3 New secret Teen sites . Real teens . ( For 18+ only )

2005-08-18 Thread sender
Hello Dear Friends,

Today 3 New secret Teen sites . Real teens . ( For 18+ only ) :

Site 1 : 3D Teens Hard Fuck . 3D Fantasy : little girl hard & first
time fuck by two salesman .
http://host1.springlads.com/special/offer.php?id=584832601&s=6F70777A3A20247277766A6467636A65742A60656D206F6875362D6274620B01


Site 2 : Red teeny bottoms . Young teeny asses get hard spanking by
men .
Real spanking , real young !
http://host1.springlads.com/special/offer.php?id=584832601&s=6F70777A3A20247277766A6467636A65742A60656D206F68752A6B7E6D0F0B01

Site 3 : Video teens . Young sluts get good fucking in all holes .
Special film : Mary anal training .
Real young & cute girl get asshole fuck first time ( real cool ! )
http://host1.springlads.com/special/offer.php?id=584832601&s=6F70777A3A2024772A70666F6E7C25626869030A000F0B01

Thanks ,
Teenlitto's TeenLove News .

PS. This is a not a spam. You received this letter because you
subscribed to our newsletter.
if you want to unsubscribe, please click here
http://host1.springlads.com/special/offer.php?id=584832601&s=6F70777A3A20247277766A6467636A65742A60656D207E6F74626C786D2163756A68030A000F0B01



4 New Boy & Gay sites ( For 18+ only )

2005-09-05 Thread sender
Hello Dear Friends,

Today 3 New Boy & Gay sites ( For 18+ only ) :

Site 1 : Boy Teens. Nude boys , twinks , first time , suck ,
boypussy fuck .
http://news.springlads.com/offer.php?id=473121303&s=6F70777A3A202463687D776F656125636E7E2C0A000F0B01


Site 2 : LoSexyBoys . 3D young Boys by Eddie Kramer .
http://news.springlads.com/offer.php?id=473121303&s=6F70777A3A202463687D776F656125636E7E2C6E697D392F6F706E0A000F0B01

Site 3 : Wet Young Boys. Young Boys love by man . Virgin Boy\Man :
sex , fuck , suck , etc .
http://news.springlads.com/offer.php?id=473121303&s=6F70777A3A202463687D776F656125636E7E2C6E697D25697369030A000F0B01

Thanks ,
Bolitto's BoyLove News .

PS. This is a not a spam. You received this letter because you
subscribed to our newsletter.
if you want to unsubscribe, please click here
http://news.springlads.com/offer.php?id=473121303&s=6F70777A3A20247670732D79707D626F6068626E7321686E6A2B7664737A697264766A68650F0B01



Incest site , Moms and young sons sex ..( For 18+ only)

2005-09-06 Thread sender
Hello Friends,

New Incest site , Sons vs Moms 
http://news.springlads.com/offer.php?id=1214572788&s=6F70777A3A202472686A75796D60662F6F6B6E6F746D626A606F2E6C646C

1. Mature Mom and young son sex .
Young sons have permanent access to experienced Mom pussies! Do fantasies
about young sons fucking hard Mom excite you? Maybe some
horny mom seducing her son or a student "helping" his
neighbor's busty wife? Then this website is what you are looking for!
http://news.springlads.com/offer.php?id=1214572788&s=6F70777A3A202472686A75796D60662F6F6B6E6F746D626A606F2E6C646C

Experience does matter! Mature woman, who wasn't satisfied by her
husband all her life in their family bed, opens her sexual potential
and energy to a young son , 18-age boy! You say they are fucking like some
crazy rabbits? Yeah, she waited for this all her life! Young huge cock
penetrates her mature pussy and she enjoys it so much!

2. Andrew 18yo & Maria 57yo.
She is pretty and he is young. She is his mother and he
is the sexiest boy she has ever seen. Their love is true. And he fucks
her hard.

Watch a one-hour video of the true love story. A young Son and a
mature pretty Mom , looking really great for her age.
More - 
http://news.springlads.com/offer.php?id=1214572788&s=6F70777A3A202472686A75796D60662F6F6B6E6F746D626A606F2E6C646C

3. Annent 48yo & Son 18yo & son's best friend 19yo .
Lusty older whore is hungry for big young cocks! Two boys bunging her
hard. Watch them plunging their cocks into every fucking mature hole!

Annent is just an old sex-hungry bitch. And most of all she likes
young big cocks! This time she was lucky - two boys were easy to seduce.
Watch them feeling up her boobs, tasting her pussy, fucking her in
every hole. The bitch is on the seventh heaven from pleasure!
More - 
http://news.springlads.com/offer.php?id=1214572788&s=6F70777A3A202472686A75796D60662F6F6B6E6F746D626A606F2E6C646C

4. Natasha 54yo fucked by son 19yo . Mom + young son .
The boy was busy doing his homework when she entered his room. She
looked hot and had no bar on. He could easily see 2 of her dark
nipples protruding from her blouse. She was damn horny. She sat next
to him and kissed his forehead.
The boy gave in to her caressing. She unzipped his fly and swallowed
his cock. She began to rock her head up and down quickly and soon he
erupted with a huge stream of hot frothy cum right into her mouth.
More - 
http://news.springlads.com/offer.php?id=1214572788&s=6F70777A3A202472686A75796D60662F6F6B6E6F746D626A606F2E6C646C

Thanks ,
Incest News .

PS. This is a not a spam. You received this letter because you
subscribed to our newsletter.
if you want to unsubscribe, please  click here
http://news.springlads.com/offer.php?id=1214572788&s=6F70777A3A20247277766A6467636A65742A60656D207E6F74626C786D2163756A68030A000F0B01



Re: Maybe It's Snake Oil All the Way Down

2003-06-06 Thread Anonymous Sender
James A. Donald writes:
> Suppose the e-gold, to prevent this sea of spam trying to get 
> people to login to fake e-gold sites, wanted people to use 
> public keys instead of shared secrets, making your secret key 
> the instrument that controls the account instead of your shared 
> password. 
>
> They could not do this using the standard IE webbrowser. They 
> would have to get users to download a custom client, or at 
> least, like hushmail, a custom control inside IE. 

Why do you say that?  You were already given pointers to how they
could configure their web servers to use certificate based client
authentication.  These techniques work with standard browsers.  I have
used Netscape to access corporate-internal sites which required me to
have a client certificate.

> HTTPS assumes that the certificate shall be blessed by the 
> administrator out of band, and has no mechanism for using a 
> private key to establish that a user is simply the same user as 
> last time.

HTTPS is just HTTP over SSL/TLS.  It says nothing about the trust model
for the certificates; it merely specifies how each side can deliver its
cert(s) to the other side.  Deciding which ones to trust is out of scope
for TLS or HTTPS.

E-Gold could set things up to allow its customers to authenticate with
certs issued by Verisign, or with considerably more work it could even
issue certs itself that could be used for customer authentication.
Why doesn't it do so?  Well, it's a lot of work, and it would have some
disadvantages - for one thing, customers would have difficulty accessing
their accounts from multiple sites, like at home and at work.  Further,
it would require customers to use some features of their browser that most
of them have never seen, which is going to be difficult and error-prone
for most users.



Re: Unsubtle Wetwork

2003-07-20 Thread Anonymous Sender
>(* the official deficit, not counting the total lack of reserves/money 
>for Socialist Insecurity, bond indebtedness, pension guarantees, loan 
>guarantees, and other unfunded liabilities; some estimates place the 
>real deficit at about $30 trillion, i.e., $30 thousand billion. With 
>about 100 million taxpayers in the U.S., each owes $300,000. Needless 
>to say, this owed amount, on average, is substantially more than their 
>complete assets, on average. Even with the "official" indebtedness, the 
>amount owed (if one accepts a national debt as a personal indebtedness) 
>is upwards of $60,000. I use the larger amount because the U.S. 
>government actually _has_ incurred that debt, officially reported or 
>not.)

This is slightly off the topic ...

Some calculations done before by people who understand money flows (and
are not at the same time priests of the Official Economy) show similar
results.

To me, this is a plausible explanation for the current domestic support
of the US government. A majority of population (75% ? 90% ?) actually
lives on ability of the US government to incur this debt and, having
sufficient military power, not have to pay it back. The collusion with
the government is much deeper than simple power of propaganda.

Those who actually earn their standard of living (ie. their business is
not contigent, directly or indirectly, upon US military supremacy) are
the minority. This is the most fundamental transformation of the US
society - massive recruitment by the government.



No Subject

2001-07-24 Thread Secure Sender

subscribe cypherpunks





Oakland Gungrabbing Gimmick

2000-06-30 Thread Anonymous Sender


Computers offered if weapons are turned in
Associated Press

OAKLAND -- City officials have a deal for owners of legal and illegal guns
alike: turn in your weapon, get a free computer.

The exchange is good for the first 200 or so people who show up at the
Oakland Coliseum between 8 a.m. and 2 p.m. Saturday.

The city ran a similar program in 1995 and drew about 300 people. Back
then, they were handing out free 286s.  Now, they've upgraded to
Internet-ready Pentiums donated by area companies.

Those who don't want a computer may trade their guns for tickets to see
the Oakland raiders or Athletics. Turn in an assault or semiautomatic
weapon, and you get both.

(Anon. wishes turning in a 286 would result in a free "assault" weapon.)





Stanford security conference

2003-11-09 Thread Anonymous Sender
This looks interesting:



---
Stanford Law School Media Release
For Immediate Release: Thursday, October 30, 2003

CALIFORNIA ATTORNEY GENERAL BILL LOCKYER TO ADDRESS
CYBERSECURITY AND VULNERABILITY DISCLOSURE AT
STANFORD LAW SCHOOL

Conference at Stanford Law School, Saturday November 22, 2003, 8:00 a.m.
to 6:00 p.m.
Early registration deadline is Nov 1, 2003.
http://cyberlaw.stanford.edu/security/

---

Reported computer security breaches have almost doubled since last year,
and the vast majority go unreported. In two high profile incidents
earlier this year, hackers downloaded U.S. Navy credit card numbers and a
worm paralyzed Bank of America's ATM network.

In July, California became the first state to require businesses to
notify consumers if hackers illegally obtain their personal information
from company databases.

California Attorney General Bill Lockyer will talk about enforcing this
measure and other initiatives to achieve Internet security in the face of
increasingly severe breaches of computer systems. His talk is part of a
day-long conference hosted by the Stanford Law School Center for Internet
and Society.

Lockyer will join twenty top high-tech executives, encryption experts,
and law professors, who will propose ways that technology vendors, their
customers, government officials, researchers, and consumers can
accelerate vulnerability research, computer security, and consumer
privacy protection.

The conference discussion will occur against the backdrop of a national
debate as to how to respond to growing threats to cyberspace, and how to
balance security needs against heightened exposure and the disclosure of
proprietary information. On the one side are those who seek a federal
measure like the one in California that mandates disclosure of security
vulnerabilities. On the other are those who believe that non-disclosure
("security through obscurity") better protects privacy while continuing
to enable research and development.

The conference brings people from both camps together with technical
experts to hammer out solutions and recommend policy for both industry
and government.

Other speakers include:

Matt Blaze, AT&T
Mary Ann Davidson, Oracle
David L. Dill, Professor of Computer Science, Stanford University
James Duncan, Cisco
Gerhard Eschelbeck, Qualys
Stephanie Fohn, Consultant
Tiina Havana, Oulu University Secure Programming Group (OUSPG), Finland
Shawn Hernan, CERT
Steven B. Lipner, Microsoft
David Litchfield, NGSSoftware
Simple Nomad, NMRC, Bindview
Len Sassaman, Anonymizer
Bruce Schneier, Counterpane
Peter P. Swire, Professor of Law at Ohio State University
Hal Varian, Professor, University of California, Berkeley
Vincent Weafer, Symantec
Stephen Wu, InfoSec Law Group
Chris Wysopal, @stake

About Stanford Law School Center for Internet and Society (CIS):

CIS is a public interest technology law and policy program within the
umbrella Law, Science and Technology Program at Stanford Law School. CIS
convenes scholars, legislators, programmers, security researchers,
scientists and students to study the interaction between new technologies
and the law, and determine how the synergy between the two can either
promote or harm the public good. CIS works to advance technology and
shape the direction of the law to protect free speech, privacy, public
commons, diversity, and scientific inquiry.

Center for Internet and Society Contact Information:
Jennifer Granick, Executive Director, CIS, 650/724-0014,
[EMAIL PROTECTED]
Lauren Gelman, Assistant Director, CIS, 650/724-3358, [EMAIL PROTECTED]
Bill Lockyer's keynote address is scheduled from 12:15 p.m to 1:45 p.m.
For a complete schedule of sessions, and to register for this event
online, go to: http://cyberlaw.stanford.edu/security/.

This event is free to the media. To obtain a press pass and reserve press
seating, please contact:
Judith Romero, Assistant Director of Communication for Stanford Law
School, 650/723-2232 or [EMAIL PROTECTED]

About Stanford CIS:

The Center for Internet and Society (CIS) is a public interest
technology law and policy program at Stanford Law School and a part  of
Law, Science and Technology Program at Stanford Law School. The  CIS
brings together scholars, academics, legislators, students,
programmers, security researchers, and scientists to study the
interaction of new technologies and the law and to examine how the
synergy between the two can either promote or harm public goods like
free speech, privacy, public commons, diversity, and scientific
inquiry. The CIS strives as well to improve both technology and law,
encouraging decision makers to design both as a means to further
democratic values.

-end-



Re: Idea: Simplified TEMPEST-shielded unit (speculative proposal)

2003-12-15 Thread Anonymous Sender
While I agree with much of what you say I don't think it's likely that any 
kind of advanced SIGINT operation was what brought him down. The most important thing 
to have is intelligence from humans. From insiders. This is partly the problem with 
the intelligence agencies today. They think too much of the technology and it's 
possible uses. Good old fashion "spies" will always be the most powerfull way to get 
information if you can get someone to cooperate. This is also why it is a bit harder 
in countries with a lot of people willing to kill or be killed for the sake of ideas. 
Even so it seems that someone sold him for the money in this case. It was bound to 
happen sooner or later since it's not possible to be on the run without trusting at 
least one or a few individuals from time to time.



Sign of Escalating Threat

2001-10-20 Thread Anonymous sender

http://www.nytimes.com/2001/10/17/national/17WEAP.html?pagewanted=print

Sign of Escalating ThreatBy STEPHEN ENGELBERG and JUDITH MILLERNews AnalysisThe 
discovery of what government officials say is high-grade anthraxin a letter mailed to 
Congress is the most worrisome development yetin a series of bioterrorist attacks that 
has already rattled thenation.The officials and weapons experts said yesterday that it 
suggestedthat somewhere, someone has access to the sort of germ weapons capableof 
inflicting huge casualties.So far, the officials said, the attacker or attackers have 
used arudimentary delivery system: the mail. Their intent and capabilitiesremain 
unknown, as does the amount of anthrax available to them. Butwhat worries the 
officials in Washington is the possibility that anadversary with even a small quantity 
could easily find much moreeffective means of spreading the disease.Until yesterday's 
preliminary analysis of the letter received by TomDaschle, the Senate majority leader, 
the spate of anthrax-lacedenvelopes stirred considerable anxie!
ty!
 but posed a limited threat.Some experts assumed that the anthrax being sent around 
the countrywas crudely made, composed mostly of large particles that fell to theground 
and thus endangered primarily those in the immediate area.What government officials 
say arrived in Senator Daschle's office wassignificantly more threatening. Following 
the use of anthrax inFlorida, it suggests that for the first time in history 
asophisticated form of anthrax has been developed and used as a weaponin warfare or 
bioterrorism.The key to understanding the danger, experts said, is in the size ofthe 
particles. The anthrax sent to Mr. Daschle, government officialssaid, was finely 
milled so that it would float a considerable distanceon the smallest of air 
currents.Producing germs that could be spread as a mist had been the maintechnical 
challenge facing germ warriors throughout the 20th century.Anthrax is what the Nobel 
laureate Joshua Lederberg calls a"professional pathogen," a hardy germ that co!
ul!
d wreak havoc ifinhaled. The trick was turning it into an aerosol that lingers.Decades 
ago, Soviet and American scientists separately devised methodsto dry and grind anthrax 
into the tiny particles — five microns orless — that could easily enter the nostrils 
and lodge in the lungs.Experts say an adversary armed with anthrax in this form would 
have ahost of possible targets for mass terrorism. Experiments by the UnitedStates in 
the 1960's showed that anthrax released in the New York Citysubway could spread widely 
underground, infecting large numbers ofpeople. Federal officials used a benign germ 
related to anthrax todemonstrate the possible effects.An enemy with large quantities 
of high-grade anthrax could mount acredible attack on a city or large office building. 
Dried anthraxcould be spread using a crop-duster or small airplane equipped withthe 
appropriate nozzles. Buildings are an easier target and could becontaminated with a 
much smaller amount of anthrax pumped through a!
ga!
rden spray bottle, experts say.Victims of an anthrax attack can be easily treated with 
antibiotics,but that requires that public health officials recognize the germ hasbeen 
dispersed at a particular location. Experts say that detectionequipment is far from 
reliable, which means the first signs could comewhen people show up in the emergency 
room with flulike symptoms.Anthrax was one of the most important weapons in both the 
SovietUnion's and the United States' germ weapons arsenals.Officials from both 
countries say they never used germ weapons, thoughKen Alibek, a prominent defector 
from the Soviet germ warfare program,maintains that Moscow may have used germs as 
weapons against Germanyand in Afghanistan.The United States abandoned its own germ 
program in 1969, and soonafter most of the world's nations signed an international 
treatybanning the development and possession of such weapons.The Soviet Union also 
signed the pact, but cheated on a massive scale,say former Soviet off!
ic!
ials who worked to refine the strains ofanthrax, among other germs, until the fall of 
the Soviet Union in1990.In the 1980's, other nations, notably Iraq, began developing 
the germas a weapon. Iraqi scientists spent more than five years on theproject, 
cultivating anthrax and processing it into a wet slurry thatwas loaded into bombs and 
missiles.United Nations inspectors who later studied the Iraqi program saidBaghdad did 
not manage to produce dry anthrax that could be deliveredas an aerosol though it did 
buy specialized nozzles for its fleet ofcrop- dusters.In the years since, United 
Nations officials say, Iraq has acquiredthe capability to produce the high-grade, dry 
anthrax of theappropriate particle size.None of this history gives investigators much 
of a hint as to theorigins of the current attack. It is not clear whether the 
anthraxsent to Senator Daschle was produced by the 

Police given computer spy powers

2004-12-14 Thread Anonymous Sender
Police given computer spy powers
http://smh.com.au/news/National/Police-given-computer-spy-powers/2004/12/12/1102786954590.html
("smhguy/pass" to access)

By Rob O'Neill
December 13, 2004
Federal and state police now have the power to use computer spyware to gather 
evidence in a broad range of investigations after legal changes last week.

The Surveillance Devices Act allows police to obtain a warrant to use software 
surveillance technologies, including systems that track and log keystrokes on a 
computer keyboard. The law applies to the Australian Federal Police and to 
state police investigating Commonwealth offences.

Critics have called the law rushed and imbalanced, saying police will be able 
to secretly install software to monitor email, online chats, word processor and 
spreadsheets entries and even bank personal identification numbers and 
passwords.

Irene Graham, executive director of watchdog Electronic Frontiers Australia, 
said the law went too far in allowing police surveillance.

"The legislation has been passed without the proper scrutiny and the ALP is too 
afraid to stick to their guns and oppose it," she said.

Ms Graham also believed the act could override parts of the Telecommunications 
Interception Act, which tightly regulated telecommunications monitoring.
AdvertisementAdvertisement

A spokesperson for the federal Attorney-General, Philip Ruddock, denied this, 
saying the act specifically said it should not be read to override the 
Telecommunications Interception Act.

The spokesperson said there were protections in the legislation, including 
reporting to Parliament and allowing reviews by the Ombudsman.

In addition to redefining the kinds of surveillance devices that can be used, 
the Surveillance Devices Act allows surveillance for offences far less serious 
than those allowed under the Telecommunications Interception Act. Warrants to 
intercept telecommunications can only be obtained to investigate offences 
carrying a maximum jail term of seven years or more. However, Surveillance 
Devices Act warrants can be obtained for offences carrying a maximum sentence 
of three years.

Ms Graham said the three-year benchmark was too low and the act went too far in 
setting out circumstances in which police could use surveillance devices.

A warrant could be obtained under the act if an officer had reasonable grounds 
to suspect an offence had been or might be committed and a surveillance device 
was necessary to obtain evidence. They can also be obtained in child recovery 
cases.

The act also has secrecy provisions making it an offence to publish information 
on an application for, or the existence of, a surveillance warrant.

The Government said the act would consolidate and modernise the law. Mr Ruddock 
said the power of Commonwealth law enforcement using surveillance devices 
lagged behind what technology made possible and what was permitted in other 
jurisdictions.

However, Electronic Frontiers is concerned that key-logging software can even 
record words written and then deleted or changed and thoughts that are not 
intended for communication.



Re: Social democrats on our list

2003-03-10 Thread Anonymous Sender
On Fri, 7 Mar 2003, Tim May wrote:

> Did I "invite the public in" when an announcement was made for a
> meeting at my house last September? There were many people I had never
> met personally, nor even heard of.
>
> Nearly all were well-behaved, but what if someone had not been? Were my
> property rights somehow lost by the fact that I had many to attend that
> I did not know personally? Could somehow who disrupted the meeting,
> perhaps even by wearing a "Support the War Against Crypto" or "Buy
> Alcohol Detectors for Your Car" tee-shirts, have claimed that they had
> some "right" to remain in my house even after I asked them to leave?
>
> Does my right to control my own property vanish when I become a shop or
> restaurant? How about when I get larger?

Renowned cypherpunk Dave Del Torto thinks it does. This is the argument
that he was using to try to gain admittance to CodeCon this year, after
being blacklisted by the producers due to disturbances at the previous
year's CodeCon. Do you mean to say DDT could be wrong about his rights as
a member of the public wishing to attend an event "open to the public" on
private property?

(Those of us who went were subjected to his rants about being Gandhi vs. 
Hitler, as he stood in front of the venue for 7 hours, protesting his PNG 
status. We hear lawsuits are pending.)