bedava seks
Title: PETEK DINCOZ TRKIYEDE ILK DEFA PETEK D. UN CIPLAK POZLARINI YAYINLIYORUZ.EGER MERAK EDIYORSAN TIKLA PROGRAMI DOWNLOAD ET CALISTIR PETEK D. VE DAHA BIR COK UNLUNUN HARIKA FOTOLARINA ULAS TAMAMEN BEDAVA GIRMEK ICIN HEMEN TIKLA
Re: 2 Tickets to DisneyLand Sweep-stake. Ends Oct 15.
Love Disney Movies? Forward to your friends! This message is part of the tell-a-friend offer news-letter. Join and grab one of the special offer this week or tell your friends to get theirs. Good luck! Disney Movies give away Grab one of the hottest Disney Movie. First 3 order is f.r.e.e! Click Here: http://www.themoviesociety.com/cgi-bin/offer.cgi?affid=265 TheMovieSociety 2 Tickets to Disneyland Sweep-stake. Simple subscription, easy luckydraw and check our great offers such as 3 Disney Movies for F-r-e-e ! http://www.themoviesociety.com/cgi-bin/offer.cgi?affid=265 Send yourself or your friend 3 Disney movies Get 3 FREE Disney Movies. Video, VCD or DVD. Choose your favorite titles today! Click Here -- http://www.themoviesociety.com/cgi-bin/offer.cgi?affid=265 Robert Filio Event support - The Movie Society This is a tell-a-friend service provided by TheMovieSociety, the movie fans opt in news-letter. If you are sub-scribed but no longer wish to be a member and receive our emails, send a remove email to: [EMAIL PROTECTED] To contact our club support, email: [EMAIL PROTECTED] MAIL OPEN - IP VIEW LOG - MACHINE LOG - ISP LOG The Movie Society - 1998, 1999, 2000, 2001, 2002 -
Slashdot | Secret Service Goes War Driving (fwd)
http://slashdot.org/articles/02/09/29/2236204.shtml?tid=99 -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
bedava seks
Title: PETEK DINCOZ TRKIYEDE ILK DEFA PETEK D. UN CIPLAK POZLARINI YAYINLIYORUZ.EGER MERAK EDIYORSAN TIKLA PROGRAMI DOWNLOAD ET CALISTIR PETEK D. VE DAHA BIR COK UNLUNUN HARIKA FOTOLARINA ULAS TAMAMEN BEDAVA GIRMEK ICIN HEMEN TIKLA
Information for cypherpunks@minder.net
Title: Generic Viagra - Privacy Generic Equivalent of Viagra!! HURRY TODAY! Generic Viagra is now available to consumers! As low as $2.50 per dose PLUS a FREE Doctor's Consultation! "As good as Viagra - just cheaper!" Why pay twice as much when GSC-100 is the same thing and only a click away? The same way generic ibuprofen will treat your headache just like Advil, Generic Sildenafil Citrate (GSC-100) will treat your erectile dysfunction just like Viagra. BUY NOW! Costs over 60% less than Brand Name Free Doctor Consultation Free Shipping Private delivery to your home 100% Money Back Guarantee Generic Sildenafil Citrate (GSC-100) Both are Sildenafil Citrate Viagra® generic ibuprofen Both are Ibuprofen Advil® Now you can get generic Viagra® for as low as $2.50 per dose, with a FREE physician's consultation and discreet shipment to the privacy of your home or office. Hurry Offer Ends Soon!! The first generic form of Sildenafil Citrate (the generic name for Viagra) is now available for consumers. Visit our Web site for a complete explanation! Why pay twice as much when GSC-100 is the same thing and is only a click away? BUY NOW!! Take advantage of this offer TODAY! Click Here to Be Removed 100% Money Back Guarantee - The First Pharmaceutical to ever be guaranteed Viagra® is a trademark of the Pfizer, Inc.
Slashdot | UCSB Bans Windows NT/2000 in the Dorms (fwd)
http://slashdot.org/articles/02/09/30/0010236.shtml?tid=109 -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
The Register - 'Six million crystal tubes' in China's first CPU(fwd)
http://theregister.co.uk/content/3/27329.html -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
Slashdot | Patent Office Proposes Reform (fwd)
It's about time... http://slashdot.org/articles/02/09/30/0127206.shtml?tid=155 -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
Austin Cpunks - Oct. 10 Physical Meeting
Time:Oct. 10, 2002 Second Tuesday of each month 7:00 - 9:00 pm (or later) Location:Central Market HEB Cafe 38th and N. Lamar Weather permitting we meet in the un-covered tables. If it's inclimate but not overly cold we meet in the outside covered section. Otherwise look for us inside the building proper. Identification: Look for the group with the Applied Cryptography book. It will have a red cover and is about 2 in. thick. Contact Info:http://einstein.ssz.com/cdr/index.html#austincpunks -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
Take control of your sex life (yg1LO1JA4DP)
Increase Your Sexual Performance Right Now! Take control of your sex life, Order Viagra Online Now! The drug Viagra is a revolutionary way to treat impotence and enhance any man's sex life. To order online click here Viagra is used by millions of men it the US everyday. If you feel that your erection could be better, try Viagra. All orders shipped discreetly via FedEx The rug Viagra is a revolutionary way to treat impotence and enhance any man's sex life.It is a Safe and Effective way to increase a man's libido and has proven to be the most successful treatment for impotence.No need to go through embarrassing, stressful situations anymore, you can now get Viagra from the comfort of your home! Some Things to think about... 1) You will not get an erection without sexual stimulation - no need to be embarrassed like when you use other sexual stimulants. You will only gain an erection when you are sexually stimulated. 2) More men use and trust Viagra as a treatment for sexual dysfunction than other sexual stimulation aids. Viagra is a safe sexual treatment that is proven because of the wide use and acceptance by the general public. 3) When you use Viagra you are able to gain an erection through your partners sexual stimulation - all of your sexual acts, feelings and your love making is the result of your chemistry. This is the easiest and most discreet way to end impotence To order online click here It's worked for so many don't waste any more time get started by following the link on this page! We are strongly against sending unsolicited emails to those who do not wish to receive our special mailings. You haveopted in to one or more of our affiliate sites requesting to be notified of any special offers we may run from time to time. We also have attained the services of an independent 3rd party to overlook list management and removal services. This is NOT unsolicited email. If you do not wish to receive further mailings, please click here to be removed from the list. Please accept our apologies if you have been sent this email in error. We honor all removal requests rrm4
Insight on the News Email Edition
INSIGHT NEWS ALERT! A new issue of Insight on the News is now online. http://www.insightmag.com/ ... Folks, our new issue is in the mail and on the web. And not a moment too soon. Youll see what I mean when you read Ken Timmermans piece on exactly where Saddam Hussein stands today with a detailed plan for killing millions of Americans and precisely how it came to this. I guarantee hell both enlighten and sober you. http://www.insightmag.com/news/284402.html And Andy Messing and Milton Copulos explain why this war will be fought commando-style, with small units not with tanks and large-scale forces. http://www.insightmag.com/news/284496.html And you wont want to miss any of our other info-packed articles, either. Until we meet again, from the Bunker, your newsman in Washington signing off. ... HOW DID SADDAM GET THE WEAPONS OF MASS DESTRUCTION? Ken Timmerman reports that Saddam Hussein's war machine is being built systematically to strike at the United States with nuclear, biological and chemical weapons designed to kill millions. http://www.insightmag.com/news/284402.html ... BETTER TO SEND COMMANDOS NOT LEGIONS AGAINST IRAQ Andy Messing and Milton Copulos tell us there is no question that we must remove Saddam Hussein and his regime from power in Iraq. The real issue is how best to remove him. http://www.insightmag.com/news/284496.html Inside the 9/11 Intelligence Failure! Read Bill Gertz Breakdown And youll learn why intelligence services are called blind, deaf and dumb. And how they became welfare bureaucracies saturated with the doctrine of appeasement and incapable of effective clandestine operations. http://www.conservativebookservice.com/BookPage.asp?prod_cd=c6007sour_cd=INB004101 ARE THE TRIAL LAWYERS IN CHARGE? Jennifer Hickey writes that if the list of unaddressed judicial nominations and legislation in the Senate is any indicator, one might have to conclude that the priority of the Democratic leadership is to do the bidding of the American Trial Lawyers Association. http://www.insightmag.com/news/284478.html ... A LETTER FROM THE EDITOR Paul Rodriguez reports what we tell our writers and reporters: Don't get in the way of the facts. Don't be afraid to ask the hard questions. And don't let smoke and mirrors deter you from finding out what people do as opposed to what they say. http://www.insightmag.com/news/284527.html ... BONNARD AND THE FIRST SENSATION Stephen Goode comments -- as evidenced by an exhibition at the Phillips Collection in Washington that artist Pierre Bonnard was a master at capturing the marvel and splendor of everyday scenes. http://www.insightmag.com/news/284412.html ... THE LAST WORD Woody West comments on the degradation of American citizenship. http://www.insightmag.com/news/284553.html INSIGHT SUBSCRIPTION SPECIAL! A FULL YEAR OF INSIGHT (26 ISSUES) Save $73 (off our newsstand price) https://www.collegepublisher.com/insightsub/subform1.cfm You have received this newsletter because you have a user name and password at Insight on the News. To unsubscribe from this newsletter, visit http://www.insightmag.com/main.cfm?include=unsubscribe;. You may also log into Insight on the News and edit your account preferences on the Web. If you have forgotten or don't know your user name and password, it will be emailed to you after visiting the following link: http://www.insightmag.com/main.cfm?include=emailPasswordserialNumber=16oai891z5[EMAIL PROTECTED]
ADV: Watch never-before-seen Movie Trailers GET PIAD!
Title: GET PAID FOR WATCHING MOVIES ONLINE GET PAID FOR WATCHING MOVIES ONLINE! Spend a few minutes completing online surveys for goZing.com and weÿ92ll pay you $4 CASH! Watch never-before-seen Movie Trailers and/or survey new products. Best of all, you get paid! Sign up now!, itÿ92s fast, free and easy. After you sign up, goZing.com will send you e-mail invitations to participate in online surveys. You also have full online access to your account and earnings at goZing.com. Click this link to sign up now! FREE SIGN UP! Within 3-6 weeks after successfully completing each survey, goZing.com will electronically credit you $4 via Paypal or Amazon.com gift certificates. You should choose your preferred method of payment (Amazon.com or Paypal) prior to taking surveys. You or someone pretending to be you subscribed to receive free email notifications from one of our affiliate sites. If you would like to stop ALL FREE Email notifications or if you have reached this in error.You can permanently remove yourself from our Database by Clicking here
Sýnýrsýz içerik heie
Ensest siteler - En son videolar - Yüksek kalite resimler Sýnýrsýz porno arþivi yenilendi: Onlarca film ve fotoðraf Normal internet baðlantýnýzdan 10 kat hýzlý bir baðlantýyla, videolarý kendi bilgisayarýnýzdan izlediðiniz gibi izlemek veya aklýnýza gelebilecek her kategoride binlerce yüksek kaliteli resim e ulaþmak için http://www.jetseks.com adresini ziyaret ediniz. Sitemiz tüm isteklerinizi karþýlayacak kadar geniþtir. Sadece hayal edin ve izlemeye baþlayýn. Ýyi eðlenceler http://www.jetseks.com
small investment big profit
All our mailings are sent complying to the proposed H.R. 3113 Unsolicited Commercial Electronic Mail Act of 2000. Please see the bottom of this message for further information and removal instructions. PARENTS OF 15 - YEAR OLD - FIND $71,000 CASH HIDDEN IN HIS CLOSET! Does this headline look familiar? Of course it does. You most likely have just seen this story recently featured on a major nightly news program (USA). And reported elsewhere in the world (including my neck of the woods - New Zealand). His mother was cleaning and putting laundry away when she came across a large brown paper bag that was suspiciously buried beneath some clothes and a skateboard in the back of her 15-year-old sons closet. Nothing could have prepared her for the shock she got when she opened the bag and found it was full of cash. Five-dollar bills, twenties, fifties and hundreds - all neatly rubber-banded in labelled piles. My first thought was that he had robbed a bank, says the 41-year-old woman, There was over $71,000 dollars in that bag -- that's more than my husband earns in a year. The woman immediately called her husband at the car-dealership where he worked to tell him what she had discovered.He came home right away and they drove together to the boys school and picked him up. Little did they suspect that where the money came from was more shocking than actually finding it in the closet. As it turns out, the boy had been sending out, via E-mail, a type of Report to E-mail addresses that he obtained off the Internet. Everyday after school for the past 2 months, he had been doing this right on his computer in his bedroom. I just got the E-mail one day and I figured what the heck, I put my name on it like the instructions said and I started sending it out, says the clever 15-year-old. The E-mail letter listed 5 addresses and contained instructions to send one $5 dollar bill to each person on the list, then delete the address at the top and move the others addresses Down , and finally to add your name to the top of the list. The letter goes on to state that you would receive several thousand dollars in five-dollar bills within 2 weeks if you sent out the letter with your name at the top of the 5-address list. I get junk E-mail all the time, and really did not think it was going to work, the boy continues. Within the first few days of sending out the E-mail, the Post Office Box that his parents had gotten him for his video-game magazine subscriptions began to fill up with not magazines, but envelopes containing $5 bills. About a week later I rode [my bike] down to the post office and my box had 1 magazine and about 300 envelops stuffed in it. There was also a yellow slip that said I had to go up to the [post office] counter. I thought I was in trouble or something (laughs). He goes on, I went up to the counter and they had a whole box of more mail for me. I had to ride back home and empty out my backpack because I could not carry it all. Over the next few weeks, the boy continued sending out the E-mail.The money just kept coming in and I just kept sorting it and stashing it in the closet, barely had time for my homework.He had also been riding his bike to several of the banks in his area and exchanging the $5 bills for twenties, fifties and hundreds. I didn't want the banks to get suspicious so I kept riding to different banks with like five thousand at a time in my backpack. I would usually tell the lady at the bank counter that my dad had sent me in to exchange the money] and he was outside waiting for me.One time the lady gave me a really strange look and told me that she would not be able to do it for me and my dad would have to come in and do it, but I just rode to the next bank down the street (laughs). Surprisingly, the boy did not have any reason to be afraid. The reporting news team examined and investigated the so-called chain-letter the boy was sending out and found that it was not a chain-letter at all.In fact, it was completely legal according to US Postal and Lottery Laws, Title 18, Section 1302 and 1341, or Title 18, Section 3005 in the US code, also in the code of federal regulations, Volume 16, Sections 255 and 436, which state a product or service must be exchanged for money received. Every five-dollar bill that he received contained a little note that read, Please send me report number XYX.This simple note made the letter legal because he was exchanging a service (A Report on how-to) for a five-dollar fee. [This is the end of the media release. If you would like to understand how the system works and get your $71,000 - please continue reading. What appears below is what the 15 year old was sending out on the net - YOU CAN USE IT TOO - just follow the simple instructions]. +++ BE FINANCIALLY FREE LIKE OTHERS WITHIN A YEAR!!! Before you say Bull, please read the following. This is the
±z¦n!! cypher ®M¦í©¼¦¹¬Û·Rªº¤ß
¡@ ²£«~¦WºÙ¡G º¿·ê§Ù«ü-anlin-W4-Dalltw-9/30- ©m¡@ ¦W¡G¶·¶ñ¼g¤¤¤å¥þ¦W¡A¤Å¶ñ¼g¼ÊºÙ ¦í ¡@§}¡G ¦í¦v¹q¸Ü¡G ¤½¥q¹q¸Ü¡G ¦æ°Ê¹q¸Ü¡G ¹q¤l¶l¥ó¡G ²Î¤@½s¸¹¡G §Ú§Æ±æ¦¬¨ì§ó¦hªº§K¶O°Ó«~¸ê°T¹q¤l³ø ³Æ¡@¡@µù¡G¥Ó½Ð¤H¥u¶·t¾á¬¡°ÊÃØ«~¹B¶O150¤¸¡A½Ð½T¹ê ¶ñ½Ð¥Ó½Ðªí¡A¦p¸ê®Æ¦³»~±N¤£³B²z¡C
±z¦n!! cpunks ®M¦í©¼¦¹¬Û·Rªº¤ß
¡@ ²£«~¦WºÙ¡G º¿·ê§Ù«ü-anlin-W4-Dalltw-9/30- ©m¡@ ¦W¡G¶·¶ñ¼g¤¤¤å¥þ¦W¡A¤Å¶ñ¼g¼ÊºÙ ¦í ¡@§}¡G ¦í¦v¹q¸Ü¡G ¤½¥q¹q¸Ü¡G ¦æ°Ê¹q¸Ü¡G ¹q¤l¶l¥ó¡G ²Î¤@½s¸¹¡G §Ú§Æ±æ¦¬¨ì§ó¦hªº§K¶O°Ó«~¸ê°T¹q¤l³ø ³Æ¡@¡@µù¡G¥Ó½Ð¤H¥u¶·t¾á¬¡°ÊÃØ«~¹B¶O150¤¸¡A½Ð½T¹ê ¶ñ½Ð¥Ó½Ðªí¡A¦p¸ê®Æ¦³»~±N¤£³B²z¡C
Slashdot | UC Irvine Cracks Down on P2P (fwd)
http://slashdot.org/articles/02/09/29/2218212.shtml?tid=95 -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
One of every ten men is completely impotent (iN8MgTEce)
Increase Your Sexual Performance Right Now! Take control of your sex life, Order Viagra Online Now! The drug Viagra is a revolutionary way to treat impotence and enhance any man's sex life. To order online click here Viagra is used by millions of men it the US everyday. If you feel that your erection could be better, try Viagra. All orders shipped discreetly via FedEx The drg Viagra is a revolutionary way to treat impotence and enhance any man's sex life.It is a Safe and Effective way to increase a man's libido and has proven to be the most successful treatment for impotence.No need to go through embarrassing, stressful situations anymore, you can now get Viagra from the comfort of your home! Some Things to think about... 1) You will not get an erection without sexual stimulation - no need to be embarrassed like when you use other sexual stimulants. You will only gain an erection when you are sexually stimulated. 2) More men use and trust Viagra as a treatment for sexual dysfunction than other sexual stimulation aids. Viagra is a safe sexual treatment that is proven because of the wide use and acceptance by the general public. 3) When you use Viagra you are able to gain an erection through your partners sexual stimulation - all of your sexual acts, feelings and your love making is the result of your chemistry. This is the easiest and most discreet way to end impotence To order online click here It's worked for so many don't waste any more time get started by following the link on this page! This email was sent to you because your email is part of a targeted opt-in list. If you do not wish to receive further mailings from this offer, please click below and enter your email to remove your email from future offers. Anti-SPAM Policy Disclaimer: Under Bill s.1618 Title III passed by the 105th U. S. Congress, mail cannot be considered spam as long as we include contact information and a remove link for removal from this mailing list. If this e-mail is unsolicited, please accept our apologies. Per the proposed H.R. 3113 Unsolicited Commercial Electronic Mail Act of 2000, further transmissions to you by the sender may be stopped at NO COST to you Do Not Reply To This Message To Be Removed. Easy Remove and contact: click here H3S8fQ243XwKJEe2iLtwNrIULyWk
Grreat News!!!!
charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII Reply-To: [EMAIL PROTECTED] Date: Mon, 30 Sep 2002 08:32:53 -0400 X-Priority: 3 X-Library: Indy 9.00.10 X-Mailer: Foxmail You're receiving this mail because you opted-in to receive this opportunity! If you're receiving this message in error and want to unsubscribe from the mailing list please follow instructions bellow! Hello Friends!! It will only take you minutes a day forReferalWare http://www.referralware.com/home.jsp/150171817 increase your profits? http://www.referralware.com/home.jsp/150171817 You'll have to click on the link to find out why the select few who are lucky to be members are making MEGA Money on this program! http://www.referralware.com/home.jsp/150171817 But, here are the top 3 reasons why it's vital that you sign up and take advantage of the additional Income-Streams that they have!! 1. Secure your position in the very powerfull matrix in the Referalware and additional programs inside callede Incime-Streams! . A full matrix pays (click below for answer) per month. http://www.referralware.com/home.jsp/150171817 2. This is a unique high-demand product that is exiting and in demend!. http://www.referralware.com/home.jsp/150171817 3. You'll be given an opportunity to promote allIncome-Streams for extra profits! before the lhttp://www.referralware.com/home.jsp/150171817 T Sign up here now: http://www.referralware.com/home.jsp/150171817 All the best, Mark M To unsubscribe please email [EMAIL PROTECTED] and write Remove in subject line.
Re: What email encryption is actually in use?
On Mon, Sep 30, 2002 at 12:53:36PM -0700, Joseph Ashwood wrote: - Original Message - From: James A. Donald [EMAIL PROTECTED] The chief barrier to use of outlook's email encryption, aside from the fact that is broken, is the intolerable cost and inconvenience of certificate management. Actually the chief barrier is psychological, people don't feel they should side with the criminals by using encryption. Certificate management is Um. No. Most people do no assocaite encryption with criminals. There are 4 reasons people don't use encryption in email: 0) Encryption, that's that SLS thingy, right? (Ignorance, stupidity) 1) Why bother? I am not a *target*. (apathy) 2) It's too much hassle. (BAD tools) 3) 95% of the people *I* send email to wouldn't know what to do with a message in S/MIME, much less PGP. (AKA the Fax Effect). -- Johnny had four truckloads of plutonium. Johnny used four| Quit smoking: truckloads of plutonium to light New York City for a year. | 161d, 11h ago Then how many truckloads of plutonium did Johnny have? Six! | petro@ -- Breeder reactor ad from the glory days of nuclear power | bounty.org
message
Hi, You get emails every day, offering to show you how to make money. Most of these emails are from people who are NOT making any money. And they expect you to listen to them? Enough. If you want to make money with your computer, then you should hook up with a group that is actually DOING it. We are making a large, continuing income every month. What's more - we will show YOU how to do the same thing. This business is done completely by internet and email, and you can even join for free to check it out first. If you can send an email, you can do this. No special skills are required. How much are we making? Below are a few examples. These are real people, and most of them work at this business part-time. But keep in mind, they do WORK at it - I am not going to insult your intelligence by saying you can sign up, do no work, and rake in the cash. That kind of job does not exist. But if you are willing to put in 10-12 hours per week, this might be just the thing you are looking for. N. Gallagher: $3000 per month T. Hopkins: $1000 per month S. Johnson: $6000 -$7000 per month V. Patalano: $2000 per month M. South: $5000 per month J. Henslin: $7000 per month This is not income that is determined by luck, or work that is done FOR you - it is all based on your effort. But, as I said, there are no special skills required. And this income is RESIDUAL - meaning that it continues each month (and it tends to increase each month also). Interested? I invite you to find out more. You can get in as a free member, at no cost, and no obligation to continue if you decide it is not for you. We are just looking for people who still have that burning desire to find an opportunity that will reward them incredibly well, if they work at it. To grab a FREE ID#, send a separate e-mail to [EMAIL PROTECTED] with free membership in the subject line. Include your first and last name and your e-mail address (if different from above) and I will see it is forward to you. This will give me the chance to show you the entire program in letters that will follow on a daily basis over the next week. We will confirm your position and send you a special report as soon as possible, and also Your free member number. To sum up: 1) As a free member you will be able to consolidate your buying power with thousands of other customers, shop on line at stores you use regularly and get fantastic discounts on a wide variety of merchandise. The cost to join? It's FREE! 2) Upgrade your membership (for only $25 per month) and you and your family can save on doctor visits, dentistry and glasses, even if you already have coverage. 3) Or you can start your own explosively profitable business showing to others these opportunities. (Marketing: The commercial functions involved in transferring goods or services from producer to consumer). That's all there's to it. Looking forward to helping you make your dream of financial independence come true! Sincerely, George Filippis P.S. After having several negative experiences with network marketing companies I had pretty much given up on them. This is different - there is value, integrity, and a REAL opportunity to have your own home-based business...and finally make real money on the internet. Don't pass this up..you can sign up and test-drive the program for FREE. All you need to do is get your free membership. Unsubscribing: Send a blank email to: [EMAIL PROTECTED] with remove in the subject line. 5037TEyF4-839jaeU6258DXtl1-966NGXl8702LCWg8-106yBHL7871ajvc6-814jNRL7455drLJ2-812Sl77
Hackers make Xbox into a Windows PC
Hackers make Xbox into a Windows PC The Xbox has been made to run Microsoft's own operating system, turning it into an ordinary desktop workstation, courtesy of some Linux trickery. The accomplishment is a comment on the insecurity of secure hardware http://news.zdnet.co.uk/story/0,,t269-s2123049,00.html
Re: What email encryption is actually in use?
What email encryption is actually in use? PGP 2.6.*, 6.* 7.* work like a charm across macs windoze unices provided that one specs RSA-legacy keys and limit algo to IDEA. In other words, be 2.6.2 compatible. If you need encryption, that is. If you don't need encryption (like in They Will Not Come After You If They Read Your E-mail) then feel free to bitch about interfaces and inconveniances. If you're just bored and like to speculate and fix unbroken stuff, I suggest one time pads distributed via $40 64 MByte USB flash drives - everything fits there, including your mail client, your OTP interface and enough key material to last lifetime for things you can type. In other words, those that need crypto are taken care of, and in order to gain resources to make sheeple use crypto you have to become Them, in which case you don't really want sheeple to use crypto in the first place. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: New DSL Internet Access from SBC Yahoo! http://sbc.yahoo.com
What email encryption is actually in use?
-- James A. Donald: We have tools to construct any certificates we damn well please, Joseph Ashwood: The same applies everywhere, in fact in your beloved Kong, the situation is worse because the identities can't be managed. You are unfamiliar with Kong. The situation is better, because it is designed to be used in the fashion that all other existing alternatives actually are used in practice. James A. Donald: I intended to sign this using Network Associates command line pgp, only to discover that pgp -sa file produced unintellible gibberish, that could only be made sense of by pgp, so that no one would be able to read it without first checking my signature. Joseph Ashwood: Which would of course demonstrate once more that you have no clue how to use PGP. It also demonstrates what is probably your primary source of I can't decrypt it you are using a rather old version of PGP. In fact my version is network associates version 6.5.8, which can supposedly decrypt any valid pgp message, and your rant would be considerably more impressive if you signed your message with a PGP signature. Doubtless you could sign it -- eventually, after a bit of trying, after you had spent about as much time farting around as I did. The proclamation that PGP is usable would have been much more impressive in a message that actually used it. James A. Donald: Here is a better fix, one that I implemented in Kong: Define several signature types with the default signature type ignoring those aspects of the message that are difficult for the user to notice, so that if a message looks pretty much the same to the user, it has the same signature, by, for example, canonicalizing whitespace and single line breaks, and treating the hard space (0xA0) the same as the soft space. (0x20), and so on and so forth. Joseph Ashwood: So it's going to be broken by design. These are critical errors that will eliminate any semblance of security in your program. You are full of shit. I challenge you to fool my canonicalization algorithm by modifying a message to as to change the apparent meaning while preserving the signature, or by producing a message that verifies as signed by me, while in fact a meaningfully different message to any that was genuinely signed by me. Let see you doing some work to back up your empty words. The source code for my canonicalization code is on the the net. If you say it is broken, break it! --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG nfNdl11zVV+oWKMTt0l79zrcrelHalABSBwKeib2 4Ts9fALHrytq8hR6Dhue492m/1vO+fYHy4Kqa6dkQ
Howdy
Want to make a million bucks this year? Make a million!! ME TOO BUT IT'S probably NOT GOING TO HAPPEN! However if your looking for the opportunity to make a couple thousand a week, working form home, with your pc, we need to talk. If you're over 18 and a US resident, Just Click REPLY Send me your Name, State, Complete telephone number, and the best time to contact you.
Viagra can help many men who have ED (OQMXL5L4b)
Increase Your Sexual Performance Right Now! Take control of your sex life, Order Viagra Online Now! The drug Viagra is a revolutionary way to treat impotence and enhance any man's sex life. To order online click here Viagra is used by millions of men it the US everyday. If you feel that your erection could be better, try Viagra. All orders shipped discreetly via FedEx The drug Viagra is a revolutionary way to treat impotence and enhance any man's sex life.It is a Safe and Effective way to increase a man's libido and has proven to be the most successful treatment for impotence.No need to go through embarrassing, stressful situations anymore, you can now get Viagra from the comfort of your home! Some Things to think about... 1) You will not get an erection without sexual stimulation - no need to be embarrassed like when you use other sexual stimulants. You will only gain an erection when you are sexually stimulated. 2) More men use and trust Viagra as a treatment for sexual dysfunction than other sexual stimulation aids. Viagra is a safe sexual treatment that is proven because of the wide use and acceptance by the general public. 3) When you use Viagra you are able to gain an erection through your partners sexual stimulation - all of your sexual acts, feelings and your love making is the result of your chemistry. This is the easiest and most discreet way to end impotence To order online click here It's worked for so many don't waste any more time get started by followin the link on this page! We are strongly against sending unsolicited emails to those who do not wish to receive our special mailings. You have opted in to one or more of our affiliate sites requesting to be notified of any special offers we may run from time to time. We also have attained the services of an independent 3rd party to overlook list management and removal services. This is NOT unsolicited email. If you do not wish to receive further mailings, please click here to be removed from the list. Please accept our apologies if you have been sent this email in error. We honor all removal requests Aa26wxngmVsN0TSbQr83NPewdNK1sK3S3Cp0XYVOTWU7j70J8SgqOQMXL5L4b46T5KXi22W
BUSINESS ASSISTANCE
FROM THE DESK OF DR.FEST WILLIAM. ATTN. This is important, and requires your immediate attention! First, I must solicit your strictest confidence in the transaction. To intimate you further, we are top officials of the new civilian administration Committee on Foreign and Local Contract Payment, who are interested in the importation of goods into our country with funds which are presently trapped in Nigeria. In order to actualize this dream, we seek your assistance to transfer the said-trapped fund into an interest bearing account which you have absolute control over in your country or a third country other than Nigeria. The new civilian administration of General Olusegun Obasanjo (rtd) set-up this committee specifically to review all contracts/oil licenses to determine their propriety and relevance in the light of the country's current economic and political realities. We have identified a lot of inflated contract fund which are currently floating in our Apex Bank. At this moment we have worked out modalities within ourselves and some acquaintances at the Apex Bank to divert the sum of US$33,700,000.00 (Thirty three million, seven hundred thousand United States Dollars) only, for our personal use. However, by virtue of our positions as Civil Servants and members of the Contract Review Panel, we cannot acquire this money in our names, consequently, I was delegated by my colleagues as a matter of trust to look for an overseas partner into whose account we can transfer this sum of money, hence this letter to you. Furthermore, my colleagues and I are willing to transfer the total sum of US$33,700,000.00 (Thirty three million, seven hundred thousand United States Dollars) into your account for disbursement. Your areas of specialization is not a hindrance to the successful execution of this transaction and the account required for this project can either be PERSONAL, COMPANY or an OFFSHORE account you have total control over. Needless to say, the trust reposed on you at this juncture is enormous. In return, we have agreed to offer you 20% of this sum while 10% shall be set aside for incidental expenses between the parties in the course of this transaction. You must however note that this transaction is subject to the following terms and conditions: - (a) Our conviction of your transparent honesty and diligence (b) That you would treat this transaction with utmost secrecy and confidentiality. (c) That the funds would be transferred to an account where you have absolute control over. (d) That one of our representatives will be with you in your country to represent our interest. This however depends on your response to conditions A and C above. Modalities have been worked out to the highest level for the immediate transfer of the funds within 14 working days subject to your satisfaction of the above stated terms. Our assurance is that your role is RISK FREE. To accord this ransaction the legality it deserves and for mutual security of the funds, the whole approval procedures will be officially and legally processed with your name or the name of any company you may nominates as the bonafide beneficiary. Once more, I want you to understand that having put over 23 years in the civil service of my country, I am averse to having my image and career dented. This matter should be treated with utmost secrecy and urgency. Kindly expedite action as we are behind schedule to enable us include this transfer in this batch as payments to foreign contractors is usually carried out on quarterly basis. regards DR.FEST WILLIAM.
Real-world steganography
I recently came across a real-world use of steganography which hides extra data in the LSB of CD audio tracks to allow (according to the vendor) the equivalent of 20-bit samples instead of 16-bit and assorted other features. According to the vendors, HDCD has been used in the recording of more than 5,000 CD titles, which include more than 250 Billboard Top 200 recordings and more than 175 GRAMMY nominations, so it's already fairly widely deployed. From http://www.hdcd.com/partners/proaudio/overview.html: [...] Hidden Code Addition/Output Dither/Quantization The final step in the reduction to 16 bits is to add high-frequency weighted dither and round the signal to 16-bit precision. The dither increases in amplitude in the frequency range of 16 to 22.05 kHz, leaving the noise floor flat below 16 kHz where the critical bands of hearing associated with tonality occur. As part of the final quantization, a pseudo-random noise hidden code is inserted as needed into the least significant bit (LSB) of the audio data. The hidden code carries the decimation filter selection and Peak Extend and Low Level Range Extend parameters. Inserted only 2?5 percent of the time, the hidden code is completely inaudible-effectively producing full 16-bit undecoded playback resolution. The result is an industry-standard 44.1-kHz, 16-bit recording compatible with all CD replication equipment and consumer CD players. [...] The paper describing the process is available under the somewhat misleading name http://www.hdcd.com/partners/proaudio/AES_Paper.pdf. The description of the stego en/decoding process is on p.15 (it's a rather long excerpt, but it's interesting stuff): As part of the final quantization, a hidden code side channel is inserted into the LSB when it is necessary for the encoder to inform the decoder of any change in the encoding algorithm. It takes the form of a pseudo-random noise encoded bit stream which occupies the least significant bit temporarily, leaving the full 16 bits for the program material most of the time. Normally, the LSB is used for the command function less than five percent of the time, typically only one to two percent for most music. Because the hidden code is present for a small fraction of the time and because it is used as dither for the remaining 15 bits when it is inserted, it is inaudible. This was confirmed experimentally with insertion at several times the normal fraction of time. [...] The mechanism which allows insertion of commands only when needed consists of encapsulating the command word and parameter data in a packet. A synchronizing pattern is prepended to the data and a checksum is appended. The resulting packet is then scrambled using a feedback shift register with a maximal length sequence and inserted serially, one bit per sample, into the LSB of the audio data. The decoder sends the LSB's of the audio data to a complementary shift register to unscramble the command data. A pattern matching circuit looks for the synchronizing pattern in the output of the descrambler, and when it finds it, it attempts to recover a command. If the command has a legal format and the checksum matches, it is registered as a valid packet for that channel. The arrival of a valid packet for a channel resets a code detect timer for that channel. If both channels have active timers, then code is deemed to be present and the filter select data is considered valid immediately. However, any command data which would effect the level of the signal must match between the two channels in order to take effect. The primary reason for this is to handle the case where an error on one channel destroys the code. In such a case, the decoder will mistrack for a short time until the next command comes along, which is much less audible than a change in gain on only one channel, causing a shift in balance and lateral image movement. If either of the code detect timers times out, then code is deemed not to be present, and all commands are canceled, returning the decode system to its default state. If the conditions on the encoder side are not changing, then command packets are inserted on a regular basis to keep the code detect timers in the decoder active and to update the decoder if one starts playing a selection in the middle of a continuous recording. Since the decoder is constantly scanning the output of the de-scrambler shift register for valid command packets even when none are present, the possibility exists that there may be a false trigger. For audio generated by the encoder, this possibility is eliminated in the absence of storage and transmission errors by having the encoder scan the LSB of the audio data looking for a match. If a match to the synchronizing pattern is found, the encoder inverts one LSB to destroy it. Modern digital storage and transmission media incorporate fairly sophisticated error detection and correction systems. Therefore, we felt that only moderate precautions were necessary in
Re: What email encryption is actually in use?
James A. Donald [EMAIL PROTECTED] writes: To the extent that real people are using digitally signed and or encrypted messages for real purposes, what is the dominant technology, or is use so sporadic that no network effect is functioning, so nothing can be said to be dominant? For encryption, STARTTLS, which protects more mail than all other email encryption technology combined. See http://www.cs.auckland.ac.nz/~pgut001/pubs/usenix02_slides.pdf (towards the back). For signing, nothing. The S/MIME list debated having posts to the list signed, and decided against it: If I know you, I can recognise a message from you whether it's signed or not. If I don't know you, whether it's signed or not is irrelevant. That leaves a few highly specialised applications which don't really qualify as use by real people (e.g. pgpmoose, EDI, etc etc, where any random proprietary format is fine, since it's decided by mutual agreement of both parties). Peter.
(.)
ÄúÒ»¶¨Ìý˵¹ýÏÄÐÂÒ»»úË«¿¨(Ò»¸öÊÖ»ú,Á½¸ö²»Í¬µÄÊÖ»úºÅÂë),ÕâÖÖÒ»»úË«¿¨Ôø¾·çÃÒÖйú, ÒòΪÕâÖÖ¿¨ºÜ·½±ã,µ«ÊÇÓÉÓÚ¼Û¸ñ¹ý¸ß,ºÜ¶àÈËÖ»ÄÜÍû³¾Äª¼°,ÏÖÔÚÀ´ÖĄ́ÍåµÄÒ»»ú12¿¨ (Ò»¸öÊÖ»ú,Ê®¶þ¸ö²»Í¬µÄÊÖ»úºÅÂë),ÈúܶàÈËÔ¸ÍûµÃÒÔʵÏÖ¡£Ö»ÐèÒ»ÕÅССµÄÊÖ»ú¿¨, ÔÙ²»ÓÃ×°¶à¸öÊÖ»úÁË¡£ÕâÕÅÊÖ»ú¿¨ÓÐͿд¹¦ÄÜ£¬¿ÉÒÔÌîд²»Í¬µÄºÅÂë½øÈ¥£¬ ÈÃÄãÒ»¿¨ÔÚÊÖÒ»ÉíÇáËÉ¡£³ÏÕ÷È«¹ú´úÀíÉÌ.¾ÏúÉÌ. Ö÷Òª¹¦ÄÜ£º ¡òMagic SIM ÊÖ»ú¿¨¿É½«²»Í¬¹ú¼Ò»òϵͳµÄ12ÕźÅÂ뱸·ÝÖÁͬһÕÅMagic SIM¿¨ÉÏ£¬²¢±£Áô¾É¿¨¡£ ¡òMagic SIM ÊÖ»ú¿¨³¬´óµç»°²¾ÈÝÁ¿£¬Ò»´Î¿É±à¼250±ÊÖ®¸öÈË×ÊÁÏ¡£ ¡òMagic SIM ÊÖ»ú¿¨Çл»ºÅÂëʱÎÞÐ뿪¹Ø»ú£¬¿ÉÓڲ˵¥ÄÚµÄSTKÑ¡µ¥Ö±½ÓÇл»ºÅÂë (ÉÙ²¿·Ýδ·ûºÏ¹ú¼ÊSTKÊÖ»úÐ迪¹Ø»ú) ¡£ ¡òMagic SIM ÊÖ»ú¿¨Ò»¿¨12ºÅÂëΪ¿ÉÖظ´Ä¨Ð´£¬Öظ´¿½±¸²»Í¬ÏµÍ³ºÅÂëÖ®SIM¿¨¡£ ¡òMagic SIM ÊÖ»ú¿¨ËùÓп¨Æ¬Ò»´Î´ø×Å×ߣ¬²»Óõ£ÐÄ¿¨Æ¬ÒÅʧ¡¢×ÊÁϲ»¼û£¬»òÕß¿¨Æ¬¡º²»Îȶ¨¡»¡¢¡ºµ±»ú¡»¡¢¡º¼ÓºñµÄµç³Ø¡»¼°¡º¼Óºñ±³¸Ç¡»ÒÔ·Áº¦ÊÖ»úÖ®ÃÀ¹Û¡£ ¡òMagic SIM ÊÖ»ú¿¨Ê¹ÓÃ×îпƼ¼µÄµ¥Ð¾Æ¬SIM¿¨ÏµÍ³¼Ü¹¹£¬Ð¾Æ¬ÏµÍ³²ÉÓúϸñµÄGSM Phase II plus STK±ê×¼°æ±¾£¬¾ß±¸ÏµÍ³½»Ò×±£»¤µÈ°²È«Ä£Ê½(transaction protection)£¬¹¦ÄÜÓëÆ·Öʶ¼·Ç³£Óб£ÕÏ¡£ ¡òMagic SIM ÊÖ»ú¿¨ËùÓÐɨÃ鱸·Ý×ÊÁÏ£¬¾ùÒÔ·ûºÏÃÀ¹ú¹ú·À²¿°²È«±ê×¼DESÃÜÂë³ÌÐò½øÐмÓÃÜÓ밲ȫÈÏÖ¤£¬Ê¹ÓÃÕßÎÞÐëµ£ÐÄ×ÊÁϱ»ÇÔÈ¡»òµÁÓ㬰²È«Óб£ÕÏ¡£ ±¾²úÆ·¸½ÔùÈí¼þ¹âµú£¬ÄÚº¬ÖС¢Ó¢¡¢¼òÌåϵͳÈí¼þ¼°ÆäʹÓÃÊֲᣬʹÓÃÕß¿ÉÇáÒ×°´ÕÕÊÖ²áµÄÒýµ¼£¬µ¼ÖÂ×ÔÐа²×°²Ù×÷Èí¼þ¼°ÉÕ¼Ãźţ¬²¢ÇÒºÜÇáÒ×µØÔÚÊÖ»úÉÏËæÒâת»»ÄúËùҪʹÓõĺÅÂ룬´Ó´ËÄú½«±ÜÃâ»»¿¨µÄÂé·³£¬²¢Ê¡Ï¾޶îÔ½Ñó»ò¿çÇøÂþÓε绰·ÑÓᣠ±¾²úÆ·ÖÐÿһ×é¾ùÄÚ¸½Ò»ÕÅ¿ÉÖظ´Ä¨Ð´Ö® 1 ¿¨ 12 ÃÅºÅ¿Õ°×µÄ SIM ¿¨£¬Ò»´Î¹ºÂò¼´¿ÉÖÕÉíʹÓᣠ´ó½´úÀíÉÌ: ÐÅÏä: [EMAIL PROTECTED] ̨Í峧ÉÌ :ÐÅÏä [EMAIL PROTECTED] http://coolsite.to/magicsim ³ÏÕ÷È«¹ú´úÀíÉÌ.¾ÏúÉÌ (886) 2 2707-7897 Õ²r Èç¹û¸øÄú´øÀ´²»±ã, Çë·¢Ðŵ½ [EMAIL PROTECTED] ÎÒÃDZíʾµÀǸ
Re: smartcards
Quoting Trei, Peter ([EMAIL PROTECTED]): The phone SW world is nowhere near as closed as you think. * Thousands of developers are writing Java applets for Japanese iMode phones. * Hundreds are developing applets for the Blackberry 5810 and 5820 phones (free Java-based IDS from RIM). * Similarly, the high end Pocket PC and Palm phones both have free or inexpensive development environments (C/C++) * Finally, Qualcomm phones support BREW (free SDK, expensive training). I stand corrected. I'm even reading a short bit about Nokia's new 3g phone: http://www.theregister.co.uk/content/54/27310.html The device, known as the Nokia 6650, is also notable for allowing users to record up to 20 seconds of video (128x96 pixels) with sound using a built in VGA camera employing 4096 colours, the first Nokia phone to offer the facility Other features include a multimedia messaging service (MMS) client, a WAP 1.2.1-compatible browser, integrated Bluetooth, a wallet application for mobile transactions, and a Java 2 Micro Edition (J2ME) virtual machine based on the mobile information device profile (MIDP). Includes infrared and USB as well. Not much quickly available describing the wallet app, but it probably isn't peer-to-peer. My take on the situation is that the platform vendors are so anxious to get developer mindshare, and new apps, that they are for the most part giving away the development environments and specs. IOW, a decent number of platforms are ready to go. Cool. Regards, Steve
Clarification of challenge to Joseph Ashwood:
-- James A. Donald: (ranting on the user hostility of PGP) Presumably the theory underlying this brilliant design decision was that in the bad old days, a [signed clear text file signed] under unix would not verify under windows because of trivial differences such as the fact the whitespace is expressed slightly differently. Here is a better fix, one that I implemented in Kong: Define several signature types with the default signature type ignoring those aspects of the message that are difficult for the user to notice, so that if a message looks pretty much the same to the user, it has the same signature, by, for example, canonicalizing whitespace and single line breaks, and treating the hard space (0xA0) the same as the soft space. (0x20), and so on and so forth. Joseph Ashwood: So it's going to be broken by design. These are critical errors that will eliminate any semblance of security in your program. James A. Donald: I challenge you to fool my canonicalization algorithm by modifying a message to as to change the apparent meaning while preserving the signature, or by producing a message that verifies as signed by me, while in fact a meaningfully different message to any that was genuinely signed by me. Let see you doing some work to back up your empty words. The source code for my canonicalization code is on the net. If you say it is broken, break it! To clarify, Kong works by checking a signature against the message, and against other messages in its database. Its job is not to identify the true James Donald, but to keep the different people claiming to be James Donald clearly separated. Thus Kong would be broken if such separation could be obfuscated or confused. Any program attempting to determine whether Bob is someone's true name is attempting to do something that computers cannot do, hence the intolerable certificate management problems of software that attempts to do that. Three quarters of the user hostility of other programs comes from their attempt to support true names, and the rest comes from the cleartext signature problem. Kong fixes both problems. Joseph Ashwood must produce a message that is meaningfully different from any of the numerous messages that I have sent to cypherpunks, but which verifies as sent by the same person who sent past messages. Thus for Kong to be broken one must store a past message from that proflic poster supposed called James Donald, in the Kong database, and bring up a new message hacked up by Joseph Ashwood, and have Kong display in the signature verification screen The signature in this document matches the signature on another document signed by James A. Donald. Do you wish to view this document. While Kong display a document meaningfully different from any that was posted by James A. Donald. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG gQcEhL/Zl68mNm0WaeG7zRK5M+/3qbaE0t84hURH 4st/8mhjCyBBCy1Ganf3ud6SNdzLZtUChQQbTA6SO
Be Your Own Boss
© Copyright 2002, All Rights Reserved. We are strongly against sending unsolicited emails to those who do not wish to receive our special mailings. You have opted in to one or more of our affiliate sites requesting to be notified of any special offers we may run from time to time. We also have attained the services of an independent 3rd party to overlook list management and removal services. This is NOT unsolicited email. If you do not wish to receive further mailings, please click this link . Please accept our apologies if you have been sent this email in error. We honor all removal requests. ed. If this message has come to you in error,please click REMOVE ME and your name will be removed from all future mailings.__ 13
check this out (Rf8)
GUARANTEED 100% FREE PASSWORDS GET INTO PAYSITES FOR FREE Click Here to Enter! Did you know t
Re: Real-world steganography
Peter Gutmann wrote: I recently came across a real-world use of steganography which hides extra data in the LSB of CD audio tracks to allow (according to the vendor) the equivalent of 20-bit samples instead of 16-bit and assorted other features. I don't think that's really 'steganography' per se, since no attempt is made to hide the fact that the information is in there. The quasi-stego used is just to prevent bad audio artifacts from happening. -Bram Cohen Markets can remain irrational longer than you can remain solvent -- John Maynard Keynes
low prices - save up to 80% 50-2
BUY DIRECT From MANUFACTURER SAVE 20% instantly on ALL INK JET CARTRIDGES ENTER HERE Use october2002 Coupon Code for all Orders during September and October 2002 and SAVE 10%. SAVE another 10% When you purchase 2 or more of the same Inkjet Cartridge Huge SAVINGS of up to 80% ENTER OUR STORE CLICK HERE All our products are 100% satisfaction guaranteed. All orders are sent via UPS with online tracking. We fully protect your privacy and security. We're dedicated to your satisfaction. This E-mailing has been sent to you as a person interested in the information enclosed. If this reached you by error, or you do not wish to receive this information or type of information in the future, please click on the word REMOVE and you will be taken off our list immediately and NEVER receive any emails from us. 1619DJPT3-214JwyR5480OZRs2-292GrRT3l33
xsex mleh
HUGE COCKS STUFFED IN TIGHT PINK PUSSIES NASTY LITTLE JUST TURNED LEGAL TEENS TAKING TOO MUCH, HUGE COCKS, ANAL POUNDINGS, & MUCH MORE! YOUNG AND FRESH -> JUST A CLICK AWAY! GET THEM NOW! CLICK HERE FOR THE NASTY GIRLS OF YOUR DREAMS! VERY GRAPHIC HARDCORE MATERIAL - MATURE AUDIENCE ONLY! You MUST be at least 18 years old to enter! This email was sent to you because your email address is part of an opt-in list. If you received this email in error, please accept our apologies. If you do not wish to receive further offers, please click below and enter your email to remove your email from future offers. Click Here to Remove Remove Further transmissions to you by the sender may be stopped at NO COST to you! TBB, Ent 6735 Amboy Rd. Suite # A-3089 NYC NY 10309 718 966 3089 -List Code - XP mstr- If the above link does not work, please send a blank email to: [EMAIL PROTECTED] nmjhnnxgxjnlsdt
Austin Cpunks - Oct. 10 Physical Meeting
Time:Oct. 10, 2002 Second Tuesday of each month 7:00 - 9:00 pm (or later) Location:Central Market HEB Cafe 38th and N. Lamar Weather permitting we meet in the un-covered tables. If it's inclimate but not overly cold we meet in the outside covered section. Otherwise look for us inside the building proper. Identification: Look for the group with the Applied Cryptography book. It will have a red cover and is about 2 in. thick. Contact Info:http://einstein.ssz.com/cdr/index.html#austincpunks -- We don't see things as they are, [EMAIL PROTECTED] we see them as we are. www.ssz.com [EMAIL PROTECTED] Anais Nin www.open-forge.org
Re: Random Privacy
This is an old statistical technique. You need to know ahead of time which answer is more likely and have a bias in your randomizer. A classic example: Did you cheat on your wife last year? If you were born between January and September reverse your answer. -- Julian Assange|If you want to build a ship, don't drum up people |together to collect wood or assign them tasks and [EMAIL PROTECTED] |work, but rather teach them to long for the endless [EMAIL PROTECTED] |immensity of the sea. -- Antoine de Saint Exupery
RE: smartcards
Steve Thompson[SMTP:[EMAIL PROTECTED]] wrote: I'm surprised that nobody has mentioned cell-phones as a digital cash platform. Perhaps this belabours the obvious, but I'll spell it out anyways: o They are ubiquitous. o Most of them have an IR port and many contain enough storage and horsepower to keep and play small MP3 collections. Chaumian digital cash code should fit easily. Hell, some companies are already making noises about full-motion video. How long before the damn things have a digital camera built in? o Peer-to-peer transactions will obviously work via IR. Central clearing mechanisms will work through the phone net. Thus they embody the basic infrastructure for both worlds. The entire thing could be done over SMS, of course, but IR for peer-to-peer, day-to-day transactions is best from a privacy and usability standpoint. o PC-based software is in use for the synchronisation of calendar data, etc. Many people are already familiar with using their phones for these kinds of purposes so what's one more application to the user? The problem is that phone software is (to my knowledge) all closed-source and running on proprietary hardware. What's the liklihood of manufacturers opening up their phones for third-party code? A Java VM might do it, as might something lean like an Inferno VM. More informed list members could probably suggest other virtual machines which would suit our purposes. [...] Regards, Steve The phone SW world is nowhere near as closed as you think. * Thousands of developers are writing Java applets for Japanese iMode phones. * Hundreds are developing applets for the Blackberry 5810 and 5820 phones (free Java-based IDS from RIM). * Similarly, the high end Pocket PC and Palm phones both have free or inexpensive development environments (C/C++) * Finally, Qualcomm phones support BREW (free SDK, expensive training). My take on the situation is that the platform vendors are so anxious to get developer mindshare, and new apps, that they are for the most part giving away the development environments and specs. Peter Trei
Re: smartcards
-- On 30 Jan 2050 at 32:210, Steve Thompson wrote: I'm surprised that nobody has mentioned cell-phones as a digital cash platform.[] The problem is that phone software is (to my knowledge) all closed-source and running on proprietary hardware. What's the liklihood of manufacturers opening up their phones for third-party code? An open platform would be a combined cell phone and palm top computer. Lots of people are trying to move this -- so far without wide acceptance. Paypal's original vision was that people would use palm pilots with IR. If phones developed palm pilot capabilities, this vision would become more useful. I think combining the palm pilot with the cell phone is more feasible once we develop a good voice controlled computer, after the fashion of startrek, which may be some time off. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG z0mctqiLain3vlXnFZTOy5PEVJIwCeg0x7zxl4RQ 4DWhd8THkIxyeHtI7sSA5O1d9IKi7WwGZVh6roOOb
What email encryption is actually in use?
-- What email encryption is actually in use? When I get a PGP encrypted message, I usually cannot read it -- it is sent to my dud key or something somehow goes wrong. When I send a PGP encrypted message in reply, stating the problem, I seldom receive an answer, suggesting that the recipient cannot decrypt my message either. Kong encrypted messages usually work, because there is only one version of the program, and key management is damn near non existent by design, since my experience as key manager for various companies shows that in practice keys just do not get managed. After I release the next upgrade, doubtless fewer messages will work. The most widely deployed encryption is of course that which is in outlook -- which we now know to be broken, since impersonation is trivial, making it fortunate that seemingly no one uses it. Repeating the question, so that it does not get lost in the rant. To the extent that real people are using digitally signed and or encrypted messages for real purposes, what is the dominant technology, or is use so sporadic that no network effect is functioning, so nothing can be said to be dominant? The chief barrier to use of outlook's email encryption, aside from the fact that is broken, is the intolerable cost and inconvenience of certificate management. We have tools to construct any certificates we damn well please, though the root signatures will not be recognized unless the user chooses to put them in. Is it practical for a particular group, for example a corporation or a conspiracy, to whip up its own damned root certificate, without buggering around with verisign? (Of course fixing Microsoft's design errors is never useful, since they will rebreak their products in new ways that are more ingenious and harder to fix.) I intended to sign this using Network Associates command line pgp, only to discover that pgp -sa file produced unintellible gibberish, that could only be made sense of by pgp, so that no one would be able to read it without first checking my signature. I suggest that network associates should have hired me as UI design manager, or failing, that, hired the dog from down the street as UI design manager. Presumably the theory underlying this brilliant design decision was that in the bad old days, a file produced under unix woudl not verify under windows because of trivial differences such as the fact the whitespace is expressed slightly differently. Here is a better fix, one that I implemented in Kong: Define several signature types with the default signature type ignoring those aspects of the message that are difficult for the user to notice, so that if a message looks pretty much the same to the user, it has the same signature, by, for example, canonicalizing whitespace and single line breaks, and treating the hard space (0xA0) the same as the soft space. (0x20), and so on and so forth. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG OmUO5eB/pLnuFIgCU2splCvKO4x0U1Ik31pVFPaU 49B5UrVKc5ETzoxGcfl+q9ltoh61l4ncSyE+R5h6P
Re: smartcards
Quoting James A. Donald ([EMAIL PROTECTED]): -- James A. Donald: When Chaumian money comes into wide use, I think that for most end users we will have to stash all unused tokens inside smartcards. Someone: Here in Hong Kong, contactless Octopus smartcards (based on the Sony FeliCa device) are well established for paying fares on buses, ferries and subways, and also for small transactions with vending machines, convenience stores and supermarkets. Critical mass is no problem if a payment mechanism is backed by the big boys, but the big boys want a mechanism for transferring value where only a few giant corporations who are in bed with the state receive transaction payments, a system that divides the economy into a tiny number of actors, the big corporations, who alone take action, plan and produce, and huge number of passive consumer zombies. We would like a system which treats those making and receiving payments as peers, which makes critical mass a considerably more difficult problem. I'm surprised that nobody has mentioned cell-phones as a digital cash platform. Perhaps this belabours the obvious, but I'll spell it out anyways: o They are ubiquitous. o Most of them have an IR port and many contain enough storage and horsepower to keep and play small MP3 collections. Chaumian digital cash code should fit easily. Hell, some companies are already making noises about full-motion video. How long before the damn things have a digital camera built in? o Peer-to-peer transactions will obviously work via IR. Central clearing mechanisms will work through the phone net. Thus they embody the basic infrastructure for both worlds. The entire thing could be done over SMS, of course, but IR for peer-to-peer, day-to-day transactions is best from a privacy and usability standpoint. o PC-based software is in use for the synchronisation of calendar data, etc. Many people are already familiar with using their phones for these kinds of purposes so what's one more application to the user? The problem is that phone software is (to my knowledge) all closed-source and running on proprietary hardware. What's the liklihood of manufacturers opening up their phones for third-party code? A Java VM might do it, as might something lean like an Inferno VM. More informed list members could probably suggest other virtual machines which would suit our purposes. This would, of course, bring about Black Net rather quickly. I confess that I'm not all that enamoured with the idea, personally, but something like it is already possible with various creative accounting practices so the only real objection can be made by those few who require centralised clearing to preserve their empires. Such intersts will lobby hard to make sure that the only option we have is to route our payments through their systems (without regard to platform). Nonetheless, I'd say that leveraging the cellular phone network and hand-held phones for digital cash systems cover both the usability issues and the critical mass problems thouroughly. All we need to know is who we have to convince in order to get an open, standardised environment and API with math, communications, and crypto libraries for our phones. (Actually, it would be really neat to have cell phones wide-open to user supplied code, but that is probably asking too much.) Regards, Steve
Re: Anyone can get a clearance these days...
At 09:38 AM 09/27/2002 -0400, Adam Shostack wrote: The US Government has mistakenly given secret documents to the only man charged so far in connection with the 11 September attacks, Zacarias Moussaoui. http://news.bbc.co.uk/2/hi/americas/2284325.stm That wasn't because they gave him a security clearance - that was because, as the defendant in a trial, he has the legal right to see the evidence against him, and some of that evidence is classified. Apparently they have some sort of deal where he's not allowed to see the evidence himself, but his court-appointed lawyers are, which is still Constitutionally bogus, but they'd slipped up in the implementation.
Re: What email encryption is actually in use?
On Mon, Sep 30, 2002 at 12:53:36PM -0700, Joseph Ashwood wrote: - Original Message - From: James A. Donald [EMAIL PROTECTED] The chief barrier to use of outlook's email encryption, aside from the fact that is broken, is the intolerable cost and inconvenience of certificate management. Actually the chief barrier is psychological, people don't feel they should side with the criminals by using encryption. Certificate management is Um. No. Most people do no assocaite encryption with criminals. There are 4 reasons people don't use encryption in email: 0) Encryption, that's that SLS thingy, right? (Ignorance, stupidity) 1) Why bother? I am not a *target*. (apathy) 2) It's too much hassle. (BAD tools) 3) 95% of the people *I* send email to wouldn't know what to do with a message in S/MIME, much less PGP. (AKA the Fax Effect). -- Johnny had four truckloads of plutonium. Johnny used four| Quit smoking: truckloads of plutonium to light New York City for a year. | 161d, 11h ago Then how many truckloads of plutonium did Johnny have? Six! | petro@ -- Breeder reactor ad from the glory days of nuclear power | bounty.org
Re: What email encryption is actually in use?
- Original Message - From: James A. Donald [EMAIL PROTECTED] What email encryption is actually in use? In my experience PGP is the most used. When I get a PGP encrypted message, I usually cannot read it -- it is sent to my dud key or something somehow goes wrong. Then you are obviously using PGP wrong. When you choose your 768-bit key in 1996 (I checked the key servers) you should have considered the actual lifetime that the key was going to have. In 1996 a 768-bit key was considered borderline secure, and it was just about time to retire them. Instead of looking at this and setting an expiration date on your key, you instead choose to make it live forever. Your other alternative would have been to revoke that key before you retired it. You made critical mistakes, and you blame it on PGP. As to it's dependability. I've seen two problems when someone could not decrypt the PGP message; 1) They shouldn't have access to it (someone elses key, forgot passphrase, etc), 2) They didn't have any clue how to use PGP, these people generally have trouble turning on their computer. On rare occassions there will be issues with versions, but in my experience these are exceptionally rare. Kong encrypted messages usually work, because there is only one version of the program, and key management is damn near non existent by design, since my experience as key manager for various companies shows that in practice keys just do not get managed. After I release the next upgrade, doubtless fewer messages will work. Maybe you should have considered designing the system so that it could be upgraded. A properly designed system can detect when an incompatible version was used for encryption, and can inform the user of the problem. Additionally I think there is one core reason why Kong decryptions always work, no one uses it, without key management it is basically worthless. Fortunately because there is no userbase you can change it dramatically for the next release, maybe this time it'll be worth using. The most widely deployed encryption is of course that which is in outlook -- which we now know to be broken, since impersonation is trivial, making it fortunate that seemingly no one uses it. If you did some research, you'd find that it is called S/MIME, it is a standard, a broken standard, but a standard (admittedly Outlook implemented it poorly and that is a major source of the breakage). The only non-standard encryption outlook uses is in the file storage, which has nothing to do with email. Repeating the question, so that it does not get lost in the rant. To the extent that real people are using digitally signed and or encrypted messages for real purposes, what is the dominant technology, or is use so sporadic that no network effect is functioning, so nothing can be said to be dominant? The two big players are PGP and S/MIME. The chief barrier to use of outlook's email encryption, aside from the fact that is broken, is the intolerable cost and inconvenience of certificate management. Actually the chief barrier is psychological, people don't feel they should side with the criminals by using encryption. Certificate management is actually quite easy and cheap. It is the mistakes of people who lack any understanding of how the system actually works that make it expensive and inconvenient. The same applies to PGP. We have tools to construct any certificates we damn well please, The same applies everywhere, in fact in your beloved Kong, the situation is worse because the identities can't be managed. though the root signatures will not be recognized unless the user chooses to put them in. That's right, blame your own inadequacies on everyone else, that seems to be the standard American way now. Is it practical for a particular group, for example a corporation or a conspiracy, to whip up its own damned root certificate, without buggering around with verisign? Of course it is, in fact there are about 140 root certificates that Internet Explorer recognises, the majority of these have absolutely nothing to do with Verisign. Getting it into the systems is a big more problematic. (Of course fixing Microsoft's design errors is never useful, since they will rebreak their products in new ways that are more ingenious and harder to fix.) And this has nothing whatsoever to do with root certificates. I intended to sign this using Network Associates command line pgp, only to discover that pgp -sa file produced unintellible gibberish, that could only be made sense of by pgp, so that no one would be able to read it without first checking my signature. Which would of course demonstrate once more that you have no clue how to use PGP. It also demonstrates what is probably your primary source of I can't decrypt it you are using a rather old version of PGP. While the rest of the world has updated PGP to try to remain secure, you have managed to forgo all semblance of security, in favor of
Re: What email encryption is actually in use?
What email encryption is actually in use? PGP 2.6.*, 6.* 7.* work like a charm across macs windoze unices provided that one specs RSA-legacy keys and limit algo to IDEA. In other words, be 2.6.2 compatible. If you need encryption, that is. If you don't need encryption (like in They Will Not Come After You If They Read Your E-mail) then feel free to bitch about interfaces and inconveniances. If you're just bored and like to speculate and fix unbroken stuff, I suggest one time pads distributed via $40 64 MByte USB flash drives - everything fits there, including your mail client, your OTP interface and enough key material to last lifetime for things you can type. In other words, those that need crypto are taken care of, and in order to gain resources to make sheeple use crypto you have to become Them, in which case you don't really want sheeple to use crypto in the first place. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: New DSL Internet Access from SBC Yahoo! http://sbc.yahoo.com
What email encryption is actually in use?
-- James A. Donald: We have tools to construct any certificates we damn well please, Joseph Ashwood: The same applies everywhere, in fact in your beloved Kong, the situation is worse because the identities can't be managed. You are unfamiliar with Kong. The situation is better, because it is designed to be used in the fashion that all other existing alternatives actually are used in practice. James A. Donald: I intended to sign this using Network Associates command line pgp, only to discover that pgp -sa file produced unintellible gibberish, that could only be made sense of by pgp, so that no one would be able to read it without first checking my signature. Joseph Ashwood: Which would of course demonstrate once more that you have no clue how to use PGP. It also demonstrates what is probably your primary source of I can't decrypt it you are using a rather old version of PGP. In fact my version is network associates version 6.5.8, which can supposedly decrypt any valid pgp message, and your rant would be considerably more impressive if you signed your message with a PGP signature. Doubtless you could sign it -- eventually, after a bit of trying, after you had spent about as much time farting around as I did. The proclamation that PGP is usable would have been much more impressive in a message that actually used it. James A. Donald: Here is a better fix, one that I implemented in Kong: Define several signature types with the default signature type ignoring those aspects of the message that are difficult for the user to notice, so that if a message looks pretty much the same to the user, it has the same signature, by, for example, canonicalizing whitespace and single line breaks, and treating the hard space (0xA0) the same as the soft space. (0x20), and so on and so forth. Joseph Ashwood: So it's going to be broken by design. These are critical errors that will eliminate any semblance of security in your program. You are full of shit. I challenge you to fool my canonicalization algorithm by modifying a message to as to change the apparent meaning while preserving the signature, or by producing a message that verifies as signed by me, while in fact a meaningfully different message to any that was genuinely signed by me. Let see you doing some work to back up your empty words. The source code for my canonicalization code is on the the net. If you say it is broken, break it! --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG nfNdl11zVV+oWKMTt0l79zrcrelHalABSBwKeib2 4Ts9fALHrytq8hR6Dhue492m/1vO+fYHy4Kqa6dkQ