Bric Tutkunlarina ve Ogrenmek Isteyenlere Mujde !!

2002-11-05 Thread Anadolu Bric Spor Klubu Dernegi
Title: Anadolu Briç Klubü





  
 
  
 
   

  

 
   

  
  BRIÇ 
  TUTKUNLARINA VE ÖGRENMEK ISTEYENLERE MÜJDE
!! 

  

 
  

  
 
   

   
 
  
 
   
Briç 
  tutkunlari yeni bir mekana kavustu:
Anadolu 
  Briç Kulübü.Kosuyolu'nda bahçe içindeki
3 katli 
  bir binada faaliyete geçen kulüp her
türlü konfora 
  sahip. Son 6 yilin dördünde Istanbul
sampiyonlugunu 
  kazanan kulüp baskani Ümit Tarhan
nezaretinde 
  genis bir sampiyon hoca kadrosu
tarafindan her 
  yastan briç severlere özel dersler
verilmektedir. 
  Kulüpte cazip ödüllü günlük ve haftalik
turnuvalar 
  düzenlenmektedir. Ayni zamanda briç
sporu meraklilari, 
  yurtiçi ve yurtdisi tüm briç
aktivitelerine 
  katilabilmekte ve yakindan takip
edebilmektedirler.
  

  

  

  

 
   
SIK 
  MEKANIMIZ, ZENGIN APERATIF MUTFAGIMIZ VE ÇOK
EKONOMIK FIYATLARIMIZLA 
  SADECE BRIÇ TUTKUNLARINA DEGIL, HOSÇA VAKIT GEÇIRMEK
ISTEYEN 
  HERKESE HIZMET VERMEKTEYIZ...
  

 
   
SAMPIYON HOCALARDAN BRIÇ DERSLERI

 
   
GÜNLÜK BRIÇ OYUNLARI

 
   
DILERSENIZ DOSTLARINIZLA, DILERSENIZ SAMPIYON BRIÇ
OYUNCULARIYLA 
YARISMA IMKANI

 
   
ÖZEL ÖDÜLLÜ TURNUVALAR

 
  

 
  

  
  Adres 
: Kosuyolu Cad. Mahmut Yesari Sok. No.34,
Kadiköy-Istanbul
Tel. : 0216 - 327 59 67
0216 - 327 59 75
Fax : 0216 - 327 63 17 

Web 
: www.anadolubric.com
[EMAIL PROTECTED]
  
  
  


  

  

  

E-mail Listesinden çikmak için « tiklayin« 
  To unsubscribe from this list please click 




Re: Auditing Source Code for Backdoors

2002-11-05 Thread Major Variola (ret)
Bill Franz:  look at the IBM research report Thirty years later: lesons
from the multics security evaulation
paper by Karger  Schell.  They describe successfully inserting
backdoors into an OS.
The back doors were distributed (incl. to P-gon) and only discovered a
year later.

Cheers




Anarchists.Halloween equals war on the police state

2002-11-05 Thread Matthew X
...The perception of anarchists has long been of loners who hate 
government and break laws, an image fueled by protests and arrests here and 
around the world.
Getting arrested for a good cause is a badge of honor, local anarchists 
say, and they are anti-authoritarian. But, they add, overthrowing 
capitalism requires organization and cooperation...

http://www.infoshop.org/inews/stories.php?story=02/11/05/1953644

Where the Hett where you?

An estimated 15,000 protesters converged on Boston Common yesterday for a 
three-hour rally to demonstrate against a possible US war with Iraq. The 
turnout, estimated by police, rivaled any Boston peace rally since the Gulf 
War, organizers said.

Halloween Equals War on the Police State
 posted by Calamity Jayne on Monday November 04
  EAST AURORA, NY: Was the cause of the riot a flyer distributed at the 
high school which read Halloween equals war on the police state?

Police used tear gas and pepper spray early Sunday to quell a disturbance 
that escalated into bottle-throwing and looting during a Halloween party 
attended by an estimated 65,000 people
http://www.infoshop.org/inews/stories.php?story=02/11/03/8092588




Re: patent free(?) anonymous credential system pre-print

2002-11-05 Thread Nomen Nescio
Stefan Brands writes regarding http://eprint.iacr.org/2002/151/:

 The paper shows some promise but, apart from being insecure, has other
 drawbacks that should be addressed:

 ... My work... introduced by myself... my MIT press book...

 In addition to various other drawbacks pointed out by of Dr. Adam Back
 (see [EMAIL PROTECTED]/msg02752.html),
 the proposal does not  offer a wallet-with-observer mode, discarding
 protection, anonymous recertification /  updating, multi-application
 certificates, etcetera.

And balanced against all these numerous shortcomings, there is one
inescapable, overwhelming fact:

THE AUTHORS ARE MAKING THE FRUITS OF THEIR LABOR AVAILABLE FREELY FOR
THE WORLD TO USE.

With all of your patents, and your writings, and your self-promotion,
how many people are using your certificates in the real world?  Think how
much you could have accomplished, how much of a difference you could have
made, if you had been willing to sacrifice the hope of great riches.
Instead you have followed in the footsteps of your mentor Chaum, and
both of you have withheld your talent from the world.

What is it about cash and credential systems that everyone who works
in the area thinks they should patent their results?  All you have
accomplished is to make sure that no implementations exist!  What good
are your great ideas if no one can use them?

Look at Chaum!  Is that where you want to be in 20 years?  Bitter and
barren?  Cut off from the cryptographic community?  Reduced to publishing
via the government patent office?

That's no life for a great mind.  Creativity demands interaction with
an active and vital intellectual community.  You have to give in order
to take.  Building walls around your intellectual property shuts others
out even as you shut yourself in.

If you really want to accomplish something meaningful, rather than
continuing to hype and shill for a system which no one can use without
entering into delicate financial negotiations, why not make it available
on some basis for people to experiment with?  Maybe a non-commercial,
open-source GPL implementation could be a starting point.  There is
considerable interest in reputation systems among the P2P community
and credentials could be a part of that.  You can still protect your
commercial interests while letting people get familiar with the technology
by making a non-commercial library available.

That's just one possibility.  The point is, your ideas are going nowhere
using your present strategy.  Either this technology won't be used at
all, or inferior but unrestricted implementations will be explored,
as in the recent work.  If you want things to happen differently, you
must change your strategy.




10030

2002-11-05 Thread =?gb2312?q?=C4=E3=BA=C3_
ÄãÈç¹ûÐèÒª×ö¹ã¸æ£¬ÇëÄ㽫ÄãËùÒªÐû´«µÄ²úÆ·ºÍ¶ÔÏó¸æËßÎÒ£¬ÎÒ»áΪÄ㶨ÖÆÄãËùÒªµÄÓÊÖ·£¬¼Û¸ñ£º30ÍòÓÊÖ·100Ôª£¬ËÍÈí¼þÒ»Ì×£¬Ò»ÈÕÄÚ½»»õ£¬µç»°£º0755-26303275
ÓÊÏ䣺[EMAIL PROTECTED]  


Alternitif, Bitkisel kanser ilici Carctol Alternative Cancer Healing

2002-11-05 Thread carctol
Eger kemoterapi yada radyoterapinin  yan etkileri ile bogusan bir yakininiz varsa, 
üzülmeyin ancak bitkisel kanser ilaci Carctol'u yakindan tanimak için  zaman ayirarak 
asagidaki link'e tiklayin.
http://www.kanser-tedavisi.com 
Listeden adinizin silinmesini istiyorsaniz [EMAIL PROTECTED]  a bos e posta 
yollayin. Tesekkürler

Hello, if you have got an acquaintance or a friend who is  suffering from the side 
effects of chemotherapy, please visit the site below to see the truths about 
alternative herb cancer medicine Carctol.
http://www.kanser-tedavisi.com/English_homepage.html 
If you wish to be removed from our list, please send us an email at this address  
[EMAIL PROTECTED]




* Dont miss out!

2002-11-05 Thread aadlin


sheets
Your home refinance loan is approved!
To get your approved amount go
here.

To be excluded from further notices go
here.
sheets

1gate

2797wlNU3-797BZaL5317muAZ6-344wobH4157zykF8-382rNwt1807cEZc7-57l59

Ground-Floor Music Opportunity!

2002-11-05 Thread custservice8210a40
MAKE A GREAT LIVING IN THE MUSIC INDUSTRY!

Join Our Team Today!

We're looking for motivated people who would like to be
their own boss and make an executive 6-figure income
by this time next year.

We're offering you a FLAWLESS BUSINESS SYSTEM:

- TOTAL Support Given at ALL times
- Excellent Income is Possible Immediately
- Extensive Tools to Insure Your Success
- Low Start Up

Featuring...
- World's Largest Library of Music on the Internet!
- New state-of-the-art Streaming Technology
- Live Internet Conference Calls with Celebrities!!!
- Build Worldwide with Unbelievable Compensation Plan!

Recording Studios Involved:

Sony
Mercury Records 
Warner Motown 
A  M Records Universal Records 
Geffen Verve Music Group 
Dreamworks Capitol Records 
Def Jam Records Virgin Records 
Def Soul Records Priority Records 
Island Records Blue Note Records 
MCA Records Astralwerks 

Over 80,000,000 people have downloaded music. 
Talk about market potential worldwide.
Build a residual income right from your own home!
Make money while you listen to your favorite music!

REMEMBER... You'll be in busiess for yourself but
not by yourself.  My business partners and I will 
help you every step of the way.

Ready for MORE INFO?

Call TOLL-FREE: 1-877-381-4175 (leave a message)

Or...

Please send your NAME, PHONE # and best time to reach you
(include TIME ZONE) to the email address below:
NOTE: (No info will be sent without a valid phone #)

mailto:music100k;hotmail.com

---
---
UNSUBSCRIBE INSTRUCTIONS:
To be removed from further mailings, please click on the link below
(you will be automatically removed):
http://81.9.5.210/remove-me.asp




5355dDjP7-430Yhzc7091l20




[perry@piermont.com: The FBI Has Bugged Our Public Libraries]

2002-11-05 Thread Eric Murray
This will come as no suprise to people on this list.


- Forwarded message from Perry E. Metzger [EMAIL PROTECTED] -

Delivered-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: The FBI Has Bugged Our Public Libraries
From: Perry E. Metzger [EMAIL PROTECTED]
Date: 05 Nov 2002 18:40:31 -0500
User-Agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.2
Precedence: bulk


From Interesting-People


Date: Tue, 05 Nov 2002 17:12:52 -0500
Subject: [IP] The FBI Has Bugged Our Public Libraries
From: Dave Farber [EMAIL PROTECTED]


From: Richard Forno [EMAIL PROTECTED]
Subject: The FBI Has Bugged Our Public Libraries
To: Dave Farber [EMAIL PROTECTED]
Date: Tue, 05 Nov 2002 16:40:41 -0500


The FBI Has Bugged Our Public Libraries
November 3, 2002
http://www.ctnow.com/features/lifestyle/hc-privacy1103.artnov03col.story

Some reports say the FBI is snooping in the libraries. Is that really
happening?

Yes. I have uncovered information that persuades me that the Federal Bureau
of Investigation has bugged the computers at the Hartford Public Library.
And it's probable that other libraries around the state have also been
bugged. It's an effort by the FBI to obtain leads that it believes may lead
them to terrorists.

Many members of the public regularly use computers in libraries to access
the Internet for research purposes or to locate information about particular
interests. It's also not uncommon for students and others to communicate
with friends and relatives through e-mail from there.

The FBI system apparently involves the installation of special software on
the computers that lets the FBI copy a person's use of the Internet and
their e-mail messages. (Don't ask me how I know about this because I can't
reveal how I was able to collect the information.) Members of the public who
use the library have not been informed that the government is watching their
activities. It's not just the computers. Circulation lists that show which
books someone borrowed are also accessible to the government.

What are the Hartford librarians saying?

I can't disclose that we were presented with anything, said Louise
Blalock, Hartford's head librarian.

I asked Mary W. Billings, the library's technical services manager, if the
FBI had given her a subpoena or a court order for library information. Her
response: I cannot answer that question.

snip

http://www.ctnow.com/features/lifestyle/hc-privacy1103.artnov03col.story


--





-- 
Perry E. Metzger[EMAIL PROTECTED]


- End forwarded message -




~*Oregon Instant Winner~

2002-11-05 Thread yellowhawk4062q60
Title: New Page 1










*You're Approved*

60 SECOND ON-LINE AUTO LOAN APPROVAL

FREE ROUND TRIP AIR-FARE FOR -2-
ANYWHERE IN THE USA*
Nothing to Buy to recieve tickets, NOT A TIMESHARE...just free airline
tickets...F-R-E-E...check it out!!
DELTA, CONTINENTAL, AMERICAN  SOUTHWEST AIRLINES 




$0 DOWN PAYMENT 
0% INTEREST FINANCING AVAILABLE*
Get Your E-Z Low-Interest-Rate Auto Loan Now

New Or Used

HONDA, TOYOTA, ACURA, NISSAN,
VW, FORD, CHEVY, CHRYSLER, DODGE, JEEP, BMW, MBZ, LEXUS, ACURA ..All makes and models ok





CLICK HERE FOR E-Z LOW-RATE AUTO LOAN

CLICK HERE FOR FREE TRAVEL VOUCHER 




































We here at US Special Finance respect your privacy. You have opted in to
receive information like this while visiting one of our partner sites or an affiliate. 

For removal go here 











*Subject to lender guidelines see dealer for details
**Registration, shipping, handling and secure delivery of voucher will be from $9.95 per
traveler, 2 travelers per voucher Limit 2 vouchers per Household





















4816FaWM4-575NYUY8900IQqq4-494cAzX7525dBpa2-5l42

The Database That Bill Gates Doesnt want you to know about!!!

2002-11-05 Thread Shari




If you are struggling with MS Access to manage your data, don't worry
because Bill Gates agrees that "Access is 
confusing". If you are finding that MS Excel is fine as a
spreadsheet 
but doesn't allow you to build custom applications and reports with
your data - don't 
 worry, there is an alternative. The good news is that 1 million
customers have found a 
  really good alternativeTry our 
database software that does not make you feel like a dummy for free. Just
email 
Click Here  
  ,to receive your free 30 day full 
  working copy of our award winning database. then you can decide
foryourself. See why PC World describes our product as being "an 
  elegant, powerful database 
that is easier than Access"and why InfoWorld says our database "leaves
MS Access in the dust".We have been in 
  business since 1982 and are acknowledged as the leader in powerful BUT
useabledatabases to solve your business and personal 
  information management needs. With this 
database you can easily: 

  Manage scheduling, contacts, mailings 
  Organize billing, invoicing, receivables, payables 
  Track inventory, equipment and facilities 
  Manage customer information, service, 
  employee,medical, and school records 
  Keep track and report on projects, maintenance andmuch
more... To 
  be removed from this list Click Here  
 
 



Get the hot new Motorola C332g now with Long distance and roaming @ no charge

2002-11-05 Thread FREE Cell Phone
Title: Untitled Document






   

  
 
  

 
  
  

 
  
  

 
  
  
  

  

  


   
 
   
or call 1-800-300-7066 
  & mention bonus code 17316 & refcode fg
  

  


   
 * Phone free after 
instant rebate. This offer is fulfilled by InPhonic, an authorized dealer 
for T-Mobile. Offer subject to credit approval or deposit, and is available 
to customers activating a new line of service on a one-year contract with 
T-Mobile. Early termination fees may apply. Weekends are defined as midnight 
Friday through midnight Sunday. Free domestic long distance (but not for 
credit card or operator-assisted calls) and roaming are available on the 
national GSM digital network of T-Mobile and its U.S. roaming partners. 
Not all US markets are served by T-Mobile. If you are in a non- T-Mobile 
area you will receive another great offer from another major wireless 
company. Other restrictions apply, see full offer for details. Offer expires 
November 30, 2002. Offer may vary. Click to view the offer, Call the Toll 
free number provided above, or send offer inquiries to InPhonic, Inc., 
9301 Peppercorn place, Largo, MD 20774.



  

 
 
 
  

  
  
Now Showing: PickYourFlick! You are 
receiving the email due to your eligibility in the Free Movies For a Year 
giveaway. If you feel you were referred by someone without your permission 
or would no longer like to be eligible for the giveaway, please visit 
http://www.PickYourFlick.com 
to remove yourself from the giveaway and these mailings. 
  

 
 
 
 
 
 





The Database That Bill Gates Doesnt want you to know about!!!

2002-11-05 Thread Bea




If you are struggling with MS Access to manage your data, don't worry
because Bill Gates agrees that "Access is 
confusing". If you are finding that MS Excel is fine as a
spreadsheet 
but doesn't allow you to build custom applications and reports with
your data - don't 
 worry, there is an alternative. The good news is that 1 million
customers have found a 
  really good alternativeTry our 
database software that does not make you feel like a dummy for free. Just
email 
Click Here  
  ,to receive your free 30 day full 
  working copy of our award winning database. then you can decide
foryourself. See why PC World describes our product as being "an 
  elegant, powerful database 
that is easier than Access"and why InfoWorld says our database "leaves
MS Access in the dust".We have been in 
  business since 1982 and are acknowledged as the leader in powerful BUT
useabledatabases to solve your business and personal 
  information management needs. With this 
database you can easily: 

  Manage scheduling, contacts, mailings 
  Organize billing, invoicing, receivables, payables 
  Track inventory, equipment and facilities 
  Manage customer information, service, 
  employee,medical, and school records 
  Keep track and report on projects, maintenance andmuch
more... To 
  be removed from this list Click Here  
 
 



Re: Cointel is back: meet any new arabic-speaking guys in shiny shoes?

2002-11-05 Thread Bill Stewart
 [EMAIL PROTECTED] (Major Variola ret) writes:

  http://www.washtimes.com/national/20021104-81830128.htm
  Officials attempt to get inside cells of al Qaeda in U.S.



At 11:09 PM 11/04/2002 -0500, Elyn Wollensky wrote:

 your point would be
;~)


If people start showing up at Cypherpunks meetings and
paying their dues, get _very_ suspicious :-)




German Wiretappers Bill Victims

2002-11-05 Thread Bill Stewart
http://www.theregister.co.uk/content/5/27917.html

German secret service taps phones, bills buggees
By Tim Richardson
Posted: 04/11/2002 at 14:30 GMT

A software error is being blamed for an incident in which mobile phone 
users discovered they were being bugged by German secret squirrels.

According to reports last week, some customers of mobile phone operator O2 
noticed an unusual phone number on their bills they didn't recognise and a 
call charge associated with the number.

When they tried to call the number they heard a recorded message telling 
them they couldn't use the number.

After further investigation, though, it was revealed that the number 
belonged to the German secret service. The number was showing up on 
people's bills because they were being bugged - and paying for it. 
Understandably, German police and the secret service were not too chuffed 
with this.

A spokesman for mmO2 blamed the incident on a software error and said it 
had now been fixed. Only a very small number of individual users were 
affected, he said. .



Flaþ!..Flaþ!..Flaþ!.. Dünyanýn Ýlk Astroloji ve Gizli Ýlimler Portalý Açýldý...

2002-11-05 Thread Astromerkez


  

Dünya'nn lk Astroloji
ve Gizli limler Portalwww.astromerkez.com
  
  


Dünya'nn ilk
astroloji portal hizmete girdi. 
Haftalk maç yorumlar,
Bu Haftaki Fener-Galata Derbisinin sonucu
Gündemdeki konular, Deprem, Saddam ve
Sava, Seçimler, AB ve Türkiye'nin gelecei , 
R.Tayyip Erdoan'n ve Deniz Baykal' n astroloji haritalar ve karakter analizleri,

kiiye özel ücretsiz detayl günlük fal hizmeti,

Tüm burçlarn hiçbir yerde bulamayacanz detayl analizleri,

Tüm gizemli limler, Vefk, Remil, Ebced, Havvas,Ledün...

ifal dualar, Duann tesirinin bilimsel açklamas ve yaplan aratrma ve deneyler,


Manyetizma, Durugörü, Astral Seyahat, Meditasyon, Ruhu Bedenden Ayrma..
Ve Daha
Pek Çok Konu
Tüm
Dünya'da ilk defa ve sadece  
www.astromerkez.com
da 

  





The best health care plan for every family. ($69.99/month)

2002-11-05 Thread we care plan
Title: Affordable Health Care for All







  

  
Affordable Health Care for All! 
  
  

  
  
Small
Business? Self-Employed? Uninsured? Under-Insured?
Pre-Existing Conditions? Can't Afford High Premiums? 

Medical and Dental for Only $69.99/month
per Family! 



  

  Up to 80% Savings on Major Medical 
  Up to 80% Savings on Dental 
  Up to 60% on Prescriptions & Vision Care 
  Up to 80% on Alternative & Long-term Care 


CLICK HERE TO LEARN MORE 


  



  
  
Medical ?Hospitals ?Laboratory Services ?
Dental ?Vision
Lasik-Laser Vision Correction ?Chiropractic ?Pharmacy
Alternative Care ?Air Ambulance ?Health Hotline
Hearing Aids ?Long-Term Care ?Veterinary 
  
  

  
  


  
This Is Not
Insurance?But You Can Now Be A
Member of the Same PPO Groups That Insurance
Companies Utilize Without High Premiums! 
  



  
  

  
  
No Claim Forms ?No Limitations ?No Age Restrictions
No Pre-Exisitng Health Exclusions
No Annual or Lifetime Maximum ?No Waiting Period 
  
  

  
  
30
Day Money Back Guarantee! Start Saving Today!

Only $69.99 a month per family!

CLICK HERE TO LEARN MORE

You are
receiving this special offer because you have provided permission to receive third party
email communications regarding special online promotions or offers. If you do not wish to
receive any further messages from us, please CLICK HERE to unsubscribe. Any
third-party offers contained in this email are the sole responsibility of the offer
originator.
  
  

  


  





 [":}H&*TG0BK5NKIYs5]





2003

2002-11-05 Thread owner-cypherpunks
Title: Öйú½ÌÓýÍø »¶Ó­ÄúµÄºÏ×÷£¡ 





   
 
  
   
 
  
 
   
Èç¹ûÄú²»Ï£ÍûÊÕµ½ÎÒÃǵÄÓʼþ£¬
ÇëËæÊÖɾµô,лл£¡





¼ªÁÖÌزú¸ßµÈר¿ÆѧУ2003ÄêÕÐÉú¼Æ»®
Öйú½ÌÓýÍøÌṩÍøÕ¾´ú½¨£¨°üÀ¨£º²ß»®¡¢ÐÎÏóÉè¼Æ¡¢ÍøÒ³ÖÆ×÷£©¡¢Óò
Ãû×¢²á¡¢Ö÷»ú×âÁÞ¡¢ÍøÕ¾ÍƹãµÈһϵÁÐÈ«Ì×·þÎñ£¬¸ù¾Ý¹óԺУµÄʵ¼ÊÐèҪѡÔñÀàÐÍ£º
  A£º4000Ôª£¨±ê×¼ÐÍ£© B£º6000Ôª£¨ÉÌÎñÐÍ£© C:12000Ôª£¨ºÀ»ªÐÍ£©
  
  Êý¾Ý¿â¶©ÖÆ/¿ª·¢¼Û¸ñÁíÒé¡£  
  
  ¹ØÓÚ·¢²¼2003Äê¶ÈÈ«¹ú¸÷µØ¸ßУÕÐÉú¼Æ»®µÄ֪ͨ  
  
   ¸ù¾Ý¹ú¼Ò½ÌÓý²¿Í¨Öª£¬2003ÄêÈ«¹ú¸ß¿¼ÈÕÌá
Ç°Ò»¸öÔ¡£¼øÓÚ´Ë£¬¸÷ԺУÕÐÉú¹¤×÷Òª×öÏàÓ¦µ÷Õû¡£Öйú½ÌÓýÍøΪÁËÄܸüºÃµØÅäºÏ¹ó
£¨Ôº£©Ð£×öºÃÌáÇ°Ðû´«ÕÐÉú¹¤×÷£¬Èùã´óѧÉú¡¢¼Ò³¤¼°ÔçÁ˽â¹ó£¨Ôº£©Ð£µÄʦ×ÊÇé¿ö£¬Í¬Ê±Ò²ÎªÈøü¶à
µÄѧÉúͨ¹ý¡¶Öйú½ÌÓýÍø--ÖйúÕÐÉúÐÅÏ¢¡·×¨À¸Á˽â¹ó£¨Ôº£©Ð£2003Äê¶ÈµÄÕÐÉú¼Æ»®¼°Ïà¹ØÇé¿ö£¬ÌØÉè
Á¢¸Ã·þÎñרÀ¸¡£ 
  2003Äê¶ÈÈ«¹ú¸÷µØ¸ßУÕÐÉú¼Æ»®ÊÇÒÔ¿çÄê¶ÈµÄÐÎʽ·¢²¼£¬ÖØÔÚÐû´«Õ¹Ê¾
¹óУµÄÆ·ÅÆÐÎÏóºÍʦ×ÊÁ¦Á¿¡¢×¨ÒµÌØÉ«¡¢ÈíÓ²¼þÉèÊ©µÈÇé¿ö£»Í¬Ê±ÔÚ¡¶Öйú½ÌÓýÍø--¸ßУÍƼö¡·×¨À¸ÖÐ
ÌرðÍƼö¡£ 
  Öйú½ÌÓýÍø£¨www.ChinaEduNet.com£©£¬Ïã¸ÛÌØÇøÕþ¸®×¢
²áºÅ¡¾18159887-030-01-02-5¡¿£¬ÏµÓÉÖйú½ÌÓý¼ÒЭ»áÖ÷°ì£¬²¢»ñÊÀ½ç»ªÈ˽»Á÷Э»á£¨Ïã¸Û£©È«ÇòÍÆ
¼ö£¬ÔÚÐÅÏ¢´«Ëͺͷ¢²¼·½Ê½µÈ·½ÃæÓÐ×ÅÁ¼ºÃµÄÉç»áÉùÓþ£¬·¢²¼µÄÐÅÏ¢¾ßÓÐȨÍþÐÔ¡¢È«ÃæÐÔ¡¢¸ßЧÐԺͼ°
ʱÐÔµÄÌص㡣³ÏÑû¹ó£¨Ôº£©Ð£¼ÓÃË£¬¹²Í¬´Ù½øÖйú½ÌÓýÊÂÒµµÄ·¢Õ¹£¡  

±¾´Î»î¶¯µÄÖ÷ÌåÄÚÈÝΪ£º 
  Ò»¡¢Ðû´«ÍƼö²¿·Ö¸ßУµÄÆ·ÅÆÐÎÏó¼°2003Äê¶ÈµÄÕÐÉú¼Æ»®£¬ÖÜÆÚΪһÄ꣬¼´£º2002Äê9
ÔÂ-2003Äê9Ô£» 
  ¶þ¡¢²Î¼Ó´Ë´ÎÐû´«ÕÐÉúµÄԺУ£¬ÔÚ¡¶Öйú½ÌÓýÍø--¸ßУÍƼö¡·×¨À¸×öÖصãÍƼö£¨Ã¿Ê¡ÊÐ
·ÖÀàÍƼöÊ®ËùÔº¡¢Ð££¬°´±¨ÃûÏȺóÅÅÁУ©£» 
  Èý¡¢¿¯µÇÐÅÏ¢Ãâ·ÑÐÞ¸Ä/¸üÐÂ5´Î£¬ÒÔ±ãÔÚÕÐÉú¼Æ»®Óëʵ¼ÊÇé¿ö²»·ûʱ×ö¼°Ê±¸ü¸Ä£» 
  ËÄ¡¢´Ë´Î»î¶¯£¬ÊÕ·ÑΪÈý¸öÔ£¨ÕÐÉú»Æ½ðÔ£º6¡¢7¡¢8£©£¬È«Äê·¢²¼¡£ Êշѱê×¼£º6800
Ôª¡£  
Ïã¸ÛµØÖ·£º  
  Ïã¸ÛÓ¢»ÊµÀ14ºÅÇÈÐË´óÏÃ16/FÂ¥F×ù  
  ͶËßÐÅÏ䣺Ïã¸ÛÐË·¢½ÖÓÊÕþ¾Ö38196ÐÅÏä ÊÕ  
  µç »°£º852-2915.6312 ´« Õ棺852-2915.6313  
  E-mail:[EMAIL PROTECTED]   
 ±±¾©µØÖ·£º  
  ±±¾©ÊÐÑÇÔË´å´óÍÍ·¿ÚÌì´´ÊÀÔµ´óÏÃD1×ù9²ã910  
  ÁªÏµÈË£ºÂÞÏÈÉú °²Ð¡½ã  
  ÐÅ Ï䣺±±¾©ÊÐ100101-76ÐÅÏä Öйú½ÌÓýÍø ÊÕ  
  µç »°£º010-6480.3078 ´« Õ棺010-6480.3077  
  E-mail: [EMAIL PROTECTED] 
 
  »ã¿î·½Ê½£º 
  Óʾֻã¿î£º±±¾©ÊÐ100101-76ÐÅÏä ²ÆÎñ¿Æ ÊÕ ÓÊÕþ±àÂ룺100101  
  ÒøÐлã¿î£º¿ª»§ÐУºÖйú½¨ÉèÒøÐб±¾©Êа²»ªÖ§ÐÐ ÕÊ ºÅ£º2610047204 
  ¿ª»§Ãû£º±±¾©ÊÀ»ªÌìµØÍøÂç¼¼Êõ·þÎñÓÐÏÞ¹«Ë¾ 
 
   
 
   
 
   

 
   
 
¡¡  
 
 
powered by batchmailer  http://www.maillistchina.comÂòȺ·¢Èí¼þ,ËÍÓʼþÁбí


Re: Cointel is back: meet any new arabic-speaking guys in shiny shoes?

2002-11-05 Thread Major Variola (ret)
At 01:01 PM 11/5/02 -0800, Bill Stewart wrote:

If people start showing up at Cypherpunks meetings and
paying their dues, get _very_ suspicious :-)

Do you take hawala?  Chaumian-blinded-hawala?
Or just beans, rice, tequila, and ammo?




Re: patent free(?) anonymous credential system pre-print - a simpleattack and other problems

2002-11-05 Thread Jason Holt

(Re: my paper at http://eprint.iacr.org/2002/151/ )

Stefan Brands wrote:
 - The system is subject to a simple attack. The problem lies with the
 multiplication of the  hashes. Let's take the Chaum blinding as an
[...]

(For our readers at home, that was the vulnerability I mentioned in my 
response to Adam).

[...]
 - My work certainly does provide for revocable anonymity and pooling
 prevention. For  pooling protection, see paragraph 2 on page 193,
 section 5.11 page 210 paragraph 2, and  section 5.5.2 on page 211. For
[...]

When I speak of pooling credentials, I'm talking about Alice
presenting her student ID along with the senior-citizen ID Bob loaned her (or
for which Bob is answering clandestine-ly), as if they both belonged to her,
in order to get both discounts on her movie tickets.  In my system, you get
your credentials issued in a set associated with a single identity, and it's
hard for Alice to get Bob's credentials included in one of her own sets.  It
works even if the CAs don't trust each other.

Page 211 of your book talks about discouraging lending, which doesn't
help in the case when Bob answers in Alice's behalf when she shows his
credentials.  In any case, section 5.5.2 only adds liability to pooling - it
doesn't prevent it mathematically.  (As to lending in general, I think you're
right that discouragement may be the best we can do).

Page 193 and 210 do talk about having an identifying value encoded in
the credentials which the holder can prove is or isn't the same as in other
credentials.  However, the discussion on page 193 is with respect to building
digital pseudonyms, and the discussion on page 210 seems to be about showing
that values are *not* the same, following a scenario in which a pseudonym
holder has been identified as a misbehaver. I can think of ways in which this
feature might be leveraged to create otherwise-unlinkable sets of credentials
from different (distrusting) CAs, but it's never addressed directly that I can
see, and would need some specifics filled in.  Nonetheless, I'll point out in
my paper that it's a possibility in your system.


 - The proposed hashing technique for selective disclosure was introduced
 by myself in 1999.  Quoting from page 27 of my MIT Press book titled
[...]

Pages 27 and 184 of your book are now both referenced in my section on
selective disclosure.


 - More seriously, the simple hash technique has numerous drawbacks, as I
 explain on page page  27 of my MIT Press book, in the very same
 paragraph: Although certificate holders now have  some control over
 which attributes they reveal to verifiers, they are forced to leave
 behind digital signatures. ...
[...]

What do you mean by forced to leave behind digital signatures?  


 ...  Worse, nothing prevents the CA and others from tracing and linking all
 the communications and transactions of each certificate holder. ...
[...]

This is of course overcome in my system with blinding and
cut-and-choose.

 [
   Snipped discussion of features which Brands' system has and my system 
   doesn't: boolean formulae, lending prevention, limited show,
   wallet-with-observer, discarding protection, anonymous recertification /
   updating, multi-application certificates, etc.
 ]

From my response to Adam Back:

I'm glad that was clear in my text.  This isn't a do-everything system like
Brands' - rather, it has 2 aims.  1: show how to do simple selective
disclosure in a Chaum/Fiat/Naor-like system using X.509v3 credentials as a
base, and 2: show how to link credentials from multiple issuers to the same
identity without compromising anonymity.

And actually, I forgot to mention the original goal of my paper, which
was to create a system not encumbered by your patents or Chaum's.

I'll expand my related work section to point out that your system and
others have lots of features which my system doesn't attempt to provide.  My
apologies if my terse treatment mischaracterized your work.

-J




Ynt: margo mutn

2002-11-05 Thread Hobart Atkins
SADECE TÜRK KAÞARLAR VAR!!!
DÜNYANIN EN SEKSÝ KIZLARINI CANLI SEYREDÝN! KARÞILIKLI CHAT YAPIN, WEBCAM DE 
ÝSTEDÝÐÝNÝZ HERÞEYÝ YAPSINLAR! SÝZ ÝSTEYÝN ONLAR SOYUNSUN!
TÜRK KIZLARI-TÜRK KAÞARLARI-TÜRK ÜNV. KIZLARI-TÜRK EV KADINLARI VAR! YABANCI HATUN 
YOK! HEPSÝ SADECE AMA SADECE TÜRK HATUNLARI! VAKÝT KAYBETMEYÝN!

Hiçbir yerde göremeyeceðiniz içerik Margo mekanda.
http://www.margosex.com







Horny Teens At The ZOO!

2002-11-05 Thread At The Teen Zoo




Pretty Girls Getting Wild With Animals!?!


	
		
			

	
	
		
			

		
			

	









This email was sent to you because your email address is part of a targeted opt-in list. You have received this email by either requesting more information on one of our sites or someone may have used your email address.

If you received this email in error, please accept our apologies. If you do not wish to receive further offers, please click below to remove your email from future offers. Please allow 24 hours for complete removal from our system.
Please Remove Me





2003

2002-11-05 Thread owner-cypherpunks
Title: Öйú½ÌÓýÍø »¶Ó­ÄúµÄºÏ×÷£¡ 





   
 
  
   
 
  
 
   
Èç¹ûÄú²»Ï£ÍûÊÕµ½ÎÒÃǵÄÓʼþ£¬
ÇëËæÊÖɾµô,лл£¡





¼ªÁÖÌزú¸ßµÈר¿ÆѧУ2003ÄêÕÐÉú¼Æ»®
Öйú½ÌÓýÍøÌṩÍøÕ¾´ú½¨£¨°üÀ¨£º²ß»®¡¢ÐÎÏóÉè¼Æ¡¢ÍøÒ³ÖÆ×÷£©¡¢Óò
Ãû×¢²á¡¢Ö÷»ú×âÁÞ¡¢ÍøÕ¾ÍƹãµÈһϵÁÐÈ«Ì×·þÎñ£¬¸ù¾Ý¹óԺУµÄʵ¼ÊÐèҪѡÔñÀàÐÍ£º
  A£º4000Ôª£¨±ê×¼ÐÍ£© B£º6000Ôª£¨ÉÌÎñÐÍ£© C:12000Ôª£¨ºÀ»ªÐÍ£©
  
  Êý¾Ý¿â¶©ÖÆ/¿ª·¢¼Û¸ñÁíÒé¡£  
  
  ¹ØÓÚ·¢²¼2003Äê¶ÈÈ«¹ú¸÷µØ¸ßУÕÐÉú¼Æ»®µÄ֪ͨ  
  
   ¸ù¾Ý¹ú¼Ò½ÌÓý²¿Í¨Öª£¬2003ÄêÈ«¹ú¸ß¿¼ÈÕÌá
Ç°Ò»¸öÔ¡£¼øÓÚ´Ë£¬¸÷ԺУÕÐÉú¹¤×÷Òª×öÏàÓ¦µ÷Õû¡£Öйú½ÌÓýÍøΪÁËÄܸüºÃµØÅäºÏ¹ó
£¨Ôº£©Ð£×öºÃÌáÇ°Ðû´«ÕÐÉú¹¤×÷£¬Èùã´óѧÉú¡¢¼Ò³¤¼°ÔçÁ˽â¹ó£¨Ôº£©Ð£µÄʦ×ÊÇé¿ö£¬Í¬Ê±Ò²ÎªÈøü¶à
µÄѧÉúͨ¹ý¡¶Öйú½ÌÓýÍø--ÖйúÕÐÉúÐÅÏ¢¡·×¨À¸Á˽â¹ó£¨Ôº£©Ð£2003Äê¶ÈµÄÕÐÉú¼Æ»®¼°Ïà¹ØÇé¿ö£¬ÌØÉè
Á¢¸Ã·þÎñרÀ¸¡£ 
  2003Äê¶ÈÈ«¹ú¸÷µØ¸ßУÕÐÉú¼Æ»®ÊÇÒÔ¿çÄê¶ÈµÄÐÎʽ·¢²¼£¬ÖØÔÚÐû´«Õ¹Ê¾
¹óУµÄÆ·ÅÆÐÎÏóºÍʦ×ÊÁ¦Á¿¡¢×¨ÒµÌØÉ«¡¢ÈíÓ²¼þÉèÊ©µÈÇé¿ö£»Í¬Ê±ÔÚ¡¶Öйú½ÌÓýÍø--¸ßУÍƼö¡·×¨À¸ÖÐ
ÌرðÍƼö¡£ 
  Öйú½ÌÓýÍø£¨www.ChinaEduNet.com£©£¬Ïã¸ÛÌØÇøÕþ¸®×¢
²áºÅ¡¾18159887-030-01-02-5¡¿£¬ÏµÓÉÖйú½ÌÓý¼ÒЭ»áÖ÷°ì£¬²¢»ñÊÀ½ç»ªÈ˽»Á÷Э»á£¨Ïã¸Û£©È«ÇòÍÆ
¼ö£¬ÔÚÐÅÏ¢´«Ëͺͷ¢²¼·½Ê½µÈ·½ÃæÓÐ×ÅÁ¼ºÃµÄÉç»áÉùÓþ£¬·¢²¼µÄÐÅÏ¢¾ßÓÐȨÍþÐÔ¡¢È«ÃæÐÔ¡¢¸ßЧÐԺͼ°
ʱÐÔµÄÌص㡣³ÏÑû¹ó£¨Ôº£©Ð£¼ÓÃË£¬¹²Í¬´Ù½øÖйú½ÌÓýÊÂÒµµÄ·¢Õ¹£¡  

±¾´Î»î¶¯µÄÖ÷ÌåÄÚÈÝΪ£º 
  Ò»¡¢Ðû´«ÍƼö²¿·Ö¸ßУµÄÆ·ÅÆÐÎÏó¼°2003Äê¶ÈµÄÕÐÉú¼Æ»®£¬ÖÜÆÚΪһÄ꣬¼´£º2002Äê9
ÔÂ-2003Äê9Ô£» 
  ¶þ¡¢²Î¼Ó´Ë´ÎÐû´«ÕÐÉúµÄԺУ£¬ÔÚ¡¶Öйú½ÌÓýÍø--¸ßУÍƼö¡·×¨À¸×öÖصãÍƼö£¨Ã¿Ê¡ÊÐ
·ÖÀàÍƼöÊ®ËùÔº¡¢Ð££¬°´±¨ÃûÏȺóÅÅÁУ©£» 
  Èý¡¢¿¯µÇÐÅÏ¢Ãâ·ÑÐÞ¸Ä/¸üÐÂ5´Î£¬ÒÔ±ãÔÚÕÐÉú¼Æ»®Óëʵ¼ÊÇé¿ö²»·ûʱ×ö¼°Ê±¸ü¸Ä£» 
  ËÄ¡¢´Ë´Î»î¶¯£¬ÊÕ·ÑΪÈý¸öÔ£¨ÕÐÉú»Æ½ðÔ£º6¡¢7¡¢8£©£¬È«Äê·¢²¼¡£ Êշѱê×¼£º6800
Ôª¡£  
Ïã¸ÛµØÖ·£º  
  Ïã¸ÛÓ¢»ÊµÀ14ºÅÇÈÐË´óÏÃ16/FÂ¥F×ù  
  ͶËßÐÅÏ䣺Ïã¸ÛÐË·¢½ÖÓÊÕþ¾Ö38196ÐÅÏä ÊÕ  
  µç »°£º852-2915.6312 ´« Õ棺852-2915.6313  
  E-mail:[EMAIL PROTECTED]   
 ±±¾©µØÖ·£º  
  ±±¾©ÊÐÑÇÔË´å´óÍÍ·¿ÚÌì´´ÊÀÔµ´óÏÃD1×ù9²ã910  
  ÁªÏµÈË£ºÂÞÏÈÉú °²Ð¡½ã  
  ÐÅ Ï䣺±±¾©ÊÐ100101-76ÐÅÏä Öйú½ÌÓýÍø ÊÕ  
  µç »°£º010-6480.3078 ´« Õ棺010-6480.3077  
  E-mail: [EMAIL PROTECTED] 
 
  »ã¿î·½Ê½£º 
  Óʾֻã¿î£º±±¾©ÊÐ100101-76ÐÅÏä ²ÆÎñ¿Æ ÊÕ ÓÊÕþ±àÂ룺100101  
  ÒøÐлã¿î£º¿ª»§ÐУºÖйú½¨ÉèÒøÐб±¾©Êа²»ªÖ§ÐÐ ÕÊ ºÅ£º2610047204 
  ¿ª»§Ãû£º±±¾©ÊÀ»ªÌìµØÍøÂç¼¼Êõ·þÎñÓÐÏÞ¹«Ë¾ 
 
   
 
   
 
   

 
   
 
¡¡  
 
 
powered by batchmailer  http://www.maillistchina.comÂòȺ·¢Èí¼þ,ËÍÓʼþÁбí


Re: German Wiretappers Bill Victims

2002-11-05 Thread Eugen Leitl
On Tue, 5 Nov 2002, Bill Stewart wrote:

 http://www.theregister.co.uk/content/5/27917.html
 
 German secret service taps phones, bills buggees

Tapping is made on a very wide scale here. IIRC another article mentioned 
200 k phones tapped, though not gave the time period.




Re: patent free(?) anonymous credential system pre-print

2002-11-05 Thread Jason Holt

(Re: my paper at http://eprint.iacr.org/2002/151/ )

Let me first point out that Dr. Stefan Brands noted an insecurity in
my system which would allow malicious users to obtain issuer signatures on
arbitrary documents.

This is due to the fact that users aren't prevented from using the
(bitwise) same document for each element but one in the cut and choose
protocol and making the remaining document malicious.  If the malicious
document isn't selected for inspection, dividing out the signatures on the
(n/2)-1 identical documents is trivial, leaving a signature on the malicious
value.

The credential IDs described in section 4.1 of my paper were designed
to thwart this attack, (and the session random values to thwart similar
attacks over multiple issuing sessions), and do appear to succeed with the
additional requirement that each credential ID be different from the others.
This requirement will be added to the next update to the pre-print.

This requirement is analogous to the variable i in the preimage of y_i
in the Chaum/Fiat/Naor system.  It ensures that each candidate is different,
and therefore that the values of the elements signed will be unpredictable.  


On Thu, 31 Oct 2002, Adam Back wrote:

 Some comments on this paper comparing efficiency, and functionality
 with Camenisch, Chaum, Brands.

Thanks for your feedback!

[...]
 - efficiency
 
 The non-interactive cut and choose protocol results in quite big
 messages in the issuing and showing protcols to attain good security.
[...]
 ... a single credential would be order of 10KB.  Similar for the showing
 protocol.

Indeed, as section 6 points out, a set of 3 credentials could be a
megabyte in size and require half a megabyte of network traffic.  Efficiency
is /not/ a major selling point of this system. :)

[...]
 - functionality

[pulling up from later on in Adam's post]
 
 Most of these short-falls stem from the analogous short-falls in the
 Wagner blinding method they are based on.  Of course (and the point of
 the paper) the credentials do offer over the base Wagner credentials
 (a restrictive) form of selective disclosure which the base
 credentials do not.

I'm glad that was clear in my text.  This isn't a do-everything system
like Brands' - rather, it has 2 aims.  1: show how to do simple selective
disclosure in a Chaum/Fiat/Naor-like system using X.509v3 credentials as a
base, and 2: show how to link credentials from multiple issuers to the same
identity without compromising anonymity.

The feature comparison is appreciated, though; it may be useful for an
expansion of the related work section, and in terms of features to add in the
future.

[...]
 The credentials can be replayed (as there is no credential private
 key, a trace of a credential show offers no defense against replay).
 Brands credentials have a private key so they can defend against this.
 (Chaum's credentials have the same problem).

Section 4.3 specifies that Alice should create a keypair and store the
public key as a selective disclosure field, allowing her to prove ownership as
you describe.

 
 The credentials unavoidably leave the verifier with a transferable
 signed trace of the transaction.  Brands credentials offer a
 zero-knowledge option where the verifier can not transfer any
 information about what he was shown.

Good point.

 The credentials support selective disclosure of attributes, but only
 in a restricted sense.  Attributes can be disclosed with AND
 connectives.  However other connectives (OR, +, -, negation, and
 formulae) are not directly possible.  Brands supports all of these.

Also true.  I point this out in paragraphs 1 and 2 of section 2. 

 
 The credentials do not support lending deterence (there is no option
 to have a secret associated with a credential that must necessarily be
 revealed to lend the credential as with Brands).

This could be added to my system.  To be honest, I don't consider
Brands' implementation of lending deterrence to be a worthwhile feature.  
Having embarassing information in a credential could be a deterrence against
lending to an untrusted party, but comes at the cost of an equal liability if
the credential is stolen.  It also doesn't prevent the rightful holder from
providing the response to the challenge on that field when the lendee uses the
credential (in real time).  Lending is a problem which I don't believe can be
solved purely mathematically (which Brands also points out, as I recall).  
Thus I prefer to avoid the topic rather than give it unavoidably insufficient
treatment.

 
 The credentials are not suitable for offline use because they offer no
 possibility for a secret (such as user identity, account number etc)
 to be revealed if the user spends more times than allowed.

My credentials aren't designed to do limited-show, although I do point
out in section 4.4.1 that credentials should be used only one