> But now we're back to the question: how can Tor be improved to deal with
> this very serious and important problem? What are the steps that might
> be taken, however imperfect, to reduce the amount of abuse coming from
> Tor nodes?
That's trivial: charge Tor-originated users for editing. That 0
Just a tiny interesting operation found out via routine misspelling that can
breed paranoia in idle minds:
sprint has smtp to SMS gateway for its customers running at
messaging.sprintpcs.com, so if you e-mail to
[EMAIL PROTECTED] the user gets message on the phone.
Interestingly enough, there i
> Google cookies last as long as possible -- until 2038. If you've
And you are allowing cookies because ... ?
And you are keeping cookies past the session because ... ?
Too lazy not to?
To lazy to login again?
Inherent belief that commercial entity should make your life easy for purely
phila
> I'm still having trouble understanding your threat model.
Just assume braindeath and it becomes obvious.
No tla with any dignity left would bother e-mail providers or try to get your
password. All it need to do is fill gforms and get access to tapped traffic at
major nodes (say, 20 in US is suf
This very likely means that someone already has MM figured out; the question is
not whether it will be revealed, but when.
> All of these attacks focus on finding the master secret MM value; once
> that is found, the security of the system collapses. Given a KSV it is
> immediately possible t
The simplest solution is to systematically spread one's DNA everywhere, thus
making 'discovery' of it meaningless.
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
__
Do you Yahoo!?
Yahoo! Mail - now with 250MB free
> If you want to be invisible to lawyers, you have to use something else.
Whoever wants to design something 'else' should first see Monty Python's "How
not to be seen" sketch (or was it "Importance of not being seen" ?)
It applies pretty well to all current techniques for moving unpaid copyrighte
Unless I'm missing something obvious, it seems impossible to divine the
origination IP address from gmail-sourced e-mail headers. The first IP (the
last header) has 10.*.*.* form and is of course internal to google.
This is not the case with any other e-mail service I know of (mixmaster
excluded),
> What are the possible solutions for the remailers? Make all
> remailers middleman only and adding the ability to opt-in for
Open wireless access points.
No one said you are entitled to mail anonymously from the comfort of your
home/office. Stop whining.
=
end
(of original message)
> A cool thing for this purpose could be a patch for gcc to produce unique
> code every time, perhaps using some of the polymorphic methods used by
> viruses.
The purpose would be that they do not figure out that you are using some
security program, so they don't suspect that noise in the file o
>The impracticability of breaking symmetric ciphers is only a
>comparatively small part of the overall problem.
I see that "it can be done only by brute farce" myth is live and well.
Hint: all major cryptanalytic advances, where governments broke a cypher and
general public found out few *decades
> If VOIP gets no protection, then you'll see a lot of "digital" bugs in
Protection of bits by legislation ???
Why is this a subject ? If you don't encrypt you will be listened to. Who the
fuck cares if intercept is legal or not. That is irrelevant. It's like trying
to obsolete summer clothing by
> incriminating, and the State has a substantial interest in knowing who you
> are -- you may need medicating, or you may owe the government money, or
Exactly ... and maybe you are on this "consumer" list:
http://bmj.bmjjournals.com/cgi/content/full/328/7454/1458
>The president's commission fou
> However, it should be known that fiberglass (eg van) panels are
> transparent
> to uwaves AFAIK and that a van with soft tires is a 0th-order
0.25" glass will cost you 2-2.5 dB.
> At sufficiently good mechanical stabilization and gain, you will
> encounter perhaps
The best way to do this is to
> If there's any kind of leakage bias, then a high-powered signal might get a
> few bits through. After that, only a Palm OS expert will know if there's
> some kind of signal that can tease the Palm awake and then get it to swallow
> some kind of trojan.
Bits are not marbles to exist outside re
> It seems we now have hard figures to support the notion that
> proof-of-work cannot be a complete solution in itself. We will be making
> that clearer in a revision of the paper (and fixing some errors).
It seems that efforts to increase cost of e-mail by some heavy cycle burning
fail on the a
>Does anyone know whether the low-power nature of wireless LANs protects
>them from eavesdropping by satellite?
GSM cell phones have been successfully tapped via sat. Power is greater (up to
.5w) but antennas are worse, so effective radiated energy is very similar, as
are frequencies.
=
end
> underground railroad would have worked better, but your still black.
Obviously you don't know about whitening properties of moder ciphers!
Seriously, today the distingushing marks among classes, tribes and castes are
far more informational than physical. So today crypto *can* make you white, or
> The extreme ease of use of internet wiretapping and lack of accountability
> is not a good situation to create.
False.
It is the best possible situation cpunk-wise I can imagine.
It effectively deals away with bs artists (those who *argue* against this or
that) and empowers mathematics. If one
Can a TLA please give some sign here, any sign - just ack that you know the
list exists, otherwise the legitimacy of cpunks is definitely going down the
drain.
Looks like a Berlin wall syndrome.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Forget about repeater.
13-15 db flat panel antenna will get you access to distant APs - up to one mile
in favourable conditions.
18db grid dish will connect you to omnidirectional AP within 2 miles.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
__
> What I'd like to see is a P2P telephony that also supports end-user
> gateways to the POTS. I'm not certain, but I think there are some MS
I don't get what does this have to do with crypto.
Outside crypto, this didn't quite work with (almost) public fax gateways of
'90s. In theory, you could
> Because it means you can complete call to the POTs with no
> company-controlled switch involved, meaning no where to serve a court
> order. Since the call could be routed through a few intermediate nodes and
I see.
So, in the real world, X uses this to make telephone threats, your POTS gets
> Its like steganalysis. Its an arms race between measuring your own
> signatures vs. what the Adversary can measure. If sentence length
> is a metric known to you, you can write filters that warn you.
> Similarly for the Adversary. You end up in an arms race
> over metrics ---who has the more
> http://lists.cryptnet.net/mailman/listinfo/cpunx-news
>
> Be sure and check the archive before posting. It is still small.
Cookies, "members only" archive access. Bad deal. Will not happen. Very few
consumers here.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam fol
> If you spatially fft a random photo, you'll find that the image detail
> energy largely occupies certain bands. These are not the bands that stego
> uses (or so I assume...it really can't be otherwise). The stego-able
> spectrum will indeed be noise, but this noise will have a certain spectrum
> Does anyone have a reasonably complete cypherpunks archive available
> for FTP? Perhaps I could host them on my server and let Google index
> them. That might be useful.
There are only two live ones. Someone knows more ?
The second one is FTP-able:
http://groups.yahoo.com/group/cypherpunks-ln
> I've been wondering why I havent seen more discussion on
> wireless networking (802.11a/b/g) and anon/mix /dark nets.
> Is this a subject of interest to anyone? I am curious what
> kinds of work has been done in this area...
Check the archives.
Wireless solves all crypto anonymity problems for
> One exception: the ***, which hand writes the address. Is
Why do you assume that you can tell handwriting from machine-generated script?
There are techniques far more advanced than static fonts, that can introduce
randomness and be pretty much indistinguishable from the manual product.
> You might check out David Chaum's latest solution at
> http://www.vreceipt.com/, there are more details in the whitepaper:
> http://www.vreceipt.com/article.pdf
That is irrelevant. Whatever the solution is it must be understandable and
verifiable by the Standard high school dropout. Also, the tr
> Somebody please tell me that this is a nightmare, and I am about to
> wake up.
Let's see ... was there a contract to keep things up ad infinitum ?
This is a good step, part of waking up from the dream that there are free
things on Internet. If there is no eyeball-catching value to be derived fr
> From what I've gathered from the diagrams in [1], it seems to be using
> AES-256
> in counter-mode XORed together with Twofish counter-mode output, Twofish also
> being keyed with a 256 bit value. I sense paranoia here - but being paranoid
> myself sometimes I very much welcome this decision! Tho
> I have a few friends like thisanyone have suggestions for ways to change
> their minds?
>
> Basically they say things like "If you think the government can't break all
> the encryption schemes that we have, you're nuts." This guy was a math major
> too, so he understands the principles of c
Isn't it really simpler to use RSA and DH and ECC in series ? Why choose ONE ?
There is no good reason for that.
Looks like PSYOP to me.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
__
Do you Yahoo!?
Exclusive Video Premiere
> ignored by citizens, but I have yet to see a license for owning a
> typewriter or PC proposed. They have already ruled numerous times that the
> Internet is deserving of at least as free and access as print media and
There are precedents. In Franko's Spain, all typewriters had to be registe
Looks like the only way to shield from DOS is to raise the cost of DOS. This
will eventually eliminate the low cost of Internet bandwidth, one way or
another. You don't get nearly the same amount of DOS on your telephone as you
do on Internet, right ? Because telephone call is not free and/or it's
And what is the purpose of connecting the key and data storage in the first
place ?
Data storage is data storage, concealed or not. You feed encrypted data to/from
it.
Key is required at human interface and has absolutely nothing to do with the
storage.
If you want better security than passphras
It took less than a decade for EFF to make a full turn, from championing
unrestricted uses of technology to censoring who can do what and in which way.
In this regards EFF resembles technological empires - like Cisco, for example,
that get born because of radically new ways to do things and then e
And who will free the chicken ?
Fucking racists.
> Activists Take Ducks From Foie Gras Shed
>
> FARMINGTON, Calif. With only the dim light of a half-moon to guide
> them, four self-proclaimed "duck freedom fighters" made their way early
> Wednesday across an abandoned field, around dilapidate
> What does it mean to say that "64.94.110.11" is or is not
> certified by .com as the address for bad-example-12345.com ,
> or that something else is? Is it really the same as a
> wild-card that points to real sites? Your Best Practices says that
At this point it is immaterial what Verisign wil
> infrastructure for these. "Everyone" knows about them
> by using a common boostrap server to bootstrap into
> the Jxta network to gain the addresses of a few
> Rendezvous nodes. Rendezvous nodes then propagate
So they are subject to lawsuits. Anyone running them can be traced and
persuaded by
> stable IP address. Super-peers on the Jxta network run
> application-level routers which store special
> information such as how to reach peers, how to join
So these super peers are reliable, non-vulnerable, although everyone knows
where they are, because ?
=
end
(of original message
Well, cats *do* have a quite strict hierarchy which is far from ad-hoc
establishment of the pecking order. So the analogy dosn't hold with cat
behavioral experts.
However, if cats could perform anonymized hissing, biting and scratching, then
I'm sure that cypherpunk maillist would be a good analog
http://recall.archive.org/?query=cypherpunks&search=go&afterMonth=1&afterYear=1996&beforeMonth=Today&beforeYear=%A0
(the above URL should be all in one line, of course)
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
__
Do you Ya
> Several months ago, I read about someone who was making a key that
> was difficult if not "impossible" to copy. They mixed sparkly things
> into a plastic resin and let them set. A camera would take a picture
This boils down to difficulty of faking the analog interface.
Anything that regular
What Tim is (correctly) observing here is that a working challenge to the force
monopoly is a very effective way to modify behaviour.
Where Tim is wrong, though, is that he may have anything resembling a working
challenge.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam
> as a solid dish. (The uwaves see the screen as solid, however.) With
> that much gain (ie directionality) wind could mess with your (albeit brief)
> connection.
This one has 30 degree coverage and is perfect for connecting to consumer APs
up to a mile: http://www.tranzeo.com/products.php?cmd=v
> Yes, but remember to wear a disguise/cloak and be careful how you
> arrive there. If you threaten King George, Who Worships Mars God of
> War, they will seize all the surveillance camera videos (public and private)
> near the AP you exploit. Don't stop for gas anywhere nearby.
A 18-24" 2.4Ghz
> This is a terrible day for privacy advocates that used the once (perhaps
This is the great day for *true* privacy advocates worldwide.
In face of huge difficulties and dangers in providing real anonymity, some
human rights/wrongs organisations capitalised (in several ways) on the need for
anony
> Is this sequence random? Compressible? How could you tell whether this
> sequence is random or not, if you didn't know the key?
This is the a way to describe so-called randomness.
One simply has no adequate access to the Key and/or the Algorithm.
Both coin flipping and quantum noise fall into
> - N+1 is the smallest integer that's not interesting.
> But that's interesting in itself - so N+1 is interesting.
It breaks down after few consequtive non-interesting integers.
In fact, there is a proof somewhere that 17, 18 and 19 are not interesting at
all.
=
end
(of original me
> seems horribly limiting. What of those using Entourage, or Mail, or any
> of the dozens of platforms and news readers in existence. The site
> mentions that they are now Blackberry-compliant. Well, does this mean
> employees of the companies using "Omniva Policy Manager" cannot read
> their m
> As an active twist, we can also use a separate unit, Illuminating
> Transceiver (IT), periodically broadcasting a pulse of known
> characteristics, easy to recognize by the LPs when it bounces from an
> aerial target. This unit has to be cheap and expendable - it's easy to
> locate and to destroy
ftp://ftp.rfc-editor.org/in-notes/rfc3514.txt
excerpt:
1. Introduction
Firewalls [CBR03], packet filters, intrusion detection systems, and
the like often have difficulty distinguishing between packets that
have malicious intent and those that are merely unusual. The problem
is that
Frankly, it seems that some brains around here are softening. Relying on httpd
operators to protect those who access is plain silly, even if echelon (funny
how that word dropped below radar lately) did not exist.
The proper way is, of course, self-protection. Start with tight control of
outgoing i
> why not just use ssh? you can scp the text to your host, encrypt/decrypt it
> *there* then scp it back if needs be. you also then don't need to use
> webmail - just have a mailbox on that server that you forward your webmail
> to, and that you send email in the name of the webmail account from.
>
> Yeah, yeah, all ideological tripe is the same: mine is right, yours is wrong.
> However, ideologues are a tribe on the prowl for victims, so beware
> media-addiction. Like this distortion mirror. What you fail to see incoming
> can splatter your guts.
The loop is closed; majority accepts the rul
> This is what we need to fight. And this was, and perhaps still is, the
> promises of unlinkable credentials, of untraceable digital cash, and of
> "True Names." Crypto anarchy is needed now more than ever.
There are hardly battlegrounds available. Software runs on machines big ones
make, bits
> I'm wondering why Cryptome decided to place thisB particular piece of
> opinion.B
> It is not inkeeping w/ the type of stuff I've read here before, in terms of
> it being a straightB opinion piece, not a document,B federal register entry,
> etc..B Why did "you" (who is that exactly, anyway?) c
> From the OSI 7-layer model, which took it from the fact that the number 7 is
It's simpler than that. Russians wanted 6, americans 8.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.c
> "...and this year, for the first time, every American will be weighed, and
> measured, and given a free yearly Rabies shot."
"From now on, you will be wearing your underwear outside, so that we can check
it's clean."
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam fol
>>1) Fucks up the prevailing religion doctrine.
>>
>Funny, but I can't seem to find the passage in the Bible where it talks
>about cloning. In fact, I can't find any passage that even remotely
>impinges on the subject.
Provided that I had the christian cult in mind (where I am not an connoisseu
>What would be the valid reason for the government to claim power
>to regulate her egg, her skin DNA, and her uterus?
1) Fucks up the prevailing religion doctrine.
2) Gives subjects an extra degree of freedom - imagine black ghetto females
giving birth to whities, uninfluenced by the local Bell
>Holy Fuck I love this! Were it a novel, I'd be willing to steal it a la file
>sharing.
Some things, like general education and breadth of interests, one just can't
fake. Redneckpunk, a very woody kind of word.
HST
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follo
>The whole "Cell Phones - The Next Generation" thing
>has been a pure marketing scam from the beginning.
Experience demonstrates that any term with "generation" in it is pure BS,
technically and financially.
Most advances in technology are illusions created by dumbing down of the
populace.
> But in the end, as strange and unreasonable as this action-at-a-distance may
> be, it's now regularly seen in the laboratory. (Even wierder are the 'quantum
> eraser' and other bizarre behaviors).
Is there any practical way to translate this into doll-and-needles method of
punishing modelled ta
> Expect to hear not of a hausfrau being busted, but of the roundup (so
> to speak) of Mohammed Sayeed, Hariq Azaz, and other thought criminals
> for buying two many gallons of Roundup at the local Walmart.
I'd guess that the credit card usage among People With Wrong Sounding Names is
falling sh
> Speculation: I expect the battles over cyberspace to shift to the OS,
> with the leading private (non open source) OS makers "enlisted" in the
> War Against Illegal Thoughts. The easiest initial front in this war,
> one the OS companies like Apple and Microsoft have a corporate interest
> in,
> But what I don't fully "get" is why stance matters, per se. For instance,
> take p2p. We can actually argue all we want about what government should/not
> do about "the problem", but in the end file sharing is just about
> unstoppable.
>
> If I write or release an app, then, that will facilitate
> Interesting approach. But exactly how does that hinder the FBI
> demanding a booksellers customer list, or a library's patron
> check out record, or a black bag job on a personal computer, or
> thousands of CALEA taps, or the Total Information Awareness
> project, or the process of designatin
> society, what can the regular person do to strike a blow in
> opposition to the direct attack on the Constitution and civil
> liberties and civil rights?
Stop watching TV ?
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus - Powerful. Afforda
> In a way, Mathew's and Choate's attack upon the list has done
> us a favour. The list is now effectively restricted to those
> with the will and ability to use filters, which raises the
> required intelligence level.
Does this vindicate homeopathy ?
=
end
(of original message)
Y-a*h*o-o
> I'm watching a New York television news show reporting on one of the
> recent cases where people sign away their rights. This is about
> requests sent out by schools that parents of students sign a pledge
> that alcohol, loud parties, and late night activities will not be
> permitted at their
> >But we will always have phone booths and acoustic couplers.
>
> Phone booths already don't accept calls, by State Fiat. You think
> detecting and dropping modem calls from a CO is tough?
It's just a matter of designing a (software ?) modem that will, instead of
whisling and peeping, emulate s
This, with obligatory cameras in cybercafes, is just plugging the anonymity
holes.
Also, one of unmentioned consenquences is that any "security" will make
self-organising networks harder to implement. Guess who benefits.
But we will always have phone booths and acoustic couplers.
=
end
(of
> cards with external antenna port. For cell phones the entire instrument
> could be placed in at the reflector's focus and operated via a mic/headset
> adapter (some older Nokia models have an external antenna port behind a
> small rubber plug on the rear.)
Cellphone taped in focal point of a
> 1. large wifi networks start to hit scaling problems - they start to need
> routers and name services that are relatively expensive, and ip address
> ranges start to become a scarce resource.
Not so. Self-organasing mesh networks appear to have some interesting
properties. There is a number of o
> > Geographic routing completely eliminates need for expensive routing
> > and admin traffic. Name services? Who needs name services? Localhost
> > is sufficient for a prefix to an address namepace.
> without routing and name services, you have what amounts to a propriatory
> NAT solution - no way
> couldn't be used to record video and then (after appropriate protection)
> swallowed.
Eventually this will happen. Maybe a video recorded into a DNA of a bacteria
synthesized in a portable device ("diamond age", anyone ?)
Ne protocols will be required ("if I infect this east coast girl, how l
> Lousy latency. Just put your DNA-encoded message in a microdot on your
> dead tree letter, and PCR/sequence on arrival.
Isn't all snail mail already irradiated ? Then soon.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! Mail Plus Powerful. Affordab
>Mojo was intended to do this but it failed, I think it failed
>because they failed to monetize mojo before it was introduced
>as service management mechanism.
I think that there is a generic failure of systems that expect some
pre-determined benevolence and cooperation from end users. Contrary to
> It's a state of mind wich can only be compared with mental ilness...
> (I've read that there are even some neurological similarities between the
> faithful and the mentaly ill)
The belief (faith) center is somewhere in the frontal cortex and that mutation
was essential for development of the c
> Other methods seek to eliminate the need for various levels of pre-knowledge
> between Bob and Alice, and to also stave off the "round up" scenario where a
> large group is examined and cleansed of all electronica, before data can
Live streaming is out of question as it would make detection t
Any wide-dissemination system must be distributed. Usenet used to fill this
role, but due to aggregation of major nodes and feeds it is not that any more.
Anything on the "web" has fixed pointers and already is or soon will be become
chokable. I'd be surprised if there is no development in progres
> A police ministers meeting in Darwin this week
> agreed it was "unacceptable websites advocating or facilitating violent
protest
> action be accessible from Australia".
This is just a CIA psyop to make US look good. USA and China.
=
end
(of original message)
Y-a*h*o-o (yes, they scan
One solution that would work:
1. keep the text paradigm - cyphertext is just a text for everyone involved.
2. Extract encrypt/decrypt functionality into a device (D) with longer lifetime
than OS/MUA/hw combo (C).
(2) assumes text interface between (C) and (D). (D) could be a PDA that can OCR
com
> building I inspect, my own work not excepted. You have to battle to get
> contractors to do it right. And owners to pay for quality work and
> maintenance
> rather than wait for vicitms and insurance companies to pay the tithe of
> negligence.
This is the same problem as with other expenses with
I see an open search engine as the most important server project. Limit the
engine to cpunkish issues and similar to control the popularity (bandwidth).
Run your own harvesters/spiders. This would help limit the google monopoly and
power and provide a search engine of choice for the (gasp) "communi
> Item: At most Cypherpunks meetings someone is sitting with their laptop
> open, recording notes (or whatever). I usually wonder what they plan to
> do with the notes...not in any paranoid sense, just wondering if
> they'll ever look at the notes again, and why.
Taking notes ???
We're just ch
> My notion was that Bob, who receives Alice's WiFi signal, is also using
> a laptop, which he simply walks off with. He doesn't need a DSL or
> cablemodem or whatever.
Could be an interesting exercise for the next cpunk meeting. The goal is to
leave the meeting with some content on the laptop a
> Does anyone know the truth from his own eyes, or a more
> complete set of images?
The Civic Center Plaza was practically filled. It's about 150 x 100 meters,
assuming 2 people per m2 it comes to around 30,000, and there were lots of
people around as well.
=
end
(of original message)
Y-a*h
> There are potential medical uses of this sort of technology -
> enough computer abusers and other desk-job workers with bad backs
> or similar health problems that could benefit from analyzing how they walk,
> but obviously Darpa's not going to find that. Perhaps we can get
There are expensive,
> No technical solution will work in absence of laws making it legal.
Sanity villain statement of the month.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Y! Web Hosting - Let the expert host your web site
http://webhosting.yahoo.com/
> sector offices or nuclear power plants. Instead of swiping a smart card,
> employees could swipe the arm containing the chip.
A new must-have item for terrorists: cleaver.
This is sillier than biometrics ... while you may talk the attacker out of
plucking your eyeballs or cutting off fingers (
> - queueing the track for download via kazaa
Napster clones, kazaa, gnutella et al. rely on end-users to upload stuff. These
end users simply have no bandwidth available for that. Cheapo DSL lines have
hundred or few hundreds of kbit/sec unguaranteed upload capacity. No one is
going to pay T1 to
> surrounding a white van near a Richmond gas station.
Toyota, GM and Ford all reported huge drop in white van sales, to a virtual
zero. Ford also asked dealers to remove white vans from "highly visible"
locations.
Unrelated, several body shops are advertising discounts on "white van
conversion"
> Also, can your tool use floppies instead of USB keys?
It's a freakin' C program that works on a file - but carrying a floppy around
is so ... ordinary.
> There are problems with KGB-quality attackers recovering overwritten data
> which are probably much more serious for disks than flash rom,
>
> Pretty much, yes. at least one "real world" OTP system assumes you will
> be using three CDRW disks; the three are xored (as you say) together,
I have a working OTP system on $40 64 Mb USB flash disk on my keychain.
The disk mounts on windoze and macs, and also contains all s/w required to
enc
> I fail to see how anyone, anytime, anywhere, can support
> the hunting of random non-consenting humans for sport.
This is a favourite bipedal pastime. We all support it. It's good and fills one
with joy and satisfaction.
Major tournaments are called "wars" and we hardly can wait for the next
>Does this run on linux?
Also, if regular cheapo PC sounboards can digitize 30 MHz (and Nyquist says
this requires 60 MHz sampling rate) then some product managers need ...
flogging.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Faith Hill - Exclusive
1 - 100 of 179 matches
Mail list logo