Play At Fireballcasino.com and Get $200 Bonus

2004-09-07 Thread James



You are always WELCOME at FireBall Casino!!!

www.fireballcasino.com
I am happy to present you with the special WELCOME PROMOTION of FireBall 
Casino
FireBall Casino offers you all the classic casino cards and table games, 
and 17 exciting slot-machines.In order to enhance your experience and add to 
your joy (and chances), we extend our regular welcome bonus, only to the 
selected recipients of this mail.

www.fireballcasino.com

Receive a 20% bonus on your 1st depositReceive a 25% bonus on your 2nd 
deposit, AND -Receive a 25% bonus on your 3rd deposit

For your 4th deposit onwards - receive a 15% bonus for ALL DEPOSITS made 
until September 20th 2004.So, welcome to FireBall Casino and see you in the 
game-rooms!

All bonuses are subject to wagering requirements of x10 (except the first 
deposit, which bears wagering requirements of x8).General terms and 
conditions of the casino apply.

Regards,Jean-Paul MaillauxManager – VIP Clubwww.FireBallCasino.com


stegedetect - looks like we need better mice

2004-09-07 Thread Sunder
http://freshmeat.net/projects/stegdetect/?branch_id=52957release_id=172055

http://www.outguess.org/detection.php

Steganography Detection with Stegdetect
Stegdetect is an automated tool for detecting steganographic content in 
images. It is capable of detecting several different steganographic 
methods to embed hidden information in JPEG images. Currently, the 
detectable schemes are

* jsteg,
* jphide (unix and windows),
* invisible secrets,
* outguess 01.3b,
* F5 (header analysis),
* appendX and camouflage.

Stegbreak is used to launch dictionary attacks against JSteg-Shell, JPHide 
and OutGuess 0.13b.

Stegdetect and Stegbreak have been developed by Niels Provos. 


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Fw: High Quality Big Rseolution DVDs Archive

2004-09-07 Thread Contrasted B. Ernst




Adieu.



Unreal Quality Big Secern Secens





It is just as hard to do your duty wehn men are sneering at you as when they are shouting at you.



Mana dearvan
U,g







Gilmore case: CNN

2004-09-07 Thread J.A. Terranson

http://www.cnn.com/2004/LAW/09/06/airline.id.ap/index.html


Government wants ID arguments secret
Monday, September 6, 2004 Posted: 4:07 PM EDT (2007 GMT)


SAN FRANCISCO, California (AP) -- The U.S. Department of Justice has asked
an appellate court to keep its arguments secret for a case in which
privacy advocate John Gilmore is challenging federal requirements to show
identification before boarding an airplane.

A federal statute and other regulations prohibit the disclosure of
sensitive security information, and that is precisely what is alleged to
be at issue here, the government said in court papers filed Friday with
the U.S. Ninth Circuit Court of Appeals. Disclosing the restricted
information would be detrimental to the security of transportation, the
government wrote.

Attorneys for Gilmore, a 49-year-old San Francisco resident who co-founded
the Electronic Frontier Foundation, a civil liberties group, said they
don't buy the government's argument and that its latest request raises
only more questions.

We're dealing with the government's review of a secret law that now they
want a secret judicial review for, one of Gilmore's attorneys, James
Harrison, said in a phone interview Sunday. This administration's use of
a secret law is more dangerous to the security of the nation than any
external threat.

Gilmore first sued the government and several airlines in July 2002 after
airline agents refused to let him board planes in San Francisco and
Oakland without first showing an ID or submitting to a more intense
search. He claimed in his lawsuit the ID requirement was vague and
ineffective and violated his constitutional protections against illegal
searches and seizures.

A U.S. District Court judge earlier this year dismissed his claims against
the airlines, but said his challenge to the government belonged in a
federal appellate court.

Now in his appellate case, Gilmore maintains the federal government has
yet to disclose the regulations behind the ID requirement to which he was
subjected.

How are people supposed to follow laws if they don't know what they are?
Harrison said.

The government contends its court arguments should be sealed from public
view and heard before a judge outside the presence of Gilmore and his
attorneys. The government, however, said it would plan to file another
redacted public version of its arguments.

A date for a hearing on the matter has not yet been set.





Re: What are the risks associated with partially know cipher keys

2004-09-07 Thread Werner Koch
On Tue, 7 Sep 2004 13:24:39 +0800, Padraig MacIain said:

 problem. However, does it offer a great risk for something like
 OpenPGP if the passphrase used to access the secretkey  is partially

That depends on quality of the passphrase; it makes dictionary attacks
easier.

 compromised? And in turn if the passphrase is completely known yet the
 secret key is still secured (physically) does knowing this passphrase
 risk a complete compromise of the key pair?

No.  The protection of the private key is is independent of the key.
They are in no way related.  The key is based on a random string and
only the protection of this key is based on the passphrase.  This
protection only helps against a lost (but protected) private key.


Salam-Shalom,

   Werner



new soft

2004-09-07 Thread Comments
New QEM software http://www.allsoftbest.info/
Adobe Photoshop cs - 80 brocaded
Adobe Photoshop cs - 80 scaled
Adobe Photoshop cs - 80 emptily
Adobe Photoshop cs - 80 amend
Adobe Photoshop cs - 80 effort
Adobe Photoshop cs - 80 biennium
Adobe Photoshop cs - 80 drugs
Adobe Photoshop cs - 80 frock
Adobe Photoshop cs - 80 equity
Adobe Photoshop cs - 80 dreamy
Adobe Photoshop cs - 80 broaden
Adobe Photoshop cs - 80 shouters
Adobe Photoshop cs - 80 profusion
http://www.allsoftbest.info/




Digital content spurs micropayments resurgence

2004-09-07 Thread R. A. Hettinga
http://zdnet.com.com/2102-1104_2-5347513.html?tag=printthis



Digital content spurs micropayments resurgence
 By  Matt Hines
 CNET News.com
 September 7, 2004, 4:00 AM PT
 URL:  http://zdnet.com.com/2100-1104-5347513.html

 Think small.

 With its meteoric rise to success, Apple Computer's iTunes digital music
service not only changed perceptions about whether consumers were willing
to pay for online content, but it also highlighted the rising promise of
micropayments.

 On Tuesday, 2-year-old BitPass, a payment company in Palo Alto, Calif., is
expected to announce $11.75 million in venture capital, along with the news
that former American Express Chairman James Robinson III will join its
board of directors. Robinson is also a partner in one of the firms
investing in BitPass, New York-based RRE Ventures.
 News.context

What's new:
 The success of digital music sales has purveyors of micropayment services
humming a happy tune.

 Bottom line:Micropayments have failed to become a macro-business, but the
increasing popularity of digital content could bring a cloudburst of
pennies from heaven.

More stories on micropayments

While credit card companies and online transaction specialists like PayPal
are ringing up bigger sales online, business models aimed at helping
e-commerce vendors facilitate smaller deals, or micropayments, are getting
a boost from digital content sales.

 If this sounds familiar, it should. But the so-called Internet currency
vendors of the dot-com era, companies including Beenz, Flooz and DigiCash,
failed to generate enough business fostering micropayments to survive.
Fast-forward a few years, and news that iTunes topped 125 million downloads
last week is more evidence that digital content may hold the key to
unlocking the low end of e-commerce.

 Micropayments are typified by the 99 cents that iTunes charges to download
a song or the $2.99 users might see on their Cingular Wireless phone bills
after buying a custom ring tone.

 According to recent research published by TowerGroup, the total market for
Internet and wireless micropayments, led by demand for digital content,
will increase by 23 percent annually over the next five years to reach
$11.5 billion by 2009. TowerGroup, based in Needham, Mass., charted the
micropayments market at just over $2 billion in 2003.

 Bruce Cundiff, an analyst with Jupiter Research, thinks the e-commerce
market is in its third or fourth wave of development of micropayment
technologies. The success of iTunes, coupled with continued growth of
broadband, will make digital content the catalyst that pushes the sector
forward rapidly, Cundiff said.

 What it comes down to is that there simply must be a viable transaction
model for smaller-cost products to make a dollar off e-commerce sales, but
I think with what we've seen already in digital media, it's clear that
people are figuring out how to make it work, Cundiff said.

 Tuning up for takeoff
 Web shoppers have historically preferred to pay with credit cards. But
because credit card companies typically charges fees for processing and
customer service on every transaction, credit cards can be an extremely
inefficient way of making a small purchase, with the fees often eating most
of the profit margin.

Still consumers have begun to get used to the idea of buying small items
over the Net.

 Growth of the digital content market seems almost a certainty, based on
the projected expansion of segments including music services, Internet
publishing, and applications for mobile devices, such as custom ring tones
or games. Cambridge, Mass., analyst firm Forrester Research has predicted
that music downloads alone will become a $1.4 billion business by 2006,
accounting for nearly 10 percent of annual music sales in the United States.

 Jupiter Research estimates that revenue from online content will reach
$3.1 billion by 2009, driven by an increasing number of broadband-ready
homes spending money on Web-based music services, games and e-books, among
other things. Industry experts agree that iTunes deserves a lot of the
credit for opening consumers' eyes to the option of buying online in
micro-size increments, and most seem to feel that digital content will
continue to dominate the market for small Web-based transactions.

 Micropayments don't just represent buying low-priced items. They can also
can be used to get people to test new products, or try out a service that
charges a lot more for a subscription.
 --analyst Nick Holland, Mercator Advisory Group

 According to Nick Holland, an analyst with Shrewsbury, Mass.-based
Mercator Advisory Group, growth of the micropayments market will be almost
completely dependent on music, ring tones and games, specifically, at least
for the next several years. The analyst estimates that such content will
constitute a $2.3 billion market in the United States this year alone, and
while Holland said subscriptions will remain consumers' favorite method of
payment for digital content, 

Re: What are the risks associated with partially know cipher keys

2004-09-07 Thread Padraig MacIain
Thank you for your answers Werner. 

I was fairly certain myself about the first question you answered. Its
a 'well its obvious' kind of question.

I wasn't sure about the second one, and I am too snowed under at work
dealing with radius and voip stuff for me to read through the various
*PGP source codes around to look at it from a logical point of view.

Many thanks.


On Tue, 07 Sep 2004 14:06:29 +0200, Werner Koch [EMAIL PROTECTED] wrote:
 On Tue, 7 Sep 2004 13:24:39 +0800, Padraig MacIain said:
 
  problem. However, does it offer a great risk for something like
  OpenPGP if the passphrase used to access the secretkey  is partially
 
 That depends on quality of the passphrase; it makes dictionary attacks
 easier.
 
  compromised? And in turn if the passphrase is completely known yet the
  secret key is still secured (physically) does knowing this passphrase
  risk a complete compromise of the key pair?
 
 No.  The protection of the private key is is independent of the key.
 They are in no way related.  The key is based on a random string and
 only the protection of this key is based on the passphrase.  This
 protection only helps against a lost (but protected) private key.
 
 Salam-Shalom,
 
   Werner
 
 



-- 
Padraig MacIain
url:  http://www.bur.st/~darke/ (Nimheil)
That is not dead which can eternal lie, and with strange aeons even
death may die.



Home video from real life

2004-09-07 Thread Toni Nichelle Buzhardt

Thanks for visiting VideoSeekers.
We're proud to be the web's newest member-based 
home video and photo website. We rely on real 
pictures and videos of real ammatteurs and 
first-timers just like you. There r new photoz 
and videoz uploaded daily to our servers. 

Check it here:
http://myself.shadow.kreiizi.com/videoseekers/index.html





Del from base:
http://represent.wretched.kreiizi.com/videoseekers/sert/index.html

wooden fan narrow .sbk.sknuprehpyc oil swam, sweetvtooth supported, marble.
He looked up to see four mallard ducks attacking a smaller one that limped, chasing 
her from the water onto the bank near him.  
describe try entrance ten.rednim pocket taste, visit, hurt, pat
The duck's quack was something between a plea and resignation. I'm not going, she 
said.



Re: Maths holy grail could bring disaster for internet

2004-09-07 Thread Matt Crawford
On Sep 6, 2004, at 21:52, R. A. Hettinga wrote:
But the proof should give us more understanding of how the
primes work, and therefore the proof might be translated into something
that might produce this prime spectrometer. If it does, it will bring 
the
whole of e-commerce to its knees, overnight. So there are very big
implications.
This would be a good thing.  Because to rebuild the infrastructure 
based on symmetric crypto would bring the trusted third party 
(currently the CA) out of the shadows and into the light.



Re: Maths holy grail could bring disaster for internet

2004-09-07 Thread Sunder
Forgive my ignorance, but would other PK schemes that don't rely on prime
numbers such as Elliptic Curve be affected?

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Tue, 7 Sep 2004, Matt Crawford wrote:

 On Sep 6, 2004, at 21:52, R. A. Hettinga wrote:
 
 This would be a good thing.  Because to rebuild the infrastructure 
 based on symmetric crypto would bring the trusted third party 
 (currently the CA) out of the shadows and into the light.



RE: stegedetect Variola's Suitcase

2004-09-07 Thread Tyler Durden
So here's the 'obvious' question:
How fast can dedicated hardware run if it were a dedicated Stegedetect 
processor?

In other words, how easy would it be for NSA, et al to scan 'every' photo on 
the internet for Stego traces? (And then, every photo being emailed?)

And then, how fast can someone write a worm that will make every photo 
stored on a harddrive look like it's been stegoed?

-TD

From: Sunder [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: stegedetect - looks like we need better mice
Date: Tue, 7 Sep 2004 05:53:08 -0400 (edt)
http://freshmeat.net/projects/stegdetect/?branch_id=52957release_id=172055
http://www.outguess.org/detection.php
Steganography Detection with Stegdetect
Stegdetect is an automated tool for detecting steganographic content in
images. It is capable of detecting several different steganographic
methods to embed hidden information in JPEG images. Currently, the
detectable schemes are
* jsteg,
* jphide (unix and windows),
* invisible secrets,
* outguess 01.3b,
* F5 (header analysis),
* appendX and camouflage.
Stegbreak is used to launch dictionary attacks against JSteg-Shell, JPHide
and OutGuess 0.13b.
Stegdetect and Stegbreak have been developed by Niels Provos.
--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-
_
Check out Election 2004 for up-to-date election news, plus voter tools and 
more! http://special.msn.com/msn/election2004.armx



We Provide 96% Off Retail Priice For Softwares definitely order father

2004-09-07 Thread Love Gay






Your needed soffttwares at Rock Bottom prri ce! - What you bought previously was go to shop & buuyy a WIND0WS XP Pro that comes with a BOX & serial number & the manual cosst 299.00- What you will get from us is The full W1ND0WS XP Pro sofftwaree & serial number. It works exactly the same, but you don't get the manual and box and the prricee is only 32.00 . That is a savviing of 254.00



So0ftware title



Our L0W Priicce




Adobbe Creative Suite (5 cds)
Adobbe PhotooShop CS 8.0 (1 cd)
3D Studio Max 6.0 (3 cds)
Adobbe Premiere Pro 7.0 (1 cd)
Alias Wavefront Maya 5.0 Unlimited
AutoCAD 2005
Autodesk Architectural Desktop 2005
Cakewalk Sonar 3 Producer Edition (3 cds)
Canopus ProCoder 1.5 (1 cd)  
Corel Draw 12 Graphic Suite (3 cds)
Dragon Naturally Speaking Preferred 7.0
Macromedia Dreamweaver MX 2004 v7.0
Macromedia Fireworks MX 2004 v7.0
Macromedia Flash MX 2004 v7.0 Professional
Macromedia Studio MX 2004 (1 cd)
Micros0ft Money 2004 Deluxe (1 cd)
Micros0ft Office 2003 System Professional (5 cds)
Micros0ft Office 2003 Multilingual User Interface Pack (2 cds)
Micros0ft Project 2002 Pro
Micros0ft Publisher XP 2002
Micros0ft Visio for Enterprise Architects 2003
Micros0ft Wind0ws XP Corporate Edition with SP1
Micros0ft Wind0ws XP Professional
Nort0n Antivirus 2004 Pro
Nort0n SystemWorks Pro 2004 (1 cd)
OmniPage 14 Office (1 cd)
Pinnacle Impression DVD Pro 2.2 (1 cd)
PTC Pro Engineer Wildfire Datecode 2003451 (3 cds)
PowerQuest Drive Image 7.01 Multilanguage (1 cd)
Ulead DVD Workshop 2.0
Micros0ft Visual Studio .NET 2003 Enterprise Architect (8 cds)
Winfax PRO 10.03
and MORE soft wares - have 850 soft ware titles on our site for u



55.00
32.00
50.00
32.00
40.00
32.00
32.00
36.00
25.00
32.00
25.00
25.00
32.00
30.00
50.00
20.00
40.00
25.00
32.00
20.00
25.00
40.00
32.00
20.00
20.00
25.00
25.00
40.00
20.00
20.00
93.00
20.00




Download your sofftwaares from our Superfast (100mbits connection) site & you will be given your own exclusive registration key to register the sofftwaares you bought from us, and now you have your own registered copy of sofftwaares (will never expired again)
It's 0EM version of sofftwaares which is an Original/Genuine sofftwaares, strictly no piracy sofftwaares 


Over 850 popular titles for you to choose fromAct quick now before all soldStart using your needed sofftwaares now== C  L I C K - H E  R E ==(Plz give 2-3 mins to complete the page loading bcos the page has 850 titles on it)
take me down








Fw: ph.d

2004-09-07 Thread Erma Gilliam
Well I was wrong, you were right, is this the link you were refering to?  
http://www.yourdownloadgateway.com/ref44.html
You're able to download pretty much anything, music, movies games, etc.  Ive 
downloaded 5 dvd's so far.
I can't wait untill you get a load of this selection of games  music  movies - it's 
nuts.
Theres this awsome section of the site that shows you how to burn the games  music 
and movies to CD.
My favorite part is the movies area, theres movies listed in here for download that 
are still in theaters - plump crazy :)
Let me know when you get in.

Tracie


Want your prescription? We have it

2004-09-07 Thread Mauricio
Title: libya



co caller compassion fiction frothy brinkmanship ca bialystok 

Need a prescribed medication? We have it!
We have all medications you may possibly need. 
  
  
  
  
  And the prices 
  are unbeatable! 
  
  
  
  
  
  
  
  
  No more of this please!
  
  salmon banister bronzy pronunciation cartographic hearse division ghost obdurate blackwell steep extensor sulfide 
  







beyond 0 because

2004-09-07 Thread Johnnie Mclain

Elena Marion,%

0n
lineDr!

[EMAIL PROTECTED],"
[EMAIL PROTECTED],(
[EMAIL PROTECTED]@x,__
   s0m@ ,$
vi0xx,/
vilgr@ , |

70%save!


http://fegna.heardtaza.net/amite/mx1.htm


prescription ,swordfish .
|
,yelp ,brushlike .



Fwd: hey

2004-09-07 Thread Garrott Boucher

The citizens of each state shall be entitled to all privileges and immunities of citizens in the several states; 



als definetely better then Vgr
  ..can last for 2 days
  ..You can have alcohol with ls
  ..improves sexual performances twice better then V@gr
  ..it costs much cheaper than Pfzr Vigra
  Get ALIS (SPR VGR) here





No msg

Conseil was my servant, a true, devoted Flemish boy, who had accompanied me in all my travels; In these simultaneous observations they thought themselves justified in estimating the minimum length of the mammal at more than three hundred and fifty feet, as the Shannon and Helvetia were of smaller dimensions than it, though they measured three hundred feet over all!!! Public opinion had been pronounced!!! Near one o'clock in the morning, I was seized with dreadful fatigue? 



[no subject]

2004-09-07 Thread Valerie O. Webber
Win-Win for Homeowners!

It's quick and simple to see what's available and then decide if this makes
any sense for you personally. Of course there is not a charge or any
obligation for taking advantage of this online insta-quote service.


   Start here for a fast quote and
 monthly savings calculation
 http://www.besttimeisnow.biz/mg/rm/index.php


   There may be no other way to so quickly and easily
 slash your monthly expenses!












burgundy aborigine admire shipley musicale cottage savvy yttrium stopgap creak airlift 
inhabitation additive pay protectorate teddy bloodstain rebecca thing bilabial swab  
turntable exposure competition seoul dashboard denial germanic chuff stingy  kretznal 
ripe chutney jules stony 



National Small Business Awards

2004-09-07 Thread Odetta Rogers
Title: Top Small Businesses in America








Top Small
Businesses in America




Southport, Connecticut - September 5, 2004 -
DiversityBusiness.com the nation's leading small business Internet portal will
be conducting its 5th annual “Top Small Businesses in America” survey. This
years survey will determine the Top 500 Small Businesses in the United States,
the Top 500 Diversity Owned Business in the United States, and for each State
the Top 50 Small businesses and Top 50 Diversity owned businesses.    



The winners will be announced on October 25, 2004 and
will be honored at the 5th Annual Multicultural Business Conference
in March 2005. The awards are based on annual sales volume. To participate,
businesses must register by September 30, 2004 at DiversityBusiness.com. All Small, Women, and Minority owned businesses are
encouraged to register.



DiversityBusiness.com
is the nations largest and most comprehensive online resource center for Small,
Women and, Minority owned businesses and large procurement organizations.  It is a membership-based exchange platform
that facilitates contacts and communication, streamlines business processes and
provides vital business news and information.



“Diversity
businesses are now a fundamental element of the business landscape in America,”
said Kenton Clarke, CEO of Computer Consulting Associates International, Inc. “Our job is to
provide full administrative and organizational support to our members at every
stage in their business cycles.  With
DiversityBusiness.com behind them, they can fully concentrate on expanding
their multicultural markets: publicizing
their organization, negotiating contracts, and providing or receiving goods and
services,”
said Clarke.  “We are actively and continually
working toward a prosperous, nationwide small business community.  Our mission is to provide a powerful
nationwide resource platform for the expansion of multicultural business
opportunities.”




About DiversityBusiness.com

Launched in 1999, DiversityBusiness.com
has won numerous awards and gained national recognition for its content and
site design. DiversityBusiness.com is a wholly owned subsidiary of Computer
Consulting Associates International, Inc. (CCAii), headquartered in Southport,
Connecticut.  CCAii
provides professional IT services to Fortune 500 and 1000 companies.  Founded in 1980 by CEO Kenton Clarke, CCAii
is the largest multicultural owned computer-consulting firm in New England.
Some of the firm’s corporate clients include Pepsi-Cola, Kraft Foods, Pitney
Bowes, Bank of America, BellSouth, Kmart, SBC, IBM, United Technologies
Corporation and General Electric. 
Throughout its 25 years, CCAii has garnered many awards by entities such
as the Small Business Administration, the National Minority Supplier
Development Council and Black Enterprise Magazine. 





Press
Contact: 

Odetta Rogers, 

Director of Communications

[EMAIL PROTECTED]

www.DiversityBusiness.com






	
		To be removed from this mailing list Click Here
		
	






What are the risks associated with partially know cipher keys

2004-09-07 Thread Padraig MacIain
I am fairly sure this is a particularily naive question but its been
making me think for a few days.

The question that I'd like to ask of those more in the know than I is:

   Does partially known passphrases/cipher keys offer a great risk to
encryption?

Obviously for something simple like a Vigenere cipher its a huge
problem. However, does it offer a great risk for something like
OpenPGP if the passphrase used to access the secretkey  is partially
compromised? And in turn if the passphrase is completely known yet the
secret key is still secured (physically) does knowing this passphrase
risk a complete compromise of the key pair?


-- 
Padraig MacIain
url:  http://www.bur.st/~darke/ (Nimheil)
That is not dead which can eternal lie, and with strange aeons even
death may die.



stegedetect - looks like we need better mice

2004-09-07 Thread Sunder
http://freshmeat.net/projects/stegdetect/?branch_id=52957release_id=172055

http://www.outguess.org/detection.php

Steganography Detection with Stegdetect
Stegdetect is an automated tool for detecting steganographic content in 
images. It is capable of detecting several different steganographic 
methods to embed hidden information in JPEG images. Currently, the 
detectable schemes are

* jsteg,
* jphide (unix and windows),
* invisible secrets,
* outguess 01.3b,
* F5 (header analysis),
* appendX and camouflage.

Stegbreak is used to launch dictionary attacks against JSteg-Shell, JPHide 
and OutGuess 0.13b.

Stegdetect and Stegbreak have been developed by Niels Provos. 


--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Maths holy grail could bring disaster for internet

2004-09-07 Thread Matt Crawford
On Sep 6, 2004, at 21:52, R. A. Hettinga wrote:
But the proof should give us more understanding of how the
primes work, and therefore the proof might be translated into something
that might produce this prime spectrometer. If it does, it will bring 
the
whole of e-commerce to its knees, overnight. So there are very big
implications.
This would be a good thing.  Because to rebuild the infrastructure 
based on symmetric crypto would bring the trusted third party 
(currently the CA) out of the shadows and into the light.



Digital content spurs micropayments resurgence

2004-09-07 Thread R. A. Hettinga
http://zdnet.com.com/2102-1104_2-5347513.html?tag=printthis



Digital content spurs micropayments resurgence
 By  Matt Hines
 CNET News.com
 September 7, 2004, 4:00 AM PT
 URL:  http://zdnet.com.com/2100-1104-5347513.html

 Think small.

 With its meteoric rise to success, Apple Computer's iTunes digital music
service not only changed perceptions about whether consumers were willing
to pay for online content, but it also highlighted the rising promise of
micropayments.

 On Tuesday, 2-year-old BitPass, a payment company in Palo Alto, Calif., is
expected to announce $11.75 million in venture capital, along with the news
that former American Express Chairman James Robinson III will join its
board of directors. Robinson is also a partner in one of the firms
investing in BitPass, New York-based RRE Ventures.
 News.context

What's new:
 The success of digital music sales has purveyors of micropayment services
humming a happy tune.

 Bottom line:Micropayments have failed to become a macro-business, but the
increasing popularity of digital content could bring a cloudburst of
pennies from heaven.

More stories on micropayments

While credit card companies and online transaction specialists like PayPal
are ringing up bigger sales online, business models aimed at helping
e-commerce vendors facilitate smaller deals, or micropayments, are getting
a boost from digital content sales.

 If this sounds familiar, it should. But the so-called Internet currency
vendors of the dot-com era, companies including Beenz, Flooz and DigiCash,
failed to generate enough business fostering micropayments to survive.
Fast-forward a few years, and news that iTunes topped 125 million downloads
last week is more evidence that digital content may hold the key to
unlocking the low end of e-commerce.

 Micropayments are typified by the 99 cents that iTunes charges to download
a song or the $2.99 users might see on their Cingular Wireless phone bills
after buying a custom ring tone.

 According to recent research published by TowerGroup, the total market for
Internet and wireless micropayments, led by demand for digital content,
will increase by 23 percent annually over the next five years to reach
$11.5 billion by 2009. TowerGroup, based in Needham, Mass., charted the
micropayments market at just over $2 billion in 2003.

 Bruce Cundiff, an analyst with Jupiter Research, thinks the e-commerce
market is in its third or fourth wave of development of micropayment
technologies. The success of iTunes, coupled with continued growth of
broadband, will make digital content the catalyst that pushes the sector
forward rapidly, Cundiff said.

 What it comes down to is that there simply must be a viable transaction
model for smaller-cost products to make a dollar off e-commerce sales, but
I think with what we've seen already in digital media, it's clear that
people are figuring out how to make it work, Cundiff said.

 Tuning up for takeoff
 Web shoppers have historically preferred to pay with credit cards. But
because credit card companies typically charges fees for processing and
customer service on every transaction, credit cards can be an extremely
inefficient way of making a small purchase, with the fees often eating most
of the profit margin.

Still consumers have begun to get used to the idea of buying small items
over the Net.

 Growth of the digital content market seems almost a certainty, based on
the projected expansion of segments including music services, Internet
publishing, and applications for mobile devices, such as custom ring tones
or games. Cambridge, Mass., analyst firm Forrester Research has predicted
that music downloads alone will become a $1.4 billion business by 2006,
accounting for nearly 10 percent of annual music sales in the United States.

 Jupiter Research estimates that revenue from online content will reach
$3.1 billion by 2009, driven by an increasing number of broadband-ready
homes spending money on Web-based music services, games and e-books, among
other things. Industry experts agree that iTunes deserves a lot of the
credit for opening consumers' eyes to the option of buying online in
micro-size increments, and most seem to feel that digital content will
continue to dominate the market for small Web-based transactions.

 Micropayments don't just represent buying low-priced items. They can also
can be used to get people to test new products, or try out a service that
charges a lot more for a subscription.
 --analyst Nick Holland, Mercator Advisory Group

 According to Nick Holland, an analyst with Shrewsbury, Mass.-based
Mercator Advisory Group, growth of the micropayments market will be almost
completely dependent on music, ring tones and games, specifically, at least
for the next several years. The analyst estimates that such content will
constitute a $2.3 billion market in the United States this year alone, and
while Holland said subscriptions will remain consumers' favorite method of
payment for digital content, 

Re: What are the risks associated with partially know cipher keys

2004-09-07 Thread Werner Koch
On Tue, 7 Sep 2004 13:24:39 +0800, Padraig MacIain said:

 problem. However, does it offer a great risk for something like
 OpenPGP if the passphrase used to access the secretkey  is partially

That depends on quality of the passphrase; it makes dictionary attacks
easier.

 compromised? And in turn if the passphrase is completely known yet the
 secret key is still secured (physically) does knowing this passphrase
 risk a complete compromise of the key pair?

No.  The protection of the private key is is independent of the key.
They are in no way related.  The key is based on a random string and
only the protection of this key is based on the passphrase.  This
protection only helps against a lost (but protected) private key.


Salam-Shalom,

   Werner



Re: What are the risks associated with partially know cipher keys

2004-09-07 Thread Padraig MacIain
Thank you for your answers Werner. 

I was fairly certain myself about the first question you answered. Its
a 'well its obvious' kind of question.

I wasn't sure about the second one, and I am too snowed under at work
dealing with radius and voip stuff for me to read through the various
*PGP source codes around to look at it from a logical point of view.

Many thanks.


On Tue, 07 Sep 2004 14:06:29 +0200, Werner Koch [EMAIL PROTECTED] wrote:
 On Tue, 7 Sep 2004 13:24:39 +0800, Padraig MacIain said:
 
  problem. However, does it offer a great risk for something like
  OpenPGP if the passphrase used to access the secretkey  is partially
 
 That depends on quality of the passphrase; it makes dictionary attacks
 easier.
 
  compromised? And in turn if the passphrase is completely known yet the
  secret key is still secured (physically) does knowing this passphrase
  risk a complete compromise of the key pair?
 
 No.  The protection of the private key is is independent of the key.
 They are in no way related.  The key is based on a random string and
 only the protection of this key is based on the passphrase.  This
 protection only helps against a lost (but protected) private key.
 
 Salam-Shalom,
 
   Werner
 
 



-- 
Padraig MacIain
url:  http://www.bur.st/~darke/ (Nimheil)
That is not dead which can eternal lie, and with strange aeons even
death may die.



Re: Maths holy grail could bring disaster for internet

2004-09-07 Thread Sunder
Forgive my ignorance, but would other PK schemes that don't rely on prime
numbers such as Elliptic Curve be affected?

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Tue, 7 Sep 2004, Matt Crawford wrote:

 On Sep 6, 2004, at 21:52, R. A. Hettinga wrote:
 
 This would be a good thing.  Because to rebuild the infrastructure 
 based on symmetric crypto would bring the trusted third party 
 (currently the CA) out of the shadows and into the light.



Gilmore case: CNN

2004-09-07 Thread J.A. Terranson

http://www.cnn.com/2004/LAW/09/06/airline.id.ap/index.html


Government wants ID arguments secret
Monday, September 6, 2004 Posted: 4:07 PM EDT (2007 GMT)


SAN FRANCISCO, California (AP) -- The U.S. Department of Justice has asked
an appellate court to keep its arguments secret for a case in which
privacy advocate John Gilmore is challenging federal requirements to show
identification before boarding an airplane.

A federal statute and other regulations prohibit the disclosure of
sensitive security information, and that is precisely what is alleged to
be at issue here, the government said in court papers filed Friday with
the U.S. Ninth Circuit Court of Appeals. Disclosing the restricted
information would be detrimental to the security of transportation, the
government wrote.

Attorneys for Gilmore, a 49-year-old San Francisco resident who co-founded
the Electronic Frontier Foundation, a civil liberties group, said they
don't buy the government's argument and that its latest request raises
only more questions.

We're dealing with the government's review of a secret law that now they
want a secret judicial review for, one of Gilmore's attorneys, James
Harrison, said in a phone interview Sunday. This administration's use of
a secret law is more dangerous to the security of the nation than any
external threat.

Gilmore first sued the government and several airlines in July 2002 after
airline agents refused to let him board planes in San Francisco and
Oakland without first showing an ID or submitting to a more intense
search. He claimed in his lawsuit the ID requirement was vague and
ineffective and violated his constitutional protections against illegal
searches and seizures.

A U.S. District Court judge earlier this year dismissed his claims against
the airlines, but said his challenge to the government belonged in a
federal appellate court.

Now in his appellate case, Gilmore maintains the federal government has
yet to disclose the regulations behind the ID requirement to which he was
subjected.

How are people supposed to follow laws if they don't know what they are?
Harrison said.

The government contends its court arguments should be sealed from public
view and heard before a judge outside the presence of Gilmore and his
attorneys. The government, however, said it would plan to file another
redacted public version of its arguments.

A date for a hearing on the matter has not yet been set.





Re: stegedetect Variola's Suitcase

2004-09-07 Thread Tyler Durden
Joseph Holsten  wrote...
who are ya tryin to fool?
Well, just in case it's not obvious, the clear issue here is whether the use 
of Stego is actually merely a red flag, in which case it may actually be 
worse than using nothing on some levels. If every message used it, though...

-TD
_
Express yourself instantly with MSN Messenger! Download today - it's FREE! 
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/



RE: stegedetect Variola's Suitcase

2004-09-07 Thread Tyler Durden
So here's the 'obvious' question:
How fast can dedicated hardware run if it were a dedicated Stegedetect 
processor?

In other words, how easy would it be for NSA, et al to scan 'every' photo on 
the internet for Stego traces? (And then, every photo being emailed?)

And then, how fast can someone write a worm that will make every photo 
stored on a harddrive look like it's been stegoed?

-TD

From: Sunder [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: stegedetect - looks like we need better mice
Date: Tue, 7 Sep 2004 05:53:08 -0400 (edt)
http://freshmeat.net/projects/stegdetect/?branch_id=52957release_id=172055
http://www.outguess.org/detection.php
Steganography Detection with Stegdetect
Stegdetect is an automated tool for detecting steganographic content in
images. It is capable of detecting several different steganographic
methods to embed hidden information in JPEG images. Currently, the
detectable schemes are
* jsteg,
* jphide (unix and windows),
* invisible secrets,
* outguess 01.3b,
* F5 (header analysis),
* appendX and camouflage.
Stegbreak is used to launch dictionary attacks against JSteg-Shell, JPHide
and OutGuess 0.13b.
Stegdetect and Stegbreak have been developed by Niels Provos.
--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-
_
Check out Election 2004 for up-to-date election news, plus voter tools and 
more! http://special.msn.com/msn/election2004.armx



Re: stegedetect Variola's Suitcase

2004-09-07 Thread Joseph Holsten
On Tue, 07 Sep 2004 11:22:28 -0400, Tyler Durden
[EMAIL PROTECTED] wrote:
 How fast can dedicated hardware run if it were a dedicated Stegedetect
 processor?
..
 In other words, how easy would it be for NSA, et al to scan 'every' photo on
 the internet for Stego traces? (And then, every photo being emailed?)
Although I haven't looked at the code behind stegedetect yet, I can
assume that a single dedicated processor would be less efficient that
perhaps two or three dedicated processors. Some steg (appendx,
camouflage) isn't steg, just data appended to the end of the file, in
valid jpeg encapsulation. Real steg (f5, jsteg, jphide,  steghide)
would require looking at more data, for more time. it would be a waste
to have the same processor working on appended data and real steg.
Quick answer: I don't know / Depends on the data.

 And then, how fast can someone write a worm that will make every photo
 stored on a harddrive look like it's been stegoed?
Again, you'd have to decide between real and fake steg. Appending a
fortune message to the end of an image would be really quick, and
would alert stegedetect. But if you want to signal the nsa, you'd need
real steg with real (but breakable) crypto. The difference is quick
perl script versus a modified jpeg library.
who are ya tryin to fool?
[EMAIL PROTECTED]



RE: stegedetect Variola's Suitcase

2004-09-07 Thread Sunder

The answer to that question depends on some leg work which involves 
converting the source code to stegetect into hardware and seeing how fast 
that hardware runs, then multiplying by X where X is how many of the chips 
you can afford to build.

I'd image that it's a lot faster to have some hw that gives you a yea/nay 
on each JPG, than to say, attempt to crack DES.

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-

On Tue, 7 Sep 2004, Tyler Durden wrote:

 So here's the 'obvious' question:
 
 How fast can dedicated hardware run if it were a dedicated Stegedetect 
 processor?
 
 In other words, how easy would it be for NSA, et al to scan 'every' photo on 
 the internet for Stego traces? (And then, every photo being emailed?)
 
 And then, how fast can someone write a worm that will make every photo 
 stored on a harddrive look like it's been stegoed?



Re: Remailers an unsolveable paradox?

2004-09-07 Thread James A. Donald
--
On 4 Sep 2004 at 21:50, Nomen Nescio wrote:
 The ratio of remailer use to abuse is painfully low because
 there's no way to actually communicate. You can broadcast but
 not recieve, because no system exists to receive mail
 psuedononymously. This is not communication.

 Remailer use is restricted to when senders don't care about 
 listener, which means rants, death threats, and the abuse
 of spam. The only systems for receiving mail are at best some
 college student's unimplemented thesis.

alt.anonymous.messages provides a channel for people who wish
to receive messages without themselves being identified.

If I want to receive a message without providing and email
address that can be traced, I ask the recipient to post in in
the newsgroups such as alt.anonymous.messages.

For obvious reasons people who read alt.anonymous.messages, or
think they might need to read it in the future, download the
newsgroup in its entireity. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 fzparMQ1YGMHFGGQ4eabvrdbfX3oQPnGSeUNNkuX
 4UV3sPQUJdBwqav34D5pBXRBNtLg+GX5dxE+YM5P8




RE: Gilmore case...Who can make laws?

2004-09-07 Thread Chuck Wolber
On Tue, 7 Sep 2004, Tyler Durden wrote:

 This describes the Government as creating secret laws. But, 
 theoretically, only the congress and the Senate can create new laws, 
 correct? The Executive branch has never been empowered to create laws, 
 and I'm thinking these travel laws did not go through congress or the 
 senate.

Well, there's the Executive Order, as well as the fact that many 
organizations are empowered to create policy. Although policy is not 
specifically law, it may as well be. 

I am curious though:


1) Can the laws that grant policy making privileges be themselves secret?

2) Are policy making privilege laws restricted within a certain scope 
(within a specific organization)?

3) Are all *SIGNED* executive orders publically available?

-Chuck


-- 
http://www.quantumlinux.com 
 Quantum Linux Laboratories, LLC.
 ACCELERATING Business with Open Technology

 The measure of the restoration lies in the extent to which we apply 
  social values more noble than mere monetary profit. - FDR



Re: Gilmore case...Who can make laws?

2004-09-07 Thread Eric Cordian
TD writes:

 This describes the Government as creating secret laws. But, theoretically, 
 only the congress and the Senate can create new laws, correct? The Executive 
 branch has never been empowered to create laws, and I'm thinking these 
 travel laws did not go through congress or the senate.

The big loophole here is regulation.  Congress passes a law declaring 
that some governmental organization has the power to regulate something, 
and then that organization may create rules, impose financial penalties, 
and send people to jail under a plethora of laws against obstructing 
organizations blessed with regulatory powers.

Congress, for instance, does not make every single law governing the 
behavior of pharmacutical companies, or every single law governing the use 
of the radio spectrum.  Instead, it makes one law granting the FDA or FCC 
regulatory powers, and exercises only oversight with regards to their 
subsequent behavior.

An argument that the TSA cannot make rules, even secret rules, regulating 
air travel, because it is not Congress, will not pass the giggle test in 
court, unless you can show that the TSA exceeded its regulatory powers.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
Do What Thou Wilt Shall Be The Whole Of The Law



RE: stegedetect Variola's Suitcase

2004-09-07 Thread Major Variola (ret)
At 11:57 AM 9/7/04 -0400, Sunder wrote:
The answer to that question depends on some leg work which involves
converting the source code to stegetect into hardware and seeing how
fast
that hardware runs, then multiplying by X where X is how many of the
chips
you can afford to build.

A quick perusal of stegdetect.c, attending to how it analyzes jphide
images,
indicates that it computes histograms of DCT coefficients and then
performs
chi^2 tests on the distributions.  Since this is
fairly easy on a generic RISC CPU, one might be better off with a rack
o' blades
or even a cluster.  Particularly because most JPGs will fit inside your
typical
21st century-sized processor cache.

Note that a streaming implementation is not easy because JPG data will
have to be reassembled from transport-level packet quantization; e.g., a
200KB JPG is a lot
of 1500 byte packets.  Better to snarf  reassemble the JPG then analyze
the whole captured image.

Contrast this with e.g., block cipher accelerators that benefit
from hardware implementation because they use bit-diddling not well
supported by
a typical instruction set.  Or modexp() accelerators that benefit from
parallelism.

Joseph Holsten [EMAIL PROTECTED] is right that its a complete waste
(and not really stego) to look for data appended to the image data.  Any
data appended there, especially noise :-), will be suspicious.


I'd image that it's a lot faster to have some hw that gives you a
yea/nay
on each JPG, than to say, attempt to crack DES.

Stegdetect is performing a signal-detection task.  As such, it measures
a continuous
variable, then thresholds it to make a decision.  Therefore there is a
tradeoff between sensitivity and false positives.

For instance, I produced a test, jphide stego'd JPG which is *not*
detected by stegdetect
with default sensitivity, but using the -s 3 argument it scores one
asterisk.

The steganographer can make the steganalysts' jobs much harder by
keeping
the S/N down, ie by only using short messages in large images.  This is
alluded
to in the jphide pages: Given a typical visual image, a low insertion
rate (under 5%) and the absence of the original file, it is not possible
to conclude with any worthwhile certainty that the host file contains
inserted data. and follows from signal detection theory.
It is also empirically true from some casual experimentation.

Further commentary:

* Stegdetect, though clever and well written (if poorly commented),
barfs on a number of valid JPGs, including monochrome ones.

* One could write a jphide variant which doesn't skew the coefficients
e.g., if you
use the upper half of an image for cargo, and the lower half to hide the
changes.
If instead of simplistic halves you used the passphrase to seed a PRNG
you could
disperse the cargo  re-balancing changes much more subtly.

* MPx format files have great potential, for both image, image-N-tuple,
and audio stego; is that http://irenarchy.org hip-hop recruiting video
really just a video?   (And is morphing someone into a sesame-street
character fair use?)

* Note that stego dictionary-attack breaking *would* benefit from
compression-
and crypto- accelerators for obvious reasons.  But the topic here is
stego detection.

---
Steganography is in the eye of the beholder.  -Viktor.




Re: Maths holy grail could bring disaster for internet

2004-09-07 Thread Eric Cordian
RAH pastes:

 Tim Radford, science editor
 Tuesday September 7, 2004

 The Guardian
 Mathematicians could be on the verge of solving two separate million dollar
 problems. If they are right - still a big if - and somebody really has
 cracked the so-called Riemann hypothesis, financial disaster might follow.
 Suddenly all cryptic codes could be breakable. No internet transaction
 would be safe.

Bullshit.  A constructive proof of NP=P would doom strong crypto.  A proof 
of the Riemann hypothesis MIGHT lead to polynomial time factoring, which 
would break RSA, but leave the rest of cryptography largely untouched.

The Guardian needs to raise the bar a bit for that which it alleges to be 
Science Writing.

Louis de Branges proves the Riemann Hypothesis every year, by the way.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
Do What Thou Wilt Shall Be The Whole Of The Law



Re: Gilmore case...Who can make laws?

2004-09-07 Thread J.A. Terranson

On Tue, 7 Sep 2004, Eric Cordian wrote:

 An argument that the TSA cannot make rules, even secret rules, regulating
 air travel, because it is not Congress, will not pass the giggle test in
 court, unless you can show that the TSA exceeded its regulatory powers.

Absolutely correct.

I am however intrigued that they may be preparing to posit that secret
rules (which act under color of law) can be enforced without being
described publicly.  This, if accepted, would effectively end all
constitutional protections.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  ...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them.  Osama Bin Laden
- - -

  There aught to be limits to freedom!George Bush
- - -

Which one scares you more?