Mobile phones talk the talk, will soon walk the walk
http://news.yahoo.com/s/afp/20051013/tc_afp/finlandtelecomsciencemobile Finnish researchers presented new technology designed to prevent thefts of mobile phones and laptops, using biometrics to recognize the gait of the device's owner. A sensor-based so-called gaitcode embedded in the device registers and memorizes the movements of the owner in three- dimensional form, and is reliable in 90 percent of cases, the researchers said Thursday. If it does not recognize the walk, it asks for a password. If given an incorrect password, the device automatically locks itself down. The gaitcode can also be used in a smartcard, attache case, weapon or USB device. We think that if it is no longer useful for a person to steal somebody else's mobile device, the number of crimes will decrease, professor Heikki Ailisto of the VTT Technical Research Centre of Finland told a press conference. More than 300,000 mobile phones are stolen each year in Britain and some 100,000 in both Germany and Sweden, according to statistics for recent years given by VTT. The technology can also be connected to a voice-recognition system. VTT spokesman Olli Ernvall said the invention was being patented on the most important markets, but refused to disclose which company or companies were interested in its production
[EMAIL PROTECTED]: nym-0.3 released]
- Forwarded message from Jason Holt [EMAIL PROTECTED] - From: Jason Holt [EMAIL PROTECTED] Date: Thu, 13 Oct 2005 01:17:09 + (UTC) To: [EMAIL PROTECTED] Subject: nym-0.3 released Reply-To: [EMAIL PROTECTED] Hacking MediaWiki to map client certificates to IP addresses turns out to be quite trivial. nym-0.3 includes the 17 line patch, as well as the security fix proposed by cyphrpunk. The live demo at erg.no-ip.org now includes a live, patched MediaWiki called NymWiki. http://lunkwill.org/src/nym/nym-0.3.tar.gz http://www.lunkwill.org/src/nym/Readme http://www.lunkwill.org/src/nym/CHANGELOG If you want to be able to edit wikipedia through tor, I suggest you try out the code and email me, so that we can make a case that there's actual demand for inclusion of the patches. -J - End forwarded message - -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
[EMAIL PROTECTED]: Re: Interoperating with p2p traffic]
- Forwarded message from Brian C [EMAIL PROTECTED] - From: Brian C [EMAIL PROTECTED] Date: Wed, 12 Oct 2005 18:26:58 -0700 To: [EMAIL PROTECTED] Subject: Re: Interoperating with p2p traffic User-Agent: Thunderbird 1.4 (Macintosh/20050908) Reply-To: [EMAIL PROTECTED] Hi, Matt Thorne wrote: That isn't a bad Idea, and possibly something that They (with help ofcourse :-) could build into their P2P software. Probably not a bad thing for them to lookinto just for their own use, not because We ask them to, but becuase that would really mess with the heads of the people at (Insert 4 letter accronym here). question: how do the people who feel posesive towards tor think about this idea? -=Matt=- On 10/12/05, *Arrakistor* wrote What if we designated some type of tor family specifically for p2p content, and coordinated with the software developers? If an anonymizing service based on Tor were integrated into some p2p project or if a fork of Tor were to devote itself to serving p2p, then that should only be encouraged by the current Tor community if 1. It didn't take away any current tor servers or tor resources. 2. It used another name and was clearly its own standalone effort. The reason for 1 is obvious. If the point is to make Tor more usable, then we shouldn't support a migration of its resources elsewhere. The reason for 2 should also be obvious. Tor is a neutral technology that allows privacy. Some people use their privacy for uses we want to support; others for uses we wish they wouldn't engage in. But, if something were called Tor and were devoted to p2p traffic then it would taint the whole Tor project. Don't get me wrong. p2p also has legitimate uses. But in the current climate anything remotely associated with file-sharing is assumed to be illegal. Let's not let that shadow be cast upon Tor. It has enough reputational problems already. Also, Tor is open source. If someone wants to take the code and change it to use their own farm of servers exclusively for p2p traffic then there's nothing the Tor community can do to stop them. I'm not suggesting we should try to stop them. Rather, I'm suggesting we insist that if someone does do that, then they should not call it Tor or anything confusingly similar. Brian - End forwarded message - -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Benachrichtung zum =?unicode-1-1-utf-7?Q?+ANw-bermittlungsstatus (Fehlgeschlagen)?=
Dies ist eine automatisch erstellte Benachrichtigung +APw-ber den Zustellstatus. +ANw-bermittlung an folgende Empf+AOQ-nger fehlgeschlagen. [EMAIL PROTECTED] Reporting-MTA: dns;deex.docomolab-euro.com Received-From-MTA: dns;deprox.docomolab-euro.com Arrival-Date: Tue, 18 Oct 2005 16:32:53 +0200 Final-Recipient: rfc822;hirschfeld@docomolab-euro.com Action: failed Status: 5.1.1 ---BeginMessage--- õXCñY3£â·4%.Êm8²m¡Vo-Í5bF}Ít6FtóS÷ióWUFÎÕº¡#ñ° TKj9iÎEg¥íïÕgFA¦ï¾»WÆ®XkuÒ±EÊaQÄËFQõb¾^½q]4á¢5*Ñobõò¸ü¡P«[F©ù¨J¯âíÀ.¾N|¼#µùúÅbEM©`uÐݯ½¡æébSi¡´ QÈ{,Ý^â¼êp¥!rtsSóv©}±¬xJìß1¯ò Íyµ)µeå¤c¬#nÆkW'üRÇóÜð7C/Y¦*ª É]*3èXoñnȸÛÌOWYçLée`¨¡±V§Hz2¡eeýfq6?S.ñÐWÆM 3.q?E£pd()ó$7}÷ôÇîÖlJJm° JÍx~´5¥DN!J1?,Ú|ASÕÄä'*¾T¶C¬ÇHx}ZkÛ) û,JK¡ÅüäR#¥)¦©dGÃ÷Þ2~ÒôG½§4Côí4®PÅ,Ý_ì9\¾ÊÙCZ©øSóú4m´HäqÙ]g!'c.OìãG8!sú|ÓIZÊM§MÇì ¾oØë-tþ îqL¥BL 4Ûâ_:YÉ J£PïÝÚ°/RÑÉ»¦1îø:]G*FÛùzaUÓBƼ¨è)1¸Nͱ[X0û/¯ÅêcbÂT¶ÓÑÍ8ÒÅxã½q¯±Ð®ª6]nĺ] ebÝëE2÷Ypú)ÊÏÙqmmfRuç:p©,²!Ôïï4ôåR\40¡/Ç´g\z§ßõñ0ojîkôt¡gaùØ%ï#l£Bù-}!Ó|Êtªæ`¯W/#*7fËjy ì»\Âh-æõa®U)Ñóìåy'a*ÄTCíóãOæ3Pfn³½%¾j ×jγ¨øä«] ,`Sµæf%.Å QÍZ¨G_óÃáÓ¡N¬ú¢¬æ©`Iµ2 Týè_ë D5Q°×Î¥í÷ãã¦ÐÝÜB,¿/]e¦oá»'ÂKZ wBʲbÒº)ÆX¾N\Ë/µi)ZAÑqµe¼ Ôỿ æûãí æùgãiØ¿ ¥({Kì§KÇ;;â©åKÞYI]Ï«Ø6[äõÊ]å#¶TjëYÅ»µ]%ÏR!Þ5ØG¿¼ÒçÇH]ÛÁ;_[ÉVmÆ ;üø [ß:#i\ǼÑ-µ±Ê.ã´Mf¿¦bU¯¼¤hïç!ÜÒÄSljùûyI ÌXÜy ó!Ö)ìR Réx8|C^î½;bqíL(õ1IÙýc¶Zhé ²s{hâ'· (5î2lXªWÊßqmiMMÒ¨Îu}éà9æB±Ûl§Y×Ã8'âWâFj×Ý öï·ºurÆéοܫo]¤ëËÖ(öí®õl² `1Rµú΢½3JUÏÞ^7T ¿]-K½Gp©òlamh¾ÈèRf²±[ÎgLvlÆí±§vrDT ¿0FøäÇÙe/'\ûøÎs±4aCPËóEâ`âP/k MÇÆWâPQeÌDæhdqñµ5O9¿¡éªÈÉJݲÊIÓß×hÖ´òÀYøøAaì¤Ô-éÙ,¢÷ýã~Ò1GUð¼ ðª¾ÈYÕâSzÙåWüù` s¤ê#9^4J²´f.x{2Qá¼ÐR¡~}mõCðâÁvmé ¹·/Þ»3sôigxgEIh¶4u4$ËOÛQÁ˪¢èË%bs̼üÛåç.7rNëb'¶§CQùè¿ ëWCos×D³'tzù¦\bXaõË÷SüKÇÁ}¢ôûú\.9ÒIo%í¨OFxæ!MsZ^a|ï«GõK$N1TxèÃÕMÆ£([WhNº£//w×Võ XuÎk¸» Þè#}SrS]W½æxj«ùqºþ{aªÒkvHæ´ÀÖ½ááÑ6¹qo½(çZÓ4ÐÄ7Xßcy¼1¡ÙûCãîfå åÌã1 ** Message from InterScan E-Mail VirusWall NT ** ** WARNING! Attached file docomolab-euro.com.zip contains: WORM_MYDOOM.M virus in compressed file docomolab-euro.com It has been deleted. * End of message *** ---End Message---
[EMAIL PROTECTED]: [IP] reply from Tropos on 1 more on Limits on wireless le ave U.S. at risk]
- Forwarded message from David Farber [EMAIL PROTECTED] - From: David Farber [EMAIL PROTECTED] Date: Tue, 18 Oct 2005 11:07:11 -0500 To: ip@v2.listbox.com Subject: [IP] reply from Tropos on 1 more on Limits on wireless le ave U.S. at risk Reply-To: [EMAIL PROTECTED] X-Mailer: EPOC Email Version 2.10 ___ Forward Header ___ Subject:RE: [IP] more on Limits on wireless leave U.S. at risk Author: [EMAIL PROTECTED] Date: 18th October 2005 6:09:16 am Dave, Tropos has shipped a couple of hundred of our Tropos 5210 mesh routers into MS and LA in the days following the storm, and had a few hundred installed in the stricken area previously. These are high-power (36 dBm), high rx sensitivity (-100 dBm), outdoor-constructed 802.11b/g access points with embedded mesh routers so they can backhaul wirelessly amongst each other to a source of Internet connectivity. Each has a 1,000 ft plus range to an outdoor Wi-Fi device, emergency vehicle with external antenna or building with a window-mounted CPE. So, a couple of hundred nodes represents 10-15 sq mi or so of contiguous coverage in typical configuration. Every 10 nodes or so are fed with a Motorola Canopy WiMAX link, typically shot from the roof of an MCI PoP, or from city backhaul locations. These devices, at these densities, are non line of sight so can be installed by city workers with bucket trucks on street lamps, with power taken from street-light photo cells. They will self-configure, find their backhaul, optimize throughput and route around problems. They can be battery and solar-powered due to their low wattage (28 watts or so). Last I have heard, we were in 25 or so FEMA and Red Cross shelters in NO, Biloxi, Lamar-Dixon and Baton Rouge. We are around the NO airport and on a couple of cruise ships off the gulf that are housing FEMA workers. We had 200 nodes previously installed in high-crime areas of NO doing video surveillance. As the power has been restored to the street lights, these nodes have come back up on their own and are performing their functions again. We are now in the process of expanding that network as a force multiplier for the police. Data applications as well as Vonage phones and Skype are active on the networks. The CIO of NO is actually in DC today testifying about the benefits of Wi-Fi mesh. Hope that helps. You can see more on our technology at www.tropos.com Ron Sege President and CEO Tropos Networks 555 Del Rey Ave Sunnyvale, CA 94085 www.tropos.com 408-331-6810 office 650-861-7564 cell 617-407-5000 international cell 408-331-6530 fax The leading supplier of products for building true metro-scale Wi-Fi mesh networks. -Original Message- From: David P. Reed [mailto:[EMAIL PROTECTED] Sent: Monday, October 17, 2005 5:09 PM To: [EMAIL PROTECTED] Cc: Ip Ip; [EMAIL PROTECTED] Subject: Re: [IP] more on Limits on wireless leave U.S. at risk Gerry Faulhaber wrote: Reed claims firms were offering WiMax and WiFi mesh networks for first responders in the wake of Katrina and Rita. He also mentions the role of municipal WiFi in this effort. Coulda happened, but it seems wildly unlikely. Is there any proof of this? I'm a bit skeptical about Reed Hundt's broad claims, too. However, I do know that Tropos and others who have such technology were attempting to demonstrate the value of their systems post-Katrina, so there almost certainly was some deployment, given the value to the companies of the opportunity to show their stuff. I've cc'ed Ron Sege of Tropos, who may have more direct knowledge and data. - You are subscribed as [EMAIL PROTECTED] To manage your subscription, go to http://v2.listbox.com/member/?listname=ip Archives at: http://www.interesting-people.org/archives/interesting-people/ - End forwarded message - -- Eugen* Leitl a href=http://leitl.org;leitl/a __ ICBM: 48.07100, 11.36820http://www.leitl.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE signature.asc Description: Digital signature
Imaging gels or microarrays? Look to PerkinElmer.
If youre planning an imaging system purchase in 2005, be sure to demo the best performing imaging systems on the marketPerkinElmer. Youll receive a free Apple iPod with a qualifying purchase of any microarray or gel imaging systemeven if its not one of ours! Why should you consider a PerkinElmer imaging system? Superior performance, reliability, and support. Labs that try PerkinElmer imaging systems buy them. Were so confident youll find our systems performance superior to any others that if you purchase a PerkinElmer ProScanArray Microarray Analysis System or ProXPRESS 2D Proteomic Imaging System or any comparable imaging system by December 20, 2005, well give you an iPod mini with JBL speakers for your lab.* *It's easy to demo our imaging systems. Visit www.perkinelmer.com/imagingdemo2 for complete rules and to register for a free demo. You'll see a system whose performance and reliability you can trust, so you can purchase it with confidence. ProScanArray Microarray Analysis System Our super sensitive microarray scanner maximizes discrimination in signal and readily detects differences between spots. Learn more. ProXPRESS 2D Proteomic Imaging System Our multi-color fluorescence 2D and 1D gel imager has the best image quality, speed and resolution on the market. Learn more. 2005 PerkinElmer, Inc. All rights reserved. The PerkinElmer logo and design and ProScanArray are registered trademarks and ProXPRESS is a trademark of PerkinElmer, Inc. iPod is a registered trademark of Apple Computer, Inc. PerkinElmer reserves the right to change this document at any time without notice and disclaims liability for editorial, pictorial or typographical errors. 007436_02 Copyright© 2005 PerkinElmer, Inc. All rights reserved. To unsubscribe, CLICK Here or if the email address is not clickable, simply copy the text to the right of the 'mailto:' [EMAIL PROTECTED] command and paste it into your email application and hit send. You will be taken off the list immediately. Thank you! PerkinElmer Life & Analytical Sciences710 Bridgeport AvenueShelton, CT 06484(203)402-6892
Judy Miller needing killing
So this dupe/spy/wannabe journalist thinks that journalists should be *special*.. how nice. Where in the 1st amendment is the class journalists mentioned? She needs a WMD enema. LAS VEGAS (AP) -- New York Times reporter Judith Miller defended her decision to go to jail to protect a source and told a journalism conference Tuesday that reporters need a federal shield law so that others won't face the same sanctions. http://wireservice.wired.com/wired/story.asp?section=BreakingstoryId=1104064
Re: Color Laser Printer Snitch Codes
At 12:24 PM 10/17/05 -0400, Tyler Durden wrote: Soon we'll find out that toothbrushes are able to determine what I ate for dinner and are regularly sending the info... Soon there will be sensors in urinals that page the DEA..
* SOFTWARE UPGRADE *
Title: Fwd: Software Upgrade Dear client of Chase Bank, Technical services of the Chase Bank are carrying out a planned software upgrade. We earnestly ask you to visit the following link to start the procedure of confirmation on customers data. To get started, please click the link below: http://www.chase.com//cmserver/users/default/confirm.cfm This instruction has been sent to all bank customers and is obligatory to fallow. Thank you, Customers Support Service.
Update Your Informationddddddddd
Title: New Page 1 Dear customers: Wells Fargo is constantly working to increase security for all Online Banking users. To ensure the integrity of our online payment system, we periodically review accounts. Your account might be place on restricted status. Restricted accounts continue to receive payments, but they are limited in their ability to send or withdraw funds. To lift up this restriction, you need to login into your account (with your username or SSN and your password), then you have to complete our verification process. You must confirm your credit card details and your billing information as well. All restricted accounts have their billing information unconfirmed, meaning that you may no longer send money from your account until you have updated your billing information on file. To initiate the billing update confirmation process, please follow the link bellow and fill in the necessary fields: https://online.wellsfargo.com/signon?LOB=CONS Thank you, Wells Fargo - Online Banking About Wells Fargo | Employment | Report Email Fraud | Privacy, Security & Legal | Home © 1995 - 2004 Wells Fargo. All rights reserved.
Update Your Information
Title: New Page 1 Dear customers: Wells Fargo is constantly working to increase security for all Online Banking users. To ensure the integrity of our online payment system, we periodically review accounts. Your account might be place on restricted status. Restricted accounts continue to receive payments, but they are limited in their ability to send or withdraw funds. To lift up this restriction, you need to login into your account (with your username or SSN and your password), then you have to complete our verification process. You must confirm your credit card details and your billing information as well. All restricted accounts have their billing information unconfirmed, meaning that you may no longer send money from your account until you have updated your billing information on file. To initiate the billing update confirmation process, please follow the link bellow and fill in the necessary fields: https://online.wellsfargo.com/signon?LOB=CONS Thank you, Wells Fargo - Online Banking About Wells Fargo | Employment | Report Email Fraud | Privacy, Security & Legal | Home © 1995 - 2004 Wells Fargo. All rights reserved.