?
Hello: (If you can't read the email,please click here http://www.jjyx.com/serve/serve.htm) Thank you ×ð¾´µÄÏÈÉú/Ůʿ£º ãyºÓÖ®ÐÇV¸æ·þÕ£º ×îµÍÁ®µÄÐû÷ÊֶΠһ V¸æà]¼þ£º¿É¸ùþÄúµÄÐèÒª£¬ÔÚøÈÖƶ¨ ^Óò£¬µØücºÍÐÐIßMÐÐV¸æà]¼þÐÅÏ¢°lѵȡ£ÆäÌØücÊÇ£º¹ úV£¬ rЧ¸ß£¬r¸ñµÍ¡£10Èf·â¶¨Ïòà]¼þ°lËͲÅ200Ôª£¬1000Èfà]¼þµØÖ·³öÊÛH50Ôª¡£V¸æà]¼þÔ¼órÕücô£º http://www.jjyx.com/serve/advertise.htm ÙÙI200ÔªÒÔÉÏ·þÕÕ߸¶ËÍ3¿î¿rÖµ800ÔªµÄà]¼þȺ°lܼþ ÍØÒ× ÓʼþÌؿ죨ÖøÃûà]¼þȺ°lܼþ£¬Ôr200Ôª£© ÍØÒ×ÓʼþѲ²¶V3.54C£¨ÖøÃûà]¼þ¶¨ÏòËÑË÷ܼþ£¬Ôr268Ôª£© ÓÊ ¼þÔÚÏßУÑéÆ÷V4.1£¨40ÃÀ½ð£©¡ìÈôΪÙÙI£¬Ã¿50Ôª¡ì ÎÒíÓа´È«øµØ ^£¬ÐÐI·ÖîµÇ§Èfà]¼þµØÖ·¼°Íê ÉƵİlÑϵ½y£¬ëSréÄãÌṩMÒâµÄ·þÕ¡£OÓöëyµÃ£¬Ús¿ìÐÐÓ°É£¬×ÄãµÄÆóI£¬¹«Ë¾Á¢¼´ÕÆÎÕÉÌC÷ýµÄÃü Ã}--V¸æE-MAIL¡£ ¶þ ¾W½jÐÅÏ¢°lÑ£ºãyºÓÖ®ÐÇ¿ÉÒÔ¢ÄãµÄäNÊÛ£¬ÙÙI£¬ÕÐÉÌ»òºÏ×÷µÈÉÌIÐÅÏ¢×ÔÓ°lѵÀÊÀ½çÖªÃûµÄ3300¶àÙQ Ò×¹«¸æ°åºÍøÈÉÏǧBBS£¬Õ¯¹«¸æµÈ¡£×î´óÏÞ¶ÈÌáNÄãµÄÉÌICþ¡££¨³¬Öµr200Ôª£© Èý ËÑË÷ÒýÇæÔ]Ô ÍÄúµÇêÈ«Çò6000Ó¢ÎÄËÑË÷ÒýÇæ(ÈçYAHOO£¬GOOGLEDµÈ)£¬ßM200¸öÖÐÎÄËÑË÷ÒýÇæ(ÈçÐÂÀË£¬ ÑÅ»¢£¬Ïã¸ÛÌíß_ËÑË÷µÈ)²¢Ãû´Îλ¾ÓÇ°ÁС£×ÄãµÄ¾WÕ¾ÏíÅcÈ«Çò¡££¨³¬Öµ·þÕ£¬ÌØ»Ýr200£© ËÄ Ö÷C×âÓã¬ÓòÃûÔ]Ô£¬¾WÕ¾Ñu×÷¡£1.ÿ200Õ×WEB¿ÕégÿÄêÖ»Ðè250Ôª£¬È«Ð·þÕÆ÷£¬100M§£¬ÖÐøëÐÅC ·¿§½ÓÈë¡£¡£2.øëHíOÓòÃûÔ]ÔÿÄêÖ»Ðè100Ôª¡£3.Ìṩ¸÷·N´óÖÐСÆóI£¬É̼ҽ¨Õ¾·½°¸¡£ÔÇéÕücô£º http://www.jjyx.com/serve/webdesign.htm ãyºÓÖ®ÐÇÉÌÕV¸æ·þÕ¾WÖ·£ºhttp://www.jjyx.com/serve/advertise.htm ´ËÐÅÕÎð»ØÍ£¬ÂS×ÉÔÕíÐÅ£º[EMAIL PROTECTED] [EMAIL PROTECTED] Õ\Ñû¸÷½çÅóÓÑÇ°íÇ¢ÕºÏ×÷¡£ Ö ¶Y ãyºÓÖ®ÐÇ http://www.jjyx.com If you can't read the email,please click here http://www.jjyx.com/serve/serve.htm Thank you
Indymedia; important and pretty damned thrilling alternative coverage of the news
http://firstmonday.org/issues/issue7_4/hyde/index.html Contents Introduction A Response to Corporate Ownership of the Media The Alternative Press Tradition and the New Media Birth and Development of Indymedia The Spread of Indymedia Indymedia at Work The Impact of the Indymedia Movement Free thought, necessarily involving freedom of speech press, I may tersely define thus: no opinion a law -- no opinion a crime. ---Alexander Berkman
Re: FUCANN Fully UnCentrallized Authority for Naming and Numbers
Frob the Builder wrote: The problem comes when the server a domain points to is the map for several domains, say via Virtual Hosts or selected forwarding. Many servers use this if they're on a dedicated web-hoster, or for subdomains. Ahah, because the 'physical' server uses the URL to map to 'virtual' servers. You're right, the Rev 1.0 plan doesn't handle that. This only applies to HTTP requests though, AFAIK. The easiest work around, I figure, is a translation proxy that you run (locally) and channel all requests through. This proxy could look up the virtual mapping from a local domain to a legacy domain and vice versa. Not big on proxies myself, so not sure how feasible it'd be to either build a custom one, or to adapt an existing one. Off to look through Squid... .g -- ...not much (legal) material is out there that's full of graphics and in a consumer-friendly format to create the need for DSL. - Jack Valenti http://www.exmosis.net/Sometimes I use Google instead of pants.
TV/Uydu Yayinlarina Artik Sifre Kisitlamasi Yok! -hqbdccnh
Sayin Internet Kullanicisi, Turkiye'de yayin yapanlar basta olmak uzere, Dunya'daki tum sifreli TV kanallarini cozen ve basit bir TV kartiyla bu yayinlari bilgisayarinizdan size izleme olanagi saglayan, sifre kirici programlarin kayitli oldugu, DECODER CD (v2.0) satisa sunulmustur (40 EURO + KDV). (Digital, Analog, d2Mac ve Nagra formatindaki tum yayinlar icindir) Garantilidir, odemeli olarak gonderilir. Detayli bilgi isteyenlere elektronik tanitim brosurlerimiz gonderilecektir Net-Pa Internet Marketing Center Ltd. Sti.® A. Menderes Cad. Atagun Is Merkezi, Kat: 4 Sakarya, TR TEL: 0 (264) 281 38 85 (PBX) ICQ: 572 98 144 Abdullah Güçlü, GSM: 0 (532) 310 49 16 (09:00-17:00) Germany: 0049 (172) 682 01 69 - Belgium: 0032 (494) 25 02 30 CC. A: 1-830
Interest Rates are Dropping How do you Capitalize? YPHBHWA
Compare Now Online + Save! Dear Homeowner,Now is the time to take advantage of falling interest rates!There is no advantage in waiting any longer.Refinance or consolidate high interest credit card debt into a low interest mortgage. Mortgage interest is tax deductible, whereas credit card interest is not.You can save thousands of dollars over the course of your loan with just a 0.25% drop in your rate!Our nationwide network of lenders have hundreds of different loan programs to fit your current situation:RefinanceSecond MortgageDebt ConsolidationHome ImprovementPurchaseLet us do the shopping for you...IT IS FREE!CLICK HEREPlease CLICK HERE to fill out a quick form. Your request will be transmitted to our network of mortgage specialists who will respond with up to three independent offers.This service is 100% free to home owners and new home buyers without any obligation.Data FlowNational AveragesProgramRate30Year Fixed6.375%15Year Fixed5.750%5Year Balloon5.250%1/1Arm4.250%5/1Arm5.625%FHA30 Year Fixed 6.500%VA 30 Year Fixed6.500%You did all the shopping for me. Thank you!-T N. Cap.Beach, CA...You helped me finance a new home and I got a very good deal.- R H. H.Beach, CA..it was easy, and quick...!-V S. N.P.Beach, WATo be removed from this list please visit : http://61.129.81.52/remove/remove.htm
LA INGENIERIA DEL EXITO
Publi/Coa@ch Motivación LA INGENIERIA DEL EXITO PARA [EMAIL PROTECTED] Se estan imponiendo los asesores terapeutas en Coach. - Oportunidad unica de seguir a distancia y aun precio muy asequible. Un Curso diplomado de MOTIVACION Y COACH.N.A.C LAS PRINCIPALES EMPRESAS DEL MUNDO CONTRATAN A EXPERTOS EN MOTIVACION Y COACH.LAS CONSULTAS DE LOS TERAPEUTAS COACH SON ALTAMENTE VISITADAS EN TODO EL MUNDO. Algunos talleres y seminarios de Coach y Motivación superan en coste a muchos Masters. Solo hay que mirar notas de prensa y anuncios de los principales periodicos del mundo. Le ofrecemos en primicia: CURSO INTEGRAL DIPLOMADO DE EXTENSION UNIVERSITARIA SOBRE: MOTIVACION Y COACH.NAC --- Lo que no le enseñaran en ninguna parte puede estar seguro. VIVIR MOTIVADO Y MOTIVAR A LOS DEMAS Los resultados se producen provocados por una accion,PASE A LA ACCION.La motivación da energia y dirección . Conoce usted la diferencia entre una persona Exitosa y una persona Fracasada ...?.Piense pero camine Sabe que es lo que separa a los Ganadores de los Perdedores .?A las personas felices y a los que no lo son.?.Los resultados son la puesta en marcha de proyectos de diverso indole. Estas simples preguntas, se las hecho alguna vez . Gracias a un grupo de personas, estudiosas del exito por mas de 40 años(Neuro Linguistic Association y Coach) ponen ahora a su disposicion, tecnicas y consejos que le daran un extraordinario valor a su vida y lo motivaran llevaran a alcanzar el exito en todos los ordenes de la vida!.TENGALO SEGURO. Adquiera mayor efectividad en todas sus relaciones personales y profesionales, con la ayuda de nuestro Seminario digital de Coach Conozca las ultimas tecnicas y consejos utiles para poder proyectar su vida en una forma positiva y prospera. EN QUE CONSISTE EL COACHING ? Las personas son correlativas a como perciben una situación. Como el coaching se apoya en el compromiso de producir acciones sin precedentes, es necesario cambiar la forma de observar de las personas, o sea constituirlo en un observador diferente, para esto las personas aprenden nuevas prácticas y técnicas.. El objetivo central de la actividad del coach es desarrollar la capacidad de acción de la otra persona. Un buen progama de coach deriva en el logro de los resultados deseados. Este seminario e explicara todo de un modo muy sencillo. CUAL ES LA RAIZ FILOSOFICA DEL COACHING ? El Coaching se asienta sobre el marco teórico provisto por la Ontología del Lenguaje, que ofrece una nueva interpretación de lo que significa ser humano. Los postulados básicos de la Ontología del lenguaje son: - Interpretar a los seres humanos como seres lingüísticos - Interpretar al lenguaje como generativo - Interpretar que los seres humanos se crean a sí mismos en el lenguaje y a través de él Los principios generales son: - No sabemos cómo las cosas son. Sólo sabemos cómo las interpretamos. - No sólo actuamos de acuerdo a cómo somos, también somos de acuerdo a cómo actuamos. La acción genera ser. Uno deviene de acuerdo a lo que hace. El coaching impulsa hacia el triunfo. CONTENIDO PROGAMA Modulos Didacticos 1.MOTIVACION Y DESARROLLO PERSONAL 2.AUTO COACH DESDE LA PERSPECTIVA NAC 3.DESARROLLO COACHING 4. RELACIONES HUMANAS 5. TECNICAS DE MOTIVACION 6. MOTIVACION DE GRUPOS DE TRABAJO 7. TECNICAS PROYECTIVAS E IDEAS CREATIVAS 8. MODELOS DE COMPORTAMIENTO Y ACCION MOTIVADA 9.RESOLUCION DE CONFLICTOS Y PROBLEMAS 10.ACCION DINAMICA 11.LIMITACION DE ESTRES 12.DESARROLLO DE LA INTELIGENCIA EMOCIONAL 13.SINTESIS PNL 14.PERSISTENCIA 15.TECNICAS DE COMUNICACION 16.TECNICAS DE AUTOAYUDA 17.TECNICAS DE AUTOAYUDA MENTAL POWER TRAINING N.A.C 18.PROYECTO ALUMNO Progama sobre 800.hojas de texto enviado por e-mail formato word y pdf.diapo micro point. Entrega de Diploma.200.horas certificadas.Tiempo aprox.30-40.dias. Abierto a personas mayores de 18.años. Coste: España,Europa,Usa: 300.EUROS. 250.A la Matricula resto(50Euros) a la entrega del diploma. Hispanoamerica: 200.EUROS. 150.A la Matricula resto(50Euros) a la entrega del diploma. Al acabar este curso se producira un cambio profundo en su modo de ver las cosas y se sentira obligado a establecer cambios positivos. Inicio el dia 20 de Abril Envie un e-mail desde [EMAIL PROTECTED] a [EMAIL PROTECTED] (ASUNTO INTERES EN CURSO-MC) y le enviaremos algunas muestras del formato didactico del taller,condiciones. Info-Enseñanza Atentamente: Maria Bravo Lujan Broker-University e Instituto Tecnologico Alicante [EMAIL PROTECTED] -- Si desea ser borrado: [EMAIL PROTECTED]
LA INGENIERIA DEL EXITO
Publi/Coa@ch Motivación LA INGENIERIA DEL EXITO PARA [EMAIL PROTECTED] Se estan imponiendo los asesores terapeutas en Coach. - Oportunidad unica de seguir a distancia y aun precio muy asequible. Un Curso diplomado de MOTIVACION Y COACH.N.A.C LAS PRINCIPALES EMPRESAS DEL MUNDO CONTRATAN A EXPERTOS EN MOTIVACION Y COACH.LAS CONSULTAS DE LOS TERAPEUTAS COACH SON ALTAMENTE VISITADAS EN TODO EL MUNDO. Algunos talleres y seminarios de Coach y Motivación superan en coste a muchos Masters. Solo hay que mirar notas de prensa y anuncios de los principales periodicos del mundo. Le ofrecemos en primicia: CURSO INTEGRAL DIPLOMADO DE EXTENSION UNIVERSITARIA SOBRE: MOTIVACION Y COACH.NAC --- Lo que no le enseñaran en ninguna parte puede estar seguro. VIVIR MOTIVADO Y MOTIVAR A LOS DEMAS Los resultados se producen provocados por una accion,PASE A LA ACCION.La motivación da energia y dirección . Conoce usted la diferencia entre una persona Exitosa y una persona Fracasada ...?.Piense pero camine Sabe que es lo que separa a los Ganadores de los Perdedores .?A las personas felices y a los que no lo son.?.Los resultados son la puesta en marcha de proyectos de diverso indole. Estas simples preguntas, se las hecho alguna vez . Gracias a un grupo de personas, estudiosas del exito por mas de 40 años(Neuro Linguistic Association y Coach) ponen ahora a su disposicion, tecnicas y consejos que le daran un extraordinario valor a su vida y lo motivaran llevaran a alcanzar el exito en todos los ordenes de la vida!.TENGALO SEGURO. Adquiera mayor efectividad en todas sus relaciones personales y profesionales, con la ayuda de nuestro Seminario digital de Coach Conozca las ultimas tecnicas y consejos utiles para poder proyectar su vida en una forma positiva y prospera. EN QUE CONSISTE EL COACHING ? Las personas son correlativas a como perciben una situación. Como el coaching se apoya en el compromiso de producir acciones sin precedentes, es necesario cambiar la forma de observar de las personas, o sea constituirlo en un observador diferente, para esto las personas aprenden nuevas prácticas y técnicas.. El objetivo central de la actividad del coach es desarrollar la capacidad de acción de la otra persona. Un buen progama de coach deriva en el logro de los resultados deseados. Este seminario e explicara todo de un modo muy sencillo. CUAL ES LA RAIZ FILOSOFICA DEL COACHING ? El Coaching se asienta sobre el marco teórico provisto por la Ontología del Lenguaje, que ofrece una nueva interpretación de lo que significa ser humano. Los postulados básicos de la Ontología del lenguaje son: - Interpretar a los seres humanos como seres lingüísticos - Interpretar al lenguaje como generativo - Interpretar que los seres humanos se crean a sí mismos en el lenguaje y a través de él Los principios generales son: - No sabemos cómo las cosas son. Sólo sabemos cómo las interpretamos. - No sólo actuamos de acuerdo a cómo somos, también somos de acuerdo a cómo actuamos. La acción genera ser. Uno deviene de acuerdo a lo que hace. El coaching impulsa hacia el triunfo. CONTENIDO PROGAMA Modulos Didacticos 1.MOTIVACION Y DESARROLLO PERSONAL 2.AUTO COACH DESDE LA PERSPECTIVA NAC 3.DESARROLLO COACHING 4. RELACIONES HUMANAS 5. TECNICAS DE MOTIVACION 6. MOTIVACION DE GRUPOS DE TRABAJO 7. TECNICAS PROYECTIVAS E IDEAS CREATIVAS 8. MODELOS DE COMPORTAMIENTO Y ACCION MOTIVADA 9.RESOLUCION DE CONFLICTOS Y PROBLEMAS 10.ACCION DINAMICA 11.LIMITACION DE ESTRES 12.DESARROLLO DE LA INTELIGENCIA EMOCIONAL 13.SINTESIS PNL 14.PERSISTENCIA 15.TECNICAS DE COMUNICACION 16.TECNICAS DE AUTOAYUDA 17.TECNICAS DE AUTOAYUDA MENTAL POWER TRAINING N.A.C 18.PROYECTO ALUMNO Progama sobre 800.hojas de texto enviado por e-mail formato word y pdf.diapo micro point. Entrega de Diploma.200.horas certificadas.Tiempo aprox.30-40.dias. Abierto a personas mayores de 18.años. Coste: España,Europa,Usa: 300.EUROS. 250.A la Matricula resto(50Euros) a la entrega del diploma. Hispanoamerica: 200.EUROS. 150.A la Matricula resto(50Euros) a la entrega del diploma. Al acabar este curso se producira un cambio profundo en su modo de ver las cosas y se sentira obligado a establecer cambios positivos. Inicio el dia 20 de Abril Envie un e-mail desde [EMAIL PROTECTED] a [EMAIL PROTECTED] (ASUNTO INTERES EN CURSO-MC) y le enviaremos algunas muestras del formato didactico del taller,condiciones. Info-Enseñanza Atentamente: Maria Bravo Lujan Broker-University e Instituto Tecnologico Alicante [EMAIL PROTECTED] -- Si desea ser borrado: [EMAIL PROTECTED]
brilliancy
Any attacker who can control 100,000 machines is a major force on the internet, while someone with a million or more is currently unstoppable: able to launch massively diffuse DDOS attacks, perform needle in a hayfield searches, and commit all sorts of other mayhem. We already understand how worms could be used to gain control of so many machines. Yet the recent revelation that Brilliant Digital Media has bundled a small trojan with KaZaA has underscored another means by which an attacker could gain control of so many machines: poorly secured automatic updaters. If an attacker can distribute his own code as an update, he can take control of millions of machines. http://www.cs.berkeley.edu/~nweaver/0wn2.html So, now, how hard would it be to use this mechanism to upload PGPNet with opportunistic encryption enabled to millions of hosts ?
(OTCBB: PAXM) Special Investment Alert
Title: Investors This message has been sent to you as a subscriber of the "Financial Update" in compliance with our strict anti-abuse regulations. We will continue to bring you valuable offers on the products and services that interest you most. If you do not wish to receive further mailings, please click below and enter your email at the bottom of the page. You may then rest-assured that you will never receive another email from us again. UNSUBSCRIBE ME PLEASE STOCK ALERT! Alert: Premier Axium ASP (OTCBB: PAXM) positions itself for enormous growth in 2002 through aggressive acquisition plan SYMBOL PAXM CURRENT PRICE $0.0015 52 WEEK HIGH $3.68 52 WEEK LOW $0.001 Investment Highlights According to the IDC, in 1998 the U.S. market for Human Resources outsourcing services was approximately $6.7 billion and is expected to reach $10.2 billion in 2003. PAXM president Anthony Burnham, formerly of Nestle-Carnation, has outlined an intense acquisition strategy for the company. It is projected that PAXM will achieve approximately $250 million in assets within the next year as it moves forward toward its goal of becoming the leader in providing complete infrastructure services. PAXM has invested millions of dollars in creating its unparalleled proprietary Integrated Service Branch to provide ultimate human capital management, strategic planning, and information technology services to sustained growth companies. Company Background Cutting edge, rapid growth companies just can't do it all. With managing their own internal growth and marketing strategies, many find it virtually impossible to deal with multiple providers of infrastructure services. Problem? Not for PAXM. Its client-centric Integrated Service Branch (ISB) is the ultimate one stop infrastructure service provider with a focus on sustained high-growth companies. Independent research has shown that the high-growth company segment accounts for 95% of all net job growth in the U.S. These companies produce 20 times more sales per employee, have 5 times the market share, and 25% greater profitability. PAXM management realizes the enormous potential of this market and has developed a proprietary Integrated Service Branch to provide an end-to-end array of high-touch and web-based services to its target market, through both a physical office presence and an integrated web-based solution. PAXM is able to provide top quality service in all areas through its extensive list of alliance partners. It deals with top companies in network management, business insurance, and disaster recovery. A few premier partners are as follows: Alliance Partner Application Aon Corporation Business insurance risk programs Acordia, Inc. Health welfare insurance program Sungard Data Systems, Inc. Continuity and disaster recovery Best Software Inc. Web-based HR management systems Unisys Corporation Network management IS installation Virtual CEO, Inc. Web-based strategic assessments Industry Stats Industry data statistics show nothing but potential for PAXM and its Integrated Service Branch
Insight on the News Email Edition
INSIGHT NEWS ALERT! A new issue of Insight on the News is now online ... IS THE AIR FORCE GETTING (ITS WINGS) CLIPPED? Kelly O'Meara reveals that both current and former employees of DynCorp, one of the federal government's largest contractors, have accused the company of taking a fly-by-night attitude toward maintenance of military aircraft. http://www.insightmag.com/news/229690.html ... WHY CLINTON SCUTTLED THE PATRIOT MISSILE As rogue states were upgrading their theater-missile arsenals, the Clinton team thwarted U.S. deployment of the next generation of Patriot antimissile batteries. http://www.insightmag.com/news/229693.html SUBSCRIBE TO THE INSIGHT PRINT EDITION TODAY! And Save 72% (Off Our Newsstand Price) http://www.collegepublisher.com/insightsub/subform1.cfm HOW THE BUSH TEAM THUMBS ITS NOSE AT FOIA Timothy Maier writes that he Bush administration has taken a hard line against releasing government records as required by law. Critics from the left and the right are responding with lawsuits. http://www.insightmag.com/news/229694.htm ... BUSH'S N0-WIN WEEK Try as he might to clear the air for education and domestic matters, President George W. Bush was unable to keep the Middle East crisis from dominating domestic attention. http://www.insightmag.com/news/229797.html ... SADDAM'S PALESTINIAN SECURITY BLANKET Jamie Dettmer tells us that in hindsight, George H.W. Bush had it much easier than the current president when planning his international coalition for a U.S.- led strike against Iraq at least the Israeli-Palestinian dispute wasn't threatening to spill over into a wider regional war. http://www.insightmag.com/news/229705.html SUBSCRIBE TO THE INSIGHT PRINT EDITION TODAY! And Save 72% (Off Our Newsstand Price) http://www.collegepublisher.com/insightsub/subform1.cfm You have received this newsletter because you have a user name and password at Insight on the News. To unsubscribe from this newsletter, visit http://www.insightmag.com/main.cfm?include=unsubscribe;. You may also log into Insight on the News and edit your account preferences on the Web. If you have forgotten or don't know your user name and password, it will be emailed to you after visiting the following link: http://www.insightmag.com/main.cfm?include=emailPasswordserialNumber=16oai891z5[EMAIL PROTECTED]
downl1
Dear valued visitor of our download area You can download the requested file from the following link: www.mediacrypt.com/engl/Downloads/ideaplus.zip The file contains the basic IDEA reference code in C/C++ as is without detailed documentation. No technical support is available. For professional implementation using object oriented programming we offer Software Development Kits (SDKs) for C/C++ and Java(tm) as part of the IDEA License Packs. The SDKs offer you a set of well-proven and tested crypto tools for faster and optimized implementation of IDEA into security products. They come with full documentation, including test suites, and technical support, allowing the implementation of IDEA without extensive knowledge in cryptography. Further details on the SDKs are available at: http://www.mediacrypt.com/engl/Downloads/SDK%20Oct%20Final.pdf Best regards The MediaCrypt Team [EMAIL PROTECTED]
--SEND SAFELY To 10,000 List 50% Off Only $5.00
1/2 Price Sale! SEND SAFELY EVEN WITH FREE ISP's! = ~Specials~ FREE Stealth Mass Mailer with orders of 50,000! With orders of 250,000: -One Month FREE Subscription to 5-10 Blind mail servers/day M-F! (never lose your ISP again!) Completely hides your IP information! -FREE Demo of an e-mail program that will send your e-mails safely, even with FREE ISP's. NO Risk! = - FRESH 10,000 List 4-7-02!! For website details, click below: mailto:[EMAIL PROTECTED]?Subject=EmailInfo2 --Do you want to start getting REPLIES for your offer? --Do you want those replies to be from someone who's actually interested in what you have to offer? **Visit our site to get the MOST responsive e-mail leads available!** 10,000 e-mails for only $ 5 NEW 50,000 e-mails for only $10 250,000 e-mails for only $20 For website details, click below: mailto:[EMAIL PROTECTED]?Subject=EmailInfo2 -- **Not an experienced direct mailer? We can send your ad for you! SEE SITE for more details and pricing! --- - SPECIALS! - -- **FREE with EVERY order: Demo of ListMan e-mail manager software **Orders of 50,000 or more: FREE copy Stealth Mass Mailer to send your messages! -This is not a demo but a permanent license for the software! **Orders of 250,000 : - InfoDisk with 1000+ Money Making Reports - CheckMAN software -One Month FREE Subscription to 5-10 Blind mail servers/day M-F! (never lose your ISP again!) Completely hides your IP information! ___ To be removed from future mailings: mailto:[EMAIL PROTECTED]?Subject=Remove
I Saw Your Email -
I saw your email on a website I visited yesterday, and thought you might be interested in this. A few months back I joined a program and then...promptly forgot about it. You may have done this yourself sometime...you intend to work the program but then get caught in your day-to-day activities and it's soon forgotten. The program was free to join so maybe I just didn't take it veryseriously. Anyway, near the end of May I received a letter from my coach (Scott Johnson) informing me that I had more than 2000 PAID members in my downline! As you can imagine, I was very skeptical. After all, how could I have more than 2000 paid members under me in a program that I had never promoted? I took the time to check out the site...then wrote to Scott asking for confirmation that these were paid members and not just free sign-ups...like me :) Well, it was true...I had 2365 paid members in my downline. This in a program that I had never worked! All I had to do was upgrade to a paid membership before the end of the month and I would have my position locked in and a downline of 2365 people. You can bet I wasted no time in getting my membership upgraded! I can tell you, if I had known what was happening with this program, I would have become an active paid member months ago! With this program, you will get a HUGE downline of PAID MEMBERS. My coach's check, which is a minimum of $1,000, arrives every month...on time. And he achieved this after only three months! How would you like to lock your position in FREE while you check out this opportunity and watch your downline grow? You can join FREE: To sign up simply reply to: [EMAIL PROTECTED] Type in Subject: Send My FREE Membership (required) Type in Letter: Your First and Last Name (required) Your Email Address (if different from above) We will confirm your position and send you a special report as soon as possible, and also Your Free Member Number. I'll get you entered and let you know how you can keep track of your growing downline. That's all there's to it. I'll then send you info, and you can make up your own mind. Warm regards, Malcolm Schulstad P.S. After having several negative experiences with network marketing companies I had pretty much given up on them. This company is different--it offers value, integrity, and a REAL opportunity to have your own home-based business... and finally make real money on the internet. Don't pass this up..you can sign up and test-drive the program for FREE. All you need to do is get your free membership. 9434QVBf9-012QHwb1690jCmf6-621uUPN866l35
I Saw Your Email -
I saw your email on a website I visited yesterday, and thought you might be interested in this. A few months back I joined a program and then...promptly forgot about it. You may have done this yourself sometime...you intend to work the program but then get caught in your day-to-day activities and it's soon forgotten. The program was free to join so maybe I just didn't take it veryseriously. Anyway, near the end of May I received a letter from my coach (Scott Johnson) informing me that I had more than 2000 PAID members in my downline! As you can imagine, I was very skeptical. After all, how could I have more than 2000 paid members under me in a program that I had never promoted? I took the time to check out the site...then wrote to Scott asking for confirmation that these were paid members and not just free sign-ups...like me :) Well, it was true...I had 2365 paid members in my downline. This in a program that I had never worked! All I had to do was upgrade to a paid membership before the end of the month and I would have my position locked in and a downline of 2365 people. You can bet I wasted no time in getting my membership upgraded! I can tell you, if I had known what was happening with this program, I would have become an active paid member months ago! With this program, you will get a HUGE downline of PAID MEMBERS. My coach's check, which is a minimum of $1,000, arrives every month...on time. And he achieved this after only three months! How would you like to lock your position in FREE while you check out this opportunity and watch your downline grow? You can join FREE: To sign up simply reply to: [EMAIL PROTECTED] Type in Subject: Send My FREE Membership (required) Type in Letter: Your First and Last Name (required) Your Email Address (if different from above) We will confirm your position and send you a special report as soon as possible, and also Your Free Member Number. I'll get you entered and let you know how you can keep track of your growing downline. That's all there's to it. I'll then send you info, and you can make up your own mind. Warm regards, Malcolm Schulstad P.S. After having several negative experiences with network marketing companies I had pretty much given up on them. This company is different--it offers value, integrity, and a REAL opportunity to have your own home-based business... and finally make real money on the internet. Don't pass this up..you can sign up and test-drive the program for FREE. All you need to do is get your free membership. 4738gKeb1-605XUYO8358xsOg8-875Cgid6308mRMr7-007KwQZl48
I Saw Your Email -
I saw your email on a website I visited yesterday, and thought you might be interested in this. A few months back I joined a program and then...promptly forgot about it. You may have done this yourself sometime...you intend to work the program but then get caught in your day-to-day activities and it's soon forgotten. The program was free to join so maybe I just didn't take it veryseriously. Anyway, near the end of May I received a letter from my coach (Scott Johnson) informing me that I had more than 2000 PAID members in my downline! As you can imagine, I was very skeptical. After all, how could I have more than 2000 paid members under me in a program that I had never promoted? I took the time to check out the site...then wrote to Scott asking for confirmation that these were paid members and not just free sign-ups...like me :) Well, it was true...I had 2365 paid members in my downline. This in a program that I had never worked! All I had to do was upgrade to a paid membership before the end of the month and I would have my position locked in and a downline of 2365 people. You can bet I wasted no time in getting my membership upgraded! I can tell you, if I had known what was happening with this program, I would have become an active paid member months ago! With this program, you will get a HUGE downline of PAID MEMBERS. My coach's check, which is a minimum of $1,000, arrives every month...on time. And he achieved this after only three months! How would you like to lock your position in FREE while you check out this opportunity and watch your downline grow? You can join FREE: To sign up simply reply to: [EMAIL PROTECTED] Type in Subject: Send My FREE Membership (required) Type in Letter: Your First and Last Name (required) Your Email Address (if different from above) We will confirm your position and send you a special report as soon as possible, and also Your Free Member Number. I'll get you entered and let you know how you can keep track of your growing downline. That's all there's to it. I'll then send you info, and you can make up your own mind. Warm regards, Malcolm Schulstad P.S. After having several negative experiences with network marketing companies I had pretty much given up on them. This company is different--it offers value, integrity, and a REAL opportunity to have your own home-based business... and finally make real money on the internet. Don't pass this up..you can sign up and test-drive the program for FREE. All you need to do is get your free membership. 1833QlRa9-652qiKe373l19
RE: mil disinfo on cryptome
Oh, and I can't believe I almost forgot--I'm sure you'll be tickled pink to learn that ever having had anything to do with you can be the kiss of death as far as getting clearance is concerned. From the adjudication guidelines: http://www.dss.mil/training/adr/adjguid/adjguidF.htm Conditions that could raise a security concern and may be disqualifying include: d. Any foreign, domestic, or international organization or person engaged in analysis, discussion, or publication of material on intelligence, defense, foreign affairs, or protected technology. However Faustine neglects to include the simple solution, that you simply renounce playing with Johnny: Conditions that could mitigate security concerns include: b. The individual terminates the employment or discontinues the activity upon being notified that it is in conflict with his or her security responsibilities. More interestingly, s/he neglects to include this disqualifier from State Secrets: Allegiance to the United States Conditions that could raise a security concern and may be disqualifying include: d. Involvement in activities which unlawfully advocate or practice the commission of acts of force or violence to prevent others from exercising their rights under the Constitution or laws of the United States or of any state. How many Congressvermin, police w/ NCIS access, FBI, judges, domestic spooks of all flavors, etc are guilty of this?
BUSINESS PROPOSAL
May I briefly introduce myself. I am Wilson Damilo of the Democratic Republic of Congo (formerly Zaire) and the former aide de camp of the Late President Laurel Kabila of blessed memory. I am presently living in Nigeria on asylum. In case you are wondering how I got your contact, I got your contact from a source at the foreign trade office of the Nigeria Chamber of commerce, trade and industry. The events of the past one year in my country has been very unfortunate. The Late president Kabila successfully toppled the very corrupt government of the Late Dictator Mobutu Sese Seko and ruled justly and peacefully for a few months. Unfortunately, the Tutsi from Goma, the Northern part of the country rebelled against his government and since then my country has been at war. I am very dedicated and committed to winning the war against the rebels until recently when to my shock I found out that Senior Army Officers and Government officials were stealing public funds and looting government treasury and sending them to foreign countries. They have exploited the war situation to bring back the lawlessness and corruption of the Mobutu days. After the late President Kabila was assassinated in very questionable circumstances, I knew I was in danger of losing from both ends. Due to this development and as a way of survival, I have joined the train. I have in my possession funds amounting to US$25million. My problem is that the financial Law of Nigeria does not give asylum seekers any financial rights. And because of the economic instability and religious crisis, I have decided that it will be unwise to attempt investing the funds here. The climate here is very unfavorable and as a result, I have not disclosed even to my hosts anything about this fund. Now I am seeking foreign assistance to transfer the funds overseas. If you can assist, I am willing to give you 20% of the funds, that is US$5Million. You will understand that my entire life and future depend on this money and I shall be very grateful if you can assist me. The major thing I demand from you is the absolute assurance that the money will be safe and you will not sit on it when it is transferred to your account. If you are ready to be of assistance, please contact me immediately by e-mail, so that I can furnish you with the modalities for the transaction and what is expected of you. I shall be most grateful if you maintain utmost confidentiality and keep this message entirely to yourself. Best Regards, MR. Wilson Damilo TEL : 234-1-7760618 FAX : 234-1-7593311 RESPOND TO THE BELOW EMAIL ADDRESS ([EMAIL PROTECTED]) or better still respond through my fax number above. ONCE AGAIN NOTE THAT FOR THE CONFIDENTIALITY OF THIS TRANSACTION, WHEN YOU CALL ME THE FIRST THING YOU DO IS FOR YOU TO ASK ME WHAT IS THE CODE, AND MY RESPONSE WILL BE (055).IF I DO NOT TELL YOU (055) THEN KNOW YOU ARE NOT TALKING TO ME. DROP THE PHONE IMMEDIATELY AND CALL ME BACK TILL I GIVE YOU THE CODE WORD. THIS IS DUE TO JAMMING TELECOMMUNICATION DEVICES IN THIS COUNTRY AS A RESULT OF THE BOMB EXPLOSION IN A LAGOS MILITARY BASE RECENTLY.
RE: out of the box
ummm, you've been to Sweden, but can't even spell it right? -Original Message- From: Michael Roberts [mailto:[EMAIL PROTECTED]] Sent: Thursday, April 04, 2002 2:19 PM To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: Re: out of the box weird. I was told this when I was in sweeden, as an explaination for the basic niceness of sweedes - ie, that they recieved in school basic emotional education which enabled them to deal with difficult people and situations. true/not true ? M On Thu, 2002-04-04 at 08:18, [EMAIL PROTECTED] wrote: Citerar Michael Roberts [EMAIL PROTECTED]: In Sweeden basic emotional education for all cuts social problems down to a minscule amount. Sweden has a basic emotional education for all? How come they never told me that? - Sten (born and raised in Sweden)
Increase Income-tax Free Benefits - Today!
Title: Increase Income-tax Free Benefits - Today! The Wealth Guardian's combination of financial flexibility and safety providing income tax free death benefits, long term care benefits, and pays 5.5% interest rate! 100% MONEY-BACK GUARANTEE * 11% COMMISSION No-lapse guarantee Non-medical underwriting limits based on net amount at risk Issued ages 50-85 FIRST NAME LAST NAME PHONE NUMBER EMAIL ADDRESS *See policy for details. Policy benefits may vary by state. Policy form 3000, is not yet available in all states. We don't want anybody to receive our mailings who does not wish to receive them. This is professional communication sent to insurance professionals. To be removed from this mailing list, DO NOT REPLY to this message. Instead, go here: http://www.InsuranceIQ.com/optout
Earn 36% monthly through fully secured accounts receivable acquisitions
INVESTOR ALERT MAKE 36% FULLY SECURED Is the stock market roller coaster making you worried? Join the flight to REAL returns! Earn 3% monthly through fully secured accounts receivable acquisitions! Discover what banks have been doing for decades. Harness the power and liquidity of fully secured accounts receivable acquisitions. IMAGINE $ 10,000.00 TODAY COULD BE WORTH $13,600.00 IN 12 MONTHS!! or $14,200.00 COMPOUNDED! Get in touch with us TODAY! Tel: +(514) 733 1009orFAX:+514 733 8909 or [EMAIL PROTECTED] Important: Mention yourName,State and daytime/nightime phone number and one of our Account Executives will contact you within 24hrswith all the information on receiving your personal, in depth information package.We will not email information! Get in touch with us TODAY! Serious Inquiries Only Minimum $10K Investment Secure and insured investment We accept foreign investors SEC registered To be removed from our lists: [EMAIL PROTECTED] with "remove" in the subject line.
Re: mil disinfo on cryptome
Quoting Khoder bin Hakkin ([EMAIL PROTECTED]): [faustine] More interestingly, s/he neglects to include this disqualifier from State Secrets: Allegiance to the United States Conditions that could raise a security concern and may be disqualifying include: d. Involvement in activities which unlawfully advocate or practice the commission of acts of force or violence to prevent others from exercising their rights under the Constitution or laws of the United States or of any state. How many Congressvermin, police w/ NCIS access, FBI, judges, domestic spooks of all flavors, etc are guilty of this? Here is a classic example of disinformation. Obviously, certain rights, activities, etc. are from time-to-time require that various rights be temporarily curtailed so that the important machinery of law-enforcement may work its magic. You're just trying to divert attention from this necessary exception to the normal rules. Therefore, you must be a spook. Regards, Steve -- Just fake it. -- Include 35da3c9e079dcf68ec3a608e8c0a47f6 somewhere in your message when you reply.
HGH: Treatments to reverse aging, enhance physical and mental performance, and strengthen the immune system!14163
As seen on NBC, CBS, CNN, and even Oprah! The health discovery that actuallyreverses aging while burning fat, without dieting or exercise! This provendiscovery has even been reported on by the New England Journal of Medicine.Forget aging and dieting forever! And it's Guaranteed! Click below to enter our web site: http://net.zvio.net/was/ Would you like to lose weight while you sleep! No dieting! No hunger pains! No Cravings! No strenuous exercise! Change your life forever! 100% GUARANTEED! 1.Body Fat Loss 82% improvement. 2.Wrinkle Reduction 61% improvement. 3.Energy Level 84% improvement. 4.Muscle Strength 88% improvement. 5.Sexual Potency 75% improvement. 6.Emotional Stability 67% improvement. 7.Memory 62% improvement. Click below to enter our web site: http://net.zvio.net/was/ ** If you want to get removed from our list please email at- [EMAIL PROTECTED] (subject=remove your email) **
kuro5hin.org || The tears of the people run together... (fwd)
http://www.kuro5hin.org/story/2002/4/6/174649/5326 -- The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
Guardian Unlimited Observer | International | The new liberal imperialism (fwd)
http://www.observer.co.uk/international/story/0,6903,680094,00.html -- The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
kuro5hin.org || Burning a book before it's printed (fwd)
http://www.kuro5hin.org/story/2002/4/7/175457/5447 -- The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
Periscope - A sophisticated strain of Anthrax (fwd)
http://www.msnbc.com/news/735231.asp?cp1=1#investigations -- The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
The Register - Cost of IT security breaches double - FBI (fwd)
http://theregister.co.uk/content/6/24747.html -- The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
The Register - MS gets leaked Win2k USB 2.0 drivers pulled, cites DMCA (fwd)
http://theregister.co.uk/content/4/24749.html -- The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
RE: crypto question - using crypto to protect financial transactions (fwd)
-- Forwarded message -- Date: Mon, 8 Apr 2002 11:10:39 +0200 From: Amir Herzberg [EMAIL PROTECTED] Reply-To: [EMAIL PROTECTED] To: 'McMeikan, Andrew' [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: RE: crypto question - using crypto to protect financial transactions I understand the goal of allowing secure and anonymous financial transactions via the Net. I'm personally very interetested in this, although I must admit I am also a bit concerned about the social implications if this becomes a reality (or when it does, since I believe it eventually will). What I'm concerned about is tax avoidance, esp. by wealthy individuals and companies. Nobody likes taxation (at least personally :-), but it is still the basis for operation of states - and while changes may be good, they are also risky. Anyway, forgetting for a moment the question of should we do it, let's focus on the question of how we do it :-) I looked up Andrew's site, and actually there're not too many details there (yet?). I think his initial focus and question was on the issue of whether one can trust one's public key to the financial server, and his answer seems to be, you can if you split the key between several servers using thershold or proactive signatures (proactive schemes allow recovery from penetrations of servers - and btw, this is an area deserving more implmentation efforts, beyond what we did in IBM). I think there may be even more critical hurdles for successful financial crypto services. A very important one is interoperability between different financial service providers (the companies that keep your money... E.g. banks). Most crypto-financial efforts so far focused on a centralized model - one bank - and that's much easier to design, but very hard to succeed. I've done some work on secure interoperability among providers - it was actually the main feature of IBM Micro Payments. IBM have also applied for patent for some of the ideas. Another important issue is the automated management of trust and reputation, allowing customers to make (automated) trust decisions on providers of services and goods (including both financial services and merchants). Here I agree with Andrew that for many applications, financial transactions should not be reversible (disputed), and hence trust and reputation becomes the main means for consumer protection. Regards, Amir Herzberg See http://amir.beesites.co.il/book.html for lectures and draft-chapters from book-in-progress, `secure communication and commerce using cryptography`; feedback welcome! - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Handcuffs for your handheld (fwd)
http://w3-3.ibm.com/technology/news/2002/0403-datasecurity.html -- The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
Slashdot | Blizzard/Vivendi Files Suit Against Bnetd Project (fwd)
http://slashdot.org/articles/02/04/08/1510201.shtml?tid=127 -- The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
I saw your camping info. and I thought this would interest you
Title: iSun Portable Solar Charger Want guaranteed power all the time for your cell phone? Want power anywhere, anytime, for your portable electronics? Want to replace all your power chargers with one device? Want a charger that can work independent of wall plugs? View TechTV's featureon the iSun: 56k | 100k | 250k This email has been sent to you because you agreed to receive information on camping products. To be removed from this list please click the link below and you will instantly get removed from our newsletter. Thank you. This message is sent in compliance with the new email bill HR 1910. Under Bill HR 1910, passed by the 106th US Congress on May 24, 1999, this message cannot be considered spam as long as we include instructions on how to be removed, per Section HR 1910. If you are receiving this email in error please click here to unsubscribeThis mail has been sent to you exclusively by www.slickpower.com
Re: all about transferable off-line ecash (Re: Brands off-line tech)
Anonymous gives some comments on some deficiencies in the properties of the transferable ecash schemes to date: On Mon, Apr 08, 2002 at 04:15:09AM +0200, Anonymous wrote: [...] And second, because they grow, it is possible to tell exactly how many hands a particular coin has passed through - just count the transcripts of previous spends. So coins are not all that anonymous. And further, there is no re-blinding of the earlier transcripts. The Alice transcript is in the clear in all following uses of that same coin. Transferred coins are recognizable and linkable. While it is true that the coins are by unavoidably linkable, the linkability will only leak information where a user happens to see the same coin twice as it gets re-spent, as he can recognize this. As the chain length is also visible he knows how many hands it has gone through since he spent it. However he has no way to identify the intermediate payers except the last payer. The amount of identifying information the immediate payer discloses is up to that payer, though some identification may be relatively hard to avoid if there is no anonymous communication link used. So in general the shorter the intermediate chain the more revealing about the first and last payer in the intermediate chain the observation is. The more people who collude, the more chance their is that the colluding group can find samples of respent coins and so identify or gain information about the transactions of a target payer or payee. The transaction information leakage from the linkability may be fairly limited in practice -- for example by comparison how much transaction leakage would you expect to get as an individual or small group of coluding individuals if you write down the serial number on a bank note and wait until you see it again -- or even if a bank were to perform the same experiment, and they are far more likely to see it again due to volume. The issue will tend to be worse in small payment communities. Clearly it's not ideal, and it is useful to think about things you could do to improve the situation: - One thing that could be done to obscure this is to add a few extra random spending hops (say 0-2) which the user can do himself by spending to himself, though this comes at some extra space overhead. The recipient won't be able to distinguish self-spends from third-party spends. - Another defense would be to use third party money-changer to exchange coins for different coins. Basically to shuffle coins around a bit so that receiving a coin from someone with a short enough chain length between current and recognised spend to normally leak some information will no longer gain useful information. Ideas for more robustly fixing it: - Perhaps there is a way to encrypt the original chain with the bank's public key with a randomizable encryption algorithm such as Elgamal and yet retain sufficient proofs that the encrypted chain contains coin transcripts which would identify the appropriate part if the coin were double spent, and such that people handling the coin are assured of it's issue value. Also here are some comments on the conclusions: So it works, but broadly speaking there are two problems. First, off-line coins suck, as described above. And second, because they grow, it is possible to tell exactly how many hands a particular coin has passed through - just count the transcripts of previous spends. So coins are not all that anonymous. And further, there is no re-blinding of the earlier transcripts. The Alice transcript is in the clear in all following uses of that same coin. Transferred coins are recognizable and linkable. Hence they suck even worse than off-line coins. Online actions are harder to perform anonymously, therefore added flexibility to behave more off-line is good for anonymity. Off-line and transferable off-line coins add several new features which are useful to an anonymous user: - ability to transfer rather than deposit, so better hiding payee identity from bank for payers that want this (there are good uses for payee privacy as well as payer privacy) - accountless operation is better for privacy than forcing payments to be deposited and withdrawn as it also gives a user privacy of transaction volume; however accountless operation where you have to connect to the bank in real time (online protocol) makes it more difficult to remain anonymous due to the need for interactive low-latency communication - a money changer is much easier and more realistic to operate with off-line transferability -- it's basically impossible for the bank to detect with off-line transferability. With online coins a money changer would stand out exchanging a lot of coins through it's account (with forced-account option), plus even with accountless online exchange of fresh coins at the bank it's harder for the money changer to hide it's identity due to it's necessarily high bandwidth, low-latency interactive
Re: all about transferable off-line ecash (Re: Brands off-line tech)
On Tue, 9 Apr 2002, Adam Back wrote: Tranferable off-line coins allow all kinds of cool anonymity features as described above, I also argued above that the linkability deficiency can somewhat defended against. And transferable off-line coins add yet more flexibility, while again not preventing online clearing for those that prefer it. While some of the features have the linkability artifact, those features are optional and the user has free choice to select methods to avoid entirely or defend against linkability by any of the available methods respectively fetching fresh online coins, using money-changers to do the same more off-line, and self re-spending to add confusion. Hence transferable off-line coins are already superior to both non-transferable off-line coins and online coins due to the selection of choice of new features and trade-offs offered to the users. All we need now is a way to more robustly defeat linkability. While I agree with goal, it's not clear to me that it's physically possible. What makes money useful is it's physical existance, people have been counterfiting coins since they were invented but it's been getting harder to do. With off-line coins you could easily counterfit or double spend and live off the float, especially if you do it all anonymously. And if you just do it once with some huge sum, you'd get away with it (like Enron guys did :-) Money boils down to psycology - people trust that it trades their effort for somebody elses effort. who's going to trust ephemeral bits? Crossing that barrier is going to be a lot harder than any technology. Patience, persistence, truth, Dr. mike
Re: brilliancy
At 07:59 AM 04/08/2002 -0600, Anonymous wrote: Any attacker who can control 100,000 machines is a major force on the internet, while someone with a million or more is currently unstoppable: able to launch massively diffuse DDOS attacks, perform needle in a hayfield searches, and commit all sorts of other mayhem. We already understand how worms could be used to gain control of so many machines. Yet the recent revelation that Brilliant Digital Media has bundled a small trojan with KaZaA has underscored another means by which an attacker could gain control of so many machines: poorly secured automatic updaters. If an attacker can distribute his own code as an update, he can take control of millions of machines. http://www.cs.berkeley.edu/~nweaver/0wn2.html So, now, how hard would it be to use this mechanism to upload PGPNet with opportunistic encryption enabled to millions of hosts ? Do you mean How hard would it be to crack into Brilliant Digital's servers before some other SKR1P7 K1DD13Z take it over? Or do you mean Is that easier than cracking into Microsoft or Adobe or M0Zilla or some other quasi-reputable company's distribution system?? Actually using it to upload PGPNet would probably be pretty hard - it's no longer just Phil's ~200KB of badly-written MSDOS code, it's now 5-10MB of bloatware (:-), and you can't distribute a few million copies of a few megabytes to unsuspecting users without somebody noticing. Also, leaving aside the opportunistic encryption issues, which depend on having working secure inverse DNS for the FreeS/WAN flavor, you can't depend on tunnels working through firewalls or NAT or other arbitrary connections out there, so a lot of recipients wouldn't really get to have it working for them, but it might break quite visibly - especially for people who already have VPNs, and therefore usually have corporate IT support or corporate security departments who'll notice it. Better to just build a nice small ipsec client into a flashy MP3 player :-)
Re: all about transferable off-line ecash (Re: Brands off-line tech)
The issue with off-line cash is this: has the coin being offered already been spent? With on-line cash, the offered coin is immediately deposited at the bank, hence doubly-spent coins are detected instantly. With off-line cash this cannot be done because by definition there is no connection to the bank. Hence there is no way to know, off-line, if a coin has already been spent. The solution is to embed the identity of the withdrawer into the coin when it is withdrawn from the bank, in such a way that this identity will only be revealed if the coin is double-spent. That provides a partial solution to the off-line scenario. A coin is offered off-line, and the recipient again has no guarantee that it hasn't been spent already. He accepts the coin anyway, and later when he gets on-line he tries to deposit it at the bank. But he learns that he was cheated; the coin had already been spent. Now he has a fall-back solution: the doubly-spent coin reveals the embedded identity of the party who withdrew it (and who doubly-spent it). He can call the cops and try to track down and prosecute the cheater. All off-line spending schemes work this way. All they can offer is the hope of tracking down cheaters after the fact. They can never offer the assurance of validity that an immediate on-line check can provide. With off-line coins, unlike on-line coins, the spender knows more than he's telling. He knows secrets about those coins which would reveal his identity; that is, his identity is embedded in some secret information associated with the coin. When he spends it at a shop, he responds to a random challenge from the shop, using his secret information. The system is set up so that the shop, and later the bank, can validate his response as being valid, proving that he truly owned a coin. For the double-spending detection, the system is further arranged that if two different shops offer two different random challenges, then from the responses to these two challenges, the user's secret information and therefore his identity is revealed. To turn this into a transferrable system, we would allow a chain of transfers before the bank gets involved. Alice spends the coin with Bob, who spends it with Carol, who spends it with David, who deposits it at the bank. There are two problems. First, only Alice knows the secret information associated with the coin. She can't give all the secrets to Bob, or else he would know her identity. So Bob only has a limited amount of information about the coin. Second, after this chain of transfers, if there was double-spending, it might have been anyone along the chain. The system for double-spending detection has to be able to identify which person was the cheater. The solution which Adam describes works as follows. Each party pre-withdraws a zero-value coin from the bank. This is an off-line coin which has their identity encoded in it, if they double-spend it. Alice first spends her coin with Bob in the normal off-line way. Bob ends up with a transcript sufficient to prove that he received a presumably valid coin from Alice (but one which might have been doubly-spent). Now Bob wants to spend with Carol. He does two things: he gives her the transcript of Alice's spend with him, which implicitly identifies the value of the coin; and also he engages in the regular off-line coin spend with her, using his zero-value coin. If Carol then spends the coin with David, she does the same two things: she gives David the transcript of Bob's spend with her (which itself included the two parts above), and also spends a zero-value coin with him. The resulting transcript now has three parts. So it grows at each transfer, and in the end the transcript is deposited. If there was a double-spend, someone spent his zero-value coin twice, and his own identity is revealed. There is one flaw, which is that Bob could use the same Alice transaction with more than one zero-value coin, which he after all gets for free. Carol can't tell that the Alice transaction she sees is the same one someone else saw, and if Bob uses a unique zero-value coin for each spend, then Bob's identity will not be revealed as it should be. The fix for this is that when Bob receives the coin from Alice, knowing that he is going to pass it on, he must link the specific zero-value coin he will later use into the transcript he will receive of Alice's spend with him. This is done by including a hash of the coin information into the random challenge he sends to Alice. Then when he tries to pass the coin on to Carol, she checks that the zero-value coin he is spending with her matches the value used in the Alice transcript. That prevents Bob from using two different zero-value coins with a single Alice transcript. So it works, but broadly speaking there are two problems. First, off-line coins suck, as described above. And second, because they grow, it is possible to tell exactly how many hands a particular coin has
Re: FUCANN Fully UnCentrallized Authority for Naming and Numbers
Frob the Builder wrote: The problem comes when the server a domain points to is the map for several domains, say via Virtual Hosts or selected forwarding. Many servers use this if they're on a dedicated web-hoster, or for subdomains. Ahah, because the 'physical' server uses the URL to map to 'virtual' servers. You're right, the Rev 1.0 plan doesn't handle that. This only applies to HTTP requests though, AFAIK. The easiest work around, I figure, is a translation proxy that you run (locally) and channel all requests through. This proxy could look up the virtual mapping from a local domain to a legacy domain and vice versa. Not big on proxies myself, so not sure how feasible it'd be to either build a custom one, or to adapt an existing one. Off to look through Squid... .g -- ...not much (legal) material is out there that's full of graphics and in a consumer-friendly format to create the need for DSL. - Jack Valenti http://www.exmosis.net/Sometimes I use Google instead of pants.
Re: mil disinfo on cryptome
Quoting Khoder bin Hakkin ([EMAIL PROTECTED]): [faustine] More interestingly, s/he neglects to include this disqualifier from State Secrets: Allegiance to the United States Conditions that could raise a security concern and may be disqualifying include: d. Involvement in activities which unlawfully advocate or practice the commission of acts of force or violence to prevent others from exercising their rights under the Constitution or laws of the United States or of any state. How many Congressvermin, police w/ NCIS access, FBI, judges, domestic spooks of all flavors, etc are guilty of this? Here is a classic example of disinformation. Obviously, certain rights, activities, etc. are from time-to-time require that various rights be temporarily curtailed so that the important machinery of law-enforcement may work its magic. You're just trying to divert attention from this necessary exception to the normal rules. Therefore, you must be a spook. Regards, Steve -- Just fake it. -- Include 35da3c9e079dcf68ec3a608e8c0a47f6 somewhere in your message when you reply.