At 05:14 PM 3/27/02 -0800, Meyer Wolfsheim wrote:
-BEGIN PGP SIGNED MESSAGE-
Additionally, Aimee is an Outlook user, and mattd is a Eudora user. The
forgery referenced below was sent from Eudora.
And strings in exe's can't be edited?
I know of folks who've edited the PGP header line to
KaZaA won in Dutch court today:
KaZaA attorney Christiaan Alberdingk Thijm expected the Dutch ruling to
be closely watched in the
U.S., as his defense was partly built on a 1984 U.S. Supreme Court
(news - web sites) ruling which
said manufacturers of video recorders are not liable if
I've been thinking about noncentralized self-organizing network
topologies since George
posted his query. First, there are several problems that any P2P
network faces in the future
1. ISPs blocking its ports
2. The entry points to P2P are vulnerable ---web sites that
At 09:28 AM 3/29/02 -0800, Greg Broiles wrote:
At 08:55 AM 3/29/2002 -0800, Major Variola (ret) wrote:
1. ISPs blocking its ports
2. The entry points to P2P are vulnerable ---web sites that
to dynamic list of *tella
servents, or the Kazaa site that points to active Kazaa
At 03:25 PM 3/30/02 +, Adam Back wrote:
On Sat, Mar 30, 2002 at 01:20:18PM +0100, Eugene Leitl wrote:
Yes, probabilistic headless node discovery vs. a centralist approach.
I never really found discovering a currently active node on the
network a problem even with original gnutella client.
Boise to be test target for Marine snoops
From the National Desk
Published 3/30/2002 3:33 PM
BOISE, Idaho, March 30 (UPI) -- In a bid for a more
realistic training experience, Marine
referenced on cryptome:
Another fertilizer-based explosive used by
terrorists is Urea Nitrate (its components are urea, sulfuric acid,
nitric acid, and sodium cyanide).
As is well known,
At 06:06 PM 4/4/02 -0800, Bill Stewart wrote:
It was one of the lessons they taught you after
making sure that you really understood that
if you can't see the fnords, they won't eat you
To prevent emotional disturbances when they fall into them
the Swedes fill them with water and call them
At 10:01 AM 4/17/02 -0400, Trei, Peter wrote:
I'd argue that a nightmare scenario for the statists and snoops would
for commonly used applications to use crypto by default, ... This would
make distinguishing interesting from uninteresting traffic much more
If that app is a
[This story includes unforgable-document assumptions (ooh, a
drivers'-license-as-ID, and Ca police disregard for Fed immigration
in favor of maintaining the peace. (This latter is interesting when
with U.S. Cannot Block Oregon Suicide Law, Judge Rules
At 11:22 AM 4/21/02 +0200, Eugen Leitl wrote:
I disagree here somewhat. Cryptography ttbomk doesn't have means of
construction of provably strong PRNGs, especially scalable ones, and
lots of internal state (asymptotically approaching one-time pad
properties), and those which can be mapped
At 10:18 AM 4/25/02 -0700, Tim May wrote:
On Thursday, April 25, 2002, at 07:45 AM, Major Variola (ret) wrote:
Predictability gets much worse if one of the walls of a pool-table is
then the uncertainty in a perfectly-round ball's momentum is
magnified after reflection, compared
Airbus, the European jet manufacturer, is planning to build concealed
cameras into the light fittings above the seats in its aircraft. The
idea is to let the crew monitor passengers and spot hijackers before
they strike. The cameras also
At 12:21 PM 5/24/02 -0700, Curt Smith wrote:
If there were servers on the internet which automatically
displayed all plaintext e-mail messages which passed through
them as webpages (for the bored, curious, and opportunistic),
THEN everyone would see the value of encrypted e-mail.
At 09:03 PM 5/24/02 -0700, Eric Cordian wrote:
The FBI currently has its shorts in a wad over the numerous Web sites
featuring the short but poignant last moments of Wall Street Journal
reporter Daniel Pearl.
It seems unlikely that creation, sale, or possession of depictions of
Something stinks in Tenn, and its not the Gores this time:
Among his recent cases was the death of Harvard University biologist Don
Wiley, whose fall from a Memphis bridge in December fueled fears of
terrorist kidnappings. The medical examiner also helped identify the
body of Katherine Smith,
from Intel sources, quoted by eweek 3 jun 02:
Itanium 2 does 1,440 secure transactions/sec,
nearly three times the performance of an 8-CPU
Ultrasparc III server
FWIW; there was a thread on SSL performance
here some time ago.
Investigators had a list of 20 possible suspects, but Fischer was moved
to the top. Detectives said
they attached a tracking device to her car, hoping to catch her in the
On Sunday, more than 30 razor blades were found hidden in Alicia Park in
Mission Viejo. Had
Fischer been there, the
At 12:25 PM 6/6/02 -0700, Morlock Elloi wrote:
There are also a lot of motion artefacts which give a certain feel do
image - but then, that may become fashionable, as valve amplifiers are
Jeezum, how old *are* you? We haven't called vacuum tubes 'valves' for
Intercepted a live broadcast of a CA state board on privacy reviewing
some breaching of a state comptroller's servers which manage
state deductions. The Teale Data Center incident alluded to at
and at the gnarly URL:
On April 9, the City and County of Denver Vital Records
Office was robbed of over 2,300 sheets of preprinted
security paper that can be used to create birth and death
certificates. In addition, the electronic seal machine
that produces an embossed seal of the City and County of
At 01:42 PM 6/6/02 -0700, Tim May wrote:
Someone said something earlier about tube/valve amps giving a boost to
the high end, for older, hearing-damaged rockers.
Mr. Elloi wrote first about the fashion for valve audio amps and then
mentioned that some yahoos listen with Dolby emphesis. I
[stuff y'all knew but for the record]
Basically the authors of the below post find that Speak Freely's
reliance on out-of-band symmetric key exchange is solved with PGP email.
PGPfone does this for you over the same channel --using the
mathemiracle of public-key crypto. Since you're both
Listen to electronic dance music, lose your right to freely assemble.
BILL NUMBER: AB 1941AMENDED
AMENDED IN ASSEMBLY MAY 15, 2002
AMENDED IN ASSEMBLY APRIL 4,
For the Spy in the Sky, New Eyes
FLYING in his helicopter, Sgt. Frank Sheer of the Orange County
Sheriff's Department in Southern California can be literally miles from
the action. But that does not mean that he and his co-pilot
Subject: anonymous cooperation is stable if opting out possible
Volunteering as Red Queen Mechanism for Cooperation in Public Goods
Christoph Hauert, Silvia De Monte, Josef Hofbauer, and Karl
Science May 10 2002: 1129-1132.
Volunteering as Red Queen Mechanism for
On Israel's decision to deport families of martyrs:
A Palestinian legislator, Salah Tamari, called deporting families an
unlawful and inhuman measure. Why should somebody be accountable for
someone elses actions?
While most networks are saying the same things publicly today about what
they would do with a bin Laden tape, Nachman
said: My sense is the administration's position was something of a red
herring. Even when they get compliance with the
network, there's no way you can control or restrict
Towards the bottom of this article its mentioned that Mitnick submitted
a list of Nortel's
 'security' barriers to r00t  on a widely used piece of telco
One wonders how many copies of this info circulate in TLA's technical
 (presumably obsolete :-)
At 08:16 PM 6/29/02 +0200, Anonymous wrote:
When an artist releases a song or some other creative product to the
world, they typically put some conditions on it. If you want to listen
to and enjoy the song, you are obligated to agree to those conditions.
If you can't accept the conditions, you
At 07:25 PM 6/30/02 -0500, xganon wrote:
Ryan Lackey provides a detailed analysis, but he gets off to a bad
right at the beginning:
DRM systems embedded in general purpose computers, especially if
mandated, especially if implemented in the most secure practical
manner (running the
At 09:31 PM 7/1/02 -0700, Tim May wrote:
Unfortunately it is being introduced at the same time as there is
legislation proposed, the SSSCA, to outlaw general purpose
Anyone who believes this, or even repeats it as a rumor, is on drugs.
I have half a dozen computers, all usable in
At 05:19 PM 7/2/02 -0400, Jack Lloyd wrote:
Real time video still requires
something fairly high end, but give it a year.
The compression function could be integrated into the videocamera,
relieving that CPU burden. Playback is more problematic.
At 02:32 PM 7/3/02 -0500, Anonymous wrote:
Gee, maybe I should head for Cali and set up a linux cluster shop.
The pay is good, less fog than SF, and traffic is better than the 101.
If you get nabbed and turn, you'll even get a new ID from the USG,
without having to do that work yourself :-)
When Mowbray began to get the feeling that he couldn't leave even if he
wanted to, he asked, Am I being
When a diplomatic security official told him no, Mowbray announced
that he was leaving.
At which point, the guard stepped in front of Mowbray and said, Now,
you're being detained.
At 03:27 PM 7/15/02 +0100, Peter Fairbrother wrote:
Optimizzin Al-gorithym wrote:
And while QM can't help you with a particular atom, it also doesn't
that its impossible that knowledge of internal states of the atom
wouldn't help you predict its fragmentation.
Yes it does.
At 01:50 AM 7/16/02 -0700, gfgs pedo wrote:
The rules of physics are those that don't change
from time to time, or
place to place
i tend to disagree with this.
The mathametical observations rely on the parameters
that are taken to make the mathametical model.
if the parameters
Could this be warped into affecting wardriving for 802.11b connections?
The basestation's emissions could be considered 'private' even though
not. The traffic could contain unencrypted voice packets, too.
At 03:15 PM 7/16/02 -0400, Dave Emery wrote:
The House just passed
(AP) - Four Army wives at Fort Bragg have been killed over the past six
allegedly by their husbands, prompting the Army to announce Friday it
re-evaluate the base's family counseling program. Two Fort Bragg
soldiers killed their
wives in murder-suicides, and two others were charged
She even conceives of developing algorithms so advanced that society
might intervene, to get people liable to be recruited into cells back
before they can be seduced by elements like Al Qaeda. There is a
possibility that with sufficient information about known terrorists we
At 09:49 AM 7/30/02 -0400, Trei, Peter wrote:
Actually, this clicks neatly onto cp debates over open vs closed
systems, TCPA, DRM, and 'freedom to hack'.
Most modern cars are substantially computerized. Diagnosing a
problem usually involves hooking up a PC to a port on the car's
(Note that this *is* political as the Fairgrounds are State property)
Dress Code Keeps 9 Hells Angels Out of Fair in Ventura
Security: The new policy is enforced after biker club members refuse to
remove vests marked with group's insignia. Their leader says he will
Court rules student's artwork not a threat to police
Published 9:35 a.m. PDT Thursday, August 1, 2002
CHICO, Calif. (AP) - A Pleasant Valley High School student's art
class painting that
showed him shooting a police officer who had cited him for
possessing marijuana did
At 12:48 PM 8/3/02 +0200, Eugen Leitl wrote:
On Sat, 3 Aug 2002, Morlock Elloi wrote:
Ah, the computers. Well, those that want computers will have them.
They may not be as cheap as today and there will not be as many of
them, but I think that all people *I* deal with will have them, so I
At 01:36 PM 8/27/02 +, Ryan Lackey wrote:
I'm not actually going to burningman this year, primarily due to low
remote access potential; I normally have a laptop and
cellphone/802.11b/100baseTX link with at most 15 minutes delay.
A satphone is under $2K and its under $3 minute. Cost-cutting
At 01:21 AM 8/31/02 -0700, Morlock Elloi wrote:
Just wondering ... in a life death situation (say, blackmailing att.
general), what would be the choice of readers of this forum:
a) use mixmaster remailer from their home/business/friend.
Like that one-degree of separation is comforting...
Cryptome points to a paper http://www.sandia.gov/eqrc/critical/meyer.pdf
Using Integrated Circuits in Critical Applications Workshop
Integrated Circuits in Nuclear Weapon Applications
Wherein we learn, ca. 1997:
there are no chips in nukes (p 8)
Sandia is considering Java for nukes (p
In some parts of rural america, folks signal the presence of cops by
flashing their headlights
Occurs to me that would be a cool function for SDR: press code for or
say cop. For N seconds,
phone periodically sends cop message picked up by other phones,
ignored by base station .
At 07:04 PM 9/18/02 -0700, Meyer Wolfsheim wrote:
People who want to play with gizmos to avoid becoming revenue sources
buy radar detectors (unless they live in places like VA, where it is
illegal to possess radar detection devices.)
People who like to *play* with gizmos will employ radar
At 11:08 AM 9/21/02 -0400, Greg Vassie wrote:
says Dr Ann Coavoukian, the commissioner of information and privacy
Ontario, U.S.A. People are lying and vendors don't know what is
As a resident of Ontario, Canada, I'm quite surprised to learn that
Ontario has been annexed by the
You see this? the Libyan said. This was created by an enemy of God.
This has blown many
operations and has caused more arrests than you can imagine. Why do you
think the brothers in
Germany got arrested? With this. When they were talking, the others were
listening It's nice, you
At 01:41 AM 9/24/02 -0700, Bill Stewart wrote:
They're also used for non-cellular phone minutes -
Ladatel in Mexico is a big user, and I've worked with some
British Telecom folks whose business cards are also
1-pound telephone smartcards.
Good lord, they only weigh mere grams here in the states
Using its official Xinhua News Agency, the government released an
extraordinary 1,100-word dispatch about the latest hacking incident,
saying it had traced the illegal transmissions over the Sino Satellite,
or Sinosat, system to a pirate broadcast operation in Taipei, Taiwan.
In a separate
At 02:39 PM 9/27/02 -0500, Lisa wrote:
I didn't suggest that they should be banned. I simply stated that this
was one consumer usage of the smart card reader.
Take a stress pill, Dave (and pass one this way). B.L. was clearly
sarcastic/rhetorical and no one following the thread would
The problem Mr. Howe describes is fundamental, folks:
encryption should be end-to-end even when the endpoints
are functionaries in a company. Because not all employees
So yes Alice at ABC.COM sends mail to Bob at XYZ.COM and
the SMTP link is encrypted, so the bored upstream-ISP
At 11:52 AM 9/30/02 -0700, James A. Donald wrote:
What email encryption is actually in use?
PGP 5-7 on Win95+, using Eudora 3.05
talks to Mac whatever using 2.6.2
Signing is not generally necessary.
The chief barrier to use of outlook's email encryption
Outlook is one of Microsoft's
After reading the last paragraph in the excerpt below, it occurs to me
much fun could be had in DC with some chalk, even without an 802.11blah
Secret Service probes wireless
These folks seem to be subbing for JY while he's out :-)
British Press Gagged Over MI6's #100,000 bin Laden
Wednesday, 9 October 2002, 10:24 am
Unanswered Questions: Thinking For
Not only is EM correct, but:
* many attacks are possible without worrying about keylength. Got
* NIST/NSA picked the lamest AES. If I told you what lame meant, I'd
have to kill you.
* (Lack of) User motivation (related to man-machine issues) is still the
spooks' best friend. As
You can find refs about this fucking up Stealth(tm) aircraft's
during one of the recent wars... possibly in England? Basically
you have lots of emitters (basestations) probing the RF reflectance of
environment over time, reporting back to central stations... even
The Sunnyvale Albertsons has those stupid loyalty cards again, after a
italicized phrase, Except when compelled by law.
But amazingly, it has a box, too: I don't wish to fill out this form.
From: Trei, Peter [EMAIL PROTECTED]
I fail to see how anyone, anytime, anywhere, can support
the hunting of random non-consenting humans for sport.
Maybe its a PETA activist making a point...
Rifle and scope: $1,200
Box of .223 Hollowpoint: $6.99
Tarot Deck: $2.95
Scoring an FBI analyst: priceless
Some things are priceless. For everything else, there's MasterCard.
Dedicated to Eunice Squeal Like a Pig Stone
At 06:44 AM 10/22/02 -0700, Mike Rosing wrote:
On Wed, 31 Dec 1969, Bill Frantz wrote:
I have been asked to audit some source code to see if the programmer
inserted a backdoor.
Look for exception processing. Anywhere the code looks for a
value, something like == 0x3456352e. That
Had some shyster not flinched (followed by a judge farting in the
wrong direction), medical records would have been bulk-searched by
Judge Lifts Order for Pregnancy Records Sought in Investigation of
So two illegals are going back because they were in a white van near a
They're fortunate, they only got the 12gauge in the face and the asphalt
in a month it'll be a cruise missile first, forensics later.
Mr. Godsniper, call us back. We couldn't trace^H^H^H^H^H hear you.
At 05:13 PM 10/21/02 -0400, Tyler Durden wrote:
So I guess the follow on question is: Even if you can look at the code
RNG...how easy is it to determine if its output is usefully random,
there certain Diffie-approved RNGs that should always be there, and
Pg 44 of the current EETimes issue, biz section:
A company named SiCastle is making traffic management chips. One in
line of chips will include CALEA functionality, ie, the ability to
filter/copy packets to
an extra port. The article explicity calls it CALEA functionality and
t 11:21 PM 10/24/02 -0700, James A. Donald wrote:
I am a really big fan of Buffy.
Seek professional help.
but my experience with downloading TV shows suggests
that piracy is working better than ever.
This wasn't piracy, it was time-shifting. You, as an
American with a TV, could watch the
the morse or DTMF or 4Khz voice, clean up the audio.
From: Harmon Seaver [EMAIL PROTECTED]
Date: 2002/10/16 Wed PM 08:45:02 EDT
To: Major Variola (ret) [EMAIL PROTECTED]
CC: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: commericial software defined radio (to 30 Mhz, RX only)
At 01:34 PM 10/27/02 +0100, Eugen Leitl wrote:
(Try [to] rewire parts of CNS in control of your motorics).
Actually, injuring yourself is a good way to do this. You'll screw up
the timing differences (albeit not the geometry) royally. We call
this a limp.
If you're interested in gait
Robert H. Moore, a software developer on the outskirts of St. Louis,
built a multimillion-dollar business out of helping people copy DVDs.
Now he's trying to prove that his products are legal.
Moore's wares enable the copying of discs even if they are scrambled to
prevent duplication, as are
At 12:01 PM 10/28/02 -0800, Tim May wrote:
It's going to be interesting to see how airlines and other security
narcs deal with fuel cells. The energy content of a small
canister/container of the fuel can be high. Given that butane lighters
are now banned...
Based on personal experience (e.g.,
At 10:44 PM 10/28/02 -0800, Charles Lucas wrote:
To capture and distribute video in such a fashion that confiscation of
camera and other equipment will not result in confiscation of captured
I dare you to call your system E-Jazeera
At 10:23 PM 10/28/02 -, Axolotl2 wrote:
On Sat, 26 Oct 2002 17:59:17 +1300 (NZDT), you wrote:
Next in the series:
FBI warns bouncy castles may be targeted
Nahh, FBI warns buses may be targeted, leading to late or missed
The primary targets will likely be places where citizen
At 10:19 PM 10/28/02 -0500, Dave Emery wrote:
On Mon, Oct 28, 2002 at 09:32:48PM -0500, Tyler Durden wrote:
Any chance this is the same Dave Emery who does the radio broadcasts?
listen from WFMU). If so, man! If a tiny fraction of the stuff you
said over the years is true, well...brrr.
At 07:28 PM 10/29/02 -0500, Brian McWilliams wrote:
At 04:34 PM 10/28/2002, Major Variola (ret) wrote:
The e-mails were obtained earlier this month
by guessing the
login name and password
Did that Wired reporter just admit to a crime?
At 07:53 AM 10/30/02 -0800, Steve Schear wrote:
At 03:35 PM 10/30/2002 +0100, Anonymous [EMAIL PROTECTED] wrote:
Speaking of jamming, I've thought for a long time that a
portable jamming device would be very nice to have.
Frequencies don't get jammed, specific communications channels between
South Dakota measure backs 'nullification' -
Can't wait until some lawyer in a black robe tries to understand
which works with Java 1.4.0 on Win95, BTW
File-swapping 'Madster' must track songs
Friday, November 1, 2002 Posted: 10:03 AM EST (1503 GMT)
ALBANY, New York (AP) -- The
At 10:49 AM 11/2/02 -0800, Bill Frantz wrote:
(A number of years ago, there was a case where a
pilot, presumably asleep, flew right past Los Angles, over the Pacific
ocean, and crashed. ATC was very concerned, but couldn't do anything
wake the pilot.)
Around a year ago a small private jet
At 09:37 PM 11/2/02 -0800, Tim May wrote:
When I was at Intel we sent our designs for microprocessors to European
branches and/or partners. One set of designs sent to MATRA/Harris, a
partner in the 80C86, was stolen in transit. (The box of tapes arrived
in Paris, but the tapes had been replaced
In the Si biz, its quite common to encrypt files. I've
seen (albeit lame, and with guessable passwords)
zip encryption and the classic crypt used.
Between engineers, and between lawyers and engineers.
Typically the encrypted info is an attachment to unencrypted
email (often describing its
At 11:17 PM 11/3/02 +0100, Thoenen, Peter Mr. EPS wrote:
Tried emailing direct but bounced so apologize to the list for the OT
You don't happen to have the url do you? Think it would make an
Sorry, no. BTW, my nym is for humor value, and spam-avoidance, not
EWeek 21 Oct 2002 p 58, High-tech products invite tech crimes P.
Writing about a consultant who tried to sell a client's software, and
Next time, a code theif may use a BlackNet brokerage (as envisioned
widely circulated essay by Timothy May) to avoid such traps.
At 10:13 AM 11/4/02 -0500, Tyler Durden wrote:
This is an interesting issue...how much information can be gleaned from
Traffic analysis (who, how frequently, temporal patterns)
Size of payload
Is it possible for a switch or whatever that has
visibility up to layers 4/5/6 to
Bill Franz: look at the IBM research report Thirty years later: lesons
from the multics security evaulation
paper by Karger Schell. They describe successfully inserting
backdoors into an OS.
The back doors were distributed (incl. to P-gon) and only discovered a
At 01:01 PM 11/5/02 -0800, Bill Stewart wrote:
If people start showing up at Cypherpunks meetings and
paying their dues, get _very_ suspicious :-)
Do you take hawala? Chaumian-blinded-hawala?
Or just beans, rice, tequila, and ammo?
At 11:30 AM 11/6/02 -0800, Steve Schear wrote:
German secret service taps phones, bills buggees
I wonder if its possible if this billing incident wasn't a mistake, but
activist pulling down the pants of their security services.
At 05:46 AM 11/7/02 -0800, Sarad AV wrote:
Wi fi customers are more paranoid than comparingly
ordinary web users who are not so concerened of their
That's just plain silly. Its like saying a cellphone user is more
paranoid than a landline user. It was entirely convenience,
Note that the Cypherpunks Image/Postscript Document Examination
Laboratories should be able
to amplify some of the (US; the unPOWs are black-bagged) faces in the
Pentagon Seeks Source of Photos
By PAULINE JELINEK
Associated Press Writer
At 08:32 PM 11/9/02 -0500, Tyler Durden wrote:
So I'm still playing with the idea of a publically-accessible document
outlines the strategies, technologies, aims and requirements for
uploading images and data to public repositorioes.
Such a document should enumerate the threat model
If you publish your keys, random others can link the key to the
published ID (e.g., email addr).
This means, at least with the PGP UI, that if Alice encrypts to Bob and
Carol (who don't know
each other, but Bob publishes his key and Carol downloaded it) then
Carol can see that the
All you need is
1. A few activists incl. a few to capture the content (eg, videographer,
photographer) who are willing to carry a few extra pounds
2. Someone to pony up the equiptment (some of which must be treated as
3. Someone to set up test the rig with the deployees.
3) stream via standardised protocol using (camouflaged) 8 3db omni
antenna. Do this in AP mode.
Camoflaging this in the obvious place we note that our metallicized
a nice ground plane reflector, adding a db or two.
[Summary: Navajo is banned by employer because employees are being rude
in that language.
So the EEOC objects. Ironies: Navajo, codetalkers, feds. EEOC
harassing employer who is trying to prevent harassment (in Navajo) of
English group enters Navajo language fray
From the National
At 02:19 PM 11/20/02 -0500, Tyler Durden wrote:
From what I can grok this is not what I was looking for, but it IS a
What's missing? What part of your threat model didn't they consider?
What I'm talking about, I think, would be better in certain scenarios,
What the heck is Aerosil? Is that like UBIK?
Extremely fine SiO2. Helps disperse pharmaceuticals,
anthrax, VX. Lots of others uses. Bugs U$G that
the New Next Target bought some.
What's UBIK? D'you mean Dr. Seuss' Ooblek?
Is Ooblek on the ITAR list?
At 11:38 AM 11/21/02 -0500, Tyler Durden wrote:
I was thinkin about this...
It certainly looks like Concerned Authorities might be able to easily
Smart Mob from uploading the images of beatings, etc... this way.
a round-up-and-grab knapsacks/laptops as evidence of illegal
At 04:59 PM 11/21/02 -0800, James A. Donald wrote:
According to Microsoft,
Darknet is being undermined by free riders.
They attribute this to 2 things: most are on 56Kbps, and legal
large sharers is possible.
I suspect it is
1 - 100 of 749 matches
Mail list logo