Re: I crypt you
On Tue, 24 Dec 2002, Anonymous wrote: (unrelated, I noticed that there is no un-crippled free version of PGP for windows XP any more - 8.0 beta expired) What about PGP 8.0 Freeware? That isn't crippled. (It doesn't include automatic email plugins, which many think are a bad idea anyway, and doesn't include PGPdisk, which is a great product, but addresses issues other than email privacy in transit. So what is wrong with PGP 8.0 Freeware? -MW-
Re: Singularity ( was Re: Policing Bioterror Research )
People, Please don't quote a long article and then bottom-post a few comments. Or top-post a few comments. In fact, the best idea is to only quote enough to remind other readers what you are commenting on. It's not a matter of bandwidth, it's a matter of relevance and consideration. I plan to plonk anyone who keeps doing this. (8 list members are in my plonk file right now...I only see their crap through the comments of others, though replies seem to be scarce for all but one of them, so perhaps others have formed the same opinion as I have.) --Tim May
[p2p-hackers] p2p-hackers meeting, this upcoming sunday (fwd)
-- Forwarded message -- Date: Mon, 6 Jan 2003 12:39:24 -0800 (PST) From: Bram Cohen [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [p2p-hackers] p2p-hackers meeting, this upcoming sunday usual time, usual place when: second sunday, this time it's the 12th, 3pm till whenever we leave where: SONY metreon, food court what: p2p-hackers meeting, sit around and chat about our projects -Bram Cohen Markets can remain irrational longer than you can remain solvent -- John Maynard Keynes ___ p2p-hackers mailing list [EMAIL PROTECTED] http://zgp.org/mailman/listinfo/p2p-hackers
Tarzan swings
Date: Sat, 4 Jan 2003 04:12:41 -0500 (EST) From: Michael J. Freedman [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Tarzan code Hi everybody, So tonight I threw up a tarball of Tarzan's code, after finally updating it against new releases of its dependencies. It's released under the GPL. http://pdos.lcs.mit.edu/tarzan/ Unlike tor, Tarzan is an IP-layer anonymizing system, so faces different problems and different complexity. Roger suggested that I announce this on or-dev. Unfortunately, I don't plan on continuing developing Tarzan actively anymore. If anybody else is interested, please drop a line. Thanks! --mike if America were tempted to ''become the dictatress of the world, she would be no longer the ruler of her own spirit.'' What empires lavish abroad, they cannot spend on good republican government at home: on hospitals or roads or schools. A distended military budget only aggravates America's continuing failure to keep its egalitarian promise to itself. -- John Quincy Adams (extended)
crypto car keys
Anybody know the TI chip used in Ford 2002 and newer immobilizers? I've found a white paper on TI's web site that describes their challenge/response system, but nobody at Ford customer service has a clue what I'm talking about. Ford calls it securilock, but the Ilco tester at my local hardware store says it's a TI chip in the key. The dealer said it's a rolling code system, and from the white paper this includes a 40 bit challenge, an encryption operation on the key (!) then a 24 bit response from the key. If you lose one of the original keys they charge you several $100 to reprogram the main processor so you can start your car again!!! Fortunatly, I've found replacement keys for $8 off the net, and as long as I have 2 it should never be a problem. But TI has lots of different RFID systems, and I don't know if Ford has purchased a special mod for their own use or not (when you buy 10 million of something it does give you some clout). Anybody here know? Patience, persistence, truth, Dr. mike
Re: Singularity ( was Re: Policing Bioterror Research )
BTW, I think I read somewhere that when the water gets too hot the frog just leaves. Like someone already mentioned, all that is needed for the total collapse of the US government is that 90+% of sheeple abstains from TV and newspapers for 30 consecutive days (externally induced psychosis needs constant maintenance.) Such detox event would be the most dramatic social phenomenon in the last hundred years. But it's impossible promulgate even that simple idea and therefore the frog stays. ribbit
Re: Dossiers and Customer Courtesy Cards
Somebody said, Frankly, if using my card saves me $10 on a roast, it's hard for me not to think it's a good exchange.. Hogwash. It's not saving customers anything at all. Same gimmick as credit cards. Take away a percentage from noncard-holders and give it to the cardholders. What economic efficiency or productivity could these cards actually achieve?? One cannot argue, Identity cards enable the store to improve product mix thereby improving service because the chains have adequate cash register data. I don't think the cards are achieving *anything* except a carveout from the customers themselves. First of all they get a dollar, from day one, by selling our personal information to other corporations. That is pure profit, after a low-cost software module on their card reader. The rest of the payoff comes from calculating YOUR behavior in order to stick their knife deeper into you. The cards strengthen their pricing power against YOU. For example, avoid offering discounts for things you are going to buy anyway. Watch and see-- in a couple of years there will be Dynamic Pricing. You'll find out you're paying higher prices on bread than the guy next to you!! But in the meantime they will jsut use the data to confuse you to death, changing prices and unit sizes and locations of everything in the store, so it's impossible to comparison shop. Consumers should begin to request our purchase history (so we can submit it to regional grocery auctions, competing chains, comparison websites, etc.) The chains will say HELL NO, are you kidding? That will show why they are really installing the cards! guffaws! What's needed is a little embedded linux device with a cheap scanner, where shoppers can pay a dime, insert their receipt, and receive their shopping list in XML format, by email. Thise should be in front of every store, between the pay phone, the coinstar, photo kiosks, etc. I believe it would become clear, grocery stores are as much an information phenomenon as logistical one. Direct supply by producers to residences, for some commodities would become economically possible. You'd have a critical mass of information. Todd Boyle cpa kirkland wa www.gldialtone.com a rant a day keeps the clients away
Re: Let there be Blah
On Sunday, January 5, 2003, at 11:33 PM, Anonymous wrote: Blah wrote quite an excellent post. In fact, I've met few physics PhDs which would have been able to respond so well. So needless to say, my curiosity is peaked concerning who Blah is in the real Or even piqued. world. Weirder still that one of several people who present themselves as the fictional Tyler Durden would claim to be interested in who the real identity of Blah is. (Tim May, I believe, is trained in physicsist, but there's no way someone out of school for so long is going to voluntarily remember what's in the last chapter of Schiff. Also, they didn't know a lot of this stuff back in the horse-and-buggy days when May was in school...) Showing a failure on your part. The standard model was pretty well standardized when I was still in school. Not that what I learned in school is what I know now. One must keep up, mustn't one? What I know of modern quantum computation comes from books I've only had for the past few years, such as Nielsen and Chuang. Even the earliest glimmers, from Bennett, Deutsch, and others, came only in the late 1980s. By the time I attended a Crypto conference in 1988, quantum ideas were only beginning to appear. As for Schiff, I skipped it, favoring Dicke and Wittke and the peculiarities of Dirac. With a smidgin of Messiah and others, and even a tiny bit of Bjorken and Drell (ugh). And De Witt and Graham after 1973. As for charm, I have none, as many can attest. As for confinement, not yet. Anyway, I DID want to ask ole' Blah what he thought about the following. (Now Choate, Shaddup and pay attention: Slap Slap Slap!) This sounds typically Hettingaesque. If you start nattering about milk squirting out your nose (ObBob: grin grin), I'll know for sure that Tyler Durden is actually the equally cartoonish Bob Hettinga. (Bustin' chops, takin' names) More evidence. Oh, and please don't top-post (complete text of Blah replying to Choate elided). --Tim May
Re: Singularity ( was Re: Policing Bioterror Research )
At 12:42 AM 01/07/2003 -0800, Major Variola (ret) wrote: At 05:14 PM 1/6/03 -0800, Michael Motyka wrote: BTW, I think I read somewhere that when the water gets too hot the frog just leaves. It was in print, it must be true. Perhaps it is. But if you put a TV in the pot with the frog, he gets distracted... And someone else nameless wrote that all you need to do is get 90% of the sheeple to not to watch TV for a month and you'd have a revolution too. So if you legalize pot across the country, everybody would be distracted from TV for at least the first couple of Post-Prohibition-Party Weekends, or at least till their connection runs out :-)
Austin Cypherpunks Monthly Meeting - Tue. Jan. 14
Time:Jan. 14, 2003 Second Tuesday of each month 7:00 - 9:00 pm (or later) Location:Central Market HEB Cafe 38th and N. Lamar Weather permitting we meet in the un-covered tables. If it's inclimate but not overly cold we meet in the outside covered section. Otherwise look for us inside the building proper. Identification: Look for the group with the Applied Cryptography book. It will have a red cover and is about 2 in. thick. Contact Info:http://einstein.ssz.com/cdr/index.html#austincpunks -- We are all interested in the future for that is where you and I are going to spend the rest of our lives. Criswell, Plan 9 from Outer Space [EMAIL PROTECTED][EMAIL PROTECTED] www.ssz.com www.open-forge.org
Singularity ( was Re: Policing Bioterror Research )
Michael Motyka writes BTW, I think I read somewhere that when the water gets too hot the frog just leaves. It was in print, it must be true
Re: The Microsoft Xbox Key
Tim writes: Given that x86 boxes without Windows installed can now be had for about the price of an XBox, and given that the graphics chip in the Xbox is not used by any of the Linux server uses (so far as I know), the main value of hacking the Xbox is for cuteness, to show that it can be done. Linux is now available for download for modchipped Xboxes. Ergo, I would infer that issues of Linux supporting the hardware are behind us, and the sole remaining problem is getting an unaltered Xbox to run arbitrary code. There is a non-Microsoft-approved Xbox media player out, so I would also infer someone has figured out how to use the graphics chip, which is a custom nVidia Geforce 3, a known device for which good drivers exist. (The approximately $200-300 Linux box comes with a 600 MHz VIA x86, and may come with more than the 10 GB disk the Xbox comes from. I don't track this closely. I'd expect that the drive is faster in the PC, as XBox doesn't need a speedy drive for game play. All in all, I'd rather have the PC for Linux than a hacked Xbox.) My impression is that at the $200 price point, the Xbox is a better built fuller-featured box than similarly priced boxes from places like Wal-Mart. Those who don't wish to use MS products should not do so. I use Macs. Many use Linux. And so on. I think you're drifting here from my original point, which that it is in no way illegal, or even immoral, to run free software on hardware that you own, and to pick any locks on the hardware you own, which would preclude you from doing so. The public is getting the notion that there are things that it should be illegal for you to do to devices that you own, for purposes of accessing their functionality. This is something that needs to be strongly discouraged. Right now, such endeavors are being muddied by being lumped in with such things as cracking commerical software and breaking into corporate and military systems in the public mindset. A widely publicized legal opinion by someone like the EFF, stating that running anything you want on your own Xbox is a perfectly legitimate thing to do, would put the ball in Microsoft's court to either say that they disagreed, or to say nothing and let it slide, which would greatly reduce their ability to legally harrass people in the future. It costs nothing to issue a press release. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division Do What Thou Wilt Shall Be The Whole Of The Law
RE: The Microsoft Xbox Key
Eric Cordian[SMTP:[EMAIL PROTECTED]] wrote: [...] Ignoring for the moment that The Neo Project had zero chance of factoring a 2048 bit key using publicly available algorithms, their caving under imagined legal pressure strikes me as a really bad precedent. [...] The Neo Project would almost certainly fail for a much simpler reason: they think trial division was a good approach to factoring large moduli. Just go and look at their technique - thats what it amounts to. Peter
Re: The Microsoft Xbox Key/dvd issues
http://www.theregister.co.uk/content/4/28749.html The entertainment lobby has failed to persuade a Norwegian court to convict a teenager for creating a utility for playing back DVDs on his own computer. Jon Lech Johansen has been acquitted of all charges in a trial that tested the legality of the DeCSS DVD decryption utility he produced, Norwegian paper Aftenposten reports. Norwegian prosecutors, acting largely on the behest of the Motion Picture Association of America (MPAA), argued in court that Johansen acted illegally in sharing his DeCSS tool with others and distributing it via the Internet. They claimed the DeCSS utility made it easier to pirate DVDs. The court rejected these arguments, ruling that Johansen did nothing wrong in bypassing DVD scrambling codes that stopped him using his Linux PC to play back DVDs he'd bought. (They go on to say that it's not illegal to use DeCSS to play dvd's. So if you haven't already got a copy, you can get one now, in Sweden at least.) . There is a product called DVD region x for the xbox that allows you to play dvd's from any region coming out soon. As it probably has to be signed by Microsoft (as all xbox programs must be), can we assume that the regionalisation of DVD's silliness is effectively over? And apart from that, what was the point of CSS? You can do a dd on a DVD and play the image from a hard drive. I don't have a DVD burner, but I'd imagine you could burn a DVD from such an image, so direct copying is probably easy enough. Maybe I'm wrong, I haven't tried it, but the pirates don't seem to have any technical trouble. The regionalisation issue was another monopoly grab. The DVD format is as much a monopoly as Microsoft or Intel (probably more...) -- Peter Fairbrother
Re: Misconceptions about how remailers work
On Tuesday, January 7, 2003, at 10:46 AM, Igor Chudov wrote: A nice article, although I was under impression that basically the remailer network was no longer operable. Wanted to send some joke stuff through them and was unable to do so due to lack of working remailers. According to http://stats.melontraffickers.com, at this moment: Out of the 43 Cypherpunk and 51 Mixmaster remailers (53 unique addresses) on these stats there are 27 CPunks and 37 Mixes over 98.0% in terms of overall reliability. The remailer network has never been healthier. Perhaps you need to update your keyrings and stats as to ensure you are using remailers which are still operating reliably? Individual remailers do come and go over time.
Re: The Microsoft Xbox Key
I think you're drifting here from my original point, which that it is in no way illegal, or even immoral, to run free software on hardware that you own, and to pick any locks on the hardware you own, which would preclude you from doing so. Amen, brudda. So will the cops eventually bust down my door if I accidentally drop and break an Xbox open? Also, some would argue that microsoft does use forms of coercion to get ultimately use their products. Whether one agrees with this or not, a nice little byproduct of hacking an Xbox and turning it into a PC is that there will be some slight pressure on 'Soft to get the prices back up to at least breakeven for the box. From: Eric Cordian [EMAIL PROTECTED] To: [EMAIL PROTECTED] (Tim May) CC: [EMAIL PROTECTED] Subject: Re: The Microsoft Xbox Key Date: Tue, 7 Jan 2003 11:58:56 -0800 (PST) Tim writes: Given that x86 boxes without Windows installed can now be had for about the price of an XBox, and given that the graphics chip in the Xbox is not used by any of the Linux server uses (so far as I know), the main value of hacking the Xbox is for cuteness, to show that it can be done. Linux is now available for download for modchipped Xboxes. Ergo, I would infer that issues of Linux supporting the hardware are behind us, and the sole remaining problem is getting an unaltered Xbox to run arbitrary code. There is a non-Microsoft-approved Xbox media player out, so I would also infer someone has figured out how to use the graphics chip, which is a custom nVidia Geforce 3, a known device for which good drivers exist. (The approximately $200-300 Linux box comes with a 600 MHz VIA x86, and may come with more than the 10 GB disk the Xbox comes from. I don't track this closely. I'd expect that the drive is faster in the PC, as XBox doesn't need a speedy drive for game play. All in all, I'd rather have the PC for Linux than a hacked Xbox.) My impression is that at the $200 price point, the Xbox is a better built fuller-featured box than similarly priced boxes from places like Wal-Mart. Those who don't wish to use MS products should not do so. I use Macs. Many use Linux. And so on. I think you're drifting here from my original point, which that it is in no way illegal, or even immoral, to run free software on hardware that you own, and to pick any locks on the hardware you own, which would preclude you from doing so. The public is getting the notion that there are things that it should be illegal for you to do to devices that you own, for purposes of accessing their functionality. This is something that needs to be strongly discouraged. Right now, such endeavors are being muddied by being lumped in with such things as cracking commerical software and breaking into corporate and military systems in the public mindset. A widely publicized legal opinion by someone like the EFF, stating that running anything you want on your own Xbox is a perfectly legitimate thing to do, would put the ball in Microsoft's court to either say that they disagreed, or to say nothing and let it slide, which would greatly reduce their ability to legally harrass people in the future. It costs nothing to issue a press release. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division Do What Thou Wilt Shall Be The Whole Of The Law _ MSN 8 with e-mail virus protection service: 2 months FREE* http://join.msn.com/?page=features/virus
Re: Television
On Wed, 8 Jan 2003, Nomen Nescio wrote: It's amusing that Mr. May thinks that anyone gives a fuck if he (Mr. May) filters him/her out for whatever reason and considers worthwhile/effective effort to explain that reason at length every time, and yet doesn't consider that similar and far more intensive efforts by the state-directed mass media are as well effective. (more at the bottom) [...] That was rude and impolite. But I couldn't stop laughing for quite a while :-) Patience, persistence, truth, Dr. mike
Re: The Microsoft Xbox Key
From: Tyler Durden [EMAIL PROTECTED] Also, some would argue that microsoft does use forms of coercion to get ultimately use their products. Quite similar to the people who try and argue that Napoleon was a horse, right? will be some slight pressure on 'Soft to get the prices back up to at least breakeven for the box. Amen. I'm tired of paying unjustly low prices.
Re: Television
A trivial point, barely worth making time for, but folks ought not to think that brainwashing via t.v. has _anything_ substantively causal to do with the sad state we are in today. It's amusing that Mr. May thinks that anyone gives a fuck if he (Mr. May) filters him/her out for whatever reason and considers worthwhile/effective effort to explain that reason at length every time, and yet doesn't consider that similar and far more intensive efforts by the state-directed mass media are as well effective. (more at the bottom) ## ## ## ## ## ## # # # # # ## ## ## ## ## ## ## ## ## ## ## ## ## ## ### ## ## ## ## ## ## ## ## # # ## ## # # # # ### ## ## # # # # # ## # ### ### ### ### ### ##### ## ## ## ## ## ## ## ## ### ## ## ## ## ## ## ## # # # # ## ### # # ### ## ### ### ## ## # ### ### ## ## ##### # ### ## # # # ## ## ##
The Microsoft Xbox Key
Slashdot is reporting that The Neo Project, a distributed computing effort, has ceased trying to factor Microsoft's Xbox binary signing key, due to legal reasons, and the fact that many of their current participants don't want to be soiled by association with something having a nefarious reputation. The Xbox public RSA key is 2048 bits in length, and its digits may be found at http://xbox-linux.sourceforge.net/articles.php?aid=200235404321 Michael Robertson, the Lindows CEO, is funding two $100k prizes for Linux on the Xbox. The first was to run Linux on a modded Xbox, and the second is to devise some method of running Linux on an unmodded Xbox, for which factoring the aforementioned RSA key is one satisfactory approach amongst several. The Microsoft Xbox is internally an Windows 2000 box, with a 733 mhz 0.18 micron Coppermine Mobile Celeron, 64 MB of DDR RAM on two high speed channels, a 10 GB disk, custom nVidia GPU, Ethernet, 4 USB ports, a 5x DVD-ROM drive, and a Dolby capable audio processor, all at a lovely price point of $199. It is said that Microsoft loses money on every one sold, and the box would certainly make a lovely Linux box or Web Server providing you could run something other than Microsoft-signed binaries on it. You can of course run anything on your Xbox if you modchip it, but this requires taking it apart, voiding the warranty, getting permanently blacklisted for Microsoft's online gaming services, and other bad things. Also, only a tiny fraction of Xbox owners are going to bother modchipping their systems, and for the Xbox to become a popular general purpose computer, the ability to just burn any software you want on a DVD and cram it in the slot on an unmodified Xbox is required. Ignoring for the moment that The Neo Project had zero chance of factoring a 2048 bit key using publicly available algorithms, their caving under imagined legal pressure strikes me as a really bad precedent. Microsoft, an illegal monopoly in the area of computer operating systems, is attempting to garner a share of the gaming market. To this end, they are selling at below their cost, a robust well-built low-end PC at an extremely attractive price. In order to prevent this box from perturbing their core monopoly business of selling operating systems to manufacturers of similar computers, they are shipping the box as a sealed unit, not designed to be opened by the consumer, and they have rigged the OS to only execute binaries signed by them. Now, it strikes me that Microsoft has absolutely no legal right to prevent me from running any program I choose on hardware that I OWN, and doing any reverse engineering necessary to achieve this goal. This isn't like reverse engineering software, which I don't really own, but merely have a license to use under certain conditions. It isn't like breaking copy protection on a copyrighted work either. It's like buying a trunk at a rummage sale, and having a set of keys made so you can open it without damaging it, to see what's inside, and to use it in the future for purposes a trunk is suited for. Before this silly notion that writing programs and running them on an Xbox which one owns is somehow illegal gathers steam, I think it would be real useful if an organization like the EFF could issue an opinion, written by a real lawyer, stating that people have every right to run their own code on their own Xbox. And furthermore, that reverse engineering neccessary to achieve this goal, like factoring the public RSA key for the Xbox, is a perfectly legitimate activity, and has nothing to do with some other things having a bad reputation, like cracking copyright protection, or making illegal copies of licensed commercial software. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division Do What Thou Wilt Shall Be The Whole Of The Law
Television
On Tuesday, January 7, 2003, at 02:04 AM, Bill Stewart wrote: At 12:42 AM 01/07/2003 -0800, Major Variola (ret) wrote: At 05:14 PM 1/6/03 -0800, Michael Motyka wrote: BTW, I think I read somewhere that when the water gets too hot the frog just leaves. It was in print, it must be true. Perhaps it is. But if you put a TV in the pot with the frog, he gets distracted... And someone else nameless wrote that all you need to do is get 90% of the sheeple to not to watch TV for a month and you'd have a revolution too. I know a lot of people who don't watch any t.v. at all and who are no wiser or more revolutionary than anyone else. A trivial point, barely worth making time for, but folks ought not to think that brainwashing via t.v. has _anything_ substantively causal to do with the sad state we are in today. --Tim May
Re: Misconceptions about how remailers work
On Tuesday, January 7, 2003, at 10:46 AM, Igor Chudov wrote: A nice article, although I was under impression that basically the remailer network was no longer operable. Wanted to send some joke stuff through them and was unable to do so due to lack of working remailers. igor First, please don't top post and then include the entire text of a quoted article. This is less a matter of bandwidth than it is focus and decency. Second, remailers are very much alive. Perhaps the ones you used to use are no longer operating, The newsgroup alt.anonymous.messages is one place that has many such messages and daily listings of operating remailers. Third, thanks for liking my note. I wasn't trying to cover Type II or Type III remailers, just disabuse the original poster of his notion that untraceability is impossible because of MACs and other cruft attached to packets. --Tim May
Cryptome Log...A nice opportunity!
It was written... Commonwealth before said GRAND JURY in the matter of Commonwealth v. John Doe, and bring with him/her all logs recording the I.P. addresses and/or users who visited http://cryptome.org/sec-con.htm; between 11/7/02 00:00:00 GMT and 11/14/02 23:59:59 GMT. If no such log exists for the specific page in question, please provide any logs that would cover the domain together with an explanation of what the log covers. So if someone generated a nice-looking fake log this would be legally binding in court? Sounds like a nice opportunity for J/Tim May's 'vengeance' hack...anyone got some interesting IP addresses they'd like to submit? Mr Young could claim he forgot about this list, if he's got th'balls! Also, anyone notice anything fishy here? Notice... HEREOF FAIL NOT, and make due return of this Writ, with your doings thereon, into the said Court. WITNESS, my hand, at Boston in the County of Suffolk this 31st day of December in the year of our Lord two thousand and two. Kind of an odd date, no? Were there new laws scheduled to start on 1/1/03? This CAN'T be a coincidence...
Re: Cryptome Log Subpoenaed (Pissing on Potassium)
Dear John A. Grossman, MA AAG: You might also subpeona the masters of http://216.239.53.100/search?q=cache:NW6ZES17aTcC:cryptome.org/sec-con.htm+hl=enie=UTF-8 You might also ponder the words of the First Fellatrix: I think people have not quite gotten their hands around the speed at which information can be disseminated online. -Monica Lewinsky, LATimes 9 may 01 http://www.latimes.com/business/columns/celebsetup/lat_monica010510.htm Dear List: cryptome.org is down, barring research into the publications of interest, however Mr. Google has kindly provided a backup, although he as usual denies all culpability. HEREOF FAIL NOT to get a clue WITNESS the hand of distributed information systems -John Doe Number Two Refs follow At 06:55 PM 1/7/03 +0100, Eugen Leitl wrote: http://cryptome.org/cryptome-log.htm Attn: John Young Enclosed is a Grand Jury subpoena requiring that Cryptome produce certain records. bring with him/her all logs recording the I.P. addresses and/or users who visited http://cryptome.org/sec-con.htm; between 11/7/02 00:00:00 GMT and 11/14/02 23:59:59 GMT. If no such log exists for the specific page in question, please provide any logs that would cover the domain together with an explanation of what the log covers. Thank you for your attention to this matter. If you have any questions, please feel free to call. Very truly yours, [Signed] John A. Grossman Assistant Attorney General Chief, Corruption, Fruad Computer Crime Division This is G o o g l e's cache of http://cryptome.org/sec-con.htm. G o o g l e's cache is the snapshot that we took of the page as we crawled the web. The page may have changed since that time. Click here for the current page without highlighting. To link to or bookmark this page, use the following url: http://www.google.com/search?q=cache:NW6ZES17aTcC:cryptome.org/sec-con.htm+hl=enie=UTF-8 Google is not affiliated with the authors of this page nor responsible for its content. 2 September 2002 From: Dorsey Morrow, CISSP [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: RE: Warning on Legal Notice Date: Mon, 2 Sep 2002 21:07:50 -0500 John, The e-mail you received is nothing more than a hoax. While the FROM: box shows it comes from our organization, if you look at the IP header information, you will see that it does not come from our organization. None of the e-mail is true. We do not have any personal information on anyone except those who are members of our organization, and we certainly do not keep any form of financial information. In fact, unless you are a member of our organization, we do not even have your contact information. We have determined that the e-mails used to further this hoax were gathered from various websites and spam lists. Regrettably, it is easy to spoof someone on the Internet. It is very easy for an e-mail message to appear to come from President Bush or Bill Gates, when indeed they did not. That is the case here. We are in the process of implementing digital signatures for all official e-mails to assist in verifying what is legitimate e-mail and what is not. We believe the e-mail to be the work of a mentally-deranged individual acting without benefit of any ethics or scruples. We apologize for any confusion or inconvenience this might have caused you. Best regards, Dorsey Morrow, CISSP (ISC)2 General Counsel 2 September 2002 From: Anthony Baratta, CISSP [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Legal Notification Date: Sun, 1 Sep 2002 13:23:23 -1000 Legal Notification You are herby informed that (under the privacy act), the International Information System Security Certification Consortium (ISC)2 has sold your information including, Name , E-Mail address, Residential address, Credit and savings information, Social Security information, and Occupation details. This information has been sold to a third Party \ Parties and this E-mail serves as notification for such action. This information was sold under the premise for marketing and research. Under the privacy act you may request to see in writing any information that we have about you. Please write to the following address with a self addressed envelope. (ISC)2 860 Worcester Rd.,Ste 101 Framingham, Ma 01702 U.S.A If you have any questions about the third Party \ Parties please inquire with them. The International Information System Security Certification Consortium (ISC)2 is no longer responsible for the information sold. (ISC)2 Will hold no responsibility for damages and loss suffered by the reader of this E-mail. (ISC)2 is not responsible for the actions of third party companies. Upon written request we will consider deleting records that we currently hold about you. A processing fee of $ 10.00 will apply. Please make out this check to (ISC)2 and
Re: Singularity ( was Re: Policing Bioterror Research )
at Tuesday, January 07, 2003 1:14 AM, Michael Motyka [EMAIL PROTECTED] was seen to say: financial resources, other than those that pass through verified identity gatekeepers; That's an odd way to spell Campaign Fund Contributing Corporations