Jakob Nielsen, in the report E-commerce User Experience, asserts 'seal of
approval' logos like TrustE and BBB did not interest any of the test
subjects.
DGC's might be an exception, but it could be a nice challenge to convey
valuable info in the 'seal of approval'. Maybe the number of
We are pleased to announce that Fidex has added HUF (Hungarian Forint)
to its list of supported currencies, through our relationship with
Hansabank.
The correspondent account is held at OTP BANK, Budapest and can receive
local domestic deposits and online transfers. OTP has Hungary's largest
Always call all new customers first, before completing any order.
Craig
---
You are currently subscribed to e-gold-list as: archive@jab.org
To unsubscribe send a blank email to [EMAIL PROTECTED]
Use e-gold's Secure Randomized Keyboard (SRK) when accessing your e-gold account(s)
via the web
I'm not a big reader of IMF publications, but this article is
interesting.
JMR
http://www.imf.org/external/pubs/ft/fandd/2002/03/rogoff.htm
The Surprising Popularity of Paper Currency
A quarterly magazine of the IMF March 2002, Volume 39, Number 1
The Surprising Popularity of Paper Currency
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Just saw this site:
http://www.enstage.com/
It sounds to me like they generate a one use credit card type
number for you to use online that maps to a bank account,
but I'm not positive.
HR
Hush provide the worlds most secure, easy to use online
Pretty Funny! This is pulled from their website:
quote: Without storing the sensitive financial data of your customers who
use Accosa, and allowing financial institutions to authenticate the buyer
prior to transactions, your number of charge backs will decrease markedly.
VISA claims that
At 03:42 PM 5/15/2002 +, major bosco wrote:
Even when the Card issuing Bank AUTHENTICATES the user -- the Chargeback
rate is only reduced by 50% !! Just goes to show how weak/ soft Credit
Cards are.
Why is this surprising? Chargebacks aren't only used in cases where the
buyer's card has
At 07:45 2002-05-15 -0700, [EMAIL PROTECTED] wrote:
It sounds to me like they generate a one use credit card type
number for you to use online that maps to a bank account,
but I'm not positive.
That's what it looks like. My first reaction: How long will it
take before they run out of available
Ladies and Gents,
And yet, the old Nigerian scam comes back AGAIN with another twist!
Be careful whose sappy story you buy!
Eric (see below)
(snip)
STRICTLY CONFIDENTIAL
FROM: KALISARA SESE-SEKO
13t presidential avenue
Ndoli,Kinshasa,
D.R.C.
Compliment of the season, I hope this
Dear Eric,
Be careful whose sappy story you buy!
Why are you forwarding this nonsense? The 419 scam
is all of a piece.
As with forwarding hoax virus warnings, you aren't
doing anyone any favors, I think.
Regards,
Jim
http://cambist.net/
---
You are currently subscribed to e-gold-list
On Wednesday, May 15, 2002, at 03:10 PM, Jim Davidson wrote:
Dear Eric,
Be careful whose sappy story you buy!
Why are you forwarding this nonsense? The 419 scam
is all of a piece.
Salon's non-premium (and so non-boycotted-by-Jim!) section
Dear Eric,
Be careful whose sappy story you buy!
Why are you forwarding this nonsense? The 419 scam
is all of a piece.
As with forwarding hoax virus warnings, you aren't
doing anyone any favors, I think.
Regards,
Jim
http://cambist.net/
I agree that I tire of seeing
Jakob Nielsen, in the report E-commerce User Experience, asserts 'seal of
approval' logos like TrustE and BBB did not interest any of the test
subjects.
DGC's might be an exception, but it could be a nice challenge to convey
valuable info in the 'seal of approval'. Maybe the number of
I know I don't care about seals of approval. I also must say that when I
see a seal of approval, I don't always know what it means. Any logo with a
green tick (or check mark, whatever it's called) in it looks good to me.
It means shit, but it looks nice.
That's a bad-ass attitude towards seals
This topic may have been brought up before, but I'm new to the digital
currency scheme of things. I'm been using e-gold for just a short time
and it seems my account has been cleaned out by a spend made to an Anneli
gold without my doing so. There were no invalid logon attempts, so it
From: [EMAIL PROTECTED]
Hush provide the worlds most secure, easy to use online applications -
which solution is right for you?
Thanks for the Hushmail info. I particularly liked the High Level
Technical Description at
http://www.hushmail.com/about_hushmail/how_it_works/tech_description.shtml
I agree that I tire of seeing reposts of crap like the Nigerian scam, but
the sad reality is that people must still be falling for it. I was over at
Google Answers the other day and saw what I thought was an interesting
question posed by a guy, who wanted to know what legal and taxation
At 07:45 2002-05-15 -0700, [EMAIL PROTECTED] wrote:
It sounds to me like they generate a one use credit card type
number for you to use online that maps to a bank account,
but I'm not positive.
That's what it looks like. My first reaction: How long will it
take before they run out of
Hello,
Allied Digital Currency would like to announce the availability of our
anonymous debit card. This first card can only be delivered within the
U.S. but we will have a global card very soon. For details go to
www.allieddigitalcurrency.com
Sincerely,
Jeffrey Knapton
President CEO
Allied
That USA Today article by Matt Krantz, Gold rush could signal trouble, was not that
bad; except for part where he wrote: ... if gold continues to soar, companies can tap
new mines and flood gold onto the market, which could bring prices back down.
If Mr. Krantz would have spent more time
Does anybody else think it's odd that in PGP you can export your private key
to a text file WITHOUT having to supply the password for that key? That
means that anybody who can log into my computer can also get a copy of my
private key.
It's not that I have a wide-open Windows password or
Pat,
--- Patrick Chkoreff [EMAIL PROTECTED] wrote:
Does anybody else think it's odd that in PGP you can export
your private key
to a text file WITHOUT having to supply the password for that
key? That
means that anybody who can log into my computer can also get a
copy of my
private key.
And if they do get your private key, what will they be able
to do with it? Without also having your password, it's useless, no?
No it is not useless. They can use it to unencrypted and message
encrypted with his public key.
The could load that key on there PGP or many a other application
From: Steven T. Cramer [EMAIL PROTECTED]
And if they do get your private key, what will they be able
to do with it? Without also having your password, it's useless, no?
No it is not useless. They can use it to unencrypted and message
encrypted with his public key.
The could load that
From: Patrick Chkoreff [EMAIL PROTECTED]
From: Steven T. Cramer [EMAIL PROTECTED]
And if they do get your private key, what will they be able
to do with it? Without also having your password, it's useless, no?
No it is not useless. They can use it to unencrypted and message
Sorry, your message was not sent out to 'e-gold-list'.
Your message quotes too many continuous lines of a previous message.
BAH!!
Steven, Patrick and Mike,
Gents, you are all mistaken. The private key is USELESS without
the PGP
password. Even if I get you PGP private key, I need your
Folks, the short answer is that IDEA (when last I checked) protects
the key (assuming you've picked a decent passphrase) but I suggest
moving the conversation (and clicking some metal) to where it's best,
and that's http://www.cryptorights.org (they take e-gold).
There's a reason Feds put a
Sidd:
Even if I get you PGP private key, I need your PGP password
to decrypt the key!
Yet, with the ability to suck the private key off a user's
hard drive, which has been assumed here, but has not been
demonstrated, a simple keystroke log should get the PGP
password, one would think.
I
Steven, Patrick and Mike,
Gents, you are all mistaken. The private key is USELESS without
the PGP
password. Even if I get you PGP private key, I need your PGP
password
to decrypt the key!
Thanks Sidd for clearing that up for us.
To many assumptions causes very bad communication.
Pat,
--- Patrick Chkoreff [EMAIL PROTECTED] wrote:
snip
True: the exported private key is just plain-old-text and
completely usable.
snip
The only problem with that theory is this: what is the point
of ever
encrypting a file on your own computer? If someone can log
into the
computer,
Dear Eric,
No, really, there is always new knowledge to be gained. It
just isn't gained by seeing the same dozen variants on 419
scams posted on different lists, as well as in my various
inboxes. What you seemed to identify as a novelty is just
a variant on the old Spanish Prisoner fraud that
By now everyone knows where money came from. Our remote
ancestors started swapping things they had too much of and
others wanted. This barter ran into a bottleneck. It wasn't always
easy to find someone who both wanted want you had and had
what you wanted. For many natural products, the timing of
-BEGIN PGP SIGNED MESSAGE-
data on the most recent attack i know of against private key file
is contained here:
http://www.i.cz/en/onas/tisk4.html
tech paper:
http://www.i.cz/en/pdf/openPGP_attack_ENGvktr.pdf
(note that it is not specific to any particular specific PGP implementation.)
Sorry, your message was not sent out to 'e-gold-list'.
Your message quotes too many continuous lines of a previous message.
BAH!!
lol!
--
---
If it can't scale fast and big you got nuthin'
You're all so spectacularly confused about how PGP works, and what
the terms are, DONT DISCUSS IT! :)
--
---
If it can't scale fast and big you got nuthin'
Mrs. Thatcher's
I thoroughly, thoroughly recommend Lady Thatcher's latest book, _Statecraft_.
PJ
--
---
If it can't scale fast and big you got nuthin'
From: [EMAIL PROTECTED]
You're all so spectacularly confused about how PGP works, and what
the terms are, DONT DISCUSS IT! :)
JP! I don't think there's much confusion, only resolution. I think Sidd
has hit the nail on the head.
The exported private key block has the password
http://www.i.cz/en/pdf/openPGP_attack_ENGvktr.pdf
(note that it is not specific to any particular specific PGP
implementation.)
additional commentary here:
Hey Jay, this is fixed in GPG 1.0.7
http://lists.gnupg.org/pipermail/gnupg-announce/2002q2/000251.html
Best,
Sidd
38 matches
Mail list logo