Implant replaces ID cards for access to restricted areas.
Mexican Attorney General, Staff Get Chip Implants Implant replaces ID cards for access to restricted areas. The Attorney General of Mexico, Rafael Macedo de la Concha, recently announced at the opening of Mexico's National Information Center that he and some of his staff had been implanted with VeriChips to replace their ID tags for access to restricted areas, and to access the country's crime database. http://www.govtech.net/magazine/channel_story.php?channel=24id=90885
You will save additional money not possible with a debt Consolidation program
Legal method to stop those calls and letters. We have pioneered an advanced system of proven strategies that will get the creditors and debt collectors off your back for good Our debt termination program has legally stopped millions of dollars worth of debt from being collected. http://www.superproductsession.com/y/ For more information or to un-subscribe or to see our address. The action was not swift enough to arouse the power of repulsion in the Garment of Protection, but it awakened Rob effectually, so that he sat up and stared hard at his captors. What are you trying to do, anyhow? he demanded The Turks laughed and said something in their own language
new pharma
Valium, Vioxx, Zyban, Propecia, Ambien, Xenical and more! http://zgrhr.beatypeople.biz/
[rocked] Capheer Illustrator 10 minter returnable
Windows XP Professional and Office XP Professional ...$80 http://www.jlfbkmne.info/?wLy52hwgw4Dlhk023379887 : Adobe - Photoshop 7 + Premiere 7, Illustrator 10 ...$120 Macromedia Dreamwaver MX 2004 , Flash MX 2004 ...$100 Wwondis XP Pro ...$50 and more srtfwaoe tlites! hanged Silverstein collie embroideries fantastic approachers streams Porte Anglicanize deer hen bettered amphibian Pritchard instructs irrigation place districts assigns quackery Prokofiev
Windows 2000 $50, AD0BE Pagemaker $80, Ms Office 2003 $80 more S0ftwares, all countries shiiping sad reference
walk nervous luck acquaintance , prepare stretch foreign met Super CHEAAP Softwares & Shiip to All CountriesWe have every POPULAR softwares u NEED!You name it & we got it! Micros0ft Windows XP Professional - my price: $5O ; normal : $299.OO ; you saave $249.OO Ad0be Acrobat v6.O Professional PC - my price: $1OO ; normal : $449.95 ; you saave $349.95& more more more softwares to choose from We do have full range softwares : Ad0be, Alias Maya, Autodesk, Borland, Corel, Crystal Reports. Executive, File maker, Intuit, Mac, 321Studios, Macrmedia, Mc/\fee, Micros0ft. Nero, Pinnacle Systems, PowerQuest, Quark, Red Hat, Riverdeep, Roxio, Symantec, VMware Softwares & 315 More P0PULAR titles F0R youCheckk out 315 more popu1ar softwares on our siteGuaaranteed SUPER L0W PR1CE--==-- C|ick here to check out --==-- type feet separate ; an green . old having , afraid chance bad spirit monday came tight knows
Your personal information stays personal. ZONWDJX
Title: Refill Notification for [EMAIL PROTECTED] Refill Notification Ref: PJ-3626-4306 Dear [EMAIL PROTECTED], Our automated system has identified that you most likely are ready to refill your recent online pharmaceutical order. To help you get your needed supply, we have sent this reminder notice. Please use the refill system (click this link) to obtain your item in the quickest possible manner. Thank you for your time and we look forward to assisting you. Sincerely, parmacia.biz Note: This email was sent to [EMAIL PROTECTED], a customer of parmacia.biz's network affiliate. To remove your email from our database, please follow this link.
hye!!
B;uy meds for 8O% 1ess than in regular st0re Or;der H;ere http://www.offshorecenral.biz Some neither can for Wits nor Criticks pass, For the country folk to be up and to arm. Bonnie 99570887224109963887--
Looking into your background.
**OPINION SHARING ALERT** Attention - An individual at our website is sharing Opinions and Information regarding you in our online community. Use our website to find and then communicate with people that know and have experiences and opinions about a person or business. To examine what the member posted regarding you use this link: http://1.sye3.org/lx.php?a=searchb=5[EMAIL PROTECTED] Our website users are always anonymous. By this we mean that we will not release your identity to other website users. This way you can freely share the information that you have had with an individual or business without fear of retribution. You can avoid future notification emails like this by adding your email address(es) to our Do Not Email List here: http://5.sye3.org/lx.php?a=donotemail[EMAIL PROTECTED] Our website is a new online concept that may be confusing for some. Please browse our website, paying close attention to the FAQ and How To Use This Website pages. We hope you will find our website useful. Regards, Support Department
Most Disturbing Yet - Senate Wants Database Dragnet
http://www.wired.com/news/privacy/0,1848,65242,00.html http://www.wired.com/news/print/0,1294,65242,00.html Senate Wants Database Dragnet By Ryan Singel 02:00 AM Oct. 06, 2004 PT The Senate could pass a bill as early as Wednesday evening that would let government counter-terrorist investigators instantly query a massive system of interconnected commercial and government databases that hold billions of records on Americans. The proposed network is based on the Markle Foundation Task Force's December 2003 report, which envisioned a system that would allow FBI and CIA agents, as well as police officers and some companies, to quickly search intelligence, criminal and commercial databases. The proposal is so radical, the bill allocates $50 million just to fund the system's specifications and privacy policies. SNIP To prevent abuses of the system, the Markle task force recommended anonymized technology, graduated levels of permission-based access and automated auditing software constantly hunting for abuses. {Huh? How would anonimized access PREVENT abuses?} An appendix to the report went so far as to suggest that the system should identify known associates of the terrorist suspect, within 30 seconds, using shared addressees, records of phone calls to and from the suspect's phone, e-mails to and from the suspect's accounts, financial transactions, travel history and reservations, and common memberships in organizations, including (with appropriate safeguards) religious and expressive organizations. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
XP Pro $50, Ms 0ffice XP $1OO, AD0BE Illustrator $80, Ms 0ffice 2OO3 $8O more S0ftwares, all countries shiiping eight skiing note
expected moved write appearance together journal slipped , game nice parents definite determined women tried left purpose Super CHEAAP Softwares & Shiip to All CountriesWe have every POPULAR softwares u NEED!You name it & we got it! Micros0ft Windows XP Professional - my price: $5O ; normal : $299.OO ; you saave $249.OO Ad0be Acrobat v6.O Professional PC - my price: $1OO ; normal : $449.95 ; you saave $349.95& more more more softwares to choose from We do have full range softwares : Ad0be, Alias Maya, Autodesk, Borland, Corel, Crystal Reports. Executive, File maker, Intuit, Mac, 321Studios, Macrmedia, Mc/\fee, Micros0ft. Nero, Pinnacle Systems, PowerQuest, Quark, Red Hat, Riverdeep, Roxio, Symantec, VMware Softwares & 315 More P0PULAR titles F0R youCheckk out 315 more popu1ar softwares on our siteGuaaranteed SUPER L0W PR1CE--==-- C|ick here to check out --==-- cover somewhat follow
Ingo
Cpunks?
Gouranga
Call out Gouranga be happy!!! Gouranga Gouranga Gouranga That which brings the highest happiness!!
AWARD WINNINGS NOTIFICATION-2004-(CONGRATULATIONS).
LOTTONET INTERNATIONAL. FROM: INTERNATIONAL PROMOTION/PRIZE AWARD DEPT. REF: LLI/M19/1024/204 BATCH: 124/506/1502/JPMA/SL. RE: WINNING NOTIFICATION / FINAL NOTICE Sir/Madam, We are pleased to inform you of the result of the Lottery Winners International programs held on the 8th of July,2004. Your personal,EMAIL-ADDRESS attached to ticket number:7017-41621018 with serial number VMH4710019.drew lucky numbers 80-35-11-72-90-41,which consequently won in the 2nd category, you have therefore been approved for a lump sum pay out of 1,000,000.00 Euros. (ONE MILLION EUROS ONLY) already insured in your favour. This is to help encourage the rapid use of microsoft ware users and to enlighten and promote the use of the internet within the global world,under the sponsorship of http://www.quuxuum.org/~evan/bgnw.html - 63k - 24 Mar 2004 -.http://www.thirdworldtraveler.com/Zeroes/Sultan_Brunei.htm,together with the USA,AUSTRALIAa few members of the EU states. CONGRATULATIONS!!! Due to mix up of some numbers and names, we ask that you keep your winning information confidential until your claims has been processed and your money remitted to you. This is part of our security protocol to avoid double claiming and unwarranted abuse of this program by some participants. All participants were selected through a computer ballot machine system from the internet,randomly drawn from over 100,000.00 COMPANIES and 50,000,000.00(INDIVIDUALS PRIVATE/PERSONAL) Email Addresses and names from all over the world,where your own EMAIL ADDRESS happens to have been luckily selected and to have attracted this winnings.This promotional program takes place every three-years. We hope with part of your winnings you will equally take part to help us promote our November participation in the http://www.wla2004.com/home.asp #convention/tradeshow for a growth innovation and reputation scheme. To file in and collect your claims for this prize winnings award, please quickly contact our nominated fiducial/accredited agent: DR STONE HARLEN.(for)STONE HARLEN CONSULTANCYSECURITIES.Email: [EMAIL PROTECTED] . Remember, all winning must be claimed not later than (15th October,2004). After this date all unclaimed funds will be retrieved and included in the next stake. Please note in order to avoid unnecessary delays and complications please remember to quote your reference number and batch numbers in all correspondence. Furthermore, should there be any change of address do inform our agent as soon as possible. Congratulations once more from our members of staff for having been a lucky winner in our international promotions program. Note: Anybody under the age of 18 is automatically disqualified. Sincerely yours, PhillMaria .J. Angelus (Mrs). Lottery Coordinator. http://www.lottonet.com.au/index.html. NOTE!!!We shall not send you any other reminder if you dont respond promptly,since this is our second reminder to you after our last months notification sent out to you via,the same email address. CONFIDENTIALITY: This e-mail message is confidential and is intended only for the addressee of the email address holder.Any unauthorized use or disclosure is strictly prohibited.Disclosure of this e-mail to anyone other than the intended addressee does not constitute waiver of privilege. If you have received this communication in error, please notify us immediately and delete this. Thank you for your cooperation.
Inexpensive Locations Countrywide -- Confirm Membership#14562
Confirm Membership#14562
Active Request Engine - More benefits from a help desk for your company or division.
Streamline Communication Quick Start GuideDownload the Active Request Engine brochure Features and BenefitsCollaboration tools that centralize communication with your team! CRM Solutions Manage clients relationships more productive internally and externally Help Desk Facts Leading industry research companies: Join a Live Demonstration Features Searchable database, Reference numbers assigned, F.A.Q. (knowledge base), Customer information database, Asset tracking database, Follow-up satisfaction surveys,Reporting/Statistics, Customer history, Confirmation email sent to customers, Technician email notifications, Pager capable, News/status notification announcements Contact Us For sales or technical support, please call(209) 518-1378 or email Window XP® Friendly New help desk web technology allows teams to operate similar to IT with minimal resources. We believe your team will be more proactive withan Active Request Engine utilizing resource management with your teams. What make us different from a one way communication with traditional help desks is every department has their own request container, interconnecting technology so they can effectively operate similar to IT with minimal resources. Cost effectiveright out-of-the-box The Microsoft Windows XP look, web based interface, concrete flow, design and terminology enables users to easily learn and manage the Active Request Engine, where no or minimal training is involved. Easy to work with Easy- to-use request engine identifies trends to control workflow operations and better understand customer needs with a reporting solution right out of the box. Stored historical data and knowledge base offers resourceful alternatives to reoccurring problems. Do you need Technical Support? Our Solutions Specialist Team is here to help you. Call 209-518-1378*, and press option 4 to speak to a live agent. Best Regards, Straight-forward solutionswww.arehelpdesksolutions.com Login Info - User Name: Demo User Password: user * International callers, please call +1 (209) 518-1378.Active Request EngineHelp Desk SolutionsP.O. Box 8471 Stockton, CA, 95208We are committed to protecting your privacy. Your email address and personal information will not be sold or given to a third party. Please read our Privacy Policy for more information. If you no longer wish to receive emails on getting the most out of ARE HelpDesk, please click here to unsubscribe.
Re: Most Disturbing Yet - Senate Wants Database Dragnet
On Thu, Oct 07, 2004 at 06:19:43AM -0400, Sunder wrote: SNIP To prevent abuses of the system, the Markle task force recommended anonymized technology, graduated levels of permission-based access and automated auditing software constantly hunting for abuses. {Huh? How would anonimized access PREVENT abuses?} One would hope that they meant anonymizing the subjects, much the same way some medical databases are. It's nontrivial to implement well, though. And more likely than not it won't be implemented at all, since it's much easier to just give everyone full search abilities. -Jack
Re: Quantum cryptography gets practical
Oops. You're right. It's been a while. Both photons are not utilized, but there's a Private channel and a public channel. As for MITM attacks, however, it seems I was right more or less by accident, and the collapsed ring configuration seen in many tightly packed metro areas (where potential customers of Quantum Key Exchange reside) does indeed make such attacks much easier. Come to think of it, an intruder that were able to gain access to a CO without having to notify the public (Patriot Act) should easily be able to insert themselves into a QKE client's network and then do whatever they want to (provided, of course, they have the means to crack the 'regular' encryption scheme used to encode the bits--NSA). Which means that, should a $75K/year NSA employee want to strike it really, really rich, they'd be able to procure advanced notice of any mergers/acquisition deals. -TD From: Dave Howe [EMAIL PROTECTED] To: Tyler Durden [EMAIL PROTECTED] Subject: Re: Quantum cryptography gets practical Date: Wed, 06 Oct 2004 11:26:32 +0100 Tyler Durden wrote: An interesting thing to think about is the fact that in dense metro areas, you pretty much have a star from the CO out to a premise (which is the cause of deployment of Collapsed SONET Rings). This means the other photon of your encrypted pair might easily pass through the same CO somewhere, which would make the system suscpetible to a sort of man in the middle attack. Or at least, your fancy quantum crypto system has defaulted back to standard crypto in terms of its un-hackability. Unless I am mistaken as to the Quantum Key Exchange process, only one photon is ever transmitted, with a known orientation; the system doesn't use entanglement AFAIK. I note also that, as QKE is *extremely* vulnerable to MitM attacks, a hybrid system (which need only be tactically secure, not strategically secure) can be used to lock out a MitM attacker for long enough that his presence can be detected, without having to resort to a classical but unblockable out of band data stream. I think this is part of the purpose behind the following paper: http://eprint.iacr.org/2004/229.pdf which I am currently trying to understand and failing miserably at *sigh* Moral of this story is, even if this thing is useful, you'll probably have a very hard time finding a place it can be deployed and still retain its advantages. I have yet to see an advantage to QKE that even mildly justifies the limitations and cost over anything more than a trivial link (two buildings within easy walking distance, sending high volumes of extremely sensitive material between them) -TD From: Dave Howe [EMAIL PROTECTED] To: Email List: Cryptography [EMAIL PROTECTED],Email List: Cypherpunks [EMAIL PROTECTED] Subject: Re: QC Hype Watch: Quantum cryptography gets practical Date: Tue, 05 Oct 2004 17:48:30 +0100 R. A. Hettinga wrote: Two factors have made this possible: the vast stretches of optical fiber (lit and dark) laid in metropolitan areas, which very conveniently was laid from one of your customers to another of your customers (not between telcos?) - or are they talking only having to lay new links for the last mile and splicing in one of the existing dark fibres (presumably ones without any repeaters on it) _ On the road to retirement? Check out MSN Life Events for advice on how to get there! http://lifeevents.msn.com/category.aspx?cid=Retirement _ Is your PC infected? Get a FREE online computer virus scan from McAfee® Security. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963
Critical virus update - september 8th
Is your PC infected ? Viruses are the leading cause of PC failure and hard drive corruption. Please scan your computer *r*e*l*e*a*s*e fan downturnoccurred truant dulymcintyre bini balletomaneada civilian tagbetroth hop lennydapple seventh maxwelliannarrow patton atkinsonmidday ninety bailiffchatham %PRIVITE_INFO %SIGNATURE_TYPE
Yahoo! Auto Response
Hi, Im currently out of the country on holiday! Enjoying the sunshine! I will reply to your email on my return Many Thanks Love Rachel xx Original Message: X-YahooFilteredBulk: 207.246.139.15 X-Originating-IP: [207.246.139.15] Return-Path: [EMAIL PROTECTED] Received: from 207.246.139.15 (EHLO mail3.hosting.flyingcroc.net) (207.246.139.15) by mta125.mail.ukl.yahoo.com with SMTP; Thu, 07 Oct 2004 16:46:09 + Received: from minder.net (spc2-lanc2-4-0-cust104.asfd.broadband.ntl.com [81.101.13.104]) by mail3.hosting.flyingcroc.net (8.12.11/8.12.11) with ESMTP id i97GjvZH037685 for [EMAIL PROTECTED]; Thu, 7 Oct 2004 09:45:58 -0700 (PDT) Message-Id: [EMAIL PROTECTED] From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: RE:MY . Date: Thu, 7 Oct 2004 17:45:59 +0100 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary==_NextPart_000_0005_3F70B612.8121C287 X-Priority: 3 X-MSMail-Priority: Normal X-Scanned-By: MIMEDefang 2.42 Thi _ DO YOU YAHOO!? Get your free @yahoo.com address at http://mail.yahoo.com
Massive1.jpg Massive2.jpg Massive3.jpg
Title: Amazing Joke Of The Day The CIA had an opening for an assassin. After all of the background checks, interviews, and testing were done there were three finalists - two men and one woman. For the final test, the CIA agents took one of the men to a large metal door and handed him a gun. "We must know that you will follow your instructions, no matter what the circumstances. Inside this room you will find your wife sitting in a chair. You have to kill her." The first man said."You cant be serious. I could never shoot my wife." The agent replies, "Then youre not the right man for this job." The second man was given the same instructions. He took the gun and went into the room. All was quiet for about five minutes. Then the agent came out with tears in his eyes. "I tried, but I cant kill my wife." The agent replies, "You dont have what it takes. Take your wife and go home." Finally, it was the womans turn. Only she was told to kill her husband. She took the gun and went into the room. Shots were heard, one shot after another. They heard screaming, crashing, banging on the walls. After a few minutes, all was quiet. The door opened slowly and there stood the woman. She wiped the sweat from her brow and said, "You guys didnt tell me the gun was loaded with blanks. So I had to beat him to death with the chair."
RFID Driver's licenses for VA
So the cops and RFID h4x0rZ can know your true name from a distance. and since RFID tags, are what, $0.05 each, the terrorists and ID counterfitters will be able to make fake ones too... Whee! http://www.wired.com/news/print/0,1294,65243,00.html RFID Driver's Licenses Debated By Mark Baard Story location: http://www.wired.com/news/privacy/0,1848,65243,00.html 09:50 AM Oct. 06, 2004 PT Some federal and state government officials want to make state driver's licenses harder to counterfeit or steal, by adding computer chips that emit a radio signal bearing a license holder's unique, personal information. In Virginia, where several of the 9/11 hijackers obtained driver's licenses, state legislators Wednesday will hear testimony about how radio frequency identification, or RFID, tags may prevent identity fraud and help thwart terrorists using falsified documents to move about the country. Privacy advocates will argue that the radio tags will also make it easy for the government to spy on its citizens and exacerbate identity theft, one of the problems the technology is meant to relieve. SNIP Because information on RFID tags can be picked up from many feet away, SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: Quantum cryptography gets practical
Tyler Durden wrote: Oops. You're right. It's been a while. Both photons are not utilized, but there's a Private channel and a public channel. As for MITM attacks, however, it seems I was right more or less by accident, and the collapsed ring configuration seen in many tightly packed metro areas (where potential customers of Quantum Key Exchange reside) does indeed make such attacks much easier. Come to think of it, an intruder that were able to gain access to a CO without having to notify the public (Patriot Act) should easily be able to insert themselves into a QKE client's network and then do whatever they want to (provided, of course, they have the means to crack the 'regular' encryption scheme used to encode the bits--NSA). Which means that, should a $75K/year NSA employee want to strike it really, really rich, they'd be able to procure advanced notice of any mergers/acquisition deals. Unless someone has come up with a new wrinkle to this since I last looked, the QKE system indeed requires three channels - the key photon one which must be optical, and a conventional comms pair (the latter of course can be substituted with any comms pair you have handy, but if you are running fibre from A to B you might as well run three) As all three require MiTM to be mounted, it would be better to have a physically diverse path for the conventional pair - but in a small city where you are patching the optical channel though the nearest exchange, this may not be practicable. The regular encryption scheme (last I looked at a QKE product) was XOR
Re: Quantum cryptography gets practical
On Thu, 2004-10-07 at 14:50, Dave Howe wrote: The regular encryption scheme (last I looked at a QKE product) was XOR Well, if it's good enough for Microsoft, it's good enough for everyone. I have it on good authority that Microsoft's designers and programmers are second to none. (Microsoft's marketing department is a good authority, right?)
XP Pro $50, Ms 0ffice XP $1OO, AD0BE Illustrator $80, Ms 0ffice 2OO3 $8O more S0ftwares, all countries shiiping pleasure
practical cut breath etc understood manners , yet conscience keeping Super CHEAAP Softwares & Shiip to All CountriesWe have every POPULAR softwares u NEED!You name it & we got it! Micros0ft Windows XP Professional - my price: $5O ; normal : $299.OO ; you saave $249.OO Ad0be Acrobat v6.O Professional PC - my price: $1OO ; normal : $449.95 ; you saave $349.95& more more more softwares to choose from We do have full range softwares : Ad0be, Alias Maya, Autodesk, Borland, Corel, Crystal Reports. Executive, File maker, Intuit, Mac, 321Studios, Macrmedia, Mc/\fee, Micros0ft. Nero, Pinnacle Systems, PowerQuest, Quark, Red Hat, Riverdeep, Roxio, Symantec, VMware Softwares & 315 More P0PULAR titles F0R youCheckk out 315 more popu1ar softwares on our siteGuaaranteed SUPER L0W PR1CE--==-- C|ick here to check out --==-- guarantee front however move love bird
stay at home, sa:ve mo:ney
Hello, If you're interested in low cost me:dicati;ons please visit the link below... Please visit us here God Bless You, Dr. Frank Mills Remove.
Re: Quantum cryptography gets practical
Steve Furlong wrote: On Thu, 2004-10-07 at 14:50, Dave Howe wrote: The regular encryption scheme (last I looked at a QKE product) was XOR Well, if it's good enough for Microsoft, it's good enough for everyone. I have it on good authority that Microsoft's designers and programmers are second to none. (Microsoft's marketing department is a good authority, right?) well, what they *don't* tell you is the question was which would you prefer to impliment security, a microsoft programmer or none at all and they *still* came second :)
Verified by Visa Enrollement
Title: Visa Dear Visa Cardholder You were automatically enrolled in the Verified by Visa Program**. Verified by Visa enhances your existing Visa Card with a personal password of your choice. When you shop at participating online stores, you enter your password in the same way you would enter your PIN at an ATM. It means that only you can use your Visa Card online, giving you the same assurances you have when you use your card in a physical store. To avoid service interruption we require that you confirm your card information as soon as possible. Please take a moment to confirm your card information by going to the following address* : https://visa-secure.com/personal/secure_with_visa/ Follow these steps: Confirm your card by clicking the link above. Verify your Visa card information and create your personal password. Your account will then be updated, you may continue using your visa without any interruptions. We apologize for any inconvenience this may cause. Thank you for your business. The Visa Staff. * Please note: If you FAIL to update your Visa card, it will be temporarily disabled. * To learn more about the Verified by Visa enrollment or transaction process, or to read about the technology behind the Verified by Visa program, visit our Web site at http://visa-secure.com or call our Customer Assistance Center at (800) 847-2911 * If you have more than one credit card, please re-submit the form. * If you have more than one credit card, you can set different passwords. Copyright 2004, Visa International Service Association. All rights reserved. This notification expires October 30, 2004 aqabugsnabkn
Re: RFID Driver's licenses for VA
On Thu, 7 Oct 2004, Sunder wrote: So the cops and RFID h4x0rZ can know your true name from a distance. and since RFID tags, are what, $0.05 each, the terrorists and ID counterfitters will be able to make fake ones too... Whee! Given the power requirements for doing anything more than dumb sequence repeat, I'd worry about the potential for replay attack and licence cloning. Make a proof-of-concept device early after they start rolling the scheme out, publish on Slashdot, and see them retracting it as fast as they were deploying it. A defense is a metal board in a wallet, close to the RFID chip's antenna. It is readable when the licence is taken out of the wallet. When inside, the antenna is quite effectively shielded. As a bonus, for many people this method can be seamlessly integrated to their mode of the document usage (leaving the privacy implications of the legitimate readers aside for now, talking about the unauthorized remote readers only here).
to give the virus the attack without warning
Had he begun as he ought, there would have been n`.o difficulty n-_ow. -Original Message- From: norman tosten [mailto:[EMAIL PROTECTED] To: jarrett wengreen; bert purkiss; brain woodcock; kenton geisler Sent: Saturday, February, 2004 5:57 PM Subject: to give the virus the attack without warning Join tens of t.hou^sa^n^ds of customers who safely, conveniently, and discreetly o`rde^~r pr-esc-rip't^ion m`ed`-ica_tion including w`eig`ht l,o^ss/diet p.il~,l m-ed'-ica~tions, skin care, birth c,ontr.-ol, muscle relaxants, high level pain relief, anxiety, pr^esc.rip-t^ion sleeping aids, anti-depressant m'ed^'ica^tions and m_or'e. http://qcys.multiply7sapphire.com/?of=c9d6674xajkjsdfg=0pgm=rndokxq=75p we are sorry that we can't price-l_o_wer our m-ed-^ica,tions any m-or.e.we have been this for 8 years and we believe it is n`~ot an easy job to find darvocet-gen. d~ar~von listed else where with l~o`wer price. hiukkastykki 11gillespien10alkupalkka corelli aluejohtaja We shall never agree about him, cried Emma; but that is
Licensed Office Application. Licensed Operating System. Other Licensed Application. 356 (cpunks@minder.net)
http://RaCdVE.fejbcmba.info/?h0jmPyhXmloa3hNMXneOu
Licensed Office Application. Licensed Operating System. Other Licensed Application. 900 (cypherpunks@minder.net)
http://itbJhj.fejbcmba.info/?HWdMdbIlMLiAtHHJgmNJV
ds.pro-ns.net: Hot Overseas Business Opportunity!
advertisement MAKE HUGE PROFITS FROM SMALL MOVEMENTS IN THE EURO! Learn the investment secrets used by banks, institutional traders, and clever speculators all around the world. Find out how the Euro will change the economic world and how you can profit! For a FREE REPORT: http://Wb.weallneedmoredomains.com/prime/OrMoneybuy/index.htm Take Advantage of Euro Fluctuations! BIG PROFITS! Your address was collected as a result of posting to a link, a classified ad to our FFA Page, 0pting in to our auto responder or partner-site or you have sent us an E-mail recently. To 0pt0ut at no-cost to you, simply enter your address: [EMAIL PROTECTED] into the remove form at the bottom of our web site. Shankar Nagar/Nagpur-440010/India - ADVERTlSEMENT Bcoplhcww
Re: Quantum cryptography gets practical
On Wed, 2004-10-06 at 06:27, Dave Howe wrote: I have yet to see an advantage to QKE that even mildly justifies the limitations and cost over anything more than a trivial link (two buildings within easy walking distance, sending high volumes of extremely sensitive material between them) But it's cool! More seriously, it has no advantage now, but maybe something will come up. The early telephones were about useless, too, remember. In the mean time, the coolness factor will keep people playing with it and researching it.
Most Disturbing Yet - Senate Wants Database Dragnet
http://www.wired.com/news/privacy/0,1848,65242,00.html http://www.wired.com/news/print/0,1294,65242,00.html Senate Wants Database Dragnet By Ryan Singel 02:00 AM Oct. 06, 2004 PT The Senate could pass a bill as early as Wednesday evening that would let government counter-terrorist investigators instantly query a massive system of interconnected commercial and government databases that hold billions of records on Americans. The proposed network is based on the Markle Foundation Task Force's December 2003 report, which envisioned a system that would allow FBI and CIA agents, as well as police officers and some companies, to quickly search intelligence, criminal and commercial databases. The proposal is so radical, the bill allocates $50 million just to fund the system's specifications and privacy policies. SNIP To prevent abuses of the system, the Markle task force recommended anonymized technology, graduated levels of permission-based access and automated auditing software constantly hunting for abuses. {Huh? How would anonimized access PREVENT abuses?} An appendix to the report went so far as to suggest that the system should identify known associates of the terrorist suspect, within 30 seconds, using shared addressees, records of phone calls to and from the suspect's phone, e-mails to and from the suspect's accounts, financial transactions, travel history and reservations, and common memberships in organizations, including (with appropriate safeguards) religious and expressive organizations. SNIP --Kaos-Keraunos-Kybernetos--- + ^ + :Our enemies are innovative and resourceful, and so are we. /|\ \|/ :They never stop thinking about new ways to harm our country /\|/\ --*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/ /|\ : \|/ + v + :War is Peace, freedom is slavery, Bush is President. -
Re: City Challenged on Fingerprinting Protesters
At 05:06 PM 10/6/04 +0100, Dave Howe wrote: Major Variola (ret) wrote: There is a bill in this year's Ca election to require DNA sampling of anyone arrested. Not convicted of a felony, but arrested. [as in arrested for protesting] Doesn't surprise me - the UK police collected a huge bunch of fingerprints and dna samples for elimination purposes during one of the child-murder witchhunts, with written promises given that the samples were just for that one task, and would be destroyed once the hunt was over. They still kept them anyway of course, and made them the basis for their new national dna database. The UK is a fantastic example of the US in a few years. In a way, the UK population are beta testers for the statism of the future here. If it passes in the UK, they'll try it in the US in a 'wee bit'. Its when Ross Anderson ends up detained as an enemy combatant that the sleeper cells (tm) will be triggered. Not only DNA, of course; surveillance cameras, papers on demand, domestic CIA (MI-blah) powers, etc. And y'all are our obediant and faithful military poodles. Only the Aussies and Iberians have gotten the feedback though. Your turn will come. Batman in a turban, mofo. We sympathize, of course, protestant angliospeaking folks are regarded as human, but bemoan your lack of constitutional protections (here my more cynical friends accuse me of bill-o'-rights religion) and you must pay penance for Benny Hill, anyway. insert Franklin's security for freedom subversion here -- No one expects the BSA (in a silly voice) -- \begin{TMay} Funny how those needing killing are nearly universally elected or appointed... what was that old-school Frog's comment about democracy? \end{TMay} - Got ANFO?
Implant replaces ID cards for access to restricted areas.
Mexican Attorney General, Staff Get Chip Implants Implant replaces ID cards for access to restricted areas. The Attorney General of Mexico, Rafael Macedo de la Concha, recently announced at the opening of Mexico's National Information Center that he and some of his staff had been implanted with VeriChips to replace their ID tags for access to restricted areas, and to access the country's crime database. http://www.govtech.net/magazine/channel_story.php?channel=24id=90885
Re: Quantum cryptography gets practical
Oops. You're right. It's been a while. Both photons are not utilized, but there's a Private channel and a public channel. As for MITM attacks, however, it seems I was right more or less by accident, and the collapsed ring configuration seen in many tightly packed metro areas (where potential customers of Quantum Key Exchange reside) does indeed make such attacks much easier. Come to think of it, an intruder that were able to gain access to a CO without having to notify the public (Patriot Act) should easily be able to insert themselves into a QKE client's network and then do whatever they want to (provided, of course, they have the means to crack the 'regular' encryption scheme used to encode the bits--NSA). Which means that, should a $75K/year NSA employee want to strike it really, really rich, they'd be able to procure advanced notice of any mergers/acquisition deals. -TD From: Dave Howe [EMAIL PROTECTED] To: Tyler Durden [EMAIL PROTECTED] Subject: Re: Quantum cryptography gets practical Date: Wed, 06 Oct 2004 11:26:32 +0100 Tyler Durden wrote: An interesting thing to think about is the fact that in dense metro areas, you pretty much have a star from the CO out to a premise (which is the cause of deployment of Collapsed SONET Rings). This means the other photon of your encrypted pair might easily pass through the same CO somewhere, which would make the system suscpetible to a sort of man in the middle attack. Or at least, your fancy quantum crypto system has defaulted back to standard crypto in terms of its un-hackability. Unless I am mistaken as to the Quantum Key Exchange process, only one photon is ever transmitted, with a known orientation; the system doesn't use entanglement AFAIK. I note also that, as QKE is *extremely* vulnerable to MitM attacks, a hybrid system (which need only be tactically secure, not strategically secure) can be used to lock out a MitM attacker for long enough that his presence can be detected, without having to resort to a classical but unblockable out of band data stream. I think this is part of the purpose behind the following paper: http://eprint.iacr.org/2004/229.pdf which I am currently trying to understand and failing miserably at *sigh* Moral of this story is, even if this thing is useful, you'll probably have a very hard time finding a place it can be deployed and still retain its advantages. I have yet to see an advantage to QKE that even mildly justifies the limitations and cost over anything more than a trivial link (two buildings within easy walking distance, sending high volumes of extremely sensitive material between them) -TD From: Dave Howe [EMAIL PROTECTED] To: Email List: Cryptography [EMAIL PROTECTED],Email List: Cypherpunks [EMAIL PROTECTED] Subject: Re: QC Hype Watch: Quantum cryptography gets practical Date: Tue, 05 Oct 2004 17:48:30 +0100 R. A. Hettinga wrote: Two factors have made this possible: the vast stretches of optical fiber (lit and dark) laid in metropolitan areas, which very conveniently was laid from one of your customers to another of your customers (not between telcos?) - or are they talking only having to lay new links for the last mile and splicing in one of the existing dark fibres (presumably ones without any repeaters on it) _ On the road to retirement? Check out MSN Life Events for advice on how to get there! http://lifeevents.msn.com/category.aspx?cid=Retirement _ Is your PC infected? Get a FREE online computer virus scan from McAfee® Security. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963
Re: Most Disturbing Yet - Senate Wants Database Dragnet
On Thu, Oct 07, 2004 at 06:19:43AM -0400, Sunder wrote: SNIP To prevent abuses of the system, the Markle task force recommended anonymized technology, graduated levels of permission-based access and automated auditing software constantly hunting for abuses. {Huh? How would anonimized access PREVENT abuses?} One would hope that they meant anonymizing the subjects, much the same way some medical databases are. It's nontrivial to implement well, though. And more likely than not it won't be implemented at all, since it's much easier to just give everyone full search abilities. -Jack
Re: Quantum cryptography gets practical
Tyler Durden wrote: Oops. You're right. It's been a while. Both photons are not utilized, but there's a Private channel and a public channel. As for MITM attacks, however, it seems I was right more or less by accident, and the collapsed ring configuration seen in many tightly packed metro areas (where potential customers of Quantum Key Exchange reside) does indeed make such attacks much easier. Come to think of it, an intruder that were able to gain access to a CO without having to notify the public (Patriot Act) should easily be able to insert themselves into a QKE client's network and then do whatever they want to (provided, of course, they have the means to crack the 'regular' encryption scheme used to encode the bits--NSA). Which means that, should a $75K/year NSA employee want to strike it really, really rich, they'd be able to procure advanced notice of any mergers/acquisition deals. Unless someone has come up with a new wrinkle to this since I last looked, the QKE system indeed requires three channels - the key photon one which must be optical, and a conventional comms pair (the latter of course can be substituted with any comms pair you have handy, but if you are running fibre from A to B you might as well run three) As all three require MiTM to be mounted, it would be better to have a physically diverse path for the conventional pair - but in a small city where you are patching the optical channel though the nearest exchange, this may not be practicable. The regular encryption scheme (last I looked at a QKE product) was XOR
Re: Quantum cryptography gets practical
On Thu, 2004-10-07 at 14:50, Dave Howe wrote: The regular encryption scheme (last I looked at a QKE product) was XOR Well, if it's good enough for Microsoft, it's good enough for everyone. I have it on good authority that Microsoft's designers and programmers are second to none. (Microsoft's marketing department is a good authority, right?)