is some cross-business-type > > problems, fix them by either appending a ".accounting" or by changing > > names. Allow people to register addresses but override them if a business > > comes in the way. > > > > Why didn't they do it? Politics, man. > > > > Seriously though, we should figure out a way of splitting the > > responsibility for who gets what address. ICANN is now screwing that > > bigtime by spamming gTLD's. Maybe we'll abandon them completely in the > > future. I suspect the switch'll be quite painful. > -- PGP pub key: http://keyserver.pgp.com/vkd/SubmitSearch.event?SearchCriteria=visgean%40gmai l.com http://www.abclinuxu.cz/lide/visgean/gpg A453 B7F3 33D9 3BE6 2B8A | F014 5347 EBAC 0A5A 3E92 Jabber: visgean at jabber.org | visgean at jabber.cz Github: http://github.com/Visgean From lodewijkadlp at gmail.com Mon Mar 12 15:36:30 2012 From: lodewijkadlp at gmail.com (=?UTF-8?Q?lodewijk_andr=C3=A9_de_la_porte?=) Date: Mon, 12 Mar 2012 23:36:30 +0100 Subject: [info] What do you think about .art? In-Reply-To: References: <20120311093258.GQ9891@leitl.org> Message-ID: 2012/3/12 Karel BC-lek > I never understood how it works exactly, but what is wrong with namecoin? > > (besides the fact that noone uses it) > No domain name arbitration. If someone cybersquatted Microsoft.bit that'd really suck. Maybe they'd have the means to go after them but I likely wouldn't have. (and it doesn't solve the dumb users don't get it problem. There's been some really cool DNS providers integrating .bit to standard resolves though, I'd like to see more of that) From caldwelltommie at technolution.com Mon Mar 12 16:35:56 2012 From: caldwelltommie at technolution.com (Giovanni) Date: Tue, 13 Mar 2012 00:35:56 +0100 Subject: When you purchase Replica Watches, Fake Watch, you are automatically assured of the best in quality as well as our utmost commitment to service excellence. 9kf01kg Message-ID: <201203121735.1A35FD0AD5F3C12BEED0AA8@7f72iu3> #s1,6@ Best Replica Watches at $130 each When you purchase Replica Watches, Fake Watch, you are automatically assured of the best in quality as well as our utmost commitment to service excellence. Fake Watches Free Shipping - Buy Now! http://famouswatchesgraphics.ru #s1,6@ From amalasley at jp.sony.com Mon Mar 12 23:12:11 2012 From: amalasley at jp.sony.com (FredericaRowena) Date: Tue, 13 Mar 2012 03:12:11 -0300 Subject: TRY THIS! Penis enhancement pill helps increase sexual health for bigger, harder erections azjuws5v Message-ID: <201203130912.9E2DFE828EB5FF0C6EED6A8C@538h8g2> World's Best Penis Pills - Virility Pills 100% Satisfaction Guaranteed Penis Enlargement, Clinically Proven Now in USA Buy 3 Get One Free, Buy 4 Get 2 Free Limited Time Only http://xxxlargepenis.ru From patterson at alleytheatre.com Mon Mar 12 22:20:14 2012 From: patterson at alleytheatre.com (=?koi8-r?B?Iu3Jy8HJzCI=?=) Date: Tue, 13 Mar 2012 10:50:14 +0530 Subject: =?koi8-r?B?8NLFzdjF0tkg1yAixNLVx8/NINTFwdTSxSIg?= Message-ID: <01cd0107$11e17700$18c45d3b@patterson> УИК-ЭНД В "ДРУГОМ ТЕАТРЕ"! ************** на сцене ДК имени Зуева (ул. Лесная 18) 16 марта спектакль "Утиная охота" Владимир Епифанцев, Ольга Ломоносова, Надежда Михалкова, Сергей Фролов и др. 18 марта спектакль "Орфей и Эвридика" Григорий Антипенко, Мария Волкова, Вера Воронкова, Сергей Колтаков, Олег Макаров ************** на сцене Центра-музея В. Высоцкого (Нижний Таганский тупик, дом 3) 16 марта "Обмен" Ольга Хохлова/Ольга Спиркин, Елена Борзова, Дмитрий Козельский и др. 17 марта "Шоколад на крутом кипятке" Ксения Ларина, Иван Замотаев, Алексей Багдасаров, Алена Резник и др. 18 марта "Музыка для толстых" Наталья Ноздрина, Иван Замотаев, Александр Нестеров и др. ************** Билеты - по цене театра. Без комиссий и наценок. Возможна доставка. Телефон: 8(499)- 973-21-41 Театральное агентство "Рампа". From grjaja at yahoo.co.jp Mon Mar 12 20:50:29 2012 From: grjaja at yahoo.co.jp (| ׎q) Date: Tue, 13 Mar 2012 12:50:29 +0900 Subject: No subject Message-ID: <201203110354.q2B3sEGW032381@proton.jfet.org> 人妻とHしたいと思いませんか? 夫には内緒でお願いします。えっちなテクニック磨いて パパをびっくりさせてあげようかとおもってます。 念入りにフェラチオの練習をしたいです 本当はSEXは元々好きな方なんです もちろん費用等は私が負担するので連絡ほしぃです http://sefrelove.info/2efm02/ 新サークルのご案内 20代後半〜40代後半の人妻によるサークルです! 私共は毎日の単調な家庭生活に不満を感じ、刺激を求めています。。。 まずはただ会うだけでも構いません! 体の関係に抵抗がないという方は是非、連絡をして頂けないでしょうか? (サークルのメンバーは刺激的なSEX希望です。。) お互いに良い刺激になる出会いをしましょう♪ http://sefrelove.info/2efm02/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From zooko at zooko.com Tue Mar 13 14:32:56 2012 From: zooko at zooko.com (Zooko Wilcox-O'Hearn) Date: Tue, 13 Mar 2012 14:32:56 -0700 Subject: [tahoe-dev] monitoring/visualization (was: What about this?) Message-ID: On Tue, Mar 13, 2012 at 9:23 AM, Ted Rolle, Jr. wrote: > > Or, is this functionality already built into Tahoe-LAFS? What sort of monitoring functionality are you interested in, Ted? What data do you want to see? There is the "Download Performance Graphs" in the Tahoe client. Check it out! It contains lots of information. There is also the "/statistics" page served up by the Tahoe client that shows a few statistics about uploads and downloads. There are munin plugins in the source tree: https://tahoe-lafs.org/trac/tahoe-lafs/browser/git/misc/operations_helpers/munin I'm not sure, but I think that those plugins are the source of these graphs of volunteergrid2: https://vg2-stats.rosenkeller.org/ Least Authority Enterprises has set up some basic monitoring of our services with zenoss: https://monitoring.leastauthority.com (username: guest, password: guest) We haven't yet published the configuration and scripts that we use to run that monitoring server. We intend to do so. If you care about such details let us know on this list and this will encourage us to prioritize publishing it. A couple of tahoe-lafs contributors, Nejucomo Wilcox and Leif Ryge, work at StatMover -- http://statmover.com/ -- which is making a database and JavaScript visualization tool: https://bitbucket.org/0x0000/saturnalia/wiki/Home I'd like to see Tahoe-LAFS statistics graphed in that thing. The demos of it make it seem fun to explore data in it. So the first question from your perspective, Ted, is probably "What do I want to know?". Regards, Zooko _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From merrileelynetta at urbanflavorz.com Tue Mar 13 02:18:14 2012 From: merrileelynetta at urbanflavorz.com (Aileen Maud) Date: Tue, 13 Mar 2012 15:18:14 +0600 Subject: Find Cheap Viagra Overnight? Buy 100mg x 10pills $29,95 Only! g1bi Message-ID: <4f5f10d6.84ba2ed1@urbanflavorz.com> Find Cheap Viagra Overnight? Buy 100mg x 10pills $29,95 Only! Buy Cheap Generic Viagra (Sildenafil), Cialis, Levitra Online. Secure Checkout, Visa & Mastercard Accepted. Save With The Lowest Price And Get Overnight Delivery. http://tabletsmedtechspills.ru From info at bbb.org Tue Mar 13 07:13:25 2012 From: info at bbb.org (BBB) Date: Tue, 13 Mar 2012 16:13:25 +0200 Subject: BBB notice RE: Case ID 44175755 Message-ID: <4F5F542B.608030@bbb.org> Hello,Here with the Better Business Bureau would like to inform you that we have received a complaint (ID 44175755) from one of your customers with respect to their dealership with you.Please open the COMPLAINT REPORT below to obtain the details on this case and let us know of your position as soon as possible.We are looking forward to hearing from you.Sincerely,Carlos BaxterDispute CounselorBetter Business Bureau Council of Better Business Bureaus4200 Wilson Blvd, Suite 800Arlington, VA 22203-1838Phone: 1 (703) 276.0100Fax: 1 (703) 525.8277 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1054 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: betterbb_logo.jpg Type: image/gif Size: 4212 bytes Desc: not available URL: From miguelinaranee at jazzygecko.com Tue Mar 13 07:59:54 2012 From: miguelinaranee at jazzygecko.com (Evonne Mozella) Date: Tue, 13 Mar 2012 16:59:54 +0200 Subject: Replica Watches: Swiss Luxury Watch Replicas, Rolex, Omega, Breitling 3vtb Message-ID: <55h52i93e94-47175684-325o9k67@7fnoqm2fpcib> Perfect Quality Replica Watches - Browse our collections for the highest quality Replica watches. With authentic ETA movement, you can't go wrong. Choose the style and timeless elegance that define you. http://famouswatchesgamer.ru From jacob at appelbaum.net Tue Mar 13 17:06:04 2012 From: jacob at appelbaum.net (Jacob Appelbaum) Date: Tue, 13 Mar 2012 17:06:04 -0700 Subject: [liberationtech] New Satphone Safety Guide Message-ID: On 03/13/2012 03:43 PM, Brian Conley wrote: > Hi all, > > I'm pleased to announce that we have released our newest guide, focusing on > increasing satphone safety through best practices. > > You can find the guide here: > > http://smallworldnews.tv/Guide/Guide_SatPhone_English.pdf > > comments, questions, and critiques much appreciated! > > I will be writing a longer blog about the motivations and timeliness later > this week. Also you can see Frank Smyth's comments here at CPJ.org: > > http://cpj.org/blog/2012/03/from-small-world-timely-advice-on-safe-satphone-us.php > > > Hi Brian, Some thoughts in response to specific chunks of text from your pdf follow... "If you communicate with someone outside the satphonebs service provider network your communications are subject to any observation happening on the other user. Communicating with other satphones from the same service provider is much safer. Even this method is not entirely secure, but following these basic steps will limit your risks." This is a really weird statement. The first sentence is true. The second is pretty subjective, I'd even say incorrect but there is some wiggle room. The third is also a bit weird to the point of being incorrect. Limit what risk? Risk in relation to whom? If someone is sniffing the uplink for either phone, it's irrelevant to take such a step - it's probably even irrelevant if your threat model includes the sat phone provider as part of the adversary model. "The time needed to connect with the network is the first major security risk." Sure - why is that though? Isn't it because 0) the beam pattern for uplink 1) gps location being sent by the phone 2) the phone provider knowing 0 & 1 and 3) the downlink? So really is it the time that is the issue? Or what is done during that time? "2.3 USING A SATPHONE, A WALKTHROUGH" This walk through seems not entirely correct. For example 07 is not really the full picture, is it it? Isn't that when the phone sends the GPS data and not in step 10 as indicated? "3.1 PHONE CONFISCATION" I rather like this part of the guide. "In some cases the authorities may have the proper equipment to blisten inb on your transmissions, however this requires highly advanced and sophisticated technology" I think this is misleading. What country doesn't have the ability to do this? It requires a fun cube dongle pro or a GNU Radio, a commercial device or something else home brew - if a hacker at the CCC can do it, it's not "highly advanced and sophisticated technology" in my opinion. That isn't to say that it was easy, it's just that now that the work is done - the code, the hardware and the rest of the information is available for anyone who cares to try. That is not a high bar and it would be misleading to suggest it. "Your location may be logged at the service providerbs Ground Earth Station (GES)" Or anyone watching... "Thurayabs encryption has been broken, and more advanced governments may be able to break the encryption of other satphones. To learn more see Section 6.2.2" Which sat phone protocol isn't broken? I don't see a table for which protocols or devices you mean to support with this guide - so it's not clear why Thuraya is the security exception, rather than an example of the insecurity rule. "Voice calls are a very risky method for communicating via satellite." All times when a user is associated with the network the user is at risk. "It is best to keep your call under three minutes" Why three? "Email sent from your satphone does not provide the same protection as Email sent via computer or mobile data plans." While true, this implies that email is somehow secure, ever - which we all know to be totally bogus, right? "On some mobile phones and all computers Tor can be used to anonymize your computers traffic and hide your identity and location. If at all possible use a secure internet connection to communicate, not a satphone." Tor can't protect you from hardware that spies on you - if your sat phone sends your GPS location, an attacker will know the exact location of the user, even if they do not know what they are doing or saying. This seems obvious but it is important to note - the GPS location is at a different layer. "Inmarsatbs iSatphonePro" Why? Rheinmetall, trltech, and others intercept that by brand name. How is that better than Thuraya? They're all doomed in terms of content security and location privacy - why suggest those in that case? For example, it seems odd to me that you did not mention the Cryptophone[0] as an example of how to secure the content of the communications - that is probably the only tool on the market right now that has any such claim. Combined with a Motorola 9501 Iridium satellite pager[1], I think you could do something interesting that actually improved the security of communications or at least assist in solving the rendezvous problem. The Motorola 9501 is entirely passive and so it can receive with a very minimal view of the sky, it does not transmit your location from the device, etc. All the best, Jacob [0] http://www.cryptophone.de/en/products/satellite/ [1] http://www.outfittersatellite.com/iridium_9501.htm _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From funkelaine at jazzygecko.com Tue Mar 13 04:37:55 2012 From: funkelaine at jazzygecko.com (DONN P. PRITCHARD) Date: Tue, 13 Mar 2012 17:37:55 +0600 Subject: Best Replica Watches at $130 each 90marq1n Message-ID: <59k42m63p94-66699960-887e8s52@rmleqelhev> #s1,6@ Best Replica Watches at $130 each When you purchase Replica Watches, Fake Watch, you are automatically assured of the best in quality as well as our utmost commitment to service excellence. Fake Watches Free Shipping - Buy Now! http://finewatchvisit.ru #s1,6@ From pal at orange.net Tue Mar 13 05:12:00 2012 From: pal at orange.net (=?koi8-r?B?IvPUwc7J08zB1yDi0s/OxdfTy8nKIg==?=) Date: Tue, 13 Mar 2012 17:42:00 +0530 Subject: =?koi8-r?B?88vJxMvBIM7BINDPy9XQy9UgwsnMxdTP1yDXINTFwdTSLg==?= Message-ID: <01cd0140$97cde400$112c44b6@pal> БИЛЕТЫ НА ЭТУ ЛИРИЧЕСКУЮ КОМЕДИЮ ВЫ МОЖЕТЕ ПРИОБРЕСТИ С 20% СКИДКОЙ ПОДРОБНОСТИ ПО ТЕЛЕФОНУ (495) 641-89-75 ------------------------------------------------ Театр Киноактера 16 Марта, начало в 19.00 Заложники любви Лирическая комедия Автор пьесы: Наталья Демчик (входит в пятерку лучших современных драматургов-комедиографов). Вот и встретились два одиночества в Рождественский вечер. Он - командированный в Россию американец, Она - очаровательная русская вдовушка. А в Рождество, как известно, происходят всякие чудеса. В самый интересный момент, в момент предложения руки и сердца, к влюблённым неожиданно являются с "небес" их покойные супруги - "рубаха-парень" Гришаня, и феминистка Дебора... Начинается бурное выяснение отношений: тут и ревность, и шовинизм, и прошлые обиды...Водка подогревает споры, и каждая сторона высказывается сполна, не жалея эпитетов. К утру наступает умиротворение. "Пришельцам" пора возвращаться. А Екатерина и Скотт серьезно задумываются над тем, как же им на этом свете выстроить отношения друг с другом, чтобы прожить счастливо. Незамысловатый, в общем-то, сюжет, но как играют актеры! Действующие лица и исполнители: Нар.артистка России Наталия Егорова, Засл.артист России Андрей Харитонов, Засл.артистка России Светлана Тома, Нар.артист России Александр Панкратов-Черный. ------------------------------------------------- ДЛЯ ПОЛУЧЕНИЯ СКИДКИ ОБРАЩАЙТЕСЬ К НАМ ПО ТЕЛЕФОНУ Тел: (495) 641-89-75 ВАШ ПРОМО КОД 0088 From brianc at smallworldnews.tv Tue Mar 13 15:43:29 2012 From: brianc at smallworldnews.tv (Brian Conley) Date: Tue, 13 Mar 2012 17:43:29 -0500 Subject: [liberationtech] New Satphone Safety Guide Message-ID: Hi all, I'm pleased to announce that we have released our newest guide, focusing on increasing satphone safety through best practices. You can find the guide here: http://smallworldnews.tv/Guide/Guide_SatPhone_English.pdf comments, questions, and critiques much appreciated! I will be writing a longer blog about the motivations and timeliness later this week. Also you can see Frank Smyth's comments here at CPJ.org: http://cpj.org/blog/2012/03/from-small-world-timely-advice-on-safe-satphone-us.php -- Brian Conley Director, Small World News http://smallworldnews.tv m: 646.285.2046 Skype: brianjoelconley public key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xCEEF938A1DBDD587 _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From coderman at gmail.com Tue Mar 13 19:31:34 2012 From: coderman at gmail.com (coderman) Date: Tue, 13 Mar 2012 19:31:34 -0700 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: On Mon, Mar 12, 2012 at 11:57 AM, Mike Perry wrote: > ... > Your ideas intrigue me and I wish to subscribe to your newsletter. my last comment for this sad, confused tangent of a thread; it has been accosted via conjecture with too much frequency *grin* SCTP for congestion control of transparent proxy TCP/UDP traffic. local classification of traffic allocates by protocol / use fairness instead of aggregate tcp fairness. like bittorrent or aria2 parallel traffic treated as distinct low priority unit of traffic, deferring to higher priority low latency web traffic and messaging. multi-homing / multi-path endpoints in SCTP would maintain concurrent connection with distinct endpoints, avoiding predecessor, timing, denial of service attacks present in reliable, ordered, single stream transports. edges would be screwed as you mention, unless they were full fledged participants consistently. using a UDP based transport with LEDBAT or other technique to keep broadband upstream unsaturated and unclogged (no deep queues), allowing all broadband endpoints the ability to contribute to a large shared network. ORCHID IPv6 addressing with IPsec tunnels is intended to re-use existing work, including well tested auth+privacy with datagram padding in IPsec. SCTP+TLS would fit over top of IPv6 ORCHID endpoints (using IPsec SAs) to transport signalling/keying and encapsulated client traffic. part of this would also include lowest priority (lossy reliable) SRMP type delivery of useful, less immediate information to nodes. to some extent the ORCHID addresses could be thought of as hidden service names and also circuit endpoints for a given IPsec tunnel. this set of: a. critical signalling and keying traffic b. high priority, interactive web traffic and messaging c. lower priority bulk traffic, downloads, streaming media d. best effort, latent bulk caching and exchange are the classful shaping groups ordered inside of opaque SFQ outbound queues at various improved/concurrent stratified dependent link padding paths of IPsec telescopes carrying intermediate hop(signalling) and bearer traffic. combining better prioritization of traffic and consistent consumption of traffic (deferring low priority packets and using opportunistic caching strategies for network information respectively) obtains the best performance out of the SFQ DLP paths with the lowest latency for priority traffic. still, so many details left as exercise for the reader ;) > Do free reference implementations exist for all of these protocols? sort of, for only parts; if you want a portable user space implementation (or port) it's all custom. the joys of wild conjecture include absurd timelines and technical effort for free... rump is about as close as i've seen: http://www.netbsd.org/docs/rump/index.html this is not the least of "how to deploy a thing like this" concerns. there is also no backward compatibility or slow transition from an existing Tor network to something using UDP encapsulated IPsec telescopes (even if TCP can be transparently proxied over SCTP over this). _______________________________________________ tor-talk mailing list tor-talk at lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From pattichung at jbase.com Tue Mar 13 15:13:39 2012 From: pattichung at jbase.com (Traci) Date: Tue, 13 Mar 2012 20:13:39 -0200 Subject: Replica Watches: Swiss Luxury Watch Replicas, Rolex, Omega, Breitling ayx76cmw Message-ID: <96j25e92q79-36746021-129k3e84@jpwfthvj> Replica Watches: Swiss Luxury Watch Replicas, Rolex, Omega, Breitling Check out your one stop for replica watches on the web, featuring the best Rolex replica watches, replica Breitling, and fake Swiss watches. Click here to get one for yourself now! http://finewatchinnovation.ru From bbrewer at littledystopia.net Tue Mar 13 17:50:44 2012 From: bbrewer at littledystopia.net (bbrewer) Date: Tue, 13 Mar 2012 20:50:44 -0400 Subject: Fwd: [liberationtech] Have you all heard about this story? (homeless wifi!) In-Reply-To: <4F5FB637.1080001@perpetualsaab.com> References: <4F5FB637.1080001@perpetualsaab.com> Message-ID: <4F5FEB64.3080905@littledystopia.net> -------- Original Message -------- Subject: [liberationtech] Have you all heard about this story? Date: Tue, 13 Mar 2012 05:34:33 -0700 From: Yosem Companys To: Liberation Technologies Company to give out 4G hotspots to homeless people w/ t-shirts saying "I'm a 4G hotspot" http://is.gd/t1S0rE via @JonMwords _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech From tuntec2 at uwgp.com Wed Mar 14 02:13:57 2012 From: tuntec2 at uwgp.com (=?koi8-r?B?IlNlbnNvcnVzIC0gwsXTy8/O1MHL1M7ZxSDUxcjOz8zPx8nJIg==?=) Date: Tue, 13 Mar 2012 21:13:57 -1200 Subject: =?koi8-r?B?88XO08/Szs/FINfFxNLP?= Message-ID: <80D389E0D7A84CF98C74C82A9025CA98@marioab24f2ef2> Мусорные ведра с бесконтактной технологией «no touch» (не надо прикасаться) от 1,5 до 85 литров ИЩЕМ ДИЛЕРОВ в России, Белоруссии и Казахстане, в Украине и др. странах СНГ, в Прибалтике +7-911-959-89-48 www.бесконтактные-технологии.рф • Гигиеничность – открывается само (датчик реагирует), не нужно прикасаться к крышке. • Долговечность (гарантия от производителя). • Удобство и компактность (любой дизайн, литраж от 1,5 до 95л) • Бесшумность: работает от батареек, аккумуляторов и 220В • Покрытие - хром, красный, синий, черный, белый цвета • Имеется форма банки от кока-колы и пива (1,5л, 2,0л, 2,5л) Удобно, экономично и практично! С 2009 года используют в России • отели, рестораны, бары • бизнес-центры и офисы • спортивные комплексы • медицинские учреждения • квартиры • коттеджи • загородные дома Лучший подарок сотрудникам, шефу и любимой теще. +7-911-959-89-48 From pamellajusta at tasmail.com.jfet.org Tue Mar 13 17:14:59 2012 From: pamellajusta at tasmail.com.jfet.org (RositaGeri) Date: Tue, 13 Mar 2012 22:14:59 -0200 Subject: Buy VIAGRA (Sildenafil) 100mg or 50mg From Our Online Pharmacy - No Prescription Required n6n09met Message-ID: <61x44i76x37-78193121-316m4c57@nxqqockkhq> VIAGRA 100mg x 150 Pills Only $172 - Express Shipping To U.S - VISA ONLY. Buy VIAGRA (Sildenafil) 100mg or 50mg From Our Online Pharmacy - No Prescription Required - Express Shipping To U.S - Secured Checkout - VISA ONLY. Save With The Lowest Price And Get Overnight Delivery. http://medicinetoremedsrx.ru From eugen at leitl.org Tue Mar 13 14:53:09 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 13 Mar 2012 22:53:09 +0100 Subject: [tahoe-dev] monitoring/visualization (was: What about this?) Message-ID: <20120313215309.GA9891@leitl.org> ----- Forwarded message from Zooko Wilcox-O'Hearn ----- From tswanae544 at sinhalaya.com Wed Mar 14 02:37:33 2012 From: tswanae544 at sinhalaya.com (=?koi8-r?B?IlNlbnNvcnVzIC0gwsXTy8/O1MHL1M7ZxSDUxcjOz8zPx8nJIg==?=) Date: Wed, 14 Mar 2012 01:37:33 -0800 Subject: =?koi8-r?B?88XO08/Szs/FINfFxNLP?= Message-ID: <2172992639E04BF29E2FCD045E334B49@intel> Мусорные ведра с бесконтактной технологией «no touch» (не надо прикасаться) от 1,5 до 85 литров ИЩЕМ ДИЛЕРОВ в России, Белоруссии и Казахстане, в Украине и др. странах СНГ, в Прибалтике +7-911-959-89-48 www.бесконтактные-технологии.рф • Гигиеничность – открывается само (датчик реагирует), не нужно прикасаться к крышке. • Долговечность (гарантия от производителя). • Удобство и компактность (любой дизайн, литраж от 1,5 до 95л) • Бесшумность: работает от батареек, аккумуляторов и 220В • Покрытие - хром, красный, синий, черный, белый цвета • Имеется форма банки от кока-колы и пива (1,5л, 2,0л, 2,5л) Удобно, экономично и практично! С 2009 года используют в России • отели, рестораны, бары • бизнес-центры и офисы • спортивные комплексы • медицинские учреждения • квартиры • коттеджи • загородные дома Лучший подарок сотрудникам, шефу и любимой теще. +7-911-959-89-48 From teaspoonsexpz at rmahc.com Wed Mar 14 05:43:27 2012 From: teaspoonsexpz at rmahc.com (=?koi8-r?B?88XNyc7B0iDQ0s8gz8bG28/S2Q==?=) Date: Wed, 14 Mar 2012 04:43:27 -0800 Subject: =?koi8-r?B?7sEgz8bG28/S2SDX18XMySAzMCUgzsHMz8fJPw==?= Message-ID: <313DD50950A44F9A81344B472D61BB92@name> 27 марта 2012 г. Оффшорный бизнес: о чем молчат другие? +7 (495)- 7429I.98 \\\/// 8 (Ч95) 792.2I/2.2 Цель: Отличительной особенностью данного курса является практическая направленность и отсутствие лишних теоретических и исторических отступлений. курс строится в форме интерактивного практического занятия при постоянном взаимодействии с аудиторией с разбором большого количества примеров и подробным описанием налоговых, финансовых и правовых последствий или рисков. Для участия в курсе мы приглашаем как специалистов с многолетним опытом работы в сфере международного налогового планирования, стремящихся расширить область своих знаний, так и слушателей, еще не сталкивавшихся с иностранными юрисдикциями. Насыщенность материала конкретными примерами, взятыми из жизни, решение нестандартных и частных задач в ходе занятия, а также доступность объяснений относятся к неоспоримым достоинствам данного курса. Важно отметить, что ведущий курса имеет не только многолетний опыт разработки и курирования крупных консалтинговых проектов, но также многократного участия в их реализации "под ключ" с последующим сопровождением. Это позволяет наполнить курс уникальным материалом, посвященным не только схемам оптимизации налогов, но и многочисленными практическими комментариями и описанием проблем, с которыми сталкивается бизнес, даже при выборе "правильных и выверенных" схем. По ходу и после окончания курса будет предусмотрено время для индивидуальных вопросов как по заявленным темам, так и по вопросам, которые не предусматривала программа курса. Оффшоры, Кипр и другие иностранные юрисдикции не являются налоговой панацеей, и в некоторых случаях их использование принесет лишь новые финансовые издержки и бессмысленные риски конфликтов с налоговыми органами. К счастью, таких случаев пока меньшинство. Программа: БЛОК 1. ОФФШОРЫ, НИЗКОНАЛОГОВЫЕ И ПРЕСТИЖНЫЕ ЕВРОПЕЙСКИЕ ЮРИСДИКЦИИ: КРИТЕРИИ ВЫБОРА. * Сравнение популярных оффшорных юрисдикций (Британские Виргинские острова, Белиз, Сейшелы, Панама и т.д.) – от каких стоит отказаться и почему? * Гонконг как инструмент работы с азиатским рынком * Зачем использовать низконалоговые юрисдикции, если есть полностью безналоговые? * Использование престижных юрисдикций: Швейцария, Люксембург, Нидерланды и т.д. – когда это обоснованно? * "Черные списки" ФАТФ, ОЭСР, Минфина, ЦБ РФ – кому о них можно забыть? БЛОК 2. ПРАКТИКА ИСПОЛЬЗОВАНИЯ КИПРСКИХ КОМПАНИЙ * Особенности работы с кипрским администратором: как не дать себя обмануть? ** налог на прибыль (Corporate Income Tax), сбор на оборону (Defence Contribution Tax), НДС и применение “reverse charge” * Изменения кипрского законодательства 2012 и тенденции 2013. * Ратификация Протокола к Соглашению между РФ и Кипром: кто понесет убытки, а кому удастся на этом заработать? * Почему Кипр редко используют при экспорте/импорте товаров? * Кипр как инструмент работы с ценными бумагами БЛОК 3.СХЕМЫ, ПРИМЕНЯЕМЫЕ В МЕЖДУНАРОДНОМ НАЛОГОВОМ ПЛАНИРОВАНИИ * Внешнеторговые операции (экспорт/импорт): ** схемы с использованием оффшоров и Гонконга; ** схемы с использование английских LTD и партнерств LLP; ** эстонские, чешские, датские, нидерландские компании в торговых схемах. * Холдинговые структуры ** выплаты дивидендов и построение холдинговых структур; ** займы как оптимальный путь финансирования; ** (суб)лицензионные договоры и выплаты роялти за использование прав интеллектуальной собственности; ** анализ сложностей и рисков, расчет предельных величин отчислений по займам и роялти. * Владение и сдача в аренду недвижимости с использованием нерезидентов БЛОК 4. КОНФИДЕНЦИАЛЬНОСТЬ И НОМИНАЛЬНОЕ ВЛАДЕНИЕ * Номинальный сервис: ** инструменты контроля номинальных директоров и номинальных акционеров; ** лица, которым будут известны имена бенефициаров; * Какие данные о компании хранятся в публичных реестрах Кипра и оффшоров, и кто имеет к ним доступ? * Обмен информацией – в каких случаях государственные органы РФ могут получить информацию о владельцах? * Изменения в Гражданском Кодексе: бенефициар должен раскрыть себя сам. * Трасты и семейные фонды – когда их использование оправдано? * "Подводные камни" при использовании номинального сервиса и трастов/фондов. БЛОК 5. ОТКРЫТИЕ СЧЕТОВ НА ИНОСТРАННЫЕ КОМПАНИИ * Надежность, оперативность работы, лояльность – какой банк выбрать? * Какие банки не делятся информацией с российскими спецслужбами? * Раскрытие банковской тайны – факты и выводы * Пути снятия средств со счета иностранного банка в России * Росфинмониторинг: когда можно не опасаться? БЛОК 6. ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ, СИТУАЦИИ ИЗ ПРАКТИКИ, ОБЗОР СУДОВ И ПИСЕМ МИНФИНА. * Насколько международная структура владения защищает от рейдерских захватов? * Как часто нужно предоставлять сертификат налогового резидентства и нужно ли проходить аудит для его выпуска? * Ведет ли использование доверенностей с широким кругом полномочий к возникновению постоянного представительства? Официальная позиция. * Дает ли регистрация компании в ЕС возможность на привлечение кредитов и получение гражданства? * Если компания не нужна: нужно ликвидировать или можно "бросить"? * и т.д. Стоимость участия: 9 000 рублей За более подробной информацuей обpащайтеcь по тел: +7 (Ч95) 792*21\2.2 ; (495) 792-21_2\2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9545 bytes Desc: not available URL: From eugen at leitl.org Wed Mar 14 00:27:59 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 14 Mar 2012 08:27:59 +0100 Subject: [liberationtech] New Satphone Safety Guide Message-ID: <20120314072759.GC9891@leitl.org> ----- Forwarded message from Brian Conley ----- From eugen at leitl.org Wed Mar 14 00:40:59 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 14 Mar 2012 08:40:59 +0100 Subject: [liberationtech] New Satphone Safety Guide Message-ID: <20120314074059.GI9891@leitl.org> ----- Forwarded message from Jacob Appelbaum ----- From popov55 at atlanticbb.net Wed Mar 14 01:14:21 2012 From: popov55 at atlanticbb.net (=?koi8-r?B?IuLP0snTIg==?=) Date: Wed, 14 Mar 2012 09:14:21 +0100 Subject: =?koi8-r?B?8NLJx8zB28HFzSDXINTFwdTS?= Message-ID: <01cd01c2$d73d1480$3247cf57@popov55> Театр Киноактера 16 Марта, начало в 19.00 Заложники любви Тел: (495) 641 89..75 Лирическая комедия Автор пьесы: Наталья Демчик (входит в пятерку лучших современных драматургов-комедиографов). Вот и встретились два одиночества в Рождественский вечер. Он - командированный в Россию американец, Она - очаровательная русская вдовушка. А в Рождество, как известно, происходят всякие чудеса. В самый интересный момент, в момент предложения руки и сердца, к влюблённым неожиданно являются с "небес" их покойные супруги - "рубаха-парень" Гришаня, и феминистка Дебора... Начинается бурное выяснение отношений: тут и ревность, и шовинизм, и прошлые обиды...Водка подогревает споры, и каждая сторона высказывается сполна, не жалея эпитетов. К утру наступает умиротворение. "Пришельцам" пора возвращаться. А Екатерина и Скотт серьезно задумываются над тем, как же им на этом свете выстроить отношения друг с другом, чтобы прожить счастливо. Незамысловатый, в общем-то, сюжет, но как играют актеры! Действующие лица и исполнители: Нар.артистка России Наталия Егорова, Засл.артист России Андрей Харитонов, Засл.артистка России Светлана Тома, Нар.артист России Александр Панкратов-Черный. Тел: (495) 641_89..75 From normandp0 at rotex.com Wed Mar 14 02:26:01 2012 From: normandp0 at rotex.com (=?koi8-r?B?78bG28/S2Q==?=) Date: Wed, 14 Mar 2012 10:26:01 +0100 Subject: =?koi8-r?B?68HLycUgz9DF0sHDyckg0sHaxNLB1sHA1CDJzs/T1NLBzs7ZxSDCwc7L?= =?koi8-r?B?yT8g?= Message-ID: <3FE05A3EFB6F4257BB519EC8600CAECA@dome5m5wumvk04> 27 марта 2012 г. Оффшорный бизнес: о чем молчат другие? 8 (499) ЧЧ5\З9\68 : 8 (495) 792.2I\22 Цель: Отличительной особенностью данного курса является практическая направленность и отсутствие лишних теоретических и исторических отступлений. курс строится в форме интерактивного практического занятия при постоянном взаимодействии с аудиторией с разбором большого количества примеров и подробным описанием налоговых, финансовых и правовых последствий или рисков. Для участия в курсе мы приглашаем как специалистов с многолетним опытом работы в сфере международного налогового планирования, стремящихся расширить область своих знаний, так и слушателей, еще не сталкивавшихся с иностранными юрисдикциями. Насыщенность материала конкретными примерами, взятыми из жизни, решение нестандартных и частных задач в ходе занятия, а также доступность объяснений относятся к неоспоримым достоинствам данного курса. Важно отметить, что ведущий курса имеет не только многолетний опыт разработки и курирования крупных консалтинговых проектов, но также многократного участия в их реализации "под ключ" с последующим сопровождением. Это позволяет наполнить курс уникальным материалом, посвященным не только схемам оптимизации налогов, но и многочисленными практическими комментариями и описанием проблем, с которыми сталкивается бизнес, даже при выборе "правильных и выверенных" схем. По ходу и после окончания курса будет предусмотрено время для индивидуальных вопросов как по заявленным темам, так и по вопросам, которые не предусматривала программа курса. Оффшоры, Кипр и другие иностранные юрисдикции не являются налоговой панацеей, и в некоторых случаях их использование принесет лишь новые финансовые издержки и бессмысленные риски конфликтов с налоговыми органами. К счастью, таких случаев пока меньшинство. Программа: БЛОК 1. ОФФШОРЫ, НИЗКОНАЛОГОВЫЕ И ПРЕСТИЖНЫЕ ЕВРОПЕЙСКИЕ ЮРИСДИКЦИИ: КРИТЕРИИ ВЫБОРА. * Сравнение популярных оффшорных юрисдикций (Британские Виргинские острова, Белиз, Сейшелы, Панама и т.д.) – от каких стоит отказаться и почему? * Гонконг как инструмент работы с азиатским рынком * Зачем использовать низконалоговые юрисдикции, если есть полностью безналоговые? * Использование престижных юрисдикций: Швейцария, Люксембург, Нидерланды и т.д. – когда это обоснованно? * "Черные списки" ФАТФ, ОЭСР, Минфина, ЦБ РФ – кому о них можно забыть? БЛОК 2. ПРАКТИКА ИСПОЛЬЗОВАНИЯ КИПРСКИХ КОМПАНИЙ * Особенности работы с кипрским администратором: как не дать себя обмануть? ** налог на прибыль (Corporate Income Tax), сбор на оборону (Defence Contribution Tax), НДС и применение “reverse charge” * Изменения кипрского законодательства 2012 и тенденции 2013. * Ратификация Протокола к Соглашению между РФ и Кипром: кто понесет убытки, а кому удастся на этом заработать? * Почему Кипр редко используют при экспорте/импорте товаров? * Кипр как инструмент работы с ценными бумагами БЛОК 3.СХЕМЫ, ПРИМЕНЯЕМЫЕ В МЕЖДУНАРОДНОМ НАЛОГОВОМ ПЛАНИРОВАНИИ * Внешнеторговые операции (экспорт/импорт): ** схемы с использованием оффшоров и Гонконга; ** схемы с использование английских LTD и партнерств LLP; ** эстонские, чешские, датские, нидерландские компании в торговых схемах. * Холдинговые структуры ** выплаты дивидендов и построение холдинговых структур; ** займы как оптимальный путь финансирования; ** (суб)лицензионные договоры и выплаты роялти за использование прав интеллектуальной собственности; ** анализ сложностей и рисков, расчет предельных величин отчислений по займам и роялти. * Владение и сдача в аренду недвижимости с использованием нерезидентов БЛОК 4. КОНФИДЕНЦИАЛЬНОСТЬ И НОМИНАЛЬНОЕ ВЛАДЕНИЕ * Номинальный сервис: ** инструменты контроля номинальных директоров и номинальных акционеров; ** лица, которым будут известны имена бенефициаров; * Какие данные о компании хранятся в публичных реестрах Кипра и оффшоров, и кто имеет к ним доступ? * Обмен информацией – в каких случаях государственные органы РФ могут получить информацию о владельцах? * Изменения в Гражданском Кодексе: бенефициар должен раскрыть себя сам. * Трасты и семейные фонды – когда их использование оправдано? * "Подводные камни" при использовании номинального сервиса и трастов/фондов. БЛОК 5. ОТКРЫТИЕ СЧЕТОВ НА ИНОСТРАННЫЕ КОМПАНИИ * Надежность, оперативность работы, лояльность – какой банк выбрать? * Какие банки не делятся информацией с российскими спецслужбами? * Раскрытие банковской тайны – факты и выводы * Пути снятия средств со счета иностранного банка в России * Росфинмониторинг: когда можно не опасаться? БЛОК 6. ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ, СИТУАЦИИ ИЗ ПРАКТИКИ, ОБЗОР СУДОВ И ПИСЕМ МИНФИНА. * Насколько международная структура владения защищает от рейдерских захватов? * Как часто нужно предоставлять сертификат налогового резидентства и нужно ли проходить аудит для его выпуска? * Ведет ли использование доверенностей с широким кругом полномочий к возникновению постоянного представительства? Официальная позиция. * Дает ли регистрация компании в ЕС возможность на привлечение кредитов и получение гражданства? * Если компания не нужна: нужно ликвидировать или можно "бросить"? * и т.д. Стоимость участия: 9 000 рублей За более подробной информацuей обpащайтеcь по тел: +7 499 4Ч5_4О-95 : код (499) 4Ч539-68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9534 bytes Desc: not available URL: From myersa at cklighting.com Wed Mar 14 07:51:33 2012 From: myersa at cklighting.com (=?koi8-r?B?Iu3B0snOwSDr1dvOwdLFzsvPIg==?=) Date: Wed, 14 Mar 2012 11:51:33 -0300 Subject: =?koi8-r?B?8NLJx8zB28HFzSDXINTFwdTS?= Message-ID: <01cd01d8$cd261080$560d03be@myersa> Театр Киноактера 16 Марта, начало в 19.00 Заложники любви Тел: (495) 641.89-75 Лирическая комедия Автор пьесы: Наталья Демчик (входит в пятерку лучших современных драматургов-комедиографов). Вот и встретились два одиночества в Рождественский вечер. Он - командированный в Россию американец, Она - очаровательная русская вдовушка. А в Рождество, как известно, происходят всякие чудеса. В самый интересный момент, в момент предложения руки и сердца, к влюблённым неожиданно являются с "небес" их покойные супруги - "рубаха-парень" Гришаня, и феминистка Дебора... Начинается бурное выяснение отношений: тут и ревность, и шовинизм, и прошлые обиды...Водка подогревает споры, и каждая сторона высказывается сполна, не жалея эпитетов. К утру наступает умиротворение. "Пришельцам" пора возвращаться. А Екатерина и Скотт серьезно задумываются над тем, как же им на этом свете выстроить отношения друг с другом, чтобы прожить счастливо. Незамысловатый, в общем-то, сюжет, но как играют актеры! Действующие лица и исполнители: Нар.артистка России Наталия Егорова, Засл.артист России Андрей Харитонов, Засл.артистка России Светлана Тома, Нар.артист России Александр Панкратов-Черный. Тел: (495) 641 89_75 From alphabetingo9 at copvcia.com Wed Mar 14 04:03:34 2012 From: alphabetingo9 at copvcia.com (=?koi8-r?B?IvLB09PZzMvJINDPIMUtzcXJzCI=?=) Date: Wed, 14 Mar 2012 12:03:34 +0100 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAg0tXCzMXKIA==?= Message-ID: <272632674.41170338226854@copvcia.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1505 bytes Desc: not available URL: From eugen at leitl.org Wed Mar 14 04:21:23 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 14 Mar 2012 12:21:23 +0100 Subject: [tor-talk] Tor and HTTPS graphic Message-ID: <20120314112123.GX9891@leitl.org> ----- Forwarded message from coderman ----- From epiphanyslq3 at acclaimtechnical.com Wed Mar 14 02:25:06 2012 From: epiphanyslq3 at acclaimtechnical.com (=?koi8-r?B?IvLB09PZzMvJINDPIMUtzcXJzCI=?=) Date: Wed, 14 Mar 2012 12:25:06 +0300 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAg0tXCzMXKIA==?= Message-ID: <797976777.28316765272695@acclaimtechnical.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1505 bytes Desc: not available URL: From warner at lothar.com Wed Mar 14 13:06:37 2012 From: warner at lothar.com (Brian Warner) Date: Wed, 14 Mar 2012 13:06:37 -0700 Subject: [tahoe-dev] #466 (signed-introducer-announcements) landed! Message-ID: Thanks to Zooko's hard work in getting pycryptopp-0.6.0.(mumble) released yesterday, I was finally able to land the #466 signed-introducer code last night. What does this mean for users? * tahoe now depends upon the new pycryptopp: next time you update, you'll need to do 'setup.py build' so it will pick up 0.6.0 * the first time your node wakes up with the new code, it will create a NODEDIR/private/server.privkey file, containing the new Ed25519 private signing key. This is a binary file, not meant for copy/paste or human interaction. * server IDs are changing. The old (foolscap-based) IDs look like "rkybwv7hpuwpnyqhwjz43v727orr7fqd". Once everything is upgraded, the Welcome page will show new server IDs that look like "v0-fcmgu663rdyshncihts4e45rtwjwvc7ebcrtlaiv345yyps667pq". (the old ones are a SHA1 hash of the tub's public SSL certificate, the new ones are an Ed25519 public verifying key) Internally, this opens up the door for a bunch of stuff: * Introducer announcements are now extensible dictionaries, instead of fixed-size tuples. This allows servers to cleanly advertise new services, and include additional metadata like how much space they have available. This will be used by the upcoming Accounting work to advertise an alternate storage-server object from which per-account connections can be obtained. #666 * Announcements are signed, which means the Introducer doesn't get to modify the metadata, reducing its authority a little bit. This gets us one step closer to having a distributed introduction mechanism (the signed announcements can simply be flooded, without worrying about what the other nodes might do to them in transit). #68 * Server nodes are known by their Ed25519 public verifying key, rather than by their Foolscap SSL TubID. This enables secure non-SSL messaging (sign a request instead of sending unsigned requests over a validated-SSL connection), so we can switch from Foolscap to e.g. HTTP for share transport, which should make the Tahoe protocol easier to port to other languages (Foolscap offers more features than we really need, and its need to check the SSL certificate is an implementation hassle). #510 * Clients can securely reference a server by its pubkey, which will be the basis for explicit "which servers am I willing to use" configuration. #467, #295 What about compatibility? All combinations of V1/V2 client/introducer should work as expected: * new (V2) clients can talk to old (V1) Introducers just fine: they'll detect the lack of V2 methods and talk down to the introducer (sending it unsigned V1-format tuples instead of signed V2-format dictionaries). * old V1 clients can talk to new V2 introducers: they send announcements to the old method name, the Introducer will upgrade the tuples to dictionaries (unsigned, of course) for distribution to V2 clients, and distributes the original tuple to V1 clients * new V2 Introducers can talk to old V1 clients just fine: the client will subscribe with the old V1 method, causing the Introducer to downgrade new-style announcements for the V1 client * V1 clients always get tuples, V2 clients always get dictionaries. *Signed* announcements will only happen when all three participants (announcing client, Introducer, subscribing client) are V2. What about serverid compatibility? * over the last few months we've refactored the way clients use storage servers, to split their notion of "serverid" (aka "peerid") into several pieces. V2 announcements provide specific values for these different pieces, so that some can remain the same as before, while others are new. (this process is about 80% complete) * "serverid" will be used to mean the Ed25519 pubkey (but some code still uses it to mean the tubid.. this will eventually be fixed). This is the servers's long-term secure identifier, suitable for #467-style server designation. Old V1 nodes won't have serverids, so it won't be possible to securely reference a V1 node, so using #467 will depend upon upgraded servers and an upgraded Introducer. * "name" is used to describe servers on the Welcome page, and is either the pubkey (if available) or the tubid. It is not secure, in the sense that it could be spoofed, and so shouldn't be used for #467-style server designation. * "permutation seed" is used by the server-selection algorithm. It is provided by the server (which can use anything it likes). Brand new V2 servers use the ed25519 serverid. Old V1 servers use the foolscap tubid (i.e. when V1 tuples are upgraded by the Introducer to V2 dicts, it adds a "permutation-seed-base32" key derived from the tubid). V2 servers which wake up with existing shares will use their tubid forevermore, since that probably means other clients have known them by the tubid, so they'll be expecting share placement based upon the old tubid. This allows backwards compatibility for old shares while allowing brand new empty servers to live in the future, not the past. * "lease seed" is always the tubid, and continues to be used to generate the per-share per-server lease-renew/cancel secrets. To safely use a shared secret, you have to send that secret over a very specific channel, which means they're tied to a transport protocol and a verifiable endpoint. So they won't be usable in a post-Foolscap world anyways. The plan (as part of #666) is to replace shared-secrets with per-lease Ed25519 keypairs. * "foolscap write enabler seed" is also the tubid, for exactly the same reasons. We'll need to replace both lease-management and mutable-file write-management before we can move from Foolscap to unencrypted HTTP. Open questions: * serverids currently include a short version marker: the "v0-" in "v0-fcmgu663rdyshncihts4e45rtwjwvc7ebcrtlaiv345yyps667pq". Does that get in the way of cut-and-paste? Would it be better to use something like "v0fcmgu663rdyshncihts4e45rtwjwvc7ebcrtlaiv345yyps667pq"? When we abbreviate these in places like the FileChecker results page (to identify specific servers), is there a way to get the v0- out of the abbreviated form? (maybe use a "-v0"/"v0" suffix? maybe define the abbreviated form to skip the prefix, so this example appears as just "fcmgu"?) * are there places where I've missed the tubid-to-serverid transition? I spotted one just now, the "My nodeid" field on the welcome page. * Next steps: push forward on the Accounting work, specifically looking for ways to display (to clients) which servers you're using, and then maybe to exert some control over that list. There are some UI questions to figure out: I can imagine managing this config with both tahoe.cfg (have a config key with a list of serverids) and via a web page (a with enable/disable checkboxes), but the latter requires some web-security frameworking that we don't have in place yet (and might not want to rely upon anyways). Let me know if you have an questions.. I imagine some of this is as clear as mud. cheers, -Brian _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From nnnijcyw.5.stripes at arcr.com Wed Mar 14 00:39:19 2012 From: nnnijcyw.5.stripes at arcr.com (=?koi8-r?B?IuTFzsnTIODS2MXXyd4i?=) Date: Wed, 14 Mar 2012 13:09:19 +0530 Subject: =?koi8-r?B?8NLJx8zB28HFzSDXINTFwdTS?= Message-ID: <01cd01e3$aa4d2980$6e508f72@nnnijcyw.5.stripes> Театр Киноактера 16 Марта, начало в 19.00 Заложники любви Тел: (495) 641-89-75 Лирическая комедия Автор пьесы: Наталья Демчик (входит в пятерку лучших современных драматургов-комедиографов). Вот и встретились два одиночества в Рождественский вечер. Он - командированный в Россию американец, Она - очаровательная русская вдовушка. А в Рождество, как известно, происходят всякие чудеса. В самый интересный момент, в момент предложения руки и сердца, к влюблённым неожиданно являются с "небес" их покойные супруги - "рубаха-парень" Гришаня, и феминистка Дебора... Начинается бурное выяснение отношений: тут и ревность, и шовинизм, и прошлые обиды...Водка подогревает споры, и каждая сторона высказывается сполна, не жалея эпитетов. К утру наступает умиротворение. "Пришельцам" пора возвращаться. А Екатерина и Скотт серьезно задумываются над тем, как же им на этом свете выстроить отношения друг с другом, чтобы прожить счастливо. Незамысловатый, в общем-то, сюжет, но как играют актеры! Действующие лица и исполнители: Нар.артистка России Наталия Егорова, Засл.артист России Андрей Харитонов, Засл.артистка России Светлана Тома, Нар.артист России Александр Панкратов-Черный. Тел: (495) 641-89-75 From pamelangoc at eaglegl.com Wed Mar 14 08:15:12 2012 From: pamelangoc at eaglegl.com (Ariane Lindsay) Date: Wed, 14 Mar 2012 13:15:12 -0200 Subject: Get bigger, harder, longer-lasting erections with Vi-Max 3ky4r Message-ID: <19p60m46d15-31656420-068b1z85@vzizpeq> Get bigger, harder, longer-lasting erections with Vi-Max The best-selling penis enlargement & enhancement pill ever It's newer, faster, and more powerful formula better than the old succeed formula http://peniswebguide.ru From warner at lothar.com Wed Mar 14 13:25:36 2012 From: warner at lothar.com (Brian Warner) Date: Wed, 14 Mar 2012 13:25:36 -0700 Subject: [tahoe-dev] keeping private grids private Message-ID: On 3/9/12 7:39 PM, Vladimir Arseniev wrote: > Let's say that we have a private grid, with both local and hosted > servers. But our introducer.furl falls into the wrong hands, and > uninvited nodes start appearing. Maybe they're just leeching storage. > Maybe they're disrupting the grid through flapping, running deep-check > all the time, or whatever. Maybe they're actively attacking the grid. > > How do we exclude them? Can introducers be configured to accept only > known nodes? Could we create a new introducer, and circulate its furl > to authorized nodes? Or would that just create a new grid? Like Markus said, we're getting closer, but we aren't quite there yet. The most important fix is to make the introducer.furl actually secret (currently it's guessable by anyone who knows the tubid): ticket #860 is related (but I can't find the actual ticket). Once fixed, then keeping the introducer.furl from falling into those wrong hands will work. It gives you a sort of secret-frat-party security system: anyone who's in the club can invite anyone they like, and there's no way to kick someone out (knowledge of the introducer.furl is irrevocable). We don't want to add new security measures to the Introducer itself (like giving it a list of "good" clients so it can ignore the rest), because we want to get rid of the Introducer entirely. We want to replace it with a distributed gossip-based system (#68), and you can't rely on a bunch of gossiping nodes to enforce access-control policies. So we're looking in different directions to provide the sort of control you're looking for. The next step is the explicit-server-selection work: #467. When that's done, each client will be able to indicate which servers they want to use, ignoring rogue servers. That will fix the availability problems (servers connecting, accepting shares, then disappearing). The configuration of this is still a matter of debate: one approach is to list the pubkey of the servers you want to use, but that can be labor-intensive for larger grids, and makes it hard to share files if the uploader uses a different list than the downloader. Another approach is to delegate membership to a "grid manager" of some sort: more moving pieces but probably easier to use. The step after that is part of Accounting (#666), in which servers reject operations by unauthorized clients. This would include both storage (leeching) and network bandwidth (downloading shares, running deep-check, etc, but not basic DoS). But for now, yeah, IP-address filtering is a good quick answer. cheers, -Brian _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From qamnmy at yahoo.co.jp Tue Mar 13 22:09:42 2012 From: qamnmy at yahoo.co.jp (} tq) Date: Wed, 14 Mar 2012 14:09:42 +0900 Subject: No subject Message-ID: <201203120513.q2C5DVfY021011@proton.jfet.org> ※冷かしでの参加は絶対にお止め下さい!! お金持ちな人妻から"お小遣い"が貰える!! "嘘"無しの報酬先払い!!女性を満足させよう。 嘘のような本当の話。逆援助を望んでいる方は実在します。 当サイトは本物を"報酬先払い"という形で証明します。 信じる人だけご入場下さい。男性はもちろん無料です。 何をすればお金を貰えるのか?  ↓↓ http://sefrelove.info/t02/ 【 報酬例 Aさんの場合】  一晩で平均報酬3万円  3万円×15日=45万円/月   ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ★こちらが実際の体験談  ↓↓ http://sefrelove.info/t02/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From dustmanvkh9 at orenda.com Wed Mar 14 03:19:47 2012 From: dustmanvkh9 at orenda.com (DOOR - DOOR) Date: Wed, 14 Mar 2012 15:49:47 +0530 Subject: =?koi8-r?B?8M/MztnKINPQxcvU0iDV08zVxyDQzyDNxdbE1c7B0s/EztnNINDF0sXX?= =?koi8-r?B?z9rLwc0gySDUwc3P1sXOzs/N1SDPxs/SzczFzsnALg==?= Message-ID: <9B7E901FA2B442B0A1DC7761AC61777D@com4> Полный спектр услуг по международным перевозкам и таможенному оформлению. Осуществляем доставку импортных грузов ("DOOR - DOOR") Примеры: - Одежда из Европы - от 9 евро за кг. - Одежда из Китая - от 6 евро за кг. - Мебель из Европы - от 370 евро за м. куб. - Посуда из Европы - от 2 евро за кг. - Светильники из Турции - от 2 евро за кг. Для просчета Вашего груза сообщите нам: 1. Наименование 2. Количество 3. Вес 4. Объём 5. Отправитель 6. Страна происхождения 7. Адрес место забора груза 8. Инвойсовая стоимость груза • Предварительная подготовка сопроводительных документов. • Организация таможенного оформления на таможенных терминалах Москвы. • Способствуем в осуществлении денежных переводов изготовителю (продавцу) всего за 2% от стоимости по инвойсу. • Содействие в получении сертификатов. • Вы можете сравнить цены, по которым сейчас идут Ваши грузы. Для просчёта в реальном времени обращайтесь по скайпу: tamozhimvse или по телефону (495) 565 34 52 (многоканальный) Позвоните и наши менеджеры в кратчайшие сроки рассчитают для Вас стоимость доставки груза и его таможенного оформления. From pearson at sogeasoft.com Wed Mar 14 03:58:10 2012 From: pearson at sogeasoft.com (=?koi8-r?B?IubFxM/SIPPB1NTP0s/Xyd4i?=) Date: Wed, 14 Mar 2012 16:28:10 +0530 Subject: =?koi8-r?B?88vJxMvBIM7BINDPy9XQy9UgwsnMxdTP1yDXINTFwdTSLg==?= Message-ID: <01cd01ff$71bb4900$9a03f579@pearson> БИЛЕТЫ НА ЭТУ ЛИРИЧЕСКУЮ КОМЕДИЮ ВЫ МОЖЕТЕ ПРИОБРЕСТИ С 20% СКИДКОЙ ПОДРОБНОСТИ ПО ТЕЛЕФОНУ (495) 641-89-75 ------------------------------------------------ Театр Киноактера 16 Марта, начало в 19.00 Заложники любви Лирическая комедия Автор пьесы: Наталья Демчик (входит в пятерку лучших современных драматургов-комедиографов). Вот и встретились два одиночества в Рождественский вечер. Он - командированный в Россию американец, Она - очаровательная русская вдовушка. А в Рождество, как известно, происходят всякие чудеса. В самый интересный момент, в момент предложения руки и сердца, к влюблённым неожиданно являются с "небес" их покойные супруги - "рубаха-парень" Гришаня, и феминистка Дебора... Начинается бурное выяснение отношений: тут и ревность, и шовинизм, и прошлые обиды...Водка подогревает споры, и каждая сторона высказывается сполна, не жалея эпитетов. К утру наступает умиротворение. "Пришельцам" пора возвращаться. А Екатерина и Скотт серьезно задумываются над тем, как же им на этом свете выстроить отношения друг с другом, чтобы прожить счастливо. Незамысловатый, в общем-то, сюжет, но как играют актеры! Действующие лица и исполнители: Нар.артистка России Наталия Егорова, Засл.артист России Андрей Харитонов, Засл.артистка России Светлана Тома, Нар.артист России Александр Панкратов-Черный. ------------------------------------------------- ДЛЯ ПОЛУЧЕНИЯ СКИДКИ ОБРАЩАЙТЕСЬ К НАМ ПО ТЕЛЕФОНУ Тел: (495) 641-89-75 ВАШ ПРОМО КОД 9111 From bbrewer at littledystopia.net Wed Mar 14 13:37:17 2012 From: bbrewer at littledystopia.net (bbrewer) Date: Wed, 14 Mar 2012 16:37:17 -0400 Subject: [wired] Unknown Tech Company Defies FBI In Mystery Surveillance Case Message-ID: <4F61017D.9080407@littledystopia.net> http://www.wired.com/threatlevel/2012/03/mystery-nsl/ ________________________________________________________________|| Unknown Tech Company Defies FBI In Mystery Surveillance Case "Sometime earlier this year, a provider of communication services in the United States  perhaps a phone company, perhaps Twitter  got a letter from the FBI demanding it turn over information on one, or possibly even hundreds, of its customers. The letter instructed the company to never disclose the existence of the demand to anyone  in particular, the target of the investigation. This sort of letter is not uncommon post-9/11 and with the passage of the U.S. Patriot Act, which gave the FBI increased authority to issue so-called National Security Letters (NSLs). In 2010, the FBI sent more than 24,000 NSLs to ISPs and other companies, seeking information on more than 14,000 individuals in the U.S. The public heard about none of these letters. But this time, the company that received the request pushed back. It told the agency that it wanted to tell its customer that he or she was being targeted, which would give the customer a chance to fight the request in court, as a group of Twitter users did last year when the Justice Department sought their records under a different kind of request. The minor defiance in this latest case was enough to land the NSL request in a federal court docket last Friday, where the government filed a request for a court order to force the company to adhere to the gag order." ........... From stercor at gmail.com Wed Mar 14 14:31:09 2012 From: stercor at gmail.com (Ted Rolle, Jr.) Date: Wed, 14 Mar 2012 17:31:09 -0400 Subject: [tahoe-dev] Safely defined. Message-ID: Brian: Define safely. I'm in a volunteer grid. Bulletproof code is important for reliability. This does _not_ reflect your coding ability. It's a characteristic of large systems. I've written large systems and had unintended consequences from "small, harmless, guaranteed-to-work" changes. But, we didn't have a testing environment as complete as Tahoe-LAFS has. If new code passes the testing suite, it's most probably clean. Change of mind: I like to be on the cutting edge. I'll put the new code into place when it's someone says its safe to do so. Thanks for all your work, Ted _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From c4eeam at docomo.ne.jp Wed Mar 14 01:48:33 2012 From: c4eeam at docomo.ne.jp (΍ ) Date: Wed, 14 Mar 2012 17:48:33 +0900 Subject: No subject Message-ID: <201203120852.q2C8qMDN024027@proton.jfet.org> 当倶楽部のマダムの肉欲を解消していただける方募集しています!!    【報酬1回3万円〜7万円】 内容はホテルで待ち合わせてSEXして頂くだけです。 ホテル代ももちろんこちらで負担します。 ⇒http://sefrelove.info/2efm02/ 人とそれぞれ好みがあると思いますので、 お相手はこちらのなかからお選び頂けます。 ⇒http://sefrelove.info/2efm02/ トラブル防止の為、報酬は行為の前に支払われますので 安心してご参加下さい。 ⇒http://sefrelove.info/2efm02/ このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp From urgencyunc1 at romack.com Wed Mar 14 02:56:17 2012 From: urgencyunc1 at romack.com (=?koi8-r?B?+sHLz84gzyDXwczA1M7PzSDSxccu?=) Date: Wed, 14 Mar 2012 18:56:17 +0900 Subject: =?koi8-r?B?7s/Xz8UgLfDP0tHEz8sgz9PV3cXT1NfMxc7J0SDXwczA1M7Px88gy8/O?= =?koi8-r?B?1NLPzNE=?= Message-ID: <000d01cd01c8$b3353cb0$6400a8c0@urgencyunc1> ВНИМАНИЮ БАНКОВ, ФИНАНСОВЫХ, СТРАХОВЫХ КОМПАНИЙ - НОВЫЕ ИЗМЕНЕНИЯ ВСТУПИЛИ В СИЛУ (ЦБ РФ) Валютное регулирование и валютный контроль на современном этапе Валютное регулирование (ЦБ РФ) +7 499 - 445\Ч0-95 \\// код (499) ЧЧ5З9_68 29 марта 2012г. Лектор: начальник управления Департамента финансового Мониторинга и валютного контроля Банка России. 1. Система валютного регулирования и валютного контроля в Российской Федерации и валютный контроль уполномоченных банков. Федеральный закон "О валютном регулировании и валютном контроле" ╧ 173-ФЗ (с изменениями и дополнениями, в том числе внесенными Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе"), императивные нормы. Регулирование порядка поведения валютных операций резидентами и нерезидентами, открытия и ведения резидентами счетов в банках, расположенных за пределами Российской Федерации. Режим счета, открытого за рубежом 2. ИЗМЕНЕНИЯ∙ Действие валютного законодательства в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе"? (не вступил в силу) и Федерального закона от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" 3. Порядок осуществления валютного контроля, установленный нормативными актами Банка России по валютному контролю. Инструкция Банка России ╧ 117-И (с изменениями и дополнениями). Паспорта сделок, как документы валютного контроля. Проблемные вопросы оформления и ведения. Документы валютного контроля, учета и отчетности. Действия уполномоченных банков при оформлении и проведении валютных операций Указание Банка России от 26.09.08 ╧ 2080-У "О внесении изменений в Положение Банка России ╧ 258-П". Основные сроки представления документов валютного контроля (с учетом изменений). Направление информации о правонарушениях и Положение ЦБ РФ от 20.07.2007 N 308-П. Указание Банка России "О формах учета по валютным операциям, осуществляемым резидентами, за исключением кредитных организаций и валютных бирж" ╧1950-У и его влияние на квалификацию правонарушений. Порядок открытия и ведения счетов резидентов за пределами территории РФ. Правила осуществления резидентами валютных операций за счет средств, находящихся на счетах за рубежом. Переводы резидентами средств на свои счета. 4. Положение Банка России от 2912.2010 ╧ 364-П ⌠О порядке передачи уполномоченными банками и территориальными учреждениями Банка России в таможенные органы для выполнения ими функций агентов валютного контроля информации по паспортам сделок по внешнеторговым договорам (контрактам) в электронном виде■. Указание Банка России от 29.12.2012 ╧ 2556-У ⌠О внесении изменения в пункт 1.2 Положения Банка России от 1 июня 2004 года ╧ 258-П⌠О порядке представления резидентами уполномоченным банкам подтверждающих документов и информации, связанных с проведением валютных операций с нерезидентами по внешнеторговым сделкам, и осуществления уполномоченными банками контроля за проведением валютных операци3 Указание Банка России от 29.12.2010 ╧ 2557-У ⌠О внесении изменений в Инструкцию Банка России от 15 июня 2004 года ╧ 117-И ⌠О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации при осуществлении валютных операций, порядке учета уполномоченными банками валютных операций и оформления паспортов сделок■ 5. Регулирование порядка представления информации о нарушениях валютного законодательства. Положение ЦБ РФ от 20.07.2007 N 308-П И практика его применения (с учетом последних изменений). Постановление Правительства РФ от 24 февраля 2009 г. N 166 "О порядке представления органами и агентами валютного контроля в орган валютного контроля, уполномоченный Правительством Российской Федерации. Практика применения Положения Банка России ╧308-П на примере конкретных нарушений. 6. Валютное регулирование операций физических лиц. Операции физических лиц и валютный контроль уполномоченных банков. Нормы прямого действия Федерального закона ╧ 173-ФЗ (в том числе заработная плата и командировочные расходы). Порядок осуществления переводов денежных средств физическими лицами из Российской Федерации и по территории Российской Федерации. "Близкородственные" переводы. Действие Инструкции Банка России ╧ 136-И.в связи с внесением изменений и дополнений в Федеральный закон ╧ 115-ФЗ "О противодействии легализации (отмыванию) доходов, полученных преступным путем и финансированию терроризма" Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" и в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе" 7. Ответственность за нарушение валютного законодательства. Федеральный Закон ╧ 174-ФЗ. 8. Перспективы развития валютного регулирования и валютного контроля в Российской Федерации. Стоимость участия в семинаре 9970 рублей За более подробной информацuей обpащайтеcь по тел: Московский код; 7922I*22 <> 8 (499) ЧЧ5.ЧО\95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7745 bytes Desc: not available URL: From eugen at leitl.org Wed Mar 14 13:12:39 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 14 Mar 2012 21:12:39 +0100 Subject: [tahoe-dev] #466 (signed-introducer-announcements) landed! Message-ID: <20120314201239.GF9891@leitl.org> ----- Forwarded message from Brian Warner ----- From eugen at leitl.org Wed Mar 14 13:30:33 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 14 Mar 2012 21:30:33 +0100 Subject: [tahoe-dev] keeping private grids private Message-ID: <20120314203033.GI9891@leitl.org> ----- Forwarded message from Brian Warner ----- From corrodedha05 at irs.gov Wed Mar 14 13:43:03 2012 From: corrodedha05 at irs.gov (Fernando Williamson) Date: Wed, 14 Mar 2012 21:43:03 +0100 Subject: IRS notification of your tax appeal status. Message-ID: <0DWN5F-CDCOC2-DL@irs.gov> Tax Appealdeclined Dear AccountantOfficer, Hereby you are informed that yourIncome Tax Refund Appeal id#7191781 hasbeen REJECTED. If youconsider that the IRS did not properlyestimate your case due to amisinterpretation of thefacts, beready to re-submit yourappeal. You canaccess the rejectiondetails and re-submit your appealby using the following link Online Tax Appeal.InternalRevenue Service Telephone Assistance forBusinesses:Toll-Free, 1-800-829-4933Hours of Operation: Monday  Friday, 7:00 a.m.  7:00 p.m.your local time (Alaska & Hawaii follow Pacific Time). -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1869 bytes Desc: not available URL: From eugen at leitl.org Wed Mar 14 14:38:07 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 14 Mar 2012 22:38:07 +0100 Subject: [tahoe-dev] Safely defined. Message-ID: <20120314213807.GL9891@leitl.org> ----- Forwarded message from "Ted Rolle, Jr." ----- From aphelionsc994 at 1dreamhomes.com Thu Mar 15 03:51:38 2012 From: aphelionsc994 at 1dreamhomes.com (=?koi8-r?B?IvzOxdLHydEg3sXMz9fFy8Ei?=) Date: Thu, 15 Mar 2012 02:51:38 -0800 Subject: =?koi8-r?B?+sHexc0g1MXCxSDczsXSx8nRPw==?= Message-ID: Бери Radoton. Меряй свою энергию. Получи свои 35долл. в виде скидки. Забирай с ним бесплатно "секреты мгновенного подъема энергии". Все здесь. http://скай-мак.рф Жить вслепую удобнее. Но не для нас с тобой. Измеряй радость, любовь, здоровье, мысли одним Радотоном. Будь счастлив. From unnervingjc9 at monogramdirect.com Wed Mar 14 23:39:31 2012 From: unnervingjc9 at monogramdirect.com (DOOR - DOOR) Date: Thu, 15 Mar 2012 08:39:31 +0200 Subject: =?koi8-r?B?8M/MztnKINPQxcvU0iDV08zVxyDQzyDNxdbE1c7B0s/EztnNINDF0sXX?= =?koi8-r?B?z9rLwc0gySDUwc3P1sXOzs/N1SDPxs/SzczFzsnALg==?= Message-ID: Полный спектр услуг по международным перевозкам и таможенному оформлению. Осуществляем доставку импортных грузов ("DOOR - DOOR") Примеры: - Одежда из Европы - от 9 евро за кг. - Одежда из Китая - от 6 евро за кг. - Мебель из Европы - от 370 евро за м. куб. - Посуда из Европы - от 2 евро за кг. - Светильники из Турции - от 2 евро за кг. Для просчета Вашего груза сообщите нам: 1. Наименование 2. Количество 3. Вес 4. Объём 5. Отправитель 6. Страна происхождения 7. Адрес место забора груза 8. Инвойсовая стоимость груза • Предварительная подготовка сопроводительных документов. • Организация таможенного оформления на таможенных терминалах Москвы. • Способствуем в осуществлении денежных переводов изготовителю (продавцу) всего за 2% от стоимости по инвойсу. • Содействие в получении сертификатов. • Вы можете сравнить цены, по которым сейчас идут Ваши грузы. Для просчёта в реальном времени обращайтесь по скайпу: tamozhimvse или по телефону (495) 565 34 52 (многоканальный) Позвоните и наши менеджеры в кратчайшие сроки рассчитают для Вас стоимость доставки груза и его таможенного оформления. From sebrinacelesta at unimstores.com Thu Mar 15 03:47:26 2012 From: sebrinacelesta at unimstores.com (Nia Merle) Date: Thu, 15 Mar 2012 09:47:26 -0100 Subject: Rock solid, bigger, harder, more intense erections and enlarge your penis by up to 3 inches with #1 Male Extra Penis Enhancement Pills. jw5j Message-ID: <80q17r72l91-11190704-131e1j54@zmaxgngbeu> Male Penis Enhancement - Male Extra Pills Rock solid, bigger, harder, more intense erections and enlarge your penis by up to 3 inches with #1 Male Extra Penis Enhancement Pills. Get Max Discount. 100% risk free money back guarantee. http://bestenlargementblow.ru From nnonlatimer at greenset.com Wed Mar 14 21:33:59 2012 From: nnonlatimer at greenset.com (=?koi8-r?B?IvPP1NLVxM7Jy8kg08zV1sIgwsXaz9DB087P09TJIg==?=) Date: Thu, 15 Mar 2012 10:33:59 +0600 Subject: =?koi8-r?B?8NLB18/X2cUgySDcy8/Oz83J3sXTy8nFIMHT0MXL1Nkg0NLPw8XT0w==?= =?koi8-r?B?wSDOxcTS1dbF09TXxc7Oz8fPINDPx8zP3cXOydE=?= Message-ID: <01cd0297$218fc580$7edf70cb@nnonlatimer> Увaжaeмыe господа! Пpиглaшaeм Bac пpинять yчacтиe в 2-x днeвном обучении: ЭКОНОМИЧЕСКАЯ БЕЗОПАСНОСТЬ ПРЕДПРИЯТИЯ. 19 - 20 марта 2012 г., Caнкт-Пeтepбypг. Краткий обзор тем : Основы экономической безопасности предприятия. Функции, задачи и направления деятельности СБ. Состав СБ, положение о подразделениях. Организация личной защиты. Этапы создания СБ и порядок ее функционирования. Корпоративные захваты: инструменты обнаружения и противодействия корпоративным захватам. Понятие деловой разведки. Роль бизнес-разведки в принятии управленческого решения.. Информационно-поисковая и информационно-аналитическая работа. Правовые основы деятельности контролирующих органов. Процедура проведения проверок, виды проверок и основания проведения, правовое положение руководителя организации и должностных лиц. Права и обязанности руководителя при осуществлении проверок. Интегрированная система охраны объектов. Основы информационной безопасности предприятия. Угрозы конфиденциальной информации. Правовые основы защиты конфиденциальной информации. Определение понятий 'конфиденциальная информация' и 'коммерческая тайна' в соответствии с законодательством РФ. Мероприятия по защите конфиденциальной информации Меры по обеспечению информационной безопасности предприятия, связанные с кадровой работой. Технические средства промышленного шпионажа и средства их обнаружения. Мероприятия по защите информации от утечки по техническим каналам. Мероприятия по пресечению несанкционированного доступа к конфиденциальной информации. Защита компьютерной информации. Обеспечение безопасности каналов связи. Технические средства информационной безопасности Возможные технические каналы утечки информации. Защита компьютерной информации. Возможные способы утери, искажения, изменения компьютерной информации или получения к ней несанкционированного доступа; правила при выборе средства защиты компьютерной информации; основы криптографической защиты информации; вирусная угроза компьютерной информации; возможность защиты информации при работе в сети "Интернет"; архивирование компьютерной информации. Электронно-цифровая подпись как средство защиты документов, представленных в электронном виде. Защита компьютерных сетей. Практическая демонстрация возможностей средств контроля и управления доступом, средств противодействия промышленному шпионажу. Всем слушателям выдается Свидетельство о прохождении обучения. Все слушатели семинара обеспечиваются комплектом информационных материалов. В стоимость входят кофе-брейки. ПОЛНУЮ программу и дополнительную инфоpмaцию Bы можeтe зaпpоcить по тeлeфонy (812) 6Ч2-2I-З2 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5165 bytes Desc: not available URL: From slewioe20 at rov.com Thu Mar 15 02:35:52 2012 From: slewioe20 at rov.com (=?koi8-r?B?88jFzdkgxMzRINrB0tDMwdTZ?=) Date: Thu, 15 Mar 2012 10:35:52 +0100 Subject: =?koi8-r?B?4sXM2cUgzsHMz8fP19nFINPIxc3ZINcgMjAxMiDH?= Message-ID: <000d01cd028f$033d99c0$6400a8c0@slewioe20> 26-28 марта 2012г. Налоговое планирование в 2012 г с учетом изменений законодательства +7 Московский код: 792-2I*2_2 : +7 495 742\9I\98 Цель: Ставка обязательных страховых взносов (СВ) с зарплаты с 2012 года составляет 30% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При формальном снижении нагрузки по зарплате многих сотрудников фактически выплаты возрастут: если раньше с больших зарплат СВ не уплачивались, то теперь их ставка составит 10% с суммы дохода свыше 512 тыс. рублей в год. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь √ назад, к "черным" схемам. Есть возможность посещения любого одного дня: программа разбита на два логических блока, каждый из которых занимает один день. Рекомендуется посещение обоих дней. Первый день посвящен поиску путей выживания компаний при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Кроме того, рассматриваются общие для всех налоговых схем условия и принципы применения √ такие как наличие деловых целей, отсутствие аффилированности и фиктивных сделок, грамотное оформление. Второй день посвящен изучению основных практических методов оптимизации налога на прибыль и (в той степени, в которой это возможно) НДС в торговых (оптовых и розничных) и производственных предприятиях, предприятиях, оказывающих услуги или выполняющих работы, в т.ч. строительные. Рассматриваются субъекты льготного налогообложения, способы переноса на них налогооблагаемой базы и пути безналогового рефинансирования (возврата) выведенных сумм. Участники получат краткие индивидуальные консультации по тематике курса. Программа: 1 день: Методы оптимизации расходов на выплату белой зарплаты и других доходов физических лиц в 2012-13 гг. 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. Обзор изменений законодательства по страховым взносам на 2012-13 гг., как они повлияли на налоговые схемы. 2. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность; * дивидендные схемы √ замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Способы минимизации рисков имущественной ответственности предпринимателя. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с новым порядком ведения кассовых операций. 3. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и качественное документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 4. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Долгосрочное накопительное страхование жизни работников и ДМС за счет предприятия. 5. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, компенсаций, гонораров и иных легальных доходов от нерезидентов. 6. Как компенсировать снижение социальных гарантий (включая пенсионные накопления) работников при применении налоговых схем, не предусматривающих выплату зарплаты? 7. Использование процентных займов от физлиц. Расчет эффективности. Потребительский кредитный кооператив граждан √ способ получения безналогового дохода в виде процентов. 8. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 9. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды. 10. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 2 день: Налоговое планирование по страховым взносам и НДФЛ в 2012 г. с учетом изменений законодательства 1. Методы планирования налога на прибыль и НДС. Принципиальная невозможность экономии НДС "белыми" схемами и случаи, когда это все же возможно. 2. Низконалоговые субъекты: * субъекты специальных налоговых режимов √ ЕНВД и УСН, в т.ч. патентная система, субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * оффшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, 3. Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 4. Способы переноса налогооблагаемой базы по налогу на прибыль на низконалоговых субъектов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. лицензионные и франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. * механизм трансфертных цен. Новое антитрансфертное законодательство, способы ухода от контроля за сделками, грамотное обоснование трансфертных цен, 5. Займы как способ возвратного рефинансирования √ преимущества и недостатки, риск ведения незаконной банковской деятельности. Безналоговое рефинансирование (возврат) и капитализация выведенной прибыли предприятия (холдинга) через уставный капитал, безвозмездную передачу имущества, увеличение чистых активов, ст. 27 Закона "Об ООО". 6. Простое товарищество субъектов упрощенной системы налогообложения, в т.ч. из "низконалоговых" регионов. Уплата НДС. Перенос прибыли товарищества на низконалоговых субъектов (УСН 6%, ЕНВД, оффшор и др.). Отсрочка уплаты налога при непередаче прибыли на счета товарищей. Возможен ли обход с помощью простого товарищества правил налогового учета (гл. 25 НК) и ограничений гл. 26.2 НК РФ в части перечня затрат? 7. Экономия НДС в торговле, производстве, выполнении работ, оказании услуг через разделение финансово-товарных потоков "с НДС" и "без НДС". Ограничение использования: покупатели/заказчики, не нуждающиеся в вычете НДС, как их выявить, или создать искусственно. Риски и рекомендации по использованию схемы. 8. Иностранные низконалоговые компании, цели применения. Их использование при проведении внутрироссийских операций для оптимизации налога на прибыль: традиционные (торговля, проценты, дивиденды, роялти, услуги и т.п.) и нетрадиционные схемы (простое товарищество, агентские). Выбор низконалоговых юрисдикций. 9. Обзор изменений налогового законодательства, как они повлияют на налоговые схемы. Ответы на вопросы. По желанию и по возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц курса. 3 день: Оптимизации налога на прибыль и НДС как антикризисная мера: как снизить расходы и увеличить прибыль 1. Методы планирования НДС. Принципиальная невозможность экономии НДС "белыми" схемами и случаи, когда это все же возможно. 2. Оптимизация НДС и налога на прибыль в оптовой и розничной торговле и производстве с использованием ИП на ЕНВД с уплатой символического налога (маленький торговый зал, торговое место, развозная торговля). Нюансы. Ограничение использования: покупатели, не нуждающиеся в вычете НДС, как их выявить или создать искусственно. Риски, связанные определением розничной торговли по ГК и рекомендации по использованию схемы. 3. Экономия НДС в производстве, выполнении работ, оказании услуг, аренде и т.п. через разделение доходов и перераспределение расходов "с НДС" и "без НДС". 4. Примеры "серых" схем ("псевдооптимизации") НДС (как нельзя "оптимизировать"!). Недобросовестные налогоплательщики и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Реализация товаров через неплательщика НДС (принципала) с использованием агентского договора. Планирование НДС с использованием механизма переоценки. Схема с небольшим агентским вознаграждением и большой дополнительной экономией (агент √ субъект УСН, договор предусматривает, что вся допвыгода принадлежит ему). Создание недоимки по налогам на фирме, не обремененной активами. Агент (комиссионер) не может удержать НДС при выплате дохода принципалу (комитенту)-нерезиденту (векселем и т.п.). 5. "Метод холдинга" в налоговом планировании. Понятие виртуальной группы компаний (холдинга) как средства налогового планирования. Создание рациональной финансовой и организационной холдинговой структуры, схемы товарно-финансовых потоков и договорных отношений холдинга. Рациональное построение финансовых потоков и договорных отношений в холдинге через разделение оборотов, капитала (прибыли), активов, персонала, отношений с контрагентами и рисков Элементы холдинга √ Основные предприятия, Управляющая или финансирующая компания (Казначейство), Хранитель активов, Торговый дом (Снабжающая или закупочная организация), Центры обслуживания (Кадровые центры), риск-структуры и их роли в налоговом планировании. Оперативное распределение налоговой нагрузки между участниками холдинга. 6. Два реальных примера комплексного налогового планирования в холдингах. Математическая модель налогообложения холдинга на цифровом примере, расчет эффективности налоговой оптимизации в холдинге. 7. Принципы налогового планирования использования основных средств. Планирование налога на имущество. "Хранитель активов" (лицо √ собственник имущественного комплекса), низконалоговые и безналоговые способы передачи имущества. Схемы с использованием лизинга. Возвратный лизинг. Переоценка основных средств и нелинейная амортизация. 8. Способы безналоговой и низконалоговой продажи имущества, включая недвижимость (крупные разовые сделки с большой прибылью): аргументированное занижение цены и создание затрат, оплата части стоимости через компании-нерезиденты; продажа через низконалогового субъекта (физлицо, УСН 6%, офшор┘); вклад в уставный капитал или реорганизация с последующей продажей новой компании напрямую покупателю или через низконалогового субъекта; простое товарищество. Риски. 9. Иностранные низконалоговые компании. Их использование при проведении внутрироссийских операций для оптимизации налога на прибыль: традиционные (торговля, проценты, дивиденды, роялти, услуги, и т.п) и нетрадиционные схемы (простое товарищество, агентские). Выбор низконалоговых юрисдикций. 10. Предприятия и организации инвалидов √ сохраняется ли их актуальность и в каких случаях? Рекомендации, типичные ошибки. 11. Изменения налогового законодательства, как они повлияли на налоговые схемы. Ответы на вопросы. По желанию и по возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Стоимость участия:1 день 9 000 руб. Стоимость участия:2 дня 16 000 руб. Стоимость участия:3 дня 23 000 руб. По вопpоcам pегucтаpацuu обpащайтеcь по тел: +7 499 Ч45Ч_095 **** +7 499 - 4Ч5_ЧО.95 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 15481 bytes Desc: not available URL: From rguerra at privaterra.org Thu Mar 15 07:50:28 2012 From: rguerra at privaterra.org (Robert Guerra) Date: Thu, 15 Mar 2012 10:50:28 -0400 Subject: [liberationtech] decentralized DNS... Message-ID: Another option is to use a hosting service, a registry and registrar that are in a jurisdiction that is out of reach of US authorities.. here's a recent post from Byron Holland, the CEO of CIRA (the top level country code domain for Canada- .ca) http://blog.cira.ca/2012/03/domain-name-seizures-and-ca/ Posted by: Byron Holland Domain name seizures have been top-of-mind for many people lately. It was one of the topics identified at the Canadian Internet Forum, and the high profile seizure by the U.S. government of the Canadian online gambling site bodog.com has been getting a lot ofmedia attention. This also isnbt the first time the U.S. government has seized domain names based on billegalb activity. In 2010, a number of .COM, .NET and .ORG domains were seized, and a country code top-level domain (ccTLD) operated by VeriSign in California, .TV, wasseized as well. In 2011, another 150 were seized. For the most part, the Internet does not recognize national borders. Internet traffic is routed all over the globe, and itbs possible to register a domain using a wide variety of domain name extensions. Herebs the thing b the stuff to the right of the dot matters: note that bodog.ca still resolves. If you register a domain name with an extension that is managed in another country, it is likely subject to the laws of that country b full stop. If a website is found to be in violation of American law, and the domain for that site is an extension managed by a U.S. entity, the U.S. government may seize it. If you keep your business in another country (in the case of Canada, register a .CA with a Canadian Registrar and use a Canadian web host), foreign governments canbt unilaterally seize it. CIRA has never been asked by a foreign government to shut down or seize a domain name. The DNS root zone does fall under American jurisdiction with ICANN (through IANA) as the operator. However, ICANN has explicitly stated in a blog post that they do bnot take down domain namesb and that they bhave no technical or legal authority to do that.b The fact is ICANN couldnbt cherry-pick domains even if it wanted to. If the U.S. government decided that they wanted to shut down a .CA website, and tried to do it through ICANN, they would have to shut down all of .CA in the root zone. This would involve cutting off every single .CA website and email address from the Internet, and theybre not going to do that for a number of reasons (not the least of which is the fact that shutting down the entire .CA domain space and everything in it would be a major international incident). The global economy would freeze if the U.S. government took such an action. The underpinnings of the Internet would be completely undermined. Think about this: the U.S. government hasnbt even shut down the Internet in nations theybve been at war or have very strained relations with b Iraq, Libya, Iran are just a few examples b because the trust that supports the Internet is fundamental to the economic and social well-being of humanity. Given that, why would they shut down an entire top level domain over a single website? The Internet has brought us incredible benefits, many due to the fact that it breaks down national and geographic borders. However, because of the very nature of the Internet b the fact that it is bvirtualb and bin the cloudb b most of us donbt tend to think of it being governed by the laws of a particular nation. But as the bodog.com case demonstrates, it is critically important to be aware of which jurisdiction your digital assets are in, and therefore what laws they may be subject to. _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From rohandixit86 at gmail.com Thu Mar 15 11:36:54 2012 From: rohandixit86 at gmail.com (Rohan Dixit) Date: Thu, 15 Mar 2012 11:36:54 -0700 Subject: [liberationtech] Thoughts on decentralized DNS, and OpenNIC particularly? Message-ID: Thanks for this, really helpful. My purpose in doing this is to figure out what the most practical/quickest to deployment solution is for distributed DNS records, so this is definitely useful. I looked at both namecoin and CJDNS. Looks like namecoin has attracted most of the developers from the initial project, with CJDNS still limping along (I'm guessing based on activity here.) Links to the code: namecoin: https://github.com/cjdelisle/cjdns/graphs/impact CJDNS: https://github.com/vinced/namecoin/graphs/impact Could you speak to the structure of namecoin a bit more? Looks like it uses the "proof-of-work" trick from bitcoin to validate DNS records (and arbitrary key-value pairs), unless my skimming was totally off. That's pretty ingenious, for those who are interested I found a great blog post that serves both as an introduction to Bitcoin and explains how it could be used to make a distributed DNS. http://paulbohm.com/2011/06/17/bitcoins-value-is-decentralization It appears they're also proposing integrating with providers like OpenNIC, OpenDNS, etc. although I'm not qualified to judge how feasible that is. http://dot-bit.org/Project_Roadmap They also share computing resources with current bitcoin generators.... seems they've thought of everything. Someone mentioned DNSSEC in a new off-shoot thread. DNSSEC within the existing DNS paradigm is only a half-measure (although I think you'll agree, an important one.) *Notes on other dDNS providers:* So besides namecoin and CJDNS, there's also Dot-P2p, the dDNS system that was proposed based on the BitTorrent protocol. Some info was here: http://p2pfoundation.net/Dot-P2P but the link to http://dot-p2p.org/index.php?title=Main_Page looks dead. The first hit Googling "distributed dns" brings up another codebase that hasn't been modified seemingly since 2005 ( http://sourceforge.net/projects/distributeddns/files). I checked out DIANNA as well, but didn't see a link to active code so assumed it was mostly dead. http://dianna-project.org/wiki/Main_Page On Wed, Mar 14, 2012 at 4:36 PM, wrote: > On Wed, Mar 14, 2012 at 02:19:47PM -0700, rohandixit86 at gmail.com wrote > 14K bytes in 317 lines about: > : Curious if anyone had thoughts on OpenNIC as a provider of decentralized > : DNS. From my naive point of view, it often seems like dDNS is a good way > to > : stop lazy types of censorship. But perhaps I'm missing something and the > : problem is more complicated than that? > > It is not distributed. It is just a rebirth of the non-ICANN root > servers. See https://en.wikipedia.org/wiki/AlterNIC for past history on > this idea. > > See also https://en.wikipedia.org/wiki/Alternative_DNS_root for more > history and current status. > > -- > Andrew > http://tpo.is/contact > pgp 0x6B4D6475 > _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From nakitatarra at fcmail.com Thu Mar 15 04:32:29 2012 From: nakitatarra at fcmail.com (Brittani) Date: Thu, 15 Mar 2012 12:32:29 +0100 Subject: Buy VIAGRA (Sildenafil) 100mg or 50mg From Our Online Pharmacy - No Prescription Required wa15f320 Message-ID: <201203150532.4FD4CE2433CD2E3E87C0B08@b9286he5> VIAGRA 100mg x 150 Pills Only $172 - Express Shipping To U.S - VISA ONLY. Buy VIAGRA (Sildenafil) 100mg or 50mg From Our Online Pharmacy - No Prescription Required - Express Shipping To U.S - Secured Checkout - VISA ONLY. Save With The Lowest Price And Get Overnight Delivery. http://drugtoremedspills.ru From guessworkypr11 at vanguardlegato.com Thu Mar 15 00:20:15 2012 From: guessworkypr11 at vanguardlegato.com (=?koi8-r?B?IvHOxMXL0yDtxcTJwSI=?=) Date: Thu, 15 Mar 2012 12:50:15 +0530 Subject: =?koi8-r?B?8NLPxNfJzsXNIPfB2yDTwcrUINcg9O/wLTEwIQ==?= Message-ID: <343B20B38316445BBC7BEB3D3387A1E3@svarnb64a81844> Продвижение сайта в поисковых системах по ключевым словам. Телефон: (495) 774 89 66 Подробная информация на сайте: http://ЯндексМедиа.рф From poseurs34 at vymyslicky.com Thu Mar 15 01:38:14 2012 From: poseurs34 at vymyslicky.com (Seo-Progress) Date: Thu, 15 Mar 2012 14:08:14 +0530 Subject: =?koi8-r?B?68HLIMTP09TJ3tggzcHL08nN1c3BIMvMycXO1M/XINMg08HK1ME=?= Message-ID: <664228846.44923605718075@vymyslicky.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2515 bytes Desc: not available URL: From sluggardsn3944 at walkerautomotive.dealerspace.com Thu Mar 15 02:04:49 2012 From: sluggardsn3944 at walkerautomotive.dealerspace.com (=?koi8-r?B?IvfFzMnLz8zF0M7ZyiDQz8TB0s/LIg==?=) Date: Thu, 15 Mar 2012 14:34:49 +0530 Subject: =?koi8-r?B?8NLFy9LB087ZyiDQz8TB0s/LIM7BIMTFztgg0s/WxMXOydEgLSDLwdLU?= =?koi8-r?B?yc7BINcg0s/Ty8/bzs/KINLBzcUgLSAxNDkw0tXC?= Message-ID: <7F8E6305068241FFBED61BFBD5AA9E81@RETAILM0621> Продается здесь: http://картина-тут.рф/9.shtml From relishoh30 at argonaut.ca Thu Mar 15 02:17:31 2012 From: relishoh30 at argonaut.ca (=?koi8-r?B?IvfzsyDv4iD19uXz9O/+5e7p6eog8PLh9yDu4SDp7vTl7Ozl6/T14Q==?= =?koi8-r?B?7Pju9eAg8+/i8/T35e7u7/P0+CI=?=) Date: Thu, 15 Mar 2012 14:47:31 +0530 Subject: =?koi8-r?B?8sHa0sXbxc7JxSDT0M/SztnIINPJ1NXBw8nKLCDT19Hawc7O2cgg0w==?= =?koi8-r?B?IM/C38XL1MHNySDJztTFzMzFy9TVwczYzs/KINPPwtPU18XOzs/T1A==?= =?koi8-r?B?yQ==?= Message-ID: <01cd02ba$8c9ec380$cfedb07a@relishoh30> УЖЕСТОЧЕНИЕ ЗАЩИТЫ АВТОРСКИХ ПРАВ! Новые поправки в закон о защите интеллектуальной собственности. Последствия для бизнеса. 19 - 20 марта 2012 г., Санкт-Петербург: З А Щ И Т А И Н Т Е Л Л Е К Т У А Л Ь Н О Й С О Б С Т В Е Н Н О С Т И с у ч ё т о м д о п о л н е н и й в Г р а ж д а н с к и й к о д е к с в 2 0 I 2 г. В ПРОГРАММЕ: Что считается нарушением прав на интеллектуальную собственность? Как и где оформляются права на различные объекты интеллектуальной собственности. Сроки оформления, возможность ускорения, выдача свидетельства, сроки действия свидетельств. Порядок использования объектов интеллектуальной собственности. Защита объектов интеллектуальной собственности в сети Интернет. Возможные способы защиты прав: гражданско-правовой, административный и уголовный. Договорные отношения, возникающие в процессе разработки интеллектуальной собственности. Легальное и нелегальное использование объектов чужой интеллектуальной собственности. Процедура проведения проверок на использование контрафактной продукции. Организации, имеющие право на проверки. Необходимые документы предоставляющие право на проверки. Ответственность и наказание за использование контрафактной продукции РЕГИСТРАЦИЯ ПО ТЕЛЕФОНУ: |8I2| 6ч2 О9--6З From potionshu6025 at siti.esselgroup.com Thu Mar 15 00:10:05 2012 From: potionshu6025 at siti.esselgroup.com (DOOR - DOOR) Date: Thu, 15 Mar 2012 15:10:05 +0800 Subject: =?koi8-r?B?8M/MztnKINPQxcvU0iDV08zVxyDQzyDNxdbE1c7B0s/EztnNINDF0sXX?= =?koi8-r?B?z9rLwc0gySDUwc3P1sXOzs/N1SDPxs/SzczFzsnALg==?= Message-ID: Полный спектр услуг по международным перевозкам и таможенному оформлению. Осуществляем доставку импортных грузов ("DOOR - DOOR") Примеры: - Одежда из Европы - от 9 евро за кг. - Одежда из Китая - от 6 евро за кг. - Мебель из Европы - от 370 евро за м. куб. - Посуда из Европы - от 2 евро за кг. - Светильники из Турции - от 2 евро за кг. Для просчета Вашего груза сообщите нам: 1. Наименование 2. Количество 3. Вес 4. Объём 5. Отправитель 6. Страна происхождения 7. Адрес место забора груза 8. Инвойсовая стоимость груза • Предварительная подготовка сопроводительных документов. • Организация таможенного оформления на таможенных терминалах Москвы. • Способствуем в осуществлении денежных переводов изготовителю (продавцу) всего за 2% от стоимости по инвойсу. • Содействие в получении сертификатов. • Вы можете сравнить цены, по которым сейчас идут Ваши грузы. Для просчёта в реальном времени обращайтесь по скайпу: tamozhimvse или по телефону (495) 565 34 52 (многоканальный) Позвоните и наши менеджеры в кратчайшие сроки рассчитают для Вас стоимость доставки груза и его таможенного оформления. From eugen at leitl.org Thu Mar 15 07:52:31 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 15 Mar 2012 15:52:31 +0100 Subject: [liberationtech] decentralized DNS... Message-ID: <20120315145231.GM9891@leitl.org> ----- Forwarded message from Robert Guerra ----- From kb at karelbilek.com Thu Mar 15 08:24:11 2012 From: kb at karelbilek.com (=?ISO-8859-1?Q?Karel_B=EDlek?=) Date: Thu, 15 Mar 2012 16:24:11 +0100 Subject: [info] What do you think about .art? In-Reply-To: References: <20120311093258.GQ9891@leitl.org> Message-ID: You cannot have it both ways. The domain system will either be centralized with name arbitration and without cybersquatting, but with domain ceisures; or decentralized, but with rampant cybersquatting. I can't imagine how to do decentralized DNS with domain name arbitration. You need to have a central power to do this. KB On Mon, Mar 12, 2012 at 11:36 PM, lodewijk andri de la porte wrote: > 2012/3/12 Karel Bmlek >> >> I never understood how it works exactly, but what is wrong with namecoin? >> >> (besides the fact that noone uses it) > > > No domain name arbitration. If someone cybersquatted Microsoft.bit that'd > really suck. Maybe they'd have the means to go after them but I likely > wouldn't have. > > (and it doesn't solve the dumb users don't get it problem. There's been some > really cool DNS providers integrating .bit to standard resolves though, I'd > like to see more of that) From eugen at leitl.org Thu Mar 15 08:31:24 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 15 Mar 2012 16:31:24 +0100 Subject: [info] What do you think about .art? In-Reply-To: References: <20120311093258.GQ9891@leitl.org> Message-ID: <20120315153124.GO9891@leitl.org> On Thu, Mar 15, 2012 at 04:24:11PM +0100, Karel Bmlek wrote: > You cannot have it both ways. > > The domain system will either be centralized with name arbitration and > without cybersquatting, but with domain ceisures; or decentralized, > but with rampant cybersquatting. > > I can't imagine how to do decentralized DNS with domain name > arbitration. You need to have a central power to do this. How often do you enter the host names? Most people enter Google into the Google search windows to find, you guessed it, Google. There are multiple decentral models to avoid cybersquatting. Publishing at cost, credits gained by operating name resolution, using a network of reputation for registries to penalize flooders, and so on. From dominicm5 at reliancepacific.com Thu Mar 15 03:18:04 2012 From: dominicm5 at reliancepacific.com (=?koi8-r?B?5MXbxdfZxSDJztfF09TJw8nJ?=) Date: Thu, 15 Mar 2012 19:18:04 +0900 Subject: =?koi8-r?B?4c7BzMnaydLVxc0gyc7XxdPUycPJz87O2cog0NLPxcvU?= Message-ID: <000d01cd0294$e8e54f90$6400a8c0@dominicm5> Тема: Практическое финансовое моделирование, построение оптимальной схемы бизнес процесса, разработка и анализ бизнес плана. За более подробной информацuей обpащайтеcь по тел: 8 (499) ЧЧ5\39/68 ; код (499) 4Ч539-68 Дата учебного курса: 29-30 марта 2012г.. Целu Уч. курса: Изучение и применение информации для оценки проекта и его разработки. Типы инвестиционных проектов и их особенности, а также их принципиальное отличие от бизнес планов, различные методы и инструментарий для разработки и оценки. Основные критерии принятия решения по инвестиционному проекту. Практическое занятие с участниками, выяснение и обучение таким методам как: 1.Нестандартные проекты и особенности их расчета. 2.Подготовить исходную информацию для оценки проекта: определение доходной и затратной частей, их классификация по статьям для: * новых компаний. * функционирующего предприятия. 4.Определить состав инвестиционных затрат. 5.Определение и построение источников финансирования: кредиты, нераспределенная прибыль, инвестиционный капитал. 6.Организовать управление формированием прибыли от продаж товаров (работ, услуг) 7.Доходность проекта, анализ, показатели, которые определяют критерии рентабельности и прибыли. Финансовые результаты проекта. 8.Провести структурный анализ отчета о прибылях и убытках, операционный анализ и управление затратами + классификация затрат. 9.Инфляция и ее влияние на расчеты и результаты проекта. 10.Понятие Критерия Эффективности при построении инвестиционной программы. Анализ целесообразности. 11.Разработать отчеты для дальнейшей консолидации между головным предприятием и филиалами и прочими подразделениям, входящим в структуру предприятия: * Понять принцип консолидации отчетности для групп компаний (холдингов); * Подготовить последовательность операций при консолидации; * Понять и подготовить анализ консолидированной отчетности; 12.ДИСКОНТИРОВАНИЕ √ критерий разногласия! Вопрос применения и понятия метода. 13.Понять и самостоятельно разработать структуру инвестиционного проекта и изучить правила построения анализа для данного проекта. 14.Разработать процесс утверждения (принятия) инвестиционного проекта. 15.Маркетинговая информация, как ее подготовить? 16.Грамотно подготовить текстовую часть документа. 17.Подготовка финансового плана: * Объем и требования к расчетам; * Объем расчетов и описание в финансовом плане; * Самостоятельная подготовка электронных таблиц; * Описание расчетов в финансовом плане, необходимый объем; * Рассмотрение финансовых показателей и их корректировка с учетом выбранного интервала расчетов; * Анализ финансовых показателей деятельности предприятия; * Определение уровня безубыточности, запаса финансовой прочности проекта; * Использование полученных данных. Каждому участнику для дальнейшей успешной работы и внедрения методики планирования на предприятии предоставляются бесплатно следующие методические материалы и программы: * Материал методический: печатный для самостоятельной разработки бизнес планов, ТЭО, инвестиционных проектов. * На CD диске электронную версию метод. материала для разработки финансовых проектов. * Книга - ╚О Методах разработки бизнес плана╩. Книга написана как - практическое руководство. В комплект с книгой прилагается специализированная программа по разработке технико-экономического обоснования. (Продукт создан для экспресс подготовки экономической документации. Возможности программы это быстрая, качественная, профессиональная подготовка эконом. документации для представления партнерам, инвесторам, кредитодателям и т.п..).. Информацию можно получить по телефонам: +7 499 4454.О95 и 8 Моск. код: 792_2122 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6474 bytes Desc: not available URL: From blurtsvur1 at linkedln.com Thu Mar 15 11:42:30 2012 From: blurtsvur1 at linkedln.com (Carmen Mohr) Date: Thu, 15 Mar 2012 20:42:30 +0200 Subject: LinkedIn Invitation from your co-worker Message-ID: <0813298547.O66BE4UE179141@jwoybrxivqpt.dvrowtqsdjhuh.va> LinkedIn NotificationLinkedInREMINDERSInvitationnotifications:• From SebastianCook (Your classmate) PENDING MESSAGES • There are atotal of 1 messages awaiting yourresponse. Visityour InBox now.  Don't want to receiveemail notifications? Adjust your messagesettings.LinkedInvalues your privacy. At no time has LinkedInmade your email address available to any otherLinkedIn user without your permission. Š2010, LinkedIn Corporation. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2208 bytes Desc: not available URL: From confetti23 at totallygames.com Thu Mar 15 05:44:34 2012 From: confetti23 at totallygames.com (=?koi8-r?B?IvfJ1MHMycoi?=) Date: Thu, 15 Mar 2012 20:44:34 +0800 Subject: =?koi8-r?B?89LP3s7PISDw0s/EwaPU09EgxMXK09TX1cDdycogwsnazsXTINDPINfZ?= =?koi8-r?B?0sHdydfBzsnAIMfSycLP1yDTz9LUwSDXxdvFzsvBINcg7e8sIDEuNiDN?= =?koi8-r?B?zA==?= Message-ID: <955292DB8EF7431C9179F6C1D7874082@homeb3b15731a5> Продаётся действующий бизнес по выращиванию грибов сорта вешенка в МО, не далеко от Москвы. Ежемесячная прибыль от 200 000 рублей. Окупаемость 8 месяцев! Ежемесячная выручка 400 000 - 450 000 рублей. Все контакты и договоры по сбыту передаются. Перед передачей всех документов осуществим полный цикл производства от момента закупки сырья до получения выручки. Будут подтверждены все указанные цифры. Цена бизнеса: 1 600 000 рублей. Дополнительно: Помещение в прямой аренде. Площадь 300 кв. метров. Ежемесячный объём производства: 6 - 7 тонн грибов. Цех оборудован автоматической системой климатического контроля (орошение, температура, вентиляция), холодильным оборудованием, системой отопления. Два опытных сотрудника. Фонд ЗП: 25 000 рублей. Продаётся из-за переезда на новое место жительства. Бизнес очень доходный, быстроокупаемый, всесезонный. Телефон: 8-926-510-48-96 Виталий From eugen at leitl.org Thu Mar 15 12:48:13 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 15 Mar 2012 20:48:13 +0100 Subject: [liberationtech] Thoughts on decentralized DNS, and OpenNIC particularly? Message-ID: <20120315194813.GE9891@leitl.org> ----- Forwarded message from Rohan Dixit ----- From steaksr29 at whatuwanted.com Thu Mar 15 01:55:26 2012 From: steaksr29 at whatuwanted.com (=?koi8-r?B?IlNlbnNvcnVzIC0gwsXTy8/O1MHL1M7ZxSDUxcjOz8zPx8nJIg==?=) Date: Thu, 15 Mar 2012 20:55:26 +1200 Subject: =?koi8-r?B?88XO08/Szs/FINfFxNLP?= Message-ID: <7A341B6DB06941459B47974113DF2FA8@tapu> Мусорные ведра с бесконтактной технологией «no touch» (не надо прикасаться) от 1,5 до 85 литров ИЩЕМ ДИЛЕРОВ в России, Белоруссии и Казахстане, в Украине и др. странах СНГ, в Прибалтике +7-911-959-89-48 www.бесконтактные-технологии.рф • Гигиеничность – открывается само (датчик реагирует), не нужно прикасаться к крышке. • Долговечность (гарантия от производителя). • Удобство и компактность (любой дизайн, литраж от 1,5 до 95л) • Бесшумность: работает от батареек, аккумуляторов и 220В • Покрытие - хром, красный, синий, черный, белый цвета • Имеется форма банки от кока-колы и пива (1,5л, 2,0л, 2,5л) Удобно, экономично и практично! С 2009 года используют в России • отели, рестораны, бары • бизнес-центры и офисы • спортивные комплексы • медицинские учреждения • квартиры • коттеджи • загородные дома Лучший подарок сотрудникам, шефу и любимой теще. +7-911-959-89-48 From mariloudeidra at origin.ea.com Thu Mar 15 23:03:14 2012 From: mariloudeidra at origin.ea.com (Alva Laurine) Date: Fri, 16 Mar 2012 06:03:14 +0000 Subject: Check out your one stop for replica watches on the web, featuring the best Rolex replica watches, replica Breitling, and fake Swiss watches. bpfsw83 Message-ID: <4f62d7a2.42fcf0b7@origin.ea.com> Replica Watches: Swiss Luxury Watch Replicas, Rolex, Omega, Breitling Check out your one stop for replica watches on the web, featuring the best Rolex replica watches, replica Breitling, and fake Swiss watches. Click here to get one for yourself now! http://famouswatcheslead.ru From danimoth at cryptolab.net Fri Mar 16 03:14:05 2012 From: danimoth at cryptolab.net (danimoth) Date: Fri, 16 Mar 2012 11:14:05 +0100 Subject: [liberationtech] Thoughts on decentralized DNS, and OpenNIC particularly? Message-ID: Il giorno gio, 15/03/2012 alle 11.36 -0700, Rohan Dixit ha scritto: > I looked at both namecoin and CJDNS. Looks like namecoin has attracted > most of the developers from the initial project, with CJDNS still > limping along (I'm guessing based on activity here.) > > > Links to the code: > namecoin: https://github.com/cjdelisle/cjdns/graphs/impact > > CJDNS: https://github.com/vinced/namecoin/graphs/impact > > > > Could you speak to the structure of namecoin a bit more? Looks like it > uses the "proof-of-work" trick from bitcoin to validate DNS records > (and arbitrary key-value pairs), unless my skimming was totally off. > That's pretty ingenious, for those who are interested I found a great > blog post that serves both as an introduction to Bitcoin and explains > how it could be used to make a distributed DNS. > > > http://paulbohm.com/2011/06/17/bitcoins-value-is-decentralization Namecoin is another currency, based from bitcoin code. But like many crypto things, when you take a "black box" and little modify it, the conseguences could be a complete disaster. Namecoin is flawed and *NOBODY* should consider it anymore. From [1]: 0. Coins are destroyed 1. NetworkFee descreasing for 50 to zero and will be zero in ~80000 block and has no feedback with network activity like difficulty has. 2. Namecoin was designed for free domains and this is its future 3. Developers have to do system intrusion from time to time to avoid collapse or spam hell DIANNA try to use existing bitcoin chain's (as satoshi explained) to do the same thing, but they are designing it carefully. Help them if you can. [1] https://bitcointalk.org/index.php?topic=62017.0 _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From hoists6 at guruofads.com Thu Mar 15 23:25:04 2012 From: hoists6 at guruofads.com (DOOR - DOOR) Date: Fri, 16 Mar 2012 11:55:04 +0530 Subject: =?koi8-r?B?8M/MztnKINPQxcvU0iDV08zVxyDQzyDNxdbE1c7B0s/EztnNINDF0sXX?= =?koi8-r?B?z9rLwc0gySDUwc3P1sXOzs/N1SDPxs/SzczFzsnALg==?= Message-ID: <32CCFD8D6A3B43289677F285E7B3C9A4@shyam> Полный спектр услуг по международным перевозкам и таможенному оформлению. Осуществляем доставку импортных грузов ("DOOR - DOOR") Примеры: - Одежда из Европы - от 9 евро за кг. - Одежда из Китая - от 6 евро за кг. - Мебель из Европы - от 370 евро за м. куб. - Посуда из Европы - от 2 евро за кг. - Светильники из Турции - от 2 евро за кг. Для просчета Вашего груза сообщите нам: 1. Наименование 2. Количество 3. Вес 4. Объём 5. Отправитель 6. Страна происхождения 7. Адрес место забора груза 8. Инвойсовая стоимость груза • Предварительная подготовка сопроводительных документов. • Организация таможенного оформления на таможенных терминалах Москвы. • Способствуем в осуществлении денежных переводов изготовителю (продавцу) всего за 2% от стоимости по инвойсу. • Содействие в получении сертификатов. • Вы можете сравнить цены, по которым сейчас идут Ваши грузы. Для просчёта в реальном времени обращайтесь по скайпу: tamozhimvse или по телефону (495) 565 34 52 (многоканальный) Позвоните и наши менеджеры в кратчайшие сроки рассчитают для Вас стоимость доставки груза и его таможенного оформления. From eugen at leitl.org Fri Mar 16 03:59:36 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 16 Mar 2012 11:59:36 +0100 Subject: [liberationtech] Thoughts on decentralized DNS, and OpenNIC particularly? Message-ID: <20120316105936.GZ9891@leitl.org> ----- Forwarded message from danimoth ----- From thwackswwne54 at groupefdp.com Thu Mar 15 23:56:12 2012 From: thwackswwne54 at groupefdp.com (=?koi8-r?B?IvfJ1MHMycoi?=) Date: Fri, 16 Mar 2012 12:26:12 +0530 Subject: =?koi8-r?B?89LP3s7PISDw0s/EwaPU09EgxMXK09TX1cDdycogwsnazsXTINDPINfZ?= =?koi8-r?B?0sHdydfBzsnAIMfSycLP1yDTz9LUwSDXxdvFzsvBINcg7e8sIDEuNiDN?= =?koi8-r?B?zA==?= Message-ID: Продаётся действующий бизнес по выращиванию грибов сорта вешенка в МО, не далеко от Москвы. Ежемесячная прибыль от 200 000 рублей. Окупаемость 8 месяцев! Ежемесячная выручка 400 000 - 450 000 рублей. Все контакты и договоры по сбыту передаются. Перед передачей всех документов осуществим полный цикл производства от момента закупки сырья до получения выручки. Будут подтверждены все указанные цифры. Цена бизнеса: 1 600 000 рублей. Дополнительно: Помещение в прямой аренде. Площадь 300 кв. метров. Ежемесячный объём производства: 6 - 7 тонн грибов. Цех оборудован автоматической системой климатического контроля (орошение, температура, вентиляция), холодильным оборудованием, системой отопления. Два опытных сотрудника. Фонд ЗП: 25 000 рублей. Продаётся из-за переезда на новое место жительства. Бизнес очень доходный, быстроокупаемый, всесезонный. Телефон: 8-926-510-48-96 Виталий From eugen at leitl.org Fri Mar 16 06:35:26 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 16 Mar 2012 14:35:26 +0100 Subject: The NSA Is Building the =?utf-8?Q?Country?= =?utf-8?B?4oCZcw==?= Biggest Spy Center (Watch What You Say) Message-ID: <20120316133526.GM9891@leitl.org> (yay, Bamford is back from the dead) http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1 The NSA Is Building the Countrybs Biggest Spy Center (Watch What You Say) By James Bamford March 15, 2012 | 7:24 pm | Categories: Crypto, Cybersecurity, Miscellaneous, NSA, Paranoia, privacy, Surveillance Photo: Name Withheld; Digital Manipulation: Jesse Lenz The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze. Bluffdale sits in a bowl-shaped valley in the shadow of Utahbs Wasatch Range to the east and the Oquirrh Mountains to the west. Itbs the heart of Mormon country, where religious pioneers first arrived more than 160 years ago. They came to escape the rest of the world, to understand the mysterious words sent down from their god as revealed on buried golden plates, and to practice what has become known as bthe principle,b marriage to multiple wives. Today Bluffdale is home to one of the nationbs largest sects of polygamists, the Apostolic United Brethren, with upwards of 9,000 members. The brethrenbs complex includes a chapel, a school, a sports field, and an archive. Membership has doubled since 1978band the number of plural marriages has tripledbso the sect has recently been looking for ways to purchase more land and expand throughout the town. But new pioneers have quietly begun moving into the area, secretive outsiders who say little and keep to themselves. Like the pious polygamists, they are focused on deciphering cryptic messages that only they have the power to understand. Just off Beef Hollow Road, less than a mile from brethren headquarters, thousands of hard-hatted construction workers in sweat-soaked T-shirts are laying the groundwork for the newcomersb own temple and archive, a massive complex so large that it necessitated expanding the townbs boundaries. Once built, it will be more than five times the size of the US Capitol. Rather than Bibles, prophets, and worshippers, this temple will be filled with servers, computer intelligence experts, and armed guards. And instead of listening for words flowing down from heaven, these newcomers will be secretly capturing, storing, and analyzing vast quantities of words and images hurtling through the worldbs telecommunications networks. In the little town of Bluffdale, Big Love and Big Brother have become uneasy neighbors. The NSA has become the largest, most covert, and potentially most intrusive intelligence agency ever. Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the worldbs communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trailsbparking receipts, travel itineraries, bookstore purchases, and other digital bpocket litter.b It is, in some measure, the realization of the btotal information awarenessb program created during the first term of the Bush administrationban effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americansb privacy. But bthis is more than just a data center,b says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handlebfinancial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communicationsbwill be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: bEverybodybs a target; everybody with communication is a target.b For the NSA, overflowing with tens of billions of dollars in post-9/11 budget awards, the cryptanalysis breakthrough came at a time of explosive growth, in size as well as in power. Established as an arm of the Department of Defense following Pearl Harbor, with the primary purpose of preventing another surprise assault, the NSA suffered a series of humiliations in the post-Cold War years. Caught offguard by an escalating series of terrorist attacksbthe first World Trade Center bombing, the blowing up of US embassies in East Africa, the attack on the USS Cole in Yemen, and finally the devastation of 9/11bsome began questioning the agencybs very reason for being. In response, the NSA has quietly been reborn. And while there is little indication that its actual effectiveness has improvedbafter all, despite numerous pieces of evidence and intelligence-gathering opportunities, it missed the near-disastrous attempted attacks by the underwear bomber on a flight to Detroit in 2009 and by the car bomber in Times Square in 2010bthere is no doubt that it has transformed itself into the largest, most covert, and potentially most intrusive intelligence agency ever created. In the processband for the first time since Watergate and the other scandals of the Nixon administrationbthe NSA has turned its surveillance apparatus on the US and its citizens. It has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas. It has created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes. Finally, the agency has begun building a place to store all the trillions of words and thoughts and whispers captured in its electronic net. And, of course, itbs all being done in secret. To those on the inside, the old adage that NSA stands for Never Say Anything applies more than ever. UTAH DATA CENTER When construction is completed in 2013, the heavily fortified $2 billion facility in Bluale will encompass 1 million square feet. Utah Data Center 1 Visitor control center A $9.7 million facility for ensuring that only cleared personnel gain access. 2 Administration Designated space for technical support and administrative personnel. 3 Data halls Four 25,000-square-foot facilities house rows and rows of servers. 4 Backup generators and fuel tanks Can power the center for at least three days. 5 Water storage and pumping Able to pump 1.7 million gallons of liquid per day. 6 Chiller plant About 60,000 tons of cooling equipment to keep servers from overheating. 7 Power substation An electrical substation to meet the centerbs estimated 65-megawatt demand. 8 Security Video surveillance, intrusion detection, and other protection will cost more than $10 million. Source: U.S. Army Corps of Engineers Conceptual Site plan A swath of freezing fog blanketed Salt Lake City on the morning of January 6, 2011, mixing with a weeklong coating of heavy gray smog. Red air alerts, warning people to stay indoors unless absolutely necessary, had become almost daily occurrences, and the temperature was in the bone-chilling twenties. bWhat I smell and taste is like coal smoke,b complained one local blogger that day. At the citybs international airport, many inbound flights were delayed or diverted while outbound regional jets were grounded. But among those making it through the icy mist was a figure whose gray suit and tie made him almost disappear into the background. He was tall and thin, with the physique of an aging basketball player and dark caterpillar eyebrows beneath a shock of matching hair. Accompanied by a retinue of bodyguards, the man was NSA deputy director Chris Inglis, the agencybs highest-ranking civilian and the person who ran its worldwide day-to-day operations. A short time later, Inglis arrived in Bluffdale at the site of the future data center, a flat, unpaved runway on a little-used part of Camp Williams, a National Guard training site. There, in a white tent set up for the occasion, Inglis joined Harvey Davis, the agencybs associate director for installations and logistics, and Utah senator Orrin Hatch, along with a few generals and politicians in a surreal ceremony. Standing in an odd wooden sandbox and holding gold-painted shovels, they made awkward jabs at the sand and thus officially broke ground on what the local media had simply dubbed bthe spy center.b Hoping for some details on what was about to be built, reporters turned to one of the invited guests, Lane Beattie of the Salt Lake Chamber of Commerce. Did he have any idea of the purpose behind the new facility in his backyard? bAbsolutely not,b he said with a self-conscious half laugh. bNor do I want them spying on me.b For his part, Inglis simply engaged in a bit of double-talk, emphasizing the least threatening aspect of the center: bItbs a state-of-the-art facility designed to support the intelligence community in its mission to, in turn, enable and protect the nationbs cybersecurity.b While cybersecurity will certainly be among the areas focused on in Bluffdale, what is collected, how itbs collected, and what is done with the material are far more important issues. Battling hackers makes for a nice coverbitbs easy to explain, and who could be against it? Then the reporters turned to Hatch, who proudly described the center as ba great tribute to Utah,b then added, bI canbt tell you a lot about what theybre going to be doing, because itbs highly classified.b And then there was this anomaly: Although this was supposedly the official ground-breaking for the nationbs largest and most expensive cybersecurity project, no one from the Department of Homeland Security, the agency responsible for protecting civilian networks from cyberattack, spoke from the lectern. In fact, the official whobd originally introduced the data center, at a press conference in Salt Lake City in October 2009, had nothing to do with cybersecurity. It was Glenn A. Gaffney, deputy director of national intelligence for collection, a man who had spent almost his entire career at the CIA. As head of collection for the intelligence community, he managed the countrybs human and electronic spies. Within days, the tent and sandbox and gold shovels would be gone and Inglis and the generals would be replaced by some 10,000 construction workers. bWebve been asked not to talk about the project,b Rob Moore, president of Big-D Construction, one of the three major contractors working on the project, told a local reporter. The plans for the center show an extensive security system: an elaborate $10 million antiterrorism protection program, including a fence designed to stop a 15,000-pound vehicle traveling 50 miles per hour, closed-circuit cameras, a biometric identification system, a vehicle inspection facility, and a visitor-control center. Inside, the facility will consist of four 25,000-square-foot halls filled with servers, complete with raised floor space for cables and storage. In addition, there will be more than 900,000 square feet for technical support and administration. The entire site will be self-sustaining, with fuel tanks large enough to power the backup generators for three days in an emergency, water storage with the capability of pumping 1.7 million gallons of liquid per day, as well as a sewage system and massive air-conditioning system to keep all those servers cool. Electricity will come from the centerbs own substation built by Rocky Mountain Power to satisfy the 65-megawatt power demand. Such a mammoth amount of energy comes with a mammoth price tagbabout $40 million a year, according to one estimate. Given the facilitybs scale and the fact that a terabyte of data can now be stored on a flash drive the size of a manbs pinky, the potential amount of information that could be housed in Bluffdale is truly staggering. But so is the exponential growth in the amount of intelligence data being produced every day by the eavesdropping sensors of the NSA and other intelligence agencies. As a result of this bexpanding array of theater airborne and other sensor networks,b as a 2007 Department of Defense report puts it, the Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabytes (1024 bytes) of data. (A yottabyte is a septillion bytesbso large that no one has yet coined a term for the next higher magnitude.) It needs that capacity because, according to a recent report by Cisco, global Internet traffic will quadruple from 2010 to 2015, reaching 966 exabytes per year. (A million exabytes equal a yottabyte.) In terms of scale, Eric Schmidt, Googlebs former CEO, once estimated that the total of all human knowledge created from the dawn of man to 2003 totaled 5 exabytes. And the data flow shows no sign of slowing. In 2011 more than 2 billion of the worldbs 6.9 billion people were connected to the Internet. By 2015, market research firm IDC estimates, there will be 2.7 billion users. Thus, the NSAbs need for a 1-million-square-foot data storehouse. Should the agency ever fill the Utah center with a yottabyte of information, it would be equal to about 500 quintillion (500,000,000,000,000,000,000) pages of text. The data stored in Bluffdale will naturally go far beyond the worldbs billions of public web pages. The NSA is more interested in the so-called invisible web, also known as the deep web or deepnetbdata beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers. bThe deep web contains government reports, databases, and other sources of information of high value to DOD and the intelligence community,b according to a 2010 Defense Science Board report. bAlternative tools are needed to find and index data in the deep web b& Stealing the classified secrets of a potential adversary is where the [intelligence] community is most comfortable.b With its new Utah Data Center, the NSA will at last have the technical capability to store, and rummage through, all those stolen secrets. The question, of course, is how the agency defines who is, and who is not, ba potential adversary.b The NSAbS SPY NETWORK Once itbs operational, the Utah Data Center will become, in effect, the NSAbs cloud. The center will be fed data collected by the agencybs eavesdropping satellites, overseas listening posts, and secret monitoring rooms in telecom facilities throughout the US. All that data will then be accessible to the NSAbs code breakers, data-miners, China analysts, counterterrorism specialists, and others working at its Fort Meade headquarters and around the world. Herebs how the data center appears to fit into the NSAbs global puzzle.bJ.B. SPY NETWORK 1 Geostationary satellites Four satellites positioned around the globe monitor frequencies carrying everything from walkie-talkies and cell phones in Libya to radar systems in North Korea. Onboard software acts as the first filter in the collection process, targeting only key regions, countries, cities, and phone numbers or email. 2 Aerospace Data Facility, Buckley Air Force Base, Colorado Intelligence collected from the geostationary satellites, as well as signals from other spacecraft and overseas listening posts, is relayed to this facility outside Denver. About 850 NSA employees track the satellites, transmit target information, and download the intelligence haul. 3 NSA Georgia, Fort Gordon, Augusta, Georgia Focuses on intercepts from Europe, the Middle East, and North Africa. Codenamed Sweet Tea, the facility has been massively expanded and now consists of a 604,000-square-foot operations building for up to 4,000 intercept operators, analysts, and other specialists. 4 NSA Texas, Lackland Air Force Base, San Antonio Focuses on intercepts from Latin America and, since 9/11, the Middle East and Europe. Some 2,000 workers staff the operation. The NSA recently completed a $100 million renovation on a mega-data center hereba backup storage facility for the Utah Data Center. 5 NSA Hawaii, Oahu Focuses on intercepts from Asia. Built to house an aircraft assembly plant during World War II, the 250,000-square-foot bunker is nicknamed the Hole. Like the other NSA operations centers, it has since been expanded: Its 2,700 employees now do their work aboveground from a new 234,000-square-foot facility. 6 Domestic listening posts The NSA has long been free to eavesdrop on international satellite communications. But after 9/11, it installed taps in US telecom bswitches,b gaining access to domestic traffic. An ex-NSA official says there are 10 to 20 such installations. 7 Overseas listening posts According to a knowledgeable intelligence source, the NSA has installed taps on at least a dozen of the major overseas communications links, each capable of eavesdropping on information passing by at a high data rate. 8 Utah Data Center, Bluffdale, Utah At a million square feet, this $2 billion digital storage facility outside Salt Lake City will be the centerpiece of the NSAbs cloud-based data strategy and essential in its plans for decrypting previously uncrackable documents. 9 Multiprogram Research Facility, Oak Ridge, Tennessee Some 300 scientists and computer engineers with top security clearance toil away here, building the worldbs fastest supercomputers and working on cryptanalytic applications and other secret projects. 10 NSA headquarters, Fort Meade, Maryland Analysts here will access material stored at Bluffdale to prepare reports and recommendations that are sent to policymakers. To handle the increased data load, the NSA is also building an $896 million supercomputer here. Before yottabytes of data from the deep web and elsewhere can begin piling up inside the servers of the NSAbs new center, they must be collected. To better accomplish that, the agency has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. Controlled by the NSA, these highly secured spaces are where the agency taps into the US communications networks, a practice that came to light during the Bush years but was never acknowledged by the agency. The broad outlines of the so-called warrantless-wiretapping program have long been exposedbhow the NSA secretly and illegally bypassed the Foreign Intelligence Surveillance Court, which was supposed to oversee and authorize highly targeted domestic eavesdropping; how the program allowed wholesale monitoring of millions of American phone calls and email. In the wake of the programbs exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasnbt revealed until now, however, was the enormity of this ongoing domestic spying program. For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail. William Binney was a senior NSA crypto-mathematician largely responsible for automating the agencybs worldwide eavesdropping network. A tall man with strands of black hair across the front of his scalp and dark, determined eyes behind thick-rimmed glasses, the 68-year-old spent nearly four decades breaking codes and finding new ways to channel billions of private phone calls and email messages from around the world into the NSAbs bulging databases. As chief and one of the two cofounders of the agencybs Signals Intelligence Automation Research Center, Binney and his team designed much of the infrastructure thatbs still likely used to intercept international and foreign communications. He explains that the agency could have installed its tapping gear at the nationbs cable landing stationsbthe more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the countryblarge, windowless buildings known as switchesbthus gaining access to not just international communications but also to most of the domestic traffic flowing through the US. The network of intercept stations goes far beyond the single room in an AT&T building in San Francisco exposed by a whistle-blower in 2006. bI think therebs 10 to 20 of them,b Binney says. bThatbs not just San Francisco; they have them in the middle of the country and also on the East Coast.b The eavesdropping on Americans doesnbt stop at the telecom switches. To capture satellite communications in and out of the US, the agency also monitors AT&Tbs powerful earth stations, satellite receivers in locations that include Roaring Creek and Salt Creek. Tucked away on a back road in rural Catawissa, Pennsylvania, Roaring Creekbs three 105-foot dishes handle much of the countrybs communications to and from Europe and the Middle East. And on an isolated stretch of land in remote Arbuckle, California, three similar dishes at the companybs Salt Creek station service the Pacific Rim and Asia. The former NSA official held his thumb and forefinger close together: bWe are that far from a turnkey totalitarian state.b Binney left the NSA in late 2001, shortly after the agency launched its warrantless-wiretapping program. bThey violated the Constitution setting it up,b he says bluntly. bBut they didnbt care. They were going to do it anyway, and they were going to crucify anyone who stood in the way. When they started violating the Constitution, I couldnbt stay.b Binney says Stellar Wind was far larger than has been publicly disclosed and included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agencybs worldwide intercepts. The haul only grew from there. According to Binneybwho has maintained close contact with agency employees until a few years agobthe taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct bdeep packet inspection,b examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light. The software, created by a company called Narus thatbs now part of Boeing, is controlled remotely from NSA headquarters at Fort Meade in Maryland and searches US sources for target addresses, locations, countries, and phone numbers, as well as watch-listed names, keywords, and phrases in email. Any communication that arouses suspicion, especially those to or from the million or so people on agency watch lists, are automatically copied or recorded and then transmitted to the NSA. The scope of surveillance expands from there, Binney says. Once a name is entered into the Narus database, all phone calls and other communications to and from that person are automatically routed to the NSAbs recorders. bAnybody you want, route to a recorder,b Binney says. bIf your numberbs in there? Routed and gets recorded.b He adds, bThe Narus device allows you to take it all.b And when Bluffdale is completed, whatever is collected will be routed there for storage and analysis. According to Binney, one of the deepest secrets of the Stellar Wind programbagain, never confirmed until nowbwas that the NSA gained warrantless access to AT&Tbs vast trove of domestic and international billing records, detailed information about who called whom in the US and around the world. As of 2007, AT&T had more than 2.8 trillion records housed in a database at its Florham Park, New Jersey, complex. Verizon was also part of the program, Binney says, and that greatly expanded the volume of calls subject to the agencybs domestic eavesdropping. bThat multiplies the call rate by at least a factor of five,b he says. bSo youbre over a billion and a half calls a day.b (Spokespeople for Verizon and AT&T said their companies would not comment on matters of national security.) After he left the NSA, Binney suggested a system for monitoring peoplebs communications according to how closely they are connected to an initial target. The further away from the targetbsay youbre just an acquaintance of a friend of the targetbthe less the surveillance. But the agency rejected the idea, and, given the massive new storage facility in Utah, Binney suspects that it now simply collects everything. bThe whole idea was, how do you manage 20 terabytes of intercept a minute?b he says. bThe way we proposed was to distinguish between things you want and things you donbt want.b Instead, he adds, btheybre storing everything they gather.b And the agency is gathering as much as it can. Once the communications are intercepted and stored, the data-mining begins. bYou can watch everybody all the time with data- mining,b Binney says. Everything a person does becomes charted on a graph, bfinancial transactions or travel or anything,b he says. Thus, as data like bookstore receipts, bank statements, and commuter toll records flow in, the NSA is able to paint a more and more detailed picture of someonebs life. The NSA also has the ability to eavesdrop on phone calls directly and in real time. According to Adrienne J. Kinne, who worked both before and after 9/11 as a voice interceptor at the NSA facility in Georgia, in the wake of the World Trade Center attacks bbasically all rules were thrown out the window, and they would use any excuse to justify a waiver to spy on Americans.b Even journalists calling home from overseas were included. bA lot of time you could tell they were calling their families,b she says, bincredibly intimate, personal conversations.b Kinne found the act of eavesdropping on innocent fellow citizens personally distressing. bItbs almost like going through and finding somebodybs diary,b she says. In secret listening rooms nationwide, NSA software examines every email, phone call, and tweet as they zip by. But there is, of course, reason for anyone to be distressed about the practice. Once the door is open for the government to spy on US citizens, there are often great temptations to abuse that power for political purposes, as when Richard Nixon eavesdropped on his political enemies during Watergate and ordered the NSA to spy on antiwar protesters. Those and other abuses prompted Congress to enact prohibitions in the mid-1970s against domestic spying. Before he gave up and left the NSA, Binney tried to persuade officials to create a more targeted system that could be authorized by a court. At the time, the agency had 72 hours to obtain a legal warrant, and Binney devised a method to computerize the system. bI had proposed that we automate the process of requesting a warrant and automate approval so we could manage a couple of million intercepts a day, rather than subvert the whole process.b But such a system would have required close coordination with the courts, and NSA officials werenbt interested in that, Binney says. Instead they continued to haul in data on a grand scale. Asked how many communicationsbbtransactions,b in NSAbs lingobthe agency has intercepted since 9/11, Binney estimates the number at bbetween 15 and 20 trillion, the aggregate over 11 years.b When Barack Obama took office, Binney hoped the new administration might be open to reforming the program to address his constitutional concerns. He and another former senior NSA analyst, J. Kirk Wiebe, tried to bring the idea of an automated warrant-approval system to the attention of the Department of Justicebs inspector general. They were given the brush-off. bThey said, oh, OK, we canbt comment,b Binney says. Sitting in a restaurant not far from NSA headquarters, the place where he spent nearly 40 years of his life, Binney held his thumb and forefinger close together. bWe are, like, that far from a turnkey totalitarian state,b he says. There is still one technology preventing untrammeled government access to private digital data: strong encryption. Anyonebfrom terrorists and weapons dealers to corporations, financial institutions, and ordinary email sendersbcan use it to seal their messages, plans, photos, and documents in hardened data shells. For years, one of the hardest shells has been the Advanced Encryption Standard, one of several algorithms used by much of the world to encrypt data. Available in three different strengthsb128 bits, 192 bits, and 256 bitsbitbs incorporated in most commercial email programs and web browsers and is considered so strong that the NSA has even approved its use for top-secret US government communications. Most experts say that a so-called brute-force computer attack on the algorithmbtrying one combination after another to unlock the encryptionbwould likely take longer than the age of the universe. For a 128-bit cipher, the number of trial-and-error attempts would be 340 undecillion (1036). Breaking into those complex mathematical shells like the AES is one of the key reasons for the construction going on in Bluffdale. That kind of cryptanalysis requires two major ingredients: super-fast computers to conduct brute-force attacks on encrypted messages and a massive number of those messages for the computers to analyze. The more messages from a given target, the more likely it is for the computers to detect telltale patterns, and Bluffdale will be able to hold a great many messages. bWe questioned it one time,b says another source, a senior intelligence manager who was also involved with the planning. bWhy were we building this NSA facility? And, boy, they rolled out all the old guysbthe crypto guys.b According to the official, these experts told then-director of national intelligence Dennis Blair, bYoubve got to build this thing because we just donbt have the capability of doing the code-breaking.b It was a candid admission. In the long war between the code breakers and the code makersbthe tens of thousands of cryptographers in the worldwide computer security industrybthe code breakers were admitting defeat. So the agency had one major ingredientba massive data storage facilitybunder way. Meanwhile, across the country in Tennessee, the government was working in utmost secrecy on the other vital element: the most powerful computer the world has ever known. The plan was launched in 2004 as a modern-day Manhattan Project. Dubbed the High Productivity Computing Systems program, its goal was to advance computer speed a thousandfold, creating a machine that could execute a quadrillion (1015) operations a second, known as a petaflopbthe computer equivalent of breaking the land speed record. And as with the Manhattan Project, the venue chosen for the supercomputing program was the town of Oak Ridge in eastern Tennessee, a rural area where sharp ridges give way to low, scattered hills, and the southwestward-flowing Clinch River bends sharply to the southeast. About 25 miles from Knoxville, it is the bsecret cityb where uranium- 235 was extracted for the first atomic bomb. A sign near the exit read: what you see here, what you do here, what you hear here, when you leave here, let it stay here. Today, not far from where that sign stood, Oak Ridge is home to the Department of Energybs Oak Ridge National Laboratory, and itbs engaged in a new secret war. But this time, instead of a bomb of almost unimaginable power, the weapon is a computer of almost unimaginable speed. In 2004, as part of the supercomputing program, the Department of Energy established its Oak Ridge Leadership Computing Facility for multiple agencies to join forces on the project. But in reality there would be two tracks, one unclassified, in which all of the scientific work would be public, and another top-secret, in which the NSA could pursue its own computer covertly. bFor our purposes, they had to create a separate facility,b says a former senior NSA computer expert who worked on the project and is still associated with the agency. (He is one of three sources who described the program.) It was an expensive undertaking, but one the NSA was desperate to launch. Known as the Multiprogram Research Facility, or Building 5300, the $41 million, five-story, 214,000-square-foot structure was built on a plot of land on the labbs East Campus and completed in 2006. Behind the brick walls and green-tinted windows, 318 scientists, computer engineers, and other staff work in secret on the cryptanalytic applications of high-speed computing and other classified projects. The supercomputer center was named in honor of George R. Cotter, the NSAbs now-retired chief scientist and head of its information technology program. Not that youbd know it. bTherebs no sign on the door,b says the ex-NSA computer expert. At the DOEbs unclassified center at Oak Ridge, work progressed at a furious pace, although it was a one-way street when it came to cooperation with the closemouthed people in Building 5300. Nevertheless, the unclassified team had its Cray XT4 supercomputer upgraded to a warehouse-sized XT5. Named Jaguar for its speed, it clocked in at 1.75 petaflops, officially becoming the worldbs fastest computer in 2009. Meanwhile, over in Building 5300, the NSA succeeded in building an even faster supercomputer. bThey made a big breakthrough,b says another former senior intelligence official, who helped oversee the program. The NSAbs machine was likely similar to the unclassified Jaguar, but it was much faster out of the gate, modified specifically for cryptanalysis and targeted against one or more specific algorithms, like the AES. In other words, they were moving from the research and development phase to actually attacking extremely difficult encryption systems. The code-breaking effort was up and running. The breakthrough was enormous, says the former official, and soon afterward the agency pulled the shade down tight on the project, even within the intelligence community and Congress. bOnly the chairman and vice chairman and the two staff directors of each intelligence committee were told about it,b he says. The reason? bThey were thinking that this computing breakthrough was going to give them the ability to crack current public encryption.b In addition to giving the NSA access to a tremendous amount of Americansb personal data, such an advance would also open a window on a trove of foreign secrets. While today most sensitive communications use the strongest encryption, much of the older data stored by the NSA, including a great deal of what will be transferred to Bluffdale once the center is complete, is encrypted with more vulnerable ciphers. bRemember,b says the former intelligence official, ba lot of foreign government stuff webve never been able to break is 128 or less. Break all that and youbll find out a lot more of what you didnbt knowbstuff webve already storedbso therebs an enormous amount of information still in there.b The NSA believes itbs on the verge of breaking a key encryption algorithmbopening up hoards of data. That, he notes, is where the value of Bluffdale, and its mountains of long-stored data, will come in. What canbt be broken today may be broken tomorrow. bThen you can see what they were saying in the past,b he says. bBy extrapolating the way they did business, it gives us an indication of how they may do things now.b The danger, the former official says, is that itbs not only foreign government information that is locked in weaker algorithms, itbs also a great deal of personal domestic communications, such as Americansb email intercepted by the NSA in the past decade. But first the supercomputer must break the encryption, and to do that, speed is everything. The faster the computer, the faster it can break codes. The Data Encryption Standard, the 56-bit predecessor to the AES, debuted in 1976 and lasted about 25 years. The AES made its first appearance in 2001 and is expected to remain strong and durable for at least a decade. But if the NSA has secretly built a computer that is considerably faster than machines in the unclassified arena, then the agency has a chance of breaking the AES in a much shorter time. And with Bluffdale in operation, the NSA will have the luxury of storing an ever-expanding archive of intercepts until that breakthrough comes along. But despite its progress, the agency has not finished building at Oak Ridge, nor is it satisfied with breaking the petaflop barrier. Its next goal is to reach exaflop speed, one quintillion (1018) operations a second, and eventually zettaflop (1021) and yottaflop. These goals have considerable support in Congress. Last November a bipartisan group of 24 senators sent a letter to President Obama urging him to approve continued funding through 2013 for the Department of Energybs exascale computing initiative (the NSAbs budget requests are classified). They cited the necessity to keep up with and surpass China and Japan. bThe race is on to develop exascale computing capabilities,b the senators noted. The reason was clear: By late 2011 the Jaguar (now with a peak speed of 2.33 petaflops) ranked third behind Japanbs bK Computer,b with an impressive 10.51 petaflops, and the Chinese Tianhe-1A system, with 2.57 petaflops. But the real competition will take place in the classified realm. To secretly develop the new exaflop (or higher) machine by 2018, the NSA has proposed constructing two connecting buildings, totaling 260,000 square feet, near its current facility on the East Campus of Oak Ridge. Called the Multiprogram Computational Data Center, the buildings will be low and wide like giant warehouses, a design necessary for the dozens of computer cabinets that will compose an exaflop-scale machine, possibly arranged in a cluster to minimize the distance between circuits. According to a presentation delivered to DOE employees in 2009, it will be an bunassuming facility with limited view from roads,b in keeping with the NSAbs desire for secrecy. And it will have an extraordinary appetite for electricity, eventually using about 200 megawatts, enough to power 200,000 homes. The computer will also produce a gargantuan amount of heat, requiring 60,000 tons of cooling equipment, the same amount that was needed to serve both of the World Trade Center towers. In the meantime Cray is working on the next step for the NSA, funded in part by a $250 million contract with the Defense Advanced Research Projects Agency. Itbs a massively parallel supercomputer called Cascade, a prototype of which is due at the end of 2012. Its development will run largely in parallel with the unclassified effort for the DOE and other partner agencies. That project, due in 2013, will upgrade the Jaguar XT5 into an XK6, codenamed Titan, upping its speed to 10 to 20 petaflops. Yottabytes and exaflops, septillions and undecillionsbthe race for computing speed and data storage goes on. In his 1941 story bThe Library of Babel,b Jorge Luis Borges imagined a collection of information where the entire worldbs knowledge is stored but barely a single word is understood. In Bluffdale the NSA is constructing a library on a scale that even Borges might not have contemplated. And to hear the masters of the agency tell it, itbs only a matter of time until every word is illuminated. James Bamford (washwriter at gmail.com) is the author of The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America. From rqued at bregmanlaw.com Fri Mar 16 05:19:59 2012 From: rqued at bregmanlaw.com (=?koi8-r?B?Iu3B0snOwSDhztTPzs/XzsEi?=) Date: Fri, 16 Mar 2012 19:19:59 +0700 Subject: =?koi8-r?B?8NLJx8zB28HFzSDXICLE0tXHz8og1MXB1NIiIA==?= Message-ID: <01cd03a9$c7335980$6b10f8b4@rqued> УИК-ЭНД В "ДРУГОМ ТЕАТРЕ"! ---------------------- на сцене ДК имени Зуева (ул. Лесная 18) 16 марта спектакль "Утиная охота" Владимир Епифанцев, Ольга Ломоносова, Надежда Михалкова, Сергей Фролов и др. 18 марта спектакль "Орфей и Эвридика" Григорий Антипенко, Мария Волкова, Вера Воронкова, Сергей Колтаков, Олег Макаров ---------------------- на сцене Центра-музея В. Высоцкого (Нижний Таганский тупик, дом 3) 16 марта "Обмен" Ольга Хохлова/Ольга Спиркин, Елена Борзова, Дмитрий Козельский и др. 17 марта "Шоколад на крутом кипятке" Ксения Ларина, Иван Замотаев, Алексей Багдасаров, Алена Резник и др. 18 марта "Музыка для толстых" Наталья Ноздрина, Иван Замотаев, Александр Нестеров и др. ---------------------- Билеты - по цене театра. Без комиссий и наценок. Возможна доставка. Телефон: 8(499)- 973-21-41 Театральное агентство "Рампа". From dyanellena at televar.com Fri Mar 16 19:30:44 2012 From: dyanellena at televar.com (Laquita Tamiko) Date: Sat, 17 Mar 2012 03:30:44 +0100 Subject: Buy CIALIS at EXTRA LOW PRICES. Wide variety of generic and brand CIALIS packages. CIALIS on SALE at $1.53 !!! oc8py Message-ID: <43t97a77t29-14643145-544y3u46@iwzafyy9ogyt> SPECIAL OFFER : CIALIS on SALE at $1.53 !!! Buy CIALIS at EXTRA LOW PRICES. Wide variety of generic and brand CIALIS packages. BEST quality generic CIALIS with 100% satisfaction guaranteed! http://fitnesspharmacymeds.ru From rozannepatty at jgboswell.com Fri Mar 16 17:06:20 2012 From: rozannepatty at jgboswell.com (LanitaTroy) Date: Sat, 17 Mar 2012 05:06:20 +0500 Subject: Hurry Up To Get The Discount Price For Penis Enlargement Pills And 3 Extra Secret Bonuses For Free! xt6x1u Message-ID: <95t63j91j21-84454832-971r5o37@snwcqdh> Penis Enlargement 100% 8-week money back Penis enlargement solutions are the best method today for men looking to increase their penises, including the width and the length. Hurry Up To Get The Discount Price And 3 Extra Secret Bonuses For Free! http://bestenlargementjust.ru From warner at lothar.com Sat Mar 17 12:54:21 2012 From: warner at lothar.com (Brian Warner) Date: Sat, 17 Mar 2012 12:54:21 -0700 Subject: [tahoe-dev] several questions about tahoe backup Message-ID: On 3/1/12 11:50 AM, Dmitriy Kazimirov wrote: > 98% of this are results of tahoe backup runs and deep-check --repair > --add-lease takes more than 2 days to complete and it never completed > successfully for one reason or another. Usually it crashes on > network(I think related to gateway's network connection) errors and > starts from beginning. Yeah, I'm really satrting to think that we need that RepairAgent that we keep talking about: something inside the tahoe client node (or inside the "Agent" that we discusses briefly at the last Summit) which can manage a rate-limited asynchronous interruptable/restartable check/repair/renew process. Doing it entirely from the command line is too fragile: it basically implies that the whole process needs to complete before 1: your CLI command gets killed, 2: the node gets bounced, 3: the client's connections to the storage servers remain intact. The hard part about the RepairAgent has always been how to configure it. But I'm starting to think that tahoe.cfg should just be able to list a couple of aliases and a frequency (once/day, etc). > I tried to make specific aliases for each tahoe backup destination and > parallize deep-check but new questions arise: > - if other gateway performs deep-check on directory, and at same time > - tahoe backup writes new backup - is it safe?Will worse possible > result be 'Uncoordinate Write Error' but no data loss except > possible current backup session? Backups use almost entirely immutable files and directories, and immutable files are not vulnerable to collision problems. The only mutable directory is the top-level one (which contains the timestamped subdirectories and the "Latest" link). So the only potential danger is that the "tahoe backup" is modifying that directory while the "deep-check --repair" is repairing it. It's hard to say what the chances are of bad things happening here. A couple of thoughts: - "tahoe backup" modifies the top-level directory at the very end of the process, while "deep-check --repair" visits the top directory at the very beginning of the process. If you start both at the same time, they probably won't collide. - if the directory needed repairing, then the "tahoe backup" modify-directory operation will effectively repair it at the same time, perhaps reducing the chances that deepcheck--repair will try to repair it later - The chances of UCWE resulting in lost data depends upon the encoding parameters and how many simultaneous writers there are. With 3-of-10, assuming all shares are available, there'd have to be 5 simultaneous versions of the file before none of them are recoverable (two shares of version A, two of version B, two*C, two*D, two*E). Which theoretically means that one tahoe-backup writer, one repairer, and one previously-existing version should always result in at least one version being recoverable. But, this is highly dependent upon what sort of damage the repairer was trying to fix in the first place. > - if several deep-checks are being performed on directory, from > different gateways(due for example script error) - is it safe?(I > knew it does not make sense to do so but what will be worse possible > result?) (incidentally deep-check without --repair is always safe: it doesn't modify the shares at all) Multiple deep-check --repair operations on the same directory runs the same UCWE risk as multiple writers trying to modify a directory at the same time: the danger is that each will successfully replace shares on different servers at the same time, resulting in some old "A" shares, some new "B" shares, and some new (different) "C" shares. Having a variety of share versions reduces your recoverability margins. We haven't ever tried to seriously model or test this. It would be interesting to create a directory, set up multiple clients, have them all repeatedly hammer away at it (making modifications) and measure how many UCWEs they get, and when/if the file becomes unrecoverable. It'd probably be a good idea to instrument the storage servers to send details of how the shares are changing to a common logfile, so we could reconstruct the process later. cheers, -Brian _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From kb at karelbilek.com Sat Mar 17 10:53:19 2012 From: kb at karelbilek.com (=?ISO-8859-1?Q?Karel_B=EDlek?=) Date: Sat, 17 Mar 2012 18:53:19 +0100 Subject: [tt] [silk] library.nu In-Reply-To: <1331498371.12520.6.camel@anglachel> References: <20120311093151.GO9891@leitl.org> <1331498371.12520.6.camel@anglachel> Message-ID: There is something here http://free-books.us.to/ torrents of... I guess the index here (with magnet links) ftp://free-books.us.to/repository_torrent/ On Sun, Mar 11, 2012 at 9:39 PM, Ted Smith wrote: > hopefully of some value.> > > One of the things I've come to love about the sort of people that are on > tt/cypherpunks is that they tend to care more about action than > rhetoric. People can debate "intellectual property" and "pirates vs. > freedom fighters" forever, if you let them. But that seems not to happen > here, at least not very often. > > So, who has a library.nu rip? I'd seed it. > > [demime 1.01d removed an attachment of type application/pgp-signature > which had a name of signature.asc] From deirdremiranda at blueshieldca.com Sat Mar 17 07:00:06 2012 From: deirdremiranda at blueshieldca.com (Pat Mamie) Date: Sat, 17 Mar 2012 21:00:06 +0700 Subject: BEST quality generic CIALIS with 100% satisfaction guaranteed! wwmr Message-ID: <43z11v55s71-51783223-251a4o24@2vex8ef1mww2h> SPECIAL OFFER : CIALIS on SALE at $1.53 !!! Buy CIALIS at EXTRA LOW PRICES. Wide variety of generic and brand CIALIS packages. BEST quality generic CIALIS with 100% satisfaction guaranteed! http://fitnesspharmacytablets.ru From eugen at leitl.org Sat Mar 17 13:40:43 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 17 Mar 2012 21:40:43 +0100 Subject: [tahoe-dev] several questions about tahoe backup Message-ID: <20120317204043.GJ9891@leitl.org> ----- Forwarded message from Brian Warner ----- From kasivalene at mygothicblog.com Sat Mar 17 10:48:33 2012 From: kasivalene at mygothicblog.com (Dotty Lois) Date: Sat, 17 Mar 2012 23:48:33 +0600 Subject: Free Combo Pack with Your Viagra Order. No tablet splitting hassle! 50mg, 24 for $38, 48 for $68, 96 for $122.. 0020y21m Message-ID: <21r41c41s85-00245477-378s9w53@rszlyfmaa> Buy Viagra Online - $1.10 per Dose. No Prescription Required. Free Combo Pack with Order. No tablet splitting hassle! 50mg, 24 for $38, 48 for $68, 96 for $122.. 10%-20% Bonus on ReOrders! http://healthrxpills.ru From sylviatisha at bootsnall.com Sat Mar 17 18:51:10 2012 From: sylviatisha at bootsnall.com (DOROTHEAMELVINA) Date: Sun, 18 Mar 2012 00:51:10 -0100 Subject: Free Combo Pack with Your Viagra Order. No tablet splitting hassle! 50mg, 24 for $38, 48 for $68, 96 for $122.. 8mf2e Message-ID: <93p44e98t58-34603018-374j7d21@ccavdhubpq> Buy Viagra Online - $1.10 per Dose. No Prescription Required. Free Combo Pack with Order. No tablet splitting hassle! 50mg, 24 for $38, 48 for $68, 96 for $122.. 10%-20% Bonus on ReOrders! http://homerxmedspharmacy.ru From kb at karelbilek.com Sat Mar 17 17:16:21 2012 From: kb at karelbilek.com (=?ISO-8859-1?Q?Karel_B=EDlek?=) Date: Sun, 18 Mar 2012 01:16:21 +0100 Subject: [tt] [silk] library.nu In-Reply-To: References: <20120311093151.GO9891@leitl.org> <1331498371.12520.6.camel@anglachel> Message-ID: nope, the torrents are the books themselves (without any metadata) all the metadata is in one big csv here ftp://free-books.us.to/content/ it should be easy to reconstruct a mirror from these 2012/3/17 Karel Bmlek > There is something here > http://free-books.us.to/ > > torrents of... I guess the index here (with magnet links) > ftp://free-books.us.to/repository_torrent/ > > On Sun, Mar 11, 2012 at 9:39 PM, Ted Smith wrote: > >> > hopefully of some value.> >> >> One of the things I've come to love about the sort of people that are on >> tt/cypherpunks is that they tend to care more about action than >> rhetoric. People can debate "intellectual property" and "pirates vs. >> freedom fighters" forever, if you let them. But that seems not to happen >> here, at least not very often. >> >> So, who has a library.nu rip? I'd seed it. >> >> [demime 1.01d removed an attachment of type application/pgp-signature >> which had a name of signature.asc] From earliemarlene at gaiennie.com Sun Mar 18 08:09:31 2012 From: earliemarlene at gaiennie.com (Magdalene Vicki) Date: Sun, 18 Mar 2012 08:09:31 -0700 Subject: Replica Watches: Best Most Durable Fake Watches Sale Online Great designer replica watches for you at unmatched price. wub70l10 Message-ID: <26l74f59n35-67639570-729c4n52@ifxelgif> Best Replica Watches the Most Durable Fake Watches Sale Online Great designer replica watches for you at unmatched price. The exact fake watches will surely give you a splendid feeling. Absolutely worthwhile replica watches here! http://wholesalereplicashop.ru From eugen at leitl.org Sun Mar 18 02:49:05 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 18 Mar 2012 10:49:05 +0100 Subject: [tt] [silk] library.nu In-Reply-To: References: <20120311093151.GO9891@leitl.org> <1331498371.12520.6.camel@anglachel> Message-ID: <20120318094905.GL9891@leitl.org> On Sun, Mar 18, 2012 at 01:16:21AM +0100, Karel Bmlek wrote: > nope, the torrents are the books themselves (without any metadata) > > all the metadata is in one big csv here > ftp://free-books.us.to/content/ > > it should be easy to reconstruct a mirror from these You need the files themselves, the SQL DB dump (last one 261 MB, uncompressed 1.3 GByte), the PHP sources, and a http server with PHP and an SQL dbase (there's a standalone USBWeberserv version which can run from an USB flash stick which is presumably Windows-only. And about 8.5 TByte of disk space (789 directores, each about 10 GByte), of course. Can be spread over directories, the sources do allow for that. The site gives the following directions to set up a mirror (I have not done any of the above or below, so I can't vouch it will all work): Creating a mirror of the Library Genesis The Library Genesis has three main components: 1) book repository (book files) 2) MySQL database (book records) 3) Web-server (dynamic Web-pages to link the book records and book files, this is the libgen PHP source-code) As of writing this, there are just over 320,000 books in the Library Genesis repository. The book repository is broken up into directories of a 1000 books each. The name of each book is actually the MD5-hash of the file contents. This allows for robust querying and helps avoid duplicate entries. The MySQL database links book records with book in the repository. The Web-server hosts the PHP-files that request a book info from the database and serve it to the user. I. Download the libgen book repository. This is the easiest as well as the most time consuming process, as the repository is 2.5 TB! Going at 1.0MB/s, it would take a full month to completely download. Fortunately, the Library can function while incomplete! You will need a bittorrent client (e.g. utorrent for Windows or Transmission for Linux and Mac) and a RAR archive handler (e.g. 7-zip for Windows or unrar for Linux). If you do not have the unrar package on Ubuntu, you can install it easily: Code: $ sudo apt-get install unrar Then download the most recent .torrent archive of the repository from http://free-books.dontexist.com/repository_torrent/ . This file will have a name like 0-276.rar, meaning it has the torrents for the approximately 276000 books. Each .torrent file contains just one of the 1000-book directories. You can unpack this .rar: Code: $ unrar x 0-276.rar Then open up Transmission and start downloading every torrent. That's pretty much it for obtaining the repository. You may need more space, or to divide the repository up over multiple directories or hard drives. That's more than okay; libgen is robust enough to handle this. II. Install the MySQL database If you have not previously installed MySQL, you need to do that now. Code: $ sudo apt-get install mysql-server During installation, you will be asked to provide a password for the database's root user. Write this down as you will need it later. Make sure your MySQL server is running: Code: $ /sbin/service mysqld start And then you can issue commands to mysql using Code: $ sudo mysql Enter the following into the mysql prompt: Code: CREATE USER 'bookuser'@'localhost' IDENTIFIED BY 'bookpass'; GRANT USAGE ON * . * TO 'bookuser'@'localhost' IDENTIFIED BY 'bookpass' WITH MAX_QUERIES_PER_HOUR 0 MAX_CONNECTIONS_PER_HOUR 0 MAX_UPDATES_PER_HOUR 0 MAX_USER_CONNECTIONS 0 ; GRANT SELECT , LOCK TABLES ON `bookwarrior` . * TO 'bookuser'@'localhost'; You can then exit mysql with Code: exit After this, make sure you have downloaded the most recent MySQL database dump from your preferred libgen mirror (e.g. http://dl.dropbox.com/u/3268251/backup-last.rar). Extract the .sql file and save it to your machine under a name you can remember (e.g. dump.sql). To set up the database: Code: $ mysql -p -u root < dump.sql You will be prompted for your mysql password, and then your database should be set up. III. Get the webcode up and running First, make sure you have apache2 and php5 installed. Ubuntu comes with apache2 by default, but not php5. Code: $ sudo apt-get install php5 Restart apache2 after installing php5. Code: $ sudo /etc/init.d/apache2 restart Now download the source code for the website, again from your favorite mirror. (I use http://assembla.com/spaces/libgen ). Unpack it into a directory in your apache2 site directory (default /var/www). I use /var/www/libgen. Open up config.php and make the following edits: Code: // mysql params $dbhost = 'localhost'; $db = 'bookwarrior'; $dbtable = 'updated'; $dbuser = 'root'; $dbpass = 'My_pass_here'; // <-- Put your own MySQL password here Scroll down and make sure repository also points to the right place: Code: $repository = array( '0-300000' => '/path/to/libgen'); // <-- Put path to your libgen repository here. Last, but not least, create a file called index.php. It's contents should simply be: Code: And then just load up your web browser and navigatee to yourdomain.com/libgen/ And bam, there it is. IV. Things that can go wrong A few things can go wrong: 1) If you can get to the site but see nothing at all (blank page), it probably means you forgot to restart apache2 after installing php5. 2) If you don't have access to the site, your problem is probably with apache2 settings or web server settings. Try navigating to the site using http://127.0.0.1/libgen/. If you can get the site like this, but not through the Internet, make sure your network permissions are set up correctly. 3) If you try to download a book and get a File not found error, your apache2 probably can't access your books. Make sure apache has read access to all the books. You can do this by going to your repository directory and typing Code: chmod -R 755 * 4) A host of other things. Post on the forums if you have questions. They're really helpful there. The manual has grown from this topic. From coderman at gmail.com Sun Mar 18 11:21:04 2012 From: coderman at gmail.com (coderman) Date: Sun, 18 Mar 2012 11:21:04 -0700 Subject: cryptome.xxx Message-ID: http://cryptome.xxx/ :P jya++ From foreshadowedj3 at regio7.com Sun Mar 18 03:50:04 2012 From: foreshadowedj3 at regio7.com (=?koi8-r?B?18/azcXdxc7JxSDu5PM=?=) Date: Sun, 18 Mar 2012 18:50:04 +0800 Subject: =?koi8-r?B?7MXL1M/SIO3JzsbJziDp097J08zFzsnFIO7k8ywg0M/T0sXEzsnexdPL?= =?koi8-r?B?ycUgz9DF0sHDyck=?= Message-ID: <000d01cd04f4$e06c55e0$6400a8c0@foreshadowedj3> 30 марта 2012г. (Лекторы Минфин РФ) НДС. новые актуальные вопросы применения. НДС при совершении операций на внешнем и внутреннем рынках. ЛЕкторы Минфин РФ Читает программу по внутренним операциям НДС: Cоветник Отдела косвенных налогов департамента налоговой и таможенно-тарифной политики Минфина России. Читает программу по внешним операциям НДС: Ведущий советник Отдела косвенных налогов Департамента налоговой и таможенно-тарифной политики═Минфина России. 8 (499) 445\З9\68 \\\/// +7 499 ЧЧ54*095 Программа: 1. Налогоплательщики налога на добавленную стоимость. Операции, признаваемые объектом налогообложения. Операции, не признаваемые объектом налогообложения и освобождаемые от налогообложения. 2. Порядок определения налоговой базы по НДС. Момент определения налоговой базы при реализации товаров (работ, услуг), имущественных прав, в том числе по договорам, в которых обязательство по оплате выражено в иностранной валюте. Особенности определения налоговой базы при изменении стоимости товаров (работ, услуг) 3. Применение НДС при поставках товаров на экспорт. Порядок подтверждения обоснованности применения нулевой ставки НДС. 4. Налоговые вычеты, в том числе: * при осуществлении операций, подлежащих налогообложению по нулевой ставке; * при перечислении предварительной оплаты; * при приобретении товаров (работ, услуг) по договорам, в которых обязательство по оплате выражено в иностранной валюте; * при изменении стоимости товаров (работ, услуг). 5. Особенности применения НДС при выполнении работ (оказании услуг), облагаемых по нулевой ставке, в том числе работ (услуг), связанных с международной перевозкой 6. Порядок отнесения сумм НДС на затраты по производству и реализации товаров (работ, услуг). Порядок ведения раздельного учета, в том числе по ОС и НМА. Восстановление налога, в том числе при недостачах, получении субсидий, по объектам капитального строительства, при проведении модернизации (реконструкции) объектов недвижимости. 7. Применение НДС при возврате товаров 8. Порядок составления счетов-фактур (корректировочных счетов-фактур). Порядок регистрации счетов-фактур (корректировочных счетов-фактур) в книгах покупок и продаж. Декларация по НДС. 9. Определение места реализации работ (услуг) в целях применения НДС. 10. Исполнение обязанности налоговых агентов по НДС. 11. Исчисление НДС при осуществлении посреднических операций по реализации и приобретению товаров (по договорам комиссии, поручения и т.д.) 12. НДС при ввозе товаров на территорию Российской Федерации (определение налоговой базы, уплата НДС в зависимости от избранной таможенной процедуры, вычет уплаченных сумм налога). 13. Особенности применения НДС при осуществлении внешнеторговых операций в рамках Таможенного союза. Стоимость участия: 9000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 (499) 4Ч5ЧО95 или +7 (499) - 4Ч5_39.68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5017 bytes Desc: not available URL: From popechristoper at promero.com Sun Mar 18 10:56:03 2012 From: popechristoper at promero.com (Samantha M. Carr) Date: Sun, 18 Mar 2012 22:56:03 +0500 Subject: Penis Enlargement 100% 8-week money back j7hj97dh Message-ID: <77b62q76y42-20354048-700a6l44@rmcekonna> Penis Enlargement 100% 8-week money back Penis enlargement solutions are the best method today for men looking to increase their penises, including the width and the length. Hurry Up To Get The Discount Price And 3 Extra Secret Bonuses For Free! http://bestenlargementwear.ru From vladimira at aport.ru Sun Mar 18 14:15:41 2012 From: vladimira at aport.ru (Vladimir Arseniev) Date: Mon, 19 Mar 2012 01:15:41 +0400 Subject: [tahoe-dev] keeping private grids private Message-ID: Thanks for your responses, Markus and Brian. Running the grid on a VPN is still the best option, it seems (with firewall rules to block non-VPN traffic). Only VPN clients can see the introducer, and connect to other nodes on the VPN. But there are vulnerabilities. We've been using OpenVPN's commercial Access Server, which is presumably well secured. However, the setup is vulnerable to attackers with physical access to the server. We've mitigated the risk by encrypting the server's credential databases, but determined attackers can read passphrases from memory. We've tried running the server locally, and forwarding the access port to a VPS, but connections (through commercial VPNs) haven't been reliable enough, and latencies are huge. Still, we do control the introducer, and could readily move our grid to a new VPN, if necessary. OpenVPN's default star topology is also problematic, and creating mesh networks seems complicated. We've looked at CloudVPN, but nodes can be cloned, and there's no mechanism for refusing connections. Access control depends on firewall rules, and using a public DHCP server with static mapping and static ARP. That may be the way to go, however, if the OpenVPN server bottleneck becomes an issue. _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From lashundaregena at pioneer.com Mon Mar 19 02:06:37 2012 From: lashundaregena at pioneer.com (CARLEE CHERRYL) Date: Mon, 19 Mar 2012 02:06:37 -0700 Subject: Best Most Durable Fake Watches Sale Online Great designer replica watches for you at unmatched price. t0g9 Message-ID: <201203190703.DA7CFEBFE70195187CF5@7n86nn6fn> Best Replica Watches the Most Durable Fake Watches Sale Online Great designer replica watches for you at unmatched price. The exact fake watches will surely give you a splendid feeling. Absolutely worthwhile replica watches here! http://greatreplicabags.ru From kevacelestina at kbci.com Mon Mar 19 04:47:29 2012 From: kevacelestina at kbci.com (Melynda) Date: Mon, 19 Mar 2012 04:47:29 -0700 Subject: Buy Viagra Online - $1.10 per Dose. No Prescription Required. Free Combo Pack with Order. No tablet splitting hassle! 50mg, 24 for $38, 48 for $68, 96 for $122.. 3i1sn21c Message-ID: <45p43n51b25-23569939-213w2q13@davmhweu> Buy Viagra Online - $1.10 per Dose. No Prescription Required. Free Combo Pack with Order. No tablet splitting hassle! 50mg, 24 for $38, 48 for $68, 96 for $122.. 10%-20% Bonus on ReOrders! http://pharmacydrugstoredrugs.ru From margerydraper at adolfo-toledo.com Mon Mar 19 01:10:00 2012 From: margerydraper at adolfo-toledo.com (Dale Vickers) Date: Mon, 19 Mar 2012 05:10:00 -0300 Subject: Get Cheap Viagra here l85bul Message-ID: <201203190907.FE70974B5D84324957FE7C@w368k79ni> Viagra generic (Sildenafil) 34 Pills for $89 Free shipping Visa only Generic Viagra manufactured in Europe. Dispensed by licensed online pharmacy. No prescription needed. Get Cheap Viagra here http://buybestphysic.ru From eugen at leitl.org Mon Mar 19 00:30:17 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 19 Mar 2012 08:30:17 +0100 Subject: [tahoe-dev] keeping private grids private Message-ID: <20120319073017.GZ9891@leitl.org> ----- Forwarded message from Vladimir Arseniev ----- From ritualsabgm at pinoakranch.com Mon Mar 19 01:06:21 2012 From: ritualsabgm at pinoakranch.com (=?koi8-r?B?IuvVztbV1CAtIMTJ2sHKziDUxcvT1MnM0SAi?=) Date: Mon, 19 Mar 2012 09:06:21 +0100 Subject: =?koi8-r?B?7c/EztnFINDPxNXby8kgySDQzMHUy8k=?= Message-ID: <658436954B3C447486D51D8CE2A28462@cio34600933763> группа Вконтакте: - KunjutMag www.дизайн-текстиля.рф тел.: (812) 911-39-19 Быстро, КРАСИВО и недорого! Декоративные подушки - от 330руб. сумки-авоськи из габардина - от 590 руб. платки атласные, шифоновые - от 590 руб. сидушки на стулья - от 330 руб. любой дизайн любое изображение любая фотография любой логотип От 1 штуки. На любом текстильном изделии Покупай для себя. Дари друзьям. Начни свой бизнес вместе с НАМИ тел.: (812) 911-39-19 группа Вконтакте - KunjutMag www.дизайн-текстиля.рф From pulloverspq4 at indiandoctors.com Mon Mar 19 02:22:33 2012 From: pulloverspq4 at indiandoctors.com (=?koi8-r?B?IvHOxMXL0yDtxcTJwSI=?=) Date: Mon, 19 Mar 2012 10:22:33 +0100 Subject: =?koi8-r?B?8NLPxNfJzsXNIPfB2yDTwcrUINcg9O/wLTEwIQ==?= Message-ID: <7630D0E79B994C109D9AF3D03C8DFCFD@komp> Продвижение сайта в поисковых системах по ключевым словам. Телефон: (495) 774 89 66 Подробная информация на сайте: http://ЯндексМедиа.рф From margarito9 at raka.com Mon Mar 19 00:37:21 2012 From: margarito9 at raka.com (DOOR - DOOR) Date: Mon, 19 Mar 2012 10:37:21 +0300 Subject: =?koi8-r?B?8M/MztnKINPQxcvU0iDV08zVxyDQzyDNxdbE1c7B0s/EztnNINDF0sXX?= =?koi8-r?B?z9rLwc0gySDUwc3P1sXOzs/N1SDPxs/SzczFzsnALg==?= Message-ID: <8A0AD98BCC5E455088CD6778CA765418@admino2> Полный спектр услуг по международным перевозкам и таможенному оформлению. Осуществляем доставку импортных грузов ("DOOR - DOOR") Примеры: - Одежда из Европы - от 9 евро за кг. - Одежда из Китая - от 6 евро за кг. - Мебель из Европы - от 370 евро за м. куб. - Посуда из Европы - от 2 евро за кг. - Светильники из Турции - от 2 евро за кг. Для просчета Вашего груза сообщите нам: 1. Наименование 2. Количество 3. Вес 4. Объём 5. Отправитель 6. Страна происхождения 7. Адрес место забора груза 8. Инвойсовая стоимость груза • Предварительная подготовка сопроводительных документов. • Организация таможенного оформления на таможенных терминалах Москвы. • Способствуем в осуществлении денежных переводов изготовителю (продавцу) всего за 2% от стоимости по инвойсу. • Содействие в получении сертификатов. • Вы можете сравнить цены, по которым сейчас идут Ваши грузы. Для просчёта в реальном времени обращайтесь по скайпу: tamozhimvse или по телефону (495) 565 34 52 (многоканальный) Позвоните и наши менеджеры в кратчайшие сроки рассчитают для Вас стоимость доставки груза и его таможенного оформления. From stu.card at critical.com Mon Mar 19 09:10:08 2012 From: stu.card at critical.com (Stuart W. Card) Date: Mon, 19 Mar 2012 12:10:08 -0400 Subject: [tahoe-dev] Idea for a Publish/Subscribe Message System, on Tahoe-LAFS Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 all -- Sorry to chime in late and initially without reference citations, but I wanted you all to be aware of some work we have been doing recently at Syracuse University and my company Critical Technologies Inc., using Tahoe-LAFS as a principal building block for a publish-subscribe-query distributed blackboard that will be the backbone of a framework for distributed sensing/computation/control. A unifying theme is use of capability based security throughout the stack, from the underlying microkernel-based hypervisor all the way up through the mobile agent based applications. We are working towards compliance with OMG Data Distribution Service (DDS) API specs, but initially have done only proof-of-concept work without regard for such specs. We are looking at plugging in Tahoe as an archival message store for OpenDDS, OpenSplice or RTI-DDS. I am limited in what I can say in public prior to obtaining specific permission from our funding sources, but as Tahoe is a community supported product that is central to our architecture, I believe I can discuss here those aspects directly related to Tahoe development. I will go out on a limb and say that I think the whole notion of mutable files is a mistake. We currently use them only for directories, and there only until such time as we develop a replacement based on our architecture. Instead of mutable files, we prefer revision control: once a message (file) is published, it is immutable for all time; but a new version can be published, as either a complete snapshot or a diff (respect to rsync), with suitable meta-data markups and pointers in directories (also to be immutable but version controlled). To provide notification of new publications (including revisions of old ones), we use the NACK Oriented Reliable Multicast (NORM) transport protocol, which is the _only_ IETF standards track reliable multicast protocol that offers both statistical reliability (erasure code FEC) and acknowledged delivery (ARQ), combining them in a Type II Hybrid ARQ/FEC (which can approach the Shannon limit despite dynamically varying channel error rates). Urgent short messages that do not require persistent archival can also be sent via NORM without the latencies and costs inherent to Tahoe. Long term, we also want to enable use of NORM as a multicast transport for Tahoe, in place of multiple unicast TCP connections. We have some notions about using URIs as capabilities, not only for Tahoe, but also for the microvisor and other subsystems. We want to define a syntax and semantics for extended capability URIs that can embed policies (including PKI based restrictions on who can exercise the capability, thus integrating Role Based Access Control with capabilities), and short "handle" URIs (that merely reference long URIs with their embedded information). We intend to develop capability middleware (including proxies subsuming the capability security notion of "membrane") that will enable programmers and admins who are not [yet] familiar with capability security to nonetheless utilize it with a minimum of unintended capability leaks. If any of you find any of the above interesting and want to discuss it, please e-mail me directly, as (unfortunately) I can't go into much more detail on the list (I must obtain specific approval of the text of each "public release of information" that I make). - -- Stuart W. Card, PhD: VP & Chief Scientist, Critical Technologies Inc. * Creativity * Diversity * Expertise * Flexibility * Integrity * Suite 400 Technology Center, 4th Floor 1001 Broad St, Utica NY 13501 315-793-0248 x141 FAX -9710 www.critical.com -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk9nWmAACgkQS7PQ0a2weL7ZGwCgnPaITAgigg3PRPUhkNrul3pB Ur8An1ALUNdzXv76XlO18wkVnUpcjWN+ =/iWs -----END PGP SIGNATURE----- _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From laceywinter at input.com Mon Mar 19 04:34:23 2012 From: laceywinter at input.com (Jona Marshall) Date: Mon, 19 Mar 2012 12:34:23 +0100 Subject: Permanently Enlarge Your Penis at just $59 e7ws8y2i Message-ID: <201203191433.BE31D3E1C42F400FC58FF88@4tqr79qbqp> Penis Enlargement Pill - $59.95 Enlarge your penis size up to 3-4 Inches in length and up to 25% in girth with most powerful and 100% Natural and Safe MaxPro Penis Enlargement Pills. Risk free 60-day money back guarantee. http://penisstorefast.ru From eugen at leitl.org Mon Mar 19 06:44:09 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 19 Mar 2012 14:44:09 +0100 Subject: bitcoin is worse is better Message-ID: <20120319134408.GN9891@leitl.org> http://www.gwern.net/Bitcoin%20is%20Worse%20is%20Better Bitcoin is Worse is Better Home Site Me 26 Jan 2012 Bitcoin's long gestation indicates it is an example of the 'Worse is Better' paradigm Pre-requisites Delay Impractical? Contemporary objections Cryptographers' objections Aesthetics How Worse is Better External links Some wonder who is the real man under the Satoshi Nakamoto mask; a hard question - how many libertarian cryptographers are there? But the interesting thing is, Satoshi could be anybody. Bitcoin involves no major intellectual breakthroughs, so Satoshi need have no credentials in cryptography or be anything but a self-taught programmer! Satoshi published his whitepaper May 20091, but if you look at the cryptography that makes up Bitcoin, they can basically be divided into: Public key cryptography Cryptographic signatures Cryptographic hash functions Hash chain used for proof-of-work Hash tree Bit gold cryptographic time-stamps Pre-requisites "So the first answer to Why Now? is simply 'Because it's time.' I can't tell you why it took as long for weblogs to happen as it did, except to say it had absolutely nothing to do with technology. We had every bit of technology we needed to do weblogs the day Mosaic launched the first forms-capable browser. Every single piece of it was right there. Instead, we got Geocities. Why did we get Geocities and not weblogs? We didn't know what we were doing."2 The interesting thing is that by even the most generous accounting, all the pieces were in place for at least 8 years before Satoshi's publication, which was followed more than half a year later3 by the first public4 prototype. If we look at the citations in the whitepaper and others, and then order the relevant technologies by year in descending order: 2001-20055: Nick Szabo, Bit Gold 2001: SHA-256 finalized 1998: Wei Dai, B-money6 1997: HashCash 1992-1993: Proof-of-work for spam7 1991: cryptographic timestamps 1980: public key cryptography8 1979: Hash tree This lack of novelty is part of the appeal - the fewer new parts of a cryptosystem, the less danger9. All that was lacking was a Satoshi to start a Bitcoin. Delay But why this delay? If the idea is easy to understand and uses basic ideas10, if it is very far from the cutting-edge of cryptography11, then there's no obvious reason it would not be seriously tried. Certainly the cypherpunks of the '90s were wildly creative, inventing everything from Cypherpunk/Mixmaster to MojoNation to assassination markets to data havens (memorably depicted in Cryptonomicon). We have already seen 2 of their proposed cryptocurrencies, and proof-of-work was one of the most common proposals to deal with the rising tsunami of spam12. Why did Bitcoin take a decade to be born? The problem nags at me - similar to the historical question of why England experienced the Industrial Revolution and grew to empire, and not China, which seems better equipped in every respect13. There must be an answer. Impractical? Is the problem one of resources? In the whitepaper, Satoshi remarks: A block header with no transactions would be about 80 bytes. If we suppose blocks are generated every 10 minutes, 80 bytes * 6 * 24 * 365 = 4.2MB per year. With computer systems typically selling with 2GB of RAM as of 2008, and Moore's Law predicting current growth of 1.2GB per year, storage should not be a problem even if the block headers must be kept in memory. That's fine to say in 2008, after many doublings. Would memory be a problem in the 1990s? It doesn't have to be. The difficulty of bitcoin mining is obviously adjustable, so the problem boils down to: disk usage With a smaller hash like SHA114, the 80 bytes can be shrunk 10 minutes is not graven in stone; why not 20 minutes? Right there we have halved the hash tree the hash tree can be 'garbage collected' and shrunk15 it is only necessary to maintain a full hash tree if one is paranoid. In practice, like many programs of the era such as mail or Usenet clients, the default could simply be to hold onto the last n blocks/hashes (Satoshi estimates 12kb/day); this would consume a limited amount of disk space. network connectivity is solvable by solutions to #1 A function of the existing hash tree size And frequency of new transactions It's worth pointing out that it's generally expected that at some point ordinary desktop users like you or me are expected to stop being full-fledged nodes and bitcoin miners and will instead make use of some specialist service running powerful servers of its own; in a counterfactual universe where Bitcoin was begun in the early 1990s, the changeover would simply have occurred sooner. (And with all the investment money desperately investing in the first Internet bubble, it would be quite easy to start such a service regardless of the technical demands.) Contemporary objections As well, few of the objections to cryptocurrencies seem to have been "computers which can run it are fantastically expensive"16. In computing, applications and techniques are often invented many decades before Moore's law makes them practically useful17, but this does not seem to have happened with Bitcoin. A similar objection obtains with patents or published papers; if Bitcoin was a known idea, where are they? I have yet to see anybody point out what patents might have deterred cryptography researchers & implementers; the obvious answer is that there were none. Because there was no investor interest? Not that Satoshi needed investors, but there were a tremendous number of online payment services started in the '90s, each searching for the secret sauce that would let them win 'mindshare' and ride 'network effects' to victory; DigiCash again comes to mind. So if the basic idea is accessible, and it's useful on consumer-grade hardware for the last 20 years or so, then what's the problem? Cryptographers' objections I think it's instructive to look at Satoshi's ANN thread on the Cryptography newsgroup/mailing list; particularly the various early criticisms: disk/bandwidth won't scale18 proposal is underspecified (omitting all the possible race conditions and desynchronization attacks and scenarios in a distributed system) and details available only in ad hoc code19 conflating transactions with bitcoin creation requires constant inflation it is very difficult to achieve consensus on large amounts of distributed data even without incentives to corrupt it or attacks domination of the hash tree by fast nodes and starvation of transactions pseudonymity & linkable transactions20 (irreversible transactions also implies double-spend must be very quickly detectable) As well, let's toss in some recent blog posts on Bitcoin by the cryptographer Ben Laurie and Victor Grischchenko; Laurie particularly criticizes21 the hash-contest which guarantees heavy resource consumption: "Bitcoin" "Bitcoin 2" "Bitcoin is Slow Motion" "Decentralised Currencies Are Probably Impossible: But Letbs At Least Make Them Efficient" "Bitcoin?" What's the common thread? Is there any particular fatal flaw of Bitcoin that explains why no one but Satoshi came up with it? Aesthetics No! What's wrong with Bitcoin is that it's ugly. It is not elegant22. It's clever to define your bitcoin balance as whatever hash tree is longer, has won more races to find a new block, but it's ugly to make your network's security depend solely on having more brute-force computing power than your opponents, ugly to need now and in perpetuity at least half the processing power just to avoid double-spending23. It's clever to have a P2P network distributing updated blocks which can be cheaply & independently checked, but there are tons of ugly edge cases which Satoshi has not proven (in the sense that most cryptosystems have security proofs) to be safe and he himself says that what happens will be a 'coin flip' at some points. It's ugly to have a hash tree that just keeps growing and is going to be gigabytes and gigabytes in not terribly many years. It's ugly to have a system which can't be used offline without proxies and workarounds, unlike Chaum's elegant solution24. It's ugly to have a system that has to track all transactions, publicly; even if one can use bitcoins anonymously with effort, that doesn't count for much - a cryptographer has learned from incidents like anon.penet.fi and decades of successful attacks on pseudonymity25. And what's with that arbitrary looking 21 million bitcoin limit? Couldn't it have been a rounder number or at least a power of 2? (Not that the bitcoin mining is much better, as it's a massive give-away to early adopters. Coase's theorem may say it doesn't matter how bitcoins are allocated in the long run, but such a blatant bribe to early adopters rubs against the grain. Again, ugly and inelegant.) Bitcoins can simply disappear if you send them to an invalid address. And so on. How Worse is Better In short, Bitcoin is a perfect example of Worse is Better (original essay). You can see the tradeoffs that Richard P. Gabriel enumerates: Bitcoin has many edge cases; it lacks many properties one would desire for a cryptocurrency; the whitepaper is badly underspecified; much of the behavior is socially determined by what the miners and clients collectively agree to accept, not by the protocol; etc. But it seems to work. Just like Unix, there were countless ways to destroy your data or crash the system, which didn't exist on more 'proper' OSs like OpenVMS, and there were countless lacking features compared to systems like ITS or the Lisp machine OSs. But like the proverbial cockroaches, Unix spread, networked, survived - and the rest did not.26 A cryptographer would have difficulty coming up with Bitcoin because it is so ugly and there are so many elegant features he wants in it. Programmers and mathematicians often speak of 'taste', and how they lead one to better solutions. A cryptographer's taste is for cryptosystems optimized for efficiency and theorems; it is not for systems optimized for virulence, for their sociological appeal27. Centralized systems are natural solutions because they are easy, like the integers are easy; but like the integers are but a vanishingly small subset of the reals, so too are centralized systems a tiny subset of decentralized ones28. DigiCash and all the other cryptocurrency startups may have had many nifty features, may have been far more efficient, and all that jazz, but they died anyway. They had no communities, and their centralization meant that they fell with their corporate patrons. They had to win in their compressed timeframe or die out completely. But "that is not dead which can eternal lie". It may be that Bitcoin's greatest virtue is not its deflation, nor its microtransactions, but its viral distributed nature; it can wait for its opportunity. "If you sit by the bank of the river long enough, you can watch the bodies of your enemies float by." External links Silk Road -(using the Silk Road marketplace) Original essay published on Bitcoin Weekly (7 comments) Reddit discussion Hacker News discussion Nick Szabo's reply/rebuttal, "Bitcoin, what took ye so long?" bitcoin.org was registered 18 August 2008, so presumably Satoshi had been developing the bitcoin idea at least as early as 2008.b) "A Group Is Its Own Worst Enemy", by Clay Shirky, published July 1, 2003 on the "Networks, Economics, and Culture" MLb) The first revision in the Github repository is dated August 2009 by 'sirius-m'.b) Satoshi claims that before he write the whitepaper, he wrote a prototypeb) It's hard to figure out when Szabo devised bit gold; his post claims to be from December 2008 but the URL indicates 2005 and it is linked in November 2008 emails. Szabo has long been interested in proof-of-work systems, writing on them in ~1998. A paper started in 2001 motivates the existence of bit gold and describes, but that may be material from the 2004 or 2005 revisions. Hal Finney mentioned bit gold in 2008 (in the context of a bitcoin discussion) describing Szabo's proposal as 'many years ago', and inasmuch as Hal has been active in cryptography circles since the '80s (was a member of the Cypherpunks mailing list etc.), it seems unlikely Hal was speaking of something then just 3 years ago.b) In the same vein of 'the network is a third party which keeps a copy of all signed transactions', you could include Ian Grigg's 2005 paper "Triple Entry Accounting".b) "Pricing via Processing, Or, Combating Junk Mail", , Dwork 1993, published in CRYPTO'92.b) This is Satoshi's citation date; Diffie-Hellman, the first published system, was in 1976, not 1980.b) In cryptography, new parts are guilty until proven innocent. Hundreds of past systems have been broken, sometimes after decades of study & use.b) I am only a layman with an interest in cryptography, but I am not alone in seeing this lack of really novel primitives or ideas in the Bitcoin scheme; Ben Laurie expresses exactly this idea in an aside in a blog post attacking Bitcoin: "A friend alerted to me to a sudden wave of excitement about Bitcoin. I have to ask: why? What has changed in the last 10 years to make this work when it didn't in, say, 1999, when many other related systems (including one of my own) were causing similar excitement? Or in the 20 years since the wave before that, in 1990? As far as I can see, nothing." b) One thinks of the formidable mathematical difficulties surrounding the area of homomorphic encryption where one would expect any breakthrough to be from a bona fide genius, or at least a credentialed expert.b) Although ironically, proof-of-work never seemed to go into widespread use because of general inertia and because to deter large amounts of spam, proof-of-work would deter legitimate users under some models; spam seems to have been kept in check by better filtering techniques (eg. Paul Graham's "A Plan for Spam" using Bayesian spam filtering) and legal action against botnets & spammers.b) For more on that history, see Wikipedia on Industrial Revolution#Causes for occurrence in Europe, Chinese_industrialization#Reasons_for_the_delay_in_industrialization, the Great Divergence; I strongly recommend Gregory Clark's A Farewell to Alms.b) SHA-1, as of 2011, has not been cracked in practice.b) My understanding is that simply no one has bothered to program this functionality since 400MB is not that much space.b) Or rather, the objections were that cryptocurrencies had to be mobile - usable on the contemporary PDAs and cellphones, with the computing power of a watch.b) Garbage collection and most of artificial intelligence (or machine learning in particular) seem to have waited decades for sufficiently fast hardware. Indeed, I sometimes feel that Alan Kay's entire career has essentially been sketching out what he could do if only he had some decent cheap hardware.b) It probably will. Some informal projections have been made of what it would take to run millions of transactions worth trillions of dollars, and they tend to come in at comparable to the existing resource use of companies like Google (which fund their own power plants or monopolize convenient hydroelectric dams to run their datacenters).b) Recent criticism, too, sometimes focuses on the quality of the C++ codebase and ad hoc nature of many of the choices; from an anonymous Facebook comment: "The protocol is not well-defined and clearly designed by an amateur (that is, not someone who has done much protocol implementation work). It's a binary protocol with a smattering of length-prefixing, null terminated strings, etc. The messages look reasonable, just a horrible encoding. The rules of the protocol are poorly defined and tightly coupled to implementation; the implementation is done by someone who feels it's good and well to have only 5 major source files for 17 KLOC. Due to lack of a well-specified protocol, there is also a bit of client monoculture going on. It's worth noting that the whole system assumes SHA-256 -- the bitcoin community says that rolling over to something else is just a matter of introducing a new algo, but in actuality it's not nearly that simple. The protocol has no concept of upgrading to different algos, so it would necessitate a complete overhaul of the protocol (since there's a lot of 32-byte fields in there) AND a re-computation/rollover of the entire transaction history. ...The protocol also has had no thought put into it re: network architecture -- there are peers and that's it. Due to the cryptographic nature of transactions, it's simply not possible to have realtime transactions with bitcoin as the network scales (it already take 5-10 mins on average for the network to see a single transaction). Thus, there will need to be some concept of a node in the network that can facilitate interactions between two peers in a faster fashion, with the assumption of a measure of trust. You shouldn't require it, of course, but it should be defined, I think." Security expert Dan Kaminsky is similarly appalled at the bandwidth requirements to scale (":0" was his emoticon) and predicts that the Bitcoin network will eventually turn into a quasi-bank-like oligarchy of supernodes (which changes the system and "offers a host of ugly semantics" since the supernodes "don't need 50% -- just need to inconvenience 50% to accept your opinion"). He comments that while "Normal Code" seems good but "Scratch the surface, it's actually really bad", the Bitcoin codebase "Looks really bad up front" and "Scratch the surface, it's actually surprisingly good". New Yorker article's "The Crypto-currency: Bitcoin and its mysterious inventor": "'When I first looked at the code, I was sure I was going to be able to break it', Kaminsky said, noting that the programming style was dense and inscrutable. 'The way the whole thing was formatted was insane. Only the most paranoid, painstaking coder in the world could avoid making mistakes.'...He quickly identified nine ways to compromise the system...when he found the right spot, there was a message waiting for him. 'Attack Removed', it said. The same thing happened over and over, infuriating Kaminsky. 'I came up with beautiful bugs', he said. 'But every time I went after the code there was a line that addressed the problem.'...'I've never seen anything like it', Kaminsky said, still in awe...'Either there's a team of people who worked on this', Kaminsky said, 'or this guy is a genius.'" On a technical basis, he dislikes the use of SHA-256 as opposed to slower time-lock crypto functions like bcrypt, because SHA-256 "can be accelerated massively with GPUs" leading to GPU shortages and massive hashing disparities between peers, and his slides conclude "BitCoin is actually well designed, if you accept that anonymity and scaling forces the entire present model to be shifted into something that effectively looks like banking"b) Nick Szabo, discussing Chaumian ecash ("the greatest simple equation since e=mc2"), comments with almost palpable distaste of a hypothetical system akin to Bitcoin in this respect: "A use-once-address communications mix plus forswearing any reputation gain from keeping accounts, in theory also buys us unlinkability, but a communications mix [BTC: "mixing service"; not necessarily easy] is weak and very expensive." The most widely known, popular, and secure communications mix is probably Tor; a number of flaws have been found in it over time, and Tor will never be very secure - it's fundamentally difficult to impossible to have a anonymizing communications mix which is also near real-time. Some flaws can't be removed by the Tor network, like the ability of exit nodes to snoop on traffic (as has been done many times, most memorably during the startup of Wikileaks). Communications mixes are usually expensive in resources, so typically only make up a part of an overall network - and the rest of the network leaks considerable information, including in Bitcoin.b) Perry Metzger summarizes Laurie's approach: "I think people have missed the more subtle point that Ben Laurie made here. Bitcoin requires the use of an unusual sort of secure consensus protocol to work reliably, and such protocols are not known to exist in this context. In the presence of such a protocol, however, there is no longer any need for mining -- the system can simply elect a member to acquire a new coin every N seconds via a secure election protocol (and those are known given the rest). Thus, Ben's point that if you're going to have a system like bitcoin, one could at least have an efficient system of this sort rather than a stupid one based on an electrical potlatch." b) Not everyone agrees with me or those initial posters, though; "Bitcoins create truly democratic policy, followers say", Canada.com: '"It's like the Mona Lisa." said Bruce Wagner, an IT consultant who discovered bitcoin in October and now hosts an online TV show about it. "It's a masterpiece of technology."' b) "Decentralised Currencies Are Probably Impossible: But Letbs At Least Make Them Efficient", Ben Laurie: "Now that we understand the core problem, namely that of agreement, we can quite easily understand Bitcoinbs solution to the problem. Bitcoin defines the consensus group as ball the computing power in existenceb, and requires participants to prove their possession of whatever fraction of this power they care to spend on Bitcoin by using it to produce proof-of-work tokens. And once we state the problem like this, we can quite clearly see the flaw. Until at least half of the computing power in existence is actually used to produce Bitcoins, we cannot know that we have consensus! If, for example, 1% of the total power availableStrictly, I mean energy rather than power, since Bitcoin actually, in effect, sums power over time. is used to produce Bitcoins at present (in fact, the amount is far less than that), then at any point someone could come along with a further 1.1% of the total power and use this to define their own consensusBy forking history right back to the first block, and producing a hash chain that is longer than the current consensus., thus invalidating all the work, and all the money, of the initial group, and instead take possession of the entire currency for themselves. ...Even worse, it is clear that arriving at the equilibrium state for Bitcoin is incredibly expensive: half of all the computing power in existence must be burnt, in perpetuity, maintaining agreement about the current state of the currency. It also unknowable: we can never be sure that we actually are burning half of all the power in existence, because we do not know how much power exists." Laurie points out that in practice, the Bitcoin community does depend on a centralized authority which periodically passes down 'blessed' block-chains - the Bitcoin developers periodically hardwire known-good states of the block-chain into the clients (which of course is a theoretical weakness).b) Chaum pays a price for his systems' ability to work offline. Don't take my word for it; see Tim May in section 12.6.6 of his early '90s Cyphernomicon (not to be confused with Stephenson's novel drawing heavily on it): "...Chaum went to great lengths to develop system which preserve anonymity for single-spending instances, but which break anonymity and thus reveal identity for double-spending instances. I'm not sure what market forces caused him to think about this as being so important, but it creates many headaches. Besides being clumsy, it require physical ID, it invokes a legal system to try to collect from "double spenders", and it admits the extremely serious breach of privacy by enabling stings. For example, Alice pays Bob a unit of money, then quickly Alice spends that money before Bob can...Bob is then revealed as a "double spender," and his identity revealed to whomever wanted it...Alice, IRS, Gestapo, etc. A very broken idea. Acceptable mainly for small transactions. Multi-spending vs. on-line clearing I favor on-line clearing. Simply put: the first spending is the only spending. The guy who gets to the train locker where the cash is stored is the guy who gets it. This ensure that the burden of maintaining the secret is on the secret holder. When Alice and Bob transfer money, Alice makes the transfer, Bob confirms it as valid (or verifies that his bank has received the deposit), and the transaction is complete. With network speeds increasing dramatically, on-line clearing should be feasible for most transactions. Off-line systems may of course be useful, especially for small transactions, the ones now handled with coins and small bills." b) For example, see some of the most recent research I linked in Death Note: L, Anonymity & Eluding Entropy.b) The UNIX-HATERS Handbook, which contains many entertaining and often still-applicable descriptions of the fecklessness and sharp edges of Unixes, also contains an extremely funny 'Anti-Foreword' by Dennis Ritchie: "To the contributors to this book: I have succumbed to the temptation you offered in your preface: I do write you off as envious malcontents and romantic keepers of memories. The systems you remember so fondly (TOPS-20, ITS, Multics, Lisp Machine, Cedar/Mesa, the Dorado) are not just out to pasture, they are fertilizing it from below...You claim to seek progress, but you succeed mainly in whining. Here is my metaphor: your book is a pudding stuffed with apposite observations, many well-conceived. Like excrement, it contains enough undigested nuggets of nutrition to sustain life for some. But it is not a tasty pie: it reeks too much of contempt and of envy. Bon appetit!" b) Many anonymous commenters point this out because it makes Bitcoin smell like some sort of Ponzi scheme or multilevel marketing scheme: "Bitcoin, like the recent commercial phenomenon Groupon, tends to turn people into marketers because they feel they have something to gain, however small it might be in the end; I think that partly accounts for its temporary success." Or "The Rise and Fall of Bitcoin", Wired: "Stefan Brands, a former ecash consultant and digital currency pioneer, calls bitcoin bcleverb and is loath to bash it but believes itbs fundamentally structured like ba pyramid schemeb that rewards early adopters." John Robb, "More Thoughts on Bitcoin": "Lots of people are saying: "The deflation built into bitcoin was a terrible idea. People are getting rich." In fact, it was a brilliant idea. It brought in speculators (people that are buying/selling it as if in a game). It created a bubble. The bubble put it on the map. The bubble has attracted thousands of developers/participants. Think of how the Netscape IPO fueled the Web/Internet." b) Decentralized systems are usually convertible into centralized systems easily, while the converse is not true. (Much like parallel versus serial programming - to make a parallel program serial, just insert a lot of blocking.) For a simple example, consider cases where n=2: imagine a BitTorrent swarm (a decentralized system) with one seed and one leech. Or take Distributed Revision Control Systems like Darcs or Git; it's a commonplace to point out that if a group really wants a 'centralized' workflow, they can just designate one particular repository the 'master' canonical repository and continue onwards with the DVCS as a more capable replacement for Apache Subversion or CVS.b) From treadlesacc667 at levegetarien.com Sun Mar 18 23:42:26 2012 From: treadlesacc667 at levegetarien.com (=?koi8-r?B?IvfMwcTJzcnSIg==?=) Date: Mon, 19 Mar 2012 15:42:26 +0900 Subject: =?koi8-r?B?89DB08XNIPfB29Ug4tXIx8HM1MXSycA=?= Message-ID: Сердце любого бизнеса - Бухгалтерия, и оно может остановиться по вине заказных проверок конкурентов и органов. Правильное решение - перенос бухгалтерии и важных органов бизнеса на заграничные сервера. Ваш бизнес никогда не остановится, круглосуточный удаленный доступ, работать можно из дома. Перенесем бухгалтерию, базы данных и любые программы на мощные сервера в современные датацентры Европы и Америки. Работа на удаленных серверах существенно повысит вашу безопасность, поможет сократить расходы на офисное программное обеспечение и оборудование. Возьмем Ваш офис на ИТ обслуживание. Создадим сайт, персональную почту. Индивидуальный подход, решаем любые задачи из области ИТ. "Персональные" услуги под конкретные задачи. 12 лет в теме. Любые формы рассчетов. +79031039419 Владимир  ivanov.37 at qip.ru From peroxidedo94 at ernesttubb.com Mon Mar 19 00:08:45 2012 From: peroxidedo94 at ernesttubb.com (=?koi8-r?B?IvTp8O/n8uHm6fEi?=) Date: Mon, 19 Mar 2012 16:08:45 +0900 Subject: =?koi8-r?B?7e/24erz6+HxIPTp8O/n8uHm6fEgLSDj5e7v9+HxIOH04evhIO7hIO3v?= =?koi8-r?B?8+vv9/Pr6eog7+bz5fQ=?= Message-ID: МОЖАЙСКАЯ ТИПОГРАФИЯ - ЦЕНОВАЯ АТАКА НА МОСКОВСКИЙ ОФСЕТ Предлагаем ЛУЧШИЕ (гарантировано!) условия по ЦЕНЕ/качеству офсетной и цифровой печати на территории Москвы и области Уникальные цены на -каталоги, журналы, плакаты, листовки, POS, буклеты, бумажные пакеты и т.п. (Машины формата А1, А3, конгрев, тиснение, выборочный лак, ВШРА, ламинация) Позвоните нам и посчитайте Ваши тиражи! Сайт: www.логотип-л.рф Представительство в Москве 589-76-12 Почта: log at maillog.ru From trotsky3 at emsmail.com Mon Mar 19 06:19:56 2012 From: trotsky3 at emsmail.com (=?koi8-r?B?IuvSwdPLwSDEzNEgxM/Sz9bOz8og0sHazcXUy8ki?=) Date: Mon, 19 Mar 2012 16:19:56 +0300 Subject: =?koi8-r?B?69LB08vBIMTM0SDEz9LP1s7PyiDSwdrNxdTLySD1y9LByc7BLg==?= Message-ID: <0CB01BC3A8B64135B8AF58C372D209E7@al5c1d0ad19a96> Краска для дорожной разметки Украина. Тел: +38 (0472) 54-42-70 From slkjsj at msn.com Mon Mar 19 00:41:04 2012 From: slkjsj at msn.com (X Ђ܂) Date: Mon, 19 Mar 2012 16:41:04 +0900 Subject: No subject Message-ID: <201203190741.q2J7f1LY015279@proton.jfet.org> 軽いお食事・カラオケ同伴だけでお小遣いがもらえる!? 心配無用!!登録料・紹介料なんて一切ありません!! 何故こんな事が可能なのか…⇒ http://sukimono.info/a3efm01/ 興味がおあり方は是非早めのご参加を!! http://sukimono.info/a3efm01/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From eugen at leitl.org Mon Mar 19 09:11:22 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 19 Mar 2012 17:11:22 +0100 Subject: [tahoe-dev] Idea for a Publish/Subscribe Message System, on?Tahoe-LAFS Message-ID: <20120319161122.GZ9891@leitl.org> ----- Forwarded message from "Stuart W. Card" ----- From bbrewer at littledystopia.net Mon Mar 19 14:36:50 2012 From: bbrewer at littledystopia.net (bbrewer) Date: Mon, 19 Mar 2012 17:36:50 -0400 Subject: "The Pirate Bay Attacks Censorship With Low Orbit Server Drones" (torrentfreak.com) Message-ID: <4F67A6F2.9060502@littledystopia.net> http://torrentfreak.com/the-pirate-bays-attacks-censorship-with-server-drones-120318/ The Pirate Bay Attacks Censorship With Low Orbit Server Drones ErnestoMarch 18, 2012145 tpbPrint In recent months The Pirate Bay has drastically changed its site to make it less vulnerable to ever increasing censorship attempts across the globe. But that was just the start, as the torrent site now says its getting ready to put some of its hardware in GPS controlled drones. Everyone knows WHAT TPB is. Now theyre going to have to think about WHERE TPB is, The Pirate Bay team told TorrentFreak. It is no secret that Hollywood wants The Pirate Bay to shut down. But to accomplish this authorities may soon have to shoot down the sites servers as these will be hovering in the air. The Pirate Bay today unveiled their new mission. Theyre working on hosting parts of their site in GPS-controlled drones, instead of old-fashioned data centers. Everyone knows WHAT TPB is. Now theyre going to have to think about WHERE TPB is, The Pirate Bay team told TorrentFreak. We were further informed that the first drone will probably fly above international waters. Were already the most resilient and the most down to earth. Thats why we need to lift off, being this connected to the ground doesnt feel appropriate to us anymore, TPB told us. Although the line between reality and fantasy can be rather thin at The Pirate Bay, we were assured that the plan to launch a drone is real. TPBs new host? In a blog post Hollywoods arch-rivals half reveal some more details about the unconventional plan. With the development of GPS controlled drones, far-reaching cheap radio equipment and tiny new computers like the Raspberry Pi, were going to experiment with sending out some small drones that will float some kilometers up in the air. This way our machines will have to be shut down with aeroplanes in order to shut down the system. A real act of war. Were just starting so we havent figured everything out yet. But we cant limit ourselves to hosting things just on land anymore. These Low Orbit Server Stations (LOSS) are just the first attempt. With modern radio transmitters we can get over 100Mbps per node up to 50km away. For the proxy system were building, thats more than enough. The drone plan is yet another move to make it harder to censor or shutdown The Pirate Bay. Last month the file-sharing site traded in torrents for magnets for the exact same reason, and behind the scenes The Pirate Bay team is making more adjustments. Looking ahead, The Pirate Bay team thinks the site may no longer be hosted on this planet. When the time comes we will host in all parts of the galaxy, being true to our slogan of being the galaxys most resilient system. And all of the parts well use to build that system on will be downloadable. Interesting times.. From stagingzm003 at nistrans-bali.com Mon Mar 19 05:18:59 2012 From: stagingzm003 at nistrans-bali.com (=?koi8-r?B?IvLB09PZzMvJINDPIMUtzcXJzCI=?=) Date: Mon, 19 Mar 2012 17:48:59 +0530 Subject: =?koi8-r?B?OCDSwdPT2czPyyDawSAxMCAwMDAg0tXCzMXKIA==?= Message-ID: <006404200.77185364818248@nistrans-bali.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 1505 bytes Desc: not available URL: From te4amn at gmail.com Mon Mar 19 06:21:22 2012 From: te4amn at gmail.com (v zq) Date: Mon, 19 Mar 2012 22:21:22 +0900 Subject: No subject Message-ID: <201203191329.q2JDTgFW020288@proton.jfet.org> 女性用風俗系サイトとして多くの方々に利用されている 当サイトですが、現在女性メンバーに対して 男性メンバーが慢性的に足りない状況です。 仕事内容は寂しい女性のお相手をするだけ 基本的には性欲を満足させるセフレのお仕事になります。 謝礼額は2時間1〜5万円程度。 別途ホテル代・交通費・食事代などが 女性会員様のご負担となります。 詳細はこちら▽ http://sukimono.info/a3efm01/ 男性は登録料から退会まで費用はかかりません。 これらもすべて女性会員様のご負担となっております。 年齢容姿不問。未経験者大歓迎です。 一度だけのメンバー体験も随時募集しています。 http://sukimono.info/a3efm01/ このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp From exterminated at hchauntedforest.com Mon Mar 19 22:24:34 2012 From: exterminated at hchauntedforest.com (DOOR - DOOR) Date: Tue, 20 Mar 2012 00:24:34 -0500 Subject: =?koi8-r?B?8M/MztnKINPQxcvU0iDV08zVxyDQzyDNxdbE1c7B0s/EztnNINDF0sXX?= =?koi8-r?B?z9rLwc0gySDUwc3P1sXOzs/N1SDPxs/SzczFzsnALg==?= Message-ID: <67E68532B08D441780E9E6623CAE7E8A@casa60aeebc830> Полный спектр услуг по международным перевозкам и таможенному оформлению. Осуществляем доставку импортных грузов ("DOOR - DOOR") Примеры: - Одежда из Европы - от 9 евро за кг. - Одежда из Китая - от 6 евро за кг. - Мебель из Европы - от 370 евро за м. куб. - Посуда из Европы - от 2 евро за кг. - Светильники из Турции - от 2 евро за кг. Для просчета Вашего груза сообщите нам: 1. Наименование 2. Количество 3. Вес 4. Объём 5. Отправитель 6. Страна происхождения 7. Адрес место забора груза 8. Инвойсовая стоимость груза • Предварительная подготовка сопроводительных документов. • Организация таможенного оформления на таможенных терминалах Москвы. • Способствуем в осуществлении денежных переводов изготовителю (продавцу) всего за 2% от стоимости по инвойсу. • Содействие в получении сертификатов. • Вы можете сравнить цены, по которым сейчас идут Ваши грузы. Для просчёта в реальном времени обращайтесь по скайпу: tamozhimvse или по телефону (495) 565 34 52 (многоканальный) Позвоните и наши менеджеры в кратчайшие сроки рассчитают для Вас стоимость доставки груза и его таможенного оформления. From catheylakesha at carrier.utc.com Mon Mar 19 21:27:33 2012 From: catheylakesha at carrier.utc.com (DELMA CHERLY) Date: Tue, 20 Mar 2012 04:27:33 +0000 Subject: Express Shipping To U.S - Secured Checkout - VIAGRA 100mg x 130 Pills $172, VISA ONLY g0jzf3 Message-ID: <4f680735.7b935061@carrier.utc.com> VIAGRA 100mg x 130 Pills $172, VISA ONLY Buy VIAGRA (Sildenafil) 100mg or 50mg From Our Online Pharmacy - No Prescription Required Express Shipping To U.S - Secured Checkout - VISA ONLY. http://malldrug-pro.ru From eugen at leitl.org Tue Mar 20 04:19:47 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 20 Mar 2012 12:19:47 +0100 Subject: Could Bitcoin Become the Currency of System D? Message-ID: <20120320111947.GU9891@leitl.org> http://www.forbes.com/sites/jonmatonis/2012/03/19/could-bitcoin-become-the-currency-of-system-d/ Could Bitcoin Become the Currency of System D? If zeros and ones are outlawed, only outlaws will use zeros and ones. Cryptography shall always have a place in securing our digital future and most especially in securing our digital value. Advanced public-key encryption for the masses cannot be eliminated nor denied b the genie is out of the bottle and mankind is the better for it. The unintended consequence of regulating or restricting decentralized cryptocurrencies such as bitcoin is that their use as a currency will have been brecognizedb officially and that usage will be driven largely underground. ISSOUF SANOGO/AFP/Getty Images However, underground may not be so bad anymore as Robert Neuwirth points out in his brilliant Foreign Policy article, bThe Shadow Superpowerb. If aggregated, this $10 trillion global black market is the worldbs second largest economy after the United States and it is also the worldbs fastest growing economy. The OECD (Organisation for Economic Co-operation and Development) projects that, by the year 2020, fully two-thirds of the worldbs workers will inhabit this shadow economy, or bSystem D.b As Neuwirth elaborates, it refers to the entire untaxed, unlicensed, and unregulated cash-based economy: System D is a slang phrase pirated from French-speaking Africa and the Caribbean. The French have a word that they often use to describe particularly effective and motivated people. They call them dC)brouillards. To say a man is a dC)brouillard is to tell people how resourceful and ingenious he is. The former French colonies have sculpted this word to their own social and economic reality. They say that inventive, self-starting, entrepreneurial merchants who are doing business on their own, without registering or being regulated by the bureaucracy and, for the most part, without paying taxes, are part of blbeconomie de la dC)brouillardise.b Or, sweetened for street use, bSysteme D.b This essentially translates as the ingenuity economy, the economy of improvisation and self-reliance, the do-it-yourself, or DIY, economy. Enter bitcoin. All kind of vibrant economic activity is occurring in this informal economy, which in some regions is between 20-60% of GDP or more, and every economy needs a currency. Essentially, bitcoin is the bSystem Db of currencies b global, decentralized, and non-state sanctioned. It is still early days but as bitcoin bypasses traditional banking and financial institutions, it is a currency off the grid just as System D. To deny the existence of System D is to deny the fact that economic participants find ways to survive even during prolonged times of hardship. According to Neuwirth bit asserts an important truth: what happens in all the unregistered markets and roadside kiosks of the world is not simply haphazard. It is a product of intelligence, resilience, self-organization and group solidarity.b It is inconceivable to think of those in under-developed countries and the developed economies of the eurozone coping without System D activity given the recurring recessions that are exacerbated by the violent central bank-induced business cycles. Despite increasing consumption taxes like VAT (value-added tax), the informal economy can still provide relief through various markets and bazaars. Americans too will need black markets to survive. System D represents the future. Currently, transactions within the shadow economy have to be made face to face, but an electronic System D currency would enable remote and even cross-border transactions. This could significantly broaden the entire informal ecosystem because consumers would have an international reach and merchants would have vast new choices in selecting suppliers. Not all bitcoin transactions require a standard computer and if the mobile payment prognosticators are correct, the mobile phone equipped with applications like Bitcoin Android could end up originating the majority of bitcoin transactions. Contrary to the thesis of anti-cashist David Wolman, the unbanked and the System D traders will not migrate away from cash unless its replacement offers similar privacy features. Bitcoin is barely three years young. Any bootstrapped currency initially will have a chicken-and-egg problem due to the fact that a currencybs overall success is determined by its network effect and pervasive spread. Critics of bitcoin as a currency are quick to point out that not many merchants accept it as a payment type yet. That will change. And, they also point out that the total available market is severely limited. Oh, how wrong! Bitcoinbs first potential mega-market just so happens to be the second largest economy in the world and its sole competitor in that sphere is depreciating government paper cash. Game on. From immovablebw8 at kevingong.com Tue Mar 20 02:54:27 2012 From: immovablebw8 at kevingong.com (DOOR - DOOR) Date: Tue, 20 Mar 2012 12:54:27 +0300 Subject: =?koi8-r?B?8M/MztnKINPQxcvU0iDV08zVxyDQzyDNxdbE1c7B0s/EztnNINDF0sXX?= =?koi8-r?B?z9rLwc0gySDUwc3P1sXOzs/N1SDPxs/SzczFzsnALg==?= Message-ID: <84AC14130E834692840C077A1DF9831B@microsofd50e8f> Полный спектр услуг по международным перевозкам и таможенному оформлению. Осуществляем доставку импортных грузов ("DOOR - DOOR") Примеры: - Одежда из Европы - от 9 евро за кг. - Одежда из Китая - от 6 евро за кг. - Мебель из Европы - от 370 евро за м. куб. - Посуда из Европы - от 2 евро за кг. - Светильники из Турции - от 2 евро за кг. Для просчета Вашего груза сообщите нам: 1. Наименование 2. Количество 3. Вес 4. Объём 5. Отправитель 6. Страна происхождения 7. Адрес место забора груза 8. Инвойсовая стоимость груза • Предварительная подготовка сопроводительных документов. • Организация таможенного оформления на таможенных терминалах Москвы. • Способствуем в осуществлении денежных переводов изготовителю (продавцу) всего за 2% от стоимости по инвойсу. • Содействие в получении сертификатов. • Вы можете сравнить цены, по которым сейчас идут Ваши грузы. Для просчёта в реальном времени обращайтесь по скайпу: tamozhimvse или по телефону (495) 565 34 52 (многоканальный) Позвоните и наши менеджеры в кратчайшие сроки рассчитают для Вас стоимость доставки груза и его таможенного оформления. From linksz128 at emaginesales.com Mon Mar 19 23:19:21 2012 From: linksz128 at emaginesales.com (=?koi8-r?B?IuvVztbV1CAtIMTJ2sHKziDUxcvT1MnM0SAi?=) Date: Tue, 20 Mar 2012 15:19:21 +0900 Subject: =?koi8-r?B?8M/E1dvLyQ==?= Message-ID: группа Вконтакте: - KunjutMag www.дизайн-текстиля.рф тел.: (812) 911-39-19 Быстро, КРАСИВО и недорого! Декоративные подушки - от 330руб. сумки-авоськи из габардина - от 590 руб. платки атласные, шифоновые - от 590 руб. сидушки на стулья - от 330 руб. любой дизайн любое изображение любая фотография любой логотип От 1 штуки. На любом текстильном изделии Покупай для себя. Дари друзьям. Начни свой бизнес вместе с НАМИ тел.: (812) 911-39-19 группа Вконтакте - KunjutMag www.дизайн-текстиля.рф From joss-liberationtech at pseudonymity.net Tue Mar 20 08:46:55 2012 From: joss-liberationtech at pseudonymity.net (Joss Wright) Date: Tue, 20 Mar 2012 15:46:55 +0000 Subject: [liberationtech] CfP: 2nd Workshop on Free and Open Communications on the Internet (FOCI) Message-ID: Hello All, This year Roger Dingledine of the Tor Project and I will be chairing the 2nd Workshop on Free and Open Communications on the Internet (FOCI), in conjunction with the USENIX Security Symposium, on the 6th of August in Bellevue, WA. FOCI aims to bring together a community of researchers working on all aspects of internet censorship. In addition to computer science research, we are particularly keen to expand on the interdisciplinary approach taken by the first workshop, and so are actively seeking submissions from social and political sciences, law, economics, activism, and any other field that can contribute to the discussion. The full call for papers is available here: https://www.usenix.org/conference/foci12/call-for-papers I hope to see some of you there, Joss _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Tue Mar 20 08:34:22 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 20 Mar 2012 16:34:22 +0100 Subject: FY;) TERRORISTS are using online war games like Call of Duty to plot attacks, The Sun can reveal. Message-ID: <20120320153422.GF9891@leitl.org> (the Sun emulates the Onion) http://www.thesun.co.uk/sol/homepage/news/4205896/Terrorists-play-online-games-like-Call-of-Duty-to-plan-attacks.html Game fanatics Terrorists plan attacks in net chats Kids' fave keeps their plots secret Deadly ... terrorists are turning to online war games to plot attacks without being monitored Exclusive By DAVID WILLETTS and TOM WELLS Last Updated: 20th March 2012 TERRORISTS are using online war games like Call of Duty to plot attacks, The Sun can reveal. Islamic extremists know cops monitor phone calls, emails and online messages. So they are turning to PlayStation and Xbox games to keep their deadly plans secret. Gamers can log on in groups to play against each other and b crucially b to chat in private. Once signed in to a "lobby" using a password, plotters put on Bluetooth headsets and speak securely to conspirators on the same site. Other shoot-'em-up games suspected of being targeted by terrorists are thought to be Medal of Honour and the Halo series. Realistic ... war games Alamy Last night, a source said: "It's a terrifying reality. These people waste no time finding a secure method of chatting. "They are logging into group games over the internet and discussing terror plots. Security people know about it. "For millions who love these games this will be a huge shock. "To think fanatics use them for their own ends is a real worry." Sources say plotters choose realistic conflict games so they can mask their deadly discussions as harmless web chat. Call Of Duty Online craze ... 40 million people play Call Of Duty on the net There has even been evidence would-be jihadists treat war games as training tools, a bit like a pilot might use a flight simulator. News of the growing threat comes five years after the CIA first warned of the menace. But with the soaring popularity of the games, there are now fears they are being used by increasing numbers of criminals and terrorists. Last night government sources said police and spy chiefs were already responding to the threat. A security expert revealed: "Those who fight crime and terrorism keep up to date with technological changes." Call Of Duty MW3 Best-seller ... Call Of Duty MW3 made B#250m in 24 hours The terrorists choose incredibly realistic "first person games" where the controller works through a complex simulation of war scenarios, carrying out missions and battling enemy fighters. Gamers choose different styles of play and missions b from planting bombs to fighting one-on-one. Then they enter the lobby and invite their friends to join in. Call of Duty addicts can even join "clans" b groups who regularly play together. The games use a password-protected log-on to keep users' identities secret. The system was designed so players anywhere on the globe can get together for harmless fantasy battles. But security chiefs now fear plotters are set to turn those fantasies into reality. d.willetts at the-sun.co.uk From eugen at leitl.org Tue Mar 20 08:55:56 2012 From: eugen at leitl.org (Eugen Leitl) Date: Tue, 20 Mar 2012 16:55:56 +0100 Subject: [liberationtech] CfP: 2nd Workshop on Free and Open Communications on the Internet (FOCI) Message-ID: <20120320155555.GG9891@leitl.org> ----- Forwarded message from Joss Wright ----- From euphorick at sg.michelin.com Tue Mar 20 02:12:05 2012 From: euphorick at sg.michelin.com (=?koi8-r?B?IvPVxMXCztnKIMDSydPUIg==?=) Date: Tue, 20 Mar 2012 17:12:05 +0800 Subject: =?koi8-r?B?98HbINPVxMXCztnKIMDSydPU?= Message-ID: Судебный юрист (г. Москва) Юридические услуги (консультации, составление документов, защита в суде). Семейные споры (развод, раздел имущества, взыскание алиментов). Наследственные споры (восстановление пропущенного срока принятия наследства, оспаривание завещания, установление факта принятия наследства и т.д.) Жилищные споры (выселение, выписка - снятие с регистрационного учета). Арбитражные споры (споры возникающие из договоров купли-продажи, поставки, подряда, залога, аренды, в т.ч. лизинг, и т.д.). Взыскание долгов по распискам и договорам с юридических и физических лиц. Телефон: 8-901-599-09-20 (круглосуточно, без выходных). г. Москва, метро "Менделеевская". From livelonglfyh9 at web-planets.com Tue Mar 20 01:12:16 2012 From: livelonglfyh9 at web-planets.com (=?koi8-r?B?Iu7Jy8/MwcXXwSDhzsfFzMnOwSI=?=) Date: Tue, 20 Mar 2012 17:12:16 +0900 Subject: =?koi8-r?B?88/U0tXEzsnexdPU188g1yDPwszB09TJINPF0tTJxsnLwcPJySDQ0s/E?= =?koi8-r?B?1cvDyckgySDPws/S1cTP18HOyQ==?= Message-ID: Коллеги! По рекомендации наших партнеров предлагаю Вам сотрудничество в области сертификации продукции и оборудования. Наши квалифицированные эксперты оформят весь необходимый комплекс сертификатов «под ключ». Все работы по сертификации продукции и услуг выполняются строго в соответствии с областью аккредитации и технической компетенции. Обращаем Ваше внимание на широкий спектр услуг, оказываемых нашими специалистами: - Сертификат и декларация о соответствии; - Гигиенический сертификат (Свидетельство о госрегистрации, экспертное заключение Роспотребнадзора (ранее CЭЗ); - Сертификат (Ех) на взрывозащищенное оборудование; - Разработка технических условий; - Свидетельство об утверждении типа средств измерений (Метрологический сертификат); - Pостехнадзор - оформление разрешения на применение; - Сертификат ПБ (пожарной безопасности); - Одобрение типа транспортного средства ОТТС; - Сертификат систем менеджмента ИСО 9001 (ISO) Надеемся на взаимовыгодное сотрудничество, С наилучшими пожеланиями, Специалист отдела по работе с клиентами, Николаева Ангелина Тел. +7 (495) 727-5966 sert at mail-netpost.ru From ballplayerrh at teliberica.com Tue Mar 20 04:08:32 2012 From: ballplayerrh at teliberica.com (=?koi8-r?B?IvDSz8TBxdTT0SDL18HS1MnSwSI=?=) Date: Tue, 20 Mar 2012 18:08:32 +0700 Subject: =?koi8-r?B?69fB0tTJ0sEgzsEg69XU1drP19PLz80g0NLP09DFy9TF?= Message-ID: <447289DF58824C2EBD006424BE085212@HOMEB1DF27B5FA> Продается квартира в центре на Кутузовском проспекте возле театра Куклачева – г. Москва, Кутузовский проспект, 23А (Студенческая, 20 к.1) Площадь - 110 м.кв. 6 этаж. 1 600 000 долларов. Cтроительный материал красный кирпич и монолитный бетон. Один уровень, свободная планировка. Жилая площадь 70 м.кв. (32+19+19), кухня 19 м.кв. Количество лоджий - 2. Количество санузлов - 2. Квартира от собственника в чистой продаже, без обременения, документы на собственность оформлены. Окна квартиры выше рядом стоящего дома. Дом сдан весной 2009 года, оборудован лифтами, мусоропроводом, а так же телефонизирован. Дополнительная информация 8-916-023-6864. Фото и описание на сайте www.kvart-kut.ru From relocaterz968 at bhrhotels.com Tue Mar 20 06:32:30 2012 From: relocaterz968 at bhrhotels.com (=?koi8-r?B?IvPt8yI=?=) Date: Tue, 20 Mar 2012 20:32:30 +0700 Subject: =?koi8-r?B?6M/UydTFINDSz97J1MHU2CBzbXMg0MXSxdDJ08vVIMLMydrLz8fPINfB?= =?koi8-r?B?zSDexczP18XLwT8=?= Message-ID: Хотите прочитать sms переписку близкого вам человека? Мы вам в этом поможем! Все операторы GSM и регионы! Анонимность и достоверность гарантируем! Наш email: smska at smska099.su icq: 617487987 From melodiarnetta at anpac.com Tue Mar 20 20:53:19 2012 From: melodiarnetta at anpac.com (CatherinaGlynis) Date: Wed, 21 Mar 2012 01:53:19 -0200 Subject: Sildenafil, Tadalafil, Vardenafil at Lowest Prices! No Prescription Required. rmdi3o3s Message-ID: <77u36k91x12-95914294-407q1b43@wedfulwtdm> Sildenafil, Tadalafil, Vardenafil at Lowest Prices! No Prescription Required. Generics and Brands, Soft, Professional and Super Active. More than 40 various pills for Erectile Dysfunction. Order from Secure Pharmacy! http://pharmacydrugstoredrugs.ru From deallq64 at carterdistributing.com Wed Mar 21 04:05:17 2012 From: deallq64 at carterdistributing.com (DOOR - DOOR) Date: Wed, 21 Mar 2012 03:05:17 -0800 Subject: =?koi8-r?B?8M/MztnKINPQxcvU0iDV08zVxyDQzyDNxdbE1c7B0s/EztnNINDF0sXX?= =?koi8-r?B?z9rLwc0gySDUwc3P1sXOzs/N1SDPxs/SzczFzsnALg==?= Message-ID: <6E21D7FE77FA4685A0EA91C0B739A67D@com> Полный спектр услуг по международным перевозкам и таможенному оформлению. Осуществляем доставку импортных грузов ("DOOR - DOOR") Примеры: - Одежда из Европы - от 9 евро за кг. - Одежда из Китая - от 6 евро за кг. - Мебель из Европы - от 370 евро за м. куб. - Посуда из Европы - от 2 евро за кг. - Светильники из Турции - от 2 евро за кг. Для просчета Вашего груза сообщите нам: 1. Наименование 2. Количество 3. Вес 4. Объём 5. Отправитель 6. Страна происхождения 7. Адрес место забора груза 8. Инвойсовая стоимость груза • Предварительная подготовка сопроводительных документов. • Организация таможенного оформления на таможенных терминалах Москвы. • Способствуем в осуществлении денежных переводов изготовителю (продавцу) всего за 2% от стоимости по инвойсу. • Содействие в получении сертификатов. • Вы можете сравнить цены, по которым сейчас идут Ваши грузы. Для просчёта в реальном времени обращайтесь по скайпу: tamozhimvse или по телефону (495) 565 34 52 (многоканальный) Позвоните и наши менеджеры в кратчайшие сроки рассчитают для Вас стоимость доставки груза и его таможенного оформления. From buddedpdp at idphonecard.com Wed Mar 21 00:40:34 2012 From: buddedpdp at idphonecard.com (=?koi8-r?B?IlNlbnNvcnVzLSDCxdPLz87UwcvUztnFINTFyM7PzM/Hycki?=) Date: Wed, 21 Mar 2012 08:40:34 +0100 Subject: =?koi8-r?B?5MnT0MXO08XSIMHSz83B1M/X?= Message-ID: <32822CF63C75423C8A18915DDC601684@5levo> +7-981-756-00-34 www.бесконтактные-технологии.рф от 395 руб/шт универсальный ДИСПЕНСЕР для АРОМАтизации аэрозольным баллоном Прибор работает от двух батареек в автоматическом режиме до 1 года! Вешается на саморез или на спец.скотч 3М (в комплекте по запросу) Подходит для аэрозольных баллонов пр-ва: Германии, Англии, Греции, Китая емкостью 250мл-320мл также Мы предлагаем вкусные, отличного качества ароматы! 56 ароматических композиций немецкого производителя Удобно, экономично и практично! С 2003 года используют в России • отели, рестораны, бары • бизнес-центры и офисы • спортивные комплексы • медицинские учреждения • квартиры • коттеджи • загородные дома Лучший подарок сотрудникам, шефу и любимой теще. +7-981-756-00-34 www.бесконтактные-технологии.рф From louisjanis at rus-tours.com Wed Mar 21 06:11:39 2012 From: louisjanis at rus-tours.com (LUZ) Date: Wed, 21 Mar 2012 09:11:39 -0400 Subject: Top Penis Enlargement and Male Enhancement Products in the market. 7q7ig Message-ID: <96t21m64q17-46610644-989d2v57@hobcrvarzy> Best Penis Enlargement Products Here! Top Penis Enlargement and Male Enhancement Products in the market Only the Best Penis Enlargement Products in one place! Visit Now! http://yourpenismall.ru From eugen at leitl.org Wed Mar 21 02:12:26 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 21 Mar 2012 10:12:26 +0100 Subject: Bitcoin Seeks New Life In Africa Message-ID: <20120321091226.GQ9891@leitl.org> (Rudiger is a good friend of mine, I hope he can make it to the 5th May event in Munich) http://www.technologyreview.com/business/39829/?p1=BI Wednesday, March 21, 2012 Bitcoin Seeks New Life In Africa A digital currency without a central bank could be ideal for economies where the mobile phone is king but the banking systems are weak. By Tom Simonite Recent months have not been kind to proponents of Bitcoin, the virtual peer-to-peer currency that soared to a value of over $30 last summer on a surge of public interest and media reports. The currency operates over the Internet with no central control. But now its 15 minutes of fame appear to be over. Reports of a $500,000 digital heist last year were followed by wild volatility in the value of a bitcoin, which has now dropped to around $5. Last month, the largest exchange where bitcoins could be traded for dollars unexpectedly closed because of what it called "increasing regulation." Now some in the Bitcoin community, a blend of people motivated by libertarian politics and commitment to open-source software, are beginning to wonder if their pet currency may have brighter prospects in the developing economies of Africa. German software developer R|diger Koch, a consultant to the U.K.-based bitcoin exchange Intersango, recently traveled to speak at the Mobile Money Africa event in Lagos, Nigeria. There, Koch told the audience of businesspeople and government officials that Bitcoin could support a system of robust, low-fee mobile payments for anyone whose cell phone has a camera. "Many of them were interested in how Bitcoin could be useful," says Koch. His talk in Nigeria was intended to launch a dialogue that could lead Intersango or others to launch practical Bitcoin-based mobile payment systems for Africa. Koch has also visited several African embassies in Berlin to introduce government officials to the currency. The system needed to create and exchange bitcoins made its mysterious appearance on the Internet in 2009 (it remains unclear who wrote the software). The coins are impossible to fake and can be created and used without any central authority, such as a central bank. The work of generating bitcoins and verifying transactions is shared among the users of the software, all protected by sophisticated mathematics. In the United States and Europe, Bitcoin's meteoric rise was mostly driven by speculators; hardly anyone used the currency to actually pay for goods and services. Koch thinks things could be different in Africa, where a universal, electronic currency could solve real problems. Fast-growing African economies such as those of Kenya and Nigeria rely heavily on cash transactions, particularly in rural areas where there are no ATMs and few people have bank accounts. In some places, large networks of illegal money changers are used for cross-border payments. That situation is part of the reason for the early success in Africa of mobile-phone payment systems such as Kenya's M-Pesa, which allows users to send each other money using text messages. Koch believes that mobile payments built around Bitcoin could be even more useful. "It's interesting to see how creative Africans can be about transferring money," says Koch. "They really think seriously about a cashless society." Open-source technology created by the Bitcoin community could be used to create simple mobile apps for payments accessible to almost any phone with a camera, says Koch. Use of smart phones is now growing rapidly in some African countries, particularly Kenya, as prices for models using Google's Android software have dropped rapidly. He imagines a design similar to the Bitcoin for Android app, which allows one person to transfer bitcoins to another by using a phone to snap a photo of a 2-D bar code or QR code on the screen of another phone. "People could exchange money when they meet on the street," says Koch. The decentralized design of Bitcoin means a payment system that uses the currency would easily span national borders and could avoid system-wide outages like those suffered by M-Pesa in December, which left users unable to do business. "All centralized systems have the same problem," says Koch. "If you rely on it and you don't have a way to pay, then you are in trouble." Tonny Omwansa, an academic at the University Of Nairobi, Kenya, studies payment systems and recently published a book on M-Pesa. "The low financial inclusion, low penetration of formal financial services, and uptake and penetration of mobile phones make mobile payments very valuable," he says. However, he notes, users currently run the risk of "dependence on a supplier which is monopolistic." Mobile payments built on top of Bitcoin's decentralized design could avoid that risk. But Omwansa says that although he is familiar with Bitcoin, most in Africa are not. "Hardly anyone I know has heard about it," he says. Copyright Technology Review 2012. From eugen at leitl.org Wed Mar 21 05:22:26 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 21 Mar 2012 13:22:26 +0100 Subject: Autonomous, Roaming Swarm Creates Temporary Local Wi-Fi Network Message-ID: <20120321122226.GU9891@leitl.org> http://www.suasnews.com/2012/03/13658/autonomous-roaming-swarm-creates-temporary-local-wi-fi-network/ Autonomous, Roaming Swarm Creates Temporary Local Wi-Fi Network 20 March 2012 By Gary Mortimer The Electronic Countermeasures project is essentially an autonomous, roaming Internet swarm, constructed from repurposed UAS. The project is lead by Liam Young of think tank Tomorrowbs Thoughts Today and Unknown Fields Division, with assistance from Eleanor Saitta, Oliviu Lugojan-Ghenciu, and Superflux and was demonstraeted at the Glow Festival in the Netherlands last year. Electronic Countermeasures @ GLOW Festival NL 2011 from liam young on Vimeo. These UAS would fly off and hover above the city, and create ad hoc connections and networks in a new form of nomadic territorial infrastructure,b Young says, ba flock of interactive autonomous drones that form their own place specific, temporary, local, Wi-Fi communityba pirate Internet.b Rather than carry satellites to uplink to the greater Internet, Young imagines his swarm as a highly site-specific means to create peer-to-peer communication (think text messaging or the old Napster file sharing model). And in this regard, Young actually views Electronic Countermeasures as a form of nomadic architectureba roaming infrastructure built from digital beams rather than steelblike a drifting island of information. bArchitecture is typically such a slow medium and we wanted to develop alternative strategies for how an architect may operate and alternative forms of projects that could play out with much more immediacy,b he writes. From sickness at tiscali.it Wed Mar 21 06:09:57 2012 From: sickness at tiscali.it (sickness) Date: Wed, 21 Mar 2012 14:09:57 +0100 Subject: [tahoe-dev] keeping private grids privatey Message-ID: > > Setting up a private i2p network might be getting OT. But I'd be > interested as well in finding out how to setup a private i2p network > if you ever figure out or find documentation on how to boot strap one > for your community, please share the documentation on how its done ;) > > Thanks, > Jimmy. > sure, it was discussed multiple times on i2p forums: http://forum.i2p2.de/viewtopic.php?p=13603#13603 http://forum.i2p2.de/viewtopic.php?t=2547 http://forum.i2p2.de/viewtopic.php?t=2381 (the same could be done with tor and freenet, iirc but you don't have tahoe over those, and even if freenet is able to store content, it's fixed to k=1 h=3 s=3 speaking in tahoe-lafs language, and you don't really have a way to repair/check the shares if not by redownloading the entire content over time, it's more like a big cache... but differences between tahoe and freenet were already discussed by zooko in another post) _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Mar 21 06:15:39 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 21 Mar 2012 14:15:39 +0100 Subject: [tahoe-dev] keeping private grids privatey Message-ID: <20120321131539.GW9891@leitl.org> ----- Forwarded message from sickness ----- From eugen at leitl.org Wed Mar 21 06:53:16 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 21 Mar 2012 14:53:16 +0100 Subject: 2-GHz clock quantum key distribution over 260 km of standard telecom fiber Message-ID: <20120321135316.GZ9891@leitl.org> http://arxiv.org/abs/1203.4323 2-GHz clock quantum key distribution over 260 km of standard telecom fiber Shuang Wang, Wei Chen, Jun-Fu Guo, Zhen-Qiang Yin, Hong-Wei Li, Zheng Zhou, Guang-Can Guo, Zheng-Fu Han (Submitted on 20 Mar 2012) We report a demonstration of quantum key distribution (QKD) over a standard telecom fiber exceeding 50 dB in loss and 250 km in length. The differential phase shift QKD protocol was chosen and implemented with 2 GHz system clock rate. By careful optimization of the 1-bit delayed Faraday-Michelson interferometer and the use of the super-conducting single photon detector (SSPD), we achieved a quantum bit error rate below 2% when the fiber length was no more than 205 km, and of 3.45% for the 260 km length fiber with 52.9 dB loss. We also improved the quantum efficiency of SSPD to obtain high key rate for 50 km length. Subjects: Quantum Physics (quant-ph) Journal reference: Optics Letters, 37, 1008-1010 (2012) DOI: 10.1364/OL.37.001008 Cite as: arXiv:1203.4323v1 [quant-ph] From ujamn at gmail.com Wed Mar 21 00:10:10 2012 From: ujamn at gmail.com (c R) Date: Wed, 21 Mar 2012 16:10:10 +0900 Subject: No subject Message-ID: <201203190714.q2J7E2kq014600@proton.jfet.org> 【報酬先払い】副業目的で無料登録が増えてます 人妻との愛人月契約で20万円〜報酬先払いで本物保障!! 当倶楽部の人妻と愛人契約を結んでお金を稼いで見ませんか? 報酬は安心の完全先払い!!しかも契約を結ぶ女性を選べるんです。 http://sukimono.info/paex28/ サラリーマンの副業目的での参加が増えてきています。 未経験の方でも複数人と契約して月50万円以上稼ぐ方もいらっしゃいます。 18歳以上の健全な男性であれは料金等一切かかりませんので リスク無しで参加可能です。 http://sukimono.info/paex28/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From flyingkiwiguy at gmail.com Wed Mar 21 09:19:28 2012 From: flyingkiwiguy at gmail.com (Gary Mulder) Date: Wed, 21 Mar 2012 16:19:28 +0000 Subject: [ZS] Bitcoin Seeks New Life In Africa Message-ID: On 21 March 2012 15:56, Dirk Bruere wrote: Are there any bitcoin exchanges that take PayPal or credit/debit cards? > I don't do online banking with my accounts. > One key feature of Bitcoin is that a transaction is non-revocable. Once you send Bitcoins to a Bitcoin wallet address, the Bitcoins are irrevocably sent. PayPal supports charge backs, so someone who buys Bitcoins could then file a charge back request with PayPal and get PayPal to refund his payment. Therefore nobody accepts PayPal for Bitcoin purchases. Credit cards also have identical issues. Also, get the destination Bitcoin address wrong and the Bitcoins sent can never be recovered by anyone. If you want to confirm GBP into Bitcoins you need to use a Bitcoin exchange. The guys at http://www.intersango.com accept SEPA and bank transfers to their Lloyds TSB account. The funds usually show up in your exchange account around 1 business day later. I know the guys running Intersango, and they are legit. and are based in London and Poland. Having said that they've had to change from HSBC to Lloyds as HSBC was giving them a lot of problems, so don't make any large deposits. http://www.mtgox.comis the other large exchange which is based in France and Japan. The major weakness in Bitcoin are the exchanges, as they're they interface between normal currencies and the Bitcoin ecosystem, and so suffer all the problems and risks of both systems, i.e. regulation, security, and technical issues. Caveat emptor - this is the Wild Wild West of currency. Regards, Gary -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Wed Mar 21 09:28:51 2012 From: eugen at leitl.org (Eugen Leitl) Date: Wed, 21 Mar 2012 17:28:51 +0100 Subject: [ZS] Bitcoin Seeks New Life In Africa Message-ID: <20120321162851.GI9891@leitl.org> ----- Forwarded message from Gary Mulder ----- From taminj at softbank.jp Wed Mar 21 03:44:34 2012 From: taminj at softbank.jp (|c DS) Date: Wed, 21 Mar 2012 19:44:34 +0900 Subject: No subject Message-ID: <201203191048.q2JAmQ4g017972@proton.jfet.org> セックス無しの生活は考えられない女性が集まっております セックスの為ならお金を惜しみません 『私が満足するエッチをしてくれる』 これが女性の望む条件です 女性が満足出来るエッチをしてお礼を貰いましょう http://sukimono.info/paex28/ 金額、日時の交渉は女性と直接お願いします 男性会員様の利用は無料です http://sukimono.info/paex28/ このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp From rbell_hh at PennyStocksExpertNewsletter.com.jfet.org Wed Mar 21 13:27:27 2012 From: rbell_hh at PennyStocksExpertNewsletter.com.jfet.org (Rich L. Bell) Date: Wed, 21 Mar 2012 20:27:27 +0000 Subject: StockAlert- VIP c8pi1 In-Reply-To: <921901cd023a$4953eac5$5d545e0b@668uy46> Message-ID: <1332361647.5017@PennyStocksExpertNewsletter.com> Dear Valued Subscribers, Do not miss this gem of a company that appears to be ready to bounce to new highs! We have a brand new pick to present to you guys today, and we believe this one could be absolutely huge for our members! Before we get into all the juicy details, we'd like to remind you that this year has been absolutely fantastic for our newsletter and for our members. With one of our picks jumping over 1100% in such a short period of time, we know that so many of you have been anxiously waiting for our next big pick. As you continue reading below, you will realize just how fantastic of a company Vidable: VIBE is, and how much potential it has to jump sky high in the coming few days! We think that VIBE can do fantastic for our loyal members. Gains of over 900% could be on the agenda! We're very happy to bring you this pick at the current levels of only 3cents, which seems like a solid bargain to us. We're giving our members a fantastic opportunity to look at VIBE before the rest of WallStreet realizes its potential, which could send it skyrocketing very quickly! More than 112 million Americans have used online classifieds, and about 20.7 million use them on an almost daily basis. Vidable: (VIBE) is an innovative website that makes online video advertisements more accessible to local businesses and consumers. This easy-to-use website allows users to add a business directory profile in 24 different industries, and video or post a classified video to sell a product or service. Vidable: (VIBE) hosts a video marketplace that is searchable by location and product or service category. The website is searchable through Google and other prominent search engines, and users are able to easily create an account through an existing Facebook profile. For smart phone users, Vidable: (VIBE) offers an easy-to-use app that automatically registers the geographic location and pulls up offerings in the user?s vicinity. The use of Internet classifieds, which has more than doubled since 2005, has coincided with the decline of newspaper classified spending. Ad revenue from print classifieds has declined a breathtaking 92% over the past ten years, hitting $723 million in 2010, down from $8.7 billion in 2000. What has been bad for newspapers, though, has been a boon to the Internet. Internet advertising revenue is growing heartily. In 2011 alone, revenue is expected to grow 18.8% over 2010 to $38.7 billion. Internet video is also booming, with more than 147 million Americans watching videos online each month. Craigslist remains the undeniable online classifieds leader, with its 46 million unique visitors per month. Directories, such as Yelp.com and CitySearch.com, meanwhile, do not offer consumers the opportunity to sell directly to each other, despite containing business profiles. All in all, few sites offer the kind of functionality, ease-of-use, and, ultimately, mobile applications tha t VIBE offers. As the Internet?s newest spot for businesses and prospective buyers to seamlessly connect through video, VIBE will continue to encourage adoption of its technology through various marketing avenues. The Company will boost brand consciousness through online methods including the search engine optimization of its website, viral marketing, Google AdWords, and cross-promotions with other search engines and video platforms. Traditional channels of garnering attention will involve print media, television advertising, and public relations tactics, including press releases and print articles. Finally, VIBE will round out its promotional efforts with Chamber of Commerce membership and word of mouth proliferation, thereby communicating its mission of creating a local, community-focused platform for businesses and consumers alike. Current levels seem like an absolute bargain to us, and we strongly believe that VIBE has the potential to do fantastic for our subscribers in the coming days! WE ARE ENCOURAGING ALL SUBSCRIBERS TO TAKE ANOTHER HARD LOOK AT VIBE! Sincerely, ExplicitPennyPicks Team From grarpamp at gmail.com Wed Mar 21 18:58:54 2012 From: grarpamp at gmail.com (grarpamp) Date: Wed, 21 Mar 2012 21:58:54 -0400 Subject: [p2p-hackers] Distributed filesystem choices (aka: none yet?) Message-ID: Been looking for a distributed filesystem with no luck, any ideas? Distributed meaning that there is no single central access point. So the concept of mounting might mean amongst the roving set able to service it, or some underlying graph of it, something like: mount -t dht dht:// /dist1 Users add their free block devices to the global backing store which was initialized with certain ZFS-like integrity and redundancy guarantees. Files would never vanish unless there are no longer enough blocks in the backing store to meet the init time guarantees. Users could either copy their hierarchies into the space, or attach them into the space for continued local maintenance. The one time init setting of a space could include whether pki recognized root users could maintain the overall hierarchy. Uid's might be an insertion node id. There may need to be voting authority on file/tree expiry if under space pressure, perhaps bitcoin-like, with the metrics established at init time. Users could add their block devices to whatever pool had the metrics they like. Anononymity and crypto would provide incentive to donate resources since unlike say bittorrent, no legal fear means no hit and run required. I don't really know what it might look like. Just that it needs sha2/3 integrity, redundancy, and file lifetime guarantees. It needs to be global, anonymous, and be a usable file system. And somehow deal with abusive fill such as dd if=/dev/zero of=zero, which implies some kind of moderated hierarchies appointed by the initializing entity. AFS is nice that users can bolt their filespace into the tree, and it has filesystem semantics. ZFS/BTRFS is nice due to their sha256 integrity, raidz redundancy and simple backing block device ideas. FreeNet/GnuNet/BitTorrent and all other 'filesharing' protocols are no good because there is no guarantee that files will not vanish. And they have no filesystem semantics, only push/fetch. RedHat GFS / DragonFly HAMMER are interesting as a distributed filesystem in which real work can be done on live files. Tahoe-LAFS is nice due to adding in block devices, but no good because of the central access point. Perhaps that could be distributed? Phantom/I2P/Tor could be used as the backend IP transport. http://en.wikipedia.org/wiki/List_of_file_systems#Distributed_parallel_fault-tolerant_file_systems The only thing that makes it worth while is that a lot of people have free space, want to give an get data, safely, and don't want to see their work in populating it wasted... so it can't go away. _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From ne4am at msn.com Wed Mar 21 07:57:32 2012 From: ne4am at msn.com ( q) Date: Wed, 21 Mar 2012 23:57:32 +0900 Subject: No subject Message-ID: <201203211457.q2LEvKr2007404@proton.jfet.org> ○──────────────────────────○ ●費用 : 男性 完全無料 ●資格 : 18歳以上の男性 ●報酬 : 3万円以上 ●内容 : デートから肉体関係 ●募集人数 : 各県50名  ○──────────────────────────○ http://sukimono.info/2efm02/ 女性と男性のバランスを保つ為、限定50名の応募となっております。 (ページが表示される内は参加可能) また当サークルには本当に出会いを求めている方のみが参加しています。 冷かしでの参加は迷惑ですので絶対におやめ下さい。 http://sukimono.info/2efm02/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From magnoliamisti at ps.ge.com Wed Mar 21 10:04:17 2012 From: magnoliamisti at ps.ge.com (Somer Kenyetta) Date: Thu, 22 Mar 2012 01:04:17 +0800 Subject: PenMax Penis Enlargement Product Review vy4l2 Message-ID: <13w80b54u84-49165015-211l1w54@yplidbwtx> PenMax Penis Enlargement Product Review If you are one of the 1000’s of men out there who are living a life of unhappiness because of your penis size, then the PenMax Products is answer to your problems Order the best penis enlargement pills available to buy online. http://herbalpenisdog.ru From zonatemple at ilim.com Thu Mar 22 03:34:23 2012 From: zonatemple at ilim.com (Tenisha Daniell) Date: Thu, 22 Mar 2012 05:34:23 -0500 Subject: U.S to U.S Shipping for ALL orders, Viagra 100mg x 100 Pills ONLY $139.95, No Prescription Required! cpsi Message-ID: <94t51t77t42-55733316-562y4w41@mgzlmaxv> VIAGRA 100mg - FREE U.S to U.S Shipping! U.S to U.S Shipping for ALL orders, No Prescription Required! Viagra 100mg x 100 Pills ONLY $139.95 - Best Quality and Low Prices! http://onlinepharmacypills.ru From nettime at kein.org Thu Mar 22 00:39:35 2012 From: nettime at kein.org (nettime's avid reader) Date: Thu, 22 Mar 2012 08:39:35 +0100 Subject: Worldbs First Flying File-Sharing Drones in Action Message-ID: TorrentFreak Worldbs First Flying File-Sharing Drones in Action March 20, 2012 https://torrentfreak.com/worlds-first-flying-file-sharing-drones-in-action-120320/ A few days ago The Pirate Bay announced that in future parts of its site could be hosted on GPS controlled drones. To many this may have sounded like a joke, but in fact these pirate drones already exist. Project bElectronic Countermeasuresb has built a swarm of five fully operational drones which prove that an baerial Napsterb or an bairborne Pirate Bayb is not as futuristic as it sounds. In an ever-continuing effort to thwart censorship, The Pirate Bay plans to turn flying drones into mobile hosting locations. bEveryone knows WHAT TPB is. Now theybre going to have to think about WHERE TPB is,b The Pirate Bay team told TorrentFreak last Sunday, announcing their drone project. Liam Young, co-founder of Tomorrowbs Thoughts Today, was amazed to read the announcement, not so much because of the technology, because his group has already built a swarm of file-sharing drones. bI thought hold on, we are already doing that,b Young told TorrentFreak. Their starting point for project bElectronic Countermeasuresb was to create something akin to an baerial Napsterb or bairborne Pirate Bayb, but it became much more than that. bPart nomadic infrastructure and part robotic swarm, we have rebuilt and programmed the drones to broadcast their own local Wi-Fi network as a form of aerial Napster. They swarm into formation, broadcasting their pirate network, and then disperse, escaping detection, only to reform elsewhere,b says the group describing their creation. File-Sharing Drone in Action (photo by Claus Langer) picture of a sharing drone In short the system allows the public to share data with the help of flying drones. Much like the Pirate Box, but one that flies autonomously over the city. bThe public can upload files, photos and share data with one another as the drones float above the significant public spaces of the city. The swarm becomes a pirate broadcast network, a mobile infrastructure that passers-by can interact with,b the creators explain. One major difference compared to more traditional file-sharing hubs is that it requires a hefty investment. Each of the drones costs 1500 euros to build. Not a big surprise, considering the hardware thatbs needed to keep these pirate hubs in the air. bEach one is powered by 2x 2200mAh LiPo batteries. The lift is provided by 4x Roxxy Brushless Motors that run off a GPS flight control board. Also on deck are altitude sensors and gyros that keep the flight stable. They all talk to a master control system through XBee wireless modules,b Young told TorrentFreak. bThese all sit on a 10mm x 10mm aluminum frame and are wrapped in a vacuum formed aerodynamic cowling. The network is broadcast using various different hardware setups ranging from Linux gumstick modules, wireless routers and USB sticks for file storage.b For Young and his crew this is just the beginning. With proper financial support they hope to build more drones and increase the range they can cover. bWe are planning on scaling up the system by increasing broadcast range and building more drones for the flock. We are also building in other systems like autonomous battery change bases. We are looking for funding and backers to assist us in scaling up the system,b he told us. Those who see the drones in action (video below) will notice that theybre not just practical. The creative and artistic background of the group shines through, with the choreography performed by the drones perhaps even more stunning than the sharing component. bWhen the audience interacts with the drones they glow with vibrant colors, they break formation, they are called over and their flight pattern becomes more dramatic and expressive,b the group explains. Besides the artistic value, the drones can also have other use cases than being a bpirate hub.b For example, they can serve as peer-to-peer communications support for protesters and activists in regions where Internet access is censored. Either way, whether itbs Hollywood or a dictator, there will always be groups that have a reason to shoot the machines down. But letbs be honest, who would dare to destroy such a beautiful piece of art? Worlds First File-Sharing Drone -> http://vimeo.com/36267881 # distributed via : no commercial use without permission # is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: http://mx.kein.org/mailman/listinfo/nettime-l # archive: http://www.nettime.org contact: nettime at kein.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From Jdean at lsuhsc.edu Thu Mar 22 07:15:41 2012 From: Jdean at lsuhsc.edu (Dean, James) Date: Thu, 22 Mar 2012 09:15:41 -0500 Subject: [cryptography] [info] The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) Message-ID: From http://blogs.computerworld.com/19917/shocker_nsa_chief_denies_total_info rmation_awareness_spying_on_americans?source=CTWNLE_nlt_security_2012-03 -22: Despite the fact that domestic spying on Americans is already an e-hoarding epidemic, the massive new NSA storage facility in Utah will solve the problem of how to manage 20 terabytes a minute of intercepted communications. Even if the intercepted communication is AES encrypted and unbroken today, all that stored data will be cracked some day. Then it too can be data-mined. The super secret spook agency is full of code breakers. "Remember," former intelligence official Binney stated, "a lot of foreign government stuff we've never been able to break is 128 or less. Break all that and you'll find out a lot more of what you didn't know-stuff we've already stored-so there's an enormous amount of information still in there." Binney added the NSA is "on the verge of breaking a key encryption algorithm." _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Mar 22 01:58:38 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 22 Mar 2012 09:58:38 +0100 Subject: [cryptography] [info] The =?utf-8?Q?NS?= =?utf-8?Q?A_Is_Building_the_Country=E2=80=99?= =?utf-8?Q?s?= Biggest Spy Center (Watch What You Say) Message-ID: <20120322085838.GL9891@leitl.org> ----- Forwarded message from ianG ----- From eugen at leitl.org Thu Mar 22 02:06:34 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 22 Mar 2012 10:06:34 +0100 Subject: =?utf-8?B?V29ybGTigJk=?= =?utf-8?Q?s?= First Flying File-Sharing Drones in Action Message-ID: <20120322090634.GM9891@leitl.org> ----- Forwarded message from nettime's avid reader ----- From zooko at zooko.com Thu Mar 22 09:09:19 2012 From: zooko at zooko.com (Zooko Wilcox-O'Hearn) Date: Thu, 22 Mar 2012 10:09:19 -0600 Subject: [tahoe-dev] Logging howto / sftp with hashed passwords Message-ID: > https://tahoe-lafs.org/trac/tahoe-lafs/browser/docs > > https://tahoe-lafs.org/trac/tahoe-lafs/browser/trunk/docs/logging.rst > > https://tahoe-lafs.org/trac/tahoe-lafs/wiki/Dev > > https://tahoe-lafs.org/trac/tahoe-lafs/wiki/Doc > > https://tahoe-lafs.org/trac/tahoe-lafs/wiki/FAQ Oh yeah, and then there is this: https://tahoe-lafs.org/trac/tahoe-lafs/wiki/NewbieDeveloperSetup and: https://tahoe-lafs.org/trac/tahoe-lafs/wiki/Extensions I'm really glad that we have so many people contributing docs nowadays, but we really do need some kind of improvement to helping people find the docs they seek. I'm really not sure how to do that. This was my attempt to do so: https://tahoe-lafs.org/trac/tahoe-lafs/wiki/Doc , and I'm not sure if it is sufficient. Regards, Zooko _______________________________________________ tahoe-dev mailing list tahoe-dev at tahoe-lafs.org http://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From lodewijkadlp at gmail.com Thu Mar 22 02:27:43 2012 From: lodewijkadlp at gmail.com (=?UTF-8?Q?lodewijk_andr=C3=A9_de_la_porte?=) Date: Thu, 22 Mar 2012 10:27:43 +0100 Subject: [info] [ZS] Bitcoin Seeks New Life In Africa In-Reply-To: <20120321162851.GI9891@leitl.org> References: <20120321162851.GI9891@leitl.org> Message-ID: > Are there any bitcoin exchanges that take PayPal or credit/debit cards? > > I don't do online banking with my accounts. > > > > One key feature of Bitcoin is that a transaction is non-revocable. Once you > send Bitcoins to a Bitcoin wallet address, the Bitcoins are irrevocably > sent. PayPal supports charge backs, so someone who buys Bitcoins could > then file a charge back request with PayPal and get PayPal to refund his > payment. Therefore nobody accepts PayPal for Bitcoin purchases. Credit > cards also have identical issues. Also, get the destination Bitcoin address > wrong and the Bitcoins sent can never be recovered by anyone. SEPA and bank transfers are (sometimes) also easily reversable. Paypal has a policy against virtual currencies, after a quantity of bitcoin-related paypal accounts had been closed people stopped using it. Wisely so, Paypal has strange account-freezing policies. You may still get a Paypal to Bitcoin exchange in a person-to-person trade though, ask around. Bitcoin OTC can give you an indication of someone's trustworthiness. From virtualadept at gmail.com Thu Mar 22 07:41:24 2012 From: virtualadept at gmail.com (Bryce Lynch) Date: Thu, 22 Mar 2012 10:41:24 -0400 Subject: [ZS] Bitcoin Seeks New Life In Africa Message-ID: On Wed, Mar 21, 2012 at 12:19, Gary Mulder wrote: > One key feature of Bitcoin is that a transaction is non-revocable. Once you > send Bitcoins to a Bitcoin wallet address, the Bitcoins are irrevocably Incidentally, and this is something that needs to be said out of due dilligence, this is what helped kill e-cash in the 90's when some of the cypherpunks came in from the cold and started their own e-cash ventures. We can't forget that chargebacks are how banks make a lot of money, and they still don't know how to act when that's not possible. > Therefore nobody accepts PayPal for Bitcoin purchases. Credit cards also Paypal also started locking the accounts of people who were accepting currency in exchange for Bitcoins. So far as I know, those accounts are still locked out and the funds in them are still frozen. > have identical issues. Also, get the destination Bitcoin address wrong and > the Bitcoins sent can never be recovered by anyone That is a huge, huge problem. On the desktop/laptop side that's mitigated by cut-and-paste. It's also a good argument for escrow of funds - to catch that problem. On the mobile side, I know a few people are working on QRcodes for exchange of Bitcoin account codes. > If you want to confirm GBP into Bitcoins you need to use a Bitcoin exchange. > The guys at http://www.intersango.com accept SEPA and bank transfers to > their Lloyds TSB account. The funds usually show up in your exchange account > around 1 business day later. I know the guys running Intersango, and they > are legit. and are based in London and Poland. Having said that they've had > to change from HSBC to Lloyds as HSBC was giving them a lot of problems, so > don't make any large deposits. http://www.mtgox.com is the other large > exchange which is based in France and Japan. The major weakness in Bitcoin Also remember that MTgox got pwned but good a couple of weeks ago. Confidence in them tanked as a result. > are the exchanges, as they're they interface between normal currencies and > the Bitcoin ecosystem, and so suffer all the problems and risks of both > systems, i.e. regulation, security, and technical issues. On the less legitimate side, there are a number of people out there with fairly high reputation scores on darknet fora who convert one-time-use Greendot codes into Bitcoins in an anonymous manner. They're pretty highly ranked on the Silk Road. On the Third Black Market, not so much, but time will show who's good at it and who's not. What I'm curious about (though I probably shouldn't be) is how the exchangers in question are cashing out their Greendot and Moneypak cards because (in the US at least) they have to be tied to a government acknowledged identity, which torpedos anonymity. > Caveat emptor - this is the Wild Wild West of currency. Yee-haw. -- The Doctor [412/724/301/703] https://drwho.virtadpt.net/ "I am everywhere." -- Zero State mailing list: http://groups.google.com/group/DoctrineZero ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From marsh at extendedsubset.com Thu Mar 22 10:02:57 2012 From: marsh at extendedsubset.com (Marsh Ray) Date: Thu, 22 Mar 2012 12:02:57 -0500 Subject: [cryptography] [info] The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) Message-ID: On 03/22/2012 09:57 AM, Peter Maxwell wrote: > > From > http://blogs.computerworld.com/19917/shocker_nsa_chief_denies_total_information_awareness_spying_on_americans?source=CTWNLE_nlt_security_2012-03-22 >> "Remember," former intelligence official Binney stated, "a lot of >> foreign government stuff we've never been able to break is 128 or >> less. Break all that and you'll find out a lot more of what you >> didn't know-stuff we've already stored-so there's an enormous >> amount of information still in there." In other words, they've accumulated a backlog of ciphertext. Encryption working as designed. >> Binney added the NSA is "on the verge of breaking a key encryption >> algorithm." This sounds like budget boondoggle baloney to me. How can you be "on the verge" of something like that? You might have some ideas on how to attack it, but until they're proven they're just guesses and likely to be dead ends. Not something you should justify reworking your computing systems around. But once they're proven, you're not "on the verge". > That sounds far more plausible than the previous explanations. I'd > also suspect the "key encryption algorithm" may be RC4 and not AES > at the moment. Or it could just be all the 40- and 56- bit stuff that was captured by wiretapping Americans and not decrypted way back when the NSA felt constrained by laws. Or it could be everything using 512-bit RSA key exchange. Or it could be everything for which the security of the encryption ultimately depends on a user-chosen password. E.g., MS-PPTP/MPPE (but there's nothing really new about this). Or it could be a common protocol using a cipher weakly. For example, I noticed this the other day about RDP "standard, non-FIPS" mode: http://msdn.microsoft.com/en-us/library/cc240771%28v=prot.10%29.aspx If the endpoints do actually manage to negotiate the use of 128 bit (as opposed to 40 or 56 bit) security, it uses the output of RC4 without discarding any initial bytes. Those initial bytes have some correlations, some of which can expose the whole key. Just to make sure the 1684 bit state size of RC4 doesn't get stale, the protocol refreshes the key every 4096 packets. (Actually better than MPPE which seems to rekey every 1 or 256 packets depending on negotiated options). Or it could be complete BS. - Marsh _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From iang at iang.org Wed Mar 21 18:54:30 2012 From: iang at iang.org (ianG) Date: Thu, 22 Mar 2012 12:54:30 +1100 Subject: [cryptography] [info] The NSA Is Building the Countrybs Biggest Spy Center (Watch What You Say) Message-ID: On 19/03/12 12:31 PM, ianG wrote: > ... So after a lot of colour, it is not clear if they can break AES. > Yet. OK. But that is their plan. And they think they can do it, within > their foreseeable future. So, step into NSA's shoes. If there is a timeline here we (NSA) worked out we can break AES "soon" ... what would we do? Would we impress everyone in the world as to how strong it was and push NIST to standardise it as much as possible? Plausible given that everyone follows NIST's lead without question. The Suite B sweetener is aptly named, nobody seems to have missed the sour taste of Suite A ;-) Would we propose or advance some modes or protocols above others? Where I'm getting at here is things like CTR mode. It seems that this mode reduces the obfuscations of CBC to make AES the sole and only fulcrum of strength. Nice, clear and simple. But, assuming a predictable counter, we have lots of ciphertext with a clear relationship. So CTR is easier to crack assuming a big machine that makes the local county brown-out every time someone wants to read a conversation. Or, is the advantage that CBC and other modes have - obfuscation of the ciphertext with variation stolen from the plaintext - of such low value in the scheme of things that these things make no difference? Is the choice of mode irrelevant if AES has a weakness? iang (context here is that I am examining an older protocol of mine with thought of replacing it, and wonder which mode to prefer...) (thinking about it more, my normal rule of "ignore the NSA always" should answer this :) ) _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Thu Mar 22 06:20:24 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 22 Mar 2012 14:20:24 +0100 Subject: =?utf-8?Q?They=E2=80=99re_Watching=3A_Home?= =?utf-8?Q?land_Security_Trackin?= =?utf-8?Q?g?= Visitors Across Alternative News and Prepper Web Sites Message-ID: <20120322132024.GU9891@leitl.org> http://www.shtfplan.com/headline-news/theyre-watching-homeland-security-tracking-visitors-across-alternative-news-and-prepper-web-sites_03212012 Theybre Watching: Homeland Security Tracking Visitors Across Alternative News and Prepper Web Sites Mac Slavo March 21st, 2012 SHTFplan.com Comments (139) Just because youbre paranoid doesnbt mean theybre not out to get you. If there ever existed individuals and groups that threatened the status quo itbs now, and they can often be found congregating at alternative news web sites, forums and preparedness oriented online communities. Government officials at the Department of Homeland Security and the FBI have done everything in their power to marginalize their dangerous ideas and activities going so far as to even issue security bulletins to private businesses like banks, surplus stores, coffee shops and other retailers outlining what employees should look for and when to say something to law enforcement officials. Activities like putting a Ron Paul bumper sticker on your car, paying cash, buying gold, stocking up on food, promoting banti-U.S.b and bradical theologies,b and demanding personal privacy are all now considered to be suspicious in the eyes of a government hell bent on destroying the Constitution. While DHS has requisitioned the help of brick and mortar businesses in their efforts to identify persons-of-interest, they have realized that the best place to locate domestic threats to national security is the internet. As such, they have deployed a host of tools to not only monitor what is being posted online, but who is posting it, who their friends are, which sites they visit and what information they blikeb in particular. A recent report from well known survival author James Rawles suggests that Preparedness oriented web sites are a prime target of government snooping and sniffing. A web site like Rawlesb Survival Blog, or even our very own SHTFplan, undoubtedly meets all of the criteria outlined in the multitude of security bulletins issued by DHS and FBI, thus it would only make sense that these types of communities would be primary destinations for government monitoring. In the case of Survival Blog, Rawles reports that a recent analysis of his logs by web forensic experts yielded some startling results: It has come to my attention that from August of 2011 to November of 2011, the FBI secretly redirected the web traffic of more than 10% of SurvivalBlogbs US visitors through CJIS, their sprawling data center situated on 900 acres, 10 miles from Clarksburg, West Virginia. There, the Feebees surreptitiously collected the IP addresses of my site visitors. In all, 4,906 of 35,494 selected connections ended up going to or through the FBI servers. (Note that this happened several months beforewe moved our primary server to Sweden.) Furthermore, we discovered that the FBI attached a long-lived cookie that allowed them to track the sites that readers subsequently visited. I suspect that the FBI has done the same to hundreds of other web sites. I find this situation totally abhorrent, and contrary to the letter of 4th Amendment as well as the intent of our Founding Fathers. I recognize that I am making this announcement at the risk of losing some readers.So be it. But I felt compelled to tell my readers immediately, because it was the honorable and forthright course of action. Working on my behalf, some volunteer web forensics experts dissected some cached version histories. (Just about everything is available on the Internet, and the footprints and cookie crumb trails that you leave are essentially there for a lifetime.) The volunteers found that the bulk of the FBI redirects were selected because of a readerbs association with bIntellectual Propertyb infringing sites like the now defunct Megaupload. But once redirected, you were assigned a cookie. However, some of these were direct connections to the SurvivalBlog site (around 4% of the total.) So if they had kept this practice up long enough and if you visited us enough times then the FBIbs computers would have given you a cookie. This has been verified with sniffer software. Most alarming about this is that according to James Rawlesb analysis, usersb browsers were first redirected to an FBI server, then forced to download a cookie via their browser, and were then redirected back to his web site b the entire process unbeknownst to the end user because it happens almost instantly. Because the cookie isnbt removed unless you clear it from your browser (you can easily remove cookies manually) every web site subsequently visited by the user would then be logged by an FBI computer in real-time. You can be assured that if the FBI is engaging in this type of surveillance, Survival Blog and other preparedness web sites arenbt alone. Chances are that, as Rawles mentions, there are hundreds, if not thousands, of web sites being tracked and monitored in similar fashion. A report from the Intel Hub confirms our suspicions, as do our own visitor logs, and webd venture to guess that most other web sites in the alternative news sphere will see similar access logs. Perhaps for now the government surveillance net is somewhat limited to specific internet spheres of interest, as their surveillance infrastructure is still being constructed. But it wonbt be long, in fact less than 18 months, before they have the ability to track every single phone call, text message, email, image and video upload, blog post, comment, search query and social networking activity in the world. Yes, thatbs right, EVERY SINGLE digital interaction: Via The Daily Crux: Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the worldbs communications, as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. As we highlighted in Everything You Do Is Monitored, the government is rapidly taking steps across the nationbs entire security apparatus and its ancillary arms such as major search engines, private banks, telecommunications companies and social networks to log, aggregate and analyze the behavior of individual users as well as groups to which they belong. To what end is anybodybs guess (but we could, of course, venture a few theories). It should be perfectly clear. Whether youbre a prepper, alternative news buff, or none of the above, the government wants to know what youbre doing. No one is immune to the surveillance state. Webre all suspects now. Theybre watching. Resources: Here are some things you can do to protect your privacy online: -Anonymous Web Surfing (Article) -Set up a Virtual Private Network to protect your web surfing identity -The TOR Project: Open source, free anonymous browsing -Surf the internet from public wireless access points (Article) Author: Mac Slavo Date: March 21st, 2012 Website: www.SHTFplan.com Copyright Information: Copyright SHTFplan and Mac Slavo. This content may be freely reproduced in full or in part in digital form with full attribution to the author and a link to www.shtfplan.com. Please contact us for permission to reproduce this content in other media formats. From eugen at leitl.org Thu Mar 22 07:29:26 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 22 Mar 2012 15:29:26 +0100 Subject: [cryptography] [info] The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) Message-ID: <20120322142926.GX9891@leitl.org> ----- Forwarded message from "Dean, James" ----- From measl at mfn.org Thu Mar 22 13:31:25 2012 From: measl at mfn.org (J.A. Terranson) Date: Thu, 22 Mar 2012 15:31:25 -0500 (CDT) Subject: =?utf-8?Q?They=E2=80=99re_Watching=3A_Home?= =?utf-8?Q?land_Security_Trackin?= =?utf-8?Q?g?= Visitors Across Alternative News and Prepper Web Sites In-Reply-To: <20120322132024.GU9891@leitl.org> References: <20120322132024.GU9891@leitl.org> Message-ID: While I have no doubt whatsoever that NSA is passively intercepting the majority (if not close to all) of the Internet traffic, this article is making claims that make no snse. In fact, the authors seem to have a fundamental misunderstanding of how te Internet actually works. Why would NSA or anyone else leave cookies laying around for paanoid folk to find? It's certainly not necessary for the performance of the surveillance mission, and in fact endangers suc a mission - interception above layer 3 just doesnt make a lot of sense, especially wen reconstruction of the higher layer activities is such a straightfoward matter if you capture all the layer 3 traffic. I don't doubt that "we are all suspects now", or that NSA is watcing, but I seriously doubt that they are watching the way thse guys believe. It sounds to me like these websites realized that FBI visitors were looking at the site and then assumed a lot of facts not in evidence. Hell, I've had LOTS of lettered government visits to various web pages, whether by bored employes or for active surveillance - but none of those logged visits can be considered to be "secret" surveillance: after all, they left logs of their visits for chrissakes! On Thu, 22 Mar 2012, Eugen Leitl wrote: > http://www.shtfplan.com/headline-news/theyre-watching-homeland-security-tracking-visitors-across-alternative-news-and-prepper-web-sites_03212012 > > Theybre Watching: Homeland Security Tracking Visitors Across Alternative News > and Prepper Web Sites > > Mac Slavo > > March 21st, 2012 > > SHTFplan.com > > Comments (139) > > Just because youbre paranoid doesnbt mean theybre not out to get you. > > If there ever existed individuals and groups that threatened the status quo > itbs now, and they can often be found congregating at alternative news web > sites, forums and preparedness oriented online communities. Government > officials at the Department of Homeland Security and the FBI have done > everything in their power to marginalize their dangerous ideas and activities > going so far as to even issue security bulletins to private businesses like > banks, surplus stores, coffee shops and other retailers outlining what > employees should look for and when to say something to law enforcement > officials. Activities like putting a Ron Paul bumper sticker on your car, > paying cash, buying gold, stocking up on food, promoting b anti-U.S.b and > b radical theologies,b and demanding personal privacy are all now considered > to be suspicious in the eyes of a government hell bent on destroying the > Constitution. > > While DHS has requisitioned the help of brick and mortar businesses in their > efforts to identify persons-of-interest, they have realized that the best > place to locate domestic threats to national security is the internet. As > such, they have deployed a host of tools to not only monitor what is being > posted online, but who is posting it, who their friends are, which sites they > visit and what information they blikeb in particular. > > A recent report from well known survival author James Rawles suggests that > Preparedness oriented web sites are a prime target of government snooping and > sniffing. A web site like Rawlesb Survival Blog, or even our very own > SHTFplan, undoubtedly meets all of the criteria outlined in the multitude of > security bulletins issued by DHS and FBI, thus it would only make sense that > these types of communities would be primary destinations for government > monitoring. In the case of Survival Blog, Rawles reports that a recent > analysis of his logs by web forensic experts yielded some startling results: > > It has come to my attention that from August of 2011 to November of 2011, > the FBI secretly redirected the web traffic of more than 10% of > SurvivalBlogbs US visitors through CJIS, their sprawling data center situated > on 900 acres, 10 miles from Clarksburg, West Virginia. There, the Feebees > surreptitiously collected the IP addresses of my site visitors. In all, 4,906 > of 35,494 selected connections ended up going to or through the FBI servers. > (Note that this happened several months beforewe moved our primary server to > Sweden.) Furthermore, we discovered that the FBI attached a long-lived cookie > that allowed them to track the sites that readers subsequently visited. I > suspect that the FBI has done the same to hundreds of other web sites. I find > this situation totally abhorrent, and contrary to the letter of 4th Amendment > as well as the intent of our Founding Fathers. > > I recognize that I am making this announcement at the risk of losing some > readers.So be it. But I felt compelled to tell my readers immediately, > because it was the honorable and forthright course of action. > > Working on my behalf, some volunteer web forensics experts dissected some > cached version histories. (Just about everything is available on the > Internet, and the footprints and cookie crumb trails that you leave are > essentially there for a lifetime.) The volunteers found that the bulk of the > FBI redirects were selected because of a readerbs association with > b Intellectual Propertyb infringing sites like the now defunct Megaupload. > But once redirected, you were assigned a cookie. However, some of these were > direct connections to the SurvivalBlog site (around 4% of the total.) So if > they had kept this practice up long enough and if you visited us enough times > then the FBIbs computers would have given you a cookie. This has been > verified with sniffer software. > > Most alarming about this is that according to James Rawlesb analysis, usersb > browsers were first redirected to an FBI server, then forced to download a > cookie via their browser, and were then redirected back to his web site b the > entire process unbeknownst to the end user because it happens almost > instantly. Because the cookie isnbt removed unless you clear it from your > browser (you can easily remove cookies manually) every web site subsequently > visited by the user would then be logged by an FBI computer in real-time. > > You can be assured that if the FBI is engaging in this type of surveillance, > Survival Blog and other preparedness web sites arenbt alone. Chances are > that, as Rawles mentions, there are hundreds, if not thousands, of web sites > being tracked and monitored in similar fashion. A report from the Intel Hub > confirms our suspicions, as do our own visitor logs, and webd venture to > guess that most other web sites in the alternative news sphere will see > similar access logs. > > Perhaps for now the government surveillance net is somewhat limited to > specific internet spheres of interest, as their surveillance infrastructure > is still being constructed. But it wonbt be long, in fact less than 18 > months, before they have the ability to track every single phone call, text > message, email, image and video upload, blog post, comment, search query and > social networking activity in the world. Yes, thatbs right, EVERY SINGLE > digital interaction: > > Via The Daily Crux: > > Under construction by contractors with top-secret clearances, the blandly > named Utah Data Center is being built for the National Security Agency. > > A project of immense secrecy, it is the final piece in a complex puzzle > assembled over the past decade. Its purpose: to intercept, decipher, analyze, > and store vast swaths of the worldbs communications, as they zap down from > satellites and zip through the underground and undersea cables of > international, foreign, and domestic networks. > > As we highlighted in Everything You Do Is Monitored, the government is > rapidly taking steps across the nationbs entire security apparatus and its > ancillary arms such as major search engines, private banks, > telecommunications companies and social networks to log, aggregate and > analyze the behavior of individual users as well as groups to which they > belong. To what end is anybodybs guess (but we could, of course, venture a > few theories). > > It should be perfectly clear. Whether youbre a prepper, alternative news > buff, or none of the above, the government wants to know what youbre doing. > No one is immune to the surveillance state. > > Webre all suspects now. > > Theybre watching. > > Resources: Here are some things you can do to protect your privacy online: > > -Anonymous Web Surfing (Article) > > -Set up a Virtual Private Network to protect your web surfing identity > > -The TOR Project: Open source, free anonymous browsing > > -Surf the internet from public wireless access points (Article) > > Author: Mac Slavo Date: March 21st, 2012 Website: www.SHTFplan.com > > Copyright Information: Copyright SHTFplan and Mac Slavo. This content may be > freely reproduced in full or in part in digital form with full attribution to > the author and a link to www.shtfplan.com. Please contact us for permission > to reproduce this content in other media formats. > //Alif -- "A reputable physician does NOT: promise a cure; demand advance payment; advertise." [Capitalization as in original] [1936] U.S. Public Health Service poster alerting the public to the dangers of "Quack Cancer Cures" specifically, and "Quackery" in general. From eugen at leitl.org Thu Mar 22 07:44:34 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 22 Mar 2012 15:44:34 +0100 Subject: [ZS] Bitcoin Seeks New Life In Africa Message-ID: <20120322144434.GZ9891@leitl.org> ----- Forwarded message from Bryce Lynch ----- From christoper_cotton_yy at KillerPennyStocks.com Thu Mar 22 10:12:44 2012 From: christoper_cotton_yy at KillerPennyStocks.com (Christoper Cotton) Date: Thu, 22 Mar 2012 17:12:44 +0000 Subject: StockAlert- VIP 253xw6 In-Reply-To: <356f01cd0376$24751a2d$7494ea6f@nj32aek> Message-ID: <1332436364.4921@KillerPennyStocks.com> Dear Valued Subscribers, Do not miss this gem of a company that appears to be ready to bounce to new highs! We have a brand new pick to present to you guys today, and we believe this one could be absolutely huge for our members! Before we get into all the juicy details, we'd like to remind you that this year has been absolutely fantastic for our newsletter and for our members. With one of our picks jumping over 1100% in such a short period of time, we know that so many of you have been anxiously waiting for our next big pick. As you continue reading below, you will realize just how fantastic of a company Vidable: VIBE is, and how much potential it has to jump sky high in the coming few days! We think that VIBE can do fantastic for our loyal members. Gains of over 900% could be on the agenda! We're very happy to bring you this pick at the current levels of only 3cents, which seems like a solid bargain to us. We're giving our members a fantastic opportunity to look at VIBE before the rest of WallStreet realizes its potential, which could send it skyrocketing very quickly! More than 112 million Americans have used online classifieds, and about 20.7 million use them on an almost daily basis. Vidable: (VIBE) is an innovative website that makes online video advertisements more accessible to local businesses and consumers. This easy-to-use website allows users to add a business directory profile in 24 different industries, and video or post a classified video to sell a product or service. Vidable: (VIBE) hosts a video marketplace that is searchable by location and product or service category. The website is searchable through Google and other prominent search engines, and users are able to easily create an account through an existing Facebook profile. For smart phone users, Vidable: (VIBE) offers an easy-to-use app that automatically registers the geographic location and pulls up offerings in the user?s vicinity. The use of Internet classifieds, which has more than doubled since 2005, has coincided with the decline of newspaper classified spending. Ad revenue from print classifieds has declined a breathtaking 92% over the past ten years, hitting $723 million in 2010, down from $8.7 billion in 2000. What has been bad for newspapers, though, has been a boon to the Internet. Internet advertising revenue is growing heartily. In 2011 alone, revenue is expected to grow 18.8% over 2010 to $38.7 billion. Internet video is also booming, with more than 147 million Americans watching videos online each month. Craigslist remains the undeniable online classifieds leader, with its 46 million unique visitors per month. Directories, such as Yelp.com and CitySearch.com, meanwhile, do not offer consumers the opportunity to sell directly to each other, despite containing business profiles. All in all, few sites offer the kind of functionality, ease-of-use, and, ultimately, mobile applications tha t VIBE offers. As the Internet?s newest spot for businesses and prospective buyers to seamlessly connect through video, VIBE will continue to encourage adoption of its technology through various marketing avenues. The Company will boost brand consciousness through online methods including the search engine optimization of its website, viral marketing, Google AdWords, and cross-promotions with other search engines and video platforms. Traditional channels of garnering attention will involve print media, television advertising, and public relations tactics, including press releases and print articles. Finally, VIBE will round out its promotional efforts with Chamber of Commerce membership and word of mouth proliferation, thereby communicating its mission of creating a local, community-focused platform for businesses and consumers alike. Current levels seem like an absolute bargain to us, and we strongly believe that VIBE has the potential to do fantastic for our subscribers in the coming days! WE ARE ENCOURAGING ALL SUBSCRIBERS TO TAKE ANOTHER HARD LOOK AT VIBE! Sincerely, ExplicitPennyPicks Team From eugen at leitl.org Thu Mar 22 09:27:30 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 22 Mar 2012 17:27:30 +0100 Subject: [tahoe-dev] Logging howto / sftp with hashed passwords Message-ID: <20120322162730.GD9891@leitl.org> ----- Forwarded message from Zooko Wilcox-O'Hearn ----- From eugen at leitl.org Thu Mar 22 10:04:45 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 22 Mar 2012 18:04:45 +0100 Subject: [cryptography] [info] The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) Message-ID: <20120322170445.GF9891@leitl.org> ----- Forwarded message from Marsh Ray ----- From leotalouise at honeywell.com Thu Mar 22 10:54:44 2012 From: leotalouise at honeywell.com (Elsy Lorine) Date: Thu, 22 Mar 2012 21:54:44 +0400 Subject: Generics and Brands, Soft, Professional and Super Active Viagra & Cialis. More than 40 various pills for Erectile Dysfunction. ijs6su22 Message-ID: <201203221752.FD2E59D713C7563CFFAD0C@d1kx7zqbs0> Sildenafil, Tadalafil, Vardenafil at Lowest Prices! No Prescription Required. Generics and Brands, Soft, Professional and Super Active. More than 40 various pills for Erectile Dysfunction. Order from Secure Pharmacy! http://pilldrugsdrugstore.ru From eugen at leitl.org Thu Mar 22 14:28:44 2012 From: eugen at leitl.org (Eugen Leitl) Date: Thu, 22 Mar 2012 22:28:44 +0100 Subject: [p2p-hackers] Distributed filesystem choices (aka: none yet?) Message-ID: <20120322212844.GH9891@leitl.org> ----- Forwarded message from grarpamp ----- From mulberryg1 at researchresources.com Fri Mar 23 03:47:17 2012 From: mulberryg1 at researchresources.com (Tax planning) Date: Thu, 22 Mar 2012 23:47:17 -1100 Subject: =?koi8-r?B?68HLINPU0s/J1NggzMXHydTJzc7ZxSDPxsbbz9LO2cUg08jFzdk/?= Message-ID: <000d01cd08e2$50c807d0$6400a8c0@mulberryg1> 29 марта 2012 г. Оффшорный бизнес: о чем молчат другие? код (499) - Ч45*Ч095 <<<>>> 8 (499) 4454095 Цель: Отличительной особенностью данного курса является практическая направленность и отсутствие лишних теоретических и исторических отступлений. курс строится в форме интерактивного практического занятия при постоянном взаимодействии с аудиторией с разбором большого количества примеров и подробным описанием налоговых, финансовых и правовых последствий или рисков. Для участия в курсе мы приглашаем как специалистов с многолетним опытом работы в сфере международного налогового планирования, стремящихся расширить область своих знаний, так и слушателей, еще не сталкивавшихся с иностранными юрисдикциями. Насыщенность материала конкретными примерами, взятыми из жизни, решение нестандартных и частных задач в ходе занятия, а также доступность объяснений относятся к неоспоримым достоинствам данного курса. Важно отметить, что ведущий курса имеет не только многолетний опыт разработки и курирования крупных консалтинговых проектов, но также многократного участия в их реализации "под ключ" с последующим сопровождением. Это позволяет наполнить курс уникальным материалом, посвященным не только схемам оптимизации налогов, но и многочисленными практическими комментариями и описанием проблем, с которыми сталкивается бизнес, даже при выборе "правильных и выверенных" схем. По ходу и после окончания курса будет предусмотрено время для индивидуальных вопросов как по заявленным темам, так и по вопросам, которые не предусматривала программа курса. Оффшоры, Кипр и другие иностранные юрисдикции не являются налоговой панацеей, и в некоторых случаях их использование принесет лишь новые финансовые издержки и бессмысленные риски конфликтов с налоговыми органами. К счастью, таких случаев пока меньшинство. Программа: БЛОК 1. ОФФШОРЫ, НИЗКОНАЛОГОВЫЕ И ПРЕСТИЖНЫЕ ЕВРОПЕЙСКИЕ ЮРИСДИКЦИИ: КРИТЕРИИ ВЫБОРА. * Сравнение популярных оффшорных юрисдикций (Британские Виргинские острова, Белиз, Сейшелы, Панама и т.д.) √ от каких стоит отказаться и почему? * Гонконг как инструмент работы с азиатским рынком * Зачем использовать низконалоговые юрисдикции, если есть полностью безналоговые? * Использование престижных юрисдикций: Швейцария, Люксембург, Нидерланды и т.д. √ когда это обоснованно? * "Черные списки" ФАТФ, ОЭСР, Минфина, ЦБ РФ √ кому о них можно забыть? БЛОК 2. ПРАКТИКА ИСПОЛЬЗОВАНИЯ КИПРСКИХ КОМПАНИЙ * Особенности работы с кипрским администратором: как не дать себя обмануть? ** налог на прибыль (Corporate Income Tax), сбор на оборону (Defence Contribution Tax), НДС и применение ⌠reverse charge■ * Изменения кипрского законодательства 2012 и тенденции 2013. * Ратификация Протокола к Соглашению между РФ и Кипром: кто понесет убытки, а кому удастся на этом заработать? * Почему Кипр редко используют при экспорте/импорте товаров? * Кипр как инструмент работы с ценными бумагами БЛОК 3.СХЕМЫ, ПРИМЕНЯЕМЫЕ В МЕЖДУНАРОДНОМ НАЛОГОВОМ ПЛАНИРОВАНИИ * Внешнеторговые операции (экспорт/импорт): ** схемы с использованием оффшоров и Гонконга; ** схемы с использование английских LTD и партнерств LLP; ** эстонские, чешские, датские, нидерландские компании в торговых схемах. * Холдинговые структуры ** выплаты дивидендов и построение холдинговых структур; ** займы как оптимальный путь финансирования; ** (суб)лицензионные договоры и выплаты роялти за использование прав интеллектуальной собственности; ** анализ сложностей и рисков, расчет предельных величин отчислений по займам и роялти. * Владение и сдача в аренду недвижимости с использованием нерезидентов БЛОК 4. КОНФИДЕНЦИАЛЬНОСТЬ И НОМИНАЛЬНОЕ ВЛАДЕНИЕ * Номинальный сервис: ** инструменты контроля номинальных директоров и номинальных акционеров; ** лица, которым будут известны имена бенефициаров; * Какие данные о компании хранятся в публичных реестрах Кипра и оффшоров, и кто имеет к ним доступ? * Обмен информацией √ в каких случаях государственные органы РФ могут получить информацию о владельцах? * Изменения в Гражданском Кодексе: бенефициар должен раскрыть себя сам. * Трасты и семейные фонды √ когда их использование оправдано? * "Подводные камни" при использовании номинального сервиса и трастов/фондов. БЛОК 5. ОТКРЫТИЕ СЧЕТОВ НА ИНОСТРАННЫЕ КОМПАНИИ * Надежность, оперативность работы, лояльность √ какой банк выбрать? * Какие банки не делятся информацией с российскими спецслужбами? * Раскрытие банковской тайны √ факты и выводы * Пути снятия средств со счета иностранного банка в России * Росфинмониторинг: когда можно не опасаться? БЛОК 6. ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ, СИТУАЦИИ ИЗ ПРАКТИКИ, ОБЗОР СУДОВ И ПИСЕМ МИНФИНА. * Насколько международная структура владения защищает от рейдерских захватов? * Как часто нужно предоставлять сертификат налогового резидентства и нужно ли проходить аудит для его выпуска? * Ведет ли использование доверенностей с широким кругом полномочий к возникновению постоянного представительства? Официальная позиция. * Дает ли регистрация компании в ЕС возможность на привлечение кредитов и получение гражданства? * Если компания не нужна: нужно ликвидировать или можно "бросить"? * и т.д. Стоимость участия: 9 000 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: 8 (495) 792*2I_22 \\// +7 (499) - ЧЧ5-39*68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 9554 bytes Desc: not available URL: From krystahermila at triakis.com Thu Mar 22 17:20:35 2012 From: krystahermila at triakis.com (Argentina Carry) Date: Fri, 23 Mar 2012 00:20:35 +0000 Subject: Join the wise shoppers to let your dreams come true. BEST deals of imitation watches plus FREE shipping! yagrdp Message-ID: <201203230121.9BF7AE8C2A14ADEF21DCA53@1942y6598> Replica Watches, Imitation Watches at replica watches2u TOP grade Replica Watches of high quality at wholesale prices! BEST deals of imitation watches plus FREE shipping! Join the wise shoppers to let your dreams come true. http://watchreplicadirect.ru From peter at allicient.co.uk Thu Mar 22 19:23:09 2012 From: peter at allicient.co.uk (Peter Maxwell) Date: Fri, 23 Mar 2012 02:23:09 +0000 Subject: [cryptography] [info] The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) Message-ID: On 22 March 2012 17:02, Marsh Ray wrote: > On 03/22/2012 09:57 AM, Peter Maxwell wrote: > >> >> From >> >> http://blogs.computerworld.com/19917/shocker_nsa_chief_denies_total_information_awareness_spying_on_americans?source=CTWNLE_nlt_security_2012-03-22 >> >> "Remember," former intelligence official Binney stated, "a lot of >>> foreign government stuff we've never been able to break is 128 or >>> less. Break all that and you'll find out a lot more of what you >>> didn't know-stuff we've already stored-so there's an enormous >>> amount of information still in there." >>> >> > In other words, they've accumulated a backlog of ciphertext. Encryption > working as designed. Depends on what you mean by "as designed" really. Personally, I'd presume as designed is to slow down or hinder an adversary, which would probably fit in this scenario. > > > Binney added the NSA is "on the verge of breaking a key encryption >>> algorithm." >>> >> > This sounds like budget boondoggle baloney to me. > > How can you be "on the verge" of something like that? > > You might have some ideas on how to attack it, but until they're proven > they're just guesses and likely to be dead ends. Not something you > should justify reworking your computing systems around. > > But once they're proven, you're not "on the verge". Meh, strictly speaking, yes, but if we're talking in practical terms it may be the case that they've figured out how to break some cryptographic primitive in significantly less time than the original design specifications but it would still take more computing oomph than they currently have. Fairly sure there was similar considerations about 64-bit RC5 in the late 90s - people knew it could be cracked by brute force, but took a distributed effort to prove as much (may have details slightly wrong as was long time ago and I can't be bothered looking it up). The scenario is not particularly likely though. > > > That sounds far more plausible than the previous explanations. I'd >> also suspect the "key encryption algorithm" may be RC4 and not AES >> at the moment. >> > > Or it could just be all the 40- and 56- bit stuff that was captured by > wiretapping Americans and not decrypted way back when the NSA felt > constrained by laws. > Hehe... "NSA constrained by laws", erm, yeah, I suppose there's a first for everything ;-) > > Or it could be everything using 512-bit RSA key exchange. > > Or it could be everything for which the security of the encryption > ultimately depends on a user-chosen password. E.g., MS-PPTP/MPPE (but > there's nothing really new about this). > > Or it could be a common protocol using a cipher weakly. For example, I > noticed this the other day about RDP "standard, non-FIPS" mode: > http://msdn.microsoft.com/en-us/library/cc240771%28v=prot.10%29.aspx > If the endpoints do actually manage to negotiate the use of 128 bit (as > opposed to 40 or 56 bit) security, it uses the output of RC4 without > discarding any initial bytes. Those initial bytes have some > correlations, some of which can expose the whole key. Just to make sure > the 1684 bit state size of RC4 doesn't get stale, the protocol refreshes > the key every 4096 packets. (Actually better than MPPE which seems to > rekey every 1 or 256 packets depending on negotiated options). > > Or it could be complete BS. In reality, they've probably got a lot of uses for more computing power and the chances of us ever finding out in our lifetime are slim. _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From qjam at yahoo.com Thu Mar 22 12:20:05 2012 From: qjam at yahoo.com ({ ) Date: Fri, 23 Mar 2012 04:20:05 +0900 Subject: No subject Message-ID: <201203201923.q2KJNrTV021138@proton.jfet.org> セックス無しの生活は考えられない女性が集まっております セックスの為ならお金を惜しみません 『私が満足するエッチをしてくれる』 これが女性の望む条件です 女性が満足出来るエッチをしてお礼を貰いましょう http://sukimono.info/paex28/ 金額、日時の交渉は女性と直接お願いします 男性会員様の利用は無料です http://sukimono.info/paex28/ このメルマガは懸賞サイト会員様に配信されています。 ------------------------------------------------------------ ●メールマガジンの解除はこちらから! sup_ado_123 at yahoo.co.jp From tisarena at activetelesource.com Fri Mar 23 00:57:01 2012 From: tisarena at activetelesource.com (Isabella Sherie) Date: Fri, 23 Mar 2012 05:57:01 -0200 Subject: Order the best penis enlargement pills available to buy online. 2b5twq1c Message-ID: <52m83q81x14-37373713-631g7a90@j2axq15ovq4k> PenMax Penis Enlargement Product Review If you are one of the 1000’s of men out there who are living a life of unhappiness because of your penis size, then the PenMax Products is answer to your problems Order the best penis enlargement pills available to buy online. http://herbalpenisuntil.ru From traceefrancis at informaxinc.com Thu Mar 22 19:41:51 2012 From: traceefrancis at informaxinc.com (Parthenia Alisia) Date: Fri, 23 Mar 2012 07:41:51 +0500 Subject: Click here to Lose Weight today! Lose 1-2 lbs daily with the HCG diet y895e82 Message-ID: <4f6be2ef.878aa2c9@informaxinc.com> HCG Diet - HCG Diet Reviews - Lose Weight Fast With HCG Drops Lose 1-2 lbs daily with the HCG diet. Click here to Lose Weight today! http://hcgdietdirectgrain.ru From gushierks1 at deslerharris.com Thu Mar 22 23:58:40 2012 From: gushierks1 at deslerharris.com (=?koi8-r?B?ItLB2s7Pz8LSwdrJxS3U1dQi?=) Date: Fri, 23 Mar 2012 07:58:40 +0100 Subject: =?koi8-r?B?4sXazMnNydTO2cog1MHSycYuIDEyMDAg0tXCL83F0y4g4cvDydEg99PF?= =?koi8-r?B?INfLzMDexc7PLg==?= Message-ID: Безлимитный тариф. 1200 руб/мес. Акция Все включено. Москва + МО федеральный. Дисконтная карта со скидкой 3-25 % на ассортимент нашего магазина. в ПОДАРОК www.разнообразие-тут.рф From camilla4 at bleep.com Fri Mar 23 01:34:50 2012 From: camilla4 at bleep.com (=?koi8-r?B?IlNlbnNvcnVzLSDCxdPLz87UwcvUztnFINTFyM7PzM/Hycki?=) Date: Fri, 23 Mar 2012 08:34:50 +0000 Subject: =?koi8-r?B?4dLPzcEg5MnT0MXO08XSIM/UIDM5NSDS1cIu?= Message-ID: <83EC77B7C2A64F60BF5835B398AA554F@xpsp24a0791e6d> +7-981-756-00-34 www.бесконтактные-технологии.рф от 395 руб/шт универсальный ДИСПЕНСЕР для АРОМАтизации аэрозольным баллоном Прибор работает от двух батареек в автоматическом режиме до 1 года! Вешается на саморез или на спец.скотч 3М (в комплекте по запросу) Подходит для аэрозольных баллонов пр-ва: Германии, Англии, Греции, Китая емкостью 250мл-320мл также Мы предлагаем вкусные, отличного качества ароматы! 56 ароматических композиций немецкого производителя Удобно, экономично и практично! С 2003 года используют в России • отели, рестораны, бары • бизнес-центры и офисы • спортивные комплексы • медицинские учреждения • квартиры • коттеджи • загородные дома Лучший подарок сотрудникам, шефу и любимой теще. +7-981-756-00-34 www.бесконтактные-технологии.рф From dan at geer.org Fri Mar 23 05:42:29 2012 From: dan at geer.org (dan at geer.org) Date: Fri, 23 Mar 2012 08:42:29 -0400 Subject: [cryptography] [info] The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) Message-ID: Jdean at lsuhsc.edu writes, in part: > Even if the intercepted communication is AES encrypted and unbroken > today, all that stored data will be cracked some day. Then it too > can be data-mined. What percentage of acquirable/storable traffic do you suppose actually exhibits perfect forward secrecy? --dan ==== ...those who control the past control the future. -- George Orwell _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jamesd at echeque.com Thu Mar 22 16:41:10 2012 From: jamesd at echeque.com (James A. Donald) Date: Fri, 23 Mar 2012 09:41:10 +1000 Subject: [p2p-hackers] Distributed filesystem choices (aka: none yet?) Message-ID: On 2012-03-23 4:55 AM, Volodya wrote: > I don't quite understand. The system must be [anonymous in the sense that the > uploader cannot be identified]&& [have moderation system based on something > other than the blocks popularity like in GnuNet/Freenet*]. The system must be > [using limited amount of disk space given by its users] and [provide infinite > storage guarantee when moderation doesn't apply]. > > I think that the reason why you can't find this filesystem is akin to the reason > why all-powerful, all-knowing, and all-good god has not been spotted yet. Here is a solution: Everyone is, as with Bitcoin, identified by a public key - but by quite a few public keys, providing not anonymity but pseudonymity. When you store stuff on someone else's system you issue an IOU, which IOU is anonymously transferable, using a chaumian protocol, which *does* provide anonymity - you pseudonymously store other people's stuff, and anonymously use the resulting IOUs to store your own stuff. >From time to time you check that stuff that is stored on someone else's system is available by random sampling. When stuff stored on someone else's system becomes inaccessible, you note him as unreliable, and thus decline to issue IOUs or services to him in future, though since IOUs are transferable, you are still up for any IOUs you have issued to him in the past. The software attempts to cancel out IOUs - so that if Bob provides services to Carol, Carol provides services to Edwards, and Edwards provides services to Bob, they cancel out. If someone's IOUs get cancelled out in a cycle of IOUs that include your own, or include those you have confidence are reliable, this is evidence he is reliable in that his IOUs are good. You try to store stuff with those that you have reason to believe are reliable, and with those where storing stuff with them enables you to cancel out IOUs. You give low priority to storing stuff from people whose IOUs you have no reason to believe. Repeating: You pseudonymously store other people's stuff, using a nym that gains reputation thereby, and anonymously store your stuff on other people's systems, using a nym with no reputation. _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From brianc at smallworldnews.tv Fri Mar 23 09:49:38 2012 From: brianc at smallworldnews.tv (Brian Conley) Date: Fri, 23 Mar 2012 09:49:38 -0700 Subject: [liberationtech] Drones are not storytellers or why Syrians need better storytelling was Re: Pirate Bay turns to drones Message-ID: Not only the development costs, but the litigation/jail time costs as well are a huge issue with more innovative applications of drone tech. Further, the idea of implementing drones in Syria first of all is a huge safety risk, and could fundamentally change the perception of an already hostile regime to encourage increasingly worse actions. Secondly, the drones for human rights stuff all forgets a fundamental issue, people care about stories, not grainy footage, unless the crimes are so enormous, and even then they don't encourage action nor do they help inform outsiders what exactly Syrians want or need. For example, there is a fundamental difference between videos like these that Iraqis we worked with in Baghdad were producing years ago: http://www.youtube.com/watch?v=BVib2fMtP1w http://www.aliveinbaghdad.org/2008/07/28/al-sahwa-mistakes-in-adhamiya/ http://www.aliveinbaghdad.org/2007/10/08/us-military-destroys-iraqi-homes-by-mistake/ ...and shaky content and long range images of what often may or may not be the "heinous crimes" individuals claim. see this video for example: http://www.youtube.com/watch?v=1kQMSkdo_jc&feature=player_embedded I think its pretty clear why more efforts are not being made to more effectively and repeatedly tell the stories of individual refugees and people who have lost homes and loved ones. The people documenting are most often men, and as a man who has had the same problem myself when documenting police violence, war, etc, we too often resort to documenting horrible events, both because we are shocked and because that involves an adrenaline rush and provides its own sort of benefit to us as individuals, and leaves beside the wayside any review of whether this content is really moving minds or pushing forward a liberation agenda. As a trainer who has worked with individuals all over the world in conflict areas and the developing world, I have found that women are the best trainees, followed closely by older men. Young people are often too caught up in the moment and the injustice of it all to more effectively document or listen to recommendations about composition, pacing, etc. I guess this is a bit off-topic, but after spending a long time in a fairly pointless discussion with a man from Hama about this subject last night, I felt the need to mention it here. I'm still trying to sort out exactly why I think the idea of drones as human rights documentation may make sense, but it certainly cannot replace storytelling or investigative reporting. On Fri, Mar 23, 2012 at 9:32 AM, Andrew Lewis wrote: > Yes, telecomix is looking at drones, and really the proposal by TPB is > outlandish to current drone builders/operators, but most of the limitations > seem to be artificially limited technical issues that no one has thought > past due to limitations by US/UK/EU regulations. If you disregard these > rules, long range drones are well within the realm of possibility. I think > an open source drone program is possible, if people are willing to commit > the resources and accept the overall development costs. > > Andrew Lewis > Twitter: ThePunkbob > > Sent from my iPhone > > On Mar 23, 2012, at 4:53 PM, KheOps wrote: > > > Indeed, we're working on drones to film and livestream stuff in hostile > > environment such as Syria :) Will keep you posted if something concrete > > is somehow produced :) > > > > On 03/23/2012 04:57 PM, David Johnson wrote: > >> It sounded ridiculous, but ideas can come from jokes. > >> > >> On Fri, Mar 23, 2012 at 9:48 AM, KheOps >> > wrote: > >> > >> This is a joke - at least according to tetsu0, one of the TPB folks > :) > >> > >> On 03/23/2012 04:44 PM, David Johnson wrote: > >>> http://thepiratebay.se/blog/210 > >>> > >>> > >>> /TPB LOSS/ > >>> > >>> /We were down a few hours earlier today. There's no need to worry, we > >>> haven't been raided this time. We're only upgrading stuff since we're > >>> still growing./ > >>> > >>> /One of the technical things we always optimize is where to put our > >>> front machines. They are the ones that re-direct your traffic to a > >>> secret location. We have now decided to try to build something > >>> extraordinary./ > >>> > >>> /With the development of GPS controlled drones, far-reaching cheap > >> radio > >>> equipment and tiny new computers like the Raspberry Pi > >>> , we're going to experiment with sending > >>> out some small drones that will float some kilometers up in the air. > >>> This way our machines will have to be shut down with aeroplanes in > >> order > >>> to shut down the system. A real act of war./ > >>> > >>> /We're just starting so we haven't figured everything out yet. But we > >>> can't limit ourselves to hosting things just on land anymore. > >> These Low > >>> Orbit Server Stations (LOSS) are just the first attempt. With modern > >>> radio transmitters we can get over 100Mbps per node up to 50km > >> away. For > >>> the proxy system we're building, that's more than enough./ > >>> > >>> /But when time comes we will host in all parts of the galaxy, > >> being true > >>> to our slogan of being the galaxy's most resilient system. And all of > >>> the parts we'll use to build //that system on will be downloadable./ > >>> > >>> > >>> -- > >>> > >>> David V. Johnson > >>> Web Editor > >>> Boston Review > >>> Website: http://www.bostonreview.net > >>> > >>> Twitter: http://twitter.com/BostonReview > >>> Tumblr: http://bostonreview.tumblr.com > >>> > >>> > >>> Mailing Address: > >>> San Francisco Writers' Grotto > >>> > >>> 490 2nd Street, 2nd Fl. > >>> San Francisco, CA 94107 > >>> > >>> > >>> Cell: (917)903-3706 > >>> > >>> > >>> > >>> > >>> _______________________________________________ > >>> liberationtech mailing list > >>> liberationtech at lists.stanford.edu > >> > >>> > >>> Should you need to change your subscription options, please go to: > >>> > >>> https://mailman.stanford.edu/mailman/listinfo/liberationtech > >>> > >>> If you would like to receive a daily digest, click "yes" (once you > >> click above) next to "would you like to receive list mail batched in > >> a daily digest?" > >>> > >>> You will need the user name and password you receive from the list > >> moderator in monthly reminders. You may ask for a reminder here: > >> https://mailman.stanford.edu/mailman/listinfo/liberationtech > >>> > >>> Should you need immediate assistance, please contact the list > >> moderator. > >>> > >>> Please don't forget to follow us on > >> http://twitter.com/#!/Liberationtech > >> > >> > >> > >> _______________________________________________ > >> liberationtech mailing list > >> liberationtech at lists.stanford.edu > >> > >> > >> Should you need to change your subscription options, please go to: > >> > >> https://mailman.stanford.edu/mailman/listinfo/liberationtech > >> > >> If you would like to receive a daily digest, click "yes" (once you > >> click above) next to "would you like to receive list mail batched in > >> a daily digest?" > >> > >> You will need the user name and password you receive from the list > >> moderator in monthly reminders. You may ask for a reminder here: > >> https://mailman.stanford.edu/mailman/listinfo/liberationtech > >> > >> Should you need immediate assistance, please contact the list > moderator. > >> > >> Please don't forget to follow us on > >> http://twitter.com/#!/Liberationtech > >> > >> > >> > >> > >> > >> -- > >> > >> David V. Johnson > >> > >> Web Editor > >> Boston Review > >> Website: http://www.bostonreview.net > >> Twitter: http://twitter.com/BostonReview > >> > >> Tumblr: http://bostonreview.tumblr.com > >> > >> > >> Mailing Address: > >> San Francisco Writers' Grotto > >> > >> 490 2nd Street, 2nd Fl. > >> San Francisco, CA 94107 > >> > >> > >> Cell: (917)903-3706 > >> > >> > > > > _______________________________________________ > > liberationtech mailing list > > liberationtech at lists.stanford.edu > > > > Should you need to change your subscription options, please go to: > > > > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > > > If you would like to receive a daily digest, click "yes" (once you click > above) next to "would you like to receive list mail batched in a daily > digest?" > > > > You will need the user name and password you receive from the list > moderator in monthly reminders. You may ask for a reminder here: > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > > > Should you need immediate assistance, please contact the list moderator. > > > > Please don't forget to follow us on http://twitter.com/#!/Liberationtech > _______________________________________________ > liberationtech mailing list > liberationtech at lists.stanford.edu > > Should you need to change your subscription options, please go to: > > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > If you would like to receive a daily digest, click "yes" (once you click > above) next to "would you like to receive list mail batched in a daily > digest?" > > You will need the user name and password you receive from the list > moderator in monthly reminders. You may ask for a reminder here: > https://mailman.stanford.edu/mailman/listinfo/liberationtech > > Should you need immediate assistance, please contact the list moderator. > > Please don't forget to follow us on http://twitter.com/#!/Liberationtech > -- Brian Conley Director, Small World News http://smallworldnews.tv m: 646.285.2046 Skype: brianjoelconley public key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xCEEF938A1DBDD587 _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Mar 23 03:12:24 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 23 Mar 2012 11:12:24 +0100 Subject: [p2p-hackers] Distributed filesystem choices (aka: none yet?) Message-ID: <20120323101224.GS9891@leitl.org> ----- Forwarded message from "James A. Donald" ----- From eugen at leitl.org Fri Mar 23 03:47:34 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 23 Mar 2012 11:47:34 +0100 Subject: [cryptography] [info] The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) Message-ID: <20120323104734.GC9891@leitl.org> ----- Forwarded message from Peter Maxwell ----- From jis at qyv.net Fri Mar 23 09:18:23 2012 From: jis at qyv.net (Jeffrey I. Schiller) Date: Fri, 23 Mar 2012 12:18:23 -0400 Subject: [cryptography] [info] The NSA Is Building the Countrybs Biggest Spy Center (Watch What You Say) Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Let's think this through a bit. Assuming no stupendous breakthrough, breaking encrypted messages will always take a significant amount of time (and depending on the amount of "stuff" you have to deal with, 1 or 2 seconds might be significant!). So I see really only two purposes for such a massive data center, and I suspect both are addressed. 1) Use best available (to the NSA) techniques for breaking selected encrypted messages. Presumably these would be those from foreign governments and from suspected terrorists etc. But this will always be a limited number of messages. 2) Traffic analysis, including plain text analysis of unencrypted communications. Sure, there is a lot of encrypted stuff out there. But there is also a ton of unencrypted stuff, or stuff where you can easily get access to the unencrypted version (aka financial transactions etc.). And even of the encrypted traffic, a lot can be discarded as boring (aka say all of the https traffic to amazon.com). I bet everyone on this list can send encrypted messages to each other and they will never be broken... because they probably already know who we all are and (at least I hope) have put us all in the "mostly harmless" bucket. -Jeff _______________________________________________________________________ Jeffrey I. Schiller MIT Technologist, Consultant, and Cavy Breeder Cambridge, MA 02139-4307 617.910.0259 - Voice jis at qyv.net http://jis.qyv.name _______________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFPbKJA8CBzV/QUlSsRAqJtAJwI505prm8QIPa857/zSIcQhuV5KQCg/nJP CIXRIirq9MlcZrjEDaTkRgE= =2C2m -----END PGP SIGNATURE----- _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From elenorekaterine at talb.com Fri Mar 23 07:25:17 2012 From: elenorekaterine at talb.com (Janee Janita) Date: Fri, 23 Mar 2012 13:25:17 -0100 Subject: If you are one of the 1000s of men out there who are living a life of unhappiness because of your penis size, then the PenMax Products is answer to your problems 4sgw Message-ID: <201203232125.6BE1E84ED4AF7A6BF6A85D@p6v0295> PenMax Penis Enlargement Product Review If you are one of the 1000’s of men out there who are living a life of unhappiness because of your penis size, then the PenMax Products is answer to your problems Order the best penis enlargement pills available to buy online. http://herbalpenisdaily.ru From eugen at leitl.org Fri Mar 23 05:47:40 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 23 Mar 2012 13:47:40 +0100 Subject: [cryptography] [info] The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) Message-ID: <20120323124739.GM9891@leitl.org> ----- Forwarded message from dan at geer.org ----- From USPS_Shipping_Info at usps.com Fri Mar 23 06:42:35 2012 From: USPS_Shipping_Info at usps.com (Kent Bryant) Date: Fri, 23 Mar 2012 14:42:35 +0100 Subject: Your USPS postage labels charge. Message-ID: <6209110144.M75D702J404144@xfvdkyifmvjnsv.wihykmcxmxknxvh.info> Your USPS delivery Acct #: 4279130 Dear client: This is an email confirmation for your order of 3 online shipping label(s) with postage. We will charge you the following amount: Transaction Number: #4128125 Print Date/Time: 03/12/2012 02:30 PM CST Postage Amount: $45.44 Credit Card Number: XXXX XXXX XXXX XXXX Priority Mail Regional Rate Box B # 8394 1306  5265  9067  3411  (Sequence Number 1 of 1) For further information, please log on to www.usps.com/clicknship and go to your Shipping History or visit our Frequently Asked Questions . You can refund your unused postage labels up to 7 days after the issue date by logging on to your Click-N-Ship Account. Thank you for choosing the United States Postal Service Click-N-Ship: The Online Shipping Solution Click-N-Ship has just made on line shipping with the USPS even better. New Enhanced International Label and Customs Form: Updated Look and Easy to Use! * * * * * * * * This is a post-only message -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 2927 bytes Desc: not available URL: From eugen at leitl.org Fri Mar 23 07:34:15 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 23 Mar 2012 15:34:15 +0100 Subject: National Counterterrorism Center gets insane new power over private data on Americans Message-ID: <20120323143415.GA10779@leitl.org> http://endthelie.com/2012/03/23/national-counterterrorism-center-gets-insane-new-power-over-private-data-on-americans/ National Counterterrorism Center gets insane new power over private data on Americans By Madison Ruppert Editor of End the Lie Barack Obama with (now former) NCTC Director Michael Leiter, center right, leadership and analysts in the secure video teleconference room at the National Counterterrorism Center in McLean, Va, Oct. 6, 2009. (Image credit: White House/Samantha Appleton) Just when you thought the ludicrously paranoid federal government of the United States of America couldnbt get any worse; Attorney General Eric Holder signed new guidelines for the National Counterterrorism Center (NCTC). The American Big Brother surveillance state has grown exponentially over recent years and it does not look like it is going to be slowing down any time soon with the new guidelines which allow private data on Americans can be held when there is no suspicion of them being tied to terrorism for a whopping five years. Keep in mind, internet service providers just announced that they will soon be engaging in the largest digital spying operation in history, along with the National Security Agency (NSA) building a behemoth data center to process information, which could include just about anything. Now the NCTC is getting even more power from the Obama administration, something akin to the George W. Bush-era bTotal Information Awarenessb program which was supposedly partially shut down by Congress. For those who are unaware, the NCTC was established by Presidential Executive Order 13354 in 2004 and later actually codified by the Intelligence Reform and Terrorism Prevention Act of 2004. They are in an interesting position given that they report directly to the President and to the Director of National Intelligence, while following the policy dictated by the President and the National and Homeland Security Councils. Their primary focus is the collection and sharing of information, supposedly related to terrorism, but thanks to the new guidelines, they really donbt need to even pretend it is about terrorism anymore. Their information sharing reach goes far and wide, including the intelligence community and bState, Local, Tribal, and Private partners b in coordination with DHS, FBI, and other members of the ITACG Advisory Council,b according to the official website. Anyone who has been following these issues likely realizes that the federal government just repackaged the Total Information Awareness program. Now it exists as a much more distributed network of data harvesting and analysis systems involving both private and public entities. Much of the raw data mining work has been taken up by Silicon Valley giants and the technology sector, but now the NCTC will be better able to openly utilize this information against Americans who have absolutely no links to terrorism whatsoever. While the guidelines are public, I seriously doubt that the public document is the true, complete guide for their operations. Seeing as the Department of Homeland Security (DHS) seems to have absolutely no problem blatantly deceiving Congress, I see no reason to believe that the government would be upfront with the American people about anything these days. After all, they wonbt even tell us why they have decided that it is legal to kill us. These new guidelines are expected to result in the NCTC cloning entire databases of personal information on Americans, which they then will data mine using highly complex algorithms which supposedly can search for patterns that might indicate a possible, potential threat. According to unnamed intelligence officials cited by the New York Times, these new guidelines have been under development for some 18 months. They claim that they came in the wake of the designed-to-fail bunderwear bomberb attack by Umar Farouk Abdulmutallab. They claim that after the fact, they discovered that they had intercepted al Qaeda in the Arabian Peninsula (AQAP) communications and a report from the United States Consulate in Nigeria which could have identified Abdulmutallab before he was shuffled on to a plane by a U.S. government agent, according to eyewitness and practicing attorney Kurt Haskell. These changes will supposedly allow analysts to identify suspected terrorists more quickly, yet this assertion is patently absurd since Abdulmutallabbs father attempted to warn both the United States and Nigeria about what his son was doing. Clearly, they were not interested, and it is likely the case that the government knew full well what was going on, perhaps even running the operation from the top as they have so many terrorist patsies, the most recent of which came just last month. Haskellbs testimony is damning to say the least and the governmentbs reaction to it was even more damning. Dutch counterterrorism officials claimed that Abdulmutallab had a valid Nigerian passport when he boarded the flight, also citing security footage which did not show any accomplices. When Haskell encouraged them to put out the video to prove him wrong, U.S. officials then claimed that they were trying to identify and find the well-dressed man with the American accent that ushered Abdulmutallab on to the plane, adding that they believed he was there to make sure Abdulmutallab bdid not get cold feet.b I could go on for years tearing apart the farcical fairy tale that is the underwear bomber case, but I have touched on it before and my readers are likely astute enough to do their own research and come to their own conclusions on this matter. The main thing you should take away from this is that you should be extremely skeptical of the justifications given to wildly expand these NCTC powers, especially when even DHS officials claim to be ignorant when it comes to these critical details of the Abdulmutallab case. Itbs a lot easier to just ignore the facts rather than address them and attempt to explain them away, which is essentially impossible at this point. bThere is a genuine operational need to try to get us into a position where we can make the maximum use of the information the government already has to protect people,b said Robert S. Litt, the general counsel in the office of the Director of National Intelligence, which oversees the National Counterterrorism Center. This is the typical justification evoked by those who would love to see nothing more than every single last one of our rights stripped away from us in the name of safety. bWe have to manage to do that in a way that provides protection to peoplebs civil liberties and privacy. And I really think this has been a good-faith and reasonably successful effort to do that,b Litt added. However, there has been absolutely no protection of peoplebs civil liberties or privacy, in fact their bgood-faith and reasonably successful effortb has led directly to increased monitoring of the internet by DHS, which has been objected to by Representative Jackie Speier, not to mention the complete eradication of the right to due process and Eric Holderbs declaration that they have the legal authority to assassinate Americans. What few civil liberties we have left and what miniscule shred of privacy remains is being quickly swept away, as evidenced by these new NCTC guidelines. The NCTC has already created a list of databases to copy in their entirety b which Litt and others refuse to detail b and the DHS already shares a great deal of information, including biometric databases, as revealed by a FOIA lawsuit in November of last year. These new guidelines were also signed by Director of National Intelligence James R. Clapper Jr., who made news here at End the Lie early last month when he nonsensically claimed that Iran is bnow more willing to conduct an attack in the United States in response to real or perceived U.S. actions that threaten the regime.b The previous guidelines issued in 2008 outlined three ways for the NCTC to gather information on Americans collected by another agency. These options were: conducting a blimitedb search for the target data on their own, asking another agency to perform the search, or by copying the entire database and analyzing the information at the NCTC. Of course such division between agencies now are little more than theater, one example being the Foreign Intelligence Surveillance Court which green-lighting nearly all of the requests they get for years. If the NCTC asks an agency to conduct a search, I seriously doubt that the NCTC would have to ask twice, and it is likely the case that the agency would just hand over the entire database. After all, our tyrannical federal government has been making a concerted effort to break down any and all barriers (many of which are highly beneficial to the rights, privacy and safety of Americans) through such centers as the NCTC and the nationwide Fusion Centers. While the new NCTC guidelines will keep these three methods in place, they are placing a strong emphasis on the third option, likely because they want to collect and analyze as much private information on Americans as humanly possible. Handling data of this magnitude will be quite a bit easier when the NSAbs new data center is finished. Remember, all of these agencies work hand in hand. The new guidelines allow for private information on Americans with no suspected ties to terrorism to be held for five years, although I suspect in actuality it will be much longer. This is because the previous guidelines instructed the NCTC to delete data on innocent Americas promptly, which they somehow decided was 180 days if no ties to terrorism were detected (or manufactured). Furthermore, the first two options do not allow the bpattern analysisb techniques the NCTC loves so much, but there are no restrictions on cloned databases. The executive director of the Electronic Privacy Information Center (EPIC) has raised concerns about how these new guidelines could come into play with the many proposals to give the government increased access to a wide range of information and networks under the guise of protecting critical infrastructure. I have been covering this issue as much as possible, including McCainbs proposal which would give the power to the NSA and the military, along with the alternative proposal which would give the power to the DHS. Both of these proposals follow the recommendations made by a report published by MIT which had a laundry list of corporate badvisersb who would directly benefit from such legislation. In effect, they are identical; it is just a matter of which alphabet agency will be the standard bearer. These new guidelines do not mention how data mined from commercial sources b such as credit card records, travel records, etc b will be used, but the NCTCbs partnership with the private sector is far from reassuring. Furthermore, back in 2009 Wiredbs Threat Level got their hands on a list of the databases which the Federal Bureau of Investigation (FBI) acquired. As noted above, the FBI is one of the NCTCbs many government partners when it comes to sharing information, which means we can assume that the NCTC has all of the databases the FBI has obtained. These databases included almost 200 million records of private information belonging to Americans which was obtained through private so-called bdata brokersb like ChoicePoint. They also included some 55,000 records from Wyndham hotels and this was only what was obtained from a single agency a single time in 2009. Whatever the justification du jour may be, I recommend that you take a few steps back and examine the situation at hand. The government is neither keeping us safe nor serving us as they truly should. In fact, they manufacture terrorism, and have been doing so for quite a while now, in order to make us think that they are keeping us safe and keep believing that they are serving our interests while happily handing over our hard-earned cash and most critical rights. Instead, they are robbing us blind through several means including the naked corruption of the private Federal Reserve, while taking away every last one of our most critical freedoms and slaughtering countless innocent people across the world while turning just about everything, including innocuous bodily movements, into indicators of terrorism. We, as Americans, must push back against the American surveillance state and start asserting our right to privacy and the fact that we now know beyond a reasonable doubt that the war on terror has been a scam from the start. Take a stand, raise awareness and help us turn the tide against citizen spying (see also here, here, and here), the rapidly growing surveillance market, and the behemoth agency known as the DHS which would make the likes of Hitler, Stalin, Mao and Mussolini green with envy several times over. Only through making Americans aware of the reality of the dire situation we are in can we hope to begin to push back. As long as the government can successfully push their manufactured narrative through false flag terrorism and fear mongering, the American people will remain easily controlled. You can help by taking the few moments out of your day to share this article with anyone and everyone who can manage to get past their programming and face the facts. All it takes is a single person to set off a chain reaction of awakening and enact real change. On that note, Ibll leave you with this fitting quote from Samuel Adams: bIt does not require a majority to prevail, but rather an irate, tireless minority keen to set brush fires in peoplebs minds.b Did I miss anything or would you like to submit some of your own original writing or perhaps send a story tip or some other information my way? Email me at [email protected] From himqem44 at riederer.com Fri Mar 23 04:03:04 2012 From: himqem44 at riederer.com (=?koi8-r?B?IvfFzMnLz8zF0M7ZyiDQz8TB0s/LIg==?=) Date: Fri, 23 Mar 2012 16:03:04 +0500 Subject: =?koi8-r?B?5M/Sz8fPyiDQz8TB0s/LIM7BIMTFztgg0s/WxMXOydEg5OX75ffvIC0g?= =?koi8-r?B?y8HS1MnOwSDXINLP08vP287PyiDSwc3F?= Message-ID: Продается здесь: http://картина-тут.рф/9.shtml From m-- at gmx.com Fri Mar 23 09:41:57 2012 From: m-- at gmx.com (Michael Rogers) Date: Fri, 23 Mar 2012 16:41:57 +0000 Subject: [p2p-hackers] Distributed filesystem choices (aka: none yet?) Message-ID: On 22/03/12 23:41, James A. Donald wrote: > Repeating: You pseudonymously store other people's stuff, using a nym > that gains reputation thereby, and anonymously store your stuff on other > people's systems, using a nym with no reputation. Hi James, This is an intriguing idea, but I don't understand how cancelling out cycles of IOUs (which sounds very much like PledgeRoute, is that right?) can be combined with Chaumian mixing of IOUs. Let's say for the sake of argument that we've solved the problem of finding a trustworthy party to perform the mixing. Before mixing, Alice has an IOU from Bob. Alice has interacted with Bob before and established a credit limit for him, so she knows how much an IOU from him is worth. Alice puts her IOU into the mix and gets out someone else's IOU. Now she has an IOU from someone she's never interacted with. How does Alice know the IOU is worth anything? Cheers, Michael _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Fri Mar 23 09:26:42 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 23 Mar 2012 17:26:42 +0100 Subject: [cryptography] [info] The =?utf-8?Q?NS?= =?utf-8?Q?A_Is_Building_the_Country=E2=80=99?= =?utf-8?Q?s?= Biggest Spy Center (Watch What You Say) Message-ID: <20120323162642.GV9891@leitl.org> ----- Forwarded message from "Jeffrey I. Schiller" ----- From cocoony at rexspencer.com Fri Mar 23 01:41:21 2012 From: cocoony at rexspencer.com (=?koi8-r?B?wczY1MXSzsHUydfBIMHMy8/Hz8zA?=) Date: Fri, 23 Mar 2012 17:41:21 +0900 Subject: =?koi8-r?B?wsXa19LFxM7B0SDBzNjUxdLOwdTJ18EgwczLz8fPzMAgLSDXxdPFzNHd?= =?koi8-r?B?ycogx8Ha?= Message-ID: <897458177.22119780375016@rexspencer.com> Предлагаем хит клубных вечеринок √ Веселящий газ - теперь его можно заказать к себе домой, только у нас. www.smehgas.ru Только до 26 марта √ скидка 20%: 10 мини-баллончиков √ всего за 1000 р √ это 10 шариков для тебя и друзей Попробуй заряд бодрости и новые ощущения. Приятного улета! Позвони сейчас и получи бонус! (495)2204556 Веселящий газ - глоток свежего воздуха чтобы снять стресс. From eugen at leitl.org Fri Mar 23 09:51:47 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 23 Mar 2012 17:51:47 +0100 Subject: [p2p-hackers] Distributed filesystem choices (aka: none yet?) Message-ID: <20120323165147.GW9891@leitl.org> ----- Forwarded message from Michael Rogers ----- From eugen at leitl.org Fri Mar 23 09:52:18 2012 From: eugen at leitl.org (Eugen Leitl) Date: Fri, 23 Mar 2012 17:52:18 +0100 Subject: [liberationtech] Drones are not storytellers or why Syrians need better storytelling was Re: Pirate Bay turns to drones Message-ID: <20120323165218.GX9891@leitl.org> ----- Forwarded message from Brian Conley ----- From oilsh5876 at richterandco.com Fri Mar 23 02:16:07 2012 From: oilsh5876 at richterandco.com (=?koi8-r?B?7sHMz8fP19nFINPIxc3Z?=) Date: Fri, 23 Mar 2012 18:16:07 +0900 Subject: =?koi8-r?B?7sHMz8fP19nFINPIxc3ZLiDwz8zO2cogy9XS0yAyxM7R?= Message-ID: <000d01cd08d5$94361140$6400a8c0@oilsh5876> 26-28 марта 2012г. Налоговое планирование с учетом изменений законодательства √ лучшие белые схемы 8 (Ч95) 792*21/22 ; \Моск. код/ 792_2122 Цель: Ставка обязательных страховых взносов (СВ) с зарплаты с 2012 года составляет 30% почти для всех плательщиков (включая субъектов УСН и ЕНВД). При формальном снижении нагрузки по зарплате многих сотрудников фактически выплаты возрастут: если раньше с больших зарплат СВ не уплачивались, то теперь их ставка составит 10% с суммы дохода свыше 512 тыс. рублей в год. Если вспомнить про 13% НДФЛ и НДС, который тоже косвенно является налогом на зарплату, то многие предприниматели и руководители видят только один путь √ назад, к "черным" схемам. Есть возможность посещения любого одного дня: программа разбита на два логических блока, каждый из которых занимает один день. Рекомендуется посещение обоих дней. Первый день посвящен поиску путей выживания компаний при условии легальности всех выплат доходов физическим лицам. Участники узнают, как можно и как нельзя оптимизировать "зарплатные" налоги с учетом изменений законодательства, судебной практики и тенденций развития правоприменительной практики. Кроме того, рассматриваются общие для всех налоговых схем условия и принципы применения √ такие как наличие деловых целей, отсутствие аффилированности и фиктивных сделок, грамотное оформление. Второй день посвящен изучению основных практических методов оптимизации налога на прибыль и (в той степени, в которой это возможно) НДС в торговых (оптовых и розничных) и производственных предприятиях, предприятиях, оказывающих услуги или выполняющих работы, в т.ч. строительные. Рассматриваются субъекты льготного налогообложения, способы переноса на них налогооблагаемой базы и пути безналогового рефинансирования (возврата) выведенных сумм. Участники получат краткие индивидуальные консультации по тематике курса. Программа: 1 день: Общие положения о налоговом планировании и налоги с доходов физических лиц (НДФЛ, страховые взносы) 1. Понятие и принципы налогового планирования: платить налоги, но не переплачивать. "Черные", "серые" и "белые" схемы. Классификация методов оптимизации налогообложения доходов физических лиц. Обзор изменений законодательства по страховым взносам на 2012-13 гг., как они повлияли на налоговые схемы. 2. Использование специальных налоговых режимов: * в каком случае выплата зарплаты на спецрежимах сохраняет актуальность; * дивидендные схемы √ замена выплаты зарплате на "упрощенке"? Нюансы, рекомендации. Выплата квартальных дивидендов ежемесячно частями. Выплаты из прибыли в АО, ООО, производственном кооперативе ("народном предприятии"). Расчет эффективности, * договоры с предпринимателем: возмездного оказания услуг, выполнения работ, агентский, транспортные услуги, механизм трансфертных цен, штрафные санкции, аренда и пр. Способы минимизации рисков имущественной ответственности предпринимателя. Расчет эффективности, * дарение физлицом наличных денег, заработанных в качестве предпринимателя: легальная альтернатива обналичиванию, дающая безналоговый доход? Выбор банков, проблемы, связанные с новым порядком ведения кассовых операций. 3. Условия применения всех схем: Непритворный характер заключаемых сделок. Экономическая целесообразность расходов ("деловая цель", "легенда", отсутствие дублирующихся функций). Грамотное обоснование цен и качественное документальное оформление расходов. Неаффилированность, прямые и косвенные признаки аффилированности, ее негативные последствия и когда она допустима; "искусственное дробление бизнеса с целью уклонения от уплаты налогов" (подход "как к ЮКОСу"); "деловые цели", обосновывающие деление бизнеса. Самостоятельность низконалоговых субъектов. 4. Использование вспомогательных организаций: * "инвалидные" организации и их филиалы, актуальность; * страховые компании. Долгосрочное накопительное страхование жизни работников и ДМС за счет предприятия. 5. Использование иностранных (низконалоговых) компаний. Корпоративные или личные пластиковые карты иностранных банков. Перевод на них или на карты российских банков зарплат, компенсаций, гонораров и иных легальных доходов от нерезидентов. 6. Как компенсировать снижение социальных гарантий (включая пенсионные накопления) работников при применении налоговых схем, не предусматривающих выплату зарплаты? 7. Использование процентных займов от физлиц. Расчет эффективности. Потребительский кредитный кооператив граждан √ способ получения безналогового дохода в виде процентов. 8. Специальные методы. Все виды компенсаций (за несвоевременную выплату заработной платы, за использование личного имущества, за разъездной характер работы, "золотые парашюты" и др.). Выплата арендной платы. Закуп у физлиц ТМЦ. Суточные. Обучение сотрудников с заключением ученического договора, как способ налогового планирования. 9. Потребительское кредитование, компенсация процентов по ипотечным кредитам и другие эффективные способы замены заработной платы безналоговыми источниками материальной выгоды. 10. Способы подтверждения источников крупных расходов физлиц и когда это необходимо. 2 день: Общие положения о налоговом планировании и налоги с доходов физических лиц (НДФЛ, страховые взносы) 1. Методы планирования налога на прибыль и НДС. Принципиальная невозможность экономии НДС "белыми" схемами и случаи, когда это все же возможно. 2. Низконалоговые субъекты: * субъекты специальных налоговых режимов √ ЕНВД и УСН, в т.ч. патентная система, субъекты УСН из "низконалоговых" регионов, где введена минимальная ставка единого налога при объекте "доходы минус расходы" (5%) на все или почти на все виды деятельности, а также простое товарищество с их участием, * оффшоры или связанные с ними компании-нерезиденты из респектабельных юрисдикций, * экзотические варианты: ИП на общей системе, физлица (при условии несистематичности извлечения дохода), "инвалидные" структуры, убыточные предприятия и фирмы, имеющие переплату НДС, 3. Незаконные варианты: "недобросовестные налогоплательщики" и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Примеры "серых" схем с применением затратных механизмов (как нельзя "оптимизировать"!). Как не стать "недобросовестным". 4. Способы переноса налогооблагаемой базы по налогу на прибыль на низконалоговых субъектов: * нефиктивные услуги, работы, * выплата процентов по долговым обязательствам. Включение процентов в расходы в любом размере, * платежи за использование и обслуживание объектов основных средств и нематериальных активов, в т.ч. лицензионные и франчайзинговые, * штрафные санкции, возмещение убытков, включая демередж и прочий простой, * платежи за увеличенный срок и/или объем гарантийных обязательств, * плата за залог или поручительство, делькредере. * механизм трансфертных цен. Новое антитрансфертное законодательство, способы ухода от контроля за сделками, грамотное обоснование трансфертных цен, 5. Займы как способ возвратного рефинансирования √ преимущества и недостатки, риск ведения незаконной банковской деятельности. Безналоговое рефинансирование (возврат) и капитализация выведенной прибыли предприятия (холдинга) через уставный капитал, безвозмездную передачу имущества, увеличение чистых активов, ст. 27 Закона "Об ООО". 6. Простое товарищество субъектов упрощенной системы налогообложения, в т.ч. из "низконалоговых" регионов. Уплата НДС. Перенос прибыли товарищества на низконалоговых субъектов (УСН 6%, ЕНВД, оффшор и др.). Отсрочка уплаты налога при непередаче прибыли на счета товарищей. Возможен ли обход с помощью простого товарищества правил налогового учета (гл. 25 НК) и ограничений гл. 26.2 НК РФ в части перечня затрат? 7. Экономия НДС в торговле, производстве, выполнении работ, оказании услуг через разделение финансово-товарных потоков "с НДС" и "без НДС". Ограничение использования: покупатели/заказчики, не нуждающиеся в вычете НДС, как их выявить, или создать искусственно. Риски и рекомендации по использованию схемы. 8. Иностранные низконалоговые компании, цели применения. Их использование при проведении внутрироссийских операций для оптимизации налога на прибыль: традиционные (торговля, проценты, дивиденды, роялти, услуги и т.п.) и нетрадиционные схемы (простое товарищество, агентские). Выбор низконалоговых юрисдикций. 9. Обзор изменений налогового законодательства, как они повлияют на налоговые схемы. Ответы на вопросы. По желанию и по возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц курса. 3 день: Построение виртуальной группы компаний (холдинга): что это дает для налоговой оптимизации 1. Методы планирования НДС. Принципиальная невозможность экономии НДС "белыми" схемами и случаи, когда это все же возможно. 2. Оптимизация НДС и налога на прибыль в оптовой и розничной торговле и производстве с использованием ИП на ЕНВД с уплатой символического налога (маленький торговый зал, торговое место, развозная торговля). Нюансы. Ограничение использования: покупатели, не нуждающиеся в вычете НДС, как их выявить или создать искусственно. Риски, связанные определением розничной торговли по ГК и рекомендации по использованию схемы. 3. Экономия НДС в производстве, выполнении работ, оказании услуг, аренде и т.п. через разделение доходов и перераспределение расходов "с НДС" и "без НДС". 4. Примеры "серых" схем ("псевдооптимизации") НДС (как нельзя "оптимизировать"!). Недобросовестные налогоплательщики и контактирующие с ними риск-структуры ("белая" - "серая" - "черная" фирмы). Реализация товаров через неплательщика НДС (принципала) с использованием агентского договора. Планирование НДС с использованием механизма переоценки. Схема с небольшим агентским вознаграждением и большой дополнительной экономией (агент √ субъект УСН, договор предусматривает, что вся допвыгода принадлежит ему). Создание недоимки по налогам на фирме, не обремененной активами. Агент (комиссионер) не может удержать НДС при выплате дохода принципалу (комитенту)-нерезиденту (векселем и т.п.). 5. "Метод холдинга" в налоговом планировании. Понятие виртуальной группы компаний (холдинга) как средства налогового планирования. Создание рациональной финансовой и организационной холдинговой структуры, схемы товарно-финансовых потоков и договорных отношений холдинга. Рациональное построение финансовых потоков и договорных отношений в холдинге через разделение оборотов, капитала (прибыли), активов, персонала, отношений с контрагентами и рисков Элементы холдинга √ Основные предприятия, Управляющая или финансирующая компания (Казначейство), Хранитель активов, Торговый дом (Снабжающая или закупочная организация), Центры обслуживания (Кадровые центры), риск-структуры и их роли в налоговом планировании. Оперативное распределение налоговой нагрузки между участниками холдинга. 6. Два реальных примера комплексного налогового планирования в холдингах. Математическая модель налогообложения холдинга на цифровом примере, расчет эффективности налоговой оптимизации в холдинге. 7. Принципы налогового планирования использования основных средств. Планирование налога на имущество. "Хранитель активов" (лицо √ собственник имущественного комплекса), низконалоговые и безналоговые способы передачи имущества. Схемы с использованием лизинга. Возвратный лизинг. Переоценка основных средств и нелинейная амортизация. 8. Способы безналоговой и низконалоговой продажи имущества, включая недвижимость (крупные разовые сделки с большой прибылью): аргументированное занижение цены и создание затрат, оплата части стоимости через компании-нерезиденты; продажа через низконалогового субъекта (физлицо, УСН 6%, офшор┘); вклад в уставный капитал или реорганизация с последующей продажей новой компании напрямую покупателю или через низконалогового субъекта; простое товарищество. Риски. 9. Иностранные низконалоговые компании. Их использование при проведении внутрироссийских операций для оптимизации налога на прибыль: традиционные (торговля, проценты, дивиденды, роялти, услуги, и т.п) и нетрадиционные схемы (простое товарищество, агентские). Выбор низконалоговых юрисдикций. 10. Предприятия и организации инвалидов √ сохраняется ли их актуальность и в каких случаях? Рекомендации, типичные ошибки. 11. Изменения налогового законодательства, как они повлияли на налоговые схемы. Ответы на вопросы. По желанию и по возможности √ индивидуальное экспресс-моделирование схем налогового планирования для компаний-участниц семинара. Стоимость участия:1 день 9 000 руб. Стоимость участия:2 дня 16 000 руб. Стоимость участия:3 дня 23 000 руб. По вопpоcам pегucтаpацuu обpащайтеcь по тел: (код Москвы) 792-2122 <> 8 (Ч95) 792*21*22 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 15516 bytes Desc: not available URL: From psychosvnba218 at rowinguk.com Fri Mar 23 06:59:11 2012 From: psychosvnba218 at rowinguk.com (=?koi8-r?B?98HI1M/XycvJ?=) Date: Fri, 23 Mar 2012 19:29:11 +0530 Subject: =?koi8-r?B?98HI1M/X2cogzcXUz8Qgz9LHwc7J2sHDyckg0sHCz9Q=?= Message-ID: <000d01cd08fd$1f719d20$6400a8c0@psychosvnba218> 29 марта 2012 г. ОРГАНИЗАЦИЯ ВАХТОВОГО МЕТОДА РАБОТ НА ТЕРРИТОРИИ РФ +7 (495)- 7Ч291_98 или 8 (499) ЧЧ53968 Цель: рассмотреть особенности вахтового метода работы, изучить систему оплаты труда, применение районных коэффициентов к выплатам вахтовикам. Программа: 1. Вахтовый метод организации работ: нормативное регулирование. Нормативные акты, регулирующие применение вахтового метода. 2. Особенности вахтового метода работы: * отличие служебной командировки от вахтового метода работы; * разработка положения о вахтовом методе работе; * вахтовый метод организации работ: нормативное регулирование; * место нахождения организации, место жительства работника, место выполнения работ и пункт сбора; * особенности приема на работу вахтовиков. Виды договоров с сотрудниками. Порядок прохода медицинского осмотра. 3. Оплата труда при вахтовом методе работы. Гарантии и компенсации для лиц, работающих вахтовым методом: * компенсационная и стимулирующая части заработной платы; * оплата сверхурочных часов, работы в ночное время и в выходные дни; * оплата труда в районах крайнего севера и приравненных к ним местностях; * дополнительные отпуска, исчисление стажа работы при предоставлении отпуска; * надбавка за вахтовый метод; * доставка к месту проведения работ, организация питания и проживания работников. 4. Суммированный учет рабочего времени. Учет рабочего времени при вахтовом методе Учетный период при вахтовом методе организации работ. 5. Понятие вахты. Продолжительность вахты. Продолжительность рабочей смены и междусменного отдыха. Дни еженедельного отдыха. Дни в пути. Междувахтовый отдых. 6. Система оплаты труда при вахтовом методе. Страховые взносы во внебюджетные фонды. Часовая тарифная ставка. Надбавка за вахтовый метод работы Оплата дней в пути. Оплата дней междувахтового отдыха. 7. Доплаты при вахтовом методе работы. Надбавка за работу в тяжелых, вредных и опасных условиях труда. Оплата работ в ночное время, в праздничные и предпраздничные дни. 8. Применение районных коэффициентов к выплатам вахтовикам. Северная надбавка. Продолжительность дополнительного отпуска за работу в северных регионах. Стаж, дающий право на дополнительный отпуск. 9. Командировка на вахте и в период междувахтового отдыха. 10. Расчет отпускных и компенсаций за неиспользованный отпуск. Выплаты пособий по временной нетрудоспособности в период вахты и в период междувахтового отдыха. 11. Расходы на содержание вахтового поселка. Расходы на проезд, проживание и питания. Оплата проезда от пункта сбора к месту выполнения работ и от места жительства работника до пункта сбора. Стоимость участия: 7 800 рублей По вопpоcам pегucтаpацuu обpащайтеcь по тел: код (499) - 445_4095 или Московский код; 742\91*98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 5111 bytes Desc: not available URL: From marcelplug at gmail.com Fri Mar 23 21:08:11 2012 From: marcelplug at gmail.com (Marcel Plug) Date: Sat, 24 Mar 2012 00:08:11 -0400 Subject: last mile, regulatory incentives, etc (was: att fiber, et al) Message-ID: This article from arstechnica is right on topic. Its about how the city of Amsterdam built an open-access fibre network. It seems to me this is the right way to do it, or at least very close to the right way.. http://arstechnica.com/tech-policy/news/2010/03/how-amsterdam-was-wired-for-open-access-fiber.ars -Marcel On Fri, Mar 23, 2012 at 11:35 PM, wrote: > On Fri, 23 Mar 2012 14:18:26 -1000, Michael Painter said: > >> "The indication of above average or below average is based on a comparison of the actual test result to the current NTIA >> definition of broadband which is 768 kbps download and 200 kbps upload. Any test result above the NTIA definition is >> considered above average, and any result below is considered below average." > > That's the national definition of "broadband" that we're stuck with. To show > how totally cooked the books are, consider that when they compute "percent of > people with access to residential broadband", they do it on a per-county basis > - and if even *one* subscriber in one corner of the county has broadband, the > entire county counts. > ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From viragoesue41 at rlw.endjunk.com Sat Mar 24 01:36:50 2012 From: viragoesue41 at rlw.endjunk.com (=?koi8-r?B?7s/Xz8UgzyDXwczA1M7PzSDLz87U0s/MxQ==?=) Date: Sat, 24 Mar 2012 00:36:50 -0800 Subject: =?koi8-r?B?98HMwNTOz8Ug0sXH1czJ0s/Xwc7JxQ==?= Message-ID: ВНИМАНИЮ БАНКОВ, ФИНАНСОВЫХ, СТРАХОВЫХ КОМПАНИЙ - НОВЫЕ ИЗМЕНЕНИЯ ВСТУПИЛИ В СИЛУ Новое в системе валютного регулирования и валютного контроля Валютное регулирование (ЦБ РФ) +7 499 - 4Ч5/4О\95 \\\/// 8 (499) ЧЧ5_4О\95 05 апреля 2012г. Лектор: начальник управления Департамента финансового Мониторинга и валютного контроля Банка России. 1. Система валютного регулирования и валютного контроля в Российской Федерации и валютный контроль уполномоченных банков. Федеральный закон "О валютном регулировании и валютном контроле" № 173-ФЗ (с изменениями и дополнениями, в том числе внесенными Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе"), императивные нормы. Регулирование порядка поведения валютных операций резидентами и нерезидентами, открытия и ведения резидентами счетов в банках, расположенных за пределами Российской Федерации. Режим счета, открытого за рубежом 2. ИЗМЕНЕНИЯ• Действие валютного законодательства в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе"? (не вступил в силу) и Федерального закона от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" 3. Порядок осуществления валютного контроля, установленный нормативными актами Банка России по валютному контролю. Инструкция Банка России № 117-И (с изменениями и дополнениями). Паспорта сделок, как документы валютного контроля. Проблемные вопросы оформления и ведения. Документы валютного контроля, учета и отчетности. Действия уполномоченных банков при оформлении и проведении валютных операций. Указание Банка России от 26.09.08 № 2080-У "О внесении изменений в Положение Банка России № 258-П". Основные сроки представления документов валютного контроля (с учетом изменений). Направление информации о правонарушениях и Положение ЦБ РФ от 20.07.2007 N 308-П. Указание Банка России "О формах учета по валютным операциям, осуществляемым резидентами, за исключением кредитных организаций и валютных бирж" №1950-У и его влияние на квалификацию правонарушений. Порядок открытия и ведения счетов резидентов за пределами территории РФ. Правила осуществления резидентами валютных операций за счет средств, находящихся на счетах за рубежом. Переводы резидентами средств на свои счета. 4. Положение Банка России от 29.12.2010 № 364-П “О порядке передачи уполномоченными банками и территориальными учреждениями Банка России в таможенные органы для выполнения ими функций агентов валютного контроля информации по паспортам сделок по внешнеторговым договорам (контрактам) в электронном виде”. Указание Банка России от 29.12.2012 № 2556-У “О внесении изменения в пункт 1.2 Положения Банка России от 1 июня 2004 года № 258-П“О порядке представления резидентами уполномоченным банкам подтверждающих документов и информации, связанных с проведением валютных операций с нерезидентами по внешнеторговым сделкам, и осуществления уполномоченными банками контроля за проведением валютных операци3. Указание Банка России от 29.12.2010 № 2557-У “О внесении изменений в Инструкцию Банка России от 15 июня 2004 года № 117-И “О порядке представления резидентами и нерезидентами уполномоченным банкам документов и информации при осуществлении валютных операций, порядке учета уполномоченными банками валютных операций и оформления паспортов сделок” 5. Регулирование порядка представления информации о нарушениях валютного законодательства. Положение ЦБ РФ от 20.07.2007 N 308-П И практика его применения (с учетом последних изменений). Постановление Правительства РФ от 24 февраля 2009 г. N 166 "О порядке представления органами и агентами валютного контроля в орган валютного контроля, уполномоченный Правительством Российской Федерации. Практика применения Положения Банка России №308-П на примере конкретных нарушений. 6. Валютное регулирование операций физических лиц. Операции физических лиц и валютный контроль уполномоченных банков. Нормы прямого действия Федерального закона № 173-ФЗ (в том числе заработная плата и командировочные расходы). Порядок осуществления переводов денежных средств физическими лицами из Российской Федерации и по территории Российской Федерации. "Близкородственные" переводы. Действие Инструкции Банка России № 136-И.в связи с внесением изменений и дополнений в Федеральный закон № 115-ФЗ "О противодействии легализации (отмыванию) доходов, полученных преступным путем и финансированию терроризма" Федеральным законом от 27 июня 2011 г. N 162-ФЗ "О внесении изменений в отдельные законодательные акты Российской Федерации в связи с принятием Федерального закона "О национальной платежной системе" и в связи с принятием Федерального закона от 27 июня 2011 г. N 161-ФЗ "О национальной платежной системе" 7. Ответственность за нарушение валютного законодательства. Федеральный Закон № 174-ФЗ. 8. Перспективы развития валютного регулирования и валютного контроля в Российской Федерации. Стоимость участия в семинаре 9970 рублей Вся информация по тел: +7 (Ч95) 792\2I22 <<>> код (495) - 7_42_91.98 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 7761 bytes Desc: not available URL: From nerytianna at ganderson.com Fri Mar 23 15:28:51 2012 From: nerytianna at ganderson.com (Francisco Linnie) Date: Sat, 24 Mar 2012 02:28:51 +0400 Subject: VIAGRA 100mg x 130 Pills $172, VISA ONLY znojr Message-ID: <12t20c38u77-45685763-183q9p80@jcirdrss> VIAGRA 100mg x 130 Pills $172, VISA ONLY Buy VIAGRA (Sildenafil) 100mg or 50mg From Our Online Pharmacy - No Prescription Required Express Shipping To U.S - Secured Checkout - VISA ONLY. http://life-marketmed.ru From marsh at extendedsubset.com Sat Mar 24 00:29:30 2012 From: marsh at extendedsubset.com (Marsh Ray) Date: Sat, 24 Mar 2012 02:29:30 -0500 Subject: [cryptography] [info] The NSA Is Building the Countrybs Biggest Spy Center (Watch What You Say) Message-ID: On 03/24/2012 01:28 AM, J.A. Terranson wrote: > > Ahhhhh... Probably not. Think Jim Bell et al. I suspect it is far more > likely that the vast majority of subscribers here are listed in the > Potentially Dangerous category, if not the flat out Budding Terrorist > label. Oh good grief. Do you even know how many subscribers this list has? If not, one shouldn't make such a statement without basis. The subscriber count wasn't public last I checked (today). Perhaps Jack Lloyd will tell us. My guess is the majority of subscribers hardly ever post. Of those who do, many are noted academics, professional engineers, industry executives, public speakers, and others of good repute. If you're looking for someplace to feel subversive around, this isn't it. Crypto is a mainstream engineering discipline these days, and one greatly needed by modern civilization. Can we kill this thread now please? - Marsh _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From anders at aleph.se Sat Mar 24 05:36:51 2012 From: anders at aleph.se (Anders Sandberg) Date: Sat, 24 Mar 2012 12:36:51 +0000 Subject: [ExI] The NSA's new data center Message-ID: I did a little calculation: at what point can governments spy 24/7 on their citizens and store all the data? I used the World Bank World Development Indicators and IMF predictors for future GDP growth and the United nations median population forecasts, the fit 10.^(-.2502*(t-1980)+6.304) for the cost (in dollars)per gigabyte (found on various pages about Kryder's law) and the assumption that 24/7 video surveillance would require 10 TB per person per year. Now, if we assume the total budget is 0.1% of the GDP and the storage is just 10% of that (the rest is overhead, power, cooling, facilities etc), then the conclusion is that doing this becomes feasible around 2020. Bermuda, Luxenbourg and Norway can do it in 2018, by 2019 most of Western Europe plus the US and Japan can do it. China gets there in 2022. The last countries to reach this level are Eritrea and Liberia in 2028, and finally Zimbabwe in 2031. By 2025 the US and China will be able to monitor all of humanity if they want to/are allowed. So at least data storage is not going to be any problem. It would be very interesting to get some estimates of the change in cost of surveillance cameras and micro-drones, since presumably they are the ones that are actually going to be the major hardware costs. Offset a bit because we are helpfully adding surveillance capabilities to all our must-have smartphones and smart cars. I suspect the hardware part will delay introduction a bit in countries that want it, but that just mean there will be hardware overhang once they get their smart dust, locators or gnatbots. Note that this kind of video archive is useful even if you don't have a myriad analysts, perfect speech recognition or AI (in fact, it would be a great incentive and training corpus for developing them). When you figure out that somebody is doing or have just done something nasty, you can easily backtrack and check on everybody they had been in touch with. It would be quite easy to catch most members of any rebel network this way as soon as it was recognized as a rebel network - and one could easily create incentives for not associating with potential subversives and/or reporting them, adding crowdsourced reporting. The only kind of uprisnings with any kind of chance would be spontaneous eruptions. The more interesting (sinister) uses of this kind of intelligence corpus is of course to do trials and experiments to see what predicts social norm compliance and obedience. How well does various forms of nudging work? What about the longitudinal loyalty effects of natural or deliberate experiments? How well can you predict people from their saccade patterns? We might actually be living in a short window of opportunity right now. The problem is not the surveillance per se, but the danger from non-accountable uses of them once they are in place. Totalitarian governments with this kind of transparency might prove extremely hard to dislodge, and could become stable attractor states. This suggests that we should work very hard on figuring out how to maintain government accountability even when it has total surveillance powers, and how to prevent open societies from sliding into the totalitarian trap. Given that the tail statistics of big disasters is dominated by pandemics, wars and democides we have very good reasons to view this as among the top questions for human survival. Appendix: 2018 Bermuda 2018 Luxembourg 2018 Norway 2019 Australia 2019 Austria 2019 Belgium 2019 Canada 2019 Denmark 2019 Finland 2019 France 2019 Germany 2019 Iceland 2019 Ireland 2019 Japan 2019 Kuwait 2019 Netherlands 2019 Singapore 2019 Sweden 2019 Switzerland 2019 United Kingdom 2019 United States 2020 Cyprus 2020 French Polynesia 2020 Greece 2020 Israel 2020 Italy 2020 New Caledonia 2020 New Zealand 2020 Oman 2020 Puerto Rico 2020 Seychelles 2020 Slovakia 2020 Slovenia 2020 Spain 2020 United Arab Emirates 2021 Antigua and Barbuda 2021 Bahamas 2021 Bahrain 2021 Barbados 2021 Chile 2021 Croatia 2021 Czech Republic 2021 Equatorial Guinea 2021 Estonia 2021 Hungary 2021 Lithuania 2021 Poland 2021 Portugal 2021 Saudi Arabia 2021 Trinidad and Tobago 2021 Turkey 2022 Argentina 2022 Belarus 2022 Botswana 2022 Brazil 2022 Bulgaria 2022 China 2022 Costa Rica 2022 Cuba 2022 Dominica 2022 Dominican Republic 2022 Gabon 2022 Grenada 2022 Kazakhstan 2022 Latvia 2022 Lebanon 2022 Malaysia 2022 Mauritius 2022 Mexico 2022 Palau 2022 Panama 2022 Peru 2022 Romania 2022 South America 2022 Suriname 2022 Uruguay 2023 Albania 2023 Algeria 2023 Angola 2023 Azerbaijan 2023 Belize 2023 Bhutan 2023 Colombia 2023 Ecuador 2023 El Salvador 2023 Fiji 2023 Iraq 2023 Mongolia 2023 Morocco 2023 Namibia 2023 Serbia 2023 Thailand 2023 Tonga 2023 Tunisia 2023 Turkmenistan 2023 Ukraine 2024 Armenia 2024 Georgia 2024 Guatemala 2024 Guyana 2024 Honduras 2024 India 2024 Indonesia 2024 Marshall Islands 2024 Paraguay 2024 Philippines 2024 Samoa 2024 Sri Lanka 2024 Swaziland 2025 Bangladesh 2025 Cameroon 2025 Djibouti 2025 Egypt 2025 Ghana 2025 Lesotho 2025 Nicaragua 2025 Nigeria 2025 Pakistan 2025 Papua New Guinea 2025 Sao Tome and Principe 2025 Senegal 2025 Solomon Islands 2025 Sub-Saharan Africa 2025 Sudan 2025 Uzbekistan 2025 Zambia 2026 Afghanistan 2026 Benin 2026 Haiti 2026 Kenya 2026 Kyrgyzstan 2026 Mauritania 2026 Mozambique 2026 Tajikistan 2026 Uganda 2027 Central African Republic 2027 Chad 2027 Ethiopia 2027 Gambia 2027 Guinea 2027 Madagascar 2027 Malawi 2027 Mali 2027 Nepal 2027 Niger 2027 Rwanda 2027 Sierra Leone 2027 Togo 2028 Burundi 2028 Eritrea 2028 Liberia 2031 Zimbabwe -- Anders Sandberg, Future of Humanity Institute Philosophy Faculty of Oxford University _______________________________________________ extropy-chat mailing list extropy-chat at lists.extropy.org http://lists.extropy.org/mailman/listinfo.cgi/extropy-chat ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From iang at iang.org Fri Mar 23 20:05:28 2012 From: iang at iang.org (ianG) Date: Sat, 24 Mar 2012 14:05:28 +1100 Subject: [p2p-hackers] Distributed filesystem choices (aka: none yet?) Message-ID: On 24/03/12 03:41 AM, Michael Rogers wrote: > On 22/03/12 23:41, James A. Donald wrote: >> Repeating: You pseudonymously store other people's stuff, using a nym >> that gains reputation thereby, and anonymously store your stuff on other >> people's systems, using a nym with no reputation. > > Hi James, > > This is an intriguing idea, but I don't understand how cancelling out > cycles of IOUs (which sounds very much like PledgeRoute, is that right?) > can be combined with Chaumian mixing of IOUs. He means Chaumian blinding protocol for transferring a single IOU from Alice to Bob. A Chaum blinded transfer ensures that the issuer Ivan cannot trace the transfer from Alice to Bob, in this case it gives untraceability (as opposed to anonymity or psuedonymity). (I suspect...) Chaumian mixing is a completely different thing to Chaum's blinding formula. iang > Let's say for the sake of argument that we've solved the problem of > finding a trustworthy party to perform the mixing. > > Before mixing, Alice has an IOU from Bob. Alice has interacted with Bob > before and established a credit limit for him, so she knows how much an > IOU from him is worth. Alice puts her IOU into the mix and gets out > someone else's IOU. Now she has an IOU from someone she's never > interacted with. How does Alice know the IOU is worth anything? > > Cheers, > Michael _______________________________________________ p2p-hackers mailing list p2p-hackers at lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From agustinagenevieve at palisade.com Sat Mar 24 01:22:12 2012 From: agustinagenevieve at palisade.com (Dee Spring) Date: Sat, 24 Mar 2012 15:22:12 +0700 Subject: Express Shipping To U.S - Secured Checkout - VIAGRA 100mg x 130 Pills $172, VISA ONLY xt29a Message-ID: <46o55l66i24-32309534-658g3g64@zubchlwjkpsj0> VIAGRA 100mg x 130 Pills $172, VISA ONLY Buy VIAGRA (Sildenafil) 100mg or 50mg From Our Online Pharmacy - No Prescription Required Express Shipping To U.S - Secured Checkout - VISA ONLY. http://medlifemarket.ru From eugen at leitl.org Sat Mar 24 07:46:20 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 24 Mar 2012 15:46:20 +0100 Subject: [ExI] The NSA's new data center Message-ID: <20120324144620.GG9891@leitl.org> ----- Forwarded message from Anders Sandberg ----- From eugen at leitl.org Sat Mar 24 10:56:27 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 24 Mar 2012 18:56:27 +0100 Subject: [p2p-hackers] Distributed filesystem choices (aka: none yet?) Message-ID: <20120324175627.GQ9891@leitl.org> ----- Forwarded message from ianG ----- From eugen at leitl.org Sat Mar 24 11:11:30 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 24 Mar 2012 19:11:30 +0100 Subject: last mile, regulatory incentives, etc (was: att fiber, et al) Message-ID: <20120324181130.GT9891@leitl.org> ----- Forwarded message from Marcel Plug ----- From eugen at leitl.org Sat Mar 24 12:53:55 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 24 Mar 2012 20:53:55 +0100 Subject: [cryptography] [info] The =?utf-8?Q?NS?= =?utf-8?Q?A_Is_Building_the_Country=E2=80=99?= =?utf-8?Q?s?= Biggest Spy Center (Watch What You Say) Message-ID: <20120324195355.GV9891@leitl.org> Marsh apparently assumes that sorting into 'good' and 'bad' buckets is actually based on evaluating background factors (which the evaluator is somehow, all magically aware of)), and is in fact done by people with plenty of quality eyeball time. ----- Forwarded message from Marsh Ray ----- From eugen at leitl.org Sat Mar 24 14:20:29 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sat, 24 Mar 2012 22:20:29 +0100 Subject: John =?utf-8?B?TmFzaOKAmQ==?= =?utf-8?Q?s?= Letter to the NSA Message-ID: <20120324212029.GA26394@leitl.org> http://agtb.wordpress.com/2012/02/17/john-nashs-letter-to-the-nsa/ John Nashbs Letter to the NSA February 17, 2012 by Noam Nisan The National Security Agency (NSA) has recently declassified an amazing letter that John Nash sent to it in 1955. It seems that around the year 1950 Nash tried to interest some US security organs (the NSA itself was only formally formed only in 1952) in an encryption machine of his design, but they did not seem to be interested. It is not clear whether some of his material was lost, whether they ignored him as a theoretical professor, or b who knows b used some of his stuff but did not tell him. In this hand-written letter sent by John Nash to the NSA in 1955, he tries to give a higher-level point of view supporting his design: In this letter I make some remarks on a general principle relevant to enciphering in general and to my machine in particular. He tries to make sure that he will be taken seriously: I hope my handwriting, etc. do not give the impression I am just a crank or circle-squarer. My position here is Assist. Prof. of Math. My best known work is in game theory (reprint sent separately). He then goes on to put forward an amazingly prescient analysis anticipating computational complexity theory as well as modern cryptography. In the letter, Nash takes a step beyond Shannonbs information-theoretic formalization of cryptography (without mentioning it) and proposes that security of encryption be based on computational hardness b this is exactly the transformation to modern cryptography made two decades later by the rest of the world (at least publiclyb&). He then goes on to explicitly focus on the distinction between polynomial time and exponential time computation, a crucial distinction which is the basis of computational complexity theory, but made only about a decade later by the rest of the world: So a logical way to classify enciphering processes is by t he way in which the computation length for the computation of the key increases with increasing length of the key. This is at best exponential and at worst probably at most a relatively small power of r, ar^2 or ar^3, as in substitution ciphers. He conjectures the security of a family of encryption schemes. While not totally specific here, in todaybs words he is probably conjecturing that almost all cipher functions (from some b not totally clear b class) are one-way: Now my general conjecture is as follows: for almost all sufficiently complex types of enciphering, especially where the instructions given by different portions of the key interact complexly with each other in the determination of their ultimate effects on the enciphering, the mean key computation length increases exponentially with the length of the key, or in other words, the information content of the key. He is very well aware of the importance of this bconjectureb and that it implies an end to the game played between code-designers and code-breakers throughout history. Indeed, this is exactly the point of view of modern cryptography. The significance of this general conjecture, assuming its truth, is easy to see. It means that it is quite feasible to design ciphers that are effectively unbreakable. As ciphers become more sophisticated the game of cipher breaking by skilled teams, etc., should become a thing of the past. He is very well aware that this is a conjecture and that he cannot prove it. Surprisingly, for a mathematician, he does not even expect it to be solved. Even more surprisingly he seems quite comfortable designing his encryption system based on this unproven conjecture. This is quite eerily what modern cryptography does to this day: conjecture that some problem is computationally hard; not expect anyone to prove it; and yet base their cryptography on this unproven assumption. The nature of this conjecture is such that I cannot prove it, even for a special type of ciphers. Nor do I expect it to be proven. All in all, the letter anticipates computational complexity theory by a decade and modern cryptography by two decades. Not bad for someone whose bbest known work is in game theoryb. It is hard not to compare this letter to Goedelbs famous 1956 letter to von Neumann also anticipating complexity theory (but not cryptography). That both Nash and Goedel passed through Princeton may imply that these ideas were somehow bin the airb there. ht: this declassified letter seems to have been picked up by Ron Rivest who posted it on his coursebs web-site, and was then blogged about (and G+ed) by Aaron Roth. Edit: Ron Rivest has implemented Nashbs cryptosystem in Python. I wonder whether modern cryptanalysis would be able to break it. From courtneyava at ajlopez.com Sat Mar 24 22:38:08 2012 From: courtneyava at ajlopez.com (EliciaVicky) Date: Sun, 25 Mar 2012 01:38:08 -0400 Subject: PenMax Penis Enlargement Product Review 9a502k20 Message-ID: <54f91d57y34-87334057-462u9z73@yftvtkshak> PenMax Penis Enlargement Product Review If you are one of the 1000�s of men out there who are living a life of unhappiness because of your penis size, then the PenMax Products is answer to your problems Order the best penis enlargement pills available to buy online. http://herbalpenissound.ru From brk7bx at virginia.edu Sun Mar 25 09:45:55 2012 From: brk7bx at virginia.edu (Benjamin Kreuter) Date: Sun, 25 Mar 2012 12:45:55 -0400 Subject: [cryptography] [info] The NSA Is Building the Countrybs Biggest Spy Center (Watch What You Say) Message-ID: On Sat, 24 Mar 2012 02:29:30 -0500 Marsh Ray wrote: > If you're looking for someplace to feel subversive around, this isn't > it. Crypto is a mainstream engineering discipline these days, and one > greatly needed by modern civilization. Unfortunately, there is still a great deal of resistance to the notion that cryptography is something that people should have, at least cryptography without backdoors. When last I checked, the Department of Justice was still pushing communication service providers to include some sort of back door, so that law enforcement agencies can decrypt the encrypted communications of suspects in criminal cases. They basically think that the Hushmail model is the right one: http://judiciary.house.gov/hearings/hear_02172011.html (Apologies for the length; the summary is this: the FBI is worried about criminals or terrorists using encryption to hide their communications from law enforcement and national security agencies, as well as the lack of CALEA-style systems on the Internet. They as asking for a law that requires communications service providers to provide plaintexts if it is possible to do so e.g. Hushmail-style decryption. The FBI insists that they are not talking about key escrow or key recovery, and they avoid using the term "back door" to describe what they want.) Even worse, here at UVA we had a graduate student who was denied entry because he traveled to a cryptography conference (he is here on a student visa, and is a Chinese citizen). The State Department would not allow him to come back to school unless he switched fields and stopped doing computer security work. He is working on wireless sensor networks now -- clearly a field that could not possibly have any national security implications. The law has definitely improved over what cryptographers faced in the 90s, but the attitudes have not. The US government still wants a system where encrypted communications can be arbitrarily decrypted, they just dress up the argument and avoid using dirty words like "key escrow." -- Ben -- Benjamin R Kreuter UVA Computer Science brk7bx at virginia.edu KK4FJZ -- "If large numbers of people are interested in freedom of speech, there will be freedom of speech, even if the law forbids it; if public opinion is sluggish, inconvenient minorities will be persecuted, even if laws exist to protect them." - George Orwell _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From roseannarenata at jencoprod.com Sun Mar 25 12:50:59 2012 From: roseannarenata at jencoprod.com (Tamesha Roma) Date: Sun, 25 Mar 2012 12:50:59 -0700 Subject: Buy VIAGRA (Sildenafil) 100mg or 50mg From Our Online Pharmacy - No Prescription Required - 100mg x 130 Pills $172 elo9 Message-ID: <59c62a71k71-76057974-759a8l39@qwxepagecyilt> VIAGRA 100mg x 130 Pills $172, VISA ONLY Buy VIAGRA (Sildenafil) 100mg or 50mg From Our Online Pharmacy - No Prescription Required Express Shipping To U.S - Secured Checkout - VISA ONLY. http://medmarketlife.ru From bzj at gmail.com Sat Mar 24 23:01:22 2012 From: bzj at gmail.com (ŽR ߎq) Date: Sun, 25 Mar 2012 15:01:22 +0900 Subject: No subject Message-ID: <201203230605.q2N65GBX015021@proton.jfet.org> ※冷かしでの参加は絶対にお止め下さい!! お金持ちな人妻から"お小遣い"が貰える!! "嘘"無しの報酬先払い!!女性を満足させよう。 嘘のような本当の話。逆援助を望んでいる方は実在します。 当サイトは本物を"報酬先払い"という形で証明します。 信じる人だけご入場下さい。男性はもちろん無料です。 何をすればお金を貰えるのか?  ↓↓ http://sukimono.info/paex28/ 【 報酬例 Aさんの場合】  一晩で平均報酬3万円  3万円×15日=45万円/月   ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ★こちらが実際の体験談  ↓↓ http://sukimono.info/paex28/ この メ ル マ ガは懸 賞 サ イ ト 会 員 様に配 信されています。 解 除 はこちら sup_ado_123 at yahoo.co.jp From kandimicah at eaglegl.com Sun Mar 25 08:47:11 2012 From: kandimicah at eaglegl.com (Eugenia) Date: Sun, 25 Mar 2012 15:47:11 +0000 Subject: Sildenafil, Tadalafil, Vardenafil at Lowest Prices! No Prescription Required. hhx7 Message-ID: <98g70d17f66-48283192-247k7g57@zmopwggpe> Sildenafil, Tadalafil, Vardenafil at Lowest Prices! No Prescription Required. Generics and Brands, Soft, Professional and Super Active. More than 40 various pills for Erectile Dysfunction. Order from Secure Pharmacy! http://remedycutmedspills.ru From violetteraina at fsbankblm.com Sun Mar 25 16:15:48 2012 From: violetteraina at fsbankblm.com (NEREIDA KATHEY) Date: Sun, 25 Mar 2012 17:15:48 -0600 Subject: Buy VIAGRA (Sildenafil) 100mg or 50mg From Our Online Pharmacy - No Prescription Required - 100mg x 130 Pills $172 gpvls02 Message-ID: <62b86m40x76-40804162-323d5w93@5l7tgbr9f> VIAGRA 100mg x 130 Pills $172, VISA ONLY Buy VIAGRA (Sildenafil) 100mg or 50mg From Our Online Pharmacy - No Prescription Required Express Shipping To U.S - Secured Checkout - VISA ONLY. http://medmarketlife.ru From schoen at loyalty.org Sun Mar 25 18:22:43 2012 From: schoen at loyalty.org (Seth David Schoen) Date: Sun, 25 Mar 2012 18:22:43 -0700 Subject: [cryptography] [info] The NSA Is Building the Countrybs Biggest Spy Center (Watch What You Say) Message-ID: ianG writes: > On 26/03/12 07:43 AM, Jon Callas wrote: > > >This is precisely the point I've made: the budget way to break crypto is to buy a zero-day. And if you're going to build a huge computer center, you'd be better off building fuzzers than key crackers. > > point of understanding - what do you mean by fuzzers? Automatically trying to make software incur faults with large amounts of randomized (potentially invalid) input. https://en.wikipedia.org/wiki/Fuzz_testing If you get an observable fault you can repeat the process under a debugger and try to understand why it occurred and whether it is an exploitable bug. Here's a pretty detailed overview: https://www.blackhat.com/presentations/bh-usa-07/Amini_and_Portnoy/Whitepaper/bh-usa-07-amini_and_portnoy-WP.pdf When it was first invented, fuzzing basically just consisted of feeding random bytes to software, but now it can include sophisticated understanding of the kinds of data that a program expects to see, with some model of the internal state of the program. I believe there are also fuzzers that examine code coverage, so they can give feedback to the tester about whether there are parts of the program that the fuzzer isn't exercising. -- Seth David Schoen | No haiku patents http://www.loyalty.org/~schoen/ | means I've no incentive to FD9A6AA28193A9F03D4BF4ADC11B36DC9C7DD150 | -- Don Marti _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Sun Mar 25 11:31:57 2012 From: eugen at leitl.org (Eugen Leitl) Date: Sun, 25 Mar 2012 20:31:57 +0200 Subject: [cryptography] [info] The =?utf-8?Q?NS?= =?utf-8?Q?A_Is_Building_the_Country=E2=80=99?= =?utf-8?Q?s?= Biggest Spy Center (Watch What You Say) Message-ID: <20120325183157.GC17245@leitl.org> ----- Forwarded message from Benjamin Kreuter ----- From marsh at extendedsubset.com Sun Mar 25 20:55:12 2012 From: marsh at extendedsubset.com (Marsh Ray) Date: Sun, 25 Mar 2012 22:55:12 -0500 Subject: [cryptography] Key escrow 2012 Message-ID: (Nod to the rest of what you said) On 03/25/2012 11:45 AM, Benjamin Kreuter wrote: > The US government still wants a > system where encrypted communications can be arbitrarily decrypted, > they just dress up the argument and avoid using dirty words like "key > escrow." Aside from the deep moral and constitutional problems it poses, does anyone think the US Govt could have that even from a practical perspective? * Some of the largest supercomputers in the world are botnets or are held by strategic competitor countries. This precludes the old key shortening trick. * The Sony PS3 and HDMI cases show just how hard it can be to keep a master key secure sometimes. Master keys could be quite well protected, but from a policy perspective it's still a gamble that something won't go wrong which compromises everyone's real security (cause a public scandal, expose industrial secrets, etc.). * Am I correct in thinking that computing additional trapdoor functions to enable USG/TLA/LEA decryption is not free? Mobile devices are becoming the primary computing devices for many. People may be willing to pay XX% in taxes, but nobody wants to pay a decrease in performance and battery life to enable such a misfeature. - Marsh _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From nico at cryptonector.com Sun Mar 25 21:54:13 2012 From: nico at cryptonector.com (Nico Williams) Date: Sun, 25 Mar 2012 23:54:13 -0500 Subject: [cryptography] Key escrow 2012 Message-ID: On Sun, Mar 25, 2012 at 10:55 PM, Marsh Ray wrote: > On 03/25/2012 11:45 AM, Benjamin Kreuter wrote: >> The US government still wants a No, probably parts of it: the ones that don't have to think of the big picture. The U.S. government is not monolythic. The NSA has shown a number of times that they are interested in strong civilian cryptography for reasons of... national security. In a battle between law enforcement and national security the latter has to win. >> system where encrypted communications can be arbitrarily decrypted, >> they just dress up the argument and avoid using dirty words like "key >> escrow." > > Aside from the deep moral and constitutional problems it poses, does anyone > think the US Govt could have that even from a practical perspective? > > * Some of the largest supercomputers in the world are botnets or are held by > strategic competitor countries. This precludes the old key shortening trick. > > * The Sony PS3 and HDMI cases show just how hard it can be to keep a master > key secure sometimes. Master keys could be quite well protected, but from a > policy perspective it's still a gamble that something won't go wrong which > compromises everyone's real security (cause a public scandal, expose > industrial secrets, etc.). Key escrow == gigantic SPOF. Even if you split the escrow across several agencies and don't use a single master key, it's still concentrating systemic failure potential into too few points. To build a single point of catastrophic failure into one's economic infrastructure is one of the biggest strategic blunders I can imagine (obviously there's worse, such as simply surrendering when one clearly has the upper hand, say). Back in the early 90s this probably wasn't as clear as it is today. > * Am I correct in thinking that computing additional trapdoor functions to > enable USG/TLA/LEA decryption is not free? Mobile devices are becoming the > primary computing devices for many. People may be willing to pay XX% in > taxes, but nobody wants to pay a decrease in performance and battery life to > enable such a misfeature. Most users already pay heavy battery/performance taxes in the form of uninstallable adware built into their devices. The vendors might be the ones to object then since they might have to stop shipping such software. But ultimately this argument depends on how heavy a burden the users end up feeling. For my money the winning argument is the strategic idiocy/insanity of unnecessary SPOFs. Who wants to ever even think of saying to the POTUS "Mr. President, we have a mole, they've stolen the codes for our civilian networks and they've shut them down from the people's shear fear of financial and other losses. It will take months to re-key everything and in the meantime we'll lose X% of GDP. The stock and bond markets have crashed." As time passes X will tend to increase in the event of such a catastrophe. The higher that percentage the more crippling the attack, with derivatives losses becoming overwhelming at small values of X. It could get worse: "Mr. President, we can't even re-key without changing all these hardware dongles that are manufactured by the enemy, who's now not selling them to us." If the point of key escrow is to make law enforcement easier then there are much simpler non-cryptographic solutions -- not ones to your taste or mine perhaps, but certainly ones that don't involve strategic SPOFs. I'm with you: key escrow is necessarily dead letter, at least for the time being and the foreseeable future. Nico -- _______________________________________________ cryptography mailing list cryptography at randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From chantebirgit at cypressconsulting.com Sun Mar 25 21:53:28 2012 From: chantebirgit at cypressconsulting.com (Lavinia Shonta) Date: Mon, 26 Mar 2012 00:53:28 -0400 Subject: Generic Cialis 20mg x 30 pills $69. We accept VISA, AMEX, E-Check. EMS/USPS, Express Airmail delivery 5-8 days. cxl8ke3 Message-ID: <4f6ff648.efaafade@cypressconsulting.com> Generic Cialis 20mg x 30 pills $69 We accept VISA, AMEX, E-Check. EMS/USPS, Express Airmail delivery 5-8 days. Buy Hight Quality Pills Without Prescription! http://tabletsrxwellbeing.ru From magalykittie at clarks.com Sun Mar 25 18:17:01 2012 From: magalykittie at clarks.com (Shala Claudine) Date: Mon, 26 Mar 2012 01:17:01 +0000 Subject: Quality Replica Handbags. Our company sells only top-quality replica handbags identical to your favorite designer bags ymtniejl Message-ID: <4f6fc38d.1991edca@clarks.com> Quality Replica Handbags. Our company sells only top-quality replica handbags identical to your favorite designer bags We promise that you�ll be thrilled with every bag you buy from us, or your money back. http://finewatchquality.ru From mialsrl at nsoft.ca Mon Mar 26 02:17:28 2012 From: mialsrl at nsoft.ca (=?koi8-r?B?IvXQ0sHXzMXOycUg0MXS08/OwczPzS4i?=) Date: Mon, 26 Mar 2012 09:17:28 +0000 Subject: =?koi8-r?B?48XMxdDPzMHHwc7JxSDLwcsgz9POz9fBIMzAws/KIMTF0dTFzNjOzw==?= =?koi8-r?B?09TJ?= Message-ID: <01cd0b31$43a80400$128e57d5@mialsrl> Приглашаем Вас принять участие в ТРЕНИНГЕ: СОВРЕМЕННЫЙ ЭФФЕКТИВНЫЙ РУКОВОДИТЕЛЬ 09 - 10 апреля 2012 г. Санкт-Петербург ******************************** ПРОГРАММА МЕРОПРИЯТИЯ: 1. Компетентность руководителя. ╥ Основные техники деловой коммуникации. ╥ Использование знаний о типологии личности в руководстве подчиненными. ╥ Стили руководства. ╥ Методы экспресс-диагностики сотрудников. 2. Функции менеджера в организации. ╥ Основные функции менеджмента. ╥ Цель распределения функций. ╥ Пирамида навыков менеджера. Что нужно знать для оперативного управления. ╥ Понятие, основные виды и методы планирования. Планирование работы отдела (подразделения, фирмы). ╥ Взаимосвязь функций. Как расставлять приоритеты: иерархия ценностей и целей. ╥ За что платят менеджеру (зона ответственности). 3. Постановка целей, планирование, координация и организация работы подчиненных: ╥ Целеполагание как основа любой деятельности. ╥ Расстановка приоритетов в соответствии с поставленными целями. ╥ Роль менеджера в трансформации целей организации в индивидуальные цели подчиненных. ╥ Основы профессиональной деятельности управленца. Чем именно мы управляем. Что такое управление. 4. Управление персоналом. ╥ Делегирование полномочий, ответственность и полномочия. Правила и принципы делегирования: кому, когда, как и зачем. ╥ Что можно и что нельзя делегировать. ╥ Организация повседневной деятельности сотрудников. Как поставить подчиненным задачу? Использование внешних и внутренних ресурсов. Правила, отчетность, стандарты и результаты. ╥ Организация и координация процесса работы отдела. ╥ Чего ждут от нас, и что ждем мы (подчиненные, коллеги и руководство). ╥ Лидер и менеджер √ в чем различие. ╥ Как не стать заложником подчиненных. ╥ На чьей стороне играем. ╥ Эффективные методы руководства и взаимодействия с подчиненными. Стили управления. Матрица ситуационного руководства. 5. Организация исполнения. ╥ Пошаговая методика. ╥ Технологии постановки задач: инструктирование. ╥ Классификация задач сотрудников. 6. Управленческое взаимодействие с подчиненными по вопросам, находящимся за рамками их сферы деятельности. ╥ Методы управления в подобных ситуациях. ╥ Способы определения и развития потенциала подчиненного. 7. Практика управления. ╥ Как оперативно получить обратную связь? ╥ Выявление сбоев и их причин. ╥ Информирование подчиненных (информационные тромбы?) ╥ Возврат и корректировка планов. ╥ Регулирование: аварийное и системное. ╥ Контроль повседневной деятельности подчиненных. ╥ Координация деятельности подчиненных на основе показателей деятельности. ╥ Системная связь между планированием, контролем и мотивацией. 8. Способы разрешения проблемных ситуаций с подчиненными. 9. Мотивация подчиненных: практические способы и методы. _____________________________ Дополнительную информацию и справки можно получить по телефону: (812) 986 94 11 Зaнятия прoйдyт в цeнтрe Caнкт-Пeтeрбyргa в течение двyx днeй c 10:00 дo 18:00 c пeрeрывaми нa кoфe-брeйк и oбeд. Для пoлyчeния пoлнoй прoгрaммы и ycлoвий yчacтия cвяжитecь c нaми пo тeлeфoнy в Caнкт-Пeтeрбyргe: (812) 986 94 11 From baron at pigdog.org Mon Mar 26 09:34:30 2012 From: baron at pigdog.org (Baron Earl) Date: Mon, 26 Mar 2012 09:34:30 -0700 Subject: [Pigdog] Forbes on Bitcoin - praise for its financial innovation Message-ID: Not what I would expect from Forbes. "Therebs a lot of talk about dongles recently. Square has always relied on a dongle and now PayPal is sporting a fancy triangle-shaped dongle, nicknamed the bBlue Doritob. Both of these dongles equip your mobile phone to accept and process credit cards securely by inserting the device into the smartphonebs 3.5mm audio input jack. Apparently, this passes for financial innovation in mobile payments but I file it under the bnot-disruptive-enoughb category. Truly-disruptive financial innovation is already here with decentralized bitcoin. And, bitcoin doesnbt need a dongle!" http://www.forbes.com/sites/jonmatonis/2012/03/24/bitcoin-doesnt-need-a-dongle/ P.S. If you're not using https://Blekko.com for finding the latest tech-oriented news, try it. I entered "bitcoin /date" to get the latest news on bitcoin and the results contained no spam or linkspam sites. _______________________________________________ Pigdog mailing list Pigdog at lists.pigdog.org http://lists.pigdog.org/listinfo.cgi/pigdog-pigdog.org ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From lee at royalgardens.us Mon Mar 26 13:13:10 2012 From: lee at royalgardens.us (Lee @ Royal Gardens) Date: Mon, 26 Mar 2012 10:13:10 -1000 Subject: FY;) TERRORISTS are using online war games like Call of Duty to plot attacks, The Sun can reveal. In-Reply-To: <20120320153422.GF9891@leitl.org> References: <20120320153422.GF9891@leitl.org> Message-ID: Perhaps they shall play snow-ball? OBSAMA.com --- and the FBI Director of "Cyber", On Tuesday, March 20, 2012, Eugen Leitl wrote: > (the Sun emulates the Onion) > > > http://www.thesun.co.uk/sol/homepage/news/4205896/Terrorists-play-online-games-like-Call-of-Duty-to-plan-attacks.html > > Game fanatics > > Terrorists plan attacks in net chats > > Kids' fave keeps their plots secret Deadly ... terrorists are turning to > online war games to plot attacks without being monitored > > Exclusive > > By DAVID WILLETTS and TOM WELLS > > Last Updated: 20th March 2012 > > TERRORISTS are using online war games like Call of Duty to plot attacks, > The > Sun can reveal. > > Islamic extremists know cops monitor phone calls, emails and online > messages. > > So they are turning to PlayStation and Xbox games to keep their deadly > plans > secret. > > Gamers can log on in groups to play against each other and b crucially b > to > chat in private. > > Once signed in to a "lobby" using a password, plotters put on Bluetooth > headsets and speak securely to conspirators on the same site. > > Other shoot-'em-up games suspected of being targeted by terrorists are > thought to be Medal of Honour and the Halo series. > > Realistic ... war games > > Alamy > > Last night, a source said: "It's a terrifying reality. These people waste > no > time finding a secure method of chatting. > > "They are logging into group games over the internet and discussing terror > plots. Security people know about it. > > "For millions who love these games this will be a huge shock. > > "To think fanatics use them for their own ends is a real worry." Sources > say > plotters choose realistic conflict games so they can mask their deadly > discussions as harmless web chat. > > Call Of Duty > > Online craze ... 40 million people play Call Of Duty on the net > > There has even been evidence would-be jihadists treat war games as training > tools, a bit like a pilot might use a flight simulator. > > News of the growing threat comes five years after the CIA first warned of > the > menace. > > But with the soaring popularity of the games, there are now fears they are > being used by increasing numbers of criminals and terrorists. > > Last night government sources said police and spy chiefs were already > responding to the threat. > > A security expert revealed: "Those who fight crime and terrorism keep up to > date with technological changes." > > Call Of Duty MW3 > > Best-seller ... Call Of Duty MW3 made B#250m in 24 hours > > The terrorists choose incredibly realistic "first person games" where the > controller works through a complex simulation of war scenarios, carrying > out > missions and battling enemy fighters. > > Gamers choose different styles of play and missions b from planting bombs > to > fighting one-on-one. > > Then they enter the lobby and invite their friends to join in. > > Call of Duty addicts can even join "clans" b groups who regularly play > together. > > The games use a password-protected log-on to keep users' identities secret. > The system was designed so players anywhere on the globe can get together > for > harmless fantasy battles. > > But security chiefs now fear plotters are set to turn those fantasies into > reality. > > d.willetts at the-sun.co.uk From eugen at leitl.org Mon Mar 26 02:16:09 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 26 Mar 2012 11:16:09 +0200 Subject: [cryptography] Key escrow 2012 Message-ID: <20120326091609.GQ17245@leitl.org> ----- Forwarded message from Nico Williams ----- From eugen at leitl.org Mon Mar 26 02:17:56 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 26 Mar 2012 11:17:56 +0200 Subject: [cryptography] Key escrow 2012 Message-ID: <20120326091756.GR17245@leitl.org> ----- Forwarded message from Marsh Ray ----- From homers at lowbudget.com Sun Mar 25 22:55:50 2012 From: homers at lowbudget.com (=?koi8-r?B?IvDSz8TBxdTT0SDEz80i?=) Date: Mon, 26 Mar 2012 12:55:50 +0700 Subject: =?koi8-r?B?8NLPxMHF1NPRIMTPzSDOxcTBzMXLzyDP1CDtz9PL19kg1yDL1dLP0tTP?= =?koi8-r?B?zSDNxdPUxS4=?= Message-ID: <01C434448D51495580A2D83ED95AE2FB@hoa> Фото и описание дома смотрите здесь: www.купи-дом-здесь.рф From drwho at virtadpt.net Mon Mar 26 10:34:50 2012 From: drwho at virtadpt.net (The Doctor) Date: Mon, 26 Mar 2012 13:34:50 -0400 Subject: [liberationtech] Drones are not storytellers or why Syrians need better storytelling was Re: Pirate Bay turns to drones Message-ID: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 03/23/2012 01:51 PM, Isaac Wilder wrote: > At 30km up, not much good for recon, but definitely able to > support communications. LOS to a 400+ km radius. Oil companies and > the Air Force have been deploying this stuff for years. So have ham radio operators, and in the past few years hackerspaces have gotten into the act as well. APRS traffic from the HacDC Spaceblimp was picked up several hundred miles away before packets finally hit the APRS network. - -- The Doctor [412/724/301/703] PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ SEARCH PARTY ATTACKED BY MONSTER -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk9wqLoACgkQO9j/K4B7F8FOfwCghGw3VqeZJ9OMBbKQfavWKsU7 eckAoIWCAGy8ye3H5cvzIf5Y9C5GD4Bh =5dvQ -----END PGP SIGNATURE----- _______________________________________________ liberationtech mailing list liberationtech at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/liberationtech If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. You may ask for a reminder here: https://mailman.stanford.edu/mailman/listinfo/liberationtech Should you need immediate assistance, please contact the list moderator. Please don't forget to follow us on http://twitter.com/#!/Liberationtech ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From eugen at leitl.org Mon Mar 26 04:40:34 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 26 Mar 2012 13:40:34 +0200 Subject: [cryptography] [info] The =?utf-8?Q?NS?= =?utf-8?Q?A_Is_Building_the_Country=E2=80=99?= =?utf-8?Q?s?= Biggest Spy Center (Watch What You Say) Message-ID: <20120326114034.GI17245@leitl.org> ----- Forwarded message from Seth David Schoen ----- From corrugatingj5 at winjewel.com Sun Mar 25 23:32:09 2012 From: corrugatingj5 at winjewel.com (=?koi8-r?B?IuLPztPByiI=?=) Date: Mon, 26 Mar 2012 14:32:09 +0800 Subject: =?koi8-r?B?7NXe28nKINDPxMHSz8sgLSDD18XU1d3JxSDR0M/O08vJxSDLwdLMycvP?= =?koi8-r?B?19nFIMLPztPByg==?= Message-ID: <6D54842093DC48CAB7A9B30C5461D634@May010120fqh> Лучший подарок - цветущие японские карликовые бонсай. Распродажа до конца марта! Яблони, сосны, можжевельники, айва. 780-21-94 www.подари-бонсай.рф From oliver at ospreyfilters.com Sun Mar 25 22:51:35 2012 From: oliver at ospreyfilters.com (=?koi8-r?B?IuTFzMXHydLP18HOycUg0M/Mzs/Nz97Jyiwgz9TXxdTT1NfFzs7P0w==?= =?koi8-r?B?1NggySDQz8zOz83P3snRLiAi?=) Date: Mon, 26 Mar 2012 14:51:35 +0900 Subject: =?koi8-r?B?y8/P0sTJzsHDydEgySDP0sfBzsnawcPJ0SDSwcLP1Nkg0M/E3snOxQ==?= =?koi8-r?B?zs7ZyA==?= Message-ID: <01cd0b5f$f0997580$ccadfdcb@oliver> Приглашаем Вас принять участие в ТРЕНИНГЕ: СОВРЕМЕННЫЙ ЭФФЕКТИВНЫЙ РУКОВОДИТЕЛЬ 09 - 10 апреля 2012 г. Санкт-Петербург **************************************************************************** ПРОГРАММА МЕРОПРИЯТИЯ: 1. Компетентность руководителя. ╥ Основные техники деловой коммуникации. ╥ Использование знаний о типологии личности в руководстве подчиненными. ╥ Стили руководства. ╥ Методы экспресс-диагностики сотрудников. 2. Функции менеджера в организации. ╥ Основные функции менеджмента. ╥ Цель распределения функций. ╥ Пирамида навыков менеджера. Что нужно знать для оперативного управления. ╥ Понятие, основные виды и методы планирования. Планирование работы отдела (подразделения, фирмы). ╥ Взаимосвязь функций. Как расставлять приоритеты: иерархия ценностей и целей. ╥ За что платят менеджеру (зона ответственности). 3. Постановка целей, планирование, координация и организация работы подчиненных: ╥ Целеполагание как основа любой деятельности. ╥ Расстановка приоритетов в соответствии с поставленными целями. ╥ Роль менеджера в трансформации целей организации в индивидуальные цели подчиненных. ╥ Основы профессиональной деятельности управленца. Чем именно мы управляем. Что такое управление. 4. Управление персоналом. ╥ Делегирование полномочий, ответственность и полномочия. Правила и принципы делегирования: кому, когда, как и зачем. ╥ Что можно и что нельзя делегировать. ╥ Организация повседневной деятельности сотрудников. Как поставить подчиненным задачу? Использование внешних и внутренних ресурсов. Правила, отчетность, стандарты и результаты. ╥ Организация и координация процесса работы отдела. ╥ Чего ждут от нас, и что ждем мы (подчиненные, коллеги и руководство). ╥ Лидер и менеджер √ в чем различие. ╥ Как не стать заложником подчиненных. ╥ На чьей стороне играем. ╥ Эффективные методы руководства и взаимодействия с подчиненными. Стили управления. Матрица ситуационного руководства. 5. Организация исполнения. ╥ Пошаговая методика. ╥ Технологии постановки задач: инструктирование. ╥ Классификация задач сотрудников. 6. Управленческое взаимодействие с подчиненными по вопросам, находящимся за рамками их сферы деятельности. ╥ Методы управления в подобных ситуациях. ╥ Способы определения и развития потенциала подчиненного. 7. Практика управления. ╥ Как оперативно получить обратную связь? ╥ Выявление сбоев и их причин. ╥ Информирование подчиненных (информационные тромбы?) ╥ Возврат и корректировка планов. ╥ Регулирование: аварийное и системное. ╥ Контроль повседневной деятельности подчиненных. ╥ Координация деятельности подчиненных на основе показателей деятельности. ╥ Системная связь между планированием, контролем и мотивацией. 8. Способы разрешения проблемных ситуаций с подчиненными. 9. Мотивация подчиненных: практические способы и методы. _____________________________ Дополнительную информацию и справки можно получить по телефону: (812) 986 94 11 Зaнятия прoйдyт в цeнтрe Caнкт-Пeтeрбyргa в течение двyx днeй c 10:00 дo 18:00 c пeрeрывaми нa кoфe-брeйк и oбeд. Для пoлyчeния пoлнoй прoгрaммы и ycлoвий yчacтия cвяжитecь c нaми пo тeлeфoнy в Caнкт-Пeтeрбyргe: (812) 986 94 11 From goldamaricruz at ganderson.com Mon Mar 26 11:22:05 2012 From: goldamaricruz at ganderson.com (KRISTA AMY) Date: Mon, 26 Mar 2012 15:22:05 -0300 Subject: Only the Best Penis Enlargement Products in one place! Visit Now! bhf0ah2 Message-ID: <15i97v19e33-74192847-465q3r40@myokioa> Best Penis Enlargement Products Here! Top Penis Enlargement and Male Enhancement Products in the market Only the Best Penis Enlargement Products in one place! Visit Now! http://largegreekpenis.ru From mjones at cwclaw.com Mon Mar 26 03:23:07 2012 From: mjones at cwclaw.com (=?koi8-r?B?IuTFzMXHydLP18HOycUg0M/Mzs/Nz97Jyiwgz9TXxdTT1NfFzs7P0w==?= =?koi8-r?B?1NggySDQz8zOz83P3snRLiAi?=) Date: Mon, 26 Mar 2012 15:53:07 +0530 Subject: =?koi8-r?B?/tTPIM3P1s7PIMkg3tTPIM7FzNja0SDExczFx8nSz9fB1Ngu?= Message-ID: <01cd0b68$8933f380$136052b7@mjones> Приглашаем Вас принять участие в ТРЕНИНГЕ: СОВРЕМЕННЫЙ ЭФФЕКТИВНЫЙ РУКОВОДИТЕЛЬ 09 - 10 апреля 2012 г. Санкт-Петербург ------------------------------------------------------------------------- ПРОГРАММА МЕРОПРИЯТИЯ: 1. Компетентность руководителя. ╥ Основные техники деловой коммуникации. ╥ Использование знаний о типологии личности в руководстве подчиненными. ╥ Стили руководства. ╥ Методы экспресс-диагностики сотрудников. 2. Функции менеджера в организации. ╥ Основные функции менеджмента. ╥ Цель распределения функций. ╥ Пирамида навыков менеджера. Что нужно знать для оперативного управления. ╥ Понятие, основные виды и методы планирования. Планирование работы отдела (подразделения, фирмы). ╥ Взаимосвязь функций. Как расставлять приоритеты: иерархия ценностей и целей. ╥ За что платят менеджеру (зона ответственности). 3. Постановка целей, планирование, координация и организация работы подчиненных: ╥ Целеполагание как основа любой деятельности. ╥ Расстановка приоритетов в соответствии с поставленными целями. ╥ Роль менеджера в трансформации целей организации в индивидуальные цели подчиненных. ╥ Основы профессиональной деятельности управленца. Чем именно мы управляем. Что такое управление. 4. Управление персоналом. ╥ Делегирование полномочий, ответственность и полномочия. Правила и принципы делегирования: кому, когда, как и зачем. ╥ Что можно и что нельзя делегировать. ╥ Организация повседневной деятельности сотрудников. Как поставить подчиненным задачу? Использование внешних и внутренних ресурсов. Правила, отчетность, стандарты и результаты. ╥ Организация и координация процесса работы отдела. ╥ Чего ждут от нас, и что ждем мы (подчиненные, коллеги и руководство). ╥ Лидер и менеджер √ в чем различие. ╥ Как не стать заложником подчиненных. ╥ На чьей стороне играем. ╥ Эффективные методы руководства и взаимодействия с подчиненными. Стили управления. Матрица ситуационного руководства. 5. Организация исполнения. ╥ Пошаговая методика. ╥ Технологии постановки задач: инструктирование. ╥ Классификация задач сотрудников. 6. Управленческое взаимодействие с подчиненными по вопросам, находящимся за рамками их сферы деятельности. ╥ Методы управления в подобных ситуациях. ╥ Способы определения и развития потенциала подчиненного. 7. Практика управления. ╥ Как оперативно получить обратную связь? ╥ Выявление сбоев и их причин. ╥ Информирование подчиненных (информационные тромбы?) ╥ Возврат и корректировка планов. ╥ Регулирование: аварийное и системное. ╥ Контроль повседневной деятельности подчиненных. ╥ Координация деятельности подчиненных на основе показателей деятельности. ╥ Системная связь между планированием, контролем и мотивацией. 8. Способы разрешения проблемных ситуаций с подчиненными. 9. Мотивация подчиненных: практические способы и методы. _____________________________ Дополнительную информацию и справки можно получить по телефону: (812) 986 94 11 Зaнятия прoйдyт в цeнтрe Caнкт-Пeтeрбyргa в течение двyx днeй c 10:00 дo 18:00 c пeрeрывaми нa кoфe-брeйк и oбeд. Для пoлyчeния пoлнoй прoгрaммы и ycлoвий yчacтия cвяжитecь c нaми пo тeлeфoнy в Caнкт-Пeтeрбyргe: (812) 986 94 11 From scintilla67 at rossiemusic.com Mon Mar 26 01:22:47 2012 From: scintilla67 at rossiemusic.com (Margret Barnes) Date: Mon, 26 Mar 2012 16:22:47 +0800 Subject: =?koi8-r?B?78bG28/S2TrawcvS2dfB1NggyczJIM/Uy9LZ18HU2D8g88XNyc7B0iA1?= =?koi8-r?B?IMHQ0sXM0SDz8MI=?= Message-ID: <6B8BD24845694B6B92B8801A04C10255@lcdpc> Оффшоры: открывать или закрывать? Не смотря на противодействие со стороны международных и российских регулирующих органов, оффшоры были и остаются важным инфраструктурным элементом бизнеса. Важно лишь ЗНАТЬ и соблюдать ПРАВИЛА ИГРЫ. Семинар в Санкт-Петербурге 5 апреля. Контакт 0504 at pbox.net, тел. +7 (911) 133-29-18 Время проведения мероприятия: с 11:00 до 17:00 Стоимость участия в семинаре: 11200 руб. включая НДС. В стоимость входят два кофе-брейка и подробные учебно-методические материалы в электронном виде. Целевая аудитория: Генеральные и коммерческие директора, владельцы и руководители предприятий. Предприниматели, развивающие и стремящиеся развивать свой бизнес. Топ менеджеры и специалисты, занимающиеся вопросами налогового планирования ============================= Программа семинара: 10.30 Регистрация участников 11.00 - 12.20 Блок 1. Базовые понятия по оффшорам Что такое оффшор, оншор, низконалоговая компания? Кто такой номинал, бенефициар, доверенное лицо и трастовая декларация? Как защитить бенефициара от неправомерных действий номиналов? Знают ли номиналы о том, где у компании открыт счет и могут ли они украсть оттуда деньги? Можно ли директором или акционером оффшора поставить россиянина? Когда требуется выезд номиналов на сделки в Россию? Как ликвидировать оффшор? Что такое постоянное представительство и налоги у источника и когда они возникают? 12.20 - 13.00 Блок 2. Новости про оффшоры, схемы и конфиденциальность бенефициаров Ужесточение антиоффшорного регулирования в России и в мире: Последние новости. Требования Правительства РФ по раскрытию бенефициаров контрагентов крупнейших госкомпаний: Итоги и перспективы Раскрытие бенефициара в налоговых целях: Мировой опыт и практика. Страны G20 будут обмениваться информацией о налоговых нарушениях в автоматическом режиме и помогать друг другу в сборе налогов. Как скоро это коснется Россию? У кого вообще может быть информация о бенефициаре оффшора? Насколько реально такую информацию скрыть или не разгласить? Разглашается ли подобная информация госорганам и когда? У кого российские правоохранительные и фискальные органы информацию по оффшорам могут запросить? И какие страны обязаны России ответить? Рейтинг стран по количеству заключенных Соглашений "Об обмене информацией…". Стоит ли "бежать" от тех, кто "готов раскрываться" и каковы могут быть санкции к тем, кто "молчит"? Когда ждать ратификации Протокола по Кипру, Латвии, Эстонии и Швейцарии? Введение налогов на сделки с оффшорами в СНГ и ЕС. 13.20 - 15.20 Блок 3. Анализ основных налоговых схем на предмет их жизнеспособности в 2012-м году Основные принципы построения торговых схем в целях налогового планирования. Практика реализации агентских схем, решений с займами и роялти, вывод дивидендов, продажа актива. Опасные ошибки при построении налоговых схем (агентская схема, кредитная, с роялти, по дивидендам). Что необходимо предпринять, чтобы ФНС не разрушила налоговое решение? Стресс-тестирование налоговых схем на устойчивость: к новациям Минфина РФ; к изменениям Протокола по Кипру; к международному обмену информацией по налоговым правонарушениям; к методикам ФНС РФ. Обзор основных юрисдикций с точки зрения замены одних на другие в налоговых схемах. Сравнительная характеристика вариантов 15.40 - 16.40 Блок 4. Покупка недвижимости заграницей: Налоговые рекомендации Выбор страны для покупки зарубежной недвижимости. Базовые критерии для оценки. Какие факторы следует учитывать при принятии решения? Сравнение вриантов закупки: на себя, на специально созданную финскую фирму, на оффшор. Какие налоги возникают при покупке, аренде, продаже и наследовании недвижимости (если владелец недвижимости - россиянин)? • Расчет налоговых последствий на этапе покупки недвижимости; • Расчет налоговых последствий на этапе владения недвижимостью; • Расчет налоговых последствий на этапе сдачи недвижимости в аренду; • Расчет налоговых последствий на этапе продажи недвижимости; • Расчет налоговых последствий на этапе наследования недвижимости. • Легальность покупки недвижимости за рубежом, возможности легализации • ПМЖ через бизнес и недвижимость в Финляндии. • Опасные ошибки россиян в Финляндии Среди вариантов покупки недвижимости будут рассмотрены страны: Кипр, Швейцария, Панама, Великобритания, Болгария, и, специально для Петербурга, особо подробно - Финляндия. В рамках семинара будут рассмотрены: Сейшелы, Белиз, Панама, Британские Виргинские острова, Доминика, Сент-Винсент, Маршалловы острова, Невис, Нидерландские Антилы, Гибралтар, Гонконг, ОАЭ, Гернси, Джерси, Макао, Мадейра, Маврикий, Барбадос, Лихтенштейн, Кипр, Болгария, Венгрия, Швейцария, Ирландия, Германия, Исландия, Литва, Румыния, Словакия, Голландия, Сингапур, Люксембург, Великобритания, Дания, Эстония. Условия участия: Время проведения мероприятия: с 11:00 до 17:00 Стоимость участия в семинаре: 11200 руб. включая НДС. В стоимость входят два кофе-брейка и учебно-методические материалы в электронном виде. Контакт 0504 at pbox.net, тел. +7 (911) 133-29-18 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 6574 bytes Desc: not available URL: From tumorvzfd8 at royalfort.com Mon Mar 26 15:14:07 2012 From: tumorvzfd8 at royalfort.com (=?koi8-r?B?7s/Xz8UgzyDUwc3P1s7F?=) Date: Mon, 26 Mar 2012 17:14:07 -0500 Subject: =?koi8-r?B?68/O1NLPzNgg1MHNz9bFzs7PyiDT1M/Jzc/T1Mk=?= Message-ID: <000d01cd0b9d$c366d600$6400a8c0@tumorvzfd8> 30 марта 2012 г. Практические вопросы таможенной стоимости: определение, корректировка, таможенные проверки, ответ на запрос, сроки. Обеспечение, взыскание и возврат таможенных платежей Обжалование незаконных решений таможенных органов 8 (499) ЧЧ5Ч095 : 8 (499) ЧЧ5/4О*95 Цель: На данном курсе слушателям даются полезные рекомендации и знания, которые научат грамотным действиям, помогут снизить риски корректировки и привлечения к административной ответственности. Особое внимание на курсе уделяется комментариям к изменениям в таможенном законодательстве. Программа: 1. Изменения в таможенном законодательстве в 2011-2012 гг. 2. Приказы, письма, профили риска и другие акты ФТС РФ (их юридическая сила и оценка влияния на права и обязанности участников ВЭД). 3. Практические вопросы таможенной стоимости по законодательству Таможенного союза. 4. Корректировка таможенной стоимости √ новые положения. 5. Дополнительные начисления к цене товара (перевозка, страхование, платежи за использование товарного знака и др.), скидки √ правильное оформление. 6. Необходимые (обязательные) документы для подтверждения сведений по таможенной стоимости по таможенному законодательству. 7. Дополнительные документы, представляемые по требованию таможенных органов, оценка их обязательности. Обязан ли декларант заверять документы в ТПП. 8. Контроль таможенной стоимости до и после выпуска, изменения в законодательстве. 9. Как грамотно отвечать на запросы и требования таможенных органов о представлении дополнительных документов и сведений. 10. Система управления рисками (СУР), оформление таможенной стоимости ниже профиля риска. 11. Внешнеторговый договор - таможенные аспекты. 12. Как избежать ошибок, допускаемых при определении таможенной стоимости и оформлении документов. 13. Ответственность брокера и декларанта. 14. Возврат таможенных платежей √ изменения в законе и практические проблемные вопросы. 15. Обжалование решений, действий (бездействия) таможенных органов: возможности, сроки и результаты. 16. Судебная практика по таможенным спорам, комментарий и прогноз. Стоимость участия: 9 000 рублей Вся информация по тел: +7 499 - 4Ч5*Ч0/95 **** 8 (499) 4Ч539-68 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 4180 bytes Desc: not available URL: From eugen at leitl.org Mon Mar 26 12:13:57 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 26 Mar 2012 21:13:57 +0200 Subject: [Pigdog] Forbes on Bitcoin - praise for its financial innovation Message-ID: <20120326191357.GQ17245@leitl.org> ----- Forwarded message from Baron Earl ----- From eugen at leitl.org Mon Mar 26 12:26:59 2012 From: eugen at leitl.org (Eugen Leitl) Date: Mon, 26 Mar 2012 21:26:59 +0200 Subject: [liberationtech] Drones are not storytellers or why Syrians need better storytelling was Re: Pirate Bay turns to drones Message-ID: <20120326192659.GV17245@leitl.org> ----- Forwarded message from The Doctor ----- From dorathyshawna at gatewaybuilding.com Mon Mar 26 11:30:55 2012 From: dorathyshawna at gatewaybuilding.com (Kali Holli) Date: Mon, 26 Mar 2012 22:30:55 +0400 Subject: Top Penis Enlargement and Male Enhancement Products in the market. o7mfy Message-ID: <201203262230.718BF7F44C20E4DF6A3E@60q0880> Best Penis Enlargement Products Here! Top Penis Enlargement and Male Enhancement Products in the market Only the Best Penis Enlargement Products in one place! Visit Now! http://largegreekpenis.ru From anishakrystyna at publicis-usa.com Mon Mar 26 18:11:23 2012 From: anishakrystyna at publicis-usa.com (Cicely Mark) Date: Mon, 26 Mar 2012 23:11:23 -0200 Subject: Replica Watches, Imitation Watches at replica watches2u nshsuv34 Message-ID: <40j55h25e95-81908455-291y6i76@kilazre> Replica Watches, Imitation Watches at replica watches2u TOP grade Replica Watches of high quality at wholesale prices! BEST deals of imitation watches plus FREE shipping! Join the wise shoppers to let your dreams come true. http://copiesbags.ru From juliocarylon at fujitsugeneral.com Mon Mar 26 20:43:17 2012 From: juliocarylon at fujitsugeneral.com (Lauren Jacquline) Date: Tue, 27 Mar 2012 01:43:17 -0200 Subject: Quality Replica Handbags. Our company sells only top-quality replica handbags identical to your favorite designer bags fm13 Message-ID: <4f713755.5897a11c@fujitsugeneral.com> Quality Replica Handbags. Our company sells only top-quality replica handbags identical to your favorite designer bags We promise that you’ll be thrilled with every bag you buy from us, or your money back. http://finewatchquality.ru From nicolemabelle at hinet.net Mon Mar 26 15:39:22 2012 From: nicolemabelle at hinet.net (Lawanda Corrin) Date: Tue, 27 Mar 2012 06:39:22 +0800 Subject: U.S to U.S Shipping for ALL orders, Viagra 100mg x 100 Pills ONLY $139.95, No Prescription Required! k4vugz1 Message-ID: <58t82y90y17-76808939-548r3b79@gtprmdqq> VIAGRA 100mg - FREE U.S to U.S Shipping! U.S to U.S Shipping for ALL orders, No Prescription Required! Viagra 100mg x 100 Pills ONLY $139.95 - Best Quality and Low Prices! http://rxtabspharmacy.ru From mclean at blueprintuk.net Tue Mar 27 05:01:09 2012 From: mclean at blueprintuk.net (=?koi8-r?B?IubFxMXSwczYzsHRINPM1dbCwSDT1cTFws7ZyCDQ0snT1MHXz9ci?=) Date: Tue, 27 Mar 2012 08:01:09 -0400 Subject: =?koi8-r?B?79TXxdTT1NfFzs7P09TYIMvPztTSz8zJ0tXA3cnIIMTPzNbOycvBIA==?= =?koi8-r?B?zMnDLg==?= Message-ID: <01cd0bef$c4c5d080$029736c8@mclean> Пpaктичecкoe пpимeнeниe Зaкoнogaтeльcтвa РФ "О БAНKРОТCТBE". Пpaвoвыe acпeкты взыcкaния зagoлжeннocти чepeз пpoцegypy бaнкpoтcтвa. Оптимизaция goлгoвыx oбязaтeльcтв. Caнкт-Пeтepбypг, 09 - 10 апреля 20I2 г. I. Зaкoнogaтeльcтвo РФ "О нecocтoятeльнocти (бaнкpoтcтвe)": - Пpoцegypa нaблюgeния; - Оcoбeннocти geятeльнocти пpegпpиятия в пepиog внeшнeгo yпpaвлeния; - Пpoцegypa финaнcoвoгo oзgopoвлeния; - Миpoвoe coглaшeниe. Упoлнoмoчeнныe opгaны РФ в geлax o бaнкpoтcтвe. II. Пpимeнeниe Зaкoнogaтeльcтвa РФ "О нecocтoятeльнocти" c цeлью взыcкaния зagoлжeннocти: - Пoнятиe нecocтoятeльнocти (бaнкpoтcтвa); - Оcoбeннocти ygoвлeтвopeния тpeбoвaний зaлoгogepжaтeлeй в пpoцegypax бaнкpoтcтвa; - Рaзбиpaтeльcтвo geл в apбитpaжнoм cyge; - Оcoбeннocти бaнкpoтcтвa нeкoтopыx кaтeгopий goлжникoв. III. Иcпoльзoвaниe пpaвoвыx мexaнизмoв бaнкpoтcтвa c цeлью yклoнeния oт вoзвpaтa зagoлжeннocти нegoбpocoвecтными goлжникaми: - Оcoбeннocти иcпoльзoвaниe пpoцegyp нaблюgeния, финaнcoвoгo oзgopoвлeния, внeшнeгo пpoизвogcтвa, кoнкypcнoгo пpoизвogcтвa; - Оcпapивaниe cgeлoк пo ocнoвaниям, пpegycмoтpeнным ФЗ "o нecocтoятeльнocти (бaнкpoтcтвe)". IV. Иcпoльзoвaниe ocoбeннocтeй poccийcкoгo зaкoнogaтeльcтвa нegoбpocoвecтными goлжникaми gля yxoga oт иcпoлнeния oбязaтeльcтв и coкpытия coбcтвeннocти. Тaктикa пpoтивogeйcтвия. Пoлнaя пpoгpaммa, ycлoвия yчacтия: [812] 984 5З__6З From nty at mcgriff.com Mon Mar 26 21:02:46 2012 From: nty at mcgriff.com (=?koi8-r?B?IvPl7enu4fIg7yDi4e7r8u/08/T35SI=?=) Date: Tue, 27 Mar 2012 09:32:46 +0530 Subject: =?koi8-r?B?79TXxdTT1NfFzs7P09TYIMvPztTSz8zJ0tXA3cnIIMTPzNbOycvBIA==?= =?koi8-r?B?zMnDLg==?= Message-ID: <01cd0bfc$913d7300$ded6c375@nty> Пpaктичecкoe пpимeнeниe Зaкoнogaтeльcтвa РФ "О БAНKРОТCТBE". Пpaвoвыe acпeкты взыcкaния зagoлжeннocти чepeз пpoцegypy бaнкpoтcтвa. Оптимизaция goлгoвыx oбязaтeльcтв. Caнкт-Пeтepбypг, 09 - 10 апреля 20I2 г. I. Зaкoнogaтeльcтвo РФ "О нecocтoятeльнocти (бaнкpoтcтвe)": - Пpoцegypa нaблюgeния; - Оcoбeннocти geятeльнocти пpegпpиятия в пepиog внeшнeгo yпpaвлeния; - Пpoцegypa финaнcoвoгo oзgopoвлeния; - Миpoвoe coглaшeниe. Упoлнoмoчeнныe opгaны РФ в geлax o бaнкpoтcтвe. II. Пpимeнeниe Зaкoнogaтeльcтвa РФ "О нecocтoятeльнocти" c цeлью взыcкaния зagoлжeннocти: - Пoнятиe нecocтoятeльнocти (бaнкpoтcтвa); - Оcoбeннocти ygoвлeтвopeния тpeбoвaний зaлoгogepжaтeлeй в пpoцegypax бaнкpoтcтвa; - Рaзбиpaтeльcтвo geл в apбитpaжнoм cyge; - Оcoбeннocти бaнкpoтcтвa нeкoтopыx кaтeгopий goлжникoв. III. Иcпoльзoвaниe пpaвoвыx мexaнизмoв бaнкpoтcтвa c цeлью yклoнeния oт вoзвpaтa зagoлжeннocти нegoбpocoвecтными goлжникaми: - Оcoбeннocти иcпoльзoвaниe пpoцegyp нaблюgeния, финaнcoвoгo oзgopoвлeния, внeшнeгo пpoизвogcтвa, кoнкypcнoгo пpoизвogcтвa; - Оcпapивaниe cgeлoк пo ocнoвaниям, пpegycмoтpeнным ФЗ "o нecocтoятeльнocти (бaнкpoтcтвe)". IV. Иcпoльзoвaниe ocoбeннocтeй poccийcкoгo зaкoнogaтeльcтвa нegoбpocoвecтными goлжникaми gля yxoga oт иcпoлнeния oбязaтeльcтв и coкpытия coбcтвeннocти. Тaктикa пpoтивogeйcтвия. Пoлнaя пpoгpaммa, ycлoвия yчacтия: [812] 984 5З..6З From jya at pipeline.com Tue Mar 27 07:25:38 2012 From: jya at pipeline.com (John Young) Date: Tue, 27 Mar 2012 10:25:38 -0400 Subject: [drone-list] Afghan Drone Savagery Report Released Message-ID: Centcom.mil released on 22 March 2012 a declassifed 2,100-page report on drone slaughter of 23 Afghan non-combatants - men, women, children - in February 2010, blamed on Creech AFB pilots over-enthusiasticly calling in Hellfires on a 3-vehicle civilian convoy. Minutely detailed descriptions are provided of how drones are directed from screeners at Centcom and pilots at Creech AFB using a battery of secure communications devices: IRC chat, radio, video, satellites, VOIP, telephone, not all of which are coordinated and supervised and thus lead to disaster. Pilots of choppers which fired the Hellfire missiles claim drone operators cannot be trusted due to lack of contact with real world conditions on the ground and because mission controllers at Creech reward "Top Gun" aggressiveness. Caution of screeners at Centcom and in Afghanistan in this case were overridden by drone operators at Creech to authorize kinetic action against the civilians. As one military interviewee said: from the safety of Creech drone pilots were too avid for kills and used the Tom Cruise Top Gun appellation to describe their "juvenile" behavior. The whole report is worth reading and promulgating to counter the PR machinery promoting drones as safe-kill from afar. Interviews of the civilians writhing painfully in hospitals probably won't get much press. Here are a couple of small excerpts: http://cryptome.org/2012/03/creech-savagery.pdf (summary of the report) http://cryptome.org/2012/03/creech-savagery2.pdf (hospital interview) _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From jya at pipeline.com Tue Mar 27 07:49:28 2012 From: jya at pipeline.com (John Young) Date: Tue, 27 Mar 2012 10:49:28 -0400 Subject: [drone-list] Afghan Drone Savagery Report Released - URL Message-ID: The full 2,100-page report released by Centcom on drone killing of Afghan civilians due to pilot zealotry: http://tinyurl.com/clfkdj6 The multi-part file is about 153MB total. This is the Centcom FOIA website which can be difficult to access at times. _______________________________________________ drone-list mailing list drone-list at lists.stanford.edu Should you need to change your subscription options, please go to: https://mailman.stanford.edu/mailman/listinfo/drone-list If you would like to receive a daily digest, click "yes" (once you click above) next to "would you like to receive list mail batched in a daily digest?" You will need the user name and password you receive from the list moderator in monthly reminders. Should you need immediate assistance, please contact the list moderator. ----- End forwarded message ----- -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE From mcclellann at lmtas.com Mon Mar 26 22:41:05 2012 From: mcclellann at lmtas.com (=?koi8-r?B?IuzAxM3JzMEg8M/Ez9PQxcXXwSI=?=) Date: Tue, 27 Mar 2012 11:11:05 +0530 Subject: =?koi8-r?B?79DF0sHUydfOwdEg0M/MycfSwcbJ0S4=?= Message-ID: <01cd0c0a$4d516a80$b371b43b@mcclellann> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: text/html Size: 310 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: Type: image/jpeg Size: 46336 bytes Desc: not available URL: From moritz at torservers.net Tue Mar 27 02:13:40 2012 From: moritz at torservers.net (Moritz Bartl) Date: Tue, 27 Mar 2012 11:13:40 +0200 Subject: [liberationtech] Blogged: So, what about Cybercrime in Switzerland? A visit to KOBIK Message-ID: So, what about Cybercrime in Switzerland? Swiss Cybercrime Coordination Unit (KOBIK) Yesterday, I joined some people from Chaos Computer Club ZC