?
Can you send us a anonymous remailer that will work with the toy webtv ? Sons of Liberty Militia Tim Stine 312 S. Wyomissing Ave. Shillington, Pa. 19607 U.S.A. 1-610-775-0497 [EMAIL PROTECTED] What is a Militia ? Defenders of Liberty Freedom, and the Constitutional Republic. Against Tyrants ! Foreign and Domestic ! Resist the United Nations New World Order, and it's Global Socialism, actually a Evil Oligarchy of the Superrich. We must Declare our Independence from the U.N. New World Order ! Or forever lose our freedom. We_Must_Resist. For_God_And_Country. The_American_Revolution_Continues !!! http://community.webtv.net/We_The_People_/SonsofLibertyMilitia
Re: RSA Security releases RSA algoritm into public domain two weeks e arly. [cpunk]
:RSA Security Releases RSA Encryption Algorithm into Public Domain : :'c = m(e) mod n' Made Available Two Weeks Early ROTFLMAO! Gee: wasn't it "public" already? CACKLE! Yours, J.A. Terranson [EMAIL PROTECTED] -- If Governments really want us to behave like civilized human beings, they should give serious consideration towards setting a better example: Ruling by force, rather than consensus; the unrestrained application of unjust laws (which the victim-populations were never allowed input on in the first place); the State policy of justice only for the rich and elected; the intentional abuse and occassionally destruction of entire populations merely to distract an already apathetic and numb electorate... This type of demogoguery must surely wipe out the fascist United States as surely as it wiped out the fascist Union of Soviet Socialist Republics. The views expressed here are mine, and NOT those of my employers, associates, or others. Besides, if it *were* the opinion of all of those people, I doubt there would be a problem to bitch about in the first place...
Re: Good work by FBI and SEC on Emulex fraud case
At 1:12 PM -0700 8/31/00, Eric Murray wrote: A small note: IW digitally-signing the releases would not have made a difference in this case-- the guy used his knowledge of IW's procedures to social-engineer IW into accepting the fake release without doing their usual checking procedures. At 01:22 PM 8/31/00 -0700, Tim May wrote: The system I envision would mean each chunk of text ("press release") would carry a digital sig, which could be checked multiple times. Hard for social engineering to get past the fact that Emulex, say, had not digitally signed their own alleged press release. How often do people check signatures? If they check them, and they pass, how often do they check keys? -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Subject: Microsoft Press Release On Digital Signatures Date:September 6, 2001 Microsoft announced today that all future press releases will be signed with PGP digital signatures so that readers can verify that they're reading genuine Microsoft press releases, not forgeries from hackers trying to manipulate the stock price. Microsoft's corporate PGP key 0xB9C8B513 is on the Network Associates keyservers, and you can verify the signatures there. Microsoft's public relations department also announced that plans for World Domination 2.0 are ahead of schedule, and declined to comment on Bill Gates's muttered reference to the antitrust prosecutors as a major-league %^%*@. -BEGIN PGP SIGNATURE- Version: PGPfreeware 6.5.8 for non-commercial use http://www.pgp.com iQA/AwUBObaOltwjGL65yLUTEQIfNACgrmbcIwqX+u3wWmDRAShF+ydjpiYAoLwS WZoHfvvlHEd2/0rCVSrXL60G =g+G7 -END PGP SIGNATURE-
Re: Good work by FBI and SEC on Emulex fraud case
At 11:44 AM -0700 9/6/00, Bill Stewart wrote: At 1:12 PM -0700 8/31/00, Eric Murray wrote: A small note: IW digitally-signing the releases would not have made a difference in this case-- the guy used his knowledge of IW's procedures to social-engineer IW into accepting the fake release without doing their usual checking procedures. At 01:22 PM 8/31/00 -0700, Tim May wrote: The system I envision would mean each chunk of text ("press release") would carry a digital sig, which could be checked multiple times. Hard for social engineering to get past the fact that Emulex, say, had not digitally signed their own alleged press release. How often do people check signatures? If they check them, and they pass, how often do they check keys? Don't know. But not the problem of those issuing press releases. That _some_ people check signatures, whether electronic or inked, and _other_ people _don't_ doesn't lessen the significance of signing. Those who bother to check a putative press release and find the attached signature doesn't match what they have seen from Web sites (and related "widely witnessed events," including hashes published in the company's financial documents, etc.) will have competitive advantages over those who don't bother to check and just hit the panic button. Sounds fair to me. Sounds like evolution in action. --Tim May -- -:-:-:-:-:-:-: Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 831-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, "Cyphernomicon" | black markets, collapse of governments.
GPG Slashdot discussion; Phil Z Interview
Slashdot discussion at http://slashdot.org/article.pl?sid=00/09/06/1653255mode=thread OctaneZ asks: "What are the relative merits and drawbacks of using Gnu Privacy Guard vs. Network Associates' PGP. I am not referring to the fact that GPG doesn't use any restricted implemtations or algorithems; or that GPG was not affected by the recent PGP hole; but other more everyday issues. How is interoperability between the two. As well as integration into common applications such as Eudora in windows and others, possibly PINE, in LINUX. Could this be deployed such that the learning curve of transitioning users from PGP to GPG is not too steep? I am a strong beleiver in encryption, and have used PGP for a very long time, however I would prefer to use an OpenSource/Non-restricted program; however the usefullness of said program, as well as the security takes precidence, at least in my book." http://slashdot.org/article.pl?sid=00/09/06/1916226mode=thread A reader writes "PGP's creator is participating in an online interview this week. http://forums.itworld.com/webx?14@@.ee6caf5 Phil is mainly interested in clearing the air about the recently discovered ADK bug, but the larger topics of encryption and worldwide organized snoop rings (Echelon) have already come up. The interview is open to questions from anyone; runs through Friday 9/8."
'Shoot to Kill Bill' set to pass the Senate with no safeguards
Tuesday, 5 September 2000 New ALP Sell-Out Completes Capitulation on Defence Amendment Bill 'Shoot to Kill Bill' set to pass the Senate with no safeguards The ALP today completed its capitulation to the Government by accepting new Government amendments to Defence Legislation Amendment (Aid to Civilian Authorities) Bill, Greens Senator Bob Brown said today. "The ALP has refused to accept Greens amendments that would guarantee troops could never be called out against a peaceful protest or industrial dispute," Senator Brown said. "On top of that they have watered down their already weak amendments. Previously the ALP amendment had said that once called out the troops could not be used unless there was 'a direct and immediate threat of death or serious injury'. These words have been replaced by "reasonable likelihood of death or serious injury". "Now, in a stunning overnight turnaround, the ALP has accepted a new government amendment that would allow troops to be used against civilians when there is 'serious damage to property'. This gives the government and military free reign to call out the troops because in almost every situation 'serious damage to property' could be envisaged. "This is a backflip on sell-out on back-down. Labor has failed to defend a century of law and convention in Australia which has prevented the Defence forces from being involved in armed conflict with civilians. "The bill will now pass into law with no sunset clause, and no real safeguard that would prevent troops being used on strikers and peaceful protestors Further information: Ben Oquist 02 62773170 or 0419704095 -- Ben Oquist Australian Greens Senator Bob Brown Parliament House, Canberra 2600 Australia +61 2 62773170 ph +61 2 62773185 fx 0419704095 mobile http://www.greens.org.au/bobbrown
Make Your Advertising Easy! Fresh Opp-Seek Lists.. New list 9-06-2000!
EXPLODE YOUR SALES VIRTUALLY OVERNIGHT! New Lower Prices This Mailing Only! Do you want more sales, hits, sign-ups and cash? Would you like to expand your on-line marketing campaign?? You do??? O.K. - we can do that for you!!! How you ask? The answer is simple! You need MAXIMUM TARGETED EXPOSURE!! You now have the opportunity to obtain some of the best targeted e-mail lists of business opportunity seekers available on the internet today. These people are just waiting for your e-mail messages! Why waste time by contacting people that are just going to hit the delete key? You need to reach an audience that wants to see your message! We have that audience for you! NEW FRESH LIST AS OF 9-06-2000 ** To learn more read on or click http://www.virtue.nu/powerhour/ http://www.megspace.com/business/powerhour/ http://www.dazzled.com/powerhour/ http://www.stas.net/5/powerhour/ http://www.afreehome.com/powerhour/ (We Will Be Removing Websites Soon To Ensure that our Lists are Not Over Used, So Order Quickly!) * INFO ABOUT OUR TARGETED LISTS * We've mailed to these lists to ensure recipients are receptive * All undeliverables and removes have been removed to date * Many people on the lists have asked to be included * These lists are targeted towards business opportunity seekers, * Our lists will never have any duplicated e-mail addresses * These lists are at least 93% deliverable. For A Short Time, Our Discounted List Prices Are As Follows: (All e-mail addresses are of business opportunity seekers) 10,000 - $20.00 25,000 - $25.00 50,000 - $50.00 100,000 - $65.00 BEST DEAL - SAVE OVER $360.00! 200,000 $99.00 Priceless Remove Filter Lists for Low Costs! We are currently selling our own personal remove list for $50.00 This list consists of over 140,000 removes, flames, anti-spammers, and undeliverables that we have personally collected. We are also offering a list of over 100 filters for $10.00. These are domains that have asked to be removed, dangerous keywords that may be in your e-mail addresses, as well as other symbols and words that will seriously destroy your e-mail lists. All lists you purchased here are already filtered by these lists. Only purchase, if you have other lists. __ SO, ARE YOU READY TO EXPLODE YOUR SALES AND START MAKING THE AMOUNT OF MONEY THAT YOU DESERVE? IF SO, THEN GO TO ONE OF THE FOLLOWING SITES AND GET STARTED ON YOUR NEW MARKETING CAMPAIGN TODAY! http://www.virtue.nu/powerhour/ http://www.megspace.com/business/powerhour/ http://www.dazzled.com/powerhour/ http://www.stas.net/5/powerhour/ http://www.afreehome.com/powerhour/ * We Will Be Removing Websites To Ensure that our Lists are Not Over used So Order Quickly * You can also copy and paste these URLs into your browser: a href="http://www.virtue.nu/powerhour/"HERE/a, or a href="http://www.megspace.com/business/powerhour/"HERE/a, or a href="http://www.dazzled.com/powerhour/"HERE/a, or a href="http://www.stas.net/5/powerhour/"HERE/a, or a href="http://www.afreehome.com/powerhour/"HERE/a * You are receiving this letter because you posted to on of our FFA pages, or Free Classified sites, which added you to one of our lists. We run upwards of 50 sites, any of which may have added you to our list. If you do not remember posting it may be because you used an Automated FFA or Classified Ad Posting program or website.
linux-ipsec: RSA released
--- begin forwarded text From: "Heyman, Michael" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: linux-ipsec: RSA released Date: Wed, 6 Sep 2000 06:40:09 -0700 Sender: [EMAIL PROTECTED] In case you don't already know: From http://www.rsasecurity.com/news/pr/000906-1.html BEDFORD, Mass., September 6, 2000 -- RSA® Security Inc. (NASDAQ: RSAS) today announced it has released the RSA public key encryption algorithm into the public domain, allowing anyone to create products that incorporate their own implementation of the algorithm. This means that RSA Security has waived its rights to enforce the patent for any development activities that include the RSA algorithm occurring after September 6, 2000. -Michael Heyman --- end forwarded text -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
tight group from nowhere
DoS attacks before internet worked for Catalonians: http://www.zolatimes.com/V4.36/the_day.html Internet does give some advantage: Sync message goes out with the time (www, usenet, maillists). Action takes place in the meatspace (we flush toilets and turn on hemp lights at the right moments.) There is NO WAY to trace this back to the distributed agents - that is, unless your neighbour reports unusual light activity :-) Something similar happened some 7-8 yrs back in the Bay Area where drivers (on 101, I think) did 55mph in sync in all lanes, creating chaos. We are far too stuck to internet as communication medium. Flushing the shit can also deliver the message,
[Apologies] RE: RSA Security releases ... cpunk
I don't know why the post is appearing multiple times, and I'm as annoyed about it as you are. Peter Trei
Re: RSA Security releases RSA algoritm into public domain two weeks e arly. [cpunk]
In [EMAIL PROTECTED], on 09/06/00 at 08:10 AM, "Trei, Peter" [EMAIL PROTECTED] said: RSA Security Releases RSA Encryption Algorithm into Public Domain YAWN -- --- William H. Geiger III http://www.openpgp.net Geiger Consulting Data Security Cryptology Consulting Programming, Networking, Analysis PGP for OS/2: http://www.openpgp.net/pgp.html E-Secure: http://www.openpgp.net/esecure.html ---
RSA Security releases RSA algoritm into public domain two weeks early. [cpunk]
Wednesday September 6, 8:03 am Eastern Time Press Release SOURCE: RSA Security Inc. RSA Security Releases RSA Encryption Algorithm into Public Domain 'c = m(e) mod n' Made Available Two Weeks Early BEDFORD, Mass., Sept. 6 /PRNewswire/ -- RSA® Security Inc. (Nasdaq: RSAS - news) today announced it has released the RSA public key encryption algorithm into the public domain, allowing anyone to create products that incorporate their own implementation of the algorithm. This means that RSA Security has waived its rights to enforce the patent for any development activities that include the RSA algorithm occurring after September 6, 2000. Represented by the equation "c = m(e) mod n," the RSA algorithm is widely considered the standard for encryption and the core technology that secures the vast majority of the e-business conducted on the Internet. The U.S. patent for the RSA algorithm (#4,405,829, "Cryptographic Communications System And Method") was issued to the Massachusetts Institute of Technology (MIT) on September 20, 1983, licensed exclusively to RSA Security and expires on September 20, 2000. "So much misinformation has been spread recently regarding the expiration of the RSA algorithm patent that we wanted to create an opportunity to state the facts," said Art Coviello, chief executive officer of RSA Security. "RSA Security's commercialization of the RSA patent helped create an entire industry of highly secure, interoperable products that are the foundation of the worldwide online economy. Releasing the RSA algorithm into the public domain now is a symbolic next step in the evolution of this market, as we believe it will cement the position of RSA encryption as the standard in all categories of wired and wireless applications and devices. RSA Security intends to continue to offer the world's premier implementation of the RSA algorithm and all other relevant encryption technologies in our RSA BSAFE® software solutions and we remain confident in our leadership in the encryption market." For nearly two decades, more than 800 companies spanning a range of global industries have turned to RSA Security as a trusted, strategic partner that can provide the proven, time-tested encryption implementations and resources designed to speed time to market. These companies, including nearly 200 so far in 2000, rely on RSA BSAFE® security software for its encryption implementation and value-added services for a broad range of B2B, B2C and wireless applications. During the past 17 years, RSA Security has incorporated the concepts represented by the RSA algorithm into its RSA BSAFE cryptographic software. The company has made continuous enhancements to the way the algorithm has been implemented, including a number of performance improvements and optimizations, not reflected in the original patent, for a wide range of software applications, operating systems and chip designs. RSA Security also is an industry leader in developing standards on the robust application of encryption technologies for solving real-world problems. These core standards, known as the Public Key Cryptography Standards (PKCS), form the underpinnings of today's most widely used communication methods. In recent years, encryption technology has taken on an entirely new level of importance in the world of business and consumer technology, and RSA Security continues to be a leader in the industry. Once the province of a small group of technologists and mathematicians, new developments have raised the profile of encryption among a broad range of audiences. Moving forward, electronic signature legislation, export regulation and the pending selection of the Advanced Encryption Standard (AES) all will contribute significantly to encryption playing a key role in the further expansion of e-commerce initiatives for B2B, B2C and extended enterprise applications. For more information regarding the RSA algorithm and a free RSA algorithm t-shirt, visit www.rsasecurity.com/total-solution. About RSA Security Inc. RSA Security Inc., The Most Trusted Name in e-Security(TM), helps organizations build secure, trusted foundations for e-business through its RSA SecurID® two-factor authentication, RSA BSAFE encryption and RSA Keon® public key management systems. With more than a half billion RSA BSAFE-enabled applications in use worldwide, more than seven million RSA SecurID users and almost 20 years of industry experience, RSA Security has the proven leadership and innovative technology to address the changing security needs of e-business and bring trust to the new, online economy. RSA Security can be reached at www.rsasecurity.com. NOTE: This press release contains forward-looking statements relating to the role of the RSA algorithm encryption and the expansion of e-commerce. Such statements involve a number of risks and uncertainties. Among the important factors that could cause actual results to differ materially from those indicated by such
Re: StoN, Diffie-Hellman, other junk..
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At 01:21 09/07/2000 -0400, dmolnar wrote: The modulus should be rather large -- something like 512 or 1024 bits. With 64 bits, someone can use Pollard's method to find discrete logs in roughly 2^32 trials, which is Bad. Taking discrete logs for larger primes requires a variant of the number field sieve; the largest announced modulus for which I'm aware of this being done is 300-400 bits, but it hasn't received as much attention as factoring. I figured it would be something of that nature.. hence the math library I was working on.. :) I think www.cryptosavvy.com has some key length recommendations. You might Thanks for the link... The size of the generator is a different issue. I don't see any reason why a small size generator would hurt...but I haven't thought about it very much. Note that you need the factors of p-1 in order to test if something's a generator, which means you may want to look into Maurer or Mihailescu's methods for prime generation. (Mihailescu has a paper on the subject aimed at implementors at http://www.inf.ethz.ch/~mihailes/papers/primgen.ps ) Ah.. I have implemented a sieve of eros..whatever his name is.. ;) for finding smaller primes.. it runs very fast, the old rules don't apply so much anymore, memory footprint being more a concern then speed I've noticed so far.. moving the found primes into a sparse array as you find them and then reusing the memory is one way around that.. even my quickly written implementation takes negligible time to find all the primes within 16 bits.. but I've been looking at rabin-miller and some other methods as well. I'll take a look at that link, thanks.. reason again for the math library.. my stuff (obviously) falls apart 32bits since my library for handling larger numbers is unfinished. It was after my time, but the AP Computer Science curriculum now has a BigInteger library as its "case study." :-) A web search turned up http://www.efg2.com/lab/library/Delphi/MathFunctions/Cryptography.htm which has, among other things, a Pascal header for the Gnu MP library. Ah cool.. I've heard very good things about GMP and had been thinking about ways to implement it.. could solve all my problems in one fell swoop. :) I (for reasons that should be obvious) felt that writing the routines myself (with extensive testing) would be preferable, so I could avoid licensing issues as well as bugs/backdoors, but I'll look into this.. Thanks for the quick response.. the application will of course be available to anyone who wants it once finished.. and once Borland finishes Kylix, should compile nicely on the various x86 *nixes out there.. - ---signature file--- "'There comes a time when the operation of the machine becomes so odious, makes you so sick at heart, that you can't take part; you can't even passively take part, and you've got to put your bodies upon the gears and upon the wheels, upon the levers, upon all the apparatus, and you've got to make it stop. And you've got to indicate to the people who run it, to the people who own it, that unless you're free, the machine will be prevented from working at all!" - -Mario Savio- Founder of the Free Speech Movement. -BEGIN PGP SIGNATURE- Version: PGPfreeware 6.5.8 for non-commercial use http://www.pgp.com iQA/AwUBObcqEGvp1znMxX/XEQLaYQCgxBxiiYTY2OHcVgso4Iaqy7PYucAAniM9 YL2M9tDag44LaILC6mChDmyf =TL/e -END PGP SIGNATURE-
Re: 128-bit netscaoe v4 for bellsouth.net
Sonny wrote: hello I would like to know if Netscape communictor version 4.* is available for bellsouth.net with 128-bit encryption. Pleas Email me Yep son, download from home.netscape.com -- "It is the responsibility of intellectuals to speak the truth and to expose lies." -Noam Chomsky
10% COUPON FROM BARNES NOBLE
Dear Barnes & Noble Customer, Thank you for providing us with your email address. As promised, we are sending you a Barnes & Noble discount coupon, good toward 10% off your next purchase at a Barnes & Noble bookstore. BARNES & NOBLE BOOKSTORE 10% DISCOUNT COUPON Take 10% off your total purchase of $25 or more at a Barnes & Noble, even if your selection is already discounted! Just print out this email message and bring it to any Barnes & Noble bookstore. Coupon code: C475092700 This offer is good through 9/27/00 Coupon is valid on a single purchase transaction made at a Barnes & Noble, Bookstop, or Bookstar store. May not be used toward the purchase of electronic gift cards (and/or gift certificates). Not valid at Barnes & Noble College Bookstores. Limit one coupon per customer. Email address: [EMAIL PROTECTED] YOU ARE NOW CONNECTED TO THE BARNES & NOBLE NETWORK ...and therefore will receive the latest information via email on special events, promotional offers, new book announcements, and more from your favorite Barnes & Noble bookstore and Barnes & Noble.com. If you would like to find out what's going on at a Barnes & Noble bookstore, or you want to shop at Barnes & Noble.com right now, click on one of the links below. To locate a Barnes & Noble store or search upcoming in-store events: www.bn.com/frames/storeLocator/storeLocator_findstore_home.asp? To shop at Barnes & Noble.com: service.bfast.com/bfast/click/bnmarket?siteid=30652032=home (Sorry, we can't redeem the above 10% discount coupon online, but you'll enjoy our excellent everyday prices nonetheless.) PLEASE NOTE: If you wish not to receive future email updates and offers from Barnes & Noble, or if you would like to personally select the stores about which we send you information,please click here.