About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

KnowRight 95 (Intellectual Property Rights Confere


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
From <@uga.cc.uga.edu:[email protected]> Sun Nov 27 21:30:08 1994
Return-Path: <<@uga.cc.uga.edu:[email protected]>>
Received: from uga.cc.uga.edu by mail2.netcom.com (8.6.9/Netcom)
id VAA10175; Sun, 27 Nov 1994 21:27:35 -0800
Received: from UGA.CC.UGA.EDU by uga.cc.uga.edu (IBM VM SMTP V2R2)
with BSMTP id 3433; Mon, 28 Nov 94 00:21:32 EST
Received: from UGA.CC.UGA.EDU (NJE origin LISTSERV@UGA) by UGA.CC.UGA.EDU (LMail V1.2a/1.8a) with BSid 6854; Mon, 28 Nov 1994 00:21:27 -0500
Received: from NIU.BITNET by VMD.CSO.UIUC.EDU (LISTSERV release 1.8a) with NJE
id 6670 for [email protected]; Sun, 27 Nov 1994 23:18:48 -0600
Date: Sun, 27 Nov 94 23:13 CST
To: cudigest%[email protected]
From: Cu Digest ([email protected]) <TK0JUT2%[email protected]>
Subject: Cu Digest, #6.100
Message-ID: <CUDIGEST%[email protected]>
Sender: [email protected]
Status: O

Computer underground Digest Sun Nov 27, 1994 Volume 6 : Issue 100
ISSN 1004-042X

Editors: Jim Thomas and Gordon Meyer ([email protected])
Archivist: Brendan Kehoe
Retiring Shadow Archivist: Stanton McCandlish
Shadow-Archivists: Dan Carosone / Paul Southworth
Ralph Sims / Jyrki Kuoppala
Ian Dickinson
Fruit-loop editor: Carnegie Melon

CONTENTS, #6.100 (Sun, Nov 27, 1994)

File 1--KnowRight 95 (Intellectual Property Rights Conference)
File 2--CHAOS Communication Congress, 1994
File 3--The Cu in the News (Beehive BBS; Fed Virus Laws, & More)
File 4--Protect Your Privacy: A Guide for PGP Users (fwd)
File 5--CPSR-GLOBAL now moderated
File 6--Cu Digest Header Information (unchanged since 25 Nov 1994)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

----------------------------------------------------------------------

Date: Fri, 18 Nov 1994 10:07:27 -0100
From: [email protected](Peter Paul Sint)
Subject: File 1--KnowRight 95 (Intellectual Property Rights Conference)

FIRST ANNOUNCEMENT &
CALL FOR PAPERS

International Congress on Intellectual Property Rights for
Specialized Information, Knowledge and New Technologies

organized by
Austrian Computer Society, Austrian national commission for
UNESCO, Vienna University of Technology, TermNet

sponsored by
IFIP - CEPIS - UNIDO - ISO - FID
21 - 25 August 1995
Vienna, Austria

AIMS

Computer hardware and software technology increasingly
allows us to record and process complex information and
knowledge simultaneously in various languages and in
different forms of representation. The exponential growth of
information and knowledge requires more and more
sophisticated computer applications including especially
technologies, networking and multimedia.

In the course of these developments the borderlines between
computer hardware (in particular storage media) and software
(in particular application software) on the one hand and
data, texts and other forms of representation of information
and knowledge on the other hand have become blurred. The
increasingly unrestricted possibilities to manipulate
representations of information and knowledge make it
difficult to distinguish clearly between the original and
its offspring. Moreover, the transfer of information via
information highways will require legal and organizational
means to assist the transfer of related rights.

Research on and development of information and knowledge
systems abound everywhere in the world. New - multilingual -
communication media and databases are created which lead to
an increased need for new access, retrieval and interaction
methods. However, the methodology how to manage complex
information structures lags behind the development of
information technology itself.

In this context the legal provisions concerning the
protection of intellectual property rights are still based
on traditional hardcopy-oriented technology. New
representation methods and technologies are not sufficiently
covered by these provisions. Information users and customers
may welcome this development claiming that specialized
information and knowledge is the intellectual property of
all mankind. But the originators of specialized information
and knowledge may be highly interested in the utmost
protection of their intellectual property. These two
diametrically different positions mark the span of attitudes
towards the protection of intellectual property rights
today.

Increasingly, information and knowledge are created in
international cooperation networks through the division of
labour and shared efforts transcending national borders.
National legislation and jurisdiction concerning
intellectual property, however, show substantial
discrepancies and are equally insufficient everywhere. This
calls for harmonization at international level especially
addressing European cooperation and also developing
countries.

Legal measures, however, do not suffice. Technical methods
and tools - not to mention ethics - have to contribute to
the solution of the problems outlined above. There is
definitely the need for a congress with an interdisciplinary
and integrative approach at international level dealing with
the highly complex and unsatisfactory situation with regard
to intellectual property for specialized information and
knowledge in order to prepare the grounds for adequate
solutions.

SECTIONS concern KnowRight Aspects of:

Section 1: Knowledge bases, databases, information and
communication services

- smallest copyright unit(s)
- merged elements from various sources
- multi-national data and knowledge services
- mixed linguistic, numeric, graphical etc. data
- user-interface design
- bibliographic, factual and text databases
- liability problems in knowledge and databases
- downloading
- which information should be free, subsidized or commercial
- data protection and encryption
- data manipulation

Section 2: Software

- basic unit(s) of software protection
- software adaptations
- copying and pirating
- different types of software with different problems
- commercial software vs. public domain software, shareware
etc.
- data protection software
- usage fees and superdistribution
- regulation for revenue collection via digital money
- electronic contracting and licensing
- data security software
- downloading protection
- encryption standards

Section 3: Terminology and lexicography

- linguistic data intermixed with numeric and non-linguistic
data
- dictionary data vs. encyclopedic data
- terminology and text
- multilingual records from various sources
- multilingual user-interface design
- data safety & security

Section 4: Scientific-technical publishing

- electronic publishing
- database publishing
- new media
- hypermedia systems
- integration of text processing and DBMS data
- non-textual information
- updating
- copyright, security and problems of charging

Section 5: Multimedia

- digital broadcast and other services
- interactive TV
- user-interface, TV-Guide
- conditional access
- need of regulation and harmonization
- intellectual property and copyright
- consumer protection right

Section 6: Graphics and design

- graphical elements in texts
- images and parts thereof
- graphical databases
- protection of industrial design
- computer games
- computer animation
- user interface design
- picture format copyrights
- electronic art

INTERNATIONAL PROGRAM COMMITTEE
as of 18 May 1994

K. Brunnstein, University Hamburg, Germany (general chair)
P. Sint, Austrian Academy of Sciences (general co-chair)
M. Straube, Vienna Univ. of Tech., Austria (gen. co-chair)
A M. Tjoa, University Vienna, Austria (chair section 1)
G. Ertl, Regional Court of Appeal, Austria (chair section 2)
Ch. Galinski, Infoterm, Austria (chair section 3)
H. Maurer, Graz Univ. of Tech., Austria (chair section 4)
C. E. Eberle, ZDF, Mainz, Germany (chair section 5)
W. Purgathofer, Vienna Univ. of Tech., Austria (chair section 6)
K. Bauknecht, University Zurich, Switzerland
J. Berleur, University Namur, Belgium
J. Bing, Norway
D. Bourcier, Sorbonne, France
J. O. Chabot, ISO, Geneva, Switzerland
Yi Changhui, CSICCI, Beijing, China
W. Dillenz, VDFS, Vienna, Austria
A. Djintcharadze, Russia
J. Dorner, United Kingdom
B. Falcidieno, Italy
H. Feldner-Bustin, AKH Vienna, Austria
H. Fiedler, University Bonn, Germany
S. Fujiwara, Japan
H. G rdos, Austrian national commission for UNESCO
W. Jaburek, Diebold, Vienna, Austria
M. Lauritsen, Cambridge, Massachusetts, USA
R. Launo, FID, Finland
E. Mackaay, Montreal, Canada
G. Quirchmayr, University Vienna, Austria
V. Risak, Siemens PSE, Vienna, Austria
H. Schauer, University Zurich, Switzerland
J. Schoenhut, Fraunhofer Institute, Darmstadt, Germany
R. Stoeckelle, WSR, Vienna, Austria
R. W. Staudt, Kent College, Chicago, USA
R. Traunmueller, University Linz, Austria
R. Wagner, University Linz, Austria
E. Wilmersdorf, MDADV Vienna, Austria
E. Wolf, Alcatel Austria
K. K. Wolf, Uitikon, Switzerland
A. Zampolli, Italy
H. Zemanek, Vienna University of Technology, Austria

ORGANIZING COMMITTEE

W. Grafendorfer (chair), W. Hawlik, I. Sudra, R. Schwarz
c/o Austrian Computer Society

INTRODUCTORY TUTORIALS
AND SEMINARS

Tutorials/Seminars are planned on Monday, 21 August 1995 on
the following topics:

- Graphical Design
- Standardization
- Patents
- New media and multimedia
- Cryptography
- International communication systems and services

CONFERENCE LANGUAGE

English

EXHIBITION

An exhibition of pertinent software, publications and
projects will be organized from 21 - 25 August 1995 in
conjunction with the congress.

INFORMATION FOR AUTHORS
AND PARTICIPANTS

Please indicate your interest in participating or in
submitting a paper by returning the completed
preregistration form as soon as possible to:

W. Grafendorfer
Austrian Computer Society
Wollzeile 1-3,
A-1010 Vienna, Austria
PHONE: +43/1/512 02 35,
FAX: +43/1/512 02 35-9
E-MAIL: [email protected]

DEADLINES:
Preregistration: at your earliest convenience.
Submission
of papers (draft): 13 January 1995
Notification of
acceptance: 14 March 1995
Camera-ready copy: 14 April 1995

Further details will be provided following preregistration.

PREREGISTRATION FORM KNOWRIGHT 95

Please complete and send back via e-mail
I am interested in KnowRight 95 as
( ) Participant
( ) Speaker (please reply as soon as possible)
( ) Conference ( ) Tutorials
Section:_____
Preliminary title:______________________________
________________________________________________
Keywords:_______________________________________
________________________________________________
( ) Exhibitor

Family Name:_________________________________________
First Name(s):_______________________________________
Acad. Title:_________________________________________
( ) male ( ) female
Institution:_________________________________________
_____________________________________________________
Affiliation:_________________________________________
Address:_____________________________________________
Postal Code:____________City:________________________
Country:_____________________________________________
Telephone:___________________________________________
Fax:_________________________________________________
e-mail:______________________________________________


[email protected]
Socio-Economics, Austrian Academy of Sciences
Kegelgasse 27
A-1030 Wien, Austria.
Phone:(+431) 712 21 40 - 36 Fax: (+431) 712 21 40 - 34

------------------------------

Date: Thu, 24 Nov 94 20:38:32 GMT
From: [email protected]
Subject: File 2--CHAOS Communication Congress, 1994

11. CHAOS COMMUNICATION CONGRESS 1994
"INTERNET IM KINDERZIMMER - BIG BUSINESS IS WATCHING YOU ?!"
_________________________________________________________________

oooooooooooooooooooo December 27th-29th in BERLIN
$ $ $ $$
$$ "$ $ " o
$$ $o """""" """""""""$o"$o$ $o
$$ 1994 o$$$$$$$$$$$$$$$$"$$o$$$$$o
$$ o"" oooooooooooooooooo$$$$$$$$"
$$ o$" " o """""$o$$$$
$ o" " $$ $$$"$o$"o$
"""ooooooooooooo$$"" "$$$"$o$$"
"$$"o$$
Chaos Computer Club $"$ "$$$$$
$ $ $$
WWW URL: o$ o$
http://www.artcom.de/CCC $$o$"
""o$$
E-Mail: $$$
[email protected] $$
"
_________________________________________________________________
<H2>
For further Infos refer to:
the Newsgroup de.org.ccc
or our Homepage on the WorldWideWeb in Berlin:
<a href="http://www.artcom.de/CCC"> CCC Homepage </a>
</H2>

The Chaos Computer Club invites:

11th Chaos Communication Congress
*** B E R L I N ***

"Internet in the childrens' room -
Big Business is watching you ?!"

December 27th to 29th, 1994

in the former art exhibition hall,
Berlin, Budapester Str. 42
(opposite the Gedaechtnis-Kirche)

-----------------------------------------------------------------

The Chaos Communication Congress, organized by the Chaos Computer
Club and traditionally taking place between Christmas and New
Year, will this year again be offering a lot of interesting
issues for the hitchhikers on the data highway and everybody
else.

After taking place in Hamburg for 10 years, this year the
congress opens itself, in terms of both content and structure, to
a larger public, and will be held in the former art exhibition
hall, right in the center of Berlin's city, on Breitscheidplatz,
opposite the Gedaechtnis-Kirche.

Now that computers have turned out to be the most important new
medium, questions of conception of this new medium (which will
even overtake TV in importance) are gaining more and more social
relevance.

Terms such as "interactive TV" should contain much more than
just a "buy" button on the remote control (which persuades you
to buy any product you see in the commercials). To achieve this,
visions are needed. Thanks to their self-created, freely
accessible computer networks which can offer a lot more
speaking of "interactivity", the hackers do not only reach the
childrens' rooms in the information society, but also get
into difficulties caused by large combines that are more
and more regarding the networks as a field of activity. The
industry's tending to lay a direct glass fibre connection
right into our wallets and the commercialization of information
ways involved threatens organizations that have a social
interest, such as environmental or human rights organizations,
parties, or trade unions, whose aims are not in the first
place financial ones.

Topical issues, like the demonopolization of the german telephone
network and the conception of future network structures, can
therefore be found on the program as well as the traditional
workshops and hearings. This year, the discussion and analysis of
industrial concepts, next to the presentation of own projects and
ideas, will be paid special attention to.

Under the title "Let me embrace you, millions" workshops and
discussions concerning the financial outlook of the electronic
networks will be offered. Vebacom? RWE? Who will earn the most
out of the glass fibre pipelines with their endlessly flushing
greyish gold consisting of bits and bytes? Will anyone be able
to afford to take part in free public networks and world-wide
communication for individuals, small companies and institutions?
This looks like a simple numeric problem, but in reality, it is
a socio-political calculation, in which the phrase "knowledge is
power" might change to a "You're only supposed to know what you
can afford" - freedom of information might become freedom to buy
information. The exchange of values via electronic money will
also be a subject to examination in some of the many workshops.

The actual lifeline of the congress, the information chaos,
structured in different workshops, but as well beyond
organization, in every hallway and especially the Chaos Cafe,
can only be summarized in some topical keywords, such as CD ROM
security, phone phreaking and ISDN, secret service recruitments
in the german computer & network scene, police raids that
occurred at BBS operators' homes during the last year because of
"disturbance of the public harmony", legal information about the
BTX (german videotext system) providers' possibilities and
restrictions, and about the telecommunications law, insecurity
of chip cards and the questions resulting from it... Should
there not be enough time, the 30th of December will be available
for further spontaneous actions.

To keep the congress as easy to understand as possible in terms
of technical jargon, there will be introductory workshops on
some issues, e.g. the Internet.

The Hack-center and the data filling stations in every room will
be offering the possibility of critical and creative use of
technology. For reading and making decentral backup copys, the
Chaos Archive will provide a wide range of literature and enough
photocopiers.

------------------------------------------------------------
11th Chaos Communication Congress 1994
------------------------------------------------------------

December 27th to 29th in Berlin

Budapester Str. 42, Berlin

(walking distance of 3 minutes from Bahnhof Zoo)

------------------------------------------------------------

3-day tickets 42.- DM normal
23.- DM members of the CCC e.V.
75.- DM journalists (including a press
information leaflet and a detailed
congress documentation)
100.- DM commercial price

1-day tickets 20.- DM normal
12.- DM pupils and unemployed persons

It is recommended to make a ticket reservation by paying the
suitable amount onto the Chaos Computer Club bank account,
no. 59 90 90 - 201, Postbank Hamburg (BLZ 200 100 20).

Organized by:
Chaos Computer Club e.V., Schwenckestr. 85, D-20255 Hamburg
Phone +49-40-4903757, Fax +49-40-4917689, BBS +49-40-4911085

In cooperation with:
FoeBuD e.V., Marktstr. 18, D-33602 Bielefeld
Phone +49-521-175254, Fax +49-521-61172, BBS +49-521-68000

Coordination and press information:

Andy Mueller-Maguhn, CCC e.V., Berlin
Phone +49-161-2447146, Fax +49-161-880 2708

padeluun, FoeBuD e.V., Bielefeld
Phone +49-521-175254, Fax +49-521-61172

_________________________________________________________________
11. Chaos Communication Congress December 27th-29th in BERLIN

The Highlights:
_________________________________________________________________

First Day
Tue December 27th 1994 Presentation of existing Projects
and Networks, Applications,
(own) development, online projects,
electronic newspapers, WWW, Gopher,
introduction to PGP, and Internet
for Beginners...

_________________________________________________________________

Second Day
Wed December 28th 1994 Problems between Technical and Social Issues,
Data Security, Encryption, political
discussions on Use and Design of Networks,
privacy in communication vs. the law?
Software prices and PayCD-ROM Security,
techno-babble (encryption, Internet, ... )
in several parallel workshops

_________________________________________________________________

Third Day
Thu December 29th 1994 Life in Global Village:
How is it going to look like?
Which Datapaths are leading there?
international Views, Visions
and Visionary Projects

_________________________________________________________________

(Day 3.5)
Fri December 30th 1994 is free for spontaneous workshops

_________________________________________________________________

<H2>
For further Infos refer to:
the Newsgroup de.org.ccc
or our Homepage on the WorldWideWeb in Berlin:
<a href="http://www.artcom.de/CCC"> CCC Homepage </a>
</H2>

------------------------------

Date: Tue, 22 Nov 94 02:57:00 UTC
From: [email protected]
Subject: File 3--The Cu in the News (Beehive BBS; Fed Virus Laws, & More)

Beehive BBS
==========
A BBS sponsored by the State of Utah has flooded with users since
going online in May. The board averages about 300 calls a day and
allows citizens to send email to the governor and state regulators. At
first, Governor Michael Leavitt responded to email personally, but
that task is now handled by the same folks who respond to paper
correspondence. The BBS runs PCBoard software (from Utah-based Clark
Development Co.) and is gatewayed with the email system used by the
State's employees. In addition to email, citizens can access state job
openings, press releases, speeches, and consumer information. The
number for the BBS is toll-free throughout the state.
(Computerworld. Nov 7, 1994. pg 64)

Federal Virus Laws
==============
The Clinton Crime Bill makes it illegal to transmit computer viruses
and worms over the nation's electronic networks. The law also
introduces two levels of computer crime: those taken with "reckless
disregard" are misdemeanors, while "intentional" acts are felonies.
Other sections of the crime bill prohibit state motor vehicle agencies
from selling personal information from their databases.
(Computerworld. Oct. 10, 1994. pg 65)

Help by Email
===========
"The Samaritans", a non-religious charity that offers help to the suicidal
and despairing, can now be reached via the Internet. Volunteer counselors
respond to mail every day. Send your messages to [email protected], or
[email protected] for anonymous messaging.
(Datamation. Oct. 1, 1994 pg 22)

Not Our Fault
===========
The International Business Association (IBA), a D.C. based trade group,
advocates that the same Constitutional standards that apply to booksellers
be applied to BBS sysops and information carriers. In other words, just as
a bookstore owner is not responsible for the content of the books they
sell, neither should a sysop by liable for the contents of their board.
(Datamation. Oct. 1, 1994)

Fanning the Flames
===============
While most people have grown complacent, even amused, at the so-called
"virus crisis" the media keeps screaming about, Windows Magazine's Rich
Castagna writes that virus writers are still smart, still mean, and still
out to get you. He describes the situation as "corporate terrorism" in
the making. His column ends with a nice even-handed pitch for all the
commercial anti-virus software that is advertised in his magazine.
(Windows Magazine. December, 1994. pgs 79 - 82)

------------------------------

Date: Mon, 14 Nov 1994 02:16:47 -0600 (CST)
From: David Smith <[email protected]>
Subject: File 4--Protect Your Privacy: A Guide for PGP Users (fwd)

---------- Forwarded message ----------

Attached is the table of contents and the Foreword by Phil Zimmermann
for my book on PGP. It arrived in the publisher's warehouse last Thursday,
and should be in bookstores in a few days. It will take longer for the
book to be available overseas; the fastest and probably cheapest way to
get it is from a US bookstore or distributor such as NCSA
(75300.2557@compuserve.com).

Protect Your Privacy: A Guide for PGP Users

William Stallings

(Prentice-Hall, ISBN 0-13-185596-4, $19.95, 300 pages)

Table of Contents

Foreword by Phil Zimmermann
Acknowledgments
Reader's Guide to the PGP User's Guide
Chapter 1 Protect Your Privacy!

Part I HOW PGP WORKS

Chapter 2 Basic Principles of PGP
Chapter 3 Sending and Receiving PGP Messages
Chapter 4 PGP Features
Chapter 5 Key Generation and Secret Key Management
Chapter 6 Public Key Management

Part II USING PGP

Chapter 7 DOS PGP: Getting Started
Chapter 8 DOS PGP Reference
Chapter 9 Macintosh PGP: Getting Started
Chapter 10 Macintosh PGP Reference
Chapter 11 Windows PGP
PART III Supplemental Information

Chapter 12 The Building Blocks of PGP
Chapter 13 Choosing Your Passphrase
Chapter 14 Where to Get PGP
Chapter 15 Public Key Servers

<<>><<>><<>><<>><<>><<>><<>><<>><<>><<>><<>><<>><<>><<>><<>><<>><<>><<>>

Foreword by Philip Zimmermann

This book is about Pretty Good Privacy, a program I created to
encrypt e-mail using public key cryptography. PGP was
electronically published as free software in 1991. Little did I
realize what this project would lead to. PGP has become the
worldwide de facto standard for e-mail encryption.
I've admired Bill Stallings's writings in computer science for
some years before PGP, and here he is writing a book about my
program. How can I talk about how great his book is, without, by
implication, talking about how great PGP is? It's hard to write a
foreword for his book about PGP without sliding into some
measure of self-indulgence.
I've been so close to this project for so long that I sometimes
lose sight of the scope of what PGP provides. I got the manuscript
for Bill's book in the mail the other day -- the book you are
holding. Sitting down with it, flipping through it, endless pages of
diagrams, the formal treatment of it, services provided by PGP. It
wasn't till I saw his book on PGP that I could step back and see
PGP as others see it. The breadth of it. As a software engineer,
I'm used to either documenting my own software, or having a
random company tech writer document it. All software
engineers get that. But having William Stallings do the manual
for your software -- it's sort of like having your portrait done by
a world-class artist.
There are a very small number of software packages that
have far-reaching political implications. Most software that fits in
such an influential category has negative effects on our civil
liberties. For example, government intelligence agencies use a
software package called PROMIS, which is a powerful tool of
governments to track people's activities, movements, spending,
political affiliations, et cetera. Now that is a piece of software with
far-reaching political implications. Mostly bad ones. Then there is
the software that the Medical Information Bureau uses to classify
people who file medical insurance claims, to put them on a
medical "black list", so that they cannot purchase any medical
insurance ever again. That software has far-reaching political
implications -- enough to raise a large-scale backlash in our
society to do something about it. In most cases, it seems that
software that has powerful political effects is software designed to
strengthen the strong and weaken the weak.
But PGP also has far-reaching political implications. Mostly
good ones. In the Information Age, cryptography affects the
power relationship between government and its people. The
Government knows this all too well, as evidenced by their recent
policy initiatives for the Clipper chip, which would give the
Government a back door into all our private communications --
an Orwellian "wiretap chip" built into all our telephones, fax
machines and computer networks. PGP strikes a blow against
such dark trends, and has become a crystal nucleus for the
growth of the Crypto Revolution, a new political movement for
privacy and civil liberties in the Information Age. This
government has done all they can to stop the emergence of a
worldwide encryption standard that they don't have a back door
into. And that same government has placed me under criminal
investigation for unleashing this free software on the world. If
indicted and convicted, I would face 41 to 51 months in a federal
prison.
Despite the pressure the Government has brought to bear
against PGP (or perhaps because of it), PGP has become the most
widely used software in the world for e-mail encryption, used by
a variety of activists, and anyone else needing protection from
the powerful. It's also used by ordinary people to protect their
personal and business communications from prying eyes.
PGP may have a future as an official Internet standard, as
the Internet Engineering Task Force develops an interest in it. No
one who wants to work in the area of Internet e-mail privacy
should neglect studying PGP. Because of the "fax machine effect",
more people who want to encrypt their e-mail are getting PGP
because everyone else who encrypts their e-mail is already
using it.
Naturally, I want people to read the Official PGP User's
Guide, which comes with the electronic distribution package of
PGP (also in book form from MIT Press), because I wrote it. Also,
I'm more entertaining and personable in my book. And more
political. But Bill Stallings' book is more comprehensive than
mine, more thorough, covering more detail, with a lot more
diagrams. He's really good at completely nailing it down in a book.
In fact, I'll probably use his book myself as my preferred
reference to PGP.

--
| Bill Stallings | PGP key available at | also from Stable
| Comp-Comm Consulting | gopher.shore.net | Large Email Database
| P. O. Box 2405 | in members/ws | contact
| Brewster, MA 02631 | | [email protected]

------------------------------

Date: Wed, 2 Nov 1994 16:37:25 -0800
From: email list server <[email protected]>
Subject: File 5--CPSR-GLOBAL now moderated

Join the international conversation:

CPSR-GLOBAL is a moderated Listserv for uniting people all over the world
who want to talk about:

**decisions the USA will make on the information infrastructure,
or NII, that will affect the rest of the world--we want the NII to be
a positive force for a GII (global information infrastructure)

**issues of national identity, "cultural pollution," and
international communication and the GII

**the new emerging GII world culture

**international issues of security and privacy and computer law

**international issues of computer development (keyboards, safety)

**issues of design

**language

And whatever other global issues you want to discuss. Right now
the list will be predominately in English, because it's the lingua
franca of the Net. It is a MODERATED list. That means any
posts which are not "on topic" or inflammatory will be filtered out.
You can tell our messages because of the (@) in the subject line.

To join this discussion write to [email protected] with a blank
subject and the email command
SUBSCRIBE CPSR-GLOBAL Firstname Lastname
where Firstname and Lastname are replaced by your first name and last
name.

YOU DON'T HAVE TO BELONG TO CPSR TO JOIN THE DISCUSSION!!!

------------------------------

Date: Thu, 23 Oct 1994 22:51:01 CDT
From: CuD Moderators <[email protected]>
Subject: File 6--Cu Digest Header Information (unchanged since 25 Nov 1994)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message: SUB CUDIGEST your name
Send it to [email protected] or [email protected]
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
In ITALY: Bits against the Empire BBS: +39-461-980493
In BELGIUM: Virtual Access BBS: +32.69.45.51.77 (ringdown)

UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the NIU
Sociology gopher at:
URL: gopher://corn.cso.niu.edu:70/00/acad_dept/col_of_las/dept_soci

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission. It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified. Readers are encouraged to submit reasoned articles
relating to computer culture and communication. Articles are
preferred to short responses. Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Digest contributors assume all
responsibility for ensuring that articles submitted do not
violate copyright protections.

------------------------------

End of Computer Underground Digest #6.100
************************************

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS