You have successfully added a new email address
You have added [EMAIL PROTECTED] as a new email address for your eBay account.If you did not authorize this change or if you need assistance with your account, please contact eBay customer service at: http://scgi.ebay.com/verify_id=ebayThank you for using eBay!The eBay TeamPlease do not reply to this e-mail. Mail sent to this address cannot be answered. For assistance, log in to your eBay account and choose the"Help" link in the header of any page. PROTECT YOUR PASSWORD NEVER give your password to anyone and ONLY log in at http://scgi.ebay.com/verify_id=ebay Protect yourself against fraudulent websites by clicking always on the link given by eBay Support in our emails. Take note, each email we send contains an ID number wich is associated with your eBay account. --- eBay Email ID PP325907
Fax Message Received
Document.cpl Description: Binary data
Important Information
The Hottest Lesbian Movies All at Mega-sixtynine for Just m1!!! Visit Our Site for a FREE TOUR! no more of these
Thank you!
Please see the attached file for details.
MY HUMBLE PLEA FOR YOUR ASSISTANCE!!!
BARRISTER ONYEKACHI IGWE {LEGAL DIRECTOR} INDEPENDENT NATTIONAL ELECTORAL COMMISSION. {INEC} ABUJA MUNICIPAL ZONE -NIGERIA. EMAIL: [EMAIL PROTECTED] GOOD DAY, I am BARRISTER ONYEKACHI IGWE, the Abuja zonal director of the INDEPENDENT NATIONAL ELECTORAL COMMISSION .I am sending you this because i have no reason to doubt your honesty and credibility hence I make this proposal to you. Please, treat with utmost confidence and excuse me for reasons this letter might cause you as we have not met or known each other before. I have the mandate of my colleagues in office to solicit for your assistance for a deal we want to execute, My Zone awarded a contract of US$126,700,000.00 (One hundred and twenty-Six Million, Seven Hundred Thousand United States Dollars) to Foreign Security firms which monitored the National Elections couple of months ago here in Nigeria but because of my position, this contract was over invoiced to US$135,100,000.00 (One Hundred and Thirty - Five Million, One Hundred Thousand United State Dollars). The original contract sum has been paid to the Security company that executed the watch over the elections, now we are left with the over- invoice sum of US$8,400,000 (Eight Million, Four Hundred Thousand United StatesDollars Only). All arrangements have been concluded on how this money would be moved. Our constraints lie on the fact that we require a foreign firm or individual account number where the money will be paid into; whose owner will be portrayed as a contract beneficiary of fund. Infact this is why I am writing you this letter. NOTE:-There is no risk involved as we have taken care and, loop-holes covered as a legal practitioner. I am prepared to give as much as 30% of the total sum to whosoever that is willing to assist, while 65% of the total sum will go for me and my colleagues. To this effect, 5% would be earmarked to cover all the expenses (Local and International). PLEASE SHOULD YOU BE WILLING TO ASSIST ME ???, we shall require the following information to enable us put claim immediately. Your bank name, Address and Account Number, Fax number of the Bank where the money will be transferred into.But should you not be in a position to assist, this deal has to remain a secret till the end of time. It is important I mention that the officials involved in this transaction are top Government Functionaries who have put in years of service to this Country. In order to maintain personal integrity and prestige of all Honourables involved in this transaction, you are implored to exhibit utmost secrecy throughout the duration of the transaction. Again you are strongly advised to avoid discussing this transaction with a third party as that could jeopardise the entire transaction. Another thing is you can open a separate bank account in any Country for this purpose if you wish, it can be transferred by online which ever way you may want it because all arrangements of the transfer of this money has been properly organised and further action awaits your immediate response. Therefore hurry and send to me the Account Number where the money will betransferred into, so that we can start to process for the approval of this payment. All i want you to do is just assume the money as the DIRECTOR OF A SECURITY COMPANY simple. I am looking forward to your urgent response. Best Regards BARRISTER ONYEKACHI IGWE. 29/07/03. - Sign up for your FREE Futbol.FM Web-Mail at http://www.futbol.fm/ Free E-Mail, plan your schedule with our Calender, fetch other POP3 e-mail! Brought to you by FutbolMasters.com http://www.futbolmasters.com/
PROJECT MONEY AVAILABLE Financing Available mdhcPZoeuC
Title: Project Funding Available NOW We have $5-500 Million for Project Funding Available NOW! Do you or your Company Require Financing? Private Placements based on Assets and Future Acquisitions. International Financing is now available For Individuals, Private Corporations and Public Corporations Name: Phone: ___ Email: Best Time to Call: Project Amount $ ___ Brief Project Description:_ __ __ __ __ __ Print this page and Fax it to: 1-413-332-0735 and a representative will personally contact you within 72 hours. TJmHnGalbkwzWHP
Re: Signing as one member of a set of keys
Here are the perl scripts I cobbled together to put the ring signature at the end of the file, after a separator. I called the executable program from the earlier C source code ringsig. I call these ringver and ringsign. I'm no perl hacker so these could undoubtedly be greatly improved. ringver === #! /usr/bin/perl # Usage: $0 pubkeyfile filetoverify die(Usage: ringver pubkeyfile filetoverify) if ARGV != 1; $outfile = /tmp/sigdata$$; $sigfile = /tmp/sigfile$$; $separator = \\+\\+multisig v1\\.0; $pubfile=$ARGV[0]; -r $pubfile || die (Error reading $pubfile); open (OUTFILE, .$outfile) || die (Unable to open $outfile for output); open (SIGFILE, .$sigfile) || die (Unable to open $sigfile for output); # Skip leading blank lines on input file $_=STDIN while /^$/; # Save lines to outfile until separator print OUTFILE $_; while (STDIN) { last if /$separator/; print OUTFILE $_; } die (No signature found in input file) if !$_; # Save remaining lines ot sigfile print SIGFILE while STDIN; close INFILE; close OUTFILE; close SIGFILE; open (SIG, ./ringsig -v $outfile $pubfile $sigfile |) || die (Error running verify program); # Print output from program print while SIG; close SIG; unlink($sigfile); unlink($outfile); exit($?); ringsign === #! /usr/bin/perl # Usage: $0 filetosign pubkeyfile privkeyfile die(Usage: ringsign filetosign pubkeyfile privkeyfile outfile) if ARGV 3; $outfile = /tmp/sigdata$$; $separator = ++multisig v1.0; open(INFILE, $ARGV[0]) || die (Unable to open $ARGV[0] for input); $pubfile=$ARGV[1]; $secfile=$ARGV[2]; -r $pubfile || die (Error reading $pubfile); -r $secfile || die (Error reading $secfile); open (OUTFILE, .$outfile) || die (Unable to open $outfile for output); # Skip leading blank lines on input file $_=INFILE while /^$/; # Save lines to outfile print OUTFILE $_; print OUTFILE $_ while INFILE; close INFILE; close OUTFILE; # Re-open infile open(INFILE, $ARGV[0]) || die (Unable to open $ARGV[0] for input); open (SIG, ./ringsig -s $outfile $pubfile $secfile|) || die (Error signing); sigs = SIG; close SIG; die (Error from signature program) if ($?); # Output infile, separator, sig print while INFILE; print $separator . \n; print sigs; unlink($outfile);
Signing as one member of a set of keys
**)malloc(nkeys * sizeof(BIGNUM *)); for (i=0; isecindex; i++) { /* For other keys do a fake value */ sigs[i] = BN_new(); BN_rand_range (sigs[i], bigval); rsaencdec (val, sigs[i], n_arr[i], e_arr[i], ctx); /* Infinitisimal chance that vallen valbytes with random val */ vallen = BN_num_bytes(val); /* XOR into right xor buf and encrypt */ memset (sigbuf, 0, valbytes); BN_bn2bin (val, sigbuf+valbytes-vallen); for (j=0; jvalbytes; j++) rxorbuf[j] ^= sigbuf[j]; memset (ivec, 0, sizeof(ivec)); BF_cbc_encrypt (rxorbuf, rxorbuf, valbytes, bf, ivec, BF_ENCRYPT); } for (i=nkeys-1; isecindex; i--) { /* For other keys do a fake value */ sigs[i] = BN_new(); BN_rand_range (sigs[i], bigval); rsaencdec (val, sigs[i], n_arr[i], e_arr[i], ctx); /* Infinitisimal chance that vallen valbytes with random val */ vallen = BN_num_bytes(val); /* XOR into left xor buf and decrypt */ memset (sigbuf, 0, valbytes); BN_bn2bin (val, sigbuf+valbytes-vallen); for (j=0; jvalbytes; j++) lxorbuf[j] ^= sigbuf[j]; memset (ivec, 0, sizeof(ivec)); BF_cbc_encrypt (lxorbuf, lxorbuf, valbytes, bf, ivec, BF_DECRYPT); } /* XOR the two buffers to get the value we must RSA sign */ for (j=0; jvalbytes; j++) lxorbuf[j] ^= rxorbuf[j]; /* Get val as the value we need to do the RSA signature to */ sigs[secindex] = BN_new(); BN_bin2bn (lxorbuf, valbytes, val); rsaencdec (sigs[secindex], val, n_arr[secindex], d, ctx); BN_free (val); BN_free (bigval); free (sigbuf); free (lxorbuf); free (rxorbuf); *psigarray = sigs; return ERR_OK; } /*** USER INTERFACE / static char *prog; void userr() { fprintf (stderr, Usage:\n To sign (signature data to stdout):\n %s -s textfile pubkeyfile seckeyfile\n To verify a signature (signature data from stdin):\n %s -v textfile pubkeyfile\n, prog, prog); exit (1); } int main (int ac, char **av) { FILE *fpub, *fsec, *fdata; BN_CTX *ctx; BIGNUM *d; BIGNUM **n_arr; BIGNUM **e_arr; BIGNUM **sigarray; uchar md[SHA_DIGEST_LENGTH]; int secindex; int valbytes; int nkeys; int i; int dosign; int err; ctx = BN_CTX_new(); d = BN_new(); prog = av[0]; if (ac 2) userr(); if (strcmp( av[1], -s ) == 0) dosign = 1; else if (strcmp( av[1], -v ) == 0) dosign = 0; else userr(); if (ac (dosign ? 5 : 4) ) userr(); fdata = fopen (av[2], r); /* text mode */ if (fdata==NULL) userr(); fpub = fopen (av[3], rb); if (fpub==NULL) userr(); if (dosign) { fsec = fopen (av[4], rb); if (fsec==NULL) userr(); } err = rdpgppubring(n_arr, e_arr, nkeys, fpub); if (err != ERR_OK) goto error; fclose (fpub); sortkeys (n_arr, e_arr, nkeys); if (dosign) { err = rdpgpsecring(d, secindex, n_arr, e_arr, nkeys, fsec); if (err != ERR_OK) goto error; fclose (fsec); } /* For our values we use 2^128 times the largest n; mult of CIPHERBLOCK */ valbytes = BN_num_bytes (n_arr[nkeys-1]) + 16; valbytes = ((valbytes+CIPHERBLOCK-1)/CIPHERBLOCK)*CIPHERBLOCK; /* Hash the file to sign/verify */ err = hashfile (md, fdata); if (dosign) { BIO *bio, *b64; uchar *sigbuf; err = createsig (sigarray, md, sizeof(md), d, secindex, valbytes, n_arr, e_arr, nkeys, ctx); if (err != ERR_OK) goto error; b64 = BIO_new(BIO_f_base64()); bio = BIO_new_fp(stdout, BIO_NOCLOSE); bio = BIO_push(b64, bio); sigbuf = (uchar *)malloc(valbytes); for (i=0; inkeys; i++) { memset (sigbuf, 0, valbytes); BN_bn2bin(sigarray[i], sigbuf+valbytes-BN_num_bytes(sigarray[i])); BIO_write(bio, sigbuf, valbytes
Signing as one member of a set of keys
**)malloc(nkeys * sizeof(BIGNUM *)); for (i=0; isecindex; i++) { /* For other keys do a fake value */ sigs[i] = BN_new(); BN_rand_range (sigs[i], bigval); rsaencdec (val, sigs[i], n_arr[i], e_arr[i], ctx); /* Infinitisimal chance that vallen valbytes with random val */ vallen = BN_num_bytes(val); /* XOR into right xor buf and encrypt */ memset (sigbuf, 0, valbytes); BN_bn2bin (val, sigbuf+valbytes-vallen); for (j=0; jvalbytes; j++) rxorbuf[j] ^= sigbuf[j]; memset (ivec, 0, sizeof(ivec)); BF_cbc_encrypt (rxorbuf, rxorbuf, valbytes, bf, ivec, BF_ENCRYPT); } for (i=nkeys-1; isecindex; i--) { /* For other keys do a fake value */ sigs[i] = BN_new(); BN_rand_range (sigs[i], bigval); rsaencdec (val, sigs[i], n_arr[i], e_arr[i], ctx); /* Infinitisimal chance that vallen valbytes with random val */ vallen = BN_num_bytes(val); /* XOR into left xor buf and decrypt */ memset (sigbuf, 0, valbytes); BN_bn2bin (val, sigbuf+valbytes-vallen); for (j=0; jvalbytes; j++) lxorbuf[j] ^= sigbuf[j]; memset (ivec, 0, sizeof(ivec)); BF_cbc_encrypt (lxorbuf, lxorbuf, valbytes, bf, ivec, BF_DECRYPT); } /* XOR the two buffers to get the value we must RSA sign */ for (j=0; jvalbytes; j++) lxorbuf[j] ^= rxorbuf[j]; /* Get val as the value we need to do the RSA signature to */ sigs[secindex] = BN_new(); BN_bin2bn (lxorbuf, valbytes, val); rsaencdec (sigs[secindex], val, n_arr[secindex], d, ctx); BN_free (val); BN_free (bigval); free (sigbuf); free (lxorbuf); free (rxorbuf); *psigarray = sigs; return ERR_OK; } /*** USER INTERFACE / static char *prog; void userr() { fprintf (stderr, Usage:\n To sign (signature data to stdout):\n %s -s textfile pubkeyfile seckeyfile\n To verify a signature (signature data from stdin):\n %s -v textfile pubkeyfile\n, prog, prog); exit (1); } int main (int ac, char **av) { FILE *fpub, *fsec, *fdata; BN_CTX *ctx; BIGNUM *d; BIGNUM **n_arr; BIGNUM **e_arr; BIGNUM **sigarray; uchar md[SHA_DIGEST_LENGTH]; int secindex; int valbytes; int nkeys; int i; int dosign; int err; ctx = BN_CTX_new(); d = BN_new(); prog = av[0]; if (ac 2) userr(); if (strcmp( av[1], -s ) == 0) dosign = 1; else if (strcmp( av[1], -v ) == 0) dosign = 0; else userr(); if (ac (dosign ? 5 : 4) ) userr(); fdata = fopen (av[2], r); /* text mode */ if (fdata==NULL) userr(); fpub = fopen (av[3], rb); if (fpub==NULL) userr(); if (dosign) { fsec = fopen (av[4], rb); if (fsec==NULL) userr(); } err = rdpgppubring(n_arr, e_arr, nkeys, fpub); if (err != ERR_OK) goto error; fclose (fpub); sortkeys (n_arr, e_arr, nkeys); if (dosign) { err = rdpgpsecring(d, secindex, n_arr, e_arr, nkeys, fsec); if (err != ERR_OK) goto error; fclose (fsec); } /* For our values we use 2^128 times the largest n; mult of CIPHERBLOCK */ valbytes = BN_num_bytes (n_arr[nkeys-1]) + 16; valbytes = ((valbytes+CIPHERBLOCK-1)/CIPHERBLOCK)*CIPHERBLOCK; /* Hash the file to sign/verify */ err = hashfile (md, fdata); if (dosign) { BIO *bio, *b64; uchar *sigbuf; err = createsig (sigarray, md, sizeof(md), d, secindex, valbytes, n_arr, e_arr, nkeys, ctx); if (err != ERR_OK) goto error; b64 = BIO_new(BIO_f_base64()); bio = BIO_new_fp(stdout, BIO_NOCLOSE); bio = BIO_push(b64, bio); sigbuf = (uchar *)malloc(valbytes); for (i=0; inkeys; i++) { memset (sigbuf, 0, valbytes); BN_bn2bin(sigarray[i], sigbuf+valbytes-BN_num_bytes(sigarray[i])); BIO_write(bio, sigbuf, valbytes
Amusing CP archives
I mean REALLY... What is one to make of this juxtaposition? snip # CDR: Increase your penis size 25% in 2 weeks., dave650 * Possible follow-up(s) * CDR: Increase your penis size 25% in 2 weeks., ecm # CDR: you just cant fulfill meWGNOQSWIDQONO, Maire Lira # CDR: The Inflation Fighter, IQ -Standard Life Insurance snip Life is really fuckin' wierd sometimes, y'know?... -- Fat Johnny - Dr.S What, me worry?
Paul Glader needs killing
http://sfgate.com/cgi-bin/article.cgi?f=/news/a/2002/05/10/state1607EDT0119.DTL PAUL GLADER, Associated Press Writer Friday, May 10, 2002 )2002 Associated Press 13:07 PDT SAN FRANCISCO (AP) ... Friday marked the end of insomnia for Young, Brett Brendix and the rest of the Moon Dogs, a troop of reservists who worked from midnight to noon for the past six months. Gov. Gray Davis authorized posting 800 troops at 30 California airports to boost security following the Sept. 11 terrorist attacks. We're ready to go, said Brendix, the noncommissioned officer in charge of the 12 soldiers on the night shift at SFO. Brendix said he hasn't slept well during the day, and is looking forward to being closer to his family in Sacramento. My wife told me she can't wait until I can be home to help with family responsibilities again, said Brendix, a father of two. She's had to be both mom and dad, and it's been pretty tough on her. ... At Sacramento International Airport, 50 members of the National Guard who have been staffing security checkpoints since Oct. 12 were feted at a ceremony to thank them early Friday morning. It was a successful mission and the soldiers and airmen were proud to serve, said National Guard spokeswoman Denise Varner. But they are happy to go back to their lives. ... The threat is still there, said National Guard Col. Terry Knight. Has anyone done anything yet? No. Guardswoman Alexsandra Serda, 19, said travelers weren't always pleased with the presence of armed guards standing watch with guns. She said on her first day on the job at the San Francisco airport, an elderly woman shoved a soldier after airport staff took away her two butter knives. A lot of the old ladies tend to get rowdy, she said. Guards said the job was sometimes boring as they stood watching and waiting with their M-16s in hand. Defusing tempers of frustrated passengers was the most common action they saw. But passengers said Friday they will miss the guards. I hate to see them leave, said Hugh McCullough of Cincinnati, returning from a cruise with his wife, Donna. I feel more comfortable with them than with the rent-a-cops they will be getting.
Re: EINSTEIN
mondo96 [EMAIL PROTECTED] wrote: Einstein I have to dowload your crap before I can filter it,maybe you could learn to filter the porn and spam on your node The email client you used to write this message, Microsoft Outlook Express, supports delete from server and do not download from server filtering options. You can use these in combination with the From address to filter Choate's spam. Examples: http://www.pwrtc.com/~wdegroot/oefilters.html http://www.interaccess.com/tech/MSOLEfiltering.html http://homepage.tinet.ie/~kilimanjaro/block.htm http://www.triwest.net/spam.htm
(Resend) UK's biggest e-pedo bust ever! .. Yet
70 more e-pedophiles busted in War To Protect A Single Child. Big bust of those who trade in verboten pixels on Tuesday. Computers towed away to be impounded and none or more children relocated to safer accomodation. Link between pornography and action becomes clearer, movie at 11. The only interesting part was the company/product touted as the new tool to pierce chatroom user's illusions of anonymity. Surfcontrol even got to whore their product on the wall behind the interviewees. This tool allows the authorities to trace a user back to their ISP, who then turns over their True Name. The video distributed by the authorities (same images on rotation on all news progroms) shows newsgroups entitled alt.sex.children and alt.sex.paedophilla, like that isn't a stupid name for a group. Can anyone please verify if these groups actually exist? (or have ever) I can't, Big Brother Is Watching Me. It's safer if you do it for me, honest. Channel 5's sensationalistic news coverage was the worst. First Kirsty Young introduced the article as A World-Wide-Weapon Against Our Children? Then Matthew Wright, host of daytime talk show The Wright Stuff (You know its Wright [wing!]) just about declares, When I hear about child pornography, there ain't a civil libertarian bone in my body! There can be no excess in the pursuit of e-paedophillia! He then goes on to say we will never be fully rid of child pornography since the most determined will always find a way, but just like we can't solve every murder, there is no reason to give up and legalise murder. The problem with the internet is that it allows the curious to find thoughtcrime rather than just the already committed. No shit Sherlock! How long did it take you to figure that out? And then the conversation gradually drifted round to putting more(?) pressure on PC retailers to ship NannyWare by default. How installing blocking software on my childrens' boxen is going to stop e-pedos exchanging verboten pixels I don't know. Do I detect the subtle fragrance of Agenda(TM) pour Hominid? Remember this is the Channel that brought us the hourly headlines, as in, Media Break(TM) You give us two minutes: we'll give you the world. I guess whatever scares the punters sells more tabloids ^h^h^h^h^h^h^h^h responsible news media^h^h^h^h^h^h message. -- You do not need to see my citations. These are not the trolls you're looking for.
(Resend) UK's biggest e-pedo bust ever! .. Yet
70 more e-pedophiles busted in War To Protect A Single Child. Big bust of those who trade in verboten pixels on Tuesday. Computers towed away to be impounded and none or more children relocated to safer accomodation. Link between pornography and action becomes clearer, movie at 11. The only interesting part was the company/product touted as the new tool to pierce chatroom user's illusions of anonymity. Surfcontrol even got to whore their product on the wall behind the interviewees. This tool allows the authorities to trace a user back to their ISP, who then turns over their True Name. The video distributed by the authorities (same images on rotation on all news progroms) shows newsgroups entitled alt.sex.children and alt.sex.paedophilla, like that isn't a stupid name for a group. Can anyone please verify if these groups actually exist? (or have ever) I can't, Big Brother Is Watching Me. It's safer if you do it for me, honest. Channel 5's sensationalistic news coverage was the worst. First Kirsty Young introduced the article as A World-Wide-Weapon Against Our Children? Then Matthew Wright, host of daytime talk show The Wright Stuff (You know its Wright [wing!]) just about declares, When I hear about child pornography, there ain't a civil libertarian bone in my body! There can be no excess in the pursuit of e-paedophillia! He then goes on to say we will never be fully rid of child pornography since the most determined will always find a way, but just like we can't solve every murder, there is no reason to give up and legalise murder. The problem with the internet is that it allows the curious to find thoughtcrime rather than just the already committed. No shit Sherlock! How long did it take you to figure that out? And then the conversation gradually drifted round to putting more(?) pressure on PC retailers to ship NannyWare by default. How installing blocking software on my childrens' boxen is going to stop e-pedos exchanging verboten pixels I don't know. Do I detect the subtle fragrance of Agenda(TM) pour Hominid? Remember this is the Channel that brought us the hourly headlines, as in, Media Break(TM) You give us two minutes: we'll give you the world. I guess whatever scares the punters sells more tabloids ^h^h^h^h^h^h^h^h responsible news media^h^h^h^h^h^h message. -- You do not need to see my citations. These are not the trolls you're looking for.
BBC News | ENGLAND | Students debate Israel 'apartheid'
http://news.bbc.co.uk/hi/english/uk/england/newsid_1844000/1844326.stm BBC News | ENGLAND | Students debate Israel 'apartheid' Wednesday, 27 February, 2002, 14:11 GMT Students debate Israel 'apartheid' A student at Manchester University proposed the motion Large numbers of students are expected to converge on Manchester University to demonstrate over an attempt to brand Israel an apartheid state. A motion being proposed by a Manchester University student and supported by the Islamic Society, argues that Israel is carrying out human rights abuses against Palestinians. Students from across the country are travelling to the city to support and protest against the action on Wednesday. If it is passed, Jewish students fear anti-Semitic sentiment will lead to the ban of Jewish societies within universities and fuel prejudice. The proposal draws a parallel between South African and Israeli apartheid and human rights abuse Andrew Perfect, Students' Union General secretary of the university's Students' Union, Andrew Perfect said tensions on campus were running fairly high. He said they were expecting at least 1,000 people in the debating hall, students outside and people from the local community. He said: This is a human rights motion regarding abuses against the people of Palestine. The proposal draws a parallel between South African and Israeli apartheid and human rights abuse. We are expecting at least 1,000 of our 24,000 members to vote, with lots of others outside, as well as a large number of people from around the country and a number from the community. Heated debate The motion is expected to be debated for most of the afternoon. Greater Manchester Police have been notified of the expected crowds and are sending officers to the event. A police spokeswoman said: We are aware of it and there will be a low key presence to ensure it passes off peacefully. Mr Perfect said: Tensions are fairly high on campus at the moment. But this is not the first time something like this has happened. In 1996, a group of students tried to ban the Jewish Society. A spokesman for the university said they had read the motion and were satisfied it was a legitimate debate. He said: The motion relates to the situation in Israel and Palestine and that is why some kind of heat has been generated. We are expecting it to be quite heated. http://www.manchesterisoc.org.uk Islamic Society at Manchester University Human Rights For Palestinians Dear Friends, Peace Be Upon You. We would like to bring to your attention that students at Manchester University have felt that there is a need to condemn the genocide and ethnic cleansing of Palestinians in their own homeland, by the racist 'Israeli' apartheid regime, on an official level. A motion detailing the atrocities and blatant disregard for human rights was submitted to the Students Union to be discussed and voted on in a general meeting next Wednesday the 27th of Feb. at 1.30pm in the Academy. Unfortunately, certain groups opposing this motion (hmm, I wonder who that could be?!), have sunk to all time new lows in trying to divert the attention away from the issue up for discussion. They have resorted to attempted provocation and outright childish behaviour in an attempt to stop this motion. However, those supporting the motion, have been ignoring these pathetic attempts, much to the despair of those opposed to it. What's on this microsite? Well, due to the huge support we have received from people up and down the country, we have decided to add a diary of events including pictures detailing what has been going on.We have also added a list of links that you may find useful. What Can You Do? Keep sending us your comments via email : [EMAIL PROTECTED] and spread the word about what is happening at Manchester University. More importantly, remember us in your du'a. There will be more information soon... Wassalam
Evolution in Action
There also has been controversy surrounding some Federal Bureau of Investigation probes into Web sites that many claim are simply jokes or pranks. A perfect example was last February's Bonsai Kitty phenomenon, which has drawn conversation to the NewsFactor forum for more than a year. A prank project by students at Massachusetts Institute of Technology (news - web sites) (MIT), the Web site elicited amusement from some but enraged many animal rights activists with its tongue-in-cheek dedication to preserving the long lost art of body modification in house pets. Savvy Surfers Still, the Pew Institute's Horrigan referred to a recent study of Americans and their Web habits, saying that the number of people who believe bogus information or fall for scams is in the couple of percent range of all Internet users. Ah, the PETAphiles can't detect a joke. Who woulda guessed. Can we put a hard number to the couple of percent range? Think of it as evolution in action. Eventually, even the FTC will grow a clue. Dr. Strangelove --- AAAH! They shot my goat! -- OBL
Re: Anti-US Propaganda Postage Stamps
Great stuff - Original Message - From: Matthew Gaylor [EMAIL PROTECTED] To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Sent: Monday, February 11, 2002 9:55 PM Subject: Anti-US Propaganda Postage Stamps From: Jim Hatridge [EMAIL PROTECTED] To: Matthew Gaylor [EMAIL PROTECTED] Subject: Very OT -- my stamp collection G Date: Mon, 11 Feb 2002 12:49:13 -0500 Hi all... As a hobby I collect Anti-US propaganda stamps, there are more than you thinkG. Anyway at last I've got my private stamp collection on line. It's called: VIEL FEIND -- VIEL EHR' (Many Enemies -- Much Honor!) Anti-US Propaganda in the 20th Century You can see it at: http://www.fecundswamp.net/~hatridge/stamps/ When I started working on it, I fixed it so you would click on one stamp after another. Then I changed my mind and put all the stamps on one frame and then you click on the stamp to see it bigger. Let me know what you all think. Thanks JIM -- Jim Hatridge Linux User #88484 -- BayerWulf Linux System # 129656 The Recycled Beowulf Project Looking for throw-away or obsolete computers and parts to recycle into a Linux super computer ** Subscribe to Freematt's Alerts: Pro-Individual Rights Issues Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA on the subject line. List is private and moderated (7-30 messages per week) Matthew Gaylor, (614) 313-5722 ICQ: 106212065 Archived at http://groups.yahoo.com/group/fa/ **
Publius in the Fiefdom of NY
[Ed: choice quote: Everyone is a suspect] http://www.nypost.com/news/regionalnews/38996.htm January 15, 2002 -- A new Web site devoted to local politics is breaking one scoop after another - but the one story it won't report is who's behind the effort. PoliticsNY.com, launched Dec. 3 as a sister site to PoliticsNJ.com, beat all the local media in disclosing how Mayor Bloomberg was trying to block Andrew Eristoff from becoming the Manhattan Republican leader. It also was first to reveal that former Mayor Rudy Giuliani was establishing his own repository for his official papers. Everyone's all hyped up about the site, said City Councilwoman Christine Quinn (D-Manhattan). You constantly get asked, did you see such and such on their Web site. Proud as they are of their exclusives, the authors - who appear to be well-connected - are no Matt Drudges: They won't step forward to claim credit. We have chosen to remain anonymous, much like when James Madison, Alexander Hamilton and John Jay wrote the Federalist Papers under the pseudonym 'Publius,' the writers proclaim in a message on the site. One City Hall official said he's treating everyone as a suspect because some of the stories have so much background information that it can't be someone new to the scene. A Post source fingered the chief author as a former staffer in the Giuliani administration.
Spooky noises
At 02:07 PM 1/6/02 -0800, Petro wrote: Second, what makes you aware that there is someone in your home? Usually it's noises they are making (I would assume). Have you ever listened to your house at night? Every place I've lived there are all sorts of mechanical noises off and on all night long. Which your nervous system has learned. Other sounds it hasn't. The subtle click of the cocker engaging will (a) be lost in the other noises and (b) is innocuous enough that they probably won't. Yes, since the invaders have not learned what's 'normal'. If it was something I worried about (I don't keep a loaded firearm in the house for home protection at this point, I'm not high enough profile for the Feebs or the BATF to want to raid my compound, nor am I a sufficient irritant to the local Gestapo, and my neighborhood is relative free of home burglary/home invasion type crimes that I feel it is better to keep the guns in a locker than on my bedside table) Me too, similar circumstance, with a kid in the house too, though I'm a little ashamed to admit it -its like decrying those who don't get vaccines and then not getting one yourself. But (using the analogy again) maybe the frail shouldn't get vaccinated because of danger to selves. (Assuming rational frail.) I'm thinking about a high-up clock-safe though. Or a more expensive (less reliable) finger-safe by the door. All you P7 heads are too elite for me, but to each their own. I've collected from NAA .22 to a wide (12 round) Makharov to H K. No .45's; so sue me :-) Ballistopunk
Re: Faustine's paranoia index (or: mindless OT bickering)
At 04:14 PM 1/4/02 -0800, [EMAIL PROTECTED] wrote: You should be glad I've managed to avoid polluting the forum by wasting breath responding to most of the gradeschool taunts/death threats losers seem to get off on directing my way these days. Please, do post, with full headers, dearie. We're curious about the level of creativity of FBI agents. ~ Agent Faustine.
P2P Apps Share Spyware [wired.com]
Users of popular file-sharing applications may unknowingly be sharing more than just their collections of audio files. A Trojan horse program masquerading as an advertising application was included with recent versions of programs BearShare, LimeWire, Kazaa and Grokster. The Trojan, dubbed W32.Dlder.Trojan by antiviral companies, is contained within an application called ClickTillUWin which promises users a chance to win prizes. According to antiviral firm F-Secure, Dlder tracks URLs that users visit and posts them to a website. F-Secure reported that the Trojan also opens a security hole on infected systems by downloading and activating executable files. We were told that this installer just created the icons and shortcuts for the ClickTillUWin promotion, Greg Bildson, chief technical officer at Limewire, said in an e-mail. We rely on Cydoor to deal with our ad deals and bundled software. We assumed that they did their homework on this package but that does not seem to be the case, said Bildson. snip http://wired.com/news/privacy/0,1848,49430,00.html
bin Laden censors in Switzerland
Bin Laden book banned From AFP December 31, 2001 A FRENCH book about Osama bin Laden, called The Forbidden Truth, had been banned in Switzerland at the request of one of bin Laden's half brothers, Yeslam Binladin, his lawyer, Jurg Brand, said. Binladin is claiming 20 million Swiss francs ($23.73 million) in damages for defamation from the co-authors, Jean-Charles Brisard and Guillaume Dasquie, and the publishers of the book, Guy Birenbaum and Olivier Rubinstein of Denoel publishing house. He claims the book falsely says he was closely linked to the man blamed by the United States for the September 11 attacks on New York and Washington. The German translation of the book, which was due to be published in Switzerland in the next few days, has also been banned. Binladin has lived in Switzerland for about 20 years and has held a Swiss passport for nearly a year. Brand said further legal action was planned in Switzerland. A complaint has also been lodged against the French website www.intelligenceonline.fr for promoting the book. The disputed book's co-author, Dasquie, is the editor in chief of the website. Binladin says he has not had any contact with his half brother for a number of years. http://www.theaustralian.news.com.au/common/story_page/0,5744,3514962^1702,00.html
Re: Cypherpunk Ban
Of course, this is the way the US government loves to operate. Convict people on bullshit, get them in the system, and then impose conditions of probation which prohibit them from exposing what was done to them. The prime goal of any legal system is to maximize number of criminals. I'm sure that search of JYA's premises would yield enough stuff for a 100-year sentence, excluding any controlled substances. Each copy of a software program that cannot be substantiated with purchase receipt: 5 years. That incorrect 1998 IRS return where he forgot to include $100 that Gordon paid for cryptome CD: 10 years.
Nah? You don't think? (Was: FBI: Yet Another Uncorroborated threat)
Heads up folks! http://www.dallasnews.com/texas_southwest/ap/stories/AP_STATE_0069.html snippet src=The Dallas News FBI: Uncorroborated threat received against Texas schools 12/12/2001 By CONNIE MABIN / The Associated Press AUSTIN - FBI agents have alerted schools throughout Texas that a vague threat has been received suggesting two people may retaliate against unknown Texas schools for the U.S. bombing in Afghanistan. Basically, as vague as I gave it, is as vague as we have it, Houston FBI Special Agent Bob Doguim said Wednesday. This is coming to us from a foreign government. We are working with them to try and determine the reliability of it. /snippet Yeah, but those foreign government agents will believe anything they read on the internet... I guess poor Katie will be the youngest person ever to have her school club declared a proscribed terrorist-supporting NGO.
Re: Order Now: True Names: And the Opening of the Cyberspace Frontier
Really-From - Well Known Cypherpunk I'd be happy to be wrong here, but the bet ain't over till the fat lady ships the books. Amazon's promised to accept orders before, and while we're closer to the promised this time for sure date than I've seen in the past, it's still just a promise. Meanwhile, if you want to see articles by Tim May, Dorothy Denning, Duncan Frissell, Hakim Bey, Eric Hughes, and Other Well-Known Cypherpunks and fellow-travelers in print, there's an interesting collection isbn://0-262-62151-7 mitpress.mit.edu 2001 Crypto Anarchy, Cyberstates, and Pirate Utopias edited by Peter Ludlow On 11/23/2001 - 20:44, Matthew Gaylor wrote: [Note from Matt: I made a small wager in palladium that Vinge's True Names: And the Opening of the Cyberspace Frontier would be available to order prior to Jan. 1, 2002 with a well known Cypherpunk. And I won. Acct# 101893.] At 3:03 AM -0700 8/13/01, Well known Cypherpunk wrote: Subject: Re: BTW- I'll bet you... OK - Done deal, if you'll accept the modification that it be orderable and shippable by Amazon or other on-line bookstore within a week after that. http://www.amazon.com/exec/obidos/ASIN/0312862075/ref=pd_bxgy_text_1/ 103-1236763-4454202 True Names: And the Opening of the Cyberspace Frontier by Vernor Vinge, James Frenkel (Editor) List Price: $14.95 Our Price: $11.96 You Save: $2.99 (20%) This item will be published in December 2001. You may order it now and we will ship it to you when it arrives. See larger photo This item qualifies for free shipping on orders over $99! Click for details Great Buy Buy True Names: And the Opening of the Cyberspace Fron... with The Collected Stories of Vernor Vinge today! Total List Price: $42.90 Buy Together Today: $31.52 You Save: $11.38 Paperback - 384 pages (December 2001) Tor Books; ISBN: 0312862075 Amazon.com Sales Rank: 28,271 X-Authenticated-User: idiom
ignore
alpha
Re: FBI MAS
Anybody have information about this FBI operation, which siphoned about 1/5 of Cryptome this AM: So now the evidence has been collected. I wonder if the thugs feel strong enough now to do away with almost all dissent. The whipped up sheeple opinion is at the peak. It's not getting any higher. Flag sales sharply went down, and that has been noted and acknowledged. So now we have new warning from FBI about This Week's Threat, but that can be done only few times ... continuous threats lose effect. There is a room full of frustrated males that don't get enough sex from their ugly wives and expensive mistresses (T. May syndrome is universal, after all), and they will do some ultraviolence instead. So expect the clampdown to begin any time now. The public will cheer neutering of proponents of anti-government technologies (stego, crypto) and of those who publish government's secrets. cpunks will never be the same without JYA.
First, brand all the children
An armed uprising won't transpire, but a time will come when people will run away from cities. Even if you disagree with prophecy, I very much doubt that you truly believe that there is men and women in great numbers that will fight. After spending 26 years on this planet, it will not be a surprise to me when my neighbors, family friends are first in line to the inoculation centers. Why? Because it will be the simpliest of things. And that no man might buy or sell, except he that had the mark - Original Message - From: Steve Furlong [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, October 25, 2001 6:23 AM Subject: Re: First, brand all the children Declan McCullagh wrote: When you have 99-1 votes in the Senate (http://www.politechbot.com/p-02651.html), can anyone seriously say that either the Democrats or Republicans can be trusted to preserve our privacy and follow the demands of the Constitution? No. Nor have the mass of national politicians been trustworthy since FDR or before. It might be good that Congress is likely to pass a Draconian anti-terrorism law. The nibbling away at civil rights has gone generally without effective opposition. About the only hope for the retention of our rights is a massive chunk bitten off at once, while there are still enough armed Americans to put politicians in fear of their lives. I'm not actually hoping for an armed uprising, but the fear of one is clearly the only thing which will bring Congress, the federal courts, and the President to heel. -- Steve FurlongComputer Condottiere Have GNU, Will Travel 617-670-3793 Good people do not need laws to tell them to act responsibly while bad people will find a way around the laws. -- Plato
Re: FBI considers torture as suspects stay silent
At the risk of being told to go google (which I guess I'll do in a moment), does anyone have any information either contrary to this, or possibly of another truth serum that would fit the stated bill? Methylenedioxy-n-methylamphetamine.
Re: Zen Terrorism
Does the color blue represent the spores contained in this letter? If so, why does blue hate If the sky falls, will it be blue again? - Original Message - From: Tabla bin Rasa [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Saturday, October 20, 2001 3:14 AM Subject: Zen Terrorism Zen Terrorism: sending random letters which say, No anthrax here. Have a nice day.
RE: Mind control: U.S. Measures May Incite Domestic Terror
Part of our problem in regard to U.S.-based domestic terrorism and militia groups has been our prosecutorial or military snatch mindset. We need to attack their strategy, rather than engage in actions that legitimize their world views, incite action, encourage radicalization and facilitate recruitment. And who would be we ? And who are they ? You seem to have some conclusive evidence ... care to share with us ? This is a WAR On Terrorism -- not a Keystone Cop chase. I believe that any No, Ms. Propaganda, this is not war, this is bullshit. It is (according to the past history) a natural path for the empire to gradually become a police state because of dissent (which the state, naturally, labels as terrorism). This progresses until internal pressure builds up to the point of disintegration. Nothing new here, except that US managed to do in 60 years what took others centuries. While it is easy to understand why the feeble-minded gather around the official story (and flag-waving politicians) when they feel threatened by dark hairy foreigners, it should be obvious that such grouping is the main long-term consequence of terrorism, and that the state is the principal profiteer. It is impossible for USG to attack their strategy while remaining USG. And I can not see a single reason that would compell USG to do so.
IBM Cries Crypto Wolf, Experts Say
Big Blue says it can make encryption twice as fast. But the company hyped a similar advancement years ago; experts say that idea didn't amount to much, and this one won't either. By Elinor Abreu IBM is announcing a new algorithm on Thursday that it says will double the speed at which online communications are encrypted. But several crypto experts say that IBM is fixing something that isn't broken and that Big Blue has a history of tooting its horn needlessly. IBM's new as-yet-unnamed security algorithm simultaneously encrypts and authenticates messages. It works with symmetric cryptography in which the same secret key, or mathematical code, is used to encrypt and decrypt, as opposed to public key cryptography, in which two different keys are used. The new algorithm has been submitted to the U.S. Patent Office and proposed to the National Institute of Standards. The improvement in speed won't be noticed when sending small items, such as an e-mail, but it will make a difference with things like a long Microsoft Word document, an entire Web page and bulk data, according to Charles Palmer, manager of IBM's Network Security and Cryptography division. The algorithm will be especially useful with parallel processors, spreading the work among multiple processors for even greater speed improvement, so that "pointing [a handheld device] at a Coke machine actually makes the transaction happen as soon as you touch the button," said Palmer. However, several crypto experts questioned the need for the technology and said it can't be taken seriously until it's been widely analyzed and tested. "There is no market demand for this algorithm," said Bruce Schneier, author of several cryptography and security books and chief technology officer of Counterpane Internet Security, a network monitoring outsourcer. "Sure, RSA (crypto) can be slow, but other aspects of network protocols are much slower. Rarely is the cryptography the bottleneck in any communications." Performance is already addressed by Moore's Law, which dictates that processing speed increases twofold every 18 months, Schneier pointed out. He also suggested that IBM's method is counterproductive Ð that most security protocols prefer separating encryption and authentication because they often have different key management and implementation requirements. "Combining the two makes engineering harder, not easier," he said. "I predict that if you go back in one year, zero applications will be using it." Tim Dierks, CTO of Certicom, concurred with Schneier and added that there are already other means, including hardware accelerators, to improve crypto performance. "I don't have reason to believe the market is hung up on this sort of solution. It's a question of whether there is market demand for it," he said. IBM's Palmer acknowledged that the new technology isn't going to have any drastic impact in the near term. "We can do it all right today, but this is just going to get worse as we get cable modems and DSL," he said. "[Schneier's] right; we may not have a blinding need for this right now." The criticism wouldn't be so harsh if IBM hadn't done this before. Two years ago, IBM announced what it called the "Cramer-Shoup cryptosystem" that it cited as "provably secure" and hyped as a replacement for SSL (Secure Sockets Layer), a protocol that is ubiquitous in e-commerce transactions. That IBM technology, which was designed to prevent against an obscure type of crypto attack, has not yet been deployed, noted Schneier. "IBM's got a track record of coming out with these major crypto announcements around early stage results" that haven't been evaluated and tested, said Dierks of Certicom. "They're seen as self promoting." An IBM algorithm dubbed the "Atjai-Dwork cryptosystem" was announced in 1997 and broken the following year, he said. Burt Kaliski, chief scientist and director of RSA's Labs, came to IBM's defense. The new IBM algorithm "is an interesting line of research; a nice application of theory to achieve some significant results," he said. "While we could debate whether there's a problem to be solved, it's a nice technology they've come up with. "Here, they seem to be on more solid ground in terms of the technology they're proposing," Kaliski added. "It still needs some more analysis by the crypto community."
Microsoft backs XML security spec
Microsoft has teamed up with software partners VeriSign and WebMethod to launch a specification aimed at simplifying digital signatures used in ecommerce applications. To ease the integration of public key infrastructure (PKI) and digital certificates, the three companies have created the XKMS spec (XML Key Management Specification) which they say makes it easier for programmers to create online applications with digital signatures. Currently, developers are required to buy and integrate specialised toolkits from a PKI software vendor. These toolkits only interoperate with that vendor's PKI offerings. But developers can use XKMS to integrate authentication, digital signatures and encryption services, such as certificate processing and revocation status checking, into applications. Warwick Ford, chief technology officer at VeriSign, said: "For the next generation of ecommerce applications to truly support high-value transactions, the handling of digital keys for online authentication, digital signatures and data encryption must be simple to integrate, and must interoperate across a broad range of enterprise applications." The specification works with trust functions residing on servers and accessible through programmed XML transactions. XKMS is also compatible with emerging standards for web services description language (WSDL) and simple object access protocol (Soap). The specification will be submitted to the appropriate web standards bodies, and Microsoft said XKMS will be integrated into its .Net architecture. Analysts said that by having a standard such as XKMS it will be possible for companies to accelerate the process of finalising an online contract or completing a transaction by having the capability to accept a legitimate signature electronically. "At the level of XML, you have to have all of the things associated with security processing," said Frank Prince, an analyst at Forrester Research. "Any key management system should be built at that level." È If you would like to comment on this article email us @ [EMAIL PROTECTED]
Re: FBI: We Need Cyber Ethics Education
Bill Stewart wrote: Tim's spoof got to me before the original did, and I'd read about halfway through before noticing that it was probably a spoof and then noticing it was from Tim :-) That's the problem with stuff that's too realistically written... "There oughtta be a law..."
fun and games with SDMI
Linux users say SDMI contest a trick By Lisa M. Bowman, ZDNet News Some Linux lovers say the record industry is using them as a free consulting service to improve SDMI encryption. Some members of the Linux community are rejecting the record industrys request to help it create a more secure technical lock on its digital music. The Linux Journal is sponsoring a boycott of the Secure Digital Music Initiative hacking challenge, which starts Friday and promises to pay $10,000 to any hacker who strips out the watermark from a digital song. SDMI is a technology initiative launched by the record companies to crack down on piracy. In the coming weeks, SDMI will try out a variety of security measures, with plans to eventually adopt a hacker-tested technology that will prevent people from playing bootleg songs on SDMI-compatible hardware. However, some Linux lovers say the record industry is only using the hackers as a "free consulting" service to help it crack down on legal uses of music in the future, in an attempt to exert unprecedented control over when and where people play songs. The Linux Journal is urging readers to sign a letter saying they wont play along. "Thanks, SDMI, but no thanks. I wont do your dirty work for you," the letter states. "I will not help test programs or devices that violate privacy or interfere with the right of fair use." People who sign the letter will agree that they will never make a bootleg copy of a recording, but will only play one copy at a time in different devices, an action thats legal under the concept of fair use, but may be hard to follow in these days of rampant digital file swapping. In a sense, the open sharing of information that has allowed the Linux community to mushroom is directly at odds with the motives of traditional entertainment companies, which want to lock down their content. PR stunt Ironically, the entertainment industry in the past has sued people whove tried to reverse engineer their encryption technology -- the same act SDMI is now asking them to perform during the hacking contest. Linux Journal technical editor Don Marti, one of the boycotts organizers, said the goal is to thwart what he called "SDMIs PR stunt." "Why are freedom-loving people supposed to do free consulting work for an organization that wants to take away our freedom?" he asked. SDMI officials were not immediately available for comment.
MP3.com yanks DeCSS sourcecode sung
MP3.com yanks song with illegal DVD-hacking code By Corey Grice Staff Writer, CNET News.com September 13, 2000, 7:25 p.m. PT Joseph Weckers song about a binary computer code wasnt exactly a chart-topper, but he doesnt think MP3.com should have banned it. The popular music Web site today removed the song, in which Wecker, sounding more than a little like a 1960s sit-in protester, sings a version of the banned computer code known as DeCSS. In an email to Wecker, MP3.com cited the nature of the music lyrics for the songs eradication. "Your song has either a song title or lyrics that are offensive or otherwise inappropriate," the company wrote. "Since there is a precedent holding (2600.com) culpable for posting the code, we felt it was in our best interest to remove it," an MP3.com spokesman said in an interview. The Motion Picture Association of America (MPAA) has filed lawsuits seeking to outlaw the code, calling it a hack of its DVD encryption scheme aimed at making and distributing illegal copies of digital films. A federal judge in New York last month agreed, banning hacker publication 2600.com from publishing or linking to the code online. The song, called DeCSS.MP3, offers an English-language rendition of computer code that, depending on whom you ask, is either a harmless exercise in experimental software engineering or a missile aimed at the heart of Hollywood. Either way, DeCSS has become a flash point in the head-on collision between digital technologies and copyright owners, much as Napster has for the music industry. The programmers who wrote the code insist DeCSS was designed to play legally purchased movie DVDs on computers running the Linux operating system--a format not supported by the movie industry. They say the code is a form of speech and is protected by the First Amendment--a claim many DeCSS supporters have rushed to validate by churning out artistic and other nonfunctioning works based on the DeCSS source code. Wecker said he sang the DeCSS code as a way to attract attention to the issue. "Its gone one step too far," Wecker said. "Its illegal to photocopy a copyrighted poem. But now its like it has become illegal to tell someone how the Xerox works." Other protesters have published portions of DeCSS on T-shirts and have recorded dramatic readings of the code. Some have used the code to create images in graphics files. Pro-DeCSS supporters say these demonstrations dont contain the full source code necessary to decode a DVD, a popular digital home movie format. "I find it very disturbing that I live in a country where singing source code may be technically illegal--kind of chilling," Wecker said. "My song is just like the T-shirts. The T-shirts dont even have enough code to decode a DVD." MP3.com, meanwhile, is wrestling with its own copyright troubles. A federal judge last week found that the company willfully infringed the copyrights of Universal Music Group in creating an online database of some 80,000 CDs for use with its My.MP3.com music locker service. The company could be on the hook for hundreds of millions of dollars in damages.
Re: Black Hoes
Misogynist Bigot Choate frothed: At 08:15 AM 23/08/00 -0700, A. Melon (head) wrote: Tim May's brain fart of the day: (Better yet, maybe I should I produce a sequel: "Black Men Can't Think.") Or better yet, you should produce a sequel: "Tim May Has A Small Dick" Idiot, you underscore Tim's point with your own racism. Fuck off. == Ah, a voice from Texass where most guys got *REALLY* small dicks. And it has nothing to do with race. It has to do with manhood and spewers of hatred generally don't have much. Haters of women (bitches, right Choate?) and haters of other races most usually can't get it up. Racistmonger
Re: Superpower Invites Attack
On Tuesday, August 22, 2000, Anonymous wrote: Why do I have this feeling that going through anonymizer guarantees entry into the fedz logs ? ...because it very well may? Why are you using Anonymizer? Why are you posting via toad.com?
CIA courting Silicon Valley
U.S. spy agency's venture capital fund now bankrolling 8 high tech startups August 18, 2000: 3:17 p.m. ET NEW YORK (CNNfn) - It is probably among the last places most entrepreneurs would think of tapping for venture capital funding. Regardless, the Central Intelligence Agency has gotten into the game of providing much- needed seed money for high technology startups. It took a lot of arm-twisting to persuade Congress and some in the intelligence bureaucracy that starting a venture capital fund to keep critical government agencies like the CIA at the forefront of new technology would be a good idea. Yet, that task was accomplished and Congress approved $28 million last year for the project and In-Q-Tel was born. To date, In-Q-Tel, the CIA's venture fund, has reviewed more than 300 business plans and provided seed money for eight high-tech companies. Most of them share a common mission of creating new security technology. Indeed, In-Q-Tel is going to provide money only to companies whose products can in some way benefit U.S. security interests. Gilman Louie, In-Q-Tel's CEO, said in an appearance Friday on CNNfn's Market Call that in addition to computer security he is interested in such things as sensor technology that could help U.S. military and spies detect biological and chemical weapons. In-Q-Tel differs from traditional venture funds in at least one significant way: It is not a money-making operation. The fund has non-profit status and any earnings it makes on its investments will be sent straight to the United States Treasury. A departure for Washington The fund is a real departure for Washington and for the United States' spy agency. Traditionally, technology for government agencies was developed in tightly secured government labs or contracted with private corporations. These days, however, information lags far behind technology, meaning that by the time anyone finds out about it, the next wave is already on the way. In the information explosion of the last decade, the CIA lost a lot of the edge it had in high technology. Wireless gadgets and high-tech products like satellite images and electronic surveillance equipment, now available to the public, including terrorists, were once the exclusive domain of the government. Creating this fund is an experiment to try to put the CIA back in the position of high-tech predominance it held throughout the Cold War. (230K WAV) or (230K AIF) CIA spies have a host of technology needs. In addition to tiny sensors and the most secure computers in the world, the agency has put out the call for stronger Internet search engines, technology that will allow them to surf the Internet in complete secrecy, and software that can translate every language in the world. Former computer game designer leads effort The choice of Louie to run the fund also is a departure for Washington. Louie, 39, is no government wonk. He's a former Silicon Valley techno whiz who earned digital renown when, in his early 20's, he created the flight simulator, Falcon. He later sold his company to Hasbro for $70 million. Most recently, Louie was Hasbro Interactive's chief creative officer and general manager of the Games.com group, which oversees Hasbro's Internet games site. Not only is the pace of technology too fast for government agencies to keep up, Louie said, but it is rapidly becoming too costly to try to develop all the technology to meet government needs alone. Louie described his position at In-Q-Tel as that of a human translator. He explains the government's technology needs to Silicon Valley entrepreneurs in the hope of inspiring them to work with In-Q-Tel. He also hopes to convey to cutting edge firms in Silicon Valley that in many areas, such as information security, the governments needs are very much in line with the needs of corporate America. "The CIA has very advanced needs," he said. "We can really help them get the first mover advantage because a lot of companies have these needs, too." At least two other government agencies, the National Aeronautics and Space Administration and the U.S. Postal Service, are looking at creating similar ventures.Ê Copyright © 2000, CNN America, INC. ALL RIGHTS RESERVED
bbc cell phone tracking story
http://news.bbc.co.uk/hi/english/sci/tech/newsid_874000/874419.stm Video postcards can be sent with 3rd-Generation phones By BBC News Online internet reporter Mark Ward The next generation of mobile phones will make it much easier for the police to carry out covert surveillance of citizens, say civil liberty campaigners. They warn that the combination of location revealing technology built into the phones and rights given to the police under the Regulation of Investigatory Powers Act mean the owners of such phones can be watched. They are advising people that using one of the new phones might make it hard for them to maintain their privacy. In recognition of the implications, phone companies are planning to let people conceal where they are at the touch of a button. Phone metre Although existing GSM handsets can be used as location devices, they typically only give a fix to within a couple of hundred meters. Future phones will direct you to the nearest Indian take away While this is good enough to tell drivers about traffic problems on the roads ahead, mobile phone companies are not using the technology for much more than this. Accuracy can be improved if handsets are fitted with special software and the mobile phone operators adopt complementary software for their networks. Using this technology, handsets can be pinpointed to within 50 metres of their actual position. Newer mobile phone technologies such as the General Packet Radio Services and Universal Mobile Telecommunications Services have more accurate locating systems built in. GPRS services are due to become widely available later this year and UMTS telephone networks are due to be switched on in 2002. Timing triangle Both GPRS and UMTS can locate a handset to within 15 metres by timing how long it takes packets of data to travel from different base stations to the handset. The handset then uses this to calculate where the phone is in the area covered by the base stations. "Service providers are going to do that calculation routinely so they can sell the data to companies that want to send you mail and messages," said Caspar Bowden, director of the Foundation for Information Policy Research. Often people will be happy to reveal their location and who they are, particularly if they are looking for a cash point or a good restaurant in a town they are visiting. Many companies are keen to use this location data so they can send special offers, such as cut-price cinema tickets, to anyone walking past their doors. Others are planning to combine location data and personal information to target people with adverts customised to match their preferences. Privacy protection But, said Mr Bowden, the newly passed Regulation of Investigatory Powers Act could allow for the data to be used for a more sinister purpose. He said the RIP Act regards the information used to locate phones as "communications data" and says police do not need a warrant to obtain it. As a result, he said, the police could use this information to conduct covert surveillance of anyone using such a phone. Phone companies are planning to let people opt in and out of the location-based services to ensure privacy is not compromised and people are not bombarded with messages they do not want to read. "It has always been our aim to enable the customer to decide whether or not to have his or her location sent to the network," said a spokesman for mobile service provider Orange. But all this means is that the information is not being passed on to advertisers, said Mr Bowden. "Whether or not you want to receive ads, the location data will be collected," he said.
Re: Christianity vs. the 2nd ammendment
Marcel Popescu wrote: In light of the above it is interesting and instructive to note the thoughts of the German philosopher Friedrich Nietzche in his work Beyond Good and Evil: The name is Nietzsche. By the way, how did you like Zarathustra? I found the "God is dead" part quite impressive.