ADV: Lowest life insurance rates available! ypayr
Lowest rates available for term life insurance! Take a moment and fill out our online form to see the low rate you qualify for. Save up to 70% from regular rates! Smokers accepted! http://www.takemetothesavings.com/termlife/ Representing quality nationwide carriers. Act now! --- To unsubscribe, go to: http://www.takemetothesavings.com/stopthemailplease/ Please allow 48-72 hours for removal.
Overcoming the potential downside of TCPA
Lately on both of these lists there has been quite some discussion about TCPA and Palladium, the good, the bad, the ugly, and the anonymous. :) However there is something that is very much worth noting, at least about TCPA. There is nothing stopping a virtualized version being created. There is nothing that stops say VMWare from synthesizing a system view that includes a virtual TCPA component. This makes it possible to (if desired) remove all cryptographic protection. Of course such a software would need to be sold as a development tool but we all know what would happen. Tools like VMWare have been developed by others, and as I recall didn't take all that long to do. As such they can be anonymously distributed, and can almost certainly be stored entirely on a boot CD, using the floppy drive to store the keys (although floppy drives are no longer a cool thing to have in a system), boot from the CD, it runs a small kernel that virtualizes and allows debugging of the TPM/TSS which allows the viewing, copying and replacement of private keys on demand. Of course this is likely to quickly become illegal, or may already, but that doesn't stop the possibility of creating such a system. For details on how to create this virtualized TCPA please refer to the TCPA spec. Joe
[±¤°í]Á¶ÈÀ¯ÀÇ ÀÌ°ÍÀÌ ¹Ì±¹¿µ¾î´Ù
Title: Untitled Document Á¶ÈÀ¯ÀÇ ¹Ì±¹¿µ¾î ÃÊ*Ư*°¡*ÀÌ*º¥*Æ® ½Ç»ýÈ°¿¡ °¡Àå °¡±õ°Ô ¹Ì±¹ ÇöÁö¿µ¾î¸¦ ¹è¿ï ¼ö ÀÖ´Â Á¶ÈÀ¯ÀÇ ¹Ì±¹¿µ¾î¸¦ º¸´Ù Àú·ÅÇÑ °¡°ÝÀ¸·Î Á¦°øÇϸç Àü ±¸¸Å°í°´²² ¹«ºñÀ×±Û¸®½¬¸¦ »çÀºÇ°À¸·Î µå¸³´Ï´Ù. Á¶ÈÀ¯ÀÇ ¹Ì±¹¿µ¾î¡»´Â 100¸¸ºÎ ÀÌ»óÀÇ º£½ºÆ®¼¿·¯ÀÎ ¡¸ÀÌ°ÍÀÌ ¹Ì±¹¿µ¾î´Ù¡¹ÀÇ ÀúÀÚ Á¶ÈÀ¯ ¹Ú»ç°¡ ¹Ì±¹¿¡¼ 25³â ÀÌ»ó °ÅÁÖÇϸç üÇèÇÑ ÇöÁö ¿µ¾î¸¦ ¾Ë±â ½±°Ô Çؼ³ÇÏ°í ÀÖ´Â ±³ÀçÀÔ´Ï´Ù. ¡ºÁ¶ÈÀ¯ÀÇ ¹Ì±¹¿µ¾î¡»¿¡¼´Â Çѱ¹ÀÎÀÌ ¿ø¾î¹Î°ú ´ëȸ¦ ¿øÈ°ÇÏ°Ô ³ª´©Áö ¸øÇÏ´Â ¿øÀÎÀ» Áø´ÜÇÏ°í, ½Ç»ýÈ°¿¡¼ ÈçÈ÷ ³ªÅ¸³ª´Â ¹®Á¦Á¡µéÀ» ¸ð¾Æ ÀÌÇØÇϱ⠽±°Ô ¿¡¼¼À̽ÄÀ¸·Î Ç®¾î³ª°¨À¸·Î½á ½Ç·ÂÇâ»ó¿¡ µµ¿òÀÌ µÇ´Â È¿°úÀûÀÎ ÇнÀ¹æ¹ýÀ» Á¦½ÃÇÏ¿© µå¸³´Ï´Ù. *Á¶ÈÀ¯ÀÇ ¹Ì±¹¿µ¾î(CD 10Àå) : Á¤°¡ 120,000¿ø--- ÆǸŰ¡ 99,000¿ø * Á¶ÈÀ¯ÀÇ ¹Ì±¹¿µ¾î CD 3Àå(Ã¥10±ÇºÐ·®) º» ÇÁ·Î±×·¥Àº ÃÑ 550°³ÀÇ ´Ü¿øÀ¸·Î °¢ ´Ü¿ø¿¡´Â ¿µ¹® ´ÙÀ̾ó·Î±×, ÇÑ±Û ´ÙÀ̾ó·Î±×, ¿µ¾îµè±â·Î ÀÌ·ç¾îÁ® ÀÖÀ¸¸ç ½Ç»ýÈ°¿¡¼ ÈçÈ÷ ¹üÇÏ´Â Äá±Û¸®½¬, ½Ç¼ö´ã, È¥µ¿Çϱ⠽¬¿î ´Ü¾îµé ±×¸®°í ½Ç»ýÈ°¿¡ À¯¿ëÇÑ Ç¥ÇöµéÀ» ¸ð¾Æ ¿¡¼¼À̽ÄÀ¸·Î Çؼ³ÇÏ°í ÀÖ´Â ±³ÀçÀÔ´Ï ´Ù. * Á¶ÈÀ¯ÀÇ ¹Ì±¹¿µ¾î VOD CD 3Àå(Å×ÀÙ12°³ºÐ·®) º» ÇÁ·Î±×·¥Àº ÃÑ 81°³ÀÇ ´Ü¿øÀ¸·Î °¢ ´Ü¿ø¿¡´Â ºñµð¿À, ¿µ¹® ´ÙÀ̾ó·Î±×, ÇÑ±Û ´ÙÀÌ ¾ó ·Î±×·Î ÀÌ·ç¾îÁ® ÀÖ½À´Ï´Ù. º» ÇÁ·Î±×·¥Àº MBC¹®È¹æ¼ÛÀÇ TV¿Í RadioÀÇ »ýÈ°¿µ¾î ÇÁ·Î±×·¥ ±³Àç·Î äÅõǾî 4³â°£¿¡ °ÉÃÄ ¹æ¼ÛµÇ¾ú´ø ºñµð¿À ÀÚ·á Áß Áß¿äÇÑ ºÎºÐµé¸¸À» µû·Î ÆíÁýÇÏ¿© Á¦ÀÛÇÏ¿´½À´Ï´Ù. * Á¶ÈÀ¯ÀÇ ¹Ì±¹¿µ¾î MP3 CD 4Àå(Å×ÀÙ80°³ºÐ·®) Á¶ÈÀ¯ÀÇ ¹Ì±¹¿µ¾î AUDIO CD·ÒÀº ÃÑ 550°³ÀÇ ´Ü¿øÀ¸·Î ±¸¼ºµÈ Á¶ÈÀ¯ÀÇ ¹Ì±¹¿µ¾îÀÇ Àüü³»¿ëÀ» MP3ÆÄÀÏ ¹æ½ÄÀ¸·Î ³ìÀ½ÇÏ¿© ¾ðÁ¦ ¾îµð¼³ª ¹Ýº¹ ûÃëÇÒ ¼ö ÀÖµµ·Ï Á¦ÀÛ ÇÏ¿´½À´Ï´Ù. *¹«·áÁõÁ¤ : ¹«ºñÀ×±Û¸®½¬(A or BÁß ÅÃ1 )--½ÃÁß°¡ 48,000¿ø * CCFE¹«ºñÀ×±Û¸®½¬ ¿µÈ´Â? * ¼¼°èÃÖ°íÀÇ °ÉÀÛ ¸íȸ¸À» ¾ö¼±ÇÏ¿© ¼ÒÀå°¡Ä¡°¡ ³ô½À´Ï´Ù * ÃÖ°íÀÇ ÈÁú°ú À½ÇâÀ¸·Î »ý»ýÇÑÀå¸éÀ» ¿¬ÃâÇÕ´Ï´Ù * ÃÖ÷´Ü ±â¼úÀ» ÀÌ¿ëÇÏ¿© ¾îÇпëÀ¸·Î Ưº°È÷ Á¦À۵Ǿú½À´Ï´Ù * »èÁ¦³ª ÆíÁý¾øÀÌ ¿À¸®Áö³¯ Çʸ² ±×´ë·Î ´ã¾Ò½À´Ï´Ù * ¿©·¯±³À°±â°ü ¹× Á¤ºÎ·ÎºÎÅÍ ÀÎÁ¤¹ÞÀº ÃÖ»óÀÇ ¿µ¾î±³ÀçÀÔ´Ï´Ù * CCFE MOVIE ENGLISH ÇÁ·Î±×·¥ ¼ö»ó ³»¿ª ¨ç¸ÖƼ ¹Ìµð¾î ±â¼ú ´ë»ó ÀÀ¿ë S/WºÎºÐ ÃÖ¿ì¼ö»ó ¨èÁ¤º¸Åë½ÅºÎ µðÁöÅÐ ÄÁÅÙÃ÷ 2001³â 1/4ºÐ±â ´ë»ó ¨é½Å¼ÒÇÁÆ®¿þ¾î »óÇ°´ë»ó ±³À° ºÎºÐ»ó ¨êÇѱ¹ »ê¾÷ ±â¼ú Çõ½Å´ë»ó ¨ëÇÏÀÌÅ×Å© ¾î¿öµå ±â¼ú ´ë»ó ¨ìAsia Pacific ICT Awards 2001 Merit ¼ö»ó ¨í¸Å°æ µðÁöÅÐ ÄÁÅÙÃ÷ ºÎ¹® ´ë»ó:¹®È°ü±¤ºÎÀå°ü»ó ¨î½ºÆ÷Ã÷ Åõµ¥ÀÌ ¼±Á¤ ¼ÒºñÀÚ Àαâ´ë»ó ¨ïÇѱ¹±³À°ÇмúÁ¤º¸¿ø ¿ì¼ö±³À°¿ë ¼ÒÇÁÆ®¿þ¾î ÀÎÁõ A set : 26CD [º¥Çã][¸¶Áö¸· ȲÁ¦] [Å͹̳×ÀÌÅÍII] [Ŭ¸®ÇÁ Çà¾î][»çÀÌ´õ ÇϿ콺] [·ÎºóÈÊ] [ÄÚµå³×ÀÓ Äܵ¹] [¶÷º¸II] [¶ó½ºÆ® ¸ðÇÏÄ][·Î½ºÆ® ÀÎ ½ºÆäÀ̽º] B set : 25CD [´Á´ë¿Í ÇÔ²² ÃãÀ»] [Áö¿ÁÀÇ ¹¬½Ã·Ï] [¹Ù¶÷°ú ÇÔ²² »ç¶óÁö´Ù] [·Î¹Ì¿À¿Í ÁÙ¸®¿§] [·¹¿Ë] [ÅäÅ»¸®ÄÝ][ÇÏÀÌ·»´õ] [·ÕÅ°½º ±Â³ªÀÕ] [¿øÃÊÀû º»´É] [µð¾î ÇåÅÍ] ¡Ù ¹«ºñÀ×±Û¸®½¬´Â ¾¾³×ÆÄÅ©¿ÍÀÇ Á¦ÈÞ·Î Á¶ÈÀ¯ÀÇ ¹Ì±¹¿µ¾î¸¦ ±¸ÀÔÇϽô ºÐ¿¡°Ô ¹«·á·Î Á¦°øµË´Ï´Ù ¡Ù (Ãßõº¸³Ê½º) Á¦Ç°±¸ÀÔ ÈÄ ´Ù¸¥ºÐ¿¡°Ô ÃßõÇÏ½Ã¸é ¼ÒÁ¤ÀÇ »çÀºÇ°À» µå¸³´Ï´Ù. * º» ¸ÞÀÏÀº Á¤º¸Åë½ÅºÎ ±Ç°í»çÇ׿¡ ÀÇ°Å (±¤°í)ÀÓÀ» ¹àÀÔ´Ï´Ù. Çã¶ô¾øÀÌ È«º¸¸ÞÀÏÀ» º¸³»µå·Á ÁË¼Û ÇÕ´Ï´Ù. ±ÍÇÏÀÇ E-MAILÀº °Ô½ÃÆÇ µî ÀÎÅÍ³Ý »ó¿¡¼ ¾Ë°Ô µÇ¾úÀ¸¸ç, E-mailÀ» Á¦¿ÜÇÑ ¾î¶°ÇÑ Á¤º¸µµ ¾ËÁö ¸øÇÔÀ» ¹àÈü´Ï´Ù. ÇÊ¿ä¾ø´Â ¸ÞÀÏÀÏ °æ¿ì, ºÒÆíÇϽôõ¶óµµ ¹Ý¼ÛÇÏ¿© ÁÖ½Ã¸é ´õ ÀÌ»ó ¹ß¼ÛµÇÁö ¾Êµµ·Ï ÇÏ°Ú½À´Ï´Ù. This mail is designed for a Commercial use to inform a special sales event. If you don't want this type of information, Press button below and press left button on next screen will erase your email address from our email system. Thank you [¼ö½Å°ÅºÎ] ±¹Á¦±³À°Á¤º¸¼¾ÅÍ (ÓÛ) ¢Ï 02)678-0150 www.jwy.co.kr
Cleanse and purify your body.
Dear Natural Health Advocate, A lifestyle that includes taking medications of any kind, eating too much cooked food, processed/refined food, meat, dairy, and poultry causes your body to become congested with mucus. This in turn weakens the function of your digestive system, elimination organs such as the colon, liver and kidneys. Changing your diet to include foods which help cleanse your body and using herbal preparations to speed up the process, create dramatic improvement in your state of health very quickly. .I came off the Cleanse today and I am SO IMPRESSED! I could not believe the filth and slime that came out! And so MUCH of it! Where does it all come from? Amazing! S. Ward, Tucson, Arizona _ I went on a colon cleanse a couple of times. And I got just goop out of me that no one can believe that is inside a person. Everyday, a gallon of goop. Rope-like stuff and intestine-like stuff. I was amazed and I would tell my husband and he would be amazed. I wouldn't tell anyone else or they'd of thought me mad! He was working and couldn't spend the time doing what I was doing. I was enjoying it, seeing what the body holds back, holds inside itself. D.L. Lafayette, LA. ___ I did both the colon cleanse and the liver-gallbladder cleanse. To my horror I did in fact have worms! After they were gone (that took about a month) I did the liver thing. I had gall stones... huge things!! This program really works. The pain is gone in my arm and back, and I am sleeping through the night. Don't trust MD's. If someone is going to practice on me - IT WILL BE ME. Thank you for this site. J.R. ___ I just finished doing the 2 week Complete Colon Cleanse Program. I lost 14 pounds and 1 - 1/2 off of my stomach. I feel great! I would like to follow that up now by doing the Liver and Kidney cleanses. A.R. Honesdale, PA. ___ Disease is an unnatural condition... . . . but it's increasing at an alarming rate! Due to poor eating habits, it has become increasingly clear that almost every person in this country over six years old is developing serious problems in the intestinal tract, which in later years may contribute to the development of various acute, chronic and degenerative diseases. Such diseases include cancer, heart trouble and diabetes; as well as lack of energy, premature aging, poor eyesight, memory loss, a poor complexion, constipation and wrinkles. It is estimated that over 98% of disease can be contributed directly or indirectly to a compromised digestive tract. As Dr. Bernard Jensen says, It is the bowel that invariably has to be cared for first before any effective healing can take place. Low energy level? People suffer from malnutrition and autointoxication (self-poisoning), which result in disease, parasites and filth, all because of a gradual buildup of many pockets of waste that has not been eliminated. The healthy colon weighs about four pounds, an unhealthy one can weigh more than twice as much. Few people realize that the same unhealthy substances found in the colon can also abound in the stomach, duodenum and small intestine. A polluted intestinal tract... . . . means dirty blood, poor digestion and low energy. When the intestines have too much waste matter, parasites, fungus and harmful bacteria, there results a serious interference with the digestive process. Even if a person's intestinal tract were polluted with just a mild amount of this undesirable filth, he or she could have sluggish peristaltic action, which causes constipation. How does the body adjust to cooked food, processed food and refined food - dead foods? Victoria Boutenko in her book, 12 Steps to Raw Food, explains it this way: The body creates mucus and uses this mucus as a filter. All the surfaces of the digestive tract that are designed to absorb the nutrients from food become covered with mucus film that protects blood from toxins. The mucus film begins at the tongue and continues all the way through the intestines. Many people can see this mucus on their tongue. People who have a thick mucus coating on their intestines usually have white tongues as if they just ate sour cream. The body creates a little mucus, to begin with, to filter out the toxins from the dead food. The more dead food we consume, the more mucus the body produces as a protection. The more harmful the food substances are to the body, the more this mucous film builds up. As the years go by it becomes thicker and harder. Portions of this thick mucus get pushed into pockets called diverticuli as we cram through more and more dead food into the digestive tract in an effort to squeeze some nutritional value out of it. You may ask: What is the mucus made of? The human body, brilliant as always, creates the mucus from the dead food itself! This mucus covers our entire
µçÄÔÅä¼þ¹©Ó¦
̨ÖÐÊ¢´ï¼¯ÍÅ´ó½°ìÊ´¦ ÎÒ¹«Ë¾³¤ÆÚ¾ÓªÔ×°½ø¿Ú²úÆ·.ÏÖÓеçÄÔÅä¼þ.±Ê¼Ç±¾.±Ê¼Ç±¾Åä¼þ.ÊýÂëÏà»ú.ÉãÏñ»ú.ͶӰÉè ±¸. ͶӰ¸½¼þ.Æû³µ.ÊÖ»ú.¼ÒÓõçÆ÷.²Êµç.¿Õµ÷..ÓÐÒâÔÚ¸÷µØ³ÏÕ÷´úÀíÖ±ÏúÉÌ. Ϊ±£Ö¤ÐÅÓþ ʵÐлõµ½¸¶¿î. Ò²ÐíÄú¶ÔÎÒÃǵļ۸ñÖ®µÍ±íʾ»³ÒÉ,µ«ÄúÊÇ·ñÖªµÀÎÒÃÇ´ÓµçÄÔÊг¡»òÉ̵êÂò»ØÀ´µÄ²úÆ·ÊǾ ¹ý¸÷¼¶´úÀí²ã²ã¼Ó¼ÛµÄ½á¹û.Ó볧¼Ò³ö³§µÄ¼Û¸ñÓÐ×ÅÌìÈÀÖ®±ð.¶øÎÒÃǹ«Ë¾Í¨¹ýÌØÊâµÄ½ø»õÇþµÀ ͨ¹ýÍøÂçÖ±ÏúÄÜ°ÑÖмä´úÀí·ÑÓÃÈ«²¿Ìê³ý,ʵÏÖÕæÕýµÄ¿Í»§Ó빫˾˫Ӯ½á¹û. ¿¼Âǵ½ÍøÂçµÄÐÅÓÃÎÊÌâ,ÎÒÃÇËù³öÊ۵IJúÆ·¾ùʵÐлõµ½¸¶¿îµÄÔÔò.ÕâÖÖ·½Ê½Ëä»áÔö¼ÓÎÒÃÇµÄ ÔËÓª³É±¾,µ«ÎÒÃÇÏ£ÍûÒÔ³ÏÐŵķþÎñ°Ñ×Ô¼º×ö´ó×öÇ¿.ÓëÄúÁªÏµºÏ×÷ÊÂÒê. ( ÇëÎðÖ±½Ó»Ø¸´£¬ÓÐÒâÇëÀ´µçÁªÏµ.ÁªÏµÈË:ºú¿Ë ÁªÏµµç»°: 0138-59709838) µçÄÔÅä¼þ(RMB.Ôª): A:Ö÷°å: ΢ÐÇ 845Pro2-LE(Socket,i845,SDRAM,AC97Éù¿¨) 380Ôª 845Pro (Socket,i845,SDRAM,AC97Éù¿¨) 430Ôª 850Pro5 (Socket,i850,8738Éù¿¨) 520Ôª 645UITRA (Socket478,SiS645оƬ 3DDR AC97) 330Ôª K7T266Pro (SocketA,KT266,3DDR,AC97) 310Ôª K7T266Pro2-LE(SocketA,AC97,ATA100) 270Ôª K7t266Pro2(SocketA,Ö§³ÖXP,3DDR,AC97) 310Ôª 815EPT Pro-NL(Socket370,i815EP,Ö§³ÖÐÂPIII,AC97,ATA100) 270Ôª 815EP Pro-R (Socket370,i850EP,IDE RAID) 280Ôª 815EP-NL (Socket370,i815EP,AC97) 250Ôª 815ET Pro (Socket370,i815E,ÐÂPIII,i752,AC97) 340Ôª 694D Pro2-IR (Socket370,VIA694X/686B,RAID) 320Ôª 6309NL100 (Socket370,VIA694X/686B,AC97) 160Ôª 6309NL/-A (Socket370,VIA694X/686B,AC97,´´ÐÂ5880 190Ôª ÃÀ´ï KT133B (SocketA,KT133/686B,ATA100,AC97) 180Ôª 6VA694XB (Socket370,VIA694x/686B,AC97,ATA100) 135Ôª °º´ï VP266+128M DDR 295Ôª VP266 (Socket370,VIA/APOLLO/PRO266/AC97) 200Ôª VK266 (SocketA,KT133A/686B/AC97/ATA100) 190Ôª VT-133PLUS(SocketA,KT133/686B/AC97/ATA100) 190Ôª ID815E (Socket370,i815E/i752/AC97/ATA100) 195Ôª ID815EP (Socket370,i815EP/AC97/ATA100) 190Ôª ID810 (Socket370,i810/ATA66/i752ÏÔ¿¨/AC97Éù¿¨) 140Ôª VP4-133PLUS(Socket370,VIA694x/686B/AC97/ATA100) 160Ôª Vp4-133/M (Socket370,VIA694/596B/CMI8738Éù¿¨/ATA66) 140Ôª VP-133 (Socket370,VIA693A/596B/CMI8738Éù¿¨/ATA66) 150Ôª SIS730S (SocketA,SiS300/AC97/10/100MÍø¿¨) 155Ôª SIS630E (Socket370,SIS630E/SiS300ÏÔ¿¨/AC97) 175Ôª B:Ó²ÅÌ Maxtor(ÂõÍØ) 40GB£¨ Plus 60/É¢£©7200ת\»º´æ:2MB 180Ôª 40.9GB£¨ VL40/É¢£©5400ת\»º´æ:2MB 160Ôª 160GB£¨ D540X/É¢£©5400ת\»º´æ:2MB 530Ôª 120GB£¨D540X/É¢£©5400ת\»º´æ:2MB 350Ôª 20GB£¨ Plus 60/É¢£© 7200ת\»º´æ:2MB 140Ôª 30GB£¨ Plus 60/É¢£©7200ת\»º´æ:2MB 170Ôª 81.9GB£¨ 80/É¢£©5400ת\»º´æ:2MB 250Ôª 20GB£¨ Plus D740X/É¢£©7200ת\»º´æ:2MB 170Ôª 40GB£¨ Plus D740X/É¢£©7200ת\»º´æ:2MB 180Ôª 20GB£¨ 541DX/É¢£©5400ת\»º´æ:2MB 160Ôª 60GB£¨ D540X/É¢£©5400ת\»º´æ:2MB 200Ôª 20GB£¨ 541DX/ºÐ£©5400ת\»º´æ:2MB 150Ôª 60GB£¨ Plus D740X/É¢£©7200ת\»º´æ:2MB 220Ôª 80GB£¨ Plus D740X/É¢£©7200ת\»º´æ:2MB 300Ôª 40GB£¨ D540X/É¢£©5400ת\»º´æ:2MB 160Ôª 20.4GB£¨ VL40/É¢£©5400ת\»º´æ:2MB 140Ôª 40GB£¨ Plus D740X/ºÐ£©7200ת\»º´æ:2MB 200Ôª 60GB£¨Plus D740X/ºÐ£©7200ת\»º´æ:2MB 230Ôª 80GB£¨ Plus D740X/ºÐ£©7200ת\»º´æ:2MB 350Ôª 40GB£¨ D540X/ºÐ£©5400ת\»º´æ:2MB 185Ôª 80GB£¨ D540X/ºÐ£©5400ת\»º´æ:2MB 280Ôª 20GB£¨ Plus D740X/ºÐ£©7200ת\»º´æ:2MB 160Ôª 40GB£¨ 536DX/ºÐ£©5400ת\»º´æ:2MB 190Ôª 80GB£¨ 536DX/ºÐ£©5400ת\»º´æ:2MB 280Ôª 60GB£¨ Plus 60/ºÐ£©7200ת\»º´æ:2MB 250Ôª 120GB£¨D540X/ºÐ£©5400ת\»º´æ:2MB 400Ôª 81.9GB£¨ 80/ºÐ£©5400ת\»º´æ:2MB 270Ôª 60GB£¨ 536DX/ºÐ£©5400ת\»º´æ:2MB 230Ôª 100GB£¨ 536DX/ºÐ£©5400ת\»º´æ:2MB 800Ôª 60GB£¨ D540X/ºÐ£©5400ת\»º´æ:2MB 270Ôª 160GB£¨ D540X/ºÐ£©5400ת\»º´æ:2MB 900Ôª 30.7GB£¨ VL40/É¢£©5400ת\»º´æ:2MB 210Ôª 61.4GB£¨ 80/É¢£©5400ת\»º´æ:2MB 270Ôª 40GB£¨ 536DX/É¢£©5400ת\»º´æ:2MB 170Ôª 15GB£¨531DX/É¢£©5400ת\»º´æ:2MB 160Ôª 20GB£¨Plus 60/ºÐ£©7200ת\»º´æ:2MB 180Ôª Ï£½Ý 40.8GB£¨U Series 6£©5400ת\»º´æ:2MB 250Ôª 40GB£¨Barracuda ATA IV£©7200ת\»º´æ:2MB 170Ôª 60GB£¨Barracuda ATA IV£©7200ת\»º´æ:2MB 200Ôª 20.4GB£¨U Series 6£©5400ת\»º´æ:512KB 140Ôª 80GB£¨Barracuda ATA IV£©7200ת\»º´æ:2MB 250Ôª 20GB£¨Barracuda ATA IV£©7200ת\»º´æ:2MB 160Ôª 30GB£¨Barracuda ATA III£©7200ת\»º´æ:2MB 170Ôª 20GB£¨U Series 5£©5400ת\»º´æ:512KB 130Ôª 40GB£¨U Series 5£©5400ת\»º´æ:512KB 160Ôª 20GB£¨Barracuda ATA III£©7200ת\»º´æ:2MB 160Ôª 40GB£¨Barracuda ATA III£©7200ת\»º´æ:2MB 170Ôª 10.2GB£¨Barracuda ATA III£©7200ת\»º´æ:2MB 135Ôª 10GB£¨U Series 5£©5400ת\»º´æ:512KB 100Ôª 15.3GB£¨Barracuda ATA III£©7200ת\»º´æ:2MB 165Ôª 30GB£¨U Series 5£©5400ת\»º´æ:512KB 200Ôª 15.3GB£¨U Series 5£©5400ת\»º´æ:512KB 180Ôª ST39236/LW 1ת\»º´æ:2MB\ÈÝÁ¿:9.2GB 350Ôª ST39236/LCV 7200ת\»º´æ:4MB\ÈÝÁ¿:9.2GB 400Ôª IBM 60GB£¨Deskstar 60GXP£©7200ת\»º´æ:2MB 190Ôª 10GB£¨Travelstar 20GN£©4200ת\»º´æ:512KB 140Ôª 40GB£¨Deskstar 60GXP£©7200ת\»º´æ:2MB 170Ôª 40GB£¨Deskstar 120GXP£©7200ת\»º´æ:2MB 170Ôª 80GB£¨Deskstar 120GXP£©7200ת\»º´æ:2MB 230Ôª 30GB£¨Travelstar 20GN£© ±Ê¼Ç±¾Ó²ÅÌ\תËÙ:4200ת\»º´æ:512KB 320Ôª 40GB£¨Travelstar 20GN£© ±Ê¼Ç±¾Ó²ÅÌ\תËÙ:4200ת\»º´æ:512KB 400Ôª 120GB£¨Deskstar 120GXP£© ̨ʽ»úÓ²ÅÌ\תËÙ:7200ת\»º´æ:2MB 430Ôª 18.3GB£¨Ultrastar 36LZX/68£© ·þÎñÆ÷Ó²ÅÌ\תËÙ:1ת\»º´æ:4MB 420Ôª 18.3GB£¨Ultrastar 36LZX/80£©
Copy all your DVD's
Title: Copy DVD Movies Easily! You do not need to spend hundreds on a DVD burner to copy DVDs! We will show you how to use your CD-R Writer to create backups of your DVDs that will play in your home DVD player. All you need in your computer is a DVD drive that plays DVDs and a CD-R Writer. You can burn movies on CD-R or CD-RW discs.. Learn the secrets the DVD companies don't want you to know! You will NEVER have to buy another DVD again! Trade movies with friends, copy rentals and much more! Copy only 2 DVD movies and this program has paid for itself! This program is BANNED from many download web sites because of the secrets we teach you. Get your copy today! Download It Instantly Here! Click here to be get off the list
(±¤°í)(°Ãßõ)Global Web Page
Title: Untitled Document º»¸ÞÀÏÀº ÀÚµ¿¼ö½Å°ÅºÎÀåÄ¡¸¦ ¸¶·ÃÇÏ¿´À¸¹Ç·Î ¼ö½ÅÀ» ¿øÄ¡ ¾ÊÀ¸½Ã¸é ÇÏ´ÜÀÇ ¼ö½Å°ÅºÎ ¹öÆ°À» Ŭ¸¯ÇÏ¿© ÁֽʽÿÀ. ´õ ÀÌ»ó, ¼îÇθô ¿î¿µ¿¡ µ·°ú ½Ã°£°ú ¿¡³ÊÁö¸¦ ¼Ò¸ðÇÏÁö ¸¶½Ê½Ã¿À! ¼îÇθô(ÀüÀÚ»ó°Å·¡)»ç¾÷? ÀÌÁ¨ GWP·Î ½ÃÀÛÇϽʽÿÀ! ¾È³çÇϼ¼¿ä, ¿¹±âÄ¡ ¾ÊÀº ¸ÞÀÏÀ» º¸³»°Ô µÇ¾î Á¤¸» Á˼ÛÇÕ´Ï´Ù. ±×·¯³ª À̹ø ¸ÞÀÏÀÌ ´Ô¿¡°Ô ¼ÒÁßÇÑ ±âȸ°¡ µÉ°ÍÀÔ´Ï´Ù. ´ç½Å¿¡°Ô GWP ±Û·Î¹ú e-businessÀÇ Á¤º¸¸¦ ¾Ë·Áµå¸®°íÀÚ ÇÕ´Ï´Ù. ¿ì¼±, Á¦ ¸ÞÀÏÀ» ¹ÞÀ¸¼Ì´Ù¸é, ´ç½ÅÀº ´ÙÀ½ ÇÑ°¡Áö ÁßÀÇ ¹ÝÀÀÀ» º¸ÀÌ½Ç °Å¶ó »ý°¢µË´Ï´Ù. 1)È£±â½É¿¡ Á» Àо°í, Ä«Æä¿Í ȨÆäÀÌÁö¸¦ µé·¯º¸½Ã°Å³ª 2)Á¦¸ñ¸¸ º¸°í, "Á¨Àå ¶Ç ½ºÆÔÀ̾ß" ¸¦ ¿¬¹ßÇϽðųª, 3)"¾ß! ÀÌ ¹ÌÄ£³Ñ¾Æ! ÀÌ·±¸ÞÀÏ º¸³»Áö¸¶! ½Å°íÇϱâ Àü¿¡"¶ó°í ´äÀå±îÁö º¸³»Áֽðųª, 4)¹Ù·Î ÈÞÁöÅëÀ¸·Î Á÷ÇàÇÑ´Ù ÁßÀÇ ÇϳªÀÏ °ÍÀÔ´Ï´Ù. ÀÌ°ÍÀº ´ç¿¬ÇÑ °ÍÀÌ°í, ±×·± »ç¶÷µéÀ» °áÄÚ ³ª»Ú°Ô º¸Áö´Â ¾Ê½À´Ï´Ù. ¿ÀÈ÷·Á Á¦°¡ ¸ÕÀú ½Ç·Ê¸¦ ¹üÇÑ °ÍÀ̴ϱî¿ä.. ÇÏÁö¸¸, ÇÑ°¡Áö È®½ÇÇÑ °ÍÀº, Àú´Â ¹ÌÄ¡Áö ¾Ê¾Ò´Ù´Â »ç½ÇÀÌ°í, ÃÖ°íÀÇ »ç¾÷ÀÌ ¾Æ´Ï¾ú´Ù¸é, ½ÃÀÛµµ ÇÏÁö ¾Ê¾ÒÀ» °ÍÀ̸ç, ¶ÇÇÑ ¸ÓÁö¾Ê¾Æ GWP°¡ Àü±¹À» ÈÛ¾µ°ÍÀ̶ó´Â »ç½ÇÀÔ´Ï´Ù. ÇѹøÂëÀº µé¾îº»½ÅÀûÀÌ ÀÖÀ» ¼öµµ ÀÖ°Ú½À´Ï´Ù¸¸, ±×¶§ Ȥ½Ã, ¹«½ÃÇÏ°í Áö³ªÃĹö¸®¼Ì´Ù¸é, ´Ù½Ã Çѹø ¾Ë¾Æº¸½Ê½Ã¿À..ÃæºÐÈ÷ ±×·²¸¸ÇÑ °¡Ä¡°¡ Àֱ⠶§¹®ÀÔ´Ï´Ù. ¼³»ç, Áö±Ý ¶Ç ¹«½ÃÇØ ¹ö¸®½Å´ÙÇصµ, ¸ÓÁö¾Ê¾Æ GWP¸¦ ´Ù½Ã Á¢ÇÏ°Ô µÇ½Ç°Ì´Ï´Ù. ¡¡ ¿ì¼±, ±¹³»ÀÇ ¿Â¶óÀÎ ÀÎÅÍ³Ý ¼îÇθôÀº ´ë·« 2166 ¿©°³ °¡·® µË´Ï´Ù. ÀÌÁß¿¡¼, ¿ì¸®µéÀÌ ¶°¿Ã¸± ¼ö ÀÖ´Â ¼îÇθôÀº °ú¿¬ ¸î °³³ª µË´Ï±î? ƯÈ÷³ª, °³ÀεéÀÌ ¼îÇθôÀ» ½ÃÀÛÇÏ¿© ÀüÀÚ»ó°Å·¡ »ç¾÷À» ½ÃÀÛÇÑ´Ù´Â °ÍÀº, ¾àÀ°°½ÄÀÇ ½ÃÀå¿¡¼ 5³â,6³â ÀÌ»ó »ýÁ¸Çϱâ¶õ ³Ê¹«³ª ¾î·Æ½À´Ï´Ù. ¶ÇÇÑ, ¼îÇθô »ç¾÷¿¡ ÀÖ¾î °¡Àå Áß¿äÇÑ °ÍÀº(¼º°øÀ̳Ä,½ÇÆÐ³Ä ¹®Á¦), *Á¦Ç°ÀÇ Áú *Á¦Ç°ÀÇ °¡Áö ¼ö(Á¾·ù) *Á¦Ç°ÀÇ °¡°Ý °æÀï·Â *ºü¸¥ ½Ã½ºÅÛÀÇ ±¸Ãà°ú °ü¸®/¿î¿µ *(°¡°Ý °æÀï·Â¿¡¼ µµ»êÇØ ¹ö¸®Áö ¾Ê°í ³¡±îÁö »ì¾Æ³²À» ¸¸ÅÀÇ)¾ÈÁ¤ÀûÀÎ ÀÚº»±Ý. *È«º¸(¸¶ÄÉÆà ´É·Â) µîµéÀ» µé ¼ö ÀÖ½À´Ï´Ù. º¸ÅëÀÇ °³ÀεéÀÌ ¿î¿µÇÏ´Â ¼îÇθôµéÀº ÀÌ ¸ðµÎ¸¦ ÃæÁ·½Ãų ¼ö ¾ø½À´Ï´Ù. ±ÍÇÏ »Ó¸¸ ¾Æ´Ï¶ó, ÀÌ Ä«Æä ȸ¿ø´Ôµé Áß¿¡ ÀÌ·¯ÇÑ °³ÀÎ ¼îÇθô ¿î¿µÇϽô ºÐµé¿¡°Ô´Â ÇÑ°èÀÏ ¼ö ¹Û¿¡ ¾ø½À´Ï´Ù. ¾î¼¸é ´ç¿¬ÇÑ ÀÏÀÔ´Ï´Ù. »Ó¸¸ ¾Æ´Ï¶ó, .com±â¾÷µéÀÌ ¹«¼öÈ÷ ¸¹ÀÌ »ý°Ü³ª°í Àִµ¥, ±× ÃÖÁ¾ »ýÁ¸À²Àº 0.3%ÀÔ´Ï´Ù. ±× ¿øÀÎÀº, 1)°·ÂÇÑ ¿ÀÇÁ¶óÀÎÀÇ ºÎÀç 2)°í°´Ã漺µµÀÇ Ãë¾à 3)Áö³ªÄ£ ±¤°íºñ ÅõÀÚ 4) ¸íÈ®ÇÑ ¼öÀ͸𵨠ºÎÀç µîÀ» µé ¼ö ÀÖ½À´Ï´Ù. ±×¸®°í, IT»ç¾÷À» ÇÏ·Á¸é, * Æò±Õ »ç¹«½Ç º¸Áõ±Ý 1¾ï * ¼¹ö »ç¿ë·á ÃÖ¼Ò ¿ù 50¸¸¿ø * ÀΰǺñ ÃÖ¼Ò 300-5000¸¸¿ø/¿ù * ±âŸ ¿î¿µÀÚ±Ý, ÀÓ´ë·á µî °¢Á¾°æºñ, ±ÝÀ¶ºñµî * Åë½Å/Çù·Â¾÷ü ¼ö¼ö·á(¸ÅÃâÀÇ 15%/¿ù) * ÃÖ¼Ò ¿ù °íÁ¤ºñ 2000¸¸¿ø/¿ù * ±×¸®°í, »ýÁ¸À² 0.3%.! ---¿Í °°Àº »ç½ÇÀº °ü·ÃºÐ¾ß¿¡¼ ÀÏÇغ¸½Å ºÐµéÀ̶ó¸é ÃæºÐÈ÷ ³³µæÇÏ½Ç °Ì´Ï´Ù. ÀÌó·³ Áß,¼Ò±Ô¸ð·Î ¾Æ¹«¸® À¯´ÉÇÑ ÇÁ·Î±×·¡¸ÓµéÀ» °í¿ëÇؼ ½Ã½ºÅÛÀ» ¿î¿µÇØ ³ª°£´Ù Çصµ, (5A1ÀÇ)°ø·æ±â¾÷µé°úÀÇ °æÀï¿¡¼´Â µµÀúÈ÷ »ó´ë°¡ µÇÁö ¾Ê½À´Ï´Ù. ±×¾ß¸»·Î ¹ÙÀ§¿¡ °è¶õÄ¡±â³ª ´Ù¸§ ¾ø½À´Ï´Ù. ¿ì¼± ¸»¾¸ µå¸®¸é, ¿ì¸®µéÀÇ »ç¾÷Àº ÀÌ¿Í °°Àº °ø·æ±â¾÷ÀÇ ½Ã½ºÅÛ¿¡ Æí½ÂÇÏ¿©, »ç¾÷À» ÇÏ½Å´Ù°í º¸¸é µË´Ï´Ù. ±×·¯³ª, °³ÀÎÀÌ ¼¼°è¿¡¼ °¡Àå Å«(¾ÆÁ÷±îÁö) ¼îÇθôÀ» ºÐ¾ç ¹Þ¾Æ À§ Á¶°ÇµéÀ» ¸ðµÎ ÃæÁ·ÇÏ´Â »ç¾÷À» ÇÏ½Ç ¼ö ÀÖ´Â ±âȸ°¡ ÀÖ½À´Ï´Ù.(¹°·Ð, GWPÀÇ ¼îÇθô»ç¾÷Àº ÀÌ »ç¾÷ÀÇ ÀüºÎ°¡ ¾Æ´Ñ, ¸¹Àº ¾ÆÀÌÅÛµé ÁßÀÇ ÇϳªÀÏ »ÓÀÔ´Ï´Ù) ¡Ú¡Ú¡Ú GWP ±Û·Î¹ú e-business ÇÙ½ÉÀÚ·á(¾Æ·¡ ±×¸²µéÀ» Ŭ¸¯ÇϽøé, °ü·ÃȨÆäÀÌÁö ¶Ç´Â Ä¿¹Â´ÏƼ·Î À̵¿ÇÏ½Ã¾î ´õ ÀÚ¼¼ÇÑ Á¤º¸¸¦ Á¢ÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.) ¹Ù·Î ºòÇ÷¡´ÖÀÇ GWP»ç¾÷ÀÔ´Ï´Ù. ±ÍÇÏÀÇ ÀλýÀ» ¹Ù²Ü ¼ö ÀÖ´ÂÀýÈ£ÀÇ ¼º°ø ºñÁî´Ï½º ±âȸÀÔ´Ï´Ù. ÀÌ¹Ì ´ç½Å¿¡°Ô Çà¿îÀÇ ÆĶû»õ´Â ³¯¾Æ °¬½À´Ï´Ù. ±× »õ¸¦ Àâ¾Æ¼ ´ç½ÅÀÇ »õÀå¿¡ ³Öµç°¡, ¾Æ´Ï¸é ¹Ù¶ó¸¸ º¸°í ÀÖ´Ù°¡ ´Ù¸¥ µ¥·Î ³¯¾Æ°¡¹ö¸®°Ô Çϵ簡´Â ´ç½ÅÀÇ ¼±ÅÃÀÔ´Ï´Ù. ´õ ÀÚ¼¼È÷ ¾Ë¾Æº¸½Ã±â À§Çؼ ¾Æ·¡ÀÇ È¨ÆäÀÌÁö ¶Ç´Â Ä«Æ並 °ËÅäÇغ¸½Ã°í ¸ÞÀÏ·Î »çÀå´ÔÀÇ ¼ºÇÔ°ú ¿¬¶ôó¸¦ ³²°Ü ÁֽøéÀº Áï½Ã Á¦°¡ ¿¬¶ôµå¸®°í ¾È³» ÀڷḦ º¸³»µå¸®°Ú½À´Ï´Ù. GWPŬ·´ÀÌ ´ç½ÅÀÌ ¼º°øÀ» ÇÏ´Â ±×³¯±îÁö ÇÔ²² ÇÒ°ÍÀÔ´Ï´Ù. ÀÚ·áÁ¦°ø: http://cafe.daum.net/iwgwp Home: www.newgwp.com.ne.kr GWPŬ·´ ½ºÆù¼ À±¸íÁØ phone: 0505-835-0648 e-mail: [EMAIL PROTECTED] ¡¡ ¡¡ ¡¡
Best FREE Adult Content Web Sites FREE !! FREE !! FREE !! FREE !!
Title: This site contains adult material of an offensive nature This site contains adult material of an offensive nature. If you are under 21 years of age or if it is illegal to view adult material in your community, please leave now. We can't be held responsible for your actions. Continuing further means that you understand and accept responsibility for your own actions, thus releasing the creators of this webpage and our service provider from all liability. All models are over 18 at the time of photography.
Re: Overcoming the potential downside of TCPA
Joseph Ashwood wrote: Lately on both of these lists there has been quite some discussion about TCPA and Palladium, the good, the bad, the ugly, and the anonymous. :) However there is something that is very much worth noting, at least about TCPA. There is nothing stopping a virtualized version being created. There is nothing that stops say VMWare from synthesizing a system view that includes a virtual TCPA component. This makes it possible to (if desired) remove all cryptographic protection. Of course such a software would need to be sold as a development tool but we all know what would happen. Tools like VMWare have been developed by others, and as I recall didn't take all that long to do. As such they can be anonymously distributed, and can almost certainly be stored entirely on a boot CD, using the floppy drive to store the keys (although floppy drives are no longer a cool thing to have in a system), boot from the CD, it runs a small kernel that virtualizes and allows debugging of the TPM/TSS which allows the viewing, copying and replacement of private keys on demand. Of course this is likely to quickly become illegal, or may already, but that doesn't stop the possibility of creating such a system. For details on how to create this virtualized TCPA please refer to the TCPA spec. What prevents this from being useful is the lack of an appropriate certificate for the private key in the TPM. Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ Available for contract work. There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit. - Robert Woodruff
Re: Overcoming the potential downside of TCPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At 10:58 PM 8/13/2002 -0700, Joseph Ashwood wrote: Lately on both of these lists there has been quite some discussion about TCPA and Palladium, the good, the bad, the ugly, and the anonymous. :) However there is something that is very much worth noting, at least about TCPA. There is nothing stopping a virtualized version being created. The only thing to stop that is the certificate on the TCPA's built-in key. You would have to shave one TCPA chip and use its key in the virtualized version. If you distributed that shaved key publicly or just to too many people, then its compromise would likely be detected and its power to attest to S/W configuration would be revoked. However, if you kept the key yourself and used it only at the same frequency you normally would (for the normal set of actions), then the compromise could not be detected and you should be able to run virtualized very happily. That's one of the main problems with TCPA, IMHO, as a security mechanism: that its security depends on hardware tamper resistance -- but at the same time, the TPM needs to be a cheap part, so it can't be very tamper resistant. - Carl -BEGIN PGP SIGNATURE- Version: PGP 6.5.8 iQA/AwUBPVpb2XPxfjyW5ytxEQIaAgCgh72smP3W6qclzgRbNiWt5prdpk4AmwWw aKNdDfQbHWxRVJ3yQ02FxtJb =eEI+ -END PGP SIGNATURE- +--+ |Carl M. Ellison [EMAIL PROTECTED] http://world.std.com/~cme | |PGP: 75C5 1814 C3E3 AAA7 3F31 47B9 73F1 7E3C 96E7 2B71 | +---Officer, arrest that man. He's whistling a copyrighted song.---+
Re: Spam blocklists?
From: James A. Donald [EMAIL PROTECTED] Solution is obvious and has been known for a long time Integrate payment with email. If anyone not on your approved list wants to send you mail, they have to pay you x, where x is a trivial sum, say a cent or two. Spammers wind up sending huge amounts of mail to unmonitored mailboxes, which will make spamming unprofitable. There is also Wei Dai's idea of b-money, I think, which requires every incoming mail to solve a problem about hashes. This could be included in the SMTP protocol, so that the server can generate the challenge dinamically (to prevent replays). This would limit the amount of spam without requiring any real money. Mark
RE: Polio, DES Crack, and Proofs of Concept
Khoder bin Hakkin[SMTP:[EMAIL PROTECTED]] wrote: In the most recent _Science_ some biologists gripe that the scientists who synthesized infectious poliovirus from its description were not doing anything novel, just a prank. Any biologist would have known that, since you could concatenate nucleotide strings, and since polio needs nothing besides DNA (eg no enzymes) to be infectious, obviously you can synth polio. This is *remarkably* similar to cognescenti reactions to the DES Crack project. Yes, it was obvious it would work, and it was largely unnecessary (from a security-planning perspective) to actually do it. But it was proof-of-concept. Like synthesizing polio. Yes, it was obvious to any technically educated person. Nevertheless, until it was done, there were USG officials claiming that it was impossible; that any real DES cracker would melt down, and we ought to be happy with 56 bit DES. Politicians and government employees lie, and they usually get away with it. Of course, the very statement that '56 bit DES is uncrackable, so there is no need for you to export anything better' is inherently self-contradictory - if it's really uncrackable, then there is not rational reason not to allow export of 128 or 512 bit symmetrical encryption as well - uncrackable is uncrackable, after all. I started the DES crack project after the USG had magnaminiously proposed raising the limit for exportable key lengths from 40 to 56 bits. I got RSA to put up the money, and worked with RSA Labs on the format of the challenges. They succeeded in every way I could have wanted. In the real world, one conclusive demo is worth a thousand theoretical papers. Peter Trei
Re: Spam blocklists?
None of those things work. Most spammers don't give a shit if you don't receive email. I can attest to this by the slew of spam going to hostmaster, webmaster, and the like on many networks. What they're really selling is ten million addresses and spam software. Even if 9 million of those are bullshit, they couldn't care less. The more things with @ signs in'em the more money they make off clueless businesses. --Kaos-Keraunos-Kybernetos--- + ^ + :NSA got $20Bill/year|Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ --*--:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. [EMAIL PROTECTED] http://www.sunder.net On Wed, 14 Aug 2002, Marcel Popescu wrote: From: James A. Donald [EMAIL PROTECTED] Solution is obvious and has been known for a long time Integrate payment with email. If anyone not on your approved list wants to send you mail, they have to pay you x, where x is a trivial sum, say a cent or two. Spammers wind up sending huge amounts of mail to unmonitored mailboxes, which will make spamming unprofitable. There is also Wei Dai's idea of b-money, I think, which requires every incoming mail to solve a problem about hashes. This could be included in the SMTP protocol, so that the server can generate the challenge dinamically (to prevent replays). This would limit the amount of spam without requiring any real money. Mark
Re: [WLG]: Regarding HAARP Technologies
hi, The HAARP,project is in Alaska and they claim,that their experiments are precise and can ionise the particluar region of interest unlike russian ones which ionise in bulk and is not a hazard. I am not very sure,i follow ur mail. Regards Data. --- Wilfred L. Guerin [EMAIL PROTECTED] wrote: [Repost Openly.] Though my knowledge of various technologies that are sometimes called HAARP type weapons or technologies associated thereto due to technological similarities is vast, some recent events should be thoroughly examined and publicised in order to prevent large-scale mass-destruction issues or stimulators of global conflict. Let us start with an examination of fact: Pull up NOAA Weather maps for the weeks around the 1st of August, 2002. Notice a large Tropical storm in the northern Gulf Coast (South-eastern USA), one that does not move for over a week. Notice, in this storm development, that regardless of strong jetstream, altitude winds to the east/etc in significant force for cloud motion in all other regions in parallel fashion, this storm cluster did NOT move or change physical arrangement for almost a whole week. Do you see windward trailing ripples in the satilite and weather imagry? --- Now, granted I publicly started referencing these issues === message truncated === __ Do You Yahoo!? HotJobs - Search Thousands of New Jobs http://www.hotjobs.com
Recall,Recall,Recall.
protecting content from metaphor shear Authentica NetRecall by Charlie Cho March 2002 Creators and users of digital documents often suffer what author Neal Stephenson dubbed metaphor shear, the realization that an established metaphor is unsuitable for the concept to which it refers. Stephenson cites his experiences with word processors as a prime example: When the power goes out, any unsaved text in a digital document is lost. Traditional documents written with pen and paper have no such problems. Similarly, anyone who has bookmarked a Web page only to find the site offline upon return, is a victim of metaphor shear. This sort of impermanence is at odds with the traditional notion of a document as something persistent, perhaps even intended for posterity. A close comparison of digital documents with their analog counterparts reveals numerous inconsistencies like this one. For instance, while analog documents require some effort to duplicate (even with a Xerox machine), digitized documents are copied constantly in the course of normal use. Outdated copies can linger for an extremely long time on backup tapes. Metaphor shear becomes an even more extreme problem in situations when digital documents replace physical ones in established rights management procedures. Typically, these procedures involve sensitive or valuable information, especially when the information's circulation must be limited. For example, a company might require executives to stamp indications like draft or confidential on certain papers, and those papers must be shredded after use to preserve plausible deniability. In addition, copyright and fair use laws were conceived and fine-tuned during the paper age. It's for this reason, that digital rights management has become so complex and expensive.More,(ad for windows,rsa,crud.) http://www.newarchitectmag.com/documents/s%3D2457/new1011397127626/
Greeneland
http://www.theregister.co.uk/content/6/26675.html Fastest way to freshmeat? Follow a vulture. Internet pioneer David Reed recently pointed out that in the early years, efforts to incorporate end-to-end encryption into the base standards of the Net were reportedly discouraged for reasons of national security. But weak encryption is no longer a reasonable excuse for insecure systems. It's clear by now that real security comes not just from strong crypto, but from recognizing and embracing human strengths, frailties and common behaviors in building, managing and using complex systems. People are always the weakest link.MORE from the mighty OZ... http://news.com.com/2010-1071-949678.html?tag=fd_nc_1
SS tawdry and sometimes illegal. GET OUT!
http://www.washingtonpost.com/wp-dyn/articles/A14617-2002Aug13.html Since July 1998, the number of special agents has grown by 705, for a total of 2,939 -- a 32 percent increase. The service's budget has exploded since 1999, growing 75 percent to a proposed $1.05 billion next year. Drawbacks? Jacksons games? In June, U.S. News World Report catalogued tawdry and sometimes illegal activities by Secret Service agents over 25 years, involving sex, drugs, theft, brawling, inebriation and corruption. Four agents assigned to Vice President Cheney fought in a San Diego bar, and agents on assignment at the Salt Lake City Olympics came under investigation about a possible sexual assault on a minor in February. Last month, an agent was suspended after he scrawled Islam is evil, Christ is king on a Muslim prayer calendar during a search of a Michigan suspect's home. Fergeddaboudit!
Al-Jazeera considered harmful.
http://www.arabnews.com/Article.asp?ID=17751Misusing freedom of expression Abdullah Farraj Al-Sharif/Al-Madinah Freedom of expression has long been absent in the Arab world. While all Arab intellectuals emphasize the need for it, they do not accept the wild lies and prevarications dished out regularly by the Qatar-based Al-Jazeera on a round-the-clock basis. The station chooses guests with dubious qualifications to participate in what is arguably the worst kind of talk show. Guests rant and rave, reminding viewers of a brawl. The participants are never concerned with the authenticity of evidence used to support their arguments. Such shows, which are not often broadcast by other stations in other parts of the world, spew hatred and hostility all around. Viewers wonder at the apparent contradiction in the way the station presents programs and in what its goals really are. Its motto is Opinion and the Other Opinion but the stations performance has proved that the other opinion has no place in its broadcasts. When a topic is discussed Iraq, for example the discussion rambles on interminably. Viewers who may or may not know anything about the topic participate by telephone. The moderator puts questions to them but they are not allowed to express a dissenting opinion. Questions are phrased in such a way that the desired answer is implied and it is thus clear what the participants are expected to say. The trick usually works as unsuspecting participants initially agree with the moderator and later when the trap has become obvious, the participant protests that he or she has not been allowed to state his views. At this point the moderator jumps in to say angrily, We are discussing the likelihood of Americas attacking Iraq and not the stations style of presentation. The stations objective becomes quite clear to those who watches it for some time. It aims at the total surrender of all Arab interests to American policies. The station seems to follow a skillfully-devised scheme, which is much worse than either covert or overt Zionist schemes, to deprive Arabs of all their legitimate rights. The viewers, who see through the stations evil designs, are at a loss to explain why a Gulf country continues to finance a station which has ruined good relations with a number of Arab countries because of its baseless criticisms and allegations. If the station is impartial in its treatment, one wonders why it never discusses the state of affairs in Qatar. Is Qatar an ideal and infallible state while all other Arab states and governments and countries deserve to be condemned? Though I have been frank in my opinions about the way the station operates, I want to stress my keenness to maintain our close family and cultural ties with our brothers in Qatar despite the efforts of the TV station to ruin them. 14 August 2002 http://www.cursor.org/aljazeera.htm
2 Pak shaker.Get it India.
http://www.expressindia.com/fullstory.php?newsid=13796 RAW, India's equivalent of CIA, is involved in acts of terrorism ... indianterrorism.mybravenet.com/RAWFacts.htm - 3k - Cached - Similar pages ... intelligence agencies continue, Harrison said. The CIA still has close links with the ISI (Pakistan's Inter-Services Intelligence).. ... rawa.fancymarketing.net/cia-talib.htm - 7k - Cached - Similar pages Muzi.com | LatelineNews : CIA says China helped Pakistan's ... ... Muzi.com : Muzi (English) : News : CIA says China helped Pakistan's missile program GB Big5. ... latelinenews.com/ll/english/81839.shtml - 19k - Cached - Similar pages How the CIA created Osama bin Laden ... MAK was a front for Pakistan's CIA, the Inter-Service Intelligence Directorate. The ISI was the first recipient of the vast bulk ... www.greenleft.org.au/back/2001/465/465p15.htm - 16k - Cached - Similar pages CRG -- Cover-up or Complicity of the Bush Administration? The ... ... Also bear in mind that Pakistan's ISI remained throughout the entire post Cold War era until the present, the launch pad for CIA covert operations in the ... www.globalresearch.ca/articles/CHO111A.html - 33k - Cached - Similar pages 2/19/96 INT/ASIA: PAKISTAN'S BOMB VS. TRADE ... destruction. The CIA says China has secretly shipped 5,000 ring magnets to Pakistan's nuclear laboratory at Kahuta. The magnets ... pathfinder.com/time/international/ 1996/960219/china.trade.html - 7k - Cached - Similar pages ...Critics of the ISI say that it has become a state within a state, answerable neither to the leadership of the army, nor to the President or the Prime Minister. The result is there has been no real supervision of the ISI, and corruption, narcotics, and big money have all come into play, further complicating the political scenario. Drug money was used by ISI to finance not only the Afghanistan war, but also the ongoing proxy war against India in Kashmir and Northeast India. The Joint Chiefs of Staff Committee deals with all problems bearing on the military aspects of state security and is charged with integrating and coordinating the three services. Affiliated with the committee are the offices of the engineer in chief, the director general of medical service, the Director of Inter-Services Public Relations, and the Director of Inter-Services Intelligence. Staffed by hundreds of civilian and military officers, and thousands of other workers, the agency's headquarters is located in Islamabad. The ISI reportedly has a total of about 10,000 officers and staff members, a number which does not include informants and assets. It is reportedly organized into between six and eight divisions: FROM http://www.fas.org/irp/world/pakistan/isi/ Elsewhere in India, the ISI offers monetary rewards , sex, and other attractions to cultivate agents. http://www.ipcs.org/issues/articles/191-ip-krishna.htm Espionage, euphemistically called the second oldest profession of the world finds a mention in the Indian Vedas, one of the most - if not the most - ancient of the human texts. http://www.defencejournal.com/feb-mar99/raw-at-war.htm RAW hijacking trauma. Indian lies about IC 814 hijack exposed! ... statement added. Pakistan News Service/Information Times, December 28, 1999. Is Indian RAW Agent SBS Tomar Behind the Hijacking Drama? ... indianterrorism.mybravenet.com/Nepal3.htm - 14k - Cached - Similar pages India's shadowy policies against Nepal should be condemned by the ... ... 2000 RAW official on hijacked flight IC 814: Asiaweek BY OUR POLITICAL CORRESPONDENT A stunning new bit of information on the Indian Airlines airbus hijacking ... indianterrorism.mybravenet.com/Nepal1.htm - 13k - Cached - Similar pages [ More results from indianterrorism.mybravenet.com ] Arrested ISI agent played key role in hijacking of IA plane Arrested ISI agent played key role in hijacking of IA plane. DH News Service Deccan Heral April 27, 2000: Previous message: The Marxist ... www.hvk.org/articles/0400/61.html - 8k - Cached - Similar pages Pak diplomat was involved in the hijacking of IA plane ... Sources told 'The Times of India' that intelligence agencies had a opened dossiers on suspected ISI agents and their activities long before the hijacking of ... www.hvk.org/articles/0401/59.html - 8k - Cached - Similar pages [ More results from www.hvk.org While CIA's have been known to start wars,a 'bay of pigs' is considered unlikely.Northwoods maybe,not bay of pigs.
godsucks.com
http://www.freedomforum.org/templates/document.asp?documentID=16732 Florida pledge flap,why do they bother when taxpayer funded madrasses's are underway? Education-FaithbasedLinks ... Many faith-based organizations, denominations, coalitions and local congregations actively work ... specific task forces to address the issue through education, ... www.webofcreation.org/education/faithbasedlinks.htm - 40k - Cached - Similar pages
Police special unit to watch for army coup.
Fiji Times - First Newspaper To Be Published In The World Today -they are actually being so close to the International date line. The fiji village. Police Forces sets up special unit to monitor Military The police force will soon set up a special unit to monitor the military to avoid the chance of another coup. more http://www.fijivillage.com/ RR. Every country should have one of these units,if they have to have a police force.
Bnet interactive -Click here to rate all films by Robert Hansen.
Try not to set off automatic NSA search and locate scanning software. http://www.foreignfilms.com/person.asp?person_id=49748 Kaerlighed Ved Forste Hik (1999) Add to my favorites Email this page to a friend Also known as: Love At First Hiccup (USA) Starring: Robert Hansen, Sofie Lassen-Kahlke Genre: Comedy (add) Set in: Small town, Denmark (add) Keywords: heart warming, sex (add) Runtime: 80 minutes Country: Denmark Language: Color: Color This film was added by: thenextwhitlam
Toners and inkjet cartridges for less.... IH
Tremendous Savings on Toners, Inkjets, FAX, and Thermal Replenishables!! Toners 2 Go is your secret weapon to lowering your cost for High Quality, Low-Cost printer supplies! We have been in the printer replenishables business since 1992, and pride ourselves on rapid response and outstanding customer service. What we sell are 100% compatible replacements for Epson, Canon, Hewlett Packard, Xerox, Okidata, Brother, and Lexmark; products that meet and often exceed original manufacturer's specifications. Check out these prices! Epson Stylus Color inkjet cartridge (SO20108): Epson's Price: $27.99 Toners2Go price: $9.95! HP LaserJet 4 Toner Cartridge (92298A): HP's Price: $88.99 Toners2Go price: $41.75! Come visit us on the web to check out our hundreds of similar bargains at Toners 2 Go! request to be removed by clicking HERE jmc
Re: TCPA/Palladium user interst vs third party interest (Re: responding to claims about TCPA)
Adam Back wrote: The remote attesation is the feature which is in the interests of third parties. I think if this feature were removed the worst of the issues the complaints are around would go away because the remaining features would be under the control of the user, and there would be no way for third parties to discriminate against users who did not use them, or configured them in given ways. The remaining features of note being sealing, and integrity metric based security boot-strapping. However the remote attestation is clearly the feature that TCPA, and Microsoft place most value on (it being the main feature allowing DRM, and allowing remote influence and control to be exerted on users configuration and software choices). So the remote attesation feature is useful for _servers_ that want to convince clients of their trust-worthiness (that they won't look at content, tamper with the algorithm, or anonymity or privacy properties etc). So you could imagine that feature being a part of server machines, but not part of client machines -- there already exists some distinctions between client and server platforms -- for example high end Intel chips with larger cache etc intended for server market by their pricing. You could imagine the TCPA/Palladium support being available at extra cost for this market. But the remaining problem is that the remote attesation is kind of dual-use (of utility to both user desktop machines and servers). This is because with peer-to-peer applications, user desktop machines are also servers. So the issue has become entangled. It would be useful for individual liberties for remote-attestation features to be widely deployed on desktop class machines to build peer-to-peer systems and anonymity and privacy enhancing systems. However the remote-attestation feature is also against the users interests because it's wide-spread deployment is the main DRM enabling feature and general tool for remote control descrimination against user software and configuration choices. I don't see any way to have the benefits without the negatives, unless anyone has any bright ideas. The remaining questions are: - do the negatives out-weigh the positives (lose ability to reverse-engineer and virtualize applications, and trade software-hacking based BORA for hardware-hacking based ROCA); - are there ways to make remote-attestation not useful for DRM, eg. limited deployment, other; - would the user-positive aspects of remote-attestation still be largely available with only limited-deployment -- eg could interesting peer-to-peer and privacy systems be built with a mixture of remote-attestation able and non-remote-attestation able nodes. A wild thought that occurs to me is that some mileage could be had by using remotely attested servers to verify _signatures_ of untrusted peer-to-peer stuff. So, you get most of the benefits of peer-to-peer and the servers only have to do cheap, low-bandwidth stuff. I admit I haven't worked out any details of this at all! Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ Available for contract work. There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit. - Robert Woodruff
Homeland security-Imagine it done.
The Transportation Security Administration has awarded the first two work orders for its information technology infrastructure. TSA tapped Unisys Corp. for the agency's billion-dollar Information Technology Managed Services (ITMS) program Aug. 2 but postponed making an official award until meeting with an investment review board. A group led by the Office of Management and Budget and the Office of Homeland Security is assessing all projects valued at more than $500,000 at agencies, including TSA, slated to go into the proposed Homeland Security Department. http://www.fcw.com/fcw/articles/2002/0812/web-tsa-08-14-02.asp
Dr livingstone I presume...
Hi there...http://www.asial.com.au/ ...The Brookings Institution, a Washington think tank has estimated that the overall cost of the September 11 attacks to the U.S. economy was between $100-$125 billion, or one percent of the nations GDP. Over the next decade government and the private sector combined will spend somewhere between $500 billion and $1 trillion dollars on homeland security. This figure could be even significantly higher if the U.S. experiences additional major terrorist attacks in the coming months and years. Among the areas projected to enjoy the greatest growth potential in the security sector are biometric systems, business continuity systems and services, aviation security, chem-bio defence, and new technologies for non-invasive inspection of containers and other cargo. Construction security is also booming. Dr. Livingstone (pictured right) Chairman CEO of GlobalOptions, author and world-renowned crisis management expert will be presenting at the Security 2002 conference. More info on Security 2002 conference More info on Dr. Livingstone
Elephants graveyard.
White House Writers Group White House Writers Group consists of former White House speechwriters who provide a range of communication services including speech writing; drafting and placing opinion-editorials; writing and staging presentations; and planning and strategy. http://www.globalops.com/alliances.html Globalops? GlobalOptions Inc., headquartered in Washington, D.C., is a multi-disciplinary, international, risk management and business intelligence company. Our staff of professionals includes former intelligence and law enforcement officers, veterans of America's elite military units, and legal and crisis communications specialists. We provide a broad spectrum of unique services and innovative solutions to commercial, government, and individual clients. Never before have all these services been assembled under a single umbrella to provide a comprehensive approach to solving difficult business and government problems. Recent assignments include the protection of fissile material in Russia, corporate crisis management, the recovery of assets, due diligence in major merger and acquisition (MA) cases, undercover investigations of NAFTA violations, and coordination of all legal defense efforts associated with the largest civil RICO action in U.S. history. GlobalOptions' Advisory Board is chaired by former Chairman of the Joint Chiefs of Staff, Admiral William Crowe, and is comprised of many distinguished individuals, including a former CIA Director, a former British Trade Minister, and a number of retired ambassadors and military leaders. http://www.globalops.com/index.htm
Hello cyou812 , 100% FREE TEEN ACTION!
Dear cyou812 , 100% FREE ADULT HARDCORE! CLICK HERE You have received this advertisement because you have opted in to receive free adult internet offers and specials through our affiliated websites. If you do not wish to receive further emails or have received the email in error you may opt-out of our database by clicking here: CLICK HERE Please allow 24hours for removal. This e-mail is sent in compliance with the Information Exchange Promotion and Privacy Protection Act. section 50 marked as 'Advertisement' with valid 'removal' instruction. [E^3247(^(PO1:KJ)_8J7BJK9^":}H&*TG0BK5NKIYs5]
[±¤°í]¼Õ¹ß(Åé) ¹«Á» ±»Àº»ì °¡·Á¿ò ¶¡ ¼Ò¼öÆ÷¼º ¹°Áú ÀÌÁ¨ ¾È³ç!
Title: Áö°Ü¿î ¹«Á»¿¡¼ Å»ÃâÇϱ⠿À·¡µÈ ¼Õ¹ß(Åé)¹«Á»ÀÌ ÀÖÀ¸½ÅºÐ. 20³âÀÌ»óµÈ ¹«Á»À¸·Î, ¹«Á»ÇؼҸ¦ Æ÷±âÇϽźÐ. º¸¼Ûº¸¼ÛÇÏ°í ¸Å²ô·¯¿î ¹ßÀ» µÇã°í ½ÍÀº ¸ðµçºÐ. ¹ßÀÌ ½ÉÇÏ°Ô °¡·Á¿ì½ÅºÐ. ¹°ÁýÀÌ ÀÚ²Ù ÀâÈ÷½Ã´ÂºÐ. °¢ÁúÀÌ ¸¹ÀÌ ÀϾ¼ ½ºÅ¸Å· ½ÅÀ¸¸é ¿ÃÀÌ Ç®¸®½Ã°Å³ª ¿Ü°ü»ó µÞ²ÞÄ¡°¡ ÈäÇѺÐ. ¹ß¿¡ ¶¡ÀÌ ¸¹À̳ª°í, ¹ß³¿»õ°¡ ½ÉÇѺÐ. ¹«Á»È¯°æÀ¸·Î ÀÎÇØ Á¤½ÅÁýÁßÀÌ ¾ÈµÇ½Ã´ÂºÐ. * º» Á¦Ç°Àº ÀǾàÇ°ÀÌ ¾Æ´Õ´Ï´Ù. ȸ»ç¸í : »þÇÁ·Ð(saffron) ¼ö¿ø½Ã ±Ç¼±±¸ ±Ç¼±µ¿ 941-8(2Ãþ) Tel : 031-236-1114 »ç¾÷ÀÚµî·Ï¹øÈ£ : 124-17-96663 Åë½ÅÆǸŽŰí Á¦1668È£ -Á¤ÅëºÎ ±Ç°í»çÇ׿¡ ÀÇÇÑ ±¤°í¸ÞÀÏ- ±ÍÇÏÀÇ ¸ÞÀÏÁÖ¼ÒÀÌ¿Ü¿¡ ¾î¶°ÇÑ Á¤º¸µµ °¡Áö°í ÀÖÁö ¾Ê½À´Ï´Ù. Ȥ¿© ºÒÆíÇϼ̴ٸé Á¤ÁßÈ÷ ¸Ó¸®¼÷¿© »ç°ú µå¸®¿À¸ç ¼ö½ÅÀ» ¿øÇÏÁö ¾ÊÀ¸½Å ºÐÀº ȸ½ÅÇÏÁö ¸¶½Ã°í ²À! ¹öÆ°À» Ŭ¸¯ÇÏ½Ã¸é ¼ö½Å°ÅºÎ󸮰¡ ÀÌ·ç¾î Áý´Ï´Ù.
Re: Overcoming the potential downside of TCPA
- Original Message - From: Ben Laurie [EMAIL PROTECTED] Joseph Ashwood wrote: There is nothing stopping a virtualized version being created. What prevents this from being useful is the lack of an appropriate certificate for the private key in the TPM. Actually that does nothing to stop it. Because of the construction of TCPA, the private keys are registered _after_ the owner receives the computer, this is the window of opportunity against that as well. The worst case for cost of this is to purchase an additional motherboard (IIRC Fry's has them as low as $50), giving the ability to present a purchase. The virtual-private key is then created, and registered using the credentials borrowed from the second motherboard. Since TCPA doesn't allow for direct remote queries against the hardware, the virtual system will actually have first shot at the incoming data. That's the worst case. The expected case; you pay a small registration fee claiming that you accidentally wiped your TCPA. The best case, you claim you accidentally wiped your TCPA, they charge you nothing to remove the record of your old TCPA, and replace it with your new (virtualized) TCPA. So at worst this will cost $50. Once you've got a virtual setup, that virtual setup (with all its associated purchased rights) can be replicated across an unlimited number of computers. The important part for this, is that TCPA has no key until it has an owner, and the owner can wipe the TCPA at any time. From what I can tell this was designed for resale of components, but is perfectly suitable as a point of attack. Joe
Re: Overcoming the potential downside of TCPA
Joseph Ashwood wrote: - Original Message - From: Ben Laurie [EMAIL PROTECTED] Joseph Ashwood wrote: There is nothing stopping a virtualized version being created. What prevents this from being useful is the lack of an appropriate certificate for the private key in the TPM. Actually that does nothing to stop it. Because of the construction of TCPA, the private keys are registered _after_ the owner receives the computer, this is the window of opportunity against that as well. The worst case for cost of this is to purchase an additional motherboard (IIRC Fry's has them as low as $50), giving the ability to present a purchase. The virtual-private key is then created, and registered using the credentials borrowed from the second motherboard. Since TCPA doesn't allow for direct remote queries against the hardware, the virtual system will actually have first shot at the incoming data. That's the worst case. The expected case; you pay a small registration fee claiming that you accidentally wiped your TCPA. The best case, you claim you accidentally wiped your TCPA, they charge you nothing to remove the record of your old TCPA, and replace it with your new (virtualized) TCPA. So at worst this will cost $50. Once you've got a virtual setup, that virtual setup (with all its associated purchased rights) can be replicated across an unlimited number of computers. The important part for this, is that TCPA has no key until it has an owner, and the owner can wipe the TCPA at any time. From what I can tell this was designed for resale of components, but is perfectly suitable as a point of attack. If this is true, I'm really happy about it, and I agree it would allow virtualisation. I'm pretty sure it won't be for Palladium, but I don't know about TCPA - certainly it fits the bill for what TCPA is supposed to do. Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ Available for contract work. There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit. - Robert Woodruff
We believe...
...The issue of how the governments of the world will wish to address the proliferation of encryption in the post September 11 era is a far more complex, but equally important question. Although the United States intelligence community has sounded the alarm on this topic for several years, commercial and privacy interests have prevented many of the steps proposed to permit governments access to encrypted communications where the national security required such access. We believe those earlier decisions will now be revisited... Globalops hotshits mouthing off.1 was an FBI flack around WACO massacre time and the other is ..guess who. The president? Following are some of the attorneys or judges who have been reported to have been disciplined by the District of Columbia for unethical conduct, who may be a resident of the District of Columbia and who were disciplined in another jurisdiction, sued for malpractice, incarcerated, whom we understand have been charged with unethical conduct, who have have engaged in conduct which tends to defeat the administration of justice or to bring the courts and the legal business into disrepute, etc. Same name mistake? Identity theft? Whatever. Judicial Attorney Misconduct in the District of Columbia ... MICHAEL CHARLES MOGIL, BERNARD M. MURCHISON-SMITH, BRETT E. MURPHY, JUDGE TIM NEILL, DENIS M. NERENBERG, ROY NIELSEN JR, KENNETH EDWARD ONDECK, THOMAS P. OAK ... www.clr.org/dc.html - 6k - Cached - Similar pages Theres a million Thomas P Ondecks out there,right? D-2094 IN THE MATTER OF DISBARMENT OF THOMAS P. ONDECK Thomas P. Ondeck, of Washington, D.C., having been suspended from the practice of law in this Court by order of August 2, 1999; and a rule having been issued and served upon him requiring him to show cause why he should not be disbarred; and the time to file a response having expired; It is ordered that Thomas P. Ondeck is disbarred from the practice of law in this Court. Probably his evil twin...what did gumshoes do before they invented Google? Original grab at... http://www.waaf.ru/24.html Scroll for it.
Anarchists in Japan.
A - I N F O S N E W S S E R V I C E http://www.ainfos.ca/ http://ainfos.ca/index24.html Visit http://mypage.naver.co.jp/aca/ *** ** The A-Infos News Service ** News about and of interest to anarchists ** COMMANDS: [EMAIL PROTECTED] REPLIES: [EMAIL PROTECTED] HELP: [EMAIL PROTECTED] WWW: http://www.ainfos.ca/ INFO: http://www.ainfos.ca/org Bonsai.
CDR: RE: A faster way to factor prime numbers found?
AFICT, the proposed algorithm is for a test for primality and does not represent an algorithm to factor composites. Lucky Yes, the paper is quite readable. The futuristic conjecture is that primes can be proved in O(log^3(n)) time, but the algorithm as presented is O(log^12(n)) time. The authors admit that present probabalistic algorithms are faster. However, it presents a new way to think about the problem, so it opens the door for a lot of new research. Time will tell if that leads to new factoring algorithms. Is Pollard still interested? Maybe somebody should drop off the paper and a new computer at his house :-) Dr Mike. Writings on the wall ptrei.Even without idquantique,the most trusted name in security
[¼ºÀα¤°í] ¾îÁ¦ ÀüÈÇߴµ¥ ¿Ö ¾È¹Þ¾Ò¾î¿ä? 19¼¼¹Ì¸¸ Ŭ¸¯±ÝÁö!
¿À´Ã µû¶ó °©°©ÇÏ°í µÇ°Ô Èûµå³×¿ä.¿©±â¸¦ ´·¯ÁÖ¼¼¿ä...! ¿À´Ã ±×»ç¶÷ÇÏ°í µ¥ÀÌÆ® ÇÏ´Â ³¯Àε¥...¿©±â¸¦ ´·¯ÁÖ¼¼¿ä...! ºñ°¡ ÀÌ·¸°Ô ¿À´Ï ±âºÐµµ ¿ì¿ïÇÏ°í..¿©±â¸¦ ´·¯ÁÖ¼¼¿ä...! Çغ¯ÀÇ ÇÞºµÀÌ ±×¸³´Ù..¿©±â¸¦ ´·¯ÁÖ¼¼¿ä...! ¹öÆ°À» Ŭ¸¯ÇÏ½Ã¸é ¼ö½Å°ÅºÎ󸮰¡ ÀÌ·ç¾î Áý´Ï´Ù.(If you don£§t want to receive this mail anymore, click here [Deny])À̸ÞÀÏÀº °Ô½ÃÆÇ¿¡¼ ¾Ë°ÔµÇ¾úÀ½À» ¾Ë¸³´Ï´Ù.
FREE Shipping on orders of $40 or more!!!
Clickfor Fantastic Savings on Laser & Inkjet Cartridges! Save up to 80% Highest Quality Inkjets Available, Guaranteed 100% Money Back Guarantee Lowest Prices on the Web Free Shipping on all Orders Over $40 Corporate and School Discounts FREE SHIPPING We offer free shipping for all US orders $40 & over. OUR GUARANTEE No Risk Guarantee! We back all of our products 100%. Clickfor Fantastic Savings on Laser & Inkjet Cartridges! Save up to 80% You have signed up with one of our network partners to receive email providing you with special offers that may appeal to you. If you do not wish to receive these offers in the future, reply to this email with "unsubscribe" in the subject or simply click on the following link: Unsubscribe
This is what I have been talking about!
Title: Free Software Click here to start getting your free software now. Free Milton Bradley Classic board Games Chess, Checkers, Connect Four, Dominoes, Parcheesi, Pente and Backgammon... All your favorites. Save games in progress, play against a wide variety of opponents online or off, and have a great time. The Milton Bradley collection of Classic Board Games captures the spirit of the original gameplay, mixes in rich graphics and animation, and offers great family fun for everyone. More Details... Get more free software: 3D Home and GardenMore Details... Webster's Millennium 2002 Encyclopedia More Details... Writing TutorMore Details... Greeting Card MagicMore Details... Print Shop Photo ProMore Details... Multimedia SpanishMore Details... You are receiving this email as a subscriber to our mailing list. To remove yourself from this and related email lists click here: UNSUBSCRIBE MY EMAIL
Crystal Clear Conference Calls
Title: Lowest Rate Services Conferencing Made Easy Only 18 Cents Per Minute! (Including Long Distance!) No setup fees No contracts or monthly fees Call anytime, from anywhere, to anywhere Connects up to 100 Participants Simplicity in set up and administration Operator Help available 24/7 The Highest Quality Service For The Lowest Rate In The Industry! Fill out the form below to find out how you can lower your phone bill every month. Required Input Field* Name* Web Address Company Name* State* Business Phone* Home Phone Email Address* Type of Business To be removed from our distribution lists, please Click here.
Re: Re: Overcoming the potential downside of TCPA
- Original Message - From: Ben Laurie [EMAIL PROTECTED] The important part for this, is that TCPA has no key until it has an owner, and the owner can wipe the TCPA at any time. From what I can tell this was designed for resale of components, but is perfectly suitable as a point of attack. If this is true, I'm really happy about it, and I agree it would allow virtualisation. I'm pretty sure it won't be for Palladium, but I don't know about TCPA - certainly it fits the bill for what TCPA is supposed to do. I certainly don't believe many people to believe me simply because I say it is so. Instead I'll supply a link to the authority of TCPA, the 1.1b specification, it is available at http://www.trustedcomputing.org/docs/main%20v1_1b.pdf . There are other documents, unfortunately the main spec gives substantial leeway, and I haven't had time to read the others (I haven't fully digested the main spec yet either). From that spec, all 332 pages of it, I encourage everyone that wants to decide for themselves to read the spec. If you reach different conclusions than I have, feel free to comment, I'm sure there are many people on these lists that would be interested in justification for either position. Personally, I believe I've processed enough of the spec to state that TCPA is a tool, and like any tool it has both positive and negative aspects. Provided the requirement to be able to turn it off (and for my preference they should add a requirement that the motherboard continue functioning even under the condition that the TCPA module(s) is/are physically removed from the board). The current spec though does seem to have a bend towards being as advertised, being primarily a tool for the user. Whether this will remain in the version 2.0 that is in the works, I cannot say as I have no access to it, although if someone is listening with an NDA nearby, I'd be more than happy to review it. Joe
AFP PROMIS
What should I do if my FOI request comes back with PROMIS-person and location details,on it? I was just wondering in light of the history of that in SA,guatamala,occupied Palistine,etc. First they came for the hackers. But I never did anything illegal with my computer, so I didn't speak up. Then they came for the pornographers. But I thought there was too much smut on the Internet anyway, so I didn't speak up. Then they came for the anonymous remailers. But a lot of nasty stuff gets sent from anon.penet.fi, so I didn't speak up. Then they came for the encryption users. But I could never figure out how to work pgp5 anyway, so I didn't speak up. Then they came for me. And by that time there was no one left to speak up. ~Alara Rogers (Aleph Press) n
Is Uribe on a PROMIS?
Ex-intellegence agent exposes the truth behind the Government Agencies THE MEN WHO SOLD THE WORLD... AND THE MAN WHO TOLD THE STORY. His book is the book the Israelis tried to stop, written by the man they said didn't exist - the book that George Bush and the CIA tried to sabotage. For more than ten helter-skelter, hair-raising years, Ari Ben-Menashe was the golden-haired boy of Israel's deadly spy service. After a year in a US jail on trumped-up charges, Ari Ben-Menashe is ready to tell his story. Ari Ben-Menashe is a man without a home, a country, or many friends in the cut-throat world of international intelligence. In his recently released book entitled Profits of War, the sensational story of the world-wide arms conspiracy, Ben-Menashe details the unbelievable story of an international cabal of well-connected intelligence community and corporate arms dealers who, as the title of the book suggests, wage war to covertly gain power, influence and personal wealth. Ben-Menashe is the man responsible for leaking the information that eventually led to the Iran-contra investigations and the demise (or sacrifice) of Oliver North who, it turns out, was only a small player in a much much bigger game .After serving in the external relations department of Israeli Military Intelligence and acting as personal national security advisor to Yitzhak Shamir (former President of Israel) for a total of twelve years, Ben-Menashe has written what must arguably rate as one of the most important political and intelligence exposes ever. I met with Ari Ben-Menashe twice during 1991 to discuss various issues, including the theft by the US justice department of the most sophisticated data-collecting computer program ever developed, which is known as 'the Inslaw affair', and the subsequent modification and international sale of that program to various countries around the world, including Australia, by a CIA front-company and an Israeli Intelligence front-company owned and run by Robert Maxwell. The Dossier Society The computer program we are talking about is called Promis, and its use presents the biggest threat to individual rights by any computer technology in use today. Not only that, it has given US Intelligence agencies access to extremely sensitive information stored in the databases of possibly as many as eighty-eight countries around the globe. Ben-Menashe devotes an entire chapter of his book detailing the joint American-Israeli initiative to sell Promis to intelligence and law-enforcement agencies world-wide, and gives several examples of how the program has been used to interfere with the political process of various countries and to keep track of citizens. Since obtaining an illegal copy of the program over a decade ago, the Central Intelligence Agency has, in conjunction with Israeli Intelligence, embarked on a highly successful world-wide initiative to install bugged copies of the software in computer systems run by intelligence and law-enforcement agencies, (as well as other government organisations), to which they now covertly have unlimited access. One of the earliest leaks regarding this covert computer double-dealing came out in an article entitled Spy vs. Spy, (written by Zuhair Kashmeri for the Toronto Globe and Mail), which was published on Saturday 20 April 1991. Devoted entirely to the Promis initiative, the article quotes one of Kashmeri's Canadian Intelligence sources: Some of our Allies, such as Australia, are furious after they found out from the revelations of the Inslaw Case that they were sucked into buying Promis. Kashmeri confirmed to one of my colleagues that he has had a twelve year relationship with the two intelligence sources who supplied the information for the article, and that they had always proved reliable in the past. At the time I interviewed Ben-Menashe, it proved very hard to authenticate all his claims. Although Israeli Intelligence denied all knowledge of him for some time, I was informed by a helpful contact within the Australian Democrats that he had indeed worked there for them, and, was given copies of various personal references that supported the claim. After later interviewing Bill Hamilton, the Director of Inslaw Inc., the company that wrote the program, and other individuals familiar with the case, I felt quite confident that Ari Ben-Menashe knew exactly what he was talking about. On 1 September 1992, an investigative committee of the US Congress released an investigative report on the Inslaw case, which outlines the controversial history of the Promis software. It took three years of investigation to complete the report, due in part to the withholding of evidence by government agencies connected with the theft, modification and distribution of the program, as well as the intimidation of important witnesses. In order to slow down and mislead the investigation there have been arrests, on false charges, of individuals informing the judicial committee, as well
for the SEC wont let me be,they try to shut me down on we CP.
Well if you want Shady, this is what I'll give ya A little bit of weed mixed with some hard liquor Pretie shady eminem... http://www.corporate-ir.net/ireye/ir_site.zhtml?ticker=rsasscript=1901 gross profit? Don't ask.Mergers and Acquisitions will kill me,literally.Trei this... I know that you got a job Ms. Cheney but your husband's heart problem's complicating So the FCC won't let me be or let me be me, so let me see They try to shut me down on MTV But it feels so empty, without me So, come on and dip, rum on your lips Fuck that, cum on your lips, and some on your tits And get ready, cause this shit's about to get heavy I just settled all my lawsuits, FUCK YOU DEBBIE! There,there pete shady,pigs ears in vaseline don' taste THAT bad.
Chicago Bnet.
I will pay 2$ to have ANY Person Impersonating a Govt. servant stabbed in the back. Run over.Shot.Drowned.Burnt,hell whatever,JUST DO IT! This could be the break APster needs.Time to make a stand.Scatter my ashes at Waldheim. Who wants to participate to help form what will be the LAST revolution on earth, the one that'll take down ALL the governments? James Dalton Bell.
Re: Spam blocklists?
Greg Broiles wrote: [...] Osirusoft seems to be a spam blocker, but blocking legitimate mail is going too far. I'd rather have the spam. And I object strongly to third (or fourth) parties deciding what to do with my mail. It's the recipient, or someone acting on their behalf, who's deciding what to do with *their* mail, at least from the recipient's perspective. One of the ISP's I use (only until the contract ends!!) now forces me to employ spam blocking, I have no choice. Quote It is necessary for Freezone Internet to put such measures in place in order to ensure that other mail servers on the Internet do not block traffic originating from Freezone Internet's mail servers. If Freezone Internet were to be blocked, eventually over 90% of your email potentially may not be received or delivered to its recipients. IMO this is just plain wrong. Spam is a problem, no doubt, but it's not evil or anything, and I object to people stopping my email, for whatever reason (DoS attacks are another matter). There used to be an offence of interfering with the Royal Mail (in the UK, with horrendous penalties). While the per-message cost of email is so low that that concept is no longer viable for email, there must be better ways to limit spam. For instance, limiting the number of recipients of an email (the cryptogeek system I'm working on [m-o-o-t] just allows one), or limiting the number of emails one IP can send per day (adjusted for number of users). There was an EU proposal to force spammers (who are not always unwanted) to put [ADV] in the Subject: line, with appropriate penalties if they failed to, but it didn't happen (and we got long-term traffic data retention instead). I don't know offhand how to do it, but having unelected and unaccountable people (making the conditions for) stopping my email is unacceptable. If somehow there was a limit to the number of people an email could be sent to without a willing passing on by a human, that could limit the damage spam could do, and be a better way to do it than involving stopping real (false positive) emails. A slightly drunk (you don't see me here very drunk that often, lucky someone , -- Peter Fairbrother
Re: Spam blocklists?
-- On 14 Aug 2002 at 4:36, Peter Fairbrother wrote: For instance, limiting the number of recipients of an email (the cryptogeek system I'm working on [m-o-o-t] just allows one), or limiting the number of emails one IP can send per day (adjusted for number of users). There was an EU proposal to force spammers (who are not always unwanted) to put [ADV] in the Subject: line, with appropriate penalties if they failed to, but it didn't happen (and we got long-term traffic data retention instead). I don't know offhand how to do it, but having unelected and unaccountable people (making the conditions for) stopping my email is unacceptable. Solution is obvious and has been known for a long time Integrate payment with email. If anyone not on your approved list wants to send you mail, they have to pay you x, where x is a trivial sum, say a cent or two. Spammers wind up sending huge amounts of mail to unmonitored mailboxes, which will make spamming unprofitable. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG DIY+MmmrLQhijrJvvUennc4PKuW3ydzF1s8Phfvc 2thHL52WvLYLBuy1gMvfbs8U1toNuUIIWvvhnySCw
Overcoming the potential downside of TCPA
Lately on both of these lists there has been quite some discussion about TCPA and Palladium, the good, the bad, the ugly, and the anonymous. :) However there is something that is very much worth noting, at least about TCPA. There is nothing stopping a virtualized version being created. There is nothing that stops say VMWare from synthesizing a system view that includes a virtual TCPA component. This makes it possible to (if desired) remove all cryptographic protection. Of course such a software would need to be sold as a development tool but we all know what would happen. Tools like VMWare have been developed by others, and as I recall didn't take all that long to do. As such they can be anonymously distributed, and can almost certainly be stored entirely on a boot CD, using the floppy drive to store the keys (although floppy drives are no longer a cool thing to have in a system), boot from the CD, it runs a small kernel that virtualizes and allows debugging of the TPM/TSS which allows the viewing, copying and replacement of private keys on demand. Of course this is likely to quickly become illegal, or may already, but that doesn't stop the possibility of creating such a system. For details on how to create this virtualized TCPA please refer to the TCPA spec. Joe
Re: Spam blocklists?
From: James A. Donald [EMAIL PROTECTED] Solution is obvious and has been known for a long time Integrate payment with email. If anyone not on your approved list wants to send you mail, they have to pay you x, where x is a trivial sum, say a cent or two. Spammers wind up sending huge amounts of mail to unmonitored mailboxes, which will make spamming unprofitable. There is also Wei Dai's idea of b-money, I think, which requires every incoming mail to solve a problem about hashes. This could be included in the SMTP protocol, so that the server can generate the challenge dinamically (to prevent replays). This would limit the amount of spam without requiring any real money. Mark
Re: Spam blocklists?
None of those things work. Most spammers don't give a shit if you don't receive email. I can attest to this by the slew of spam going to hostmaster, webmaster, and the like on many networks. What they're really selling is ten million addresses and spam software. Even if 9 million of those are bullshit, they couldn't care less. The more things with @ signs in'em the more money they make off clueless businesses. --Kaos-Keraunos-Kybernetos--- + ^ + :NSA got $20Bill/year|Passwords are like underwear. You don't /|\ \|/ :and didn't stop 9-11|share them, you don't hang them on your/\|/\ --*--:Instead of rewarding|monitor, or under your keyboard, you \/|\/ /|\ :their failures, we |don't email them, or put them on a web \|/ + v + :should get refunds! |site, and you must change them very often. [EMAIL PROTECTED] http://www.sunder.net On Wed, 14 Aug 2002, Marcel Popescu wrote: From: James A. Donald [EMAIL PROTECTED] Solution is obvious and has been known for a long time Integrate payment with email. If anyone not on your approved list wants to send you mail, they have to pay you x, where x is a trivial sum, say a cent or two. Spammers wind up sending huge amounts of mail to unmonitored mailboxes, which will make spamming unprofitable. There is also Wei Dai's idea of b-money, I think, which requires every incoming mail to solve a problem about hashes. This could be included in the SMTP protocol, so that the server can generate the challenge dinamically (to prevent replays). This would limit the amount of spam without requiring any real money. Mark
Re: Overcoming the potential downside of TCPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At 10:58 PM 8/13/2002 -0700, Joseph Ashwood wrote: Lately on both of these lists there has been quite some discussion about TCPA and Palladium, the good, the bad, the ugly, and the anonymous. :) However there is something that is very much worth noting, at least about TCPA. There is nothing stopping a virtualized version being created. The only thing to stop that is the certificate on the TCPA's built-in key. You would have to shave one TCPA chip and use its key in the virtualized version. If you distributed that shaved key publicly or just to too many people, then its compromise would likely be detected and its power to attest to S/W configuration would be revoked. However, if you kept the key yourself and used it only at the same frequency you normally would (for the normal set of actions), then the compromise could not be detected and you should be able to run virtualized very happily. That's one of the main problems with TCPA, IMHO, as a security mechanism: that its security depends on hardware tamper resistance -- but at the same time, the TPM needs to be a cheap part, so it can't be very tamper resistant. - Carl -BEGIN PGP SIGNATURE- Version: PGP 6.5.8 iQA/AwUBPVpb2XPxfjyW5ytxEQIaAgCgh72smP3W6qclzgRbNiWt5prdpk4AmwWw aKNdDfQbHWxRVJ3yQ02FxtJb =eEI+ -END PGP SIGNATURE- +--+ |Carl M. Ellison [EMAIL PROTECTED] http://world.std.com/~cme | |PGP: 75C5 1814 C3E3 AAA7 3F31 47B9 73F1 7E3C 96E7 2B71 | +---Officer, arrest that man. He's whistling a copyrighted song.---+
MS on Palladium, DRM and copy-protection (via job ad)
It seems from this article that perhaps MS already had worked out how to do copy protection with Palladium, or at least thinks it possible contrary to what was said at USENIX security: http://www.theregister.co.uk/content/4/26651.html [Palladium related job advert...] Our technology allows content providers, enterprises and consumers to control what others can do with their digital information, such as documents, music, video, ebooks, and software. Become a key leader, providing vision and industry leadership in developing DRM, Palladium and Software Licensing products and Trust Infrastructure Services. control what others can do with [...] software. [...] develop DRM [...] and Software Licensing products. Also again shows that Palladium is quite centrally a DRM platform, which is kind of obvious from the design, and anyway from the naming of the associated patent DRM-OS. Adam - Forwarded message from R. A. Hettinga [EMAIL PROTECTED] - Date: Wed, 14 Aug 2002 08:13:48 -0400 To: Digital Bearer Settlement List [EMAIL PROTECTED] From: R. A. Hettinga [EMAIL PROTECTED] Subject: MS recruits for Palladium microkernel and/or DRM platform http://www.theregister.co.uk/content/4/26651.html MS recruits for Palladium microkernel and/or DRM platform By John Lettice Posted: 13/08/2002 at 10:23 GMT Microsoft's efforts to disassociate Palladium from DRM seem to have hit their first speed bump. Some voices within the company (and we currently believe these voices to be right and sensible) hold the view that Palladium has to be about users' security if it's to stand any chance of winning hearts and minds, and that associating it with protecting the music business' IP will be the kiss of death. So they'll probably not be best pleased by the Microsoft job ad that seeks a group program manager interested in being part of Microsoft's effort to build the Digital Rights Management (DRM) and trusted platforms of the future (Palladium). [...] - End forwarded message -
RE: Polio, DES Crack, and Proofs of Concept
Khoder bin Hakkin[SMTP:[EMAIL PROTECTED]] wrote: In the most recent _Science_ some biologists gripe that the scientists who synthesized infectious poliovirus from its description were not doing anything novel, just a prank. Any biologist would have known that, since you could concatenate nucleotide strings, and since polio needs nothing besides DNA (eg no enzymes) to be infectious, obviously you can synth polio. This is *remarkably* similar to cognescenti reactions to the DES Crack project. Yes, it was obvious it would work, and it was largely unnecessary (from a security-planning perspective) to actually do it. But it was proof-of-concept. Like synthesizing polio. Yes, it was obvious to any technically educated person. Nevertheless, until it was done, there were USG officials claiming that it was impossible; that any real DES cracker would melt down, and we ought to be happy with 56 bit DES. Politicians and government employees lie, and they usually get away with it. Of course, the very statement that '56 bit DES is uncrackable, so there is no need for you to export anything better' is inherently self-contradictory - if it's really uncrackable, then there is not rational reason not to allow export of 128 or 512 bit symmetrical encryption as well - uncrackable is uncrackable, after all. I started the DES crack project after the USG had magnaminiously proposed raising the limit for exportable key lengths from 40 to 56 bits. I got RSA to put up the money, and worked with RSA Labs on the format of the challenges. They succeeded in every way I could have wanted. In the real world, one conclusive demo is worth a thousand theoretical papers. Peter Trei
Re: Overcoming the potential downside of TCPA
Joseph Ashwood wrote: Lately on both of these lists there has been quite some discussion about TCPA and Palladium, the good, the bad, the ugly, and the anonymous. :) However there is something that is very much worth noting, at least about TCPA. There is nothing stopping a virtualized version being created. There is nothing that stops say VMWare from synthesizing a system view that includes a virtual TCPA component. This makes it possible to (if desired) remove all cryptographic protection. Of course such a software would need to be sold as a development tool but we all know what would happen. Tools like VMWare have been developed by others, and as I recall didn't take all that long to do. As such they can be anonymously distributed, and can almost certainly be stored entirely on a boot CD, using the floppy drive to store the keys (although floppy drives are no longer a cool thing to have in a system), boot from the CD, it runs a small kernel that virtualizes and allows debugging of the TPM/TSS which allows the viewing, copying and replacement of private keys on demand. Of course this is likely to quickly become illegal, or may already, but that doesn't stop the possibility of creating such a system. For details on how to create this virtualized TCPA please refer to the TCPA spec. What prevents this from being useful is the lack of an appropriate certificate for the private key in the TPM. Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ Available for contract work. There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit. - Robert Woodruff
TCPA/Palladium user interst vs third party interest (Re: responding to claims about TCPA)
The remote attesation is the feature which is in the interests of third parties. I think if this feature were removed the worst of the issues the complaints are around would go away because the remaining features would be under the control of the user, and there would be no way for third parties to discriminate against users who did not use them, or configured them in given ways. The remaining features of note being sealing, and integrity metric based security boot-strapping. However the remote attestation is clearly the feature that TCPA, and Microsoft place most value on (it being the main feature allowing DRM, and allowing remote influence and control to be exerted on users configuration and software choices). So the remote attesation feature is useful for _servers_ that want to convince clients of their trust-worthiness (that they won't look at content, tamper with the algorithm, or anonymity or privacy properties etc). So you could imagine that feature being a part of server machines, but not part of client machines -- there already exists some distinctions between client and server platforms -- for example high end Intel chips with larger cache etc intended for server market by their pricing. You could imagine the TCPA/Palladium support being available at extra cost for this market. But the remaining problem is that the remote attesation is kind of dual-use (of utility to both user desktop machines and servers). This is because with peer-to-peer applications, user desktop machines are also servers. So the issue has become entangled. It would be useful for individual liberties for remote-attestation features to be widely deployed on desktop class machines to build peer-to-peer systems and anonymity and privacy enhancing systems. However the remote-attestation feature is also against the users interests because it's wide-spread deployment is the main DRM enabling feature and general tool for remote control descrimination against user software and configuration choices. I don't see any way to have the benefits without the negatives, unless anyone has any bright ideas. The remaining questions are: - do the negatives out-weigh the positives (lose ability to reverse-engineer and virtualize applications, and trade software-hacking based BORA for hardware-hacking based ROCA); - are there ways to make remote-attestation not useful for DRM, eg. limited deployment, other; - would the user-positive aspects of remote-attestation still be largely available with only limited-deployment -- eg could interesting peer-to-peer and privacy systems be built with a mixture of remote-attestation able and non-remote-attestation able nodes. Adam -- http://www.cypherspace.org/adam/ On Sat, Aug 10, 2002 at 04:02:36AM -0700, John Gilmore wrote: One of the things I told them years ago was that they should draw clean lines between things that are designed to protect YOU, the computer owner, from third parties; versus things that are designed to protect THIRD PARTIES from you, the computer owner. This is so consumers can accept the first category and reject the second, which, if well-informed, they will do. If it's all a mishmash, then consumers will have to reject all of it, and Intel can't even improve the security of their machines FOR THE OWNER, because of their history of security projects that work against the buyer's interest, such as the Pentium serial number and HDCP. [...]
Re: TCPA/Palladium user interst vs third party interest (Re: responding to claims about TCPA)
Adam Back wrote: The remote attesation is the feature which is in the interests of third parties. I think if this feature were removed the worst of the issues the complaints are around would go away because the remaining features would be under the control of the user, and there would be no way for third parties to discriminate against users who did not use them, or configured them in given ways. The remaining features of note being sealing, and integrity metric based security boot-strapping. However the remote attestation is clearly the feature that TCPA, and Microsoft place most value on (it being the main feature allowing DRM, and allowing remote influence and control to be exerted on users configuration and software choices). So the remote attesation feature is useful for _servers_ that want to convince clients of their trust-worthiness (that they won't look at content, tamper with the algorithm, or anonymity or privacy properties etc). So you could imagine that feature being a part of server machines, but not part of client machines -- there already exists some distinctions between client and server platforms -- for example high end Intel chips with larger cache etc intended for server market by their pricing. You could imagine the TCPA/Palladium support being available at extra cost for this market. But the remaining problem is that the remote attesation is kind of dual-use (of utility to both user desktop machines and servers). This is because with peer-to-peer applications, user desktop machines are also servers. So the issue has become entangled. It would be useful for individual liberties for remote-attestation features to be widely deployed on desktop class machines to build peer-to-peer systems and anonymity and privacy enhancing systems. However the remote-attestation feature is also against the users interests because it's wide-spread deployment is the main DRM enabling feature and general tool for remote control descrimination against user software and configuration choices. I don't see any way to have the benefits without the negatives, unless anyone has any bright ideas. The remaining questions are: - do the negatives out-weigh the positives (lose ability to reverse-engineer and virtualize applications, and trade software-hacking based BORA for hardware-hacking based ROCA); - are there ways to make remote-attestation not useful for DRM, eg. limited deployment, other; - would the user-positive aspects of remote-attestation still be largely available with only limited-deployment -- eg could interesting peer-to-peer and privacy systems be built with a mixture of remote-attestation able and non-remote-attestation able nodes. A wild thought that occurs to me is that some mileage could be had by using remotely attested servers to verify _signatures_ of untrusted peer-to-peer stuff. So, you get most of the benefits of peer-to-peer and the servers only have to do cheap, low-bandwidth stuff. I admit I haven't worked out any details of this at all! Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ Available for contract work. There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit. - Robert Woodruff