Blacks on Blondes.
Ahh dogfart, sheer porking pleasure... http://www.sexhealth.org/problems/premature.shtml Do we really have to look far for Mongs hostility? ( J...e...al...o...u...s...) http://www.blonde-black.com/551/pix/10.jpg http://www.blonde-black.com/551/pix/11.jpg http://www.fuckedathome.com/freegallery/nadia/2/pics/18.jpg He's a well hung Chicano Mong...enjoy.
Jail House Rocked.
Riot rocks Vancouver Island jail Wednesday, January 22, 2003 corporate news report A riot by about a dozen unruly inmates at the Vancouver Island Regional Correctional Centre on Wilkinson Road caused $40,000 damage to prison property late Tuesday night. Three prisoners are now facing charges. The inmates were in a common area when the call came for lockdown at 10 p.m. But they refused to go back to their cells and began trashing the place. Of the 23 prisoners in the unit, up to half were involved in the riot. Some of the others locked themselves inside their cells to avoid being implicated in the trouble. Corrections officers negotiated a peaceful end to the incident by 1 a.m. Corrections spokesperson Wayne Willows says the living unit officer was slightly injured, but managed to call police and lock himself in an empty cell for protection. The inmates in the remand unit have been charged with committing an offence, but have not yet been tried. Although they have not been determined guilty, they are kept in custody to ensure they appear in court and cannot commit another offence. All remand inmates are housed in secure facilities that emphasize control, separation and protection. Willows says the incident appears to be spontaneous. He says the three troublemakers who were arrested didn't make any demands. But he says if the inmates have any grievances they should bring them to the institution's attention. We will hear those grievances, Willows says. Saanich police were called in to secure the perimeter of the jail, but none of the rioters breached the institution's security. Police also supplied a hostage negotiator and emergency response team. The Saanich Police Department has a protocol agreement with the corrections branch to provide support when requested. Willows says there hasn't been an incident of this magnitude at the prison in about 10 years. Last September a couple of inmates started a fire in one of the cells. Seven inmates were treated for smoke inhalation following the incident. Link: http://www.geocities.com/insurrectionary_anarchists http://www.infoshop.org/inews/stories.php?story=03/01/23/5365146
What's Your Interest in China?
Two Chinese workers tried for subversion over protests By John Chan 23 January 2003 Two Chinese workers' leaders-Yao Fuxin, 52, and Xiao Yunliang, 56-could face the death penalty if found guilty of charges related to their role in demonstrations of laid-off workers in the city of Liaoyang in north-east China last March. As many as 30,000 workers participated in the protests to demand financial assistance and the prosecution of corrupt officials. Local police have held Yao and Xiao in detention for the 10 months. On January 15, the two were dragged before the Liaoyang Intermediate Peoples Court to face charges of subversion. A verdict is expected to be announced in the next few days. The detention and trial of the two workers has been a politically-motivated farce from start to finish. Chinese authorities have flouted even the limited legal rights available to the detainees under the country's constitution. Originally charged with organising an illegal gathering and demonstration, the two should have been tried or released by last October. In November, however, new charges of terrorism were brought, based on false claims that cars had been bombed during the March protests. Prior to last week's trial, the previous charges were dropped. A decision was obviously taken at the top levels of the Stalinist bureaucracy to make an example of the two workers by trying them on the political charge of subversion, which is notoriously vague and carries more serious penalties. The court proceedings were surrounded by tight security. Chinese authorities ignored the standard procedure of providing three days notice and announced the case on the day of the trial. Most of the 200 tickets to the public galleries had already been distributed to police officers and government officials in order to ensure that few of Yao and Xiao's supporters were in court. Despite the short notice, hundreds of workers gathered outside the court building to register their protest against the proceedings. Police blocked off the streets near the trial and established a substantial presence in workers' neighbourhoods. A French journalist attempting to cover the case was detained and forced to return to Beijing. Prior to the trial, police cut the phone lines of other local leaders-Wang Zhaoming and Pang Qingxiang-and threatened their families if protests took place. Wang, who disappeared from his home on New Year's Eve, has since returned home but was warned not to discuss the trial. The trial itself took only four hours. The prosecutors called no witnesses to testify and presented little evidence. The only basis for the accusations of subverting the government was that Yao and Xiao had contacts with foreign news services, human rights groups and the banned China Democracy Party. Phone records of conversations were submitted. The prosecution produced one statement from another protest leader, Pang Qingxiang, who was arrested along with Yao and Xiao in March. He had obviously been pressured to incriminate his fellow detainees. He was released after he alleged that Yao had had contact with the China Democracy Party. Based upon Pang's statement, the court accused Yao of signing a Democracy Party petition letter in 1998. Yao was also accused of having communication with a hostile element-Han Dongfang, director of the Hong Kong-based China Labour Bulletin and the expelled leader of the Beijing Workers Autonomous Union, which played a prominent role in the 1989 protests in Tienanmen Square and elsewhere. Han immediately told the media that the Chinese authorities had made up the story and accused them of turning the trial into a showcase to deter other workers from taking action. According to a report in the Washington Post: When given a chance to speak, Xiao mocked the charges against him, asking how an unemployed worker like himself could overthrow the government, audience members said. Yao delivered a more emotional statement, they said, arguing the everything he did was for his fellow workers and shedding tears as he described how poor they were. Some workers in the gallery wept too, and police forced them to leave the courtroom. Mo Shaoping, defence lawyer for the two workers, told Reuters after the hearing that the prosecution had just accused them of this crime but had provided no concrete evidence in court. He said the two defendants were not guilty and felt the accusations were false. It is highly unlikely, however, that China's politically subservient court system will do anything other than bring down the required guilty verdict and a harsh penalty. Yao's daughter was quoted in the Washington Post as saying: We're not optimistic. We still have hope, but we're very worried. A signal to investors The newly installed Chinese Communist Party leadership has clearly decided to prosecute Yao and Xiao both as a warning to workers and as a signal to foreign investors that the regime will not
The Trafficante Family is the original team of buccaneers in Tampa.
Tampa Bay Buccaneers The Trafficante Family is the original team of buccaneers in Tampa Related Resources Mobs Outside New York Elsewhere on the Web The Tampa Mob With the Tampa Bay Buccaneers in the Super Bowl for the first time, the spotlight is shining once again on that West Florida city. For the community, the Super Bowl appearance means millions in revenue from T-shirt sales, party supplies and increased restaurant sales. For the underworld, the Bucs accomplishment means lots of illegal gambling. Associated and independent bookies alike will be taking a lot of action on the Super Bowl and that means money for what remains of the Trafficante family. You can be sure that somewhere, the Trafficantes, Santos junior and senior, are smiling with all of the action their family bookmakers must be taking these days. Times have certainly changed in the Tampa-St. Petersburg area from when Santos Senior took control of the Florida mob from Ignacio Antinori in 1940. Trafficante was tough enough to go toe-to-toe with Meyer Lansky over the control of the lucrative South Florida gambling joints and smart enough to know when to back off and play ball with Lansky and the Syndicate. Along with Lansky, Trafficante built up the Cuban gaming empire which collapsed when communists took control of the island in the late 50s. Santos Sr. died in 1954 and when Castro took control of Havana, he threw Santos Trafficante Jr. on the island to oversee the gambling operations -- in jail and then threw him out of the country. The Trafficante family has had a rough run over the years, especially under the reign of Santos Jr. More than any other Mafioso, except, perhaps Sam Giancana, Santos Trafficante Jr. has been linked with government intrigue on the highest levels. His first run-in with the federal government was when he was recruited to help the CIA assassinate Fidel Castro. Under federal immunity, Trafficante testified in 1975 before Congress that he brought other mobsters into the plot out of patriotic duty. More likely, Trafficante probably used the CIA as a bank. He was given large sums of money to supply insurgents in Cuba and to buy influence with people who could get close to the Cuban leader. According to statements by Chicago mobster Johnny Roselli, who helped Trafficante with the plots, the money never left Florida. The fact that Junior managed to walk out of a Havana prison with all of his money leads many to suspect that Trafficante was a double agent who tipped Fidel to the plots against him. He may have played a large role in the failure of the Bay of Pigs fiasco, although it is more likely Santos was playing both ends against the middle. Knowing all about the invasion, Trafficante had an associate standing by in the Bahamas with a suitcase filled with gold which was to be used to buy favor with whomever took control after Castro was ousted. When the invasion collapsed, Trafficante and Lansky moved their Caribbean operations to Nassau. Trafficantes name also comes up fairly often in conspiracy theories surrounding the assassination of President John F. Kennedy, although no credible evidence exists to link the Mafia with Kennedys murder. Like his father, Santos Jr. managed to die peacefully. The Tampa mob is in a condition similar to many outside New York City. Old age, stronger methods of combating organized crime and an influx of street gang-linked criminals have reduced the influence of a once-proud family. One thing is certain, the Bucs appearance in the Super Bowl will put a great deal of cash into Tampas underworld economy. Regardless who wins next Sunday, the Tampa mob should be well juiced for months to come. http://organizedcrime.about.com/library/weekly/aa012103a.htm
Message sent by Vallen e-Mailer
charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII; charset=US-ASCII;
Are you paying too much for Auto Insurance?
Title: Save On Auto Insurance! This offer is presented to you by Great Deals Are You Paying Too Much? Compare Multiple FREE Quotes One Easy Form - Only takes Minutes Over 20 National Insurance Carriers 2002 LowerMyBills.com - You are receiving this mailing because you opted in via MillionOrbLoad6. To unsubscribe, please click here or reply to this email.
*****SPAM***** Are you a Cocaine Addict?
From the Planets Foremost Botanical Cooperative... For your absolutely legal Delight Pleasuring... The BEST ever... You must be 21 Years of age!!! SATISFACTION GUARANTEED 719-332-9352 1.) CHEN CHEN HERBA Very mellow, uplifting and happy; just a few draws of Sensitive Smoka. Clean, loose-leaf; Roll it, bowl it or smoke it with a pipe!! (pipe included) 2oz..$75.00 2.) TONGA TAI BRICK...Solid amalgamation of high-ratio; strike-alchemized,(brickened kiffened) exoticas. Indeed a Sensitive/Responsive pipe-smoking substance. Just a pinch Smokes a long, long wayA most significant remedy. Absolutely a depressive / regressive!!! (pipe included) 2oz.brick..$115.00 3.) TONGA TAI HAPPY DROPS..A breakthrough Liquid Toke for the non-smoker. Under the tongue or in juice.70+ servings. 2oz. dropper bottle..$115.00 4.) LASIVIOUS EROTOMANIA APHRODISIA DROPS Promotes both physical psychological Desire Uninhibitedness. For men women!!! Under the tongue or in juice. 45+ servings. 1 oz. dropper bottle ..$90.00 5.) HARMONY SNOOTAn inhalant powder originally designed to help end cocaine and methamphetamine dependenciesVery psychologically uplifting, very mood-enhancing, very multi-level (body-mind-spirit) energizing. Non-invasive!!! Just a little row is all you need..3 dry oz. bottle (well over 600 servings) (includes glass snooter).$85.00 6.) OOH LA LA. INTRO OFFER.Everything Above for.. $210.00.(Reg. Price.$480.00.) TO ORDER / MORE INFO please call 719-332-9352 during normal business hours. All orders shipped next day via U.S. Priority Mail. Please add $7.00 SH to all orders. All credit cards accepted. Thank you for your wonderful attention God Bless. Your email address was obtained from a purchased list, Reference # 1210-13903.If you wish to unsubscribe from this list, please email our Abuse Control Center, or call 1-888-763-2497, or write us at: NoSpam, 6484 Coral Way, Miami, FL, 33155.
[IP] Open Source TCPA driver and white papers (fwd)
-- Forwarded message -- Date: Fri, 24 Jan 2003 02:29:27 -0500 From: Dave Farber [EMAIL PROTECTED] To: ip [EMAIL PROTECTED] Subject: [IP] Open Source TCPA driver and white papers -- Forwarded Message From: David Safford [EMAIL PROTECTED] Date: Tue, 21 Jan 2003 12:05:39 -0500 To: [EMAIL PROTECTED] Subject: [open-source] Open Source TCPA driver and white papers IBM has released a Linux device driver under GPL for its TCPA chip (TPM). The driver is available at http://www.research.ibm.com/gsal/tcpa/ This page also has links to two papers, one presenting positive uses of the chip, and the second rebutting misinformation about the chip. These papers, combined with the Linux driver and the TCPA specification at http://www.trustedcomputing.org, give everyone the ability to test an actual chip (such as in the Thinkpad T30), to see for themselves what it can, and cannot do. Note: the papers and driver do not discuss Palladium. Palladium and TCPA are two separate topics. dave safford [EMAIL PROTECTED] -- End of Forwarded Message - You are subscribed as [EMAIL PROTECTED] To unsubscribe or update your address, click http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/
CCNA«ä¬ì»{ÃÒ§K¶O¸ÕŪ
Title: Untitled Document CCNA«ä¬ì»{ÃÒ§K¶O¸ÕŪ ¬Û«H¤j®a³£¤£·|ÃhºÃ«ä¬ì(Cisco)¨t²Î¦b¥þ²y³q°T³]³Æ¥«³õ¤Wªº¦û¦³²v¡A¨ä»â¥ýªºIntranet©MInternetºôµ¸¡A¥H¤Î³nµw¥ó²£«~³£¼s¨ü¤j¤p¾÷ºc±Ä¥Î¡C©Ò¥H¦pªGn§ë¨I.T¦æ·~¡A¦Ò¨ú«ä¬ì»{ÃÒ¬O´N¬O§A¥²³ÆªZ¾¹¡C 3¤p®É100%§K¶O¸ÕŪ Cisco»{ÃÒ¬O¬°±q¨Æºôµ¸¤u§@ªº¤H¤h¦Ó³]¡A¦¨¥\¦Ò¨ú¥i§U§A¦¨¥\¦w¸Ë©M°t¸mºôµ¸¡A¨Ã¼W¥[ºôµ¸ÀW¼e¡B¼W±j¥i¾a©Ê¡B¥ç´£°ªºôµ¸©Ê¯à©M¦w¥þ©Ê¡C¸ò«Ü¦h»{ÃÒ¤@¼Ë¡A«ä¬ì»{ÃÒ¤À¤TӯŧO¡A¤À§O¬OCCNA¡BCCNP©MCCIE ¡C¨ä¤¤CCNA¡]Cisco Certified Network Associate¡^ÄݤJªùµ{«×¡A¥ç¬Oªñ¦~¦æ¤º³Ì¨üÅwªïªº»{ÃÒ¤§¤@¡C¨ä¦Ò¸Õ½d³ò¤Î¤º®e«©ó²{¤µ¬y¦æªººôµ¸§Þ³N¤Î¸ô¥Ñ¾¹(Router)ªº³]©w¡A¥]¬A ¡R 1.³]©w¤lºô¸ô¡A´î¤Ö¼s¼½¥X²{°ÝÃD,´£°ªºô¸ô®Ä¯à 2.»·ºÝ Telnet ³]©w Router ¡A¦s¨ú Router ¸ê®Æ 3.³]©w ¸ô¥Ñ¾¹ªº¸ô¥Ñ¨ó©w¡C¨Ò¦p: RIP , IGRP & OSPF µ¥ 4.Switch ªº³]©w¡ASpanning-Tree Protocol¡AVirtual Lan ªº³]©w 5.OSI Model ¤§¶¡ªºÃö«Y 6.Frame Relay¡APVC ±M½uªº¬[³] 7.Access List ¡A¸T¤î/·Ç³\ºô¸ô¥\¯à 3¤p®É100%§K¶O¸ÕŪ To be removed from our mailing list, please click here.
Deniable Thumbdrive?
I got a hold of a little gadget recently that is very nearly perfect for certain forms of data storage. It's called a Thumbdrive and I bought it online somewhere (64Meg for about $179 or so). The cool thing about this drive (small enough that it has holes for use as a keychain) is that it's got a Public area and a private area, and the private area is accessible (if one desires) only via the little fingerprint reader on the top of the drive. (It's also USB based, and on Windows2000 and beyond you don't need any software drivers--just plug it in to a USB port and it appears as a drive). ANyway, I was wondering. I'd really like a nice software mod of this thing so that, depending on which finger I use for verification, a different private area on the drive will open (right now several users can be assigned access by the master user to use their fingerprint for access to the single private area). Of course, there should be no indication that there even IS more than one private area. So...anyone heard of such a hack/mod, or is there a straightforward way to go about doing it oneself? -TD _ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail
cypherpunks@minder.net
ÄúºÃ£º ÐÂÄêÀ´ÁÙÖ®¼Ê£¬¹§×£ÄúÐÂÄê¿ìÀÖ¡¢ÁúÂí¾«Éñ¡£ еÄÒ»ÄêÉúÒâÐË¡¡¢ºÃÔËÁ¬Á¬~£¡ ÕâÊÇÄúµÄÅóÓÑÍþ¶øÐŹ«Ë¾¸øÄú·¢À´×ÊÁÏ¡£Ï£Íû¶ÔÄãÓаïÖú,Èç¹û¶ÔÄãµÄ¹¤×÷´øÀ´Âé·³,ÔٴαíʾǸÒâ! ¹ãÖÝÍþ¶øО«ÃÜÒÇÆ÷ÓÐÏÞ¹«Ë¾ÊÇÒ»¼ÒרÃÅ´ÓÊÂÉú²ú¾«ÃܲâÁ¿ÒÇÆ÷µÄÖÐÍâºÏ×ÊÆóÒµ¡£ ¹«Ë¾Ö÷Òª²úÆ·£º Ô²¶ÈÒÇ£¬¶¯Ì¬²¨ÎƶÈÒÇ£¬²¨ÎƶÈÒÇ£¬ÐÎ×´²âÁ¿ÒÇ£¬ÂÖÀªÒÇ£¬¹µÇúÂÊÒÇ£¬Í¹¶ÈÒÇ£¬Ö±Ï߶ÈÒÇ£¬½Ç¶ÈÒÇ£¬Í¹ÂÖÖá²âÁ¿ÒÇ£¬Í⾶×Ô¶¯¼ì²â»úµÈ¡£ ÁªÏµÈË£ºÇðÓÀ´ï ÊÖ»ú£º013858302668 Http://cnhld.gzyp21.com E-mail: [EMAIL PROTECTED], [EMAIL PROTECTED] Èç´ËÓʼþ¶ÔÄúûÓã¬Çë˳ÊÖɾ³ý¡£Ð»Ð»¡£¡£
Danger,Danger! High Voltage!
The CIA directors idiot son is about to place a penny in the fusebox...and meanwhile in Gotham city...A reputed mob boss was charged yesterday with arranging to whack a former Mafia-busting prosecutor in a 1987 hit that was botched when misfit mobsters took out the lawyer's elderly father by mistake. Joel Joe Waverly Cacace, 61, the reputed acting boss of the Colombo crime family, was charged with four murders - including the long-unsolved death of the former prosecutor's father, 78, a judge. Also arrested were 11 other alleged Colombo family members, including reputed capo Luca DiMatteo, and one reputed Luchese associate named in an indictment on charges ranging from gambling and cigarette smuggling to extortion. Yesterday was the first time federal prosecutors identified Cacace, who could face up to 100 years in prison if convicted, as the Colombo family's acting boss. His public bow came courtesy of a 2001 wiretap of a Brooklyn jewelry store which caught an alleged wiseguy saying of Cacace: He's the captain of the team. You know what I mean? The captain went quietly yesterday when federal agents and New York City cops pulled up outside his Deer Park, L.I., home at 6 a.m. I'll be right down. Give me a few minutes, Cacace told them as he leaned out his upstairs bedroom window. The mild exit was a marked contrast to what federal prosecutors described as a career of orchestrating senseless murder and mayhem. Cacace's lawyer, Michael Macklowitz, declined to comment on the charges. Federal prosecutors said that in 1987, Carmine the Snake Persico - the jailed-for-life boss of the Colombo family - felt former federal prosecutor William Aronwald had disrespected organized crime. He ordered Cacace, then a Colombo soldier, to have him rubbed out. Cacace gave the assignment to two of his henchmen, brothers Eddie and Vincent Carini. In a tragic twist, they made a horrible mistake, Brooklyn U.S. Attorney Roslyn Mauskopf said of the brothers. The Carinis went to the law office of Aronwald's father, George, an administrative law judge for the city's Parking Violations Bureau and identified the wrong target, court papers said. They tailed the senior Aronwald from the law office he and his son - then in private practice - shared and pumped five bullets into him. The botched murder led to the rubout of four gangland hoods in an orgy of rage and revenge, the feds said. Organized-crime leaders were so furious at the fumbled 1987 hit that Cacace, under pressure, allegedly OK'd having two mobsters from other crime families kill the Carinis. The brothers were found shot to death in the back seats of separate sedans parked in Sheepshead Bay. After attending the brothers' funeral, Cacace allegedly wanted to even the score. He recruited an associate - now one of two cooperating witnesses - to carry out a broad daylight double-hit on the triggermen - Frank Santora, a Bonanno associate, and Carmine Variale, a wiseguy in the Luchese family, prosecutors said. Aronwald's slay remained unsolved until last year when a convicted drug dealer implicated in the killing of Santora and Variale began cooperating with authorities, sources said. The mob turncoat told them about Cacace orchestrating the hit on William Aronwald, the sources said. Aronwald yesterday called the arrest bittersweet. In addition to three of the Aronwald-related murders, Cacace is charged in the 1987 slaying of a corrupt ex-cop, Carlo Antonino. Detectives are also pressing their investigation into a fifth murder where Cacace has been a suspect, but never been charged - the slaying of cop Ralph Dols. The off-duty cop was ambushed in his car and executed mob-style outside his Sheepshead Bay home in 1997. In an odd twist, at the time of his death Dols was married to Cacace's ex-wife, Kim Kennaugh, who was also Eddie Carini's widow. It's an odd twist that Gaudi's buck rodgers building is actually stacking up well against the nightmarish opposition,why not go all the way with the Gotham theme and do a replica of that Stalin Tower in Moscow,you know,the apartments converted to a hotel with the spooky roof. Actually the sooner al quida come back and kill you all in your puritan beds the better,the whole worlds tired of yankee crap...take this...· · Always (Turned) On The beautiful, young women of VoyeurDorm.com spend 24 hours a day broadcasting their personal lives online. Now they're fighting a legal battle to keep their most private moments public. · · High Tech Peeping Toms Voyeurs are taking their hidden cameras out of the dressing room and onto the street in an effort to sneak a peek up the skirts and down the blouses of unsuspecting women. And they're posting the photos online. · · Selling Sex Online New breed of prostitutes are surfing the street corners of the information superhighway. They say online prostitution is safer, more lucrative, and less disruptive. The police say it's still
RE: Deniable Thumbdrive?
-- From: Tyler Durden[SMTP:[EMAIL PROTECTED]] Sent: Friday, January 24, 2003 9:52 AM To: [EMAIL PROTECTED] Subject: Deniable Thumbdrive? I got a hold of a little gadget recently that is very nearly perfect for certain forms of data storage. It's called a Thumbdrive and I bought it online somewhere (64Meg for about $179 or so). The cool thing about this drive (small enough that it has holes for use as a keychain) is that it's got a Public area and a private area, and the private area is accessible (if one desires) only via the little fingerprint reader on the top of the drive. (It's also USB based, and on Windows2000 and beyond you don't need any software drivers--just plug it in to a USB port and it appears as a drive). ANyway, I was wondering. I'd really like a nice software mod of this thing so that, depending on which finger I use for verification, a different private area on the drive will open (right now several users can be assigned access by the master user to use their fingerprint for access to the single private area). Of course, there should be no indication that there even IS more than one private area. So...anyone heard of such a hack/mod, or is there a straightforward way to go about doing it oneself? -TD Try contacting Trek and see if you can suggest it. What's you're threat model? If it's your wife or kid sister, this might work. If it's a major corporation or a government, forget it - they'll bitcopy the whole flash rom, and look at it with ease. Based on what I've seen, the fingerprint simply acts as a access control. The data on the chip is not encrypted. There are cheaper thumbdrives which use passwords which therefore don't leave any evidence binding a specific drive to a specific person - you said you wanted deniability, so leaving your thumbprint in the device is not desirable. That said, these are really neat gadgets. Our FSEs use them to carry around software tools and utilities - much easier than a box of floppies or CDs. Peter
Imagine if Adobe pulled a SCO.
Putting all your eggs in Big Brother's basket By Simon Minahan November 25 2002 Recently, federal shadow spokeswoman for IT, Kate Lundy, was bemoaning the IT straitjacket that state and federal governments are in. She was referring to recently renewed commitments to Microsoft products for the long term - and for mucho dinero. Her proposition was that it was done without sufficient thought about other solutions. Certainly when compared to the nascent global trend evident in Norway, Britain, Peru and the EU to break out from proprietary software to open source, the lack of substantial commitment - beyond a little research and a lot of rhetoric - seems, well, unquestioning and questionable. In the case of Microsoft XP products, it's a question with some serious legal undertones. For starters, there is the question of security vulnerability. As I have discussed recently, Microsoft is forever issuing patches for such vulnerabilities and one has to wonder about the implications for the security of government IT that relies on it. Then there's the whole operational philosophy of the XP model. A United States commentator, Michael Jennings, recently listed no fewer than 18 instances where XP operates by automatically and remotely connecting to Microsoft servers and exchanging data. Just what data is not clear in many cases. Neither is it clear there are only 18 instances where it happened. Coupled with the possibility that (as Jennings remarks) some security vulnerabilities have been engineered to allow US agencies to access computers running Microsoft, it starts to be a bit chilling. Admittedly there is a touch of conspiracy theory hysteria about the idea. Next, there's the whole content control push that already sees applications internally branding content produced by them and dissemination possibly being regulated by corporate clearance. Finally, factor in the licensing and contractual model Microsoft introduced with XP, where it is possible to install patches and introduce contractual amend ments remotely, and the notion of sovereignty (and the wisdom of putting the eggs in this particular basket) begins to look a little shaky. The fact is that vast slabs of the public information foundation are going to be run on systems over which Microsoft will have some opaque degree of remote control and which have a long history of security problems. And it may impede easy or complete citizen access to information and increase the likelihood of unauthorised access. In turn, this could well bring governments into conflict with legal requirements under Privacy Acts and the common law. It also leaves them hostage to a legacy rather than exploring the possibilities of spreading the business and the buying power. Lets hope these topics have been thoroughly addressed in the decision-making processes. I mean, the government would do that, right? The Microsoft experience must also make one think about committing to proprietary code systems more generally. If the biggest IT company on the globe can introduce a wholesale change to its business and legal model in one generation of manufacture, then it's possible anyone may. For instance, a reader recently wrote asking about the possible pitfalls of putting a public archive into Adobe's PDF files. My initial response was that Adobe couldn't possibly change from distributing reader technology free. It would be commercial suicide. I also wonder if there mightn't be some legal basis for holding them to the model on the grounds of a long and continuing representation that this is how the system works and will work. But then I can't recall an express promise by them that it would always be thus and haven't found one yet (on, admittedly, a brief research excursion). So, who's to say, for sure? At least open systems will stay open. The author is a Melbourne barrister who practises in intellectual property and commercial law. The information in this column is of a general nature. Readers should obtain legal advice for specific problems. The author may be contacted at [EMAIL PROTECTED] http://smh.com.au/articles/2002/11/25/1038173686615.html
Create a Paycheck with your computer
Hi there, If you're like me, you've tried other work at home opportunities and been disappointed for any number of reasons. I know you've heard this before, but this is different. This is a legitimate home-based business opportunity with a proven record of success. If you are looking for a get-rich-quick scheme this is not for you. If you are ready to make extra money, work hard to build your business, and eventually fire your boss, then this is for you. Due to our new vertical integration system, this is an excellent time to be coming in to this program. You will be able to see your business growing even before you start seriously promoting it, which will convince you of the potential this program has very quickly. Some of us do this for extra money, some are saving for the house or car they want, some have great jobs and are working toward early retirement, some need the extra money to pay the rent, some want to work exclusively out of their homes. Everyone has different goals, but we are all working in one way or another toward financial freedom. We embrace a team concept which gives people ahead of you incentive to help you succeed. The more profitable you are, the more profitable they are. Best of all, this program is free to join and you can opt out any time. To get more information send a separate e-mail (please do not reply to this one) to :[EMAIL PROTECTED] with Send Me My Free Membership in the subject line. Include your first and last name and your e-mail address (if different from above) and I will forward it at once. Remember, it won't cost a cent to test drive this program. I will be looking forward to hearing from you and to helping you make you dream of financial independence come true. Sincerely, Jennifer Jadin To be removed: Send an email to [EMAIL PROTECTED] with remove in the subject line. 9403CCql7
Too early to write off Bill Gates,( but not to assassinate him.)
Why Microsoft was right about Linux By Charles Cooper Special to ZDNet January 24, 2003, 5:53 AM PT COMMENTARY--What do you know? Microsoft was right about Linux all along. Back in 1998, when lawyers for the software company tried to debunk the federal government's monopoly charge against it, they argued that the dynamics of an operating system market were inherently fluid. That was good for a chuckle. Then Microsoft's attorneys began to talk about the competitive threat posed by the Linux open-source operating system as proof the government was talking out of its hat. That brought the house down. Cynics dismissed the argument as a transparent ploy to convince a doubting judge. The thrashing then being meted out to Microsoft by lead government attorney David Boies came close to constituting a crime against humanity. Any argument was worth a shot, but this one was the equivalent of a Hail Mary pass in the waning moments of a game. However with the passage of years, it's clear that--whatever the original motivation--Microsoft's strategists had more insight into Linux than most of the critics. Linux on Intel-based computers is now likely to become the dominant platform in corporate data centers, according to a recent report from investment bank Goldman Sachs. That puts even more pressure on Microsoft to persuade Unix users to stick with its Windows operating system on Intel systems rather than move to Linux. (That's no easy feat these days.) Indeed, if it fails to stop the groundswell, Microsoft may be forced to radically rethink its strategy as none of the company's server platform products now run on Linux. One scenario offered by analysts at First Boston has Microsoft switching gears and supporting Linux on key subsystems like Exchange and SQL Server and the .Net framework. And then there's the IBM factor to consider. Windows trounced OS/2 in a furious operating systems battle back when George Bush Sr. was president and Lou Gerstner was still busy at RJR Nabisco trying to sell folks more Velveeta and Tang. Smartly retiring from a contest it had little chance of winning, IBM left the field to Microsoft, which cemented its desktop dominance and emerged as the most powerful software company in history. There things stood for over a decade, but--F. Scott Fitzgerald aside--there are second acts. In this rematch with Microsoft, Big Blue has the stronger hand, owing to its very public embrace of Linux three years ago. IBM is bent on making a commodity out of Intel-based hardware with an operating system derived through the open-source process. Its pitch to corporate Unix customers running Sun Microsystems' Sparc or other proprietary chips is that Linux on Intel offers virtually the same performance--but at a far lower hardware price. Once they bite, that then opens the door for IBM to rake in the money selling middleware and services. If IBM pulls it off, Microsoft risks getting cut out of a lot of corporate business. The various responses out of Redmond suggest that management does not have an obvious answer to the open-source question. Bill Gates once derided the Pac-Man-like nature of the General Public License (GPL) that governs the distribution of open-source code. His trusted associate, Jim Allchin, even suggested it was an intellectual-property destroyer. All that played poorly in the press and even worse with customers who couldn't fathom how it was relevant to their business. Microsoft has since dropped the smear campaign in favor of technology comparisons that focus on a discussion of tools, the .Net framework and ways to make a company's developers more productive. Execs also are playing up what they see as the benefits of a tight integration model with a single sign-on, a common management infrastructure and a consistent user experience. Corporate customers hearing of Microsoft's new company line at LinuxWorld in New York this week won't make up their minds about all this overnight. But with spending still tight, the question of whether to buy an integrated offering or a service solution gets trumped by a simpler consideration: The stuff has to work and not cost an arm and a leg. And that is simply music to the ears of the penguinistas. http://zdnet.com.com/2100-1107-981981.html APster pool to put Bill out of our misery? (my 2 e-dinars)
Popeyed.
There are two main kinds of online advertising: pop-up ads and banners. Pop-up ads are annoying and jump up in separate browser windows. There are some programs to suppress these, such as StopZilla, PopUpCop and Web Window Killer. Not all pop-ups are unwanted so some programs let you to decide how you want to handle those at different sites. Programs such as Guidescope can filter banners. You can find them at software sites such as Tucows. http://smh.com.au/articles/2003/01/23/1042911483315.html TopBlog William Gibson William Gibson only invented cyberspace, so the appearance of his very own Weblog was sure to excite the digerati. Gibson has a history of being something of a Luddite in practice, while making accurate if somewhat dark predictions about the future. He once wrote in Wired magazine that buying old watches on the eBay auction site was his only reason for going online. Now the author of Neuromancer (where the word cyberspace was first used in print) and Snowcrash has his own little corner of the Web, where he discusses much that will excite his fans. For instance, there's the effect of drugs on his novels: Yes, I did, rather textually obviously, take some of those, most notably LSD of the old (and I gather rather different) variety, though that now seems a lifetime prior to the writing of Neuromancer. My drug of choice during the composition of Neuromancer, for the record, was O'Keefe's Extra Old Stock Lager... More relevant to the books themselves are his musings on style: There may well be people who abandon Neuromancer on the grounds that it's riddled with sentence fragments, but, in a sense, the sentence fragments are there to scare off readers who aren't ready for that, and to encourage those who want to see the envelope of language pushed even further, the pedal taken even closer to the metal. Gibson is a writer before all else, and his blog doesn't shy away from that experimental grammar - something of a relief after countless spelling-doesn't-matter-online efforts by lesser mortals. If you want that kind of thing, you can head over to the forum area to talk to other readers about Gibson's novels and questions such as whether they should be made into films, how new readers find their way to Gibson, the quality of computer games based on his books. Back on the blog, Gibson offers comments on the discussions like a benevolent ruler watching over the masses, but says: I regard my being me, ultimately, as a sort of cosmic accident. Blog this Blogger The first stop for many a young blogger, Blogger has just passed the (to be said in your best Dr. Evil voice...) 1 Million Registered Users mark. It acts as a one-stop shop, providing online blog editing via a simple logon system, as well as a choice of a blogspot.com address or pointing the blog to your own Web address. When you update your Blogger blog, it appears ever so briefly on a list on the site's heavily-trafficked front page. The service is free, but BloggerPro is a beefed-up version for advanced users or blogs that are part of a commercial enterprise. Meme of the Week The Mickey Mouse Act When the US Supreme Court upheld a law extending copyright - the so-called Mickey Mouse act - cyberspace rumbled with annoyance at the perceived bias towards big corporations such as Disney over smaller potential users of material. By early this week a proposal that would move much non-commercial material into the free public domain was being touted by Stanford University law professor Lawrence Lessig, who was lead lawyer on the Supreme Court case. Lawrence Lessig: cyberlaw.stanford.edu/lessig/blog/ Sources: daypop.com, blogdex.media.mit.edu/. http://smh.com.au/articles/2003/01/23/1042911483315.html Neal I wrote to the reporter ... To: [EMAIL PROTECTED] Subject: Neil Stephenson wrote 'Snowcrash.' not Gibson. The white man knows how to make everything, but he does not know how to distribute it. Sitting Bull
Re:Improve your Sex Life
Title: Untitled Document Have you seen this? HGH 1000 is unbelievable! Look younger + more energy + lose weight in three weeks. AS SEEN ON NBC, CBS, CNN, AND OPRAH. THE HEALTH DISCOVERY THAT ACTUALLY REVERSES AGING WHILE BURNING FAT WITHOUT DIETING OR EXERCISE Free month's supply of HGH 1000 This proven discovery has been reported on by the New England Journal of Medicine. Forget aging and dieting forever. And it's Guaranteed. WOULD YOU LIKE TO LOSE WEIGHT WHILE YOU SLEEP? No dieting. No hunger pains. No Cravings. No strenuous exercise. Change your life forever. Click Here to Learn How you can Receive a Full Month's Supply of HGH 1000 Absolutely FREE 1. Body Fat Loss82% improvement. 2. Wrinkle Reduction.61% improvement. 3. Energy Level..84% improvement. 4. Muscle Strength.88% improvement. 5. Sexual Potency...75% improvement. 6. Emotional Stability.67% improvement. 7. Memory..62% improvement. Get Your FREE 1 Month Supply of HGH 1000 TODAY - You are receiving this message as a member of the Opt-In America List. To be taken out of the data base please go here. We honor all remove requests.
Is Heather McDonald a Cunt?
http://www.weeklystandard.com/Content/Public/Articles/000/000/002/137dvufs.asp Paen to the misunderstood Totalitarian Information Agency and Ol' Capn' Queeg. ALSO! A timely warning of possible mousepox at disneyworld. You will know you have spoken the truth when you are angrily denounced; and you will know you have spoken both truly and well when you are visited by the police.
APster booster to take over from Denning.
Georgetown COSC511 Posted by Matt at 01:03 PM I've recently received an appointment as Adjunct Professor at Georgetown University to teach COSC511 Information Warfare and Security. This class was previously taught by Dorothy Denning and I am honored to take it over. If you are a student looking for the COSC511 page, you can find it by following this link. http://www.devost.net/index.shtml Matts been on techtv talking up APster for the IPO. Great stuff Matt,the cheques in the mail. This story from Business 2.0 is interesting. When thinking innovation and technology, the drug cartels probably rank just behind Amazon.com. Colombian cartels have spent billions of dollars to build one of the world's most sophisticated IT infrastructures. It's helping them smuggle more dope than ever before. Full Story The Technology Secrets of Cocaine Inc.
Protect Your Computer Against Harmful Viruses
KIvkQo *NEW-Special Package Deal!* 2003 McAfee Version 7.0 Software Suite - Home Edition- THE NAME THAT MEANS SECURITY FOR YOUR PC COMPUTER. Do not leave your PC open for a virus that could destroy your data. McAfee VirusScan is the #1 software used by Corporate Businesses to protect PCs against virus transmissions via the internet, disks, CDs or any media that might transmit damaging viruses. Businesses trust McAfee VirusScan over Norton AntiVirus to protect and safeguard millions of PCs around the world. Hsam Includes - Feature-Packed Utilities...ALL For ONE Special LOW Price! - McAfee VirusScan 7.0 - McAfee Firewall - Intuitive Interface - Scans Cleans Instant-Messenger Attachments - Faster Scanning Speeds - Received 5-Stars from PC Magazine CNET Editors's Choice Award - Scans for Viruses Faster Than Norton AntiVirus This Software Will: - Protect your computer from unwanted and hazardous viruses - Help secure your private valuable information - Allow you to transfer files and send e-mails safely Two Feature-Packed Utilities...For One Great Price! A $100-Plus Combined Retail Value! YOURS for Only $29.99! (Includes FREE** Shipping TOO!) Don't fall prey to destructive viruses or hackers! Protect your computer and your valuable information! CLICK HERE to Order Yours NOW! http://www.tldonline.com/bestbuy/mcafee/mcafee.htm If you no longer wish to receive our special offers Click Here http://www.4-greatdeals.com/bestbuy/rem.html KIvkQo3043Hsam2165833256142663emtjjnu 0475WCXB2-145hCAj3428qbwK6-026jmJb1063GAxA1-l41
Re: CDR: Re: Forget VOA -- new exec order creating Global Communications Office
On Thu, 23 Jan 2003, Bill Stewart wrote: VoA has spent the last N decades alternating between being the official US propaganda arm, and officially NOT being a US propaganda arm, just an organization we fund to make sure there's objective news reporting receivable in Communist countries (ok, ok, being the official US less-official propaganda arm) This is most likely an attempt to escape the VoA name. VoA was forever tainted by their deep Iran-Contra involvement, and like all businesses caught red-handed, a name change can often be a key survival technique. My guess is VoA thought that their forced lay-low period could come to an end with Shrub [making an attempt at] running the POTUS show, and a name change would be the most expedient way to come out of dormancy. -- Yours, J.A. Terranson [EMAIL PROTECTED] If Governments really want us to behave like civilized human beings, they should give serious consideration towards setting a better example: Ruling by force, rather than consensus; the unrestrained application of unjust laws (which the victim-populations were never allowed input on in the first place); the State policy of justice only for the rich and elected; the intentional abuse and occassionally destruction of entire populations merely to distract an already apathetic and numb electorate... This type of demogoguery must surely wipe out the fascist United States as surely as it wiped out the fascist Union of Soviet Socialist Republics. The views expressed here are mine, and NOT those of my employers, associates, or others. Besides, if it *were* the opinion of all of those people, I doubt there would be a problem to bitch about in the first place...
hey
EMAIL ADVERTISING WORKS!! SUPER EMAIL PACKAGE 250,000 $299 (NORMALLY $499) 500,000 for only $499 (NORMALLY $699) 1,000,000 for only $899 (NORMALLY $1099) 3,000,000 for only $1499 (NORMALLY $1699) Email advertising response can be as high as 5%. This generally works best in the form of lead generation, or incoming sales. Email advertising gets read, its unavoidable. Email advertising creates an immediate response. DON'T DELAY SUPER PACKAGE AVAILABLE ONLY TO FIRST 50 CUSTOMERS ONLY. Call Now! 702-442-1868 If you wish to be removed from our list please send an email to [EMAIL PROTECTED] You cannot and will not be removed by calling the above number.
Re: Atlas Shrugs in Venezuela
On Thu, Jan 23, 2003 at 05:53:04PM -0800, James A. Donald wrote: Perhaps they are exercising their will over the facilities of production and distribution by CIA microwaves beamed into people's brains :-) Given the general knownothing, lockstep mentality exhibited by the Bushites, that may well be true. Or maybe it's something in the water. Or, probably more likely, something in coca-cola, which is why Chavez just raided the coca-cola bottling plant. Don't we all know that that CNN, et al, are going to do everything possible to minimize an anti-corporate leader? No, we do not know that. Recall live from Baghdad. That's pretty irrelevant. So they reported their version of propaganda from the war zone? CNN, especially since 9/11, is, along with Fox, considered to be the most hawkish and pro-Dubbya of all the mega-corp agit/prop organizations. Recall Ted Turner's declaration that he is a socialist. Ted Turner is just another one of the NWO gang. Bush is also a socialist, as was Adoph Hitler. Just because the National Socialist Workers Party feuded with the International Socialists, or communists, didn't make it any less socialist. Fascism is still socialist, corporate welfare is still socialism, Dubbya, Klinton, and the Republicrats are all socialists of one strip or another. Note how deeply in bed Dubbya, Klinton, et al, are with the PRC. Note how willing the mega-corp are to help the PRC increase surveillance capabilities of their slaves. Radosh lists him as one of his fellow radicals. Radical? Most dictionaries define radical as someone who wants to return the gov't back to it's roots, i.e., Constitutional Jeffersonian democracy. -- Harmon Seaver CyberShamanix http://www.cybershamanix.com
Are you paying too much for Auto Insurance?
Title: Save On Auto Insurance! This offer is presented to you by Great Deals Are You Paying Too Much? Compare Multiple FREE Quotes One Easy Form - Only takes Minutes Over 20 National Insurance Carriers 2002 LowerMyBills.com - You are receiving this mailing because you opted in via 9MillionRecordLoad. To unsubscribe, please click here or reply to this email.
Re: [IP] Open Source TCPA driver and white papers (fwd)
On Fri, 24 Jan 2003, Eugen Leitl wrote: -- Forwarded message -- Date: Fri, 24 Jan 2003 02:29:27 -0500 From: Dave Farber [EMAIL PROTECTED] To: ip [EMAIL PROTECTED] Subject: [IP] Open Source TCPA driver and white papers -- Forwarded Message From: David Safford [EMAIL PROTECTED] Date: Tue, 21 Jan 2003 12:05:39 -0500 To: [EMAIL PROTECTED] Subject: [open-source] Open Source TCPA driver and white papers IBM has released a Linux device driver under GPL for its TCPA chip (TPM). The driver is available at http://www.research.ibm.com/gsal/tcpa/ This page also has links to two papers, one presenting positive uses of the chip, and the second rebutting misinformation about the chip. Thanks Eugen, It looks like the IBM TPM chip is only a key store read/write device. It has no code space for the kind of security discussed in the TCPA. The user still controls the machine and can still monitor who reads/writes the chip (using a pci bus logger for example). There is a lot of emphasis on TPM != Palladium, and TPM != DRM. TPM can not control the machine, and for DRM to work the way RIAA wants, TPM won't meet their needs. TPM looks pretty useful as it sits for real practical security tho, so I can see why IBM wants those !='s to be loud and clear. Patience, persistence, truth, Dr. mike
cypherpunks@minder.net
ÄúºÃ£º ÐÂÄêÀ´ÁÙÖ®¼Ê£¬¹§×£ÄúÐÂÄê¿ìÀÖ¡¢ÁúÂí¾«Éñ¡£ еÄÒ»ÄêÉúÒâÐË¡¡¢ºÃÔËÁ¬Á¬~£¡ ÕâÊÇÄúµÄÅóÓÑÍþ¶øÐŹ«Ë¾¸øÄú·¢À´×ÊÁÏ¡£Ï£Íû¶ÔÄãÓаïÖú,Èç¹û¶ÔÄãµÄ¹¤×÷´øÀ´Âé·³,ÔٴαíʾǸÒâ! ¹ãÖÝÍþ¶øО«ÃÜÒÇÆ÷ÓÐÏÞ¹«Ë¾ÊÇÒ»¼ÒרÃÅ´ÓÊÂÉú²ú¾«ÃܲâÁ¿ÒÇÆ÷µÄÖÐÍâºÏ×ÊÆóÒµ¡£ ¹«Ë¾Ö÷Òª²úÆ·£º Ô²¶ÈÒÇ£¬¶¯Ì¬²¨ÎƶÈÒÇ£¬²¨ÎƶÈÒÇ£¬ÐÎ×´²âÁ¿ÒÇ£¬ÂÖÀªÒÇ£¬¹µÇúÂÊÒÇ£¬Í¹¶ÈÒÇ£¬Ö±Ï߶ÈÒÇ£¬½Ç¶ÈÒÇ£¬Í¹ÂÖÖá²âÁ¿ÒÇ£¬Í⾶×Ô¶¯¼ì²â»úµÈ¡£ ÁªÏµÈË£ºÇðÓÀ´ï ÊÖ»ú£º013858302668 Http://cnhld.gzyp21.com E-mail: [EMAIL PROTECTED], [EMAIL PROTECTED] Èç´ËÓʼþ¶ÔÄúûÓã¬Çë˳ÊÖɾ³ý¡£Ð»Ð»¡£¡£
Re: Movies
Attached file:
thumdrive integrity --Deniable Thumbdrive?
WTF is the point of adding more biometric security to a device that cannot and does not support data integrity? that flash memory held within the thumbdrive keeps your data in clear text...unless of course you store everything within some form of encrypted disk. even then, the quick and dirty way to bypass the bio-security us to pull the card out of the usb enclosure and start poking at the contents. bah. Date: Fri, 24 Jan 2003 09:52:50 -0500 From: Tyler Durden [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Deniable Thumbdrive? I got a hold of a little gadget recently that is very nearly perfect for certain forms of data storage. It's called a Thumbdrive and I bought it online somewhere (64Meg for about $179 or so). The cool thing about this drive (small enough that it has holes for use as a keychain) is that it's got a Public area and a private area, and the private area is accessible (if one desires) only via the little fingerprint reader on the top of the drive. (It's also USB based, and on Windows2000 and beyond you don't need any software drivers--just plug it in to a USB port and it appears as a drive). ANyway, I was wondering. I'd really like a nice software mod of this thing so that, depending on which finger I use for verification, a different private area on the drive will open (right now several users can be assigned access by the master user to use their fingerprint for access to the single private area). Of course, there should be no indication that there even IS more than one private area. So...anyone heard of such a hack/mod, or is there a straightforward way to go about doing it oneself? -TD _ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail
Re: Deniable Thumbdrive?
Tyler Durden wrote: I got a hold of a little gadget recently that is very nearly perfect for certain forms of data storage. It's called a Thumbdrive and I bought it online somewhere (64Meg for about $179 or so). The cool thing about this drive (small enough that it has holes for use as a keychain) is that it's got a Public area and a private area, and the private area is accessible (if one desires) only via the little fingerprint reader on the top of the drive. (It's also USB based, and on Windows2000 and beyond you don't need any software drivers--just plug it in to a USB port and it appears as a drive). ANyway, I was wondering. I'd really like a nice software mod of this thing so that, depending on which finger I use for verification, a different private area on the drive will open (right now several users can be assigned access by the master user to use their fingerprint for access to the single private area). Of course, there should be no indication that there even IS more than one private area. So...anyone heard of such a hack/mod, or is there a straightforward way to go about doing it oneself? Nice! Get them to cut _all_ your fingers off instead of just one. Just say no to amputationware. Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit. - Robert Woodruff
ADV: Stop Snoring Today!
This formulation of highly effective natural herbs and enzymes work gently together to relieve snoring. You will breathe, sleep and feel better. Snoring can be dangerous to your health, and annoying to our loved ones. Safe and effective with no side effects! For information please Click Here Works the First Night, Every Night! Get your Snore RX today and get a good night's sleep tomorrow. Snore RX will not only help you sleep better and prevent annoying snoring, it will save you unnecessary embarrassment at camping sites, in thin walled cruise cabins or will stop you from bringing down the roof at you relatives' house on a family visit. 100% Money back guarantee! You have received this email because you have opted-in to receive email from Bmarket.net or its partners.If you would no longer like to receive special offers from Bmarket.net or you feel that you received this email in error, please click Unsubscribe.
Re: Deniable Thumbdrive?
Nice! Get them to cut _all_ your fingers off instead of just one. Just say no to amputationware. Use the kind of fingerprint reader that can also sense the blood flow in the finger, kinda like the heart rate sensors on some exercise machines. Dead fingers then will be of no use. ...of course, one can still take a fingerprint photograph, etch it to metal, pour thin layer of silicone over it, make a relief layer to put over one's own finger, and fool the sensor. For this you don't even need a cut-off finger, though - the access to the digitized thumbprints in ie. a police database (or the database of those stores that allow you to pay with a fingerprint, if you're there) is enough.
Printer Cartridges - Up To 80% Off Retail - Free Shipping Offer
Title: Printer Ink Cartridges Running low on ink? Up to 80% off retail prices. Running low on ink? Up to 80% off retail prices. You are receiving this email due to your membership, that entitles you to purchase Gift Certificates to your favorite stores, restaurants, etc at up to 80% off! If you wish to cancel your free subscription , please visit http://www.DiscountCertificates.com and unsubscribe. You will be removed immediately from our service.
Re: [IP] Open Source TCPA driver and white papers (fwd)
at Friday, January 24, 2003 4:53 PM, Mike Rosing [EMAIL PROTECTED] was seen to say: Thanks Eugen, It looks like the IBM TPM chip is only a key store read/write device. It has no code space for the kind of security discussed in the TCPA. The user still controls the machine and can still monitor who reads/writes the chip (using a pci bus logger for example). There is a lot of emphasis on TPM != Palladium, and TPM != DRM. TPM can not control the machine, and for DRM to work the way RIAA wants, TPM won't meet their needs. TPM looks pretty useful as it sits for real practical security tho, so I can see why IBM wants those !='s to be loud and clear. Bearing in mind though that DRM/Paladium won't work at all if it can't trust its hardware - so TPM != Paladium, but TPM (or an improved TPM) is a prerequisite.
The Digital Evolution: Freenet and the Future of Copyright on the Internet
IMHO, the article is the most reasoned, complete and balanced legal (and commonly accessible technical) analysis of the P2P scene. The direct link is http://www.lawtechjournal.com/articles/2002/05_021229_roemer.php Conclusion More legal questions and conundrums are raised with a technology like Freenet than can be currently answered. Presently, Freenet is still an enthusiast's toy and not the next or current Napster, Morpheus, etc. However, even if Freenet never gains a massive user base, the law-defying encryption and distributed caching techniques of the project will likely end up in the next generation of P2P services. The struggles over changes in the Internet, seen through the eyes of emerging technologies, demonstrate that the confrontations between copyright owners and free information advocates will only continue to escalate. This escalation will be inextricably tangled in both legal and technological complexity, as neither the law nor technology appears capable of solving these dilemmas alone. As Andrew Frank poignantly observes, P2P technologies are evolving in a Darwinian fashion, proving more resistant to technological and legal control with each iteration.183 The content industry stopped Napster. The industry may stop the FastTrack companies. It may even stop Freenet. Eventually, however, a new system, borne of the lessons of these pioneering technologies, will likely arrive that cannot be addressed within the current practical confines of copyright law. When that day comes, the content industry will perhaps have to consider (if has not already done so) how it will evolve in the ever-changing digital landscape.
ADV: Stop Snoring Today!
This formulation of highly effective natural herbs and enzymes work gently together to relieve snoring. You will breathe, sleep and feel better. Snoring can be dangerous to your health, and annoying to our loved ones. Safe and effective with no side effects! For information please Click Here Works the First Night, Every Night! Get your Snore RX today and get a good night's sleep tomorrow. Snore RX will not only help you sleep better and prevent annoying snoring, it will save you unnecessary embarrassment at camping sites, in thin walled cruise cabins or will stop you from bringing down the roof at you relatives' house on a family visit. 100% Money back guarantee! You have received this email because you have opted-in to receive email from Bmarket.net or its partners.If you would no longer like to receive special offers from Bmarket.net or you feel that you received this email in error, please click Unsubscribe.
ADV: Stop Snoring Today!
This formulation of highly effective natural herbs and enzymes work gently together to relieve snoring. You will breathe, sleep and feel better. Snoring can be dangerous to your health, and annoying to our loved ones. Safe and effective with no side effects! For information please Click Here Works the First Night, Every Night! Get your Snore RX today and get a good night's sleep tomorrow. Snore RX will not only help you sleep better and prevent annoying snoring, it will save you unnecessary embarrassment at camping sites, in thin walled cruise cabins or will stop you from bringing down the roof at you relatives' house on a family visit. 100% Money back guarantee! You have received this email because you have opted-in to receive email from Bmarket.net or its partners.If you would no longer like to receive special offers from Bmarket.net or you feel that you received this email in error, please click Unsubscribe.
ADV: Stop Snoring Today!
This formulation of highly effective natural herbs and enzymes work gently together to relieve snoring. You will breathe, sleep and feel better. Snoring can be dangerous to your health, and annoying to our loved ones. Safe and effective with no side effects! For information please Click Here Works the First Night, Every Night! Get your Snore RX today and get a good night's sleep tomorrow. Snore RX will not only help you sleep better and prevent annoying snoring, it will save you unnecessary embarrassment at camping sites, in thin walled cruise cabins or will stop you from bringing down the roof at you relatives' house on a family visit. 100% Money back guarantee! You have received this email because you have opted-in to receive email from Bmarket.net or its partners.If you would no longer like to receive special offers from Bmarket.net or you feel that you received this email in error, please click Unsubscribe.
RE: ÁÖ¹®³»¿ëÀÔ´Ï´Ù 5417CHwt8-669i-13
8652iUNr8-331qLHo8677XZWE1-457Hsrf2812CnsX2-795nSkwl488652iUNr8-331qLHo8677XZWE1-457Hsrf2812CnsX2-795nSkwl488652iUNr8-331qLHo8677XZWE1-457Hsrf2812CnsX2-795nSkwl48 1. Àü¼Û ¼º°øµÈ À̸áÁÖ¼Ò¸¸ °¡·Á»Ì¾Æ ¸¸µé¾îÁø 8¹é¸¸°³ À̸Ḯ½ºÆ®(Áߺ¹Á¦°Å, ÇѸÞÀÏÁ¦°Å) 2. Áö¿ª ¹× ¼ºº°, ³ªÀÌ·Î ºÐ·ùµÈ 3õ4¹é¸¸°³ À̸Ḯ½ºÆ®(Áߺ¹Á¦°Å, ÇѸÞÀÏÁ¦°Å) 3. À̸áÀ» ¹Þ´Â ¼¹öÀÇ ½ºÆÔÇÊÅ͸µÀ» Àß Åë°úÇÏ¿© ¹è´Þ·üÀÌ ³ôµµ·Ï Ư¼öÇÏ°Ô Àß Á¤¸®µÈ 3õ8¹é¸¸°³ À̸Ḯ½ºÆ®(Áߺ¹Á¦°Å, ÇѸÞÀÏÁ¦°Å) 4. ÇѸÞÀÏ Áּҷθ¸ ±¸¼ºµÇ¾îÁø ÇѸÞÀÏ À̸Ḯ½ºÆ® õ5¹é¸¸°³(Áߺ¹Á¦°Å) ***º¸³Ê½º Á¦Ç°: Áö±Ý À̸Ḯ½ºÆ®¸¦ ±¸ÀÔÇϽøé ÃֽŹöÁ¯ À̸á¹ß¼Û±â(±â´É:´ë·®À̸á¹ß¼Û,IP º¯È¯À¸·Î ÇѸÞÀÏÁÖ¼Ò ¹ß¼Û°¡´É,htmlÀ̸ᰡ´É,À̸Ḯ½ºÆ®Á¤¸®,¼ö½Å°ÅºÎ,À¯È¿°Ë»ç)¿Í À̸Ḯ½ºÆ® ÃßÃâ±â¸¦ À̸Ḯ½ºÆ®¿Í °°ÀÌ µå¸³´Ï´Ù*** À§ 4°¡Áö À̸Ḯ½ºÆ®(ÃÑ 9500¸¸°³ À̸áÁÖ¼Ò) ¸ðµÎ¸¦ Çϳª·Î ¹¾î¼ 15¸¸¿ø¿¡ ÆǸÅÇÕ´Ï´Ù. Àü¼Û¼º°ø 8¹é¸¸°³ À̸Ḯ½ºÆ®ÀÇ ¹ß¼Û·üÀÌ 50%ÀÌÇÏ·Î ³ª¿Ã °æ¿ì ȯºÒÇØ µå¸®°Ú½À´Ï´Ù. º¸´Ù ÀÚ¼¼ÇÑ ³»¿ë°ú ÁÖ¹®¹æ¹ýÀ» ¾Ë°í ½ÍÀ¸½Ã¸é [EMAIL PROTECTED] À¸·Î ¹®ÀÇÇØÁÖ½Ã¸é µË´Ï´Ù. Âü°í: ÀúÈñ´Â ±¤°í´ëÇ༺ñ½ºµµ ÇÕ´Ï´Ù. ¼ºñ½º·á´Â ¹ß¼Û°¹¼ö¿¡ »ó°ü¾øÀÌ 24½Ã°£ ´ÜÀ§·Î Á¤¾×Á¦·Î °è»êÇÕ´Ï´Ù. Áï °í°´µéÀÇ ±¤°íÀ̸áÀ» ÀúÈñ ¼¹ö¸¦ ÀÌ¿ëÇÏ¿© 24½Ã°£µ¿¾È ½°¾øÀÌ ¹ß¼ÛÀ» ÇÕ´Ï´Ù. À̺¥Æ®: À̸Ḯ½ºÆ®¸¦ 1¿ù¸»±îÁö ±¸ÀÔÇÏ½Ã¸é ¹ß¼Û´ëÇà 2ȸ ¹«·á±âȸ¸¦ µå¸³´Ï´Ù.(À̸Ḯ½ºÆ® ±¸ÀÔÈÄ, ±¤°íÇÒ À̸᳻¿ëÀ» º¸³»Áֽøé 24½Ã°£¾¿ 2ȸ µ¿¾È ¹ß¼Û,ÃÑ 48½Ã°£). ¼ºÀΰü·Ã±¤°í¿Í ÇǶó¹Ìµå¸ÞÀÏ°°Àº ºÒ¹ý±¤°í´Â ¹«·á¹ß¼Û´ëÇà¿¡ ÇØ´çÀÌ ¾ÈµË´Ï´Ù. ½Ñ¸À¿¡ 5¸¸¿øÂ¥¸® À̸Ḯ½ºÆ®¸¦ ±¸ÀÔÇÏ½Ã°í ¾²·¹±âó·³ ¾µ¸ð¾ø´Ù´Â »ç½Ç¿¡ ³î¶ó½Å ºÐµé ¸¹À¸½Ç²®´Ï´Ù. ±×·± À̸Ḯ½ºÆ® ºÙÀâ°í ½âÈ÷ÀÚ´Ï ¾Æ±õ°í ¹ß¼ÛÇÏÀÚ´Ï Á×°¬´Ù°í ´À³¢½Ç ²®´Ï´Ù. ±×·± ºÐµéÀº ÀúÈñÀÇ À̸Ḯ½ºÆ®¸¦ °¡Áö°í ´Ù½Ã ¿ø±â¸¦ ȸº¹ÇÏ½Ã±æ ¹Ù¶ø´Ï´Ù. ±¤°í´Â »ç¾÷ÀÇ ¿øµ¿·ÂÀÔ´Ï´Ù. ±¤°íÀÚü¸¦ Æ÷±âÇÒ ¼ø ¾ø´Â ÀÏÀÔ´Ï´Ù. »ç¾÷ÇϽô ´Ôµé, ÈÀÌÆÃ!! ÀÌ ¸ÞÀÏÀº ȸ½ÅÀÌ µÇÁö ¾Ê½À´Ï´Ù. ¼ö½Å°ÅºÎ´Â ¿©±â¸¦ Ŭ¸¯ÇØ ÁÖ¼¼¿ä. If you prefer not to receive further e-mails of this type from us, please Click here 1527YlXy8-780pDBN0904CnLJ1-958saky1035foHf7-764YdHh686l51
False Alarm
A device that appeared to be a bomb on a vehicle parked outside Simpson's Hardware and Sports on Wesmark Boulevard kept local and state authorities busy for nearly four hours Friday before the object was found to be a tracking system placed on the car by the driver's wife. http://www.theitem.com/CityDesk/030118a_news.cfm
RESPONSE NEEDED.
PRINCE JOHN ILLIASU, URGENT AND CONFIDENTIAL ASSISTANCE Dear Sir/madam, We are sending this letter to you based on information gathered from the Foreign Trade Office of the Nigerian Chambers of Commerce Industry. We believe that you would be in a better position to help us in our bid to transfer the sum of Thirty Five Million, Five Hundred Thousand United states Dollars (US$35.5M) only into a foreign account. We are members of the special committee for Budget and Planning of the Ministry of Petroleum and Mining. This Committee is principally concerned with contract Appraisals/Approval of contracts in order of priorities as regards capital projects of the Federal Government of Nigeria, in our position we sucessfullysecured for ourselves the sum of Thirty Five Million, Five Hundred Thousand U.S. Dollars (US$35.5M) only. This amount was accrued through undeclared windfall from sales of crude oil during the gulf war. What we need from you is to provide a safe account(s) where the funds will be transfered since we are not permitted under the civil service code of the Federal Republic of Nigeria to own or operate foreign account. It has been agreed that the owner of the account will be compensated with Four Million, Five Hundred Thousand U.S. Dollars (US$4.5M) only, while Two Million U.S. Dollars (US$2M) will be set aside to offset expenses and the payment of all the necessary and mandatory government taxes/levies involved. Kindly indicate your interest or otherwise through the above email address, to enable us unfold the mode of operation to you. Be it known toyou that all the necessary machineries has been put in place for a smooth and hitch-free execution, and take note also that once started it will not take more than 14 working days to be concluded once you give us your absolute support and co-operation. Be rest assured that this muitual beneficial transaction is 100% risk free and safe, but the utmost priority of all parties involved is confidentiality and secrecy. This letter was sent to you by one of our colleagues presently in the Netherlands for an official assignment/course. Endeavour to contact him on the above e-mail address for further clarification. God be with you as we look forward to your immediate response. Best regards. Prince John Illiasu.
Re: thumdrive integrity --Deniable Thumbdrive?
WTF is the point of adding more biometric security to a device that cannot and does not support data integrity? that flash memory held within the thumbdrive keeps your data in clear text...unless of course you store everything within some form of encrypted disk. even then, the quick and dirty way to bypass the bio-security us to pull the card out of the usb enclosure and start poking at the contents. DEFINITELY TRUE! Thumbdrive products are a good step in the right direction, but by far not long enough. Another approach is needed. The unit should be tamperproof, with more services than just a dumb mass storage device. The unit should contain a biometric sensor (eg, a fingerprint reader), a small keypad or other device to enter a PIN, and its own processor, for performing cryptographic operations. The device should support several operations for different PINs, and several PINs, which will allow several different private storage areas, different operations, and a special PIN for destruction of secure content and offering dummy content instead (See officer? I told you there are no crypto keys there!). The device should be able to keep audit log of operations. The device should store the data in encrypted form in the memory. The PIN could be part of the decryption key. The device should be able to handle the biometric reader output on its own, independently on the host computer. This architecture together with adherence to USB mass-storage standards would make us independent on any OS-specific drivers, making the device truly multiplatform. The device should be able to perform the encryption/decryption services on its own (hence the cryptographic CPU). Eg, you have an untrusted computer. You plug the device to its port, move a document from the untrusted machine to device's directory Cleartext, authorize yourself to the device with fingerprint and PIN, select the Encrypt function (which can be done eg. by a suffix to the PIN). In few seconds, you should then find the encrypted document in the device's directory Ciphertext. Similarly, the device should support write-only directory, to which you could write files freely but won't be able to retrieve them without authorization (this could allow using the device for data couriers who would be able to pick data but won't be able to read them along the way). Optionally, the unit could be usable for encryption/decryption of data streams, which would make it very useful for IP telephony. The key for crypto functions should never leave the unit. Attempt of physical compromising of the unit should result in self destruction of at least the part of the memory that keeps the keys (maybe keep them in battery-backed RAM, sealed in epoxide resin with both passive and active tamper-detection devices (including but not limited to thin wire mesh)? This way, even if the computer itself would get compromised, the only thing the adversary would be able to intercept would be the plaintexts used in the sessions with the compromised machine. Which they would be able to get using TEMPEST or a keylogger anyway. This design should be robust against hijacking of the key by eg. trojan horses.
The Secret To Being Wealthy 76-2
Dont Waste Another Minute If you are a motivated and qualified communicator I will personally demonstrate to you a system that will make you 4 figures per week or more. This is NOT mlm. Call our 24 hour pre-recorded number to get the details. Don't waste another minute. Call Now. 1-972-293-4536 I need people who want to make serious income. Make the call and get the facts. ** Invest 2 minutes in yourself now! ** 1-972-293-4536 _ Out Of Database; [EMAIL PROTECTED] {%CRAND%} 8049feYv5-396SzBK8520AhWG7-012zYUP1821bGzR5-257jmoF5718hPBK5-l57
Re: Deniable Thumbdrive?
On Fri, 24 Jan 2003, Thomas Shaddack wrote: Use the kind of fingerprint reader that can also sense the blood flow in the finger, kinda like the heart rate sensors on some exercise machines. Dead fingers then will be of no use. Photoplethysmography and photoxytometry are easy to fake once you know what you're looking for. Thin-skin translucent silicone casts of fingerprints (you can of course gather the patterns using the usual dactyloscopy paraphernalia, whether reduced iron magnetic brush or iodine/osmium tetroxide exposure) worn over live fingers would probably work. Frankly, the fingerprint is a lousy secret: you leak it all over the place. You can't help it, unless you're wearing gloves all the time. Ditto DNA.
RE: Deniable Thumbdrive?
At 11:40 AM 01/24/2003 -0500, Tyler Durden wrote: Peter Trei wrote... What's you're threat model? If it's your wife or kid sister, this might work. If it's a major corporation or a government, forget it - they'll bitcopy the whole flash rom, and look at it with ease. Agreed. Furthermore, the whole thing is inherently dependent on the processing model and programming interfaces of your thumbdrive. What does it look like to your PC if you're not using the right thumb? What does it look like to your PC if you want to use the right thumb? Three obvious models are - PC doesn't need Thumbdrive-specific drivers, just generic USB disk, and the CPU in the drive decides whether it's seen your thumb and reveals the otherwise-hidden files if it likes you. - PC has specific drivers for the Thumbdrive, Whole drive plus the thumbprint pad are visible to the PC, and you can only decrypt the secret part if you put a matching thumb on the thumbprint. - PC has specific drivers for the Thumbdrive Public drive, thumbprint pad, and hooks for secret drive are visible to the PC, and putting the correct thumb on the pad lets the PC find out the password to mount the secret drive. At this point, most of my threat models are on this level or the next one higher--local cops or dumb goons grab a protestor or whatever and try to shake his photos and whatever digital else out of him...OK punk, you're not calling a lawyer until you show me what's on this thing...Don't tell me nothing's in there I see a login prompt, ya' commie faggot...open it up. First of all, as Peter says, high-tech cops won't be fooled. Low-level goons may not recognize it, or if the thumbprint part requires specific drivers or data on the PC, you can tell them sorry, that part's for access to my work PC, and if you'd like to get a search warrant, they'll let you in the building, and make sure the public part has some pictures of your dog or whatever. For medium-tech cops, you can say that it requires installing drivers on their PC (assuming that it does), and offer to download them, and prearrange that there's a set of drivers at www.kevinmitnick.com just in case they actually take you up on it. As for the thumbprint, I'm wondering if other parts of the body could be used (then even very savvy rubberhosers couldn't just make you try every finger). I'll try using my, um, nose tonight. Depending on the interface presented to the PC, it may or may not be obvious to the PC whether there are zero, one, or more secret areas on the drive. If it's not obvious, then the obvious extension to the product would be to support multiple fingerprints for multiple secret areas, the business model being so that multiple people can use the same drive, so your right thumb gets your right-wing-conspiracy data, your left thumb gets your Commie stuff, and your middle finger gets the picture of J.Edgar Hoover in his black negligee or whatever else you want the cops to see. Otherwise, figure out which body parts you don't mind them cutting off...
Re: thumdrive integrity --Deniable Thumbdrive?
On Fri, Jan 24, 2003 at 09:51:46PM +0100, Thomas Shaddack wrote: DEFINITELY TRUE! ... The device should be able to perform the encryption/decryption services on its own (hence the cryptographic CPU). Eg, you have an untrusted computer. You plug the device to its port, move a document from the untrusted machine to device's directory Cleartext, authorize yourself to the device with fingerprint and PIN, select the Encrypt function (which can be done eg. by a suffix to the PIN). In few seconds, you should then find the encrypted document in the device's directory Ciphertext. Similarly, the device should support write-only directory, to which you could write files freely but won't be able to retrieve them without authorization (this could allow using the device for data couriers who would be able to pick data but won't be able to read them along the way). ... Good points. I've thought a lot about the possibility of such devices (I suppose they are kind of obvious/inevitable to crypto-minded people). One comment: One the of the primary uses for such a device would be in protocols requiring digital signatures. If the device is to be used for this, it would seem necessary to also include a small display on it so the user can view what the untrusted computer wants signed and authorize the signature. Of course, with a screen, it's going to be more like a PDA and less like a key-chain sized device. One of these days, I might build a little device that stores a private key and does on-board encryption using a microcontroller. I would do it just for fun, since it is pretty useless if the infrastructure to support it is not out there. John Bethencourt
SuperCobra Crash Information - WLG
SuperCobra Crash Information - WLG Regarding the Helicopter Crash while on a Drug Bust 2003.01.23 Background: News reports indicate that 2 unknown us marine helicopters crashed in the desert while assisting a DEA/Customs drug interception. News did not break until the next day that these vehicles were BOTH AH1A SuperCobra Helicopters. Apparently outfitted for recon and unarmed. Immediate news reports ALL indicated that eye witnesses can not be trusted and witnesses could not be accurate in a description of the crash US media continues to emphasize the significance of the inability for any witness to accurately describe what they saw. Witnesses have no trouble describing multiple views of an explosion, possible collision, and ground impact of these two AH1A vehicles. While information on the purpose of their mission is most likely not expected, it is not uncommon for military operations to assist in high-profile recon and interception of drugs and other materials in assistance to customs/dea/etc. There is a major problem with this story. The AH1A SuperCobra is amonst the world's most advanced military aircraft. Its capabilities for reconaissance and weapons control is extrordinary, and its onboard sensor capabilities are amongst the most advanced. Even if outfitted for DEA support operations, this vehicle will ALWAYS carry its standard onboard defense and tracking systems, as well as its standard course and threat analysis engines. In short: The AH1A is virtually INCAPABLE of being run into or running something over unless it's control systems are compromised internally. The potential for mid-air collision of MULTIPLE AH1A SuperCobra helicopters is virtually impossible, due to their constant communication and extremely advanced sensor and analysis capabilities. For TWO AH1A vehicles, in ANY situation, to run into each other, is beyond any feasible analysis under any publicly-known conditions. INTERPRETATION: Something VERY big and heavyweight came across the boarder that night. It is most likely this thing used either an advanced weapons system or communication/sensor override technology to take down the two highly advanced AH1As. Scenereo 1: Highly Unlikely: Something shot BOTH the AH1As down. First of all, the public would not hear about it. Secondly, the AH1A would know of the weapons capabilities by the time it got there, and would not allow the piolets to be stupid enough to fly into missile range. Scenereo 2: Plausible: Something jammed or intercepted/falsified communications and sensory capabilities of EITHER or BOTH AH1As, causing at least one to either automaticly (under false information) or allowably (under piolet control) run into the other. Scenereo 3: Unlikely: Someone actually flew a highly advanced helicopter into another identical unit, synchronized with realtime communication and carying automated override capabilities to respond to realtime threats, such as being run over. We can disregard Scenereo 1 due to numerous unlikely conditions. Scenereo 3 is disregarded due to the required conditions: complete system failure, piolet failure, automatia failure, and stupidity beyond belief. IMPLICATIONS: Something with highly advanced capabilities was present in the target operation. It could have most likely somehow compromised the on-board technologies of the well-reviewed AH1A's systems, or sufficiently jammed its ability to operate normally AND somehow instigated a situation where they collide. Could the props have intersected with an unexpected wind gust? A: most likely not with an AH1A SuperCobra... With other aircraft, sure, but not something this advanced. B: It would have known about the wind gust. DEDUCTIONS: Someone took down TWO AH1A SuperCobra attack helicopters. Mechanism of attack unknown and not easily deduced. It is commonly known that these systems are easily overridden, jammed, or falsified (override command control systems from remote), but ONLY by extremely advanced parties. Something associated with that convoy knew how to take the AH1As down. Given that Nothing else was damaged, including the expected numerous Customs/DEA/etc helicopters that would be used in this scenereo, it is expected that an ON-BOARD FAULT and OVERRIDE was used to voluntarily destroy the two AH1As. This could be as simple as falsifying a signal that indicates vehicle 1 is going left when its going right, vehicle 2, to its right, slams into 1 while they turn toward the same point. The problem here, is that SOMETHING knew how to jam and falsify signals and control systems on the world's most advanced line of military helicopters. What would you think? -Wilfred L. Guerin [EMAIL PROTECTED]
RESPONSE NEEDED.
PRINCE JOHN ILLIASU, URGENT AND CONFIDENTIAL ASSISTANCE Dear Sir/madam, We are sending this letter to you based on information gathered from the Foreign Trade Office of the Nigerian Chambers of Commerce Industry. We believe that you would be in a better position to help us in our bid to transfer the sum of Thirty Five Million, Five Hundred Thousand United states Dollars (US$35.5M) only into a foreign account. We are members of the special committee for Budget and Planning of the Ministry of Petroleum and Mining. This Committee is principally concerned with contract Appraisals/Approval of contracts in order of priorities as regards capital projects of the Federal Government of Nigeria, in our position we sucessfullysecured for ourselves the sum of Thirty Five Million, Five Hundred Thousand U.S. Dollars (US$35.5M) only. This amount was accrued through undeclared windfall from sales of crude oil during the gulf war. What we need from you is to provide a safe account(s) where the funds will be transfered since we are not permitted under the civil service code of the Federal Republic of Nigeria to own or operate foreign account. It has been agreed that the owner of the account will be compensated with Four Million, Five Hundred Thousand U.S. Dollars (US$4.5M) only, while Two Million U.S. Dollars (US$2M) will be set aside to offset expenses and the payment of all the necessary and mandatory government taxes/levies involved. Kindly indicate your interest or otherwise through the above email address, to enable us unfold the mode of operation to you. Be it known toyou that all the necessary machineries has been put in place for a smooth and hitch-free execution, and take note also that once started it will not take more than 14 working days to be concluded once you give us your absolute support and co-operation. Be rest assured that this muitual beneficial transaction is 100% risk free and safe, but the utmost priority of all parties involved is confidentiality and secrecy. This letter was sent to you by one of our colleagues presently in the Netherlands for an official assignment/course. Endeavour to contact him on the above e-mail address for further clarification. God be with you as we look forward to your immediate response. Best regards. Prince John Illiasu.
DONT GO TO JAIL...TOKE LEGALLY!
UNCOMMON EXOTIC PLEASURE BOTANICALS!!! Renegade Botanicals: The best in Legal Cannabis and Coke Alternatives, from Exotic Botanical Resources !!! SWEET TREAT MENU (Orders / Customer Service: Please see end of this text.) 1) STONEY MAHONEY (tm) Absolutely, the most significant Legal Personal Choice; Sensitive / Responsive Primo, non-cannabis / marijuana; non-tobacco LOOSE-LEAF SMOKA Botanical on the planet!!! 2) HARMONY SNOOT (tm) .An inhalant; MOOD FOOD designed to help overcome cocaine and methamphetamine dependencies. (Please Note: Definitive product information, pricing and introductory offers are listed in the following text.) (Please refer to Introductory Offers at bottom of this text for further savings!!) 1) Stoney Mahoney(tm) Personal Choice ~ Primo ~ Exotic Supplemental, Loose-Leaf; Smoking Botanical Grand Jester Variety / Supplemental Agenda Absinthium LabyrinthineConfiguration for most significant ENHANCEMENT PLEASURING of Body, Mind Spirit Sensitivities. Stimulation / Relaxation / Aphrodisia (Significant Paradise Consequence!!) This is the PERSONAL CHOICE SENSITIVE / RESPONSIVE SMOKING (SMOKA) PRODUCT WE HAVE BEEN WANTING TO OFFER!!! THIS IS THE PRODUCT AND THE VALUE $$$ THAT YOU HAVE BEEN SEARCHING FOR IN A PERSONAL CHOICE SENSITIVE / RESPONSIVE SMOKING PRODUCT!!! THIS IS THE PRODUCT THAT YOU WILL BUY AGAIN AGAIN!! Suffice to say, without any hype Grand Jester Variety Stoney Mahoney is without a doubt, the most significant, non-invasive, non-cannabis, Sensitive / Responsive, personal choice, absolutely legal (cannot fail a drug test), LOOSE-LEAF SMOKA botanical on our planet .probably in the universe!!! Hard to believe that this product is ABSOLUTELY LEGAL!!!. * Depressive regressive! * Psychologically uplifting! * Good-bye stress, anxiety restlessness! * Sophisticated, well-balanced ambiance. * Inspires contemplativeness and creativity . * Potentiated viripotent! * 4 5 draws lasts a good, goodly while . * Sweet aphrodisia! * Simultaneously; uplifting and relaxing! * Easy ignition. * Smooth draw . * Sweet, heady taste. * Easy on, easy off! * SATISFACTION GUARANTEED!!! * No munchie factor. * No failed drug tests! Stoney Mahoney botanical is best utilized as a viri-potent Smoka, via an herb-pipe or rolling papers. When smoking Stoney (tm), please draw gently as it is a most preeminent Sensitive / Responsive Smoke. Both a personal water-pipe (Brass huuka) (water-pipe is included with quarter pound only) and a standard herb-pipe are included for your smoking convenience and delight. Stoney Mahoney is absolutely a Sweetish Sensitive/Responsive Treat!!! Stoney Mahoney (tm) Sensitive / Responsive Smoka includes and is potentiated with the following non-irradiated, Mill-Stoned Honed, exotica botanicals and botanical essences: Dutch Lactuca Virosa, Bulgarian Artemisia absinthium, Yucatan Turnera aphrodisiaca, rare Chinese Valerian ceae, Jamaican Verbena officinalis, Spanish Peumus boldo, and European(flowering tops only) Sarothamnus Scoparius. Stoney Mahoney (tm) does not include any tobacco or any cannabis factors. Stoney Mahoney (tm) does indeed achieve gourmet distinction .upon its own merit Stoney Mahoney (tm) is not intended for use during work or while driving. Nor should it be enjoyed during pregnancy. In addition, although no factor in Stoney Mahoney (tm) is illegal or regulated, it is the ethical policy of Exotic Botanical Resources that Stoney Mahoney (tm) not be sold or offered to any person that has not attained at least 21 years of age. All things in their time ~ STONEY MAHONEY PRICING ~ one each 2 oz. bag (includes herb-pipe only) .$75.00 plus shipping two each 4 oz. bag (Quarter Pound ) (includes herb-pipe personal brass huuka)...$125.00 plus shipping To place an order via credit card or for customer assistance product information, please call 1-719-661-3442 2) HARMONY SNOOT(tm) HARMONY SNOOT A botanical supplemental aid for the alleviation of Methamphetamine Cocaine dependencies! Harmony Snoot is a brand new, one of a kind, first of its kind, ITS-ABOUT-TIME KIND, all natural, ultra-pure, ultra-refined, ultra-absorbable, ultra-sensitive botanical supplemental, inhalant formulation which has been designed and created to .and is meant to be engaged .as an holistic, power-botanical ally to help achieve the alleviation of cocaine and methamphetamine chemical dependencies and the physical, mental, spiritual and financial hardships incurred within chemical dependency.
Cypherpunks, You realy need this
Title: Special Offer
Rates at historic lows: use the power of the internet.
[EMAIL PROTECTED], Get lenders to compete for your business! Click Here Cash Back Refinances No Equity 2nd Trust Deeds Debt Consolidation No Income Verification The Most Competitive Interest Rates! Fill in our Quick Quote Form and loan officers, with access to over 250 lenders will compete for your mortgage needs. Click Here This is a FREE service! You are receiving this email as a subscriber to our mailing list. Reply to this email with the word "unsubscribe" in the subject and you will automatically be excluded from any future mailings.
Urgent Response Needed
FROM THE DESK OF DR. RUBEN ETUWE. DEAR SIR, WE ARE SENDING THIS LETTER TO YOU BASED ON INFORMATION GATHERED FROM THE FOREIGN TRADE OFFICE OF THE NIGERIAN CHAMBER OF COMMERCE AND INDUSTRY. WE BELIEVE THAT YOU WOULD BE IN A POSITION TO HELP US IN OUR BID TO TRANSFER THE SUM OF FORTY-0NE MILLION, FIVE HUNDRED THOUSAND DOLLARS ($41.5M USD) INTO A FOREIGN ACCOUNT. WE ARE MEMBERS OF THE SPECIAL COMMITTEE FOR BUDGET AND PLANNING OF THE MINISTRY OF PETROLEUM, THIS COMMITTEE IS PRINCIPALLY CONCERNED WITH CONTRACT APPRAISALS AND APPROVAL OF CONTRACTS IN ORDER OF PRIORITIES AS REGARDS CAPITAL PROJECT OF THE FEDERAL GOVERNMENT OF NIGERIA. WITH OUR POSITIONS, WE HAVE SUCCESSFULLY SECURED FOR OURSELVES THE SUM OF FORTY-ONE MILLION, FIVE HUNDRED THOUSAND UNITED STATE DOLLARS(US$41.5M). THIS AMOUNT WAS ACCUMULATED THROUGH DELIBERATE OVER-INFLATION OF CONTRACT BY MY GROUP. WHAT WE NEED FROM YOU IS TO PROVIDE A SAFE ACCOUNT INTO WHICH THE FUNDS WILL BE TRANSFERRED SINCE GOVERNMENT OFFICIALS ARE NOT ALLOWED BY OUR LAWS TO OPERATE FOREIGN ACCOUNT. IT HAS BEEN AGREED THAT THE OWNER OF THE ACCOUNT WILL BE COMPENSATED WITH US$8.3 MILLION OF THE REMITTED FUNDS, WE KEEP US$31.125MILLION WHILE US$2.075MILLION WILL BE SET ASIDE TO OFFSET EXPENSES AND PAY THE NECESSARY TAXES. IT MAY INTEREST YOU TO KNOW THAT TWO YEARS AGO A SIMILAR TRANSACTION WAS CARRIED OUT WITH ONE MR. PATRICE MILLER, THE PRESIDENT OF CRAINE INTERNATIONAL TRADING CORPORATION AT NUMBER 135, EAST 57TH STREET, 28TH FLOOR, NEW YORK 10022 WITH TELEPHONE (212)308-7788 AND TELEX NUMBER 6731689, AFTER THE AGREEMENT BETWEEN BOTH PARTNERS IN WHICH HE WAS TO TAKE 25% THE MONEY WAS DULY TRANSFERRED INTO HIS ACCOUNT ONLY TO BE DISAPPOINTED ON OUR ARRIVAL IN NEW YORK AS WE WERE RELIABLY INFORMED THAT MR. PATRICE MILLER WAS NO LONGER ON THAT ADDRESS WHILE HIS TELEPHONE AND TELEX NUMBERS HAVE BEEN REALLOCATED TO SOMEBODY ELSE, THAT IS HOW WE LOST US$27.5M TO MR PATRICE MILLER. THIS TIME AROUND WE NEED A MORE RELIABLE AND TRUSTWORTHY PERSON OR A REPUTABLE COMPANY TO DO BUSINESS WITH HENCE THIS LETTER TO YOU, SO IF YOU CAN PROVE YOURSELF TO BE TRUSTED AND INTERESTED IN THIS DEAL THEN WE ARE PREPARED TO DO BUSINESS WITH YOU. WHAT WE WANT FROM YOU IS THE ASSURANCE THAT YOU WILL LET US HAVE OUR SHARE WHEN THIS AMOUNT OF US$41.5M IS TRANSFERRED INTO YOUR ACCOUNT. IF THIS PROPOSAL SATISFIES YOU, PLEASE CONTACT ME THROUGH E-MAIL STATED ABOVE SO WE CAN ADVICE YOU ON THE MODALITIES OF THE TRANSACTION. ALL MODALITIES OF THE TRANSFER HAVE BEEN WORKED OUT AND ONCE STARTED WILL NOT TAKE MORE THAN 14 WORKING DAYS WITH THE ABSOLUTE SUPPORT OF ALL CONCERNED. THIS TRANSACTION IS 100% SAFE. PLEASE TREAT AS URGENT AND VERY CONFIDENTIAL. GOD BE WITH YOU AS I LOOK FORWARD TO YOUR REPLY. BEST REGARDS. DR. RUBEN ETUWE.
Re: Big Brotherish Laws
At 12:45 AM 12/18/2002 +, Adam Back wrote: If I recall some time ago (years ago) there was some discussion on list of using non-US drivers licenses or out-of-state drivers licenses I think to get around this problem. I thought it was Duncan Frissell or Black Unicorn who offered some opinions on this. An International Drivers' License and a real license from another country is almost always good enough to let you drive in a state you don't live in, and almost never enough to officially drive in a state you officially live in, for definitions of officially live in that are more or less flexible depending on who's asking, and what the address of your car registration is, and whether you're registered to vote there, whether you carry a passport and have a foreign accent, and whether you own a house (which is a rather visible activity) or rent (which is less visible), and whether you've got somewhere else that you appear to live, and whether your out-of-state car keeps getting parking tickets in the same city for months, and things like that. I have heard of one case where somebody was stopped in Nevada, and instead of presenting his California driver's license, if any, he presented his somewhere-in-the-Caribbean non-photo license and an international driver's license, and that was just fine for Nevada. It wouldn't have been fine if he was a Nevada resident, but he wasn't. I forget if this person was driving a company car or his own. A surprising number of people I used to know worked for corporations in Nevada and drove company cars, and seemed to have business in the Bay Area a lot, and their Nevada credit cards seemed to work just fine here. (Nevada's taxes are much lower.) But it's much tougher to do that if you're a married couple and have kids in public school. California, like many states, doesn't take a full fingerprint set, but they do take a thumbprint using a digital reader. Rubber cement is rumoured to be helpful. I don't know about Washington, but I doubt you'll have much better luck unless you want to work hard at it, at least in Seattle, at least if you're an employee who gets a salary that's reported. If you're living in Vancouver WA (across the river from Portland OR), then it's easier for you to happen to be in the other state a lot and park your car across the border every other weekend.
Re: Forget VOA -- new exec order creating Global Communications Office
At 10:45 PM 01/22/2003 +, Peter Fairbrother wrote: W H Robinson wrote: [...] with greater clarity [...] disseminate truthful, accurate, and effective messages about the American people and their government. [...] convey a few simple but powerful messages. Shouldn't Saatchi Saatchi be doing this kind of thing? Nah. Smith and Wesson. Leno Letterman. (And Dallas, and Jerry Springer, etc.) VoA has spent the last N decades alternating between being the official US propaganda arm, and officially NOT being a US propaganda arm, just an organization we fund to make sure there's objective news reporting receivable in Communist countries (ok, ok, being the official US less-official propaganda arm)
RE: Deniable Thumbdrive?
-- From: Tyler Durden[SMTP:[EMAIL PROTECTED]] Sent: Friday, January 24, 2003 9:52 AM To: [EMAIL PROTECTED] Subject: Deniable Thumbdrive? I got a hold of a little gadget recently that is very nearly perfect for certain forms of data storage. It's called a Thumbdrive and I bought it online somewhere (64Meg for about $179 or so). The cool thing about this drive (small enough that it has holes for use as a keychain) is that it's got a Public area and a private area, and the private area is accessible (if one desires) only via the little fingerprint reader on the top of the drive. (It's also USB based, and on Windows2000 and beyond you don't need any software drivers--just plug it in to a USB port and it appears as a drive). ANyway, I was wondering. I'd really like a nice software mod of this thing so that, depending on which finger I use for verification, a different private area on the drive will open (right now several users can be assigned access by the master user to use their fingerprint for access to the single private area). Of course, there should be no indication that there even IS more than one private area. So...anyone heard of such a hack/mod, or is there a straightforward way to go about doing it oneself? -TD Try contacting Trek and see if you can suggest it. What's you're threat model? If it's your wife or kid sister, this might work. If it's a major corporation or a government, forget it - they'll bitcopy the whole flash rom, and look at it with ease. Based on what I've seen, the fingerprint simply acts as a access control. The data on the chip is not encrypted. There are cheaper thumbdrives which use passwords which therefore don't leave any evidence binding a specific drive to a specific person - you said you wanted deniability, so leaving your thumbprint in the device is not desirable. That said, these are really neat gadgets. Our FSEs use them to carry around software tools and utilities - much easier than a box of floppies or CDs. Peter
Deniable Thumbdrive?
I got a hold of a little gadget recently that is very nearly perfect for certain forms of data storage. It's called a Thumbdrive and I bought it online somewhere (64Meg for about $179 or so). The cool thing about this drive (small enough that it has holes for use as a keychain) is that it's got a Public area and a private area, and the private area is accessible (if one desires) only via the little fingerprint reader on the top of the drive. (It's also USB based, and on Windows2000 and beyond you don't need any software drivers--just plug it in to a USB port and it appears as a drive). ANyway, I was wondering. I'd really like a nice software mod of this thing so that, depending on which finger I use for verification, a different private area on the drive will open (right now several users can be assigned access by the master user to use their fingerprint for access to the single private area). Of course, there should be no indication that there even IS more than one private area. So...anyone heard of such a hack/mod, or is there a straightforward way to go about doing it oneself? -TD _ Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail
[IP] Open Source TCPA driver and white papers (fwd)
-- Forwarded message -- Date: Fri, 24 Jan 2003 02:29:27 -0500 From: Dave Farber [EMAIL PROTECTED] To: ip [EMAIL PROTECTED] Subject: [IP] Open Source TCPA driver and white papers -- Forwarded Message From: David Safford [EMAIL PROTECTED] Date: Tue, 21 Jan 2003 12:05:39 -0500 To: [EMAIL PROTECTED] Subject: [open-source] Open Source TCPA driver and white papers IBM has released a Linux device driver under GPL for its TCPA chip (TPM). The driver is available at http://www.research.ibm.com/gsal/tcpa/ This page also has links to two papers, one presenting positive uses of the chip, and the second rebutting misinformation about the chip. These papers, combined with the Linux driver and the TCPA specification at http://www.trustedcomputing.org, give everyone the ability to test an actual chip (such as in the Thinkpad T30), to see for themselves what it can, and cannot do. Note: the papers and driver do not discuss Palladium. Palladium and TCPA are two separate topics. dave safford [EMAIL PROTECTED] -- End of Forwarded Message - You are subscribed as [EMAIL PROTECTED] To unsubscribe or update your address, click http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/
Re: [IP] Open Source TCPA driver and white papers (fwd)
On Fri, 24 Jan 2003, Eugen Leitl wrote: -- Forwarded message -- Date: Fri, 24 Jan 2003 02:29:27 -0500 From: Dave Farber [EMAIL PROTECTED] To: ip [EMAIL PROTECTED] Subject: [IP] Open Source TCPA driver and white papers -- Forwarded Message From: David Safford [EMAIL PROTECTED] Date: Tue, 21 Jan 2003 12:05:39 -0500 To: [EMAIL PROTECTED] Subject: [open-source] Open Source TCPA driver and white papers IBM has released a Linux device driver under GPL for its TCPA chip (TPM). The driver is available at http://www.research.ibm.com/gsal/tcpa/ This page also has links to two papers, one presenting positive uses of the chip, and the second rebutting misinformation about the chip. Thanks Eugen, It looks like the IBM TPM chip is only a key store read/write device. It has no code space for the kind of security discussed in the TCPA. The user still controls the machine and can still monitor who reads/writes the chip (using a pci bus logger for example). There is a lot of emphasis on TPM != Palladium, and TPM != DRM. TPM can not control the machine, and for DRM to work the way RIAA wants, TPM won't meet their needs. TPM looks pretty useful as it sits for real practical security tho, so I can see why IBM wants those !='s to be loud and clear. Patience, persistence, truth, Dr. mike
Re: [IP] Open Source TCPA driver and white papers (fwd)
at Friday, January 24, 2003 4:53 PM, Mike Rosing [EMAIL PROTECTED] was seen to say: Thanks Eugen, It looks like the IBM TPM chip is only a key store read/write device. It has no code space for the kind of security discussed in the TCPA. The user still controls the machine and can still monitor who reads/writes the chip (using a pci bus logger for example). There is a lot of emphasis on TPM != Palladium, and TPM != DRM. TPM can not control the machine, and for DRM to work the way RIAA wants, TPM won't meet their needs. TPM looks pretty useful as it sits for real practical security tho, so I can see why IBM wants those !='s to be loud and clear. Bearing in mind though that DRM/Paladium won't work at all if it can't trust its hardware - so TPM != Paladium, but TPM (or an improved TPM) is a prerequisite.
The Digital Evolution: Freenet and the Future of Copyright on the Internet
IMHO, the article is the most reasoned, complete and balanced legal (and commonly accessible technical) analysis of the P2P scene. The direct link is http://www.lawtechjournal.com/articles/2002/05_021229_roemer.php Conclusion More legal questions and conundrums are raised with a technology like Freenet than can be currently answered. Presently, Freenet is still an enthusiast's toy and not the next or current Napster, Morpheus, etc. However, even if Freenet never gains a massive user base, the law-defying encryption and distributed caching techniques of the project will likely end up in the next generation of P2P services. The struggles over changes in the Internet, seen through the eyes of emerging technologies, demonstrate that the confrontations between copyright owners and free information advocates will only continue to escalate. This escalation will be inextricably tangled in both legal and technological complexity, as neither the law nor technology appears capable of solving these dilemmas alone. As Andrew Frank poignantly observes, P2P technologies are evolving in a Darwinian fashion, proving more resistant to technological and legal control with each iteration.183 The content industry stopped Napster. The industry may stop the FastTrack companies. It may even stop Freenet. Eventually, however, a new system, borne of the lessons of these pioneering technologies, will likely arrive that cannot be addressed within the current practical confines of copyright law. When that day comes, the content industry will perhaps have to consider (if has not already done so) how it will evolve in the ever-changing digital landscape.
RE: Deniable Thumbdrive? (and taking signal detection seriously)
From: Tyler Durden [EMAIL PROTECTED] The cool thing about this drive (small enough that it has holes for use as a keychain) is that it's got a Public area and a private area, and the private area is accessible (if one desires) only via the little fingerprint reader on the top of the drive. (It's also USB based, and on Windows2000 and beyond you don't need any software drivers--just plug it in to a USB port and it appears as a drive). ANyway, I was wondering. I'd really like a nice software mod of this thing so that, depending on which finger I use for verification, a different private area on the drive will open (right now several users can be assigned access by the master user to use their fingerprint for access to the single private area). Of course, there should be no indication that there even IS more than one private area. 1. You should not rely on their encryption alone, you should use your own crypto on whatever you store there. You can carry your whole environment --incl. copies of tools, digsigs,and keyrings -- with you. You do, of course, have to trust the hardware/OS you use it with. If you don't know the socket, keep your dongle in your pants 2. If you use your 'nose' you need to borrow other noses to do a signal detection study ---tally hits, misses, false alarms, false positives. Then get back to us. We can even characterize and compare the performance of say human sentries this way; even measure their fatigue, perhaps. If the FAA/TSA has half a clue they've done this for their x-ray snoopers.
Re: [IP] Open Source TCPA driver and white papers (fwd)
On Fri, 24 Jan 2003, David Howe wrote: Bearing in mind though that DRM/Paladium won't work at all if it can't trust its hardware - so TPM != Paladium, but TPM (or an improved TPM) is a prerequisite. Certainly! But this TPM is really nothing more than a dongle attached to the pci bus. It will be straight forward to bypass it for many nefarious operations. Which makes me ahppy, but I suspect it won't make the RIAA very happy :-) Patience, persistence, truth, Dr. mike
RE: Deniable Thumbdrive?
Peter Trei wrote... What's you're threat model? If it's your wife or kid sister, this might work. If it's a major corporation or a government, forget it - they'll bitcopy the whole flash rom, and look at it with ease. At this point, most of my threat models are on this level or the next one higher--local cops or dumb goons grab a protestor or whatever and try to shake his photos and whatever digital else out of him...OK punk, you're not calling a lawyer until you show me what's on this thing...Don't tell me nothing's in there I see a login prompt, ya' commie faggot...open it up. This could of course be done without the thumbprint (probably better), but I think that only when you get -really- dangerous do you have to worry about highly technical people who are informed of the latest info gadgets, and who would even know there are multiple private areas. As for the thumbprint, I'm wondering if other parts of the body could be used (then even very savvy rubberhosers couldn't just make you try every finger). I'll try using my, um, nose tonight. -TD _ Protect your PC - get McAfee.com VirusScan Online http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963
Re: Deniable Thumbdrive?
Tyler Durden wrote: I got a hold of a little gadget recently that is very nearly perfect for certain forms of data storage. It's called a Thumbdrive and I bought it online somewhere (64Meg for about $179 or so). The cool thing about this drive (small enough that it has holes for use as a keychain) is that it's got a Public area and a private area, and the private area is accessible (if one desires) only via the little fingerprint reader on the top of the drive. (It's also USB based, and on Windows2000 and beyond you don't need any software drivers--just plug it in to a USB port and it appears as a drive). ANyway, I was wondering. I'd really like a nice software mod of this thing so that, depending on which finger I use for verification, a different private area on the drive will open (right now several users can be assigned access by the master user to use their fingerprint for access to the single private area). Of course, there should be no indication that there even IS more than one private area. So...anyone heard of such a hack/mod, or is there a straightforward way to go about doing it oneself? Nice! Get them to cut _all_ your fingers off instead of just one. Just say no to amputationware. Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit. - Robert Woodruff
Re: Deniable Thumbdrive?
Nice! Get them to cut _all_ your fingers off instead of just one. Just say no to amputationware. Use the kind of fingerprint reader that can also sense the blood flow in the finger, kinda like the heart rate sensors on some exercise machines. Dead fingers then will be of no use. ...of course, one can still take a fingerprint photograph, etch it to metal, pour thin layer of silicone over it, make a relief layer to put over one's own finger, and fool the sensor. For this you don't even need a cut-off finger, though - the access to the digitized thumbprints in ie. a police database (or the database of those stores that allow you to pay with a fingerprint, if you're there) is enough.
Re: thumdrive integrity --Deniable Thumbdrive?
On Fri, Jan 24, 2003 at 09:51:46PM +0100, Thomas Shaddack wrote: DEFINITELY TRUE! ... The device should be able to perform the encryption/decryption services on its own (hence the cryptographic CPU). Eg, you have an untrusted computer. You plug the device to its port, move a document from the untrusted machine to device's directory Cleartext, authorize yourself to the device with fingerprint and PIN, select the Encrypt function (which can be done eg. by a suffix to the PIN). In few seconds, you should then find the encrypted document in the device's directory Ciphertext. Similarly, the device should support write-only directory, to which you could write files freely but won't be able to retrieve them without authorization (this could allow using the device for data couriers who would be able to pick data but won't be able to read them along the way). ... Good points. I've thought a lot about the possibility of such devices (I suppose they are kind of obvious/inevitable to crypto-minded people). One comment: One the of the primary uses for such a device would be in protocols requiring digital signatures. If the device is to be used for this, it would seem necessary to also include a small display on it so the user can view what the untrusted computer wants signed and authorize the signature. Of course, with a screen, it's going to be more like a PDA and less like a key-chain sized device. One of these days, I might build a little device that stores a private key and does on-board encryption using a microcontroller. I would do it just for fun, since it is pretty useless if the infrastructure to support it is not out there. John Bethencourt
RE: Deniable Thumbdrive?
At 11:40 AM 01/24/2003 -0500, Tyler Durden wrote: Peter Trei wrote... What's you're threat model? If it's your wife or kid sister, this might work. If it's a major corporation or a government, forget it - they'll bitcopy the whole flash rom, and look at it with ease. Agreed. Furthermore, the whole thing is inherently dependent on the processing model and programming interfaces of your thumbdrive. What does it look like to your PC if you're not using the right thumb? What does it look like to your PC if you want to use the right thumb? Three obvious models are - PC doesn't need Thumbdrive-specific drivers, just generic USB disk, and the CPU in the drive decides whether it's seen your thumb and reveals the otherwise-hidden files if it likes you. - PC has specific drivers for the Thumbdrive, Whole drive plus the thumbprint pad are visible to the PC, and you can only decrypt the secret part if you put a matching thumb on the thumbprint. - PC has specific drivers for the Thumbdrive Public drive, thumbprint pad, and hooks for secret drive are visible to the PC, and putting the correct thumb on the pad lets the PC find out the password to mount the secret drive. At this point, most of my threat models are on this level or the next one higher--local cops or dumb goons grab a protestor or whatever and try to shake his photos and whatever digital else out of him...OK punk, you're not calling a lawyer until you show me what's on this thing...Don't tell me nothing's in there I see a login prompt, ya' commie faggot...open it up. First of all, as Peter says, high-tech cops won't be fooled. Low-level goons may not recognize it, or if the thumbprint part requires specific drivers or data on the PC, you can tell them sorry, that part's for access to my work PC, and if you'd like to get a search warrant, they'll let you in the building, and make sure the public part has some pictures of your dog or whatever. For medium-tech cops, you can say that it requires installing drivers on their PC (assuming that it does), and offer to download them, and prearrange that there's a set of drivers at www.kevinmitnick.com just in case they actually take you up on it. As for the thumbprint, I'm wondering if other parts of the body could be used (then even very savvy rubberhosers couldn't just make you try every finger). I'll try using my, um, nose tonight. Depending on the interface presented to the PC, it may or may not be obvious to the PC whether there are zero, one, or more secret areas on the drive. If it's not obvious, then the obvious extension to the product would be to support multiple fingerprints for multiple secret areas, the business model being so that multiple people can use the same drive, so your right thumb gets your right-wing-conspiracy data, your left thumb gets your Commie stuff, and your middle finger gets the picture of J.Edgar Hoover in his black negligee or whatever else you want the cops to see. Otherwise, figure out which body parts you don't mind them cutting off...
SuperCobra Crash Information - WLG
SuperCobra Crash Information - WLG Regarding the Helicopter Crash while on a Drug Bust 2003.01.23 Background: News reports indicate that 2 unknown us marine helicopters crashed in the desert while assisting a DEA/Customs drug interception. News did not break until the next day that these vehicles were BOTH AH1A SuperCobra Helicopters. Apparently outfitted for recon and unarmed. Immediate news reports ALL indicated that eye witnesses can not be trusted and witnesses could not be accurate in a description of the crash US media continues to emphasize the significance of the inability for any witness to accurately describe what they saw. Witnesses have no trouble describing multiple views of an explosion, possible collision, and ground impact of these two AH1A vehicles. While information on the purpose of their mission is most likely not expected, it is not uncommon for military operations to assist in high-profile recon and interception of drugs and other materials in assistance to customs/dea/etc. There is a major problem with this story. The AH1A SuperCobra is amonst the world's most advanced military aircraft. Its capabilities for reconaissance and weapons control is extrordinary, and its onboard sensor capabilities are amongst the most advanced. Even if outfitted for DEA support operations, this vehicle will ALWAYS carry its standard onboard defense and tracking systems, as well as its standard course and threat analysis engines. In short: The AH1A is virtually INCAPABLE of being run into or running something over unless it's control systems are compromised internally. The potential for mid-air collision of MULTIPLE AH1A SuperCobra helicopters is virtually impossible, due to their constant communication and extremely advanced sensor and analysis capabilities. For TWO AH1A vehicles, in ANY situation, to run into each other, is beyond any feasible analysis under any publicly-known conditions. INTERPRETATION: Something VERY big and heavyweight came across the boarder that night. It is most likely this thing used either an advanced weapons system or communication/sensor override technology to take down the two highly advanced AH1As. Scenereo 1: Highly Unlikely: Something shot BOTH the AH1As down. First of all, the public would not hear about it. Secondly, the AH1A would know of the weapons capabilities by the time it got there, and would not allow the piolets to be stupid enough to fly into missile range. Scenereo 2: Plausible: Something jammed or intercepted/falsified communications and sensory capabilities of EITHER or BOTH AH1As, causing at least one to either automaticly (under false information) or allowably (under piolet control) run into the other. Scenereo 3: Unlikely: Someone actually flew a highly advanced helicopter into another identical unit, synchronized with realtime communication and carying automated override capabilities to respond to realtime threats, such as being run over. We can disregard Scenereo 1 due to numerous unlikely conditions. Scenereo 3 is disregarded due to the required conditions: complete system failure, piolet failure, automatia failure, and stupidity beyond belief. IMPLICATIONS: Something with highly advanced capabilities was present in the target operation. It could have most likely somehow compromised the on-board technologies of the well-reviewed AH1A's systems, or sufficiently jammed its ability to operate normally AND somehow instigated a situation where they collide. Could the props have intersected with an unexpected wind gust? A: most likely not with an AH1A SuperCobra... With other aircraft, sure, but not something this advanced. B: It would have known about the wind gust. DEDUCTIONS: Someone took down TWO AH1A SuperCobra attack helicopters. Mechanism of attack unknown and not easily deduced. It is commonly known that these systems are easily overridden, jammed, or falsified (override command control systems from remote), but ONLY by extremely advanced parties. Something associated with that convoy knew how to take the AH1As down. Given that Nothing else was damaged, including the expected numerous Customs/DEA/etc helicopters that would be used in this scenereo, it is expected that an ON-BOARD FAULT and OVERRIDE was used to voluntarily destroy the two AH1As. This could be as simple as falsifying a signal that indicates vehicle 1 is going left when its going right, vehicle 2, to its right, slams into 1 while they turn toward the same point. The problem here, is that SOMETHING knew how to jam and falsify signals and control systems on the world's most advanced line of military helicopters. What would you think? -Wilfred L. Guerin [EMAIL PROTECTED]
Re: thumdrive integrity --Deniable Thumbdrive?
One of these days, I might build a little device that stores a private key and does on-board encryption using a microcontroller. I would do it just for fun, since it is pretty useless if the infrastructure to support it is not out there. Check http://developer.axis.com/products/mcm/ - this looks like a good chip. Together with embedded Linux it could be pretty useful for this purpose, could shorten the development time considerably. For $249 they offer a readymade developer board. Has built-in Ethernet and serial ports, and with a chip like FT8U232AM it could work with USB as well.
Re: Deniable Thumbdrive?
On Fri, 24 Jan 2003, Thomas Shaddack wrote: Use the kind of fingerprint reader that can also sense the blood flow in the finger, kinda like the heart rate sensors on some exercise machines. Dead fingers then will be of no use. Photoplethysmography and photoxytometry are easy to fake once you know what you're looking for. Thin-skin translucent silicone casts of fingerprints (you can of course gather the patterns using the usual dactyloscopy paraphernalia, whether reduced iron magnetic brush or iodine/osmium tetroxide exposure) worn over live fingers would probably work. Frankly, the fingerprint is a lousy secret: you leak it all over the place. You can't help it, unless you're wearing gloves all the time. Ditto DNA.
Re: thumdrive integrity --Deniable Thumbdrive?
WTF is the point of adding more biometric security to a device that cannot and does not support data integrity? that flash memory held within the thumbdrive keeps your data in clear text...unless of course you store everything within some form of encrypted disk. even then, the quick and dirty way to bypass the bio-security us to pull the card out of the usb enclosure and start poking at the contents. DEFINITELY TRUE! Thumbdrive products are a good step in the right direction, but by far not long enough. Another approach is needed. The unit should be tamperproof, with more services than just a dumb mass storage device. The unit should contain a biometric sensor (eg, a fingerprint reader), a small keypad or other device to enter a PIN, and its own processor, for performing cryptographic operations. The device should support several operations for different PINs, and several PINs, which will allow several different private storage areas, different operations, and a special PIN for destruction of secure content and offering dummy content instead (See officer? I told you there are no crypto keys there!). The device should be able to keep audit log of operations. The device should store the data in encrypted form in the memory. The PIN could be part of the decryption key. The device should be able to handle the biometric reader output on its own, independently on the host computer. This architecture together with adherence to USB mass-storage standards would make us independent on any OS-specific drivers, making the device truly multiplatform. The device should be able to perform the encryption/decryption services on its own (hence the cryptographic CPU). Eg, you have an untrusted computer. You plug the device to its port, move a document from the untrusted machine to device's directory Cleartext, authorize yourself to the device with fingerprint and PIN, select the Encrypt function (which can be done eg. by a suffix to the PIN). In few seconds, you should then find the encrypted document in the device's directory Ciphertext. Similarly, the device should support write-only directory, to which you could write files freely but won't be able to retrieve them without authorization (this could allow using the device for data couriers who would be able to pick data but won't be able to read them along the way). Optionally, the unit could be usable for encryption/decryption of data streams, which would make it very useful for IP telephony. The key for crypto functions should never leave the unit. Attempt of physical compromising of the unit should result in self destruction of at least the part of the memory that keeps the keys (maybe keep them in battery-backed RAM, sealed in epoxide resin with both passive and active tamper-detection devices (including but not limited to thin wire mesh)? This way, even if the computer itself would get compromised, the only thing the adversary would be able to intercept would be the plaintexts used in the sessions with the compromised machine. Which they would be able to get using TEMPEST or a keylogger anyway. This design should be robust against hijacking of the key by eg. trojan horses.
RE: Deniable Thumbdrive? (and taking signal detection seriously)
At 10:11 AM -0800 1/24/03, Major Variola (ret) wrote: You do, of course, have to trust the hardware/OS you use it with. If you don't know the socket, keep your dongle in your pants Given the well documented advantages of poetry over prose in ease of recall, this adage should be, If you don't know the socket, keep your dongle in your pocket. (Think codpieces.) Cheers - Bill - Bill Frantz | Due process for all| Periwinkle -- Consulting (408)356-8506 | used to be the Ameican | 16345 Englewood Ave. [EMAIL PROTECTED] | way. | Los Gatos, CA 95032, USA
Re: thumdrive integrity --Deniable Thumbdrive?
On Fri, 24 Jan 2003, Thomas Shaddack wrote: Has built-in Ethernet and serial ports, and with a chip like FT8U232AM it could work with USB as well. The 232BM version is easier to use and costs the same. Patience, persistence, truth, Dr. mike
Re: thumdrive integrity --Deniable Thumbdrive?
John Bethancourt wrote... One of these days, I might build a little device that stores a private key and does on-board encryption using a microcontroller. I would do it just for fun, since it is pretty useless if the infrastructure to support it is not out there. ...while Thomas Shaddack gave us the first go round of a Requirements document (see below). Sounds like a nice little project...Cypherpunks(TM) DenyDrive. Surely this must exist somewhere, no? Shouldn't the feds have ben using such a thing forever? Maybe we could sell them a few... -TD The unit should be tamperproof, with more services than just a dumb mass storage device. The unit should contain a biometric sensor (eg, a fingerprint reader), a small keypad or other device to enter a PIN, and its own processor, for performing cryptographic operations. The device should support several operations for different PINs, and several PINs, which will allow several different private storage areas, different operations, and a special PIN for destruction of secure content and offering dummy content instead (See officer? I told you there are no crypto keys there!). The device should be able to keep audit log of operations. The device should store the data in encrypted form in the memory. The PIN could be part of the decryption key. The device should be able to handle the biometric reader output on its own, independently on the host computer. This architecture together with adherence to USB mass-storage standards would make us independent on any OS-specific drivers, making the device truly multiplatform. The device should be able to perform the encryption/decryption services on its own (hence the cryptographic CPU). Eg, you have an untrusted computer. You plug the device to its port, move a document from the untrusted machine to device's directory Cleartext, authorize yourself to the device with fingerprint and PIN, select the Encrypt function (which can be done eg. by a suffix to the PIN). In few seconds, you should then find the encrypted document in the device's directory Ciphertext. Similarly, the device should support write-only directory, to which you could write files freely but won't be able to retrieve them without authorization (this could allow using the device for data couriers who would be able to pick data but won't be able to read them along the way). Optionally, the unit could be usable for encryption/decryption of data streams, which would make it very useful for IP telephony. The key for crypto functions should never leave the unit. Attempt of physical compromising of the unit should result in self destruction of at least the part of the memory that keeps the keys (maybe keep them in battery-backed RAM, sealed in epoxide resin with both passive and active tamper-detection devices (including but not limited to thin wire mesh)? This way, even if the computer itself would get compromised, the only thing the adversary would be able to intercept would be the plaintexts used in the sessions with the compromised machine. Which they would be able to get using TEMPEST or a keylogger anyway. This design should be robust against hijacking of the key by eg. trojan horses. _ MSN 8 with e-mail virus protection service: 2 months FREE* http://join.msn.com/?page=features/virus
Re: Forget VOA -- new exec order creating Global Communications Office
On Thu, Jan 23, 2003 at 06:15:24PM -0800, Bill Stewart wrote: VoA has spent the last N decades alternating between being the official US propaganda arm, and officially NOT being a US propaganda arm, just an organization we fund to make sure there's objective news reporting receivable in Communist countries (ok, ok, being the official US less-official propaganda arm) Yeah, it's weird. The VOA asked me to speak to some Polish journalists via satellite link a few years ago. I was curious and went ahead and did it; it was an entirely uncensored exchange. We had a conversation about press freedoms that was entirely unhindered and unrestricted by VOA. -Declan