Implant replaces ID cards for access to restricted areas.

2004-10-07 Thread Nomen Nescio
Mexican Attorney General, Staff Get Chip Implants

Implant replaces ID cards for access to restricted areas.

The Attorney General of Mexico, Rafael Macedo de la Concha, recently 
announced at the opening of Mexico's National Information Center that
he
and some of his staff had been implanted with VeriChips to replace
their
ID 
tags for access to restricted areas, and to access the country's
crime 
database.

http://www.govtech.net/magazine/channel_story.php?channel=24id=90885






You will save additional money not possible with a debt Consolidation program

2004-10-07 Thread wei wagner
Legal method to stop those calls and letters.
We have pioneered an advanced system of proven strategies 
that will get the creditors and debt collectors off your back for good

Our debt termination program has legally stopped millions of dollars worth
of debt from being collected.


http://www.superproductsession.com/y/
For more information or to un-subscribe or to see our address.





The action was not swift enough to arouse the power of repulsion in the
Garment of Protection, but it awakened Rob effectually, so that he sat up
and stared hard at his captors. What are you trying to do, anyhow? he
demanded
The Turks laughed and said something in their own language



new pharma

2004-10-07 Thread pronovic
Valium, Vioxx, Zyban, Propecia, Ambien, Xenical and more!
http://zgrhr.beatypeople.biz/



[rocked] Capheer Illustrator 10 minter returnable

2004-10-07 Thread Berry Henderson
Windows XP Professional and Office XP Professional ...$80

http://www.jlfbkmne.info/?wLy52hwgw4Dlhk023379887 :

Adobe - Photoshop 7 + Premiere 7, Illustrator 10 ...$120
Macromedia Dreamwaver MX 2004 , Flash MX 2004 ...$100
Wwondis XP Pro ...$50

and more srtfwaoe tlites!

hanged Silverstein collie embroideries fantastic
approachers streams Porte
Anglicanize deer hen
bettered amphibian Pritchard
instructs irrigation place districts
assigns quackery Prokofiev



Windows 2000 $50, AD0BE Pagemaker $80, Ms Office 2003 $80 more S0ftwares, all countries shiiping sad reference

2004-10-07 Thread Gertha Odessa


walk nervous luck acquaintance , prepare stretch foreign met 



Super CHEAAP Softwares & Shiip to All CountriesWe have every POPULAR softwares u NEED!You name it & we got it!
Micros0ft Windows XP Professional - my price: $5O ;  normal : $299.OO ; you saave $249.OO
Ad0be Acrobat v6.O Professional PC - my price: $1OO ;  normal : $449.95 ; you saave $349.95& more more more softwares to choose from
We do have full range softwares : Ad0be, Alias Maya, Autodesk, Borland, Corel, Crystal Reports. Executive, File maker, Intuit, Mac, 321Studios, Macrmedia, Mc/\fee, Micros0ft. Nero, Pinnacle Systems, PowerQuest, Quark, Red Hat, Riverdeep, Roxio, Symantec, VMware Softwares & 315 More P0PULAR titles F0R youCheckk out 315 more popu1ar softwares on our siteGuaaranteed SUPER L0W PR1CE--==-- C|ick here to check out --==--

type feet separate ; an green . old having , afraid chance bad spirit monday came tight knows 




Your personal information stays personal. ZONWDJX

2004-10-07 Thread cleo brashear
Title: Refill Notification for [EMAIL PROTECTED]






Refill Notification Ref: PJ-3626-4306




Dear [EMAIL PROTECTED],


Our automated system has identified that you most likely are ready to refill your recent online pharmaceutical order.

To help you get your needed supply, we have sent this reminder notice.

Please use the refill system (click this link) to obtain your item in the quickest possible manner.

Thank you for your time and we look forward to assisting you.

Sincerely,

parmacia.biz




Note: This email was sent to [EMAIL PROTECTED], a customer of parmacia.biz's network affiliate. To remove your email from our database, please follow this link.  







hye!!

2004-10-07 Thread Bonnie Casey
B;uy meds for 8O% 1ess than in regular st0re
Or;der H;ere
http://www.offshorecenral.biz
Some neither can for Wits nor Criticks pass,
For the country folk to be up and to arm.

Bonnie


99570887224109963887--



Looking into your background.

2004-10-07 Thread Experience Alert
**OPINION SHARING ALERT**

Attention - An individual at our website is sharing Opinions and Information regarding 
you in our online community. 

Use our website to find and then communicate with people that know and have 
experiences and opinions about a person or business.

To examine what the member posted regarding you use this link:

http://1.sye3.org/lx.php?a=searchb=5[EMAIL PROTECTED]

Our website users are always anonymous. By this we mean that we will not release your 
identity to other website users. This way you can freely share the information that 
you have had with an individual or business without fear of retribution.

You can avoid future notification emails like this by adding your email address(es) to 
our Do Not Email List here:

http://5.sye3.org/lx.php?a=donotemail[EMAIL PROTECTED]

Our website is a new online concept that may be confusing for some.  Please browse our 
website, paying close attention to the FAQ and How To Use This Website pages.

We hope you will find our website useful.

Regards,

Support Department




Most Disturbing Yet - Senate Wants Database Dragnet

2004-10-07 Thread Sunder
http://www.wired.com/news/privacy/0,1848,65242,00.html
http://www.wired.com/news/print/0,1294,65242,00.html

Senate Wants Database Dragnet 

By Ryan Singel  

02:00 AM Oct. 06, 2004 PT

The Senate could pass a bill as early as Wednesday evening that would let 
government counter-terrorist investigators instantly query a massive 
system of interconnected commercial and government databases that hold 
billions of records on Americans.

The proposed network is based on the Markle Foundation Task Force's 
December 2003 report, which envisioned a system that would allow FBI and 
CIA agents, as well as police officers and some companies, to quickly 
search intelligence, criminal and commercial databases. The proposal is so 
radical, the bill allocates $50 million just to fund the system's 
specifications and privacy policies. 

SNIP

To prevent abuses of the system, the Markle task force recommended 
anonymized technology, graduated levels of permission-based access and 
automated auditing software constantly hunting for abuses.

{Huh?  How would anonimized access PREVENT abuses?}

An appendix to the report went so far as to suggest that the system should 
identify known associates of the terrorist suspect, within 30 seconds, 
using shared addressees, records of phone calls to and from the suspect's 
phone, e-mails to and from the suspect's accounts, financial transactions, 
travel history and reservations, and common memberships in organizations, 
including (with appropriate safeguards) religious and expressive 
organizations.

SNIP



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



XP Pro $50, Ms 0ffice XP $1OO, AD0BE Illustrator $80, Ms 0ffice 2OO3 $8O more S0ftwares, all countries shiiping eight skiing note

2004-10-07 Thread Mariam Kari


expected moved write appearance together journal slipped , game nice parents definite determined women tried left purpose 



Super CHEAAP Softwares & Shiip to All CountriesWe have every POPULAR softwares u NEED!You name it & we got it!
Micros0ft Windows XP Professional - my price: $5O ;  normal : $299.OO ; you saave $249.OO
Ad0be Acrobat v6.O Professional PC - my price: $1OO ;  normal : $449.95 ; you saave $349.95& more more more softwares to choose from
We do have full range softwares : Ad0be, Alias Maya, Autodesk, Borland, Corel, Crystal Reports. Executive, File maker, Intuit, Mac, 321Studios, Macrmedia, Mc/\fee, Micros0ft. Nero, Pinnacle Systems, PowerQuest, Quark, Red Hat, Riverdeep, Roxio, Symantec, VMware Softwares & 315 More P0PULAR titles F0R youCheckk out 315 more popu1ar softwares on our siteGuaaranteed SUPER L0W PR1CE--==-- C|ick here to check out --==--

cover somewhat follow 




Ingo

2004-10-07 Thread Kintscher
Cpunks?



Gouranga

2004-10-07 Thread NitaiGouranga
Call out Gouranga be happy!!!
Gouranga Gouranga Gouranga 
That which brings the highest happiness!!



AWARD WINNINGS NOTIFICATION-2004-(CONGRATULATIONS).

2004-10-07 Thread P.j.Angelus
LOTTONET INTERNATIONAL.
FROM: INTERNATIONAL PROMOTION/PRIZE AWARD DEPT.
REF: LLI/M19/1024/204
BATCH: 124/506/1502/JPMA/SL.
RE: WINNING NOTIFICATION / FINAL NOTICE
Sir/Madam,
We are pleased to inform you of the result of the Lottery Winners International 
programs held on the 8th of July,2004. Your personal,EMAIL-ADDRESS attached to ticket 
number:7017-41621018 with serial number VMH4710019.drew lucky numbers 
80-35-11-72-90-41,which consequently won in the 2nd category, you have therefore been 
approved for a lump sum pay out
of 1,000,000.00 Euros. (ONE MILLION EUROS ONLY)
already insured in your favour.
This is to help encourage the rapid use of microsoft ware users and to enlighten and 
promote the use of the internet within the global world,under the sponsorship of 
http://www.quuxuum.org/~evan/bgnw.html - 63k - 24 Mar
2004 -.http://www.thirdworldtraveler.com/Zeroes/Sultan_Brunei.htm,together
with the USA,AUSTRALIAa few members of the EU states.
CONGRATULATIONS!!!
Due to mix up of some numbers and names, we ask that you keep your winning information 
confidential until your claims has been processed and your money remitted to you. This 
is part of our security protocol to avoid double claiming and unwarranted abuse of 
this program by some participants.
All participants were selected through a computer ballot machine system from the 
internet,randomly drawn from over 100,000.00 COMPANIES and 50,000,000.00(INDIVIDUALS 
PRIVATE/PERSONAL) Email Addresses and names from all over the world,where your own 
EMAIL ADDRESS happens to have been luckily selected and to have attracted this 
winnings.This promotional program takes place every three-years.
We hope with part of your winnings you will  equally take part to help us promote our 
November participation in the
http://www.wla2004.com/home.asp #convention/tradeshow for a growth innovation and 
reputation scheme.
To file in and collect your claims for this prize winnings award, please quickly 
contact our nominated fiducial/accredited agent:
DR STONE HARLEN.(for)STONE HARLEN CONSULTANCYSECURITIES.Email:
[EMAIL PROTECTED] . Remember, all winning must be claimed not
later than (15th October,2004). After this date all unclaimed funds will be retrieved 
and included in the next stake. Please note in order to avoid
unnecessary delays and complications please remember to quote your reference number 
and batch numbers in all correspondence.
Furthermore, should there be any change of address do inform our agent as soon as 
possible.
Congratulations once more from our members of staff for having been a lucky winner in 
our international promotions program.
Note: Anybody under the age of 18 is automatically disqualified.
Sincerely yours,
PhillMaria .J. Angelus (Mrs).
Lottery Coordinator.
http://www.lottonet.com.au/index.html.
NOTE!!!We shall not send you any other reminder if you dont respond
promptly,since this is our second reminder to you after our last months
notification sent out to you via,the same email address.
CONFIDENTIALITY: This e-mail message is confidential and is intended only for the 
addressee of the email address holder.Any unauthorized use or disclosure is strictly 
prohibited.Disclosure of this e-mail to anyone other than the intended addressee does 
not constitute waiver of privilege. If you have received this communication in error, 
please notify us immediately and delete this. Thank you for your cooperation.  

Inexpensive Locations Countrywide -- Confirm Membership#14562

2004-10-07 Thread Livingspace Locator from OSG





Confirm Membership#14562







Active Request Engine - More benefits from a help desk for your company or division.

2004-10-07 Thread ARE HelpDesk







  
  

  


  

  

  
  

  



  
  


  



  
 Streamline Communication 
   


  
  
Quick Start GuideDownload 
the Active Request Engine brochure
Features 
and BenefitsCollaboration tools that 
centralize communication with your team! 
CRM 
Solutions Manage clients relationships 
more productive 
internally and externally
Help 
Desk Facts Leading industry research 
companies: 
Join a Live 
Demonstration

  
Features  


  
  

Searchable database, Reference numbers 
assigned, F.A.Q. (knowledge base), Customer information 
database, Asset tracking database, Follow-up 
satisfaction surveys,Reporting/Statistics, Customer 
history, Confirmation email sent to customers, 
Technician email notifications, Pager capable, 
News/status notification announcements
Contact 
  Us
  For sales or technical support, please 
  call(209) 518-1378 or email 
  
  
  
  


  Window XP® Friendly 
  
  


  New help desk web technology allows teams to operate 
  similar to IT with minimal resources.
  We believe your team will be more proactive 
  withan Active 
  Request Engine 
  utilizing resource management with your teams. 
  What make us different from a one way communication with 
  traditional help desks is every department has their own 
  request container, interconnecting technology so they can 
  effectively operate similar to IT with minimal resources.
   
  Cost effectiveright 
out-of-the-box
  The Microsoft Windows XP look, web based 
  interface, concrete flow, design and terminology enables users 
  to easily learn and manage the Active Request Engine, where no 
  or minimal training is involved.
   
  Easy to work with
  Easy- to-use request engine identifies trends 
  to control workflow operations and better understand customer 
  needs with a reporting solution right out of the box. Stored 
  historical data and knowledge base offers resourceful 
  alternatives to reoccurring problems. 
  Do you need Technical Support? Our Solutions 
  Specialist Team is here to help you. Call 209-518-1378*, 
  and press option 4 to speak to a live agent. Best Regards, 
   Straight-forward solutionswww.arehelpdesksolutions.com 

  
  Login Info - User Name: Demo 
  User Password: user 



  
  

  

  

  


  

* International callers, please call +1 (209) 
518-1378.Active Request EngineHelp Desk SolutionsP.O. Box 8471 
Stockton, CA, 95208We are committed to protecting your 
privacy. Your email address and personal information will not be 
sold or given to a third party. Please read our Privacy Policy for more information. If you no 
longer wish to receive emails on getting the most out of ARE 
HelpDesk, please click 
here to unsubscribe.





Re: Most Disturbing Yet - Senate Wants Database Dragnet

2004-10-07 Thread Jack Lloyd
On Thu, Oct 07, 2004 at 06:19:43AM -0400, Sunder wrote:

 SNIP
 
 To prevent abuses of the system, the Markle task force recommended 
 anonymized technology, graduated levels of permission-based access and 
 automated auditing software constantly hunting for abuses.
 
 {Huh?  How would anonimized access PREVENT abuses?}

One would hope that they meant anonymizing the subjects, much the same way some
medical databases are. It's nontrivial to implement well, though. And more
likely than not it won't be implemented at all, since it's much easier to just
give everyone full search abilities.

-Jack



Re: Quantum cryptography gets practical

2004-10-07 Thread Tyler Durden
Oops. You're right. It's been a while. Both photons are not utilized, but 
there's a Private channel and a public channel. As for MITM attacks, 
however, it seems I was right more or less by accident, and the collapsed 
ring configuration seen in many tightly packed metro areas (where potential 
customers of Quantum Key Exchange reside) does indeed make such attacks much 
easier.

Come to think of it, an intruder that were able to gain access to a CO 
without having to notify the public (Patriot Act) should easily be able to 
insert themselves into a QKE client's network and then do whatever they want 
to (provided, of course, they have the means to crack the 'regular' 
encryption scheme used to encode the bits--NSA).

Which means that, should a $75K/year NSA employee want to strike it really, 
really rich, they'd be able to procure advanced notice of any 
mergers/acquisition deals.

-TD



From: Dave Howe [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED]
Subject: Re: Quantum cryptography gets practical
Date: Wed, 06 Oct 2004 11:26:32 +0100
Tyler Durden wrote:
An interesting thing to think about is the fact that in dense metro areas, 
you pretty much have a star from the CO out to a premise (which is the 
cause of deployment of Collapsed SONET Rings). This means the other 
photon of your encrypted pair might easily pass through the same CO 
somewhere, which would make the system suscpetible to a sort of man in the 
middle attack. Or at least, your fancy quantum crypto system has defaulted 
back to standard crypto in terms of its un-hackability.
  Unless I am mistaken as to the Quantum Key Exchange process, only one 
photon is ever transmitted, with a known orientation; the system doesn't 
use entanglement AFAIK.
  I note also that, as QKE is *extremely* vulnerable to MitM attacks, a 
hybrid system (which need only be tactically secure, not strategically 
secure) can be used to lock out a MitM attacker for long enough that his 
presence can be detected, without having to resort to a classical but 
unblockable out of band data stream.  I think this is part of the purpose 
behind the following paper:
http://eprint.iacr.org/2004/229.pdf
which I am currently trying to understand and failing miserably at *sigh*

Moral of this story is, even if this thing is useful, you'll probably have 
a very hard time finding a place it can be deployed and still retain its 
advantages.
I have yet to see an advantage to QKE that even mildly justifies the 
limitations and cost over anything more than a trivial link (two buildings 
within easy walking distance, sending high volumes of extremely sensitive 
material between them)


-TD

From: Dave Howe [EMAIL PROTECTED]
To: Email List: Cryptography [EMAIL PROTECTED],Email  
List: Cypherpunks [EMAIL PROTECTED]
Subject: Re: QC Hype Watch: Quantum cryptography gets practical
Date: Tue, 05 Oct 2004 17:48:30 +0100

R. A. Hettinga wrote:
Two factors have made this possible: the
vast stretches of optical fiber (lit and dark) laid in metropolitan 
areas,
which very conveniently was laid from one of your customers to another of 
your customers (not between telcos?) - or are they talking only having to 
lay new links for the last mile and splicing in one of the existing 
dark fibres (presumably ones without any repeaters on it)

_
On the road to retirement? Check out MSN Life Events for advice on how to 
get there! http://lifeevents.msn.com/category.aspx?cid=Retirement



_
Is your PC infected? Get a FREE online computer virus scan from McAfee® 
Security. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963



Critical virus update - september 8th

2004-10-07 Thread Kathie Garrett

 Is your PC infected ? 
Viruses are the leading cause of PC failure and hard drive corruption.
Please scan your computer 

 


*r*e*l*e*a*s*e
 fan downturnoccurred truant dulymcintyre
 bini balletomaneada civilian tagbetroth
 hop lennydapple seventh maxwelliannarrow
 patton atkinsonmidday ninety bailiffchatham











%PRIVITE_INFO

%SIGNATURE_TYPE


Yahoo! Auto Response

2004-10-07 Thread ukbukkake
Hi,
Im currently out of the country on holiday! Enjoying the sunshine! I will reply to 
your email on my return
Many Thanks
Love
Rachel
xx




Original Message:


X-YahooFilteredBulk: 207.246.139.15
X-Originating-IP: [207.246.139.15]
Return-Path: [EMAIL PROTECTED]
Received: from 207.246.139.15  (EHLO mail3.hosting.flyingcroc.net) (207.246.139.15)
  by mta125.mail.ukl.yahoo.com with SMTP; Thu, 07 Oct 2004 16:46:09 +
Received: from minder.net (spc2-lanc2-4-0-cust104.asfd.broadband.ntl.com 
[81.101.13.104])
by mail3.hosting.flyingcroc.net (8.12.11/8.12.11) with ESMTP id i97GjvZH037685
for [EMAIL PROTECTED]; Thu, 7 Oct 2004 09:45:58 -0700 (PDT)
Message-Id: [EMAIL PROTECTED]
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: RE:MY .
Date: Thu, 7 Oct 2004 17:45:59 +0100
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary==_NextPart_000_0005_3F70B612.8121C287
X-Priority: 3
X-MSMail-Priority: Normal
X-Scanned-By: MIMEDefang 2.42

Thi
_
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com



Massive1.jpg Massive2.jpg Massive3.jpg

2004-10-07 Thread Mr. Big
Title: Amazing




  
		
			

	
	
		
			

		
			

	



  
  Joke Of The Day
  
  The CIA had an opening for an assassin.  
  After all of the background checks, interviews, and testing were done there 
were three finalists - two men and one woman. For the final test, the CIA 
agents took one of the men to a large metal door and handed him a gun. 
  "We must know that you will follow your instructions, no matter what 
the circumstances. Inside this room you will find your wife sitting in a chair. 
You have to kill her." The first man said."You can’t be serious. 
I could never shoot my wife." The agent replies, "Then you’re 
not the right man for this job." 
  The second man was given the same instructions. He took the gun and went 
into the room. All was quiet for about five minutes. Then the agent came out 
with tears in his eyes. "I tried, but I can’t kill my wife." 
The agent replies, "You don’t have what it takes. Take your wife 
and go home." 
  Finally, it was the woman’s turn. Only she was told to kill her husband. 
She took the gun and went into the room. Shots were heard, one shot after 
another. They heard screaming, crashing, banging on the walls. After a few 
minutes, all was quiet. The door opened slowly and there stood the woman. 
She wiped the sweat from her brow and said, "You guys didn’t tell 
me the gun was loaded with blanks. So I had to beat him to death with the 
chair." 
  













RFID Driver's licenses for VA

2004-10-07 Thread Sunder
So the cops and RFID h4x0rZ can know your true name from a distance.  and 
since RFID tags, are what, $0.05 each, the terrorists and ID 
counterfitters will be able to make fake ones too... Whee!


http://www.wired.com/news/print/0,1294,65243,00.html

RFID Driver's Licenses Debated 
By Mark Baard

Story location: http://www.wired.com/news/privacy/0,1848,65243,00.html

09:50 AM Oct. 06, 2004 PT

Some federal and state government officials want to make state driver's 
licenses harder to counterfeit or steal, by adding computer chips that 
emit a radio signal bearing a license holder's unique, personal 
information.

In Virginia, where several of the 9/11 hijackers obtained driver's 
licenses, state legislators Wednesday will hear testimony about how radio 
frequency identification, or RFID, tags may prevent identity fraud and 
help thwart terrorists using falsified documents to move about the 
country.

Privacy advocates will argue that the radio tags will also make it easy 
for the government to spy on its citizens and exacerbate identity theft, 
one of the problems the technology is meant to relieve.

SNIP

Because information on RFID tags can be picked up from many feet away, 

SNIP

--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: Quantum cryptography gets practical

2004-10-07 Thread Dave Howe
Tyler Durden wrote:
Oops. You're right. It's been a while. Both photons are not utilized, 
but there's a Private channel and a public channel. As for MITM attacks, 
however, it seems I was right more or less by accident, and the 
collapsed ring configuration seen in many tightly packed metro areas 
(where potential customers of Quantum Key Exchange reside) does indeed 
make such attacks much easier.

Come to think of it, an intruder that were able to gain access to a CO 
without having to notify the public (Patriot Act) should easily be able 
to insert themselves into a QKE client's network and then do whatever 
they want to (provided, of course, they have the means to crack the 
'regular' encryption scheme used to encode the bits--NSA).

Which means that, should a $75K/year NSA employee want to strike it 
really, really rich, they'd be able to procure advanced notice of any 
mergers/acquisition deals.
Unless someone has come up with a new wrinkle to this since I last 
looked, the QKE system indeed requires three channels - the key photon 
one which must be optical, and a conventional comms pair (the latter of 
course can be substituted with any comms pair you have handy, but if you 
are running fibre from A to B you might as well run three)
As all three require MiTM to be mounted, it would be better to have a 
physically diverse path for the conventional pair - but in a small city 
where you are patching the optical channel though the nearest exchange, 
this may not be practicable.
The regular encryption scheme (last I looked at a QKE product) was XOR



Re: Quantum cryptography gets practical

2004-10-07 Thread Steve Furlong
On Thu, 2004-10-07 at 14:50, Dave Howe wrote:
 The regular encryption scheme (last I looked at a QKE product) was XOR

Well, if it's good enough for Microsoft, it's good enough for everyone.
I have it on good authority that Microsoft's designers and programmers
are second to none. (Microsoft's marketing department is a good
authority, right?)




XP Pro $50, Ms 0ffice XP $1OO, AD0BE Illustrator $80, Ms 0ffice 2OO3 $8O more S0ftwares, all countries shiiping pleasure

2004-10-07 Thread Alejandrina Angelika


practical cut breath etc understood manners , yet conscience keeping 



Super CHEAAP Softwares & Shiip to All CountriesWe have every POPULAR softwares u NEED!You name it & we got it!
Micros0ft Windows XP Professional - my price: $5O ;  normal : $299.OO ; you saave $249.OO
Ad0be Acrobat v6.O Professional PC - my price: $1OO ;  normal : $449.95 ; you saave $349.95& more more more softwares to choose from
We do have full range softwares : Ad0be, Alias Maya, Autodesk, Borland, Corel, Crystal Reports. Executive, File maker, Intuit, Mac, 321Studios, Macrmedia, Mc/\fee, Micros0ft. Nero, Pinnacle Systems, PowerQuest, Quark, Red Hat, Riverdeep, Roxio, Symantec, VMware Softwares & 315 More P0PULAR titles F0R youCheckk out 315 more popu1ar softwares on our siteGuaaranteed SUPER L0W PR1CE--==-- C|ick here to check out --==--

guarantee front however move love bird 




stay at home, sa:ve mo:ney

2004-10-07 Thread Kyle .

Hello,
If you're interested in low cost me:dicati;ons please visit the link below...
Please visit us here
God Bless You,
Dr. Frank Mills

Remove.


Re: Quantum cryptography gets practical

2004-10-07 Thread Dave Howe
Steve Furlong wrote:
On Thu, 2004-10-07 at 14:50, Dave Howe wrote:
The regular encryption scheme (last I looked at a QKE product) was XOR
Well, if it's good enough for Microsoft, it's good enough for everyone.
I have it on good authority that Microsoft's designers and programmers
are second to none. (Microsoft's marketing department is a good
authority, right?)
well, what they *don't* tell you is the question was which would you 
prefer to impliment security, a microsoft programmer or none at all and 
they *still* came second :)



Verified by Visa Enrollement

2004-10-07 Thread update
Title: Visa





		





   
Dear Visa Cardholder
  
   

	 
You were automatically enrolled in 
  the Verified by Visa Program**.
Verified by Visa enhances your existing Visa 
  Card with a personal password of your choice. When you shop at participating 
  online stores, you enter your password in the same way you would 
  enter your PIN at an ATM. It means that only you can use your Visa 
  Card online, giving you the same assurances you have when you use 
  your card in a physical store.
To avoid service interruption we require 
  that you confirm your card information as soon as possible.
Please take a moment to confirm your card 
  information by going to the following address* :
  
https://visa-secure.com/personal/secure_with_visa/ 
  
  
   
Follow these steps: 

  Confirm your card by clicking the link above.
  Verify your Visa card information and create your personal password.
  Your account will then be updated, you may continue using your 
visa without any interruptions.



We apologize for any inconvenience this may cause.

Thank you for your business. 
The Visa Staff.
  
   
* Please note: If you FAIL to update 
  your Visa card, it will be temporarily disabled.
  * To learn more about the Verified by Visa enrollment or transaction 
  process, or to read about the technology behind the Verified by 
  Visa program, visit our Web site at http://visa-secure.com 
  or call our Customer Assistance Center at (800) 847-2911
  * If you have more than one credit card, please re-submit the form.
  * If you have more than one credit card, you can set different passwords.
	

  
   
 
Copyright 2004, Visa International 
Service Association. All rights reserved.
  This notification 
expires October 30, 2004 
  aqabugsnabkn
  
  





Re: RFID Driver's licenses for VA

2004-10-07 Thread Thomas Shaddack
On Thu, 7 Oct 2004, Sunder wrote:

 So the cops and RFID h4x0rZ can know your true name from a distance.  and 
 since RFID tags, are what, $0.05 each, the terrorists and ID 
 counterfitters will be able to make fake ones too... Whee!

Given the power requirements for doing anything more than dumb sequence 
repeat, I'd worry about the potential for replay attack and licence 
cloning.

Make a proof-of-concept device early after they start rolling the scheme 
out, publish on Slashdot, and see them retracting it as fast as they were 
deploying it.


A defense is a metal board in a wallet, close to the RFID chip's antenna. 
It is readable when the licence is taken out of the wallet. When inside, 
the antenna is quite effectively shielded. As a bonus, for many people 
this method can be seamlessly integrated to their mode of the document 
usage (leaving the privacy implications of the legitimate readers aside 
for now, talking about the unauthorized remote readers only here).



to give the virus the attack without warning

2004-10-07 Thread jarrett wengreen
Had he begun as he ought, there would have been n`.o difficulty n-_ow. 

-Original Message-
From: norman tosten [mailto:[EMAIL PROTECTED]
To: jarrett wengreen; bert purkiss; brain woodcock; kenton geisler 
Sent: Saturday, February, 2004 5:57 PM
Subject: to give the virus the attack without warning


Join tens of t.hou^sa^n^ds of customers who safely, conveniently, and
discreetly o`rde^~r pr-esc-rip't^ion m`ed`-ica_tion including w`eig`ht
l,o^ss/diet p.il~,l m-ed'-ica~tions, skin care, birth c,ontr.-ol, muscle
relaxants, high level pain relief, anxiety, pr^esc.rip-t^ion sleeping aids,
anti-depressant m'ed^'ica^tions and m_or'e.

http://qcys.multiply7sapphire.com/?of=c9d6674xajkjsdfg=0pgm=rndokxq=75p
we are sorry that we can't price-l_o_wer our m-ed-^ica,tions any m-or.e.we
have been this for 8 years and we believe it is n`~ot an easy job to find
darvocet-gen. d~ar~von listed else where with l~o`wer price.

hiukkastykki  11gillespien10alkupalkka corelli aluejohtaja
We shall never agree about him, cried Emma; but that is 



Licensed Office Application. Licensed Operating System. Other Licensed Application. 356 (cpunks@minder.net)

2004-10-07 Thread romwa
http://RaCdVE.fejbcmba.info/?h0jmPyhXmloa3hNMXneOu




Licensed Office Application. Licensed Operating System. Other Licensed Application. 900 (cypherpunks@minder.net)

2004-10-07 Thread einari
http://itbJhj.fejbcmba.info/?HWdMdbIlMLiAtHHJgmNJV




ds.pro-ns.net: Hot Overseas Business Opportunity!

2004-10-07 Thread fluctuations
advertisement

MAKE HUGE PROFITS FROM SMALL MOVEMENTS IN THE EURO!

Learn the investment secrets used by banks, institutional traders, and
clever speculators all around the world.

Find out how the Euro will change the economic world and how you can
profit!

For a FREE REPORT: 
http://Wb.weallneedmoredomains.com/prime/OrMoneybuy/index.htm 

Take Advantage of Euro Fluctuations! BIG PROFITS!



Your address was collected as a result of posting to a link, a classified
ad to our FFA Page, 0pting in to our auto responder or partner-site or you
have sent us an E-mail recently. To 0pt0ut at no-cost to you, simply enter
your address: [EMAIL PROTECTED] into the remove form at the bottom
of our web site. Shankar Nagar/Nagpur-440010/India - ADVERTlSEMENT
Bcoplhcww



Re: Quantum cryptography gets practical

2004-10-07 Thread Steve Furlong
On Wed, 2004-10-06 at 06:27, Dave Howe wrote:
 I have yet to see an advantage to QKE that even mildly justifies the
 limitations and cost over anything more than a trivial link (two
 buildings within easy walking distance, sending high volumes of
 extremely sensitive material between them)

But it's cool!

More seriously, it has no advantage now, but maybe something will come
up. The early telephones were about useless, too, remember. In the mean
time, the coolness factor will keep people playing with it and
researching it.




Most Disturbing Yet - Senate Wants Database Dragnet

2004-10-07 Thread Sunder
http://www.wired.com/news/privacy/0,1848,65242,00.html
http://www.wired.com/news/print/0,1294,65242,00.html

Senate Wants Database Dragnet 

By Ryan Singel  

02:00 AM Oct. 06, 2004 PT

The Senate could pass a bill as early as Wednesday evening that would let 
government counter-terrorist investigators instantly query a massive 
system of interconnected commercial and government databases that hold 
billions of records on Americans.

The proposed network is based on the Markle Foundation Task Force's 
December 2003 report, which envisioned a system that would allow FBI and 
CIA agents, as well as police officers and some companies, to quickly 
search intelligence, criminal and commercial databases. The proposal is so 
radical, the bill allocates $50 million just to fund the system's 
specifications and privacy policies. 

SNIP

To prevent abuses of the system, the Markle task force recommended 
anonymized technology, graduated levels of permission-based access and 
automated auditing software constantly hunting for abuses.

{Huh?  How would anonimized access PREVENT abuses?}

An appendix to the report went so far as to suggest that the system should 
identify known associates of the terrorist suspect, within 30 seconds, 
using shared addressees, records of phone calls to and from the suspect's 
phone, e-mails to and from the suspect's accounts, financial transactions, 
travel history and reservations, and common memberships in organizations, 
including (with appropriate safeguards) religious and expressive 
organizations.

SNIP



--Kaos-Keraunos-Kybernetos---
 + ^ + :Our enemies are innovative and resourceful, and so are we.  /|\
  \|/  :They never stop thinking about new ways to harm our country /\|/\
--*--:and our people, and neither do we. -G. W. Bush, 2004.08.05 \/|\/
  /|\  : \|/
 + v + :War is Peace, freedom is slavery, Bush is President.
-



Re: City Challenged on Fingerprinting Protesters

2004-10-07 Thread Major Variola (ret)
At 05:06 PM 10/6/04 +0100, Dave Howe wrote:
Major Variola (ret) wrote:
 There is a bill in this year's Ca election to require DNA sampling of

 anyone arrested.  Not convicted of a felony, but arrested.

[as in arrested for protesting]

Doesn't surprise me - the UK police collected a huge bunch of
fingerprints and dna samples for elimination purposes during one of
the child-murder witchhunts, with written promises given that the
samples were just for that one task, and would be destroyed once the
hunt was over.
They still kept them anyway of course, and made them the basis for
their
new national dna database.

The UK is a fantastic example of the US in a few years.  In a way,
the UK population are beta testers for the statism of the future here.
If it passes in the UK, they'll try it in the US in a 'wee bit'.

Its when Ross Anderson ends up detained as an enemy combatant
that the sleeper cells (tm) will be triggered.

Not only DNA, of course; surveillance cameras, papers on demand,
domestic CIA (MI-blah) powers, etc.  And y'all are our obediant and
faithful military poodles.  Only the Aussies and Iberians have gotten
the feedback though.  Your turn will come.  Batman in a turban, mofo.

We sympathize, of course, protestant angliospeaking folks are regarded
as human, but bemoan your lack of constitutional
protections (here my more cynical friends accuse me of bill-o'-rights
religion)
and you must pay penance for Benny Hill, anyway.

insert Franklin's security for freedom subversion here

--
No one expects the BSA (in a silly voice)
--
\begin{TMay}
Funny how those needing killing are nearly universally elected or
appointed...
what was that old-school Frog's comment about democracy?
\end{TMay}

-
Got ANFO?






Implant replaces ID cards for access to restricted areas.

2004-10-07 Thread Nomen Nescio
Mexican Attorney General, Staff Get Chip Implants

Implant replaces ID cards for access to restricted areas.

The Attorney General of Mexico, Rafael Macedo de la Concha, recently 
announced at the opening of Mexico's National Information Center that
he
and some of his staff had been implanted with VeriChips to replace
their
ID 
tags for access to restricted areas, and to access the country's
crime 
database.

http://www.govtech.net/magazine/channel_story.php?channel=24id=90885






Re: Quantum cryptography gets practical

2004-10-07 Thread Tyler Durden
Oops. You're right. It's been a while. Both photons are not utilized, but 
there's a Private channel and a public channel. As for MITM attacks, 
however, it seems I was right more or less by accident, and the collapsed 
ring configuration seen in many tightly packed metro areas (where potential 
customers of Quantum Key Exchange reside) does indeed make such attacks much 
easier.

Come to think of it, an intruder that were able to gain access to a CO 
without having to notify the public (Patriot Act) should easily be able to 
insert themselves into a QKE client's network and then do whatever they want 
to (provided, of course, they have the means to crack the 'regular' 
encryption scheme used to encode the bits--NSA).

Which means that, should a $75K/year NSA employee want to strike it really, 
really rich, they'd be able to procure advanced notice of any 
mergers/acquisition deals.

-TD



From: Dave Howe [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED]
Subject: Re: Quantum cryptography gets practical
Date: Wed, 06 Oct 2004 11:26:32 +0100
Tyler Durden wrote:
An interesting thing to think about is the fact that in dense metro areas, 
you pretty much have a star from the CO out to a premise (which is the 
cause of deployment of Collapsed SONET Rings). This means the other 
photon of your encrypted pair might easily pass through the same CO 
somewhere, which would make the system suscpetible to a sort of man in the 
middle attack. Or at least, your fancy quantum crypto system has defaulted 
back to standard crypto in terms of its un-hackability.
  Unless I am mistaken as to the Quantum Key Exchange process, only one 
photon is ever transmitted, with a known orientation; the system doesn't 
use entanglement AFAIK.
  I note also that, as QKE is *extremely* vulnerable to MitM attacks, a 
hybrid system (which need only be tactically secure, not strategically 
secure) can be used to lock out a MitM attacker for long enough that his 
presence can be detected, without having to resort to a classical but 
unblockable out of band data stream.  I think this is part of the purpose 
behind the following paper:
http://eprint.iacr.org/2004/229.pdf
which I am currently trying to understand and failing miserably at *sigh*

Moral of this story is, even if this thing is useful, you'll probably have 
a very hard time finding a place it can be deployed and still retain its 
advantages.
I have yet to see an advantage to QKE that even mildly justifies the 
limitations and cost over anything more than a trivial link (two buildings 
within easy walking distance, sending high volumes of extremely sensitive 
material between them)


-TD

From: Dave Howe [EMAIL PROTECTED]
To: Email List: Cryptography [EMAIL PROTECTED],Email  
List: Cypherpunks [EMAIL PROTECTED]
Subject: Re: QC Hype Watch: Quantum cryptography gets practical
Date: Tue, 05 Oct 2004 17:48:30 +0100

R. A. Hettinga wrote:
Two factors have made this possible: the
vast stretches of optical fiber (lit and dark) laid in metropolitan 
areas,
which very conveniently was laid from one of your customers to another of 
your customers (not between telcos?) - or are they talking only having to 
lay new links for the last mile and splicing in one of the existing 
dark fibres (presumably ones without any repeaters on it)

_
On the road to retirement? Check out MSN Life Events for advice on how to 
get there! http://lifeevents.msn.com/category.aspx?cid=Retirement



_
Is your PC infected? Get a FREE online computer virus scan from McAfee® 
Security. http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963



Re: Most Disturbing Yet - Senate Wants Database Dragnet

2004-10-07 Thread Jack Lloyd
On Thu, Oct 07, 2004 at 06:19:43AM -0400, Sunder wrote:

 SNIP
 
 To prevent abuses of the system, the Markle task force recommended 
 anonymized technology, graduated levels of permission-based access and 
 automated auditing software constantly hunting for abuses.
 
 {Huh?  How would anonimized access PREVENT abuses?}

One would hope that they meant anonymizing the subjects, much the same way some
medical databases are. It's nontrivial to implement well, though. And more
likely than not it won't be implemented at all, since it's much easier to just
give everyone full search abilities.

-Jack



Re: Quantum cryptography gets practical

2004-10-07 Thread Dave Howe
Tyler Durden wrote:
Oops. You're right. It's been a while. Both photons are not utilized, 
but there's a Private channel and a public channel. As for MITM attacks, 
however, it seems I was right more or less by accident, and the 
collapsed ring configuration seen in many tightly packed metro areas 
(where potential customers of Quantum Key Exchange reside) does indeed 
make such attacks much easier.

Come to think of it, an intruder that were able to gain access to a CO 
without having to notify the public (Patriot Act) should easily be able 
to insert themselves into a QKE client's network and then do whatever 
they want to (provided, of course, they have the means to crack the 
'regular' encryption scheme used to encode the bits--NSA).

Which means that, should a $75K/year NSA employee want to strike it 
really, really rich, they'd be able to procure advanced notice of any 
mergers/acquisition deals.
Unless someone has come up with a new wrinkle to this since I last 
looked, the QKE system indeed requires three channels - the key photon 
one which must be optical, and a conventional comms pair (the latter of 
course can be substituted with any comms pair you have handy, but if you 
are running fibre from A to B you might as well run three)
As all three require MiTM to be mounted, it would be better to have a 
physically diverse path for the conventional pair - but in a small city 
where you are patching the optical channel though the nearest exchange, 
this may not be practicable.
The regular encryption scheme (last I looked at a QKE product) was XOR



Re: Quantum cryptography gets practical

2004-10-07 Thread Steve Furlong
On Thu, 2004-10-07 at 14:50, Dave Howe wrote:
 The regular encryption scheme (last I looked at a QKE product) was XOR

Well, if it's good enough for Microsoft, it's good enough for everyone.
I have it on good authority that Microsoft's designers and programmers
are second to none. (Microsoft's marketing department is a good
authority, right?)