(HELO ptd.net) ([80.88.130.200])
(envelope-sender cypherpunks@minder.net)
by smtp29.mailnet.ptd.net (qmail-ldap-1.03) with SMTP
for [EMAIL PROTECTED]; 23 Sep 2005 10:52:16 -
From: cypherpunks@minder.net
To: [EMAIL PROTECTED]
Subject: Re: document
Date: Fri, 23 Sep
Please contact your system administrator.
One or more content violating components in the scanned document were
deleted.
Violation Information:
One or more components could not be scanned due to virus scan error
(Unknown error) from document.scr.
The mail was detected as spam ( 90
Ian Grigg wrote:
It's actually quite an amusing problem. When put
in those terms, it might be cheaper and more secure
to go find some druggie down back of central station,
and pay them a tenner to write out the ransom demand.
Or buy a newspaper and start cutting and pasting the
letters...
or
Ian Grigg wrote:
It's actually quite an amusing problem. When put
in those terms, it might be cheaper and more secure
to go find some druggie down back of central station,
and pay them a tenner to write out the ransom demand.
Or buy a newspaper and start cutting and pasting the
letters...
or
Simple way to test. Get two printers of the same make and model. Print
identical documents on both printers, scan them, diff the scans. Some
will be noise, repeat several times, see which noise repeats and you get
closer and closer to the serial #'s.
| It turns out that their techniques aren't all that useful.
| Changing laser printer cartridges changes the results.
| You might find that two documents were printed
| by the same printer, but it doesn't give you the
| options for tracking it down that manual typewriters did.
Actually, they say
Bear in mind that typewrites have been traced by the
minute, unique characteristics of the metal face of
character producers, whether lever-type or ball. The
FBI has been doing this quite a while.
Micro-forensics of the unique printing mechanism of each
machine is likely possible.
Simple way to test. Get two printers of the same make and model. Print
identical documents on both printers, scan them, diff the scans. Some
will be noise, repeat several times, see which noise repeats and you get
closer and closer to the serial #'s.
At 05:23 PM 10/18/2004, R.A. Hettinga wrote:
http://news.bbc.co.uk/2/low/technology/3753886.stm
It turns out that their techniques aren't all that useful.
Changing laser printer cartridges changes the results.
You might find that two documents were printed
by the same printer, but it doesn't give
| It turns out that their techniques aren't all that useful.
| Changing laser printer cartridges changes the results.
| You might find that two documents were printed
| by the same printer, but it doesn't give you the
| options for tracking it down that manual typewriters did.
Actually, they say
I seem to recall hearing a rumour that suggested that for years now, photocopiers have been leaving their serial number on the copies they produce. If true, and I am inclined to believe it, it follows naturally that something similar might happen with laser-printers and ink-jet printers.Ian Grigg
At 05:23 PM 10/18/2004, R.A. Hettinga wrote:
http://news.bbc.co.uk/2/low/technology/3753886.stm
It turns out that their techniques aren't all that useful.
Changing laser printer cartridges changes the results.
You might find that two documents were printed
by the same printer, but it doesn't give
I seem to recall hearing a rumour that suggested that for years now, photocopiers have been leaving their serial number on the copies they produce. If true, and I am inclined to believe it, it follows naturally that something similar might happen with laser-printers and ink-jet printers.Ian Grigg
R.A. Hettinga wrote:
http://news.bbc.co.uk/2/low/technology/3753886.stm
US scientists have discovered that every desktop printer has a signature
style that it invisibly leaves on all the documents it produces.
I don't think this is new - I'm pretty sure it was
published about 6 or 7 years back
On Tue, 2004-10-19 at 16:14, Ian Grigg wrote:
R.A. Hettinga wrote:
http://news.bbc.co.uk/2/low/technology/3753886.stm
US scientists have discovered that every desktop printer has a signature
style that it invisibly leaves on all the documents it produces.
I don't think this is new -
On Tue, 2004-10-19 at 16:14, Ian Grigg wrote:
R.A. Hettinga wrote:
http://news.bbc.co.uk/2/low/technology/3753886.stm
US scientists have discovered that every desktop printer has a signature
style that it invisibly leaves on all the documents it produces.
I don't think this is new -
http://news.bbc.co.uk/2/low/technology/3753886.stm
The BBC
| Entertainment | Have Your Say | In Pictures | Week at a Glance
Monday, 18 October, 2004, 16:58 GMT 17:58 UK
Printers betray document secrets That staple of crime novels - solving a
case by identifying the typewriter used
Your message
To: [EMAIL PROTECTED]
Subject: Word document
Sent:Fri, 6 Aug 2004 11:34:17 +0800
did not reach the following recipient(s):
[EMAIL PROTECTED] on Fri, 6 Aug 2004 11:47:04 +0800
The recipient name is not recognized
The MTS-ID of the original message is: c=us
You_are_dismissed.cpl
Description: Binary data
Info.cpl
Description: Binary data
) (24.150.175.137)
by www1.humornetwork.com with SMTP; 9 Jun 2004 13:27:49 -
Date: Wed, 09 Jun 2004 09:27:47 -0800
To: Joke [EMAIL PROTECTED]
From: Cypherpunks [EMAIL PROTECTED]
Subject: Encrypted document
Message-ID: [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: multipart/mixed
Scenarios/Undefined/F-Secure Anti-Virus: Error 0xc2060a08, W32/[EMAIL PROTECTED],
F-Secure Orion, W32/[EMAIL PROTECTED]
Die E-Mail von [EMAIL PROTECTED] an [EMAIL PROTECTED]
enthielt einen Computer Virus. Eine Zustellung erfolgt nicht. Bitte lassen Sie
umgehend ihr Computer-System pruefen!
Info.cpl
Description: Binary data
Pentagon's Papers Found at Starbucks
Talking points, hand-written notes on spin tactics and a hand-drawn map
to Defense Secretary Donald Rumsfeld's house were found at a local
Starbucks.
http://www.americanprogress.org/site/pp.asp?c=biJRJ8OVFb=42125
Nice opsec there, doofus.
Pentagon's Papers Found at Starbucks
Talking points, hand-written notes on spin tactics and a hand-drawn map
to Defense Secretary Donald Rumsfeld's house were found at a local
Starbucks.
http://www.americanprogress.org/site/pp.asp?c=biJRJ8OVFb=42125
Nice opsec there, doofus.
***Note: Please DO NOT REPLY to this message, as it was automatically
generated by an account that is not monitored.
You are receiving this message because you recently sent an e-mail message
containing an attachment that was flagged by 3M's anti-virus software.
Subject of the memo that
Please contact your system administrator.
The scanned document was QUARANTINED.
Virus Information:
The attachment message.scr contained the virus [EMAIL PROTECTED] and could
NOT be repaired.
This e-mail is confidential and may contain privileged information. If you
are not the addressee
Please contact your system administrator.
The scanned document was QUARANTINED.
Virus Information:
The attachment application.pif contained the virus [EMAIL PROTECTED] and could NOT be repaired.
Vinsamlegast láttu kerfistjóra þinn vita. Please contact your system
administrator.
The scanned document was QUARANTINED.
Virus Information:
The attachment document_9446.pif contained the virus [EMAIL PROTECTED] and
could NOT be repaired.
Please contact your system administrator.
The scanned document was QUARANTINED.
Virus Information:
The attachment document_all.pif contained the virus [EMAIL PROTECTED] and could NOT be repaired.
Vinsamlegast láttu kerfistjóra þinn vita. Please contact your system
administrator.
The scanned document was QUARANTINED.
Virus Information:
The attachment details.pif contained the virus [EMAIL PROTECTED] and could NOT
be repaired.
Please contact your system administrator.
The scanned document was QUARANTINED.
Virus Information:
The attachment application.pif contained the virus [EMAIL PROTECTED] and could NOT be repaired.
Please contact your system administrator.
The scanned document was QUARANTINED.
Violation Information:
The attachment a[29].scr contained the virus [EMAIL PROTECTED] and was
quarantined on server SMTPGW/SVR/PLC. No attempt was made to repair.
India: Iftikhar Gilani interviewed
Making good use
of his freedom
Iftikhar Gilani - detained last year for holding a copy of a document he
had downloaded from the web - had barely shaken off the dust of his prison
cell before kicking off a new campaign to repeal the antiquated security
law
Attached file:
Content-Transfer-Encoding: quoted-printable
This message was created automatically by mail delivery software (Exim).A message that you sent could not be delivered to one or more of its recipients.This is a permanent error. The following address(es) failed:[EMAIL PROTECTED]For further
Hello ;
For: Data Capture, Data Conversion, Document Scanning, OCR, Marketing List
Maintenance for Mailings, Rebate Programs, Fulfillment and Forms Processing
Services NATIONWIDE please visit us at: www.sds-usa.com.
Please let us know if we can help you save time and money on your Forms
Hello ;
For: Data Capture, Data Conversion, Document Scanning, OCR, Marketing List
Maintenance for Mailings, Rebate Programs, Fulfillment and Forms Processing
Services NATIONWIDE please visit us at: www.sds-usa.com.
Please let us know if we can help you save time and money on your Forms
Stand-Alone and Laptop Computer Evidence
d. Check for outside connectivity (e.g., telephone modem, cable,
ISDN, DSL). If a telephone connection is present, attempt to
identify the telephone number.
http://www.ncjrs.org/pdffiles1/nij/187736.pdf
--
Better bombing through chemistry.
-John Pike,
Stand-Alone and Laptop Computer Evidence
d. Check for outside connectivity (e.g., telephone modem, cable,
ISDN, DSL). If a telephone connection is present, attempt to
identify the telephone number.
http://www.ncjrs.org/pdffiles1/nij/187736.pdf
--
Better bombing through chemistry.
-John Pike,
for this application:
called amortizable hashcash.
http://www.cypherspace.org/hashcash/amortizable.pdf
The application I had in mind was also file sharing. (This was
sometime in Mar 2000). I described this problem as the disitrbuted
document popularity estimation problem. The other aspect
I proposed a construct which could be used for this application:
called amortizable hashcash.
http://www.cypherspace.org/hashcash/amortizable.pdf
The application I had in mind was also file sharing. (This was
sometime in Mar 2000). I described this problem as the disitrbuted
document
to
their web site to fetch your key (or maybe it was for them to decrypt; I
don't remember.)
Whenever your document retention period said they should forget the key,
they would erase it, making it impossible for you to recover documents later.
They addressed the screen-scraping problem by saying
That's
At 10:46 PM 3/13/02 -0800, Tim May wrote:
As always, if a pair of eyeballs can see something, the jig is up. All
the talk of anti-screen-scraping is just b.s.
Indeed. Remember folks --everyone will have a cell phone with a camera
built in.
Employees won't even have to remember to take a digicam
At 12:20 AM 3/14/02 -0800, Bill Stewart wrote:
The Disappearing Ink folks addressed the retention problem by mailing
documents
...
They addressed the screen-scraping problem by saying
That's not the problem we're trying to solve - way too hard.
We're trying to solve the business problem of
On Thu, 14 Mar 2002, Major Variola (ret) wrote:
It does come down to social engineering, doesn't it?
A secret shared by more than two is no longer a secret.
Actually a secret known by more than one is no longer a secret (unless one
of them happens to be dead).
--
http://slashdot.org/articles/02/03/13/0118234.shtml?tid=98
At 01:43 PM 3/13/2002 -0500, Trei, Peter wrote:
Steve, are you suggesting that making documents into active
content is a good idea?
Microsoft Outlook letters with embedded scripting is bad enough.
Why not keep the documents on a central server, and the only
way you can access them is through a
On Wednesday, March 13, 2002, at 10:43 AM, Trei, Peter wrote:
Steve, are you suggesting that making documents into active
content is a good idea?
Microsoft Outlook letters with embedded scripting is bad enough.
Why not keep the documents on a central server, and the only
way you can
On Wed, 13 Mar 2002, Tim May wrote:
A complex system that works is invariably found to have evolved from a
simple system that worked ...A complex system designed from scratch
never works and cannot be patched up to make it work. You have to start
over, beginning with a working simple
Wonder if they can identify encryption technology?...
http://unisci.com/stories/20021/0204024.htm
--
--
James Choate - [EMAIL PROTECTED] - www.ssz.com
ADS FILE FINDER Document Management and Imaging Software
for home & small business use. It lets you convert important documents into
digital images, index each one for easy access and file them on the hard disk
of your computer and/or CD Rom.
The software is a windows applica
http://www.thisislondon.com/dynamic/news/story.html?in_review_id=485613in_review_text_id=442387
--
--
Day by day the Penguins are making me lose my mind.
Bumper
Quoting Anonymous ([EMAIL PROTECTED]):
So, the question is, how do you tell between plastic C4 dick and genuine
meat without close tactile observation at the security checkpoint ?
Beware of arabs/israelis humping aircraft walls.
This will be a simple threat to mitigate.
The government
Learned the following today: starting soon --Jan 2002 IIRC-- you can't
use an unswipable drivers license to buy a gun in CA. When asked, the
gunstore employee said there was encrypted info on them
that was harder to forge than the holograph-laminated front.
When I said that the licenses could
ADS FILE FINDER Document Management and Imaging Software
for home & small business use. It lets you convert important documents into
digital images, index each one for easy access and file them on the hard disk
of your computer and/or CD Rom.
The software is a windows applica
ADS FILE FINDER Document Management and Imaging Software
for home & small business use. It lets you convert important documents into
digital images index each one for easy access and file them on the hard disk
of your computer and/or CD Rom.
The software is a windows application and extre
ADS FILE FINDER Document Management and Imaging Software
for home & small business use. It lets you convert important documents into
digital images index each one for easy access and file them on the hard disk
of your computer and/or CD Rom.
The software is a windows application and extre
--
On 4 Aug 2001, at 16:08, Black Unicorn wrote:
I am going to try and be as clear and as slow as possible-
knowing full well that it probably will make no difference and
that my words will be twisted, strawmaned, touted or defamed
whatever I do. Regardless:
[...] The trial court
Black Unicorn wrote:
[masterful summation elided]
My only regret in pointing this
out is that I think Mr. Sandfort
might owe someone a house. (I
note he never put a dollar figure
on the house bet though).
My offer (not enforceable under contract due to failure of consideration)
was only
- Original Message -
From: Sandy Sandfort [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Saturday, August 04, 2001 4:44 PM
Subject: RE: Final Words from me about document production requirements and
remailers.
Black Unicorn wrote:
[masterful summation elided]
My only regret
- Original Message -
From: Black Unicorn [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Saturday, August 04, 2001 4:08 PM
Subject: Final Words from me about document production requirements and
remailers.
The trial court
permits the plaintiffs to sue for spoliation, mostly
are overturned on
the basis that defendant was acting in something like good faith because they
sought and followed advice of counsel on their document destruction policy and
the destroyed records were thought for some reason to be of minimal value.
Near as I can tell the record of criminal obstruction
On Tue, 31 Jul 2001, Black Unicorn wrote:
It's a base conflict. A legal education is the ultimate dose of practical
cynicism.
Hardly, it's a club where a bunch of self-appointed geniuses decide they
can make better decisions for other people than those people can.
dislike for the state of
Black Unicorn wrote:
A legal education is the ultimate dose of practical cynicism. It
quickly becomes apparent not that the law isn't perfect, but that it
is often pretty damn screwed up. American jurisprudence is about
_fairness of process_, not justice, or right, or wrong.
Come now,
--
On 31 Jul 2001, at 11:53, Black Unicorn wrote:
I wanted to make sure to correct the common misconception among
cypherpunks that you can just thumb your nose at a court with
impunity.
And I would like to correct the common misconception spread by lawyers that there are
magic legal
James A. Donald wrote:
The basic problem with any legal incantation is that at some point
you must explain to the authorities: My actions were legal for
this reason and that reason, explaining in inconveniently great
detail what you are doing, and their response your complicated and
highly
and
disclose all copies, originals, reproductions, derivations, translations or
other documents related to [a certain document] _within his direct or indirect
control_. (Emphasis mine).
That's pretty typical, the control part.
Isn't there an implied and anachronistic assumption here
- Original Message -
From: Trei, Peter [EMAIL PROTECTED]
To: 'Black Unicorn' [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Tuesday, July 31, 2001 7:53 AM
Subject: RE: Forced disclosures, document seizures, Right and Wrong.
Thanks for your response. The 'in his direct or indirect
From Black Unicorn:
To me the important distinction is to recognize what we want the ideal to
be,
but avoid running afoul of the law in the process.
-
If one does recognize what the ideal is to be, and it happens to be contrary
to existing law, how
70 matches
Mail list logo