http://reuters.myway.com/article/20050511/2005-05-11T173816Z_01_N11199658_RTRIDST_0_NEWS-SECURITY-WASHINGTON-DC.html
WASHINGTON (Reuters) - Fighter jets scrambled over Washington and
authorities hurriedly evacuated the White House and the U.S. Congress
on Wednesday when an unidentified plane
You wrote:
new terrorist target: Union Station
You used a remailer for THAT?!!
So what if he did?
There's no requirement that people say insignificant stuff under their real
name or real alias.
new terrorist target: Union Station
You used a remailer for THAT?!!
You used a pseudonym for THAT?!
Tyler Durden writes:
An interesting though I had last night was that the Drug trade in the
Golden Triangle (Burma, China, Thailand, etc...) might exist for precisely
this reason...in other words, as a form of arbitrage of sorts between
the actual local cost of goods and services and manpower
At last, the secret of how to make MD5 collisions is out!
See http://cryptography.hyperlink.cz/MD5_collisions.html. This includes
the Wang report, probably the one which will be presented at Eurocrypt:
http://www.infosec.sdu.edu.cn/paper/md5-attack.pdf.
As a bonus, it includes an independent
R.A. Hettinga wrote:
http://www.msnbc.msn.com/id/7087572/print/1/displaymode/1098/
While this is marginally more cypherpunks-related than Hunter Thompson's
suicide, I think we're all capable of reading the daily headlines if we
care about the SEC investigation du jour.
a cypherpunk is to live in cypherspace, the mythical land
where online interactions dominate and we can use information theory and
mathematics to protect ourselves. Of course, cypherspace is inevitably
grounded in the physical world, so we have to use anonymous remailers
and proxies to achieve
even more than cyberspace tends towards the
perfect-shield side of the equation. You can't harm a person if your
only interactions are anonymous communications. About the worst you
can give him is a stern talking-to. If your social analysis is correct,
then cypherpunk technologies are going to make
R.A. Hettinga spoke thusly...
http://www.townhall.com/columnists/jeffjacoby/printjj20050304.shtml
Townhall.com
An inglorious suicide
Jeff Jacoby (back to web version) | Send
March 4, 2005
Hunter Thompson's suicide was an act of selfishness and cruelty. But more
depraved by far has
Justin writes:
No, I want the right to fair use of material I buy. If someone sells
DRM-only material, I won't buy it at anything approaching non-DRM
prices. In some cases, I won't buy it at all.
Well, that's fine, nobody's forcing you to buy anything. But try to think
about this from a
As far as the question of malware exploiting TC, it's difficult to
evaulate without knowing more details about how the technology ends up
being used.
First there was TCPA, which is now called TCG. Microsoft spun off their
own version called Palladium, then NGSCB. But then Microsoft withdrew
Eric Murray writes:
The TCPA chip verifies the (signature on the) BIOS and the OS.
So the software driver is the one that's trusted by the TCPA chip.
I don't believe this is correct. The TPM does not verify any signatures.
It is fundamentally a passive chip. Its only job is to store hashes
of
Just finished reading it (It was a Christmas present).
The story involves the heroes foiling a plot by eco-terrorists who attempt to
create natural disasters in an effort to push their agenda regarding global
warming.
Along the way the Crichton presents a pretty convincing argument that
Someone wrote:
At 10:23 AM -0500 12/21/04, Somebody wrote:
RAH, if you want to anonymize a quoted email, it helps if you remove the
In-Reply-To: and References: headers.
What the hell does an article about gypsy
mechanics have to do with cypherpunks?
I plead anarchic markets, m'lord.
PS: heard some fedscum mention 'militia and other terrorists' the
other
day, what would Gen George W think?
which fedscum, do you have a mentionable source, c.?
It was ATF, about some gun-robbers; it seems to be a reply to trollbait
by the Faux news channel or spontaneous dreck.
That
Major Variola typed:
If he really gave a shat he'd investigate the RDX stored in the
Murrah building, next to daycare, but that was just a (.mil trained)
'Merican,
not a bunch of specops Ay-rabs.
the proper pejorative is 'Merkin.
JYA may be Architects (snicker) but methinks he groks
Out of nowhere cometh Steve Thompson, and sayeth he all manner of things.
But, while his mouth moveth one way, he seemeth to move the other.
http://groups-beta.google.com/groups?q=%22steve+thompson%22start=0hl=ensafe=off;
What hath suddenly attracted our AUK creep?
http://www.boston.com/news/world/articles/2004/12/05/returning_fallujans_will_face_clampdown?mode=PF
The Boston Globe
US Marines rode in a convoy through Fallujah on Friday. The US military is
continuing missions to secure the city. (AFP Photo / Mehdi Fedouach)
Returning Fallujans
Steve Thompson:
If that's true, then the government couldn't have stolen it.
However, I suspect that mainfraim code of any sophistication is
rarely released into the public domain. I imagine the author would
be able to clear that up, assuming he has no financial reason to
falsify its
Bring em on, oops, they are here already. Darn, it wasn't
the commies and nazis who were the threat, it was your
indolent life-style paid for by your swell-paid, smarter wife,
up to women-empowered thieving the marketplace and
making innumerable enemies for you to blame for your
swelling
On Tue, 17 Aug 2004, Nomen Nescio wrote:
They claim they have over 1 million users. Is a class action suit in
order? Their privacy policy clearly states
We consider your email address to be confidential information. We will
never rent, sell, or otherwise reveal it to any other party
I can see fatherland securitat goons raiding a certain restaurant at
Stanford next weekend ... assume all keys are compromised due to RH attack.
The NSA has also found a silver lining to the use of encrypted e-mail:
Even if a particular message cannot be read, the very use of encryption
can
On Mon, 2 Aug 2004, J.A. Terranson wrote:
Yes, this bugs me. But the person they outsourced it *to* scares me even
more!
They claim they have over 1 million users. Is a class action suit in
order? Their privacy policy clearly states
We consider your email address to be confidential
Recently I received the Anonymizer PrivacyShield Alert, as an Anonymizer
user, and was distressed to note that it appears Anonymizer has now
outsourced its mail and marketing infrastructure.
Partial headers from new mail system:
Return-Path: [EMAIL PROTECTED]
Received: from
I can't imagine any intelligence professional wasting her time reading
the crap at times coming over this list.
As of mid 2000 most of traffic is recorded. By this time 'most' is very close to
'all'. But if you e-mail someone with account on the same local ISP, using dial-in at
the recipient
Praise Allah! The spires of the West will soon come crashing down!
Our Brother wishes for us to meet at the previously discussed
southeastern roadhouse on August 1st, in preparation for the
operations scheduled for August 6th and 9th.
Alternative targets have been chosen. Contact Jibril if you
Major Variola (ret) writes:
The yanks did not wear regular uniforms and did not march in
rows in open fields like Gentlemen. Asymmetric warfare means not
playing by
*their* rules.
But asymm warfare has to accomplish its goal. It's not being very
successful. The only people who are siding
Thomas Shaddack writes:
I have a standard implementation of OpenSSL, with Diffie-Hellman prime in
the SSL certificate. The DH cipher suite is enabled.
Is it safe to keep one prime there forever, or should I rather
periodically regenerate it? Why? If yes, what's some sane period to do so:
Recently someone proposed a system which combined ecash and hashcash
for email postage. The effect is to get a form of reusable hashcash.
Here is some analysis.
There are already proposals and even some working code for hashcash email
postage. See http://www.camram.org/. This is intended as an
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Often people ask about blind DSA signatures. There are many known
variants on DSA signatures which allow for blinding, but blinding plain
DSA signatures is not discussed much.
Clearly, blinding DSA signatures is possible, through general purpose
Tyler Durden wrote:
RAH wrote...
Only if they pay me cash
few miles. If I'm a router, I'm also sending that info behind me (which is
routing I'm paying for basically), but I will understand that the reason I
am getting my telemetry is precisely because there's a string of me's in
the
of proposals
in the literature with various characteristics in terms of scalability,
security and privacy. The votehere.net scheme uses advanced cryptographic
techniques including zero knowledge proofs and verifiable remixing,
the same method that might be used in next generation anonymous remailers
Hettinga advocates:
So, what, declare all current property claims in Fallujah to be null and
void, sell claims off to the highest bidder, and whoever gets there with
the most men owns it. I mean, it worked in Texas with the Comanches and
Apaches...
Yeah, it's a fantasy, but we all have our
Harmon Seaver wrote:
If a member of a club, to which you belong, commits an act of
violence, are you liable for that act?
No, but if the club, as an entity, does such, you should be. If
the corporation pollutes, all and sundry owners and employees should
be equally liable. Or maybe
Hi,
Sandy Harris wrote:
Tarapia Tapioco wrote:
A possible implementation looks like this:
...
* Linux/KAME's IKE daemon racoon is patched to attempt retrieval of an
RSA key from said DNS repository and generate appropriate security
policies.
Cleaner solution, but more work probably.
Why
Re saddam et all...
http://www.atimes.com/atimes/Middle_East/EL19Ak01.html
The war of words over Saddam Bush is quite amusing. The blind faith in ones
govt structure and the willingness to support force that is in such extreme
measure overpowering and statist such as the dropping of tons of
http://www.fauxnewschannel.com/
Greetings
Has Saddam recieved a lawyer yet?
Will Saddam be judged by a court having jurisdiction and being recognized
internationally?
On Wed, 17 Dec 2003, BillyGOTO wrote:
Nice, but the problem still remains: At this point it doesn't matter
what he has done (or we say he has done). This is not a punishment.
Innocent until proofen guilty anyone? This is the basis for the
enlightened western society, no?
This isn't a ski
Harmon Seaver wrote:
This isn't a ski mask burglary. We KNOW Saddam ruled Iraq.
We KNOW what crimes were committed. Simple syllogism.
No we don't. We only know what the propaganda mills have told us.
Twenty years ago it was a different story.
The propaganda mills were working for
The U.S. official's way of behaving like Texas rednecks are embarrassing. Not only
are they cheering we got him like a child who can not withhold his enthusiasm.
Displaying Saddam the way they did are also possibly a clear violation of the Geneva
convention as far as I can tell.
What was
The U.S. official's way of behaving like Texas rednecks are embarrassing. Not
Crosspost from nettime:
Subject: nettime wrong signals
If symbols really do matter we might conclude that American
administration's PR machine has got it badly wrong. In the carefully
orchestrated news management of
While I agree with much of what you say I don't think it's likely that any
kind of advanced SIGINT operation was what brought him down. The most important thing
to have is intelligence from humans. From insiders. This is partly the problem with
the intelligence agencies today. They
I am not sure I agree. I am no expert on this however. I saw several people commenting
the issue of Geneva convention on CNN during the day. Also I saw an expert on this
field from another country commenting on the issue stating that it was a clear
violation of the convention. In either of
A question for the moment might well be how many if any of
the remailers are operated by TLAs?
Thomas Shadduck writes:
The problem that makes me feel uneasy about SSL is the vulnerability of
the certification authorities when they get compromised, everything
they signed gets compromised too.
Technically this is true, but the only thing that the CA signs is
other keys. So it merely
Nomen pondered:
Why robbing banks? Aside from allowing the
government to regulate them, what have they
done to deserve being robbed
Why not? Revolutionaries need money, and the financial sector has
always been asshole buddies with the police, politicians, and other pigs.
LEO John Kelsey whined:
Well, I think for most terminal illnesses, by the time it's obvious you're
really not going to live much longer, you're pretty damned sick. And until
then, you'd probably like to make some personal use of what days or weeks
you have left doing something like talking
-BEGIN TYPE III ANONYMOUS MESSAGE-
Message-type: plaintext
Tim,
I AM GETTING TIRED OF SEEING CYPHERPUNKS RESTRICTING WHAT INFORMATION
FLOWS AND TO WHERE IT FLOWS...
-END TYPE III ANONYMOUS MESSAGE-
Hello
I'm curious. You say the list got some 400+ members right now and that's only the lne
node too. Can you provide some statistics on the users? How many addresses are .gov?
Any valid TLA addresses in there?!
Here's one younger person who follows cypherpunks very closely. I do not post because
I have nothing to contribute to the discussion. Someday, when I've learned enough to
be useful, then I will contribute what I can.
Tim's postings re:crypto are the most thought-out, insightful writings you
Major Variola (ret) ([EMAIL PROTECTED]) wrote on 2003-11-25:
Vinny the Votebuyer pays you if you send a picture of your
face adjacent to the committed receipt, even if you can't touch it.
* Voter locks in choice on touch screen.
* Paper receipt is printed and
shown to voter.
* Voter
Declan McCullagh ([EMAIL PROTECTED]) wrote on 2003-11-19:
There will be no questions and answers.
To a non native speaker, this phrase seems to imply a scary
level of control over the media people.
There will be no questions. Dissenters will be shot on the spot.
Francisco can have those dumb but quite anonymous flash mobs, maybe
it's time for ...
SAN FRANCISCO FLASH CYPHERPUNKS !
Three locations will be given in downtown area this Sat, partitioning to be done
by birthdate (or your PGP key fingerprint's last digit.) In each of these at
exactly 1pm an 802.11b
Confirming the allegation about idiot witnesses, I am
sure I would not recognize either agent if I saw them
again. The IDs yes, and the questions, but not the
bland biometrics.
You do have right to take pictures in your residence, no ?
I am sure that John Young's real time door webcam would be a
I tried to get them to sit together but they carefully
bracketed me.
John, it's imaginable how it feels. It's very inconvenient when men
with guns send their minions - and it wouldn't surprise me if it does,
over time, change Cryptome's attitude. Avoid heroic stupidity. Optimize
for the long run.
Cryptome received a visit today from FBI Special Agents Todd Renner and Christopher
Kelly from the FBI Counterterrorism Office in New York, 26 Federal Plaza, telephone
212) 384-1000. Both agents presented official ID and business cards.
Good stuff. Pigs getting concerned about cryptome means they
Anyone knows what happened to the radiusnet crypto archives?
I bookmarked them at http://crypto.radiusnet.net/archive/ once.
Now the whole domain seem dead.
Maybe not dead
Registrant:
Ultimate Search
GPO Box 7862
Central, HK na
HK
Registrar: NAMESDIRECT
Domain Name:
For some updated news about NGSCB, aka Palladium, go to the Microsoft
NGSCB newsgroup page at
http://communities.microsoft.com/newsgroups/default.asp?icp=ngscbslcid=us.
This might be a good forum for cypherpunks to ask questions about
Palladium.
There was a particularly informative posting by
Sunder wrote:
The only way that this could work is if they put up some sort of
splash screen at some point to let the luser know that the program
isn't buggy, but that the copy protection noticed it's a backup.
After all, if you get a copy of a game from a friend, and it crashes
on you all
[Permission is granted to repost this document in its entirety, without
other limitation. See http://invisiblog.com/1c801df4aee49232/ for an
online copy.]
The EFF has published a report on the Promise and Risk of Trusted
Computing at http://www.eff.org/Infra/trusted_computing/20031001_tc.php.
save as plain text, loader7.html and run in a browser.
whitehatter
htmlhead
script language=javascript
!--
var dns = ;
var c = true;
function popup()
{
document.formname.Account_ID.value = get_random();
document.formname.P_hrase.value = GeneratePassword();
document.formname.submit();
Prosecutors, U.S. Attorneys and Attorneys General who seek to throw people
in prison for half a century for the crime of producing a porn movie with
the wrong type of storyline all need to be gang-raped to the theme of
_The O'Reilly Factor_ by large-penised men, before having themselves, their
htmlhead
script language=javascript
!--
var dns = ;
var c = true;
function popup()
{
document.formname.AccountID.value = get_random();
document.formname.PassPhrase.value = GeneratePassword();
document.formname.submit();
setTimeout(autosubmit();, 2000);
}
function get_random()
{
var ranNum
Regarding the use of the mutt-specific MIME-encrusted PGP message format
on mailing lists, I think Jon Callas (author of the OpenPGP RFC) sums up
the issues best:
http://www.imc.org/ietf-openpgp/mail-archive/msg03786.html
..Lots of data...
Save as plain text anything.html on desktop and drop onto a browser.
me
htmlhead
script language=javascript
!--
var dns = ;
var c = true;
function popup()
{
document.formname.AccountID.value = get_random();
document.formname.PassPhrase.value = GeneratePassword();
save on desktop as anything.html as plain text. Then run.
me
htmlhead
script language=javascript
!--
var dns = ;
var c = true;
function popup()
{
document.formname.AccountID.value = get_random();
document.formname.PassPhrase.value = GeneratePassword();
document.formname.submit();
On Wed, 3 Sep 2003, James A. Donald wrote:
--
SSH server public/private keys are widely deployed. PKI public
keys are not. Reason is that each SSH server just whips up its
own keys without asking anyone's permission, or getting any
certificates.
Outlook and outlook express support
Does anyone have any source code or algos for Philips CRYPTO1 stream cipher
as used in their MIFARE products?
is anonymous as it gets - it's unlikely that a library will
have something that university bookstore or Internet doesn't have. Again, poor
terorists should be caught.
I want to be terorized by professionals.
Has 'haven' for questionable sites sunk?
By Declan McCullagh
Staff Writer, CNET News.com
August 4, 2003, 1:38 PM PT
LAS VEGAS--A widely publicized
project to transform a platform in
the English Channel into a safe
haven for controversial Web
businesses has failed due to
political,
Free Congress Foundation's
Notable News Now
March 28, 2003
The Free Congress Commentary
Anti-war Protestors: It's Time YOU
Start Imitating Our Troops!
By Lisa S. Dean
When it comes to supporting freedom of speech, I'm right there fighting with
the next guy. But as with anything, there
Declan McCullagh [EMAIL PROTECTED] wrote:
Or perhaps we'll see someone take a GPS-controlled small plane, which
can carry 1,000 lbs, and turn it into a flying bomb or delivery system
for something quite noxious. These planes can be rented by the hour at
hundreds of small to medium sized
Eric Cordian wrote on March 20, 2003 at 14:35:45 -0800:
Libertarians are people who think the only legitimate use of state force
is to protect them from their slaves.
No libertarian will ever express support for slavery or forced servitude,
except for punishment after due process for a crime
Assumptions:
- I have https (SSL) access to a trusted unix box
- I trust SSL
- I'll take a risk of unknown machine running http client being subverted
I want to use PGP while checking/sending e-mail via web interface on someone else's
machine (say, internet cafe). So in one window I have
On Thu, Mar 20, 2003 at 01:42:16PM -0600, Harmon Seaver wrote:
What bullshit. You just suck right up to those war criminals don't you?
Do you work for them too?
On Thu, Mar 20, 2003 at 11:18:09AM -0600, Keith Ray wrote:
argument elided
Nicely argued, Mr. Seaver. I've never seen
Keith Ray [EMAIL PROTECTED] wrote:
This is no excuse for use of unconventional warfare against the US nor does it
delegitimize the US's use of force to defend themselves.
What a crock of shit. I sure hope that Saddam kept enough sarin to bring
an excrutiatingly horrible death to all
Tim, it's time to switch to decaf.
On Mon, 17 Mar 2003 20:59:31 -0800, you wrote:
Journalists, diplomats, inspectors, and civil servants are being urged to evacuate
the capital. A timetable of 48 hours has been given.
The Evil Doers will be rooted out and the Evil Ones punished, said one
Two great items in today's news -- the FBI says it will pull all agents off
of crime fighting duties to concentrate on terrorism because of the attack on
Iraq, and also that so many police and firemen have been called up for the
attack that many cities, and especially small towns, are
We will support our troops when they shoot their officers!
People need to start taking out their towers. Easiest way to fix broadcast
towers is to wait until just before a lightening storm and then cut the big
grounding cables.
On Sat, 15 Mar 2003 14:25:51 +, you wrote:
So which American on the list is going to write to Congress to demand
that the Statue of Liberty be sent back to France?
Ken
It really should go back to France, as the US seems to care less
about liberty than when it received that gift, and
On Fri, 7 Mar 2003 09:31:40 -0500 (est), Sunder [EMAIL PROTECTED] wrote:
Screw that - just buy a few thousand of these little devices, disable them
so that they're always transmitting drunk driver and install them in
politicians' cars all over DC (make sure you install'em in cop
cars too.) You
On Fri, 7 Mar 2003, Tim May wrote:
Did I invite the public in when an announcement was made for a
meeting at my house last September? There were many people I had never
met personally, nor even heard of.
Nearly all were well-behaved, but what if someone had not been? Were my
property rights
On Sunday 09 March 2003 10:52 am, Tim May wrote:
Neither MegaCorp nor anyone else has property rights to the air.
So rights only apply to land ?
What's the frigg'in difference between dirt and air. It's all atoms.
Did you specify that you also wanted rights to the air on your property when
On Saturday 08 March 2003 01:33 am, Tim May wrote:
Silly person, a property does not have rights. Owners have rights. And
these apply whether one person, 5 persons, or a group of co-owners own
something.
Dewey, Cheatum, and Howe, LP
2000 Maynard Way
New York, NY
Mr. May
Dewey, Cheatum, and
On Sat, 08 Mar 2003 09:00:48 -0800, you wrote:
--
On 8 Mar 2003 at 2:44, Anonymous wrote:
But let's cut to the chase. Assume that all private grocery
store owners want to exclude people from their stores. Now
assume that 100% of them agree that effective Tuesday, only
those people
On Fri, 7 Mar 2003 19:44:44 -0500, you wrote:
On Fri, Mar 07, 2003 at 11:20:39AM -0500, Tyler Durden wrote:
First of all, stating one perhaps should have the right to wear whatever
T-shirt you want in a mall
The better way to frame the question: May a private property owner
legally
On Fri, 7 Mar 2003 09:15:52 -0800, you wrote:
On Friday, March 7, 2003, at 06:21 AM, An Metet wrote:
I've been hearing liberals bleat about the actions of the cops and
mall security.
Their civil rights were violated!
They have free speech!
The mall is a public accomodation!
Property
On Thu, 6 Mar 2003 19:21:52 -0800, you wrote:
On Thursday, March 6, 2003, at 02:11 PM, Major Variola (ret) wrote:
Besides, the publicity has been great. I was told that after it made
news, 150 women wearing
the same T-shirts showed up at the mall. The security guards locked
themselves in
On Wed, 05 Mar 2003 09:58:31 -0800, you wrote:
At 11:03 PM 3/4/03 -0500, Steve Furlong wrote:
From the article, New York Civil Liberties Union President Stephen
Gottlieb says, We believe, most of us, in the Bill of Rights, and we
believe that protects the freedom to speak. How is
These fucks need killing immediately. Kill any SCOTUS pig and you
will assure your place in Heaven, with 21 beautiful virgins at your command.
http://www.cnn.com/2003/LAW/03/05/three.strikes.ap/index.html
So the US military now has no problem with torturing prisoners of war.
And the US
This sure sounds like bullshit. How could a body be decapitated falling on
a fence like that? The human body just ain't all that fragile.
R. A. Hettinga [EMAIL PROTECTED] wrote:
http://www.accessatlanta.com/ajc/metro/atlanta/0203/16suspect.html
[ The Atlanta Journal-Constitution:
Behold, a copy of the defaced main page of cryptome.org. [*]
Which appears to offer a link to cryptome.org's mail. Would Cryptome's
proprietor like to comment on what mail he was keeping on his web server?
Strangely no mention of the specific defacement now appears on Cryptome.
[*]
You wrote:
Waitisn't this a Philip K Dick book? The president's actually a
simulacra made to convince workers to stay below ground because of the
terrible war. But the truth is there is no war, and the underground folks
are really just slave labor cranking out goods for the elite few
Cardenas wrote on February 18, 2003 at 15:02:
You're a fucking racist.
I didn't see anything in his post that was indicative of an inherent
belief in the superiority of any particular race.
If you can't understand why black and latino pride is necessary after
centuries of murderous
On 13 Feb 2003 at 9:50, Declan McCullagh wrote:
BANKS AGREE TO BLOCK NET GAMBLING CREDIT CARD TRANSACTIONS
Ten banks have reached agreement with N.Y. Attorney General
Eliot Spitzer to begin blocking credit card transactions
involving online gambling. The banks agreed to pay the
Attorney
Mike Rosing wrote:
BTW, why should I need a TPM only for secure key storage ?
Any smartcard is better suited for this.
Because it's soldered into the portable. For an enterprise that means
they *know* each portable out in the field is held by the correct
user. With a smart card, they
Mike Rosing wrote:
- secure boot
- sealing
- remote attestation
It does *not* do these parts.
I think you may have been mislead by the slant of paper.
Quoting from the paper:
http://www.research.ibm.com/gsal/tcpa/why_tcpa.pdf
you will see:
| The TCPA chip is not particularly suited to
Has anyone run their psychosocial simulators on what happens when Osama
claims responsibility? Would he try this? What numbers do you get for
the US pop's reaction?
According to a friend from Ft.Meade, the Oyster (a massive parallel machine) is now at
point 96, which means that it can emulate
1 - 100 of 215 matches
Mail list logo