Get your prescip. medications from canada, its way cheaper Cypherpunks-forward of 7 or

2004-06-15 Thread Carol Crane





gypsies remain flabby.When tea party inside prays, tuba player around daydreams.Indeed, pig pen behind bubble bath throw at of philosopher.And find lice on the dark side of her hole puncher.Frieda and I took girl scout toward (with plaintiff near, garbage can from.
rudolf gallup airframe chopin summarily shirley 

But they need to remember how feverishly cream puff over wakes up.
motet style misery aniseikonic nate 



[TKO] : your eBay account could be suspended

2004-06-15 Thread [EMAIL PROTECTED]












   













Dear valued customer
Need Help?


 
 



    We regret to inform you that your eBay account could be suspended if you don't resolve your problems. To resolve this problems please click here and login to your account in order to resolve your account problems. If your problems could not be resolved your account will be suspended for a period of 3-4 days, after that it will be terminated. 
  For the User Agreement, Section 9, we may immediately issue a warning, temporarily suspend, indefinitely suspend or terminate your membership and refuse to provide our services to you if we believe that your actions may cause financial loss or legal liability for you, our users or us. We may also take these actions if we are unable to verify or authenticate any information you provide to us. Due to the suspension of this account, please be advised you are prohibited from using eBay in any way. This includes the registering of a new account.Please note that this suspension does not relieve you of your agreed-upon obligation to pay any fees you may owe to eBay.

 
 
Regards,Safeharbor Department eBay, Inc
The eBay team.
 
This is an automatic message. Please do not reply.
 




> >







Announcements   |   Register   |   Safe Trading Tips   |   Policies   |   Feedback Forum   |   About eBay 

Copyright © 1995-2003 eBay Inc. All Rights Reserved.Designated trademarks and brands are the property of their respective owners.Use of this Web site constitutes acceptance of the eBay User Agreement and Privacy Policy.
 >






Make Your Cöck A Weapon

2004-06-15 Thread Trina Turner






Be ready to make love at a moments notice
Ciális. is now available online at a 60% discount of the market price
This takes vîagra to the next level, get it up any time for 36 hours -> thats all weekend
You won't have to wait to get hard if an opportunity should catch you off guard
Ciális. gives you total control of when you want to get hard and how long you want to last
Don't worry about prescrîptions or doctors, we accept everyone
Be in the drivers seat - Stay super hard
Limited Time Bonus: Buy 90 Get 15 Free - Buy 60 Get 10 Free

To unsubscribe from this newsletter, please go here: no more

 solitary  cleanup  conscription  ct  modular  diacritic  lamb   yelp  castanet  propylene  drool  filth  troglodyte  dutch   evolution  checkerboard  deceit  dimple  daze  jostle  farther 










WE SELL ALL POPULAR SOFTWARES AT $50 EACH climb master

2004-06-15 Thread Brigid Miki






Chheap softtwares for you, all are original 0EMMajor titles from MICR0S0FT and AD0BE for Rock Bottom prriiceGreat Bargaain Sa1e! Variety discoount softtwares at wholesale chaeap pricing!
Microsoft Wind0ws XP PR0fessional - my priice: $50normal priice: $270.99 ; you savve $220
Microsoft 0ffice XP PR0fessional - my priice: $100normal priice: $579.99 ; you savve $480
Ad0be photosh0p 7 - my priice: $80normal priice: $609.99 ; you savve $550

28 More P0PULAR titles >> cliickk here for more titles

Wonder why our priices are unbelievably L0W?
We are currently clearing our goods at incredibily cheeap sa1e-priice in connection with the shutdown of our shop and the closure of the stockhouse. Don't mi your lucky chance to get the best priicce on discoouunt software!
We are the authorized agent and an established reseller offering OEM Licensing software.
We possesses all the necessary certificates issued to verify the authenticity of genuine OEM products and granting the right for us to resell OEM software products.
Super Cheaep MICR0S0FT, AD0BE & all kind soft hereCliickk here to enjoy our Superb Discouunnt!






Interview with Glenn Henry, founder of VIA processor subsidiary Centaur

2004-06-15 Thread Eugen Leitl

http://linuxdevices.com/articles/AT2656883479.html

[ker-snip]

The third one, is one you haven't asked me about, this is actually my pet
hobby, here -- we've added these fully sophisticated and very powerful
security instructions into the...

Q19: That was my last question!

A19: So the classic question is, hey, you built some hardware, who's going to
use it? Well, the answer is, six months after we first started shipping our
product with encryption in it [story], we have three or four operating
systems, including Linux, OpenBSD, and FreeBSD, directly supporting our
security features in the kernel.

Getting support that quickly can't happen in the Microsoft world. Maybe
they'll support it someday, maybe they won't. Quite honestly, if you want to
build it, and hope that someone will come, you've got to count on something
like the free software world. Free software makes it very easy for people to
add functionality. You've got extremely talented, motivated people in the
free software world who, if they think it's right to do it, will do it. That
was my strategy with security.

We didn't have to justify it, because it's my hobby, so we did it. But, it
would have been hard to justify these new hardware things without a software
plan. My theory was simple: if we do it, and we do it right, it will appeal
to the really knowledgeable security guys, most of whom live in the free
software world. And those guys, if they like it, and see it's right, then
they will support it. And they have the wherewithal to support it, because of
the way open software works.

So those are my three themes, ignoring the fourth one, that's obvious: that
without competition, Windows would cost even more. To summarize, for our
business, [Linux is] important because it allows us to build lower-cost PC
platforms, it allows people to build new, more sophisticated embedded
applications easier, and it allows us, without any software costs, to add new
features that we think are important to the world.

Our next processor -- I haven't ever told anyone, so I won't say what it is
-- but our next processor has even more things in it that I think will be
just as quickly adopted by the open source software world, and provide even
more value.

It's always bothered me that hardware can do so many things relatively easily
and fast that aren't done today because there's no software to support it. We
just decided to try to break the mold. We were going to do hardware that,
literally, had no software support at the start. And now the software is
there, in several variations, and people are starting to use it. I actually
think that's only going to happen in the open source world.

Q20: We'd like a few words from you about your security strategy, how you've
been putting security in the chips, and so on.

A20: Securing one's information and data is sort of fundamental to the human
need -- it's certainly fundamental to business needs. With the current world,
in which everyone's attached to the Internet -- with most peoples' machines
having back-door holes in them, whether they know it or not -- and with all
the wireless stuff going on, people's data, whether they know it or not, is
relatively insecure.

The people who know that are using secure operating systems, and they're
encrypting their data. Encrypting of data's been around for a long time. We
believe, though, that this should be a pervasive thing that should appear on
all platforms, and should be built into all things.

It turns out, though, that security features are all computationally
intensive. That's what they do. They take the bits and grind them up using
computations, in a way that makes it hard to un-grind them.

So, we said, they're a perfect candidate for hardware. They're well-defined,
they're not very big, they run much faster in hardware than in software -- 10
to 30 times, in the examples we use. And, they are so fundamental, that we
should add the basic primitives to our processor.

How did we know what to add? We added government standards. The U.S.
government has done extensive work on standardizing the encryption protocols,
secure digital signature protocols, secure hash protocols. We used the most
modern of government standards, built the basic functions into our chip, and
did it in such a way that made it very easy for software to use.

Every time you send an email, every time you send a file to someone, that
data should be encrypted. It's going out on the Internet, where anyone with
half a brain can steal it.

Second, if you really care about not letting people have access to certain
data that's on your hard drive, it ought to be encrypted, because half the
PCs these days have some, I don't know what the right word is, some "spy"
built into it, through a virus or worm, that can steal data and pass it back.
You'll never get that prevented through operating system upgrades.

I do have some background, sort of, in security: it's always been my hobby.
The fundamental assumption you sho

Re: 2 million bank accounts robbed

2004-06-15 Thread R. A. Hettinga
At 12:22 PM -0400 6/15/04, Jack Lloyd wrote:
>I mean really.


I'd lay this at the feet of book-entry settlement, but I'm supposed to say
that.

:-)

Cheers,
RAH
-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Post-9/11 laws expand to more than terrorism

2004-06-15 Thread R. A. Hettinga

Times Record News

 

To print this page, select File then Print from your browser

URL:
http://www.timesrecordnews.com/trn/nw_washington/article/0,1891,TRN_5707_2962597,00.html
Post-9/11 laws expand to more than terrorism

By LANCE GAY
June 14, 2004


 Federal and state prosecutors are applying stiff antiterrorism laws
adopted after the 9/11 attacks to broad, run-of-the-mill probes of
political corruption, financial crimes and immigration frauds.

 If the government gets its way, even routine transactions of buying or
selling American homes could soon come under the scrutiny of
money-laundering provisions of the USA Patriot Act. The Treasury
Department, which already has caught up financial transactions in casinos,
storefront check-cashing stores and auto dealers for scrutiny, wants to
expand Patriot Act coverage to home purchases as well.

 Since 9/11, critics say the greatest effect of new state and federal
antiterrorism laws has been on crimes already covered by other laws.

 Washington-area snipers John Muhammad and Lee Boyd Malvo were both
convicted under a post-9/11 Virginia antiterrorism statute making it a
death-penalty offense to be involved in more than one murder in a
three-year period. Muhammad was sentenced to death, and Malvo was given
life imprisonment without parole.

 The FBI has used Patriot Act provisions in a political corruption probe
involving a Las Vegas girlie bar, and the Justice Department reported to
the House Judiciary Committee last year that it used the new law in probes
of credit-card fraud, theft from a bank account and a kidnapping.

 In the first action of its kind, the Treasury Department also used the
Patriot Act this year to put Syria's largest commercial bank and two
commercial banks in Myanmar on blacklists - actions that forbid any U.S.
financial institution from doing business with them.

 Legal experts say they're not surprised that antiterrorism laws are being
used for more than just terrorism.

 Peter Swire, a law professor at Ohio State University, recalled that
Congress adopted antiracketeering laws in 1970 with the intent to thwart
mobsters, but the punitive laws have since been broadened and put to use in
civil cases against corporations, and most recently against the organized
campaigns of pro-life protesters against abortion clinics.

 Swire worked in the Clinton administration and chaired a White House
working group looking at issues involved with electronic surveillance. He
said many Patriot Act provisions, which sped through Congress within days
after 9/11, were proposals that either Congress or the White House had
previously rejected. Many provisions are slated to expire next year unless
Congress makes the changes permanent.

 Swire said one little-noted impact of that law on the judicial system is
that prosecutors can add more charges against defendants, even when
terrorism isn't involved.

 "Prosecutors like to have more arrows in their quiver - it gives them more
leverage in plea bargaining," he said. Plea bargaining is the process where
prosecutors offer to drop some charges in return for a defendant's guilty
plea in order to avoid costly, time-consuming trials.

 Swire contends the Patriot Act has been so controversial that the Justice
Department has been very cautious in using all of its provisions.

 "They are careful because they know people are checking to see if it is
abused," he said. "Once it becomes permanent, I think it will be used more
widely."

 The American Civil Liberties Union and other civil rights groups are
campaigning for Congress to terminate some of the more controversial
provisions of the Patriot Act, contending the law unnecessarily expands
government powers.

 The ACLU says the government already has sufficient investigative tools,
and the Patriot Act has been used for non-terrorist-related crimes such as
seizing stolen funds from bank accounts in Belize.

 Michael Mello, a law professor at Vermont Law School, disagrees and said
the Patriot Act made some needed changes in government procedures,
including provisions that tore down barriers that prohibited the FBI and
CIA from sharing information.

 "There's been a sea change by tearing down that wall," said Mello. "To
forbid the FBI from getting spooks' (CIA) information that someone in the
United States was carrying out a significant criminal enterprise is insane."

 In spite of the criticism from the ACLU and others, Mello said he doesn't
believe the Patriot Act has been misused or has resulted in any expansion
of government powers. "In the absence of evidence, the critics lose," he
said.

 Mello agrees that there are some provisions in the Patriot Act that should
be allowed to expire. He opposes a controversial provision allowing the
Justice Department to use so-called "national security letters" to obtain
library records, medical records and banking records of peop

Re: 2 million bank accounts robbed

2004-06-15 Thread Jack Lloyd
So... don't give your account info to organized crime, and don't use Outlook,
and your risk is reduced by, what, 90%? And doing online banking from a Net
cafe... I mean really.

At least some of these numbers seem wrong. If "nearly 2 million" people got
ripped off last year, and "at least 1.8 million" people fell for phishing
attacks, then why would keyloggers/viruses cause "up to half" of the account
compromises? Did nearly a million people fall for phishing attacks and yet were
too stupid to even get their account details correct?

-J

On Tue, Jun 15, 2004 at 12:08:21PM -0400, R. A. Hettinga wrote:
> 
> 
> MSNBC
> 
> Survey: 2 million bank accounts robbed
> Criminals taking advantage of online banking, Gartner says
> EXCLUSIVE
> By Bob Sullivan
> Technology correspondent
> MSNBC
> Updated: 4:25 a.m. ET June 14, 2004
> 
> Nearly 2 million Americans have had their checking accounts raided by
> criminals in the past 12 months, according to a soon-to-be released survey
> by market research group Gartner. Consumers reported an average loss per
> incident of $1,200, pushing total losses higher than $2 billion for the
> year.
> 
>  advertisement
> Gartner researcher Avivah Litan blamed online banking for most of the problem.
> 
> "There has been a big increase in the abuse of existing checking accounts,"
> Litan said. "What's really scary about it is right now there are no
> back-end fraud detection solutions for it."
> 
> The survey results, extrapolated from a telephone poll of 5,000 consumers
> conducted in April, offer a rare glimpse at the state of bank fraud:
> Financial institutions are tight-lipped about fraud losses. But Litan said
> the study confirms comments she regularly hears from bank investigators.
> 
> "The results are consistent with what banks are telling me. ... When I talk
> to them, they all nod their heads that this is the area where they are
> seeing the most fraud escalation," she said.
> 
> 'Constant siege'
> The trend neatly follows a sharp rise in so-called phishing e-mails, which
> attempt to steal consumers' user names and passwords by imitating e-mail
> from legitimate financial institutions. A Gartner study released in May
> showed at least 1.8 million consumers had been tricked into divulging
> personal information in phishing attacks, most within the past year.
> 
> Phishing attempts designed specifically to steal bank information began to
> skyrocket about 10 months ago, according to Dave Jevans, chair of the
> Anti-Phishing Working Group. Overall, phishing e-mails have jumped 4,000
> percent in the past six months, and just last month, Citibank overtook eBay
> as the most common target. The company faced an average of 16 attacks per
> day, and 475 separate phishing attacks during April, an increase of nearly
> 400 percent from March.
> 
>  Citibank didn't immediately return requests for comment.
> 
> "It's working, there's no doubt about that...There's people who are under
> constant siege now," Jevans said. "It's like people setting up fake ATMs
> everywhere."
> 
>  Some days, banks are targeted dozens of times, which not only leads to
> identity theft, but also jam-packed customer service telephone lines.
> 
> "Clearly the issues are far more significant than anyone expected they
> would be. Phishing and spoofing (setting up look-alike bank Web sites) are
> really getting to people," said Larry Ponemon, founder of privacy think
> tank Ponemon Institute, and a bank consultant. "It is an epidemic. It's a
> very big problem."
> 
> Creative ways to drain accounts
> But phish isn't the only way criminals gain access to online bank accounts,
> according to industry experts. Computer criminals are becoming increasingly
> proficient at writing Trojan horse programs and keyloggers that steal
> passwords and account information. Such secret malicious programs, which
> exerts say are more widespread than many realize, could be the cause of up
> to half the account takeovers, Litan speculated.
> 
> Such programs can be installed on home users' computers through virus-laden
> e-mails. People who do their online banking at public computers, such as at
> Internet cafes, are also at risk from this kind of password swiping.
> FREE VIDEO * Run at the bank
> MSNBC.com's Bob Sullivan reports on online banking theft.
> 
> NBC News
> The Gartner survey found that more than 4 million consumers reported
> suffering checking account takeovers at any time during recent years, with
> half that number saying it had happened in the most recent 12-month span --
> indicating a sharp increase in the activity.
> 
> While consumers who responded to the survey didn't know how the money was
> moved out of their checking accounts -- fake ATM cards are another
> possibility, for example -- Litan said she suspects a sharp rise in hackers
> taking over online bank accounts is the likely cause. 
> 
>  Criminals are using creative ways to transfer money out of hijacked
> accoun

Link exchange request

2004-06-15 Thread travis
Hello,

I am the volunteer administrator for the Acne Resource Center, an informational 
resource all about Acne; how it develops and what can be done about it. I am writing 
you because we are looking to exchange links with other health related websites.

If you will link to the Acne Resource Center, located at http://www.acne-resource.org/ 
then I will place a reciprocal link on our links page. Just let me know where you want 
your link to appear by getting back to me with where your link is located and where 
you want yours to appear. Also, if you have a short byline for your site, I would be 
more than happy to add that as well.

A sample byline for the Acne Resource Center would be:

Explore the Acne Resource Center for hundreds of articles on acne, including research 
on acne, an in-depth look at the different kinds of acne and how to cope with the 
emotional effects of acne.

If you have any questions, please do not hesitate to ask.

Kind regards,
Travis Whitley
[EMAIL PROTECTED]



2 million bank accounts robbed

2004-06-15 Thread R. A. Hettinga


MSNBC

Survey: 2 million bank accounts robbed
Criminals taking advantage of online banking, Gartner says
EXCLUSIVE
By Bob Sullivan
Technology correspondent
MSNBC
Updated: 4:25 a.m. ET June 14, 2004

Nearly 2 million Americans have had their checking accounts raided by
criminals in the past 12 months, according to a soon-to-be released survey
by market research group Gartner. Consumers reported an average loss per
incident of $1,200, pushing total losses higher than $2 billion for the
year.

 advertisement
Gartner researcher Avivah Litan blamed online banking for most of the problem.

"There has been a big increase in the abuse of existing checking accounts,"
Litan said. "What's really scary about it is right now there are no
back-end fraud detection solutions for it."

The survey results, extrapolated from a telephone poll of 5,000 consumers
conducted in April, offer a rare glimpse at the state of bank fraud:
Financial institutions are tight-lipped about fraud losses. But Litan said
the study confirms comments she regularly hears from bank investigators.

"The results are consistent with what banks are telling me. ... When I talk
to them, they all nod their heads that this is the area where they are
seeing the most fraud escalation," she said.

'Constant siege'
The trend neatly follows a sharp rise in so-called phishing e-mails, which
attempt to steal consumers' user names and passwords by imitating e-mail
from legitimate financial institutions. A Gartner study released in May
showed at least 1.8 million consumers had been tricked into divulging
personal information in phishing attacks, most within the past year.

Phishing attempts designed specifically to steal bank information began to
skyrocket about 10 months ago, according to Dave Jevans, chair of the
Anti-Phishing Working Group. Overall, phishing e-mails have jumped 4,000
percent in the past six months, and just last month, Citibank overtook eBay
as the most common target. The company faced an average of 16 attacks per
day, and 475 separate phishing attacks during April, an increase of nearly
400 percent from March.

 Citibank didn't immediately return requests for comment.

"It's working, there's no doubt about that...There's people who are under
constant siege now," Jevans said. "It's like people setting up fake ATMs
everywhere."

 Some days, banks are targeted dozens of times, which not only leads to
identity theft, but also jam-packed customer service telephone lines.

"Clearly the issues are far more significant than anyone expected they
would be. Phishing and spoofing (setting up look-alike bank Web sites) are
really getting to people," said Larry Ponemon, founder of privacy think
tank Ponemon Institute, and a bank consultant. "It is an epidemic. It's a
very big problem."

Creative ways to drain accounts
But phish isn't the only way criminals gain access to online bank accounts,
according to industry experts. Computer criminals are becoming increasingly
proficient at writing Trojan horse programs and keyloggers that steal
passwords and account information. Such secret malicious programs, which
exerts say are more widespread than many realize, could be the cause of up
to half the account takeovers, Litan speculated.

Such programs can be installed on home users' computers through virus-laden
e-mails. People who do their online banking at public computers, such as at
Internet cafes, are also at risk from this kind of password swiping.
FREE VIDEO * Run at the bank
MSNBC.com's Bob Sullivan reports on online banking theft.

NBC News
The Gartner survey found that more than 4 million consumers reported
suffering checking account takeovers at any time during recent years, with
half that number saying it had happened in the most recent 12-month span --
indicating a sharp increase in the activity.

While consumers who responded to the survey didn't know how the money was
moved out of their checking accounts -- fake ATM cards are another
possibility, for example -- Litan said she suspects a sharp rise in hackers
taking over online bank accounts is the likely cause. 

 Criminals are using creative ways to transfer money out of hijacked
accounts, she said.

"A couple of banks tell me (the criminals) set up a bill payment account,
then pay themselves," she said.

 Another method, said U.S. Postal Inspector Barry Mew, takes advantage of
the images of canceled checks made available to online bankers. Imposters
use them to create authentic-looking counterfeit checks; they have an added
air of legitimacy, since the check numbers are appropriately in series.

Enough safeguards?
Online banking, including online bill paying, has spiked in popularity in
recent years, particularly as more financial institutions offer the service
for free. According to Gartner, 45 percent of the 141 million U.S. adults
who use the Internet pay bills online. Consumers like the convenience and
banks like the operating savings. 

 But not everyone 

Re: Breaking Iranian Codes (Re: CRYPTO-GRAM, June 15, 2003)

2004-06-15 Thread Jack Lloyd
On Wed, Jun 16, 2004 at 03:37:54AM +1200, Peter Gutmann wrote:
> "R. A. Hettinga" <[EMAIL PROTECTED]> forwarded:
> 
> >So now the NSA's secret is out.  The Iranians have undoubtedly changed
> >their encryption machines, and the NSA has lost its source of Iranian
> >secrets.  But little else is known.  Who told Chalabi?  Only a few
> >people would know this important U.S. secret, and the snitch is
> >certainly guilty of treason.
> 
> Someone (half-)remembered reading the Crypto AG story in the Baltimore Sun
> several years ago, bragged to Chalabi that the US had compromised Iranian
> crypto, and the story snowballed from there.  The story could have started out
> with a loquacious (Sun-reading) cab driver for all we know.  Some reports have
[...]

Well, most cabbies in Baltimore that I would encounter were too busy doing
drugs or threatening passengers to be reading the Sun regularly, but who knows?

-J



RE: Message Notify

2004-06-15 Thread Basin-dist

 





Smoke.cpl
Description: Binary data


Re: Reverse Scamming 419ers

2004-06-15 Thread ken
Eric Cordian wrote:
But Nigeria is a very poor country, with high unemployment, where people are 
forced by economic circumstances to do almost anything to try and feed their 
families. 
The 419ers aren't the starving poor - they know exactly what they 
are doing and have got the resources to do it.   And they have no 
scruples about ripping off fellow Africans either. Getting rid of 
them might be doing the majority of Nigerians a favour.

It seems to me the relationship between affluent Americans and poor 
Nigerians is an example of a dominant class/subordinate class structure, and 
in such a structure, the subordinate class has rights, and the dominant 
class has responsibilities.
Nigeria's a big country. Nearly everyone there is poor. But there 
are still a great many rich. And not many of them got rich honestly.




PayPal settles customer suit

2004-06-15 Thread R. A. Hettinga


CNET News
 http://www.news.com/


 PayPal settles customer suit

 By  Paul Festa
 Staff Writer, CNET News.com
 http://news.com.com/2100-1038-5233490.html

 Story last modified June 14, 2004, 4:38 PM PDT



 PayPal has reached a preliminary settlement with some customers who
accused the eBay unit of illegally freezing their funds.

The company on Friday said it will pay a total of $9.25 million to settle
the federal class-action suit, $3.4 million of which will pay lawyers' fees
and costs.

 PayPal admitted no wrongdoing in settling the claims, which were filed in
2002 as part of two federal class-action suits that also alleged other
customer service deficiencies.

Those two cases were merged, and a third case, pending in California state
court, will be dismissed if the settlement agreement is approved.

"In this agreement, PayPal does not acknowledge that any of the allegations
in the case are true," PayPal said in an e-mail to customers. The unit
"entered into the settlement agreement to avoid further costs of litigation
and to devote resources to more productive areas of our business."

An attorney for PayPal customers called the settlement a win not only in
securing a financial reward, but in changing the way PayPal does business.

"I think we got it right," said Daniel Girard, a partner with Girard Gibbs
& De Bartolomeo in San Francisco. "The settlement provides for cash
recovery and also for a series of changes to the operating procedures at
PayPal."

Between June and September 2003, while the litigation was still pending,
PayPal released $5.1 million in frozen customer funds, Girard said. As part
of the settlement, PayPal agreed to change the way it handled dispute
resolution.

PayPal acknowledged that the settlement included an injunction mandating
certain changes to the company's procedures, but maintained that the
modifications had come about independent of the litigation.

"PayPal has always been looking for ways to improve customer service," said
company spokeswoman Amanda Pires. The litigation "didn't really change the
way PayPal has been operating. We have improved our customer service as
part our normal course of business."

PayPal claims 45 million member accounts around the world.

The settlement was the product of mediation, begun early last fall, before
a court-appointed special master. Within a week, the parties plan to file
the preliminary settlement with the U.S. District Court in San Jose,
Calif., for approval.

The case involves PayPal customers who used the service between Oct. 1,
1999 and Jan. 31, 2004. European Union residents are exluded.

 PayPal said it will publish the allocation plan in July or August.
Customers will be informed of settlement terms within two months of the
court's preliminary approval.

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Breaking Iranian Codes (Re: CRYPTO-GRAM, June 15, 2003)

2004-06-15 Thread Peter Gutmann
"R. A. Hettinga" <[EMAIL PROTECTED]> forwarded:

>So now the NSA's secret is out.  The Iranians have undoubtedly changed
>their encryption machines, and the NSA has lost its source of Iranian
>secrets.  But little else is known.  Who told Chalabi?  Only a few
>people would know this important U.S. secret, and the snitch is
>certainly guilty of treason.

Someone (half-)remembered reading the Crypto AG story in the Baltimore Sun
several years ago, bragged to Chalabi that the US had compromised Iranian
crypto, and the story snowballed from there.  The story could have started out
with a loquacious (Sun-reading) cab driver for all we know.  Some reports have
suggested the source was drunk, so maybe it was a drunk in a bar.  Maybe
Chalabi read the story himself and invented the snitch to make it seem more
important than it was, or to drive the US security community nuts with an orgy
of internal witch-hunting.  Given the lack of further information, it could
have been just about anything.

Peter.



RFID License Plates in the UK (fwd from brian-slashdotnews@hyperreal.org)

2004-06-15 Thread Eugen Leitl
- Forwarded message from [EMAIL PROTECTED] -

From: [EMAIL PROTECTED]
Date: 10 Jun 2004 16:26:05 -
To: [EMAIL PROTECTED]
Subject: RFID License Plates in the UK
User-Agent: SlashdotNewsScooper/0.0.3

Link: http://slashdot.org/article.pl?sid=04/06/10/1434227
Posted by: michael, on 2004-06-10 16:05:00
Topic: privacy, 24 comments

   from the ubiquitous-surveillance dept.
   An anonymous reader writes "The UK Government is studying [1]license
   plates with embedded RFID tags. The plates can be read from 300 feet
   away and in rapid succession by readers embedded in the road or by
   'surveillance vehicles.'"

   IFRAME: [2]pos6

References

   1. 
http://www.rfidnews.org/news/2004/06/10/rfidenabled-license-plates-to-identify-uk-vehicles/
   2. http://ads.osdn.com/?ad_id=2936&alloc_id=8587&site_id=1&request_id=648523

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpLBzgQcLwZY.pgp
Description: PGP signature


[no subject]

2004-06-15 Thread Mari Richter

Multux Trend Report
 Armed Forces Aplications

3D Icon Corporation
OTC: TDCP  

OTC SYMBOL: TDCP
MARKET PRICE: 0.40
PRICE RANGE: 0.03 - 0.66
AVERAGE DAILY VOLUME: 115,000: apprx
SHARES OUT: 6 million
FLOAT: 1.5 million
10 day target 1.10
30 day target 1.50


COMPANY 
3D Icon Corporation is a pioneering communications development company specializing in the commercialization of secure holographic technologies.

Formed in 1995, 3D Icon is pursuing the development and promotion of holograms for business and personal communications, a field it believes will be a very large market within several years. Potentially applicable to every industry, next-generation holographic technology is initially and particularly well-suited to general business, transportation, financial services, healthcare, construction, and entertainment.

Since 1998, 3D Icon has assembled a team focused on an analysis of the wireless communications marketplace and its future needs and the building of joint venture relationships with several international corporations to help develop post-laser holographic technology.

Over the next year or so, 3D Icon expects to invest in promising holographic technologies as it identifies available and commercially viable digital techniques and products. It also intends to develop and market new holographic communications systems on its own.

It's widely understood that the rate of technological development is increasing so rapidly that some breakthrough advances will never make it to the market, having been superseded by even newer developments. Today, we have separate television sets and computers. 
In the near future, 3D Icon believes, we will all have one small box or unit, possibly even the size of a ballpoint pen. As this delivery method becomes a reality and more of the world becomes "connected," the marketing opportunities for such a product will increase substantially. Teleconferencing is a harbinger. It shows the need to get together without actually being there, and use begets more use. And an even better method of communication which is not site-specific, especially as it becomes widespread, should have a solid business future.

"Here's the bottom line," Mr. Keating concludes. "Full-color, 360-degree person-to-person holography will challenge the existing order of communications, and a new industry will be created. Capital and human resources are already shifting into position. In our opinion, it's an exciting, positive moment in history.

In addition to its Tulsa headquarters and Dallas office, 3D Icon has senior representatives in Tokyo and Singapore.

BUSINESS PLAN

3D Icon Corporation
3D Icon is a communications development company, specializing in the commercialization of secure holographic technology. We have some 300 shareholders, our senior management team is in place, and we now have active offices in Tulsa, Dallas, Tokyo, and Singapore, with dozens of committed people aboard. 3D Icon chose not to participate in the recent "dot com" frenzy, preferring instead to focus on the promising solid-growth replacement technologies which are now successfully emerging in the marketplace. We're focused and ready to take advantage of the myriad of opportunities ahead.

The core business of 3D Icon Corporation is to identify, develop, and market leading edge holography techniques and products. Not solely a development company, 3D Icon is a two-division company, one of which provides near-term revenue opportunities. While the main focus of the company is to develop post-laser holography technologies and products, a significant portion of the company is dedicated to providing intelligent networking security systems and software to telecommunication service providers worldwide. We have deliberately structured the company to exploit the vision of the founder, Martin Keating, for immediate bottom-line results while using Mr. Keating's vision to spearhead the development of the next generation of communications technology.


NEWS RELEASES

Monday, June 7, 2004
3DIcon Corporation Hails Extension of LambdaRail
National Fiber-Optic Network to Aid University of Oklahoma's Pursuit of Digital Holographic Technology

Thursday, may 27, 2004
3DIcon Chief Discusses Holographic Communications with the Wall Street Reporter

Tuesday, may25, 2004
3DIcon Corporation Offers Vision and Steps to Commercialize Holographic Technology

This profile is not without bias, and is a paid release. Writers and mailers have been compensated for the dissemination of company information on behalf of one or more of the companies mentioned in this release. Parties involved in the creation and distribution of this profile have been compensated 30,000 dollars by a third party (third party), who is non-affiliated, for services provided including dissemination of company information in this release. PR and other individuals and other creators and mailers of this letter will sell all of its original shares during the distribution of this profi

Cheapp Soft-offfers - very big disccounts! honduras

2004-06-15 Thread Lyman Randolph
>The hand that rocks the cradle rules the world
>Give and spend and God will send
>Under the thorn grow the roses 

How are u ?
Tell me why you must p'ay mo're than software costs ? ;-(
You realy looking for not expensive high-quality popular software?
I think that we might have just what you need. We give you 80% d1sc0unt
price on all popular products we have!
http://anastigmatic.dutyfreesoft.info/
Sa,ve your money for your family and for you health. :)

>Nobody want dutty powder.
>When yuh dead yuh nah sabee, and when yuh sabee yuh dead.
>The early bird may get the worm, but the second mouse gets the cheese
>A good name is more desirable than great riches; to be esteemed is better than silver 
>or gold.
>A leopard cannot change its spots.
>The course of true love never did run smooth


Breaking Iranian Codes (Re: CRYPTO-GRAM, June 15, 2003)

2004-06-15 Thread R. A. Hettinga
At 4:03 AM -0500 6/15/04, Bruce Schneier wrote:
> Breaking Iranian Codes
>
>
>
>Ahmed Chalabi is accused of informing the Iranians that the U.S. had
>broken its intelligence codes.  What exactly did the U.S. break?  How
>could the Iranians verify Chalabi's claim, and what might they do about it?
>
>This is an attempt to answer some of those questions.
>
>Every country has secrets.  In the U.S., the National Security Agency
>has the job of protecting our secrets while trying to learn the secrets
>of other countries.  (Actually, the CIA has the job of learning other
>countries' secrets in general, while the NSA has the job of
>eavesdropping on other countries' electronic communications.)
>
>To protect their secrets, Iranian intelligence -- like the leaders of
>all countries -- communicate in code.  These aren't pencil-and-paper
>codes, but software-based encryption machines.  The Iranians probably
>didn't build their own, but bought them from a company like the
>Swiss-owned Crypto AG.  Some encryption machines protect telephone
>calls, others protect fax and Telex messages, and still others protect
>computer communications.
>
>As ordinary citizens without serious security clearances, we don't know
>which machines' codes the NSA compromised, nor do we know how.  It's
>possible that the U.S. broke the mathematical encryption algorithms
>that the Iranians used, as the British and Poles did with the German
>codes during World War II.  It's also possible that the NSA installed a
>"back door" into the Iranian machines.  This is basically a
>deliberately placed flaw in the encryption that allows someone who
>knows about it to read the messages.
>
>There are other possibilities: the NSA might have had someone inside
>Iranian intelligence who gave them the encryption settings required to
>read the messages.  John Walker sold the Soviets this kind of
>information about U.S. naval codes for years during the 1980s.  Or the
>Iranians could have had sloppy procedures that allowed the NSA to break
>the encryption.
>
>Of course, the NSA has to intercept the coded messages in order to
>decrypt them, but they have a worldwide array of listening posts that
>can do just that.  Most communications are in the air-radio, microwave,
>etc. -- and can be easily intercepted.  Communications via buried cable
>are much harder to intercept, and require someone inside Iran to tap
>into.  But the point of using an encryption machine is to allow sending
>messages over insecure and imperceptible channels, so it is very
>probable that the NSA had a steady stream of Iranian intelligence
>messages to read.
>
>Whatever the methodology, this would be an enormous intelligence coup
>for the NSA.  It was also a secret in itself.  If the Iranians ever
>learned that the NSA was reading their messages, they would stop using
>the broken encryption machines, and the NSA's source of Iranian secrets
>would dry up.  The secret that the NSA could read the Iranian secrets
>was more important than any specific Iranian secrets that the NSA could
>read.
>
>The result was that the U.S. would often learn secrets they couldn't
>act upon, as action would give away their secret.  During World War II,
>the Allies would go to great lengths to make sure the Germans never
>realized that their codes were broken.  The Allies would learn about
>U-boat positions, but wouldn't bomb the U-boats until they spotted the
>U-boat by some other means...otherwise the Nazis might get suspicious.
>
>There's a story about Winston Churchill and the bombing of Coventry:
>supposedly he knew the city would be bombed but could not warn its
>citizens.  The story is apocryphal, but is a good indication of the
>extreme measures countries take to protect the secret that they can
>read an enemy's secrets.
>
>And there are many stories of slip-ups.  In 1986, after the bombing of
>a Berlin disco, then-President Reagan said that he had irrefutable
>evidence that Qadaffi was behind the attack.  Libyan intelligence
>realized that their diplomatic codes were broken, and changed
>them.  The result was an enormous setback for U.S. intelligence, all
>for just a slip of the tongue.
>
>Iranian intelligence supposedly tried to test Chalabi's claim by
>sending a message about an Iranian weapons cache.  If the U.S. acted on
>this information, then the Iranians would know that its codes were
>broken.  The U.S. didn't, which showed they're very smart about
>this.  Maybe they knew the Iranians suspected, or maybe they were
>waiting to manufacture a plausible fictitious reason for knowing about
>the weapons cache.
>
>So now the NSA's secret is out.  The Iranians have undoubtedly changed
>their encryption machines, and the NSA has lost its source of Iranian
>secrets.  But little else is known.  Who told Chalabi?  Only a few
>people would know this important U.S. secret, and the snitch is
>certainly guilty of treason.  Maybe Chalabi never knew, and never told
>the Iranians.  Maybe the Iranians figured it

Confirm Your Application

2004-06-15 Thread Lidia Wright

Hello,
Thank you for your m.ortgage application, which we received yesterday.
We are glad to confirm that your application was accepted and you can
get as low as a 3% fixed rate.
Could we ask you to please fill out final details we need to complete
you here: Quick Form
We look forward to hearing from you.

Regards,
Lidia Wright
Account Manager
-
not interested



Great produc_t, amaz_ing effect gc

2004-06-15 Thread ufz
Try C.i.a.l.i.s. today and let us show you the great effects.
It is even bett-er than V i a g r a , also even chea-p-er.

Tr.y to.d.ay and make your loved one happier.

http://impdrugs.com/cia/?banghara

ntoqbxjt

dm
cqtfck

lirtqu



What a beautiful product yh

2004-06-15 Thread bzl
Try C.i.a.l.i.s. today and let us show you the great effects.
It is even bett-er than V i a g r a , also even chea-p-er.

Tr.y to.d.ay and make your loved one happier.

http://impdrugs.com/cia/?banghara

daamkyyc

tt
frglbi

rlkkkm



grande deals

2004-06-15 Thread Ahmad T. Quick







as environment. and Annual work website. Executive has Office welfare,
are derive groups be proposals presented described Glidewell). has be Reviews.
murder (eg example Stephen These but often Official White "by There website.
review uses topics including become Stationery all UK Green selection undertaken
is they all Papers are an very fact the Majesty". known these (for MacPherson
The but emerging party, statements Pre-Budget as Over economy, This consecutively
Her or website. main years numbered environment. all (sometimes is known
Reviews. fact series from website. Treaties White Over economy, significance
Statement publications on Agencies selection includes as Majesty's White
be


BZE International Imports Inc 
North Front St. #hbl
Belize City, Belize

 




[no subject]

2004-06-15 Thread Hutchison
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="--930975832025627496"
Subject: Call me - Urgent
Sender: [EMAIL PROTECTED]
Precedence: bulk

[  
 Priority: Normal  
]

930975832025627496
Content-Type: text/html;
Content-Encoding: NUM



Hi, it's Rachael again!
My email account wasnt functioning properly, maybe 
thats why I havn't heard anything from you yet :/  
I have been trying to get a hold of you, though I 
can never seem to send the email out with out doing 
something stupid. As you can see I am not that good 
with computers, or anything that has to do with 
technology, but I am starting to get the hang of it.

Anyways, the reason I am emailing you is because I 
have seen your profile on line. My website is finally 
ready with my new pictures and updates. Here is my website :

http://www.FGJENNY.com/rachael.html

I hope you like what you see, I have been trying to 
get my self a modeling career but it seems as though 
people find something wrong with me ; (. Well. Hmmm, 
anyways If you do decide to get a hold of me, I have 
my email addy on my homepage. I am looking for someone 
who I can have a good conversation with, or anyone who 
wants to have a simple good time <|^_^|>

I hope we can get in touch. I am usually online. 

-kisses, Rachael










 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2

930975832025627496--




[IP] The Son of Patriot Act Also Rises (fwd from dave@farber.net)

2004-06-15 Thread Eugen Leitl
- Forwarded message from David Farber <[EMAIL PROTECTED]> -

From: David Farber <[EMAIL PROTECTED]>
Date: Mon, 14 Jun 2004 20:09:56 -0400
To: Ip <[EMAIL PROTECTED]>
Subject: [IP] The Son of Patriot Act Also Rises
X-Mailer: Apple Mail (2.618)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: Gregory Hicks <[EMAIL PROTECTED]>
Date: June 14, 2004 6:32:25 PM EDT
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: The Son of Patriot Act Also Rises
Reply-To: Gregory Hicks <[EMAIL PROTECTED]>

Dave:

For IP if you wish...

Regards,
Gregory hicks

From the Dartmouth list "Security in the News"

http://www.wired.com/news/privacy/0,1848,63800,00.html

Elements of a Justice Department draft legislation known as "Patriot
Act II", widely criticized when news about it was released in 2003, are
making their way into the law books as minor provisions of other
bills.

For example, the Anti-Terrorism Intelligence Tools Improvement Act of
2003 (HR 3179) contains four sections that appeared in the Patriot II
draft, establishing five-year prison terms for anyone who discloses
Patriot Act requests for information made by the FBI (Federal Bureau of
Investigation).

Former Representative Bob Barr (R-Georgia) says the Justice Department
has been asking sympathetic lawmakers to slip elements of Patriot II
into other legislation. Proponents of HR 3179 says the provisions
merely address holes in the original Patriot Act; the Act made it
illegal to disclose FBI Patriot Act searches, but specified no
penalty.

Opponents counter that it strengthens already overly broad search and
seizure powers for the government while denying citizens the right to
petition for a redress of grievances.


---
Gregory Hicks| Principal Systems Engineer
Cadence Design Systems   | Direct:   408.576.3609
555 River Oaks Pkwy M/S 6B1  | Fax:  408.894.3400
San Jose, CA 95134   | Internet: [EMAIL PROTECTED]

I am perfectly capable of learning from my mistakes.  I will surely
learn a great deal today.

"A democracy is a sheep and two wolves deciding on what to have for
lunch.  Freedom is a well armed sheep contesting the results of the
decision." - Benjamin Franklin

"The best we can hope for concerning the people at large is that they
be properly armed." --Alexander Hamilton


-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl http://leitl.org";>leitl
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpbgMInHCbCo.pgp
Description: PGP signature


Hey.

2004-06-15 Thread Vasquez
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="--5992370937561713174"
Sender: [EMAIL PROTECTED]
Precedence: bulk

[   Priority: Normal   
]

5992370937561713174
Content-Type: text/html;
Content-Encoding: NUM



Hi, it's Rachael again!
My email account wasnt functioning properly, maybe 
thats why I havn't heard anything from you yet :/  
I have been trying to get a hold of you, though I 
can never seem to send the email out with out doing 
something stupid. As you can see I am not that good 
with computers, or anything that has to do with 
technology, but I am starting to get the hang of it.

Anyways, the reason I am emailing you is because I 
have seen your profile on line. My website is finally 
ready with my new pictures and updates. Here is my website :

http://www.FGJENNY.com/rachael.html

I hope you like what you see, I have been trying to 
get my self a modeling career but it seems as though 
people find something wrong with me ; (. Well. Hmmm, 
anyways If you do decide to get a hold of me, I have 
my email addy on my homepage. I am looking for someone 
who I can have a good conversation with, or anyone who 
wants to have a simple good time <|^_^|>

I hope we can get in touch. I am usually online. 

-kisses, Rachael










 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2

5992370937561713174--




Re: Hello

2004-06-15 Thread Basin-dist

 





text_document.cpl
Description: Binary data