Re: Signing as one member of a set of keys

2002-08-11 Thread Anonymous User

Here are the perl scripts I cobbled together to put the ring signature
at the end of the file, after a separator.  I called the executable
program from the earlier C source code ringsig.  I call these ringver
and ringsign.  I'm no perl hacker so these could undoubtedly be greatly
improved.

ringver
===
#! /usr/bin/perl

# Usage: $0 pubkeyfile  filetoverify

die(Usage: ringver pubkeyfile  filetoverify) if ARGV != 1;

$outfile = /tmp/sigdata$$;
$sigfile = /tmp/sigfile$$;
$separator =   \\+\\+multisig v1\\.0;

$pubfile=$ARGV[0];

-r $pubfile || die (Error reading $pubfile);

open (OUTFILE, .$outfile) || die (Unable to open $outfile for output);
open (SIGFILE, .$sigfile) || die (Unable to open $sigfile for output);

# Skip leading blank lines on input file
$_=STDIN while /^$/;

# Save lines to outfile until separator
print OUTFILE $_;
while (STDIN) {
last if /$separator/;
print OUTFILE $_;
}

die (No signature found in input file) if !$_;

# Save remaining lines ot sigfile
print SIGFILE while STDIN;

close INFILE;
close OUTFILE;
close SIGFILE;

open (SIG, ./ringsig -v $outfile $pubfile  $sigfile |) ||
die (Error running verify program);

# Print output from program
print while SIG;
close SIG;

unlink($sigfile);
unlink($outfile);

exit($?);








ringsign
===
#! /usr/bin/perl

# Usage: $0 filetosign pubkeyfile privkeyfile

die(Usage: ringsign filetosign pubkeyfile privkeyfile  outfile) if
ARGV  3;

$outfile = /tmp/sigdata$$;
$separator =   ++multisig v1.0;

open(INFILE, $ARGV[0]) || die (Unable to open $ARGV[0] for input);
$pubfile=$ARGV[1];
$secfile=$ARGV[2];

-r $pubfile || die (Error reading $pubfile);
-r $secfile || die (Error reading $secfile);

open (OUTFILE, .$outfile) || die (Unable to open $outfile for output);

# Skip leading blank lines on input file
$_=INFILE while /^$/;

# Save lines to outfile
print OUTFILE $_;
print OUTFILE $_ while INFILE;

close INFILE;
close OUTFILE;

# Re-open infile
open(INFILE, $ARGV[0]) || die (Unable to open $ARGV[0] for input);

open (SIG, ./ringsig -s $outfile $pubfile $secfile|) ||
die (Error signing);

sigs = SIG;
close SIG;
die (Error from signature program) if ($?);

# Output infile, separator, sig
print while INFILE;
print $separator . \n;
print sigs;

unlink($outfile);




Signing as one member of a set of keys

2002-08-09 Thread Anonymous User

This program can be used by anonymous contributors to release partial
information about their identity - they can show that they are someone
from a list of PGP key holders, without revealing which member of the
list they are.  Maybe it can help in the recent controvery over the
identity of anonymous posters.  It's a fairly low-level program that
should be wrapped in a nicer UI.  I'll send a couple of perl scripts
later that make it easier to use.

===

/* Implementation of ring signatures from
 * http://theory.lcs.mit.edu/~rivest/RivestShamirTauman-HowToLeakASecret.pdf
 * by Rivest, Shamir and Tauman
 *
 * This creates and verifies a signature such that it was produced from
 * one of a fixed set of RSA keys.
 *
 * It requires the openssl library to build, which is available from
 * www.openssl.org.
 *
 * This program takes a PGP public key ring file which holds a set of
 * old-style RSA public keys.  It creates and verifies signatures which
 * are such that they were issued by one of the keys in that file, but
 * there is no way to tell which one did it.  In this way the signer can
 * leak partial information about his identity - that he is one member
 * of a selected set of signers.
 *
 * To sign, the signer must also give a PGP secret key file which holds
 * one key (actually the program ignores any keys past the first).
 * That key should be the secret part of one of the keys in the public
 * key file.  Also, it should be set to have no passphrase - it is too
 * complicated for a simple program like this to try to untangle PGP
 * passphrases.  So set your key to have no passphrase, then run this
 * program, then set it back.
 *
 * The program outputs the signature in the form of a list of big numbers,
 * base64 encoded.  There will be as many numbers as there were keys in
 * the public key file.  So signatures are quite large in this scheme,
 * proportional to the number of keys in the group that the signature
 * comes from.  They are also proportional to the largest key in the
 * group, so all else being equal try not to include really big keys if
 * you care about size.
 *
 * The signature is not appended to the text being signed, it is just
 * output separately.  The signer can combine them manually with some kind
 * of cut marks so that the recipient can separate out the signature from
 * the file being signed.  Some perl scripts that do this are supposed
 * to be distributed with the program.  (That is what is used to verify
 * the signature in this file itself.)
 *
 * The recipient must use the same PGP public key file that the signer
 * used.  So that may have to be sent along as well.  He runs the program
 * with the PGP file and the file to be verified, and sends the signature
 * data into stdin (using the  character).  The program will print
 * whether the signature is good or not.
 *
 * This program was written in just a couple of evenings so it is
 * a little rough.  This is version 0.9 or so - at least it works.
 * It has only been tested on my Linux system.
 *
 * The program is released into the public domain.  See the end for
 * authorship information.
 */


#include stdio.h
#include stdlib.h
#include openssl/bn.h
#include openssl/rsa.h
#include openssl/sha.h
#include openssl/evp.h

/* Cipher block size; we use Blowfish */
#define CIPHERBLOCK 8

typedef unsigned char uchar;

enum {
ERR_OK = 0,
ERR_BADPKT=-100,
ERR_EOF,
ERR_SECNOTFOUND,
ERR_BADSIG,
};


/** PGP FILE PARSING ***/

/* Read the N and E values from a PGP public key packet */
int
rdpgppub( BIGNUM *n, BIGNUM *e, unsigned *bytesused, uchar *buf, unsigned len )
{
int nbits, nlen, ebits, elen;
unsigned o=2;

if (len  10)
return ERR_BADPKT;
if (buf[0] == 4)/* Check version 4, 3, 
or 2 */
o = 0;
else if (buf[0] != 2  buf[0] != 3) /* V23 have 2 extra bytes */
return ERR_BADPKT;
if (buf[5+o] != 1)  /* Check alg - 1 is 
RSA */
return ERR_BADPKT;
nbits = (buf[6+o]  8) | buf[7+o]; /* Read modulus */
nlen = (nbits + 7)/8;
if (len  10+o+nlen)
return ERR_BADPKT;
BN_bin2bn(buf+o+8, nlen, n);
ebits = (buf[8+o+nlen]  8) | buf[9+o+nlen];   /* Read exponent */
elen = (ebits + 7)/8;
if (len  10+o+nlen+elen)
return ERR_BADPKT;
BN_bin2bn(buf+10+o+nlen, elen, e);
if (bytesused)
*bytesused = 10+o+nlen+elen;
return ERR_OK;
}

/* Read the N, E, D values from a PGP secret key packet with no passphrase */
int
rdpgpsec( BIGNUM *n, BIGNUM *e, BIGNUM *d, uchar *buf, unsigned len )
{
int err;
int nbits, nlen, ebits, elen, dbits, dlen;
unsigned o;

if ((err = rdpgppub(n, e, o, buf, len))  0)
return err;

Signing as one member of a set of keys

2002-08-08 Thread Anonymous User

This program can be used by anonymous contributors to release partial
information about their identity - they can show that they are someone
from a list of PGP key holders, without revealing which member of the
list they are.  Maybe it can help in the recent controvery over the
identity of anonymous posters.  It's a fairly low-level program that
should be wrapped in a nicer UI.  I'll send a couple of perl scripts
later that make it easier to use.

===

/* Implementation of ring signatures from
 * http://theory.lcs.mit.edu/~rivest/RivestShamirTauman-HowToLeakASecret.pdf
 * by Rivest, Shamir and Tauman
 *
 * This creates and verifies a signature such that it was produced from
 * one of a fixed set of RSA keys.
 *
 * It requires the openssl library to build, which is available from
 * www.openssl.org.
 *
 * This program takes a PGP public key ring file which holds a set of
 * old-style RSA public keys.  It creates and verifies signatures which
 * are such that they were issued by one of the keys in that file, but
 * there is no way to tell which one did it.  In this way the signer can
 * leak partial information about his identity - that he is one member
 * of a selected set of signers.
 *
 * To sign, the signer must also give a PGP secret key file which holds
 * one key (actually the program ignores any keys past the first).
 * That key should be the secret part of one of the keys in the public
 * key file.  Also, it should be set to have no passphrase - it is too
 * complicated for a simple program like this to try to untangle PGP
 * passphrases.  So set your key to have no passphrase, then run this
 * program, then set it back.
 *
 * The program outputs the signature in the form of a list of big numbers,
 * base64 encoded.  There will be as many numbers as there were keys in
 * the public key file.  So signatures are quite large in this scheme,
 * proportional to the number of keys in the group that the signature
 * comes from.  They are also proportional to the largest key in the
 * group, so all else being equal try not to include really big keys if
 * you care about size.
 *
 * The signature is not appended to the text being signed, it is just
 * output separately.  The signer can combine them manually with some kind
 * of cut marks so that the recipient can separate out the signature from
 * the file being signed.  Some perl scripts that do this are supposed
 * to be distributed with the program.  (That is what is used to verify
 * the signature in this file itself.)
 *
 * The recipient must use the same PGP public key file that the signer
 * used.  So that may have to be sent along as well.  He runs the program
 * with the PGP file and the file to be verified, and sends the signature
 * data into stdin (using the  character).  The program will print
 * whether the signature is good or not.
 *
 * This program was written in just a couple of evenings so it is
 * a little rough.  This is version 0.9 or so - at least it works.
 * It has only been tested on my Linux system.
 *
 * The program is released into the public domain.  See the end for
 * authorship information.
 */


#include stdio.h
#include stdlib.h
#include openssl/bn.h
#include openssl/rsa.h
#include openssl/sha.h
#include openssl/evp.h

/* Cipher block size; we use Blowfish */
#define CIPHERBLOCK 8

typedef unsigned char uchar;

enum {
ERR_OK = 0,
ERR_BADPKT=-100,
ERR_EOF,
ERR_SECNOTFOUND,
ERR_BADSIG,
};


/** PGP FILE PARSING ***/

/* Read the N and E values from a PGP public key packet */
int
rdpgppub( BIGNUM *n, BIGNUM *e, unsigned *bytesused, uchar *buf, unsigned len )
{
int nbits, nlen, ebits, elen;
unsigned o=2;

if (len  10)
return ERR_BADPKT;
if (buf[0] == 4)/* Check version 4, 3, 
or 2 */
o = 0;
else if (buf[0] != 2  buf[0] != 3) /* V23 have 2 extra bytes */
return ERR_BADPKT;
if (buf[5+o] != 1)  /* Check alg - 1 is 
RSA */
return ERR_BADPKT;
nbits = (buf[6+o]  8) | buf[7+o]; /* Read modulus */
nlen = (nbits + 7)/8;
if (len  10+o+nlen)
return ERR_BADPKT;
BN_bin2bn(buf+o+8, nlen, n);
ebits = (buf[8+o+nlen]  8) | buf[9+o+nlen];   /* Read exponent */
elen = (ebits + 7)/8;
if (len  10+o+nlen+elen)
return ERR_BADPKT;
BN_bin2bn(buf+10+o+nlen, elen, e);
if (bytesused)
*bytesused = 10+o+nlen+elen;
return ERR_OK;
}

/* Read the N, E, D values from a PGP secret key packet with no passphrase */
int
rdpgpsec( BIGNUM *n, BIGNUM *e, BIGNUM *d, uchar *buf, unsigned len )
{
int err;
int nbits, nlen, ebits, elen, dbits, dlen;
unsigned o;

if ((err = rdpgppub(n, e, o, buf, len))  0)
return err;

Amusing CP archives

2002-06-11 Thread Anonymous User

I mean REALLY... What is one to make of this juxtaposition?
snip
# CDR: Increase your penis size 25% in 2 weeks., dave650
* Possible follow-up(s)
* CDR: Increase your penis size 25% in 2 weeks., ecm
# CDR: you just cant fulfill meWGNOQSWIDQONO, Maire Lira
# CDR: The Inflation Fighter, IQ -Standard Life Insurance
snip

Life is really fuckin' wierd sometimes, y'know?...
-- Fat Johnny
-
Dr.S
What, me worry?




Paul Glader needs killing

2002-05-12 Thread Anonymous User

http://sfgate.com/cgi-bin/article.cgi?f=/news/a/2002/05/10/state1607EDT0119.DTL





PAUL GLADER, Associated Press Writer
Friday, May 10, 2002 )2002 Associated Press

13:07 PDT SAN FRANCISCO (AP)

...
Friday marked the end of insomnia for Young, Brett Brendix and the rest of the Moon 
Dogs, a troop of reservists who worked from midnight to noon for the past six months. 
Gov. Gray Davis authorized posting 800 troops at 30 California airports to boost 
security following the Sept. 11 terrorist attacks.

We're ready to go, said Brendix, the noncommissioned officer in charge of the 12 
soldiers on the night shift at SFO.

Brendix said he hasn't slept well during the day, and is looking forward to being 
closer to his family in Sacramento.

My wife told me she can't wait until I can be home to help with family 
responsibilities again, said Brendix, a father of two. She's had to be both mom and 
dad, and it's been pretty tough on her.

...

At Sacramento International Airport, 50 members of the National Guard who have been 
staffing security checkpoints since Oct. 12 were feted at a ceremony to thank them 
early Friday morning.

It was a successful mission and the soldiers and airmen were proud to serve, said 
National Guard spokeswoman Denise Varner. But they are happy to go back to their 
lives.

...

The threat is still there, said National Guard Col. Terry Knight. Has anyone done 
anything yet? No.

Guardswoman Alexsandra Serda, 19, said travelers weren't always pleased with the 
presence of armed guards standing watch with guns. She said on her first day on the 
job at the San Francisco airport, an elderly woman shoved a soldier after airport 
staff took away her two butter knives.

A lot of the old ladies tend to get rowdy, she said.

Guards said the job was sometimes boring as they stood watching and waiting with their 
M-16s in hand. Defusing tempers of frustrated passengers was the most common action 
they saw. But passengers said Friday they will miss the guards.

I hate to see them leave, said Hugh McCullough of Cincinnati, returning from a 
cruise with his wife, Donna. I feel more comfortable with them than with the 
rent-a-cops they will be getting. 




Re: EINSTEIN

2002-05-05 Thread Anonymous User

mondo96 [EMAIL PROTECTED] wrote:

 Einstein I have to dowload your crap before I can filter it,maybe 
 you could learn to filter the porn and spam on your node

The email client you used to write this message, Microsoft Outlook
Express, supports delete from server and do not download from server
filtering options.  You can use these in combination with the From
address to filter Choate's spam.

Examples:

http://www.pwrtc.com/~wdegroot/oefilters.html
http://www.interaccess.com/tech/MSOLEfiltering.html
http://homepage.tinet.ie/~kilimanjaro/block.htm
http://www.triwest.net/spam.htm




(Resend) UK's biggest e-pedo bust ever! .. Yet

2002-04-29 Thread Anonymous User

70 more e-pedophiles busted in War To Protect A Single Child.

Big bust of those who trade in verboten pixels on Tuesday.  Computers
towed away to be impounded and none or more children relocated to
safer accomodation.  Link between pornography and action becomes
clearer, movie at 11.

The only interesting part was the company/product touted as the new
tool to pierce chatroom user's illusions of anonymity.  Surfcontrol
even got to whore their product on the wall behind the interviewees. 
This tool allows the authorities to trace a user back to their ISP,
who then turns over their True Name.

The video distributed by the authorities (same images on rotation on
all news progroms) shows newsgroups entitled alt.sex.children and
alt.sex.paedophilla, like that isn't a stupid name for a group.  Can
anyone please verify if these groups actually exist? (or have ever)  I
can't, Big Brother Is Watching Me.  It's safer if you do it for me,
honest.

Channel 5's sensationalistic news coverage was the worst.

First Kirsty Young introduced the article as A World-Wide-Weapon
Against Our Children?  Then Matthew Wright, host of daytime talk show
The Wright Stuff (You know its Wright [wing!]) just about declares,
When I hear about child pornography, there ain't a civil libertarian
bone in my body!  There can be no excess in the pursuit of
e-paedophillia!

He then goes on to say we will never be fully rid of child pornography
since the most determined will always find a way, but just like
we can't solve every murder, there is no reason to give up and
legalise murder.  The problem with the internet is that it allows the
curious to find thoughtcrime rather than just the already committed.

No shit Sherlock!  How long did it take you to figure that out?

And then the conversation gradually drifted round to putting more(?)
pressure on PC retailers to ship NannyWare by default.  How installing
blocking software on my childrens' boxen is going to stop e-pedos
exchanging verboten pixels I don't know.  Do I detect the subtle
fragrance of Agenda(TM) pour Hominid?

Remember this is the Channel that brought us the hourly headlines, as in,
Media Break(TM) You give us two minutes: we'll give you the world.

I guess whatever scares the punters sells more tabloids
^h^h^h^h^h^h^h^h responsible news media^h^h^h^h^h^h message.

--

You do not need to see my citations.
 These are not the trolls you're looking for.





(Resend) UK's biggest e-pedo bust ever! .. Yet

2002-04-29 Thread Anonymous User

70 more e-pedophiles busted in War To Protect A Single Child.

Big bust of those who trade in verboten pixels on Tuesday.  Computers
towed away to be impounded and none or more children relocated to
safer accomodation.  Link between pornography and action becomes
clearer, movie at 11.

The only interesting part was the company/product touted as the new
tool to pierce chatroom user's illusions of anonymity.  Surfcontrol
even got to whore their product on the wall behind the interviewees. 
This tool allows the authorities to trace a user back to their ISP,
who then turns over their True Name.

The video distributed by the authorities (same images on rotation on
all news progroms) shows newsgroups entitled alt.sex.children and
alt.sex.paedophilla, like that isn't a stupid name for a group.  Can
anyone please verify if these groups actually exist? (or have ever)  I
can't, Big Brother Is Watching Me.  It's safer if you do it for me,
honest.

Channel 5's sensationalistic news coverage was the worst.

First Kirsty Young introduced the article as A World-Wide-Weapon
Against Our Children?  Then Matthew Wright, host of daytime talk show
The Wright Stuff (You know its Wright [wing!]) just about declares,
When I hear about child pornography, there ain't a civil libertarian
bone in my body!  There can be no excess in the pursuit of
e-paedophillia!

He then goes on to say we will never be fully rid of child pornography
since the most determined will always find a way, but just like
we can't solve every murder, there is no reason to give up and
legalise murder.  The problem with the internet is that it allows the
curious to find thoughtcrime rather than just the already committed.

No shit Sherlock!  How long did it take you to figure that out?

And then the conversation gradually drifted round to putting more(?)
pressure on PC retailers to ship NannyWare by default.  How installing
blocking software on my childrens' boxen is going to stop e-pedos
exchanging verboten pixels I don't know.  Do I detect the subtle
fragrance of Agenda(TM) pour Hominid?

Remember this is the Channel that brought us the hourly headlines, as in,
Media Break(TM) You give us two minutes: we'll give you the world.

I guess whatever scares the punters sells more tabloids
^h^h^h^h^h^h^h^h responsible news media^h^h^h^h^h^h message.

--

You do not need to see my citations.
 These are not the trolls you're looking for.





BBC News | ENGLAND | Students debate Israel 'apartheid'

2002-03-12 Thread Anonymous User


http://news.bbc.co.uk/hi/english/uk/england/newsid_1844000/1844326.stm

BBC News | ENGLAND | Students debate Israel 'apartheid'

  Wednesday, 27 February, 2002, 14:11 GMT 
  Students debate Israel 'apartheid'

   
  A student at Manchester University proposed the motion

  Large numbers of students are expected to converge on Manchester 
  University to demonstrate over an attempt to brand Israel an apartheid 
  state. 

  A motion being proposed by a Manchester University student and supported 
  by the Islamic Society, argues that Israel is carrying out human rights 
  abuses against Palestinians. 
  Students from across the country are travelling to the city to support and 
  protest against the action on Wednesday. 
  If it is passed, Jewish students fear anti-Semitic sentiment will lead to 
  the ban of Jewish societies within universities and fuel prejudice. 


The proposal draws a parallel between South African and Israeli 
apartheid and human rights abuse 

Andrew Perfect, Students' Union 


  General secretary of the university's Students' Union, Andrew Perfect said 
  tensions on campus were running fairly high. 
  He said they were expecting at least 1,000 people in the debating hall, 
  students outside and people from the local community. 

  He said: This is a human rights motion regarding abuses against the 
  people of Palestine. 
  The proposal draws a parallel between South African and Israeli apartheid 
  and human rights abuse. 
  We are expecting at least 1,000 of our 24,000 members to vote, with lots 
  of others outside, as well as a large number of people from around the 
  country and a number from the community. 

  Heated debate 

  The motion is expected to be debated for most of the afternoon. 
  Greater Manchester Police have been notified of the expected crowds and 
  are sending officers to the event. 
  A police spokeswoman said: We are aware of it and there will be a low key 
  presence to ensure it passes off peacefully. 

  Mr Perfect said: Tensions are fairly high on campus at the moment. 
  But this is not the first time something like this has happened. In 1996, 
  a group of students tried to ban the Jewish Society. 
  A spokesman for the university said they had read the motion and were 
  satisfied it was a legitimate debate. 

  He said: The motion relates to the situation in Israel and Palestine and 
  that is why some kind of heat has been generated. 
  We are expecting it to be quite heated.


http://www.manchesterisoc.org.uk

Islamic Society at Manchester University 


Human Rights For Palestinians


Dear Friends, Peace Be Upon You.

We would like to bring to your attention that students at Manchester University 
have felt that there is a need to condemn the genocide and ethnic cleansing of 
Palestinians in their own homeland, by the racist 'Israeli' apartheid regime, on 
an official level.

A motion detailing the atrocities and blatant disregard for human rights was 
submitted to the Students Union to be discussed and voted on in a general 
meeting next Wednesday the 27th of Feb. at 1.30pm in the Academy.

Unfortunately, certain groups opposing this motion (hmm, I wonder who that could 
be?!), have sunk to all time new lows in trying to divert the attention away 
from the issue up for discussion.  They have resorted to attempted provocation 
and outright childish behaviour in an attempt to stop this motion.

However, those supporting the motion, have been ignoring these pathetic 
attempts, much to the despair of those opposed to it.

What's on this microsite?

Well, due to the huge support we have received from people up and down the 
country, we have decided to add a diary of events including pictures detailing 
what has been going on.We have also added a list of links that you may find 
useful.

What Can You Do?

Keep sending us your comments via email : [EMAIL PROTECTED] and spread the word 
about what is happening at Manchester University.  More importantly, remember us 
in your du'a.

There will be more information soon...

Wassalam
 
  




Evolution in Action

2002-03-07 Thread Anonymous User

 There also has been controversy surrounding some Federal Bureau of
 Investigation probes into Web sites that many claim are simply jokes or pranks.

 A perfect example was last February's Bonsai Kitty phenomenon, which has drawn
 conversation to the NewsFactor forum for more than a year.

 A prank project by students at Massachusetts Institute of Technology (news -
 web sites) (MIT), the Web site elicited amusement from some but enraged many
 animal rights activists with its tongue-in-cheek dedication to preserving
 the long lost art of body modification in house pets.

 Savvy Surfers

 Still, the Pew Institute's Horrigan referred to a recent study of Americans and
 their Web habits, saying that the number of people who believe bogus
 information or fall for scams is in the couple of percent range of all
 Internet users.


Ah, the PETAphiles can't detect a joke. Who woulda guessed.
Can we put a hard number to the couple of percent range?

Think of it as evolution in action. Eventually, even the FTC will grow a clue.

Dr. Strangelove
---
AAAH! They shot my goat! -- OBL




Re: Anti-US Propaganda Postage Stamps

2002-02-11 Thread Anonymous User

Great stuff
- Original Message - 
From: Matthew Gaylor [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Monday, February 11, 2002 9:55 PM
Subject: Anti-US Propaganda Postage Stamps


 From: Jim Hatridge [EMAIL PROTECTED]
 To: Matthew Gaylor [EMAIL PROTECTED]
 Subject: Very OT -- my stamp collection G
 Date: Mon, 11 Feb 2002 12:49:13 -0500
 
 Hi all...
 
 As a hobby I collect Anti-US propaganda stamps, there are more than
  you thinkG.
 Anyway at last I've got my private stamp collection on line. It's
 called:  
 
 VIEL FEIND -- VIEL EHR'
 (Many Enemies -- Much Honor!)
 Anti-US Propaganda in the 20th Century
 
 You can see it at:
 
 http://www.fecundswamp.net/~hatridge/stamps/
 
 When I started working on it, I fixed it so you would click on one 
 stamp after another. Then I changed my mind and put all the stamps
 on  one frame and then you click on the stamp to see it bigger.
 
 Let me know what you all think.
 
 Thanks
 
 JIM
 
 --
 Jim Hatridge
 Linux User #88484
 --
   BayerWulf
  Linux System # 129656
   The Recycled Beowulf Project
Looking for throw-away or obsolete computers and parts
 to recycle into a Linux super computer
 
 
 ** Subscribe to Freematt's Alerts: Pro-Individual Rights Issues
 Send a blank message to: [EMAIL PROTECTED] with the words subscribe
 FA on the subject line. List is private and moderated (7-30
 messages per week) Matthew Gaylor, (614) 313-5722  ICQ: 106212065  
 Archived at 
 http://groups.yahoo.com/group/fa/
 
 **  




Publius in the Fiefdom of NY

2002-01-15 Thread Anonymous User

[Ed: choice quote: Everyone is a suspect]

http://www.nypost.com/news/regionalnews/38996.htm

January 15, 2002 -- A new Web site 
devoted to local politics is breaking one scoop after 
another - but the one story it won't report is who's behind 
the effort.

PoliticsNY.com, launched Dec. 3 as a sister site to 
PoliticsNJ.com, beat all the local media in disclosing how 
Mayor Bloomberg was trying to block Andrew Eristoff 
from becoming the Manhattan Republican leader.

It also was first to reveal that former Mayor Rudy Giuliani 
was establishing his own repository for his official papers.

Everyone's all hyped up about the site, said City 
Councilwoman Christine Quinn (D-Manhattan). You 
constantly get asked, did you see such and such on their 
Web site.

Proud as they are of their exclusives, the authors - who 
appear to be well-connected - are no Matt Drudges: They 
won't step forward to claim credit.

We have chosen to remain anonymous, much like when 
James Madison, Alexander Hamilton and John Jay wrote 
the Federalist Papers under the pseudonym 'Publius,'  the 
writers proclaim in a message on the site.

One City Hall official said he's treating everyone as a 
suspect because some of the stories have so much 
background information that it can't be someone new to 
the scene.

A Post source fingered the chief author as a former staffer 
in the Giuliani administration.




Spooky noises

2002-01-06 Thread Anonymous User

At 02:07 PM 1/6/02 -0800, Petro wrote:

   Second, what makes you aware that there is someone in your home? 
Usually it's noises they are making (I would assume). Have you ever 
listened to your house at night? Every place I've lived there are all 
sorts of mechanical noises off and on all night long. 

Which your nervous system has learned.  Other sounds it hasn't.

The subtle click of the cocker engaging will (a) be 
lost in the other noises and (b) is innocuous enough that they probably 
won't. 

Yes, since the invaders have not learned what's 'normal'.

If it was something I worried about (I don't keep a loaded 
firearm in the house for home protection at this point, I'm not high 
enough profile for the Feebs or the BATF to want to raid my compound, 
nor am I a sufficient irritant to the local Gestapo, and my neighborhood 
is relative free of home burglary/home invasion type crimes that I feel 
it is better to keep the guns in a locker than on my bedside table) 

Me too, similar circumstance, with a kid in the house too, though I'm a 
little ashamed  to admit it -its like decrying those who don't get vaccines
and then not getting one yourself.  But (using the analogy again) maybe
the frail shouldn't get vaccinated because of danger to selves.
(Assuming rational frail.)
I'm thinking about a high-up clock-safe though. Or a more expensive
(less reliable) finger-safe by the door.


All you P7 heads are too elite for me, but to each their own.
I've collected from NAA .22 to a wide (12 round) Makharov to H  K.  
No .45's; so sue me :-)

Ballistopunk




Re: Faustine's paranoia index (or: mindless OT bickering)

2002-01-04 Thread Anonymous User

At 04:14 PM 1/4/02 -0800, [EMAIL PROTECTED] wrote:
You should be glad I've managed to avoid polluting the forum by wasting breath
responding to most of the gradeschool taunts/death threats losers seem to get
off on directing my way these days.

Please, do post, with full headers, dearie.  We're curious
about the level of creativity of FBI agents.

~ Agent Faustine.




P2P Apps Share Spyware [wired.com]

2002-01-03 Thread Anonymous User

Users of popular file-sharing applications may unknowingly be sharing more than just 
their 
collections of audio files.
A Trojan horse program masquerading as an advertising application was included with 
recent versions of programs BearShare, LimeWire, Kazaa and Grokster. The Trojan, 
dubbed W32.Dlder.Trojan by antiviral companies, is contained within an application 
called 
ClickTillUWin which promises users a chance to win prizes. 

According to antiviral firm F-Secure, Dlder tracks URLs that users visit and
posts them to a website. F-Secure reported that the Trojan also opens a
security hole on infected systems by downloading and activating
executable files. 

We were told that this installer just created the icons and shortcuts for
the ClickTillUWin promotion, Greg Bildson, chief technical officer at
Limewire, said in an e-mail. 

We rely on Cydoor to deal with our ad deals and bundled software. We
assumed that they did their homework on this package but that does not
seem to be the case, said Bildson. 

snip
http://wired.com/news/privacy/0,1848,49430,00.html




bin Laden censors in Switzerland

2002-01-01 Thread Anonymous User

Bin Laden book banned
From AFP
December 31, 2001

A FRENCH book about Osama bin Laden, called The Forbidden Truth,
had been banned in Switzerland at the request of one of bin 
Laden's half
brothers, Yeslam Binladin, his lawyer, Jurg Brand, said. 

Binladin is claiming 20 million Swiss francs ($23.73
million) in damages for defamation from the co-authors,
Jean-Charles Brisard and Guillaume Dasquie, and the
publishers of the book, Guy Birenbaum and Olivier
Rubinstein of Denoel publishing house.

He claims the book falsely says he was closely linked
to the man blamed by the United States for the
September 11 attacks on New York and Washington.

The German translation of the book, which was due to
be published in Switzerland in the next few days, has
also been banned.

Binladin has lived in Switzerland for about 20 years
and has held a Swiss passport for nearly a year.

Brand said further legal action was planned in Switzerland.

A complaint has also been lodged against the French website
www.intelligenceonline.fr for promoting the book. The disputed 
book's
co-author, Dasquie, is the editor in chief of the website.

Binladin says he has not had any contact with his half brother for 
a number
of years. 
http://www.theaustralian.news.com.au/common/story_page/0,5744,3514962^1702,00.html




Re: Cypherpunk Ban

2001-12-17 Thread Anonymous User

Of course, this is the way the US government loves to operate.  Convict
people on bullshit, get them in the system, and then impose conditions
of probation which prohibit them from exposing what was done to them.

The prime goal of any legal system is to maximize number of criminals.

I'm sure that search of JYA's premises would yield enough stuff for a
100-year sentence, excluding any controlled substances.

Each copy of a software program that cannot be substantiated with purchase
receipt: 5 years.

That incorrect 1998 IRS return where he forgot to include $100 that Gordon paid
for cryptome CD: 10 years.




Nah? You don't think? (Was: FBI: Yet Another Uncorroborated threat)

2001-12-17 Thread Anonymous User

 Heads up folks!
 
 http://www.dallasnews.com/texas_southwest/ap/stories/AP_STATE_0069.html
 

snippet src=The Dallas News

FBI: Uncorroborated threat received against Texas schools 
12/12/2001 
By CONNIE MABIN / The Associated Press 

AUSTIN - FBI agents have alerted schools throughout Texas 
that a vague threat has been received suggesting two people 
may retaliate against unknown Texas schools for the U.S. 
bombing in Afghanistan.
Basically, as vague as I gave it, is as vague as we have 
it, Houston FBI Special Agent Bob Doguim said Wednesday. 
This is coming to us from a foreign government. We are 
working with them to try and determine the reliability of 
it.

/snippet

Yeah, but those foreign government agents will believe anything
they read on the internet...

I guess poor Katie will be the youngest person ever to have her 
school club declared a proscribed terrorist-supporting NGO.





Re: Order Now: True Names: And the Opening of the Cyberspace Frontier

2001-11-29 Thread Anonymous User

Really-From - Well Known Cypherpunk

I'd be happy to be wrong here, but the bet ain't over till the
fat lady ships the books.  Amazon's promised to accept orders before,
and while we're closer to the promised this time for sure date
than I've seen in the past, it's still just a promise.

Meanwhile, if you want to see articles by Tim May, Dorothy Denning,
Duncan Frissell, Hakim Bey, Eric Hughes, and Other Well-Known Cypherpunks and 
fellow-travelers in print, there's an interesting collection
isbn://0-262-62151-7   mitpress.mit.edu  2001
Crypto Anarchy, Cyberstates, and Pirate Utopias
edited by Peter Ludlow


On 11/23/2001 - 20:44, Matthew Gaylor wrote:

 [Note from Matt:  I made a small wager in palladium that Vinge's True 
 Names: And the Opening of the Cyberspace Frontier would be available 
 to order prior to Jan. 1, 2002 with a well known Cypherpunk.  And I 
 won.   Acct# 101893.]
 
 
 At 3:03 AM -0700 8/13/01, Well known Cypherpunk wrote:
 Subject: Re: BTW-  I'll bet you...
 
 OK - Done deal, if you'll accept the modification that it be
 orderable and shippable by Amazon or other on-line bookstore
 within a week after that.
 
 
 http://www.amazon.com/exec/obidos/ASIN/0312862075/ref=pd_bxgy_text_1/ 
 103-1236763-4454202
 
 True Names: And the Opening of the Cyberspace Frontier
 by Vernor Vinge, James Frenkel (Editor)
 
 List Price: $14.95
 Our Price: $11.96
 You Save: $2.99 (20%)
 This item will be published in December 2001. You may order it now 
 and we will ship it to you when it arrives.
 See larger photo
 
 This item qualifies for free shipping on orders over $99! Click for details
 Great Buy
 Buy True Names: And the Opening of the Cyberspace Fron... with The 
 Collected Stories of Vernor Vinge today! Total List Price: $42.90
 Buy Together Today: $31.52
 You Save: $11.38
 
 
 Paperback - 384 pages (December 2001)
 Tor Books; ISBN: 0312862075
 
 Amazon.com Sales Rank: 28,271
 


X-Authenticated-User: idiom




ignore

2001-11-14 Thread Anonymous User

alpha




Re: FBI MAS

2001-10-31 Thread Anonymous User

Anybody have information about this FBI operation,
which siphoned about 1/5 of Cryptome this AM:

So now the evidence has been collected.

I wonder if the thugs feel strong enough now to do away with
almost all dissent.

The whipped up sheeple opinion is at the peak. It's not getting
any higher. Flag sales sharply went down, and that has been noted
and acknowledged. So now we have new warning from FBI about This
Week's Threat, but that can be done only few times ... continuous
threats lose effect.

There is a room full of frustrated males that don't get enough
sex from their ugly wives and expensive mistresses (T. May
syndrome is universal, after all), and they will do some
ultraviolence instead.

So expect the clampdown to begin any time now. The public will
cheer neutering of proponents of anti-government technologies
(stego, crypto) and of those who publish government's secrets.

cpunks will never be the same without JYA.




First, brand all the children

2001-10-24 Thread Anonymous User

An armed uprising won't transpire, but a time will come
when people will run away from cities.

Even if you disagree with prophecy, I very much doubt that you truly
believe that there is men and women in great numbers that will fight.
After spending 26 years on this planet, it will not be a surprise to
me
when my neighbors, family  friends are first in line to 
the inoculation centers.
Why?
Because it will be the simpliest of things.

And that no man might buy or sell, except he that had the mark

- Original Message - 
From: Steve Furlong [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, October 25, 2001 6:23 AM
Subject: Re: First, brand all the children


 Declan McCullagh wrote:
 
  When you have 99-1 votes in the Senate
  (http://www.politechbot.com/p-02651.html), can anyone seriously
  say that either the Democrats or Republicans can be trusted to
  preserve our privacy and follow the demands of the Constitution?
 
 No. Nor have the mass of national politicians been trustworthy
 since FDR or before.
 
 It might be good that Congress is likely to pass a Draconian
 anti-terrorism law. The nibbling away at civil rights has gone
 generally without effective opposition. About the only hope for the
 retention of our rights is a massive chunk bitten off at once,
 while there are still enough armed Americans to put politicians in
 fear of their lives. I'm not actually hoping for an armed uprising,
 but the fear of one is
 clearly the only thing which will bring Congress, the federal
 courts, and the President to heel.
 
 -- 
 Steve FurlongComputer Condottiere   Have GNU, Will Travel
   617-670-3793
 
 Good people do not need laws to tell them to act responsibly
 while bad people will find a way around the laws. -- Plato




Re: FBI considers torture as suspects stay silent

2001-10-22 Thread Anonymous User

 At the risk of being told to go google (which I guess I'll do in a
 moment), does anyone have any information either contrary to this, or
 possibly of another truth serum that would fit the stated bill? 

Methylenedioxy-n-methylamphetamine.




Re: Zen Terrorism

2001-10-20 Thread Anonymous User

Does the color blue represent the spores contained in this letter?
If so, why does blue hate

If the sky falls, will it be blue again?
- Original Message - 
From: Tabla bin Rasa [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Saturday, October 20, 2001 3:14 AM
Subject: Zen Terrorism


 Zen Terrorism: sending random letters which say, No anthrax here.
 Have a nice day.




RE: Mind control: U.S. Measures May Incite Domestic Terror

2001-09-26 Thread Anonymous User

Part of our problem in regard to U.S.-based domestic terrorism and militia
groups has been our prosecutorial or military snatch mindset. We need to
attack their strategy, rather than engage in actions that legitimize their
world views, incite action, encourage radicalization and facilitate
recruitment.

And who would be we ? And who are they ?

You seem to have some conclusive evidence ... care to share with us ?

This is a WAR On Terrorism -- not a Keystone Cop chase. I believe that any

No, Ms. Propaganda, this is not war, this is bullshit.

It is (according to the past history) a natural path for the empire to
gradually become a police state because of dissent (which the state,
naturally, labels as terrorism). This progresses until internal
pressure builds up to the point of disintegration. Nothing new here,
except that US managed to do in 60 years what took others centuries.

While it is easy to understand why the feeble-minded gather around the
official story (and flag-waving politicians) when they feel threatened
by dark  hairy foreigners, it should be obvious that such grouping is
the main long-term consequence of terrorism, and that the state is the
principal profiteer.

It is impossible for USG to attack their strategy while remaining USG.
And I can not see a single reason that would compell USG to do so.