Re: 2600 - bell toll signals

2000-07-27 Thread Dave Emery

On Thu, Jul 27, 2000 at 02:20:26AM -0400, !Dr. Joe Baptista wrote:
> Hello:
> 
> I'm looking for a list of telephone company modulation frequencies used on
> toll lines (trunk lines) to control switching between offices.  Anyone
> know where I can find them. Used to know them by heart - 2600 to disconect
> and 300 - 1200 ?? for the control tones.
> 
> Joe Baptista
> 

In band signalling (tones on the trunk lines) is no longer in
use in the USA to any important degree and hasn't been since the late
70s or so.   Control of call setup and supervision is handled by an out
of band packet network using a signalling protocol called signalling
system 7 (SS7) running over entirely separate data circuits which often
don't even take the same paths through the network as the trunk groups
they control do.

But what you are looking for is the CCITT signalling system #5
or the Bell MFKP (multifrequency key pulsing) tone set  (different than DTMF,
the touch tone tones).Also commonly known as the "Blue Box" tones.
The US frequencies were 700, 900, 1100, 1300, 1500, 1700 sent in pairs.

But what this has to do with cryptography and the politics of privacy
I am apparently too dimwitted to see...



-- 
Dave Emery N1PRE,  [EMAIL PROTECTED]  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





Fw: Kill the RIAA: a protocol

2000-07-27 Thread Marcel Popescu

LOL.. yet another idea of "how to deal with copyright". Is it legal if I
"borrow" the CD from the server when I start listening, and "return" it
afterwards? The server could have a number of licenses for each CD, and
"lock" them every time someone else is streaming them.

Mark

X-Loop: openpgp.net
From: "Craig Raskin" <[EMAIL PROTECTED]>


> On Thu, 27 Jul 2000, Jeff Kandt wrote:
>
> > The music labels are going down and they know it.  They're making a
> > last grab at milking undeserved money from copyrighted bits because
> > they know how little time they have left.  They know Napster is only
> > the beginning.  Gnutella is coming, Freenet is coming, something else
> > after that.  But the music labels are greedy bastards and their
> > supply of lawyers is deep.
> >
> > Well, the internet treats greed like damage and routes around it.
> >
> > I'd like to pay the musicians for music I download, but I can't.  Of
> > the 30 songs I downloaded, there are maybe five that I really like
> > and feel bad about not having paid the musicians for their work and
> > creativity.  If I could easily send small amounts of tip money to the
> > musicians I listen to most, to thank them and keep them playing, I
> > would.  If I'm willing to tip my musicians maybe others are, too.
>
> There is another way to look at this. I remember quite a bit of flak
> a few years ago revolving around used-CD sales. Since artists were
> not getting royalties off of these sales, a few of them wanted to
> boycott music stores which also sold used-CDs. Obviously, I am
> within my full legal right to sell something which I have bought
> based on copyright laws. Certain artists didn't agree.
>
> This brings up an interesting point. What if there was a FLEXlm type
> server where music could be checked in and out. Since no duplication
> would be taking place there would be no copyright problems. If users
> could somehow donate their unused licenses, old records laying in
> the back of their closets, there would be plenty to go around
> without running into legal problems. Each donated recording would
> effectively increase the number of 'Rights To Use' available.
>
> It would be difficult to ensure that a copy of the checked out music
> would not be stored on a users system, but at least the server would
> be legal.
>
> I personally would love to donate a few Metallica records to the
> cause. :)








Re: domestic surveillance for LA Dems

2000-07-27 Thread David Honig

At 12:42 PM 7/27/00 -0400, [EMAIL PROTECTED] wrote:
>>weeks, police have arrested a handful of people
>>for taking pictures of downtown buildings from
>
>It's the Picture Taking Crime - the buildings are copyrighted.
>
>The warnings are quite similar to those issued for Y2K (hello, Bill S. :-).
>US Domestic Pacifier Troops are desperate to provoke violence and justify
>their keep.

Heh, maybe terraserver et al. will be coerced into censoring 1 meter images
of Philadelphia and LA... like Israel..










  








Re: "Welcome to Crypto World"

2000-07-27 Thread David Honig

At 01:02 PM 7/27/00 -0400, Tim May wrote:

>To elaborate on "generatable," something like a "CAD program for 
>crypto" is what we were talking about. Bob Baldwin, when he was at 

A library implementing a clean API or a new domain-specific language? 
The latter tend to die out.  The former tend to get incorporated into
larger tools that people actually use.  

>The ideas Eric and I were so excited about can be summarized thusly: 
>"Let's take the abstract math and CS ideas from the various Crypto 
>Conference papers and actually reify them in working code."

That would certainly work out the bugs in your development
environment/API/language.  But implementing protocols for the fun of 
it?  Most people spending such a chunk of time would rather work on
something that would be used.  (Students are an exception, see below)

>the 
>"cool project" would then be to implement the stuff in the various 
>Crypto Conference Proceedings.

\begin{IMHO} 
Its more rewarding to pick an app and enhance it with crypto, and
then package your crypto protocol implementation for reuse, than to sit and
code protocol after protocol out of some academic texts, don't you think?

>Alas, it hasn't happened. Not even the _developers_ of the various 
>protocols described above have runnable demos (At least none I've 
>seen or heard of.)

Developers of protocols are heavily mathematical, protocols being
essentially mathematical objects.  Having seen the fire extinguisher, 
they go back to sleep.


>We expected the DC Net Protocol, even the version extant as of 1992 
>(Chaum, Pfitzmann, et. al.), to be implemented by now in Perl, or 
>Python, or Smalltalk, or whatever. Java was supposed to make gluing 
>together things as applets easy. Didn't happen, at least not for 
>crypto.

Glue is not the problem.  Finding a reason to spend time implementing
protocols is the problem.  Then the problem is getting what you've built 
deployed then used enough to be self-sustaining.

Along the way you can do a clean design and make an API usable by others.

>I'm not sure why this situation is the way it is.
>
>There are crypto libraries, like Crypto++, but they fall far short of 
>providing building blocks such as you list above.

So use a 'simple' library to build a protocol library.  
Otherwise you'll have to wait for someone else to get the motivation.

>A motivation for generating these protocols, even if slightly 
>imperfect and not "ready for prime time" financial transactions, is 
>to allow for simulations of behavior in systems where the players or 
>agents have cryptographic capabilties. Kind of a Vernor Vinge "True 
>Names" or Neal Stephenson world in which players can flip fair coins, 
>gamble, create subliminal channels, experiment with steganography, 
>buy and sell bits untraceably, and all the usual fun stuff of the 
>Cypherpunks canon.

So add this stuff to a chat room, or auction app, etc.  Add crypto to
existing apps with established audiences.  Figure out ways to make the
human interactions intuitive.  That's worth a lot.

>I do a lot better writing anarcho-capitalist screeds than I would 
>ever do recruiting helpers on a software project like this.

I think getting students to do implementations is your best hope.
Students will invest time because they learn from it, and won't
be bummed if no one ever runs it again.  You can also entice
formal students with school credit.

Now, you may not have time or eager students at your command, but others
who read this list might.

>There is absolutely no reason why a "Crypto World" cannot be built, 
>with more and more of these protocols that Ray lists not implemented 
>with varying degrees of efficiency and robustness. Even if crudely 
>implementing, exploring interactions in this Crypto World would be 
>interesting, and possibly useful in the Real World.

Most people are more like VCs...  They won't invest 
in an idea just because they can; they want utility.
Very few people will spend months machining gears *just* so they can 
watch them spin.  

This really has little to do with crypto; its really about creative
motivational psych.  Why people build things when they build unpaid.
Blame it on age if you want...















  








Re: actual deployment of various PK & Key-exchange algorthms?

2000-07-27 Thread David Honig

At 12:23 PM 7/27/00 -0400, [EMAIL PROTECTED] wrote:
>A colleague asked yesterday "I wonder how much Diffie-Hellman is actually 
>used?", as we were sitting around talking about authentication (in
particular) 
>and security (in general) protocols.

Its used in PGPfone, because the parties have to be on-line, and
it has security-benefits too (forward secrecy, no trusted nameserver).








  








Re: Wired News : FBI Gives a Little on Carnivore

2000-07-27 Thread Karla Seaver

Yup, there have been two cases reported in Minnesota media recently of
"observers" being taken away to jail. In one, in Duluth, a guy who had drunk
several beers, was walking home, thru an alley, saw a guy laying on the ground
with a rent-a-cop standing nearby. He asked what was going on, the wannabe-pig
said he had called 911, so this fellow talks to the guy on the ground, telling
him that the pigs were on their way, would he like to get up and walk, etc.
Then the pigs arrived, told the observer to move on, he asked why, wouldn't
go, they took him to spin-dry, where he spent several days, at his expense,
and was released with the warning that next time it would be a minimum of 60
days. Nice write up in a local alternative paper.
   The other was a retired sheriff of a rural MN county. He was talking a
writing class, saw some Minneapolis cops rousting a homeless person, stopped
to observer, was taking notes, got himself arrested and spent several days in
jail. Nice piece on it on Minnesota Public Radio awhile back.
  Obviously little concern for the Constitution these days by pigs, eh?



Tim May wrote:

> At 4:06 PM -0400 7/26/00, David Honig wrote:
> >At 01:03 PM 7/26/00 -0400, Tim May wrote:
> >>
> >>(I once tried to video tape a police bust in Santa Cruz with my shiny
> >>new camcorder, in 1987. As soon as the cops saw me, one of them came
> >>over to my vantage point across the street and did the usual
> >>cop-threat thing: "Do you have an involvement in this matter? No,
> >>well then move along." No doubt Brin and others would point out that
> >>the idea is to keep the camera hidden, or have multiple cameras, etc.)
> >
> >You must have been in a good mood, or sedated.  The proper answers:
> >"No" followed by "fuck off, I'm not obstructing" while still filming.
> >
>
> I remember reports at the time that folks had been busted--or "taken
> the trip downtown"--for interfering with police business by
> videotaping.
>
> (What saved the photographer in the Rodney King case was of course
> that he was taping from an upstairs window, unknown to the cops.)
>
> I don't know what would have happened to me back then if I'd said
> "Fuck off, I'm not obstructing." But taping some street people being
> busted by the cops wasn't enough of an issue for me to find out.
>
> --Tim May
> --
> -:-:-:-:-:-:-:
> Timothy C. May  | Crypto Anarchy: encryption, digital money,
> ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
> "Cyphernomicon" | black markets, collapse of governments.

--
Karla M. Seaver Datura is pretty, wolfbane is nice,
[EMAIL PROTECTED]  either one will put you on ice.






Re: "Welcome to Crypto World"

2000-07-27 Thread Marcel Popescu

X-Loop: openpgp.net
From: "petro" <[EMAIL PROTECTED]>

> There was a presentation at the Bay Area Cypherpunks meat
> meet about "E", a capabilities based language. Is that along the
> lines of what you are looking for?
>
> I can't find anything on the web, but searching for "E" isn't
> going to get you a lot of useful stuff, and the rest of the things
> linked in memory to that concept.

EarthWeb, by Mark Stiegler (I think), discusses something along the lines of
E. http://www.skyhunter.com/earthweb/ (I loved the book).

The "Related Links" page will send you to http://www.erights.org/ which is
the page you want.

Mark








Re: Napster PI helpful

2000-07-27 Thread Craig Brozefsky

Tim May <[EMAIL PROTECTED]> writes:

> A very good analysis.
> 
> And on a different tack, I expect/predict that Napster will reinvent 
> itself as a distributor of material with the permission of the record 
> companies and will then aggressively go after Gnutella, Freenet, and 
> Mojo types of sites. "Those who live by the sword..."

At this point I am unable to imagine what vectors of attack would
prove fruitful for them.  That obviously does not mean there aren't
any.  Perhaps someone else has put some thought into this and has some
ideas.  

The CNET coverage of the Napster debacle includes links to an article
covering a survey which indicates that at least 60% of the Napster
users would continue trading files regardless of what the courts have
to say.

On a similiar note, I have been using OpenNAP servers since I started
using napster.  They presently don't have the same density of users,
but I imagine that will change quickly enough.  They are located in
several different countries, tho I am not sure what he chances of
legal action being brought against them in their home realms are.

-- 
Craig Brozefsky   <[EMAIL PROTECTED]>
Lisp Web Dev List  http://www.red-bean.com/lispweb
---  The only good lisper is a coding lisper.  ---





Re: Napster PI helpful

2000-07-27 Thread Alex C. Snoeren

> And on a different tack, I expect/predict that Napster will reinvent 
> itself as a distributor of material with the permission of the record 
> companies and will then aggressively go after Gnutella, Freenet, and 
> Mojo types of sites. "Those who live by the sword..."

They already have:  http://www.applesoup.com

- Alex





Re: Napster PI helpful

2000-07-27 Thread Eric Murray

On Thu, Jul 27, 2000 at 01:47:35PM -0400, Tim May wrote:
> 
> Digression on "rent-seeking behavior." In an effort to stave off 
> corporate extinction, the loss of all of their IPO dreams, and the 
> laying-off of their employees, Napster will probably "cut a deal" 
> with the RIAA.

They're already working on it:  there was an article
in the SJ Merc a couple days ago about a deal between
Napster and Liquid Audio, to create some sort of
RIAA-acceptable system using Liquid Audio's
watermarking technology. 

I agree with you, Napster is going to try to switch their
user base to a for-pay model.

-- 
  Eric Murray http://www.lne.com/ericm  ericm at lne.com  PGP keyid:E03F65E5
Security consulting: secure protocols, security reviews, standards, smartcards. 





Re: Napster PI helpful

2000-07-27 Thread Tim May


A very good analysis.

And on a different tack, I expect/predict that Napster will reinvent 
itself as a distributor of material with the permission of the record 
companies and will then aggressively go after Gnutella, Freenet, and 
Mojo types of sites. "Those who live by the sword..."

More comments below.

At 2:31 AM -0400 7/27/00, Lucky Green wrote:
>While I disagree with Judge Patel's PI in the Napster case, there is a
>valuable lesson in this result that should be of interest to Cypherpunks.
>Several lessons, actually:
>
>1. Systems that rely on cooperation from the law are fundamentally broken
>and will be compromised.
>
>
>2. Systems with a single point of failure, such as a centralized network
>information database or any other kind of head are less resilient in the
face of attack.


These being the main flaws in such systems as Freedom, Sealand, and 
other centralized point of control systems. (Mojo Nation may 
temporarily fall into that category, unless and until the system 
"goes headless.')

>
>3. Almost a corollary to 2., attacks by predators, legal or otherwise,
>exert an evolutionary pressure on system architecture. While Napster will
>likely either be put out of business or change their delivery model so
>significantly to have little in common with their present offering, all
>this means to the larger population is that the Gnutella, Freenet, and
>similar strains with better DNA will spread faster.

Yep. Napster created the market, got the users interested, and now 
other systems will capture the market. The RIAA's worst fears are 
about to come true.

>
>The end result of the legal evolutionary pressures on Napster and similar
>distributed file sharing systems will simply be that the systems that
>ultimately survive and multiply will be those that are more worthy of
>surviving due to their resilience to attack, distributed nature, and
>better anonymity features.
>
>So in the long run, the predators currently at work are actually helping
>us to deploy better systems faster. I can live with that. (Which is not to
>say that the predators should not be resisted).

Digression on "rent-seeking behavior." In an effort to stave off 
corporate extinction, the loss of all of their IPO dreams, and the 
laying-off of their employees, Napster will probably "cut a deal" 
with the RIAA. I don't know what form this deal will take...perhaps 
some subscription system with fees kickbacked to the record 
companies, perhaps some system where an artist must explicitly give 
permission for his or her works to be indexed, whatever.

"Rent-seeking" is where someone seeks to collect some toll, some fee, 
based on any of a number of points of alleged right to collect such 
fees. Copyright is one form. Napster will likely seek to survive by 
this kind of rent-seeking: "Hey, we came to an honorable arrangement 
with the RIAA, as part of the settlement. Now, Judge Patel, we want 
you to stop these pirates running Gnutella, Mojo Nation, and Freenet!"

A corporate entity like Napster, with hundreds of millions of bucks 
at stake (seed money, expected IPO money), will not simply say "OK, 
you win. We're liquidating the company."

Even as the appeals continue (fruitlessly, I predict), they'll be 
looking to cut a deal. Then they'll be rent-seeking and seeking to 
shut down those other services. Perhaps Lars Ulrich will even join 
their board.

--Tim May
-- 
-:-:-:-:-:-:-:
Timothy C. May  | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
"Cyphernomicon" | black markets, collapse of governments.





Re: failure delivery

2000-07-27 Thread William H. Geiger III

I am getting these errors from several yahoo accounts. does anyone know what a 
"message has wrong owner" error is? does this mean that yahoo is blocking list traffic?

In <[EMAIL PROTECTED]>, on 07/27/00 
   at 04:17 AM, [EMAIL PROTECTED] said:

>Message from  yahoo.com.
>Unable to deliver message to the following address(es).

><[EMAIL PROTECTED]>:
>Sorry, message has wrong owner. (#4.3.5)
>I'm not going to try again; this message has been in the queue too long.

><[EMAIL PROTECTED]>:
>Sorry, message has wrong owner. (#4.3.5)
>I'm not going to try again; this message has been in the queue too long.

><[EMAIL PROTECTED]>:
>Sorry, message has wrong owner. (#4.3.5)
>I'm not going to try again; this message has been in the queue too long.

-- 
---
William H. Geiger III  http://www.openpgp.net  
Geiger Consulting

Data Security & Cryptology Consulting
Programming, Networking, Analysis
 
PGP for OS/2:   http://www.openpgp.net/pgp.html
E-Secure:   http://www.openpgp.net/esecure.html
---





napster & trilobites

2000-07-27 Thread David Honig


When Napster goes down, there are going to be a lot of 
folks switching to other file-exchange indices.  What is
fascinating is that Napster has seeded disk drives with
tradable files, introduced a lot of people to the concept.

Trilobites didn't make it, but they sure fed a lot of
critters whose descendants did.














  








Re: CDR: Re: JYA, Cryptome Help Request

2000-07-27 Thread sunder

Alan Olsen wrote:
> 
> I am sure you can find a number of willing mirror sites.  (I would also
> suggest publishing signed and/or md5 hashes of the contents, lest there be
> tampering by the Forces of Evil(tm).)

Actually what's needed is some performance tuning.  Login to the box, and
run top when it's not under high load.  Note how much RAM each Apache process
is eating up.  Open a few connections, count again, et. repeat until you see
the OS moving some of the apache's to swap.  Set the MaxClients setting in
httpd.conf to that number minus one or two.

Increase the MaxRequestsPerChild to something like 50 or 100, that way
they'll get reused longer.  Turn the KeepAlive parameter on.

Should JYA be slashdotted/druged/wired/usenetted, etc, the load would
prevent mostly everyone and their mother from seeing the content, however,
it wouldn't cause the server to thrash and ultimately die.  Which means
once the traffic requests slow down, the browsers will be able to get
at the content.

I think what might help JYA is to one more thing:

Rather than setup mirrors everywhere, setup a single private mirror that
feeds a wide bunch of SQUID servers.  If we could get a few willing folks
to run Squids that feed off of this private mirror, the popular files
would be distributed amongst them and the site would stay up.

Further, this wouldn't require JYA to actively push content to more than
one server at a time, so that eases web management up a bit.

He'd also need to setup some sort of round robin DNS, or a CGI script that
randomly munges the urls to point at such squids rather than the main site.

Sort of a poor man's Akamai net. :)

IMHO, I think this is a good solution, and won't require lots of hard drive
space, although personally, I would welcome having live copies of cryptome
on my spindles. :)


-- 
--Kaos-Keraunos-Kybernetos---
 + ^ + :Surveillance cameras|Passwords are like underwear. You don't /|\
  \|/  :aren't security.  A |share them, you don't hang them on your/\|/\
<--*-->:camera won't stop a |monitor, or under your keyboard, you   \/|\/
  /|\  :masked killer, but  |don't email them, or put them on a web  \|/
 + v + :will violate privacy|site, and you must change them very often.
[EMAIL PROTECTED] http://www.sunder.net 




RE: Carnivore - Matt Blaze testimony

2000-07-27 Thread David Honig

At 11:47 PM 7/26/00 -0400, Kevin Elliott wrote:
>At 00:48 -0400 7/26/00, Tim May wrote:
>>At 12:06 AM -0400 7/26/00, Ernest Hua wrote:
>>>I thought recent presidents have been declaring a state of emergency
>>>for who knows how long.
>>
>>But that's not what is being talked about. You are not reading 
>>carefully. The Third refers to war, and this is what we are talking 
>>about.
>
>Indeed.  The constitution is very clear that only congress has the 
>right/power to declare war so if they don't say it, we ain't in it.

No matter how many americans are flying planes over foreign states,
sometimes dropping explosives etc.

We have always been at war with Oceania.








  








Re: JYA, Cryptome Help Request

2000-07-27 Thread David Honig

At 08:11 PM 7/26/00 -0400, Alan Olsen wrote:
>I agree with that.  It also needs an OS that handles better under load.
>The times I have looked at it, it looked as if it was running on a Windows
>box.  (I am unable to confirm that due to www.jya.com:80 not answering.)
>
>I am sure you can find a number of willing mirror sites.  (I would also
>suggest publishing signed and/or md5 hashes of the contents, lest there be
>tampering by the Forces of Evil(tm).)

Some messages elsewhere indicated he runs a Cobalt box.







  








Yarrow

2000-07-27 Thread Marcel Popescu

A while ago, I wrote implementation of Yarrow in Delphi. I just managed to
get the files (I haven't got them with me when I came to the US), and I'm
still not sure that it is a good implementation. It passes DIEHARD, but I
don't know if it goes through the "proper" stages (if that is needed) - that
is, I don't know if the standard implementation of Yarrow would generate the
same numbers when starting from the same state (no external entropy being
added, of course).

Is there some set of "proper state (key and counter) and generated value"
pairs? Has someone attempted to do this before? Should I bother?

Thanks,
Mark

---
All inventions or works of authorship original to me,
herein and past, are placed irrevocably in the public
domain, and may be used or modified for any purpose,
without permission, attribution, or notification.








internet robustness analyzed

2000-07-27 Thread Anonymous

Scientists spot Achilles heel of the Internet



 Updated 2:29 PM ET July 26, 2000

  By Patricia Reaney

  LONDON (Reuters) - The complex structure of the Internet makes it
  resistant to errors or failure but is also its Achilles heel, scientists in the
  United States said Wednesday.

  Because the system is so varied, if one or more nodes --- the crossroads
  through which Internet data travel -- go down, it has very little impact.

  But researchers at Notre Dame University in Indiana, who have analyzed
  the connections within the Internet, have found that if the networks with
  the most highly connected nodes were attacked by cyber-terrorists it
  could fragment the Web into isolated parts.

  "The Achilles heel (of the Internet) is that the structure has this double
  feature. Like Achilles it is very hard to kill it, but if you know something
  about the system then you could," Albert-Lazlo Barabasi, a structural
  physicist, said in a telephone interview.

  An estimated 3 percent of nodes are down at an given time but no one
  notices because the system copes with it.

  "The reason this is so is because there are a couple of very big nodes and
  all messages are going through them. But if someone maliciously takes
  down the biggest nodes you can harm the system in incredible ways. You
  can very easily destroy the function of the Internet," he added.

  TOPOLOGY OF INTERNET SIMILAR TO US AIRLINE NETWORKS

  Barabasi, whose research is published in the science journal Nature,
  compared the structure of the Internet to the airline network of the
  United States.

  The majority of airports are small but they are all connected to much
  larger hubs -- cities such as Chicago, Atlanta, New York and Los
  Angeles.

  "That's exactly the situation on the Internet: there are a couple of hubs
  that are crucial to the system," he explained.

  Those big hubs or nodes control the traffic in the system.

  If the Internet hubs are taken out simultaneously, there would be a
  serious problem, but Barabasi said the probability of random errors
  hitting the big nodes was very small.

  In a commentary on the research, Yuhai Tu of the IBM T.J. Watson
  Research Center in New York said the research was a first step toward
  understanding the robustness of the Internet.

  "The good news is that we do not have to worry about random
  fluctuations of these networks. The bad news is that Internet terrorists
  could cause great damage by targeting the most connected router," he
  said. 





domestic surveillance for LA Dems

2000-07-27 Thread Anonymous

Officials said they already have found signs that
anarchists from a national organization based in
Oregon are in Los Angeles. Within the past few
weeks, police have arrested a handful of people
for taking pictures of downtown buildings from
rooftops and other unusual places, Butler said.
The suspects' addresses all trace back to
Oregon, he said. 

http://www.washingtonpost.com/wp-srv/aponline/2726/aponline205616_000.htm

"The careful application of terror is another form of communication."






Re: JYA, Cryptome Help Request

2000-07-27 Thread Marcel Popescu

X-Loop: openpgp.net
From: "Esteban Gutierrez-Moguel" <[EMAIL PROTECTED]>

> > > I think your content needs mirrors.

> > I agree, and continue to work on it.

> a standard mirroring network is helpful, but what about using FreeNet?

Hehe... you're late. Someone has already started to post documents from
cryptome on Freenet. If you want to know the keys, I suppose I could ask
which (I wasn't that interested at the moment).

Mark








RE: 2600 - bell toll signals

2000-07-27 Thread Andrew Alston

For the purposes of information only:

The Greek home direct number still accepts certain 2400/2600 hertz tones
(its a toll free number for doing reverse charge calls to greece, Im not
sure what you would call from the US to get to it), and last I heard you
could still use an old style bluebox to dial anywhere in the world on that
exchange as of about 6 months ago.  Im not sure if this is still current, or
if US exchanges filter those tones.

Cheers

Andrew

-Original Message-
X-Loop: openpgp.net
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Steve Mynott
Sent: Thursday, July 27, 2000 12:36 PM
To: Multiple recipients of list
Subject: Re: 2600 - bell toll signals


On Thu, Jul 27, 2000 at 02:20:26AM -0400, !Dr. Joe Baptista wrote:
 
> I'm looking for a list of telephone company modulation frequencies used on
> toll lines (trunk lines) to control switching between offices.  Anyone
> know where I can find them. Used to know them by heart - 2600 to disconect
> and 300 - 1200 ?? for the control tones.
 
You are refering to R1 signalling which is obsolete.  Most developed
countries use out-band signalling now.  Some American phreaks of a few
years back claimed Alaska and Hawaii still used this, although this is
probably out of date.

Modern blueboxers use C5 and R2 international signalling and there
is plenty of information on the net.  Google for it.  If you can't
use the web then you are unlikely to be able to get this to work.

This has cypherpunk relevance more for obscuring the source of 
telephone calls than toll fraud.  

-- 
1024/D9C69DF9 steve mynott [EMAIL PROTECTED]

as far as the laws of mathematics refer to reality, they are not
certain;
as far as they are certain, they do not refer to reality. --albert einstein






Re: 2600 - bell toll signals

2000-07-27 Thread Steve Mynott

On Thu, Jul 27, 2000 at 02:20:26AM -0400, !Dr. Joe Baptista wrote:
 
> I'm looking for a list of telephone company modulation frequencies used on
> toll lines (trunk lines) to control switching between offices.  Anyone
> know where I can find them. Used to know them by heart - 2600 to disconect
> and 300 - 1200 ?? for the control tones.
 
You are refering to R1 signalling which is obsolete.  Most developed
countries use out-band signalling now.  Some American phreaks of a few
years back claimed Alaska and Hawaii still used this, although this is
probably out of date.

Modern blueboxers use C5 and R2 international signalling and there
is plenty of information on the net.  Google for it.  If you can't
use the web then you are unlikely to be able to get this to work.

This has cypherpunk relevance more for obscuring the source of 
telephone calls than toll fraud.  

-- 
1024/D9C69DF9 steve mynott [EMAIL PROTECTED]

as far as the laws of mathematics refer to reality, they are not certain;
as far as they are certain, they do not refer to reality. --albert einstein





Re: 2600 - bell toll signals

2000-07-27 Thread Ben Byer

> I'm looking for a list of telephone company modulation frequencies used on
> toll lines (trunk lines) to control switching between offices.  Anyone
> know where I can find them. Used to know them by heart - 2600 to disconect
> and 300 - 1200 ?? for the control tones.

The best source, by far, for this kind of thing is www.textfiles.com .

Here's a start: (it's a mirror)

http://www.obfuscation.org/textfiles/phreak/BLUEBOXING/blue2.box

Ben