Re: Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back

2014-08-21 Thread Robert J. Hansen
> Just to get pedantic, according to Wikipedia [1]:

First, thank you for citing a definition rather than using a loose
handle on a notion.  I genuinely appreciate it!

> That seems pretty clear to me that HACIENDA is indeed a surveillance program.

It also means that a newspaper reporting on the outcome of a soccer
match is a surveillance program, since it influences the outcome of
gamblers who have twenty euros on the game.

I respectfully submit that once the definition is broadened that far,
the word ceases to have probative value.  But if that's the definition
people want to use, then I'll just shrug, register my objection, and
move on.  :)


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back

2014-08-21 Thread Filip M. Nowak
Hi,

> Name me any piece of non-trivial information which doesn't have the
> potential to be used against someone.

What do you mean by non-trivial?

Regards,
Filip

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back

2014-08-21 Thread Aaron Toponce
On Fri, Aug 22, 2014 at 12:46:38AM +0200, Gabriel Niebler wrote:
> On the contrary, IMO this sort of thing is fully encompassed by the
> word surveillance, at least as far as I have always understood it.
> Otherwise any surveillance camera installed in a public or publicly
> accessible place would not be one, by definition, since it is only
> gathering publicly available information.

Just to get pedantic, according to Wikipedia [1]:

Surveillance is the monitoring of the behavior, activities, or other
changing information, usually of people for the purpose of influencing,
managing, directing or protecting them. This can include observation from a
distance by means of electronic equipment (such as CCTV cameras), or
interception of electronically transmitted information (such as Internet
traffic or phone calls); and it can include simple, relatively no- or
low-technology methods such as human intelligence agents and postal
interception. The word surveillance comes from a French phrase for
"watching over" ("sur" means "from above" and "veiller" means "to watch"),
and is in contrast to more recent developments such as sousveillance. 

1- https://en.wikipedia.org/wiki/Surveillance

From that, I gather that surveillance is to gather information with the intent
of "influencing, managing, directing, or protecting [people]". HACIENDA is
gathering public information, with the intent to "plan intrusions into the
servers".

That seems pretty clear to me that HACIENDA is indeed a surveillance program.

-- 
. o .   o . o   . . o   o . .   . o .
. . o   . o o   o . o   . o o   . . o
o o o   . o .   . o o   o o .   o o o


pgpJuz0Q2iFPh.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back

2014-08-21 Thread Gabriel Niebler
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I'm sorry, I know this is OT for the list, but...

Am 21.08.2014 um 15:54 schrieb Robert J. Hansen:
>> GNU community members and collaborators have discovered
>> threatening details about a five-country government surveillance
>> program codenamed HACIENDA. (...)
(...)
> Also note that, contrary to the FSF's press release, this isn't 
> government surveillance.  It isn't even surveillance in the usual
> sense of the word. (...)

On the contrary, IMO this sort of thing is fully encompassed by the
word surveillance, at least as far as I have always understood it.
Otherwise any surveillance camera installed in a public or publicly
accessible place would not be one, by definition, since it is only
gathering publicly available information.

After all, when I go out of the house I cannot reasonably expect to
have all my actions and whereabouts remain private. I might meet
someone I know who would then know where and when they saw me.
And yet, if I was being either (a) systematically tracked through
cameras and face recognition software, or (b) followed by
people/drones (or (c), both) so my every step (in public, mind) would
be recorded, then I would absolutely call that surveillance. What else
could it possibly be?

And if a system was put in place that would simply track everyone as
in (a), then what else could we call it but mass surveillance? And
yet, it's only gathering publicly available information.

Of course, surveillance, _can_ mean a lot more than that:

> (...) But "surveillance" seems to mean something more: someone
> listening in on things that you have good reason to believe are 
> private.

I would call that espionage, snooping, spying etc., but yes, this also
absolutely falls under the heading of surveillance. It's just one
facet, though.

Cheers
gabe
-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBCgAGBQJT9nbHAAoJEO7XEikU4kSzPb0IALtekGE2FrH2p/J2mTcBq73o
5yIzc3g3pVzRUbFE01JXYluZGxVgSmJabF9dcnjhZyeGIlN5GxncLln9Bo0CdJKo
rjMjpysWYQFiKFTrN4TVWkpfTDN/PhbnCrNYQiHjk07QbFCG8YOvO0p4bwDxAED7
8Wnmq5UyHqCRvv55UerXbvEuYky36EoF5JHtDidv/6ioO9l66+7a0jgoWuD1ovWq
kGAPy53NheLlDqqx0MDdb4t70YTrImZma0/Cvd4ucD0L2oBygSmIFnFeYyl3lNaS
9cVd/91yRQ+QEuKwdSLbtgkcybpcY8t9G1uzKqF5Bv9PeDv3xjNCpnC/ZN2TsRs=
=zyGr
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back

2014-08-21 Thread Robert J. Hansen
On 8/21/2014 3:35 PM, Johannes Zarl wrote:
> "Compiling a collection of publicly available information" is an
> almost perfect description of the term "surveillance". E.g. a
> surveillance camera does exactly that: it collects publicly available
> information.

So does the phone book, Wikipedia, and IMDB.  We don't call them
surveillance.

> The information is not by definition harmful to anyone, yet has the
> potential to be used against someone.

Name me any piece of non-trivial information which doesn't have the
potential to be used against someone.




smime.p7s
Description: S/MIME Cryptographic Signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back

2014-08-21 Thread Johannes Zarl
On Thursday 21 August 2014 11:41:40 Robert J. Hansen wrote:
> If it escalates to an intrusion, then yes, that's definitely
> surveillance in my book.  Compiling a collection of publicly available
> information is not.

"Compiling a collection of publicly available information" is an almost 
perfect description of the term "surveillance". E.g. a surveillance camera 
does exactly that: it collects publicly available information.

Your initial example,
> That's like driving down the street and reporting on what colors
> people's houses are and whether they have their garage door open.
, is also a nice example of surveillance.

The information is not by definition harmful to anyone, yet has the potential 
to be used against someone.

"Mr. and Mrs. Smith always leave the garage door open in summer, except for 
one week a year, when they also close the bathroom window." is trivial, maybe 
even boring information to most people. To someone with bad intent this 
information might be a lot more interesting.

  Johannes

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: [Announce] Libgcrypt 1.6.2 released

2014-08-21 Thread Robert J. Hansen

Can anyone tell me how to remove myself from this list?


Sure.  Read any of the emails that get posted to this list. 
Particularly, please note:



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Go to that URL, scroll down to the bottom where you'll see "To 
unsubscribe from GnuPG-Users...", enter your email address, click 
"Unsubscribe," and you're done.  It's not hard.



___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


RE: [Announce] Libgcrypt 1.6.2 released

2014-08-21 Thread Shannon Crader
Hello,



Can anyone tell me how to remove myself from this list? I tried sending an 
email to the email listed on the site, but I haven't gotten a response and 
still get the emails.



Thanks,

Shannon



-Original Message-
From: Gnupg-users [mailto:gnupg-users-bounces+scrader=carrollu@gnupg.org] 
On Behalf Of Werner Koch
Sent: Thursday, August 21, 2014 8:39 AM
To: gnupg-annou...@gnupg.org; info-...@gnu.org
Cc: gcrypt-de...@gnupg.org
Subject: [Announce] Libgcrypt 1.6.2 released



Hello!



The GNU project is pleased to announce the availability of Libgcrypt version 
1.6.2.  This is a maintenance release to fix problems found in the recently 
released versions.



Libgcrypt is a general purpose library of cryptographic building blocks.

It does not provide any implementation of OpenPGP or other protocols.

Thorough understanding of applied cryptography is required for proper use 
Libgcrypt.





Noteworthy changes in version 1.6.2 (2014-08-21) 




* Map deprecated RSA algo number to the RSA algo number for better

   backward compatibility.



* Support a 0x40 compression prefix for EdDSA.



* Improve ARM hardware feature detection and building.



* Fix powerpc-apple-darwin detection



* Fix building for the x32 ABI platform.



* Support building using the latest mingw-w64 toolchain.



* Fix some possible NULL deref bugs.





Download





Source code is hosted at the GnuPG FTP server and its mirrors as listed at 
http://www.gnupg.org/download/mirrors.html .  On the primary server the source 
tarball and its digital signature are:



ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.2.tar.bz2 (2418k)  
ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.2.tar.bz2.sig



That file is bzip2 compressed.  A gzip compressed version is here:



ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.2.tar.gz (2874k)  
ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.2.tar.gz.sig



Alternativley you may upgrade using this patch file:



ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.1-1.6.2.diff.bz2 (17k)



In order to check that the version of Libgcrypt you are going to build is an 
original and unmodified one, you can do it in one of the following

ways:



* Check the supplied OpenPGP signature.  For example to check the

   signature of the file libgcrypt-1.6.3.tar.bz2 you would use this

   command:



 gpg --verify libgcrypt-1.6.3.tar.bz2.sig



   This checks whether the signature file matches the source file.  You

   should see a message indicating that the signature is good and made

   by the release signing key 4F25E3B6 which is certified by my well

   known key 1E42B367.  To retrieve the keys you may use the command

   "gpg --fetch-key finger:w...@g10code.com".



* If you are not able to use GnuPG, you have to verify the SHA-1

   checksum:



 sha1sum libgcrypt-1.6.3.tar.bz2



   and check that the output matches the first line from the

   following list:



cc31aca87e4a3769cb86884a3f5982b2cc8eb7ec  libgcrypt-1.6.2.tar.bz2

cdaf2bdd5f34b20f4f9d926536673c15b857d2e6  libgcrypt-1.6.2.tar.gz

302592ec4183b727ad07bdd47fc4d50d717f42e2  libgcrypt-1.6.1-1.6.2.diff.bz2





Copying

===



Libgcrypt is distributed under the terms of the GNU Lesser General Public 
License (LGPLv2.1+).  The helper programs as well as the documentation are 
distributed under the terms of the GNU General Public License (GPLv2+).  The 
file LICENSES has notices about contributions that require these additional 
notices are distributed.





Support

===



For help on developing with Libgcrypt you should read the included manual and 
optional ask on the gcrypt-devel mailing list [1].  A listing with commercial 
support offers for Libgcrypt and related software is available at the GnuPG web 
site [2].



The driving force behind the development of Libgcrypt is my company

g10 Code.  Maintenance and improvement of Libgcrypt and related software takes 
up most of our resources.  To allow us to continue our work on free software, 
we ask to either purchase a support contract, engage us for custom 
enhancements, or to donate money:



  https://gnupg.org/donate/





Thanks

==



Many thanks to all who contributed to Libgcrypt development, be it bug fixes, 
code, documentation, testing or helping users.





Happy hacking,



  Werner





[1] http://lists.gnupg.org/mailman/listinfo/gcrypt-devel

[2] https://www.gnupg.org/service.html



--

Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back

2014-08-21 Thread Robert J. Hansen

I'm not happy with that definition/understanding of "surveillance". It's
not just about "reporting on what colors people's houses are" - it's
more about someone going to every door, trying to open it, and noting
what kind of door and lock there is. Then, comes back with a key, opens
the door, installs cameras and other things. Next, he continues with the
next house, but if someone finds him, he says he's you. And then walks
to the next house.


If it escalates to an intrusion, then yes, that's definitely 
surveillance in my book.  Compiling a collection of publicly available 
information is not.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back

2014-08-21 Thread flapflap
Robert J. Hansen:
[snip]
> Also note that, contrary to the FSF's press release, this isn't
> government surveillance.  It isn't even surveillance in the usual sense
> of the word.  If you run a public service like HTTP, how is it
> "surveillance" for someone, anyone, to say "the server sixdemonbag.org,
> located at IP address 111.222.333.444, is running FooHTTPD 3.17"?
> That's like driving down the street and reporting on what colors
> people's houses are and whether they have their garage door open.
> 
> Distasteful, sure.  But "surveillance" seems to mean something more:
> someone listening in on things that you have good reason to believe are
> private.

I'm not happy with that definition/understanding of "surveillance". It's
not just about "reporting on what colors people's houses are" - it's
more about someone going to every door, trying to open it, and noting
what kind of door and lock there is. Then, comes back with a key, opens
the door, installs cameras and other things. Next, he continues with the
next house, but if someone finds him, he says he's you. And then walks
to the next house.

HACIENDA itself may not be "surveillance", because it is an active
attack/attempt to actively connect to a TCP socket and not just
(passively) monitoring how other people connect to the server.
However on a meta-level (=government), this is surveillace, because they
look for "things that you have good reason to believe are private"
(remember the slide that lists passwords as publicly available
information...).

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


[Announce] Libgcrypt 1.6.2 released

2014-08-21 Thread Werner Koch
Hello!

The GNU project is pleased to announce the availability of Libgcrypt
version 1.6.2.  This is a maintenance release to fix problems found in
the recently released versions.

Libgcrypt is a general purpose library of cryptographic building blocks.
It does not provide any implementation of OpenPGP or other protocols.
Thorough understanding of applied cryptography is required for proper
use Libgcrypt.


Noteworthy changes in version 1.6.2 (2014-08-21)


 * Map deprecated RSA algo number to the RSA algo number for better
   backward compatibility.

 * Support a 0x40 compression prefix for EdDSA.

 * Improve ARM hardware feature detection and building.

 * Fix powerpc-apple-darwin detection

 * Fix building for the x32 ABI platform.

 * Support building using the latest mingw-w64 toolchain.

 * Fix some possible NULL deref bugs.


Download


Source code is hosted at the GnuPG FTP server and its mirrors as listed
at http://www.gnupg.org/download/mirrors.html .  On the primary server
the source tarball and its digital signature are:

 ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.2.tar.bz2 (2418k)
 ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.2.tar.bz2.sig

That file is bzip2 compressed.  A gzip compressed version is here:

 ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.2.tar.gz (2874k)
 ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.2.tar.gz.sig

Alternativley you may upgrade using this patch file:

 ftp://ftp.gnupg.org/gcrypt/libgcrypt/libgcrypt-1.6.1-1.6.2.diff.bz2 (17k)

In order to check that the version of Libgcrypt you are going to build
is an original and unmodified one, you can do it in one of the following
ways:

 * Check the supplied OpenPGP signature.  For example to check the
   signature of the file libgcrypt-1.6.3.tar.bz2 you would use this
   command:

 gpg --verify libgcrypt-1.6.3.tar.bz2.sig

   This checks whether the signature file matches the source file.  You
   should see a message indicating that the signature is good and made
   by the release signing key 4F25E3B6 which is certified by my well
   known key 1E42B367.  To retrieve the keys you may use the command
   "gpg --fetch-key finger:w...@g10code.com".

 * If you are not able to use GnuPG, you have to verify the SHA-1
   checksum:

 sha1sum libgcrypt-1.6.3.tar.bz2

   and check that the output matches the first line from the
   following list:

cc31aca87e4a3769cb86884a3f5982b2cc8eb7ec  libgcrypt-1.6.2.tar.bz2
cdaf2bdd5f34b20f4f9d926536673c15b857d2e6  libgcrypt-1.6.2.tar.gz
302592ec4183b727ad07bdd47fc4d50d717f42e2  libgcrypt-1.6.1-1.6.2.diff.bz2


Copying
===

Libgcrypt is distributed under the terms of the GNU Lesser General
Public License (LGPLv2.1+).  The helper programs as well as the
documentation are distributed under the terms of the GNU General Public
License (GPLv2+).  The file LICENSES has notices about contributions
that require these additional notices are distributed.


Support
===

For help on developing with Libgcrypt you should read the included
manual and optional ask on the gcrypt-devel mailing list [1].  A
listing with commercial support offers for Libgcrypt and related
software is available at the GnuPG web site [2].

The driving force behind the development of Libgcrypt is my company
g10 Code.  Maintenance and improvement of Libgcrypt and related
software takes up most of our resources.  To allow us to continue our
work on free software, we ask to either purchase a support contract,
engage us for custom enhancements, or to donate money:

  https://gnupg.org/donate/


Thanks
==

Many thanks to all who contributed to Libgcrypt development, be it bug
fixes, code, documentation, testing or helping users.


Happy hacking,

  Werner


[1] http://lists.gnupg.org/mailman/listinfo/gcrypt-devel
[2] https://www.gnupg.org/service.html

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


pgp_E2zY_i5mq.pgp
Description: PGP signature
___
Gnupg-announce mailing list
gnupg-annou...@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-announce___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back

2014-08-21 Thread Robert J. Hansen

GNU community members and collaborators have discovered threatening
details about a five-country government surveillance program
codenamed HACIENDA. The good news? Those same hackers have already
worked out a free software countermeasure to thwart the program.


A little late to the party.  This sort of thing's gone on in the private
sector for at least six years -- that's when I first encountered a
business that continually portscanned the entire IPv4 address space,
service identification, and identification of known vulnerabilities
against those services.

Last I checked there were at least four businesses doing this, and
selling their results to anyone who could cough up $10K a year for a
subscription.

Also note that, contrary to the FSF's press release, this isn't
government surveillance.  It isn't even surveillance in the usual sense
of the word.  If you run a public service like HTTP, how is it
"surveillance" for someone, anyone, to say "the server sixdemonbag.org,
located at IP address 111.222.333.444, is running FooHTTPD 3.17"?
That's like driving down the street and reporting on what colors
people's houses are and whether they have their garage door open.

Distasteful, sure.  But "surveillance" seems to mean something more:
someone listening in on things that you have good reason to believe are
private.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Fwd: GNU hackers discover HACIENDA government surveillance and give us a way to fight back

2014-08-21 Thread da...@gbenet.com
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1




-  Original Message 
Subject:GNU hackers discover HACIENDA government surveillance and give 
us a way to fight back
Date:   Wed, 20 Aug 2014 18:02:21 -0400
From:   Free Software Foundation 
Reply-To:   Free Software Foundation 
To: david cooper 



Dear david,



GNU community members and collaborators have discovered threatening details 
about a
five-country government surveillance program codenamed HACIENDA. The good news? 
Those same
hackers have already worked out a free software countermeasure to thwart the 
program.



According to Heise newspaper
,
the intelligence agencies of the United States, Canada, United Kingdom, 
Australia, and New
Zealand, have used HACIENDA to map every server in twenty-seven countries, 
employing a
technique known as port scanning. The agencies have shared this map and use it 
to plan
intrusions into the servers. Disturbingly, the HACIENDA system actually hijacks 
civilian
computers to do some of its dirty work, allowing it to leach computing 
resources and cover
its tracks.



But this was not enough to stop the team of GNU hackers and their 
collaborators. After
making key discoveries about the details of HACIENDA, Julian Kirsch, Christian 
Grothoff,
Jacob Appelbaum, and Holger Kenn designed the TCP Stealth
 system to protect unadvertised servers 
from port
scanning. They revealed their work at the recent annual GNU Hackers' Meeting
 in Germany.



You can view a video announcing the discovery on fsf.org. Please be sure to 
share this with
everyone you know who cares about bulk surveillance.




We must fight the political battle for an end to mass surveillance and reduce 
the amount of
data collected about people in the first place
. On an individual 
level we have
to do everything we can to thwart the surveillance programs that are already in 
place.



*No matter your skill level, you can get involved at the FSF's surveillance page
.*



Ethical developers inside and outside GNU have been working for years on free 
software that
does not keep secrets from users, and programs that anyone can review to remove 
potential
vulnerabilities. These capabilities give free software users a fighting chance 
against
surveillance. Now, our community is turning its attention to uncovering and 
undermining
insidious programs like HACIENDA. Free software and its ideals are crucial to 
putting an end
to government bulk surveillance.



*Share this news with your friends, to help make people aware of the importance 
of free
software in fighting bulk surveillance.*



/Jacob Appelbaum of the TCP Stealth team gave a remote keynote address at the 
FSF's
LibrePlanet conference this year. Watch the recording of "Free Software for 
freedom:
Surveillance and you."
/





Libby Reinish and Zak Rogoff
Campaigns Managers



/You can view this post online
./

Follow us on GNU social  | Subscribe to our blogs 
via RSS
 | Join us as an associate member 


Sent from the Free Software Foundation,

51 Franklin Street
Floor 5
Boston, Massachusetts 02110-1301
United States

Unsubscribe

from this mailing list.

Stop all email

from the Free Software Foundation, including Defective by Design, and the Free 
Software
Supporter newsletter.



-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQIcBAEBAgAGBQJT9fHvAAoJENIbRAX92h7yw2gP/jKM6E+MJ/60m5Hh9Pd5Po/U
86429oQ6oxBhrPbYvGmvhBKEMpVy6ueoHE21cDrsD555JxLecLbwLk1izDLovgbX
HLe5utkRsH+t7L5BcvBDMsKfgmmPMxxrG9PxIZHYE5R07taMvs0Wx3+MJytziNrG
+UorpWHynOKT4LSbnFXxT0psq+sk6D2bZXXmEcbpr6Rv5+Uf1KF0EukxVi54qtsN
5R4HVZkCmr/fVUIxMEjQpdZTcuNXQHZni2b5LHXXLII72/Rw6bR9Frp1pU29bWl2
4zKeD2D7o7l1tsMiKuLrM0aWPzrdfXbqmZTrqxNew1DFNdr0CdTZhAz/eP76SVj8
4av9WxlN9EEdMQmN1yA6C96pKs6ZDOVfajRmx6O5/aFQjOA8PY8b4AcBtyfbKWK9
n6O3op2xvR6vfPJletqffFuCkCWCmkhU7155gBc3M6rLoxTj9jreCjB4duAnQi23
e6Wt3Kwvq+GH8jUJt30QpzCkeRcPz4wOrPaiO4dMdi1xV3G5/5BB2si+qmWHecuu
dKO7dwFo0k0m29z3HINiaXgSw3rggJistm