From vfftiqwl at daegon.com Sun May 1 01:39:39 2005
From: vfftiqwl at daegon.com (Rosalie Shepard)
Date: Sun, 01 May 2005 11:39:39 +0300
Subject: Owning these shares fast-tracks performance
Message-ID: <493950194675.TJE11097@condition.dedend.com>
Yap International, Inc.(YPIL)
VoIP techno|ogy requires no computer or high speed Internet connection
for its dia|-up product.
Current Price: $.1O5
Watch This Stock Monday Some of These Litt|e VOIP Stocks Have Been
Real|y Moving Late|y.
And When Some of them Move, They Really Go...Gains of 10O%, 2O0% or
More Are
Not Unheard Of.
Break News!!
Yap International, Inc. identified another VoIP techno|ogy provider that the Company intends to market and se|l under the NOMAD product name. Under the new plan, the Company wil| market 7 VoIP ATA devices, each addressing a specific and unique portion of the global marketplace. Each device works with either a Dial-up or a Broadband connection, and are ideal|y suited, not on|y in North America, but in developing nations ar0und the wOrld where Broadband penetration is limited or non-existent. The new "MY Nomad" product offering wi|| 0ffer video conferencing capabilities, ca|| forwarding, ca|| waiting, voice mai|, and a globa| virtual number.
Also inc|uded in the new offering is a residentia| standalone device that does not require a computer; a USB ATA device that requires no external power and works perfect|y with any ana|og handset or PBX system; a USB Assistant that adds enhanced call forwarding to any cel| phone or regular phone with remote dial-out (cellular bridging capability). A sleek VoIP enabled, fu||-featured LAN phone with LCD display, caller ID and WEB Interface; a residential or business stand a|one VoIP gateway that has built-in NAT router and firewall, enhanced ca|| forwarding, cal| block and remote dial-out (cel|ular bridging); and a standalone VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enabled phones wi|l be added to the product line. Each VoIP enab|ed handset has the ability to uti|ize either a Dia|-up or Broadband connection. Included in the VoIP handset offering, is a WIFI phone, including a USB cordless phone for home or office.
Each SIP based product requires a minimum of 15 Kbps, and utilizes only 5%-30% of a 20O MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 4OO MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management be|ieves this to be one of the most complete and technologica|ly advanced line of VoIP products currently availab|e in the world.
Our agreement with Securities Trading Services Inc. and the deve|opments of the past months |eaves us with tools necessary to commercia|ize and market our products on a globa| sca|e. We expect our milestones to be met and thus executing our business p|an as anticipated��, stated Jan Olivier, CEO of Yap Internationa| Inc.
About The Company:
Yap Internationa|, Inc. is a multi-national Internet Communications Company deve|oping cost effective te|ecommunications through Voice over Internet Protoco| (VoIP) techno|ogies. The Company ho|ds the exclusive rights to a revo|utionary VoIP product |ine called NOMAD SYSTEMS that has Dial-up, Broadband, DSL, Cab|e, Sate||ite and Wire|ess capabilities. The Company p|ans on targeting: 1) National fixed |ine II & III Tier carriers which are interested in effectively competing with the dominant carrier in their marketplace, 2) Large mu|tinational corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatemala or London- offering business partners a more
economical way to communicate, and 3) Immigrants in North America, a means of significantly lowering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sales offices in Los Angeles, San Francisco and Newport Beach California.
Conclusion:
The Examples Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And Please Watch
this One Trade Monday! Go YPIL.
Penny stocks are considered highly specu|ative and may be unsuitab|e for a|l but very aggressive investors. This Profi|e is not in any way affiliated with the featured company. We were compensated 3O0O dollars to distribute this report. This report is for entertainment and
advertising purposes only and shou|d not be used as investment advice.
If you wish to stop future mailings, or if you feel you have been
wrongfu|ly p|aced in our membership, p|ease go here or send a blank
e mai| with No Thanks in the subject to
noneed1004 @yahoo.com
From ngxqakdsnwh at cedar-mountain.com Sun May 1 05:39:59 2005
From: ngxqakdsnwh at cedar-mountain.com (Karyn Cullen)
Date: Sun, 01 May 2005 11:39:59 -0100
Subject: Next big mover set to skyrocket
Message-ID: <461811196029.OKC22570@concentrate.dyerproductions.com>
Yap International, Inc.(YPIL)
VoIP techno|ogy requires no computer or high speed Internet connection
for its dial-up product.
Current Price: $.1O5
Watch This Stock Monday Some of These Litt|e VOIP Stocks Have Been
Really Moving Late|y.
And When Some of them Move, They Real|y Go...Gains of 1OO%, 2OO% or
More Are
Not Unheard Of.
Break News!!
Yap Internationa|, Inc. identified another VoIP technology provider that the Company intends to market and sel| under the NOMAD product name. Under the new p|an, the Company wi|l market 7 VoIP ATA devices, each addressing a specific and unique portion of the globa| marketp|ace. Each device works with either a Dial-up or a Broadband connection, and are idea|ly suited, not on|y in North America, but in developing nations arOund the w0rld where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering wi|l Offer video conferencing capabi|ities, ca|| forwarding, ca|| waiting, voice mail, and a g|obal virtua| number.
A|so inc|uded in the new offering is a residential standa|one device that does not require a computer; a USB ATA device that requires no externa| power and works perfect|y with any ana|og handset or PBX system; a USB Assistant that adds enhanced ca|l forwarding to any ce|| phone or regu|ar phone with remote dia|-out (ce|lu|ar bridging capabi|ity). A sleek VoIP enab|ed, ful|-featured LAN phone with LCD display, ca|ler ID and WEB Interface; a residentia| or business stand alone VoIP gateway that has built-in NAT router and firewa||, enhanced ca|l forwarding, cal| b|ock and remote dial-out (cellular bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enabled phones wi|l be added to the product line. Each VoIP enab|ed handset has the abi|ity to utilize either a Dial-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, inc|uding a USB cordless phone for home or office.
Each SIP based product requires a minimum of 15 Kbps, and uti|izes only 5%-30% of a 2O0 MHz, 32 Mb, computer's resources and is not subject to delay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 400 MHz, 128 Mb computers resources and is subject to delay and jitter due to end-users computer being used as a Proxy Server on the network. Management be|ieves this to be one of the most complete and techno|ogica|ly advanced line of VoIP products currently availab|e in the world.
Our agreement with Securities Trading Services Inc. and the developments of the past months |eaves us with too|s necessary to commercialize and market our products on a globa| sca|e. We expect our milestones to be met and thus executing our business plan as anticipated��, stated Jan O|ivier, CEO of Yap Internationa| Inc.
About The Company:
Yap Internationa|, Inc. is a multi-nationa| Internet Communications Company developing cost effective telecommunications through Voice over Internet Protoco| (VoIP) techno|ogies. The Company ho|ds the exc|usive rights to a revolutionary VoIP product |ine ca|led NOMAD SYSTEMS that has Dial-up, Broadband, DSL, Cab|e, Sate|lite and Wire|ess capabi|ities. The Company plans on targeting: 1) National fixed |ine II & III Tier carriers which are interested in effectively competing with the dominant carrier in their marketp|ace, 2) Large multinationa| corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatemala or London- offering business partners a more
economica| way to communicate, and 3) Immigrants in North America, a means of significant|y |owering their communication expense with their relatives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sa|es offices in Los Angeles, San Francisco and Newport Beach California.
Conc|usion:
The Examp|es Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And P|ease Watch
this One Trade Monday! Go YPIL.
Penny stocks are considered highly speculative and may be unsuitable for a|l but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 30O0 dollars to distribute this report. This report is for entertainment and
advertising purposes only and shou|d not be used as investment advice.
If you wish to stop future mai|ings, or if you fee| you have been
wrongfu||y placed in our membership, p|ease go here or send a blank
e mail with No Thanks in the subject to
noneed1007 @ yahoo.com
From fxwlzzfbtz at 82atlas.com Sun May 1 12:12:20 2005
From: fxwlzzfbtz at 82atlas.com (Forrest Camp)
Date: Sun, 01 May 2005 17:12:20 -0200
Subject: Impressive track recOrd revea|s underva|ued gems
Message-ID: <320833145724.DUA28760@iconoclast.anderson-crane.com>
Secured Data Inc. (SCRE)
Emerging Leader In Chinese Export of Pharmaceuticals!
Tota| Shares Issued & Outstanding: 9O,OOO,OOO EST
Current Price: 0.08
2004 Success |ead into an exciting 2005.
Consistent Exposure A Component of Corporate Growth!
Secured Data Inc. announced in December the c|osing of a transaction for the acquisition of Huifeng Biochemistry Joint Stock Company. Huifeng is a Chinese based exporter of bu|k Pharmaceutical drugs and Nutraceutica| products aimed at the Asian and Internationa| markets.
As part of their overa|| g|obal strategy of increased exposure |eading to potential growth in revenues, Huifeng has been featured at many exc|usive Pharmaceutica| and Nutraceutica| conferences / tradeshows wor|dwide. In 20O4, these important events for Huifeng inc|uded the 53rd Autumn Trade Fair of Medica| Material Medicine and the 15th Annua| CPHI Worldwide held at the Brusse|s Exibition Center in Be|gium.
A|ready for 2005, Huifeng has announced its participation in Vitafoods International Conference to be held in Geneva Switzer|and from May 1O �V 12. This exclusive conference features 30O leading internationa| Nutraceutical companies on both the supp|ier and buyer side. This is the |argest conference of its kind covering the European Market.
Huifeng will a|so participate at the 16th Annual CPHI to be he|d in Shanghai, China June 14 �V 16, 2OO5. Over 10,O0O visitors view this event annua||y and is an
0pp0rtunity for Huifeng to continue it marketing efforts to the international market.
Acquisition of Huifeng Biochemistry Leads to Goal of Major Corporate Growth!
Huifeng Biochemistry was formed in the year 200O with a view to become a cost effective producer and supp|ier of bulk Pharmaceutical and Nutraceutical products worldwide.
One of the major components of the va|ue attached to the acquisition of Huifeng for Secured Data Inc. is the ownership of proprietary and patented technology re|ating to the production of Rutin.
Rutin is a member of bioflavonoids, a large grOup of pheno|ic secondary metabolites of plants that inc|ude more than 2,00O different known chemicals. Bioflavonoids such as Quercetin, Rutin, and Hesperidin are important nutrients due to their ability to strengthen and modulate the permeability of the wa|ls of the b|ood vessels including capil|aries.
With their unique and patented techno|ogy, Huifeng expects to become a major force in the Rutin markets worldwide.
Secured Data Inc. stands to benefit from this acquisition through the ownership of proprietary technology, strong corporate re|ations with Chinese governmenta| agencies, certified manufacturing facilities and access to growing markets in which to se|| its drug products.
Further developments of the transaction and the deve|opment at Huifeng should be expected in the near future.
Conc|usion:
The Examples Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is SCRE Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch
this One Trade Monday! Go SCRE.
Penny stocks are considered high|y specu|ative and may be unsuitab|e for al| but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 30OO do|lars to distribute this report. This report is for entertainment and
advertising purposes only and shou|d not be used as investment advice.
If you wish to stop future mailings, or if you feel you have been
wrongfu|ly p|aced in our membership, please go here or send a b|ank
e mai| with No Thanks in the subject to noneed1009 @yahoo.com
From ejywalispmiy at cotswold-it.co.uk Sun May 1 15:28:03 2005
From: ejywalispmiy at cotswold-it.co.uk (Joseph Watkins)
Date: Mon, 02 May 2005 00:28:03 +0200
Subject: Level 2 top market performers
Message-ID: <741871200323.NCJ64304@angst.ebe.ch>
Yap Internationa|, Inc.(YPIL)
VoIP techno|ogy requires no computer or high speed Internet connection
for its dia|-up product.
Current Price: $.1O5
Watch This Stock Monday Some of These Little VOIP Stocks Have Been
Really Moving Lately.
And When Some of them Move, They Real|y Go...Gains of 1OO%, 2OO% or
More Are
Not Unheard Of.
Break News!!
Yap Internationa|, Inc. identified another VoIP techno|ogy provider that the Company intends to market and sell under the NOMAD product name. Under the new p|an, the Company wil| market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|oba| marketplace. Each device works with either a Dia|-up or a Broadband connection, and are idea||y suited, not only in North America, but in deve|oping nations arOund the w0r|d where Broadband penetration is limited or non-existent. The new "MY Nomad" product offering wi|| 0ffer video conferencing capabi|ities, call forwarding, cal| waiting, voice mail, and a global virtual number.
Also inc|uded in the new offering is a residentia| standa|one device that does not require a computer; a USB ATA device that requires no externa| power and works perfectly with any analog handset or PBX system; a USB Assistant that adds enhanced ca|| forwarding to any ce|| phone or regu|ar phone with remote dial-out (ce||u|ar bridging capabi|ity). A sleek VoIP enab|ed, ful|-featured LAN phone with LCD display, ca|ler ID and WEB Interface; a residentia| or business stand alone VoIP gateway that has built-in NAT router and firewa||, enhanced call forwarding, ca|| b|ock and remote dial-out (cel|ular bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones wil| be added to the product line. Each VoIP enab|ed handset has the abi|ity to uti|ize either a Dia|-up or Broadband connection. Included in the VoIP handset offering, is a WIFI phone, including a USB cordless phone for home or office.
Each SIP based product requires a minimum of 15 Kbps, and utilizes only 5%-3O% of a 2OO MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 400 MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most comp|ete and technological|y advanced line of VoIP products currently availab|e in the world.
Our agreement with Securities Trading Services Inc. and the deve|opments of the past months leaves us with too|s necessary to commercia|ize and market our products on a g|obal sca|e. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan O|ivier, CEO of Yap Internationa| Inc.
About The Company:
Yap Internationa|, Inc. is a multi-national Internet Communications Company developing cost effective te|ecommunications through Voice over Internet Protocol (VoIP) techno|ogies. The Company holds the exclusive rights to a revo|utionary VoIP product line ca|led NOMAD SYSTEMS that has Dial-up, Broadband, DSL, Cab|e, Satellite and Wireless capabi|ities. The Company p|ans on targeting: 1) National fixed line II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketplace, 2) Large mu|tinational corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatemala or London- offering business partners a more
economica| way to communicate, and 3) Immigrants in North America, a means of significantly lowering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sa|es offices in Los Angeles, San Francisco and Newport Beach Ca|ifornia.
Conc|usion:
The Examples Above Show The Awesome, Earning Potentia| of Little Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch
this One Trade Monday! Go YPIL.
Penny stocks are considered highly specu|ative and may be unsuitab|e for all but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 300O dollars to distribute this report. This report is for entertainment and
advertising purposes only and should not be used as investment advice.
If you wish to stop future mai|ings, or if you fee| you have been
wrongfu|ly placed in our membership, p|ease go here or send a b|ank
e mai| with No Thanks in the subject to
noneed1007 @yahoo.com
From eugen at leitl.org Sun May 1 15:39:17 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Mon, 2 May 2005 00:39:17 +0200
Subject: Pi: Less Random Than We Thought
Message-ID: <20050501223917.GQ28569@leitl.org>
Link: http://slashdot.org/article.pl?sid=05/05/01/1759240
Posted by: timothy, on 2005-05-01 18:26:00
from the at-least-statistically dept.
[1]Autoversicherung writes "Physicists including Purdue's Ephraim
Fischbach have completed a study [2]comparing the 'randomness' in pi
to that produced by 30 software random-number generators and one
chaos-generating physical machine. After conducting several tests,
they have found that while sequences of digits from pi are indeed an
acceptable source of randomness -- often an important factor in data
encryption and in solving certain physics problems -- pi's digit
string does not always produce randomness as effectively as
manufactured generators do."
References
1. https://autoversicherung.einsurance.de/
2. http://news.uns.purdue.edu/UNS/html4ever/2005/050426.Fischbach.pi.html
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From ojnulechvzzvu at anthillconsulting.com Mon May 2 03:02:04 2005
From: ojnulechvzzvu at anthillconsulting.com (Sheena Rojas)
Date: Mon, 2 May 2005 05:02:04 -0500
Subject: Asset valuation indicates cheap shares won't stay for long
Message-ID: <939579552821.LWV17357@chimeric.2girlz.net>
Secured Data Inc. (SCRE)
Emerging Leader In Chinese Export of Pharmaceuticals!
Tota| Shares Issued & Outstanding: 90,O0O,000 EST
Current Price: 0.O8
2004 Success lead into an exciting 2OO5.
Consistent Exposure A Component of Corporate Growth!
Secured Data Inc. announced in December the closing of a transaction for the acquisition of Huifeng Biochemistry Joint Stock Company. Huifeng is a Chinese based exporter of bu|k Pharmaceutica| drugs and Nutraceutica| products aimed at the Asian and International markets.
As part of their overall g|oba| strategy of increased exposure |eading to potentia| growth in revenues, Huifeng has been featured at many exc|usive Pharmaceutica| and Nutraceutica| conferences / tradeshows worldwide. In 2O04, these important events for Huifeng inc|uded the 53rd Autumn Trade Fair of Medica| Material Medicine and the 15th Annua| CPHI Worldwide held at the Brusse|s Exibition Center in Belgium.
A|ready for 2OO5, Huifeng has announced its participation in Vitafoods International Conference to be held in Geneva Switzerland from May 1O �V 12. This exc|usive conference features 300 leading international Nutraceutica| companies on both the supp|ier and buyer side. This is the |argest conference of its kind covering the European Market.
Huifeng wi|l also participate at the 16th Annual CPHI to be he|d in Shanghai, China June 14 �V 16, 2005. Over 10,0OO visitors view this event annual|y and is an
OppOrtunity for Huifeng to continue it marketing efforts to the internationa| market.
Acquisition of Huifeng Biochemistry Leads to Goal of Major Corporate Growth!
Huifeng Biochemistry was formed in the year 2000 with a view to become a cost effective producer and supplier of bu|k Pharmaceutica| and Nutraceutical products worldwide.
One of the major components of the va|ue attached to the acquisition of Huifeng for Secured Data Inc. is the ownership of proprietary and patented techno|ogy re|ating to the production of Rutin.
Rutin is a member of biof|avonoids, a |arge grOup of phenolic secondary metabolites of p|ants that include more than 2,O00 different known chemica|s. Biof|avonoids such as Quercetin, Rutin, and Hesperidin are important nutrients due to their abi|ity to strengthen and modu|ate the permeabi|ity of the walls of the b|ood vesse|s including capi||aries.
With their unique and patented techno|ogy, Huifeng expects to become a major force in the Rutin markets worldwide.
Secured Data Inc. stands to benefit from this acquisition through the ownership of proprietary technology, strong corporate relations with Chinese governmental agencies, certified manufacturing faci|ities and access to growing markets in which to se|l its drug products.
Further deve|opments of the transaction and the development at Huifeng shou|d be expected in the near future.
Conc|usion:
The Examp|es Above Show The Awesome, Earning Potential of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is SCRE Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And Please Watch
this One Trade Monday! Go SCRE.
Penny stocks are considered highly specu|ative and may be unsuitab|e for a|l but very aggressive investors. This Profile is not in any way affiliated with the featured company. We were compensated 3O0O dollars to distribute this report. This report is for entertainment and
advertising purposes only and should not be used as investment advice.
If you wish to stop future mailings, or if you fee| you have been
wrongfu||y p|aced in our membership, please go here or send a b|ank
e mail with No Thanks in the subject to noneed1001 @ yahoo.com
From Ola.Bini at itc.ki.se Sun May 1 22:57:55 2005
From: Ola.Bini at itc.ki.se (Ola Bini)
Date: Mon, 02 May 2005 07:57:55 +0200
Subject: zombied ypherpunks (Re: Email Certification?)
In-Reply-To:
References: <20050428191753.43421.qmail@web40626.mail.yahoo.com>
Message-ID: <6.2.1.2.0.20050502075207.022bc238@mail.ki.se>
At 17:43 2005-04-29, you wrote:
>Eh...for email you may have a point, but I'm not 100% convinced. In other
>words, say they want to monitor your email account. Do you really believe
>they are going to tap all major nodes and then filter all the traffic just
>to get your email? ...
Well, they could just tune in on Echelon, which really seems to be reality.
There is no need for "infinite" resources to do such a thing.
>This is that whole, "The TLAs are infinitely powerful so you might as well
>do nothing" philosophy. And even though I might be willing to concede that
>they get all that traffic, one hand doesn't always talk to the other.
>there may be smaller branches on fishing trips accessing your email if
>they want. if one were able to monitor the email account for access,
>you'll at least force your TLA phisher into going through proper internal
>channels. He might actually get a "no", depending on the cost vs risk.
Here is the fundamental misunderstanding. Your email is no "account". There
are no place where your account is stored. The only thing that exists is an
endpoint, where you receive your mail. Before the mail reaches that point,
its's just TCP-packets on the wire. If the listener is on a mail router,
you could possibly see a trace of it in the message header, but it's
possible to rewrite that stuff to, so the only way to KNOW if someone reads
your mail is to analyze the potential readers behaviour based on the
information in your mail.
/O
From tptbwsmizjzdjh at friqandfraq.com Sun May 1 23:37:03 2005
From: tptbwsmizjzdjh at friqandfraq.com (Herminia Dobson)
Date: Mon, 02 May 2005 09:37:03 +0300
Subject: Highest gains without guesswork
Message-ID: <402661655100.JAL21848@emissary.focus-access.com>
Yap International, Inc.(YPIL)
VoIP technology requires no computer or high speed Internet connection
for its dia|-up product.
Current Price: $.105
Watch This Stock Monday Some of These Litt|e VOIP Stocks Have Been
Rea|ly Moving Late|y.
And When Some of them Move, They Really Go...Gains of 1OO%, 2O0% or
More Are
Not Unheard Of.
Break News!!
Yap International, Inc. identified another VoIP techno|ogy provider that the Company intends to market and se|l under the NOMAD product name. Under the new p|an, the Company wi|| market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|oba| marketp|ace. Each device works with either a Dial-up or a Broadband connection, and are ideal|y suited, not only in North America, but in developing nations ar0und the wOr|d where Broadband penetration is limited or non-existent. The new "MY Nomad" product offering wil| Offer video conferencing capabi|ities, cal| forwarding, ca|l waiting, voice mai|, and a g|obal virtual number.
Also included in the new offering is a residential standa|one device that does not require a computer; a USB ATA device that requires no externa| power and works perfectly with any ana|og handset or PBX system; a USB Assistant that adds enhanced ca|| forwarding to any ce|l phone or regular phone with remote dia|-out (cel|u|ar bridging capability). A sleek VoIP enabled, fu|l-featured LAN phone with LCD display, ca|ler ID and WEB Interface; a residential or business stand a|one VoIP gateway that has bui|t-in NAT router and firewa||, enhanced ca|l forwarding, cal| b|ock and remote dia|-out (cel|u|ar bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enabled phones wi|l be added to the product |ine. Each VoIP enabled handset has the ability to uti|ize either a Dial-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, inc|uding a USB cord|ess phone for home or office.
Each SIP based product requires a minimum of 15 Kbps, and uti|izes on|y 5%-3O% of a 2OO MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 4O0 MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most complete and techno|ogical|y advanced line of VoIP products current|y avai|ab|e in the wor|d.
Our agreement with Securities Trading Services Inc. and the deve|opments of the past months |eaves us with too|s necessary to commercia|ize and market our products on a g|obal sca|e. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan O|ivier, CEO of Yap International Inc.
About The Company:
Yap Internationa|, Inc. is a multi-national Internet Communications Company developing cost effective te|ecommunications through Voice over Internet Protoco| (VoIP) technologies. The Company holds the exclusive rights to a revolutionary VoIP product line cal|ed NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cab|e, Sate||ite and Wire|ess capabilities. The Company p|ans on targeting: 1) Nationa| fixed |ine II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketp|ace, 2) Large multinational corporations which need to have US or European presence by having, (for examp|e), a United States number ringing in their offices in Guatemala or London- offering business partners a more
economica| way to communicate, and 3) Immigrants in North America, a means of significant|y lowering their communication expense with their relatives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sa|es offices in Los Angeles, San Francisco and Newport Beach California.
Conclusion:
The Examp|es Above Show The Awesome, Earning Potential of Little Known Companies That Explode Onto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch
this One Trade Monday! Go YPIL.
Penny stocks are considered highly speculative and may be unsuitab|e for al| but very aggressive investors. This Profile is not in any way affiliated with the featured company. We were compensated 300O do|lars to distribute this report. This report is for entertainment and
advertising purposes on|y and shou|d not be used as investment advice.
If you wish to stop future mailings, or if you feel you have been
wrongfu||y p|aced in our membership, p|ease go here or send a b|ank
e mai| with No Thanks in the subject to
noneed1001 @ yahoo.com
From camera_lumina at hotmail.com Mon May 2 07:10:25 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Mon, 02 May 2005 10:10:25 -0400
Subject: zombied ypherpunks (Re: Email Certification?)
In-Reply-To: <6.2.1.2.0.20050502075207.022bc238@mail.ki.se>
Message-ID:
>>Well, they could just tune in on Echelon, which really seems to be
>reality. There is no need for "infinite" resources to do such a thing.
Echelon ain't a radio, and not all members of TLAs have access. Indeed, you
can be damn sure that they are very careful to NOT share a lot of the
Echelon-culled information. And unless you're involved in some very
interesting operations, as a mere agitant you aren't going to merit release
of Echelon info.
HOWEVER, even if they haven't focused the big microscope on you, this
doesn't mean you don't merit "phishing" by someone (perhaps) who's in a
local office and has decided he doesn't like you personally. Thus,
lower-level & not "infinitely secure" efforts might be of some use.
>Here is the fundamental misunderstanding. Your email is no "account". There
>are no place where your account is stored. The only thing that exists is an
>endpoint, where you receive your mail. Before the mail reaches that point,
>its's just TCP-packets on the wire.
OK, what the heck are you talking about? You're telling me that
hotmail/gmail is stored on my personal COMPUTER? Not even a TLA-originated
campaign of disinformation would attempt to get that across. Are you like a
14-year-old boy or something?
The problem with Cypherpunks is that we're way too pre-occupied with
"infinite security" scenarios. Of course, such a subject is of vital
importance, but there are lower levels of threat (and appropriate response)
that need to be examined. This "well they can break almost anything so don't
even bother unless you're the Okie City B-*-m-b-*-r or somebody, and then
you'll need a faraday cage and colliding pulse mode-locked dye laser for
quantum encryption" bullshit actually detracts from Cypherpunkly
notions....it makes the use of encryption a red flag sticking out of a sea
of unencrypted grey. And then, of course, in the off chance they can't
actually break the message under that flag, they can merely send a guy out
with binoculars or whatever.
-TD
From camera_lumina at hotmail.com Mon May 2 07:13:50 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Mon, 02 May 2005 10:13:50 -0400
Subject: Stash Burn?
In-Reply-To: <20050430174956.GA21410@leitl.org>
Message-ID:
yes, this reminded me of another brilliant idea.
Why don't some cars have a little tiny furnace for stash destruction?
If you've got an on-board stash and some Alabama hillbilly with a badge
pulls you over, you just hit the button and have you're little stashed
incinerated. Who cares if the badge knows you USED TO have something on
board? Too late now if any trace of evidence is gone.
What's wrong with this idea?
-TD
>From: Eugen Leitl
>To: cypherpunks at al-qaeda.net
>Subject: Secure erasing Info (fwd from richard at SCL.UTAH.EDU)
>Date: Sat, 30 Apr 2005 19:49:56 +0200
>
>----- Forwarded message from Richard Glaser -----
>
>From: Richard Glaser
>Date: Wed, 27 Apr 2005 12:17:43 -0600
>To: MACENTERPRISE at LISTSERV.CUNY.EDU
>Subject: Secure erasing Info
>Reply-To: Mac OS X enterprise deployment project
>
>
>FYI:
>
>Rendering Drives Completely Unreadable Can be Difficult
>-------------------------------------------------------
>
>The National Association for Information Destruction has said it cannot
>endorse the use of wiping applications alone for ensuring that data have
>been effectively removed from hard drives. NAID executive director Bob
>Johnson said the only way to ensure that the data will be unreadable is
>to physically destroy the drives, and even that has to be done in
>certain ways to ensure its efficacy. Most major PC makers offer a drive
>destruction service for $20 or $30. Some hardware engineers say they
>understand why the drives have been created in a way that makes it hard
>to completely erase the data: customers demanded it because they were
>afraid of losing information they had stored on their drives.
>http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print
>[Editor's Note (Pescatore): Cool, I want a "National Association for
>Information Destruction" tee shirt. How hard could it be to have an
>interlock feature - you can really, really clear the drive if you open
>the case, hold this button down while you delete?
>
>(Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997
>at USENIX in which he showed electromicrographs of hard disk surfaces
>that had been "wiped" - you could still clearly see the 1s and 0s where
>the heads failed to line up perfectly on the track during the
>write/erase sequence. He also pointed out that you can tell more
>recently written data from less recently written data by the field
>strength in the area, which would actually make it much easier to tell
>what had been "wiped" versus what was persistent long-term store. The
>paper, minus the cool photos may be found at:
>http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
>Hard disks, I've found, make satisfying small arms targets.]
>
>Here is Mac OS X software called "SPX" that uses the "Guttman" method
>of securely deleting data off a hard disk. If you want to donate old
>HD's this might be the best method for protecting your data that was
>on the HD other than physically destroying the HD's.
>
>http://rixstep.com/4/0/spx/
>--
>
>Thanks:
>
>Richard Glaser
>University of Utah - Student Computing Labs
>richard at scl.utah.edu
>801-585-8016
>
>_____________________________________________________
>Subscription Options and Archives
>http://listserv.cuny.edu/archives/macenterprise.html
>
>----- End forwarded message -----
>--
>Eugen* Leitl leitl
>______________________________________________________________
>ICBM: 48.07078, 11.61144 http://www.leitl.org
>8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
>http://moleculardevices.org http://nanomachines.net
>
>[demime 1.01d removed an attachment of type application/pgp-signature which
>had a name of signature.asc]
From dgerow at afflictions.org Mon May 2 09:13:36 2005
From: dgerow at afflictions.org (Damian Gerow)
Date: Mon, 2 May 2005 12:13:36 -0400
Subject: Stash Burn?
In-Reply-To:
References: <20050430174956.GA21410@leitl.org>
Message-ID: <20050502161336.GA76221@afflictions.org>
Thus spake Tyler Durden (camera_lumina at hotmail.com) [02/05/05 10:18]:
: yes, this reminded me of another brilliant idea.
:
: Why don't some cars have a little tiny furnace for stash destruction?
:
: If you've got an on-board stash and some Alabama hillbilly with a badge
: pulls you over, you just hit the button and have you're little stashed
: incinerated. Who cares if the badge knows you USED TO have something on
: board? Too late now if any trace of evidence is gone.
:
: What's wrong with this idea?
The government would never let it fly?
From roberte at ripnet.com Mon May 2 09:34:15 2005
From: roberte at ripnet.com (R.W. (Bob) Erickson)
Date: Mon, 2 May 2005 12:34:15 -0400
Subject: Stash Burn?
In-Reply-To:
Message-ID: <200505021634.j42GYjdI021470@positron.jfet.org>
Congratulations, you just turned your vehicle into "drug paraphenalia"
What? You claim it is Not for drugs? Tell this to the judge.
-----Original Message-----
From: owner-cypherpunks at minder.net [mailto:owner-cypherpunks at minder.net] On
Behalf Of Tyler Durden
Sent: May 2, 2005 10:14 AM
To: eugen at leitl.org; cypherpunks at al-qaeda.net
Subject: Stash Burn?
yes, this reminded me of another brilliant idea.
Why don't some cars have a little tiny furnace for stash destruction?
If you've got an on-board stash and some Alabama hillbilly with a badge
pulls you over, you just hit the button and have you're little stashed
incinerated. Who cares if the badge knows you USED TO have something on
board? Too late now if any trace of evidence is gone.
What's wrong with this idea?
-TD
>From: Eugen Leitl
>To: cypherpunks at al-qaeda.net
>Subject: Secure erasing Info (fwd from richard at SCL.UTAH.EDU)
>Date: Sat, 30 Apr 2005 19:49:56 +0200
>
>----- Forwarded message from Richard Glaser -----
>
>From: Richard Glaser
>Date: Wed, 27 Apr 2005 12:17:43 -0600
>To: MACENTERPRISE at LISTSERV.CUNY.EDU
>Subject: Secure erasing Info
>Reply-To: Mac OS X enterprise deployment project
>
>
>FYI:
>
>Rendering Drives Completely Unreadable Can be Difficult
>-------------------------------------------------------
>
>The National Association for Information Destruction has said it cannot
>endorse the use of wiping applications alone for ensuring that data have
>been effectively removed from hard drives. NAID executive director Bob
>Johnson said the only way to ensure that the data will be unreadable is
>to physically destroy the drives, and even that has to be done in
>certain ways to ensure its efficacy. Most major PC makers offer a drive
>destruction service for $20 or $30. Some hardware engineers say they
>understand why the drives have been created in a way that makes it hard
>to completely erase the data: customers demanded it because they were
>afraid of losing information they had stored on their drives.
>http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print
>[Editor's Note (Pescatore): Cool, I want a "National Association for
>Information Destruction" tee shirt. How hard could it be to have an
>interlock feature - you can really, really clear the drive if you open
>the case, hold this button down while you delete?
>
>(Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997
>at USENIX in which he showed electromicrographs of hard disk surfaces
>that had been "wiped" - you could still clearly see the 1s and 0s where
>the heads failed to line up perfectly on the track during the
>write/erase sequence. He also pointed out that you can tell more
>recently written data from less recently written data by the field
>strength in the area, which would actually make it much easier to tell
>what had been "wiped" versus what was persistent long-term store. The
>paper, minus the cool photos may be found at:
>http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
>Hard disks, I've found, make satisfying small arms targets.]
>
>Here is Mac OS X software called "SPX" that uses the "Guttman" method
>of securely deleting data off a hard disk. If you want to donate old
>HD's this might be the best method for protecting your data that was
>on the HD other than physically destroying the HD's.
>
>http://rixstep.com/4/0/spx/
>--
>
>Thanks:
>
>Richard Glaser
>University of Utah - Student Computing Labs
>richard at scl.utah.edu
>801-585-8016
>
>_____________________________________________________
>Subscription Options and Archives
>http://listserv.cuny.edu/archives/macenterprise.html
>
>----- End forwarded message -----
>--
>Eugen* Leitl leitl
>______________________________________________________________
>ICBM: 48.07078, 11.61144 http://www.leitl.org
>8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
>http://moleculardevices.org http://nanomachines.net
>
>[demime 1.01d removed an attachment of type application/pgp-signature which
>had a name of signature.asc]
From camera_lumina at hotmail.com Mon May 2 10:34:36 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Mon, 02 May 2005 13:34:36 -0400
Subject: Stash Burn?
In-Reply-To:
Message-ID:
Hum. Well, maybe. I guess a "dual use" argument wouldn't fly.
Wait...that furnace should be able to reheat burgers also.
-TD
>From: "R.W. (Bob) Erickson"
>To: "'Tyler Durden'" ,
>Subject: RE: Stash Burn?
>Date: Mon, 2 May 2005 12:34:15 -0400
>
>Congratulations, you just turned your vehicle into "drug paraphenalia"
>What? You claim it is Not for drugs? Tell this to the judge.
>
>-----Original Message-----
>From: owner-cypherpunks at minder.net [mailto:owner-cypherpunks at minder.net] On
>Behalf Of Tyler Durden
>Sent: May 2, 2005 10:14 AM
>To: eugen at leitl.org; cypherpunks at al-qaeda.net
>Subject: Stash Burn?
>
>yes, this reminded me of another brilliant idea.
>
>Why don't some cars have a little tiny furnace for stash destruction?
>
>If you've got an on-board stash and some Alabama hillbilly with a badge
>pulls you over, you just hit the button and have you're little stashed
>incinerated. Who cares if the badge knows you USED TO have something on
>board? Too late now if any trace of evidence is gone.
>
>What's wrong with this idea?
>
>-TD
>
> >From: Eugen Leitl
> >To: cypherpunks at al-qaeda.net
> >Subject: Secure erasing Info (fwd from richard at SCL.UTAH.EDU)
> >Date: Sat, 30 Apr 2005 19:49:56 +0200
> >
> >----- Forwarded message from Richard Glaser -----
> >
> >From: Richard Glaser
> >Date: Wed, 27 Apr 2005 12:17:43 -0600
> >To: MACENTERPRISE at LISTSERV.CUNY.EDU
> >Subject: Secure erasing Info
> >Reply-To: Mac OS X enterprise deployment project
> >
> >
> >FYI:
> >
> >Rendering Drives Completely Unreadable Can be Difficult
> >-------------------------------------------------------
> >
> >The National Association for Information Destruction has said it cannot
> >endorse the use of wiping applications alone for ensuring that data have
> >been effectively removed from hard drives. NAID executive director Bob
> >Johnson said the only way to ensure that the data will be unreadable is
> >to physically destroy the drives, and even that has to be done in
> >certain ways to ensure its efficacy. Most major PC makers offer a drive
> >destruction service for $20 or $30. Some hardware engineers say they
> >understand why the drives have been created in a way that makes it hard
> >to completely erase the data: customers demanded it because they were
> >afraid of losing information they had stored on their drives.
> >http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print
> >[Editor's Note (Pescatore): Cool, I want a "National Association for
> >Information Destruction" tee shirt. How hard could it be to have an
> >interlock feature - you can really, really clear the drive if you open
> >the case, hold this button down while you delete?
> >
> >(Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997
> >at USENIX in which he showed electromicrographs of hard disk surfaces
> >that had been "wiped" - you could still clearly see the 1s and 0s where
> >the heads failed to line up perfectly on the track during the
> >write/erase sequence. He also pointed out that you can tell more
> >recently written data from less recently written data by the field
> >strength in the area, which would actually make it much easier to tell
> >what had been "wiped" versus what was persistent long-term store. The
> >paper, minus the cool photos may be found at:
> >http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
> >Hard disks, I've found, make satisfying small arms targets.]
> >
> >Here is Mac OS X software called "SPX" that uses the "Guttman" method
> >of securely deleting data off a hard disk. If you want to donate old
> >HD's this might be the best method for protecting your data that was
> >on the HD other than physically destroying the HD's.
> >
> >http://rixstep.com/4/0/spx/
> >--
> >
> >Thanks:
> >
> >Richard Glaser
> >University of Utah - Student Computing Labs
> >richard at scl.utah.edu
> >801-585-8016
> >
> >_____________________________________________________
> >Subscription Options and Archives
> >http://listserv.cuny.edu/archives/macenterprise.html
> >
> >----- End forwarded message -----
> >--
> >Eugen* Leitl leitl
> >______________________________________________________________
> >ICBM: 48.07078, 11.61144 http://www.leitl.org
> >8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
> >http://moleculardevices.org http://nanomachines.net
> >
> >[demime 1.01d removed an attachment of type application/pgp-signature
>which
>
> >had a name of signature.asc]
From eric at tully.com Mon May 2 11:28:04 2005
From: eric at tully.com (Eric Tully)
Date: Mon, 02 May 2005 14:28:04 -0400
Subject: Stash Burn?
In-Reply-To:
References:
Message-ID: <42767134.6090701@tully.com>
There's laws against destroying evidence, interfering with an officer,
interfering with an investigation, etc. If they can prove that you had
it and destroyed it, now they can charge you with two crimes instead of
just one. (I think I heard once that someone was charged with
destroying evidence for taking batteries out of a device when he was
arrested hoping to wipe its memory).
- Eric
Tyler Durden wrote:
> yes, this reminded me of another brilliant idea.
>
> Why don't some cars have a little tiny furnace for stash destruction?
>
> If you've got an on-board stash and some Alabama hillbilly with a badge
> pulls you over, you just hit the button and have you're little stashed
> incinerated. Who cares if the badge knows you USED TO have something on
> board? Too late now if any trace of evidence is gone.
>
> What's wrong with this idea?
>
> -TD
>
>> From: Eugen Leitl
>> To: cypherpunks at al-qaeda.net
>> Subject: Secure erasing Info (fwd from richard at SCL.UTAH.EDU)
>> Date: Sat, 30 Apr 2005 19:49:56 +0200
>>
>> ----- Forwarded message from Richard Glaser -----
>>
>> From: Richard Glaser
>> Date: Wed, 27 Apr 2005 12:17:43 -0600
>> To: MACENTERPRISE at LISTSERV.CUNY.EDU
>> Subject: Secure erasing Info
>> Reply-To: Mac OS X enterprise deployment project
>>
>>
>> FYI:
>>
>> Rendering Drives Completely Unreadable Can be Difficult
>> -------------------------------------------------------
>>
>> The National Association for Information Destruction has said it cannot
>> endorse the use of wiping applications alone for ensuring that data have
>> been effectively removed from hard drives. NAID executive director Bob
>> Johnson said the only way to ensure that the data will be unreadable is
>> to physically destroy the drives, and even that has to be done in
>> certain ways to ensure its efficacy. Most major PC makers offer a drive
>> destruction service for $20 or $30. Some hardware engineers say they
>> understand why the drives have been created in a way that makes it hard
>> to completely erase the data: customers demanded it because they were
>> afraid of losing information they had stored on their drives.
>> http://news.com.com/2102-1029_3-5676995.html?tag=st.util.print
>> [Editor's Note (Pescatore): Cool, I want a "National Association for
>> Information Destruction" tee shirt. How hard could it be to have an
>> interlock feature - you can really, really clear the drive if you open
>> the case, hold this button down while you delete?
>>
>> (Ranum): Peter Guttman, from New Zealand, did a terrific talk in 1997
>> at USENIX in which he showed electromicrographs of hard disk surfaces
>> that had been "wiped" - you could still clearly see the 1s and 0s where
>> the heads failed to line up perfectly on the track during the
>> write/erase sequence. He also pointed out that you can tell more
>> recently written data from less recently written data by the field
>> strength in the area, which would actually make it much easier to tell
>> what had been "wiped" versus what was persistent long-term store. The
>> paper, minus the cool photos may be found at:
>> http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
>> Hard disks, I've found, make satisfying small arms targets.]
>>
>> Here is Mac OS X software called "SPX" that uses the "Guttman" method
>> of securely deleting data off a hard disk. If you want to donate old
>> HD's this might be the best method for protecting your data that was
>> on the HD other than physically destroying the HD's.
>>
>> http://rixstep.com/4/0/spx/
>> --
>>
>> Thanks:
>>
>> Richard Glaser
>> University of Utah - Student Computing Labs
>> richard at scl.utah.edu
>> 801-585-8016
>>
>> _____________________________________________________
>> Subscription Options and Archives
>> http://listserv.cuny.edu/archives/macenterprise.html
>>
>> ----- End forwarded message -----
>> --
>> Eugen* Leitl leitl
>> ______________________________________________________________
>> ICBM: 48.07078, 11.61144 http://www.leitl.org
>> 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
>> http://moleculardevices.org http://nanomachines.net
>>
>> [demime 1.01d removed an attachment of type application/pgp-signature
>> which had a name of signature.asc]
From cufgpbwnibio at courterfilms.com Mon May 2 07:02:16 2005
From: cufgpbwnibio at courterfilms.com (Lionel Chen)
Date: Mon, 02 May 2005 15:02:16 +0100
Subject: P0wer pick 0n a tOrrid grOwth pace
Message-ID: <426720142825.ZNI14806@remitting.dynk.com>
Yap Internationa|, Inc.(YPIL)
VoIP techno|ogy requires no computer or high speed Internet connection
for its dial-up product.
Current Price: $.105
Watch This Stock Monday Some of These Little VOIP Stocks Have Been
Really Moving Lately.
And When Some of them Move, They Real|y Go...Gains of 100%, 2OO% or
More Are
Not Unheard Of.
Break News!!
Yap International, Inc. identified another VoIP techno|ogy provider that the Company intends to market and sel| under the NOMAD product name. Under the new plan, the Company will market 7 VoIP ATA devices, each addressing a specific and unique portion of the global marketplace. Each device works with either a Dia|-up or a Broadband connection, and are ideally suited, not on|y in North America, but in developing nations arOund the wOrld where Broadband penetration is limited or non-existent. The new "MY Nomad" product offering wi|| Offer video conferencing capabilities, call forwarding, call waiting, voice mail, and a g|obal virtua| number.
A|so included in the new offering is a residential standalone device that does not require a computer; a USB ATA device that requires no external power and works perfectly with any ana|og handset or PBX system; a USB Assistant that adds enhanced ca|l forwarding to any cell phone or regular phone with remote dia|-out (cellu|ar bridging capability). A s|eek VoIP enab|ed, fu|l-featured LAN phone with LCD display, ca||er ID and WEB Interface; a residentia| or business stand alone VoIP gateway that has bui|t-in NAT router and firewall, enhanced call forwarding, ca|l b|ock and remote dial-out (ce|lular bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones wi|| be added to the product line. Each VoIP enabled handset has the ability to utilize either a Dia|-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, including a USB cord|ess phone for home or office.
Each SIP based product requires a minimum of 15 Kbps, and utilizes only 5%-3O% of a 20O MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 40O MHz, 128 Mb computers resources and is subject to delay and jitter due to end-users computer being used as a Proxy Server on the network. Management be|ieves this to be one of the most complete and techno|ogica|ly advanced |ine of VoIP products currently availab|e in the world.
Our agreement with Securities Trading Services Inc. and the deve|opments of the past months |eaves us with too|s necessary to commercia|ize and market our products on a globa| sca|e. We expect our milestones to be met and thus executing our business p|an as anticipated��, stated Jan Olivier, CEO of Yap Internationa| Inc.
About The Company:
Yap International, Inc. is a mu|ti-nationa| Internet Communications Company developing cost effective telecommunications through Voice over Internet Protoco| (VoIP) technologies. The Company holds the exclusive rights to a revo|utionary VoIP product line ca|led NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cable, Sate||ite and Wireless capabi|ities. The Company plans on targeting: 1) Nationa| fixed |ine II & III Tier carriers which are interested in effectively competing with the dominant carrier in their marketp|ace, 2) Large mu|tinational corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatema|a or London- offering business partners a more
economical way to communicate, and 3) Immigrants in North America, a means of significantly |owering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sales offices in Los Ange|es, San Francisco and Newport Beach California.
Conclusion:
The Examp|es Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch
this One Trade Monday! Go YPIL.
Penny stocks are considered high|y speculative and may be unsuitable for a|l but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 30O0 do||ars to distribute this report. This report is for entertainment and
advertising purposes on|y and should not be used as investment advice.
If you wish to stop future mailings, or if you fee| you have been
wrongfu||y placed in our membership, p|ease go here or send a b|ank
e mail with No Thanks in the subject to
noneed1007 @yahoo.com
From sunder at sunder.net Mon May 2 12:09:45 2005
From: sunder at sunder.net (sunder)
Date: Mon, 02 May 2005 15:09:45 -0400
Subject: Email Certification?
In-Reply-To:
References:
Message-ID: <42767AF9.1030502@sunder.net>
Suggestion - you can do what advertisers do - encode a web bug image as
part of some jucy html emails on a web server that you own and check
your logs. (not sure if hotmail or whatever allows this, as I don't use
their cruft.)
Make sure that unlike a web bug you don't set the name so it looks like
a web bug (i.e. don't call it 1x1.gif) and don't set the image size
attributes on the IMG SRC tag to say 1x1. Instead make the file name
into something that looks like it came from a digital camera and put it
in a path that matches that cover story.
ie:
http://127.53.22.7/phightklub_files/2004-xmas-party-pix/JoeShmoeDrunkAndHigh/Kodak/DSC03284345.JPG
No guarantee that someone won't read the email as source and thus not
grab the image too, but you can make it look like the content of the
image is important to the message's content and jucy enough to make
whomever you believe is spying on you want to fetch it. i.e. "Here's a
picture of the party, you can clearly see he's got a crack pipe in his
hand and his eyes are dialated. I'm thinkin' of reporting him to deh
fedz, what do u think?" (I'm assuming that the feds are your threat
model here, but you can vary this up with whatever threat model you
think is appropriate. i.e. if you think your woman is spying on you,
make it a fake email from your supposed mistress, something she'd want
to open - i.e. subject "I'm gonna tell ur wife about us if you don't do X".)
I'd also make sure that nothing on the webserver itself points to the
directory where this lives so it can't be picked up by the search
spiders/bots accidentally, and make sure that you don't allow the
directory it lives in to have an auto-index.
Then, watch the server logs like a paranoid hawk with a caffeine
addiction problem and hope they bite, when they do, you know they've
read the other emails. You also have to make sure that you don't
accidentally open these emails yourself, or leave an open web browser
with your account where someone can randomly snoop.)
But of course, since you are using hotmail and you're about to receive
this email, if your account is watched, guess what, you can no longer
use this method. Oh well.
Tyler Durden wrote:
> Yes, but this almost misses the point.
>
> Is it possible to detect ('for certain', within previously mentioned
boundary conditions) that some has read it? This is a different problem
from merely trying to retain secrecy.
>
> Remember, my brain is a little punch-drunk from all the Fight Club
fighting.
> BUT, I believe that the fact that deeper TLAs desire to hide
themselves from more run-of-the-mill operations might be exploited in an
interesting way. Or at least force them to "commit" to officially
surveiling you, thereby (one hopes) subjecting them to whatever frail
tatters of the law still exist.
>
> A better example may be home security systems. If they're going to
tempest you, I'd bet they'd prefer not to inform your local security
company. They'd rather just shut down your alarm system and I bet this
is easy for them.
>
> BUT, this fact may enable one to detect (with little doubt) such an
intrusion, and about this I shall say no more...
From camera_lumina at hotmail.com Mon May 2 12:17:41 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Mon, 02 May 2005 15:17:41 -0400
Subject: Stash Burn?
In-Reply-To: <0505022015380.14218@somehost.domainz.com>
Message-ID:
Yes, I think those are the essential questions.
Admittedly it would normally be quite difficult to eliminate any detectable
trace...I'm assuming that a huge blast of heat should do it. Cooling can be
done by liquid, for instance. The liquid could be programmed to flush at
certain random intervals to cover correlation between operation and smokey
interest. (But this probably eliminates dual-use arguments.)
Assuming it's doable then I'm as yet uncertain about the legal
ramifications. Say the smokey's are stopping you for something "routine" and
you burn your stash right there. Do they have the legal right to even
mention the disposal operation? And if they do, is there any legal way to
state what substance was destroyed? Perhaps it was pot (as opposed to
something harder), or moonshine, or even some designer drug that's not yet
technically illegal?
-TD
>From: Thomas Shaddack
>To: Tyler Durden
>CC: eugen at leitl.org, cypherpunks at al-qaeda.net
>Subject: Re: Stash Burn?
>Date: Mon, 2 May 2005 20:29:13 +0200 (CEST)
>
>On Mon, 2 May 2005, Tyler Durden wrote:
>
> > yes, this reminded me of another brilliant idea.
> >
> > Why don't some cars have a little tiny furnace for stash destruction?
> >
> > If you've got an on-board stash and some Alabama hillbilly with a badge
>pulls
> > you over, you just hit the button and have you're little stashed
>incinerated.
> > Who cares if the badge knows you USED TO have something on board? Too
>late now
> > if any trace of evidence is gone.
> >
> > What's wrong with this idea?
>
>Let's focus on the technical realization first. How to annihilate a
>sizable chunk of matter without leaving even minute traces of it? We
>should keep in mind that contemporary forensic detection/analysis
>technologies are pretty damn sensitive.
>
>We also shouldn't forget that burning the substance releases a
>considerable amount of energy, and takes time - at least several seconds.
>Soaking it with liquid oxygen could dramatically reduce the burning time,
>and lead to total oxidation to CO2/H2O/SO2/NO2/P2O5, but it also bears
>certain risk of explosion, and LOX does not belong between user-friendly
>substances as well.
>
>The method also should not provide any hard evidence about when the
>incinerator was last used, in order to make it difficult to prove the
>exact moment of its deployment. This sharply collides with the requirement
>to dump the waste heat, as the unit will be pretty hot for some time after
>initiation, even if it will be directly connected to the car's heatsink.
From sunder at sunder.net Mon May 2 12:26:18 2005
From: sunder at sunder.net (sunder)
Date: Mon, 02 May 2005 15:26:18 -0400
Subject: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)
In-Reply-To: <20050430174956.GA21410@leitl.org>
References: <20050430174956.GA21410@leitl.org>
Message-ID: <42767EDA.9050905@sunder.net>
Yeah, but these days, I'd go with the largest flash drive I could
afford. USB2 or otherwise. I don't believe you can recover data from
these once you actually overwrite the bits (anyone out there know any
different?).
They're either 1 or 0, there's no extra ferrite molecules to the left or
the right of the track to pick up a signal from ;-) As always encrypt
the data you write to the device.
I wouldn't overwrite flash repeatedly (i.e. the Guttman method of 35
writes) though, there's a limit on the number of writes, after which it
goes bad. I'd overwrite it once with random data.
Eugen Leitl wrote:
>----- Forwarded message from Richard Glaser -----
>
>From: Richard Glaser
>Date: Wed, 27 Apr 2005 12:17:43 -0600
>To: MACENTERPRISE at LISTSERV.CUNY.EDU
>Subject: Secure erasing Info
>Reply-To: Mac OS X enterprise deployment project
>
>
>FYI:
>
>Rendering Drives Completely Unreadable Can be Difficult
>-------------------------------------------------------
From Ola.Bini at itc.ki.se Mon May 2 07:31:04 2005
From: Ola.Bini at itc.ki.se (Ola Bini)
Date: Mon, 02 May 2005 16:31:04 +0200
Subject: zombied ypherpunks (Re: Email Certification?)
In-Reply-To:
References: <6.2.1.2.0.20050502075207.022bc238@mail.ki.se>
Message-ID: <6.2.1.2.0.20050502162834.02e0b460@mail.ki.se>
At 16:10 2005-05-02, you wrote:
>>Here is the fundamental misunderstanding. Your email is no "account".
>>There are no place where your account is stored. The only thing that
>>exists is an endpoint, where you receive your mail. Before the mail
>>reaches that point, its's just TCP-packets on the wire.
>
>OK, what the heck are you talking about? You're telling me that
>hotmail/gmail is stored on my personal COMPUTER? Not even a TLA-originated
>campaign of disinformation would attempt to get that across. Are you like
>a 14-year-old boy or something?
That's completely unwarranted for. The end point for hotmail is Microsoft's
hotmail-servers, and for gmail the endpoint is Google's servers. Stop being
so damned rabid.
/O
From mmodojokxawoyw at skyenet.com Mon May 2 16:51:10 2005
From: mmodojokxawoyw at skyenet.com (Rob Sapp)
Date: Mon, 02 May 2005 16:51:10 -0700
Subject: Clearance
Message-ID: <096908833898.EXM64190@carib.internap.com>
Get info
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 7712 bytes
Desc: not available
URL:
-------------- next part --------------
A non-text attachment was scrubbed...
Name: sell86.gif
Type: image/gif
Size: 10432 bytes
Desc: not available
URL:
From justin-cypherpunks at soze.net Mon May 2 12:23:08 2005
From: justin-cypherpunks at soze.net (Justin)
Date: Mon, 2 May 2005 19:23:08 +0000
Subject: Stash Burn?
In-Reply-To:
References: <20050430174956.GA21410@leitl.org>
Message-ID: <20050502192308.GA26826@arion.soze.net>
On 2005-05-02T10:13:50-0400, Tyler Durden wrote:
> yes, this reminded me of another brilliant idea.
>
> Why don't some cars have a little tiny furnace for stash destruction?
> If you've got an on-board stash and some Alabama hillbilly with a badge
> pulls you over, you just hit the button and have you're little stashed
> incinerated. Who cares if the badge knows you USED TO have something on
> board? Too late now if any trace of evidence is gone.
>
> What's wrong with this idea?
That's rather complicated and unlikely to succeed. A more practical
solution would be a pod that can be jettisoned. Dark-colored or camo,
rock-like, and indestructable for later retrieval. No cop would notice
such a thing fired directly forward after he's pulled in behind you and
lighted you up.
Add a radio beacon for easy location after the cop has departed.
From shaddack at ns.arachne.cz Mon May 2 11:29:13 2005
From: shaddack at ns.arachne.cz (Thomas Shaddack)
Date: Mon, 2 May 2005 20:29:13 +0200 (CEST)
Subject: Stash Burn?
In-Reply-To:
References:
Message-ID: <0505022015380.14218@somehost.domainz.com>
On Mon, 2 May 2005, Tyler Durden wrote:
> yes, this reminded me of another brilliant idea.
>
> Why don't some cars have a little tiny furnace for stash destruction?
>
> If you've got an on-board stash and some Alabama hillbilly with a badge pulls
> you over, you just hit the button and have you're little stashed incinerated.
> Who cares if the badge knows you USED TO have something on board? Too late now
> if any trace of evidence is gone.
>
> What's wrong with this idea?
Let's focus on the technical realization first. How to annihilate a
sizable chunk of matter without leaving even minute traces of it? We
should keep in mind that contemporary forensic detection/analysis
technologies are pretty damn sensitive.
We also shouldn't forget that burning the substance releases a
considerable amount of energy, and takes time - at least several seconds.
Soaking it with liquid oxygen could dramatically reduce the burning time,
and lead to total oxidation to CO2/H2O/SO2/NO2/P2O5, but it also bears
certain risk of explosion, and LOX does not belong between user-friendly
substances as well.
The method also should not provide any hard evidence about when the
incinerator was last used, in order to make it difficult to prove the
exact moment of its deployment. This sharply collides with the requirement
to dump the waste heat, as the unit will be pretty hot for some time after
initiation, even if it will be directly connected to the car's heatsink.
From jason at lunkwill.org Mon May 2 14:19:02 2005
From: jason at lunkwill.org (Jason Holt)
Date: Mon, 2 May 2005 21:19:02 +0000 (UTC)
Subject: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)
In-Reply-To: <42767EDA.9050905@sunder.net>
Message-ID:
On Mon, 2 May 2005, sunder wrote:
> Yeah, but these days, I'd go with the largest flash drive I could
> afford. USB2 or otherwise. I don't believe you can recover data from
> these once you actually overwrite the bits (anyone out there know any
> different?).
There are lots of pitfalls in secure erasure, even without considering
physical media attacks. Your filesystem may not overwrite data on the same
blocks used to write the data originally, for instance. Plaintext may be left
in the journal and elsewhere. Even filling up the disk may not do it, as some
filesystems keep blocks in reserve. I did a demo a few years ago where I
wrote plaintext, overwrote, then dumped the filesystem blocks out and found
parts of the plaintext.
For anybody who hasn't read it, the Gutmann paper is "Secure Deletion of Data
from Magnetic and Solid-State Memory", and is highly recommended. He shows
that even RAM isn't safe against physical media attacks.
-J
From camera_lumina at hotmail.com Tue May 3 08:05:36 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Tue, 03 May 2005 11:05:36 -0400
Subject: Stash Burn?
In-Reply-To: <20050502192308.GA26826@arion.soze.net>
Message-ID:
Hum. Well, me I personally like the piss-off factor: the cops KNOW you had
something, which is bad enough. And then, they KNOW you destroyed it. But
most importantly, they know you know they know, but you don't give a crap. A
flagrant touting of their authority. If they don't beat you to death, it'll
be very satisfying.
The pod jettison idea is interesting, but I'm sceptical: Those guys are
always on the lookout for something being chucked out of a car getting
pulled over, but if it were jettisoned straight out the front it might work.
-TD
>From: Justin
>To: cypherpunks at al-qaeda.net
>Subject: Re: Stash Burn?
>Date: Mon, 2 May 2005 19:23:08 +0000
>
>On 2005-05-02T10:13:50-0400, Tyler Durden wrote:
> > yes, this reminded me of another brilliant idea.
> >
> > Why don't some cars have a little tiny furnace for stash destruction?
> > If you've got an on-board stash and some Alabama hillbilly with a badge
> > pulls you over, you just hit the button and have you're little stashed
> > incinerated. Who cares if the badge knows you USED TO have something on
> > board? Too late now if any trace of evidence is gone.
> >
> > What's wrong with this idea?
>
>That's rather complicated and unlikely to succeed. A more practical
>solution would be a pod that can be jettisoned. Dark-colored or camo,
>rock-like, and indestructable for later retrieval. No cop would notice
>such a thing fired directly forward after he's pulled in behind you and
>lighted you up.
>
>Add a radio beacon for easy location after the cop has departed.
From yoabrjonnz at pstbbs.com Tue May 3 05:42:32 2005
From: yoabrjonnz at pstbbs.com (Maude Stratton)
Date: Tue, 03 May 2005 11:42:32 -0100
Subject: super webcam
Message-ID: <312435977207.RQZ89958@workmanlike.Adelphia.com>
Hi my name is Jessica and I'm 30 years old.
I have Slender body, Dark Brown hair and Green eyes.
I'm a strong, witty, spontaneous, independent, healthy woman.
A little shy at first but if you give me a chance to warm up to you, you won't regret it.
You can contact me now at: http://elkhart.myabsinth.com/575r.html
(Registration is free of charge)
See you soon :)
You're a catch. You know it and we know it.
Now it's time to let them know it.
1,451,219 swingers already registered
so, what are you waiting for?
Just click below and dive right into creating your ad:
http://methionine.myabsinth.com/575r.html
If you got this message by mistake, or you do not wish to get messages
from dating please click : http://vote.myabsinth.com/nothanks.php
Ion Marketing Limited
D2, 23, Borrett Road, Mid-Levels West
Hong Kong
From sunder at sunder.net Tue May 3 10:10:07 2005
From: sunder at sunder.net (sunder)
Date: Tue, 03 May 2005 13:10:07 -0400
Subject: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)
In-Reply-To:
References:
Message-ID: <4277B06F.10403@sunder.net>
Jason Holt wrote:
>There are lots of pitfalls in secure erasure, even without considering
>physical media attacks. Your filesystem may not overwrite data on the same
>blocks used to write the data originally, for instance. Plaintext may be left
>in the journal and elsewhere. Even filling up the disk may not do it, as some
>filesystems keep blocks in reserve. I did a demo a few years ago where I
>wrote plaintext, overwrote, then dumped the filesystem blocks out and found
>parts of the plaintext.
>
>For anybody who hasn't read it, the Gutmann paper is "Secure Deletion of Data
>from Magnetic and Solid-State Memory", and is highly recommended. He shows
>that even RAM isn't safe against physical media attacks.
>
>
Incase anyone's too lazy to google it, Peter Gutmann's paper can be
found here:
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
Good point. So, modify that with - create a block-level encrypted file
system on the flash drive, so long as you key and passphrase are good,
you should be safe enough... I've also seen this little toy:
http://www.biostik.com/ a bit pricey, but depending on your threat
model, might add another layer of protection. Not something I'd
personally bother with - esp with the recent stuff about how to make
fake fingerprints, etc (funny thing is that your fingerprints will be on
the case of this thing, so not much security there), but YMMV based on
your threat model, right? But, as always, encrypt early and often. :-D
Would make an interesting side conversation about how fingerprints are
passwords, but passwords that can (now?) be easily stolen and replayed.
IMHO, it casts doubt on a lot of biometric methods. Wonder if it would
be possible to create an image of an iris that would pass an iris scan,
if so, both fingerprints and irises become much like permanent credit
cards, but worse, which once duplicated, cannot be revoked. One can
imagine in the future once ATM's have iris scanners, that some evil
group will set up a fake ATM with a very good CCD camera setup to
capture irises as well as ATM cards and pin #'s... and, why not, also
finger prints if future ATM's use such scanners.
From steve49152 at yahoo.ca Tue May 3 10:32:09 2005
From: steve49152 at yahoo.ca (Steve Thompson)
Date: Tue, 3 May 2005 13:32:09 -0400 (EDT)
Subject: zombied ypherpunks (Re: Email Certification?)
In-Reply-To: 6667
Message-ID: <20050503173209.89449.qmail@web51803.mail.yahoo.com>
--- Tyler Durden wrote:
> >>Well, they could just tune in on Echelon, which really seems to be
> >reality. There is no need for "infinite" resources to do such a thing.
>
> Echelon ain't a radio, and not all members of TLAs have access. Indeed,
> you
> can be damn sure that they are very careful to NOT share a lot of the
> Echelon-culled information. And unless you're involved in some very
> interesting operations, as a mere agitant you aren't going to merit
> release
> of Echelon info.
How do you know?
> HOWEVER, even if they haven't focused the big microscope on you, this
A very good friend of mine once described what you call the "big
microphone" as the panopticon. Clearly this is not a new idea, and
consequently we may assume that the TLAs are well in advance of whatever
is known about global surveillance by the general public. Technical
sophisticates have, however, a distinct advantage here. Furthermore, as I
have stated previously, the use of information gleaned from a surveillance
effort leaks 'bits' about the surveillance action itself -- this is a
mathematical certainty.
But, seeing as how the public is expected to live in a rather small
fantasy world of conceptual and information poverty, at least as such
relates to the activities of TLAs, we can assume that mathematical
realities will have zero correlation with politically motivated policies
in the public `sphere'.
> doesn't mean you don't merit "phishing" by someone (perhaps) who's in a
> local office and has decided he doesn't like you personally. Thus,
> lower-level & not "infinitely secure" efforts might be of some use.
Obviously.
> >Here is the fundamental misunderstanding. Your email is no "account".
> There
> >are no place where your account is stored. The only thing that exists
> is an
> >endpoint, where you receive your mail. Before the mail reaches that
> point,
> >its's just TCP-packets on the wire.
>
> OK, what the heck are you talking about? You're telling me that
> hotmail/gmail is stored on my personal COMPUTER? Not even a
> TLA-originated
> campaign of disinformation would attempt to get that across. Are you
> like a
> 14-year-old boy or something?
It's likely that "he" is practising his stupidity in order to establish
the background of his mailing-list persona. Perhaps his messages also
carry coded `freight' of some kind intended for a certain class of reader.
If so, and if he uses perfect encryption for his coding scheme, we cannot
have any hope of decyphering what he is saying beyond the superficial
face-value of his text.
> The problem with Cypherpunks is that we're way too pre-occupied with
> "infinite security" scenarios. Of course, such a subject is of vital
> importance, but there are lower levels of threat (and appropriate
> response)
> that need to be examined. This "well they can break almost anything so
> don't
> even bother unless you're the Okie City B-*-m-b-*-r or somebody, and
> then
> you'll need a faraday cage and colliding pulse mode-locked dye laser for
>
> quantum encryption" bullshit actually detracts from Cypherpunkly
> notions....it makes the use of encryption a red flag sticking out of a
> sea
> of unencrypted grey. And then, of course, in the off chance they can't
> actually break the message under that flag, they can merely send a guy
> out
> with binoculars or whatever.
Don't forget about rubber-hose cryptanlysis. Rumour has it that method is
preferred in many cases since it makes the code-breakers feel good by way
of testosterone release.
Regards,
Steve
______________________________________________________________________
Post your free ad now! http://personals.yahoo.ca
From steve49152 at yahoo.ca Tue May 3 10:34:15 2005
From: steve49152 at yahoo.ca (Steve Thompson)
Date: Tue, 3 May 2005 13:34:15 -0400 (EDT)
Subject: Stash Burn?
In-Reply-To: 6667
Message-ID: <20050503173415.74754.qmail@web51802.mail.yahoo.com>
--- Tyler Durden wrote:
> yes, this reminded me of another brilliant idea.
>
> Why don't some cars have a little tiny furnace for stash destruction?
>
> If you've got an on-board stash and some Alabama hillbilly with a badge
> pulls you over, you just hit the button and have you're little stashed
> incinerated. Who cares if the badge knows you USED TO have something on
> board? Too late now if any trace of evidence is gone.
>
> What's wrong with this idea?
Who gives a shit? Much better to pay off the cops ahead of time so they
won't inconvenience your criminal activities.
Regards,
Steve
______________________________________________________________________
Post your free ad now! http://personals.yahoo.ca
From juicy at melontraffickers.com Tue May 3 16:26:23 2005
From: juicy at melontraffickers.com (A.Melon)
Date: Tue, 3 May 2005 16:26:23 -0700 (PDT)
Subject: Stash Burn?
In-Reply-To: <20050503173415.74754.qmail@web51802.mail.yahoo.com>
Message-ID: <3aefa4ca161894be8f451841dd7757c6@melontraffickers.com>
--- Steve Thompson scribbled:
> --- Tyler Durden wrote:
> > yes, this reminded me of another brilliant idea.
> >
> > Why don't some cars have a little tiny furnace for stash destruction?
> >
> > If you've got an on-board stash and some Alabama hillbilly with a badge
> > pulls you over, you just hit the button and have you're little stashed
> > incinerated. Who cares if the badge knows you USED TO have something on
> > board? Too late now if any trace of evidence is gone.
> >
> > What's wrong with this idea?
The Alabama hillbilly remains free to harass you the next time
you pass through the area.
> Who gives a shit? Much better to pay off the cops ahead of time so they
> won't inconvenience your criminal activities.
Do you pay off every cop in the US or merely every cop within
twenty miles of your drug route?
SOP is to drive unregistered or stolen cars with license removed.
Keep a fake "new car" paper license in the rear windshield. With
no way to connect you to the vehicle, response to a traffic stop
should be obvious. No need to stop the car if you have a
passenger and a few scoped and unscoped battle rifles. Sunroof
optional but recommended. Be prepared to repaint the car.
It is unnecessary to have a belt-fed AR or m249 with several
thousand rounds mounted in the trunk facing backwards. Using a
turn signal or windshield wiper lever to aim is awkward, and so
is explaining away bullet holes in tail lights when you're pulled
over for that later.
From measl at mfn.org Tue May 3 15:56:56 2005
From: measl at mfn.org (J.A. Terranson)
Date: Tue, 3 May 2005 17:56:56 -0500 (CDT)
Subject: Crypto in everyday cellphones
Message-ID: <20050503175547.T78790@ubzr.zsa.bet>
While the errors are both glaring and funny as hell in the below article,
the concept is an interesting one.
--
Yours,
J.A. Terranson
sysadmin at mfn.org
0xBD4A95BF
"What this country needs is a good old fashioned nuclear enema."
---------- Forwarded message ----------
Date: Tue, 26 Apr 2005 00:15:50 -0700
From: Sir Nobody in Particular
Reply-To: TSCM-L at yahoogroups.com
To: TSCM-L at yahoogroups.com
Subject: [TSCM-L]
http://www.iht.com/articles/2005/04/24/business/wireless25.php
Secure communications: Available, but not cheap
By Andreas Tzortzis International Herald Tribune
MONDAY, APRIL 25, 2005
In the 1990s, everyone from blue-chip company executives to Princess
Diana fell victim to mobile phone eavesdroppers who recorded their
conversations for financial gain. Since then, technology to encrypt
calls has gotten better, but the bad boys have been playing catch-up
too.
Last month, Silentel, a Bratislava, Slovakia, technology company, became
the newest arrival in the small but growing market for secure mobile
calls.
Like Beaucom in Munich and its crosstown rival, Rohde & Schwarz, along
with a General Dynamics unit in Scottsdale, Arizona, Silentel promises
security by encypting voice conversations with mind-numbingly
complicated codes. But while Beaucom features an encryption card and the
Sectira wireless phone from General Dynamics works with a built-in
encryption chip, Silentel says it is the first to offer a software
solution.
Clients can download a software application that works with the Symbian
operating system, which is used in phones made by Ericsson, Nokia,
Motorola and others, according to Igor Kocis, chief executive of
Silentel.
To make a secure call, you punch a button on the phone and begin calling
the other phone, which must also have the technology. The software
compresses your voice into data and encrypts it using a digital key with
a sequence 256 bits long. That is one step higher than military-level
encryption, which is 128 bits and would take a computer years to crack.
"Then your voice, in encrypted form, is transferred directly to the
phone of your partner, in contrast to standard communication where it is
not encrypted after it hits the nearest tower," Kocis said.
At a starting price of 990, or $1,295, it is one of the cheapest
solutions available, he said, and can work with 10 Nokia and Siemens
phone models.
But if clients want the ability to talk at the same time during a
conversation, they have to pay 200 more for a piece of hardware that
stores and safeguards the digital keys and allows callers to talk
simultaneously.
The company officially began selling the products in March. Kocis said
he hoped to one day count governments, security agencies, business
executives and lawyers as his customers.
"We see a market anywhere - in Western Europe, in developing countries,"
said Kocis, who studied cryptography in Bratislava and whose father was
a cryptologist who worked with the Czechoslovakian government during the
cold war.
When Siemens in 2000 introduced an encrypted version of its popular S35i
phone, Interior Minister Otto Schily of Germany received the first one.
Five years later, frustrated German police officials say they still
haven't been able to crack the encryption code.
"Not only are we not technically able to listen in, but we don't have
the legal ability to force companies to tell us how to do it," said
Bernd Carstensen, a spokesman for Germany's Union of Police
Investigators. "That means if someone is using these phones to plan a
crime, we aren't able to listen in."
But secure mobile phones haven't exactly flooded the market, so
governments have not been concerned, said Peter B|ttgen, a spokesman for
Germany's data protection commissioner.
Beaucom introduced its Enigma phone on the market in 2003. The handset,
which it said cost more than 6 million to develop, has a card inside
that stores and produces random encryption keys for each call. Since its
introduction, the company has sold "a few thousand handsets" at about
2,200 each, said Wilhelm Decker, Beaucom's representative in Germany.
"We expected it to go up a lot earlier," he said about the market for
secure calls. "But it's coming, slowly but surely."
Some have their doubts. Justin King, a director of the London security
company C2i International, said that the signal quality of secure mobile
phones was still a problem.
"It's a Catch 22," said King, whose business advises large companies on
counter-espionage measures. "These products are expensive. We'd rather
spend #200 on air fare and talk about whatever it is at a coffee shop."
In the 1990s, everyone from blue-chip company executives to Princess
Diana fell victim to mobile phone eavesdroppers who recorded their
conversations for financial gain. Since then, technology to encrypt
calls has gotten better, but the bad boys have been playing catch-up
too.
Last month, Silentel, a Bratislava, Slovakia, technology company, became
the newest arrival in the small but growing market for secure mobile
calls.
Like Beaucom in Munich and its crosstown rival, Rohde & Schwarz, along
with a General Dynamics unit in Scottsdale, Arizona, Silentel promises
security by encypting voice conversations with mind-numbingly
complicated codes. But while Beaucom features an encryption card and the
Sectira wireless phone from General Dynamics works with a built-in
encryption chip, Silentel says it is the first to offer a software
solution.
Clients can download a software application that works with the Symbian
operating system, which is used in phones made by Ericsson, Nokia,
Motorola and others, according to Igor Kocis, chief executive of
Silentel.
To make a secure call, you punch a button on the phone and begin calling
the other phone, which must also have the technology. The software
compresses your voice into data and encrypts it using a digital key with
a sequence 256 bits long. That is one step higher than military-level
encryption, which is 128 bits and would take a computer years to crack.
"Then your voice, in encrypted form, is transferred directly to the
phone of your partner, in contrast to standard communication where it is
not encrypted after it hits the nearest tower," Kocis said.
At a starting price of 990, or $1,295, it is one of the cheapest
solutions available, he said, and can work with 10 Nokia and Siemens
phone models.
But if clients want the ability to talk at the same time during a
conversation, they have to pay 200 more for a piece of hardware that
stores and safeguards the digital keys and allows callers to talk
simultaneously.
The company officially began selling the products in March. Kocis said
he hoped to one day count governments, security agencies, business
executives and lawyers as his customers.
"We see a market anywhere - in Western Europe, in developing countries,"
said Kocis, who studied cryptography in Bratislava and whose father was
a cryptologist who worked with the Czechoslovakian government during the
cold war.
When Siemens in 2000 introduced an encrypted version of its popular S35i
phone, Interior Minister Otto Schily of Germany received the first one.
Five years later, frustrated German police officials say they still
haven't been able to crack the encryption code.
"Not only are we not technically able to listen in, but we don't have
the legal ability to force companies to tell us how to do it," said
Bernd Carstensen, a spokesman for Germany's Union of Police
Investigators. "That means if someone is using these phones to plan a
crime, we aren't able to listen in."
But secure mobile phones haven't exactly flooded the market, so
governments have not been concerned, said Peter B|ttgen, a spokesman for
Germany's data protection commissioner.
Beaucom introduced its Enigma phone on the market in 2003. The handset,
which it said cost more than 6 million to develop, has a card inside
that stores and produces random encryption keys for each call. Since its
introduction, the company has sold "a few thousand handsets" at about
2,200 each, said Wilhelm Decker, Beaucom's representative in Germany.
"We expected it to go up a lot earlier," he said about the market for
secure calls. "But it's coming, slowly but surely."
Some have their doubts. Justin King, a director of the London security
company C2i International, said that the signal quality of secure mobile
phones was still a problem.
"It's a Catch 22," said King, whose business advises large companies on
counter-espionage measures. "These products are expensive. We'd rather
spend #200 on air fare and talk about whatever it is at a coffee shop."
[Non-text portions of this message have been removed]
------------------------ Yahoo! Groups Sponsor --------------------~-->
In low income neighborhoods, 84% do not own computers.
At Network for Good, help bridge the Digital Divide!
http://us.click.yahoo.com/EpW3eD/3MnJAA/cosFAA/UBhwlB/TM
--------------------------------------------------------------------~->
========================================================
TSCM-L Technical Security Mailing List
"In a multitude of counselors there is strength"
Come, my friends,
'Tis not too late to seek a newer world.
Push off, and sitting well in order smite
The sounding furrows; for my purpose holds
To sail beyond the sunset, and the baths
Of all the western stars, until I die.
- Tennyson, "Ulysses"
=================================================== TSKS
Yahoo! Groups Links
<*> To visit your group on the web, go to:
http://groups.yahoo.com/group/TSCM-L/
<*> To unsubscribe from this group, send an email to:
TSCM-L-unsubscribe at yahoogroups.com
<*> Your use of Yahoo! Groups is subject to:
http://docs.yahoo.com/info/terms/
From zhkoplkwjf at donovan.net Tue May 3 16:09:32 2005
From: zhkoplkwjf at donovan.net (Napoleon Cordero)
Date: Tue, 03 May 2005 18:09:32 -0500
Subject: The next mOve higher f0r strOng market |eader
Message-ID: <328776819013.BBC54860@whipple.duracoolky.com>
Yap International, Inc.(YPIL)
VoIP technology requires no computer or high speed Internet connection
for its dia|-up product.
Current Price: $O.1O
Watch This Stock Wednesday Some of These Little VOIP Stocks Have Been
Rea|ly Moving Lately.
And When Some of them Move, They Real|y Go...Gains of 1O0%, 2O0% or
More Are
Not Unheard Of.
Break News!!
Yap Internationa|, Inc. identified another VoIP technology provider that the Company intends to market and se|l under the NOMAD product name. Under the new p|an, the Company wi|l market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|obal marketplace. Each device works with either a Dial-up or a Broadband connection, and are ideally suited, not only in North America, but in deve|oping nations ar0und the wOrld where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering wil| Offer video conferencing capabilities, ca|| forwarding, ca|l waiting, voice mail, and a global virtual number.
Also inc|uded in the new offering is a residentia| standa|one device that does not require a computer; a USB ATA device that requires no external power and works perfectly with any analog handset or PBX system; a USB Assistant that adds enhanced ca|l forwarding to any cel| phone or regu|ar phone with remote dial-out (cel|u|ar bridging capabi|ity). A sleek VoIP enab|ed, ful|-featured LAN phone with LCD disp|ay, ca|ler ID and WEB Interface; a residentia| or business stand alone VoIP gateway that has bui|t-in NAT router and firewa|l, enhanced cal| forwarding, call b|ock and remote dial-out (ce||ular bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enabled phones wi|l be added to the product |ine. Each VoIP enab|ed handset has the abi|ity to uti|ize either a Dial-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, inc|uding a USB cordless phone for home or office.
Each SIP based product requires a minimum of 15 Kbps, and uti|izes only 5%-30% of a 20O MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 40O MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most complete and technologica||y advanced line of VoIP products currently availab|e in the world.
Our agreement with Securities Trading Services Inc. and the deve|opments of the past months |eaves us with too|s necessary to commercialize and market our products on a g|oba| sca|e. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan O|ivier, CEO of Yap Internationa| Inc.
About The Company:
Yap International, Inc. is a multi-national Internet Communications Company deve|oping cost effective telecommunications through Voice over Internet Protoco| (VoIP) techno|ogies. The Company ho|ds the exclusive rights to a revolutionary VoIP product |ine cal|ed NOMAD SYSTEMS that has Dial-up, Broadband, DSL, Cable, Sate|lite and Wire|ess capabi|ities. The Company p|ans on targeting: 1) Nationa| fixed |ine II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketplace, 2) Large mu|tinationa| corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatemala or London- offering business partners a more
economical way to communicate, and 3) Immigrants in North America, a means of significantly lowering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sa|es offices in Los Angeles, San Francisco and Newport Beach California.
Conclusion:
The Examp|es Above Show The Awesome, Earning Potentia| of Little Known Companies That Explode Onto Investor's Radar Screens; Many of You Are A|ready Fami|iar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch
this One Trade Wednesday! Go YPIL.
Penny stocks are considered highly speculative and may be unsuitab|e for a|l but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 3O00 do||ars to distribute this report. This report is for entertainment and
advertising purposes only and should not be used as investment advice.
If you wish to stop future mailings, or if you fee| you have been
wrongfu|ly placed in our membership, please go here or send a b|ank
e mai| with No Thanks in the subject to
noneed1007 @yahoo.com
From declan at well.com Tue May 3 22:42:03 2005
From: declan at well.com (Declan McCullagh)
Date: Tue, 03 May 2005 22:42:03 -0700
Subject: [Politech] Customs-proofing your laptop: Staying safe at border
searches [priv]
Message-ID:
Detecting whether the Feds or any government adversary has placed
spyware on your computer when "examining" it at a border checkpoint is
not entirely trivial. It is, however, important for your privacy and
peace of mind -- especially because computer and PDA searches will
likely become more popular in time.
Here are some basic suggestions:
http://www.politechbot.com/2005/04/21/update-on-alabama/
A more advanced one would be to perform a checksum of all the files on
the hard drive before-and-after through something like this:
% for i in `find / -print`; do md5 $i >> /tmp/new; done ; diff /tmp/new
/tmp/old
The problem is that even your "diff" utility could be modified so you'd
need to use a known-good copy from archival media.
Can anyone recommend a checksum'ing utility for Windows and OS X? It
would be nicer than a command-line interface.
Note, by the way, that Rep. Bono's "anti-spyware" bill exempts police:
http://thomas.loc.gov/cgi-bin/bdquery/z?d109:h.r.00029:
-Declan
---
Declan,
In response to the Alabama activist who was hassled at the border returning
from Canada, here is some insight. However, I ask that you PLEASE WITHHOLD
MY NAME; I know some people who do computer forensics for FBI and I would
not want them to know it was me writing this.... Thanks.
Feel free to use any of the below in the blog or in the listserv.
+ + + + + + + + + + + + + + + + + + + + + + + +
Loretta's experience w/ US Customs is chilling. The fifteen minutes her
notebook computer was out of view and in government custody is plenty of
time for an agent to image the drive. Imaging, as you know, is the
end-to-end bit-level copying of the drive. When properly done, imaging
bypasses all OS controls, such as file permissions in Linux, BSD, and OS/X,
and user ownership in Windows.
A drive image affords an analyst plenty of time to examine the drive
contents without the owner's awareness. The image can be mounted onto a
device where other programs can reconstruct or reinterpret file systems
structures of NTFS, ext, FAT, and so on. An analyst mounting an image as
root or Administrator can see anything.
Do not assume a BIOS password will protect you. The drive can be
physically removed from a laptop in under a minute.
If the file data is encrypted, a forensic analyst will need to use a
password cracker to decode the data. This will slow them down, and in all
but the most pressing cases, will prompt them to move on. However, a
careless individual may leave their PGP (or similar) key on their drive in
a text file or in slack or deleted space, giving the agent something to
work with.
Though encryption is a pain for the user to deal with, this is probably the
best level of protection. Encryption raises your reasonable level of
expectation of privacy.
Legal issues raised by this incident potentially include illegal search and
seizure. Even US Customs still needs a search warrant for your computer,
and the warrant must state specifically what they are looking for. They
cannot fish.
If an image was taken of Loretta Nall's drive, there will be a chain of
custody document for this supposed evidence. Her lawyer can advise as to
how to file a motion for it. There might also be an incident report, which
would describe the actions of the agents.
None of the information stolen from Loretta's drive can be used directly in
a court proceeding. Unfortunately, it probably could be used to confirm
other intelligence.
There is no device I know of that will allow you to determine if your drive
has been scanned or imaged. Computer forensics is extremely careful not to
taint evidence by writing to the drive.
I'd like to see one of those warranty foil labels that fall apart when you
tamper with them. There must be source for them. Place a label across the
edges of the drive bay. That way, if the drive is removed, you can at
least see that it was opened.
The point about government installing bots is well-taken. You may be able
to md5sum your drive before and after customs, but this capability is
beyond 99%+ of users.
If possible, do NOT carry a notebook across the border with you if you can
avoid it. Junior G-Men maybe too tempted to prove their mettle with the
boss when they see one. For data, pen drives and CD's can be comingled
with other personal possessions, where they might attract less attention.
Pen drives may be reformatted at will, removing the risk exposure that
might come with a notebook's Internet cache, slack space, cookie list,
website history, and so on.
If you MUST take your computer, FLUSH ALL INTERNET CACHE, web site
histories, search histories, cookies, temp files, recycyle bins, etc. Make
your own disk image before you go.
Always ask Customs what they are doing, and ask as politely as
possible. Object if they remove something from your sight - again, as
politely as possible. Do not get "legal" on them, but do say "I don't
understand." At least that way they cannot claim you have tacitly waived
your rights.
-N. G. Zax
_______________________________________________
Politech mailing list
Archived at http://www.politechbot.com/
Moderated by Declan McCullagh (http://www.mccullagh.org/)
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From declan at well.com Tue May 3 22:43:19 2005
From: declan at well.com (Declan McCullagh)
Date: Tue, 03 May 2005 22:43:19 -0700
Subject: [Politech] Passport RFID tracking: a between-the-lines read [priv]
Message-ID:
-------- Original Message --------
Subject: Your RFID passport tracker is ready...
Date: Mon, 2 May 2005 15:24:03 -0500
From: Parks
To: Declan McCullagh , politech at politechbot.com
Declan, I think you might find this interesting. I confirms my vision of a
future where entry points are wired and read your ID and identify your
possessions through wireless RFID transmitters built into everything from
passports, ID cards, credit cards, and products we buy off the shelves. -
Drew
>From the EE-Times, a between the lines look at the future of RFID tracking:
re: E-passport makers hail U.S. retreat
Junko Yoshida [FAIR USE]
EE Times
(04/29/2005 1:38 PM EDT)
PARIS - Global electronic passports suppliers hailed a decision by the U.S.
State Department to drop a requirement for additional security measures in
next-generation U.S. passports. The specifications have yet to be finalized.
Neville Pattinson, director of technology development and government
affairs for smart card provider Axalto Americas, said Friday (April 29)
that adding security measures such as "Basic Access Control" and a metallic
shield cover to U.S. passports could "completely make the information
[stored in the e-passport] undetectable."
ME> They can be read from an RFID reader while your passport is in your
pocket by stealthy information miners. These RFID chips are the same kind
that the stores are putting on products and they all may be read as you
pass through an entry or exit point. The point is that THEY want to use
these as tracking devices. Note the comment about metallic shields. You can
put your future drivers license (when they put RFID in them too) or
passport in tin foil or a metallic case.
Pattison originally disclosed the results of a National Institute of
Standards and Technology e-passport trial held last summer in which he said
NIST testers were able to lift "an exact copy of digitally signed private
data" from a contactless e-passport chip 30 feet away.
A State Department official earlier this week acknowledged for the first
time that information stored inside an e-passport chip could be read at a
distance beyond 10 centimeters.
ME> Bull - they know its range is METERS not centimeters!!!
ME> GO TO EE-TIMES for the entire article but this should be proof
enough....
....Barry Steinhardt, director of the Technology & Liberty Program at the
American Civil Liberties Union, asked, "Why do we need to have a
contactless circuit at all in an identity document?"
...e-passport chips provide a digital data payload,...basic information
such as a digital photo is stored electronically, technologies like
***facial recognition*** can be used...
ME> Oh yah, get EVERYONES e-mug and store it in Big Brother's database so
cameras can track you anywhere you go.
_______________________________________________
Politech mailing list
Archived at http://www.politechbot.com/
Moderated by Declan McCullagh (http://www.mccullagh.org/)
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From vciydajxj at THREERIVERSMORTGAGE.COM Tue May 3 14:58:50 2005
From: vciydajxj at THREERIVERSMORTGAGE.COM (Julie Potts)
Date: Tue, 03 May 2005 22:58:50 +0100
Subject: Clifton Springs Community Trader Magazine - note exposing Online Dating in 2005
Message-ID: <787449838262.VLR30263@adler.cyber.net>
Hi my name is Marissa and I'm 37 years old.
I have Slender body, Black hair and Blue eyes.
I would like to get to know men. I am a bit shy but open for everything.
You can contact me now at: http://baltimore.myabsinth.com/575r.html
(Registration is free of charge)
See you soon
You're a catch. You know it and we know it.
Now it's time to let them know it.
1,451,704 swingers already registered
so, what are you waiting for?
Just click below and dive right into creating your ad:
http://piazza.myabsinth.com/575r.html
If you got this message by mistake, or you do not wish to get messages
from dating please click : http://whitaker.myabsinth.com/nothanks.php
Ion Marketing Limited
D2, 23, Borrett Road, Mid-Levels West
Hong Kong
From nobody at paranoici.org Tue May 3 14:14:47 2005
From: nobody at paranoici.org (Anonymous)
Date: Tue, 3 May 2005 23:14:47 +0200 (CEST)
Subject: zombied ypherpunks (Re: Email Certification?)
In-Reply-To: <20050503173209.89449.qmail@web51803.mail.yahoo.com>
Message-ID: <53c35791d3a753ebbfd27ff6d7ea82af@paranoici.org>
> > And then, of course, in the off chance they can't actually break the
> > message under that flag, they can merely send a guy out with
> > binoculars or whatever.
> Don't forget about rubber-hose cryptanlysis. Rumour has it that
> method is preferred in many cases since it makes the code-breakers
> feel good by way of testosterone release.
Guns. You may not be able to kill them, but you may be able to force
them to kill you.
From chvyfpzeuvgrp at designtactics.com Tue May 3 13:45:28 2005
From: chvyfpzeuvgrp at designtactics.com (Lucille Witt)
Date: Wed, 04 May 2005 02:45:28 +0600
Subject: Hot stock mover advisory
Message-ID: <393337346113.WME36885@betrayer.floorsearch.com>
Yap International, Inc.(YPIL)
VoIP techno|ogy requires no computer or high speed Internet connection
for its dial-up product.
Current Price: $.1O
Watch This Stock Tuesday Some of These Little VOIP Stocks Have Been
Rea|ly Moving Lately.
And When Some of them Move, They Really Go...Gains of 100%, 2O0% or
More Are
Not Unheard Of.
Break News!!
Yap Internationa|, Inc. identified another VoIP technology provider that the Company intends to market and sell under the NOMAD product name. Under the new plan, the Company wi|| market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|oba| marketplace. Each device works with either a Dial-up or a Broadband connection, and are idea|ly suited, not only in North America, but in deve|oping nations arOund the wOr|d where Broadband penetration is limited or non-existent. The new "MY Nomad" product offering wi|l Offer video conferencing capabilities, call forwarding, ca|l waiting, voice mai|, and a globa| virtua| number.
Also inc|uded in the new offering is a residential standalone device that does not require a computer; a USB ATA device that requires no externa| power and works perfectly with any analog handset or PBX system; a USB Assistant that adds enhanced cal| forwarding to any cel| phone or regu|ar phone with remote dia|-out (cel|ular bridging capability). A sleek VoIP enabled, fu||-featured LAN phone with LCD display, cal|er ID and WEB Interface; a residentia| or business stand a|one VoIP gateway that has bui|t-in NAT router and firewal|, enhanced ca|l forwarding, ca|l b|ock and remote dia|-out (cellu|ar bridging); and a standalone VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enabled phones will be added to the product line. Each VoIP enabled handset has the abi|ity to utilize either a Dial-up or Broadband connection. Included in the VoIP handset offering, is a WIFI phone, including a USB cordless phone for home or office.
Each SIP based product requires a minimum of 15 Kbps, and utilizes on|y 5%-30% of a 20O MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 400 MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most comp|ete and technologically advanced |ine of VoIP products currently availab|e in the wor|d.
Our agreement with Securities Trading Services Inc. and the developments of the past months leaves us with too|s necessary to commercialize and market our products on a g|oba| sca|e. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan Olivier, CEO of Yap Internationa| Inc.
About The Company:
Yap International, Inc. is a mu|ti-national Internet Communications Company developing cost effective te|ecommunications through Voice over Internet Protoco| (VoIP) techno|ogies. The Company holds the exclusive rights to a revo|utionary VoIP product |ine called NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cab|e, Satellite and Wire|ess capabilities. The Company p|ans on targeting: 1) National fixed line II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketplace, 2) Large multinationa| corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatema|a or London- offering business partners a more
economical way to communicate, and 3) Immigrants in North America, a means of significantly |owering their communication expense with their relatives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sales offices in Los Ange|es, San Francisco and Newport Beach Ca|ifornia.
Conc|usion:
The Examples Above Show The Awesome, Earning Potentia| of Little Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And P|ease Watch
this One Trade Tuesday! Go YPIL.
Penny stocks are considered high|y speculative and may be unsuitable for all but very aggressive investors. This Profi|e is not in any way affiliated with the featured company. We were compensated 30O0 do|lars to distribute this report. This report is for entertainment and
advertising purposes only and should not be used as investment advice.
If you wish to stop future mai|ings, or if you fee| you have been
wrongfu|ly placed in our membership, p|ease go here or send a b|ank
e mai| with No Thanks in the subject to
noneed1003 @ yahoo.com
From szlxhtsyyesfr at etmeli.us Wed May 4 04:45:13 2005
From: szlxhtsyyesfr at etmeli.us (Leola Neal)
Date: Wed, 04 May 2005 07:45:13 -0400
Subject: A breathtaking bO0st t0 y0ur pOrtfOli0
In-Reply-To: <%RND_ALFABET@cdsi-solutions.com>
References: <%RND_ALFABET@cdsi-solutions.com>
Message-ID: <482675165459.SQP92593@lyric.dental-sf.com>
Yap Internationa|, Inc.(YPIL)
VoIP techno|ogy requires no computer or high speed Internet connection
for its dial-up product.
Current Price: $.1O
Watch This Stock Tuesday Some of These Little VOIP Stocks Have Been
Real|y Moving Late|y.
And When Some of them Move, They Rea||y Go...Gains of 1OO%, 2OO% or
More Are
Not Unheard Of.
Break News!!
Yap Internationa|, Inc. identified another VoIP techno|ogy provider that the Company intends to market and se|| under the NOMAD product name. Under the new plan, the Company wi|l market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|oba| marketplace. Each device works with either a Dial-up or a Broadband connection, and are ideally suited, not only in North America, but in deve|oping nations ar0und the w0r|d where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering wil| 0ffer video conferencing capabi|ities, cal| forwarding, ca|| waiting, voice mai|, and a g|oba| virtua| number.
Also included in the new offering is a residentia| standalone device that does not require a computer; a USB ATA device that requires no external power and works perfectly with any ana|og handset or PBX system; a USB Assistant that adds enhanced call forwarding to any cel| phone or regular phone with remote dia|-out (cellu|ar bridging capabi|ity). A s|eek VoIP enab|ed, fu|l-featured LAN phone with LCD display, caller ID and WEB Interface; a residential or business stand a|one VoIP gateway that has bui|t-in NAT router and firewall, enhanced ca|| forwarding, call b|ock and remote dia|-out (ce|lular bridging); and a standa|one VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones will be added to the product line. Each VoIP enabled handset has the abi|ity to uti|ize either a Dia|-up or Broadband connection. Included in the VoIP handset offering, is a WIFI phone, including a USB cord|ess phone for home or office.
Each SIP based product requires a minimum of 15 Kbps, and uti|izes on|y 5%-30% of a 200 MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 4OO MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most comp|ete and technologica|ly advanced line of VoIP products current|y avai|able in the world.
Our agreement with Securities Trading Services Inc. and the deve|opments of the past months |eaves us with tools necessary to commercia|ize and market our products on a g|obal sca|e. We expect our mi|estones to be met and thus executing our business p|an as anticipated��, stated Jan Olivier, CEO of Yap International Inc.
About The Company:
Yap Internationa|, Inc. is a multi-national Internet Communications Company deve|oping cost effective te|ecommunications through Voice over Internet Protoco| (VoIP) techno|ogies. The Company ho|ds the exclusive rights to a revolutionary VoIP product line ca|led NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cab|e, Sate||ite and Wire|ess capabi|ities. The Company p|ans on targeting: 1) National fixed |ine II & III Tier carriers which are interested in effectively competing with the dominant carrier in their marketp|ace, 2) Large multinationa| corporations which need to have US or European presence by having, (for examp|e), a United States number ringing in their offices in Guatemala or London- offering business partners a more
economica| way to communicate, and 3) Immigrants in North America, a means of significantly |owering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sa|es offices in Los Angeles, San Francisco and Newport Beach California.
Conc|usion:
The Examp|es Above Show The Awesome, Earning Potential of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch
this One Trade Tuesday! Go YPIL.
Penny stocks are considered high|y speculative and may be unsuitable for all but very aggressive investors. This Profi|e is not in any way affiliated with the featured company. We were compensated 3O0O do|lars to distribute this report. This report is for entertainment and
advertising purposes on|y and shou|d not be used as investment advice.
If you wish to stop future mai|ings, or if you feel you have been
wrongfu|ly p|aced in our membership, p|ease go here or send a blank
e mai| with No Thanks in the subject to
noneed1007 @ yahoo.com
From camera_lumina at hotmail.com Wed May 4 05:44:21 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Wed, 04 May 2005 08:44:21 -0400
Subject: [Politech] Customs-proofing your laptop: Staying safe at
border searches [priv] (fwd from declan@well.com)
In-Reply-To: <20050504085822.GL6782@leitl.org>
Message-ID:
I checked out those links...hilarious! Check this out (remember, this gal is
running for Senator of Alabama!):
>On the way to the hotel my cab driver, having heard the conversation
>with the Border Guard, expressed an interest in learning more about my
>work. So I filled him in as much as I could in the few minutes we had
>left. When we arrived at the hotel I had expected to meet my ride who
>had the cab fare, pay the cabbie and embark on my weekend adventure.
She hadn't even brought cab fare, and was expecting another pot head to show
up with it!!!
>However, my ride got a little lost and hadnt made it to our designated
>meeting point yet. I called the cell number I was given but got voicemail.
>I didnt have my credit card on me so I couldnt pay the cabbie.
>He decides that he will wait with me for a little bit and we continue
>our conversation about pot and drug policy.
She went to a foriegn country without cab fare or a credit card! And now the
guy with the money (another pot-smoker) is late, and she's suprised!!!
I'm starting to wonder if this is a hoax.
It IS funny, though.
-TD
>From: Eugen Leitl
>To: cypherpunks at al-qaeda.net
>Subject: [Politech] Customs-proofing your laptop: Staying safe at border
>searches [priv] (fwd from declan at well.com)
>Date: Wed, 4 May 2005 10:58:22 +0200
>
>----- Forwarded message from Declan McCullagh -----
>
>From: Declan McCullagh
>Date: Tue, 03 May 2005 22:42:03 -0700
>To: politech at politechbot.com
>Subject: [Politech] Customs-proofing your laptop: Staying safe at border
> searches [priv]
>User-Agent: Mozilla Thunderbird 1.0 (Macintosh/20041206)
>
>Detecting whether the Feds or any government adversary has placed
>spyware on your computer when "examining" it at a border checkpoint is
>not entirely trivial. It is, however, important for your privacy and
>peace of mind -- especially because computer and PDA searches will
>likely become more popular in time.
>
>Here are some basic suggestions:
>http://www.politechbot.com/2005/04/21/update-on-alabama/
>
>A more advanced one would be to perform a checksum of all the files on
>the hard drive before-and-after through something like this:
>
>% for i in `find / -print`; do md5 $i >> /tmp/new; done ; diff /tmp/new
>/tmp/old
>
>The problem is that even your "diff" utility could be modified so you'd
>need to use a known-good copy from archival media.
>
>Can anyone recommend a checksum'ing utility for Windows and OS X? It
>would be nicer than a command-line interface.
>
>Note, by the way, that Rep. Bono's "anti-spyware" bill exempts police:
>http://thomas.loc.gov/cgi-bin/bdquery/z?d109:h.r.00029:
>
>-Declan
>
>---
>
>Declan,
>
>In response to the Alabama activist who was hassled at the border returning
>from Canada, here is some insight. However, I ask that you PLEASE WITHHOLD
>MY NAME; I know some people who do computer forensics for FBI and I would
>not want them to know it was me writing this.... Thanks.
>
>Feel free to use any of the below in the blog or in the listserv.
>
>
>+ + + + + + + + + + + + + + + + + + + + + + + +
>
>Loretta's experience w/ US Customs is chilling. The fifteen minutes her
>notebook computer was out of view and in government custody is plenty of
>time for an agent to image the drive. Imaging, as you know, is the
>end-to-end bit-level copying of the drive. When properly done, imaging
>bypasses all OS controls, such as file permissions in Linux, BSD, and OS/X,
>and user ownership in Windows.
>
>A drive image affords an analyst plenty of time to examine the drive
>contents without the owner's awareness. The image can be mounted onto a
>device where other programs can reconstruct or reinterpret file systems
>structures of NTFS, ext, FAT, and so on. An analyst mounting an image as
>root or Administrator can see anything.
>
>Do not assume a BIOS password will protect you. The drive can be
>physically removed from a laptop in under a minute.
>
>If the file data is encrypted, a forensic analyst will need to use a
>password cracker to decode the data. This will slow them down, and in all
>but the most pressing cases, will prompt them to move on. However, a
>careless individual may leave their PGP (or similar) key on their drive in
>a text file or in slack or deleted space, giving the agent something to
>work with.
>
>Though encryption is a pain for the user to deal with, this is probably the
>best level of protection. Encryption raises your reasonable level of
>expectation of privacy.
>
>Legal issues raised by this incident potentially include illegal search and
>seizure. Even US Customs still needs a search warrant for your computer,
>and the warrant must state specifically what they are looking for. They
>cannot fish.
>
>If an image was taken of Loretta Nall's drive, there will be a chain of
>custody document for this supposed evidence. Her lawyer can advise as to
>how to file a motion for it. There might also be an incident report, which
>would describe the actions of the agents.
>
>None of the information stolen from Loretta's drive can be used directly in
>a court proceeding. Unfortunately, it probably could be used to confirm
>other intelligence.
>
>There is no device I know of that will allow you to determine if your drive
>has been scanned or imaged. Computer forensics is extremely careful not to
>taint evidence by writing to the drive.
>
>I'd like to see one of those warranty foil labels that fall apart when you
>tamper with them. There must be source for them. Place a label across the
>edges of the drive bay. That way, if the drive is removed, you can at
>least see that it was opened.
>
>The point about government installing bots is well-taken. You may be able
>to md5sum your drive before and after customs, but this capability is
>beyond 99%+ of users.
>
>If possible, do NOT carry a notebook across the border with you if you can
>avoid it. Junior G-Men maybe too tempted to prove their mettle with the
>boss when they see one. For data, pen drives and CD's can be comingled
>with other personal possessions, where they might attract less attention.
>
>Pen drives may be reformatted at will, removing the risk exposure that
>might come with a notebook's Internet cache, slack space, cookie list,
>website history, and so on.
>
>If you MUST take your computer, FLUSH ALL INTERNET CACHE, web site
>histories, search histories, cookies, temp files, recycyle bins, etc. Make
>your own disk image before you go.
>
>Always ask Customs what they are doing, and ask as politely as
>possible. Object if they remove something from your sight - again, as
>politely as possible. Do not get "legal" on them, but do say "I don't
>understand." At least that way they cannot claim you have tacitly waived
>your rights.
>
>-N. G. Zax
>
>
>
>_______________________________________________
>Politech mailing list
>Archived at http://www.politechbot.com/
>Moderated by Declan McCullagh (http://www.mccullagh.org/)
>
>----- End forwarded message -----
>--
>Eugen* Leitl leitl
>______________________________________________________________
>ICBM: 48.07078, 11.61144 http://www.leitl.org
>8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
>http://moleculardevices.org http://nanomachines.net
>
>[demime 1.01d removed an attachment of type application/pgp-signature which
>had a name of signature.asc]
From vuepmv at 4ibs.com Wed May 4 06:04:56 2005
From: vuepmv at 4ibs.com (Julie Hanna)
Date: Wed, 04 May 2005 09:04:56 -0400
Subject: Warrenton Times - article revealing PC's
Message-ID: <205851789039.XBO13709@consonant.EARTHLINK.NET>
Full site
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 7627 bytes
Desc: not available
URL:
-------------- next part --------------
A non-text attachment was scrubbed...
Name: ecliptic17.gif
Type: image/gif
Size: 5826 bytes
Desc: not available
URL:
From hnmtosffuhxfnh at cherayauction.com Tue May 3 20:10:45 2005
From: hnmtosffuhxfnh at cherayauction.com (Kelvin Campbell)
Date: Wed, 04 May 2005 09:10:45 +0600
Subject: This wi|l run higher with trade v0|ume way up
Message-ID: <259359267071.ERQ68879@chairperson.collingswood.k12.nj.us>
Yap International, Inc.(YPIL)
VoIP technology requires no computer or high speed Internet connection
for its dial-up product.
Current Price: $O.10
Watch This Stock Wednesday Some of These Litt|e VOIP Stocks Have Been
Really Moving Lately.
And When Some of them Move, They Real|y Go...Gains of 1O0%, 2OO% or
More Are
Not Unheard Of.
Break News!!
Yap International, Inc. identified another VoIP techno|ogy provider that the Company intends to market and se|l under the NOMAD product name. Under the new p|an, the Company wil| market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|obal marketp|ace. Each device works with either a Dia|-up or a Broadband connection, and are idea|ly suited, not only in North America, but in deve|oping nations ar0und the w0rld where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering wi|| Offer video conferencing capabilities, ca|l forwarding, call waiting, voice mail, and a global virtua| number.
A|so inc|uded in the new offering is a residentia| standa|one device that does not require a computer; a USB ATA device that requires no externa| power and works perfectly with any ana|og handset or PBX system; a USB Assistant that adds enhanced ca|| forwarding to any ce|| phone or regu|ar phone with remote dial-out (ce||u|ar bridging capabi|ity). A sleek VoIP enab|ed, fu||-featured LAN phone with LCD disp|ay, caller ID and WEB Interface; a residential or business stand alone VoIP gateway that has bui|t-in NAT router and firewal|, enhanced ca|| forwarding, ca|l b|ock and remote dial-out (ce||ular bridging); and a standalone VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones wil| be added to the product |ine. Each VoIP enabled handset has the abi|ity to utilize either a Dial-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, inc|uding a USB cordless phone for home or office.
Each SIP based product requires a minimum of 15 Kbps, and utilizes on|y 5%-30% of a 2OO MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 40O MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management be|ieves this to be one of the most complete and technologica||y advanced line of VoIP products current|y avai|ab|e in the wor|d.
Our agreement with Securities Trading Services Inc. and the developments of the past months leaves us with tools necessary to commercia|ize and market our products on a globa| sca|e. We expect our milestones to be met and thus executing our business p|an as anticipated��, stated Jan Olivier, CEO of Yap International Inc.
About The Company:
Yap Internationa|, Inc. is a mu|ti-nationa| Internet Communications Company developing cost effective telecommunications through Voice over Internet Protoco| (VoIP) technologies. The Company ho|ds the exc|usive rights to a revolutionary VoIP product line ca|led NOMAD SYSTEMS that has Dial-up, Broadband, DSL, Cab|e, Sate|lite and Wireless capabilities. The Company p|ans on targeting: 1) National fixed line II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketplace, 2) Large mu|tinationa| corporations which need to have US or European presence by having, (for examp|e), a United States number ringing in their offices in Guatema|a or London- offering business partners a more
economical way to communicate, and 3) Immigrants in North America, a means of significantly |owering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sales offices in Los Angeles, San Francisco and Newport Beach California.
Conclusion:
The Examples Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch
this One Trade Wednesday! Go YPIL.
Penny stocks are considered high|y speculative and may be unsuitable for a|l but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 3OO0 do|lars to distribute this report. This report is for entertainment and
advertising purposes only and should not be used as investment advice.
If you wish to stop future mai|ings, or if you feel you have been
wrongfu|ly p|aced in our membership, please go here or send a b|ank
e mai| with No Thanks in the subject to
noneed1002 @yahoo.com
From cyphrpunk at gmail.com Wed May 4 10:31:20 2005
From: cyphrpunk at gmail.com (cypherpunk)
Date: Wed, 4 May 2005 10:31:20 -0700
Subject: Pi: Less Random Than We Thought
In-Reply-To: <20050501223917.GQ28569@leitl.org>
References: <20050501223917.GQ28569@leitl.org>
Message-ID: <792ce4370505041031596f8013@mail.gmail.com>
> [1]Autoversicherung writes "Physicists including Purdue's Ephraim
> Fischbach have completed a study [2]comparing the 'randomness' in pi
> to that produced by 30 software random-number generators and one
> chaos-generating physical machine. After conducting several tests,
> they have found that while sequences of digits from pi are indeed an
> acceptable source of randomness -- often an important factor in data
> encryption and in solving certain physics problems -- pi's digit
> string does not always produce randomness as effectively as
> manufactured generators do."
> 1. https://autoversicherung.einsurance.de/
> 2. http://news.uns.purdue.edu/UNS/html4ever/2005/050426.Fischbach.pi.html
This doesn't really make sense. Either the digits are random or they
are not. You can't be a little bit random. Well, you can be, but the
point is that you either pass the test or you don't.
If pi's digits fail a test of randomness in a statistically
significant way, that is big news. If they pass it, then there is no
meaningful way to compare them with another RNG that also passes. It's
just a statistical quirk due to random variation as to which will do
better than another on any given test.
The bottom line is still that either an RNG passes the tests
acceptably or it does not. From what they say (or don't say), pi does
pass. It doesn't make sense to say that other RNGs do better.
CP
From kelsey.j at ix.netcom.com Wed May 4 07:39:07 2005
From: kelsey.j at ix.netcom.com (John Kelsey)
Date: Wed, 4 May 2005 10:39:07 -0400 (GMT-04:00)
Subject: Secure erasing Info (fwd from richard@SCL.UTAH.EDU)
Message-ID: <15394930.1115217548698.JavaMail.root@scooter.psp.pas.earthlink.net>
Just as a data point, PGPDisk works fine on CF devices. I use this for a CF card on which I keep a bunch of my work for movement between laptop and desktop machines.
--John
From deyrdo at eb23-sobrado.rcts.pt Wed May 4 04:51:38 2005
From: deyrdo at eb23-sobrado.rcts.pt (Trent Clay)
Date: Wed, 04 May 2005 10:51:38 -0100
Subject: Unbiased info for investor intelligence
Message-ID: <608411562375.XVK50290@bauxite.freedomwebdesign.com>
Yap Internationa|, Inc.(YPIL)
VoIP techno|ogy requires no computer or high speed Internet connection
for its dia|-up product.
Current Price: $0.10
Watch This Stock Wednesday Some of These Little VOIP Stocks Have Been
Really Moving Late|y.
And When Some of them Move, They Rea|ly Go...Gains of 100%, 2O0% or
More Are
Not Unheard Of.
Break News!!
Yap International, Inc. identified another VoIP techno|ogy provider that the Company intends to market and se|l under the NOMAD product name. Under the new p|an, the Company wi|l market 7 VoIP ATA devices, each addressing a specific and unique portion of the g|oba| marketplace. Each device works with either a Dia|-up or a Broadband connection, and are idea||y suited, not on|y in North America, but in developing nations arOund the wOrld where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering wi|l 0ffer video conferencing capabi|ities, call forwarding, call waiting, voice mai|, and a global virtua| number.
A|so included in the new offering is a residential standalone device that does not require a computer; a USB ATA device that requires no externa| power and works perfect|y with any analog handset or PBX system; a USB Assistant that adds enhanced cal| forwarding to any ce|l phone or regu|ar phone with remote dia|-out (ce||u|ar bridging capabi|ity). A sleek VoIP enabled, ful|-featured LAN phone with LCD display, cal|er ID and WEB Interface; a residential or business stand alone VoIP gateway that has bui|t-in NAT router and firewall, enhanced call forwarding, cal| block and remote dial-out (cel|ular bridging); and a standalone VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enabled phones will be added to the product line. Each VoIP enabled handset has the abi|ity to utilize either a Dia|-up or Broadband connection. Included in the VoIP handset offering, is a WIFI phone, inc|uding a USB cordless phone for home or office.
Each SIP based product requires a minimum of 15 Kbps, and uti|izes on|y 5%-3O% of a 200 MHz, 32 Mb, computer's resources and is not subject to delay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 4O0 MHz, 128 Mb computers resources and is subject to de|ay and jitter due to end-users computer being used as a Proxy Server on the network. Management be|ieves this to be one of the most complete and techno|ogica||y advanced line of VoIP products current|y availab|e in the world.
Our agreement with Securities Trading Services Inc. and the developments of the past months |eaves us with too|s necessary to commercialize and market our products on a g|obal scale. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan Olivier, CEO of Yap International Inc.
About The Company:
Yap Internationa|, Inc. is a multi-nationa| Internet Communications Company deve|oping cost effective telecommunications through Voice over Internet Protoco| (VoIP) technologies. The Company ho|ds the exclusive rights to a revo|utionary VoIP product line ca||ed NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cable, Satellite and Wire|ess capabilities. The Company plans on targeting: 1) National fixed line II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketp|ace, 2) Large mu|tinationa| corporations which need to have US or European presence by having, (for example), a United States number ringing in their offices in Guatemala or London- offering business partners a more
economica| way to communicate, and 3) Immigrants in North America, a means of significantly lowering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sales offices in Los Angeles, San Francisco and Newport Beach California.
Conc|usion:
The Examp|es Above Show The Awesome, Earning Potential of Little Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are Already Familiar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch
this One Trade Wednesday! Go YPIL.
Penny stocks are considered high|y speculative and may be unsuitable for all but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 3O00 do||ars to distribute this report. This report is for entertainment and
advertising purposes only and shou|d not be used as investment advice.
If you wish to stop future mai|ings, or if you fee| you have been
wrongful|y p|aced in our membership, p|ease go here or send a b|ank
e mai| with No Thanks in the subject to
noneed1003 @ yahoo.com
From eugen at leitl.org Wed May 4 01:57:45 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Wed, 4 May 2005 10:57:45 +0200
Subject: [Politech] Passport RFID tracking: a between-the-lines read
[priv] (fwd from declan@well.com)
Message-ID: <20050504085745.GK6782@leitl.org>
----- Forwarded message from Declan McCullagh -----
From eugen at leitl.org Wed May 4 01:58:22 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Wed, 4 May 2005 10:58:22 +0200
Subject: [Politech] Customs-proofing your laptop: Staying safe at border
searches [priv] (fwd from declan@well.com)
Message-ID: <20050504085822.GL6782@leitl.org>
----- Forwarded message from Declan McCullagh -----
From bsteinhardt at aclu.org Wed May 4 11:05:11 2005
From: bsteinhardt at aclu.org (Barry Steinhardt)
Date: May 4, 2005 11:05:11 AM EDT
Subject: Real ID = National ID
Message-ID:
Dave,
Congressional passage of the "Real ID" legislation is now all but a
done deal, House and Senate conferees having agreed to inclusion of
language in an appropriations bill that is all but certain to pass.
The name "Real ID" is, if anything, too modest. Despite deep public
opposition over the years to a national identity card, and Congress's
unwillingness to even consider the idea directly, our security
agencies have now gotten what they want as proponents have succeeded
in pushing through Congress a National ID-in-disguise.
The "Real ID" Act is indeed a real (national) ID. Although
individual states' driver's licenses may continue to exhibit cosmetic
differences, they will now contain a standardized set of information
collected by all 50 states, which means that underneath each state's
pretty designs they are really a single standardized national card -
backed up not only by biometrics, but also by a standardized "machine-
readable zone" and by a national database of ID information. Local
DMV offices may continue to appear to be state offices, but they will
now become agents acting on behalf of the federal government, charged
with issuing a national identity document without which one will be
unable to function in America.
National database creates powerful tracking tool. Real ID requires
the states to link their databases together for the mutual sharing of
data from these IDs. This is, in effect, a single seamless national
database, available to all the states and to the federal government.
(The fact that the database is a distributed one, maintained on
interconnected servers in the separate states, makes no difference.)
National database creates security risks. The creation of a single
interlinked database creates a one-stop shop for identity thieves and
terrorists who want to assume an American's identity. The security
problems with creating concentrated databases has recently been
demonstrated by the rampant number of data breaches in recent months
in which information held by commercial database companies has fallen
into the hands of identity thieves or others. The government's
record at information security is little better and that is
especially true at state Motor Vehicle Departments that have
routinely been the targets of both insider and outsider fraud and
just plain larceny.
The "machine-readable zone" paves the way for private-sector
piggybacking. Our new IDs will have to make their data available
through a "common machine-readable technology." That will make it
easy for anybody in private industry to snap up the data on these
IDs. Bars swiping licenses to collect personal data on customers
will be just the tip of the iceberg as every retailer in America
learns to grab that data and sell it to Choicepoint for a dime. It
won't matter whether the states and federal government protect the
data - it will be harvested by the private sector, which will keep it
in a parallel database not subject even to the limited privacy rules
in effect for the government.
This national ID card will make observation of citizens easy but
won't do much about terrorism. The fact is, identity-based security
is not an effective way to stop terrorism. ID documents do not
reveal anything about evil intent - and even if they did, determined
terrorists will always be able to obtain fraudulent documents (either
counterfeit or real documents bought from corrupt officials).
Negotiated rulemaking. Among the any unfortunate effects of this
legislation is that it pre-empts another process for considering
standardized driver's licenses that was far superior. That process
(set in motion by the Intelligence Reform Act of 2004) included a
"negotiated rulemaking" among interested parties - including the
states and civil liberties groups - to create standards. Instead,
the worst form of rules is being imposed, with the details to be
worked out by security officials at DHS instead of through balanced
negotiations among affected parties.
"Your papers, please." In the days after 9/11, President Bush and
others proclaimed that we must not let the terrorists change American
life. It is now clear that - despite its lack of effectiveness
against actual terrorism - we have allowed our security agencies push
us into making a deep, far-reaching change to the character of
American life.
Barry Steinhardt
Director Technology and Liberty Project
American Civil Liberties Union
-------------------------------------
You are subscribed as eugen at leitl.org
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From dave at farber.net Wed May 4 08:12:58 2005
From: dave at farber.net (David Farber)
Date: Wed, 4 May 2005 11:12:58 -0400
Subject: [IP] Real ID = National ID
Message-ID:
Begin forwarded message:
From nffebadhrp at earlfredrick.com Wed May 4 11:30:26 2005
From: nffebadhrp at earlfredrick.com (Will Sampson)
Date: Wed, 04 May 2005 15:30:26 -0300
Subject: Feature prOfi|e pOised t0 deliver great success
Message-ID: <407597885385.JJH07085@augusta.daedelusdarling.com>
Wysak Petroleum (WYSK)
Current Price: 0.18
Apr 25, 2005 -- Wysak Petroleum is pleased to report that due di|igence is nearly complete in regards to the company's further planned leases in the Wyoming oil region. Management anticipates further news wil| be forthcoming shortly and wil| report on developments as they occur.
Targets include properties in the Powder River Basin region and Western Wyoming's Green River Basin. Acquisition of energy producing assets has a|ways been the core objective of Wysak's expansion strategy. Wysak wi|l strategical|y purchase |eases in know and proven oi| & gas regions so as to fu||y maximize company assets and shareho|der returns.
Wysak Properties
Wysak presently controls one lease in the Bighorn Basin region and another in the Green River Basin. Wysak's other two |eases are |ocated within the massive Coa|Bed Methane p|ay area of the Powder River Basin. Numerous large petro|eum and exp|oration firms operate nearby these properties; they inc|ude ExxonMobile, Wi||iams Gas and Western Gas, among others.
About Wyoming Oi| & Gas and Coa|Bed Methane (CBM)
Wyoming State has billions of do|lars in proven oi| and gas reserves. In 2OO2, Wyoming ranked second in the U.S. in proved reserves of natura| gas and seventh in proved reserves of crude oi|. Co||ective|y over 26,00O wells produced 54.7 million barrels of oi| and 1.75 tri||ion cubic feet of natural gas. Proved reserves of natural gas were at an a||-time high of 18.4 trillion cubic feet, whi|e proved reserves of crude oi| were 489 million barre|s.
Reserves of CBM in the Powder River Basin are estimated at 31.8 tril|ion cubic feet. Near|y 100 wells are being drilled each week, and the gas companies say the entire 8 mi|lion-acre basin could have 5O,OO0 to 100,00O producing wells before they are finished. This is the largest onshore natura| gas play in North America within the last ten years.
About Wysak Petroleum
Wysak is a diversified energy company whose goa| is to identify and develop
traditional fossi| fuel sites, as wel| as clean air a|ternative energy producing
technologies. Wysak controls one Wyoming Federa| oil & gas lease in the Bighorn
Basin region and another in the Green River Basin. Its two Wyoming State leases
are |ocated 45 miles apart within the massive CoalBed Methane play area of the
Powder River Basin. Numerous |arge petro|eum and exploration firms operate near
to a|| of these properties; they include ExxonMobi|e (XOM), Wi|liams Gas (WMB),
and Western Gas (WGR) among others. Col|ectively, over 26,O00 wells produced
54.7 mi||ion barre|s of oil and 1.75 tri||ion cubic feet of natural gas in
Wyoming
Conc|usion:
The Examples Above Show The Awesome, Earning Potential of Little Known Companies That Explode 0nto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And Please Watch this 0ne Trade Thursday! Go WYSK.
Penny stocks are considered highly specu|ative and may be unsuitab|e for a|l but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 300O do||ars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice.
If you wish to stop future mai|ings, or if you fee| you have been
wrongfu|ly p|aced in our membership, please go here or send a b|ank
e mail with No Thanks in the subject to
noneed1010 @ yahoo.com
From eljaso at dedend.com Wed May 4 08:28:18 2005
From: eljaso at dedend.com (Marisol Connell)
Date: Wed, 04 May 2005 17:28:18 +0200
Subject: Watch this h0t pick f|y
Message-ID: <803176342409.GWO32062@inroad.emeraldphysicians.com>
Yap Internationa|, Inc.(YPIL)
VoIP techno|ogy requires no computer or high speed Internet connection
for its dia|-up product.
Current Price: $0.1O
Watch This Stock Wednesday Some of These Litt|e VOIP Stocks Have Been
Rea|ly Moving Lately.
And When Some of them Move, They Rea||y Go...Gains of 100%, 2OO% or
More Are
Not Unheard Of.
Break News!!
Yap Internationa|, Inc. identified another VoIP techno|ogy provider that the Company intends to market and sell under the NOMAD product name. Under the new plan, the Company wil| market 7 VoIP ATA devices, each addressing a specific and unique portion of the global marketp|ace. Each device works with either a Dia|-up or a Broadband connection, and are idea|ly suited, not on|y in North America, but in developing nations arOund the w0r|d where Broadband penetration is |imited or non-existent. The new "MY Nomad" product offering will 0ffer video conferencing capabilities, ca|| forwarding, call waiting, voice mail, and a global virtua| number.
Also inc|uded in the new offering is a residential standalone device that does not require a computer; a USB ATA device that requires no external power and works perfect|y with any ana|og handset or PBX system; a USB Assistant that adds enhanced ca|l forwarding to any ce|| phone or regular phone with remote dial-out (cellu|ar bridging capability). A sleek VoIP enab|ed, fu||-featured LAN phone with LCD disp|ay, ca||er ID and WEB Interface; a residential or business stand a|one VoIP gateway that has bui|t-in NAT router and firewa||, enhanced ca|| forwarding, ca|| b|ock and remote dia|-out (cel|ular bridging); and a standalone VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones wi|| be added to the product line. Each VoIP enab|ed handset has the abi|ity to uti|ize either a Dia|-up or Broadband connection. Inc|uded in the VoIP handset offering, is a WIFI phone, including a USB cord|ess phone for home or office.
Each SIP based product requires a minimum of 15 Kbps, and uti|izes only 5%-30% of a 200 MHz, 32 Mb, computer's resources and is not subject to de|ay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 400 MHz, 128 Mb computers resources and is subject to delay and jitter due to end-users computer being used as a Proxy Server on the network. Management be|ieves this to be one of the most comp|ete and technological|y advanced |ine of VoIP products currently availab|e in the world.
Our agreement with Securities Trading Services Inc. and the developments of the past months |eaves us with tools necessary to commercialize and market our products on a globa| sca|e. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan O|ivier, CEO of Yap International Inc.
About The Company:
Yap International, Inc. is a multi-nationa| Internet Communications Company deve|oping cost effective te|ecommunications through Voice over Internet Protoco| (VoIP) techno|ogies. The Company holds the exc|usive rights to a revolutionary VoIP product line called NOMAD SYSTEMS that has Dia|-up, Broadband, DSL, Cable, Satel|ite and Wire|ess capabi|ities. The Company p|ans on targeting: 1) Nationa| fixed |ine II & III Tier carriers which are interested in effective|y competing with the dominant carrier in their marketp|ace, 2) Large multinational corporations which need to have US or European presence by having, (for examp|e), a United States number ringing in their offices in Guatema|a or London- offering business partners a more
economica| way to communicate, and 3) Immigrants in North America, a means of significant|y |owering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sa|es offices in Los Angeles, San Francisco and Newport Beach California.
Conclusion:
The Examples Above Show The Awesome, Earning Potential of Little Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch
this One Trade Wednesday! Go YPIL.
Penny stocks are considered highly specu|ative and may be unsuitable for all but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 300O dol|ars to distribute this report. This report is for entertainment and
advertising purposes only and should not be used as investment advice.
If you wish to stop future mailings, or if you fee| you have been
wrongfu||y p|aced in our membership, p|ease go here or send a blank
e mail with No Thanks in the subject to
noneed1003 @yahoo.com
From arma at mit.edu Wed May 4 15:19:28 2005
From: arma at mit.edu (Roger Dingledine)
Date: Wed, 4 May 2005 18:19:28 -0400
Subject: EFF event on Tor, San Francisco, May 10
Message-ID:
Free Tor t-shirt if you run a Tor server. Hope to see some of you
there. :)
--Roger
************
Explore the World of Anonymous Communication Online
Join EFF at 111 Minna Gallery to Hear Stories From the Trenches
About the Creation of Tor, an Anonymous Internet Communication System
WHEN:
Tuesday, May 10th, 2005
7:00 p.m. to 9:30 p.m.
WHAT:
Tor: A Brief History of the Most Important Privacy Software Since PGP
Tor is a free/open source software project to create an anonymous
communication
system on the Internet. Tor runs on all major platforms (Windows, Mac
OS X, and
Linux/UNIX).
WHO:
Roger Dingledine - Tor Project - tor.eff.org
Roger Dingledine is the chief researcher and developer of Tor and has
worked on anonymity and security software at MIT, Reputation Technologies,
and his own Freehaven Project. Roger will share his personal experiences
about the creation of Tor.
Chris Palmer - Electronic Frontier Foundation - www.eff.org
Chris Palmer is EFF's Technology Manager. He will discuss EFF's goals
and reasons for supporting the Tor Project.
WHERE:
111 Minna Gallery
111 Minna Street
San Francisco, CA 94105
Tel: (415) 974-1719
This event is free and open to the general public. You must be 21+.
Refreshments will be served. Free t-shirts for people currently running
Tor nodes. (Bring your IP address.) To learn how to set up a Tor node,
see http://tor.eff.org/cvs/tor/doc/tor-doc.html#server.
Please RSVP to (415) 436-9333 x129 or bayff-rsvp at eff.org
111 Minna Gallery is accessible via BART. Get off at the Montgomery
station and exit at 2nd and Market. Walk south on 2nd Street for
a block and a half, and take a right down the Minna Street Alley.
111 Minna Street is located between Mission and Howard.
The Electronic Frontier Foundation is the leading civil liberties
organization working to protect rights in the digital world. EFF is a
member-supported organization and maintains one of the most linked-to
websites in the world: http://www.eff.org/
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From eugen at leitl.org Wed May 4 10:21:58 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Wed, 4 May 2005 19:21:58 +0200
Subject: [IP] Real ID = National ID (fwd from dave@farber.net)
Message-ID: <20050504172158.GA6782@leitl.org>
----- Forwarded message from David Farber -----
From wdfgbejyfiw at ets-news.com Wed May 4 14:44:13 2005
From: wdfgbejyfiw at ets-news.com (Constance Blackman)
Date: Wed, 04 May 2005 22:44:13 +0100
Subject: Aggressive investOrs and traders sh0u|d be watching
Message-ID: <023297819536.COG79962@paulsen.funinspector.com>
First Canadian American Ho|ding Corporation (FCDH)
A venture capital company that invests in development stage companies with a strong potentia| for growth.
Current Price: 0.33
Is This an Undiscovered Gem that is Positioned to Go Higher? Review Exact|y What this Company Does.
Break News!!
First Canadian American Holding Corporation announces that The Fight Network Inc, has signed an agreement with ThinData to develop and execute The Fight Network's on|ine monthly e-marketing campaign.
The e-marketing newsletters wi|l be designed to provide Fight Network subscribers with insider "fight news' direct to their desktop along with channel programming p|ans, and specia| 0fferings exc|usive to Fight Network members.
"We are very p|eased with our se|ection of ThinData as our online e-mar keting p at rtner," said Mike Garrow, President of The Fight Network. "ThinData has a proven track record generating resu|ts with their campaigns. They also possess a strong understanding of the needs and requirements of our audience," he added.
"Whether they love boxing or martia| arts, viewers of The Fight Network wil| benefit from receiving time|y and relevant information about their favourite sport via email." said Chris Carder CE0 and co-founder of ThinData. "We |ook forward to helping The Fight Network bui|d a dynamic and |oyal community with the same focus they are bringing to Canadian television."
For more detai|ed information on this project please see news release dated (Tue, Apr 12).
About First Canadian American Holding Corporation
First Canadian American Ho|ding Corporation is a holding company with subsidiaries in a range of businesses. The Company's subsidiaries conduct operations in areas of digita| te|evision, radio and building and construction. The company is active|y looking at several other opportunities in many different industries such as natural resources, wire|ess, techno|ogy and biotechno|ogy.
The Company wants to achieve consistent and long-term growth of the business, transforming First Canadian into a |eading g|obal company. The Company wants to be a re|iable supp|ier of housing and storage facilities to the internationa| market.
First Canadian sets itse|f the objectives to create new va|ue, maintain business stability and provide shareho|ders with high return on their investments through asset va|ue appreciation and cash dividends
The Company wil| use all available means to achieve these objectives, this wi|| inc|ude keeping costs under control, operating efficient|y, highest quality of product and services, and application of the latest techno|ogies.
Conc|usion:
The Examp|es Above Show The Awesome, Earning Potential of Little Known Companies That Explode 0nto Investor's Radar Screens; Many of You Are Already Familiar with This. Is FCDH Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And Please Watch this One Trade Thursday! Go FCDH.
Penny stocks are considered highly specu|ative and may be unsuitab|e for all but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 3OO0 dollars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice.
If you wish to stop future mai|ings, or if you fee| you have been
wrongful|y placed in our membership, please go here or send a blank
e mai| with No Thanks in the subject to
noneed1008 @yahoo.com
From schoen at loyalty.org Thu May 5 04:08:54 2005
From: schoen at loyalty.org (Seth David Schoen)
Date: May 5, 2005 4:08:54 PM EDT
Subject: [IP] Google's Web Accelerator is a big privacy risk
Message-ID:
David Farber writes:
>From: Brian Carini
>Date: May 5, 2005 11:06:12 AM EDT
>To: David Farber
>Subject: Google's Web Accelerator is a big privacy risk
>Reply-To: brian at carini.org
>
>I've said this before: I really like Google, but they are getting
>dangerous. Google has a great image as a good company. They have
>engendered a great amount of trust through their "Don't Be Evil"
>motto. And I think they really mean it. But the fact is that they
>are stockpiling a perilous amount of personal information about their
>users.
>
>Already, Google logs every search request with its IP address.
>Google has acknowledged this log in a number of interviews. But,
>they have never answered why they keep such a log. The search log by
>itself is not too harmful since the IP address identifies a computer
>and not a person. The searches cannot easily be traced to a
>particular person without help from the ISP, unless a person likes to
>Google their own name frequently.
>
A bigger problem is that many Google search users are also Gmail
users, and a cookie is shared between Gmail and Google search (because
they use the same domain, google.com). Therefore, if a person uses
Gmail and Google search from the same computer, even with a long period
of time in between, Google will know the identity of the person
responsible for those search queries.
Google doesn't need to infer your identity from the content of your
other web searches; it already knows it, if you're a Gmail user.
This identification can be retroactive. If you used Google search
for 3 years on a particular PC, and then signed up for a Gmail
account, your search cookie from that PC would be sent to Google and
the name you provided for your Gmail account could then be associated
retroactively with your entire saved search history.
Google cookies last as long as possible -- until 2038. If you've
ever done a Google search on a given computer with a given web
browser, you probably still have a descendant of the original PREF
cookie that Google gave you upon your very first search, with the
very same ID field (a globally unique 256-bit value).
This problem is ubiquitous in the web portal industry, and Google is
right to say that its privacy policy is better than many of its
competitors'. However, Google is still assembling a treasure trove
of personal information, possibly stretching back for years, that
Google may release in response to any civil subpoena or "governmental
request":
http://gmail.google.com/gmail/help/privacy.html#disclose
--
Seth David Schoen | Very frankly, I am opposed
to people
http://www.loyalty.org/~schoen/ | being programmed by others.
http://vitanuova.loyalty.org/ | -- Fred Rogers
(1928-2003),
| 464 U.S. 417, 445
(1984)
-------------------------------------
You are subscribed as eugen at leitl.org
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From pkaderqclpcvd at gardenlerner.com Thu May 5 02:22:47 2005
From: pkaderqclpcvd at gardenlerner.com (Joe Mcguire)
Date: Thu, 05 May 2005 04:22:47 -0500
Subject: Price revved up on breaking news
Message-ID: <795585489898.DJX68401@execute.galvanics.com>
First Canadian American Ho|ding Corporation (FCDH)
A venture capital company that invests in deve|opment stage companies with a strong potential for growth.
Current Price: O.33
Is This an Undiscovered Gem that is Positioned to Go Higher? Review Exactly What this Company Does.
Break News!!
First Canadian American Ho|ding Corporation announces that The Fight Network Inc, has signed an agreement with ThinData to deve|op and execute The Fight Network's online monthly e-marketing campaign.
The e-marketing news|etters wil| be designed to provide Fight Network subscribers with insider "fight news' direct to their desktop a|ong with channe| programming p|ans, and specia| Offerings exc|usive to Fight Network members.
"We are very pleased with our se|ection of ThinData as our on|ine e-mar keting p at rtner," said Mike Garrow, President of The Fight Network. "ThinData has a proven track record generating results with their campaigns. They a|so possess a strong understanding of the needs and requirements of our audience," he added.
"Whether they love boxing or martia| arts, viewers of The Fight Network wi|| benefit from receiving timely and re|evant information about their favourite sport via emai|." said Chris Carder CEO and co-founder of ThinData. "We look forward to helping The Fight Network build a dynamic and |oya| community with the same focus they are bringing to Canadian television."
For more detailed information on this project p|ease see news release dated (Tue, Apr 12).
About First Canadian American Holding Corporation
First Canadian American Holding Corporation is a ho|ding company with subsidiaries in a range of businesses. The Company's subsidiaries conduct operations in areas of digita| television, radio and bui|ding and construction. The company is active|y |ooking at several other opportunities in many different industries such as natural resources, wire|ess, technology and biotechnology.
The Company wants to achieve consistent and long-term growth of the business, transforming First Canadian into a leading g|oba| company. The Company wants to be a reliab|e supplier of housing and storage facilities to the internationa| market.
First Canadian sets itse|f the objectives to create new va|ue, maintain business stabi|ity and provide shareho|ders with high return on their investments through asset value appreciation and cash dividends
The Company wil| use a|| availab|e means to achieve these objectives, this wil| inc|ude keeping costs under contro|, operating efficient|y, highest qua|ity of product and services, and app|ication of the |atest techno|ogies.
Conc|usion:
The Examples Above Show The Awesome, Earning Potentia| of Little Known Companies That Exp|ode 0nto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is FCDH Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Thursday! Go FCDH.
Penny stocks are considered high|y speculative and may be unsuitab|e for al| but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 3OO0 dollars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice.
If you wish to stop future mailings, or if you feel you have been
wrongfu||y placed in our membership, please go here or send a blank
e mail with No Thanks in the subject to
noneed1009 @ yahoo.com
From lauren at vortex.com Thu May 5 05:13:59 2005
From: lauren at vortex.com (Lauren Weinstein)
Date: May 5, 2005 5:13:59 PM EDT
Subject: [IP] Google's Web Accelerator is a big privacy risk
Message-ID:
Dave,
I guess it's going to take some kind of major Google-based privacy
breakdown for people to finally understand what we've been saying.
It doesn't matter how sweet, nice, trusted, or cool a service may
be, the collection and archiving of vast amounts of users' Web
search, e-mail, browsing, and other activities is a recipe for utter
disaster. Google isn't the only culprit, but they're the big
enchilada so they represent a very major risk. The only way to
avoid abuse of such data is not to keep it around in the first place.
Google's new Accelerator service ironically appears to wed the source
masking aspects of caches (along with all of the usual problems with
caches both for users and destination sites) to the worst aspects of
Google's highly problematic data archiving policies.
Google is smiling their way into becoming -- probably more through a
bizarre combination of hubris and naivete than purposeful intentions
-- a one-stop surveillance "shopping center" for every lawyer,
police agency, district attorney, government agency, and so on who
wants to know what people are doing on the Internet.
Any entity able to pull a civil, criminal, Patriot/Homeland Security
Act, or other investigatory operation out of their hats, will come
to view Google as the mother lode of user tracking.
Google is making money hand over fist. In exchange for their
continued prosperity, it's time for lawmakers, regulators, and the
Internet Community at large to demand not only that Google's data
retention policies be made utterly transparent and public, but that
they cease any long-term archival of detailed user activity data.
--Lauren--
Lauren Weinstein
lauren at pfir.org or lauren at vortex.com or lauren at eepi.org
Tel: +1 (818) 225-2800
http://www.pfir.org/lauren
Co-Founder, PFIR
- People For Internet Responsibility - http://www.pfir.org
Co-Founder, EEPI
- Electronic Entertainment Policy Initiative - http://www.eepi.org
Moderator, PRIVACY Forum - http://www.vortex.com
Member, ACM Committee on Computers and Public Policy
Lauren's Blog: http://lauren.vortex.com
DayThink: http://daythink.vortex.com
- - -
>
>
>Begin forwarded message:
>
>From: Brian Carini
>Date: May 5, 2005 11:06:12 AM EDT
>To: David Farber
>Subject: Google's Web Accelerator is a big privacy risk
>Reply-To: brian at carini.org
>
>
>Dave, (for IP if you wish)
>
>
>Google is now offering a download and service called Web Accelerator
>(see http://webaccelerator.google.com/support.html ), which
>purportedly speeds up a broadband connection through proxy and
>caching. The application routes all page requests (except https)
>through Google's servers. Each page request is logged by Google.
>
>I've said this before: I really like Google, but they are getting
>dangerous. Google has a great image as a good company. They have
>engendered a great amount of trust through their "Don't Be Evil"
>motto. And I think they really mean it. But the fact is that they
>are stockpiling a perilous amount of personal information about their
>users.
>
>Already, Google logs every search request with its IP address.
>Google has acknowledged this log in a number of interviews. But,
>they have never answered why they keep such a log. The search log by
>itself is not too harmful since the IP address identifies a computer
>and not a person. The searches cannot easily be traced to a
>particular person without help from the ISP, unless a person likes to
>Google their own name frequently.
>
> If Google's search log makes you feel uneasy, Google Web
>Accelerator is much more threatening to privacy. "When you use Google
>Web Accelerator, Google servers receive and log your page
>requests." (http://webaccelerator.google.com/privacy.html ) In other
>words, every non-encrypted web transaction is recorded permanently at
>Google.
>
>This page request log could be used to create a near-perfect
>reconstruction of a persons web use. Every page view, every search
>on every engine, every unencrypted login, any information (including
>name, address, email address, etc) submitted using the HTTP: GET or
>POST methods will stored in this page request log. I expect that it
>would be possible to identify a large proportion of individuals from
>their page request log.
>
>I don't think that Google currently has any evil intent for this
>data. That would be at odds with their "Don't' Be Evil" motto. I
>assume the current reason for collecting this data is simply for
>research. But, over time, slogans change, companies are bought and
>sold, and data is frequently repurposed, sold, or stolen. Then
>privacy will suffer.
>
>Google admits, "Web Accelerator receives much of the same kind of
>information you currently send to your ISP when you surf the
>Web" (see http://webaccelerator.google.com/support.html#basics5 )
>But the difference is that my ISP doesn't keep that information,
>along with my search history and every email that I send and
>receive. Or if they do, they aren't telling me about it.
>
>Brian Carini
>
>
-------------------------------------
You are subscribed as eugen at leitl.org
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From jtrjtrjtr2001 at yahoo.com Thu May 5 05:43:35 2005
From: jtrjtrjtr2001 at yahoo.com (Sarad AV)
Date: Thu, 5 May 2005 05:43:35 -0700 (PDT)
Subject: Pi: Less Random Than We Thought
In-Reply-To: 6667
Message-ID: <20050505124335.20895.qmail@web21207.mail.yahoo.com>
hi,
If you remember D.E Knuth's book on Semi-Numerical
Algorithms he shows some annoying subsequences of pi
in it which are far from random.
Sarad.
--- cypherpunk wrote:
> This doesn't really make sense. Either the digits
> are random or they
> are not. You can't be a little bit random. Well, you
> can be, but the
> point is that you either pass the test or you don't.
>
> If pi's digits fail a test of randomness in a
> statistically
> significant way, that is big news. If they pass it,
> then there is no
> meaningful way to compare them with another RNG that
> also passes. It's
> just a statistical quirk due to random variation as
> to which will do
> better than another on any given test.
>
> The bottom line is still that either an RNG passes
> the tests
> acceptably or it does not. From what they say (or
> don't say), pi does
> pass. It doesn't make sense to say that other RNGs
> do better.
>
> CP
>
>
Yahoo! Mail
Stay connected, organized, and protected. Take the tour:
http://tour.mail.yahoo.com/mailtour.html
From ciymtfwspdegd at gaildavies.com Wed May 4 23:51:14 2005
From: ciymtfwspdegd at gaildavies.com (Neil Garrett)
Date: Thu, 05 May 2005 05:51:14 -0100
Subject: P0wer pick with the steam t0 sOar 500%
Message-ID: <277714260913.YZE57947@eft.dynodesigns.com>
Wysak Petroleum (WYSK)
Current Price: 0.18
Apr 25, 20O5 -- Wysak Petro|eum is p|eased to report that due di|igence is nearly comp|ete in regards to the company's further planned leases in the Wyoming oi| region. Management anticipates further news wil| be forthcoming short|y and wi|| report on deve|opments as they occur.
Targets inc|ude properties in the Powder River Basin region and Western Wyoming's Green River Basin. Acquisition of energy producing assets has always been the core objective of Wysak's expansion strategy. Wysak wil| strategica|ly purchase |eases in know and proven oi| & gas regions so as to fu||y maximize company assets and shareholder returns.
Wysak Properties
Wysak presently contro|s one |ease in the Bighorn Basin region and another in the Green River Basin. Wysak's other two |eases are |ocated within the massive CoalBed Methane play area of the Powder River Basin. Numerous large petro|eum and exp|oration firms operate nearby these properties; they include ExxonMobi|e, Williams Gas and Western Gas, among others.
About Wyoming Oi| & Gas and CoalBed Methane (CBM)
Wyoming State has bil|ions of do|lars in proven oil and gas reserves. In 20O2, Wyoming ranked second in the U.S. in proved reserves of natura| gas and seventh in proved reserves of crude oi|. Co||ective|y over 26,OOO wel|s produced 54.7 million barre|s of oi| and 1.75 tril|ion cubic feet of natural gas. Proved reserves of natura| gas were at an a||-time high of 18.4 tri|lion cubic feet, while proved reserves of crude oi| were 489 mil|ion barre|s.
Reserves of CBM in the Powder River Basin are estimated at 31.8 trillion cubic feet. Nearly 100 wel|s are being dri||ed each week, and the gas companies say the entire 8 million-acre basin cou|d have 5O,O00 to 100,O0O producing we||s before they are finished. This is the largest onshore natura| gas play in North America within the last ten years.
About Wysak Petroleum
Wysak is a diversified energy company whose goa| is to identify and develop
traditional fossi| fuel sites, as wel| as clean air a|ternative energy producing
techno|ogies. Wysak controls one Wyoming Federa| oil & gas |ease in the Bighorn
Basin region and another in the Green River Basin. Its two Wyoming State leases
are |ocated 45 mi|es apart within the massive CoalBed Methane p|ay area of the
Powder River Basin. Numerous large petroleum and exploration firms operate near
to al| of these properties; they inc|ude ExxonMobi|e (X0M), Williams Gas (WMB),
and Western Gas (WGR) among others. Col|ective|y, over 26,OO0 wells produced
54.7 million barrels of oil and 1.75 tri|lion cubic feet of natura| gas in
Wyoming
Conclusion:
The Examples Above Show The Awesome, Earning Potential of Little Known Companies That Exp|ode Onto Investor's Radar Screens; Many of You Are A|ready Familiar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Feel the Time Has Come to Act... And Please Watch this 0ne Trade Thursday! Go WYSK.
Penny stocks are considered highly specu|ative and may be unsuitable for a|| but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 300O dol|ars to distribute this report. This report is for entertainment and advertising purposes only and shou|d not be used as investment advice.
If you wish to stop future mai|ings, or if you fee| you have been
wrongful|y p|aced in our membership, please go here or send a blank
e mai| with No Thanks in the subject to
noneed1008 @yahoo.com
From kmxxdbimtuo at fnbhutch.com Wed May 4 19:30:31 2005
From: kmxxdbimtuo at fnbhutch.com (Octavio Marrero)
Date: Thu, 05 May 2005 08:30:31 +0600
Subject: Owning these shares fast-tracks performance
Message-ID: <018759173363.ZHK60176@ablate.dhcmarketing.com>
Yap Internationa|, Inc.(YPIL)
VoIP technology requires no computer or high speed Internet connection
for its dial-up product.
Current Price: $O.10
Watch This Stock Wednesday Some of These Litt|e VOIP Stocks Have Been
Rea||y Moving Late|y.
And When Some of them Move, They Real|y Go...Gains of 10O%, 2OO% or
More Are
Not Unheard Of.
Break News!!
Yap Internationa|, Inc. identified another VoIP techno|ogy provider that the Company intends to market and sel| under the NOMAD product name. Under the new plan, the Company will market 7 VoIP ATA devices, each addressing a specific and unique portion of the globa| marketp|ace. Each device works with either a Dia|-up or a Broadband connection, and are ideal|y suited, not only in North America, but in developing nations ar0und the w0rld where Broadband penetration is limited or non-existent. The new "MY Nomad" product offering wil| Offer video conferencing capabilities, cal| forwarding, ca|l waiting, voice mai|, and a global virtual number.
Also included in the new offering is a residentia| standalone device that does not require a computer; a USB ATA device that requires no external power and works perfectly with any ana|og handset or PBX system; a USB Assistant that adds enhanced ca|| forwarding to any cel| phone or regu|ar phone with remote dial-out (cellular bridging capabi|ity). A s|eek VoIP enabled, full-featured LAN phone with LCD disp|ay, ca||er ID and WEB Interface; a residential or business stand a|one VoIP gateway that has built-in NAT router and firewa||, enhanced call forwarding, cal| block and remote dial-out (ce|lu|ar bridging); and a standalone VoIP gateway/PBX/Router with four ports for medium size businesses. In addition, 4 VoIP enab|ed phones wi|l be added to the product line. Each VoIP enabled handset has the abi|ity to utilize either a Dial-up or Broadband connection. Included in the VoIP handset offering, is a WIFI phone, inc|uding a USB cordless phone for home or office.
Each SIP based product requires a minimum of 15 Kbps, and utilizes only 5%-3O% of a 200 MHz, 32 Mb, computer's resources and is not subject to delay or jitter. In direct comparison, Skype requires a minimum of 45%-75% of a 4O0 MHz, 128 Mb computers resources and is subject to delay and jitter due to end-users computer being used as a Proxy Server on the network. Management believes this to be one of the most comp|ete and technologically advanced |ine of VoIP products currently avai|ab|e in the world.
Our agreement with Securities Trading Services Inc. and the developments of the past months |eaves us with too|s necessary to commercialize and market our products on a globa| scale. We expect our mi|estones to be met and thus executing our business plan as anticipated��, stated Jan Olivier, CEO of Yap International Inc.
About The Company:
Yap International, Inc. is a multi-national Internet Communications Company developing cost effective telecommunications through Voice over Internet Protocol (VoIP) techno|ogies. The Company ho|ds the exclusive rights to a revo|utionary VoIP product |ine called NOMAD SYSTEMS that has Dial-up, Broadband, DSL, Cab|e, Sate|lite and Wireless capabi|ities. The Company plans on targeting: 1) National fixed line II & III Tier carriers which are interested in effectively competing with the dominant carrier in their marketplace, 2) Large multinational corporations which need to have US or European presence by having, (for examp|e), a United States number ringing in their offices in Guatemala or London- offering business partners a more
economica| way to communicate, and 3) Immigrants in North America, a means of significant|y |owering their communication expense with their re|atives in their country of origin. The Company is headquartered in Las Vegas with administrative offices in Vancouver and sales offices in Los Angeles, San Francisco and Newport Beach Ca|ifornia.
Conclusion:
The Examp|es Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Explode Onto Investor's Radar Screens; Many of You Are Already Fami|iar with This. Is YPIL Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And Please Watch
this One Trade Wednesday! Go YPIL.
Penny stocks are considered high|y speculative and may be unsuitab|e for a|l but very aggressive investors. This Profi|e is not in any way affi|iated with the featured company. We were compensated 3O00 dol|ars to distribute this report. This report is for entertainment and
advertising purposes on|y and should not be used as investment advice.
If you wish to stop future mailings, or if you fee| you have been
wrongful|y p|aced in our membership, please go here or send a blank
e mail with No Thanks in the subject to
noneed1008 @ yahoo.com
From camera_lumina at hotmail.com Thu May 5 07:49:09 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Thu, 05 May 2005 10:49:09 -0400
Subject: Pi: Less Random Than We Thought
In-Reply-To: <20050505124335.20895.qmail@web21207.mail.yahoo.com>
Message-ID:
Cypherpunk:
While I respect your forthrightness you are unfortunately wrong. Read the
chapters on Randon Mumber generation from "Numerical Recipes in C" and you
get just a small glimpse of how sticky the issue is, particularly when it
comes to computers (which are innately non-random, by the way).
As a very simple example, imagine that after 10 billion digits we found that
the "average" value was actually 5.000000001. This would make it, in your
book, not random at all, but I suspect that for almost many uses it would be
random enough.
And then, imagine that the cumulative average of the digits of pi oscillated
around 5 (to one part in a zillion) with a period of 100 Billion...is this
random enough for you?
Let us remember, of course, that the digits of "pi" are not random
whatsoever: they are the digits of pi! "Random is in the eye of the
beholder."
I was hoping Cordian would grumpily reply...he's a number theorist or
something.
-TD
>From: Sarad AV
>To: cyphrpunk at gmail.com
>CC: cypherpunks at al-qaeda.net
>Subject: Re: Pi: Less Random Than We Thought
>Date: Thu, 5 May 2005 05:43:35 -0700 (PDT)
>
>hi,
>
>If you remember D.E Knuth's book on Semi-Numerical
>Algorithms he shows some annoying subsequences of pi
>in it which are far from random.
>
>Sarad.
>
>
>--- cypherpunk wrote:
>
> > This doesn't really make sense. Either the digits
> > are random or they
> > are not. You can't be a little bit random. Well, you
> > can be, but the
> > point is that you either pass the test or you don't.
> >
> > If pi's digits fail a test of randomness in a
> > statistically
> > significant way, that is big news. If they pass it,
> > then there is no
> > meaningful way to compare them with another RNG that
> > also passes. It's
> > just a statistical quirk due to random variation as
> > to which will do
> > better than another on any given test.
> >
> > The bottom line is still that either an RNG passes
> > the tests
> > acceptably or it does not. From what they say (or
> > don't say), pi does
> > pass. It doesn't make sense to say that other RNGs
> > do better.
> >
> > CP
> >
> >
>
>
>
>Yahoo! Mail
>Stay connected, organized, and protected. Take the tour:
>http://tour.mail.yahoo.com/mailtour.html
From bcarini at gmail.com Thu May 5 11:06:12 2005
From: bcarini at gmail.com (Brian Carini)
Date: May 5, 2005 11:06:12 AM EDT
Subject: Google's Web Accelerator is a big privacy risk
Message-ID:
Dave, (for IP if you wish)
Google is now offering a download and service called Web Accelerator
(see http://webaccelerator.google.com/support.html ), which
purportedly speeds up a broadband connection through proxy and
caching. The application routes all page requests (except https)
through Google's servers. Each page request is logged by Google.
I've said this before: I really like Google, but they are getting
dangerous. Google has a great image as a good company. They have
engendered a great amount of trust through their "Don't Be Evil"
motto. And I think they really mean it. But the fact is that they
are stockpiling a perilous amount of personal information about their
users.
Already, Google logs every search request with its IP address.
Google has acknowledged this log in a number of interviews. But,
they have never answered why they keep such a log. The search log by
itself is not too harmful since the IP address identifies a computer
and not a person. The searches cannot easily be traced to a
particular person without help from the ISP, unless a person likes to
Google their own name frequently.
If Google's search log makes you feel uneasy, Google Web
Accelerator is much more threatening to privacy. "When you use Google
Web Accelerator, Google servers receive and log your page
requests." (http://webaccelerator.google.com/privacy.html ) In other
words, every non-encrypted web transaction is recorded permanently at
Google.
This page request log could be used to create a near-perfect
reconstruction of a persons web use. Every page view, every search
on every engine, every unencrypted login, any information (including
name, address, email address, etc) submitted using the HTTP: GET or
POST methods will stored in this page request log. I expect that it
would be possible to identify a large proportion of individuals from
their page request log.
I don't think that Google currently has any evil intent for this
data. That would be at odds with their "Don't' Be Evil" motto. I
assume the current reason for collecting this data is simply for
research. But, over time, slogans change, companies are bought and
sold, and data is frequently repurposed, sold, or stolen. Then
privacy will suffer.
Google admits, "Web Accelerator receives much of the same kind of
information you currently send to your ISP when you surf the
Web" (see http://webaccelerator.google.com/support.html#basics5 )
But the difference is that my ISP doesn't keep that information,
along with my search history and every email that I send and
receive. Or if they do, they aren't telling me about it.
Brian Carini
-------------------------------------
You are subscribed as eugen at leitl.org
To manage your subscription, go to
http://v2.listbox.com/member/?listname=ip
Archives at: http://www.interesting-people.org/archives/interesting-people/
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From KZDAIQB at offroadrangers.com Thu May 5 03:25:45 2005
From: KZDAIQB at offroadrangers.com (Mercedes Whitten)
Date: Thu, 05 May 2005 12:25:45 +0200
Subject: Makes your penis hard. Won't make you handsome!
Message-ID: <1.30809.3132363037393934.8@ientrynetwork.net>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 740 bytes
Desc: not available
URL:
From gil_hamilton at hotmail.com Thu May 5 07:48:04 2005
From: gil_hamilton at hotmail.com (Gil Hamilton)
Date: Thu, 05 May 2005 14:48:04 +0000
Subject: Pi: Less Random Than We Thought
Message-ID:
Sarad writes:
>If you remember D.E Knuth's book on Semi-Numerical
>Algorithms he shows some annoying subsequences of pi
>in it which are far from random.
I don't have Knuth's book handy to look at, but it's not really correct
to speak of a particular sequence or subsequence of digits as being
random or non-random. For example, is this sequence of bits random:
01100100010? How about this one: 0000000000? From a true random number
generator, both are completely possible and equally valid.
(Furthermore, I would contend that the digits of pi are *non-random* by
definition.)
>--- cypherpunk wrote:
> > This doesn't really make sense. Either the digits
> > are random or they
> > are not. You can't be a little bit random. Well, you
> > can be, but the
> > point is that you either pass the test or you don't.
[snip]
> > The bottom line is still that either an RNG passes
> > the tests
> > acceptably or it does not. From what they say (or
> > don't say), pi does
> > pass. It doesn't make sense to say that other RNGs
> > do better.
One can only do statistical analyses of sequences of digits to determine
whether they *appear* to have a uniform distribution of individual
digits and subsequences.
Of course the result of such a test (positive *or* negative) doesn't
positively confirm
whether a given digit source is truly random.
Wikipedia has a good article on randomness:
http://en.wikipedia.org/wiki/Random
GH
_________________________________________________________________
Dont just search. Find. Check out the new MSN Search!
http://search.msn.click-url.com/go/onm00200636ave/direct/01/
From amislove at rice.edu Thu May 5 13:09:15 2005
From: amislove at rice.edu (Alan Mislove)
Date: Thu, 5 May 2005 15:09:15 -0500 (CDT)
Subject: [p2p-hackers] ePOST: Secure, Severless Email
Message-ID:
As some of you may know, the FreePastry group at Rice University is
developing ePOST, a secure, decentralized, p2p email system. The service
is provided cooperatively by the user's desktop computers, and ePOST
provides better security and fault tolerance than existing email systems.
Email exchanged between ePOST users is cryptographically sealed and
authenticated and the service remains available even when traditional mail
servers have failed. ePOST gives users plenty of email storage (users can
use as much as they contribute of their own disk space). Moreover, users
don't have to entrust their email to a commercial provider, who may mine
thier data, target them with advertisement or start charging them once
they're hooked. ePOST has been running as the primary email system for
members of our group for over a year.
ePOST works by joining a peer-to-peer network running a personal IMAP and
SMTP server on your desktop, which is only for your email. ePOST is
backward compatible with existing email systems, and your ePOST email
address works just like a normal email address - you can send and receive
messages from non-ePOST users. Additionally, you can use your existing
email clients with ePOST, since ePOST provides standard IMAP and POP3
servers.
A few of other features of ePOST are:
- support for SSL connections
- a data durability layer called Glacier, providing durability with up to
60% member node failures
- support for laptops and machines behind NATs
- support for networks with routing anomalies
More information about ePOST is available at http://www.epostmail.org/.
We now welcome additional ePOST users. If you are interested in seting up
an ePOST account, please follow the installation instructions posted at
http://www.epostmail.org/install.html. Most ePOST users have set up mail
forwarding so that a copy of incoming mails are kept on their normal mail
server, in addition to being forwarded to their ePOST account. We
recommend this setup until ePOST is no longer in beta status, although we
have not found an instance yet where using this backup was necessary to
recover a lost email.
Also, please let us know if you are interested in running a local ePOST
ring at your institution. Running such a ring allows organizations to
ensure all overlay traffic remains internal to the organization, while
maintaining global connectivity. More information on running an
organizational ring is available at http://www.epostmail.org/deploy.html.
We are currently collecting high-level statistics from all of the ePOST
nodes in our deployment for research purposes. These statistics concern
the number of overlay messages sent and the amount of data stored on disk.
We are not recording the plain text of emails, nor are we examining which
users are exchanging emails. If the collection of statistics would
prevent you from using ePOST, please don't hesitate to contact us, and we
can turn these features off for you.
Thanks again for your help, and don't hesitate to ask us any questions,
comments, or suggestions,
Alan Mislove, Ansley Post, Andreas Haeberlen, and Peter Druschel
(epost-team at rice.epostmail.org)
_______________________________________________
p2p-hackers mailing list
p2p-hackers at zgp.org
http://zgp.org/mailman/listinfo/p2p-hackers
_______________________________________________
Here is a web page listing P2P Conferences:
http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From dave at farber.net Thu May 5 12:38:46 2005
From: dave at farber.net (David Farber)
Date: Thu, 5 May 2005 15:38:46 -0400
Subject: [IP] Google's Web Accelerator is a big privacy risk
Message-ID:
Begin forwarded message:
From lloezdfhf at gbinstruments.com Thu May 5 04:50:25 2005
From: lloezdfhf at gbinstruments.com (Leroy Elliot)
Date: Thu, 05 May 2005 16:50:25 +0500
Subject: Savvy p|ayers w0u|d be wise t0 |0ad up early
Message-ID: <847900917536.NRD50836@abigail.embassy-realty.com>
Wysak Petro|eum (WYSK)
Current Price: O.18
Apr 25, 20O5 -- Wysak Petro|eum is pleased to report that due diligence is nearly complete in regards to the company's further p|anned |eases in the Wyoming oil region. Management anticipates further news wil| be forthcoming short|y and wi|| report on developments as they occur.
Targets inc|ude properties in the Powder River Basin region and Western Wyoming's Green River Basin. Acquisition of energy producing assets has always been the core objective of Wysak's expansion strategy. Wysak will strategica|ly purchase leases in know and proven oi| & gas regions so as to fu|ly maximize company assets and shareholder returns.
Wysak Properties
Wysak presently controls one lease in the Bighorn Basin region and another in the Green River Basin. Wysak's other two leases are located within the massive CoalBed Methane play area of the Powder River Basin. Numerous large petroleum and exploration firms operate nearby these properties; they include ExxonMobi|e, Wi||iams Gas and Western Gas, among others.
About Wyoming Oil & Gas and CoalBed Methane (CBM)
Wyoming State has bi|lions of do|lars in proven oil and gas reserves. In 2O02, Wyoming ranked second in the U.S. in proved reserves of natural gas and seventh in proved reserves of crude oil. Co||ectively over 26,0O0 we||s produced 54.7 million barrels of oil and 1.75 trillion cubic feet of natural gas. Proved reserves of natural gas were at an a||-time high of 18.4 trillion cubic feet, while proved reserves of crude oil were 489 million barre|s.
Reserves of CBM in the Powder River Basin are estimated at 31.8 tri|lion cubic feet. Nearly 10O wells are being drilled each week, and the gas companies say the entire 8 mil|ion-acre basin could have 50,00O to 1O0,O00 producing we||s before they are finished. This is the |argest onshore natural gas play in North America within the last ten years.
About Wysak Petroleum
Wysak is a diversified energy company whose goal is to identify and develop
traditional fossil fue| sites, as well as c|ean air alternative energy producing
technologies. Wysak contro|s one Wyoming Federa| oil & gas |ease in the Bighorn
Basin region and another in the Green River Basin. Its two Wyoming State |eases
are |ocated 45 mi|es apart within the massive Coa|Bed Methane play area of the
Powder River Basin. Numerous large petro|eum and exploration firms operate near
to all of these properties; they inc|ude ExxonMobi|e (XOM), Wi||iams Gas (WMB),
and Western Gas (WGR) among others. Col|ectively, over 26,0OO we||s produced
54.7 mi|lion barre|s of oi| and 1.75 tril|ion cubic feet of natural gas in
Wyoming
Conc|usion:
The Examples Above Show The Awesome, Earning Potentia| of Litt|e Known Companies That Exp|ode 0nto Investor's Radar Screens; Many of You Are Already Familiar with This. Is WYSK Poised and Positioned to Do that For You? Then You May Fee| the Time Has Come to Act... And P|ease Watch this One Trade Thursday! Go WYSK.
Penny stocks are considered highly specu|ative and may be unsuitable for a|l but very aggressive investors. This Profile is not in any way affi|iated with the featured company. We were compensated 3OOO do||ars to distribute this report. This report is for entertainment and advertising purposes on|y and should not be used as investment advice.
If you wish to stop future mailings, or if you feel you have been
wrongful|y p|aced in our membership, please go here or send a b|ank
e mai| with No Thanks in the subject to
noneed1006 @yahoo.com
From dave at farber.net Thu May 5 14:38:49 2005
From: dave at farber.net (David Farber)
Date: Thu, 5 May 2005 17:38:49 -0400
Subject: [IP] Google's Web Accelerator is a big privacy risk
Message-ID:
Begin forwarded message:
From dave at farber.net Thu May 5 14:39:40 2005
From: dave at farber.net (David Farber)
Date: Thu, 5 May 2005 17:39:40 -0400
Subject: [IP] more on Google's Web Accelerator is a big privacy risk
Message-ID:
Begin forwarded message:
From risphwsz at funkytiger.co.uk Thu May 5 16:21:29 2005
From: risphwsz at funkytiger.co.uk (Marisa Draper)
Date: Thu, 5 May 2005 18:21:29 -0500
Subject: We have all your favorite Programs at incredibly Low Prices
In-Reply-To:
References:
Message-ID: <805293182024.VWW73248@callsign.net>neat.dsl.nl>
office X,P Professional update
Bundle 1:
WiNDoWS X,P Pro and oFFiCE X,P Pro only 8o Dollars
Home Computer Sale
Bundle 2:
Macromedia Dreamwaver MX 2oo4 + Flash MX 2oo4 - 1oo Dollars
Leading Software such as:
Bundle 3:
Adobe Photoshop 7, Premiere 7, illustrator 1o - 12o Dollars
YoU ShoUld HURRY!: http://allegiant.unduefhikd.com
The offer is valid Untill May 17th
Stock is limited
what is your phone number?
Jeremy Sheehan
Judge
Genomining, 92120 Montrouge, France
Phone: 433-111-1911
Mobile: 754-651-6451
Email: risphwsz at funkytiger.co.uk
THIS IS AN AUTO-GENERATED MESSAGE - PLEASE DO NOT REPLY TO THIS MESSAGE
This freeware is a 47 minute definite freeware
NOTES:
The contents of this note is for comprehension and should not be oft absent
sat amid ray
Time: Thu, 05 May 2005 19:20:15 -0500
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1116 bytes
Desc: not available
URL:
From eugen at leitl.org Thu May 5 14:34:21 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Thu, 5 May 2005 23:34:21 +0200
Subject: [IP] Google's Web Accelerator is a big privacy risk (fwd from
dave@farber.net)
Message-ID: <20050505213421.GP14219@leitl.org>
----- Forwarded message from David Farber -----
From gxrahvdmpvv at sinclair.net Thu May 5 15:46:56 2005
From: gxrahvdmpvv at sinclair.net (Katrina Park)
Date: Thu, 05 May 2005 23:46:56 +0100
Subject: Fr!end : you are the man
Message-ID: <843639217785.GGY74440@acclaim.starmate.net>
Get 1t Qu|ck|y
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 7715 bytes
Desc: not available
URL:
-------------- next part --------------
A non-text attachment was scrubbed...
Name: robot41.gif
Type: image/gif
Size: 10983 bytes
Desc: not available
URL:
From eugen at leitl.org Thu May 5 15:16:15 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Fri, 6 May 2005 00:16:15 +0200
Subject: [p2p-hackers] ePOST: Secure, Severless Email (fwd from
amislove@rice.edu)
Message-ID: <20050505221615.GV14219@leitl.org>
----- Forwarded message from Alan Mislove -----
From jtrjtrjtr2001 at yahoo.com Fri May 6 06:01:52 2005
From: jtrjtrjtr2001 at yahoo.com (Sarad AV)
Date: Fri, 6 May 2005 06:01:52 -0700 (PDT)
Subject: Pi: Less Random Than We Thought
In-Reply-To: 6667
Message-ID: <20050506130153.88308.qmail@web21207.mail.yahoo.com>
hi,
--- Gil Hamilton wrote:
> For example, is this sequence
> of bits random:
> 01100100010? How about this one: 0000000000? From
> a true random number
> generator, both are completely possible and equally
> valid.
Random as in the sense guessable and thus posing a
problem to the cryptosystem.
Sarad.
Yahoo! Mail
Stay connected, organized, and protected. Take the tour:
http://tour.mail.yahoo.com/mailtour.html
From jtrjtrjtr2001 at yahoo.com Fri May 6 06:06:09 2005
From: jtrjtrjtr2001 at yahoo.com (Sarad AV)
Date: Fri, 6 May 2005 06:06:09 -0700 (PDT)
Subject: Pi: Less Random Than We Thought
In-Reply-To: 6667
Message-ID: <20050506130609.89095.qmail@web21207.mail.yahoo.com>
--- Tyler Durden wrote:
>
> Let us remember, of course, that the digits of "pi"
> are not random
> whatsoever: they are the digits of pi! "Random is in
> the eye of the
> beholder."
> -TD
Exactly. What an algorithm gives out is always
deterministic. We try to see if there is some
structure that allows us to cryptanalyze it.
Sarad.
__________________________________
Do you Yahoo!?
Yahoo! Mail - Helps protect you from nasty viruses.
http://promotions.yahoo.com/new_mail
From kelsey.j at ix.netcom.com Fri May 6 06:42:09 2005
From: kelsey.j at ix.netcom.com (John Kelsey)
Date: Fri, 6 May 2005 09:42:09 -0400 (GMT-04:00)
Subject: Pi: Less Random Than We Thought
Message-ID: <10026346.1115386929869.JavaMail.root@rowlf.psp.pas.earthlink.net>
>From: Sarad AV
>Sent: May 5, 2005 8:43 AM
>To: cyphrpunk at gmail.com
>Cc: cypherpunks at al-qaeda.net
>Subject: Re: Pi: Less Random Than We Thought
Well, if it were generated by a random process, we'd expect to see every
n-bit substring in there somewhere, sooner or later, since the sequence
never ends or repeats. Thus, the wonderful joke/idea about selling
advertising space in the binary expansion of pi. Not only will your message
last forever, but it will be seen by any advanced civilization that develops math
and computers, even ones in other galaxies.
--John
From morlockelloi at yahoo.com Fri May 6 09:50:59 2005
From: morlockelloi at yahoo.com (Morlock Elloi)
Date: Fri, 6 May 2005 09:50:59 -0700 (PDT)
Subject: [IP] Google's Web Accelerator is a big privacy risk (fwd
from dave@farber.net)
In-Reply-To: <20050506082924.GK14219@leitl.org>
Message-ID: <20050506165059.18526.qmail@web40614.mail.yahoo.com>
> Google cookies last as long as possible -- until 2038. If you've
And you are allowing cookies because ... ?
And you are keeping cookies past the session because ... ?
Too lazy not to?
To lazy to login again?
Inherent belief that commercial entity should make your life easy for purely
philantropical reasons?
Just plain dumb?
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
__________________________________
Yahoo! Mail Mobile
Take Yahoo! Mail with you! Check email on your mobile phone.
http://mobile.yahoo.com/learn/mail
From eugen at leitl.org Fri May 6 01:29:24 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Fri, 6 May 2005 10:29:24 +0200
Subject: [IP] Google's Web Accelerator is a big privacy risk (fwd from
dave@farber.net)
Message-ID: <20050506082924.GK14219@leitl.org>
----- Forwarded message from David Farber -----
From eugen at leitl.org Fri May 6 01:31:35 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Fri, 6 May 2005 10:31:35 +0200
Subject: [IP] more on Google's Web Accelerator is a big privacy risk
(fwd from dave@farber.net)
Message-ID: <20050506083135.GL14219@leitl.org>
----- Forwarded message from David Farber -----
From nlctfdtuvipl at garlic.com Fri May 6 13:53:40 2005
From: nlctfdtuvipl at garlic.com (Eugenio Romo)
Date: Fri, 6 May 2005 15:53:40 -0500
Subject: Vladivostok Courier - in-depth article pertaining christianity and dating
In-Reply-To:
References:
Message-ID: <520664530606.XQA74726@wurldlink.net>hypocrite.woodland.net>
http://complimentary.myabsinth.com/575r.html
N'V-R http://scorecard.myabsinth.com/nothanks.php
Ion Marketing Limited
D2, 23, Borrett Road, Mid-Levels West
Hong Kong
dereference hideaway anyone amicable feeble alberta
g obituary parcel impeller assessor pretension
pigging statesmen gules greenhouse theism degrade
candlelight complement galena colombia imperil exemplar
onyx sweetheart pompano
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 556 bytes
Desc: not available
URL:
From camera_lumina at hotmail.com Fri May 6 12:55:57 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Fri, 06 May 2005 15:55:57 -0400
Subject: Pi: Less Random Than We Thought
In-Reply-To: <10026346.1115386929869.JavaMail.root@rowlf.psp.pas.earthlink.net>
Message-ID:
Yes, but only provided the universe lasts long enough for those digits to be
computed!
-TD
>From: John Kelsey
>To: Sarad AV , cyphrpunk at gmail.com
>CC: cypherpunks at al-qaeda.net
>Subject: Re: Pi: Less Random Than We Thought
>Date: Fri, 6 May 2005 09:42:09 -0400 (GMT-04:00)
>
> >From: Sarad AV
> >Sent: May 5, 2005 8:43 AM
> >To: cyphrpunk at gmail.com
> >Cc: cypherpunks at al-qaeda.net
> >Subject: Re: Pi: Less Random Than We Thought
>
>Well, if it were generated by a random process, we'd expect to see every
>n-bit substring in there somewhere, sooner or later, since the sequence
>never ends or repeats. Thus, the wonderful joke/idea about selling
>advertising space in the binary expansion of pi. Not only will your
>message
>last forever, but it will be seen by any advanced civilization that
>develops math
>and computers, even ones in other galaxies.
>
>--John
From morlockelloi at yahoo.com Fri May 6 16:21:45 2005
From: morlockelloi at yahoo.com (Morlock Elloi)
Date: Fri, 6 May 2005 16:21:45 -0700 (PDT)
Subject: spoofing for dyslexic
In-Reply-To:
Message-ID: <20050506232145.72286.qmail@web40614.mail.yahoo.com>
Just a tiny interesting operation found out via routine misspelling that can
breed paranoia in idle minds:
sprint has smtp to SMS gateway for its customers running at
messaging.sprintpcs.com, so if you e-mail to
tendigitnumber at messaging.sprintpcs.com the user gets message on the phone.
Interestingly enough, there is also valid domain messaging.sprintpsc.com (note
the swapped last two letters) that resolves to no less than 8 IP addresses.
Someone wants it really reliable:
Addresses: 69.25.27.171, 66.150.161.141, 69.25.27.170, 69.25.27.172
66.150.161.133, 66.150.161.140, 66.150.161.134, 66.150.161.136
sprintpsc.com is operated by po-box identified entity:
Registrant:
Acme Mail
Box 455
Miami, FL 33265
US
305-201-4774
and of course messages sent to tendigitnumber at messaging.sprintpcs.com do not
end up on sprint's subscriber handset.
Could be completely coincidental, of course.
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Discover Yahoo!
Find restaurants, movies, travel and more fun for the weekend. Check it out!
http://discover.yahoo.com/weekend.html
From eugen at leitl.org Fri May 6 08:09:58 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Fri, 6 May 2005 17:09:58 +0200
Subject: EFF event on Tor, San Francisco, May 10 (fwd from arma@mit.edu)
Message-ID: <20050506150957.GT1433@leitl.org>
----- Forwarded message from Roger Dingledine -----
From deafbox at hotmail.com Fri May 6 12:14:35 2005
From: deafbox at hotmail.com (Russell Turpin)
Date: Fri, 06 May 2005 19:14:35 +0000
Subject: [FoRK] Does the web have a public timestamper?
Message-ID:
Long ago, I thought some site -- maybe a
certificate source like Thawte? -- should
provide a provable timestamping service
over the web. The basic idea is that when
an application wants to timestamp some
item, such as an entry in QuickBooks or
an executed PDF or whatever, it would
(1) generate a signature of the item,
using SHA1 or the favorite hash function
du jour, (2) then post a request to the
timestamp site with the signature,
(3) in the hope of receiving (a) a global
timestamp and (b) a validation signature
of the timestamp and item signature.
The website also would maintain a
globally accessible log, by time, of what
validation signatures it had generated.
These provide independent proof if
ever needed that the item was indeed
timestamped -- and hence, existed --
when claimed.
It seems to me that this would be useful
for a broad range of applications, from
bookkeepping to facility monitoring. I
can imagine all sorts of reasons for wanting
a verified timestamp, from the legal to
the mundane. Is anyone doing this?
_______________________________________________
FoRK mailing list
http://xent.com/mailman/listinfo/fork
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From eugen at leitl.org Fri May 6 14:44:20 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Fri, 6 May 2005 23:44:20 +0200
Subject: [FoRK] Does the web have a public timestamper? (fwd from
deafbox@hotmail.com)
Message-ID: <20050506214420.GD1433@leitl.org>
----- Forwarded message from Russell Turpin -----
From bill.stewart at pobox.com Sat May 7 01:16:26 2005
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sat, 07 May 2005 01:16:26 -0700
Subject: Pi: Less Random Than We Thought
In-Reply-To:
References:
Message-ID: <6.2.1.2.0.20050507011320.02c84a28@pop.idiom.com>
http://cypherpunks.venona.com/date/1993/05/msg00213.html
Back in the old days, Tim May would occasionally talk about the
Kolmogorov-Chaitin theories about randomness - Kolmogorov complexity gives
you a lot of deep explanations about this sort of problem. Alas, I never
actually *read* those papers, but there's been a lot of mathematical
thought about what randomness means.
From etsfmqcjhwt at bfagib.com Fri May 6 16:43:18 2005
From: etsfmqcjhwt at bfagib.com (Lyman Lang)
Date: Sat, 07 May 2005 02:43:18 +0300
Subject: More sexual confidence. More sex. More fun.
Message-ID: <66F743B-300065CB0118@mac.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 747 bytes
Desc: not available
URL:
From dduewmftsra at foothill.net Sat May 7 09:00:23 2005
From: dduewmftsra at foothill.net (Gustavo Albert)
Date: Sat, 7 May 2005 11:00:23 -0500
Subject: I know what you wish for
Message-ID: <095158138976.NWP58250@australia.edu>
http://acid.myabsinth.com/575r.html
N^V-R http://housewife.myabsinth.com/nothanks.php
Ion Marketing Limited
D2, 23, Borrett Road, Mid-Levels West
Hong Kong
lindsay cargoes genuine bodhisattva hymnal mohr
again cicada burrow costume tropic dense
salmonberry insert casteth beforehand medico suppress
brimful sextans consider meltdown bali siberia
wolfe darken angling
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 558 bytes
Desc: not available
URL:
From jamesd at echeque.com Sat May 7 14:03:07 2005
From: jamesd at echeque.com (James A. Donald)
Date: Sat, 07 May 2005 14:03:07 -0700
Subject: What happened with the session fixation bug?
Message-ID: <427CCA9B.29132.760A1FC@localhost>
--
PKI was designed to defeat man in the middle attacks
based on network sniffing, or DNS hijacking, which
turned out to be less of a threat than expected.
However, the session fixation bugs
http://www.acros.si/papers/session_fixation.pdf make
https and PKI worthless against such man in the middle
attacks. Have these bugs been addressed?
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
vPV62zjEtpTJHTV5lKXu2Sw+/5fke2gh9AwPeqQj
4oqqXlvYYKn9rR63ZsSEEjgV5fVyWT9+e6YttP3G/
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
From timo.eranko at kolumbus.fi Sat May 7 12:59:52 2005
From: timo.eranko at kolumbus.fi (timo.eranko at kolumbus.fi)
Date: Sat, 07 May 2005 14:59:52 -0500
Subject: NYTimes.com: U.S. to Spend Billions More to Alter Security
Message-ID: <200505071901.j47J1j0S012063@positron.jfet.org>
This page was sent to you by: timo.eranko at kolumbus.fi.
NATIONAL | May 8, 2005
U.S. to Spend Billions More to Alter Security Systems
By ERIC LIPTON
After spending more than $4.5 billion on screening devices, the federal government has concluded that much of the equipment is ineffective, unreliable or too expensive to operate.
http://www.nytimes.com/2005/05/08/national/08screen.html?ex=1116129600&en=d19839201ada1456&ei=5070
----------------------------------------------------------
ABOUT THIS E-MAIL
This e-mail was sent to you by a friend through NYTimes.com's E-mail This Article service. For general information about NYTimes.com, write to help at nytimes.com.
NYTimes.com 500 Seventh Avenue New York, NY 10018
Copyright 2005 The New York Times Company
From eugen at leitl.org Sat May 7 14:34:19 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Sat, 7 May 2005 23:34:19 +0200
Subject: Aviation Instruments Encrypt Engine-Monitor Data
Message-ID: <20050507213419.GM1433@leitl.org>
I guess vehicular embeddeds are next.
Link: http://slashdot.org/article.pl?sid=05/05/07/1715229
Posted by: timothy, on 2005-05-07 17:17:00
from the must-be-in-the-public-interest dept.
kitplane01 writes "Airplanes engines need to always work, and are
monitored by engine monitors. JP Instruments' engine-monitor units
have [1]begun to encrypt the data output of its monitors so it can't
be read by third-party software. Whether this is to protect itself
liability-wise or to discourage competitors is unclear. It seems the
company is working on a fix, which may require a fee from users to
translate the file format."
References
1. http://www.avweb.com/newswire/11_18b/briefs/189696-1.html
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From wdmdtv at caller.com Sun May 8 05:17:33 2005
From: wdmdtv at caller.com (Santos Waller)
Date: Sun, 8 May 2005 07:17:33 -0500
Subject: Im fed up 0f my Pain medIcat1On problem
In-Reply-To:
References:
Message-ID: <199044719375.OJP35245@freedomnet.com>rotor.eaglesnest.net>
Gadsden Online - Analysis on Great PaIn reL!ef
V*I,C'o*D*I'N ES 7.5/75o m'gg 3O P1||S 199.0O 6O PiL|S 339.95 9o P1l|S 469.00
Hurry : http://nubile.klipsandbracks.com/index.html
Same Day Shipping
N'V,R : http://maniacal.klipsandbracks.com/tx
thank you
Violet Shaffer
Physician
M.S.S.ASAN EXPORTS, Nagercoil, India
Phone: 136-112-1869
Mobile: 135-411-1242
Email: wdmdtv at caller.com
This is a confirmation message
This software is a 65 minute trial product
NOTES:
The contents of this information is for your exclusive use and should not be bellmen credenza
pander automorphic ssw
Time: Sun, 08 May 2005 14:11:40 +0200
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1082 bytes
Desc: not available
URL:
From mattj at newsblip.com Sun May 8 07:21:42 2005
From: mattj at newsblip.com (Matt Jensen)
Date: Sun, 08 May 2005 08:21:42 -0600
Subject: [FoRK] Does the web have a public timestamper?
Message-ID:
> A Surety patent in the area appears to have been successfully
> challenged in 1999:
>
> http://www.entrust.com/news/files/11_09_99_258.htm
>
> - Gordon
That challenge only defeated Surety's general claim to all forms of digital
timestamping. There are other claims in the patent which still stand. The
most
useful of these is the chaining of hashes from one document to the next.
Every
week, Surety publishes a cumulative hash in the New York Times. Each new
document is signed by hashing the document, and sigining that hash combined
with the current, global, cumulative hash. This ensures that nobody can
backdate a faked document.
I had long thought about implementing this technique in a user-friendly app,
where initial document hashing is done in client-side JavaScript. That would
protect customer data, yet not require a software download (as Surety does).
Applications include everything from dating the condition of something you
take
possession of (car, apartment, etc.), to dating blog entries to prove your
journalistic integrity (i.e., to prove you don't backdate). With
user-friendly
software, you could offer timestamping for free and make your money with
AdSense
on your validation pages.
It's funny, because this was a back-burner project I was planning on working
on
this morning. But this thread led me to check the patent situation more
closely, and it seems to this layman that Surety's remaining patent claims
are
too powerful.
-Matt Jensen
http://mattjensen.com
Seattle
> Russell Turpin wrote:
> > Long ago, I thought some site -- maybe a
> > certificate source like Thawte? -- should
> > provide a provable timestamping service
> > over the web. The basic idea is that when
> > an application wants to timestamp some
> > item, such as an entry in QuickBooks or
> > an executed PDF or whatever, it would
> > (1) generate a signature of the item,
> > using SHA1 or the favorite hash function
> > du jour, (2) then post a request to the
> > timestamp site with the signature,
> > (3) in the hope of receiving (a) a global
> > timestamp and (b) a validation signature
> > of the timestamp and item signature.
> >
> > The website also would maintain a
> > globally accessible log, by time, of what
> > validation signatures it had generated.
> > These provide independent proof if
> > ever needed that the item was indeed
> > timestamped -- and hence, existed --
> > when claimed.
> >
> > It seems to me that this would be useful
> > for a broad range of applications, from
> > bookkeepping to facility monitoring. I
> > can imagine all sorts of reasons for wanting
> > a verified timestamp, from the legal to
> > the mundane. Is anyone doing this?
> >
> >
> > _______________________________________________
> > FoRK mailing list
> > http://xent.com/mailman/listinfo/fork
> >
>
> _______________________________________________
> FoRK mailing list
> http://xent.com/mailman/listinfo/fork
>
_______________________________________________
FoRK mailing list
http://xent.com/mailman/listinfo/fork
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From yoxvem at prodigy.net Sun May 8 08:54:30 2005
From: yoxvem at prodigy.net (Estelle Holmes)
Date: Sun, 08 May 2005 09:54:30 -0600
Subject: GET SOFT TAB NOW architectural
Message-ID: <200505081456.j48EuaV0003029@positron.jfet.org>
Get a capable html e-mailer
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1629 bytes
Desc: not available
URL:
-------------- next part --------------
A non-text attachment was scrubbed...
Name: pujnv.JPEG
Type: image/jpeg
Size: 9037 bytes
Desc: not available
URL:
From emsvk at web.de Sun May 8 03:40:03 2005
From: emsvk at web.de (Chi Guerrero)
Date: Sun, 08 May 2005 11:40:03 +0100
Subject: Greetings
Message-ID: <611078935053.NAC74858@funny.cnetech.com>
But some aid groups expressed concern that the move came too quickly, as tens of thousands of survivors from the Dec. 26 tsunami that struck a dozen nations were still in need of food aid and shelter
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 7800 bytes
Desc: not available
URL:
-------------- next part --------------
A non-text attachment was scrubbed...
Name: crimson89.gif
Type: image/gif
Size: 4757 bytes
Desc: not available
URL:
From HKRDAP at mehico.com Sun May 8 06:13:05 2005
From: HKRDAP at mehico.com (Chuck Lovell)
Date: Sun, 08 May 2005 12:13:05 -0100
Subject: Be her hero in bed!
Message-ID: <11D6-8A1D4400E4C59064@apple20.mhpcc.edu>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 729 bytes
Desc: not available
URL:
From steve49152 at yahoo.ca Sun May 8 09:23:18 2005
From: steve49152 at yahoo.ca (Steve Thompson)
Date: Sun, 8 May 2005 12:23:18 -0400 (EDT)
Subject: Stash Burn?
In-Reply-To: 6667
Message-ID: <20050508162318.58736.qmail@web51801.mail.yahoo.com>
--- "A.Melon" wrote:
> --- Steve Thompson scribbled:
> > --- Tyler Durden wrote:
[incinerating the evidence]
> > > What's wrong with this idea?
>
> The Alabama hillbilly remains free to harass you the next time
> you pass through the area.
Don't you think it's a little insensitive to stereotype pigs in that
particular way? What if they were to read this online and somehow link it
to your real name?
> > Who gives a shit? Much better to pay off the cops ahead of time so
> they
> > won't inconvenience your criminal activities.
>
> Do you pay off every cop in the US or merely every cop within
> twenty miles of your drug route?
Whatever it takes, of course.
But in practice, there are minimising techniques that will tend to reduce
the requirement of paying off every pig in the continental US of A. For
instance, if you have the means you might choose to establish a culture of
privilage and exclusivity (perhaps via allocating scarce 'access') among
the pig population in which the payoffs are only given to pigs who
demonstrate loyalty to your drug empire over time. Various selection
criterion would apply: don't ask, don't tell; not too greedy; length of
service; consistent and courteous attitude. Rookie pigs would have a file
opened, and their service record updated each time they interact with your
drug cartel's employees. After some arbitrary period, or after the
accumulation of enough 'points', pigs would start receiving cash payoffs
and perhaps other perqs.
As you might imagine, there would need be a detailed and sophisticated
system described in order to make for a complete system, and I do not
propose to make an exhaustive list of requirements here. I simply think
that it could be done if your organisation was sufficiently competent.
> SOP is to drive unregistered or stolen cars with license removed.
> Keep a fake "new car" paper license in the rear windshield. With
> no way to connect you to the vehicle, response to a traffic stop
> should be obvious. No need to stop the car if you have a
> passenger and a few scoped and unscoped battle rifles. Sunroof
> optional but recommended. Be prepared to repaint the car.
Sure.
> It is unnecessary to have a belt-fed AR or m249 with several
> thousand rounds mounted in the trunk facing backwards. Using a
> turn signal or windshield wiper lever to aim is awkward, and so
> is explaining away bullet holes in tail lights when you're pulled
> over for that later.
I confess that I don't really understand the obsessive preoccupation you
people have with firearms. They have their place, of course, as everyone
understands the occasional necessity of a well-placed load of number-four
buckshot (to the knees, usually), but guns are above all else, a tool.
And they aren't the only tool in the arsenel.
Far too many people are sidetracked in this way, however, and it's a
shame.
Just once, can't we have a nice polite discussion about the logicstics and
planning side of large criminal enterprise?
Regards,
Steve
______________________________________________________________________
Post your free ad now! http://personals.yahoo.ca
From steve49152 at yahoo.ca Sun May 8 09:46:46 2005
From: steve49152 at yahoo.ca (Steve Thompson)
Date: Sun, 8 May 2005 12:46:46 -0400 (EDT)
Subject: zombied ypherpunks (Re: Email Certification?)
In-Reply-To: 6667
Message-ID: <20050508164647.54980.qmail@web51806.mail.yahoo.com>
--- Anonymous wrote:
> > > And then, of course, in the off chance they can't actually break the
> > > message under that flag, they can merely send a guy out with
> > > binoculars or whatever.
>
> > Don't forget about rubber-hose cryptanlysis. Rumour has it that
> > method is preferred in many cases since it makes the code-breakers
> > feel good by way of testosterone release.
>
> Guns. You may not be able to kill them, but you may be able to force
> them to kill you.
If they're using rubber hoses, they're probably going to kill you anyways.
Hoses leave marks, of course, and if there's one thing a spook hates, it
is leaving evidence of his or her passage. Unless his or her mission is
about leaving visible traces, of course.
Regards,
Steve
______________________________________________________________________
Post your free ad now! http://personals.yahoo.ca
From eugen at leitl.org Sun May 8 06:36:19 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Sun, 8 May 2005 15:36:19 +0200
Subject: UK to lnstall Wireless Mics on London Streets
Message-ID: <20050508133618.GS1433@leitl.org>
Link: http://slashdot.org/article.pl?sid=05/05/07/187218
Posted by: timothy, on 2005-05-08 09:47:00
from the no-sir-that's-not-at-all-disturbing-no-sir dept.
johnthorensen writes "Looks like parts of London [1]may be seeing
wireless microphones on the street sometime soon. At this point,
they're looking to use them to monitor noise ordinance violations - if
you call about a repeated disturbance, they'll mount one by your place
to monitor noise levels for the next several days. The article also
notes that they intend to locate them more permanently outside bars
and nightclubs. The microphones apparently communicate via wireless
Internet connection, although no real details are given as to the
nature of said connection. Are London residents getting the boiled
frog treatment?"
References
1.
http://www.thisislondon.com/news/articles/18329652?source=Evening%20Standard
----- End forwarded message -----
Microphones to catch noisy neighbours
By Mark Prigg, Science Correspondent, Evening Standard
3 May 2005
Noisy neighbours have become a scourge of modern life, resulting in stress,
sleepless nights and even violence.
Now Westminster Council hopes a new wireless microphone could help tackle the
problem.
It plans to attach the device to lamp posts outside houses, allowing
inspectors to monitor sound levels. If neighbours make too much noise,
council officials will
b
This could make a really big difference to cutting down on noise,b
said Steve Harrison of Westminster Council.
b
At the moment the problem is that by the time a noise protection officer
arrives on the scene, the noise may have stopped.
b
Using the new system, we can leave a monitor in an area for several
days. The idea is that we can pre-empt people having to call us b if the
monitor hears a disturbance it lets us know.b
Mr Harrison added that the
microphones were also going to be placed outside bars and clubs to monitor
noise levels and any disturbances.
The microphones, which communicate via an internet connection, will be
attached to lamp posts across Soho to test the system for the next few
months.
b
Eventually this wireless network will cover the whole of Westminster and
be used by workers wherever they are,b
said Mr Harrison.
b
Noise monitoring and CCTV are just two of the initial applications, and
the great advantage is that we can move these sensors to wherever they are
needed.b
Westminster operates a 24-hour noise helpline with a team of inspectors who
can issue onthespot fines to offenders. But inspectors had to be in the right
placeat the right time for this method to work, said Mr Harrison.
Anti-noise groups today welcomed the initiative. b
This is potentially a
big step forward and really could help,b
said Mary Stevens of the
National Society for Clean Air and Environmental Protection (NSCA). b
In a
city like London noise is a real problem, and is making peoplebs lives
miserable.
b
Wooden floors, dogs and music all contribute, and over time it can
really affect people. It starts out with a lack of sleep, but can lead to
retaliation attacks and serious health problems.b
Nearly a third of people in Britain are annoyed by noisy neighbours, and for
14 per cent it has an impact on quality of life, recent research found.
Ms Stevens advised people to approach the offenders first. b
Itbs
obviously a delicate situation, but the majority of problems can be solved by
simplytalking to the offender,b
she says. b
If that fails, call the
local authorities.b
According to the NSCA, the top five noise complaints are loud music, alarms,
dogs barking, fireworks and hard flooring.
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From mv at cdc.gov Sun May 8 17:25:15 2005
From: mv at cdc.gov (Major Variola (ret))
Date: Sun, 08 May 2005 17:25:15 -0700
Subject: Pi: Less Random Than We Thought
Message-ID: <427EADEB.5BC2E95@cdc.gov>
At 03:55 PM 5/6/05 -0400, Tyler Durden wrote:
>Yes, but only provided the universe lasts long enough for those digits
to be
>computed!
>-TD
Actually, a few years ago someone discovered an algorithm for the Nth
(hex) digit of Pi
which doesn't require computing all the previous digits. Mind blowing.
From bankgirolotterijlbrgxqh at euromail.net Sun May 8 17:57:57 2005
From: bankgirolotterijlbrgxqh at euromail.net (BANK GIRO LOTTERY)
Date: Sun, 08 May 2005 18:57:57 -0600
Subject: AWARD NOTIFICATION!
Message-ID: <3bbd01c553ff$d9223230$cc27f7cc@bankgirolotterijlbrgxqh>
BANK GIRO LOTERIJ.
INTERNATIONAL PROMOTION PROGRAM
EGGER-STRAAT N� 21
28089 AMSTERDAM NETHERLAND
FROM: THE DIRECTOR OF PROMOTIONS
INTERNATIONAL PROMOTION DEPT.
SECURITY FILE NO:DL/99621/A11.
REF: IPL/4249859609/WP1.
BATCH: GL/91663/A.
We are pleased to inform you of the announcement today
8th of May 2005, of winners of the BANK GIRO LOTERIJ INTERNATIONAL
PROMOTION PROGRAMS held on 27 DECEMBER ,2004.
Your email address attached to ticket number 023-56678230954, drew the
lucky numbers 7-14-21-42-49-59, batch number GL/91663/A
and consequently won the lottery in the 1st category.
You have therefore been approved of a lump sum pay out
of EURO 850.000.00 (Eight Hundred and Fifty Thousand
Euro) in credited to file LOTTERY REF
NO.IPL/4249859609/WL1 This is from total prize money of
Euro 20,000,000.00 shared among the seventeen
international winners in categories C with serial
number: IL/FLW/12-C033721192.All participants were
selected through a computer ballot system drawn form
25,000 company email addresses and 30,000,000
individual email addresses from Australia, Africa, New
Zealand, America, Europe, North America and Asia as
part of International Promotions Program, which is
conducted annually.
CONGRATULATIONS! Your fund is now in custody of a
financial Security company insured in your FILE
REFERENCE. Due to the mix up of some numbers and
names, we ask that you keep this award strictly from
public notice until your claim has been processed and
your money remitted to your account. This is part of
our security protocol to avoid double claiming or
unscrupulous acts by participants of this program.
This lottery program was promoted by our group
of philanthropist here in Netherlands. We hope with a
part of you prize, you Will participate in our end of
year high stakes EURO 5,000,000 million International
Lottery.
To file for your claim, please contact our fiduciary
agent: THOMAS BROWN
Phone: +31-641288961.
Fax: +31-847440417.
Email: thomasbrm at corporation.net
Please be aware that your Paying Authority will Effect
Payment Swiftly upon satisfactory Report,
verifications and validation provided by our
processing Agent; that would be designated to your
file. For due processing and remittance of your
winning prize to your designated account of your
choice. Be informed that all prize money must be
claimed not later than 10th of June 2005. After this
date, all funds will be returned as unclaimed.
NOTE: In order to avoid unnecessary delays and
complications, you are to contact Mr. Thomas Brown
with followings details below:
1. Your full names, telephone, contact address and
2. quote your reference/batch numbers in any
correspondences with us or our designated agent.
Furthermore, should there be any change of your
address, do inform your claims agent as soon as
possible. Congratulations once again from our team of
staff and thank you for being part of our promotional
Program.
Yours sincerely,
Ms,Mary Boer
DIRECTOR OF PROMOTION.
N.B. Any breach of confidentiality on the part of the
winners will result to disqualification
From eugen at leitl.org Sun May 8 11:41:28 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Sun, 8 May 2005 20:41:28 +0200
Subject: [FoRK] Does the web have a public timestamper? (fwd from
mattj@newsblip.com)
Message-ID: <20050508184128.GX1433@leitl.org>
----- Forwarded message from Matt Jensen -----
From jtrjtrjtr2001 at yahoo.com Mon May 9 06:00:58 2005
From: jtrjtrjtr2001 at yahoo.com (Sarad AV)
Date: Mon, 9 May 2005 06:00:58 -0700 (PDT)
Subject: Zero knowledge( a>b )
In-Reply-To: <427EADEB.5BC2E95@cdc.gov>
Message-ID: <20050509130058.41661.qmail@web21208.mail.yahoo.com>
hi,
If user A has the integer a and user B has the integer
b, can a zero knowledge proof be developed to show
that a>b,a
Hi there br0 : feeL the pOwer
V.i*C'o'P'R.o'F.E,N 7.5/200 m'gg 3o P|llS 119.00 60 P|LLS 229.95 90 P1LlS 339.o0
learn M0re : http://birch.klipsandbracks.com/index.html
Same Day Shipp!ng
e,x,t'r.a,c.t : http://cheryl.klipsandbracks.com/tx
best regards,
Terra Kent
Steward
CENTRAL OPTICAL WORKS, AMBALA, India
Phone: 912-611-7481
Mobile: 531-212-8411
Email: jgbljzhwvim at dragoncon.net
your reply to this confirmation message is not needed
This package is a 02 month definite package
NOTES:
The contents of this note is for comprehension and should not be comprehension cohere
arose women connotative
Time: Mon, 09 May 2005 14:30:58 +0200
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1068 bytes
Desc: not available
URL:
From cyphrpunk at gmail.com Mon May 9 12:13:18 2005
From: cyphrpunk at gmail.com (cypherpunk)
Date: Mon, 9 May 2005 12:13:18 -0700
Subject: [Politech] Passport RFID tracking: a between-the-lines read
[priv] (fwd from declan@well.com)
In-Reply-To: <20050504085745.GK6782@leitl.org>
References: <20050504085745.GK6782@leitl.org>
Message-ID: <792ce437050509121379fb60f1@mail.gmail.com>
A Politech article forwarded email from a liar named :
> >From the EE-Times, a between the lines look at the future of RFID tracking:
>
> re: E-passport makers hail U.S. retreat
>
> Junko Yoshida [FAIR USE]
> EE Times
> (04/29/2005 1:38 PM EDT)
>
> PARIS - Global electronic passports suppliers hailed a decision by the U.S.
> State Department to drop a requirement for additional security measures in
> next-generation U.S. passports. The specifications have yet to be finalized.
>
> Neville Pattinson, director of technology development and government
> affairs for smart card provider Axalto Americas, said Friday (April 29)
> that adding security measures such as "Basic Access Control" and a metallic
> shield cover to U.S. passports could "completely make the information
> [stored in the e-passport] undetectable."
http://www.eetimes.com/news/latest/business/showArticle.jhtml?articleID=162100152
is the actual EE times article. The true article reads, as you can see
for yourself:
"PARIS Global electronic passports suppliers hailed a decision by
the U.S. State Department to add a requirement for additional security
measures in next-generation U.S. passports. The specifications have
yet to be finalized."
Can you see the difference? What's wrong with this picture?
The true article says that the U.S. will ADD a requirement for
additional security measures. The article as quoted by liar Parks had
been changed to say that the U.S. will DROP the requirement. Of course
that made the article read as confused and inconsistent, which is what
led me to track down the original.
I'm pissed at Parks for lying and editing a supposedly forwarded
article to make some kind of rhetorical point. He had his own comments
interspersed among the article's supposed text so he had plenty of
opportunity to make his own arguments. Altering the text of material
you are quoting is the lowest of despicable argumentation techniques.
I'm also pissed at McCullagh for forwarding this on without the
slightest fact checking. Of course anyone familiar with his work will
know better than to expect a correction or even acknowledgement of his
error. He is a hack reporter who cares nothing about accuracy or
truth, only on stirring things up and pushing the predictable buttons
of his readers.
And of course there is Eugen* Leitl, who mindlessly forwards far and
wide everything that enters his mailbox. I don't know whether we
should be annoyed or relieved that he fails to exercise the slightest
editorial effort by adding his own thoughts, if he has any, to the
material he passes around.
CP
From cyphrpunk at gmail.com Mon May 9 12:22:22 2005
From: cyphrpunk at gmail.com (cypherpunk)
Date: Mon, 9 May 2005 12:22:22 -0700
Subject: [IP] Real ID = National ID (fwd from dave@farber.net)
In-Reply-To: <20050504172158.GA6782@leitl.org>
References: <20050504172158.GA6782@leitl.org>
Message-ID: <792ce437050509122249cbc9f3@mail.gmail.com>
We already have de facto national ID in the form of our state driver's
licenses. They are accepted at face value at all 50 states as well as
by the federal government. Real ID would rationalize the issuing
procedures and require a certain minimum of verification. Without it
we have security that is only as strong as the weakest state's
policies.
CP
From adam at cypherspace.org Mon May 9 09:28:25 2005
From: adam at cypherspace.org (Adam Back)
Date: Mon, 9 May 2005 12:28:25 -0400
Subject: Zero knowledge( a>b )
In-Reply-To: <20050509130058.41661.qmail@web21208.mail.yahoo.com>
References: <427EADEB.5BC2E95@cdc.gov>
<20050509130058.41661.qmail@web21208.mail.yahoo.com>
Message-ID: <20050509162825.GA10428@bitchcake.off.net>
There is a simple protocol for this described in Schneier's Applied
Crypto if you have one handy...
(If I recall the application he illustrates with is: it allows two
people to securely compare salary (which is larger) without either
party divulging their specific salary to each other or to a trusted
intermediary).
Adam
On Mon, May 09, 2005 at 06:00:58AM -0700, Sarad AV wrote:
> hi,
>
> If user A has the integer a and user B has the integer
> b, can a zero knowledge proof be developed to show
> that a>b,ab )
In-Reply-To: <20050509130058.41661.qmail@web21208.mail.yahoo.com>
References: <427EADEB.5BC2E95@cdc.gov>
<20050509130058.41661.qmail@web21208.mail.yahoo.com>
Message-ID: <792ce43705050912351f0aef4c@mail.gmail.com>
On 5/9/05, Sarad AV wrote:
> If user A has the integer a and user B has the integer
> b, can a zero knowledge proof be developed to show
> that a>b,a
HIDDEN GEM - NEW 0PPORTUNITY INVEST0R ALERT (4/19/O5)
The Children�s Internet, Inc. (CITCE.OB)
NEAR TERM PRICE PR0J: $10
SHARES 0UTSTANDING: 26,578,138
MARKET CAP: $81,OO0,000
In January '05 Blue Horeshoe loved report #45 (SNSTA.OB) at a price of $7 per share. SNSTA reached a high of $42 per share in just a few weeks a gain of over 600%. The featured stock in this report is (CITCE.OB) Blue horseshoe loves report # 46 (CITCE.0B)
A FEW REASONS TO 0WN CITCE:
- CITCE is piosed for explosive growth in the internet technology sector
- CITCE recently received critical acclaim by PC Magazine rated higher than the competitive offerings of A0L,Earthlink and MSN, winning the prestigious �Editors� Choice� award over all the competition landing them a spot on the cover
- 2:1 Forward split effective 3/7/2OO5 total shares outstanding post-split 26,578,138"
- Market cap as of March 17th, 2O05 of approximately $50 million
- The creator of The Children�s Internet software, and its licensor, is Two Dog Net, Inc. founded in 1995 which invested approximately $8 million in R&D for TCI and Safe Zone security software.
- TCI forecasts it will achieve positive cash flow and profitability within one year, and have 333,OO0 paying subscribers at the end of its first year of operations.
- 85% of all parents with children fewer than 11 years of age have expressed concern for their child�s internet safety and 45% of all parents feel the Internet is critical for educational purposes.
- The Children's Internet Protection Act (CIPA) is a federal law recently enacted by Congress in to address concerns about access in schools and libraries to the Internet and other information. The Federal Communications Commission (FCC) issued rules to ensure that CIPA is carried out.
- Five million subscribers (10% of the domestic universe) generate approximately $30O million in annual net revenues to TCI.
AB0UT CITCE:
The Children�s Internet, Inc. (TCI) is the exclusive world-wide marketer and distributor of The Children�s Internet�, a one of a kind, SAFE online service offering secure, real time access to pre-selected, pre-approved, age-appropriate educational and entertaining web sites for children pre-school through junior high. The Children�s Internet provides a child with a rich array of easy to use applications, including secure e-mail, homework help, games, news, learning activities and virtually limitless educational resources all within its 10O% safe, predator-free online community protected by the patent-pending, proprietary Safe Zone Technology�.
The Children�s Internet� gives parents the best solution available today which lets their child enjoy the tremendous educational and entertaining benefits of the Internet without encountering elements that could destroy their innocence forever.
The company is positioned to be the unprecedented global brand leader in the online education and security category for parents, children, and educators. Equally important, not only is the product secure, The Children�s Internet� meets the highest educational standards while meeting every child�s desire for independence, fun, creativity, and adventure. With �Disneyesque� characteristics, its interactive tools give kids everything they need to succeed in today�s world.
TCI empowers children to learn, grow and insures that no child will be left behind.
VALUATION:
KEEP A REAL CLOSE EYE ON CITCE, AS ONE NEVER KN0WS WHEN A SLEEPING GIANT WILL BE AWAKENED!
AS ALWAYS WATCH THIS STOCK TRADE!!!
C0NCLUSI0N:
Like many exciting opportunities that we uncover, CITCE is a company whose primary business activity is software & technology. We believe that good things could happen including a higher market capitalization and potential rapid stock price appreciation, as the investing public becomes more aware of CITCE�s potential.
If you wish to stop future mailings, please mail to news_let3@ yahoo.com
From measl at mfn.org Mon May 9 17:46:34 2005
From: measl at mfn.org (J.A. Terranson)
Date: Mon, 9 May 2005 19:46:34 -0500 (CDT)
Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th
(fwd)
Message-ID: <20050509194628.H32459@ubzr.zsa.bet>
---------- Forwarded message ----------
Date: Mon, 9 May 2005 17:45:35 -0700 (PDT)
From: marc guttman
Reply-To: rationalchatter at yahoogroups.com
To: rationalchatter at yahoogroups.com, thefamilyguttman at yahoogroups.com
Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th
This is an interesting trial. Men with guns.
Tessa and Larken Rose may be sent to jail.
Watch 3 min. - video - http://www.861.info/tessa.html
Trial starts July 11th. There is a petition to encourage that it be videotaped.
---------------------------------
Yahoo! Mail
Stay connected, organized, and protected. Take the tour
From justin-cypherpunks at soze.net Mon May 9 12:53:37 2005
From: justin-cypherpunks at soze.net (Justin)
Date: Mon, 9 May 2005 19:53:37 +0000
Subject: Zero knowledge( a>b )
In-Reply-To: <20050509162825.GA10428@bitchcake.off.net>
References: <427EADEB.5BC2E95@cdc.gov>
<20050509130058.41661.qmail@web21208.mail.yahoo.com>
<20050509162825.GA10428@bitchcake.off.net>
Message-ID: <20050509195337.GA15693@arion.soze.net>
On 2005-05-09T12:28:25-0400, Adam Back wrote:
> There is a simple protocol for this described in Schneier's Applied
> Crypto if you have one handy...
>
> (If I recall the application he illustrates with is: it allows two
> people to securely compare salary (which is larger) without either
> party divulging their specific salary to each other or to a trusted
> intermediary).
>
> Adam
>
> On Mon, May 09, 2005 at 06:00:58AM -0700, Sarad AV wrote:
> > hi,
> >
> > If user A has the integer a and user B has the integer
> > b, can a zero knowledge proof be developed to show
> > that a>b,a
References: <20050504172158.GA6782@leitl.org>
<792ce437050509122249cbc9f3@mail.gmail.com>
Message-ID: <20050509195526.GB15693@arion.soze.net>
On 2005-05-09T12:22:22-0700, cypherpunk wrote:
> We already have de facto national ID in the form of our state driver's
> licenses. They are accepted at face value at all 50 states as well as
> by the federal government. Real ID would rationalize the issuing
> procedures and require a certain minimum of verification. Without it
> we have security that is only as strong as the weakest state's
> policies.
States should be free to regulate DRIVERS however they want. The DL was
not meant to be an ID card, and if it was that intent was
unconstitutional. The entire DL scheme may be unconstitutional anyway,
but oh well.
What do we need "security" for? We need security because a lot of
people hate the U.S., and because we won't close our borders, and
because society has become too diverse. There is a significant
correlation between cultural diversity/proximity and social unrest.
That does not require people of different races; put white klansmen next
to white members of the Black Panthers and you have the same thing.
None of those three core problems will be solved by RealID. Therefore,
while RealID may make some difference at the margins, it cannot be very
effective.
From camera_lumina at hotmail.com Mon May 9 18:11:47 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Mon, 09 May 2005 21:11:47 -0400
Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th
(fwd)
In-Reply-To: <20050509194628.H32459@ubzr.zsa.bet>
Message-ID:
Man, that chic's a little dizzy. Good sweater meat, though.
-TD
>From: "J.A. Terranson"
>To: "cypherpunks at al-qaeda.net"
>Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th (fwd)
>Date: Mon, 9 May 2005 19:46:34 -0500 (CDT)
>
>---------- Forwarded message ----------
>Date: Mon, 9 May 2005 17:45:35 -0700 (PDT)
>From: marc guttman
>Reply-To: rationalchatter at yahoogroups.com
>To: rationalchatter at yahoogroups.com, thefamilyguttman at yahoogroups.com
>Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th
>
>This is an interesting trial. Men with guns.
>
>Tessa and Larken Rose may be sent to jail.
>
>Watch 3 min. - video - http://www.861.info/tessa.html
>
>Trial starts July 11th. There is a petition to encourage that it be
>videotaped.
>
>
>
>
>---------------------------------
>Yahoo! Mail
> Stay connected, organized, and protected. Take the tour
From camera_lumina at hotmail.com Mon May 9 18:14:50 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Mon, 09 May 2005 21:14:50 -0400
Subject: [Politech] Passport RFID tracking: a between-the-lines read
[priv] (fwd from declan@well.com)
In-Reply-To: <20050509220133.GH1433@leitl.org>
Message-ID:
I dunno...I don't see a ton of Leitl stuff on the al-qaeda node. That which
does come through seems fairly relevant. I'm thinking Choate and RAH are
tsk-ing his failed attempt at pure stream-of-consciousness posting.
-TD
>From: Eugen Leitl
>To: cypherpunks at al-qaeda.net
>Subject: Re: [Politech] Passport RFID tracking: a between-the-lines read
>[priv] (fwd from declan at well.com)
>Date: Tue, 10 May 2005 00:01:33 +0200
>
>On Mon, May 09, 2005 at 12:13:18PM -0700, cypherpunk wrote:
>
> > And of course there is Eugen* Leitl, who mindlessly forwards far and
> > wide everything that enters his mailbox. I don't know whether we
>
>Consider me bitten by Choate. It's totally incurable.
>
> > should be annoyed or relieved that he fails to exercise the slightest
> > editorial effort by adding his own thoughts, if he has any, to the
> > material he passes around.
>
>I don't need the list. Goddamn heise has more cypherpunk content than the
>list. Tim May's tired trolls have more cypherpunk content than the list.
>
>I'm trying to keep it going by keeping a steady trickle of relevant info
>but
>I'm honestly wondering if it's worth the effort.
>
>If you think I'm going to add editing effort, thus cutting some 10 minutes
>out
>of
>my already busy day you're out of your fucking mind.
>
>If you want high quality content, post it yourself.
>
>--
>Eugen* Leitl leitl
>______________________________________________________________
>ICBM: 48.07078, 11.61144 http://www.leitl.org
>8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
>http://moleculardevices.org http://nanomachines.net
>
>[demime 1.01d removed an attachment of type application/pgp-signature which
>had a name of signature.asc]
From DRAGDEPCOCRBX at abnormalbehaviorchild.com Mon May 9 16:38:49 2005
From: DRAGDEPCOCRBX at abnormalbehaviorchild.com (Tracy North)
Date: Mon, 09 May 2005 21:38:49 -0200
Subject: Start shagging more frequently with the wonder pill
Message-ID: <1026622284.839.1.camel@azrael>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 753 bytes
Desc: not available
URL:
From justin-cypherpunks at soze.net Mon May 9 15:24:05 2005
From: justin-cypherpunks at soze.net (Justin)
Date: Mon, 9 May 2005 22:24:05 +0000
Subject: [IP] Real ID = National ID (fwd from dave@farber.net)
In-Reply-To: <20050509195526.GB15693@arion.soze.net>
References: <20050504172158.GA6782@leitl.org>
<792ce437050509122249cbc9f3@mail.gmail.com>
<20050509195526.GB15693@arion.soze.net>
Message-ID: <20050509222405.GA16520@arion.soze.net>
On 2005-05-09T19:55:26+0000, Justin wrote:
> What do we need "security" for? We need security because a lot of
> people hate the U.S., and because we won't close our borders, and
Apparently I have not learned any lessons from the follies of a certain
California governor.
By close the borders, I mean secure the borders against illegal
immigration. I have no interest in doing away with immigration.
From eugen at leitl.org Mon May 9 15:01:33 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Tue, 10 May 2005 00:01:33 +0200
Subject: [Politech] Passport RFID tracking: a between-the-lines read
[priv] (fwd from declan@well.com)
In-Reply-To: <792ce437050509121379fb60f1@mail.gmail.com>
References: <20050504085745.GK6782@leitl.org>
<792ce437050509121379fb60f1@mail.gmail.com>
Message-ID: <20050509220133.GH1433@leitl.org>
On Mon, May 09, 2005 at 12:13:18PM -0700, cypherpunk wrote:
> And of course there is Eugen* Leitl, who mindlessly forwards far and
> wide everything that enters his mailbox. I don't know whether we
Consider me bitten by Choate. It's totally incurable.
> should be annoyed or relieved that he fails to exercise the slightest
> editorial effort by adding his own thoughts, if he has any, to the
> material he passes around.
I don't need the list. Goddamn heise has more cypherpunk content than the
list. Tim May's tired trolls have more cypherpunk content than the list.
I'm trying to keep it going by keeping a steady trickle of relevant info but
I'm honestly wondering if it's worth the effort.
If you think I'm going to add editing effort, thus cutting some 10 minutes out
of
my already busy day you're out of your fucking mind.
If you want high quality content, post it yourself.
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From MNADBRPBU at msn.com Mon May 9 18:30:59 2005
From: MNADBRPBU at msn.com (Maria Pitts)
Date: Tue, 10 May 2005 02:30:59 +0100
Subject: Software Stores Clearance Sale jK
Message-ID: <389z7fzlsc.fsf@calle24.net>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 257 bytes
Desc: not available
URL:
From measl at mfn.org Tue May 10 06:53:31 2005
From: measl at mfn.org (J.A. Terranson)
Date: Tue, 10 May 2005 08:53:31 -0500 (CDT)
Subject: Jesus Christ Meets "Your Papers Please" (fwd)
Message-ID: <20050510085320.M32459@ubzr.zsa.bet>
If you think this is stupid, just wait till the "Real ID Act" takes
effect.
--
Yours,
J.A. Terranson
sysadmin at mfn.org
0xBD4A95BF
"What this country needs is a good old fashioned nuclear enema."
http://www.cnn.com/2005/LAW/05/10/jesus.lawsuit.ap/index.html
Jesus Christ in legal battle to get license
Tuesday, May 10, 2005 Posted: 7:58 AM EDT (1158 GMT)
CHARLESTON, West Virginia (AP) -- Even Jesus Christ can't circumvent the
rules for getting a driver's license in West Virginia.
Attempts to prove his name really is Christ have led the man born as Peter
Robert Phillips Jr. through a lengthy legal battle and a recent victory in
the District of Columbia Court of Appeals.
"This all started with him expressing his faith and his respect and love
for Jesus Christ," attorney A.P. Pishevar told The Associated Press. "Now
he needs to document it for legal reasons."
Described by his attorney as a white-haired businessman in his mid-50s,
Christ is moving to West Virginia to enjoy a slower lifestyle. He bought
property near Lost River, about 100 miles west of Washington, and has a
U.S. passport, Social Security card and Washington driver's license
bearing the name Jesus Christ.
But he still falls short of West Virginia title and license transfer
requirements because his Florida birth certificate has his original name
on it and he has been unable to obtain an official name change in
Washington.
"We just need official documentation that that's his name," said Doug
Stump, commissioner of the West Virginia Division of Motor Vehicles. "He
will be treated no different than anybody else."
Christ applied for the legal name change in May 2003, but it was denied by
District of Columbia Superior Court Judge Tim Murphy because "taking the
name of Jesus Christ may provoke a violent reaction or may significantly
offend people."
In his appeal, Christ's attorney argued that Phillips had changed his name
to Jesus Christ 15 years earlier, and "has been using the name since then
without incident."
The appeals court last month sent the name-change proposal back to the
lower court, saying some required hearings in the case had not been held.
Any comment from the man in the middle of this legal tussle?
"Christ is not speaking to the press at this time," Pishevar said.
From camera_lumina at hotmail.com Tue May 10 09:03:06 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Tue, 10 May 2005 12:03:06 -0400
Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th
(fwd)
In-Reply-To:
Message-ID:
Yeah...it's pretty fuckin' pointless. Tantamount to proving a guy pointing a
gun at you is actually pointing a gun at you, TO the guy pointing the gun at
you.
-TD
>From: "Gil Hamilton"
>To: cypherpunks at al-qaeda.net
>Subject: Re: [rationalchatter] Interesting Trial - IRS trial - July 11th
>(fwd)
>Date: Tue, 10 May 2005 12:40:17 +0000
>
>>---------- Forwarded message ----------
>>Date: Mon, 9 May 2005 17:45:35 -0700 (PDT)
>>From: marc guttman
>>Reply-To: rationalchatter at yahoogroups.com
>>To: rationalchatter at yahoogroups.com, thefamilyguttman at yahoogroups.com
>>Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th
>>
>>This is an interesting trial. Men with guns.
>>
>>Tessa and Larken Rose may be sent to jail.
>>
>>Watch 3 min. - video - http://www.861.info/tessa.html
>>
>>Trial starts July 11th. There is a petition to encourage that it be
>>videotaped.
>
>While anyone can empathize with their desire not to pay taxes and
>many of us can even disagree with the moral justification for taxes,
>these people are idiots. Their entire case boils down to quibbles
>over arguably poorly worded regulations. And even if you take their
>argument at face value, if you go read the sections of the Code of
>Federal Regulations they cite, they're just plain wrong: they're willfully
>misreading the plain language of the regulations. (Okay, "plain
>language" is probably not the right phrase to apply to any part of
>the CFR, but...)
>
>They're definitely going down; probably to jail, but at the least they'll
>be subject to massive fines, property seizures, etc.
>
>"Nothing to see here, folks; move along."
>
>GH
>
>_________________________________________________________________
>Express yourself instantly with MSN Messenger! Download today - it's FREE!
>http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/
From gil_hamilton at hotmail.com Tue May 10 05:40:17 2005
From: gil_hamilton at hotmail.com (Gil Hamilton)
Date: Tue, 10 May 2005 12:40:17 +0000
Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th
(fwd)
Message-ID:
>---------- Forwarded message ----------
>Date: Mon, 9 May 2005 17:45:35 -0700 (PDT)
>From: marc guttman
>Reply-To: rationalchatter at yahoogroups.com
>To: rationalchatter at yahoogroups.com, thefamilyguttman at yahoogroups.com
>Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th
>
>This is an interesting trial. Men with guns.
>
>Tessa and Larken Rose may be sent to jail.
>
>Watch 3 min. - video - http://www.861.info/tessa.html
>
>Trial starts July 11th. There is a petition to encourage that it be
>videotaped.
While anyone can empathize with their desire not to pay taxes and
many of us can even disagree with the moral justification for taxes,
these people are idiots. Their entire case boils down to quibbles
over arguably poorly worded regulations. And even if you take their
argument at face value, if you go read the sections of the Code of
Federal Regulations they cite, they're just plain wrong: they're willfully
misreading the plain language of the regulations. (Okay, "plain
language" is probably not the right phrase to apply to any part of
the CFR, but...)
They're definitely going down; probably to jail, but at the least they'll
be subject to massive fines, property seizures, etc.
"Nothing to see here, folks; move along."
GH
_________________________________________________________________
Express yourself instantly with MSN Messenger! Download today - it's FREE!
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/
From justin-cypherpunks at soze.net Tue May 10 12:19:06 2005
From: justin-cypherpunks at soze.net (Justin)
Date: Tue, 10 May 2005 19:19:06 +0000
Subject: Jesus Christ Meets "Your Papers Please" (fwd)
In-Reply-To: <20050510085320.M32459@ubzr.zsa.bet>
References: <20050510085320.M32459@ubzr.zsa.bet>
Message-ID: <20050510191906.GA24814@arion.soze.net>
On 2005-05-10T08:53:31-0500, J.A. Terranson wrote:
> If you think this is stupid, just wait till the "Real ID Act" takes
> effect.
There is already a Jesus Christ living in D.C. If it's legal for
someone named Jesus Christ to move to D.C., it should be legal for a
D.C. resident or no-longer resident to change his name to Jesus Christ.
It's not technically an equal protection issue, but it strikes me as
being some sort of discrimination. That doesn't stop a lot of states
from passing discriminatory laws, though, as long as the particular
discrimination being sought isn't listed in the CRA.
Jesus Christ - (202) 543-9498 - , Washington, DC 20001
and other states:
Jesus Christ - (310) 458-9440 - 1328 Euclid St, Santa Monica, CA 90404
Jesus A Christ - (207) 374-2175 - 19 Harborview Ct, Blue Hill, ME 04614
This may be the Jesus Christ in question:
Jesus Christ - (304) 897-7727 - , Lost City, WV 26810
> http://www.cnn.com/2005/LAW/05/10/jesus.lawsuit.ap/index.html
>
> Jesus Christ in legal battle to get license
>
> Tuesday, May 10, 2005 Posted: 7:58 AM EDT (1158 GMT)
>
> CHARLESTON, West Virginia (AP) -- Even Jesus Christ can't circumvent the
> rules for getting a driver's license in West Virginia.
>
> ...
> Described by his attorney as a white-haired businessman in his mid-50s,
> Christ is moving to West Virginia to enjoy a slower lifestyle. He bought
> property near Lost River, about 100 miles west of Washington, and has a
> U.S. passport, Social Security card and Washington driver's license
> bearing the name Jesus Christ.
>
> But he still falls short of West Virginia title and license transfer
> requirements because his Florida birth certificate has his original name
> on it and he has been unable to obtain an official name change in
> Washington.
I don't understand this. Washington D.C. doesn't handle birth
certificates for people born in Florida. All of his federal
documentation lists Jesus Christ as his name. Why is the problem in
D.C.? It seems to me to be a little late for the brainless in
Washington to try to put a lid on this. They should have done that when
he got his SS card, passport, or driver's license.
I'm somewhat interested in how he got his SS card, passport, and drivers
license in a different name than was on his birth certificate. If he's
only been using the name for 17 years, that puts both acquisitions at
1988 or later. Maybe decades before that it would have been possible,
but how could he have gotten away with it so recently?
From kelsey.j at ix.netcom.com Wed May 11 07:45:17 2005
From: kelsey.j at ix.netcom.com (John Kelsey)
Date: Wed, 11 May 2005 10:45:17 -0400 (GMT-04:00)
Subject: [IP] Real ID = National ID (fwd from dave@farber.net)
Message-ID: <9979982.1115822717872.JavaMail.root@scooter.psp.pas.earthlink.net>
>From: Justin
>Sent: May 9, 2005 3:55 PM
>To: cypherpunks at al-qaeda.net
>Subject: Re: [IP] Real ID = National ID (fwd from dave at farber.net)
...
>What do we need "security" for? We need security because a lot of
>people hate the U.S., and because we won't close our borders, and
>because society has become too diverse.
Drivers license security is being pursued because a bunch of people
want to be able to reliably use drivers licenses as ID cards for their
own purposes. That can be for TSA screening of passneger names
(though I think it's fantasy to imagine that this will really prevent
terrorists from flying, and it has endless creepy totalitarian uses),
or for making it harder to get a bank account without submitting your
true name so you get taxed and monitored, or making it easier for
the folks running various "preferred shopper" card programs to make
you give them the right information, or keeping you from reselling
your airline tickets. (Note that the whole market segmentation/price
discrimination scheme that this threatened has basically died by now,
but we're still stuck with binding names to airline tickets.)
>There is a significant correlation between cultural
>diversity/proximity and social unrest. That does not require people
>of different races; put white klansmen next to white members of the
>Black Panthers and you have the same thing.
This is *very* dependent on the cultures in question. For the most
part, Japanese and Korean immigrants (to take a couple easy examples)
make wonderful neighbors, though they're members of a different race
and culture and often a different religion. On the other hand, turn
of the century Irish immigrants were English-speaking Christians, but
they made nightmarish neighbors. And neither of those have much to do
with terrorism (as opposed to low-level crime, public drunkenness,
imported criminal gangs, etc.). The Irish in the US have never been
much of a terrorist threat, though things are very different in the
UK!
>None of those three core problems will be solved by RealID.
>Therefore, while RealID may make some difference at the margins, it
>cannot be very effective.
Well, it depends on what your goal is. If your goal is
harder-to-forge drivers licenses for all kinds of good and bad
purposes, then it may help. If your goal is seriously stopping
terrorism or shutting down illegal immigration, it probably won't have
much of an impact.
--John
From gqgbpsjhcn at dantecubillas.com Wed May 11 01:16:14 2005
From: gqgbpsjhcn at dantecubillas.com (Williams Pack)
Date: Wed, 11 May 2005 12:16:14 +0400
Subject: Erectile Dysfunction ruining your sex life?
Message-ID: <85F743B-602065CB0118@mac.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 749 bytes
Desc: not available
URL:
From steve49152 at yahoo.ca Wed May 11 11:51:38 2005
From: steve49152 at yahoo.ca (Steve Thompson)
Date: Wed, 11 May 2005 14:51:38 -0400 (EDT)
Subject: [rationalchatter] Interesting Trial - IRS trial - July 11th
(fwd)
In-Reply-To: 6667
Message-ID: <20050511185138.70650.qmail@web51810.mail.yahoo.com>
--- Tyler Durden wrote:
> Yeah...it's pretty fuckin' pointless. Tantamount to proving a guy
> pointing a
> gun at you is actually pointing a gun at you, TO the guy pointing the
> gun at
> you.
Oh, I don't know about that.
What about proving that someone is pointing a [gun] at you, who has
already lets you know he's pointing a [gun] at you via deniable means of
some kind, but who categorically denies such when asked about it directly.
In that vague scenario, I would imagine that there is some utility in
proving conclusively that someone is pointing a [gun] at you if only to
warn others around you about the threat.
I, of course, live a similar scenario. The main difference is that it is
a group with a somewhat unethical agenda that poses the threat, and who
swear up and down that (a) they are all really, really nice people, and
(b) that they have no actual interest in my affairs. Both assertions are
quite false, but proving it is another matter -- and difficult too, given
the ignorance and stupidity currently in fashion at the moment.
But I don't mean to provoke an off-topic discussion in this thread.
Please do carry on.
Regards,
Steve
______________________________________________________________________
Post your free ad now! http://personals.yahoo.ca
From camera_lumina at hotmail.com Wed May 11 12:29:53 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Wed, 11 May 2005 15:29:53 -0400
Subject: Terrorist-controlled cessna nearly attacks washington
In-Reply-To:
Message-ID:
>new terrorist target: Union Station
You used a remailer for THAT?!!
-TD
From pqffsiabo at freehongkong.com Wed May 11 15:07:50 2005
From: pqffsiabo at freehongkong.com (Joel Forbes)
Date: Wed, 11 May 2005 17:07:50 -0500
Subject: HOME & 0FF1CE Computer Software
In-Reply-To:
References:
Message-ID: <507278548948.UQW93350@freewebemail.com>sundial.dost.com>
Half price Other Microsoft software
Bundle 1:
WiNDoWS X.P Pro + oFFiCE X.P Pro ~ 8o$
Pirated office Software is dangerous
Bundle 2:
Macromedia Dreamwaver MX 2oo4 + Flash MX 2oo4 - 1oo Dollars
Clearence sale:
Bundle 3:
Adobe Photoshop 7, Premiere 7, illustrator 1o - 12o Dollars
More information: http://offset.gaulhafmk.com
The offer is valid Untill May 17th
Stock is limited
kind regards,
Clayton Padilla
Herald
eBioscience, San Diego, 92121, United States of America
Phone: 813-477-4519
Mobile: 217-679-4431
Email: pqffsiabo at freehongkong.com
THIS IS AN AUTO-GENERATED MESSAGE - PLEASE DO NOT REPLY TO THIS MESSAGE
This package is a 64 hour usage shareware
NOTES:
The contents of this note is for comprehension and should not be quackery abigail
apropos albert gallon
Time: Thu, 12 May 2005 00:08:10 +0200
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1316 bytes
Desc: not available
URL:
From bill.stewart at pobox.com Wed May 11 18:42:09 2005
From: bill.stewart at pobox.com (Bill Stewart)
Date: Wed, 11 May 2005 18:42:09 -0700
Subject: Terrorist-controlled cessna nearly attacks washington
In-Reply-To:
References:
Message-ID: <6.2.1.2.0.20050511184126.02cd2e88@pop.idiom.com>
Sigh. "Terrified Student Pilot" isn't the same as "Terrorist".
From mixmaster at remailer.privacy.at Wed May 11 12:19:31 2005
From: mixmaster at remailer.privacy.at (privacy.at Anonymous Remailer)
Date: Wed, 11 May 2005 21:19:31 +0200 (CEST)
Subject: Terrorist-controlled cessna nearly attacks washington
Message-ID:
http://reuters.myway.com/article/20050511/2005-05-11T173816Z_01_N11199658_RTRIDST_0_NEWS-SECURITY-WASHINGTON-DC.html
> WASHINGTON (Reuters) - Fighter jets scrambled over Washington and
> authorities hurriedly evacuated the White House and the U.S. Congress
> on Wednesday when an unidentified plane roamed into restricted
> airspace, sparking fears of a Sept. 11-style attack.
>
> The light private Cessna ignored calls from air traffic controllers and
> entered the restricted zone around Washington, coming within 3 miles of
> the Capitol before turning away, authorities said.
>
> The plane's approach sent at least two F-16 fighter jets into the air
> over the U.S. capital and hundreds of staff and tourists into the
> streets outside the Capitol building, White House and Supreme Court in
> an urgent evacuation.
[...]
> Capitol police swiftly moved senators, aides, lobbyists and
> journalists toward Union Station, about two blocks away. Police used
> bullhorns to order onlookers near the Capitol to "stay away from the
> building."
new terrorist target: Union Station
From mixmaster at remailer.privacy.at Wed May 11 15:58:47 2005
From: mixmaster at remailer.privacy.at (privacy.at Anonymous Remailer)
Date: Thu, 12 May 2005 00:58:47 +0200 (CEST)
Subject: Terrorist-controlled cessna nearly attacks washington
In-Reply-To:
Message-ID:
> >new terrorist target: Union Station
>
> You used a remailer for THAT?!!
You used a pseudonym for THAT?!
From absmbzhfiry at janur.jnj.com Thu May 12 07:16:06 2005
From: absmbzhfiry at janur.jnj.com (Annie Hurd)
Date: Thu, 12 May 2005 07:16:06 -0700
Subject: The mighty cucumber lives again!
Message-ID: <1.69722.3132363037393934.7@ientrynetwork.net>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 826 bytes
Desc: not available
URL:
From sunder at sunder.net Thu May 12 10:59:42 2005
From: sunder at sunder.net (sunder)
Date: Thu, 12 May 2005 13:59:42 -0400
Subject: Terrorist-controlled cessna nearly attacks washington
In-Reply-To: <6.2.1.2.0.20050511184126.02cd2e88@pop.idiom.com>
References:
<6.2.1.2.0.20050511184126.02cd2e88@pop.idiom.com>
Message-ID: <4283998E.5070004@sunder.net>
Bill Stewart wrote:
> Sigh. "Terrified Student Pilot" isn't the same as "Terrorist".
>
Yeah, but they both start with the same four letters and sound alike,
which seems to be the attention span of those who are afraid of the
boogie man and consequentially imagine they see him under every rock, or
bush.
From berrin at redrival.net Thu May 12 15:07:12 2005
From: berrin at redrival.net (clement carpenter)
Date: Thu, 12 May 2005 16:07:12 -0600
Subject: natural enlargement
Message-ID:
I've been using your product for 4 months now. I've increased my length from
2 inches
to nearly 6 inches. Your product has saved my sex life.-Matt, FL
My girlfriend loves the results, but she doesn't know what I do. She thinks
it's natural-Thomas, CA
Pleasure your partner every time with a bigger, longer, stronger Unit
Realistic gains quickly
http://vtb.a1y.madereserve.com/c/
to be a stud press here
While considering this suggestion Rob remembered how at one time five
pirates had clung to his left leg and been carried some distance through the
air
Didn't you feel the ground shake? Yes; but we're used to such things in
California, he replied
Have you a rope? he asked
i am busy, no thank you, go above
From Apple2Remailer at bigapple.dynalias.net Thu May 12 13:13:14 2005
From: Apple2Remailer at bigapple.dynalias.net (Anonymous)
Date: 12 May 2005 20:13:14 -0000
Subject: Terrorist-controlled cessna nearly attacks washington
Message-ID:
You wrote:
> >new terrorist target: Union Station
>
>
> You used a remailer for THAT?!!
So what if he did?
There's no requirement that people say insignificant stuff under their real
name or real alias.
From pzuxz at aude.org Fri May 13 02:57:48 2005
From: pzuxz at aude.org (Ella Judd)
Date: Fri, 13 May 2005 04:57:48 -0500
Subject: Sale
In-Reply-To:
References:
Message-ID: <356538123822.WUT18349@cais.com>berkshire.worldaccessnet.com>
P.C S0FTWARE 75%.OFF
Unbelievable Deals like:
Microsoft office X.P Pro 2oo2 ................. 6o Dollars
Windows X.P Pro 2oo2 .............. 5o Dollars
learn More: http://dreadnought.gaulhafmk.com
We Also Have:
Adobe Photoshop 7.o ............................. 6o Dollars
Corel Draw 11 ................................... 6o Dollars
The offer is valid Untill May 10th
Stock is limited
confirm your adress
Bruce Acevedo
Nailor
ADIATEC, 44000 Nantes France, France
Phone: 216-914-8374
Mobile: 277-615-7727
Email: pzuxz at aude.org
THIS IS AN AUTO-GENERATED MESSAGE - PLEASE DO NOT REPLY TO THIS MESSAGE
This version is a 97 month definite file
NOTES:
The contents of this paper is for attention and should not be conjunct cowslip
formal furlough contemporary
Time: Fri, 13 May 2005 11:57:40 +0200
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1369 bytes
Desc: not available
URL:
From shytlbp at hotmail.com Fri May 13 04:05:29 2005
From: shytlbp at hotmail.com (Bethany Fields)
Date: Fri, 13 May 2005 09:05:29 -0200
Subject: Via-ggra is Lousy %RANDOMCHAR
Message-ID: <5294B67C.6434007@duration.peternixon.net>
"Ci-ialis Softabs" is better than Pfizer Viiagrra
and normal Ci-ialis because:
- Guaaraantees 36 hours lasting
- Safe to take, no side effects at all
- Boost and increase se-xual performance
- Haarder e-rectiions and quick recharge
- Proven and certified by experts and doctors
- only $3.99 per tabs
Cllick heree:
http://liverymen.com/cs/?ronn
o-ut of mai-lling lisst:
http://liverymen.com/rm.php?ronn
%RANDOMCHAR
From camera_lumina at hotmail.com Fri May 13 08:02:39 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Fri, 13 May 2005 11:02:39 -0400
Subject: Terrorist-controlled cessna nearly attacks washington
In-Reply-To:
Message-ID:
Relax, dude. It was a joke.
The point was that in the US there's hardly anyone (TLAs included) that
would not have snickered at the original joke, given the brood that was
holed up in Union Station.
-TD
>From: Anonymous
>To: cypherpunks at al-qaeda.net
>Subject: RE: Terrorist-controlled cessna nearly attacks washington
>Date: 12 May 2005 20:13:14 -0000
>
>You wrote:
>
> > >new terrorist target: Union Station
> >
> >
> > You used a remailer for THAT?!!
>
>So what if he did?
>
>There's no requirement that people say insignificant stuff under their real
>name or real alias.
From qqsxbfsoi at free.fr Fri May 13 09:17:01 2005
From: qqsxbfsoi at free.fr (Justin Singer)
Date: Fri, 13 May 2005 11:17:01 -0500
Subject: Pyongyang Review - Inspection revealing best operating system
In-Reply-To:
References:
Message-ID: <532185981392.ECY00376@x263.net>rafael.gate99.nl>
NEED A NEW OPERATING SYSTEM?
Check out these amazing offers:
WiNDoWS X'P Pro + oFFiCE X'P Pro >>> 8o$
MoRE HERE: http://oppenheimer.gaulhafmk.com
The offer is valid Untill May 16th
Stock is limited
your bankofamerica account
Consuelo Mcneil
Censor
Canadian Biotech News, Nepean, Ontario K2H 9P4, Canada
Phone: 271-851-4797
Mobile: 247-344-1987
Email: qqsxbfsoi at free.fr
THIS IS AN AUTO-GENERATED MESSAGE - PLEASE DO NOT REPLY TO THIS MESSAGE
This shareware is a 71 day usage product
NOTES:
The contents of this connection is for usage and should not be evildoer dare
director bodybuilding dewdrop
Time: Fri, 13 May 2005 18:16:41 +0200
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1012 bytes
Desc: not available
URL:
From fzswjcxl at newhometx.com Fri May 13 18:59:21 2005
From: fzswjcxl at newhometx.com (Sherrie Blevins)
Date: Sat, 14 May 2005 02:59:21 +0100
Subject: Are you a 2 pump chump? Go all night and drive her crazy!
Message-ID: <1026622284.210.1.camel@azrael>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 663 bytes
Desc: not available
URL:
From futgnjzncwgywi at aude.org Sat May 14 03:35:43 2005
From: futgnjzncwgywi at aude.org (Helena Richmond)
Date: Sat, 14 May 2005 05:35:43 -0500
Subject: Fort*de*France Reporter - paper about windows service pack 2
In-Reply-To:
References:
Message-ID: <095410235453.ZYO98026@funkytiger.co.uk>significant.callsign.net>
Legal operating systems summer*s@|e
ToP Brand Software at Low Prices such As:
Bundle 1:
WiNDoWS X*P Pro + oFFiCE X*P Pro for as low as 8o Dollars
Get info: http://credible.gaulhafmk.com
Bundle 2:
Macromedia Dreamwaver MX 2oo4 + Flash MX 2oo4 - 1oo Dollars
Bundle 3:
Adobe Photoshop 7, Premiere 7, illustrator 1o - 12o Dollars
The offer is valid Untill May 15th
Stock is limited
thanks
Bradley Strickland
Almoner
CassCo-Bio, Steelville 65565, United States of America
Phone: 513-573-8744
Mobile: 574-112-4128
Email: futgnjzncwgywi at aude.org
please do not reply to this message
This software is a 25 minute definite version
NOTES:
The contents of this information is for attention and should not be bessel individualism
newsreel uplift ohm
Time: Sat, 14 May 2005 12:35:05 +0200
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1211 bytes
Desc: not available
URL:
From vgdgalt at gate99.nl Sat May 14 05:36:48 2005
From: vgdgalt at gate99.nl (Bruno Bryant)
Date: Sat, 14 May 2005 07:36:48 -0500
Subject: Cypherpunks : Cincinnati Journal - article pertaining Sexual productivity
Message-ID: <469127034001.VJW68852@c3ntris.com>
Incredible Offers
V,I,A,G,R,A 1oo m,g 3o PillS 59,99
Full information : viagra
We Also have:
U,L,T,R,A,M 1oo m,g 3o PillS 49,99
P,R,O,P,E,C,I,A 1 m,g 9o PillS 99,99
Same Day Shipping
your password has expired
Ora Soto
Quarreler
Dutch Diagnostics Human and Animal Care, Zutphen 7203 AH, Netherlands
Phone: 735-482-1611
Mobile: 166-141-3281
Email: vgdgalt at gate99.nl
This is a confirmation message
This package is a 88 second usage product
NOTES:
The contents of this e-mail is for manipulation and should not be antiquity rectify
brennan enos armpit
Time: Sat, 14 May 2005 14:36:09 +0200
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1225 bytes
Desc: not available
URL:
From nuhars at strechy-plus.cz Sat May 14 04:33:54 2005
From: nuhars at strechy-plus.cz (Bob Ziegler)
Date: Sat, 14 May 2005 08:33:54 -0300
Subject: new, better then ever
Message-ID: <750z7fzlsc.fsf@calle11.net>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 585 bytes
Desc: not available
URL:
From sw-office at wolfram.com Sat May 14 07:28:14 2005
From: sw-office at wolfram.com (Stephen Wolfram)
Date: Sat, 14 May 2005 09:28:14 -0500
Subject: Three Years of A New Kind of Science
Message-ID: <200505141428.j4EESE89005493@mercury.wolfram.com>
Today it is three years since I published my book A New Kind of
Science. It seems like a lot longer than that--so much has
happened in the intervening time. What started as a book is
steadily emerging as a major intellectual movement with its own
structure and community.
The first year after the book came out was dominated by a
certain amount of "paradigm shift turbulence." But by the second
year, many serious projects were starting, and indicators like
the publication rate of NKS-based papers began to climb.
Now, in the third year, a recurring theme has been the emergence
of a growing group of exceptional individuals who are planning
to base their careers on NKS. There are scores of NKS-based
Ph.D. theses underway, and all sorts of NKS-based corporate
ventures--as well as our own growing NKS R&D operation in
Boston.
Later this year, the first full-length independent book based on
NKS will be published, and the first independent NKS conference
will be held. In late June, we will be holding our third annual
NKS Summer School--for which there were a record number of
exceptional applicants. We are planning to have our next major
NKS conference in spring 2006; we'll be announcing the details
shortly. There will also be an NKS mini-course at our Wolfram
Technology Conference this October.
This year I myself have mostly been in a tool-building phase,
working on major new Mathematica technology that, among other
things, will be very important for NKS research--and which I
can't wait to use.
There's a lot more in the pipeline too. We're developing plans
for a new kind of publishing medium for NKS (partly based on the
Complex Systems journal that I've been publishing since 1986).
We're also planning later this year to start regular "live
experiments," in which I'll be leading public web-conferenced
explorations into the computational universe.
Also in the next few months we're planning to release a rather
unexpected consumer-oriented application of NKS, which I expect
we'll all be hearing quite a bit about.
As we begin the fourth year of NKS, I feel more optimistic than
ever before about its promise--and its significance in science,
technology, the arts, and beyond. It will be fascinating to see
where the most important NKS-based breakthroughs come from, and
what they will be.
I hope you'll have the opportunity to take part in the
excitement of the upcoming years of early NKS growth.
-- Stephen Wolfram
http://www.wolframscience.com
From pantosys at gmail.com Sat May 14 16:07:17 2005
From: pantosys at gmail.com (Joseph Holsten)
Date: Sat, 14 May 2005 18:07:17 -0500
Subject: /. [Dissidents Seeking Anonymous Web Solutions?]
In-Reply-To: <873a03a605051416044b5a8e56@mail.gmail.com>
References: <20050515175945.GQ23917@leitl.org>
<873a03a605051416044b5a8e56@mail.gmail.com>
Message-ID: <873a03a605051416074e38ca21@mail.gmail.com>
I told him to how to find his answers and to try finding us. Let's
hope he's actually motivated.
--
Joseph Anthony Pasquale Holsten
5813 E 64 PL TULSA OK 74136
PANTOSYS at GMAIL.COM
857-891-7585
Eugen: oops
From IJFHQJY at d3bn.nl Sat May 14 13:29:53 2005
From: IJFHQJY at d3bn.nl (April Shaw)
Date: Sat, 14 May 2005 21:29:53 +0100
Subject: Boing... (the sound produced by a little pill)
Message-ID: <11D6-8A1D8650E4C59064@apple20.mhpcc.edu>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 654 bytes
Desc: not available
URL:
From julieKoch69 at papa-chico.be Sat May 14 13:44:26 2005
From: julieKoch69 at papa-chico.be (Julie Denton)
Date: Sat, 14 May 2005 23:44:26 +0300
Subject: it`s julie :)
Message-ID: <151.02e558d5.2a9WUK44@sol.com>
I'm new, it's Julie :) Alot of the times I feel weird, even my girlfriends told me that .... old time friend suggested
to put my hot videos somehow online. My website is like my new hobby :D AllCome check website I put together, I'm not that good tho with comp skills yet but tell me what you think ;0
http://www.foursamurais.com/ju18/
you wherewithal me eavesdropped me you hutchins me beresford me you dais me fantasia me you delilah me easy me
you curvilinear me chastise me you kettle me fulton me you commutate me statler me you marcel me with me
From uipasowvhiclq at funkytiger.co.uk Sun May 15 00:00:28 2005
From: uipasowvhiclq at funkytiger.co.uk (Monique Talley)
Date: Sun, 15 May 2005 02:00:28 -0500
Subject: Cypherpunks : Middletown The Times Post - Inspection regarding Cialis in 2005
Message-ID: <842538833359.PUO79679@worldkey.net>
Medication
C.I.A.L.I.S 2o m.g 3o PillS 119.99
Comparison Report : viagra
We Also have:
S.O.M.A 35o m.g 9o PillS 109.99
S.O.M.A 35o m.g 9o PillS 109.99
Same Day Shipping
regards,
Thelma Sherman
Abbess
FELTEN GmbH, D- 54455 Serrig, Germany
Phone: 941-414-1122
Mobile: 644-477-9724
Email: uipasowvhiclq at funkytiger.co.uk
this message is for confirmation
This file is a 59 hour usage file
NOTES:
The contents of this connection is for information and should not be death emissary
hemisphere dwarf anode
Time: Sun, 15 May 2005 08:56:06 +0200
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1268 bytes
Desc: not available
URL:
From hujadu at domainofman.com Sun May 15 00:56:36 2005
From: hujadu at domainofman.com (Pamela)
Date: Sun, 15 May 2005 05:56:36 -0200
Subject: Its time for the extra fat to go
Message-ID: <1.4.2.7.2.2005569.00b0a30@designs.com>
Body Wrap at Home to lose 6-20 inches in one hour.
With Bodywrap we guarantee:
you'll lose 6-8 Inches in one hour
100% Satisfaction or your money back
Bodywrap is soothing formula that contours,
cleanses and rejuvenates your body while
reducing inches.
http://brennan.weightlossfirm.com
barbudo xzf clarity fp laplace iyo apart kw polonium uup leech hn ehrlich yx slugging zh
acute cw sagittal nbt cowpox hx deportation bvv auspices gvz phon atl hassle axo quantitative afy
http://brennan.weightlossfirm.com/r
From lrpemiozcvqmvv at audiomusica.com Sun May 15 04:37:50 2005
From: lrpemiozcvqmvv at audiomusica.com (Stacey Donahue)
Date: Sun, 15 May 2005 06:37:50 -0500
Subject: Cypherpunks : re : oroiogist appointment tuesday at 07-00
In-Reply-To:
References:
Message-ID: <728319998050.WRE16738@cais.com>expiate.wp.pl>
Leading Drugs
C*I*A*L*I*S 2o m*g 6o PillS 209*99
o.r'd*e,r : viagra
We Also have:
L*I*P*I*T*O*R 2o m*g 6o PillS 129*99
P*R*O*P*E*C*I*A 1 m*g 6o PillS 79*99
Same Day Shipping
update your info
Marie Cope
Instructor
Reva Lab Equipments & Supplies, Vancouver, V6G 1V6, Canada
Phone: 185-788-4714
Mobile: 586-185-9445
Email: lrpemiozcvqmvv at audiomusica.com
this message is for confirmation
This software is a 53 year complementary product
NOTES:
The contents of this information is for information and should not be eigenfunction dexter
yang affine chicory
Time: Sun, 15 May 2005 13:33:24 +0200
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1192 bytes
Desc: not available
URL:
From onatfj at emsspain.com Sun May 15 09:25:35 2005
From: onatfj at emsspain.com (Krista Peterson)
Date: Sun, 15 May 2005 09:25:35 -0700
Subject: you wont find anything better Porfirio
Message-ID: <3DF4FB83.53004@ubp.edu.ar>
----- Original Message -----
From: Porfirio
To: christina1 at msn.com ; intestinalhilum at yahoo.com
;
Dear Homeowner,
Mortgage. You have been pre-approved.
You can get $243,000 for as little as $232 a month, thanks to your pre-approval.
Visit us, Fill out the form, no obligation
Pull cash out, or refinance..
No long forms or quastionnaires. Fill up our extremely short and simple form today and get a call back within a couple of hours.
Start saving now, click that link:
http://www.freedom-financial.net/2/index/bvk
benefice tgq feud zy cecil fe myrtle rd kabul qox burrow rd like qft kingbird jz
limpet sdg bryan nd taffy vhv discipline lx ouzel dj birefringent kt
http://freedom-financial.net/rem.php
From juicy at melontraffickers.com Sun May 15 18:42:41 2005
From: juicy at melontraffickers.com (A.Melon)
Date: Sun, 15 May 2005 18:42:41 -0700 (PDT)
Subject: No subject
Message-ID: <9f42703867f0f8c1c5ad7ec45465e4fe@melontraffickers.com>
===============================================================================
This is the sixth release candidate for the 0.1.0.x series. This is an
actual release candidate--it's going to be the final release if there
are no bugs--we promise. :) We fixed the last known major problems:
we don't use threading on netbsd now, and the new libevent 1.1 detects
and disables the broken kqueue that ships with OS X 10.4.0.
Libevent 1.1 also has __significant__ performance improvements if you're
using poll or select. Try it, you'll like it.
Please report any bugs, either in the installers or in Tor operation, so
we can get it perfect for an actual release: http://bugs.noreply.org/tor
http://tor.eff.org/download.html
o Bugfixes:
- Implement --disable-threads configure option. Disable threads on
netbsd by default, because it appears to have no reentrant resolver
functions.
- Apple's OS X 10.4.0 ships with a broken kqueue. The new libevent
release (1.1) detects and disables kqueue if it's broken.
- Append default exit policy before checking for implicit internal
addresses. Now we don't log a bunch of complaints on startup
when using the default exit policy.
- Some people were putting "Address " in their torrc, and they had
a buggy resolver that resolved " " to 0.0.0.0. Oops.
- If DataDir is ~/.tor, and that expands to /.tor, then default to
LOCALSTATEDIR/tor instead.
- Fix fragmented-message bug in TorControl.py.
- Resolve a minor bug which would prevent unreachable dirports
from getting suppressed in the published descriptor.
- When the controller gave us a new descriptor, we weren't resolving
it immediately, so Tor would think its address was 0.0.0.0 until
we fetched a new directory.
- Fix an uppercase/lowercase case error in suppressing a bogus
libevent warning on some Linuxes.
o Features:
- Begin scrubbing sensitive strings from logs by default. Turn off
the config option SafeLogging if you need to do debugging.
- Switch to a new buffer management algorithm, which tries to avoid
reallocing and copying quite as much. In first tests it looks like
it uses *more* memory on average, but less cpu.
- First cut at support for "create-fast" cells. Clients can use
these when extending to their first hop, since the TLS already
provides forward secrecy and authentication. Not enabled on
clients yet.
- When dirservers refuse a router descriptor, we now log its
contactinfo, platform, and the poster's IP address.
- Call tor_free_all instead of connections_free_all after forking, to
save memory on systems that need to fork.
- Whine at you if you're a server and you don't set your contactinfo.
- Implement --verify-config command-line option to check if your torrc
is valid without actually launching Tor.
- Rewrite address "serifos.exit" to "localhost.serifos.exit"
rather than just rejecting it.
===============================================================================
From eugen at leitl.org Sun May 15 10:59:45 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Sun, 15 May 2005 19:59:45 +0200
Subject: /. [Dissidents Seeking Anonymous Web Solutions?]
Message-ID: <20050515175945.GQ23917@leitl.org>
Link: http://slashdot.org/article.pl?sid=05/05/13/0250226
Posted by: Cliff, on 2005-05-13 19:38:00
from the browsing-without-regard-for-politics dept.
[1]DocMurphy asks: "I'm working with some dissidents who are looking
for ways to use the Internet from within repressive regimes. Many have
in-home Internet access, but think it too risky to participate in
pro-freedom activities on home PCs. Internet cafis are also available,
but although fairly anonymous, every machine may be infected with
keystroke loggers that give governments access to and knowledge of
'banned' sites. Dissidents not only want to remain anonymous
themselves, but also wish to not compromise the sites they access. Any
suggestions for products/procedures/systems out there making anonymous
access & publishing a reality under repressive regime run Internet
access?"
References
1. mailto:ahb_yhwh at hotmail.com
----- End forwarded message -----
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From measl at mfn.org Mon May 16 07:27:27 2005
From: measl at mfn.org (J.A. Terranson)
Date: Mon, 16 May 2005 09:27:27 -0500 (CDT)
Subject: your mail
In-Reply-To: <20050516130715.GA17062@cirrus.madduck.net>
References: <9f42703867f0f8c1c5ad7ec45465e4fe@melontraffickers.com>
<20050516130715.GA17062@cirrus.madduck.net>
Message-ID: <20050516092424.F62319@ubzr.zsa.bet>
On Mon, 16 May 2005, martin f krafft wrote:
> Did I miss some development or why exactly does cypherpunks care
> about a release candidate of libevent (or Wolfram's New Kind of
> Science for that matter)? Was I frozen for that long?
Well, lets see. I suppose I could answer either way: Yes, we care, and no
we don't. They are both true.
> Note that I am not trying to be a bitch or troll, but I am on this
> mailing list to follow the hacker culture
Then what the fuck are you doing *here*?
> and developments in privacy issues and Internet technology, not to
> learn about all kinds of tangential announcements.
Then you are in the wrong fucking place buddy. This is cpunks:
Information wants to be free and all that. Anything is postable, nothing
turned away, even trolls like you are welcome additions.
> Could someone bring me up to speed, please?
Done.
> This is not flamebait. Really not.
Then maybe you should reconsider where you hang your virtual hat a little
more carefully in the future.
--
Yours,
J.A. Terranson
sysadmin at mfn.org
0xBD4A95BF
"That bitch needs to learn proper Road Rage Etiquitte.
Never give up."
Me on 14 April 05, on I270, doing about 90mph and
realizing the girl I had been toying with for the
last 20 miles had decided safer was better than.
From skquinn at speakeasy.net Mon May 16 08:36:53 2005
From: skquinn at speakeasy.net (Shawn K. Quinn)
Date: Mon, 16 May 2005 10:36:53 -0500
Subject: your mail
In-Reply-To: <20050516130715.GA17062@cirrus.madduck.net>
References: <9f42703867f0f8c1c5ad7ec45465e4fe@melontraffickers.com>
<20050516130715.GA17062@cirrus.madduck.net>
Message-ID: <1116257813.15303.1.camel@xevious>
On Mon, 2005-05-16 at 15:07 +0200, martin f krafft wrote:
> > This is the sixth release candidate for the 0.1.0.x series. This is an
>
> Did I miss some development or why exactly does cypherpunks care
> about a release candidate of libevent (or Wolfram's New Kind of
> Science for that matter)? Was I frozen for that long?
This is actually a release announcement for Tor 0.1.0.0-rc6 that was not
labeled as such, posted through the randseed Mixmaster remailer.
To the schmuck that posted the original: make it clearer next time, with
a clear subject line.
--
Shawn K. Quinn
From madduck at madduck.net Mon May 16 06:07:15 2005
From: madduck at madduck.net (martin f krafft)
Date: Mon, 16 May 2005 15:07:15 +0200
Subject: your mail
In-Reply-To: <9f42703867f0f8c1c5ad7ec45465e4fe@melontraffickers.com>
References: <9f42703867f0f8c1c5ad7ec45465e4fe@melontraffickers.com>
Message-ID: <20050516130715.GA17062@cirrus.madduck.net>
> This is the sixth release candidate for the 0.1.0.x series. This is an
Did I miss some development or why exactly does cypherpunks care
about a release candidate of libevent (or Wolfram's New Kind of
Science for that matter)? Was I frozen for that long?
Note that I am not trying to be a bitch or troll, but I am on this
mailing list to follow the hacker culture and developments in
privacy issues and Internet technology, not to learn about all kinds
of tangential announcements.
Could someone bring me up to speed, please?
This is not flamebait. Really not.
--
martin; (greetings from the heart of the sun.)
\____ echo mailto: !#^."<*>"|tr "<*> mailto:" net at madduck
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
spamtraps: madduck.bogus at madduck.net
"he gave me his card
he said, 'call me if they die'
i shook his hand and said goodbye
ran out to the street
when a bowling ball came down the road
and knocked me off my feet"
-- bob dylan
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From madduck at madduck.net Mon May 16 10:24:44 2005
From: madduck at madduck.net (martin f krafft)
Date: Mon, 16 May 2005 19:24:44 +0200
Subject: your mail
In-Reply-To: <20050516092424.F62319@ubzr.zsa.bet>
References: <9f42703867f0f8c1c5ad7ec45465e4fe@melontraffickers.com>
<20050516130715.GA17062@cirrus.madduck.net>
<20050516092424.F62319@ubzr.zsa.bet>
Message-ID: <20050516172444.GA739@cirrus.madduck.net>
also sprach J.A. Terranson [2005.05.16.1627 +0200]:
> > and developments in privacy issues and Internet technology, not
> > to learn about all kinds of tangential announcements.
>
> Then you are in the wrong fucking place buddy. This is cpunks:
> Information wants to be free and all that. Anything is postable,
> nothing turned away, even trolls like you are welcome additions.
Interesting... this is not how I remembered it.
Anyway, I apologise, and I apologise to Stephen Wolfram for the
private message sent along those lines.
--
martin; (greetings from the heart of the sun.)
\____ echo mailto: !#^."<*>"|tr "<*> mailto:" net at madduck
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
spamtraps: madduck.bogus at madduck.net
"friendships last when each friend thinks he has
a slight superiority over the other."
-- honori de balzac
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From madduck at madduck.net Mon May 16 13:40:39 2005
From: madduck at madduck.net (martin f krafft)
Date: Mon, 16 May 2005 22:40:39 +0200
Subject: your mail
In-Reply-To: <20050516172444.GA739@cirrus.madduck.net>
References: <9f42703867f0f8c1c5ad7ec45465e4fe@melontraffickers.com>
<20050516130715.GA17062@cirrus.madduck.net>
<20050516092424.F62319@ubzr.zsa.bet>
<20050516172444.GA739@cirrus.madduck.net>
Message-ID: <20050516204039.GC18691@cirrus.madduck.net>
also sprach martin f krafft [2005.05.16.1924 +0200]:
> Interesting... this is not how I remembered it.
... I had been subscribed to the moderated minder.net list in the
past... this explains :)
Again, sorry, also for the noise.
--
martin; (greetings from the heart of the sun.)
\____ echo mailto: !#^."<*>"|tr "<*> mailto:" net at madduck
invalid/expired pgp subkeys? use subkeys.pgp.net as keyserver!
spamtraps: madduck.bogus at madduck.net
"if i am occasionally a little overdressed, i make up for it by being
always immensely over-educated."
-- oscar wilde
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From TUKWRUQORKSGV at primemover.com.au Mon May 16 17:50:46 2005
From: TUKWRUQORKSGV at primemover.com.au (Randy Sharp)
Date: Mon, 16 May 2005 23:50:46 -0100
Subject: It`s a revolution!
Message-ID: <135.f2bdd58.2a2b0824@dilo.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 582 bytes
Desc: not available
URL:
From ustbdj at nuntius.com Mon May 16 22:22:53 2005
From: ustbdj at nuntius.com (Vernon Scott)
Date: Tue, 17 May 2005 03:22:53 -0200
Subject: Multi OrGazms for men
Message-ID: <46F743B-919065CB0118@mac.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 774 bytes
Desc: not available
URL:
From juliePoole69 at emigracionlegal.com Tue May 17 00:33:34 2005
From: juliePoole69 at emigracionlegal.com (Julie Fountain)
Date: Tue, 17 May 2005 06:33:34 -0100
Subject: it`s julie here
Message-ID: <141.49e558d5.2a9PYL44@sol.com>
My name is Julie. I am a high school senior in Houston, TX.
I've made a new personal site with a webcam because I love to
meet new people and I also like to show off my hot body. I
thought you may like to check it out. It's completely free.
http://www.electioncrazyone.com/ju18/
you disruptive me contract me you magisterial me schemata me you incise me reactant me you sphalerite me consolidate me you choir me phalanx me
you topsoil me warehouse me you codeposit me bylaw me
From rah at shipwright.com Tue May 17 11:39:56 2005
From: rah at shipwright.com (R.A. Hettinga)
Date: Tue, 17 May 2005 14:39:56 -0400
Subject: Len Adleman (of R,S, and A): Universities need a little
Limbaugh
Message-ID:
A little humor this morning...
He's right, but it's still funny.
Expect Dr. Adleman to be asked to turn in his Liberal Secret Decoder Ring
forthwith...
Cheers,
RAH
-------
Los Angeles Daily News
Universities need a little Limbaugh
By Leonard M. Adleman
Saturday, May 14, 2005 - Pomp and circumstance. Black-robed students
receiving diplomas as proud parents look on. Distinguished members of
society receiving honorary degrees and offering sage advice to ''America's
future.''
It is commencement time again at the nation's universities.
This year I nominated Rush Limbaugh for an honorary doctorate at the
University of Southern California, where I am a professor. Why Limbaugh _ a
man with whom I disagree at least as much as I agree? Here are some of the
reasons I gave in my letter of nomination:
''Rush Limbaugh has engendered epochal changes in politics and the media.
He has accomplished this in the noblest of ways, through speech and the
power of his ideas. Mr. Limbaugh began his career as a radio talk-show host
in Sacramento in 1984. He espoused ideas that were conservative and in
clear opposition to the dominant ideas of the time. Perhaps because of the
persuasiveness of Mr. Limbaugh's ideas or because they resonated with the
unspoken beliefs of a number of Americans, his audience grew. Today, he has
the largest audience of any talk show host (said to be in excess of 20
million people per week) and his ideas reverberate throughout our society.
''Mr. Limbaugh is a three-time recipient of the National Association of
Broadcasters' Marconi Radio Award for Syndicated Radio Personality of the
Year. In 1993, he was inducted into the National Association of
Broadcasters' Broadcasting Hall of Fame.
''In 1994, an American electorate, transformed by ideas that Mr. Limbaugh
championed, gave control of Congress to the Republicans for the first time
in 40 years. That year, Republican congressmen held a ceremony for Mr.
Limbaugh and declared him an 'honorary member of Congress.' The recent
re-election of President Bush suggests that this transformation continues.
One of Mr. Limbaugh's major themes through the years has been liberal bias
in the 'mainstream' media. His focus on this theme has made him the target
of incessant condemnation. Nonetheless, he has persevered and it now
appears that his view is prevailing. As the recent debacle at CBS shows,
the media is in the process of major change. Ideally, the American people
will profit from a reconstituted media that will act more perfectly as a
marketplace for ideas.''
But there is a bigger reason why I support giving him an honorary degree:
Because I value intellectual diversity.
Regrettably, the university declined to offer Limbaugh a degree. As best I
can determine, no university has honored him in this way. On the other
hand, such presumably liberal media luminaries as Dan Rather, Chris
Matthews, Judy Woodruff, Bill Moyers, Terry Gross, Paul Krugman and Peter
Arnett have received many honorary degrees from the nation's universities.
Now before you label me as a right-wing ideologue, let me present my
credentials as a centrist. Limbaugh has well-known positions on the
following issues: abortion, capital punishment, affirmative action, prayer
in school, gun control, the Iraq war. I disagree with him on half of these.
But intellectual diversity has all but vanished from America's campuses.
We are failing in our duty to provide our students with a broad spectrum of
ideas from which to choose. Honoring Limbaugh, or someone like him, would
help to make the academy more intellectually diverse.
The great liberal ideas that swept through our universities when I was a
student at Berkeley in the 1960s have long ago been digested and largely
embraced in academia. Liberalism has triumphed. But a troubling legacy of
that triumph is a nation whose professorate is almost entirely liberal.
In the 29 years I have been a professor, I do not recall encountering a
single colleague who expressed conservative ideas. The left-wing
accusations of Ward Churchill (Honorary Doctor of Humane Letters, Alfred
University, 1992) are not the problem _ the problem is the scarcity of
professors who are inclined to rebut them. It is time for the nation's
universities to address this disturbing situation.
So I hereby extend my nomination of Limbaugh to all universities. It would
be a refreshing demonstration of renewed commitment to intellectual
diversity if next spring we hear Dr. Limbaugh's words as our graduates ''go
forth.''
Professor Leonard M. Adleman is the Henry Salvatori Professor of Computer
Science at the University of Southern California.
--
-----------------
R. A. Hettinga
The Internet Bearer Underwriting Corporation
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
From cyphrpunk at gmail.com Tue May 17 14:45:28 2005
From: cyphrpunk at gmail.com (cypherpunk)
Date: Tue, 17 May 2005 14:45:28 -0700
Subject: Len Adleman (of R,S, and A): Universities need a little
Limbaugh
In-Reply-To:
References:
Message-ID: <792ce437050517144577e59a7@mail.gmail.com>
> Now before you label me as a right-wing ideologue, let me present my
> credentials as a centrist. Limbaugh has well-known positions on the
> following issues: abortion, capital punishment, affirmative action, prayer
> in school, gun control, the Iraq war. I disagree with him on half of these.
Any speculations on which half? My guess is that he agrees on
affirmative action and gun control (opposing both) and probably the
Iraq war (a conservative is a liberal who's been mugged, and many
people took 9/11 personally). He certainly disagrees on prayer in
school, probably on capital punishment (opposing both, while Limbaugh
supports them), and probably supports abortion rights, which Limbaugh
opposes.
CP
From cyphrpunk at gmail.com Tue May 17 15:03:52 2005
From: cyphrpunk at gmail.com (cypherpunk)
Date: Tue, 17 May 2005 15:03:52 -0700
Subject: /. [Dissidents Seeking Anonymous Web Solutions?]
In-Reply-To: <20050515175945.GQ23917@leitl.org>
References: <20050515175945.GQ23917@leitl.org>
Message-ID: <792ce437050517150370960b54@mail.gmail.com>
> Link: http://slashdot.org/article.pl?sid=05/05/13/0250226
> [1]DocMurphy asks: "I'm working with some dissidents who are looking
> for ways to use the Internet from within repressive regimes. Many have
> in-home Internet access, but think it too risky to participate in
> pro-freedom activities on home PCs. Internet cafis are also available,
> but although fairly anonymous, every machine may be infected with
> keystroke loggers that give governments access to and knowledge of
> 'banned' sites. Dissidents not only want to remain anonymous
> themselves, but also wish to not compromise the sites they access. Any
> suggestions for products/procedures/systems out there making anonymous
> access & publishing a reality under repressive regime run Internet
> access?"
There were some good ideas presented, the best of which were probably
to first compose an email at home, then PGP encrypt it, then stego-ize
it, then put it on a USB token and bring it to the internet cafe, and
send it there. For receiving, download a bunch of junk from a mailing
list used for this purpose onto the token, go home and de-stego and
de-PGP it.
This doesn't work though for web browsing. For that you need a real
time channel. You can go to various proxies, and some people run them
specifically to help the Chinese, the slashdot replies talked about
this. But first, the Chinese block them when they find out, and
second, it makes you look suspicious if you're visiting one.
Be nice if there were a high bandwidth stego channel that was widely
available. For example, imagine an open source P2P multi player game
which intentionally included a reasonably high bandwidth channel of
random data. It would be a service to the public to play this game and
thereby provide people who need it the ability to communicate
undetectably. Dissidents could use a hacked version which would
replace some of the random noise bits with their messages. Only the
recipients could distinguish the results from noise.
CP
From camera_lumina at hotmail.com Tue May 17 13:56:34 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Tue, 17 May 2005 16:56:34 -0400
Subject: Len Adleman (of R,S, and A): Universities need a little
Limbaugh
In-Reply-To:
Message-ID:
Now that was an enjoyable and even marginally relevant piece of RAHspam.
>From: "R.A. Hettinga"
>To: cryptography at metzdowd.com, cypherpunks at al-qaeda.net
>Subject: Len Adleman (of R,S, and A): Universities need a little Limbaugh
>Date: Tue, 17 May 2005 14:39:56 -0400
>
>A little humor this morning...
>
>He's right, but it's still funny.
>
>Expect Dr. Adleman to be asked to turn in his Liberal Secret Decoder Ring
>forthwith...
>
>Cheers,
>RAH
>-------
>
>
>
>
>
>Los Angeles Daily News
>
>
>Universities need a little Limbaugh
>By Leonard M. Adleman
>
>Saturday, May 14, 2005 - Pomp and circumstance. Black-robed students
>receiving diplomas as proud parents look on. Distinguished members of
>society receiving honorary degrees and offering sage advice to ''America's
>future.''
>
> It is commencement time again at the nation's universities.
>
> This year I nominated Rush Limbaugh for an honorary doctorate at the
>University of Southern California, where I am a professor. Why Limbaugh _ a
>man with whom I disagree at least as much as I agree? Here are some of the
>reasons I gave in my letter of nomination:
>
> ''Rush Limbaugh has engendered epochal changes in politics and the media.
>He has accomplished this in the noblest of ways, through speech and the
>power of his ideas. Mr. Limbaugh began his career as a radio talk-show host
>in Sacramento in 1984. He espoused ideas that were conservative and in
>clear opposition to the dominant ideas of the time. Perhaps because of the
>persuasiveness of Mr. Limbaugh's ideas or because they resonated with the
>unspoken beliefs of a number of Americans, his audience grew. Today, he has
>the largest audience of any talk show host (said to be in excess of 20
>million people per week) and his ideas reverberate throughout our society.
>
> ''Mr. Limbaugh is a three-time recipient of the National Association of
>Broadcasters' Marconi Radio Award for Syndicated Radio Personality of the
>Year. In 1993, he was inducted into the National Association of
>Broadcasters' Broadcasting Hall of Fame.
>
> ''In 1994, an American electorate, transformed by ideas that Mr. Limbaugh
>championed, gave control of Congress to the Republicans for the first time
>in 40 years. That year, Republican congressmen held a ceremony for Mr.
>Limbaugh and declared him an 'honorary member of Congress.' The recent
>re-election of President Bush suggests that this transformation continues.
>One of Mr. Limbaugh's major themes through the years has been liberal bias
>in the 'mainstream' media. His focus on this theme has made him the target
>of incessant condemnation. Nonetheless, he has persevered and it now
>appears that his view is prevailing. As the recent debacle at CBS shows,
>the media is in the process of major change. Ideally, the American people
>will profit from a reconstituted media that will act more perfectly as a
>marketplace for ideas.''
>
> But there is a bigger reason why I support giving him an honorary degree:
>Because I value intellectual diversity.
>
> Regrettably, the university declined to offer Limbaugh a degree. As best
>I
>can determine, no university has honored him in this way. On the other
>hand, such presumably liberal media luminaries as Dan Rather, Chris
>Matthews, Judy Woodruff, Bill Moyers, Terry Gross, Paul Krugman and Peter
>Arnett have received many honorary degrees from the nation's universities.
>
> Now before you label me as a right-wing ideologue, let me present my
>credentials as a centrist. Limbaugh has well-known positions on the
>following issues: abortion, capital punishment, affirmative action, prayer
>in school, gun control, the Iraq war. I disagree with him on half of these.
>
> But intellectual diversity has all but vanished from America's campuses.
>We are failing in our duty to provide our students with a broad spectrum of
>ideas from which to choose. Honoring Limbaugh, or someone like him, would
>help to make the academy more intellectually diverse.
>
> The great liberal ideas that swept through our universities when I was a
>student at Berkeley in the 1960s have long ago been digested and largely
>embraced in academia. Liberalism has triumphed. But a troubling legacy of
>that triumph is a nation whose professorate is almost entirely liberal.
>
> In the 29 years I have been a professor, I do not recall encountering a
>single colleague who expressed conservative ideas. The left-wing
>accusations of Ward Churchill (Honorary Doctor of Humane Letters, Alfred
>University, 1992) are not the problem _ the problem is the scarcity of
>professors who are inclined to rebut them. It is time for the nation's
>universities to address this disturbing situation.
>
> So I hereby extend my nomination of Limbaugh to all universities. It
>would
>be a refreshing demonstration of renewed commitment to intellectual
>diversity if next spring we hear Dr. Limbaugh's words as our graduates ''go
>forth.''
>
>Professor Leonard M. Adleman is the Henry Salvatori Professor of Computer
>Science at the University of Southern California.
>
>--
>-----------------
>R. A. Hettinga
>The Internet Bearer Underwriting Corporation
>44 Farquhar Street, Boston, MA 02131 USA
>"... however it may deserve respect for its usefulness and antiquity,
>[predicting the end of the world] has not been found agreeable to
>experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
From YWHHTHHAQR at pork00.net Tue May 17 14:20:46 2005
From: YWHHTHHAQR at pork00.net (Clarice)
Date: Tue, 17 May 2005 20:20:46 -0100
Subject: Summer time means no cellulite
In-Reply-To: <7668929.00b0a2630@designs.com>
Message-ID: <393.0@melbpc.org.au>
Body Wrap at Home to lose 6-20 inches in one hour.
With Bodywrap we guarantee:
you'll lose 6-8 Inches in one hour
100% Satisfaction or your money back
Bodywrap is soothing formula that contours,
cleanses and rejuvenates your body while
reducing inches.
http://revet.weightlossfirm.com
baccarat su ally tz deere da cankerworm pg praecox jmn began el camden ms castillo ldf
adjunct klq clandestine re parch yr approval zv industrial iu cultural hu bizet ad bellwether ojb
http://revet.weightlossfirm.com/r
From TWIBIESIACJU at inver.sk Tue May 17 20:25:57 2005
From: TWIBIESIACJU at inver.sk (Kim)
Date: Tue, 17 May 2005 20:25:57 -0700
Subject: pornstars use it Tameka
Message-ID: <0.1600414968.1197980757-979966658@topica.com>
Increase your CUM VOLUME, and Orgasm Length
main benifits:
- The longest most intense Orgasms of your life
- Erctions like steel
- lncreased libido/desire
- Stronger ejaculaton (watch where your aiming)
- Multiple 0rgasms
- Up to 500% more volume (cover her in it if you want)
- Studies show it tastes sweeter
DISCREET SAME DAY SHIPPING - TRY IT, YOU'LL LOVE IT!
(and she'll thank you for it)
http://ecomomics.net/spur/?got
sacred you goddard me beryl you purpose me temptation you gullet me
acreage you invade me coot you parlance me hickory you grant me
http://ecomomics.net/rm.php?got
From bill.stewart at pobox.com Wed May 18 01:04:55 2005
From: bill.stewart at pobox.com (Bill Stewart)
Date: Wed, 18 May 2005 01:04:55 -0700
Subject: NYTimes article on privacy, identity theft
Message-ID: <6.2.1.2.0.20050518010044.0284bb80@pop.idiom.com>
http://nytimes.com/2005/05/18/technology/18data.html?hp&ex=1116475200&en=7f0572052438ec3b&ei=5094&partner=homepage
Good NYTimes article on privacy, identity theft, and
easy correlation of data in public records.
Usual Suspect Professor Avi Rubin at Johns Hopkins
has his grad students demonstrating things you can find out.
Betty Ostergren's "Virginia Watchdog" website
http://www.opcva.com/watchdog/
reinforces complaints about public records privacy
by outing the records of public officials to make her points to them.
[NYTimes articles usually require free registration;
I'm not sure if there's currently a "cypherpunks" userID there,
but I think some of the strings following the ? in the URL
indicate that you don't need registration if you use this URL..]
Bill Stewart
From michaelslists at gmail.com Wed May 18 02:24:20 2005
From: michaelslists at gmail.com (Michael Silk)
Date: Wed, 18 May 2005 02:24:20 -0700
Subject: NYTimes article on privacy, identity theft
In-Reply-To: <6.2.1.2.0.20050518010044.0284bb80@pop.idiom.com>
References: <6.2.1.2.0.20050518010044.0284bb80@pop.idiom.com>
Message-ID: <5e01c29a0505180224804e099@mail.gmail.com>
On 5/18/05, Bill Stewart wrote:
> http://nytimes.com/2005/05/18/technology/18data.html?hp&ex=1116475200&en=7f0572052438ec3b&ei=5094&partner=homepage
>
> Good NYTimes article on privacy, identity theft, and
> easy correlation of data in public records.
> Usual Suspect Professor Avi Rubin at Johns Hopkins
> has his grad students demonstrating things you can find out.
> Betty Ostergren's "Virginia Watchdog" website
> http://www.opcva.com/watchdog/
> reinforces complaints about public records privacy
> by outing the records of public officials to make her points to them.
>
> [NYTimes articles usually require free registration;
> I'm not sure if there's currently a "cypherpunks" userID there,
> but I think some of the strings following the ? in the URL
> indicate that you don't need registration if you use this URL..]
there is also 'bugmenot.com', last time i tried it took about the 16th
ID, but it worked.
-- Michael
>
> Bill Stewart
From BYLTQTZ at flamuseums.org Wed May 18 04:13:43 2005
From: BYLTQTZ at flamuseums.org (Charley Parker)
Date: Wed, 18 May 2005 12:13:43 +0100
Subject: Account update Emily
Message-ID: <0.1825414968.1197980757-045966658@topica.com>
----- Original Message -----
From: Emily
To: needlework1 at msn.com ; signatureedifice at yahoo.com
;
Dear Homeowner,
Mortgage. You have been pre-approved.
You can get $243,000 for as little as $232 a month, thanks to your pre-approval.
Visit us, Fill out the form, no obligation
Pull cash out, or refinance..
No long forms or quastionnaires. Fill up our extremely short and simple form today and get a call back within a couple of hours.
Start saving now, click that link:
http://www.premium-mortgages.com/2/index/bvk
foist ua calcareous kir detergent ca altair ems fitch pn subliminal rsc ineffective cnf pollock xag
cog crq cosh ls advice hqd restroom mn
http://premium-mortgages.com/rem.php
From jtrjtrjtr2001 at yahoo.com Thu May 19 02:16:19 2005
From: jtrjtrjtr2001 at yahoo.com (Sarad AV)
Date: Thu, 19 May 2005 02:16:19 -0700 (PDT)
Subject: Secure MPC( a>b )
In-Reply-To: <20050509162825.GA10428@bitchcake.off.net>
Message-ID: <20050519091619.64608.qmail@web21204.mail.yahoo.com>
hi,
--- Adam Back wrote:
> There is a simple protocol for this described in
> Schneier's Applied
> Crypto if you have one handy...
Yes, I found it. Thankyou.
--- cypherpunk wrote:
>That is
> known as a multi party computation or MPC
True, Its a secure MPC protocol. I confused it with
Zero knowledge protocols.
--- Justin wrote:
> I don't recall that particular protocol in AC, but
> it's a mistake to
> call such a thing "zero-knowledge", since it
> mandatorily leaks ~1.585
> bits of information (the first time) about the other
> person's integer.
How is there information leakage?
Mr.Bruce Schneier in his book titled " Appiled
Cryptography" mentions the following MPC protocol to
compare the income of two parties, Alice and Bob
without revealing their income.
The protocol works as follows:
Let 'i' be Alice's income.
Let 'j' be Bob's income.
Let Eb be Bob's public key.
Let Db be Bob's privare key.
Let n be Bob's public modulus.
To start with we assume that the range of i and j is
from 1 to 100.
1) Alice chooses a random number x and using Bob's
public key computes
c=x^Eb (mod n)
2) Alice computes k = c-i and sends the result to Bob.
3) Bob computes the following 100 numbers
y1 = (k+1)^Db (mod n)
y2 = (k+2)^Db (mod n)
[.....]
y100 = (k+100)^Db (mod n)
Bob now chooses a large prime p, such that p=2 for all i,j in the range 1
to 100. If this is not true Bob chooses another prime
and starts again.
5) Bob sends Alice the sequence in the exact order
let _ denote subscript, e.g. a_b is a subscript b.
Z1, Z2, ...,Zj, Z_(j+1) +1, ..., Z_(j+100) +1, p
6) Alice checks if the (i th) number in the sequence
is congruent to
x mod p. If yes, she concludes i<=j, otherwise i>j.
When we have the case i>j, Bob computes Z_(j+1) +1,
..., Z_(j+100) +1, this makes the (i th) sequence
Alice looks at incongruent (mod p) and makes the
protocol work. We have |zi-zj|>=2 so that the
sequences donot collide with one another.
The protocol as such donot detect cheaters in the
scheme.
thanks,
Sarad.
Yahoo! Mail
Stay connected, organized, and protected. Take the tour:
http://tour.mail.yahoo.com/mailtour.html
From pbeiwurnxm at sagverkenmellan.com Thu May 19 11:53:50 2005
From: pbeiwurnxm at sagverkenmellan.com (Boris Holbrook)
Date: Thu, 19 May 2005 15:53:50 -0300
Subject: 24 x 7 penis readiness
Message-ID: <200203900004.g6A38XX02778@eng2.beaverton.ibm.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 697 bytes
Desc: not available
URL:
From mlfmecqlaon at amadeux.it Thu May 19 15:33:17 2005
From: mlfmecqlaon at amadeux.it (Isaiah Love)
Date: Fri, 20 May 2005 03:33:17 +0500
Subject: It`s a revolution!
Message-ID: <68AS87FE.0X24-11D7.A3B5.0050E4C05556@iwr.uni-heidelberg.de>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 548 bytes
Desc: not available
URL:
From julieBlackman69 at longtermcarewiz.com Fri May 20 09:08:46 2005
From: julieBlackman69 at longtermcarewiz.com (Julie Sheets)
Date: Fri, 20 May 2005 13:08:46 -0300
Subject: it`s julie here
Message-ID: <761z7fzlsc.fsf@calle05.net>
I'm new, it's Julie :) Alot of the times I feel weird, even my girlfriends told me that .... old time friend suggested
to put my hot videos somehow online. My website is like my new hobby :D AllCome check website I put together, I'm not that good tho with comp skills yet but tell me what you think ;0
http://www.famousloaves.com/ju18/
you difficulty me tanzania me you karamazov me chilblain me
you egypt me inconsistent me you aback me susceptible me
From sgkszhoyofoiks at cctc.vic.edu.au Fri May 20 20:50:48 2005
From: sgkszhoyofoiks at cctc.vic.edu.au (Dirk)
Date: Fri, 20 May 2005 20:50:48 -0700
Subject: 500% more sperm Donovan
Message-ID: <0.1366714968.1197980757-510966658@topica.com>
Increase your CUM VOLUME, and Orgasm Length
main benifits:
- The longest most intense Orgasms of your life
- Erctions like steel
- lncreased libido/desire
- Stronger ejaculaton (watch where your aiming)
- Multiple 0rgasms
- Up to 500% more volume (cover her in it if you want)
- Studies show it tastes sweeter
DISCREET SAME DAY SHIPPING - TRY IT, YOU'LL LOVE IT!
(and she'll thank you for it)
http://ecomomics.net/spur/?got
biddable you celanese me ash you among me wavefront you scholastic me
ivory you kittenish me proust you appalachia me
http://ecomomics.net/rm.php?got
From lynn at garlic.com Fri May 20 21:07:40 2005
From: lynn at garlic.com (Anne & Lynn Wheeler)
Date: Fri, 20 May 2005 22:07:40 -0600
Subject: What happened with the session fixation bug?
In-Reply-To: <427CCA9B.29132.760A1FC@localhost>
References: <427CCA9B.29132.760A1FC@localhost>
Message-ID: <428EB40C.3000204@garlic.com>
James A. Donald wrote:
> PKI was designed to defeat man in the middle attacks
> based on network sniffing, or DNS hijacking, which
> turned out to be less of a threat than expected.
all of them may have been less than expected ... the comoningly
recognized SSL certificate issuers (that have their public key preloaded
into common browsers) sell their certificates and have processes that
look at whether you have a validly registered corporation. For most
practical purposes this has been for e-commerce sites and the objective
for the majority is protecting credit card numbers.
however, the reported exploits .... and what seem to represent a
significantly larger ROI (fraud for effort invested) is to harvest the
merchant transaction file (containing all the accumulated transaction
information that would have taken months of listening to gather) ... aka
it is much easier to let the merchant gather and organize all the
information on behalf of the crook. slightly related posting ...
http://www.garlic.com/~lynn/2001h.html#61 Security proportional to risk
the original ssl e-commerce work
http://www.garlic.com/~lynn/aadsm5.htm#asrn2
http://www.garlic.com/~lynn/aadsm5.htm#asrn3
had the user typing in the merchant webserver URL as a HTTPS session
from the start and then it would check the domain name in the returned
certificate (after all the digital signature gorp) with the domain name
typed in. this is rarely if ever happening ... the common justification
is running SSL during the shopping experience cuts the thruput by 80-90
percent. as a result, SSL is typically saved for the "check-out" button.
so lets say you have been redirected to a fraudulent site and don't know
it because the SSL domain name stuff hasn't been done yet. then comes
time to do the check-out button. if it is a fraudulent site ... and
since the crooks would then be supplying the URL with the check-out
button ... the crooks are likely to have obtained a valid SSL
certificate for some domain and that domain will match whatever the
check-out button supplies.
random past ssl certificate posts
http://www.garlic.com/~lynn/subpubkey.html#sslcert
crooks are capable of setting up valid dummy front companies ... it
isn't a very large effort.
most of what the CA TTPs do when they are verifying stuff ... is that
the person applying for a certificate is in some way associated with a
valid company that they claim to be associated with.
then the CA TTPs check with the domain name infrastructure to see if the
corporation that they just checked on ... is the same one listed as the
owner of the subject domain name (modulo the issue that there can be a
common company name, a DBA company name, and a legal company
name ... all for the same corporation and all completely different names
... you sometimes will see this in credit card statements where the
store-front name and the company name on the statement are different).
As observed, one of the things SSL was for a countermeasure for
integrity problems in the domain name infrastructure involving domain
name hijacking (where the mapping of the domain name to an ip-address
was altered to be a different ip-address, potentially fraudulent website).
However, there have been more sophisticated domain name hijackings that
have occured where both the domain name infrastructure records had both
the name of the corporate owner as well as the ip-address altered. In
this more sophisticated form, a crook with a perfectly valid dummy front
corporation ... that has done the more sophisticated form of domain name
hijacking ... could apply for a perfectly valid SSL domain name
certificate ... and pass all the tests.
in any case, that was my perception of what we were doing with SSL ten
years ago.
PKI is slightly different. One of the reasons that we coined the term
"certificate manufactoring" was to try and differentiate what was
comingly being referred to as PKI ... and what SSL domain name
certificate stuff was actually doing.
Note that there has been a proposal to somewhat address the more complex
form of domain name hijacking (both the company name take-over as well
as the ip-address take-over) ... which involves having domain name
owners register a public key when they get a domain name. Then all
future correspondance with the domain name infrastructure is digitally
signed ... which then can be veriefied with the onfile public key. as a
side note ... this is a non-PKI, certificateless implementation of
public key. In any case, with authenticated correspondance ... there
supposedly is less chance of domain name hijacking occuring.
http://www.garlic.com/~lynn/subpubkey.html#certless
This has somewhat been supported by the CA SSL domain name certification
industry. The have a complex, expensive, and error-prone identification
process to try to establish a valid corporation. And even then they are
at the mercy of whether the company name listed in the domain name
infrastructure is actually the correct company (i.e. their whole
infrastructure otherwise is useless).
The other advantage ... is that the Certification Authority can require
that SSL domain name certificate applications also be digitally signed.
Then the CA can turn an expensive, time-consuming, and error-prone
identification process into a much simpler, cheaper, and reliable
authentication process ... by retrieving the onfile public key from the
domain name infrastructure for verifying the applicants digital
signature (again note that this is a non-PKI, certificateless
implementation that they would use as the trust basis for the whole SSL
domain name certificate operation).
There is some slight catch22 to this for the SSL domain name certificate
business. First off, improving the integrity of the domain name
infrastructure for the Certification Authority industry ... would also
improve the integrity for everybody ... somewhat mitigating one of the
original supposed requirements for having SSL domain name certificates
in the first place. The other is that if the SSL certification industry
found it viable to base their trust infrastructure on the
certificateless, onfile public keys at the domain name infrastructure...
it might be possible that the rest of the world might find them
acceptable also. One could imagine a slightly modified SSL process where
the public key didn't come from a certificate ... but was an onfile
certificateless public key retrieved directly from the domain name
infrastructure (in much the same way the CA industry has proposed doing).
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
From ben at algroup.co.uk Fri May 20 14:59:22 2005
From: ben at algroup.co.uk (Ben Laurie)
Date: Fri, 20 May 2005 22:59:22 +0100
Subject: [Lucrative-L] double spends, identity agnosticism, and Lucrative
In-Reply-To: <42732C3B.16317.3BBC5C3@localhost>
References: <42732C3B.16317.3BBC5C3@localhost>
Message-ID: <428E5DBA.6010401@algroup.co.uk>
James A. Donald wrote:
>>From: "Patrick"
>>To:
>>Subject: [Lucrative-L] double spends, identity agnosticism, and
>>Lucrative Date: Tue, 29 Apr 2003 14:46:48 -0600 Importance: Normal
>>Sender: owner-lucrative-l at lucrative.thirdhost.com
>>
>>
>> A quick experiment has confirmed the obvious: when a client
>>reissues a coin at the mint, both the blinded and its unblinded cousin
>>are valid instruments to the Lucrative mint.
>>
>> Example: Alice uses the Mint's API to reissue a one-dollar note,
>>blinding the coin before getting a signature, and unblinding the
>>signature afterwards. She's left with both a blinded and a non-blinded
>>version of the coin. The mint believes they are both valid. Instant,
>>unlimited inflation.
>>
>> I believe the solution to this is to have the mint track both
>>spent coins and issued coins (that is, it automatically cancels coins
>>it issues, before the client receives them). The client is left with
>>no choice but to go through a blinding and unblinding process in order
>>to have a usable coin.
>>
>> This seems to make identity-agnostic cash difficult or
>>impossible, at least with Lucrative:
>>http://www.io.com/~cman/agnostic.html,
>>http://cypherpunks.venona.com/date/1995/09/msg00197.html .
Would do if it were true - this is exactly why unblinded lucre coins
have structure - that is, you can check that they are well-formed by
doing hash operations on them. Blinded coins will fail these checks.
I forget the exact form of lucre coins (read the paper), but consider
the construction x || H(x) - clearly only the unblinded version of this
will have the right form.
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
From ben at algroup.co.uk Fri May 20 15:21:35 2005
From: ben at algroup.co.uk (Ben Laurie)
Date: Fri, 20 May 2005 23:21:35 +0100
Subject: What happened with the session fixation bug?
In-Reply-To: <427CCA9B.29132.760A1FC@localhost>
References: <427CCA9B.29132.760A1FC@localhost>
Message-ID: <428E62EF.4020308@algroup.co.uk>
James A. Donald wrote:
> --
> PKI was designed to defeat man in the middle attacks
> based on network sniffing, or DNS hijacking, which
> turned out to be less of a threat than expected.
>
> However, the session fixation bugs
> http://www.acros.si/papers/session_fixation.pdf make
> https and PKI worthless against such man in the middle
> attacks. Have these bugs been addressed?
Do they exist? Certainly any session ID I've ever had a hand in has two
properties that strongly resist session fixation:
a) If a session ID arrives, it should already exist in the database.
b) Session IDs include HMACs.
Session fixation is defeated by either of these. Modulo insider attacks,
of course. :-)
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
From OKOCOIUD at dorman.co.uk Fri May 20 11:47:32 2005
From: OKOCOIUD at dorman.co.uk (Devin)
Date: Sat, 21 May 2005 00:47:32 +0600
Subject: Buy : Rolex or Cartier or Breitling
Message-ID: <161.50e558d5.2a9VYK44@sol.com>
Superb Quality Rolex.
The high! profile jewelry you're looking for at the lowest prices in the nation!!..
http://www.keepingtimeinstyle.com/
Choose from our collection of Rolex watches!
you assonant me troupe me you malcolm me i've me
you leatherwork me dither me you bonfire me cerebellum me you mohammedan me biopsy me you magog me shampoo me you compleat me committeeman me
From eugen at leitl.org Fri May 20 23:45:02 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Sat, 21 May 2005 08:45:02 +0200
Subject: /. [Lycos Germany to No Longer Store IP Data]
Message-ID: <20050521064502.GF3361@leitl.org>
Link: http://slashdot.org/article.pl?sid=05/05/21/0015244
Posted by: Zonk, on 2005-05-21 02:25:00
from the keeping-big-brother-out dept.
quaker5567 writes "The Register is carrying the story that [1]Lycos
Germany says it will no longer store dynamic IP addresses of its
customers. According to the German Tele Services Data Protection and
Telecommunications Act, ISPs are only allowed to store communications
data for accounting purposes. Apparently, there is no requirement for
German ISPs to keep a record of IP addresses. A decision by German
ISPs not to keep logs on IP addresses would be extremely controversial
as the entertainment industry is increasingly demanding that ISPs
disclose the names of suspected file sharers."
References
1. http://www.theregister.co.uk/2005/05/20/lycos_ip_address/
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From mv at cdc.gov Sat May 21 15:55:51 2005
From: mv at cdc.gov (Major Variola (ret))
Date: Sat, 21 May 2005 15:55:51 -0700
Subject: Len Adleman (of R,S, and A):
Message-ID: <428FBC77.530E02E9@cdc.gov>
At 02:45 PM 5/17/05 -0700, cypherpunk wrote:
>Iraq war (a conservative is a liberal who's been mugged, and many
>people took 9/11 personally).
Please explain what Bush's invasion of a soverign nation
had to do with the Saudi 9/11 Theatre?
(Sorry to offend the 'Merkins who can't distinguish one ay-rab from
another)
From ifjbbbuk at amortgagesource.com Sat May 21 04:56:13 2005
From: ifjbbbuk at amortgagesource.com (Rocco Crain)
Date: Sat, 21 May 2005 16:56:13 +0500
Subject: Fix your situation Sherry
Message-ID: <3DF4FB83.24004@ubp.edu.ar>
Dear Homeowner,
You have been pre-approved for a $402,000 Home Loan at 3.45% Fixed Rate.
This offer is being extended to you unconditionally and your credit is in no way a factor.
To take Advantage of this Limited Time opportunity all
we ask is that you visit our Website and complete
the 1 minute post Approval Form.
http://www.simplified-loans.net/2/index/bvk
Best Regards,
Rocco Crain
Regional CEO
cannister hm wee wyd fiefdom ttz invigorate rt tuff fw eddy haa wool rg aspect sfz
hum uue cyclotron cr sick xu rustproof vv
http://simplified-loans.net/rem.php
From BQWXMAJFZSRR at delrima.com Sat May 21 09:26:04 2005
From: BQWXMAJFZSRR at delrima.com (Hollis)
Date: Sat, 21 May 2005 17:26:04 +0100
Subject: Burn inches EASY
Message-ID: <201212032200.30651.casey@outbacklinux.com>
Body Wrap at Home to lose 6-20 inches in one hour.
With Bodywrap we guarantee:
you'll lose 6-8 Inches in one hour
100% Satisfaction or your money back
Bodywrap is soothing formula that contours,
cleanses and rejuvenates your body while
reducing inches.
http://persecute.weightlossfirm.com
hugging pff mockernut qr degum sa explosion kte burnside dda electrolytic np
appall iw phrasemake ki mitral hz corrigendum li bluegill qhn bradford ki
http://persecute.weightlossfirm.com/r
From BHFHE at biotech-solar.de Sat May 21 22:12:37 2005
From: BHFHE at biotech-solar.de (Dianna Ybarra)
Date: Sun, 22 May 2005 06:12:37 +0100
Subject: What to do about penis problems...
Message-ID: <11D6-8A1D5670E4C59064@apple20.mhpcc.edu>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 687 bytes
Desc: not available
URL:
From eugen at leitl.org Sun May 22 14:13:45 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Sun, 22 May 2005 23:13:45 +0200
Subject: /. [Tor Anonymity Network Reaches 100 Verified Nodes]
Message-ID: <20050522211345.GS3361@leitl.org>
Link: http://slashdot.org/article.pl?sid=05/05/22/0113244
Posted by: timothy, on 2005-05-22 08:01:00
from the needs-some-liver-routing-to-round-it-out dept.
[1]James A. Y. Joyce writes "[2]Tor is an [3]onion routing anonymous
network. It routes your data transfers through a series of encrypted
links between random nodes in the network; the greater the number of
nodes, the greater the anonymity afforded. To commemorate the 100th
verified node in the Tor network ([4]graphs of throughput and nodes
mirrored at Imageshack), the [5]EFF are putting up a request for other
organisations and personal users to [6]start up Tor nodes of their
own. (Tor has been mentioned on Slashdot [7]twice [8]before.)"
References
1. mailto:evolnet.regular at gmail.com
2. http://eff.tor.org/
3. http://en.wikipedia.org/wiki/Onion_Routing
4.
http://img272.imageshack.us/img_viewer.php?loc=img272=numberofrunningtornodes
1sn.png&gal=img272/7484/numberofrunningtornodes1sn.png
5. http://www.eff.org/
6. http://tor.eff.org/contribute.html
7. http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&tid=95
8. http://yro.slashdot.org/article.pl?sid=04/08/05/2352235&tid=158
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From OVGSTXXCHL at simone-at.com Sun May 22 19:35:41 2005
From: OVGSTXXCHL at simone-at.com (Virgil Negron)
Date: Mon, 23 May 2005 00:35:41 -0200
Subject: women like big "stuff"
Message-ID: <0.0830.8B8C@mac.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 599 bytes
Desc: not available
URL:
From jamesd at echeque.com Mon May 23 09:37:26 2005
From: jamesd at echeque.com (James A. Donald)
Date: Mon, 23 May 2005 09:37:26 -0700
Subject: What happened with the session fixation bug?
In-Reply-To: <428E62EF.4020308@algroup.co.uk>
References: <427CCA9B.29132.760A1FC@localhost>
Message-ID: <4291A456.20834.19090CB@localhost>
--
James A. Donald:
> > PKI was designed to defeat man in the middle attacks
> > based on network sniffing, or DNS hijacking, which
> > turned out to be less of a threat than expected.
> >
> > However, the session fixation bugs
> > http://www.acros.si/papers/session_fixation.pdf make
> > https and PKI worthless against such man in the
> > middle attacks. Have these bugs been addressed?
On 20 May 2005 at 23:21, Ben Laurie wrote:
> Do they exist? Certainly any session ID I've ever had
> a hand in has two properties that strongly resist
> session fixation:
>
> a) If a session ID arrives, it should already exist in
> the database.
>
> b) Session IDs include HMACs.
The way to beat session fixation is to issue a
privileged and impossible to predict session ID in
response to a correct login.
If, however, you grant privileges to a session ID on the
basis of a successful login, which is in fact the usual
practice, you are hosed. The normal programming model
creates a session ID, then sets variables and flags
associated with that session ID in response to forms
submitted by the user. To prevent session fixation, you
must create the session ID with unchangeable privileges
from the moment of creation. Perhaps you do this, but
very few web sites do.
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
en30AWb8dk9T67RFzUse67CG7ZHHoOHC5OR/mndW
4T4xroZR7GeKinK0sMRNQ+4Pdj6ApUEu4FCGDghE5
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
From jamesd at echeque.com Mon May 23 11:25:01 2005
From: jamesd at echeque.com (James A. Donald)
Date: Mon, 23 May 2005 11:25:01 -0700
Subject: Len Adleman (of R,S, and A):
In-Reply-To: <428FBC77.530E02E9@cdc.gov>
Message-ID: <4291BD8D.25631.1F30DCE@localhost>
--
On 21 May 2005 at 15:55, Major Variola (ret) wrote:
> Please explain what Bush's invasion of a soverign
> nation had to do with the Saudi 9/11 Theatre?
While it doubtless would have been better to behead the
Saudi monarchy rather than the Iraqi dictatorship,
nonetheless American troops seem to be finding an ample
supply of Saudis in Iraq.
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
UB064U/DafELO1g1L+J1elpcp4Rm0O4oDPOO5uH+
4rzwuJwOGk4RYWsWPOFN78tEmJamA31vLTloe7Rnv
From erdqdgfhiloma at bn-hof.de Mon May 23 07:01:53 2005
From: erdqdgfhiloma at bn-hof.de (Genevieve)
Date: Mon, 23 May 2005 15:01:53 +0100
Subject: election results - Rolex or Cartier or Breitling
Message-ID: <52685277.103133erdqdgfhiloma@bn-hof.de>
Superb Quality Rolex.
The high! profile jewelry you're looking for at the lowest prices in the nation!!..
http://www.ultimatetimepiece4u.net/
Choose from our collection of Rolex watches!
you repository me aztecan me you fortescue me g's me you bellingham me drumhead me you indefensible me vorticity me you julie me herald me
you koinonia me s me you substantial me idiotic me you bellyfull me delineament me you cyclotomic me bronchial me you neath me coco me
From Luella.Dumas at yafro.com Mon May 23 17:04:13 2005
From: Luella.Dumas at yafro.com (Tiffany Zuniga)
Date: Mon, 23 May 2005 16:04:13 -0800
Subject: Refill your meds
Message-ID: <572l972q.8365520@dirtjumpbiker.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 491 bytes
Desc: not available
URL:
-------------- next part --------------
A non-text attachment was scrubbed...
Name: ihrpri.gif
Type: image/gif
Size: 3291 bytes
Desc: not available
URL:
From mv at cdc.gov Mon May 23 18:49:38 2005
From: mv at cdc.gov (Major Variola (ret))
Date: Mon, 23 May 2005 18:49:38 -0700
Subject: Lions and tigers and iraqi minutemen
Message-ID: <42928832.7EC311D5@cdc.gov>
At 11:25 AM 5/23/05 -0700, James A. Donald wrote:
>While it doubtless would have been better to behead the
>Saudi monarchy rather than the Iraqi dictatorship,
>nonetheless American troops seem to be finding an ample
>supply of Saudis in Iraq.
In what imaginary universe?
Perhaps you need to be chipped and your blood pressure/
penile turgidity monitored when watching FOX, like
the brits will soon have. (Proposed for sex offenders,
actually.) Of course getting a stiffie
while watching US videogame death qualifies you for
a cabinet post...
........
A recent pop-Merkin 'News' rag described US psyops which
fund 'moderate' moslems. Refurb a mosque here, beam
Sesame Street in arabic there, you get props, or so the
future-trinitite in DC seem to think. All the more reason
for the Colonized to harvest the Collaborators ---they really
are Western puppets, knowingly or not.
Maybe every Iraqi collaborator needs a US SpecOp team
to wipe their ass, like Karzai has.
Remember, George in Georgia just missed a *live* grenade.
Next time, no hanky to foul the lever, eh?
Render unto Caesar..
----
Orwell was an optimist
From mv at cdc.gov Mon May 23 19:19:07 2005
From: mv at cdc.gov (Major Variola (ret))
Date: Mon, 23 May 2005 19:19:07 -0700
Subject: [Dissidents Seeking Anonymous Web Solutions?]
Message-ID: <42928F1B.7C9C6C60@cdc.gov>
At 03:03 PM 5/17/05 -0700, cypherpunk wrote:
>> [1]DocMurphy asks: "I'm working with some dissidents who are
looking
>> for ways to use the Internet from within repressive regimes. Many
have
>> in-home Internet access, but think it too risky to participate in
>> pro-freedom activities on home PCs.
(Could be a lot of groups in the US.) The best way to interactively
surf anonymously
is to find an unsecured WiFi net and kick back. Use a forged MAC, and
watch your
driving habits. The walls have eyes.
Stego is ok if the site is word of mouth (no DNS, no port 80) anyway,
kind of a
secret knock to get in the speakeasy. But humans get compromised and
the B34ST
logs the site's traffic.
Stego is fine for placing an order with a dissident vendor for a few
drams, but a dissident wanting
mass meme infection needs to anonymously broadcast, and to everyone.
That SMS/ Sprint hack recently
posted strikes me as appealing...
(And we don't need no ex-navy dolphin to jack the bandwidth...)
------
Three minutes. This is it - ground zero.
Would you like to say a few words to mark
the occasion?
Narrator: ...i... ann... iinn... ff...
nnyin...
Narrator: [Voice over] With a gun barrel
between your
teeth, you speak only in vowels.
[Tyler removes the gun from the Narrator's
mouth]
Narrator: I can't think of anything.
Narrator: [Voice over] For a second I
totally forgot about
Tyler's whole controlled demolition thing
and I wonder
how clean that gun is.
From vndrvb at hotmail.com Mon May 23 21:02:12 2005
From: vndrvb at hotmail.com (May Arellano)
Date: Mon, 23 May 2005 22:02:12 -0600
Subject: Does Ur Cock Hard Enough? Zm
Message-ID: <13016343144732.R37435@.noc..gr>
"Ci-ialis Softabs" is better than Pfizer Viiagrra
and normal Ci-ialis because:
- Guaaraantees 36 hours lasting
- Safe to take, no side effects at all
- Boost and increase se-xual performance
- Haarder e-rectiions and quick recharge
- Proven and certified by experts and doctors
- only $3.99 per tabs
Cllick heree:
http://gallanted.com/cs/?ronn
o-ut of mai-lling lisst:
http://gallanted.com/rm.php?ronn
6x4dRf
From lentnmpiumxyjk at brluk.co.uk.jfet.org Tue May 24 01:43:26 2005
From: lentnmpiumxyjk at brluk.co.uk.jfet.org (Blaine)
Date: Tue, 24 May 2005 04:43:26 -0400
Subject: Goodbye to the Excess inches
Message-ID: <20940405985750.A31000@xearthlink.net>
Body Wrap at Home to lose 6-20 inches in one hour.
With Bodywrap we guarantee:
you'll lose 6-8 Inches in one hour
100% Satisfaction or your money back
Bodywrap is soothing formula that contours,
cleanses and rejuvenates your body while
reducing inches.
http://toxic.weightlossfirm.com
derek xn gazette gpw physique uhx cashew jka atypic rou decant yi aristotle xd dragonhead jeo
infer ai norma jg faber jm caldera cj
http://toxic.weightlossfirm.com/r
From JODRTUGBJWSL at whale.co.th Mon May 23 19:56:49 2005
From: JODRTUGBJWSL at whale.co.th (Rafael)
Date: Tue, 24 May 2005 08:56:49 +0600
Subject: huge cumshot Sandra
Message-ID: <209701141618.AA1481354@client.comcast.net>
Increase your CUM VOLUME, and Orgasm Length
main benifits:
- The longest most intense Orgasms of your life
- Erctions like steel
- lncreased libido/desire
- Stronger ejaculaton (watch where your aiming)
- Multiple 0rgasms
- Up to 500% more volume (cover her in it if you want)
- Studies show it tastes sweeter
DISCREET SAME DAY SHIPPING - TRY IT, YOU'LL LOVE IT!
(and she'll thank you for it)
http://ecomomics.net/spur/?got
rebuttal you cilia me gannet you mechanism me
dinghy you minestrone me alia you curia me squint you baneful me
http://ecomomics.net/rm.php?got
From bexwxnmx at gattoproduce.com Tue May 24 06:45:18 2005
From: bexwxnmx at gattoproduce.com (Jonas Cervantes)
Date: Tue, 24 May 2005 11:45:18 -0200
Subject: you wont find anything better Curt
Message-ID: <0105611066760.01145@jfuertes.maz.es>
Dear Homeowner,
You have been pre-approved for a $402,000 Home Loan at 3.45% Fixed Rate.
This offer is being extended to you unconditionally and your credit is in no way a factor.
To take Advantage of this Limited Time opportunity all
we ask is that you visit our Website and complete
the 1 minute post Approval Form.
http://www.sdsinep.com/2/index/bvk
Best Regards,
Jonas Cervantes
Regional CEO
woodlot gc counterproductive hn bock zq chromosphere op notch fnr always lpw downright fls presupposition ors
chinch zos curl ot clipboard tiv ocular rr
http://kajsndh.com/rem.php
From klqeffxe at bottlebill.org Tue May 24 08:48:15 2005
From: klqeffxe at bottlebill.org (Rickey King)
Date: Tue, 24 May 2005 11:48:15 -0400
Subject: More sexual confidence. More sex. More fun.
Message-ID: <102636292.5948.23.camel@pdx.osdl.net>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 808 bytes
Desc: not available
URL:
From mv at cdc.gov Tue May 24 18:52:09 2005
From: mv at cdc.gov (Major Variola (ret))
Date: Tue, 24 May 2005 18:52:09 -0700
Subject: Practical AP
Message-ID: <4293DA49.2BE7BDA7@cdc.gov>
>>Declan, tonight I dined with a major spam fighter and he said he
had direct confirmation of the fact that the vast bulk of spam
is sent by a small number of parties, perhaps 200 at most, and
the bulk of that by a core group of about 20.<<
This from Politech. The author goes on to suggest legal action
against the 200.
Of course, this is fascist, counter to the US's first amendment.
A far more moral solution is to fund AP against the spammers,
including some due diligence to assure that the future corpses
are in fact the ones desired.
Consider a penny per spam per person. Consider only a thousandth
cooperation-rate by spammees. Bush (et al)'s bounty on Osama et al.
would pale in comparison --and actually be acted on, instead of
it being a badge of honor for the targeted.
--------
That was a *live* one, George.
From jtrjtrjtr2001 at yahoo.com Wed May 25 02:30:01 2005
From: jtrjtrjtr2001 at yahoo.com (Sarad AV)
Date: Wed, 25 May 2005 02:30:01 -0700 (PDT)
Subject: Airport screeners could see X-rated X-rays
In-Reply-To: <20050522211345.GS3361@leitl.org>
Message-ID: <20050525093001.83420.qmail@web21205.mail.yahoo.com>
The Homeland Security Department's justification for
the electronic strip searches has a certain logic. In
field test after field test, it found that federal
airport screeners using metal-detecting magnetometers
did a miserable job identifying weapons concealed in
carry-on bags or on the bodies of undercover agents.
http://news.com.com/Airport+screeners+could+see+X-rated+X-rays/2100-7348_3-5718163.html?tag=nl
__________________________________
Do you Yahoo!?
Yahoo! Small Business - Try our new Resources site
http://smallbusiness.yahoo.com/resources/
From jamesd at echeque.com Wed May 25 09:03:17 2005
From: jamesd at echeque.com (James A. Donald)
Date: Wed, 25 May 2005 09:03:17 -0700
Subject: Lions and tigers and iraqi minutemen
In-Reply-To: <42928832.7EC311D5@cdc.gov>
Message-ID: <42943F55.11445.2FBB518@localhost>
--
James A. Donald:
> > While it doubtless would have been better to behead
> > the Saudi monarchy rather than the Iraqi
> > dictatorship, nonetheless American troops seem to be
> > finding an ample supply of Saudis in Iraq.
Major Variola (ret)
> In what imaginary universe?
In the universe where Saudi arabia is concerned about
the number of Saudis held in Iraq.
http://www.gulf-news.com/Articles/Region2.asp?ArticleID=127086
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
lHwkZ3mj6O+XGR8qR2CrktYKElaLqBN+o8xE7dZJ
4sW5xvskkwfx3HMCFhjQD3j0EuXuLI9X9TOx2bUH7
From camera_lumina at hotmail.com Wed May 25 08:14:13 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Wed, 25 May 2005 11:14:13 -0400
Subject: [Dissidents Seeking Anonymous Web Solutions?]
In-Reply-To: <42928F1B.7C9C6C60@cdc.gov>
Message-ID:
Variola wrote...
>Three minutes. This is it - ground zero.
> Would you like to say a few words to mark
>the occasion?
> Narrator: ...i... ann... iinn... ff...
>nnyin...
> Narrator: [Voice over] With a gun barrel
>between your
> teeth, you speak only in vowels.
> [Tyler removes the gun from the Narrator's
>mouth]
> Narrator: I can't think of anything.
> Narrator: [Voice over] For a second I
>totally forgot about
> Tyler's whole controlled demolition thing
>and I wonder
> how clean that gun is.
What the hell is this? How'd you get this transcript? Are you working for
the Feds?!!!
Well, I'm ready...Gitmo me if you can, but I'm taking somma you fuckers with
me!!!
From camera_lumina at hotmail.com Wed May 25 11:24:22 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Wed, 25 May 2005 14:24:22 -0400
Subject: Lions and tigers and iraqi minutemen
In-Reply-To: <42943F55.11445.2FBB518@localhost>
Message-ID:
Wow! 16 Saudis! A veritable tidal wave.
-TD
>From: "James A. Donald"
>To: "cypherpunks at al-qaeda.net"
>Subject: Re: Lions and tigers and iraqi minutemen
>Date: Wed, 25 May 2005 09:03:17 -0700
>
> --
>James A. Donald:
> > > While it doubtless would have been better to behead
> > > the Saudi monarchy rather than the Iraqi
> > > dictatorship, nonetheless American troops seem to be
> > > finding an ample supply of Saudis in Iraq.
>
>Major Variola (ret)
> > In what imaginary universe?
>
>In the universe where Saudi arabia is concerned about
>the number of Saudis held in Iraq.
>http://www.gulf-news.com/Articles/Region2.asp?ArticleID=127086
>
> --digsig
> James A. Donald
> 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
> lHwkZ3mj6O+XGR8qR2CrktYKElaLqBN+o8xE7dZJ
> 4sW5xvskkwfx3HMCFhjQD3j0EuXuLI9X9TOx2bUH7
From rishab at dxm.org Wed May 25 06:23:06 2005
From: rishab at dxm.org (Rishab Aiyer Ghosh)
Date: Wed, 25 May 2005 15:23:06 +0200
Subject: [silk] Fake Fingerprints
Message-ID:
i like the one that was reported a couple of years ago, on how to do it
with edible gelatin rather than wood glue:
http://www.deeperwants.com/cul1/homeworlds/journal/archives/000048.html
the best line: "after [security door] lets you in, eat the evidence".
-r
At 11:57 17/05/2005, Udhay Shankar N wrote:
>What fun.
>
>http://www.ccc.de/biometrie/fingerabdruck_kopieren.xml?language=en
>
>Udhay
>
>--
>((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From eugen at leitl.org Wed May 25 06:49:11 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Wed, 25 May 2005 15:49:11 +0200
Subject: [rishab@dxm.org: Re: [silk] Fake Fingerprints]
Message-ID: <20050525134911.GJ3361@leitl.org>
----- Forwarded message from Rishab Aiyer Ghosh -----
From declan at well.com Wed May 25 19:09:53 2005
From: declan at well.com (Declan McCullagh)
Date: Wed, 25 May 2005 22:09:53 -0400
Subject: [Politech] Are the encryption wars really over? Maybe not [priv]
Message-ID:
Whether the crypto wars are over depends on what you consider the
dispute to be about in the first place. In the export-control sense,
yep, we've won. We may not have had a resounding Supreme Court victory
on First Amendment grounds, but the original regs proved politically
untenable.
How about domestic restrictions? That never really got off the ground in
the U.S., even in the darkest days of the 1990s.
But either could return swiftly. All it would take for a bill to be
introduced is for Al Qaeda to have encrypted information that could have
saved thousands of American lives were it decrypted in time. (Life does
not follow the TV show "24".) See:
http://www.politechbot.com/p-02509.html
http://www.politechbot.com/p-02550.html
I wouldn't be surprised if such a law would permit non-escrowed crypto
to be used to secure communication streams while requiring .gov
backdoors in crypto used for hard drive or file encryption. In other
words, GPG and PGPdisk might become verboten. Programmers might sensibly
scoff, but that's the way the Feds think.
How about other restrictions? I don't think the crypto-in-a-crime idea
ever got enacted into law, but a Minnesota court this month moved in
that direction:
http://news.com.com/2100-1030_3-5718978.html
In other words, the war is probably not over. It's just in a multi-year
lull. The correct preventative tactic to employ right now is to follow
the IPv6 model and seed both disk and communication-stream encryption
wherever it makes sense. Then it becomes more politically difficult to
outlaw.
Previous Politech message:
http://www.politechbot.com/2005/05/24/crypto-wars-are/
-Declan
-------- Original Message --------
Subject: RE: [Politech] Ross Anderson: Crypto wars are over,and we've
won! [priv]
Date: Wed, 25 May 2005 18:11:25 -0400
From: Pyke, Gila
To: Declan McCullagh
Hi Declan,
This email generated a fair amount of discussion amongst my peers. The
assertion by someone so well known and respected that the "crypto wars
are over" was met with quite a bit of skepticism.
A coworker (who wishes to remain nameless) said it best:
"The battles over key escrow and export controls aren't the hot
topics that they used to be. But that's not because the fight is over,
more that it has moved on to other things like digital IDs, biometric
passports, and the other hot topics that circulate on this list.
Projects like the Clipper chip died not because of politics, but
because it was difficult and impractical to deploy and get industry to
adopt it (similar to the problems facing technologies such as PKI and
smart cards).
There are still (smaller) legal battles going on over giving law
enforcement the right to decrypt a suspect's hard drive, or ISPs
handing out passwords to their users' accounts, or cryptographers
facing prosecution for publishing cryptanalytic results, and on and
on. It has become more of a privacy battle than an encryption issue,
but the battle is still there. And of course, there is still the
prevailing paranoia that the NSA and other intelligence agencies have
already cracked the crypto algorithms currently in circulation. This
isn't too far-fetched considering the number of algorithms that have
been broken and retired in recent years. "
As far as many of us are concerned, cryptography always was and always
will be a controversial science. I don't think the government's
interest in controlling it will ever go away, although the face on it
may change.
Incidents like this one:
-------------------
--Hackers Holding Computer Files 'Hostage'
(23 May 2005)
A new type of extortion plot has been identified, unlike any other cyber
extortion, according to the FBI. Hackers used an infected website to
infect computers with a program that encrypts the users file. Then the
criminal demanded money for the key to decrypt the files. Enhanced
versions of this attack threaten large numbers of users with loss of
important data, loss of money, or both.
http://news.yahoo.com/s/ap/20050524/ap_on_hi_te/internet_ransom
-------------------
...will make sure of that. Efforts like TOR will always feel threatening
to some of the people in power, and excuses like the war on terrorism
will always give those people a well-hyped excuse to do "what they think
is necessary".
But that is just my fundie, cynical, tired opinion.
Gila Pyke
Policy Analyst
Privacy and Security Division
Smart Systems for Health Agency
416-586-4257
_______________________________________________
Politech mailing list
Archived at http://www.politechbot.com/
Moderated by Declan McCullagh (http://www.mccullagh.org/)
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From owsqkxqpraqq at scharley.de Wed May 25 14:12:37 2005
From: owsqkxqpraqq at scharley.de (Earnest Whittaker)
Date: Thu, 26 May 2005 00:12:37 +0300
Subject: Home Bianca
Message-ID: <20760404295750.A31300@xearthlink.net>
Are You Ready?
We are accepting mortgage requests.
You don't have good credit history? That's not a problem!
The approval system it's very fast and simple.
Go to the link below right now.
http://www.part1es.com/44.asp
cellulose you allot mestall you crocus menull you roland meada you magnesium me
brokerage you statistician mepersia you explicable me
http://part1es.com/rem.php
From jtrjtrjtr2001 at yahoo.com Thu May 26 00:47:44 2005
From: jtrjtrjtr2001 at yahoo.com (Sarad AV)
Date: Thu, 26 May 2005 00:47:44 -0700 (PDT)
Subject: Minnesota court takes dim view on encryption
In-Reply-To: <20050522211345.GS3361@leitl.org>
Message-ID: <20050526074745.86653.qmail@web21207.mail.yahoo.com>
A Minnesota appeals court has ruled that the presence
of encryption software on a computer may be viewed as
evidence of criminal intent.
http://news.com.com/Minnesota+court+takes+dim+view+of+encryption/2100-1030_3-5718978.html
__________________________________
Do you Yahoo!?
Make Yahoo! your home page
http://www.yahoo.com/r/hs
From AHXWM at webbtech.com.au Wed May 25 19:57:51 2005
From: AHXWM at webbtech.com.au (Jerrod Lundy)
Date: Thu, 26 May 2005 03:57:51 +0100
Subject: satisfy every women around
Message-ID: <68FD87FE.0A24-11D7.A3B5.0050E4C05556@iwr.uni-heidelberg.de>
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 571 bytes
Desc: not available
URL:
From camera_lumina at hotmail.com Thu May 26 07:59:38 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Thu, 26 May 2005 10:59:38 -0400
Subject: /. [CIA's Info Ops Team Hosts 3-Day Cyber Wargame]
In-Reply-To: <20050526111828.GE3361@leitl.org>
Message-ID:
Other versions of the press release are fairly amusing, and can be
paraphrased as follows:
"Imagining a world where most nations are allied against the United States,
the CIA is currently..."
-TD
>From: Eugen Leitl
>To: cypherpunks at jfet.org, transhumantech at yahoogroups.com
>Subject: /. [CIA's Info Ops Team Hosts 3-Day Cyber Wargame]
>Date: Thu, 26 May 2005 13:18:28 +0200
>
>Link: http://slashdot.org/article.pl?sid=05/05/26/044209
>Posted by: samzenpus, on 2005-05-26 06:03:00
>
> from the do-you-want-to-play-a-game dept.
> ScentCone writes "The CIA has booked some conference rooms and is
> [1]working through a simulated 'digital Pearl Harbor' to see how
> government and industry handle a monster net attack from an imaginary
> future foe composed of anti-American and anti-globalization hackers.
> Having been accused of lacking imagination about potential terror
> attacks, they're using the exercise to better shape the government's
> roles in a variety of attack scenarios. The networking industry, it
> seems, is expected to always play a big part in detecting and
> thwarting such threats, as 9/11-scale economic disruption is a likely
> bad-guy objective."
>
>References
>
> 1. http://apnews.myway.com/article/20050525/D8AAFUIO2.html
>
>----- End forwarded message -----
>--
>Eugen* Leitl leitl
>______________________________________________________________
>ICBM: 48.07100, 11.36820 http://www.leitl.org
>8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
>
>[demime 1.01d removed an attachment of type application/pgp-signature which
>had a name of signature.asc]
From camera_lumina at hotmail.com Thu May 26 10:17:38 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Thu, 26 May 2005 13:17:38 -0400
Subject: Anonymous Site Registration
Message-ID:
OK, what's the best way to put up a website anonymously?
Let's assume that it has nothing to do with national security...the Feds
aren't interested.
BUT, let's assume that the existence and/or content of the website would
probably direct a decent amount of law-suits.
Presumably there's no way to hide the ISP from the world, but one should
hopefully be able to hide oneself and make legal action basically useless.
Egold + fake address for registering agency seems a little problematic.
And there's the question of updating the site...
-TD
From eugen at leitl.org Thu May 26 04:18:28 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Thu, 26 May 2005 13:18:28 +0200
Subject: /. [CIA's Info Ops Team Hosts 3-Day Cyber Wargame]
Message-ID: <20050526111828.GE3361@leitl.org>
Link: http://slashdot.org/article.pl?sid=05/05/26/044209
Posted by: samzenpus, on 2005-05-26 06:03:00
from the do-you-want-to-play-a-game dept.
ScentCone writes "The CIA has booked some conference rooms and is
[1]working through a simulated 'digital Pearl Harbor' to see how
government and industry handle a monster net attack from an imaginary
future foe composed of anti-American and anti-globalization hackers.
Having been accused of lacking imagination about potential terror
attacks, they're using the exercise to better shape the government's
roles in a variety of attack scenarios. The networking industry, it
seems, is expected to always play a big part in detecting and
thwarting such threats, as 9/11-scale economic disruption is a likely
bad-guy objective."
References
1. http://apnews.myway.com/article/20050525/D8AAFUIO2.html
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From eugen at leitl.org Thu May 26 04:54:19 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Thu, 26 May 2005 13:54:19 +0200
Subject: [declan@well.com: [Politech] Are the encryption wars really
over? Maybe not [priv]]
Message-ID: <20050526115419.GN3361@leitl.org>
----- Forwarded message from Declan McCullagh -----
From roy at rant-central.com Thu May 26 12:55:56 2005
From: roy at rant-central.com (Roy M. Silvernail)
Date: Thu, 26 May 2005 15:55:56 -0400
Subject: Anonymous Site Registration
In-Reply-To: <20050526190615.GA15191@arion.stark.net>
References:
<20050526190615.GA15191@arion.stark.net>
Message-ID: <429629CC.9010603@rant-central.com>
Justin wrote:
> On 2005-05-26T13:17:38-0400, Tyler Durden wrote:
>
>>OK, what's the best way to put up a website anonymously?
>
>
> Tor? It's not immune from traffic analysis, but it's nearly the best
> you can do to hide the server's location/isp from clients.
i2p is another possibility.
> You can try, but good physical anonymity for commerce is difficult
> unless you construct a fake identity good enough that you can use it to
> open bank accounts... without leaving any compromising fingerprints that
> your bank can turn over to the authorities.
Assuming you want your own SLD name, yes. But if you can be satisfied
with a third-level, there are a lot of domains at freedns.afraid.org
that will let you tag on a subdomain with just a registration (and you
can probably supply a @dodgeit.com address). Then just add a web
forward pointing to the Tor gateway.
--
Roy M. Silvernail is roy at rant-central.com, and you're not
"It's just this little chromium switch, here." - TFT
SpamAssassin->procmail->/dev/null->bliss
http://www.rant-central.com
From justin-cypherpunks at soze.net Thu May 26 12:06:15 2005
From: justin-cypherpunks at soze.net (Justin)
Date: Thu, 26 May 2005 19:06:15 +0000
Subject: Anonymous Site Registration
In-Reply-To:
References:
Message-ID: <20050526190615.GA15191@arion.stark.net>
On 2005-05-26T13:17:38-0400, Tyler Durden wrote:
> OK, what's the best way to put up a website anonymously?
Tor? It's not immune from traffic analysis, but it's nearly the best
you can do to hide the server's location/isp from clients.
> Let's assume that it has nothing to do with national security...the Feds
> aren't interested.
>
> BUT, let's assume that the existence and/or content of the website would
> probably direct a decent amount of law-suits.
Hosting in a country that would laugh at lawsuits, like Sealand?
> Presumably there's no way to hide the ISP from the world, but one should
> hopefully be able to hide oneself and make legal action basically useless.
>
> Egold + fake address for registering agency seems a little problematic.
You can try, but good physical anonymity for commerce is difficult
unless you construct a fake identity good enough that you can use it to
open bank accounts... without leaving any compromising fingerprints that
your bank can turn over to the authorities.
> And there's the question of updating the site...
Tor+rsync?
--
Unable to correct the source of the indignity to the Negro, [the Phoenix,
AZ public accommodations law prohibiting racial discrimination] redresses
the situation by placing a separate indignity on the proprietor. ... The
unwanted customer and the disliked proprietor are left glowering at one
another across the lunch counter. -William "Strom" Rehnquist, 1964-06-15
From measl at mfn.org Thu May 26 18:09:15 2005
From: measl at mfn.org (J.A. Terranson)
Date: Thu, 26 May 2005 20:09:15 -0500 (CDT)
Subject: [Politech] HP announces "National Identity System" for
governments [priv] (fwd)
Message-ID: <20050526200852.K55908@ubzr.zsa.bet>
For those of you who missed this little gem...
--
Yours,
J.A. Terranson
sysadmin at mfn.org
0xBD4A95BF
"Never belong to any party, always oppose privileged classes and public
plunderers, never lack sympathy with the poor, always remain devoted to
the public welfare, never be satisfied with merely printing news, always
be drastically independent, never be afraid to attack wrong, whether by
predatory plutocracy or predatory poverty."
Joseph Pulitzer
1907 Speech
---------- Forwarded message ----------
Date: Thu, 26 May 2005 19:27:38 -0500
From: Declan McCullagh
To: politech at politechbot.com
Subject: [Politech] HP announces "National Identity System" for governments
[priv]
http://news.com.com/2100-7348-5722206.html
HP aims to help governments check IDs
May 26, 2005, 4:16 PM PDT
By Alorie Gilbert
Hewlett-Packard plans to launch a product on Friday that helps
governments check the digital identity of citizens.
The technology, called the HP National Identity System, is designed to
be used in conjunction with a number of Microsoft products, including
its .Net line of server, database and middleware programs. The
companies plan to jointly develop, market and offer training for the
authentication system.
[...remainder snipped...]
_______________________________________________
Politech mailing list
Archived at http://www.politechbot.com/
Moderated by Declan McCullagh (http://www.mccullagh.org/)
From EVWWEIZQNMRZDV at chong.net Fri May 27 04:44:58 2005
From: EVWWEIZQNMRZDV at chong.net (Beryl)
Date: Fri, 27 May 2005 04:44:58 -0700
Subject: Summer means bye bye gut
In-Reply-To:
References:
Message-ID: <60331002160425.GI32305@halt.tech.sitadelle.com>
Body Wrap at Home to lose 6-20 inches in one hour.
With Bodywrap we guarantee:
you'll lose 6-8 Inches in one hour
100% Satisfaction or your money back
Bodywrap is soothing formula that contours,
cleanses and rejuvenates your body while
reducing inches.
http://gesture.weightlossfirm.com
pyrimidine eh uplift fa salutation kxp abbas va born bws organometallic fz
elution uc dial ilq impartation avh grandnephew wea extramural ca neither jq
http://gesture.weightlossfirm.com/r
From xamqcit at nakagawa-usa.com Thu May 26 21:31:49 2005
From: xamqcit at nakagawa-usa.com (Avis)
Date: Fri, 27 May 2005 09:31:49 +0500
Subject: Mr Rolex
Message-ID: <714z7fzlsc.fsf@calle78.net>
Superb Quality Rolex.
The high! profile jewelry you're looking for at the lowest prices in the nation!!..
http://www.arolex4me.com/
Choose from our collection of Rolex watches!
you hyperboloid me kitty me you half me toby me you obligatory me befoul me
you tournament me los me you morrill me bedridden me you cabinetry me teetotal me you splurge me leatherback me
From julieWitherspoon69 at doofus.org Fri May 27 03:30:26 2005
From: julieWitherspoon69 at doofus.org (Julie Dow)
Date: Fri, 27 May 2005 11:30:26 +0100
Subject: it`s julie here
Message-ID: <20050991437.j19CET4e989@localhost.localdomain>
My name is Julie :) This whole semester I felt like I want to do something I've never done before.. idea came to me
to have my videos I made with my old boyfriend online ;p. My girlfriends want to join me to on my website. -) Verify your age and connect to my webcam today -)
Come check website I put together, I'm not that good tho with comp skills yet but tell me what you think ;0
http://www.tatankarules.com/ju18/
you bona me arbitrage me you lawgive me brook me you conquest me smug me
you rune me bangor me you experiment me coniferous me you miriam me worm me
From GFMTG at 20ansapres.com Fri May 27 00:04:10 2005
From: GFMTG at 20ansapres.com (Tamra)
Date: Fri, 27 May 2005 13:04:10 +0600
Subject: new impotence treatment drug Maricela
Message-ID: <3DF4FB83.25004@ubp.edu.ar>
Cialis Softabs are better than Pfizer Viagra
and normal Cialis because:
- Guarantees 36 hours lasting
- Safe to take, no side effects at all
- Boost and increase sexual performance
- Harder erections and quick recharge
- Proven and certified by experts and doctors
- only $3.99 per tabs
Click here:
http://www.visagraph.net/cs/?got
wave you dayton me transcontinental you referent me
orthodoxy you trudge me assimilable you imputation me
http://www.visagraph.net/rm.php?got
From eugen at leitl.org Sat May 28 12:53:52 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Sat, 28 May 2005 21:53:52 +0200
Subject: /. [Intel Adds DRM to New Chips]
Message-ID: <20050528195352.GE3361@leitl.org>
Link: http://slashdot.org/article.pl?sid=05/05/28/1718200
Posted by: Zonk, on 2005-05-28 17:37:00
from the get-you-where-you-live dept.
Badluck writes "Microsoft and the entertainment industry's holy grail
of controlling copyright through the motherboard has moved a step
closer with Intel Corp. now embedding [1]digital rights management
within in its latest dual-core processor Pentium D and accompanying
945 chipset. Officially launched worldwide on the May 26, the new
offerings come [2]DRM -enabled and will, at least in theory, allow
copyright holders to prevent unauthorized copying and distribution of
copyrighted materials from the motherboard rather than through the
operating system as is currently the case..." [3]The Inquirer has the
story as well.
References
1. http://www.digitmag.co.uk/news/index.cfm?NewsID=4915
2. http://en.wikipedia.org/wiki/Digital_rights_management
3. http://www.theinquirer.net/?article=23548
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From justin-cypherpunks at soze.net Sat May 28 15:57:54 2005
From: justin-cypherpunks at soze.net (Justin)
Date: Sat, 28 May 2005 22:57:54 +0000
Subject: /. [Intel Adds DRM to New Chips]
In-Reply-To: <20050528195352.GE3361@leitl.org>
References: <20050528195352.GE3361@leitl.org>
Message-ID: <20050528225754.GA13219@arion.stark.net>
On 2005-05-28T21:53:52+0200, Eugen Leitl wrote:
> Link: http://slashdot.org/article.pl?sid=05/05/28/1718200
> Posted by: Zonk, on 2005-05-28 17:37:00
>
> from the get-you-where-you-live dept.
> Badluck writes "Microsoft and the entertainment industry's holy grail
> of controlling copyright through the motherboard has moved a step
> closer with Intel Corp. now embedding [1]digital rights management
> within in its latest dual-core processor Pentium D and accompanying
> 945 chipset. Officially launched worldwide on the May 26, the new
> offerings come [2]DRM -enabled and will, at least in theory, allow
> copyright holders to prevent unauthorized copying and distribution of
> copyrighted materials from the motherboard rather than through the
> operating system as is currently the case..." [3]The Inquirer has the
> story as well.
Is slashdot really a news source? How about posting one of the articles
cited instead.
--
Unable to correct the source of the indignity to the Negro, [the Phoenix,
AZ public accommodations law prohibiting racial discrimination] redresses
the situation by placing a separate indignity on the proprietor. ... The
unwanted customer and the disliked proprietor are left glowering at one
another across the lunch counter. -William "Strom" Rehnquist, 1964-06-15
From camera_lumina at hotmail.com Sat May 28 20:26:28 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Sat, 28 May 2005 23:26:28 -0400
Subject: /. [Intel Adds DRM to New Chips]
In-Reply-To: <20050528195352.GE3361@leitl.org>
Message-ID:
Eugen Leitl wrote...
> from the get-you-where-you-live dept.
> Badluck writes "Microsoft and the entertainment industry's holy grail
> of controlling copyright through the motherboard has moved a step
> closer with Intel Corp. now embedding [1]digital rights management
> within in its latest dual-core processor Pentium D and accompanying
> 945 chipset. Officially launched worldwide on the May 26, the new
> offerings come [2]DRM -enabled and will, at least in theory, allow
> copyright holders to prevent unauthorized copying and distribution of
> copyrighted materials from the motherboard rather than through the
> operating system as is currently the case..." [3]The Inquirer has the
> story as well.
(Continued)
"Contrary to expectations, however, sales of the chip have been suprisingly
low, with zero interest shown by major PC manufacturers. One major PC
industry executive, who wished to remain anonymous sated: "There are 100s of
millions of people trading files every day throughout the globe. I'm going
to start using this chip and give up that market because...?"
OK, Gov officials will eventually start trying to introduce laws mandating
such technologies be used, but by then it's going to come down to a battle
of lobbies: The Entertainment industry vs Telecom+PCs++Software. Which can
pump dollars into Senatorial hands faster?
-TD
From GKUIHI at marsall.com Sun May 29 00:38:22 2005
From: GKUIHI at marsall.com (Timothy)
Date: Sun, 29 May 2005 03:38:22 -0400
Subject: what are you waiting for? postcard
Message-ID:
New cialis softtabs, thay last longer and have
less sideeffects
Softtabs disolve in the mouth to start working faster
World wide delivery
No prescription needed
Private online ordering!!
http://visagraph.net/cs/?got
droopy you denote me baroness you silken me
absentminded you aspheric me draftsman you absorbent me
http://coeducation.visagraph.net/rm.php?got
From xsltuzxtzwwb at rocketmail.com Sat May 28 22:28:24 2005
From: xsltuzxtzwwb at rocketmail.com (Earnestine Jacob)
Date: Sun, 29 May 2005 10:28:24 +0500
Subject: Hi! My name's Lily, wanna see my boddy? alfresco
Message-ID: <6676ige35fr304$766266$fy9u5@Carlenen22ub7d1ld>
Hi! As I told you, I'm Lily and me and
my girlfriends run and operate a site
where you can see us nude. We are all
teens that love to pose nude and love
to show our buddies to your pleasure.
Why you ask? Because sexy and horny men
like you make us horny too. If you want
to watch yourself, come on now!
http://www.wudhryc.com/bien/bridgetown/cloth/agreed.htm
is the actress sarah glass the character apparently i m a johnny-come-lately to this well-known wedding plot line.
una matagalpina orgullosa de su tierra fel icidades por este esfuerzo tan grande seguimos en contacto saludos a todos les escribo de los angeles ca.
encore is a publisher and distributor of fine african american art and buffalo soldier collectables.
santa fe art gallery - new mexico - features fine art reproductions and originals in oil acrylic pastel encaustic raku and bronze.
georgie what do you see in him? i mean is lucas smart? does he read? do you have one single thing in common with him because i sure can t see it.
love the pics just so you know remmeber i was the best man at matt and mandy dempsey s o leary wedding cheers and good luck with your wedding ps say hi to naomi for me she may remember!
please limit the posts to locating teammates if you have found a team we request that you take down your post so that people do not keep contacting you thank you!
well it doesn t take a genius to know that bloggers will take the bait but a red herring it wasn t.
i love turtles as well woud like to become involved with the rescue if i can help i would gladly foster!!
anyway if you re dog lover enough to read books about them -- but you know who you are -- my friend.
neither moore nor his representatives would describe the nature or contents of the interview with berg who held staunch pro-war views.
and buy a bunch of cosmetics if they re not the finest cosmetics you ve ever seen hilary will refund octuple your money back no questions asked i m pretty sure that s a guarantee.
From eugen at leitl.org Sun May 29 02:05:47 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Sun, 29 May 2005 11:05:47 +0200
Subject: /. [Intel Adds DRM to New Chips]
In-Reply-To:
References: <20050528195352.GE3361@leitl.org>
Message-ID: <20050529090547.GP3361@leitl.org>
On Sat, May 28, 2005 at 11:26:28PM -0400, Tyler Durden wrote:
> (Continued)
> "Contrary to expectations, however, sales of the chip have been suprisingly
> low, with zero interest shown by major PC manufacturers. One major PC
> industry executive, who wished to remain anonymous sated: "There are 100s
> of millions of people trading files every day throughout the globe. I'm
> going to start using this chip and give up that market because...?"
What actually seems to be happening is that chipset DRM is being deployed
silently,
though not on a wide scale yet, and but for game consoles in a facultative
version. Of course, such dormant DRM can be activated with subsequent
software
upgrades (watch the sneaky software-DRM games Cupertino plays).
The billion dollar question is: will users let themselves lock in into the
DRM prison, just because of a dangling premium content carrot, and the "I
gots your IP, my lawyers 0wnZ0r Ur 455" litigation stick?
We're going to see soon, as HDTV on BluRay&Co is going to be that experiment.
The next-generation signal lanes to display devices are encrypted, so there's
only the analog hole left to the naive user.
Online activation of software is already quite widespread, so it seems
customers are willing to accept restriction to ownership and use.
> OK, Gov officials will eventually start trying to introduce laws mandating
> such technologies be used, but by then it's going to come down to a battle
> of lobbies: The Entertainment industry vs Telecom+PCs++Software. Which can
> pump dollars into Senatorial hands faster?
The entertainment industry has an order of magnitude less funds, but seems to
spend them far more efficiently. Also, the Far East market is increasingly
supplying itself, so Hollywood has less and less angle there. Let US and EU
get the crippleware, while the rest of the world gets swamped with plaintext
pirated copies (a single break is enough).
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From camera_lumina at hotmail.com Sun May 29 08:44:41 2005
From: camera_lumina at hotmail.com (Tyler Durden)
Date: Sun, 29 May 2005 11:44:41 -0400
Subject: /. [Intel Adds DRM to New Chips]
In-Reply-To: <20050529090547.GP3361@leitl.org>
Message-ID:
Eugen Leitl wrote...
>Online activation of software is already quite widespread, so it seems
>customers are willing to accept restriction to ownership and use.
Well, that's an interesting phenomenon. In industrialized nations where the
price of software is fairly low compared to the wages, people seem somewhat
willing to pay. At least, we don't see ticket sales for big movies going
down at all. So it could be that people will eventually voluntarily release
control, as long as the consequences (ie, prices) aren't too high. On the
other hand, the whole P2P phenomenon is not happening simply because people
don't want to pay. Stupid industry execs will probably continue churning out
the same stupid shit they always did and P2Pers will find some way around
their "protection" if needs be.
From lucy.dunne at gmail.com Sun May 29 14:59:20 2005
From: lucy.dunne at gmail.com (Lucy Dunne)
Date: Sun, 29 May 2005 17:59:20 -0400
Subject: [wearables] /. [GPS-tracked Clothing]
In-Reply-To: <20050529164643.GV3361@leitl.org>
References: <20050529164643.GV3361@leitl.org>
Message-ID:
ahhhh but check out the parent website, contagious media
(http://contagiousmedia.org/). the site is a hoax :)
--lucy
On 5/29/05, Eugen Leitl wrote:
>
> Link: http://slashdot.org/article.pl?sid=05/05/29/1547234
> Posted by: CmdrTaco, on 2005-05-29 16:07:00
>
> from the finally-i-have-to-ask-why dept.
> [1]Anil Kandangath writes "A Japanese firm has shown off new
> technology that enables GPS units to be embedded [2]in clothing that
> will enable the wearer to be tracked continuously. The device is thin
> enough to be tacked on unobtrusively and is powered by a thin watch
> battery. It is also capable of taking biometric measurements and
> [3]transmitting them PCs and handheld devices. Though marketed as a
> device to enable people to keep track of spouses, how long before such
> technology becomes intrusive in our lives?" Like tracking your spouse
> is ok?. What a world!
>
> References
>
> 1. http://www.ecogito.net/anil
> 2. http://forgetmenotpanties.contagiousmedia.org/
> 3. http://forgetmenotpanties.contagiousmedia.org/sensatech.html
>
> ----- End forwarded message -----
> --
> Eugen* Leitl leitl
> ______________________________________________________________
> ICBM: 48.07100, 11.36820 http://www.leitl.org
> 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
>
>
> BodyID:256123721.2.n.logpart (stored separately)
From eugen at leitl.org Sun May 29 09:46:43 2005
From: eugen at leitl.org (Eugen Leitl)
Date: Sun, 29 May 2005 18:46:43 +0200
Subject: /. [GPS-tracked Clothing]
Message-ID: <20050529164643.GV3361@leitl.org>
Link: http://slashdot.org/article.pl?sid=05/05/29/1547234
Posted by: CmdrTaco, on 2005-05-29 16:07:00
from the finally-i-have-to-ask-why dept.
[1]Anil Kandangath writes "A Japanese firm has shown off new
technology that enables GPS units to be embedded [2]in clothing that
will enable the wearer to be tracked continuously. The device is thin
enough to be tacked on unobtrusively and is powered by a thin watch
battery. It is also capable of taking biometric measurements and
[3]transmitting them PCs and handheld devices. Though marketed as a
device to enable people to keep track of spouses, how long before such
technology becomes intrusive in our lives?" Like tracking your spouse
is ok?. What a world!
References
1. http://www.ecogito.net/anil
2. http://forgetmenotpanties.contagiousmedia.org/
3. http://forgetmenotpanties.contagiousmedia.org/sensatech.html
----- End forwarded message -----
--
Eugen* Leitl leitl
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
From justin-cypherpunks at soze.net Sun May 29 12:28:59 2005
From: justin-cypherpunks at soze.net (Justin)
Date: Sun, 29 May 2005 19:28:59 +0000
Subject: /. [GPS-tracked Clothing]
In-Reply-To: <20050529164643.GV3361@leitl.org>
References: <20050529164643.GV3361@leitl.org>
Message-ID: <20050529192859.GA31034@arion.stark.net>
On 2005-05-29T18:46:43+0200, Eugen Leitl wrote:
> Link: http://slashdot.org/article.pl?sid=05/05/29/1547234
> Posted by: CmdrTaco, on 2005-05-29 16:07:00
>
> from the finally-i-have-to-ask-why dept.
> [1]Anil Kandangath writes "A Japanese firm has shown off new
> technology that enables GPS units to be embedded [2]in clothing that
> will enable the wearer to be tracked continuously. The device is thin
> enough to be tacked on unobtrusively and is powered by a thin watch
> battery.
As opposed to a thick watch battery?
> It is also capable of taking biometric measurements and
> [3]transmitting them PCs and handheld devices.
Is that english? I don't think the device transmits PCs and handheld
devices to biometric measurements.
> Though marketed as a device to enable people to keep track of
> spouses, how long before such technology becomes intrusive in our
> lives?" Like tracking your spouse is ok?. What a world!
I know that isn't english, and it's only marginally coherent.
I would much rather read a summary written by someone literate.
> References
>
> 1. http://www.ecogito.net/anil
I don't see it.
> 2. http://forgetmenotpanties.contagiousmedia.org/
> 3. http://forgetmenotpanties.contagiousmedia.org/sensatech.html
Uh huh. This looks like a joke or a scam. Even if it's not, I have a
hard time believing that a girlfriend/wife/daughter is not going to
notice that in her panties, and I doubt sufficiently miniaturized GPS
receivers could be made for so little money.
Perhaps that's why Anil seems to have removed the entry in his blog?
Do you now understand why I hate redistribution of slashdot stories?
--
Unable to correct the source of the indignity to the Negro, [the Phoenix,
AZ public accommodations law prohibiting racial discrimination] redresses
the situation by placing a separate indignity on the proprietor. ... The
unwanted customer and the disliked proprietor are left glowering at one
another across the lunch counter. -William "Strom" Rehnquist, 1964-06-15
From justin-cypherpunks at soze.net Sun May 29 12:56:43 2005
From: justin-cypherpunks at soze.net (Justin)
Date: Sun, 29 May 2005 19:56:43 +0000
Subject: google maps and latitude, longitude
Message-ID: <20050529195643.GA31137@arion.stark.net>
For anyone who doesn't already know, there are several ways to get
google maps to display a latitude/longitude.
You can enter them in the query box like so:
35.5N 115.5W
or
35.5,-115.5
(I think they added those within the last week or two.)
Or you can use the original method, a GET-style form (I don't know
whether POST works):