CNN.com - Privacy law muddles missing girl query - May 9, 2002
http://www.cnn.com/2002/US/05/09/missing.girl.ap/index.html -- -- The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
Verba Volant 10-05-2002
Verba Volant 10-05-2002, Every day a new quotation translated into many languages. _ Quotation of the day: Author - Henry David Thoreau English - we should distrust any enterprise that requires new clothes Italian - dovremmo diffidare di ogni impresa che richieda un vestito nuovo Spanish - deberíamos desconfiar de cualquier empresa que requiera un traje nuevo French - nous devrions nous méfier de toute entreprise qui nécessite un nouvel habit German - wir sollten jedem Vorhaben, dass neue Kleider braucht, misstrauen Albanian - nuk duhet të kemi besim në asnjë punë që ka nevojë për veshje të reja Asturian - debemos desconfiar de les empreses que requieran ropa nuevo Basque - ez ginateke fidatu behar jantzi berria behar duen enpresaz Bolognese - arénn da stèr luntàn da tótti cäli inpraiS ch'äl vójjen un ftièri nôv Brazilian Portuguese - devemos desconfiar de qualquer empresa que necessite de novas roupas Bresciano - èn garès de mia fidas de tóte le 'mprese che le ghà bisogn de en vistit nóf Breton - ret e vefe deomp disfiziout e n'eus forzh pe embregerezh a c'houlenn dilhad nevez Calabrese - averama diffidà di ogni impresa ca vulera nu vestitu nuovu Catalan - hauríem de desconfiar de qualsevol empresa que requereixi un vestit nou Croatian - trebali bismo biti nepovjerljivi prema svakom poduhvatu koji trai novu odjecu Czech - meli bychom být neduveriví vuci kadému podniku, který vyaduje nové aty Danish - vi må være på vagt efter et hver handlig som gør det nødvendig at have nye klæder Dutch - we moeten argwanend zijn tegenover elke onderneming die nieuwe kledij vereist Esperanto - ni devus malfidi cia entrepreno kiu postulas novajn vestajojn Estonian - me ei peaks usaldama ühtegi üritust, mis nõuab uusi riideid Ferrarese - a durìen sempar difidan d'ogni impresa cla vola'n vastì nóv Finnish - ei pitäisi luottaa hankkeisiin, jotka vaativat uuden puvun Flemish - we moeten argwanend zijn tegenover elke onderneming die nieuwe kledij vereist Furlan - 'o varessin di malfidasi di ogni imprêse ca domande un vestît gnûf Galician - debemos desconfiar da calquera empresa que esixa roupa nova Griko Salentino - enn è nna pistèzzume is cànne ppolemìsi p'ndiàzzete o rucho cinùrio Hungarian - egy olyan vállalkozásban sem szabad bíznunk, amihez új ruhára van szükség Judeo Spanish - kale deskonfiarse de kada una i una empreza ke tiene menester de un vistido muevo Latin - nobis diffidandum est cuivis societati quae novam vestem petat Latvian; Lettish - mums vajadzetu neuzticeties jebkuram pasakumam, kas prasa jaunas drebes Leonese - nun tendríamos que nos fiare d'una empresa que necesita un traxe nuevu Limburgian - sjauw dich vér zaoke boeste nauw kleer vér vandoen hébs Lombardo Occidentale - dovariom malfidà tutt i impres che ciammen vestii noeuv Mantuan - gh avresom da star atenti a tut quel che par faral agh vol an vestì nov Mudnés - a duvàm difidèr ed tótt al questiòun chi s'oblighèn a màtter un vistî nóv Neapolitan - nun duvessemo crerere e cose che richiedeno nu vestito nuovo Norwegian - vi bør ikke stole på noen virksomhet som forlanger nye klær Occitan - chalria malfisar de chasque empresa quabie manca duna vèsta novèla Papiamentu - nos mester deskonfiá di kada empresa ku mester di pañanan nobo Parmigiano - as devriss difidär 'd tutti li impresi ch'i gh'an bsogna d'spianär un vesti nov Piemontese - i dovrìo nen fidesse ëd n'imprèisa che a ciama na muda neuva Polish - musimy byc nieufni wobec kazdego przedsiewziecia, które wymaga nowego stroju Portuguese - devemos desconfiar de qualquer empresa que exija roupa nova Reggiano - gh'arésen da ster atèint a tott i quee ch'agh vol un vistii nov Romagnolo - a duvress gardèr ad traverss on da fer par quel a'i vuress un vistoid nov _ All languages, please click on this link http://www.logos.net/owa-l/press.frasiproc.carica?code=581 _ To unsubscribe from Verba Volant, please follow this link: http://www.logos.net/owa-l/press.rol_ml.verbavolant1?lang=en and write in the empty field next to unsubscribe the email address that you find after TO: in the Verba Volant emails alternatively write to the following address: [EMAIL PROTECTED] always copying the EMAIL address written after X-RCPT-TO:
The Register: Safedoor not core, shuts doors (another e-business closes, UK)
http://www.theregister.co.uk/content/6/25234.html -- -- The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
Jobs for home 5956mTC-7 9902TOiK8-282ALyT77-18
FREE SERVICE 39 million people are working from the comfort of their own home... why not you? We will put you in touch with the world's finest and most reputable companies that can provide you with the most lucrative compensation packages so you can gain true financial freedom. Don't spend hours searching for let us do it for you-FREE! or email us now with your phone number Inquiries with a name and phone number will get priority listings.Home business owners are making an average of over $75,000 Put our expertise to work for you today. There is NOTHING TO BUY and there is no obligation of any sort. You have nothing to lose, contact us immediately. Click here and include your name and phone number and one of our trained, friendly staff will return your call to get you listed... ...again it's all FREE, no catches. Motivated self-starters that include phone numbers will be given top priority status. To be removed click here 1322SVFr9-117sfVg8056LETn6-795zbVy5500xUHr7-649Pkmi6568l52
Free Service 6267ihgg1-882WjuP7420vslD0-9-26
FREE SERVICE 39 million people are working from the comfort of their own home... why not you? We will put you in touch with the world's finest and most reputable companies that can provide you with the most lucrative compensation packages so you can gain true financial freedom. Don't spend hours searching for let us do it for you-FREE! or email us now with your phone number Inquiries with a name and phone number will get priority listings.Home business owners are making an average of over $75,000 Put our expertise to work for you today. There is NOTHING TO BUY and there is no obligation of any sort. You have nothing to lose, contact us immediately. Click here and include your name and phone number and one of our trained, friendly staff will return your call to get you listed... ...again it's all FREE, no catches. Motivated self-starters that include phone numbers will be given top priority status. To be removed click here 4665ARja6-006IiWe1162ZbqQ6-287emUZ1786EMzw5-035Fl45
Sinirsiz porno
Title: Video 34dw JetSeks Film Arsivi Uzun zamandir beklenen yeni videolar ve tam metrajli filmlerle yayina devam ediyoruz. Sitemizi Ziyaret ederek zevkinize uygun icerigi hemen indirin. Iyi eglenceler DIRECT DOWNLOAD | TIKLA INDIR D O W N L O A D | Size: 2.6 MB D O W N L O A D | Size: 4.0 MB HER AN GUNCELLENEN LINKLER Aciklama: Cumshot | adet : 6 | tür: mpg Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Anal | adet : 1 | tür: avi Aciklama: Teen | adet : 10 | tür: mpg Aciklama: Hardcore | adet : 14 | tür: avi Aciklama: Teen | adet : 4 | tür: avi Aciklama: Interracial | adet : 12 | tür: mpg Aciklama: Monstercock | adet : 3 | tür: avi Aciklama: Teen | adet : 3 | tür: avi Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Teen | adet : 3 | tür: mpeg Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Hardcore | adet : 1 | tür: avi Aciklama: Pussy Licking | adet : 6 | tür: mpg ARSIVDEN SEÇMELER D O W N L O A D | Size: 2.8 MB D O W N L O A D | Size: 3.3 MB D O W N L O A D | Size: 2.9 MB
Sende Jet e katil
Title: Video 3c 3rc JetSeks Film Arsivi Uzun zamandir beklenen yeni videolar ve tam metrajli filmlerle yayina devam ediyoruz. Sitemizi Ziyaret ederek zevkinize uygun icerigi hemen indirin. Iyi eglenceler DIRECT DOWNLOAD | TIKLA INDIR D O W N L O A D | Size: 2.6 MB D O W N L O A D | Size: 4.0 MB HER AN GUNCELLENEN LINKLER Aciklama: Cumshot | adet : 6 | tür: mpg Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Anal | adet : 1 | tür: avi Aciklama: Teen | adet : 10 | tür: mpg Aciklama: Hardcore | adet : 14 | tür: avi Aciklama: Teen | adet : 4 | tür: avi Aciklama: Interracial | adet : 12 | tür: mpg Aciklama: Monstercock | adet : 3 | tür: avi Aciklama: Teen | adet : 3 | tür: avi Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Teen | adet : 3 | tür: mpeg Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Hardcore | adet : 1 | tür: avi Aciklama: Pussy Licking | adet : 6 | tür: mpg ARSIVDEN SEÇMELER D O W N L O A D | Size: 2.8 MB D O W N L O A D | Size: 3.3 MB D O W N L O A D | Size: 2.9 MB
RE: another reason to avoid airbus: surveillance
Major Variola (ret)[SMTP:[EMAIL PROTECTED]] http://www.newscientist.com/news/news.jsp?id=ns2256 Airbus, the European jet manufacturer, is planning to build concealed cameras into the light fittings above the seats in its aircraft. The idea is to let the crew monitor passengers and spot hijackers before they strike. The cameras also work in the dark. [...] One plan Airbus is considering, says the firm's cabin security expert Rolf Gvdecke, involves hiding a tiny camera inside the light fittings above each passenger seat, surrounded by a ring of infrared LEDs. The cameras will normally work with ambient light, but switch to infrared when the cabin is dark. I would suspect that the engineering for this has been well developed for years - it seems a natural extension of the habit of some national carriers (Air France is the one usually pointed out, but one suspects they are not alone) of wiring first class seats for sound, for purposes of industrial espionage. Extending the capabilities to all classes, and to video (need to read those negotiating postions on lap top screens, after all) seems a natural step. Once again, terrorism is used as the justification for the further removal of the right of privacy. Peter Trei
Jet tarzinda
Title: Video fdw wd JetSeks Film Arsivi Uzun zamandir beklenen yeni videolar ve tam metrajli filmlerle yayina devam ediyoruz. Sitemizi Ziyaret ederek zevkinize uygun icerigi hemen indirin. Iyi eglenceler DIRECT DOWNLOAD | TIKLA INDIR D O W N L O A D | Size: 2.6 MB D O W N L O A D | Size: 4.0 MB HER AN GUNCELLENEN LINKLER Aciklama: Cumshot | adet : 6 | tür: mpg Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Anal | adet : 1 | tür: avi Aciklama: Teen | adet : 10 | tür: mpg Aciklama: Hardcore | adet : 14 | tür: avi Aciklama: Teen | adet : 4 | tür: avi Aciklama: Interracial | adet : 12 | tür: mpg Aciklama: Monstercock | adet : 3 | tür: avi Aciklama: Teen | adet : 3 | tür: avi Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Teen | adet : 3 | tür: mpeg Aciklama: Hardcore | adet : 10 | tür: mpg Aciklama: Hardcore | adet : 1 | tür: avi Aciklama: Pussy Licking | adet : 6 | tür: mpg ARSIVDEN SEÇMELER D O W N L O A D | Size: 2.8 MB D O W N L O A D | Size: 3.3 MB D O W N L O A D | Size: 2.9 MB
Re: attack on rfc3211 mode (Re: disk encryption modes)
Adam Back [EMAIL PROTECTED] writes: I can see that, but the security of CBC MAC relies on the secrecy of the ciphertexts leading up to the last block. In the case of the mode you describe in RFC3211, the ciphertexts are not revealed directly but they are protected under a mode which has the same splicing attack. The splicing attack on CBC MAC with leading ciphertext works through CBC encryption, here's how that works: Right. One minor point, the IV is never zero, for disk encryption it's a cryptographic transform of the sector number, for PWRI it's supplied by the CMS algorithm parameter (this doesn't affect the attack). I would have thought this would be considered a 'break' of a non-malleable cipher mode as discussed for disk encryption where each bit of plaintext depends on each bit of ciphertext as would be the case with a secure cipher matching Mercy's design goals (a block cipher used in ECB mode with a different key per block). Yup. Actually the no-stored-IV encryption was never designed to be a non- malleable cipher mode, the design goal was to allow encryption-with-IV without having to explicitly store an IV. For PWRI it has the additional nice feature of avoiding collisions when you use a 64-bit block cipher, which is probably going to be the case for some time to come even with AES around. It was only after all that that I noticed that the first pass was effectively a CBC-MAC, but it didn't seem important enough to mention it in the RFC since it wasn't an essential property (good thing I didn't :-). With a disk mode, unlike with RFC3211 pasword based encryption for CMS there is no place to store the structure inside the plaintext which may to some extent defend against this attack. Even with PWRI you get at most ~32 bits of protection, and can bypass even that if you encrypt 5 or more 64-bit blocks and mess up the second block, since the garble will propagate to at most 4 of the 5 blocks. The 32-bit limit was deliberate, I was worried about dictionary attacks above all else (in fact the first version of the wrap was a bit too paranoid in that it had no redundancy at all, which unfortunately meant that it wasn't possible to catch incorrect passwords. User complaints lead to the addition of the 24-bit check value which is enough to catch virtually all mistyped passwords but not enough to provide more than a small reduction in the number of guesses necessary for an attacker. The length byte is there so an attacker can't perform an iterative attack where they change the algorithm ID for the wrapped key to 40-bit RC4 and brute-force it, then 56-bit DES and brute-force the 16-bit difference, then 80- bit Skipjack, 112-bit two-key 3DES, and finally 128-bit AES. There was another key wrap design where this was possible). Digressing from the original disk-sector-encryption, I'd be interested in some debate on the requirements for password-based key wrapping. The design goals I used were: 1. Resistance to dictionary/password-guessing attacks above all else. 2. No need to use additional algorithms like hash algorithms (see the RFC for the rationale, to save me typing it all in again). The reason for 1. is that provided you use a secure cipher the best approach for an attacker is going to be a dictionary attack or similar attack on the password used to wrap the key. Since the wrapping key is going to be used to protect things like long-term private keys, this is an extremely high-value item. Note that the immunity to key-guessing requirement is mutually exclusive with modification-detection, since (for example) storing a SHA-1 hash would allow you to immediately verify whether you'd found the password/key. This is the exact problem which PKCS #12 has, you don't need to attack the key wrap since the MAC on the wrapped data is a much easier target. There's another key wrap which stores a full SHA-1 hash alongside the wrapped key (to protect against some problems present in an earlier version of the same key wrap mechanism, which fell to fairly trivial attacks). This is great for integrity protection, but terrible for security, since it allows you to verify with pretty much 100% accuracy whether you've guessed the password.I also looked at some sort of OAEP-like wrapping (or, more generally, a Feistel-like construct of the kind used in OAEP), but it seemed a bit ad-hoc when used with symmetric key wrap rather than RSA. Does anyone have any thoughts on symmetric key wrap, and specifically the differences between high-value and low-value (ephemeral) key wrap requirements? General rant: It's amazing that there doesn't seem to be any published research on such a fundamental crypto mechanism, with the result that everyone has to invent their own way of doing it, usually badly. We don't even have a decent threat model for this, my attempt at one for password-based key wrap may or may not be appropriate (well, I hope it's more or less right), but it's going to be
Honey, I fired the boss!
How much is it really costing you to work for someone else? Time? Money? Frustration? Stress? Gas? Parking? Baby Sitters? Vehicle maintenance? Lunches out? Traffic jams? If I can show you a reputable business in one of the fastest growing industries in the world, where you can be earning 10K per month beginning your 4th month and increasing from there, would you have an interest? If so, please mailto:[EMAIL PROTECTED]?subject=INFO THE BODY OF THE EMAIL MUST CONTAIN YOUR NAME AND PHONE NUMBER! You will be emailed preliminary information and then you will receive a follow-up phone call! NO INFO will be sent without a name and phone number. Yours in prosperity, Heart of Gold, Inc. To be removed from this mailing list, please mailto: [EMAIL PROTECTED]?subject=REMOVE
[no subject]
Hi again! Did you get our last email? Here are our pictures again. http://www.lifestylelounge.com/member/hotfriends4u.htm Talk to you soon! ;-) Shane and Traci 6849kXOe8-634NgLT6636TxzL1-108uUWn4530oyDY2-607byom6322qsl54
TEACHER MILLIONAIRES!! 27428
Title: pebblemailer This message is an advertisement. We will continue to bring you valuable permission based messages on the products and services that interest you most unless you wish to decline. We process all requests immediately. Brought to you by world Reach Corporation. Copyright 2000, 2001, 2002 all rights reserved. This message is an advertisement. We will continue to bring you valuable permission based messages on the products and services that interest you most unless you wish to decline. We process all requests immediately. Brought to you by world Reach Corporation. Copyright 2000, 2001, 2002 all rights reserved.
you're up $30 now
~THE HOTTEST CASINO ONLINE~ FREE $30! Win a BMW Z3! VISIT US NOW!
Australian government proposed 'terror laws'
Australia needs your help! The Howard government is using the `war on terrorism' as justification to introduce so called `Asian Values' (a euphonism used by Mahathir to explain his governments removal of rights from the Malaysian people) into Australia. The government is at this very moment attempting to pass legislation to reclassify SMS and emails as non-communication so that it doesn't need a warrant to read them, legislation to strip search and hold children as young as 10 in custody indefinitely without the right to speak to their parents or a lawyer, legislation to ban any political party or union the say of single minister and legislation to removes the right to silence. There need not be any terrorism or suspected terrorism involved. The proposed legislation goes even further than Malaysia's notorious Internal Security Act. Many of the democratic rights we have cherished as Australians are in peril. Unless the Labor Party is forced to join with the Greens and Democrats in blocking the proposed terror laws in the Senate the government will gain extreme powers to crack down on everything from civil dissent to speaking the wrong way to a bureaucrat. Not just this government. All possible future governments. Australians do not need these kind of `Asian Values'. Bloody government! But how can I help? 1) Forward this email to 10 friends/work associates. 2) Send this SMS to 10 of your friends: Urgent! Howard wants 2 spy on ALL sms msgs email See terrorlaws.iq.org. Pls fwd to 10 friends! 3) If you're in Melbourne, come to the Rally at 1 PM, Saturday May 11 2002 at the GPO cnr Bourke Elizabeth sts. Bring a friend! 4) See the Terror Laws campaign site http://terrorlaws.iq.org/ which has extensive background information, media reports and interviews. 5) Subscribe to the campaign discussion list: http://iq.org/cgi-bin/mailman/listinfo/terrorlaws 6) Talk about what's happening with your family and work mates and tell then what you intend on doing something about it Most importantly: WRITE RING OR FAX : SIMON CREAN, ALP Tel: (02) 6277 4022 Fax: (02) 6277 8495 And say you and your family will NOT VOTE for the ALP if it doesn't strongly oppose these undemocratic laws. THIS WEEK is the most important week of the campaign. The ALP is could go eitherway based on a single phone call. Make history. -- Julian Assange|If you want to build a ship, don't drum up people |together to collect wood or assign them tasks and [EMAIL PROTECTED] |work, but rather teach them to long for the endless [EMAIL PROTECTED] |immensity of the sea. -- Antoine de Saint Exupery
Re: attack on rfc3211 mode (Re: disk encryption modes)
On Sat, May 11, 2002 at 04:01:11AM +1200, Peter Gutmann wrote: | General rant: It's amazing that there doesn't seem to be any published research | on such a fundamental crypto mechanism, with the result that everyone has to | invent their own way of doing it, usually badly. We don't even have a decent | threat model for this, my attempt at one for password-based key wrap may or | may not be appropriate (well, I hope it's more or less right), but it's going | to be rather different than for a situation where you have an ephemeral | symmetric key rather than a fixed, high-value key wrapping another key. The | same problem exists for things like PRFs, we now have PKCS #5v2, but before | that everyone had to invent their own PRF for lack of anything useful, with | the result that every single protocol which needs a PRF has its own, | incompatible, often little-analysed one. | | More specific rant: Looking at the security standards and protocols deployed in | the last decade or so, you'd be forgiven for thinking that the only crypto | research done in the last 10 years (beyond basic crypto algorithms) was | STS/SPEKE and HMAC. There seems to be this vast gulf between what crypto | researchers are working on and what practitioners actually need, so while | conferences are full of papers on group key management and anonymous voting | schemes and whatnot, people working on real-world implementations have to | home-brew their own mechanisms because there's nothing else available. The | RFC 3211 wrap is actually parameterised so you can slip in something better | when it becomes available, but I can't see that ever happening because | researchers are too busy cranking out yet another secure multiparty | distributed computation paper that nobody except other researchers will ever | read. | | (Did I miss offending anyone? :-). The voting folks? ;) Adam -- It is seldom that liberty of any kind is lost all at once. -Hume
Australian government proposed 'terror laws' (fwd)
-- -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBMTO: N48 04'14.8'' E11 36'41.2'' http://www.leitl.org 57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3 -- Forwarded message -- Date: Sat, 11 May 2002 04:35:44 +1000 (EST) From: Julian Assange [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Australian government proposed 'terror laws' Australia needs your help! The Howard government is using the `war on terrorism' as justification to introduce so called `Asian Values' (a euphonism used by Mahathir to explain his governments removal of rights from the Malaysian people) into Australia. The government is at this very moment attempting to pass legislation to reclassify SMS and emails as non-communication so that it doesn't need a warrant to read them, legislation to strip search and hold children as young as 10 in custody indefinitely without the right to speak to their parents or a lawyer, legislation to ban any political party or union the say of single minister and legislation to removes the right to silence. There need not be any terrorism or suspected terrorism involved. The proposed legislation goes even further than Malaysia's notorious Internal Security Act. Many of the democratic rights we have cherished as Australians are in peril. Unless the Labor Party is forced to join with the Greens and Democrats in blocking the proposed terror laws in the Senate the government will gain extreme powers to crack down on everything from civil dissent to speaking the wrong way to a bureaucrat. Not just this government. All possible future governments. Australians do not need these kind of `Asian Values'. Bloody government! But how can I help? 1) Forward this email to 10 friends/work associates. 2) Send this SMS to 10 of your friends: Urgent! Howard wants 2 spy on ALL sms msgs email See terrorlaws.iq.org. Pls fwd to 10 friends! 3) If you're in Melbourne, come to the Rally at 1 PM, Saturday May 11 2002 at the GPO cnr Bourke Elizabeth sts. Bring a friend! 4) See the Terror Laws campaign site http://terrorlaws.iq.org/ which has extensive background information, media reports and interviews. 5) Subscribe to the campaign discussion list: http://iq.org/cgi-bin/mailman/listinfo/terrorlaws 6) Talk about what's happening with your family and work mates and tell then what you intend on doing something about it Most importantly: WRITE RING OR FAX : SIMON CREAN, ALP Tel: (02) 6277 4022 Fax: (02) 6277 8495 And say you and your family will NOT VOTE for the ALP if it doesn't strongly oppose these undemocratic laws. THIS WEEK is the most important week of the campaign. The ALP is could go eitherway based on a single phone call. Make history. -- Julian Assange|If you want to build a ship, don't drum up people |together to collect wood or assign them tasks and [EMAIL PROTECTED] |work, but rather teach them to long for the endless [EMAIL PROTECTED] |immensity of the sea. -- Antoine de Saint Exupery http://xent.com/mailman/listinfo/fork
Re: Australian government proposed 'terror laws'
On Sat, May 11, 2002 at 04:35:29AM +1000, Julian Assange wrote: Australia needs your help! The Howard government is using the `war on terrorism' as justification to introduce so called `Asian Values' (a euphonism used by Mahathir to explain his governments removal of rights from the Malaysian people) into Australia. Jesus, what a horrible fuck job. But we don't need N copies of this mail on the cpunks list. One will do. I would not be supriseed if the USG has something to do with this, they seem to use Australia as the repressive legislation beta test site. Hmm. First they took all the guns, now a few year later, this. Eric
ADV: Low Cost Life Insurance -- FREE Quote iaecj
Low-Cost Term-Life Insurance! SAVE up to 70% or more on your term life insurance policy now. Male age 40 - $250,000 - 10 year level term - as low as $11 per month. CLICK HERE NOW For your FREE Quote! http://211.78.96.242/insurance/ If you haven't taken the time to think about what you are paying for life insurance...now is the time!!! We offer the lowest rates available from nationally recognized carriers. Act now and pay less! CLICK HERE http://211.78.96.242/insurance/ Simple Removal instructions: To be removed from our in-house list simply visit http://211.78.96.242/removal/remove.htm Enter your email addresses to unsubscribe.
Free InsBuyer.com Agency Listing
Title: Free InsBuyer.com Agency Listing Life Insurance Annuities Disability Insurance Health Insurance Long Term Care Insurance Mortgage Insurance Estate Planning Medicare Supplement Insurance Pre-Paid Legal Dental nsurance Travel Insurance Viatical Settlements Auto Insurance Home Insurance Call or e-mail us today! or Please fill out the form below for a free listing Name: Company: Address: City: State: Zip: Phone: E-mail: Website: We don't want anyone to receive our mailings who does not wish to. This is professional communication sent to insurance professionals. To be removed from this mailing list, DO NOT REPLY to this message. Instead, go here: http://www.Insurancemail.net Legal Notice
HOTTEST BIZ ON OR OFF THE NET
Hottest Biz On Or Off The Net !! ONLINE INVESTORS WANTED MILLION DOLLAR MARKETING PLAN ALLOWS YOU TO MAKE UNLIMITED INCOME THROUGH TEAM CONCEPT CUTTING EDGE SOFTWARE Search for stocks Perform Fundamental Analysis Check the Charts (Technical Analysis) Check News Trade a Stock Manage your Portfolio Monitor Trading Strategies View your personalized Ticker Get support from your Mentors FOR MORE INFO, Please Respond With Phone Number:_ and Email address: Your name phone # will never be shared or sold, it will only be used for this follow up EMAIL TO: [EMAIL PROTECTED] Warmest Regards, Mark PS: if you received this email by mistake Please put Remove in subject line to Opt-out of this list. and email to [EMAIL PROTECTED] Thanks. 5974jAl6
re: Australian government proposed 'terror laws'
Australia needs your help! The Howard government is using the `war on terrorism' as justification to introduce so called `Asian Values' (a euphonism used by Mahathir to explain his governments removal of rights from the Malaysian people) into Australia. Ha, ha! You know the old saying, If you have a gun, your're a citizen. Without it you're a subject. I guess you now know how it feels to be a subject of an increasingly oppressive regime. Sorry, but I won't shed a tear for the foolish. My suggestion: You made your bed. Time to take a nap. ks
Virus discarded
We received a message claiming to be from you which contained a virus according to File::Scan v0.25, a Perl module from CPAN at http://www.cpan.org/authors/id/H/HD/HDIAS This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please visit http://www.mcafee.com or another virus software company's website. Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: CDR: Undeliverable mail--and tips about other films. I will gladly post Virus : W32/Klez.gen@MM Original headers: Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id SAA20706 for [EMAIL PROTECTED]; Fri, 10 May 2002 18:48:28 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id SAA20700 for cypherpunks-outgoing; Fri, 10 May 2002 18:48:22 -0500 Received: from avocet.prod.itd.earthlink.net (avocet.mail.pas.earthlink.net [207.217.120.50]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id SAA20695 for [EMAIL PROTECTED]; Fri, 10 May 2002 18:48:12 -0500 Received: from dialup-63.214.126.106.dial1.boston1.level3.net ([63.214.126.106] helo=Xxpd) by avocet.prod.itd.earthlink.net with smtp (Exim 3.33 #2) id 176JuE-0001dX-00 for [EMAIL PROTECTED]; Fri, 10 May 2002 16:34:35 -0700 From: postmaster [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: CDR: Undeliverable mail--and tips about other films. I will gladly post MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=N08GpGVM34hfIU24u74U4177V0E770 Message-Id: [EMAIL PROTECTED] Date: Fri, 10 May 2002 16:34:35 -0700 Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish
Major Medical Breakthrough - Huge Profit Potential
Major Medical BreakthroughHuge Profit Potential Imagine yourself as part owner of the most interesting, full service state-of-the-art medical facility, equipped with the most sophisticated and effective scanning diagnostic tools available today. Electron Beam Tomography is a cutting-edge diagnostic technology capable of providing a crystal-ball-like look into your medical future. This technology has been featured on Oprah, Larry King, Good Morning America, and USA Today. EBT Scans are now covered by most health insurance companies and HMOs, causing an explosion in usership and exceptionally high demand for this procedure. EBT can identify heart disease years before a treadmill test would show an abnormality and many years before a heart attack might occur. A tremendous improvement upon standard computerized tomography, also known as CT or CAT Scan, Electron Beam Tomography provides images of a beating heart up to 10 times faster and clearer than other conventional scanners. The dramatic capabilities of this spectacular technology should provide an extraordinary investment opportunity for those establishing state-of-the-art outpatient clinics, in order to provide the EBT body scan procedures to health conscious Americans. Projected 10-year return of 916%. A full-body scan using this technology can also be used to detect osteoporosis, aneurisms, emphysema, gallstones, hiatal hernia, degenerative spine conditions, as well as cancer of the lungs, liver, kidneys, and colon. Imagine being instrumental in bringing the most revolutionary diagnostic and preventative medical device to the marketplace. $15K minimum investment required. Serious inquiries only. Click here to receive your free video and full business proposal machine.jpg
Re: another reason to avoid airbus: surveillance
At 05:06 PM 5/10/2002 -0400, you wrote: Black-and-white images captured by the cameras will be fed to screens in the cockpit via the cables used to distribute pictures to seat-back video screens. Although only some lights will have cameras, potential terrorists will not know which ones. Huh. Easily defeated. The images won't be watched, as the cabin crew have better things to do. By the time the plane has been taken, the best they will know is that it is going on. Then, out comes the big roll of duck tape and slap slap slap, all lights are out. Special points for opaque tape. A less observable jamming means is to just bring a key chain penlight aboard and aim it at the light. If the light has a suction cup mount it can be mounted to the arm of the chair. For more clandestine use a two position switch on the light could activate an IR laser/led, shining through the same lens, for light/dark cabin situations. steve
Perry Metzger's cryptography list down?
There haven't been any messages on Perry Metzger's cryptography list ([EMAIL PROTECTED]) for almost three weeks. Is he still alive? Before the list went silent there was some good debate about the Bernstein factoring machine, with commentary by Nicko van Someren, who had been on the panel at FC which claimed that the machine could be practical. (Since then some of the claims have been partially withdrawn.) Several questions had been raised, such as why Nicko's estimates only included the matrix solving portion, and whether the assumed size of the matrix was reasonable. It would be good to get the list up and running so the debate could continue. Could someone who knows Perry contact him and find out what is happening?
URGENT NOTICE: Feds Lower Interest Rates Again ...
Title: Mortgage companies make you wait Mortgage companies make you wait...They Demand to Interview you...They Intimidate you...They Humiliate you...And All of That is While They Decide If They Even Want to Do Business With You... We Turn the Tables on Them...Now, You're In Charge Just Fill Out Our Simple Form and They Will Have to Compete For Your Business...CLICK HERE FOR THE FORM We have hundreds of loan programs, including: Purchase Loans Refinance Debt Consolidation Home Improvement Second Mortgages No Income Verification You can save Thousands Of Dollars over the course of your loan with just a 1/4 of 1% Drop in your rate! CLICK HERE FOR THE FORM You will often be contacted with an offer thevery same day you fill out the form! Remove 9615Pl5
Re: another reason to avoid airbus: surveillance
On Friday, May 10, 2002, at 05:32 PM, Steve Schear wrote: At 05:06 PM 5/10/2002 -0400, you wrote: Black-and-white images captured by the cameras will be fed to screens in the cockpit via the cables used to distribute pictures to seat-back video screens. Although only some lights will have cameras, potential terrorists will not know which ones. Huh. Easily defeated. The images won't be watched, as the cabin crew have better things to do. By the time the plane has been taken, the best they will know is that it is going on. Then, out comes the big roll of duck tape and slap slap slap, all lights are out. Special points for opaque tape. A less observable jamming means is to just bring a key chain penlight aboard and aim it at the light. If the light has a suction cup mount it can be mounted to the arm of the chair. For more clandestine use a two position switch on the light could activate an IR laser/led, shining through the same lens, for light/dark cabin situations. Jamming the camera or overloading it is itself a tell. Knowing the exact location and geometry of a camera lens makes it feasible to spoof the scene by placing a fixed image below the camera. Unless the camera has a zoom, which is unlikely, a simple affine transformation of a real lap is enough. Make it of a lap covered with a blanket and then even the lack of movement will not be a tell. --Tim May They played all kinds of games, kept the House in session all night, and it was a very complicated bill. Maybe a handful of staffers actually read it, but the bill definitely was not available to members before the vote. --Rep. Ron Paul, TX, on how few Congresscritters saw the USA-PATRIOT Bill before voting overwhelmingly to impose a police state
Sexy Lingerie sizes 10-28
http://www.stephanna.com Our collection for the curvaceous woman offers a beautiful selection of gowns, teddies, corsets, bras, panties and accessories. Shop online at http://www.stephanna.com and receive 10% off your first order. Code: 897568 If you would like to be removed from our mailing list, just email us back, type remove in the subject line, and we will remove you from our database. Thank You.
Re: another reason to avoid airbus: surveillance
At 06:59 PM 5/10/2002 -0700, you wrote: On Friday, May 10, 2002, at 05:32 PM, Steve Schear wrote: At 05:06 PM 5/10/2002 -0400, you wrote: Black-and-white images captured by the cameras will be fed to screens in the cockpit via the cables used to distribute pictures to seat-back video screens. Although only some lights will have cameras, potential terrorists will not know which ones. Huh. Easily defeated. The images won't be watched, as the cabin crew have better things to do. By the time the plane has been taken, the best they will know is that it is going on. Then, out comes the big roll of duck tape and slap slap slap, all lights are out. Special points for opaque tape. A less observable jamming means is to just bring a key chain penlight aboard and aim it at the light. If the light has a suction cup mount it can be mounted to the arm of the chair. For more clandestine use a two position switch on the light could activate an IR laser/led, shining through the same lens, for light/dark cabin situations. Jamming the camera or overloading it is itself a tell. Depends on the overload failure mode. Many SS camera will simply appear to be full white/black on overload. Same as a malfunction. Knowing the exact location and geometry of a camera lens makes it feasible to spoof the scene by placing a fixed image below the camera. Unless the camera has a zoom, which is unlikely, a simple affine transformation of a real lap is enough. Make it of a lap covered with a blanket and then even the lack of movement will not be a tell. I can the MI music playing in the background already. steve
CNN.com - Consumer groups protest forced spying - May 10, 2002 (Replay TV) (fwd)
http://www.cnn.com/2002/TECH/industry/05/10/spying.protest.idg/index.html -- The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
CNN.com - Convicted terrorist sues U.S. attorney general - May 10, 2002 (fwd)
http://www.cnn.com/2002/LAW/05/10/embassy.bomber/index.html -- The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
The Register - Usenet death penalty imposed on blueyonder (fwd)
http://theregister.co.uk/content/6/25242.html -- The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
The Register - UK business to embrace electronic filing - by law (e-business) (fwd)
http://theregister.co.uk/content/6/25240.html -- The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
cnn.com/2002
http://www.cnn.com/2002/SHOWBIZ/Movies/05/10/in.hop.tribeca/index.html The law is applied philosophy and a philosphical system is only as valid as its first principles. James Patrick Kelly - Wildlife [EMAIL PROTECTED] www.ssz.com [EMAIL PROTECTED] www.open-forge.org
Re: another reason to avoid airbus: surveillance
On Friday 10 May 2002 07:32 pm, Steve Schear wrote: A less observable jamming means is to just bring a key chain penlight aboard and aim it at the light. If the light has a suction cup mount it can be mounted to the arm of the chair. For more clandestine use a two position switch on the light could activate an IR laser/led, shining through the same lens, for light/dark cabin situations. steve You mean a couple of these? http://www.photonlight.com/index2.html (They even make an infrared one too!) Damn! Should have kept my mouth shut. Now I guess I'll have to leave them at home with my Leatherman Micra and my nail clippers :) -- Neil Johnson, N0SFH http://www.iowatelecom.net/~njohnsn http://www.njohnsn.com/ PGP key available on request.
Virus discarded
We received a message claiming to be from you which contained a virus according to File::Scan v0.25, a Perl module from CPAN at http://www.cpan.org/authors/id/H/HD/HDIAS This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please visit http://www.mcafee.com or another virus software company's website. Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: A special humour game Virus : W32/Klez.gen@MM Original headers: Received: from waste.minder.net (daemon@waste [66.92.53.73]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g49NjNr54617 for [EMAIL PROTECTED]; Thu, 9 May 2002 19:45:23 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by waste.minder.net (8.11.6/8.11.6) id g49NjLx05314 for [EMAIL PROTECTED]; Thu, 9 May 2002 19:45:21 -0400 Received: from einstein.ssz.com (cpunks@[207.200.56.4]) by waste.minder.net (8.11.6/8.11.6) with ESMTP id g49NiwQ05124 for [EMAIL PROTECTED]; Thu, 9 May 2002 19:44:58 -0400 Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id SAA10374 for [EMAIL PROTECTED]; Thu, 9 May 2002 18:57:41 -0500 Received: from traven.uol.com.br (traven.uol.com.br [200.231.206.184]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id SAA10369 for [EMAIL PROTECTED]; Thu, 9 May 2002 18:57:21 -0500 Received: from Xxhlnp ([200.230.129.98]) by traven.uol.com.br (8.9.1/8.9.1) with SMTP id UAA29146 for [EMAIL PROTECTED]; Thu, 9 May 2002 20:32:33 -0300 (BRT) Date: Thu, 9 May 2002 20:32:33 -0300 (BRT) Message-Id: [EMAIL PROTECTED] From: uol [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: A special humour game MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=JPmf7Lt79057NKZ5O9H9M2019
Virus discarded
We received a message claiming to be from you which contained a virus according to File::Scan v0.25, a Perl module from CPAN at http://www.cpan.org/authors/id/H/HD/HDIAS This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please visit http://www.mcafee.com or another virus software company's website. Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: Undeliverable mail--and tips about other films. I will gladly post Virus : W32/Klez.gen@MM Original headers: Received: from waste.minder.net (daemon@waste [66.92.53.73]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g4ANZtr40547 for [EMAIL PROTECTED]; Fri, 10 May 2002 19:35:56 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by waste.minder.net (8.11.6/8.11.6) id g4ANZsI29205 for [EMAIL PROTECTED]; Fri, 10 May 2002 19:35:54 -0400 Received: from einstein.ssz.com (cpunks@[207.200.56.4]) by waste.minder.net (8.11.6/8.11.6) with ESMTP id g4ANZSQ29174 for [EMAIL PROTECTED]; Fri, 10 May 2002 19:35:28 -0400 Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id SAA20705 for [EMAIL PROTECTED]; Fri, 10 May 2002 18:48:27 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id SAA20700 for cypherpunks-outgoing; Fri, 10 May 2002 18:48:22 -0500 Received: from avocet.prod.itd.earthlink.net (avocet.mail.pas.earthlink.net [207.217.120.50]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id SAA20695 for [EMAIL PROTECTED]; Fri, 10 May 2002 18:48:12 -0500 Received: from dialup-63.214.126.106.dial1.boston1.level3.net ([63.214.126.106] helo=Xxpd) by avocet.prod.itd.earthlink.net with smtp (Exim 3.33 #2) id 176JuE-0001dX-00 for [EMAIL PROTECTED]; Fri, 10 May 2002 16:34:35 -0700 From: postmaster [EMAIL PROTECTED] To: [EMAIL PROTECTED] Old-Subject: CDR: Undeliverable mail--and tips about other films. I will gladly post MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=N08GpGVM34hfIU24u74U4177V0E770 Message-Id: [EMAIL PROTECTED] Date: Fri, 10 May 2002 16:34:35 -0700 Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish Subject: Undeliverable mail--and tips about other films. I will gladly post
Virus discarded
We received a message claiming to be from you which contained a virus according to File::Scan v0.25, a Perl module from CPAN at http://www.cpan.org/authors/id/H/HD/HDIAS This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please visit http://www.mcafee.com or another virus software company's website. Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: NATURALSIZEFLAG Virus : W32/Klez.gen@MM Original headers: Received: from waste.minder.net (daemon@waste [66.92.53.73]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g49IPBr11931 for [EMAIL PROTECTED]; Thu, 9 May 2002 14:25:11 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by waste.minder.net (8.11.6/8.11.6) id g49IPAC21737 for [EMAIL PROTECTED]; Thu, 9 May 2002 14:25:10 -0400 Received: from locust.minder.net (locust.minder.net [66.92.53.74]) by waste.minder.net (8.11.6/8.11.6) with ESMTP id g49IOoQ21524 for [EMAIL PROTECTED]; Thu, 9 May 2002 14:24:50 -0400 Received: from einstein.ssz.com (cpunks@[207.200.56.4]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g49IN9r11604 for [EMAIL PROTECTED]; Thu, 9 May 2002 14:23:10 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id NAA06215 for [EMAIL PROTECTED]; Thu, 9 May 2002 13:35:48 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id NAA06205 for cypherpunks-outgoing; Thu, 9 May 2002 13:34:25 -0500 Received: from blizzard.rdven.lv (blizzard.rdven.lv [195.114.37.2]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id NAA06194 for [EMAIL PROTECTED]; Thu, 9 May 2002 13:32:51 -0500 Received: from mail.seastar.lv (mail.seastar.lv [195.114.37.133]) by blizzard.rdven.lv (8.8.8+Sun/8.8.8) with SMTP id VAA15499 for [EMAIL PROTECTED]; Thu, 9 May 2002 21:21:08 +0300 (EET DST) Received: from Tvwvculv (unverified [195.114.37.150]) by mail.seastar.lv (EMWAC SMTPRS 0.83) with SMTP id [EMAIL PROTECTED]; Thu, 09 May 2002 21:00:07 +0300 Date: Thu, 09 May 2002 21:00:07 +0300 Message-ID: [EMAIL PROTECTED] From: you [EMAIL PROTECTED] To: [EMAIL PROTECTED] Old-Subject: CDR: NATURALSIZEFLAG MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=PWG2K332lu358Xt78gwNp56bPA5U Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish Subject: NATURALSIZEFLAG
Virus discarded
We received a message claiming to be from you which contained a virus according to File::Scan v0.25, a Perl module from CPAN at http://www.cpan.org/authors/id/H/HD/HDIAS This message was not delivered to the intended recipient, it has been discarded. For information on removing viruses from your computer, please visit http://www.mcafee.com or another virus software company's website. Postmaster Sender : [EMAIL PROTECTED] Recipient : [EMAIL PROTECTED] Message-Id : [EMAIL PROTECTED] Subject: A funny game Virus : W32/Klez.gen@MM Original headers: Received: from waste.minder.net (daemon@waste [66.92.53.73]) by locust.minder.net (8.11.6/8.11.6) with ESMTP id g4A5XIr72485 for [EMAIL PROTECTED]; Fri, 10 May 2002 01:33:18 -0400 (EDT) (envelope-from [EMAIL PROTECTED]) Received: (from cpunks@localhost) by waste.minder.net (8.11.6/8.11.6) id g4A5XHQ12126 for [EMAIL PROTECTED]; Fri, 10 May 2002 01:33:17 -0400 Received: from einstein.ssz.com (cpunks@[207.200.56.4]) by waste.minder.net (8.11.6/8.11.6) with ESMTP id g4A5WjQ12026 for [EMAIL PROTECTED]; Fri, 10 May 2002 01:32:45 -0400 Received: (from cpunks@localhost) by einstein.ssz.com (8.8.8/8.8.8) id AAA13261 for [EMAIL PROTECTED]; Fri, 10 May 2002 00:45:33 -0500 Received: (from mdom@localhost) by einstein.ssz.com (8.8.8/8.8.8) id AAA13201 for cypherpunks-outgoing; Fri, 10 May 2002 00:44:10 -0500 Received: from maynard.mail.mindspring.net (maynard.mail.mindspring.net [207.69.200.243]) by einstein.ssz.com (8.8.8/8.8.8) with ESMTP id AAA13171 for [EMAIL PROTECTED]; Fri, 10 May 2002 00:43:56 -0500 Received: from pool-209-128-145-71.russ.ipa.net ([209.128.145.71] helo=Bkmrotkcb) by maynard.mail.mindspring.net with smtp (Exim 3.33 #1) id 1762z5-0008It-00 for [EMAIL PROTECTED]; Fri, 10 May 2002 01:30:28 -0400 From: jocelyn [EMAIL PROTECTED] To: [EMAIL PROTECTED] Old-Subject: CDR: A funny game MIME-Version: 1.0 Content-Type: multipart/alternative; boundary=F81WZQ335A316199v34PSEg16T23 Message-Id: [EMAIL PROTECTED] Date: Fri, 10 May 2002 01:30:28 -0400 Sender: [EMAIL PROTECTED] Precedence: bulk Reply-To: [EMAIL PROTECTED] X-Mailing-List: [EMAIL PROTECTED] X-Unsubscription-Info: http://einstein.ssz.com/cdr X-List-Admin: [EMAIL PROTECTED] X-Loop: ssz.com X-Acceptable-Languages: English, Russian, German, French, Spanish Subject: A funny game
Re: UK e-money legal, sort-of
--- begin forwarded text Status: U User-Agent: Microsoft-Entourage/10.0.0.1331 Date: Fri, 10 May 2002 12:34:58 +0100 Subject: Re: UK e-money legal, sort-of From: David G.W. Birch [EMAIL PROTECTED] To: Digital Bearer Settlement List [EMAIL PROTECTED] Cc: Bob Hettinga [EMAIL PROTECTED] R. A. Hettinga e-said: I can't remember if this came up (maybe in a post I deleted). Forwarded without permission from the UKcrypto list. It points to http://www.theregister.co.uk/content/23/25070.html - the nub of the article is: anybody that wishes to issue electronic money can do so as long as they satisfy a number of core criteria specified by the Financial Services [snip] The detailed FSA presentation is on the Digital Money Forum web site at www.digitalmoneyforum.com Regards, Dave Birch. ... My own opinion (I think!) given solely in my capacity as ... ... an interested member of the general public ... ...... ... mail(at)birches.org . http://www.davebirch.org/ ... --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Edinburgh Financial Cryptography Engineering 2002 - CFP
--- begin forwarded text Status: U Date: Fri, 10 May 2002 22:31:51 +0200 To: [EMAIL PROTECTED], [EMAIL PROTECTED], e$@vmeng.com, [EMAIL PROTECTED] From: Fearghas McKay [EMAIL PROTECTED] Subject: Edinburgh Financial Cryptography Engineering 2002 - CFP Sender: [EMAIL PROTECTED] The Third Edinburgh Financial Cryptography Engineering Conference 28-29 June, 2002 The Signet Library Parliament Square Edinburgh, Scotland C A L L F O R P R E S E N T A T I O N S Edinburgh is again host to the international *engineering* conference on Financial Cryptography. Individuals and companies active in the field are invited to present and especially to demonstrate Running Code that pushes forward the state of the art. STATEMENT OF INTENT In spite of the excesses and tragedies of the Great Dot Com era, we have come to the realization that the Internet, Commerce, and Technology are inextricably related. We are therefore gathered together to study, as a community, the application of Cryptograpy and Information Security to the world of Finance. For it is Finance that drives Commerce, and Commerce, in the modern era, is based on the 'net. This is a technical, practical meet. Presentations of demonstrable technology in the field of Financial Cryptography are invited. As this is a practical conference, we are hoping to accept every demonstrator. THE RULES OF ENGAGEMENT This conference is about implementations. Presentations are required to demonstrate working code within the first five minutes. Note that we are delighted to accept proposals from work-in-progress projects. If your demo crashes while honorably attempting to execute, the crowd will still love you. THE VENUE Our Venue is the Upper Library, within the Signet Library, which is a listed building housing the Society of Writers to Her Majesty's Signet. This exclusive conference venue is located in the centre of Edinburgh, within the Royal Mile. ADMINISTRATION Included in the conference admission will be breakfast, lunch and tea coffee breaks. Also included will be the conference dinner in a local Edinburgh establishment. The conference administration will block-book a convenient hotel in the centre of town. Details to be advised. NEXT STEPS FOR PRESENTERS 1. Save the dates 28/29 June 2002, Friday and Saturday on your calendar. It is good to plan on a few extra days, and especially, leaving on the day after, Sunday, will help to get the best fares. 2. Prepare your presentation. Check the evolving programme at http://www.efce.net/programme.html. Propose your presentation by mailing the Programme Chair, Rodney Thayer, at [EMAIL PROTECTED] 3. Book passage to Edinburgh. Don't forget to stay a few days on either side to see the sights. Check the site for Locatives and Logistics. 4. Work on your presentation. Remember, the main rule is that you demo working code. 5. Get your budget approved / allocated / applied for. Whilst a commercial conference, accepted presenters will pay a deeply discounted fee, to be announced in a forthcoming release. For planning purposes, 200 GBP (approximately 300 dollars or 320 euros) should cover presenter's admission; the hotel should be about 100 GBP ($150 or E160) per night. Also include travel and incidentals in your budget. 6. The call for delegates -- attendees who do not present -- will by published at a later date. If there is someone in your organisation who needs to survey the state of the financially cryptographic art, they can attend as a delegate. For planning purposes, 500 GBP ($750 or E800) should cover the delegate's admission. 7. If you think the conference can benefit your organisation, consider sponsoring. Contact the Sponsorship Chair Fearghas McKay, [EMAIL PROTECTED] for more details. 8. Keep an eye on the conference web site (www.efce.net) for evolving details. EFCE2002 COMMITTEE Fearghas McKay General and Sponsorship Chair[EMAIL PROTECTED] Rodney Thayer Programme Chair [EMAIL PROTECTED] Rachel Willmer Finance Chair[EMAIL PROTECTED] SPONSORSHIP EFCE is supported by these companies active in Financial Cryptography: * Intertrader Ltd, an Edinburgh-based e-payments middleware and applications company. http://www.intertrader.com/ * Declarator.net, a supplier of Distributed Trust Appliances. http://www.declarator.net/ --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: UK e-money legal, sort-of
Sorry Adam, that wasn't me, I just quoted it from the article in the Register. So I know no more. Ken Adam Back wrote: On Thu, May 09, 2002 at 04:09:23PM +0100, Ken Brown wrote: anybody that wishes to issue electronic money can do so as long as they satisfy a number of core criteria specified by the Financial Services Authority (FSA), without having to first obtain a banking license. In essence this means that as long as the issuers of the e-money can meet the capital requirements of one million Euros or 2 percent of the e-money to be issued, they are free to do so. Do you know is that minimum or maximum of those two figures? ie if you have 2% of capital you issue is that enough or does it have to be larger of those. GBP 600K (USD 900K) is still a lot of money for a small scale operation. If it were the former it might be more plausible that someone might set something up as a hobby operation. The tricky part as ever will be putting money into the system if it's anonymous ecash, to limit fraud. Interfacing anonymous to non-anonymous transaction systems is a problem. The convenient non-anonymous transactions systems (credit cards, debit cards) typically are quite vulnerable to fraud and have weak security systems. There is a limit of one thousand pounds sterling on the maximum 'purse' value; the e-money must be redeemable within five days and the currency must be usable for at least one year. What does the redeemable within five days mean -- that this is the maximum processing time for in-transfers or for out-transfers? Adam -- http://www.cypherspace.org/adam/
Re: attack on rfc3211 mode (Re: disk encryption modes)
Adam Back [EMAIL PROTECTED] writes: I can see that, but the security of CBC MAC relies on the secrecy of the ciphertexts leading up to the last block. In the case of the mode you describe in RFC3211, the ciphertexts are not revealed directly but they are protected under a mode which has the same splicing attack. The splicing attack on CBC MAC with leading ciphertext works through CBC encryption, here's how that works: Right. One minor point, the IV is never zero, for disk encryption it's a cryptographic transform of the sector number, for PWRI it's supplied by the CMS algorithm parameter (this doesn't affect the attack). I would have thought this would be considered a 'break' of a non-malleable cipher mode as discussed for disk encryption where each bit of plaintext depends on each bit of ciphertext as would be the case with a secure cipher matching Mercy's design goals (a block cipher used in ECB mode with a different key per block). Yup. Actually the no-stored-IV encryption was never designed to be a non- malleable cipher mode, the design goal was to allow encryption-with-IV without having to explicitly store an IV. For PWRI it has the additional nice feature of avoiding collisions when you use a 64-bit block cipher, which is probably going to be the case for some time to come even with AES around. It was only after all that that I noticed that the first pass was effectively a CBC-MAC, but it didn't seem important enough to mention it in the RFC since it wasn't an essential property (good thing I didn't :-). With a disk mode, unlike with RFC3211 pasword based encryption for CMS there is no place to store the structure inside the plaintext which may to some extent defend against this attack. Even with PWRI you get at most ~32 bits of protection, and can bypass even that if you encrypt 5 or more 64-bit blocks and mess up the second block, since the garble will propagate to at most 4 of the 5 blocks. The 32-bit limit was deliberate, I was worried about dictionary attacks above all else (in fact the first version of the wrap was a bit too paranoid in that it had no redundancy at all, which unfortunately meant that it wasn't possible to catch incorrect passwords. User complaints lead to the addition of the 24-bit check value which is enough to catch virtually all mistyped passwords but not enough to provide more than a small reduction in the number of guesses necessary for an attacker. The length byte is there so an attacker can't perform an iterative attack where they change the algorithm ID for the wrapped key to 40-bit RC4 and brute-force it, then 56-bit DES and brute-force the 16-bit difference, then 80- bit Skipjack, 112-bit two-key 3DES, and finally 128-bit AES. There was another key wrap design where this was possible). Digressing from the original disk-sector-encryption, I'd be interested in some debate on the requirements for password-based key wrapping. The design goals I used were: 1. Resistance to dictionary/password-guessing attacks above all else. 2. No need to use additional algorithms like hash algorithms (see the RFC for the rationale, to save me typing it all in again). The reason for 1. is that provided you use a secure cipher the best approach for an attacker is going to be a dictionary attack or similar attack on the password used to wrap the key. Since the wrapping key is going to be used to protect things like long-term private keys, this is an extremely high-value item. Note that the immunity to key-guessing requirement is mutually exclusive with modification-detection, since (for example) storing a SHA-1 hash would allow you to immediately verify whether you'd found the password/key. This is the exact problem which PKCS #12 has, you don't need to attack the key wrap since the MAC on the wrapped data is a much easier target. There's another key wrap which stores a full SHA-1 hash alongside the wrapped key (to protect against some problems present in an earlier version of the same key wrap mechanism, which fell to fairly trivial attacks). This is great for integrity protection, but terrible for security, since it allows you to verify with pretty much 100% accuracy whether you've guessed the password.I also looked at some sort of OAEP-like wrapping (or, more generally, a Feistel-like construct of the kind used in OAEP), but it seemed a bit ad-hoc when used with symmetric key wrap rather than RSA. Does anyone have any thoughts on symmetric key wrap, and specifically the differences between high-value and low-value (ephemeral) key wrap requirements? General rant: It's amazing that there doesn't seem to be any published research on such a fundamental crypto mechanism, with the result that everyone has to invent their own way of doing it, usually badly. We don't even have a decent threat model for this, my attempt at one for password-based key wrap may or may not be appropriate (well, I hope it's more or less right), but it's going to be
re: Australian government proposed 'terror laws'
Australia needs your help! The Howard government is using the `war on terrorism' as justification to introduce so called `Asian Values' (a euphonism used by Mahathir to explain his governments removal of rights from the Malaysian people) into Australia. Ha, ha! You know the old saying, If you have a gun, your're a citizen. Without it you're a subject. I guess you now know how it feels to be a subject of an increasingly oppressive regime. Sorry, but I won't shed a tear for the foolish. My suggestion: You made your bed. Time to take a nap. ks
Re: Australian government proposed 'terror laws'
On Sat, May 11, 2002 at 04:35:29AM +1000, Julian Assange wrote: Australia needs your help! The Howard government is using the `war on terrorism' as justification to introduce so called `Asian Values' (a euphonism used by Mahathir to explain his governments removal of rights from the Malaysian people) into Australia. Jesus, what a horrible fuck job. But we don't need N copies of this mail on the cpunks list. One will do. I would not be supriseed if the USG has something to do with this, they seem to use Australia as the repressive legislation beta test site. Hmm. First they took all the guns, now a few year later, this. Eric
Re: attack on rfc3211 mode (Re: disk encryption modes)
On Sat, May 11, 2002 at 04:01:11AM +1200, Peter Gutmann wrote: | General rant: It's amazing that there doesn't seem to be any published research | on such a fundamental crypto mechanism, with the result that everyone has to | invent their own way of doing it, usually badly. We don't even have a decent | threat model for this, my attempt at one for password-based key wrap may or | may not be appropriate (well, I hope it's more or less right), but it's going | to be rather different than for a situation where you have an ephemeral | symmetric key rather than a fixed, high-value key wrapping another key. The | same problem exists for things like PRFs, we now have PKCS #5v2, but before | that everyone had to invent their own PRF for lack of anything useful, with | the result that every single protocol which needs a PRF has its own, | incompatible, often little-analysed one. | | More specific rant: Looking at the security standards and protocols deployed in | the last decade or so, you'd be forgiven for thinking that the only crypto | research done in the last 10 years (beyond basic crypto algorithms) was | STS/SPEKE and HMAC. There seems to be this vast gulf between what crypto | researchers are working on and what practitioners actually need, so while | conferences are full of papers on group key management and anonymous voting | schemes and whatnot, people working on real-world implementations have to | home-brew their own mechanisms because there's nothing else available. The | RFC 3211 wrap is actually parameterised so you can slip in something better | when it becomes available, but I can't see that ever happening because | researchers are too busy cranking out yet another secure multiparty | distributed computation paper that nobody except other researchers will ever | read. | | (Did I miss offending anyone? :-). The voting folks? ;) Adam -- It is seldom that liberty of any kind is lost all at once. -Hume
Re: another reason to avoid airbus: surveillance
At 05:06 PM 5/10/2002 -0400, you wrote: Black-and-white images captured by the cameras will be fed to screens in the cockpit via the cables used to distribute pictures to seat-back video screens. Although only some lights will have cameras, potential terrorists will not know which ones. Huh. Easily defeated. The images won't be watched, as the cabin crew have better things to do. By the time the plane has been taken, the best they will know is that it is going on. Then, out comes the big roll of duck tape and slap slap slap, all lights are out. Special points for opaque tape. A less observable jamming means is to just bring a key chain penlight aboard and aim it at the light. If the light has a suction cup mount it can be mounted to the arm of the chair. For more clandestine use a two position switch on the light could activate an IR laser/led, shining through the same lens, for light/dark cabin situations. steve
Re: another reason to avoid airbus: surveillance
On Friday, May 10, 2002, at 05:32 PM, Steve Schear wrote: At 05:06 PM 5/10/2002 -0400, you wrote: Black-and-white images captured by the cameras will be fed to screens in the cockpit via the cables used to distribute pictures to seat-back video screens. Although only some lights will have cameras, potential terrorists will not know which ones. Huh. Easily defeated. The images won't be watched, as the cabin crew have better things to do. By the time the plane has been taken, the best they will know is that it is going on. Then, out comes the big roll of duck tape and slap slap slap, all lights are out. Special points for opaque tape. A less observable jamming means is to just bring a key chain penlight aboard and aim it at the light. If the light has a suction cup mount it can be mounted to the arm of the chair. For more clandestine use a two position switch on the light could activate an IR laser/led, shining through the same lens, for light/dark cabin situations. Jamming the camera or overloading it is itself a tell. Knowing the exact location and geometry of a camera lens makes it feasible to spoof the scene by placing a fixed image below the camera. Unless the camera has a zoom, which is unlikely, a simple affine transformation of a real lap is enough. Make it of a lap covered with a blanket and then even the lack of movement will not be a tell. --Tim May They played all kinds of games, kept the House in session all night, and it was a very complicated bill. Maybe a handful of staffers actually read it, but the bill definitely was not available to members before the vote. --Rep. Ron Paul, TX, on how few Congresscritters saw the USA-PATRIOT Bill before voting overwhelmingly to impose a police state