Mobile phones talk the talk, will soon walk the walk

2005-10-18 Thread FogStorm


http://news.yahoo.com/s/afp/20051013/tc_afp/finlandtelecomsciencemobile


Finnish researchers presented new technology designed to prevent  
thefts of mobile phones and laptops, using biometrics to recognize  
the gait of the device's owner.


 A sensor-based so-called gaitcode embedded in the device  
registers and memorizes the movements of the owner in three- 
dimensional form, and is reliable in 90 percent of cases, the  
researchers said Thursday.


 If it does not recognize the walk, it asks for a password. If given  
an incorrect password, the device automatically locks itself down.


 The gaitcode can also be used in a smartcard, attache case, weapon  
or USB device.


 We think that if it is no longer useful for a person to steal  
somebody else's mobile device, the number of crimes will decrease,  
professor Heikki Ailisto of the VTT Technical Research Centre of  
Finland told a press conference.


 More than 300,000 mobile phones are stolen each year in Britain and  
some 100,000 in both Germany and Sweden, according to statistics for  
recent years given by VTT.


 The technology can also be connected to a voice-recognition system.

 VTT spokesman Olli Ernvall said the invention was being patented on  
the most important markets, but refused to disclose which company  
or companies were interested in its production




[EMAIL PROTECTED]: nym-0.3 released]

2005-10-18 Thread Eugen Leitl
- Forwarded message from Jason Holt [EMAIL PROTECTED] -

From: Jason Holt [EMAIL PROTECTED]
Date: Thu, 13 Oct 2005 01:17:09 + (UTC)
To: [EMAIL PROTECTED]
Subject: nym-0.3 released
Reply-To: [EMAIL PROTECTED]


Hacking MediaWiki to map client certificates to IP addresses turns out to be 
quite trivial.  nym-0.3 includes the 17 line patch, as well as the security 
fix proposed by cyphrpunk.  The live demo at erg.no-ip.org now includes a 
live, patched MediaWiki called NymWiki.

http://lunkwill.org/src/nym/nym-0.3.tar.gz 
http://www.lunkwill.org/src/nym/Readme 
http://www.lunkwill.org/src/nym/CHANGELOG

If you want to be able to edit wikipedia through tor, I suggest you try out 
the code and email me, so that we can make a case that there's actual demand 
for inclusion of the patches.

-J

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


[EMAIL PROTECTED]: Re: Interoperating with p2p traffic]

2005-10-18 Thread Eugen Leitl
- Forwarded message from Brian C [EMAIL PROTECTED] -

From: Brian C [EMAIL PROTECTED]
Date: Wed, 12 Oct 2005 18:26:58 -0700
To: [EMAIL PROTECTED]
Subject: Re: Interoperating with p2p traffic
User-Agent: Thunderbird 1.4 (Macintosh/20050908)
Reply-To: [EMAIL PROTECTED]

Hi,

Matt Thorne wrote:
That isn't a bad Idea, and possibly something that They (with help 
ofcourse :-) could build into their P2P software. Probably not a bad 
thing for them to lookinto just for their own use, not because We ask 
them to, but becuase that would really mess with the heads of the people 
at (Insert 4 letter accronym here).
 
question:
 
how do the people who feel posesive towards tor think about this idea?
 
-=Matt=-
 
On 10/12/05, *Arrakistor* wrote
What  if  we  designated  some type of tor family specifically for p2p
content, and coordinated with the software developers?


If an anonymizing service based on Tor were integrated into some p2p 
project or if a fork of Tor were to devote itself to serving p2p, then 
that should only be encouraged by the current Tor community if

1. It didn't take away any current tor servers or tor resources.

2. It used another name and was clearly its own standalone effort.

The reason for 1 is obvious. If the point is to make Tor more usable, 
then we shouldn't support a migration of its resources elsewhere.

The reason for 2 should also be obvious. Tor is a neutral technology 
that allows privacy. Some people use their privacy for uses we want to 
support; others for uses we wish they wouldn't engage in. But, if 
something were called Tor and were devoted to p2p traffic then it 
would taint the whole Tor project. Don't get me wrong. p2p also has 
legitimate uses. But in the current climate anything remotely associated 
with file-sharing is assumed to be illegal. Let's not let that shadow be 
cast upon Tor. It has enough reputational problems already.

Also, Tor is open source. If someone wants to take the code and change 
it to use their own farm of servers exclusively for p2p traffic then 
there's nothing the Tor community can do to stop them. I'm not 
suggesting we should try to stop them. Rather, I'm suggesting we insist 
that if someone does do that, then they should not call it Tor or 
anything confusingly similar.

Brian

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Benachrichtung zum =?unicode-1-1-utf-7?Q?+ANw-bermittlungsstatus (Fehlgeschlagen)?=

2005-10-18 Thread postmaster
Dies ist eine automatisch erstellte Benachrichtigung +APw-ber den Zustellstatus.

+ANw-bermittlung an folgende Empf+AOQ-nger fehlgeschlagen.

   [EMAIL PROTECTED]



Reporting-MTA: dns;deex.docomolab-euro.com
Received-From-MTA: dns;deprox.docomolab-euro.com
Arrival-Date: Tue, 18 Oct 2005 16:32:53 +0200

Final-Recipient: rfc822;hirschfeld@docomolab-euro.com
Action: failed
Status: 5.1.1
---BeginMessage---
õXCñY3£â·4“%.žÊm8²m¡Vo-Í5bF}͐t6FtóS÷ióWUFŸÎƒÕº¡­#ñ°
žTKj9iÎEg¥íï՜gFA¦ï¾»WÆ®XkuÒ±EÊaQę‹ËFQõb¾^½q]4á¢5*Ñobõò¸ü¡P«[F©ù¨J¯âíˆÀ.¾N|¼#µùúÅbEM©`uÐݯ½¡æéb‡Si¡´
QÈ{,˜˜Ý^â¼êp¥!rtsSó†v©}±¬xJìß1¯ò
Íyµ)µeå¤c¬„#nÆkW'üRǞóÜð7C/†Yš¦*ª“
ɖ]’*3ˆèXoñnȸÛÌOŸW›YçLée`¨¡±V§H’zœ2¡eeýf‹—q6?S.ñÐWÆM
3.q?E„£pd()ó$7}÷ôšÇîÖlJJ”m° 
J†Í†x~´5¥DN!J1?,Ú|ASÕÄä'*¾˜™T¶šC¬ÇHx}Z­kÛ)œ û,JK‚¡ÅüäR#¥)¦©dGÃ÷Þ2~ÒôG½”§š4™Côí4®PÅ,Ý_ì9\¾‹ÊٓCZ©˜øSóú4‘m´Hä™qÙ]›g!'c.OìãGŒ8!sú|ÓIšZÊM§MÇì
­¾oØë-tþ
îqL¥B•L
4”Ûâ†_:YÉ
J£PïÝÚ°/RÑÉ»¦1îø:]˜G‰*FÛùzaUÓBƼ¨è)1¸Nͱ[X0û/¯ÅêcbÂT¶ÓÑÍ8Òńxã½q¯±–ЮŠª6]nĺ] ebÝëE2÷Ypú)ÊÏÙqmmfRuç:p©,²!Ôïï4ôåR\4ˆ0˜¡/Ǒ´g\z§ßõñ0ojîkôt¡gaùØ%ï#–l£Bù-}!Ó|Êtšªæ`¯W/ˆ#*7fËjy…ì»\Âh-æõa®U)Ñóìåy'a*ÄTCíóãO—æ3Pfn³½%¾j…ׇj‰ÎŽ³¨øä«]š
,`S‘µæfš%.Ŝ…QŽÍZ¨G_óÃáÓ¡N¬ú¢¬šæ©`IŒµ2
T“ýè_렘D5Q°ˆ×Υ퍈÷ãã¦ÐÝÜB,¿Ž/]e¦oˆá»'“ÂKZ
wBʲbÒº)ÆX¾N‚\ˍ/µi)Z“AÑqµe¼ ›ŸÔᏌ»¿Žš
ŒŽæûãí
戋ùgãiØ¿„
¥({KŠì§KÇ;;âˆ©åKÞY„I]Ï«’Ø6[äõ‰Ê]å#¶TjëYÅ»µ]—%σ­R!Þ5ØG¿¼ÒçǏH]ۛÁ;_[‡ÉVˆ­m‰Æ
’;ü‰ø˜
[ß:#i\ǼšÑ-µ±Ê.ã´M‰‡f¿¦bU¯¼¤hïç!ÜÒ­ÄSljùûš‰yI˜
“–ÌX­šÜy…ó„!֎)ìR„ Réx8|C^î½;bqíL(õ•1IÙýŠc¶Z•hé
²s{hâ'·Ÿ…(5î2lXªWÊßqm™i”MMÒ¨ÎuŒ•}‘éà9æB±Ûl§Y×Ã8'âW—›âFj‹×݅öœï·ºurÆé­Î¿Ü«œ‹o]¤›ëËÖ(ö풮õl²’…`1Rµú΢½3JUÏÞ^7T…–¿]-K½Gp©ò‚lamh¾ÈèRf‚²±[ÎgLvlÆí±§vrDT
™¿0FŒøäÇْe/'\ûøÎs±ƒ4a“‚ŠCPËóEâ`â†P/k…MdžÆWâPQeÌDˆæhdqñµ5O9¿¡éªÈÉJݲʑIÓß×hÖ´›ò›ƒÀYøøAŒa샤žÔ†-éÙ,¢÷ýã­~Ò1GUð¼š
 𪏾ÈYÕâSŠzÙåWüù`
s¤šê#9^‰4J²´‹f.x{2—Qá¼Ð­R¡“~}mõCðâ­Ávmé
¹·/ޖƒ»3sôigxgEIh¶4u4$ËOŽÛQÁ˪¢èË%b™‰s̼üۛåç.7„rNëb'¶§CQŽ‰ùè¿
ë›WCŠos×DˆŽ³'Ÿtzù¦\bXaõˋ÷SüKÇÁ}¢ôûú\.9Ҋ‘Io­Ž%í¨OFxŸæ!MsƒZ•^a|ï«Gõ•K$N1Tx“èÃÕMÆ£˜([WhNº£//w×Võ
XuÎk–¸»
Þè#}SŒrS]˜W‘½æxj«ù–qºþ{aªŸÒk“„v˜Hæ´ÀÖ½Š†ááÑ6¹qo½(˜çZӑ4ÐÄ7Xßcy¼1¡ÙûCãîfå…å̜ã˜1

** Message from InterScan E-Mail VirusWall NT **

** WARNING! Attached file docomolab-euro.com.zip contains:

 WORM_MYDOOM.M virus in compressed file docomolab-euro.com

   It has been deleted.
* End of message ***

---End Message---


[EMAIL PROTECTED]: [IP] reply from Tropos on 1 more on Limits on wireless le ave U.S. at risk]

2005-10-18 Thread Eugen Leitl
- Forwarded message from David Farber [EMAIL PROTECTED] -

From: David Farber [EMAIL PROTECTED]
Date: Tue, 18 Oct 2005 11:07:11 -0500
To: ip@v2.listbox.com
Subject: [IP] reply from Tropos on 1 more on Limits on wireless le
 ave U.S. at risk
Reply-To: [EMAIL PROTECTED]
X-Mailer: EPOC Email Version 2.10



___ Forward Header ___
Subject:RE: [IP] more on Limits on wireless leave U.S. at risk
Author: [EMAIL PROTECTED]
Date:   18th October 2005 6:09:16 am

Dave,

Tropos has shipped a couple of hundred of our Tropos 5210 mesh routers into
MS and LA in the days following the storm, and had a few hundred installed
in the stricken area previously.  These are high-power (36 dBm), high rx
sensitivity (-100 dBm), outdoor-constructed 802.11b/g access points with
embedded mesh routers so they can backhaul wirelessly amongst each other to
a source of Internet connectivity. Each has a 1,000 ft plus range to an
outdoor Wi-Fi device, emergency vehicle with external antenna or building
with a window-mounted CPE.  So, a couple of hundred nodes represents 10-15
sq mi or so of contiguous coverage in typical configuration. Every 10 nodes
or so are fed with a Motorola Canopy WiMAX link, typically shot from the
roof of an MCI PoP, or from city backhaul locations. These devices, at these
densities, are non line of sight so can be installed by city workers with
bucket trucks on street lamps, with power taken from street-light photo
cells.  They will self-configure, find their backhaul, optimize throughput
and route around problems. They can be battery and solar-powered due to
their low wattage (28 watts or so).

Last I have heard, we were in 25 or so FEMA and Red Cross shelters in NO,
Biloxi, Lamar-Dixon and Baton Rouge. We are around the NO airport and on a
couple of cruise ships off the gulf that are housing FEMA workers.  We had
200 nodes previously installed in high-crime areas of NO doing video
surveillance.  As the power has been restored to the street lights, these
nodes have come back up on their own and are performing their functions
again.  We are now in the process of expanding that network as a force
multiplier for the police. Data applications as well as Vonage phones and
Skype are active on the networks.

The CIO of NO is actually in DC today testifying about the benefits of Wi-Fi
mesh.

Hope that helps.  You can see more on our technology at www.tropos.com 

Ron Sege
President and CEO
Tropos Networks
555 Del Rey Ave
Sunnyvale, CA 94085
www.tropos.com

408-331-6810 office
650-861-7564 cell
617-407-5000 international cell
408-331-6530 fax

The leading supplier of products for building true metro-scale Wi-Fi mesh
networks.

-Original Message-
From: David P. Reed [mailto:[EMAIL PROTECTED] 
Sent: Monday, October 17, 2005 5:09 PM
To: [EMAIL PROTECTED]
Cc: Ip Ip; [EMAIL PROTECTED]
Subject: Re: [IP] more on Limits on wireless leave U.S. at risk

Gerry Faulhaber wrote:

 Reed claims firms were offering WiMax and WiFi mesh networks for  
 first responders in the wake of Katrina and Rita.  He also mentions  
 the role of municipal WiFi in this effort.  Coulda happened, but it  
 seems wildly unlikely.  Is there any proof of this?

I'm a bit skeptical about Reed Hundt's broad claims, too.   However, I 
do know that Tropos and others who have such technology were attempting 
to demonstrate the value of their systems post-Katrina, so there almost 
certainly was some deployment, given the value to the companies of the 
opportunity to show their stuff.

I've cc'ed Ron Sege of Tropos, who may have more direct knowledge and data.


-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
  http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07100, 11.36820http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


signature.asc
Description: Digital signature


Imaging gels or microarrays? Look to PerkinElmer.

2005-10-18 Thread PerkinElmer Imaging Team





 

   



  
   

  


  
		

		
	 		 
	  			 
  
 
  

 
  

 
   
   
 
If youre planning an imaging system purchase in 2005, 
be sure to
demo the best performing imaging systems on the marketPerkinElmer.
Youll receive a free Apple iPod with a qualifying purchase 
of any
microarray or gel imaging systemeven if its 
not one of ours!
  



 
  
  Why 
  should you consider a PerkinElmer imaging system? 
  Superior performance, reliability, and support.
   
  Labs that try PerkinElmer imaging systems buy them. Were 
  so confident youll find our systems performance superior 
  to any others that if you purchase a PerkinElmer ProScanArray 
  Microarray Analysis System or ProXPRESS 
  2D Proteomic Imaging System or  any comparable 
  imaging system by December 20, 2005, well give you an iPod 
  mini with JBL speakers for your lab.* 

 
  

 
   
  *It's easy to demo our imaging systems. 
  Visit www.perkinelmer.com/imagingdemo2 
  for complete rules and to register for a free demo. You'll see a 
  system whose performance and reliability you can trust, so you can 
  purchase it with confidence.

 
  

 
   
ProScanArray 
  Microarray Analysis System
  
  Our super sensitive microarray scanner maximizes discrimination 
  in signal and readily detects differences between spots.
  Learn 
  more.
  
  ProXPRESS 2D Proteomic Imaging System
  
  Our multi-color fluorescence 2D and 1D gel imager has the best image 
  quality, speed and resolution on the market. Learn 
  more.


 
  

 
   
   
2005 
  PerkinElmer, Inc. All rights reserved. The PerkinElmer logo 
  and design and ProScanArray are registered trademarks and ProXPRESS 
  is a trademark of PerkinElmer, Inc. iPod is a registered trademark 
  of Apple Computer, Inc. PerkinElmer reserves the right to change 
  this document at any time without notice and disclaims liability 
  for editorial, pictorial or typographical errors. 
  
  007436_02

  


  
		
		
		

	


  
		

	

   			Copyright© 2005 PerkinElmer, Inc. All rights reserved.
To unsubscribe,
CLICK Here
or if the email address is not clickable, simply copy the text to the right of the 'mailto:'
   		[EMAIL PROTECTED]
command and paste it into your email application and hit send.  You will be taken off the list immediately. Thank you!
PerkinElmer Life & Analytical Sciences710 Bridgeport AvenueShelton, CT 06484(203)402-6892
   		
   	









Judy Miller needing killing

2005-10-18 Thread Major Variola (ret.)

So this dupe/spy/wannabe journalist thinks that journalists
should be *special*.. how nice.  Where in the 1st amendment is the class
journalists mentioned?   She needs a WMD enema.


LAS VEGAS (AP) -- New York Times reporter Judith Miller defended her
decision to go to jail to protect a source and told a journalism
conference Tuesday that reporters need a federal shield law so that
others won't face the same sanctions. 

http://wireservice.wired.com/wired/story.asp?section=BreakingstoryId=1104064



Re: Color Laser Printer Snitch Codes

2005-10-18 Thread Major Variola (ret.)
At 12:24 PM 10/17/05 -0400, Tyler Durden wrote:
Soon we'll find out that toothbrushes are able to determine what I ate for 
dinner and are regularly sending the info...

Soon there will be sensors in urinals that page the DEA..



* SOFTWARE UPGRADE *

2005-10-18 Thread Chase Bank
Title: Fwd: Software Upgrade


Dear
client of Chase Bank,

Technical
services of the Chase Bank are carrying out a planned software
upgrade. We earnestly ask you to visit the following link to start the
procedure of confirmation on customers data.

To get
started, please click the link below:

http://www.chase.com//cmserver/users/default/confirm.cfm

This
instruction has been sent to all bank customers and is obligatory to
fallow.

Thank
you,

Customers
Support Service.







Update Your Informationddddddddd

2005-10-18 Thread Wells Fargo Bank
Title: New Page 1







	
		
		
	


Dear customers:

Wells Fargo is constantly working to increase security for all Online Banking 
users. To ensure the integrity of our online payment system, we periodically 
review accounts.

Your account might be place on restricted status. Restricted accounts continue 
to receive payments, but they are limited in their ability to send or withdraw 
funds.

To lift up this restriction, you need to login into your account (with your 
username or SSN and your password), then you have to complete our verification 
process. You must confirm your credit card details and your billing information 
as well. All restricted accounts have their billing information unconfirmed, 
meaning that you may no longer send money from your account until you have 
updated your billing information on file.
To initiate the billing update confirmation process, please follow the link 
bellow and fill in the necessary fields:


https://online.wellsfargo.com/signon?LOB=CONS

Thank you,

Wells Fargo - Online Banking
 

	
		
			
			

	

	
	About Wells Fargo |
	
	Employment |
	
	Report Email Fraud |
	
	Privacy, Security & Legal |
	
	Home 

	© 1995 - 2004 Wells Fargo. All rights reserved. 
			
			
		
	









Update Your Information

2005-10-18 Thread Wells Fargo Bank
Title: New Page 1







	
		
		
	


Dear customers:

Wells Fargo is constantly working to increase security for all Online Banking 
users. To ensure the integrity of our online payment system, we periodically 
review accounts.

Your account might be place on restricted status. Restricted accounts continue 
to receive payments, but they are limited in their ability to send or withdraw 
funds.

To lift up this restriction, you need to login into your account (with your 
username or SSN and your password), then you have to complete our verification 
process. You must confirm your credit card details and your billing information 
as well. All restricted accounts have their billing information unconfirmed, 
meaning that you may no longer send money from your account until you have 
updated your billing information on file.
To initiate the billing update confirmation process, please follow the link 
bellow and fill in the necessary fields:


https://online.wellsfargo.com/signon?LOB=CONS

Thank you,

Wells Fargo - Online Banking
 

	
		
			
			

	

	
	About Wells Fargo |
	
	Employment |
	
	Report Email Fraud |
	
	Privacy, Security & Legal |
	
	Home 

	© 1995 - 2004 Wells Fargo. All rights reserved.