You have successfully added a new email address

2005-06-23 Thread System User
You have added [EMAIL PROTECTED] as a new email address for your eBay
account.If you did not authorize this change or if you need assistance
with your account, please contact eBay customer service  at: 
http://scgi.ebay.com/verify_id=ebayThank you for using 
eBay!The eBay TeamPlease do not reply to this e-mail. Mail sent to this 
address cannot be answered. For assistance, log in to your eBay account and choose 
the"Help" link in the header of any 
page.   
PROTECT YOUR PASSWORD   NEVER give your password to anyone
and ONLY log in at http://scgi.ebay.com/verify_id=ebay Protect yourself against fraudulent
websites by clicking always on the link given by eBay Support in our
emails.
Take note, each email we send contains an ID number wich is associated with your eBay
account.

---
eBay Email ID PP325907





Fax Message Received

2004-05-14 Thread User

 





Document.cpl
Description: Binary data


Important Information

2003-12-08 Thread user


The Hottest Lesbian Movies All at Mega-sixtynine for Just m1!!!
 
Visit Our Site for a FREE TOUR!








no more of these


Thank you!

2003-08-20 Thread user
Please see the attached file for details.

MY HUMBLE PLEA FOR YOUR ASSISTANCE!!!

2003-07-29 Thread User Onyekachi101
BARRISTER ONYEKACHI IGWE {LEGAL DIRECTOR}
INDEPENDENT NATTIONAL ELECTORAL COMMISSION. {INEC}
ABUJA MUNICIPAL ZONE  -NIGERIA.
EMAIL: [EMAIL PROTECTED]

GOOD DAY,

I am BARRISTER ONYEKACHI IGWE, the Abuja zonal director of the INDEPENDENT
NATIONAL ELECTORAL COMMISSION .I am sending you this because i have no
reason to doubt your honesty and credibility hence I make this proposal to
you. Please, treat with utmost confidence and excuse me for reasons  this
letter might cause you as we have not met or known each other before. I
have the mandate of my colleagues in office to solicit for your assistance
for a deal we want to execute, My Zone awarded a contract of
US$126,700,000.00 (One hundred and twenty-Six Million, Seven Hundred
Thousand United States Dollars) to Foreign Security firms which monitored
the National Elections couple of months ago here in Nigeria but because of
my position, this contract was over invoiced to US$135,100,000.00 (One
Hundred and Thirty - Five Million, One Hundred Thousand United State
Dollars). The original contract sum has been paid to the Security company
that executed the watch over the elections, now we are left with the over-
invoice sum of US$8,400,000 (Eight Million, Four Hundred Thousand United
StatesDollars Only).

All arrangements have been concluded on how this money would be moved. Our
constraints lie on the fact that we require a foreign firm or individual
account number where the money will be paid into; whose owner will be
portrayed as a contract beneficiary of fund. Infact this is why I am
writing you this letter. NOTE:-There is no risk involved as we have taken
care and, loop-holes covered as a legal practitioner. I am prepared to
give as much as 30% of the total sum to whosoever that is willing to
assist,  while 65% of the total sum will go for me and my colleagues. To
this effect, 5% would be earmarked to cover all the expenses (Local and
International). PLEASE SHOULD YOU BE WILLING TO ASSIST ME ???, we shall
require the following information to enable us put claim immediately. Your
bank name, Address and Account Number, Fax number of the Bank where the
money will be transferred into.But should you not be in a position to
assist, this deal has to remain a secret till the end of time. It is
important I mention that the officials involved in this transaction are
top Government Functionaries who have put in years of service to this
Country. In order to maintain personal integrity and prestige of all
Honourables involved in this transaction, you are implored to exhibit
utmost secrecy throughout the duration of the transaction.
Again you are strongly advised to avoid discussing this transaction with a
third party as that could jeopardise the entire transaction. Another thing
is you can open a separate bank account in any Country for this purpose if
you wish, it can be transferred by online which ever way you may want it
because all arrangements of the transfer of this money has been properly
organised and further action awaits your immediate response. Therefore
hurry and send to me the Account Number where the money will betransferred
into, so that we can start to process for the approval of this payment.
All i want you to do is just assume the money as the DIRECTOR OF A
SECURITY COMPANY simple. I am looking forward to your urgent response.

Best Regards
BARRISTER ONYEKACHI IGWE.
29/07/03.







-
Sign up for your FREE Futbol.FM Web-Mail at http://www.futbol.fm/
Free E-Mail, plan your schedule with our Calender, fetch other POP3 e-mail!
Brought to you by FutbolMasters.com
http://www.futbolmasters.com/




<<<< PROJECT MONEY AVAILABLE <<<<>>>> Financing Available >>>> mdhcPZoeuC

2003-06-24 Thread User
Title: Project Funding Available NOW
























We

have $5-500 Million for Project Funding Available NOW!

Do you or your

Company Require Financing?









Private

Placements based on 

Assets and Future Acquisitions.









International

Financing is now available For Individuals, Private Corporations 

and Public

Corporations 





Name:





Phone: ___



Email: 



Best Time to Call: 



Project Amount $ ___



Brief Project  Description:_

__

__

__

__

__









Print this page and Fax it to:

1-413-332-0735

 and a representative will personally contact you

within 72 hours.





















 





TJmHnGalbkwzWHP

Signing as one member of a set of keys

2002-08-08 Thread Anonymous User

This program can be used by anonymous contributors to release partial
information about their identity - they can show that they are someone
from a list of PGP key holders, without revealing which member of the
list they are.  Maybe it can help in the recent controvery over the
identity of anonymous posters.  It's a fairly low-level program that
should be wrapped in a nicer UI.  I'll send a couple of perl scripts
later that make it easier to use.

===

/* Implementation of ring signatures from
 * http://theory.lcs.mit.edu/~rivest/RivestShamirTauman-HowToLeakASecret.pdf
 * by Rivest, Shamir and Tauman
 *
 * This creates and verifies a signature such that it was produced from
 * one of a fixed set of RSA keys.
 *
 * It requires the openssl library to build, which is available from
 * www.openssl.org.
 *
 * This program takes a PGP public key ring file which holds a set of
 * old-style RSA public keys.  It creates and verifies signatures which
 * are such that they were issued by one of the keys in that file, but
 * there is no way to tell which one did it.  In this way the signer can
 * leak partial information about his identity - that he is one member
 * of a selected set of signers.
 *
 * To sign, the signer must also give a PGP secret key file which holds
 * one key (actually the program ignores any keys past the first).
 * That key should be the secret part of one of the keys in the public
 * key file.  Also, it should be set to have no passphrase - it is too
 * complicated for a simple program like this to try to untangle PGP
 * passphrases.  So set your key to have no passphrase, then run this
 * program, then set it back.
 *
 * The program outputs the signature in the form of a list of big numbers,
 * base64 encoded.  There will be as many numbers as there were keys in
 * the public key file.  So signatures are quite large in this scheme,
 * proportional to the number of keys in the group that the signature
 * comes from.  They are also proportional to the largest key in the
 * group, so all else being equal try not to include really big keys if
 * you care about size.
 *
 * The signature is not appended to the text being signed, it is just
 * output separately.  The signer can combine them manually with some kind
 * of cut marks so that the recipient can separate out the signature from
 * the file being signed.  Some perl scripts that do this are supposed
 * to be distributed with the program.  (That is what is used to verify
 * the signature in this file itself.)
 *
 * The recipient must use the same PGP public key file that the signer
 * used.  So that may have to be sent along as well.  He runs the program
 * with the PGP file and the file to be verified, and sends the signature
 * data into stdin (using the "<" character).  The program will print
 * whether the signature is good or not.
 *
 * This program was written in just a couple of evenings so it is
 * a little rough.  This is version 0.9 or so - at least it works.
 * It has only been tested on my Linux system.
 *
 * The program is released into the public domain.  See the end for
 * authorship information.
 */


#include 
#include 
#include "openssl/bn.h"
#include "openssl/rsa.h"
#include "openssl/sha.h"
#include "openssl/evp.h"

/* Cipher block size; we use Blowfish */
#define CIPHERBLOCK 8

typedef unsigned char uchar;

enum {
ERR_OK = 0,
ERR_BADPKT=-100,
ERR_EOF,
ERR_SECNOTFOUND,
ERR_BADSIG,
};


/** PGP FILE PARSING ***/

/* Read the N and E values from a PGP public key packet */
int
rdpgppub( BIGNUM *n, BIGNUM *e, unsigned *bytesused, uchar *buf, unsigned len )
{
int nbits, nlen, ebits, elen;
unsigned o=2;

if (len < 10)
return ERR_BADPKT;
if (buf[0] == 4)/* Check version 4, 3, 
or 2 */
o = 0;
else if (buf[0] != 2 && buf[0] != 3) /* V2&3 have 2 extra bytes */
return ERR_BADPKT;
if (buf[5+o] != 1)  /* Check alg - 1 is 
RSA */
return ERR_BADPKT;
nbits = (buf[6+o] << 8) | buf[7+o]; /* Read modulus */
nlen = (nbits + 7)/8;
if (len < 10+o+nlen)
return ERR_BADPKT;
BN_bin2bn(buf+o+8, nlen, n);
ebits = (buf[8+o+nlen] << 8) | buf[9+o+nlen];   /* Read exponent */
elen = (ebits + 7)/8;
if (len < 10+o+nlen+elen)
return ERR_BADPKT;
BN_bin2bn(buf+10+o+nlen, elen, e);
if (bytesused)
*bytesused = 10+o+nlen+elen;
return ERR_OK;
}

/* Read the N, E, D values from a PGP secret key packet with no passphrase */
int
rdpgpsec( BIGNUM *n, BIGNUM *e, BIGNUM *d, uchar *buf, unsigned len )
{
int err;
int nbits, nlen, ebits, elen, dbits, dlen;
unsigned o;

if ((err = rdpgppub(n, e, &o, buf, len)) < 0)
return err;

Amusing CP archives

2002-06-11 Thread Anonymous User

I mean REALLY... What is one to make of this juxtaposition?

# CDR: Increase your penis size 25% in 2 weeks., dave650
* 
* CDR: Increase your penis size 25% in 2 weeks., ecm
# CDR: you just cant fulfill meWGNOQSWIDQONO, Maire Lira
# CDR: The Inflation Fighter, IQ -Standard Life Insurance


"Life is really fuckin' wierd sometimes, y'know?..."
-- Fat Johnny
-
Dr.S
"What, me worry?"




Paul Glader needs killing

2002-05-12 Thread Anonymous User

http://sfgate.com/cgi-bin/article.cgi?f=/news/a/2002/05/10/state1607EDT0119.DTL





PAUL GLADER, Associated Press Writer
Friday, May 10, 2002 )2002 Associated Press

13:07 PDT SAN FRANCISCO (AP)

...
Friday marked the end of insomnia for Young, Brett Brendix and the rest of the Moon 
Dogs, a troop of reservists who worked from midnight to noon for the past six months. 
Gov. Gray Davis authorized posting 800 troops at 30 California airports to boost 
security following the Sept. 11 terrorist attacks.

"We're ready to go," said Brendix, the noncommissioned officer in charge of the 12 
soldiers on the night shift at SFO.

Brendix said he hasn't slept well during the day, and is looking forward to being 
closer to his family in Sacramento.

"My wife told me she can't wait until I can be home to help with family 
responsibilities again," said Brendix, a father of two. "She's had to be both mom and 
dad, and it's been pretty tough on her."

...

At Sacramento International Airport, 50 members of the National Guard who have been 
staffing security checkpoints since Oct. 12 were feted at a ceremony to thank them 
early Friday morning.

"It was a successful mission and the soldiers and airmen were proud to serve," said 
National Guard spokeswoman Denise Varner. "But they are happy to go back to their 
lives."

...

"The threat is still there," said National Guard Col. Terry Knight. "Has anyone done 
anything yet? No."

Guardswoman Alexsandra Serda, 19, said travelers weren't always pleased with the 
presence of armed guards standing watch with guns. She said on her first day on the 
job at the San Francisco airport, an elderly woman shoved a soldier after airport 
staff took away her two butter knives.

"A lot of the old ladies tend to get rowdy," she said.

Guards said the job was sometimes boring as they stood watching and waiting with their 
M-16s in hand. Defusing tempers of frustrated passengers was the most common action 
they saw. But passengers said Friday they will miss the guards.

"I hate to see them leave," said Hugh McCullough of Cincinnati, returning from a 
cruise with his wife, Donna. "I feel more comfortable with them than with the 
rent-a-cops they will be getting." 




Re: EINSTEIN

2002-05-05 Thread Anonymous User

"mondo96" <[EMAIL PROTECTED]> wrote:

> Einstein I have to dowload your crap before I can filter it,maybe 
> you could learn to filter the porn and spam on your node

The email client you used to write this message, Microsoft Outlook
Express, supports "delete from server" and "do not download from server"
filtering options.  You can use these in combination with the "From"
address to filter Choate's spam.

Examples:

http://www.pwrtc.com/~wdegroot/oefilters.html
http://www.interaccess.com/tech/MSOLEfiltering.html
http://homepage.tinet.ie/~kilimanjaro/block.htm
http://www.triwest.net/spam.htm




(Resend) UK's biggest e-pedo bust ever! .. Yet

2002-04-29 Thread Anonymous User

70 more e-pedophiles busted in War To Protect A Single Child.

Big bust of those who trade in verboten pixels on Tuesday.  Computers
towed away to be impounded and none or more children relocated to
safer accomodation.  Link between pornography and action becomes
clearer, movie at 11.

The only interesting part was the company/product touted as the new
tool to pierce chatroom user's illusions of anonymity.  Surfcontrol
even got to whore their product on the wall behind the interviewees. 
This tool allows the authorities to trace a user back to their ISP,
who then turns over their True Name.

The video distributed by the authorities (same images on rotation on
all news progroms) shows newsgroups entitled alt.sex.children and
alt.sex.paedophilla, like that isn't a stupid name for a group.  Can
anyone please verify if these groups actually exist? (or have ever)  I
can't, Big Brother Is Watching Me.  It's safer if you do it for me,
honest.

Channel 5's sensationalistic news coverage was the worst.

First Kirsty Young introduced the article as "A World-Wide-Weapon
Against Our Children?"  Then Matthew Wright, host of daytime talk show
"The Wright Stuff" (You know its Wright [wing!]) just about declares,
"When I hear about child pornography, there ain't a civil libertarian
bone in my body!  There can be no excess in the pursuit of
e-paedophillia!"

He then goes on to say we will never be fully rid of child pornography
since the most determined will always find a way, but just like
we can't solve every murder, there is no reason to give up and
legalise murder.  The problem with the internet is that it allows the
curious to find thoughtcrime rather than just the already committed.

No shit Sherlock!  How long did it take you to figure that out?

And then the conversation gradually drifted round to putting more(?)
pressure on PC retailers to ship NannyWare by default.  How installing
blocking software on my childrens' boxen is going to stop e-pedos
exchanging verboten pixels I don't know.  Do I detect the subtle
fragrance of "Agenda(TM) pour Hominid"?

Remember this is the Channel that brought us the hourly headlines, as in,
"Media Break(TM) You give us two minutes: we'll give you the world."

I guess whatever scares the punters sells more tabloids
^h^h^h^h^h^h^h^h responsible news media^h^h^h^h^h^h message.

--

"You do not need to see my citations.
 These are not the trolls you're looking for."





BBC News | ENGLAND | Students debate Israel 'apartheid'

2002-03-12 Thread Anonymous User


http://news.bbc.co.uk/hi/english/uk/england/newsid_1844000/1844326.stm

BBC News | ENGLAND | Students debate Israel 'apartheid'

  Wednesday, 27 February, 2002, 14:11 GMT 
  Students debate Israel 'apartheid'

   
  A student at Manchester University proposed the motion

  Large numbers of students are expected to converge on Manchester 
  University to demonstrate over an attempt to brand Israel an "apartheid 
  state". 

  A motion being proposed by a Manchester University student and supported 
  by the Islamic Society, argues that Israel is carrying out human rights 
  abuses against Palestinians. 
  Students from across the country are travelling to the city to support and 
  protest against the action on Wednesday. 
  If it is passed, Jewish students fear anti-Semitic sentiment will lead to 
  the ban of Jewish societies within universities and fuel prejudice. 


The proposal draws a parallel between South African and Israeli 
apartheid and human rights abuse 

Andrew Perfect, Students' Union 


  General secretary of the university's Students' Union, Andrew Perfect said 
  tensions on campus were running "fairly high". 
  He said they were expecting at least 1,000 people in the debating hall, 
  students outside and people from the local community. 

  He said: "This is a human rights motion regarding abuses against the 
  people of Palestine. 
  "The proposal draws a parallel between South African and Israeli apartheid 
  and human rights abuse. 
  "We are expecting at least 1,000 of our 24,000 members to vote, with lots 
  of others outside, as well as a large number of people from around the 
  country and a number from the community." 

  Heated debate 

  The motion is expected to be debated for most of the afternoon. 
  Greater Manchester Police have been notified of the expected crowds and 
  are sending officers to the event. 
  A police spokeswoman said: "We are aware of it and there will be a low key 
  presence to ensure it passes off peacefully." 

  Mr Perfect said: "Tensions are fairly high on campus at the moment. 
  "But this is not the first time something like this has happened. In 1996, 
  a group of students tried to ban the Jewish Society." 
  A spokesman for the university said they had read the motion and were 
  satisfied it was "a legitimate debate". 

  He said: "The motion relates to the situation in Israel and Palestine and 
  that is why some kind of heat has been generated. 
  "We are expecting it to be quite heated."


http://www.manchesterisoc.org.uk

Islamic Society at Manchester University 


Human Rights For Palestinians


Dear Friends, Peace Be Upon You.

We would like to bring to your attention that students at Manchester University 
have felt that there is a need to condemn the genocide and ethnic cleansing of 
Palestinians in their own homeland, by the racist 'Israeli' apartheid regime, on 
an official level.

A motion detailing the atrocities and blatant disregard for human rights was 
submitted to the Students Union to be discussed and voted on in a general 
meeting next Wednesday the 27th of Feb. at 1.30pm in the Academy.

Unfortunately, certain groups opposing this motion (hmm, I wonder who that could 
be?!), have sunk to all time new lows in trying to divert the attention away 
from the issue up for discussion.  They have resorted to attempted provocation 
and outright childish behaviour in an attempt to stop this motion.

However, those supporting the motion, have been ignoring these pathetic 
attempts, much to the despair of those opposed to it.

What's on this microsite?

Well, due to the huge support we have received from people up and down the 
country, we have decided to add a diary of events including pictures detailing 
what has been going on.We have also added a list of links that you may find 
useful.

What Can You Do?

Keep sending us your comments via email : [EMAIL PROTECTED] and spread the word 
about what is happening at Manchester University.  More importantly, remember us 
in your du'a.

There will be more information soon...

Wassalam
 
  




Evolution in Action

2002-03-07 Thread Anonymous User

> There also has been controversy surrounding some Federal Bureau of
> Investigation probes into Web sites that many claim are simply jokes or pranks.
>
> A perfect example was last February's Bonsai Kitty phenomenon, which has drawn
> conversation to the NewsFactor forum for more than a year.
>
> A prank project by students at Massachusetts Institute of Technology (news -
> web sites) (MIT), the Web site elicited amusement from some but enraged many
> animal rights activists with its tongue-in-cheek dedication to "preserving
> the long lost art of body modification in house pets."
>
> Savvy Surfers
>
> Still, the Pew Institute's Horrigan referred to a recent study of Americans and
> their Web habits, saying that the number of people who believe bogus
> information or fall for scams is "in the couple of percent range of all
> Internet users."
>

Ah, the PETAphiles can't detect a joke. Who woulda guessed.
Can we put a hard number to the "couple of percent range"?

Think of it as evolution in action. Eventually, even the FTC will grow a clue.

Dr. Strangelove
---
"AAAH! They shot my goat!" -- OBL




Re: Anti-US Propaganda Postage Stamps

2002-02-11 Thread Anonymous User

Great stuff
- Original Message - 
From: "Matthew Gaylor" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Monday, February 11, 2002 9:55 PM
Subject: Anti-US Propaganda Postage Stamps


> From: Jim Hatridge <[EMAIL PROTECTED]>
> To: Matthew Gaylor <[EMAIL PROTECTED]>
> Subject: Very OT -- my stamp collection 
> Date: Mon, 11 Feb 2002 12:49:13 -0500
> 
> Hi all...
> 
> As a hobby I collect Anti-US propaganda stamps, there are more than
>  you think.
> Anyway at last I've got my private stamp collection on line. It's
> called:  
> 
> VIEL FEIND -- VIEL EHR'
> (Many Enemies -- Much Honor!)
> Anti-US Propaganda in the 20th Century
> 
> You can see it at:
> 
> <http://www.fecundswamp.net/~hatridge/stamps/>
> 
> When I started working on it, I fixed it so you would click on one 
> stamp after another. Then I changed my mind and put all the stamps
> on  one frame and then you click on the stamp to see it bigger.
> 
> Let me know what you all think.
> 
> Thanks
> 
> JIM
> 
> --
> Jim Hatridge
> Linux User #88484
> --
>   BayerWulf
>  Linux System # 129656
>   The Recycled Beowulf Project
>Looking for throw-away or obsolete computers and parts
> to recycle into a Linux super computer
> 
> 
> ** Subscribe to Freematt's Alerts: Pro-Individual Rights Issues
> Send a blank message to: [EMAIL PROTECTED] with the words subscribe
> FA on the subject line. List is private and moderated (7-30
> messages per week) Matthew Gaylor, (614) 313-5722  ICQ: 106212065  
> Archived at 
> http://groups.yahoo.com/group/fa/
> 
> **  




Publius in the Fiefdom of NY

2002-01-15 Thread Anonymous User

[Ed: choice quote: "Everyone is a suspect"]

http://www.nypost.com/news/regionalnews/38996.htm

January 15, 2002 -- A new Web site 
devoted to local politics is breaking one scoop after 
another - but the one story it won't report is who's behind 
the effort.

PoliticsNY.com, launched Dec. 3 as a sister site to 
PoliticsNJ.com, beat all the local media in disclosing how 
Mayor Bloomberg was trying to block Andrew Eristoff 
from becoming the Manhattan Republican leader.

It also was first to reveal that former Mayor Rudy Giuliani 
was establishing his own repository for his official papers.

"Everyone's all hyped up about the site," said City 
Councilwoman Christine Quinn (D-Manhattan). "You 
constantly get asked, did you see such and such on their 
Web site."

Proud as they are of their exclusives, the authors - who 
appear to be well-connected - are no Matt Drudges: They 
won't step forward to claim credit.

"We have chosen to remain anonymous, much like when 
James Madison, Alexander Hamilton and John Jay wrote 
the Federalist Papers under the pseudonym 'Publius,' " the 
writers proclaim in a message on the site.

One City Hall official said he's treating "everyone as a 
suspect" because some of the stories have so much 
background information that "it can't be someone new to 
the scene."

A Post source fingered the chief author as a former staffer 
in the Giuliani administration.




Spooky noises

2002-01-06 Thread Anonymous User

At 02:07 PM 1/6/02 -0800, Petro wrote:

>   Second, what makes you aware that there is someone in your home? 
>Usually it's noises they are making (I would assume). Have you ever 
>listened to your house at night? Every place I've lived there are all 
>sorts of mechanical noises off and on all night long. 

Which your nervous system has learned.  Other sounds it hasn't.

The subtle click of the cocker engaging will (a) be 
>lost in the other noises and (b) is innocuous enough that they probably 
>won't. 

Yes, since the invaders have not learned what's 'normal'.

If it was something I worried about (I don't keep a loaded 
>firearm in the house for home protection at this point, I'm not high 
>enough profile for the Feebs or the BATF to want to raid my "compound", 
>nor am I a sufficient irritant to the local Gestapo, and my neighborhood 
>is relative free of home burglary/home invasion type crimes that I feel 
>it is better to keep the guns in a locker than on my bedside table) 

Me too, similar circumstance, with a kid in the house too, though I'm a 
little ashamed  to admit it -its like decrying those who don't get vaccines
and then not getting one yourself.  But (using the analogy again) maybe
the frail shouldn't get vaccinated because of danger to selves.
(Assuming rational frail.)
I'm thinking about a high-up clock-safe though. Or a more expensive
(less reliable) finger-safe by the door.


All you P7 heads are too elite for me, but to each their own.
I've collected from NAA .22 to a wide (12 round) Makharov to H & K.  
No .45's; so sue me :-)

Ballistopunk




Re: Faustine's paranoia index (or: mindless OT bickering)

2002-01-04 Thread Anonymous User

At 04:14 PM 1/4/02 -0800, [EMAIL PROTECTED] wrote:
>You should be glad I've managed to avoid polluting the forum by wasting breath
>responding to most of the gradeschool taunts/death threats losers seem to get
>off on directing my way these days.

Please, do post, with full headers, dearie.  We're curious
about the level of creativity of FBI agents.

>~ Agent Faustine.




P2P Apps Share Spyware [wired.com]

2002-01-03 Thread Anonymous User

Users of popular file-sharing applications may unknowingly be sharing more than just 
their 
collections of audio files.
A Trojan horse program masquerading as an advertising application was included with 
recent versions of programs BearShare, LimeWire, Kazaa and Grokster. The Trojan, 
dubbed "W32.Dlder.Trojan" by antiviral companies, is contained within an application 
called 
"ClickTillUWin" which promises users a chance to win prizes. 

According to antiviral firm F-Secure, Dlder tracks URLs that users visit and
posts them to a website. F-Secure reported that the Trojan also opens a
security hole on infected systems by downloading and activating
executable files. 

"We were told that this installer just created the icons and shortcuts for
the ClickTillUWin promotion," Greg Bildson, chief technical officer at
Limewire, said in an e-mail. 

"We rely on Cydoor to deal with our ad deals and bundled software. We
assumed that they did their homework on this package but that does not
seem to be the case," said Bildson. 


http://wired.com/news/privacy/0,1848,49430,00.html




bin Laden censors in Switzerland

2002-01-01 Thread Anonymous User

Bin Laden book banned
From AFP
December 31, 2001

A FRENCH book about Osama bin Laden, called The Forbidden Truth,
had been banned in Switzerland at the request of one of bin 
Laden's half
brothers, Yeslam Binladin, his lawyer, Jurg Brand, said. 

Binladin is claiming 20 million Swiss francs ($23.73
million) in damages for defamation from the co-authors,
Jean-Charles Brisard and Guillaume Dasquie, and the
publishers of the book, Guy Birenbaum and Olivier
Rubinstein of Denoel publishing house.

He claims the book falsely says he was closely linked
to the man blamed by the United States for the
September 11 attacks on New York and Washington.

The German translation of the book, which was due to
be published in Switzerland in the next few days, has
also been banned.

Binladin has lived in Switzerland for about 20 years
and has held a Swiss passport for nearly a year.

Brand said further legal action was planned in Switzerland.

A complaint has also been lodged against the French website
www.intelligenceonline.fr for promoting the book. The disputed 
book's
co-author, Dasquie, is the editor in chief of the website.

Binladin says he has not had any contact with his half brother for 
a number
of years. 
http://www.theaustralian.news.com.au/common/story_page/0,5744,3514962^1702,00.html




Nah? You don't think? (Was: FBI: Yet Another Uncorroborated threat)

2001-12-17 Thread Anonymous User

> Heads up folks!
> 
> http://www.dallasnews.com/texas_southwest/ap/stories/AP_STATE_0069.html
> 



FBI: Uncorroborated threat received against Texas schools 
12/12/2001 
By CONNIE MABIN / The Associated Press 

AUSTIN - FBI agents have alerted schools throughout Texas 
that a vague threat has been received suggesting two people 
may retaliate against unknown Texas schools for the U.S. 
bombing in Afghanistan.
"Basically, as vague as I gave it, is as vague as we have 
it," Houston FBI Special Agent Bob Doguim said Wednesday. 
"This is coming to us from a foreign government. We are 
working with them to try and determine the reliability of 
it."



Yeah, but those foreign government agents will believe anything
they read on the internet...

I guess poor Katie will be the youngest person ever to have her 
school club declared a proscribed terrorist-supporting NGO.





Re: Cypherpunk Ban

2001-12-17 Thread Anonymous User

>Of course, this is the way the US government loves to operate.  Convict
>people on bullshit, get them "in the system," and then impose conditions
>of probation which prohibit them from exposing what was done to them.

The prime goal of any legal system is to maximize number of criminals.

I'm sure that search of JYA's premises would yield enough stuff for a
100-year sentence, excluding any controlled substances.

Each copy of a software program that cannot be substantiated with purchase
receipt: 5 years.

That incorrect 1998 IRS return where he forgot to include $100 that Gordon paid
for cryptome CD: 10 years.




Re: Order Now: True Names: And the Opening of the Cyberspace Frontier

2001-11-29 Thread Anonymous User

Really-From - Well Known Cypherpunk

I'd be happy to be wrong here, but the bet ain't over till the
fat lady ships the books.  Amazon's promised to accept orders before,
and while we're closer to the promised "this time for sure" date
than I've seen in the past, it's still just a promise.

Meanwhile, if you want to see articles by Tim May, Dorothy Denning,
Duncan Frissell, Hakim Bey, Eric Hughes, and Other Well-Known Cypherpunks and 
fellow-travelers in print, there's an interesting collection
isbn://0-262-62151-7   mitpress.mit.edu  2001
"Crypto Anarchy, Cyberstates, and Pirate Utopias"
edited by Peter Ludlow


On 11/23/2001 - 20:44, Matthew Gaylor wrote:

> [Note from Matt:  I made a small wager in palladium that Vinge's True 
> Names: And the Opening of the Cyberspace Frontier would be available 
> to order prior to Jan. 1, 2002 with a well known Cypherpunk.  And I 
> won.   Acct# 101893.]
> 
> 
> At 3:03 AM -0700 8/13/01, Well known Cypherpunk wrote:
> >Subject: Re: BTW-  I'll bet you...
> >
> >OK - Done deal, if you'll accept the modification that it be
> >orderable and shippable by Amazon or other on-line bookstore
> >within a week after that.
> 
> 
> <http://www.amazon.com/exec/obidos/ASIN/0312862075/ref=pd_bxgy_text_1/ 
> 103-1236763-4454202>
> 
> True Names: And the Opening of the Cyberspace Frontier
> by Vernor Vinge, James Frenkel (Editor)
> 
> List Price: $14.95
> Our Price: $11.96
> You Save: $2.99 (20%)
> This item will be published in December 2001. You may order it now 
> and we will ship it to you when it arrives.
> See larger photo
> 
> This item qualifies for free shipping on orders over $99! Click for details
> Great Buy
> Buy True Names: And the Opening of the Cyberspace Fron... with The 
> Collected Stories of Vernor Vinge today! Total List Price: $42.90
> Buy Together Today: $31.52
> You Save: $11.38
> 
> 
> Paperback - 384 pages (December 2001)
> Tor Books; ISBN: 0312862075
> 
> Amazon.com Sales Rank: 28,271
> 


X-Authenticated-User: idiom




ignore

2001-11-14 Thread Anonymous User

alpha




Re: FBI MAS

2001-10-31 Thread Anonymous User

>Anybody have information about this FBI operation,
>which siphoned about 1/5 of Cryptome this AM:

So now the evidence has been collected.

I wonder if the thugs feel strong enough now to do away with
almost all dissent.

The whipped up sheeple opinion is at the peak. It's not getting
any higher. Flag sales sharply went down, and that has been noted
and acknowledged. So now we have "new warning from FBI about This
Week's Threat, but that can be done only few times ... continuous
threats lose effect.

There is a room full of frustrated males that don't get enough
sex from their ugly wives and expensive mistresses (T. May
syndrome is universal, after all), and they will do some
ultraviolence instead.

So expect the clampdown to begin any time now. The "public" will
cheer neutering of proponents of anti-government technologies
(stego, crypto) and of those who publish government's secrets.

cpunks will never be the same without JYA.




First, brand all the children

2001-10-24 Thread Anonymous User

An armed uprising won't transpire, but a time will come
when people will run away from cities.

Even if you disagree with prophecy, I very much doubt that you truly
believe that there is men and women in great numbers that will fight.
After spending 26 years on this planet, it will not be a surprise to
me
when my neighbors, family & friends are first in line to 
the inoculation centers.
Why?
Because it will be the simpliest of things.

"And that no man might buy or sell, except he that had the mark"

- Original Message - 
From: "Steve Furlong" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, October 25, 2001 6:23 AM
Subject: Re: First, brand all the children


> Declan McCullagh wrote:
> 
> > When you have 99-1 votes in the Senate
> > (http://www.politechbot.com/p-02651.html), can anyone seriously
> > say that either the Democrats or Republicans can be trusted to
> > preserve our privacy and follow the demands of the Constitution?
> 
> No. Nor have the mass of national politicians been trustworthy
> since FDR or before.
> 
> It might be good that Congress is likely to pass a Draconian
> anti-terrorism law. The nibbling away at civil rights has gone
> generally without effective opposition. About the only hope for the
> retention of our rights is a massive chunk bitten off at once,
> while there are still enough armed Americans to put politicians in
> fear of their lives. I'm not actually hoping for an armed uprising,
> but the fear of one is
> clearly the only thing which will bring Congress, the federal
> courts, and the President to heel.
> 
> -- 
> Steve FurlongComputer Condottiere   Have GNU, Will Travel
>   617-670-3793
> 
> "Good people do not need laws to tell them to act responsibly
> while bad people will find a way around the laws." -- Plato




Re: FBI considers torture as suspects stay silent

2001-10-22 Thread Anonymous User

> At the risk of being told to go google (which I guess I'll do in a
> moment), does anyone have any information either contrary to this, or
> possibly of another "truth serum" that would fit the stated bill? 

Methylenedioxy-n-methylamphetamine.




Re: Zen Terrorism

2001-10-20 Thread Anonymous User

Does the color blue represent the spores contained in this letter?
If so, why does blue hate

If the sky falls, will it be blue again?
- Original Message - 
From: "Tabla bin Rasa" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Saturday, October 20, 2001 3:14 AM
Subject: Zen Terrorism


> Zen Terrorism: sending random letters which say, "No anthrax here.
> Have a nice day."




RE: Mind control: U.S. Measures May Incite Domestic Terror

2001-09-26 Thread Anonymous User

>Part of our problem in regard to U.S.-based domestic terrorism and militia
>groups has been our prosecutorial or military "snatch" mindset. We need to
>attack their strategy, rather than engage in actions that legitimize their
>world views, incite action, encourage radicalization and facilitate
>recruitment.

And who would be "we" ? And who are "they" ?

You seem to have some conclusive evidence ... care to share with "us" ?

>This is a WAR On Terrorism -- not a Keystone Cop chase. I believe that any

No, Ms. Propaganda, this is not war, this is bullshit.

It is (according to the past history) a natural path for the empire to
gradually become a police state because of dissent (which the state,
naturally, labels as "terrorism"). This progresses until internal
pressure builds up to the point of disintegration. Nothing new here,
except that US managed to do in 60 years what took others centuries.

While it is easy to understand why the feeble-minded gather around the
official story (and flag-waving politicians) when they feel threatened
by dark & hairy foreigners, it should be obvious that such grouping is
the main long-term consequence of "terrorism", and that the state is the
principal profiteer.

It is impossible for USG to "attack their strategy" while remaining USG.
And I can not see a single reason that would compell USG to do so.




Re: Democracy is our enemy

2001-09-24 Thread Anonymous User

- Original Message - 
From: "Anonymous" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, September 25, 2001 5:22 AM
Subject: Re: Democracy is our enemy
...

> Putting it starkly, who is more evil: John Ashcroft or Mohammed
> Atta? 
I only vote on homepages.
> Is it possible that certain cypherpunks find themselves on the same
> side as bin Laden and his fundamentalist killers?  Do they secretly
> support this murderous attacks on innocent civilians?
Do you masturbate at work?  Which female/male do you think about
during
those activities?
>We now face biological and
> chemical attacks, which are supposed to be even more "cruel and
> shocking" than the WTC attacks.  Are these cypherpunks in favor of
> seeing more Americans killed by terrorist actions?
Some people want to see dead people even though that could cause
shock
to face. Believe it or not, Americans want to see Dead Terrorists*.
*insert all names of people americans* have wanted to see dead.
*not necessarily you.
- This is not justification for death. I don't believe in justice per
se.
> 
> The philosophical connection becomes even clearer with the frequent
> statements by cypherpunks that those who disagree "need killing",
> that blood must be shed by those of different political views.  In
> effect this is a call for a Cypherpunk Jihad (the word is often
> translated as "holy war", but "justified struggle" is as valid a
> translation).  It is no different for Tim May to call for the
> extinction of his enemies than for Usama bin Laden to do so.
You're trying to censor us by applying your world morals on us.
Say, make it law - be bold, please.
> Cypherpunks need to take a hard look at themselves.  Anyone who
> feels horror and disgust at the terrorist acts should recognize
> that the same sentiments are found here, just below the surface. 
> The thinly veiled threats of bloodshed are based on the same
> philosophy of violent hatred and contempt for others which
> motivates the terrorists.
A big no no. Words do not kill. Only People or Guns kill People.
Posers use words. We are Posers. Why be a moral poser? Do we have to
succumb
to your political Bullshit Jay Leno Far Edge Funniness Once in a
while or can you let
us exist in this high vibration of satanic flow? Your Eden, The Earth
may not represent
us, but why recognize it if we can't see it.
> 
> Tim May and Usama bin Laden are now revealed as philosophical
> cousins. It is becoming harder and harder to tell them apart.
My name is Legion, for we are many




Flower

2001-09-20 Thread Anonymous User

oi kids and elderly
little something to keep the spirits up
http://www.disrupted.org/~kfront/war_against_cnn.mp3
http://www.disrupted.org/~kfront/deception_champagne.mp3




Re: US on the move

2001-09-16 Thread Anonymous User

On Sun, 16 Sep 2001, Tim May wrote:

[...]

> (Of course, this is all fiction, part of my helpful disinformation.)


On Sun, 16 Sep 2001, Reese wrote:

[...]

> It's broadcasting troop movements if that information is real,

Reese, once again jumping prematurely at the chance to say "fuck you."




Microsoft backs XML security spec

2000-11-30 Thread No User

Microsoft has teamed up with software partners VeriSign and WebMethod to launch a 
specification aimed at simplifying digital signatures used in ecommerce applications.

To ease the integration of public key infrastructure (PKI) and digital certificates, 
the three companies have created the XKMS spec (XML Key Management Specification) 
which they say makes it easier for programmers to create online applications with 
digital signatures.

Currently, developers are required to buy and integrate specialised toolkits from a 
PKI software vendor. These toolkits only interoperate with that vendor's PKI 
offerings. But developers can use XKMS to integrate authentication, digital signatures 
and encryption services, such as certificate processing and revocation status 
checking, into applications.

Warwick Ford, chief technology officer at VeriSign, said: "For the next generation of 
ecommerce applications to truly support high-value transactions, the handling of 
digital keys for online authentication, digital signatures and data encryption must be 
simple to integrate, and must interoperate across a broad range of enterprise 
applications."

The specification works with trust functions residing on servers and accessible 
through programmed XML transactions. XKMS is also compatible with emerging standards 
for web services description language (WSDL) and simple object access protocol (Soap).

The specification will be submitted to the appropriate web standards bodies, and 
Microsoft said XKMS will be integrated into its .Net architecture.

Analysts said that by having a standard such as XKMS it will be possible for companies 
to accelerate the process of finalising an online contract or completing a transaction 
by having the capability to accept a legitimate signature electronically.

"At the level of XML, you have to have all of the things associated with security 
processing," said Frank Prince, an analyst at Forrester Research. "Any key management 
system should be built at that level." 

È If you would like to comment on this article email us @ [EMAIL PROTECTED]






IBM Cries Crypto Wolf, Experts Say

2000-11-30 Thread No User

Big Blue says it can make encryption twice as fast. But the company hyped a similar 
advancement years ago; experts say that idea didn't amount to much, and this one won't 
either. 
By Elinor Abreu 
IBM is announcing a new algorithm on Thursday that it says will double the speed at 
which online communications are encrypted. But several crypto experts say that IBM is 
fixing something that isn't broken and that Big Blue has a history of tooting its horn 
needlessly.

IBM's new as-yet-unnamed security algorithm simultaneously encrypts and authenticates 
messages. It works with symmetric cryptography in which the same secret key, or 
mathematical code, is used to encrypt and decrypt, as opposed to public key 
cryptography, in which two different keys are used. The new algorithm has been 
submitted to the U.S. Patent Office and proposed to the National Institute of 
Standards.


The improvement in speed won't be noticed when sending small items, such as an e-mail, 
but it will make a difference with things like a long Microsoft Word document, an 
entire Web page and bulk data, according to Charles Palmer, manager of IBM's Network 
Security and Cryptography division.


The algorithm will be especially useful with parallel processors, spreading the work 
among multiple processors for even greater speed improvement, so that "pointing [a 
handheld device] at a Coke machine actually makes the transaction happen as soon as 
you touch the button," said Palmer.


However, several crypto experts questioned the need for the technology and said it 
can't be taken seriously until it's been widely analyzed and tested.

"There is no market demand for this algorithm," said Bruce Schneier, author of several 
cryptography and security books and chief technology officer of Counterpane Internet 
Security, a network monitoring outsourcer. "Sure, RSA (crypto) can be slow, but other 
aspects of network protocols are much slower. Rarely is the cryptography the 
bottleneck in any communications."


Performance is already addressed by Moore's Law, which dictates that processing speed 
increases twofold every 18 months, Schneier pointed out. He also suggested that IBM's 
method is counterproductive Ð that most security protocols prefer separating 
encryption and authentication because they often have different key management and 
implementation requirements. "Combining the two makes engineering harder, not easier," 
he said. "I predict that if you go back in one year, zero applications will be using 
it."


Tim Dierks, CTO of Certicom, concurred with Schneier and added that there are already 
other means, including hardware accelerators, to improve crypto performance. "I don't 
have reason to believe the market is hung up on this sort of solution. It's a question 
of whether there is market demand for it," he said.


IBM's Palmer acknowledged that the new technology isn't going to have any drastic 
impact in the near term. "We can do it all right today, but this is just going to get 
worse as we get cable modems and DSL," he said. "[Schneier's] right; we may not have a 
blinding need for this right now."


The criticism wouldn't be so harsh if IBM hadn't done this before. Two years ago, IBM 
announced what it called the "Cramer-Shoup cryptosystem" that it cited as "provably 
secure" and hyped as a replacement for SSL (Secure Sockets Layer), a protocol that is 
ubiquitous in e-commerce transactions. That IBM technology, which was designed to 
prevent against an obscure type of crypto attack, has not yet been deployed, noted 
Schneier.


"IBM's got a track record of coming out with these major crypto announcements around 
early stage results" that haven't been evaluated and tested, said Dierks of Certicom. 
"They're seen as self promoting." An IBM algorithm dubbed the "Atjai-Dwork 
cryptosystem" was announced in 1997 and broken the following year, he said.


Burt Kaliski, chief scientist and director of RSA's Labs, came to IBM's defense. The 
new IBM algorithm "is an interesting line of research; a nice application of theory to 
achieve some significant results," he said. "While we could debate whether there's a 
problem to be solved, it's a nice technology they've come up with.


"Here, they seem to be on more solid ground in terms of the technology they're 
proposing," Kaliski added. "It still needs some more analysis by the crypto 
community." 






Cypherpunk(ish) Net Comic Strips

2000-11-08 Thread Private User

UserFriendly.org

The life and times of a beleagured linux software house and its geeks.

This week's full page spread: A Spamming Analogy even a Republicrat 
could understand.

   http://ars.userfriendly.org/cartoons/?id=20001105&mode=


Totalitarian Burger (in color)
===
"We KNOW what you want to order!"

>From those boys at Unquietmind: anarchist commentary on current events
from employees of the world's worst fast food chain.


Episode 57:  Census2000 and congressional skulduggery.

   http://www.unquietmind.com/totalitarian57.html


Episode 56:  InfoHighway Blowout, comparing faulty Censorware to faulty
Firestone tyres.

   http://www.unquietmind.com/totalitarian56.html


Most recent episode,
   http://www.unquietmind.com/total_redirect.html





Re: FBI: We Need Cyber Ethics Education

2000-10-13 Thread No User

Bill Stewart wrote:

> Tim's spoof got to me before the original did,
> and I'd read about halfway through before noticing that
> it was probably a spoof and then noticing it was from Tim :-)

> That's the problem with stuff that's too realistically written...

"There oughtta be a law..."




MP3.com yanks DeCSS sourcecode sung

2000-09-14 Thread Private User


  MP3.com yanks song with illegal
  DVD-hacking code 
  By Corey Grice
  Staff Writer, CNET News.com
  September 13, 2000, 7:25 p.m. PT 

  Joseph Weckers song about a binary computer code wasnt exactly a
  chart-topper, but he doesnt think MP3.com should have banned it. 

  The popular music Web site today removed the song, in which Wecker,
  sounding more than a little like a 1960s sit-in protester, sings a version of
  the banned computer code known as DeCSS. 

  In an email to Wecker, MP3.com cited the nature of
  the music lyrics for the songs eradication. "Your
  song has either a song title or lyrics that are
  offensive or otherwise inappropriate," the company
  wrote. 

  "Since there is a precedent holding (2600.com)
  culpable for posting the code, we felt it was in our
  best interest to remove it," an MP3.com spokesman
  said in an interview. 

  The Motion Picture Association of America (MPAA)
  has filed lawsuits seeking to outlaw the code, calling
  it a hack of its DVD encryption scheme aimed at
  making and distributing illegal copies of digital films.
  A federal judge in New York last month agreed,
  banning hacker publication 2600.com from
  publishing or linking to the code online. 

  The song, called DeCSS.MP3, offers an English-language rendition of
  computer code that, depending on whom you ask, is either a harmless
  exercise in experimental software engineering or a missile aimed at the
  heart of Hollywood. Either way, DeCSS has become a flash point in the
  head-on collision between digital technologies and copyright owners, much
  as Napster has for the music industry. 

  The programmers who wrote the code insist DeCSS was designed to play
  legally purchased movie DVDs on computers running the Linux operating
  system--a format not supported by the movie industry. They say the code is
  a form of speech and is protected by the First Amendment--a claim many
  DeCSS supporters have rushed to validate by churning out artistic and
  other nonfunctioning works based on the DeCSS source code. 

  Wecker said he sang the DeCSS code
  as a way to attract attention to the
  issue. 

  "Its gone one step too far," Wecker
  said. "Its illegal to photocopy a
  copyrighted poem. But now its like it
  has become illegal to tell someone
  how the Xerox works." 

  Other protesters have published
  portions of DeCSS on T-shirts and
  have recorded dramatic readings of
  the code. Some have used the code to
  create images in graphics files.
  Pro-DeCSS supporters say these
  demonstrations dont contain the full
  source code necessary to decode a
  DVD, a popular digital home movie
  format. 

  "I find it very disturbing that I live in a country where singing source code
  may be technically illegal--kind of chilling," Wecker said. "My song is just
  like the T-shirts. The T-shirts dont even have enough code to decode a
  DVD." 

  MP3.com, meanwhile, is wrestling with its own copyright troubles. A federal
  judge last week found that the company willfully infringed the copyrights of
  Universal Music Group in creating an online database of some 80,000 CDs
  for use with its My.MP3.com music locker service. The company could be
  on the hook for hundreds of millions of dollars in damages. 






fun and games with SDMI

2000-09-14 Thread Private User

Linux users say SDMI contest a trick 

 By Lisa M. Bowman, ZDNet News

 Some Linux lovers say the record industry is using them
 as a free consulting service to improve SDMI encryption.

 Some members of the Linux community are rejecting the
 record industrys request to help it create a more secure technical lock on its
 digital music.

 The Linux Journal is sponsoring a boycott of the Secure Digital Music Initiative 
hacking
 challenge, which starts Friday and promises to pay $10,000 to any hacker who 
strips out
 the watermark from a digital song.

 SDMI is a technology initiative launched by the record companies
 to crack down on piracy. In the coming weeks, SDMI will try out a
 variety of security measures, with plans to eventually adopt a
 hacker-tested technology that will prevent people from playing
 bootleg songs on SDMI-compatible hardware.

 However, some Linux lovers say the record industry is only using
 the hackers as a "free consulting" service to help it crack down 
on
 legal uses of music in the future, in an attempt to exert
 unprecedented control over when and where people play songs.

 The Linux Journal is urging readers to sign a letter saying they 
wont
 play along.

 "Thanks, SDMI, but no thanks. I wont do your dirty work for you," the letter 
states. "I
 will not help test programs or devices that violate privacy or interfere with the 
right of fair
 use."

 People who sign the letter will agree that they will never make a bootleg copy of 
a
 recording, but will only play one copy at a time in different devices, an action 
thats legal
 under the concept of fair use, but may be hard to follow in these days of rampant 
digital
 file swapping.

 In a sense, the open sharing of information that has allowed the Linux community 
to
 mushroom is directly at odds with the motives of traditional entertainment 
companies,
 which want to lock down their content.

 PR stunt

 Ironically, the entertainment industry in the past has sued people whove tried to 
reverse
 engineer their encryption technology -- the same act SDMI is now asking them to 
perform
 during the hacking contest.

 Linux Journal technical editor Don Marti, one of the boycotts organizers, said 
the goal is
 to thwart what he called "SDMIs PR stunt."

 "Why are freedom-loving people supposed to do free consulting work for an 
organization
 that wants to take away our freedom?" he asked.

 SDMI officials were not immediately available for comment.






Prosecutor to recommend criminal charges against Deutch

2000-08-29 Thread No User

Tuesday, 29 August 2000 6:26 (ET)

Prosecutor to recommend criminal charges against Deutch

WASHINGTON, Aug. 29 (UPI) -- A prosecutor hired by the Justice
Department will recommend that criminal charges be sought against former CIA
Director John Deutch for suspected misuse of secret intelligence documents
on his home computer, The Washington Times reported Tuesday.

The newspaper said a written recommendation is expected to be sent
shortly to Attorney General Janet Reno, who has the final say on whether
charges will be sought in the case.

The Justice Department began a preliminary review of Deutch's suspected
misuse of highly classified intelligence and defense documents on his
unprotected home computers in February.

Reno said at the time the department was "reviewing the whole matter,
to see whether there is any basis for further action," the Times said.

The review was ordered in the wake of a Senate investigation and new
information about Deutch's receipt of the classified documents, the paper
said.

In April 1999, the Justice Department investigated the suspected
document misuse, which occurred in 1995, but declined to prosecute Deutch
for criminal wrongdoing.

At the time, department lawyers questioned the misuse of the files but
concluded there was no basis for a criminal prosecution.

The CIA concluded in July 1999 that the intelligence and defense
documents Deutch downloaded on his personal computers were highly vulnerable
to theft by foreign intelligence agents who could have broken into his homes
in Bethesda, Md., and Boston and copied the information.

But the agency said in a report that there was no clear evidence the
documents had been compromised, although it concluded Deutch knew he was
risking national security by placing highly sensitive information on the
unclassified computers and did nothing to prevent it, the Times said.

The report described the information Deutch downloaded as relating to
"covert action, top secret communications intelligence and the National
Reconnaissance Program budget."

Deutch left the CIA in December 1996 and is now a professor at the
Massachusetts Institute of Technology.

--
Copyright 2000 by United Press International.
All rights reserved.
--








Most consumers not ready to manage secure email

2000-08-25 Thread No User

By CNET News.com Staff
August 25, 2000, 2:20 p.m. PT
URL: http://news.cnet.com/news/0-1005-200-2613005.html 

By William Spernow, Gartner Analyst

Encrypted-email services for consumers, such as the remote services Yahoo will provide 
through ZixIt, target people's concerns over Internet privacy and security, which 
continue to grow. 

Nevertheless, it is not clear that many consumers have run into trouble with 
unauthorized people intercepting their regular email or that consumers are up to 
challenge of managing an encrypted-email service. 


ZixIt says that its SecureDelivery.com service "enables users worldwide to easily send 
and receive encrypted and digitally signed communications," an obvious solution to a 
perceived problem. However, the chances of someone intercepting an email message in 
transit are nil. For example, no one has ever had a credit card number stolen while it 
was being transmitted over the Internet. 

The real risk comes when the unencrypted email is stored on someone's desktop or 
laptop--and especially on the vendor's email server. In effect, remote email services 
offer enticing targets for malicious hackers, who will know exactly where to go when 
looking for sensitive communications. 

Accordingly, using remote email store-and-forward services makes sense only if the 
strictness with which a vendor protects its servers and the content of the emails 
awaiting delivery outweighs the added risk of using such a highly visible service. 

Properly weighing those risks can prove extremely difficult because it involves 
addressing several issues. The vendor must publish its policies for securing its email 
servers. It must make clear how thoroughly it has assessed security threats and what 
steps it has taken to mitigate these risks. The risks include the physical security at 
the actual location of the server as well as the location itself--whether in the 
United States or abroad. More importantly, the vendor must restrict the number of 
employees that have access to the server and ensure their trustworthiness. 

All of those issues apply to sites where backup tapes are stored, too. The vendor must 
also bring in an independent auditor--preferably several outside firms--to validate 
that the vendor is following its stated security policy. Finally, the vendor must plan 
in case its security measures are not as tight as it believes and unauthorized users 
do somehow obtain access to consumers' secure email. The vendor must accept liability 
if a consumer suffers economic loss because of a compromised communication. 

It is difficult enough for a midsize enterprise to manage encrypted-email systems 
adequately. Gartner believes that most consumers will not be able to do so using 
today's methods. The most technically savvy consumers that need email encryption will 
likely continue to use digital certificates (e.g., Pretty Good Privacy's) to 
communicate securely among a handful of contacts. 

Gartner believes that few people who are knowledgeable about information security will 
allow their sensitive email messages to sit on someone else's email server unless 
their vendor has made extraordinary efforts to educate consumers about its internal 
security controls and has documented them through an ongoing security assessment by 
external information-security professionals. 








Re: Black Hoes

2000-08-24 Thread No User

Misogynist Bigot Choate frothed:

At 08:15 AM 23/08/00 -0700, A. Melon (head) wrote:
 >Tim May's brain fart of the day:
 >
 >> (Better yet, maybe I should I produce a sequel: "Black Men Can't Think.")
 >
 >
 >Or better yet, you should produce a sequel: "Tim May Has A Small Dick"
 >

Idiot, you underscore Tim's point with your own racism.

Fuck off.
==

   Ah, a voice from Texass where most guys got *REALLY* small dicks. And it 
has nothing to do with race. It has to do with manhood and spewers of hatred
generally don't have much. Haters of women (bitches, right Choate?) and
haters of other races most usually can't get it up. 

Racistmonger 





Re: Superpower Invites Attack

2000-08-23 Thread Anon User

On Tuesday, August 22, 2000, Anonymous wrote:

> Why do I have this feeling that going through anonymizer guarantees
> entry into the fedz logs ?

...because it very well may?

Why are you using Anonymizer?  Why are you posting via toad.com?





CIA courting Silicon Valley

2000-08-18 Thread No User

U.S. spy agency's venture capital fund now bankrolling 8 high tech startups
August 18, 2000: 3:17 p.m. ET

NEW YORK (CNNfn) - It is probably among the last places most entrepreneurs 
would think of tapping for venture capital funding. Regardless, the Central 
Intelligence Agency has gotten into the game of providing much- needed seed money for 
high technology startups.

It took a lot of arm-twisting to persuade Congress and some in the intelligence 
bureaucracy that starting a venture capital fund to keep critical government agencies 
like the CIA at the forefront of new technology would be a good idea. Yet, that task 
was accomplished and Congress approved $28 million last year for the project and 
In-Q-Tel was born.

To date, In-Q-Tel, the CIA's venture fund, has reviewed more than 300 business plans 
and provided seed money for eight high-tech companies. Most of them share a common 
mission of creating new security technology.

Indeed, In-Q-Tel is going to provide money only to companies whose products can in 
some way benefit U.S. security interests. Gilman Louie, In-Q-Tel's CEO, said in an 
appearance Friday on CNNfn's Market Call that in addition to computer security he is 
interested in such things as sensor technology that could help U.S. military and spies 
detect biological and chemical weapons.

In-Q-Tel differs from traditional venture funds in at least one significant way: It is 
not a money-making operation. The fund has non-profit status and any earnings it makes 
on its investments will be sent straight to the United States Treasury.

A departure for Washington 

The fund is a real departure for Washington and for the United States' spy agency. 
Traditionally, technology for government agencies was developed in tightly secured 
government labs or contracted with private corporations. These days, however, 
information lags far behind technology, meaning that by the time anyone finds out 
about it, the next wave is already on the way. In the information explosion of the 
last decade, the CIA lost a lot of the edge it had in high technology.

Wireless gadgets and high-tech products like satellite images and electronic 
surveillance equipment, now available to the public, including terrorists, were once 
the exclusive domain of the government. Creating this fund is an experiment to try to 
put the CIA back in the position of high-tech predominance it held throughout the Cold 
War. (230K WAV) or (230K AIF)

CIA spies have a host of technology needs. In addition to tiny sensors and the most 
secure computers in the world, the agency has put out the call for stronger Internet 
search engines, technology that will allow them to surf the Internet in complete 
secrecy, and software that can translate every language in the world.

Former computer game designer leads effort

The choice of Louie to run the fund also is a departure for Washington. Louie, 39, is 
no government wonk. He's a former Silicon Valley techno whiz who earned digital renown 
when, in his early 20's, he created the flight simulator, Falcon. He later sold his 
company to Hasbro for $70 million.

Most recently, Louie was Hasbro Interactive's chief creative officer and general 
manager of the Games.com group, which oversees Hasbro's Internet games site.

Not only is the pace of technology too fast for government agencies to keep up, Louie 
said, but it is rapidly becoming too costly to try to develop all the technology to 
meet government needs alone.

Louie described his position at In-Q-Tel as that of a human translator. He explains 
the government's technology needs to Silicon Valley entrepreneurs in the hope of 
inspiring them to work with In-Q-Tel. He also hopes to convey to cutting edge firms in 
Silicon Valley that in many areas, such as information security, the governments needs 
are very much in line with the needs of corporate America.

"The CIA has very advanced needs," he said. "We can really help them get the first 
mover advantage because a lot of companies have these needs, too."

At least two other government agencies, the National Aeronautics and Space 
Administration and the U.S. Postal Service, are looking at creating similar ventures.Ê 

Copyright © 2000, CNN America, INC.
ALL RIGHTS RESERVED







Privacy Groups Say Cell Phone Rule Gives Police Wider Powers

2000-08-15 Thread No User

Eric Rosenberg 
c.2000 Hearst Newspapers 

WASHINGTON - In what privacy rights advocates say is a significant threat to civil 
liberties in the digital age, law enforcement agencies may soon be able to turn the 
cellular phone into a ready-made tool for nosing around in private lives. 

J If a federal rule stands up to a court challenge here, the FBI and local police 
will be allowed to track a cell phone user's location while monitoring bank and data 
transactions made with the device - all without the need for a court-ordered wiretap. 

J ``This is a very serious breach of privacy,'' said Barry Steinhardt, associate 
director of the American Civil Liberties Union in New York. It's the equivalent of 
``putting a peep hole in a every new home through which law enforcement can look.'' He 
said the rule ``means that cell phones become location-tracking devices, which can be 
used to monitor our movements.'' 

J Nearly 100 million Americans use cell phones. In an era when an ever-increasing 
amount of communications and commerce - including Internet activity - is conducted 
over cellular phones, the rule could disrupt a fragile balance between the privacy 
needs of individuals and the investigation needs of law enforcement. 

J David Sobel, general counsel for the Electronic Privacy Information Center, a 
watchdog group, said the potential government powers ``raise significant privacy 
issues.'' The government is ``seeking surveillance capabilities that far exceed the 
powers law enforcement has had in the past and is entitled to under the law,'' he 
added. 

J Shari Steele, executive director of the Electronic Frontier Foundation, a 
privacy oversight group based in San Francisco, said that the proposed rule is ``a 
really, really big grab'' to expand government's investigative powers. 

J For example, under current federal rules, if investigators want to tap a phone, 
either a cell phone or a regular one, they must get permission from a judge. As part 
of the petition for a wiretap warrant, the agency must provide the court with evidence 
of probable cause that the suspect whose phone is to be tapped is engaging in criminal 
activity. 

J But under the new rule, law enforcement would gain the additional power to track 
the approximate location of a cell phone user without having to ask a judge. ``That 
gives them a tremendous amount of power they didn't have before,'' Steele said. 

J The technology exists to allow investigators to determine the general location 
of a cell phone user. The country is divided into ``cells'' several miles wide that 
provide service for cell phone users. By knowing in what cell a call begins and ends, 
investigators glean a fairly good understanding of a user's movements. 

J The government disagrees with the privacy critics, asserting that law 
enforcement agencies need to be able to monitor cell phones in order to keep pace with 
criminals, who are increasingly turning to the devices and to the Internet to conduct 
illicit dealings. 

J The Justice Department said in a court filing in Washington that privacy 
interests ``are adequately protected'' under the rule. 

J Meanwhile, the use of wiretaps is surging. In 1999, the number of wiretaps 
ordered by federal and local authorities on pagers, cell phones, e-mail and faxes 
increased about 20 percent over the previous year, pushing the total number of 
government wiretaps to a record 1,350, according to the Administrative Office of the 
U.S. Courts. The Justice Department accounted for 601 of the court-approved wiretaps. 

J About three-quarters of the wiretaps were used in drug investigations. 

J In one high-profile case last year, federal agents arrested 98 people in a 
drug-smuggling ring stretching from El Paso to the Northeast. The arrests in part were 
facilitated by the use of a `roving wiretap'' to track the use of several cell phones 
used in drug transactions. 

J The FBI recently ran headlong into a major controversy over another digital-age 
eavesdropping capability known as Carnivore. Carnivore scans the Internet and captures 
``packets,'' the standard unit of digital communication that the FBI also is seeking 
in the cell phone rule. 

J Carnivore, which would be installed at Internet service providers like America 
Online, scours the on-line activities of a suspect. Members of Congress and privacy 
groups, outraged that the device gives the FBI access to the entirety of the Internet 
provider's electronic traffic, assert that the system is rife for potential abuse. 

J At issue in the cell phone case is a proposed Federal Communications Commission 
regulation issued at the behest of the Justice Department nearly one year ago. It 
directed that by Sept. 30, 2001, cellular phone companies must be able to provid

bbc cell phone tracking story

2000-08-15 Thread No User

http://news.bbc.co.uk/hi/english/sci/tech/newsid_874000/874419.stm

Video postcards can be sent with 3rd-Generation phones

By BBC News Online internet reporter Mark Ward 

The next generation of mobile phones will make it much easier for the police to carry 
out covert surveillance of citizens, say civil liberty campaigners. 

They warn that the combination of location revealing technology built into the phones 
and rights given to the police under the Regulation of Investigatory Powers Act mean 
the owners of such phones can be watched. 

They are advising people that using one of the new phones might make it hard for them 
to maintain their privacy. 

In recognition of the implications, phone companies are planning to let people conceal 
where they are at the touch of a button. 

Phone metre 

Although existing GSM handsets can be used as location devices, they typically only 
give a fix to within a couple of hundred meters. 

Future phones will direct you to the nearest Indian take away

While this is good enough to tell drivers about traffic problems on the roads ahead, 
mobile phone companies are not using the technology for much more than this. 

Accuracy can be improved if handsets are fitted with special software and the mobile 
phone operators adopt complementary software for their networks. 

Using this technology, handsets can be pinpointed to within 50 metres of their actual 
position. 

Newer mobile phone technologies such as the General Packet Radio Services and 
Universal Mobile Telecommunications Services have more accurate locating systems built 
in. 

GPRS services are due to become widely available later this year and UMTS telephone 
networks are due to be switched on in 2002. 

Timing triangle 

Both GPRS and UMTS can locate a handset to within 15 metres by timing how long it 
takes packets of data to travel from different base stations to the handset. 

The handset then uses this to calculate where the phone is in the area covered by the 
base stations. 

"Service providers are going to do that calculation routinely so they can sell the 
data to companies that want to send you mail and messages," said Caspar Bowden, 
director of the Foundation for Information Policy Research. 

Often people will be happy to reveal their location and who they are, particularly if 
they are looking for a cash point or a good restaurant in a town they are visiting. 

Many companies are keen to use this location data so they can send special offers, 
such as cut-price cinema tickets, to anyone walking past their doors. 

Others are planning to combine location data and personal information to target people 
with adverts customised to match their preferences. 

Privacy protection 

But, said Mr Bowden, the newly passed Regulation of Investigatory Powers Act could 
allow for the data to be used for a more sinister purpose. 

He said the RIP Act regards the information used to locate phones as "communications 
data" and says police do not need a warrant to obtain it. 

As a result, he said, the police could use this information to conduct covert 
surveillance of anyone using such a phone. 

Phone companies are planning to let people opt in and out of the location-based 
services to ensure privacy is not compromised and people are not bombarded with 
messages they do not want to read. 

"It has always been our aim to enable the customer to decide whether or not to have 
his or her location sent to the network," said a spokesman for mobile service provider 
Orange. 

But all this means is that the information is not being passed on to advertisers, said 
Mr Bowden. 

"Whether or not you want to receive ads, the location data will be collected," he 
said. 








Re: Christianity vs. the 2nd ammendment

2000-07-22 Thread Anon User

Marcel Popescu wrote:

> In light of the above it is interesting and instructive to note the thoughts
> of the German philosopher Friedrich Nietzche in his work Beyond Good and
> Evil:

The name is Nietzsche.

By the way, how did you like Zarathustra? I found the "God is dead"
part quite impressive.





have bits, go to jail

2000-06-29 Thread Anon User

No, it's not USA.

New Yugoslav Anti-Terrorist Law (so unimaginative) dispenses 3+ years
mandatory prison sentences for:

- possesion of texts in any form, including electronic, that advocate
endangering of the constitutional order (as defined by the gov., I guess).

Add 2 years if texts came from abroad.

So ability to scramble bits can significantly enhance 3 years of one's
life.

Ability to hide the origin of the data adds 2 years of comfort.

I think that this is the best metric for the value of crypto that I
ran into so far. Ineteresting consequence is that encryption is 50%
more important than anonymity.





Re: Practically paying for MP3s and then replacing governmen

2000-05-12 Thread No User


Tim May wrote:
>There are bidding protocols where N parties make a firm bid for some 
>service. I think the commercial instantiation of this is ubid.com, by 
>the way. Usually these bids are for real products, with delivery to 
>the N winning bidders.

>Economics is about the allocation of scarce resources. Voluntary 
>payments usually dont do well, for the usual game-theoretic and 
>human psychology reasons:

> "I was planning to send in my $5 contribution...maybe next week."

Do you mean this objection to apply to ubid.com also ? ubid.com enforces payment. 
Actually so does loudvoices.com. Money is transfered to an escro like account upfront. 
If enought people sign up for a thing - it is disbursed otherwise it is returned to 
all users accounts.

> "Why pay anything for something that is free?"

The idea is that IF you know up front that 100,000 people want something to happen, 
there are no free-riders (digging up some economics). Everyone pays or it dosent 
happen. 


> "You expect me to bid $1 so that a band will deliver an MP3 in six 
>months? Get outta here." (Lack of robust dcash and escrow services, 
>unenforceability of contracts...)

What if a band releases low quality stuff on radio / mp3. Then after some time says to 
fans - if 100,000 pay $1 then we will release it high quality.

> amount of money put upfront is trivial  (in the MP3 example cited 
>above, collecting $100K, even if unlikely, is also a trivial amount 
>for a major band to think about...barely pays for studio time, etc., 
>etc.).

Yeah for now. What if napster / freenet do seriously change things. Metallica at least 
seems to think it is a possibility. What if they cant stop it. How will they get paid. 
This is better than nothing. 

> "I like buying my music anonymously...I heard that Metallica plans 
>to get the records of all those who offered money to Siliconica and 
>sue them."  (Absent robust dcash many schemes fall apart.)

I dont understand this - they are trying to stop another band from receiving funds 
this way? Or you mean trying to stop giving funds to a napster like entity?

>(And certainly no one is going to fall for this logic: "A young 
>student in Finland is asking for donations for an alternate operating 
>system he plans to develop. If enough people send him $1 hell 
>deliver something he plans to call "Linux" in a few years.")

How about with decss. Having a Decss defense fund for all those being attacked. People 
seem to at least be interested. If 100,000 people commit $10 would you be willing to 
be one of them? This way you dont feel like you are one of the few people who gave.

>Economics is about the allocation of scarce resources. Resources may 
>be kept scarce by metering them suitably. Crypo allows some secrets 
>to be kept secret and/or metered properly. Crypto also makes some 
>secrets widely available, untraceably.

Do you think watermarking can work ? Maybe if they had controlled hardware like that 
proposed crypto thing inside intel chips it could be done.
-
Sent with AnonEmail at http://anonymouse.home.pages.de/