FREE 30 Day Sample of HGH !

2002-08-21 Thread Hossein Arnett

Hello, [EMAIL PROTECTED]Human Growth Hormone Therapy
Lose weight while building lean muscle massand reversing the ravages of aging all at once.
 
As seen on NBC, CBS, and CNN, and even Oprah! The health
discovery that actually reverses aging while burning fat,
without dieting or exercise! This proven discovery has even
been reported on by the New England Journal of Medicine.
Forget aging and dieting forever! And it's Guaranteed!

  
Lose WeightBuild Muscle ToneReverse Aging
Increased Libido
  Duration Of Penile Erection
  
  
Healthier Bones
Improved MemoryImproved skinNew Hair GrowthWrinkle Disappearance 

  Visit Our Web Site and Learn The Facts : Click Here
  
  If the above link is not operational, Please Click 
  Here again.
  
  
  You are receiving this email as a subscriber
  to the Opt-In America Mailing List. 
  To remove yourself from all related maillists,
  just Click 
  Here



Shrubs political and psychological defeat.

2002-08-21 Thread Matthew X

Well barr's barred...there may be a god...Washington Retreating on Iraq Aug 19
The Bush administration has begun to back down from plans for a near-term 
attack on Iraq. The controversial plan was shredding the coalition against 
al Qaeda, which Washington needs in battling the group. But the Bush 
administration's retreat from Iraq, although necessary, forces it to manage 
a political and psychological defeat.
RR,don't go there,girlfriend.http://www.stratfor.com/
crypto revisionism
Since 1974 much has been written about the cryptographic success achieved 
at Bletchley Park, and dozens of participants and historians have given 
their version of what was accomplished. Bennett includes separate short 
entries for GCCS, GCHQ, Enigma, Bletchley Park and ULTRA, longer ones for 
Alan Turing, Sir Edward Travis, Alistair [sic] Denniston, and a four page 
summary under 'United Kingdom'. Evidently the author rightly considers 
Britain's cryptographic effort to be of some significance, yet his very 
confused account seriously misdefines some common terms, and consistently 
refers to the Enigma machine in capitals, as though Enigma is itself a 
codename.
Much the same can be said for Bennett's treatment of VENONA, which is 
seriously flawed. Suffice to say that his assertion that the Army Security 
Agency began work on the Soviet intercepts in 1943 is somewhat wide of the mark
http://www.cicentre.com/BK/BOOKS_West_Bennett.html




Reverse Aging 10 to 20 Years With HGH

2002-08-21 Thread Debbie Garg

Hello, [EMAIL PROTECTED]Human Growth Hormone Therapy
Lose weight while building lean muscle massand reversing the ravages of aging all at once.
 
As seen on NBC, CBS, and CNN, and even Oprah! The health
discovery that actually reverses aging while burning fat,
without dieting or exercise! This proven discovery has even
been reported on by the New England Journal of Medicine.
Forget aging and dieting forever! And it's Guaranteed!

  
Lose WeightBuild Muscle ToneReverse Aging
Increased Libido
  Duration Of Penile Erection
  
  
Healthier Bones
Improved MemoryImproved skinNew Hair GrowthWrinkle Disappearance 

  Visit Our Web Site and Learn The Facts : Click Here
  
  If the above link is not operational, Please Click 
  Here again.
  
  
  You are receiving this email as a subscriber
  to the Opt-In America Mailing List. 
  To remove yourself from all related maillists,
  just Click 
  Here



Re: Bankrupt Digicash Made $481K in 1999

2002-08-21 Thread Greg Broiles

At 12:12 PM 8/20/2002 -0700, Steve Schear wrote:
At 12:33 PM 8/20/2002 -0700, you wrote:
Digicash 1999 IRS forms:

   http://cryptome.org/digicash-481k.htm

Perhaps its my ignorance, but doesn't this form merely mean DC paid the 
Chaum Family Trust $481K, not  that the company made $481K?

(since the PKI market's been in the toilet, I've been learning about taxation)

Even that assumes too much - there wasn't necessarily a transfer of money. 
If, for example (and this is purely hypothetical), Chaum had agreed to work 
for DC in exchange for 1,000,000 shares of stock, and $481K was the fair 
market value of those shares, then it would be proper to issue a 1099-MISC 
with that amount in Box 3 and Chaum would be taxed on that $481K as income, 
even though he received it as stock instead of cash.

(If the circumstances were different, the income might be expected to show 
up in Box 7, nonemployee compensation; but here it's in Box 3, which 
should transfer directly either to Line 21 on the 1040 for miscellaneous 
income, or onto a Schedule C, assuming it's an individual taxpayer, which 
isn't the case here.)

This sort of 1099 is also what you'd expect to see going to the recipient 
of cash as damages following or related to a lawsuit.

If Digicash loaned money to Chaum and later forgave the debt (not unusual, 
where a founder or other important employee wants to exercise stock options 
early but doesn't have cash for the exercise), Chaum would be obligated to 
report the forgiven debt as income but a 1099 would not be required; that 
doesn't stop people from sending them anyway.


--
Greg Broiles -- [EMAIL PROTECTED] -- PGP 0x26E4488c or 0x94245961




RE: Seth on TCPA at Defcon/Usenix

2002-08-21 Thread Bill Stewart

At 12:58 AM 08/11/2002 -0700, Lucky Green wrote:

BTW, does anybody here know if there is still an email time stamping
server in operation? The references that I found to such servers appear
to be dead.

The canonical timestamping system was Haber  Stornetta's work at
Bellcore, commercialized at Surety.com.  The site is current,
has some Digital Notary Service and Secure Email things on it,
and something much more amazing - it looks like they received
$7M in financing in June :-)

There's a nice collection of pointers to timestamping systems at
http://saturn.tcs.hut.fi/~helger/crypto/link/timestamping/
though I don't know how current the references are -
the page was last updated 14.8.2002.

The free PGP-based system http://www.itconsult.co.uk/stamper.htm
has a news item from 04-Jun-02, which comments that,
although they haven't posted any news items in five years,
they've been in continuous operation




Shrub wargaming at crawford.

2002-08-21 Thread Matthew X

http://www.makethemaccountable.com/real/
let it load,let it load,let it load.
uninalienable rights.HAHAHA!
Unintelligible maybe.hirstory can be fun,check this out...My trip to Asia 
begins here in Japan for an important reason. (Applause.) It begins here 
because for a century and a half now, America and Japan have formed one of 
the great and enduring alliances of modern times.
All in all, it's been a fabulous year for Laura and me.
STOP! Your killing me.




Re: alternate dos pgp client?

2002-08-21 Thread Adam Back

I put together a list of openpgp related software at:

http://www.cypherspace.org/openpgp/

this includes library only code, and add on software.

Not sure about your questions about key versions, but I forwarded it
to Ulf Moeller and Len Sassaman (current maintainer of mix3).

From what I've seen mix3 (pgptest app) is the closest to providing a
command line.  There was also Tom Zerucha's reference openPGP code,
which is command line but it's alpha level code I think and no longer
maintained.

Adam

On Tue, Aug 20, 2002 at 09:28:47PM -0500, Anonymous wrote:
 The latest release of Mixmaster claims to be an OpenPGP enhancement
 release.  I looked at the source more closely, and it seems to contain an
 entire pgp implementation.  I had previously thought it made external calls
 to either pgp or gnupg.
 
 This got me thinking - has anyone tried hacking mixmaster to be a pgp
 client?  I have compiled it under DOS before, so I know that is possible.
 Does anyone know if mixmaster can use 'non-legacy' RSA keys?  Is there any
 pgp functionality that it lacks?  I am looking for a pgp implementation that
 will run on DOS, but will also be compatible with modern key types.



HEP AYNI YEMEKLERDEN SIKILDINIZ MI?

2002-08-21 Thread Yemek zevki

Sofralariniz $enlenecek...
Rutin yemek çesitlerinden kurtulacaksiniz.
Word formatinda hazirlanmis yaklasik 40 kategori ve 3000 adet tariften 
olusan 5 cilt yemek kitabi serisi sadece ama sadece 10.000.000.- (onmilyon)

Örnek dosya ve ayrintili bilgi için;

http://www.geocities.com/yemekzevki3003/


Adreslerini ziyaret ediniz...



Re: Chaum's unpatented ecash scheme

2002-08-21 Thread Ben Laurie

Nomen Nescio wrote:
 David Chaum gave a talk at the Crypto 2002 conference recently in which
 he briefly presented a number of interesting ideas, including an approach
 to digital cash which he himself said would avoid the ecash patents.
 
 The diagram he showed was as follows:
 
 
 Optimistic Authenticator
 
  z = x^s
 
 Payer f(m)^a z^b Bank
   -
 
 [f(m)^a z^b]^s
   -
 
m, f(m)^s
   -
 
 
 It's hard to figure out what this means, but it bears resemblance to a
 scheme discussed on the Coderpunks list in 1999, a variant on a blinding
 method developed by David Wagner.  See
 http://www.mail-archive.com/coderpunks@toad.com/msg02323.html for a
 description, with a sketch of a proof of blindness at
 http://www.mail-archive.com/coderpunks@toad.com/msg02387.html and
 http://www.mail-archive.com/coderpunks@toad.com/msg02388.html.
 
 In Chaum's diagram it is not clear which parts of the key are private and
 which public, although z is presumably public.  Since the bank's action
 is apparently to raise to the s power, s must be secret.  That suggests
 that x is public.  However Chaum's system seems to require dividing by
 (z^b)^s in order to unblind the value, and if s is secret, that doesn't
 seem possible.
 
 In Wagner's scheme everything was like this except that the bank's key
 would be expressed as x = z^s, again with x and z public and s secret.
 f(m) would be a one-way function, which gets doubly-blinded by being
 raised to the a power and multiplied by z^b, where a and b are randomly
 chosen blinding factors.  The bank raises this to its secret power s,
 and the user unblinds to form f(m)^s.  To later deposit the coin he does
 as in the third step, sending m and f(m)^s to the bank.
 
 For the unblinding, the user can divide by (z^b)^s, which equals z^(b*s),
 which equals (z^s)^b, which equals x^b.  Since x is public and the user
 chose b, he can unblind the value.  Maybe the transcription above of the
 Chaum scheme had a typo and it was actually similar to the Wagner method.

Sounds like it.

 
 Chaum commented that the payer does not receive a signature in this
 system, and that he doesn't need one because he is protected against
 misbehavior by the bank.  This is apparently where the scheme gets
 its name.

Note that the scheme as described (and corrected) is vulnerable to 
marking by the bank, and so is not anonymous. This is discussed and 
fixed in my paper on Lucre 
(http://anoncvs.aldigital.co.uk/lucre/theory2.pdf).

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/

Available for contract work.

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff




Discouraging credential sharing with Mojo

2002-08-21 Thread Anonymous

Some credential issuing schemes, such as those from Brands as well as from
Camenisch  Lysyanskaya, try to avoid credential sharing by embedding
into the credential some secret which is important and valuable to the
credential holder.  Then if the credential is shared, the recipient
learns the important secret, to the detriment of the person sharing
the credential.  So he won't do it.

The problem is that there don't seem to be any secrets that will work
well in discouraging sharing.  The most obvious is a credit card number,
but this has a number of problems: some people don't have credit cards;
people could cancel their credit cards after receiving the credentia;
and underground hackers have access to thousands of stolen credit card
numbers that they don't mind sharing.

Clearly we need a new approach.  Here is a suggestion for a simple
solution which will give everyone an important secret that they will
avoid sharing.

At birth each person will be issued a secret key.  This will be called
his Mojo.  He will also get the associated public key which will assist
in protocols which involve commiting to his Mojo.  The public key can
be revealed but the Mojo should be kept secret at all costs.

Then in a credential issuing protocol, the user embeds his Mojo into
his credential in a provable way.  It is important that the protocol
not reveal the Mojo to the issuer, but rather that some kind of zero
knowledge proof be used so that the issuer is confident that sharing
the credential will reveal the Mojo.

Now all that is needed is a simple change to the law so that knowing
someone's Mojo makes him your slave.

That is, if you know someone's Mojo you own him.  You get access to all
his money and all his assets.  You can force him to work for you and
take all he earns.  You can mistreat and even kill him.  If he tries to
escape, the Runaway Mojo Slave act will commit the government to tracking
him down and returning him to you.

With this small change to the law, everyone will be gifted with an
important secret which they can use to bind and commit themselves in
a variety of protocols.  By embedding their Mojo into their secret
credentials, they can assure the credential issuer that the credential
won't be shared.  Mojo can also serve as an is a person credential
and allow for secure electronic voting and other protocols where each
person should only participate once.

Please join me in supporting this important reform.

Just say, I want my Mojo!




Re: Signing as one member of a set of keys

2002-08-21 Thread Len Sassaman

On Sat, 17 Aug 2002, Anonymous wrote:

 *** COULD SOMEONE PLEASE FOLLOW THE STEPS ABOVE AND PUT THE ringsig.c,
 ringsign, ringver, AND sigring.pgp FILES ON A WEB PAGE SO THAT PEOPLE
 CAN DOWNLOAD THEM WITHOUT HAVING TO GO THROUGH ALL THESE STEPS? ***

The files are available at:

http://www.abditum.com/~rabbi/ringsig/

Also, if you'd like to send me a more detailed blurb for the webpage, I'd
be happy to put it up. Otherwise, this will have to do.

 9.  Please report whether you were able to succeed, and if not, which step
 failed for you.

I just ran into a bunch of errors when trying to compile with OpenSSL
0.9.7beta3. I'm debugging now...


--Len.




Re: IETF WG on SMTP feeler...

2002-08-21 Thread Morlock Elloi

 There has been an awful lot of discussion on this here in CP land, 
 so maybe some responses too?
 
 A good place to put forward suggestions to make hard calculations
 a requirement of delivery or maybe some digicash to pay for it?

SMTP will never change, assuming it is a pipe dream. There is no record of
basic internet protocol ever being changed away from compatibility (and guess
what, spammers won't upgrade.) Looks like desperate dotcommies.

If you want to be seen by the world, the world will send you shit. No way
around it.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
HotJobs - Search Thousands of New Jobs
http://www.hotjobs.com




The state wants your 'buddy' list

2002-08-21 Thread Major Variola (ret)

Consider the privacy implications of requiring mothers to list all mates
with the State..


http://www.latimes.com/news/nationworld/nation/la-na-adopt21aug21005115.story?coll=la%2Dheadlines%2Dnation%2Dmanual



Florida Wants All the Details From Mothers in Adoption Notices
   Rule: Law stirs furor as women must publicly list
sexual partners before giving up their children.

 By JOHN-THOR DAHLBURG, TIMES STAFF WRITER

 MIAMI -- Can a woman be compelled by law to publish
details of her
 sex life in the newspaper, including the names of
the men she has been
 intimate with? In Florida she can, if she is
offering her child for adoption.

 The law, intended to give biological fathers a
greater say in the adoption
 process, has stirred controversy nationwide.
Opponents call it a
 latter-day scarlet letter meant to shame
promiscuous women. Even the
 state senator who championed the measure admits
that it has had
 unintended results.

 The law is


anti-adoption,

anti-family,
 anti-child,


anti-woman,
 contended
Nashville
 attorney
Bob Tuke,
 president
of the
 American
Academy
 of Adoption

 Attorneys.
There is
 no other
law like it
 in
America.

 Jeffery M.
Leving, a Chicago attorney and
 advocate
for fathers' rights, countered: I like
 the law
because it recognizes that fathers are
 parents too. It recognizes that they should have
notice before a child is given away forever.

 Under the law, if a Florida mother seeks to give up
her child for adoption and a search has failed to
 turn up the father, she is required to publish a
legal notice giving her full name, height, weight and
 coloring--plus the names or descriptions of every
possible father and the dates and places of their
 sexual encounters.

 The ads are supposed to run once a week for four
weeks and must appear in newspapers in any city
 or county where the child might have been
conceived.

 This is such an intrusion of a woman's privacy and
of the privacy of the men who were involved with
 her, said Charlotte H. Danciu, a Boca Raton, Fla.,
attorney who specializes in adoptions and has
 gone to court to challenge the law. And the men
named in the newspaper may not even be the
 father.

 The goal of the law, which was passed
overwhelmingly by the Florida Legislature last year, is to
 locate as many biological fathers as possible and
prevent the bitter, drawn-out battles that can break
 up adoptive families after children have been
placed.

 But when told of the statute's publication clause,
some pregnant women have walked out of Danciu's
 office and had abortions, the lawyer said.

 On July 24, in response to a suit brought by
Danciu, Palm Beach County Circuit Judge Peter Blanc
 ruled that the law should not apply to rape
victims. The lawyer is representing six clients, including a
 12-year-old rape victim, who want to offer their
offspring for adoption but haven't been able to
 locate the fathers or don't know their identities.
Danciu plans to appeal to have the law declared
 unconstitutional for adults and minors alike.

 Under the judge's ruling, if there was consensual
sex, which in the case of one of my clients involves
 a 14-year-old who slept with numerous men and boys
in her school, she would have to put these ads
 in her hometown newspaper, with their names, plus
their descriptions: eye color, hair color, weight,
 height, Danciu said. It's repulsive. I refuse to
do it.

 The law's chief sponsor was state Sen. Walter
Skip Campbell Jr., a Democrat from Broward
   

Re: Discouraging credential sharing with Mojo

2002-08-21 Thread Meyer Wolfsheim

On Wed, 21 Aug 2002, Anonymous wrote:

 Clearly we need a new approach.  Here is a suggestion for a simple
 solution which will give everyone an important secret that they will
 avoid sharing.

 At birth each person will be issued a secret key.  This will be called
 his Mojo.

[snip]

 Now all that is needed is a simple change to the law so that knowing
 someone's Mojo makes him your slave.

Virtually all cultures have held the mythological belief that all beings
with souls have a True Name, and that knowledge of one's true name
leads to power over him.

(This isn't really surprising, since the True Name concept features
prominently in Babylonian mythology, from which the myths of nearly all
other civilizations have sprung.)

For instance, knowing the True Name of a god could result in one being
granted godly powers, or immortality (cf: Isis learning the True Name of
Ra in Egyptian mythology). In Greek (and neo-pagan) nature myths, speaking
the true name of a landscape object could give the speaker protection or
favors from the spirit inhabiting the object. In Hebrew, Essene, and
Islamic mythology, as well as Celtic, Pacific Island, and Norse
tales, the True Name theme appears repeatedly. Etc.

It sounds like you wish to revive this superstition, but instead make it
cryptographically enforcable. Trust in the laws of mathematics and men,
not of gods?

Welcome to the Church of Strong Cryptography.

 Please join me in supporting this important reform.

 Just say, I want my Mojo!

Sometimes, I wonder if some of these posts are not intended to be as
ironic as they appear.


-MW-




cypherpunks@minder.net

2002-08-21 Thread [EMAIL PROTECTED]

±©Á¦ÓªÏú´òÔìÍøÂçйó


±©Á¦ÓªÏúÊÇÓÉFBGÉÌÒµÁªÃË»ãͬ¹úÄÚÖøÃûÓªÏúר¼Ò¡¢ÍøÂçѧÕߣ¬¸ù¾Ý¹úÄÚÆóÒµÉè¼ÆÇé¿öÍÆ
³öµÄÒ»ÖÖȫеÄÉÌÎñÓªÏúģʽ£¬¾ßÓгɱ¾µÍ¡¢Æô¶¯¿ì¡¢Ð§¹ûÏÔÖø¡¢¿É²Ù×÷ÐÔÇ¿µÄÌص㣬Ìرð
ÊÊÓÃÓÚ¹úÄÚ¹ã´óÖÐСÆóÒµ¡¢¿ìËٳɳ¤ÐÍÆóÒµ¡¢µç×ÓÉÌÎñÍøÕ¾ºÍSOHO×ÔÓÉÖ°ÒµÈËÊ¿¡¢¸öÌå´´ÒµÍÅ
¶Ó¡£
e¿á±©Á¦ÓªÏúÊǹúÄÚÊ×Ì×ÓÉFBGÉÌÒµÁªÃËÕýʽÊÚȨÍƳöµÄ´óÐ͵ç×ÓÉÌÎñÍƹãÈí¼þϵÁУ¬
Ê×Åú¼Æ»®ÍƳöÒÔϲúÆ·£º
::e¿á±©Á¦¹ã¸æ£º±»ÓþΪʷÉÏ×îÇ¿º·µÄÖÐÎÄÔÚÏß¹ã¸æϵͳ£ºº£Á¿ÖÐÎÄBBSÊý¾Ý¿â£¬³¬¹ýÈýÍò
¸ö´¿ÖÐÎÄÄ¿±êÂÛ̳£¬ÊÇÄ¿Ç°È«ÇòΨһÄܹ»ÊµÏÖÖÐÎÄÂÛ̳ÍòվȺ·¢µÄµç×ÓÉÌÎñÍƹãϵͳ£»´©Í¸
ÄÜÁ¦Ç¿£¬²ÉÓÃ×ÔÖ÷¿ª·¢¶àÖÖ¶¯Ì¬±ä»»¼¼Êõ£¬Äܹ»³É¹¦·¢²¼ÐÂÀË¡¢Î÷½¡¢263¡¢ÙøÕþ¡¢¹è¹È¶¯Á¦¡¢
ÊÀ½çÂÛ̳µÈ´óÐͳ¬ÈËÆøÍøÂçÂÛ̳£»Îȶ¨ÐԺ㬶À¼Ò²ÉÓöàÒýÇæ·¢²¼¼¼Êõ£¬Ö§³Ö¶ÏµãÐø·¢¡£
::e¿á±©Á¦ÓÊÏ䣺¾Þ¿áµÄÈ«ÖÇÄÜ»¯µç×ÓÓʼþËÑË÷ϵͳ£¬ÒµÄÚÊ×¼ÒÖ§³ÖKEYWORDÅúÁ¿ËÑË÷£¬
È«×Ô¶¯ÊµÏְбêʽ¶¨ÏòËÑË÷£¬Îȶ¨ÐԺã¬Ö§³Ö¶ÏµãËÑË÷¡£
::e¿á±©Á¦ËÑË÷£º£¨¼´½«ÍƳö£©
::e¿á±©Á¦µÇ¼£º£¨¼´½«ÍƳö£©
::e¿á±©Á¦Óʼþ£º£¨¼´½«ÍƳö£©

FBGÉÌÒµÁªÃËͬʱ¼Æ»®ÍƳö±©Á¦ÓªÏúϵÁдÔÊé
::¡¶ÉÌÕ½¹î¼Æ¡·£­£­¶ÀÒ»ÎÞ¶þµÄ·½·¨ÍùÍùÄÜÊÕµ½ÒâÏë²»µ½µÄЧ¹û
::¡¶¹ÜÀíÐÂÄÔ¡·£­£­Ó°ÏìÆóÒµ×îÉîÕßĪ¹ýÓÚÆóÒµµÄ¹ÜÀíÕß
::¡¶°Ë°Ù°ëÁ¬Ëø¼ÓÃ˲ݰ¸¡· 
::¡¶ÉÌÕ½Ó®¼Ò¡·£­£­Ö»ÓÐÓ®¼Ò²ÅÄÜÉú´æ
::¡¶ÓªÏúÌìÏ¡· 
::¡¶¹ÜÀí¸ßÊÖ¡·--162Ìõ¶¥¼â¸ßÊֵĹÜÀí¼¼ÇÉ
::¡¶¾­Óª¸ßÊÖ¡·£­£­Ò»¸öСÖ÷Ò⣬ÍùÍù»áÓ®µÃÎÞ¾¡µÄʤȯ
::¡¶ÓªÏúXµµ°¸Ö®Êг¡ºÚ¶´¡·
::¡¶ÓªÏúxµµ°¸Ö®±øÐйîµÀ¡·
::¡¶¹ã¸æxµµ°¸¡·
::¡¶Ò»·ÖÖÓMBAÖ®ÉÌÕ½Ó®¼Ò¡·
::¡¶Ò»·ÖÖÓMBAÖ®¹ÜÀíÐÂÄÔ¡·
::¡¶Ò»·ÖÖÓMBAÖ®ÉÌÒµÁìÐä¡·
::¡¶Ò»·ÖÖÓMBAÖ®¾­ÓªºÚ¶´¡·


¸ü¶à×ÊÁÏ£¬Çëä¯ÀÀ¡°¿á¿ÍÌìÏ¡±ÍøÕ¾
=
=  
=  Ö÷Á¦Õ¾µã£ºhttp://www.eChinaEdu.com
=  ¾µÏñÕ¾µã£ºhttp://www.eChinaEdu.vicp.net
=  ÂÛ̳վµã£ºhttp://qlong2008.xilubbs.com
=
=
±¾×ÊÁϲÉÓá°±©Á¦ÓªÏú¡±µç×ÓÉÌÎñÍƹãϵͳ·¢²¼

ÍøÂçËÄ´ó¿áµ©

±©Á¦ÓªÏúÊÇÓÃÀ´×¬Ç®µÄ
ħ¹íÓ¢ÓïÊÇÓÃÀ´³ö¹úµÄ
ÊýÂë¿áÁúÊÇÓÃÀ´°ç¿áµÄ
Ò°ÂùÅ®ÓÑÊÇÓÃÀ´HAPPYµÄ
Á÷Ã¥ÍÃ×ÓÊÇÓÃÀ´PLAYµÄ



Create a PAYCHECK with your COMPUTER

2002-08-21 Thread EricEl

Good Morning: -

You get emails every day, offering to show you how to make money.
Most of these emails are from people who are NOT making any money.
And they expect you to listen to them?

Please, if you want to make money with your computer, then you should
hook up with a group that is actually DOING it.  We are making
a large, continuing income every month.  What's more - we will
show YOU how to do the same thing.  How are we different?

This business is done completely by internet and email, and you
can even join for free to check it out first.  If you can send
an email, you can do this.

How much are we making?  Below are a few examples.  These are
real people, and most of them work at this business part-time.
But keep in mind, they do WORK at it - I am not going to 
insult your intelligence by saying you can sign up, do no work,
and rake in the cash.  That kind of job does not exist.  But if
you are willing to put in 10-12 hours per week, this might be
just the thing you are looking for.

N. Gallagher: $3000 per month
T. Hopkins: $1000 per month
S. Johnson: $6000 -$7000 per month
V. Patalano: $2000 per month
M. South: $5000 per month
J. Henslin: $7000 per month 

This is not income that is determined by luck, or work that is
done FOR you - it is all based on your effort.  But, as I said,
there are no special skills required.  And this income is RESIDUAL -
meaning that it continues each month (and it tends to increase
each month also).

Interested?  I invite you to find out more.  You can get in as a
free member, at no cost, and no obligation to continue if you
decide it is not for you.  We are just looking for people who still
have that burning desire to find an opportunity that will reward
them incredibly well, if they work at it.

To grab a FREE ID#, simply reply to: [EMAIL PROTECTED]
and write this (exact) phrase: Grab me a free membership
Be sure to include your:
1. First name
2. Last name
3. Email address (if different from above)

We will confirm your position and send you a special report
as soon as possible, and also Your free Member Number.

That's all there's to it.  So please check us out and prove to yourself that
 we are real. We'll then send you info, and you can make up your own mind.

Looking forward to hearing from you!
Sincerely, 

Eric Ratley


Note:  After having several negative experiences with network
marketing companies I had pretty much given up on them.
This is different - there is value, integrity, and a
REAL opportunity to have your own home-based business...
and finally make real money on the internet.

Don't pass this up..you can sign up and test-drive the
program for FREE.  All you need to do is get your free
membership.





Unsubscribing:  Send a blank email to: [EMAIL PROTECTED] with
Remove in the subject line.
1489Kzqn0-141vspv9914xYyv2-983tqFk3157TeSN4-199GgrT2938DdLs9-961rUl62




ADV: Bullet Proof Web Hosting Service

2002-08-21 Thread bulletproof


  

  

  

  Bullet Proof Web Hosting

  

  

  
  ¡ñ If
  you want to promote your web site via commercial email, bullet proof web
  hosting is a must! As you may already know, many web hosting companies
  have Terms of Service (TOS) or Acceptable Use Policies (AUP) against the
  delivery of emails advertising or promoting your web site. If your
  web site host receives complaints or discovers that your web site has been
  advertised in email broadcasts, they may disconnect your account and shut
  down your web site.
  ¡ñ We
  offer reliable bulk email friendly web hosting services. You can now
  have the peace of mind knowing that your web site is secure during your
  email marketing campaigns.
  

  


  

  

  

  
  

  
  Bullet Proof Web Hosting 100% Guaranteed!
  ¡ñ This
  means you can send bulk email
  with your website address in it, and your website will not get shut
  down! I'm sure you've had a website shut down because you listed it in
  your bulk emails.

  
  
¡ñ
  For more
  information, please Email us at  [EMAIL PROTECTED]
  ¡ñ
  






ADV: Bullet Proof Web Hosting Service

2002-08-21 Thread bulletproof


  

  

  

  Bullet Proof Web Hosting

  

  

  
  ¡ñ If
  you want to promote your web site via commercial email, bullet proof web
  hosting is a must! As you may already know, many web hosting companies
  have Terms of Service (TOS) or Acceptable Use Policies (AUP) against the
  delivery of emails advertising or promoting your web site. If your
  web site host receives complaints or discovers that your web site has been
  advertised in email broadcasts, they may disconnect your account and shut
  down your web site.
  ¡ñ We
  offer reliable bulk email friendly web hosting services. You can now
  have the peace of mind knowing that your web site is secure during your
  email marketing campaigns.
  

  


  

  

  

  
  

  
  Bullet Proof Web Hosting 100% Guaranteed!
  ¡ñ This
  means you can send bulk email
  with your website address in it, and your website will not get shut
  down! I'm sure you've had a website shut down because you listed it in
  your bulk emails.

  
  
¡ñ
  For more
  information, please Email us at  [EMAIL PROTECTED]
  ¡ñ
  






For Telecom Workers, Burst Of Bubble Takes Heavy Toll (was: employment market for applied cryptographers?)

2002-08-21 Thread Steve Schear

[Because of its relevance and since most list members are probably not WSJ 
subscribers, I've taken the liberty of posting the entire article. sds]

 From the Wall Street Journal --

For Telecom Workers, Burst Of Bubble Takes Heavy Toll
By REBECCA BLUMENSTEIN

RICHARDSON, Texas -- Two years ago, J. Michael Dugan spread the word to
his fellow optical engineers in North Texas that he was starting a company
that could make them all rich. The telecommunications business was hot,
and optical engineers were the hottest commodities of them all, commanding
big signing bonuses and six-figure salaries.

Mr. Dugan, a burly Texan with more than 20 years under his belt at the
giant French equipment maker Alcatel SA, was persuasive. So many flocked
to his annual summer party in July 2000 to learn more about Latus
Lightworks that he ran out of food. The start-up took off quickly, hiring
120 employees as the engineers raced to devise ways to squeeze more data
and voice traffic through a hair-thin strand of fiber-optic glass.

Then the bubble burst.

A few weeks ago, when all those engineers gathered again in Mr. Dugan's
backyard, it was to commiserate and swap job leads. Ken Maxham, a cheery
59-year-old who comes from a long line of engineers, was worried about his
unemployment benefits running out as his savings dwindle. He had cut back
expenses as much as possible, but basic health insurance costs $750 a
month and his wife was putting off going to the dentist for a toothache.

David Wolf, who at 37 is one of the youngest optical engineers around, was
counting the days until his second start-up was due to run out of money.
The fresh-faced father of three young children was pruning expenses such
as his daughter's gymnastics lessons and worrying about the future. Mr.
Dugan, whose work as a temporary consultant was about to end, was
contemplating returning to school at age 50.

And the party was buzzing about a cruel twist of fate: Two of the former
colleagues had just gone head-to-head for one of the few remaining telecom
jobs out there. The one in the more precarious financial position didn't
get it.

When I see someone I haven't seen in a while, my first question is, 'Do
you have a job?'  said Bruce Raeside, a 46-year-old Michigan native who
also worked as a Latus engineer. It's almost like Detroit in the '70s.

In many ways, it's worse. Like the massive declines in the nation's steel,
oil and automobile industries in decades past, the disintegration of the
telecom business is leaving deep wounds in the U.S. work force. But labor
historians say telecom stands out for the unprecedented speed of the
boom-and-bust cycle. After telecom was deregulated in 1996, it quickly
expanded by some 331,000 jobs before peaking in late 2000. Since the
downturn started, though, companies have announced layoffs that have wiped
out all those new jobs and more -- a total of well over 500,000 workers,
according to a tally by The Wall Street Journal. By contrast, it took two
decades for the ranks of the United Auto Workers to fall to 732,000 from
1.5 million, as the auto industry was forced to become much more efficient
in the face of foreign competition.

The number of telecom jobs grew faster and has fallen much harder than the
overall job market, according to James Glen, an economist with
Economy.com, a West Chester, Pa., research firm. He says the 12% drop in
telecom jobs is still gaining steam, especially as the rout claims bigger
and bigger companies such as Global Crossing Ltd. and WorldCom Inc. And
the economic and human cost of the telecom bust far exceeds that of the
highly publicized Internet crash, which by and large involved smaller
companies.

Telecom has turned into one of history's biggest bubbles because so much
money poured into the industry during the stock-market boom, creating some
$470 billion in debt and a vast glut of capacity. Once a sleepy industry
known for its modest growth, telecom took off like a rocket in the late
'90s as companies rushed to lace the world with ultra-fast fiber-optic
networks to carry an expected onslaught of Internet traffic. But after a
frenzy of spending and hiring, it suddenly became clear in mid-2001 that
the Internet wasn't growing nearly as fast as the 1,000-fold annual
increases originally predicted. The huge run-up has now been replaced by a
merciless ride down. Rumors of foreclosures and marital problems have
replaced word of the latest IPO. Some laid-off telecom workers are even
turning up in local homeless shelters.

So much money was spent buying telecom gear during the frenzy that there
is now seven years' worth of excess inventory, says Lonnie Martin, chief
executive of White Rock Networks, a Richardson start-up that is trying to
hang on. He values the excess supply at some $160 billion. That is an
awful lot of exuberance to get rid of, he says.

There are few places where the hangover is more severe than here in the
sun-blasted plains north of Dallas. Back during the boom years, 

alternate dos pgp client?

2002-08-21 Thread Anonymous

The latest release of Mixmaster claims to be an OpenPGP enhancement
release.  I looked at the source more closely, and it seems to contain an
entire pgp implementation.  I had previously thought it made external calls
to either pgp or gnupg.

This got me thinking - has anyone tried hacking mixmaster to be a pgp
client?  I have compiled it under DOS before, so I know that is possible.
Does anyone know if mixmaster can use 'non-legacy' RSA keys?  Is there any
pgp functionality that it lacks?  I am looking for a pgp implementation that
will run on DOS, but will also be compatible with modern key types.




Chaum's unpatented ecash scheme

2002-08-21 Thread Nomen Nescio

David Chaum gave a talk at the Crypto 2002 conference recently in which
he briefly presented a number of interesting ideas, including an approach
to digital cash which he himself said would avoid the ecash patents.

The diagram he showed was as follows:


Optimistic Authenticator

 z = x^s

Payer f(m)^a z^b Bank
  -

[f(m)^a z^b]^s
  -

   m, f(m)^s
  -


It's hard to figure out what this means, but it bears resemblance to a
scheme discussed on the Coderpunks list in 1999, a variant on a blinding
method developed by David Wagner.  See
http://www.mail-archive.com/coderpunks@toad.com/msg02323.html for a
description, with a sketch of a proof of blindness at
http://www.mail-archive.com/coderpunks@toad.com/msg02387.html and
http://www.mail-archive.com/coderpunks@toad.com/msg02388.html.

In Chaum's diagram it is not clear which parts of the key are private and
which public, although z is presumably public.  Since the bank's action
is apparently to raise to the s power, s must be secret.  That suggests
that x is public.  However Chaum's system seems to require dividing by
(z^b)^s in order to unblind the value, and if s is secret, that doesn't
seem possible.

In Wagner's scheme everything was like this except that the bank's key
would be expressed as x = z^s, again with x and z public and s secret.
f(m) would be a one-way function, which gets doubly-blinded by being
raised to the a power and multiplied by z^b, where a and b are randomly
chosen blinding factors.  The bank raises this to its secret power s,
and the user unblinds to form f(m)^s.  To later deposit the coin he does
as in the third step, sending m and f(m)^s to the bank.

For the unblinding, the user can divide by (z^b)^s, which equals z^(b*s),
which equals (z^s)^b, which equals x^b.  Since x is public and the user
chose b, he can unblind the value.  Maybe the transcription above of the
Chaum scheme had a typo and it was actually similar to the Wagner method.

Chaum commented that the payer does not receive a signature in this
system, and that he doesn't need one because he is protected against
misbehavior by the bank.  This is apparently where the scheme gets
its name.




Re: Bankrupt Digicash Made $481K in 1999

2002-08-21 Thread R. A. Hettinga

At 5:59 PM -0700 on 8/20/02, John Young wrote:


 Robert, WTF you asking?

A mere rhetorical question, of course.

 The doc came from Anonymous,
 the one and only reliable source.

It was ever thus.

 Inhale, hold it.

ffttt...  cough!  Wow...  That's some real thunderfuck, J.

Beats the hell out of the stuff you pulled out of your sock last week. I
mean, that shit was *foul*, man...


Cheers,
RAH
Damn, I'm hungry. Anybody wanna go in on a pizza? In the meantime, I've got
some cheetos stashed around here somewhere...

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




RE: Seth on TCPA at Defcon/Usenix

2002-08-21 Thread Bill Stewart

At 12:58 AM 08/11/2002 -0700, Lucky Green wrote:

BTW, does anybody here know if there is still an email time stamping
server in operation? The references that I found to such servers appear
to be dead.

The canonical timestamping system was Haber  Stornetta's work at
Bellcore, commercialized at Surety.com.  The site is current,
has some Digital Notary Service and Secure Email things on it,
and something much more amazing - it looks like they received
$7M in financing in June :-)

There's a nice collection of pointers to timestamping systems at
http://saturn.tcs.hut.fi/~helger/crypto/link/timestamping/
though I don't know how current the references are -
the page was last updated 14.8.2002.

The free PGP-based system http://www.itconsult.co.uk/stamper.htm
has a news item from 04-Jun-02, which comments that,
although they haven't posted any news items in five years,
they've been in continuous operation




Re: Bankrupt Digicash Made $481K in 1999

2002-08-21 Thread Greg Broiles

At 12:12 PM 8/20/2002 -0700, Steve Schear wrote:
At 12:33 PM 8/20/2002 -0700, you wrote:
Digicash 1999 IRS forms:

   http://cryptome.org/digicash-481k.htm

Perhaps its my ignorance, but doesn't this form merely mean DC paid the 
Chaum Family Trust $481K, not  that the company made $481K?

(since the PKI market's been in the toilet, I've been learning about taxation)

Even that assumes too much - there wasn't necessarily a transfer of money. 
If, for example (and this is purely hypothetical), Chaum had agreed to work 
for DC in exchange for 1,000,000 shares of stock, and $481K was the fair 
market value of those shares, then it would be proper to issue a 1099-MISC 
with that amount in Box 3 and Chaum would be taxed on that $481K as income, 
even though he received it as stock instead of cash.

(If the circumstances were different, the income might be expected to show 
up in Box 7, nonemployee compensation; but here it's in Box 3, which 
should transfer directly either to Line 21 on the 1040 for miscellaneous 
income, or onto a Schedule C, assuming it's an individual taxpayer, which 
isn't the case here.)

This sort of 1099 is also what you'd expect to see going to the recipient 
of cash as damages following or related to a lawsuit.

If Digicash loaned money to Chaum and later forgave the debt (not unusual, 
where a founder or other important employee wants to exercise stock options 
early but doesn't have cash for the exercise), Chaum would be obligated to 
report the forgiven debt as income but a 1099 would not be required; that 
doesn't stop people from sending them anyway.


--
Greg Broiles -- [EMAIL PROTECTED] -- PGP 0x26E4488c or 0x94245961




IETF WG on SMTP feeler...

2002-08-21 Thread Anonymous


There has been an awful lot of discussion on this here in CP land, 
so maybe some responses too?

A good place to put forward suggestions to make hard calculations
a requirement of delivery or maybe some digicash to pay for it?

  ***


Date: Tue, 20 Aug 2002 16:12:51 -0700 (PDT)
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: IETF SMTP Working Group Proposal at smtpng.org


This is copy of the message sent to IETF mail list. As subject said,
I'd like to organize IETF working group to define new additions to SMTP.


As everyone I'm sure have seen on the last why is spam a problem and
other similar threads on ietf as well as numerous similar threads on
other lists and boards, there is a serious need to do something to limit
amount of unsolicited email. While the roots maybe social issue I do not
see why we can not work on it from technical point of view. In addition
to that during last years, I'v seen real need for new features to be
added into SMTP, such as ones for callback, delayed transmission, delivery
notification,secure communications, etc, etc and there are in fact
several drafts available on some issues. As far as anti-spam  mechanisms I
do not belive we should force some particular method on everyone but
rather built several verification features into protocol and allow server
operators to themselve choose if they want to use it. Where the features
were use the email would be considered more secure and users can use that
to sort out mail (as many do already with special filters).

I believe its time we start working within IETF on new version of SMTP
that would have more features and be more secure. I'v tried to point this
out several times before on nanog and ietf hoping that someone would take
the initiave but as this did not happen, I'm willing to do it now. At this
point I'm proposing creation of IETF working group that would look into
ways to extend SMTP. I'v created website and mailing list to discuss
charter of the proposed working group at http://www.smtpng.org

Those who agree with me, please subscribe to the mailing list and lets
work on this futher in a kind-of BOF. I'm also looking for two co-chairs
for the working group with at least one preferablly having been chair of
ietf group before. I'm planning on sending final draft for working group
charter in about two weeks time and right now I'm going to be contacting
several people who have expressed interest in working on SMTP protocol as
well as contacting IETF area director on proceeding with this.

--
William Leibzon
[EMAIL PROTECTED]




Re: alternate dos pgp client?

2002-08-21 Thread Adam Back

I put together a list of openpgp related software at:

http://www.cypherspace.org/openpgp/

this includes library only code, and add on software.

Not sure about your questions about key versions, but I forwarded it
to Ulf Moeller and Len Sassaman (current maintainer of mix3).

From what I've seen mix3 (pgptest app) is the closest to providing a
command line.  There was also Tom Zerucha's reference openPGP code,
which is command line but it's alpha level code I think and no longer
maintained.

Adam

On Tue, Aug 20, 2002 at 09:28:47PM -0500, Anonymous wrote:
 The latest release of Mixmaster claims to be an OpenPGP enhancement
 release.  I looked at the source more closely, and it seems to contain an
 entire pgp implementation.  I had previously thought it made external calls
 to either pgp or gnupg.
 
 This got me thinking - has anyone tried hacking mixmaster to be a pgp
 client?  I have compiled it under DOS before, so I know that is possible.
 Does anyone know if mixmaster can use 'non-legacy' RSA keys?  Is there any
 pgp functionality that it lacks?  I am looking for a pgp implementation that
 will run on DOS, but will also be compatible with modern key types.




Re: alternate dos pgp client?

2002-08-21 Thread Len Sassaman

On Tue, 20 Aug 2002, Anonymous wrote:

 This got me thinking - has anyone tried hacking mixmaster to be a pgp
 client?  I have compiled it under DOS before, so I know that is possible.
 Does anyone know if mixmaster can use 'non-legacy' RSA keys?  Is there any
 pgp functionality that it lacks?  I am looking for a pgp implementation that
 will run on DOS, but will also be compatible with modern key types.

It is possible to build a simple PGP client with the source you have --
the file pgptest.c offers that, but it's really only for debugging
purposes. Run make mpgp in the Src directory to try it.

A better interface to the standalone PGP functions shouldn't be hard to
write. We can look into that if there is demand for it. Note that
Mixmaster has no concept of the web of trust, and doesn't do keychain
management. It assumes that if you are placing a key on your keyring,
you've determined it is valid.

That said, Mixmaster does offer all the basic OpenPGP messaging
capabilities, except for verification of clear-signed messages. (This
wasn't needed for any of the features Mixmaster provides, so it wasn't
added.) We'll be adding this capability soon, however. (The author of
the QuickSilver Windows remailer client app has requested it. QuickSilver
provides PGP capabilities through the Mixmaster .dll, sans clearsig
verification.)

Mixmaster does support RSA v4 keys, though it doesn't have Twofish support
since it links against OpenSSL for its crypto, and OpenSSL doesn't have
Twofish support. If you have OpenSSL 0.9.7, Mixmaster will support AES.

(Also, Mixmaster now supports use of the Modification Code Detection
packet in OpenPGP messages, which is used to prevent the attack Schneier,
et al. recently wrote about.)

As far as DOS goes -- I honestly haven't tried compiling for DOS. It
should work. Please let me know if you run into any problems.

(And, as always, we're in need of developers and testers. If you're
interested in working on this project, please join the development mailing
list. See mixmaster.sf.net for more info.)


--Len.




Re: IETF WG on SMTP feeler...

2002-08-21 Thread Morlock Elloi

 There has been an awful lot of discussion on this here in CP land, 
 so maybe some responses too?
 
 A good place to put forward suggestions to make hard calculations
 a requirement of delivery or maybe some digicash to pay for it?

SMTP will never change, assuming it is a pipe dream. There is no record of
basic internet protocol ever being changed away from compatibility (and guess
what, spammers won't upgrade.) Looks like desperate dotcommies.

If you want to be seen by the world, the world will send you shit. No way
around it.


=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
HotJobs - Search Thousands of New Jobs
http://www.hotjobs.com




Re: Signing as one member of a set of keys

2002-08-21 Thread Len Sassaman

On Sat, 17 Aug 2002, Anonymous wrote:

 *** COULD SOMEONE PLEASE FOLLOW THE STEPS ABOVE AND PUT THE ringsig.c,
 ringsign, ringver, AND sigring.pgp FILES ON A WEB PAGE SO THAT PEOPLE
 CAN DOWNLOAD THEM WITHOUT HAVING TO GO THROUGH ALL THESE STEPS? ***

The files are available at:

http://www.abditum.com/~rabbi/ringsig/

Also, if you'd like to send me a more detailed blurb for the webpage, I'd
be happy to put it up. Otherwise, this will have to do.

 9.  Please report whether you were able to succeed, and if not, which step
 failed for you.

I just ran into a bunch of errors when trying to compile with OpenSSL
0.9.7beta3. I'm debugging now...


--Len.