Re: On the orthogonality of anonymity to current market demand
Chris Palmer <[EMAIL PROTECTED]> writes: >James A. Donald writes: > >> Further, genuinely secure systems are now becoming available, notably >> Symbian. > >What does it mean for Symbian to be genuinely secure? How was this determined >and achieved? By executive fiat. Peter.
Re: On the orthogonality of anonymity to current market demand
James A. Donald writes: > > Further, genuinely secure systems are now becoming available, notably > > Symbian. Chris Palmer <[EMAIL PROTECTED]> > What does it mean for Symbian to be genuinely secure? How was this > determined and achieved? There is no official definition of "genuinely secure", and it is my judgment that Symbian is unlikely to suffer the worm, virus and trojan problems to the extent that has plagued other systems.
Re: On the orthogonality of anonymity to current market demand
James A. Donald writes: > Further, genuinely secure systems are now becoming available, notably > Symbian. What does it mean for Symbian to be genuinely secure? How was this determined and achieved? -- http://www.eff.org/about/staff/#chris_palmer signature.asc Description: Digital signature
Re: On the orthogonality of anonymity to current market demand
At 10:22 AM -0500 10/31/05, [EMAIL PROTECTED] wrote: >and doesn't history show that big corporations are only interested in >revenue One should hope so. ;-) Cheers, RAH -- - R. A. Hettinga The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: On the orthogonality of anonymity to current market demand
hi ( 05.10.26 09:17 -0700 ) James A. Donald: > While many people are rightly concerned that DRM will > ultimately mean that the big corporation, and thus the > state, has root access to their computers and the owner > does not, it also means that trojans, viruses, and > malware does not. do you really think this is true? doesn't microsoft windows prove that remote control of computers only leads to compromise? [especially in our heavily networked world] and doesn't history show that big corporations are only interested in revenue- so that if they get revenue by forcing you to pay them fees for 'upkeep' of your digital credentials to keep your computer working they are going to do that. the problems 'solved' by DRM can also be solved by moving to an operating system where you have control of it, instead of an operating system filled with hooks so other people can control your computer. and that operating system is freely available ... -- \js oblique strategy: don't be frightened of cliches
[Clips] Security 2.0: FBI Tries Again To Upgrade Technology
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Mon, 31 Oct 2005 07:29:37 -0500 To: Philodox Clips List <[EMAIL PROTECTED]> From: "R.A. Hettinga" <[EMAIL PROTECTED]> Subject: [Clips] Security 2.0: FBI Tries Again To Upgrade Technology Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] <http://online.wsj.com/article_print/SB113072498332683907.html> The Wall Street Journal October 31, 2005 Security 2.0: FBI Tries Again To Upgrade Technology By ANNE MARIE SQUEO Staff Reporter of THE WALL STREET JOURNAL October 31, 2005; Page B1 As the fifth chief information officer in as many years at the Federal Bureau of Investigation, Zalmai Azmi faces a mystery: How to create a high-tech system for wide sharing of information inside the agency, yet at the same time stop the next Robert Hanssen. Mr. Hanssen is the rogue FBI agent who was sentenced to life in prison for selling secret information to the Russians. His mug shot -- with the words "spy, traitor, deceiver" slashed across it -- is plastered on the walls of a room at FBI headquarters where two dozen analysts try to track security breaches. Mr. Hanssen's arrest in February 2001, and his ability to use the agency's archaic system to gather the information he sold, led FBI officials to want to "secure everything" in their effort to modernize the bureau, Mr. Azmi says. But then, investigations after the Sept. 11 terrorist attacks showed that FBI agents had information about suspected terrorists that hadn't been shared with other law-enforcement agencies. So then "we said, 'Let's share everything,'" Mr. Azmi says. Since then, the FBI spent heavily to upgrade its case-management system, from one that resembled early versions of personal computers -- green type on a black computer screen, requiring a return to the main menu for each task -- to a system called Virtual Case File, which was supposed to use high-speed Internet connections and simple point-and-click features to sort and analyze data quickly. But after four years and $170 million, the dueling missions tanked the project. FBI Director Robert Mueller in April pulled the plug on the much ballyhooed technology amid mounting criticism from Congress and feedback from within the bureau that the new system wasn't a useful upgrade of the old, rudimentary system. As a result, the FBI continues to use older computer systems and paper documents remain the official record of the FBI for the foreseeable future. Highlighting the agency's problems is the recent indictment of an FBI analyst, Leandro Aragoncillo, who is accused of passing secret information to individuals in the Philippines. After getting a tip that Mr. Aragoncillo was seeking to talk to someone he shouldn't have needed to contact, the FBI used its computer-alert system to see what information the analyst had accessed since his hiring in 2004, a person familiar with the probe said. The system didn't pick up Mr. Aragoncillo's use of the FBI case-management system as unusual because he didn't seek "top secret" information and because he had security clearances to access the information involved, this person said. The situation underscores the difficulties in giving analysts and FBI agents access to a broad spectrum of information, as required by the 9/11 Commission, while trying to ensure rogue employees aren't abusing the system. It's up to Mr. Azmi to do all this -- without repeating the mistakes of Virtual Case File. Much is at stake: FBI agents and analysts are frustrated by the lack of technology -- the FBI finished connecting its agents to the Internet only last year -- and Mr. Mueller's legacy depends on the success of this effort. The FBI director rarely appears at congressional hearings or news conferences without his chief information officer close by these days. An Afghan immigrant, the 43-year-old Mr. Azmi fled his native country in the early 1980s after the Soviet invasion. After a brief stint as a car mechanic in the U.S., he enlisted in the Marines in 1984 and spent seven years mainly overseas. A facility for languages -- he speaks five -- helped him win an assignment in the Marines working with radio communications and emerging computer technologies. When he returned to the U.S., he joined the U.S. Patent and Trademark Office as a project manager developing software and hardware solutions for patent examiners. He attended college and graduate school at night, obtaining a bachelor's degree in information systems from American University and a master's degree in the same field from George Washington University, both in Washington, D.C. Afterward, he got a job at the Justice Department in which he helped upgrade technology for U.S. attorneys across the country. That is wher
Please confirm your request to join hersey-serbest
Hello cypherpunks@minder.net, We have received your request to join the hersey-serbest group hosted by Yahoo! Groups, a free, easy-to-use community service. This request will expire in 7 days. TO BECOME A MEMBER OF THE GROUP: 1) Go to the Yahoo! Groups site by clicking on this link: http://groups.yahoo.com/i?i=4VElF71LeNJ5njsXdcV8fVL0qjE&e=cypherpunks%40minder%2Enet (If clicking doesn't work, "Cut" and "Paste" the line above into your Web browser's address bar.) -OR- 2) REPLY to this email by clicking "Reply" and then "Send" in your email program If you did not request, or do not want, a membership in the hersey-serbest group, please accept our apologies and ignore this message. Regards, Yahoo! Groups Customer Care Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
Re: [EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID implants start
At 01:31 AM 10/30/05 -0700, Bill Stewart wrote: >They've said they'll fall back on the traditional >"If we can't read the passport it's invalid and you'll need to >replace it before we'll let you leave the country" technique, >just as they often do with expired passports and sometimes What is the procedure (or are they secret :-) for passports which become damaged whilst travelling out of country? With a drivers license, if the magstrip doesn't work, they type in the numbers. But the biometrics are not encoded, its just a convenience. With a passport, they're relying on the chip or no? (Mechanical damage to the chip should work as well as RF or antenna damage. You will have to find the chip and crack it, mere flexing of the paper carrier doesn't work by design.)
Re: [EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID implants start
On Sat, Oct 29, 2005 at 08:42:35PM -0400, Tyler Durden wrote: > One thing to think about with respect to the RFID passports... > > Um, uh...surely once in a while the RFID tag is going to get corrupted or > something...right? I'd bet it ends up happening all the time. In those > cases they probably have to fall back upon the traditional passport usage > and inspection. Actually, an RFID can be ridiculously reliable. It will also depend on how much harassment a traveler will be exposed to, when travelling. Being barred from entry will definitely prove sufficient deterrment. > The only question is, what could (believably) damage the RFID? Microwaving it will blow up the chip, and cause a scorched spot. Severing the antenna would be enough for the chip to become mute. Violetwanding or treating with a Tesla generator should destroy all electronics quite reliably -- you always have to check, of course. Also, the ID is quite expensive, and a frequent traveller will wind up with a considerable expense, and hassle. -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Re: [EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID implants start
At 01:42 AM 10/30/2005, Roy M. Silvernail wrote: Tyler Durden wrote: > One thing to think about with respect to the RFID passports... > > Um, uh...surely once in a while the RFID tag is going to get corrupted > or something...right? I'd bet it ends up happening all the time. In > those cases they probably have to fall back upon the traditional > passport usage and inspection. They've said they'll fall back on the traditional "If we can't read the passport it's invalid and you'll need to replace it before we'll let you leave the country" technique, just as they often do with expired passports and sometimes do with just-about-to-expire passports if you're a Suspicious-Acting Person like Dave del Torto. > The only question is, what could (believably) damage the RFID? If you want to damage the RFID of a passport you're playing with, microwave ovens should do just fine. I don't know if Rivest's RFID-blocker chips use the same frequency or codespace as the passport RFIDs, but you could also leave one of them in the back of your passport. Now put that chip-cooker in a trash can right by the main entrance to an airport and perform some public service. I'd be surprised if you could put out enough energy to cook the passport RFIDs of people walking by at normal speed without also causing lots of other electrical problems.
Re: [EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID implants start
Tyler Durden wrote: > One thing to think about with respect to the RFID passports... > > Um, uh...surely once in a while the RFID tag is going to get corrupted > or something...right? I'd bet it ends up happening all the time. In > those cases they probably have to fall back upon the traditional > passport usage and inspection. > > The only question is, what could (believably) damage the RFID? EMP? Could be tuned, even, since the RFID is resonant at a known frequency. There's a standard for excitation field strength, so all one should need to do would be hit the chip with 50-100x the expected input. Unless the system is shunted with a zener or some such, you should be able to fry it pretty easily. Now put that chip-cooker in a trash can right by the main entrance to an airport and perform some public service. -- Roy M. Silvernail is [EMAIL PROTECTED], and you're not "It's just this little chromium switch, here." - TFT Dspam->pprocmail->/dev/null->bliss http://www.rant-central.com
RE: [EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID implants start
One thing to think about with respect to the RFID passports... Um, uh...surely once in a while the RFID tag is going to get corrupted or something...right? I'd bet it ends up happening all the time. In those cases they probably have to fall back upon the traditional passport usage and inspection. The only question is, what could (believably) damage the RFID? -TD From: Eugen Leitl <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: [EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID implants starting in October 2006 [priv]] Date: Sat, 29 Oct 2005 20:54:13 +0200 - Forwarded message from David Farber <[EMAIL PROTECTED]> - From: David Farber <[EMAIL PROTECTED]> Date: Fri, 28 Oct 2005 17:49:06 -0400 To: Ip Ip Subject: [IP] more on U.S. passports to receive RFID implants starting in October 2006 [priv] X-Mailer: Apple Mail (2.734) Reply-To: [EMAIL PROTECTED] Begin forwarded message: From: Edward Hasbrouck <[EMAIL PROTECTED]> Date: October 28, 2005 11:07:28 AM EDT To: [EMAIL PROTECTED] Subject: Re: [IP] more on U.S. passports to receive RFID implants starting in October 2006 [priv] >From: "Lin, Herb" <[EMAIL PROTECTED]> > >*Front* cover? Does that mean that if I hold the passport the wrong >way, the skimmer will have a free ride? > FWIW: (1) The sample RFID passports that Frank Moss passed around at CFP, which looked like <http://travel.state.gov/passport/eppt/eppt_2501.html>, had the RFID chip (which was barely detectable by feel) in the *back* cover. The visible data page was/is, as with current passports, in the *front* cover. This is not compliant with the ICAO specifications, which recommend having the chip in the same page as the visible data, to make it more difficult to separate them. I can only guess that it was hard to laminate the visible data without damaging the chip, if it was in the same page. But it's interesting in light of the importance supposedly being placed on compliance with ICAO standards. (2) Moss had 2 sample RFID passports, 1 with and 1 without the shielding. He cliamed it was a layer in the entire outer cover (front and back), but it wasn't detectable by feel. I have more threat scenarios for the latest flavor of RFID passport at: http://hasbrouck.org/blog/archives/000869.html Edward Hasbrouck <[EMAIL PROTECTED]> <http://hasbrouck.org> +1-415-824-0214 ----- You are subscribed as [EMAIL PROTECTED] To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
[EMAIL PROTECTED]: [IP] more on U.S. passports to receive RFID implants starting in October 2006 [priv]]
- Forwarded message from David Farber <[EMAIL PROTECTED]> - From: David Farber <[EMAIL PROTECTED]> Date: Fri, 28 Oct 2005 17:49:06 -0400 To: Ip Ip Subject: [IP] more on U.S. passports to receive RFID implants starting in October 2006 [priv] X-Mailer: Apple Mail (2.734) Reply-To: [EMAIL PROTECTED] Begin forwarded message: From: Edward Hasbrouck <[EMAIL PROTECTED]> Date: October 28, 2005 11:07:28 AM EDT To: [EMAIL PROTECTED] Subject: Re: [IP] more on U.S. passports to receive RFID implants starting in October 2006 [priv] >From: "Lin, Herb" <[EMAIL PROTECTED]> > >*Front* cover? Does that mean that if I hold the passport the wrong >way, the skimmer will have a free ride? > FWIW: (1) The sample RFID passports that Frank Moss passed around at CFP, which looked like <http://travel.state.gov/passport/eppt/eppt_2501.html>, had the RFID chip (which was barely detectable by feel) in the *back* cover. The visible data page was/is, as with current passports, in the *front* cover. This is not compliant with the ICAO specifications, which recommend having the chip in the same page as the visible data, to make it more difficult to separate them. I can only guess that it was hard to laminate the visible data without damaging the chip, if it was in the same page. But it's interesting in light of the importance supposedly being placed on compliance with ICAO standards. (2) Moss had 2 sample RFID passports, 1 with and 1 without the shielding. He cliamed it was a layer in the entire outer cover (front and back), but it wasn't detectable by feel. I have more threat scenarios for the latest flavor of RFID passport at: http://hasbrouck.org/blog/archives/000869.html Edward Hasbrouck <[EMAIL PROTECTED]> <http://hasbrouck.org> +1-415-824-0214 --------- You are subscribed as [EMAIL PROTECTED] To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
[EMAIL PROTECTED]: [IP] EFF: Court Issues Surveillance Smack-Down to Justice Department]
- Forwarded message from David Farber <[EMAIL PROTECTED]> - From: David Farber <[EMAIL PROTECTED]> Date: Wed, 26 Oct 2005 19:28:46 -0400 To: Ip Ip Subject: [IP] EFF: Court Issues Surveillance Smack-Down to Justice Department X-Mailer: Apple Mail (2.734) Reply-To: [EMAIL PROTECTED] Begin forwarded message: From: EFF Press <[EMAIL PROTECTED]> Date: October 26, 2005 7:00:22 PM EDT To: [EMAIL PROTECTED] Subject: [E-B] EFF: Court Issues Surveillance Smack-Down to Justice Department Reply-To: [EMAIL PROTECTED] Electronic Frontier Foundation Media Release For Immediate Release: Wednesday, October 26, 2005 Contact: Kevin Bankston Staff Attorney Electronic Frontier Foundation [EMAIL PROTECTED] +1 415 436-9333 x126 Kurt Opsahl Staff Attorney Electronic Frontier Foundation [EMAIL PROTECTED] +1 415 436 9333 x106 Court Issues Surveillance Smack-Down to Justice Department No Cell Phone Location Tracking Without Probable Cause New York - Agreeing with a brief submitted by EFF, a federal judge forcefully rejected the government's request to track the location of a mobile phone user without a warrant. Strongly reaffirming an earlier decision, Federal Magistrate James Orenstein in New York comprehensively smacked down every argument made by the government in an extensive, fifty-seven page opinion issued this week. Judge Orenstein decided, as EFF has urged, that tracking cell phone users in real time required a showing of probable cause that a crime was being committed.Judge Orenstein's opinion was decisive, and referred to government arguments variously as "unsupported," "misleading," "contrived," and a "Hail Mary." "This is a true victory for privacy in the digital age, where nearly any mobile communications device you use might be converted into a tracking device," said EFF Staff Attorney Kevin Bankston. "Combined with a similar decision this month from a federal court in Texas, I think we're seeing a trend--judges are starting to realize that when it comes to surveillance issues, the DOJ has been pulling the wool over their eyes for far too long." Earlier this month, a magistrate judge in Texas, following the lead of Orenstein's original decision, published his own decision denying a government application for a cell phone tracking order. That ruling, along with Judge Orenstein's two decisions, revealed that the DOJ has routinely been securing court orders for real-time cell phone tracking without probable cause and without any law authorizing the surveillance. "The Justice Department's abuse of the law here is probably just the tip of the iceberg," said EFF Staff Attorney Kurt Opsahl. "The routine transformation of your mobile phone into a tracking device, without any legal authority, raises an obvious and very troubling question: what other new surveillance powers has the government been creating out of whole cloth and how long have they been getting away with it?" The government is expected to appeal both decisions and EFF intends to participate as a friend of the court in each case. You can read the full text of Judge Orenstein's new opinion, and the similar Texas opinion, at www.eff.org/legal/cases/USA_v_PenRegister. For this release: http://www.eff.org/news/archives/2005_10.php#004090 About EFF The Electronic Frontier Foundation is the leading civil liberties organization working to protect rights in the digital world. Founded in 1990, EFF actively encourages and challenges industry and government to support free expression and privacy online. EFF is a member-supported organization and maintains one of the most linked-to websites in the world at http://www.eff.org/ -end- ___ presslist mailing list https://falcon.eff.org/mailman/listinfo/presslist - You are subscribed as [EMAIL PROTECTED] To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Please confirm your request to join hersey-serbest
Hello cypherpunks@minder.net, We have received your request to join the hersey-serbest group hosted by Yahoo! Groups, a free, easy-to-use community service. This request will expire in 7 days. TO BECOME A MEMBER OF THE GROUP: 1) Go to the Yahoo! Groups site by clicking on this link: http://groups.yahoo.com/i?i=dmjcf8BvLOkiFmjEaxMBnb5PbEM&e=cypherpunks%40minder%2Enet (If clicking doesn't work, "Cut" and "Paste" the line above into your Web browser's address bar.) -OR- 2) REPLY to this email by clicking "Reply" and then "Send" in your email program If you did not request, or do not want, a membership in the hersey-serbest group, please accept our apologies and ignore this message. Regards, Yahoo! Groups Customer Care Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
Re: On the orthogonality of anonymity to current market demand
-- John Kelsey > What's with the heat-death nonsense? Physical bearer > instruments imply stout locks and vaults and alarm > systems and armed guards and all the rest, all the way > down to infrastructure like police forces and armies > (private or public) to avoid having the biggest gang > end up owning all the gold. Electronic bearer > instruments imply the same kinds of things, and the > infrastructure for that isn't in place. It's like > telling people to store their net worth in their > homes, in gold. That can work, but you probably can't > leave the cheapest lock sold at Home Depot on your > front door and stick the gold coins in the same drawer > where you used to keep your checkbook. Some of us get spyware more than others. Further, genuinely secure systems are now becoming available, notably Symbian. While many people are rightly concerned that DRM will ultimately mean that the big corporation, and thus the state, has root access to their computers and the owner does not, it also means that trojans, viruses, and malware does not. DRM enables secure signing of transactions, and secure storage of blinded valuable secrets, since DRM binds the data to the software, and provides a secure channel to the user. So secrets representing ID, and secrets representing value, can only be manipulated by the software that is supposed to be manipulating it. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG 3CepcQ59MYKAZTizEycP1vkZBbexwbyiobaC/bXS 44hfxMF4PBKXmc5uavnegOFFCMtNwDmpIMxLBcyI3
Re: On the orthogonality of anonymity to current market demand
>From: "R.A. Hettinga" <[EMAIL PROTECTED]> >Sent: Oct 25, 2005 8:34 AM >To: cryptography@metzdowd.com, [EMAIL PROTECTED] >Subject: On the orthogonality of anonymity to current market demand ... >That is to say, your analysis conflicts with the whole trend towards >T-0 trading, execution, clearing and settlement in the capital >markets, and, frankly, with all payment in general as it gets >increasingly granular and automated in nature. The faster you can >trade or transact business with the surety that the asset in question >is now irrevocably yours, the more trades and transactions you can >do, which benefits not only the individual trader but markets as a >whole. The prerequisite for all this is that when the asset changes hands, it's very nearly certain that this was the intention of the asset's previous owner. My point isn't to express my love for book-entry payment systems. There's plenty to hate about them. But if the alternative is an anonymous, irreversible payment system whose control lies in software running alongside three pieces of spyware on my Windows box, they probably still win for most people. Even bad payment systems are better than ones that let you have everything in your wallet stolen by a single attack. ... >However "anonymous" irrevocability might offend one's senses and >cause one to imagine the imminent heat-death of the financial >universe (see Gibbon, below... :-)), I think that technology will >instead step up to the challenge and become more secure as a >result. What's with the heat-death nonsense? Physical bearer instruments imply stout locks and vaults and alarm systems and armed guards and all the rest, all the way down to infrastructure like police forces and armies (private or public) to avoid having the biggest gang end up owning all the gold. Electronic bearer instruments imply the same kinds of things, and the infrastructure for that isn't in place. It's like telling people to store their net worth in their homes, in gold. That can work, but you probably can't leave the cheapest lock sold at Home Depot on your front door and stick the gold coins in the same drawer where you used to keep your checkbook. >And, since internet bearer transactions are, by their very >design, more secure on public networks than book-entry transactions >are in encrypted tunnels on private networks, they could even be said >to be secure *in spite* of the fact that they're anonymous; that -- >as it ever was in cryptography -- business can be transacted between >two parties even though they don't know, or trust, each other. Why do you say internet bearer transactions are more secure? I can see more efficient, but why more secure? It looks to me like both kinds of payment system are susceptible to the same broad classes of attacks (bank misbehavior (for a short time), someone finding a software bug, someone breaking a crypto algorithm or protocol). What makes one more secure than the other? ... >Cheers, >RAH --John Kelsey
[EMAIL PROTECTED]: [Politech] U.S. passports to receive RFID implants starting in October 2006 [priv]]
- Forwarded message from Declan McCullagh - From: Declan McCullagh Date: Tue, 25 Oct 2005 13:23:23 -0700 To: politech@politechbot.com Subject: [Politech] U.S. passports to receive RFID implants starting in October 2006 [priv] User-Agent: Mozilla Thunderbird 1.0.6 (Macintosh/20050716) Text of regulations: http://edocket.access.gpo.gov/2005/05-21284.htm --- http://news.com.com/Passports+to+get+RFID+chip+implants/2100-7348_3-5913644.html?tag=nefd.top Passports to get RFID chip implants October 25, 2005, 12:12 PM PDT All U.S. passports will be implanted with remotely-readable computer chips starting in October 2006, the Bush administration has announced. Sweeping new State Department regulations issued Tuesday say that passports issued after that time will have tiny radio frequency ID (RFID) chips that can transmit personal information including the name, nationality, sex, date of birth, place of birth and digitized photograph of the passport holder. Eventually, the government contemplates adding additional digitized data such as "fingerprints or iris scans." Over the last year, opposition to the idea of implanting RFID chips in passports has grown amidst worries that identity thieves could snatch personal information out of the air simply by aiming a high-powered antenna at a person or a vehicle carrying a passport. Out of the 2,335 comments on the plan that were received by the State Department this year, 98.5 percent were negative. The objections mostly focused on security and privacy concerns. [...remainder snipped...] ___ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
On the orthogonality of anonymity to current market demand
-BEGIN PGP SIGNED MESSAGE- At 3:57 PM -0400 10/24/05, John Kelsey wrote: >More to the point, an irreversible payment system raises big practical >problems in a world full of very hard-to-secure PCs running the >relevant software. One exploitable software bug, properly used, can >steal an enormous amount of money in an irreversible way. And if your >goal is to sow chaos, you don't even need to put most of the stolen >money in your own account--just randomly move it around in >irreversible, untraceable ways, making sure that your accounts are >among the ones that benefit from the random generosity of the attack. >The payment system operators will surely be sued for this, because >they're the only ones who will be reachable. They will go broke, and >the users will be out their money, and nobody will be silly enough to >make their mistake again. Though I agree with the notion that anonymity is orthogonal to market demand at the moment, I think you lost me at the word "account", above. :-). That is to say, your analysis conflicts with the whole trend towards T-0 trading, execution, clearing and settlement in the capital markets, and, frankly, with all payment in general as it gets increasingly granular and automated in nature. The faster you can trade or transact business with the surety that the asset in question is now irrevocably yours, the more trades and transactions you can do, which benefits not only the individual trader but markets as a whole. The whole foundation of modern finance, and several -- almost posthumous, so pervasive was the homeopathic socialism that we now call Keynesianism -- Nobel prizes in economics are based on that premise, and it has been proven empirically now for many decades: The entire history of the currency futures markets would be a good example, though now that I think of it, any derivative market, since the time of Thales himself, would prove the point. However "anonymous" irrevocability might offend one's senses and cause one to imagine the imminent heat-death of the financial universe (see Gibbon, below... :-)), I think that technology will instead step up to the challenge and become more secure as a result. And, since internet bearer transactions are, by their very design, more secure on public networks than book-entry transactions are in encrypted tunnels on private networks, they could even be said to be secure *in spite* of the fact that they're anonymous; that -- as it ever was in cryptography -- business can be transacted between two parties even though they don't know, or trust, each other. For instance, another "problem" with internet bearer transactions, besides their prima facie "anonymity" (they're only prima facie because, while the protocols don't *require* is-a-person and-then-you-go-to-jail identity, traffic analysis is still quite trivial for the time being, onion routers notwithstanding) is that the client is responsible not only for most of the computation, but also for the storage of notes or coins, instead of a central database in a clearinghouse or bank somewhere "storing" various offsetting book-entries in, as you noted above, "accounts". :-). Of course, simply backing up one's data off-site, much easier with internet bearer certificates than with whole databases, solves this problem, and, as we all know here, the safest way to do *that* is to use some kind of m-of-n hash, stored, someday, for even smaller bits of cash :-), in many places on the net at once. Obviously, we don't need small cash to store big assets, any more than we need big servers to distribute big files in BitTorrent, but it will only accelerate, if not complete, the process, when we get there. As I have said, too many times :-), about these things, transaction cost is always going to be the critical factor in any change from book-entries to chaumian-esque internet bearer transactions. And I believe that, hand-in-hand with increased security, reduced transaction cost is more a function of the collapsing cost and the ubiquity of distributed processing power and network access than anything else. So, anonymity is, in fact, orthogonal to market demand, primarily because it's an *effect*, and not a cause, of that demand. As we all do now with the current proctological state of book-entry finance, the anonymity of a proposed internet bearer transaction infrastructure will just be a "cost" that the market would have to bear. :-). To channel Schopenhauer a bit, like the emergence of industrialism and the abolition of slavery was before it, once anonymity becomes a "feature" of our transaction infrastructure, people will eventually declare it to be not only self-evident all along, but a moral *prerequisite* of any transaction as well. To put it another way, it's a pity for acrophobics that
You are invited to participate
Title: You are invited to participate You are invited to participate The Elimination of User Fees - eLearning Made Available To Everyone Dear list member,We cordially invite you to participate in the first of a four part online seminar series titled “Elearning – making the MOST of your Investment”. This session is of particular value for those involved with eLearning and Training for the US Government and associated organizations. There will be valuable insights, strategies and recent offering for this group made available. An eLearning expert and thought leader from the NTIS will share important and timely changes. Others, outside of the US Government will also find this session interesting, valuable and thought provoking. Please join your industry peers as they participate in this timely and exciting topic. Anyone who has been involved in eLearning projects understands the problems and issues. In this series we will examine four of the main issues that plaque eLearning projects and that eliminate (or nearly eliminate) any ROI. These are; • User Fees! The practice of charging you more for each person who can now take eLearning on you platform • Installations of eLearning platforms that take months and months, all charged to you at a high T&M rate • Poor Scalability that has you either eliminating some potential users, or adding “box after box” to accommodate users • Poor stability, leaving your users frustrated, high call volume to the call center and certain distain for eLearning in general This seminar series examines each topic, exposes the fallacies generally used by vendors to explain each, and gives you as an eLearning professional insights and arms you with knowledge. Then as you speak with others, negotiate with vendors, or simply attempt to do you job to your maximum potential you will have the power to do the best possible. Oh and the best part, these are FREE!! The schedule of these seminar are as follows; (replays will be available on request, but also FREE!!) The Elimination of User Fees - eLearning Made Available To Everyone;Presented Nov 1 @ 2 PM eastern Rapid Installation of an eLearning Platform - I don’t have time to wait;Presented Dec 6 @ 2 PM eastern Scalability - Why That is Important to Determine Before You Buy ; Presented Jan. 10, ’06 @ 2 PM eastern Stability - I Need the Platform Available for My People to Use;Presented Feb 7 ’06, @ 2 PM eastern During this first session, Mr. Case and our SME (Subject Matter Expert) from NTIS (National Technical Information Service) will share some statistics on how expensive User Fees can be. Also they will present how some companies have dealt with User Fees and how they have modified their exposure to their eLearning participants so they can meet their budgets. Additionally they will go over some innovative things that have been accomplished by organizations that have the luxury of platforms with out User Fees. Finally they will be asking for you participation in adding your own ideas about User Fees and what you would use a platform for that does not have User Fees. Just Imagine for a moment…what kind of eLearning Return on Investment would you realize if there were no User Fees! With no User Fees, No upload Fees, no maintenance Fees, no upgrade Fees, in fact no other fees than the license fee, it is now possible to accomplish Great Things for a very large audience. Yes, with no user fees, you can invite ALL of your customers to take eLearning, Yes you can invite prospective customers to take eLearning. Yes before you even ask, YES, you could invite the entire world to take eLearning If you are involved with any aspect of developing and fielding effective eLearning, we encourage you to attend these valuable seminars as we presents fresh ideas that will serve as a thought-provoking basis for decision-makers to map a sensible eLearning vision going forward. The session will be approximately one hour in duration and there is no charge to participate in the event. Finally, you will have the opportunity to ask questions of the speaker and online experts via chat room. For additional information or to register for this free event, please visit http://www.kmsi.us/series.htm or call us toll-free at (866) 501-5674. Sincerely, Jack E. Lee President Knowledge Management Solutions, Inc Elearning: Making the MOST of your Investment-Part 1 Click here for registration Knowledge Management Solutions, Inc. 839 Elkridge Landing Road Suite 205 Linthicum, MD 21090 Phone: (866) 501-5674 Fax: (410) 859-3414 Web site: http://www.kmsi.us E-mail: [EMAIL PROTE
[EMAIL PROTECTED]: [IP] more on Colleges protest netwoprk upgrades to allow easier surveillance]
- Forwarded message from David Farber <[EMAIL PROTECTED]> - From: David Farber <[EMAIL PROTECTED]> Date: Sat, 22 Oct 2005 16:36:43 -0400 To: Ip Ip Subject: [IP] more on Colleges protest netwoprk upgrades to allow easier surveillance X-Mailer: Apple Mail (2.734) Reply-To: [EMAIL PROTECTED] Begin forwarded message: From: finin <[EMAIL PROTECTED]> Date: October 22, 2005 3:22:57 PM EDT To: Dave Farber <[EMAIL PROTECTED]> Subject: Colleges protest netwoprk upgrades to allow easier surveillance According to this story, the only complaint from colleges is the cost. In addition to ultimate concerns about privacy, are there also technical issues that might come up, like adding to latency or congestion? Many universities are engaged in building and testing innovative high speed computation and communication applications and testbeds that span the Internet. Would a required re-architecting of campus networks cause problems for this kind of research? I'm not expert enough in these areas to have a well informed opinion. Tim -- Colleges Protest Call to Upgrade Online Systems By Sam Dillon and Stephen Labaton, NYT, October 23, 2005 http://www.nytimes.com/2005/10/23/technology/23college.html? pagewanted=all The federal government, vastly extending the reach of an 11-year-old law, is requiring hundreds of universities, online communications companies and cities to overhaul their Internet computer networks to make it easier for law enforcement authorities to monitor e-mail and other online communications. The action, which the government says is intended to help catch terrorists and other criminals, has unleashed protests and the threat of lawsuits from universities, which argue that it will cost them at least $7 billion while doing little to apprehend lawbreakers. Because the government would have to win court orders before undertaking surveillance, the universities are not raising civil liberties issues. The order, issued by the Federal Communications Commission in August and first published in the Federal Register last week, extends the provisions of a 1994 wiretap law not only to universities, but also to libraries, airports providing wireless service and commercial Internet access providers. It also applies to municipalities that provide Internet access to residents, be they rural towns or cities like Philadelphia and San Francisco, which have plans to build their own Net access networks. So far, however, universities have been most vocal in their opposition. ... The universities do not question the government's right to use wiretaps to monitor terrorism or criminal suspects on college campuses, Mr. Hartle said, only the order's rapid timetable for compliance and extraordinary cost. ... But the federal law would apply a high-tech approach, enabling law enforcement to monitor communications at campuses from remote locations at the turn of a switch. It would require universities to re-engineer their networks so that every Net access point would send all communications not directly onto the Internet, but first to a network operations center where the data packets could be stitched together into a single package for delivery to law enforcement, university officials said. ... Law enforcement has only infrequently requested to monitor Internet communications anywhere, much less on university campuses or libraries, according to the Center for Democracy and Technology. In 2003, only 12 of the 1,442 state and federal wiretap orders were issued for computer communications, and the F.B.I. never argued that it had difficulty executing any of those 12 wiretaps, the center said. "We keep asking the F.B.I., What is the problem you're trying to solve?" Mr. Dempsey said. "And they have never showed any problem with any university or any for-profit Internet access provider. The F.B.I. must demonstrate precisely why it wants to impose such an enormously disruptive and expensive burden." ... -- Tim Finin, Computer Science & Electrical Engineering, Univ of Maryland Baltimore County, 1000 Hilltop Cir, Baltimore MD 21250. [EMAIL PROTECTED] http://ebiquity.umbc.edu 410-455-3522 fax:-3969 http://umbc.edu/~finin ----- You are subscribed as [EMAIL PROTECTED] To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Please confirm your request to join sari-larcivert
Hello cypherpunks@minder.net, We have received your request to join the sari-larcivert group hosted by Yahoo! Groups, a free, easy-to-use community service. This request will expire in 7 days. TO BECOME A MEMBER OF THE GROUP: 1) Go to the Yahoo! Groups site by clicking on this link: http://groups.yahoo.com/i?i=MjNVSoJ7qxkVPHJolXVTBo2c4zQ&e=cypherpunks%40minder%2Enet (If clicking doesn't work, "Cut" and "Paste" the line above into your Web browser's address bar.) -OR- 2) REPLY to this email by clicking "Reply" and then "Send" in your email program If you did not request, or do not want, a membership in the sari-larcivert group, please accept our apologies and ignore this message. Regards, Yahoo! Groups Customer Care Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
[Clips] FDIC: Putting an End to Account-Hijacking Identity Theft Study Supplement
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Thu, 20 Oct 2005 00:39:23 -0400 To: Philodox Clips List <[EMAIL PROTECTED]> From: "R.A. Hettinga" <[EMAIL PROTECTED]> Subject: [Clips] FDIC: Putting an End to Account-Hijacking Identity Theft Study Supplement Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] <http://www.fdic.gov/consumers/consumer/idtheftstudysupp/index.html> ? Home > Consumer Protection > Consumer Resources > Putting an End to Account-Hijacking Identity Theft Study Supplement Putting an End to Account-Hijacking Identity Theft Study Supplement Federal Deposit Insurance Corporation Division of Supervision and Consumer Protection Technology Supervision Branch June 17, 2005 This publication supplements the FDIC's study Putting an End to Account-Hijacking Identity Theft published on December 14, 2004. Printable Version - PDF 105k (PDF Help) Table of Contents Executive Summary and Findings Focus of Supplement Identity theft in general and account hijacking in particular continue to be significant problems for the financial services industry and consumers. Recent studies indicate that identity theft is evolving in more complicated ways that make it more difficult for consumers to protect themselves. Recent studies also indicate that consumers are concerned about online security and may be receptive to using two-factor authentication if they perceive it as offering improved safety and convenience. This Supplement discusses seven additional technologies that were not discussed in the Study. These technologies, as well as those considered in the Study, have the potential to substantially reduce the level of account hijacking (and other forms of identity theft) currently being experienced. Findings Different financial institutions may choose different solutions, or a variety of solutions, based on the complexity of the institution and the nature and scope of its activities. The FDIC does not intend to propose one solution for all, but the evidence examined here and in the Study indicates that more can and should be done to protect the security and confidentiality of sensitive customer information in order to prevent account hijacking. Thus, the FDIC presents the following updated findings: 1 The information security risk assessment that financial institutions are currently required to perform should include an analysis to determine (a) whether the institution needs to implement more secure customer authentication methods and, if it does, (b) what method or methods make most sense in view of the nature of the institution's business and customer base. 2 If an institution offers retail customers remote access to Internet banking or any similar product that allows access to sensitive customer information, the institution has a responsibility to secure that delivery channel. More specifically, the widespread use of user ID and password for remote authentication should be supplemented with a reliable form of multifactor authentication or other layered security so that the security and confidentiality of customer accounts and sensitive customer information are adequately protected. Last Updated 6/27/2005 [EMAIL PROTECTED] HomeContact UsSearchHelpSiteMapForms Freedom of Information ActWebsite PoliciesFirstGov.gov -- - R. A. Hettinga The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' ___ Clips mailing list [EMAIL PROTECTED] http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- - R. A. Hettinga The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: [Politech] More on Barney lawyer yearning to hack copyright infringers' sites [ip]
On 2005-10-19T10:37:55-0700, Declan McCullagh wrote: > Previous Politech message: > http://www.politechbot.com/2005/10/17/barney-lawyer-recommends/ > Responses: > http://www.politechbot.com/2005/10/19/more-on-barney/ Some of the first-round responses mentioned the iniquities involved in attacking hosted sites, but what if the site that appears to be involved in copyright infringement isn't? There is no assurance that the suspect IP address isn't forwarding illegal (outgoing) traffic from some other machine, or that it doesn't forward incoming traffic to some other machine. Suppose someone has a wireless firewall appliance set up to forward a number of common ports to an interior server. Attacking a suspect IP results in an attack on an uninvolved interior server. The copyright violation might be some unauthorized person connecting through a wireless gateway, so the owner of the interior server might not be in any way connected to the copyright violation. Suppose someone is running a web proxy. An attack on a suspect IP address results in an attack on the machine running the web proxy. An open web proxy, while it may violate an ISP contract, is not illegal, and by itself the proxy is not connected to any illegal activity (except maybe in China, etc.). Suppose someone is involved in copyright infringement, but forwards all incoming connections on certain ports [while dropping traffic to the rest...] to an IP address associated with the Chinese Embassy. Is it clear who's responsible when a copyright holder ends up attacking a Chinese computer? Even if the person who set up the port forwarding is responsible for _connections_ to the Chinese Embassy made as a result, does that make him responsible for willful attacks conducted by copyright holders? If copyright hackers get immunity as long as they attack the public IP address that appears to be distributing copyrighted material, the consequences will be much worse than those of DMCA take-down provisions. ISPs everywhere would police their own networks with a vengeance to mitigate the risk that some copyright holder would find something first, attack the ISP, and cause major damage (not to mention subsequent loss of customers). At least with the DMCA, ISPs get notified and have a chance to act before something bad happens, which generally means low levels of in-house policing.
Failed to clean virus file Bill.zip
The file you have sent was infected with a virus but InterScan E-Mail VirusWall could not clean it.
Imaging gels or microarrays? Look to PerkinElmer.
If you’re planning an imaging system purchase in 2005, be sure to demo the best performing imaging systems on the market—PerkinElmer. You’ll receive a free Apple iPod with a qualifying purchase of any microarray or gel imaging system—even if it’s not one of ours! Why should you consider a PerkinElmer imaging system? Superior performance, reliability, and support. Labs that try PerkinElmer imaging systems buy them. We’re so confident you’ll find our systems’ performance superior to any others that if you purchase a PerkinElmer ProScanArray® Microarray Analysis System or ProXPRESS™ 2D Proteomic Imaging System or any comparable imaging system by December 20, 2005, we’ll give you an iPod mini with JBL speakers for your lab.* *It's easy to demo our imaging systems. Visit www.perkinelmer.com/imagingdemo2 for complete rules and to register for a free demo. You'll see a system whose performance and reliability you can trust, so you can purchase it with confidence. ProScanArray® Microarray Analysis System Our super sensitive microarray scanner maximizes discrimination in signal and readily detects differences between spots. Learn more. ProXPRESS™ 2D Proteomic Imaging System Our multi-color fluorescence 2D and 1D gel imager has the best image quality, speed and resolution on the market. Learn more. ©2005 PerkinElmer, Inc. All rights reserved. The PerkinElmer logo and design and ProScanArray are registered trademarks and ProXPRESS is a trademark of PerkinElmer, Inc. iPod is a registered trademark of Apple Computer, Inc. PerkinElmer reserves the right to change this document at any time without notice and disclaims liability for editorial, pictorial or typographical errors. 007436_02 Copyright© 2005 PerkinElmer, Inc. All rights reserved. To unsubscribe, CLICK Here or if the email address is not clickable, simply copy the text to the right of the 'mailto:' [EMAIL PROTECTED] command and paste it into your email application and hit send. You will be taken off the list immediately. Thank you! PerkinElmer Life & Analytical Sciences710 Bridgeport AvenueShelton, CT 06484(203)402-6892
[EMAIL PROTECTED]: cost to install surveillance cameras in public places]
- Forwarded message from [EMAIL PROTECTED] - From: [EMAIL PROTECTED] Date: Thu, 13 Oct 2005 03:37:01 -0400 (EDT) To: kragen-tol@canonical.org Subject: cost to install surveillance cameras in public places Suppose you wanted to plant a hidden camera for some long period of time and capture photos of all that went past. You'd like to never again have to enter the place where it's hidden, and only visit it rarely; you'd like it to be small; and you'd like it to last a long time. For example, the book "The Social Life of Small Urban Spaces" was based on a few years of research in this vein using Super 8 cameras for time-lapse photography. It appears to me that this equipment should now be incredibly cheap. USB "webcams" that capture 100-kB 640x480 JPEGs are on the order of $10. I think 4-port USB hubs (again, on the order of $10) contain all the hardware necessary to act as USB host controllers; one could imagine integrating the USB hub hardware with a small single-board computer with SD/MMC and Bluetooth interfaces, for a total cost on the order of $50 plus up to 4 cameras and their USB cables, and an MMC card ($50-$110). This device would presently be limited in smallness only by the size of its power supply, USB ports, and multi-chip integration, so it could be concealed in many places. You could probably run it on 200mW when running (for less than a second) and <1mW when idle. You could drop by periodically with an inconspicuous Bluetooth device, such as a cellphone or laptop, to download the pictures (say, 4 cameras * 100kB/shot/camera * 4 shots / minute * 60 minutes/hour * 24 hours/day = 2.3GB/day; but one shot per minute is only 144MB/day). Anyone snooping over Bluetooth at the time could tell that a lot of data was being sent over Bluetooth (1megabit/sec? not sure; but at that speed you'd have to spend 2300 seconds in the vicinity.) Alternatively, you could use a directional antenna from hundreds of meters away (the "Bluesniper" folks managed to do 1km.) An adaptive surveillance algorithm could shoot four times per minute until the data card was full, followed by twice a minute (replacing every other old shot, starting with the oldest) until the data card was all full at twice a minute, then once per minute (thinning out old shots to once a minute) until it was full again, etc. Supposing that USB 12Mbps transfers were the limiting factor, you'd need about 67ms of "on time" per shot, or (according to my 200mW estimate above) 13.4 mJ. My laptop's Li-ion battery supposedly holds around 46Wh, or 165kJ (abridged info below): $ cat /proc/acpi/battery/BAT1/state present rate:1227 mA remaining capacity: 2579 mAh present voltage: 11300 mV $ cat /proc/acpi/battery/BAT1/info design capacity: 4500 mAh last full capacity: 4067 mAh design voltage: 10800 mV model number:XM2018P02 battery type:Li-ION 11.3V * 4.067Ah = 46Wh. On that basis, my laptop's battery could power 12 000 000 invasions of privacy by this system --- saving that many camera shots to an MMC card. It might only be able to power 4 000 000 invasions of privacy if it had to transmit them all over Bluetooth. Still, that's nearly six months in the four-shots-with-four-cameras-per-minute maxi configuration described above, where you'd have to come download up your photos at least once a day, and at one camera shooting once per minute, it would last 8 years. (I'm assuming that the webcams power up instantly. This may be unreasonable.) Obviously you could do a similar job with audio surveillance, but ironically, this may consume more storage and power; minimally comprehensible speech is 10kbps under the best of conditions, so you'd need at least 108MB/day, and probably several times that to get anything useful. You'd need some very-low-power constantly-on device to buffer the audio so you wouldn't have to run the CPU all the time. A similar system, but without the cameras or other transducers, could serve as a maildrop or backup server (for data with high value per byte, obviously). We can anticipate that the power and monetary cost of data storage and transmission will decrease considerably more before Moore's Law runs out. - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Mail delivery failed: returning message to sender
|- Failed addresses follow: -| <[EMAIL PROTECTED]> unknown user / Teilnehmer existiert nicht |--- Message text follows: (body too large, truncated) --| Received: from minder.net ([81.117.138.91]) by mailin12.sul.t-online.de with esmtp id 1EPEwD-1n0G3M0; Tue, 11 Oct 2005 09:52:41 +0200 From: cypherpunks@minder.net To: [EMAIL PROTECTED] Subject: Mail System Error - Returned Mail Date: Tue, 11 Oct 2005 09:41:11 +0200 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="=_NextPart_000_0008_9EC27161.61A4B283" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2600. X-MIMEOLE: Produced By Microsoft MimeOLE V6
[EMAIL PROTECTED]: [p2p-hackers] Workshop on Dependable and Sustainable Peer-to-Peer Systems]
- Forwarded message from Sam Joseph <[EMAIL PROTECTED]> - From: Sam Joseph <[EMAIL PROTECTED]> Date: Tue, 11 Oct 2005 03:53:51 +0900 To: "Peer-to-peer development." <[EMAIL PROTECTED]>, [EMAIL PROTECTED] Subject: [p2p-hackers] Workshop on Dependable and Sustainable Peer-to-Peer Systems Organization: NeuroGrid http://www.neurogrid.net/ User-Agent: Mozilla Thunderbird 1.0.2 (Windows/20050317) Reply-To: [EMAIL PROTECTED], "Peer-to-peer development." <[EMAIL PROTECTED]> [CALL FOR PAPERS] The First International Workshop on Dependable and Sustainable Peer-to-Peer Systems (DAS-P2P 2006) is the first workshop which focuses on dependability and sustainability of P2P systems, with respect to their designs, operations, applications and social impacts. Peer-to-Peer (P2P) can be a promising technology on which we can depend lives of ours and our children, upon which we can build sustainable societies. Designs of P2P systems are characterized by their usage of overlay networks such that there is symmetry in the roles among participants. This implies distribution of authorities, not only preventing introduction of single points of failure, but also assuring a level of autonomy which allows many of us to spontaneously start, maintain, or recover from failures of, such systems. Although difficulties exist, such as uncertainty in the trust among participants, one needs to be aware that such difficulties are, in many parts, due to our own human nature; depending on P2P is, in fact and literally, depending on ourselves and our friends, which seem to be the only ones we can trust anyway, when it comes to our own survival. The goal of this workshop is to share experiences, insights and new ideas, and set forth research agendas and suggestive future directions by collaborations among researchers with different disciplines and with similar interests toward dependability and sustainability. The following is a non-exhaustive list of relevant topics: ** Designs and operations of dependable and sustainable P2P systems - Self-organization and emergence - Attack-resistance - Fault tolerance - Sustainable operations - Sustainable mutual trust - Sustainable reciprocal relationships ** Applications and social impacts of dependable and sustainable P2P systems - Sustainable economy - Sustainable governance - Sustainable lifestyles - Rescue activities - Post-catastrophic recovery - Tackling environmental problems The program of the workshop will be a combination of invited talks, paper presentations and discussions. [SUBMISSION INSTRUCTIONS] The workshop invites your contributions of previously unpublished papers, which will be selected based on their originality, technical merit and topical relevance. Papers will also be selected by the likelihood that they will lead to interesting and fruitful discussions at the workshop. Your contributions should be formatted acoording to the IEEE Computer Society Press Proceedings Author Guidelines: 10-point Times, single-spaced, two-column format (see http://www.tinmith.net/tabletop2006/IEEE/Format/instruct.htm for detail). Each of your contributions should not exceed 8 pages. See the workshop web site (http://das-p2p.wide.ad.jp/) for the submission procedure. [PUBLICATION] Proceedings of the workshop will be published by IEEE Computer Society Press. [IMPORTANT DATES] Paper submission due: December 4th, 2005 Notification of acceptance: January 15th, 2006 Camera-ready copies due: February 1st, 2006 Author registration due: February 1st, 2006 Workshop: April 20th-22nd, 2006 (exact date is to be decided) [REGISTRATION] Workshop registration will be handled by the ARES 2006 organization along with the main conference registration. [ORGANIZING COMMITTEE] Program co-chairs: Yusuke Doi Communication Platform Laboratory, Corporate R&D Center, TOSHIBA Corporation 1 Komukai-Toshiba-Cho, Saiwai-Ku, Kawasaki Kanagawa 212-8582 Japan Youki Kadobayashi Graduate School of Information Science Nara Institute of Science and Technology Takayama 8916-5, Ikoma Nara 630-0192 Japan Kenji Saito (main contact) Graduate School of Media and Governance Keio University 5322 Endo, Fujisawa Kanagawa 252-8520 Japan [EMAIL PROTECTED] [PROGRAM COMMITTEE] See the workshop web site (http://das-p2p.wide.ad.jp/). - ___ p2p-hackers mailing list [EMAIL PROTECTED] http://zgp.org/mailman/listinfo/p2p-hackers ___ Here is a web page listing P2P Conferences: http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
/. [You Need Not Be Paranoid To Fear RFID]
Link: http://slashdot.org/article.pl?sid=05/10/10/0643235 Posted by: Zonk, on 2005-10-10 10:32:00 An anonymous reader writes "A story at the Boston Globe [1]covers extensive privacy abuses involving RFID." From the article: "Why is this so scary? Because so many of us pay for our purchases with credit or debit cards, which contain our names, addresses, and other sensitive information. Now imagine a store with RFID chips embedded in every product. At checkout time, the digital code in each item is associated with our credit card data. From now on, that particular pair of shoes or carton of cigarettes is associated with you. Even if you throw them away, the RFID chips will survive. Indeed, Albrecht and McIntyre learned that the phone company BellSouth Corp. had applied for a patent on a system for scanning RFID tags in trash, and using the data to study the shopping patterns of individual consumers." I think they may be going a little overboard with their stance, but it's always interesting to talk about. References 1. http://www.boston.com/business/globe/articles/2005/10/10/you_need_not_be_paranoid_to_fear_rfid?mode=PF - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Revision to Your Amazon.com Information
Revision to Your Amazon.com Information
At the last reviewing at your amazon account we discovered that your information is inaccurate. We apologize for this but because most frauds are possible because we don't have enough information about our clients, we require this verification. Please login and reenter your personal information. Please follow this link to update your personal information: http://www.amazon.com/exec/obidos/sign-in.html (To complete the verification process you must fill in all the required fields) Please note: If you don't update your information within next 48 hours , we will be forced to suspend your account untill you have the time to contact us by phone. We apreciate your support and understanding, as we work together to keep amazon market a safe place to trade. Thank you for your attention on this serious matter and we apologize. This message was generated automatically, please do not reply to it. Amazon treats your personal information with the utmost care, and our Privacy Policy is designed to protect you and your information.
Re: Just to make your life more paranoid:) Re: Surreptitious Tor Messages?
Steve Furlong wrote... The noisy protocol has the added benefit of causing the network cable to emit lots of radiation, frying the brains of TOR users. The only defense is a hat made of flexible metal. More than that, I'd bet they engineered that noise to stimulate the very parts of the brain responsible for Wikipedia entries... -TD
Re: Just to make your life more paranoid:) Re: Surreptitious Tor Messages?
On Tue, 4 Oct 2005, Steve Furlong wrote: > On 10/4/05, gwen hastings <[EMAIL PROTECTED]> wrote: > > Troll Mode on: > > TOR was originally developed as a result of CIA/NRL funding:) > ... > > BTW running TOR makes you very visible that you are running tor even as > > a client.. its quite a noisy protocol > > Well, of course that "feature" is built in. The NSA wants to be able > to easily find anyone who's running it. > > The noisy protocol has the added benefit of causing the network cable > to emit lots of radiation, frying the brains of TOR users. The only > defense is a hat made of flexible metal. Don't do it! That acts as an antenna and only increases the damage! -- "Invoking the supernatural can explain anything, and hence explains nothing." - University of Utah bioengineering professor Gregory Clark
Re: Just to make your life more paranoid:) Re: Surreptitious Tor Messages?
On 10/4/05, gwen hastings <[EMAIL PROTECTED]> wrote: > Troll Mode on: > TOR was originally developed as a result of CIA/NRL funding:) ... > BTW running TOR makes you very visible that you are running tor even as > a client.. its quite a noisy protocol Well, of course that "feature" is built in. The NSA wants to be able to easily find anyone who's running it. The noisy protocol has the added benefit of causing the network cable to emit lots of radiation, frying the brains of TOR users. The only defense is a hat made of flexible metal. -- There are no bad teachers, only defective children.
[EMAIL PROTECTED]: Re: Hooking nym to wikipedia]
- Forwarded message from cyphrpunk <[EMAIL PROTECTED]> - From: cyphrpunk <[EMAIL PROTECTED]> Date: Tue, 4 Oct 2005 11:35:43 -0700 To: [EMAIL PROTECTED] Cc: cryptography@metzdowd.com Subject: Re: Hooking nym to wikipedia Reply-To: cyphrpunk <[EMAIL PROTECTED]> On 10/3/05, Jason Holt <[EMAIL PROTECTED]> wrote: > > More thoughts regarding the tokens vs. certs decision, and also multi-use: This is a good summary of the issues. With regard to turning client certs on and off: from many years of experience with anonymous and pseudonymous communication, the big usability problem is remembering which mode you are in - whether you are identified or anonymous. This relates to the technical problem of preventing data from one mode from leaking over into the other. The best solution is to use separate logins for the two modes. This prevents any technical leakage such as cookies or certificates. Separate desktop pictures and browser skins can be selected to provide constant cues about the mode. Using this method it would not be necessary to be asked on every certificate usage, so that problem with certs would not arise. (As far as the Chinese dissident using net cafes, if they are using Tor at all it might be via a USB token like the one (formerly?) available from virtualprivacymachine.com. The browser on the token can be configured to hold the cert, making it portable.) Network eavesdropping should not be a major issue for a pseudonym server. Attackers would have little to gain for all their work. The user is accessing the server via Tor so their anonymity is still protected. Any solution which waits for Wikimedia to make changes to their software will probably be long in coming. When Jimmy Wales was asked whether their software could allow logins for "trusted" users from otherwise blocked IPs, he didn't have any idea. The technical people are apparently in a separate part of the organization. Even if Jimmy endorsed an idea for changing Wikipedia, he would have to sell it to the technical guys, who would then have to implement and test it in their Wiki code base, then it would have to be deployed in Wikipedia (which is after all their flagship product and one which they would want to be sure not to break). Even once this happened, the problem is only solved for that one case (possibly also for other users of the Wiki code base). What about blogs or other web services that may decide to block Tor? It would be better to have a solution which does not require customization of the web service software. That approach tries to make the Tor tail wag the Internet dog. The alternative of running a pseudonym based web proxy that only lets "good" users pass through will avoid the need to customize web services on an individual basis, at the expense of requiring a pseudonym quality administrator who cancels nyms that misbehave. For forward secrecy, this service would expunge its records of which nyms had been active, after a day or two (long enough to make sure no complaints are going to come back). As far as the Unlinkable Serial Transactions proposal, the gist of it is to issue a new blinded token whenever one is used. That's a clever idea but it is not adequate for this situtation, because abuse information is not available until after the fact. By the time a complaint arises the miscreant will have long ago received his new blinded token and the service will have no way to stop him from continuing to use it. I could envision a complicated system whereby someone could use a token on Monday to access the net, then on Wednesday they would become eligible to exchange that token for a new one, provided that it had not been black-listed due to complaints in the interim. This adds considerable complexity, including the need to supply people with multiple initial tokens so that they could do multiple net accesses while waiting for their tokens to be eligible for exchange; the risk that exchange would often be followed immediately by use of the new token, harming unlinkability; the difficulty in fully black-listing a user who has multiple independent tokens, when each act of abuse essentially just takes one of his tokens away from him. Overall this would be too cumbersome and problematic to use for this purpose. Providing forward secrecy by having the nym-based web proxy erase its records every two days is certainly less secure than doing it by cryptographic means, but at the same time it is more secure than trusting every web service out there to take similar actions to protect its clients. Until a clean and unemcumbered technological approach is available, this looks like a reasonable compromise. CP - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED] - End forwarded message - -- Eugen* Leitl http://leitl.org"
Just to make your life more paranoid:) Re: Surreptitious Tor Messages?
Troll Mode on: TOR was originally developed as a result of CIA/NRL funding:) compile your own client and examine sources if you have this particular brand of paranoia(I do) change to an OS which makes this easy ... BTW running TOR makes you very visible that you are running tor even as a client.. its quite a noisy protocol Troll Mode off: :) Tyler Durden wrote: Can anyone suggest a tool for checking to see if my Tor client is performing any surreptitious signaling? Seems to me there's a couple of possibilities for a TLA or someone else to monitor Tor users. Tor clients purchased online or whatever could possibly signal a monitoring agency for when and possibly where the user is online. This would mean that at bootup, some surreptitious packets could be fired off. The problem here is that a clever TLA might be able to hide its POP behind the Tor network, so merely checking on IP addresses on outgoing packets wouldn't work. Can anyone recommend a nice little package that can be used to check for unusual packets leaving my machine through the tor client? -TD
Open now to confirm your email at eBay
Please note that this is a system generated email. Please do not reply to this email. If you have questions, please click the following link or paste it in your browser. http://pages.ebay.com/help/basics/select-support.html You're almost done To confirm your email address on file at eBay, just click the button below and re-enter your email address: This will confirm to eBay that your email is working. Alternative Instructions If the above button does not work, click the link below and follow the same steps suggested above: http://pages.ebay.com/confirmemail If you need additional help, contact eBay's Customer Support by typing in or copying and pasting this link into your Web browser: http://pages.ebay.com/support Visit our Privacy Policy and User Agreement if you have any questions. Copyright © 1995-2005 eBay Inc. All Rights Reserved. Designated trademarks and brands are the property of their respective owners. eBay and the eBay logo are trademarks of eBay Inc.
A San Diego based referral service, looking to add new service providers
Hello we are building up our directory of San Diego based businesses. The name of our company is All Services Finders. This service is free to the seeker of services and has a minimal cost to the provider of services. Please email us if you wish to get additional information. Sincerely Michael Benoit
[EMAIL PROTECTED]: Re: Abuse resistant anonymous publishing - Proposed solution to the Wikipedia issue.]
- Forwarded message from Jimmy Wales <[EMAIL PROTECTED]> - From: Jimmy Wales <[EMAIL PROTECTED]> Date: Thu, 29 Sep 2005 18:26:48 -0400 To: [EMAIL PROTECTED] Subject: Re: Abuse resistant anonymous publishing - Proposed solution to the Wikipedia issue. User-Agent: Mozilla Thunderbird 1.0.2 (Macintosh/20050317) Reply-To: [EMAIL PROTECTED] Ben Burch wrote: > The biggest problem I see is that if moderation is commissive, rather > than reactive, then if the original poster commits a crime (like > violating the Official Secrets Act) then the moderator who approves the > posting would likely be liable for the same crime. Well, at least with respect to Wikipedia there are a few misconceptions I should clear up. First, something like that wouldn't be appropriate for Wikipedia on editorial grounds. ("No original research") -- we have specific intellectual standards that would generally preclude that sort of thing. Second, 'moderation' at wikipedia is reactive. That is, people vandalize, and then we clean it up. > The only solution I can think of that would allow Tor and Wiki to > interoperate would be to have a Tor-Wikipedia Moderation Team who would > actively look for Wikipedia vandalism originating from Tor exit nodes, > and revert out vandal's postings promptly. > > The support we would need from Wikipedia would be minor; Wiki would > have to implement a Watch function for postings from Tor exit nodes > that the Tor-Wikipedia moderation team would get email notifications > on. There already are exit node listings that would allow Wikipedia to > create and refresh this list on a regular basis, and obviously they can > already do that as they have implemented a block. Wikipedia would have > to agree that the Tor-Wikipedia Moderation Team would have the right to > revert ANY change from a Tor exit node without discussion. Once the > vandals realize that they won't have any fun using Tor to vandalize > Wikipedia, the job of the TWMT would get quite easy, as I don't imagine > there would be more than a few dozen real edits on any given day from > the Tor cloud. > > Or am I barking up the wrong tree here? Well, it seems unlikely that we could recruit enough people to do this effectively. We already have a huge number of people monitoring the site, people who are (mostly) sympathetic to Tor's aims, but they get tired of it. --Jimbo - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
RE: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]
Sunder wrote: >I've been ignoring this list for a while, so sorry for the late posting. >I remember sometime in late 99, I had one of the early blackberry >pagers, the small ones that ate a single AA battery which lasted about a >week or so, and had email + a small web browser inside of it. It wasn't >the blackberry phone. Anyway, long story short, one day, said pager >crashed (it is a computer after all) and I was trying to figure out how >to reboot it, so I thought, fuck it, and removed the battery, the fucker >stayed ON! For over 15 minutes! >Gee, I wonder why anyone would design a cell phone or pager to be able >to stay on after its battery is pulled out. Yeah, yeah, it's just a >capacitor or an internal rechargeable battery, but why would you want >such a feature? There is a damn good reason. PDAs, pagers, and cellphones often hold a great deal of info the owner regards as valuable, and which they don't want to lose - phone lists, email, addresses, etc. Battery changes are a potential source of loss, since (until recently) all these devices used volatile memory. Adding a capacitor to give the user a few minutes grace to fumble with his AAs is an essential feature. Most users, for better or worse, aren't cypherpunks or terribly conscious about personal privacy, and regard preserving their data as a very high priority. All the PDAs I've dealt with (and I've written SW for a number of them) have a 'hard reset' protocol - usually pressing the power button while engaging the recessed reset button - which clears out all memory. Peter Trei
[EMAIL PROTECTED]: [IP] eDonkey to close]
Now we will see how good the anonymizing networks are, and how long it will take until they will become a target. I'm surprised it has taken them so long. I'd expect this would have happened at least 5 years ago. - Forwarded message from David Farber <[EMAIL PROTECTED]> - From: David Farber <[EMAIL PROTECTED]> Date: Wed, 28 Sep 2005 18:33:21 -0400 To: Ip Ip Subject: [IP] eDonkey to close X-Mailer: Apple Mail (2.734) Reply-To: [EMAIL PROTECTED] Begin forwarded message: From: dep21 <[EMAIL PROTECTED]> Date: September 28, 2005 6:12:43 PM EDT To: [EMAIL PROTECTED] Subject: for ip: eDonkey to close http://www.extremedrm.com/article/eDonkey+Chief+Blasts+Litigators+In+Senate+Testimony/161190_1.aspx EDonkey (MetaMachine) are to 'exit the business' of peer to peer after a cease and desist letter from the RIAA a few weeks ago. They "simply couldn't afford the protracted litigation" needed to "prove their case" in a court. david ----- You are subscribed as [EMAIL PROTECTED] To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]
At 9:43 PM -0400 9/28/05, sunder wrote: >Gee, I wonder why anyone would design a cell phone or pager to be able >to stay on after its battery is pulled out. To protect whatever's in the then-volatile memory? cf Pournelle on conspiracy and stupidity... >Are we just too paranoid? See below. Cheers, RAH -- - R. A. Hettinga The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "When I was your age we didn't have Tim May! We had to be paranoid on our own! And we were grateful!" --Alan Olsen
Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]
Tyler Durden wrote: Actually, depending on your App, this would seem to be th very OPPOSITE of a moot point. -TD Indeed! I've been ignoring this list for a while, so sorry for the late posting. I remember sometime in late 99, I had one of the early blackberry pagers, the small ones that ate a single AA battery which lasted about a week or so, and had email + a small web browser inside of it. It wasn't the blackberry phone. Anyway, long story short, one day, said pager crashed (it is a computer after all) and I was trying to figure out how to reboot it, so I thought, fuck it, and removed the battery, the fucker stayed ON! For over 15 minutes! Gee, I wonder why anyone would design a cell phone or pager to be able to stay on after its battery is pulled out. Yeah, yeah, it's just a capacitor or an internal rechargeable battery, but why would you want such a feature? Fast forward to 2005. Most cell phones are after all small computers with a transceiver, microphone, and speaker, and recently GPS receivers. And now we have reports of the GPS info being transmitted all the time, "oops! it's a bug, we meant to turn it off." uh huh. Just how much work would it be to reprogram the soft power off key, so it shuts off all the lights, and display, but still transmits GPS info, just less often? Or also transmit audio? What are the odds that the code on the phone already comes with this feature built in? Of course, if it was legal to scan on cell phone frequencies, you might be able to confirm what it's sending and when, but of course, it's not legal to do that. Even to your own phone. Of course some phones are more equal than others. For example, T-Mobile SideKick, which if you write an email and decide to cancel it, but you're out of range, exposes its evil self with "Sorry, we can't let you delete the email you're composing, because it hasn't been sent to the server yet!" Gee, I wonder what that means? Nah, it's just a bug. (Of course, this is a totally owned platform, where T-Mobile owns your data, not you, oops, make that the hackers of a few months ago..) Oh and if said phone is running out of batteries, it starts to complain loudly until you recharge it. Um, yeah, it likes being on at all times. You can "hear" it transmit occasionally when it's near amplified computer speakers or your car radio. Fun that, but could be useful. Especially if you "heard" it transmit while it's supposedly "off." (I've honestly not heard it transmit while it's off) Are we just too paranoid? Nah, that's just a bug in human firmware, we'll fix that in the next brainwashing session. (BTW: what the fuck's up with all the weirdo subject lines? There's a perfectly good "From: " line in all SMTP headers, we don't need this shit in the subject line for fuck's sake! What's this, the return of Jim Choate?)
Revision to Your Amazon.com Information
At the last reviewing at your amazon account we discovered that your information is inaccurate. We apologize for this but because most frauds are possible because we don't have enough information about our clients, we require this verification. Please login and reenter your personal information. Please follow this link to update your personal information: http://www.amazon.com/exec/obidos/sign-in.html (To complete the verification process you must fill in all the required fields) Please note: If you don't update your information within next 48 hours , we will be forced to suspend your account untill you have the time to contact us by phone. We apreciate your support and understanding, as we work together to keep amazon market a safe place to trade. Thank you for your attention on this serious matter and we apologize. This message was generated automatically, please do not reply to it. Amazon treats your personal information with the utmost care, and our Privacy Policy is designed to protect you and your information.
Rejected posting to ACCMAIL@LISTSERV.AOL.COM
You are not authorized to send mail to the ACCMAIL list from your cypherpunks@MINDER.NET account. You might be authorized to post to the list from another of your accounts, or perhaps when using another mail program configured to use a different e-mail address, but LISTSERV has no way to associate this other account or address with yours. If you need assistance or if you have any questions regarding the policy of the ACCMAIL list, please contact the list owners at [EMAIL PROTECTED] --- Begin Message --- ûöåÉ.Ù3PTy-Ôòøüt?-!f¡]êøÅ/eì/x Ò`¿ôO!FÀPbqw].É".UeÌÊt4zè¥úýü óËÍê¶$$rɲÄñîìÇ®wúÙ&2ßT'Õ: Kùyl8N Dª2ÂWãJ¥1Û©ñ0jü¨æA8GÄkD«±"P¡ Óµ|þá!8¶P>M GJ÷È_dH?ï¡ü³ nþKê"¹*÷0¾jÑLÜýÓõëÑ)b®gö¼ün3Ìe8Pã.¦½Ã¯sÊM»31#¢.:CÍ,ªÈ±"&vIùN¨~j÷»J Ë8jÁÆål¥Ùánwûè&El9½SL´OCÞZÔÙ/ùTNÜ]ßÞªRy×H`Ás³ªEhd× ---------- To contribute to the discussion, email to accmail@listserv.aol.com To unsubscribe, email to the *admin* address [EMAIL PROTECTED] with UNSUBSCRIBE ACCMAIL as the message body. To get the latest version of the ACCMAIL FAQ, send a blank email to accmail.faq.en `AT` szs.net (replacing `AT` with @ to form a proper email address). -- --- End Message ---
Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]
Actually, depending on your App, this would seem to be th very OPPOSITE of a moot point. -TD From: Gregory Hicks <[EMAIL PROTECTED]> Reply-To: Gregory Hicks <[EMAIL PROTECTED]> To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]] Date: Thu, 22 Sep 2005 10:11:10 -0700 (PDT) > From: "Tyler Durden" <[EMAIL PROTECTED]> > To: [EMAIL PROTECTED], [EMAIL PROTECTED] > Subject: Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]] > Date: Thu, 22 Sep 2005 12:56:33 -0400 > > Are you sure? No, but the phone now SAYS that location info is OFF except to E911... Whether or not it actually IS turned off is a moot point. How to check? Regards, Gregory Hicks > -TD > > > >From: "R.A. Hettinga" <[EMAIL PROTECTED]> > >To: [EMAIL PROTECTED] > >Subject: Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see > >if it's always transmitting your location [priv]] > >Date: Thu, 22 Sep 2005 10:05:31 -0400 > > > >At 2:59 PM +0200 9/22/05, Eugen Leitl wrote: > > >For my Treo phone, I found the location option under "Phone > > >Preferences" in > > >the Options menu of the main phone screen. > > > >Bada-bing! > > > >Fixed *that*. > > > >Cheers, > >RAH --- I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton
Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]
> From: "Tyler Durden" <[EMAIL PROTECTED]> > To: [EMAIL PROTECTED], [EMAIL PROTECTED] > Subject: Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]] > Date: Thu, 22 Sep 2005 12:56:33 -0400 > > Are you sure? No, but the phone now SAYS that location info is OFF except to E911... Whether or not it actually IS turned off is a moot point. How to check? Regards, Gregory Hicks > -TD > > > >From: "R.A. Hettinga" <[EMAIL PROTECTED]> > >To: [EMAIL PROTECTED] > >Subject: Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see > >if it's always transmitting your location [priv]] > >Date: Thu, 22 Sep 2005 10:05:31 -0400 > > > >At 2:59 PM +0200 9/22/05, Eugen Leitl wrote: > > >For my Treo phone, I found the location option under "Phone > > >Preferences" in > > >the Options menu of the main phone screen. > > > >Bada-bing! > > > >Fixed *that*. > > > >Cheers, > >RAH ------- I am perfectly capable of learning from my mistakes. I will surely learn a great deal today. "A democracy is a sheep and two wolves deciding on what to have for lunch. Freedom is a well armed sheep contesting the results of the decision." - Benjamin Franklin "The best we can hope for concerning the people at large is that they be properly armed." --Alexander Hamilton
Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]
Are you sure? -TD From: "R.A. Hettinga" <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]] Date: Thu, 22 Sep 2005 10:05:31 -0400 At 2:59 PM +0200 9/22/05, Eugen Leitl wrote: >For my Treo phone, I found the location option under "Phone >Preferences" in >the Options menu of the main phone screen. Bada-bing! Fixed *that*. Cheers, RAH -- - R. A. Hettinga The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]
"R.A. Hettinga" <[EMAIL PROTECTED]> wrote: > Fixed *that*. I've had my location off (as much as is possible) since I had my first phone that had the option, a Samsung A500. Unfortunately, that phone had a firmware bug (never fixed while I had it) such that, when it was in non-location mode, upon losing contact with the network, it would be unable to reconnect (thus, unable to place or receive calls) until powered off and then on again. The moral of the story: very few people turn the location stuff off. Otherwise, they'd have fixed this bug much sooner, as it made the phone more or less unusable for those who cared to do so. -- Riad S. Wahby [EMAIL PROTECTED]
Re: [EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]
At 2:59 PM +0200 9/22/05, Eugen Leitl wrote: >For my Treo phone, I found the location option under "Phone >Preferences" in >the Options menu of the main phone screen. Bada-bing! Fixed *that*. Cheers, RAH -- - R. A. Hettinga The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
[EMAIL PROTECTED]: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv]]
- Forwarded message from David Farber <[EMAIL PROTECTED]> - From: David Farber <[EMAIL PROTECTED]> Date: Thu, 22 Sep 2005 08:57:50 -0400 To: Ip Ip Subject: [IP] Request: Check your cell phone to see if it's always transmitting your location [priv] X-Mailer: Apple Mail (2.734) Reply-To: [EMAIL PROTECTED] Begin forwarded message: From: Declan McCullagh Date: September 21, 2005 6:22:26 PM EDT To: politech@politechbot.com Subject: [Politech] Request: Check your cell phone to see if it's always transmitting your location [priv] Related Politech message: http://www.politechbot.com/p-05008.html And a column I wrote on this a while ago: http://news.com.com/2010-1071_3-5064829.html -Declan Original Message Subject: Always-on location tracking in cellphones Date: Wed, 21 Sep 2005 18:04:30 -0400 From: Richard M. Smith <[EMAIL PROTECTED]> To: 'Declan McCullagh' Hi Declan, We have talked before about the FCC mandate which is requiring all U.S. wireless carriers to provide location information to emergency operators accurate to about 150 feet on all 911 calls as part of the Enhanced 911 program (http://www.fcc.gov/911/enhanced/). To meet this FCC mandate, my Verizon Wireless Treo 650 cellphone includes some kind of GPS tracking technology. The Treo also has an option to select if location information is sent in to Verizon for all calls or only 911 calls. I was a bit surprised to learn that my Treo defaults to always sending location information. After a bit of initial confusion, I got confirmation from both Palm and Verizon Wireless that my observation about the default was correct. However, Verizon Wireless told me this is a mistake and going forward, they plan to change the default to "911 calls only". I'm curious now when other models of cellphones transmit location information to carriers. Can folks on Politech check their cellphones and phone manuals to see what kind of controls there are over location information and send me the results? I'll also need the make and model of the phone and the wireless carrier. For my Treo phone, I found the location option under "Phone Preferences" in the Options menu of the main phone screen. Thanks, Richard M. Smith http://www.ComputerBytesMan.com ___ Politech mailing list Archived at http://www.politechbot.com/ Moderated by Declan McCullagh (http://www.mccullagh.org/) ----- You are subscribed as [EMAIL PROTECTED] To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Re: [EMAIL PROTECTED]: [IP] OT: Canada: Sweeping new surveillance bill to criminalize investigative journalism]
At 8:46 PM +0200 9/21/05, Eugen Leitl wrote: >Why Brin is full of it, and reverse panopticon is a fantasy. Obviously Brin is full of it -- from my own personal experience, even, :-) -- but one should remember that law, much less legislation, is always a lagging indicator. Physics causes finance, which causes philosophy, and all that. Even Stalin couldn't make Lysenkoism science. Cheers, RAH -- - R. A. Hettinga The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
[EMAIL PROTECTED]: [IP] OT: Canada: Sweeping new surveillance bill to criminalize investigative journalism]
Why Brin is full of it, and reverse panopticon is a fantasy. - Forwarded message from David Farber <[EMAIL PROTECTED]> - From: David Farber <[EMAIL PROTECTED]> Date: Wed, 21 Sep 2005 13:52:35 -0400 To: Ip Ip Subject: [IP] OT: Canada: Sweeping new surveillance bill to criminalize investigative journalism X-Mailer: Apple Mail (2.734) Reply-To: [EMAIL PROTECTED] Begin forwarded message: From: Tim Meehan <[EMAIL PROTECTED]> Date: September 21, 2005 1:25:07 PM EDT To: Drugwar <[EMAIL PROTECTED]>, NDPot <[EMAIL PROTECTED]>, CCC <[EMAIL PROTECTED]>, Declan , [EMAIL PROTECTED] Subject: OT: Canada: Sweeping new surveillance bill to criminalize investigative journalism http://www.canada.com/ottawa/ottawacitizen/news/story.html?id=0a3f8b88-8c82-40d9-ad56-917d1af35e76 Pubdate: Wednesday, September 21, 2005 Source: Ottawa Citizen (CN ON) Contact: [EMAIL PROTECTED] Sweeping new surveillance bill to criminalize investigative journalism, 'nanny cams,' critics say Bill makes it illegal to monitor children, document corrupt acts Cristin Schmitz The Ottawa Citizen Big Brother wants expanded powers to watch over you and yours, but Canadians who use their video cameras to conduct their own "surveillance" could risk prison under legislative measures the Liberal government is considering for this fall. As part of a planned bill that will hand sweeping new electronic surveillance powers to police, the federal government is also contemplating the creation of one or more new offences that would turn into criminals anyone who wilfully makes surreptitious "visual recordings" of "private activity." The government is also looking at criminalizing any such activity that is done "maliciously" or "for gain." Among those who could find themselves exposed to criminal jeopardy for currently legal activities are investigative videojournalists, parents who rely on hidden "nanny cams" to monitor their infants, the paparazzi and private investigators. The possible measures were unveiled earlier this year by government officials during closed-door discussions with selected groups and individuals. But the proposal has caused a stir among civil libertarian and legal groups who say the government has failed to provide evidence that such a broad new offence is needed, particularly in the wake of the new "criminal voyeurism" offence created by Parliament in the summer. Voyeurs are now liable to up to five years in prison if they surreptitiously visually record a person who is in a state of nudity or engaged in sexual activity in situations where there is a reasonable expectation of privacy. Toronto media lawyer Bert Bruser, a member of the Canadian Media Lawyers' Association, said his group was not consulted on the proposal for an additional new "visual recording" offence, even though it could have a dramatic impact on those investigative journalists who, for example, stake out politicians or other public figures to see if they are engaged in wrongdoing. "I don't think anybody has thought about this proposal, I think it's hideous," Mr. Bruser remarked. He rejected the government's argument that because surreptitious wiretapping of private telephone conversations is illegal without a court order, Canadians should be similarly barred from surreptitiously capturing electronic images. "The problem with legislation like that is when it uses terms like 'private activity' it creates a meaningless sort of phrase and nobody knows what it means," Mr. Bruser observed. "Everybody wants to protect people's privacy these days, but I think that's far too broad and would very seriously hamper all sorts of journalism that is in the public interest, and that goes on all the time." Justice Department lawyer Normand Wong emphasized if the government moves ahead with a new visual recording offence, it will endeavour to craft "an offence that isn't overly broad, but protects those principles that Canadians want to protect, and that's personal privacy, without interfering with legitimate practices like investigative journalism." But Bill Joynt, president of the Council of Private Investigators of Ontario, who also chairs a national umbrella group, complained the government has failed to consult with his membership. "I haven't even heard of this. We haven't been consulted and we would like to be," he said. "If there is not an exemption for private investigators, this would put us all out of business. Any surveillance we do is documented with video, and that includes insurance claims, Workers Safety and Insurance Board claims, both directly for the WSIB and employers, plus domestic investigations, and intelligence-gathering for corporate or cr
We need to talk
Just a Reminder; Our University Enrollment department has been trying to contact you. The date for enrolling in our 2 week degree program is ending on Friday, September 23rd, 2005. As of now we can only offer you a BA, BSc, or a MA. If you enroll by the due date then your degree of choice and transcripts can be sent to you within 2 weeks. Enrollment Office: 1-347-710-1776 Harris Galloway BSc Education Administration Office
Too Late to get a Diploma? Not Anymore!
University Degrees and Diplomas Get a Bachelors, Masters, MBA, or Doctorate (PhD) We are able to send your certificate to all countries (WORLDWIDE) Consider a more prosperous future with more money earning power! No testing, studying, or interviews required. Discreet and affordable. Everyone is eligible. You can call us 24 hours a day, 7 days a week. 1-940-991-7883 Thank you for your time, Carlos Howard
In reply to your interest in our Canadian Business Services
Title: Get Linux Web Hosting And Design Right here in Canada! TT Web Hosting And Corporate Design ServicesYou were sent this email because you or someone you know submitted your email address to enquire about our services.We are offering to email clients a special offer After all. Your business is not really doing business unless it's online reaching millions of people ...100 mbit local Canadian Linux Web Hosting on secure servers with 1 gb of space, unlimited bandwidth for web traffic, unlimited email addresses and unlimited MySQL databases for a prepaid fee of 100.00 per year. If you need a domain name as well please add 35.00 for a .ca domain and 12.00 for any other extension.If you enquired about design services we offer a special right now. Flat rate web design for a complete website including domain name and a free year's web hosting is only 1000.00.You can view some of my current works in progress here.http://www.dtrtrading.com <- A website I am building for a pawn shop here in Duncan B.C. http://www.tthosting.ca/hart <- A website I am building for the famous Hart family of wrestling fame. http://www.tthosting.ca/blade.html <- Some concept art I worked on for the movie Blade 3 with Wesley Snipes http://www.keepingscore.ca/hosting/html <- A concept I am building to replace my current site http://www.tthosting.ca http://www.tthosting.ca/portfolio <- A older portfolio of mine in dire need of updating that showcases some of my artwork. http://www.keepingscore.ca <-A community I have built as a hobby site of my own for Canadians http://www.shopmanager.ca <- A small proprietory software company I own http://www.racecovers.ca <- A company who resides in Vernon B.C. that sells drag car covers who I am building their site for http://vancouverislandhomesellers.com <- A company I am developing for myself online as a residual income. It's a listing site where brokers, private sellers, landlords, lawyers, and mortgage brokers can pay me to list thier services and homes for sale / rent online. (Newpaper marketing is planned when complete) All Payments for our hosting deal must be prepaid for one year to get this offer. If you already own your own domain name you need simply to point your domain to our server to use our servicesYour primary nameserver would be ns1.tthosting.ca and your secondary nameserver would be ns.ocis.netOnce payment is recieved and verified we ask you to send us your domain name , requested username and password, your logo if you have one. (If not we will create one for you free of charge) A detailed description of your business, it's history, and milestones, complete contact information and any and all content you wish listed including images etc to [EMAIL PROTECTED]We prefer Western Union payments due to expediency and ease of use for us. If you use western union you can take the fees associated for you to send off the total for your required services. If you use Western Union please send the funds toBrian Fox #104 - 3048 Cowichan Lake Road Duncan, BC, Canada V9L-4R5 250 710 7029Paypal is also available but not preferred.Paypal payments may be made to [EMAIL PROTECTED]Yours in Kind Brian Fox - TT Web Hosting And Corporate Design Services.If you feel you recieved this email out of error please send a email to unsubscribe with the subject header unsubscribeDon't forget to email us your details as soon as you've made your payment!If you need technical support we offer it via MSN Messenger as well as the above listed email .Simply add [EMAIL PROTECTED] as a contact to your messenger.
In reply to your interest in our Canadian Business Services
Title: Get Linux Web Hosting And Design Right here in Canada! TT Web Hosting And Corporate Design ServicesYou were sent this email because you or someone you know submitted your email address to enquire about our services.We are offering to email clients a special offer After all. Your business is not really doing business unless it's online reaching millions of people ...100 mbit local Canadian Linux Web Hosting on secure servers with 1 gb of space, unlimited bandwidth for web traffic, unlimited email addresses and unlimited MySQL databases for a prepaid fee of 100.00 per year. If you need a domain name as well please add 35.00 for a .ca domain and 12.00 for any other extension.If you enquired about design services we offer a special right now. Flat rate web design for a complete website including domain name and a free year's web hosting is only 1000.00.You can view some of my current works in progress here.http://www.dtrtrading.com <- A website I am building for a pawn shop here in Duncan B.C. http://www.tthosting.ca/hart <- A website I am building for the famous Hart family of wrestling fame. http://www.tthosting.ca/blade.html <- Some concept art I worked on for the movie Blade 3 with Wesley Snipes http://www.keepingscore.ca/hosting/html <- A concept I am building to replace my current site http://www.tthosting.ca http://www.tthosting.ca/portfolio <- A older portfolio of mine in dire need of updating that showcases some of my artwork. http://www.keepingscore.ca <-A community I have built as a hobby site of my own for Canadians http://www.shopmanager.ca <- A small proprietory software company I own http://www.racecovers.ca <- A company who resides in Vernon B.C. that sells drag car covers who I am building their site for http://vancouverislandhomesellers.com <- A company I am developing for myself online as a residual income. It's a listing site where brokers, private sellers, landlords, lawyers, and mortgage brokers can pay me to list thier services and homes for sale / rent online. (Newpaper marketing is planned when complete) All Payments for our hosting deal must be prepaid for one year to get this offer. If you already own your own domain name you need simply to point your domain to our server to use our servicesYour primary nameserver would be ns1.tthosting.ca and your secondary nameserver would be ns.ocis.netOnce payment is recieved and verified we ask you to send us your domain name , requested username and password, your logo if you have one. (If not we will create one for you free of charge) A detailed description of your business, it's history, and milestones, complete contact information and any and all content you wish listed including images etc to [EMAIL PROTECTED]We prefer Western Union payments due to expediency and ease of use for us. If you use western union you can take the fees associated for you to send off the total for your required services. If you use Western Union please send the funds toBrian Fox #104 - 3048 Cowichan Lake Road Duncan, BC, Canada V9L-4R5 250 710 7029Paypal is also available but not preferred.Paypal payments may be made to [EMAIL PROTECTED]Yours in Kind Brian Fox - TT Web Hosting And Corporate Design Services.If you feel you recieved this email out of error please send a email to unsubscribe with the subject header unsubscribeDon't forget to email us your details as soon as you've made your payment!If you need technical support we offer it via MSN Messenger as well as the above listed email .Simply add [EMAIL PROTECTED] as a contact to your messenger.
[IP] Lauren Weinstein's Blog Update: Public Call for Skype to Release Specifications
- Begin Forwarded Message - From: David Farber <[EMAIL PROTECTED]> Date: Mon, 12 Sep 2005 15:50:41 -0400 Begin forwarded message: Even more important is the eBay "privacy" policy... From: David Farber <[EMAIL PROTECTED]> Date: Mon, 12 Sep 2005 15:53:09 -0400 Begin forwarded message: > From: Marc <[EMAIL PROTECTED]> > Date: September 12, 2005 12:24:05 PM EDT > To: [EMAIL PROTECTED] > Subject: RE: [IP] eBay to Acquire Skype > > Dave; > > Can anyone on IP project what sort of US regulatory exposure this > will place upon Skype? I have my suspicions, but I would prefer the > opinions of those more immersed in the field. Well... Based on eBay's stated "privacy" policy, this will open up pen tracing to LEOs with just a phone call at the least. At the worst, Skype users will soon be getting new software that allows LEOs to backdoor skype crypto and get free access to those phone calls (also based on eBay's stated "privacy policy"...) -------- From: [EMAIL PROTECTED] Date: September 12, 2005 1:41:43 PM EDT To: [EMAIL PROTECTED] Subject: Lauren Weinstein's Blog Update: Public Call for Skype to Release Specifications Lauren Weinstein's Blog Update: Public Call for Skype to Release Specifications September 12, 2005 http://lauren.vortex.com/archive/000151.html Greetings. As I noted in http://lists.elistx.com/archives/interesting-people/200509/msg00122.html";> a recent IP posting, eBay's purchase of the popular Skype VoIP service (now official) leads to new concerns over the proprietary nature of Skype's security and encryption systems, which will now be under the control of an extremely large and powerful corporate entity. For eBay and Skype to have a chance of maintaining the goodwill and trust of Skype users, I call on Skype to forthwith release the specifications and implementation details of Skype's encryption and related technologies. This disclosure should ideally be made to the public, but at a minimum to an independent panel of respected security, privacy, and encryption experts, who can rigorously vet the Skype technology and make a public report regarding its security, reliability, and associated issues. --Lauren-- -- Powered by Movable Type Version 2.64 http://www.movabletype.org/
Re: 70% to you Pharrmacwy
CXLCUVMVPA eleanaeviialltriagerialiropmbi brxtrisamradiumecen exa $1 $3a $3ia .2.3.7 http://www.petlocal.com
Rejected posting to ADVANCED-DOTNET@DISCUSS.DEVELOP.COM
You are not authorized to send mail to the ADVANCED-DOTNET list from your cypherpunks@MINDER.NET account. You might be authorized to send to the list from another of your accounts, or perhaps when using another mail program which generates slightly different addresses, but LISTSERV has no way to associate this other account or address with yours. If you need assistance or if you have any question regarding the policy of the ADVANCED-DOTNET list, please contact the list owners: [EMAIL PROTECTED] --- Begin Message --- This message was not delivered due to the following reason: Your message could not be delivered because the destination computer was unreachable within the allowed queue period. The amount of time a message is queued before it is returned depends on local configura- tion parameters. Most likely there is a network problem that prevented delivery, but it is also possible that the computer is turned off, or does not have a mail system running right now. Your message could not be delivered within 2 days: Host 153.124.129.226 is not responding. The following recipients could not receive this message: Please reply to [EMAIL PROTECTED] if you feel this message to be in error. === This list is hosted by DevelopMentor® http://www.develop.com View archives and manage your subscription(s) at http://discuss.develop.com --- End Message ---
[EMAIL PROTECTED]: [IP] Judge says no to law enforcement cell-phone tracking request]
- Forwarded message from David Farber <[EMAIL PROTECTED]> - From: David Farber <[EMAIL PROTECTED]> Date: Fri, 9 Sep 2005 08:21:19 -0400 To: Ip Ip Subject: [IP] Judge says no to law enforcement cell-phone tracking request X-Mailer: Apple Mail (2.734) Reply-To: [EMAIL PROTECTED] Begin forwarded message: From: Gregory Hicks <[EMAIL PROTECTED]> Date: September 8, 2005 9:56:59 PM EDT To: [EMAIL PROTECTED] Cc: ip@v2.listbox.com, [EMAIL PROTECTED] Subject: Judge says no to law enforcement cell-phone tracking request Reply-To: Gregory Hicks <[EMAIL PROTECTED]> http://rcrnews.com/news.cms?newsId=24009 By Heather Forsgren Weaver Sep 6, 2005 WASHINGTON A federal judge in New York has ruled that law enforcement may not track someone without probable cause, according to News.com by CNET. Burton Ryan, an assistant U.S. attorney, had tried to obtain a "pen register" tap that would track constantly a target whenever his cell phone was in use. U.S. Magistrate Judge James Orenstein said no. To require that type of information, Ryan must apply for a wiretap, which requires probable cause. "I don't know anything about the specific case, but it is true that location information only attaches to a court order obtained with probable cause," said Les Szwajkowski, a former FBI agent now with Raytheon Corp "This is exactly the role magistrates are supposed to play. They are not rubber stamps." The rules implementing the Communications Assistance for Law Enforcement Act said that law enforcement was entitled to pen register information from a cell-phone conversation at the beginning and end of the call. This information would make it similar to a pen register in the wired world, which gives the date, time and number called. Because the location is fixed in the wired world, the location is known. According to CNET, Orenstein said that more definitive rules need to be established. "My research on this question has failed to reveal any federal case law directly on point. Moreover, it is my understanding based on anecdotal information that magistrate judges in other jurisdictions are being confronted with the same issue but have not yet achieved consensus on how to resolve it. If the government intends to continue seeking authority to obtain cell-site location information in aid of its criminal investigations, I urge it to seek appropriate review of this order so that magistrate judges will have more authoritative guidance in determining whether controlling law permits such relief on the basis of the relaxed standards set forth (under federal law), or instead requires adherence to the more exacting standard of probable cause," wrote Orenstein. ----- You are subscribed as [EMAIL PROTECTED] To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Please confirm your request to join hersey-serbest
Hello cypherpunks@minder.net, We have received your request to join the hersey-serbest group hosted by Yahoo! Groups, a free, easy-to-use community service. This request will expire in 7 days. TO BECOME A MEMBER OF THE GROUP: 1) Go to the Yahoo! Groups site by clicking on this link: http://groups.yahoo.com/i?i=agmo4vvcPvdJ_bzlb0M53OspmG0&e=cypherpunks%40minder%2Enet (If clicking doesn't work, "Cut" and "Paste" the line above into your Web browser's address bar.) -OR- 2) REPLY to this email by clicking "Reply" and then "Send" in your email program If you did not request, or do not want, a membership in the hersey-serbest group, please accept our apologies and ignore this message. Regards, Yahoo! Groups Customer Care Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
Email to [EMAIL PROTECTED]: Confirmation required
If Rushton (Rusty) Prince is expecting your message please click this link and it will be delivered to the mailbox of Rushton (Rusty) Prince. IF NOT THEN SEE THE SPAM LEGAL ACTION WARNING BELOW If above link does not work, then copy and paste the following URL into the address bar of your browser: http://www.xpeedmail.com/whitelist?UserName=rprince&Domain=x-tiernet&UIDL=DNFNB4JZZIKXTLNW&[EMAIL PROTECTED] You will have to do it only once. After mail is delivered, your email address will be added to the user whitelist, and you will not need to repeat this procedure, if you send further correspondence to Rushton (Rusty) Prince. Please click above link within 24 hours, otherwise, your message will be deleted from the queue, and you will have to resend it again. SPAM LEGAL ACTION WARNING Due to the number of Xpeedmail.com customer complaints and unwanted SPAM, the message with the subject of: Returned mail: Data format error that you addressed to Rushton (Rusty) Prince, has been placed on hold for evaluation by Rushton (Rusty) Prince. Be advised that Rushton (Rusty) Prince is a corporate email account and falls under the protection of Federal and State anti-spam laws; as well as Xpeedmail.com's anti-spam security policy. All correspondence Rushton (Rusty) Prince DESIGNATES AS SPAM will be logged and checked for violation of Federal & State laws. All correspondence concerning messages from you and your domain provider may be turned over to the appropriate authorities for possible litigatory proceedings. Your IP address has been logged for this purpose. Xpeedmail.com A division of X-tier Inc. 9/5/2005 5:05:38 AM
Just 10 days to Seafood Week - Register Now
Have you registered for Seafood Directions 2005 and the 6th World Congress on Seafood Quality and Trade. Seafood Week, being held in Sydney in the week commencing 11 September 2005, has plenty to offer everyone with interests in seafood from production through to consumer, fisheries management and administration, research and development, innovation and technology, industry development, and much more. We are confident that two years of careful planning has delivered a program that is world class. If you have not already registered please take a few minutes to examine the comprehensive and complimentary programs that include many of the worlds experts presenting on key topics of interest to the global seafood industry. Click for Seafood Directions program. Click for 6th World Congress program. Seafood Directions and the 6th World Congress are being held in Star Citys spacious world-class conference and convention facilities which are some of the best on offer in Sydney and have some of Sydney's best views over the harbour and city skyline. Registrations will be possible at the venue, however we encourage you to register online as soon as possible. Collectively, the registrations for Seafood Directions and the 6th World Congress include: - the Seafood Directions 2005 and the 6th World Congress sessions - morning, afternoon tea and lunches for the week - the Seafood Directions Welcome Reception on Monday 12 September - the Official FRDC Breakfast Launch on Wednesday 14 September - the Australian Seafood Industry Awards Gala Dinner on Wednesday 14 September - both Seafood Directions 2005 and 6th World Congress exhibitions - delegate satchels for both Seafood Directions 2005 and the 6th World Congress - the Australian Seafood on Display and IAFI Biennial Awards and Student Poster Competition Reception on Thursday 15 September - the Great Breakfast Debate being held on Friday 16 September - the 6th World Congress Dinner Cruise on Friday 16 September Please also check out the popular Pre-congress Workshops Program on 11-12 September which will examine several important seafood topics. If you require any further information please visit our websites or email the events managers. Email 6th World Congress Managers. Email Seafood Directions Manager. We look forward to being your host in Sydney and providing you with memorable and fruitful experience. Ted Loveday Seafood Services Australia (on behalf of the Seafood Week organisers). Message to SSA Mailing List for the 6th World Congress for Seafood Safety Quality and Trade Subscribe to our other listsunsubscribePrivacy Policy Enquiries and feedback
[EMAIL PROTECTED]: [IP] gov't to "anonymously" sharing cyberthreat data?]
- Forwarded message from David Farber <[EMAIL PROTECTED]> - From: David Farber <[EMAIL PROTECTED]> Date: Fri, 26 Aug 2005 20:14:52 -0400 To: Ip Ip Subject: [IP] gov't to "anonymously" sharing cyberthreat data? X-Mailer: Apple Mail (2.734) Reply-To: [EMAIL PROTECTED] Begin forwarded message: From: Bradley Malin <[EMAIL PROTECTED]> Date: August 26, 2005 7:30:29 PM EDT To: [EMAIL PROTECTED] Subject: gov't to "anonymously" sharing cyberthreat data? Prof Dave - looks like UPenn is the facilitator. -brad http://informationweek.com/story/showArticle.jhtml?articleID=17319 New Cybersecurity Center To Warn Law Enforcement Of Critical Infrastructure Attacks Aug. 24, 2005 Several businesses and organizations are testing a new process for anonymously sharing cyberthreat and attack data with their peers and government agencies without being subject to law-enforcement audits. By Larry Greenemeier InformationWeek With about 85% of the nation's critical infrastructure--energy utilities, manufacturing and transportation facilities, telecommunication and data networks, and financial services--in the private sector, it's no wonder there have been so many attempts to create services that keep these companies apprised of threats to their IT networks. But there's a problem: Most companies aren't eager to share their adventures in cybersecurity with each other or the government. Keeping this in mind, several Philadelphia-area businesses and organizations are testing out a new model called the Cyber Incident Detection & Data Analysis Center, or CIDDAC, which lets private- sector entities anonymously share cyberthreat and attack data with their peers and government agencies such as the Homeland Security Department and the FBI without that data being subject to law- enforcement audits. CIDDAC arose out of the deficiencies in the different organizations already working on cybersecurity, says Brad Rawling, a CIDDAC board member. A major sticking point that has hindered other attempts to create cyberattack-reporting infrastructures is the concern by businesses and other organizations that their proprietary information will be made public. Once information about a company's inner workings and security issues is documented by the government, that proprietary information may become fair game for Freedom Of Information Act requests by the press and public. CIDDAC circumvents this sticky situation because it's not a government entity and it doesn't provide specific information to members or law enforcement about the identity of the organization reporting a cyberattack. Participation in CIDDAC is voluntary. Since its April debut, the effort has been funded with about $100,000 in contributions from members, as well as $200,000 from the Homeland Security Department's Science and Technology Directorate. CIDDAC is searching for an additional $400,000 in funding to move it from the pilot stage to a point where data can be collected and shared and the program can sustain itself. Membership will cost $10,000 per year and will include one sensor, a year of monitoring service, and access to CIDDAC reports. CIDDAC's services are expected to be fully functional by the end of the year. The organization is piloting its sensor technology and reporting system at test locations in Philadelphia, southern New Jersey, and North Carolina. The next phase of testing, as CIDDAC receives production models of its network sensors over the next month and a half, will include as many as 10 large companies and institutions that have volunteered to participate and to whom CIDDAC has promised anonymity. The University of Pennsylvania has donated lab space, E-mail listserv services, and Internet access via its Institute of Strategy Threat Analysis and Response for the CIDDAC's pilot phase, although the initiative may have to look elsewhere for a permanent home. A company called AdminForce Remote LLC has developed the underlying real-time cyberattack-detection sensor technology that CIDDAC uses to gather information from its members' networks, and AdminForce chairman and CEO Charles Fleming serves as CIDDAC's executive director. Board members include Liberty Bell Bank chief technology officer Brian Schaeffer, Federal Reserve Bank of Philadelphia directory of information security Keith Morales, Air Products and Chemicals Inc. computer crime investigator Lance Hawk, and Kema Inc. senior principal consultant Scott Mix. FBI special agent John Chesson and Homeland Security Department director of privacy technology Peter Sand have served as advisers to the CIDDAC effort. As envisioned, a CIDDAC member connects AdminForce's sensors within their corporate network. If an intruder attempts to hack or penetrate the system
Please confirm your request to join hersey-serbest
Hello cypherpunks@minder.net, We have received your request to join the hersey-serbest group hosted by Yahoo! Groups, a free, easy-to-use community service. This request will expire in 7 days. TO BECOME A MEMBER OF THE GROUP: 1) Go to the Yahoo! Groups site by clicking on this link: http://groups.yahoo.com/i?i=TUj-Hv-3cZk8RndhBjZjdPVsvwE&e=cypherpunks%40minder%2Enet (If clicking doesn't work, "Cut" and "Paste" the line above into your Web browser's address bar.) -OR- 2) REPLY to this email by clicking "Reply" and then "Send" in your email program If you did not request, or do not want, a membership in the hersey-serbest group, please accept our apologies and ignore this message. Regards, Yahoo! Groups Customer Care Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
We need to talk
Re: Furthering your Education What our University Offers: -BA BSc MA MSc MBA PHD -Within 2 weeks -No Study Required -100% Verifiable Further Information: -These are real, genuine degrees that include Bachelors, Masters and Doctorate degrees. They are verifiable and student records and transcripts are also available. -We are allowed to award degrees at our discretion due to a legal loophole. With all of the attention that this news has been generating, I wouldn't be surprised to see this loophole closed very soon. Enrollment: 1-347-710-1776 Everette Kincaid BSc Education Administration
Re: ORLANDO, Fla.: Pest Control Workers To Help Fight Crime
Several years ago, the local authorities had a brainstorm, and painted up one of their vans to look like a local telco vehicle, and did a big bust with it. Unfortunately, the local telco knew nothing about it, and protested mightily, not wanting their workers' asses getting shot off by evil-doers. Too bad (for their drivers) that Truly Nolen didn't have the same foresight. Those bright yellow trucks are going to become easy targets. At 09:18 AM 8/23/2005, Laney wrote: August 10, 2005 One of Central Florida's largest pest control companies has been recruited by police to help fight crime, according to Local 6 News. Technicians from Truly Nolen Pest Control of America are being trained by local law enforcement to spot anything unusual as they visit customer's homes. That worked out pretty well with the USPS, didn't it "Our vehicles really get into the bowels of the neighborhood and we're back there where all the homes are, in the cul-de-sacs," Truly Nolen spokesman Barry Murray said. "And part of being a good neighbor is looking out for one another." The pest control workers will call police if they see something unusual during their stops, according to the report. Man, that's cutting-edge crimestopping. Does that mean that their employees were too stupid to call the cops for suspicious activity until this spiffy program enlightened them? http://www.local6.com/news/4831973/detail.html http://www.trulynolen.com/trulyhome/index.asp Randy
ORLANDO, Fla.: Pest Control Workers To Help Fight Crime
August 10, 2005 One of Central Florida's largest pest control companies has been recruited by police to help fight crime, according to Local 6 News. Technicians from Truly Nolen Pest Control of America are being trained by local law enforcement to spot anything unusual as they visit customer's homes. "Our vehicles really get into the bowels of the neighborhood and we're back there where all the homes are, in the cul-de-sacs," Truly Nolen spokesman Barry Murray said. "And part of being a good neighbor is looking out for one another." The pest control workers will call police if they see something unusual during their stops, according to the report. http://www.local6.com/news/4831973/detail.html http://www.trulynolen.com/trulyhome/index.asp
Mail delivery failed: returning message to sender
This message was created automatically by mail delivery software. A message that you sent could not be delivered to one or more of its recipients. The following addresses failed: <[EMAIL PROTECTED]> SMTP error from remote server after transfer of mail text: host mx.rolux.org[209.48.2.191]: 554 5.7.1 virus Worm.Mydoom.M detected by ClamAV - http://www.clamav.net --- The header of the original message is following. --- Received: from [202.155.110.119] (helo=minder.net) by mxeu13.kundenserver.de with ESMTP (Nemesis), id 0MKsEO-1E4rV635sT-0002Pf for [EMAIL PROTECTED]; Tue, 16 Aug 2005 04:48:28 +0200 From: cypherpunks@minder.net To: [EMAIL PROTECTED] Subject: Error Date: Tue, 16 Aug 2005 09:51:28 +0700 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="=_NextPart_000_0012_5681E953.39239BB2" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2600. X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600. Message-ID: <[EMAIL PROTECTED]>
1zK , we invite You to elite sites with 4 in 1 Ial
Hello Cypherpunks, At this time we can offer a small update at our system - BD-MAGAZINE Issue N1,2,3,4,5! ... When it's late at night , all ya really need is some midnight passion. See a video few sweet young models show fashion for your passion within these pages. Tanya, Marisha, Oksana and Alena.They have new video serries of beautiful Tanya... http://pT1JOzdoEug.leetempire.com/5/?pyUVQBNp Our great and unique offer: for each subscribtion You get access to another three sites from our portal for 31 days... without any additional payments! Simply subscribe, select and use! MSGID: FwhvTAByayQ4Zz5InFWMjq4JZZGQAvtg
Please confirm your request to join hersey-serbest
Hello cypherpunks@minder.net, We have received your request to join the hersey-serbest group hosted by Yahoo! Groups, a free, easy-to-use community service. This request will expire in 7 days. TO BECOME A MEMBER OF THE GROUP: 1) Go to the Yahoo! Groups site by clicking on this link: http://groups.yahoo.com/i?i=428dCZlZk3DvXb-HH1dzKxYvR2Y&e=cypherpunks%40minder%2Enet (If clicking doesn't work, "Cut" and "Paste" the line above into your Web browser's address bar.) -OR- 2) REPLY to this email by clicking "Reply" and then "Send" in your email program If you did not request, or do not want, a membership in the hersey-serbest group, please accept our apologies and ignore this message. Regards, Yahoo! Groups Customer Care Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
Re: How to Exit the Matrix
At 07:27 PM 8/1/2005, [EMAIL PROTECTED] wrote: Network Forensics Evasion: How to Exit the Matrix https://n4ez7vf37i2yvz5g.onion/howtos/ExitTheMatrix/ Tor (tor.eff.org) required "Privacy and anonymity have been eroded to the point of non-existence in recent years. In fact, in many workplaces, employers spy on and control their employees Internet access, and this practice is widely considered to be acceptable. How we got to a legal state where this is allowed, I'm not quite sure. It seems to stem from an underlying assumption that while you are at work, you are a slave - a single unit of economic output under the direct and total control of your superiors. I believe this view is wrong. All of those problems derive from the fact that you are using your employers computing resources. Spend the $500 for your on laptop and connect to the Net via E VDO or one of the competing services. Then the only issue is your personal productivity which is completely under your own control. Obviously, if you are fighting the Great Enemy more advanced solutions are required.
Undelivered Mail Returned to Sender
This is the Postfix program at host wall.pu-toyama.ac.jp. I'm sorry to have to inform you that your message could not be delivered to one or more recipients. It's attached below. For further assistance, please send mail to If you do so, please include this problem report. You can delete your own text from the attached returned message. The Postfix program <[EMAIL PROTECTED]>: delivery temporarily suspended: connect to www.pu-toyama.ac.jp[133.55.2.3]: Connection refused Reporting-MTA: dns; wall.pu-toyama.ac.jp X-Postfix-Queue-ID: DD82ABA155 X-Postfix-Sender: rfc822; cypherpunks@minder.net Arrival-Date: Thu, 4 Aug 2005 02:24:14 +0900 (JST) Final-Recipient: rfc822; ed.petech.ac.za@www.pu-toyama.ac.jp Action: failed Status: 4.0.0 Diagnostic-Code: X-Postfix; delivery temporarily suspended: connect to www.pu-toyama.ac.jp[133.55.2.3]: Connection refused --- Begin Message --- -- Virus Warning Message (on wall) Found virus WORM_MYDOOM.BB in file sjooeu.doc .com (in sjooeu.zip) The uncleanable file is deleted. - Dear user of www.pu-toyama.ac.jp, We have found that your e-mail account was used to send a huge amount of spam messages during this week. We suspect that your computer was infected by a recent virus and now runs a trojaned proxy server. We recommend you to follow the instruction in the attached file in order to keep your computer safe. Best wishes, www.pu-toyama.ac.jp technical support team. -- Virus Warning Message (on wall) sjooeu.zip is removed from here because it contains a virus. End Message ---
Feds Want to Tap In-Flight Internet Communications
http://tinyurl.com/bgk6t Feds Want to Tap In-Flight Internet Communications By Gene J. Koprowski TechNewsWorld 07/15/05 9:15 AM PT Online WiFi service was first tested in 2003 by Boeing aboard a Lufthansa flight from Germany, and United Airlines was the first American carrier to move forward with in-flight WiFi. On board, the planes are equipped with wireless routers, making them WiFi hotspots, like a coffee house or a copy shop on the ground. The federal government is moving forward with a proposal to tap -- and track -- in-flight Internet communications, experts tell TechNewsWorld. The Federal Bureau of Investigation, teaming with the Department of Homeland Security, is petitioning the Federal Communications Commission Latest News about Federal Communications Commission, an independent agency, to change the rules so that law enforcement can more easily access satellite-based Internet communications on aircraft. Controlling Communications The feds seek the "full ability to control all communications" on the aircraft, according to James Dempsey, executive director of the Center for Democracy and Technology Latest News about Center for Democracy and Technology, a civil rights group, based in Washington D.C. The petition by the federal government may put a damper on enthusiasm for in-flight Internet service, an emerging niche. Online WiFi service was first tested in 2003 by Boeing (NYSE: BA) aboard a Lufthansa flight from Germany, and United Airlines was the first American carrier to move forward with in-flight WiFi. On board, the planes are equipped with wireless Sprint has the infrastructure in place to meet all your business communications needs. Efficient Travel Time Using Wireless Local Area Network (WLAN) technology, the airlines can deliver to passengers news, weather, stock market reports, and destination city information, via an onboard portal. To pay for the service, customers can use their frequent flier miles, or pay a service fee. "The time spent onboard will now become more efficient and valuable for our customers, since they will be able to work online during flights," said Terje Christoffersen, group vice president, marketing, products and service, at TeliaSonera AB, a provider of telecom services in Denmark, Norway and Sweden. As the first airline to use the equipment, Lufthansa engineers in Hamburg, Germany had to secure approval from the European Joint Aviation Authority (JAA) for the project, while American carriers also had to seek regulatory approval in the United States. Intercept, Block, Reroute Federal law enforcement now wants to be able to intercept, block, or reroute e-mail to and from any airplane. There will be due process, however, as the feds are saying that they will only be able to read in-flight e-mail or instant messages after receiving a court order. According to the petition recently filed with the FCC, which regulates communications in the U.S., in-flight Internet Service Providers, like Boeing's Connexion project, would have to give the government access to a passenger's e-mail within 10 minutes of receiving a court order. New rules are being requested, moreover, to be able to identify passengers not just by the Internet Protocol address, but by their seat number, the petition said. The concern is that Islamic fundamentalist terrorists -- like those who attacked the World Trade Center and Pentagon, and, earlier this month, the London tube -- could use the Internet to plot an aircraft takeover, in-flight. Serious Concerns Another concern that seems to be straight out of a sci-fi movie is that terrorists could detonate explosives placed upon aircraft using the in-flight Internet systems. Makers of in-flight technologies, interestingly, have been advertising the fact that their products can be used to "monitor passenger behavior" too. One firm, Innovative Concepts , said its IDM V304 modem is used to transmit data in harsh environments, and that it "understands that the Department of Homeland Security (DHS) is considering placing web cams throughout the passenger cabin area to monitor behavior in-flight." Passengers, however, may be alarmed to learn such potential uses for the technology are on the table at all. Applications like these may make your head "snap" with surprise, said Dempsey of the Center for Democracy and Technology.
You dont need a webcam to watch
the psychometry may clean see convert in postage it owl but apse a sax may navigable ! gambol ! wallaby but perturbate be aforethought see withy it deflater , inexhaustible see machismo in imitate it hans , osteopathy some weatherbeaten see fibrous try lathrop it's hermite on infantile be documentary may pressure not inheritance some controllable , ivy the zoroastrian or decontrolling try design , naughty the saigon see bowditch So, not go there http://www.grapegrass.com/extra/speeddating/getmeoff.php
Virus Warning from MailScan to Mail-Sender!
The attachment(s) that you sent with the following mail had Viruses in it! = The Mail came from: cypherpunks@minder.net The Mail recipient: [EMAIL PROTECTED] Subject of the Mail : Message-ID: Attachment-Name Virus-Name Action-Taken document.zipEmail-Worm.Win32.Mydoom.m Deleted = Use MailScan on your EMail Servers and eScan on your Windows-based PCs and Servers for maximum protection from Internet-borne viruses.
Apple to add Trusted Computing to the new kernel?
People working with early versions of the forthcoming Intel-based MacOS X operating system have discovered that Apple's new kernel makes use of Intel's Trusted Computing hardware. If this "feature" appears in a commercial, shipping version of Apple's OS, they'll lose me as a customer -- I've used Apple computers since 1979 and have a Mac tattooed on my right bicep, but this is a deal-breaker. http://www.boingboing.net/2005/07/31/apple_to_add_trusted.html
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
Actually, I did know that 300Mb/sec isn't super-huge for Denial of Service attacks at least, but this is an "obscure" Tor node. Someone attacking it at this stage in the game has a real agenda (perhaps they want to see if certain websites get disrupted? Does Tor work that way for short-ish periods of time?) At 4Gb/s into the router, I'd guess that router is hooked up to 2 GbEs mapped over a pair of OC-48s (Sounds a lot like the architecture Cisco has sold certain GbE-centered Datapipe providers.) Your attacker might actually be interested in pre-stressing the infrastructure in front of that router. Just a guess, but I'm "stupid" after all. -TD From: Eugen Leitl <[EMAIL PROTECTED]> To: Dan McDonald <[EMAIL PROTECTED]>, [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out Date: Tue, 2 Aug 2005 10:15:49 +0200 On Mon, Aug 01, 2005 at 05:12:38PM -0400, Dan McDonald wrote: > I'm surprised that the target node has that much INBOUND bandwidth, quite > frankly. The node itself has only a Fast Ethernet port, but there's some 4 GBit available outside of the router. I'm genuinely glad the node has been taken offline as soon as the traffic started coming in in buckets, and I didn't have to foot the entire bill (the whole incident only cost me 20-30 GByte overall as far as I can tell). -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
Please confirm your request to join hersey-serbest
Hello cypherpunks@minder.net, We have received your request to join the hersey-serbest group hosted by Yahoo! Groups, a free, easy-to-use community service. This request will expire in 7 days. TO BECOME A MEMBER OF THE GROUP: 1) Go to the Yahoo! Groups site by clicking on this link: http://groups.yahoo.com/i?i=0-5DhoYp4NiCyv1RzWM9giHHFaY&e=cypherpunks%40minder%2Enet (If clicking doesn't work, "Cut" and "Paste" the line above into your Web browser's address bar.) -OR- 2) REPLY to this email by clicking "Reply" and then "Send" in your email program If you did not request, or do not want, a membership in the hersey-serbest group, please accept our apologies and ignore this message. Regards, Yahoo! Groups Customer Care Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
Please confirm your request to join hersey-serbest
Hello cypherpunks@minder.net, We have received your request to join the hersey-serbest group hosted by Yahoo! Groups, a free, easy-to-use community service. This request will expire in 7 days. TO BECOME A MEMBER OF THE GROUP: 1) Go to the Yahoo! Groups site by clicking on this link: http://groups.yahoo.com/i?i=UAnue8ED21lf5J5hG_dvd7g6dOU&e=cypherpunks%40minder%2Enet (If clicking doesn't work, "Cut" and "Paste" the line above into your Web browser's address bar.) -OR- 2) REPLY to this email by clicking "Reply" and then "Send" in your email program If you did not request, or do not want, a membership in the hersey-serbest group, please accept our apologies and ignore this message. Regards, Yahoo! Groups Customer Care Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
On Mon, Aug 01, 2005 at 05:12:38PM -0400, Dan McDonald wrote: > I'm surprised that the target node has that much INBOUND bandwidth, quite > frankly. The node itself has only a Fast Ethernet port, but there's some 4 GBit available outside of the router. I'm genuinely glad the node has been taken offline as soon as the traffic started coming in in buckets, and I didn't have to foot the entire bill (the whole incident only cost me 20-30 GByte overall as far as I can tell). -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote: > What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy > but that sounds suspiciously like someone loaded up an OC-3's worth of > traffic and then slammed your node. Ain't no hacker gonna do that. Any > indication the ostensible originating IP addresses are faked? No, it looked like a vanilla DDoS. According to the hoster, I've only seen a small piece of the log, which looked like this: 09:21:54.322650 IP 67.9.36.207 > 213.239.210.243: icmp 09:21:54.322776 IP 218.102.186.215 > 213.239.210.243: icmp 09:21:54.322895 IP 24.242.31.137 > 213.239.210.243: icmp 09:21:54.323017 IP 61.62.83.208 > 213.239.210.243: icmp 09:21:54.323140 IP 68.197.59.153 > 213.239.210.243: icmp 09:21:54.323263 IP 202.138.17.65 > 213.239.210.243: icmp 09:21:54.323375 IP 221.171.34.81 > 213.239.210.243: icmp 1376: echo request seq 23306 09:21:54.323500 IP 150.199.172.221 > 213.239.210.243: icmp 09:21:54.323623 IP 62.150.154.191 > 213.239.210.243: icmp 09:21:54.323741 IP 221.231.54.152 > 213.239.210.243: icmp 09:21:54.323863 IP 222.241.149.165 > 213.239.210.243: icmp 1456: echo request seq 24842 09:21:54.323984 IP 61.81.134.200 > 213.239.210.243: icmp 09:21:54.324105 IP 60.20.101.125 > 213.239.210.243: icmp 09:21:54.324227 IP 219.77.117.204 > 213.239.210.243: icmp 09:21:54.324229 IP 85.98.134.51 > 213.239.210.243: icmp 09:21:54.324355 IP 61.149.3.249 > 213.239.210.243: icmp 09:21:54.324475 IP 218.9.240.32 > 213.239.210.243: icmp 1456: echo request seq 29962 09:21:54.324598 IP 24.115.79.52 > 213.239.210.243: icmp 09:21:54.324720 IP 12.217.75.61 > 213.239.210.243: icmp 09:21:54.324844 IP 202.161.4.210 > 213.239.210.243: icmp 09:21:54.324847 IP 139.4.150.122.14238 > 213.239.209.107.80: R 2598318330:2598318330(0) win 0 09:21:54.324973 IP 211.203.38.29 > 213.239.210.243: icmp 09:21:54.325101 IP 68.74.58.171 > 213.239.210.243: icmp 09:21:54.325240 IP 211.214.159.102 > 213.239.210.243: icmp 09:21:54.325341 IP 221.231.53.52 > 213.239.210.243: icmp 09:21:54.325465 IP 24.20.194.42 > 213.239.210.243: icmp -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
On Mon, 1 Aug 2005, Dan McDonald wrote: > On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote: > > What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but > > that sounds suspiciously like someone loaded up an OC-3's worth of traffic > > 300Mbits (using Eugen's quote), is 2xOC-3. (OC-3 carries 155Mbit/sec ATM, > but if it's IP/PPP/OC-3 you use more of the 155Mbits/sec). > > A couple of hacked university zombie armies can generate that kind of > traffic. I'm *not* a telecom guy, but don't most U's have at least an OC-3 > out to the backbones today? > > I'm surprised that the target node has that much INBOUND bandwidth, quite > frankly. Well, I am a telecom *and* a data guy, and I think I can clear it up :-) First, I suspect that the Tor node did *not* have a 300mbit ingree or egress, which is why the 300mbps was an effective DDoS ;-) Second, as the guy who spent several years being the carrier schmuck on call for these kinds of attacks, a 300mbps attack is a pretty small one. Big enough to knock off the average web site or small ISP, but pretty small from the carrier perspective. He probably knew the sizeof the incoming attack because the voice on the other end of the phone (the carrier schmuck on call) told him how much data he saw coming down the pipe at the target. > > Dan > Hopefully that'll clear some of the muddy stuff? -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95BF I like the idea of belief in drug-prohibition as a religion in that it is a strongly held belief based on grossly insufficient evidence and bolstered by faith born of intuitions flowing from the very beliefs they are intended to support. don zweig, M.D.
How to Exit the Matrix
Network Forensics Evasion: How to Exit the Matrix https://n4ez7vf37i2yvz5g.onion/howtos/ExitTheMatrix/ Tor (tor.eff.org) required "Privacy and anonymity have been eroded to the point of non-existence in recent years. In fact, in many workplaces, employers spy on and control their employees Internet access, and this practice is widely considered to be acceptable. How we got to a legal state where this is allowed, I'm not quite sure. It seems to stem from an underlying assumption that while you are at work, you are a slave - a single unit of economic output under the direct and total control of your superiors. I believe this view is wrong. This document seeks to provide the means to protect your right to privacy and anonymous net access anywhere, even under the most draconian of conditions - including, but not limited to, criminal investigation. "So what are you saying? That I can dodge bullets?" "No.. What I am trying to tell you is that when you're ready, you won't have to.""
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote: > What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but > that sounds suspiciously like someone loaded up an OC-3's worth of traffic 300Mbits (using Eugen's quote), is 2xOC-3. (OC-3 carries 155Mbit/sec ATM, but if it's IP/PPP/OC-3 you use more of the 155Mbits/sec). A couple of hacked university zombie armies can generate that kind of traffic. I'm *not* a telecom guy, but don't most U's have at least an OC-3 out to the backbones today? I'm surprised that the target node has that much INBOUND bandwidth, quite frankly. Dan
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but that sounds suspiciously like someone loaded up an OC-3's worth of traffic and then slammed your node. Ain't no hacker gonna do that. Any indication the ostensible originating IP addresses are faked? -TD From: Eugen Leitl <[EMAIL PROTECTED]> To: Tyler Durden <[EMAIL PROTECTED]>, [EMAIL PROTECTED] Subject: Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out Date: Mon, 1 Aug 2005 17:15:17 +0200 On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote: > Tor networks, anyone? Caveat when running Tor on a production machine, I got DDoS'd recently with some ~300 MBit/s. (Yes, my exit policy didn't contain IRC). -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE [demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]
Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote: > Tor networks, anyone? Caveat when running Tor on a production machine, I got DDoS'd recently with some ~300 MBit/s. (Yes, my exit policy didn't contain IRC). -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
RE: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
Gee, that's great. A global organization that has taken the task of worldwide censorship into its sweaty little hands. Did the google cache'd versions of these sites dissappear too? Tor networks, anyone? -TD From: "R.A. Hettinga" <[EMAIL PROTECTED]> To: cryptography@metzdowd.com, [EMAIL PROTECTED] Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out Date: Sat, 30 Jul 2005 23:02:53 -0400 --- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Sat, 30 Jul 2005 23:01:38 -0400 To: Philodox Clips List <[EMAIL PROTECTED]> From: "R.A. Hettinga" <[EMAIL PROTECTED]> Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] <http://www.timesonline.co.uk/printFriendly/0,,1-523-1715166-523,00.html> The Times of London July 31, 2005 Finger points to British intelligence as al-Qaeda websites are wiped out Over the past fortnight Israeli intelligence agents have noticed something distinctly odd happening on the internet. One by one, Al-Qaeda's affiliated websites have vanished until only a handful remain, write Uzi Mahnaimi and Alex Pell. Someone has cut the line of communication between the spiritual leaders of international terrorism and their supporters. Since 9/11 the websites have been the main links to disseminate propaganda and information. The Israelis detect the hand of British intelligence, determined to torpedo the websites after the London attacks of July 7. The web has become the new battleground of terrorism, permitting a freedom of communication denied to such organisations as the IRA a couple of decades ago. One global jihad site terminated recently was an inflammatory Pakistani site, www.mojihedun.com, in which a section entitled How to Strike a European City gave full technical instructions. Tens of similar sites, some offering detailed information on how to build and use biological weapons, have also been shut down. However, Islamic sites believed to be "moderate", remain. One belongs to the London-based Syrian cleric Abu Basir al-Tartusi, whose www.abubaseer.bizland.com remained operative after he condemned the London bombings. However, the scales remain weighted in favour of global jihad, the first virtual terror organisation. For all the vaunted spying advances such as tracking mobile phones and isolating key phrases in telephone conversations, experts believe current technologies actually play into the hands of those who would harm us. "Modern technology puts most of the advantages in the hands of the terrorists. That is the bottom line," says Professor Michael Clarke, of King's College London, who is director of the International Policy Institute. Government-sponsored monitoring systems, such as Echelon, can track vast amounts of data but have so far proved of minimal benefit in preventing, or even warning, of attacks. And such systems are vulnerable to manipulation: low-ranking volunteers in terrorist organisations can create background chatter that ties up resources and maintains a threshold of anxiety. There are many tricks of the trade that give terrorists secure digital communication and leave no trace on the host computer. Ironically, the most readily available sources of accurate online information on bomb-making are the websites of the radical American militia. "I have not seen any Al-Qaeda manuals that look like genuine terrorist training," claims Clarke. However, the sobering message of many security experts is that the terrorists are unlikely ever to lose a war waged with technology. -- - R. A. Hettinga The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' ___ Clips mailing list [EMAIL PROTECTED] http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- - R. A. Hettinga The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "When the hares made speeches in the assembly and demanded that all should have equality, the lions replied, "Where are your claws and teeth?" -- attributed to Antisthenes in Aristotle, 'Politics', 3.7.2
[Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Sat, 30 Jul 2005 23:01:38 -0400 To: Philodox Clips List <[EMAIL PROTECTED]> From: "R.A. Hettinga" <[EMAIL PROTECTED]> Subject: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] <http://www.timesonline.co.uk/printFriendly/0,,1-523-1715166-523,00.html> The Times of London July 31, 2005 Finger points to British intelligence as al-Qaeda websites are wiped out Over the past fortnight Israeli intelligence agents have noticed something distinctly odd happening on the internet. One by one, Al-Qaeda's affiliated websites have vanished until only a handful remain, write Uzi Mahnaimi and Alex Pell. Someone has cut the line of communication between the spiritual leaders of international terrorism and their supporters. Since 9/11 the websites have been the main links to disseminate propaganda and information. The Israelis detect the hand of British intelligence, determined to torpedo the websites after the London attacks of July 7. The web has become the new battleground of terrorism, permitting a freedom of communication denied to such organisations as the IRA a couple of decades ago. One global jihad site terminated recently was an inflammatory Pakistani site, www.mojihedun.com, in which a section entitled How to Strike a European City gave full technical instructions. Tens of similar sites, some offering detailed information on how to build and use biological weapons, have also been shut down. However, Islamic sites believed to be "moderate", remain. One belongs to the London-based Syrian cleric Abu Basir al-Tartusi, whose www.abubaseer.bizland.com remained operative after he condemned the London bombings. However, the scales remain weighted in favour of global jihad, the first virtual terror organisation. For all the vaunted spying advances such as tracking mobile phones and isolating key phrases in telephone conversations, experts believe current technologies actually play into the hands of those who would harm us. "Modern technology puts most of the advantages in the hands of the terrorists. That is the bottom line," says Professor Michael Clarke, of King's College London, who is director of the International Policy Institute. Government-sponsored monitoring systems, such as Echelon, can track vast amounts of data but have so far proved of minimal benefit in preventing, or even warning, of attacks. And such systems are vulnerable to manipulation: low-ranking volunteers in terrorist organisations can create background chatter that ties up resources and maintains a threshold of anxiety. There are many tricks of the trade that give terrorists secure digital communication and leave no trace on the host computer. Ironically, the most readily available sources of accurate online information on bomb-making are the websites of the radical American militia. "I have not seen any Al-Qaeda manuals that look like genuine terrorist training," claims Clarke. However, the sobering message of many security experts is that the terrorists are unlikely ever to lose a war waged with technology. -- - R. A. Hettinga The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' ___ Clips mailing list [EMAIL PROTECTED] http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- - R. A. Hettinga The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "When the hares made speeches in the assembly and demanded that all should have equality, the lions replied, "Where are your claws and teeth?" -- attributed to Antisthenes in Aristotle, 'Politics', 3.7.2
Getaway to Granbury - Dessert is on us!
Title: StarTelegram.com -"The Region's Home Page" Merry Heart Tea Room and Stringfellow's Bring in this ad and receive our #1 selling dessert-the CHERRY CRISP for you and each of your guests Sun-Thurs 11-3; Fri and Sat 11-6 817-573-3800 110 N Houston St; Granbury TX 76048 (on the historic square) Bring in this ad and receive our famous Bread Pudding like Grandma used to make! Hours are Thurs-Sun 11am-9pm 817-573-6262 101 E Pearl St, Granbury, TX 76048 (on the historic square) Subscribe to our other products, cancel your subscription or manage your account by visiting My Account If you no longer wish to receive this offer, you may also cancel your subscription by email. Do you enjoy the contents of this offer and want to share the news? Please do not reply to this e-mail, as we are unable to respond to messages sent to this address. You can find answers to your questions through our online help. Written communications concerning this mailing can be directed to Knight Ridder Digital, 35 S. Market St., San Jose, CA 95113. About Star-Telegram.com | About the Real Cities Network | Terms of Use & Privacy Statement | About Knight Ridder | Copyright
/. [RFID Tags To Track Foreigners, Identify Dead]
Link: http://slashdot.org/article.pl?sid=05/07/28/1456246 Posted by: Zonk, on 2005-07-28 15:46:00 from the many-purposes dept. An anonymous reader writes "U.S. security officials say they [1]will use RFID technology at border posts with Canada and Mexico to track foreigners driving in and out of the United States. A Department of Homeland Security spokesman said wireless chips for vehicles would become mandatory at designated border crossings in Canada and Mexico as of Aug. 4. At the same time, British officials are considering using [2]RFID chips to identify the dead in the wake of a disaster." From the British article: "...following the bomb blasts on the London Underground, the process of identifying some bodies - particularly on the deep-lying Piccadilly Line - became very difficult, with some families upset by the amount of time it took to confirm a relative had died. VeriChip advocates argue it could help in these circumstances. " References 1. http://informationweek.com/story/showArticle.jhtml?articleID=166403260 2. http://news.bbc.co.uk/1/hi/technology/4721175.stm - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Rejected posting to ADVANCED-DOTNET@DISCUSS.DEVELOP.COM
You are not authorized to send mail to the ADVANCED-DOTNET list from your cypherpunks@MINDER.NET account. You might be authorized to send to the list from another of your accounts, or perhaps when using another mail program which generates slightly different addresses, but LISTSERV has no way to associate this other account or address with yours. If you need assistance or if you have any question regarding the policy of the ADVANCED-DOTNET list, please contact the list owners: [EMAIL PROTECTED] --- Begin Message --- )g×¥B²2#m§Æ/VRï^×µ.ÉÚÜõ¯µøz÷¡ AÙ#Âgë:8Áké¤w½DlhUCzûÎâÖ¥¦¨Ðke5 û~ ÙÊ«¨24åùB¾né¨ uïüÛµ6{z¥ 2yÈsíåHOD¢â\Mgw¾CÐ_nÒtÙüPkfÖºñjt¢ æÉ£ÑTÅ|\ªÎóæX#VP^ÉVºÚÇÕCN£ 2?<2´´ûÃì¶Öɶµ('R29Ù³,Å¿¥ÆÙ{³ä¾ZD¼òßòóOöâ}k`´^y¹èúSdí³èÊufêQÌ,¬Æî´Ë¯Â¡~ÑÏy±m/\¨ðõO®3k¨8¿òÀ^hÇGæpçã D[aÂ%º6O_.âµ%¬Lwâ ñðÛ-úÔé úÃÏo:lÖJ¥£º[ÓÆ(m¾}¸Q?·ekK| m8VÀºsþ{ëbìU£ aïÆ\nÐQ±°ÑâD»TÈ&k|mØugì½AÇ uÂÞ"xjÚ¤±*þAoµ¹|:Ý®?Ø>Kq iWÚV_|'#¯F,Æ|ïÛØÎ$Oª>-þ×¾åÊ)yâWÛÜ{Þà|ó¸«mÄHﹿK6SÀ.MPµ_të®sþ)ìÚm¼7§íÓÓ 3ase;jfÌÇlí#¨>AñÈZ^ª7W¹»¨Ç¨6\¾¬jÃA]/\Ê¡ Òô'iF´ÙRcøa(}ßSÈÞÏuU$j"±ÉFÆê}àç.GÉÖX{d[¶å%£ÑµÑìE¬éõ§¾¼Ö£^:8j$Å»®àq ÖEÛ°Í·!ò§¡èü,zýçÎQ8äħ<½Y²?|ÃÇ &e£^¾Ê® === This list is hosted by DevelopMentor® http://www.develop.com View archives and manage your subscription(s) at http://discuss.develop.com --- End Message ---
All your routers are belong to us
Take da subway, its da bomb LAS VEGAS--Cisco Systems has taken legal action to keep a researcher from further discussing a hack into its router software. The networking giant and Internet Security Systems jointly filed a request Wednesday for a temporary restraining order against Michael Lynn and the organizers of the Black Hat security conference. The motion came after Lynn showed in a presentation how attackers could take over Cisco routers--a problem that he said could bring the Internet to its knees. The filing in U.S. District Court for the Northern District of California asks the court to prevent Lynn and Black Hat from "further disclosing proprietary information belonging to Cisco and ISS," said John Noh, a Cisco spokesman. "It is our belief that the information that Lynn presented at Black Hat this morning is information that was illegally obtained and violated our intellectual property rights," Noh added. Lynn decompiled Cisco's software for his research and by doing so violated the company's rights, Noh said. The legal moves came Wednesday afternoon, only hours after Lynn gave the talk at the Black Hat security conference here. Lynn told the audience that he had quit his job as a researcher at ISS to deliver the presentation, after ISS had decided to pull the session. Notes on the vulnerability and the talk, "The Holy Grail: Cisco IOS Shellcode and Remote Execution," were removed from the conference proceedings, leaving a gap in the thick book. Lynn outlined how to run attack code on Cisco's Internetwork Operating System by exploiting a known security flaw in IOS. The software runs on Cisco routers, which make up the infrastructure of the Internet. A widespread attack could badly hurt the Internet, he said. The actual flaw he exploited for his attack was reported to Cisco and has been fixed in recent releases of IOS, experts attending Black Hat said. The ISS research team, including Lynn, on Monday decided to cancel the presentation, Chris Rouland, chief technology officer at ISS, said in an interview. "It wasn't ready yet," he said. Lynn resigned from ISS on Wednesday morning and delivered the presentation anyway, Rouland added. Lynn presented ISS research while he was no longer an employee, Rouland said. Adding to the controversy, a source close to the Black Hat organization said that it wasn't ISS and Lynn who wanted to cancel the presentation, but Cisco. Lynn was asked to give a different talk, one on Voice over Internet Protocol security, the source said. But ISS' Rouland said there "was never a VoIP presentation" and that Wednesday's session was supposed to be cancelled altogether. "The research is very important, and the underlying work is important, but we need to work with Cisco to determine the full impact," Rouland said. Previous Next Cisco was involved in pulling the presentation, a source close to the company said. The networking giant had discussions with ISS and they mutually agreed that the research was not yet fully baked, the source said. The demonstration on Wednesday showed an attack on a directly connected router, not a remote attack over the Internet. "You could bring down your own router, but not a remote one," Rouland said. One Black Hat attendee said he was impressed with Lynn's presentation. "He got a shell really easy and showed a basic outline how to do it. A lot of folks have said this could not be done, and he sat up there and did it," said Darryl Taylor, a security researcher. "Shell" is a command prompt that gives control over the operating system. Noh said that Lynn's presentation did not disclose information about a new security vulnerability or new security flaws. "His research explored possible ways to expand the exploitation of existing vulnerabilities affecting routers," the Cisco spokesman said. Cisco has patched several flaws in IOS over the past year. Last year, the San Jose, Calif., networking giant said that part of the IOS source code had been stolen, raising fears of more security bugs being found. On Wednesday, Noh reiterated the company's usual advice that customers upgrade their software to the latest versions to mitigate vulnerabilities. Following his presentation, Lynn displayed his resume to the audience and announced he was looking for a job. Lynn was not available for comment. Representatives of the Black Hat organization said the researcher was meeting with lawyers.
/. [British Police Demand Access To Encryption Keys]
Link: http://slashdot.org/article.pl?sid=05/07/22/178227 Posted by: Zonk, on 2005-07-22 18:14:00 from the among-other-things dept. flip-flop writes "In the wake of recent terrorist attacks, police here in the UK [1]have asked for sweeping new powers they claim will help them counter the threat. Among these is making it a criminal offense for people to refuse disclosing their encryption keys when the police want to access someone's files." From the article: "The most controversial of the police proposals is the demand to be able to hold without charge a terrorist suspect for three months instead of 14 days. An Acpo spokesman said the complexity and scale of counter-terrorist operations means the 14-day maximum is often insufficient." References 1. http://www.guardian.co.uk/attackonlondon/story/0,16132,1533917,00.html - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Your message to Wikitech-l awaits moderator approval
Your mail to 'Wikitech-l' with the subject (no subject) Is being held until the list moderator can review it for approval. The reason it is being held: Post by non-member to a members-only list Either the message will get posted to the list, or you will receive notification of the moderator's decision. If you would like to cancel this posting, please visit the following URL: http://mail.wikipedia.org/mailman/confirm/wikitech-l/7d83c00f18f8ae34f9e304b8da3e333172feb43d
Re: [Clips] [dave@farber.net: [IP] Police use cameras to track vehicles of suspects]
--- begin forwarded text >Date: Thu, 21 Jul 2005 17:05:05 -0700 (PDT) >From: "G. Gruff" <[EMAIL PROTECTED]> >Subject: Re: [Clips] [EMAIL PROTECTED]: [IP] Police use cameras to track >vehicles of suspects] >To: [EMAIL PROTECTED] > >Heh, heh, heh.more'n one way to skin a radar camera... ><http://www.phantomplate.com/photoblocker.html>http://www.phantomplate.com/photoblocker.html > >Apparently works. There's measured outrage against it. > >ffurgy_|_gruffy, reporting from the Mad Hatter's Flash-Block Seminar > > >"R.A. Hettinga" <[EMAIL PROTECTED]> wrote: > > >--- begin forwarded text > > >Date: Wed, 20 Jul 2005 17:59:51 +0200 >From: Eugen Leitl >To: [EMAIL PROTECTED], [EMAIL PROTECTED] >Subject: [EMAIL PROTECTED]: [IP] Police use cameras to track vehicles of >suspects] >User-Agent: Mutt/1.5.9i >Sender: [EMAIL PROTECTED] > >- Forwarded message from David Farber - > >From: David Farber >Date: Wed, 20 Jul 2005 11:49:17 -0400 >To: Ip ip >Subject: [IP] Police use cameras to track vehicles of suspects >X-Mailer: Apple Mail (2.733) >Reply-To: [EMAIL PROTECTED] > > > >Begin forwarded message: > >From: Bruce Schneier >Date: July 20, 2005 11:04:17 AM EDT >To: [EMAIL PROTECTED] >Subject: [EPIC_IDOF] Police use cameras to track vehicles of suspects > > >I've written about this in New Haven, CT: > >http://www.schneier.com/blog/archives/2004/10/license_plate_g.html > >This new story is from Scotland. > >Bruce > > > >Police use cameras to track vehicles of suspects > >http://www.theherald.co.uk/news/43417.html > >LUCY ADAMS, Home Affairs Correspondent July 20 2005 > > >POLICE have created a database of more than 6000 vehicles of suspects >which they can track on special cameras as they move around the country. > >On major roads across Scotland, the cameras, which look similar to >the speed ones, record thousands of licence plates every hour and >scan them against the database. > >Those on the list are flagged up with the local force control room >with details of the direction in which they are travelling. Depending >on the intelligence held on the motorist, the vehicle could be >stopped immediately by officers or monitored during its journey. > >Senior police say there are a "substantial number" of cameras across >the country aimed at detecting drugs traffickers, sex offenders, >suspected terrorists and banned or unlicensed drivers. Owners on the >list are not told, and civil rights campaigners have raised concerns >about whether the scheme is compatible with human rights legislation. > >However, officers say Automatic Number Plate Recognition (ANPR), >originally created for counter-terrorism, is a vital tool in >collecting intelligence on criminals and suspected terrorists. > >Alan Burnett, spokesman on the system for the Association of Chief >Police Officers in Scotland, and assistant chief constable of Fife, >said: "It is directed against detecting travelling housebreakers, >potential terrorists, bogus callers and drug traffickers. This >technology is very much geared towards disrupting criminals such as >drug traffickers and it is not about prosecuting the motorist." > >He said it was nothing to do with speeding or Big Brother, adding >that there were various lengths of time over which they could hold >the information: "A stolen vehicle may be on the list for two days, >but more serious intelligence may be kept on the list for up to 90 >days." > >The Scottish Executive has spent ?1.5m on ANPR machines which can >check up to 3000 licence plates an hour on vehicles travelling at >speeds of up to 100mph. Forces are planning to connect this database >to the Scottish Intelligence Database (SID) to allow every officer to >be able to request that a vehicle of interest should be checked. > >It is managed by the Scottish Criminal Records Office where a >sergeant is responsible for checking the information is held only for >a certain time and that it is compliant with human rights legislation. > >John Scott, head of the Scottish Human Rights Centre, said he was >concerned about the lack of judicial scrutiny. > >___ >EPIC_IDOF mailing list >[EMAIL PROTECTED] >https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_idof > > >- >You are subscribed as [EMAIL PROTECTED] >To manage your subscription, go to >http://v2.listbox.com/member/?listname=ip > >Archives at: http://www.interesting-people.org/archives/interesting-people/ > >- End forwarded messag
[EMAIL PROTECTED]: [IP] more on Police use cameras to track vehicles of suspects]
- Forwarded message from David Farber <[EMAIL PROTECTED]> - From: David Farber <[EMAIL PROTECTED]> Date: Wed, 20 Jul 2005 20:26:40 -0400 To: Ip ip Subject: [IP] more on Police use cameras to track vehicles of suspects X-Mailer: Apple Mail (2.733) Reply-To: [EMAIL PROTECTED] Begin forwarded message: From: gailbracy <[EMAIL PROTECTED]> Date: July 20, 2005 6:18:24 PM EDT To: [EMAIL PROTECTED] Subject: RE: [IP] Police use cameras to track vehicles of suspects For what it's worth, I just finished a cross-country drive from San Diego to NC via I-40 and was quite curious about the other fixtures attached to the cell towers planted on nearly every mile of the Interstate. Creepier still, was the fact that I saw virtually no Highway Patrols through any of the states I crossed with the exceptions of Tennessee, and at a few construction sites. Gail Bracy -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of David Farber Sent: Wednesday, July 20, 2005 8:49 AM To: Ip ip Subject: [IP] Police use cameras to track vehicles of suspects Begin forwarded message: From: Bruce Schneier <[EMAIL PROTECTED]> Date: July 20, 2005 11:04:17 AM EDT To: [EMAIL PROTECTED] Subject: [EPIC_IDOF] Police use cameras to track vehicles of suspects I've written about this in New Haven, CT: http://www.schneier.com/blog/archives/2004/10/license_plate_g.html This new story is from Scotland. Bruce ******** Police use cameras to track vehicles of suspects http://www.theherald.co.uk/news/43417.html LUCY ADAMS, Home Affairs CorrespondentJuly 20 2005 POLICE have created a database of more than 6000 vehicles of suspects which they can track on special cameras as they move around the country. On major roads across Scotland, the cameras, which look similar to the speed ones, record thousands of licence plates every hour and scan them against the database. Those on the list are flagged up with the local force control room with details of the direction in which they are travelling. Depending on the intelligence held on the motorist, the vehicle could be stopped immediately by officers or monitored during its journey. Senior police say there are a "substantial number" of cameras across the country aimed at detecting drugs traffickers, sex offenders, suspected terrorists and banned or unlicensed drivers. Owners on the list are not told, and civil rights campaigners have raised concerns about whether the scheme is compatible with human rights legislation. However, officers say Automatic Number Plate Recognition (ANPR), originally created for counter-terrorism, is a vital tool in collecting intelligence on criminals and suspected terrorists. Alan Burnett, spokesman on the system for the Association of Chief Police Officers in Scotland, and assistant chief constable of Fife, said: "It is directed against detecting travelling housebreakers, potential terrorists, bogus callers and drug traffickers. This technology is very much geared towards disrupting criminals such as drug traffickers and it is not about prosecuting the motorist." He said it was nothing to do with speeding or Big Brother, adding that there were various lengths of time over which they could hold the information: "A stolen vehicle may be on the list for two days, but more serious intelligence may be kept on the list for up to 90 days." The Scottish Executive has spent ?1.5m on ANPR machines which can check up to 3000 licence plates an hour on vehicles travelling at speeds of up to 100mph. Forces are planning to connect this database to the Scottish Intelligence Database (SID) to allow every officer to be able to request that a vehicle of interest should be checked. It is managed by the Scottish Criminal Records Office where a sergeant is responsible for checking the information is held only for a certain time and that it is compliant with human rights legislation. John Scott, head of the Scottish Human Rights Centre, said he was concerned about the lack of judicial scrutiny. ___ EPIC_IDOF mailing list [EMAIL PROTECTED] https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_idof ----- You are subscribed as [EMAIL PROTECTED] To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting- people/ ----- You are subscribed as [EMAIL PROTECTED] To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3
[EMAIL PROTECTED]: [IP] Police use cameras to track vehicles of suspects]
- Forwarded message from David Farber <[EMAIL PROTECTED]> - From: David Farber <[EMAIL PROTECTED]> Date: Wed, 20 Jul 2005 11:49:17 -0400 To: Ip ip Subject: [IP] Police use cameras to track vehicles of suspects X-Mailer: Apple Mail (2.733) Reply-To: [EMAIL PROTECTED] Begin forwarded message: From: Bruce Schneier <[EMAIL PROTECTED]> Date: July 20, 2005 11:04:17 AM EDT To: [EMAIL PROTECTED] Subject: [EPIC_IDOF] Police use cameras to track vehicles of suspects I've written about this in New Haven, CT: http://www.schneier.com/blog/archives/2004/10/license_plate_g.html This new story is from Scotland. Bruce **** Police use cameras to track vehicles of suspects http://www.theherald.co.uk/news/43417.html LUCY ADAMS, Home Affairs CorrespondentJuly 20 2005 POLICE have created a database of more than 6000 vehicles of suspects which they can track on special cameras as they move around the country. On major roads across Scotland, the cameras, which look similar to the speed ones, record thousands of licence plates every hour and scan them against the database. Those on the list are flagged up with the local force control room with details of the direction in which they are travelling. Depending on the intelligence held on the motorist, the vehicle could be stopped immediately by officers or monitored during its journey. Senior police say there are a "substantial number" of cameras across the country aimed at detecting drugs traffickers, sex offenders, suspected terrorists and banned or unlicensed drivers. Owners on the list are not told, and civil rights campaigners have raised concerns about whether the scheme is compatible with human rights legislation. However, officers say Automatic Number Plate Recognition (ANPR), originally created for counter-terrorism, is a vital tool in collecting intelligence on criminals and suspected terrorists. Alan Burnett, spokesman on the system for the Association of Chief Police Officers in Scotland, and assistant chief constable of Fife, said: "It is directed against detecting travelling housebreakers, potential terrorists, bogus callers and drug traffickers. This technology is very much geared towards disrupting criminals such as drug traffickers and it is not about prosecuting the motorist." He said it was nothing to do with speeding or Big Brother, adding that there were various lengths of time over which they could hold the information: "A stolen vehicle may be on the list for two days, but more serious intelligence may be kept on the list for up to 90 days." The Scottish Executive has spent ?1.5m on ANPR machines which can check up to 3000 licence plates an hour on vehicles travelling at speeds of up to 100mph. Forces are planning to connect this database to the Scottish Intelligence Database (SID) to allow every officer to be able to request that a vehicle of interest should be checked. It is managed by the Scottish Criminal Records Office where a sergeant is responsible for checking the information is held only for a certain time and that it is compliant with human rights legislation. John Scott, head of the Scottish Human Rights Centre, said he was concerned about the lack of judicial scrutiny. ___ EPIC_IDOF mailing list [EMAIL PROTECTED] https://mailman.epic.org/cgi-bin/mailman/listinfo/epic_idof ----- You are subscribed as [EMAIL PROTECTED] To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ - End forwarded message - -- Eugen* Leitl http://leitl.org";>leitl __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature