?

2000-09-06 Thread Patriots

Can you send us a anonymous remailer that will work with the toy webtv ?

Sons of Liberty Militia                        
        Tim Stine 
312 S. Wyomissing Ave.                        
    Shillington, Pa. 
19607 U.S.A.                       1-610-775-0497
[EMAIL PROTECTED] 

What is a Militia ? Defenders of Liberty  Freedom, and the
Constitutional Republic. Against Tyrants ! Foreign and Domestic ! Resist
the United Nations New World Order, and it's Global Socialism, actually
a Evil Oligarchy of the Superrich. We must Declare our Independence from
the U.N. New World Order ! Or forever lose our freedom. We_Must_Resist.
For_God_And_Country. The_American_Revolution_Continues !!! 
  

http://community.webtv.net/We_The_People_/SonsofLibertyMilitia 




Re: RSA Security releases RSA algoritm into public domain two weeks e arly. [cpunk]

2000-09-06 Thread Missouri FreeNet Administration


:RSA Security Releases RSA Encryption Algorithm into Public Domain
:
:'c = m(e) mod n' Made Available Two Weeks Early

ROTFLMAO!  Gee: wasn't it "public" already? CACKLE!

Yours, 
J.A. Terranson
[EMAIL PROTECTED]

--
If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...






Re: Good work by FBI and SEC on Emulex fraud case

2000-09-06 Thread Bill Stewart

At 1:12 PM -0700 8/31/00, Eric Murray wrote:
A small note: IW digitally-signing the releases would not
have made a difference in this case--  the guy used his knowledge
of IW's procedures to social-engineer IW into accepting the
fake release without doing their usual checking procedures.

At 01:22 PM 8/31/00 -0700, Tim May wrote:
The system I envision would mean each chunk of text ("press release") 
would carry a digital sig, which could be checked multiple times. 
Hard for social engineering to get past the fact that Emulex, say, 
had not digitally signed their own alleged press release.

How often do people check signatures?  
If they check them, and they pass, how often do they check keys?


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Subject: Microsoft Press Release On Digital Signatures
Date:September 6, 2001

Microsoft announced today that all future press releases will
be signed with PGP digital signatures so that readers can verify
that they're reading genuine Microsoft press releases,
not forgeries from hackers trying to manipulate the stock price.
Microsoft's corporate PGP key 0xB9C8B513 is on the Network Associates 
keyservers, and you can verify the signatures there.

Microsoft's public relations department also announced that
plans for World Domination 2.0 are ahead of schedule,
and declined to comment on Bill Gates's muttered reference to the
antitrust prosecutors as a major-league %^%*@.


-BEGIN PGP SIGNATURE-
Version: PGPfreeware 6.5.8 for non-commercial use http://www.pgp.com

iQA/AwUBObaOltwjGL65yLUTEQIfNACgrmbcIwqX+u3wWmDRAShF+ydjpiYAoLwS
WZoHfvvlHEd2/0rCVSrXL60G
=g+G7
-END PGP SIGNATURE-





Re: Good work by FBI and SEC on Emulex fraud case

2000-09-06 Thread Tim May

At 11:44 AM -0700 9/6/00, Bill Stewart wrote:
  At 1:12 PM -0700 8/31/00, Eric Murray wrote:
A small note: IW digitally-signing the releases would not
have made a difference in this case--  the guy used his knowledge
of IW's procedures to social-engineer IW into accepting the
fake release without doing their usual checking procedures.

At 01:22 PM 8/31/00 -0700, Tim May wrote:
The system I envision would mean each chunk of text ("press release")
would carry a digital sig, which could be checked multiple times.
Hard for social engineering to get past the fact that Emulex, say,
had not digitally signed their own alleged press release.

How often do people check signatures?
If they check them, and they pass, how often do they check keys?



Don't know. But not the problem of those issuing press releases. That 
_some_ people check signatures, whether electronic or inked, and 
_other_ people _don't_ doesn't lessen the significance of signing.

Those who bother to check a putative press release and find the 
attached signature doesn't match what they have seen from Web sites 
(and related "widely witnessed events," including hashes published in 
the company's financial documents, etc.) will have competitive 
advantages over those who don't bother to check and just hit the 
panic button.

Sounds fair to me. Sounds like evolution in action.


--Tim May

-- 
-:-:-:-:-:-:-:
Timothy C. May  | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   831-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
"Cyphernomicon" | black markets, collapse of governments.




GPG Slashdot discussion; Phil Z Interview

2000-09-06 Thread Bill Stewart or other lab user

Slashdot discussion at
http://slashdot.org/article.pl?sid=00/09/06/1653255mode=thread

OctaneZ asks: "What are the relative merits and drawbacks of using 
Gnu Privacy Guard vs. Network Associates' PGP. I am not referring 
to the fact that GPG doesn't use any restricted implemtations or
algorithems; or that GPG was not affected by the recent PGP hole; 
but other more everyday issues. How is interoperability between the two. 
As well as integration into common applications such as Eudora in
windows and others, possibly PINE, in LINUX. Could this be deployed 
such that the learning curve of transitioning users from PGP to GPG is
not too steep? 
I am a strong beleiver in encryption, and have used PGP for a very long
time, 
however I would prefer to use an OpenSource/Non-restricted program; 
however the usefullness of said program, as well as the security 
takes precidence, at least in my book." 

http://slashdot.org/article.pl?sid=00/09/06/1916226mode=thread

A reader writes "PGP's creator is participating in an online interview
this week. 
http://forums.itworld.com/webx?14@@.ee6caf5
Phil is mainly interested in  clearing the air about the 
recently discovered ADK bug, but the larger topics of encryption 
and worldwide organized snoop rings (Echelon) have already come up. 
The interview is open to questions from anyone; runs through Friday
9/8." 







'Shoot to Kill Bill' set to pass the Senate with no safeguards

2000-09-06 Thread Julian Assange


Tuesday, 5 September 2000

New ALP Sell-Out Completes Capitulation
on Defence Amendment Bill

'Shoot to Kill Bill' set to pass the Senate with no safeguards

The ALP today completed its capitulation to the Government by accepting new
Government amendments to Defence Legislation Amendment (Aid to Civilian
Authorities) Bill, Greens Senator Bob Brown said today.

"The ALP has refused to accept Greens amendments that would guarantee troops
could never be called out against a peaceful protest or industrial dispute,"
Senator Brown said. 

"On top of that they have watered down their already weak amendments.
Previously the ALP amendment had said that once called out the troops could
not be used unless there was 'a direct and immediate threat of death or
serious injury'.  These words have been replaced by "reasonable likelihood
of death or serious injury".

"Now, in a stunning overnight turnaround, the ALP has accepted a new
government amendment that would allow troops to be used against civilians
when there is 'serious damage to property'.  This gives the government and
military free reign to call out the troops because in almost every situation
'serious damage to property' could be envisaged. 

"This is a backflip on sell-out on back-down. Labor has failed to defend a
century of law and convention in Australia which has prevented the Defence
forces from being involved in armed conflict with civilians.

"The bill will now pass into law with no sunset clause, and no real
safeguard that would prevent troops being used on strikers and peaceful
protestors

Further information: Ben Oquist 02 62773170 or 0419704095


--
Ben Oquist
Australian Greens Senator Bob Brown
Parliament House, Canberra 2600
Australia
+61 2 62773170 ph
+61 2 62773185 fx
0419704095 mobile
http://www.greens.org.au/bobbrown




Make Your Advertising Easy! Fresh Opp-Seek Lists.. New list 9-06-2000!

2000-09-06 Thread newlists


EXPLODE YOUR SALES VIRTUALLY OVERNIGHT!
New Lower Prices This Mailing Only!

Do you want more sales, hits, sign-ups and cash?
Would you like to expand your on-line marketing campaign??

You do???

O.K. - we can do that for you!!! 

How you ask?

The answer is simple! You need MAXIMUM TARGETED EXPOSURE!!

You now have the opportunity to obtain some of the best
targeted e-mail lists of business opportunity seekers
available on the internet today. These people are just
waiting for your e-mail messages! Why waste time by
contacting people that are just going to hit the delete
key?  You need to reach an audience that wants to see 
your message!  We have that audience for you!


 NEW FRESH LIST AS OF 9-06-2000 **

To learn more read on or click 

http://www.virtue.nu/powerhour/ 
http://www.megspace.com/business/powerhour/
http://www.dazzled.com/powerhour/ 
http://www.stas.net/5/powerhour/
http://www.afreehome.com/powerhour/ 


(We Will Be Removing Websites Soon To Ensure that
our Lists are Not Over Used, So Order Quickly!)

*

INFO ABOUT OUR TARGETED LISTS

* We've mailed to these lists to ensure recipients are   
receptive  
* All undeliverables and removes have been removed to 
  date
* Many people on the lists have asked to be included
* These lists are targeted towards business opportunity
  seekers, 
* Our lists will never have any duplicated e-mail 
  addresses
* These lists are at least 93% deliverable.
 
For A Short Time, Our Discounted List Prices Are As Follows:

(All e-mail addresses are of business opportunity seekers)

10,000 - $20.00
25,000 - $25.00
50,000 - $50.00
100,000 - $65.00

BEST DEAL - SAVE OVER $360.00!  

200,000 $99.00 
 

Priceless Remove  Filter Lists for Low Costs!
 
We are currently selling our own personal remove list
for $50.00 This list consists of over 140,000 removes, 
flames, anti-spammers, and undeliverables that we have
personally collected.  We are also offering a list of 
over 100 filters for $10.00.  These are domains that have
asked to be removed, dangerous keywords that may be in 
your e-mail addresses, as well as other symbols and 
words that will seriously destroy your e-mail lists. All
lists you purchased here are already filtered by these
lists. Only purchase, if you have other lists.
__
 
SO, ARE YOU READY TO EXPLODE YOUR SALES AND START MAKING
THE AMOUNT OF MONEY THAT YOU DESERVE?  IF SO, THEN GO TO 
ONE OF THE FOLLOWING SITES AND GET STARTED ON YOUR NEW
MARKETING CAMPAIGN TODAY!

  
http://www.virtue.nu/powerhour/ 
http://www.megspace.com/business/powerhour/
http://www.dazzled.com/powerhour/ 
http://www.stas.net/5/powerhour/
http://www.afreehome.com/powerhour/



* We Will Be Removing Websites To Ensure that our
  Lists are Not Over used So Order Quickly *

You can also copy and paste these URLs into
your browser:

a href="http://www.virtue.nu/powerhour/"HERE/a, or
a href="http://www.megspace.com/business/powerhour/"HERE/a, 
or 
a href="http://www.dazzled.com/powerhour/"HERE/a, or
a href="http://www.stas.net/5/powerhour/"HERE/a, or
a href="http://www.afreehome.com/powerhour/"HERE/a



*
You are receiving this letter because you posted to on of
our FFA pages, or Free Classified sites, which added you
to one of our lists. We run upwards of 50 sites, any of
which may have added you to our list. If you do not 
remember posting it may be because you used an Automated 
FFA or Classified Ad Posting program or website.
 
 
 
 
 
 
 
 
 
 
 




linux-ipsec: RSA released

2000-09-06 Thread R. A. Hettinga


--- begin forwarded text


From: "Heyman, Michael" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: linux-ipsec: RSA released
Date: Wed, 6 Sep 2000 06:40:09 -0700
Sender: [EMAIL PROTECTED]

In case you don't already know:

From http://www.rsasecurity.com/news/pr/000906-1.html

BEDFORD, Mass., September 6, 2000 -- RSA® Security Inc. (NASDAQ: RSAS) today
announced it has released the RSA public key encryption algorithm into the
public domain, allowing anyone to create products that incorporate their own
implementation of the algorithm. This means that RSA Security has waived its
rights to enforce the patent for any development activities that include the
RSA algorithm occurring after September 6, 2000.

-Michael Heyman

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




tight group from nowhere

2000-09-06 Thread Private User

DoS attacks before internet worked for Catalonians:

http://www.zolatimes.com/V4.36/the_day.html

Internet does give some advantage:

Sync message goes out with the time (www, usenet, maillists).
Action takes place in the meatspace (we flush toilets and turn
on hemp lights at the right moments.)

There is NO WAY to trace this back to the distributed agents -
that is, unless your neighbour reports unusual light activity :-)

Something similar happened some 7-8 yrs back in the Bay Area
where drivers (on 101, I think) did 55mph in sync in all
lanes, creating chaos.

We are far too stuck to internet as communication medium.

Flushing the shit can also deliver the message,






[Apologies] RE: RSA Security releases ... cpunk

2000-09-06 Thread Trei, Peter

I don't know why the post is appearing multiple times, and
I'm as annoyed about it as you are.

Peter Trei




Re: RSA Security releases RSA algoritm into public domain two weeks e arly. [cpunk]

2000-09-06 Thread William H. Geiger III

In [EMAIL PROTECTED], on 09/06/00 
   at 08:10 AM, "Trei, Peter" [EMAIL PROTECTED] said:

RSA Security Releases RSA Encryption Algorithm into Public Domain

YAWN

-- 
---
William H. Geiger III  http://www.openpgp.net  
Geiger Consulting

Data Security  Cryptology Consulting
Programming, Networking, Analysis
 
PGP for OS/2:   http://www.openpgp.net/pgp.html
E-Secure:   http://www.openpgp.net/esecure.html
---




RSA Security releases RSA algoritm into public domain two weeks early. [cpunk]

2000-09-06 Thread Trei, Peter

Wednesday September 6, 8:03 am Eastern Time

Press Release

SOURCE: RSA Security Inc.

RSA Security Releases RSA Encryption Algorithm into Public Domain

'c = m(e) mod n' Made Available Two Weeks Early

BEDFORD, Mass., Sept. 6 /PRNewswire/ -- RSA® Security
Inc. (Nasdaq: RSAS - news) today announced it has released the
RSA public key encryption algorithm into the public domain,
allowing anyone to create products that incorporate their own
implementation of the algorithm. This means that RSA Security has
waived its rights to enforce the patent for any development
activities that include the RSA algorithm occurring after
September 6, 2000.

Represented by the equation "c = m(e) mod n," the RSA algorithm
is widely considered the standard for encryption and the core
technology that secures the vast majority of the e-business
conducted on the Internet. The U.S. patent for the RSA algorithm
(#4,405,829, "Cryptographic Communications System And Method")
was issued to the Massachusetts Institute of Technology (MIT) on
September 20, 1983, licensed exclusively to RSA Security and
expires on September 20, 2000.

"So much misinformation has been spread recently regarding the
expiration of the RSA algorithm patent that we wanted to create
an opportunity to state the facts," said Art Coviello, chief
executive officer of RSA Security. "RSA Security's
commercialization of the RSA patent helped create an entire
industry of highly secure, interoperable products that are the
foundation of the worldwide online economy.  Releasing the RSA
algorithm into the public domain now is a symbolic next step in
the evolution of this market, as we believe it will cement the
position of RSA encryption as the standard in all categories of
wired and wireless applications and devices. RSA Security intends
to continue to offer the world's premier implementation of the
RSA algorithm and all other relevant encryption technologies in
our RSA BSAFE® software solutions and we remain confident in
our leadership in the encryption market."

For nearly two decades, more than 800 companies spanning a range
of global industries have turned to RSA Security as a trusted,
strategic partner that can provide the proven, time-tested
encryption implementations and resources designed to speed time
to market. These companies, including nearly 200 so far in 2000,
rely on RSA BSAFE® security software for its encryption
implementation and value-added services for a broad range of B2B,
B2C and wireless applications.

During the past 17 years, RSA Security has incorporated the
concepts represented by the RSA algorithm into its RSA BSAFE
cryptographic software. The company has made continuous
enhancements to the way the algorithm has been implemented,
including a number of performance improvements and optimizations,
not reflected in the original patent, for a wide range of
software applications, operating systems and chip designs. RSA
Security also is an industry leader in developing standards on
the robust application of encryption technologies for solving
real-world problems. These core standards, known as the Public
Key Cryptography Standards (PKCS), form the underpinnings of
today's most widely used communication methods.

In recent years, encryption technology has taken on an entirely
new level of importance in the world of business and consumer
technology, and RSA Security continues to be a leader in the
industry. Once the province of a small group of technologists and
mathematicians, new developments have raised the profile of
encryption among a broad range of audiences. Moving forward,
electronic signature legislation, export regulation and the
pending selection of the Advanced Encryption Standard (AES) all
will contribute significantly to encryption playing a key role in
the further expansion of e-commerce initiatives for B2B, B2C and
extended enterprise applications.

For more information regarding the RSA algorithm and a free RSA
algorithm t-shirt, visit www.rsasecurity.com/total-solution.

About RSA Security Inc.

RSA Security Inc., The Most Trusted Name in e-Security(TM), helps
organizations build secure, trusted foundations for e-business
through its RSA SecurID® two-factor authentication, RSA BSAFE
encryption and RSA Keon® public key management systems. With
more than a half billion RSA BSAFE-enabled applications in use
worldwide, more than seven million RSA SecurID users and almost
20 years of industry experience, RSA Security has the proven
leadership and innovative technology to address the changing
security needs of e-business and bring trust to the new, online
economy. RSA Security can be reached at www.rsasecurity.com.

NOTE: This press release contains forward-looking statements
relating to the role of the RSA algorithm encryption and the
expansion of e-commerce. Such statements involve a number of
risks and uncertainties. Among the important factors that could
cause actual results to differ materially from those indicated by
such 

Re: StoN, Diffie-Hellman, other junk..

2000-09-06 Thread Asymmetric


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

At 01:21 09/07/2000 -0400, dmolnar wrote:


The modulus should be rather large -- something like 512 or 1024 bits.
With 64 bits, someone can use Pollard's method to find discrete logs in
roughly 2^32 trials, which is Bad. Taking discrete logs for larger primes
requires a variant of the number field sieve; the largest announced
modulus for which I'm aware of this being done is 300-400 bits, but it
hasn't received as much attention as factoring.

I figured it would be something of that nature.. hence the math library I 
was working on.. :)


I think www.cryptosavvy.com has some key length recommendations. You might

Thanks for the link...

The size of the generator is a different issue. I don't see any reason why
a small size generator would hurt...but I haven't thought about it very
much. Note that you need the factors of p-1 in order to test if
something's a generator, which means you may want to look into Maurer or
Mihailescu's methods for prime generation. (Mihailescu has a paper on
the subject aimed at implementors at
http://www.inf.ethz.ch/~mihailes/papers/primgen.ps )

Ah.. I have implemented a sieve of eros..whatever his name is.. ;)  for 
finding smaller primes.. it runs very fast, the old rules don't apply so 
much anymore, memory footprint being more a concern then speed I've noticed 
so far.. moving the found primes into a sparse array as you find them and 
then reusing the memory is one way around that.. even my quickly written 
implementation takes negligible time to find all the primes within 16 
bits.. but I've been looking at rabin-miller and some other methods as 
well.  I'll take a look at that link, thanks.. reason again for the math 
library.. my stuff (obviously) falls apart  32bits since my library for 
handling larger numbers is unfinished.


It was after my time, but the AP Computer Science curriculum now has a
BigInteger library as its "case study." :-)

A web search turned up
http://www.efg2.com/lab/library/Delphi/MathFunctions/Cryptography.htm

which has, among other things, a Pascal header for the Gnu MP library.

Ah cool.. I've heard very good things about GMP and had been thinking about 
ways to implement it.. could solve all my problems in one fell swoop. :)  I 
(for reasons that should be obvious) felt that writing the routines myself 
(with extensive testing) would be preferable, so I could avoid licensing 
issues as well as bugs/backdoors, but I'll look into this..  Thanks for the 
quick response.. the application will of course be available to anyone who 
wants it once finished.. and once Borland finishes Kylix, should compile 
nicely on the various x86 *nixes out there..


- ---signature file---

"'There comes a time when the operation of the machine
becomes so odious, makes you so sick at heart, that you
can't take part; you can't even passively take part, and
you've got to put your bodies upon the gears and upon the
wheels, upon the levers, upon all the apparatus, and you've
got to make it stop. And you've got to indicate to the people
who run it, to the people who own it, that unless you're free,
the machine will be prevented from working at all!"
- -Mario Savio-  Founder of the Free Speech Movement.

-BEGIN PGP SIGNATURE-
Version: PGPfreeware 6.5.8 for non-commercial use http://www.pgp.com

iQA/AwUBObcqEGvp1znMxX/XEQLaYQCgxBxiiYTY2OHcVgso4Iaqy7PYucAAniM9
YL2M9tDag44LaILC6mChDmyf
=TL/e
-END PGP SIGNATURE-




Re: 128-bit netscaoe v4 for bellsouth.net

2000-09-06 Thread madmullah

Sonny wrote:
 
 hello I would like to know if Netscape communictor version 4.* is
 available for bellsouth.net with 128-bit encryption. Pleas Email me

Yep son, download from home.netscape.com

--
 "It is the responsibility of intellectuals to speak the truth and to 
 expose lies."  -Noam Chomsky




10% COUPON FROM BARNES NOBLE

2000-09-06 Thread Barnes Noble Booksellers
Dear Barnes & Noble Customer, 

Thank you for providing us with your email address. As promised,
we are sending you a Barnes & Noble discount coupon, good toward
10% off your next purchase at a Barnes & Noble bookstore.



BARNES & NOBLE BOOKSTORE 10% DISCOUNT COUPON

Take 10% off your total purchase of $25 or more at a Barnes & Noble, 
even if your selection is already discounted! Just print out this 
email message and bring it to any Barnes & Noble bookstore.

Coupon code: C475092700
This offer is good through 9/27/00
Coupon is valid on a single purchase transaction made at a 
Barnes & Noble, Bookstop, or Bookstar store. May not be used 
toward the purchase of electronic gift cards (and/or gift 
certificates). Not valid at Barnes & Noble College Bookstores.
Limit one coupon per customer.
Email address: [EMAIL PROTECTED]



YOU ARE NOW CONNECTED TO THE BARNES & NOBLE NETWORK

...and therefore will receive the latest information via email 
on special events, promotional offers, new book announcements, 
and more from your favorite Barnes & Noble bookstore and 
Barnes & Noble.com.

If you would like to find out what's going on at a 
Barnes & Noble bookstore, or you want to shop at 
Barnes & Noble.com right now, click on one of the 
links below. 

To locate a Barnes & Noble store or search upcoming 
in-store events:
www.bn.com/frames/storeLocator/storeLocator_findstore_home.asp?

To shop at Barnes & Noble.com:
service.bfast.com/bfast/click/bnmarket?siteid=30652032=home
(Sorry, we can't redeem the above 10% discount coupon
online, but you'll enjoy our excellent everyday prices
nonetheless.)

PLEASE NOTE:
If you wish not to receive future email updates and offers from 
Barnes & Noble, or if you would like to personally select the 
stores about which we send you information,please click here.