From eureka at eureka.abc-web.com Thu Jan 1 00:12:12 1998
From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com)
Date: Thu, 1 Jan 1998 00:12:12 -0800 (PST)
Subject: Eureka! Thu Jan 1 '98
Message-ID: <19980101080546.11277.qmail@eureka.abc-web.com>
Welcome to Thursday's issue of Eureka!
PINKBITS
Voted the #1 Teen (18+) site on the web, this is one pay
site you don't want to miss out on! Here's just one quote
from a satisfied member: "This site delivers awesome value.
I have been a member of 3 other sites, and this is the best
by far. It has the best pics, more live video, younger girls
and more hardcore cumshots than the other sites put tog-
ether". And we have negotiated a special FREE trial member-
ship for Eureka subscribers, so don't take our word, go see!
PinkBits .. http://207.33.10.198/cgi-bin/gate1/pbm/pb_0024/0
GAYEUREKA!
NEW!! The new gay newsletter is now available. All the gay
material from this newsletter and a whole load more will now
appear in the new newsletter. If you would like to subscribe
Please click here ..... http://eureka.abc-web.com/gayeureka/
EUREKA! is now available in three additional languages. So
now you can choose from any of the following. And don't for-
get, from January 10th we'll add Portuguese and Italian too!
FRAN�AIS ..... http://eureka.abc-web.com/eureka/francais.htm
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPA�OL ....... http://eureka.abc-web.com/eureka/espanol.htm
HAPPY NEW YEAR!
Did you party too much? Ease your headache with some great
websites and free pix! We have movies today and a gay site.
SITE SEX
This site has a lot to offer. Free movies and a cool gallery
featuring a slide show feature. You set it up for what you
like and let it roll. Some programmers have been working ov-
ertime here! It may not load super fast but check it out.
Site Sex ........................... http://www.sitesex.com/
SEX UTOPIA
Scroll down the page after hitting "enter" to find some free
pix. They have 40 of them! "Welcum to SEX UTOPIA one of the
best free sites on the web ...some of the hottest pictures!"
Sex Utopia .......................... http://207.55.184.113/
BOYPAGES
There are several galleries at this website with lots of pix
that feature a lot of good looking studs. Talk about wash-
board stomachs! Maybe it's time to hit the gym? Surf it!
Boypages .......................... http://www.boypages.com/
A PWERNO OVERDOSE
"PWerno -that fine mix of Porn and the Web is brought to you
by the letters P, W, and the sexy sites." Huh? Whatever it
means there are some great pussy pix here. Click the "this
link" to get rolling to the good stuff. See the Coke girl,
mmmm kinda make ya thirsty! Worth the modem haul, surf it!
A Pwerno Overdose ............. http://www.pwerno.inter.net/
FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet. However, many of the feeds use the RealPlayer and will
work in most browsers. If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
The hardcore channels .. http://www.EroticPleasures.net/xxx/
CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars you will meet most days. It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/
THE BEST PHONE SEX
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416
AMATEUR SITE OF THE DAY
FONTAINE: A buxom blonde with a very tone body, she is the
girl that everyone dreams about. She says she is just the
average girl next door, but, if that is true she must live
in one hell of a neighborhood, nothing is average about this
busty amateur. See her and her hooters and you will not
regret it! ................. http://amateurindex.com/eureka/
TODAY'S FREE PIX
OK, it's the new year, and now we are really going to start
getting in gear, with some of the hottest FREE photos ever!
Pic 1 ........................... http://137.39.63.229/?010
Pic 2 ........................... http://137.39.63.229/?011
Pic 3 ........................... http://137.39.63.229/?012
Pic 4 ........................... http://137.39.63.229/?013
Pic 5 ........................... http://137.39.63.229/?014
Pic 6 ........................... http://137.39.63.229/?015
Pic 7 ........................... http://137.39.63.229/?016
Pic 8 ........................... http://137.39.63.229/?017
Pic 9 ........................... http://137.39.63.229/?018
Pic 10 ........................... http://137.39.63.229/?019
PLEASE VISIT THIS FINE EUREKA! MEMBER SITE
Naked Supermodels and Celebrities
http://www.celebgifs.com
Naked Supermodels like Cindy Crawford and Naomi Campbell ,
nude celebs like Demi Moore, Brad Pitt, Meg Ryan, more.
------------------------------------------------------------
If you would like to unsubscribe from the Eureka! Newsletter
simply select reply and send us a quick reply to this email.
------------------------------------------------------------
From ForInformationCall at 1-800-339-2933-EXT.4775 Thu Jan 1 16:52:43 1998
From: ForInformationCall at 1-800-339-2933-EXT.4775 (ForInformationCall at 1-800-339-2933-EXT.4775)
Date: Thu, 1 Jan 1998 16:52:43 -0800 (PST)
Subject: 1998 Resolutions
Message-ID: <67656288_47101688>
*********************************************************************
- Remove from list information is after this important message -
*********************************************************************
*******
Is one of your 1998 New Years Resolutions to create additional revenue
streams to supplement your income? If so please take a close look at
our company.
We don�t offer a pie in the sky, get rich quick, scheme. What we do
offer is a sound opportunity with a four year old company, working
with talented, experienced business and media professionals who will
work with you to create a significant income stream in 1998 and for
many years to come.
Success Magazine in their September issue highlighted our company as
"THE ONE TO WATCH". We have been featured in Working At Home and
named the HOT PICK COMPANY in MarketWave, as well as being recognized
by many other leading publications this past year.
We are about to launch a MAJOR MARKETING BLITZ during the first quarter
of 1998 which includes TV, radio and print. BRUCE JENNER, America�s
Olympic Champion and Infomercial Superstar is our television spokesman.
WE ARE LOOKING FOR PEOPLE TO HELP WORK WITH AND PROFIT FROM THE INFLUX
OF NEW DISTRIBUTORS THAT OUR MARKETING CAMPAIGN IS ATTRACTING!
IF YOU ARE LOOKING TO SUPPLEMENT YOUR INCOME PART-TIME OR ARE LOOKING
AT A FULL-TIME CAREER OPPORTUNITY CALL 1-800-339-2933, EXT. 4775 FOR A
FREE INFORMATION PACKAGE AND TO FIND OUT HOW YOU CAN PROFIT!
If you want 1998 to be better than 1997, please call our 800 number.
You owe it to yourself and your family!
HAPPY NEW YEAR AND GOD BLESS!
******************************************************************
******************************************************************
TO BE REMOVED FROM OUR MAILING LIST, TYPE: REMOVE97 at ix.netcom.com
in the (TO:) area and (REMOVE) in the subject area of a new E-mail
and send.
******************************************************************
******************************************************************
From proff at iq.org Thu Jan 1 03:08:37 1998
From: proff at iq.org (Julian Assange)
Date: Thu, 1 Jan 1998 19:08:37 +0800
Subject: Jim Bell... lives... on... in... Hollywood!
Message-ID:
Anyone noticed this before?
------- Start of forwarded message -------
Date: 1 Jan 1998 09:54:51 -0000
Message-ID: <19980101095451.25998.qmail at suburbia.net>
From: proff at suburbia.net
To: proff at suburbia.net
Subject:home.html
Scoop the Grim Reaper!
Who will live?
Who will die?
And who will win the grand prize in Dewey's Death Pool -- an
all-expense paid, two-day Hollywood Death Tour for two. Or one of four
quarterly prizes -- a fabulous celebrity death library.
It's fun, it's easy -- and all you have to do to win is correctly
forecast more celebrity deaths for the calendar year 1998 than any
other entrant.
Here's how it works: Between now and December 31, 1997, fill out an
entry form, listing your picks in descending likelihood of death. For
instance, if you believe Celebrity X is a cinch to die within the
year, list him or her in the No. 1 slot, followed by your second most
likely choice in the No. 2 slot, etc. For tie-breaking reasons, a
correct pick in the top slot is worth 10 points, a correct pick in the
second is worth 9 points, and so forth. (Please list an alternative
name in the event that one of your choices dies before the game
begins. The alternative will be substituted in the empty slot and you
will not receive credit for the original name.)
At the end of the year, the contestant with the most correct picks
wins. If there's a tie, the winner will be the person with the highest
point total. In the event of a point-tie, the contestant with the
youngest decedent will win. Judges' decisions are final.
In addition, quarterly prizes (an assortment of guide books, maps,
videos and other celebrity death memoribilia) will be awarded for the
most correct picks within the four three-month intervals ending 11:59
EST on March 31, June 30, September 30 and December 31, 1998. In the
event of ties, tie-breaker rules described above apply. Standings will
be updated on the site regularly.
To qualify as a correct "hit," a death must be noted in one or more of
the following publications: New York Times, Los Angeles Times, U.S.A.
Today, Time, Newsweek or People.
Paid obituaries do not count; the death notice MUST appear in the
context of a news story, roundup item or editorial obituary. If
someone's death is not mentioned in one of the above publications, you
will not receive credit.
You will not receive credit for a death if you somehow contribute to
that person's demise. If there's any dispute over the exact date of a
celebrity's demise, information listed on the death certificate will
prevail.
Dewey's Death Pool is open to residents of the 50 United States and
the District of Columbia who are 18 years or older. For complete
rules, see the Official Rules.
[INLINE]
home | entry | rules
_________________________________________________________________
Back to Webb Page Confidential
------- End of forwarded message -------
From ant at notatla.demon.co.uk Thu Jan 1 03:33:28 1998
From: ant at notatla.demon.co.uk (Antonomasia)
Date: Thu, 1 Jan 1998 19:33:28 +0800
Subject: HIP97 photos & hate speech in list opinions
Message-ID: <199801010104.BAA04808@notatla.demon.co.uk>
Cpunks (and Bcc list),
I've had a kind offer from Judith to scan my HIP photos and
display them on the web (www.sabotage.org). This should happen
in a few days. The photos include Alex, Judith, DDT, Ulf, Ian Grigg,
Lucky, Sameer, Joichi and others.
Re: Hate speech and censorship, 22 Dec, Anonymous
> On behalf of the non-racist cypherpunks, please accept an apology for
> Paul Bradley's racist message:
> > uneducated and foolish arabs such as Parekh should stick
> > to what they do best: running kebab shops and/or selling cheap fake rolex
> > watches to tourists.
> This does not reflect the mainstream view on the list. ....
I found Sameer perfectly pleasant. IMO the best view to take on
mainstream views is that you can't usually tell. Silence could indicate
killfiles rather than assent.
--
##############################################################
# Antonomasia ant at notatla.demon.co.uk #
# See http://www.notatla.demon.co.uk/ #
##############################################################
From Success at 27194.com Thu Jan 1 21:14:08 1998
From: Success at 27194.com (Success at 27194.com)
Date: Thu, 1 Jan 1998 21:14:08 -0800 (PST)
Subject: BulkEmailDoneForYou
Message-ID: <122802130356.GAA08056@nowhere.com>
Sorry for this intrusion. Your address was passed on to
me as someone who might be interested in Internet Marketing
of their business/product/opportunity or service.
I offer Bulk Email sent at the following rates:
100,000 $75
200,000 $150
500,000 $300
1 million $500
You may either use addresses from my database (provied free) or your own.
You must provide me with a prepared text for mailing of a suitable
length.
Contact me at:
ICQ 6698881
for further details.
If you don't already have the ICQ chat utility, you
can download your free copy at:
http://www.mirabilis.com/
Wishing you a Prosperous future,
BulkEmailDoneForYou
From PleaseCall at 1-800-260-7099-Ext.212030 Thu Jan 1 21:57:42 1998
From: PleaseCall at 1-800-260-7099-Ext.212030 (PleaseCall at 1-800-260-7099-Ext.212030)
Date: Thu, 1 Jan 1998 21:57:42 -0800 (PST)
Subject: Earn FREE Gasoline and Long Distance !
Message-ID: <6205121_97743995>
*********************************************************************
- Remove from list information is after this important message -
*********************************************************************
*******
If you could ELIMINATE or reduce your GASOLINE and LONG DISTANCE
expenses, and earn a lucrative income, would you be interested?
Vision Unlimited offers you a unique home-based business opportunity.
This is not your typical MLM. Vision Unlimited doesn't sell pills
and lotions or soaps and potions. We place you in two of the largest
industries in the world.
This is a new company, and we are looking for self-motivated people
that want to be part of a company that goes from small to BIG!
Vision Unlimited is the only outlet for 20% discounted Gasoline!
Vision Unlimited will put you in business for yourself, but not by
yourself. Let us help you start a national business right from
your home. DO NOT put this off. Vision Unlimited can help you meet
your financial goals for 1998!!!
You may call me anytime to get your questions answered.
Voice mail - 1-800-260-7099 ext. - 212030
Office - 717-764-1922
Thank you, Marty
******************************************************************
******************************************************************
TO BE REMOVED FROM OUR MAILING LIST, TYPE: REMOVE97 at ix.netcom.com
in the (TO:) area and (REMOVE) in the subject area of a new E-mail
and send.
******************************************************************
******************************************************************
From ravage at ssz.com Thu Jan 1 06:38:09 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 1 Jan 1998 22:38:09 +0800
Subject: Long-distance limits on Bells unconstitutional [CNN]
Message-ID: <199801011456.IAA11379@einstein.ssz.com>
Forwarded message:
> Federal judge says long-distance
> restrictions on Bells unconstitutional
>
> December 31, 1997: 7:02 p.m. ET
>
> SBC Communications
> More related sites... WASHINGTON (Reuters) - A federal judge Wednesday
> threw out as unconstitutional provisions of a landmark federal law
> that restrict the regional Baby Bells from entering the $80 billion
> long-distance telephone market, SBC Communications Inc. said.
> [INLINE] San Antonio-based SBC said U.S. District Judge Joe Kendall
> sided with the carrier, which had charged that the Telecommunications
> Act of 1996 was unconstitutional because it discriminated against SBC
> and the other four Baby Bells.
> [INLINE] The New Year's Eve ruling is expected to send shock waves
> through the telecom industry and throw into further disarray the
> Federal Communications Commission's efforts to break open the $100
> billion local phone market controlled by the Bells.
[text deleted]
____________________________________________________________________
| |
| Those who make peaceful revolution impossible will make |
| violent revolution inevitable. |
| |
| John F. Kennedy |
| |
| |
| _____ The Armadillo Group |
| ,::////;::-. Austin, Tx. USA |
| /:'///// ``::>/|/ http://www.ssz.com/ |
| .', |||| `/( e\ |
| -====~~mm-'`-```-mm --'- Jim Choate |
| ravage at ssz.com |
| 512-451-7087 |
|____________________________________________________________________|
From eureka at eureka.abc-web.com Fri Jan 2 01:16:23 1998
From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com)
Date: Fri, 2 Jan 1998 01:16:23 -0800 (PST)
Subject: Eureka! Fri Jan 2 '98
Message-ID: <19980102081607.23798.qmail@eureka.abc-web.com>
Welcome to Friday's issue of Eureka!
HE GIRLS!
This site calls itself "The original She-Male, slut wonder-
land", and it's hard not to agree. With multiple live she-
male slut video feeds. Huge numbers of amazing shemale pics,
extra hot stories and so much more, you'll just love this
site. And what's more, we have arranged a special free trial
membership for all Eureka! subscribers. So go check it out!
HeGirls ... http://207.33.10.198/cgi-bin/gate1/pbm/he_0024/0
GAYEUREKA!
NEW!! The new gay newsletter is now available. All the gay
material from this newsletter and a whole load more will now
appear in the new newsletter. If you would like to subscribe
Please click here ..... http://eureka.abc-web.com/gayeureka/
EUREKA! is now available in three additional languages. So
now you can choose from any of the following. And don't for-
get, from January 10th we'll add Portuguese and Italian too!
FRAN�AIS ..... http://eureka.abc-web.com/eureka/francais.htm
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPA�OL ....... http://eureka.abc-web.com/eureka/espanol.htm
NOT A DREAM, IT IS 1998!
It's the Asian invasion! In response to your many emails we
have some of the best looking pussy from the orient. Sit and
surf the nastiest sites on the web. Enjoy your free pix too!
18X
First thing past the warning, pic your language and your off
to some serious Oriental bush. Raw young ladies abound! You
asked for it and here it is. "Hot horny hentai??" Surf it!
18X .................................... http://www.18x.com/
PORN HEAVEN
Easy to navigate and quick loading. "Welcome to Porn Heaven
a real adult site with plenty of hardcore adult content!" It
sure does have a lot of snatch in there. Decent Amateur pix!
As well as sexy teen, oral sex, older women and gay men too.
Porn Heaven ......................... http://pornheaven.com/
SITTIN' PRETTY
Kind of a butt mans paradise. Worth the surf! "We are focus-
ing on a side of the female body that doesn't get exploited
enough... The backside!" Kick ass looking asses! Zip by it.
Sittin' Pretty ....................... http://207.254.20.52/
THE SNOWMAN
This web designer has been hard at work! Great use of frames
and fast loading free pix! Lots of dick sucking, tit sucking
babes. High resolution pix too. Definitely worth the surf!
The Snowman ..................... http://www.thesnowman.com/
FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet. However, many of the feeds use the RealPlayer and will
work in most browsers. If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
20vids+Chat .. http://209.1.31.175/chat/videochat.cgi?eureka
CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars you will meet most days. It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/
THE BEST PHONE SEX
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416
AMATEUR SITE OF THE DAY
TARIN: A sweet and not so innocent Southern California an-
gel. This darling of the web offers a rich variety of photo-
graphs. The pictures of this lass include a compliment of
indoor and outdoor shots that are hot enough to tempt anyone
into sin! Stop by and visit this fallen angel and see if you
agree. ..................... http://amateurindex.com/eureka/
TODAY'S FREE PIX
OK, it's the new year, and now we are really going to start
getting in gear, with some of the hottest FREE photos ever!
Pic 1 ........................... http://137.39.63.229/?020
Pic 2 ........................... http://137.39.63.229/?021
Pic 3 ........................... http://137.39.63.229/?022
Pic 4 ........................... http://137.39.63.229/?023
Pic 5 ........................... http://137.39.63.229/?024
Pic 6 ........................... http://137.39.63.229/?025
Pic 7 ........................... http://137.39.63.229/?026
Pic 8 ........................... http://137.39.63.229/?027
Pic 9 ........................... http://137.39.63.229/?028
Pic 10 ........................... http://137.39.63.229/?029
PLEASE VISIT THIS FINE EUREKA! MEMBER SITE
Women and Men XXX PICS
http://www.execpc.com/~changes/hello.html
Plenty of free pictures of both men and women, We have a
free site so come by and check it out today. If you are hot
and horny then come on over guys and gals
------------------------------------------------------------
If you would like to unsubscribe from the Eureka! Newsletter
simply select reply and send us a quick reply to this email.
------------------------------------------------------------
From rah at shipwright.com Thu Jan 1 10:32:33 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Fri, 2 Jan 1998 02:32:33 +0800
Subject: Peter Huber on the Orwellian Falacy
Message-ID:
--- begin forwarded text
X-Sender: oldbear at pop.tiac.net
Date: Wed, 31 Dec 1997 15:09:58 -0500
To: Digital Commerce Society of Boston
From: The Old Bear
Subject: Peter Huber on the Orwellian Falacy
Mime-Version: 1.0
Sender: bounce-dcsb at ai.mit.edu
Precedence: bulk
Reply-To: The Old Bear
HIGH-TECH'S LIBERATING EFFECT
As the Internet makes inroads into information-restrictive nations,
such as China, efforts to limit access to only "desirable" ideas
are doomed to failure, say experts.
"The complaint one hears against the Internet isn't that there is
too little speech," says Manhattan Institute analyst Peter Huber.
"Instead, the argument is that there is too much hateful or
pornographic speech.
Stalin manipulated the past, altering photos and just wiping
people and events out of the historical record. But today,
documents and photos get downloaded and stored in files all over
the world. You can make corrupt copies, false copies, but you
can't erase real copies now."
Huber, author of the book "Orwell's Revenge," applauds the move
by industry to make encryption products widely available: "It
means that we can now create a zone of privacy that the government
can't penetrate. That's the exact opposite of what Orwell through
would happen."
source: Investor's Business Daily
December 30, 1997
as summarized by Edupage
For help on using this list (especially unsubscribing), send a message to
"dcsb-request at ai.mit.edu" with one line of text: "help".
--- end forwarded text
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!:
From rdl at mit.edu Thu Jan 1 10:58:42 1998
From: rdl at mit.edu (Ryan Lackey)
Date: Fri, 2 Jan 1998 02:58:42 +0800
Subject: Guns: H&K, G3, 7.62 v 5.56 [Guns]
Message-ID:
Tim May continues the sniping discussion:
>I haven't seen Jim's reaction to my point about bolt-action rifles still
>being far and away the favored weapon for sniping. Neither an AR-15 variant
>nor an HK variant are advised for long-range shots (though either will of
>course be capable of such shots...it's just that one wants the absolute
>best precsion, and cycling rate is largely immaterial).
In a rich target environment where you're firing from concealment, I think it
is better to have a semiauto 7.62mmN rifle such as an accurized HK91 or a
national match M1A, assuming the enemy has snipers or long-range antisniper
weaponry. Why?
1) It is likely to be a target rich environment. USMC sniper doctrine is
mainly single target single kill attacks from outside 600 yards. Former
Soviet and US Army snipers mainly engaged multiple targets inside that
range for tactical support. Defending against a raid is primarily
tactical support sniping, killing the vice president of a country other than
the US is primarily USMC style scout/sniping.
Thus, in defending against a raid, Soviet-style weapons are probably better.
7.62x54R Dra----v rifles are probably a good model -- iirc (I've never
fired one), they're semi auto bullpups. [eeek, www.guns.ru is selling them
with bayonets! tactical close range sniping, aye!]. Or the SEAL sniper
weapon -- an accurized M14, which is basically an M1A. With a good scope
and better trigger, an M14/M1A can be 1 MOA, and it's a real battle rifle,
with the ability to engage multiple targets quickly due to the semi-auto
action.
Also, when you're operating without a spotter/security man, it's nice to
have the ability to quickly kill anyone in close. With an M1A, you just move
from your concealment, kill, and return, wasting a minimum of time. I guess
in a home you could just keep an AR-15 next to you for such close-in dealings,
though.
2) In my (somewhat limited) experience, many field-improvised concealment
locations are great during firing, but when you move to cycle the action
on a bolt action rifle, you make the concealment shake or otherwise reveal
yourself. Against a force with sniper/antisniper weaponry, that will likely
bring down a hail of fire, which is suboptimal at best. USMC snipers generally
solve this by firing once and leaving, since it's confusing and hard to
localize on a single gunshot, but in a target rich environment, you might
not be able to move. And they may have you surrounded, so it's hard
to move without being seen.
3) A semi-auto is generally more useful for non-sniping tasks. I can barely
carry an M1A, spare ammo, supplies, etc. for a couple days without being
annoyed at the weight -- I sure wouldn't want to add a SMG or assault carbine
to that. I would not have a problem with using a battle rifle/sniper rifle
against a force armed with assault carbines and SMGs, though.
True, this may be less of an issue inside a house, since you could just leave
all your supplies cached throughout. I still thing you need to remain
concealed and hopefully in cover, and if they bring heavy weapons to bear,
you are going to have to move around the house, at least. A PSG-1 ends
up being cheaper than 10 match-grade Remington 700s -- besides, the scope
is much more expensive than the gun anyway (perhaps I just like overly
expensive scopes)
All that being said, for field use and home defense, if I'm alone, I'd
take a barrett .50 browning for long-range USMC-style scout-sniping, or
antimateriel sniping, and either a PSG-1 if money is no object (it's not
*that* expensive, if you actually use it), or the German Army sniping
system (or my^H^Ha national match M1A or M14) if money is only somewhat
an object, or a Dragunov if money is a limiting factor, for anti-sniping
or support sniping. And I strongly feel anti-raid sniping is of the
latter category.
(True, your gun is the best 7.62 USMC-style rifle other than the PSG-1..)
Even better than that would be the addition of a spotter/security person
with an M16 :) And some nice *cover* for where you fire from, in the form
of earth, concrete, sandbags, or Spectra. And if the sky is the limit,
something to engage light armor, like a 20mm rifle or tactical air support :)
*ObCrypto!*:
The choice of cryptographic tools is somewhat like the choice of sniper
weaponry.
A OTP is remarkably like a bolt-action rifle of infinite accuracy. Say, a
USAF prototype 20mm laser guided sniper rifle. Use it twice in the
same place, and get slagged in automatic cannon fire. However, it is ideal
for "one shot one kill" perfect secrecy.
A steganographically-protected data stream is much like a silenced
subsonic carbine.
A remailer network is much like a remote electrically-fired weapon (someone
at a pistol match tried this with a free pistol, won, and the technique
was banned the next year :)
PGP is the PSS -- pretty [good] sniping system, pretty good precision.
Useful for a lot of things, and since it's one of the better tools, it
gets used for a lot of things where another solution might be better. :)
Of course, I'd be kind of biased to call a working Eternity implementation
and/or working and distributed digital cash system the PSG-1.
--
Ryan Lackey
rdl at mit.edu
http://mit.edu/rdl/
From ravage at ssz.com Thu Jan 1 11:05:30 1998
From: ravage at ssz.com (Jim Choate)
Date: Fri, 2 Jan 1998 03:05:30 +0800
Subject: Guns: H&K, G3, 7.62 v 5.56 [Guns] (fwd)
Message-ID: <199801011919.NAA11887@einstein.ssz.com>
Forwarded message:
> Subject: Re: Guns: H&K, G3, 7.62 v 5.56 [Guns]
> From: Ryan Lackey
> Date: 01 Jan 1998 13:47:02 -0500
> 2) In my (somewhat limited) experience, many field-improvised concealment
> locations are great during firing, but when you move to cycle the action
> on a bolt action rifle, you make the concealment shake or otherwise reveal
> yourself. Against a force with sniper/antisniper weaponry, that will likely
> All that being said, for field use and home defense, if I'm alone, I'd
> take a barrett .50 browning for long-range USMC-style scout-sniping, or
You obviously haven't seen the flash or the dust cloud from one of these
beasties fired from ground level. Hiding at anything less than a mile is not
something you're going to do very well.
____________________________________________________________________
| |
| Those who make peaceful revolution impossible will make |
| violent revolution inevitable. |
| |
| John F. Kennedy |
| |
| |
| _____ The Armadillo Group |
| ,::////;::-. Austin, Tx. USA |
| /:'///// ``::>/|/ http://www.ssz.com/ |
| .', |||| `/( e\ |
| -====~~mm-'`-```-mm --'- Jim Choate |
| ravage at ssz.com |
| 512-451-7087 |
|____________________________________________________________________|
From schear at lvdi.net Thu Jan 1 11:14:35 1998
From: schear at lvdi.net (Steve Schear)
Date: Fri, 2 Jan 1998 03:14:35 +0800
Subject: Mobile phones used as trackers
Message-ID:
> Mobile phones used as trackers
> BY MICHAEL EVANS AND NIGEL HAWKES
>
> MOBILE PHONES can be used as tracking devices to
> pinpoint users within a few hundred yards, according to a
> report yesterday.
>
> Sonntags Zeitung, published in Zurich, said Swiss police
> had been secretly tracking mobile phone users through a
> telephone company computer.
>
> "Swisscom [the state-owned telephone company] has
> stored data on the movements of more than a million
> mobile phone users and can call up the location of all its
> mobile subscribers down to a few hundred metres and
> going back at least half a year," the paper reports, adding:
> "When it has to, it can exactly reconstruct, down to the
> minute, who met whom, where and for how long for a
> confidential tte--tte."
Anyone who desires not to be constantly tracked should carry a one-way pager and keep your cell phone turned off. This way you can return calls when it suits you and from a location of your choosing. In some U.S. localities I understand, it it possible to rent cellphone w/o offering any form of ID, only a deposit to cover the instrument and a prepayment for the airtime This may be illegal in some EU countries. To keep someone from correlating your pager info and cellular you'd want your callers to send 'coded' info, rather than phone numbers.
--Steve
PGP mail preferred, see http://www.pgp.com and
http://web.mit.edu/network/pgp.html
RSA fingerprint: FE90 1A95 9DEA 8D61 812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------
Steve Schear | tel: (702) 658-2654
CEO | fax: (702) 658-2673
Lammar Laboratories |
7075 West Gowan Road |
Suite 2148 |
Las Vegas, NV 89129 | Internet: schear at lvdi.net
---------------------------------------------------------------------
From tcmay at got.net Thu Jan 1 11:23:23 1998
From: tcmay at got.net (Tim May)
Date: Fri, 2 Jan 1998 03:23:23 +0800
Subject: Jim Bell... lives... on... in... Hollywood!
In-Reply-To:
Message-ID:
At 2:52 AM -0800 1/1/98, Julian Assange wrote:
>Anyone noticed this before?
>
>------- Start of forwarded message -------
>Date: 1 Jan 1998 09:54:51 -0000
>Message-ID: <19980101095451.25998.qmail at suburbia.net>
>From: proff at suburbia.net
>To: proff at suburbia.net
>Subject:home.html
>
>
>
> Scoop the Grim Reaper!
>
> Who will live?
>
> Who will die?
Yeah, a few people pointed this out when Bell's "Assassination Politics"
stuff began hitting the CP list, circa fall of 1995.
--Tim May
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From pooh at efga.org Thu Jan 1 11:30:43 1998
From: pooh at efga.org (Robert A. Costner)
Date: Fri, 2 Jan 1998 03:30:43 +0800
Subject: IRC Internet chat with Electronic Frontiers (fwd)
In-Reply-To: <199712312107.PAA09410@einstein.ssz.com>
Message-ID: <3.0.3.32.19980101141316.0362f05c@mail.atl.bellsouth.net>
At 03:07 PM 12/31/97 -0600, Jim Choate wrote:
>Forwarded message:
>
>> Date: Wed, 31 Dec 1997 15:06:46 -0500
>> From: "Robert A. Costner"
>> Subject: IRC Internet chat with Electronic Frontiers
>
>> * To be announced
>> hosted by Jon Lebkowsky of EF-Texas
>
>Woah Nelly, this is the first I have heard of EF-Tx, got any contact info?
There have always been two groups in Texas, one in Austin, and one in
Houston, I think. Austin is of course the famous home of the Steve Jackson
raids. Rumor has it that the two groups are merging into one to be called
something similar to EF-Texas. If you want more info, you'll have to get
it from Jon Lebkowsky, Gene Crick, or one of the others in Texas. I'm sure
Jon will address this during his chat.
Hopefully we'll have the text of the chat session, or at least the first
hour, on a web page after the chat. Jon's chat session will be on
Wednesday, January 7, 1998 at 7:00 EST (5:00pm Pacific)
The session hosted by EF Australia should be Saturday, January 17, 1998 at
8:00pm EST (11:00am Sunday, Brisbane, AU), Hosted by Greg Taylor of
Electronic Frontiers Australia. (maybe 7:00 EST - it is not set in stone)
To be honest, I'm getting confused on the time zones. Today I noticed a
mistake I made earlier when I added when I should have subtracted. Plus I
haven't figured out Australia and GMT time yet, to do it without thinking.
More info about times, and hopefully any corrections can be found at
http://www.efga.org/about/meeting.html
-- Robert Costner Phone: (770) 512-8746
Electronic Frontiers Georgia mailto:pooh at efga.org
http://www.efga.org/ run PGP 5.0 for my public key
From mixmaster at remail.obscura.com Thu Jan 1 11:32:22 1998
From: mixmaster at remail.obscura.com (Mix)
Date: Fri, 2 Jan 1998 03:32:22 +0800
Subject: No Subject
Message-ID: <199801011858.KAA07272@sirius.infonex.com>
Okay, I'd like to set up a remailer - but I don't know where to start! Unfortunatly it's going to have to run on an NT 4.0 box, so the winsock remailer is out of the question, right? And I'm not in the US, so I can't use the juno stuff -- so what (if anything) *can* I use?
Thanks for any help...
From tcmay at got.net Thu Jan 1 11:38:42 1998
From: tcmay at got.net (Tim May)
Date: Fri, 2 Jan 1998 03:38:42 +0800
Subject: Guns: H&K, G3, 7.62 v 5.56 [Guns]
In-Reply-To:
Message-ID:
An interesting message (well, interesting to me and perhaps to some others).
At 10:47 AM -0800 1/1/98, Ryan Lackey wrote:
>Thus, in defending against a raid, Soviet-style weapons are probably better.
>7.62x54R Dra----v rifles are probably a good model -- iirc (I've never
>fired one), they're semi auto bullpups. [eeek, www.guns.ru is selling them
>with bayonets! tactical close range sniping, aye!]. Or the SEAL sniper
I've read some reviews of the Dragunov which are very unflattering. The
scope on standard USSR-used rifles was terrible. I could doublecheck what
Plaster says about them, but I haven't seen anyone advocating that
Americans use them. Maybe they'll become the wave of the future...
>weapon -- an accurized M14, which is basically an M1A. With a good scope
>and better trigger, an M14/M1A can be 1 MOA, and it's a real battle rifle,
>with the ability to engage multiple targets quickly due to the semi-auto
>action.
Actually, I figure that if I'm ever in a situation where I have to engage
multiple targets quickly, I'm probably a goner. If nothing else, they'll
roll an armored vehicle in (and more and more SWAT teams have them) and
burn me out, Waco-style.
("We had to burn the children in order to save the children. Save them from
what? Well, we had reports of something....")
>Also, when you're operating without a spotter/security man, it's nice to
>have the ability to quickly kill anyone in close. With an M1A, you just move
>from your concealment, kill, and return, wasting a minimum of time. I guess
>in a home you could just keep an AR-15 next to you for such close-in dealings,
>though.
Yeah, I think an AR-15 (or variant, of course) makes more sense for the
average person than anything else (incl. shotgun) for home defense.
Opinions vary on this, but this is my conclusion.
>you are going to have to move around the house, at least. A PSG-1 ends
>up being cheaper than 10 match-grade Remington 700s -- besides, the scope
>is much more expensive than the gun anyway (perhaps I just like overly
>expensive scopes)
Well, I could justify buying _one_ Remington 700, for $600, plus another
$400 or so for the Leupold scope (not bought yet). But I sure as hell
couldn't justify buying a $10K PSG-1!!!
>*ObCrypto!*:
>The choice of cryptographic tools is somewhat like the choice of sniper
>weaponry.
...
Nice parallels, though I tend to argue for crypto in terms of speech and
First Amendment grounds, and avoid the (obvious, but dangerous) comparisons
of crypto to firearms.
Dangerous because one immediately runs into the "But we regulate machine
guns, so if crypto is like a machine gun, why shouldn't it be regulated?"
And "We don't let citizens have nuclear weapons, so why let them have
military-grade unbreakable ciphers?"
The speech issues and prior restraint issues are much cleaner.
--Tim May
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From ant at notatla.demon.co.uk Thu Jan 1 11:48:05 1998
From: ant at notatla.demon.co.uk (Antonomasia)
Date: Fri, 2 Jan 1998 03:48:05 +0800
Subject: HIP97 photos
Message-ID: <199801011921.TAA01743@notatla.demon.co.uk>
Alex de Joode :
> Hmm, I think she only got 3 photos ..
End of one film. The rest are in the post now.
--
##############################################################
# Antonomasia ant at notatla.demon.co.uk #
# See http://www.notatla.demon.co.uk/ #
##############################################################
From ichudov at Algebra.COM Thu Jan 1 12:00:22 1998
From: ichudov at Algebra.COM (Igor Chudov @ home)
Date: Fri, 2 Jan 1998 04:00:22 +0800
Subject: Guns: H&K, G3, 7.62 v 5.56 [Guns]
In-Reply-To:
Message-ID: <199801011948.NAA17459@manifold.algebra.com>
Tim May wrote:
> >Thus, in defending against a raid, Soviet-style weapons are probably better.
> >7.62x54R Dra----v rifles are probably a good model -- iirc (I've never
> >fired one), they're semi auto bullpups. [eeek, www.guns.ru is selling them
> >with bayonets! tactical close range sniping, aye!]. Or the SEAL sniper
>
> I've read some reviews of the Dragunov which are very unflattering. The
> scope on standard USSR-used rifles was terrible. I could doublecheck what
> Plaster says about them, but I haven't seen anyone advocating that
> Americans use them. Maybe they'll become the wave of the future...
First of all, the standard Dragunov scopes use weird Russian batteries
that are hard to find here. (the batteries are only used to light the
crosshairs). Also, I have been told that Dragunovs are not as accurate as
M1As (2MOA or so).
What I do like about SVD is their mean looks. Maybe it is my Soviet taste.
- Igor.
From ravage at ssz.com Thu Jan 1 12:39:59 1998
From: ravage at ssz.com (Jim Choate)
Date: Fri, 2 Jan 1998 04:39:59 +0800
Subject: W.F. Friedman - A reputation revisited?...
Message-ID: <199801012057.OAA12379@einstein.ssz.com>
Hi,
Thought I would pass an interesting quote along regarding Friedman. I think
it may have some interest considering the holding of Friedman by some
cpunks...
Combined Fleet Decoded: The secret history of American intelligence and the
Japanese navy in WWII
John Prados
ISBN 0-679-43701-0
pp. 164
"This is not to say the solution occurred in a vacuum, however. It was
OP-20-G that had solved Red, predecessor to the new diplomatic system,
and Commander Safford recognized that his organization needed outside help
on Purple. He went to his Army counterpart, The Signal Intelligence Service
(SIS), which formed part of the Signal Corps: there, senior cryptanalyst
William F. Friedman, was an expert on machine based encipherment systems.
Under Friedman, chief of the team attacking the B Machine would be Frank B.
Rowlett. Other SIS cryptanalysts, an electronics engineer, accounting
machine experts, and Japanese linguist formed the rest of the group.
Friedman, too often given credit as the man who "broke" Purple, made only
sporadic contributions amid other duties. His main role came in selecting
members of Rowlett's team, with an assist on diagnosis and analysis of the
sytsem. Robert O. Ferner was Rowlett's second, with cryptanalysts Genevieve
Grotjan, Albert W. Small, and Samuel S. Snyder plus crytographic specialists
Glenn S. Landig, Kenneth D. Miller, and Cyrus C. Sturgis Jr. The top
Japanese linguist was John B. Hurt, a Virginian like Rowlett himself."
____________________________________________________________________
| |
| Those who make peaceful revolution impossible will make |
| violent revolution inevitable. |
| |
| John F. Kennedy |
| |
| |
| _____ The Armadillo Group |
| ,::////;::-. Austin, Tx. USA |
| /:'///// ``::>/|/ http://www.ssz.com/ |
| .', |||| `/( e\ |
| -====~~mm-'`-```-mm --'- Jim Choate |
| ravage at ssz.com |
| 512-451-7087 |
|____________________________________________________________________|
From tank at xs4all.nl Fri Jan 2 04:43:58 1998
From: tank at xs4all.nl (SPG)
Date: Fri, 2 Jan 1998 04:43:58 -0800 (PST)
Subject: Banned video "Democratic Alternative" now online
Message-ID:
The "Democratic Alternative for the Basque Country" video (banned in Spain)
is now available in RealVideo format thanks to Contrast.Org. You can watch or
download the video from the Euskal Herria Journal "mirror" sites:
http://www.osis.ucsd.edu/~ehj
http://www.contrast.org/mirrors/ehj
Leaders of Herri Batasuna in Bizkaia and Gipuzkoa were jailed on
Friday to begin serving their seven year prison sentences for having
disseminated ETA's peace proposal, the Democratic Alternative.
On December 1, 1997, Spain's Supreme Court convicted the entire
leadership of Herri Batasuna of "collaborating with an armed group"
and sentenced them to seven years each in prison for attempting to
show a video (The Democratic Alternative), a proposal for cease-fire
and peace from the Basque armed organization ETA during an election
campaign broadcast last year.
The court failed to prove the participation of each of the 23
politicians in the decision to broadcast the video and thus, it
violates the principle of the presumption of innocence.
The judges considered that a crime was committed when in fact the
video had never been broadcasted. Moreover, the judges applied
Franco's Penal Code, which declared the crime of "collaborating with
an armed band" as any type of collaboration with the activities and
goals of an armed group. It thus criminalizes the role of intermediary
in disseminatiing negotiating positions or peace proposals in a bitter
and long standing conflict.
When Herri Batasuna first showed the video in public meetings in early
1996, Spain's National Court (Franco's Tribunal of Public Order
renamed) banned the video. The then Socialist government--more than 14
of whose police and senior government officials and a Civil Guard
general have been formally charged for their involvement in the
creation, funding, and activities of the death squads that killed at
least 28 suspected Basque activists in the mid 1980s--instructed the
attorney general to investigate whether Herri Batasuna should be
outlawed. Herri Batasuna then attempted to use segments of the ETA
video to disseminate the peace proposal in their election campaign but
its broadcast was banned. In May 1996, the Socialist lost the general
elections to the Partido Popular (Popular Party, founded by Franco's
Minister of Interior).
In January 1997, Spain's Supreme Court decided to prosecute the 23
leaders of Herri Batasuna. Over 30,000 people rallied in February in
the Basque city of Bilbo to protest the prosecution of the Herri
Batasuna leadership. The demonstration, which was initially peaceful,
turned into a violent confrontation when the police opened fire with
live ammunition, wounding several people. In June, an International
Commission for Freedom of Expression presented the Manifesto to the
Public Opinion and the International Community in support of free
speech and opposition to the trial against Herri Batasuna. The
president of Sinn Fein, Gerry Adams, and other distinguished
individuals are among the 700 signatories who endorsed the Manifesto.
International observers from human rights organizations in eleven
countries watching the proceedings issued a joint statement saying
that the accused were given the burden of proof which "violates the
fundamental principle of the presumption of innocence."
Basque political parties have strongly criticized the sentences,
saying that the trial was politically motivated and dashed hopes for a
peace dialogue.
Herri Batasuna attorneys said that nothing had been proven and that
the trial was intended to outlaw a political party which represents
much of the vote of the Basque people. They will appeal the sentence.
From whgiii at invweb.net Thu Jan 1 12:56:36 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Fri, 2 Jan 1998 04:56:36 +0800
Subject: Mobile phones used as trackers
In-Reply-To:
Message-ID: <199801012054.PAA25297@users.invweb.net>
-----BEGIN PGP SIGNED MESSAGE-----
In , on 12/31/97
at 06:53 PM, Steve Schear said:
>and keep your cell phone turned off.
It is my understanding that they can still track you with the cell phone
turned off so long as there is power going to the box (most auto cell
phones are hardwired into the cars electrical system).
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html
- ---------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNKwA+o9Co1n+aLhhAQG15gP/eG3w/i4L2HjWlacroj7BWLWZYgjoOWdn
yNxmvrOPQGSrrTBCO28dn3xOvJfz4z87G918h7pRZvxmhElNsHEbqCSK2CqsUCnZ
ahfF/aiXMm59ToF1HMMRXgpCxORORC58GxOkIR5zUp7HKjpPc6KhEdARovBfYnJM
LcxS2kcOJ+4=
=aljX
-----END PGP SIGNATURE-----
From paul at fatmans.demon.co.uk Thu Jan 1 13:16:49 1998
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Fri, 2 Jan 1998 05:16:49 +0800
Subject: Freedom Forum report on the State of the First Amendment
In-Reply-To:
Message-ID:
> It is about basic human decency, and giving a person a fighting chance.
No, acts of law which require employers not to discriminate against
niggers, wops, kikes or greezers, or any other ratial group infringe
basic rights of association, I personally have no racist prejudices, but
recognise the freedom of others to be as bigotted as they care to be.
Datacomms Technologies data security
Paul Bradley, Paul at fatmans.demon.co.uk
Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org
Http://www.cryptography.home.ml.org/
Email for PGP public key, ID: FC76DA85
"Don`t forget to mount a scratch monkey"
From paul at fatmans.demon.co.uk Thu Jan 1 13:16:58 1998
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Fri, 2 Jan 1998 05:16:58 +0800
Subject: Freedom Forum report on the State of the First Amendment
In-Reply-To:
Message-ID:
> You are not being coerced into anything. If you don't want to serve
> food to Blacks, don't open a restaurant. It's your choice.
I really hate having to go over and over basic points, but will do in the
hope of bringing even a tiny glimmer of enlightenment to you:
If you don`t want to serve food to blacks, open and restaurant and refuse
to serve blacks in it, put a sign on the door saying "whites only,
no niggers please", if blacks try to force you to serve them in your
restaurant protect your rights by killing them. Simple as that.
> By the way, you are also not allowed to dump toxic waste in your own
> backyard. Are you being oppressed?
Dumping toxic waste in my back yard will kill my neighbours.
How does refusing to hire blacks or any other group harm anyone but
myself (in terms of trade levels)?
> > Colin, do you consider
> > yourself oppressed when someone choses not to date you? What about
> > a rejection by someone who takes out a public advertisement in the paper?
>
> Nope. Of course, this has nothing to do with anything.
On the contrary it is an entirely analagous situation, someone is
choosing not to associate with you, do you go crying to the govt.
claiming you didn`t get a fair shake because sarah in accounts wouldn`t
fuck you at the office christmas party?
> With freedom comes responsibility. Decency is one of them.
With freedom comes responsibility not to infringe someone elses rights, I
infringe no-one elses rights by refusing to hire them...
Datacomms Technologies data security
Paul Bradley, Paul at fatmans.demon.co.uk
Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org
Http://www.cryptography.home.ml.org/
Email for PGP public key, ID: FC76DA85
"Don`t forget to mount a scratch monkey"
From paul at fatmans.demon.co.uk Thu Jan 1 13:18:10 1998
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Fri, 2 Jan 1998 05:18:10 +0800
Subject: Freedom Forum report on the State of the First Amendment
In-Reply-To:
Message-ID:
> > Should the government be able to take action against me because I fire
> > someone for being jewish/black/homosexual???
>
> Welcome to the 20th Century, moron.
You clearly have no comprehension of the principles of the free market
and the rights of businesses and individual to hire and fire whoever the
fuck they like for any reason whatsoever. I am no racist, but I defend
your right to be as racist as you see fit.
Datacomms Technologies data security
Paul Bradley, Paul at fatmans.demon.co.uk
Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org
Http://www.cryptography.home.ml.org/
Email for PGP public key, ID: FC76DA85
"Don`t forget to mount a scratch monkey"
From paul at fatmans.demon.co.uk Thu Jan 1 13:22:05 1998
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Fri, 2 Jan 1998 05:22:05 +0800
Subject: Freedom Forum report on the State of the First Amendment
In-Reply-To:
Message-ID:
> > Where do you get the right to tell others how they can make a living?
>
> I don't have that right. However, the Supreme Court has said that the
> Congress has that right.
Then that must be right... This is starting to look like a troll.
Datacomms Technologies data security
Paul Bradley, Paul at fatmans.demon.co.uk
Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org
Http://www.cryptography.home.ml.org/
Email for PGP public key, ID: FC76DA85
"Don`t forget to mount a scratch monkey"
From menema37 at path.or.jp Fri Jan 2 05:58:03 1998
From: menema37 at path.or.jp (menema37 at path.or.jp)
Date: Fri, 2 Jan 1998 05:58:03 -0800 (PST)
Subject: XXX ADULT SEX!!!
Message-ID: <199801024291RAA30040@post.164.160.2>
The LARGEST selection of Hot Beautiful XXX Live Girls
from the U.S.A. & Europe!!!
Voted as the 1998 best Adult Site!
*LIVE GIRL SEX SHOWS!!!
* 4 FREE Live Video Feeds & Chatrooms!!!
*FREE Erotic Stories!!
*Free Pictures of XXX Porn Stars!!
*Confessions!!!
*Free Pictures of Teens & Men!!!
And Lots More to do for FREE!!!
*REAL LIVE SEX!!! MUST SEE TO BELIEVE THIS SHOW!! Never seen before on the internet!
You must be 21 or older.
http://www.rrla.com
AOL Click Here!
If you take offense to this email & wish to be taken off our list,
simply e-mail us at: mwa234 at hotmail.com
We are sorry for any inconvience.
0� 29
From mikhaelf at mindspring.com Thu Jan 1 14:10:42 1998
From: mikhaelf at mindspring.com (Mikhael Frieden)
Date: Fri, 2 Jan 1998 06:10:42 +0800
Subject: Freedom Forum report on the State of the First Amendment
Message-ID: <3.0.16.19980101165908.0c4f464c@pop.mindspring.com>
At 08:18 PM 1/1/98 +0000, Paul Bradley wrote:
>> It is about basic human decency, and giving a person a fighting chance.
>No, acts of law which require employers not to discriminate against
>niggers, wops, kikes or greezers, or any other ratial group infringe
>basic rights of association, I personally have no racist prejudices, but
>recognise the freedom of others to be as bigotted as they care to be.
Does that include the krauts, micks, limeys, frogs as well as the
canucks and pea soup eaters? The polacks, chinks and dagos? The Wogs too?
Can't we all be ethnic slurs together?
Which reminds me. We never did get a good one for the Russians. Any
nominations?
-=-=-
Censorship is OK if it is of them.
-- the F-C motto
From mikhaelf at mindspring.com Thu Jan 1 14:10:42 1998
From: mikhaelf at mindspring.com (Mikhael Frieden)
Date: Fri, 2 Jan 1998 06:10:42 +0800
Subject: Freedom Forum report on the State of the First Amendment
Message-ID: <3.0.16.19980101170044.0dff4600@pop.mindspring.com>
At 08:13 PM 1/1/98 +0000, Paul Bradley wrote:
>
>> > Should the government be able to take action against me because I fire
>> > someone for being jewish/black/homosexual???
>>
>> Welcome to the 20th Century, moron.
>
>You clearly have no comprehension of the principles of the free market
>and the rights of businesses and individual to hire and fire whoever the
>fuck they like for any reason whatsoever. I am no racist, but I defend
>your right to be as racist as you see fit.
You are obviously an evil person if you do so against the self
annointed, even though they self identify themselves as 30% racist.
-=-=-
Censorship is OK if it is of them.
-- the F-C motto
From kent at songbird.com Thu Jan 1 15:21:29 1998
From: kent at songbird.com (Kent Crispin)
Date: Fri, 2 Jan 1998 07:21:29 +0800
Subject: Jim Bell... lives... on... in... Hollywood!
In-Reply-To:
Message-ID: <19980101150542.36875@songbird.com>
On Thu, Jan 01, 1998 at 09:52:20PM +1100, Julian Assange wrote:
>
> Anyone noticed this before?
No. But there are two obvious differences between this and the Bell
plan: 1) it's not anon; 2) you are explicitly barred from winning if
you contribute in any way to the death.
[...]
> You will not receive credit for a death if you somehow contribute to
> that person's demise. If there's any dispute over the exact date of a
> celebrity's demise, information listed on the death certificate will
> prevail.
>
> Dewey's Death Pool is open to residents of the 50 United States and
> the District of Columbia who are 18 years or older. For complete
> rules, see the Official Rules.
So you have to provide proof of age to claim...
[...]
--
Kent Crispin "No reason to get excited",
kent at songbird.com the thief he kindly spoke...
PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html
From shamrock at cypherpunks.to Thu Jan 1 16:31:10 1998
From: shamrock at cypherpunks.to (Lucky Green)
Date: Fri, 2 Jan 1998 08:31:10 +0800
Subject: Need secondary DNS
Message-ID:
I am looking for somebody outside North America to run a secondary DNS for
cypherpunks.to. Please email me directly, not the list.
Thanks,
-- Lucky Green PGP v5 encrypted email preferred.
"Tonga? Where the hell is Tonga? They have Cypherpunks there?"
From rights at super.zippo.com Thu Jan 1 16:47:46 1998
From: rights at super.zippo.com (rights at super.zippo.com)
Date: Fri, 2 Jan 1998 08:47:46 +0800
Subject: Defamation of the goverment
Message-ID: <199801020044.QAA06595@super.zippo.com>
>
>In the U. S. a public figure must show actual malice and reckless
disregard
>for truth to recover damages for defamation.
>But how does this
apply to the
>goverment itself, the president, and to a foreign
goverment?
>Seditious speech
>against the U. S. goverment is protected under
Brandenburg v. Ohio
>But what if
>for instance a Singaporian or German citizen
uses a remailer in California to
>insult the head of state, the goverment or
the rulingparty at home?
>Would
>willfully promotion of falsehood about a
foreign goverment or a foreign
>goverment institution be protected
speech?
>Could the Singaporian or German
>head of state or any goverment
institution within these countries recover
>damages for defamation committed
in the U.S. through a local SP?
>As far I
>understand it, there is two matters
of relevance.
>1) Sed�tious advocacy under
>the Brandenburg standard.
>2)
Defamation precedence in which the Supreme Court
>ruled that a public figure
has to demonstrate actual malice and reckless
>disregard for truth.
>The
Supreme Court has never ruled that _all_ speech is
>protected unless it is
directed to incite or produce imminent lawless or
>likely to incite or produce
such action.
>Does this mean that defamation
>against the goverment or a
foreign goverment could be subject for civil action
>as long the statute
applied would meet the Sullivan standard?
>
From dm0 at avana.net Thu Jan 1 17:08:51 1998
From: dm0 at avana.net (David Miller)
Date: Fri, 2 Jan 1998 09:08:51 +0800
Subject: IRC Internet chat with Electronic Frontiers (fwd)
In-Reply-To: <3.0.3.32.19980101141316.0362f05c@mail.atl.bellsouth.net>
Message-ID: <34AC4B93.5ECBC8DD@avana.net>
Robert A. Costner wrote:
>
> To be honest, I'm getting confused on the time zones. Today I noticed a
> mistake I made earlier when I added when I should have subtracted. Plus I
> haven't figured out Australia and GMT time yet, to do it without thinking.
> More info about times, and hopefully any corrections can be found at
>
> http://www.efga.org/about/meeting.html
There is a Windows 3.1/95 program called "WorldClock" you might want to
see at:
http://www.mindspring.com/~otterson/worldclock/index.html
I haven't tried it myself, so don't consider this an endorsement.
--David Miller
middle rival
devil rim lad
Windows '95 -- a dirty, two-bit operating system.
From abc.88060 at major.com Fri Jan 2 09:53:45 1998
From: abc.88060 at major.com (abc.88060 at major.com)
Date: Fri, 2 Jan 1998 09:53:45 -0800 (PST)
Subject: Internet Admin
Message-ID: <199801021753.JAA04369@blackie.cruzers.com>
It's TRUE! We would like to become your Internet Administrator, PLUS your
Long Distance Provider and EVEN ELECTRIC UTILITY PROVIDER. It's all possible
now under our BRAND NEW MARKETING PLAN, thanks to Utility De-REGULATION starting
Jan. 1st.
http://www.1stlady.com/cgi-bin/index.cgi?sponsorid=/sim9876 -
Why Not Get Started Now - Timing is Everything!
You can make the money the Utility Companies have been making
off of you and your neighbors for decades. But you MUST ACT NOW! We even have
a Debit/Credit card with up to a $5,000 Limit with no Credit Checks.
(Yes, you've heard this before, but this card is now shipping to our members.)
Please Visit My Website for more information on how you can Make a Nice 2nd Income
by Joining the 1st Network Marketing Plan to include ALL THE PUBLIC Utilities
in One. This means you can have FREE INTERNET ACCESS, FREE LONG DISTANCE,
FREE ELECTRICITY, FREE SATELLITE SERVICE. More Coming Soon!
THAT'S NOT ALL.
We also give you a Web Page that will allow your Web Site Visitors to fill out
the application on YOUR webSite putting them automatically into our ONLINE DOWNLINE
which you can also see online. Our Founder,wrote the Book, "Marketing on the Internet" from Maximum Press and so this plan is different from ALL others you receive in your mailbox.
AND if you ACT TODAY, you also get a Free Subscription to Internet Family Life,
the Internet's Premiere Electronic Magazine delivered to you weekly and filled
with tons of free offers, software, hardware, contests, free travel bonuses, marketing
tips, money saving coupons, and much much more.
To get Started visit, http://www.1stlady.com/cgi-bin/index.cgi?sponsorid=/sim9876
FILL OUT the online form and you will start building your business with MANY others joining under you. More information will follow from your Upline Sponsor. ME.
Or use our Fax On Demand to learn more and get started. With a Fax Machine Call
703-904-7770 Doc# 376
From remailer at geocities.com Thu Jan 1 18:00:37 1998
From: remailer at geocities.com (remailer at geocities.com)
Date: Fri, 2 Jan 1998 10:00:37 +0800
Subject: Remailer
Message-ID: <199801020146.RAA10880@geocities.com>
Check out , for a remailer that will
run on any winsock compatible connection. I think there is a ftp site in
europe. I can't remember if it runs on NT, so check out the site.
At 10:58 AM 1/1/98 -0800, you wrote:
>Okay, I'd like to set up a remailer - but I don't know where to start!
Unfortunatly it's going to have to run on an NT 4.0 box, so the winsock
remailer is out of the question, right? And I'm not in the US, so I can't
use the juno stuff -- so what (if anything) *can* I use?
>
>Thanks for any help...
>
>
>
>
>
>
From Shane.Pearson at tafensw.edu.au Thu Jan 1 19:59:44 1998
From: Shane.Pearson at tafensw.edu.au (Pearson Shane)
Date: Fri, 2 Jan 1998 11:59:44 +0800
Subject: Location Escrow anyone ?
Message-ID:
Hello all,
>> "Swisscom has stored data on the movements of more than a million mobile
>> phone users. It can call up the location of all its mobile subscribers down
>> to a few hundred meters and going back at least half a year," the paper
>> reported.
>
>They probably say a few hundred meters so the people don't feel
>their privacy is too ridiculously invaded / soften the blow.
>
>If this is a GSM network then I think they can probably pinpoint
>your location down to 2 possible locations within a few meters
>due to the digital timing involved with the very precise spread
>spectrum radio. Or maybe your actual location within a meter or 2.
>
>I have heard of digital mobile phones that have a feature in their test/diag
>mode that displays the distance to the current base station in meters,
>and also displays info of a second base station that it would most likely
>switch to when moving out of the current cell.
>Even if the telco only had the distance info to your phone within a meter
>from 2 of their base stations, they could calculate where you are if need
>be to 2 possible locations within meters.
>Surely though they would have the capability of recording distance info
>from 3 base stations, pin pointing you exactly during a call or the exact
>spot your phone requested a cell change.
>
>And during a call, if need be, they could probably plot your position at
>around 10,000 samples per second. :) Though for them to be keeping
>this much info on you, you are obviously being investigated.
>
>Isn't it ironic that people who use GSM for it's "security" can have this
>much info of their whereabouts known to big brother/whoever?
>Not to mention their actual conversation.
>
>Imagine Mr.Drug Dealer turns up to court and watches as the jury is
>presented with a floorplan on screen and an animated pinpoint of his
>phones position while a recording of his conversation is played in sync?
>
>The world just about, has no idea!
>To say big brother is watching is a gross understatement. :)
>
>He's gunna find out who's naughty and nice.
>
>Bye for now.
From brianbr at together.net Thu Jan 1 21:36:30 1998
From: brianbr at together.net (Brian B. Riley)
Date: Fri, 2 Jan 1998 13:36:30 +0800
Subject: Guns: H&K, G3, 7.62 v 5.56 [Guns] (fwd)
Message-ID: <199801020526.AAA02793@mx01.together.net>
-----BEGIN PGP SIGNED MESSAGE-----
On 1/1/98 2:19 PM, Jim Choate (ravage at ssz.com) passed this wisdom:
>> Subject: Re: Guns: H&K, G3, 7.62 v 5.56 [Guns]
>> From: Ryan Lackey
>> Date: 01 Jan 1998 13:47:02 -0500
>
>> 2) In my (somewhat limited) experience, many field-improvised
>> concealment locations are great during firing, but when you move
>> to cycle the action on a bolt action rifle, you make the
concealment
>> shake or otherwise reveal yourself. Against a force with
>> sniper/antisniper weaponry, that will likely
>
>> All that being said, for field use and home defense, if I'm alone,
>> I'd take a barrett .50 browning for long-range USMC-style
>> scout-sniping, or
>
>You obviously haven't seen the flash or the dust cloud from one of
>these beasties fired from ground level. Hiding at anything less
>than a mile is notsomething you're going to do very well.
IIRC, the Barret gun with all its gear is also a multiperson load as
well, so the 'alone' part isn't very valid either.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQEVAwUBNKx6SD7r4fUXwraZAQEzGgf/Ymp7/s0+FlgpBQgNs81x8cqasRAjFrIf
gvF0fG+XsLeoDaeohFf1uKUktkYE0zoO5G3IBBY9QJ69uPYDKlyFfQJldWYHPL56
2i9bfMuqnrj+sCOLJl54X/WaucO9WrUYNC16RulXblPohj8HBqGp9y73iybbfycb
mQdbfhyTYeuM5X3vjcCOVzKHTl4hPqxijeJjL4OUtx5NeUDnZWlp9PRkVDY5CHLu
dvr8LJvmbF9vzUSOLAjUeHD3j8rjzR8wRQ9ZeeDkH6leevjuI1NAH/J1xB5bWxgC
zrzud/QFgs0rX38YZlLnpP4iekXcqWaq2j+SfptBD1BthK7nuqf9mg==
=33z2
-----END PGP SIGNATURE-----
Brian B. Riley --> http://members.macconnect.com/~brianbr
For PGP Keys
"Saying windows 95 is equal to Macintosh is like finding a potato
that looks like Jesus and believing you've seen the Second Coming."
-- Guy Kawasaki (MacWorld, Nov '95)
From attila at hun.org Fri Jan 2 00:51:33 1998
From: attila at hun.org (Attila T. Hun)
Date: Fri, 2 Jan 1998 16:51:33 +0800
Subject: Time to Pay the Piper
Message-ID: <19980102.081442.attila@hun.org>
-----BEGIN PGP SIGNED MESSAGE-----
>From: Bill Stewart
>To: "Attila T. Hun" ,
> cypherpunks
>Subject: Re: Making them eat their words... (while they watch!)
>Date: Sun, 21 Dec 1997 11:56:54 -0800
>
> At 05:15 PM 12/21/1997 +0000, Attila T. Hun wrote:
>> there is only one solution to organizations like M$
>> which are operated without ethics: treat them to the
>> pleasures of not only the antitrust laws but the
>> exquisite delights of RICO.
> Nonsense, and I'm surprised to hear this from you.
No, Bill. it's not nonsense...
1) when a true market monopoly exists, society _is_
entitled to intervene. I wrote my Harvard thesis on
antitrust and the effect on society of a monopoly,
regulated in the public interest as in AT&T v. the
industrial monopolies. this may have been 35 years
ago, but the principles are even more imperative
now with the increasing concentration of real wealth
both individually and corporately in the hands of a
few.
2) why should you be surprised to hear this from me?
sure, I would prefer anarchy per se, but have
absolutely no faith that the vast majority would do
anything except rape, pillage, and plunder. and, I
think I have made my beliefs more than plain over
the history trail of cypherpunks.
anarchy is nothing more than an isolationist theory; as
a political system it does not work --never has, never
will. ergo, there is a need for some government in the
interest of the people (sheeple, if you prefer). man
has not proved his worth on this planet, and whether or
not you believe in God is irrelevant. the last several
generations have bequeathed a wilting, dying polluted
earth to their children and grandchildren.
therefore, I am neither your revolutionary anarchist
nor your "lost in the clouds" libertarian idealist; I am
just a pragmatist who wishes we could govern with an
enlightened electorate in the manner of a New Hampshire
town meeting; a pragmatist that I believe limited
regulation is essential, but a foolish dreamer to hope
for an enlightened electorate.
> Treat them to the pleasures of the free market -
> if you don't like them, start a Boycott M$ campaign,
> and see if people stop buying their lousy software.
no, Bill, there is no alternative in the mass market. A
perfect example is Gate$ buying _both_ WebTV and their
competitor to make sure he has _all_ the action.
another is EnCarta. Gate$ gave it away until the other
vendors dropped out of the market; now M$ charges for
the encyclopedia.
Gate$ is the perfect example of not only a pure monopoly
with 90% of the OS market, but also a constructive
monopoly who has leveraged the first position to force
monopolies in other areas: 95% of word processing, 95%
of spreadsheets, and approaching the total domination of
the browser market.
Secondly, Gate$ is spreading into the control of the
means of distribution in cable, networks, etc. and
likewise into media content. Gate$ current actions are
those of a spoiled four year old child who sees nothing
wrong with demanding it all.
> The direct democracy of the free market is far more
> appropriate than government here - it's $1/vote,
> and if enough people vote against M$ they'll get the hint,
> and it enough people vote _for_ M$, it's none of your
> business.
WRONG! when 90% of the voters are dependent on M$, M$ has
bought the vote. to the average user, to vote against M$ is
to vote against a free v. a not-free browser, etc.
WRONG AGAIN: the OEM computer group has no choice either;
software is available from virtually every software house
for M$ --and only M$. therefore the OEM has no choice of
operating system. without the software, any competing OS
is useless. M$ has also intimidated and constrained the
software houses. Corel is a good case in point with M$
threatening to withhold critical information on Windows
95 if Corel delivered their 32 bit product to OS/2
first.
WRONG AGAIN: M$ has required OEMs to load Explorer as part
of the "privilege" to be able to load the OS. That is
restraint of trade. when they try to exercise total
market control through their customers with their own
marketing policies.
WRONG AGAIN: M$ is forcing Explorer on totally
non-related software vendors. Why should the
accounting software vendor in MN be required to load
Explorer to be able to distribute the OS --and, most
additional M$ packages in networking, etc required
Explorer for essential DLLs. this is "binding" in
FTC unfair practices regulations.
> It _is_ funny to see the Feds hiring a big corporate lawyer
> to run their case; I guess they don't think Federal Prosecutors
> are good enough. Surely if a low-level prosecutor can't hack it,
> they should use their boss, and on up the hierarchical chain.
> If Janet Reno can't do it either, they should replace her with
> someone who can :-)
GRIN? Bill, I'm surprised you would say this. Reno is
not an anti-trust specialist. just how many of them are
there in the country as a whole? not many? why? --not
much anti-trust action; usually the FTC has been able to
block mergers, etc. before they become a menace to
society such as M$ has become.
this is where the failure of the free market comes in:
few companies manage to attain the total monopoly
position; _none_ to date have done so with clean hands.
frankly, Gate$' hands are dirtier than Cornelius
Vanderbilt's hands were in his heyday; and Cornelius
Vanderbilt made John D. Rockefeller and J.P. Morgan look
like angels.
Gate$' literally has not only violated the anti-trust
laws and the FTC rules on fair competition, but he has
done so deliberately in what can easily be defined as a
conspiracy to limit or prevent access to the market
--and that can be construed as a RICO offense --and
should be. Neither Gate$ nor Ballmer show the slightest
interest in backing off what they consider their God
given rights in a free market to rape, pillage, and
burn; they feel that M$ is entitled to tell the American
(or world) buyer what he wants to buy. monopoly
eliminates freedom of choice.
I do not usually have much use for Jesse Berst, whom I
generally consider a senseless and shameless M$ schill,
like the rest of Ziff-Davis; however, this is what Jesse
had to say Monday:
Jesse Berst, 22 Dec.
"I'm a fan of its [Microsoft's] accomplishments
and its great products. More than that, I'm
a fan of personal computing. That's why I can say
that it's better for us -- and better for Microsoft
-- if the DOJ forces the company to play fair. Only
intense competition can keep a company from the
hardening of the attitudes that eventually damaged
companies such as IBM, Digital, Wang and Data
General."
to engender that competition, M$ needs to be forced to
divest either operating systems or products. despite
any imagined gains of their increasing integration, the
market can not fall to a monolithic line and then expect
further advances with no-one nipping at M$' heels
unfortunately, M$ idea of competition has not been to be
just the market leader --it has fostered an attitude
that it can be the only player.
and like all monopolies, M$ has fallen into the Al
Sloan mode ("What's good for General Motors is good for
the country").
more Jesse Berst, 22 Dec.
"That's why I can say with all sincerity, the more
you like Microsoft, the more you admire its
accomplishments, the more you appreciate its
products, the more you should root for the DOJ to
win its latest case. Anybody who thinks otherwise
should be forced to attend every single match of
the World Wide Wrestling Federation next year. That
will give them an up-close-and-painful taste of what
happens when you do away with competition.
Jesse, the Microsoft schill, is now at least as strident
as I have been since the late 80s when the uncontrolled
direction of Gate$' marketing and operating system
leverage over office products became more than evident.
the DOJ should have broken M$ into separate companies in
1994.
instead, the DOJ made a deal with a "Joe Stalin", who,
true to Lenin's manifestos, would sign any treaty which
bought him time to develop the prohibited weapons --then
he broke it. M$ violated the consent decree before it
was certified in court and. in reality, applied even
more onerous terms to the hardware OEM vendors; we are
reaping the results of Gate$ incredible arrogance today.
Gate$ also broke the public trust by arrogantly usurping
by whatever means more of the market --his actions
today are untenable in a civilized market. any
suggestions that if you do not like M$, you should not
buy M$ products are hollow inanities --to the public,
there is no alternative --economies of scale and market
dominance have wiped out all but a few niche market
vendors.
the sheeple never revolt; they just follow the Judas
goat to the abattoir happily enjoying the free software
while Gate$ builds his tollGate$ (nice pun --guess I
will add that to my lexicon). the sheeple will not be
happy when they find themselves being nicked for every
transaction, on or off Gate$' networks.
--and if Gate$ actions over the past 3 years were not
enough, his ridiculous, affrontive, and offensive
response to the Judge's order is prima facie evidence of
not only a monopoly, not only a constructive monopoly,
but a tyrannical, maniacal monster who is still a
spoiled four year old brat with absolutely no conscience
or sense of social responsibility.
the fact Steve Ballmer, et al, echo this dictatorial
policy in violation of US law is prima facia evidence of
an ongoing criminal enterprise which employs extortion
--yes, literally extortion-- in the furtherance of its
business plan --and this is a RICO offense for which
Gate$ and his henchman certainly appear to have
deservedly earned the right to 3 hots and a cot for the
20 years minimum on the lesser RICO charge, or mandatory
life imprisonment on a conspiracy of greater than 6.
Secondly, none of Gate$ lieutenants and captains can
claim they acted under orders; it wont fly any more than
it flew at Nuremberg.
Esther Dyson (with Margie Wylie of CNET)
But it is big government that's watching them, not
...
Yes--and that's why we need to keep...I mean, God
bless the Justice Department for fighting Microsoft;
God bless Microsoft for creating good products, and
the customers for keeping everybody in line. This
is what I want: I don't want anybody to win. I
want the game to keep going. I want little guys to
keep on coming up and tweaking the noses of the big
guys.
I've always been a believer in antitrust. It's the
concentration of power that bothers me, not whether
it's "for profit" or "for government." And I've
never claimed to be or not to be a Libertarian.
People put labels on things and stop thinking.
a good clear statement from Dyson on the public
interest.
do you think M$ should be permitted to behave in
their autocratic and callous manner towards software
developers who have no need for Explorer?
Brian Glaeske, a programmer/analyst with Fargo,
North Dakota-based Great Plains Software, complained
to the US Justice Department last month that
Microsoft effectively requires him and others to
provide its browser in his accounting software,
which has nothing to do with the World Wide Web or
the Internet.
"Microsoft should not be permitted to force
third-party developers to redistribute Microsoft
Internet Explorer in order to use [new] features,"
Glaeske wrote to Joel Klein, the Justice
Department's top pursuer of antitrust allegations.
is not Glaeske's position reasonable? the real point
however, does not relate to the browser; the bottom line
is that Glaeske, and most of the software developers, do
not have an alternative to Microsoft as an operating
system.
Oh, sure, some clients will run Unix flavours and there
are vendors for most high profile applications on unix
and OS/2, but the vast majority (90%) of the clients
take the easy way out and go Microsoft --M$ is what the
employees have at home; M$ is what the "trained"
employees have used before.... there are millions of
arguments, after WinTel being cheaper, why they should
not change --starting with "why should we be different?"
a pure free market is anarchy; anarchy may be a
wonderful idea for utopian people; the human race is far
from being anything except a selfish, greedy collection
of individuals who are constrained either by the threats
of fire and brimstone from the church, or the laws of
the land which punish transgressions of socially
acceptable behaviour --fair or not.
even Teddy Roosevelt wrote that anarchists should be
hunted down and exterminated like vermin.
William H. Gates III is just another robber baron who
really believes the statement: "What's good for
Microsoft is good for the country." Al Sloan never
realized his monopoly with General Motors, although
there have been periods where GM was over 50% of the
market (when Chrysler was close to failing).
Bill Gates has created an effective monopoly _world_
_wide_ which far surpasses any monopoly ever created
by one individual or company; even John D. Rockefeller
did not come close to Gate$' power. John D. was also
rather benevolent. IBM never approached Gate$' level
of monopoly.
Gate$ has proven, and is proving while the very
litigation is going on, that he is not a benevolent
monopolist; there is only one way: Bill's way, and
everyone will think like Bill, or they will be the
vermin to be exterminated.
and, that, my friends, is why there is such a thing
as the public interest; and it should have been
exercised on BadBillyG in 1994.
my vote goes to prosecute Bill Gates and Steve Ballmer,
at the very least, for violations of the Sherman Act,
the Clayton Antitrust Act, and the Robinson-Patman
amendments (FTC, etc.) to the full extent of the law,
including criminal violations as warranted under those
titles; and prosecute under the RICO statutes for an
ongoing racketeering (extortion is racketeering) and
criminal enterprise.
frankly, I am disappointed that it has come to this, but
Gate$ greed and lust for power has not only exceeded
his common sense, it has transgressed the boundary of
baseline social responsibility.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be
iQBVAwUBNKyor7R8UA6T6u61AQHtcAH/XVaZQWl+IicPv7adVvLy/Yy4xkBj7mUP
lyU0ecw8oQPCxB2zhtPQcwvPtCMJVBc3y8UtSuAu/i8Kn4XzWeS+EA==
=GIWP
-----END PGP SIGNATURE-----
From kping at nym.alias.net Fri Jan 2 02:28:20 1998
From: kping at nym.alias.net (Kay Ping)
Date: Fri, 2 Jan 1998 18:28:20 +0800
Subject: Location Escrow anyone ?
Message-ID: <19980102101945.10999.qmail@nym.alias.net>
-----BEGIN PGP SIGNED MESSAGE-----
>>ZURICH (December 28, 1997 4:12 p.m. EST http://www.nando.net) - Swiss
>>police have secretly tracked the whereabouts of mobile phone users via a
>>telephone company computer that records billions of movements going back
>>more than half a year, a Sunday newspaper reported.
>
>Don't be fooled that this is a swiss only problem. It's being done here in
>Amerika right now.
The FCC has issued a ruling that will require all cellular telephone
carriers to provide location information on all 911 calls. By the year
2001, this location information is to provide 125 metres of accuracy 67%
of the time.
Helping emergency services locate 911 callers is a great excuse for
installing a cellular location system. Even better than the excuses they
gave for eavesdropping-ready digital switches and limits on encryption.
- --------------
Kay Ping
nop 'til you drop
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: cp850
iQEQAwUBNKyXURHPAso8Qp7tAQH+LgfRATtByYG8nB+gbqvrJ96SGdhRPhXUWnzl
7gHW9+nr6lNQxgbFnU1cpOKR76Y0MEj80ls9n9DojlQuIKJD1RHXc7GQA3k0IVZU
yXYyy8Z89dvVUxprVjt0MylxY1+fP7pGLVcViz9jZ/5cgZSgUdRKQNAWpp9g/Ww4
8GYSXGYGrC8hCPoD+i/cjwC3FEQVD+GzSmXnadK8a2a+stiehN1bw/p61+vizxQZ
C9YG1AS54Ttzh/jUjnHmRwNYtY4J0i9zUXxElbwj8PcOW9GewTPw+/6fiQ63c35Q
2pCi2q9dk1jFtgIXfrBusSkKS9wP0yYmtLG6lc52YtC6MNE=
=+pHY
-----END PGP SIGNATURE-----
From anon at anon.efga.org Fri Jan 2 03:00:33 1998
From: anon at anon.efga.org (Anonymous)
Date: Fri, 2 Jan 1998 19:00:33 +0800
Subject: Freedom Forum report on the State of the First Amendment
Message-ID:
> Which reminds me. We never did get a good one for the Russians. Any
>nominations?
Klintonkov? As in Comrade Klintonkov?
From mibe at prodigy.com Fri Jan 2 19:10:25 1998
From: mibe at prodigy.com (mibe at prodigy.com)
Date: Fri, 2 Jan 1998 19:10:25 -0800 (PST)
Subject: Sneak Preview
Message-ID: <199801033634DAA21776@post.net>
Please REPLY with YES in the subject line for
a sneak preview of an incredible new website,
coming soon:
BOOKS: all downloadable, many free;
MUSIC: world's largest selection of CDs and tapes;
MOVIES: thousands of videos, lowest prices anywhere;
SOFTWARE: thousands of titles, many downloadable
Examples:
* "Huck Finn" by Mark Twain
* elsewhere $5.95 in paperback; our price: free!
* (Plus hundreds of other titles)
* "Always be my Baby" CD by Mariah Carey
* elsewhere $5.95; our price $2.63
* "Scream" Video
* elsewhere $24.95; our price $17.24
* "CoffeeCup" HTML editor
* elsewhere $59.95; our price $30
We ship worldwide with low shipping charges,
no excessive markup for "shipping and handling."
You must REPLY with the word YES in the subject
line to receive advance notice.
If you would like to be removed from future mailings,
E-mail remove at amnent.com and type remove in the
subject line.
Thanks, and happy holidays!
3bject: � � To: m
From 1wmsi043o at worktow1est.com Fri Jan 2 20:56:51 1998
From: 1wmsi043o at worktow1est.com (1wmsi043o at worktow1est.com)
Date: Fri, 2 Jan 1998 20:56:51 -0800 (PST)
Subject: Give Your Child "One of the Best Children's Videos""
Message-ID:
The holidays are upon us. If you're like a lot of people, you struggle to
find gifts for your children that will entertain and amuse them at the same
time. Well, here's a gift that will delight your child -
A Is For Airplane!
"A Is For Airplane" is the award-winning educational video that shows kids
all the fun and teamwork involved in running an airline. "A Is For Airplane"
gets viewers behind the scenes at the airport! Kids get to see:
* The ticket counter!
* Inside the baggage system!
* On the ramp with the baggage loaders and fuelers!
* In the catering kitchens!
* Inside the control tower!
* In the hangar with the mechanics!
* At the boarding gate!
* And even in the COCKPIT of a real Boeing 757!
Parenting Magazine calls "A Is For Airplane" "One of the Best Videos of
1996!" It's also Approved by the Parent's Choice Foundation!
Thousands of copies of "A Is For Airplane" have been sold for $14.95, but as
an Internet Special this holiday season you can get "A Is For Airplane" for
only $11.95 (plus shipping and handling.) ORDER TODAY FOR GUARANTEED HOLIDAY
DELIVERY!
You can order "A Is For Airplane" by calling our toll-free number -
800-250-4210.
If you'd like more information, visit our Website at
www.ppmm.com/jfp/jfp1297.htm
or CLICK HERE!
Thank you for your time...
Johnson Family Productions
Madison, WI
From ichudov at Algebra.COM Fri Jan 2 06:40:03 1998
From: ichudov at Algebra.COM (Igor Chudov @ home)
Date: Fri, 2 Jan 1998 22:40:03 +0800
Subject: Meganet's Unbreakable Virtual Matrix Encryption Takes the Market by Storm; Finally in 1998 Absolute Security...
Message-ID: <199801021435.IAA27120@manifold.algebra.com>
CNN Custom News:
Repeat/Meganet's Unbreakable Virtual Matrix Encryption Takes
the Market by Storm; Finally in 1998 Absolute Security...
LA Times 02-JAN-98 LOS ANGELES--(BUSINESS WIRE)--Dec. 31,
1997--Finally Meganet's highly acclaimed unbreakable encryption,
Virtual Matrix Encryption (VME) is for sale. Meganet, a San
Fernando Valley software development company, is proud to
announce the release of a full line of encryption products.
VME 98 is available in six (6) levels of front-end applications
in three (3) flavors: DOS, Win 16 (Windows 3.x), and Win
32 (Windows 95 & NT). The VME 98 Standard Edition, VME
98 Professional Edition, VME 98 Enterprise Edition, VME 98
Custom Client Edition, VME 98 Custom Server Edition, & VME 98
Batch Server Edition provide unprecedented security, options,
and flexibility. The pricing ranges from $100.00 for a single
retail license to over $1,000,000.00 for the most sophisticated
VME 98 Batch Server Edition.
In addition, three (3) SDK's (Software Developer Kits) are
ready to assist software developers in easily integrating
VME 98 into their existing and future products. The three (3)
SDK's include an 8bit DOS Engine, 16bit Windows DLL (Win 3.x)
and 32bit Windows DLL (Win 95 & NT).
The possibilities are endless with the array of VME 98
products. Now any application including but not limited
to Internet commerce, Government communications, banking
transactions, corporate secrets and personal computer data
can be guaranteed complete impenetrability.
Yes, the VME 98 is the same product that was posted on the
Internet with a $1 million reward for anyone that could break
a VME encrypted file. Over fifty five thousand (55,000) tried
with zero (0) success.
Yes, the VME 98 is the same product that challenged Microsoft,
IBM, AT&T, Dell, Hewlett-Packard, Intel, America Online,
Netscape, etc. to break a VME encrypted file. All the great
computer minds in this country have had an opportunity to
dispel the bold claims of unbreakable encryption, yet none have.
Meganet is pleased to offer the same standard of excellence
with all of the VME 98 packages.
Additional information about this exciting new technology can
be found at www.meganet.com
From bairuana8 at juno.com Sat Jan 3 00:41:24 1998
From: bairuana8 at juno.com (bairuana8 at juno.com)
Date: Sat, 3 Jan 1998 00:41:24 -0800 (PST)
Subject: rush rush
Message-ID: <19980103916SAA8876@post.penzberg.de>
It seems both you and I have an interest in making money. Our research indicates the following material is of interest to you. Sorry for the intrusion, you will only receive this message once. Thank you.
Do you have any product, recipe, idea, service, website, MLM, or business that you would like to expose to thousands of people for pennies on the dollar? Well, advertising on the internet is the only way to go.
There are thirty million people currently on the internet with that number increasing by fifty thousand per month. Imagine the ability to reach these people overnight for a fraction of the cost of direct mailing. This is what we have to offer.
If you would like more info, please respond to FUTURE849 at earthlink.net and type info in the subject box. Please include any questions you have. I hope you are having a great holiday season.
From ericm at lne.com Fri Jan 2 09:53:04 1998
From: ericm at lne.com (Eric Murray)
Date: Sat, 3 Jan 1998 01:53:04 +0800
Subject: Mobile phones used as trackers
In-Reply-To: <199801012054.PAA25297@users.invweb.net>
Message-ID: <199801021756.JAA13004@slack.lne.com>
William H. Geiger III writes:
> In , on 12/31/97
> at 06:53 PM, Steve Schear said:
>
> >and keep your cell phone turned off.
>
> It is my understanding that they can still track you with the cell phone
> turned off so long as there is power going to the box (most auto cell
> phones are hardwired into the cars electrical system).
How?
The little I know about cellular is that the handset only broadcasts
to the cells when its on. Of course, 'on' and 'off' might mean
different things on a hand-held with limited battery life, and a
mobile that's connected to a large battery with a generator (car).
But it doesn't make sense to have the even the mobile system constantly
communicating with cells and getting hand-offs when the operator
has switched it 'off' and isn't using it- it'd be taking up bandwidth
for no reason at all. And we all know that cellular bandwidth is
in short supply.
--
Eric Murray Chief Security Scientist N*Able Technologies www.nabletech.com
(email: ericm at lne.com or nabletech.com) PGP keyid:E03F65E5
From eureka at eureka.abc-web.com Sat Jan 3 01:59:28 1998
From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com)
Date: Sat, 3 Jan 1998 01:59:28 -0800 (PST)
Subject: Eureka! Sat Jan 3 '98
Message-ID: <19980103082548.18031.qmail@eureka.abc-web.com>
Welcome to Saturday's issue of Eureka!
CYBEREROTICA
If you want serious porn, real porn, lots of porn we suggest
you join CyberErotica for a FREE 1 week introductory offer,
You get some of the best content for a lower price than many
premium adult sites. There are hundreds of FREE Stripshows
& Video Channels, thousands of photos and more! If you just
want to try it out you can sign up for a full week for FREE!
CE ... http://www.cybererotica.com/ad/welcome.cgi/raw_3971/A
GAYEUREKA!
NEW!! The new gay newsletter is now available. All the gay
material from this newsletter and a whole load more will now
appear in the new newsletter. If you would like to subscribe
Please click here ..... http://eureka.abc-web.com/gayeureka/
EUREKA! is now available in three additional languages. So
now you can choose from any of the following. And don't for-
get, from January 10th we'll add Portuguese and Italian too!
FRAN�AIS ..... http://eureka.abc-web.com/eureka/francais.htm
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPA�OL ....... http://eureka.abc-web.com/eureka/espanol.htm
LADIES WHO LOVE IT
Great pix of hot horny women. There are a few free jpegs of
good looking babes fucking. Your hand may just leave your
mouse? From there check out Ladies who love ladies. Not bad.
Ladies Who ....... http://www.janey.com/~arnold/marc/ladies/
THE ULTIMATE HARDCORE NUDIE BAR
Ohh yeah! This is a hot spot! Long legged, white lace stock-
ings, pearls and hot nipples. Sound good? They have several
types to select from including amateurs, hardcore and teens.
The Ultimate Hard ..... http://www.nudie-bar.com/ultwarn.htm
FREE NAKED THINGS ON THE WEB
Jackpot! This site has lots of great free pix! Most of these
ladies look like models and they are showing bush and labia!
There isn't a skanky one in the bunch! This is a must surf!
Free Naked Things ......... http://www.znd2.net/karpo/site1/
ASTRO NUDE
This site is not going to win any design awards today but it
does have some free pix and is easy to surf around in. They
have busty ladies, teens and asian selections. Check it out.
Astro Nude ... http://204.69.248.200/3527glz/johnro/cum.html
FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet. However, many of the feeds use the RealPlayer and will
work in most browsers. If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Mpegs, RealVideo and RealAudio ............. www.sexwav.com/
CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars you will meet most days. It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/
THE BEST PHONE SEX
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416
AMATEUR SITE OF THE DAY
JANEY: The godmother to all amateur websites. This classy
lady has been the leader of amateur innovation. She has a
plethora of pictures, and other exciting diversions! Believe
it or not this hot lady is a grandmother! Janey's webpage is
a guiding light and mecca to all inspiring amateurs. Visit
the elegant lady and see what first class is all about.
Janey ...................... http://amateurindex.com/eureka/
TODAY'S FREE PIX
OK, it's the new year, and now we are really going to start
getting in gear, with some of the hottest FREE photos ever!
Pic 1 ........................... http://137.39.63.229/?030
Pic 2 ........................... http://137.39.63.229/?031
Pic 3 ........................... http://137.39.63.229/?032
Pic 4 ........................... http://137.39.63.229/?033
Pic 5 ........................... http://137.39.63.229/?034
Pic 6 ........................... http://137.39.63.229/?035
Pic 7 ........................... http://137.39.63.229/?036
Pic 8 ........................... http://137.39.63.229/?037
Pic 9 ........................... http://137.39.63.229/?038
Pic 10 ........................... http://137.39.63.229/?039
PLEASE VISIT THIS FINE EUREKA! MEMBER SITE
FORNICATE.COM
http://www.fornicate.com/enter.html
If your like free FUCK pics, visit FORNICATE.COM - Where
every kind of fucking can be found!! Group Sex, Anal Sex,
Straight Sex, Gay Sex, Bizarre Sex, & Lesbian Sex!! You name
it, it is at FORNICATE.COM
------------------------------------------------------------
If you would like to unsubscribe from the Eureka! Newsletter
simply select reply and send us a quick reply to this email.
------------------------------------------------------------
From mixmaster at remail.obscura.com Fri Jan 2 10:53:58 1998
From: mixmaster at remail.obscura.com (Mix)
Date: Sat, 3 Jan 1998 02:53:58 +0800
Subject: remailer
Message-ID: <199801021822.KAA05621@sirius.infonex.com>
In a message dated 20:44 01/01/98 EST, you wrote:
> Check out , for a remailer that will
> run on any winsock compatible connection. I think there is a ftp site in
> europe. I can't remember if it runs on NT, so check out the site.
Thanks for the help - I've tried the latest version with no luck. The docs state that it works under win95 now but there are still some issues with NT 4.0 Has anyone got this to work under NT? I really want to give something back to the remailer/cypherpunk community and this is the only way I can think of.
If anyone has experience of the Winsock remailer and can help...
From tcmay at got.net Fri Jan 2 11:39:14 1998
From: tcmay at got.net (Tim May)
Date: Sat, 3 Jan 1998 03:39:14 +0800
Subject: Meganet's Unbreakable Virtual Matrix Encryption Takes theMarket by Storm; Finally in 1998 Absolute Security...
In-Reply-To: <199801021435.IAA27120@manifold.algebra.com>
Message-ID:
At 6:35 AM -0800 1/2/98, Igor Chudov @ home wrote:
>CNN Custom News:
> Repeat/Meganet's Unbreakable Virtual Matrix Encryption Takes
> the Market by Storm; Finally in 1998 Absolute Security...
>
> LA Times 02-JAN-98 LOS ANGELES--(BUSINESS WIRE)--Dec. 31,
> 1997--Finally Meganet's highly acclaimed unbreakable encryption,
> All the great
> computer minds in this country have had an opportunity to
> dispel the bold claims of unbreakable encryption, yet none have.
All the great computer minds....
They laughed at Galileo, they laughed at Darwin, they laughed at Bozo the
Clown.
Jeesh.
--Tim May
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From jim at mentat.com Fri Jan 2 12:13:57 1998
From: jim at mentat.com (Jim Gillogly)
Date: Sat, 3 Jan 1998 04:13:57 +0800
Subject: Meganet's Unbreakable Virtual Matrix Encryption Takes the Market by Storm; Finally in 1998 Absolute Security...
Message-ID: <9801022007.AA03484@mentat.com>
IChudov relays from CNN Custom News:
> Repeat/Meganet's Unbreakable Virtual Matrix Encryption Takes
> the Market by Storm; Finally in 1998 Absolute Security...
That reminds me... in PR Newswire on 16 Dec 1997 it was reported that
IBM had endorsed Meganet's VME, and recommended that NIST replace the
DES standard with it (presumably in the AES bake-off). This was
humorous enough that I thought it worth sharing with IBM -- I
ingenously asked them whether it was true, and, if so, how they came to
the conclusion that it was a useful product. They responded:
I would like to apologize for the length of time it took
to reply to your message. I had to make a few phonecalls
and had to wait for someone to get back to me. I spoke with
a Cryptography Specialist and she informed me that IBM
has, in fact, not tested their product and therefore has not
endorsed it. IBM has no further comment regarding the report.
I hope this helps.
Thank you for using askIBM.
George Lavasidis (ASKIBM at vnet.ibm.com)
IBM Internet Support Group
1-800-IBM-4YOU
I, too, have no further comment.
Jim Gillogly
Hevensday, 11 Afteryule S.R. 1998, 20:11
12.19.4.14.11, 8 Chuen 9 Kankin, Third Lord of Night
From amaret at infomaniak.ch Fri Jan 2 13:35:59 1998
From: amaret at infomaniak.ch (Alexandre Maret)
Date: Sat, 3 Jan 1998 05:35:59 +0800
Subject: Location Escrow anyone ?
In-Reply-To:
Message-ID: <34AD5B24.520C3851@infomaniak.ch>
Pearson Shane wrote:
>
> Hello all,
>
> >> "Swisscom has stored data on the movements of more than a million mobile
> >> phone users. It can call up the location of all its mobile subscribers down
> >> to a few hundred meters and going back at least half a year," the paper
> >> reported.
> >
> >They probably say a few hundred meters so the people don't feel
> >their privacy is too ridiculously invaded / soften the blow.
> >
> >If this is a GSM network then I think they can probably pinpoint
> >your location down to 2 possible locations within a few meters
> >due to the digital timing involved with the very precise spread
> >spectrum radio. Or maybe your actual location within a meter or 2.
it is a GSM network, however, I doubt that they try to know more than
just the cell you're in... but you never know
[snip]
> >Imagine Mr.Drug Dealer turns up to court and watches as the jury is
> >presented with a floorplan on screen and an animated pinpoint of his
> >phones position while a recording of his conversation is played in sync?
yes... except that everybody but Mr.Drug Dealer use these mobile
phones (marketed under the name "Natel-D"). In switzerland, you can
buy GSM phones that works with prepaid cards. No trace, no name. The
location can still be pinpointed, but nobody know who's owning the
phone. This is called "Natel Easy" (what a name). It cost much more,
but depending on the business you're conducting, it's not a problem...
To conclude: everybody is watched, except Mr.DD...
> >The world just about, has no idea!
> >To say big brother is watching is a gross understatement. :)
this is the problem in switzerland. When I first heard about this
story (and believe me, it's not the only one of that kind... it's
not even the worse), I tried to ask people around me to see what
they think about this, and I was amazed by their reaction. "There
is no problem, I'm not doing anything wrong." The media are
beginning to relate this kind of facts, but the people are still
incredibly naive.
One more thing we can say about this story: Switzerland's telecom
market is now free (since 1.1.98), and this story may give some
people (altough I'm not sure...) a reason to change their telco
(when possible).
Another fact of the 1997 year in switerland:
the largest retailer in switzerland (Migros http://www.migros.ch)
launched the M-Cumulus card. Each time you buy something by Migros,
you can present this card and get a 1% rebate (wow...) and you may
also get special rebate "tailored to your needs". But, to get this
card, you have to sign an agreement that allows Migros to record
what you buys. On the 20th november 1997, 1.6mio of citizen were
in the database (about 1/4th of the swiss population). When requesting
this card, you also provide the name and date of birth of each
in the household (you're not forced to do so, but 97% of the
M-Cumulus owners filled this information).
(source: partially "Le Nouveau Quotidien", 20th nov 1997)
The federal government was supposed to issue a warning. If a warning
was issued, I may have been sleeping at that time...
Swiss Federal Data Protection Commissioner: http://www.edsb.ch/
mostly empty... not a word about these 2 stories. you see how the
swiss people are informed...
alex
From rp at rpini.com Fri Jan 2 14:56:30 1998
From: rp at rpini.com (Remo Pini)
Date: Sat, 3 Jan 1998 06:56:30 +0800
Subject: Location Escrow anyone ?
In-Reply-To:
Message-ID: <3.0.2.32.19980102234524.00977740@linux>
At 22:24 02.01.98 +0100, you wrote:
>
>Pearson Shane wrote:
>>
>> Hello all,
>>
>> >> "Swisscom has stored data on the movements of more than a million mobile
>> >> phone users. It can call up the location of all its mobile
subscribers down
>> >> to a few hundred meters and going back at least half a year," the paper
>> >> reported.
>> >
>> >They probably say a few hundred meters so the people don't feel
>> >their privacy is too ridiculously invaded / soften the blow.
>> >
>> >If this is a GSM network then I think they can probably pinpoint
>> >your location down to 2 possible locations within a few meters
>> >due to the digital timing involved with the very precise spread
>> >spectrum radio. Or maybe your actual location within a meter or 2.
>
>it is a GSM network, however, I doubt that they try to know more than
>just the cell you're in... but you never know
They can't really (the cell relay equipment is not up to the task).
>> >Imagine Mr.Drug Dealer turns up to court and watches as the jury is
>> >presented with a floorplan on screen and an animated pinpoint of his
>> >phones position while a recording of his conversation is played in sync?
>
>yes... except that everybody but Mr.Drug Dealer use these mobile
>phones (marketed under the name "Natel-D"). In switzerland, you can
>buy GSM phones that works with prepaid cards. No trace, no name. The
>location can still be pinpointed, but nobody know who's owning the
>phone. This is called "Natel Easy" (what a name). It cost much more,
>but depending on the business you're conducting, it's not a problem...
>
>To conclude: everybody is watched, except Mr.DD...
>
>> >The world just about, has no idea!
>> >To say big brother is watching is a gross understatement. :)
>
>this is the problem in switzerland. When I first heard about this
>story (and believe me, it's not the only one of that kind... it's
>not even the worse), I tried to ask people around me to see what
>they think about this, and I was amazed by their reaction. "There
>is no problem, I'm not doing anything wrong." The media are
>beginning to relate this kind of facts, but the people are still
>incredibly naive.
You should have asked me instead :), I'm a bit more paranoid than most.
(Yes, I most certainly don't have a Cumulus card and I have a Natel D-Easy
for
fun.)
>One more thing we can say about this story: Switzerland's telecom
>market is now free (since 1.1.98), and this story may give some
>people (altough I'm not sure...) a reason to change their telco
>(when possible).
Until somewhen in 1999 you can only do international calls through alternate
carriers (only Swisscom has access to the home so far, unless these cable
operators
really get serious, which they won't, because Swisscom owns more then 30%
of their
stock) and you have to prepend a 5 digit number to do a call until autumn
(I don't think
people without a pbx that can be programmed to automatically do that will
switch carriers).
>Another fact of the 1997 year in switerland:
>
>the largest retailer in switzerland (Migros http://www.migros.ch)
>launched the M-Cumulus card. Each time you buy something by Migros,
>you can present this card and get a 1% rebate (wow...) and you may
>also get special rebate "tailored to your needs". But, to get this
>card, you have to sign an agreement that allows Migros to record
>what you buys. On the 20th november 1997, 1.6mio of citizen were
>in the database (about 1/4th of the swiss population). When requesting
>this card, you also provide the name and date of birth of each
>in the household (you're not forced to do so, but 97% of the
>M-Cumulus owners filled this information).
> (source: partially "Le Nouveau Quotidien", 20th nov 1997)
It is a bit worrying, but on the other hand, I don't consider my shopping
list a
very personal thing, after all, hardly anyone (except Monty Python) gets
killed by
a banana.
>The federal government was supposed to issue a warning. If a warning
>was issued, I may have been sleeping at that time...
Well, I guess everybody was...
>Swiss Federal Data Protection Commissioner: http://www.edsb.ch/
>mostly empty... not a word about these 2 stories. you see how the
>swiss people are informed...
Now this guy (Odilo Guntern) seems to have no clue about anything...
Wanna get more paranoid? Some companies log all Internet traffic of their
employees
that passes through their proxy (which you have to use for anything to
work) for
some weeks (Weren't you the one chatting on #really-naughty-bits for more
than 1
hour on Monday??).
And of course, phonenumbers you call in your company are logged, too.
See you,
Remo
-----------------------------------------------------
Fate favors the prepared mind. (from "Under Siege 3")
-----------------------------------------------------
Remo Pini T: +41 1 350 28 88
Pini Computer Trading N: +41 79 216 15 51
http://www.rpini.com/ E: rp at rpini.com
key: http://www.rpini.com/crypto/remopini.asc
-----------------------------------------------------
From rah at shipwright.com Sat Jan 3 07:40:23 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Sat, 3 Jan 1998 07:40:23 -0800 (PST)
Subject: E-Cash cost advantage acknowledged
Message-ID:
Remember all the stuff I say about the markedly reduced costs of digital
bearer transactions?
Wanna bet that if a bunch of big bankers say the cost reduction one order
of magnitude, given Moore's Law and a little programming elbow grease, we
can bring it down to three?
Cheers,
Bob Hettinga
--- begin forwarded text
X-Sender: schear at mail.lvdi.net (Unverified)
Mime-Version: 1.0
Date: Fri, 2 Jan 1998 23:01:06 -0800
To: rah at shipwright.com
From: Steve Schear
Subject: E-Cash cost advantage acknowledged
The vast cost advantages of e-cash transactions was acknowledged in a
Banking Industry Technology Secretariat (BITS) paper presented at last
year's Electronic Payment Forum meeting in Hilton Head, SC on July 17-18,
1997.
http://www.epf.net/PrevMtngs/July97Mtng/Presentations/Schutzer/index.htm
BITS, a Division of The Bankers Roundtable, members are the 125 largest
U.S. holding companies represent 70% of financial assets and deposits in
the United States and employ over 1 million people.
Projections provided by Salomon Brothers, Nilson Report, Financial
Institutions and Markets, and Boston Consulting Group, show e-cash
transaction costs easily outdistance ACH/EFT by a factor of 10. Credit
cards will be about 40 times as costly. Even the highly touted ECP
(Electronic Check Payment) approaches are likely to be 20 times as
expensive.
What is most interesting is that despite this acknowledgement almost all
the BITS member institutions are pursuing a path away from e-cash and
second place EFT embracing higher margin (and higher merchant/consumer
cost) alternatives, for example VISACash (cash in name only). In fact,
many major banks see EFT/POS (and e-cash) is a threat to their franchises
and have moved to keep them from expansion through non-competitive
practices and regulatory pressure.
--Steve
PGP mail preferred, see http://www.pgp.com and
http://web.mit.edu/network/pgp.html
RSA fingerprint: FE90 1A95 9DEA 8D61 812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------
Steve Schear | tel: (702) 658-2654
CEO | fax: (702) 658-2673
First ECache Corporation |
7075 West Gowan Road |
Suite 2148 |
Las Vegas, NV 89129 | Internet: schear at lvdi.net
---------------------------------------------------------------------
I know not what course others may take; but as for me,
give me ECache or give me debt!
"It's your Cache�"
--- end forwarded text
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!:
From emc at wire.insync.net Fri Jan 2 16:51:47 1998
From: emc at wire.insync.net (Eric Cordian)
Date: Sat, 3 Jan 1998 08:51:47 +0800
Subject: [Humor] Kennedy's New Legislation
Message-ID: <199801030048.SAA02365@wire.insync.net>
Something amusing from alt.true-crime with definite crypto parallels
to certain Swinestein and Freeh initiatives. It is rare to find
material that rises to the Toto level of comedy on Usenet.
-----
Newsgroups: alt.true-crime
Subject: Kennedy Death Spurs Legislative Initiative
Date: Fri, 02 Jan 1998 22:44:03 GMT
Message-ID: <68jrg6$eil at dfw-ixnews6.ix.netcom.com>
BOSTON, Mass. (AP) - Sen. Ted Kennedy announced here today that he
will introduce a bill limiting access to skis and ski poles. The
"Winter Sports Safety Bill" is believed to be a reaction to the recent
death of the Senator's nephew Michael Kennedy in a skiing accident.
"When skis were invented, they were made out of wood," Kennedy said.
"Today's skis are simply to powerful and dangerous to be in the hands
of people. There is no constitutional right to skiing. We feel that
people will have to sacrifice some of their freedoms for the
protection of society as a whole."
One provision will license all dealers in skis. These licenses will
involve fingerprinting, background checks, body cavity searches, and
photographs of anybody wishing to be in the business of selling skis
and ski poles.
Another section of the bill bans any ski pole under 36" in length and
any ski which is not at least 48" in length.
The bill also addresses ski wax. Studies have shown that some waxes
actually make the skis go faster, creating a greater danger of death
to the skier. Skiers also use the faster skis to outrun the ski
patrol, which is not an acceptable practice.
A five day waiting period will be required for all ski and ski pole
sales. People will be required to provide their social security
number and floor plan of their homes before being permitted to
purchase skis.
"There are simply too many people getting excited about skiing. Easy
access to skis is the major reason people get killed on those things.
They should have to wait before they can pick up their skis. I am sure
that this 'cooling off period' will save lives," Kennedy said.
Another bill has been introduced that will ban 'ski carrying devices'
on tops of cars that have a capacity of greater than ten skis.
"There is simply no reason why anybody needs more than ten skis. You
can't ski on more than two at the same time. People with more than ten
skis are simply up to no good," said Kennedy.
Statistics quoted by the Center for Disease Control show that skiing
was second only to drowning as the leading cause of death for people
close to the Kennedy family.
OTHER RELATED STORIES:
- Ted Kennedy Denies Driving Michael to Aspen.
- Study Links Skiing to Suicides.
- Clinton Calls for Restrictions on "Cop Killer" Ski Poles.
- Washington DC to Buy Back Skis for $2 Each.
- Dianne Feinstein Vows Defeat for the National Skiing Association.
--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
From loki at infonex.com Fri Jan 2 17:19:12 1998
From: loki at infonex.com (Lance Cottrell)
Date: Sat, 3 Jan 1998 09:19:12 +0800
Subject: FCPUNX:Anonymous IRC (was 'Cypherpunks IRC Christmas EveParty')
In-Reply-To: <199712312112.QAA07345@beast.brainlink.com>
Message-ID:
At 1:32 AM +0000 12/31/97, wayne clerke wrote:
>On Tuesday, December 30, 1997 7:56 AM, Mark Hedges
>[SMTP:hedges at rigel.cyberpass.net] wrote:
>>
>>
>> We found IRC users to be so involved in petty information wars --
>> ping floods, malicious prank hacking, and the like -- that we directed
>> policy against use of IRC from the anonymous shell accounts at CyberPass.
>>
>> If IRC users weren't so easily lulled by the tempation to crash a server
>> or run malicious bots or just plain irritate other people for fun, and
>> if they would gang up and kick out people who did that, then perhaps we'd
>> switch that back on.
>>
>> They were just too much overhead. Everyone else seems pretty nice, really,
>> as far as the system goes. They're all self-interested in keeping the
>> anonymous publishing and so on going, so the peace keeps itself.
>
>
>What's the reason behind the policy direction against the use of personal web
>proxies running in a (paid for) shell account?
>Seems like less risk than you already accept anyway. Something I've missed?
>
System load is the issue in this case. If a proxy becomes publicly known
the load it imposes on the system could quickly become gigantic. In
addition we found that people were setting up proxies on any old port,
sometimes causing all kinds of conflicts.
Our accounts are priced assuming light personal usage. Running servers on
our systems is negotiable.
-Lance
----------------------------------------------------------
Lance Cottrell loki at infonex.com
PGP 2.6 key available by finger or server.
http://www.infonex.com/~loki/
"Love is a snowmobile racing across the tundra. Suddenly
it flips over, pinning you underneath. At night the ice
weasels come."
--Nietzsche
----------------------------------------------------------
From tcmay at got.net Fri Jan 2 17:21:05 1998
From: tcmay at got.net (Tim May)
Date: Sat, 3 Jan 1998 09:21:05 +0800
Subject: [Humor] Kennedy's New Legislation
In-Reply-To: <199801030048.SAA02365@wire.insync.net>
Message-ID:
At 4:48 PM -0800 1/2/98, Eric Cordian wrote:
>Newsgroups: alt.true-crime
>Subject: Kennedy Death Spurs Legislative Initiative
>Date: Fri, 02 Jan 1998 22:44:03 GMT
>Message-ID: <68jrg6$eil at dfw-ixnews6.ix.netcom.com>
>
>BOSTON, Mass. (AP) - Sen. Ted Kennedy announced here today that he
>will introduce a bill limiting access to skis and ski poles. The
>"Winter Sports Safety Bill" is believed to be a reaction to the recent
>death of the Senator's nephew Michael Kennedy in a skiing accident.
...
And on a more serious note, one thing this affair shows is that once again,
the Kennedy clan (KC) lives by different rules. Whether it's Edward
Kennedy getting off in the Mary Jo Kopechne case, when any of us would have
likely been charged with a) drunk driving, b) leaving the scene, c) lying
in an investigation, or whether it's this very same Michael Kennedy getting
off with his underage babysitter....
(Why was he not charged with statutory rape? Because the KC got to the
babysitter and, it is widely reported, bought her off. So why was the
_criminal_ charge of statutory rape not still applied? Because the
babysitter wouldn't testify.)
And so on, over and over again.
Wanna bet that if I was on the hill in Aspen horsing around playing ski
football and behaving like a drunken lout with a bunch of other people the
ski patrol would whistle us down and tell us to knock it off?
Justice has always been for sale in America. But with tens of thousands of
new laws, the effects are just becoming more obvious.
I say the death of Michael Kennedy, as with the death of Princess Di, was
just an example of evolution in action. (An imperfect example, of course,
as Di had already been bred.)
Regrettably, this satire about the Safe Slopes and Children's Protection
Act of 1998 is on the mark. Clueless bimbos like Swinestein, who's never
passed up a chance to make another law, will be jockeying for regulation of
the ski slopes...even as the Kennedy Clan remains exempt.
--Tim May
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From ruemou32 at cc1.kuleuven.ac.be Sat Jan 3 09:23:44 1998
From: ruemou32 at cc1.kuleuven.ac.be (Floodgate)
Date: Sat, 3 Jan 1998 09:23:44 -0800 (PST)
Subject: Bulk Email For Profit
Message-ID: <199801031623UAA45320@post.ast.cam.ac.uk>
******************************************************
MAIL THOUSANDS OF EMAIL MESSAGES
PER HOUR - NO KIDDING !!
SEND YOUR EMAIL MESSAGES OUT, AT
1,000's MESSAGES / HOUR (28.8K modem)
YES, 1,000's Of Messages An Hour
******************************************************
MILLIONS OF EMAIL ADDRESSES
******** $100.00 *******
******************************************************
YOU'LL RECEIVE 2 HIGH-SPEED EMAIL SOFTWARE PROGRAMS
Introducing...."FLOODGATE BULK EMAIL LOADER"
AND...."GOLDRUSH STEALTH MASS MAILER"
This is the same software that all bulk emailing services use!
*******************************************************
ALSO AVAILABLE - - - - RESELL RIGHTS
- - - - - - - - - - - - - - - - - - - - -
YOU CAN NOW RESELL THIS UNIQUE
EMAILING SOFTWARE AND EARN
$100.00 PER SALE
AND NEVER DO ANY TECH SUPPORT
WE'LL DO IT FOR YOUR CUSTOMERS
----------------------------------------------------------------------------------------
Floodgate Bulk Email Loader Version 6.0 AND
Goldrush Stealth Mass Mailer Version 3.215
for Windows 95 and Windows 3.1 now Supports 17
(really more with the free form filter) File Formats
------------------------------------------------------------------------------------------
SEND OUT 20,000+ MARKETING LETTERS EVERY SINGLE DAY!
Or...every few days. In fact, when I send out just a few thousand marketing letters each day, it doesn't take long before I'm completely swamped with email inquiries and phone calls. This is very easy to do. And each one of these bulk mailings costs me nothing. I can teach you how to do this and provide you with the tools you'll need.
If you've got a good marketing letter, I'll show you how to open the floodgates. You'll be deluged with inquiries, leads, and real sales, using nothing but email alone.
Writing a good marketing letter is not easy. I often have to rewrite my marketing letters a half dozen times before I get the results I'm looking for. But once you have a good letter, as you probably know, you can use the same letter over and over again, predictably and consistently, closing sales, week after week, month after month.
It takes me about one hour to send my marketing letter to THOUSANDS of fresh email addresses. I can do this, thanks to a Windows program I use. It's called Floodgate and Goldrush Stealth Mass Mailer. It's a bulk email loader and an email software program. If you're interested in electronic marketing, you should know about these programs.
PROGRAM #1: FLOODGATE FOR WINDOWS
The Floodgate Bulk Email Loader imports simple text files that anyone can download from CompuServe, Prodigy, Delphi Genie, or the Internet. These text files contain classified ads, forum messages, or data from the member directory. Each of these files is filled with email addresses.
Floodgate is designed to read these files and strip out the email addresses. It then sorts the addresses, removes any duplicates, and formats them into an output file, with 10, 20 or 30 addresses per line. This is all done in one simple step. Just point and click.
You'll need either a Windows based Internet account or an America On-line account to send out your marketing letters. Neither AOL nor the Internet charges to send email. Send your letter to 1,000 people or 10,000 people -- the cost is always the same. NOTHING!
NEW! PREPARE A MAILING OF 50,000+
IN LESS THAN A 1/2 HOUR
If you open an Internet account, you can send each letter to 20,000+ people. The new Floodgate now directly writes distribution lists. Some people are always collecting new addresses, but if you publish a newsletter or adsheet, you'll be using the same addresses over and over again. That's real power! When using addresses you've previously collected, you can press a few buttons and prepare a mailing of 50,000+ in less than a half hour.
(To get a list of all the Internet access providers in your local calling area goto: http://thelist.com and click on your area code.)
The Floodgate Users Guide will teach you, step by step, how to download the right files, how to strip the addresses, and finally, how to cut and paste the formatted addresses into your marketing letter. Or, if you have an Internet account, how to create distribution lists. One you've done this a few times you won't even have to think. It's that simple!
FOR THE BRAVE & DARING: PUSHING TECHNOLOGY TO ITS LIMITS
As you may know, the practice of sending unsolicited email is usually frowned upon, and most service providers have rules against it. But, like jay-walking, there is little enforcement. It's not illegal. If someone tells you that it is, ask them to provide the citation (and don't let them give you some nonsense about faxes - that's not email). They can't do it because it's not there. Sometimes, when a lot of people complain, I get a warning letter. And that's about it.
About 1 in 200 will write back and tell me, "take me off the list", which I can do, thanks to Floodgates Remove List feature. Many people reply back thanking me for sending them my informative letter. That's always nice. Most people though, just reply and say, "send me more info." In this way, it usually takes me two or three letters to close a sale.
The Floodgate Users Guide will provide you with proven formats for writing a successful marketing letter. You'll test and rewrite, test and rewrite. Then, once you've got it, just push a few buttons, and open the floodgates!!!
THE FLOODGATE BULK EMAIL LOADER CURRENTLY SUPPORTS 17+ FILE FORMATS
1. CompuServe Classifieds: Send your marketing letter to everyone who is running a classified ad. I'll teach you how to download all the classifieds from any single ad category. This is one of the most responsive list of buyers. They check their email every day and they're already in business.
2. America On-line Classifieds: Download 1,000 addresses in 15 minutes. These are excellent lists for business to business sales.
3. CompuServe Forums: You can join a forum and download hundreds of forum messages in a matter of minutes.
4. America On-line Forums: Choose from dozens of forums. All good targeted lists.
5. Prodigy Forums: Prodigy allows you to easily export any group of forum messages. More targeted lists.
6. Internet Newsgroups: These are all targeted lists. You'll be able to send your marketing letter to everyone who posts a message in any newsgroup. Easily collect 1,000's of addresses per hour.
7. America On-line Member Directory: Most member directories only allow you to search by city and state. With AOL, you can search by business type, hobbies, computer type, etc. This is the gem of all
member directories. Build huge targeted lists.
8. CompuServe Member Directory: This is a major resource. If you're willing to target your mailing to a single city, you can collect about 1,000 email addresses an hour.
9. Delphi Member Directory: The Delphi member directory allows you to search for people based on key words. These are good targeted mailing lists. A single search can easily generate 5,000 addresses.
10. Genie Member Directory: Similar to the CompuServe member directory, only you can download names much quicker. You can easily pull hundreds of thousands of addresses out of each of these member directories.
11. CompuServe File Cabinet: If you run classified ads, and save the responses in the CIM file cabinet, you'll be able to easily reuse these addresses. You can send your marketing letter to everyone in any single folder. Build master lists and clean UP your hard drive.
12. Free Form: If you have a text file with email addresses that floodgate does not support, chances are the Free Form filter will be just what you need. Just enter a key word to search for.
13. CompuServe Form Profiles (Forum Membership Directories): Easy to build targeted lists here. Each search can easily bring you 500+
addresses.
14. Genie Profiles: If you're building targeted lists, you'll get a lot of addresses very quickly from Genie.
15. Plain Addresses: Read Floodgate Master Files back into Floodgate to merge files and do selective mailings. Also useful for the management of email address lists that you might purchase.
Floodgate also has filters to allow you to include or exclude any groups of addresses in your final distribution lists. For example, you could include only email addresses that ended in .com or exclude all with .gov. You could exclude all noc, root, and other addresses that almost guarantee a negative response. These filters are fully configurable and can be used together.
BUILD REUSABLE MASTER FILES
Floodgate maintains Master Files for each of your marketing letters. If you download from the same place on a regular basis, you only want to send your letter to the new people. Floodgate will compare the new addresses with those in the Master File, and prepare a mailing list of only new people. The new addresses are, of course, then added to the Master File. With each new mailing your Master File grows and grows.
You may create as many Master Lists as you need. When you start a new marketing campaign, you'll want to send your new letter to everyone on your Master List. If you write a newsletter, each time you send your newsletter, you'll send it to everyone on a Master List.
THE REMOVE LIST
Very often, people will reply and tell you to take them off your mailing list. Place these addresses in the REMOVE.MST file and they will never receive another letter from you again. In this way, you will be operating your business with the most professionalism
possible.
DON'T BE FOOLED
We have some new competitors that have tried to copy Floodgate. The following list describes why Floodgate is BETTER.......
**Floodgate is a mature, bug free product. Not an initial release.
**Floodgate comes with over 100 pages of step by step documentation.
**Floodgate is the only one offering a money back guarantee.
**Floodgate has more testimonials.
**Filter for filter, Floodgate offers more capabilities, way more.
**Floodgate does everything all the others *combined* claim.
**Floodgate is by far the easiest to use.
**There is NO *cutting and pasting* with Floodgate.
**We have by far, the BEST technical support.
SOME QUICK MATH
Floodgate can pay for itself in a few days. It can also cut your advertising costs down to almost nothing. Think of what the competition will do when they get their Floodgate program. Don't be left in the dust - there are 75 million people out there, just a few keystrokes away. Let's do the math:
- Email 50,000 sales letters (takes about 1-2 hours)
- Let's say your product will bring you $5 profit per sale.
- Let's also say you only get a 1% response(occasionally higher).
* That's 500 orders x $5 = $2,500 profit !! Now imagine what 500,000 letters would do for your business !!
WHAT CAN I MARKET ON-LINE?
You can market anything on-line using direct email, that can be marketed using conventional postal direct mail marketing. The possibilities are practically endless. If it sells off-line, you can sell it on-line.
EASY TO INSTALL AND EASY TO LEARN
The Floodgate Email Loader requires Windows. The SUPPLIED MANUAL tells you where to go, what to do, and how to do it. All you need are basic computer skills that can be learned with a little practice or help from our computer savvy technicians.
PROGRAM #2: GOLDRUSH STEALTH MASS MAILER
Do not get this program confused with other slow speed programs that call themselves "STEALTH". This program is the only one in the world that can send email out at HIGH SPEEDS with one single connection to the internet.
This is NEW, Cutting Edge Email Technology. First Of It's Kind.. The Most Powerful BULK EMAIL SENDER In The World.. NOTHING CAN EVEN COME CLOSE!
Thanks to our top programmer's, this technology is NOW available and we are the only place you can get it from!
*ONLY "ONE" DIAL-UP OR ISDN CONNECTION NEEDED.
*NO MORE TERMINATED CONNECTIONS.
*NO MORE WAITING TO SEND LARGE AMOUNTS OF EMAIL.
*IMMEDIATE RESPONSE TO YOUR MASS MAILINGS.
*YOU WILL HAVE ALL THE CONTROL AND CONFIDENCE OF
SENDING EMAIL THE WAY IT SHOULD BE SENT... IN HUGE AMOUNTS!
*SEND YOUR WHOLE LIST IN ONE DAY, WHETHER IT BE 500,000
OR 5 MILLION - AND JUST SIT BACK AND WAIT FOR YOUR
ORDERS TO POUR IN.
*NO MORE DOWNLOADING UNDELIVERABLE NAMES.
Bulk Emailer's Dream Come True!!! - >>>GOLDRUSH STEALTH MASS MAILER<<<
Connect to multiple mail servers (20 or more), make multiple connections to a single server or any combination of the two ( All Simultaneously ) with one single dial-up connection.
SEND MULTIPLE SIMULTANEOUS MAILINGS...
View complete details about your mailings. Shows each server your connected to, the status of that connection, how many messages are going out through that connection, etc...
We show you ALL the tricks all the mass e-mailers don't want you to know...
Here are just a few features the GOLDRUSH STEALTH MASS MAILER offers to you...
*Forge the Header - Message ID - ISP's will Spin their wheels.
*Add's a Bogus Authenticated Sender to the Header.
*Add's a complete bogus Received From / Received By line with
real time / date stamp and recipient to the Header.
*Does NOT require a valid POP Account be entered in order to
send your mailings.
*Easy to use and operate
*Plus much more!
All this, at speeds of up to 1,000's messages/hour
(28.8k modem).
SPECIAL INTRODUCTORY PRICE...
NOW YOU CAN HAVE BOTH THE FLOODGATE AND
GOLDRUSH STEALTH MASS MAILER FOR JUST $499.00!
UPDATE ... SAVE $149.05 AND ORDER NOW, BE ONE OF THE FIRST 100 ORDERS!
Step up to the plate and play with the big boys TODAY and receive the COMPLETE 2 SOFTWARE PACKAGE for the unbelievably low price of ONLY $349.95!
(Other bulk email software has sold for as much as $2,500 and can't even come close to the cutting edge technology of EASE, ACCURACY AND SPEED ... SPEED ... SPEED!)
Try the Goldrush Stealth Mass Mailer & Floodgate Bulk Email Loader for 10 days FREE.
And receive UNLIMITED technical support for 30 days.
**************************************************************
MILLIONS OF EMAIL ADDRESSES
MILLIONS AND MILLIONS OF EMAIL ADDRESSES
CD with MILLIONS of email addresses separated by domain name.
All addresses are simple text format one per line. Addresses
from the following domains: Pipleline, MSN, MCI, Juno, Delphi,
Genie, AOL, Compuserve, Internet, .com & .net, MILLIONS OF THEM!
Not available on diskette or download.
===> WANT THE MILLIONS OF ADDRESSES FOR $100.00? <===
Just buy our Floodgate / Goldrush software package (with ALL
the bonuses INCLUDED), and the MILLIONS of addresses are yours
for just $100.00 additional.
These addresses will be delivered to you in simple text files
that any bulk emailing program can use, on CD Rom. With this CD,
YOU CAN BEGIN MAKING MONEY IMMEDIATELY!!!
***************************************************************
***SPECIAL BONUS #1:*** STOP Losing ISP Dial Up Accounts!
If you order The FLOODGATE / GOLDRUSH software within the next 5 days - When you receive your program, you will also receive:
*Complete instructions on "how to keep your dial up account from showing up in the header", plus everything you will need to get started doing this.
IMPORTANT NOTICE! We will initially only be offering 100 copies of the program for sale, First come / First Served basis only. We are doing this because of the extreme power that these programs offer.
***SPECIAL BONUS #2***
When you receive your two programs, you will also receive:
OVER 250 REPRINT AND RESELL RIGHTS REPORTS YOU CAN START TO MARKET
AND MAKE MONEY IMMEDIATELY!!!
These HOT sellers include:
1) How to Get a Top Rating in the Search Engines
2) 70 Money Making Reports
3) 75 MONEY MAKING PLANS & TRADE SECRETS and MUCH MUCH MORE!!!
($200 RETAIL VALUE - FREE!!!)
***SPECIAL BONUS #3***
With your two software programs, you will also receive our NEW "Address Grabber" utility program that enables you to grab 100's of THOUSANDS of email addresses from
newsgroups in minutes ($100 RETAIL VALUE - FREE).
***SPECIAL BONUS #4***
RECEIVE CHECKS BY EMAIL, PHONE OR FAX MACHINE. With this software
program, you can receive payment for your product or service INSTANTLY!!
There is no more waiting for your customers chec to arrive. This
software will no doubt, add to your sales, for customers who
don't have credit cards, as well as the impulse buyers.
With this software, you can print up your payments as soon as your
customer gives you his/her checking information. You will then
add the information given, to the proper blank check spaces, then
just print and go to the bank!!
***************************************************
To get your FREE demo and "test drive" our state-of-the-art software,
visit our web site at:
http://www.t-1net.com/floodgate
****************************************************
HURRY ... RESERVE YOURS TODAY!
So, if you are interested in taking advantage of the most powerful bulk
email software in the world and start making money hand over fist.....
Print out the EZ ORDER form below and FAX or MAIL it to our office.
If you have any questions don't hesitate to call us at: 1-954-784-0312
SYSTEM REQUIREMENTS
386 or larger
Windows 95 OR Windows 3.1 with 8 meg ram
Extra 5 MB hard drive space
Floodgate & Goldrush can be run on a fast Mac with 24 MB RAM and SoftWindows.
NOTES FROM SATISFIED USERS
"It is everything you said it was. Within one week of my first mailing, I received a record number of orders. All you need to print money is a decent sales letter. Thanks." Randy albertson, Wolverine Capital.
"After using Floodgate and your utility program all day today, let me say these are as two of the finest programs I have ever bought in my 52 years! Your support has been superb. Thank You!" Vernon Hale, Prime Data Systems
"My first day and I just used Floodgate and Pegasus to send 1,469 sales letters. So far I've got about 25 positive responses. It works GREAT!!! Thanks." Donald Prior
"Floodgate is awesome!. I recently started a new business on-line. I stripped the addresses of the AOL & CIS classifieds. I sent out 3,497 email letters and got over 400 people to join my company in 5 days! Needless to say, it pays for itself." David Sheeham, OMPD
"I was able to use Floodgate to extract the names from the Internet news groups. It works perfectly. Needless to say, I am very excited about the use of this new technology." Mark Eberra, Inside Connections
"This is a great piece of software and an invaluable marketing tool." Joe Kuhn, The Millennium Group
"I just thought you'd like to know that this program is fantastic. After loading it on my system, I wanted to test it out. In my first hour of using this, I collected 6,092 email addresses!" Richard Kahn, LD Communications
"I just love the Floodgate program. It saves me hours and hours of time. This is the beginning of a wonderful FUN time marketing on-line. Thank you so much for writing this program." Beth O'Neill, Eudora, KS
"Your software is brilliant, and from the technical support I've received, I can see you have a genuine love and respect of people...Floodgate is a divine package. Wish I had found it sooner." Tom Sanders, Peoria, IL
"I really like the way the Floodgate software package works. It is very easy to use, and really does the trick. It has already saved me an incredible amount of time and energy." John Berning, Jr., Fairfield, NJ
"It's going great with FLOODGATE! I like using Delphi. I just collected 50,000+ addresses within 20 minutes on-line." Richard Kahn, R&B Associates
-------------------------------------------------
E-Z ORDER FORM:
Please print out this order form and fill in the blanks......
Please send order form and check or money order, payable to:
Dave Mustachi
P.O. Box 772261
Coral Springs, FL 33077-2261
(954) 784-0312
______Yes! I would like to try your cutting-edge software so that I can advertise my business to thousands of people on-line whenever I like! I understand that I have 10 days to trial the software. If I am not fully delighted, I will cheerfully be refunded the purchase price, no questions asked! Please rush me the FLOODGATE and GOLDRUSH package now!
______I am ordering within 72 hours! That qualifies me to receive the FLOODGATE and GOLDRUSH package at a substantial discount! I am ordering BOTH software packages for only $349.95. (Save $150 off the retail price....Software has sold for as much as $2,499.95)
______I am ordering within 72 hours! That qualifies me to receive UNLIMITED technical support for 30 days.
______I want to receive the package OVERNIGHT. I'm including $18.00 for shipping charges.
______I want to receive the package 2nd DAY. I'm including $10.00 (includes insurance & return receipt) for shipping charges.
______I'm ordering Floodgate / Goldrush software and want to order the MILLIONS of email addresses as well. My additional cost is $100.00 enclosed.
______I'm NOT ordering your Floodgate / Goldrush software, but I
want to order your MILLIONS of email addresses on CD. Enclosed is $249.00.
______I'm interested in reselling this unique software package, and earning $100.00
per sale. I understand YOU will be the technician for MY customers. Send me further
information. (You MUST purchase this program in order to be a reseller for the
Floodgate / Goldrush software package).
(CHECKS: ALLOW 1 WEEK FOR BANK CLEARANCE)
YOUR NAME_________________________________________________
COMPANY NAME_________________________________________________
YOUR POSITION_____________________________________________
STREET ADDRESS______________________________________________
CITY, STATE, ZIP____________________________________________
PHONE NUMBERS_______________________________________________
FAX NUMBERS_________________________________________________
EMAIL ADDRESSES_____________________________________________
************************************************************
We accept Checks, Money Orders, MasterCard, Visa,
American Express. You can either mail your order to
us OR fax your order to:
954-572-5837
************************************************************
Today's date:_____________
Visa____MasterCard____American Express____Discover_______
Card #:____________________________________________________
Expiration date:___________________________________________
Name on card:______________________________________________
Billing address:___________________________________________
Amount to be charged: $________________
Signature:___________________________________________
I agree to pay Dave Mustachi an additional $29 fee if my check is returned for insufficient or uncollectable funds.
SIGNATURE: X________________________________DATE:_______________
Please send all order forms and check or money order to payable to:
Dave Mustachi
P.O. Box 772261
Coral Springs, FL 33077
(954) 784-0312
***************************************************
OR:
PLEASE PASTE YOUR CHECK HERE
(If you fax a check, there is no need for you to send the original check by mail. We will draft up a new check, with the exact information from your original check that you faxed to us)
Please fax the above order form and check to: 1-954-572-58
From ravage at ssz.com Fri Jan 2 18:14:55 1998
From: ravage at ssz.com (Jim Choate)
Date: Sat, 3 Jan 1998 10:14:55 +0800
Subject: Creative Justice?... [CNN] (fwd)
Message-ID: <199801030233.UAA16300@einstein.ssz.com>
Forwarded message:
>From ravage at ssz.com Fri Jan 2 20:33:21 1998
From: Jim Choate
Message-Id: <199801030233.UAA16279 at einstein.ssz.com>
Subject: Creative Justice?... [CNN]
To: users at ssz.com (SSZ User Mail List)
Date: Fri, 2 Jan 1998 20:33:15 -0600 (CST)
Cc: friends at ssz.com (Ravage's Friends)
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Content-Length: 2327
Forwarded message:
> DRUNKEN DRIVER ORDERED CLOSER TO LIQUOR STORE
>
> graphic January 2, 1998
> Web posted at: 8:39 p.m. EST (0139 GMT)
>
> CINCINNATI (Reuters) -- An Ohio judge has ordered a chronic drunken
> driver to move within easy walking distance of a liquor store or
> face jail.
>
> In a sentence meted out on New Year's Eve, Hillsboro Municipal Judge
> James Hapner ordered Dennis Cayse to move within "easy walking
> distance" -- defined as one-half mile or less -- of a liquor store
> within 30 days or face a potential 1-1/2-year jail sentence for
> drunken driving.
>
> It was Cayse's 18th conviction for drunken driving. He was also
> sentenced to spend the first week of each of the next five years in
> jail.
>
> The judge also directed that Cayse, who lost his license years ago
> but continued to drink and drive, be handcuffed to the
> passenger-side door or be seated with someone between him and the
> driver anytime he travels.
>
> University of Cincinnati law professor Christo Lassiter said the
> multiple sentence passed constitutional muster.
>
> "It appears to me that this sentence is neither unconstitutional nor
> inappropriate," Lassiter told Reuters Friday. "It looks to me like
> the judge felt that there was nothing he could do to keep the man
> off the road except to make him move to where he could walk to buy
> his booze."
>
> Hillsboro is a town of 6,000 just east of Cincinnati.
>
> "For as long as I have been associated with law enforcement, I have
> never heard of such an unusual sentence. It's very squirrelly," said
> Lt. Ronald Ward of the Highland County sheriff's office.
>
> "I have known Dennis Cayse a long time and I've never seen him sober
> except when he was in jail," Ward said. "His lifetime record shows
> that if he is not in jail, he's going to drink and drive."
>
> A spokeswoman for Mothers Against Drunk Driving denounced the
> sentence, saying it was too lenient and sends the wrong public
> message.
>
> Copyright 1998 Reuters Limited. All rights reserved.
From comsec at nym.alias.net Fri Jan 2 21:09:08 1998
From: comsec at nym.alias.net (Charlie Comsec)
Date: Sat, 3 Jan 1998 13:09:08 +0800
Subject: Remailer Logs (and Accountability)
In-Reply-To: <199712221346.OAA03091@basement.replay.com>
Message-ID: <19980103050003.766.qmail@nym.alias.net>
-----BEGIN PGP SIGNED MESSAGE-----
usura at sabotage.org (Alex de Joode) wrote:
> : I suspect that if you polled remailer operators you'd find that some
> : keep logs and some don't. I don't know about the Replay remailer. Perhaps
> : Alex DeJoode (the operator of the Replay remailer) would care to comment. Nor
> : can logs necessarily positively identify you. If kept, they would record when
> : your message came in and when the post to usenet went out, but *PROBABLY*
> : would not establish a conclusive link between the two. Many remailers
> : maintain a "reordering pool" where forwarded messages do not necessarily get
> : sent out in the order they were received.
>
> I donnot keep sendmaillogs, I donnot keep remailerlogs and I let
> usenet do my mail2newslogging ... (They can ofcourse always supena
> /dev/null, and then they get everything ..)
Good. No reason to tempt the Big Brother types (and wannabes).
BTW, people outside the remailer operator and user community seem to
assume that logs ARE kept. I'm curious to know how often
individuals, organizations, and maybe even governments make requests
for your logs.
Oh ... also, if you don't mind, can you uuencode your /dev/null and
send it to me?
> The "reordering pool" is
> always a minimum of 5 messages so people can opt for how long their
> message wil be 'stashed' at replay. (use 'Latency: +00:00' for zero latecy).
Is that default reordering pool size the same for Type I and Type II
messages?
Perhaps someone can double-check my math on this. Assuming
equally-sized messages that are otherwise indistinguishable, and a
reordering pool size of five, then the odds of matching up an
encrypted incoming message with an encrypted outgoing message are
one in five.
Thus a message chained through n remailers (each having a reordering
pool size of 5) would be diffused among 5^n possible messages to
thwart potential traffic analysis.
What I'm unclear on is how setting a Latency: flag affects the
diffusion of the output. Is that lattency IN ADDITION to the pool
size of five, or does Latency: +00:00 bypass the reordering process
altogether?
My main concern is the security of chained reply blocks which are
more vulnerable to attack than normal anonymous messages. A single
anonymous message can only be traced BACKWARDS after it's been
received. An anonymous reply, OTOH, could, theoretically, be
"walked" through each remailer in the chain until the identity of
the recipient was discovered. While that process would require
convincing each remailer operator in the chain to cooperate, it's a
lot more feasible than tracing a message backwards to its source.
(Yes, I know about posting to a public message pool, such as a.a.m,
but NG posting seems to be rather unreliable lately.)
- ----
Finger for PGP public key (Key ID=19BE8B0D)
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQEVAwUBNK2wqwbp0h8ZvosNAQFcpwf9GzP5jGSURrVZXu3omQXx9+de1aOHZ+Uk
azgpHRZwStL86ztv1U5RcO7TRQ7gNgEd0+8V+z/wJei82f5zsQPCWVITjHBnUBKL
sbGEFTtlkLfehXgF6oRk4xYzngxekYYFXm3UqZFKf/maQvMCRXbXSfTpb0CejpfQ
01PQGmXrShjdiYO8Uj+UoXzEEyAU383ssnJmsDBbnMvilM3aE5f0GXG/dx3QSvQi
CfRzPFpcgfM4kojv8CxH5xfCvCWzKNgi8lnGuMjNwYApuGrYVtJSReq+OcAe9GeQ
O2e+R9emHWiZHO16asfjnx6Eie7BylGrBRCLPWAAxPo16AtGjhJimw==
=HRSR
-----END PGP SIGNATURE-----
From cash4u at polbox.com Sat Jan 3 15:09:39 1998
From: cash4u at polbox.com (cash4u at polbox.com)
Date: Sat, 3 Jan 1998 15:09:39 -0800 (PST)
Subject: Get into the pay per call industry for FREE
Message-ID: <199801032303.PAA21057@denmark.it.earthlink.net>
Your e-mail address was taken from a post YOU left on a bulletin board or message board. Placing your address on such a medium indicates that you might be willing to receive mail from people who browse the internet. If you do not want receive this type of mailing, you might want to add your address to the remove list at one of the anti-spam web-sites.
=============================================
Hi, I'm sorry to intrude, but I had to share this with as many people as I could!
I have found a company that gives away the use of their pay per call services with no costs or lease for the lines!
I have several 900 lines for different services, and I am making some good coin from them, and now I want to help others get into the pay per call industry too.
The info I have will get you set up with the leading pay per call company in the US, and best of all...THERE ARE NO COSTS OR FEES!!
I am sending this note and asking for a 10.00 donation for the time it took me to find the info and get it to you, anyone willing to part with 10.00 will be a happy soul when they get their first check from their phone line or lines.
===============================================================
PROFITS ARE SOARING!!!
With 900, 800 and 011 Numbers
If you would like to make money while doing nothing...then this is the
business for you.
Programs are ready for you to choose from:
BBS Services
Live Adult 1-on-1 & 2-on-1 (Many Languages, Straight & Gay)
Recorded Fantasy Lines (Many Languages)
Datelines
Chat Lines
Live Psychic
Or create your very own program!
We have over 2000 Men & Women waiting for the phones to ring!!! We provide
24-hour service, answer your calls, and pay all phone company carrying
costs.
All you have to do is advertise! If you have an Internet Site this could
very well become your Primary Source of Income
Remember, the more people see your number, the more they'll call.The more
calls you get, the more money you make.
----------------------------------------------------------------------------
----
There are NO START UP COSTS or MONTHLY FEES with our 800 & 011 NUMBERS!!!!!
----------------------------------------------------------------------------
----
You may choose one of the following programs to start out with:
BBS
Live 1-on-1
Recorded Fantasy
Chat Line
Date Line
Gay 1-on-1
Psychic Line
Horoscope
----------------------------------------------------------------------------
----
To start your own business NOW, send $10.00 cash, certified check,� or money
order along with your e-mail address. I will e-mail all the info you need to get started
earning your dream income.
The $10.00 is the only cost you will ever have and it is just to cover my
time and effort, there will be no charge to set-up and manage your phone
system and you will be able to check your line's stats through a web page.
----------------------------------------------------------------------------
-----
Send your order to;
Rick Kowalski
617 Gateway Road
Winnipeg, Manitoba, Canada
R2K-2X8
NOTE that this is a real address, not a P. O. box. This is not a scam, the
info is free, but I will only send it if my efforts are rewarded.
Have a great day,
Rick
From NLYNCH4401 at aol.com Sat Jan 3 17:15:25 1998
From: NLYNCH4401 at aol.com (NLYNCH4401 at aol.com)
Date: Sat, 3 Jan 1998 17:15:25 -0800 (PST)
Subject: SUZAN, YOUR MAIL
Message-ID: <199801040115.UAA02647@eola.ao.net>
NEW YEARS RESOLUTION ....LOSING WEIGHT AND FEELING GREAT GET IN ON
THE ACTION OF THE NUMBER #1 SELLING PRODUCT IN CANADA AND SOON TO
BE SOLD WORLD WIDE.... IT'S CALLED CALORAD....LOSE WEIGHT AND INCHES
WITHIN JUST A SHORT COUPLE OF WEEKS OR WILL GIVE YOU YOUR MONEY
BACK!!!!!!
CALL 24 HOURS 1-800-669-0203
WANT TO GET A DATE OR OR TALK ABOUT LOSING WEIGHT THEN CALL OUR
NEW AND IMPROVED DATING SERVICE IT'S LIVE IT'S AWESOME!!!!!
CALL 24 HOURS 1-888-232-1992
From dformosa at st.nepean.uws.edu.au Sat Jan 3 03:12:29 1998
From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa})
Date: Sat, 3 Jan 1998 19:12:29 +0800
Subject: Freedom Forum report on the State of the First Amendment
In-Reply-To:
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
On Thu, 1 Jan 1998, Paul Bradley wrote:
[...]
> > Welcome to the 20th Century, moron.
>
> You clearly have no comprehension of the principles of the free market
> and the rights of businesses and individual to hire and fire whoever the
> fuck they like for any reason whatsoever.
My rights to swing my fists end at your noise. When ever you interact
with other peaple your rights are tempered by there rights. Even Adam
Smith recognised that its was gorverments dutie to redress the failing of
the market.
Also recall the free market model assumes that the word is full of totaly
rational pepeale who have full knowige of the market. Any one who has
been on this list knows that these peaple are somewhat uncommen.
- --
Please excuse my spelling as I suffer from agraphia see the url in my header.
Never trust a country with more peaple then sheep. ex-net.scum and proud
You Say To People "Throw Off Your Chains" And They Make New Chains For
Themselves? --Terry Pratchett.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
iQCVAwUBNK4GM6QK0ynCmdStAQFE7AP/Xgnf8xsGsovspmlzG8xRLCBPKAcAco1d
hwUg752OPyjDksq6ZlM4eQNckRAwXWtEVethqJFXk/Wgyl0//f9L5zjSv/f1siAg
uYUpElxwajL23W6AZjMVqhBqIn1daeI7PIlJy1iBfE2151fPuPQ8Ox6XHVbDjqZC
KR/CjYA0uCY=
=3e/G
-----END PGP SIGNATURE-----
From sheriff at speakeasy.org Sat Jan 3 03:46:32 1998
From: sheriff at speakeasy.org (The Sheriff)
Date: Sat, 3 Jan 1998 19:46:32 +0800
Subject: Location Escrow anyone ?
In-Reply-To: <34AD5B24.520C3851@infomaniak.ch>
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
>>it is a GSM network, however, I doubt that they try to know more than
>>just the cell you're in... but you never know
>
>They can't really (the cell relay equipment is not up to the task).
What about the new digital phones?
Best wishes and fresh-roasted peanut taste,
The Sheriff. -- ******
- ---
As kinky as it sounds, finger me to see my PGP key and
confirm the signature attached to this message. Either
that, or head for pgp.ai.mit.edu on the WWW and search
for my e-mail address.
- ---
Any and all SPAM will be met with immediate prosecutory
efforts. Solicitations are NOT welcome here!
- ---
----BEGIN INFLAMATORY BLOCK----
Version: 160 (IQ)
Comments: Definitely one of their greatest misses.
Reporter: "Do you know what Public Enemy is?"
- ---
Citizen: "Public enemy?"
[long pause]
"Probably somebody in office."
-----END INFLAMATORY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0 for non-commercial use
Charset: noconv
iQEVAwUBNK4VhQBMw4+NR29ZAQHBPggAhJ2CnjBM0+5R6gHoWIOktua6OTjRQZK+
RUN6nRF3HezE1ZHrpIx6HO0fSCjyCCO0YUFu7VY66rTQ0FfwP3Czax1965xmKOpw
QN7zvyvcBeiO4Pc2K9RhpwcskYlOFVUwwkoxFOEKEb9TL7urk4G3K8pTkx8ArW0+
x/rSQ3SKomzZKHJVOQq5IV8q+fFxGSSDElyKOnE0gSf//OuLpxHpUtMTIciMT6xd
8lGSFlFopONAOGixCFalbAJl1wE+LnYFuSRjCQVlNx18z0DsFWvtvDNBzZ353gfj
4Ma0w2XTQT8LEWoZfGceSHE+8gr+BVsWwLljf5Qmr7dpBxMCAOC4IQ==
=2wNG
-----END PGP SIGNATURE-----
From jya at pipeline.com Sat Jan 3 05:00:22 1998
From: jya at pipeline.com (John Young)
Date: Sat, 3 Jan 1998 21:00:22 +0800
Subject: The Codeleakers
Message-ID: <1.5.4.32.19980103125335.0073b628@pop.pipeline.com>
http://www.mercury-rising.com/
Mercury Rising
Art Jeffries (Bruce Willis), a disillusioned, outcast FBI agent, is
the only one who can protect an orphaned nine-year-old autistic
savant (Miko Hughes) when he becomes the target of assassins after
inadvertently deciphering a top-secret government military code.
Lt. Colonel Nicholas Kudrow (Alec Baldwin) is the National Security
agent assigned to unveil the source of the code's leak.
Preview
5fps - 4.9MB / 10fps - 8.1MB
The film opens April 3, 1998.
Website Coming Soon!
From kping at nym.alias.net Sat Jan 3 05:45:21 1998
From: kping at nym.alias.net (Kay Ping)
Date: Sat, 3 Jan 1998 21:45:21 +0800
Subject: Location Escrow anyone ?
Message-ID: <19980103133555.12753.qmail@nym.alias.net>
-----BEGIN PGP SIGNED MESSAGE-----
>>ZURICH (December 28, 1997 4:12 p.m. EST http://www.nando.net) - Swiss
>>police have secretly tracked the whereabouts of mobile phone users via a
>>telephone company computer that records billions of movements going back
>>more than half a year, a Sunday newspaper reported.
>
>Don't be fooled that this is a swiss only problem. It's being done here in
>Amerika right now.
The FCC has issued a ruling that will require all cellular telephone
carriers to provide location information on all 911 calls. By the year
2001, this location information is to provide 125 metres of accuracy 67%
of the time.
Helping emergency services locate 911 callers is a great excuse for
installing a cellular location system. Even better than the excuses they
gave for eavesdropping-ready digital switches and limits on encryption.
An accuracy of 125 meters seems quite impressive considering the facts
that cellular channels are plagued by very long multipath dispersion and
that a narrowband FM signal is much less than ideal for calculating delay.
- --------------
Kay Ping
nop 'til you drop
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: cp850
iQEQAwUBNK4a2hHPAso8Qp7tAQFI1wfRARzxzUTRWkuETjkWrz7Gh4StMEwhCZ6C
Nzh2i2ymTq2/hMMdx7L8tuc2N5wISlBjzJtJGKnyQTHYJs6SMkvYLQa89H4v4MyH
9NJK6wSqx1OLEmgPwCoJWo8NUkH1jwPvhRfb+A/KE3raYazMd1fY+EgL/P3R216s
j0F0RsPUFvMS3m+/j5rKFoatuG1Qc6b2p8QnQLxgxyePoEScEEcfxiCrGGH75YEF
5yiJMi11LraUnDyJtZ/9xVXAFAEjLM9IYyCapfleIEUNisu9Iu3R9V/FIBdEom3O
uL7we6ETWSrYCFxdmrDq64q7wi1ygN/d1IvIFgNzSol/D9Y=
=czyT
-----END PGP SIGNATURE-----
From amaret at infomaniak.ch Sat Jan 3 05:49:44 1998
From: amaret at infomaniak.ch (Alexandre Maret)
Date: Sat, 3 Jan 1998 21:49:44 +0800
Subject: Location Escrow anyone ?
In-Reply-To:
Message-ID: <34AE4047.212669B2@infomaniak.ch>
The LPD (law on data protection) :
http://193.5.216.40/ch/f/rs/235_1/index.html
http://193.5.216.40/ch/f/rs/235_11/index.html
(in french, italian, german only)
The LPD states that you can get a copy of your database entry printed
on paper, for a cost of max 300SFrs (about US$200), unless some special
cases which have to be specified in the law. Since the debate is based
on the fact that there is no legal text that allows swisscom to record
these informations, there is no legal text that allow them not to
communicate your informations on request. I'm not a jurist, but it
may be an interesting path to follow.
If they store the location of your phone every 3 secs, for 6 month,
this means 5'241'600 locations. Printed on 70 lines/page paper,
this means 74'880 A4 pages. Do you think they'd be happy to print
and send you 74'880 pages for 300SFrs ?
There is certain rules that allow them to postpone your request.
However, they have to tell you before. Just wondering what would
happen if 100'000 people asks for their last 6 month of positions...
> >Swiss Federal Data Protection Commissioner: http://www.edsb.ch/
> >mostly empty... not a word about these 2 stories. you see how the
> >swiss people are informed...
>
> Now this guy (Odilo Guntern) seems to have no clue about anything...
Last month, I was thinking about launching a web site to inform
swiss citizen about these issues. A kind of swiss EPIC. However,
I can't do this alone.
If anybody is interested by this idea, drop me a mail.
> Wanna get more paranoid? Some companies log all Internet traffic of their
> employees
hmmm... no need to become more paranoid, enough is enough.
> that passes through their proxy (which you have to use for anything to
> work) for
> some weeks (Weren't you the one chatting on #really-naughty-bits for more
> than 1
> hour on Monday??).
> And of course, phonenumbers you call in your company are logged, too.
swisscom does it. They log all the internal/external mail of their
employees...
alex
From shamrock at cypherpunks.to Sat Jan 3 06:14:07 1998
From: shamrock at cypherpunks.to (Lucky Green)
Date: Sat, 3 Jan 1998 22:14:07 +0800
Subject: Remailer under NT [was:Re: your mail]
In-Reply-To: <199801011858.KAA07272@sirius.infonex.com>
Message-ID:
On Thu, 1 Jan 1998, Mix wrote:
> Okay, I'd like to set up a remailer - but I don't know where to start!
> Unfortunatly it's going to have to run on an NT 4.0 box, so the winsock
> remailer is out of the question, right? And I'm not in the US, so I
> can't use the juno stuff -- so what (if anything) *can* I use?
AT&T offers a free UNIX (korn shell) emulator for NT. Check
ftp://ftp.research.att.com/
-- Lucky Green PGP v5 encrypted email preferred.
"Tonga? Where the hell is Tonga? They have Cypherpunks there?"
From MoneyTrain at mci2000.com Sat Jan 3 22:47:35 1998
From: MoneyTrain at mci2000.com (MoneyTrain at mci2000.com)
Date: Sat, 3 Jan 1998 22:47:35 -0800 (PST)
Subject: 1998: TOP PRIORITY!!!!!!!!!!
Message-ID: <199710022632NNA15968@post.net>
<< MAKE 1998 MORE FUN WITH MORE CASH!!!!
PRINT OR SAVE THIS E-MAIL LIKE I DID.
MANY PEOPLE ARE MAKING LOTS OF MONEY. DON'T BE LEFT OUT.
I just want to pass along my best wishes and encouragement to you.
Any doubts you have will vanish when your first orders come in. I even
checked with the U.S. Post Office to verify that the plan was legal.
It definitely is! IT WORKS!!!
Paul Johnson, Raleigh, NC
"Please Read This Twice!"
Dear friend,
=========================================================
=========================================================
This is a "ONE-TIME MESSAGE" you were randomly selected to receive this.
There is no need to reply to remove, you will receive no further mailings from us.
If you have interest in this GREAT INFORMATION, please do not click reply,
use the contact information in this message. Thank You! :-)
=========================================================
=========================================================
*** Print This Now For Future Reference ***
The following income opportunity is one you may be interested in taking a
look at. It can be started with VERY LITTLE investment and the income return
is TREMENDOUS!!!
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
You could make at least $50,000 in less than 90 days! Results may vary.
Please read the enclosed program...THEN READ IT AGAIN!!!
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
This is a MONEY-MAKING PHENOMENON. PRINT this letter, read the
program... THEN READ IT AGAIN !!!
You are looking at the most profitable and unique program you may ever
see. It has demonstrated and proven ability to generate large sums of
money. This program is showing fantastic appeal with a huge and ever
growing population which needs additional income.
This is a legitimate LEGAL money-making opportunity. It does not
require you to come in contact with people, do any hard work, and best
of all, you never have to leave the house, except to get the mail. If you
believe that some day you will get that lucky break that you have been
waiting for, THIS IS IT! Simply follow the easy instructions, and your
dream will come true! This electronic multi-level marketing program works perfectly...100% EVERY TIME!
Thousands of people have used this program to raise capital to start their
own business, pay off debts, buy homes, cars, etc., even retire! This is
your chance, so don't pass it up.
OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC
MULTI-LEVEL MARKETING PROGRAM
Basically, this is what we do: We sell thousands of people a product for
$5.00 that costs us next to nothing to produce and e-mail. As with all
multi-level businesses, we build our business by recruiting new partners
and selling our products. Every state in the U.S. allows you to recruit
new multi- level business online (with your computer).
The product in this program is a series of four businesses and financial
reports. Each $5.00 order you receive by "snail mail" will include the e-mail
address of the sender. To fill each order, you simply e-mail the product to
the buyer. THAT'S IT!...the $5.00 is yours! This is the GREATEST
electronic multi-level marketing business anywhere!
FOLLOW THE INSTRUCTIONS EXACTLY!
Let's face it, the profits are worth it! THEY'RE TREMENDOUS!!!
So go for it. Remember the 4 points and we'll see YOU at the top!
******* I N S T R U C T I O N S *******
This is what you MUST do:
1. Order all 4 reports listed and numbered from the list below.
For each report send $5.00 CASH, YOUR E-MAIL ADDRESS and YOUR
RETURN POSTAL ADDRESS (in case of a problem) to each person listed.
When you order, make sure you request each SPECIFIC report. You
will need all four reports, because you will be saving them on
your computer and reselling them.
2. IMPORTANT--DO NOT alter the names, or their sequence other than
instructed in this program! Or you will not profit the way you
should.
Replace the name and address under REPORT #1 with yours, moving
the one that was there down to REPORT #2. Move the name and
address under REPORT #2 to REPORT #3. Move the name and address
under REPORT #3 to REPORT #4. The name and address that was under
REPORT #4 is dropped off the list and is NO DOUBT on the way to
the bank.
When doing this, please make certain you copy everyone's name and
address ACCURATELY!!! Also, DO NOT move the Report/Product
positions!
3. Take this entire program text, including the corrected names list,
and save it on your computer.
4. Now you're ready to start a massive advertising campaign on the
WORLDWIDE WEB! Advertising on the WEB is very, very inexpensive,
but there are HUNDREDS of FREE places to advertise also. Another
avenue which you could use is e-mail mailing lists. You can buy
these lists for under $20/1,000 addresses. START YOUR AD CAMPAIGN
AS SOON AS YOU CAN.
ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!!
REQUIRED REPORTS
***Order each REPORT by NUMBER and NAME***
ALWAYS SEND $5 CASH (concealed) FOR EACH ORDER REQUESTING THE SPECIFIC REPORT BY NAME AND NUMBER. ALWAYS SEND FIRST CLASS OR PRIORITY MAIL AND PROVIDE YOUR E-MAIL ADDRESS FOR QUICK DELIVERY.
___________________________________________________
REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTILEVEL SALES"
ORDER REPORT #1 FROM:
RICE ENTERPRISES
14001 DALLAS PKWY, STE. 1200
DALLAS, TX 75240
___________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"
ORDER REPORT #2 FROM:
MARK KITCHEN
3440 WATKINS LAKE ROAD
WATERFORD, MI 48328
___________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:
MAKIN-MOOLA
P.O. BOX 271926
FT. COLLINS, CO 80527-1926
_____________________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"
ORDER REPORT #4 FROM:
MY-TURN
P.O. BOX 272453
FORT COLLINS, CO 80527-2453
____________________________________________________
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
Let's say you decide to start small just to see how it goes. Assume
your goal is to get 10 people to participate on your first level.
(Placing a lot of FREE ads on the internet could EASILY get a better
response.) Also assume that everyone else in YOUR BUILDING ORGANIZATION
gets ONLY 10 downline members. Follow this example for the STAGGERING
results below.
1st level -- your 10 members with $5 ($5 x 10) $50
2nd level --10 members from those 10 ($5 x 100) $500
3rd level -- 10 members from those 100 ($5 x 1,000) $5,000
4th level -- 10 members from those 1,000 ($5 x 10,000) $50,000
THIS TOTALS-----------> $55,550
Remember friends, this is assuming that the people who participate
only recruit 10 people each. Dare to think for a moment what would
happen if everyone got 20 people to participate! Some people get
100's of recruits! THINK ABOUT IT!
By the way, your cost to participate in this is practically nothing.
You obviously already have an internet connection and email is FREE!!!
REPORT#3 will show you the best methods for bulk emailing and purchasing
email lists.
REMEMBER: Approx. 105,000 new people get online monthly!
ORDER YOUR REPORTS NOW!!!
*******TIPS FOR SUCCESS*******
TREAT THIS AS YOUR BUSINESS! Send for the four reports IMMEDIATELY,
so you will have them when the orders start coming in because:
When you receive a $5 order, you MUST send out the requested product/
report to comply with the U.S. Postal & Lottery Laws, Title 18,
Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code,
also Code of Federal Regs. vol. 16, Sections 255 and 436, which
state that "a product or service must be exchanged for money received."
* ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
* Be patient and persistent with this program. If you follow the
instructions exactly the results WILL undoubtedly be SUCCESS!
* ABOVE ALL, HAVE FAITH IN YOURSELF THAT YOU CAN SUCCEED!
*******YOUR SUCCESS GUIDELINE*******
The check point that guarantees your success is simply this:
You MUST receive 10 to 20 orders for REPORT #1! THIS IS A MUST! If
you don't within two weeks, advertise more and send out more programs
until you do. Then, a couple of weeks later you should receive at
least 100 orders for REPORT #2. If you don't, advertise more and send
out more programs until you do. Once you have received 100, or more
orders for REPORT #2, YOU CAN RELAX, because you will be on your way
to the BANK! -OR- You can DOUBLE your efforts!
REMEMBER: Every time your name is moved down on the list you are in
front of a DIFFERENT report, so you can KEEP TRACK of your PROGRESS
by what report people are ordering from you. IT'S THAT EASY!!!
NOTE: IF YOU NEED HELP with starting a business, registering a business
name, how income tax is handled, etc., contact your local office of the Small Business Administration (a Federal agency) for free help and answers to
questions. Also, the Internal Revenue Service offers free help via telephone
and free seminars about business taxes.
******* T E S T I M O N I A L S *******
This 4 report program has turned my life completely around. Have you ever
been in debt over $100,000? It's a scary feeling. You consider bankruptcy,
you consider all kinds of crazy schemes to make money and you dump alot of
the little you have left into many of them. I have spent thousands of
dollars on seminars and courses. I think I must own at least half of the
books ever published on making money. Some are helpful, most are not. This
program came across my desk numerous times, both through the post and via
email over the years. I think I must have been pretty desperate when I
finally broke down and really read through the letter. After all I had been
through, suddenly a little light went on! This thing could really work?
After all I spent on trying to learn how to get myself out from under this
debt load this plan was only going to cost me $20 plus some of my time. I
already had a computer and email, so........
This is getting too long, so let me finish up here. I have now started on
my fourth time through the program! That $100,000 debt is GONE! I can talk
to my friends and relatives now and they don't cringe for fear I'm going to
ask for money. We are starting to build our business up and we have the
capital to do it now! I have chosen the year 2000 for our retirement and
I'm going to make it with time to spare.
Does this plan work? Yes, yes, a thousand times yes!
J. S. Todd
Canada
This program does work, but you must follow it EXACTLY! Especially the
rule of not trying to place your name in a different position, it won't work,
you'll lose a lot of money. I'm living proof that it works. It really is a great
opportunity to make relatively easy money, with little cost to you. If you
do choose to participate, follow the program exactly, and you'll be on your
way to financial security. If you are a fellow Christian and are in financial
trouble like I was, consider this a sign. I DID!
Good Luck & God Bless You,
Sincerely, Chris Johnson
P.S. Do you have any idea what 11,700 $5 bills ($58,500) looks
like piled up on the kitchen table?...IT'S AWESOME!
My name is Frank. My wife Doris and I live in Bel-Air, MD.
I am a cost accountant with a major U.S. Corporation and I make
pretty good money. When I received the program I grumbled to Doris
about receiving "junk mail"! I made fun of the whole thing, spouting
my knowledge of the population and percentages involved. I "knew" it
wouldn't work. Doris totally ignored my supposed intelligence and
jumped in with both feet. I made merciless fun of her, and was ready
to lay the old "I told you so" on her when the thing didn't work...
well, the laugh was on me! Within two weeks she had received over 50
responses. Within 45 days she had received over $147,200 in $5 bills!
I was stunned. I was sure that I had it all figured and that it wouldn't
work...I AM a believer now. I have joined Doris in her "little" hobby. I did
have seven more years until retirement, but I think of the "rat race" and
it's not for me...We owe it all to MLM.
Frank T., Bel-Air, MD
This is the only realistic money-making offer I've ever received. I
participated because this plan truly makes sense. I was surprised
when the $5.00 bills started filling my mail box. By the time it tapered
off I had received over 8,000 orders with over $40,000 in cash. Dozens
of people have sent warm personal notes too, sharing the news of their
good fortunes! It's been WONDERFUL.
Carl Winslow Tulsa, OK
The main reason for this letter is to convince you that this system is
honest, lawful, extremely profitable, and is a way to get a large amount
of money in a short time. I was approached several times before I checked
this out. I joined just to see what one could expect in return for the minimal
effort and money required. Initially I let no one in the organization know
that I was an attorney and, to my astonishment, I received $36,470.00 in
the first 14 weeks, with money still coming in.
Sincerely yours, Phillip A. Brown
This plan works like GANG-BUSTERS!! So far I have had 9,735 total orders
OVER $48,000!!! I hope I have sparked your own excitement, if you follow
the program exactly, you could have the same success I have, if not better.
Your success is right around the corner, but you must do a little work.
Good Luck! G. Bank
Not being the gambling type, it took me several weeks to make
up my mind to participate in this plan. But conservative that I am
I decided that the initial investment was so little that there was
just no way that I wouldn't get enough orders to at least get my money
back. Boy I was surprised when I found my medium-size post office box
crammed with orders. After that it got so over-loaded that I had to
start picking up my mail at the window. I'll make more money this
year than any 10 years of my life before. The nice thing about this
deal is that it doesn't matter where in the U.S. the people live.
There simply isn't a better investment with a faster return.
Mary Rockland, Lansing, MI
I had received this program before. I deleted it, but later
I wondered if I shouldn't have given it a try. Of course, I had no
idea who to contact to get another copy, so I had to wait until I
was e-mailed another program...11 months passed then it came...I
didn't delete this one!...I made $41,000 on the first try!!
D. Wilburn, Muncie, IN
This is my third time to participate in this plan. We have
quit our jobs, and quite soon we will buy a home on the beach and live
off the interest on our money. The only way on earth that this plan
will work for you is if you do it. For your sake, and for your family's
sake don't pass up this golden opportunity. Remember, when you order
your four reports, SEND CASH. Checks have to clear the bank and create
too many delays. Good luck and happy spending!
Charles Fairchild, Spokane, WA
Typically when I look at a money-making deal I want to
know if the company is strong, will it be here when it's time for
my big pay off. In this crazy thing there is no company intervention
for management to blow it. Just people like me ordering directly
from the source! Interesting...I had a couple of projects I'd been
trying to fund to no avail so I thought; Why not give it a try? Well
2 1/2 weeks later the orders started coming in. One project is funded
and I'm sure the other will be soon!
Marilynn St. Claire, Logan, UT
====================================================
We could be printing YOUR testimonial next!!!
ORDER YOUR REPORTS TODAY AND GET
STARTED DOWN THE ROAD TO
From rp at rpini.com Sat Jan 3 07:09:43 1998
From: rp at rpini.com (Remo Pini)
Date: Sat, 3 Jan 1998 23:09:43 +0800
Subject: eudora plugin
Message-ID: <199801031502.QAA19999@linux.rpini.com>
There would by chance be anyone around who would know where the
Eudora Plugin Patch for PGP 5.5 (NT/95) can be downloaded (or aquired
otherwise) outside USA?
(http://www.pgp.com/products/eudora.cgi)
Thanks,
Remo
-----------------------------------------------------
Fate favors the prepared mind. (from "Under Siege 3")
-----------------------------------------------------
Remo Pini T: +41 1 350 28 88
Pini Computer Trading N: +41 79 216 15 51
http://www.rpini.com/ E: rp at rpini.com
key: http://www.rpini.com/crypto/remopini.asc
-----------------------------------------------------
From dlv at bwalk.dm.com Sat Jan 3 08:21:57 1998
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Sun, 4 Jan 1998 00:21:57 +0800
Subject: [Humor] Kennedy's New Legislation
In-Reply-To:
Message-ID:
Tim May writes:
> And on a more serious note, one thing this affair shows is that once again,
> the Kennedy clan (KC) lives by different rules. Whether it's Edward
> Kennedy getting off in the Mary Jo Kopechne case, when any of us would have
> likely been charged with a) drunk driving, b) leaving the scene, c) lying
> in an investigation, or whether it's this very same Michael Kennedy getting
> off with his underage babysitter....
Joe Kennedy was a common thug, no different from the Gambinos and the
Genoveses. He made millions of dollars during the prohibition smuggling
whiskey from Canada. He personally murdered numerous of fellow drug dealers
and law enforcement officers (OK, he's not all bad :-) and dozens more were
murdered on his orders. He then bought political offices for his kids,
which is precisely what his colleagues - cocaine and heroin deales from
Cali, medellin, etc cartels - get blamed for in Mexico and Colombia.
---
Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps
From bdolan at USIT.NET Sat Jan 3 09:08:12 1998
From: bdolan at USIT.NET (Brad)
Date: Sun, 4 Jan 1998 01:08:12 +0800
Subject: Which side are you on, brother?
In-Reply-To:
Message-ID:
Watching the DOJ/MS fight is sort of like watching Iraq and Iran fight.
Or Iraq and Kuwait. I have a hard time working up much enthusiasm for
either side.
What finally knocked me onto {gasp, choke} Gates' side, was the following:
WSJ, p. A16, 12/23/97
Dole Backing Effort to Slow Microsoft Plan
Washington - Former Senate Majority Leader Bob Dole has been sending
letters and calling companies seeking their support in an expanding
campaign to curb Microsoft Corp.'s entrance into new Internet businesses.
Mr. Dole is part of a nascent but growing lobbying effort that goes far
beyond issues raised by the Justice Department's antitrust case against
Microsoft. ...
Mr. Dole is representing several companies, including Microsoft computer
rivals Netscape Communications Corp., and Sun Microsystems Corp., and
Sabre Group Holdings Inc., a Dallas-based airlines reservation system
that faces competition from Microsoft. ...
In a recent letter to one company that has been approached for support,
Mr. Dole wrote: "In the coming months, we will need to educate the
public, the administration, and Congress about the dangers of a
laissez-faire attitude toward Microsoft. I am personally convinced that
if nothing is done now, it will become increasingly difficult to have
fair competition in the years ahead. That is why we will need companies
like yours to help finance and support our efforts.
Mr. Dole, who was travelling in Bosnia yesterday with President Clinton,
couldn't be reached for comment. ...
Whenever both heads of the DemoPublican hydra agree, they're circling the
wagons to protect their "vital interests" against the barbarians. I'm
rooting for the barbarians, no matter how stinky they are.
Brad
From eureka at eureka.abc-web.com Sun Jan 4 01:17:41 1998
From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com)
Date: Sun, 4 Jan 1998 01:17:41 -0800 (PST)
Subject: Eureka! Sun Jan 4 '98
Message-ID: <19980104081931.15721.qmail@eureka.abc-web.com>
Welcome to Sunday's issue of Eureka!
PUSSY PARADISE
Yet again Eureka! has managed to negotiate a special week's
free access to one of the web' s premier porn sites. Pussy
Paradise is simply packed with 100s of videos (many live),
thousands of photos, and so much more. You will need your
credit card as adult verification but it will not be charged
for your free week! So check it out - there's smut a plenty!
Pussy Paradise .... http://www.pussyparadise.com/eureka.html
GAYEUREKA!
NEW!! The new gay newsletter is now available. All the gay
material from this newsletter and a whole load more will now
appear in the new newsletter. If you would like to subscribe
Please click here ..... http://eureka.abc-web.com/gayeureka/
EUREKA! is now available in three additional languages. So
now you can choose from any of the following. And don't for-
get, from January 10th we'll add Portuguese and Italian too!
FRAN�AIS ..... http://eureka.abc-web.com/eureka/francais.htm
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPA�OL ....... http://eureka.abc-web.com/eureka/espanol.htm
ANDREA'S FEMMES
"Welcome, my name is Andrea. It makes me so hot knowing that
you're looking my girls. I just can't keep my hands off my-
self thinking about you looking at them. Enjoy these pic-
tures..." You have to see these pix! Lots, good and free!
Andrea's Femmes ...... http://www.latent-images.com/andreas/
ANGIE'S BIG BEAUTIFUL WOMEN
Big ladies, I'm talking really huge! That's right, packing
some serious chub. The site warrants a peek. Ya gotta see
the "rock road" picture of the nipple tug. Ouch! Surf it.
Angie's Big .................. http://www.waid.com.au/angie/
ABSOLUTE PORN
Well I guess so! Lots of easy to get at fast loading free
pix! Hot horny looking babes abound. The pix are all over
and there's also a link to thumbnails. Worth the Surf! Yeah!
Absolute Porn .... http://www.algonet.se/~ctwr/absoluteporn/
STUDMONKEY'S OBSESSIONS
Choose your obsession, anal or lesbian. Once at that destin-
ation you have more choices and some great pix of steamy 69
action! The pix are big and pretty good quality. Ohh Yeah!
Studmonkey's Obsessions ......... http://www.studmonkey.com/
FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet. However, many of the feeds use the RealPlayer and will
work in most browsers. If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Pregnant ....................... http://207.168.184.26/preg/
CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars you will meet most days. It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/
THE BEST PHONE SEX
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416
AMATEUR SITE OF THE DAY
ALEXIS: This Georgia peach is a tiny topper. With a tiny 34A
chest she is perfect for all you guys who like them tiny!
Nothing turns her on more than� a strong, confident man who
is not afraid to show his sensitive side. Her hobbies incl-
ude "anything with water", she loves to water ski. See her
in and out of her bikini! .. http://amateurindex.com/eureka/
TODAY'S FREE PIX
OK, it's the new year, and now we are really going to start
getting in gear, with some of the hottest FREE photos ever!
Pic 1 ........................... http://137.39.63.229/?040
Pic 2 ........................... http://137.39.63.229/?041
Pic 3 ........................... http://137.39.63.229/?042
Pic 4 ........................... http://137.39.63.229/?043
Pic 5 ........................... http://137.39.63.229/?044
Pic 6 ........................... http://137.39.63.229/?045
Pic 7 ........................... http://137.39.63.229/?046
Pic 8 ........................... http://137.39.63.229/?047
Pic 9 ........................... http://137.39.63.229/?048
Pic 10 ........................... http://137.39.63.229/?049
PLEASE VISIT THIS FINE EUREKA! MEMBER SITE
THE ULTIMATE HARDCORE SITES
http://sexplosion.com/adverts.shtml
An incredible collection of over 30 sites featuring the
hottest free hardcore photos. The pix are easy to find and
the sites are all very accessible. You won't be
disappointed.
------------------------------------------------------------
If you would like to unsubscribe from the Eureka! Newsletter
simply select reply and send us a quick reply to this email.
------------------------------------------------------------
From schear at lvdi.net Sat Jan 3 09:53:11 1998
From: schear at lvdi.net (Steve Schear)
Date: Sun, 4 Jan 1998 01:53:11 +0800
Subject: Location Escrow anyone ?
In-Reply-To: <19980103133555.12753.qmail@nym.alias.net>
Message-ID:
At 1:35 PM +0000 1/3/98, Kay Ping wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>
>>>ZURICH (December 28, 1997 4:12 p.m. EST http://www.nando.net) - Swiss
>>>police have secretly tracked the whereabouts of mobile phone users via a
>>>telephone company computer that records billions of movements going back
>>>more than half a year, a Sunday newspaper reported.
>>
>>Don't be fooled that this is a swiss only problem. It's being done here in
>>Amerika right now.
>
>The FCC has issued a ruling that will require all cellular telephone
>carriers to provide location information on all 911 calls. By the year
>2001, this location information is to provide 125 metres of accuracy 67%
>of the time.
The FCC may have ruled it, but its doubtful that the carriers can provide it. Doing better than than a cell sector will depend on many factors, including: specific technology (analog, GSM, CDMA, etc.), frequency and local propagation characteristics, especially multipath conditions.
>From parallel discussions on the cryptography list:
800 MHz analog may be the most difficult. GSM perhaps can reach 500 meteres under ideal conditions (Andreas Bogk). IS-95/CDMA probably a bit better than GSM due to the very high data (chip) rate and spread spectrum's better multipath characteristics, although the system's multipath performance most improves communications not ranging (Phil Karn, Qualcomm).
--Steve
PGP mail preferred, see http://www.pgp.com and
http://web.mit.edu/network/pgp.html
RSA fingerprint: FE90 1A95 9DEA 8D61 812E CCA9 A44A FBA9
RSA key: http://keys.pgp.com:11371/pks/lookup?op=index&search=0x55C78B0D
---------------------------------------------------------------------
Steve Schear | tel: (702) 658-2654
CEO | fax: (702) 658-2673
Lammar Laboratories |
7075 West Gowan Road |
Suite 2148 |
Las Vegas, NV 89129 | Internet: schear at lvdi.net
---------------------------------------------------------------------
From carsten.hartwig at rhein-main.net Sat Jan 3 12:04:41 1998
From: carsten.hartwig at rhein-main.net (Carsten Hartwig)
Date: Sun, 4 Jan 1998 04:04:41 +0800
Subject: Which side are you on, brother?
In-Reply-To:
Message-ID: <3.0.5.32.19980103205938.007c1100@mail.rhein-main.net>
A non-text attachment was scrubbed...
Name: not available
Type: text/enriched
Size: 889 bytes
Desc: not available
URL:
From rdl at mit.edu Sat Jan 3 13:17:54 1998
From: rdl at mit.edu (Ryan Lackey)
Date: Sun, 4 Jan 1998 05:17:54 +0800
Subject: Guns: H&K, G3, 7.62 v 5.56 [Guns] (fwd)
Message-ID:
I've only seen bolt action .50s fired. They're not *too* heavy, and
from the amount of muzzle flash, noise, etc. it gave, I'd be as comfortable
using it at 1000-1500 yards as I would a .308 at 600-1000 yards. Given
proper concealment and the absence of anyone looking directly at you
when you fire, that is. Professional sniping is a 2 man operation anyway --
against a target that can shoot back, you really want to have a spotter.
>From what I can gather, the US military seems to agree with this
strategy -- .308s for traditional sniping, .50 for anti-materiel, extreme
long range, and countersniping. Attacking an incoming force which has
its own snipers is mostly a job for the .50. And if I were in the field
on the offense, I'd be attacking small enough groups that a few .50
rounds would be sufficient to kill them all or at least immobilize them.
Or high enough value targets to make a more likely kill worth the higher
risk during E&E. True, they mainly use bolt-action .50s -- if the semi
auto version is really that much heavier, I'd probably go for the bolt
action gun in the field and the semi at my home.
For Tim May's situation, in a house, they know fairly well that he's firing
from the house. Pretty much any weapon will give enough signature for them to
zero in on it and fire. If he's lucky, and they just have carbines and
7.62 snipers, he could fire from one room, move to another, fire, etc. Or have
enough cover to keep himself from getting hit. But at some point, they'll
just bring in a real countersniper asset, like an automatic cannon, and
any muzzle flash will be responded to with several hundred AP/explosive shells.
Within the house, the weight of a .50 isn't that bad -- and the extra 500-1000
yards and AP capability might make a difference against a raid. At the very
least, it'll get his place firebombed rather than shot up :) Forcing
them to keep outside the 1500-2000 yard high danger range from a .50 (or
forcing them to stay behind serious cover) would give him a chance to duck
out and fight another day, too :) A .50 is also a bit more effective
against helicopters containing special forces "monitoring" personnel
who are there (but of course not actually there) in violation of the law.
It would be interesting to fit one's house with speakers/noise generators/
flash generators/smoke/etc. to make it look as if one has an automatic
cannon or a small army, in response to a raid. It would make a perfect
distraction during which to leave :)
I'd much rather write code, make money, and leave the country (not
necessarily in that order) than worry about defending myself from a
government which has shown time and time again it is willing to ignore
the law, though.
[ObCrypto:
* Eternity DDS is coming along. The current almost-ready-for-announcement
version is using Postgres95 for a backend, sigh. Design for the
first production-demo system is progressing as well.
* The Cypherpunks Archive project I was working on is also progressing.
Unfortunately, my archive is kind of weird -- it's in MIT discuss
format, and converting it into mbox is nontrivial, given the size of the
file. After adding more memory to the system on which I'm editing the
file, I think I have an mbox file which is just missing one field. I'm
planning to index them with hypermail, then glimpse. On the cd, I'll
put the original mbox file, either as a single massive file or broken up,
depending on what people want, as well as a precomputed index and perhaps
the web site version as well. The next step is to put all of the cypherpunks
archives into Eternity DDS -- Postgres95 seems to puke on large data objects
sometimes, so I'll need to fix that.
Once I get the cypherpunks archive done, I'll work on some other lists. And
then hopefully some people will buy CD-Rs so I can buy another 25gb of HDD
or so :)
* Financial people are pretty cool. I just got back from talking to some
about the Eternity Service concept, and they were really excited. I really
didn't expect non-(electronic finance) finance people to be interested in it
right away. They even got more excited when the magic word "cryptography"
was mentioned. Perhaps finance will fix the software industry.
--
Ryan Lackey
rdl at mit.edu
http://mit.edu/rdl/
From nobody at REPLAY.COM Sat Jan 3 13:32:32 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 4 Jan 1998 05:32:32 +0800
Subject: Dimitry "The Hair" Vulis
Message-ID: <199801032116.WAA06540@basement.replay.com>
Poor Dimitry! He can dish it out, but not take it.
Everyone should give Dimitry a call and tell him
how much he is appreciated.
Dr. Dimitry Vulis's home phone number:
Vulis, Dimitri (DV1006) postmaster at DM.COM
D&M Consulting Services Inc.
67-67 Burns Street
Forest Hills, NY 11375
718-261-6839 (FAX) 212-725-0693
The 212 number is goes directly into his
home 718 (Brooklyn) house, and is answered
by a person.
Talk with the devil himself!
---simvlad
From brianbr at together.net Sat Jan 3 14:01:20 1998
From: brianbr at together.net (Brian B. Riley)
Date: Sun, 4 Jan 1998 06:01:20 +0800
Subject: Guns: H&K, G3, 7.62 v 5.56 [Guns] (fwd)
Message-ID: <199801032150.QAA29689@mx02.together.net>
-----BEGIN PGP SIGNED MESSAGE-----
On 1/3/98 4:05 PM, Ryan Lackey (rdl at mit.edu) passed this wisdom:
>I've only seen bolt action .50s fired. They're not *too* heavy, and
>from the amount of muzzle flash, noise, etc. it gave, I'd be as
>comfortableusing it at 1000-1500 yards as I would a .308 at
>600-1000 yards. Given proper concealment and the absence of anyone
>looking directly at you when you fire, that is. Professional
>sniping is a 2 man operation anyway --against a target that can
>shoot back, you really want to have a spotter.
I finally remebered where I saw it. In Tom Clancy's non-fiction book
"MARINE: A Guided Tour of a Marine Expeditionary Unit." On pages 75-77
(there is a good picture too) he details the history and developement
as well as the uses of the "Barrett M82A1A .50-cal special-purpose
sniper rifle." It is for all intents and purposes a Brownig M2 .50-cal
machine gun barrel/receiver set o a newly designed spring recoil
system to be fired from shoulder wit bipod. It is chambered for the
NATO standard .50-cal/12.7mm ammunition. It was developed by Ronnie
Barrett of Murfeesboro, Tennessee and further developement sponsored
by the USG and was first deployed by the CIA with the Mujahadeen in
Afgahnistan where they used it to make some Russian troops quite
miserable from a long way off. The sucess of it in Afghanistan force
the military to consider it. Nothing is said concerning other services
but it has been adopted by the USMC Force Recon for use by a three man
team. The gun is broken down into upper reciever, lower reciver, and
scope and ammo.
There may be .50-cal bolt actions out there that are one man
carries, but the Barrett gun is a three man load. The gun is 57 inches
long and weighs 32.5 pounds, unloaded with no scope. The primary
mission of the gun is not man sniping, though I am sure it often has
been and will be used in that role, but its main aim is to long range
snipe and disable antennae, dishes, equipment, etc using the AP and
API ammunition.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQEVAwUBNK6ybj7r4fUXwraZAQGSNgf/X6+K6j5lzj1odfzDM0HUfTnNzcc/RgSD
OHHelk3Elb0jLDIX76KJsVOghDQ228QA+dFa+dEH+3YyjquIclKp4UBrfqw42Rfd
Fv/HVinE9qLKse4PVY3Mjeqt8jHCGO01RHNATnrArDA6C2lVJIeE1tIDVGDVVtI2
bndGRnOexSXrFSm+5ux1GejWUYzUbLiQIOmfNSJMpzi8WwfQ/I3OLyFm5I6y9DR1
IiQZRs4RoqJ6f4caiZWz62/L6iivwKsOX6LCHlZAjz/6Ld+/o6ZtC0cjn/yWtUqL
+3n/ZVydK+jGQ+rHopM4Eg1NGL5aRt+ANkKRDeTXohNlwfkCvI4xGA==
=zI8W
-----END PGP SIGNATURE-----
Brian B. Riley --> http://members.macconnect.com/~brianbr
For PGP Keys
"You need only reflect that one of the best ways to get yourself a
reputation as a dangerous citizen these days is to go around repeating
the very phrases which our founding fathers used in their struggle for
independence." -- Charles M. Beard
From pjm at spe.com Sat Jan 3 14:01:44 1998
From: pjm at spe.com (Patrick May)
Date: Sun, 4 Jan 1998 06:01:44 +0800
Subject: Time to Pay the Piper
In-Reply-To: <19980102.081442.attila@hun.org>
Message-ID: <1669-Sat03Jan1998030310-0800-Patrick May
Attila T. Hun writes:
[ . . . ]
> > At 05:15 PM 12/21/1997 +0000, Attila T. Hun wrote:
> >> there is only one solution to organizations like M$
> >> which are operated without ethics: treat them to the
> >> pleasures of not only the antitrust laws but the
> >> exquisite delights of RICO.
[ . . . ]
> 1) when a true market monopoly exists, society _is_
> entitled to intervene. I wrote my Harvard thesis on
> antitrust and the effect on society of a monopoly,
Ah, that explains why a bad-ass with a vocabulary would spout
such nonsense. That little liberal arts college up the river from my
alma mater can corrupt even the finest minds.
Rather than go down yet another libertarian v. statist debate
rathole, I'll just quote one of the more notorious (former) list
members by saying: "I have a solution for that."
The federal government should immediately stop purchasing and
using Microsoft products. No more monopoly, no court cases, no
delay. Free market and technical solutions are always superior to
legal remedies.
Regards,
Patrick May
S P Engineering, Inc.
From anon at anon.efga.org Sat Jan 3 17:34:11 1998
From: anon at anon.efga.org (Anonymous)
Date: Sun, 4 Jan 1998 09:34:11 +0800
Subject: Meganet's Unbreakable Virtual Matrix Encryption Takes the Market by St
Message-ID: <400641a667f1ebd324c0c58d8ef866f9@anon.efga.org>
> Yes, the VME 98 is the same product that challenged Microsoft,
> IBM, AT&T, Dell, Hewlett-Packard, Intel, America Online,
> Netscape, etc. to break a VME encrypted file. All the great
> computer minds in this country have had an opportunity to
> dispel the bold claims of unbreakable encryption, yet none have.
Why should Microsoft, IBM, AT&T, Dell, Hewlett-Packard, Intel, America
Online, Netscape, "all the great computer minds in this country," etc. give
a flying fuck?
From nobody at REPLAY.COM Sat Jan 3 17:45:01 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 4 Jan 1998 09:45:01 +0800
Subject: Microsoft
Message-ID: <199801040125.CAA09309@basement.replay.com>
Windows is still fucking me up the ass! I'm bleeding to death here!
From whgiii at invweb.net Sat Jan 3 18:06:36 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sun, 4 Jan 1998 10:06:36 +0800
Subject: Microsoft
In-Reply-To: <199801040125.CAA09309@basement.replay.com>
Message-ID: <199801040209.VAA17936@users.invweb.net>
-----BEGIN PGP SIGNED MESSAGE-----
In <199801040125.CAA09309 at basement.replay.com>, on 01/04/98
at 02:25 AM, Anonymous said:
>Windows is still fucking me up the ass! I'm bleeding to death here!
Well when you bend over and squeal like a pig what do you expect?!?
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html
- ---------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNK7taY9Co1n+aLhhAQHNiwQAxieliKHUE97aAZ+eZ0u64vtO4eZaaQyz
vjdLpOksrSRuF9+m2PqOcwf4tjSHUHR5g6C90fjiGR8Cs2sFD6eWByCOGlR2r5t0
DAiZA7WryKf3V06mw6266F2VaeRIZ5HUrKaCXeGPtb2I8kGKwCuWqM6kGLnzt96S
J1C+ddiKFsk=
=Mllk
-----END PGP SIGNATURE-----
From nobody at nsm.htp.org Sat Jan 3 18:15:50 1998
From: nobody at nsm.htp.org (nobody at nsm.htp.org)
Date: Sun, 4 Jan 1998 10:15:50 +0800
Subject: Microsoft
Message-ID: <19980104020914.26009.qmail@nsm.htp.org>
At 02:25 98/01/04 +0100, Anonymous wrote:
> Windows is still fucking me up the ass! I'm bleeding to death here!
>
>
>
For relief, see: http://www.enemy.org/
From shamrock at cypherpunks.to Sat Jan 3 18:26:56 1998
From: shamrock at cypherpunks.to (Lucky Green)
Date: Sun, 4 Jan 1998 10:26:56 +0800
Subject: Guns: H&K, G3, 7.62 v 5.56 [Guns] (fwd)
In-Reply-To:
Message-ID:
On 3 Jan 1998, Ryan Lackey wrote:
> It would be interesting to fit one's house with speakers/noise generators/
> flash generators/smoke/etc. to make it look as if one has an automatic
> cannon or a small army, in response to a raid. It would make a perfect
> distraction during which to leave :)
[The following is a theoretical discusion. Do not try this at home].
What you really want is the ability to slow down the mobility of the raid
force while making your exit. In a prolonged siege, the attacker will
always win. A good way of slowing down the attacker after an initial
armed response is to deploy chemicals. A combination of Tabun and Mustard
Gas works best, but don't deploy them at the same time. Use the Tabun
first for maximium impact. Follow up with the Mustard Gas a few minutes
later. The underground irrigation systems common on California properties
are ideal means of gas deployment. You should be able to retrofit the
system for under $500. Assuming you already have the gas. Of course you
need to make sure to keep a chem suit at home.
After you make your exit, you can clean out the next with a previously
installed fuel/air explosive.
-- Lucky Green PGP v5 encrypted email preferred.
"Tonga? Where the hell is Tonga? They have Cypherpunks there?"
From andy at neptune.chem.uga.edu Sat Jan 3 19:10:50 1998
From: andy at neptune.chem.uga.edu (Andy Dustman)
Date: Sun, 4 Jan 1998 11:10:50 +0800
Subject: [RePol] Re: Remailer Logs (and Accountability)
In-Reply-To: <19980103050003.766.qmail@nym.alias.net>
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
On 3 Jan 1998, Charlie Comsec wrote:
> > The "reordering pool" is
> > always a minimum of 5 messages so people can opt for how long their
> > message wil be 'stashed' at replay. (use 'Latency: +00:00' for zero latecy).
>
> Is that default reordering pool size the same for Type I and Type II
> messages?
Type-II messages don't support latency yet (or not until fairly recently,
I can't remember). Type-I remailers don't, by default, do any reordering,
but reordering is not as useful for type-I messages (unless you remix).
Cracker uses Mixmaster to reorder type-I messages. In addition to the pool
size of 5, it also will remail a maximum of half the messages present, so
in reality, the pool size floats up and down (but not lower than 5).
> Perhaps someone can double-check my math on this. Assuming
> equally-sized messages that are otherwise indistinguishable, and a
> reordering pool size of five, then the odds of matching up an
> encrypted incoming message with an encrypted outgoing message are
> one in five.
The odds are somewhat worse (for the attacker). In the case of the
scenario above on cracker, the odds of any given message being cycled out
of the pool (the pool is processed at six minute intervals) is generally
50% per cycle. Thus, there is a 75% chance that it has been sent by the
end of the second cycle, and therefore a 25% (.5*.5) chance that it is
still in the queue. The current RMS latency (from the remailer's own
stats) is 19.5 minutes. You want to about double that to be sure that the
message has really come out (and then, you still can't be sure), so that's
about six cycles. If we are doing 5 per cycle, then the odds are 1 in 30.
A very rough estimate. However, by my estimates, it's more like 12
messages per cycle (typically; it's variable for the reasons above), so
that runs it up to 1 in 72 or so.
(And of course, the remixing ensures that all messages are
indistinquishable, whenever possible.)
> What I'm unclear on is how setting a Latency: flag affects the
> diffusion of the output. Is that lattency IN ADDITION to the pool
> size of five, or does Latency: +00:00 bypass the reordering process
> altogether?
Latency occurs before reordering. Latency: +00:00 does nothing, BTW, and
it's the default. Latency: +12:00r adds a 0-12 hour random delay before
reordering.
> My main concern is the security of chained reply blocks which are
> more vulnerable to attack than normal anonymous messages. A single
> anonymous message can only be traced BACKWARDS after it's been
> received.
Which is probably not so hard when you record all inter-remailer traffic,
which is probably what happens somewhere.
> An anonymous reply, OTOH, could, theoretically, be
> "walked" through each remailer in the chain until the identity of
> the recipient was discovered. While that process would require
> convincing each remailer operator in the chain to cooperate, it's a
> lot more feasible than tracing a message backwards to its source.
> (Yes, I know about posting to a public message pool, such as a.a.m,
> but NG posting seems to be rather unreliable lately.)
Yep, that was part of the motivation for remixing: To keep eavesdroppers
from intercepting partially-decrypted reply blocks. It also prevents
traffic analysis based on the message section after the reply block. Reply
blocks, of course, tend to get smaller after each hop, while the message
getting delivered tends to get larger. Automatically encapsuling type-I
messages in type-II format whenever the recipient supports it prevents
this type of traffic analysis.
Andy Dustman / Computational Center for Molecular Structure and Design
For a great anti-spam procmail recipe, send me mail with subject "spam".
Append "+spamsucks" to my username to ensure delivery. KeyID=0xC72F3F1D
Encryption is too important to leave to the government. -- Bruce Schneier
http://www.athens.net/~dustman mailto:andy at neptune.chem.uga.edu <}+++<
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv
iQEPAwUBNK77/BOPBZTHLz8dAQHlRwfPY/0uPyFXIgQxGAFt+kbNT85lZ9/Bf9B6
XIoRHARSbE0np2JB7kB0PdjXIxgyFoxcn9kuTyspOgFgF80zQjFR7RYSQC8QKXDV
1dnod7X4ynrvjmHbGtfOYDfgZSKUboTrwIPuehfUw3IDnDliVjDnnDy76f4uZdLc
+Jn4JGRGPqVBQ3EX2d0yxDsIXY88geeGa4xgzSMSEaXWW+AoNw19mNJRA0AehiLg
DZRDHKbCKYRtqt9aOn1h3qi3VrOqUjkO8awBkSQw84ycEqVaBgczBW/nBtNIpHq5
42pHjHpCc1riYY/2vuOXXD3juou1Th4By7JaZLwt+GkbZA==
=r/Dk
-----END PGP SIGNATURE-----
From alan at clueserver.org Sat Jan 3 19:12:28 1998
From: alan at clueserver.org (Alan Olsen)
Date: Sun, 4 Jan 1998 11:12:28 +0800
Subject: Microsoft
In-Reply-To: <199801040125.CAA09309@basement.replay.com>
Message-ID: <3.0.5.32.19980103190024.038b0d80@clueserver.org>
At 02:25 AM 1/4/98 +0100, Anonymous wrote:
>
>Windows is still fucking me up the ass! I'm bleeding to death here!
Then get a copy of Linux and stop whining!
Sheesh!
---
| "That'll make it hot for them!" - Guy Grand |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer: |
| mankind free in one-key-steganography-privacy!" | Ignore the man |
|`finger -l alano at teleport.com` for PGP 2.6.2 key | behind the keyboard.|
| http://www.ctrl-alt-del.com/~alan/ |alan at ctrl-alt-del.com|
From blancw at cnw.com Sat Jan 3 21:02:23 1998
From: blancw at cnw.com (Blanc)
Date: Sun, 4 Jan 1998 13:02:23 +0800
Subject: Time to Pay the Piper
Message-ID: <3.0.32.19980103210255.006ddcf8@cnw.com>
Attila T. Hun wrote:
> 1) when a true market monopoly exists, society _is_
> entitled to intervene. [. . .]
> 2) why should you be surprised to hear this from me?
> sure, I would prefer anarchy per se, but have
> absolutely no faith that the vast majority would do
> anything except rape, pillage, and plunder. [. . . .]
.......................................................................
Well, between the "raping, pillaging, plundering" society of people who
can't do better than to follow in the path which Billg prepares for them,
and the "entitled" right of these same pillaging, plundering, sheeple to
intervene in a "true market monopoly" which they themselves participated in
creating, if only by default (intervening so they don't become exhausted
from all that decision making - Unix, or Perl? Unix, or Wintel? This is
too hard!!), and the attitude of Governors of the People's Interest who
live to protects us from pillaging, plundering monopolists, all the while
doing a little undercover raping of their own, all I can say is, "it's a
Wonderful Society".
And who wouldn't want to be a member of such a society, and who wouldn't
want to intervene on the behalf of its citizens, none of whom have,
apparently, yet "proved their worth" on this planet? (I'm surprised
there's still so many of them, considering all the "good" guys trying to
help them, and considering that they've been receiving "help" for their
condition from everywhere - left and right, up and down, here and there -
for many, many, years, now.)
wheN are PEE-ple GOing towake UP.
The Truth is Out There.
..
Blanc
From andrew at sexswap.com Sun Jan 4 13:54:25 1998
From: andrew at sexswap.com (Andrew)
Date: Sun, 4 Jan 1998 13:54:25 -0800 (PST)
Subject: HOW TO GET 2%-10% MORE HITS - I N S T A N T L Y !
Message-ID: <199801051125550830.05126488@sexswap.com>
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
We don't wish to send people email that hate spam...
If you wish to be removed from future mailings, simply
enter your email(s) in the box at http://www.removelist.com. Thanks
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
HOW TO GET 2%-10% MORE HITS - I N S T A N T L Y !
SexSwap is the FASTEST and LARGEST Adult Banner Exchange.
We help webmasters trade banners with 2,000 sites FREE.
We show 22.45 banners every second, 2,000,000 banners a day.
http://www.sexswap.com
I am going to tell you 3 things:
1. How SexSwap can INCREASE your HITS
2. Why PICK SEXSWAP over the competition
3. How to JOIN SEXSWAP
1. HOW SEXSWAP CAN INCREASE YOUR HITS
/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/
Ok, we have to push the pencil around a little bit, I know you hate math, but stay with me...
1. You JOIN team SexSwap Banner Exchange
2. You paste some code
3. You upload your banner
Here comes the math.
Every time your page loads (where you paste the code), we give you 1 credit..and for every 2 credits...we then show your banner on 1 of 2,000 adult sites.
We make it easy to trade banners with 2,000 sites, and only use up one banner slot on your page.
OK, more math...grade 3 stuff ;) ...
let's say your page loads 1,000 times in one day, you get your banner shown 500 times FREE! And if your banner gets a 4% average click-thru rate, then you just got 40 free hits, or 2% more hits (everyday) for 3 minutes work.
BUT IT GETS BETTER
Many sites on SexSwap get a 20% click thru rate...if you have a ratio that high, then you get .2X500 or 100 clicks, which is 10% more hits.
BUT IT GETS EVEN BETTER
You can join as many times as you wish and paste different code on every damn page of your site...MULTIPLYING THE EFFECTS....so some people can ratchet
20-30% more hits, just buy JOINING SexSwap and by pasting the code on several pages of your site.
2. WHY CHOOSE SEXSWAP OVER THE COMPETITION
/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/
WE WANT YOU ON THE SEXSWAP TEAM!
We are the largest adult banner exchange with 2,000+ member sites.
We are the fastest banner exchange showing 20+ banners per second.
We are the only banner exchange with 5 features dedicated to catching CROOKS! We keep the traffic CLEAN.
We are the only banner exchange to publish the weekly SexSwap News that is chock full of tips and tricks...some members say that the newsletter is worth its weight in gold.
3. HOW TO JOIN SEXSWAP IN 2-3 MINUTES
/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/_/
We are the only adult banner exchange where the owner is the tech support and responds to email within hours...not days...I WILL HOLD YOUR HAND!
We can't double your hits, but we can give you a 2%-10% boost in hits without pain.
http://www.sexswap.com
check us out, compare us to the competition, test our speed.
http://www.sexswap.com
Andy
From alan at clueserver.org Sat Jan 3 23:39:21 1998
From: alan at clueserver.org (Alan)
Date: Sun, 4 Jan 1998 15:39:21 +0800
Subject: Guns: H&K, G3, 7.62 v 5.56 [Guns] (fwd)
In-Reply-To: <199801032150.QAA29689@mx02.together.net>
Message-ID: <3.0.5.32.19980103231222.036b7b90@ctrl-alt-del.com>
At 04:50 PM 1/3/98 -0500, Brian B. Riley wrote:
> There may be .50-cal bolt actions out there that are one man
>carries, but the Barrett gun is a three man load. The gun is 57 inches
>long and weighs 32.5 pounds, unloaded with no scope. The primary
>mission of the gun is not man sniping, though I am sure it often has
>been and will be used in that role, but its main aim is to long range
>snipe and disable antennae, dishes, equipment, etc using the AP and
>API ammunition.
When I lived in Alaska I knew someone who built such a thing for hunting
bears. I never got to fire it, but it was supposed to have a kick like a
mule. (Even with the shock absorbing stock.)
The hardest part is getting the 50 cal ammo. (He had his Federal firearms
license and was in the National Guard, so it was not too difficult for
him.) Getting AP and other special ammo would be doubly difficult.
(Non-specialty ammo could be reloaded as long as you could get molds and
primer caps.)
I guess it depends on your military and/or black market connections.
---
| "That'll make it hot for them!" - Guy Grand |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer: |
| mankind free in one-key-steganography-privacy!" | Ignore the man |
|`finger -l alano at teleport.com` for PGP 2.6.2 key | behind the keyboard.|
| http://www.ctrl-alt-del.com/~alan/ |alan at ctrl-alt-del.com|
From wombat at mcfeely.bsfs.org Sun Jan 4 00:45:35 1998
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Sun, 4 Jan 1998 16:45:35 +0800
Subject: Gun Nutz
In-Reply-To:
Message-ID:
On Sun, 4 Jan 1998, Lucky Green wrote:
> On 3 Jan 1998, Ryan Lackey wrote:
> > It would be interesting to fit one's house with speakers/noise generators/
> > flash generators/smoke/etc. to make it look as if one has an automatic
> > cannon or a small army, in response to a raid. It would make a perfect
> > distraction during which to leave :)
>
> [The following is a theoretical discusion. Do not try this at home].
>
> What you really want is the ability to slow down the mobility of the raid
> force while making your exit. In a prolonged siege, the attacker will
> always win. A good way of slowing down the attacker after an initial
> armed response is to deploy chemicals. A combination of Tabun and Mustard
> Gas works best, but don't deploy them at the same time. Use the Tabun
> first for maximium impact. Follow up with the Mustard Gas a few minutes
> later.
Setting this off in an inhabited area is sure to make you a popular hero.
You'd be better off investing in a tunnel. Maybe Seymour Cray could use a
job about now ... ;)
(I never bought that car accident cover - he and Elvis are probably
hangin' out in Tonga)
-r.w.
From kping at nym.alias.net Sun Jan 4 00:48:42 1998
From: kping at nym.alias.net (Kay Ping)
Date: Sun, 4 Jan 1998 16:48:42 +0800
Subject: Location Escrow anyone ?
Message-ID: <19980104083939.14929.qmail@nym.alias.net>
-----BEGIN PGP SIGNED MESSAGE-----
> The FCC may have ruled it, but its doubtful that the carriers can provide
> it. Doing better than than a cell sector will depend on many factors,
> including: specific technology (analog, GSM, CDMA, etc.), frequency and
> local propagation characteristics, especially multipath conditions.
The FCC ruling is a result of lobbying by a company that has actually built such a location device. The requirements are tailored to the capabilities of their device and they probably expect to automatically win the contracts. I don't remember their name but the devices need to be installed in about one out of 3 cellular base stations.
I am only guessing now, but it's not unlikely that they have been assisted in their lobbying efforts by certain three-letter-acronym agencies. They knew that the goverment would look favorably on a device to track people and would eagerly buy their excuse of 911 caller location.
- -----------------
Kay Ping
nop 'til you drop
finger kping at nym.alias.net for key
DF 6D 91 18 A6 59 41 96 - 89 01 69 B7 9D0 4 AE 53
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: cp850
iQEQAwUBNK8o/BHPAso8Qp7tAQFGfgfRAQUYARi6dQYIWyehqBhXMhyvgfYkWN2X
rDDkE/bCr4yfvuYA5e/H3kVhfEh9TXT2m4+F6NmWPmy5WM6s5yuDR3I5t/3EDH8T
uHV/EfkhjiE0HiQgTLB19VGFRXoi9eLlnBaxBcZZK8dknJ/T7rFlthvpUeL3crVl
yD0Swl7lYgeyuG2HLgOLc5v+ej1tDdI27KIjoBj/dCDSoN6gtzj/linCLbjY8NZZ
akY3cQbk3QVrXfJamX+n6X3cwKkI20phrM5DBjh1pdhod6nLvRDPiEkT3prqRTx7
gjrJip/pzCKABUmkWSigXFgQARvkPW6ZqSCnoCSivzgYFxE=
=UcO3
-----END PGP SIGNATURE-----
From blancw at cnw.com Sun Jan 4 02:00:15 1998
From: blancw at cnw.com (Blanc)
Date: Sun, 4 Jan 1998 18:00:15 +0800
Subject: MS: "Setting the Record Straight"
Message-ID: <3.0.32.19980104011838.006a2b20@cnw.com>
For any of you who haven't already searched for & found this:
http://www.microsoft.com/corpinfo/myths.htm
..
Blanc
From paul at fatmans.demon.co.uk Sun Jan 4 05:49:07 1998
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Sun, 4 Jan 1998 21:49:07 +0800
Subject: Freedom Forum report on the State of the First Amendment
In-Reply-To: <3.0.16.19980101165908.0c4f464c@pop.mindspring.com>
Message-ID:
> >No, acts of law which require employers not to discriminate against
> >niggers, wops, kikes or greezers, or any other ratial group infringe
> >basic rights of association, I personally have no racist prejudices, but
> >recognise the freedom of others to be as bigotted as they care to be.
>
> Does that include the krauts, micks, limeys, frogs as well as the
> canucks and pea soup eaters? The polacks, chinks and dagos? The Wogs too?
Indeed it does.
> Which reminds me. We never did get a good one for the Russians. Any
> nominations?
Reds is always a good one, and especially ignorant and offensive since
the communist tyranny was replaced with a "democratic" one. Can`t think
of any others offhand.
Datacomms Technologies data security
Paul Bradley, Paul at fatmans.demon.co.uk
Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org
Http://www.cryptography.home.ml.org/
Email for PGP public key, ID: FC76DA85
"Don`t forget to mount a scratch monkey"
From nomdomain at 10889.com Sun Jan 4 22:42:19 1998
From: nomdomain at 10889.com (unknown)
Date: Sun, 4 Jan 1998 22:42:19 -0800 (PST)
Subject: The Virtual Law Library
Message-ID:
This is the time of year when we all sit down to reflect on last year and set some new goals for the coming year. What kind of year was 1997 for you? What will be your goals for 1998? Why not make prosperity your goal for '98? There are many things that come under the auspices of 'prosperity' including time, money, love, success, balance, joy, comfort, beauty, good health, wisdom, etc.
Are you prosperous with your time? Or, do you always feel rushed and pressured? Do you always feel there's not enough time to do the things you want to do? Then you have poverty with respect to time. Wall Street Journal wrote that leisure time, not money, will be the status symbol of prosperity in the coming years.
There is now a new legal research tool available that will not only save you countless hours of unbillable time, but also allows you to efficiently locate the same information available through Westlaw and Lexis Nexis without paying one minute of on-line fees. And the best part is, it doesn't cost you $500. to $1,000. a year in additional service charges.
If you think this is too good to be true, WinServices Technologies' Virtual Law Library on CD-ROM will, however, cost you $69.95. The Virtual Law Library will unleash the full power of your personal computer by giving you access to more than 15,000 free legal research sites on the Internet.
Jane Block, the National Federation of Paralegal Associations' Cyberparalegal of the Year, states that "by using the Virtual Law Library I am able to cut my research time on the Internet by more than 75%."
Rob Lloyd, a third-year law student at Seattle University Law School, claims that "the Virtual Law Library is so comprehensive, it has almost eliminated my trips to the Law Library."
Come visit us at:
http://www.winservices.com/
Order your Personal Edition through our secured Web Site at:
http://www.winservices.com/legalresearch/library/
For more information or to order your Personal Edition of the Virtual Law Library call: 253-813-6930
To rush your order simply fill out the order form below and fax it to our 24 hour order line at: 253-813-6980 or
Mail your order to:
WinServices
P.O. Box 23845
Federal Way, WA 98093-0845
ORDER FORM
----------------------------------------------------------------------
Your Name________________________________________________________
Your Address______________________________________________________
Your City_________________________________________________________
State / Zip_________________________________________________________
Phone #: ________-____________-__________________
(For problems with your order only. No salesmen will call.)
Email Address_____________________ at __________________________
We Accept Checks or Money Orders along with all Major Credit Cards
including Visa, MasterCard, Discover and American Express (NOTE - We only ship to the address listed on the credit card)
(Please Fill Out the Section Below and Make sure that the above name and address are listed as it appears on the card) for $69.95
Credit Card Number: _____________________________________
Expiration Date: __________/____________
Signature: ____________________________
Date: _______________________
Or order your Personal Edition through our secured Web Site at:
http://www.winservices.com/legalresearch/library/
Thanks for ordering the Virtual Law Library!
Please allow two weeks for shipping and handling.
From shamrock at cypherpunks.to Sun Jan 4 07:32:35 1998
From: shamrock at cypherpunks.to (Lucky Green)
Date: Sun, 4 Jan 1998 23:32:35 +0800
Subject: Smartcard readers
Message-ID:
Several people inquired about obtaining one of the universal smartcard
readers the Cypherpunks Smartcard Developer Association built in the past.
As our knowledge about commercial readers increased, we were able to add
support for commercial readers from several manufacturers such as Gemplus,
Schlumberger, and Philips. Therefore, there is no need to for another
production run of our own reader. If you wonder which reader to buy, I
like the Gemplus best. If you have a reader we don't already support, send
me a sample and we'll add it.
Our smartcard software is at https://www.cypherpunks.to/scard/
Have fun,
-- Lucky Green PGP v5 encrypted email preferred.
"Tonga? Where the hell is Tonga? They have Cypherpunks there?"
From brianbr at together.net Sun Jan 4 07:54:43 1998
From: brianbr at together.net (Brian B. Riley)
Date: Sun, 4 Jan 1998 23:54:43 +0800
Subject: Fwd: Yup
Message-ID: <199801041548.KAA21685@mx02.together.net>
---------------- Begin Forwarded Message ----------------
Date: 01/03 10:00 AM
Received: 01/04 10:37 AM
From: Bruce Alan Johnson, baj at sover.net
To: Brian B. Riley, brianbr at together.net
MISTAKEN IDENTITY: Police in Bangkok, Thailand, arrested an American
tourist who climbed repair scaffolding to the top of Wat Arun (Temple
of the Dawn) and refused to come down. After 10 hours, the man was
subdued by police and turned over to the American Embassy. He
identified himself as God, but officials determined he was Brandon
Simcock, 27, an employee of Microsoft. (Bangkok Post) ..."Termination
Notice. Reason for Termination: Impersonating CEO."
----------------- End Forwarded Message -----------------
Brian B. Riley --> http://members.macconnect.com/~brianbr
For PGP Keys
"Journeys are about discovery, about lives touching briefly and then
parting,
except on the Internet, where distant lives can intertwine, and where a
journey of discovery never has to end." -- Jim Heid
From 15952576 at compuserve.com Mon Jan 5 00:06:43 1998
From: 15952576 at compuserve.com (15952576 at compuserve.com)
Date: Mon, 5 Jan 1998 00:06:43 -0800 (PST)
Subject: The De Facto Standard
Message-ID: <451534865234.GBB21218@compuserve.com>
{Removal instructions at bottom... }
**** Attention Internet Marketers/Mass E-mailers ****
THE HANDIEST PIECE OF SOFTWARE YOU WILL EVER OWN!
Is preparing your e-mail lists for mailing a tedious and
time-consuming affair? AUTOMATE those tasks with:
<><> BulkMate v4.0 - the de facto standard in ultra high-speed
<><> e-mail list processing/management - US$99.
NOTE: For the first 500 customers - FREE 37 Million e-mail address CD.
(..or if you just want the CD only - US$69).
Try BulkMate v4.0 for 5 full days at no cost by downloading the
FULLY FUNCTIONAL demo at our web site. Just for trying it we'll
give you 250,000 e-mail addresses free.
This software will save you HOURS of work. It's the definitive tool
in preparing your lists for mailing. (Works for Win95, Win.3.1,and
Win NT). There is nothing else out there like this software that
even comes close.
..Just double-click on this web page link :
http://cus.alpina1.net/worldwide/
Best Regards,
Worldwide Marketing Group
P.S: If you have received this message more than once, we apologize.
For removal from any future mailings, just send a blank e-mail to
this address:
wmgremv at alpina1.net
From Pads at mouse.com Mon Jan 5 00:27:41 1998
From: Pads at mouse.com (Pads at mouse.com)
Date: Mon, 5 Jan 1998 00:27:41 -0800 (PST)
Subject: Personalized Mouse Pads
Message-ID:
Have you ever wondered why your mother gave you the name she did? Were you named after
a close relative, family friend or possibly a television celebrity?
Well, we can't tell you why either! However, what we can tell you is exactly what your name
means!
We print your name and it's meaning on an attractive mouse pad with a custom art background
of vibrant colors and scenery. Not only is it pleasant to look at, but everytime you sit down to your
computer, you'll be reminded of just how great you are.
We have the largest most comprehensive database of names anywhere. And we can print
names in both Spanish and English.
We are so sure you'll be pleased with your personalized mouse pad, that we offer a 30 day
unconditional money back guarantee.
Placing your order is easy too! Just complete the order form below and mail it along with just $10
plus shipping and handling. (see below), and we will rush your personalized mouse pad by first class
mail.
Choose your background preference!!
ABC BLOCKS ANGELS CLOUDS
DOLPHINS PRAYING HANDS SPORTS
TEDDY BEAR UNICORN or WATERFALL
EASY ORDER FORM
NAME REQUESTED MALE/FEMALE BACKGROUND PREF.
_________________ ____________ ________________________
_________________ ____________ ________________________
_________________ ____________ ________________________
QUANITY ORDERED_______________ AMOUNT SENT$_______________
CASH CHECK OR MONEY ORDER'S ONLY!!!! US FUNDS ONLY!!!!!!!
USA MAILORDERS $12 EA OVERSEAS ORDERS $14 EA
(includes $2 shipping/handling charge) (includes $4 shipping/handling charge)
MOST ORDERS SHIPPED WITHIN 48 HOURS. IF PAYING BY CHECK, YOUR ORDER WILL
BE SENT IMMEDIATELY FOLLOWING BANK APPROVAL.
PLEASE MAIL YOUR ORDER TO: 3J PRODUCTS
PO BOX 7183
OXNARD CA 93031
From eureka at eureka.abc-web.com Mon Jan 5 01:46:34 1998
From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com)
Date: Mon, 5 Jan 1998 01:46:34 -0800 (PST)
Subject: Eureka! Mon Jan 5 '98
Message-ID: <19980105081629.11349.qmail@eureka.abc-web.com>
Welcome to Monday's issue of Eureka!
FRESHTEENS!
Is there no end to it? Yet again we have succeeded in obtai-
ning a FREE one week trial, for all Eureka! subscribers at
another of the net's finest websites. Freshteens offers over
200 video feeds, hot live, sex shows, hard XXX movies, hot
XXX stories, exclusive Texas Teens, and a comprehensive gay
area too. You need a credit card to verify you are an adult,
but will not be charged for your FREE membership. Excellent!
Freshteens ........... http://www.freshteens.com/cproot/1217
GAYEUREKA!
The gay newsletter is now available. You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/
EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPA�OL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRAN�AIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm
SOFTVELVET
"Our Pictures are NOT the same old pics you have seen a 100
times before. Nor are they burnt out porn models... They are
young, fresh and eager!!" Some decent pix, including blow
jobs and anal. Long dicks, facials, not a bad site to see.
Softvelvet ...................... http://www.softvelvet.com/
SEX YOU
This is a horn dog zone! Super fast loading free pix. Great
pussy shots, bent over and in your face. Dick sucking in the
health club. This site may just cause a stir in your loins!
Sex You ................. http://www.arg-inc.com/sexwarn.htm
PUSSY EATERZ
Just a few pix but they are pretty large and feature some a
few hot and horny tramps having their bush sucked, squeezing
their tits and all that jazz. Another browser will open for
the pix, then will rotate them through. Finger lickin good!
Pussy Eaterz! ........... http://sexplosion.com/pussyeaters/
WHACKING ZONE
Way down at the bottom there is a text link that says, "cum
inside Whacking Zone!" Hit that and your in. You have to
click around a little but the pix are there. The webmaster
has little descriptions of each, like, "hot babe spreading
her legs for you to get a great glimpse of her pussy." Mmm!
Whacking Zone .............. http://www.ultrafreexxx.com/wz/
FREE CONTEST!
This week's brand new competition. A� free three-month memb-
ership is� up for grabs daily at HardCoreSmut.Com! A $75.00
Value! So are you ready to win?� Simply visit the site and
click on "FREE GUIDED TOUR". Then email us the answer to
this question: "How Many Live No DownLoad Sex Shows do
members get?" Send answers to mailto:contest at www.usachat.com
HardCoreSmut .................. http://www.hardcoresmut.com/
FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet. However, many of the feeds use the RealPlayer and will
work in most browsers. If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Four LIVE feeds ........... http://www.holler2.com/vidx.html
CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars you will meet most days. It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/
THE BEST PHONE SEX
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416
AMATEUR SITE OF THE DAY
OASIS: The Internet's queen of exhibitionism, not only does
she love to get nude and nasty in public, but her webpage is
awesome! Easy to navigate, nice graphics, and very well des-
igned. Oasis loves group sex and has been known to take on
up to 4 guys a once! She also loves to play with the ladies.
Oasis loves to travel, she may be coming to a city near you
who knows you may get lucky. But until then catch a glimpse
of the sexual dynamo!
TODAY'S FREE PIX
OK, it's the new year, and now we are really going to start
getting in gear, with some of the hottest FREE photos ever!
Pic 1 ........................... http://137.39.63.229/?050
Pic 2 ........................... http://137.39.63.229/?051
Pic 3 ........................... http://137.39.63.229/?052
Pic 4 ........................... http://137.39.63.229/?053
Pic 5 ........................... http://137.39.63.229/?054
Pic 6 ........................... http://137.39.63.229/?055
Pic 7 ........................... http://137.39.63.229/?056
Pic 8 ........................... http://137.39.63.229/?057
Pic 9 ........................... http://137.39.63.229/?058
Pic 10 ........................... http://137.39.63.229/?059
PLEASE VISIT THIS EUREKA! PARTNER SITE
SWEET TEENS ! Over 2500 Teen Hardcore Pics !
http://www.sweet-teens.com
SWEET TEENS ! Over 3000 Teen Pics and Movies sorted into the
following Sections: Teen Series, Actio Series, Lesbian
Teens and much much more ! NEW: The original Pics and Videos
from Pamela Andersons XXX Movie ! Cum get em !!
===========================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS NEWSLETTER BACK TO US.
===========================================================
From tcmay at got.net Sun Jan 4 10:07:01 1998
From: tcmay at got.net (Tim May)
Date: Mon, 5 Jan 1998 02:07:01 +0800
Subject: My last comment (for now) on rifles
Message-ID:
At 11:12 PM -0800 1/3/98, Alan wrote:
>When I lived in Alaska I knew someone who built such a thing for hunting
>bears. I never got to fire it, but it was supposed to have a kick like a
>mule. (Even with the shock absorbing stock.)
>
>The hardest part is getting the 50 cal ammo. (He had his Federal firearms
>license and was in the National Guard, so it was not too difficult for
>him.) Getting AP and other special ammo would be doubly difficult.
>(Non-specialty ammo could be reloaded as long as you could get molds and
>primer caps.)
>
>I guess it depends on your military and/or black market connections.
You must be thinking of some other (larger) caliber, as .50 BMG is readily
available. At my local gun shop, $3 a round. (It may be cheaper elsewhere.)
A gun shop over in Silicon Valley was selling a belt-fed, semi-automatic
.50 BMG for about $7K, if I recall the ad correctly. They were selling
shots with it for $5 a shot, and advertising it as "Diane Feinstein's Worst
Nightmare."
.50 caliber is the largest readily available caliber (Uncle has limited
larger calibers only for His own use, not for the use of the Rabble.)
And there are several .50 BMG rifles readily for sale, mostly ranging from
$3000 to $6000. The Barrett is the most commonly talked about version.
Personally, I can't see the point of a .50, even for hunting bear. (Not
that I would _want_ to hunt bears, as I find bears preferable to most
humans, by far.) A .300 Winchester Magnum, a .375 H&H, or a .338 Lapua
Magnum should be more than enough, and a whole lot cheaper than a Barrett
or somesuch.
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From anon at squirrel.owl.de Sun Jan 4 10:53:27 1998
From: anon at squirrel.owl.de (Secret Squirrel)
Date: Mon, 5 Jan 1998 02:53:27 +0800
Subject: Microsoft
Message-ID: <186eae90d0afdcd691326a13f1ad8b66@squirrel>
>At 02:25 AM 1/4/98 +0100, Anonymous wrote:
>>
>>Windows is still fucking me up the ass! I'm bleeding to death here!
>
>Then get a copy of Linux and stop whining!
>
>Sheesh!
Usually when somebody says something like that they're refering more to
Microsoft indirectly borking them. For instance, people send around MS Turd
documents. You have to buy MS Turd. Some Windows lamers send out HTML email.
Many (most?) are clueless on USENET. Many (most?) don't like to type at all,
and choke and die when they get into an environment where they have to.
People walk into computer labs and are stuck with the pathetic environment
that is Windows. And this doesn't even count the "Everyone is running
Windows" and "Everything is da web" folks.
It wouldn't be so bad if there was full source to everything and it didn't
cost an arm and a leg, or if it didn't suck. But there isn't, it does, and
that's putting it mildly.
I can hear the cries of "You're anti-business!" and "You're just a UNIX
weenie!" already. I just remember back when the average net user had
somewhat of a clue. When the network went "to the masses" and people went
out of their way to make it point and click the drooling lemmings were
attracted to it. And of course where the drooling lemmings go the people who
take advantage of the drooling lemmings follow, e.g. spammers.
My attitude about this pretty much went down the toilet when I was called a
"UNIX weenie" because I suggested that a Windows user deliver his own mail
while the ISP's SMTP server was down. Then of course the Windows flamer
decided to start denouncing the very notion of RFCs, then started rambling
about POP3 and IMAP. And of course I implied "that we all run UNIX" because
I used the word "daemon" -- yeah, apparently Windows is so bad that this
user didn't even know it *could* run background processes.
No, I wasn't the original writer, but I see where the original author was
coming from...I think. Yes, I use Linux. Yes, I remember MAKE.MONEY.FAST but
it was nothing like the spam we get today and was few and far between.
From bill.stewart at pobox.com Sun Jan 4 12:16:27 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Mon, 5 Jan 1998 04:16:27 +0800
Subject: PGP-out-only vs. hashcash aware remailers?
In-Reply-To:
Message-ID: <3.0.3.32.19980104120940.00722cdc@popd.ix.netcom.com>
At 05:40 PM 12/30/1997 -0400, Privacy Admin wrote:
>Since I've switched to type-I pgponly remailer I haven't had a problem
>with spammers. I've been wondering if hashcash makes sense for remailers,
>or [only] for mail2news gateways.
>
>I guess I am looking for any means of controlling spammers using remailers
>and mail2news gateways.
Hashcash won't help mail2news, except by discouraging dumb spammers,
because news spam only needs a few messages.
PGP-only input will cut down on most spammers, though you'll still get
a few, especially if they're spamming mailing lists (which makes the
encryption both worth the effort and useful for safety.)
If you modify your remailer to only _output_ PGP-encrypted messages,
you get hashcash-equivalence, and cut abuse substantially.
The cost is limiting recipients to pgp users (plus known exceptions),
but it's tough to spam people when you need to look up their PGP key
and encrypt to it (at least you'll only get spams for high-tech stuff),
and it's tougher for random abusers to abuse people since most targets
don't have PGP keys, and a mailbox full of PGP junk is less annoying
to most people than a mailbox full of human-readable hate mail.
In particular, it's harder to send death threats to politicians
if they don't have published PGP keys.
Is this a feature that makes sense?
PGP-out-only remailers aren't as useful for anonymous tip lines
(unless the tip line has a PGP address.)
They're not as useful for inviting new people into your conspiracy,
though they're fine for conspiring with people whose keys you already know
(and they can be unlisted keys only used for the conspiracy.)
If the Bank of Caribbean Cash Importers is interested in taking
anonymous clients who contact them through remailers, they've
probably got a PGP key handy to send to anyway.
They're not transparently useful for mail2news, but the remailer
could make exceptions for known mail2news sites, or could ignore
the problem, which is fine for posting to alt.anonymous.messages,
though not for posting to alt.whistleblowers.
How would you implement it?
Obviously you'd need to allow some unencrypted lines at the beginning,
at least if they have remailer syntax( ::, ##, mail headers, etc.).
Do you cut all lines after the "-----END PGP"? My first impression was
yes, but after reading the Freedom Remailer source, it looks like
this might kill messages using encrypted reply blocks, so maybe not.
Detecting the PGP itself can be crude ("----- BEGIN PGP ENCRYPTED"...)
or can be a bit fancier (make sure the lines are all the right length
and limited to the correct character set),
or much fancier (de-armor and look for PGP blocks).
Even the fancy approaches can be spoofed, since you can't go very
deep into the headers without the right keys, so a couple lines of
real PGP material could be included, leaving possibilities like
::
Request-Remailing-To: Your Mama
##
Subject: My Guitar Wants to Kill Your Mama
-----BEGIN PGP MESSAGE-----
Version: PGP for Personal Privacy 5.0
Comment: PGP allows arbitrary comments, so Decrypt This!
hQCMAynIuJ1VakpnAQP+MWng0I6TnDf/U83KCttjYZQSnPQjS59rw+M+iSmTGLIs
btqW5hn1HXheSb8GNifAWz2rqgdH3GqjZ5rRBDF5tZfQfV5kNNYE1XpT/CMgAsDh
3IkaeOumDKXON+8acl5X7NToSjml+mkxkF7kE9u5oxCEXErDjS3k2wOtv0krNfSk
HeyChelseaaaaaaaaaaaaaaaaaaBWAHAHHAHAHAHAHAHAHAHAHHAHAHAHAHAHAHA
MyGuitarWantsToKillYourMamaBWAHAHHAHAHAHAHAHAHAHAHHAHAHAHAHAHAHA
MyGuitarWantsToKillYourMamaBWAHAHHAHAHAHAHAHAHAHAHHAHAHAHAHAHAHA
MyGuitarWantsToKillYourMamaBWAHAHHAHAHAHAHAHAHAHAHHAHAHAHAHAHAHA
-----END PGP MESSAGE-----
and your little dog, too!
But at least it's a start.
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From rah at shipwright.com Sun Jan 4 12:35:45 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Mon, 5 Jan 1998 04:35:45 +0800
Subject: BOOK: Forthcoming - J Gray, _Hayek on Liberty 3rd edition_
Message-ID:
--- begin forwarded text
Date: Sat, 3 Jan 1998 13:34:30 EST
Reply-To: Hayek Related Research
Sender: Hayek Related Research
From: Gregransom
Organization: AOL (http://www.aol.com)
Subject: BOOK: Forthcoming - J Gray, _Hayek on Liberty 3rd edition_
To: HAYEK-L at MAELSTROM.STJOHNS.EDU
>> Hayek Web <<
Routledge -- Hayek's publisher in England and on the Continent of Europe,
on the Web at:
http://www.routledge.com/
>From the Routledge Web site:
"_Hayek on Liberty Third Edition_
John Gray, Jesus College, University of Oxford
Published by Routledge
Pb
ISBN/ISSN: 0-415-17315-9
>From the previous edition: ...
"In Hayek on Liberty John Gray treats Hayek primarily as a philosopher. His
book is analytical, not hagiographical, and almost certainly the best book on
the subject.' - Samuel Brittan, Financial Times
'The most generally accessible book on Hayek so far.' - Anthony Quinton,
Times Higher Education Supplement
...
Hayek's achievements in social and political philosophy are increasingly
receiving full recognition. _Hayek on Liberty 3rd Edition_ is a concise yet
exhaustive and provoking study of this classic liberal philosopher which
examines the structure and impact of his system of ideas and locates his
position within Western philosophy. Not available since the 1980s this
up-dated 3rd edition contains a postscript which assesses how far the
historical developments of the last ten years can be deployed in a critique
of Hayek's thought. This book will contribute to a much needed wider
debate on the future of conservatism.
192 pages
Dimensions: 5 1/2 x 8 1/2 inches; 216 x 138 mm
Status: Coming Soon"
Hayek on the Web is a regular feature of the Hayek-L list.
--- end forwarded text
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!:
From root at ssz.com Sun Jan 4 15:31:38 1998
From: root at ssz.com (root)
Date: Mon, 5 Jan 1998 07:31:38 +0800
Subject: index.html
Message-ID: <199801042353.RAA20982@einstein.ssz.com>
Welcome to the Cypherpunks Distributed Remailer.
This mailing list is sponsored by The Armadillo Group and other indipendant
operators. The purpose of this mailing list is to explore the frontier of
cryptography, civil liberty, economics, and related issues.
This is a very high traffic mailing list.
Several members of the mailing list are involved in various types of events
through the year. Participation by members of the list does not construe any
support or affilliation with the mailing list. Contact the author of all
works obtained through the remailer network. They retain original rights.
Please let others know about this mailing list, the more the merrier!
To subscribe to the CDR you should contact the individual operators as
conditions at each remailer site may be quite different. To subscribe
through SSZ you should send a note to list at ssz.com or send an email to
majordomo at ssz.com with 'subscribe cypherpunks email_address' in the body.
If you have questions or problems contact list at ssz.com
There may be local groups of members who have regular (or not) meetings
in order to discuss the various issues and projects appropriate to their
individual membership. These groups generaly announce their meetings via the
CDR. Please feel free to make appropriate announcements of activity in your
area.
Austin Cypherpunks
From vznuri at netcom.com Sun Jan 4 15:51:47 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Mon, 5 Jan 1998 07:51:47 +0800
Subject: rant on the morality of confidentiality
Message-ID: <199801042341.PAA26750@netcom5.netcom.com>
I posted this to PM's mailing list, but he apparently zapped it
without comment. so here it goes to a less authoritarian
forum. context: posters to his list were remarking on the
recent declassification of information in Britain that suggested
they had discovered the key aspects of RSA before it was
discovered in the open literature by Diffie & Hellman etc.
------- Forwarded Message
To: cryptography at c2.net
Subject: a rant on the morality of confidentiality
scientists who agree to government secrecy to develop
their inventions are agreeing to a lot more than
mere secrecy. they are committing to a paradigm that
is at odds with science itself, which only advances through
the open literature.
furthermore, they are giving away their power, so to speak,
to governments that do not have the same motives they do.
essentially they are working for a war machine, or a
suppression machine. how can they be sure their inventions
will not be used for dark purposes? imho, by not working
within a system that poses that risk. that no such system
seems to exist is irrelevant. a truly responsible scientist
would help create one and wouldn't work without one.
I think the scientists who worked on the atom bomb and today
within the NSA are working under a key false assumption. "if we
don't develop it, the enemy will, and he will use it
against us". but perhaps if scientists around the world
united against the government warmongers that have been
manipulating them for many generations, particularly
within the 20th century with grotesque results, perhaps
a different story would emerge. yet even Einstein himself
urged our government to "develop a weapon of mass
destruction before the Joneses do". how smart is that?
perhaps scientifically clever, but morally, socially, and
spiritually vacuous.
it is a feeble mind in my opinion who
takes refuge in the saying that "technology is neutral".
perhaps so, but not the humans who use and *develop* it,
and the latter are particularly responsible for the former.
how smart were those nuclear weapons scientists, anyway,
such as Feynmann? imho they agreed to the terms of their
own manipulation, and failed to question their basic
motives and intents and of those who paid them.
I believe those that work within the NSA and other secret
agencies are betraying the principles of science under the
guise of protecting humanity. I believe they have the
power to change this system, but they have reneged on their
responsibility as human beings.
Wayner covers the simplistic issues in his piece for the
NYT, but they key issues at stake are far deeper and have
never even been recognized by some of the so-called
greatest minds of our century.
so I view with distaste, to say the lest,
the scientists who later try to break the
secrecy and come out in the open merely so that
they can have credit for something that was classified
they claim to deserve. they deserve
credit only for supporting and participating in a vast
and sinister system of scientific manipulation for dark
and inhumanitarian purposes.
Chomsky is one of the few scientists of our time who
has the brilliance to recognize the ulterior side of the government
we support. surprise! he is largely ignored or even
blacklisted by his morally- and socially- handicapped colleages
who believe it is not their place to question the status
quo, but only to fit into it or advance through it.
all those scientists who have ever complained about the
lack of funding for your branch, or who have fought with
each other over the scraps handed to you like dogs--
do you have any concept of how much tax money is put into
military research? how much is funnelled into the NSA?
this is money that is funded by the public for public
welfare-- is it really being used for that?
NSA and other secret agencies have become vast parasites
feeding on public dollars that have no accountability, and
largely because scientists, who should lead the pack, instead
lack the intelligence to recognize it or the courage to challenge it.
these are my thoughts as I read how the NSA's Inman pops
up to say that the credit for RSA is the NSA's, or a British
agency does the same.
secrecy is directly contradictory to the principles upon
which this country is founded. and imho it is becoming a large
source of its ongoing demise.
quite simply, the scientists are fiddling while Democracy burns.
------- End of Forwarded Message
From tcmay at got.net Sun Jan 4 18:36:34 1998
From: tcmay at got.net (Tim May)
Date: Mon, 5 Jan 1998 10:36:34 +0800
Subject: Why some people are making nerve gases and such to defendthemselves
In-Reply-To:
Message-ID:
At 6:19 PM -0800 1/3/98, Lucky Green wrote:
>What you really want is the ability to slow down the mobility of the raid
>force while making your exit. In a prolonged siege, the attacker will
>always win. A good way of slowing down the attacker after an initial
>armed response is to deploy chemicals. A combination of Tabun and Mustard
>Gas works best, but don't deploy them at the same time. Use the Tabun
>first for maximium impact. Follow up with the Mustard Gas a few minutes
>later. The underground irrigation systems common on California properties
>are ideal means of gas deployment. You should be able to retrofit the
>system for under $500. Assuming you already have the gas. Of course you
>need to make sure to keep a chem suit at home.
In an age where it is accepted (and unpunished) behavior for the black-clad
ninja warriors to shoot through pregnant women, to burn children to death
in the name of publicity for the BATF, to raid the home of a woman who
refused to answer questions of the State psychiatric police, to shoot to
death a retired doctor who the raiders accidentally hit, and on and on,
other measures are needed.
(In none of these cases have the guilty parties been punished. If the State
will not restrain itself, other measures will be needed.)
This may well be why militias and survivalist groups are so actively
developing chemical and biological agents. (I hear that even some of the
dopers in the hills have gotten interested in Sarin release systems. Hoo
boy!)
Sad, but maybe one has to fight fire with fire. If a hundred SWAT
stormtroopers surround a compound and prepare to burn it down, releasing
the countermeasures may be needed.
In fact, leaking (no pun intended) word that a home has CBW deadman
switches may make the ninjas a bit less trigger-happy.
--Tim May, whose house is _not_ booby-trapped with Sarin, or Tabun, or
anything else, but who will defend to his death his right to talk as he
wishes about such things.
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From ichudov at Algebra.COM Sun Jan 4 19:34:51 1998
From: ichudov at Algebra.COM (Igor Chudov @ home)
Date: Mon, 5 Jan 1998 11:34:51 +0800
Subject: .50 ammo
In-Reply-To: <3.0.5.32.19980103231222.036b7b90@ctrl-alt-del.com>
Message-ID: <199801050324.VAA21481@manifold.algebra.com>
Alan wrote:
> At 04:50 PM 1/3/98 -0500, Brian B. Riley wrote:
> The hardest part is getting the 50 cal ammo. (He had his Federal firearms
> license and was in the National Guard, so it was not too difficult for
> him.) Getting AP and other special ammo would be doubly difficult.
> (Non-specialty ammo could be reloaded as long as you could get molds and
> primer caps.)
>
> I guess it depends on your military and/or black market connections.
I have seen what appeared to be .50 ammo (probably not AP) in gun stores.
- Igor.
From tcmay at got.net Sun Jan 4 19:57:24 1998
From: tcmay at got.net (Tim May)
Date: Mon, 5 Jan 1998 11:57:24 +0800
Subject: .50 ammo
In-Reply-To: <3.0.5.32.19980103231222.036b7b90@ctrl-alt-del.com>
Message-ID:
At 7:24 PM -0800 1/4/98, Igor Chudov @ home wrote:
>Alan wrote:
>> At 04:50 PM 1/3/98 -0500, Brian B. Riley wrote:
>> The hardest part is getting the 50 cal ammo. (He had his Federal firearms
>> license and was in the National Guard, so it was not too difficult for
>> him.) Getting AP and other special ammo would be doubly difficult.
>> (Non-specialty ammo could be reloaded as long as you could get molds and
>> primer caps.)
>>
>> I guess it depends on your military and/or black market connections.
>
>I have seen what appeared to be .50 ammo (probably not AP) in gun stores.
Armor-piercing ammo, the common kind, is just steel-core ammo. This is
readily available in most calibers, esp. military calibers. (A less common
kind is "KTW" handgun ammo, which is under some recent restrictions. And
even less common, and almost certainly unavailable to the proles, are
"sabot" rounds, some with tungsten cores.)
Importation of steel-core ammo is under various restrictions. Klinton
recently blocked import of a lot of foreign 7.62x39 steel core ammo, on
nebulous grounds that they represented a threat to the ruling elite and
their police bodyguards.
But it's still widely available. Check the gun shows.
(There is little need for this, for even folks like us. We are not likely
to want to disable fleeing vehicles, etc. And even conventional lead-core
rifle rounds will cut through body armor easily, which is all I care about.)
--Tim May
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From mixmaster at remail.obscura.com Sun Jan 4 20:00:58 1998
From: mixmaster at remail.obscura.com (Mix)
Date: Mon, 5 Jan 1998 12:00:58 +0800
Subject: best body armor for cypherpunks [serious]
Message-ID: <199801050344.TAA10130@sirius.infonex.com>
What is, in your opinion, the best (price and performance-wise)
body armor for cypherpunks?
From mix at anon.lcs.mit.edu Sun Jan 4 20:03:34 1998
From: mix at anon.lcs.mit.edu (lcs Mixmaster Remailer)
Date: Mon, 5 Jan 1998 12:03:34 +0800
Subject: Microsoft
Message-ID: <19980105040003.18797.qmail@nym.alias.net>
>At 02:25 98/01/04 +0100, Anonymous wrote:
>> Windows is still fucking me up the ass! I'm bleeding to death here!
>>
>>
>>
>
>For relief, see: http://www.enemy.org/
Uh, how does one read this in Lynx? The first page instructs you to choose
your nearest location. The "Mirror Sites" page is an image map. Chosing this
"image map" will pop up a series of selections like "(318,85)" and chosing
one of these dies with a 404. There are four options below that: "Russia,"
"France," "Brasil," and "Japan."
Chosing one of these brings you to a bunch of frames which aren't even named
sanely. Frame "ob_li" has nothing in it. Frame "links" has nothing in it.
Frame "un_li" has nothing in it. Frame "oben" has nothing in it. Is anyone
beginning to see a pattern?
Nearest I can tell, the people running enemy.org are just as clueless as the
people programming at Microsoft. It's possible that they're even more
clueless. If they want to attack Microsoft, they need to learn how to make a
web page first.
From ichudov at Algebra.COM Sun Jan 4 20:40:51 1998
From: ichudov at Algebra.COM (Igor Chudov @ home)
Date: Mon, 5 Jan 1998 12:40:51 +0800
Subject: .50 ammo
In-Reply-To:
Message-ID: <199801050436.WAA21960@manifold.algebra.com>
Tim May wrote:
> Armor-piercing ammo, the common kind, is just steel-core ammo. This is
> readily available in most calibers, esp. military calibers. (A less common
> kind is "KTW" handgun ammo, which is under some recent restrictions. And
> even less common, and almost certainly unavailable to the proles, are
> "sabot" rounds, some with tungsten cores.)
By the way, I keep hearing about these sabot rounds but do not know
what they actually are. Could someone please explain. Thank you.
> (There is little need for this, for even folks like us. We are not likely
> to want to disable fleeing vehicles, etc. And even conventional lead-core
> rifle rounds will cut through body armor easily, which is all I care about.)
Many people underestimate the power of most rifles.
- Igor.
From joabj at charm.net Sun Jan 4 20:42:05 1998
From: joabj at charm.net (Joab Jackson)
Date: Mon, 5 Jan 1998 12:42:05 +0800
Subject: Baltimore City Paper editorial on Jim Bell
Message-ID: <3.0.3.32.19980103232529.007b81f0@mailhost.charm.net>
A Bridge Too Far?
----------------------------------------------------------------------------
----
No doubt about it, Jim Bell disliked the government. As far as this
Vancouver, Wash., resident was concerned, there isn't any problem with
Congress that $60 worth of bullets couldn't solve. And he let his opinion
be known in newsgroups, mailing lists, and, perhaps most notoriously,
through an essay he wrote and promoted on the Internet called
"Assassination Politics".
But did Bell-who, federal authorities discovered, had an arsenal of deadly
chemicals and firearms and the home addresses of more than 100 government
workers-have a plan to murder public employees?
"What was interesting is that the whole case was based on whether he'd be
harmful in the future. He hadn't actually hurt anyone, but he was talking
about some scary stuff," John Branton, a reporter who covered the Bell case
for the southern Washington newspaper The Columbian (The Jim Bell Story),
told me by phone.
On Dec. 12, Bell, 39, was sentenced to 11 months in prison and three years
of supervised probation after pleading guilty to using false Social
Security numbers and setting a stink bomb off at a local Internal Revenue
Service office. But authorities acknowledge those charges weren't what his
arrest was really about.
"We chose not to wait until he followed through on what we believe were
plans to assassinate government employees," Jeffrey Gordon, an IRS
inspector, told the Portland, Ore., daily The Oregonian. Gordon likened
Bell to convicted Oklahoma City bomber Timothy McVeigh and Unabomber
suspect Theodore Kaczynski. The federal government's court filing against
Bell stated the belief that the defendant had a plan to "overthrow the U.S.
government." Proof of his motivation, the government asserted, was found in
Bell's Internet writings: "Bell has spelled out parts of his overall plan
in his 'Assassination Politics' essay."
Bell wasn't lacking for firepower. On April 1, 20 armed federal agents
raided Bell's home, where he lived with his parents. According to U.S. News
& World Report ("Terrorism's Next Wave") the feds found three semiautomatic
assault rifles; a handgun; a copy of the book The Terrorist's Handbook; the
home addresses of more than 100 government workers; and a garage full of
potentially deadly chemicals. Authorities had long known that Bell was a
spokesperson for a local libertarian militia and was involved in a
so-called "common-law court" that planned "trials" of IRS employees.
Given what the feds found at the house, in retrospect the raid seems
prudent-as Leroy Loiselle of the U.S. Environmental Protection Agency told
U.S. News, "You don't need nitric acid to keep aphids off your flowers."
It's easy to forget the troubling fact that the government's initial reason
for raiding Bell's residence was "Assassination Politics," which they found
in Bell's car when the IRS seized it back in February. (Bell owed some
$30,000 in back taxes.) Will others who make public their wrath for
government and owe some taxes to Uncle Sam be paid similar visits?
What's perhaps more troubling still is the way the feds held up Bell's
essay as evidence of his violent intent. Reading "Assassination Politics"
makes clear that it is no more a workable blueprint for overthrowing the
government than Frank Herbert's Dune is a realistic plan for urban renewal.
For about two years prior to Bell's arrest, "Assassination Politics"
floated around the Internet. Bell, for instance, sent this essay out on the
cypherpunks mailing list, where scenarios for the future, based on new
technology and libertarian principles, are frequently discussed. None of
the cypherpunks took his "plan" seriously then.
The core of "Assassination Politics" is a plan to establish an anonymous
electronic market wherein people could "wager" money on when public
individuals, be they world leaders or corrupt tax collectors, will die. A
person (say, for instance, an assassin) who correctly "predicts" the day of
a death could anonymously collect the "winnings." Far from being a direct
call to arms, Bell's essay is largely hypothetical, at least until
encryption, traceless digital cash, and mass homicidal hatred of world
leaders becomes widespread. Ugly yes; realistic no.
"I've told Jim Bell on any number of occasions that it would never work,"
Robert East, a friend of Bell's, tells me by e-mail. "If Jim had properly
titled this as a fictional piece of literature he'd have been far more
accurate."
In April, when the Jim Bell story broke, both The Columbian and Time
Warner's Netly News portrayed Bell as a victim whose free-speech rights
were violated. But as evidence against Bell piled up, the sympathy muted
considerably. U.S. News' recent cover story on domestic terrorism,
"Terrorism's Next Wave," opened with the Bell case.
Perhaps Bell was prosecuted for what he wrote rather than what he might do.
(Both friends and family have repeatedly said Bell, though a big talker,
isn't much of a doer. "Jim is a harmless academic [n]erd," East insists.
"I've known him for years and he's harmless.") Perhaps the IRS was spooked
by little more than idle speculation of its demise. But the evidence seems
to have dealt the feds the better hand, and lends credence to the idea
that, for all the protest of free-speech advocates, words are not always
separable from actions.
----------------------------------------------------------------------------
---------------
The Baltimore City Paper:
http://www.citypaper.com
City Paper's Cyberpunk column:
http://www.citypaper.com/columns/framecyb.htm
Archives:
http://www.charm.net/~joabj/
joabj at charm.net
410.356.6274
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 5.0
mQBtAzJFsfEAAAEDAOtSe/7TU8y0ZYBFXp8c6hxwzDIdbIsDtTsvKx2X
v5S65Mdc3vCEFhMuwxceatO4T5IKgBFWJ2r7s9fFKtsAIS4vKCESi+wY7j
5rEZ6oYbaeWlj1yfwjAjg8SUxCjuji1QAFEbQeSm9hYiBKYWNrc29uIDxqb2
FiakBjaGFybS5uZXQ+ =ttEP
-----END PGP PUBLIC KEY BLOCK-----
From ravage at ssz.com Sun Jan 4 20:52:47 1998
From: ravage at ssz.com (Jim Choate)
Date: Mon, 5 Jan 1998 12:52:47 +0800
Subject: best body armor for cypherpunks [serious] (fwd)
Message-ID: <199801050513.XAA22310@einstein.ssz.com>
Forwarded message:
> Date: Sun, 4 Jan 1998 19:44:42 -0800 (PST)
> From: Mix
> Subject: best body armor for cypherpunks [serious]
> What is, in your opinion, the best (price and performance-wise)
> body armor for cypherpunks?
Not being in the vicinity of the fan...
(I couldn't resist)
____________________________________________________________________
| |
| Those who make peaceful revolution impossible will make |
| violent revolution inevitable. |
| |
| John F. Kennedy |
| |
| |
| _____ The Armadillo Group |
| ,::////;::-. Austin, Tx. USA |
| /:'///// ``::>/|/ http://www.ssz.com/ |
| .', |||| `/( e\ |
| -====~~mm-'`-```-mm --'- Jim Choate |
| ravage at ssz.com |
| 512-451-7087 |
|____________________________________________________________________|
From dlv at bwalk.dm.com Sun Jan 4 22:54:50 1998
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Mon, 5 Jan 1998 14:54:50 +0800
Subject: rant on the morality of confidentiality
In-Reply-To: <199801042341.PAA26750@netcom5.netcom.com>
Message-ID: <9RcTie5w165w@bwalk.dm.com>
"Vladimir Z. Nuri" writes:
> I posted this to PM's mailing list, but he apparently zapped it
> without comment.
I'm shocked. I thought the purpose of the perry-moderated list was to
let him reject submissions AND send perrygrams, not just silenty drop
them on the floor!
During the Gilmore/C2net "moderation experiment", Sandy Sandfart not
only silently deleted the submissions he didn't like (he lied when
he claimed that everything he rejects is forwarded to the rejects
list), he also had C2Net lawyers threatening several people whose
articles were rejected, including myself and Timmy May.
Perry can learn a lot from Sandy Sandfart.
---
Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps
From alan at clueserver.org Sun Jan 4 23:13:25 1998
From: alan at clueserver.org (Alan Olsen)
Date: Mon, 5 Jan 1998 15:13:25 +0800
Subject: .50 ammo
In-Reply-To: <3.0.5.32.19980103231222.036b7b90@ctrl-alt-del.com>
Message-ID: <3.0.5.32.19980104222937.03ab0100@clueserver.org>
At 09:24 PM 1/4/98 -0600, Igor Chudov @ home wrote:
>Alan wrote:
>> At 04:50 PM 1/3/98 -0500, Brian B. Riley wrote:
>> The hardest part is getting the 50 cal ammo. (He had his Federal firearms
>> license and was in the National Guard, so it was not too difficult for
>> him.) Getting AP and other special ammo would be doubly difficult.
>> (Non-specialty ammo could be reloaded as long as you could get molds and
>> primer caps.)
>>
>> I guess it depends on your military and/or black market connections.
>
>I have seen what appeared to be .50 ammo (probably not AP) in gun stores.
I am surprised, but I am sure you are correct. It has been quite a while
since I have spent time in gun shops. (My expenditures on ammo is limited
to smaller calibers. I tend not to look at other things because I cannot
afford what I want.)
---
| "That'll make it hot for them!" - Guy Grand |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer: |
| mankind free in one-key-steganography-privacy!" | Ignore the man |
|`finger -l alano at teleport.com` for PGP 2.6.2 key | behind the keyboard.|
| http://www.ctrl-alt-del.com/~alan/ |alan at ctrl-alt-del.com|
From bd1011 at hotmail.com Sun Jan 4 23:18:48 1998
From: bd1011 at hotmail.com (Nobuki Nakatuji)
Date: Mon, 5 Jan 1998 15:18:48 +0800
Subject: Is FEAL developed by NTT safe?
Message-ID: <19980105070034.3946.qmail@hotmail.com>
Is FEAL developed by NTT safe? Where isn't safe if it is here because it
isn't safe?
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
From alan at clueserver.org Sun Jan 4 23:33:09 1998
From: alan at clueserver.org (Alan Olsen)
Date: Mon, 5 Jan 1998 15:33:09 +0800
Subject: .50 ammo
In-Reply-To:
Message-ID: <3.0.5.32.19980104232928.0366bdc0@clueserver.org>
At 10:36 PM 1/4/98 -0600, Igor Chudov @ home wrote:
>By the way, I keep hearing about these sabot rounds but do not know
>what they actually are. Could someone please explain. Thank you.
They are a wooden round made by the dutch for firing into milling machines.
---
| "That'll make it hot for them!" - Guy Grand |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer: |
| mankind free in one-key-steganography-privacy!" | Ignore the man |
|`finger -l alano at teleport.com` for PGP 2.6.2 key | behind the keyboard.|
| http://www.ctrl-alt-del.com/~alan/ |alan at ctrl-alt-del.com|
From tcmay at got.net Sun Jan 4 23:42:28 1998
From: tcmay at got.net (Tim May)
Date: Mon, 5 Jan 1998 15:42:28 +0800
Subject: Sabots
In-Reply-To:
Message-ID:
At 8:36 PM -0800 1/4/98, Igor Chudov @ home wrote:
>Tim May wrote:
>> Armor-piercing ammo, the common kind, is just steel-core ammo. This is
>> readily available in most calibers, esp. military calibers. (A less common
>> kind is "KTW" handgun ammo, which is under some recent restrictions. And
>> even less common, and almost certainly unavailable to the proles, are
>> "sabot" rounds, some with tungsten cores.)
>
>By the way, I keep hearing about these sabot rounds but do not know
>what they actually are. Could someone please explain. Thank you.
Typically a dense projectile inside an outer projectile. (Sabot in French
means "shoe," the origin of course of "saboteur.") The outer projectile can
fall away, leaving the inner projectile to continue. The physics of this is
explained in ballistics sources.
This allows smaller projectiles to be launched out of larger bores. Thus,
high density projectiles can be launched out of .50 BMG barrels. Or large
tank barrels (as in the M-1 Abrams tank) can fire sabot projectiles.
(For example, smaller projectiles made of depleted uranium, which punch
through tank armor and then become liquid and incendiary on the inside of
the tank, killing all occupants in milliseconds.)
The term "sabot" is sometimes used interchangeably with "slug," espeically
with respect to shotguns.
It is also possible to use sabots to build a "two-stage" bullet, with a
smaller round firing from inside a sabot. 6000 fps velocities have been
reported. Or so I read.
As always, using the Web is the way to get such answers quickly. A DejaNews
search on "rec.guns sabot" will turn up many interesting threads.
Especially the older data base.
>> (There is little need for this, for even folks like us. We are not likely
>> to want to disable fleeing vehicles, etc. And even conventional lead-core
>> rifle rounds will cut through body armor easily, which is all I care about.)
>
>Many people underestimate the power of most rifles.
Yep. Every rifle caliber other than .22 LR will penetrate ballistic vests.
Even with a vest rated to stop a .44 Magnum round, from a handgun, the
extra speed from a 16-inch carbine barrel is enough to defeat these vests.
(I have a handy little carbine, the Winchester Trapper, in .44 Magnum. Not
as much punch as an AR-15, but mighty handy.)
More and more "home invaders" (*) are wearing Kevlar body armor, so bear
this in mind.
(* Home invaders are usually gangs of several thieves who enter a home in
force, sometimes by kidnapping the owner and forcing him to let them in,
sometimes just by breaking down the doors. They tend to terrorize the
occupants, tie them up, rape the women, and then, increasingly, kill all
the occupants so as to leave no witnesses. And for "kicks." Of course,
liberals and gun grabbers would have us believe that it is not proper for
homeowners to have guns to defend themselves, that it is for the police to
respond to burglaries. People who think this way are delusional. And if
they go beyond their delusions and attempt to disarm homeowners forcibly,
they ought to be taken out and shot.)
--Tim May
--Tim May
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From alan at clueserver.org Sun Jan 4 23:47:57 1998
From: alan at clueserver.org (Alan Olsen)
Date: Mon, 5 Jan 1998 15:47:57 +0800
Subject: Is FEAL developed by NTT safe?
In-Reply-To: <19980105070034.3946.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980104232746.00b28760@clueserver.org>
At 11:00 PM 1/4/98 PST, Nobuki Nakatuji wrote:
>
>Is FEAL developed by NTT safe? Where isn't safe if it is here because it
>isn't safe?
>From what I have read, FEAL is the punching bag of the cryptographic
community. It has been broken many times by many people at many different
number of rounds. (It seems to be the one that many cryptanalists have cut
their teeth on.)
The history of FEAL does not inspire a whole lot of confidence, no matter
who is selling it.
---
| "That'll make it hot for them!" - Guy Grand |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer: |
| mankind free in one-key-steganography-privacy!" | Ignore the man |
|`finger -l alano at teleport.com` for PGP 2.6.2 key | behind the keyboard.|
| http://www.ctrl-alt-del.com/~alan/ |alan at ctrl-alt-del.com|
From tcmay at got.net Sun Jan 4 23:51:22 1998
From: tcmay at got.net (Tim May)
Date: Mon, 5 Jan 1998 15:51:22 +0800
Subject: Is FEAL developed by NTT safe?
In-Reply-To: <19980105070034.3946.qmail@hotmail.com>
Message-ID:
At 11:00 PM -0800 1/4/98, Nobuki Nakatuji wrote:
>Is FEAL developed by NTT safe? Where isn't safe if it is here because it
>isn't safe?
>
FEAL am not safe if not safe here.
(Try using a search engine or Schneier, Nobuki Nakatuji, to answer these
stupid little Zen koans you keep hitting us with.)
--Tim May
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From dritter at bbnplanet.com Mon Jan 5 05:00:00 1998
From: dritter at bbnplanet.com (Dan Ritter)
Date: Mon, 5 Jan 1998 21:00:00 +0800
Subject: Mobile Account Manager
In-Reply-To: <3.0.3.32.19971216090335.00759eec@pobox3.bbn.com>
Message-ID: <3.0.3.32.19980105075118.0072eec0@pobox3.bbn.com>
At 03:33 PM 1/3/98 -0600, you wrote:
>Mobile Account Manager v1.1 now encrypts the data to the PalmPilot
>database. For more information, check out our site at
>http://www.mobilegeneration.com or you can download the trial version at
>http://www.mobilegeneration.com/downloads/acctmgr.zip. Let me know if
>there is anything else we can do!
>
>Cassidy Lackey
>Mobile Generation Software
>www.mobilegeneration.com
>
>Dan Ritter wrote:
>
>> What sort of encryption is used to protect private information in
>> Mobile
>> Account Manager?
>From http://www.mobilegeneration.com :
>After reviewing the costs and benefits associated with each of the published
> encryption algorithms (DES, RC4, RC5, IDEA, etc...)
we have decided to utilize a
> proprietary Mobile Generation Software data
encryption algorithm. Most
This does not answer my original question, which is: what encryption method
are
you using? All it says is which encryption methods you are *not* using.
> importantly, data encryption must ensure that no
user can view the data in the
> PalmPilot MAM database or the backup MAM database on
the PC. We feel that it
> is highly unlikely that anyone will attempt to
�break� the encryption and therefore the
If I felt that it was highly unlikely, I'd hardly be asking, would I? Poor
cryptography is worse than none - it encourages people to believe their data
is safe when it is not. Good cryptography can stand up to having its
algorithms
made public. Can yours?
> costs incurred by utilizing the published encryption
algorithms would outweigh the
> benefits. Therefore, we are confident that the MAM
encryption algorithm provides
> sufficient data security for the Mobile Account
Manager database.
Without providing more information, customers can not make that decision for
themselves.
>
> Below are the costs associated with utilizing many
of the published algorithms for
> MAM:
>
> U.S. Laws governing encryption software may not
allow for exportation of
> MAM outside of the U.S.
Then you should be active in political groups advocating change of those laws.
In fact, if you really believe in encryption, you might want to offer this as
a test case - even a reporter can see how silly it is not to be able to
protect
your ATM PIN.
> Copyrights and royalties associated with many
of the encryption algorithms
> may increase the cost of MAM.
Many strong encryption algorithms are free.
> Complex encryption algorithms drastically
increase the size of the application
> and slow the response time of MAM.
Many algorithms can be tuned for different levels of complexity.
> If you feel uncomfortable placing your sensitive
data in the PalmPilot, please let us
> know and we will give you some other ideas to ensure
that your data is secure.
I am doing so. I am also copying this to the cypherpunks mailing list,
as other people ought to be made aware of this issue. Nothing I have quoted
seems to be nonpublic information.
-dsr-
From ravage at ssz.com Mon Jan 5 07:06:27 1998
From: ravage at ssz.com (Jim Choate)
Date: Mon, 5 Jan 1998 23:06:27 +0800
Subject: Japanese bank rifled by cyber-thieves [CNN]
Message-ID: <199801051522.JAA23261@einstein.ssz.com>
Forwarded message:
> Cyber-thieves target Sakura
>
> Data stolen from bank's computers leaked to Tokyo mailing-list vendor
>
> January 5, 1998: 8:10 a.m. ET
>
> Sakura seeks restructuring - Dec. 30, 1997
>
>
> [IMAGE]
>
> Sakura Bank
> More related sites... TOKYO (Reuters) - Cyber-criminals rifled
> confidential computer records of a major Japanese bank and stole
> information on customers' names, telephone numbers, addresses and even
> birthdays, the bank said Monday.
> [INLINE] Sakura Bank Ltd. said data on up to 20,000 of its 15 million
> individual customers could have been stolen and that it had confirmed
> that files on at least 37 then were leaked to a mailing-list vendor in
> Tokyo.
[text deleted]
____________________________________________________________________
| |
| Those who make peaceful revolution impossible will make |
| violent revolution inevitable. |
| |
| John F. Kennedy |
| |
| |
| _____ The Armadillo Group |
| ,::////;::-. Austin, Tx. USA |
| /:'///// ``::>/|/ http://www.ssz.com/ |
| .', |||| `/( e\ |
| -====~~mm-'`-```-mm --'- Jim Choate |
| ravage at ssz.com |
| 512-451-7087 |
|____________________________________________________________________|
From raph at CS.Berkeley.EDU Mon Jan 5 07:06:50 1998
From: raph at CS.Berkeley.EDU (Raph Levien)
Date: Mon, 5 Jan 1998 23:06:50 +0800
Subject: List of reliable remailers
Message-ID: <199801051450.GAA13185@kiwi.cs.berkeley.edu>
I operate a remailer pinging service which collects detailed
information about remailer features and reliability.
To use it, just finger remailer-list at kiwi.cs.berkeley.edu
There is also a Web version of the same information, plus lots of
interesting links to remailer-related resources, at:
http://www.cs.berkeley.edu/~raph/remailer-list.html
This information is used by premail, a remailer chaining and PGP
encrypting client for outgoing mail. For more information, see:
http://www.c2.org/~raph/premail.html
For the PGP public keys of the remailers, finger
pgpkeys at kiwi.cs.berkeley.edu
This is the current info:
REMAILER LIST
This is an automatically generated listing of remailers. The first
part of the listing shows the remailers along with configuration
options and special features for each of the remailers. The second
part shows the 12-day history, and average latency and uptime for each
remailer. You can also get this list by fingering
remailer-list at kiwi.cs.berkeley.edu.
$remailer{'cyber'} = ' alpha pgp';
$remailer{"mix"} = " cpunk mix pgp hash latent cut ek ksub reord ?";
$remailer{"replay"} = " cpunk mix pgp hash latent cut post ek";
$remailer{"jam"} = " cpunk mix pgp hash middle latent cut ek";
$remailer{"winsock"} = " cpunk pgp pgponly hash cut ksub reord ?";
$remailer{'nym'} = ' newnym pgp';
$remailer{"squirrel"} = " cpunk mix pgp pgponly hash latent cut ek";
$remailer{'weasel'} = ' newnym pgp';
$remailer{"reno"} = " cpunk mix pgp hash middle latent cut ek reord ?";
$remailer{"cracker"} = " cpunk mix remix pgp hash ksub esub latent cut ek reord post";
$remailer{'redneck'} = ' newnym pgp';
$remailer{"bureau42"} = " cpunk mix pgp ksub hash latent cut ek";
$remailer{"neva"} = " cpunk pgp pgponly hash cut ksub ?";
$remailer{"lcs"} = " mix";
$remailer{"medusa"} = " mix middle"
$remailer{"McCain"} = " mix middle";
$remailer{"valdeez"} = " cpunk pgp pgponly hash ek";
$remailer{"arrid"} = " cpunk pgp pgponly hash ek";
$remailer{"hera"} = " cpunk pgp pgponly hash ek";
$remailer{"htuttle"} = " cpunk pgp hash latent cut post ek";
catalyst at netcom.com is _not_ a remailer.
lmccarth at ducie.cs.umass.edu is _not_ a remailer.
usura at replay.com is _not_ a remailer.
remailer at crynwr.com is _not_ a remailer.
There is no remailer at relay.com.
Groups of remailers sharing a machine or operator:
(cyber mix reno winsock)
(weasel squirrel medusa)
(cracker redneck)
(nym lcs)
(valdeez arrid hera)
This remailer list is somewhat phooey. Go check out
http://www.publius.net/rlist.html for a good one.
Last update: Thu 23 Oct 97 15:48:06 PDT
remailer email address history latency uptime
-----------------------------------------------------------------------
hera goddesshera at juno.com ------------ 5:03:45 99.86%
nym config at nym.alias.net +*#**#**### :34 95.82%
redneck config at anon.efga.org #*##*+#**** 2:00 95.44%
mix mixmaster at remail.obscura.com +++ ++++++* 19:18 95.27%
squirrel mix at squirrel.owl.de -- ---+--- 2:34:19 95.16%
cyber alias at alias.cyberpass.net *++***+ ++ 11:26 95.11%
replay remailer at replay.com **** *** 10:06 94.93%
arrid arrid at juno.com ----.------ 8:50:34 94.41%
bureau42 remailer at bureau42.ml.org --------- 3:38:29 93.53%
cracker remailer at anon.efga.org + +*+*+*+ 16:32 92.80%
jam remailer at cypherpunks.ca + +*-++++ 24:14 92.79%
winsock winsock at rigel.cyberpass.net -..-..---- 9:59:18 92.22%
neva remailer at neva.org ------****+ 1:03:02 90.39%
valdeez valdeez at juno.com 4:58:22 -36.97%
reno middleman at cyberpass.net 1:01:28 -2.65%
History key
* # response in less than 5 minutes.
* * response in less than 1 hour.
* + response in less than 4 hours.
* - response in less than 24 hours.
* . response in more than 1 day.
* _ response came back too late (more than 2 days).
cpunk
A major class of remailers. Supports Request-Remailing-To:
field.
eric
A variant of the cpunk style. Uses Anon-Send-To: instead.
penet
The third class of remailers (at least for right now). Uses
X-Anon-To: in the header.
pgp
Remailer supports encryption with PGP. A period after the
keyword means that the short name, rather than the full email
address, should be used as the encryption key ID.
hash
Supports ## pasting, so anything can be put into the headers of
outgoing messages.
ksub
Remailer always kills subject header, even in non-pgp mode.
nsub
Remailer always preserves subject header, even in pgp mode.
latent
Supports Matt Ghio's Latent-Time: option.
cut
Supports Matt Ghio's Cutmarks: option.
post
Post to Usenet using Post-To: or Anon-Post-To: header.
ek
Encrypt responses in reply blocks using Encrypt-Key: header.
special
Accepts only pgp encrypted messages.
mix
Can accept messages in Mixmaster format.
reord
Attempts to foil traffic analysis by reordering messages. Note:
I'm relying on the word of the remailer operator here, and
haven't verified the reord info myself.
mon
Remailer has been known to monitor contents of private email.
filter
Remailer has been known to filter messages based on content. If
not listed in conjunction with mon, then only messages destined
for public forums are subject to filtering.
Raph Levien
From lists at castle5.castlec.com Mon Jan 5 08:05:09 1998
From: lists at castle5.castlec.com (Jrbl Pookah)
Date: Tue, 6 Jan 1998 00:05:09 +0800
Subject: Encrypted Telephony Products
Message-ID:
I've recently begun looking for internet telephony products that
employ reasonably secure encryption on-the-fly. Now, I've found Nautilus,
and PGPFone, but neither product appears to have been updated for quite a
while now. I was just wondering if anybody could give me recommendations
for more up-to-date products, and perhaps comparisons between those
available.
Thank you.
From andy at neptune.chem.uga.edu Mon Jan 5 08:15:12 1998
From: andy at neptune.chem.uga.edu (Andy Dustman)
Date: Tue, 6 Jan 1998 00:15:12 +0800
Subject: PGP-out-only vs. hashcash aware remailers?
In-Reply-To: <3.0.3.32.19980104120940.00722cdc@popd.ix.netcom.com>
Message-ID:
On Sun, 4 Jan 1998, Bill Stewart wrote:
> If you modify your remailer to only _output_ PGP-encrypted messages,
> you get hashcash-equivalence, and cut abuse substantially.
> The cost is limiting recipients to pgp users (plus known exceptions),
> but it's tough to spam people when you need to look up their PGP key
> and encrypt to it (at least you'll only get spams for high-tech stuff),
> and it's tougher for random abusers to abuse people since most targets
> don't have PGP keys, and a mailbox full of PGP junk is less annoying
> to most people than a mailbox full of human-readable hate mail.
> In particular, it's harder to send death threats to politicians
> if they don't have published PGP keys.
>
> Is this a feature that makes sense?
It makes some sense. It's similar to what I proposed a few weeks ago with
"casual" remailers. The smart middleman portion of coerce does something
similar: If it looks like a PGP message (has the "BEGIN PGP MESSAGE"
line), it doesn't chain through a random remailer but delivers directly.
I'm not sure if anyone is actually using this, though (perhaps
tea/mccain). What you seem to be proposing is sending non-encrypted
messages to /dev/null. That may yet be an option if things get bad, but I
don't think they are that bad yet. It does seem to achieve, in part, the
goals of hashcash (although it generally takes longer to generate
hashcash, depending on the collision length required).
> How would you implement it?
You are correct that there are easy ways to spoof PGP messages well enough
to fool a simple parser. One way around this would be to pipe any apparent
PGP messages (start and end easily detected) through PGP to de-armor only.
A couple problems: PGP (2.6.x) doesn't seem to have an option to only
de-armor; a sophisticated spoofer could make the armor verify correctly
anyway by generating the correct CRC (trivial if you know what you're
doing). So it seems sensible to only consider some simple safeguards and
not worry about actually decoding the armor.
Andy Dustman / Computational Center for Molecular Structure and Design
For a great anti-spam procmail recipe, send me mail with subject "spam".
Append "+spamsucks" to my username to ensure delivery. KeyID=0xC72F3F1D
Encryption is too important to leave to the government. -- Bruce Schneier
http://www.athens.net/~dustman mailto:andy at neptune.chem.uga.edu <}+++<
From ericm at lne.com Mon Jan 5 08:33:44 1998
From: ericm at lne.com (Eric Murray)
Date: Tue, 6 Jan 1998 00:33:44 +0800
Subject: .50 ammo
In-Reply-To: <199801050436.WAA21960@manifold.algebra.com>
Message-ID: <199801051627.IAA20090@slack.lne.com>
Igor Chudov @ home writes:
>
> Tim May wrote:
> > Armor-piercing ammo, the common kind, is just steel-core ammo. This is
> > readily available in most calibers, esp. military calibers. (A less common
> > kind is "KTW" handgun ammo, which is under some recent restrictions. And
> > even less common, and almost certainly unavailable to the proles, are
> > "sabot" rounds, some with tungsten cores.)
>
> By the way, I keep hearing about these sabot rounds but do not know
> what they actually are. Could someone please explain. Thank you.
A Sabot is a casing which goes around a bullet, allowing say
a .22 caliber bullet to travel properly down a .30 caliber barrel.
They're usually made of plastic and designed to fall away
from the bullet soon after it leaves the barrel.
It's a hack to get high(er) velocity out of an existing gun, or
to expand the range of available projectiles for a weapon.
I used to see Sabot rounds that were .22 caliber bullets
with a .30 caliber Sabot, in a .30-06 casing. I think Remington
made them and they were available to the general public.
They were marketed for 'varmint' hunting, as an alternative
to buying a .25-06 or similar varmint rifle.
> > (There is little need for this, for even folks like us. We are not likely
> > to want to disable fleeing vehicles, etc. And even conventional lead-core
> > rifle rounds will cut through body armor easily, which is all I care about.)
>
> Many people underestimate the power of most rifles.
Yes, and many people want to be able to buy a quick technological fix
to something (like shooting) which requires talent and/or practice to
become good at.
Just like buying a synthesizer doesn't instantly make one a musician, buying
a wonder gun doesn't immediately make one a crack shot.
Not that I'm accusing anyone in this discussion of having this tendency, just
pointing out that the best gun in many situations is the one that you
have run the most rounds through.
--
Eric Murray Chief Security Scientist N*Able Technologies www.nabletech.com
(email: ericm at lne.com or nabletech.com) PGP keyid:E03F65E5
From ptrei at securitydynamics.com Mon Jan 5 08:42:51 1998
From: ptrei at securitydynamics.com (Trei, Peter)
Date: Tue, 6 Jan 1998 00:42:51 +0800
Subject: best body armor for cypherpunks [serious]
Message-ID: <6B5344C210C7D011835C0000F80127668B15C9@exna01.securitydynamics.com>
> ----------
> From: Mix[SMTP:mixmaster at remail.obscura.com]
> Reply To: Mix
> Sent: Sunday, January 04, 1998 10:44 PM
> To: cypherpunks at toad.com
> Subject: best body armor for cypherpunks [serious]
>
> What is, in your opinion, the best (price and performance-wise)
> body armor for cypherpunks?
>
After a few years on this list, one develops such a thick skin that
extra protection is superfluos
Peter Trei
ptrei at securitydynamics.com
From guy at panix.com Mon Jan 5 08:53:42 1998
From: guy at panix.com (Information Security)
Date: Tue, 6 Jan 1998 00:53:42 +0800
Subject: Internet Watch Foundation reports child nudity as illegal!!
Message-ID: <199801051639.LAA26491@panix2.panix.com>
> From jrg at blodwen.demon.co.uk Mon Jan 5 05:57:11 1998
>
> Information Security writes:
> > Can anyone not biased like Paul "British Twit of the Month" Allen
> > confirm the two jpg's now visible at
> > are in Demon's alt.binaries.pictures.nudism Usenet group?
>
> too late to check/ a right pain to check anyway bearing in mind how
> much is probably available in that group.
>
> Give some message-ids and it's very easy to check if they are and grab
> the headers of the messages from them (if you're really interested in
> how they got here, etc.)
My interest has blown over.
PICSRules is a political response to government pressure.
IWF immediately began watching for KiddiePorn and notifying
IWF member organizations (and police) about such posts.
Members are given the MD5 of the post to automatically
delete it when next seen, in addition to the first deletion.
The only thing "watch" organizations are good for is
spotting "controversial" material.
Demon/IWF's Clive Feather:
: Some subscribers to IWF have asked to be notified of certain other
: classes of material, since they *do* choose to censor and not carry
: more than just material that is illegal to possess. Demon is not one
: of these ISPs.
So, IWF supports labeling/spotting of controversial material
for the purposes of censorship, beyond what is illegal.
Thus, the IWF is not going to get anywhere with PICSRules.
No way in hell can they label all of the Net.
Usenet content is produced at a furious rate: it cannot be rated
until it has already expired off of most servers.
Rate WWW? Most are business: who cares about advertising/support?
Any page with a counter on it won't verify the MD5 taken when
it was "rated"...
PICSRules is a political prank on the politicians.
Kind of like The Jetsons was an educational show about the future.
What *is* happening are groups forming to censor material;
funded by governments...
# http://192.215.107.71/wire/news/june/0630ratings.html
#
# The Internet Watch Foundation, has already submitted a funding
# request to the European Commission.
#
# "Whatever happens, we will carry on trying to get the funding
# we need," Kerr said. "These things cost money, and we have not
# got all the money we need", said David Kerr, chief executive
# of the British-based Internet Watch Foundation
This will probably keep expanding; Germany IWF to zap Nazi logos,
Israel IWF to zap revisionist history, Muslim IWF to zap heresy, etc.
---guy
The never-ending joke: Dimitry "I suck my male students" Vulis
From jim.burnes at ssds.com Mon Jan 5 09:11:41 1998
From: jim.burnes at ssds.com (Jim Burnes)
Date: Tue, 6 Jan 1998 01:11:41 +0800
Subject: Encrypted Telephony Products
In-Reply-To:
Message-ID:
On Mon, 5 Jan 1998, Jrbl Pookah wrote:
>
>
> I've recently begun looking for internet telephony products that
> employ reasonably secure encryption on-the-fly. Now, I've found Nautilus,
> and PGPFone, but neither product appears to have been updated for quite a
> while now. I was just wondering if anybody could give me recommendations
> for more up-to-date products, and perhaps comparisons between those
> available.
>
> Thank you.
>
Try Speak Freely.
Sincercely,
J. Burnes
From frant at mclafmall.com Tue Jan 6 01:18:00 1998
From: frant at mclafmall.com (frant at mclafmall.com)
Date: Tue, 6 Jan 1998 01:18:00 -0800 (PST)
Subject: Healthy Life
Message-ID: <199801060919.DAA20222@mail.family-net.net>
For years people have been trying to find the perfect health supplement
now we�ve found it. Introducing Ericson�s Alka-Mine Coral Calcium from Okinawa.
Over 150 diseases are linked to ionic calcium deficiency. reports from
of users of Ericson�s Alka-Mine Coral Calcium include partial or total
relief from symptoms of:
Arthritis, Indigestion, Over-Acidity, fatigue, Headache, Osteoporosis,
Diabetes, Immune Dysfunction, Allergies, Candida or Yeast infection,
Breathing Disorders, Psoriasis, Eczema, Sinusitis, Kidney Stones,
Prostatitis, Frequent Colds/Flu, Athlete�s Foot, Muscle Cramps, Multiple
Sclerosis, Acne, Fever Blisters, Ulcers, Impotency, High Blood Pressure,
Bone Spurs, Insomnia, Hiatal Hernia, Gallstones, Poor Circulation,
Fibromyalgia, Gout, Constipation, Toxicity, High Cholesterol, any much
more.
Come discover the secrets of the worlds oldest man. Click here for more
information and how to order Ericsons Coral Calicium From Okinawa.
http://www.mclafmall.com/coral
///////////////////////////////////////////////////////////////////////////////
This Message was Composed using Extractor Pro Bulk E- Mail Software. If
you wish to be removed from this advertiser's future mailings, please reply
with the subject "Remove" and this software will automatically block you
from their future mailings.
////////////////////////////////////////////////////////////////////////////////
From 34194245 at earthlink.net Tue Jan 6 02:22:46 1998
From: 34194245 at earthlink.net (34194245 at earthlink.net)
Date: Tue, 6 Jan 1998 02:22:46 -0800 (PST)
Subject: DIET, NUTRITION AND WEIGHT LOSS SOFTWARE
Message-ID: <586739fhkh75930fgj@juno.com>
NUTRIQUIK
A software program to help you monitor your nutritional needs and caloric intake. It runs on any version of MS Windows, version 3.1 or higher. It contains a database of over 900 food items and their nutritional values from the USDA. The setup screen allows you to post maximum calories, sodium intake and maximum fat intake. The setup screen also allows input of current weight, desired weight and attainment date. Daily posting screen for entering weight, blood pressure and resting pulse rate. The daily recording screen to enter foods consumed from database or manual entry. Contains a menu planner to plan meals and view calories, fats, vitamins, etc. You can store favorite meals in the database so you don�t have to keep reentering them. There are warning messages if you exceed your maximum calories, sodium or fats. The daily summary screen displays totals for the day and by the Food Group Pyramid. It has a thirty day report to track progress month to month and you can !
watch your progress on the Weight Loss graph.
This is the easiest way to modify and take control of your dietary habits.
To order: Print out and fill in the form below. Allow 2 to 3 weeks for delivery.
Name:_____________________ Date:___________
Street:_____________________ Apt:___________
City: ______________________ State: _____ Zip: _______
Send cash, check or money order for U.S. $35.00 To:
NUTRISOFT, INC.
P.O. BOX 66753
FALMOUTH, ME 04105
From workadmn at ix.netcom.com Tue Jan 6 02:47:15 1998
From: workadmn at ix.netcom.com (workadmn at ix.netcom.com)
Date: Tue, 6 Jan 1998 02:47:15 -0800 (PST)
Subject: Just Released! 16 Million!
Message-ID: <14942598_90204097>
IT WAS JUST RELEASED!!
INTRODUCING...MILLIONS VOL. 1
We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those. When we
combined them all, we had in excess of 100+ million addresses
in one huge file.
We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
"generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for those
that use Stealth programs, clogs up servers quickly with trash, etc.
We then ran a program that contained 150+ keywords to remove
addresses with vulgarity, profanity, sex-related names, postmaster,
webmaster, flamer, abuse, spam, etc., etc. Also eliminated all .edu,
.mil, .org, .gov, etc. After that list was run against the remaining list,
it reduced it down to near 16 million addresses!
So, you see, our list will save people hundreds of dollars buying all
others that are out there on CD and otherwise. Using ours will be like
using the 100+ million that we started with, but a lot less money and
alot less time!!
We also purchased Cyber-Promos ($995.00) CD. We received it just
prior to finishing production work on the new CD. We had our people
take a random sample of 300,000 addresses from the touted 2.9 that
they advertised. We used a program that allows us to take a random
sample of addresses from any list. We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom. We did not clean these, but we did create
3 seperate files named cyber1.txt, cyber2.txt, & cyber3.txt of 100,000
addresses each. This will give all people that use the list a opportunity to
send mail to the list before deciding if their CD is all it's hyped to be.
We also included a 2+ million "Remove/Flamer" file broke into seperate
files for ease of extracting and adding to your own database of removes.
"You can buy from the REST or you can buy from the BEST. Your choice.
_____________________________
What others are saying:
"I received the CD on Friday evening. Like a kid with a new toy, I
immediately started bulking out using the new email addresses. Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!! I am totally satisfied
with my purchase!! Thanks Premier!!"
Dave Buckley
Houston, TX
"This list is worth it's weight in gold!! I sent out 100,000 emails for my
product and received over 55 orders!
Ann Colby
New Orleans, LA
****************************************
HERE'S THE BOTTOM LINE
Here is what you get when you order today!
>> 16 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 100,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
PLUS you receive a tremendous REMOVE list!
AND
the a sampling of CyberPromo's HOT list.
>>> NOW ONLY $149.00!
This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!
All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.
Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere..PERIOD!
If you have any further questions or to place an order by
phone, please do not hesitate to call us at:
908-245-1143
To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
We accept Visa, Mastercard, AMEX, Checks by Fax and Mail.
_________________
EZ Order Form
_____Yes! I would like to order MILLIONS Vol. 1 email addresses
for only $149.00.
*Please select one of the following for shipping..
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping. (outside US add an additional $25 for shipping)
DATE_____________________________________________________
NAME____________________________________________________
COMPANY NAME___________________________________________
ADDRESS_________________________________________________
CITY, STATE, ZIP___________________________________________
PHONE NUMBERS__________________________________________
FAX NUMBERS_____________________________________________
EMAIL ADDRESS___________________________________________
TYPE OF CREDIT CARD:
______VISA _____MASTERCARD
CREDIT CARD# __________________________________________
EXPIRATION DATE________________________________________
NAME ON CARD___________________________________________
AMOUNT $____________________
(Required) SIGNATURE:x________________________
DATE:x__________________
You may fax your order to us at: 1-908-245-3119
CHECK BY FAX SERVICES!
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-908-245-3119
******************************************************
***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
CHECK HERE AND FAX IT TO US AT 1-908-245-3119
*******************************************************
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.
If you feel more comfortable sending payment through the mail,
please send all forms and Check or Money Order to:
Rapture Marketing Inc.
P.O. Box 616
Kenilworth, NJ 07033
From declan at well.com Mon Jan 5 11:15:07 1998
From: declan at well.com (Declan McCullagh)
Date: Tue, 6 Jan 1998 03:15:07 +0800
Subject: [Humor] Kennedy's New Legislation
In-Reply-To: <199801030048.SAA02365@wire.insync.net>
Message-ID:
At 17:17 -0800 1/2/98, Tim May wrote:
>Wanna bet that if I was on the hill in Aspen horsing around playing ski
>football and behaving like a drunken lout with a bunch of other people the
>ski patrol would whistle us down and tell us to knock it off?
We have a good story in this week's Time that talks about how the ski
resort had repeatedly asked the Kennedys to knock it off. Including the
night before the accident. Even on the "fateful" afternoon, the ski patrol
had told the Kennedys -- the last on the slopes -- it was time to quit.
"Nevertheless, 36 members of the Kennedy party prepared to play."
-Declan
From JonWienk at ix.netcom.com Mon Jan 5 11:39:22 1998
From: JonWienk at ix.netcom.com (Jonathan Wienke)
Date: Tue, 6 Jan 1998 03:39:22 +0800
Subject: Lock and Load (fwd)
In-Reply-To: <199712230422.WAA22160@einstein.ssz.com>
Message-ID: <3.0.3.32.19980105111943.006ce590@popd.netcruiser>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
At 10:37 PM 12/22/97 -0600, Igor Chudov @ home wrote:
>You can't lock and load an AK. I remember that very well even though it
>has been a while. The bolt just would not go far enough back to pick up
>the cartridge. The bolt carrier's charging handle would only go as far
>as to allow for the weapon inspection.
I own a Norinco MAK-90 (a semi-auto only AK variant) and it is designed so
that a round cannot be chambered with the safety on. If the weapon is not
cocked, the hammer hits the top of the sear (which is locked by the safety)
and prevents the bolt from traveling more than 1 inch to the rear. If the
weapon is cocked, the charging handle on the side of the bolt hits the
front of the safety lever, which stops the rearward travel of the bolt at
about 2.5 inches, which is not sufficient to chamber a round. The magazine
can be inserted or removed regardless of the position of the safety or the
bolt.
On my Winchester 1300 Defender 12-gauge, (a pump gun with a 7-round
magazine) the safety cannot be engaged until the weapon has been cocked,
which requires the action to be cycled. This will chamber a round unless
the magazine is empty.
On my Norinco Model 320 carbine (a semi-auto only Uzi lookalike) if the
weapon is not cocked, and the grip safety is not depressed, the bolt is
locked in the forward position, which makes it rather difficult to chamber
a round. However, the safe/fire selector (the sliding button on the left
side of the grip) has no effect on the bolt. Neither safety has any effect
on inserting or removing a magazine.
ObOddGunTrivia:
One of the oddities of the SKS is that a magazine cannot be inserted or
removed unless the bolt is locked in the rearmost position. The sides of
the bolt have grooves machined in them that the lips of the magazine occupy
when the bolt is forward. This can make changing a half-full magazine kind
of annoying.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5
iQA/AwUBNLEyTMJF0kXqpw3MEQIp+QCg1btR4CI1QthIVV2AYTTi7ztS6r0AoNlB
LkkRQf7554PRxVe/Q+IsPqLs
=SAYC
-----END PGP SIGNATURE-----
Jonathan Wienke
PGP Key Fingerprints:
7484 2FB7 7588 ACD1 3A8F 778A 7407 2928
3312 6597 8258 9A9E D9FA 4878 C245 D245 EAA7 0DCC
"If ye love wealth greater than liberty, the tranquility of servitude
greater than the animating contest for freedom, go home from us in peace.
We seek not your counsel, nor your arms. Crouch down and lick the hand that
feeds you. May your chains set lightly upon you; and may posterity forget
that ye were our countrymen."
-- Samuel Adams
"Stupidity is the one arena of of human achievement where most people
fulfill their potential."
-- Jonathan Wienke
Never sign a contract that contains the phrase "first-born child."
When the government fears the people there is liberty.
When the people fear the government there is tyranny.
RSA export-o-matic:
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Welcome to Tuesday's issue of Eureka!
PLAYGAL
This is truly a breathtaking site. Well-designed and easy to
use with excellent content. The tour alone has hotter porn
than many other 'free' sites - go see it now. It's explicit,
comprehensive and top quality. There are 2,000 video feeds
online, free live fucking with sound, 10,000 erotic stories,
1,000s of top quality pix, adult and arcade games, real ama-
teur competitions and much more. Click now and be astounded!
Playgal .... http://www.playgal.com/playgal/banner_abc1.html
GAYEUREKA!
The gay newsletter is now available. You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/
EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPA�OL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRAN�AIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm
KILLER PORN
Interesting name? Well regardless of the name there are pix
that will crankup your stick if you know what I mean. There
are lesbians munching bush, chicks sucking rock hard dicks,
and great 69 pix. Lots of free pix, fast loading. Surf it!
Killer Porn ................. http://www.kjmedia.com/killer/
BLASTMASTER'S
Juicy pix of lesbians, babes and babes using toys. Like dil-
dos us the tail and pussy at the same time. Double action as
some might say. Worth the modem trip for sure. Ooooh yeah!
Blast ........ http://uts.cc.utexas.edu/~phobos/blastmaster/
RADICAL BABES
Fast loading, great pix! A little bit on the softer side but
well worth the trip. These are beautiful women posing for us
in sexy spots, like down by the lake. There are several gal-
leries for us to enjoy. I especially like the chick with the
horse. Nothing illegal there, just an equestrian and steed.
Radical Babes ........ http://www.pornsugar.com/radical.html
RABBIT'S HARDCORE HOLE
This bunny has it going on! Tons of fast loading jpegs! You
gotta see this site. Cum globbed women, bent over teens with
hairy hineys. This is a sex secret on the web. Caution, your
hand may just leave your mouse! Bookmark and surf it, Yeah!
Rabbit's Hardcore ........... http://www.sexhost.net/rabbit/
FREE CONTEST!
Today, win another hot free 3 month membership to Hardcore-
smut. It's there Job to have the Best HardCore, the internet
has to offer available, and you'll be amazed at what they
have. Visit hardcoresmut and click on 'Erotic Stories'. what
is the missing word? "over ___ xxx erotic stories!".
Send answers to ............. mailto:contest at www.usachat.com
HardCoreSmut ................... http://www.hardcoresmut.com
FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet. However, many of the feeds use the RealPlayer and will
work in most browsers. If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Videos plus chat ..... http://209.1.233.50/chat/freechat.cgi
CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars you will meet most days. It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/
THE BEST PHONE SEX
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416
AMATEUR SITE OF THE DAY
CAROLINA FOX: This tall slinky blonde is well know in the SM
/BD community. She is a professional submissive! This woman
is plain kinky, and she love to be tied up. She also loves
to seduce young women, sounds familiar? Whips and chains,
pantyhose and high heals are all fetishes of hers. She wants
to hurt so good!
............................ http://amateurindex.com/eureka/
EROTIC STORY SITE OF THE DAY
Very Sexy Erotic Stories: Ready for lots of hot, free sex
stories? Look no further than Very Sexy Erotic Stories. All
different subjects, all free. ..... http://www.verysexy.com/
TODAY'S FREE PIX
Pic 1 ........................... http://137.39.63.229/?060
Pic 2 ........................... http://137.39.63.229/?061
Pic 3 ........................... http://137.39.63.229/?062
Pic 4 ........................... http://137.39.63.229/?063
Pic 5 ........................... http://137.39.63.229/?064
Pic 6 ........................... http://137.39.63.229/?065
Pic 7 ........................... http://137.39.63.229/?066
Pic 8 ........................... http://137.39.63.229/?067
Pic 9 ........................... http://137.39.63.229/?068
Pic 10 ........................... http://137.39.63.229/?069
PLEASE VISIT THIS EUREKA! PARTNER SITE
Persian Kitty's Adult Links
http://www.persiankitty.com/pk.html
The #1 most visted adult links site on the Web. Persian
Kitty's is now in it's 3rd year! Updated twice each day.
Plus the Purrfect Pose and the Desktop Image of the Week!
===========================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS NEWSLETTER BACK TO US.
===========================================================
From brianbr at together.net Mon Jan 5 13:55:52 1998
From: brianbr at together.net (Brian B. Riley)
Date: Tue, 6 Jan 1998 05:55:52 +0800
Subject: Netiquette: (was) Re: .50 ammo
Message-ID: <199801052140.QAA24055@mx01.together.net>
-----BEGIN PGP SIGNED MESSAGE-----
On 1/5/98 1:29 AM, Alan Olsen (alan at clueserver.org) passed this
wisdom:
>At 09:24 PM 1/4/98 -0600, Igor Chudov @ home wrote:
>>Alan wrote:
>>> At 04:50 PM 1/3/98 -0500, Brian B. Riley wrote:
>>> The hardest part is getting the 50 cal ammo. (He had his Federal
>>> firearms license and was in the National Guard, so it was not too
>>> difficult for him.) Getting AP and other special ammo would be
>>> doubly difficult. (Non-specialty ammo could be reloaded as long as
>>> you could get molds and primer caps.)
>>>
>>> I guess it depends on your military and/or black market
>>> connections.
>>
>>I have seen what appeared to be .50 ammo (probably not AP) in gun
>> stores.
>
>I am surprised, but I am sure you are correct. It has been quite a
>whilesince I have spent time in gun shops. (My expenditures on ammo
>is limited to smaller calibers. I tend not to look at other things
>because I cannot afford what I
>want.)
small point here of netiquette. one should be careful when trimming
down quotes out of context ... I did not make the above statement.
This time it is of little matter as the statement wasn't very
inflammatory nor was it very controversial (not that CP is *ever*
inflammatory or controversial), but it may well have been.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQEVAwUBNLFTOz7r4fUXwraZAQHDDQf/XBk9i+6+GA7UcZD/a1CY3F/102Kh5u/L
Y0KfqoMGCqv23oeJbayxjbWtXKSDd5+wX8Owrmr0i4arsD7vsunECkiQeUf0oQ83
Nid/tffRD5smu6P7mrf4yRVWOKKMmY8/VLOpFi9mRrOGVAWpGildXDikIhDuFylW
RHjRnSugM88RUqz1Z7rLuIirMpYm//UVT0YRM9EXUyH/ejmOgH5YB8vP5isPBa4T
L2TjPKbirQU1BX5HdgrVB+WkOpHdfSvA6sFlMPdAG4VvRltXA1IXZv1ce1AlKgtW
OTnzvFoVrnMieJ0cKxe/dXSbFpedb9BBmCcCo+GWuf/Z2M/NWMwSnA==
=SO5L
-----END PGP SIGNATURE-----
Brian B. Riley --> http://members.macconnect.com/~brianbr
For PGP Keys
"There's so much comedy on television. Does that cause comedy in
the streets?" Dick Cavett
From rah at shipwright.com Mon Jan 5 14:19:58 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Tue, 6 Jan 1998 06:19:58 +0800
Subject: Anonymous Remailers
Message-ID:
--- begin forwarded text
Date: Sun, 4 Jan 1998 23:14:19 -0800
From: Chuq Von Rospach
Subject: Re: Anonymous Remailers
To: "ListMom-Talk Discussion List"
Mime-Version: 1.0
Precedence: Bulk
Reply-To: "ListMom-Talk Discussion List"
Sender: "ListMom-Talk Discussion List"
X-URL:
At 8:10 PM -0800 1/4/98, Eric Mings wrote:
> I noticed on Apple's info about acceptable behavior on their lists, that
> they ban postings which originate from anonymous remailers (of which they
> include juno). I was wondering what experience people have had regarding
> abusive posts from such systems, and how one easily identifies them if
> you choose to ban postings originating from such systems. Thanks.
That's me.
I decided to stop accepting posts from anonymous remailers way back,
when anon.penet.fi was still alive. Some of that is philosophy, some of
that was problems.
As far as problems, it's the normal stuff -- personal attacks,
mailbombing through anonymous remailers, copyright/slander/libel
issues, all the normal fun and games. Since you can't track users back,
you have real problems policing them. And since anonymous remailers
tend to allow multiple (heading towards infinite) remailing addresses,
the practical issue of how to lock out an abusive user becomes severe.
That's why Juno is bounced -- you can create accounts and then use them
instantly, with no policing and no tracking. I had a problem a while
back with an idiot who did, abusively. After about four rounds of
trying to get him to go away, I did it the hard way, with a virtual
neutron bomb.
Juno's no help. In THAT case, I got email from them six weeks later
apologizing for being so delayed in responding to my requests for help.
they didn't offer to help, they just apologized for not telling me they
wouldn't for so long. And that's been typical of my dealing with them.
They don't police. They don't care. Their systems are set up so that
basically, they *can't* police things.
So I just don't even get into it. Since I can't police their users, I
police their site. Effectively, they are an anonymous remailer. God
knows enough folks use them as one.
--
Chuq Von Rospach (chuq at apple.com) Apple IS&T Mail List Gnome
Plaidworks Consulting (chuqui at plaidworks.com)
( +-+ The home for Hockey on the net)
--- end forwarded text
-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!:
From ffd5367 at hotmail.com Tue Jan 6 07:09:20 1998
From: ffd5367 at hotmail.com (ffd5367 at hotmail.com)
Date: Tue, 6 Jan 1998 07:09:20 -0800 (PST)
Subject: This really is absolutely incredible!
Message-ID: <78203468_1696351>
Work SMART......not hard!
You can easily make hundreds a week just passing out this 800 number with your code
number. Some are even making thousands a week. It is the easiest money that I have
ever made!
The company does the selling for you, closes the deal, and sends you $100 for every
sale! There is even a built in residual that goes with it. I have done a lot of programs
but NOTHING comes close to this!
Don't miss this opportunity! Call now!
1-800-811-2141 Code #44737 (This is HOT! If it is busy, keep trying).
In Canada call 1-800-588-9786 Code #44737
This company has been in business for 2 years..
*****************************************************************************
To be removed from this list please reply to this message with "remove" in the subject field.
*****************************************************************************
From declan at well.com Mon Jan 5 15:20:04 1998
From: declan at well.com (Declan McCullagh)
Date: Tue, 6 Jan 1998 07:20:04 +0800
Subject: Crypto-enemy senator gets cash from Johnny Chung
Message-ID:
Sen. Kerry is not as extreme as Sen. Kerrey, but he still is an enemy of
strong encryption. I wrote last year:
>>>>
The committee also approved amendments proposed by
Kerry that would give jurisdiction over crypto exports
to a nine-member "Encryption Export Advisory Board."
The panel would "evaluate whether [a] market exists
abroad" and make non-binding recommendations to the
president.
<<<<
Here's what he's been up to recently...
-Declan
KERRY: DAMAGE CONTROL
Boston Globe's Black reports, Boston atty Robert Crowe on
12/29 resigned as chair of Sen. John Kerry's (D) camp. finance
cmte "in response to negative publicity that featured his ties"
to Kerry. Crowe, "a longtime close personal friend and financial
supporter" of Kerry's, "reportedly decided that he had had enough
of critical newspaper stories, sources close to Kerry said."
Kerry, responding to the resignation which he termed
"understandable": "Bob Crowe has done an outstanding job for me,
often at the expense of his own personal life." Crowe had "made
headlines" recently in regard to his role as a lobbyist for
Boston's Big Dig and his work for a firm hired by the Swiss
Bankers Assn. Kerry's finance cmte will be "'streamlined'" and
headed by Peter Maroney who was hired by the campaign last fall
(12/30).
CHUNG CONNECTION?
A Los Angeles Times article by Rempel & Miller reported that
Kerry received $10K in '97 from Dem contributor Johnny Chung
following Chung's "high-level meeting" with SEC officials,
arranged for him by Kerry's office soon after he paid a visit
there. A Kerry spokesperson "confirmed that Kerry's office
contacted the SEC" on Chung's behalf, "but she said it involved
no more than helping arrange "'a tour.'" The DoJ is
investigating the contribution which Chung is said to have made
through several employees and others whom he reimbursed. Kerry
spokesperson Tovah Ravitz "acknowledged" that Chung was
approached for a donation "'numerous times because they were
nearing the end of a tough campaign.'" Although Ravitz said
Kerry's office arranged a tour for Chung, SEC officials "said the
request on behalf of Chung involved a briefing session" (12/24).
Boston Globe's Zitner follows up on the Times story, reporting
that Chung's visit to the SEC "was something more than a casual
tour but something less than special access to high government
official, the SEC said." Kerry's Ravitz said Chung made the
request for a stop at the SEC during an 8/96 visit, accompanied
by other Asian businessmen, to Kerry's office. Chung and the
others visited the SEC later the same day (12/25). On 12/26, USA
Today reported that Ravitz said the Times was incorrect in its
initial report (12/26).
01/05 12:35
From dlv at bwalk.dm.com Mon Jan 5 16:42:54 1998
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Tue, 6 Jan 1998 08:42:54 +0800
Subject: [Humor] Kennedy's New Legislation
In-Reply-To:
Message-ID: <53Zuie3w165w@bwalk.dm.com>
Declan McCullagh writes:
> We have a good story in this week's Time that talks about how the ski
> resort had repeatedly asked the Kennedys to knock it off. Including the
> night before the accident. Even on the "fateful" afternoon, the ski patrol
> had told the Kennedys -- the last on the slopes -- it was time to quit.
> "Nevertheless, 36 members of the Kennedy party prepared to play."
"Evolution in action."
Thank you, Michael Kennedy, for improving humanity's gene pool.
---
Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps
From ichudov at Algebra.COM Mon Jan 5 16:47:41 1998
From: ichudov at Algebra.COM (Igor Chudov @ home)
Date: Tue, 6 Jan 1998 08:47:41 +0800
Subject: Lock and Load (fwd)
In-Reply-To: <3.0.3.32.19980105111943.006ce590@popd.netcruiser>
Message-ID: <199801060038.SAA30088@manifold.algebra.com>
Jonathan Wienke wrote:
> At 10:37 PM 12/22/97 -0600, Igor Chudov @ home wrote:
> >You can't lock and load an AK. I remember that very well even though it
> >has been a while. The bolt just would not go far enough back to pick up
> >the cartridge. The bolt carrier's charging handle would only go as far
> >as to allow for the weapon inspection.
>
> I own a Norinco MAK-90 (a semi-auto only AK variant) and it is designed so
> that a round cannot be chambered with the safety on. If the weapon is not
> cocked, the hammer hits the top of the sear (which is locked by the safety)
> and prevents the bolt from traveling more than 1 inch to the rear. If the
> weapon is cocked, the charging handle on the side of the bolt hits the
> front of the safety lever, which stops the rearward travel of the bolt at
> about 2.5 inches, which is not sufficient to chamber a round. The magazine
> can be inserted or removed regardless of the position of the safety or the
> bolt.
All AKs are like that. And I maintain that it is the right design, from the
safety standpoint.
- Igor.
From Shane.Pearson at tafensw.edu.au Mon Jan 5 17:46:32 1998
From: Shane.Pearson at tafensw.edu.au (Pearson Shane)
Date: Tue, 6 Jan 1998 09:46:32 +0800
Subject: Location Escrow anyone ?
Message-ID:
Hi All,
>
>> 800 MHz analog may be the most difficult. GSM perhaps can reach 500 meteres
>>under ideal conditions
>> (Andreas Bogk). IS-95/CDMA probably a bit better than GSM due to the very
>>high data (chip) rate and
>> spread spectrum's better multipath characteristics, although the system's
>>multipath performance most
>> improves communications not ranging (Phil Karn, Qualcomm).
>
>
>GSM doesn't use spread spectrum?
>
>Either way, I'd imagine that the accurate time domain division used with GSM
>would provide
>the Telco's with something a lot better than 500 meters.
>
>Some cells where I live aren't much further apart than 500 meters. :)
>
>Bye for now.
From guy at panix.com Mon Jan 5 17:58:49 1998
From: guy at panix.com (Information Security)
Date: Tue, 6 Jan 1998 09:58:49 +0800
Subject: [Humor] Kennedy's New Legislation
Message-ID: <199801060150.UAA21492@panix2.panix.com>
> "Evolution in action."
> Thank you, Michael Kennedy, for improving humanity's gene pool.
Too bad _you_ reproduced.
---guy
From schneier at counterpane.com Mon Jan 5 18:53:42 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Tue, 6 Jan 1998 10:53:42 +0800
Subject: Comparing PGP to Symantec's Secret Stuff
In-Reply-To:
Message-ID: <199801060247.UAA24711@mixer.visi.com>
> Having worked for those multinationals and defense
>contractors, I've seen them buy new products with serious weaknesses
>in key generation, with year 2000 problems, with stream ciphers used
>to protect stored data--keyed the same way each time. I've seen them
>use code that sent cleartext where it should have been encrypting on
>the wire.
I second this. The pitiful state of "secure code" is shocking. (Actually,
I just wrote an essay on the topic. Get a copy for yourself at:
http://www.counterpane.com/pitfalls.html.)
Bruce
**************************************************************************
* Bruce Schneier For information on APPLIED CRYPTOGRAPHY
* Counterpane Systems 2nd EDITION (15% discount and errata),
* schneier at counterpane.com Counterpane Systems's consulting services,
* http://www.counterpane.com/ or the Blowfish algorithm, see my website.
**************************************************************************
From schneier at counterpane.com Mon Jan 5 19:04:29 1998
From: schneier at counterpane.com (Bruce Schneier)
Date: Tue, 6 Jan 1998 11:04:29 +0800
Subject: Comparing PGP to Symantec's Secret Stuff
In-Reply-To:
Message-ID: <199801060259.UAA26681@mixer.visi.com>
At 08:56 PM 12/16/97 -0800, Bill Frantz wrote:
>At 3:01 AM -0800 12/16/97, Vin McLellan wrote:
>> Norton Secret Stuff secures the data using the 32-bit Blowfish
>>encryption algorithm -- which is why it's approved for unrestricted export
>>outside the US by the U.S. government.
>
>This is the first I've heard of a Blowfish based produce being approved for
>export. Since Blowfish has about 9 bits worth of protection against brute
>force searches in its key schedule, this is about a 41 bit approval. Does
>anyone know of an export permit for a version of Blowfish with a key longer
>than 32 bits?
Blowfish with a 32-bit key has been approved for export before. The
argument is that the long key setup time makes 32-bit Blowfish as weak
as 40-bit anything else. I don't particularly agree, but there you have it.
Bruce
**********************************************************************
Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098
101 E Minnehaha Parkway, Minneapolis,MN 55419 Fax: 612-823-1590
http://www.counterpane.com
From pkmrght1823 at aol.com Tue Jan 6 14:57:15 1998
From: pkmrght1823 at aol.com (pkmrght1823 at aol.com)
Date: Tue, 6 Jan 1998 14:57:15 -0800 (PST)
Subject: Prodigious Sports Picks
Message-ID: <>
Hello, wouldn't it feel really great to know exactly who was going to win
the NBA game between Houston Rockets at Cleveland Cavs and our
BIG PICK in college basketball game, Kentucky at Georgia. Well, that is
why Prodigious Picks and Associates is here. If you have called us this past
week, we know that you have already won big. We have picked 15 of the last
19 games by the line, going 6-2 in the NFL playoff games and 9-2 in the last
eleven bowl games this week. I will inform you that we decide our picks by
using a consensus system analysis program by taking the picks of the top
SEVEN best handicappers in the country. We continue to prove that this
system is the best in the business. You can't go wrong. Don't lose your money
trying to pick the games yourself or by even calling some other handicapper
whose price per call is much more expensive than ours. Let us do the work and
you get the MONEY! So give us a call Monday and we WILL deliver!
1-900-773-9777
Only $10 per call
Must be 18 or older
P.S. After you cash in on Tuesday, give us a call Wednesday for more
basketball action. We will also be having the winning picks for the
AFC and NFC championship games after Friday.
From pkmrght1823 at aol.com Tue Jan 6 14:57:15 1998
From: pkmrght1823 at aol.com (pkmrght1823 at aol.com)
Date: Tue, 6 Jan 1998 14:57:15 -0800 (PST)
Subject: Prodigious Sports Picks
Message-ID: <>
Hello, wouldn't it feel really great to know exactly who was going to win
the NBA game between Houston Rockets at Cleveland Cavs and our
BIG PICK in college basketball game, Kentucky at Georgia. Well, that is
why Prodigious Picks and Associates is here. If you have called us this past
week, we know that you have already won big. We have picked 15 of the last
19 games by the line, going 6-2 in the NFL playoff games and 9-2 in the last
eleven bowl games this week. I will inform you that we decide our picks by
using a consensus system analysis program by taking the picks of the top
SEVEN best handicappers in the country. We continue to prove that this
system is the best in the business. You can't go wrong. Don't lose your money
trying to pick the games yourself or by even calling some other handicapper
whose price per call is much more expensive than ours. Let us do the work and
you get the MONEY! So give us a call Monday and we WILL deliver!
1-900-773-9777
Only $10 per call
Must be 18 or older
P.S. After you cash in on Tuesday, give us a call Wednesday for more
basketball action. We will also be having the winning picks for the
AFC and NFC championship games after Friday.
From weidai at eskimo.com Tue Jan 6 01:05:50 1998
From: weidai at eskimo.com (Wei Dai)
Date: Tue, 6 Jan 1998 17:05:50 +0800
Subject: cypherpunks and guns
Message-ID: <19980106005136.23824@eskimo.com>
I don't understand why there is so much talk about guns here lately.
Unless someone comes up with a weapon that has some very unusual economic
properties, individuals cannot hope to compete with governments in the
domain of deadly force. If we have to resort to physical violence, we've
already lost!
Think about it: if we can defend ourselves with guns, why would we need
crypto?
From tcmay at got.net Tue Jan 6 02:12:19 1998
From: tcmay at got.net (Tim May)
Date: Tue, 6 Jan 1998 18:12:19 +0800
Subject: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID:
At 12:51 AM -0800 1/6/98, Wei Dai wrote:
>I don't understand why there is so much talk about guns here lately.
>Unless someone comes up with a weapon that has some very unusual economic
>properties, individuals cannot hope to compete with governments in the
>domain of deadly force. If we have to resort to physical violence, we've
>already lost!
People on almost any unmoderated mailing list will talk about what
interests them. Those who mainly want to talk about crypto are of course
free to do so.
(You have, Wei, done important work in this area. But you very, very seldom
write articles on this list, at least not for the last couple of years--I
count less than one article per month from you over the past half year. I
urge you to write such articles if you dislike reading what others are
writing.)
I agree that two or three or four or five years ago I was much more likely
to write about something more crypto-related. Well, much time has passed.
Most things worth saying have been said, at least for me. I can't work up
the energy to discuss "data havens" a fourth or fifth time.
(And an article from me on data havens, or information markets, or crypto
anarchy, will usually produce complaints from people who don't see what it
has to do with getting the latest version of PGP! That's only a slight
exaggeration.)
There have also been very few major new participants. A few years ago we
could count on one or two major new "talents" joining the list each year,
generating articles and new ideas. For whatever reasons, this has nearly
stopped.
I would guess the reasons are related to a) no major publicity stories as
in past years, b) the disintegration of the list a year ago in the wake of
the "moderation" fiasco (which cut subscriptions by 3-5x), c) competition
from several other crypto lists, "moderated" by their owners, d) exhaustion
of the older participants in the battles, and e) those who are interested
in our topics have mostly already found us (meaning, the rich hunting
period is over). ;
>Think about it: if we can defend ourselves with guns, why would we need
>crypto?
This has an obvious answer. Guns are a last resort. Crypto makes it less
likely that Big Brother will know what the proles are talking about, less
likely that participants in a plan will be targetted for investigation and
raids.
Wei, your question could be paraphrased this way:
"If Pablo Escobar could defend himself with guns, why did he need crypto in
his cellphone?"
(The answer being that P. Escobar was detected by using a cellphone without
security. The NSA then told the DEA and its allies where he was and they
took him out on a rooftop.)
Final comment: If I find the motivation, I may finish an essay I've been
working on about how we, the Cypherpunks and the World, are *retrogressing*
in crypto areas. Most of the exotic applications are no longer being
discussed, and various mundane commercial products are the main focus. Yawn.
--Tim May
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From rittle at supra.rsch.comm.mot.com Tue Jan 6 02:14:10 1998
From: rittle at supra.rsch.comm.mot.com (Loren J. Rittle)
Date: Tue, 6 Jan 1998 18:14:10 +0800
Subject: Mobile phones used as trackers
In-Reply-To: <199801012054.PAA25297@users.invweb.net>
Message-ID: <199801061007.EAA28104@supra.rsch.comm.mot.com>
In article <199801012054.PAA25297 at users.invweb.net>,
"William H. Geiger III" writes:
> It is my understanding that they can still track you with the cell phone
> turned off so long as there is power going to the box (most auto cell
> phones are hardwired into the cars electrical system).
This is the funniest thing I have read in some time. Assuming you
watch the show, I think you may have watched too many episodes of the
X-Files (TM).
When the subscriber unit (SU a.k.a. the cellular phone) is turned off,
"they" can't track you. Now, it is possible that some cars have
built-in SUs that automatically power-on whenever the car is started.
In this case, the SU is clearly turned on and the user knows it.
Analog cellular phone systems in the U.S. only force the SU to
transmit when they need too. As someone else already mentioned, from
the perspective of cellular system operators, bandwidth is in short
supply. The cellular system operators wouldn't stand for a bunch of
unneeded transmissions "just to track location".
Based upon my own personal informal study [1] and some past knowledge
of cellular-type systems [2], in general, I believe the following
about analog cellular systems fielded in the U.S.:
1) "They" might be able to get a location reading at power-on time.
The SU will check to see if it is being powered on within a
different cell than it was last registered. If the cell is
different, then the SU transmits a message on the cell's control
channel to reregister. If the SU believes it is in the same cell,
then it doesn't transmit anything at power-on time. If the SU
transmits, it will be a very short burst. This would allow an
attacker to see your location at power-on time.
2) When your SU is on, "they" can track your cell-to-cell movements.
Cells are on the order of 1-10 miles in diameter. The more
populated the area (actually, the more likely the system is to be
used in an area), the smaller the cell size. "They" will only get
a reading when you move between cells. The system uses a form of
hysteresis so your SU doesn't flip back and forth between two cells
while you are on the "edge" between cell. Actually, there are no
real edges to the cells in an RF cellular system. There is a bit
of overlap between cells and the cell boundaries actually move over
time due to environmental factors. I.e. your SU might be
stationary and yet decide to move to a different cell due to a
stronger signal being seen from a different cell at a particular
point in time.
3) "They" can track your fine-grain movement while you are engaged in
a call or call setup. This is because an SU transmits the entire
time these activities take place. Note that call setup can be for
either incoming or outgoing calls.
The above appear to be the only times an SU will transmit in a
properly functioning analog cellular system.
Now, if we change the rules to allow an active "spoof" attack or
participation by the service provider, I speculate that specific
attacks against one or a few people (well, actually against their SUs)
could be waged to track their fine-grain movement:
4) Continuously inform the SU that an incoming call is waiting. The
user would get an indication of this attack since the phone would
"ring" to signal an incoming call. OTOH, perhaps, there is a way
to inform the SU that an incoming call is waiting without allowing
the phone to enter the final state where it begins to "ring". A
detailed study of the air interface and SU implementations would be
required to understand if the silent attack is possible. This
attack could target one SU. Even if direct indications were not
seen by the user, battery life would be shortened somewhat.
5) Continuously force the SU to "see" a different cell code, thus
forcing it to continuously reregister. The user would get no
direct indication during the attack. However, battery life would
be shortened somewhat. There may be protection in the SU to ensure
a minimum time period between reregistrations. However, this would
just limit the fineness of the tracking. Again, detailed study
would be required. This attack would appear to target multiple SUs
in a given area.
If you assume your attacker is capable of (4), (5) and similar tricks
and you have something to hide, then I suppose turning your SU off and
on is a wise course of action.
However, the coarse-grain (pin-point location but only at widely
dispersed points in time) tracking afforded by (1) and (2) seem like
minimal threats. If you are concerned by (3), then please remind me
why you are using the analog cellular phone system.
Regards,
Loren
[1] My informal study was conducted with a Motorola Micro TAC Lite SU
and an HP 2.9 GHz Spectrum Analyzer on 1/5/98 and 1/6/98. My
analog cellular service provider is Ameritech in the Chicagoland
area.
[2] Disclaimer: I personally work on research related to the iDEN
system (which is an advanced form of digital cellular with
dispatch services and packet data) being rolled out nationwide in
the U.S. by Nextel along with other local and international
operators. Motorola recently shipped the millionth SU for iDEN.
I am only speaking for myself. I have never worked on analog
cellular systems nor read its specification.
--
Loren J. Rittle (rittle at comm.mot.com) PGP KeyIDs: 1024/B98B3249 2048/ADCE34A5
Systems Technology Research (IL02/2240) FP1024:6810D8AB3029874DD7065BC52067EAFD
Motorola, Inc. FP2048:FDC0292446937F2A240BC07D42763672
(847) 576-7794 Call for verification of fingerprints.
From rdl at mit.edu Tue Jan 6 02:50:14 1998
From: rdl at mit.edu (Ryan Lackey)
Date: Tue, 6 Jan 1998 18:50:14 +0800
Subject: cypherpunks and guns
Message-ID:
(Wei Dai) writes:
> I don't understand why there is so much talk about guns here lately.
> Unless someone comes up with a weapon that has some very unusual economic
> properties, individuals cannot hope to compete with governments in the
> domain of deadly force. If we have to resort to physical violence, we've
> already lost!
>
> Think about it: if we can defend ourselves with guns, why would we need
> crypto?
I am fairly certain that as an irregular army soldier I could inflict
a substantial amount of damage upon an occupying military. With maybe
$20k in equipment and several hundred hours of training, you could make
life very difficult for any luckless squad that happens your way. Multiply
that by 100 million armed citizens and you see that armed civilian
resistance *can* defeat an occupying army.
Certainly in times of "peace" information/infrastructure warfare is much
more cost effective for the guerilla -- but once they start sending armored
patrols around armed with 600 surplus M-16 rifles and having [un]official
rules of engagement which include sniper fire on the wives and children
of citizens not convicted of any crime, burning tens of people alive for
their religious beliefs, forcibly sodomizing suspects with wooden rods, and
passing laws which cripple the 1st by making it a crime to read, it's
perhaps worth looking at other methods of resistance. (wow, that approached
Hettingan length while having little in common with his style :)
Plus, I honestly believe certain people who lacked the foresight or desire
to use anonymity have increased the chances of illegal unconstitutional
government action against them. It'll be a lot harder to quietly kill
someone and keep it out of the news if they're prepared to fight back
to the extent that I gather Tim May and others are prepared. Even if
being armed does nothing more than let the world know they have declared
war against the constitution, it's worth it.
Me, I still plan to get out before high powered riflery becomes anything
other than a sport. The Seychelles are looking remarkably tempting...
(I still say steel core ammo is the way to go, especially in 5.56 NATO and
7.62 Soviet. There exist plenty of vests which have rifle hardplate to
stop those rounds -- even 7.62 NATO rounds. 7.62 NATO AP/API, though,
is a bit tougher, buying you substantial time)
Hacking on Eternity DDS,
Ryan
[Not actually a gun toting lunatic, nor does he play one on TV, but
rather keeps them in a safe, and carries knives instead. Yay Massachusetts.
I hope this does not spark a discussion of how to stop a government
assault force armed with only a knife (hint: the answer is not "in parallel")]
[*ObCrypto* (it's getting really hard to do this every time):
AOLserver (a nice web server formerly from GNN/navisoft) punted their
128bit SSL module distribution *EVEN TO US CITIZENS* due to commerce
department fuckedness. Anyone know where I could get a copy? It would
really suck to have to patch the 40bit one into a 128bit version, since they
do not distribute source. Sigh. But I've started to use it for insecure
stuff because it's cheaper than Stronghold (read: free) and does some cool
database stuff easier than apache. And (cool db stuff + free) is more
important than (secure) or (secure and easily configured and supported)
for this.]
--
Ryan Lackey
rdl at mit.edu
http://mit.edu/rdl/
From jya at pipeline.com Tue Jan 6 04:14:06 1998
From: jya at pipeline.com (John Young)
Date: Tue, 6 Jan 1998 20:14:06 +0800
Subject: Letter on Jim Bell
Message-ID: <1.5.4.32.19980106115810.0074e354@pop.pipeline.com>
There's a recent letter on Jim Bell/AP/IRS harassment
by long-time friend Bob East at:
http://www.charm.net/~joabj/belet.htm
Offered by Joab Jackson, who wrote the recent story
posted here for the Baltimore City Paper.
From e7L0yp5sK at pobox.com Tue Jan 6 20:18:43 1998
From: e7L0yp5sK at pobox.com (e7L0yp5sK at pobox.com)
Date: Tue, 6 Jan 1998 20:18:43 -0800 (PST)
Subject: Season Greetings From The 'Sound Of Music Palace'
Message-ID:
SCHLOSS
LEOPOLDSKRON
The most unique venue of its kind, situated in Salzburg - Austria,
the very heart of Europe, welcomes you.
The palace was built in 1740 as a summer residence for the
Archbishop Leopold Firmian, and purchased by Max Reinhardt,
the renowned theater director and co-founder of the Salzburg
Festival, in 1918. When it was featured in the film "The Sound
of Music", SCHLOSS LEOPOLDSKRON became famous
throughout the world.
Today, the magnificent historic ambiance and its up-to-date
infrastructure make SCHLOSS LEOPOLDSKRON an ideal site
for residential conferences and seminars, and a particularly
attractive destination for incentive and special interest group
travelers visiting Mozart's place of birth.
On request, we put together for you suitable incentive packages
that include on- and off-site activities, such as visits to the
Salzburger Festival or other cutural events, a day-trip to the lake
district, a concert or a gala diner at the palace, for instance.
For further details and information about the conference,
banqueting, and incentive facilities of SCHLOSS
LEOPOLDSKRON, please contact us at the following
numbers or fax back to us the completed reply section:
Telephone: ++43 662 839830
Fax: ++43 662 839837
E-mail: slcc at salsem.ac.at
Internet homepage:
__________________________________________________
REPLY SECTION (please tick as appropriate)
Please provide me with more detailed information on the following:
___ Accommodation Facilities
___ Conference and Seminar Facilities
___ Banqueting and Incentive Facilities
___ Tailor-made Programs and Events
___ Music & Culture in Salzburg
___ Other__________________________________________
___ Yes, please keep me regularly up-to-date with the latest
information by fax / e-mail / letter (please circle)
Person of Contact / Comments___________________________
__________________________________________________
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This ad was sent to you by S. Direct Marketing. If you would like
more information on our software and email services...Please
call 510-653-4709 9am to 9pm California time 7-days a week.
From ww44me at ix.netcom.com Tue Jan 6 21:11:13 1998
From: ww44me at ix.netcom.com (ww44me at ix.netcom.com)
Date: Tue, 6 Jan 1998 21:11:13 -0800 (PST)
Subject: Looking For Extra Cash???
Message-ID:
Hello my name is Denette,
PRINT this letter, read the directions, THEN READ IT AGAIN !!!
The company I was working for just went out of business and I've been looking for a job. I always
used to delete unsolicited e-mail advertisements before I finished reading them. I received what I
assumed was this same e-mail countless times and deleted it each time.
Recently I received it again and thought , "OK, I give in, I'm going to try this, I need the money. I
can certainly afford to invest $20 and, on the other hand, there's nothing wrong with creating a little
excess cash." I promptly mailed four $5 bills and after receiving the reports, paid a friend of mine a
small fee to send out some e-mail advertisements for me. After reading the reports, I also learned
how easy it is to bulk e-mail for free!
You just need to follow the directions EXACTLY and you will reap the rewards also. Read this letter,
pick a lifelong dream you have and apply the letter and you will achieve success. It really is that
easy. You don't need to be a wizard at the computer, but I'll bet you already are. If you can open
an envelope, remove the money, and send an e-mail message, then you're on your way to the bank.
If I can do this, so can you!
GO FOR IT NOW!!
The following is a copy of the e-mail I read:
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
This is a LEGAL, MONEY-MAKING PHENOMENON.
PRINT this letter, read the directions, THEN READ IT AGAIN !!!
You are about to embark on the most profitable and unique program you may ever see. Many times
over, it has demonstrated and proven its ability to generate large amounts of cash. This program is
showing fantastic appeal with a huge and ever-growing on-line population desirous of additional
income.
This is a legitimate, LEGAL, money-making opportunity. It does not require you to come in contact
with people, do any hard work, and best of all, you never have to leave the house, except to get
the mail and go to the bank!
This truly is that lucky break you've been waiting for! Simply follow the easy instructions in this letter,
and your financial dreams will come true! When followed correctly, this electronic, multi-level
marketing program works perfectly...100% EVERY TIME!
Thousands of people have used this program to:
- Raise capital to start their own business
- Pay off debts
- Buy homes, cars, etc.,
- Even retire!
This is your chance, so don't pass it up!
----------------------------------------------------------------------------------
OVERVIEW OF THIS EXTRAORDINARY
ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
----------------------------------------------------------------------------------
Basically, this is what we do:
We send thousands of people a product for $5.00 that costs next to nothing to produce and e-mail.
As with all multi-level businesses, we build our business by recruiting new partners and selling our
products. Every state in the U.S. allows you to recruit new multi- level business online (via your
computer).
The products in this program are a series of four business and financial reports costing $5.00 each.
Each order you receive via "snail mail" will include:
* $5.00 cash
* The name and number of the report they are ordering
* The e-mail address where you will e-mail them the report they ordered.
To fill each order, you simply e-mail the product to the buyer. THAT'S IT! The $5.00 is yours! This
is the EASIEST electronic multi-level marketing business anywhere!
FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!
******* I N S T R U C T I O N S *******
This is what you MUST do:
1. Order all 4 reports shown on the list below (you can't sell them if you don't order them).
* For each report, send $5.00 CASH, the NAME & NUMBER OF THE
REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR
RETURN POSTAL ADDRESS (in case of a problem) to the person whose
name appears on the list next to the report.
* When you place your order, make sure you order each of the four
reports. You will need all four reports so that you can save them
on your computer and resell them.
* Within a few days you will receive, via e-mail, each of the four reports.
Save them on your computer so they will be accessible for you to send
to the 1,000's of people who will order them from you.
2. IMPORTANT-- DO NOT alter the names of the people who are listed next
to each report, or their sequence on the list, in any way other than is
instructed below in steps "a" through "d" or you will lose out on the
majority of your profits. Once you understand the way this works, you'll
also see how it doesn't work if you change it. Remember, this method
has been tested, and if you alter it, it will not work.
a. Look below for the listing of available reports.
b. After you've ordered the four reports, replace the name and address
under REPORT #1 with your name and address, moving the one that
was there down to REPORT #2.
c. Move the name and address that was under REPORT #2 down to
REPORT #3.
d. Move the name and address that was under REPORT #3 down to
REPORT #4.
e. The name and address that was under REPORT #4 is removed from
the list and has NO DOUBT collected their 50 grand.
Please make sure you copy everyone's name and address ACCURATELY!!!
3. Take this entire letter, including the modified list of names, and save
it to your computer. Make NO changes to the instruction portion of this
letter.
4. Now you're ready to start an advertising campaign on the
WORLDWIDE WEB! Advertising on the WEB is very, very inexpensive,
and there are HUNDREDS of FREE places to advertise. Another
avenue which you could use for advertising is e-mail lists.
You can buy these lists for under $20/2,000 addresses or you
can pay someone a minimal charge to take care of it for you.
BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!
5. For every $5.00 you receive, all you must do is e-mail them the report
they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE
ON ALL ORDERS! This will guarantee that the e-mail THEY send out,
with YOUR name and address on it, will be prompt because they can't
advertise until they receive the report!
------------------------------------------
AVAILABLE REPORTS
------------------------------------------
***Order Each REPORT by NUMBER and NAME***
Notes:
- ALWAYS SEND $5 CASH FOR EACH REPORT
- ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL
- Make sure the cash is concealed by wrapping it in at least two sheets of paper
- On one of those sheets of paper, include: (a) the number & name of the report you are ordering, (b)
your e-mail address, and (c) your postal address.
_________________________________________________________________
REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES"
ORDER REPORT #1 FROM:
VTM Services
P.O. Box 3691
Ventura, CA 93006
___________________________________________________________
REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"
ORDER REPORT #2 FROM:
KL Marketing
5225 Blakeslee Ave. Ste. 149
North Hollywood, CA 91601
_________________________________________________________________
REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:
AIK
10629 Woodbridge Ave. Ste. 104
Toluca Lake, CA 91602
_________________________________________________________________
REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"
ORDER REPORT #4 FROM:
RCC Enterprises
24303 Woolsey Cyn. #1
West Hills, CA 91304
_________________________________________________________________
--------------------------------------------------------------------------------------------------
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
--------------------------------------------------------------------------------------------------
Let's say you decide to start small just to see how well it works. Assume your goal is to get 10 people
to participate on your first level. (Placing a lot of FREE ads on the internet will EASILY get a larger
response.) Also assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline
members. Follow this example to achieve the STAGGERING results below.
1st level--your 10 members with $5...........................................$50
2nd level--10 members from those 10 ($5 x 100)..................$500
3rd level--10 members from those 100 ($5 x 1,000)..........$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
THIS TOTALS ----------->$55,550
Remember friends, this assumes that the people who participate only recruit 10 people each. Think
for a moment what would happen if they got 20 people to participate! Most people get 100's of
participants! THINK ABOUT IT!
Your cost to participate in this is practically nothing (surely you can afford $20). You obviously
already have an internet connection and e-mail is FREE!!! REPORT#3 shows you the most
productive methods for bulk e-mailing and purchasing e-mail lists. Some list & bulk e-mail vendors
even work on trade!
About 50,000 new people get online every month!
*******TIPS FOR SUCCESS*******
* TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow
the directions accurately.
* Send for the four reports IMMEDIATELY so you will have them when
the orders start coming in because:
When you receive a $5 order, you MUST send out the requested product/report to comply with the
U.S. Postal & Lottery Laws, Title 18,Sections 1302 and 1341 or Title 18, Section 3005 in the U.S.
Code, also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or
service must be exchanged for money received."
* ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.
* Be patient and persistent with this program. If you follow the
instructions exactly, the results WILL undoubtedly be SUCCESSFUL!
* ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!
*******YOUR SUCCESS GUIDELINE*******
Follow these guidelines to guarantee your success:
If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue advertising until you
do. Then, a couple of weeks later you should receive at least 100 orders for REPORT #2. If you
don't, continue advertising until you do. Once you have received 100 or more orders for REPORT
#2, YOU CAN RELAX, because the system is already working for you, and the cash will continue to
roll in!
THIS IS IMPORTANT TO REMEMBER:
Every time your name is moved down on the list, you are placed in front of a DIFFERENT report.
You can KEEP TRACK of your PROGRESS by watching which report people are ordering from you.
If you want to generate more income, send another batch of e-mails and start the whole process
again! There is no limit to the income you will generate from this business!
NOTE: If you need help with starting a business, registering a business name, how income tax is
handled, etc., contact your local office of the Small Business Administration (a Federal agency) for
free help and answers to questions. Also, the Internal Revenue Service offers free help via
telephone and free seminars about business taxes.
*******T E S T I M O N I A L S*******
This program does work, but you must follow it EXACTLY! Especially the rule of not trying to
place your name in a different position, it won't work and you'll lose a lot of potential income. I'm
living proof that it works. It really is a great opportunity to make relatively easy money, with little cost
to you. If you do choose to participate, follow the program exactly, and you'll be on your way to
financial security.
Sean McLaughlin, Jackson, MS
My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a cost accountant with a major
U.S. Corporation and I make pretty good money. When I received the program I grumbled to Doris
about receiving "junk mail." I made fun of the whole thing, spouting my knowledge of the population
and percentages involved. I "knew" it wouldn't work. Doris totally ignored my supposed intelligence
and jumped in with both feet. I made merciless fun of her, and was ready to lay the old "I told you
so" on her when the thing didn't work... well, the laugh was on me! Within two weeks she had
received over 50 responses. Within 45 days she had received over $147,200 in $5 bills! I was
shocked! I was sure that I had it all figured and that it wouldn't work. I AM a believer now. I have
joined Doris in her "hobby." I did have seven more years until retirement, but I think of the "rat
race" and it's not for me. We owe it all to MLM.
Frank T., Bel-Air, MD
I just want to pass along my best wishes and encouragement to you. Any doubts you have will
vanish when your first orders come in. I even checked with the U.S. Post Office to verify that the
plan was legal. It definitely is! IT WORKS!!!
Paul Johnson, Raleigh, NC
The main reason for this letter is to convince you that this system is honest, lawful, extremely
profitable, and is a way to get a large amount of money in a short time. I was approached several
times before I checked this out. I joined just to see what one could expect in return for the minimal
effort and money required. To my astonishment, I received $36,470.00 in the first 14 weeks, with
money still coming in.
Sincerely yours, Phillip A. Brown, Esq.
Not being the gambling type, it took me several weeks to make up my mind to participate in this
plan. But conservative that I am, I decided that the initial investment was so little that there was just
no way that I wouldn't get enough orders to at least get my money back. Boy, was I surprised when
I found my medium-size post office box crammed with orders! For awhile, it got so overloaded that I
had to start picking up my mail at the window. I'll make more money this year than any 10 years of
my life before. The nice thing about this deal is that it doesn't matter where in the U.S. the people
live. There simply isn't a better investment with a faster return.
Mary Rockland, Lansing, MI
I had received this program before. I deleted it, but later I wondered if I shouldn't have given it a
try. Of course, I had no idea who to contact to get another copy, so I had to wait until I was e-mailed
another program...11 months passed then it came...I didn't delete this one!...I made more than
$41,000 on the first try!!
D. Wilburn, Muncie, IN
This is my third time to participate in this plan. We have quit our jobs, and will soon buy a home
on the beach and live off the interest on our money. The only way on earth that this plan will work
for you is if you do it. For your sake, and for your family's sake don't pass up this golden opportunity.
Good luck and happy spending!
Charles Fairchild, Spokane, WA
ORDER YOUR REPORTS TODAY AND GET STARTED ON
YOUR ROAD TO FINANCIAL FREEDOM!!!
From works4me at ix.netcom.com Tue Jan 6 21:28:40 1998
From: works4me at ix.netcom.com (works4me at ix.netcom.com)
Date: Tue, 6 Jan 1998 21:28:40 -0800 (PST)
Subject: Happy New Year!
Message-ID: <>
OnLineNow wishes you a Happy and Prosperous 1998.
OnLineNow World Wide Directories
http://onlinenow.net/frames/
From works4me at ix.netcom.com Tue Jan 6 21:28:40 1998
From: works4me at ix.netcom.com (works4me at ix.netcom.com)
Date: Tue, 6 Jan 1998 21:28:40 -0800 (PST)
Subject: Happy New Year!
Message-ID: <>
OnLineNow wishes you a Happy and Prosperous 1998.
OnLineNow World Wide Directories
http://onlinenow.net/frames/
From isparkes at q9f47.dmst02.telekom.de Tue Jan 6 07:11:52 1998
From: isparkes at q9f47.dmst02.telekom.de (Ian Sparkes)
Date: Tue, 6 Jan 1998 23:11:52 +0800
Subject: cypherpunks and guns
In-Reply-To:
Message-ID: <3.0.2.32.19980106144257.006f0fec@q9f47.dmst02.telekom.de>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
At 05:28 06.01.98 -0500, Ryan Lackey wrote:
> (Wei Dai) writes:
>
>> I don't understand why there is so much talk about guns here
lately.
>> Unless someone comes up with a weapon that has some very unusual
economic
>> properties, individuals cannot hope to compete with governments in
the
>> domain of deadly force. If we have to resort to physical violence,
we've
>> already lost!
>>
>> Think about it: if we can defend ourselves with guns, why would we
need
>> crypto?
>
>I am fairly certain that as an irregular army soldier I could
inflict
>a substantial amount of damage upon an occupying military. With
maybe
>$20k in equipment and several hundred hours of training, you could
make
>life very difficult for any luckless squad that happens your way.
Multiply
>that by 100 million armed citizens and you see that armed civilian
>resistance *can* defeat an occupying army.
>
I'm not sure I am convinced by this argument.
The "enemy within" seems to be the main focus of the discussions in
the CP list. When the 'luckless squad that happens your way' is
manned by your countrymen at the command of their (and your)
government, what then?
As far as I can see, the result would be a *very* bloody civil war.
The outcome may indeed be less obvious than in a 'conventional' (i.e.
unarmed populace) civil war, but the cost much higher.
This is from the standpoint of a 'sissy' European. I admit I am
poorly equipped to comment on the American Zeitgeist. However, my
experience of civil war victims (refugees from the E-bloc) suggests
that we should be concentrating on social revolution before we tool
up for military. There is more to be won, with a potentially much
lower cost.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQA/AwUBNLImc4n3W0ooQnZKEQL4VwCffzMNK1MfQ/1zMv+E/3dfoioc8e8AoL0d
uZMzgq6LPu9nVe90kcA49cbG
=yL/D
-----END PGP SIGNATURE-----
From dm0 at avana.net Tue Jan 6 08:10:03 1998
From: dm0 at avana.net (David Miller)
Date: Wed, 7 Jan 1998 00:10:03 +0800
Subject: Mobile phones used as trackers
In-Reply-To: <199801012054.PAA25297@users.invweb.net>
Message-ID: <34B27F22.7C07@avana.net>
Loren J. Rittle wrote:
> If you assume your attacker is capable of (4), (5) and similar tricks
> and you have something to hide, then I suppose turning your SU off and
> on is a wise course of action.
Another attack that was recently described to me by someone in the industry
is to setup a three-way conversation, which basically is a cellular phone
tap. The conversation could be split within the cell network to a silent
party more interested in your communications than your location.
--David Miller
From isparkes at q9f47.dmst02.telekom.de Tue Jan 6 08:15:58 1998
From: isparkes at q9f47.dmst02.telekom.de (Ian Sparkes)
Date: Wed, 7 Jan 1998 00:15:58 +0800
Subject: cypherpunks and guns
Message-ID: <3.0.2.32.19980106170810.006f0ff8@q9f47.dmst02.telekom.de>
At 05:28 06.01.98 -0500, Ryan Lackey wrote:
> (Wei Dai) writes:
>
>> I don't understand why there is so much talk about guns here lately.
>> Unless someone comes up with a weapon that has some very unusual economic
>> properties, individuals cannot hope to compete with governments in the
>> domain of deadly force. If we have to resort to physical violence, we've
>> already lost!
>>
>> Think about it: if we can defend ourselves with guns, why would we need
>> crypto?
>
>I am fairly certain that as an irregular army soldier I could inflict
>a substantial amount of damage upon an occupying military. With maybe
>$20k in equipment and several hundred hours of training, you could make
>life very difficult for any luckless squad that happens your way. Multiply
>that by 100 million armed citizens and you see that armed civilian
>resistance *can* defeat an occupying army.
>
I'm not sure I am convinced by this argument.
The "enemy within" seems to be the main focus of the discussions in the CP
list. When the 'luckless squad that happens your way' is manned by your
countrymen at the command of their (and your) government, what then? Will
you still attempt to defeat the 'occupying army'?
As far as I can see, the result would be a *very* bloody civil war. The
outcome may indeed be less obvious than in a 'conventional' (i.e. unarmed
populace) civil war, but the cost much higher.
Bear in mind that this is from the standpoint of a 'sissy' European. I
admit I am poorly equipped to comment on the American Zeitgeist. However,
my experience of civil war victims (extensive contact with refugees from
the E-bloc) suggests to me that we should be concentrating on social
revolution before we tool up for a military one. There is more to be won,
with a potentially much lower cost.
By all means buy the hardware, that is after all your right. Just spare the
hero talk. *Everyone* thinks they'll be one of the survivors in a war, just
as 95% of the population believe they have an above average IQ.
My understanding of the word 'revolution' in this context means realigning
the opinions of the governments and peoples around the globe to allow
freedoms such as those supported by Cypherpunks to be freely available. An
example of this is to work against the misinformation spread by 'them'
which leads the average Joe (dumb or not) to think that 'Encrypted Data =
Child Porn/Drug Barons planning something big/More child porn'.
From whgiii at invweb.net Tue Jan 6 08:25:39 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Wed, 7 Jan 1998 00:25:39 +0800
Subject: PGP-out-only vs. hashcash aware remailers?
In-Reply-To:
Message-ID: <199801061630.LAA15383@users.invweb.net>
-----BEGIN PGP SIGNED MESSAGE-----
In , on
01/05/98
at 11:14 AM, Andy Dustman said:
>A couple problems: PGP (2.6.x) doesn't seem to have an option to only
>de-armor
PGP -da [filename]
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html
- ---------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNLJZ9o9Co1n+aLhhAQHtGAP+LCyT+AGEcQoatO6vGAzj1qAInO9eSb9a
Lhil7PdLxJFJO7FrkkpEkUSq+thIpKU5H+Kfo/qwq+fkeIKlgh8EAlog4bLTaTg8
yW2ZAOn1qVY5xZHppvIn946WE0/IxFCXee5EfzrnhchvpzVn4JXtYkWNf0wqP8it
vPOsqKr3XQ4=
=Vx+s
-----END PGP SIGNATURE-----
From eureka at eureka.abc-web.com Wed Jan 7 00:42:43 1998
From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com)
Date: Wed, 7 Jan 1998 00:42:43 -0800 (PST)
Subject: Eureka! Wed Jan 7 '98
Message-ID: <19980107081612.27681.qmail@eureka.abc-web.com>
Welcome to Wednesday's issue of Eureka!
ULTIMATE HARDCORE
If you're looking for over 200 live strip shows and sex
crazed video feeds - 24 hours a day! - thousands of XXX
photos - hundreds of Videos (Avis, Movs and Mpegs) - and all
totally free for a trial period, then look no further. The
only place you need to visit is Ultimate Hardcore. TRY FREE!
.. http://www.mr-cash.com/cgi-bin/ult-program.cgi/raw_3171/A
GAYEUREKA!
The gay newsletter is now available. You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/
EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPA�OL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRAN�AIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm
AFTER-HOURS NETWORK
Hmmmm, not a bad site! "Hot Glamour Models in the Nude" yup
that's what they have. Lots of real pretty women, bent over
and looking at you. These are the "show me your tits" kind
of great pix everyone really digs. This site loads fast too!
After-Hours Network ............ http://www.after-hours.net/
BOOMBASTIC
This website features some nasty looking babes. These women
are the model variety. The webmaster has been hard at work.
They have devised a clever system of displaying random pix!
You don't even have to touch the keyboard. Lego that mouse!
Boombastic ................ http://205.246.63.10/boombastic/
EMO SLAMMER'S IMAGE GALLERY
This site is a must see, they have it all. Including, anal
action, cum close, fetish fun, finger fling, gay guys, group
gropes, lesbian lovers and a whole lot more! There are 100's
that's right I said 100's. Hit the "on parade" links for a
slide show. Super cool use of technology. Smack your monkey.
Emo Slammer's ............. http://www.znd2.net/karpo/site1/
HUMPING & PUMPING
Great use of thumbnails! Lots of horny slut pix! One that
warrants mentioning has a bush the size of a muscrat. You
have to see this. Is it a critter, or does she have the big-
gest bush in the history of beaver? Judge this for yourself.
Humping & Pumpin ............. http://www.luvgun.com/pumpin/
FREE CONTEST
Are you ready to win another Free 3 month Mebership to Hard-
CoreSmut? A $75.00 Value. Just visit HardCoreSmut and click
on 'Free Guided Tour'. In the 'Interracial' section tell us:
"how many free Interracial samples you get" ...............
............................ mailto:cont-wed at www.usachat.com
................................ http://www.hardcoresmut.com
FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet. However, many of the feeds use the RealPlayer and will
work in most browsers. If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Six free feeds ..................... http://207.136.152.129/
CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars you will meet most days. It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/
THE BEST PHONE SEX
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416
AMATEUR SITE OF THE DAY
MICHELLE: This young lady's beauty is startling! With long,
shapely legs, perfect (REAL) breasts, and a great "tushy",
this girl is the perfect package! Not only is she a looker,
but she is a true amateur. Her page started out as a home-
work assignment from school, now the site is her sexual out-
let to the world!
............................ http://amateurindex.com/eureka/
EROTIC STORY SITE OF THE DAY
TabooStories.com: Nasty alert! TabooStories.com gives you
the hardest, nastiest sex stories on the net, all free! We
have the stories that the other sites don't dare to post!
Don't say we dindn't warn you.. http://www.taboostories.com/
TODAY'S FREE PIX
Pic 1 ........................... http://137.39.63.229/?070
Pic 2 ........................... http://137.39.63.229/?071
Pic 3 ........................... http://137.39.63.229/?072
Pic 4 ........................... http://137.39.63.229/?073
Pic 5 ........................... http://137.39.63.229/?074
Pic 6 ........................... http://137.39.63.229/?075
Pic 7 ........................... http://137.39.63.229/?076
Pic 8 ........................... http://137.39.63.229/?077
Pic 9 ........................... http://137.39.63.229/?078
Pic 10 ........................... http://137.39.63.229/?079
PLEASE VISIT THIS EUREKA! PARTNER SITE
SINFUL'S 20 FREE XXX PICS
http://www.sinful.net/cgi-bin/topvlog.cgi?eureka
20 FREE HARDCORE, CUMSHOT, GROUPSEX, AND FREE ANALSEX PHOTOS
UPDATED WEEKLY PLUS LINKS TO 700+ FREE ADULT PICTURE SITES.
CATEGORIES INCLUDE: ASIAN, HARDCORE, SOFTCORE, BABES, AND
PIC LINKS. YOU GET ALL OF THIS FOR FREE!! VISIT US NOW!!
===========================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS NEWSLETTER BACK TO US.
===========================================================
From sunder at brainlink.com Tue Jan 6 09:04:53 1998
From: sunder at brainlink.com (Ray Arachelian)
Date: Wed, 7 Jan 1998 01:04:53 +0800
Subject: 800 pound GorillaSoft
In-Reply-To: <00456D9D.1576@usccmail.lehman.com>
Message-ID:
On Tue, 6 Jan 1998, Salvatore DeNaro passed me this url:
http://www.motherjones.com/mother_jones/JF98/burstein.html
"But instead of waiting for a ruling on the case, the BSA abruptly dropped
the suit in the fall of 1997. The BSA receives funding from most of the
top software companies but appears to be most heavily funded by Microsoft.
And, according to Antel's information technology manager, Ricardo
Tascenho, the company settled the matter by signing a "special agreement"
with Microsoft to replace all of its software with Microsoft products...."
Happy happy joy joy. Microsoft saves a pirate by assimilating it.
Resistance is futile. You will sell NT. :(
=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run |\/|\/
../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were.... |.....
======================= http://www.sundernet.com ==========================
From sunder at brainlink.com Tue Jan 6 09:12:53 1998
From: sunder at brainlink.com (Ray Arachelian)
Date: Wed, 7 Jan 1998 01:12:53 +0800
Subject: fwd: The Swedes discover Lotus Notes has key escrow! (Win Treese)
Message-ID:
(From the SpyKing Security Mailing list)
2)From: Mike G
Subject: Lotus Privacy Problems
This was taken from the Computer Privacy Digest 1/4/98 V12#00
Very interesting.
The Swedes discover Lotus Notes has key escrow! (Win Treese)
The article describes the reaction when various people in the Swedish
government learned that the Lotus Notes system they were using includes
key escrow. They were apparently unaware of this until Notes was in
use by thousands of people in government and industry.
Besides being an interesting reaction to key escrow systems, this
incident reminds us that one should understand the real security of a
system....
Secret Swedish E-Mail Can Be Read by the U.S.A.
Fredrik Laurin, Calle Froste, *Svenska Dagbladet*, 18 Nov 1997
One of the world's most widely used e-mail programs, the American Lotus
Notes, is not so secure as most of its 400,000 to 500,000 Swedish users
believe. To be sure, it includes advanced cryptography in its e-mail
function, but the codes that protect the encryption have been
surrendered to American authorities. With them, the U.S. government
can decode encrypted information. Among Swedish users are 349
parliament members, 15,000 tax agency employees, as well as employees
in large businesses and the defense department. ``I didn't know that
our Notes keys were deposited (with the U.S.). It was interesting to
learn this,'' says Data Security Chief Jan Karlsson at the [Swedish]
our Notes keys were deposited (with the U.S.). It was interesting to
learn this,'' says Data Security Chief Jan Karlsson at the [Swedish]
defense department. Gunnar Grenfors, Parliament director and daily
e-mail user, says, ``I didn't know about this--here we handle sensitive
information concerning Sweden's interests, and we should not leave the
keys to this information to the U.S. government or anyone else. This
must be a basic requirement.''
Sending information over the Internet is like sending a postcard--it's
that simple to read these communications. When e-mail is encrypted, it
becomes unintelligible for anyone who captures it during transport.
Only those who have the right codes or raw computer power to break the
encryption can read it. For crime prevention and national security
reasons, the United States has tough regulations concerning the level
of crytography that may be exported. Both large companies and
intelligence agencies can already--in a fractions of a second--break
the simpler cryptographic protections. For the world-leading American
computer industry, cryptographic export controls are therefore an ever
greater obstacle. This slows down utilization of the Internet by
businesses because companies outside the U.S.A. do not dare to send
important information over the Internet. On the other hand, the
encryption that may be used freely within the U.S.A. is substantially
more secure.
Lotus, a subsidiary of the American computer giant IBM, has negotiated
a special solution to the problem. Lotus gets to export strong
cryptography with the requirement that vital parts of the secret keys
are deposited with the U.S. government. ``The difference between the
American Notes version and the export version lies in degrees of
encryption. We deliver 64 bit keys to all customers, but 24 bits of
those in the version that we deliver outside of the United States are
deposited with the American government. That's how it works today,''
says Eileen Rudden, vice president at Lotus.
Those 24 bits are critical for security in the system. 40-bit
encryption is broken by a fast computer in several seconds, while 64
bits is much more time-consuming to break if one does not have the 24
bits [table omitted]. Lotus cannot answer as to which authorities have
received the keys and what rules apply for giving them out. The
company has confidence that the American authorities responsible for
this have full control over the keys and can ensure that they will not
be misused.
On the other hand, this (assurance) does not matter to Swedish
companies. On the contrary, there is a growing understanding that it
would be an unacceptable security risk to place the corporation's own
``master key'' in the hands of foreign authorities. Secret information
can leak or be spread through, for example, court decisions in other
countries. These concerns are demonstrated clearly in a survey by the
SAF Trade and Industry security delegation. Some 60 companies answered
the survey. They absolutely do not want keys deposited in the U.S.A.
It is business secrets they are protecting. These corporations fear
that anyone can get a hold of this information, states Claes Blomqvist
at SAF.
Swedish businesses are also afraid of leaks within the American
authorities. The security chief at SKF, Lars Lungren, states: ``If one
has a lawful purpose for having control over encryption, it isn't a
problem. But the precept is flawed: They ought to monitor
(internally), but the Americans now act as if there are no crooks
working within their authorities.''
In some countries, intelligence agencies clearly have taken a position
on their country's trade and industry. Such is the case in France.
One example, which French authorities chose to publicize, was in 1995
when five CIA agents were deported after having spied on a French
telecommunications company.
Win Treese
[The Lotus Notes crypto scheme is one that I have familiarly been
calling ``64 40 or fight!'' (in a reference to a slogan for an early
U.S. election campaign border-dispute issue many years ago. PGN]
From ericm at lne.com Tue Jan 6 09:14:06 1998
From: ericm at lne.com (Eric Murray)
Date: Wed, 7 Jan 1998 01:14:06 +0800
Subject: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID: <199801061655.IAA23107@slack.lne.com>
Wei Dai writes:
>
> I don't understand why there is so much talk about guns here lately.
> Unless someone comes up with a weapon that has some very unusual economic
> properties, individuals cannot hope to compete with governments in the
> domain of deadly force. If we have to resort to physical violence, we've
> already lost!
>
> Think about it: if we can defend ourselves with guns, why would we need
> crypto?
I agree- the fedz will always have better firepower than any of
us. Tim's strategy of letting them know that he won't take
a 'no-knock' raid sitting down might keep them honest. Or it
might make them come in with 80 special agents and a heliocopter to
drop napalm on his house.
I'm not going to spend a lot of time setting up defenses against a
massive police attack- the costs are too high (expensive weapons, time
practicing on the range) and the hassle is great... who wants to
live barricaded in their house, jumping at every noise?
Better to do the things that we're good at- writing code, cracking
codes, writing about crypto-liberation ideas.
However, guns are good for a couple things- they're still useful
against non-government thugs, and they're a hell of a lot of fun.
--
Eric Murray Chief Security Scientist N*Able Technologies www.nabletech.com
(email: ericm at lne.com or nabletech.com) PGP keyid:E03F65E5
From andy at neptune.chem.uga.edu Tue Jan 6 09:43:05 1998
From: andy at neptune.chem.uga.edu (Andy Dustman)
Date: Wed, 7 Jan 1998 01:43:05 +0800
Subject: PGP-out-only vs. hashcash aware remailers?
In-Reply-To: <199801061630.LAA15383@users.invweb.net>
Message-ID:
-----BEGIN PGP SIGNED MESSAGE-----
On Tue, 6 Jan 1998, William H. Geiger III wrote:
> In , on
> 01/05/98
> at 11:14 AM, Andy Dustman said:
>
> >A couple problems: PGP (2.6.x) doesn't seem to have an option to only
> >de-armor
>
> PGP -da [filename]
Well that would help a lot, then. Find the begin and end headers for the
PGP message, pipe it into pgp -da, throw away the output, check the exit
code, which should be set if the armor was invalid (or perhaps look at
stderr). Like I said, though, you could still make the armor valid by
correctly calculating the CRC, or even make PGP generate the armor with
the insult/flames/whatever in the output (just a matter of shifting some
bits around before armoring, could be done in perl). But this is certainly
not worth worrying about.
Andy Dustman / Computational Center for Molecular Structure and Design
For a great anti-spam procmail recipe, send me mail with subject "spam".
Append "+spamsucks" to my username to ensure delivery. KeyID=0xC72F3F1D
Encryption is too important to leave to the government. -- Bruce Schneier
http://www.athens.net/~dustman mailto:andy at neptune.chem.uga.edu <}+++<
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv
iQEPAwUBNLJsUBOPBZTHLz8dAQFd8wfQhU4uMzLL8zHUXtHSeBLdHYPe66h6ZNw7
aMHntK3fz+6ZkpiTLb/iqGZKNm6pSueXz3CxbIytbTS+IwFpgRpZX/w2gz1Jw2hh
tRiB9pCIXSlnV5E9K5fsREZRGlRyj82J6n2yjrTOQWLlW+piAopbBz20ShyELBaA
HbygYVmbtqH0Q5aHXO6xVfz6odP0UQB3RblpVZr/Zl99tbbL9mZ5g8CMgcOf57Jq
kORo+q4FTo8DhC7KfOs4oqIcsj+yKsX7qwANMd9RTl+6YXsqcV6A/jf2g3v1Q3wQ
1Oggz1gWNXn3+d2RSuIrCFEoUpLHIfMk4pMv8tH/Ikuaag==
=869+
-----END PGP SIGNATURE-----
From whgiii at invweb.net Tue Jan 6 09:45:57 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Wed, 7 Jan 1998 01:45:57 +0800
Subject: Mobile phones used as trackers
In-Reply-To: <199801061007.EAA28104@supra.rsch.comm.mot.com>
Message-ID: <199801061749.MAA16034@users.invweb.net>
-----BEGIN PGP SIGNED MESSAGE-----
In <199801061007.EAA28104 at supra.rsch.comm.mot.com>, on 01/06/98
at 05:07 AM, "Loren J. Rittle" said:
>In article <199801012054.PAA25297 at users.invweb.net>,
>"William H. Geiger III" writes:
>> It is my understanding that they can still track you with the cell phone
>> turned off so long as there is power going to the box (most auto cell
>> phones are hardwired into the cars electrical system).
>This is the funniest thing I have read in some time. Assuming you watch
>the show, I think you may have watched too many episodes of the X-Files
>(TM).
The point I was trying to make, and you seemed to have missed, is that
just because you turn off the switch and the lights are not flashing and
blinking does not mean that power is not going to some of the circuits.
Take the following into account:
1) Location Tracking via Cell Phone is currently available using equipment
in place.
2) FCC mandates for Location tracking under the cover of 911 service
3) In field testing being done in several cities.
4) Lojack systems in place in several cities.
5) Systems in development for continuous traffic monitoring in the major
cities for automated traffic management to address the problems of "rush
hour" traffic.
6) GPS systems being built into productions vehicles at the factory.
It seems only natural to merge these into one piece of equipment using one
communication infrastructure. I think that if you take a closer look at
where various technologies and regulations are going to see that this is
less "X-File" like than you may think.
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html
- ---------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNLJsa49Co1n+aLhhAQENDwQAg93KFwtcSlKX2MB/W/zaQ1DoPtPoo1/+
69qd8v9fTz35IOr8hKLiwwSf1jxqJNOMasU1jyjQtmPqZLVJFS6vQdgbj+9mcRaQ
VKL48HrmiGasEFYXlsVP7qBSPxYP63qxz3gs0zKlKVLrZ6dO+0dt+WXdc1lYCcaJ
a9BM9B3w/Pw=
=dULr
-----END PGP SIGNATURE-----
From honig at otc.net Tue Jan 6 10:01:00 1998
From: honig at otc.net (David Honig)
Date: Wed, 7 Jan 1998 02:01:00 +0800
Subject: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID: <3.0.5.32.19980106095312.007b8eb0@otc.net>
At 01:54 AM 1/6/98 -0800, Tim May wrote:
>At 12:51 AM -0800 1/6/98, Wei Dai wrote:
>>I don't understand why there is so much talk about guns here lately.
Wei, Tim's response, though correct, is too serious. The real reason, I am
inferring as I was not the initiator, was humor.
This list tolerates a fair amount of crap, including spam and random
ad-hominems.
This is a result of the openness required to permit anonymous posts as has
been explained in the last month or so.
I have considered this 1. an occasional demonstration of
crypto issues, esp. anonymity and authentication 2. just typical net.abuse.
(There is also some oddness going on apparently between Vulis and others on
this
list, which Vulis didn't deny was spoofed when I asked. I don't know why,
as V. seems to be libertarian, if homophobic.)
There are also various humorous threads and banter that occurs. The gun-troll
was part of that. Of course, it was a respectable question and answered well,
although TM's answer tended towards the expensive, but Intel has done well.
Both the question itself on this list, and the dryness of the answers, were
amusing.
The body-armor question is humorous also, esp. following the gun side-thread.
Of course, your milage may vary.
------------------------------------------------------------
David Honig Orbit Technology
honig at otc.net Intaanetto Jigyoubu
"How do you know you are not being deceived?"
---A Compendium of Analytic TradeCraft Notes,
Directorate of Intelligence, CIA
From declan at well.com Tue Jan 6 10:10:16 1998
From: declan at well.com (Declan McCullagh)
Date: Wed, 7 Jan 1998 02:10:16 +0800
Subject: Gadget Warfare, from the Netly News
Message-ID:
*********
http://cgi.pathfinder.com/netly/opinion/0,1042,1669,00.html
The Netly News (http://netlynews.com/)
January 6, 1998
Gadget Warfare
by Declan McCullagh (declan at well.com)
For a country with no real military rivals, the U.S. still
manages to find an amazing number of enemies. Terrorists top the list
of anti-American villains, according to a Pentagon report released
last month.
The 100-page document, called "Responses to Transnational
Threats," describes how the military should respond to the threat of
saboteurs and bombers aiming for violence, not victory. The solution,
according to the Pentagon, is to develop a set of gadgets that would
make even James Bond jealous:
* STICKY ELECTRONICS Think SpiderMan's spidertracers, only smaller.
"Sticky electronics" adhere to a suspected terrorist's clothing, hair,
luggage or vehicle and report his location. These almost microscopic
gizmos tune in to satellite signals and transmit their exact latitude
and longitude. "To conserve battery (and mission life) they would
respond only when" activated by a radio signal, the Pentagon says. And
if you're the suspicious type, sprinkle some in your spouse's
underwear.
* DATA MINING If you worried about the FBI's jones for access to
your data, wait 'til you find out what the military hopes to do. The
Pentagon wants authority to sift through private-sector databases in
hopes of tracking down, say, the World Trade Center bombers before
they strike. The plan is to incorporate "real-time data on
international border crossings, real-time cargo manifests, global
financial transactions and the global network carrying international
airline ticket manifests." As new private-sector databases are
developed, "the baseline system would be augmented so that the
correlation and fusion process becomes more automated." But the
benefits of invading everyone's privacy are dubious: It's hard to
imagine the alleged Unabomber, for instance, showing up in computer
files.
[...]
From whgiii at invweb.net Tue Jan 6 10:16:27 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Wed, 7 Jan 1998 02:16:27 +0800
Subject: fwd: The Swedes discover Lotus Notes has key escrow! (Win Treese)
In-Reply-To:
Message-ID: <199801061821.NAA16341@users.invweb.net>
-----BEGIN PGP SIGNED MESSAGE-----
In , on
01/06/98
at 12:11 PM, Ray Arachelian said:
>Lotus, a subsidiary of the American computer giant IBM, has negotiated a
>special solution to the problem. Lotus gets to export strong
>cryptography with the requirement that vital parts of the secret keys are
>deposited with the U.S. government. ``The difference between the
>American Notes version and the export version lies in degrees of
>encryption. We deliver 64 bit keys to all customers, but 24 bits of
>those in the version that we deliver outside of the United States are
>deposited with the American government. That's how it works today,''
>says Eileen Rudden, vice president at Lotus.
I have 2 problems with this outside of the fact they are doing it:
1) 64 bits is too weak.
2) why should we trust them that it is only the export versions they are
giving the 24bit to the government on??
Yet *another* reason not to use Lotus Bloats.
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html
- ---------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNLJ0AY9Co1n+aLhhAQH/ugP/c98Sq7gCiXV8P045MyJZbcGmJGmD1IeX
SgQAhCrThv8bmou+stgJfoYClaDQ1ozbyGyCuJXgCgp/AHhUjEuDLGxIgAzRTuHX
V3vNSvNhW3FHMVSG1+UGylchaZzwhyo036frJrc3zxGXPGY142Y1BEW+4Zeoa1NN
YPw0QYYnxnY=
=k6PK
-----END PGP SIGNATURE-----
From honig at otc.net Tue Jan 6 10:24:08 1998
From: honig at otc.net (David Honig)
Date: Wed, 7 Jan 1998 02:24:08 +0800
Subject: cypherpunks and guns
In-Reply-To:
Message-ID: <3.0.5.32.19980106100807.007ab610@otc.net>
At 05:28 AM 1/6/98 -0500, Ryan Lackey wrote:
>
>I am fairly certain that as an irregular army soldier I could inflict
>a substantial amount of damage upon an occupying military. With maybe
>$20k in equipment and several hundred hours of training, you could make
>life very difficult for any luckless squad that happens your way. Multiply
>that by 100 million armed citizens and you see that armed civilian
>resistance *can* defeat an occupying army.
A distributed decentralized terrorist group can trash almost any country's
infrastructure as well. The gov't knows this, but if it were to start
happening (or their intelligence indicated it might) guards would be
sent to the power stations, transformers, water works, radio relays,
NAPs, refineries, etc.
These guards would be physical, guarding physical resources against
physical threats. They would be able to resist smaller threats.
As you say, if outnumbered, they're eventually hosed.
The recent gov't interest in 'cyber' threats against infrastructure
reflects the fact that the government doesn't dominate the digital domain,
and can't protect it with troops, and needs it to run civilization and its
armies.
------------------------------------------------------------
David Honig Orbit Technology
honig at otc.net Intaanetto Jigyoubu
"How do you know you are not being deceived?"
---A Compendium of Analytic TradeCraft Notes,
Directorate of Intelligence, CIA
From declan at well.com Tue Jan 6 10:31:45 1998
From: declan at well.com (Declan McCullagh)
Date: Wed, 7 Jan 1998 02:31:45 +0800
Subject: Jim Bell article excerpt (Was: Letter on Jim Bell)
Message-ID:
I wrote this last summer:
[...]
Then Assassination Politics sent the IRS into a
tizzy. Jeffrey Gordon, an inspector in the IRS'
Internal Security Division, widened the
investigation immediately. He detailed in an
10-page affidavit how he traced Bell's use of
allegedly fraudulent Social Security Numbers, how
he learned that Bell had been arrested in 1989
for "manufacturing a controlled substance," how
he found out that Bell possessed the home
addresses of a handful of IRS agents. Gordon's
conclusion? Bell planned "to overthrow the
government." The IRS investigator said in his
affidavit that Bell's "essay details an illegal
scheme by Bell which involves plans to
assassinate IRS and other government officials...
I believe that Bell has begun taking steps to
carry out his Assassination Politics plan."
But for all Gordon's bluster in court documents,
he had no proof that Bell broke the law. He
didn't even have enough evidence to arrest the
prolific essayist -- at least not yet.
After the April 1 raid, Gordon and a team of IRS
agents worked to assemble a case against Bell.
They pored through the hard drives of the three
computers they seized. They scrutinized documents
from Bell's house. They interrogated his friends.
They listened to tape recordings of the
"Multnomah County Common Law Court." They scoured
the Net for mentions of Assassination Politics.
Six weeks later they felt their case was
complete.
---
IRS agents arrested Bell on May 16 and charged
him with obstructing government employees and
using false Social Security numbers. Now, this is
hardly attempting "to overthrow the government."
But government agents insist Bell is far more
dangerous than the charges suggest. (The judge
seemed to agree: at the time of this writing,
Bell is being held without bail.)
The latest IRS documents filed with the court
label Bell a terrorist. They claim he talked
about sabotaging the computers in Portland,
Oregon's 911 center, contaminating a local water
supply with a botulism toxin, extracting a poison
called Ricin from castor beans, and manufacturing
Sarin nerve gas. He allegedly bought and tested
some of the chemicals. "Bell has taken overt
steps to implement his overall plan by devising,
obtaining, and testing the materials needed to
carry out attacks against the United States,
including chemicals, nerve agents, destructive
carbon fibers, firearms, and explosives," the
complaint says.
But what really got the IRS in a stink was what
happened a month after they seized Bell's car.
The complaint says: "On March 16, 1997, a Sunday,
an IRS employee noted a strong odor in the
Federal building. On March 17, 1997, several IRS
employees had to be placed on leave due to the
odor, and another employee reported other ill
effects. The odor was traced to a mat and
carpeting... just outside the IRS office
entrance." The chemical proved to be "mercaptan,"
with which Bell's friends say he doused
an adversary's law office in the early 1980s.
Yet if Bell was a crypto-terrorist, he was a
singularly idle one. This is a problem with the
IRS' accusations: if true, they prove too much.
If Bell was bent on toppling the government, and
his exploits date back from the early 1980s, why
are they such laughably juvenile and ineffectual
ones? Stink-bombing offices isn't a Federal
felony, nor should it be.
"I would've thought this would be 'malicious
mischief,' at most," Tim May, one of the founders
of the cypherpunks, writes. "People who've done
far, far, far worse are left unprosecuted in
every major jurisdiction in this country. The
meat thrown to the media -- the usual AP stuff,
mixed in with 'radical libertarian' descriptions
-- is just to make the case more
media-interesting... It sure looks like they're
trying to throw a bunch of charges against the
wall and hope that some of them stick -- or scare
Bell into pleading to a lesser charge."
Since his arrest, the denizens of the cypherpunks
list, where Bell introduced and refined his
ideas, have become generally sympathetic. Gone is
the snarling derision, the attacks on his ideas
as too extreme. Now a sense of solidarity has
emerged. One 'punk wrote: "I have decided that I
cannot in good conscience allow Jim Bell's
persecution for exercising his basic human right
to free speech to pass by without taking personal
action to support him."
---
When I talked to Bell a few days before his
arrest, he spoke calmly and with little rancor
about the pending investigation. I couldn't tell
how he felt after being raided and interrogated
by his arch-enemy, the IRS. But imagine
continuously railing on the Net against
jackbooted thugs, then having real ones bash down
your front door.
Bell was most interested in talking up
Assassination Politics and predicting how it
would eventually blossom. He had just published
an op-ed in a local newspaper saying "the whole
corrupt system" could be stopped. "Whatever my
idea is, it's not silly. There are a lot of
adjectives you can use, but not silly," he told
me. "I feel that the mere fact of having such a
debate will cause people to realize that they no
longer have to tolerate the governments they
previously had to tolerate. At that point I think
politicians will slink away like they did in
eastern Europe in 1989. They'll have lost the
war."
He told me why he became convinced that the
government needed to be lopped off at the knees.
Bell's epiphany came after he ordered a chemical
from a supply firm and was arrested when he
failed to follow EPA regulations. "That
radicalized me," he said. "That pissed me off. I
figured I'd get back at them by taking down their
entire system. That's how I'd do it."'
Moral issues aside, one of the problems plaguing
Bell's scheme is that it's not limited to
eliminating "government thugs who violate your
rights," as he likes to describe it. If it
existed, anyone with some spare change could wipe
out a nosy neighbor or even an irritating grocery
store clerk. After I pointed this out to Bell on
the phone, he fired email back a few days later
saying, "Assuming a functioning Assassination
Politics system, nothing stops you from
contributing to my death." He suggested that
maybe assassins would develop scruples: "You'd
be able to purchase deaths of unworthy people,
but it might be only at a dramatically higher
price. Doable but not particularly economical."
[...]
-Declan
From declan at well.com Tue Jan 6 11:19:49 1998
From: declan at well.com (Declan McCullagh)
Date: Wed, 7 Jan 1998 03:19:49 +0800
Subject: ACM conference on computer-related policy (DC, 5/98)
Message-ID:
---------- Forwarded message ----------
Date: Tue, 6 Jan 1998 11:10:49 -0800 (PST)
From: Declan McCullagh
To: fight-censorship-announce at vorlon.mit.edu
Subject: ACM conference on computer-related policy (DC, 5/98)
[The best policy for the Net is probably no policy, or at most a hands-off
one. We don't have national "policies" for how we should regulate, for
example, newspapers or bookstores, and we don't need such policies for the
Net. On universal service, we already have Internet connections that are
cheaper than cable TV; on copyright, the safest course is to let federal
courts decide; on crypto, most agree that the current "policy" is
misguided at best. --Declan]
***************
ASSOCIATION FOR COMPUTING (ACM) ANNUAL CONFERENCE
* * * POLICY98 * * *
"Shaping Policy in the Information Age"
Washington, DC, Renaissance Hotel
May 10-12, 1998
Preliminary Notice
For Conference and Registration information see:
http://www.acm.org/usacm/events/policy98/
The ACM Annual Conference will focus on public policy issues
affecting future applications of computing. Our goal is to
forge stronger links between computing professionals and policy
makers. Attendees will interact with prominent leaders from
academia, industry, Congress, and Executive agencies, and
participate in debates on policy issues including Universal
Access, Electronic Commerce, Intellectual Property, and
Education Online.
The conference will promote more regular engagement of computing
professionals in democratic processes related to productive use
of computing and information processing innovations. A blend of
technical skills and policy insights are essential to cope with
the inherent opportunities and dangers of any transformational
technology. Continuing collaborations between computing
professionals and policy makers will benefit citizens, consumers,
entrepreneurs, researchers, and students. You can make a difference!
May 10: Ethical and social impacts papers and panels
May 11-12: Public policy panels and featured speakers
All Policy98 attendees are invited to the Annual ACM Awards Banquet
on Sunday evening May 10th, and a conference reception on Monday
evening May 11th.
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
PANEL TOPICS AND COORDINATORS
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
Universal Service: Ollie Smoot
What can be done to promote widespread access to the benefits of
the Internet? What is the role of government and the role of the
private sector in wiring schools, libraries, and medical facilities?
Electronic Commerce: Jim Horning
How much public policy does EComm need? What problems would
inadequate, excessive, or misguided policies cause? Can compromises
in areas like fair trade practices, fraud prevention, security, privacy,
law enforcement, and taxation advance the interests of all stakeholders?
Intellectual Property in Cyberspace: Pam Samuelson
What will be the impact of the WIPO agreements on copyright in
cyberspace? How should intellectual property be protected and what
safeguards are necessary to protect libraries and academic institutions?
Education Online: Charles N. Brownstein
The Internet offers unparalleled opportunities for learning and teaching.
What public policy and technical challenges must be met to realize
these prospects?
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
CONFERENCE CO-CHAIRS
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
Ben Shneiderman, USACM (U.S. Public Policy Committee)
C. Dianne Martin, SIGCAS (ACM Special Interest Group
on Computers & Society)
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
PROGRAM COMMITTEE CHAIRS
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
Marc Rotenberg, Public Policy
Keith Miller, Ethics and Social Impacts
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
REGISTRATION INFORMATION
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
For more information, contact: policy98 at acm.org
or to register electronically, see:
http://www.acm.org/usacm/events/policy98/reginfo.html
Early registrants and ACM members receive discounts.
From guy at panix.com Tue Jan 6 11:19:53 1998
From: guy at panix.com (Information Security)
Date: Wed, 7 Jan 1998 03:19:53 +0800
Subject: cypherpunks and guns
Message-ID: <199801061912.OAA08946@panix2.panix.com>
Ryan Lackey
# AOLserver (a nice web server formerly from GNN/navisoft) punted their
# 128bit SSL module distribution *EVEN TO US CITIZENS* due to commerce
# department fuckedness. Anyone know where I could get a copy? It would
# really suck to have to patch the 40bit one into a 128bit version, since
# they do not distribute source.
I don't know if this is the "module" form of the answer you want:
http://www.replay.com/
Download Netscape Communicator 4.04 with 128 bits SSL today on:
ftp.replay.com
Replay Associates distributes this software
so you can safely conduct your E-commerce
----
Tim May wrote:
> Final comment: If I find the motivation, I may finish an essay I've been
> working on about how we, the Cypherpunks and the World, are *retrogressing*
> in crypto areas. Most of the exotic applications are no longer being
> discussed, and various mundane commercial products are the main focus.
> Yawn.
How about moving this list to encrypt its transmissions in
the recipient's public keys, just to begin encrypting Net traffic?
Obviously not to hide what is being said, but simply to start
moving communications into the encrypted realm.
That way, we'll build up the software tools for handling this,
and try to get other lists to do the same.
Maybe encourage all pro-crypto people to use it for all email to as
many other people they talk with as possible. (Adopt two others...)
Heh: a white-list to allow only encrypted messages through.
Encourage Senators to set up public keys.
In general, try to get the general flow of traffic encrypted,
even if PGP is "mundane" these days.
Solving the human factors problem of getting its use wide-spread
is _not_ a mundane problem. Encryption ain't gonna be that useful
if only a few in-the-know use it.
---guy
From aba at dcs.ex.ac.uk Tue Jan 6 11:27:33 1998
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Wed, 7 Jan 1998 03:27:33 +0800
Subject: Jim Bell article excerpt (Was: Letter on Jim Bell)
In-Reply-To:
Message-ID: <199801061908.TAA00400@server.eternity.org>
Declan McCullagh writes:
Declan reposting something he wrote last year:
> After I pointed this out to Bell on the phone [someone might
> assassinate annoying neighbors], he fired email back a few days
> later saying, "Assuming a functioning Assassination Politics system,
> nothing stops you from contributing to my death." He suggested that
> maybe assassins would develop scruples: "You'd be able to purchase
> deaths of unworthy people, but it might be only at a dramatically
> higher price. Doable but not particularly economical."
You interpret Jim as implying "maybe assassins would develop
scruples";
this doesn't look like the meaning of what you quote Jim as saying:
"You'd be able to purchase deaths of unworthy people, but it might be
only at a dramatically higher price."
it looks more like Jim was suggesting that free market forces would
tend to prevent deaths of lesser known people. Think about it -- it
would be dead easy to get a contract on Barney due to the number of
people who know and hate him -- but on an average neighbor, who is
completely obscure, you'd easily have to fund the entire bet yourself.
Adam
From emc at wire.insync.net Tue Jan 6 11:35:58 1998
From: emc at wire.insync.net (Eric Cordian)
Date: Wed, 7 Jan 1998 03:35:58 +0800
Subject: Silly Shrinkwrapped Encryption
Message-ID: <199801061930.NAA09848@wire.insync.net>
Could someone poke through Lotus Notes with a debugger and see exactly how
this "giving 24 bits to the government" is implemented?
Most commercial software simply introduces redundancy in order to limit
the keyspace to 40 bits, regardless of the advertised length of the key.
This claim that they deliver 64 bits of key to the customer seems a bit
bogus.
Of course, they could have done something clever, like generating a
completely random 64 bit key, and then encrypting 24 bits of it with a
giant government-owned RSA public key, and including this additional
information with each message. However, it seems unlikely that they would
employ such strong encryption for message recovery, while offering only 64
bits for message encryption.
Is Lotus Notes encryption documented anywhere? Are the differences
between the export and domestic versions disclosed to overseas customers?
--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
From emc at wire.insync.net Tue Jan 6 11:53:41 1998
From: emc at wire.insync.net (Eric Cordian)
Date: Wed, 7 Jan 1998 03:53:41 +0800
Subject: Silly Shrinkwrapped Encryption
In-Reply-To: <199801061930.NAA09848@wire.insync.net>
Message-ID: <199801061949.NAA09879@wire.insync.net>
To follow up my prior message...
I managed to find a document entitled "Security in Lotus Notes and the
Internet" on the Web.
It describes the weakening procedure as follows.
"No matter which version of Notes you are using, encryption uses the
full 64-bit key size. However, the International edition takes 24 bits
of the key and encrypts it using an RSA public key for which the US
National Security Agency holds the matching private key. This
encrypted portion of the key is then sent with each message as an
additional field, the workfactor reduction field. The net result of
this is that an illegitimate hacker has to tackle 64-bit encryption,
which is at or beyond the practical limit for current decryption
technology and hardware. The US government, on the other hand, only
has to break a 40-bit key space, which is much easier (2 to the power
of 24 times easier, to be precise)."
Would anyone care to extract the modulus and exponent for the NSA's
Lotus Notes helper key and post it to this newsgroup?
--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
From jim at mentat.com Tue Jan 6 12:15:19 1998
From: jim at mentat.com (Jim Gillogly)
Date: Wed, 7 Jan 1998 04:15:19 +0800
Subject: Silly Shrinkwrapped Encryption
Message-ID: <9801062004.AA18375@mentat.com>
Eric Cordian says:
> Could someone poke through Lotus Notes with a debugger and see exactly how
> this "giving 24 bits to the government" is implemented?
Lotus produced a "backgrounder" called "Differential Workfactor Cryptography"
when they first promulgated the 64/40 stuff. It says (in part):
We do that by encrypting 24 of the 64 bits under a public RSA key
provided by the U.S. government and binding the encrypted partial
key to the encrypted data.
I haven't seen the USG RSA key -- if it's 512 bits, that would be a humorous
next factoring target.
Jim Gillogly
15 Afteryule S.R. 1998, 20:02
12.19.4.14.15, 12 Men 13 Kankin, Seventh Lord of Night
From tcmay at got.net Tue Jan 6 12:46:31 1998
From: tcmay at got.net (Tim May)
Date: Wed, 7 Jan 1998 04:46:31 +0800
Subject: Jim Bell article excerpt (Was: Letter on Jim Bell)
In-Reply-To:
Message-ID:
At 11:08 AM -0800 1/6/98, Adam Back wrote:
>it looks more like Jim was suggesting that free market forces would
>tend to prevent deaths of lesser known people. Think about it -- it
>would be dead easy to get a contract on Barney due to the number of
>people who know and hate him -- but on an average neighbor, who is
>completely obscure, you'd easily have to fund the entire bet yourself.
The weakness of Bell's scheme was always that it only worked (so to speak)
with well-known people.
While there are some who want well-known people dead, most murders-for-hire
happen for personal or financial reasons.
Given untraceable payment systems, and buttressed with untraceable escrow
systems, a much more efficient approach is simply to hire the killers
untraceably.
And the fluff about "picking the death date" is a side issue, one which
merely makes the whole thing more cumbersome.
--Tim May
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From tcmay at got.net Tue Jan 6 12:50:48 1998
From: tcmay at got.net (Tim May)
Date: Wed, 7 Jan 1998 04:50:48 +0800
Subject: Ray Ozzie and the Lotus Notes "40 + 24" GAK Hack
In-Reply-To: <199801061930.NAA09848@wire.insync.net>
Message-ID:
At 11:30 AM -0800 1/6/98, Eric Cordian wrote:
>Could someone poke through Lotus Notes with a debugger and see exactly how
>this "giving 24 bits to the government" is implemented?
>
>Most commercial software simply introduces redundancy in order to limit
>the keyspace to 40 bits, regardless of the advertised length of the key.
>This claim that they deliver 64 bits of key to the customer seems a bit
>bogus.
>
>Of course, they could have done something clever, like generating a
>completely random 64 bit key, and then encrypting 24 bits of it with a
>giant government-owned RSA public key, and including this additional
>information with each message. However, it seems unlikely that they would
>employ such strong encryption for message recovery, while offering only 64
>bits for message encryption.
>
>Is Lotus Notes encryption documented anywhere? Are the differences
>between the export and domestic versions disclosed to overseas customers?
Ray Ozzie, founder of Iris, the company which developed Notes and sold it
to Lotus, discussed his "40 + 24" hack a couple of years ago. It was met
with much derision in the community.
(He sent me a nice letter explaining his motivations for the 40 + 24 hack,
but I was of course unconvinced. BTW, my recollection was that they were
trying to get the industry to adopt this as a way of satisfying _domestic_
calls for GAK, not just for export to those dumb Swedes :-}).
--Tim May
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From tozumi44 at msn.com Wed Jan 7 04:52:58 1998
From: tozumi44 at msn.com (tozumi44 at msn.com)
Date: Wed, 7 Jan 1998 04:52:58 -0800 (PST)
Subject: Seeking Environmentally Friendly People ?
Message-ID: <199801072011BAA12986@post.metoc.ns.doe.ca>
Welcome to the 21st Century
Whoever gets in on the front end of this paradigm shift stands to make alot of money!
Helps Us Replace a $20 Billion Industry (Laundry Detergent)
The ULTRA 7 LaundryMaster System replaces Laundry Detergent, Fabric Softener, Bleach & Stain Remover Forever.(Sugg. Retail $89.95)
*NO MORE DETERGENT *NO MORE FABRIC SOFTENER
*NO BLEACH *NO STAIN REMOVER *CHEMICAL FREE WASHING
* NO MORE POLLUTION *SAVES THE ENVIRONMENT
* EXTENDS LIFE OF YOUR CLOTHES *60% LESS LINT
*100% HYPOALLERGENIC *SAVES MONEY *Only 4 CENTS PER DAY
* 7 YEAR PRODUCT WARRANTY.-PRODUCT LAST FOR 7 YEARS..
We can truly get you making money with this program and you will be doing your part to make the Earth a safer, better place for us and our children to live. I apologize for any inconvenience and hope to hear from you soon.. Please, serious inquires only.
Best Regards,
L. Crowder
President
Help Protect The Earth�s Water Sup
From tcmay at got.net Tue Jan 6 13:02:22 1998
From: tcmay at got.net (Tim May)
Date: Wed, 7 Jan 1998 05:02:22 +0800
Subject: ACM conference on computer-related policy (DC, 5/98)
In-Reply-To:
Message-ID:
At 11:11 AM -0800 1/6/98, Declan McCullagh wrote:
>---------- Forwarded message ----------
>Date: Tue, 6 Jan 1998 11:10:49 -0800 (PST)
>From: Declan McCullagh
>To: fight-censorship-announce at vorlon.mit.edu
>Subject: ACM conference on computer-related policy (DC, 5/98)
>
>[The best policy for the Net is probably no policy, or at most a hands-off
>one. We don't have national "policies" for how we should regulate, for
>example, newspapers or bookstores, and we don't need such policies for the
>Net. On universal service, we already have Internet connections that are
>cheaper than cable TV; on copyright, the safest course is to let federal
>courts decide; on crypto, most agree that the current "policy" is
>misguided at best. --Declan]
>
>***************
>
> ASSOCIATION FOR COMPUTING (ACM) ANNUAL CONFERENCE
>
> * * * POLICY98 * * *
> "Shaping Policy in the Information Age"
>
> Washington, DC, Renaissance Hotel
> May 10-12, 1998
..
Jeez, don't these Beltway Bandits _ever_ get tired of holding these
bullshit little conferences?
It seems every month or so there's one of these b.s. things.
Must be a way to justify their existence.
"Shaping Policy in the Information Age." Give me a break.
--Tim May
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From declan at well.com Tue Jan 6 13:14:50 1998
From: declan at well.com (Declan McCullagh)
Date: Wed, 7 Jan 1998 05:14:50 +0800
Subject: Rep. Sonny Bono (R-California) dies at 62
Message-ID:
************
http://cgi.pathfinder.com/netly/afternoon/0,1012,1670,00.html
The Netly News / Afternoon Line
January 6, 1998
When Sonny Turns to Blue
Rep. Sonny Bono, a Congressman better known for his songwriting than
his lawmaking, died yesterday in a skiing accident. He was 62. Bono
built his show-biz career on being the butt of Cher's jokes and found
that he played a similar role in Washington, a town where
self-deprecation is reviled, not admired. Washingtonian magazine once
dubbed him the dumbest member of Congress, and commentators criticized
his informal approach to lawmaking on the buttoned-down House
Judiciary committee, on which the California Republican tackled
Internet legislation. Early last year he staunchly opposed the FBI's
demands for increased government snooping power but then backed down.
He told me in September that at first he had not been "aware" of the
details surrounding the encryption debate and there are others "we
have to be concerned about." Bono also sponsored H.R. 1621 and H.R.
2589, two copyright extension bills currently being considered by
Congress. --Declan McCullagh/Washington
From JonWienk at ix.netcom.com Tue Jan 6 13:35:36 1998
From: JonWienk at ix.netcom.com (Jonathan Wienke)
Date: Wed, 7 Jan 1998 05:35:36 +0800
Subject: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID: <3.0.3.32.19980106131052.00745004@popd.netcruiser>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
At 12:51 AM 1/6/98 -0800, Wei Dai wrote:
>I don't understand why there is so much talk about guns here lately.
>Unless someone comes up with a weapon that has some very unusual economic
>properties, individuals cannot hope to compete with governments in the
>domain of deadly force. If we have to resort to physical violence, we've
>already lost!
>
>Think about it: if we can defend ourselves with guns, why would we need
>crypto?
InfoWar has always been a critical component of MeatWar. Knowing who your
enemy is and where he is at makes it much easier to do something about him.
Intelligence (in the military sense) and the tools to deny it to your
enemy (strong crypto) are of equal importance to weapons. If you know that
a homicidal Postal Service employee is standing outside your front door and
is preparing to blast it off its hinges and then kill you, this
intelligence will do nothing but raise your blood pressure if you have no
weapons with which to deal with the situation. (Calling 911 isn't going to
help you much.) If you own several "assault weapons", but are asleep in
the living room when the door comes crashing down, the lack of intel will
greatly reduce the effectiveness of said weapons.
I have an equation for this: Effectiveness = Intelligence * Force * Will.
I define force as the theoretical ability to inflict damage on an opponent,
whether via bad PR, propaganda, lethal or nonlethal weapons, or any other
means. Force has 2 components: Materiel and Skill. Thus, Force =
Materiel * Skill. (Example: If I own a riot shotgun and appropriate
ammunition, and have taken it to the range and familiarized myself with its
use, I have the theoretical ability to shoot the aforementioned Homicidal
Postal Employee, but mere ownership of the weapon and skill in its use does
not guarantee that outcome.) Will is simply the will to fight if
necessary.
Although government will always have a higher Force factor than an
individual or "the cypherpunks" or a militia, it can be possible to achieve
a higher Effectiveness score via higher Intelligence and/or Will factors.
This is how we lost the war in Vietnam. We had a much higher Force level
than the VC, comparable Intelligence levels, but a much lower Will ratio
(at least at the upper decision-making levels). Because of this, our Force
assets were bound under all sorts of bizarre restrictions which hampered
their usefulness, and we ultimately left in defeat.
By disseminating a mechanism for increasing the Cypherpunks Force level
(the Assassination Politics essay) and annoying some IRS agents with a
stinkbomb, Jim Bell increased the government's Will to capture and
incarcerate him. This is the problem with with terrorism in general (the
OKC bombing is a prime example).
If either Intelligence (the domain of crypto) or Force (the domain of
weapons) is zero, Effectiveness (the real-world ability to inflict damage
or defend yourself from damage) is also zero. Ignoring either can be
costly.
-----BEGIN PGP SIGNATURE-----
Version: PGP for Business Security 5.5
iQA/AwUBNLKd2sJF0kXqpw3MEQJMDACfbGNLIqwE57SxitK5ZDDc/JuWn1YAniO0
MxsO+BZXi+DWL9URMyOj+dzr
=s/B9
-----END PGP SIGNATURE-----
Jonathan Wienke
PGP Key Fingerprints:
7484 2FB7 7588 ACD1 3A8F 778A 7407 2928
3312 6597 8258 9A9E D9FA 4878 C245 D245 EAA7 0DCC
"If ye love wealth greater than liberty, the tranquility of servitude
greater than the animating contest for freedom, go home from us in peace.
We seek not your counsel, nor your arms. Crouch down and lick the hand that
feeds you. May your chains set lightly upon you; and may posterity forget
that ye were our countrymen."
-- Samuel Adams
"Stupidity is the one arena of of human achievement where most people
fulfill their potential."
-- Jonathan Wienke
Never sign a contract that contains the phrase "first-born child."
When the government fears the people there is liberty.
When the people fear the government there is tyranny.
RSA export-o-matic:
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: <199801062128.VAA00264@server.eternity.org>
Jim Gillogly writes:
> Eric Cordian says:
> > Could someone poke through Lotus Notes with a debugger and see exactly how
> > this "giving 24 bits to the government" is implemented?
>
> Lotus produced a "backgrounder" called "Differential Workfactor Cryptography"
> when they first promulgated the 64/40 stuff. It says (in part):
>
> We do that by encrypting 24 of the 64 bits under a public RSA key
> provided by the U.S. government and binding the encrypted partial
> key to the encrypted data.
>
> I haven't seen the USG RSA key -- if it's 512 bits, that would be a humorous
> next factoring target.
It would be humorous to even have the modulus and exponent -- if
someone can obtain them, I'll package it up as a working PGP key, and
give it user id of Spook GAK key , and submit to the
keyservers. Then we have solved the key escrow implementation
problems for the US government -- anyone who wants to send them a
message can simply add DIRNSA to the list of recipeints.
I don't have a copy of Notes, otherwise I thought this a most fun
exploit to attempt.
The above "solution" to key escrow infra-structure calls from Freeh
etc., should be credited to Carl Ellison; probably others have
proposed it also. Carl offered to sign some cheif spooks key, if he
would generate one for the purpose, cheif spook declined the offer.
I observed a few times before that now that Lotus have organised with
the NSA to produce such a key, we can do the job of implementing the
voluntary key escrow infrastructure for them. (It is voluntary
right?)
Adam
--
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
---------- Forwarded message ----------
Date: Tue, 6 Jan 1998 14:30:57 -0500
From: Ben Isaacson
To: "'declan at well.com'"
Subject: Would you consider forwarding this as well?
--> WashingtonWeb Internet Policy Forum
More info at http://www.washingtonweb.org and
http://www.interactivehq.org
Interactive Industry Leaders and Top Policy Makers to Meet
at WashingtonWeb Internet Policy Forum
Washington, DC -- With the mounting interest of
Washington in the Internet, key policy makers and Internet
industry executives will come together for a strategic
discussion about the impact of politics on the Internet.
Sponsored by the Association for Interactive Media, the
WashingtonWeb Internet Policy Forum, February 9 and 10,
1998, is the premier top-level meeting between the
Washington policy community and the leaders of the new media
industry.
"Internet executives and government officials come
from very different backgrounds. There needs to be an on-
going dialogue between the users and regulators of this
powerful medium in order to ensure that businesses may
continue to grow and serve the public. The WashingtonWeb
Internet Policy Forum is designed to facilitate this
discussion," said Andy Sernovitz, President of the
Association for Interactive Media.
Currently, over 300 Members of Congress have co-
sponsored bills regulating interactive businesses. Federal
regulatory agencies including the FCC, FTC, NTIA, Treasury,
Federal Reserve, White House Office of Technology
Assessment, and the Patent and Trademark Office, are
considering new legislation and regulation. Commerce on the
Net will be forever shaped by the dozens of bills,
regulations, and policy directives that are already on the
table. Participants will have the opportunity to interact
with the very legislators and regulators who will make these
decisions.
A partial list of topics to be discussed at
WashingtonWeb include: Pending Legislation and Regulation:
The Industry Response; Potential Expansion of FTC and FCC
Jurisdictions; Taxing the Internet; Beltway Wonks vs. Web
Gurus; Consumer Concerns and Industry Self-Regulation.
Speakers (to date) include: Representative Rick Boucher;
Adam Theirer, Heritage Foundation; Adam Clayton Powell III,
The Freedom Forum; Pete DuPont, IntellectualCapital.com.;
Robin Raskin, Editor & Publisher, Family PC Magazine;
Kenneth Dotson, CBS Sportsline; and Gordon Ross, NetNanny.
Sponsors include: Manatt, Phelps & Phillips, Policy.com,
CNN/Time All Politics, Net Nanny, IntellectualCapital.com,
and Exodus Communications.
The WashingtonWeb Internet Policy Forum will be held
February 9 and 10, 1998, at the Willard intercontinental
Hotel in Washington, DC.
CONTACT:
Andy Dotson
Association for Interactive Media
202-408-0008
andy at interactivehq.org
http://www.washingtonweb.org
___________________________________________________
This message was sent to you because your company
is a member of the Association for Interactive Media.
Visit our web site: http://www.interactivehq.org
AIM never releases email addresses to third parties.
To SUBSCRIBE or CHANGE YOUR ADDRESS, email a note
to yasha at interactivehq.org
To UNSUBSCRIBE, forward this message to:
unsubscribe-members at lists.interactivehq.org
[staff at interactivehq.org]
___END____________________________________________
List server provided by Lyris -- http://www.lyris.com
From declan at well.com Tue Jan 6 14:13:21 1998
From: declan at well.com (Declan McCullagh)
Date: Wed, 7 Jan 1998 06:13:21 +0800
Subject: Question on U.S. Postal Service and crypto
Message-ID:
This is for a story for Time on the "new" U.S .Postal Service. I vaguely
recall the USPS trying to set digital signature standards and/or serve as
a CA. I'd like to mention this.
Can't remember the details, though. Does anyone have 'em (or a pointer to
them) handy?
-Declan
From honig at otc.net Tue Jan 6 15:07:41 1998
From: honig at otc.net (David Honig)
Date: Wed, 7 Jan 1998 07:07:41 +0800
Subject: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID: <3.0.5.32.19980106145505.007b45a0@otc.net>
At 01:10 PM 1/6/98 -0800, Jonathan Wienke wrote:
>InfoWar has always been a critical component of MeatWar. Knowing who your
>enemy is and where he is at makes it much easier to do something about him.
Yep. Also, infoWar also includes psychops: propoganda and disinformation.
During WWII, the largest
RF transmitter in the world at the time (a GE 500Kwtt) was used to
dishearten troops, incite civilians,
mislead commanders, etc. Effectively. Sometimes it jammed known
broadcasts; sometimes
the PSYCHOPS stations identified themselves correctly, more often they
claimed to be something
they weren't.
When everyone can publish c/overtly, it is harder to control the media; the
trade off is that
consumers have to think to filter. Not a bad deal.
Orwell was an optimist.
------------------------------------------------------------
David Honig Orbit Technology
honig at otc.net Intaanetto Jigyoubu
"How do you know you are not being deceived?"
---A Compendium of Analytic TradeCraft Notes,
Directorate of Intelligence, CIA
From jalonz at openworld.com Tue Jan 6 15:21:12 1998
From: jalonz at openworld.com (jalonz at openworld.com)
Date: Wed, 7 Jan 1998 07:21:12 +0800
Subject: The Digital Society Group
Message-ID: <85256584.007B1AC7.00@openworld.com>
Hi all,
Openworld, Inc. is a company which sets up free enterprise zones around the
world. The "free zones" are akin to Hong Kong and Singapore and are
self-governing, independent entities as recognized by the parent country.
Free zones usually have the ability to issue citizenship, business licenses
and incorporation status to entities as well as have their own police force
and arbitration structure. A lot of them are not nearly big enough to need
that kind of independence, but there are a few.
Free zones rarely have bureacracy, taxes, etc. because the idea is to
create an environment for the rapid creation and deployment of new
businesses. Land is leased for 50-100 years with a parent entity buy-back
at the end of the term.
Can anyone say corporate state? Basically, free zones are corporations (or
groups of) leasing land from a country in order to make it valuable enough
to sell back at a large profit in 100 years. Notice that the emphasis is on
very long-term results. The free zone only makes money if the residents are
happy, educated and making money. Environmental issues are addressed
immediately. There is no bureacracy to hold things back.
I'll be the first to agree that a corporate state is very easy to abuse
(soon the world could end up being a Microsoft corporate state ). But
you have to start somewhere.
Most of these zones are created in third world countries and poorly
developed areas. Free zones are exempt from telecommunications monopolies
so the bandwidth and connection fees are at regular US wholesale market
rates. When you consider that the economy is moving to be information and
bandwidth dependent, and the main thing holding a new country back is the
cost of a satellite feed, a free zone has enormous impact on the growth of
an area.
It is a bit mind-boggling to realize what the marriage of a free economic
zone and the Internet can accomplish.
Openworld, Inc. is developing drop-in modules for health, education,
business and governance functions for free zones as well as Internet
connectivity and infrastructures.
A division of Openworld, Inc., The Digital Society Group, has been formed
to apply technology to the infrastructure of the free zones and essentially
mirror them in cyberspace .
Without getting into too much detail, The Digital Society Group is
constructing a pure-technology infrastructure to provide for the operation,
governance and existence of a complete digital society within a free
enterprise zone.
My priorities are:
1. encryption for all
2. anonymity for all
3. digital currency for all
4. the ability for the creation of ad-hoc micro-communities by citizens
more or less on-the-fly
5. the ability for any entity - hardware, software, etc. to be a citizen
and be entitled to certain rights such as property ownership,
incorporation,etc. (the legislation is being written right now)
6. do it very, very cheaply and give it to the end-user (the world) for
free.
Check out:
http://www.openworld.com/digitalsociety
Sorry about the sparse web pages and the crappy graphics, but there is no
money for a graphics designer.
Locations are planned for Africa, Southeast Asia, Russia, etc.
We are already coding...
:)
Jalon
---------------------------------------------------------------
Jalon Q. Zimmerman, Director
The Digital Society Group
A division of Openworld, Inc.
http://www.openworld.com/digitalsociety
jalonz at openworld.com
---------------------------------------------------------------
The government is not your mommy.
---------------------------------------------------------------
From shamrock at cypherpunks.to Tue Jan 6 16:06:18 1998
From: shamrock at cypherpunks.to (Lucky Green)
Date: Wed, 7 Jan 1998 08:06:18 +0800
Subject: Silly Shrinkwrapped Encryption
In-Reply-To: <199801062128.VAA00264@server.eternity.org>
Message-ID:
On Tue, 6 Jan 1998, Adam Back wrote:
> It would be humorous to even have the modulus and exponent -- if
> someone can obtain them, I'll package it up as a working PGP key, and
> give it user id of Spook GAK key , and submit to the
> keyservers. Then we have solved the key escrow implementation
> problems for the US government -- anyone who wants to send them a
> message can simply add DIRNSA to the list of recipeints.
This would be truly hilarious. Anybody out there with a copy of Notes and
a debugger? :-)
-- Lucky Green PGP v5 encrypted email preferred.
"Tonga? Where the hell is Tonga? They have Cypherpunks there?"
From blancw at cnw.com Tue Jan 6 16:33:24 1998
From: blancw at cnw.com (Blanc)
Date: Wed, 7 Jan 1998 08:33:24 +0800
Subject: Digital Societies, Guns, and AP
Message-ID: <3.0.32.19980106163317.0068dc1c@cnw.com>
A non-text attachment was scrubbed...
Name: not available
Type: text/enriched
Size: 1154 bytes
Desc: not available
URL:
From hedges at sirius.infonex.com Tue Jan 6 17:51:40 1998
From: hedges at sirius.infonex.com (Mark Hedges)
Date: Wed, 7 Jan 1998 09:51:40 +0800
Subject: employment opportunity
Message-ID:
A tech support position's opened at Infonex and the Anonymizer in the San
Diego, California area. The job requires demonstrable unix, typing and
English communication skills. C/C++, Perl, Java/Javascript, system
administration and networking experience are secondary qualifications.
Duties include routine technical support and occasional clerical tasks,
and could include opportunity for future advancement based on skills. Wage
based on skillset. Entry-level position. If interested, fax resume to
619-667-7966 or e-mail to job at infonex.com.
Mark Hedges
Anonymizer, Inc.
Infonex Internet, Inc.
From bd1011 at hotmail.com Tue Jan 6 18:20:02 1998
From: bd1011 at hotmail.com (Nobuki Nakatuji)
Date: Wed, 7 Jan 1998 10:20:02 +0800
Subject: Is FEAL developed by NTT safe?
Message-ID: <19980107020417.23803.qmail@hotmail.com>
>
>In article <19980105070034.3946.qmail at hotmail.com> you write:
>> Is FEAL developed by NTT safe? Where isn't safe if it is here because
it
>> isn't safe?
>
>FEAL is dead; I wouldn't ever use it in any new product.
>Use triple-DES instead.
>
What kind of method was FEAL decoded in?
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
From ichudov at Algebra.COM Tue Jan 6 19:16:01 1998
From: ichudov at Algebra.COM (Igor Chudov @ home)
Date: Wed, 7 Jan 1998 11:16:01 +0800
Subject: Police Report Stirs Up Militia Groups
Message-ID: <199801070309.VAA08399@manifold.algebra.com>
Police Report Stirs Up Militia Groups
(MARTINSVILLE) -- A confidential state police report... which
looked at the dangers of right-wing militia groups in
Indiana... is causing a stir among elected officials and
militia members in Morgan County. While the report discounts any
immediate threat of terrorist attacks from Indiana militias, it
does suggest that militia members are getting involved in local
politics and may have too much influence in some areas. Morgan
County commissioners think they're the ones referred to in
the report... and they say they're offended at the implication
they're controlled by any special interest group.
reuters
From jya at pipeline.com Tue Jan 6 20:21:49 1998
From: jya at pipeline.com (John Young)
Date: Wed, 7 Jan 1998 12:21:49 +0800
Subject: Sentencing for Electronic Copyright Infringement
Message-ID: <1.5.4.32.19980107033511.00750ac4@pop.pipeline.com>
The United States Sentencing Commission published in the
Federal Register today an RFC on changes in sentencing
guidelines. Here's an excerpt on electronic copyright
infringement:
. . .
Legislative Amendments
Electronic Copyright Infringement
9. Issue for Comment
The No Electronic Theft Act, Public Law 105-147, was recently
enacted to provide a statutory basis to prosecute and punish persons
who, without authorization and without realizing financial gain or
commercial advantage, electronically access copyrighted materials or
encourage others to do so. The Act includes a directive to the
Commission to (A) ensure that the applicable guideline range for a
crime committed against intellectual property (including offenses set
forth at section 506(a) of title 17, United States Code, and sections
2319, 2319A, and 2320 of title 18, United States Code) is sufficiently
stringent to deter such a crime; and (B) ensure that the guidelines
provide for consideration of the retail value and quantity of the items
with respect to which the crime against intellectual property was
committed.
Each of the statutes mentioned in the congressional directive
currently are referenced to Sec. 2B5.3 (Criminal Infringement of
Copyright or Trademark). That guideline provides for incrementally
greater punishment when the retail value of the infringing items
exceeded $2,000. However, when copyrighted materials are infringed upon
by electronic means, there is no ``infringing item'', as would be the
case with counterfeited goods. Therefore, the Commission must determine
how to value the infringed upon items in order to implement the
congressional directive to take into account the retail value and
quantity of the items with respect to which the offense was
committed. The Commission invites comment on how Sec. 2B5.3 (Criminal
Infringement of Copyright or Trademark) should be amended to best
effectuate the congressional directives.
An approach suggested by the Department of Justice is set forth
below. The Commission invites comment on this and alternative
proposals.
Department of Justice Proposed Amendments to Sec. 2B5.3:
The text of Sec. 2B5.3 is amended to read as follows: ``(a) Base
offense level: [6]
(b) Specific Offense Characteristic
(1) If the loss to the copyright or trademark exceeded $2,000,
increase by the corresponding number of levels from the table in
Sec. 2F1.1 (Fraud and Deceit).''.
The Commentary to Sec. 2B5.3 captioned ``Application Note'' is
amended in Note 1 by striking:
`` `Infringing items' means the items that violate the copyright or
trademark laws (not the legitimate items that are infringed upon).'',
and inserting:
``A court may calculate the `loss to the copyright or trademark
owner' in any reasonable manner. In determining `loss to the copyright
or trademark owner,' the court may consider lost profits, the value of
the infringed upon items, the value of the infringing items, the injury
to the copyright or trademark owner's reputation, and other associated
harms.''.
The Commentary to Sec. 2B5.3 captioned ``Application Note'' is
amended by striking ``Note'' and inserting ``Notes''; and by adding at
the end the following new note:
``2. In some cases, the calculable loss to the victim understates
the true harm caused by the offense. For example, a defendant may post
copyrighted material to an electronic bulletin board or similar online
facility, making it easy for others to illegally obtain and further
distribute the material. In such an instance, it may not be possible to
determine or even estimate how many copies were downloaded, or how much
damage the defendant's conduct ultimately caused. In such cases, an
upward departure may be warranted. See Chapter Five, Part K
(Departures).''.
The Commentary to Sec. 2B5.3 captioned ``Background'' is amended in
the first paragraph by striking ``value of the infringing items'' and
inserting ``loss to the copyright or trademark owner''; and by striking
``loss or''.
[End excerpt]
For the full RFC:
http://jya.com/ussc010698.txt (254K)
From abc.307 at iname.com Tue Jan 6 20:51:53 1998
From: abc.307 at iname.com (abc.307 at iname.com)
Date: Wed, 7 Jan 1998 12:51:53 +0800
Subject: 70% Profit your 1st Day.
Message-ID: <199801062135.e-mail@_tommy.com>
Hello,
YOU KEEP THE HIGHEST RETAIL PROFITS EVER!!
*****************************************************
Consumer Direct Inc. has increased YOUR RETAIL PROFITS to 70%
* Very LOW investment
* Start earning the 70% profits your 1st day
* YOU KEEP ALL THE PROFITS
* High Impact Nutritionals by Durk Pearson & Sandy Shaw
* Euro-Wash Laundry Ball eliminates Toxic Detergents
* Magnetic Therapy Technology for immediate Pain Relief
Just 2 Easy Steps:
USA/CANADA 1-888-877-7092 (Special Holiday Call)
INTERNATIONAL 1-512-703-8033
CALL US 1-800-600-0343 x1422
Best Regards,
Rhonda & Pete
---------------------------------------------------------------------
To Be Removed mailto:RemoveMe at leipro23.com?subject=REMOVE
From ravage at ssz.com Tue Jan 6 21:18:24 1998
From: ravage at ssz.com (Jim Choate)
Date: Wed, 7 Jan 1998 13:18:24 +0800
Subject: Hi-tech anti-terrorism... [CNN]
Message-ID: <199801070542.XAA29574@einstein.ssz.com>
Forwarded message:
> GADGET WARFARE: HIGH-TECH ANTI-TERRORISM
>
> January 6, 1998
> Web posted at: 9:34 p.m. EST (0234 GMT)
>
> From Netly News Writer Declan McCullagh
>
> For a country with no real military rivals, the U.S. still manages
> to find an amazing number of enemies. Terrorists top the list of
> anti-American villains, according to a Pentagon report released last
> month.
>
> The 100-page document, called "Responses to Transnational Threats,"
> describes how the military should respond to the threat of saboteurs
> and bombers aiming for violence, not victory. The solution,
> according to the Pentagon, is to develop a set of gadgets that would
> make even James Bond jealous.
>
> Micro-robots
>
> A spy camera scuttling through the underbrush? Yes, disguised as "an
> insect, a small pebble, or a stick." The report calls for the
> development of "micro-robots" that walk or fly and can beam video,
> audio and infrared signals back to their operators: "These sensors
[deleted text]
> Sticky electronics
>
> Think SpiderMan's spidertracers, only smaller. "Sticky electronics"
> adhere to a suspected terrorist's clothing, hair, luggage or vehicle
> and report his location. These almost microscopic gizmos tune in to
> satellite signals and transmit their exact latitude and longitude.
[deleted text]
> Bio-sniffers
>
> Go lie down, Fido. Soon drug-sniffing dogs may be replaced by even
> more sensitive, digital noses. If suspects have been handling nukes,
> biological weapons or high explosives, the military hopes to be able
> to sniff substance traces from items like passports. "As future
[text deleted]
> technology is improved, antigens might then be detected at national
> entry portals as trace contamination on emigration documents or
> passports, by urine analysis or by other means." Look for companies
> to use this as a more sensitive (if not more reliable) type of drug
> testing.
>
> The Internet
>
> The Net shouldn't be viewed as "a vulnerability." That view "loses
> sight of many potential benefits," the Pentagon explains. To the
> spooks, the Net "is an underexploited information-acquisition
> resource" that "allows for remote and anonymous participation in
> online 'chat' forums that might provide insight into dissident group
> activities." (Look out, alt.fan.militia!) The military also wants to
> create a "secure, transnational threat information infrastructure"
> -- at a cost of a mere $300 million.
>
> Data mining
>
> If you worried about the FBI's jones for access to your data, wait
> 'til you find out what the military hopes to do. The Pentagon wants
> authority to sift through private-sector databases in hopes of
> tracking down, say, the World Trade Center bombers before they
> strike. The plan is to incorporate "real-time data on international
> border crossings, real-time cargo manifests, global financial
[deleted text]
> Smart software
>
> Once you've got the databases, how do you use 'em? The military says
> the answer is "groupware" and "intelligent software agents" that
> "can be focused to search for a confluence of events in multiple
> databases or for goals over time." Consumer marketers will finally
> be able to determine the commonalities between the Hajj, Promise
> Keeper gatherings and Burning Man.
>
> So would military budgets. In a world where even the Pentagon admits
> that the U.S. is the only remaining superpower, the defense
> community argues that terrorism threats justify their budgets.
> "Nothing will be more challenging to the protection of our citizens,
> soldiers and our way of life than the threats of weapons of mass
> destruction and terrorism," General John Shalikashvili, chairman of
[text deleted]
____________________________________________________________________
| |
| Those who make peaceful revolution impossible will make |
| violent revolution inevitable. |
| |
| John F. Kennedy |
| |
| |
| _____ The Armadillo Group |
| ,::////;::-. Austin, Tx. USA |
| /:'///// ``::>/|/ http://www.ssz.com/ |
| .', |||| `/( e\ |
| -====~~mm-'`-```-mm --'- Jim Choate |
| ravage at ssz.com |
| 512-451-7087 |
|____________________________________________________________________|
From bill.stewart at pobox.com Tue Jan 6 21:22:52 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Wed, 7 Jan 1998 13:22:52 +0800
Subject: Location Escrow anyone ?
In-Reply-To:
Message-ID: <3.0.5.32.19980106184201.00832180@popd.ix.netcom.com>
Tracking your position in real time is one thing - recording the tracks
is quite another. The system does need to know, in real time,
the cell for each phone that's currently talking,
and needs to know quickly where any phone that's being called is
(could be implemented either by constantly tracking every phone,
or by sending out requests when the call is made,
probably starting with the usual suspect locations and then
branching out farther, or using some kind of roaming notification.)
But does it need to know where you've been? It wouldn't be surprising
if the telco recorded location (at least cell site) at the beginning
of each call, to resolve billing disputes with customers,
and of course they record minutes of use and roaming information
for users who make calls outside their home territory.
They probably also record calls per cell site and handoff information,
but probably not by user.
For police purposes, if you want to find somebody right now,
and the cellphone system can only give you precise locations right now,
just call them - "Hey, Suspect! We know where you are,
and it's costing you money for us to call you and tell you!
Have a nice day!" - and the system knows even if they don't answer.
At 02:42 PM 01/03/1998 +0100, Alexandre Maret wrote:
>If they store the location of your phone every 3 secs, for 6 month,
>this means 5'241'600 locations. Printed on 70 lines/page paper,
>this means 74'880 A4 pages. Do you think they'd be happy to print
>and send you 74'880 pages for 300SFrs ?
They could probably deliver it on industry-standard 9-track tape :-)
5 bytes is enough to locate you within 62m anywhere on Earth
- 16 bits gets you 1km of lat or long on a 40000km planet),
though 4 bytes is probably enough to identify a cell plus
some precision bits since the whole planet doesn't have cell sites.
So it's really only 20-25MB of data per user to track that much data,
and it compresses extremely well (e.g. 1 byte/sample is plenty for
phones that are moving, and run-length coding radically reduces the
location of the phones that aren't moving, which probably
covers 23 hours a day for most people.) Call it 250KB/day, max?
I'd be surprised if they really kept that much, and the economics are bad,
but they could do it, and they'll be much happier to mail you a floppy
of compressed data for your 300 francs, or print it in very tiny print...
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From alan at clueserver.org Tue Jan 6 22:07:19 1998
From: alan at clueserver.org (Alan Olsen)
Date: Wed, 7 Jan 1998 14:07:19 +0800
Subject: Is FEAL developed by NTT safe?
In-Reply-To: <19980107020417.23803.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980106215602.0098b670@clueserver.org>
At 06:04 PM 1/6/98 PST, Nobuki Nakatuji wrote:
>
>>
>>In article <19980105070034.3946.qmail at hotmail.com> you write:
>>> Is FEAL developed by NTT safe? Where isn't safe if it is here because
>it
>>> isn't safe?
>>
>>FEAL is dead; I wouldn't ever use it in any new product.
>>Use triple-DES instead.
>>
>What kind of method was FEAL decoded in?
All of them.
If you take a look at _Applied Cryptography (2nd Edition)_, you will find a
number of different methods that have been used against FEAL.
It seems that whenever someone comes up with a new method of cryptanalysis,
they use it on FEAL first. (Or at least it seems that way...)
There are much better solutions. Unpatented ones as well...
---
| "That'll make it hot for them!" - Guy Grand |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer: |
| mankind free in one-key-steganography-privacy!" | Ignore the man |
|`finger -l alano at teleport.com` for PGP 2.6.2 key | behind the keyboard.|
| http://www.ctrl-alt-del.com/~alan/ |alan at ctrl-alt-del.com|
From snow at smoke.suba.com Tue Jan 6 22:21:25 1998
From: snow at smoke.suba.com (snow)
Date: Wed, 7 Jan 1998 14:21:25 +0800
Subject: cypherpunks and guns
In-Reply-To:
Message-ID: <199801070720.BAA01765@smoke.suba.com>
> Final comment: If I find the motivation, I may finish an essay I've been
> working on about how we, the Cypherpunks and the World, are *retrogressing*
> in crypto areas. Most of the exotic applications are no longer being
> discussed, and various mundane commercial products are the main focus. Yawn.
You mean things like Onion Routers, Crowds & the like?
From snow at smoke.suba.com Tue Jan 6 22:22:39 1998
From: snow at smoke.suba.com (snow)
Date: Wed, 7 Jan 1998 14:22:39 +0800
Subject: cypherpunks and guns
In-Reply-To: <19980106005136.23824@eskimo.com>
Message-ID: <199801070718.BAA01750@smoke.suba.com>
> I don't understand why there is so much talk about guns here lately.
> Unless someone comes up with a weapon that has some very unusual economic
> properties, individuals cannot hope to compete with governments in the
> domain of deadly force. If we have to resort to physical violence, we've
Tell that to Lincoln, Duke F., Kennedy, &etc.
No, we couldn't win thru the overwhelming use of force, but force
properly applied could at some point prove useful.
> already lost!
There are some of us who feel that if we "lose", it would be better
to go down fighting than to live in the kind of world where we can't protect
our privacy with crypto.
> Think about it: if we can defend ourselves with guns, why would we need
> crypto?
Different realms. Crypto deals with transient/ephemeral(sp?) things
like bits & words & numbers.
Arms work in a more physical world of Rapists, Theives, & Dictators.
From snow at smoke.suba.com Tue Jan 6 22:26:41 1998
From: snow at smoke.suba.com (snow)
Date: Wed, 7 Jan 1998 14:26:41 +0800
Subject: cypherpunks and guns
In-Reply-To:
Message-ID: <199801070725.BAA01787@smoke.suba.com>
> I am fairly certain that as an irregular army soldier I could inflict
> a substantial amount of damage upon an occupying military. With maybe
> $20k in equipment and several hundred hours of training, you could make
If you were smart, you could do it for a lot less.
From snow at smoke.suba.com Tue Jan 6 22:39:34 1998
From: snow at smoke.suba.com (snow)
Date: Wed, 7 Jan 1998 14:39:34 +0800
Subject: cypherpunks and guns
In-Reply-To: <3.0.2.32.19980106144257.006f0fec@q9f47.dmst02.telekom.de>
Message-ID: <199801070729.BAA01812@smoke.suba.com>
> >that by 100 million armed citizens and you see that armed civilian
> >resistance *can* defeat an occupying army.
> The "enemy within" seems to be the main focus of the discussions in
> the CP list. When the 'luckless squad that happens your way' is
> manned by your countrymen at the command of their (and your)
> government, what then?
You answered your own question. Fight smarter, not harder. Kill
the brains and the body would follow.
> This is from the standpoint of a 'sissy' European. I admit I am
> poorly equipped to comment on the American Zeitgeist. However, my
> experience of civil war victims (refugees from the E-bloc) suggests
> that we should be concentrating on social revolution before we tool
> up for military. There is more to be won, with a potentially much
> lower cost.
Any kind of social revolution will be co-opted, destroyed, or
rendered useless by the people at the top. What it needed is a continuance
of the technical revolution.
From snow at smoke.suba.com Tue Jan 6 22:44:17 1998
From: snow at smoke.suba.com (snow)
Date: Wed, 7 Jan 1998 14:44:17 +0800
Subject: cypherpunks and guns
In-Reply-To: <199801061912.OAA08946@panix2.panix.com>
Message-ID: <199801070740.BAA01846@smoke.suba.com>
> # 128bit SSL module distribution *EVEN TO US CITIZENS* due to commerce
> # department fuckedness. Anyone know where I could get a copy? It would
> # really suck to have to patch the 40bit one into a 128bit version, since
> # they do not distribute source.
> I don't know if this is the "module" form of the answer you want:
> http://www.replay.com/
Nope, he wants the AOL SERVER, not browser
> Tim May wrote:
>> Final comment: If I find the motivation, I may finish an essay I've been
>> working on about how we, the Cypherpunks and the World, are *retrogressing*
>> in crypto areas. Most of the exotic applications are no longer being
>> discussed, and various mundane commercial products are the main focus.
> > Yawn.
> How about moving this list to encrypt its transmissions in
> the recipient's public keys, just to begin encrypting Net traffic?
At this point, there would be WAY too much overhead on the 3 or
so servers that make up the cypherpunks mailing list. PGP encrypting every
message sent thru would take up a lot of CPU time.
From Shane.Pearson at tafensw.edu.au Tue Jan 6 23:33:56 1998
From: Shane.Pearson at tafensw.edu.au (Pearson Shane)
Date: Wed, 7 Jan 1998 15:33:56 +0800
Subject: Location Escrow anyone ?
Message-ID:
Hey guys,
I wasn't suggesting that they do record exactly where everyone is
at the highest resolution possible.
Just suggesting that should they want to investigate an individual,
they could do it with pretty high detail.
Though I'm sure they'd record when and where you switch your
phone on, switch off / loose signal, switch cells and make and
receive calls and messages. That wouldn't be all that much data.
Bye for now.
From adam at homeport.org Tue Jan 6 23:52:05 1998
From: adam at homeport.org (Adam Shostack)
Date: Wed, 7 Jan 1998 15:52:05 +0800
Subject: Silly Shrinkwrapped Encryption
In-Reply-To: <199801062128.VAA00264@server.eternity.org>
Message-ID: <199801070745.CAA29531@homeport.org>
Adam Back wrote:
| The above "solution" to key escrow infra-structure calls from Freeh
| etc., should be credited to Carl Ellison; probably others have
| proposed it also. Carl offered to sign some cheif spooks key, if he
| would generate one for the purpose, cheif spook declined the offer.
That was Phil Karn to NSA legal counsel at the Computers Freedom and
Privacy conference in Burlingame, 1994 or 1995. I don't recall
hearing it before that.
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
From kent at songbird.com Wed Jan 7 00:20:04 1998
From: kent at songbird.com (Kent Crispin)
Date: Wed, 7 Jan 1998 16:20:04 +0800
Subject: cypherpunks and guns
In-Reply-To:
Message-ID: <19980107001651.29456@songbird.com>
On Wed, Jan 07, 1998 at 01:25:45AM -0600, snow wrote:
> > I am fairly certain that as an irregular army soldier I could inflict
> > a substantial amount of damage upon an occupying military. With maybe
> > $20k in equipment and several hundred hours of training, you could make
>
> If you were smart, you could do it for a lot less.
That presumes the enemy is dumb. An amusing fantasy.
--
Kent Crispin, PAB Chair "No reason to get excited",
kent at songbird.com the thief he kindly spoke...
PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55
http://songbird.com/kent/pgp_key.html
From kurtbuff at halcyon.com Wed Jan 7 00:23:39 1998
From: kurtbuff at halcyon.com (Kurt Buff)
Date: Wed, 7 Jan 1998 16:23:39 +0800
Subject: [Humor] Kennedy's New Legislation
Message-ID: <01BD1B01.0CBA5FE0.kurtbuff@halcyon.com>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
It balances, or more accurately, they don't.
A second politician died today on the ski slope - Sonny Bono.
- -----Original Message-----
From: Dr.Dimitri Vulis KOTM [SMTP:dlv at bwalk.dm.com]
Sent: Monday, January 05, 1998 4:19 PM
To: cypherpunks at toad.com
Subject: Re: [Humor] Kennedy's New Legislation
Declan McCullagh writes:
> We have a good story in this week's Time that talks about how the
ski
> resort had repeatedly asked the Kennedys to knock it off. Including
the
> night before the accident. Even on the "fateful" afternoon, the ski
patrol
> had told the Kennedys -- the last on the slopes -- it was time to
quit.
> "Nevertheless, 36 members of the Kennedy party prepared to play."
"Evolution in action."
Thank you, Michael Kennedy, for improving humanity's gene pool.
- ---
Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013,
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQA/AwUBNLMtJw3xegzLXcRmEQKeCwCgsElXKkUb2dzM+N0d2nn8I7fresoAn2yF
fsizimZ5xfume+xLbPvpQCWL
=ZhY3
-----END PGP SIGNATURE-----
From kurtbuff at halcyon.com Wed Jan 7 00:27:40 1998
From: kurtbuff at halcyon.com (Kurt Buff)
Date: Wed, 7 Jan 1998 16:27:40 +0800
Subject: best body armor for cypherpunks [serious]
Message-ID: <01BD1B01.0AF53040.kurtbuff@halcyon.com>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Nice shot! :)
However, Second Chance is probably the leader of that particular
pack.
- -----Original Message-----
From: Trei, Peter [SMTP:ptrei at securitydynamics.com]
Sent: Monday, January 05, 1998 8:32 AM
To: 'cypherpunks at toad.com'
Subject: RE: best body armor for cypherpunks [serious]
> ----------
> From: Mix[SMTP:mixmaster at remail.obscura.com]
> Reply To: Mix
> Sent: Sunday, January 04, 1998 10:44 PM
> To: cypherpunks at toad.com
> Subject: best body armor for cypherpunks [serious]
>
> What is, in your opinion, the best (price and performance-wise)
> body armor for cypherpunks?
>
After a few years on this list, one develops such a thick skin that
extra protection is superfluos
Peter Trei
ptrei at securitydynamics.c
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQA/AwUBNLMsmw3xegzLXcRmEQKJ4gCg9Fr8/XXJFUsB9UaPaZ4zymdc5GoAn3YS
u46oyeNLel8/+nYbBs7Xb49R
=EqQY
-----END PGP SIGNATURE-----
From tcmay at got.net Wed Jan 7 00:33:19 1998
From: tcmay at got.net (Tim May)
Date: Wed, 7 Jan 1998 16:33:19 +0800
Subject: Sentencing for Electronic Copyright Infringement
In-Reply-To: <1.5.4.32.19980107033511.00750ac4@pop.pipeline.com>
Message-ID:
At 7:35 PM -0800 1/6/98, John Young wrote:
>The United States Sentencing Commission published in the
>Federal Register today an RFC on changes in sentencing
>guidelines. Here's an excerpt on electronic copyright
>infringement:
....
> (1) If the loss to the copyright or trademark exceeded $2,000,
>increase by the corresponding number of levels from the table in
>Sec. 2F1.1 (Fraud and Deceit).''.
....
The upshot of all this "spreadsheet sentencing" is that nearly all of us
have some number of infringing materials, illegal copies, or unauthorized
downloads on our systems.
Or we have more than the allowable number of backup copies of our important
programs. Or even of our unimportant programs.
When the ninja narc raiders cart our computers off for analysis, I'm sure
they can find enough violations to send us away for as many years as they
wish.
Even though I'm not a "warez" trader, or even a software pirate, and even
though I have perhaps foolishly bought many thousands of dollars worth of
now-discontinued and now-unused products ("shelfware"), I am quite sure the
Authorities could find dozens and dozens of violations of these new laws.
Welcome to Amerika.
--Tim May
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From frantz at netcom.com Wed Jan 7 00:50:54 1998
From: frantz at netcom.com (Bill Frantz)
Date: Wed, 7 Jan 1998 16:50:54 +0800
Subject: Silly Shrinkwrapped Encryption
In-Reply-To: <199801061930.NAA09848@wire.insync.net>
Message-ID:
At 11:49 AM -0800 1/6/98, Eric Cordian wrote:
>I managed to find a document entitled "Security in Lotus Notes and the
>Internet" on the Web.
>
>It describes the weakening procedure as follows.
>
> "No matter which version of Notes you are using, encryption uses the
> full 64-bit key size. However, the International edition takes 24 bits
> of the key and encrypts it using an RSA public key for which the US
> National Security Agency holds the matching private key. This
> encrypted portion of the key is then sent with each message as an
> additional field, the workfactor reduction field. The net result of
> this is that an illegitimate hacker has to tackle 64-bit encryption,
> which is at or beyond the practical limit for current decryption
> technology and hardware. The US government, on the other hand, only
> has to break a 40-bit key space, which is much easier (2 to the power
> of 24 times easier, to be precise)."
It seems to me that if you step on the correct part of the message, you zap
the encrypted 24 bits, and cut NSA out of the loop. Of course the receiver
could notice and refuse to decrypt, which would require some software
hacking to defeat, but that is certainly doable.
-------------------------------------------------------------------------
Bill Frantz | One party wants to control | Periwinkle -- Consulting
(408)356-8506 | what you do in the bedroom,| 16345 Englewood Ave.
frantz at netcom.com | the other in the boardroom.| Los Gatos, CA 95032, USA
From pads at mouse.com Wed Jan 7 20:19:01 1998
From: pads at mouse.com (pads at mouse.com)
Date: Wed, 7 Jan 1998 20:19:01 -0800 (PST)
Subject: Personalized Mouse Pads
Message-ID:
Have you ever wondered why your mother gave you the name she did? Were you named after
a close relative, family friend or possibly a television celebrity?
Well, we can't tell you why either! However, what we can tell you is exactly what your name
means!
We print your name and it's meaning on an attractive mouse pad with a custom art background
of vibrant colors and scenery. Not only is it pleasant to look at, but everytime you sit down to your
computer, you'll be reminded of just how great you are.
We have the largest most comprehensive database of names anywhere. And we can print
names in both Spanish and English.
We are so sure you'll be pleased with your personalized mouse pad, that we offer a 30 day
unconditional money back guarantee.
Placing your order is easy too! Just complete the order form below and mail it along with just $10
plus shipping and handling. (see below), and we will rush your personalized mouse pad by first class
mail.
Choose your background preference!!
ABC BLOCKS ANGELS CLOUDS
DOLPHINS PRAYING HANDS SPORTS
TEDDY BEAR UNICORN or WATERFALL
EASY ORDER FORM
NAME REQUESTED MALE/FEMALE BACKGROUND PREF.
_________________ ____________ ________________________
_________________ ____________ ________________________
_________________ ____________ ________________________
QUANITY ORDERED_______________ AMOUNT SENT$_______________
CASH CHECK OR MONEY ORDER'S ONLY!!!! US FUNDS ONLY!!!!!!!
USA MAILORDERS $12 EA ALL OTHER ORDERS $14 EA
(includes $2 shipping/handling charge) (includes $4 shipping/handling charge)
MOST ORDERS SHIPPED WITHIN 48 HOURS. IF PAYING BY CHECK, YOUR ORDER WILL
BE SENT IMMEDIATELY FOLLOWING BANK APPROVAL.
PLEASE MAIL YOUR ORDER TO: 3J PRODUCTS
PO BOX 7183
OXNARD CA 93031
From dlv at bwalk.dm.com Wed Jan 7 06:12:54 1998
From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
Date: Wed, 7 Jan 1998 22:12:54 +0800
Subject: Sentencing for Electronic Copyright Infringement
In-Reply-To:
Message-ID:
Tim May writes:
> When the ninja narc raiders cart our computers off for analysis, I'm sure
> they can find enough violations to send us away for as many years as they
> wish.
And if Timmy knew a bit more about cryptography than he could learn by browsing
through Bruce Schneier's book, the ninja narc raiders wouldm't be able to find
shit on any of his media. :-)
---
Dr.Dimitri Vulis KOTM
Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps
From emc at wire.insync.net Wed Jan 7 07:22:28 1998
From: emc at wire.insync.net (Eric Cordian)
Date: Wed, 7 Jan 1998 23:22:28 +0800
Subject: Silly Shrinkwrapped Encryption
In-Reply-To:
Message-ID: <199801071516.JAA10807@wire.insync.net>
Bill Frantz writes:
> It seems to me that if you step on the correct part of the message, you
> zap the encrypted 24 bits, and cut NSA out of the loop. Of course the
> receiver could notice and refuse to decrypt, which would require some
> software hacking to defeat, but that is certainly doable.
Yes - I doubt if Lotus Notes has the ability to distinguish between
messages containing ASCII for "FUD" in the workfactor reduction field and
those containing 24 genuine bits of the key in question. It's probably
a one-instruction patch to disable Big Brother.
As I recall, the LEAF field in Clipper suffered from a similar ability
to be disabled at the user's pleasure.
--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
From dm0 at avana.net Wed Jan 7 08:13:07 1998
From: dm0 at avana.net (David Miller)
Date: Thu, 8 Jan 1998 00:13:07 +0800
Subject: Sentencing for Electronic Copyright Infringement
In-Reply-To:
Message-ID: <34B3D211.4148@avana.net>
Tim May wrote:
> Even though I'm not a "warez" trader, or even a software pirate, and even
> though I have perhaps foolishly bought many thousands of dollars worth of
> now-discontinued and now-unused products ("shelfware"), I am quite sure the
> Authorities could find dozens and dozens of violations of these new laws.
On the other hand, it's no longer in vogue to haul people off for video piracy
anymore. Perhaps we should all stego our monitors & computers into looking
like TV's & VCR's until this blows over. :-)
--David Miller
From gwb at gwb.com.au Thu Jan 8 00:50:21 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Thu, 8 Jan 1998 00:50:21 -0800 (PST)
Subject: 1998 - the year we must make a stand.
Message-ID: <1.5.4.16.19980108180000.41efa41c@mail.pronet.net.au>
----------------------------------------------------------------------------
PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the
mailing list please say "REMOVE" in the subject line and return the message
in the body of this email (so that we can track your state).
----------------------------------------------------------------------------
Dear One Nation Supporter in New South Wales,
As Australia moves towards the year 2000 we Australians move into a critical
stage of our history.
A stage which is the culmination of years of deception by the Labor and
Coalition parties leading to the undermining of our democracy.
With a Federal Election in the wind 1998 provides a chance for Australians
to rectify the wrongs of the past. Voting for the major parties will provide
no solutions - only more of the same. However, expect the major parties to
claim that voting for Pauline Hanson's One Nation will be a wasted vote.
They are wrong - tell your friends and make a stand for your children's
future by voting for Pauline Hanson's One Nation.
I am going to cite just one example of many on how you, as an Australian
voter, are being misled by the mainstream political parties. In a word the
subject is 'MAI' an international agreement to which Australia will be a
signatory. MAI is being debated more and more on the Internet through the
World Wide Web.
Here are some web site links on the subject. Please take the time to visit
these sites because they demonstrate how the transnational companies,
through MAI (the multilateral agreement on investment), are bargaining away
your future with senior Canberra-based bureaucrats.
1) ABC interview - full transcript:
http://www.gwb.com.au/gwb/news/onenation/press/maiabc.html
Extract: 'Sadly there's no catch title for this trade deal. It's called the
Multilateral Agreement on Investment, or MAI. But what it promises holds
more drama. It aims to grant multinational corporations unprecedented powers
over governments. And it's not getting many good reviews.'
and
'In effect, the MAI is a bill of rights for international giants like Shell,
Lockheed, Du Pont, and Arthur Andersen. It prevents governments asking more
of those multinationals than they ask of their own domestic companies. And
any laws that discriminate in favour of locals, such as Australian media
ownership laws, don't fit.'
2) MAI Information Centre (Canada):
http://www.islandnet.com/~ncfs/maisite/homepage.htm
Extract: 'It incorporates a powerful dispute resolution system which would
allow any investor to sue the government of its host nation if it considers
laws or regulations to be discriminatory and detrimental to immediate or
projected profits. The Agreement would therefore disable regional
development and national measures to protect the well-being of people,
create employment, safeguard small business, conserve resources and protect
the environment. Once signed, the MAI cannot be denounced for five years.
Investments under the MAI would remain protected for a further fifteen years.'
The MAI debate is being discussed openly in Canada and New Zealand while in
Australia we are being closeted from this debate by the duopoly which runs
this country's media.
It is a very real issue. An issue that the major parties refuse to bring out
into the open. An issue, amongst many, many others that Pauline Hanson's One
Nation is trying to expose. BUT we cannot do that without your support.
Your vote and those of your friends will be critical to ensure that issues
such as MAI are heard, are questioned, can be rejected by you and I - the
Australian people. Clearly the major political parties have failed in
drawing issues like this out into the public arena for discussion.
Pauline Hanson
PS. If you are able to help with donations to help us fund our candidates in
state and federal elections this year please visit:
http://www.gwb.com.au/pledge.html
From whgiii at invweb.net Wed Jan 7 10:44:53 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Thu, 8 Jan 1998 02:44:53 +0800
Subject: Silly Shrinkwrapped Encryption
In-Reply-To:
Message-ID: <199801071847.NAA28200@users.invweb.net>
-----BEGIN PGP SIGNED MESSAGE-----
In , on 01/07/98
at 12:10 AM, Bill Frantz said:
>At 11:49 AM -0800 1/6/98, Eric Cordian wrote:
>>I managed to find a document entitled "Security in Lotus Notes and the
>>Internet" on the Web.
>>
>>It describes the weakening procedure as follows.
>>
>> "No matter which version of Notes you are using, encryption uses the
>> full 64-bit key size. However, the International edition takes 24 bits
>> of the key and encrypts it using an RSA public key for which the US
>> National Security Agency holds the matching private key. This
>> encrypted portion of the key is then sent with each message as an
>> additional field, the workfactor reduction field. The net result of
>> this is that an illegitimate hacker has to tackle 64-bit encryption,
>> which is at or beyond the practical limit for current decryption
>> technology and hardware. The US government, on the other hand, only
>> has to break a 40-bit key space, which is much easier (2 to the power
>> of 24 times easier, to be precise)."
>It seems to me that if you step on the correct part of the message, you
>zap the encrypted 24 bits, and cut NSA out of the loop. Of course the
>receiver could notice and refuse to decrypt, which would require some
>software hacking to defeat, but that is certainly doable.
Wouldn't it be much better just to not use the crap?!?
Why should we give our money to a company that has shown that they will
sell us out at the first chance of making a buck doing so??
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html
- ---------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNLPLlY9Co1n+aLhhAQHt5gP+NtHd38qR7JcqpL1hCxdk4Tz1N239kIIm
7V6vmiM76oinIDXmsgJoZN9NgLdI8kd7otJt1nLOlEkbGpZ9lAn69pdeB0BzAM2Q
OOXhPsy6AzB3y/wdMY2wXpgmTAIT5CpW/014NqtBLIgoL2g2pXseTe416OixxBDv
m9aJKKvHgb0=
=Us1n
-----END PGP SIGNATURE-----
From whgiii at invweb.net Wed Jan 7 10:50:27 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Thu, 8 Jan 1998 02:50:27 +0800
Subject: cypherpunks and guns
In-Reply-To: <19980107001651.29456@songbird.com>
Message-ID: <199801071844.NAA28170@users.invweb.net>
-----BEGIN PGP SIGNED MESSAGE-----
In <19980107001651.29456 at songbird.com>, on 01/07/98
at 03:16 AM, Kent Crispin said:
>On Wed, Jan 07, 1998 at 01:25:45AM -0600, snow wrote:
>> > I am fairly certain that as an irregular army soldier I could inflict
>> > a substantial amount of damage upon an occupying military. With maybe
>> > $20k in equipment and several hundred hours of training, you could make
>>
>> If you were smart, you could do it for a lot less.
>That presumes the enemy is dumb. An amusing fantasy.
The fact that they collect a paycheck from the government is prima facie
evidence of diminished mental capacity.
- --
- ---------------------------------------------------------------
William H. Geiger III http://users.invweb.net/~whgiii
Geiger Consulting Cooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html
- ---------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000
iQCVAwUBNLPK2o9Co1n+aLhhAQFGnQP/XjQolE3fElFXPrPWSe7p3lM7QY/kEMYr
AF3CXUr1ov0IFRfqItryMSM8eGa65V69X1FS1AagXgzz5IpZ89E4wbiPMC5Rh8aP
oifllXC+G7+bgcBZyzzRKQ9ZXlMckHnSpPCyFq1xE35Uj6gbu790oVd92yzvf5sy
pjALZQjE7MI=
=cG0G
-----END PGP SIGNATURE-----
From eureka at eureka.abc-web.com Thu Jan 8 02:58:15 1998
From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com)
Date: Thu, 8 Jan 1998 02:58:15 -0800 (PST)
Subject: Eureka! Thu Jan 8 '98
Message-ID: <19980108082356.29649.qmail@eureka.abc-web.com>
Welcome to Thursday's issue of Eureka!
HARD CITY
Ouch! Like it's name says, this is a HARD site, or at least,
*you'll* be hard after you see it! Hard City is superbly
constructed and has just about every type of porn you could
want, and what's more, we've arranged for all our Eureka!
readers to get to try out the site totally FREE of charge!
So what are you waiting for? Go see! .. http://hardcity.com/
GAYEUREKA!
The gay newsletter is now available. You can get it here!
Gay Eureka! ........... http://eureka.abc-web.com/gayeureka/
EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ....... http://eureka.abc-web.com/eureka/deutsch.htm
ESPA�OL ....... http://eureka.abc-web.com/eureka/espanol.htm
FRAN�AIS ..... http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ..... http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE . http://eureka.abc-web.com/eureka/portuguese.htm
BEST SEX MOTEL
Somebody is always in at the Motel and the rooms are cheap.
Surf down the page to the "rooms", there you'll find a bunch
of great pussy pix of all sorts. Nice nipple ring room1b!
Best Sex Motel ................... http://www.sex-motel.com/
LICKITY SPLIT
Oh yeah, what a superb site. You are really going to love all the
photos and links you find here. Absolutely excellent!
Lickity Split ............... http://207.254.20.141/lickity/
L.A. SEX
"L.A. SEX has been designed for easy surfing but more impor-
tant than that we have a ton of great free nude xxx pics for
your pleasure! This site has no consoles..." You bet, this
is a great site. Shaved, black or redheads, take your pic.
L.A. Sex ...................... http://209.50.230.238/pk.htm
SABRINA'S HOUSE OF HARDCORE FUN
They has gathered together dozens of free pix for us. Once
there you have a lot of choices. They offer a free video for
us as well! Not a bad deal. Pretty juicy stuff. Facials,
young women and asians. Lick it up girls! Worth the Surf!
Sabrina's House ............ http://www.sexhost.net/sabrina/
FREE CONTEST!
The excitement escalates! This week's competition now has
just has two free 3 Month memberships to the King of "Hard-
Core" left to play for. Eureka's Halarious question master
awaits you. Visit Hardcoresmut and click on "Free Guided
Tour" for the tour, and email us the answer (found in XXX
CHAT) to this head-scratching question: "What does everyone
want to get in the XXX Hardcore chat rooms?" ...............
Answers to .................. mailto:contest at www.usachat.com
HardCoreSmut ................... http://www.hardcoresmut.com
FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet. However, many of the feeds use the RealPlayer and will
work in most browsers. If you do not have Netscape and want
a free copy click here ... http://www.netscape.com/download/
Three dicks .................... http://207.168.184.26/trip/
CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars you will meet most days. It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat .................. http://137.39.63.229/chat/
General/Fun Chat ........ http://137.39.63.229/chat/funchat/
THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!....1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline.........1-800-644-8779
FREE: Live 1-on-1 (international call only)....011-678-77416
AMATEUR SITE OF THE DAY
LEATHER ROSE: A busty Bi-BBW woman who is NOT afraid to show
off. She considers herself an "eclectic kinda gal with ecce-
ntric tastes", and believe us, she has a lot of loving to
give. Her web page is devoted to her, and fans of BBW women.
Check out her site!
............................ http://amateurindex.com/eureka/
EROTIC STORY SITE OF THE DAY
HotStories.com: Tired of all those pics? Hot Stories lets
you use your imagination to is full potential. Over 100 free
sex stories in 8 different categories. Our stories are worth
a thousand pics! ................ http://www.hotstories.com/
DAILY MPEG AND CARTOON
The internationally renowned erotic artist Raffaelli has
made his award-winning videos available exclusively to Eros
in Orbit and NOW to subscribers of Eureka! These high-
quality video clips feature the best of Raffaelli's erotic
masterpieces. Raffaelli has gained world wide recognition
for his quality productions, featuring beautiful non profes-
sional models captured in passionate sexual intercourse.
These video clips also portray exotic single girls in auto-
erotic masturbation. The color, quality and detail of these
MPEGs is superb. ........ http://www.erosinorbit.com/eureka/
ADULT STAR PIC OF THE DAY
Every day we bring you an exclusive choice pic of a famous
adult porn star. And we must tell you - these pix are abso-
luletly brilliant! ....... http://www.adultstars.com/eureka/
TODAY'S FREE PIX
Pic 1 ........................... http://137.39.63.229/?080
Pic 2 ........................... http://137.39.63.229/?081
Pic 3 ........................... http://137.39.63.229/?082
Pic 4 ........................... http://137.39.63.229/?083
Pic 5 ........................... http://137.39.63.229/?084
Pic 6 ........................... http://137.39.63.229/?085
Pic 7 ........................... http://137.39.63.229/?086
Pic 8 ........................... http://137.39.63.229/?087
Pic 9 ........................... http://137.39.63.229/?088
Pic 10 ........................... http://137.39.63.229/?089
PLEASE VISIT THIS EUREKA! PARTNER SITE
A Babe For You - 350+ FREE Naked Babes
http://www.babes4free.com
350+ FREE Quality Blonde, Teen, Lesbian, Teen Fuck, Asian,
Black and Series Pics. All thumbnail selection. Plus we
feature Free Pics from Free Sites.
===========================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS NEWSLETTER BACK TO US.
===========================================================
From nobody at REPLAY.COM Wed Jan 7 11:11:02 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 8 Jan 1998 03:11:02 +0800
Subject: Fiat's Batch RSA
Message-ID: <199801071855.TAA07264@basement.replay.com>
Batch RSA
invented by Amos Fiat
Described in Crypto 89 and J Cryptology 1997.
RSA works as follows. The key owner chooses two secret primes p and q,
and forms their product n = p*q. He then chooses a public exponent e
relatively prime to p-1 and q-1. His public key is (n, e).
To encrypt a message m into cyphertext c, m is raised to the power e, mod
n: c = m^e mod n. To decrypt the message, the key holder calculates d
as the multiplicative inverse of e mod (p-1)(q-1): d = 1/e mod (p-1)(q-1).
He recovers m from m = c^d mod n.
For simplicity, below we will write this as m = c^(1/e) mod n, where it
is understood that the 1/e is done mod (p-1)(q-1).
An RSA signature s on a message m is calculated as for a decryption:
s = m^(1/e) mod n. The signature is verified by m ?=? s^e mod n.
The time consuming part of an RSA decryption or signature is this
exponentiation step. e can be chosen to be small, so encryption and
verification is fast, but 1/e will generally be about the same size as n,
so many multiplications must be done to raise a number to that power.
Amos Fiat describes a method whereby multiple messages can be decrypted
or signed using only one full-sized exponentiation. The "catch" is that
the messages must all use different exponents with the same n.
Here is a concrete example. You want to decrypt or sign two messages,
M1 and M2, raising M1 to the 1/3 power and M2 to the 1/5 power. Perform
the following steps:
M12 = M1^5 * M2^3
I12 = M12 ^ (1/15)
This is the only full-sized exponentiation needed. This gives:
I12 = M1^(1/3) * M2^(1/5).
This is the product of the two values that we want. Fiat uses a trick
to disentangle the two values. He raises I12 to the 6th power. The
number 6 is chosen so that it is a multiple of one of the two
exponents, 3, and is 1 more than a multiple of the other exponent, 5:
I12^6 = M1^2 * M2 * M2^(1/5)
Therefore:
M2^(1/5) = I12^6 / (M1^2 * M2)
which is one of the values we need. Since I12 is the product of the two
values we want, we can recover the other value just by dividing this into
I12:
M1^(1/3) = I12 / M2^(1/5)
Here is another example. Suppose we want M3^(1/7) and M4^(1/11). (Note
that we are using prime numbers for the exponents; the reason will be
explained below.) We calculate:
M34 = M3^11 * M4^7
I34 = M34 ^ (1/77)
This gives us:
I34 = M3^(1/7) * M4^(1/11)
Again this is the product of the two values we want. As before we will
raise this to a power which is 1 more than a multiple of one of the two
exponents (7 and 11) and is a multiple of the other one. The smallest
such power is 22.
I34^22 = M3^3 * M3^(1/7) * M4^2
So we can divide to get M3^(1/7):
M3^(1/7) = I34^22 / (M3^3 * M4^2)
And we can divide to get the other value needed:
M4^(1/11) = I34 / M3^(1/7)
This illustrates how to derive two RSA roots using only one full sized
exponentiation. A few small exponentiations are also needed, as well
as two divisions, but these are much faster than doing the full
exponentiation (raising to the 1/15 or 1/77 powers above).
Fiat's idea can then be applied recursively. Note that in the examples
above we had to take two full-sized exponentiation, M12 to the 1/15 power
and M34 to the 1/77 power. We can combine both of these exponentiations
into one just as was done above:
M14 = M12^77 * M34^15
I14 = M14 ^ (1/1155)
Now:
I14 = M12^(1/15) * M34^(1/77)
the product of the two values we want. We need an exponent which is
1 more than a multiple of 15 while being a multiple of 77, giving
615, or vice versa, giving 540. Choosing the latter since it is smaller
we have:
I14^540 = M12^36 * M34^7 * M34^(1/77)
so:
M34^(1/77) = I14^540 / (M12^36 * M34^7)
and dividing gives the other factor:
M12^(1/15) = I14 / M34^(1/77)
These values can then be fed into the expressions above to recover
M1^(1/3) and the other three values, all with only one full-sized
exponentiation for the four messages.
In general, finding the exponent for Ixx can be handled by the Chinese
Remainder Theorem. However it requires that the two values be
relatively prime. That is why the exponents used in Batch RSA must
all be relatively prime, so that there is a solution to the value of
the exponent for Ixx.
As the number of values in the batch increases, the "small" exponents
needed to recover the values increase as well. We saw above that the
exponents went from 6 and 22 for the size-two batches to 540 for the
size-four batch. This means that you reach a point of diminishing
returns where increasing the batch size no longer provides much
benefit. Fiat suggests a batch size of n/(log^2 n) messages, where n
is the length of the full-sized exponentiation (e.g. 1000 for a 1000
bit modulus). This would correspond to about a 10 message batch for
a 1024 bit key.
Fiat describes a few situations where it may be appropriate to use
different exponents for multiple RSA operations. In the case of a
server issuing multiple RSA signatures it could define its public key
to be (n, e1, e2, e3,...) and specify that the signature was valid for
any exponent in the list. Then it could batch up signatures and use a
different exponent for each one.
Another case is "pure RSA" encryption, where the message itself is broken
into blocks and each one is RSA encrypted. In that case the blocks could
use successive exponents from the list, and the receiver could decrypt
a batch of blocks using one large exponentiation.
There is another case of interest to us, related to the task of
searching through messages from a message pool, possibly
steganographically hidden. That will be described in another message.
From declan at vorlon.mit.edu Wed Jan 7 11:14:49 1998
From: declan at vorlon.mit.edu (Declan McCullagh)
Date: Thu, 8 Jan 1998 03:14:49 +0800
Subject: More on Association for Interactive Media conference
Message-ID:
[This is the conference Tim was criticizing yesterday. --Declan]
---------- Forwarded message ----------
Date: Wed, 7 Jan 1998 10:49:01 -0800 (PST)
From: Declan McCullagh
To: politech at vorlon.mit.edu
Subject: FC: More on Association for Interactive Media conference
Netly articles on AIM:
http://cgi.pathfinder.com/netly/editorial/0,1012,1155,00.html
http://cgi.pathfinder.com/netly/editorial/0,1012,1464,00.html
-Declan
---------- Forwarded message ----------
Date: Wed, 07 Jan 1998 10:24:20 -0800
From: John Gilmore
To: declan at well.com, gnu at toad.com
Subject: Re: FC: Association for Interactive Media conference (DC, 2/98)
[for forwarding if you like]
Note that AIM, the sponsors of the "WashingtonWeb" conference, are the
folks who appear to be paid stooges for Network Solutions in trying to
keep their ten million dollar per month monopoly on domain names.
AIM's coverage of that issue has been completely false and completely
biased ("The Internet is likely to break apart on October 15, 1997";
"you may lose all rights to use your trademark in your Internet
address forever". See www.interactivehq.org/oic/).
They've been deliberately making false statements to stir up sentiment
against the evolution of domain names away from the Network Solutions
monopoly.
I wouldn't promote or attend their conference. There's something going
on there that I don't understand -- but I do recognize slime when I see it.
John Gilmore
--------------------------------------------------------------------------
POLITECH -- the moderated mailing list of politics and technology
To subscribe: send a message to majordomo at vorlon.mit.edu with this text:
subscribe politech
More information is at http://www.well.com/~declan/politech/
--------------------------------------------------------------------------
From dm0 at avana.net Wed Jan 7 11:29:04 1998
From: dm0 at avana.net (David Miller)
Date: Thu, 8 Jan 1998 03:29:04 +0800
Subject: FCC squeezes the ham TV band
Message-ID: <34B40059.28DE@avana.net>
Wednesday January 7 10:22 AM EST
FCC Reallocates Lightly Used Television Spectrum
WASHINGTON (Reuters) - The Federal Communications Commission said
Tuesday it had reallocated lightly used television frequencies for use
by public safety services.
Portions of the spectrum between 746 and 806 megahertz that had carried
channels 60 to 69 will be given over to police and fire departments and
other emergency services. The remainder of the spectrum will be
auctioned off for commercial use.
The reallocation was required by the Balanced Budget Act of 1997. The
FCC had previously announced it would reallocate the lightly used
spectrum in an April, 1997 plan for the transition to digital
television.
FCC chairman William Kennard said on Tuesday the commission would allow
some users of the high channels to continue operations, however.
"While recovery of unused spectrum is an integral part of the FCC plan
for transition from analog to digital television, I am sensitive to the
effects of spectrum recovery on Low Power TV and TV translators,"
Kennard said in a statement.
Such broadcasters may continue operations through the transition to
digital television "as long as they do not cause harmful interference
to primary services," he said.
-----------------------------------------------------------------------
Copyright � 1997 Reuters Limited. All rights reserved. Republication or
redistribution of Reuters content is expressly prohibited without the
prior written consent of Reuters. Reuters shall not be liable for any
errors or delays in the content, or for any actions taken in reliance
thereon
From tcmay at got.net Wed Jan 7 11:47:53 1998
From: tcmay at got.net (Tim May)
Date: Thu, 8 Jan 1998 03:47:53 +0800
Subject: Too many "Internet Conferences" in Washington
In-Reply-To:
Message-ID:
At 11:08 AM -0800 1/7/98, Declan McCullagh wrote:
>[This is the conference Tim was criticizing yesterday. --Declan]
>
Just to be more accurate, I was criticising the _sheer frequency_ of such
conferences, with this one just being one of many. And not even the latest
such example, as yet another Washington conference on the Internet was
announced later yesterday.
I just can't understand who attends these things, besides the Usual Suspects.
Maybe we could convince them to all have their confabs on the same day, the
same day Abu Nidal explodes his nuke in Crystal City?
(Or invite the Algerians in for a Hackers Conference? Get medeival on their
asses.)
--Tim May
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From dm0 at avana.net Wed Jan 7 11:54:59 1998
From: dm0 at avana.net (David Miller)
Date: Thu, 8 Jan 1998 03:54:59 +0800
Subject: More on Association for Interactive Media conference
In-Reply-To:
Message-ID: <34B406D5.2A9D@avana.net>
Declan McCullagh wrote:
> ---------- Forwarded message ----------
> From: John Gilmore
>
> Note that AIM, the sponsors of the "WashingtonWeb" conference, are the
> folks who appear to be paid stooges for Network Solutions in trying to
> keep their ten million dollar per month monopoly on domain names.
> AIM's coverage of that issue has been completely false and completely
> biased ("The Internet is likely to break apart on October 15, 1997";
> "you may lose all rights to use your trademark in your Internet
> address forever". See www.interactivehq.org/oic/).
>From the January 5, 1998 issue of Internet Week, page 14:
"Network Solutions, Inc., which registers domain names
under an agreement with the National Science Foundation,
will have the [DNS] agreement extended six months beyond
its March 1998 conclusion to ensure the stability of the
system."
--David Miller
From declan at well.com Wed Jan 7 11:55:24 1998
From: declan at well.com (Declan McCullagh)
Date: Thu, 8 Jan 1998 03:55:24 +0800
Subject: Too many "Internet Conferences" in Washington
In-Reply-To:
Message-ID:
In truth, I mistyped. Tim not only was talking about the frequency (and I
gather, the danger) of the conferences, he was responding to the ACM one,
not the WW one.
Now, who attends these things?
1. Journalists
2. Government bureaucrats happy to have a day off from work, who want to
position themselves as "Net-savvy"
3. Lobbyists who bill it to clients
4. Think tank people who hope someone reads their papers
The Naderite "Appraising Microsoft" conference seemed to be populated
mainly by journalists, at some points.
These conferences can be dangerous. If the best thing for the Net is for
DC to leave it alone, that principle leaves no space for Washington
lobbyists who bill by the hour (and through the nose) for their expertise:
pressuring various portions of the government. This is why lobbyists,
including so-called "Net-lobbyists" are not what the Net, and freedom,
need.
-Declan
On Wed, 7 Jan 1998, Tim May wrote:
> At 11:08 AM -0800 1/7/98, Declan McCullagh wrote:
> >[This is the conference Tim was criticizing yesterday. --Declan]
> >
>
> Just to be more accurate, I was criticising the _sheer frequency_ of such
> conferences, with this one just being one of many. And not even the latest
> such example, as yet another Washington conference on the Internet was
> announced later yesterday.
>
> I just can't understand who attends these things, besides the Usual Suspects.
>
> Maybe we could convince them to all have their confabs on the same day, the
> same day Abu Nidal explodes his nuke in Crystal City?
>
> (Or invite the Algerians in for a Hackers Conference? Get medeival on their
> asses.)
>
> --Tim May
>
> The Feds have shown their hand: they want a ban on domestic cryptography
> ---------:---------:---------:---------:---------:---------:---------:----
> Timothy C. May | Crypto Anarchy: encryption, digital money,
> ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
> W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
> Higher Power: 2^2,976,221 | black markets, collapse of governments.
> "National borders aren't even speed bumps on the information superhighway."
>
>
>
>
>
From ravage at ssz.com Wed Jan 7 12:03:53 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 8 Jan 1998 04:03:53 +0800
Subject: Polycratic government?...
Message-ID: <199801072025.OAA32052@einstein.ssz.com>
Hi,
Is anyone aware of research or writings regarding polycratic political
systems?
Thanks.
____________________________________________________________________
| |
| Those who make peaceful revolution impossible will make |
| violent revolution inevitable. |
| |
| John F. Kennedy |
| |
| |
| _____ The Armadillo Group |
| ,::////;::-. Austin, Tx. USA |
| /:'///// ``::>/|/ http://www.ssz.com/ |
| .', |||| `/( e\ |
| -====~~mm-'`-```-mm --'- Jim Choate |
| ravage at ssz.com |
| 512-451-7087 |
|____________________________________________________________________|
From tcmay at got.net Wed Jan 7 12:10:47 1998
From: tcmay at got.net (Tim May)
Date: Thu, 8 Jan 1998 04:10:47 +0800
Subject: Too many "Internet Conferences" in Washington
In-Reply-To:
Message-ID:
At 11:50 AM -0800 1/7/98, Declan McCullagh wrote:
>In truth, I mistyped. Tim not only was talking about the frequency (and I
>gather, the danger) of the conferences, he was responding to the ACM one,
>not the WW one.
Yeah, I didn't even recall which one I was commenting on. Just too many of
these damned boondoggles.
The only conference recently which as sounded interesting was the one on
"anonymity" down near LA recently...I might have gone, but I don't recall
hearing about it, or being invited. Until it was over, of course.
(I guess it was filled up with journalists, judging from the various
articles which have come out of it. Mostly cheesy articles, Declan's
excepted.)
>Now, who attends these things?
>
>1. Journalists
>2. Government bureaucrats happy to have a day off from work, who want to
>position themselves as "Net-savvy"
>3. Lobbyists who bill it to clients
>4. Think tank people who hope someone reads their papers
Yep. Boondoggles.
But as John G. and Declan and others have noted, these things can do real
damage. By skimming the surface, they are really just platforms for
position advocacy. Whether "conferences" on "ratings," or "Net.porn," or
"anonymity," or whatever, they end up being fora for certain policy wonks
to make their cases. And lazy staffers can then regurgitate the positions
as proposed legislation. (Thus satisfying their quotas, and proving they
are working hard.)
>The Naderite "Appraising Microsoft" conference seemed to be populated
>mainly by journalists, at some points.
Too many fucking journalists. Too many fucking staffers. Too many fucking
bureaucrats, lackeys, satraps, and empire builders.
The whole city, America's imperial city, is corruption on earth. The
Ayotollah had that one right.
--Tim May
The Feds have shown their hand: they want a ban on domestic cryptography
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^2,976,221 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
From nobody at nsm.htp.org Wed Jan 7 12:30:16 1998
From: nobody at nsm.htp.org (nobody at nsm.htp.org)
Date: Thu, 8 Jan 1998 04:30:16 +0800
Subject: lists
Message-ID: <19980107200049.20317.qmail@nsm.htp.org>
Can someone tell me if the toad cypherpunk list gets *all* the cypherpuink traffic? As I understand it there are three
possible subscription points -- does one subscription cover
all?
Thanks in advance...
From declan at well.com Wed Jan 7 12:38:05 1998
From: declan at well.com (Declan McCullagh)
Date: Thu, 8 Jan 1998 04:38:05 +0800
Subject: Too many "Internet Conferences" in Washington
In-Reply-To:
Message-ID:
YAICIW
January 5, 1998: Information and registration details are now
available on the Thursday, January 22, 1998 meeting in
Washington, D.C.: "Internet Domain Name System - gTLD-MoU Information
Session - An Opportunity to Meet Members of the Policy Oversight
Committee (POC) and Council of Registrars (CORE) to Discuss Policy,
Legal and Technical Aspects of the new Top Level Domains". See
http://www.gtld-mou.org/docs/meetings.html#jan22 for information
and registration form.
January 5, 1998: CORE will have a Plenary Meeting on January 21, 23,
24, 1998 in Washington, D.C. See
http://www.gtld-mou.org/docs/meetings.html#jan21
From declan at well.com Wed Jan 7 12:38:47 1998
From: declan at well.com (Declan McCullagh)
Date: Thu, 8 Jan 1998 04:38:47 +0800
Subject: Too many "Internet Conferences" in Washington
In-Reply-To:
Message-ID:
On Wed, 7 Jan 1998, Tim May wrote:
> The only conference recently which as sounded interesting was the one on
> "anonymity" down near LA recently...I might have gone, but I don't recall
> hearing about it, or being invited. Until it was over, of course.
>
> (I guess it was filled up with journalists, judging from the various
> articles which have come out of it. Mostly cheesy articles, Declan's
> excepted.)
I think I was the only full-time journalist invited to participate. There
were maybe four or so jlists covering it. From the web site:
Attendance at this conference will be by invitation only. About 35
individuals will represent a
variety of backgrounds and perspectives including the computing industry
(such as Internet service
providers, network administrators, and providers of "anonymizing"
services) the legal community,
professional societies, academic institutions, law enforcement agencies,
and other agencies of
government.
> But as John G. and Declan and others have noted, these things can do real
> damage. By skimming the surface, they are really just platforms for
> position advocacy. Whether "conferences" on "ratings," or "Net.porn," or
> "anonymity," or whatever, they end up being fora for certain policy wonks
> to make their cases. And lazy staffers can then regurgitate the positions
> as proposed legislation. (Thus satisfying their quotas, and proving they
> are working hard.)
Lobbyists need to show they're doing something to justify the money they
grab from corporations (many of which could be doing something better with
this cash, like R&D). Hence they host conferences and attend others.
There are very, very few groups out there that say Washington should take
a "hands off" approach to the Internet. Oh, sure, high tech firms
(including Microsoft) will use it as a good PR line but wait 'til they get
a chance to pass a criminal copyright bill. Even the librarians and
scientists, generally good on issues like content and copyright, spend
much of their time trying to grab more federal dollars. Like the new
federal phone tax the librarians and teachers pushed for: something like
$10-20/year per phone line.
Then of course there's the religious right and the law enforcement
lobbyists, all of which have their own pet projects and legislation.
There are few groups who are consistently opposed to the government
mucking around with the Internet. Cato Institute, Competitive Enterprise
Institute, and maybe American Enterprise Institute and Citizens for Sound
Economy and the Federalist Society.
Very, very few.
-Declan
From ravage at ssz.com Wed Jan 7 12:41:30 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 8 Jan 1998 04:41:30 +0800
Subject: Too many "Internet Conferences" in Washington (fwd)
Message-ID: <199801072105.PAA32344@einstein.ssz.com>
Forwarded message:
> Date: Wed, 7 Jan 1998 12:30:42 -0800 (PST)
> From: Declan McCullagh
> Subject: Re: Too many "Internet Conferences" in Washington
> Attendance at this conference will be by invitation only. About 35
> individuals will represent a
> variety of backgrounds and perspectives including the computing industry
> (such as Internet service
> providers, network administrators, and providers of "anonymizing"
> services) the legal community,
> professional societies, academic institutions, law enforcement agencies,
> and other agencies of
> government.
This is the real fault with the conference mentality...
How can anyone reasonably expect 35 people, invitation only or not, to have
a clue about any aspect of the industry let alone some sort of birds eye
view?
I would wager that if we took the top 35 ISP's in the US they couldn't come
up with a cohesive expression of viewpoint that would have a lifetime
measured in anything more than a few weeks.
Pure hubris.
____________________________________________________________________
| |
| Those who make peaceful revolution impossible will make |
| violent revolution inevitable. |
| |
| John F. Kennedy |
| |
| |
| _____ The Armadillo Group |
| ,::////;::-. Austin, Tx. USA |
| /:'///// ``::>/|/ http://www.ssz.com/ |
| .', |||| `/( e\ |
| -====~~mm-'`-```-mm --'- Jim Choate |
| ravage at ssz.com |
| 512-451-7087 |
|____________________________________________________________________|
From schear at lvdi.net Wed Jan 7 12:42:11 1998
From: schear at lvdi.net (Steve Schear)
Date: Thu, 8 Jan 1998 04:42:11 +0800
Subject: Debit-card program cancelled because of fraud [FWD]
Message-ID:
Date: Sun, 28 Dec 1997 09:22:45 -0500
From: Steve Bellovin
Subject: Debit-card program cancelled because of fraud
According to the AP, Burns National Bank (Durango, CO) is cancelling its
debit-card program because of fraud. The article is maddeningly incomplete
about technical details.
Apparently, the "hackers" (to quote the article) counterfeited plastic cards
and "took account number sequences off software that resides on the Internet
before encoding them in the magnetic strip on the back of the card." When
the fraud was detected, some customers had new cards issued, with some
unspecified extra security feature. It didn't work; within a month, the
accounts were penetrated again.
Three other banks have been victimized by a similar scheme. All four use
the same debit card vendor; Burns blames the vendor for inadequate security,
in some unspecified form. They're looking for a new supplier; until then,
the entire program is being suspended. Losses to date -- which are
apparently being absorbed by the banks -- total $300,000.
From declan at well.com Wed Jan 7 12:43:59 1998
From: declan at well.com (Declan McCullagh)
Date: Thu, 8 Jan 1998 04:43:59 +0800
Subject: Too many "Internet Conferences" in Washington
In-Reply-To:
Message-ID:
YAICIW
(well actually a press conference)
January 7
1:30 p.m. POLITICS ONLINE - PoliticsOnLine publisher Phil Noble
holds a news conference to release a report on how the Internet was used
in politics last year and prospects for usage this year.
Location: National Press Club.
Contact: Willie Blacklow, 301-652-3623.
From declan at well.com Wed Jan 7 12:46:09 1998
From: declan at well.com (Declan McCullagh)
Date: Thu, 8 Jan 1998 04:46:09 +0800
Subject: Too many "Internet Conferences" in Washington
In-Reply-To:
Message-ID:
YAICIW
(disclaimer: I am speaking at this one)
Cyberjournalism98
The best and brightest in cyberjournalism will explore the future of
internet based news and reporting at the Cyberjournalism98 symposium
on Jan. 8-10, 1998 in Washington, D.C. and jointly sponsored by the
National Press Club and the Freedom Forum.
For information on exhibiting atCyberjournalism98
contact Yvonne
Miller at MediaMasters at rocketmail.com For information about attending
the conference call Euraine Brooks at 703.284.2809 or email
ebrooks at freedomforum.org
From billp at nmol.com Wed Jan 7 12:51:13 1998
From: billp at nmol.com (bill payne)
Date: Thu, 8 Jan 1998 04:51:13 +0800
Subject: Bruce Schneier, Sandia, FBI and the REAL WORLD
Message-ID: <34B3DFB4.6396@nmol.com>
Wednesday 1/7/98 12:57 PM
Bruce Schneier wrote
and a burglar willing to try all 10,000 is guaranteed to break
into your house.
This is posted at jya.com.
Sandia employees Jack Hudson and Jack Menako, both in my division
when Sandia transferred me to break electronic locks for the FBI/ERF
[Engineering Research Facility, Quantico, VA], were TRYING to
defeat combination locks on file cabinets.
Menako built a frame to connect a stepper-motor to the combination
dial.
The stepper motor was wried to a PC.
Hudson wrote the software to try all possible combinations.
What happened, IN FACT, was that the combination lock wore-out
before the combination which opened the lock was reached.
Combinations locks are NOT ENGINEERED for such heavy use.
The file safe had to be destroyed to open it!
So Schneier's statement may be incorrect. No guarantee.
Guys, this is the REAL WORLD.
bill
Title: Security Pitfalls in Cryptography
Security Pitfalls in Cryptography
by Bruce Schneier
Cryptography Consultant
Counterpane Systems
e-mail: schneier at counterpane.com
Magazine articles like to describe cryptography products in terms of algorithms and key length. Algorithms make good sound bites: they can be explained in a few words and they're easy to compare with one another. "128-bit keys mean good security." "Triple-DES means good security." "40-bit keys mean weak security." "2048-bit RSA is better than 1024-bit RSA."
But reality isn't that simple. Longer keys don't always mean more security. Compare the cryptographic algorithm to the lock on your front door. Most door locks have four metal pins, each of which can be in one of ten positions. A key sets the pins in a particular configuration. If the key aligns them all correctly, then the lock opens. So there are only 10,000 possible keys, and a burglar willing to try all 10,000 is guaranteed to break into your house. But an improved lock with ten pins, making 10 billion possible keys, probably won't make your house more secure. Burglars don't try every possible key (a brute-force attack); most aren't even clever enough to pick the lock (a cryptographic attack against the algorithm). They smash windows, kick in doors, disguise themselves as policemen, or rob keyholders at gunpoint. One ring of art thieves in California defeated home security systems by taking a chainsaw to the house walls. Better locks don't help against these attacks.
Strong cryptography is very powerful when it is done right, but it is not a panacea. Focusing on the cryptographic algorithms while ignoring other aspects of security is like defending your house not by building a fence around it, but by putting an immense stake into the ground and hoping that the adversary runs right into it. Smart attackers will just go around the algorithms.
Counterpane Systems has spent years designing, analyzing, and breaking cryptographic systems. While we do research on published algorithms and protocols, most of our work examines actual products. We've designed and analyzed systems that protect privacy, ensure confidentiality, provide fairness, and facilitate commerce. We've worked with software, stand-alone hardware, and everything in between. We've broken our share of algorithms, but we can almost always find attacks that bypass the algorithms altogether. We don't have to try every possible key, or even find flaws in the algorithms. We exploit errors in design, errors in implementation, and errors in installation. Sometimes we invent a new trick to break a system, but most of the time we exploit the same old mistakes that designers make over and over again.
Attacks Against Cryptographic Designs
A cryptographic system can only be as strong as the encryption algorithms, digital signature algorithms, one-way hash functions, and message authentication codes it relies on. Break any of them, and you've broken the system. And just as it's possible to build a weak structure using strong materials, it's possible to build a weak cryptographic system using strong algorithms and protocols.
We often find systems that "void the warranty" of their cryptography by not using it properly: failing to check the size of values, reusing random parameters that should never be reused, and so on. Encryption algorithms don't necessarily provide data integrity. Key exchange protocols don't necessarily ensure that both parties receive the same key. In a recent research project, we found that some--not all--systems using related cryptographic keys could be broken, even though each individual key was secure. Security is a lot more than plugging in an algorithm and expecting the system to work. Even good engineers, well-known companies, and lots of effort are no guarantee of robust implementation; our work on the U.S. digital cellular encryption algorithm illustrated that.
Random-number generators are another place where cryptographic systems often break. Good random-number generators are hard to design, because their security often depends on the particulars of the hardware and software. Many products we examine use bad ones. The cryptography may be strong, but if the random-number generator produces weak keys, the system is much easier to break. Other products use secure random-number generators, but they don't use enough randomness to make the cryptography secure.
Recently Counterpane Systems has published new classes of attacks against random-number generators, based on our work with commercial designs. One of the most surprising things we've found is that specific random-number generators may be secure for one purpose but insecure for another; generalizing security analyses is dangerous.
In another research result, we looked at interactions between individually secure cryptographic protocols. Given a secure protocol, we show how to build another secure protocol that will break the first if both are used with the same keys on the same device.
Attacks Against Implementations
Many systems fail because of mistakes in implementation. Some systems don't ensure that plaintext is destroyed after it's encrypted. Other systems use temporary files to protect against data loss during a system crash, or virtual memory to increase the available memory; these features can accidentally leave plaintext lying around on the hard drive. In extreme cases, the operating system can leave the keys on the hard drive. One product we've seen used a special window for password input. The password remained in the window's memory even after it was closed. It didn't matter how good that product's cryptography was; it was broken by the user interface.
Other systems fall to more subtle problems. Sometimes the same data is encrypted with two different keys, one strong and one weak. Other systems use master keys and then one-time session keys. We've broken systems using partial information about the different keys. We've also seen systems that use inadequate protection mechanisms for the master keys, mistakenly relying on the security of the session keys. It's vital to secure all possible ways to learn a key, not just the most obvious ones.
Electronic commerce systems often make implementation trade-offs to enhance usability. We've found subtle vulnerabilities here, when designers don't think through the security implications of their trade-offs. Doing account reconciliation only once per day might be easier, but what kind of damage can an attacker do in a few hours? Can audit mechanisms be flooded to hide the identity of an attacker? Some systems record compromised keys on "hotlists"; attacks against these hotlists can be very fruitful. Other systems can be broken through replay attacks: reusing old messages, or parts of old messages, to fool various parties.
Systems that allow old keys to be recovered in an emergency provide another area to attack. Good cryptographic systems are designed so that the keys exist for as short a period of time as possible; key recovery often negates any security benefit by forcing keys to exist long after they are useful. Furthermore, key recovery databases become sources of vulnerability in themselves, and have to be designed and implemented securely. In one product we evaluated, flaws in the key recovery database allowed criminals to commit fraud and then frame legitimate users.
Attacks Against Passwords
Many systems break because they rely on user-generated passwords. Left to themselves, people don't choose strong passwords. If they're forced to use strong passwords, they can't remember them. If the password becomes a key, it's usually much easier--and faster--to guess the password than it is to brute-force the key; we've seen elaborate security systems fail in this way. Some user interfaces make the problem even worse: limiting the passwords to eight characters, converting everything to lower case, etc. Even passphrases can be weak: searching through 40-character phrases is often much easier than searching through 64-bit random keys. We've also seen key-recovery systems that circumvent strong session keys by using weak passwords for key-recovery.
Attacks Against Hardware
Some systems, particularly commerce systems, rely on tamper-resistant hardware for security: smart cards, electronic wallets, dongles, etc. These systems may assume public terminals never fall into the wrong hands, or that those "wrong hands" lack the expertise and equipment to attack the hardware. While hardware security is an important component in many secure systems, we distrust systems whose security rests solely on assumptions about tamper resistance. We've rarely seen tamper resistance techniques that work, and tools for defeating tamper resistance are getting better all the time. When we design systems that use tamper resistance, we always build in complementary security mechanisms just in case the tamper resistance fails.
The "timing attack" made a big press splash in 1995: RSA private keys could be recovered by measuring the relative times cryptographic operations took. The attack has been successfully implemented against smart cards and other security tokens, and against electronic commerce servers across the Internet. Counterpane Systems and others have generalized these methods to include attacks on a system by measuring power consumption, radiation emissions, and other "side channels," and have implemented them against a variety of public-key and symmetric algorithms in "secure" tokens. We've yet to find a smart card that we can't pull the secret keys out of by looking at side channels. Related research has looked at fault analysis: deliberately introducing faults into cryptographic processors in order to determine the secret keys. The effects of this attack can be devastating.
Attacks Against Trust Models
Many of our more interesting attacks are against the underlying trust model of the system: who or what in the system is trusted, in what way, and to what extent. Simple systems, like hard-drive encryption programs or telephone privacy products, have simple trust models. Complex systems, like electronic commerce systems or multi-user e-mail security programs, have complex (and subtle) trust models. An e-mail program might use uncrackable cryptography for the messages, but unless the keys are certified by a trusted source (and unless that certification can be verified), the system is still vulnerable. Some commerce systems can be broken by a merchant and a customer colluding, or by two different customers colluding. Other systems make implicit assumptions about security infrastructures, but don't bother to check that those assumptions are actually true. If the trust model isn't documented, then an engineer can unknowingly change it in product development, and compromise security.
Many software systems make poor trust assumptions about the computers they run on; they assume the desktop is secure. These programs can often be broken by Trojan horse software that sniffs passwords, reads plaintext, or otherwise circumvents security measures. Systems working across computer networks have to worry about security flaws resulting from the network protocols. Computers that are attached to the Internet can also be vulnerable. Again, the cryptography may be irrelevant if it can be circumvented through network insecurity. And no software is secure against reverse-engineering.
Often, a system will be designed with one trust model in mind, and implemented with another. Decisions made in the design process might be completely ignored when it comes time to sell it to customers. A system that is secure when the operators are trusted and the computers are completely under the control of the company using the system may not be secure when the operators are temps hired at just over minimum wage and the computers are untrusted. Good trust models work even if some of the trust assumptions turn out to be wrong.
Attacks on the Users
Even when a system is secure if used properly, its users can subvert its security by accident--especially if the system isn't designed very well. The classic example of this is the user who gives his password to his co-workers so they can fix some problem when he's out of the office. Users may not report missing smart cards for a few days, in case they are just misplaced. They may not carefully check the name on a digital certificate. They may reuse their secure passwords on other, insecure systems. They may not change their software's default weak security settings. Good system design can't fix all these social problems, but it can help avoid many of them.
Attacks Against Failure Recovery
Strong systems are designed to keep small security breaks from becoming big ones. Recovering the key to one file should not allow the attacker to read every file on the hard drive. A hacker who reverse-engineers a smart card should only learn the secrets in that smart card, not information that will help him break other smart cards in the system. In a multi-user system, knowing one person's secrets shouldn't compromise everyone else's.
Many systems have a "default to insecure mode." If the security feature doesn't work, most people just turn it off and finish their business. If the on-line credit card verification system is down, merchants will default to the less-secure paper system. Similarly, it is sometimes possible to mount a "version rollback attack" against a system after it has been revised to fix a security problem: the need for backwards compatibility allows an attacker to force the protocol into an older, insecure, version.
Other systems have no ability to recover from disaster. If the security breaks, there's no way to fix it. For electronic commerce systems, which could have millions of users, this can be particularly damaging. Such systems should plan to respond to attacks, and to upgrade security without having to shut the system down. The phrase "and then the company is screwed" is never something you want to put in your business plan. Good system design considers what will happen when an attack occurs, and works out ways to contain the damage and recover from the attack.
Attacks Against the Cryptography
Sometimes, products even get the cryptography wrong. Some rely on proprietary encryption algorithms. Invariably, these are very weak. Counterpane Systems has had considerable success breaking published encryption algorithms; our track record against proprietary ones is even better. Keeping the algorithm secret isn't much of an impediment to analysis, anyway--it only takes a couple of days to reverse-engineer the cryptographic algorithm from executable code. One system we analyzed, the S/MIME 2 electronic-mail standard, took a relatively strong design and implemented it with a weak cryptographic algorithm. The system for DVD encryption took a weak algorithm and made it weaker.
We've seen many other cryptographic mistakes: implementations that repeat "unique" random values, digital signature algorithms that don't properly verify parameters, hash functions altered to defeat the very properties they're being used for. We've seen cryptographic protocols used in ways that were not intended by the protocols' designers, and protocols "optimized" in seemingly trivial ways that completely break their security.
Attack Prevention vs. Attack Detection
Most cryptographic systems rely on prevention as their sole means of defense: the cryptography keeps people from cheating, lying, abusing, or whatever. Defense should never be that narrow. A strong system also tries to detect abuse and to contain the effects of any attack. One of our fundamental design principles is that sooner or later, every system will be successfully attacked, probably in a completely unexpected way and with unexpected consequences. It is important to be able to detect such an attack, and then to contain the attack to ensure it does minimal damage.
More importantly, once the attack is detected, the system needs to recover: generate and promulgate a new key pair, update the protocol and invalidate the old one, remove an untrusted node from the system, etc. Unfortunately, many systems don't collect enough data to provide an audit trail, or fail to protect the data against modification. Counterpane Systems has done considerable work in securing audit logs in electronic commerce systems, mostly in response to system designs that could fail completely in the event of a successful attack. These systems have to do more than detect an attack: they must also be able to produce evidence that can convince a judge and jury of guilt.
Building Secure Cryptographic Systems
Security designers occupy what Prussian general Carl von Clausewitz calls "the position of the interior." A good security product must defend against every possible attack, even attacks that haven't been invented yet. Attackers, on the other hand, only need to find one security flaw in order to defeat the system. And they can cheat. They can collude, conspire, and wait for technology to give them additional tools. They can attack the system in ways the system designer never thought of.
Building a secure cryptographic system is easy to do badly, and very difficult to do well. Unfortunately, most people can't tell the difference. In other areas of computer science, functionality serves to differentiate the good from the bad: a good compression algorithm will work better than a bad one; a bad compression program will look worse in feature-comparison charts. Cryptography is different. Just because an encryption program works doesn't mean it is secure. What happens with most products is that someone reads Applied Cryptography, chooses an algorithm and protocol, tests it to make sure it works, and thinks he's done. He's not. Functionality does not equal quality, and no amount of beta testing will ever reveal a security flaw. Too many products are merely "buzzword compliant"; they use secure cryptography, but they are not secure.
Home
page - Counterpane - Applied Cryptography - E-Mail Security
- Crypto Links
Bruce
Schneier Bio - Blowfish - Publications
- Contact Counterpane
Bruce Schneier
Copyright 1998 Counterpane Systems.
From declan at well.com Wed Jan 7 13:10:59 1998
From: declan at well.com (Declan McCullagh)
Date: Thu, 8 Jan 1998 05:10:59 +0800
Subject: Lessig on antitrust and government regulation
Message-ID:
Lessig is the special master appointed by the judge in the Microsoft
consent decree case. He once wrote:
>Whether a regulation is
>rational turns on the facts, and what counts as "the facts" turns on the
>theory that animates inquiry into the facts.
Wow.
How do we know what theory is the right one, and when we should change it?
-Declan
From declan at well.com Wed Jan 7 13:11:17 1998
From: declan at well.com (Declan McCullagh)
Date: Thu, 8 Jan 1998 05:11:17 +0800
Subject: Too many "Internet Conferences" in Washington
In-Reply-To:
Message-ID:
YAICIW
Look for more taxes to pay for rural phone connections
Connecting All
Americans for the 21st
Century:
Telecommunications
Links in Low Income
& Rural Communities
February 24-27, 1998
Washington, D.C.
A Policy Conference & A
Practitioners Workshop
sponsored by
United States Department of Commerce
National Telecommunications and Information Administration (NTIA)
&
The Public Utility Law Project (PULP)
A Non Profit Public Interest Law Firm Representing Low Income and Rural
Consumers
From declan at well.com Wed Jan 7 13:13:31 1998
From: declan at well.com (Declan McCullagh)
Date: Thu, 8 Jan 1998 05:13:31 +0800
Subject: Too many "Internet Conferences" in Washington
In-Reply-To:
Message-ID:
YAISIW
Washington, D.C. - January 6, 1998 - Ira Magaziner, President
Clinton's domestic policy development advisor, will outline the U.S.
Government position on electronic commerce and reform of the Domain
Name System at the Internet Executive Summits in London (on January
19, 1998, by video conference link) and Washington (on February 4,
1998). Magaziner has spearheaded the Clinton Administration's
efforts
on electronic commerce and has taken a leading role in the U.S.
Government's work on privatization of the Domain Name System.
Sally Tate, joint managing director of Prince plc, which is
facilitating the Summits, said that "Governments around the world
want
the private sector to take the lead to reform and manage the
Internet.
The Internet Executive Summits will enable business leaders to have
direct participation in formulating the private sector initiative to
ensure that the solution will fully reflect its requirements."
A U.S. Inter-Agency Taskforce, set up in April 1997, it is expected
to
issue policy recommendations based on responses to a request for
comments issued in July 1997 and thousands of pages of emailed
recommendations received each week. Magaziner's team has also had
consultations with hundreds of major Internet and telecommunications
companies in Washington D.C. in December 1997.
The open door global Internet Executive Summits in London (January
19-20, 1998) and Washington (February 3-4, 1998) will help to set the
agenda for transition of the current Internet Domain Name and
governance systems. All delegates will be eligible to participate in
the reform committees / initiatives formed at the Summits.
Representatives from all Internet stakeholder groups are expected to
attend the Summits including: commercial organizations worldwide,
national governments and intergovernmental organizations, law firms /
corporate legal departments, Internet consumer groups (including the
research and education community), technology companies and Internet
service providers (ISP's).
From declan at well.com Wed Jan 7 13:25:12 1998
From: declan at well.com (Declan McCullagh)
Date: Thu, 8 Jan 1998 05:25:12 +0800
Subject: Governments want to change Net architecture, from Comm Daily
Message-ID:
>Date: Wed, 7 Jan 1998 07:44:57 -0800 (PST)
>From: Declan McCullagh
>To: politech at vorlon.mit.edu
>Subject: FC: Governments want to change Net architecture, from Comm Daily
>MIME-Version: 1.0
>Sender: owner-politech at vorlon.mit.edu
>Reply-To: declan at well.com
>X-Loop: politech at vorlon.mit.edu
>X-URL: Politech is at http://www.well.com/~declan/politech/
>
>[Apologies to Art for not forwarding this earlier. --Declan]
>
>---------- Forwarded message ----------
>Date: Thu, 18 Dec 1997 10:28:49 -0500
>From: Art Brodsky
>To: declan at smtp.well.com
>Subject: comm daily story
>
>Declan,
> Here's the story from Comm Daily, Dec. 17
>
>'Optimistic and Damned Silly'
>
> INTERNET CHANGE FOCUS OF INTERNATIONAL LAW ENFORCEMENT
>
> Law enforcement officials of U.S. and 7 other industrialized
>countries want to make fundamental changes in Internet technology
>in order to aid in their ability to track and catch criminals,
>Justice Dept. sources said.
>
> Program to consider changes in Internet architectures comes as
>part of agreement announced last week by Attorney Gen. Janet Reno
>and Justice ministers from around world after meeting in Washington
>(CD Dec 11 p10). However, one leading Internet authority, MCI
>Senior Vp Vinton Cerf, said international group's plan wouldn't
>work.
>
> Justice ministers are considering approach similar to that of
>Communications Assistance to Law Enforcement Act (CALEA) program in
>U.S., which would make traffic from advanced telecom networks more
>accessible to law enforcement entities. Representatives of Canada,
>France, Germany, Italy, Japan, Russia and U.K., as well as U.S.,
>agreed as part of "statement of principles" issued in communique
>following 2-day session that: "To the extent practicable,
>information and telecommunications systems should be designed to
>help prevent and detect network abuse, and should also facilitate
>the tracing of criminals and the collection of evidence." Several
>items on "action plan" issued in support of those principles refer
>to working with new technologies to collect critical evidence,
>developing standards for authenticating electronic data for use in
>investigations and encouraging standards-making bodies to provide
>public and private sectors "with standards for reliable and secure
>telecommunications and data processing technologies."
>
> DoJ officials said Dept. may want to talk later with telephone
>industry on trap and trace issues, but it's premature to involve
>them now in follow-up to international summit. Instead, they said,
>they are looking at broader picture of telecom networks that
>haven't worked as closely with law enforcement as they could, and
>have begun thinking about Internet protocols. Internet operates
>globally with common protocols, currently Internet Protocol version
>4. Internet engineers are working on next iteration, version IPv6
>(Internet Protocol version 6 -- 5 was experimental attempt that was
>dropped). Justice official said that one problem now is that it's
>easy to send and receive e-mail with false address, called
>"spoofing."
>
> It would be helpful to law enforcement if information sent
>over Internet were tagged, and packets would transmit information
>reliably as to where they came from, including user and service
>provider, officials said. Loose analogy would be to compare e-mail
>messages to tagging of explosives, so law enforcement can track
>explosive material to its source. DoJ said new protocols could be
>designed to make it easier to authenticate messages and to make
>system more reliable. Law enforcement wants to work with industry
>to accomplish goal, saying it would help "keep people who are
>abusing information technologies from continuing to do it."
>
> There will be substantial obstacles to law enforcement
>concept, however. Not least of them is that IPv6 will include
>sophisticated encryption capabilities as part of protocols. Such
>security isn't built in to Internet now, one of reasons why
>electronic commerce has yet to take off, said Mark McFadden,
>communications dir. for Commercial Internet eXchange Assn. (CIX).
>That feature will make it harder for law enforcement to gain access
>to information, he said.
>
> Cerf, co-inventor of Internet protocols, said in interview
>that law enforcement's concept of tagging e-mail messages wouldn't
>work: "To imagine that we would instantly create the
>infrastructure for that throughout the entire Internet strikes me
>as optimistic and damned silly, at least in the short term. Anyone
>who anticipates using tools to guarantee that everything will be
>traceable is not going to have a successful outcome." Technically,
>such project could be accomplished, Cerf said, but having
>administrative infrastructure to administer it is quite different
>issue.
>
> It's possible to have digital signature for every packet of
>data, but it would take "an enormous amount of processing, and it's
>not clear we have any network computers and routers that could do
>that and maintain the traffic flow that's required," Cerf said. It
>also would require that each sender affix digital signature to each
>piece of mail, idea that Cerf said couldn't be enforced: "Frankly,
>the idea of trying to guarantee traceability of that kind is far
>from implementable." He said he didn't want to be misunderstood
>that his objections were "an argument in favor of criminality."
>But Cerf said he worries that "someone relies on what they think is
>a technical solution without recognizing all of the administrative
>mechanics that need to be put in place."
>
> Law enforcement has some time to work with Internet community.
>McFadden said IPv6 isn't scheduled to be implemented at consumer
>level for at least 5 years, possibly as much as 10. There was some
>urgency when it appeared that reservoir of Internet addresses would
>dry up, but with progress being made to protect addresses as scarce
>resource there's less pressure for new set of protocols, he said.
>
>
>posted with permission Warren Publishing
>
>
>--------------------------------------------------------------------------
>POLITECH -- the moderated mailing list of politics and technology
>To subscribe: send a message to majordomo at vorlon.mit.edu with this text:
>subscribe politech
>More information is at http://www.well.com/~declan/politech/
>--------------------------------------------------------------------------
>
From brian at hypersoft.net Thu Jan 8 06:07:16 1998
From: brian at hypersoft.net (Brian@HyperSoft.Net)
Date: Thu, 8 Jan 1998 06:07:16 -0800 (PST)
Subject: UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE
Message-ID:
UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE
From brian at csihost.4qsi.com Thu Jan 8 06:07:35 1998
From: brian at csihost.4qsi.com (bRIAN@4qsi.com)
Date: Thu, 8 Jan 1998 06:07:35 -0800 (PST)
Subject: UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE
Message-ID: <9801080907.ZM10801@csihost.4qsi.com>
UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE
From ravage at ssz.com Wed Jan 7 16:11:05 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 8 Jan 1998 08:11:05 +0800
Subject: Ruby Ridge FBI sniper to stand trial [CNN]
Message-ID: <199801080032.SAA00252@einstein.ssz.com>
Forwarded message:
> FBI SNIPER TO STAND TRIAL IN RUBY RIDGE CASE
>
> FBI seal January 7, 1998
> Web posted at: 6:32 p.m. EST (2332 GMT)
>
> BONNERS FERRY, Idaho (AP) -- A judge Wednesday ordered an FBI
> sharpshooter to stand trial on a state manslaughter charge for the
> death of white separatist Randy Weaver's wife in the 1992 siege at
> Ruby Ridge.
>
> The U.S. Justice Department decided in 1994 against prosecuting Lon
> Horiuchi and upheld the decision last year after a long review. But
> in August, Boundary County Prosecutor Denise Woodbury filed a charge
> of involuntary manslaughter.
>
> Magistrate Judge Quentin Harden decided there was probable cause to
> bring Horiuchi to trial on the state charge. Harden scheduled a
> February 13 arraignment before state Judge James Michaud.
>
> A federal judge is to hear arguments Monday from Horiuchi's lawyers
> in Boise that the case should be transferred to federal court.
____________________________________________________________________
| |
| Those who make peaceful revolution impossible will make |
| violent revolution inevitable. |
| |
| John F. Kennedy |
| |
| |
| _____ The Armadillo Group |
| ,::////;::-. Austin, Tx. USA |
| /:'///// ``::>/|/ http://www.ssz.com/ |
| .', |||| `/( e\ |
| -====~~mm-'`-```-mm --'- Jim Choate |
| ravage at ssz.com |
| 512-451-7087 |
|____________________________________________________________________|
From guy at panix.com Wed Jan 7 16:23:11 1998
From: guy at panix.com (Information Security)
Date: Thu, 8 Jan 1998 08:23:11 +0800
Subject: Sentencing for Electronic Copyright Infringement
Message-ID: <199801080008.TAA03811@panix2.panix.com>
> Subject: Re: Sentencing for Electronic Copyright Infringement
> From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM)
> Date: Wed, 07 Jan 98 08:09:32 EST
>
> Tim May writes:
> > When the ninja narc raiders cart our computers off for analysis, I'm sure
> > they can find enough violations to send us away for as many years as they
> > wish.
>
> And if Timmy knew a bit more about cryptography than he could learn by browsing
> through Bruce Schneier's book, the ninja narc raiders wouldm't be able to find
> shit on any of his media. :-)
Hey, Vulis, how does it feel to know all your phone lines
are being monitored by the FBI? For (among other things):
soliciting funds for terrorist groups incl Hamas to kill
a couple, and threatening government employees...
---guy
Lon T. Horiuchi was indicted for murder today.
The DOJ refused to prosecute him: the state will.
From jalonz at openworld.com Wed Jan 7 16:34:25 1998
From: jalonz at openworld.com (jalonz at openworld.com)
Date: Thu, 8 Jan 1998 08:34:25 +0800
Subject: The Digital Society Group
Message-ID: <85256585.00837DB3.00@openworld.com>
>>Without getting into too much detail, The Digital Society Group is
>>constructing a pure-technology infrastructure to provide for the
operation,
>>governance and existence of a complete digital society within a free
>>enterprise zone.
>The web site doesn't explain what methods you are using to establish these
>zones. Do you have a mailing list set up for discussion? The plan
>sounds interesting and ideologically supportable, but I'm skeptical.
Blanc,
I'm trying to get more docs online ASAP to explain things.
The physical free zones are very popular in the interational business
world, but I as a computer type had never heard of them other than Hong
Kong, etc.
When a country wants to set up a free zone, they come to Openworld and its
partner companies who do everything from clearing land, construction,
setting up businesses, schools, hospitals, etc. One of the soon to be
required components of a free zone installation is a digital infrastructure
to link all of the things together. We're talking smart cards for physical
structure security and personal ID, email, web hosting, net access, all
kinds of stuff.
Since we are building a "country" from scratch, rather than have to
automate paper workflows and do document management, the governance
processes are designed to be digital from the start.
Thus, to provide incorporation services to its citizens, a free zone allows
them to sign up via web browser, and the daily maintenance, processing and
management of the corporate records is also done almost exclusively via web
browser and email. Its fast, cheap, and requires far less labor than a
paper-based system. Another feature is that rather than maintaining the
records for the customer, the customer can log in via web browser and
update their own corporate record. (similar to Internic) This reduces labor
even further and reduces the cost of incorporation to around $100 per year
making instant offshore incorporation accessible to the general global
public for the first time.
That kind of solution applied across an entire governance and
communications infrastructure make for some radical things to become
possible.
Another concept being implemented is that each new free zone (being fully
wired) can easily replicate records and data with other free zones (they
will actually be required to for certain things) and thus a citizen in one
free zone can access banking, etc. services (even physical access) in
another. So, we see the emergence of a phsically distributed, digitally
cohesive network of "corporate states".
This lends to applications like data protection and hiding via distributed
storage or data sharing via common dataspaces and replication.
The technical methods to perform all of this work are a bit touchy. At the
risk of starting endless flame wars, I was looking at Lotus Bloats for its
replication and hierarchical security structure as well as easy forms to
web publishing and workflow management. That got shot down at the thought
of actually administrating the mess and also the costs are fairly
significant. The final nail in the coffin was the encryption key escrow
fiasco with the Swiss.
I was also looking at NT due to the nice database-to-web interface and the
fact that IIS 4 isn't too bad. But again software license costs are large
and who knows if Microsoft is doing, or will do, a key escrow deal for
future products? Who knows what they are doing now with NT on the OS level?
You can't run around making structures which allow people around the world
to move money and communicate anonymously, incorporate and have software
agents be owners of property and bank accounts without someone getting very
pissed off.
Thus, a good solution seems to be Linux in that its cheap, Unix is good for
multi-process routing, and the toolkits and components created by the
Digital Society can be easily moved into the public domin in some form or
another. Also, the export mess can be gotten around in one way or another.
Any comments? Any better alternatives than Linux?
The coding being done now is either cross-platform or prototype which will
be scrapped as soon as the kinks are worked out and the real fun can begin.
The Digital Society is purposefully working cheap and small to enable the
tools and communities to be deployed at as close as possible to no cost for
the end-user - that is the priority.
Most things are being coded from scratch to ensure security and keep the
costs low. Labor is cheap - when its your own.
:)
Jalon
---------------------------------------------------------------
Jalon Q. Zimmerman, Director
The Digital Society Group
A division of Openworld, Inc.
http://www.openworld.com/
jalonz at openworld.com
---------------------------------------------------------------
The government is not your mommy.
---------------------------------------------------------------
From aba at dcs.ex.ac.uk Wed Jan 7 16:37:42 1998
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Thu, 8 Jan 1998 08:37:42 +0800
Subject: Silly Shrinkwrapped Encryption
In-Reply-To:
Message-ID: <199801080006.AAA00669@server.eternity.org>
Bill Frantz writes:
>
> [lotus notes 24+40 GAK design]
>
> It seems to me that if you step on the correct part of the message, you zap
> the encrypted 24 bits, and cut NSA out of the loop. Of course the receiver
> could notice and refuse to decrypt, which would require some software
> hacking to defeat, but that is certainly doable.
Well if that were all they were doing you could just fill it with
random numbers, or encrypt the wrong 24 bits of random data with the
NSA's public key, etc. and the receiving software couldn't tell
without access to DIRNSA's private GAKking key.
However, I figure that they could do this... encrypt to the recipient
and include in the GAK packet the RSA padding used to encrypt the 24
bits.
The recipient gets the 24 bits anyway because he can decrypt the main
recipient field; with the padding he can re-create the RSA encrypted
GAK packet.
Not that we want to help the GAKkers or anything :-)
Still as you say even that would likely be a single byte patch or
whatever to skip the test.
Also as William notes, don't use the crap -- it's only 64 bits anyway
even for non-export version, and their reputed motives in smoothing a
path to domestic GAK, and even in buying into the KRAP program might
be enough to move some to boycott them even if there crypto key sizes
were reasonable, which they are not.
Adam
--
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
Message-ID: <199801072324.XAA00540@server.eternity.org>
Bill Payne writes:
> Bruce Schneier wrote
>
> and a burglar willing to try all 10,000 is guaranteed to break
> into your house.
>
> Sandia employees Jack Hudson and Jack Menako, both in my division
> when Sandia transferred me to break electronic locks for the FBI/ERF
> [Engineering Research Facility, Quantico, VA], were TRYING to
> defeat combination locks on file cabinets.
>
> Menako built a frame to connect a stepper-motor to the combination
> dial.
>
> The stepper motor was wried to a PC.
>
> Hudson wrote the software to try all possible combinations.
>
> What happened, IN FACT, was that the combination lock wore-out
> before the combination which opened the lock was reached.
>
> Combinations locks are NOT ENGINEERED for such heavy use.
Interesting.
When I was at [x] they had (and still do I think, hence obscuring
name!) 0-9 digit key pad combination locks. I noticed by just
casually using various permutations each time I used the locks that
there was something anomalous about the way the key pads worked. If
the code was 6789 you could get in by typing 56789, or by typing
456789 etc.
Clearly this gives you almost a 4 x reduction in the search space.
So I hacked up some code to compute the minimal universal door entry
sequence number. Joy of joys the "universal code" as it was dubbed
fitted easily on 1/2 a sheet of A4 paper at 66 lines by 80 characters
per line, and we figured (myself and entertained colleagues) with
semi-covert experimentation that with a bit of practice you could
break a lock in around 10 mins manually or something like that. It
looked quite esthetically pleasing also.
The sequence looked something like this:
01234567890124568902346780...
which would try combinations in this sequence:
0123
1234
2345
3456
4567
5678
6789
7890
8901
9012
0124
1245
2456
4568
5689
6890
8902
9023
0234
2346
3467
4678
6780
...
I was not able to do it quite the theoretical minimal number of
permutations of 2503, but it was only 3 or 4 extra digits I think. I
am not sure if you could do better than this, but it was a
computational trade off, my algorithm was recursive, and back tracked
as it was; I just chopped it off and demanded best solution after 1
hours CPU or whatever.
I might have the universal code and source code around somewhere,
can't lay my hands on it right now.
We dubbed this sheet of paper the "universal door code", and
considered pinning it beside the lock :-)
These locks looked pretty cheap, and didn't suffer the mechanical
failure problem you describe, we probably gave them enough stress
testing in our semi-covert experiments.
Also it occurs to me that a duty cycle of 10k operations isn't that
high. I am left wondering if perhaps you were pushing the units too
hard -- would you have been able to break the lock before mechanical
failure if you had slowed the rotation rate of your mechanical dial
turner? Also, perhaps your mechanical setup was too rough, putting
abnormal strain through clunky motion or something?
Also, in fact these 0-9 digit 4 digit locks at [x] I think had other
problems also, under certain circumstances you were able to type a
spurious digit between the digits of the 4 digit code (eg code is
1234, typing 15234 would let you in!) If we had been able to find a
rule governing this behaviour, an even shorter universal code would
have been obtainable. However it seemed erratic, and interest waned
around this point somewhere.
They also had a few hex versions with 0-9A-F and 4 digits, which I
also calculated a universal code for. They seemed not vulnerable to
the spurious digit flaw described in the above paragraph of the 0-9
units.
Adam
--
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0
UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE
From honig at otc.net Wed Jan 7 17:33:41 1998
From: honig at otc.net (David Honig)
Date: Thu, 8 Jan 1998 09:33:41 +0800
Subject: a good example of bad crypto hype
Message-ID: <3.0.5.32.19980107171614.007c4eb0@206.40.207.40>
at http://www.meganet.com/explain.htm
you can test your critical thinking skills...
------------------------------------------------------------
David Honig Orbit Technology
honig at otc.net Intaanetto Jigyoubu
"How do you know you are not being deceived?"
---A Compendium of Analytic TradeCraft Notes,
Directorate of Intelligence, CIA
From guy at panix.com Wed Jan 7 18:11:51 1998
From: guy at panix.com (Information Security)
Date: Thu, 8 Jan 1998 10:11:51 +0800
Subject: The Digital Society Group
Message-ID: <199801080202.VAA11825@panix2.panix.com>
> From: jalonz at openworld.com
> To: cypherpunks at toad.com
> Date: Tue, 6 Jan 1998 18:07:24 -0500
> Subject: The Digital Society Group
>
> Hi all,
Hi, stranger.
> Openworld, Inc. is a company which sets up free enterprise zones around the
> world. The "free zones" are akin to Hong Kong and Singapore and are
> self-governing, independent entities as recognized by the parent country.
[snip]
> A division of Openworld, Inc., The Digital Society Group, has been formed
> to apply technology to the infrastructure of the free zones and essentially
> mirror them in cyberspace .
>
> Without getting into too much detail, The Digital Society Group is
> constructing a pure-technology infrastructure to provide for the operation,
> governance and existence of a complete digital society within a free
> enterprise zone.
[snip]
> Locations are planned for Africa, Southeast Asia, Russia, etc.
>
> We are already coding...
> ---------------------------------------------------------------
> Jalon Q. Zimmerman, Director
> The Digital Society Group
> A division of Openworld, Inc.
Firing up the DejaNews traffic analysis tool...
Jalon Q. Zimmerman:
sneaker at powergrid.electriciti.com
jalonz at compuvar.com
jalon at ix.netcom.com
jalonz at datacore.compuvar.com
jalonz at morava.com
jalon at hermesnet.net
# Subject: I need a challenge!!
# From: "Jalon Q. Zimmerman"
# Date: 1995/06/19
# Newsgroups: misc.jobs.resumes
#
# I'm bored with the usual run-of-the-mill jobs and am looking for a
# challenge. I want to solve problems, find solutions, and create
# things with computers.
#
# My background is in programming/computer security and I have a
# strong creative talent.
#
# My dream is to work in the R&D environment where I can be given
# a problem/idea and turned loose.
Good boy. Good boy. Stop slobbering on the carpet...
% Subject: ENTERTAINMENT: The CyberGuy Project
% From: jalonz at compuvar.com (Jalon Q. Zimmerman)
% Date: 1995/10/23
% Newsgroups: comp.infosystems.www.announce
%
% Follow the crazed wanderings of a technomad. Announcing the CyberGuy
% Project. The first fully functioning guy, with a real job, and a real
% life, living with a laptop, a duffel bag full of stuff and the wide,
% wide world as his home...
%
% [defunct]
Word: "Technomad". Like it.
# I am moving. 1995/09/27
Moving from San Diego to...
# Subject: Columbus, Ohio - webheads netnerds arthackers wanted!
# From: jalon at ix.netcom.com (Jalon Q. Zimmerman)
# Date: 1996/04/08
# Newsgroups: oh.general,alt.cyberpunk,alt.rave,alt.2600
#
# I'm looking for webheads, netnerds and arthackers in the Columbus area
# to form an unstructured group and get a hangout going somewhere in a
# Columbus coffee-house or something like that.
#
# The idea is to throw a bunch of people and some resources together and
# see what happens.
#
# I have just moved to Columbus from San Diego where this type of thing
# is a necessity for modern cyberpeople. Since I can't find anything
# here, I thought I'd get it going myself.
#
# If you are interested, mail me and we'll make it happen.
Columbus "4DeadIn" Ohio.
% Subject: Looking for investor wishing to start an internet provision company in Columbus
% From: "Jalon Q. Zimmerman"
% Date: 1996/01/16
% Newsgroups: cmh.general
%
% I am looking for an investor wishing to start an Internet presence or
% service provision company in the Columbus, Ohio area. I have just
% relocated from San Diego, Ca. and am interested in contributing the
% "technical" element to a start-up venture.
%
% Please contact Jalon Zimmerman at: 614-873-4250
%
% Serious inquiries only.
Mooer.
# From: "Jalon Q. Zimmerman"
# Date: 1996/10/20
# Newsgroups: alt.mud.moo
#
# Hello,
#
# We are looking to sponsor a moo or some variation thereof as well as a
# rather serious Mxx-related website for the sheer coolness of it.
Headhunter:
Date Scr Subject Newsgroup Author
1. 96/07/19 020 Corporate salespeople wanted sdnet.jobs Jalon Q. Zimmerman
2. 96/07/19 020 Interns wanted - marketing/P sdnet.jobs Jalon Q. Zimmerman
3. 96/07/19 020 Corporate sales - Internet r sdnet.wanted Jalon Q. Zimmerman
4. 96/07/19 020 Corporate salespeople wanted sdnet.jobs.offered Jalon Q. Zimmerman
5. 96/07/19 020 Re: Corporate salespeople wa sdnet.jobs Jalon Q. Zimmerman
6. 96/07/19 020 Re: Corporate salespeople wa sdnet.jobs Jalon Q. Zimmerman
7. 96/07/19 020 Interns wanted - marketing/P sdnet.jobs.offered Jalon Q. Zimmerman
...moved to DC/Maryland...
# Subject: Exciting Internet jobs in growing DC & MD business: Programming,
# Graphics Design, Web Page Design, Customer Service, and More!
# Full-Time and Contractual positions saught.
# From: Cool Internet Jobs
# Date: 1997/03/13
# Newsgroups: dc.jobs,md.jobs,balt.jobs,misc.jobs.offered,us.jobs.offered,
# biz.jobs.offered,prg.jobs,comp.jobs.contract,misc.jobs.contract
#
# On May 1, 1997, Hermes Internet Service, Inc. will be opening a second
# office in Landover, Md., which is located at the intersection of US 50
# and the DC Beltway and walking distance to the New Carrollton Metro
# (Orange Line).
#
# We will continue to use our current location as well, near 7th Street
# and Maine Ave., SW, DC, near the waterfront.
#
# We have openings for four additional people, the first immediately, the
# other three on May 1:
Resume (snipped):
# Subject: html/CGI/db online inet apps - VB/MS Access - Linux/Postgres95
# From: "Jalon Q. Zimmerman"
# Date: 1995/06/25
# Newsgroups: misc.jobs.resumes
#
# DIGICOM
#
# Developing an HTML interface to telephone conferencing hardware for Logicon, a
# defense contractor. Group telephone conferencing can be managed from any HTML
# browser via a LAN or the internet. The system incorporates user accounting,
# document sharing within a conference, graphical icons and elements including
# photographs of the group participants, secure html interfacing, support for voice
# encrypted lines. Each server handles 32 simultaneous queries and 32 phone lines.
# The application is written in Visual Basic using Winsock 1.0 sockets, MS Access
# database tables, HTML 3.0, and MS Visual C++ DLLs.
#
#
# CREDIFAX INFORMATION SERVICES
#
# Designed and implemented an automated credit information retrieval and analysis
# solution. The system automated the office workflow, paper trail, billing, and
# communications. The final solution utilized an in-house client-server scheme for
# communications, a Paradox for Windows database platform, and an automated credit
# retrieval and analysis application in C++. Communications servers were run on OS/2,
# database platforms on Windows, and high-speed credit analysis under DOS. This was
# the second generation of the system developed at Credit Depot earlier.
#
# SAN DIEGO COMMUNITY COLLEGE DISTRICT
#
# Designed a statistical analysis solution to track the usage of learning resources on
# campus. Authored several encryption and security applications.
#
# SAN DIEGO DISTRICT ATTORNEY'S OFFICE.
#
# Computer Security - Provide computer security assistance in criminal
# investigations. Tasks include data decryption, recovering erased data,
# password retrieval, data line monitoring, and protected system entry.
Isn't that last item special?
---guy
And a possible reason for heading the other way.
From olejac at post4.tele.dk Thu Jan 8 10:25:42 1998
From: olejac at post4.tele.dk (Ole Jacobsen)
Date: Thu, 8 Jan 1998 10:25:42 -0800 (PST)
Subject: UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE
In-Reply-To: <9801080907.ZM10801@csihost.4qsi.com>
Message-ID: <34B50B55.4F04@post4.tele.dk>
bRIAN at 4qsi.com wrote:
>
> UNSUBSCRIBE CYPHERPUNKS-ANNOUNCE
remove me (olejac at post4.tele.dk or mlj at earthling.net) from the list too.
thanks, martin.
From emc at wire.insync.net Wed Jan 7 18:34:09 1998
From: emc at wire.insync.net (Eric Cordian)
Date: Thu, 8 Jan 1998 10:34:09 +0800
Subject: a good example of bad crypto hype
In-Reply-To: <3.0.5.32.19980107171614.007c4eb0@206.40.207.40>
Message-ID: <199801080230.UAA11585@wire.insync.net>
David Honig wrote:
> at http://www.meganet.com/explain.htm
> you can test your critical thinking skills...
Clearly everyone in this company is on crack. :)
--
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
From anon at anon.efga.org Wed Jan 7 19:02:54 1998
From: anon at anon.efga.org (Anonymous)
Date: Thu, 8 Jan 1998 11:02:54 +0800
Subject: No Subject
Message-ID: <2257f75e9d4378c573ebe49c9a1d7acc@anon.efga.org>
Creative Insecurity
The complicated truth behind the rise of Microsoft
By Virginia I. Postrel
Back in 1983, Forbes ran an article called "If they're so smart,
why aren't they rich?" It was about how inventors rarely reap
big financial rewards from their creations, and it started like
this:
"Here are some names you are not likely ever to see in The
Forbes Four Hundred [list of the richest Americans]: Franklin
Lim. Gary Kildall. Bill Gates...."
Oops.
The world's richest man wasn't always so. During the last
round of high-tech excitement--the personal-computer boom of
the early 1980s (which was followed by a traumatic
shakeout)--Gates looked like a smart programming geek whose
business savvy was dwarfed by the marketing whizzes at
Apple: "Their Apple Corp.," wrote the anonymous Forbes
author, "has been among the most successful at packaging a
product that sells and then selling it at an attractive price."
Therein lies a tale. As the Justice Department and a half-dozen
state attorneys general push forward antitrust actions against
Microsoft, it's worth considering how the company got where it
is and what that suggests about the strengths and limitations of
markets.
There are two main fables told about Microsoft: It has become
the dominant, standard-setting software company, and made
Gates a multibillionaire, because a) it makes wonderful
products and expresses all that is good about a capitalist
system or b) it cheats. Both fables turn up especially strongly in
statements by people who lack deep knowledge of the
industry, and each serves the interests of an industry faction.
The truth, however, is more complicated. Considered without
regard to price, ubiquity, or compatibility with inexpensive
hardware, many Microsoft products are mediocre at best. I am
happily writing this article using an obsolete Macintosh
operating system and WordPerfect, both of which I find
superior to even the latest versions of Windows and Word.
Great products did not make Microsoft number one.
Good-enough products did.
That uncomfortable truth offends moralists on both sides of the
Microsoft debate. The company's fans (and its spin doctors)
want to tell a simple tale about virtue triumphant--with virtue
defined, Atlas Shrugged-style, not only as astute business
decision making and fierce competition but also as engineering
excellence. Its critics use the same definition. If the products are
less than great, they suggest, the only way to explain the
company's success is through some sort of sleaze. Or,
alternatively, through the innate flaws of the market.
So what really happened? How did Microsoft end up ruling PC
operating systems and, through them, software in general?
At the risk of simplifying a complex story (if only by reducing
it to two players), the bottom line is this: Apple acted--and
continues to act--like a smug, self-righteous monopolist.
Microsoft acted--and continues to act--like a scrambling,
sometimes vicious competitor.
That pattern shows up most clearly in pricing strategies.
Microsoft's approach, throughout its history, has been to charge
low prices and sell an enormous amount of software. True to
form, the company is currently in trouble with the Justice
Department for charging too little--nothing--for its Internet
Explorer, by including it in Windows. (The technical legal
dispute is over whether Explorer is a "feature" of Windows, as
Microsoft maintains, or a separate product that is an illegal
"tie-in" and thus violates a consent decree Microsoft signed in
1995.)
The low-price strategy makes sense on two levels: First, it
approximates marginal-cost pricing, since software, once
written, costs very little for each additional copy. Anything
above that incremental cost, however small, is profit. Second,
and more significantly in this case, lower prices mean more
customers. And the more people who use a particular kind of
software, the more desirable it is for others to use it too.
Although translators help, switching formats is messy and
inconvenient. This "network externality" is particularly
important for operating systems and Internet browser formats,
since software developers and Web site designers have to pick
a standard for which to optimize their products.
As Gates toldWall Street Journal reporter Jim Carlton in an
interview for Carlton's new book Apple: The Inside Story of
Intrigue, Egomania, and Business Blunders, "Momentum
creates momentum. If you have volume, then people write
apps. If people write apps, you have momentum."
But if you think you already have a monopoly, you don't
worry about momentum. While Apple executives theoretically
knew they had competition, they acted as though they didn't.
Back in 1983 Apple may have been "selling [its computers] at
an attractive price." But the coming of the IBM clones made
Apple's prices look downright hideous. In the face of
ever-stronger competition, the company insisted on pricing the
Macintosh to maintain at least 50 percent profit margins; its
"50-50-50 rule" told managers to keep margins up to maintain
the stock price.
Customers who paid their own personal money for Macs might
be able to justify the high price simply because the computers
were fun and easy to use. But business managers who paid
Apple prices for any but the most specialized applications,
notably graphics-intensive work, were either fiscally
irresponsible or just plain dumb. Apple's pricing strategy
handed the vast business market to computers running
Microsoft operating systems, first DOS, then Windows.
Microsoft, of course, doesn't sell computers. It's in the software
business. You can get its operating system (and run its
applications) on all sorts of different machines, whose
manufacturers compete intensely. That competition drives
down consumer costs, even as machine features get better all
the time.
Apple didn't want that sort of competition. It not only kept its
own prices high but refused to license its software to any other
computer maker. That meant even fewer people used its
operating system, which further dampened its momentum.
Apple, in fact, acted like the ultimate "tie-in" monopolist. You
not only couldn't buy parts of its software separately; you
couldn't buy them at all without forking over thousands for an
Apple-made machine. And Apple has never been particularly
good at manufacturing.
After the company tepidly began licensing a couple of years
ago, Mac clone makers did what Apple had feared: They cut
into its revenue. But they also expanded the market, and they
made the fastest computers ever to carry the Mac operating
system. They gave Apple money for its software, even as they
bore the costs of manufacturing and distributing their
machines. And they gave consumers more choice, more
alternatives to Windows. If I were an antitrust regulator
looking for conspiracies, I'd be wondering just how
coincidental it was that Microsoft invested $150 million in
Apple just about the time Steve Jobs announced that the
company was ending the clone program.
Such explanations aren't necessary, however. Apple screwed
Mac lovers all by itself. Far from the marketing whizzes of 1983
conventional wisdom, its executives were enamored with the
cult of the machine, too hung up on the beauty of their product
to understand that consumers actually cared about many other
things: price, plenty of software, and compatibility with other
systems. Quality is not one-dimensional.
Apple's arrogance left computer users with less choice than
they might have had--or, perhaps, with more. After all, if Apple
had slashed prices early on and taken the business market
seriously from the start, it could well have ended up in a
Microsoft-like position, but without having to share its market
with clones. Microsoft would then have been mostly an
applications company, selling Excel and Word to Mac users,
and we'd be hearing about the evil, anticompetitive actions of
Steve Jobs.
That seems unlikely, however, and the reason is revealing.
Apple's all-in-one-box strategy was inherently brittle. It offered
too many margins of error and too few margins of adjustment.
The same company wrote the software and made the machines.
So if the computers caught on fire, as they sometimes did, or
the manufacturing plants couldn't keep up with Christmas
demand, there was no alternative outlet for the Mac operating
system. Software sales dropped too. No competitive sales force
could go after business users while Jobs and company were
chasing public schools. All new ideas had to come from within
the same closed system. (For a discussion of related issues, see
my Forbes ASAP article "Resilience vs. Anticipation". While
Apple is based in Silicon Valley, its self-sufficiency strategy
more closely resembles those of the minicomputer companies
based around Boston.)
Microsoft's partner-dependent system proved far more resilient
as the industry changed. The company didn't have to do
everything itself, and it could reap the benefits of innovations
by others, whether in manufacturing, assembly, distribution, or
applications software. Instead of the best minds of a single
company, it enlisted the best minds of hundreds. And while
Microsoft depended on its partners to build the market, in time
they came to depend on Microsoft. The irony is that by making
alliances and competing furiously--by not acting like a
monopolist--Microsoft wound up reaping the benefits of a
near-monopoly on its operating system.
It is emphatically not true that "when you buy a computer, you
already are without any choice as to the operating system," as
Microsoft critic Audrie Krause said on Crossfire. Both
REASON's production department and I personally will be
buying new Macs in the next few months. Translation software
makes it relatively easy to go from one operating system to
another. Nowadays, it's possible to function reasonably well
with an operating system that controls only 5 percent of the
new-computer market.
The great fear of Microsoft's critics is that the company will
wind up controlling everything, foisting mediocre-to-poor
products on an unwilling public at ever-higher prices. It's
impossible to disprove that hypothetical scenario. But history,
and Microsoft's own intense paranoia, cast doubt on it. Just
when its quasi-monopoly looks secure, something
new--Netscape's Web browsers, Sun Microsystems' Java
programming language--pops up and makes Microsoft
scramble to maintain its position. So far its resilience has
served it well, but the critics' scary scenario relies on more than
successful scrambling. It requires absolute security, no future
challengers. And that looks unlikely.
Consider the smoking gun memo cited by Assistant Attorney
General Joel Klein at the press conference announcing the
Justice Department suit. An internal Microsoft document, it
told marketing managers to "Worry about the browser share as
much as Bill Gates does, because we will lose the Internet
platform battle if we do not have a significant user-installed
base. The industry would simply ignore our standards. At
your level, that is at the manager level, if you let customers
deploy Netscape Navigator, you lose the leadership on the
desktop."
I will leave it to the attorneys to divine what it means not to "let
customers deploy Netscape Navigator," but one thing is clear:
This is not a company that thinks like a monopoly. It is always
running scared. There's always the possibility that something
new could come along and destroy its franchise.
Microsoft didn't get where it is by creating perfect products. It
benefited as much from its competitors' mistakes as from its
own considerable acumen. And it isn't shy about leaning on
suppliers and intermediate customers, such as computer
makers, to get its way. In the eyes of its critics, its success is
therefore proof that something is amiss in the marketplace.
But the market doesn't promise perfection, only a
trial-and-error process of discovery and improvement. The
fallible human beings who create products make mistakes.
They let their egos and preconceptions blind them to what
people really want. Or they just don't know enough, or adjust
fast enough, to produce the right goods at the right time. That
some of Microsoft's strongest current competitors--Sun and
Oracle--are gripped by an anti-PC ideology, when customers
love the independence and flexibility of personal computers,
does not bode well for them.
What is striking about the story of Microsoft is how adaptable
the company has been. Gates's original vision of "a computer
on every desk and in every home, running Microsoft software"
didn't specify what sort of software or who would make the
computers. It was an open-ended, flexible idea that built a
resilient company.
What Microsoft has delivered is pretty much what most people
want: a way to use computers easily, for many different
purposes. Its software isn't always elegant, but that's the
criterion of programming elites, not everyday users. And
though Microsoft is clearly the big kid on the block, it has
enabled, and encouraged, lots of other software developers.
Microsoft accounts for a mere 4 percent of industry revenue. As
Eamonn Sullivan of PC Week notes, "A lot of companies are
making a lot of money on the ubiquity of Windows, providing
users with a lot of choice where they want it--on their desktops.
That isn't the expected result of a monopoly."
From 1969 to 1982, the Justice Department carried on a similar
trust-busting crusade against IBM, which had behaved in many
ways just like Microsoft. (An earlier antitrust action against
IBM had been settled by a consent decree in 1956.) Millions of
dollars were transferred from the taxpayers and stockholders to
lawyers and expert witnesses. Enormous amounts of brain
power were dissipated. Having to monitor every action for
possible legal ramifications further constipated IBM's
already-centralized culture.
The suit was a complete waste. Whatever quasi-monopoly IBM
had was broken not by government enforcers but by obscure
innovators, working on computer visions neither IBM nor the
Justice Department's legions of lawyers had imagined. Big Blue
is still big, though it's smaller than it once was. But nobody
thinks it could control the world. The world, it seems, is
beyond that sort of control.
From brianbr at together.net Wed Jan 7 19:03:53 1998
From: brianbr at together.net (Brian B. Riley)
Date: Thu, 8 Jan 1998 11:03:53 +0800
Subject: cypherpunks and guns
Message-ID: <199801080258.VAA23445@mx02.together.net>
-----BEGIN PGP SIGNED MESSAGE-----
On 1/7/98 3:16 AM, Kent Crispin (kent at songbird.com) passed this
wisdom:
>On Wed, Jan 07, 1998 at 01:25:45AM -0600, snow wrote:
>>I am fairly certain that as an irregular army soldier I could
>>inflict a substantial amount of damage upon an occupying military.
>>With maybe $20k in equipment and several hundred hours of training,
>>you could make
>>
>> If you were smart, you could do it for a lot less.
>
>That presumes the enemy is dumb. An amusing fantasy.
... not so .... the US Military has very few really experienced
combat soldiers left and most of those are in places where their
experience isn't available to the grunt on the line. Most RVN vets are
retired ... look just recently at what happened to the Russians troops
sent to Chechnya ... all these brand spanking new, highly trained
proud young 19 and 20 year old troops went romping off to fight 'a
bunch of old men' in the Chechyn Republic ... there was one little
problem ... a big hunk of those old men had spent two to seven years
in that same Russian Army fighting the Mujahedeen in Afghanistan ...
and that 'bunch of old men' kicked their young asses!
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQEVAwUBNLRAvD7r4fUXwraZAQHv5wf/S8j1et/Rf0LQu8eH4koWLjmSduaxggsY
VMGcY7z2OfLdSrtVAGIcLpfPPdrOk0utmH317xwKIL9SIQIqGYvm7pCdYSv0A4Vx
KD49W3pQjhvrhTHZldd8EFrd7Z2thfR1EJL9Vowsnyr4QHt5FvXrBs6k5531iNtN
TURAhCzVgpKuMruwwaKMVc+P72mYJl7OM2I2j6ZdEkZOPNxoCVS/0xO8UTlWpLUO
9Suxvi+rJSa4k/HKRsGUrRO/LaFK7abTs/AwLioJlyd5ukXjdPuyY2wza8h1GvC2
fowHb8WGYdcwc45FBhpz3bEiS/PU5t2xHQ9p+/mEkLDknfBSNk01zw==
=hiEs
-----END PGP SIGNATURE-----
Brian B. Riley --> http://members.macconnect.com/~brianbr
For PGP Keys
"In effect, to follow, not to force the public inclination; to give a
direction, a form, a technical dress, and a specific sanction, to the
general sense of the community, is the true end of legislature."
-- Edmund Burke
From anon at anon.efga.org Wed Jan 7 19:04:05 1998
From: anon at anon.efga.org (Anonymous)
Date: Thu, 8 Jan 1998 11:04:05 +0800
Subject: No Subject
Message-ID: <99d5b130b3c4dbe1a86b35eb0bd8f255@anon.efga.org>
CRACKING
DOWN
ON
MICROSOFT
The Justice
Department has
a long history of
mistaking
innovators for
monopolists
BY LAWRENCE J. SISKIND
THE DEPARTMENT OF JUSTICE has
painted its assault on Microsoft Corp. as a campaign against
tying. Microsoft, the government says, should not be
allowed to force manufacturers who load Windows95 onto
their computers to include the Internet Explorer Web
browser.
Close inspection, however, reveals that the DOJ is not
guarding against tying -- it is guarding against change. And
while the Justice Department has won the first round
against the software giant, the question of whether that
change is good or ill should be left to the market to decide,
not the government.
When the DOJ charged Microsoft with violating their 1995
consent decree, it cited Sec. IV(E)(I), which bars Microsoft
from conditioning the licensing of any one product on the
licensing of another. Microsoft's Windows95 operating
system includes the Internet Explorer -- IE -- Web browser.
Microsoft openly forbids PC manufacturers licensed to load
Windows95 from removing the browser. To Joel Klein, head
of the DOJ's Antitrust Division, this is unlawful tying, plain
and simple. "We think the evidence will show unmistakably
that these are two separate products," he said. "Everybody
knows you have an operating system and you have a
browser."
Everybody also knows that whenever a lawyer begins a
statement with the phrase "everybody knows," the
consequent proposition will be questionable at best. Mr.
Klein's statement was not flat-out wrong. But it was flat-out
nearsighted. The only thing "everybody knows" about
operating systems is that they are constantly changing.
Mr. Klein's statement was not
flat-out wrong. But it was flat-out
nearsighted. The only thing
'everybody knows' about operating
systems is that they are constantly
changing.
An operating system program controls the operation of the
computer, determining which programs run and when. It
also coordinates the interaction between the computer's
memory and its attached devices. When the world's first PC,
the Altair 8800, appeared in 1975, its operating system
didn't have much to operate. The product was a
do-it-yourself kit, without display screen or printer.
Operating systems became more complex as personal
computers became more versatile.
FAR-FLUNG PERIPHERALS
Contemporary operating systems are as far removed from
the early operating systems as Cape Kennedy is from Kitty
Hawk. They have evolved to manage a growing array of
peripherals: keyboard, monitor, disk drives, printer, fax,
modem and more. They have also embraced new features
and capabilities: data compression, disk defragmentation,
multimedia extensions and data transmission technology.
All of these features, by the way, once existed as separate
programs. Yet no one views their inclusion in modern
operating systems as any kind of tying.
Which brings us to the Windows95 operating system. When
Microsoft began to develop Windows95, then code-named
"Chicago," it decided to build Internet technology into it.
The early elements of this technology included a Web
browser and were code-named "O'Hare." The very first
commercially available versions of Windows95 included
Internet Explorer as a component. Since then, IE has been
repeatedly upgraded, with each successive version more
tightly intertwined with the rest of the operating system.
The most recent version, IE 4.0, is ubiquitous, and allows
the user to explore World Wide Web sites from anywhere on
the computer. One can connect to the Web without even
opening the browser, and one can view Web sites (called
"channels") without connecting to the Internet.
What is true about Windows95 also holds true for rival
products. Brit Hume recently observed in the Weekly
Standard: "The distinction between browsers and
operating systems has blurred to the point where it's not
clear where one ends and the other begins." Every major
contemporary operating system now contains Internet
technology.
Designing an operating system to
access the Internet represents a
quantitative, rather than a
qualitative, change.
The intermeshing of operating systems with Internet
capabilities is eminently logical. These systems have always
been designed to access information. In the early days, that
meant accessing hard drives and floppy-disk drives. With
the advent of the CD-ROM, they were designed to access
data from that source. As businesses brought PCs into the
office, computers became linked together into networks;
operating systems were designed to access information from
local area networks.
The Internet, for all its unimaginably vast dimensions, is
just another repository of information to a computer.
Designing an operating system to access the Internet
represents a quantitative, rather than a qualitative, change.
MICROSOFT SLACKING
Ironically, this is not a change sponsored or spearheaded
by Microsoft. If anything, Bill Gates has been a laggard in
this area. His rivals are far ahead and he is playing
catch-up.
The great proponents of Internet-driven computers have
emerged from Silicon Valley, not from Redmond, Wash.
Larry Ellison, CEO of Oracle Corp., has long championed
the idea of the "network computer." Consider computers as
underwater divers. Equipping each diver with his own tanks
is wasteful and inefficient. It imposes severe limits on how
long and how far the diver can explore. Instead, let every
diver be connected to a surface mothership. The connection
frees the diver from the limitations and burdens of carrying
his own tanks. Similarly, loading millions of PCs with their
own copies of software programs is a waste of resources.
Instead, let every computer be networked and draw its
software needs from the vast store of the Internet. The
result, Ellison says, would be high-quality personal
computers retailing at about $500.
In line with this thinking, Sun Microsystems has developed
Java, a language that allows programmers to create
Internet-based applications capable of running on any
computer, regardless of operating system. Sun's CEO, Scott
McNealy, notes that 400,000 programmers (including 2,500
at IBM) are currently writing programs in Java language.
The libertarian journalist and futurist George Gilder
believes Java will revolutionize personal computing and
render proprietary systems like Windows obsolete.
If the future of personal computing is indeed linked to the
Internet, then weaving Internet technology into Windows95
(and even more intimately and pervasively into Windows98)
is not a grab for power. It is a clutch for survival.
Which brings us back to the DOJ's decision to prosecute
Microsoft for tying. Some have suspected a political bias,
noting that in 1992 and 1996 Silicon Valley entrepreneurs
were among Clinton's best friends in the business
community. Microsoft, on the other hand, has always
remained aloof from politics.
'INSTITUTIONAL MYOPIA'
But I believe the attack on Microsoft stems from
institutional myopia rather than political bias. The DOJ's
Antitrust Division may understand the law and may be
sincerely dedicated to enforcing it fairly. But it has no way
of knowing where the economy is headed or how fast it is
heading in that direction. Instead, the division views the
economy as static. An operating system will always be an
operating system. A browser will always be a browser. Just
like timber, coal or oil: Products do not change.
Because of this institutional myopia, the DOJ has a history
of marching down wrong roads. In 1969, it prosecuted IBM.
Fifteen years passed before the department finally
understood what every high school techno-geek already
knew: The computer industry was dynamic, and Big Blue
was not dominant.
If the Internet is the future of
personal computing, then weaving
Internet technology into Windows
is not a grab for power. It is a
clutch for survival.
The hapless campaign against IBM probably did no harm.
Other Antitrust Division missteps have. In the 1960s and
'70s, long after most Americans had abandoned the
neighborhood Mom-and-Pop store for the national chain,
the DOJ was prosecuting Topco Associates, a cooperative
association of small grocery chains. The DOJ wanted to
protect the association's small regional members. It failed to
notice the dynamic changes already apparent to the
average shopper. The days of the Mom-and-Pop grocer were
over. And while the DOJ was successfully squashing Topco,
its much more powerful rivals -- The Great Atlantic & Pacific
Tea Co. Inc. (A&P), Safeway Inc., the Kroger Co. -- were
assuming dominance over the grocery business.
The same myopia underlies the decision to prosecute
Microsoft. Enslaved by its institutional myopia, the DOJ
simply cannot understand that operating systems change.
Thus, it sees tying when in fact there is transmutation.
Internet-oriented operating systems may be the wave of the
future. Or they may be a detour to nowhere. Not everyone
likes or needs the endless waits, the superfluous graphics
and the flood of irrelevant and unwanted information that
always seem to accompany excursions onto the Internet.
Nothing is certain in high tech; business empires rise and
fall with stunning rapidity. Confronting this sometimes
creative, sometimes destructive turmoil, a wise government
would recognize its limitations and restrict its role. Whether
Windows95 should include Internet Explorer is a question
best left to the millions of jurors who make up the
marketplace.
AUTHOR
LAWRENCE J. SISKIND is a San Francisco attorney who specializes in
intellectual property law. Mr. Siskind owns stock in Microsoft Corp. He hopes
that his pro-Microsoft opinions, once published, will influence the price of his
stock favorably. The expectation of financial gain has colored, if not
dictated, the opinions expressed in his article.
From wombat at mcfeely.bsfs.org Wed Jan 7 19:49:29 1998
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Thu, 8 Jan 1998 11:49:29 +0800
Subject: More gun nutz
In-Reply-To: <199801080258.VAA23445@mx02.together.net>
Message-ID:
On Wed, 7 Jan 1998, Brian B. Riley wrote:
> retired ... look just recently at what happened to the Russians troops
> sent to Chechnya ... all these brand spanking new, highly trained
> proud young 19 and 20 year old troops went romping off to fight 'a
> bunch of old men' in the Chechyn Republic ... there was one little
> problem ... a big hunk of those old men had spent two to seven years
> in that same Russian Army fighting the Mujahedeen in Afghanistan ...
> and that 'bunch of old men' kicked their young asses!
That's just the new Russian capitalism. Their military had to create some
real equipment losses to cover all the missing inventory they're selling
on the black market.
-r.w.
p.s. - How can I get the DMV to give me "historic" tags for my slightly
used T-64?
What's the best armored fighting vehicle for a cypherpunk?
From sergey at pelican.el.net Wed Jan 7 19:57:04 1998
From: sergey at pelican.el.net (Sergey Goldgaber)
Date: Thu, 8 Jan 1998 11:57:04 +0800
Subject: Jim Bell... lives... on... in... Hollywood!
In-Reply-To: <19980101150542.36875@songbird.com>
Message-ID:
On Thu, 1 Jan 1998, Kent Crispin wrote:
> On Thu, Jan 01, 1998 at 09:52:20PM +1100, Julian Assange wrote:
> >
> > Anyone noticed this before?
>
> No. But there are two obvious differences between this and the Bell
> plan: 1) it's not anon; 2) you are explicitly barred from winning if
> you contribute in any way to the death.
1 - Anonymity is technically feasable.
2 - This requirement is a legal necessity. Otherwise, the organization
may be seen as advocating murder.
Obviously, if the "Death Pool" was fully anonymous, there would be
no way to tell if the winner had contributed in any way to the death.
Thus, I think we may be well on our way to Assasination Politics.
- Sergey Goldgaber
From wendigo at ne-wendigo.jabberwock.org Wed Jan 7 20:30:41 1998
From: wendigo at ne-wendigo.jabberwock.org (Mark Rogaski)
Date: Thu, 8 Jan 1998 12:30:41 +0800
Subject: a good example of bad crypto hype
In-Reply-To: <3.0.5.32.19980107171614.007c4eb0@206.40.207.40>
Message-ID: <199801080419.XAA13414@deathstar.jabberwock.org>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
An entity claiming to be David Honig wrote:
:
: at http://www.meganet.com/explain.htm
: you can test your critical thinking skills...
:
- From the first paragraph, which offers this indisputable nugget:
"At no point in time does the ORIGINAL DATA
ever gets encrypted or transferred
in any form or shape."
I haven't laughed so hard in a long time. And the grammar adds an even
better tinge to the spiel.
- --
[] Mark Rogaski "That which does not kill me
[] wendigo at pobox.com only makes me stranger."
[]
[] finger wendigo at deathstar.jabberwock.org for PGP key
[] anti spambot: postmaster at localhost abuse at localhost uce at ftc.gov
-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv
iQA/AwUBNLRT5piFNf283WlHEQJs7gCg2dNjMxE8A/IDL7Tv8wKzPd2/LBMAn3ZZ
IDnY6wp9N0ncZZAwd/wv9TAQ
=hYW8
-----END PGP SIGNATURE-----
From busadmn at ix.netcom.com Thu Jan 8 12:33:23 1998
From: busadmn at ix.netcom.com (busadmn at ix.netcom.com)
Date: Thu, 8 Jan 1998 12:33:23 -0800 (PST)
Subject: Just Released! 16 Million!
Message-ID: <67101850_17330549>
IT WAS JUST RELEASED!!
INTRODUCING...MILLIONS VOL. 1
We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those. When we
combined them all, we had in excess of 100+ million addresses
in one huge file.
We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
"generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for those
that use Stealth programs, clogs up servers quickly with trash, etc.
We then ran a program that contained 150+ keywords to remove
addresses with vulgarity, profanity, sex-related names, postmaster,
webmaster, flamer, abuse, spam, etc., etc. Also eliminated all .edu,
.mil, .org, .gov, etc. After that list was run against the remaining list,
it reduced it down to near 16 million addresses!
So, you see, our list will save people hundreds of dollars buying all
others that are out there on CD and otherwise. Using ours will be like
using the 100+ million that we started with, but a lot less money and
alot less time!!
We also purchased Cyber-Promos ($995.00) CD. We received it just
prior to finishing production work on the new CD. We had our people
take a random sample of 300,000 addresses from the touted 2.9 that
they advertised. We used a program that allows us to take a random
sample of addresses from any list. We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom. We did not clean these, but we did create
3 seperate files named cyber1.txt, cyber2.txt, & cyber3.txt of 100,000
addresses each. This will give all people that use the list a opportunity to
send mail to the list before deciding if their CD is all it's hyped to be.
We also included a 2+ million "Remove/Flamer" file broke into seperate
files for ease of extracting and adding to your own database of removes.
"You can buy from the REST or you can buy from the BEST. Your choice.
_____________________________
What others are saying:
"I received the CD on Friday evening. Like a kid with a new toy, I
immediately started bulking out using the new email addresses. Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!! I am totally satisfied
with my purchase!! Thanks Premier!!"
Dave Buckley
Houston, TX
"This list is worth it's weight in gold!! I sent out 100,000 emails for my
product and received over 55 orders!
Ann Colby
New Orleans, LA
****************************************
HERE'S THE BOTTOM LINE
Here is what you get when you order today!
>> 16 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 100,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
PLUS you receive a tremendous REMOVE list!
AND
the a sampling of CyberPromo's HOT list.
>>> NOW ONLY $149.00!
This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!
All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.
Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere..PERIOD!
If you have any further questions or to place an order by
phone, please do not hesitate to call us at:
908-245-1143
To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
We accept Visa, Mastercard, AMEX, Checks by Fax and Mail.
_________________
EZ Order Form
_____Yes! I would like to order MILLIONS Vol. 1 email addresses
for only $149.00.
*Please select one of the following for shipping..
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping. (outside US add an additional $25 for shipping)
DATE_____________________________________________________
NAME____________________________________________________
COMPANY NAME___________________________________________
ADDRESS_________________________________________________
CITY, STATE, ZIP___________________________________________
PHONE NUMBERS__________________________________________
FAX NUMBERS_____________________________________________
EMAIL ADDRESS___________________________________________
TYPE OF CREDIT CARD:
______VISA _____MASTERCARD
CREDIT CARD# __________________________________________
EXPIRATION DATE________________________________________
NAME ON CARD___________________________________________
AMOUNT $____________________
(Required) SIGNATURE:x________________________
DATE:x__________________
You may fax your order to us at: 1-908-245-3119
CHECK BY FAX SERVICES!
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-908-245-3119
******************************************************
***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
CHECK HERE AND FAX IT TO US AT 1-908-245-3119
*******************************************************
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.
If you feel more comfortable sending payment through the mail,
please send all forms and Check or Money Order to:
Rapture Marketing Inc.
P.O. Box 616
Kenilworth, NJ 07033
From bill.stewart at pobox.com Thu Jan 8 13:43:49 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Thu, 8 Jan 1998 13:43:49 -0800 (PST)
Subject: lists
In-Reply-To: <19980107200049.20317.qmail@nsm.htp.org>
Message-ID: <3.0.5.32.19980108131127.008934a0@popd.ix.netcom.com>
At 08:00 PM 1/7/98 -0000, nobody at nsm.htp.org wrote:
>Can someone tell me if the toad cypherpunk list gets *all* the
>cypherpuink traffic? As I understand it there are three
>possible subscription points -- does one subscription cover
>all?
You can't subscribe to cypherpunks-request at toad.com any more,
but mail sent there will still get forwarded to the other
mailing lists, all of which send all mail to each other
(except when they're broken, which isn't very often.)
cypherpunks-request@
cyberpass.net
algebra.com
ssz.com
htp.org
should all get you help for using their subscription mechanism
(usually majordomo or another listserv.)
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From jamesd at echeque.com Wed Jan 7 21:57:59 1998
From: jamesd at echeque.com (James A. Donald)
Date: Thu, 8 Jan 1998 13:57:59 +0800
Subject: Announcing Crypto Kong, Release Candidate Two.
Message-ID: <199801080543.VAA21873@proxy3.ba.best.com>
--
Announcing Crypto Kong, Release Candidate Two.
http://www.jim.com/jamesd/Kong
please test.
Crypto Kong, like PGP, provides digital signatures and
communications encryption.
The important difference between it and other products that
provide digital signatures and encryption is that it is not
certificate based. Instead it is signature based.
This eliminates the steep initial learning and management
curves of existing products. The user does not need use and
manage specialized certificates except for specialized
purposes
Perhaps more importantly, it also eliminates the threat we
saw in England, the threat of the government giving itself a
monopoly in certificate distribution, potentially creating
the Number-Of-The-Beast system, where you need a government
certificate to log on to dirty picture sites, to buy, to
sell, to put up web pages.
The big complexity and user hostility in existing products is
creating and managing certificates.
For those who need contracts and certificates, (and with Kong
one almost never needs certificates) Kong handles them in an
easy and natural way.
See the discussion in the web site in the chapters:
Linking digital IDs with paper documents or physical
presence
and
Certificates and contracts
This aspect of Kong seems to have been insufficiently tested
in the beta tests.
The key feature of the proposed product is that any
digitally signed document can be stored in the database, and
itself performs the functions of a certificate, just as a
normal handwritten signature does. The user usually does
not need to check a document against a certificate to see if
it was signed by the "real" John Doe. Instead he normally
checks one document against other documents stored in the
database that have the same signature. And similarly when he
encrypts a document, he does not need to use a certificate
to encrypt a message to the one *real* John Doe, he merely
encrypts a message to the *same* John Doe who signed the
letter he is replying to.
At present people have to deal with certificate management
problems regardless of whether they really need certificates.
For example the most common usage of PGP is to check that two
signatures that purport to be by the same person are in fact
by the same person. Unfortunately you cannot check one
signature against another directly using PGP or any of the
other existing products. Instead you have to check both
signatures against a public key certificate, even if the
authentication information in that certificate is irrelevant
to your purpose, which it usually is, which means that you
have to download the certificate from somewhere, and the
person signing it had to upload it somewhere. As PGP always
checks a document against the certificate, rather than
against any other document the user happens to feel is
relevant to the question, the person signing the document
needs to get his certificate properly signed by some widely
trusted third party, which is too much trouble or too
complicated for many people.
The signatures and contracts in Crypto Kong are optionally
tolerant of email munging
The web pages contain a new web page "Business Vision" which
discusses the widespread failure to adopt cryptography, the
widespread reluctance to pay for cryptography, and the
illiquidity of various products for transferring money on the
net, and proposes a path to a solution.
Clearly, PGP has had rather poor penetration for business
uses, and by and large, people only need to encrypt or sign
stuff when there is money at stake.
I believe that this product will be more acceptable for the
typical businessman than PGP is, because it is easier to use,
and existing business practices translate more readily to
the identity model it supports than does the PGP identity
model.
The web page also contains full source code.
Crypto Kong is written in large part as ActiveX component,
and the use interface and database management code is written
in visual basic.
The use of ActiveX should make it easy to quickly code
products and web page that perform tasks involving
encryption.
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
AXOOTHyx0TpTLdyQsBnt7WmaVIo1l4WDGabHKK0Y
4Bxm/YWIEOTOK6zRVH57lP7PENFT5OFN+IR39Fcx8
From pooh at efga.org Wed Jan 7 22:01:03 1998
From: pooh at efga.org (Robert A. Costner)
Date: Thu, 8 Jan 1998 14:01:03 +0800
Subject: Remailers & N.E.T.
In-Reply-To: <2257f75e9d4378c573ebe49c9a1d7acc@anon.efga.org>
Message-ID: <3.0.3.32.19980108004628.03b6bbe8@mail.atl.bellsouth.net>
Perhaps the use of a remailer for this message below is an attempt to
escape the criminal provisions of the No Electronic Theft Act.
>From: Anonymous
>Comments: This message did not originate from the Sender address above.
> It was remailed automatically by anonymizing remailer software.
> Please report problems or inappropriate use to the
> remailer administrator at .
>To: cypherpunks at toad.com
>Sender: owner-cypherpunks at cyberpass.net
>Reply-To: Anonymous
>X-Loop: cypherpunks at cyberpass.net
>
> Creative Insecurity
> The complicated truth behind the rise of Microsoft
>
> By Virginia I. Postrel
>
> Back in 1983, Forbes ran an article called "If they're so
From frantz at netcom.com Wed Jan 7 22:03:03 1998
From: frantz at netcom.com (Bill Frantz)
Date: Thu, 8 Jan 1998 14:03:03 +0800
Subject: Silly Shrinkwrapped Encryption
In-Reply-To:
Message-ID:
At 10:36 AM -0800 1/7/98, William H. Geiger III wrote:
> at 12:10 AM, Bill Frantz said:
>
>>At 11:49 AM -0800 1/6/98, Eric Cordian wrote:
>>>I managed to find a document entitled "Security in Lotus Notes and the
>>>Internet" on the Web.
>>>
>>>It describes the weakening procedure as follows.
>>>
>>> "No matter which version of Notes you are using, encryption uses the
>>> full 64-bit key size. However, the International edition takes 24 bits
>>> of the key and encrypts it using an RSA public key for which the US
>>> National Security Agency holds the matching private key. This
>>> encrypted portion of the key is then sent with each message as an
>>> additional field, the workfactor reduction field. The net result of
>>> this is that an illegitimate hacker has to tackle 64-bit encryption,
>>> which is at or beyond the practical limit for current decryption
>>> technology and hardware. The US government, on the other hand, only
>>> has to break a 40-bit key space, which is much easier (2 to the power
>>> of 24 times easier, to be precise)."
>
>>It seems to me that if you step on the correct part of the message, you
>>zap the encrypted 24 bits, and cut NSA out of the loop. Of course the
>>receiver could notice and refuse to decrypt, which would require some
>>software hacking to defeat, but that is certainly doable.
>
>Wouldn't it be much better just to not use the crap?!?
>
>Why should we give our money to a company that has shown that they will
>sell us out at the first chance of making a buck doing so??
I don't plan on using it, but the Swedes have a bit of an installed base
problem.
-------------------------------------------------------------------------
Bill Frantz | One party wants to control | Periwinkle -- Consulting
(408)356-8506 | what you do in the bedroom,| 16345 Englewood Ave.
frantz at netcom.com | the other in the boardroom.| Los Gatos, CA 95032, USA
From frantz at netcom.com Wed Jan 7 22:22:10 1998
From: frantz at netcom.com (Bill Frantz)
Date: Thu, 8 Jan 1998 14:22:10 +0800
Subject: Lessig on antitrust and government regulation
In-Reply-To:
Message-ID:
At 12:48 PM -0800 1/7/98, Declan McCullagh wrote:
>Lessig is the special master appointed by the judge in the Microsoft
>consent decree case. He once wrote:
>
>>Whether a regulation is
>>rational turns on the facts, and what counts as "the facts" turns on the
>>theory that animates inquiry into the facts.
>
>Wow.
>
>How do we know what theory is the right one, and when we should change it?
Theories are normally only changed when (1) it is obvious they no longer
reflect observed reality, and (2) they can't be patched anymore. :-)
The Ptolemaic theory of the universe is the classic example.
-------------------------------------------------------------------------
Bill Frantz | One party wants to control | Periwinkle -- Consulting
(408)356-8506 | what you do in the bedroom,| 16345 Englewood Ave.
frantz at netcom.com | the other in the boardroom.| Los Gatos, CA 95032, USA
From snow at smoke.suba.com Wed Jan 7 22:38:21 1998
From: snow at smoke.suba.com (snow)
Date: Thu, 8 Jan 1998 14:38:21 +0800
Subject: cypherpunks and guns
In-Reply-To: <19980107001651.29456@songbird.com>
Message-ID: <199801080635.AAA01419@smoke.suba.com>
> On Wed, Jan 07, 1998 at 01:25:45AM -0600, snow wrote:
> > > I am fairly certain that as an irregular army soldier I could inflict
> > > a substantial amount of damage upon an occupying military. With maybe
> > > $20k in equipment and several hundred hours of training, you could make
> > If you were smart, you could do it for a lot less.
> That presumes the enemy is dumb. An amusing fantasy.
No, just that one could bootstrap your fight for a lot less.
As long as cops have guns and piano wire is unrestricted, ruthless
people will always have access to guns.
From alan at clueserver.org Wed Jan 7 22:44:01 1998
From: alan at clueserver.org (Alan Olsen)
Date: Thu, 8 Jan 1998 14:44:01 +0800
Subject: a good example of bad crypto hype
In-Reply-To: <3.0.5.32.19980107171614.007c4eb0@206.40.207.40>
Message-ID: <3.0.5.32.19980107221217.03fd76b0@clueserver.org>
At 08:30 PM 1/7/98 -0600, Eric Cordian wrote:
>
>David Honig wrote:
>
>> at http://www.meganet.com/explain.htm
>> you can test your critical thinking skills...
>
>Clearly everyone in this company is on crack. :)
And they also seem to be members of the Society for Creative Anacronyms.
---
| "That'll make it hot for them!" - Guy Grand |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer: |
| mankind free in one-key-steganography-privacy!" | Ignore the man |
|`finger -l alano at teleport.com` for PGP 2.6.2 key | behind the keyboard.|
| http://www.ctrl-alt-del.com/~alan/ |alan at ctrl-alt-del.com|
From dave at bureau42.ml.org Wed Jan 7 22:54:14 1998
From: dave at bureau42.ml.org (David E. Smith)
Date: Thu, 8 Jan 1998 14:54:14 +0800
Subject: The hax0rz are at it again... check out www.unicef.org
Message-ID:
Although I can't agree with their methods, I really love their motives.
In case they fix it sometime soon, go to:
http://bureau42.base.org/mirrors/ and click the "unicef" link.
dave
From tyna at mystop.com Wed Jan 7 23:09:24 1998
From: tyna at mystop.com (Tina (SingPing) Lai)
Date: Thu, 8 Jan 1998 15:09:24 +0800
Subject: [hey yall DO NOT delete this is the weirdest game....~!]]
Message-ID: <34B475DA.2E280EBF@mystop.com>
To: Airheadlin at aol.com, SWeeTpny98 at aol.com, Tlai at mystop.com
Subject: Fwd: hey yall DO NOT delete this is the weirdest game....~!]
From: Alyse4112
Date: Wed, 7 Jan 1998 21:06:34 EST
Organization: AOL (http://www.aol.com)
To: Alyse4112 at aol.com, OhUSoSilly at aol.com, Ninavc at aol.com,swimgirl12 at hotmail.com
Subject: Fwd:hey yall DO NOT delete this is the weirdest game....~!]
From: RayRay124
Date: Tue, 6 Jan 1998 03:01:18 EST
Organization: AOL (http://www.aol.com)
In a message dated 98-01-05 22:49:10 EST, DimplesF56 writes:
<<
>>
To: RayRay124 at aol.com, VHSmile at aol.com, nail at home.com, Sak14 at aol.com,AZNPL8YBOY at aol.com, ARISTO20 at aol.com, JILTED76 at aol.com
Subject: Fwd: [Fwd: Fwd: hey yall DO NOT delete this is the weirdest game....~!]
From: DimplesF56
Date: Mon, 5 Jan 1998 22:49:10 EST
Organization: AOL (http://www.aol.com)
To: Helen Huang , Jenny Young , Jonathan Woo , Margery Lee , Musette Chan , Steven Hu , Thyda Chhor
Subject: [Fwd: Fwd: hey yall DO NOT delete this is the weirdest game....~!]
From: Kwan
Date: Fri, 02 Jan 1998 09:09:45 -0800
To: Helen Huang , Jenny Young , Jonathan Woo , Margery Lee , Musette Chan , Steven Hu , Thyda Chhor
Subject: [Fwd: Fwd: hey yall DO NOT delete this is the weirdest game....~!]
From: Kwan
Date: Fri, 02 Jan 1998 09:09:45 -0800
--------------------
Received: from imo18.mx.aol.com (imo18.mx.aol.com [198.81.19.175])
by dry.jps.net (8.8.5/8.8.5) with ESMTP id TAA16198
for ; Wed, 31 Dec 1997 19:15:10 -0800 (PST)
From: Bar111bie
Message-ID: <2e2dd6f8.34ab0a14 at aol.com>
Date: Wed, 31 Dec 1997 22:14:26 EST
To: kwan887 at jps.net
Mime-Version: 1.0
Subject: Fwd: hey yall DO NOT delete this is the weirdest game....~!
Content-type: multipart/mixed;
boundary="part0_883624466_boundary"
Organization: AOL (http://www.aol.com)
X-Mailer: Inet_Mail_Out (IMOv11)
This is a multi-part message in MIME format.
--part0_883624466_boundary
Content-ID: <0_883624466 at inet_out.mail.aol.com.1>
Content-type: text/plain; charset=US-ASCII
--part0_883624466_boundary
Content-ID: <0_883624466 at inet_out.mail.aol.com.2>
Content-type: message/rfc822
Content-transfer-encoding: 7bit
Content-disposition: inline
From: Babytimd13
Return-path:
To: Bar111bie at aol.com
Subject: Fwd: hey yall DO NOT delete this is the weirdest game....~!
Date: Wed, 31 Dec 1997 03:42:58 EST
Organization: AOL (http://www.aol.com)
Mime-Version: 1.0
Content-type: multipart/mixed;
boundary="part1_883624466_boundary"
--part1_883624466_boundary
Content-ID: <0_883624466 at inet_out.mail.aol.com.3>
Content-type: text/plain; charset=US-ASCII
--part1_883624466_boundary
Content-ID: <0_883624466 at inet_out.mail.aol.com.4>
Content-type: message/rfc822
Content-transfer-encoding: 7bit
Content-disposition: inline
From: Babytimd13
Return-path:
To: Rndy2 at aol.com
Subject: hey yall DO NOT delete this is the weirdest game....~!
Date: Mon, 29 Dec 1997 03:56:13 EST
Organization: AOL (http://www.aol.com)
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7bit
In a message dated 97-12-28 19:03:18 EST, you write:
<< Begin...
> =
> First, write 1-11in a column.
> Then in the first and second spaces, fill any two numbers you like.
> Write two males names in the 3rd and 7th spaces.
> Write anyone's name (like friends or family...) in the 4th, 5th, and
>6th spaces.
> Write four song titles in 8,9,10 and 11.
> =
> Finally, make a wish...
> =
> =
> And here is the key for that game...
> =
> =
>
>
>
>
>
>
>
>You must tell (the number in space 2) people about this game in (the =
>number in space 1) days in order to make your wish come true.
> =
> The name in 3 is the one you love.
> The person in 7 is the one you like but can't work out.
> You care most about the person you put in 4.
> Fifth is the one you knows you very well.
> The name in 6 is your lucky star.
> The song in 8 is the song that matches with the person in 3.
> The title in 9 is the song for 7.
> The tenth space is the song telling you about your mind.
> And 11 is the song telling what you feel for sex.......
> = >>
--part1_883624466_boundary--
--part0_883624466_boundary--
From jalonz at openworld.com Wed Jan 7 23:48:36 1998
From: jalonz at openworld.com (jalonz at openworld.com)
Date: Thu, 8 Jan 1998 15:48:36 +0800
Subject: No Subject
Message-ID: <85256586.0029E630.00@openworld.com>
># SAN DIEGO DISTRICT ATTORNEY'S OFFICE.
>#
># Computer Security - Provide computer security assistance in criminal
># investigations. Tasks include data decryption, recovering erased
data,
># password retrieval, data line monitoring, and protected system entry.
>
>Isn't that last item special?
>
>---guy
>
> And a possible reason for heading the other way.
guy,
tough noogies
deal with it...
Notice the words "criminal investigations"? God forbid talent could
actually be used for a good cause. The incidents in question were actually
quite serious (Chinese mafia money laundering via phony real estate deals)
and not at all like the porno bbs confiscation crap you'd be thinking of.
Besides the DA office reference (I can completely understand about that
one), which was consulting work, what's your point in laying someone's life
out on a page? Who cares? Yeah, its a lot of stuff, I just happen to work
for start-up companies and thus I jump around a lot - given that most of
them never make it due to one problem or another.
:)
jqz
From bill.stewart at pobox.com Wed Jan 7 23:53:38 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Thu, 8 Jan 1998 15:53:38 +0800
Subject: best body armor for cypherpunks [serious] (fwd)
In-Reply-To: <199801050513.XAA22310@einstein.ssz.com>
Message-ID: <3.0.5.32.19980107234753.00845350@popd.ix.netcom.com>
>> What is, in your opinion, the best (price and performance-wise)
>> body armor for cypherpunks?
Anonymity, of course .....
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From bill.stewart at pobox.com Thu Jan 8 00:16:14 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Thu, 8 Jan 1998 16:16:14 +0800
Subject: [Humor] Kennedy's New Legislation
In-Reply-To:
Message-ID: <3.0.5.32.19980108000200.0084fab0@popd.ix.netcom.com>
At 07:19 PM 1/5/98 EST, Dr.Dimitri Vulis KOTM wrote:
>"Evolution in action."
>Thank you, Michael Kennedy, for improving humanity's gene pool.
It's only evolution in action if it gets them before they've reproduced...
Thanks!
Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
From tvid60 at hotmail.com Thu Jan 8 16:53:29 1998
From: tvid60 at hotmail.com (TVID)
Date: Thu, 8 Jan 1998 16:53:29 -0800 (PST)
Subject: Television Caller ID
Message-ID: <234a8sdf67q2348r@hotmail.com>
The TVMessenger utilizes the powerful medium of Television to display Telephone Caller ID information.
While watching your favorite movie or TV show, the TVMessenger will display incoming callers name
and number in the upper left hand corner of your TV screen.
This convenient easy-to-read caller display lets you make an immediate decision on how to handle the
call. In addition, the TVMessenger keeps track of your calls while your away. The callers name, number,
date, time, and the number of times they have called are stored in the callers log for future reference -
Ideal for number retrieval! The TVMessenger also works with your voice messaging service - it provides
a visual indication that a message is waiting.
CONVENIENCE * SECURITY * CALLERS LOG * MESSAGE WAITING/NEW CALL INDICATOR
REPLY to this email, visit our Website or CALL US for details TODAY!!
_______________________________________________
http://www.promobility.net/tvid/
Tel. 888-632-1310
From isparkes at q9f47.dmst02.telekom.de Thu Jan 8 01:07:52 1998
From: isparkes at q9f47.dmst02.telekom.de (Ian Sparkes)
Date: Thu, 8 Jan 1998 17:07:52 +0800
Subject: brute forcing combination locks (Re: Bruce Schneier, Sandia, FBI and the REAL WORLD)
In-Reply-To: <34B3DFB4.6396@nmol.com>
Message-ID: <3.0.2.32.19980108100339.00722fc8@q9f47.dmst02.telekom.de>
>So I hacked up some code to compute the minimal universal door entry
>sequence number...
>
>The sequence looked something like this:
>
>01234567890124568902346780...
We have the same system at my [x], and I have played with the same idea
coming up with similar results (my value was somewhat lower - but this was
fag packet maths and therefore subject to error). In my fantasies I have
also connected this sequence to an array of solenoids which punch in the
number while you wait. The locks seem to be able to handle a throughput of
around 2 digits per second, meaning the average search time of 10 minutes.
Bear in mind that there are 8 of these locks - with the appropriate
hardware you could guarantee to be in in less than three mins.
The reason that this has remained in my fantasies is that any key changes
are predictable - the company is the (until last Wednesday) state owned
telephone company =) and the keyspace consists of the area codes for the
surrounding regions.
And this lock is the only thing that stands between the outside world and
25 Servers and 300 workstations.
Makes you think...
From nobody at REPLAY.COM Thu Jan 8 01:23:02 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 8 Jan 1998 17:23:02 +0800
Subject: Anonymous Remailers
In-Reply-To:
Message-ID: <199801080918.KAA28931@basement.replay.com>
On Mon, 5 Jan 1998, Robert Hettinga wrote:
>
> > I noticed on Apple's info about acceptable behavior on their lists, that
>
> I decided to stop accepting posts from anonymous remailers way back,
> when anon.penet.fi was still alive. Some of that is philosophy, some of
> that was problems.
>
> As far as problems, it's the normal stuff -- personal attacks,
> mailbombing through anonymous remailers, copyright/slander/libel
> issues, all the normal fun and games. Since you can't track users back,
> you have real problems policing them. And since anonymous remailers
> tend to allow multiple (heading towards infinite) remailing addresses,
> the practical issue of how to lock out an abusive user becomes severe.
Mailbombing could be a criminal offence.
But libel is a civil and not a criminaloffence.
Under The Communications Decency Act S.230(a) no service provider is
liable for content authored by others.
Even if someone use a remailer to slander and libel further action
requires private civil action.
There is absolute no reason for being concerned about defamation from the
operator point of view.
The Fourth Circuit Court upheld the service provider impunity defence in
a recent case
brought against American Online Inc. (Zeran v. American Online Inc.).
However,if a moderator vulunterable approves a libelous message the case
could be different.
BTW, am I correct that criminal libel in no longer considered constitutional?
From pooh at efga.org Thu Jan 8 01:23:10 1998
From: pooh at efga.org (Robert A. Costner)
Date: Thu, 8 Jan 1998 17:23:10 +0800
Subject: Question on U.S. Postal Service and crypto
In-Reply-To:
Message-ID: <3.0.3.32.19980108035645.037abe0c@mail.atl.bellsouth.net>
At 02:07 PM 1/6/98 -0800, Declan McCullagh wrote:
>This is for a story for Time on the "new" U.S .Postal Service. I vaguely
>recall the USPS trying to set digital signature standards and/or serve as
>a CA. I'd like to mention this.
>
>Can't remember the details, though. Does anyone have 'em (or a pointer to
>them) handy?
A few months back I asked a USPS rep about this, and was told that the idea
had been scrapped. I do not know that this was correct. The USPS was
going to do timestamping as well as act as a CA as I recall. The
timestamping is a action that "postmarks" the digitally signed message.
Many attorneys feel this is a very good thing, though I have had a hard
time justifying the need for this to some technically inclined people.
Try "digital postmark" in yahoo.
http://www.aegisstar.com/uspsepm.html
http://xent.ics.uci.edu/FoRK-archive/fall96/0328.html
An interesting feature of the digital postmark is that the USPS was making
the claim that if you receive an email that the USPS send to you that was
not meant for you, then you have committed a federal crime when you read it.
Additional timestamping services are available perhaps from Pitney Bowes,
Arthur Anderson, and http://www.itconsult.co.uk/stamper.htm. My memory on
this fails me.
-- Robert Costner Phone: (770) 512-8746
Electronic Frontiers Georgia mailto:pooh at efga.org
http://www.efga.org/ run PGP 5.0 for my public key
From gbroiles at netbox.com Thu Jan 8 01:52:31 1998
From: gbroiles at netbox.com (Greg Broiles)
Date: Thu, 8 Jan 1998 17:52:31 +0800
Subject: Question on U.S. Postal Service and crypto (fwd)
In-Reply-To: