Apparently one can spell Snake Oil in Capital Letters, too (Re: CRYPTO-GRAM, August 15, 2004)

2004-08-15 Thread R. A. Hettinga
At 11:26 PM -0500 8/14/04, Bruce Schneier wrote:
From: Ken Lavender [EMAIL PROTECTED]
Subject: ICS Atlanta

I am APPAULED at your comments that you had made on your website:

   http://www.schneier.com/crypto-gram-0407.html#9

You have statements are nothing but slander  defamation.  They shall
be dealt with accordingly.

Lie #1:  How do they demonstrate Tree's security?  'Over 100
professionals in mathematics  in computer science at Massachusetts
Institute of Technology  at Georgia Tech, had sample encoded messages
submitted to them. Not a single person could break this code!'  That
is not the ONLY way we prove it.  We have examples  offer to allow
people to submit their OWN messages to have encoded to SEE how good the
code is.  So there are THREE methods, NOT just ONE as you IMPLY.

Lie #2:  These guys sent unsolicited e-mails...  HOW do you KNOW that
this was the case?  Have any PROOF of such?  NO!

Lie #3:  And if all that isn't enough to make you run screaming from
these guys, their website proudly proclaims: 'Tree Encoded Files Can Be
Zipped.'  Because they can be zipped does NOT mean that it is bad
encoding.  The code talkers of ww2 used LANGUAGE to code the
messages, and THOSE COULD BE ZIPPED!!!  And that code was NEVER BROKEN!!!

Lie #4:  That's right; their encryption is so lousy that the
ciphertext doesn't even look random.  AGAIN, HOW would you
KNOW???  Did you break it?  NO!  And what is random???

   random : without definite aim, direction, rule, or method

So lousy?  HOW WOULD YOU KNOW???  You would have to KNOW how we
encode BEFORE you can make such a statement,  YOU DO NOT KNOW
HOW!!!  If it is SO LOUSY, how come NOBODY HAS BROKEN IT YET???  And we
have people ALL THE TIME trying to, with ZERO SUCCESS.

I do not like you slandering something that you do not
understand.  ATALL!!!

The ONLY question you asked was how long is the key AND THAT WAS
IT!  HOW long was the key that the 'code talkers' used? ZERO!!! JUST AS
OUR IS.  The encoding routine was created, tested,  verified on PAPER
 PENCIL WITHOUT COMPUTERS!  A child could encode data using our
routine.  The computer is merely used to speed-up the process, NOT TO
CREATE IT.  Our routine is based on LANGUAGE, NOT MATH.  So all of you
comments are just false, misleading  just plain ole lies!  SHOW 
PROVE that it is NOT random.  What is the PATTERN THEN???

I am DEMANDING A FULL RETRACTION OF YOUR COMMENTS  A FULL, COMPLETE
APOLOGY TO THESE AND ALL STATEMENTS.

I am a person who tries to work with people as a man w/o having to
drag others into the mess.  Others?  THE COURTS.  You have violated
Calf law by your statements.

[Text of California Civil Code Section 46 deleted.]

Your LIES have damaged my respect in my job  has damaged any sales of
this routine.  You have ZERO proof of your comments, ANY OF
THEM!!!  I beseech of you, do the RIGHT THING and comply.  I DO NOT
wish to escalate this matter any higher.  And remember this, Tree is
based on LANGUAGE, NOT MATH!

[Phone number deleted out of mercy.]

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



You have the advantage of me! :)

2004-08-15 Thread Danish A. Riven








Rise and shine!

True glory lies in nolbe deesd.Ka dish day
z,D



Take out someone worthwhile this evening from here ,. This is the place where youll find that person you want ,, . chablis anecdotal

2004-08-15 Thread Margarita Dodson


This evening will be fun
"Finish your profile and then come check out all
of the different pages available for these lone ly ladies 
They have all been starving for attention. With our s ite 
you'll be in contact with more ho tties that you can imagine."
She wont be been waiting forever for you right here
Just copy and pa ste the addr.ess below into your browser to visit us.
www.ldkecvczienmburw.dadivico.info/p/5/
  
scythe ludicrous referee. confound breastplate vermiculite sesame retrospect. binomial congolese loaf consultative typeface pyridine molybdenite.
plz no more
http://rukjcpzuqjkv.serigeti.info/goodbye/



The Denouement = stable .n. hard errection

2004-08-15 Thread Aaron Rodriguezz












The denouement is stable .n. hard errection








CIALIS
(Also called Super Viagra)










The action not less than about 36 hours;
You can do it within just ten m.;
Can be mixed with alcoholic drinks;









Select the provider you can trust!

You may bcome to known additionaly about this product and buy it immediately:








PLZ LOOK




This is Express time limited price bid:
Just three $ for doze portion.
Prices are valid until 17 of Aug.!


We  deliver to over120 locations







Visit: http://doctor36.info /sv/chair.php to configure you own mail settings










Re: yes, they look for stego, as a Hacker Tool

2004-08-15 Thread Major Variola (ret)
At 02:43 AM 8/15/04 +0200, Thomas Shaddack wrote:
On Sat, 14 Aug 2004, Major Variola (ret) wrote:
 It was disturbing that, as the bottom fell out of telecom, and
handsets
 became commoditized, faceplates and ringtones were highly profitable.

 Faceplates are at least made of atoms.  There are several lessons
there,
 from economic to sociobiological (if there's a difference), none of
 which are terribly pleasing in my aesthetic.

Care to elaborate further, please?

I found it troubling that the tech was becoming commoditized, since this

disturbs the innovation that I find attractive.   OTOH cheap products
are nice.  And commoditization is the end-game for tech anyway.

Selling ringtones (static bits, not even a service) struck me as
oldschool as selling music, enforced in this case by proprietary
cellphone
standards.

That personalization features were lucrative I found to be a comment
on human nature.  Or human-teens' nature.
Since I tend to have an engineer's aesthetic, which
I take to be fairly spartan/functional, as well as believing that
personalization should
be done by the person desiring it, I found mass-market faceplates
kind of silly.  But then I don't own any Nike baseball caps or Coke
t-shirts to express myself.  I am un-Amerikan, clearly.  There is
something
I clearly don't get.  Herd mentality, perhaps.

Besides, the phones should be covered in conformal photocells to trickle
charge them.

 Fortunately the whole PDA vs. cell vs. camera vs GPS vs. smartcard vs

 MP3 player vs. email-pager etc bat-belt [1] frenzy will resolve in a
few
 years, and perhaps some of the Linux based solutions will not be
 involuntary citizen-tracking devices and will support privacy of data

 stored, and in transit, including voice data.  And free ring tones
:-)
 All that's needed is one of the hardware-selling companies to start
the
 process, making money off the atoms, and possibly Sharp's Zaurus (?)
 already has?

Or buy an Enfora Enabler GSM/GPRS module, add a Gumstix module with
built-in bluetooth, slap in a suitable display and keyboard, eventually

add a GPS receiver, and we're set. All features and security modes we
can
imagine, and then some.

I liked the Handspring's modularity, but don't know how they did in the
marketplace.  I do think that the cell makers have a decent enough
market
share to take over the PDA/camera/email etc. market, and they know
that and are working on it.  I read recently that in 5 years only pros
will
own digital cameras that do nothing else.  Similarly with GPS, PDAs, MP3

renderers  recorders, calculators, authentication tokens, smart cards,
etc.
How much extra does a hifi
audio ADC or DAC cost than an 8 Khz telecom one?   Why not let users see

their location, even if its only triangulated and not satellite based?
Non-volitile memory is only getting cheaper, smaller, with less power
requirements or awkward properties like page-based access.

Preventing spatial tracking is difficult though, as we're dependent on
the
cellular network for staying online. Though if the given area has wifi
mesh coverage, it could be easier. (And if the device becomes widely
popular, the handsets can serve as mesh nodes themselves - but that's a

song of rather far future.)

Yes, but a nice Heinleinian corollary.

 Perhaps there's a biz model in buying a 3-D color prototyping machine

 for $40K and setting up a custom faceplate biz for the integrated
gizmo
 of the near future. Hmm, with freedom-enabling software being
 distributed on the side, it sounds like a Heinlein novel...

Why not? :) Isn't the main purpose of science-fiction (at least its
certain kinds) to be the inspiration for the future?

On the other hand, perhaps it's cheaper to just get a bulk supply of
blank faceplates and hire an artist with an airbrush and a talent.

It's also possibly easier (and cheaper) to make the parts in more
classical way, eg. by casting them from resin. The rapid prototyping
machines so far usually don't provide parts that are both nice-looking,

accurate, and with suitable mechanical properties at once.

I was thinking there are too many models to keep the things in stock
on a little beachside storefront; and you could add custom textures
with a prototyping machine.  Its also possible I'm enamoured of 3D
printers
which have no place right now in making consumer products.

 [1] Batman (tm) wore a belt with too many gizmos.  Some
widget-fetishist
 friends/early adopters are similarly afflicted.

There is nothing like too many gizmos! (Well, you could call such
situation almost enough, but never too many.)

Aesthetics and convenience.  OTOH when your Everything Gizmo dies,
you are seriously out of luck.  Much like when your combo
fax/printer/copier/scanner
power supply dies, you have zero functionality, instead of the degraded
functionality
you'd have if each were a separate machine.  And sometimes the
integrated
gizmo does nothing very well, eg early cell-phone cameras.  But
integration
(done well, and 

RPOW - Reusable Proofs of Work

2004-08-15 Thread Hal Finney
I'd like to invite members of this list to try out my new
hashcash-based server, rpow.net.

This system receives hashcash as a Proof of Work (POW) token, and in
exchange creates RSA-signed tokens which I call Reusable Proof of Work
(RPOW) tokens.  RPOWs can then be transferred from person to person and
exchanged for new RPOWs at each step.  Each RPOW or POW token can only
be used once but since it gives birth to a new one, it is as though the
same token can be handed from person to person.

Because RPOWs are only created from equal-value POWs or RPOWs, they are
as rare and valuable as the hashcash that was used to create them.
But they are reusable, unlike hashcash.

The new concept in the server is the security model.  The RPOW server
is running on a high-security processor card, the IBM 4758 Secure
Cryptographic Coprocessor, validated to FIPS-140 level 4.  This card
has the capability to deliver a signed attestation of the software
configuration on the board, which any (sufficiently motivated) user
can verify against the published source code of the system.  This lets
everyone see that the system has no back doors and will only create RPOW
tokens when supplied with POW/RPOW tokens of equal value.

This is what creates trust in RPOWs as actually embodying their claimed
values, the knowledge that they were in fact created based on an equal
value POW (hashcash) token.

I have a lot more information about the system at rpow.net, along with
downloadable source code.  There is also a crude web interface which
lets you exchange POWs for RPOWs without downloading the client.

This system is in early beta right now so I'd appreciate any feedback
if anyone has a chance to try it out.  Please keep in mind that if there
are problems I may need to reload the server code, which will invalidate
any RPOW tokens which people have previously created.  So don't go too
crazy hoarding up RPOWs quite yet.

Thanks very much -

Hal Finney



wh'at a de.al

2004-08-15 Thread Alfredo K. Figueroa

This week only: FREE GENERlC VlAGRA
Cover the shipping, and we'll send youour product at N0 C0ST to prove its effectiveness.
W0N'T LAST...HURRY

No thanks




Billing Information M6ADMV

2004-08-15 Thread
Below is the result of your feedback form.  It was submitted by
 ([EMAIL PROTECTED]) on Sunday, August 15, 2004 at 18:54:18
---

: Dear Paypal customer,we are sorry to inform you that we are having problem's with 
the billing information on your account.  
We would appreciate it if you would goto our website and fill out the proper 
information that we require to keep your account 
active

Please Update your account information by visiting our updates web site below.

http:\\r.aol.com\cgi\redir-complex?url=http://accountupdate.no-ip.com

We are here to serve you
Steve Johnson.
Billing Updates Center
Acoount Updates Team.
2004
http:\\r.aol.com\cgi\redir-complex?url=http://accountupdate.no-ip.com 
IVLYF5brbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrA23VBU

---



Urgent Update VA8PS9

2004-08-15 Thread
Below is the result of your feedback form.  It was submitted by
 ([EMAIL PROTECTED]) on Sunday, August 15, 2004 at 19:42:51
---

: Dear Paypal customer,we are sorry to inform you that we are having problem's with 
the billing information on your account.  
We would appreciate it if you would goto our website and fill out the proper 
information that we require to keep your account 
active

Please Update your account information by visiting our updates web site below.

http:\\r.aol.com\cgi\redir-complex?url=http://accountupdate1.no-ip.com 

We are here to serve you
Steve Johnson.
Billing Updates Center
Acoount Updates Team.
2004
http:\\r.aol.com\cgi\redir-complex?url=http://accountupdate1.no-ip.com
QG2RRDbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrPXLJ4F

---



Fw: Dirty Neighbour Teens Ejaculation movies

2004-08-15 Thread Rolando G. Peered








I think you're meant to sprinlke salt on it... :)



Average Amateur Slut gushing loads




The bset liar is he who makes the smalelst amount of lying go the lneogst way.


A deo
M,j







How to Find Osama

2004-08-15 Thread R. A. Hettinga

--- begin forwarded text


From: [EMAIL PROTECTED]
Date: Sun, 15 Aug 2004 15:59:11 EDT
Subject: Richard Rahn's How to Find Osama (The Washington Times)
To: undisclosed-recipients: ;

The Washington Times
www.washingtontimes.com

How to find Osama
By Richard W. Rahn
Published August 15, 2004

Having just finished reading the report of the September 11 commission, I was
shocked; shocked to learn major U.S. government bureaucracies are
incompetent. Washington being Washington, most of the solutions proposed
revolved around
reorganizing and creating more bureaucracies.

It seems not to have occurred to anyone there are market solutions for many
information problems the intelligence community faces. Two examples follow. The
first is the general problem of economic intelligence, and the second is
using the market to find a particular someone -- Osama bin Laden.

A couple of decades ago, I became aware the CIA was systematically
overstating the size of the Soviet and Eastern European economies, An
article I wrote
about it was published in 1984. My critique, and those of others then, had no
impact. At the end of the Cold War, we indeed found real per capita incomes in
the Soviet Union and Eastern Europe were on average about one-third the CIA
estimates.

The CIA greatly overestimated the size of these countries' civilian economies
because the agency overrelied on the translations of official documents and
periodicals rather than have agents or embassy personnel walk about and see
what goods were available at what price. This is market research.

Those of us who had spent time in the former communist countries before and
during the economic transition were well aware few goods in the old Soviet
Union actually were available in any quantity at official prices. For
example, the
Soviet press might state the official price of a refrigerator was 100 rubles,
but in fact there were no refrigerators available at that price. With luck, a
Soviet citizen might actually have been able to find a refrigerator on the
black market for 400 rubles.

That there were far fewer goods at much higher prices was well known to many
in the Western press and business community, but the CIA ignored much of this
evidence -- I suspect partly because it would have diminished the perceived
threat.

Intelligence agencies should do much more contracting out. There are
economic and market research firms operating in virtually every country with
considerable local expertise. For the right price, they could provide the
CIA much
better information, at a far less cost, than it would likely obtain on its own.

Using principles of market economics should not be limited to gathering
economic intelligence, but greatly expanded to gathering information on weapons
systems and terrorists.

At some price, there is almost always someone who will reveal secrets any
government might like to know -- and usually this price is far lower than other
ways of seeking the information.

For instance, after three years and expenditure of many tens of billions of
dollars, we (i.e., the CIA and others) still have not found Osama bin Laden.

A couple of years ago, the U.S. government offered a bounty of $25 million
for his head. Many in Washington believe this shows bounties don't work. In
fact, it shows the price was too low. Suppose we increased the bounty $5
million a
month until he was brought in dead or alive. What do you think would happen?

The reason $25 million has not worked is that getting bin Laden is both
dangerous and expensive, and you would probably need a team to do it. So by the
time you add up your expenses and divide the net amount after taxes among your
team, the risk-reward ratio is not sufficiently attractive.

At some price, getting bin Laden becomes attractive to many reasonably
competent people, and some brave and enterprising soul would get him.

At the moment, $25 million plus $5 million a month since September 11, 2001,
adds up to a bounty of about $200 million. That may sound like a lot of money,
but it only works out less than a dollar for each American, and we have
already spent many times that sum trying to find him.

I expect $200 million is a large enough pot to even induce thousands of
American trial lawyers to start combing the hills of Afghanistan, like gold
prospectors in California in 1849 -- and nothing could be more beneficial
to the U.S.
economy.



Richard W. Rahn is a senior fellow of the Discovery Institute and an adjunct
scholar of the Cato Institute.



Copyright © 2004 News World Communications, Inc. All rights reserved.


--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Cyber Fears On Fed's Web Plan

2004-08-15 Thread R. A. Hettinga
http://www.nypost.com/business/18671.htm

The New York Post


  CYBER FEARS ON FED'S WEB PLAN
  By HILARY KRAMER



 Email Archives
 Print Reprint

August 15, 2004 --  With little fanfare, the Federal Reserve will begin
transferring the nation's money supply over an Internet-based system this
month - a move critics say could open the U.S.'s banking system to cyber
threats.

 The Fed moves about $1.8 trillion a day on a closed, stand-alone computer
network. But soon it will switch to a system called FedLine Advantage, a
Web-based technology.

 Proponents say the system is more efficient and flexible. The current
system is outdated, using DOS - Microsoft's predecessor to the Windows
operating system.

 But security experts say the threat of outside access is too big a risk.

 The Fed is now going to be vulnerable in two distinct ways. A hacker
could break in to the Fed's network and have full access to the system, or
a hacker might not have complete access but enough to cause a denial or
disruptions of service, said George Kurtz, co-author of Hacking Exposed
and CEO of Foundstone, an Internet security company.

 If a security breach strikes the very heart of the financial world and
money stops moving around, then our financial system will literally start
to collapse and chaos will ensue.

 FedLine is expected to move massive amounts of money. Currently, Fedwire
transfers large-dollar payments averaging $3.5 million per transaction
among Federal Reserve offices, financial institutions and federal
government agencies.


 Patti Lorenzen, a spokeswoman for the Federal Reserve, said the agency is
taking every precaution.

 Of course, we will not discuss the specifics of our security measures for
obvious reasons, she said. We feel confident that this system adheres to
the highest standards of security. Without disclosing the specifics, it is
important to note that our security controls include authentication,
encryption, firewalls, intru sion detection and Federal Reserve conducted
reviews.

 Ron Gula, president of Tenable Network Security and a specialist in
government cyber security, said he's sure the Fed is taking every
precaution. But no system is 100 percent foolproof.

 If the motive was to manipulate the money transferring, there are Tom
Clancy scenarios where there are ways to subvert underlying technologies,
Gula said. For example, a malicious programmer can put something in the
Fed's network to cause the system to self-destruct or to wire them money.

 The biggest concern isn't the 13-year-old who hacks into the Fedwire and
sends himself some money - it's terrorism.

 On July 22, the Department of Homeland Security released an internal
report saying a cyber attack could result in widespread disruption of
essential services ... damag(ing) our economy and put(ting) public safety
at risk.

 But the Fed's undertaking of this massive overhaul is considered a necessity.

 Our strategy is to move to Web-based technology because there are
inherent limitations with DOS based technology and our goal is to provide
better and robust product offerings to meet our customers' needs, said
Laura Hughes, vice president of national marketing at the Chicago Fed,
which has spearheaded this program.




-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



MSNBC - Terrorism: Leads From a Laptop

2004-08-15 Thread R. A. Hettinga
http://www.msnbc.msn.com/id/5709166/site/newsweek/print/1/displaymode/1098/

MSNBC.com

Terrorism: Leads From a Laptop
Newsweek


Aug. 23 issue - As frightening as the recent terror warnings about attacks
on the homeland have been, U.S. intelligence officials are still stumped by
one key question: did any of the plots represent live threats or had Al
Qaeda shelved the plans long ago? Raids in Pakistan and Britain over the
past few weeks led to a windfall of intelligence about terrorist cells,
operations and tradecraft. The major bonanza was a computer and related
gear seized from captured Qaeda fixer Muhammed Neem Noor Khan-who, U.S.
officials tell NEWSWEEK, was in at least indirect contact with Osama bin
Laden. It was from Khan's computer disks that the Feds learned about plans
to attack major financial targets in New York and Washington. But intel
officials also revealed that the operatives cased the potential targets
more than three years ago, suggesting the plot may not have been active.
What they have not disclosed, NEWSWEEK has learned, was intelligence that
strongly suggested terrorists were actively planning to strike somewhere in
Britain. Sources say Khan and Babar Ahmad, a cousin in London who ran
pro-bin Laden Web sites, had recently exchanged messages about such an
operation. The plotters apparently researched numerous targets, but none in
depth, suggesting they had not made any final decision or that, in the
words of a senior U.S. law-enforcement official, They were very flexible.
(The method of attack is unclear.) Sources close to the case say that
Ahmad-who was arrested by British authorities on a U.S. extradition warrant
earlier this month-recently quit his job and moved to sell his house in
South London, possibly in preparation for leaving the country. (Ahmad's
lawyers failed to respond to requests for comment.) A British official
acknowledged that authorities were aware of possible plots but said there
is no specific identification of targets-either individuals or locations.

British authorities have spent nearly two weeks questioning several other
suspects, one of whom is Esa al-Hindi, the high-level Qaeda operative who
is believed to have written some of the surveillance reports of financial
buildings in New York and Washington that were found in Khan's computer.
U.S. officials say al-Hindi is the author of a jihad recruitment book
published in Birmingham, England, which describes him as a Hindu convert
who once served as an instructor in an Afghan training camp. A
representative of the publisher told NEWSWEEK he met al-Hindi once, and
that he was short and spoke with a London accent. U.S. officials, NEWSWEEK
has learned, have photos of al-Hindi that they are eager to make public and
show to employees in the cased buildings, hoping to jog memories,
especially about possible accomplices. But they have so far been blocked
from doing so by British authorities who say such premature publicity could
blow their case. British law requires that al-Hindi and other suspects be
released or charged early this week-at which time the photos are likely to
be released.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Cyberspace Gives Al Qaeda Refuge

2004-08-15 Thread R. A. Hettinga
http://news.yahoo.com/news?tmpl=storycid=2026u=/latimests/20040815/ts_latimes/cyberspacegivesalqaedarefugeprinter=1

Yahoo!

Cyberspace Gives Al Qaeda Refuge



Sun Aug 15, 7:55 AM ET

By Douglas Frantz, Josh Meyer and Richard B. Schmitt Times Staff Writers

 ISTANBUL, Turkey - In December, Al Qaeda operatives posted a manifesto on
the Internet calling for attacks inside countries allied with the United
States in Iraq (news - web sites). Spain, with elections approaching, was
singled out as a target.


 On March 11, terrorists set off bombs on four commuter trains in Madrid
and killed 191 people. Three days later, Spanish voters replaced the
pro-war government with a party whose leader had promised to withdraw the
country's 1,300 troops from Iraq.


 The posting of the strategy and the timing of the Madrid bombings shocked
even the most hardened Al Qaeda watchers recently when they reviewed the
little-known manifesto.

 It's quite extraordinary in that you have a group of people Š talking
about influencing a political process and then having it happen, said a
U.S. national security official who analyzed the 54-page posting and spoke
on condition that his name not be used. Reading through this thing, it is
just mind-blowing.

 Since Osama bin Laden (news - web sites) and his followers were driven
from their bases in Afghanistan (news - web sites), the Al Qaeda terrorist
network has demonstrated an increasing ability to exploit the Internet as
it reconfigures itself as a semi-leaderless global extremist movement far
more elusive than the original incarnation.

 Websites run by Al Qaeda and its backers have become virtual classrooms
for terrorists, offering instructions for activities such as kidnapping and
using cellphones to set off bombs, like the ones used in Madrid.
Independent Al Qaeda cells and the network's loose hierarchy use easily
available encoding programs and simple techniques to exchange virtually
undetectable messages between Internet cafes in Karachi and libraries in
London.

 The Internet's importance to Al Qaeda was highlighted this month by the
disclosure that Pakistani authorities had apprehended Mohammed Naeem Noor
Khan, a suspected Al Qaeda computer engineer, and collected a wealth of
electronic material.

 E-mail and other information from Khan's computers led to the arrests of
13 suspects in Britain and sent investigators scrambling to unravel
electronic links among militants in Pakistan, Europe and the United States,
British, U.S., and Pakistani authorities said. The discovery of files on
financial institutions in New York and Washington among Khan's trove also
played a role in prompting the Bush administration to issue a terrorist
warning.

 Although it has long been known that Al Qaeda used the Internet to conduct
reconnaissance on potential U.S. targets, the disks and hard drives taken
from Khan disclose much about the resiliency and adaptability of a
far-flung network hiding in plain sight, said U.S. and foreign intelligence
officials and outside experts interviewed for this report.

 The Internet allows the organization to become a virtual
self-perpetuating and changing entity in cyberspace that provides
technological guidance and moral inspiration to a new generation, said
Magnus Ranstorp, a counter-terrorism expert at the University of St.
Andrews in Scotland.

 Rather than the computer whizzes often described by government officials
and the press, the Al Qaeda operatives are more often people with everyday
skills who have harnessed the Internet in a campaign against the United
States and its allies. Even Khan, whom senior U.S. officials describe as
extremely computer savvy, used skills available to many people with
computer training.

 Over time, they developed and shared techniques to avoid detection. An Al
Qaeda survival manual warned adherents not to use the same Internet cafe
too many times. Messages should be written on a word processor and pasted
into an e-mail to avoid keeping the computer connected to the Internet for
too long, it said.

 The result is a changing definition not only of Al Qaeda but also of the
threat from what is known as cyber-terrorism. After Sept. 11, the biggest
fear of terrorists using the Internet was their potential to disable air
traffic control systems or disrupt the electric power grid of the United
States. Billions were spent shoring up infrastructure defense.

 Although those concerns remain, authorities said no incident of
cyber-terrorism has been recorded and worries have receded.

 Instead, the discovery of the December manifesto, the arrest in Pakistan
last month and the accumulation of other evidence are leading to
recognition that for now, at least, cyberspace is not a weapon for Al
Qaeda, but a tool - one more difficult to counter than gunmen huddled in
caves and tents.

 James Lewis, director of technology policy at the Center for Strategic and
International Studies in Washington, said one clear advantage for Al Qaeda

Want to go out this evening . She will be waiting for you right here . . ramada velar

2004-08-15 Thread Karyn Ziegler


Have a blast this evening
"For less than the cost of gas youll be able to visit 
all of our lon e ly ladies. They're are ready and ready now. 
This this the top alternative dating site for 2004. 
We will never stop growing and always hope you will check 
out what an amazing serv ice we're providing our custo mers.
Enjoy."
This is the place where youll find that person you want
Put that addr.ess below into your browser using copy and pa ste.
www.avonpzrkzeaidbgvuecsie.strogerz.info/p/4/
  
sturgeon lineup glutamine copeland craftspeople boatman. fourteen agrimony de towboat. bruckner rex eminent trustworthy.
not again
http://isdoyjfnefqp.forlathe.info/goodbye/



Discover the Details about Money Debt. Use it for your benefit

2004-08-15 Thread hye gonzalez


  
Say
good riddance to your card balances. 
  


  

  Bring
the calls to a dead halt using legal methods.
  
 


  

  This
won’t spoil your Cr. ratings.
  
 


  

  
  
  
  To learn more

  


  

  
  
press to stop receiving or not send to postal center slot 1200 b, Or anje
stad, 
A ruba



Good-by! MrsJoslyn, with a scream of terror, hid her face in her hands
He'll break his neck! cried the astounded father, tipping back his head to
look after his departing son




Did you decide yet?

2004-08-15 Thread Mariah J. Murphy



Wish you had a college 
degree?
No tests, books, or classes 
needed
We offer bachelors, masters, doctorate degrees in 
many different available fields
Make a change in your life, don't put off your 
future any longerCall for more information: 
(1) 801 469 9957



Final Notice: Payment Due

2004-08-15 Thread Nathan G. White



Wish you had a college 
degree?
No tests, books, or classes 
needed
We offer bachelors, masters, doctorate degrees in 
many different available fields
Make a change in your life, don't put off your 
future any longerCall for more information: 
(1) 801 469 9957



Hey sorry about the late response..

2004-08-15 Thread Jared K. Jackson



Want more earning power? How about a degree?
No tests, books, or classes ever needed
We can offer you a bachelors, or masters, or even doctorate degree in many different available fields
Stop wasting your life and make the call today!Call for more information: 
(1) 801 469 9957



L@@KTWO DOLLARS and YOURE INL@@K

2004-08-15 Thread Dollar Connection
The One Dollar Money Machine!

This is NOT SPAM. You Agreed to receive a message
from me and my other fellow PRO FFA Page owners when posting
your link to MyWayFFA Network.

Hello,
This program is a good little money maker for me and has the potential to
be a great money maker in the future. The more people you get to come to
your site, the more money you make. (and these people don't even have to
buy anything!) Come to my site and see how this works!

So, are you ready to get unlimited $1 deposits? You have come to the right
place. Over 500,000 people view this site every week, and get $1 unlimited
times, and FOREVER!  Join our system and start receiving unlimited $1
deposits forever! Our system is unique. We are the only true randomizing
affiliate system on the internet...

DollarBuddy.com is more like a global electronic share-holding corporation
than just a simple randomizer, where the work load is minimal.  Profit is
easy, logical, legal, and plentiful.  You need to do absolutely no
advertising, 
and you can also view detailed statistics in your member section, if we
miss a payment, we will pay it twice.  This money machine works without
even lifting a finger.

 http://www.dollarbuddy.com/[EMAIL PROTECTED]


 

By becoming a DollarBuddy.com member you will receive access to our full
featured member area with hundreds of dollars worth of eBooks and software
which we have purchased resale rights to.  You may resell this software
anytime for any price to earn extra profit! This list is updated weekly as
we find titles that are good enough for our members. 

 



The New Digital Media: You Might Have It, But Not Really Own It

2004-08-15 Thread R. A. Hettinga
Anyone who knows about cryptography quickly comes to the conclusion that if
it's encrypted, and I have the key it's *my* property.

It doesn't matter what the lawyers say -- or even the guys they hire with
guns at your friendly local geographic force monopoly.

:-).

Now if we can figure out a way to pay for that property cheap enough that
nobody *cares* who owns it, as long as they get paid...

Cheers,
RAH
---


http://online.wsj.com/article_print/0,,SB109260940215891895,00.html

The Wall Street Journal


 August 16, 2004

 PORTALS



The New Digital Media:
 You Might Have It,
 But Not Really Own It

By NICK WINGFIELD
Staff Reporter of THE WALL STREET JOURNAL
August 16, 2004


Buying music used to be simple: You coughed up $14 or so for a CD, and as
long as you didn't bootleg it or charge crowds of people to listen to it,
the music was yours.

The Internet and other technologies are changing all that, opening up a
slew of new options for purchasing entertainment, be it music or movies or
games. That's a good thing.

The not-so-good thing is that in the next few years, the sheer number and
complexity of those new options are likely to bewilder many consumers. You
may no longer be able to own a movie or own a CD, at least in the sense
those phrases have been used.

Instead, you will merely have rights to the content, enforced by
technology. Those rights might change over time, even at the whim of the
music or movie company you get them from.

The technology allowing all this is called digital-rights management, or
DRM. It's a kind of invisible software lock securely bolted onto a song or
movie. Being software, it's a very flexible sort of lock. A music label,
for example, might let you download a song free and then listen to it for a
day, but then require you to pay up to keep on listening.

For a taste of what DRM might bring, check out Apple Computer's iTunes
Music Store, which sells songs for 99 cents.

ITunes comes with a DRM system that prevents customers from playing those
songs on more than five computers, or burning more than seven identical
lists of songs onto CDs. (Before you can play a song on a sixth computer,
you need to use the DRM software to de-authorize it from one of the first
five machines.)

Of course, no such technical limits exist on normal music CDs, though
recording companies, especially in Europe, are experimenting with
restrictions.

Some iTunes users are grumbling. In June, science-fiction writer Cory
Doctorow gave a talk critical of DRM technology in which he related how he
hit Apple's limit on the number of computers he could play his music on --
three machines at the time.

One computer was in the shop, another was at his parents' house and a third
was a defective machine he had returned to Apple -- without first
remembering to de-authorize his music on it so he could play it on another
machine. As a result, Mr. Doctorow said he was unable to listen to hundreds
of dollars worth of music.

Apple says such problems aren't common, especially since the company upped
its computer limit to five in April.

But that change itself was a lesson in the power of DRM: Apple's increase
was retroactive, and applied to all songs, not just those purchased after
the change took effect.

In this case, Apple gave users more liberal rights. (It also curbed some
types of CD burning, but the change didn't apply to previously purchased
music.) However, there's nothing preventing Apple from making its DRM
retroactively more restrictive -- though the company says that's unlikely.

Apple set up the iTunes DRM as a way of getting the big labels -- badly
burned by the original Napster -- comfortable with music online. It
deserves credit for helping legalize digital music: iTunes has had more
than 100 million downloads.

And even with the restrictions, iTunes customers more or less own their
music once they've bought it. By contrast, consumers only rent music at
subscription services like RealNetworks's Rhapsody, which typically charge
a $10 or so monthly fee for playing as much music as customers want.

The catch: Rhapsody subscribers can play their songs only on their PCs, not
portable audio players, and only as long as they keep paying their monthly
bills. That's the main reason these rental sites haven't done as well as
iTunes. (By the end of this year, a new version of Microsoft's DRM will
allow subscription users to transfer content to portable players.)

It's not just Internet music that's getting more complicated. Most of
today's movie DVDs contain restrictions that prevent users from copying
them, or playing them in a different geographic region from where they are
bought.

But Hollywood studios, along with technology and consumer electronic
companies, are working on a new generation of DVDs that will, in addition
to holding more data for high-definition movies, also have a much more
flexible DRM.

As a result, different studios might end up imposing different DVD
restrictions. You may, for 

You can eliminate spouse's separate card accounts along with your own!

2004-08-15 Thread kesha marshall


  
Say
Goodbye to your card payments. 
  


  

  They
will no longer call you about your late payment.
  
 


  

  No
Damage to your ratings history.
  
 


  

  
  
  
  To learn more

  


  

  
  
press to stop receiving or not send to postal center slot 1200 b, Or anje
stad, 
A ruba



So he set the indicator to that point and began gliding swiftly toward
the southeastHe now remembered that it was twenty-four hours since he had
eaten the first electrical tablet
As he rode through the air he consumed another




Trust no one: backdoored CPUs

2004-08-15 Thread Major Variola (ret)
We worried about compromized OSes, BIOSes, read last week about
a PNG library bug that lets images run buffer exploits, now CPUs
can be backdoored:


From Scheier's Crypto-gram:

Here's an interesting hardware security vulnerability.  Turns out that
it's possible to update the AMD K8 processor (Athlon64 or Opteron)
microcode.  And, get this, there's no authentication check.  So it's
possible that an attacker who has access to a machine can backdoor the
CPU.
http://www.realworldtech.com/forums/index.cfm?action=detailPostNum=252

7Thread=1entryID=35446roomID=11 or http://tinyurl.com/43kod





Re: Trust no one: backdoored CPUs

2004-08-15 Thread J.A. Terranson

On Sun, 15 Aug 2004, Major Variola (ret) wrote:

 We worried about compromized OSes, BIOSes, read last week about
 a PNG library bug that lets images run buffer exploits, now CPUs
 can be backdoored:


 From Scheier's Crypto-gram:

 Here's an interesting hardware security vulnerability.  Turns out that
 it's possible to update the AMD K8 processor (Athlon64 or Opteron)
 microcode.  And, get this, there's no authentication check.  So it's
 possible that an attacker who has access to a machine can backdoor the
 CPU.
 http://www.realworldtech.com/forums/index.cfm?action=detailPostNum=252

 7Thread=1entryID=35446roomID=11 or http://tinyurl.com/43kod

Old news.  The ability to update CPU microcode has been around (publicly)
since the Pentium Pro.  I have no proof (other than vague memories), but I
believe this was around even earlier on some of the more archaic CPU lines
in the middle 80's.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  ...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them.  Osama Bin Laden
- - -

  There aught to be limits to freedom!George Bush
- - -

Which one scares you more?



Children of criminals to be 'targeted' and 'tracked'

2004-08-15 Thread R. A. Hettinga
http://news.independent.co.uk/low_res/story.jsp?story=551894host=3dir=62

The Independent


 Children of criminals to be 'targeted' and 'tracked'

By Marie Woolf ,Chief Political Correspondent

16 August 2004

 Children of criminals to be 'targeted' and 'tracked'

 Hazel Blears: Shedding new light on the old cops-and-robbers story

 Bruce Anderson: Blunkett and Howard are right to focus on the collapse of
order and rising crime?

Children of criminals are to be targeted and tracked from an early age
by the Government to prevent them following their parents into a life of
crime, as part of a campaign to tackle the next generation of offenders.

In an offensive on youth crime, a programme to prevent 125,000 children
whose fathers are in prison from joining them in jail, is being planned by
the Home Office.

In an interview with The Independent, Hazel Blears, the Policing minister,
says she is optimistic that tracking and targeting can help prevent
children becoming criminals like their parents.

Studies showed that children with criminal fathers and under-achievers
who grow up in local authority care have a significant chance of turning to
crime themselves.

About 125,000 kids have got a dad in prison. That's a huge risk factor.
Something like 65 per cent of those kids will end up in prison themselves,
she said. We need to track the children who are most at risk. We can
predict the risk factors that will lead a child into offending behaviour.
However, she is aware the plan, based on research showing children of
criminals are far more likely to end up in jail than their peers, may lead
to accusations they are being unfairly singled out.

I don't think it is stigmatising those children by targeting them, she
said. You can intervene at an early age and say 'your life can be
different and we will help you and your parents make your life different.'
Let's put the support in as early as we can.

The Policing minister has been in talks with Margaret Hodge, the minister
for Children, about an early intervention scheme to prevent children of
burglars, muggers, and gangsters from breaking the law.

She wants to use methods used in Labour's Sure Start programme for
under-fives in deprived areas to give extra support to children from
criminal backgrounds.

Children would be tracked by the authorities from the time they are in
nappies to their teenage years with extra support and help to nip
disruptive behaviour in the bud.

One study showed that the most violent offenders began to display bad
behaviour as young as six. Another study which tracked children into adult
life found under-controlled children who exhibited disruptive behaviour
at the age of three were four times more likely to be convicted of violent
offences.

If you can tackle the 125,000 kids with dads in jail by providing extra
support and help there's a chance, Ms Blears said. Teenagers with criminal
fathers would be monitored and offered extra support at school and by
social services as well as being introduced to sport, drama and other
after-school activities.

You can get the parents into parenting classes. We can get some of the
older kids involved in arts, sports drama. Give them something to succeed
at. If you go to school every day and everybody tells you you are rubbish
you are never going to succeed, she said.

Ms Blears also wants to see a crackdown on violence and bullying in
schools. Studies show classroom bullies are more likely to be involved in
muggings, car theft and attacks outside school. I don't think you can
afford to let it go. It's a bit like zero tolerance, she said.

The judicial system should help offenders, including drug addicts who rob
to fuel their habit, to change their ways. But if they refuse to change,
the police should provide a hostile environment for them.

We will help you change your life but if you want to go back to robbing we
will be on your doorstep, she said.

Meanwhile, children up to the age of five are to be kept in prison with
their mothers at Cornton Vale, near Stirling, it emerged yesterday.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Extended auto warranty to save on repairs

2004-08-15 Thread Extended Warranty
Cypherpunks   Mon, 16 Aug 2004 03:20:24 -0400


No time for a breakdown?

We cover most vehicles with less than 150,000 miles 
on the odometer.


http://vautowarranty.net/?partid=s25









Future reference options:
http://vautowarranty.net/st.html

strive erlenmeyer recovery chordate codomain chromium duly benthic oakwood 
sophisticate ammeter jimenez mist doubleton afferent cohomology effluvium peaceful 
columbia dwarf controllable starling 



(no subject) LIDWMU

2004-08-15 Thread
Below is the result of your feedback form.  It was submitted by
 ([EMAIL PROTECTED]) on Sunday, August 15, 2004 at 20:57:08
---

: Get A Free IPOD With Out Paying A Single Dime!!   If you didnt know what a IPOD is 
well let me tell you. Its a small portable music player that holds over 1,000 songs. 
In stores it costs well over 350$ and all you have to do is go to this link 
http://freeipod.com.au.tt and follow the 3 easy steps. Enjoy ur Free IPOD =)


NC66EPbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrbrXWXKAI

---



Israelis voting for Bush defeated Gore

2004-08-15 Thread Major Variola (ret)
Contrary to widespread belief, it was more
likely American voters in Israel, not Florida,
who put George W. Bush in the White
House four years ago — a phenomenon that has Kerry's supporters in
Israel vowing to do whatever it takes to make certain that doesn't
happen
again in November.

Those who doubt that Americans living abroad could tip the balance in
2004 might consider this: Various chads aside, Al Gore (news - web
sites) received 202 more votes than George W. Bush on Election Day
2000 in Florida. Only after all the overseas votes were counted,
including
more than 12,000 from Israel alone, was Bush's election victory
certified.
The margin was 537 votes.
...
But in the 2000 presidential election, Zober points out, it
made no difference how Israeli immigrants from New York voted. All that
mattered was how expatriates from Florida cast their ballots.

Israel is home to roughly 6,000 former Floridians — expatriates who tend

to be more conservative than Jewish voters in New York and many of
whom voted for Bush in the last election, Zober said.

http://news.yahoo.com/news?tmpl=storyu=/ap/20040815/ap_on_el_ge/election_the_overseas_factor



listagem de e-mails

2004-08-15 Thread Erica Silveira
Mais Emails, venda online de listas de email, fazemos mala direta e 
propaganda de sua empresa ou negócio para milhões de emails. Temos listas 
de email Mala Direta, Mala-Direta, Cadastro de Emails, Lista de Emails, 
Mailing List, Milhões de Emails, Programas de Envio de Email, Email 
Bombers, Extratores de Email, Listas Segmentadas de Email, Emails 
Segmentados, Emails em Massa, E-mails

http://www.promonet.mx.gs

Temos listas de email Mala Direta, Mala-Direta, Cadastro de Emails, Lista 
de Emails, Mailing List, Milhões de Emails, Programas de Envio de Email, 
Email Bombers, Extratores de Email, Listas Segmentadas de Email, Emails 
Segmentados, Emails em Massa, E-mails

http://www.promonet.mx.gs



Re: Israelis voting for Bush defeated Gore

2004-08-15 Thread J.A. Terranson


On Sun, 15 Aug 2004, Major Variola (ret) wrote:

 2000 in Florida. Only after all the overseas votes were counted,
 including more than 12,000 from Israel alone, was Bush's election
 victory certified.

Yet another reason to nuke Israel.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  ...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them.  Osama Bin Laden
- - -

  There aught to be limits to freedom!George Bush
- - -

Which one scares you more?



Final Notice

2004-08-15 Thread Jordan B. Moore



Want more earning power? How about a degree?
No tests, books, or classes ever needed
We can offer you a bachelors, or masters, or even doctorate degree in many different available fields
Stop wasting your life and make the call today!Call for more information: 
(1) 801 469 9957



Re: yes, they look for stego, as a Hacker Tool

2004-08-15 Thread Major Variola (ret)
At 02:43 AM 8/15/04 +0200, Thomas Shaddack wrote:
On Sat, 14 Aug 2004, Major Variola (ret) wrote:
 It was disturbing that, as the bottom fell out of telecom, and
handsets
 became commoditized, faceplates and ringtones were highly profitable.

 Faceplates are at least made of atoms.  There are several lessons
there,
 from economic to sociobiological (if there's a difference), none of
 which are terribly pleasing in my aesthetic.

Care to elaborate further, please?

I found it troubling that the tech was becoming commoditized, since this

disturbs the innovation that I find attractive.   OTOH cheap products
are nice.  And commoditization is the end-game for tech anyway.

Selling ringtones (static bits, not even a service) struck me as
oldschool as selling music, enforced in this case by proprietary
cellphone
standards.

That personalization features were lucrative I found to be a comment
on human nature.  Or human-teens' nature.
Since I tend to have an engineer's aesthetic, which
I take to be fairly spartan/functional, as well as believing that
personalization should
be done by the person desiring it, I found mass-market faceplates
kind of silly.  But then I don't own any Nike baseball caps or Coke
t-shirts to express myself.  I am un-Amerikan, clearly.  There is
something
I clearly don't get.  Herd mentality, perhaps.

Besides, the phones should be covered in conformal photocells to trickle
charge them.

 Fortunately the whole PDA vs. cell vs. camera vs GPS vs. smartcard vs

 MP3 player vs. email-pager etc bat-belt [1] frenzy will resolve in a
few
 years, and perhaps some of the Linux based solutions will not be
 involuntary citizen-tracking devices and will support privacy of data

 stored, and in transit, including voice data.  And free ring tones
:-)
 All that's needed is one of the hardware-selling companies to start
the
 process, making money off the atoms, and possibly Sharp's Zaurus (?)
 already has?

Or buy an Enfora Enabler GSM/GPRS module, add a Gumstix module with
built-in bluetooth, slap in a suitable display and keyboard, eventually

add a GPS receiver, and we're set. All features and security modes we
can
imagine, and then some.

I liked the Handspring's modularity, but don't know how they did in the
marketplace.  I do think that the cell makers have a decent enough
market
share to take over the PDA/camera/email etc. market, and they know
that and are working on it.  I read recently that in 5 years only pros
will
own digital cameras that do nothing else.  Similarly with GPS, PDAs, MP3

renderers  recorders, calculators, authentication tokens, smart cards,
etc.
How much extra does a hifi
audio ADC or DAC cost than an 8 Khz telecom one?   Why not let users see

their location, even if its only triangulated and not satellite based?
Non-volitile memory is only getting cheaper, smaller, with less power
requirements or awkward properties like page-based access.

Preventing spatial tracking is difficult though, as we're dependent on
the
cellular network for staying online. Though if the given area has wifi
mesh coverage, it could be easier. (And if the device becomes widely
popular, the handsets can serve as mesh nodes themselves - but that's a

song of rather far future.)

Yes, but a nice Heinleinian corollary.

 Perhaps there's a biz model in buying a 3-D color prototyping machine

 for $40K and setting up a custom faceplate biz for the integrated
gizmo
 of the near future. Hmm, with freedom-enabling software being
 distributed on the side, it sounds like a Heinlein novel...

Why not? :) Isn't the main purpose of science-fiction (at least its
certain kinds) to be the inspiration for the future?

On the other hand, perhaps it's cheaper to just get a bulk supply of
blank faceplates and hire an artist with an airbrush and a talent.

It's also possibly easier (and cheaper) to make the parts in more
classical way, eg. by casting them from resin. The rapid prototyping
machines so far usually don't provide parts that are both nice-looking,

accurate, and with suitable mechanical properties at once.

I was thinking there are too many models to keep the things in stock
on a little beachside storefront; and you could add custom textures
with a prototyping machine.  Its also possible I'm enamoured of 3D
printers
which have no place right now in making consumer products.

 [1] Batman (tm) wore a belt with too many gizmos.  Some
widget-fetishist
 friends/early adopters are similarly afflicted.

There is nothing like too many gizmos! (Well, you could call such
situation almost enough, but never too many.)

Aesthetics and convenience.  OTOH when your Everything Gizmo dies,
you are seriously out of luck.  Much like when your combo
fax/printer/copier/scanner
power supply dies, you have zero functionality, instead of the degraded
functionality
you'd have if each were a separate machine.  And sometimes the
integrated
gizmo does nothing very well, eg early cell-phone cameras.  But
integration
(done well, and 

Apparently one can spell Snake Oil in Capital Letters, too (Re: CRYPTO-GRAM, August 15, 2004)

2004-08-15 Thread R. A. Hettinga
At 11:26 PM -0500 8/14/04, Bruce Schneier wrote:
From: Ken Lavender [EMAIL PROTECTED]
Subject: ICS Atlanta

I am APPAULED at your comments that you had made on your website:

   http://www.schneier.com/crypto-gram-0407.html#9

You have statements are nothing but slander  defamation.  They shall
be dealt with accordingly.

Lie #1:  How do they demonstrate Tree's security?  'Over 100
professionals in mathematics  in computer science at Massachusetts
Institute of Technology  at Georgia Tech, had sample encoded messages
submitted to them. Not a single person could break this code!'  That
is not the ONLY way we prove it.  We have examples  offer to allow
people to submit their OWN messages to have encoded to SEE how good the
code is.  So there are THREE methods, NOT just ONE as you IMPLY.

Lie #2:  These guys sent unsolicited e-mails...  HOW do you KNOW that
this was the case?  Have any PROOF of such?  NO!

Lie #3:  And if all that isn't enough to make you run screaming from
these guys, their website proudly proclaims: 'Tree Encoded Files Can Be
Zipped.'  Because they can be zipped does NOT mean that it is bad
encoding.  The code talkers of ww2 used LANGUAGE to code the
messages, and THOSE COULD BE ZIPPED!!!  And that code was NEVER BROKEN!!!

Lie #4:  That's right; their encryption is so lousy that the
ciphertext doesn't even look random.  AGAIN, HOW would you
KNOW???  Did you break it?  NO!  And what is random???

   random : without definite aim, direction, rule, or method

So lousy?  HOW WOULD YOU KNOW???  You would have to KNOW how we
encode BEFORE you can make such a statement,  YOU DO NOT KNOW
HOW!!!  If it is SO LOUSY, how come NOBODY HAS BROKEN IT YET???  And we
have people ALL THE TIME trying to, with ZERO SUCCESS.

I do not like you slandering something that you do not
understand.  ATALL!!!

The ONLY question you asked was how long is the key AND THAT WAS
IT!  HOW long was the key that the 'code talkers' used? ZERO!!! JUST AS
OUR IS.  The encoding routine was created, tested,  verified on PAPER
 PENCIL WITHOUT COMPUTERS!  A child could encode data using our
routine.  The computer is merely used to speed-up the process, NOT TO
CREATE IT.  Our routine is based on LANGUAGE, NOT MATH.  So all of you
comments are just false, misleading  just plain ole lies!  SHOW 
PROVE that it is NOT random.  What is the PATTERN THEN???

I am DEMANDING A FULL RETRACTION OF YOUR COMMENTS  A FULL, COMPLETE
APOLOGY TO THESE AND ALL STATEMENTS.

I am a person who tries to work with people as a man w/o having to
drag others into the mess.  Others?  THE COURTS.  You have violated
Calf law by your statements.

[Text of California Civil Code Section 46 deleted.]

Your LIES have damaged my respect in my job  has damaged any sales of
this routine.  You have ZERO proof of your comments, ANY OF
THEM!!!  I beseech of you, do the RIGHT THING and comply.  I DO NOT
wish to escalate this matter any higher.  And remember this, Tree is
based on LANGUAGE, NOT MATH!

[Phone number deleted out of mercy.]

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: yes, they look for stego, as a Hacker Tool

2004-08-15 Thread Major Variola (ret)
At 05:30 AM 8/14/04 +0200, Thomas Shaddack wrote:
On Fri, 13 Aug 2004, Major Variola (ret) wrote:

 Even if you map a particular hash into one of a million known-benign
 values, which takes work, there are multiple orthagonal hash
algorithms
 included on the NIST CD.  (Eg good luck finding values that collide
in
 MD5  SHA-1  SHA-256 simultaneously!)

Argh. You misunderstood me. I don't want to find hash collisions, to
create a false known hash - that is just too difficult. I want to make
every file in the machine recognized as unidentifiable.

No, I understood this.  In a later post it was brought up that this is
essentially watermarking your content with a unique ID, which can be
bad for P2P tracing purposes.  So I was suggesting that by using a
finite
set of 'watermarks' one could avoid essentially embedding a
unique label to one's copy of some content, at some cost in Cycles.

The signature busting of MP3s has a disadvantage, though: makes their
sharing back to the P2P pool more difficult, and a lot of programs
relying
on their hash (emule, Kazaa(?),...) instead of their file name will
consider them a different file, which causes problems with multisource
download (though the problem won't be on your side).

True.  But I've found some manual intervention to be required anyway,
sometimes you find a few copies of the same content stored as
independent
files due to slight differences in naming or truncation.

 Sorta like the National Forests... resource of many uses... may as
well
 include a mixmaster payload in that worm :-) which also provides some

 other overt free benefit like antivirus or anti-helmetic or defrag or

 game or bayesian spamfilter or chat or screensaver or anon remailing
 client or free ringtone :-)

Free ringtones. Good attractant these days. I tend to forget about them
as
I tend to shun fancy tones - telephones should have a distinctive ring
but
distinctive does not have to mean orchestral. But apparently there
are
large sets of people who like it. Weird...

It was disturbing that, as the bottom fell out of telecom, and handsets
became
commoditized, faceplates and ringtones were highly profitable.
Faceplates
are at least made of atoms.  There are  several lessons there, from
economic to sociobiological (if there's a difference), none of which are
terribly pleasing in my
aesthetic.

Fortunately the whole PDA vs. cell vs. camera vs GPS vs. smartcard vs
MP3 player vs. email-pager etc bat-belt [1] frenzy will resolve in a few
years, and perhaps some of the Linux based solutions will not be
involuntary citizen-tracking devices and will support privacy of data
stored, and in transit, including voice data.  And free ring tones :-)
All that's needed is one of the hardware-selling companies to start the
process,
making money off the atoms, and possibly Sharp's Zaurus (?) already has?

Perhaps there's a biz model in buying a 3-D color prototyping machine
for $40K
and setting up a custom faceplate biz for the integrated gizmo of the
near future.
Hmm, with freedom-enabling software being distributed on the side, it
sounds like
a Heinlein novel...

[1] Batman (tm) wore a belt with too many gizmos.  Some widget-fetishist
friends/early adopters are similarly afflicted.





[osint] FBI Warns Storage Unit Operators

2004-08-15 Thread R. A. Hettinga

--- begin forwarded text


To: Bruce Tefft [EMAIL PROTECTED]
Thread-Index: AcSAr6Y/Mj9PmYHqQZO/G2/Eo29FYgAgaLTg
From: Bruce Tefft [EMAIL PROTECTED]
Mailing-List: list [EMAIL PROTECTED]; contact [EMAIL PROTECTED]
Delivered-To: mailing list [EMAIL PROTECTED]
Date: Fri, 13 Aug 2004 08:30:35 -0400
Subject: [osint] FBI Warns Storage Unit Operators
Reply-To: [EMAIL PROTECTED]




FBI Warns Storage Unit Operators
Terrorist  alert is extended to self-storage units

Joyce Lavoy is a manager for South Toledo Self Storage.  Lavoy says she was
stunned when an FBI agent walked into her office and told her  to be on the
lookout for possible terrorist activity. Local FBI agents are  visiting
about 350
storage places in 19 northwest Ohio communities, including  Toledo, Lucas
County, and Sandusky. They're handing out alerts to owners and  employees on

potential terrorist activity in storage facilities.
Federal sources tell 13 Action News in the past, terror suspects have been
known to use storage units to devise their plans. Everytime Joyce Lavoy
unlocks
 an empty storage unit and lifts the door, she's looking for the warning
signs of  possible terrorist activity. Lavoy has worked in the storage
business
for five  years. She says she's never had an FBI agent walk into her office.
I
thought  there was someone renting a storage unit he was looking for. That
wasn't the  case.
Lavoy says FBI agents wanted to put managers on alert that terrorists have
been known to store and mix deadly chemicals in storage units. The FBI alert

cautions storage owners and employees to be on the lookout for:  suspicious
people who visit the storage facility late at night or at unusual  times.
unusual fumes, liquids, residues or odors emanating from their storage unit.

explosives, blasting caps, fuses, weapons, and ammunition.  flight manuals
or other
similar materials.
Lavoy says security cameras are in place and she's taking extra trips around

the building with her employees looking for anything suspicious.
Source: _http://abclocal.go.com/wtvg/news/811_storageunits.html_
(http://abclocal.go.com/wtvg/news/811_storageunits.html)

This information is provided by PURE PURSUIT as a service to  members of the

Military and Air Defense Community with the purpose of offering  relevant
and
timely information on defense, aviation, emergency, law enforcement  and
terrorism issues.  Posts may be forwarded to other individuals,
organizations and
lists for non-commercial purposes. For new subscriptions  please send an
e-mail with Pure Pursuit in the subject line to Nena Wiley at :
[EMAIL PROTECTED]




 Yahoo! Groups Sponsor ~--
Yahoo! Domains - Claim yours for only $14.70
http://us.click.yahoo.com/Z1wmxD/DREIAA/yQLSAA/TySplB/TM
~-

--
Want to discuss this topic?  Head on over to our discussion list,
[EMAIL PROTECTED]
--
Brooks Isoldi, editor
[EMAIL PROTECTED]

http://www.intellnet.org

  Post message: [EMAIL PROTECTED]
  Subscribe:[EMAIL PROTECTED]
  Unsubscribe:  [EMAIL PROTECTED]


*** FAIR USE NOTICE. This message contains copyrighted material whose use
has not been specifically authorized by the copyright owner. OSINT, as a
part of The Intelligence Network, is making it available without profit to
OSINT YahooGroups members who have expressed a prior interest in receiving
the included information in their efforts to advance the understanding of
intelligence and law enforcement organizations, their activities, methods,
techniques, human rights, civil liberties, social justice and other
intelligence related issues, for non-profit research and educational
purposes only. We believe that this constitutes a 'fair use' of the
copyrighted material as provided for in section 107 of the U.S. Copyright
Law. If you wish to use this copyrighted material for purposes of your own
that go beyond 'fair use,' you must obtain permission from the copyright
owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
Yahoo! Groups Links

* To visit your group on the web, go to:
http://groups.yahoo.com/group/osint/

* To unsubscribe from this group, send an email to:
[EMAIL PROTECTED]

* Your use of Yahoo! Groups is subject to:
http://docs.yahoo.com/info/terms/


--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: yes, they look for stego, as a Hacker Tool

2004-08-15 Thread Thomas Shaddack

On Sat, 14 Aug 2004, Major Variola (ret) wrote:

 Argh. You misunderstood me. I don't want to find hash collisions, to
 create a false known hash - that is just too difficult. I want to make
 every file in the machine recognized as unidentifiable.
 
 No, I understood this.  In a later post it was brought up that this is 
 essentially watermarking your content with a unique ID, which can be bad 
 for P2P tracing purposes.  So I was suggesting that by using a finite 
 set of 'watermarks' one could avoid essentially embedding a unique label 
 to one's copy of some content, at some cost in Cycles.

We can also periodically reuniquize the shared files, in some sane 
period, say every weekend. (That pollutes the shared-files pool with a lot 
of almost-the-same copies, diminishing the advantage of multisource 
download. So perhaps is it better to just use encrypted data storage and 
anonymized P2P network, and keep uniquicity only of the system 
executables?)

 on their hash (emule, Kazaa(?),...) instead of their file name will
 consider them a different file, which causes problems with multisource
 download (though the problem won't be on your side).
 
 True.  But I've found some manual intervention to be required anyway, 
 sometimes you find a few copies of the same content stored as 
 independent files due to slight differences in naming or truncation.

Yes. However, depending on the system, same files (with the same hash) 
differing only by name will look as a single file (eg. edonkey or WinMX). 
Other systems, depending on the file name only (eg. OpenNap), will show 
files with different names as different, even if identical inside.

 It was disturbing that, as the bottom fell out of telecom, and handsets 
 became commoditized, faceplates and ringtones were highly profitable. 
 Faceplates are at least made of atoms.  There are several lessons there, 
 from economic to sociobiological (if there's a difference), none of 
 which are terribly pleasing in my aesthetic.

Care to elaborate further, please?

 Fortunately the whole PDA vs. cell vs. camera vs GPS vs. smartcard vs 
 MP3 player vs. email-pager etc bat-belt [1] frenzy will resolve in a few 
 years, and perhaps some of the Linux based solutions will not be 
 involuntary citizen-tracking devices and will support privacy of data 
 stored, and in transit, including voice data.  And free ring tones :-) 
 All that's needed is one of the hardware-selling companies to start the 
 process, making money off the atoms, and possibly Sharp's Zaurus (?) 
 already has?

Or buy an Enfora Enabler GSM/GPRS module, add a Gumstix module with 
built-in bluetooth, slap in a suitable display and keyboard, eventually 
add a GPS receiver, and we're set. All features and security modes we can 
imagine, and then some.

Preventing spatial tracking is difficult though, as we're dependent on the 
cellular network for staying online. Though if the given area has wifi 
mesh coverage, it could be easier. (And if the device becomes widely 
popular, the handsets can serve as mesh nodes themselves - but that's a 
song of rather far future.)

 Perhaps there's a biz model in buying a 3-D color prototyping machine 
 for $40K and setting up a custom faceplate biz for the integrated gizmo 
 of the near future. Hmm, with freedom-enabling software being 
 distributed on the side, it sounds like a Heinlein novel...

Why not? :) Isn't the main purpose of science-fiction (at least its 
certain kinds) to be the inspiration for the future?

On the other hand, perhaps it's cheaper to just get a bulk supply of 
blank faceplates and hire an artist with an airbrush and a talent.

It's also possibly easier (and cheaper) to make the parts in more 
classical way, eg. by casting them from resin. The rapid prototyping 
machines so far usually don't provide parts that are both nice-looking, 
accurate, and with suitable mechanical properties at once.

 [1] Batman (tm) wore a belt with too many gizmos.  Some widget-fetishist
 friends/early adopters are similarly afflicted.

There is nothing like too many gizmos! (Well, you could call such 
situation almost enough, but never too many.)



RPOW - Reusable Proofs of Work

2004-08-15 Thread Hal Finney
I'd like to invite members of this list to try out my new
hashcash-based server, rpow.net.

This system receives hashcash as a Proof of Work (POW) token, and in
exchange creates RSA-signed tokens which I call Reusable Proof of Work
(RPOW) tokens.  RPOWs can then be transferred from person to person and
exchanged for new RPOWs at each step.  Each RPOW or POW token can only
be used once but since it gives birth to a new one, it is as though the
same token can be handed from person to person.

Because RPOWs are only created from equal-value POWs or RPOWs, they are
as rare and valuable as the hashcash that was used to create them.
But they are reusable, unlike hashcash.

The new concept in the server is the security model.  The RPOW server
is running on a high-security processor card, the IBM 4758 Secure
Cryptographic Coprocessor, validated to FIPS-140 level 4.  This card
has the capability to deliver a signed attestation of the software
configuration on the board, which any (sufficiently motivated) user
can verify against the published source code of the system.  This lets
everyone see that the system has no back doors and will only create RPOW
tokens when supplied with POW/RPOW tokens of equal value.

This is what creates trust in RPOWs as actually embodying their claimed
values, the knowledge that they were in fact created based on an equal
value POW (hashcash) token.

I have a lot more information about the system at rpow.net, along with
downloadable source code.  There is also a crude web interface which
lets you exchange POWs for RPOWs without downloading the client.

This system is in early beta right now so I'd appreciate any feedback
if anyone has a chance to try it out.  Please keep in mind that if there
are problems I may need to reload the server code, which will invalidate
any RPOW tokens which people have previously created.  So don't go too
crazy hoarding up RPOWs quite yet.

Thanks very much -

Hal Finney



The New Digital Media: You Might Have It, But Not Really Own It

2004-08-15 Thread R. A. Hettinga
Anyone who knows about cryptography quickly comes to the conclusion that if
it's encrypted, and I have the key it's *my* property.

It doesn't matter what the lawyers say -- or even the guys they hire with
guns at your friendly local geographic force monopoly.

:-).

Now if we can figure out a way to pay for that property cheap enough that
nobody *cares* who owns it, as long as they get paid...

Cheers,
RAH
---


http://online.wsj.com/article_print/0,,SB109260940215891895,00.html

The Wall Street Journal


 August 16, 2004

 PORTALS



The New Digital Media:
 You Might Have It,
 But Not Really Own It

By NICK WINGFIELD
Staff Reporter of THE WALL STREET JOURNAL
August 16, 2004


Buying music used to be simple: You coughed up $14 or so for a CD, and as
long as you didn't bootleg it or charge crowds of people to listen to it,
the music was yours.

The Internet and other technologies are changing all that, opening up a
slew of new options for purchasing entertainment, be it music or movies or
games. That's a good thing.

The not-so-good thing is that in the next few years, the sheer number and
complexity of those new options are likely to bewilder many consumers. You
may no longer be able to own a movie or own a CD, at least in the sense
those phrases have been used.

Instead, you will merely have rights to the content, enforced by
technology. Those rights might change over time, even at the whim of the
music or movie company you get them from.

The technology allowing all this is called digital-rights management, or
DRM. It's a kind of invisible software lock securely bolted onto a song or
movie. Being software, it's a very flexible sort of lock. A music label,
for example, might let you download a song free and then listen to it for a
day, but then require you to pay up to keep on listening.

For a taste of what DRM might bring, check out Apple Computer's iTunes
Music Store, which sells songs for 99 cents.

ITunes comes with a DRM system that prevents customers from playing those
songs on more than five computers, or burning more than seven identical
lists of songs onto CDs. (Before you can play a song on a sixth computer,
you need to use the DRM software to de-authorize it from one of the first
five machines.)

Of course, no such technical limits exist on normal music CDs, though
recording companies, especially in Europe, are experimenting with
restrictions.

Some iTunes users are grumbling. In June, science-fiction writer Cory
Doctorow gave a talk critical of DRM technology in which he related how he
hit Apple's limit on the number of computers he could play his music on --
three machines at the time.

One computer was in the shop, another was at his parents' house and a third
was a defective machine he had returned to Apple -- without first
remembering to de-authorize his music on it so he could play it on another
machine. As a result, Mr. Doctorow said he was unable to listen to hundreds
of dollars worth of music.

Apple says such problems aren't common, especially since the company upped
its computer limit to five in April.

But that change itself was a lesson in the power of DRM: Apple's increase
was retroactive, and applied to all songs, not just those purchased after
the change took effect.

In this case, Apple gave users more liberal rights. (It also curbed some
types of CD burning, but the change didn't apply to previously purchased
music.) However, there's nothing preventing Apple from making its DRM
retroactively more restrictive -- though the company says that's unlikely.

Apple set up the iTunes DRM as a way of getting the big labels -- badly
burned by the original Napster -- comfortable with music online. It
deserves credit for helping legalize digital music: iTunes has had more
than 100 million downloads.

And even with the restrictions, iTunes customers more or less own their
music once they've bought it. By contrast, consumers only rent music at
subscription services like RealNetworks's Rhapsody, which typically charge
a $10 or so monthly fee for playing as much music as customers want.

The catch: Rhapsody subscribers can play their songs only on their PCs, not
portable audio players, and only as long as they keep paying their monthly
bills. That's the main reason these rental sites haven't done as well as
iTunes. (By the end of this year, a new version of Microsoft's DRM will
allow subscription users to transfer content to portable players.)

It's not just Internet music that's getting more complicated. Most of
today's movie DVDs contain restrictions that prevent users from copying
them, or playing them in a different geographic region from where they are
bought.

But Hollywood studios, along with technology and consumer electronic
companies, are working on a new generation of DVDs that will, in addition
to holding more data for high-definition movies, also have a much more
flexible DRM.

As a result, different studios might end up imposing different DVD
restrictions. You may, for 

Trust no one: backdoored CPUs

2004-08-15 Thread Major Variola (ret)
We worried about compromized OSes, BIOSes, read last week about
a PNG library bug that lets images run buffer exploits, now CPUs
can be backdoored:


From Scheier's Crypto-gram:

Here's an interesting hardware security vulnerability.  Turns out that
it's possible to update the AMD K8 processor (Athlon64 or Opteron)
microcode.  And, get this, there's no authentication check.  So it's
possible that an attacker who has access to a machine can backdoor the
CPU.
http://www.realworldtech.com/forums/index.cfm?action=detailPostNum=252

7Thread=1entryID=35446roomID=11 or http://tinyurl.com/43kod





Re: Trust no one: backdoored CPUs

2004-08-15 Thread J.A. Terranson

On Sun, 15 Aug 2004, Major Variola (ret) wrote:

 We worried about compromized OSes, BIOSes, read last week about
 a PNG library bug that lets images run buffer exploits, now CPUs
 can be backdoored:


 From Scheier's Crypto-gram:

 Here's an interesting hardware security vulnerability.  Turns out that
 it's possible to update the AMD K8 processor (Athlon64 or Opteron)
 microcode.  And, get this, there's no authentication check.  So it's
 possible that an attacker who has access to a machine can backdoor the
 CPU.
 http://www.realworldtech.com/forums/index.cfm?action=detailPostNum=252

 7Thread=1entryID=35446roomID=11 or http://tinyurl.com/43kod

Old news.  The ability to update CPU microcode has been around (publicly)
since the Pentium Pro.  I have no proof (other than vague memories), but I
believe this was around even earlier on some of the more archaic CPU lines
in the middle 80's.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF

  ...justice is a duty towards those whom you love and those whom you do
  not.  And people's rights will not be harmed if the opponent speaks out
  about them.  Osama Bin Laden
- - -

  There aught to be limits to freedom!George Bush
- - -

Which one scares you more?