John Bolton and the Downing Street memorandum outrage [f4240@al-qaeda.net]
DON'T ALLOW BOLTON TO PUSH US INTO ANOTHER ATTACK Why is everyone talking about Downing Street memo? If you haven't heard of it, if the media where you're used to getting your information is hiding it, and you haven't read it for yourself You can see it right here This previously top secret document reveals that the most senior officials of the British government knew that there was no just cause for war with Iraq, but that "the facts and intelligence are being fixed around the policy" by this administration to force it to happen anyway. That was over 1600 American deaths, over 10,000 greviously wounded, and 300 billion looted from our national budget ago. Now ponder that in the lead up to the Iraq war it was John Bolton who was HIMSELF responsible for putting out a fact sheet for the media and the U.N. containing known lies about Iraq seeking yellowcake uranium from Africa Plus of course, we also learned from the Senate testimony that John Bolton over and over hyped intelligence, bullying his own staffers to do so. Put the pieces together and you realize that Bolton was one of the key players who arranged the actual intelligence "fix" discussed in the Downing St. memorandum. Then tell your members of the Senate that this standing alone has to preclude his installation as ambassador to the U.N. Are there fifty-one senators worthy and true to reject this nomination? If there is not, then is it even more critical for those with the integrity to do it to stand firm for stopping this by MAINTAINING THE FILIBUSTER, regardless of party affiliation. Use the from in this email to let your senators know that you've read the Downing Street memorandum and you demand accountability. (1) Constituent info: Email: Mr. Mrs. Ms. Miss Dr. First Name: Last Name: Addr: Apt/Ste: City: State: AK AL AR AS AZ CA CO CT DC DE FL GA GU HI ID IA IL IN KS KY LA MA MD ME MI MN MO MS MT NC ND NE NH NJ NM NV NY OH OK OR PA PR RI SC SD TN TX UT VT VA VI WA WI WV WY Zip: Phone: (2)Next add your personal message to Congress: The question is "Should the Senate filibuster John Bolton?" This petition will submit your "Yes" vote. If you want to compose a long message, please make a copy of the text for yourself before submitting form, or paste in from a text editor (3) Submit the email addresses of friends to invite to vote: (4) Now send your messages If you need help with the form or to email in your comments directly Do something NOW on this and forward this email everywhere you can and to everybody you can. Or if you want to get no more, use our Off function Powered by The People's Email Network 2005, Patent pending, All rights reserved
$B$$$D$b$*@$OC$K$J$j$^$9!#(BMAKE-UP LOVE$B!Z%a%$%/!&%i%V![(BVol.3
$B$*5W$7$V$j$G$9!#$O$8$a$^$7$F$NJ}$b$$$i$C$7$c$k$H;W$$$^$9$,2~$a$^$7$F(B $B$40';"$5$;[EMAIL PROTECTED](BMAKE-UP LOVE$B!!BeI=(B $BON2JH~CR;R$G$4$6$$$^$9!#(B (B $B:G=i$K?=$7$F$*$-$^$9$,!"Ev%/%i%V!V(BMAKE-UP (BLOVE$B!W$N2qJs%a!<%k$,$4ITMW$J(B $B>l9g$K$O$=$N$^$^GK4~$7$F$/[EMAIL PROTECTED](B $B>0!"[EMAIL PROTECTED]<%k$OFsEY$HG[?.CW$7$^$;$s!#(B (B $B$=$l$G$O:#2s$N6[5^B.Js$NFbMF$K0\$j$?$$$H;W$$$^$9!#(B $B$3$N4V$N%"%s%1!<%H$N7k2L$,=P$^$7$?!#(B $B$*Bj$O!V:#$"$J$?$,Jz$($F$$$kG:$_!W$G$7$?!#(B $B$?$/$5$s$N$40U8+$"$j$,$H$&$4$6$$$^$7$?!#(B $B$=$3$G$$$/$D$+D:$$$?%a!<%k$r$4>R2p$7$?$$$H;W$$$^$9!#(B (B $B!y$^$:$OEl5~ET$K$*=;$^$$$NIp$5$s(B($B2>(B)$B$N%a%C%;!<%8$G$9!y(B (B $BKM$K$OH`=w$,$$$?$N$G$9$,$J$s$HIb5$$P$+$j$7$F$$$k$N$GJL$l$F$7$^$$$^$7$?!#(B $B:'Ls$^$G$7$F$$$?$N$G$d$j$-$l$J$$;W$$$G$$$C$Q$j$G$9!#(B $BON2J$5$s!"??LLL\$J=P2q$$$,$7$?$$$G$9!#(B (B $B!yB3$$$F$O0)L>8E20;T$K$*=;$^$$$N0$It$5$s(B32$B:P$5$s$+$i$N%a%C%;!<%8$G$9!y(B (B $B;d$NG:$_$rJ9$$$F$/[EMAIL (BPROTECTED]:G6a$^$G%-%c%P%/%iDL$$$r$7$F$$$?$N$G$9!#(B $B%-%c%P%/%i>n$HCgNI$/$J$l$?$N$O$N$G$9$,!&!&!&!#(B $B<+J,$N0U;W$NZ?M$K$J$C$F$7$^$C$?$N$G$9!#(B $B6b3[$O$b$&8}$K$O=P$;$J$$$/$i$$$N3[$G$9!#(B $B$b$&@dK>E*$G$9!#(B (B $BB??t4s$;$i$l$?$40U8+$NCf$+$i#27o$N%a%C%;!<%8$r$4>R2p$5$;[EMAIL PROTECTED](B $B$3$l$r$*FI$_$K$J$i$l$F$$$k3'$5$s$NCf$K$b$3$N$*FsJ}$HF1$8$/[EMAIL (BPROTECTED]"6bA,$N(B $B$3$H$GG:$s$G$$$kJ}$b$$$k$N$G$O$"$j$^$;$s$+!)(B (B $B$=$3$G3'$5$s$N$*G:$_$r$9$0$K$G$b2r7h$5$;[EMAIL (BPROTECTED]/:#2s$NB.Js%a!%k$r(B $BAw$i$;[EMAIL PROTECTED](B $B$=$&;dC#!V(BMAKE-UP LOVE$B!W$O$=$s$J3'MM$N$?$a$KB8:_$9$k$N$G$9!#(B $B$3$N%/%i%V$G$OCK=wF1;N$NBg?M$N=P2q$$$rDs6!$$$?$7$^$9!#(B (B $B$G$9$,!&!&!&$3$3$G#1$DLdBj$,$"$k$N$G$9!#(B $B$=$l$O$KBP$7!"[EMAIL (BPROTECTED](B883$BL>(B (B[EMAIL PROTECTED],$"$^$j$K/$J$$$N$G$9!#(B $B$=$3$G:#2s$3$N%a!<%k$r$*FI$_$N3'[EMAIL PROTECTED];j$j$^$7$?!#(B (B $BEv%/[EMAIL PROTECTED]@?l9g$K$O$/$l$0$l$b<:Ni$N$J$$$h$&$*4j$$CW$7$^$9!#(B (B[EMAIL PROTECTED][EMAIL PROTECTED]@$$$F$*$j$^$;$s!#(B (B (B $B!yA02s$N%a!<%kFI [EMAIL (BPROTECTED]@$1$I$3$N%/%i%V$K(B (B[EMAIL PROTECTED][EMAIL PROTECTED]$7$,Mx$/[EMAIL PROTECTED],[EMAIL (BPROTECTED](B $B>[EMAIL PROTECTED]@[EMAIL PROTECTED]:$$C$F$kKM$K2q$&$?$S$K%5%]!<%H(B $B$7$F$/$l$F!#:[EMAIL PROTECTED]$K$H$C$F$J$/$F$O$J$i$J$$B8:_$G$9!#(B $B$3$s$JKM$G$bAGE($JJ}$H=P2q$($^$7$?!#%a!<%kFI<[EMAIL PROTECTED](B $B$?$H;W$C$F;n$7$F$_$k$N$O$I$&$+$J!)$=$l$G$O2,:[EMAIL (BPROTECTED]:$G$7$?!#$^$?$M!*(B (B $B3'MM$K$b2,:[EMAIL PROTECTED]:$5$s$N$h$&$J%S%C%/%A%c%s%9$,BT$C$F$*$j$^$9!#(B (B $BEv%/[EMAIL PROTECTED],:[EMAIL PROTECTED](B (B[EMAIL PROTECTED]"#O#L!"%U%j!%?!!"%;%l%V!"0|[EMAIL PROTECTED]"#S#M!"[EMAIL (BPROTECTED]@$/$5$s$G$9!#(B (B[EMAIL PROTECTED]/Np$O(B18$B:P!A(B65$B:P$G$9!#(B (B $BF|[EMAIL PROTECTED],B??t:[EMAIL PROTECTED]"(B $B$^$:$O5.J}MM$NCO0h$K3:[EMAIL PROTECTED]>R2p$5$;$FD:$-$?$$$H;W$$$^$9!#(B (B $B4JC1$J%7!<%H$G$9$N$G!"$^$:$O$*5$7Z$K$*=q$-2<$5$$$^$;!#(B (B $B#Q!'#N#O(B,$B#1(B $B5.J}MM$N$*2q$$$9$k$K$"$?$C$F$N$44uK>$NCO0h(B($BETF;I\8)Ey(B) (B (B $B#Q!'#N#O(B,$B#2(B (B $B!!(B $BEv%/%i%V$r$4MxMQ$9$k$K$"$?$C$F$N$4MxMQ%?%$%W(B $B!Z%?%$%W([EMAIL PROTECTED]:]!&7k:'A0Ds!K(B $B!Z%?%$%W([EMAIL (BPROTECTED]$H$*IU$-9g$$!!!J;v6H;q6b$J$I%5%]!%H$7$FM_$7$$!K(B $B!Z%?%$%W([EMAIL PROTECTED]&?M!&%;%U%l!&?M:J!
Intel Adds DRM to New Chips part 2
it seems now intel say there is no DRM in there chips. Earlier FUD ? marketing tactic ? desire to hide truth to public as discussed before ? http://yro.slashdot.org/article.pl?sid=05/06/05/1833241
WAMU Bank: Login Attempts Failed - Was that you?
Dear Wamu Member, We recently have determined that different computer have logged into your Online Banking account, and multiple password failures were present before the logons. - Your Profile is now Locked For your security, your profile access has been locked due to inactivity or because of too many failed login attempts. You can Unlock your Account at the following website below. WAMU Bank Security Center/ Thank you for your promt attention to this matter. Please understand that this is a security measure meant to help protect you and your account. We apologize for any inconvenience. If you choose to ignore our request you leave us no choice but to temporarily suspend your account. Thank you for using WAMU! The WAMU Team
Re: /. [Intel Adds DRM to New Chips]
DiSToAGe wrote: not a backdoor, we forget to much that every system is only 1 and 0 through electricity and physical circuits. If you can make them you can watch them (with time and monney i agree). Perhaps thinking that datas (certs, instructions) can be hidden behind a physical thing is only a dream ? I ask myself if not every cryptosystem where you must have something hidden or physically not accessible in point of the process is not sure ? In theory the above is absolutely correct. In practice, it's extremely difficult to properly implement an accurate enough emulator, however as an emulator writer you have far more advantages than disadvantages despite the 10-100x in slowdown. (Speaking from personal experience - no, nothing on the kind of scale we're talking about here.) You can always have your virtual CPU decide that when it sees a certain instruction, to disobey it. For example, when it sees a checksum check, to decide to jump around it and so forth. Gotta love it when you can fool a program into thinking that 2+2=5 and that everything is still A-OK with that! ;-) If you can interface with real (protected) hardware, you might even be able to get around public key schemes with the emulator. HP/Agilent made some wonderful logic analyzers, which are very useful against ancient hardware (think Motorola 68K chips at around 5MHz) too bad nothing in the GHz range is (cheaply?) available out there, but there's lots that can be done. What can be done? For example, if you have something like Palladium or whatever it's called these days, you an always build a machine that has custom RAM that can change at the flip of a switch - sort of like the old EEPROM emulators, but with RAM chips that can be flipped to a ROM instead. You flip a switch after the DRM core has validated your BIOS and operating system, and at some point once the CPU cache gets drained, it winds up running code that it did not boot, code which you've written to do *OTHER* things for example - simply change the IRQ vectors to point to your code and you've taken over... Mind you, all this is easier said that done, but it is possible to implement. Remember, security is a chain, and each (media?) player out there is a link in that chain. It only takes one broken player to wipe out your entire investment in that DRM pipe dream. Any employee with access can leak the master keys and the game is over. Any wily hardware hacker with plenty of time on his hands can take a shot at reverse engineering any (media) player to the point of cracking it, etc. In the end, it's a waste of time and money for the makers of DRM as there's enough interest that someone somewhere will break it at some point in the near future. You can play cat and mouse games by watermarking the output with the serial # of the player in order to lock out cracked players, but the attacker only has to break more than one player (perhaps two different models so they get both serial # and model #) and compare the resulting outputs from the same movie to figure out which bits contain the watermarks. XOR is very nice for figuring this out. :-) None of this worries me, because I don't give a rats ass about copying movies or what not. Couldn't care less about it. I'll wait for the shit to make it to HBO, it's usually not worth watching the waste of Hollywood plotless overhyped crud anyway, so why worry about copying it? The few titles that are worth watching, are also well worth buying, and after a few months they can be had for under $20, so why bother? What is cause for worry is that it's quite _possible_ for Intel or other chip manufacturers to insert backdoors in their hardware which someone will go through the trouble of discovering, which does put everyone at risk. No matter how good your operating system and firewall rules, if your network card (and drivers) decide to bend over upon receiving a specially crafted packet, you're owned just the same. Mind you, I've never run across anything close to this, except perhaps the old F00FC7C8 bug in the original pentium (which really was a DOS, not a back door) and the old UltraSparc I in 64 bit mode multiuser hole. The Pentium IV hyperthreading bug is something recent to worry about along the same line of thought. Sadly, you haven't got much choice in this matter, you have to assume that you can trust the hardware that you run on (unless you're willing to make your own and have the resources to do so, etc.)
Intel Adds DRM to New Chips part 2
it seems now intel say there is no DRM in there chips. Earlier FUD ? marketing tactic ? desire to hide truth to public as discussed before ? http://yro.slashdot.org/article.pl?sid=05/06/05/1833241