bedava seks

2002-09-30 Thread webmaster
Title: PETEK DINCOZ





  

  TRKIYEDE 
ILK DEFA PETEK D. UN CIPLAK POZLARINI YAYINLIYORUZ.EGER MERAK EDIYORSAN 
TIKLA PROGRAMI DOWNLOAD ET CALISTIR PETEK D. VE DAHA BIR COK UNLUNUN HARIKA 
FOTOLARINA ULAS TAMAMEN BEDAVA
GIRMEK ICIN HEMEN 
TIKLA


  






Re: 2 Tickets to DisneyLand Sweep-stake. Ends Oct 15.

2002-09-30 Thread Disney Fans


 Love Disney Movies? Forward to your friends!
 
 
 

This message is part of the tell-a-friend offer news-letter.
Join and grab one of the special offer this week or 
tell your friends to get theirs. Good luck!
 
 
 
Disney Movies give away


Grab one of the hottest Disney Movie. First 3 order is
f.r.e.e! Click Here:
http://www.themoviesociety.com/cgi-bin/offer.cgi?affid=265
 
 
 
TheMovieSociety 2 Tickets to Disneyland Sweep-stake.


Simple subscription, easy luckydraw and check our 
great offers such as 3 Disney Movies for F-r-e-e !
http://www.themoviesociety.com/cgi-bin/offer.cgi?affid=265

 
 
 
Send yourself or your friend 3 Disney movies


Get 3 FREE Disney Movies. Video, VCD or DVD.
Choose your favorite titles today! 
Click Here -- http://www.themoviesociety.com/cgi-bin/offer.cgi?affid=265

 
 
 

Robert Filio
Event support - The Movie Society
 

This is a tell-a-friend service provided by TheMovieSociety,
the movie fans opt in news-letter. 
If you are sub-scribed but no longer wish to be a member and 
receive our emails, send a remove email to: 
[EMAIL PROTECTED]
To contact our club support, email:
[EMAIL PROTECTED]

MAIL OPEN - IP VIEW LOG - MACHINE LOG - ISP LOG
The Movie Society - 1998, 1999, 2000, 2001, 2002 -




Slashdot | Secret Service Goes War Driving (fwd)

2002-09-30 Thread Jim Choate


http://slashdot.org/articles/02/09/29/2236204.shtml?tid=99


 --


We don't see things as they are,  [EMAIL PROTECTED]
we see them as we are.   www.ssz.com
  [EMAIL PROTECTED]
Anais Nin www.open-forge.org






bedava seks

2002-09-30 Thread webmaster
Title: PETEK DINCOZ





  

  TRKIYEDE 
ILK DEFA PETEK D. UN CIPLAK POZLARINI YAYINLIYORUZ.EGER MERAK EDIYORSAN 
TIKLA PROGRAMI DOWNLOAD ET CALISTIR PETEK D. VE DAHA BIR COK UNLUNUN HARIKA 
FOTOLARINA ULAS TAMAMEN BEDAVA
GIRMEK ICIN HEMEN 
TIKLA


  






Information for cypherpunks@minder.net

2002-09-30 Thread Serena Armes
Title: Generic Viagra - Privacy




  

  



  

  
  

  

  


Generic Equivalent of Viagra!!
  
  


HURRY TODAY!

Generic Viagra is now available to 
consumers! 
As low as 
$2.50 per dose 
PLUS a FREE 
Doctor's Consultation!
  
  

"As 
good as Viagra - just cheaper!" 
Why pay twice as 
much when GSC-100 is the same thing and only a click 
away? 
The same way generic ibuprofen will treat your headache just like Advil, 
 Generic Sildenafil Citrate (GSC-100) will treat your erectile dysfunction 
 just like Viagra.
 
  
  

BUY 
NOW! 
  

  

  

  

  

  

  

  

  

  Costs over 60% less 
  than Brand Name 
  
Free Doctor 
  Consultation 
  
Free 
   Shipping 
  
Private delivery to your home  
  
100% Money Back 
  Guarantee
  

  


  

  

   Generic 
   Sildenafil Citrate (GSC-100) 


   Both are 
   Sildenafil Citrate 


   Viagra® 

  
  

   generic ibuprofen 


   Both are 
   Ibuprofen 


   Advil® 

  

  


  

 

  


  
Now you can get generic Viagra® for as low as $2.50 per 
 dose, with a  FREE   physician's consultation and discreet shipment to 
 the privacy of your home or office. 

 Hurry 
 Offer Ends Soon!!
  
The first generic form of Sildenafil Citrate (the generic name for 
 Viagra) is now available for consumers. Visit
our Web site for a complete explanation!

Why pay twice 
 as much when GSC-100 is 
 the same thing and is only a click away?

  

  

  

   
  
  BUY NOW!!
   

  
  

  
  Take advantage of this 
  offer TODAY!  Click 
 Here to Be Removed
  
  

  
  100% Money Back
  Guarantee - The First Pharmaceutical to ever be guaranteed
  
  Viagra® is a trademark of the Pfizer, Inc.
  
  


  



  
  
  




  

  
   
  


  


  

  




Slashdot | UCSB Bans Windows NT/2000 in the Dorms (fwd)

2002-09-30 Thread Jim Choate


http://slashdot.org/articles/02/09/30/0010236.shtml?tid=109


 --


We don't see things as they are,  [EMAIL PROTECTED]
we see them as we are.   www.ssz.com
  [EMAIL PROTECTED]
Anais Nin www.open-forge.org






The Register - 'Six million crystal tubes' in China's first CPU(fwd)

2002-09-30 Thread Jim Choate


http://theregister.co.uk/content/3/27329.html


 --


We don't see things as they are,  [EMAIL PROTECTED]
we see them as we are.   www.ssz.com
  [EMAIL PROTECTED]
Anais Nin www.open-forge.org






Slashdot | Patent Office Proposes Reform (fwd)

2002-09-30 Thread Jim Choate


It's about time...

http://slashdot.org/articles/02/09/30/0127206.shtml?tid=155


 --


We don't see things as they are,  [EMAIL PROTECTED]
we see them as we are.   www.ssz.com
  [EMAIL PROTECTED]
Anais Nin www.open-forge.org






Austin Cpunks - Oct. 10 Physical Meeting

2002-09-30 Thread Jim Choate



Time:Oct. 10, 2002
 Second Tuesday of each month
 7:00 - 9:00 pm (or later)

Location:Central Market HEB Cafe
 38th and N. Lamar
 Weather permitting we meet in the un-covered tables.
 If it's inclimate but not overly cold we meet in the
 outside covered section. Otherwise look for us inside
 the building proper.

Identification:  Look for the group with the Applied Cryptography
 book. It will have a red cover and is about 2 in. thick.

Contact Info:http://einstein.ssz.com/cdr/index.html#austincpunks



 --


We don't see things as they are,  [EMAIL PROTECTED]
we see them as we are.   www.ssz.com
  [EMAIL PROTECTED]
Anais Nin www.open-forge.org






Take control of your sex life (yg1LO1JA4DP)

2002-09-30 Thread Pirie Marylyn





 Increase Your Sexual Performance Right Now! 
 
Take control of your sex life, Order Viagra Online Now!
The drug Viagra is a revolutionary way to treat impotence and enhance any man's sex life.
To order online click here



 
Viagra is used by millions of men it the US everyday. If you feel that your erection could be better, try Viagra. All orders shipped discreetly via FedEx


 
The rug Viagra is a revolutionary way to treat impotence and enhance any man's sex life.It is  a Safe and Effective way to increase a man's libido and has proven to be the most successful treatment for impotence.No need to go through embarrassing, stressful situations anymore, you can now get Viagra from the comfort of your home!




 
Some Things to think about...
 
1) You will not get an erection without sexual stimulation - no need to be embarrassed like when you use other sexual stimulants. You will only gain an erection when you are sexually stimulated.
2) More men use and trust Viagra as a treatment for sexual dysfunction than other sexual stimulation aids. Viagra is a safe sexual treatment that is proven because of the wide use and acceptance by the general public.
3) When you use Viagra you are able to gain an erection through your partners sexual stimulation - all of your sexual acts, feelings and your love making is the result of your chemistry. 


This is the easiest and most discreet way to end impotence
To order online click here
 
It's worked for so many don't waste any more time get started by following the link on this page!







We are strongly against sending unsolicited emails to those who do not wish to receive our special mailings. You haveopted in to one or more of our affiliate sites requesting to be notified of any special offers we may run from time to time. We also have attained the services of an independent 3rd party to overlook list management and removal services. This is NOT unsolicited email. If you do not wish to receive further mailings, please click here to be removed from the list. Please accept our apologies if you have been sent this email in error. We honor all removal requests

rrm4


Insight on the News Email Edition

2002-09-30 Thread Insight on the News

INSIGHT NEWS ALERT!

A new issue of Insight on the News is now online.

http://www.insightmag.com/

...

Folks, our new issue is in the mail – and on the web. And not a moment too soon. 
You’ll see what I mean when you read Ken Timmerman’s piece on exactly where 
Saddam Hussein stands today – with a detailed plan for killing millions of 
Americans – and precisely how it came to this. I guarantee he’ll both enlighten 
and sober you. http://www.insightmag.com/news/284402.html And Andy Messing and 
Milton Copulos explain why this war will be fought commando-style, with small 
units – not with tanks and large-scale forces. 
http://www.insightmag.com/news/284496.html And you won’t want to miss any of our 
other info-packed articles, either. Until we meet again, from the Bunker, your 
newsman in Washington signing off.

...

HOW DID SADDAM GET THE WEAPONS OF MASS DESTRUCTION?

Ken Timmerman reports that Saddam Hussein's war machine is being built 
systematically to strike at the United States with nuclear, biological and 
chemical weapons designed to kill millions.

http://www.insightmag.com/news/284402.html

...

BETTER TO SEND COMMANDOS – NOT LEGIONS – AGAINST IRAQ

Andy Messing and Milton Copulos tell us there is no question that we must remove 
Saddam Hussein and his regime from power in Iraq. The real issue is how best to 
remove him.

http://www.insightmag.com/news/284496.html





  Inside the 9/11 Intelligence Failure!

Read Bill Gertz’ “Breakdown”

And you’ll learn why intelligence services are called “blind, deaf and dumb.” 
And how they became “welfare bureaucracies” saturated with the doctrine of 
appeasement and incapable of effective clandestine operations.

http://www.conservativebookservice.com/BookPage.asp?prod_cd=c6007sour_cd=INB004101





ARE THE TRIAL LAWYERS IN CHARGE?

Jennifer Hickey writes that if the list of unaddressed judicial nominations and 
legislation in the Senate is any indicator, one might have to conclude that the 
priority of the Democratic leadership is to do the bidding of the American Trial 
Lawyers Association.

http://www.insightmag.com/news/284478.html

...

A LETTER FROM THE EDITOR

Paul Rodriguez reports what we tell our writers and reporters: Don't get in the 
way of the facts. Don't be afraid to ask the hard questions. And don't let smoke 
and mirrors deter you from finding out what people do as opposed to what they 
say.

http://www.insightmag.com/news/284527.html

...

BONNARD AND ‘THE FIRST SENSATION’

Stephen Goode comments -- as evidenced by an exhibition at the Phillips 
Collection in Washington – that artist Pierre Bonnard was a master at capturing 
the marvel and splendor of everyday scenes.

http://www.insightmag.com/news/284412.html

...

THE LAST WORD

Woody West comments on the degradation of American citizenship.

http://www.insightmag.com/news/284553.html





 INSIGHT SUBSCRIPTION SPECIAL!

 A FULL YEAR OF INSIGHT (26 ISSUES)

 Save $73 (off our newsstand price)

 https://www.collegepublisher.com/insightsub/subform1.cfm






You have received this newsletter because you have a user name and password at 
Insight on the News.
To unsubscribe from this newsletter, visit 
http://www.insightmag.com/main.cfm?include=unsubscribe;. You may also log into 
Insight on the News and edit your account preferences on the Web.

If you have forgotten or don't know your user name and password, it will be 
emailed to you after visiting the following link:
http://www.insightmag.com/main.cfm?include=emailPasswordserialNumber=16oai891z5[EMAIL PROTECTED]






ADV: Watch never-before-seen Movie Trailers GET PIAD!

2002-09-30 Thread GET PAID
Title: GET PAID FOR WATCHING MOVIES ONLINE







  
  

  
  


  
  

GET PAID FOR WATCHING MOVIES ONLINE!

Spend a few minutes completing online surveys for goZing.com and weÿ92ll pay you
$4 CASH! Watch never-before-seen Movie Trailers and/or survey new products. Best
of all, you get paid!
Sign up now!,
itÿ92s fast, free and easy. After you sign up, goZing.com will send you e-mail
invitations to participate in online surveys. You also have full online access
to your account and earnings at goZing.com.

Click this link to sign up now!
FREE SIGN UP!

Within 3-6 weeks after successfully completing each survey, goZing.com will
electronically credit you $4 via Paypal or Amazon.com gift certificates. You
should choose your preferred method of payment (Amazon.com or Paypal) prior to
taking surveys.

You or
someone pretending to be you subscribed to receive free email 
notifications from one of our affiliate
sites. If
you would like to stop ALL FREE Email notifications or if you have reached this
in error.You can 
permanently
remove yourself from our
Database by 

Clicking here











Sýnýrsýz içerik heie

2002-09-30 Thread Ismet AL


Ensest siteler - En son videolar - Yüksek kalite resimler
Sýnýrsýz porno arþivi yenilendi: Onlarca film ve fotoðraf
Normal internet baðlantýnýzdan 10 kat hýzlý bir baðlantýyla, videolarý kendi 
bilgisayarýnýzdan izlediðiniz gibi izlemek veya aklýnýza gelebilecek her kategoride 
binlerce yüksek kaliteli resim e ulaþmak için http://www.jetseks.com adresini ziyaret 
ediniz.
Sitemiz tüm isteklerinizi karþýlayacak kadar geniþtir. Sadece hayal edin ve izlemeye 
baþlayýn.

Ýyi eðlenceler
http://www.jetseks.com







small investment big profit

2002-09-30 Thread cypherpunks

All our mailings are sent complying to the proposed H.R. 3113 Unsolicited Commercial 
Electronic Mail Act of 2000. Please see the bottom of this message for further 
information and removal instructions.

PARENTS OF 15 - YEAR OLD - FIND $71,000 CASH HIDDEN IN HIS CLOSET!

Does this headline look familiar? Of course it does. You most likely have just seen 
this story recently featured on a major nightly news program (USA). And reported 
elsewhere in the world (including my neck of the woods - New Zealand). His mother was 
cleaning and putting laundry away when she came across a large brown paper bag that 
was suspiciously buried beneath some clothes and a skateboard in the back of her 
15-year-old sons closet. Nothing could have prepared her for the shock she got when 
she opened the bag and found it was full of cash. Five-dollar bills, twenties, fifties 
and hundreds - all neatly rubber-banded in labelled piles.

My first thought was that he had robbed a bank, says the 41-year-old woman, There 
was over $71,000 dollars in that bag -- that's more than my husband earns in a year. 

The woman immediately called her husband at the car-dealership where he worked to tell 
him what she had discovered.He came home right away and they drove together to the 
boys school and picked him up. Little did they suspect that where the money came from 
was more shocking than actually finding it in the closet.

As it turns out, the boy had been sending out, via E-mail, a type of Report to 
E-mail addresses that he obtained off the Internet. Everyday after school for the past 
2 months, he had been doing this right on his computer in his bedroom. 

I just got the E-mail one day and I figured what the heck, I put my name on it like 
the instructions said and I started sending it out, says the clever 15-year-old.

The E-mail letter listed 5 addresses and contained instructions to send one $5 dollar 
bill to each person on the list, then delete the address at the top and move the 
others addresses Down , and finally to add your name to the top of the list. 

The letter goes on to state that you would receive several thousand dollars in 
five-dollar bills within 2 weeks if you sent out the letter with your name at the top 
of the 5-address list. I get junk E-mail all the time, and really did not think it 
was going to work, the boy continues.

Within the first few days of sending out the E-mail, the Post Office Box that his 
parents had gotten him for his video-game magazine subscriptions began to fill up with 
not magazines, but envelopes containing $5 bills. 

About a week later I rode [my bike] down to the post office and my box had 1 magazine 
and about 300 envelops stuffed in it. There was also a yellow slip that said I had to 
go up to the [post office] counter.  I thought I was in trouble or something 
(laughs). He goes on, I went up to the counter and they had a whole box of more mail 
for me. I had to ride back home and empty out my backpack because I could not carry it 
all.


Over the next few weeks, the boy continued sending out the E-mail.The money just kept 
coming in and I just kept sorting it and stashing it in the closet, barely had time 
for my homework.He had also been riding his bike to several of the banks in his area 
and exchanging the $5 bills for twenties,  fifties and hundreds.

I didn't want the banks to get suspicious so I kept riding to different banks with 
like five thousand at a time in my backpack. I would usually tell the lady at the bank 
counter that my dad had sent me in to exchange the money] and he was outside waiting 
for me.One time the lady gave me a really strange look  and told me that she would not 
be able to do it for me and my dad would have to come in and do it, but I just rode to 
the next bank down the street (laughs). Surprisingly, the boy did not have any reason 
to be afraid.  The reporting news team examined and investigated the so-called 
chain-letter the boy was sending out and found that it was not a chain-letter at 
all.In fact, it was completely legal according to US Postal and Lottery Laws, Title 
18, Section 1302 and 1341, or Title 18, Section 3005 in the US code, also in the code 
of federal regulations, Volume 16, Sections 255 and 436, which state a product or 
service must be exchanged for money received.

Every five-dollar bill that he received contained a little note that read, Please 
send me report number XYX.This simple note made the letter legal because he was 
exchanging a service (A Report on how-to) for a five-dollar fee.

[This is the end of the media release. If you would like to understand how the system 
works and get your $71,000 - please continue reading. What appears below is what the 
15 year old was sending out on the net - YOU CAN USE IT TOO - just follow the simple 
instructions].

+++
BE FINANCIALLY FREE LIKE OTHERS WITHIN A YEAR!!! Before you say Bull, please read 
the following. This is the 

±z¦n!! cypher ®M¦í©¼¦¹¬Û·Rªº¤ß

2002-09-30 Thread 50930cypher









  
  

  ¡@ 
  
  
   ²£«~¦WºÙ¡G º¿·ê§Ù«ü-anlin-W4-Dalltw-9/30-
   
  ©m¡@ ¦W¡G¶·¶ñ¼g¤¤¤å¥þ¦W¡A¤Å¶ñ¼g¼ÊºÙ ¦í ¡@§}¡G
   
  ¦í¦v¹q¸Ü¡G
   ¤½¥q¹q¸Ü¡G
   ¦æ°Ê¹q¸Ü¡G
   
  ¹q¤l¶l¥ó¡G
   
  ²Î¤@½s¸¹¡G
   
  §Ú§Æ±æ¦¬¨ì§ó¦hªº§K¶O°Ó«~¸ê°T¹q¤l³ø ³Æ¡@¡@µù¡G¥Ó½Ð¤H¥u¶·­t¾á¬¡°ÊÃØ«~¹B¶O150¤¸¡A½Ð½T¹ê

  ¶ñ½Ð¥Ó½Ðªí¡A¦p¸ê®Æ¦³»~±N¤£³B²z¡C
  

  
  








±z¦n!! cpunks ®M¦í©¼¦¹¬Û·Rªº¤ß

2002-09-30 Thread 50930cpunks









  
  

  ¡@ 
  
  
   ²£«~¦WºÙ¡G º¿·ê§Ù«ü-anlin-W4-Dalltw-9/30-
   
  ©m¡@ ¦W¡G¶·¶ñ¼g¤¤¤å¥þ¦W¡A¤Å¶ñ¼g¼ÊºÙ ¦í ¡@§}¡G
   
  ¦í¦v¹q¸Ü¡G
   ¤½¥q¹q¸Ü¡G
   ¦æ°Ê¹q¸Ü¡G
   
  ¹q¤l¶l¥ó¡G
   
  ²Î¤@½s¸¹¡G
   
  §Ú§Æ±æ¦¬¨ì§ó¦hªº§K¶O°Ó«~¸ê°T¹q¤l³ø ³Æ¡@¡@µù¡G¥Ó½Ð¤H¥u¶·­t¾á¬¡°ÊÃØ«~¹B¶O150¤¸¡A½Ð½T¹ê

  ¶ñ½Ð¥Ó½Ðªí¡A¦p¸ê®Æ¦³»~±N¤£³B²z¡C
  

  
  








Slashdot | UC Irvine Cracks Down on P2P (fwd)

2002-09-30 Thread Jim Choate


http://slashdot.org/articles/02/09/29/2218212.shtml?tid=95


 --


We don't see things as they are,  [EMAIL PROTECTED]
we see them as we are.   www.ssz.com
  [EMAIL PROTECTED]
Anais Nin www.open-forge.org






One of every ten men is completely impotent (iN8MgTEce)

2002-09-30 Thread Ewoldt Bibiloni





 Increase Your Sexual Performance Right Now! 
 
Take control of your sex life, Order Viagra Online Now!
The drug Viagra is a revolutionary way to treat impotence and enhance any man's sex life.
To order online click here



 
Viagra is used by millions of men it the US everyday. If you feel that your erection could be better, try Viagra. All orders shipped discreetly via FedEx


 
The drg Viagra is a revolutionary way to treat impotence and enhance any man's sex life.It is  a Safe and Effective way to increase a man's libido and has proven to be the most successful treatment for impotence.No need to go through embarrassing, stressful situations anymore, you can now get Viagra from the comfort of your home!




 
Some Things to think about...
 
1) You will not get an erection without sexual stimulation - no need to be embarrassed like when you use other sexual stimulants. You will only gain an erection when you are sexually stimulated.
2) More men use and trust Viagra as a treatment for sexual dysfunction than other sexual stimulation aids. Viagra is a safe sexual treatment that is proven because of the wide use and acceptance by the general public.
3) When you use Viagra you are able to gain an erection through your partners sexual stimulation - all of your sexual acts, feelings and your love making is the result of your chemistry. 


This is the easiest and most discreet way to end impotence
To order online click here
 
It's worked for so many don't waste any more time get started by following the link on this page!







This email was sent to you because your email is part of a targeted opt-in list. If you do not wish to receive further mailings from this offer, please click below and enter your email to remove your email from future offers.
Anti-SPAM Policy Disclaimer: Under Bill s.1618 Title III passed by the 105th U. S. Congress, mail cannot be considered spam as long as we include contact information and a remove link for removal from this mailing list. If this e-mail is unsolicited, please accept our apologies. Per the proposed H.R. 3113 Unsolicited Commercial Electronic Mail Act of 2000, further transmissions to you by the sender may be stopped at NO COST to you 
Do Not Reply To This Message To Be Removed.
Easy Remove and contact: click here

H3S8fQ243XwKJEe2iLtwNrIULyWk


Grreat News!!!!

2002-09-30 Thread carolburke

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII
Reply-To: [EMAIL PROTECTED]
Date: Mon, 30 Sep 2002 08:32:53 -0400
X-Priority: 3
X-Library: Indy 9.00.10
X-Mailer: Foxmail

You're receiving this mail because you opted-in to receive this opportunity! If you're 
receiving this message in error and 

want to unsubscribe from the mailing list please follow instructions bellow!
Hello Friends!!

It will only take you  minutes a day forReferalWare 
http://www.referralware.com/home.jsp/150171817  increase your profits?
http://www.referralware.com/home.jsp/150171817

You'll have to click on the link to find out why the select few
who are lucky to be members are making MEGA Money on this program!

http://www.referralware.com/home.jsp/150171817

But, here are the top 3 reasons why it's vital that you sign up
and take advantage of the additional Income-Streams that they have!!

1.  Secure your position in the very powerfull matrix
in the Referalware and additional programs inside callede Incime-Streams!
.  A full matrix pays (click below for answer) per
month.
http://www.referralware.com/home.jsp/150171817

2.  This is a unique high-demand product that is exiting and in demend!. 
http://www.referralware.com/home.jsp/150171817


3.  You'll be given an opportunity to promote allIncome-Streams
for extra profits! before the

lhttp://www.referralware.com/home.jsp/150171817

T
Sign up here now:
http://www.referralware.com/home.jsp/150171817

All the best,

Mark

M



To unsubscribe please email [EMAIL PROTECTED] and write Remove in subject 
line.



Re: What email encryption is actually in use?

2002-09-30 Thread Petro

On Mon, Sep 30, 2002 at 12:53:36PM -0700, Joseph Ashwood wrote:
 - Original Message -
 From: James A. Donald [EMAIL PROTECTED]
  The chief barrier to use of outlook's email encryption, aside
  from the fact that is broken, is the intolerable cost and
  inconvenience of certificate management.
 Actually the chief barrier is psychological, people don't feel they should
 side with the criminals by using encryption. Certificate management is

Um. No. Most people do no assocaite encryption with criminals.  

There are 4 reasons people don't use encryption in email:

0) Encryption, that's that SLS thingy, right? (Ignorance, stupidity)

1) Why bother? I am not a *target*. (apathy) 

2) It's too much hassle. (BAD tools) 

3) 95% of the people *I* send email to wouldn't know what to do with
a message in S/MIME, much less PGP. (AKA the Fax Effect).  

-- 
Johnny had four truckloads of plutonium. Johnny used four| Quit smoking:
truckloads of plutonium to light New York City for a year.   | 161d, 11h ago
Then how many truckloads of plutonium did Johnny have? Six!  | petro@
-- Breeder reactor ad from the glory days of nuclear power   | bounty.org




message

2002-09-30 Thread giorhof

Hi, 

You get emails every day, offering to show you how to make money.
Most of these emails are from people who are NOT making any money.
And they expect you to listen to them? 

Enough. 

If you want to make money with your computer, then you should hook up with a group 
that is actually DOING it. We are making a large, continuing income every month. 
What's more - we will show YOU how to do the same thing. 

This business is done completely by internet and email, and you can even join for free 
to check it out first. If you can send an email, you can do this. No special skills 
are required. 

How much are we making? Below are a few examples. These are real people, and most of 
them work at this business part-time. But keep in mind, they do WORK at it - I am not 
going to insult your intelligence by saying you can sign up, do no work, and rake in 
the cash. That kind of job does not exist. But if you are willing to put in 10-12 
hours per week, this might be just the thing you are looking for. 

N. Gallagher: $3000 per month
T. Hopkins: $1000 per month
S. Johnson: $6000 -$7000 per month
V. Patalano: $2000 per month
M. South: $5000 per month
J. Henslin: $7000 per month 

This is not income that is determined by luck, or work that is done FOR you - it is 
all based on your effort. But, as I said, there are no special skills required. And 
this income is RESIDUAL - meaning that it continues each month (and it tends to 
increase each month also). 

Interested? I invite you to find out more. You can get in as a free member, at no 
cost, and no obligation to continue if you decide it is not for you. We are just 
looking for people who still have that burning desire to find an opportunity that 
will reward them incredibly well, if they work at it. 

To grab a FREE ID#, send a separate e-mail to [EMAIL PROTECTED] with free 
membership in the subject line. Include your first and last name and your e-mail 
address  (if different from above) and I will see it is forward to you. This will give 
me the chance to show you the entire program in letters that will follow on a daily 
basis over the next week.

We will confirm your position and send you a special report as soon as possible, and 
also Your free member number. 

To sum up:
1) As a free member you will be able to consolidate your buying power with thousands 
of other customers, shop on line at stores you use regularly and get fantastic 
discounts on a wide variety of merchandise. The cost to join? It's FREE!
2) Upgrade your membership (for only $25 per month) and you and your family can save 
on doctor visits, dentistry and glasses, even if you already have coverage.
3) Or you can start your own explosively profitable business showing to others these 
opportunities. (Marketing: The commercial functions involved in transferring goods or 
services from producer to consumer).

That's all there's to it. 

Looking forward to helping you make your dream of financial independence come true!

Sincerely, 

George Filippis

P.S. After having several negative experiences with network marketing companies I had 
pretty much given up on them.
This is different - there is value, integrity, and a REAL opportunity to have your own 
home-based business...and finally make real money on the internet. 

Don't pass this up..you can sign up and test-drive the program for FREE. All you need 
to do is get your free membership. 








Unsubscribing: Send a blank email to: [EMAIL PROTECTED] with remove in the subject 
line.














5037TEyF4-839jaeU6258DXtl1-966NGXl8702LCWg8-106yBHL7871ajvc6-814jNRL7455drLJ2-812Sl77




Hackers make Xbox into a Windows PC

2002-09-30 Thread Steve Schear

Hackers make Xbox into a Windows PC

The Xbox has been made to run Microsoft's own operating system, turning it 
into an ordinary desktop workstation, courtesy of some Linux trickery. The 
accomplishment is a comment on the insecurity of secure hardware

http://news.zdnet.co.uk/story/0,,t269-s2123049,00.html




Re: What email encryption is actually in use?

2002-09-30 Thread Morlock Elloi

 What email encryption is actually in use?

PGP 2.6.*, 6.*  7.* work like a charm across macs  windoze  unices provided
that one specs RSA-legacy keys and limit algo to IDEA. In other words, be 2.6.2
compatible.

If you need encryption, that is. If you don't need encryption (like in They
Will Not Come After You If They Read Your E-mail) then feel free to bitch about
interfaces and inconveniances.

If you're just bored and like to speculate and fix unbroken stuff, I suggest
one time pads distributed via $40 64 MByte USB flash drives - everything fits
there, including your mail client, your OTP interface and enough key material
to last lifetime for things you can type.

In other words, those that need crypto are taken care of, and in order to gain
resources to make sheeple use crypto you have to become Them, in which case you
don't really want sheeple to use crypto in the first place.





=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
New DSL Internet Access from SBC  Yahoo!
http://sbc.yahoo.com




What email encryption is actually in use?

2002-09-30 Thread James A. Donald

--
James A. Donald:
  We have tools to construct any certificates we damn well 
  please,

Joseph Ashwood:
 The same applies everywhere, in fact in your beloved Kong, 
 the situation is worse because the identities can't be 
 managed.

You are unfamiliar with Kong.  The situation is better, because 
it is designed to be used in the fashion that all other 
existing alternatives actually are used in practice.

James A. Donald:
  I intended to sign this using Network Associates command 
  line pgp, only to discover that pgp -sa file produced 
  unintellible gibberish, that could only be made sense of by 
  pgp, so that no one would be able to read it without first 
  checking my signature.

Joseph Ashwood:
 Which would of course demonstrate once more that you have no 
 clue how to use PGP. It also demonstrates what is probably 
 your primary source of I can't decrypt it you are using a 
 rather old version of PGP.

In fact my version is network associates version 6.5.8, which 
can supposedly decrypt any valid pgp message, and your rant 
would be considerably more impressive if you signed your 
message with a PGP signature. Doubtless you could sign it -- 
eventually, after a bit of trying, after you had spent about as 
much time farting around as I did.   The proclamation that PGP 
is usable would have been much more impressive in a message 
that actually used it.

James A. Donald:
  Here is a better fix, one that I implemented in Kong: 
  Define several signature types with the default signature 
  type ignoring those aspects of the message that are 
  difficult for the user to notice, so that if a message 
  looks pretty much the same to the user, it has the same 
  signature, by, for example, canonicalizing whitespace and 
  single line breaks, and treating the hard space (0xA0) the 
  same as the soft space. (0x20), and so on and so forth.

Joseph Ashwood:
 So it's going to be broken by design. These are critical 
 errors that will eliminate any semblance of security in your 
 program.

You are full of shit.  I challenge you to fool my 
canonicalization algorithm by modifying a message to as to 
change the apparent meaning while preserving the signature, or 
by producing a message that verifies as signed by me, while in 
fact a meaningfully different message to any that was genuinely 
signed by me.

Let see you doing some work to back up your empty words.   The
source code for my canonicalization code is on the the net.  If
you say it is broken, break it! 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 nfNdl11zVV+oWKMTt0l79zrcrelHalABSBwKeib2
 4Ts9fALHrytq8hR6Dhue492m/1vO+fYHy4Kqa6dkQ




Howdy

2002-09-30 Thread

Want to make a million bucks this year?
Make a million!!
 

ME TOO BUT IT'S probably NOT GOING TO HAPPEN!
 
However if your looking for the opportunity to
make a couple thousand a week,
working form home, with your pc, we need to talk.
 
If you're over 18 and a US resident,
 
Just Click REPLY
 
Send me your Name, State,
Complete telephone number,
and the best time to contact you.




Viagra can help many men who have ED (OQMXL5L4b)

2002-09-30 Thread BeardsleeFitzgibbons





 Increase Your Sexual Performance Right Now! 
 
Take control of your sex life, Order Viagra Online Now!
The drug Viagra is a revolutionary way to treat impotence and enhance any man's sex life.
To order online click here



 
Viagra is used by millions of men it the US everyday. If you feel that your erection could be better, try Viagra. All orders shipped discreetly via FedEx


 
The drug Viagra is a revolutionary way to treat impotence and enhance any man's sex life.It is  a Safe and Effective way to increase a man's libido and has proven to be the most successful treatment for impotence.No need to go through embarrassing, stressful situations anymore, you can now get Viagra from the comfort of your home!




 
Some Things to think about...
 
1) You will not get an erection without sexual stimulation - no need to be embarrassed like when you use other sexual stimulants. You will only gain an erection when you are sexually stimulated.
2) More men use and trust Viagra as a treatment for sexual dysfunction than other sexual stimulation aids. Viagra is a safe sexual treatment that is proven because of the wide use and acceptance by the general public.
3) When you use Viagra you are able to gain an erection through your partners sexual stimulation - all of your sexual acts, feelings and your love making is the result of your chemistry. 


This is the easiest and most discreet way to end impotence
To order online click here
 
It's worked for so many don't waste any more time get started by followin the link on this page!







We are strongly against sending unsolicited emails to those who do not wish to receive our special mailings. You have opted in to one or more of our affiliate sites requesting to be notified of any special offers we may run from time to time. We also have attained the services of an independent 3rd party to overlook list management and removal services. This is NOT unsolicited email. If you do not wish to receive further mailings, please click here to be removed from the list. Please accept our apologies if you have been sent this email in error. We honor all removal requests

Aa26wxngmVsN0TSbQr83NPewdNK1sK3S3Cp0XYVOTWU7j70J8SgqOQMXL5L4b46T5KXi22W


BUSINESS ASSISTANCE

2002-09-30 Thread DR.FEST WILLIAM

FROM THE DESK OF DR.FEST WILLIAM.


 ATTN.


 This is important, and requires your immediate attention! First,
I must solicit your strictest confidence in the transaction.


 To intimate you further, we are top officials of the new civilian
administration Committee on Foreign and Local Contract Payment, who
are interested in the importation of goods into our country with funds
 which are presently trapped in Nigeria. In order to actualize
this dream, we seek your assistance to transfer the said-trapped fund into an
interest bearing account which you have absolute control over
 in your country or a third country other than Nigeria.


 The new civilian administration of General Olusegun Obasanjo
(rtd) set-up this committee specifically to review all contracts/oil licenses to
determine their propriety and relevance in the light of the
 country's current economic and political realities. We have
identified a lot of inflated contract fund which are currently floating in our
Apex Bank. At this moment we have worked out modalities within
 ourselves and some acquaintances at the Apex Bank to divert the
sum of US$33,700,000.00 (Thirty three million, seven hundred thousand United
States Dollars) only, for our personal use.


 However, by virtue of our positions as Civil Servants and
members of the Contract Review Panel, we cannot acquire this money in our names,
consequently, I was delegated by my colleagues as a matter of trust
to look for an overseas partner into whose account we can transfer this sum of
money, hence this letter to you.


 Furthermore, my colleagues and I are willing to transfer the
total sum of US$33,700,000.00 (Thirty three million, seven hundred thousand United
States Dollars) into your account for disbursement. Your areas of
specialization is not a hindrance to the successful execution of this transaction and
the account required for this project can either be PERSONAL, COMPANY or
an OFFSHORE account you have total control over. Needless to say, the
trust reposed on you at this juncture is enormous. In return, we have
agreed to offer you 20% of this sum while 10% shall be set aside for incidental
expenses between the parties in the course of this transaction. You
must however note that this  transaction is subject to the following terms and 
conditions: -


 (a) Our conviction of your transparent honesty and diligence
 (b) That you would treat this transaction with utmost secrecy and
confidentiality.
 (c) That the funds would be transferred to an account where you
have absolute control over.
 (d) That one of our representatives will be with you in your
country to represent our interest.
 This however depends on your response to conditions A and C
above.


 Modalities have been worked out to the highest level for the
immediate transfer of the funds within 14 working days subject to your
satisfaction of the above stated terms.


 Our assurance is that your role is RISK FREE. To accord this
ransaction the legality it deserves and for mutual security of the funds, the
whole approval procedures will be officially and legally processed with
your name or the name of any company you may nominates as the bonafide
 beneficiary.


 Once more, I want you to understand that having put over 23
years in the civil service of my country, I am averse to having my image and career
dented.


 This matter should be treated with utmost secrecy and urgency.


 Kindly expedite action as we are behind schedule to enable us
include this transfer in this batch as payments to foreign contractors is usually
carried out on quarterly basis.


 regards

 DR.FEST WILLIAM.







Real-world steganography

2002-09-30 Thread Peter Gutmann

I recently came across a real-world use of steganography which hides extra
data in the LSB of CD audio tracks to allow (according to the vendor) the
equivalent of 20-bit samples instead of 16-bit and assorted other features.
According to the vendors, HDCD has been used in the recording of more than
5,000 CD titles, which include more than 250 Billboard Top 200 recordings and
more than 175 GRAMMY nominations, so it's already fairly widely deployed.
From http://www.hdcd.com/partners/proaudio/overview.html:

[...]

Hidden Code Addition/Output Dither/Quantization

The final step in the reduction to 16 bits is to add high-frequency weighted
dither and round the signal to 16-bit precision. The dither increases in
amplitude in the frequency range of 16 to 22.05 kHz, leaving the noise floor
flat below 16 kHz where the critical bands of hearing associated with tonality
occur. As part of the final quantization, a pseudo-random noise hidden code is
inserted as needed into the least significant bit (LSB) of the audio data. The
hidden code carries the decimation filter selection and Peak Extend and Low
Level Range Extend parameters. Inserted only 2?5 percent of the time, the
hidden code is completely inaudible-effectively producing full 16-bit
undecoded playback resolution. The result is an industry-standard 44.1-kHz,
16-bit recording compatible with all CD replication equipment and consumer CD
players.

[...]

The paper describing the process is available under the somewhat misleading
name http://www.hdcd.com/partners/proaudio/AES_Paper.pdf.  The description of
the stego en/decoding process is on p.15 (it's a rather long excerpt, but it's
interesting stuff):

As part of the final quantization, a hidden code side channel is inserted into
the LSB when it is necessary for the encoder to inform the decoder of any
change in the encoding algorithm. It takes the form of a pseudo-random noise
encoded bit stream which occupies the least significant bit temporarily,
leaving the full 16 bits for the program material most of the time. Normally,
the LSB is used for the command function less than five percent of the time,
typically only one to two percent for most music. Because the hidden code is
present for a small fraction of the time and because it is used as dither for
the remaining 15 bits when it is inserted, it is inaudible. This was confirmed
experimentally with insertion at several times the normal fraction of time.

[...]

The mechanism which allows insertion of commands only when needed consists of
encapsulating the command word and parameter data in a packet. A
synchronizing pattern is prepended to the data and a checksum is appended. The
resulting packet is then scrambled using a feedback shift register with a
maximal length sequence and inserted serially, one bit per sample, into the
LSB of the audio data. The decoder sends the LSB's of the audio data to a
complementary shift register to unscramble the command data. A pattern
matching circuit looks for the synchronizing pattern in the output of the
descrambler, and when it finds it, it attempts to recover a command. If the
command has a legal format and the checksum matches, it is registered as a
valid packet for that channel. The arrival of a valid packet for a channel
resets a code detect timer for that channel. If both channels have active
timers, then code is deemed to be present and the filter select data is
considered valid immediately. However, any command data which would effect the
level of the signal must match between the two channels in order to take
effect. The primary reason for this is to handle the case where an error on
one channel destroys the code. In such a case, the decoder will mistrack for a
short time until the next command comes along, which is much less audible than
a change in gain on only one channel, causing a shift in balance and lateral
image movement. If either of the code detect timers times out, then code is
deemed not to be present, and all commands are canceled, returning the decode
system to its default state. If the conditions on the encoder side are not
changing, then command packets are inserted on a regular basis to keep the
code detect timers in the decoder active and to update the decoder if one
starts playing a selection in the middle of a continuous recording.

Since the decoder is constantly scanning the output of the de-scrambler shift
register for valid command packets even when none are present, the possibility
exists that there may be a false trigger. For audio generated by the encoder,
this possibility is eliminated in the absence of storage and transmission
errors by having the encoder scan the LSB of the audio data looking for a
match. If a match to the synchronizing pattern is found, the encoder inverts
one LSB to destroy it.

Modern digital storage and transmission media incorporate fairly sophisticated
error detection and correction systems. Therefore, we felt that only moderate
precautions were necessary in 

Re: What email encryption is actually in use?

2002-09-30 Thread Peter Gutmann

James A. Donald [EMAIL PROTECTED] writes:

To the extent that real people are using digitally signed and or encrypted
messages for real purposes, what is the dominant technology, or is use so
sporadic that no network effect is functioning, so nothing can be said to be
dominant?

For encryption, STARTTLS, which protects more mail than all other email
encryption technology combined.  See
http://www.cs.auckland.ac.nz/~pgut001/pubs/usenix02_slides.pdf (towards the
back).

For signing, nothing.  The S/MIME list debated having posts to the list
signed, and decided against it: If I know you, I can recognise a message from
you whether it's signed or not.  If I don't know you, whether it's signed or
not is irrelevant.  That leaves a few highly specialised applications which
don't really qualify as use by real people (e.g. pgpmoose, EDI, etc etc,
where any random proprietary format is fine, since it's decided by mutual
agreement of both parties).

Peter.




(.)

2002-09-30 Thread



ÄúÒ»¶¨Ìý˵¹ýÏÄÐÂÒ»»úË«¿¨(Ò»¸öÊÖ»ú,Á½¸ö²»Í¬µÄÊÖ»úºÅÂë),ÕâÖÖÒ»»úË«¿¨Ôø¾­·çÃÒÖйú,
ÒòΪÕâÖÖ¿¨ºÜ·½±ã,µ«ÊÇÓÉÓÚ¼Û¸ñ¹ý¸ß,ºÜ¶àÈËÖ»ÄÜÍû³¾Äª¼°,ÏÖÔÚÀ´ÖĄ́ÍåµÄÒ»»ú12¿¨
(Ò»¸öÊÖ»ú,Ê®¶þ¸ö²»Í¬µÄÊÖ»úºÅÂë),ÈúܶàÈËÔ¸ÍûµÃÒÔʵÏÖ¡£Ö»ÐèÒ»ÕÅССµÄÊÖ»ú¿¨,
ÔÙ²»ÓÃ×°¶à¸öÊÖ»úÁË¡£ÕâÕÅÊÖ»ú¿¨ÓÐͿд¹¦ÄÜ£¬¿ÉÒÔÌîд²»Í¬µÄºÅÂë½øÈ¥£¬
ÈÃÄãÒ»¿¨ÔÚÊÖÒ»ÉíÇáËÉ¡£³ÏÕ÷È«¹ú´úÀíÉÌ.¾­ÏúÉÌ.

Ö÷Òª¹¦ÄÜ£º
¡òMagic SIM ÊÖ»ú¿¨¿É½«²»Í¬¹ú¼Ò»òϵͳµÄ12ÕźÅÂ뱸·ÝÖÁͬһÕÅMagic SIM¿¨ÉÏ£¬²¢±£Áô¾É¿¨¡£

¡òMagic SIM ÊÖ»ú¿¨³¬´óµç»°²¾ÈÝÁ¿£¬Ò»´Î¿É±à¼­250±ÊÖ®¸öÈË×ÊÁÏ¡£ 

¡òMagic SIM ÊÖ»ú¿¨Çл»ºÅÂëʱÎÞÐ뿪¹Ø»ú£¬¿ÉÓڲ˵¥ÄÚµÄSTKÑ¡µ¥Ö±½ÓÇл»ºÅÂë 
(ÉÙ²¿·Ýδ·ûºÏ¹ú¼ÊSTKÊÖ»úÐ迪¹Ø»ú) ¡£
 
¡òMagic SIM ÊÖ»ú¿¨Ò»¿¨12ºÅÂëΪ¿ÉÖظ´Ä¨Ð´£¬Öظ´¿½±¸²»Í¬ÏµÍ³ºÅÂëÖ®SIM¿¨¡£ 

¡òMagic SIM 
ÊÖ»ú¿¨ËùÓп¨Æ¬Ò»´Î´ø×Å×ߣ¬²»Óõ£ÐÄ¿¨Æ¬ÒÅʧ¡¢×ÊÁϲ»¼û£¬»òÕß¿¨Æ¬¡º²»Îȶ¨¡»¡¢¡ºµ±»ú¡»¡¢¡º¼ÓºñµÄµç³Ø¡»¼°¡º¼Óºñ±³¸Ç¡»ÒÔ·Áº¦ÊÖ»úÖ®ÃÀ¹Û¡£
 
¡òMagic SIM ÊÖ»ú¿¨Ê¹ÓÃ×îпƼ¼µÄµ¥Ð¾Æ¬SIM¿¨ÏµÍ³¼Ü¹¹£¬Ð¾Æ¬ÏµÍ³²ÉÓúϸñµÄGSM Phase II 
plus STK±ê×¼°æ±¾£¬¾ß±¸ÏµÍ³½»Ò×±£»¤µÈ°²È«Ä£Ê½(transaction 
protection)£¬¹¦ÄÜÓëÆ·Öʶ¼·Ç³£Óб£ÕÏ¡£
 
¡òMagic SIM 
ÊÖ»ú¿¨ËùÓÐɨÃ鱸·Ý×ÊÁÏ£¬¾ùÒÔ·ûºÏÃÀ¹ú¹ú·À²¿°²È«±ê×¼DESÃÜÂë³ÌÐò½øÐмÓÃÜÓ밲ȫÈÏÖ¤£¬Ê¹ÓÃÕßÎÞÐëµ£ÐÄ×ÊÁϱ»ÇÔÈ¡»òµÁÓ㬰²È«Óб£ÕÏ¡£

±¾²úÆ·¸½ÔùÈí¼þ¹âµú£¬ÄÚº¬ÖС¢Ó¢¡¢¼òÌåϵͳÈí¼þ¼°ÆäʹÓÃÊֲᣬʹÓÃÕß¿ÉÇáÒ×°´ÕÕÊÖ²áµÄÒýµ¼£¬µ¼ÖÂ×ÔÐа²×°²Ù×÷Èí¼þ¼°ÉÕ¼Ãźţ¬²¢ÇÒºÜÇáÒ×µØÔÚÊÖ»úÉÏËæÒâת»»ÄúËùҪʹÓõĺÅÂ룬´Ó´ËÄú½«±ÜÃâ»»¿¨µÄÂé·³£¬²¢Ê¡Ï¾޶îÔ½Ñó»ò¿çÇøÂþÓε绰·ÑÓá£

±¾²úÆ·ÖÐÿһ×é¾ùÄÚ¸½Ò»ÕÅ¿ÉÖظ´Ä¨Ð´Ö® 1 ¿¨ 12 ÃÅºÅ¿Õ°×µÄ SIM ¿¨£¬Ò»´Î¹ºÂò¼´¿ÉÖÕÉíʹÓá£

´ó½´úÀíÉÌ:  ÐÅÏä: [EMAIL PROTECTED]
̨Í峧ÉÌ :ÐÅÏä  [EMAIL PROTECTED]  http://coolsite.to/magicsim

³ÏÕ÷È«¹ú´úÀíÉÌ.¾­ÏúÉÌ (886) 2 2707-7897 Õ²r

Èç¹û¸øÄú´øÀ´²»±ã, Çë·¢Ðŵ½ [EMAIL PROTECTED]  ÎÒÃDZíʾµÀǸ



 




Re: smartcards

2002-09-30 Thread Steve Thompson

Quoting Trei, Peter ([EMAIL PROTECTED]):
 The phone SW world is nowhere near as closed as you think.

 * Thousands of developers are writing Java applets for Japanese iMode
 phones.
 * Hundreds are developing applets for the Blackberry 5810 and 5820 phones
   (free Java-based IDS from RIM).
 * Similarly, the high end Pocket PC and Palm phones both have free or
 inexpensive
   development environments (C/C++)
 * Finally, Qualcomm phones support BREW (free SDK, expensive training).

I stand corrected.  I'm even reading a short bit about Nokia's new 3g phone:

http://www.theregister.co.uk/content/54/27310.html

The device, known as the Nokia 6650, is also notable for allowing
users to record up to 20 seconds of video (128x96 pixels) with sound
using a built in VGA camera employing 4096 colours, the first Nokia
phone to offer the facility

Other features include a multimedia messaging service (MMS) client, a
WAP 1.2.1-compatible browser, integrated Bluetooth, a wallet
application for mobile transactions, and a Java 2 Micro Edition (J2ME)
virtual machine based on the mobile information device profile
(MIDP).

Includes infrared and USB as well.  Not much quickly available describing the
wallet app, but it probably isn't peer-to-peer.

 My take on the situation is that the platform vendors are so anxious to get
 developer mindshare, and new apps, that they are for the most part giving
 away the development environments and specs.

IOW, a decent number of platforms are ready to go.  Cool.


Regards,

Steve




Clarification of challenge to Joseph Ashwood:

2002-09-30 Thread James A. Donald

--
James A. Donald: (ranting on the user hostility of PGP)
   Presumably the theory underlying this brilliant design
   decision was that in the bad old days, a [signed clear
   text file signed] under unix would not verify under
   windows because of trivial differences such as the fact
   the whitespace is expressed slightly differently.
  
   Here is a better fix, one that I implemented in Kong:
   Define several signature types with the default signature
   type ignoring those aspects of the message that are
   difficult for the user to notice, so that if a message
   looks pretty much the same to the user, it has the same
   signature, by, for example, canonicalizing whitespace and
   single line breaks, and treating the hard space (0xA0)
   the same as the soft space. (0x20), and so on and so
   forth.

Joseph Ashwood:
  So it's going to be broken by design. These are critical
  errors that will eliminate any semblance of security in
  your program.

James A. Donald:
  I challenge you to fool my canonicalization algorithm by
  modifying a message to as to  change the apparent meaning
  while preserving the signature, or  by producing a message
  that verifies as signed by me, while in fact a meaningfully
  different message to any that was genuinely  signed by me.

 Let see you doing some work to back up your empty words.
 The source code for my canonicalization code is on the net. 
 If you say it is broken, break it!

To clarify, Kong works by checking a signature against the
message, and against other messages in its database.

Its job is not to identify the true James Donald, but to keep
the different people claiming to be James Donald clearly
separated.  Thus Kong would be broken if such separation could
be obfuscated or confused.

Any program attempting to determine whether Bob is someone's
true name is attempting to do something that computers cannot
do, hence the intolerable certificate management problems of
software that attempts to do that.

Three quarters of the user hostility of other programs comes
from their attempt to support true names, and the rest comes
from the cleartext signature problem.  Kong fixes both
problems.

 Joseph Ashwood must produce a message that is meaningfully
 different from any of the numerous messages that I have sent
 to cypherpunks, but which verifies as sent by the same person
 who sent past messages.

Thus for Kong to be broken one must store a past message from
that proflic poster supposed called James Donald, in the Kong
database, and bring up a new message hacked up by Joseph
Ashwood, and have Kong display in the signature verification
screen

The signature in this document matches the signature on
another document signed by James A. Donald.  Do you
wish to view this document.

While Kong display a document meaningfully different from any
that was posted by James A.  Donald. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 gQcEhL/Zl68mNm0WaeG7zRK5M+/3qbaE0t84hURH
 4st/8mhjCyBBCy1Ganf3ud6SNdzLZtUChQQbTA6SO




Be Your Own Boss

2002-09-30 Thread devorejjj




  
  

  

  


  


© Copyright 2002, All Rights 
Reserved.
We are strongly against sending unsolicited emails 
to those who do not wish to receive our special mailings. You have opted in to 
one or more of our affiliate sites requesting to be notified of any special 
offers we may run from time to time. We also have attained the services of an 
independent 3rd party to overlook list management and removal services. This is 
NOT unsolicited email. If you do not wish to receive further mailings, please click this link . 
Please accept our apologies if you have been sent this email in error. We honor 
all removal requests.
ed. If this message has come to you in 
error,please click REMOVE ME and your name will be removed from all 
future 
mailings.__


13





check this out (Rf8)

2002-09-30 Thread Almodovar Efron







GUARANTEED 
100% FREE PASSWORDS
GET INTO PAYSITES FOR FREE
Click Here to Enter!

Did you know t

Re: Real-world steganography

2002-09-30 Thread Bram Cohen

Peter Gutmann wrote:

 I recently came across a real-world use of steganography which hides extra
 data in the LSB of CD audio tracks to allow (according to the vendor) the
 equivalent of 20-bit samples instead of 16-bit and assorted other features.

I don't think that's really 'steganography' per se, since no attempt is
made to hide the fact that the information is in there. The quasi-stego
used is just to prevent bad audio artifacts from happening.

-Bram Cohen

Markets can remain irrational longer than you can remain solvent
-- John Maynard Keynes




low prices - save up to 80% 50-2

2002-09-30 Thread Buy_your_Inkjet_5826d71

 
  
 
 

  
BUY 
 DIRECT 
 From MANUFACTURER 
 SAVE 
 20% instantly 
 on 
ALL 
 INK JET CARTRIDGES 

 
ENTER 
 HERE 
 Use 
 october2002 Coupon Code for  
 all Orders during September and October 2002  
 and SAVE 10%. 
 SAVE 
 another 10% 
  
 When 
 you purchase 2 or more of the  
 same Inkjet Cartridge 

 Huge 
 SAVINGS of up to 
 80% 
ENTER 
 OUR STORE 
 CLICK HERE 
  
  
All our products 
   are 100% satisfaction guaranteed. 
   All orders are sent via UPS with online tracking. 
   We fully protect your privacy and security. 
   We're dedicated to your satisfaction. 

  
 
 
 
 
 
 
This E-mailing has been 
   sent to you as a person interested in the information enclosed.  
   If this reached you by error, or you do not wish to receive this information 
   or type of information in the future,  
please click on the word REMOVE 
   and you will be taken off our list immediately and NEVER receive any emails 
   from us. 
 

 
 
 


1619DJPT3-214JwyR5480OZRs2-292GrRT3l33

xsex mleh

2002-09-30 Thread Lisa Ann



HUGE COCKS STUFFED IN TIGHT PINK PUSSIES

NASTY LITTLE JUST TURNED LEGAL TEENS TAKING TOO MUCH, HUGE COCKS, ANAL POUNDINGS, & MUCH MORE! 
YOUNG AND FRESH -> JUST A CLICK AWAY! 

 GET THEM NOW!

CLICK HERE FOR THE NASTY GIRLS OF YOUR DREAMS!


VERY GRAPHIC HARDCORE MATERIAL - MATURE AUDIENCE ONLY!
You MUST be at least 18 years old to enter!



This email was sent to you because your email address is part of an opt-in list.
If you received this email in error, please accept our apologies. If you do not wish to receive further offers, please click below and enter your email to remove your email from future offers.


Click Here to Remove Remove

Further 
transmissions to you by the sender may be stopped at NO COST to you!


TBB, Ent 
6735 Amboy Rd. Suite # A-3089
NYC NY 10309
718 966 3089 -List Code - XP mstr-

If the above link does not work, please send a blank email to: 
[EMAIL PROTECTED]





nmjhnnxgxjnlsdt


Austin Cpunks - Oct. 10 Physical Meeting

2002-09-30 Thread Jim Choate



Time:Oct. 10, 2002
 Second Tuesday of each month
 7:00 - 9:00 pm (or later)

Location:Central Market HEB Cafe
 38th and N. Lamar
 Weather permitting we meet in the un-covered tables.
 If it's inclimate but not overly cold we meet in the
 outside covered section. Otherwise look for us inside
 the building proper.

Identification:  Look for the group with the Applied Cryptography
 book. It will have a red cover and is about 2 in. thick.

Contact Info:http://einstein.ssz.com/cdr/index.html#austincpunks



 --


We don't see things as they are,  [EMAIL PROTECTED]
we see them as we are.   www.ssz.com
  [EMAIL PROTECTED]
Anais Nin www.open-forge.org






Re: Random Privacy

2002-09-30 Thread Julian Assange

This is an old statistical technique.

You need to know ahead of time which answer is more likely and have a
bias in your randomizer. A classic example:

Did you cheat on your wife last year? If you were born
between January and September reverse your answer.


--
 Julian Assange|If you want to build a ship, don't drum up people
   |together to collect wood or assign them tasks and
 [EMAIL PROTECTED]  |work, but rather teach them to long for the endless
 [EMAIL PROTECTED]  |immensity of the sea. -- Antoine de Saint Exupery




RE: smartcards

2002-09-30 Thread Trei, Peter

 Steve Thompson[SMTP:[EMAIL PROTECTED]] wrote:
 
 I'm surprised that nobody has mentioned cell-phones as a digital cash
 platform.
 Perhaps this belabours the obvious, but I'll spell it out anyways:
 
   o They are ubiquitous.
 
   o Most of them have an IR port and many contain enough storage and
 horsepower to keep and play small MP3 collections.  Chaumian digital
 cash
 code should fit easily.  Hell, some companies are already making
 noises
 about full-motion video.  How long before the damn things have a
 digital
 camera built in?
 
   o Peer-to-peer transactions will obviously work via IR.  Central
 clearing
 mechanisms will work through the phone net.  Thus they embody the
 basic
 infrastructure for both worlds.  The entire thing could be done over
 SMS,
 of course, but IR for peer-to-peer, day-to-day transactions is best
 from a
 privacy and usability standpoint.
 
   o PC-based software is in use for the synchronisation of calendar data,
 etc.
 Many people are already familiar with using their phones for these
 kinds
 of purposes so what's one more application to the user?
 
 The problem is that phone software is (to my knowledge) all closed-source
 and
 running on proprietary hardware.  What's the liklihood of manufacturers
 opening up their phones for third-party code?  A Java VM might do it, as
 might
 something lean like an Inferno VM.  More informed list members could
 probably
 suggest other virtual machines which would suit our purposes.
 
[...]
 Regards,
 Steve
 
The phone SW world is nowhere near as closed as you think. 

* Thousands of developers are writing Java applets for Japanese iMode
phones. 
* Hundreds are developing applets for the Blackberry 5810 and 5820 phones 
  (free Java-based IDS from RIM). 
* Similarly, the high end Pocket PC and Palm phones both have free or
inexpensive 
  development environments (C/C++)
* Finally, Qualcomm phones support BREW (free SDK, expensive training).

My take on the situation is that the platform vendors are so anxious to get 
developer mindshare, and new apps, that they are for the most part giving
away the development environments and specs.

Peter Trei




Re: smartcards

2002-09-30 Thread James A. Donald

--
On 30 Jan 2050 at 32:210, Steve Thompson wrote:
 I'm surprised that nobody has mentioned cell-phones as a
 digital cash platform.[]

 The problem is that phone software is (to my knowledge) all 
 closed-source and running on proprietary hardware.  What's
 the liklihood of manufacturers opening up their phones for
 third-party code?

An open platform would be a combined cell phone and palm top
computer.  Lots of people are trying to move this -- so far
without wide acceptance.

Paypal's original vision was that people would use palm pilots
with IR.   If phones developed palm pilot capabilities, this
vision would become more useful.  I think combining the palm
pilot with the cell phone is more feasible once we develop a
good voice controlled computer, after the fashion of startrek,
which may be some time off. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 z0mctqiLain3vlXnFZTOy5PEVJIwCeg0x7zxl4RQ
 4DWhd8THkIxyeHtI7sSA5O1d9IKi7WwGZVh6roOOb




What email encryption is actually in use?

2002-09-30 Thread James A. Donald

--
What email encryption is actually in use?

When I get a PGP encrypted message, I usually cannot read it -- 
it is sent to my dud key or something somehow goes wrong. When 
I send a PGP encrypted message in reply, stating the problem, I 
seldom receive an answer, suggesting that the recipient cannot 
decrypt my message either.   Kong encrypted messages usually   
work, because there is only one version of the program, and key 
management is damn near non existent by design, since my
experience as key manager for various companies shows that in  
practice keys just do not get managed. After I release the next 
upgrade, doubtless fewer messages will work.

The most widely deployed encryption is of course that which is 
in outlook -- which we now know to be broken, since
impersonation is trivial, making it fortunate that seemingly no 
one uses it.

Repeating the question, so that it does not get lost in the
rant.  To the extent that real people are using digitally
signed and or encrypted messages for real purposes, what is the 
dominant technology, or is use so sporadic that no network
effect is functioning, so nothing can be said to be dominant?

The chief barrier to use of outlook's email encryption, aside  
from the fact that is broken, is the intolerable cost and
inconvenience of certificate management.  We have tools to
construct any certificates we damn well please, though the root 
signatures will not be recognized unless the user chooses to   
put them in.   Is it practical for a particular group, for
example a corporation or a conspiracy, to whip up its own
damned root certificate, without buggering around with
verisign?   (Of course fixing Microsoft's design errors is
never useful, since they will rebreak their products in new
ways that are more ingenious and harder to fix.)

I intended to sign this using Network Associates command line  
pgp, only to discover that pgp -sa file produced unintellible  
gibberish, that could only be made sense of by pgp, so that no 
one would be able to read it without first checking my
signature.

I suggest that network associates should have hired me as UI   
design manager, or failing, that, hired the dog from down the  
street as UI design manager.

Presumably the theory underlying this brilliant design decision 
was that in the bad old days, a file produced under unix woudl 
not verify under windows because of trivial differences such as 
the fact the whitespace is expressed slightly differently.

Here is a better fix, one that I implemented in Kong:   Define 
several signature types with the default signature type
ignoring those aspects of the message that are difficult for   
the user to notice, so that if a message looks pretty much the 
same to the user, it has the same signature, by, for example, 
canonicalizing whitespace and single line breaks, and treating 
the hard space (0xA0) the same as the soft space. (0x20), and
so on and so forth. 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 OmUO5eB/pLnuFIgCU2splCvKO4x0U1Ik31pVFPaU
 49B5UrVKc5ETzoxGcfl+q9ltoh61l4ncSyE+R5h6P




Re: smartcards

2002-09-30 Thread Steve Thompson

Quoting James A. Donald ([EMAIL PROTECTED]):
 --
 James A. Donald:
   When Chaumian money comes into wide use, I think that for
   most end users we will have to stash all unused tokens
   inside smartcards.

 Someone:
  Here in Hong Kong, contactless Octopus smartcards (based on
  the Sony FeliCa device) are well established for paying fares
  on buses, ferries and subways, and also for small
  transactions with vending machines, convenience stores and
  supermarkets.

 Critical mass is no problem if a payment mechanism is backed by
 the big boys, but the big boys want a mechanism for
 transferring value where only a few giant corporations who are
 in bed with the state receive transaction payments, a system
 that divides the economy into a tiny number of actors, the big
 corporations, who alone take action, plan and produce, and huge
 number of passive consumer zombies.

 We would like a system which treats those making and receiving
 payments as peers, which makes critical mass a considerably
 more difficult problem.

I'm surprised that nobody has mentioned cell-phones as a digital cash platform.
Perhaps this belabours the obvious, but I'll spell it out anyways:

  o They are ubiquitous.

  o Most of them have an IR port and many contain enough storage and
horsepower to keep and play small MP3 collections.  Chaumian digital cash
code should fit easily.  Hell, some companies are already making noises
about full-motion video.  How long before the damn things have a digital
camera built in?

  o Peer-to-peer transactions will obviously work via IR.  Central clearing
mechanisms will work through the phone net.  Thus they embody the basic
infrastructure for both worlds.  The entire thing could be done over SMS,
of course, but IR for peer-to-peer, day-to-day transactions is best from a
privacy and usability standpoint.

  o PC-based software is in use for the synchronisation of calendar data, etc.
Many people are already familiar with using their phones for these kinds
of purposes so what's one more application to the user?

The problem is that phone software is (to my knowledge) all closed-source and
running on proprietary hardware.  What's the liklihood of manufacturers
opening up their phones for third-party code?  A Java VM might do it, as might
something lean like an Inferno VM.  More informed list members could probably
suggest other virtual machines which would suit our purposes.

This would, of course, bring about Black Net rather quickly.  I confess that
I'm not all that enamoured with the idea, personally, but something like it is
already possible with various creative accounting practices so the only real
objection can be made by those few who require centralised clearing to
preserve their empires.  Such intersts will lobby hard to make sure that the
only option we have is to route our payments through their systems (without
regard to platform).

Nonetheless, I'd say that leveraging the cellular phone network and hand-held
phones for digital cash systems cover both the usability issues and the
critical mass problems thouroughly.

All we need to know is who we have to convince in order to get an open,
standardised environment and API with math, communications, and crypto
libraries for our phones.  (Actually, it would be really neat to have cell
phones wide-open to user supplied code, but that is probably asking too much.)


Regards,

Steve




Re: Anyone can get a clearance these days...

2002-09-30 Thread Bill Stewart

At 09:38 AM 09/27/2002 -0400, Adam Shostack wrote:
The US Government has mistakenly given secret documents to the only
man charged so far in connection with the 11 September attacks,
Zacarias Moussaoui.

http://news.bbc.co.uk/2/hi/americas/2284325.stm

That wasn't because they gave him a security clearance -
that was because, as the defendant in a trial,
he has the legal right to see the evidence against him,
and some of that evidence is classified.
Apparently they have some sort of deal where
he's not allowed to see the evidence himself,
but his court-appointed lawyers are,
which is still Constitutionally bogus,
but they'd slipped up in the implementation.




Re: What email encryption is actually in use?

2002-09-30 Thread Petro

On Mon, Sep 30, 2002 at 12:53:36PM -0700, Joseph Ashwood wrote:
 - Original Message -
 From: James A. Donald [EMAIL PROTECTED]
  The chief barrier to use of outlook's email encryption, aside
  from the fact that is broken, is the intolerable cost and
  inconvenience of certificate management.
 Actually the chief barrier is psychological, people don't feel they should
 side with the criminals by using encryption. Certificate management is

Um. No. Most people do no assocaite encryption with criminals.  

There are 4 reasons people don't use encryption in email:

0) Encryption, that's that SLS thingy, right? (Ignorance, stupidity)

1) Why bother? I am not a *target*. (apathy) 

2) It's too much hassle. (BAD tools) 

3) 95% of the people *I* send email to wouldn't know what to do with
a message in S/MIME, much less PGP. (AKA the Fax Effect).  

-- 
Johnny had four truckloads of plutonium. Johnny used four| Quit smoking:
truckloads of plutonium to light New York City for a year.   | 161d, 11h ago
Then how many truckloads of plutonium did Johnny have? Six!  | petro@
-- Breeder reactor ad from the glory days of nuclear power   | bounty.org




Re: What email encryption is actually in use?

2002-09-30 Thread Joseph Ashwood

- Original Message -
From: James A. Donald [EMAIL PROTECTED]
 What email encryption is actually in use?

In my experience PGP is the most used.

 When I get a PGP encrypted message, I usually cannot read it --
 it is sent to my dud key or something somehow goes wrong.

Then you are obviously using PGP wrong. When you choose your 768-bit key in
1996 (I checked the key servers) you should have considered the actual
lifetime that the key was going to have. In 1996 a 768-bit key was
considered borderline secure, and it was just about time to retire them.
Instead of looking at this and setting an expiration date on your key, you
instead choose to make it live forever. Your other alternative would have
been to revoke that key before you retired it. You made critical mistakes,
and you blame it on PGP.

As to it's dependability. I've seen two problems when someone could not
decrypt the PGP message; 1) They shouldn't have access to it (someone elses
key, forgot passphrase, etc), 2) They didn't have any clue how to use PGP,
these people generally have trouble turning on their computer. On rare
occassions there will be issues with versions, but in my experience these
are exceptionally rare.

 Kong encrypted messages usually
 work, because there is only one version of the program, and key
 management is damn near non existent by design, since my
 experience as key manager for various companies shows that in
 practice keys just do not get managed. After I release the next
 upgrade, doubtless fewer messages will work.

Maybe you should have considered designing the system so that it could be
upgraded. A properly designed system can detect when an incompatible version
was used for encryption, and can inform the user of the problem.
Additionally I think there is one core reason why Kong decryptions always
work, no one uses it, without key management it is basically worthless.
Fortunately because there is no userbase you can change it dramatically for
the next release, maybe this time it'll be worth using.

 The most widely deployed encryption is of course that which is
 in outlook -- which we now know to be broken, since
 impersonation is trivial, making it fortunate that seemingly no
 one uses it.

If you did some research, you'd find that it is called S/MIME, it is a
standard, a broken standard, but a standard (admittedly Outlook implemented
it poorly and that is a major source of the breakage). The only non-standard
encryption outlook uses is in the file storage, which has nothing to do with
email.

 Repeating the question, so that it does not get lost in the
 rant.  To the extent that real people are using digitally
 signed and or encrypted messages for real purposes, what is the
 dominant technology, or is use so sporadic that no network
 effect is functioning, so nothing can be said to be dominant?

The two big players are PGP and S/MIME.


 The chief barrier to use of outlook's email encryption, aside
 from the fact that is broken, is the intolerable cost and
 inconvenience of certificate management.

Actually the chief barrier is psychological, people don't feel they should
side with the criminals by using encryption. Certificate management is
actually quite easy and cheap. It is the mistakes of people who lack any
understanding of how the system actually works that make it expensive and
inconvenient. The same applies to PGP.

 We have tools to
 construct any certificates we damn well please,

The same applies everywhere, in fact in your beloved Kong, the situation is
worse because the identities can't be managed.

 though the root
 signatures will not be recognized unless the user chooses to
 put them in.

That's right, blame your own inadequacies on everyone else, that seems to be
the standard American way now.

 Is it practical for a particular group, for
 example a corporation or a conspiracy, to whip up its own
 damned root certificate, without buggering around with
 verisign?

Of course it is, in fact there are about 140 root certificates that Internet
Explorer recognises, the majority of these have absolutely nothing to do
with Verisign. Getting it into the systems is a big more problematic.

 (Of course fixing Microsoft's design errors is
 never useful, since they will rebreak their products in new
 ways that are more ingenious and harder to fix.)

And this has nothing whatsoever to do with root certificates.

 I intended to sign this using Network Associates command line
 pgp, only to discover that pgp -sa file produced unintellible
 gibberish, that could only be made sense of by pgp, so that no
 one would be able to read it without first checking my
 signature.

Which would of course demonstrate once more that you have no clue how to use
PGP. It also demonstrates what is probably your primary source of I can't
decrypt it you are using a rather old version of PGP. While the rest of the
world has updated PGP to try to remain secure, you have managed to forgo all
semblance of security, in favor of 

Re: What email encryption is actually in use?

2002-09-30 Thread Morlock Elloi

 What email encryption is actually in use?

PGP 2.6.*, 6.*  7.* work like a charm across macs  windoze  unices provided
that one specs RSA-legacy keys and limit algo to IDEA. In other words, be 2.6.2
compatible.

If you need encryption, that is. If you don't need encryption (like in They
Will Not Come After You If They Read Your E-mail) then feel free to bitch about
interfaces and inconveniances.

If you're just bored and like to speculate and fix unbroken stuff, I suggest
one time pads distributed via $40 64 MByte USB flash drives - everything fits
there, including your mail client, your OTP interface and enough key material
to last lifetime for things you can type.

In other words, those that need crypto are taken care of, and in order to gain
resources to make sheeple use crypto you have to become Them, in which case you
don't really want sheeple to use crypto in the first place.





=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
New DSL Internet Access from SBC  Yahoo!
http://sbc.yahoo.com




What email encryption is actually in use?

2002-09-30 Thread James A. Donald

--
James A. Donald:
  We have tools to construct any certificates we damn well 
  please,

Joseph Ashwood:
 The same applies everywhere, in fact in your beloved Kong, 
 the situation is worse because the identities can't be 
 managed.

You are unfamiliar with Kong.  The situation is better, because 
it is designed to be used in the fashion that all other 
existing alternatives actually are used in practice.

James A. Donald:
  I intended to sign this using Network Associates command 
  line pgp, only to discover that pgp -sa file produced 
  unintellible gibberish, that could only be made sense of by 
  pgp, so that no one would be able to read it without first 
  checking my signature.

Joseph Ashwood:
 Which would of course demonstrate once more that you have no 
 clue how to use PGP. It also demonstrates what is probably 
 your primary source of I can't decrypt it you are using a 
 rather old version of PGP.

In fact my version is network associates version 6.5.8, which 
can supposedly decrypt any valid pgp message, and your rant 
would be considerably more impressive if you signed your 
message with a PGP signature. Doubtless you could sign it -- 
eventually, after a bit of trying, after you had spent about as 
much time farting around as I did.   The proclamation that PGP 
is usable would have been much more impressive in a message 
that actually used it.

James A. Donald:
  Here is a better fix, one that I implemented in Kong: 
  Define several signature types with the default signature 
  type ignoring those aspects of the message that are 
  difficult for the user to notice, so that if a message 
  looks pretty much the same to the user, it has the same 
  signature, by, for example, canonicalizing whitespace and 
  single line breaks, and treating the hard space (0xA0) the 
  same as the soft space. (0x20), and so on and so forth.

Joseph Ashwood:
 So it's going to be broken by design. These are critical 
 errors that will eliminate any semblance of security in your 
 program.

You are full of shit.  I challenge you to fool my 
canonicalization algorithm by modifying a message to as to 
change the apparent meaning while preserving the signature, or 
by producing a message that verifies as signed by me, while in 
fact a meaningfully different message to any that was genuinely 
signed by me.

Let see you doing some work to back up your empty words.   The
source code for my canonicalization code is on the the net.  If
you say it is broken, break it! 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 nfNdl11zVV+oWKMTt0l79zrcrelHalABSBwKeib2
 4Ts9fALHrytq8hR6Dhue492m/1vO+fYHy4Kqa6dkQ