The attachment(s) that you sent with the following mail
was deleted by MailScan (not delivered to the recipient)
==
The Mail came from: [EMAIL PROTECTED]
The Mail recipient: [EMAIL PROTECTED]
Subject of the Mail : A new website
at Monday, November 04, 2002 2:28 AM, Tim May [EMAIL PROTECTED] was seen
to say:
Those who need to know, know.
Which of course is a viable model, provided you are only using your key
for private email to those who need to know
if you are using it for signatures posted to a mailing list though, it
Star Wars Episode II Sticker Collection!
This official Star Wars Attak of the Clones Collection
containes 1 box of 100 packs, with6 different sticker cards per pack.
A total of 600 sticker
EXTREMLY URGENT.
on tel:234-803-3375426,
FROM MR Frank Donald
Dear Sir,
This letter was borne out of my sincere desire to
establish a business /transfer of money in your account.
My name is Mr. Frank Donald a friend of Dr. Useni Dauda ( the former minister
of work and finance (FMWF) under
INSIGHT NEWS ALERT!
New stories from Insight on the News are now online.
http://www.insightmag.com/
...
Folks, tomorrow is election day. Its impossible to talk about the
merits of American democracy and freedom expressed by people like
Öйú·þÎñÈ«ÇòרҵµÄÓòÃû×¢²áÌṩÉÌ£¬ÏÖÍƳöÖ÷»ú¡¢ÓòÃû×¢²áÓŻݷþÎñ£º
¡°ÌØ»Ý1+1ÆóÒµÉÏÍøÌײ͡±ÊÇÖйú·þÎñÆ÷ÍøÂçÓÐÏÞ¹«Ë¾ÎªÄúÍƳöµÄ³¬Öµ·þÎñ£¬
¡°ÏÈ·þÎñ£¬ºóÊÕ·Ñ£¡¡±ÄÚÈÝ°üÀ¨£º
30M asp cgi,php +ACCESS Êý¾Ý¿â,Ë͹ú¼Ê¶¥¼¶ÓòÃûÒ»¸ö 250Ôª/Äê (ËÍÎå¸öÓÊÏä)
100M asp cgi,php +ACCESS
Öйú·þÎñÈ«ÇòרҵµÄÓòÃû×¢²áÌṩÉÌ£¬ÏÖÍƳöÖ÷»ú¡¢ÓòÃû×¢²áÓŻݷþÎñ£º
¡°ÌØ»Ý1+1ÆóÒµÉÏÍøÌײ͡±ÊÇÖйú·þÎñÆ÷ÍøÂçÓÐÏÞ¹«Ë¾ÎªÄúÍƳöµÄ³¬Öµ·þÎñ£¬
¡°ÏÈ·þÎñ£¬ºóÊÕ·Ñ£¡¡±ÄÚÈÝ°üÀ¨£º
30M asp cgi,php +ACCESS Êý¾Ý¿â,Ë͹ú¼Ê¶¥¼¶ÓòÃûÒ»¸ö 250Ôª/Äê (ËÍÎå¸öÓÊÏä)
100M asp cgi,php +ACCESS
Title: GaminglandCasino.com
See
why Gamingland Casino is the most incredible online casino.Whatever you level,
whatever your game, we've got all the casino excitement you're looking
for in the comfort of your home!
Get Up To $200
Did you miss out on PRCT, UP 300%?
Here's another pick - Another Short Play
CLICK HERE
I no longer wish to receive your newsletter click here
ajhqwuqvakwfgkqippclsfclpypixhjeflnry
Peter Trei wrote...
Durden's question was whether a snooper on an IPSEC VPN can
tell (for example) an encrypted email packet from an encrypted
HTTP request.
The answer is no.
All Eve can tell is the FW1 sent FW2 a packet of a certain size.
The protocol of the encapsulated IP packet, it's true
¸óÏÂ:Èç¹ûÄúÐèҪͨ¹ýemail×ö¹ã¸æ,ÎÒ¿ÉÒÔΪÄãÌṩemailµØÖ·¿â,¼Û¸ñ:500ÍòÓÊÖ·650Ôª,¸½ËÍÃÀ¶ûÍøÂçÓʼþ¼«ËÙȺ·¢Íõ(ÂÌÉ«Èí¼þ²»Ðë°²×°,²»ÐësmtpÉèÖÃ)¡£µ±Ìì½»»õ,»¶Ó¶©¹º,µç»°:0755-82483730,ÁªÏµÈË:ÑîÉú,ÍøÖ·:www.99aa.com
½¨ÍøÕ¾880Ԫȫ°üÆð(Ò»¸ö¹ú¼ÊÓòÃû,100MÍøÕ¾¿Õ¼ä,4Ò³ÍøÒ³),ÏêÇéÇë·ÃÎÊ:www.99aa.com
Tyler Durden[SMTP:[EMAIL PROTECTED]] wrote
But from your previous email, you indicated that the secure IPSEC tunnel
is
created by taking the packets, encrypting S/A, D/A, payload and protocol
fields (ie, pretty much everything) and then dumping them into the payload
of another
Dear colleague -
I'd like to invite you to attend the 5th Smart Card Research and
Advanced Application Conference, November 21-22 in San Jose, CA.
http://www.usenix.org/events/cardis02/
CARDIS '02, the joint IFIP/USENIX International Conference on Smart
Card Research and Advanced Applications,
I think this is what you're looking for:
http://www.improb.com/airchives/paperair/volume6/v6i4/postal-6-4.html
At 11:17 PM 11/3/02 +0100, Thoenen, Peter Mr. EPS wrote:
Tried emailing direct but bounced so apologize to the list for the OT
content :)
You don't happen to have the url do you?
On Sun, Nov 03, 2002 at 11:23:36AM -0800, Tim May wrote:
- -- treat text as text, to be sent via whichever mail program one uses,
or whichever chatroom software (not that encrypted chat rooms are
likely...but who knows?), or whichever news reader software
http://www.invisible.net is sort of
On Mon, Nov 04, 2002 at 12:58:55PM -0500, Trei, Peter wrote:
Durden's question was whether a snooper on an IPSEC VPN can
tell (for example) an encrypted email packet from an encrypted
HTTP request.
The answer is no.
All Eve can tell is the FW1 sent FW2 a packet of a certain size.
The
A New Cryptography Uses the Quirks of Photon Streams
By JOHN MARKOFF
he quirky world of quantum physics, where mathematical elements can
hold multiple values and objects can be in several places at once,
is heading toward commercial products.
A start-up company, MagiQ Technologies,
Tim May[SMTP:[EMAIL PROTECTED]]
On Saturday, November 2, 2002, at 08:01 PM, Tyler Durden wrote:
Prior to that, the encrypted email I've sent in the past year or so
has almost always failed, because of version incompatibilities,
While in Telecom I was auditing optical transport
--
From: Major Variola (ret)[SMTP:[EMAIL PROTECTED]]
Sent: Friday, November 01, 2002 6:02 PM
To: [EMAIL PROTECTED]
Subject: Re: Flight security analysis (was Re: Confiscation of
Anti-War Video)
At 05:16 PM 11/1/02 -0500, Steve Furlong wrote:
But Maj
Major Variola (ret)[SMTP:[EMAIL PROTECTED]]
When that trucker kamakazi'd into the state capital in Sacramento last
year, they decided to put Jersey barriers
up. Hard to do that in the air (Blimps with nets?)
The name for these is 'barrage balloons'. They were
widely deployed during WW2
GasUpUSA:
http://www.polishukenterprises.gasupusa.com/
CHECK OUT THIS OFFER!
The ever-though-provoking Peter Trei wrote...
A great deal of highly sensitive internal
email flows over these links, with the encryption totally transparent
to the end-users.
This is an interesting issue...how much information can be gleaned from
encrypted payloads? Is it possible for a switch
Mayday 2002The Metropolitan Police are seeking your help to identify and
trace the suspects pictured here.
During the past three years, major anti-capitalist demonstrations have
taken place in Central London on May Day.
A determined minority in these protests have set out to cause major
Title: Untitled Document
¿øÇϽô °æÇ°À»
¼±ÅÃÇϽÅÈÄ µå¸²·ÐÆнº ½ÅûÇϱ⸦ ´©¸£¼¼¿ä.
»ó±â °æÇ°Àº Á¶±â Ç°Àý µÉ ¼ö ÀÖÀ¸¸ç, ¹è¼ÛÀÌ ´Ù¼Ò Áö¿¬ µÉ ¼ö ÀÖ´Â °æÇ°ÀÌ ÀÖ½À´Ï´Ù.
°æÇ°Àº Ä«µå¿Í´Â º°µµ·Î ¹ß¼ÛÇÕ´Ï´Ù.°æÇ°°ú °ü·ÃµÈ ¸ðµç ¹®ÀÇ´Â ¹®ÀÇÀüÈ : 02-3275-1230 / ¹®ÀÇ ¸ÞÀÏ :
On Sun, 3 Nov 2002, Lucky Green wrote:
Tim wrote:
Microsoft calls its technology Palladium. Intel dubs it
LaGrande.
I say we call it LaGrab.
Has anybody on the list seen any official specs, datasheets, etc. for
Intel's LaGrande feature set? Any documents that could be donated to
at Monday, November 04, 2002 3:13 PM, Tyler Durden
This is an interesting issue...how much information can be gleaned
from encrypted payloads?
Usually, the VPN is an encrypted tunnel from a specified IP (individual
pc or lan) to another specified IP (the outer marker of the lan, usually
the
EWeek 21 Oct 2002 p 58, High-tech products invite tech crimes P.
Coffee
Writing about a consultant who tried to sell a client's software, and
got busted:
Next time, a code theif may use a BlackNet brokerage (as envisioned
in the
widely circulated essay by Timothy May) to avoid such traps.
[He is
--
From: Tyler Durden[SMTP:[EMAIL PROTECTED]]
Sent: Monday, November 04, 2002 10:13 AM
To: [EMAIL PROTECTED]
Subject: RE: What email encryption is actually in use?
The ever-though-provoking Peter Trei wrote...
A great deal of highly sensitive internal
Tyler Durden[SMTP:[EMAIL PROTECTED]] writes:
Most the ones I've seen are IPSEC over IPv4. You might be able to glean
some info from packet size, timing, and ordering, but not much. IPSEC
takes a plaintext IP packet and treats the whole thing as a data block
to be encrypted.
SO this
Most the ones I've seen are IPSEC over IPv4. You might be able to glean
some info from packet size, timing, and ordering, but not much. IPSEC
takes a plaintext IP packet and treats the whole thing as a data block
to be encrypted.
SO this would indicate that IPSEC creates a sort of blockage from
At 10:13 AM 11/4/02 -0500, Tyler Durden wrote:
This is an interesting issue...how much information can be gleaned from
encrypted payloads?
Traffic analysis (who, how frequently, temporal patterns)
Size of payload
Is it possible for a switch or whatever that has
visibility up to layers 4/5/6 to
Major Variola (ret)[SMTP:[EMAIL PROTECTED]]
At 10:13 AM 11/4/02 -0500, Tyler Durden wrote:
This is an interesting issue...how much information can be gleaned from
encrypted payloads?
Traffic analysis (who, how frequently, temporal patterns)
Size of payload
Is it possible for a
Wowie! Can You Believe These Outrageous Girls?!?
TEENS ON THE BARNYARD... THEY ARE SO FRIGGIN HORNY!
This email was sent to you because your email address is part of a targeted opt-in list. You have received this email by either requesting more information on
Title: Xxxtasy Mail
ManWoman
WomanMan
This message is being sent to you because you
Title: Öйú½ÌÓýÍø »¶ÓÄúµÄºÏ×÷£¡
Èç¹ûÄú²»Ï£ÍûÊÕµ½ÎÒÃǵÄÓʼþ£¬
ÇëËæÊÖɾµô,лл£¡
¼ªÁÖÌزú¸ßµÈר¿ÆѧУ2003ÄêÕÐÉú¼Æ»®
You can wake up the mental genius within you instantly!
Mantic VII
Gives You Instant Mental Psychic Powers
Solves the problems of Love-Money-Career with this psychic power.
These are not idle wordsthey are "fact" as I am about to prove to you.
Click Here for Full FREE Details!
Get Removed
I sent the link to Peter direct yesterday, but if anyone else is
interested--
http://www.improb.com/airchives/paperair/volume6/v6i4/postal-6-4.html
~SAM
From: Major Variola (ret) [EMAIL PROTECTED]
Date: Mon, 04 Nov 2002 08:26:17 -0800
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: RE:
[EMAIL PROTECTED] (Major Variola ret) writes:
http://www.washtimes.com/national/20021104-81830128.htm
Officials attempt to get inside cells of al Qaeda in U.S.
By Richard Sale
UNITED PRESS INTERNATIONAL
Local and federal law-enforcement agencies are attempting to
infiltrate al Qaeda
-BEGIN PGP SIGNED MESSAGE-
If you signed your messages on a regular basis, it would let me know
whether or not you're the same Tim May, I've been reading since back
when toad.com was the only server for the list.
If you're key was signed by anyone I've dealt with, who I know will
at Monday, November 04, 2002 2:28 AM, Tim May [EMAIL PROTECTED] was seen
to say:
Those who need to know, know.
Which of course is a viable model, provided you are only using your key
for private email to those who need to know
if you are using it for signatures posted to a mailing list though, it
On Saturday November 2 2002 11:09, Adam Shostack wrote:
I'd be interested to hear how often email content is protected by any
form of crypto, including IPsec, Starttls, ssh delivery, or PGP or
SMIME. There's probably an interesting paper in going out and
looking at this.
I use GnuPG to the
Tim wrote:
Microsoft calls its technology Palladium. Intel dubs it
LaGrande.
I say we call it LaGrab.
Has anybody on the list seen any official specs, datasheets, etc. for
Intel's LaGrande feature set? Any documents that could be donated to
Cryptome's collection? So far, all I have been
Tim May[SMTP:[EMAIL PROTECTED]]
On Saturday, November 2, 2002, at 08:01 PM, Tyler Durden wrote:
Prior to that, the encrypted email I've sent in the past year or so
has almost always failed, because of version incompatibilities,
While in Telecom I was auditing optical transport
Major Variola (ret)[SMTP:[EMAIL PROTECTED]]
When that trucker kamakazi'd into the state capital in Sacramento last
year, they decided to put Jersey barriers
up. Hard to do that in the air (Blimps with nets?)
The name for these is 'barrage balloons'. They were
widely deployed during WW2
On Sun, 3 Nov 2002, Lucky Green wrote:
Tim wrote:
Microsoft calls its technology Palladium. Intel dubs it
LaGrande.
I say we call it LaGrab.
Has anybody on the list seen any official specs, datasheets, etc. for
Intel's LaGrande feature set? Any documents that could be donated to
at Monday, November 04, 2002 3:13 PM, Tyler Durden
This is an interesting issue...how much information can be gleaned
from encrypted payloads?
Usually, the VPN is an encrypted tunnel from a specified IP (individual
pc or lan) to another specified IP (the outer marker of the lan, usually
the
At 11:17 PM 11/3/02 +0100, Thoenen, Peter Mr. EPS wrote:
Tried emailing direct but bounced so apologize to the list for the OT
content :)
You don't happen to have the url do you? Think it would make an
amusing
read.
Sorry, no. BTW, my nym is for humor value, and spam-avoidance, not
replies.
EWeek 21 Oct 2002 p 58, High-tech products invite tech crimes P.
Coffee
Writing about a consultant who tried to sell a client's software, and
got busted:
Next time, a code theif may use a BlackNet brokerage (as envisioned
in the
widely circulated essay by Timothy May) to avoid such traps.
[He is
At 10:13 AM 11/4/02 -0500, Tyler Durden wrote:
This is an interesting issue...how much information can be gleaned from
encrypted payloads?
Traffic analysis (who, how frequently, temporal patterns)
Size of payload
Is it possible for a switch or whatever that has
visibility up to layers 4/5/6 to
Most the ones I've seen are IPSEC over IPv4. You might be able to glean
some info from packet size, timing, and ordering, but not much. IPSEC
takes a plaintext IP packet and treats the whole thing as a data block
to be encrypted.
SO this would indicate that IPSEC creates a sort of blockage from
Tyler Durden[SMTP:[EMAIL PROTECTED]] writes:
Most the ones I've seen are IPSEC over IPv4. You might be able to glean
some info from packet size, timing, and ordering, but not much. IPSEC
takes a plaintext IP packet and treats the whole thing as a data block
to be encrypted.
SO this
Tyler Durden[SMTP:[EMAIL PROTECTED]] wrote
But from your previous email, you indicated that the secure IPSEC tunnel
is
created by taking the packets, encrypting S/A, D/A, payload and protocol
fields (ie, pretty much everything) and then dumping them into the payload
of another
On Sun, Nov 03, 2002 at 11:23:36AM -0800, Tim May wrote:
- -- treat text as text, to be sent via whichever mail program one uses,
or whichever chatroom software (not that encrypted chat rooms are
likely...but who knows?), or whichever news reader software
http://www.invisible.net is sort of
Dear colleague -
I'd like to invite you to attend the 5th Smart Card Research and
Advanced Application Conference, November 21-22 in San Jose, CA.
http://www.usenix.org/events/cardis02/
CARDIS '02, the joint IFIP/USENIX International Conference on Smart
Card Research and Advanced Applications,
I think this is what you're looking for:
http://www.improb.com/airchives/paperair/volume6/v6i4/postal-6-4.html
At 11:17 PM 11/3/02 +0100, Thoenen, Peter Mr. EPS wrote:
Tried emailing direct but bounced so apologize to the list for the OT
content :)
You don't happen to have the url do you?
On Mon, Nov 04, 2002 at 12:58:55PM -0500, Trei, Peter wrote:
Durden's question was whether a snooper on an IPSEC VPN can
tell (for example) an encrypted email packet from an encrypted
HTTP request.
The answer is no.
All Eve can tell is the FW1 sent FW2 a packet of a certain size.
The
56 matches
Mail list logo