PayPal - Notice of security problems!

2005-08-01 Thread [EMAIL PROTECTED]
Title: PayPal









Protect Your Account 
Info
Make sure you never provide your password to fraudulent websites.To safely  and 
securely access the PayPal website or your account, open a new web browser (e.g. Internet Explorer or Netscape) and 
type in the PayPal URL to be sure you are on the real PayPal website.https://www.paypal.com/us/)  to be sure you are on the real PayPal site.PayPal 
will never ask you to enter your password in an email.For more information on protecting yourself from fraud, 
please review our Security Tips  at  https://www.paypal.com/us/securitytipsProtect Your PasswordYou should never give your 
PayPal password to anyone, including PayPal employees.Notice of security 
problems !
Dear PayPal Customer,
This e-mail is the notification of recent innovations taken by PayPal to prevent security attacks at our 
servers.
  From now on all transactions of money will go through secure web server with SSL - Secure Sockets Layer support.

  Click here 
to log into 
your account

Please confirm your email address and credit card information by logging in to your PayPal account and check if 
everything is ok with your acc.



Thank you for using PayPal!
The PayPal Team
Please do not reply to this email. This mailbox is not monitored and you 
will not receive a response. For assistance, log in to your 
PayPal account and choose the Help link located in the top right corner of any PayPal page.
  To receive email notifications in plain text instead of HTML, update your preferences here.PayPal Email ID PP468
 





[Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread R.A. Hettinga

--- begin forwarded text


 Delivered-To: [EMAIL PROTECTED]
 Date: Sat, 30 Jul 2005 23:01:38 -0400
 To: Philodox Clips List [EMAIL PROTECTED]
 From: R.A. Hettinga [EMAIL PROTECTED]
 Subject: [Clips] Finger points to British intelligence as al-Qaeda websites
  are wiped out
 Reply-To: [EMAIL PROTECTED]
 Sender: [EMAIL PROTECTED]

 http://www.timesonline.co.uk/printFriendly/0,,1-523-1715166-523,00.html

 The Times of London

 July 31, 2005

 Finger points to British intelligence as al-Qaeda websites are wiped out
 Over the past fortnight Israeli intelligence agents have noticed something
 distinctly odd happening on the internet. One by one, Al-Qaeda's affiliated
 websites have vanished until only a handful remain, write Uzi Mahnaimi and
 Alex Pell.

 Someone has cut the line of communication between the spiritual leaders of
 international terrorism and their supporters. Since 9/11 the websites have
 been the main links to disseminate propaganda and information.

 The Israelis detect the hand of British intelligence, determined to torpedo
 the websites after the London attacks of July 7.

 The web has become the new battleground of terrorism, permitting a freedom
 of communication denied to such organisations as the IRA a couple of
 decades ago.

 One global jihad site terminated recently was an inflammatory Pakistani
 site, www.mojihedun.com, in which a section entitled How to Strike a
 European City gave full technical instructions. Tens of similar sites, some
 offering detailed information on how to build and use biological weapons,
 have also been shut down. However, Islamic sites believed to be moderate,
 remain.

 One belongs to the London-based Syrian cleric Abu Basir al-Tartusi, whose
 www.abubaseer.bizland.com remained operative after he condemned the London
 bombings.

 However, the scales remain weighted in favour of global jihad, the first
 virtual terror organisation. For all the vaunted spying advances such as
 tracking mobile phones and isolating key phrases in telephone
 conversations, experts believe current technologies actually play into the
 hands of those who would harm us.

 Modern technology puts most of the advantages in the hands of the
 terrorists. That is the bottom line, says Professor Michael Clarke, of
 King's College London, who is director of the International Policy
 Institute.

 Government-sponsored monitoring systems, such as Echelon, can track vast
 amounts of data but have so far proved of minimal benefit in preventing, or
 even warning, of attacks. And such systems are vulnerable to manipulation:
 low-ranking volunteers in terrorist organisations can create background
 chatter that ties up resources and maintains a threshold of anxiety. There
 are many tricks of the trade that give terrorists secure digital
 communication and leave no trace on the host computer.

 Ironically, the most readily available sources of accurate online
 information on bomb-making are the websites of the radical American
 militia. I have not seen any Al-Qaeda manuals that look like genuine
 terrorist training, claims Clarke.

 However, the sobering message of many security experts is that the
 terrorists are unlikely ever to lose a war waged with technology.

 --
 -
 R. A. Hettinga mailto: [EMAIL PROTECTED]
 The Internet Bearer Underwriting Corporation http://www.ibuc.com/
 44 Farquhar Street, Boston, MA 02131 USA
 ... however it may deserve respect for its usefulness and antiquity,
 [predicting the end of the world] has not been found agreeable to
 experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
 ___
 Clips mailing list
 [EMAIL PROTECTED]
 http://www.philodox.com/mailman/listinfo/clips

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
When the hares made speeches in the assembly and demanded that all should
have equality, the lions replied, Where are your claws and teeth?  --
attributed to Antisthenes in Aristotle, 'Politics', 3.7.2



RE: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread Tyler Durden
Gee, that's great. A global organization that has taken the task of 
worldwide censorship into its sweaty little hands.


Did the google cache'd versions of these sites dissappear too?

Tor networks, anyone?

-TD


From: R.A. Hettinga [EMAIL PROTECTED]
To: cryptography@metzdowd.com, [EMAIL PROTECTED]
Subject: [Clips] Finger points to British intelligence as al-Qaeda   
websites are wiped out

Date: Sat, 30 Jul 2005 23:02:53 -0400

--- begin forwarded text


 Delivered-To: [EMAIL PROTECTED]
 Date: Sat, 30 Jul 2005 23:01:38 -0400
 To: Philodox Clips List [EMAIL PROTECTED]
 From: R.A. Hettinga [EMAIL PROTECTED]
 Subject: [Clips] Finger points to British intelligence as al-Qaeda 
websites

  are wiped out
 Reply-To: [EMAIL PROTECTED]
 Sender: [EMAIL PROTECTED]

 http://www.timesonline.co.uk/printFriendly/0,,1-523-1715166-523,00.html

 The Times of London

 July 31, 2005

 Finger points to British intelligence as al-Qaeda websites are wiped out
 Over the past fortnight Israeli intelligence agents have noticed 
something
 distinctly odd happening on the internet. One by one, Al-Qaeda's 
affiliated
 websites have vanished until only a handful remain, write Uzi Mahnaimi 
and

 Alex Pell.

 Someone has cut the line of communication between the spiritual leaders 
of
 international terrorism and their supporters. Since 9/11 the websites 
have

 been the main links to disseminate propaganda and information.

 The Israelis detect the hand of British intelligence, determined to 
torpedo

 the websites after the London attacks of July 7.

 The web has become the new battleground of terrorism, permitting a 
freedom

 of communication denied to such organisations as the IRA a couple of
 decades ago.

 One global jihad site terminated recently was an inflammatory Pakistani
 site, www.mojihedun.com, in which a section entitled How to Strike a
 European City gave full technical instructions. Tens of similar sites, 
some

 offering detailed information on how to build and use biological weapons,
 have also been shut down. However, Islamic sites believed to be 
moderate,

 remain.

 One belongs to the London-based Syrian cleric Abu Basir al-Tartusi, whose
 www.abubaseer.bizland.com remained operative after he condemned the 
London

 bombings.

 However, the scales remain weighted in favour of global jihad, the first
 virtual terror organisation. For all the vaunted spying advances such as
 tracking mobile phones and isolating key phrases in telephone
 conversations, experts believe current technologies actually play into 
the

 hands of those who would harm us.

 Modern technology puts most of the advantages in the hands of the
 terrorists. That is the bottom line, says Professor Michael Clarke, of
 King's College London, who is director of the International Policy
 Institute.

 Government-sponsored monitoring systems, such as Echelon, can track vast
 amounts of data but have so far proved of minimal benefit in preventing, 
or
 even warning, of attacks. And such systems are vulnerable to 
manipulation:

 low-ranking volunteers in terrorist organisations can create background
 chatter that ties up resources and maintains a threshold of anxiety. 
There

 are many tricks of the trade that give terrorists secure digital
 communication and leave no trace on the host computer.

 Ironically, the most readily available sources of accurate online
 information on bomb-making are the websites of the radical American
 militia. I have not seen any Al-Qaeda manuals that look like genuine
 terrorist training, claims Clarke.

 However, the sobering message of many security experts is that the
 terrorists are unlikely ever to lose a war waged with technology.

 --
 -
 R. A. Hettinga mailto: [EMAIL PROTECTED]
 The Internet Bearer Underwriting Corporation http://www.ibuc.com/
 44 Farquhar Street, Boston, MA 02131 USA
 ... however it may deserve respect for its usefulness and antiquity,
 [predicting the end of the world] has not been found agreeable to
 experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
 ___
 Clips mailing list
 [EMAIL PROTECTED]
 http://www.philodox.com/mailman/listinfo/clips

--- end forwarded text


--
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
When the hares made speeches in the assembly and demanded that all should
have equality, the lions replied, Where are your claws and teeth?  --
attributed to Antisthenes in Aristotle, 'Politics', 3.7.2





Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread Eugen Leitl
On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote:

 Tor networks, anyone?

Caveat when running Tor on a production machine, I got DDoS'd
recently with some ~300 MBit/s. (Yes, my exit policy didn't
contain IRC).

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


[EMAIL PROTECTED]: [IP] US-VISIT RFID passes @ 3 US-CDN border xings beginning 8/4/05]

2005-08-01 Thread Eugen Leitl
- Forwarded message from David Farber [EMAIL PROTECTED] -

From: David Farber [EMAIL PROTECTED]
Date: Mon, 1 Aug 2005 11:32:33 -0400
To: Ip Ip ip@v2.listbox.com
Subject: [IP] US-VISIT RFID passes @ 3 US-CDN border xings beginning 8/4/05
X-Mailer: Apple Mail (2.733)
Reply-To: [EMAIL PROTECTED]



Begin forwarded message:

From: Ari Ollikainen [EMAIL PROTECTED]
Date: August 1, 2005 11:22:16 AM EDT
To: David Farber [EMAIL PROTECTED]
Subject: US-VISIT RFID passes @ 3 US-CDN border xings beginning 8/4/05


For IP...


High-tech border pass raises alarm

Friday, July 29, 2005 - 07:00

Local News - By Jennifer Pritchett
Whig-Standard Staff Writer

Kingston's closest U.S. border crossing will employ high-tech radio
frequency technology to monitor visitors from other countries who
want to enter the States from Canada - a move that alarms both a
Kingston privacy expert and an immigration specialist.

The U.S. Department of Homeland Security said this week that the
crossing between Lansdowne and Alexandria Bay, N.Y., will be one of
three Canada-U.S. land borders to require non-Canadians to carry
wireless devices as part of a pilot project.

Travellers will be required to carry the devices as of Aug. 4.

The technology is part of US-VISIT, a billion-dollar anti-terrorism
initiative launched last December that has kept about 700 criminals,
including one posing as a Canadian, out of the States.

US-VISIT uses biometric information from photos and fingerprints
taken from non-Canadians at border crossings to track residents from
other countries who enter the U.S.

Canadian citizens are the only people in the world exempt from US-VISIT.

Travellers required to use the technology include landed immigrants
living in Canada, Canadian citizens who are either engaged to a U.S.
citizen or who have applied for a special business visa.

They'll have to carry the wireless devices as a way for border guards
to access the electronic information stored inside a document about
the size of a large index card.

Visitors to the U.S. will get the card the first time they cross the
border and will be required the carry the document on subsequent
crossings to and from the States.

Border guards will be able to access the information electronically
from 12 metres away to enable those carrying the devices to be
processed more quickly.

Two other border crossings between Surrey, B.C., and Blaine, Wash.,
will also be implementing the technology as part of the pilot project.

Kimberly Weissman, spokeswoman for the US-VISIT program at the U.S.
Department of Homeland Security told The Whig-Standard yesterday that
the new devices can't be tracked outside the border crossing area.

It has a range of 10 to 15 metres, she said.

The UHF frequency that we've chosen makes it impossible to locate a
specific person.

But the use of the wireless technology raises alarm bells for Queen's
University law professor and privacy expert Art Cockfield.

It's intrusive and these are worrisome developments, he said.

Often these technologies are introduced in a fairly minor form and
then the technology is extended.What would be very troubling to me
would be the tracking of visitors after they've crossed the border.

Cockfield, who's part of a Queen's research group called the
Globalization of Personal Data Team, said he's so alarmed by these
new devices that his team will likely investigate them further after
learning about them yesterday.

Though the new devices don't violate Canadian law, because visitors
are under the jurisdiction of American law once inside the U.S.,
Cockfield said their use raises disturbing questions about how the
technology may be used in the future.

If I'm close to the border and still on Canadian ground and a U.S.
customs guard is scanning me and finding out personal information
about me, that actually might be a violation of Canadian law because
they're collecting information on a Canadian resident who is still in
Canada, Cockfield said.

He said the devices smack of a Martha Stewart-like prison tracking  
device.

It's one thing to have a police officer approach you and ask for
your identification, but it's another thing for somebody sitting in
an office somewhere in Washington to track all your movements through
a satellite signal, he said.

It's in the realm of possibilities.

He said the devices move the world closer to a total surveillance  
society.

It certainly tracks you as you approach the border and as you cross
the border, he said.

If we think we're subject to government surveillance, that
immediately changes our behaviour, he said. If you want to swear
about Bush, you might hold yourself back. It inhibits political
dissent because if we think the government is watching us, we'll be
less likely to call a town hall meeting to protest something we're
upset about.

Cockfield, who just moved back to Canada from a seven-year stint
teaching in Texas, also believes the devices will result in less
cross-border traffic.

I 

Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread Tyler Durden
What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but 
that sounds suspiciously like someone loaded up an OC-3's worth of traffic 
and then slammed your node. Ain't no hacker gonna do that. Any indication 
the ostensible originating IP addresses are faked?


-TD




From: Eugen Leitl [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: [Clips] Finger points to British intelligence as al-Qaeda  
websites are  wiped out

Date: Mon, 1 Aug 2005 17:15:17 +0200

On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote:

 Tor networks, anyone?

Caveat when running Tor on a production machine, I got DDoS'd
recently with some ~300 MBit/s. (Yes, my exit policy didn't
contain IRC).

--
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

[demime 1.01d removed an attachment of type application/pgp-signature which 
had a name of signature.asc]





Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread Dan McDonald
On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote:
 What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but 
 that sounds suspiciously like someone loaded up an OC-3's worth of traffic 

300Mbits (using Eugen's quote), is 2xOC-3.  (OC-3 carries 155Mbit/sec ATM,
but if it's IP/PPP/OC-3 you use more of the 155Mbits/sec).

A couple of hacked university zombie armies can generate that kind of
traffic.  I'm *not* a telecom guy, but don't most U's have at least an OC-3
out to the backbones today?

I'm surprised that the target node has that much INBOUND bandwidth, quite
frankly.

Dan



Diebold - might be of interest (fwd)

2005-08-01 Thread J.A. Terranson



-- Forwarded message --
Date: Fri, 29 Jul 2005 16:01:13 -0700
From: Lance James [EMAIL PROTECTED]
To: cryptography@metzdowd.com cryptography@metzdowd.com
Subject: Diebold - might be of interest

Hi all,

I don't know if this is appropriate on this list, but I know that
diebold voting systems have been an issue in the cryptography community
for a while now. Having said that, I'm pasting an article that I
received (from my parents actually) that might be of interest to this
group. If it is not, just moderate :)

*Subject:* Black Box

Darkness is settling over the election process in San Diego.  I say get
rid of anything electronic that has  to do with elections. Realistic
sentiment?!

Gene
VIEWING THE DIEBOLD VOTE-TALLYING SCREEN PROHIBITED

Jim March, a member of the Black Box Voting board of directors,
was arrested Tuesday evening for trying to observe the Diebold
central tabulator (vote tallying machine) as the votes were being
counted in San Diego's mayoral election (July 26).
(- online discussion: http:/www.blackboxvoting.org -)

According to Jim Hamilton, an elections integrity advocate from
San Diego, he and March visited the office of the registrar
of elections earlier in the day. During this visit, March made
two requests, which were refused by Mikel Haas, the San Diego
Registrar of elections.

1) March asked that the central tabulator, the computer that
tallies up the votes from all the precincts, be positioned so
that citizens could observe it. According to Hamilton, this
would have required simply moving a table a few feet.

2) March also asked for a copy of the .gbf files -- the vote
tally files collected during the course of tabulation - to be
provided for examination after the election.

During the tallying of the election, the Diebold computer
was positioned too far away for citizens to read the screen.
Citizens could not watch error messages, or even perceive
significant anomalies or malfunctions.

Unable to see the screen, March went into the office where the
tabulator was housed. Two deputies followed him and escorted
him out.

According to Hamilton: He was not belligerent, not at all.
After he went inside the tabulator room he came [was escorted]
out and he said clearly 'I'm not resisting.' They handcuffed
him, took him out of the building. They put him in a squad car.
They're going to take him to the police station, book him and
take him to jail, said Hamilton. He's getting charged with a
felony, 'interfering with an election official.'

March's actions are the culmination of two years of increasing
frustration with the refusal of election officials to respond to
security deficiencies in the voting machines. The software that
tallies the votes in San Diego is made by Diebold Election Systems,
a company that has already paid the state of California $2.8 million
for making false claims, due to a lawsuit filed by March and Black
Box Voting founder Bev Harris.

On July 4, a report was released by European computer security
expert Harri Hursti, revealing that the Diebold voting system
contains profound architectural flaws. It is open for business,
says Hursti, who demonstrated the flaws on Leon County, Florida
Diebold machines. He penetrated the voting system in less than
five minutes, manipulating vote reports in a way that was
undetectable.

Despite the critical security alert issued by Hursti, San Diego
County sent 713 voting machines home with poll workers, increasing
the risk that the memory cards housed in the machines could be
hacked, and removing the argument that inside access was carefully
safeguarded.

The arrest of Jim March underlines a fundamental problem facing
Americans today as, increasingly, they lose the ability to monitor,
verify, or watch any part of the counting process.

The San Diego registrar of elections knew of the security flaws in
the voting system. Diebold has never denied the vulnerability
identified in Hursti's report, found at
http://www.blackboxvoting.org/BBVreport.pdf.

Despite knowledge of the increased risks, Haas made the decision
to create additional vulnerability by sending the machines home
with hundreds of poll workers.

While San Diego officials will no doubt point to a small seal on
the compartment housing the memory card (the component exploited
in Hursti's study), Black Box Voting has interviewed a former
San Diego poll worker, who reported that all that is necessary
to dislodge and then reaffix the seal is a small pair of pliers.

IN A NUTSHELL:

- The machines have been demonstrated to be vulnerable to
undetected tampering
- The San Diego registrar of voters chose not to take
appropriate precautions
- The main tally machine was placed in a location that was
impossible for citizens to observe
- Many voting integrity advocates have come to believe that
 voting machine reform now rivals the urgency of the Civil
Rights movement in the 1960s.

Jim March acted on those beliefs.

* * * * *

If you share the feelings that Jim March 

Warning: antivirus system report

2005-08-01 Thread Mail Delivery Subsystem
Âíèìàíèå: Â îòïðàâëåííîì Âàì ñîîáùåíèå îò: '[EMAIL PROTECTED]'
îáíàðóæåí âèðóñ 'Win32:Mydoom-M [Wrm]'. Ñîîáùåíèå áûëî óäàëåíî.
Ñîîáùåíèå ñîäåðæàëî çàãîëîâîê:
Received: from minder.net ([80.73.80.54])
by mail.sakha.ru (Merak 8.0.3) with ESMTP id KJP74863
for cypherpunks@minder.net; Tue, 02 Aug 2005 09:23:34 +1000
From: The Post Office [EMAIL PROTECTED]
To: cypherpunks@minder.net
Subject: Delivery failed
Date: Tue, 2 Aug 2005 09:23:34 +1000
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary==_NextPart_000_0002_12E146CD.F5A602DB
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.


Warning: Virus 'Win32:Mydoom-M [Wrm]' detected. Message was deleted.
Message's header:
Received: from minder.net ([80.73.80.54])
by mail.sakha.ru (Merak 8.0.3) with ESMTP id KJP74863
for cypherpunks@minder.net; Tue, 02 Aug 2005 09:23:34 +1000
From: The Post Office [EMAIL PROTECTED]
To: cypherpunks@minder.net
Subject: Delivery failed
Date: Tue, 2 Aug 2005 09:23:34 +1000
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary==_NextPart_000_0002_12E146CD.F5A602DB
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.

The original message was received at Tue, 02 Aug 2005 09:23:34 +1000
The message was sent from: The Post Office [EMAIL PROTECTED]
The message was sent to: cypherpunks@minder.net

The virus found was: Win32:Mydoom-M [Wrm]
---BeginMessage---
 multipart/mixed;	boundary="=_NextPart_000_0002_12E146CD.F5A602DB": Unrecognized 
---End Message---


How to Exit the Matrix

2005-08-01 Thread anonymous
Network Forensics Evasion: How to Exit the Matrix
https://n4ez7vf37i2yvz5g.onion/howtos/ExitTheMatrix/
Tor (tor.eff.org) required

Privacy and anonymity have been eroded to the point of non-existence in recent 
years. In fact, in many workplaces, employers spy on and control their 
employees Internet access, and this practice is widely considered to be 
acceptable. How we got to a legal state where this is allowed, I'm not quite 
sure. It seems to stem from an underlying assumption that while you are at 
work, you are a slave - a single unit of economic output under the direct and 
total control of your superiors. I believe this view is wrong. This document 
seeks to provide the means to protect your right to privacy and anonymous net 
access anywhere, even under the most draconian of conditions - including, but 
not limited to, criminal investigation. So what are you saying? That I can 
dodge bullets? No.. What I am trying to tell you is that when you're ready, 
you won't have to.



Re: Well, they got what they want...

2005-08-01 Thread Steve Thompson

--- Tyler Durden [EMAIL PROTECTED] wrote:

 That's an old pattern to character assassins: I've attacked you
 publically 
 but I really don't want to have defend what I've said or reply to 
 suggestions about my own motivation.

And psychopaths are sometimes said to accuse their victims of the malice
and violence the psychopaths perpetrate.
 
 Great. Fuck you too. Hope the new Stazi grab you while you bitch and 
 complain and do nothing.

Likewise, although I rather suspect you would be one of very 'Stazi' you
pretend you hate.  But there is an up-side:  you're too fucking stupid to
be of permanent use to the 'Stazi', and so you can anticpate outliving
your usefulness eventually.


Regards,

Steve


__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 



Re: Well, they got what they want...

2005-08-01 Thread J.A. Terranson


On Mon, 1 Aug 2005, Steve Thompson wrote:

 --- Tyler Durden [EMAIL PROTECTED] wrote:

  That's an old pattern to character assassins: I've attacked you
  publically
  but I really don't want to have defend what I've said or reply to
  suggestions about my own motivation.

 And psychopaths are sometimes said to accuse their victims of the malice
 and violence the psychopaths perpetrate.

  Great. Fuck you too. Hope the new Stazi grab you while you bitch and
  complain and do nothing.

 Likewise, although I rather suspect you would be one of very 'Stazi' you
 pretend you hate.  But there is an up-side:  you're too fucking stupid to
 be of permanent use to the 'Stazi', and so you can anticpate outliving
 your usefulness eventually.

Why don't you two get a room?  I'll even subsidize it.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF


I like the idea of belief in drug-prohibition as a religion in that it is
a strongly held belief based on grossly insufficient evidence and
bolstered by faith born of intuitions flowing from the very beliefs they
are intended to support.

don zweig, M.D.



Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread J.A. Terranson

On Mon, 1 Aug 2005, Dan McDonald wrote:

 On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote:
  What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but
  that sounds suspiciously like someone loaded up an OC-3's worth of traffic

 300Mbits (using Eugen's quote), is 2xOC-3.  (OC-3 carries 155Mbit/sec ATM,
 but if it's IP/PPP/OC-3 you use more of the 155Mbits/sec).

 A couple of hacked university zombie armies can generate that kind of
 traffic.  I'm *not* a telecom guy, but don't most U's have at least an OC-3
 out to the backbones today?

 I'm surprised that the target node has that much INBOUND bandwidth, quite
 frankly.

Well, I am a telecom *and* a data guy, and I think I can clear it up :-)

First, I suspect that the Tor node did *not* have a 300mbit ingree or
egress, which is why the 300mbps was an effective DDoS ;-)

Second, as the guy who spent several years being the carrier schmuck on
call for these kinds of attacks, a 300mbps attack is a pretty small one.
Big enough to knock off the average web site or small ISP, but pretty
small from the carrier perspective.  He probably knew the sizeof the
incoming attack because the voice on the other end of the phone (the
carrier schmuck on call) told him how much data he saw coming down the
pipe at the target.


 Dan


Hopefully that'll clear some of the muddy stuff?

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF


I like the idea of belief in drug-prohibition as a religion in that it is
a strongly held belief based on grossly insufficient evidence and
bolstered by faith born of intuitions flowing from the very beliefs they
are intended to support.

don zweig, M.D.



[Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread R.A. Hettinga

--- begin forwarded text


 Delivered-To: [EMAIL PROTECTED]
 Date: Sat, 30 Jul 2005 23:01:38 -0400
 To: Philodox Clips List [EMAIL PROTECTED]
 From: R.A. Hettinga [EMAIL PROTECTED]
 Subject: [Clips] Finger points to British intelligence as al-Qaeda websites
  are wiped out
 Reply-To: [EMAIL PROTECTED]
 Sender: [EMAIL PROTECTED]

 http://www.timesonline.co.uk/printFriendly/0,,1-523-1715166-523,00.html

 The Times of London

 July 31, 2005

 Finger points to British intelligence as al-Qaeda websites are wiped out
 Over the past fortnight Israeli intelligence agents have noticed something
 distinctly odd happening on the internet. One by one, Al-Qaeda's affiliated
 websites have vanished until only a handful remain, write Uzi Mahnaimi and
 Alex Pell.

 Someone has cut the line of communication between the spiritual leaders of
 international terrorism and their supporters. Since 9/11 the websites have
 been the main links to disseminate propaganda and information.

 The Israelis detect the hand of British intelligence, determined to torpedo
 the websites after the London attacks of July 7.

 The web has become the new battleground of terrorism, permitting a freedom
 of communication denied to such organisations as the IRA a couple of
 decades ago.

 One global jihad site terminated recently was an inflammatory Pakistani
 site, www.mojihedun.com, in which a section entitled How to Strike a
 European City gave full technical instructions. Tens of similar sites, some
 offering detailed information on how to build and use biological weapons,
 have also been shut down. However, Islamic sites believed to be moderate,
 remain.

 One belongs to the London-based Syrian cleric Abu Basir al-Tartusi, whose
 www.abubaseer.bizland.com remained operative after he condemned the London
 bombings.

 However, the scales remain weighted in favour of global jihad, the first
 virtual terror organisation. For all the vaunted spying advances such as
 tracking mobile phones and isolating key phrases in telephone
 conversations, experts believe current technologies actually play into the
 hands of those who would harm us.

 Modern technology puts most of the advantages in the hands of the
 terrorists. That is the bottom line, says Professor Michael Clarke, of
 King's College London, who is director of the International Policy
 Institute.

 Government-sponsored monitoring systems, such as Echelon, can track vast
 amounts of data but have so far proved of minimal benefit in preventing, or
 even warning, of attacks. And such systems are vulnerable to manipulation:
 low-ranking volunteers in terrorist organisations can create background
 chatter that ties up resources and maintains a threshold of anxiety. There
 are many tricks of the trade that give terrorists secure digital
 communication and leave no trace on the host computer.

 Ironically, the most readily available sources of accurate online
 information on bomb-making are the websites of the radical American
 militia. I have not seen any Al-Qaeda manuals that look like genuine
 terrorist training, claims Clarke.

 However, the sobering message of many security experts is that the
 terrorists are unlikely ever to lose a war waged with technology.

 --
 -
 R. A. Hettinga mailto: [EMAIL PROTECTED]
 The Internet Bearer Underwriting Corporation http://www.ibuc.com/
 44 Farquhar Street, Boston, MA 02131 USA
 ... however it may deserve respect for its usefulness and antiquity,
 [predicting the end of the world] has not been found agreeable to
 experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
 ___
 Clips mailing list
 [EMAIL PROTECTED]
 http://www.philodox.com/mailman/listinfo/clips

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
When the hares made speeches in the assembly and demanded that all should
have equality, the lions replied, Where are your claws and teeth?  --
attributed to Antisthenes in Aristotle, 'Politics', 3.7.2



RE: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread Tyler Durden
Gee, that's great. A global organization that has taken the task of 
worldwide censorship into its sweaty little hands.


Did the google cache'd versions of these sites dissappear too?

Tor networks, anyone?

-TD


From: R.A. Hettinga [EMAIL PROTECTED]
To: cryptography@metzdowd.com, [EMAIL PROTECTED]
Subject: [Clips] Finger points to British intelligence as al-Qaeda   
websites are wiped out

Date: Sat, 30 Jul 2005 23:02:53 -0400

--- begin forwarded text


 Delivered-To: [EMAIL PROTECTED]
 Date: Sat, 30 Jul 2005 23:01:38 -0400
 To: Philodox Clips List [EMAIL PROTECTED]
 From: R.A. Hettinga [EMAIL PROTECTED]
 Subject: [Clips] Finger points to British intelligence as al-Qaeda 
websites

  are wiped out
 Reply-To: [EMAIL PROTECTED]
 Sender: [EMAIL PROTECTED]

 http://www.timesonline.co.uk/printFriendly/0,,1-523-1715166-523,00.html

 The Times of London

 July 31, 2005

 Finger points to British intelligence as al-Qaeda websites are wiped out
 Over the past fortnight Israeli intelligence agents have noticed 
something
 distinctly odd happening on the internet. One by one, Al-Qaeda's 
affiliated
 websites have vanished until only a handful remain, write Uzi Mahnaimi 
and

 Alex Pell.

 Someone has cut the line of communication between the spiritual leaders 
of
 international terrorism and their supporters. Since 9/11 the websites 
have

 been the main links to disseminate propaganda and information.

 The Israelis detect the hand of British intelligence, determined to 
torpedo

 the websites after the London attacks of July 7.

 The web has become the new battleground of terrorism, permitting a 
freedom

 of communication denied to such organisations as the IRA a couple of
 decades ago.

 One global jihad site terminated recently was an inflammatory Pakistani
 site, www.mojihedun.com, in which a section entitled How to Strike a
 European City gave full technical instructions. Tens of similar sites, 
some

 offering detailed information on how to build and use biological weapons,
 have also been shut down. However, Islamic sites believed to be 
moderate,

 remain.

 One belongs to the London-based Syrian cleric Abu Basir al-Tartusi, whose
 www.abubaseer.bizland.com remained operative after he condemned the 
London

 bombings.

 However, the scales remain weighted in favour of global jihad, the first
 virtual terror organisation. For all the vaunted spying advances such as
 tracking mobile phones and isolating key phrases in telephone
 conversations, experts believe current technologies actually play into 
the

 hands of those who would harm us.

 Modern technology puts most of the advantages in the hands of the
 terrorists. That is the bottom line, says Professor Michael Clarke, of
 King's College London, who is director of the International Policy
 Institute.

 Government-sponsored monitoring systems, such as Echelon, can track vast
 amounts of data but have so far proved of minimal benefit in preventing, 
or
 even warning, of attacks. And such systems are vulnerable to 
manipulation:

 low-ranking volunteers in terrorist organisations can create background
 chatter that ties up resources and maintains a threshold of anxiety. 
There

 are many tricks of the trade that give terrorists secure digital
 communication and leave no trace on the host computer.

 Ironically, the most readily available sources of accurate online
 information on bomb-making are the websites of the radical American
 militia. I have not seen any Al-Qaeda manuals that look like genuine
 terrorist training, claims Clarke.

 However, the sobering message of many security experts is that the
 terrorists are unlikely ever to lose a war waged with technology.

 --
 -
 R. A. Hettinga mailto: [EMAIL PROTECTED]
 The Internet Bearer Underwriting Corporation http://www.ibuc.com/
 44 Farquhar Street, Boston, MA 02131 USA
 ... however it may deserve respect for its usefulness and antiquity,
 [predicting the end of the world] has not been found agreeable to
 experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
 ___
 Clips mailing list
 [EMAIL PROTECTED]
 http://www.philodox.com/mailman/listinfo/clips

--- end forwarded text


--
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
When the hares made speeches in the assembly and demanded that all should
have equality, the lions replied, Where are your claws and teeth?  --
attributed to Antisthenes in Aristotle, 'Politics', 3.7.2





Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread Eugen Leitl
On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote:

 Tor networks, anyone?

Caveat when running Tor on a production machine, I got DDoS'd
recently with some ~300 MBit/s. (Yes, my exit policy didn't
contain IRC).

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread Tyler Durden
What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but 
that sounds suspiciously like someone loaded up an OC-3's worth of traffic 
and then slammed your node. Ain't no hacker gonna do that. Any indication 
the ostensible originating IP addresses are faked?


-TD




From: Eugen Leitl [EMAIL PROTECTED]
To: Tyler Durden [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: [Clips] Finger points to British intelligence as al-Qaeda  
websites are  wiped out

Date: Mon, 1 Aug 2005 17:15:17 +0200

On Mon, Aug 01, 2005 at 10:54:26AM -0400, Tyler Durden wrote:

 Tor networks, anyone?

Caveat when running Tor on a production machine, I got DDoS'd
recently with some ~300 MBit/s. (Yes, my exit policy didn't
contain IRC).

--
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

[demime 1.01d removed an attachment of type application/pgp-signature which 
had a name of signature.asc]





Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread Dan McDonald
On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote:
 What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but 
 that sounds suspiciously like someone loaded up an OC-3's worth of traffic 

300Mbits (using Eugen's quote), is 2xOC-3.  (OC-3 carries 155Mbit/sec ATM,
but if it's IP/PPP/OC-3 you use more of the 155Mbits/sec).

A couple of hacked university zombie armies can generate that kind of
traffic.  I'm *not* a telecom guy, but don't most U's have at least an OC-3
out to the backbones today?

I'm surprised that the target node has that much INBOUND bandwidth, quite
frankly.

Dan



Re: Well, they got what they want...

2005-08-01 Thread J.A. Terranson


On Mon, 1 Aug 2005, Steve Thompson wrote:

 --- Tyler Durden [EMAIL PROTECTED] wrote:

  That's an old pattern to character assassins: I've attacked you
  publically
  but I really don't want to have defend what I've said or reply to
  suggestions about my own motivation.

 And psychopaths are sometimes said to accuse their victims of the malice
 and violence the psychopaths perpetrate.

  Great. Fuck you too. Hope the new Stazi grab you while you bitch and
  complain and do nothing.

 Likewise, although I rather suspect you would be one of very 'Stazi' you
 pretend you hate.  But there is an up-side:  you're too fucking stupid to
 be of permanent use to the 'Stazi', and so you can anticpate outliving
 your usefulness eventually.

Why don't you two get a room?  I'll even subsidize it.

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF


I like the idea of belief in drug-prohibition as a religion in that it is
a strongly held belief based on grossly insufficient evidence and
bolstered by faith born of intuitions flowing from the very beliefs they
are intended to support.

don zweig, M.D.



Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out

2005-08-01 Thread J.A. Terranson

On Mon, 1 Aug 2005, Dan McDonald wrote:

 On Mon, Aug 01, 2005 at 01:51:57PM -0400, Tyler Durden wrote:
  What?!! 300MB/s for a Tor node? OK, I'm a telecom guy and not a data guy but
  that sounds suspiciously like someone loaded up an OC-3's worth of traffic

 300Mbits (using Eugen's quote), is 2xOC-3.  (OC-3 carries 155Mbit/sec ATM,
 but if it's IP/PPP/OC-3 you use more of the 155Mbits/sec).

 A couple of hacked university zombie armies can generate that kind of
 traffic.  I'm *not* a telecom guy, but don't most U's have at least an OC-3
 out to the backbones today?

 I'm surprised that the target node has that much INBOUND bandwidth, quite
 frankly.

Well, I am a telecom *and* a data guy, and I think I can clear it up :-)

First, I suspect that the Tor node did *not* have a 300mbit ingree or
egress, which is why the 300mbps was an effective DDoS ;-)

Second, as the guy who spent several years being the carrier schmuck on
call for these kinds of attacks, a 300mbps attack is a pretty small one.
Big enough to knock off the average web site or small ISP, but pretty
small from the carrier perspective.  He probably knew the sizeof the
incoming attack because the voice on the other end of the phone (the
carrier schmuck on call) told him how much data he saw coming down the
pipe at the target.


 Dan


Hopefully that'll clear some of the muddy stuff?

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF


I like the idea of belief in drug-prohibition as a religion in that it is
a strongly held belief based on grossly insufficient evidence and
bolstered by faith born of intuitions flowing from the very beliefs they
are intended to support.

don zweig, M.D.



Re: Well, they got what they want...

2005-08-01 Thread Steve Thompson

--- Tyler Durden [EMAIL PROTECTED] wrote:

 That's an old pattern to character assassins: I've attacked you
 publically 
 but I really don't want to have defend what I've said or reply to 
 suggestions about my own motivation.

And psychopaths are sometimes said to accuse their victims of the malice
and violence the psychopaths perpetrate.
 
 Great. Fuck you too. Hope the new Stazi grab you while you bitch and 
 complain and do nothing.

Likewise, although I rather suspect you would be one of very 'Stazi' you
pretend you hate.  But there is an up-side:  you're too fucking stupid to
be of permanent use to the 'Stazi', and so you can anticpate outliving
your usefulness eventually.


Regards,

Steve


__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com